Why a yes-instance of q gets turned into a yes-instance of d

Assignment Help Computer Engineering
Reference no: EM132122266

Remember all of the following steps when showing that a problem D is NPcomplete:

1. Show that D is in NP by briefly explaining how to quickly verify a solution to it.

2. Choose another problem Q that is known to be NP-hard (one that we showed in class) and explain how you convert an instance of that problem into an instance of D (this is to show that D is NP-hard).

3. Explain why a yes-instance of Q gets turned into a yes-instance of D.

4. Explain why a no-instance of Q gets turned into a no-instance of D.

Consider the following problem SELECT SET: the input is a list of sets S and an integer k, and the problem is, can you choose k elements such that every set in the list S contains at least one of those elements?

For example, given S = (1, 3),(2, 3, 4),(3, 4, 6, 9),(5, 6), and k = 3, we could pick 3, 4, and 6 as the k elements, and all of the sets in S contain either 3, 4, or 6, so this would be a yes-instance of SELECT SET. Prove that SELECT SET is NP-complete.

Reference no: EM132122266

Questions Cloud

Prompt the user to enter a string of their choosing : Prompt the user to enter a string of their choosing. Output the string. Extend the program further by implementing the output_without.
Npv or internal rate of return when evaluating : What is Net Present Value in terms of evaluating a project? What is better NPV or Internal Rate of Return when evaluating?
The relationship between eminent domain and condemnation : What is the relationship between eminent domain and condemnation? What is the essential difference between prescription and dedication?
What is the npv of project : If the firm is facing a discount rate of 8%, what is the NPV of this project?
Why a yes-instance of q gets turned into a yes-instance of d : Show that D is in NP by briefly explaining how to quickly verify a solution to it. Explain why a yes-instance of Q gets turned into a yes-instance of D.
Exclusive investments projects : A firm is considering the two mutually exclusive investments projects. Project Alpha requires an initial outlay of $600 and will return $160 per year
What will be the value of? matt account : What will be the value of? Matt's account in 9 years with his quarterly payments if he is earning 6.5?% ?(APR), 11% ?(APR), or 14.5% ?(APR)?
Discuss various versions of unix operating system : Detailed literature review of the features (at-least five) of Unix Operating System. Discuss various versions of Unix Operating System.
What is the npv of project : If the tax rate is 34 percent and the discount rate is 10 percent, what is the NPV of this project? (Assume that dNWC will be fully recovered in the last year o

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd