Explore BrainMass
Share

# Algorithms

### Two's complement numbers: addition, conversion to decimal

1). Assume that the two numbers shown below are in 6-bit 2's complement form. Convert each one to decimal form. A. (110101)base2cm B. (010101)base2cm 2). A. Add the following 8-bit 2's complement numbers, and state your answer in 8-bit 2's complement form: 01001010 + 11110110 B. Has overflow occurred? Answer yes or n

### Round Trip Delay

For a 1-Gbps network operating over 5000 km, the delay is the limiting factor, not the bandwidth. Consider a MAN with the average source and destination 20 km apart. At what data rate does the round-trip delay due to the speed of light equal the transmission delay for a 1-KB packet? Assume the speed of light in fibre to be 2/3 t

Use big-theta notation to classify the traditional grade school algorithms for addition and multiplication. That is, if asked to add two numbers each having n-digits, how many individual additions must be performed? If asked to multiply two n-digit numbers, how many individual multiplications are required?

### Big O notation

Use big-O notation to classify the traditional grade school algorithms for addition and multiplication. That is, if asked to add two numbers each having N digits, how many individual additions must be performed? If asked to multiply two N-digit numbers, how many individual multiplications are required?

### Iterative and Recursive Algorithms

Solutions to some problems are intrinsically recursive, and writing them in an iterative fashion is difficult. The reverse also holds. Find an example or a recursive procedure and represent it as an iterative procedure. Also, choose an iterative procedure that you would re-write as recursive. What challenges did you face in the

### R

Suppose f is a function that returns the result of reversing the string of symbols given as its input, and g is a function that returns the concatenation of the two strings given as its input. If x is the string hrwa, what is returned by g(f(x),x)? Explain your answer - don't just provide the result!

### Write a shell script that prints the following menu (Unix)

Write a shell script that prints the following menu Welcome to My Simple Mathematica a) Choose 'a' for Fibonacci Series b) Choose 'b' for Prime Numbers Please make your choice [a or b]: Once the user enters 'a' or 'b' perform the appropriate calculation and print the series. Limit the series by requiring the u

### Flow chart and program

1 chocolate delights candy company manufactures several types of candy. Design a flowchart for the following : A programm that accepts a candy name (for exmple, "chocolate-covered blueberries'), price per pound, and number of pounds sold in the average month, and display the item's data values only if it is best-selling item. B

### Graph and describe adjacency matrix

Assume that a graph uses and adjacency matrix to represent the edges. Describe how you would update the matrix for the following algorithms. (a). Insert an edge (b). Insert a new vertex (c). Delete and edge (d). Delete a vertex.

### Desk Check Algorithm

This problem has three phases I need help with all three. Here is the problem and below the problem is what I have and what I need more assistance with. I specifically need help with the 3rd point and any additional input for point 2. Original problem is at the end of this post: 1. For each program module (component) t

### Write a simple program using the given info.

Develop an algorithm in pseudocode that shows the tasks and sub-tasks of the module. o Desk check your algorithms using the following test values: · Leaded gas: \$4.00/gallon · Unleaded gas: \$4.50/gallon · Federal gas tax: \$0.10/gallon · Gas-n-Go service charge: \$1.00 ·

### Linux: Explain the function

Using the following script: #!/bin/bash #This is a shell script echo \$# echo \$0 echo \$1 echo \$2 echo \$3 echo \$* name1=\$1 #name2=\$2 echo \$name1 "is the first parameter" echo \$name2 "is the second parameter" echo \$ echo \$0 "was executed with" \$# "parameters on the command line." Explain the function of each line

### 2 questions ..

Hello, I need the answer of below questions please: 1) Suppose f is a function that returns the result of reversing the string of symbols given as its input, and g is a function that returns the concatenation of the two strings given as its input. If x is the string hrwa, what is returned by g(f(x),x)? Explain your answer and

### Use big-O notation to classify the traditional grade school algorithms for addition and multiplication. That is, if asked to add two numbers each having N digits, how many individual additions must be performed? If asked to multiply two N-digit numbers, how many individual multiplications are required?

Use big-O notation to classify the traditional grade school algorithms for addition and multiplication. That is, if asked to add two numbers each having N digits, how many individual additions must be performed? If asked to multiply two N-digit numbers, how many individual multiplications are required?

### Truth Tables

Using the Internet and other resources define and study Truth Tables. How are Truth Tables used in computer programming? Give a short example. Did you find other areas where Truth Tables are used? Explain.

### Algorithm Efficiency: Example Problems

Please help with these 2 problems in algorithm efficiency. View attached file. 1. Rank the terms of the following function according to their order of growth. Give explanation. 2. Consider the following algorithm where n is a positive integer. What is the efficiency class of this algorithm? Show your reasoning.

### Nyquist Bandwidth question

Please reference this figure for the question: 11. Considering only the Nyquist bandwidth limitation. Determine the bandwidth required of the media (at Point D) given the following: a. 20-analog voice signals digitized using standard G.711 PCM; a TDM multiplexer with an added output overhead of 15%; and a modem that empl

### Use the 16 bit floating point format to perform the requested conversions and arithmetic operations.

Use the 16 bit floating point format to perform the following: a) Convert ED80 from fpx to decimal. b) Convert 1.745 * 10-3 from decimal to fpx. c) Add two fpx numbers (7B80 + 7300). d) Subtract two fpx numbers (7700 - 7CF0). e) Multiply two fpx numbers (7500 * A70A). All above numbers are fp (floating point) in hexade

### Provide feasible digitizer and modulation combinations for given transmitter and media.

Given the transmitter and media (in the attachment) with a bandwidth of 20kHz, provide two digitizer and modulation combinations that are feasible together given the Nyquist capacity relationship.

### Tax Calculator

I need help with a design flow chart email of the source code of the program. Insert comments in the program to document the program internally.

### Suppose f is a function that returns the result of reversing the string of symbols given as its input

Suppose f is a function that returns the result of reversing the string of symbols given as its input, and g is a function that returns the concatenation of the two strings given as its input. If x is the string abcd, what is returned by g(f(x),x)? Explain your answer.

### Prospectors Problem for Lanterns in Mineshafts

Four prospectors with only one lantern must walk through a mine-shaft. At most, two prospectors can travel together and any prospector in the shaft must be with the lantern. The prospectors, named Andrews, Blake, Johnson, and Kelly, can walk through the shaft in one minute, two minutes, four minutes, and eight minutes, respectiv

### Consider the given simplified version of CFB mode. Find the decryption algorithm.

Consider the following simplified version of CFB mode. The plaintext is broken into 32 bits pieces: P=[P1,P2,..], where each Pj has 32 bits, rather than the 8 bits used in CFB. Encryption proceeds as follows. An initial 64 bit X1 is chosen. Then for j=1,2,3.., the following is performed: Cj=Pj XOR L32 (Ek(Xj) Xj+1= R32

### manufacturers accountability for the products that produce

This answer provided by this solution is two fold. First, the solution provides the learner with an understanding of the factor that may be attributable or included in a model for the spread of an epidemic. Further this solution provides the learner with an understanding of a manufacturers accountability for the products that pr

### Demonstration of histogram equalization

A 4X4 input image is defined by a matrix with gray scale[0.9] 2 3 3 2 4 2 4 3 3 2 3 5 2 4 2 4 Draw the image histogram and show the new output image along with its histogram after histogram equalization.

### Normalizing Relations to 3NF

Normalize the following relation to 3NF. Describe all normal forms, and what must be done to achieve each. Make Computer Company Computer Store PC-1 BUSY BUSINESS MACHINES JOYLAND PC-2 BUSY BUSINESS MACHINES DATALAND PINEAPPLE COMPUTERS INFOWORLD WIZ-1

### Implement the Function: Returning an Interator

See the attached file. Implement the function maxLoc(), which returns an iterator pointing at the largest element in a list. //return an iterator pointing to the largest element //in the list. template <typename T> list<T>::iterator maxLoc(list<T>& aList); Write a program that tests maxLoc(), using the following decl

### Database Concept - Protection Data During Transmission

In addition to protecting data that reside in database server, please describe how data can be protected during transmission both inside and outside of firewall.

### Compute the minimum allowable "signal to noise ratio" to achieve the desired bit rate.

Suppose you want to achieve a bit rate of 64 Kbps using a maximum bandwidth of 10,000 Hz. What is the minimum allowable signal-to-noise ratio? Express this ratio in deciBells.

### Digital to Analog Translation: Advantage of Schemes like QAM

Digital signals can be translated to analog signals by using relatively simple techniques such as varying the amplitude or frequency between two specified values. What is the advantage of using more complex schemes such as QAM (Quadrature Amplitude Modulation)?