Course: ALGORITHM.
Assignment#1.1
Q- Discuss the Complexity of Bubble Sort algorithm
COMPLEXITY OF BUBBLE_SORTS ALGORITHM:
If we talk about the complexity of Bubble sort.
Then for bubble sort our pseudo code is,
Procedure Bubble sort (a1, a2 . . . an)
This is an arithmetic series. for i=1 to n-1 for j=1 to n-1 if aj>aj+1 then interchange aj and aj+1
Let, we have the following list,
{ 1 –11 50 6 8 –1} Using Bubble Sort in increasing order
After first pass
{-11 1 6 8 –1 50} (In this step, we take 5 comparisons)
After Second Pass
{-11 1 6 -1 8 50} (In this step, we take 4 comparisons)
After Third Pass
{-11 1 -1 6 8 50} (In this step, we take 3 comparisons)
After Fourth Pass
{-11 -1 1 6 8 50} (In this step, we take 2 comparisons)
After Fifth Pass
{-11 -1 1 6 8 50} (In this step, we take 1 comparison)
Done
According to the above list, we have 6 elements and there are 5 + 4 + 3 + 2 + 1 comparisons.
In general, if we have list of n elements, we will have the following list,
(n-1) + (n-2) …. + 2 +1 = (n-1) n / 2 comparisons.
The complexity here based on quadratically(degree 2) in n.
For Best Case:
The time complexity of the best case scenario is O(n).
For Worst Case:
The time complexity of the best case scenario is O(n2).
Note:
The Bubble sort is not efficient, there are other sorting algorithms that are much faster.
Assignment#1.2:
Q- Discuss the Complexity of searching algorithms.
Complexity of Algorithms:
There are a lot of searching algorithms, from which Linear Search Algorithm is one of the simple and easy algorithm, but it also have complexity, which we discuss here,
Let we determine, if the number 3 is present in the following lists
A= { 1 4 8 -1 3}
B= ...
... middle of paper ...
...ent of Defense develops TCP/IP (Transmission Control Protocol/Internet Protocol).
• TCP/IP is standard communications protocol, widely used in communications between different WANS and LANs.
• Because its use is wide, it has Security problems, growing sharing of information passed over vulnerable communications lines.
1980s
• This Decade is of personal computers and workstations (machines for special purpose use).
• Personal computers got popularity in ease of use.
• Its Graphical user interfaces (GUI) is a key to success.
• Information sharing between different computers via networks became more efficient and practical
• Wide spread use of Client/server computing model.
• Clients request various services and servers perform requested services.
• Multiple threads of instructions that could execute independently.
• Greater consideration in programming languages.
The Periodic Table of Elements is a table that arranges all known chemical elements by order of their atomic numbers. During the 1600s, vast amounts of knowledge about the properties of elements and their compounds were discovered and by 1869 63 elements had been discovered. As more and more elements were discovered, scientists began to recognise similarities between their properties and began to devise means of classification. Thus the periodic table of elements was created. The current periodic table contains 117 elements, however more may yet be discovered. The elements in the periodic table are classified in groups, periods and blocks. Groups refer to elements with similar properties and are the vertical columns of the table. The periods are the horizontal rows and illustrate the number of valence electrons each element has (how many electrons are in the outer shell of the element). The position an element is in on the table allows a scientist to easily judge its properties, its reactivity and its similarities to other elements.
The Periodic table of elements is an extremely important and useful scientific tool, mostly in the area of chemistry, but also in many other scientific areas. It has been around for hundreds of years and over time has been continuously added to and develop by many different scientists. The Periodic table contains over 100 elements, each one with varying physical and chemical properties. The Periodic table has not been simply one person creating and discovering all the elements, it has been the combined work of many different scientists. Although, Dimitri Mendeleev is often considered the creator or even father of the Periodic system.
Categorized within each group alphabetically.
Mendeleev knew his rough draft of a periodic table would be expanded. With that in mind, he left gaps in his table and predicted the characteristics of elements that scientists would eventually uncover. Currently, atomic numbers 115 and 117 are the only gaps left.
Life is like a bubble; It is pretty unbelieve-bubble. Everyone will stick with a thought, and that thought bubble will keeping floating and existing until it bursts. It is natural that everyone is adapting to how society sees as fit, but is the norm of the society really the best bubble? In the novel, To Kill a Mockingbird, By Harper Lee, the author give this message to the readers that racism is not something that everyone is born with, but rather is something that is taught. Although yes, the modern world no longer sees racism as the norm, it was much bigger way back in the 1930s. Racism was the bubble that stuck with everyone in the town of Maycomb, and took quite a while for them to open their eyes, a bit, about the topic.
The emission spectrum of an element is the spectrum of frequencies in electromagnetic radiation emitted due to a specific atom's electrons, creating a transition from a high energy to a low energy state. There are many possible electron transitions for each different atom in which the transition has a specific energy difference. The collection of different transitions leads to different radiated wavelengths and in turn makes up an emission spectrum. Each element's emission spectrum is unique and completely different form other elements on the periodic table. In order to reiterate this statement elements; thallium, neon and iodine will be compared and explained.
Mention 2 elements that can be isolated from the pitchblende and one uses of any of them?
Four-hundred years ago, scientists began identifying substances now know as elements. They began recognising patterns in the properties as the number of know elements grew, leading to the beginning of classification schemes that would come to devise the periodic table as we know it today ("The Periodic Table", n.d.).
...initely at risk if anything more than the barest of features are implemented with the technology. It’s evident that the technology is not a necessity today, and that widespread usage may be something that’s quite a bit ahead in the future, if at all. Unfortunately, this is one technology that may initially find a better home in countries seeking to better track their citizens.
The modern periodic table is very much like a later table by Meyer, but arranged, by Mendeleev’s, but it had to be according to the size of the atomic weight. The only thing though that was made by Mendeleev’s was Group 0, which was then added by Ramsay.
"A periodic table is an arrangement of elements in which the elements are separated into groups based on a set of repeating properties." Basically it shows us all known elements in the world. For one to read the periodic table he should beware that the atomic number comes first in the square , and referring to the atomic number its the number of protons found in the nucleus of an atom. Following the atomic number is the symbol, which is usually the abbreviation of the element's name. For example Carbon is referred to as " C". Then, the element’s name is shown right after the symbol. Lastly, there's the mass number, which is the number of protons and neutrons in the nucleus of an atom. So simply for us to find the number of protons we automatically
A search for any name would first consist of computing the hash value (using the same hash function used to store the item) and then comparing for a match using that value. It would, in general, be much faster to find a match across four digits, each having only 10 possibilities, than across an unpredictable value length where each character had 26 possibilities.
Abstract—Computational problems have significance from the early civilizations. These problems and solutions are used for the study of universe. Numbers and symbols have been used for different fields e.g. mathematics, statistics. After the emergence of computers the number and objects needs to be arranged in a particular order i.e. ascending and descending orders. The ordering of these numbers is generally referred to as sorting. Sorting gained a lot of importance in computer sciences and its applications are in file systems etc. A number of sorting algorithms have been proposed with different time and space complexities. In this paper author will propose a new sorting algorithm i.e. Relative Split and Concatenate Sort, implement the algorithm and then compared results with some of the existing sorting algorithms. Algorithm’s time and space complexity will also be the part of this paper.
The Internet has revolutionized the computer and communications world like nothing before. The Internet enables communication and transmission of data between computers at different locations. The Internet is a computer application that connects tens of thousands of interconnected computer networks that include 1.7 million host computers around the world. The basis of connecting all these computers together is by the use of ordinary telephone wires. Users are then directly joined to other computer users at there own will for a small connection fee per month. The connection conveniently includes unlimited access to over a million web sites twenty-four hours a day, seven days a week. There are many reasons why the Internet is important these reasons include: The net adapts to damage and error, data travels at 2/3 the speed of light on copper and fiber, the internet provides the same functionality to everyone, the net is the fastest growing technology ever, the net promotes freedom of speech, the net is digital, and can correct errors. Connecting to the Internet cost the taxpayer little or nothing, since each node was independent, and had to handle its own financing and its own technical requirements.
The downside of this technology is the potential for security problems. Intruders can see packets traveling on a network and can perhaps interpret them to obtain confidential information.