Compute the millionth fibonacci number in under a minute

Assignment Help Computer Engineering
Reference no: EM131242981

1. This problem uses numpy arrays. Numpy arrays support matrix like multiplication. For this problem you will only need to understand how to create numpy arrays and how they are multiplied with the numpy.dot function. The tutorial posted here, https://docs.scipy.org/doc/numpy-dev/user/ quickstart.html, contains all this information and much more. Given the list L1 of 2 x 2 numpy arrays in the assignment 3 file write two reduce operations, one which will multiply the matrices in order based on where they appear in the list and another which will multiply them in the reverse order. At no point should you reverse the list L1. As an example if L1 is denoted [A, B, C] the first reduce operation will compute ABC while the second reduce operation will compute CBA. Here A, B, C are square matrices of the same dimension. Remember to use np . dot for matrix multiplication.

2. (Given the directory assignment3txtfiles create a Counter whose keys are all the words which occur in the files and the values are the number of times the word appears in all of the files combined. For example if the directory had only three files and the occurred 5 times in the first file,4 times in the second file and once in the last file then the Counter entry would be the:10. To get the words you may simply apply split although this is not the best way to do this as discussed in class. The list L2 contains the paths to the files. Besides the creation of the Counter you may use only list comprehensions. Thus you solution will need to be a sequence of list comprehensions followed by the creation of the Counter.

3. The file partial_adurt.csv contains records which were derived from a previous census. The records are partial in that they contain only a subset of the fields. The file is in csv format which indicates that fields are comma separated. The final field will be referred to as the class label. Find all records which are identical except perhaps in the class label which in this case is 50K.

You will need to produce a dictionary. The keys should represent the at-tributes of the records, without the class label, in some way, and the values should be lists where the first entry is the number of times the attribute combination occurred, the second element is the number of records with those attributes such that the individual did not earn over 50K and the last element is the number of individuals with those attributes who did earn over 50K. Keep in mind that the lines in the file will be read in as strings.

4. In the binary search algorithm if we replace the condition a <= b by simply a < b the algorithm fails. Find a list L4 and a number num4 for which such an implementation gives the wrong answer. Store your answers in the file.

5. There are two implementations of the binary search algorithm given in the assignment file, one,bin_search_lecture, which was presented in lecture, and another which is a recursive implementation. The second is significantly slower as determined by the time print outs(uncomment and run to see). Why? Note it is not because the implementation is recursive. In the next problem you will give a recursive implementation which runs in time much closer to that presented in lecture. Store your answer inside the triply quoted string.

6. Give an efficient recursive implementation of the binary search algorithm. Use a similar time test to show that it performs much closer to the implementation given in class than the recursive implementation given in problem 5. You will need to determine the parameters that the function will receive. You may use a helper function if you like.

7. Using the function Fib and Fib_wrapper2 from the lectures detente at which value of n it takes Fib longer than a minute to calculate Fib (n). Does Fib_wrapper2 have this problem? What is the largest integer Fib_ wrapper2 can calculate in under a minute? Store your answers in the aRsignment3.py file.

8. Based on you answer to 7 rewrite NewFib using loops instead of recursion. Your implementation should be able to compute the millionth Fibonacci number in under a minute. Printing it out in Spyder is not a good idea. It is not necessary to actually print it. Storing it in a variable will suffice. Do not use any other parameters besides those already given.

Assignment - https://www.dropbox.com/s/pewqshz7oylv26w/Assignment.rar?dl=0.

Reference no: EM131242981

Questions Cloud

Health care and medicine in today world : Please choose one question & write 150 words. What impact will the implementation of the ICD-10-CM coding system have on health care and medicine in today's world?
Review the various lean production and six sigma : Review the various Lean production and Six Sigma quality tools outlined in Chapter 8. Select a tool or process that could be implemented in your current or past organization and describe how this tool could be used in improving supply chain manage..
Which statements is not true regarding buyers right to cover : Which of the following statements is not true regarding the buyer's right to cover? Under UCC warranty law, which of the following is a FALSE statement?
Purpose of a continuous improvement program : 1. What is the purpose of a continuous improvement program? What role does HRM play in assisting continuing improvements? 2. What are the various goals of HRM?
Compute the millionth fibonacci number in under a minute : Based on you answer to 7 rewrite NewFib using loops instead of recursion. Your implementation should be able to compute the millionth Fibonacci number in under a minute. Printing it out in Spyder is not a good idea. It is not necessary to actually..
Essay providing comparison and contrast of business ethics : Write an essay providing comparison and contrast of business ethics in the cultures of corporations in the UAE and the USA.
Leadership challenge issues : First, identify all the leadership challenge issues that might be suggested by this fact pattern.
Winning new business : Analyze the list of common proposal mistakes discussed in Chapter 1 and determine which types of mistakes are probably the most commonly made. Explain your rationale. Then, discuss how you as a manager would work to ensure those who work with you ..
What are the threats from cannabis cultivation production : What are the threats from cannabis cultivation/marijuana production in the United States? - Explain how Drug Trafficking Organizations (DTOs) are/may be involved in this process.

Reviews

len1242981

10/15/2016 2:21:56 AM

All instructions and required files attached herewith. Must run on Python v2.7. Use the attached py template to code. PLEASE CHANGE FILE EXTENSION .XLS TO .CSV FOR FILE NAME partial_adult.xls

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd