Describe a linear- time method for finding each node v of t

Assignment Help Computer Engineering
Reference no: EM132098922

Can you please let me know if the answer is correct.

Let T be a binary tree with n nodes. Define a Roman node to be a node v in T, such that the number of descendants in v's left subtree differ from the number of descendants in v's right subtree by at most 5.

Describe a linear- time method for finding each node v of T, such that v is not a Roman node, but all of v's descendants are Roman nodes.

// v.roman is false when v is not roman and all its descendants are roman, true otherwise

romanNode(v):

if v->left == NULL and v->right == NULL:

v.numDescendants = 1

v.roman = true // v is a roman node

return (v.numDescendants, v.roman)

else

if v->left != NULL:

(a, b)=romanNode(v->left)

else:

(a, b)=(0, true);

if v.right!=null:

(a, b)=romanNode(v->right);

else:

(a, b)=(0, true);

if (|x1-x2|<=5 and y==1 and y2==1 )

v.roman=true;

else

v.roman=false;

v.numDescendants= a+b+1;

return (v.numDescendants, v.roman);

Endif

Reference no: EM132098922

Questions Cloud

Evaluate simple expressions : This is a program that will evaluate simple expressions such as 17 + 3 and 3.14159 * 4.7. The expressions are to be typed in by the user.
How much do you interact with java on a daily basis : Discuss: The impact of Java from a personal, business, and societal perspective. How much do you interact with Java on a daily basis?
User and method to increment games won by player : Include method to get input from user and method to increment games won by player
Write a function that adds two binary numbers that are : Write a function that adds two binary numbers that are entered by the user. You may represent each binary number as a string of 0's and 1's.
Describe a linear- time method for finding each node v of t : Describe a linear- time method for finding each node v of T, such that v is not a Roman node, but all of v's descendants are Roman nodes.
What is the morality of posting an encryption key : What is the morality of posting an encryption key on a website publicly in order to help others play digital disks.
Choose two items from menu before entering : Prompt user to choose item from menus using 1,2 or 3; else user enters 0 to quit. If user choose 1,2 or 3 , show input box again and if user choose 0
In how many ways can this be done : In how many ways can this be done? In how many ways be done if no two women may sit next to each other?
Identify and explain some different types of risks : Identify and explain some different types of risks that a computer network environment might face. What are some ways that these risks can be mitigated?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd