Find approximation algorithm

Assignment Help Basic Computer Science
Reference no: EM133266160

You are running a small Halloween costume shop that prides itself in the unique costumes that they sell. To stay truly unique, your shop designs and makes a new set of costumes each year. You are in the middle of planning for this year's costume making and want to find a work schedule so that all costumes are ready in time for Halloween. You employ five seamstresses, some of them are more experienced and work faster while others are still learning and are slower. You know for each seamstress how many yards of fabric they can sew in a day, these are given to you as s1, s2, s3, s4, s5. Further, you know for each of the n costumes how many yards of fabric they use, f1, f2, . . . fn.

Find an approximation algorithm to decide which costume to assign to which seamstress so that all the costumes are finished as soon as possible. Define the algorithm and prove its approximation factor.

Also add a proof of correctness.

Reference no: EM133266160

Questions Cloud

Create complex function : Create a complex function that will determine the number of instructors for the class listed in A4. Use the counta, indirect, index, and match functions
What is the output of the shellcode : What is the output of the shellcode below?
Pink elephant solution and pink elephant project : Do an application using the following names for the solution and project, respectively: Pink Elephant Solution and Pink Elephant Project.
The user frustration and annoyance : Define design optimization to enable user timely experience and avoid the user's frustration and annoyance.
Find approximation algorithm : Find an approximation algorithm to decide which costume to assign to which seamstress so that all the costumes are finished as soon as possible
Create entity relationship diagrams : Try to create entity relationship diagrams (ERD) that depict how the data flow through this new system.
Build-max-heap algorithm : Consider the following unsorted array: 5; 9; 1; 3; 8; 2; 0; 11; 4; ;10; 7a. apply the BUILD-MAX-HEAP algorithm to convert this arrag into a max-heap.
Find your brother private key : Your younger brother posts his RSA public key (N = 133, e = 7). You decide to show him that he needs to pick a stronger key. Find your brother's private key.
Data-driven companies outperform competitors financially : "Data-Driven Companies Outperform Competitors Financially," Thor Olavsrud discusses the path to becoming a data-driven company.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the p-value for the randomization test

Find the p-value for the randomization test of the null hypothesis that the drug has no effect versus a one-sided alternative (the drug improves fertility).

  Proper network design provides for layered security

Proper network design provides for layered security, not only isolating users and their traffic, but also preventing attackers from easily traversing a network

  Negative number at which time the program ends

A number is "groovy" if it is divisible by 13 or if it is both even and greater than 10. What would be a function that takes a number and then returns

  ERM approach in Higher Education environments

In chapter 9, the reading covers the ERM approach in Higher Education (HE) environments.

  Database assignment-hotel reservations

Using the logical design of the database project you have been working on in Weeks One, Two, and Three, create an Oracle® database that meets your logical.

  Logging is important security activity designed

Logging is an important security activity designed to assist with protecting an organization.

  Report based on heuristic evaluation

Evaluate one of the websites listed below and create a report based on heuristic evaluation, consistency, and cognitive walkthrough.

  What can the peoples bank of china

What can the Peoples Bank of China (PBOC) do to try to solve the problem created in question 1? You need a graph to answer this question.

  Virtual computing and/or cloud computing

Create your own Disaster Recovery and Business Continuity Plan. You need to be sure to include (in detail) how your plan will allow for the necessary Availability, Maintainability, Portability, and Reliability. You also need to address if your plan s..

  Miguel is junior-level system administrator

Miguel is a junior-level system administrator, and he has basic knowledge about working with Active Directory.

  Occurrence of the smallest element in the array.

Takes as parameters an int array and its size and returns the index of the first occurrence of the smallest element in the array.

  Economy and on monetary policy targets

Should very short-term data on the economy and on monetary policy targets be published? Defend your answer using rational expectations theory.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd