Find combination of projection and inverse projection map

Assignment Help Data Structure & Algorithms
Reference no: EM13809920

1. The functions f : {1, 2, 3} → {a, b} and g : {a, b} → {x, y, z} are given by f(1) = b, f(2) = b, f(3) = a, g(a) = y, g(b) = x.

(a) Classify each of f and g as bijective, injective, surjective, or neither.

(b) Find g ? f .

(c) Either find the inverse of g ? f or explain why g ? f is not invertible.

2. I want to develop a database of information about my book collection, which tells me about the authors and genres of the various books I own. At the moment I have books by Isaac Asimov, China Mieville, Peter F Hamilton and Arthur C Clarke, and I denote the set of authors by A = {A, M, H, C}, abbreviating each author by the initial of his surname. I am classifying the books as science fiction, fantasy, horror and non-fiction, so my set of genres is G = {s, f , h, n}, again using initial letters as abbreviations.

At the moment, I have science fiction works by China Mieville and Isaac Asimov, I have fantasy by Peter F Hamilton and China Mieville, horror by Peter F Hamilton and Arthur C Clarke, and non-fiction by Isaac Asimov.

(a) Give the relation R on A × G which represents this information. (You may use appropriate abbreviations.)

(b) Find the combination of projection and inverse projection maps which finds all authors by whom I have horror books.

(c) Find the combination of projection and inverse projection maps which find all writers who have written non-fiction or fantasy books in my collection.

3. (a) Draw the graph with adjacency matrix

2482_img1.png

where the columns and rows label vertices 1 to 5 in order.

(b) Use the adjacency matrix connectivity algorithm, starting by marking row 1 and crossing out column 1, to show whether this graph is connected.

(c) Calculate A 2 and hence find the number of paths of length 2 from vertex 1 to vertex 5.

(d) Find a breadth first spanning tree starting at vertex 3.

4. Use Dijkstra's algorithm to find the shortest path from node a to node f in the following graph.

2251_img2.png

5. Use the heapsort algorithm to put the following list of numbers in decreasing order:

8 2 4 7 1 3 5

You should explain in detail how the original heap is obtained, and then show your sequence of heaps and partial ordered lists.

6. Consider the symbols and frequencies:

o : 12 e : 10 n : 4 t : 6 s : 5 m : 3

(a) Find a Huffman code for this situation, and the average length of an encoded symbol.

(b) Assign the symbols to these codewords in a different order, and comment on the resulting average length.

7. Bob decides to use n = 221 = 13 × 17 and e = 11 as his public key for an RSA cryptosystem.

(a) Show that the decryption exponent is 35.

(b) Find the encrypted form of the message 16.

Reference no: EM13809920

Questions Cloud

Write a paper about workplace discrimination : Write a paper about workplace discrimination.
The constitutions of arizona and the united states : the team leader and responsible for coordinating team field trips. The constitutions of Arizona and the United States
Nadler tushman outputs for palm : Nadler Tushman Outputs for Palm
Diffraction and interference of light : Consider the spacing and peak widths of the light patterns produced by diffraction and interference of light.
Find combination of projection and inverse projection map : Find the combination of projection and inverse projection maps which finds all authors by whom I have horror books
What developmental theory do you find most interesting : What developmental theory do you find most interesting
What technique would managers use to detect big trends : What technique would managers use when seeking to detect big trends and changing market conditions
Practices of global operations management : Apply theories, models, and practices of global operations management to address business problems.
Progress in mastering the course competencies : The objective of this assignment is to measure your progress in mastering the following course competencies:

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Create binary tree based on names

The Binary Tree is one of best ways to organize information when you require fast access. For this project, we will organize a list of names and perform many operations on those names.

  Data stewardship

Discussion: As more and more data are collected, stored, processed, and disseminated by organizations, new and innovative ways to manage them must be developed.

  Prepare a flowchart to solve any linear equation

Prepare a flowchart to solve any linear equation ax^2+bx+C=0

  Difference between a problem and an opportunity

What was the problems and/or opportunities facing Delta in late 1997? What is the difference between a problem and an opportunity

  Explaining instruction format of operation code field

Operation code field, a mode field, to specify one of seven addressing modes, a register address field to specify one of 60 processor registers, and memory address. Specify instruction format and number of bits in each field if the instruction ..

  2n-1 comparisons are necessary in the worst case

Prove that 2n-1 comparisons are necessary in the worst case to merge two sorted lists containing n elements each.

  Encryption feistel cipher and decryption algorithm

If this is psudocode for encryption feistel cipher determine decryption algorithm?Output: ciphertext = (left[16], right[16]) Explain pseudo-code of corresponding decryption algorithm for this cipher.

  Binary multiplication using booths algorithm

Perform the subsequent 4-bit binary multiplication using Booth's algorithm, assuming signed two's complement integers:

  Explaining playout delay algorithm

Let the adaptive playout delay algorithm. Show through simple example that adjusting playout delay at beginning of each talk.

  Identifying the location of rubric objectives

Code Comments are used to identify the location of rubric objectives, Code Formatting is used to raise the readability of the HTML Code.

  Design a program flowchart

Design a program flowchart that asks the user to enter three integers and the programs finds and displays the minimum and the maximum of these three integers. Please use "click chart" to draw the flowchart of your design

  Empty stack

1. Suppose an initially empty stack S has performed a total of 25 push operations, 12 top operations, and 10 pop operations, 3 of which generated EmptyStackExceptions, which were caught and ignored. What is the current size of S?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd