Lists which enumerate coefcients of polynomials

Assignment Help Computer Engineering
Reference no: EM132101898

Polynomial Modulo Function in Scheme

Language for code: Scheme <---must be this language function delcaration: (poly_mod apol bpol)

Input: lists which enumerate coefcients of polynomials, starting from the constant term.

for example the polynomial 6x^2 + 3x + 1 would be input as list( 1 3 6)

Output: list would be similar out put to the above example ( 1 )

Rules:

1. Assume all numbers are integers

2. You should only use the pure functional features of Scheme.

3. The leading coeffcient of the output polynomial can not be zero. If the result is the zero polynomial, please output the empty list.

4. You may assume that input polynomials have integer coeffcients. The output polynomial for the modulo operation may have coeffcients that are rational numbers.

5. For poly mod, you may assume that bpol is not zero.

Reference no: EM132101898

Questions Cloud

Create an array with thirty data elements : Suppose a data array has 30 numbers sorted from low to high already, where no two numbers are equal.
Why did the set timeout : IF i want to conect a raspberry pi 3 with a GSM modum through a serial port , and since the GSM modum is talking at 9600 (by datashet).
Compare two sets of characters : Your program will include a function called searcher that uses pointers to both the source string and the character set, and which returns a pointer to a char.
Calculate the number of possible color combinations : In the popular game Mastermind, one player creates a secret code of four pegs, each of which can be chosen from one of six colors.
Lists which enumerate coefcients of polynomials : The leading coeffcient of the output polynomial can not be zero. If the result is the zero polynomial, please output the empty list.
How many different 5-card poker hands are there : How many different 5-card Poker hands are there? How many of these are 1 pair?
Why do not the administrators just use random numbers : Why don't the administrators just use random numbers? Would these be the same for a proxy firewall? How would a NAC work with a firewall?
How would your own code of ethics guide you in dealing : Philosophy 110 : Explain the pros and cons of the positions on the topic you have chosen and state your position on the topic.
Find the number of items that must be sold : Cost data and demand data for a company's best-selling product are given in the tables below. Find linear regression models

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd