Problem regarding the fibonacci numbers

Assignment Help Basic Computer Science
Reference no: EM131086020

The Fibonacci numbers are defined by the recurrence F0 = 0, F1 = 1

Fn = Fn-1 + Fn-2(n ≥ 2)

  1. (a)  Show that Fn ≥ 2n/2, n ≥ 6.
  2. (b)  Assume that the cost of adding, subtracting, or multiplying two integers is O(1), inde- pendent of the size of the integers.
    • Write pseudocode for an algorithm that computes Fn based on the recur- sive definition above. Develop a recurrence for the running time of your algorithm and give an asymptotic lower bound for it.
    • Write pseudocode for a non-recursive algorithm that asymptotically per- forms fewer additions than the recursive algorithm. Discuss the running time of the new algorithm.
    • Show how to compute Fn in O(log n) time using only integer additions and multiplications.
      (Hint: Express Fn in matrix notation and consider the matrix 0 1 11 and its powers.)
  3. (c) Now assume that adding two m-bit integers requires Θ(m) time and that multiplying two m-bit integers requires Θ(m2) time. What is the running time of the three algorithms under this more reasonable cost measure for the elementary arithmetic operations?

Reference no: EM131086020

Questions Cloud

Improving the business operation : 1) What is strategic information? 2) Why were all the past attempts by IT to provide strategic information fails? List three concrete reasons and explain. 3) An effective decision helps the manager to perform better in improving the business operatio..
Calculate exhaust temperature during exhaust stroke[0c] : 8-1. A six-cylinder SI engine, with a compression ratio of rc= 8.5, operates on an air-standard Otto cycle at WOT. Cylinder temperature and pressure when the exhaust valve opens are 1000 K and 520 kPa. Exhaust pressure is 100 kPa and air temperatu..
Activity of obtaining information resources : Information retrieval (IR) is the activity of obtaining information resources relevant to an information need from a collection of information resources. This activity plays an important role in data integration and data mining.
Possibility of someone using an application : You have been alerted to the possibility of someone using an application to capture and manipulate packets as they are passing through your network. What type of threat does this represent?
Problem regarding the fibonacci numbers : Assume that the cost of adding, subtracting, or multiplying two integers is O(1), inde- pendent of the size of the integers.
Use maple to find all the real roots of the polynomial : Prove that every univariate polynomial with complex coefficients and degree m has at most m distinct roots. Use MAPLE to find all the real roots of the polynomial 3x5-25x3 + 60x - 20
Determine the initial angular acceleration of the assembly : Determine the initial angular acceleration of the assembly.
Netbeans integrated development environment : Create a console based, non-GUI Java program using NetBeans Integrated Development Environment (IDE) that displays "Hello world!" Take a screenshot that shows the program's successful compilation and execution.
Piece of equipment or materials : This is to avoid allegations that the evidence may have been tampered with when it was unaccounted for, and to keep track of the tasks performed in acquiring evidence from a piece of equipment or materials. What is the term used to describe this p..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd