What are the sequence of avl trees created

Assignment Help Data Structure & Algorithms
Reference no: EM131746006

Assignemnt

1. Running time and asymptotic notations.

(a) If an algorithm's running time can be expressed as a function f (n) = √n+log nn, then which one of the following is NOT a correct bound for the running time?
a. O(n2)
b. O(√n)
c. O(log nn)
d. ?(n)

(b) Assume an algorithm runs in Θ(n2), then which one of the following asymptotic notations do not apply?

a. O(n3)
b. O(n2)
c. O(n)
d. ?(n2)

(c) Sort the following functions based on their growth rates, from the least to the greatest. Underline those functions that have the same asymptotic bound.

2n/2, loge n, n log n, n!, 2n, log2 n2, √n

2. Basic Data Structures.

(a) Which one of the following statements are true for linked lists, assuming there is only one entry point to the list (i.e. Head)?
a. It takes linear time to insert an element in the front of a list.
b. It takes linear time to insert an element in the end of a singly circular list.
c. It takes linear time to insert an element in the end of a doubly non-circular list.
d. It takes linear time to insert an element in the end of a doubly circular list.

(b) If we read a sequence of items < A, B, C, D, E, F > from a file and some of the items are pushed and popped, which one of the following stacks is possible? Assume that each item can only be pushed into the stack once.

a. top < D, E, F > bottom
b. top < F, C, A > bottom
c. top < C, D, E > bottom
d. top < E, D, F > bottom

(c) When using open-addressing in hash tables, we need to decide the table size m and some parameters so that the table can be fully utilized. What does that actually mean?
a. Allocate a table with size m equal to the number of elements stored.
b. Decide m and other parameters so that for any element, the initial m probe positions are distinct.
c. Decide m and other parameters to reduce the probability of collisions.
d. Decide m and other parameters so that no collision could happen.

(d) If a sequence of keys arrives in this order: < 22, 38, 7, 70, 46 >, suc- cessively insert each of them into the following tables, using all three of the open- addressing methods. Assume the primary hash function is h1(k) = k mod 8, the secondary hash function

845_Hash-Function.jpg

and the constants for quadratic probing are c1 = c2 = 1/2.

index

linear

 

quadratic

 

double

0

 

 

 

 

 

1

 

 

 

2

 

 

 

3

 

 

 

4

 

 

 

5

 

 

 

6

 

 

 

7

 

 

 


3. AVL Trees.

(a) What are the sequence of AVL trees created after inserting each character in the list < j, i, h, g, f, e, d, c, b, a > to an initially empty AVL tree? Note: please draw only one tree after each insertion.

(b) From the AVL tree you have built in part (b), what are the sequence of trees after deleting each character in the list (i.e., delete j , delete i, ...)? Note: please draw only one tree after each deletion.

4. Priority Queues. Using a Max-Heap to implement a Priority Queue requires a procedure to decide the relative order of events in queue. An event a has a higher priority than another event b if a's priority value > b's priority value. If both a and b have the same priority, then the event with earlier arrival time has a higher priority. Two events cannot arrive at the same time. Write a pseudo-code procedure called Compare to decide the relative order of two events.

Compare(a, b) // both a and b are events
// a.priority, b.priority: their priority values.
// a.time, b.time: arrival time (earlier time has a smaller numeric value)
// return 1 if a has a higher priority than b; Otherwise, return -1

5. Recursion in Tree Structures. Given a binary tree, write a pseudo-code procedure to calculate the weight of the tree (sum of the weights of all edges in the tree). Let w(u, v) denote the weight of the edge (u, v), where u is the parent of another node v.

Tree-Weight(x) // x is the root of the tree

6. Graph Algorithms. Given the directed graph below:

2318_Directed-Graph.jpg

(a) find the sequence of vertices visited in a BFS search if 6 is the source vertex.

(b) find the sequence of vertices visited in a DFS search if 6 is the source vertex.

Reference no: EM131746006

Questions Cloud

Describe current trend in your select researchable it topic : Describe the current trend in your selected researchable IT topic. How does this affect IT in general? Is this a localized consideration or a broad issue?
What are sustainability assessments : What are "Sustainability Assessments" and why are they important?
Test an appropriate hypothesis and state : Is the relationship significant? Assuming the conditions for inference are satisfied, test an appropriate hypothesis and state your conclusion in context
Determine the adjustment to sparkys income : Sparky Company is preparing its 2016 financial statements. Income from Continuing Operations (ICO) for 2016 was determined to be $1,000,000
What are the sequence of avl trees created : What are the sequence of AVL trees created after inserting each character in the list to an initially empty AVL tree?
Effects that government policies have on production : Determine whether or not government regulation to ensure fairness in the low-calorie, frozen microwavable food industry is needed
Employee incentives to ensure it avoids countrywide mistakes : How would you recommend a mortgage lender reform its employee incentives to ensure it avoids Countrywide’s mistakes?
Both alliances and acquisitions is relational capabilities : A key factor in the success of both alliances and acquisitions is relational capabilities, the ability to work together in an alliance,
What is the minimum cost of the shipping : How many donuts are shipped on each route and what is the minimum cost of the shipping? What does the reduced cost of 0.01 on the variable x36 mean?

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Implement an open hash table

In this programming assignment you will implement an open hash table and compare the performance of four hash functions using various prime table sizes.

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  How to access virtualised applications through unicore

How to access virtualised applications through UNICORE

  Recursive tree algorithms

Write a recursive function to determine if a binary tree is a binary search tree.

  Determine the mean salary as well as the number of salaries

Determine the mean salary as well as the number of salaries.

  Currency conversion development

Currency Conversion Development

  Cloud computing assignment

WSDL service that receives a request for a stock market quote and returns the quote

  Design a gui and implement tic tac toe game in java

Design a GUI and implement Tic Tac Toe game in java

  Recursive implementation of euclids algorithm

Write a recursive implementation of Euclid's algorithm for finding the greatest common divisor (GCD) of two integers

  Data structures for a single algorithm

Data structures for a single algorithm

  Write the selection sort algorithm

Write the selection sort algorithm

  Design of sample and hold amplifiers for 100 msps by using n

The report is divided into four main parts. The introduction about sample, hold amplifier and design, bootstrap switch design followed by simulation results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd