Write a program called that accepts as arguments files

Assignment Help Computer Engineering
Reference no: EM132154799

An upper triangular matrix is a special type of matrix where all the values below the main diagonal are 0. In order to save space we can store this matrix without the zeros.

For example 1 2 3 0 4 5 0 0 6

Would be stored as 1 2 3 4 5 6 We would also like to be able to work with these matrices in their compressed format, again to save space.

Write a C++ program called that accepts as arguments two files that contain these compressed upper triangular matrices.

The program should multiply the two matrices together and then display the resulting compressed matrix in its compressed form.

• The names of the files will be given on the command line

• All matrices will be square, ie N X N

• All values will be integers

• File format:

N (dimension of the matrix)

number1

number2 number3 ...

• For help on matrix multiplication

• Restrictions: You cannot expand the compressed matrices to do the multiplication. Again the whole point is to save space.

• In the examples on the next page the values are shown on 1 line to save space

Cat mat1.txt 4 1 2 3 17 4 51 25 6 31 9

cat mat2.txt 4 25 73 -4 -17 -99 81 -88 11 12 10

./triMatMult.out mat1.txt mat2.txt

25 -125 191 13 -396 885 510 66 382 90

This is equivalent to doing C = A * B where:

A = 1 2 3 17 0 4 51 25 0 0 6 31 0 0 0 9

B = 25 73 -4 -17 0 -99 81 -88 0 0 11 12 0 0 0 10

C = 25 -125 191 13 0 -396 885 510 0 0 66 382 0 0 0 90

Reference no: EM132154799

Questions Cloud

Write a program to read 15 values from a data file : This new data file will have two columns, i.e. first column will have the unsorted values and the second coulumn will include the sorted values.
Create a list that have the same values as the pets array : Create a list that have the same values as the pets array (just create: if you want you can display the items - your choice)
Perform a binary search on a sorted array or vector : Write a function (recursive, or not) called search which performs a binary search on a sorted array or vector.
Explain all the nonnegative floating point number : Compare the difference of 4 bits IEEE Std 754-1985 similar floating point number representation and the binary number system.
Write a program called that accepts as arguments files : Write a C++ program called that accepts as arguments two files that contain these compressed upper triangular matrices.
Write a program that will open a blastn : Write a program that will open a BLASTN (nucleotide to nucleotide search) output file, parse out specific information.
How many passes would be required to complete the sort : If you were to use a bubble sort to re-sort these elements into descending order, how many passes would be required to complete the sort?
Design a program should contain a class : If the user indicates that they are not a member, they should be prompted to enter their information for registration.
How digital platforms used to increase market penetration : MIK 304 & MEB 301 E-MARKETING STRATEGIES ASSIGNMENT - Give details on how digital platforms can be used to increase market penetration

Reviews

Write a Review

Computer Engineering Questions & Answers

  Draw a pipeline diagram showing the out-of-order execution

Determine the number of cycles it takes to execute all iterations of the loop for both the scenario - Draw a pipeline diagram showing the out-of-order execution of the MIPS code through the first iteration of the loop, without bypassing.

  Questioncomplete following numbered exercises in the bluej

questioncomplete following numbered exercises in the bluej textbook. most do not require lengthy or complex responses

  Why use post-order to destroy the binary tree

What is the reason why use post-order to destroy the binary tree in C++. Also pre-order to deep copy and in-order to print in ascending order.

  Write program that inputs data for a weighted network graph

Write a computer program, using the language of your choice, that inputs the data for a weighted network graph and computes the least-cost paths using Dijkstra'

  Why performing rotation in an n-node binary tree represented

Explain why performing a rotation in an n-node binary tree represented using an array list takes ?(n) time.

  What might be the components of a data center audit program

What might be the components of a data center audit program? List and explain three areas of daily management that IT auditors need to review.

  Express between declarative and procedural knowledge

Distinguish between declarative and procedural knowledge. Also give some examples of declarative knowledge and procedural knowledge.

  In what ways are unix and linux similar

In what ways are UNIX and Linux similar? In what ways are they different? Why is stability of Linux so high when compared to other network operating systems?

  Create a project scope management plan

Create a project scope management plan that will detail how the project scope will be defined, managed, and controlled to prevent scope creep. The plan may also include how the scope will be communicated to all stakeholders.

  Define and explain the action research methodology

Define and explain the Action Research Methodology including its application to technology research.

  Analyze source code and develop comprehensive unit test

Analyze source code and develop comprehensive unit test suites. Operate CASE software to document the design of a piece of software.

  Address your strategy for the given in a 2- to 3-page memo

the company offsite 2-day training session project is about ready to enter the execution phase. however management has

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd