Odd-even transposition algorithem, Computer Networking

Assignment Help:

Algorithm: Odd-Even Transposition

//Input: N numbers that are in the unsorted form

//Assume that element bi is assigned to pi

for I=1 to N

{

If (I%2 != 0) //i.e Odd phase

{

For j=1,3,5,7,..................2*n/2-1

{

Apply compare-exchange (Pj, Pj+1) //Operation is executed in parallel

}

}

Else // Even phase

{

For j=2,4,6,8..................2*(n-1)/2-1

{

} I++

}

 Apply compare-exchange(Pj, Pj+1) //Operation is executed in parallel

}

Let us take an example and illustrate the odd-even transposition algorithm.

Analysis

The above algorithm needs one „for loop? starting from I=1 to N, i.e. N times and for every value of I, one „for loop? of J is implemented in parallel. Thus, the time difficulty of the algorithm is O (n) as there are total n phases and each phase executes either odd or even transposition in O(1) time.

2417_Example.png

                                                                             Example


Related Discussions:- Odd-even transposition algorithem

Network protocols - computer networks, Network Protocols In computer  ...

Network Protocols In computer  networks  communication  occurs between  the entities in different  systems an entity  is anything  that is  capable  of sending  or receiving

Explain the term - carrier sense multiple access, What is use of Carrier se...

What is use of Carrier sense multiple access Carrier sense multiple access with collision detection (CSMA/CD) is a form of medium access control in which a station listens to

Firewalls, Firewalls Firewalls emerged as a new technology in 1990s but...

Firewalls Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to des

Show the vulnerability of the internet, Q. Show the Vulnerability of the In...

Q. Show the Vulnerability of the Internet? More vulnerable than private network. Wide inter-network connection. Easy access by mass public world-wide. Lack of build in

Explain dynamic key management mechanism, Question: a) Consider the f...

Question: a) Consider the following MIP scenario. Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet. i. Discu

What are the benefits of intranet applications, What are the benefits of In...

What are the benefits of Intranet applications The benefits of successful Intranet applications can be enumerated as follows: Cheaper: Use of client browsers with one

What is the purpose of cables being shielded, What is the purpose of cables...

What is the purpose of cables being shielded and having twisted pairs? The main purpose of this is to stop crosstalk. Crosstalks are electromagnetic interferences or noise that

Why you require connecting two computers for file sharing, You require conn...

You require connecting two computers for file sharing. Is it possible to do this without using a hub or router? Yes, you can connect two computers together using only one cable

What is meant by asymmetric multiprocessing, What is meant by Asymmetric Mu...

What is meant by Asymmetric Multiprocessing (AMP)? It imposes hierarchy and a division of labor between processors. Only one designated processor, the master, controls (in a ti

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd