This presentation is the full application of discrete mathematics throughout a course and includes Set Theory, Functions nd Sequences, Automata Theory, Grammars and algorithm building.
This presentation looks at relations, functions, sequences and automaton theory and finishes up with binary and sequential algorithm script for searches in psuedocode.
This is a 3 hour sample paper for cbse class 12 board exam. This covers all chapters of ncert 12th math book. For more such papers visit clay6.com/papers/.
This presentation looks at relations, functions, sequences and automaton theory and finishes up with binary and sequential algorithm script for searches in psuedocode.
This is a 3 hour sample paper for cbse class 12 board exam. This covers all chapters of ncert 12th math book. For more such papers visit clay6.com/papers/.
1. understand the terms function, domain, range, one-one function,inverse function and composition of functions
2. identify the range of a given function in simple cases, and find the
composition of two given functions
3. determine whether or not a given function is one-one, and find the inverse of a one-one function in simple cases
4. illustrate in graphical terms the relation between a one-one function and its inverse.
1. understand the terms function, domain, range, one-one function,inverse function and composition of functions
2. identify the range of a given function in simple cases, and find the
composition of two given functions
3. determine whether or not a given function is one-one, and find the inverse of a one-one function in simple cases
4. illustrate in graphical terms the relation between a one-one function and its inverse.
Extended network and algorithm finding maximal flows IJECEIAES
Graph is a powerful mathematical tool applied in many fields as transportation, communication, informatics, economy, in ordinary graph the weights of edges and vertexes are considered independently where the length of a path is the sum of weights of the edges and the vertexes on this path. However, in many practical problems, weights at a vertex are not the same for all paths passing this vertex, but depend on coming and leaving edges. The paper develops a model of extended network that can be applied to modelling many practical problems more exactly and effectively. The main contribution of this paper is algorithm finding maximal flows on extended networks.
I am Charles B. I am an Algorithm Assignment Expert at programminghomeworkhelp.com. I hold a Ph.D. in Programming, Texas University, USA. I have been helping students with their homework for the past 6 years. I solve assignments related to Algorithms.
Visit programminghomeworkhelp.com or email support@programminghomeworkhelp.com.You can also call on +1 678 648 4277 for any assistance with Algorithm assignments.
This powerpoint presentation gives information regarding functions. Designed or grade 11 studens studying general mathematics 11. You can use this presentation to present your lessons in grade 11 general mathematics or even use this on your lesson in grade 10 mathematics about polynomial functions
A full comprehensive instruction research paper, on how to build an online ordering system, in Java. Goes in phases and also shows how to create object orientated programming files, which the primary program can pull from.
CSS-454 information Security Assurance CAPSTONEMark Simon
This paper fully encompasses information Security Assurance. As a CAPSTONE paper, will will provide great insight as to the structure and content of what a CAPSTONE paper will look like, in mechanics, literature and content.
This research paper is a full mock-up and instruction of how to create a network system for a facility. Mine was on a City Hall. Systems Analysis-Design and integration covers the full system development life cycle, from cradle to grave.
This is the full work book for introduction of Programming Logic. I am not saying to just pull off of this work and use it as your own. Use it as a reference to ensure you are doing your work correctly. All information is 100% accurate and holds an "A" in the class.
A controversial paper on what created the next potential depression of 2008. Many hours was conducted researching the causes of the economic collapse in 2008. The question might be asked, could we see this happen again?
What goes into the body as food sources can really make a difference depending on what you eat. I devised this slide to show the different components of food use in the body.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
2. Set Theory Revisited
• Look up a roulette wheel diagram. The following sets are definedA = the set of red numbers D = the set of even numbers
B = the set of black numbers E = the set of odd numbers
C = the set of green numbers F = {1,2,3,4,5,6,7,8,9,10,11,12}
For the purposes of this presentation, we will be using the American
Roulette Wheel as we are in America.
3. • The table of numbers to the right are for the American Roulette.
We will take from here to develop our sets.
• Red #’s “A” = {1, 3, 5, 7, 9, 12, 14, 16, 18, 21, 23, 25, 27, 28, 30, 32,
34, 36}
• Black #’s “B” = {2, 4, 6, 8, 10, 11, 13, 15, 17, 19, 20, 22, 24, 26, 29,
31, 33, 35}
• Green #’s “C” = {0, 00}
• Even #’s “D” = {2, 4, 6, 8, 10, 12, 14, 16, 18, 20, 22, 24, 26, 28, 30,
32, 34, 36}
• Odd #’s “E” = {1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 39, 31,
33, 35}
• Set “F” = {1,2,3,4,5,6,7,8,9,10,11,12}
Now that we a have assessed the determinant sets, we will
start assessing each of the below “U” – Unions and “∩” –
Intersections for each required configuration.
They are as follows :
• (A∪B) (A∩D) (B∩C) (C∪E) (B∩F) (E∩F)
7. Part II: Relations, Functions, and Sequences
The implementation of the program that runs the game involves testing. One of the necessary
tests is to see if the simulated spins are random. Create an n-ary relation, in table form, that
depicts possible results of 10 trials of the game. Include the following results of the game:
Number
Color
Odd or even (note: 0 and 00 are considered neither even nor odd.)
Trial # (P/K] Number Color Odd or Even
1 6 Black Even
2 33 Black Odd
3 12 Red Even
4 16 Black Even
5 10 Red Even
6 25 Red Odd
7 4 Black Even
8 36 Red Even
9 11 Black Odd
10 27 Red Odd
11 32 Red Even
8. Part 4: Automata Theory, Grammars and Languages
INSTRUCTIONS
• A gate with three rotating arms at waist height is used to control access to a
subway in New York city. Initially, the arms of the gate are locked preventing
customers from passing through. Unlocking the arms requires depositing a token
in a slot, which allows the arms to rotate to a complete turn which allows one
customer to push through and enter. Once the customer passes through the arms
are then locked again until another customer deposits another token in the slot.
• The gate has two states: LOCKED and UNLOCKED. It also has two inputs: TOKEN
and PUSH. When the gate is locked, pushing the arm of the gate has no effect
regardless of how many times it is pushed. The input TOKEN changes the state
from LOCKED to UNLOCKED. When the gate is in the UNLOCKED state, inserting
additional tokens has no effect on the state. But when in the UNLOCKED state, a
PUSH input changes the state to LOCKED.
• (i). Provide a transition table showing each state, the inputs, and the resulting
new states for each input
• (ii). Represent your transition table into a digraph (transition diagram)
9. Part - 4: Automata Theory,
Grammars and Languages
START
STATE
INPUT NEXT STATE OUTPUT
LOCKED
TOKEN INSERTED UNLOCK Turn Stile OPEN
PUSH BAR LOCKED Turn Stile LOCKED
UNLOCK
TOKEN INSERTED UNLOCK Turn Stile LOCKED
PUSH LOCKED After Turn Stile
Pushed / Locked
• Provided is a transition table showing each state, the inputs, and the resulting
new states and output for each input
• Below is a representation of a transition table into a digraph (transition diagram)
LOCKED UN
LOCKEDPush Coin
Push
Coin
10. Part - 4: Automata Theory,
Grammars and Languages
• Here is a context-free grammar that can be used to generate algebraic
expressions via the arithmetic operators (addition, subtraction, multiplication,
and division), in the variables p, q, and r. The letter E stands for expression:
• Rule 1: E —› p
• Rule 2: E —› q
• Rule 3: E —› r
• Rule 4: E —› E + E
• Rule 5: E —› E – E
• Rule 6: E —› E X E
• Rule 7: E —› E/E
• Rule 8: E —›(E)
Use the above grammar to derive the string given by the mathematical expression E
= (p + q) X p – r X p/(q + q)
11. Grammars and Languages - Continued
E = (p + q) X p – r X p/(q + q)
E ( the start symbol)
E – E ( by rule 5, applied to the middle)
E – E * E (by rule 6, applied to the rightmost E)
(E) * E – E * E (by rule 6, applied to the leftmost E)
(E) * E – E * E/(E) (By Rule 8, applied to the rightmost E)
(E + E) * E – E * E/(E) (By Rule 4 of the leftmost E)
(E + E) * E – E * E/(E + E) (By Rule 4 applied to the rightmost E)
(p + E) * E – E * E/(E + E) ( by rule 1 , by the leftmost E )
(p + q) * E – E * E/(E + E) ( by rule 2 , by the leftmost E )
(p + q) * p – E * E/(E + E) ( by rule 1 , by the leftmost E )
(p + q) * p – E * E/(E + q) ( by rule 2 , by the rightmost E )
(p + q) * p – E * E/(q + q) ( by rule 2 , by the rightmost E )
(p + q) * p – E * p/(q + q) ( by rule 1 , by the rightmost E )
(p + q) * p – r * p/(q + q) ( by rule 3 , by the rightmost E )
12. Part - 4: Continued
Automata Theory, Grammars and Languages
E
/ |
E - E
/ | / |
E * E E * E
/| | | /|
( E ) p r E / E
/| | /|
E + E p ( E )
| | /|
p q E + E
| |
q q
(E + E) * E – E * E/(E + E)
to
(p + q) * p – r * p/(q + q)
To the right is my attempt
to accomplish the sparse
tree configuration. As is
seen, the initial inner
variables break down
pretty easily, but the
outer configurations take
a little more break down
to accomplish the sparse
tree.
13. Part -V Algorithm (Sequential) Search
This algorithm finds an object “x” (number, string) from a
given set A where |A| = n.
Input: x, A, n
Output: index // location of x in set A
(array A)
seq_search(x, A, n)
{ i = 1
while (i <= n and x ~= A(i)) i = i + 1
if (i <= n) then index = i
else index = 0
return index
}
14. Algorithmic Sequential (Linear)
Search
Input: x = 19, A = {22, 21, 9, 4, 16, 2, 10, 14, 20, 31, 26, 19, 17, 28, 8, 13}, n = 16
It took 13 steps (same as n). It could have been as much as 16 and as little as 2. The
worst case seems to be n + 1 steps to find x.
Step 1: test: 1 < 16 and 19 ~= 22 true i = 2 Step 9: test:9 < 16 and 19 ~= 20 true I =10
Step 2: test: 2 < 16 and 19 ~= 21 true i = 3 Step 10: test: 10 < 16 and 19 ~= 31 true i = 11
Step 3: test: 3 < 16 and 19 ~= 9 true i = 4 Step 11: test: 11 < 16 and 19 ~= 26 true i = 12
Step 4: test: 4 < 16 and 19 ~= 4 true i = 5 Step 12: test: 12 < 16 and 19 ~= 19 false i = 13
Step 5: test: 5 < 16 and 19 ~= 16 true i = 6 Step 13: test: 12 < 16 true index = 19
Step 6: test: 6 < 16 and 19 ~= 2 true i = 7
Step 7: test: 7 < 16 and 19 ~= 10 true i = 8
Step 8: test: 8 < 16 and 19 ~= 14 true i = 9
15. This algorithm performs a binary search to find “x” in a
set – (A). The algorithm determines the location of “x”.
Using the same set in the sequential search we will run
the binary algorithm.
Input: x, A, n
Output: index // location of x in A
Binary search (x, A, n)
{ i = 1, j = n
while ( i < j)
m =int[(i + j)/2]
if (x > A(m)) then i = m + 1
else j = m
if x = A(i) then index = i
else index = 0
}
16. Search for 19 in the set A = {2,4,8, 9, 10, 13, 14, 16, 17, 19, 20, 21, 22, 26, 28, 31}
Sorted list = {2, 4, 8, 9, 10, 13, 14, 16, 17, 19, 20, 21, 22, 26, 28, 31}, n = 16
2 4 8 9 10 13 14 16 17 19 20 21 22 26 28 31
Int[(15 + 1)/2] = 8th cell ↑ 16 < 19 1st set
2 4 8 9 10 13 14 16 17 19 20 21 22 26 28 31
Int[( 7 + 1)/2] = 4th cell ↑ 21 > 19 2nd set
2 4 8 9 10 13 14 16 17 19 20 21 22 26 28 31
Int[(3 + 1)/2] = 2nd cell ↑ 19 = 19 index found
It took 3 steps for index found (same as n). It could have been as much as 4 and as
little as 3. The worst case seems to be int(n+1/2) steps to find x. Therefore, a
binary search is quicker in loop search then a sequential search.
17. INSTRUCTIONS
• Suppose an algorithm that processes a data set of size 8 has a runtime of 72.
The same algorithm has a runtime of 110 when applied to a data set of size 10;
and when applied to a data set of size 20, it has a runtime of 420. Using big-O
notation, state the runtime for this algorithm for the general case of a data set
of size n.
• Suppose you develop an algorithm that processes the first element of an array
(length of n), then processes the first 2 elements, then the first 3 elements, and
so on, until the last iteration of a loop, when it processes all elements. Thus, if n
= 4, the runtime would be 1 + 2 + 3 + 4 = 10.
– Create a table that depicts the runtime for arrays of length 1 to 10. Would
you expect the general runtime to be O(n), O(n2), O(n3), or some other
function of n? Explain
18. For size 8 the run time is 72 which is for one element. It results in 72/8 = 9.
(9) is the element runtime.
8 = (8 * 8) + 8 = 72
For size 10, the run time is 110 which is for one element it is 110/10 = 11 ,
which has incremented by 2 for an increment of 2 numbers of elements.
In this case the element runtime is (11).
10 = (10 * 10) + 10 = 110
For size 20, the run time is 420, is applied to one element it will be 420/20 = 21,
which is incremented by 10 again for an increment of 10 additional elements.
In this case the element runtime is (21)
20 = (20 * 20) + 20 = 420
Now following this trend the value is supposed to be as follows:
Element Formula Value O = int(n2) + n = r.
The runtime of the above computation in Big-Order Notation will be O = int(n2) + n
19. • Suppose you develop an algorithm that processes the first element of an array (length
of n), then processes the first 2 elements, then the first 3 elements, and so on, until the
last iteration of a loop, when it processes all elements. Thus, if n = 4, the runtime would
be 1 + 2 + 3 + 4 = 10.
• SOLUTION: The binary search formula would be Big Oh notation = 𝑂(𝑛 ∗
𝑛+1
2
)
• The table below shows the progression of the algorithm to get the solution.
• N/value = runtime value
The “N” runtime value would be = 55 at 10
1 = 1 = 1
2 = 1+2 = 3
3 = 1+2+3 = 6
4 = 1+2+3+4 = 10
5 = 1+2+3+4+5 = 15
6 = 1+2+3+4+5+6 = 21
7 = 1+2+3+4+5+6+7 = 28
8 = 1+2+3+4+5+6+7+8 = 36
9 = 1+2+3+4+5+6+7+8+9 = 45
10 = 1+2+3+4+5+6+7+8+9+10 = 55
By utilizing the above equation 𝑶(𝒏 ∗
𝒏+𝟏
𝟐
) the value may be plugged in to represent the 10 tables
and outcomes. Therefore, it would NOT just fall into O(n), O(n2) or O(n3) but as modification of
O(n).