The document discusses recurrence relations and algorithms for solving recurrence relations. It begins by defining what a recurrence relation is and provides some examples of natural functions that can be expressed as recurrences. It then discusses different methods for solving recurrence relations, including iteration methods like backward substitution, substitution methods, and recursion tree methods. Specific examples are provided to demonstrate how to apply these different solving methods to common recurrence relations.
In computer science, divide and conquer is an algorithm design paradigm based on multi-branched recursion. A divide-and-conquer algorithm works by recursively breaking down a problem into two or more sub-problems of the same or related type until these become simple enough to be solved directly.
Divide and Conquer Algorithms - D&C forms a distinct algorithm design technique in computer science, wherein a problem is solved by repeatedly invoking the algorithm on smaller occurrences of the same problem. Binary search, merge sort, Euclid's algorithm can all be formulated as examples of divide and conquer algorithms. Strassen's algorithm and Nearest Neighbor algorithm are two other examples.
it contains the detail information about Dynamic programming, Knapsack problem, Forward / backward knapsack, Optimal Binary Search Tree (OBST), Traveling sales person problem(TSP) using dynamic programming
In computer science, divide and conquer is an algorithm design paradigm based on multi-branched recursion. A divide-and-conquer algorithm works by recursively breaking down a problem into two or more sub-problems of the same or related type until these become simple enough to be solved directly.
Divide and Conquer Algorithms - D&C forms a distinct algorithm design technique in computer science, wherein a problem is solved by repeatedly invoking the algorithm on smaller occurrences of the same problem. Binary search, merge sort, Euclid's algorithm can all be formulated as examples of divide and conquer algorithms. Strassen's algorithm and Nearest Neighbor algorithm are two other examples.
it contains the detail information about Dynamic programming, Knapsack problem, Forward / backward knapsack, Optimal Binary Search Tree (OBST), Traveling sales person problem(TSP) using dynamic programming
In computer science, divide and conquer (D&C) is an algorithm design paradigm based on multi-branched recursion. A divide and conquer algorithm works by recursively breaking down a problem into two or more sub-problems of the same (or related) type, until these become simple enough to be solved directly. The solutions to the sub-problems are then combined to give a solution to the original problem.
In computer science, merge sort (also commonly spelled mergesort) is an O(n log n) comparison-based sorting algorithm. Most implementations produce a stable sort, which means that the implementation preserves the input order of equal elements in the sorted output. Mergesort is a divide and conquer algorithm that was invented by John von Neumann in 1945. A detailed description and analysis of bottom-up mergesort appeared in a report by Goldstine and Neumann as early as 1948.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
1. Computer Algorithms
Design and Analysis
UNIT-I
Recurrence Relations
Dr. N. Subhash Chandra,
Professor, CVRCE
Source: Web resources ,Computer Algorithms by Horowitz, Sahani & Rajasekaran.
Algorithm by Coreman
3. Recurrence Relations (1/2)
• A recurrence relation is an equation which is
defined in terms of itself with smaller value.
• Why are recurrences good things?
• Many natural functions are easily expressed as
recurrences:
• an = a n-1 + 1, a1 = 1 --> an = n (polynomial)
• an = 2a n-1 ,a1 = 1 --> an = 2n (exponential)
• an = na n-1 ,a1 = 1 --> an = n! (weird function)
• It is often easy to find a recurrence as the solution
of a counting problem
25/07/2020 3
4. Recurrence Relations (2/2)
• In both, we have general and boundary conditions,
with the general condition breaking the problem
into smaller and smaller pieces.
• The initial or boundary condition terminate the
recursion.
25/07/2020 4
5. Recurrence Equations
• A recurrence equation defines a function, say T(n). The function is
defined recursively, that is, the function T(.) appear in its definition.
(recall recursive function call). The recurrence equation should have a
base case.
For example:
T(n) = T(n-1)+T(n-2), if n>1
1, if n=1 or n=0.
base case
for convenient, we sometime write the recurrence equation as:
T(n) = T(n-1)+T(n-2)
T(0) = T(1) = 1.
25/07/2020 5
8. Simplications:
• There are two simplications we apply that won't
affect asymptotic analysis
• Ignore floors and ceilings (justification in text)
• Assume base cases are constant, i.e., T(n) = Q(1) for n
small enough
25/07/2020 8
10. Iteration Method
T(n) = c + T(n/2)
T(n) = c + T(n/2)
= c + c + T(n/4)
= c + c + c + T(n/8)
Assume n = 2k k=log
2
n
T(n) = c + c + … + c + T(1)
= clog2n + T(1)
= Θ(lgn)
10
k times
T(n/2) = c + T(n/4)
T(n/4) = c + T(n/8)
25/07/2020
11.
0)1(
00
)(
nnsc
n
ns
• s(n) =
c + s(n-1)
c + c + s(n-2)
2c + s(n-2)
2c + c + s(n-3)
3c + s(n-3)
…
kc + s(n-k) = ck + s(n-k)
• What if k = n?
• s(n) = cn + s(0) = cn
25/07/2020 11
12. Iteration Method
Example: T(n) = 4T(n/2) + n
T(n) = 4T(n/2) + n /**T(n/2)=4T(n/4)+n/2
= 4(4T(n/4)+n/2) + n /**simplify**/
= 16T(n/4) + 2n + n /**T(n/4)=4T(n/8)+n/4
= 16(4T(n/8+n/4)) + 2n + n /**simplify**/
= 64(T(n/8) +4n+2n+n
= 4log n T(1)+ … + 4n + 2n + n /** #levels = log n **/
= c4log n + /** convert to summation**/
/** alog b = blog a **/
k1-nlog
0k
2n
)
12
12
(
log
4log
n
ncn
25/07/2020 12
14. T(n – 1) = T(n – 2) + n – 1
Substituting (2) in (1) T(n) = T(n
– 2) + n – 1+ n
T(n – 2) = T(n – 3) + n – 2
Substituting (4) in (3)
T(n) = T(n – 3) + n – 2 + n – 1 + n
General equation
…..(2)
…..(3)
…..(4)
…..(5)
T(n) = T(n – k) + (n – (k – 1)) + n – (k – 2) + n – (k – 3) + n – 1 + n
…..(6)
T(1) =1
n – k =1
k = n – 1
Substituting (7) in (6)
T(n) = T(1) + 2 + 3 + ….. n – 1 + n
=1 + 2 + 3 + ….. + n
= n(n + 1)/2 T(n) = O( n2
)
…..(7)
25/07/2020 14
15. T(n) = 1
Solution:
T(n) = T(n – 1) + b
T(n – 1) = T(n – 2) + b
Substituting (2) in (1)
T(n) = T(n – 2) + b + b
T(n) = T(n – 2) + 2b
T(n – 2) = T(n – 3) + b
Substituting (4) in (3)
T(n) = T(n – 3) + 3b
General equation T(n)
= T(n – k) + k.b T(1)
= 1
n – k = 1 k = n – 1
T(n) = T(1) + (n – 1) b
= 1 + bn – b T(n) =
O(n)
n = 1
…..(1)
…..(2)
…..(3)
…..(4)
2. T(n) = T(n – 1) + b n > 1
25/07/2020 15
16. 3. T(n) = 2 T(n – 1) + b
T(n) = 1
Solution:
T(1) = 1
T(2) = 2.T(1) + b
= 2 + b
= 21
+ b
T(3) = 2T(2) + b
= 2(2 + b) + b
= 4 + 2b + b
= 4 + 3b
= 22
+ (22
– 1)b T(4) =
2.T(3) + b
= 2(4 + 3b) + b
= 8 + 7b
= 23
+ (23
–1)b
General equation
T(k) = 2k–1
+ (2k–1
– 1)b
.
n > 1
n = 1
25/07/2020 16
17. .
.
T(n) = 2n–1
+ (2n–1
– 1)b
T(n) = 2n–1
(b + 1) – b
= 2n
(b + 1)/2 – b Let c
= (b + 1)/2 T(n) = c 2n
– b
= O(2n
)
4. T(n) = T(n/2) + b
T(1) = 1
Solution:
T(n) = T(n/2) + b
T(n/2) = T(n/4) + b
Substituting (2) in (1)
T(n) = T(n/4) + b + b
= T(n/4) + 2b
T(n/4) = T(n/8) + b
n > 1
n = 1
…..(1)
…..(2)
…..(3)
…..(4)
25/07/2020 17
18. Substituting (4) in (3)
T(n) = T(n/8) + 3b
= T(n/23
) + 3b
General equation
T(n) = T(n/2k
) + kb
T(1) = 1
n/2k
= 1
2k
= n
K = log n
Substituting (6) in (5)
T(n) = T(1) + b.log n
= 1 + b log n T(n) =
O(log n)
…..(5)
…..(6)
25/07/2020 18
19. The substitution method
1. Guess a solution
2. Use induction to prove that the
solution works
1925/07/2020
20. Substitution method
• Guess a solution
• T(n) = O(g(n))
• Induction goal: apply the definition of the asymptotic notation
• T(n) ≤ d g(n), for some d > 0 and n ≥ n0
• Induction hypothesis: T(k) ≤ d g(k) for all k < n
• Prove the induction goal
• Use the induction hypothesis to find some values of the
constants d and n0 for which the induction goal holds
2025/07/2020
21. Example: Binary Search
T(n) = c + T(n/2)
• Guess: T(n) = O(lgn)
• Induction goal: T(n) ≤ d lgn, for some d and n ≥ n0
• Induction hypothesis: T(n/2) ≤ d lg(n/2)
• Proof of induction goal:
T(n) = T(n/2) + c ≤ d lg(n/2) + c
= d lgn – d + c ≤ d lgn
if: – d + c ≤ 0, d ≥ c
2125/07/2020
22. Example 2
T(n) = T(n-1) + n
• Guess: T(n) = O(n2)
• Induction goal: T(n) ≤ c n2, for some c and n ≥ n0
• Induction hypothesis: T(k-1) ≤ c(k-1)2 for all k < n
• Proof of induction goal:
T(n) = T(n-1) + n ≤ c (n-1)2 + n
= cn2 – (2cn – c - n) ≤ cn2
if: 2cn – c – n ≥ 0 c ≥ n/(2n-1) c ≥ 1/(2 – 1/n)
• For n ≥ 1 2 – 1/n ≥ 1 any c ≥ 1 will work
2225/07/2020
23. Example 3
T(n) = 2T(n/2) + n
• Guess: T(n) = O(nlgn)
• Induction goal: T(n) ≤ cn lgn, for some c and n ≥ n0
• Induction hypothesis: T(n/2) ≤ cn/2 lg(n/2)
• Proof of induction goal:
T(n) = 2T(n/2) + n ≤ 2c (n/2)lg(n/2) + n
= cn lgn – cn + n ≤ cn lgn
if: - cn + n ≤ 0 c ≥ 1
2325/07/2020
24. Changing variables
n
• Rename: m = lgn n = 2m
T (2m) = 2T(2m/2) + m
• Rename: S(m) = T(2m)
S(m) = 2S(m/2) + m S(m) = O(mlgm)
(demonstrated before)
T(n) = T(2m) = S(m) = O(mlgm)=O(lgnlglgn)
Idea: transform the recurrence to one that you have
seen before
24
T(n) = 2T( ) + lgn
25/07/2020
25. Recursion Tree
• Evaluate: T(n) = T(n/2) + T(n/2) + n
• Work copy: T(k) = T(k/2) + T(k/2) + k
• For k=n/2, T(n/2) = T(n/4) + T(n/4) + (n/2)
• [size|cost]
25/07/2020 25
26. Recursion-tree method
• A recursion tree models the costs (time) of
a recursive execution of an algorithm.
• The recursion tree method is good for
generating guesses for the substitution
method.
• The recursion-tree method can be
unreliable.
• The recursion-tree method promotes
intuition, however.
25/07/2020 26
27. Recursion Tree
• To evaluate the total cost of the recursion tree
Sum all the non-recursive costs of all nodes
= Sum (rowSum(cost of all nodes at the same depth))
• Determine the maximum depth of the recursion tree:
For our example, at tree depth d
the size parameter is n/(2d)
the size parameter converging to base case, i.e. case 1
such that, n/(2d) = 1,
d = lg(n)
The row Sum for each row is n
• Therefore, the total cost, T(n) = n lg(n)
25/07/2020 27
42. Let k th steps, it moves up to n/3k
It moves until 1
The total sum up to kth step =kn
If n/3k = 1
n = 3k
k= logn
Total time taken =nlogn
25/07/2020 42
43. The Master Method
• Based on the Master theorem.
• “Cookbook” approach for solving recurrences of the
form
T(n) = aT(n/b) + f(n)
• a 1, b > 1 are constants.
• f(n) is asymptotically positive.
• n/b may not be an integer, but we ignore floors and ceilings.
• Requires memorization of three cases.
25/07/2020 43
44. The Master Theorem
Theorem 4.1
Let a 1 and b > 1 be constants, let f(n) be a function, and
Let T(n) be defined on nonnegative integers by the recurrence
T(n) = aT(n/b) + f(n), where we can replace n/b by n/b or n/b.
T(n) can be bounded asymptotically in three cases:
1. If f(n) = O(nlogba–) for some constant > 0, then T(n) = Q(nlogba).
2. If f(n) = Q(nlogba), then T(n) = Q(nlogbalg n).
3. If f(n) = (nlogba+) for some constant > 0,
and if, for some constant c < 1 and all sufficiently large n,
we have a·f(n/b) c f(n), then T(n) = Q(f(n)).
25/07/2020 44
45. Master Method – Examples
• T(n) = 16T(n/4)+n
• a = 16, b = 4, nlogba = nlog416 = n2.
• f(n) = n = O(nlogba-) = O(n2- ), where = 1 Case 1.
• Hence, T(n) = Q(nlogba ) = Q(n2).
• T(n) = T(3n/7) + 1
• a = 1, b=7/3, and nlogba = nlog 7/3 1 = n0 = 1
• f(n) = 1 = Q(nlogba) Case 2.
• Therefore, T(n) = Q(nlogba lg n) = Q(lg n)
25/07/2020 45
46. Master Method – Examples
• T(n) = 3T(n/4) + n lg n
• a = 3, b=4, thus nlogba = nlog43 = O(n0.793)
• f(n) = n lg n = (nlog43 + ) where 0.2 Case 3.
• Therefore, T(n) = Q(f(n)) = Q(n lg n).
• T(n) = 2T(n/2) + n lg n
• a = 2, b=2, f(n) = n lg n, and nlogba = nlog22 = n
• f(n) is asymptotically larger than nlogba, but not
polynomially larger. The ratio lg n is asymptotically less than
n for any positive . Thus, the Master Theorem doesn’t
apply here.
25/07/2020 46
47. Master Method – Examples
T(n) = 9T(n/3) + n
a=9, b=3, f(n) = n
nlogba = nlog39 = Q(n2)
Since f(n) = n, f(n)< nlogba
Case 1 applies:
T(n) Qnlogb a
when f (n) Onlogb a
Thus the solution is T(n) = Q(n2)
25/07/2020
48. Problems on The Master Method
T(n) = 4T(n/2) + n2
a = 4, b = 2, f(n)=n2
nlogba = n2
Since, f(n)=n2
Thus, f(n)= nlogba
Case 2 applies:
f (n) = Q(n2logn)
Thus the solution is T(n) = Q(n2logn).
25/07/2020
49. Master Method – Examples
Ex. T(n) = 4T(n/2) + n3
a = 4, b = 2, f(n)=n3 nlogba
= n2; f (n) = n3.
Since, f(n)=n3 Thus, f(n)> nlogba
Case 3 applies:
f (n) =(n3)
and 4(n/2)3 cn3 (regulatory condition) for c =1/2.
T(n) = Q(n3).
25/07/2020
50. 1. T(n) = 4T(n/2) + n
T(n) = 1
n > 1
n = 1
From the above recurrence relation we obtain
a = 4, b = 2, c = 1, d = 1, f(n) = n
logba = log24 = log222
= 2 log22 = 2
nlog a
= n2
b
Master Method – Examples
25/07/2020 50
51. f(n) = O(n2
)
n = O(n2
) It will fall in Case 1. So that
T(n) = (n2
)
2. T(n) = 4T(n/2) + n2
n > 1 T(n) = 1 n = 1
From the above recurrence relation we obtain a = 4, b = 2, c = 1, d = 1, f(n) =
n2
nlog a
= n2
b
f(n) = n2
) n2
= (n2
)
It will fall in case 2.
T(n) = (n2
log n)
3. T(n) = 4T(n/2) + n3
T(n) =1
n > 1
n = 1
From the above recurrence relation we obtain
a = 4, b = 2, c = 1, d = 1, f(n) = n3
nlog a
= n3
b
f(n) = Ω(nlog
b
a + €)
Master Method – Examples
25/07/2020 51
56. Some Common Recurrence Relation
Recurrence Relation Complexity Problem
T(n) = T(n/2) + c O(logn) Binary Search
T(n) = 2T(n-1) + c O(2n) Tower of Hanoi
T(n) = T(n-1) + c O(n) Linear Search
T(n) = 2T(n/2) + n O(nlogn) Merge Sort
T(n) = T(n-1) + n O(n2) Selection Sort,
Insertion Sort
T(n) = T(n-1)+T(n-2) + c O(2n) Fibonacci Series
25/07/2020