1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
3 years ago
5

Use a recursion tree to determine a good asymptotic upper bound on the recurrence T(n) = 4T(n/2 + 2) + n. Use the substitution m

ethod to verify your answer.
Computers and Technology
1 answer:
Shalnov [3]3 years ago
7 0

Answer:

Follows are the solution to this question:

Explanation:

The scale of the subproblem for a node is \frac{n}{2^i}  at depth.  

The tree then has lg n + 1 and 4^{lg n} = n^2leaves.  

Complete costs for all depth I nodes for I = 0. 1 , 2, ......, lg n-1 is:4^i ( \frac{n}{2^i}+ 2 ) = 2^i n + 2\times  4^i.

T(n)= \sum_{ i = 0}\lg n - 1( 2^i n + 2 . 4^i )+ \Theta  (n^2)\\\\

        = \sum_ {i = 0} \lg n - 1 2^i n + \sum_{i = 0} \lg n - 12 \times  4^i + \Theta  (n^2)\\\\= [ \frac{ 2\lg n - 1}{ 2 - 1} ]n + 2 \times [ \frac{ 4\lg n - 1}{ 4 - 1} ]n + \Theta  (n^2)\\\\= ( 2\lg n - 1) n] + (\frac{2}{3})( 4\lg n - 1)+ \Theta (n^2)\\\\= (n-1)n - \frac{2}{3} (n^2 -1) +\Theta  (n^2)\\\\= \Theta  (n2)\\

verfify the value:

\to  T(n) \leq c (n^2 - dn) \\\\T(n) = T(n) = 4T((\frac{n}{2}) + 2) + n \\\\ \leq 4c [ ((\frac{n}{2}) + 2)2 - d((\frac{n}{2}) + 2) ]+ n \\\\ \leq 4c  [ (\frac{n^2}{4} + 2n + 4) - \frac{dn}{2} - 2d)]+ n \\\\\leq cn2 + 8cn + 16c - 2cdn - 8cd + n\\\\\leq cn2 -cdn +  8cn + 16c - cdn - 8cd + n\\\\\leq c(n2 -dn) - (cd- 8c - 1)n - (d - 2). 8c\\\\\leq c(n2 -dn),\\\\

Where there is the last stage for  \to cd - 8c -1 \geq 0.

You might be interested in
The shortcut key combination to cut text is. Ctrl+C Ctrl+X Shift+V Shift+Y​
Gemiola [76]

Answer:

Ctrl + X

Explanation:

5 0
4 years ago
Read 2 more answers
How can you tell that a website is not objective?
attashe74 [19]
Look at the website address for clues to help you asses the objectivity (and authority) of a website.
5 0
3 years ago
Read 2 more answers
Add the following binary numbers. 101110010 and 111001101
bonufazy [111]

Answer:

101110010 is 370 in decimal (base 10, what we usually do math in) and 111001101 is 461 in decimal. The sum of 370 and 461 is 831, and 831 is binary is 1100111111. So, if you want the answer in decimal it is \boxed{831_{10}} and if you want the answer in binary, it is \boxed{1100111111_2}.

4 0
3 years ago
Which two cisco products are equipped with the integrated connector to the cisco cws service? (choose two. )
jeka94

The cisco products that are equipped with the integrated connector to the cisco cws service include Cisco ESA and Cisco WSA.

<h3>What is an integrated connector?</h3>

It should be noted that an integrated connector are the components that are offered to connect with applications and data sources.

In this case, the cisco products that are equipped with the integrated connector to the cisco cws service include Cisco ESA and Cisco WSA.

Learn more about integrated connection on:

brainly.com/question/24196479

#SPJ12

8 0
2 years ago
Help me ASAP! Please and thank you :)
KengaRu [80]

step 1: b

step 2: c

step 3: a

step 4: d

6 0
3 years ago
Other questions:
  • Rapid development programming languages eliminate the possibility of having bugs in code. True or False
    8·1 answer
  • Compressing a file is also called
    9·2 answers
  • What nuclear remediation site had their computers wiped clean by notpetya?
    15·1 answer
  • ____ is a consistent relational database state in which every foreign key value also exists as a primary key value.​ a. ​ Refere
    11·1 answer
  • What is the relationship between data, information, business intelligence, and knowledge?
    10·1 answer
  • A file with a com extension is most likely to be a(n) ___ file.
    13·2 answers
  • Lists and Procedures Pseudocode Practice For each situation, provide a pseudocoded algorithm that would accomplish the task. Mak
    8·1 answer
  • You want to make access to files easier for your users. Currently, files are stored on several NTFS volumes such as the C:, D:,
    14·1 answer
  • How does the issue of cybersecurity relate to the internet of things?.
    5·1 answer
  • Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is beli
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!