1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
2 years ago
8

Random Walker Collisions In lecture, we saw how to model the behavior of a random walker on a 2D grid using a Monte Carlo simula

tion. In this problem, we will investigate collisions between two of these random walkers. Specifically, use your simulation to track the distances of the two walkers until they collide. 1. Start by writing a MATLAB script to simulate the path that the single random walker A takes on an 11 x 11 grid of tiles. Let this random walker use a random compass as shown in class. Thus, the probability p of moving in the North, East, South, and West directions is given by 0.2. The remaining probability is the one used to stay put. If the random walker tries to move "past" one of the boundaries on its turn, his position does not change (you can think of this as a particle bumping into a wall and staying still). Choose a random tile to let the random walker A start his walk. Lastly, write a function to update the position of the random walker A. The function must use exactly the function header shown below, i.e. the function name and number and ordering of inputs and outputs must be followed exactly. function (x,y) = Randwalk_2D (x0, y0, BC) Here, x0 and y0 are the initial positions of the random walker, BC is the array of boundary conditions, and x and y are the updated positions of the random walker. 2. Add the random walker B to your simulation who moves according to its own randomly generated values using the same compass as the random walker A in Part 1. Let the random walker B start his walk on the tile that is furthest away from the start tile of walker A. At each iteration, both walkers move simultaneously to an adjacent tile using the rules outlined in Part 1. Continue updating the position of both walkers until a collision occurs (or until the maximum number of iterations, which is set to 1000, is reached). More precisely, a collision occurs when both random walkers occupy the same tile after both have completed their move. Furthermore, a collision occurs when both random walkers are next to each other and move to the other one's tile. Note that in this instance, the collision appears on their way, but both random walkers will end up on tiles that are again next to each other. In other words, collision also appears when their paths cross. 3. Track the movement of each random walker by storing their positions in four 1D-arrays associated with their x- and y-positions in the grid. After the simulation, calculate for each iteration the distance between the random walkers A and B, and plot the results vs. the number of iterations to see when the two random walkers A and B came close to each other and when they were far away from each other.
Computers and Technology
1 answer:
vlabodo [156]2 years ago
6 0

Answer:

dang how long did i take for you to wright all this and that lecture was cool

Explanation:

You might be interested in
How many slides should a presentation include?
artcher [175]
D. You only really need important information in a presentation.
4 0
3 years ago
Read 2 more answers
3. You are a network administrator responsible for all network platforms and services. The Teta Company currently has only one b
solniwko [45]

Answer:

1. Wired networks may give the appearance of a busy office full of the latest equipment, but in reality, wires can be an inefficient networking medium. They can limit signal strength as well as make it more difficult to expand and reorganize your network configuration.  Wireless networking is a viable and affordable alternative that offers the benefits of making your environment more flexible. A wireless infrastructure allows you to effortlessly reconfigure your office space as your company grows and changes, easily extend connectivity and also allows employees to be mobile more easily.

2. Review the advantages and consider the benefits to your organization:

Reduced cost of installation. It may be significantly less expensive to install wireless access points compared to wiring your office with Ethernet capabilities.

Flexibility. If you regularly expand or reorganize your office space, or need to accommodate a variety of network configurations, the rapid transition time from one configuration to another that wireless provides can help reduce your network downtime. In addition, you won't have to incur the costs associated with physically rewiring office space.

Convenient information access. With wireless, you'd have the ability to extend access to key information to anyone on your staff, from anywhere in the office, even when they aren't physically connected to your wired local area network (LAN) connection. Do members of your staff regularly work away from their desks or stations, but could benefit from anytime, anywhere access to important data? Could you improve productivity by increasing access to important company systems? Do you have business processes you could streamline by reducing the number of times employees have to go back to their wired connections?  Wireless LANs are the way to go, especially where there's no existing wired network. This is especially true in leased offices, where you can't go knocking holes in walls.

Your next step is to actually build a wireless LAN, which you'll do just like this:

Identify the equipment you want to buy, such as wireless notebooks, access points, wireless LAN adapters and wireless cards.

Determine the number of users who need to have access to the network. This will help you determine the number of access points you'll need.

Plan for the connection to your wired LAN, probably in a central location and in an open environment. Your goal is to maximize the access point's wireless range. The quoted range is a maximum of 300 feet, but that's very dependent on the existing environment--walls, water pipes, cables and so on all could decrease the range. The best thing to do is complete a site survey first; if that's not possible, assume a maximum range of 150 feet, as 300 could decrease throughput.

8 0
3 years ago
Read 2 more answers
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
____ [38]

Answer:

Monitor

Power supply

Explanation:

Monitor is the display unit of the computer. It carries capacitors which are charged and helps in electronic display.

Power supply is the unit which converts the AC electric supply to DC supply. It utilizes the capacitors to perform this function

While the hard drive and video card does not contain any capacitors.

4 0
3 years ago
The computer mouse are used for
IgorC [24]
A computer mouse is an input device for a computer that provides information onto the x and y coordinates of the icon being moved around by this mouse (referred to as a cursor) based off of the hand movements of the user moving the mouse.
Mouses also have three other button inputs. These are the left, right, and middle mouse buttons. The left button is typically used as the primary button, and is used to select, drag, open, and similar function. The right mouse button is usually intended for opening menus for additional options to be performed by the program being right-clicked on. The middle mouse button is actually a wheel that is used to move pages that extend beyond the boundaries of your screen up and down for easier viewing.
Hope that helped! =)
5 0
2 years ago
Read 2 more answers
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
mars1129 [50]
E-text <span>is digital textual information that can be stored, manipulated, and transmitted by electronic devices. The term "e-text" stands for electronic text and it is used for any digital document written, read, transmitted or manipulated by electronic devices, such as smart phones, PCs, tablets,...The origins of the e-text are in the beginning of the Internet.</span>
7 0
3 years ago
Other questions:
  • SOMEONE PLEASE HELP ASAP!!
    14·2 answers
  • 1.
    5·2 answers
  • If 15 bits are sent in 3 seconds then Bits intervalis__________
    13·1 answer
  • A computer is unable to access the network. when you check the led lights near the computer's network port, you discover the lig
    6·1 answer
  • Write a program that will generate 100 integers between 0 and 1000. Store the even numbers in a sorted linked list called evens.
    12·1 answer
  • write a script that creates and calls a stored procedure named insert_category. first, code a statement that creates a procedure
    10·1 answer
  • The best way to safeguard your document is to save it
    11·1 answer
  • What is media ethics. Explain two forms of maintaining media ethics with examples​
    13·1 answer
  • A sensitive manufacturing facility has recently noticed an abnormal number of assembly-line robot failures. Upon intensive inves
    10·1 answer
  • Lab 8-1: Working with Boot Loader and Runlevels what is the root password
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!