1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
8

Random Walker Collisions In lecture, we saw how to model the behavior of a random walker on a 2D grid using a Monte Carlo simula

tion. In this problem, we will investigate collisions between two of these random walkers. Specifically, use your simulation to track the distances of the two walkers until they collide. 1. Start by writing a MATLAB script to simulate the path that the single random walker A takes on an 11 x 11 grid of tiles. Let this random walker use a random compass as shown in class. Thus, the probability p of moving in the North, East, South, and West directions is given by 0.2. The remaining probability is the one used to stay put. If the random walker tries to move "past" one of the boundaries on its turn, his position does not change (you can think of this as a particle bumping into a wall and staying still). Choose a random tile to let the random walker A start his walk. Lastly, write a function to update the position of the random walker A. The function must use exactly the function header shown below, i.e. the function name and number and ordering of inputs and outputs must be followed exactly. function (x,y) = Randwalk_2D (x0, y0, BC) Here, x0 and y0 are the initial positions of the random walker, BC is the array of boundary conditions, and x and y are the updated positions of the random walker. 2. Add the random walker B to your simulation who moves according to its own randomly generated values using the same compass as the random walker A in Part 1. Let the random walker B start his walk on the tile that is furthest away from the start tile of walker A. At each iteration, both walkers move simultaneously to an adjacent tile using the rules outlined in Part 1. Continue updating the position of both walkers until a collision occurs (or until the maximum number of iterations, which is set to 1000, is reached). More precisely, a collision occurs when both random walkers occupy the same tile after both have completed their move. Furthermore, a collision occurs when both random walkers are next to each other and move to the other one's tile. Note that in this instance, the collision appears on their way, but both random walkers will end up on tiles that are again next to each other. In other words, collision also appears when their paths cross. 3. Track the movement of each random walker by storing their positions in four 1D-arrays associated with their x- and y-positions in the grid. After the simulation, calculate for each iteration the distance between the random walkers A and B, and plot the results vs. the number of iterations to see when the two random walkers A and B came close to each other and when they were far away from each other.
Computers and Technology
1 answer:
vlabodo [156]3 years ago
6 0

Answer:

dang how long did i take for you to wright all this and that lecture was cool

Explanation:

You might be interested in
The point at coordinates (2, -18) is in what direction from the origin?
Arada [10]
I wish i could give an answer but see in dont think straight
3 0
3 years ago
A news report says that company XYZ network was attacked by outsiders, who apparently sent a lot of spoofed ARP requests/respons
GaryK [48]

Answer:

False

Explanation:

Mac address a physical addresses of digital devices, hard-coded to the communication interface as a unique identifier.

ARP or address resolution protocol is a layer 2 protocol used by switches to determine the MAC address of host devices by send a broadcast message through all ports in the switch.

ARP spoofing attack is done within a network, whereby an attacker changes the Mac address to receive data meant for another target host. With this, a remote access to the switch is used to establish an ARP cache poisoning attack.

4 0
3 years ago
file Assume that a prototype of the part above was built from several cubes. The total volume of the part is 0.54675 in.3. What
Rina8888 [55]
The correct answer is D
5 0
3 years ago
1. Trust can be built in a relationship if:
artcher [175]

Answer:

A

Explanation:

because if both parties feel safe communicating and feel understood by the other party they feel safe trusting the other person and it develops a trust worthy relationship

4 0
3 years ago
Some file formats are specific to the program that uses them and the operating system on which they are used. True or False
mina [271]

Answer:

true

Explanation:

certain file formats can only be used to it's own operating system

5 0
4 years ago
Read 2 more answers
Other questions:
  • What are preconceptions?
    9·2 answers
  • Create a function named PrintStudents, which takes a string input filename and an integer minimum score value and a string outpu
    14·1 answer
  • You are in charge of the IT division for a company that has 1,048,576 customers. Your boss asks you to decide between buying a d
    14·1 answer
  • 19. Which network topology is a combination of two or more types of physical or two or more types of logical topologies? A. Poin
    8·1 answer
  • PLEASE HELP. I’ll mark you BRAINLIST <br> Please read the comment under this question
    9·1 answer
  • Consider an allocator on a 32-bit system that uses an implicit free list. Each memory block, either allocated or free, has a siz
    11·1 answer
  • MULTI-SELECT
    9·2 answers
  • How many votes does a candidate need to become president of the US ?
    12·2 answers
  • PLEASE HELP!!<br> giving loads of points<br> create the python codes for the images
    5·1 answer
  • Text me on instagram forever.brazy so we can watch a movie​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!