New Techniques in Design and Analysis of Exponential Algorithm

In: Computers and Technology

Submitted By shigopunk
Words 1436
Pages 6
New Techniques in Design and Analysis of Exponential Algorithm Arshi Aftab, Shikha Mahajan and Shruti Jajoo

Abstract: In this paper we first see how NP problems can be categorized and look at some examples. We then analyze the subset sum problem and prove its NP completeness. We look at various algorithms used to solve the problem and the efficiency of each algorithm. Hence we prove that subset sum problem is NP complete.
Keywords: NP complete, NP hard, complexity, subset sum, exponential I. Introduction
In the study of computation complexity of problems, we find out the resources required during computation like time, memory and space required. We check if the problem can be solved in polynomial time by some algorithm. An algorithm is said to be solved in polynomial time if its worst case efficiency belongs to O (p (n)) where p (n) is the polynomial of the problems input size. Problems that can be solved in polynomial time are called tractable and those that cannot be solved in polynomial time are intractable.
The formal definition of NP problem is as follows: A problem is said to be Non-deterministically Polynomial (NP) if we can find a nondeterministic Turing machine that can solve the problem in a polynomial number of nondeterministic moves.
Equivalent definition of NP problem: A problem is said to be NP if
1. its solution comes from a finite set of possibilities, and
2. It takes polynomial time to verify the correctness of a possible solution.
NP-complete problems
NP-complete problems are a subset of class NP. An problem p is NP-complete, if
1. p ∈ NP (you can solve it in polynomial time by a non-deterministic Turing machine) and
2. All other problems in class NP can be reduced to problem p in polynomial time.
NP-hard problems
NP-hard problems are partially alike but more difficult problems than NP complete problems. They don’t themselves…...

Similar Documents

Design Analysis

...Remote controls are used frequently at home, in the office, and even in the classroom. This pervasiveness stresses the importance of having a good design in order for the user to be able to interact with the TV with minimal problems. The manufacturers take this into consideration when they built the TV by aiming to provide a remote control that supplements the TV they have designed. However, remote controls fail over time and must be replaced and manufacturers don’t tend to offer a replacement for a specific TV model. Therefore, the TV owner must find a universal remote that is useful, it supports the capabilities of their TV, and that has good usability. With this in mind, through the course of this paper I will be reviewing the design of what I believe to be a bad universal remote compared to a good universal remote by giving a personal example of each. I had to replace the remote of my 25 year old Sony TV and I decided to get the cheapest one they had at RadioShack, which turned out to a very bad universal remote overall. Getting the universal remote setup with my TV required me to press certain buttons in the correct sequence and then entering the right code for my TV model. The whole process was straight forward enough, but there were multiple codes for my model TV so I had to perform the setup steps multiple times before I got it to sync with my TV. Once setup, I noticed that the remote did not have buttons for certain features offered by my TV, input selection......

Words: 942 - Pages: 4

Essentials of Systems Analysis and Design

... This page intentionally left blank Download at www.Pin5i.Com Essentials of Systems Analysis and Design Download at www.Pin5i.Com Editorial Director: Sally Yagan Editor in Chief: Eric Svendsen Executive Editor: Bob Horan Editorial Assistant: Ashlee Bradbury Director of Marketing: Patrice Lumumba Jones Executive Marketing Manager: Anne Fahlgren Senior Managing Editor: Judy Leale Production Project Manager: Kelly Warsak Senior Operations Supervisor: Arnold Vila Operations Specialist: Cathleen Petersen Creative Director: Blair Brown Senior Art Director/Design Supervisor: Janet Slowik Text Designer: Michael Fruhbeis Creative Director/Cover: Jayne Conte Cover Designer: Suzanne Duda Cover Art: Fotolia/3d mosaic/©Redshinestudio Manager, Rights and Permissions: Hessa Albader Media Project Manager: Lisa Rinaldi Media Editor: Denise Vaughn Full-Service Project Management: Tiffany Timmerman/S4Carlisle Publishing Services Composition: S4Carlisle Publishing Services Printer/Binder: Courier/Kendallville Cover Printer: Lehigh-Phoenix Color/Hagerstown Text Font: ITCCentury Book Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affiliated with the......

Words: 179288 - Pages: 718

A New Integrated Control Algorithm for Ieee 802.11g Standards

...A New Integrated Control Algorithm for IEEE 802.11g Standards Qian Liu, Yongxin Yan International School Beijing University of Posts and Telecommunications Beijing, China e-mail:, Abstract—Wi-Fi (Wireless Fidelity) mainly adopts IEEE 802.11g standards. And a binary exponential backoff algorithm is adopted to prevent channel collision, which also introduces reduction of the performance of the network. In this paper, an integrated control mechanism (ICM) is proposed which combines a centrally controlled approach and a distributed access mechanism to control the behavior of the system. Through this mechanism, backoff is eliminated from transmission mode, which can significantly enhance the performance of the system. Through theoretical analysis and simulation, the new mechanism can improve the throughput and reduce delay and packet loss rate. According to the results of simulation, with ICM, the throughput can have an improvement of 83.3% and the packet loss rate remains at 0 under appropriate conditions. Keywords-Wi-Fi, integrated control mechanism, centrally control, distributed access Jing Tu, Bainan Xia International School Beijing University of Posts and Telecommunications Beijing, China e-mail:, Many experts have proposed different algorithms and approaches to improve the performance of Wi-Fi. Souvik Sen, Romit Roy Choudhury and Srihari Nelakuditi transformed the contention from time...

Words: 3037 - Pages: 13

Introduction to Problem Solving and Algorithm Design

...CMIS 102 4060 Introduction to Problem Solving and Algorithm Design HOMEWORK 2 Declare CPUCost As Float Declare CaseCost As Float Declare PowerSupplyCost As Float Declare Motherboard As Float Declare HardDriveCost As Float Declare RAMCost As Float Declare DVDCost As Float Declare SoundCardCost As Float Declare MonitorCost As Float Declare GraphicsCardCost As Float Declare OperatingSystem Cost As Float //Prompt for and input the computer price: Write “Enter the computer price:” Input ComputerPrice Call Compute_CPU_Cost module Call Compute_Case_Cost module Call Compute_Power_Supply_Cost module Call Compute_Motherboard_Cost module Call Compute_Hard_Drive_Cost module Call Compute_RAM_Cost module Call Compute_DVD_Cost module Call Compute_Monitor_Card_Cost module Call Compute_Graphics_Card_Cost module Call Compute_Operating_System_Cost module End Program Declare CPUCost as Character //Display the menu and input user selection: Write “S – Intel i7” Write “E – Intel i5” Write “D – Intel i3” Write “Selection” Input CPU Choice Select Case of CPU Choice Case “S”: Set CPUCost = 319 Break Case “E”: Set CPUCost = 229 Break Case “D”: Set CPUCost = 119 Break Default: Write” Invalid Selection” End Case Declare CaseCost as Character //Display the menu and input user selection: Write “V – Thermaltake V3” Write “C – NZXT Guardian” Write “L – Cooler Master Elite 430” Write “Selection” Input Case Choice Select Case of Case Choice Case......

Words: 311 - Pages: 2

Systems Analysis and Design

...Running head: SYSTEMS ANALYSIS AND DESIGN Torey Golden Unit 6 Assignment 6 IT510 Kaplan University Table of Contents Part 1 3 Part 2 4 Part 3 7 References 9 Part 1 The team is now at the end of this information systems project for the company’s advertising personnel. We have been recently informed that they will be an employment reduction that will affect the systems analysis team and our budget which in turn has affected moral based on Ontha Weyout’s response during the meeting. We have identified that while we do have documentation, there is no consistency in it. A standardized method is in need to consolidate it and make the information understandable for users and stakeholders to use. One of the programmers suggested using psuedocode to standardize the documentation. However the advertising personnel are not familiar with that method. Had Al who is one of our newest programmers explained how Rouse (2005) stated that psuedocode “is a detailed yet readable description of what a computer program or algorithm must do” he might have received a different response from Mark in advertising. In addition, Al’s peer Flo and advertising executive David do not embrace the idea of using psuedocode. They have been using the systems development process with the use of CASE tools. The CASE tool can output graphical diagrams to give programmers a picture of what they are creating and non-technical users a map of sorts. It also provides......

Words: 1880 - Pages: 8

System Analysis and Design

...requirements. This task can easily be so absorbing in itself that there is seemingly no time left over for thinking about the non-technical issues surrounding the introduction of a new IT system, much less for setting up a people project to address them. So even if the people project is not driven by analysts, designers, or even IT managers, it needs their active support. Many of the tasks carried out by analysts in the early stages of an IT development project have outputs that the people project will need to draw on. For example, the process of creating data models and data flow diagrams may raise questions of data ownership, which need to be fed to the people project to resolve, perhaps through a redefinition of rolesand responsibilities or the introduction of a new procedure. Likewise, if systems analysts have done a detailed assessment of costs and benefits, this will give the people project some idea of the messages they can use to sell the new IT system to users and managers. Analysts can also draw on the people project for valuable help in areas such as human–computer interface design, discussed in Chapter 15. The look and feel of the HCI can be one of the most significant factors in determining a user’s response to a system. The people project can help create the conditions in which HCI design can be done collaboratively, thus ensuring that both sides get what they need from this all-important aspect of the system. Very often, analysts and designers do more......

Words: 11373 - Pages: 46

New Design

...Professor – Interdisciplinary Design Programme and Industrial Management Engineering Indian Institute of Technology, Kanpur 208016, India Email: Phone: 91-512-2597858, 91-512-2597376 (O) Mobile: +91-9648117755 Jayanta Chatterjee “To learn, research, teach and consult in my competence areas, to evolve as a person and share my ken to make a difference through creative Innovation” Core Competence • • Research Interest • • Innovation in socio-technical systems Cause Related Marketing. Media & Communication. Global Sales & Marketing Product and Brand Management. New Business Development. • • Dr. Jayanta Chatterjee has 42 years of teaching/research and professional experience in management at different industries and in different countries. Strategic Design of ProductService Systems • • Digital ecosystem & autopoeisis Jayanta started his career in 1972 at Siemens in Sales and Project Engineering and developed expertise in new product management. He then pioneered the introduction of advanced electronic control systems to Indian Industries at Allen-Bradley Ltd, where he rose to the position of CEO in 1990. But true to his passion he was also teaching as a visiting faculty at IIT Kanpur and at IIT Delhi during this period. Later, he co-funded Strategy Innovation Inc and became the Chief Knowledge Officer of vtPlex. In 2001 he divested out of that enterprise and joined the academia full time at Industrial & Management......

Words: 2148 - Pages: 9

Analysis Algorithm and Data Structure

...AND STEP 2 8 → 8 → 8 → 6 in linked list. STEP 4: 123 * 400= 0 → 0 → 2 → 9 → 4 in linked list. STEP 5: ADD STEP 3 AND STEP 4 8 → 8 → 0 → 6 → 5 in linked list. Exponentiation: The initial step is to arrange in decreasing order of exponents and then perform the action. The other method is by using Θ(log n) time algorithm based on binary representation. 1.5. Representation of one’s and two’s complement 1’s complement: + 4= 0100 - 4= 1011 (taking 1’s complement of +4 is -4 (i.e.) inverting the bit). So, 1’s complement is used to represent both positive and negative integers. 2’s complement: Converting the value to 1’s complement and then adding 1 to that complement. - 4= (1’s complement of 4) + 1 = 1011+1 = 1100. It is used in implementation of ADT, which performs arithmetic operation. So it is qualified under data structure. 1.9. Does every problem have an algorithm? Every problem doesn’t have an algorithm. For example if I were sorting the records stored in an array, the searching becomes difficult for the largest element. The value of an algorithm must be determined for larger set. So the possibility to determine the algorithm for this problem is uncertain. 1.12. Implementation of database • The possible activities that I considered here is insertion, deletion and retrieval of data in database. • Generally the attributes for the information of cities can be city name, location, zip code, etc. • The Time Constraint and efficiency......

Words: 473 - Pages: 2

Interviewing Techniques for New Project

...Interviewing Techniques for New I.T. Project  CEO – Yes, succession planning. Project Manager – How so? President & CEO – I experienced professional growth in the company, and I suspect that others would like to grow in that same manner. I would have liked a defined career path and the ability to track my progress for meeting the requirements. Knowing where the openings are and what skills it takes to fill the positions would have made it much easier to advance. Project Manager – I understand. It seems the system tracks the answers in performance reviews as well as the training courses each employee completes. President & CEO – Yes, exactly. Those records would be entered into the system by the employee. Each employee could see progress in the system and plot a course. I know everyone does not want to be the president of the company and are content in the current role, but those that want to grow will stay with the company instead of leaving to grow elsewhere. Project Manager – I appreciate your time. Is there anything else you would like to share? President & CEO – Yes. We have had great success with the financial integration, and I expect a full six months more of savings than was originally calculated due to the time savings in the automatic calculations. The people time saved with calculation speed in the system was near to six months less time required for reaching the return on the investment point. The automatic calculations make the time a bit......

Words: 1982 - Pages: 8

Cis 339 Course Object-Oriented Analysis Design Alpharetta New Devry

...CIS 339 Course Object-Oriented Analysis Design Alpharetta NEW DeVry IF You Want To Purchase A+ Work then Click The Link Below For Instant Down Load IF You Face Any Problem Then E Mail Us At JOHNMATE1122@GMAIL.COM This new course includes all ilabs and all discussions posted by all students. CIS 339 iLab Week 1-7 DeVry CIS 339 ilab Week 1 DeVry iLAB OVERVIEW Scenario and Summary You have been hired by the School of Prosperity (SoP) as a software architect to help the school plan, design, and implement a new online system called the Student Records System (SRS). The Student Records System (SRS), described in the SRS Preliminary Planning Overview document, is the 7-week-long project that you will work on throughout this course. You will be developing UML models and documents for the planning, design, and implementation phases of SRS development. In each week, you will be provided with the information you need to continue to develop your analysis and design UML models and documents for this project. In this very first week, you will develop the System Request document that articulates the business needs and values of the SRS. The SoP school is excited about this project and allowed you to ask them five questions to clarify project issues for you about the SRS project. You are to include these five questions in your submitted System......

Words: 2649 - Pages: 11

New Techniques of Data Mining

...New techniques of data mining Social media sites are becoming more and more popular. These sites not only allow the people to be social with their friends but also allow users to share videos, images and other valuable information without any loss of time. These sites have multimedia data in bulk amount therefore it is necessary to mine these sites in a proper way to retrieve only relevant data. Due to the different structure of each media object the structure can’t be used as a criterion for mining For example, in image mining, we have to extract the patterns from a large collection of images. These sites have content and context information which can be used as valuable information for mining these sites. Content information is related to the visual and semantic attributes in case of image retrieval. Visual contents include color, texture, shape and spatial information in the images .These visual features can be described locally or globally. Globally visual features are defined for the complete image whereas locally are defined for various regions of a single image. Semantic content is obtained either by textual annotation or by complex inference procedures based on visual contents. Context link information is available in form of links between multimedia objects and context objects .These context objects are the objects which are provided by the users directly or indirectly. These context objects are the tagged data with each image as in flickr or that may be title......

Words: 311 - Pages: 2

Car Design Analysis

...| CAR DESIGN ANALYSIS | | | | SUBMITTED BY :FT12206 BALAJI MADHUSUDHAN | | Car design Analysis Sum of Squares comparisons: Technique | Total sum of squares | MLR | 1989.69 | ANN | 1716.93 | GA | 496.5 | Results: * As can be seen from the above table, Multiple linear regression technique (MLR) provides the model with highest “Total Sum of Squares” followed by the Artificial Neural Network (ANN) anby Genetic Algorithm (GA). * The three models give different results because because MLR assumes a linear relationship between the dependent and independent variables while both ANN and GA don’t have any such assumptions and they form models based on the pattern observed from the data. * If we compare ANN with GA we can see that GA has a better model in terms of “Total sum of squares”. This could be due to the absence of prior solution for ANN to form a model or due to presence of noise in the data. * We were estimating how much of each of the independent variables would result in dependent variable. Since we were not performing classification but were estimating the dependent variable, GA was the appropriate technique under the context. * Hence we observe an enormous difference in results between the three when compared the “Total sum of squares”. Situational based technique: * ANN models are more accurate than any other technique but the disadvantage of ANN is the lack of explainability. Also, ANN is...

Words: 731 - Pages: 3

Observer Based Techniques for the Identification and Analysis of Avascular Tumor Growth.Pdf Uploaded Successfully

...Contents lists available at SciVerse ScienceDirect Mathematical Biosciences journal homepage: Observer-based techniques for the identification and analysis of avascular tumor growth Filippo Cacace a, Valerio Cusimano a, Luisa Di Paola a,⇑, Alfredo Germani a,b a b Università Campus Bio-Medico di Roma, via Álvaro del Portillo, 21, 00128 Roma, Italy Dipartimento di Ingegneria Elettrica e dell’Informazione, Università degli Studi dell’Aquila, Poggio di Roio, 67040 L’Aquila, Italy article info Article history: Received 20 July 2010 Received in revised form 1 October 2011 Accepted 3 October 2011 Available online xxxx Keywords: Tumor growth Gompertz model Non-linear observer Non-linear systems discretization abstract Cancer represents one of the most challenging issues for the biomedical research, due its large impact on the public health state. For this reason, many mathematical methods have been proposed to forecast the time evolution of cancer size and invasion. In this paper, we study how to apply the Gompertz’s model to describe the growth of an avascular tumor in a realistic setting. To this aim, we introduce mathematical techniques to discretize the model, an important requirement when discrete-time measurements are available. Additionally, we describe observed-based techniques, borrowed from the field of automation theory, as a tool to estimate the model unknown parameters. This identification approach is a......

Words: 6851 - Pages: 28

Techniques of Job Analysis

...TASK - 1 TECHNIQUES OF JOB ANALYSIS RECRUITMENT: It is a process of attracting applicants either from within the organization or from outside for a vacant job to be filled in the organization. In the words of Torrington et al (2011): “ includes those practices and activities carried out by the organization with the primary purpose of identifying and attracting potential employees.” In order to fill the vacancy, it is very important that the description about the job should be clear. It helps in hiring the candidate whose profile match with that of the job. As per Torrington et al (2011), ”The approach involves breaking the job down into its component parts, working out what its chief objectives will be and then recording this on paper.” In other words, it is the set of information about the job. Job description can be made by using the data contained in job analysis. There are various techniques which can be used to make a good job analysis. There are many writers who have talked about and researched on the various techniques of job analysis. Following two literature reviews makes clear about these methods. LITERATURE REVIEW – 1 In a book by Foot and Hook (2008), they described job analysis as follows: “Job analysis is a process of gathering together all data about an existing job, which activities are performed and what skills are needed.” Foot and Hook (2008), also described that this job analysis is further used for making job description and job......

Words: 3123 - Pages: 13

Systems Analysis and Design

... SYSTEMS ANALYSIS and DESIGN This page intentionally left blank SYSTEMS ANALYSIS and DESIGN EIGHTH EDITION KENNETH E. KENDALL Rutgers University School of Business–Camden Camden, New Jersey JULIE E. KENDALL Rutgers University School of Business–Camden Camden, New Jersey Prentice Hall Boston Milan Sao Paulo Columbus Paris Indianapolis Montreal New York Dubai Delhi Toronto San Francisco London Taipei Madrid Tokyo Mexico City Upper Saddle River Munich Sydney Amsterdam Hong Kong Cape Town Seoul Singapore To the memory of Julia A. Kendall and the memory of Edward J. Kendall, whose lifelong example of working together will inspire us forever. Editorial Director: Sally Yagan Editor in Chief: Eric Svendsen Executive Editor: Bob Horan Editorial Project Manager: Kelly Loftus Editorial Assistant: Jason Calcano Director of Marketing: Patrice Lumumba Jones Senior Marketing Manager: Anne Fahlgren Senior Managing Editor: Judy Leale Associate Production Project Manager: Ana Jankowski Senior Operations Supervisor: Arnold Vila Senior Art Director: Steve Frim Text and Cover Designer: Jill Lehan Cover Art: Richard Kalina, “Carthage” collage, acrylic, flashe on linen: © 2006 Media Project Manager: Lisa Rinaldi Media Editor: Denise Vaughn Full-Service Project Management/Composition: S4Carlisle Publishing Services, Inc. Printer/Binder: Courier/Kendallville Cover Printer: Lehigh-Phoenix Color/Hagerstown Text Font: 10/12 Times “Carthage” © 2006 Richard......

Words: 317454 - Pages: 1270