Data Structures. Topic #12
|
|
|
- Kelley Muriel Harmon
- 9 years ago
- Views:
Transcription
1 Data Structures Topic #12
2 Today s Agenda Sorting Algorithms insertion sort selection sort exchange sort shell sort radix sort As we learn about each sorting algorithm, we will discuss its efficiency
3 Sorting in General Sorting is the process that organizes collections of data into either ascending or descending order. Many of the applications you will deal with will require sorting; it is easier to understand data if it is organized numerically or alphabetically in order.
4 Sorting in General As we found with the binary search, our data needs to be sorted to be able use more efficient methods of searching. There are two categories of sorting algs Internal sorting requires that all of your data fit into memory (an array or a LLL) External sorting is used when your data can't fit into memory all at once (maybe you have a very large database), and so sorting is done using disk files.
5 Sorting in General Just like with searching, when we want to sort we need to pick from our data record the key to sort on (called the sort key). For example, if our records contain information about people, we might want to sort their names, id #s, or zip codes. Given a sorting algorithm, your entire table of information will be sorted based on only one field (the sort key).
6 Sorting in General The efficiency of our algorithms is dependent on the number of comparisons we have to make with our keys. In addition, we will learn that sorting will also depend on how frequently we must move items around.
7 Insertion Sort Think about a deck of cards for a moment. If you are dealt a hand of cards, imagine arranging the cards. One way to put your cards in order is to pick one card at a time and insert it into the proper position. The insertion sort acts just this way!
8 Insertion Sort The insertion sort divides the data into a sorted and unsorted region. Initially, the entire list is unsorted. Then, at each step, the insertion sort takes the first item of the unsorted region and places it into its correct position in the sorted region.
9 Insertion Sort Sort in class the following: 29, 10, 14, 37, 13, 12, 30, 20 Notice, the insertion sort uses the idea of keeping the first part of the list in correct order, once you've examined it. Now think about the first item in the list. Using this approach, it is always considered to be in order!
10 Insertion Sort Notice that with an insertion sort, even after most of the items have been sorted, the insertion of a later item may require that you move MANY of the numbers. We only move 1 position at a time. Thus, think about a list of numbers organized in reverse order? How many moves do we need to make?
11 Insertion Sort With the first pass, we make 1 comparison. With the second pass, in the worst case we must make 2 comparisons. With the third pass, in the worst case we must make 3 comparisons. With the N-1 pass, in the worst case we must make N-1 comparisons. In worst case: (N-1) which is: N*(N-1)/2 O(N 2 )
12 Insertion Sort But, how does the direction of comparison change this worst case situation? if the list is already sorted and we compare left to right, vs. right to left if the list is exactly in the opposite order? how would this change if the data were stored in a linear linked list instead of an array?
13 Insertion Sort In addition, the algorithm moves data at most the same number of times. So, including both comparisons and exchanges, we get N(N-1) = N*N - N This can be summarized as a O(N 2 ) algorithm in the worst case. We should keep in mind that this means as our list grows larger the performance will be dramatically reduced.
14 Insertion Sort For small arrays - fewer than 50 - the simplicity of the insertion sort makes it a reasonable approach. For large arrays -- it can be extremely inefficient! However, if your data is close to being sorted and a right->left comparison method is used, with LLL this can be greatly improved
15 Selection Sort Imagine the case where we can look at all of the data at once...and to sort it...find the largest item and put it in its correct place. Then, we find the second largest and put it in its place, etc. If we were to think about cards again, it would be like looking at our entire hand of cards and ordering them by selecting the largest first and putting at the end, and then selecting the rest of the cards in order of size.
16 Selection Sort This is called a selection sort. It means that to sort a list, we first need to search for the largest key. Because we will want the largest key to be at the last position, we will need to swap the last item with the largest item. The next step will allow us to ignore the last (i.e., largest) item in the list. This is because we know that it is the largest item...we don't have to look at it again or move it again!
17 Selection Sort So, we can once again search for the largest item...in a list one smaller than before. When we find it, we swap it with the last item (which is really the next to the last item in the original list). We continue doing this until there is only 1 item left.
18 Selection Sort Sort in class the following: 29, 10, 14, 37, 13, 12, 30, 20 Notice that the selection sort doesn't require as many data moves as Insertion Sort. Therefore, if moving data is expensive (i.e., you have large structures), a selection sort would be preferable over an insertion sort.
19 Selection Sort Selection sort requires both comparisons and exchanges (i.e., swaps). Start analyzing it by counting the number of comparisons and exchanges for an array of N elements. Remember the selection sort first searches for the largest key and swaps the last item with the largest item found.
20 Selection Sort Remember that means for the first time around there would be N-1 comparisons. The next time around there would be N-2 comparisons (because we can exclude comparing the previously found largest! Its already in the correct spot!). The third time around there would be N-3 comparisons. So...the number of comparisons would be: (N-1)+(N-2) = N*(N-1)/2
21 Selection Sort Next, think about exchanges. Every time we find the largest...we perform a swap. This causes 3 data moves (3 assignments). This happens N-1 times! Therefore, a selection sort of N elements requires 3*(N-1) moves.
22 Selection Sort Lastly, put all of this together: N*(N-1)/2 + 3*(N-1) which is: N*N/2 - N/2 + 6N/2-3 which is: N*N/2 + 5N/2-3 Put this in perspective of what we learned about with the BIG O method: 1/2 N*N + O(N) Or, O(N 2 )
23 Selection Sort Given this, we can make a couple of interesting observations. The efficiency DOES NOT depend on the initial arrangement of the data. This is an advantage of the selection sort. However, O(N 2 ) grows very rapidly, so the performance gets worse quickly as the number of items to sort increases.
24 Selection Sort Also notice that even with O(N 2 ) comparisons there are only O(N) moves. Therefore, the selection sort could be a good choice over other methods when data moves are costly but comparisons are not. This might be the case when each data item is large (i.e., big structures with lots of information) but the key is short. Of course, don't forget that storing data in a linked list allows for very inexpensive data moves for any algorithm!
25 Exchange Sort (Bubble sort) Many of you should already be familiar with the bubble sort. It is used here as an example, but it is not a particular good algorithm! The bubble sort simply compares adjacent elements and exchanges them if they are out of order. To do this, you need to make several passes over the data.
26 Exchange Sort (Bubble sort) During the first pass, you compare the first two elements in the list. If they are out of order, you exchange them. Then you compare the next pair of elements (positions 2 and 3). If they are out of order, you exchange them. This algorithm continues comparing and exchanging pairs of elements until you reach the end of the list.
27 Exchange Sort (Bubble sort) Notice that the list is not sorted after this first pass. We have just "bubbled" the largest element up to its proper position at the end of the list! During the second pass, you do the exact same thing...but excluding the largest (last) element in the array since it should already be in sorted order. After the second pass, the second largest element in the array will be in its proper position (next to the last position).
28 Exchange Sort (Bubble sort) In the best case, when the data is already sorted, only 1 pass is needed and only N-1 comparisons are made (with no exchanges). Sort in class the following: 29, 10, 14, 37, 13, 12, 30, 20 The bubble sort also requires both comparisons and exchanges (i.e., swaps).
29 Exchange Sort (Bubble sort) Remember, the bubble sort simply compares adjacent elements and exchanges them if they are out of order. To do this, you need to make several passes over the data. This means that the bubble sort requires at most N-1 passes through the array.
30 Exchange Sort (Bubble sort) During the first pass, there are N-1 comparisons and at most N-1 exchanges. During the second pass, there are N-2 comparisons and at most N-2 exchanges. Therefore, in the worst case there are comparisons of: (N-1)+(N-2) = N*(N-1)/2 and, the same number of exchanges... N*(N-1)/2*4 which is: 2N*N - 2*N
31 Exchange Sort (Bubble sort) This can be summarized as an O(N 2 ) algorithm in the worst case. We should keep in mind that this means as our list grows larger the performance will be dramatically reduced. In addition, unlike the selection sort, in the worst case we have not only O(N 2 ) comparisons but also O(N 2 ) data moves.
32 Exchange Sort (Bubble sort) But, think about the best case... The best case occurs when the original data is already sorted. In this case, we only need to make 1 pass through the data and make only N-1 comparisons and NO exchanges. So, in the best case, the bubble sort O(N) (which can be the same as an insertion sort properly formulated)
33 Shell Sort The selection sort moves items very efficiently but does many redundant comparisons. And, the insertion sort, in the best case can do only a few comparisons -- but inefficiently moves items only one place at a time And, the bubble sort has a higher probability of high movement of data
34 Shell Sort The shell sort is similar to the insertion sort, except it solves the problem of moving the items only one step at a time. The idea with the shell sort is to compare keys that are farther apart, and then resort a number of times, until you finally do an insertion sort We use increments to compare sets of data to essentially preprocess the data
35 Shell Sort With the shell sort you can choose any increment you want. Some, however, work better than others. A power of 2 is not a good idea. Powers of 2 will compare the same keys on multiple passes...so pick numbers that are not multiples of each other. It is a better way of comparing new information each time.
36 Shell Sort Sort in class the following: 29, 10, 14, 37, 13, 12, 30, 20, 50, 5, 75, 11 Try increments of 5, 3, and 1 The final increment must always be 1
37 Radix Sort Imagine that we are sorting a hand of cards. This time, you pick up the cards one at a time and arrange them by rank into 13 possible groups -- in the order 2,3,...10,J,Q,K,A. Combine each group face down on the table..so that the 2's are on top with the aces on bottom.
38 Radix Sort Pick up one group at a time and sort them by suit: clubs, diamonds, hearts, and spades. The result is a totally sorted hand of cards. The radix sort uses this idea of forming groups and then combining them to sort a collection of data.
39 Radix Sort Look at an example using character strings: ABC, XYZ, BWZ, AAC, RLT, JBX, RDT, KLT, AEO, TLJ The sort begins by organizing the data according to the rightmost (least significant) letter and placing them into six groups in this case (do this in class)
40 Radix Sort Now, combine the groups into one group like we did the hand of cards. Take the elements in the first group (in their original order) and follow them by elements in the second group, etc. Resulting in: ABC, AAC, TLJ, AEO, RLT, RDT, KLT, JBX, XYZ, BWZ
41 Radix Sort The next step is to do this again, using the next letter (do this in class) Doing this we must keep the strings within each group in the same relative order as the previous result. Next, we again combine these groups into one result: AAC, ABC, JBX, RDT, AEO, TLJ, RLT, KLT, BWZ, XYZ
42 Radix Sort Lastly, we do this again, organizing the data by the first letter We do a final combination of these groups, resulting in: AAC, ABC, AEO, BWZ, JBX, KLT, RDT, RLT, TLJ, XYZ The strings are now in sorted order! When working with strings of varying length, you can treat them as if the short ones are padded on the right with blanks.
43 Radix Sort Notice just from this pseudo code that the radix sort requires N moves each time it forms groups and N moves to combine them again into one group. This algorithm performs 2*N moves "Digits" times. Notice that there are no comparisons!
44 Radix Sort Therefore, at first glimpse, this method looks rather efficient. However, it does require large amounts of memory to handle each group if implemented as an array. Therefore, a radix sort is more appropriate for a linked list than for an array. Also notice that the worst case and the average case (or even the best case) all will take the same number of moves.
APP INVENTOR. Test Review
APP INVENTOR Test Review Main Concepts App Inventor Lists Creating Random Numbers Variables Searching and Sorting Data Linear Search Binary Search Selection Sort Quick Sort Abstraction Modulus Division
CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team
CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team Lecture Summary In this lecture, we learned about the ADT Priority Queue. A
Lecture Notes on Linear Search
Lecture Notes on Linear Search 15-122: Principles of Imperative Computation Frank Pfenning Lecture 5 January 29, 2013 1 Introduction One of the fundamental and recurring problems in computer science is
Using VLOOKUP to Combine Data in Microsoft Excel
Using VLOOKUP to Combine Data in Microsoft Excel Microsoft Excel includes a very powerful function that helps users combine data from multiple sources into one table in a spreadsheet. For example, if you
CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
Math: Study Skills, Note Taking Skills, And Test Taking Strategies
Math: Study Skills, Note Taking Skills, And Test Taking Strategies Math Study Skill Active Study vs. Passive Study Be actively involved in managing the learning process, the mathematics and your study
Pseudo code Tutorial and Exercises Teacher s Version
Pseudo code Tutorial and Exercises Teacher s Version Pseudo-code is an informal way to express the design of a computer program or an algorithm in 1.45. The aim is to get the idea quickly and also easy
Symbol Tables. Introduction
Symbol Tables Introduction A compiler needs to collect and use information about the names appearing in the source program. This information is entered into a data structure called a symbol table. The
To convert an arbitrary power of 2 into its English equivalent, remember the rules of exponential arithmetic:
Binary Numbers In computer science we deal almost exclusively with binary numbers. it will be very helpful to memorize some binary constants and their decimal and English equivalents. By English equivalents
Poker Probability from Wikipedia. Frequency of 5-card poker hands 36 0.00139% 0.00154% 72,192.33 : 1
Poker Probability from Wikipedia Frequency of 5-card poker hands The following enumerates the frequency of each hand, given all combinations of 5 cards randomly drawn from a full deck of 52 without replacement.
How to Read Music Notation
How to Read Music Notation The New School of American Music IN JUST 30 MINUTES! C D E F G A B C D E F G A B C D E F G A B C D E F G A B C D E F G A B C D E 1. MELODIES The first thing to learn about reading
Fundamentals of Probability
Fundamentals of Probability Introduction Probability is the likelihood that an event will occur under a set of given conditions. The probability of an event occurring has a value between 0 and 1. An impossible
Heaps & Priority Queues in the C++ STL 2-3 Trees
Heaps & Priority Queues in the C++ STL 2-3 Trees CS 3 Data Structures and Algorithms Lecture Slides Friday, April 7, 2009 Glenn G. Chappell Department of Computer Science University of Alaska Fairbanks
Solving the Rubik's Revenge (4x4x4) Home Pre-Solution Stuff Step 1 Step 2 Step 3 Solution Moves Lists
Solving your Rubik's Revenge (4x4x4) 07/16/2007 12:59 AM Solving the Rubik's Revenge (4x4x4) Home Pre-Solution Stuff Step 1 Step 2 Step 3 Solution Moves Lists Turn this... Into THIS! To solve the Rubik's
6. Standard Algorithms
6. Standard Algorithms The algorithms we will examine perform Searching and Sorting. 6.1 Searching Algorithms Two algorithms will be studied. These are: 6.1.1. inear Search The inear Search The Binary
Pre-Algebra Lecture 6
Pre-Algebra Lecture 6 Today we will discuss Decimals and Percentages. Outline: 1. Decimals 2. Ordering Decimals 3. Rounding Decimals 4. Adding and subtracting Decimals 5. Multiplying and Dividing Decimals
Lab 11. Simulations. The Concept
Lab 11 Simulations In this lab you ll learn how to create simulations to provide approximate answers to probability questions. We ll make use of a particular kind of structure, called a box model, that
Greatest Common Factor and Least Common Multiple
Greatest Common Factor and Least Common Multiple Intro In order to understand the concepts of Greatest Common Factor (GCF) and Least Common Multiple (LCM), we need to define two key terms: Multiple: Multiples
Setting up a basic database in Access 2003
Setting up a basic database in Access 2003 1. Open Access 2. Choose either File new or Blank database 3. Save it to a folder called customer mailing list. Click create 4. Double click on create table in
Chapter 4: Computer Codes
Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data
JobTestPrep's Numeracy Review Decimals & Percentages
JobTestPrep's Numeracy Review Decimals & Percentages 1 Table of contents What is decimal? 3 Converting fractions to decimals 4 Converting decimals to fractions 6 Percentages 6 Adding and subtracting decimals
GUITAR THEORY REVOLUTION
GUITAR THEORY REVOLUTION The Major and Minor Pentatonic Scales Copyright Guitar Theory Revolution 2011 1 Contents Introduction 3 What are the Major and Minor Pentatonic Scales 3 Diagrams for all the Pentatonic
There are a number of superb online resources as well that provide excellent blackjack information as well. We recommend the following web sites:
3. Once you have mastered basic strategy, you are ready to begin learning to count cards. By counting cards and using this information to properly vary your bets and plays, you can get a statistical edge
Data Structure [Question Bank]
Unit I (Analysis of Algorithms) 1. What are algorithms and how they are useful? 2. Describe the factor on best algorithms depends on? 3. Differentiate: Correct & Incorrect Algorithms? 4. Write short note:
Merging Labels, Letters, and Envelopes Word 2013
Merging Labels, Letters, and Envelopes Word 2013 Merging... 1 Types of Merges... 1 The Merging Process... 2 Labels - A Page of the Same... 2 Labels - A Blank Page... 3 Creating Custom Labels... 3 Merged
GUITAR THEORY REVOLUTION. Part 1: How To Learn All The Notes On The Guitar Fretboard
GUITAR THEORY REVOLUTION Part 1: How To Learn All The Notes On The Guitar Fretboard Contents Introduction Lesson 1: Numbering The Guitar Strings Lesson 2: The Notes Lesson 3: The Universal Pattern For
Mathematical Card Tricks
Mathematical Card Tricks Tom Davis [email protected] http://www.geometer.org/mathcircles May 26, 2008 At the April 10, 2008 meeting of the Teacher s Circle at AIM (the American Institute of Mathematics)
B-Trees. Algorithms and data structures for external memory as opposed to the main memory B-Trees. B -trees
B-Trees Algorithms and data structures for external memory as opposed to the main memory B-Trees Previous Lectures Height balanced binary search trees: AVL trees, red-black trees. Multiway search trees:
Binary Heap Algorithms
CS Data Structures and Algorithms Lecture Slides Wednesday, April 5, 2009 Glenn G. Chappell Department of Computer Science University of Alaska Fairbanks [email protected] 2005 2009 Glenn G. Chappell
Access Tutorial 2: Tables
Access Tutorial 2: Tables 2.1 Introduction: The importance of good table design Tables are where data in a database is stored; consequently, tables form the core of any database application. In addition
Session 7 Fractions and Decimals
Key Terms in This Session Session 7 Fractions and Decimals Previously Introduced prime number rational numbers New in This Session period repeating decimal terminating decimal Introduction In this session,
EdExcel Decision Mathematics 1
EdExcel Decision Mathematics 1 Linear Programming Section 1: Formulating and solving graphically Notes and Examples These notes contain subsections on: Formulating LP problems Solving LP problems Minimisation
Sorting Algorithms. Nelson Padua-Perez Bill Pugh. Department of Computer Science University of Maryland, College Park
Sorting Algorithms Nelson Padua-Perez Bill Pugh Department of Computer Science University of Maryland, College Park Overview Comparison sort Bubble sort Selection sort Tree sort Heap sort Quick sort Merge
Solutions to Problem Set 1
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose
Successful Mailings in The Raiser s Edge
Bill Connors 2010 Bill Connors, CFRE November 18, 2008 Agenda Introduction Preparation Query Mail Export Follow-up Q&A Blackbaud s Conference for Nonprofits Charleston Bill Connors, CFRE Page #2 Introduction
RSA Encryption. Tom Davis [email protected] http://www.geometer.org/mathcircles October 10, 2003
RSA Encryption Tom Davis [email protected] http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.
To add a data form to excel - you need to have the insert form table active - to make it active and add it to excel do the following:
Excel Forms A data form provides a convenient way to enter or display one complete row of information in a range or table without scrolling horizontally. You may find that using a data form can make data
Mail Merge Tutorial (for Word 2003-2007) By Allison King Spring 2007 (updated Fall 2007)
Mail Merge Tutorial (for Word 2003-2007) By Allison King Spring 2007 (updated Fall 2007) What is mail merge? You've probably heard it mentioned around the office or at an interview (especially for a temp
In This Issue: Excel Sorting with Text and Numbers
In This Issue: Sorting with Text and Numbers Microsoft allows you to manipulate the data you have in your spreadsheet by using the sort and filter feature. Sorting is performed on a list that contains
(b) You draw two balls from an urn and track the colors. When you start, it contains three blue balls and one red ball.
Examples for Chapter 3 Probability Math 1040-1 Section 3.1 1. Draw a tree diagram for each of the following situations. State the size of the sample space. (a) You flip a coin three times. (b) You draw
Hash Tables. Computer Science E-119 Harvard Extension School Fall 2012 David G. Sullivan, Ph.D. Data Dictionary Revisited
Hash Tables Computer Science E-119 Harvard Extension School Fall 2012 David G. Sullivan, Ph.D. Data Dictionary Revisited We ve considered several data structures that allow us to store and search for data
Chapter 13: Query Processing. Basic Steps in Query Processing
Chapter 13: Query Processing! Overview! Measures of Query Cost! Selection Operation! Sorting! Join Operation! Other Operations! Evaluation of Expressions 13.1 Basic Steps in Query Processing 1. Parsing
recursion, O(n), linked lists 6/14
recursion, O(n), linked lists 6/14 recursion reducing the amount of data to process and processing a smaller amount of data example: process one item in a list, recursively process the rest of the list
Simple sorting algorithms and their complexity. Bubble sort. Complexity of bubble sort. Complexity of bubble sort. Bubble sort of lists
Simple sorting algorithms and their complexity Bubble sort Selection sort Insertion sort Bubble sort void bubblesort(int arr[]){ int i; int j; int temp; for(i = arr.length-1; i > 0; i--){ for(j = 0; j
SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89. by Joseph Collison
SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89 by Joseph Collison Copyright 2000 by Joseph Collison All rights reserved Reproduction or translation of any part of this work beyond that permitted by Sections
Lecture 2. Binary and Hexadecimal Numbers
Lecture 2 Binary and Hexadecimal Numbers Purpose: Review binary and hexadecimal number representations Convert directly from one base to another base Review addition and subtraction in binary representations
Microsoft Excel Tips & Tricks
Microsoft Excel Tips & Tricks Collaborative Programs Research & Evaluation TABLE OF CONTENTS Introduction page 2 Useful Functions page 2 Getting Started with Formulas page 2 Nested Formulas page 3 Copying
Learn How to Create and Profit From Your Own Information Products!
How to Setup & Sell Your Digital Products Using JVZoo Learn How to Create and Profit From Your Own Information Products! Introduction to JVZoo What is JVZoo? JVZoo is a digital marketplace where product
Data Structures Fibonacci Heaps, Amortized Analysis
Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:
Sequential Data Structures
Sequential Data Structures In this lecture we introduce the basic data structures for storing sequences of objects. These data structures are based on arrays and linked lists, which you met in first year
5. A full binary tree with n leaves contains [A] n nodes. [B] log n 2 nodes. [C] 2n 1 nodes. [D] n 2 nodes.
1. The advantage of.. is that they solve the problem if sequential storage representation. But disadvantage in that is they are sequential lists. [A] Lists [B] Linked Lists [A] Trees [A] Queues 2. The
Action Steps for Setting Up a Successful Home Web Design Business
Action Steps for Setting Up a Successful Home Web Design Business In this document you'll find all of the action steps included in this course. As you are completing these action steps, please do not hesitate
3 Some Integer Functions
3 Some Integer Functions A Pair of Fundamental Integer Functions The integer function that is the heart of this section is the modulo function. However, before getting to it, let us look at some very simple
Section 8.2 Solving a System of Equations Using Matrices (Guassian Elimination)
Section 8. Solving a System of Equations Using Matrices (Guassian Elimination) x + y + z = x y + 4z = x 4y + z = System of Equations x 4 y = 4 z A System in matrix form x A x = b b 4 4 Augmented Matrix
The ID Technology. Introduction to GS1 Barcodes
The ID Technology Introduction to GS1 Barcodes Contents GS1 - The Basics 2 Starting Point - GTIN 3 GTIN Labels for Cases - ITF-14 5 Adding More Data - GS1 128 6 GS1 Application Identifiers 7 Logistics
Make Smooth, Seamless Chord Changes In 5 Minutes Or Less
Make Smooth, Seamless Chord Changes In 5 Minutes Or Less by Brett McQueen of UkuleleTricks.com All contents copyright 2014 McQueen Machine, LLC. All rights reserved. No part of this document or accompanying
BEGINNER S BRIDGE NOTES. Leigh Harding
BEGINNER S BRIDGE NOTES Leigh Harding PLAYING THE CARDS IN TRUMP CONTRACTS Don t play a single card until you have planned how you will make your contract! The plan will influence decisions you will have
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration This JavaScript lab (the last of the series) focuses on indexing, arrays, and iteration, but it also provides another context for practicing with
1.4 Compound Inequalities
Section 1.4 Compound Inequalities 53 1.4 Compound Inequalities This section discusses a technique that is used to solve compound inequalities, which is a phrase that usually refers to a pair of inequalities
EXCEL PIVOT TABLE David Geffen School of Medicine, UCLA Dean s Office Oct 2002
EXCEL PIVOT TABLE David Geffen School of Medicine, UCLA Dean s Office Oct 2002 Table of Contents Part I Creating a Pivot Table Excel Database......3 What is a Pivot Table...... 3 Creating Pivot Tables
A Practical Guide to Technical Indicators; (Part 1) Moving Averages
A Practical Guide to Technical Indicators; (Part 1) Moving Averages By S.A Ghafari Over the past decades, attempts have been made by traders and researchers aiming to find a reliable method to predict
EE 261 Introduction to Logic Circuits. Module #2 Number Systems
EE 261 Introduction to Logic Circuits Module #2 Number Systems Topics A. Number System Formation B. Base Conversions C. Binary Arithmetic D. Signed Numbers E. Signed Arithmetic F. Binary Codes Textbook
Example Hand. Suits Suits are ranked in the following order. Suits Spade (highest rank)
Chinese Poker or 13 Card Poker There are 3 or 4 players (3 in Double Combo variation, 4 in all other variations). Each player is dealt 13 cards. The object is to arrange them into 3 groups: one consisting
Database Design Basics
Database Design Basics Table of Contents SOME DATABASE TERMS TO KNOW... 1 WHAT IS GOOD DATABASE DESIGN?... 2 THE DESIGN PROCESS... 2 DETERMINING THE PURPOSE OF YOUR DATABASE... 3 FINDING AND ORGANIZING
MS Access Lab 2. Topic: Tables
MS Access Lab 2 Topic: Tables Summary Introduction: Tables, Start to build a new database Creating Tables: Datasheet View, Design View Working with Data: Sorting, Filtering Help on Tables Introduction
Analysis of Binary Search algorithm and Selection Sort algorithm
Analysis of Binary Search algorithm and Selection Sort algorithm In this section we shall take up two representative problems in computer science, work out the algorithms based on the best strategy to
DDBA 8438: Introduction to Hypothesis Testing Video Podcast Transcript
DDBA 8438: Introduction to Hypothesis Testing Video Podcast Transcript JENNIFER ANN MORROW: Welcome to "Introduction to Hypothesis Testing." My name is Dr. Jennifer Ann Morrow. In today's demonstration,
Sorting, Subtotals and Outlines in Microsoft Excel 2003
Sorting, Subtotals and Outlines in Microsoft Excel 2003 Introduction This document covers both the simple and more advanced sorting facilities in Excel and also introduces you to subtotals and outlines.
The phrases above are divided by their function. What is each section of language used to do?
Functional language for IELTS Speaking correction and brainstorming Work in pairs to correct all the phrases below. I have ever I have personally experience of this. My most favourite is I prefer than
Quick Tricks for Multiplication
Quick Tricks for Multiplication Why multiply? A computer can multiply thousands of numbers in less than a second. A human is lucky to multiply two numbers in less than a minute. So we tend to have computers
THIS CHAPTER studies several important methods for sorting lists, both contiguous
Sorting 8 THIS CHAPTER studies several important methods for sorting lists, both contiguous lists and linked lists. At the same time, we shall develop further tools that help with the analysis of algorithms
Finding the last cell in an Excel range Using built in Excel functions to locate the last cell containing data in a range of cells.
Finding the last cell in an Excel range Using built in Excel functions to locate the last cell containing data in a range of cells. There are all sorts of times in Excel when you will need to find the
Using Mail Merge in Microsoft Word 2003
Using Mail Merge in Microsoft Word 2003 Mail Merge Created: 12 April 2005 Note: You should be competent in Microsoft Word before you attempt this Tutorial. Open Microsoft Word 2003 Beginning the Merge
Combinatorics 3 poker hands and Some general probability
Combinatorics 3 poker hands and Some general probability Play cards 13 ranks Heart 4 Suits Spade Diamond Club Total: 4X13=52 cards You pick one card from a shuffled deck. What is the probability that it
Local Search Results Success
Local Search Results Success How To Get Your Business Website to the Top of Google Local Search Results Quickly and for FREE www.buildawebsiteacademy.com All rights reserved. This publication is designed
SPSS: Getting Started. For Windows
For Windows Updated: August 2012 Table of Contents Section 1: Overview... 3 1.1 Introduction to SPSS Tutorials... 3 1.2 Introduction to SPSS... 3 1.3 Overview of SPSS for Windows... 3 Section 2: Entering
Introduction To The 2 Over 1 Game Force System Part 1
Introduction To The 2 Over 1 Game Force System Part 1 This is the first of two articles introducing the basic principles of the 2 Over 1 Game Force bidding system. In this article, I will discuss auctions
GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT. Course Curriculum. DATA STRUCTURES (Code: 3330704)
GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT Course Curriculum DATA STRUCTURES (Code: 3330704) Diploma Programme in which this course is offered Semester in which offered Computer Engineering,
Working with whole numbers
1 CHAPTER 1 Working with whole numbers In this chapter you will revise earlier work on: addition and subtraction without a calculator multiplication and division without a calculator using positive and
Functions Recursion. C++ functions. Declare/prototype. Define. Call. int myfunction (int ); int myfunction (int x){ int y = x*x; return y; }
Functions Recursion C++ functions Declare/prototype int myfunction (int ); Define int myfunction (int x){ int y = x*x; return y; Call int a; a = myfunction (7); function call flow types type of function
Getting Started with WebSite Tonight
Getting Started with WebSite Tonight WebSite Tonight Getting Started Guide Version 3.0 (12.2010) Copyright 2010. All rights reserved. Distribution of this work or derivative of this work is prohibited
Everything you wanted to know about using Hexadecimal and Octal Numbers in Visual Basic 6
Everything you wanted to know about using Hexadecimal and Octal Numbers in Visual Basic 6 Number Systems No course on programming would be complete without a discussion of the Hexadecimal (Hex) number
Data Structures. Chapter 8
Chapter 8 Data Structures Computer has to process lots and lots of data. To systematically process those data efficiently, those data are organized as a whole, appropriate for the application, called a
Solutions of Linear Equations in One Variable
2. Solutions of Linear Equations in One Variable 2. OBJECTIVES. Identify a linear equation 2. Combine like terms to solve an equation We begin this chapter by considering one of the most important tools
Fusion's runtime does its best to match the animation with the movement of the character. It does this job at three different levels :
The Animation Welcome to the eight issue of our Multimedia Fusion tutorials. This issue will discuss how the Fusion runtime handle sprites animations. All the content of this tutorial is applicable to
Sudoku puzzles and how to solve them
Sudoku puzzles and how to solve them Andries E. Brouwer 2006-05-31 1 Sudoku Figure 1: Two puzzles the second one is difficult A Sudoku puzzle (of classical type ) consists of a 9-by-9 matrix partitioned
Outline. Introduction Linear Search. Transpose sequential search Interpolation search Binary search Fibonacci search Other search techniques
Searching (Unit 6) Outline Introduction Linear Search Ordered linear search Unordered linear search Transpose sequential search Interpolation search Binary search Fibonacci search Other search techniques
Algorithms. Margaret M. Fleck. 18 October 2010
Algorithms Margaret M. Fleck 18 October 2010 These notes cover how to analyze the running time of algorithms (sections 3.1, 3.3, 4.4, and 7.1 of Rosen). 1 Introduction The main reason for studying big-o
Computer Science 281 Binary and Hexadecimal Review
Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two
5. Tutorial. Starting FlashCut CNC
FlashCut CNC Section 5 Tutorial 259 5. Tutorial Starting FlashCut CNC To start FlashCut CNC, click on the Start button, select Programs, select FlashCut CNC 4, then select the FlashCut CNC 4 icon. A dialog
Introduction. What is RAID? The Array and RAID Controller Concept. Click here to print this article. Re-Printed From SLCentral
Click here to print this article. Re-Printed From SLCentral RAID: An In-Depth Guide To RAID Technology Author: Tom Solinap Date Posted: January 24th, 2001 URL: http://www.slcentral.com/articles/01/1/raid
Unit 1. 5. Write iterative and recursive C functions to find the greatest common divisor of two integers. [6]
Unit 1 1. Write the following statements in C : [4] Print the address of a float variable P. Declare and initialize an array to four characters a,b,c,d. 2. Declare a pointer to a function f which accepts
arrays C Programming Language - Arrays
arrays So far, we have been using only scalar variables scalar meaning a variable with a single value But many things require a set of related values coordinates or vectors require 3 (or 2, or 4, or more)
Activation of your SeKA account
Activation of your SeKA account You need to do this, if you haven't set your password yet in the SeKA system. If you have already activated your SeKA account, but can't remember your password, use Forgotten
Common Data Structures
Data Structures 1 Common Data Structures Arrays (single and multiple dimensional) Linked Lists Stacks Queues Trees Graphs You should already be familiar with arrays, so they will not be discussed. Trees
Base Conversion written by Cathy Saxton
Base Conversion written by Cathy Saxton 1. Base 10 In base 10, the digits, from right to left, specify the 1 s, 10 s, 100 s, 1000 s, etc. These are powers of 10 (10 x ): 10 0 = 1, 10 1 = 10, 10 2 = 100,
Sentence Blocks. Sentence Focus Activity. Contents
Sentence Focus Activity Sentence Blocks Contents Instructions 2.1 Activity Template (Blank) 2.7 Sentence Blocks Q & A 2.8 Sentence Blocks Six Great Tips for Students 2.9 Designed specifically for the Talk
