Problem A Low Cost Air Travel Input File: air.in
|
|
|
- Kerry Price
- 10 years ago
- Views:
Transcription
1 Problem A Low Cost Air Travel Input File: air.in Air fares are crazy! The cost of a ticket is determined by numerous factors, and is usually not directly related to the distance traveled. Many travelers try to be creative, sometimes using only parts of tickets with stops in various cities to achieve lower-cost travel. However, the airlines are aware of this behavior, and usually require that the travel covered by a ticket be completed in order and without intervening travel. For example, if you have a ticket for travel from City-1 to City-2 then to City-3, you are not allowed to use only the portion of the ticket for travel from City-2 to City-3. You must always start at the first city on the ticket. In addition, you are not allowed to travel from City-1 to City-2, fly elsewhere and return, and then continue your journey from City-2 to City-3. Let s consider an example. Suppose you are allowed to purchase three types of tickets: Ticket #1: City-1 to City-3 to City-4 $ Ticket #2: City-1 to City-2 $ Ticket #3: City-2 to City-3 $50.00 Suppose you wanted to travel from City-1 to City-3. There are two ways to get there using only the available ticket choices: Purchase Ticket #1 for $ and use only the first leg of the ticket. Purchase Ticket #2 for $ and Ticket #3 for $50. The first choice is the cheapest. Given a set of airline ticket offers, and one or more trip itineraries, you must determine how to purchase tickets in order to minimize the cost of travel. Each trip will be possible. Input Input consists of multiple test cases, each describing a set of ticket offers and a set of trip itineraries. Each case begins with a line containing NT, the number of ticket offers, followed by NT offer descriptions, one to a line. Each description consists of a positive integer specifying the price of the ticket, the number of cities in the ticket s route, and then that many cities. Each city in a case has an arbitrary, but unique, integer identification number. Note that several tickets may be purchased from the same offer. The next line contains NI, the number of trips that are to have their cost minimized. NI lines follow, giving the itineraries for each trip. Each line consists of the number of cities in the itinerary (including the starting city), followed by that many city identification numbers, given in the order they are to be visited. There will be no more than 20 ticket offers or 20 itineraries in a test case. Each offer and itinerary lists from 2 to 10 cities. No ticket price exceeds $10,000. Adjacent cities in a route or itinerary will be distinct. Tickets and trips are numbered sequentially in each set, starting with 1. The last case is followed by a line containing a zero. Output For each trip, output two lines containing the case number, the trip number, the minimum cost of the trip, and the numbers of the tickets used for the trip, in the order they will be used. Follow the output format shown below. The output will always be unique.
2 Sample Input Output for the Sample Input Case 1, Trip 1: Cost = 225 Tickets used: 1 Case 2, Trip 1: Cost = 100 Tickets used: 2 Case 2, Trip 2: Cost = 300 Tickets used: 3 1
3 Problem B Remember the A La Mode! Input File: alamode.in Hugh Samston owns the You Want It, Hugh Got It catering service, which has been asked to supply desserts for the participants in this year s ICPC World Finals. Hugh will provide pie slices topped with ice cream at the various social functions scheduled throughout the week. As with any other dedicated entrepreneur, Hugh would like to offer the best service possible, so he has ordered a wide variety of pies and ice creams to satisfy even the most eclectic tastes. Hugh plans to serve each pie slice with a single scoop of ice cream, leaving the exact combination up to the whim of the customer. But of course, as with any other dedicated entrepreneur, Hugh would also like to make as much profit as possible from this enterprise. He knows ahead of time how much profit he can make on each combination of pie slice and ice cream scoop, as well as which combinations of pie and ice cream should never be put together (example: Peppermint Banana Chunk ice cream on Key Lime pie). Given this information, along with the number of slices and scoops he has of each variety of pie and ice cream, Hugh figures he can determine both the minimum and maximum profits he can expect. Since he hopes to be the caterer at subsequent World Finals, he would like a general program to solve this and future problems. Input Input will consist of multiple problem instances. Each problem instance will start with a line containing two integers P (P 50) and I (I 50), indicating the number of types of pie and ice cream, respectively. The next line will contain P integers indicating the number of slices available for each of the pie types. The line after that will contain I integers indicating the number of scoops available for each of the ice cream types. The total number of pie slices will always equal the total number of ice cream scoops available, and it is assumed that all pie slices and ice cream scoops will be used. Each problem instance will end with P lines each containing I floating point numbers indicating the profit for each pie/ice cream combination: the first value indicates the profit if a slice of pie type 0 is topped with a scoop of ice cream type 0; the next value indicates the profit if a slice of pie type 0 is topped with a scoop of ice cream type 1, and so on. A profit value of -1 indicates that no combinations of that pie type and ice cream type should ever be sold. All other integers (number of slices for each type of pie and number of scoops for each type of ice cream) will be less than or equal to 100 and the profit on each one of the pie/ice cream combinations (other than -1) will be larger than 0 and less than or equal to 10, with at most two digits after the decimal point. The last problem instance is followed by a line containing two zeroes. Output For each problem instance, output the problem number (starting at 1) followed by the minimum and maximum profits, using the format shown in the sample output. Display all numbers with two fractional digits. All problem instances are guaranteed to have at least one solution using all of the pie slices and ice cream scoops.
4 Sample Input Output for the Sample Input Problem 1: to Problem 2: to 40.40
5 Problem C Ars Longa Input File: ars.in You have been struck with inspiration, and are designing a beautiful new art sculpture for the foyer of your local museum. For highly important artistic reasons, you are designing it using very specific materials. However, you are not sure if physics is on your side. Will your sculpture actually stand up? The sculpture will be composed of various ball joints weighing 1 kilogram each, and various rods (of negligible weight) connecting the joints. Rods cannot be stretched or compressed, and they can never detach from a joint. However, they are free to rotate around the joints in any direction. The joints that lie on the ground are glued in place; all others are free to move. For simplicity, you may ignore the effects of intersections of rods; each rod exerts force only on the 2 joints connected to it. Also, any joint that is in the air will have at least one rod coming out that is not parallel to the ground. This prevents the degenerate case where a ball is supported only horizontally by a rigid structure. In real life, it would sag just a little. Write a program to determine whether your structure is static (that is, will not immediately move from the effects of gravity). Note that each rod can transmit an arbitrarily large tensional force along its length, and that being static means that the tensional forces at each joint balance the weight of the joint. If the structure is static, you must also determine whether it is stable (that is, will not move if perturbed slightly by pulling its joints). Input The input contains several sculpture descriptions. Every description begins with a line containing integers J and R, the number of joints and rods in the structure, respectively. Joints are numbered from 1 to J. The description continues with J lines, one per joint, each containing 3 floating point numbers giving the x, y, z coordinates of that joint. Following are R lines, one per rod, with 2 distinct integers indicating the joints connected by that rod. Each rod is exactly the right length to connect its joints. The z coordinates will always be non-negative; a z coordinate of 0 indicates that the joint is on the ground and fixed in place. There are at most 100 joints and 100 rods. The last description is followed by a line containing two zeroes. Output For each sculpture description, output NON-STATIC, UNSTABLE, or STABLE, as shown in the sample output.
6 Sample Input Output for the Sample Input Sculpture 1: NON-STATIC Sculpture 2: UNSTABLE Sculpture 3: STABLE
7 Problem D Bipartite Numbers Input File: bipartite.in The executive officers of the company where you work want to send each other encrypted messages. Rather than use off-the-shelf encryption software such as PGP, they have tasked the IT staff with handling the encryption problem. The IT staff decided on a solution that requires public and private integer keys. The idea is that everyone can see your public key, but only you know your private key. Your best friend in the company is a wonderful person but a not-so-wonderful programmer. He has created a publicprivate key scheme as follows. A public key can be any positive integer. The corresponding private key is the smallest bipartite number that is greater than and a multiple of the public key. A bipartite number is any positive integer that contains exactly 2 distinct decimal digits s and t such that s is not 0 and all occurrences of s precede all occurrences of t. For example is bipartite (s is 4 and t is 1), So are 41, , and However, neither nor are bipartite. Notice that the large bipartite number can be nicely described as 12 8 s followed by 5 0 s. You can express any bipartite number using four numbers: m s n t. The numbers s and t are the leading and trailing digits as described above, m is the number of times the digit s appears in the bipartite number, and n is the number of times the digit t appears. The trouble with your friend s scheme is that it is not too difficult to compute a private key if you know the public key. You need to convince your friend that his public-private key scheme is inadequate before he loses his job over his bad decision! You must write a program that takes public keys as input and displays the corresponding private keys. Input The input consists of several test cases. Each test case is on a separate line, and it consists of a single public key in the range The last case is followed by a line containing the integer zero. Output For each test case, display a line consisting of the public key, a colon, then 4 integers m s n t where m, n, s, and t are as described above. Sample Input Output for the Sample Input 125: : :
8
9 Problem E Bit Compressor Input File: bits.in The aim of data compression is to reduce redundancy in stored or communicated data. This increases effective data density and speeds up data transfer rates. One possible method to compress any binary message is the following: Replace any maximal sequence of n 1 s with the binary version of n whenever it shortens the length of the message. For example, the compressed form of the data becomes The original data is 32 bits long while the compressed data is only 17 bits long. The drawback of this method is that sometimes the decompression process yields more than one result for the original message, making it impossible to obtain the original message. Write a program that determines if the original message can be obtained from the compressed data when the length of the original message (L), the number of 1 s in the original message (N) and the compressed data are given. The original message will be no longer than 16 Kbytes and the compressed data will be no longer than 40 bits. Input The input file contains several test cases. Each test case has two lines. The first line contains L and N and the second line contains the compressed data. The last case is followed by a line containing two zeroes. Output For each test case, output a line containing the case number (starting with 1) and a message YES, NO or NOT UNIQUE. YES means that the original message can be obtained. NO means that the compressed data has been corrupted and the original message cannot be obtained. NOT UNIQUE means that more than one message could have been the original message. Follow the format shown in the sample output. Sample Input Output for the Sample Input Case #1: YES Case #2: NOT UNIQUE Case #3: NO
10
11 Problem F Building a Clock Input File: clock.in In Old Town Square in the city of Prague, there is a beautiful Astronomical Clock, constructed in the year For centuries, the clockmaker s art consisted of using gears to connect a shaft, turning at a known rate, to other shafts until, by the proper combination of gears, two shafts could be made to turn at the correct rates to represent minutes and hours. You must write a program that, given an input shaft speed and a collection of gears, computes how the gears can be connected to create a clock with an hour hand and a minute hand. You may use as many shafts as you like, but each shaft may have a maximum of three gears. All the gears on a shaft turn at the same rate. If a gear having T1 teeth turning at a rate R1 is engaged with another gear having T2 teeth, the turning rate of the second gear is R1(T1/T2). Your solution must include two shafts, a minute shaft that turns clockwise at the rate of one revolution per hour, and an hour shaft that turns clockwise at the rate of one revolution per twelve hours. Your solution is not required to use all the available gears. Input The input consists of several trials, each described by one line of input. Each input line begins with an integer N (3 N 6), the number of gears available for building a clock. N is followed by another integer R (-3600 R 3600, R 0), the turning rate of the input shaft, which is the number of revolutions made by the shaft in 24 hours. (A positive number represents clockwise rotation, and a negative number represents counter-clockwise rotation.) R is followed by N gear descriptions. Each gear description is a pair: a one-character name that identifies the gear, followed by an integer T (6 T 120), that is the number of teeth on the gear. The names and numbers on each input line are separated by spaces, as shown in the sample input. The last trial is followed by a line containing a single zero. Output For each trial, print a line containing the trial number, as shown in the sample output. If it is possible to construct a clock using the given set of gears, the line containing the trial number must be followed by two more output lines, one for the minute hand and one for the hour hand. Otherwise, the line containing the trial number must end with the words IS IMPOSSIBLE as shown in the sample output. The lin e for the minute hand starts with Minutes: followed by a plan that shows how the input shaft is connected by a sequence of gears to the minute shaft. The plan consists of a sequence of shafts, separated by hyphens. Each shaft is represented by one or two characters. The first character is the name of the driven gear the gear on the shaft that is engaged with a gear on the previous shaft. For the input shaft, use an asterisk (*) to represent the absence of a driven gear. The second character describing a shaft is the name of the driving gear the gear on the shaft that is engaged with a gear on the next shaft. The driven gear and the driving gear can be the same gear, in which case the shaft is described by a single character which is the name of this gear. The last shaft in the plan is the minute shaft, described by a single letter which is the name of its driven gear. The line for the hour hand starts with Hours: followed by a plan for connecting the input shaft to the hour shaft. Use the same format as the minute plan.
12 Each gear may occur only once in the clock. The minute plan and the hour plan may have an initial part in common, however. A gear in a common initial part will occur both in the minute plan and the hour plan. For the same reason, a given shaft can be used in both the hour plan and the minute plan. If a shaft is used in both plans, it may or may not have the same description in both plans. For example, a shaft containing a single gear named A will be represented as A in both plans. On the other hand, a shaft containing three gears named A, B, and C might be represented as AB in the minute plan (if B is the driving gear in that plan) and as AC in the hour plan (if C is the driving gear in that plan). The following lines represent valid output lines: Hours: *A-BC-D An input shaft having one gear, engaged with an intermediate shaft having two gears, engaged with an hour shaft having one gear. Minutes: *A-B-C Minutes: * An input shaft having one gear, engaged with an intermediate shaft having one gear, engaged with a minute shaft having one gear. A plan in which no gears are needed because the input shaft is turning at the correct rate for the minute shaft. If there are multiple ways to build a clock using the given gears, print the solution that uses the minimum number of shafts. In case of a tie for the minimum number of shafts, print the solution that uses the minimum number of gears. In case of a tie for both the minimum numbers of shafts and gears, print the solution whose string description is alphabetically first. The string description of a solution is its minute plan, followed by its hour plan, concatenated together with asterisks and hyphens removed. For example, a solution in which the minute plan is *A-B and the hour plan is *A-BC-D-E has the string description ABABCDE. Print one blank line between trials. Sample Input 6 40 P 7 Q P 7 Q 84 0 R 50 A 40 B 30 C 14 R 45 A 40 B 30 C 14 Output for the Sample Input Trial 1 Minutes: *B-A-R Hours: *B-A-RP-C-Q Trial 2 IS IMPOSSIBLE
13 Problem G Pilgrimage Input File: pilgrimage.in Jack is making a long distance walk with some friends along the old pilgrim road from Vézelay to Santiago de Compostela. Jack administers money for the group. His administration is quite simple. Whenever an amount ( 60, say) has to be paid for the common good he will pay it, and write in his booklet: PAY 60. When needed, Jack will ask every member of the group, including himself, to pay an amount ( 50, say) to the collective purse, and write in his booklet: COLLECT 50. If the group size is 7, he collects 350 in total. Unfortunately some of the group members cannot participate in the full walk. So sometimes the group will grow, sometimes it will shrink. How does Jack handle these comings and goings of group members in terms of collective money? Suppose, for example, the group size is 7, and that Jack has 140 in cash, which is 20 for every group member. If two group members leave, each will receive 20, and Jack will write in his booklet: OUT 2. If under the same circumstances three new group members arrive, they will each have to pay 20, and Jack will write: IN 3. In these cases the amount in cash could easily be divided, without fractions. As a strange coincidence, this happened during the whole trip. Jack never had to make calculations with fractional numbers of euros. Near the end of the trip, Jack was joined by all his fellow travelers. Nobody was willing to miss the glorious finale of the trip. It was then that Jack tried to remember what the group size had been during each part of the trip. He could not remember. Given a page of Jack's booklet, could you figure out the size of the group at the beginning of that page? Input The input file contains several test cases. Each test case is a sequence of lines in Jack s booklet. The first line of each test case will give the number N (0 < N 50) of lines to follow. The next N lines have the format: <keyword> <num>, where <keyword> = PAY COLLECT IN OUT and <num> is a positive integer, with the following restrictions: IN k k 20 OUT k k 20 COLLECT k k 200 PAY k k 2000 The last case is followed by a line containing a single zero. Output For each test case, print a single line describing the size of the group at the beginning of the part of the trip described in the test case. This line contains: The word IMPOSSIBLE, if the data are inconsistent. A single number giving the size of the group just prior to the sequence of lines in Jack s booklet, if this size is uniquely determined by the data. Several numbers, in increasing order, separated by spaces, giving the possible sizes of the group, in case the number of solutions is finite, but the solution is not unique.
14 A statement in the format: SIZE >= N, giving a lower bound for the size of the group, in case the number of solutions is infinite. Observe that the inequality SIZE >= 1 always applies, since at least Jack himself did the whole trip. Sample Input 5 IN 1 PAY 7 IN 1 PAY 7 IN 1 7 IN 1 COLLECT 20 PAY 30 PAY 12 IN 2 PAY 30 OUT 3 3 IN 1 PAY 8 OUT 3 1 OUT 5 0 Output for the Sample Input IMPOSSIBLE SIZE >= 6
15 Problem H Pockets Input File: pockets.in Origami, or the art of paper folding, often makes use of pockets of paper, particularly in complicated models made from multiple pieces of paper where a tab on one piece of paper needs to fit into a pocket in another piece of paper. In this problem you must count pockets in a flat folded square of paper. A pocket is defined as any opening (lying between two surfaces of paper) that is accessible from the boundary of the folded piece of paper. Note that one accessible opening can account for several pockets since each open side contributes one pocket. Figure 1 shows an example. Observe that the middle opening (between the second and third layers of paper) contributes 3 to the total pocket count. One pocket on left, three on top, three on right Figure 1: Pockets Assume the paper is initially lying on a flat surface and is never completely lifted from the surface. All folds will be horizontal or vertical. Fold lines will fall only along equally-spaced crease lines, N in each direction. On the original unfolded square, creases and edges are numbered from top to bottom and from left to right as shown in Figure 2. Each fold reduces the boundary of the folded piece of paper to a smaller rectangle; the final fold results in a square one unit in each direction. Folds are described using a crease line and a direction. For instance, 2 U means to fold the bottom edge up using horizontal crease 2; 1 L means to fold the right edge to the left using crease 1. (See Figure 2.) After several folds, creases may be aligned (for instance, creases 1 and 3 in Figure 2). Either number may be used to specify a fold along that line (so, in Figure 2, 1 D and 3 D are equivalent instructions after the first fold). Pockets are to be counted for the boundary of the final one-unit square. Once a crease is made it cannot be undone. All creases go through every layer of paper from top to bottom; disregard paper thickness. 1 1,3 1, Figure 2: The sequence 2 U, 1 L.
16 Input Input is a sequence of test cases. Each test case begins with a line containing two integers, N and K. N is the number of horizontal crease lines (the same as the number of vertical crease lines) of the square. Creases are numbered 1, 2,..., N from top to bottom and from left to right. K is the number of folds to be made. N and K are each less than or equal to 64. Following N and K are K fold descriptions. Each fold description consists of an integer crease number C and a direction, either U, D, L, or R (for up, down, left or right) separated by whitespace. Whitespace also precedes and follows each fold description. The final result for each test case will be a square one unit in size. The final test case is followed by a line containing two zeroes. Output For each input case, display the case number followed by the number of pockets in the final one-unit square. Use the format shown in the sample output. Sample Input R 1 U U 1 L 3 D 3 R 2 L 0 0 Output for the Sample Input Case 1: 7 pockets Case 2: 17 pockets
17 Problem I Degrees of Separation Input File: relatives.in In our increasingly interconnected world, it has been speculated that everyone on Earth is related to everyone else by no more than six degrees of separation. In this problem, you must write a program to find the maximum degree of separation for a network of people. For any two people, the degree of separation is the minimum number of relationships that must be traversed to connect the two people. For a network, the maximum degree of separation is the largest degree of separation between any two people in the network. If there is a pair of people in the network who are not connected by a chain of relationships, the network is disconnected. As shown below, a network can be described as a set of symmetric relationships each of which connects two people. A line represents a relationship between two people. Network A illustrates a network with 2 as the maximum degree of separation. Network B is disconnected. Ashok Ashok Ursala Chun Ursala Chun Kiyoshi Kiyoshi Network A: Max. degree of separation = 2 Network B: Disconnected Input The input consists of data sets that describe networks of people. For each data set, the first line has two integers: P (2 P 50), the number of people in the network, and R (R 1), the number of network relationships. Following that first line are R relationships. Each relationship consists of two strings that are names of people in the network who are related. Names are unique and contain no blank spaces. Because a person may be related to more than one other person, a name may appear multiple times in a data set. The final test case is followed by a line containing two zeroes. Output For each network, display the network number followed by the maximum degree of separation. If the network is disconnected, display DISCONNECTED. Display a blank line after the output for each network. Use the format illustrated in the sample output.
18 Sample Input 4 4 Ashok Kiyoshi Ursala Chun Ursala Kiyoshi Kiyoshi Chun 4 2 Ashok Chun Ursala Kiyoshi 6 5 Bubba Cooter Ashok Kiyoshi Ursala Chun Ursala Kiyoshi Kiyoshi Chun 0 0 Output for the Sample Input Network 1: 2 Network 2: DISCONNECTED Network 3: DISCONNECTED
19 Problem J Routing Input: routing.in As more and more transactions between companies and people are being carried out electronically over the Internet, secure communications have become an important concern. The Internet Cryptographic Protocol Company (ICPC) specializes in secure business-to-business transactions carried out over a network. The system developed by ICPC is peculiar in the way it is deployed in the network. A network like the Internet can be modeled as a directed graph: nodes represent machines or routers, and edges correspond to direct connections, where data can be transmitted along the direction of an edge. For two nodes to communicate, they have to transmit their data along directed paths from the first node to the second, and from the second node to the first. Figure: An arrow from node X to node Y means that it is possible to connect to node Y from node X but not vice versa. If software is installed on nodes 1, 2, 7, and 8, then communication is possible between node 1 and node 2. Other configurations are also possible but this is the minimum cost option. This figure corresponds to the first sample input. To perform a secure transaction, ICPC s system requires the installation of their software not only on the two endnodes that want to communicate, but also on all intermediate nodes on the two paths connecting the end-nodes. Since ICPC charges customers according to how many copies of their software have to be installed, it would be interesting to have a program that for any network and end-node pair finds the cheapest way to connect the nodes.
20 Input The input consists of several descriptions of networks. The first line of each description contains two integers N and M (2 N 100), the number of nodes and edges in the network, respectively. The nodes in the network are labeled 1, 2,..., N, where nodes 1 and 2 are the ones that want to communicate. The first line of the description is followed by M lines containing two integers X and Y (1 X, Y N), denoting that there is a directed edge from X to Y in the network. The last description is followed by a line containing two zeroes. Output For each network description in the input, display its number in the sequence of descriptions. Then display the minimum number of nodes on which the software has to be installed, such that there is a directed path from node 1 to node 2 using only the nodes with the software, and also a path from node 2 to node 1 with the same property. (Note that a node can be on both paths but a path need not contain all the nodes.) The count should include nodes 1 and 2. If node 1 and 2 cannot communicate, display IMPOSSIBLE instead. Follow the format in the sample given below, and display a blank line after each test case. Sample Input Output for the Sample Input Network 1 Minimum number of nodes = 4 Network 2 IMPOSSIBLE
Third Southern African Regional ACM Collegiate Programming Competition. Sponsored by IBM. Problem Set
Problem Set Problem 1 Red Balloon Stockbroker Grapevine Stockbrokers are known to overreact to rumours. You have been contracted to develop a method of spreading disinformation amongst the stockbrokers
Baltic Way 1995. Västerås (Sweden), November 12, 1995. Problems and solutions
Baltic Way 995 Västerås (Sweden), November, 995 Problems and solutions. Find all triples (x, y, z) of positive integers satisfying the system of equations { x = (y + z) x 6 = y 6 + z 6 + 3(y + z ). Solution.
Solving Simultaneous Equations and Matrices
Solving Simultaneous Equations and Matrices The following represents a systematic investigation for the steps used to solve two simultaneous linear equations in two unknowns. The motivation for considering
Copyright 2011 Casa Software Ltd. www.casaxps.com. Centre of Mass
Centre of Mass A central theme in mathematical modelling is that of reducing complex problems to simpler, and hopefully, equivalent problems for which mathematical analysis is possible. The concept of
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Anamorphic Projection Photographic Techniques for setting up 3D Chalk Paintings
Anamorphic Projection Photographic Techniques for setting up 3D Chalk Paintings By Wayne and Cheryl Renshaw. Although it is centuries old, the art of street painting has been going through a resurgence.
Process Modeling Notations and Workflow Patterns
Process Modeling Notations and Workflow Patterns Stephen A. White, IBM Corp., United States ABSTRACT The research work of Wil van der Aalst, Arthur ter Hofstede, Bartek Kiepuszewski, and Alistair Barros
If A is divided by B the result is 2/3. If B is divided by C the result is 4/7. What is the result if A is divided by C?
Problem 3 If A is divided by B the result is 2/3. If B is divided by C the result is 4/7. What is the result if A is divided by C? Suggested Questions to ask students about Problem 3 The key to this question
Chapter 11 Equilibrium
11.1 The First Condition of Equilibrium The first condition of equilibrium deals with the forces that cause possible translations of a body. The simplest way to define the translational equilibrium of
Intro to Excel spreadsheets
Intro to Excel spreadsheets What are the objectives of this document? The objectives of document are: 1. Familiarize you with what a spreadsheet is, how it works, and what its capabilities are; 2. Using
Graph Theory Problems and Solutions
raph Theory Problems and Solutions Tom Davis [email protected] http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is
Field Application Note
Field Application Note Reverse Dial Indicator Alignment RDIA Mis-alignment can be the most usual cause for unacceptable operation and high vibration levels. New facilities or new equipment installations
13. Write the decimal approximation of 9,000,001 9,000,000, rounded to three significant
æ If 3 + 4 = x, then x = 2 gold bar is a rectangular solid measuring 2 3 4 It is melted down, and three equal cubes are constructed from this gold What is the length of a side of each cube? 3 What is the
Encoding Text with a Small Alphabet
Chapter 2 Encoding Text with a Small Alphabet Given the nature of the Internet, we can break the process of understanding how information is transmitted into two components. First, we have to figure out
Statically Indeterminate Structure. : More unknowns than equations: Statically Indeterminate
Statically Indeterminate Structure : More unknowns than equations: Statically Indeterminate 1 Plane Truss :: Determinacy No. of unknown reactions = 3 No. of equilibrium equations = 3 : Statically Determinate
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
PHY121 #8 Midterm I 3.06.2013
PHY11 #8 Midterm I 3.06.013 AP Physics- Newton s Laws AP Exam Multiple Choice Questions #1 #4 1. When the frictionless system shown above is accelerated by an applied force of magnitude F, the tension
Gravity. in the Solar System. Beyond the Book. FOCUS Book
FOCUS Book Design a test to find out whether Earth s gravity always pulls straight down. A pendulum is a weight that hangs from a string or rod that can swing back and forth. Use string and metal washers
Chapter 2 An Introduction to Forwards and Options
Chapter 2 An Introduction to Forwards and Options Question 2.1. The payoff diagram of the stock is just a graph of the stock price as a function of the stock price: In order to obtain the profit diagram
Solutions to Exercises, Section 5.1
Instructor s Solutions Manual, Section 5.1 Exercise 1 Solutions to Exercises, Section 5.1 1. Find all numbers t such that ( 1 3,t) is a point on the unit circle. For ( 1 3,t)to be a point on the unit circle
Task: ASC Ascending Paths
Task: ASC Ascending Paths You are visiting the Royal Botanical Gardens. In the gardens there are n intersections connected by m roads. The intersections are numbered from 1 to n. Each road connects two
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:
CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm
Linkage 3.2. User s Guide
Linkage 3.2 User s Guide David Rector Wednesday, April 06, 2016 Table of Contents Table of Contents... 2 Installation... 3 Running the Linkage Program... 3 Simple Mechanism Tutorial... 5 Mouse Operations...
C H A P T E R Regular Expressions regular expression
7 CHAPTER Regular Expressions Most programmers and other power-users of computer systems have used tools that match text patterns. You may have used a Web search engine with a pattern like travel cancun
Blender Notes. Introduction to Digital Modelling and Animation in Design Blender Tutorial - week 9 The Game Engine
Blender Notes Introduction to Digital Modelling and Animation in Design Blender Tutorial - week 9 The Game Engine The Blender Game Engine This week we will have an introduction to the Game Engine build
Arithmetic Coding: Introduction
Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
Advanced Topics: IP Subnetting A WHITE PAPER PREPARED FOR ASPE TECHNOLOGY. www.aspetech.com toll-free: 877-800-5221
Advanced Topics: IP Subnetting A WHITE PAPER PREPARED FOR ASPE TECHNOLOGY www.aspetech.com toll-free: 877-800-5221 Advanced Topics IP Subnetting It is almost impossible to lay out an IP network without
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
YOU CAN COUNT ON NUMBER LINES
Key Idea 2 Number and Numeration: Students use number sense and numeration to develop an understanding of multiple uses of numbers in the real world, the use of numbers to communicate mathematically, and
Overall Indicator: The student: recognizes the effects of forces acting on structures and mechanisms
Grade 5 Performance Task: Disaster Recovery Content Connections Assessment Criterion Understanding of basic concepts Overall Indicator: The student: recognizes the effects of forces acting on structures
FURTHER VECTORS (MEI)
Mathematics Revision Guides Further Vectors (MEI) (column notation) Page of MK HOME TUITION Mathematics Revision Guides Level: AS / A Level - MEI OCR MEI: C FURTHER VECTORS (MEI) Version : Date: -9-7 Mathematics
OPRE 6201 : 2. Simplex Method
OPRE 6201 : 2. Simplex Method 1 The Graphical Method: An Example Consider the following linear program: Max 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2
Highly Available Service Environments Introduction
Highly Available Service Environments Introduction This paper gives a very brief overview of the common issues that occur at the network, hardware, and application layers, as well as possible solutions,
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph
Coding and decoding with convolutional codes. The Viterbi Algor
Coding and decoding with convolutional codes. The Viterbi Algorithm. 8 Block codes: main ideas Principles st point of view: infinite length block code nd point of view: convolutions Some examples Repetition
Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
VELOCITY, ACCELERATION, FORCE
VELOCITY, ACCELERATION, FORCE velocity Velocity v is a vector, with units of meters per second ( m s ). Velocity indicates the rate of change of the object s position ( r ); i.e., velocity tells you how
System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1
System Interconnect Architectures CSCI 8150 Advanced Computer Architecture Hwang, Chapter 2 Program and Network Properties 2.4 System Interconnect Architectures Direct networks for static connections Indirect
Primes. Name Period Number Theory
Primes Name Period A Prime Number is a whole number whose only factors are 1 and itself. To find all of the prime numbers between 1 and 100, complete the following exercise: 1. Cross out 1 by Shading in
Lecture 6. Weight. Tension. Normal Force. Static Friction. Cutnell+Johnson: 4.8-4.12, second half of section 4.7
Lecture 6 Weight Tension Normal Force Static Friction Cutnell+Johnson: 4.8-4.12, second half of section 4.7 In this lecture, I m going to discuss four different kinds of forces: weight, tension, the normal
Formal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
Table and field properties Tables and fields also have properties that you can set to control their characteristics or behavior.
Create a table When you create a database, you store your data in tables subject-based lists that contain rows and columns. For instance, you can create a Contacts table to store a list of names, addresses,
Structural Integrity Analysis
Structural Integrity Analysis 1. STRESS CONCENTRATION Igor Kokcharov 1.1 STRESSES AND CONCENTRATORS 1.1.1 Stress An applied external force F causes inner forces in the carrying structure. Inner forces
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 06 Basics of Real-Time Task Scheduling Let us get started.
IN current film media, the increase in areal density has
IEEE TRANSACTIONS ON MAGNETICS, VOL. 44, NO. 1, JANUARY 2008 193 A New Read Channel Model for Patterned Media Storage Seyhan Karakulak, Paul H. Siegel, Fellow, IEEE, Jack K. Wolf, Life Fellow, IEEE, and
What are the place values to the left of the decimal point and their associated powers of ten?
The verbal answers to all of the following questions should be memorized before completion of algebra. Answers that are not memorized will hinder your ability to succeed in geometry and algebra. (Everything
Social Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
Physics: Principles and Applications, 6e Giancoli Chapter 4 Dynamics: Newton's Laws of Motion
Physics: Principles and Applications, 6e Giancoli Chapter 4 Dynamics: Newton's Laws of Motion Conceptual Questions 1) Which of Newton's laws best explains why motorists should buckle-up? A) the first law
Introduction to Python
WEEK ONE Introduction to Python Python is such a simple language to learn that we can throw away the manual and start with an example. Traditionally, the first program to write in any programming language
7.2 Quadratic Equations
476 CHAPTER 7 Graphs, Equations, and Inequalities 7. Quadratic Equations Now Work the Are You Prepared? problems on page 48. OBJECTIVES 1 Solve Quadratic Equations by Factoring (p. 476) Solve Quadratic
+ 4θ 4. We want to minimize this function, and we know that local minima occur when the derivative equals zero. Then consider
Math Xb Applications of Trig Derivatives 1. A woman at point A on the shore of a circular lake with radius 2 miles wants to arrive at the point C diametrically opposite A on the other side of the lake
Random Map Generator v1.0 User s Guide
Random Map Generator v1.0 User s Guide Jonathan Teutenberg 2003 1 Map Generation Overview...4 1.1 Command Line...4 1.2 Operation Flow...4 2 Map Initialisation...5 2.1 Initialisation Parameters...5 -w xxxxxxx...5
Midterm Solutions. mvr = ω f (I wheel + I bullet ) = ω f 2 MR2 + mr 2 ) ω f = v R. 1 + M 2m
Midterm Solutions I) A bullet of mass m moving at horizontal velocity v strikes and sticks to the rim of a wheel a solid disc) of mass M, radius R, anchored at its center but free to rotate i) Which of
CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
The purposes of this experiment are to test Faraday's Law qualitatively and to test Lenz's Law.
260 17-1 I. THEORY EXPERIMENT 17 QUALITATIVE STUDY OF INDUCED EMF Along the extended central axis of a bar magnet, the magnetic field vector B r, on the side nearer the North pole, points away from this
NCTM Content Standard/National Science Education Standard
Title: BASE-ic Space Travel Brief Overview: This unit introduces the concepts of bases and exponents (or powers) in order to gain a deeper understanding of place value. Students will assume the role of
The Problem with Faxing over VoIP Channels
The Problem with Faxing over VoIP Channels Lower your phone bill! is one of many slogans used today by popular Voice over IP (VoIP) providers. Indeed, you may certainly save money by leveraging an existing
WPA World Artistic Pool Championship. Official Shot / Challenge Program. November 8, 2011 1
WPA World Artistic Pool Championship 2012 Official Shot / Challenge Program November 8, 2011 1 Revision History November 30, 2010: Initial version of shot program. January 10, 2011: February 14, 2011:
Magic Word. Possible Answers: LOOSER WINNER LOTTOS TICKET. What is the magic word?
Magic Word Question: A magic word is needed to open a box. A secret code assigns each letter of the alphabet to a unique number. The code for the magic word is written on the outside of the box. What is
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
Get to Know Golf! John Dunigan
Get to Know Golf! John Dunigan Get to Know Golf is an initiative designed to promote the understanding the laws that govern ball flight. This information will help golfers develop the most important skill
6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010. Class 4 Nancy Lynch
6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010 Class 4 Nancy Lynch Today Two more models of computation: Nondeterministic Finite Automata (NFAs)
Gear Trains. Introduction:
Gear Trains Introduction: Sometimes, two or more gears are made to mesh with each other to transmit power from one shaft to another. Such a combination is called gear train or train of toothed wheels.
Dynamic Programming 11.1 AN ELEMENTARY EXAMPLE
Dynamic Programming Dynamic programming is an optimization approach that transforms a complex problem into a sequence of simpler problems; its essential characteristic is the multistage nature of the optimization
(Refer Slide Time: 01.26)
Discrete Mathematical Structures Dr. Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture # 27 Pigeonhole Principle In the next few lectures
SECTION 2-1: OVERVIEW SECTION 2-2: FREQUENCY DISTRIBUTIONS
SECTION 2-1: OVERVIEW Chapter 2 Describing, Exploring and Comparing Data 19 In this chapter, we will use the capabilities of Excel to help us look more carefully at sets of data. We can do this by re-organizing
Udacity cs101: Building a Search Engine. Extracting a Link
Udacity cs101: Building a Search Engine Unit 1: How to get started: your first program Extracting a Link Introducing the Web Crawler (Video: Web Crawler)... 2 Quiz (Video: First Quiz)...2 Programming (Video:
39 Symmetry of Plane Figures
39 Symmetry of Plane Figures In this section, we are interested in the symmetric properties of plane figures. By a symmetry of a plane figure we mean a motion of the plane that moves the figure so that
1 Solving LPs: The Simplex Algorithm of George Dantzig
Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.
Physics 2A, Sec B00: Mechanics -- Winter 2011 Instructor: B. Grinstein Final Exam
Physics 2A, Sec B00: Mechanics -- Winter 2011 Instructor: B. Grinstein Final Exam INSTRUCTIONS: Use a pencil #2 to fill your scantron. Write your code number and bubble it in under "EXAM NUMBER;" an entry
136 CHAPTER 4. INDUCTION, GRAPHS AND TREES
136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics
Equilibrium: Illustrations
Draft chapter from An introduction to game theory by Martin J. Osborne. Version: 2002/7/23. [email protected] http://www.economics.utoronto.ca/osborne Copyright 1995 2002 by Martin J. Osborne.
Graphs without proper subgraphs of minimum degree 3 and short cycles
Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract
Section 1.1. Introduction to R n
The Calculus of Functions of Several Variables Section. Introduction to R n Calculus is the study of functional relationships and how related quantities change with each other. In your first exposure to
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Informatica e Sistemi in Tempo Reale
Informatica e Sistemi in Tempo Reale Introduction to C programming Giuseppe Lipari http://retis.sssup.it/~lipari Scuola Superiore Sant Anna Pisa October 25, 2010 G. Lipari (Scuola Superiore Sant Anna)
Using Excel for Analyzing Survey Questionnaires Jennifer Leahy
University of Wisconsin-Extension Cooperative Extension Madison, Wisconsin PD &E Program Development & Evaluation Using Excel for Analyzing Survey Questionnaires Jennifer Leahy G3658-14 Introduction You
Prentice Hall Connected Mathematics 2, 7th Grade Units 2009
Prentice Hall Connected Mathematics 2, 7th Grade Units 2009 Grade 7 C O R R E L A T E D T O from March 2009 Grade 7 Problem Solving Build new mathematical knowledge through problem solving. Solve problems
PLANE TRUSSES. Definitions
Definitions PLANE TRUSSES A truss is one of the major types of engineering structures which provides a practical and economical solution for many engineering constructions, especially in the design of
Regular Expressions. General Concepts About Regular Expressions
Regular Expressions This appendix explains regular expressions and how to use them in Cisco IOS software commands. It also provides details for composing regular expressions. This appendix has the following
Drawing a histogram using Excel
Drawing a histogram using Excel STEP 1: Examine the data to decide how many class intervals you need and what the class boundaries should be. (In an assignment you may be told what class boundaries to
11.1. Objectives. Component Form of a Vector. Component Form of a Vector. Component Form of a Vector. Vectors and the Geometry of Space
11 Vectors and the Geometry of Space 11.1 Vectors in the Plane Copyright Cengage Learning. All rights reserved. Copyright Cengage Learning. All rights reserved. 2 Objectives! Write the component form of
Vocabulary Words and Definitions for Algebra
Name: Period: Vocabulary Words and s for Algebra Absolute Value Additive Inverse Algebraic Expression Ascending Order Associative Property Axis of Symmetry Base Binomial Coefficient Combine Like Terms
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
The Grey Nomad s Guide to Satellite Dish Setup Procedures.
The Grey Nomad s Guide to Satellite Dish Setup Procedures. Compiled and written by Ronald H Tew of The Wandering Tews Issue 10, 7 th December 2010. Web site: www.wanderingtews.com 1 About this Document.
INDEX. SR NO NAME OF THE PRACTICALS Page No. Measuring the bearing of traverse lines, calculation of included angles and check.
INDEX SR NO NAME OF THE PRACTICALS Page No 1 Measuring the bearing of traverse lines, calculation of included angles and check. 1 2 To study the essential parts of dumpy level & reduction of levels 3 To
Elfring Fonts, Inc. PCL MICR Fonts
Elfring Fonts, Inc. PCL MICR Fonts This package contains five MICR fonts (also known as E-13B), to print magnetic encoding on checks, and six Secure Number fonts, to print check amounts. These fonts come
Linear Programming I
Linear Programming I November 30, 2003 1 Introduction In the VCR/guns/nuclear bombs/napkins/star wars/professors/butter/mice problem, the benevolent dictator, Bigus Piguinus, of south Antarctica penguins
Chapter 6: Graph Theory
Chapter 6: Graph Theory Graph theory deals with routing and network problems and if it is possible to find a best route, whether that means the least expensive, least amount of time or the least distance.
The Graphical Method: An Example
The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,
Exam Three Momentum Concept Questions
Exam Three Momentum Concept Questions Isolated Systems 4. A car accelerates from rest. In doing so the absolute value of the car's momentum changes by a certain amount and that of the Earth changes by:
