电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本

算法课件全121301ADA09减治法减常因子算法I

25页
  • 卖家[上传人]:E****
  • 文档编号:91095432
  • 上传时间:2019-06-21
  • 文档格式:PPT
  • 文档大小:703KB
  • / 25 举报 版权申诉 马上下载
  • 文本预览
  • 下载提示
  • 常见问题
    • 1、Decrease and Conquer (I),Chapter 5,Introduction to Decrease-and-Conquer Decrease-by-a-Constant-Factor Algorithms The Binary Search Fake-coin Problem Russian Peasant Multiplication Josephus Problem,2019/6/21,3,2012-2013-01 Design and Analysis of Algorithm SCUN,Goals of the Lecture,At the end of this lecture, you should Master the basic idea and all kinds of variations of decrease and conquer technique Master the binary search algorithm and its best-case, worst-case and average-case analysis Under

      2、stand the fake coin problem and its solution Be familiar with the Russian peasant multiplication method Understand the josephus problem and its solution,2019/6/21,4,2012-2013-01 Design and Analysis of Algorithm SCUN,Decrease-and-Conquer (basic idea),Reduce problem instance to smaller instance of the same problem Solve smaller instance Extend solution of smaller instance to obtain solution to original instance,2019/6/21,5,2012-2013-01 Design and Analysis of Algorithm SCUN,3 Types of Decrease and

      3、Conquer,Decrease by a constant (usually by 1) Insertion sort Graph traversal algorithms (DFS and BFS) Algorithms for generating permutations, subsets Decrease by a constant factor (usually by half) Binary search Fake-coin problem Russian peasant multiplication Josephus problem Variable-size decrease Euclids algorithm The kth smallest element find algorithm Interpolation search,2019/6/21,6,2012-2013-01 Design and Analysis of Algorithm SCUN,Whats the difference? (example),Brute Force:,Consider the

      4、 problem of exponentiation: an,Divide and conquer:,Decrease by one:,Decrease by constant factor:,The Application of Decrease by a constant factor technique,Search problem The binary search (S4.3, P135-139) Numerical problem Russian peasant multiplication (S5.5) Combinatorial problem Fake-coin problem (S5.5) Josephus problem (S5.5),2019/6/21,8,2012-2013-01 Design and Analysis of Algorithm SCUN,Binary Search (basic idea),If the key is larger than the middle element, the key must be in the second h

      5、alf,r1 rmid-1 rmid rmid+1 rn,k,k rmid,k rmid,(mid=(1+n)/2), , ,Used with a sorted list (the list is in increasing order),First check the middle list element,If the key matches the middle element, we are done,If the key is smaller than the middle element, the key must be in the first half,2019/6/21,9,2012-2013-01 Design and Analysis of Algorithm SCUN,Binary search example:Find the key value 14,0 1 2 3 4 5 6 7 8 9 10 11 12,3 14 27 31 39 42 55 70 74 81 85 93 98,5514,2714,314,14=14,2019/6/21,10,2012

      6、-2013-01 Design and Analysis of Algorithm SCUN,The Binary Search Algorithm,BinarySearchNR(A0n-1, K) /Input: An array A sorted in ascending order and a search K /Output: An index of the arrays element that is equal to K or -1 if there is no such element l 0; r n-1 while l r do m (l+r)/2 if K = Am return m else if K Am r m-1 else l m+1 return -1,Thinking: How to rewrite this algorithm in recursive format?,2019/6/21,11,2012-2013-01 Design and Analysis of Algorithm SCUN,Best-case Analysis,The input

      7、instances in which the target matches the middle element will lead to the best case.,This means only one comparison is done. So we get: Tbest (n) = (1),2019/6/21,12,2012-2013-01 Design and Analysis of Algorithm SCUN,Worst-Case Analysis,In the worst case, we will either find the element on the last pass, or not find the element at all,In each pass, only need 1 comparison. Hence, if we knew how many passes it has done, worst case is trivial,If n = 2k-1, then there must be k = log(n+1) passes,So, i

      8、nformally, we get: Tworst(n) = O(logn),If n is an arbitrary positive integer n, since after one pass, the algorithm faces the same situation but for an array half the size, we get the following recurrence relation for Tworst(n): Tworst(n) = Tworst ( n/2 ) + 1 n1 Tworst(1) = 1,So, formally: Tworst(n) = logn + 1 = log(n+1) = O(logn),2019/6/21,13,2012-2013-01 Design and Analysis of Algorithm SCUN,Average-Case Analysis,Successful Search If the search is always successful, there are n places (number

      9、of possible keys) the key could be found We will consider each of these to be equivalent and so will give each a probability of 1/n There is one place we check on the first pass, two places we could check on the second pass, and four places we could check on the third pass, and so on.,2019/6/21,14,2012-2013-01 Design and Analysis of Algorithm SCUN,Average-Case Analysis (cont.),So we can represent binary search as a binary tree:,2019/6/21,15,2012-2013-01 Design and Analysis of Algorithm SCUN,Average-Case Analysis (cont.),In looking at the binary tree, we see that there are i comparisons needed to find the elements that are in the nodes of level i There are 2i-1 nodes on level i For a list with n = 2k-1 elements, there are k levels in the binary tree,The above facts give us:,2019/6/21,16,2012-2013-

      《算法课件全121301ADA09减治法减常因子算法I》由会员E****分享,可在线阅读,更多相关《算法课件全121301ADA09减治法减常因子算法I》请在金锄头文库上搜索。

      点击阅读更多内容
    最新标签
    监控施工 信息化课堂中的合作学习结业作业七年级语文 发车时刻表 长途客运 入党志愿书填写模板精品 庆祝建党101周年多体裁诗歌朗诵素材汇编10篇唯一微庆祝 智能家居系统本科论文 心得感悟 雁楠中学 20230513224122 2022 公安主题党日 部编版四年级第三单元综合性学习课件 机关事务中心2022年全面依法治区工作总结及来年工作安排 入党积极分子自我推荐 世界水日ppt 关于构建更高水平的全民健身公共服务体系的意见 空气单元分析 哈里德课件 2022年乡村振兴驻村工作计划 空气教材分析 五年级下册科学教材分析 退役军人事务局季度工作总结 集装箱房合同 2021年财务报表 2022年继续教育公需课 2022年公需课 2022年日历每月一张 名词性从句在写作中的应用 局域网技术与局域网组建 施工网格 薪资体系 运维实施方案 硫酸安全技术 柔韧训练 既有居住建筑节能改造技术规程 建筑工地疫情防控 大型工程技术风险 磷酸二氢钾 2022年小学三年级语文下册教学总结例文 少儿美术-小花 2022年环保倡议书模板六篇 2022年监理辞职报告精选 2022年畅想未来记叙文精品 企业信息化建设与管理课程实验指导书范本 草房子读后感-第1篇 小数乘整数教学PPT课件人教版五年级数学上册 2022年教师个人工作计划范本-工作计划 国学小名士经典诵读电视大赛观后感诵读经典传承美德 医疗质量管理制度 2
    关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
    手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
    ©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.