Description
Complete Tutorials 5-1 through 5-9. Turn in a printout of the code for Tutorials 5-2, 5-3, 5-5, 5-6, 5-7, 5-8 and 5-9. Add the following comments to the top of the first page of each Tutorial:
Name Your Name
Class and Section CS 165 02
Tutorial Tutorial Number (for example 5-2)
Due Date: See above
Tutorials MUST be turned in at the beginning of the class when it is due in order to receive creditUnformatted Attachment Preview
CS 165 02
Tutorial 05 Extra Credit
10 Points
Due:
One week after the end of the chapter
Complete Tutorials 5-1 through 5-9. Turn in a printout of the code for Tutorials 5-2, 5-3, 5-5, 5-6, 5-7, 58 and 5-9. Add the following comments to the top of the first page of each Tutorial:
Name
Your Name
Class and Section
CS 165 02
Tutorial
Tutorial Number (for example 5-2)
Due Date:
See above
Tutorials MUST be turned in at the beginning of the class when it is due in order to receive credit.
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Here are...
Completion Status:
100%
Review
Review
Anonymous
Awesome! Made my life easier.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Capella University Optimality of The Dynamic Programming Solution Coding Task
Your algorithms group has been tasked with creating an app that performs special operations on images. Specifically, your ...
Capella University Optimality of The Dynamic Programming Solution Coding Task
Your algorithms group has been tasked with creating an app that performs special operations on images. Specifically, your app will compare one black-and-white image into another black-and-white image. There are a number of methods that can be used to perform this task, but your group has agreed that using dynamic programming is a fast and elegant scheme to solve this problem.AssignmentDesign an algorithm (using pseudocode) that takes in as an input, two 2-D int arrays that are assumed to be 2 black-and-white images: initialImage x, whose dimensions are IxJ, and finalImage y, whose dimensions are IxK. The algorithm will compare x to the y, row-by-row, as defined below. Your algorithm will employ a dynamic programming scheme to compare X to Y identifying the minimal difference between each row.Because you are working with black-and-white images only, you should assume that each image is a 2-D int array consisting of 2 possible values: 0 or 1, where 0 represents black and 1 represents white. Thus, this 2-D grid of 0 and 1 values comprise a 2-D black-and-white image. Each row of this image is then simply a 1-D int array filled with either 0s or 1s. Therefore, you must define how you will measure the difference between the strings of 0s and 1s in each row.Remember that you will do the comparison one row in the images at a time.First, compare X1,* to Y1,*. (Here X1,* is the first row in image X and Y1,* is the first row in image Y ). Next, compare X2 to Y2... Each one of these comparisons will require the construction of a D (distance) matrix.In the following example, the first row of X is X1,*, and the first row of Y is Y1,* = 00110.Use the following recurrence relation to develop your pseudocode:After the D matrix is completed, the minimum number in the bottom row is the minimal mismatch for this row. You will assign this value to the variable minVali. This number tells how different row X1,* is from row Y1,* . You will then repeat this comparison for all rows i and aggregate the difference when complete into variable totalDifference = Si minVali.As a result, the algorithm will compare the total difference to a threshold value called thresh. If total value is above the threshold, the images are declared different; otherwise, they are declared to be similar images. You can assume that the thresh variable is supplied as an input to your algorithm.Part 2aDesign pseudocode for the image comparison algorithm discussed above, given input Images X, Y, and thresh. The output is a declaration: The images are similar, or The images are different.Part 2bDiscuss the optimality of the dynamic programming solution. Discuss the time complexity of this algorithm in terms of the size of the inputs X and Y.
American Military University Physical and Testimonial Evidence Essay
An investigator of an incident scene is looking for physical AND testimonial evidence.Submission Instructions: There are ...
American Military University Physical and Testimonial Evidence Essay
An investigator of an incident scene is looking for physical AND testimonial evidence.Submission Instructions: There are a total of six activities that must be addressed. Describe each of these and note the relevance of each. The six activities or more in some literatures are related to the activities performed by the investigator while looking for evidence. Below are examples:http://www.iacpcybercenter.org/investigators/digit...https://pdfs.semanticscholar.org/ffec/5abb02dd4516...A minimum of 600 words is required for this essay.
WU Setting up Of Organizational Standards the Laid Down Structure & Guideline Essay
Requirements: 3 pages in length (excluding abstract, cover page, and reference list)At least 3 cited sourcesPlease make su ...
WU Setting up Of Organizational Standards the Laid Down Structure & Guideline Essay
Requirements: 3 pages in length (excluding abstract, cover page, and reference list)At least 3 cited sourcesPlease make sure to credit all of your sources; no plagiarism! If you fail to credit your sources, you will get no points and no chance to redoAPA format
4 pages
Application Security Practical Connection
Application security, as a course, has various concepts that are useful in the fields to execute specific actions and redu ...
Application Security Practical Connection
Application security, as a course, has various concepts that are useful in the fields to execute specific actions and reduce the chances of intrusions ...
Similar Content
Harrisburg Leadership & Knowledge Sharing Essential in Every Organization Discussion
answer the following questions:How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does...
Skyline College Pizza Delivery Java Program Project
Create a class named Pizza with data fields for description (such as sausage and onion) and price.Include a constructor th...
SD State University Using Machine Learning to Design an Authentication System Paper
(3-6 written pages, APA Format)Outline the design of an authentication scheme that “learns” by observing user behavior...
ASU Computer Assembly Language Programming Worksheet
Programming Project 2
Using the MARIE computer assembly language, write a program that computes the following expression:...
Hawaii Business College Website Development Project
Individual Term Project
Due: Wednesday, June 23th, 2021
The IT Manager of a career development company, Young Profession...
MSEM 608 Westcliff University Information Technology Project Management Questions
review and analyze the following questions.
Why do you believe schedule issues often cause the most conf...
Case Study 2.
[Total Mark is 15, 10 Marks Case Study report and 5 Marks Presentation] An organization should be very careful with the da...
image file formats to computer programming
Nowadays, there are many image file formats, also called graphics file formats, which are use in making computer programs....
Casino Gambling Analysis
Gambling policies worldwide require player-specified measurement levels that prevail in specific add-ups to the legislatur...
Related Tags
Book Guides
The Catcher in the Rye
by J. D. Salinger
Mockingjay
by Suzanne Collins
Beowulf
by Anonymous Anglo-Saxon poet
Untamed
by Glennon Doyle
The Hobbit
by J. R. R. Tolkien
Uncle Tom's Cabin
by Harriet Beecher Stowe
Gone with the Wind
by Margaret Mitchell
Catching Fire
by Suzanne Collins
The Awakening
by Kate Chopin
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Capella University Optimality of The Dynamic Programming Solution Coding Task
Your algorithms group has been tasked with creating an app that performs special operations on images. Specifically, your ...
Capella University Optimality of The Dynamic Programming Solution Coding Task
Your algorithms group has been tasked with creating an app that performs special operations on images. Specifically, your app will compare one black-and-white image into another black-and-white image. There are a number of methods that can be used to perform this task, but your group has agreed that using dynamic programming is a fast and elegant scheme to solve this problem.AssignmentDesign an algorithm (using pseudocode) that takes in as an input, two 2-D int arrays that are assumed to be 2 black-and-white images: initialImage x, whose dimensions are IxJ, and finalImage y, whose dimensions are IxK. The algorithm will compare x to the y, row-by-row, as defined below. Your algorithm will employ a dynamic programming scheme to compare X to Y identifying the minimal difference between each row.Because you are working with black-and-white images only, you should assume that each image is a 2-D int array consisting of 2 possible values: 0 or 1, where 0 represents black and 1 represents white. Thus, this 2-D grid of 0 and 1 values comprise a 2-D black-and-white image. Each row of this image is then simply a 1-D int array filled with either 0s or 1s. Therefore, you must define how you will measure the difference between the strings of 0s and 1s in each row.Remember that you will do the comparison one row in the images at a time.First, compare X1,* to Y1,*. (Here X1,* is the first row in image X and Y1,* is the first row in image Y ). Next, compare X2 to Y2... Each one of these comparisons will require the construction of a D (distance) matrix.In the following example, the first row of X is X1,*, and the first row of Y is Y1,* = 00110.Use the following recurrence relation to develop your pseudocode:After the D matrix is completed, the minimum number in the bottom row is the minimal mismatch for this row. You will assign this value to the variable minVali. This number tells how different row X1,* is from row Y1,* . You will then repeat this comparison for all rows i and aggregate the difference when complete into variable totalDifference = Si minVali.As a result, the algorithm will compare the total difference to a threshold value called thresh. If total value is above the threshold, the images are declared different; otherwise, they are declared to be similar images. You can assume that the thresh variable is supplied as an input to your algorithm.Part 2aDesign pseudocode for the image comparison algorithm discussed above, given input Images X, Y, and thresh. The output is a declaration: The images are similar, or The images are different.Part 2bDiscuss the optimality of the dynamic programming solution. Discuss the time complexity of this algorithm in terms of the size of the inputs X and Y.
American Military University Physical and Testimonial Evidence Essay
An investigator of an incident scene is looking for physical AND testimonial evidence.Submission Instructions: There are ...
American Military University Physical and Testimonial Evidence Essay
An investigator of an incident scene is looking for physical AND testimonial evidence.Submission Instructions: There are a total of six activities that must be addressed. Describe each of these and note the relevance of each. The six activities or more in some literatures are related to the activities performed by the investigator while looking for evidence. Below are examples:http://www.iacpcybercenter.org/investigators/digit...https://pdfs.semanticscholar.org/ffec/5abb02dd4516...A minimum of 600 words is required for this essay.
WU Setting up Of Organizational Standards the Laid Down Structure & Guideline Essay
Requirements: 3 pages in length (excluding abstract, cover page, and reference list)At least 3 cited sourcesPlease make su ...
WU Setting up Of Organizational Standards the Laid Down Structure & Guideline Essay
Requirements: 3 pages in length (excluding abstract, cover page, and reference list)At least 3 cited sourcesPlease make sure to credit all of your sources; no plagiarism! If you fail to credit your sources, you will get no points and no chance to redoAPA format
4 pages
Application Security Practical Connection
Application security, as a course, has various concepts that are useful in the fields to execute specific actions and redu ...
Application Security Practical Connection
Application security, as a course, has various concepts that are useful in the fields to execute specific actions and reduce the chances of intrusions ...
Earn money selling
your Study Documents