Design and Analysis of Algorithms_Brute Froce
I collect and make up this pseudocode from the book:
<<Introduction to the Design and Analysis of Algorithms_Second Edition>> _ Anany Levitin
Note that throughout the paper, we assume that inputs to algorithms fall within their specified ranges and hence require no verfication. When implementing algorithms as programs to be used in actual applications, you should provide such verfications.
About pseudocode: For the sake of simplicity, we omit declarations of variables and use indentation to show the scope of such statements as for, if and while. As you saw later, we use an arrow <- for the assignment operation and two slashes // for comments.
Algorithm SelectionSort(A[..n-])
// Sorts a given array by selection sort
// Input: An array A[0..n-1] of orderable elements
// Output: Array A[0..n-1] sorted in ascending order
for i <- to n- do
min <- i
for j <- i+ to n- do
if A[j] < A[min]
min <- j
swap A[i] and A[min]
Algorithm BubbleSort(A[..n-])
// Sorts a given array by bubble sort
// Input: An array A[0..n-1] of orderable elements
// Output: Array A[0..n-1] sorted in ascending order
for i <- to n- do
for j <- to n--i do
if A[j+] < A[j]
swap A[j] and A[j+]
Here is a pseudocode for the improved version of bubble sort:
Algorithm BetterBubbleSort(A[..n-])
// The algorithm sorts array A[0..n-1] by improved bubble sort
// Input: An array A[0..n-1] of orderable elements
// Output: Array A[0..n-1] sorted in ascending order
count <- n- // number of adjacent pairs to be compared
sflag <- true // swap flag
while sflage do
sflage <- false
for j <- to count- do
if A[j+] < A[j]
swap A[j] and A[j+]
sflag <- true
count <- count-
Here is a pseudocode of teh most straightforward version:
Algorithm BruteForcePolynomialEvaluation(P[..n], x)
// The algorithm computes the value of polynomial P at a given point x by the
// "highest-to-lowest" brute-force algorithm
// Input: Array P[0..n] of the coefficients of a polynomial of degree n, stored from the lowest
// to the highest and a number x
// Output: The value of the polynomial at the point x
p <- 0.0
for i <- n downto do
power <-
for j <- to i do
power <- power*x
p <- p + P[i]*power
return p
We can count just the number of multiplications in the algorithm's inner-most loop to find the algorithm's efficiency class: M(n) = n(n+1)/2 = O(n^2)
The above algorithm is very inefficient: we recompute powers of x again and again as if there were no relationship among them. Thus, the obvious improvement is based on computing consecutive powers more efficiently:
Algorithm BetterBruteForcePolynomialEvaluation(P[..n-], x)
// The algorithm computes the value of polynomial P at a given point x by the
// "lowest-to-highest term" algorithm
// Input: Array P[0..n] of the coefficients of a polynomial of degree n, from the
// lowest to the highest, and a number x
// Output: The value of the polynomial at the point x
p <- P[]; power <-
for i <- to n do
power <- power*x
p <- p + P[i]*power
return p
The number of multiplications here is M(n) = 2n, in another word, we have a linear algorithm
Algorithm SequentialSearch2(A[..n], K)
// Implements sequential search with a search key as a sentinel
// Input: An array A of n elements and a search key K
// Output: The index of the first element in A[0..n-1] whose value is equal
// to K or -1 if no such element if found
A[n] <- K
i <-
while A[i] ≠ K do
i <- i +
if i < n return i
else return - Algorithm BruteForceStringMatch(T[..n-], P[..m-])
// Implements brute-force string matching
// Input: An array T[0..n-1] of n characters representing a text and
// an array P[0..m-1] of m characters representing a pattern
// Output: The index of the first character in the text that starts a
// matching substring or -1 if the search is unsuccessful
for i <- to n-m do
j <-
while j < m and P[j] = T[i+j] do
j <- j+
if j = m return i
return -
Algorithm BruteForceClosestPoints(P)
// Finds two closest points in the plane by burte force
// Input: A list P of n(n ≥ 2) points P1 = (x1, x2),...,Pn = (xn, yn)
// Output: Indices index1 and index2 of the closest pair of points
dmin <- ∞
for i <- to n- do
for j <- i+ to n do
d <- sqrt((xi-xj) + (yi-yj)) // sqrt is the square root function. In fact, computing square roots can be avoided, the trick is to realize that we can simply ignore the square root function
if d < dmin
dmin <- d; index1 <- i; index2 <- j
return index1, index2
Let x1 < x2 < ... < xn be real numbers representing coordinates of n villages located along a straight road. A post office needs tobe built in one of these villages. Design an efficent algorithm to find the post offfice location minimizing the maximum distance from a village to the post office.
Assuming that the points x1, x2, ... xn are given in increasing order, the answer is the point xi that is the closest to m = (x1 + xn) / 2, the middle point between x1 and xn. (The middle point woule be the obvious solution if the post-post office didn't have tobe at one of the given locations.) Indeed, if we put the post office at any location xi to the left of m, the longest distance froma village to the post office would be xn - xi; this distance is minimal for the rightmost among such points. If we put the post office at any location xi to the right of m, the longest distance from a village to the post office would be xi - x1; this distance isminimal for the leftmost among such points.
Algorithm PostOffice(P)
// Input: List P of n(n ≥ 2) point s x1, x2,..., xn in increasing order
// Output: Point xi that minimizes max(1≤j≤n)|xj - xi| among all x1,x2,...,xn
m <- (x1+xn) /
i <-
while xi < m do
i <- i+
if xi - x1 < xn - xi-
return xi
else return xi-
new words:
polynomial: 多项式 coefficient: 系数 inefficient: 低效的
sentinel: 哨兵 plane: 平面 coordinate: 坐标
village: 村庄 straight: 直; 直线 (END_XPJIANG)
Design and Analysis of Algorithms_Brute Froce的更多相关文章
- Design and Analysis of Algorithms_Decrease-and-Conquer
I collect and make up this pseudocode from the book: <<Introduction to the Design and Analysis ...
- Design and Analysis of Algorithms_Divide-and-Conquer
I collect and make up this pseudocode from the book: <<Introduction to the Design and Analysis ...
- Design and Analysis of Algorithms_Fundamentals of the Analysis of Algorithm Efficiency
I collect and make up this pseudocode from the book: <<Introduction to the Design and Analysis ...
- Design and Analysis of Algorithms_Introduction
I collect and make up this pseudocode from the book: <<Introduction to the Design and Analysis ...
- 6.046 Design and Analysis of Algorithms
课程信息 6.046 Design and Analysis of Algorithms
- 斯坦福大学公开课机器学习: machine learning system design | error analysis(误差分析:检验算法是否有高偏差和高方差)
误差分析可以更系统地做出决定.如果你准备研究机器学习的东西或者构造机器学习应用程序,最好的实践方法不是建立一个非常复杂的系统.拥有多么复杂的变量,而是构建一个简单的算法.这样你可以很快地实现它.研究机 ...
- Algorithms: Design and Analysis, Part 1 - Programming Assignment #1
自我总结: 1.编程的思维不够,虽然分析有哪些需要的函数,但是不能比较好的汇总整合 2.写代码能力,容易挫败感,经常有bug,很烦心,耐心不够好 题目: In this programming ass ...
- Algorithms: Design and Analysis, Part 1 - Problem Set 1 - Question 5
最后一个图像,用画图软件绘制了一下,自己的直接主观判断还是有些小问题的 注意:最后的灰色的线条会超过橙色的线条
- EE就业最好的方向是转CS,其次是VLSI/ASIC DESIGN & VERIFICATION
Warald在2012年写过一篇文章<EE现在最好就业的方向是VLSI/ASIC DESIGN VERIFICATION>,三年过去了,很多学电子工程的同学想知道现在形势如何. 首先,按照 ...
随机推荐
- jq switch case
switch (cnt) { case ("string1"): ... ...
- mysql 导入导出csv
导出: select RESOURCE_ID_INT,RESOURCE_ID_CHAR,RESOURCE_TITLE from t_resource_info_wb into outfile '/us ...
- Java_ClassLoader内存溢出-从tomcat的reload说起
原文链接:http://nius.me/classloader-memory-leak/ 对于j2ee项目,一直使用eclipse的wtp,每次修改代码后,可以自动热部署.简单的项目wtp似乎没什么问 ...
- SQLite部署-无法加载 DLL“SQLite.Interop.dll”: 找不到指定的模块
近期刚使用SQLite,主要引用的是System.Data.SQLite.dll这个dll,在部署到测试环境时报无法加载 DLL“SQLite.Interop.dll”: 找不到指定的模块. (异常来 ...
- Oracle EBS - AOL
AOL: (Path: /u43/dev6/interface/aol) 1. Goto system administrator response 2. View -> Request (Sa ...
- 机器学习常用Python扩展包
在Ubuntu下安装Python模块通常有3种方法:1)使用apt-get:2)使用pip命令(推荐);3)easy_instal 可安装方法参考:[转]linux和windows下安装python集 ...
- User interface
Styles and Themes value/style <style name="CodeFont" parent="@android:style/TextAp ...
- sqlserver 性能优化常用方法
查看被锁表: select request_session_id spid,OBJECT_NAME(resource_associated_entity_id) tableName from sys. ...
- 一道无限级分类题的 PHP 实现
今天有网友出了道题: 给出如下的父子结构(你可以用你所用语言的类似结构来描述,第一列是父,第二列是子),将其梳理成类似如图的层次父子结构. origin = [('A112', 'A1122'), ( ...
- Centos防火墙禁止ping和开启ping
1.允许PING设置 iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT iptables -A OUTPUT -p icmp - ...
