Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    121 disjoint jobs found, pricing in USD

    We have build the content on Plesk Sitebuilder 4.5.0 and now need to polish the website. Our website work can be found at below link: Expectations are: a) Adapt the template for a better looking homepage b) Apply changes to all webpages so that they have similar look and feel and don't look disjoint. BR, Nauritech

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    25 bids

    I have attached a c plus plus program performing iplookup for binary trie. I want you to modify the program to perform IPLOOKUP algorithm for disjoint prefix binary trie and level compressed trie. Refer to .

    $65 (Avg Bid)
    $65 Avg Bid
    7 bids

    ...of the counter just when enter to the dfs for that vertex (that is d[v]=time, before incrementing time), and the finishing just before exit from that dfs (that is f[v]=time, before decrementing incrementing time). Parentheses Theorem: In any depth first search, for any 2 vertices u and v, one of the following 3 conditions holds true: The intervals [d[u], f[u]] and [d[v], f[v]] are completely disjoint; The [d[u], f[u]] interval is completely contained within interval [d[v], f[v]], and u is a descendant of v in the dfs tree; The [d[v], f[v]] interval is completely contained within interval [d[u], f[u]], and v is a descendant of u in the dfs tree; Design and implement a driver to show the following (check for 2 graphs; 1 is provided, including the starting vertex): Display the...

    $166 (Avg Bid)
    $166 Avg Bid
    14 bids

    ...the counter just when enter to the dfs for that vertex (that is d[v]=time, before incrementing time), and the finishing just before exit from that dfs (that is f[v]=time, before decrementing incrementing time). Parentheses Theorem: In any depth first search, for any 2 vertices u and v, one of the following 3 conditions holds true: The intervals [d[u], f[u]] and [d[v], f[v]] are completely disjoint; The [d[u], f[u]] interval is completely contained within interval [d[v], f[v]], and u is a descendant of v in the dfs tree; The [d[v], f[v]] interval is completely contained within interval [d[u], f[u]], and v is a descendant of u in the dfs tree; Design and implement a driver to show the following (check for 2 graphs; 1 is provided, including the starting vertex): Dis...

    $40 (Avg Bid)
    $40 Avg Bid
    1 bids

    ...of the counter just when enter to the dfs for that vertex (that is d[v]=time, before incrementing time), and the finishing just before exit from that dfs (that is f[v]=time, before decrementing incrementing time). Parentheses Theorem: In any depth first search, for any 2 vertices u and v, one of the following 3 conditions holds true: The intervals [d[u], f[u]] and [d[v], f[v]] are completely disjoint; The [d[u], f[u]] interval is completely contained within interval [d[v], f[v]], and u is a descendant of v in the dfs tree; The [d[v], f[v]] interval is completely contained within interval [d[u], f[u]], and v is a descendant of u in the dfs tree; Design and implement a driver to show the following (check for 2 graphs; 1 is provided, including the starting vertex): Display the...

    $40 (Avg Bid)
    $40 Avg Bid
    1 bids

    ...of the counter just when enter to the dfs for that vertex (that is d[v]=time, before incrementing time), and the finishing just before exit from that dfs (that is f[v]=time, before decrementing incrementing time). Parentheses Theorem: In any depth first search, for any 2 vertices u and v, one of the following 3 conditions holds true: The intervals [d[u], f[u]] and [d[v], f[v]] are completely disjoint; The [d[u], f[u]] interval is completely contained within interval [d[v], f[v]], and u is a descendant of v in the dfs tree; The [d[v], f[v]] interval is completely contained within interval [d[u], f[u]], and v is a descendant of u in the dfs tree; Design and implement a driver to show the following (check for 2 graphs; 1 is provided, including the starting vertex): Display the...

    $40 (Avg Bid)
    $40 Avg Bid
    1 bids

    ...the value of the counter just when enter to the dfs for that vertex (that is d[v]=time, before incrementing time), and the finishing just before exit from that dfs (that is f[v]=time, before decrementing time). Parentheses Theorem: In any depth first search, for any 2 vertices u and v, one of the following 3 conditions holds true: The intervals [d[u], f[u]] and [d[v], f[v]] are completely disjoint; The [d[u], f[u]] interval is completely contained within interval [d[v], f[v]], and u is a descendant of v in the dfs tree; The [d[v], f[v]] interval is completely contained within interval [d[u], f[u]], and v is a descendant of u in the dfs tree; Design and implement a driver to show the following (check for 2 graphs; 1 is provided, including the starting vertex): Dis...

    $66 (Avg Bid)
    $66 Avg Bid
    12 bids

    The project is to form node disjoint path from source to sink and find which from which path correct data is coming and also to detect the node which injecting the error in the message.; paper is attached

    $149 (Avg Bid)
    $149 Avg Bid
    3 bids

    Download NetworkX, a Python package for the creation, manipulation, and study of the structure, dynamics, and functions of complex networks. This package has a library of various kinds of graphs as well as the implementation of various useful algo...law (N(k) = c • k−r) holds, and estimate the value of r. Part 2: Consider the Karate Club network described in Your tasks are as follows: • a. Compute the edge(s) of highest betweenness in this network. • b. Remove the edge(s) of highest betweenness, and visualize the graph and see if it has been partitioned into disjoint communities. If not, then repeat the earlier two steps, until the graph partitions, and then stop. • c. List the edges that you removed.

    $80 (Avg Bid)
    $80 Avg Bid
    1 bids

    ...is a closed subspace of B[a,b]. Specifically, if (fn) is a sequence in Ra[a,b] that converges uniformly to f on [a,b], show that f in Ra[a,b] and that integral a to b (fn da) -> integral a to (f da) (page 231 #40) Given any subset E of R(reals) and any H in R(reals), show that m*(E+h)=m*(E), where E+h={x+h: x in E} (page 271 #4) If E=U(from n+1 to infinity) Xn is a countable union of pairwise disjoint intervals, prove that m*(E)=sum(from n+1 to infinity) L(Xn) (page271 #9) If m*(E)=0, show that m*(E U A)=M*(A)=m*(A | E) for any A (page 271 #16) If E in [a,b] and m*(E)=0, show that E^c is dense in [a,b] (page 271 #17) Find a sequence of measurable sets (En) that decrease to non-empty set, but with m(En)=infinity for all n (page 286 #61) Attached is the same document sav...

    $83 (Avg Bid)
    $83 Avg Bid
    4 bids

    ...establishing one session to as in k node. Whenever an intermediate node, receives the RREQpacket, the node appends its remaining battery energy, l i n k g a i n ( g j ), n o d e i d a n d a v e r a g e n o i s e p o w e r ( n j ) a n d n u m b e r o f p a c k e t s i n t h e i m a g e ( m ) to this RREQpacket. On receiving the RREQpackets, on the multiple paths the sink node finds all the node disjoint paths which satisfy the quality constraints. For nodes belonging to each path which meets the quality constraint the sink also finds the optimal powers so as to minimize the total energy of the path. Intuitively we can conclude that the path with minimal total energy consumption is the winner. This may be true if we assume that initial battery energy of the nodes is the ...

    $499 (Avg Bid)
    $499 Avg Bid
    3 bids

    This is an academic project in which we have to implement Disjoint Set using Linked List in C++. Further instructions are provided in the PDF file named 221-15a-A5 in the attached folder. All the implementation needs to be done by updating the functions in .h files. Need it by 17th 10 am.

    $99 (Avg Bid)
    $99 Avg Bid
    3 bids

    This is an academic project in which we have to implement Disjoint Set using Linked List in C++. Further instructions are provided in the PDF file named 221-15a-A5 in the attached folder. All the implementation needs to be done by updating the functions in .h files. Need it by 17th 10 am.

    $250 - $750
    $250 - $750
    0 bids

    Download NetworkX, a Python package for the creation, manipulation, and study of the structure, dynamics, and functions of complex networks. This package has a library of various kinds of graphs as well as the implementation of various useful al...(N(k) = c • k−r) holds, and estimate the value of r. Part 2: Consider the Karate Club network described in Your tasks are as follows: • a. Compute the edge(s) of highest betweenness in this network. • b. Remove the edge(s) of highest betweenness, and visualize the graph and see if it has been partitioned into disjoint communities. If not, then repeat the earlier two steps, until the graph partitions, and then stop. • c. List the edges that you removed.

    $173 (Avg Bid)
    $173 Avg Bid
    3 bids

    How do I can implement generalization coverage constraints (complete,disjoint,overlap and incomplete) in programming language such c++

    $12 (Avg Bid)
    $12 Avg Bid
    1 bids

    How do I can implement generalization coverage constraints (complete,disjoint,overlap and incomplete) in programming language such c++

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    7 bids

    We are looking for a writer for BI (Business Intelligence) / IT (Information Technology) research papers one or all of the following topics: - The "Good to Great" principles, how does it apply to BI and IT? - How does the disjoint between IT and the business affect the business? What are best practices to be used in BI? - Reporting and analytics - What are the challenges today? - Is BI dead? Has it been overtaken by Big Data? - Companies are overwhealmed with Big Data but don't have a data management strategy in place. Each article should have 1000-2000 words and be structures as follows: 1. Problem description with examples 2. Current research analysis 3. Application to practice with case studies 4. Conclusions 5. Summary and call to action

    $154 (Avg Bid)
    $154 Avg Bid
    9 bids

    ...results of a new approach to implementing computer security based on “keystroke hardening,” combined with “keyboard gridding.” This idea requires that a login ID and password must be entered in a manner that is consistent with the actual owner of these access codes (this is the hardening condition). In addition, we examined what we call “keyboard gridding” where we partition the keyboard into disjoint regions and require that characters in the access codes ( password) are selected from each defined partitions. In addition, we also examined additional factors such as: password length and typing speed. At the time of login the user enter the same password and user id at the time of registration. Then his password speed is matched with the ...

    $7 - $18
    $7 - $18
    0 bids

    ...results of a new approach to implementing computer security based on “keystroke hardening,” combined with “keyboard gridding.” This idea requires that a login ID and password must be entered in a manner that is consistent with the actual owner of these access codes (this is the hardening condition). In addition, we examined what we call “keyboard gridding” where we partition the keyboard into disjoint regions and require that characters in the access codes ( password) are selected from each defined partitions. In addition, we also examined additional factors such as: password length and typing speed. At the time of login the user enter the same password and user id at the time of registration. Then his password speed is matched with the ...

    $15 (Avg Bid)
    $15 Avg Bid
    1 bids

    With the advent of Wireless Technology, various applications in traditional wired networks have been adopted in Wireless Networks such a...protocol and the optimization mechanism is subject to certain QoS requirement in terms of total end-to end Quality Level. The proposed Sink Based MMRE-AOMDV routing algorithm uses the information such as image size, node gain, noise information available in the route request packets to calculate the optimal power vectors and the number of packets that can be sent by the source for each disjoint path in the route reply packets. The source is freed from the complex algorithmic executions and hence the energy needed for this purpose is conserved. It is assumed that energy is not a constraint for the sink and it has abundant computatio...

    $18 - $152
    $18 - $152
    0 bids

    ...the value of the counter just when enter to the dfs for that vertex (that is d[v]=time, before incrementing time), and the finishing just before exit from that dfs (that is f[v]=time, before decrementing time). Parentheses Theorem: In any depth first search, for any 2 vertices u and v, one of the following 3 conditions holds true: The intervals [d[u], f[u]] and [d[v], f[v]] are completely disjoint; The [d[u], f[u]] interval is completely contained within interval [d[v], f[v]], and u is a descendant of v in the dfs tree; The [d[v], f[v]] interval is completely contained within interval [d[u], f[u]], and v is a descendant of u in the dfs tree; Design and implement a driver to show the following (check for 2 graphs; 1 is provided, including the starting vertex): D...

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    2 bids

    ...altogether. I index this SolrCloud using a multi-threaded application and it can get upto 75 concurrent threads using the SolrJ API . The issue that I am facing currently is that , theoretically the replicas for a given shard should have identical documents , but in my case I end up with disjoint sets for the two replicas of each shard, meaning there is no overlap whatsoever between the replicas of a given shard ,its ok to have some delta between replicas of the same shard, but in my case they are disjoint sets and as I am using a load balancer to query , depending on which replica the request goes to , I some times get a result and sometimes not when using filter queries. I have tried various options , but I am not able to resolve this issue and ended up turning ...

    $153 (Avg Bid)
    $153 Avg Bid
    2 bids

    ...cyclical sequence in each run of the program but for prime true random based disjointing repetition clusters of the flexing of the two documents in a single or double span cluster for the first document and in a single span cluster for the second document. According to the theory this toggled alternation will interject the first document, the second document, and the telephone number generation in disjoint series in the second dimension of time. I have myself a means of engaging disjointing of the six alternative program initiation base with the program posing the six alternatives for my selection. I need this program to run on my Ipad with the flexed character strings from the two documents being about the length of the main register of my Ipad. This is an experimental progr...

    $1055 (Avg Bid)
    $1055 Avg Bid
    9 bids

    ...cyclical sequence in each run of the program but for prime true random based disjointing repetition clusters of the flexing of the two documents in a single or double span cluster for the first document and in a single span cluster for the second document. According to the theory this toggled alternation will interject the first document, the second document, and the telephone number generation in disjoint series in the second dimension of time. I have myself a means of engaging disjointing of the six alternative program initiation base with the program posing the six alternatives for my selection. I need this program to run on my Ipad with the flexed character strings from the two documents being about the length of the main register of my Ipad. This is an experimental progr...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...be in different programs. part1. Data Structures and Minimum Spanning Tree (a) Implement heap data structures, including heapsort, and update the structures once the key values are changed. You should have two version, one for max-heap and min-heap. (b) Implement Prim's Algorithm, using the min-heap data structure in "extract-min(Q)". (c) Implement the data structures for joining disjoint sets. (d) Implement Kruskal's Algorithm, using the data structure in (c). (e) Run the two algoriths on several graphs, with graph sizes (# of nodes) 100, 200, 400, 800, 1600, 3200. (You need to run 5 times for each size to get the average) (d) Measure the time and plot them. What is the complexity ? Part2. Design and implement an algorithm to compute all bridges in ...

    $144 (Avg Bid)
    $144 Avg Bid
    9 bids

    ...be in different programs. part1. Data Structures and Minimum Spanning Tree (a) Implement heap data structures, including heapsort, and update the structures once the key values are changed. You should have two version, one for max-heap and min-heap. (b) Implement Prim's Algorithm, using the min-heap data structure in "extract-min(Q)". (c) Implement the data structures for joining disjoint sets. (d) Implement Kruskal's Algorithm, using the data structure in (c). (e) Run the two algoriths on several graphs, with graph sizes (# of nodes) 100, 200, 400, 800, 1600, 3200. (You need to run 5 times for each size to get the average) (d) Measure the time and plot them. What is the complexity ? Part2. Design and implement an algorithm to compute all bridges in ...

    $100 (Avg Bid)
    $100 Avg Bid
    1 bids

    ...to be in different programs. part1. Data Structures and Minimum Spanning Tree (a) Implement heap data structures, including heapsort, and update the structures once the key values are changed. You should have two version, one for max-heap and min-heap. (b) Implement Prim's Algorithm, using the min-heap data structure in "extract-min(Q)". (c) Implement the data structures for joining disjoint sets. (d) Implement Kruskal's Algorithm, using the data structure in (c). (e) Run the two algoriths on several graphs, with graph sizes (# of nodes) 100, 200, 400, 800, 1600, 3200. (You need to run 5 times for each size to get the average) (d) Measure the time and plot them. What is the complexity ? Part2. Design and implement an algorithm to compute a...

    $80 (Avg Bid)
    $80 Avg Bid
    13 bids

    ...with the actual derivative. Let h=2π/n for some positive integer n. Let xi=ih for i=0,1,…,n. The program should do the following The program will take one input argument: n. It should divide the domain among p processes so that they all do a roughly equal amount of work. In other words, each process will be responsible for some subinterval [xik,xik+1). In this assignment these intervals must be disjoint. Each process should compute a forward difference approximation to the derivative of the function; i.e. it should compute sinxi+1−sinxih for every xi in its computational interval. Note that this will require some communication with other processes. It must also take advantage of the periodicity of the sine function. Each process should compute the square of ...

    $243 (Avg Bid)
    $243 Avg Bid
    7 bids

    Assignment 1: [Socket Programming] Proxy Cache in Java Assignment 2: [Routing Algorithms] Implement Shortest Path Routing and Disjoint Path Routing in C or Java

    $30 (Avg Bid)
    $30 Avg Bid
    1 bids

    In this application i want to simulate the functionally of an algorithm that finds all shortest k disjoint paths between two different nodes in a graph. Algorithm is a modified version of Dijkstra's algorithm and is presented in details in attached document. The input is a text file with adjacency matrix. Before applying the algorithm application must test the connectivity graph. If the graph is connected, we test the algorithm, otherwise you can not. Connectivity test algorithm is simple and described in the attached document. The application should: draw the graph in a specific graph layout: -tetrahedron, - octahedron, cube, Franklin, graph, regular graphs etc. draw the paths the algorithm found Graph can have faulty n...

    $198 (Avg Bid)
    $198 Avg Bid
    6 bids

    In this application i want to simulate the functionally of an algorithm that finds all shortest k disjoint paths between two different nodes in a graph. Algorithm is a modified version of Dijkstra's algorithm and is presented in details in attached document. The input is a text file with adjacency matrix. Before applying the algorithm application must test the connectivity graph. If the graph is connected, we test the algorithm, otherwise you can not. Connectivity test algorithm is simple and described in the attached document. The application should: draw the graph in a specific graph layout: -tetrahedron, - octahedron, cube, Franklin, graph, regular graphs etc. draw the paths the algorithm found Graph can have faulty n...

    $111 (Avg Bid)
    $111 Avg Bid
    1 bids

    I need a visual application that simulates the following algorithms: 1) Fault tolerant routing algorithm in hypercube. It is described in detail in the attached pdf. 2) Algorithm for finding k shortest disjoint path-pair between nodes in regular graphs( see attached doc ). It can be any topology, a random topology Use OpenGl to draw the graphs: Application will be written in C + + and should contain the following features: generation of hypercube layout: - Layout is generated depending on the number of nodes. For example: 8 nodes -> 3D hypercube (or 3-cube) 16 knots -> 4D hypercube (4 - cube) ..... and so on A third topology can be generated randomly. ...

    $476 (Avg Bid)
    $476 Avg Bid
    3 bids

    I need a visual application that simulates the following algorithms: 1) Fault tolerant routing algorithm in hypercube. It is described in detail in the attached pdf. 2) Algorithm for finding k shortest disjoint path-pair between nodes in regular graphs( see attached doc ). It can be any topology, a random topology Use OpenGl to draw the graphs: Application will be written in C + + and should contain the following features: generation of hypercube layout: - Layout is generated depending on the number of nodes. For example: 8 nodes -> 3D hypercube (or 3-cube) 16 knots -> 4D hypercube (4 - cube) ..... and so on A third topology can be generated randomly. ...

    $30 - $250
    $30 - $250
    0 bids

    I need a visual application that simulates the following algorithms: 1) Fault tolerant routing algorithm in hypercube. It is described in detail in the attached pdf. 2) Algorithm for finding k shortest disjoint path-pair between nodes in regular graphs( see attached doc ). It can be any topology, a random topology Use OpenGl to draw the graphs: Application will be written in C + + and should contain the following features: generation of hypercube layout: - Layout is generated depending on the number of nodes. For example: 8 nodes -> 3D hypercube (or 3-cube) 16 knots -> 4D hypercube (4 - cube) ..... and so on A third topology can be generated randomly. ...

    $30 - $250
    $30 - $250
    0 bids

    I need a visual application that simulates the following algorithms: 1) Fault tolerant routing algorithm in hypercube. It is described in detail in the following pdf. 2) Fault tolerant routing algorithm in crossed cube. Described in pdf. 3) Algorithm for finding k shortest disjoint path-pair between nodes in regular graphs. It can be any topology, a random topology Application will be written in C + + / C # and should contain the following features: Automatic generation of hypercube layout: - Layout is generated depending on the number of nodes. For example: 8 nodes -> 3D hypercube (or 3-cube) 16 knots -> 4D hypercube (4 - cube) ..... and so on Same thing for Cro...

    $283 (Avg Bid)
    $283 Avg Bid
    2 bids

    I need a visual application that simulates the following algorithms: 1) Fault tolerant routing algorithm in hypercube. It is described in detail in the following pdf. 2) Fault tolerant routing algorithm in crossed cube. Described in pdf. 3) Algorithm for finding k shortest disjoint path-pair between nodes in regular graphs. It can be any topology, a random topology Application will be written in C + + / C # and should contain the following features: Automatic generation of hypercube layout: - Layout is generated depending on the number of nodes. For example: 8 nodes -> 3D hypercube (or 3-cube) 16 knots -> 4D hypercube (4 - cube) ..... and so on Same thing for Cro...

    $253 (Avg Bid)
    $253 Avg Bid
    6 bids

    I need a implementation of a mechanism to identify the strings based on some regular expressions. Description: Requires the implementation of a function, "matches", which by receiving a regular expression and a string, determinate, in order, the longest disjoint sub-strings, that matches with the provided expression. For example, knowing that the regular expression "a + | b +" denotes the string which contains at least one character 'a' and strings containing at least one character 'b', this is what will return the application below: > matches "a+|b+" "abbcccaaa" ["a", "bb", "aaa"] For the expression "(a|b)+" the result is: > matches "(a|b)+" "abbccc...

    $105 (Avg Bid)
    $105 Avg Bid
    2 bids

    Need to implement a node disjoint multipath routing protocol in WSN using C++. - 100mx100m network area is considered and random nodes are distributed in this area. (Num of nodes and area of simulation could be changed) - The base station and the source node have a fixed position. - Source node sends packet at different rates to the base station. - Each node is identified by, Node ID, Node energy, Node queue_size ....and so on - Data packet is identified by, Packet number, Packet size, Packet arrival_time, Packet departure_time, ....and so on - The next node selection different according to the requirement, If req=1--> next node with the smallest Cost 1 function isselected, if req=2--> next node with the smaller Cost 2 function is selected and so on. More details ...

    $646 (Avg Bid)
    $646 Avg Bid
    3 bids

    ...multiple choice questions. To further complicate matters the department head has mandated that all test questions be pulled from a bank of approximately 400 “approved” test questions. To increase the robustness and ease of creation of your midterm exam you decide to randomly and uniformly choose 5 questions from the question bank for each student. This means that each student’s exam consists of disjoint, intersecting, or identical sets of 5 questions. To assist you with running such a large class, the university has provided you with last year’s student performance data (where the professor created exams using a process similar to your own). Additionally, the department head has admitted to you that she thinks that not all the questions in the “appro...

    $125 (Avg Bid)
    $125 Avg Bid
    4 bids

    ...the removed walls in figure 1; 69 walls are missing. Walls are obtained from the priority queue according to their demolition priorities. However, we must never remove a wall between two rooms if there is already a path between them. If a path between two rooms already exists, the wall is not considered any further. The selection process continues until enough walls are destroyed. Your disjoint subset methods will be useful in determining whether two rooms are currently connected....

    $220 (Avg Bid)
    Urgent
    $220 Avg Bid
    3 bids

    ...xml][1] I need this data processed in C to compute the adjacency matrix of the AS-level Internet graph ( compilers: Visual Studio 10 C/C++, *not* Visual Studio Express) You will then perform a k-core analysis of the AS-level Internet graph Finally, you will discuss your findings and in particular address **(5 pages)**: a. whether the higher (or highest) level k-core is connected or disjoint and the implications of your findings b. the resulting AS ranking list from the k-core analysis; and c. the correlation of your ranking list with the CAIDA AS ranking [5] based on ASrelationships <> <> ## Deliverables The attached file is a recent snapshot of the Internet topology, downloaded from [

    $100 - $120
    $100 - $120
    0 bids

    ...processor the lines it should test. Give an ecient algorithm to nd a testing schedule or determine that no schedule can test all lines in a single day. Give the run time of your algorithm in terms of p and c. b) Same as a) but nd the minimum number of days to test all lines (and a schedule that achieves it). (25) Problem 3. Suppose we are given a directed graph G; a) We want to nd 3 edge disjoint paths from a designated starting vertex u to a speci c destination vertex d (or determine that no such paths exist). Describe an ecient algorithm to nd the paths and give the running time of your solution. b) Now suppose we have three di erent destinations d1; d2 and d3. We want to nd 3 paths from our start vertex u, one to each of the destinations and we want these 3 pat...

    $72 (Avg Bid)
    $72 Avg Bid
    4 bids

    ...grammatical, and formatting errors. This would also include checking articles for subject matter, readability and sentence structure . The proofreader must review the articles and correct any mistakes to ensure that the articles are 100% error free. You must have the ability to edit the articles if these are poorly written or rewrite completely to make it perfect. Most of the articles have disjoint sentences, so you would be asked to add appropriate transition words either at the beginning or at the end to fuse them together, till the paragraphs read better. The rate for proofreading is $0.20 per 500 words, for editing $0.50 per 500 words and for rewriting $1 per 500 words. Articles typically range from 400-600 words and are in both UK and US English. We own all copyrig...

    $35 (Avg Bid)
    $35 Avg Bid
    13 bids

    Write a program in java that determines whether two sets of integers are: **Equal** (contain the same elements), **Disjoint** (have no elements in common), **overlapping** (have some but not all elements in common, but each has some elements not in the other), or whether one is a **proper subset** **of the other** (all its elements are in the other, but the other also has additional elements). More details...... in the document attached. Its a very easy program for someone who knows java well. Please keep the code simple because it is a beginner java class. Assignment is based on this book: **Introduction to JAVA?"? Programming, Seventh Edition, by Y. Daniel Liang, Pearson/Prentice Hall, 2009 (ISBN 10:13-604258-9, ISBN 13: 978-0-13-604258-7) ** ...

    $25 (Avg Bid)
    $25 Avg Bid
    59 bids

    ... CISC Reg-Reg vs. reg-mem or mem-mem architecture Data representation: word length: single vs. multiple(word half word, byte,...) integer vs. floating point coding system bit numbering: MSB at the leftmost or rightmost end Instruction length single vs. multiple General-purpose register set: number of registers read-write vs. read-only programmable vs. partly special-purpose Memory Unified vs. disjoint organization for instruction memory and data memory capacity or multiple capacities read/write vs. read-only word-addressing vs. byte addressing big-endian vs. little endian aligned vs. misaligned access Address size and data size of memory modules Input/output program loading scheme: on-line vs. off-line Data input/output scheme: manual vs. program Display of intermediate and final...

    $21 (Avg Bid)
    $21 Avg Bid
    2 bids

    ...mem-mem architecture Data representation: word length: single vs. multiple(word half word, byte,...) integer vs. floating point coding system bit numbering: MSB at the leftmost or rightmost end Instruction length single vs. multiple General-purpose register set: number of registers read-write vs. read-only programmable vs. partly special-purpose Memory Unified vs. disjoint organization for instruction memory and data memory capacity or multiple capacities read/write vs. read-only word-addressing vs. byte addressing big-endian vs. little endian aligned vs. misaligned access Address size and data size of memory modules Input/output program loading scheme: on-line vs. off-line Data input/output scheme: manual vs. program Display of in...

    $25 (Avg Bid)
    $25 Avg Bid
    2 bids

    ...s. Let 2 to the power s+1 inputs be located at 2 to the power s nodes of the first column, two inputs per node, and 2 to the power s+1 outputs be located similarly at 2 to the power s nodes of the last column, two outputs per node. Other than the number of inputs and outputs per node, the distributions are arbitrary. We know that the inputs can be connected to the corresponding outputs by edge-disjoint paths. (a) Show that the number of such patterns of connection is always at least 2 to the power (s-1)2s+1. (b) Describe a specific distribution of inputs and outputs which results in a number of routing patterns that you believe is the largest possible. Give the number of routing patterns for the arrangement of inputs and outputs you proposed. ## Deliverables *I have 3 proble...

    $63 (Avg Bid)
    $63 Avg Bid
    1 bids

    ...s. Let 2 to the power s+1 inputs be located at 2 to the power s nodes of the first column, two inputs per node, and 2 to the power s+1 outputs be located similarly at 2 to the power s nodes of the last column, two outputs per node. Other than the number of inputs and outputs per node, the distributions are arbitrary. We know that the inputs can be connected to the corresponding outputs by edge-disjoint paths. (a) Show that the number of such patterns of connection is always at least 2 to the power (s-1)2s+1. (b) Describe a specific distribution of inputs and outputs which results in a number of routing patterns that you believe is the largest possible. Give the number of routing patterns for the arrangement of inputs and outputs you proposed. ## Deliverables *I have 3 proble...

    $30 - $5000
    $30 - $5000
    0 bids

    I have a program and I want to develop it, I need graphs with more than 3 disjoint paths and graphs with more than 50 nodes (preferably one with 50 and one with 100). This should be enough to show that the algorithm works correctly... also; I need explanation for that at least 5 pages. **see attachment** .... ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables): a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's e...

    $34 (Avg Bid)
    $34 Avg Bid
    2 bids

    Top disjoint Community Articles