Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Translate the given formula into a prefix form expression in Scheme:

1844_prefix form expression.jpg

problem 2: Define a procedure which takes three numbers as arguments and returns the sum of the squares of two larger numbers.
 
problem 3: Consider the given mathematical function:

1345_mathematical function.jpg

(a) prepare a procedure which computes f by means of the recursive process.
(b) prepare a procedure which computes f by means of the iterative process.
 
problem 4: Each of the given two procedures defines a method for adding two positive integers in terms of procedures inc, which increments its argument by 1, and dec, which decrements its argument by 1:

(define (plus1 a b)
(if (= a 0)
b
(inc (plus1 (dec a) b))))
 
(define (plus2 a b)
(if (= a 0)
b
(plus2 (dec a) (inc b))))

 
By using the substitution model, describe the process generated by each procedure in evaluating (+ 2 5). Are such processes iterative or recursive?
 
problem 5:

a) prepare a recursive procedure (digits n) which computes the number of digits in the integer n by using a linear recursive process. For illustration, (digits 42) must return 2 and (digits 13579) must return 5.

b) Reprepare (a) in such a way that a linear iterative process is produced. Call the procedure digits-it.

c) By using the substitution model, illustrate that your procedure in (b) generates a linear iterative process.
 
problem 6: Simpson's Rule is a more accurate method of numerical integration. By using Simpson's Rule, the integral of a function f between a and b is approximated as:

504_simpsons rule.jpg

where  h = (b  -  a)/n, for some even integer n, and yk= f(a + kh). (Increasing n increases the accuracy of the approximation.)

Define a procedure which takes as arguments f, a, b, and n and returns  the value of the  integral, computed by using Simpson's Rule. Use your process to integrate cube between 1 and 2  (with n = 100 and n = 1000)

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91838

Have any Question? 


Related Questions in Computer Engineering

1 how does physical access control differ from the logical

1. How does physical access control differ from the logical access control described in earlier chapters? How is it similar? 2. Define a secure facility. What is the primary objective of the design of such a facility? Wh ...

Why should the administrator or the superuser account never

Why should the administrator (or the superuser) account never be locked regardless of                                           What should be done instead to alert the staff to the attempted intrusion, and how could the ...

1 what methods does a social engineering hacker use to gain

1. What methods does a social engineering hacker use to gain information about a user's login id and password? How would this method differ if it were targeted towards an administrator's assistant versus a data-entry cle ...

Technical paper programming for the health care industryits

Technical Paper: Programming for the Health Care Industry It's common knowledge that using computers in the health care industry can improve the quality and effectiveness of care while reducing costs. However, the adopti ...

A tlu with weight vector w and threshold b implements a

A TLU with weight vector W and threshold B implements a hyperplane boundary. Derive an expression for the Euclidean distance of the hyperplane from the origin. From an arbitrary point X. (Refer to Figure 3.1)

Assume we have a stream cipher whose period is quite short

Assume we have a stream cipher whose period is quite short. We happen to know that the period is 150-200 bit in length. We assume that we do not know anything else about the internals of the stream cipher. In particular, ...

For the following we assume aes with 192-bit key length

For the following, we assume AES with 192-bit key length. Furthermore, let us assume an ASIC which can check 3 · 107 keys per second. 1. If we use 100,000 such ICs in parallel, how long does an average key search take? C ...

Spreadsheet assignmentmusic analysisuse the web to locate

Spreadsheet Assignment Music Analysis Use the web to locate information on trends CD sales versus music downloads on the Internet. You can use any of the websites you are familiar with or that have been presented in the ...

1 what is a hash function and what can it be used for2 why

1. What is a hash function, and what can it be used for? 2. Why is it important to exchange keys out of band in symmetric encryption? 3. What is the fundamental difference between symmetric and asymmetric encryption?

Databases and system architecture discussionsanswer all

Databases and System Architecture Discussions Answer all discusion topics Cables • Discuss different types of cables and the advantages/disadvantages of each type: o twisted pair o coaxial cable o fiber-optic. • Which on ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen