subject

Variation of the "Drunken Sailor Problem"There is a famous probability problem that states: If a drunken sailor leavesthe pub and had too much to drink so that they do not know how to get back, could they eventually get back with a nite amount of random steps, or is itpossible that they'll get lost forever? (the answer ends up being that they'llalways nd their way back if the choice is always random!)This requires a bit more than what we have right now, but here is a variation. Instead of a grid, like the original problem, we'll think of a long street. We cantrack the sailor's possible positions at any point in time using matrix algebra. Some denitions before we can begin:Remember that the diagonal of a (square) matrix are all entries ai;i where therow coordinate is equal to the column coordinate. The super-diagonal are all the entries one position to the right of the diagonal.(Alternatively, all entries one position above the diagonal)The sub-diagonal are all entries one position to the left of the of the diagonal.(Alternatively all entries one position below the diagonal)a) For 2x2 and 3x3 matrices, write the matrices that correspond to 1's on thesuper-diagonal (zeroes everywhere else). Do the same for the sub-diagonalb) Write two equivalent subscript notations for the sub and super diagonal ofa matrix (e. g. ai;i is the subscript notation for the diagonal)c) The matrix that has 1's on the super-diagonal and sub-diagonal is an ad-jacency matrix (symmetric, 0's on diagonal and only 1's as entries). Draw orexplain what the graph associated looks like in any dimension. d) If this n n adjacency matrix is A, calculate A2.e) Find the diagonal for An if n is odd (Hint: It is easier to explain via thegraph!)f) Interpret what ai;j means in the drunken sailor problem for any power of A

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 03:50
You are working as a security analyst in a company xyz that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. while monitoring the data, you find a high number of outbound connections. you see that ip's owned by xyz (internal) and private ip's are communicating to a single public ip. therefore, the internal ip's are sending data to the public ip. after further analysis, you find out that this public ip is a blacklisted ip, and the internal communicating devices are compromised. what kind of attack does the above scenario depict?
Answers: 3
question
Computers and Technology, 22.06.2019 05:30
Agood flowchart alludes to both the inputs and outputs you will need to receive and give to the user. true or false?
Answers: 3
question
Computers and Technology, 22.06.2019 07:30
By refraining from constructing a building until they are certain that it will not cause harm to the environment, an organization is adhering to the
Answers: 2
question
Computers and Technology, 23.06.2019 09:30
You wanted to look up information about alzheimer's, but you were unsure if it was spelled "alsheimer's" or "alzheimer's." which advanced search strategy would be useful? a) a boolean search b) using a wild card in your search c) trying different search engines d) doing a search for "alsheimer's not alzheimer's" asap. ill give brainlist.
Answers: 1
You know the right answer?
Variation of the "Drunken Sailor Problem"There is a famous probability problem that states: If a dru...
Questions