# Search results

1. ### Anyone know prolog?

Does anyone here know Prolog? I'm using the SWI-Prolog interpreter. Given this list: [[1, 2], [2, 3], [3, 4]] how do you make it say Yes if 2 (of the first list) = 2 (of second list) and 3 (of second list) = 3 (of third list)? I'm having trouble visualizing this fact as the elements in the...
2. ### Java How do display/generate webpage content with info from an array in a .java file?

Does anyone know how I would go about displaying/generating webpage content with info from an array in a .java file? Suppose you click on cars.com, once you do, the webpage will display the contents (say car names) of an array from a .java file. How do I do this? Thanks.
3. ### Context-free grammar: derivations and ambiguity

I have a question regarding about CFGs, derivations, and ambiguity. Say you are given some CFG that produces A, B, or C You are able to come up with two different derivations for A To say the CFG that produces A, B, or C is ambiguous, you must find two different parse trees for some...
4. ### Simplifying regular expression?

Does anyone know if this regular expression can be simplified? (a*bc*bc*|c*)*b I tried (a|b|c)*b, but it's not correct.

26. ### Binomial Distrinution - is my answer reasonable?

Q: The simplest error detection scheme used in data communication is parity-checking. Messages sent consists of characters, each character consisting of a number of bits, 0 or 1. In parity checking, a 0 or a 1 is appended to the end to make the number of 1's even. The receiver checks the number...
27. ### Linear algebra and vectors. confused

Let P1 = P1(2, 1, -2) and P2 = P2(1, -2, 0). Find the coordinates of P, which is 1/4 the way from P2 to P1. The answer is P = P(5/4, -5/4, -1/2) Can someone explain to me the concept of this? I don't quite understand it. So basically we are suppose to find a vector P that is 1/4 away from...
28. ### Probability mass function of a hash table?

A hash table is a storage structure that calculates the storage address from a record key, k where f1(k) returns the storage address. Sometimes the hash function returns the same address for several keys (called collision). To fix this problem, a scheme called secondary hashing uses a sequence...
29. ### Poisson Process Probability Question Help

I'm having a bit of trouble in coming up with the solution for this question A hard disk manufacturing process desposites a thin coating of magnetic material on a plastic substrate. Empirical measurement has shown that the process introduces 20 defects per 15000cm squared. A disk pack...
30. ### Algebraic manipulation of identity matrix

I was doing a few practice questions and was a bit confused about how the solution manual manipulated the I identity matrix. For example, Just say you had the following I - 2A = B where A and B are 2x2 matrices. B is given, but we need to find A. Therefore, shouldn't it be -2A =...