0% found this document useful (0 votes)
10 views6 pages

Data Structures - Asymptotic Analysis

This document discusses asymptotic analysis of algorithms. It defines asymptotic analysis and explains that it refers to analyzing an algorithm's mathematical performance as input size increases. It also defines common asymptotic notations like Big-O, Omega, and Theta notation used to classify algorithms based on worst-case, best-case, and average-case time complexity.

Uploaded by

xariey30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views6 pages

Data Structures - Asymptotic Analysis

This document discusses asymptotic analysis of algorithms. It defines asymptotic analysis and explains that it refers to analyzing an algorithm's mathematical performance as input size increases. It also defines common asymptotic notations like Big-O, Omega, and Theta notation used to classify algorithms based on worst-case, best-case, and average-case time complexity.

Uploaded by

xariey30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Data Structures -

Asymptotic Analysis
 Asymptotic analysis of an algorithm refers to defining the mathematical
foundation/framing of its run-time performance. Using asymptotic analysis,
we can very well conclude the best case, average case, and worst case
scenario of an algorithm.
 Asymptotic analysis is input bound i.e., if there's no input to the algorithm, it
is concluded to work in a constant time. Other than the "input" all other
factors are considered constant.
 Asymptotic analysis refers to computing the running time of any operation in
mathematical units of computation. For example, the running time of one
operation is computed as f(n) and may be for another operation it is
computed as g(n2). This means the first operation running time will increase
linearly with the increase in n and the running time of the second operation
will increase exponentially when n increases. Similarly, the running time of
both operations will be nearly the same if n is significantly small.
 Usually, the time required by an algorithm falls under three types −
 Best Case − Minimum time required for program execution.
 Average Case − Average time required for program execution.
 Worst Case − Maximum time required for program execution.
Asymptotic Notations
 Following are the commonly used asymptotic notations to calculate the running time complexity of an algorithm.
 Ο Notation
 Ω Notation
 θ Notation

Big Oh Notation, Ο
 The notation Ο(n) is the formal way to express the upper bound of an algorithm's running time. It measures the
worst case time complexity or the longest amount of time an algorithm can possibly take to complete.

Ο(f(n)) = { g(n) : there exists c > 0 and n0 such that f(n) ≤ c.g(n) for all n > n0. }
Omega Notation, Ω
 The notation Ω(n) is the formal way to express the lower bound of an
algorithm's running time. It measures the best case time complexity or the
best amount of time an algorithm can possibly take to complete.

Ω(f(n)) ≥ { g(n) : there exists c > 0 and n0 such that g(n) ≤ c.f(n) for all n > n0. }
Theta Notation, θ
 The notation θ(n) is the formal way to express both the lower bound and the
upper bound of an algorithm's running time. It is represented as follows −

θ(f(n)) = { g(n) if and only if g(n) = Ο(f(n)) and g(n) = Ω(f(n)) for all n > n0. }
Common Asymptotic Notations
Following is a list of some common asymptotic notations −

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy