TRANSPOSE ON VERTEX SYMMETRIC DIGRAPHS

Size: px
Start display at page:

Download "TRANSPOSE ON VERTEX SYMMETRIC DIGRAPHS"

Transcription

1 TRANSPOSE ON VERTEX SYMMETRIC DIGRAPHS Vance Faber Center for Computng Scences, Insttute for Defense Analyses Abstract. In [] (and earler n [3]), we defned several global communcaton tasks (unversal exchange, unversal broadcast, unversal summaton) on drected or vertex symmetrc networks. In that paper, we manly focused on unversal broadcast. In [4], we dscussed unversal sum. Here we contnue ths work and focus on unversal exchange (transpose) n drected vertex symmetrc graphs. Introducton. In unversal exchange, processor has a vector of data a j, where the element a j s a packet needed by processor j. Thus we start wth a matrx A where each processor has a separate row and we end the task wth each processor havng a separate column, n other words, we are computng the transpose. Ths gves rse to two fundamental questons: Gven a drected vertex symmetrc graph G (or any drected graph for that matter), how many tme steps τ (G) does t take to perform a transpose? Gven two drected vertex symmetrc graphs (or general drected graphs for that matter), how do we compare them wth respect to ther ablty to perform a transpose? Graph symmetres. One mportant property of vertex symmetrc graphs s that the number of edges drected nto and out of a gven vertex s a constant d. In our model of communcaton, we assume that on every tme step all the edges n the graph can be used smultaneously, that s, each processor can smultaneously exchange a sngle packet of data wth all of ts neghbors. From here on out, we consder only drected Cayley coset graphs (equvalently, drected vertex symmetrc graphs) G = ( Γ,, H ). Brefly, a Cayley coset graph G has P = [ Γ : H ] cosets of the subgroup H n the group Γ as vertces and degree d = where s a collecton of elements n Γ and H generates Γ. (Note that we allow mult-edges here but we nsst that the graph be connected.) The edges are gven by ( gh, gδ H ) for δ. A necessary and 1

2 suffcent condton for the edges to be well-defned between cosets n ths way s that the unon of the left and rght cosets H = H. In the case where H s the dentty subgroup, G s a drected Cayley graph. Let the number of vertces of dstance k from a gven vertex be n k. A smple fundamental lower bound on τ (G) s gven by the followng lemma. Lemma 1. The tme for transpose s at least as great as the average dameter of the graph: θ (G) Proof. Each element ( ) θ ( G) = τ G knk / d. (Equaton 1) a j travels on a path (task graph) j T from to j. Snce the graph s vertex symmetrc, the total length of these paths from a sngle vertex s at least k n k and that means that all these transfers occupy at least P knk edges. If we could use all Pd edges at once on each tme step, we would acheve a tme equal to θ (G). Problems achevng the optmum value. In order to gve an actual value for the transpose, we have to produce a communcaton graph, a schedule that lsts for each tme whch edges transfer whch data. Ths was dscussed n [, Defntons. and.13]. In the case of transpose, ths s a collecton of drected paths T j n G for each ordered par of vertces wth the propertes that the tmes ncrease on each T j and no edge s labeled twce wth the same tme. (Note that ths can also be thought of as embeddng the complete drected graph nto G.) If we want to acheve θ (G), the paths T j must be nearly the shortest paths from to j. (There s a bt of leeway n the case where θ (G) has been rounded up.) One problem s that any collecton of shortest paths mght have some edges represented more often than others. Another problem s that shortest paths from one vertex mght conflct wth shortest paths from another vertex. We dscuss these problems one at a tme. Paths wthout conflcts. Suppose that G ( Γ,, H ) = s a Cayley graph ( H s the dentty subgroup.) Suppose we express each element g n G by a word w(g) n (n other words, a product of) the members of. Then w dentfes a path from the dentty e to the element g n G. Each entry n w can be thought of as a sngle drected edge n G. Let δ ( j) be the generator n entry j of ths path.

3 Theorem. Suppose we label the edges of the paths w (g) wth ncreasng tmes so that no generator appears more than once wth a gven tme. Then the collecton of paths hw (g) for all h n G s a communcaton graph for transpose on G where the labels on the edges of the hw (g) are dentcal to the labels on w. (g) Proof. We have to show that no edge has the same tme twce. Suppose the same edge appears n h 1 w( g 1 ) and h w( g ) wth the same tme. Thus ths edge can be represented n two ways: ( 1 1 j h g, h gδ ( )) and h h, h hδ ( )). So we must have h1 g = hh and h1 gδ ( j) = hhδ ( k) ( k for some group elements g and h. Ths mples δ ( j ) = δ ( k) = δ. Now the tmes on the edge h g, h g ) n the path h w ) and the edge h h, h h ) n ( 1 1 δ 1 ( g 1 ( δ the path h w( g ) are the same as the tmes on the edge ( g, gδ ) n the word w ( g 1 ) and the edge ( h, hδ ) n the word w ( g ), respectvely, by constructon. Unless g = h and w ( g1) = w( g ), ths volates our assumpton that no two edges wth the same generator n the set of paths can have the same tme. Ths theorem allows us to schedule a transpose on G by creatng a consstent set of tmes on the paths from the dentty to the other elements. Once we have chosen a set of such paths (words) W, we can calculate a lower bound on τ (G) wth respect to these paths. Defnton 1. We let the regular bound on transpose be { δ : δ ( j) W, δ ( = δ } ψ ( G) = mn max j) W δ Remark. Snce we have forced each occurrence of the generator δ to have a dfferent tme, the tme that we obtan for transpose n ths way s at least as great as ψ (G). Also. 3

4 so ( G) ψ ( G) kn k { δ : δ ( j) W, δ ( j) = δ } / d ψ ( ) / d = mn G W δ θ. What s not clear s whether there s any provable relatonshp between the regular bound and the optmal transpose. The deal stuaton would be f each generator appears roughly the same number of tmes n the optmal W but often that cannot be arranged wthout ncreasng the average sze of the words n W beyond the average dameter. There s no obvous reason why the regular bound s a lower bound on the tme for a transpose on G because there s no necessty for tmes to be consstently assocated wth generators throughout the graph so the same tme could appear twce on the same generator n the paths from a fxed vertex to the other vertces. In addton, for ψ (G) to be the maxmum tme n the labelng, every tme must be assgned to one of the occurrences of the generator that appears most often. Ths mght not be possble. Queston 1. Is ( G) ψ ( G) τ =? Spannng factorzatons. The dffculty n routng on vertex symmetrc graphs that are not Cayley graphs s the falure to be able to label edges wth specfc generators. As an example, the problem s seen n the Petersen graph [7] that s vertex symmetrc but cannot be represented as a Cayley graph. The Petersen graph s the complement of the lne graph of K 5 ; the vertces can be represented as -element subsets and { u, v} and { x, y} are connected f they are dsjont. The automorphsm group s somorphc to S 5 ; each automorphsm α s a derved permutaton of vertces of K 5. (That s, gven an automorphsm α t s a map α { u, v} = { ˆ( α u), ˆ( α v)} for a permutaton αˆ.) The stablzer subgroup B of the vertex { 1,} s thus the set of twelve derved permutatons that fx the set { 1,}. One set of generators conssts of the permutatons δ 1, δ, δ derved from ( 13)(4), ( 13)(5), ( 14)(5). Let x = (34)(15). Then 3 xb B are two dstnct vertces of G. Also ( δ 1) xδ1 = (1)(345) B so xδ 1B = δ1b. Ths means that there are two dstnct edges gong out from the xδ 1B = δ1b, one to xb and the other to B, that can be thought to have δ δ. vertex the label δ 1 dependng on whch coset representatve s used, x 1 or 1 We now dscuss a possble soluton to ths problem. Ths secton s taken from [1]. A 1-factor of a drected graph G s a subgraph wth both n-degree and out-degree equal to 1. (Some authors have called ths a -factor. Our defnton seems more consstent wth the notaton n undrected graphs. For example, f the edges are all b-drectonal and the factor s a unon of -cycles, then ths 1 4

5 would be an ordnary 1-factor n an undrected graph.) It s known (Petersen 1891, see [7]) that every regular drected graph wth n-degree and out-degree d has a 1-factorng wth d 1-factors. For completeness, we gve the proof here. Fact 1. Every drected graph G where the n-degree and out-degree of every vertex s d has a edge dsjont decomposton nto d 1-factors. Proof. Form an auxlary graph B wth two new vertces u and u for each vertex u. The edges of B are the pars ( u, v ) where ( u, v) s a drected edge n G. The undrected graph B s bpartte and regular wth degree d so t can be decomposed nto d 1-factors. Each of these 1-factors corresponds to a drected 1-factor n G. In order to create global routng schemes on G, we consder regular graphs wth factorzatons wth addtonal propertes. Defnton. Let F 1, F, K, F d be the factors n a 1-factorng of G. We call a fnte strng of symbols from the set { F } a word. If v s a vertex and ω s a word, then v ω denotes the drected path (and ts endpont) n G startng at v and proceedng along the unque edge correspondng to each consecutve factor represented n the word ω. If G s a graph wth n vertces, we say that a 1- factorng and a set of n words W ω, ω, ω, K, ω }, ω =, s a = { 0 1 n 1 spannng factorzaton of G (wth word lst W ) f for every vertex v, the vertces vω are dstnct. Schedules. A schedule assocated wth a factorzaton s an assgnment of a tme (a label) to each occurrence of each factor n the words of W such that no tme s assgned more than once to a partcular factor and tmes assgned to the factors n a sngle word are ncreasng. The tme of a schedule s the largest tme assgned to any of the factors. If T s the total tme, the schedule can be thought of as a d T array where each row corresponds to a factor and an entry n that row ndcates whch occurrence of that factor has been assgned the correspondng tme. An entry n a row n the array can be empty ndcatng no occurrence of that factor has been assgned the gven tme. The power of a spannng factorzaton les n the fact that a schedule can be used to descrbe an algorthm for conflct free global exchange of nformaton between the vertces of the graph. Theorem 3. Suppose we have a schedule for a factorzaton of the graph G. Then the collecton of drected label-ncreasng paths vω for all v and nonempty ω have the property that no edge n the graph s assgned the same tme 0 5

6 twce. A schedule for a spannng factorzaton yelds a tme labeled drected path between every two vertces so that no edge s labeled wth the same tme twce. Proof. Each edge n the graph s assgned to a sngle one factor. Assume there s an edge n the one factor F that has been assgned the same tme twce. Snce every occurrence of F n the words n W has been assgned a unque tme, ths can only mean that there are two dfferent vertces u and v and an ntal subword ω of a word n W such that the edges ( uω, uω F) and ( vω, vω F) are the same edge. Then u ω and v ω must be the same vertex. Let us assume that ths s the shortest ω for whch ths happens. The word ω cannot be empty snce u and v are dfferent. But then the last factor n ω must also be the same edge, a contradcton. If we start wth a spannng factorzaton, then all the non-empty paths from v are unque, there are n 1 of them and none of them can return to v so they must reach to every other vertex n the graph. There are some addtonal propertes that a spannng factorzaton mght have. Defnton. We say a spannng factorzaton s balanced f each factor appears nearly as often n the schedule as any other. We say the factorzaton s short f the average number of tmes a factor appears s the same as the theoretcal lower bound θ based on the average dstance between any two vertces and the number of edges. We say the factorzaton s optmal f t s short and balanced. A schedule Σ s mnmum for a spannng factorzaton, f t has tme τ (Σ) equal to the theoretcal mnmum tme for the factorzaton based on maxmum number of tmes a factor appears. In mathematcal terms, we can wrte () balanced f max{ F : F W} = d = 1 { F : F W} / d ; () short f here s the dameter; d = 1 W} / d = kn D k { F : F, k= 1 nd N k s the number of tmes the dstance between two vertces s k and D () optmal f 6

7 D knk max { F : F W} = ; k= 1 nd (v) mnmum f Note that these parameters are ordered D k= 1 kn nd k d = 1 ( Σ) = max{ F : F W} τ. { F : F W} / d max{ F : F W} τ ( Σ) Creaton of schedules for spannng factorzatons are dscussed n [6], where the followng s proven. Fact. Every dameter two spannng factorzaton has a mnmum schedule unless the max belongs to a factor F whch s not n a word of length one and s entrely absent n words of length two n one poston, ether frst or second. In that case, the shortest tme for any schedule s one more than the theoretcal mnmum. Theorem 4. Every Cayley graph has a short factorzaton. Proof. Ths s a sketch. Take a tree T 1 of shortest paths from the dentty of the group. The factors consst of all the edges labeled wth a specfc generator. The words are just the paths n T 1, so the factorzaton s short. Queston. Does every vertex symmetrc graph have a factorzaton or even a short factorzaton? Graphs of dameter wth a spannng factorzaton. There s one type of graph for whch we can always construct an optmal transpose. Defnton. If G s a drected graph and v s a vertex n G, then for any postve nteger r, S r (v) s the set of all vertces u n G for whch there s a drected path from v to u of length less than or equal to r. Defnton 3. We call L S ( e) S 1( e) r = the r layer. r r. 7

8 Theorem 5. Let be a graph of dameter wth a spannng factorzaton and the elements of the layer can be represented by words x y n the generators. Let M (δ ) be the number of tmes that the generator δ appears as an x and N(δ ) be the number of tmes that the generator δ appears as a y. If M ( ) + N( ) ( G) 1 ( G) = ( G) ( G. δ δ θ for all δ, then τ θ = ψ ) Proof. To prove ths theorem, we need to show that we can fnd a schedule wth θ (G) columns. Frst note that f n s the number of vertces n the layer, then δ ( M ( ) + N( δ )) = n δ. Snce θ G) = ( d + n ) / d = n / d 1 ( + δ, then ( M ( δ ) + N( δ ))/ d = θ ( G) 1 and the hypothess says that the total number of tmes any generator appears s as close to the average as possble. In order to construct the schedule, we appeal to Corollary 4 n [6]. Here a generator s called a machne and a word s called a job and each generator appearng as an x s called a type 1 step and each generator appearng as a y s called a type step. Corollary 4 (from [6]). Gven s 1 jobs wth one step and s jobs wth two steps, T = s s )/ d ) f and only f there exsts an optmal schedule (n tme ( 1 + each machne s assgned at most T steps and no machne s assgned exclusvely steps of one type, ether type 1 or type from jobs wth steps. In our case, we have s = d 1 and the machne (generator) δ s assgned M ( δ ) + N( δ ) + 1 θ ( G ) = T steps whch by hypothess s at most. Snce every machne s assgned one job wth a sngle step (the members of the 1 layer), the exclusvty condton s satsfed so the hypotheses hold and the theorem guarantees the exstence of the requred schedule. In addton, a ccorollary of Theorem 1 n [6] yelds a more general statement. 8

9 Corollary 6. Let be a graph of dameter wth a spannng factorzaton and the elements of the layer can be represented by words x y n the generators. Let M (δ ) be the number of tmes that the generator δ appears as an x and y. Then N(δ ) be the number of tmes that the generator δ appears as a τ ( G ) 1 + max( M ( δ ) + N( δ )). δ Comparng transpose on two networks wth dfferent parameters. For ths comparson, we need to make some model assumptons. We nvestgated ths prevously n [5] wth dfferent model assumptons. Here we create a smple model problem utlzng a transpose. The dea s that we want to compare dfferent network archtectures wth the same overall cost and use the runnng tme of a model algorthm as a way to evaluate the archtecture. Frst, we examne the costs. We make the smplfyng assumpton that memory costs are the same between archtectures and only depend on the problem sze. We consder only two costs, one for the processors and one for the network. We let the cost of a processor be C. For the network, we assume that cost does p not depend upon how many wres are connected to a processng node but only to the overall number of wres n the network. We let the cost of one wre be C w. Then n ths model, the cost s C = PC + PdC = P( C + dcw ). C C p We can wrte ths as γ = = P + d. Cw Cw p w To descrbe the model algorthm, we start wth an N N matrx A wth column vectors v 1, v, L, vn. Our algorthm also uses a gven complcated functon f N N mappng R to R. Let F be the functon that maps the matrx A to the matrx F (A) wth columns f v ), f ( v ), L, f ( v ). Our algorthm s then the ( 1 N teratve algorthm wth M teratons gven by T j+ 1 A j ). A = F( We assume that the CPU tme for ths algorthm has the form NMα (N) for some functon α that represents the runnng tme of f. We make a smple p 9

10 assumpton that the CPU tme scales wth the number of processors so that the CPU tme wth P processors s then NMα( N) T p P =. Gven the P processors and a network G, we dstrbute the columns of A wth N / P columns n each processor. To form the transpose, each processor must send N / P rows from these columns to every other processor. Ths means the network must send ( / P) N peces of nformaton to every other processor. The total communcaton tme for the algorthm s then gven by T c N = M τ ( G). P We can optmstcally estmate τ by usng deal numbers. In the dscusson, we can assume that D s the average dameter of the network, that s, the sum. If the network has as many processors as possble for a certan kn k / P degree and dameter, t wll have about the transpose s able to use all the avalable band wdth on every transpose step, then each processor has to use D wres for each of the P 1 messages t has to transmt so the total band wdth requrement s approxmately N D M Pd =. T c If we assume that algorthm s T D P = d processors. If we assume that DP. Ths yelds aτ that s DP / d and a total communcaton tme of D = D+ d >> C p / C, then d D = Pd ~ γ T T NMα ( N) λ 1 P + c = + DN where λ = 1 / γ < 1. w λ + 1 so the total tme for the The term α (N) s proportonal to the number of operatons n the functon f. If f were a matrx multply, ths could be anywhere from N to N. Let us examne a regme where the two terms are of comparable order n N. We let ( N) N. Then we have to mnmze α = β 10

11 1 +1 β γ D + D. Clearly then, n ths regme we want D to be as large as possble because that allows more processors. However, f D gets too large, then d wll become small and the assumpton that d >> C p / C wll become nvald. In case the growth rate of α (N) s larger than N, then the P strongly and agan, we wll want D as large as possble. w T term domnates even more We can use these results to compare two dfferent networks wth a constraned cost. Frst, we see that constranng cost means constranng the number of wres, that s, C Pd < γ =. Assumng both networks satsfy ths constrant, the C w one wth the largest number of processors s the better one. Summary. We have dscussed transpose on vertex symmetrc networks. We have provded a method to compare the effcency of transpose schemes on two dfferent networks wth a cost functon based on the number processors and wres needed to complete a gven algorthm n a gven tme. REFERENCES 1. Randall Dougherty and Vance Faber, Network routng on regular drected graphs from spannng factorzatons, preprnt.. Vance Faber, "Global communcaton algorthms for Cayley graphs", Arxv.org: Vance Faber, "Global communcaton algorthms for hypercubes and other Cayley coset graphs," Techncal Report, LA-UR , Los Alamos Natonal Laboratory (1987). 4. Vance Faber, "Global sum on symmetrc networks," Arxv.org: Vance Faber, Latency and dameter n sparsely populated processor nterconnecton networks: a tme and space analyss, Techncal Report, LA-UR , Los Alamos Natonal Laboratory (1987). 6. Vance Faber, Amanda Streb and Noah Streb, Ideal unt-tme job shop schedulng, preprnt. 11

12 7. Wkpeda, en.wkpeda.org/wk/petersen_graph. 1

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

Lecture 3. Ax x i a i. i i

Lecture 3. Ax x i a i. i i 18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

Introductory Cardinality Theory Alan Kaylor Cline

Introductory Cardinality Theory Alan Kaylor Cline Introductory Cardnalty Theory lan Kaylor Clne lthough by name the theory of set cardnalty may seem to be an offshoot of combnatorcs, the central nterest s actually nfnte sets. Combnatorcs deals wth fnte

More information

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1] DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm

More information

find (x): given element x, return the canonical element of the set containing x;

find (x): given element x, return the canonical element of the set containing x; COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

Problem Do any of the following determine homomorphisms from GL n (C) to GL n (C)?

Problem Do any of the following determine homomorphisms from GL n (C) to GL n (C)? Homework 8 solutons. Problem 16.1. Whch of the followng defne homomomorphsms from C\{0} to C\{0}? Answer. a) f 1 : z z Yes, f 1 s a homomorphsm. We have that z s the complex conjugate of z. If z 1,z 2

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

1 GSW Iterative Techniques for y = Ax

1 GSW Iterative Techniques for y = Ax 1 for y = A I m gong to cheat here. here are a lot of teratve technques that can be used to solve the general case of a set of smultaneous equatons (wrtten n the matr form as y = A), but ths chapter sn

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Statistical Mechanics and Combinatorics : Lecture III

Statistical Mechanics and Combinatorics : Lecture III Statstcal Mechancs and Combnatorcs : Lecture III Dmer Model Dmer defntons Defnton A dmer coverng (perfect matchng) of a fnte graph s a set of edges whch covers every vertex exactly once, e every vertex

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

n ). This is tight for all admissible values of t, k and n. k t + + n t

n ). This is tight for all admissible values of t, k and n. k t + + n t MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

The internal structure of natural numbers and one method for the definition of large prime numbers

The internal structure of natural numbers and one method for the definition of large prime numbers The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

Linear Regression Analysis: Terminology and Notation

Linear Regression Analysis: Terminology and Notation ECON 35* -- Secton : Basc Concepts of Regresson Analyss (Page ) Lnear Regresson Analyss: Termnology and Notaton Consder the generc verson of the smple (two-varable) lnear regresson model. It s represented

More information

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,

More information

First day August 1, Problems and Solutions

First day August 1, Problems and Solutions FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

THE CHVÁTAL-ERDŐS CONDITION AND 2-FACTORS WITH A SPECIFIED NUMBER OF COMPONENTS

THE CHVÁTAL-ERDŐS CONDITION AND 2-FACTORS WITH A SPECIFIED NUMBER OF COMPONENTS Dscussones Mathematcae Graph Theory 27 (2007) 401 407 THE CHVÁTAL-ERDŐS CONDITION AND 2-FACTORS WITH A SPECIFIED NUMBER OF COMPONENTS Guantao Chen Department of Mathematcs and Statstcs Georga State Unversty,

More information

Week 2. This week, we covered operations on sets and cardinality.

Week 2. This week, we covered operations on sets and cardinality. Week 2 Ths week, we covered operatons on sets and cardnalty. Defnton 0.1 (Correspondence). A correspondence between two sets A and B s a set S contaned n A B = {(a, b) a A, b B}. A correspondence from

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

Spectral Graph Theory and its Applications September 16, Lecture 5

Spectral Graph Theory and its Applications September 16, Lecture 5 Spectral Graph Theory and ts Applcatons September 16, 2004 Lecturer: Danel A. Spelman Lecture 5 5.1 Introducton In ths lecture, we wll prove the followng theorem: Theorem 5.1.1. Let G be a planar graph

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

Complement of Type-2 Fuzzy Shortest Path Using Possibility Measure

Complement of Type-2 Fuzzy Shortest Path Using Possibility Measure Intern. J. Fuzzy Mathematcal rchve Vol. 5, No., 04, 9-7 ISSN: 30 34 (P, 30 350 (onlne Publshed on 5 November 04 www.researchmathsc.org Internatonal Journal of Complement of Type- Fuzzy Shortest Path Usng

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 6 Luca Trevisan September 12, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 6 Luca Trevisan September 12, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 6 Luca Trevsan September, 07 Scrbed by Theo McKenze Lecture 6 In whch we study the spectrum of random graphs. Overvew When attemptng to fnd n polynomal

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso Supplement: Proofs and Techncal Detals for The Soluton Path of the Generalzed Lasso Ryan J. Tbshran Jonathan Taylor In ths document we gve supplementary detals to the paper The Soluton Path of the Generalzed

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

Deriving the X-Z Identity from Auxiliary Space Method

Deriving the X-Z Identity from Auxiliary Space Method Dervng the X-Z Identty from Auxlary Space Method Long Chen Department of Mathematcs, Unversty of Calforna at Irvne, Irvne, CA 92697 chenlong@math.uc.edu 1 Iteratve Methods In ths paper we dscuss teratve

More information

Société de Calcul Mathématique SA

Société de Calcul Mathématique SA Socété de Calcul Mathématque SA Outls d'ade à la décson Tools for decson help Probablstc Studes: Normalzng the Hstograms Bernard Beauzamy December, 202 I. General constructon of the hstogram Any probablstc

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Randić Energy and Randić Estrada Index of a Graph

Randić Energy and Randić Estrada Index of a Graph EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL

More information

Eigenvalues of Random Graphs

Eigenvalues of Random Graphs Spectral Graph Theory Lecture 2 Egenvalues of Random Graphs Danel A. Spelman November 4, 202 2. Introducton In ths lecture, we consder a random graph on n vertces n whch each edge s chosen to be n the

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

Discussion 11 Summary 11/20/2018

Discussion 11 Summary 11/20/2018 Dscusson 11 Summary 11/20/2018 1 Quz 8 1. Prove for any sets A, B that A = A B ff B A. Soluton: There are two drectons we need to prove: (a) A = A B B A, (b) B A A = A B. (a) Frst, we prove A = A B B A.

More information

CONJUGACY IN THOMPSON S GROUP F. 1. Introduction

CONJUGACY IN THOMPSON S GROUP F. 1. Introduction CONJUGACY IN THOMPSON S GROUP F NICK GILL AND IAN SHORT Abstract. We complete the program begun by Brn and Squer of charactersng conjugacy n Thompson s group F usng the standard acton of F as a group of

More information

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur Analyss of Varance and Desgn of Exerments-I MODULE III LECTURE - 2 EXPERIMENTAL DESIGN MODELS Dr. Shalabh Deartment of Mathematcs and Statstcs Indan Insttute of Technology Kanur 2 We consder the models

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

A 2D Bounded Linear Program (H,c) 2D Linear Programming

A 2D Bounded Linear Program (H,c) 2D Linear Programming A 2D Bounded Lnear Program (H,c) h 3 v h 8 h 5 c h 4 h h 6 h 7 h 2 2D Lnear Programmng C s a polygonal regon, the ntersecton of n halfplanes. (H, c) s nfeasble, as C s empty. Feasble regon C s unbounded

More information

A combinatorial problem associated with nonograms

A combinatorial problem associated with nonograms A combnatoral problem assocated wth nonograms Jessca Benton Ron Snow Nolan Wallach March 21, 2005 1 Introducton. Ths work was motvated by a queston posed by the second named author to the frst named author

More information

Random Walks on Digraphs

Random Walks on Digraphs Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Solutions to exam in SF1811 Optimization, Jan 14, 2015

Solutions to exam in SF1811 Optimization, Jan 14, 2015 Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Lecture 12: Classification

Lecture 12: Classification Lecture : Classfcaton g Dscrmnant functons g The optmal Bayes classfer g Quadratc classfers g Eucldean and Mahalanobs metrcs g K Nearest Neghbor Classfers Intellgent Sensor Systems Rcardo Guterrez-Osuna

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 2/21/2008. Notes for Lecture 8

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 2/21/2008. Notes for Lecture 8 U.C. Berkeley CS278: Computatonal Complexty Handout N8 Professor Luca Trevsan 2/21/2008 Notes for Lecture 8 1 Undrected Connectvty In the undrected s t connectvty problem (abbrevated ST-UCONN) we are gven

More information

CHAPTER III Neural Networks as Associative Memory

CHAPTER III Neural Networks as Associative Memory CHAPTER III Neural Networs as Assocatve Memory Introducton One of the prmary functons of the bran s assocatve memory. We assocate the faces wth names, letters wth sounds, or we can recognze the people

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information