Semantics of Biological Regulatory Networks
|
|
- Clemence Williams
- 5 years ago
- Views:
Transcription
1 Electronic Notes in Theoretical Computer Science 180 (2007) Semantics of Biological Regulator Networks Gilles Bernot b Franck Casse a Jean-Paul Comet b Franck Delaplace b Céline Müller b Olivier Rou a a IRCCN, UMR CNRS 6597, BP rue de la Noë, Nantes Cede 3, France b LaMI-genopole, UMR CNRS 8042, UEVE, 523 Place des Terrasses, Evr Cede, France Abstract The aim of the paper is to revisit the model of Biological Regulator Networks (BRN) which was proposed b René Thomas to model the interactions between a set of genes. We give a formal semantics for BRN in terms of transition sstems which formalies the evolution rules given b René Thomas. Then we show how to use this model to find interesting properties of a BRN like the set of stable states, ccles etc using tools for analing transition sstems. Kewords: Biological regulator network, BRN, biological sstem 1 Introduction Modeling of Biological Sstems. The arrival of massive amount of epression data puts the emphasis on computational methods to overcome the difficulties of interpretation of eperimental data. Instead of providing a clear eplanation of biological sstems, data reveals the difficult for analing them. The variet of components and their interacting capabilities lead to cope with their compleit. This opens a field of modeling to investigate computational biological sstems. Computational sstems biolog [10] tries to establish methods and techniques that enable us to understand the structure of the sstem, such as gene/metabolic/signal transduction networks. The modeling of the dnamics of such sstems is a first step towards the control, the design and the modification of the sstems in order to ensure some desired properties[4]. Formal Methods. Formal methods have been used for a decade or more in the area of verification of safet critical sstems. The techniques and tools that have emerged from this /$ see front matter 2007 Elsevier B.V. All rights reserved. doi: /j.entcs
2 4 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14 field to anale the behaviors of such sstems, makes it possible to model and verif comple concurrent sstems (huge number of states) even with continuous information (dense time) or parameters. It is then natural to tr and use such techniques to model and anale biological sstems especiall when one wants to find properties about their behaviors. Biological Regulator Networks. Biological Regulator Networks (in the sequel BRN) modelie interactions between biological entities (RNA or Proteins). Their regulations involve a lot of comple processes, but it is common to simplif the compleit of the regulations b taking into account onl two actions: activation and inhibition. BRNs are staticall represented b graphs: vertices abstract genes and edges represent their interactions (activation or inhibition). Moreover at a given time, a numerical value is associated to each verte to describe the concentration level of the corresponding entit. The René Thomas boolean approach has been justified as a discretiation of the continuous differential equation sstem[5], it has been confronted to the more classical analsis in terms of differential equations[3]. Then Thomas and Snoussi showed that all stead states can be found via the discrete approach[6]. More recentl Thomas and Kaufman have shown that the discrete description provides a qualitative fit of the differential equations with a small number of possible combinations of values for the parameters[9]. Works of René Thomas and co-workers provide the basis to develop a formal computational framework for gene regulation and its analsis [1]. Our Contribution. In this paper we propose a semantics for an etended gene regulator model of R. Thomas theor. In our etended model a gene can be activator at a certain level and inhibitor at another. This is to our knowledge the first time a formal semantics is proposed for BRN. This enables us to derive automaticall a behavioral model of a BRN and use eisting tools for analing finite state models (e.g. model-checking tools). Outline of the Paper. The paper is organied as follows: section 2 gives the basics of BRN. The core of the paper is in section 3 where we give a formal semantics for BRN. In section 4 we show on a small eample how to use the tool HTech [2] toanaleabrn. 2 Biological Regulator Networks Notations Given a finite set E, E denotes the cardinalit of E. Wedenote2 E the set of subsets of E. If φ is a formula of propositional logic over a set X, [φ] denotes the set of values of the variables satisfing φ. B convention, if U =, φ() are propositional formulas, U φ() =true.
3 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) Biological eamples often rel on intervals: an integer interval [a, b] stands for the set of values { N,a b}, and we denote [] the empt interval. The original model of Biological Regulator Networks [3] makes the assumption that the actual concentration of the products of the genes can be approimated b integer levels: the continuous concentration function is approimated b a piecewise constant function. Those constant levels give the epression levels of the genes. In our formal description of a Biological Regulator Network, a set V of variables stands for the genes of the network. An oriented edge from a variable to indicates that is a regulator (activator, inhibitor) of. Definition 2.1 [Biological Regulator Networks.] Network (BRN) is a 3-uple R =(V,E,π) where: V is a finite set of vertices, E V V is a finite set of edges, A Biological Regulator π =(π +,π )withπ : E 2 N 2 N are respectivel the activation and inhibition functions associated to an edge e E. Moreover, we assume: e E, π + (e) π (e) []: an edge corresponds to a regulation. π + (e) π (e) = []: for a given level, a gene cannot be both activator and inhibitor. Remark 2.2 For v V we will use v as well to denote the epression level of the gene v. π + (, ) (resp. π (, )) gives the interval inside which activates (resp. inhibits). Notethatπ + (, ) =[](resp. π (, ) = []), means that never activates (resp. inhibits). Note also that Def. 2.1 rules out edges (, ) for which π + (, ) =π (, ) = [] which would have no observable effect in the network. ([1,1], []) ([1,1], [2,2]) ([], [1,1]) ([1,1], []) ([], [1,1]) Eemple 1 Eemple 2 Fig. 1. Eamples of BRNs Eample 2.3 Figure 1 gives two eamples of BRN. In the first eample, V = {,, } and π(, ) =([1, 1], []): activates when has the level 1; π(, ) =
4 6 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14 ([], [1, 1]): inhibits when has the level 1; π(,) =([1, 1], []): activates when has the level 1. The meaning of the second eample is defined accordingl. Definition 2.4 [Activators and Inhibitors.] Let R =(V,E,π) be a Biological Regulator Network, we define the following sets: (i) V,R + () ={ V,π + (,) []} is the set of activators of, (ii) V,R () ={ V,π (, ) []} is the set of inhibitors of. Eample 2.5 For eample 1 of Figure 1, R + () =, R () ={}, R + () ={,}, R () = and R + () =, R () =. Ineample2R + () =, R () ={} and R + () ={}, R () ={}. 3 Formal Semantics of Biological Regulator Networks In René Thomas theor, the evolution of the epression levels of the genes is described b an original notion of attractor. Informall, it represents an upper or a lower bound which is attained if no change occurs in the rest of the BRN. Hence, the computation of the evolution of concentrations is based on the attractors. The are defined b a set of parameters. The evolution of the BRN highl depends on the choice of those parameters. In this section, we formalie the evolution of the states of a BRN b a transition sstem. This semantics also involves some evolution parameters as defined in [3]. 3.1 State Space of a BRN Definition 3.1 [State Space of a BRN.] Let R =(V,E,π) beabrn.thestate space S of a variable V is defined b S =[0, ma V π + (, ) π (, )]. The state space of R is defined b S(R) = V S. A state of the network R is a mapping ν : V N such that V,ν() S. The previous definition of the set S requires that 0 belong to the state space. Eample 3.2 For the eample 2 of Figure 1, S =[0, 2],S =[0, 1]. 3.2 Parameters of a BRN As alread mentioned in the beginning of this section, the behavior of a BRN depends on some parameters. Those parameters pla the role of attractors and give the epression levels towards which a gene is attracted, depending on which genes activate or inhibit it. Definition 3.3 [Parameters of a BRN.] Let R =(V,E,π) beabrn.theset Para(R) ofparameters of R is defined b Para(R) ={K,A,B A R + (),B R ()}
5 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) A valuation of the parameters Para(R) is a mapping κ : Para(R) N such that V,A R + (),B R (),κ(k,a,b ) S. In the sequel we use K,U,V instead of κ(k,u,v ) when the meaning is clear from the contet. Definition 3.4 [Activit Assumption.] Let R =(V,E,π) beabrnandκ a valuation for Para(R). κ satisfies the activit assumption iff V : R + (), X + R + (), X R (),κ(k,x+ {},X ) >κ(k,x+,x ) R (), X + R + (), X R (),κ(k,x+,x {}) <κ(k,x+,x ) Definition 3.5 [Monotonicit Assumption.] Let R =(V,E,π) beabrnand κ be a valuation for Para(R). κ satisfies the monotonicit assumption iff: X + R + (), X R (), X + R +(), X R (), X + X +,X X κ(k,x+,x ) κ(k,x +,X ). The activit assumption stands for the observabilit of the action of a gene on another. Without this assumption it is possible that an combination of activators of a gene does not have an observable effect on the target gene because its level of epression would remain the same. It seems then quite obvious that an valuation of the parameters should satisf this propert. The monotonicit propert is is a biological eperimental fact, alread pointed out b René Thomas. Anwa our framework does not rel on these assumptions motivated b biolog. Eample 3.6 In the eample 2 of Figure 1, a possible valuation of the parameters is: K,, =0,K,, =1andK,, =0,K,, =0,K,, =0,K,, =1and K,, = 0. Notice that this valuation does not satisf the activit propert as K,, K,,.IfwetakeK,, =1,K,, = 0 this propert is satisfied. 3.3 Transition Sstem of a BRN Let us consider a BRN R =(V,E,π). Following [8,7] the evolution of the state of the network depends (i) on the epression level of the genes (ii) on a set of parameters (see Def. 3.3). The epression level of a gene ma either decrease or increase according to which other genes of the network activate or inhibit it. If X + and X are respectivel the set of genes that currentl activate and the set that currentl inhibit, then the value of evolves towards the value defined b the parameter K,X+,X. Which genes are currentl activating or inhibiting is defined according to the levels given in the network (e.g. for eample 2 of Figure 1, activates when its epression level is 1, inhibits when its epression level is 2, and has no effect on when it is 0.) We formall define the different configurations of a network according to the activators and inhibitors of a gene in Def Definition 3.7 [State constraints of a BRN.] For V, X + R + (), X R (), we define A,X+, I,X and C,X+,X b: ( ) ( ) A,X+ = X ( π + +(, )) R + ()\X (/ π + +(, )) ( ) ( ) I,X = X ( π (, )) R ()\X (/ π (, ))
6 8 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14 C,X+,X = A,X+ I,X C,X+,X is true iff the values of the genes in X + are in the intervals in which the activate and the values of the genes in X are in the intervals in which the inhibit. Eample 3.8 For eample 2 of Fig. 1 the activation and inhibition functions are: π + (, ) =[1, 1],π (, ) =[2, 2] and π + (, ) =,π (, ) =[1, 1]. The activators and inhibitors sets are given b R + () =, R () = and R + () =,R () =. The set of constraints are given b: C,, = / [1, 1], C,, = [1, 1] / [2, 2] and C,, = / [1, 1] [2, 2]. Another feature of the evolution of the state of a network is that the epression level of a gene evolves step-b-step i.e. it cannot go from 1 to 3 in a single step, it must evolve b one unit from 1 to 2 and if some conditions are met 1 will go from 2 to 3. This is captured in the definition of an evolution operator: Definition 3.9 [Evolution Operator.] Let N and k N. The evolution operator is defined b: 1iff>k k = +1 iff<k otherwise Notice that in the case = k the net value of will remain equal to k. We can now define a transition sstem giving the semantics of a BRN. Definition 3.10 [Transition Sstem of a BRN.] Let R =(V,E,π) beabrn and κ a valuation of the parameters in Para(R). The semantics of R with valuation κ is the labeled transition sstem S R (κ) =(S(R),V, ) with S(R) V S(R) such that: A R + (), B R (),ν [C,A,B ] ν ν ν() K,A,B ν () = K,A,B, ν () =ν() Remark 3.11 Note that according to Def. 3.7, there is a unique ν such that ν ν. The transition sstem S R (κ) is (partiall) deterministic in the sense it is deterministic for each -transition. Nevertheless, there ma be another -transition from the state ν and thus S R (κ) is not deterministic. The nondeterminism models the fact that the epression levels of the genes evolve asnchronousl. Note also that there is an -transition onl when has not reached the value it tends to get closer to (i.e. K,A,B for the right 1 it could be that from level 2 it is impossible to reach level 3.
7 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) A and B). This will enable us to define the stable states of a network as those states that have no outgoing transitions (the deadlock states). Definition 3.12 [Stable State of a BRN.] Let R =(V,E,π) beabrnandκ a valuation of the parameters in Para(R) ands R (κ) =(S(R),V, ) its semantics. A state ν S(R) isnon stable iff ν S(R), V such that ν ν.astateν is a stable state if it is not a non stable state (i.e. a stable state is a deadlock state). 4 Simple Case-Stud We consider in this section the eample 1 of Fig. 1. We use the verification tool Htech [2] to automaticall compute the results. Of course we could have chosen an model-checker to anale our models but Htech enables us to compute some constraints on the parameters such that certain properties are satisfied (we will not cover this in this paper.) The Htech input files and results are given in appendi A. The set of activators and inhibitors are given in Eample 2.5, page 4. Thestate space is S =[0, 1], S =[0, 1] and S =[0, 1]. The parameters are K,,, K,, (for ); K,,, K,,, K,,, K,{,}, (for ) andk,, (for ). 4.1 Eample with Regular Stabiliation Let us fi the following values for the parameters: K,, =1 K,, =0 K,, =0 K,, =0 K,, =0 K,{,}, =1 K,, =0 The monotonicit and activit assumptions are satisfied b these parameters. For this eample we obtain the transition sstem given in Fig. A.1 in the appendi A. The Htech input file is given in appendi A. We can easil compute the set of stable states and non stable states as given in the output file Figure A.3, appendi A, 12. Note that the ccle reveals indeed an equilibrium state which is not stable. 4.2 Eample without Regular Stabiliation Let us now fi the parameters to: K,, =1 K,, =0 K,, =0 K,, =1 K,, =1 K,, =1 K,, =0
8 10 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14 The transition sstem obtained in this case is given in Fig. A.1 on the right, appendi A. Again the results (Figure A.3 right hand side, appendi A, page 12) obtained with Htech show that there is no regular stable state in this case. Note that the ccle is indeed a stable state, which is called singular in the R.Thomas approach. 5 Conclusion and Future Work In this paper we have given a formal semantics for Biological Regulator Network. The main advantages of this work are (i) the formal semantics enables us to build automaticall a (behavioral) model of a network (ii) this model can then be analed b verification tools eactl as safet critical programs can be (e.g. the formal semantics characteries the stable and non stable states). Our future work will consist in adding timing constraints in the network to build a more accurate model. Our semantics is read to be etended with timing constraints: in this case we will derive a timed or hbrid automata model and use tools for analing this tpes of models to prove properties of the network. Acknowledgement The authors thank genopole-research in Evr (H. Pollard and P. Tambourin) for constant support. Comments from the anonmous referees have also been ver constructive. References [1] O. Cinquin and J. Demongeot. Roles of positive and negative feedback in biological sstem. C. R. Biol, 325(11): , [2] Thomas A. Heninger, Pei-Hsin Ho, and Howard Wong-Toi. HYTECH: A model checker for hbrid sstems. International Journal on Software Tools for Technolog Transfer, 1(1-2): , [3] M. Kaufman and R. Thomas. Model analsis of the bases of multistationarit in the humoral immune response. J. Theor. Biol., 129(2):141 62, [4] H. Kitano. Looking beond the details: a rise in sstem-oriented approaches in genetics and molecular biolog. Curr. Genet., 41(1):1 10, [5] E.H Snoussi. Qualitative dnamics of a piecewise-linear differential equations : a discrete mapping approach. Dnamics and stabilit of Sstems, 4: , [6] E.H. Snoussi and R. Thomas. Logical identification of all stead states : the concept of feedback loop caracteristic states. Bull. Math. Biol., 55(5): , [7] R. Thomas. Logical analsis of sstems comprising feedback loops. J. Theor. Biol., 73(4):631 56, [8] R. Thomas, A.M. Gathoe, and L. Lambert. A comple control circuit. regulation of immunit in temperate bacteriophages. Eur. J. Biochem., 71(1):211 27, [9] R. Thomas and M. Kaufman. Multistationarit, the basis of cell differentiation and memor. I. & II. Chaos, 11: , [10] O. Wolkenhauer. Sstems biolog: the reincarnation of sstems theor applied in biolog? Brief Bioinform., 2(3):258 70, 2001.
9 A G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) Appendi In the appendi, we show the use of Htech in the contet of the analsis of the Biological Regulator Network. For the eample of section 4, we use the input file of Fig. A.2 to model our network. The transition sstems is given in Figure A.1. The result is given in Figure A.3.
10 12 (0,0,0) (0,0,1) (1,0,0) (0,1,0) (1,0,1) (1,1,0) (0,0,0) (1,1,1) (0,1,1) (0,0,1) (1,0,1) (1,0,0) (1,1,1) (0,1,1) (1,1,0) (0,1,0) Fig. A.1 Two transition sstems of the BRN of the Eample 2.3, Fig. 1 with (left) and without (right) regular stabiliation G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14
11 -- htech input file var k O_O,k O_,k O_O,k O, k O,k 0,k O_O: parameter ; -- parameters,,: discrete ; k: discrete ; -- k changes on ever discrete transition k1,k2,k3: parameter ; -- used for detecting ccles automaton rrb snclabs: ; initiall Start ; loc Start: while >=0 & >=0 & >=0 & <=1 & <=1 & <=1 wait {} -- C_,O,O -> K O_O when < 1 & > k O_O do { =-1,k =1-k} goto Start; when < 1 & < k O_O do { =+1,k =1-k} goto Start; -- C_,O, when >= 1 & < k O_ do { =+1,k =1-k} goto Start; when >= 1 & > k O_ do { =-1,k =1-k} goto Start; -- C_,O,O -> k O_O when <1 & <1 & < k O_O do { =+1,k =1-k} goto Start; when <1 & <1 & > k O_O do { =-1,k =1-k} goto Start; -- C_,,O -> k O_0 when >=1 & <1 & < k O do { =+1,k =1-k} goto Start; when >=1 & <1 & > k O do { =-1,k =1-k} goto Start; -- C_,,O when <1 & >=1 & < k O do { =+1,k =1-k} goto Start; when <1 & >=1 & > k O do { =-1,k =1-k} goto Start; -- C_,,O when >=1 & >=1 & < k 0 do { =+1,k =1-k} goto Start; when >=1 & >=1 & > k 0 do { =-1,k =1-k} goto Start; -- C_,O_O when < k O_O do { =+1,k =1-k} goto Start; when > k O_O do { =-1,k =1-k} goto Start; end var init_reg, f_reachable, stable_states, non_stable_states, _f_reachable, ccle_states : region; init_reg := loc[rrb]=start & >=0 & >=0 & >=0 & <=1 & <=1 & <=1 & k O_O=1 & k O_=0 & k O_O=0 & k O=1 & k O=1 & k 0=1 & k O_O=0; prints "initial values for the K_ parameters and,,:" ; print omit rrb locations hide k,k1,k2,k3 in init_reg endhide ; -- compute the reachable set of states... must be finite -- even if there is a ccle f_reachable := reach forward from init_reg endreach; if empt(f_reachable) then prints "No reachable states..."; else Fig. A.2 Htech Specification of the BRN of Eample 2.3, Figure1. prints "The reachable states are:"; print hide k O_O,k O_,k O_O,k O, k O,k 0,k O_O,k in f_reachable endhide; endif ; -- compute the projection on, of f_reachable _f_reachable := hide k O_O,k O_,k O_O,k O, k O,k 0,k O_O,k in f_reachable endhide; -- compute the set of non stable states i.e. reachable states -- with a successor -- define the strict predecessor operator -- here is a trick to do this with Htech (otherwise Htech computes -- the set of predecessor of a set including the set itself) -- hide k in pre(a & k=0) & k=1 endhide gives the strict predecessor -- of A non_stable_states := f_reachable & hide k in (pre(f_reachable & k=0) & k=1) endhide; -- print the result if empt(non_stable_states) then prints "No non stable states"; else prints "the reachable non stable states are:"; print hide k O_O,k O_,k O_O,k O, k O,k 0,k O_O,k in non_stable_states endhide; endif ; stable_states := f_reachable & ~non_stable_states ; if empt(stable_states) then prints "No stable states...!!!"; else prints "The reachable stable states are:"; print hide k O_O,k O_,k O_O,k O, k O,k 0,k O_O,k in stable_states endhide; endif ; -- now look for ccles... eas in htech with hide -- (eistential quantification) -- first we define the strict sucessor function -- it is a post where k changes followed b a reach ccle_states := =k1 & =k2 & =k3 & f_reachable & reach forward from hide k O_O,k O_, k O_O,k O,k O,k 0,k O_O,k in (post(=k1 & =k2 & =k3 & f_reachable & k=0) & k=1) endhide endreach; -- print the result if empt(ccle_states) then prints "No infinite path in the sstem"; else prints "There is a ccle in the sstem!... from an of these states:"; print hide k O_O,k O_,k O_O,k O, k O,k 0,k O_O,k,k1,k2,k3 in ccle_states endhide; endif ; G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007)
12 14 initial values for the K_ parameters and,,: k O_O = 1 & k O_ = 0 & k O_O = 0 & k O = 0 & k O = 0 & k 0 = 1 & k O_O = 0 & <= 1 & <= 1 & >= 0 & >= 0 & >= 0 & <= 1.Number of iterations required for reachabilit: 1 The reachable states are: <= 1 & >= 0 & <= 1 & >= 0 & <= 1 & >= 0 the reachable non stable states are: = 0 & < 1 & >= 0 & >= 0 & <= 1 = 1 & = 1 & <= 1 & >= 0 = 1 & < 1 & < 1 & >= 0 & >= 0 = 1 & >= 0 & <= 1 & >= 0 & <= 1 The reachable stable states are: < 1 & 0 < & < 1 & >= 0 & <= 1 & >= 0...Number of iterations required for reachabilit: 7 There is a ccle in the sstem!... from an of these states: = 1 & = 0 & = 1 = 1 & = 1 & = 0 = 1 & = 1 & = 1 = 1 & = 0 & = 0 ================================================================= Ma memor used = 0 pages = 0 btes = 0.00 MB Time spent = 57.24u s = sec total ================================================================= initial values for the K_ parameters and,,: k O_O = 1 & k O_ = 0 & k O_O = 0 & k O = 1 & k O = 1 & k 0 = 1 & k O_O = 0 & <= 1 & <= 1 & >= 0 & >= 0 & >= 0 & <= 1.Number of iterations required for reachabilit: 1 The reachable states are: <= 1 & >= 0 & <= 1 & >= 0 & <= 1 & >= 0 the reachable non stable states are: = 0 & < 1 & >= 0 & >= 0 & <= 1 = 1 & = 1 & <= 1 & >= 0 = 1 & < 1 & < 1 & >= 0 & >= 0 = 0 & = 1 & < 1 & >= 0 = 1 & >= 0 & <= 1 & >= 0 & <= 1 The reachable stable states are: 0 < & < 1 & <= 1 & 0 < & >= 0 & < 1 >= 0 & < 1 & 0 < & < 1 & >= 0 & < 1...Number of iterations required for reachabilit: 7 There is a ccle in the sstem!... from an of these states: = 1 & = 0 & >= 0 & < 1 = 0 & = 1 & >= 0 & < 1 = 1 & = 1 & >= 0 & < 1 = 0 & = 0 & >= 0 & < 1 ================================================================= Ma memor used = 0 pages = 0 btes = 0.00 MB Time spent = 73.04u s = sec total ================================================================= Fig. A.3 Htech results for eample of Fig. A.2 (with(left) and without (rigth) regular stabiliation) G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14
Méthode logique multivaluée de René Thomas et logique temporelle
Méthode logique multivaluée de René Thomas et logique temporelle Gilles Bernot Universit of Nice sophia antipolis, I3S laborator, France Menu 1. Models and formal logic 2. Thomas models for gene networks
More informationConstant 2-labelling of a graph
Constant 2-labelling of a graph S. Gravier, and E. Vandomme June 18, 2012 Abstract We introduce the concept of constant 2-labelling of a graph and show how it can be used to obtain periodic sphere packing.
More information* τσ σκ. Supporting Text. A. Stability Analysis of System 2
Supporting Tet A. Stabilit Analsis of Sstem In this Appendi, we stud the stabilit of the equilibria of sstem. If we redefine the sstem as, T when -, then there are at most three equilibria: E,, E κ -,,
More informationModels for Efficient Timed Verification
Models for Efficient Timed Verification François Laroussinie LSV / ENS de Cachan CNRS UMR 8643 Monterey Workshop - Composition of embedded systems Model checking System Properties Formalizing step? ϕ Model
More informationReview Topics for MATH 1400 Elements of Calculus Table of Contents
Math 1400 - Mano Table of Contents - Review - page 1 of 2 Review Topics for MATH 1400 Elements of Calculus Table of Contents MATH 1400 Elements of Calculus is one of the Marquette Core Courses for Mathematical
More informationAnalysing formal models of genetic regulatory networks with delays. Gilles Bernot, Jean-Paul Comet and Adrien Richard
240 Int. J. Bioinformatics Research and Applications, Vol. 4, No. 3, 2008 Analysing formal models of genetic regulatory networks with delays Jamil Ahmad and Olivier Roux IRCCyN UMR CNRS 6597, BP 92101,
More informationThe Maze Generation Problem is NP-complete
The Mae Generation Problem is NP-complete Mario Alviano Department of Mathematics, Universit of Calabria, 87030 Rende (CS), Ital alviano@mat.unical.it Abstract. The Mae Generation problem has been presented
More informationLESSON #42 - INVERSES OF FUNCTIONS AND FUNCTION NOTATION PART 2 COMMON CORE ALGEBRA II
LESSON #4 - INVERSES OF FUNCTIONS AND FUNCTION NOTATION PART COMMON CORE ALGEBRA II You will recall from unit 1 that in order to find the inverse of a function, ou must switch and and solve for. Also,
More informationResearch Article Chaotic Attractor Generation via a Simple Linear Time-Varying System
Discrete Dnamics in Nature and Societ Volume, Article ID 836, 8 pages doi:.//836 Research Article Chaotic Attractor Generation via a Simple Linear Time-Varing Sstem Baiu Ou and Desheng Liu Department of
More informationProperty preservation along embedding of biological regulatory networks
Property preservation along embedding of biological regulatory networks Mbarka Mabrouki 12, Marc Aiguier 12, Jean-Paul Comet 3, and Pascale Le Gall 12 1 École Centrale Paris Laboratoire de Mathématiques
More informationControl Schemes to Reduce Risk of Extinction in the Lotka-Volterra Predator-Prey Model
Journal of Applied Mathematics and Phsics, 2014, 2, 644-652 Published Online June 2014 in SciRes. http://www.scirp.org/journal/jamp http://d.doi.org/10.4236/jamp.2014.27071 Control Schemes to Reduce Risk
More informationSAT Modulo ODE: A Direct SAT Approach to Hybrid Systems
Welcome ATVA 2008 SAT Modulo ODE: A Direct SAT Approach to Hbrid Sstems Andreas Eggers, Martin Fränzle, and Christian Herde DFG Transregional Collaborative Research Center AVACS Outline Motivation Bounded
More informationThe algorithmic analysis of hybrid system
The algorithmic analysis of hybrid system Authors: R.Alur, C. Courcoubetis etc. Course teacher: Prof. Ugo Buy Xin Li, Huiyong Xiao Nov. 13, 2002 Summary What s a hybrid system? Definition of Hybrid Automaton
More informationFlows and Connectivity
Chapter 4 Flows and Connectivit 4. Network Flows Capacit Networks A network N is a connected weighted loopless graph (G,w) with two specified vertices and, called the source and the sink, respectivel,
More informationnm nm
The Quantum Mechanical Model of the Atom You have seen how Bohr s model of the atom eplains the emission spectrum of hdrogen. The emission spectra of other atoms, however, posed a problem. A mercur atom,
More informationThe approximation of piecewise linear membership functions and Łukasiewicz operators
Fuzz Sets and Sstems 54 25 275 286 www.elsevier.com/locate/fss The approimation of piecewise linear membership functions and Łukasiewicz operators József Dombi, Zsolt Gera Universit of Szeged, Institute
More informationSection 1.5 Formal definitions of limits
Section.5 Formal definitions of limits (3/908) Overview: The definitions of the various tpes of limits in previous sections involve phrases such as arbitraril close, sufficientl close, arbitraril large,
More information12.1 Systems of Linear equations: Substitution and Elimination
. Sstems of Linear equations: Substitution and Elimination Sstems of two linear equations in two variables A sstem of equations is a collection of two or more equations. A solution of a sstem in two variables
More informationRoberto s Notes on Integral Calculus Chapter 3: Basics of differential equations Section 3. Separable ODE s
Roberto s Notes on Integral Calculus Chapter 3: Basics of differential equations Section 3 Separable ODE s What ou need to know alread: What an ODE is and how to solve an eponential ODE. What ou can learn
More informationProvable intractability. NP-completeness. Decision problems. P problems. Algorithms. Two causes of intractability:
Provable intractabilit -completeness Selected from Computer and Intractabilit b MR Gare and DS Johnson (979) Two causes of intractabilit: The problem is so difficult that an exponential amount of time
More informationSection 3.1. ; X = (0, 1]. (i) f : R R R, f (x, y) = x y
Paul J. Bruillard MATH 0.970 Problem Set 6 An Introduction to Abstract Mathematics R. Bond and W. Keane Section 3.1: 3b,c,e,i, 4bd, 6, 9, 15, 16, 18c,e, 19a, 0, 1b Section 3.: 1f,i, e, 6, 1e,f,h, 13e,
More informationFACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures AB = BA = I,
FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING Lectures MODULE 7 MATRICES II Inverse of a matri Sstems of linear equations Solution of sets of linear equations elimination methods 4
More informationLogic Model Checking
Logic Model Checking Lecture Notes 10:18 Caltech 101b.2 January-March 2004 Course Text: The Spin Model Checker: Primer and Reference Manual Addison-Wesley 2003, ISBN 0-321-22862-6, 608 pgs. the assignment
More information(2.5) 1. Solve the following compound inequality and graph the solution set.
Intermediate Algebra Practice Final Math 0 (7 th ed.) (Ch. -) (.5). Solve the following compound inequalit and graph the solution set. 0 and and > or or (.7). Solve the following absolute value inequalities.
More informationBifurcations of the Controlled Escape Equation
Bifurcations of the Controlled Escape Equation Tobias Gaer Institut für Mathematik, Universität Augsburg 86135 Augsburg, German gaer@math.uni-augsburg.de Abstract In this paper we present numerical methods
More informationYou don't have to be a mathematician to have a feel for numbers. John Forbes Nash, Jr.
Course Title: Real Analsis Course Code: MTH3 Course instructor: Dr. Atiq ur Rehman Class: MSc-II Course URL: www.mathcit.org/atiq/fa5-mth3 You don't have to be a mathematician to have a feel for numbers.
More informationMethods for Advanced Mathematics (C3) Coursework Numerical Methods
Woodhouse College 0 Page Introduction... 3 Terminolog... 3 Activit... 4 Wh use numerical methods?... Change of sign... Activit... 6 Interval Bisection... 7 Decimal Search... 8 Coursework Requirements on
More informationAn Introduction to Timed Automata
An Introduction to Timed Automata Patricia Bouer LSV CNRS & ENS de Cachan 6, avenue du Président Wilson 943 Cachan France email: bouer@lsv.ens-cachan.fr Introduction Explicit timing constraints are naturall
More informationNew approach to study the van der Pol equation for large damping
Electronic Journal of Qualitative Theor of Differential Equations 2018, No. 8, 1 10; https://doi.org/10.1422/ejqtde.2018.1.8 www.math.u-szeged.hu/ejqtde/ New approach to stud the van der Pol equation for
More informationResearch Article Chaos and Control of Game Model Based on Heterogeneous Expectations in Electric Power Triopoly
Discrete Dnamics in Nature and Societ Volume 29, Article ID 469564, 8 pages doi:.55/29/469564 Research Article Chaos and Control of Game Model Based on Heterogeneous Epectations in Electric Power Triopol
More informationToda s Theorem: PH P #P
CS254: Computational Compleit Theor Prof. Luca Trevisan Final Project Ananth Raghunathan 1 Introduction Toda s Theorem: PH P #P The class NP captures the difficult of finding certificates. However, in
More informationHybrid Modeling of Gene Regulatory Networks: Mixing Temporal and Qualitative Biological Properties
Hybrid Modeling of Gene Regulatory Networks: Mixing Temporal and Qualitative Biological Properties Jonathan Fromentin, Damien Eveillard, Olivier Roux To cite this version: Jonathan Fromentin, Damien Eveillard,
More informationFoundations of Databases
Foundations of Databases (Slides adapted from Thomas Eiter, Leonid Libkin and Werner Nutt) Foundations of Databases 1 Quer optimization: finding a good wa to evaluate a quer Queries are declarative, and
More informationMAT 1275: Introduction to Mathematical Analysis. Graphs and Simplest Equations for Basic Trigonometric Functions. y=sin( x) Function
MAT 275: Introduction to Mathematical Analsis Dr. A. Rozenblum Graphs and Simplest Equations for Basic Trigonometric Functions We consider here three basic functions: sine, cosine and tangent. For them,
More informationPolynomial and Rational Functions
Polnomial and Rational Functions 5 Figure 1 35-mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of work b Horia
More information14.1 Systems of Linear Equations in Two Variables
86 Chapter 1 Sstems of Equations and Matrices 1.1 Sstems of Linear Equations in Two Variables Use the method of substitution to solve sstems of equations in two variables. Use the method of elimination
More informationInterspecific Segregation and Phase Transition in a Lattice Ecosystem with Intraspecific Competition
Interspecific Segregation and Phase Transition in a Lattice Ecosstem with Intraspecific Competition K. Tainaka a, M. Kushida a, Y. Ito a and J. Yoshimura a,b,c a Department of Sstems Engineering, Shizuoka
More informationCycle Structure in Automata and the Holonomy Decomposition
Ccle Structure in Automata and the Holonom Decomposition Attila Egri-Nag and Chrstopher L. Nehaniv School of Computer Science Universit of Hertfordshire College Lane, Hatfield, Herts AL10 9AB United Kingdom
More informationArbitration-Free Synchronization
Arbitration-Free Snchronization Leslie Lamport 22 March 2002 (minor corrections made on 30 September 2002) To appear in the PODC Jubilee Issue of Distributed Computing. Abstract Implementing traditional
More informationIntroduction to Differential Equations. National Chiao Tung University Chun-Jen Tsai 9/14/2011
Introduction to Differential Equations National Chiao Tung Universit Chun-Jen Tsai 9/14/011 Differential Equations Definition: An equation containing the derivatives of one or more dependent variables,
More informationRanking Functions for Size-Change Termination
Ranking Functions for Size-Change Termination CHIN SOON LEE Ma-Planck-Institut für Informatik, Saarbrücken, German This article eplains how to construct a ranking function for an program that is proved
More informationThe State Explosion Problem
The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis
More informationFinite Automata. Mahesh Viswanathan
Finite Automata Mahesh Viswanathan In this lecture, we will consider different models of finite state machines and study their relative power. These notes assume that the reader is familiar with DFAs,
More informationTracking Differentiable Trajectories across Polyhedra Boundaries
Tracking Differentiable Trajectories across Polhedra Boundaries Massimo Benerecetti Elect. Eng. and Information Technologies Università di Napoli Federico II, Ital massimo.benerecetti@unina.it Marco Faella
More informationVCAA Bulletin. VCE, VCAL and VET. Supplement 2
VCE, VCAL and VET VCAA Bulletin Regulations and information about curriculum and assessment for the VCE, VCAL and VET No. 87 April 20 Victorian Certificate of Education Victorian Certificate of Applied
More informationQuantum Computer Algorithms: basics
Quantum Computer Algorithms: basics Michele Mosca Canada Research Chair in Quantum Computation SQUINT Summer School on Quantum Information Processing June 3 Overview A quantum computing model Basis changes
More informationLimits 4: Continuity
Limits 4: Continuit 55 Limits 4: Continuit Model : Continuit I. II. III. IV. z V. VI. z a VII. VIII. IX. Construct Your Understanding Questions (to do in class). Which is the correct value of f (a) in
More informationUNFOLDING THE CUSP-CUSP BIFURCATION OF PLANAR ENDOMORPHISMS
UNFOLDING THE CUSP-CUSP BIFURCATION OF PLANAR ENDOMORPHISMS BERND KRAUSKOPF, HINKE M OSINGA, AND BRUCE B PECKHAM Abstract In man applications of practical interest, for eample, in control theor, economics,
More informationThe Hopf Bifurcation Theorem: Abstract. Introduction. Transversality condition; the eigenvalues cross the imginary axis with non-zero speed
Supercritical and Subcritical Hopf Bifurcations in Non Linear Maps Tarini Kumar Dutta, Department of Mathematics, Gauhati Universit Pramila Kumari Prajapati, Department of Mathematics, Gauhati Universit
More informationFuzzy Topology On Fuzzy Sets: Regularity and Separation Axioms
wwwaasrcorg/aasrj American Academic & Scholarl Research Journal Vol 4, No 2, March 212 Fuzz Topolog n Fuzz Sets: Regularit and Separation Aioms AKandil 1, S Saleh 2 and MM Yakout 3 1 Mathematics Department,
More informationMethods of Solving Ordinary Differential Equations (Online)
7in 0in Felder c0_online.te V3 - Januar, 05 0:5 A.M. Page CHAPTER 0 Methods of Solving Ordinar Differential Equations (Online) 0.3 Phase Portraits Just as a slope field (Section.4) gives us a wa to visualize
More information540 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 4, APRIL Algorithmic Analysis of Nonlinear Hybrid Systems
540 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 4, APRIL 1998 Algorithmic Analysis of Nonlinear Hybrid Systems Thomas A. Henzinger, Pei-Hsin Ho, Howard Wong-Toi Abstract Hybrid systems are digital
More information4.7. Newton s Method. Procedure for Newton s Method HISTORICAL BIOGRAPHY
4. Newton s Method 99 4. Newton s Method HISTORICAL BIOGRAPHY Niels Henrik Abel (18 189) One of the basic problems of mathematics is solving equations. Using the quadratic root formula, we know how to
More information4452 Mathematical Modeling Lecture 13: Chaos and Fractals
Math Modeling Lecture 13: Chaos and Fractals Page 1 442 Mathematical Modeling Lecture 13: Chaos and Fractals Introduction In our tetbook, the discussion on chaos and fractals covers less than 2 pages.
More informationTimed Automata VINO 2011
Timed Automata VINO 2011 VeriDis Group - LORIA July 18, 2011 Content 1 Introduction 2 Timed Automata 3 Networks of timed automata Motivation Formalism for modeling and verification of real-time systems.
More information8.1 Exponents and Roots
Section 8. Eponents and Roots 75 8. Eponents and Roots Before defining the net famil of functions, the eponential functions, we will need to discuss eponent notation in detail. As we shall see, eponents
More informationChapter 5: Systems of Equations
Chapter : Sstems of Equations Section.: Sstems in Two Variables... 0 Section. Eercises... 9 Section.: Sstems in Three Variables... Section. Eercises... Section.: Linear Inequalities... Section.: Eercises.
More informationWe have examined power functions like f (x) = x 2. Interchanging x
CHAPTER 5 Eponential and Logarithmic Functions We have eamined power functions like f =. Interchanging and ields a different function f =. This new function is radicall different from a power function
More informationExact Differential Equations. The general solution of the equation is f x, y C. If f has continuous second partials, then M y 2 f
APPENDIX C Additional Topics in Differential Equations APPENDIX C. Eact First-Order Equations Eact Differential Equations Integrating Factors Eact Differential Equations In Chapter 6, ou studied applications
More informationLESSON #11 - FORMS OF A LINE COMMON CORE ALGEBRA II
LESSON # - FORMS OF A LINE COMMON CORE ALGEBRA II Linear functions come in a variet of forms. The two shown below have been introduced in Common Core Algebra I and Common Core Geometr. TWO COMMON FORMS
More informationA formal semantics of synchronous interworkings
A formal semantics of snchronous interorkings S. Mau a, M. van Wijk b and T. Winter c a Dept. of Mathematics and Computing Science, Eindhoven Universit of Technolog, P.O. Bo 513, 5600 MB Eindhoven, The
More informationUnit 3 NOTES Honors Common Core Math 2 1. Day 1: Properties of Exponents
Unit NOTES Honors Common Core Math Da : Properties of Eponents Warm-Up: Before we begin toda s lesson, how much do ou remember about eponents? Use epanded form to write the rules for the eponents. OBJECTIVE
More informationWeek 3 September 5-7.
MA322 Weekl topics and quiz preparations Week 3 September 5-7. Topics These are alread partl covered in lectures. We collect the details for convenience.. Solutions of homogeneous equations AX =. 2. Using
More informationDynamics of multiple pendula without gravity
Chaotic Modeling and Simulation (CMSIM) 1: 57 67, 014 Dnamics of multiple pendula without gravit Wojciech Szumiński Institute of Phsics, Universit of Zielona Góra, Poland (E-mail: uz88szuminski@gmail.com)
More informationf(x) = 2x 2 + 2x - 4
4-1 Graphing Quadratic Functions What You ll Learn Scan the tet under the Now heading. List two things ou will learn about in the lesson. 1. Active Vocabular 2. New Vocabular Label each bo with the terms
More informationSolutions to Two Interesting Problems
Solutions to Two Interesting Problems Save the Lemming On each square of an n n chessboard is an arrow pointing to one of its eight neighbors (or off the board, if it s an edge square). However, arrows
More informationEstimators in simple random sampling: Searls approach
Songklanakarin J Sci Technol 35 (6 749-760 Nov - Dec 013 http://wwwsjstpsuacth Original Article Estimators in simple random sampling: Searls approach Jirawan Jitthavech* and Vichit Lorchirachoonkul School
More informationSECTION 8-7 De Moivre s Theorem. De Moivre s Theorem, n a Natural Number nth-roots of z
8-7 De Moivre s Theorem 635 B eactl; compute the modulus and argument for part C to two decimal places. 9. (A) 3 i (B) 1 i (C) 5 6i 10. (A) 1 i 3 (B) 3i (C) 7 4i 11. (A) i 3 (B) 3 i (C) 8 5i 12. (A) 3
More informationChapter 4 Analytic Trigonometry
Analtic Trigonometr Chapter Analtic Trigonometr Inverse Trigonometric Functions The trigonometric functions act as an operator on the variable (angle, resulting in an output value Suppose this process
More informationFractal dimension of the controlled Julia sets of the output duopoly competing evolution model
Available online at www.isr-publications.com/jmcs J. Math. Computer Sci. 1 (1) 1 71 Research Article Fractal dimension of the controlled Julia sets of the output duopol competing evolution model Zhaoqing
More informationQUALITATIVE ANALYSIS OF DIFFERENTIAL EQUATIONS
arxiv:1803.0591v1 [math.gm] QUALITATIVE ANALYSIS OF DIFFERENTIAL EQUATIONS Aleander Panfilov stable spiral det A 6 3 5 4 non stable spiral D=0 stable node center non stable node saddle 1 tr A QUALITATIVE
More informationPolynomial and Rational Functions
Polnomial and Rational Functions Figure -mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of work b Horia Varlan;
More information2.2 Equations of Lines
660_ch0pp07668.qd 10/16/08 4:1 PM Page 96 96 CHAPTER Linear Functions and Equations. Equations of Lines Write the point-slope and slope-intercept forms Find the intercepts of a line Write equations for
More information10 Back to planar nonlinear systems
10 Back to planar nonlinear sstems 10.1 Near the equilibria Recall that I started talking about the Lotka Volterra model as a motivation to stud sstems of two first order autonomous equations of the form
More informationN coupled oscillators
Waves 1 1 Waves 1 1. N coupled oscillators towards the continuous limit. Stretched string and the wave equation 3. The d Alembert solution 4. Sinusoidal waves, wave characteristics and notation T 1 T N
More informationSubstitution and Flip BDDs
Substitution and Flip BDDs Rune M. Jensen and Henrik R. Andersen IT Universit Technical Report Series TR-2003-4 ISSN 600 600 December 2003 Copright c 2003, Rune M. Jensen and Henrik R. Andersen IT Universit
More informationTime-Frequency Analysis: Fourier Transforms and Wavelets
Chapter 4 Time-Frequenc Analsis: Fourier Transforms and Wavelets 4. Basics of Fourier Series 4.. Introduction Joseph Fourier (768-83) who gave his name to Fourier series, was not the first to use Fourier
More informationLESSON #12 - FORMS OF A LINE COMMON CORE ALGEBRA II
LESSON # - FORMS OF A LINE COMMON CORE ALGEBRA II Linear functions come in a variet of forms. The two shown below have been introduced in Common Core Algebra I and Common Core Geometr. TWO COMMON FORMS
More informationNotes on a situation-free fragment for donkey anaphora Chris Barker, NYU, homepages.nyu.edu/ cb125 Introduction. These notes were produced at the
Notes on a situation-free fragment for donke anaphora Chris Barker, NYU, homepages.nu.edu/ cb125 Introduction. These notes were produced at the request of Chris Kenned, for the purpose of providing something
More informationSystems of Linear Equations: Solving by Graphing
8.1 Sstems of Linear Equations: Solving b Graphing 8.1 OBJECTIVE 1. Find the solution(s) for a set of linear equations b graphing NOTE There is no other ordered pair that satisfies both equations. From
More informationD u f f x h f y k. Applying this theorem a second time, we have. f xx h f yx k h f xy h f yy k k. f xx h 2 2 f xy hk f yy k 2
93 CHAPTER 4 PARTIAL DERIVATIVES We close this section b giving a proof of the first part of the Second Derivatives Test. Part (b) has a similar proof. PROOF OF THEOREM 3, PART (A) We compute the second-order
More informationR. Thomas logical method
R. Thomas logical method Adrien Richard, Jean-Paul Comet and Gilles Bernot Laboratoire I3S, CNRS & Université de Nice-Sophia Antipolis, 2000 route des Lucioles, 06903 Sophia Antipolis, France {richard,comet,bernot}@i3s.unice.fr
More informationWeighted Approval Voting
Weighted Approval Voting Jordi Massó and Marc Vorsat September 4, 2006 Abstract To allow societ to treat unequal alternatives distinctl we propose a natural etension of Approval Voting [7] b relaing the
More informationSynchronous state transition graph
Heike Siebert, FU Berlin, Molecular Networks WS10/11 2-1 Synchronous state transition graph (0, 2) (1, 2) vertex set X (state space) edges (x,f(x)) every state has only one successor attractors are fixed
More information2.5 CONTINUITY. a x. Notice that Definition l implicitly requires three things if f is continuous at a:
SECTION.5 CONTINUITY 9.5 CONTINUITY We noticed in Section.3 that the it of a function as approaches a can often be found simpl b calculating the value of the function at a. Functions with this propert
More information5.6 RATIOnAl FUnCTIOnS. Using Arrow notation. learning ObjeCTIveS
CHAPTER PolNomiAl ANd rational functions learning ObjeCTIveS In this section, ou will: Use arrow notation. Solve applied problems involving rational functions. Find the domains of rational functions. Identif
More information11.1 Double Riemann Sums and Double Integrals over Rectangles
Chapter 11 Multiple Integrals 11.1 ouble Riemann Sums and ouble Integrals over Rectangles Motivating Questions In this section, we strive to understand the ideas generated b the following important questions:
More informationHigher order method for non linear equations resolution: application to mobile robot control
Higher order method for non linear equations resolution: application to mobile robot control Aldo Balestrino and Lucia Pallottino Abstract In this paper a novel higher order method for the resolution of
More informationSimulation of Gene Regulatory Networks
Simulation of Gene Regulatory Networks Overview I have been assisting Professor Jacques Cohen at Brandeis University to explore and compare the the many available representations and interpretations of
More information11.4 Polar Coordinates
11. Polar Coordinates 917 11. Polar Coordinates In Section 1.1, we introduced the Cartesian coordinates of a point in the plane as a means of assigning ordered pairs of numbers to points in the plane.
More informationChapter 8 Notes SN AA U2C8
Chapter 8 Notes SN AA U2C8 Name Period Section 8-: Eploring Eponential Models Section 8-2: Properties of Eponential Functions In Chapter 7, we used properties of eponents to determine roots and some of
More informationA new chaotic attractor from general Lorenz system family and its electronic experimental implementation
Turk J Elec Eng & Comp Sci, Vol.18, No.2, 2010, c TÜBİTAK doi:10.3906/elk-0906-67 A new chaotic attractor from general Loren sstem famil and its electronic eperimental implementation İhsan PEHLİVAN, Yılma
More information}w!"#$%&'()+,-./012345<ya FI MU. On Clock-Aware LTL Properties of Timed Automata. Faculty of Informatics Masaryk University Brno
}w!"#$%&'()+,-./01245
More informationLimits. Calculus Module C06. Copyright This publication The Northern Alberta Institute of Technology All Rights Reserved.
e Calculus Module C Limits Copright This publication The Northern Alberta Institute of Technolog. All Rights Reserved. LAST REVISED March, Introduction to Limits Statement of Prerequisite Skills Complete
More informationLecture Notes on Software Model Checking
15-414: Bug Catching: Automated Program Verification Lecture Notes on Software Model Checking Matt Fredrikson André Platzer Carnegie Mellon University Lecture 19 1 Introduction So far we ve focused on
More informationAdditional Material On Recursive Sequences
Penn State Altoona MATH 141 Additional Material On Recursive Sequences 1. Graphical Analsis Cobweb Diagrams Consider a generic recursive sequence { an+1 = f(a n ), n = 1,, 3,..., = Given initial value.
More information1.5. Analyzing Graphs of Functions. The Graph of a Function. What you should learn. Why you should learn it. 54 Chapter 1 Functions and Their Graphs
0_005.qd /7/05 8: AM Page 5 5 Chapter Functions and Their Graphs.5 Analzing Graphs of Functions What ou should learn Use the Vertical Line Test for functions. Find the zeros of functions. Determine intervals
More informationPhysics Gravitational force. 2. Strong or color force. 3. Electroweak force
Phsics 360 Notes on Griffths - pluses and minuses No tetbook is perfect, and Griffithsisnoeception. Themajorplusisthat it is prett readable. For minuses, see below. Much of what G sas about the del operator
More informationInteraction Network Analysis
CSI/BIF 5330 Interaction etwork Analsis Young-Rae Cho Associate Professor Department of Computer Science Balor Universit Biological etworks Definition Maps of biochemical reactions, interactions, regulations
More informationProgram verification. Hoare triples. Assertional semantics (cont) Example: Semantics of assignment. Assertional semantics of a program
Program verification Assertional semantics of a program Meaning of a program: relation between its inputs and outputs; specified by input assertions (pre-conditions) and output assertions (post-conditions)
More information