Semantics of Biological Regulatory Networks

Size: px
Start display at page:

Download "Semantics of Biological Regulatory Networks"

Transcription

1 Electronic Notes in Theoretical Computer Science 180 (2007) Semantics of Biological Regulator Networks Gilles Bernot b Franck Casse a Jean-Paul Comet b Franck Delaplace b Céline Müller b Olivier Rou a a IRCCN, UMR CNRS 6597, BP rue de la Noë, Nantes Cede 3, France b LaMI-genopole, UMR CNRS 8042, UEVE, 523 Place des Terrasses, Evr Cede, France Abstract The aim of the paper is to revisit the model of Biological Regulator Networks (BRN) which was proposed b René Thomas to model the interactions between a set of genes. We give a formal semantics for BRN in terms of transition sstems which formalies the evolution rules given b René Thomas. Then we show how to use this model to find interesting properties of a BRN like the set of stable states, ccles etc using tools for analing transition sstems. Kewords: Biological regulator network, BRN, biological sstem 1 Introduction Modeling of Biological Sstems. The arrival of massive amount of epression data puts the emphasis on computational methods to overcome the difficulties of interpretation of eperimental data. Instead of providing a clear eplanation of biological sstems, data reveals the difficult for analing them. The variet of components and their interacting capabilities lead to cope with their compleit. This opens a field of modeling to investigate computational biological sstems. Computational sstems biolog [10] tries to establish methods and techniques that enable us to understand the structure of the sstem, such as gene/metabolic/signal transduction networks. The modeling of the dnamics of such sstems is a first step towards the control, the design and the modification of the sstems in order to ensure some desired properties[4]. Formal Methods. Formal methods have been used for a decade or more in the area of verification of safet critical sstems. The techniques and tools that have emerged from this /$ see front matter 2007 Elsevier B.V. All rights reserved. doi: /j.entcs

2 4 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14 field to anale the behaviors of such sstems, makes it possible to model and verif comple concurrent sstems (huge number of states) even with continuous information (dense time) or parameters. It is then natural to tr and use such techniques to model and anale biological sstems especiall when one wants to find properties about their behaviors. Biological Regulator Networks. Biological Regulator Networks (in the sequel BRN) modelie interactions between biological entities (RNA or Proteins). Their regulations involve a lot of comple processes, but it is common to simplif the compleit of the regulations b taking into account onl two actions: activation and inhibition. BRNs are staticall represented b graphs: vertices abstract genes and edges represent their interactions (activation or inhibition). Moreover at a given time, a numerical value is associated to each verte to describe the concentration level of the corresponding entit. The René Thomas boolean approach has been justified as a discretiation of the continuous differential equation sstem[5], it has been confronted to the more classical analsis in terms of differential equations[3]. Then Thomas and Snoussi showed that all stead states can be found via the discrete approach[6]. More recentl Thomas and Kaufman have shown that the discrete description provides a qualitative fit of the differential equations with a small number of possible combinations of values for the parameters[9]. Works of René Thomas and co-workers provide the basis to develop a formal computational framework for gene regulation and its analsis [1]. Our Contribution. In this paper we propose a semantics for an etended gene regulator model of R. Thomas theor. In our etended model a gene can be activator at a certain level and inhibitor at another. This is to our knowledge the first time a formal semantics is proposed for BRN. This enables us to derive automaticall a behavioral model of a BRN and use eisting tools for analing finite state models (e.g. model-checking tools). Outline of the Paper. The paper is organied as follows: section 2 gives the basics of BRN. The core of the paper is in section 3 where we give a formal semantics for BRN. In section 4 we show on a small eample how to use the tool HTech [2] toanaleabrn. 2 Biological Regulator Networks Notations Given a finite set E, E denotes the cardinalit of E. Wedenote2 E the set of subsets of E. If φ is a formula of propositional logic over a set X, [φ] denotes the set of values of the variables satisfing φ. B convention, if U =, φ() are propositional formulas, U φ() =true.

3 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) Biological eamples often rel on intervals: an integer interval [a, b] stands for the set of values { N,a b}, and we denote [] the empt interval. The original model of Biological Regulator Networks [3] makes the assumption that the actual concentration of the products of the genes can be approimated b integer levels: the continuous concentration function is approimated b a piecewise constant function. Those constant levels give the epression levels of the genes. In our formal description of a Biological Regulator Network, a set V of variables stands for the genes of the network. An oriented edge from a variable to indicates that is a regulator (activator, inhibitor) of. Definition 2.1 [Biological Regulator Networks.] Network (BRN) is a 3-uple R =(V,E,π) where: V is a finite set of vertices, E V V is a finite set of edges, A Biological Regulator π =(π +,π )withπ : E 2 N 2 N are respectivel the activation and inhibition functions associated to an edge e E. Moreover, we assume: e E, π + (e) π (e) []: an edge corresponds to a regulation. π + (e) π (e) = []: for a given level, a gene cannot be both activator and inhibitor. Remark 2.2 For v V we will use v as well to denote the epression level of the gene v. π + (, ) (resp. π (, )) gives the interval inside which activates (resp. inhibits). Notethatπ + (, ) =[](resp. π (, ) = []), means that never activates (resp. inhibits). Note also that Def. 2.1 rules out edges (, ) for which π + (, ) =π (, ) = [] which would have no observable effect in the network. ([1,1], []) ([1,1], [2,2]) ([], [1,1]) ([1,1], []) ([], [1,1]) Eemple 1 Eemple 2 Fig. 1. Eamples of BRNs Eample 2.3 Figure 1 gives two eamples of BRN. In the first eample, V = {,, } and π(, ) =([1, 1], []): activates when has the level 1; π(, ) =

4 6 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14 ([], [1, 1]): inhibits when has the level 1; π(,) =([1, 1], []): activates when has the level 1. The meaning of the second eample is defined accordingl. Definition 2.4 [Activators and Inhibitors.] Let R =(V,E,π) be a Biological Regulator Network, we define the following sets: (i) V,R + () ={ V,π + (,) []} is the set of activators of, (ii) V,R () ={ V,π (, ) []} is the set of inhibitors of. Eample 2.5 For eample 1 of Figure 1, R + () =, R () ={}, R + () ={,}, R () = and R + () =, R () =. Ineample2R + () =, R () ={} and R + () ={}, R () ={}. 3 Formal Semantics of Biological Regulator Networks In René Thomas theor, the evolution of the epression levels of the genes is described b an original notion of attractor. Informall, it represents an upper or a lower bound which is attained if no change occurs in the rest of the BRN. Hence, the computation of the evolution of concentrations is based on the attractors. The are defined b a set of parameters. The evolution of the BRN highl depends on the choice of those parameters. In this section, we formalie the evolution of the states of a BRN b a transition sstem. This semantics also involves some evolution parameters as defined in [3]. 3.1 State Space of a BRN Definition 3.1 [State Space of a BRN.] Let R =(V,E,π) beabrn.thestate space S of a variable V is defined b S =[0, ma V π + (, ) π (, )]. The state space of R is defined b S(R) = V S. A state of the network R is a mapping ν : V N such that V,ν() S. The previous definition of the set S requires that 0 belong to the state space. Eample 3.2 For the eample 2 of Figure 1, S =[0, 2],S =[0, 1]. 3.2 Parameters of a BRN As alread mentioned in the beginning of this section, the behavior of a BRN depends on some parameters. Those parameters pla the role of attractors and give the epression levels towards which a gene is attracted, depending on which genes activate or inhibit it. Definition 3.3 [Parameters of a BRN.] Let R =(V,E,π) beabrn.theset Para(R) ofparameters of R is defined b Para(R) ={K,A,B A R + (),B R ()}

5 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) A valuation of the parameters Para(R) is a mapping κ : Para(R) N such that V,A R + (),B R (),κ(k,a,b ) S. In the sequel we use K,U,V instead of κ(k,u,v ) when the meaning is clear from the contet. Definition 3.4 [Activit Assumption.] Let R =(V,E,π) beabrnandκ a valuation for Para(R). κ satisfies the activit assumption iff V : R + (), X + R + (), X R (),κ(k,x+ {},X ) >κ(k,x+,x ) R (), X + R + (), X R (),κ(k,x+,x {}) <κ(k,x+,x ) Definition 3.5 [Monotonicit Assumption.] Let R =(V,E,π) beabrnand κ be a valuation for Para(R). κ satisfies the monotonicit assumption iff: X + R + (), X R (), X + R +(), X R (), X + X +,X X κ(k,x+,x ) κ(k,x +,X ). The activit assumption stands for the observabilit of the action of a gene on another. Without this assumption it is possible that an combination of activators of a gene does not have an observable effect on the target gene because its level of epression would remain the same. It seems then quite obvious that an valuation of the parameters should satisf this propert. The monotonicit propert is is a biological eperimental fact, alread pointed out b René Thomas. Anwa our framework does not rel on these assumptions motivated b biolog. Eample 3.6 In the eample 2 of Figure 1, a possible valuation of the parameters is: K,, =0,K,, =1andK,, =0,K,, =0,K,, =0,K,, =1and K,, = 0. Notice that this valuation does not satisf the activit propert as K,, K,,.IfwetakeK,, =1,K,, = 0 this propert is satisfied. 3.3 Transition Sstem of a BRN Let us consider a BRN R =(V,E,π). Following [8,7] the evolution of the state of the network depends (i) on the epression level of the genes (ii) on a set of parameters (see Def. 3.3). The epression level of a gene ma either decrease or increase according to which other genes of the network activate or inhibit it. If X + and X are respectivel the set of genes that currentl activate and the set that currentl inhibit, then the value of evolves towards the value defined b the parameter K,X+,X. Which genes are currentl activating or inhibiting is defined according to the levels given in the network (e.g. for eample 2 of Figure 1, activates when its epression level is 1, inhibits when its epression level is 2, and has no effect on when it is 0.) We formall define the different configurations of a network according to the activators and inhibitors of a gene in Def Definition 3.7 [State constraints of a BRN.] For V, X + R + (), X R (), we define A,X+, I,X and C,X+,X b: ( ) ( ) A,X+ = X ( π + +(, )) R + ()\X (/ π + +(, )) ( ) ( ) I,X = X ( π (, )) R ()\X (/ π (, ))

6 8 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14 C,X+,X = A,X+ I,X C,X+,X is true iff the values of the genes in X + are in the intervals in which the activate and the values of the genes in X are in the intervals in which the inhibit. Eample 3.8 For eample 2 of Fig. 1 the activation and inhibition functions are: π + (, ) =[1, 1],π (, ) =[2, 2] and π + (, ) =,π (, ) =[1, 1]. The activators and inhibitors sets are given b R + () =, R () = and R + () =,R () =. The set of constraints are given b: C,, = / [1, 1], C,, = [1, 1] / [2, 2] and C,, = / [1, 1] [2, 2]. Another feature of the evolution of the state of a network is that the epression level of a gene evolves step-b-step i.e. it cannot go from 1 to 3 in a single step, it must evolve b one unit from 1 to 2 and if some conditions are met 1 will go from 2 to 3. This is captured in the definition of an evolution operator: Definition 3.9 [Evolution Operator.] Let N and k N. The evolution operator is defined b: 1iff>k k = +1 iff<k otherwise Notice that in the case = k the net value of will remain equal to k. We can now define a transition sstem giving the semantics of a BRN. Definition 3.10 [Transition Sstem of a BRN.] Let R =(V,E,π) beabrn and κ a valuation of the parameters in Para(R). The semantics of R with valuation κ is the labeled transition sstem S R (κ) =(S(R),V, ) with S(R) V S(R) such that: A R + (), B R (),ν [C,A,B ] ν ν ν() K,A,B ν () = K,A,B, ν () =ν() Remark 3.11 Note that according to Def. 3.7, there is a unique ν such that ν ν. The transition sstem S R (κ) is (partiall) deterministic in the sense it is deterministic for each -transition. Nevertheless, there ma be another -transition from the state ν and thus S R (κ) is not deterministic. The nondeterminism models the fact that the epression levels of the genes evolve asnchronousl. Note also that there is an -transition onl when has not reached the value it tends to get closer to (i.e. K,A,B for the right 1 it could be that from level 2 it is impossible to reach level 3.

7 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) A and B). This will enable us to define the stable states of a network as those states that have no outgoing transitions (the deadlock states). Definition 3.12 [Stable State of a BRN.] Let R =(V,E,π) beabrnandκ a valuation of the parameters in Para(R) ands R (κ) =(S(R),V, ) its semantics. A state ν S(R) isnon stable iff ν S(R), V such that ν ν.astateν is a stable state if it is not a non stable state (i.e. a stable state is a deadlock state). 4 Simple Case-Stud We consider in this section the eample 1 of Fig. 1. We use the verification tool Htech [2] to automaticall compute the results. Of course we could have chosen an model-checker to anale our models but Htech enables us to compute some constraints on the parameters such that certain properties are satisfied (we will not cover this in this paper.) The Htech input files and results are given in appendi A. The set of activators and inhibitors are given in Eample 2.5, page 4. Thestate space is S =[0, 1], S =[0, 1] and S =[0, 1]. The parameters are K,,, K,, (for ); K,,, K,,, K,,, K,{,}, (for ) andk,, (for ). 4.1 Eample with Regular Stabiliation Let us fi the following values for the parameters: K,, =1 K,, =0 K,, =0 K,, =0 K,, =0 K,{,}, =1 K,, =0 The monotonicit and activit assumptions are satisfied b these parameters. For this eample we obtain the transition sstem given in Fig. A.1 in the appendi A. The Htech input file is given in appendi A. We can easil compute the set of stable states and non stable states as given in the output file Figure A.3, appendi A, 12. Note that the ccle reveals indeed an equilibrium state which is not stable. 4.2 Eample without Regular Stabiliation Let us now fi the parameters to: K,, =1 K,, =0 K,, =0 K,, =1 K,, =1 K,, =1 K,, =0

8 10 G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14 The transition sstem obtained in this case is given in Fig. A.1 on the right, appendi A. Again the results (Figure A.3 right hand side, appendi A, page 12) obtained with Htech show that there is no regular stable state in this case. Note that the ccle is indeed a stable state, which is called singular in the R.Thomas approach. 5 Conclusion and Future Work In this paper we have given a formal semantics for Biological Regulator Network. The main advantages of this work are (i) the formal semantics enables us to build automaticall a (behavioral) model of a network (ii) this model can then be analed b verification tools eactl as safet critical programs can be (e.g. the formal semantics characteries the stable and non stable states). Our future work will consist in adding timing constraints in the network to build a more accurate model. Our semantics is read to be etended with timing constraints: in this case we will derive a timed or hbrid automata model and use tools for analing this tpes of models to prove properties of the network. Acknowledgement The authors thank genopole-research in Evr (H. Pollard and P. Tambourin) for constant support. Comments from the anonmous referees have also been ver constructive. References [1] O. Cinquin and J. Demongeot. Roles of positive and negative feedback in biological sstem. C. R. Biol, 325(11): , [2] Thomas A. Heninger, Pei-Hsin Ho, and Howard Wong-Toi. HYTECH: A model checker for hbrid sstems. International Journal on Software Tools for Technolog Transfer, 1(1-2): , [3] M. Kaufman and R. Thomas. Model analsis of the bases of multistationarit in the humoral immune response. J. Theor. Biol., 129(2):141 62, [4] H. Kitano. Looking beond the details: a rise in sstem-oriented approaches in genetics and molecular biolog. Curr. Genet., 41(1):1 10, [5] E.H Snoussi. Qualitative dnamics of a piecewise-linear differential equations : a discrete mapping approach. Dnamics and stabilit of Sstems, 4: , [6] E.H. Snoussi and R. Thomas. Logical identification of all stead states : the concept of feedback loop caracteristic states. Bull. Math. Biol., 55(5): , [7] R. Thomas. Logical analsis of sstems comprising feedback loops. J. Theor. Biol., 73(4):631 56, [8] R. Thomas, A.M. Gathoe, and L. Lambert. A comple control circuit. regulation of immunit in temperate bacteriophages. Eur. J. Biochem., 71(1):211 27, [9] R. Thomas and M. Kaufman. Multistationarit, the basis of cell differentiation and memor. I. & II. Chaos, 11: , [10] O. Wolkenhauer. Sstems biolog: the reincarnation of sstems theor applied in biolog? Brief Bioinform., 2(3):258 70, 2001.

9 A G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) Appendi In the appendi, we show the use of Htech in the contet of the analsis of the Biological Regulator Network. For the eample of section 4, we use the input file of Fig. A.2 to model our network. The transition sstems is given in Figure A.1. The result is given in Figure A.3.

10 12 (0,0,0) (0,0,1) (1,0,0) (0,1,0) (1,0,1) (1,1,0) (0,0,0) (1,1,1) (0,1,1) (0,0,1) (1,0,1) (1,0,0) (1,1,1) (0,1,1) (1,1,0) (0,1,0) Fig. A.1 Two transition sstems of the BRN of the Eample 2.3, Fig. 1 with (left) and without (right) regular stabiliation G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14

11 -- htech input file var k O_O,k O_,k O_O,k O, k O,k 0,k O_O: parameter ; -- parameters,,: discrete ; k: discrete ; -- k changes on ever discrete transition k1,k2,k3: parameter ; -- used for detecting ccles automaton rrb snclabs: ; initiall Start ; loc Start: while >=0 & >=0 & >=0 & <=1 & <=1 & <=1 wait {} -- C_,O,O -> K O_O when < 1 & > k O_O do { =-1,k =1-k} goto Start; when < 1 & < k O_O do { =+1,k =1-k} goto Start; -- C_,O, when >= 1 & < k O_ do { =+1,k =1-k} goto Start; when >= 1 & > k O_ do { =-1,k =1-k} goto Start; -- C_,O,O -> k O_O when <1 & <1 & < k O_O do { =+1,k =1-k} goto Start; when <1 & <1 & > k O_O do { =-1,k =1-k} goto Start; -- C_,,O -> k O_0 when >=1 & <1 & < k O do { =+1,k =1-k} goto Start; when >=1 & <1 & > k O do { =-1,k =1-k} goto Start; -- C_,,O when <1 & >=1 & < k O do { =+1,k =1-k} goto Start; when <1 & >=1 & > k O do { =-1,k =1-k} goto Start; -- C_,,O when >=1 & >=1 & < k 0 do { =+1,k =1-k} goto Start; when >=1 & >=1 & > k 0 do { =-1,k =1-k} goto Start; -- C_,O_O when < k O_O do { =+1,k =1-k} goto Start; when > k O_O do { =-1,k =1-k} goto Start; end var init_reg, f_reachable, stable_states, non_stable_states, _f_reachable, ccle_states : region; init_reg := loc[rrb]=start & >=0 & >=0 & >=0 & <=1 & <=1 & <=1 & k O_O=1 & k O_=0 & k O_O=0 & k O=1 & k O=1 & k 0=1 & k O_O=0; prints "initial values for the K_ parameters and,,:" ; print omit rrb locations hide k,k1,k2,k3 in init_reg endhide ; -- compute the reachable set of states... must be finite -- even if there is a ccle f_reachable := reach forward from init_reg endreach; if empt(f_reachable) then prints "No reachable states..."; else Fig. A.2 Htech Specification of the BRN of Eample 2.3, Figure1. prints "The reachable states are:"; print hide k O_O,k O_,k O_O,k O, k O,k 0,k O_O,k in f_reachable endhide; endif ; -- compute the projection on, of f_reachable _f_reachable := hide k O_O,k O_,k O_O,k O, k O,k 0,k O_O,k in f_reachable endhide; -- compute the set of non stable states i.e. reachable states -- with a successor -- define the strict predecessor operator -- here is a trick to do this with Htech (otherwise Htech computes -- the set of predecessor of a set including the set itself) -- hide k in pre(a & k=0) & k=1 endhide gives the strict predecessor -- of A non_stable_states := f_reachable & hide k in (pre(f_reachable & k=0) & k=1) endhide; -- print the result if empt(non_stable_states) then prints "No non stable states"; else prints "the reachable non stable states are:"; print hide k O_O,k O_,k O_O,k O, k O,k 0,k O_O,k in non_stable_states endhide; endif ; stable_states := f_reachable & ~non_stable_states ; if empt(stable_states) then prints "No stable states...!!!"; else prints "The reachable stable states are:"; print hide k O_O,k O_,k O_O,k O, k O,k 0,k O_O,k in stable_states endhide; endif ; -- now look for ccles... eas in htech with hide -- (eistential quantification) -- first we define the strict sucessor function -- it is a post where k changes followed b a reach ccle_states := =k1 & =k2 & =k3 & f_reachable & reach forward from hide k O_O,k O_, k O_O,k O,k O,k 0,k O_O,k in (post(=k1 & =k2 & =k3 & f_reachable & k=0) & k=1) endhide endreach; -- print the result if empt(ccle_states) then prints "No infinite path in the sstem"; else prints "There is a ccle in the sstem!... from an of these states:"; print hide k O_O,k O_,k O_O,k O, k O,k 0,k O_O,k,k1,k2,k3 in ccle_states endhide; endif ; G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007)

12 14 initial values for the K_ parameters and,,: k O_O = 1 & k O_ = 0 & k O_O = 0 & k O = 0 & k O = 0 & k 0 = 1 & k O_O = 0 & <= 1 & <= 1 & >= 0 & >= 0 & >= 0 & <= 1.Number of iterations required for reachabilit: 1 The reachable states are: <= 1 & >= 0 & <= 1 & >= 0 & <= 1 & >= 0 the reachable non stable states are: = 0 & < 1 & >= 0 & >= 0 & <= 1 = 1 & = 1 & <= 1 & >= 0 = 1 & < 1 & < 1 & >= 0 & >= 0 = 1 & >= 0 & <= 1 & >= 0 & <= 1 The reachable stable states are: < 1 & 0 < & < 1 & >= 0 & <= 1 & >= 0...Number of iterations required for reachabilit: 7 There is a ccle in the sstem!... from an of these states: = 1 & = 0 & = 1 = 1 & = 1 & = 0 = 1 & = 1 & = 1 = 1 & = 0 & = 0 ================================================================= Ma memor used = 0 pages = 0 btes = 0.00 MB Time spent = 57.24u s = sec total ================================================================= initial values for the K_ parameters and,,: k O_O = 1 & k O_ = 0 & k O_O = 0 & k O = 1 & k O = 1 & k 0 = 1 & k O_O = 0 & <= 1 & <= 1 & >= 0 & >= 0 & >= 0 & <= 1.Number of iterations required for reachabilit: 1 The reachable states are: <= 1 & >= 0 & <= 1 & >= 0 & <= 1 & >= 0 the reachable non stable states are: = 0 & < 1 & >= 0 & >= 0 & <= 1 = 1 & = 1 & <= 1 & >= 0 = 1 & < 1 & < 1 & >= 0 & >= 0 = 0 & = 1 & < 1 & >= 0 = 1 & >= 0 & <= 1 & >= 0 & <= 1 The reachable stable states are: 0 < & < 1 & <= 1 & 0 < & >= 0 & < 1 >= 0 & < 1 & 0 < & < 1 & >= 0 & < 1...Number of iterations required for reachabilit: 7 There is a ccle in the sstem!... from an of these states: = 1 & = 0 & >= 0 & < 1 = 0 & = 1 & >= 0 & < 1 = 1 & = 1 & >= 0 & < 1 = 0 & = 0 & >= 0 & < 1 ================================================================= Ma memor used = 0 pages = 0 btes = 0.00 MB Time spent = 73.04u s = sec total ================================================================= Fig. A.3 Htech results for eample of Fig. A.2 (with(left) and without (rigth) regular stabiliation) G. Bernot et al. / Electronic Notes in Theoretical Computer Science 180 (2007) 3 14

Méthode logique multivaluée de René Thomas et logique temporelle

Méthode logique multivaluée de René Thomas et logique temporelle Méthode logique multivaluée de René Thomas et logique temporelle Gilles Bernot Universit of Nice sophia antipolis, I3S laborator, France Menu 1. Models and formal logic 2. Thomas models for gene networks

More information

Constant 2-labelling of a graph

Constant 2-labelling of a graph Constant 2-labelling of a graph S. Gravier, and E. Vandomme June 18, 2012 Abstract We introduce the concept of constant 2-labelling of a graph and show how it can be used to obtain periodic sphere packing.

More information

* τσ σκ. Supporting Text. A. Stability Analysis of System 2

* τσ σκ. Supporting Text. A. Stability Analysis of System 2 Supporting Tet A. Stabilit Analsis of Sstem In this Appendi, we stud the stabilit of the equilibria of sstem. If we redefine the sstem as, T when -, then there are at most three equilibria: E,, E κ -,,

More information

Models for Efficient Timed Verification

Models for Efficient Timed Verification Models for Efficient Timed Verification François Laroussinie LSV / ENS de Cachan CNRS UMR 8643 Monterey Workshop - Composition of embedded systems Model checking System Properties Formalizing step? ϕ Model

More information

Review Topics for MATH 1400 Elements of Calculus Table of Contents

Review Topics for MATH 1400 Elements of Calculus Table of Contents Math 1400 - Mano Table of Contents - Review - page 1 of 2 Review Topics for MATH 1400 Elements of Calculus Table of Contents MATH 1400 Elements of Calculus is one of the Marquette Core Courses for Mathematical

More information

Analysing formal models of genetic regulatory networks with delays. Gilles Bernot, Jean-Paul Comet and Adrien Richard

Analysing formal models of genetic regulatory networks with delays. Gilles Bernot, Jean-Paul Comet and Adrien Richard 240 Int. J. Bioinformatics Research and Applications, Vol. 4, No. 3, 2008 Analysing formal models of genetic regulatory networks with delays Jamil Ahmad and Olivier Roux IRCCyN UMR CNRS 6597, BP 92101,

More information

The Maze Generation Problem is NP-complete

The Maze Generation Problem is NP-complete The Mae Generation Problem is NP-complete Mario Alviano Department of Mathematics, Universit of Calabria, 87030 Rende (CS), Ital alviano@mat.unical.it Abstract. The Mae Generation problem has been presented

More information

LESSON #42 - INVERSES OF FUNCTIONS AND FUNCTION NOTATION PART 2 COMMON CORE ALGEBRA II

LESSON #42 - INVERSES OF FUNCTIONS AND FUNCTION NOTATION PART 2 COMMON CORE ALGEBRA II LESSON #4 - INVERSES OF FUNCTIONS AND FUNCTION NOTATION PART COMMON CORE ALGEBRA II You will recall from unit 1 that in order to find the inverse of a function, ou must switch and and solve for. Also,

More information

Research Article Chaotic Attractor Generation via a Simple Linear Time-Varying System

Research Article Chaotic Attractor Generation via a Simple Linear Time-Varying System Discrete Dnamics in Nature and Societ Volume, Article ID 836, 8 pages doi:.//836 Research Article Chaotic Attractor Generation via a Simple Linear Time-Varing Sstem Baiu Ou and Desheng Liu Department of

More information

Property preservation along embedding of biological regulatory networks

Property preservation along embedding of biological regulatory networks Property preservation along embedding of biological regulatory networks Mbarka Mabrouki 12, Marc Aiguier 12, Jean-Paul Comet 3, and Pascale Le Gall 12 1 École Centrale Paris Laboratoire de Mathématiques

More information

Control Schemes to Reduce Risk of Extinction in the Lotka-Volterra Predator-Prey Model

Control Schemes to Reduce Risk of Extinction in the Lotka-Volterra Predator-Prey Model Journal of Applied Mathematics and Phsics, 2014, 2, 644-652 Published Online June 2014 in SciRes. http://www.scirp.org/journal/jamp http://d.doi.org/10.4236/jamp.2014.27071 Control Schemes to Reduce Risk

More information

SAT Modulo ODE: A Direct SAT Approach to Hybrid Systems

SAT Modulo ODE: A Direct SAT Approach to Hybrid Systems Welcome ATVA 2008 SAT Modulo ODE: A Direct SAT Approach to Hbrid Sstems Andreas Eggers, Martin Fränzle, and Christian Herde DFG Transregional Collaborative Research Center AVACS Outline Motivation Bounded

More information

The algorithmic analysis of hybrid system

The algorithmic analysis of hybrid system The algorithmic analysis of hybrid system Authors: R.Alur, C. Courcoubetis etc. Course teacher: Prof. Ugo Buy Xin Li, Huiyong Xiao Nov. 13, 2002 Summary What s a hybrid system? Definition of Hybrid Automaton

More information

Flows and Connectivity

Flows and Connectivity Chapter 4 Flows and Connectivit 4. Network Flows Capacit Networks A network N is a connected weighted loopless graph (G,w) with two specified vertices and, called the source and the sink, respectivel,

More information

nm nm

nm nm The Quantum Mechanical Model of the Atom You have seen how Bohr s model of the atom eplains the emission spectrum of hdrogen. The emission spectra of other atoms, however, posed a problem. A mercur atom,

More information

The approximation of piecewise linear membership functions and Łukasiewicz operators

The approximation of piecewise linear membership functions and Łukasiewicz operators Fuzz Sets and Sstems 54 25 275 286 www.elsevier.com/locate/fss The approimation of piecewise linear membership functions and Łukasiewicz operators József Dombi, Zsolt Gera Universit of Szeged, Institute

More information

Section 1.5 Formal definitions of limits

Section 1.5 Formal definitions of limits Section.5 Formal definitions of limits (3/908) Overview: The definitions of the various tpes of limits in previous sections involve phrases such as arbitraril close, sufficientl close, arbitraril large,

More information

12.1 Systems of Linear equations: Substitution and Elimination

12.1 Systems of Linear equations: Substitution and Elimination . Sstems of Linear equations: Substitution and Elimination Sstems of two linear equations in two variables A sstem of equations is a collection of two or more equations. A solution of a sstem in two variables

More information

Roberto s Notes on Integral Calculus Chapter 3: Basics of differential equations Section 3. Separable ODE s

Roberto s Notes on Integral Calculus Chapter 3: Basics of differential equations Section 3. Separable ODE s Roberto s Notes on Integral Calculus Chapter 3: Basics of differential equations Section 3 Separable ODE s What ou need to know alread: What an ODE is and how to solve an eponential ODE. What ou can learn

More information

Provable intractability. NP-completeness. Decision problems. P problems. Algorithms. Two causes of intractability:

Provable intractability. NP-completeness. Decision problems. P problems. Algorithms. Two causes of intractability: Provable intractabilit -completeness Selected from Computer and Intractabilit b MR Gare and DS Johnson (979) Two causes of intractabilit: The problem is so difficult that an exponential amount of time

More information

Section 3.1. ; X = (0, 1]. (i) f : R R R, f (x, y) = x y

Section 3.1. ; X = (0, 1]. (i) f : R R R, f (x, y) = x y Paul J. Bruillard MATH 0.970 Problem Set 6 An Introduction to Abstract Mathematics R. Bond and W. Keane Section 3.1: 3b,c,e,i, 4bd, 6, 9, 15, 16, 18c,e, 19a, 0, 1b Section 3.: 1f,i, e, 6, 1e,f,h, 13e,

More information

FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures AB = BA = I,

FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures AB = BA = I, FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING Lectures MODULE 7 MATRICES II Inverse of a matri Sstems of linear equations Solution of sets of linear equations elimination methods 4

More information

Logic Model Checking

Logic Model Checking Logic Model Checking Lecture Notes 10:18 Caltech 101b.2 January-March 2004 Course Text: The Spin Model Checker: Primer and Reference Manual Addison-Wesley 2003, ISBN 0-321-22862-6, 608 pgs. the assignment

More information

(2.5) 1. Solve the following compound inequality and graph the solution set.

(2.5) 1. Solve the following compound inequality and graph the solution set. Intermediate Algebra Practice Final Math 0 (7 th ed.) (Ch. -) (.5). Solve the following compound inequalit and graph the solution set. 0 and and > or or (.7). Solve the following absolute value inequalities.

More information

Bifurcations of the Controlled Escape Equation

Bifurcations of the Controlled Escape Equation Bifurcations of the Controlled Escape Equation Tobias Gaer Institut für Mathematik, Universität Augsburg 86135 Augsburg, German gaer@math.uni-augsburg.de Abstract In this paper we present numerical methods

More information

You don't have to be a mathematician to have a feel for numbers. John Forbes Nash, Jr.

You don't have to be a mathematician to have a feel for numbers. John Forbes Nash, Jr. Course Title: Real Analsis Course Code: MTH3 Course instructor: Dr. Atiq ur Rehman Class: MSc-II Course URL: www.mathcit.org/atiq/fa5-mth3 You don't have to be a mathematician to have a feel for numbers.

More information

Methods for Advanced Mathematics (C3) Coursework Numerical Methods

Methods for Advanced Mathematics (C3) Coursework Numerical Methods Woodhouse College 0 Page Introduction... 3 Terminolog... 3 Activit... 4 Wh use numerical methods?... Change of sign... Activit... 6 Interval Bisection... 7 Decimal Search... 8 Coursework Requirements on

More information

An Introduction to Timed Automata

An Introduction to Timed Automata An Introduction to Timed Automata Patricia Bouer LSV CNRS & ENS de Cachan 6, avenue du Président Wilson 943 Cachan France email: bouer@lsv.ens-cachan.fr Introduction Explicit timing constraints are naturall

More information

New approach to study the van der Pol equation for large damping

New approach to study the van der Pol equation for large damping Electronic Journal of Qualitative Theor of Differential Equations 2018, No. 8, 1 10; https://doi.org/10.1422/ejqtde.2018.1.8 www.math.u-szeged.hu/ejqtde/ New approach to stud the van der Pol equation for

More information

Research Article Chaos and Control of Game Model Based on Heterogeneous Expectations in Electric Power Triopoly

Research Article Chaos and Control of Game Model Based on Heterogeneous Expectations in Electric Power Triopoly Discrete Dnamics in Nature and Societ Volume 29, Article ID 469564, 8 pages doi:.55/29/469564 Research Article Chaos and Control of Game Model Based on Heterogeneous Epectations in Electric Power Triopol

More information

Toda s Theorem: PH P #P

Toda s Theorem: PH P #P CS254: Computational Compleit Theor Prof. Luca Trevisan Final Project Ananth Raghunathan 1 Introduction Toda s Theorem: PH P #P The class NP captures the difficult of finding certificates. However, in

More information

Hybrid Modeling of Gene Regulatory Networks: Mixing Temporal and Qualitative Biological Properties

Hybrid Modeling of Gene Regulatory Networks: Mixing Temporal and Qualitative Biological Properties Hybrid Modeling of Gene Regulatory Networks: Mixing Temporal and Qualitative Biological Properties Jonathan Fromentin, Damien Eveillard, Olivier Roux To cite this version: Jonathan Fromentin, Damien Eveillard,

More information

Foundations of Databases

Foundations of Databases Foundations of Databases (Slides adapted from Thomas Eiter, Leonid Libkin and Werner Nutt) Foundations of Databases 1 Quer optimization: finding a good wa to evaluate a quer Queries are declarative, and

More information

MAT 1275: Introduction to Mathematical Analysis. Graphs and Simplest Equations for Basic Trigonometric Functions. y=sin( x) Function

MAT 1275: Introduction to Mathematical Analysis. Graphs and Simplest Equations for Basic Trigonometric Functions. y=sin( x) Function MAT 275: Introduction to Mathematical Analsis Dr. A. Rozenblum Graphs and Simplest Equations for Basic Trigonometric Functions We consider here three basic functions: sine, cosine and tangent. For them,

More information

Polynomial and Rational Functions

Polynomial and Rational Functions Polnomial and Rational Functions 5 Figure 1 35-mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of work b Horia

More information

14.1 Systems of Linear Equations in Two Variables

14.1 Systems of Linear Equations in Two Variables 86 Chapter 1 Sstems of Equations and Matrices 1.1 Sstems of Linear Equations in Two Variables Use the method of substitution to solve sstems of equations in two variables. Use the method of elimination

More information

Interspecific Segregation and Phase Transition in a Lattice Ecosystem with Intraspecific Competition

Interspecific Segregation and Phase Transition in a Lattice Ecosystem with Intraspecific Competition Interspecific Segregation and Phase Transition in a Lattice Ecosstem with Intraspecific Competition K. Tainaka a, M. Kushida a, Y. Ito a and J. Yoshimura a,b,c a Department of Sstems Engineering, Shizuoka

More information

Cycle Structure in Automata and the Holonomy Decomposition

Cycle Structure in Automata and the Holonomy Decomposition Ccle Structure in Automata and the Holonom Decomposition Attila Egri-Nag and Chrstopher L. Nehaniv School of Computer Science Universit of Hertfordshire College Lane, Hatfield, Herts AL10 9AB United Kingdom

More information

Arbitration-Free Synchronization

Arbitration-Free Synchronization Arbitration-Free Snchronization Leslie Lamport 22 March 2002 (minor corrections made on 30 September 2002) To appear in the PODC Jubilee Issue of Distributed Computing. Abstract Implementing traditional

More information

Introduction to Differential Equations. National Chiao Tung University Chun-Jen Tsai 9/14/2011

Introduction to Differential Equations. National Chiao Tung University Chun-Jen Tsai 9/14/2011 Introduction to Differential Equations National Chiao Tung Universit Chun-Jen Tsai 9/14/011 Differential Equations Definition: An equation containing the derivatives of one or more dependent variables,

More information

Ranking Functions for Size-Change Termination

Ranking Functions for Size-Change Termination Ranking Functions for Size-Change Termination CHIN SOON LEE Ma-Planck-Institut für Informatik, Saarbrücken, German This article eplains how to construct a ranking function for an program that is proved

More information

The State Explosion Problem

The State Explosion Problem The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis

More information

Finite Automata. Mahesh Viswanathan

Finite Automata. Mahesh Viswanathan Finite Automata Mahesh Viswanathan In this lecture, we will consider different models of finite state machines and study their relative power. These notes assume that the reader is familiar with DFAs,

More information

Tracking Differentiable Trajectories across Polyhedra Boundaries

Tracking Differentiable Trajectories across Polyhedra Boundaries Tracking Differentiable Trajectories across Polhedra Boundaries Massimo Benerecetti Elect. Eng. and Information Technologies Università di Napoli Federico II, Ital massimo.benerecetti@unina.it Marco Faella

More information

VCAA Bulletin. VCE, VCAL and VET. Supplement 2

VCAA Bulletin. VCE, VCAL and VET. Supplement 2 VCE, VCAL and VET VCAA Bulletin Regulations and information about curriculum and assessment for the VCE, VCAL and VET No. 87 April 20 Victorian Certificate of Education Victorian Certificate of Applied

More information

Quantum Computer Algorithms: basics

Quantum Computer Algorithms: basics Quantum Computer Algorithms: basics Michele Mosca Canada Research Chair in Quantum Computation SQUINT Summer School on Quantum Information Processing June 3 Overview A quantum computing model Basis changes

More information

Limits 4: Continuity

Limits 4: Continuity Limits 4: Continuit 55 Limits 4: Continuit Model : Continuit I. II. III. IV. z V. VI. z a VII. VIII. IX. Construct Your Understanding Questions (to do in class). Which is the correct value of f (a) in

More information

UNFOLDING THE CUSP-CUSP BIFURCATION OF PLANAR ENDOMORPHISMS

UNFOLDING THE CUSP-CUSP BIFURCATION OF PLANAR ENDOMORPHISMS UNFOLDING THE CUSP-CUSP BIFURCATION OF PLANAR ENDOMORPHISMS BERND KRAUSKOPF, HINKE M OSINGA, AND BRUCE B PECKHAM Abstract In man applications of practical interest, for eample, in control theor, economics,

More information

The Hopf Bifurcation Theorem: Abstract. Introduction. Transversality condition; the eigenvalues cross the imginary axis with non-zero speed

The Hopf Bifurcation Theorem: Abstract. Introduction. Transversality condition; the eigenvalues cross the imginary axis with non-zero speed Supercritical and Subcritical Hopf Bifurcations in Non Linear Maps Tarini Kumar Dutta, Department of Mathematics, Gauhati Universit Pramila Kumari Prajapati, Department of Mathematics, Gauhati Universit

More information

Fuzzy Topology On Fuzzy Sets: Regularity and Separation Axioms

Fuzzy Topology On Fuzzy Sets: Regularity and Separation Axioms wwwaasrcorg/aasrj American Academic & Scholarl Research Journal Vol 4, No 2, March 212 Fuzz Topolog n Fuzz Sets: Regularit and Separation Aioms AKandil 1, S Saleh 2 and MM Yakout 3 1 Mathematics Department,

More information

Methods of Solving Ordinary Differential Equations (Online)

Methods of Solving Ordinary Differential Equations (Online) 7in 0in Felder c0_online.te V3 - Januar, 05 0:5 A.M. Page CHAPTER 0 Methods of Solving Ordinar Differential Equations (Online) 0.3 Phase Portraits Just as a slope field (Section.4) gives us a wa to visualize

More information

540 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 4, APRIL Algorithmic Analysis of Nonlinear Hybrid Systems

540 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 4, APRIL Algorithmic Analysis of Nonlinear Hybrid Systems 540 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 4, APRIL 1998 Algorithmic Analysis of Nonlinear Hybrid Systems Thomas A. Henzinger, Pei-Hsin Ho, Howard Wong-Toi Abstract Hybrid systems are digital

More information

4.7. Newton s Method. Procedure for Newton s Method HISTORICAL BIOGRAPHY

4.7. Newton s Method. Procedure for Newton s Method HISTORICAL BIOGRAPHY 4. Newton s Method 99 4. Newton s Method HISTORICAL BIOGRAPHY Niels Henrik Abel (18 189) One of the basic problems of mathematics is solving equations. Using the quadratic root formula, we know how to

More information

4452 Mathematical Modeling Lecture 13: Chaos and Fractals

4452 Mathematical Modeling Lecture 13: Chaos and Fractals Math Modeling Lecture 13: Chaos and Fractals Page 1 442 Mathematical Modeling Lecture 13: Chaos and Fractals Introduction In our tetbook, the discussion on chaos and fractals covers less than 2 pages.

More information

Timed Automata VINO 2011

Timed Automata VINO 2011 Timed Automata VINO 2011 VeriDis Group - LORIA July 18, 2011 Content 1 Introduction 2 Timed Automata 3 Networks of timed automata Motivation Formalism for modeling and verification of real-time systems.

More information

8.1 Exponents and Roots

8.1 Exponents and Roots Section 8. Eponents and Roots 75 8. Eponents and Roots Before defining the net famil of functions, the eponential functions, we will need to discuss eponent notation in detail. As we shall see, eponents

More information

Chapter 5: Systems of Equations

Chapter 5: Systems of Equations Chapter : Sstems of Equations Section.: Sstems in Two Variables... 0 Section. Eercises... 9 Section.: Sstems in Three Variables... Section. Eercises... Section.: Linear Inequalities... Section.: Eercises.

More information

We have examined power functions like f (x) = x 2. Interchanging x

We have examined power functions like f (x) = x 2. Interchanging x CHAPTER 5 Eponential and Logarithmic Functions We have eamined power functions like f =. Interchanging and ields a different function f =. This new function is radicall different from a power function

More information

Exact Differential Equations. The general solution of the equation is f x, y C. If f has continuous second partials, then M y 2 f

Exact Differential Equations. The general solution of the equation is f x, y C. If f has continuous second partials, then M y 2 f APPENDIX C Additional Topics in Differential Equations APPENDIX C. Eact First-Order Equations Eact Differential Equations Integrating Factors Eact Differential Equations In Chapter 6, ou studied applications

More information

LESSON #11 - FORMS OF A LINE COMMON CORE ALGEBRA II

LESSON #11 - FORMS OF A LINE COMMON CORE ALGEBRA II LESSON # - FORMS OF A LINE COMMON CORE ALGEBRA II Linear functions come in a variet of forms. The two shown below have been introduced in Common Core Algebra I and Common Core Geometr. TWO COMMON FORMS

More information

A formal semantics of synchronous interworkings

A formal semantics of synchronous interworkings A formal semantics of snchronous interorkings S. Mau a, M. van Wijk b and T. Winter c a Dept. of Mathematics and Computing Science, Eindhoven Universit of Technolog, P.O. Bo 513, 5600 MB Eindhoven, The

More information

Unit 3 NOTES Honors Common Core Math 2 1. Day 1: Properties of Exponents

Unit 3 NOTES Honors Common Core Math 2 1. Day 1: Properties of Exponents Unit NOTES Honors Common Core Math Da : Properties of Eponents Warm-Up: Before we begin toda s lesson, how much do ou remember about eponents? Use epanded form to write the rules for the eponents. OBJECTIVE

More information

Week 3 September 5-7.

Week 3 September 5-7. MA322 Weekl topics and quiz preparations Week 3 September 5-7. Topics These are alread partl covered in lectures. We collect the details for convenience.. Solutions of homogeneous equations AX =. 2. Using

More information

Dynamics of multiple pendula without gravity

Dynamics of multiple pendula without gravity Chaotic Modeling and Simulation (CMSIM) 1: 57 67, 014 Dnamics of multiple pendula without gravit Wojciech Szumiński Institute of Phsics, Universit of Zielona Góra, Poland (E-mail: uz88szuminski@gmail.com)

More information

f(x) = 2x 2 + 2x - 4

f(x) = 2x 2 + 2x - 4 4-1 Graphing Quadratic Functions What You ll Learn Scan the tet under the Now heading. List two things ou will learn about in the lesson. 1. Active Vocabular 2. New Vocabular Label each bo with the terms

More information

Solutions to Two Interesting Problems

Solutions to Two Interesting Problems Solutions to Two Interesting Problems Save the Lemming On each square of an n n chessboard is an arrow pointing to one of its eight neighbors (or off the board, if it s an edge square). However, arrows

More information

Estimators in simple random sampling: Searls approach

Estimators in simple random sampling: Searls approach Songklanakarin J Sci Technol 35 (6 749-760 Nov - Dec 013 http://wwwsjstpsuacth Original Article Estimators in simple random sampling: Searls approach Jirawan Jitthavech* and Vichit Lorchirachoonkul School

More information

SECTION 8-7 De Moivre s Theorem. De Moivre s Theorem, n a Natural Number nth-roots of z

SECTION 8-7 De Moivre s Theorem. De Moivre s Theorem, n a Natural Number nth-roots of z 8-7 De Moivre s Theorem 635 B eactl; compute the modulus and argument for part C to two decimal places. 9. (A) 3 i (B) 1 i (C) 5 6i 10. (A) 1 i 3 (B) 3i (C) 7 4i 11. (A) i 3 (B) 3 i (C) 8 5i 12. (A) 3

More information

Chapter 4 Analytic Trigonometry

Chapter 4 Analytic Trigonometry Analtic Trigonometr Chapter Analtic Trigonometr Inverse Trigonometric Functions The trigonometric functions act as an operator on the variable (angle, resulting in an output value Suppose this process

More information

Fractal dimension of the controlled Julia sets of the output duopoly competing evolution model

Fractal dimension of the controlled Julia sets of the output duopoly competing evolution model Available online at www.isr-publications.com/jmcs J. Math. Computer Sci. 1 (1) 1 71 Research Article Fractal dimension of the controlled Julia sets of the output duopol competing evolution model Zhaoqing

More information

QUALITATIVE ANALYSIS OF DIFFERENTIAL EQUATIONS

QUALITATIVE ANALYSIS OF DIFFERENTIAL EQUATIONS arxiv:1803.0591v1 [math.gm] QUALITATIVE ANALYSIS OF DIFFERENTIAL EQUATIONS Aleander Panfilov stable spiral det A 6 3 5 4 non stable spiral D=0 stable node center non stable node saddle 1 tr A QUALITATIVE

More information

Polynomial and Rational Functions

Polynomial and Rational Functions Polnomial and Rational Functions Figure -mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of work b Horia Varlan;

More information

2.2 Equations of Lines

2.2 Equations of Lines 660_ch0pp07668.qd 10/16/08 4:1 PM Page 96 96 CHAPTER Linear Functions and Equations. Equations of Lines Write the point-slope and slope-intercept forms Find the intercepts of a line Write equations for

More information

10 Back to planar nonlinear systems

10 Back to planar nonlinear systems 10 Back to planar nonlinear sstems 10.1 Near the equilibria Recall that I started talking about the Lotka Volterra model as a motivation to stud sstems of two first order autonomous equations of the form

More information

N coupled oscillators

N coupled oscillators Waves 1 1 Waves 1 1. N coupled oscillators towards the continuous limit. Stretched string and the wave equation 3. The d Alembert solution 4. Sinusoidal waves, wave characteristics and notation T 1 T N

More information

Substitution and Flip BDDs

Substitution and Flip BDDs Substitution and Flip BDDs Rune M. Jensen and Henrik R. Andersen IT Universit Technical Report Series TR-2003-4 ISSN 600 600 December 2003 Copright c 2003, Rune M. Jensen and Henrik R. Andersen IT Universit

More information

Time-Frequency Analysis: Fourier Transforms and Wavelets

Time-Frequency Analysis: Fourier Transforms and Wavelets Chapter 4 Time-Frequenc Analsis: Fourier Transforms and Wavelets 4. Basics of Fourier Series 4.. Introduction Joseph Fourier (768-83) who gave his name to Fourier series, was not the first to use Fourier

More information

LESSON #12 - FORMS OF A LINE COMMON CORE ALGEBRA II

LESSON #12 - FORMS OF A LINE COMMON CORE ALGEBRA II LESSON # - FORMS OF A LINE COMMON CORE ALGEBRA II Linear functions come in a variet of forms. The two shown below have been introduced in Common Core Algebra I and Common Core Geometr. TWO COMMON FORMS

More information

Notes on a situation-free fragment for donkey anaphora Chris Barker, NYU, homepages.nyu.edu/ cb125 Introduction. These notes were produced at the

Notes on a situation-free fragment for donkey anaphora Chris Barker, NYU, homepages.nyu.edu/ cb125 Introduction. These notes were produced at the Notes on a situation-free fragment for donke anaphora Chris Barker, NYU, homepages.nu.edu/ cb125 Introduction. These notes were produced at the request of Chris Kenned, for the purpose of providing something

More information

Systems of Linear Equations: Solving by Graphing

Systems of Linear Equations: Solving by Graphing 8.1 Sstems of Linear Equations: Solving b Graphing 8.1 OBJECTIVE 1. Find the solution(s) for a set of linear equations b graphing NOTE There is no other ordered pair that satisfies both equations. From

More information

D u f f x h f y k. Applying this theorem a second time, we have. f xx h f yx k h f xy h f yy k k. f xx h 2 2 f xy hk f yy k 2

D u f f x h f y k. Applying this theorem a second time, we have. f xx h f yx k h f xy h f yy k k. f xx h 2 2 f xy hk f yy k 2 93 CHAPTER 4 PARTIAL DERIVATIVES We close this section b giving a proof of the first part of the Second Derivatives Test. Part (b) has a similar proof. PROOF OF THEOREM 3, PART (A) We compute the second-order

More information

R. Thomas logical method

R. Thomas logical method R. Thomas logical method Adrien Richard, Jean-Paul Comet and Gilles Bernot Laboratoire I3S, CNRS & Université de Nice-Sophia Antipolis, 2000 route des Lucioles, 06903 Sophia Antipolis, France {richard,comet,bernot}@i3s.unice.fr

More information

Weighted Approval Voting

Weighted Approval Voting Weighted Approval Voting Jordi Massó and Marc Vorsat September 4, 2006 Abstract To allow societ to treat unequal alternatives distinctl we propose a natural etension of Approval Voting [7] b relaing the

More information

Synchronous state transition graph

Synchronous state transition graph Heike Siebert, FU Berlin, Molecular Networks WS10/11 2-1 Synchronous state transition graph (0, 2) (1, 2) vertex set X (state space) edges (x,f(x)) every state has only one successor attractors are fixed

More information

2.5 CONTINUITY. a x. Notice that Definition l implicitly requires three things if f is continuous at a:

2.5 CONTINUITY. a x. Notice that Definition l implicitly requires three things if f is continuous at a: SECTION.5 CONTINUITY 9.5 CONTINUITY We noticed in Section.3 that the it of a function as approaches a can often be found simpl b calculating the value of the function at a. Functions with this propert

More information

5.6 RATIOnAl FUnCTIOnS. Using Arrow notation. learning ObjeCTIveS

5.6 RATIOnAl FUnCTIOnS. Using Arrow notation. learning ObjeCTIveS CHAPTER PolNomiAl ANd rational functions learning ObjeCTIveS In this section, ou will: Use arrow notation. Solve applied problems involving rational functions. Find the domains of rational functions. Identif

More information

11.1 Double Riemann Sums and Double Integrals over Rectangles

11.1 Double Riemann Sums and Double Integrals over Rectangles Chapter 11 Multiple Integrals 11.1 ouble Riemann Sums and ouble Integrals over Rectangles Motivating Questions In this section, we strive to understand the ideas generated b the following important questions:

More information

Higher order method for non linear equations resolution: application to mobile robot control

Higher order method for non linear equations resolution: application to mobile robot control Higher order method for non linear equations resolution: application to mobile robot control Aldo Balestrino and Lucia Pallottino Abstract In this paper a novel higher order method for the resolution of

More information

Simulation of Gene Regulatory Networks

Simulation of Gene Regulatory Networks Simulation of Gene Regulatory Networks Overview I have been assisting Professor Jacques Cohen at Brandeis University to explore and compare the the many available representations and interpretations of

More information

11.4 Polar Coordinates

11.4 Polar Coordinates 11. Polar Coordinates 917 11. Polar Coordinates In Section 1.1, we introduced the Cartesian coordinates of a point in the plane as a means of assigning ordered pairs of numbers to points in the plane.

More information

Chapter 8 Notes SN AA U2C8

Chapter 8 Notes SN AA U2C8 Chapter 8 Notes SN AA U2C8 Name Period Section 8-: Eploring Eponential Models Section 8-2: Properties of Eponential Functions In Chapter 7, we used properties of eponents to determine roots and some of

More information

A new chaotic attractor from general Lorenz system family and its electronic experimental implementation

A new chaotic attractor from general Lorenz system family and its electronic experimental implementation Turk J Elec Eng & Comp Sci, Vol.18, No.2, 2010, c TÜBİTAK doi:10.3906/elk-0906-67 A new chaotic attractor from general Loren sstem famil and its electronic eperimental implementation İhsan PEHLİVAN, Yılma

More information

Limits. Calculus Module C06. Copyright This publication The Northern Alberta Institute of Technology All Rights Reserved.

Limits. Calculus Module C06. Copyright This publication The Northern Alberta Institute of Technology All Rights Reserved. e Calculus Module C Limits Copright This publication The Northern Alberta Institute of Technolog. All Rights Reserved. LAST REVISED March, Introduction to Limits Statement of Prerequisite Skills Complete

More information

Lecture Notes on Software Model Checking

Lecture Notes on Software Model Checking 15-414: Bug Catching: Automated Program Verification Lecture Notes on Software Model Checking Matt Fredrikson André Platzer Carnegie Mellon University Lecture 19 1 Introduction So far we ve focused on

More information

Additional Material On Recursive Sequences

Additional Material On Recursive Sequences Penn State Altoona MATH 141 Additional Material On Recursive Sequences 1. Graphical Analsis Cobweb Diagrams Consider a generic recursive sequence { an+1 = f(a n ), n = 1,, 3,..., = Given initial value.

More information

1.5. Analyzing Graphs of Functions. The Graph of a Function. What you should learn. Why you should learn it. 54 Chapter 1 Functions and Their Graphs

1.5. Analyzing Graphs of Functions. The Graph of a Function. What you should learn. Why you should learn it. 54 Chapter 1 Functions and Their Graphs 0_005.qd /7/05 8: AM Page 5 5 Chapter Functions and Their Graphs.5 Analzing Graphs of Functions What ou should learn Use the Vertical Line Test for functions. Find the zeros of functions. Determine intervals

More information

Physics Gravitational force. 2. Strong or color force. 3. Electroweak force

Physics Gravitational force. 2. Strong or color force. 3. Electroweak force Phsics 360 Notes on Griffths - pluses and minuses No tetbook is perfect, and Griffithsisnoeception. Themajorplusisthat it is prett readable. For minuses, see below. Much of what G sas about the del operator

More information

Interaction Network Analysis

Interaction Network Analysis CSI/BIF 5330 Interaction etwork Analsis Young-Rae Cho Associate Professor Department of Computer Science Balor Universit Biological etworks Definition Maps of biochemical reactions, interactions, regulations

More information

Program verification. Hoare triples. Assertional semantics (cont) Example: Semantics of assignment. Assertional semantics of a program

Program verification. Hoare triples. Assertional semantics (cont) Example: Semantics of assignment. Assertional semantics of a program Program verification Assertional semantics of a program Meaning of a program: relation between its inputs and outputs; specified by input assertions (pre-conditions) and output assertions (post-conditions)

More information