Analysis of Execution Costs for QuickSelect. Takéhiko Nakama

Size: px
Start display at page:

Download "Analysis of Execution Costs for QuickSelect. Takéhiko Nakama"

Transcription

1 Aalysis of Executio Costs for QuickSelect by Takéhiko Nakama A dissertatio submitted to The Johs Hopkis Uiversity i coformity with the requiremets for the degree of Doctor of Philosophy. Baltimore, Marylad August, 2009 c Takéhiko Nakama 2009 All rights reserved

2 Abstract QuickSelect is a search algorithm widely used for fidig a key of target rak i a file of keys. Whe the algorithm compares keys durig its executio, it must operate o the keys represetatios or iteral structures, which were igored by the previous studies that quatified the executio cost for the algorithm i terms of the umber of required key comparisos. I this dissertatio, we coduct aalyses of ruig costs for the algorithm that take ito accout ot oly the umber of key comparisos but also the cost of each key compariso. First we suppose that keys are idepedet ad uiformly distributed i the uit iterval (0, 1) ad are represeted as their biary expasios, ad we derive exact ad asymptotic expressios for the expected umber of bit comparisos required by QuickSelect. We also establish a closed formula for the expectatio that oly ivolves fiite summatio ad use it to compute the expected cost for various values of the target rak ad the umber of keys. The we ivestigate executio costs for the algorithm applied to keys that are represeted by more geeral sequeces of symbols, ad we idetify limitig distributios associated with the costs. Further, we derive itegral ad series expressios for the expectatios of the limitig distributios ad use them to recapture previously obtaied ii

3 ABSTRACT results o the umber of key comparisos required by QuickSelect. Primary Reader: Professor James Alle Fill Secodary Reader: Professor S. Rao Kosarau iii

4 Ackowledgemets It has truly bee a hoor ad a great pleasure workig with Professor James Alle Fill. I thak him for costatly ispirig ot oly with his exceptioal brilliace but also with his character. We are grateful for Professor Brigitte Vallée s collaboratio o the limitigdistributio aalysis described i Chapters 5 8 ad for Professor Rao Kosarau s helpful commets o a draft of this dissertatio. I am also wholeheartedly grateful to umerous people who have provided me with icalculable support; I would ot have bee able to coduct graduate studies without them. Fially, I thak Johs Hopkis. I have ever take for grated the privilege of pursuig my various itellectual iterests at this remarkable istitutio, which has provided me with woderful opportuities to lear. iv

5 Cotets Abstract ii Ackowledgemets iv List of Figures viii 1 Itroductio ad summary 1 2 Aalysis of µ(1, ) Prelimiaries Exact computatio of µ(1, ) Asymptotic aalysis of µ(1, ) Aalysis of µ( m, ) Exact computatio of µ( m, ) Exact computatio of µ 1 ( m, ) Exact computatio of µ 2 ( m, ) ad µ( m, ) v

6 CONTENTS 3.2 Asymptotic aalysis of µ( m, ) Derivatio of a closed formula for µ(m, ) 49 5 Backgroud ad prelimiaries for limitig-distributio aalysis Probabilistic source models for the keys Kow results for the umbers of key ad symbol comparisos QuickQuat ad QuickVal Aalysis of QuickVal Prelimiaries Covergece of S V / i L p for 1 p < Almost sure covergece of S V / Aalysis of QuickQuat Prelimiaries Covergece of S Q / i L p for 1 p < Aalysis of E S Computatio of E S: a itegral expressio Computatio of E S: a series expressio A Proof of (2.28) 95 B Tractable expressio for the measure ν 97 vi

7 CONTENTS Bibliography 106 Vita 110 vii

8 List of Figures 4.1 Expected umber of bit comparisos for Quickselect viii

9 Chapter 1 Itroductio ad summary QuickSelect, itroduced by Hoare [12] i 1961 ad also kow as Fid, is a search algorithm widely used for fidig a key of target rak i a file of keys. Suppose that there are distict keys (the keys are typically assumed to be distict, but the algorithm still works with a mior adustmet eve if they are ot distict) ad that the target rak is m, where 1 m. The algorithm fids the target key i a recursive ad radom fashio. First, it selects a pivot uiformly at radom from keys. Let k deote the rak of the pivot. If k = m, the the algorithm returs the pivot. If k > m, the the algorithm recursively operates o the set of keys smaller tha the pivot ad returs the rak-m key. Similarly, if k < m, the the algorithm recursively operates o the set of keys larger tha the pivot ad returs the (m k)-th smallest key from the subset. May studies have examied QuickSelect to quatify its executio costs (a oexhaustive list of refereces is Kuth [15], Mahmoud et al. [19], Prodiger [22], Grübel 1

10 CHAPTER 1. INTRODUCTION AND SUMMARY ad U. Rösler [11], Let ad Mahmoud [18], Grübel [10], Mahmoud ad Smythe [20], Devroye [4], Hwag ad Tsai [14], Fill ad Nakama [6], ad Vallée et al. [27]), ad all of them except for Fill ad Nakama [6] ad Vallée et al. [27] have coducted the quatificatio with regard to the umber of key comparisos required by the algorithm to achieve its task. As a result, most of the theoretical results o the complexity of QuickSelect are about expectatios or distributios for the umber of required key comparisos. (We will soo retur to [6] ad [27].) However, oe ca reasoably argue that aalyses of QuickSelect i terms of the umber of key comparisos caot fully quatify its complexity. For istace, if keys are represeted as biary strigs, the idividual bits of the strigs must be compared i order for QuickSelect to complete its task. Cosider applyig QuickSelect to fid the smallest key amog three keys k 1, k 2, ad k 3 whose biary represetatios are , , ad , respectively. If the algorithm selects k 3 as a pivot, the it compares each of k 1 ad k 2 to k 3 i order to determie the rak of k 3. Whe k 1 ad k 3 are compared, the algorithm requires 2 bit comparisos to determie that k 3 is smaller tha k 1 because the two keys have the same first digit ad differ at the secod digit. Similarly, whe k 2 ad k 3 are compared, the algorithm requires 4 bit comparisos to determie that k 3 is smaller tha k 2. After these comparisos, k 3 has bee idetified as smallest. Hece the search for the smallest key requires a total of 6 bit comparisos (resultig from the two key comparisos). This simple case illustrates that the umber of bit comparisos required by the algorithm more accurately reflects the actual executio cost. (We will co- 2

11 CHAPTER 1. INTRODUCTION AND SUMMARY sider bit comparisos as a example of symbol comparisos.) Whe QuickSelect (or ay other algorithm) compares keys durig its executio, it must operate o the keys represetatios or iteral structures, so these should ot be igored i fully characterizig the performace of the algorithm. Also, symbol-complexity aalysis allows us to compare key-based algorithms such as QuickSelect ad QuickSort with digital algorithms such as those utilizig digital search trees. Fill ad Jaso [5] pioeered symbol-complexity aalysis by aalyzig the expected umber of bit comparisos required by QuickSort. This well-kow ad popular sortig algorithm was also iveted by Hoare [13], ad, like QuickSelect, it uses a divide-adcoquer strategy. (I fact, QuickSelect is a oe-sided versio of QuickSort.) The algorithm picks a pivot key uiformly at radom from the give file of keys ad compares the other keys with the pivot to form two subfiles; oe of them cosists of keys larger tha the pivot, ad the other subfile cosists of keys smaller tha the pivot. QuickSort the recursively performs the same procedure o each of the resultig subfiles cotaiig more tha oe key. Fill ad Jaso assumed that QuickSort is applied to keys that are i.i.d. (idepedet ad idetically distributed) from the uiform distributio over (0, 1) ad represeted (via their biary expasios) as biary strigs, ad that the algorithm operates o idividual bits i order to sort the keys. They foud that the expected umber of bit comparisos required by QuickSort to sort keys is asymptotically equivalet to (l )(lg ) (where lg deotes biary logarithm), whereas the lead-order term of the expected umber of key comparisos is 2 l, smaller by a factor of order log. I their Sectio 6 they also 3

12 CHAPTER 1. INTRODUCTION AND SUMMARY cosidered i.i.d. keys draw from other distributios with desity o (0, 1). Their symbol-complexity aalysis was closely followed by Fill ad Nakama [6], who ivestigated the expected umber of bit comparisos required by QuickSelect. Chapters 2 4 of this dissertatio describe the results of [6] i detail. I these chapters, we assume that the algorithm is applied to keys that are i.i.d. uiform(0,1) ad that the keys are represeted as their biary expasios. We let µ(m, ) deote the expected umber of bit comparisos required to fid the rak-m key i a file of keys by QuickSelect. By symmetry, µ(m, ) = µ(+1 m, ). I this dissertatio, we will refer to QuickSelect for fidig the smallest key ad the largest key as QuickMi ad QuickMax, respectively. First, we develop exact ad asymptotic formulae for µ(1, ) = µ(, ), as summarized i the followig theorem. Theorem 1.1. The expected umber µ(1, ) of bit comparisos required by QuickMi has the followig exact ad asymptotic expressios: 1 µ(1, ) = 2(H 1) + 2 = c 1 l 2 (l )2 B + 1 ( ) ( 1)(1 2 ) ( 2 l (1.1) ) l + O(1), (1.2) where H ad B deote harmoic ad Beroulli umbers, respectively, ad 2 k c := k l = (1.3) 2 k k=0 =1 With χ k := 2πik l 2 ad γ := Euler s costat. = , the costat c ca alteratively be 4

13 CHAPTER 1. INTRODUCTION AND SUMMARY expressed as c = γ 9 l 2 4 l 2 k Z\{0} ζ(1 χ k )Γ(1 χ k ) Γ(4 χ k )(1 χ k ). (1.4) The asymptotic formula shows that the expected umber of bit comparisos is asymptotically liear i with lead-order coefficiet approximately equal to Hece the expected umber of bit comparisos is asymptotically differet from that of key comparisos required to fid the smallest key oly by a costat factor (the expectatio for key comparisos is asymptotically 2). Details of the derivatios of the formulae are described i Chapter 2. Complex-aalytical methods are utilized to obtai the asymptotic formula (1.2) with c i the form (1.4) ad seem to be idispesable for obtaiig asymptotics beyod the lead term. [We remark that, although it ivolves the imagiary umbers χ k, the expressio (1.4) is real because the terms with idices k ad k are complex cougates.] I Sectio 2.3 we agai use complex-aalytical methods to reexpress (1.4) i the form (1.3). Havig doe all this we suspected that there must be a purely real-aalytical way to obtai directly the lead-order asymptotics µ(1, ) c with c i the form (1.3). Ideed, there is: See Remark 2.3. I Chapter 3, we move o to derive exact ad asymptotic expressios for the expected umber of bit comparisos for the average case, where the target rak is chose uiformly radomly from {1, 2,..., }. We deote this expectatio by µ( m, ); hece µ( m, ) = 1 m=1 µ(m, ). QuickSelect for fidig a key of radom rak will be referred to as QuickRad. The derived asymptotic formula shows that µ( m, ) is also asymptotically 5

14 CHAPTER 1. INTRODUCTION AND SUMMARY liear i ; see (3.45). More detailed results for µ( m, ) are described i Chapter 3. I Chapter 4, we derive a exact expressio of µ(m, ) for each fixed m that is suited for computatios. Our prelimiary exact formula for µ(m, ) [show i (2.8)] etails ifiite summatio ad itegratio. As a result, it is ot a desirable form for umerically computig the expected umber of bit comparisos. Hece we establish aother exact formula that oly requires fiite summatio ad use it to compute µ(m, ) for m = 1,...,, = 2,..., 25. The computatio leads to the followig coectures: (i) for fixed, µ(m, ) icreases i m for m +1 ad is symmetric about +1 ; ad (ii) for fixed m, µ(m, ) 2 2 icreases i (asymptotically liearly). Vallée et al. [27] exteded the results of Fill ad Jaso [5] ad Fill ad Nakama [6] by ivestigatig QuickSort ad QuickSelect with respect to the umber of required comparisos of more geeral symbols. They cosidered keys represeted by sequeces of symbols geerated by ay of a wide variety of sources that iclude memoryless, Markov, ad other dyamical sources. (I both Fill ad Nakama [6] ad all but Sectio 6 of Fill ad Jaso [5], the symbols that compose each key represetatio are assumed to be radom uiform bits, geerated by a memoryless source.) We will provide details of their probabilistic source models i Sectio 5.1, sice we will use them i formulatig our limitigdistributio results for QuickSelect. Roughly summarized, Vallée et al. showed that the expected umber of symbol comparisos i processig a file of keys is of order log 2 for QuickSort ad of order for QuickSelect (applied to fid a key of target rak m with m / α for ay give α [0, 1]) if symbols are geerated by a suitably 6

15 CHAPTER 1. INTRODUCTION AND SUMMARY ice source. (For example, all memoryless sources are suitably ice.) For a more detailed discussio of sources ad the results of Vallée et al. [27] for QuickSelect, see Sectio 5.1. I this dissertatio, we further deepe the quatificatio of the performace of QuickSelect i terms of the umber of symbol comparisos used by the algorithm. I Chapters 5 8, we ivestigate limitig distributios for the umber of symbol comparisos required by QuickSelect. We believe that our study is the first to establish a limitig distributio for the umber of symbol comparisos required by ay key-based algorithm. Our elemetary approach allows us to hadle rather geeral kids of cost for comparig two keys, ad i particular to recover i a rather direct way kow results about the umber of key comparisos. There is o disadvatage to allowig geeral costs, sice our results rely o at most broad limitatios o the ature of the cost. I the last four chapters, we shall be cocered primarily with QuickQuat QuickQuat(, α), which is what we call the algorithm QuickSelect whe applied to fid the key of rak m i a file of size, where we are give 0 α 1 ad a sequece (m ) such that m / α. It turs out to be coveiet mathematically to aalyze a close cousi to QuickQuat itroduced by Vallée et al. [27], amely, QuickVal QuickVal(, α) (this algorithm is fully described i Sectio 5.3), ad the treat QuickQuat by compariso. For the same value of α, the operatio of QuickVal is quite close to that of QuickQuat, ad executio costs of the two algorithms are expected to be close; i fact, we will show that if S Q S Q (α) ad S V S V (α) deote the total costs of executig QuickQuat ad QuickVal, respectively, the S Q / ad S V / 7

16 CHAPTER 1. INTRODUCTION AND SUMMARY have the same limitig distributio uder proper coditios o the cost fuctio. I order to prove the covergece i distributio, we will defie all the radom variables S Q 1, S Q 2,... ad S1 V, S2 V,... o a commo probability space ad show that S Q / ad S V / both coverge i L p to a commo limit, call it S, for 1 p <. The limit S is defied at (6.7); see the ed of Sectio 6.1. (Uder a techical assumptio, we will also prove almost sure covergece for QuickVal i Sectio 6.3.) I order to establish limitig-distributio results for QuickVal ad QuickQuat, we first provide a careful descriptio of the probabilistic models used to gover the geeratio of keys i Sectio 5.1. The we review kow results about key ad symbol comparisos i Sectio 5.2 ad describe QuickVal i Sectio 5.3. I Chapter 6, we preset covergece results for QuickVal; see Theorems 6.1 ad 6.4. Fially we move o to QuickQuat i Chapter 7. Theorem 7.1 is the mai result of our limitig-distributio aalysis. We will also aalyze E S i Chapter 8 ad derive itegral ad series expressios for it. These expressios will be used to recover the previously obtaied results reviewed i Sectio

17 Chapter 2 Aalysis of µ(1, ) I this chapter, we aalyze the expected umber of bit comparisos required by QuickMi (QuickSelect for fidig the smallest key). By symmetry, the expectatio equals that for QuickMax (QuickSelect for fidig the largest key). As described i Chapter 1, we assume that QuickMi is applied to distict keys that are represeted as bit strigs ad that the algorithm operates o idividual bits i order to compare keys ad fid the target key. It is further assumed that the keys are uiformly ad idepedetly distributed i (0, 1). I Sectio 2.1, we describe the framework ad otatio for our bitcomplexity aalysis. I Sectio 2.2, we derive a exact expressio for µ(1, ). We coduct a asymptotic aalysis of this expressio i Sectio

18 CHAPTER 2. ANALYSIS OF µ(1, ) 2.1 Prelimiaries To ivestigate the bit complexity of Quickselect, we follow the geeral approach developed by Fill ad Jaso [5]. Let U 1,..., U deote the keys uiformly ad idepedetly distributed o (0, 1), ad let U (i) deote the rak-i key. The, for 1 i < (assume 2), P {U (i) ad U () are compared} = 2 m i m i + 1 if m i if i < m < if m. (2.1) To determie the first probability i (2.1), ote that U (m),..., U () remai i the same subset util the first time that oe of them is chose as a pivot. Therefore, U (i) ad U () are compared if ad oly if the first pivot chose from U (m),..., U () is either U (i) or U (). Aalogous argumets establish the other two cases. is give by For 0 < s < t < 1, it is well kow that the oit desity fuctio of U (i) ad U () f U(i),U () (s, t) := ( ) s i 1 (t s) i 1 (1 t). i 1, 1, i 1, 1, (2.2) 10

19 CHAPTER 2. ANALYSIS OF µ(1, ) Clearly, the evet that U (i) ad U () are compared is idepedet of the radom variables U (i) ad U (). Hece, defiig P 1 (s, t, m, ) = P 2 (s, t, m, ) = P 3 (s, t, m, ) = m i< 1 i<m< 1 i< m 2 m + 1 f U (i),u () (s, t), (2.3) 2 i + 1 f U (i),u () (s, t), (2.4) 2 m i + 1 f U (i),u () (s, t), (2.5) P (s, t, m, ) = P 1 (s, t, m, ) + P 2 (s, t, m, ) + P 3 (s, t, m, ) (2.6) [the sums i (2.3) (2.5) are double sums over i ad ], ad lettig β(s, t) deote the idex of the first bit at which the keys s ad t differ, we ca write the expectatio µ(m, ) of the umber of bit comparisos required to fid the rak-m key i a file of keys as µ(m, ) = = β(s, t)p (s, t, m, ) dt ds (2.7) s 2 k (l 1 2 )2 k l2 k k=0 l=1 (l 1)2 k (l 1 2 )2 k (k + 1)P (s, t, m, ) dt ds; (2.8) i this expressio, ote that k represets the last bit at which s ad t agree. 2.2 Exact computatio of µ(1, ) Sice the cotributio of P 2 (s, t, m, ) or P 3 (s, t, m, ) to P (s, t, m, ) is zero for m = 1, we have P (s, t, 1, ) = P 1 (s, t, 1, ) [see (2.4) through (2.6)]. Let x := s, y := 11

20 CHAPTER 2. ANALYSIS OF µ(1, ) t s, z := 1 t. The P 1 (s, t, 1, ) = z = 2z z 1 i< η 1 ( ) 2 x i 1 y i 1 z i 1, 1, i 1, 1, ( ) x i 1 y i 1 η dη i 1, 1, i 1, 1, 1 i< = 2z η 1 ( 1)(x + y + η) 2 dη z = 2z ( 1) z η 3 ( t η + 1 ) 2 dη. (2.9) Makig the chage of variables v = t + 1 ad itegratig, ad recallig z = 1 t, we fid, η after some calculatio, From (2.8) ad (2.10), µ(1, ) = = 2 = 2 = = (k + 1) k=0 (k + 1) k=0 (k + 1) k=0 (k + 1) k=0 P 1 (s, t, 1, ) = 2 2 k (l 1 2 )2 k l2 k ( ) ( 1) t 2. (2.10) l=1 (l 1)2 k 2 k (l 1 2 )2 k l2 k l=1 2 k l=1 2 k l=1 ( 1) ( ) 1 (l 1)2 k (l 1 2 )2 k P 1 (s, t, 1, ) dt ds (l 1 2 )2 k ( ) ( 1) t 2 dt ds ( ) l2 k ( 1) t 2 [(l 1 (l 1 2 )2 k (l 1)2 k ] dt 2 )2 k ( 1) ( ) 1 2 k {(l2 k ) 1 [(l 1 2 )2 k ] 1 } (k + 1)2 k=0 k 2k [l 1 (l 1 2 ) 1 ]. (2.11) l=1 12

21 CHAPTER 2. ANALYSIS OF µ(1, ) To further trasform (2.11), defie a,r = B r r ( ) 1 r 1 if r 2 1 if r = if r = 0, (2.12) where B r deotes the r-th Beroulli umber. Let S, := l=1 l 1. The S, = 1 r=0 a,r r (see Kuth [17]), ad 2 k l=1 [l 1 (l 1 2 ) 1 ] = S 2 k, 2 ( 1) 2k (2l 1) 1 = S 2 k, 2 ( 1) (S 2 k+1, 2 1 S 2 k,) = 2S 2 k, 2 ( 1) S 2 k+1, = 2 a,r 2 k( r) 2 ( 1) a,r 2 (k+1)( r) = 2 a,r 2 k( r) (1 2 r ). r=0 r=0 l=1 r=1 (2.13) From (2.11) ad (2.13), Here µ(1, ) = 2 ( 1) ( ) 1 1 (k + 1)2 k a,r 2 k( r) (1 2 r ). k=0 1 (k + 1)2 k a,r 2 k( r) (1 2 r ) = k=0 = r=1 r=1 r=1 1 (k + 1) a,r 2 kr (1 2 r ) k=0 1 r=1 1 a,r (1 2 r ) (k + 1)2 kr = a,r (1 2 r ) 1. k=0 r=1 13

22 CHAPTER 2. ANALYSIS OF µ(1, ) Hece µ(1, ) = 2 = 2 = 2 ( 1) ( ) 1 1 a,r (1 2 r ) 1 = 2 (1 2 r ) 1 1 r=1 r=1 ( 1) ( ) (1 2 r ) 1 B ( 1) ( )( 1 ) r r 1 1 r 1 r=2 =r+1 ( 1) ( ) [ (1 2 r ) 1 B ( 1) ( )( 1 ) r r 1 1 r 1 r=2 The sum ( 1) ( )( r 1) 1 =r ca be simplified as follows: 1 =r ( 1) 1 ( )( 1 r 1 ) = = 1 r 1 1 r 1 = ( 1)r r 1 =r =r+1 ( 1) ( ) 1 a,r ( 1)r( r r 1 )]. (2.14) ( )( ) 2 ( 1) r 2 ( )( ) 2 ( 1) r ( )( ) ( ) 1 r = ( 1)r + 1 r r r 1 r =r =r =0 = ( 1) r + 1 r. (2.15) r 1 Pluggig (2.15) ito (2.14) ad recallig B 2k+1 = 0 for k 1, we fially obtai µ(1, ) = 2 = 2 ( 1) ( ) r=2 ( 1) ( ) (1 2 r ) 1 B r r B [ ( 1) r ( r + 1) r 1 ) + 1 ( ( 1)(1 2 ) ( 1)r( r r 1 = 2(H 1) + 2t, (2.16) )] where H deotes the -th harmoic umber ad t := 1 B (1 2 ) 14 [ ( ) 1 1 ]. (2.17)

23 CHAPTER 2. ANALYSIS OF µ(1, ) The last equality i (2.16) follows from the easy idetity k=1 ( 1) k 1( ) k k = H. 15

24 CHAPTER 2. ANALYSIS OF µ(1, ) 2.3 Asymptotic aalysis of µ(1, ) I order to obtai a asymptotic expressio for µ(1, ), we aalyze t i (2.16) (2.17). The followig lemma provides a exact expressio for t that easily leads to a asymptotic expressio for µ(1, ): Lemma 2.1. For 2, let u := t +1 t (with t 2 = 0) ad v := u +1 u. Let γ deote Euler s costat (. = ), ad defie χ k := 2πik l 2. The (i) (ii) where where v = 1 H ( γ 1) l 2 l 2 2 Σ, ( + 1)( + 2) Σ := u = H + a a := 14 9 Σ := k Z\{0} k Z\{0} ζ(1 χ k )Γ( + 1)Γ(1 χ k ) ; (l 2)Γ( + 3 χ k ) ( H +1 γ 1 (l 2)( + 1) + l 2 1 ) Σ, γ 18 l 2 2 l 2 k Z\{0} ζ(1 χ k )Γ(1 χ k ) (l 2)(1 χ k ) ζ(1 χ k )Γ(1 χ k ) Γ(4 χ k )(1 χ k ), Γ( + 1) Γ( + 2 χ k ) ; (iii) t = (H 1) + a( 2) 1 2 l 2 ( γ 1 + l ) ( H 3 ) + b Σ, 2 [ H 2 + H (2) 7 ] 2 16

25 CHAPTER 2. ANALYSIS OF µ(1, ) where b := k Z\{0} Σ := k Z\{0} 2ζ(1 χ k )Γ( χ k ) (l 2)(1 χ k )Γ(3 χ k ), ζ(1 χ k )Γ( χ k )Γ( + 1) (l 2)(1 χ k )Γ( + 1 χ k ), ad H (2) deotes the -th Harmoic umber of order 2, i.e., H (2) := i=1 1. i 2 I this lemma, u ad v are derived i order to obtai the exact expressio for t i (iii). From (2.16), the exact expressio for t also provides a alterative exact expressio for µ(1, ). We kow Before provig Lemma 2.1, we complete the proof of Theorem 1.1 usig part (iii). H = l + γ O( 4 ), (2.18) H (2) = π O( 3 ). (2.19) Combiig (2.18) (2.19) with (2.16) ad Lemma 2.1(iii), we obtai a asymptotic expressio for µ(1, ): µ(1, ) = 2a 1 ( ) 2 l 2 (l )2 l l + O(1). (2.20) The term O(1) i (2.20) has fluctuatios of small magitude due to Σ, which is periodic i log with amplitude smaller tha Thus, as show i Theorem 1.1, the asymptotic slope i (2.20) is c = 2a = γ 9 l 2 4 l 2 k Z\{0} 17 ζ(1 χ k )Γ(1 χ k ) Γ(4 χ k )(1 χ k ). (2.21)

26 CHAPTER 2. ANALYSIS OF µ(1, ) Let S deote the sum i c: S := k Z\{0} ζ(1 χ k )Γ(1 χ k ) Γ(4 χ k )(1 χ k ) = k Z\{0} ζ(1 χ k ) (3 χ k )(2 χ k )(1 χ k ) 2, (2.22) where the formula Γ(1 + x) = xγ(x) is used to derive the secod expressio. Both expressios ivolve the imagiary umbers χ k, but S is a real umber. We ivestigate S ad express it usig oly real fuctios. We have the followig result: Theorem 2.2. Let S be the sum defied at (2.22). The where S l 2 = S ρ, (2.23) S := 2 k h(2 k ), h(m) := 1 2 (m l m l m! m) m 1, (2.24) k=0 ad 17 6γ ρ := 36 l Proof of Theorem 2.2. Choose ad fix 0 < θ < 1. We show that the itegral J := θ+i θ i ζ(1 s) (1 2 s )(3 s)(2 s)(1 s) 2 ds equals 2πi S o the oe had ad equals 2πi[ρ + (S/ l 2)] o the other had. Equatig these two expressios gives the desired result. To get the first expressio for J, we calculate J = k=0 θ+i θ i ζ(1 s)2 ks (3 s)(2 s)(1 s) ds = 1 θ+i 2 k ζ(t)2 kt 2 t 2 (1 + t)(2 + t) dt. k=0 1 θ i 18

27 CHAPTER 2. ANALYSIS OF µ(1, ) But, for ay positive iteger m ad ay α > 1, 1 θ+i 1 θ i ζ(t)m t t 2 (1 + t)(2 + t) dt = α+i α i ζ(t)m t t 2 (1 + t)(2 + t) dt 2πiRes t=1 [ ] ζ(t)m t, t 2 (1 + t)(2 + t) which follows from residue calculus, takig ito accout the cotributio of the simple pole of the itegrad at 1. Here ad Further, sice α+i α i we have by Melli iversio that equals [ ] ζ(t)m t Res t=1 = 1 t 2 (1 + t)(2 + t) 6 m ζ(t)m t t 2 (1 + t)(2 + t) dt = =1 α+i α i (/m) t t 2 (1 + t)(2 + t) dt. 1 t 2 (t + 1)(t + 2) = 3/4 + 1/2 + 1 t t 2 t + 1 1/4 t + 2, 1 α+i x t 2πi α i t 2 (1 + t)(2 + t) dt f(x) := l x + x 1 4 x2 for 0 x 1 ad equals 0 for x 1. (Note that this requires oly α > 0.) So α+i α i ζ(t)m t t 2 (1 + t)(2 + t) dt = 2πi ( ) f m [ 1 = 2πi 2 (m l m l m!) 1 3 m ] 24 m 1 = 2πi [h(m) + 16 ] m, 19

28 CHAPTER 2. ANALYSIS OF µ(1, ) where the sum is over 1 m (or 1 m 1), ad therefore 1 θ+i 1 θ i ζ(t)m t dt = 2πih(m). t 2 (1 + t)(2 + t) Thus we obtai our first expressio for J. Before we proceed, we examie the series expressio (2.24) for S. Applyig Stirlig s formula to l m!, we obtai l m! = m l m m l m l(2π) m 1 360m 3 + O(m 4 ). Thus h(m) = 1 4 l m + ( l(2π) ) 1 12m m 3 + O(m 4 ), ad the series S coverges geometrically rapidly. To obtai the secod expressio for J we move the horizotal (i.e., real) coordiate of the vertical lie of itegratio over from θ to C where C is large positive umber (C ). By residue calculus, we fid [ ] ζ(1 s) J = 2πi {Res s=0 (1 2 s )(3 s)(2 s)(1 s) 2 as desired. + S } ( = 2πi ρ + S ), l 2 l 2 Usig Theorem 2.2 it is straightforward to derive the alterative expressio 2 k c = k l (2.25) 2 k k=0 =1 for the liear coefficiet c i (2.21). Graber ad Prodiger [9] obtaied a earlier draft of this mauscript ad idepedetly coducted a similar aalysis of S leadig to (2.25). They also showed how to compute c efficietly to high precisio ad i particular computed c to 50 decimal places. 20

29 CHAPTER 2. ANALYSIS OF µ(1, ) Remark 2.3. The lead-order asymptotics µ(1, ) c with c i the form (2.25) ca also be obtaied simply usig real-aalytical argumets. Start with (2.7) with m = 1 ad recall that P (s, t, 1, ) = P 1 (s, t, 1, ) is give by (2.10) to see that µ(1, ) = 2 1 t 0 0 β(s, t)t 2 [(1 t) 1 + t] ds dt. A easy domiated-covergece argumet the shows that µ(1, ) c with c give i the itegral form Writig β(s, t) = c = 2 1 t 0 0 β(s, t)t 1 ds dt. 1(s ad t agree i their first k bits) k=0 ad breakig up the double itegral accordig to the first k bits of t leads to the summatio form (2.25) of c. Vallée et al. [27] followed ad further geeralized this approach. We omit the details. We do ot kow how to obtai asymptotics for µ(1, ) beyod the lead term by this sort of approach. Now we prove Lemma 2.1: Proof of Lemma 2.1. (i) Sice u = t +1 t = = B (1 2 ) [ ( ( + 1) +1 ) 1 B ( 1)(1 2 ) [( 1 1 ) ] ] 1, 1 B (1 2 ) [ ( ) 1 1 ] 21

30 CHAPTER 2. ANALYSIS OF µ(1, ) it follows that +1 v = u +1 u = B ( 1)(1 2 ) [( ) ] [( ) ] B + 1 ( 1)(1 2 ) 1 1 ( ) B k+2 = k (k + 2)(k + 1)[1 2 (k+2) ] k=0 1 ( ) = ( 1) k ζ( 1 k) (2.26) k (k + 1)[1 2 (k+2) ] k=0 = ( 1) ζ( 1 s)! ds, (2.27) 2πi (s + 1)[1 2 (s+2) ] s(s 1) (s ) C where C is a positively orieted closed curve that ecircles the itegers 0,..., 1 ad does ot iclude or ecircle ay of the followig poits: 2 + χ k (where χ k := 2πik l 2 ), k Z; 1; ad. Equality (2.26) follows from the fact that the Beroulli umbers are extrapolated by the Riema zeta fuctio take at oegative itegers: B k = kζ(1 k). [The coefficiets ( 1) k do ot cocer us sice the Beroulli umbers of odd idex greater tha 1 vaish.] Equality (2.27) follows from a direct applicatio of residue calculus, takig ito accout cotributios of the simple poles at the itegers 0,..., 1. Let φ(s) deote the itegrad i (2.27): φ(s) = ζ( 1 s)! (s + 1)[1 2 (s+2) ] s(s 1) (s ). We cosider a positively orieted rectagular cotour C l with horizotal sides Im(s) = λ l ad Im(s) = λ l, where λ l := (2l+1)π, l Z +, ad vertical sides Re(s) = θ ad l 2 22

31 CHAPTER 2. ANALYSIS OF µ(1, ) Re(s) = λ l, where 0 < θ < 1. By elemetary bouds o φ(s) alog C l ad the fact that θ+i θ i φ(s) ds = 0 (2.28) [this is implicit o page 113 of Flaolet ad Sedgewick [8] ad explicitly proved i Appedix A], oe ca show that lim φ(s) ds = 0. l C l Accoutig for residues due to the poles ecircled by C l, we obtai v = ( 1) +1 Res s= 1[φ(s)] + Res s= 2 [φ(s)] + Res s= 2+χk [φ(s)] where k Z\{0} = 1 H ( γ 1) l 2 l 2 2 Σ, (2.29) ( + 1)( + 2) Σ := k Z\{0} ζ(1 χ k )Γ( + 1)Γ(1 χ k ). (2.30) (l 2)Γ( + 3 χ k ) 23

32 CHAPTER 2. ANALYSIS OF µ(1, ) (ii) We have u 2 = t 3 t 2 = t 3 = 1. Hece, from (i), 9 1 u = u 2 + v = = v l 2 ( γ l = 1 9 (H H 2 ) l 2 ( γ l H +2 ( + 1)( + 2) ) ( + 1)( + 2) H +2 ( + 1)( + 2) ) ( ) = 14 9 γ ( γ 3 l 2 H + l 2 1 ) H +2 l 2 ( + 1)( + 2) 1 Σ. Σ Σ (2.31) Here 1 H +2 ( + 1)( + 2) = =3 H +1 = H =4 +1 =4 H H +1 H H (2.32) = H , (2.33) where we assume 3 for (2.32), but (2.33) holds also for = 2. I regard to 1 Σ, ote that Σ = k Z\{0} ζ(1 χ k )Γ(1 χ k ) (l 2)(1 χ k ) [ ] Γ( + 2) Γ( + 1), Γ( + 3 χ k ) Γ( + 2 χ k ) 24

33 CHAPTER 2. ANALYSIS OF µ(1, ) so that Defie 1 Σ = k Z\{0} Σ := ζ(1 χ k )Γ(1 χ k ) (l 2)(1 χ k ) k Z\{0} ζ(1 χ k )Γ(1 χ k ) (l 2)(1 χ k ) The, combiig (2.31), (2.33), ad (2.34), we obtai where u = H + a a := γ 18 l 2 2 l 2 [ Γ( + 1) Γ( + 2 χ k ) Γ(3) ]. (2.34) Γ(4 χ k ) Γ( + 1) Γ( + 2 χ k ). (2.35) ( H +1 γ 1 (l 2)( + 1) + l 2 1 ) Σ, k Z\{0} ζ(1 χ k )Γ(1 χ k ) Γ(4 χ k )(1 χ k ). (2.36) (iii) Closely followig the derivatio of u described above, we obtai (for 2) 1 1 t = t 2 + u = where u 1 = H + a( 2) 1 l 2 =3 = (H 1) + a( 2) 1 2 l 2 ( γ 1 + l ( H γ 1 + l [ H 2 + H (2) 7 2 ) ( H 3 ) ) ( H 3 ) + b Σ, (2.37) 2 b := k Z\{0} Σ := k Z\{0} ] 2ζ(1 χ k )Γ( χ k ) (l 2)(1 χ k )Γ(3 χ k ), (2.38) ζ(1 χ k )Γ( χ k )Γ( + 1) (l 2)(1 χ k )Γ( + 1 χ k ). (2.39) Σ 25

34 CHAPTER 2. ANALYSIS OF µ(1, ) Our aalysis shows that the expected umber of bit comparisos required by QuickMi is asymptotically liear i with the asymptotic slope approximately equal to Hece asymptotically it differs from the expected umber of key comparisos to achieve the same task oly by a costat factor. (The expectatio for key comparisos is asymptotically 2; see Kuth [15] ad Mahmoud et al. [19]). This result is rather cotrastive to the Quicksort case i which (see Fill ad Jaso [5]) the expected umber of bit comparisos is asymptotically (l )(lg ) whereas the expected umber of key comparisos is asymptotically 2 l. 26

35 Chapter 3 Aalysis of µ( m, ) I this chapter, we derive exact ad asymptotic expressios for the expected umber of bit comparisos required by QuickRad; Quickselect is applied to a file of keys ad fids a key of target rak that is chose uiformly radomly from {1, 2,..., }. We will cotiue to use the framework ad otatio established i Chapter Exact computatio of µ( m, ) We average µ(m, ) over m while the parameter is fixed. Usig the otatio defied i (2.3) through (2.7), we have µ( m, ) = 1 = µ(m, ) = 1 β(s, t)p (s, t, m, ) dt ds m=1 0 s 1 β(s, t) 1 P (s, t, m, ) dt ds = µ 1 ( m, ) + µ 2 ( m, ) + µ 3 ( m, ), m=1 1 0 s m=

36 CHAPTER 3. ANALYSIS OF µ( m, ) where, for l = 1, 2, 3, µ l ( m, ) = s β(s, t) 1 P l (s, t, m, ) dt ds. (3.1) m=1 Here µ 1 ( m, ) = µ 3 ( m, ), sice P 3 (1 t, 1 s, m + 1, ) = P 1 (s, t, m, ) by a easy symmetry argumet we omit, ad so µ 3 ( m, ) = = = s s = µ 1 ( m, ). β(s, t) 1 P 3 (s, t, m, ) dt ds m=1 β(1 t, 1 s ) 1 P 3 (1 t, 1 s, m + 1, ) dt ds s m =1 β(s, t ) 1 P 1 (s, t, m, ) dt ds m =1 Therefore µ( m, ) = 2µ 1 ( m, ) + µ 2 ( m, ), (3.2) ad we will compute µ 1 ( m, ) ad µ 2 ( m, ) exactly i Sectios Exact computatio of µ 1 ( m, ) We use the followig lemma i order to compute µ 1 ( m, ) exactly: 28

37 CHAPTER 3. ANALYSIS OF µ( m, ) Lemma β(s, t) 1 P 1 (s, t, m, ) dt ds 0 s m=2 1 ( 1) ( ) 1 = ( 1) 9 1 ( 1) ( ) 1 2 ( + 1)( 1)(1 2 ). ( 1) ( ) =3 B + 1 ( ) 1 1 ( 1)( 2)(1 2 ) Before provig the lemma, we complete the computatio of µ 1 ( m, ). Note that µ 1 ( m, ) = = s β(s, t) 1 = 1 µ(1, ) + 1 s P 1 (s, t, m, ) dt ds m=1 β(s, t) P 1 (s, t, 1, ) dt ds 0 1 s β(s, t) 1 Therefore, by (2.16) ad Lemma 3.1, we obtai s β(s, t) 1 P 1 (s, t, m, ) dt ds m=2 P 1 (s, t, m, ) dt ds. m=2 29

38 CHAPTER 3. ANALYSIS OF µ( m, ) µ 1 ( m, ) = =3 ( 1) ( ) ) ( 1) ( 1 ( 1) B B ( ) ( 1)(1 2 ) ( 1) ( ( 1 1 ( 1)( 2)(1 2 ) ) 1 ( 1) ( ) 1 2 ( + 1)( 1)(1 2 ) ( 1) ( ) 1 1 = 1 4 ( 1)( 2) ( ) B ( 1)(1 2 ) = ( 1) ( ) ( ) B 9 1 ( 1)( 2)(1 2 ) =3 1 ( 1) ( ) 1 2 ( + 1)( 1)(1 2 ), (3.3) where the secod equality holds sice 2 ( 1) ( ) ( 1) ( ) 1 ( 1) ( 1) ( 1)! = 2!( )!( 1) 2 ( 1) ( 1)! ( 1)!( )!( 1)( 2) =3 [ ( 1) ( 1)! 1 = ( 1)!( )!( 1) 1 ] 2 =3 ( 1) ( ) 1 1 = 1 4 ( 1)( 2). =3 I Sectio we combie the expressio for µ 1 ( m, ) i (3.3) with a similar expressio for µ 2 ( m, ) to obtai a exact expressio for µ( m, ). The remaider of this sectio is devoted to provig Lemma 3.1. For this, the followig expressio for P 1 (s, t, m, ) 30 )

39 CHAPTER 3. ANALYSIS OF µ( m, ) will prove useful: Lemma 3.2. Let m 2 ad let x := s, y := t s, z := 1 t. The the quatity P 1 (s, t, m, ) defied at (2.3) satisfies P 1 (s, t, m, ) = 2 x 0 1 (ξ + y) 2 [Υ 1(m,, ξ, x, y, z) Υ 2 (m,, ξ, x, y, z) + Υ 3 (m,, ξ, x, y, z)] dξ, (3.4) where Υ 1 (m,, ξ, x, y, z) := Υ 2 (m,, ξ, x, y, z) := Υ 3 (m,, ξ, x, y, z) := ( ) 1 (x ξ) m 2 ( m)(ξ + y + z) m+1, m 2 ( ) 1 (x ξ) m 2 ( m + 1)z(ξ + y + z) m, m 2 ( ) 1 (x ξ) m 2 z m+1. m 2 Proof of Lemma 3.2. By (2.2) (2.3), P 1 (s, t, m, ) = = = m i< m i< 2! ( m 1)! 2! m + 1 (i 1)!( i 1)!( )! xi 1 y i 1 z ( ) 2! m 1 m + 1 ( m 1)! i m, i 1, m i< 1 m + 1 ( (i m)! (i 1)! xi 1 y i 1 z ) m 1 i m, i 1, (i m)! (i 1)! xi 1 y i 1 z. (3.5) 31

40 CHAPTER 3. ANALYSIS OF µ( m, ) I order to compactly describe the derivatio of (3.4), we defie the followig idefiite itegratio operator T : T (f(x)) := x 0 f(ξ) dξ. We really should write (T f)(x) rather tha T (f(x)), but we would like to use shorthad such as T (x ) = x+1 +1 whe > 1. The operator T treats its argumet f as a fuctio of x; the other variables ivolved i f (amely, y ad z) are treated as costats. The otatio T l will deote the l-th iterate of T. I this otatio, for m < i, ad the sum i (3.5) equals Here so T m 1 ( m i< (i m)! (i 1)! xi 1 = T m 1 (x i m ), ( ) ) 1 m 1 x i m y i 1 z. m + 1 i m, i 1, 1 m + 1 z = z m+1 z η ( m+1) 1 dη, ( ( ) ) T m 1 1 m 1 x i m y i 1 z m + 1 i m, i 1, m i< ( [ ( ) ] ) = z m+1 T m 1 m 1 x i m y i 1 η +m 2 dη z i m, i 1, m i< ( ) = z m+1 T m 1 η +m 2 (x + y + η) m 1 dη z ( ( ) ) m 1 = z m+1 T m 1 t η 3 η + 1 dη (3.6) z 32

41 CHAPTER 3. ANALYSIS OF µ( m, ) (ote that x + y = t). Makig the chage of variables v = t + 1 ad itegratig, we obtai, η after some computatio, z η 3 ( t η + 1 ) m 1 dη = [ ( 1 ( m) 1 + t ) m+1 t 2 ( m + 1)( m) z ( ( m + 1) 1 + t ) ] m + 1. z (3.7) From (3.5) ad (3.6) (3.7), P 1 (s, t, m, ) = 2! ( m + 1)! T m 1 ( t 2 [ ( m)(z + t) m+1 ( m + 1)z(z + t) m + z m+1]). (3.8) Here t 2 [( m)(z + t) m+1 ( m + 1)z(z + t) m + z m+1 ] where = m+1 r=2 t r 2 Υ(m,, r, z), (3.9) ( ) ( ) m + 1 m Υ(m,, r, z) := ( m) z m+1 r ( m + 1) z m+1 r. r r (3.10) The, sice t = x + y, m+1 r=2 t r 2 Υ(m,, r, z) = m+1 r=2 r 2 ( r 2 Υ(m,, r, z) =0 ) x y r 2. (3.11) 33

42 CHAPTER 3. ANALYSIS OF µ( m, ) From (3.8) (3.11), P 1 (s, t, m, ) = = = 2! ( m + 1)! T m 1 m+1 2! ( m + 1)! r=2 m+1 2! ( m + 1)! r=2 ( m+1 r 2 ( ) r 2 Υ(m,, r, z) )x y r 2 r=2 =0 r 2 ( ) r 2 Υ(m,, r, z) y r 2 T m 1 (x ) =0 r 2 ( r 2 Υ(m,, r, z) =0 )y r 2 x +m 1 ( + 1) ( + m 1). (3.12) Because of the partial fractio expasio it follows that m 2 1 ( + 1) ( + m 1) = 1 (m 2)! l=0 ( 1) l( ) m 2 l + l + 1, r 2 ( r 2 )y r 2 x +m 1 ( + 1) ( + m 1) =0 r 2 ( m 2 r 2 r 2 x+m 1 ( 1) = )y l( ) m 2 l (m 2)! + l + 1 =0 l=0 m 2 1 ( m 2 x r 2 ( ) r 2 = ( 1) )x l m 2 l ξ l y r 2 ξ dξ (m 2)! l l=0 0 =0 m 2 1 ( m 2 x = ( 1) )x l m 2 l ξ l (ξ + y) r 2 dξ (m 2)! l = 1 (m 2)! l=0 x 0 0 (x ξ) m 2 (ξ + y) r 2 dξ. (3.13) 34

43 CHAPTER 3. ANALYSIS OF µ( m, ) From (3.12) (3.13), 2! P 1 (s, t, m, ) = ( m + 1)!(m 2)! ( ) 1 x = 2 m 2 0 r=2 ( ) 1 x = 2 m 2 Here, by (3.10), 0 m+1 m+1 r=2 (x ξ) m 2 (ξ + y) 2 Υ(m,, r, z) x 0 (x ξ) m 2 (ξ + y) r 2 dξ Υ(m,, r, z)(x ξ) m 2 (ξ + y) r 2 dξ m+1 r=2 Υ(m,, r, z)(ξ + y) r dξ. (3.14) m+1 r=2 = Υ(m,, r, z)(ξ + y) r m+1 r=2 = ( m) [ ( m) m+1 r=2 ( m + 1 r ( m + 1 r (ξ + y) r ) ( ] m z m+1 r ( m + 1) )z m+1 r r ) (ξ + y) r z m+1 r ( m + 1) m+1 r=2 ( m r ) (ξ + y) r z m+1 r = ( m)[(ξ + y + z) m+1 z m+1 ( m + 1)(ξ + y)z m ] ( m + 1)z[(ξ + y + z) m z m ( m)(ξ + y)z m 1 ] = ( m)(ξ + y + z) m+1 ( m + 1)z(ξ + y + z) m + z m+1. (3.15) Substitutio of (3.15) ito (3.14) gives the desired (3.4). Proof of Lemma 3.1. From Lemma 3.2, we have 1 m=2 x 1 P 1 (s, t, m, ) = 2 (ξ + y) 2 0 [Υ 1 (m,, ξ, x, y, z) m=2 Υ 2 (m,, ξ, x, y, z) + Υ 3 (m,, ξ, x, y, z)] dξ. (3.16) 35

44 CHAPTER 3. ANALYSIS OF µ( m, ) Here Υ 1 (m,, ξ, x, y, z) m=2 [ ( ) ] = (ξ + y + z) 2 d 1 (x ξ) m 2 w m dw m 2 m=2 w=ξ+y+z = (ξ + y + z) 2 d { w 1 [(x ξ + w) 1 (x ξ) 1 ] } dw w=ξ+y+z = (ξ + y + z) 2 { w 2 [(x ξ + w) 1 (x ξ) 1 ] = (x ξ) ( 1)(ξ + y + z) +w 1 ( 1)(x ξ + w) 2} w=ξ+y+z (ote that x + y + z = 1). Similarly, Υ 2 (m,, ξ, x, y, z) = z m=2 = z d dw [ d dw m=2 ( ) ] 1 (x ξ) m 2 w m+1 m 2 w=ξ+y+z [ (x ξ + w) 1 (x ξ) 1] w=ξ+y+z = z [ ( 1)(x ξ + w) 2] w=ξ+y+z = z( 1), ad Υ 3 (m,, ξ, x, y, z) = m=2 m=2 ( ) 1 (x ξ) m 2 z m+1 m 2 = (x ξ + z) 1 (x ξ) 1. Hece [Υ 1 (m,, ξ, x, y, z) Υ 2 (m,, ξ, x, y, z) + Υ 3 (m,, ξ, x, y, z)] m=2 = ( 1)(ξ + y) 1 + (x ξ + z) 1. (3.17) 36

45 CHAPTER 3. ANALYSIS OF µ( m, ) Therefore, from (3.16) ad (3.17), we obtai 1 P 1 (s, t, m, ) m=2 = 2 = 2 = 2 x 0 x 0 x 0 1 (ξ + y) [( 1)(ξ + y) 1 + (x ξ + 2 z) 1 ] dξ 1 (ξ + y) {( 1)(ξ + y) 1 + [1 (ξ + 2 y)] 1 } dξ 1 1 ( ) 1 ( 1) (ξ + y) dξ (ξ + y) 2 = 1 ( ) 1 x 2 ( 1) (ξ + y) 2 dξ 0 = 1 ( ) 1 (x + y) 2 ( 1) y 1 1 = 1 ( ) 1 t 2 ( 1) (t s) 1. 1 (3.18) We complete the proof by usig (3.18) to compute We have s = 2 = s β(s, t) s s β(s, t) 1 P 1 (s, t, m, ) ds dt. m=2 P 1 (s, t, m, ) ds dt m=2 β(s, t) β(s, t) s β(s, t) 1 ( ) 1 t ( 1) 1 (t s) 1 dt ds 1 1 ( ) 1 t ( 1) 1 dt ds 1 1 ( ) 1 (t s) ( 1) 1 dt ds. (3.19) 1 37

46 CHAPTER 3. ANALYSIS OF µ( m, ) Closely followig the derivatios show i (2.11) (2.16), oe ca show that = s 1 ( ) 1 t β(s, t) ( 1) 1 dt ds 1 ( 1) ( ) ( 1) ( ) 1 1 ( 1) =3 B + 1 ( ) 1 1 ( 1)( 2)(1 2 ). (3.20) Thus, i order to complete the proof, it remais to show that s β(s, t) 1 ( ) 1 (t s) ( 1) 1 1 dt ds = 1 ( 1) ( ) 1 ( + 1)( 1)(1 2 ). (3.21) Ideed, we have = = = s β(s, t) 1 ( ) 1 (t s) ( 1) (k+1) (k + 1)2 k k=0 2 (k+1) (k + 1)2 k k=0 k= k 1 2 (k+1) 2 k s 1 2 (k+1) s 1 ( 1 (k + 1)2 k ( 1) dt ds ( 1) ( 1 ) 2 k 0 ( 1) ( 1 v 1 1 ) (t s) 1 dt ds 1 ) v 1 dv ds 1 (2 k v) V 2 (k+1) [2 (k+1) v] W 0 ds dv. (3.22) Here (2 k v) V 2 (k+1) [2 (k+1) v] W 0 v if 0 v 2 (k+1) ds = 2 k v if 2 (k+1) < v 2 k. 38

47 CHAPTER 3. ANALYSIS OF µ( m, ) Thus 2 k 0 v 1 1 = 1 1 (2 k v) V 2 (k+1) [2 (k+1) v] W 0 ds dv [ 2 (k+1) v dv k 2 (k+1) v 1 (2 k v) dv = 2 k(+1) (1 2 ) ( + 1)( 1). (3.23) ] From (3.22) ad (3.23), we obtai = = = = ad (3.21) is proved. s β(s, t) k=0 1 ( ) 1 (t s) ( 1) 1 1 dt ds 1 ( ) 1 2 (k + 1)2 k ( 1) k(+1) (1 2 ) ( + 1)( 1) 1 ( 1 ( 1) ) 1 2 ( + 1)( 1) (k + 1)2 k 1 ( ) 1 ( 1) ( + 1)( 1) (1 2 ) 2 1 ( 1) ( ) 1 ( + 1)( 1)(1 2 ), (3.24) k= Exact computatio of µ 2 ( m, ) ad µ( m, ) The derivatios for obtaiig a computatioally preferable exact expressio for µ 2 ( m, ) are etirely aalogous to those for µ 1 ( m, ) described i the previous sectio (Sectio 3.1.1). Thus we omit details. As described i Sectio 2.2, P 2 (s, t, m, ) is zero 39

48 CHAPTER 3. ANALYSIS OF µ( m, ) for m = 1 ad for m =, so, from (3.1), µ 2 ( m, ) = s β(s, t) 1 1 m=2 P 2 (s, t, m, ) dt ds. (3.25) Therefore we first derive a computatioally desirable expressio for 1 Agai, let x := s, y := t s, z := 1 t. The 1 1 P 2 (s, t, m, ) m=2 = 1 1 = 1 m=2 1 i m< 1 m=2 ( 2 i + 1 S 1 (m,, x, y, z) 1 i 1, 1, i 1, 1, 1 m=2 S 2 (m,, x, y, z) 1 1 m=2 P 2(s, t, m, ). ) x i 1 y i 1 z 1 m=2 S 3 (m,, x, y, z), (3.26) where S 1 (m,, x, y, z) := S 2 (m,, x, y, z) := S 3 (m,, x, y, z) := 1 i< m i< 1 i< m ( ) 2 x i 1 y i 1 z, i + 1 i 1, 1, i 1, 1, ( ) 2 x i 1 y i 1 z, i + 1 i 1, 1, i 1, 1, 2 i + 1 ( i 1, 1, i 1, 1, ) x i 1 y i 1 z. Fill ad Jaso [5] showed that S 1 (m,, x, y, z) = 2 ( 1)( ) (t s) 2. Hece 1 1 S 1 (m,, x, y, z) = m=2 2( 2) ( ) ( 1) (t s) 2. (3.27) 40

49 CHAPTER 3. ANALYSIS OF µ( m, ) Followig the derivatios show i (3.5) through (3.18), oe ca show that 1 1 S 2 (m,, x, y, z) = 2y 2 x[(x + z) y( 1)] (3.28) m=2 To obtai a similar expressio for 1 = 2(t s) 2 s{[1 (t s)] (t s)( 1)} 1 ( ) 1 = 2s ( 1) (t s) 2. (3.29) + 1 m, i := + 1, := + 1 i, 1 m=2 S 3(m,, x, y, z), we ote that, lettig m := S 3 (m,, x, y, z) = m i < ( ) 2 i + 1, 1, i 1, 1, i 1 = S 2 ( + 1 m,, z, y, x). x y i 1 z i 1 Thus 1 1 S 3 (m,, x, y, z) = 1 m=2 Ispectig (3.28) (3.30), we fid 1 1 S 3 (m,, x, y, z) = 2(1 t) m=2 1 m=2 1 S 2 ( + 1 m,, z, y, x) = 1 S 2 (m,, z, y, x). (3.30) m=2 1 ( 1) ( 1 ) (t s) 2. (3.31) 41

50 CHAPTER 3. ANALYSIS OF µ( m, ) From (3.26), (3.27), (3.29), ad (3.31), 1 1 P 2 (s, t, m, ) m=1 2( 2) ( ) 1 ( ) 1 = ( 1) (t s) 2 2s ( 1) (t s) 2 1 ( ) 1 2(1 t) ( 1) (t s) 2 2( 2) ( ) 1 ( ) 1 = ( 1) (t s) 2 2 ( 1) (t s) 2 1 ( ) 1 +2 ( 1) (t s) 1. (3.32) Hece, from (3.25) ad (3.32), µ 2 ( m, ) = 2( 2) 2 +2 Fill ad Jaso [5] showed that s β(s, t) s s ( ) β(s, t) ( 1) (t s) 2 dt ds 0 s 1 ( ) 1 β(s, t) ( 1) (t s) 2 dt ds 1 ( ) 1 β(s, t) ( 1) (t s) 1 dt ds. (3.33) 1 1 ( ) ( 1) (t s) 2 dt ds = ( 1) ( ) ( 1)[1 2 ( 1) ]. (3.34) A careful term-by-term ispectio of the derivatios show i (3.22) (3.24) reveals that ( ) 1 1 ( 1) ( ) 1 β(s, t) ( 1) (t s) 2 dt ds = ( 1)[1 2 ( 1) ], 0 s s 1 β(s, t) ( 1) ( 1 ) (t s) 1 dt ds = 1 ( 1) ( ) 1 (3.35) ( + 1)(1 2 ). (3.36) 42

51 CHAPTER 3. ANALYSIS OF µ( m, ) Combiig (3.33) (3.36), we obtai µ 2 ( m, ) = 2( 2) 2 =0 ( 1) ( ) +2 ( + 1)( + 2)[1 2 (+1) ] 2 ( 1) ( ) ( 1)[1 2 ( 1) ] +2( 1) = 4 ( 1) ( ) + 2( 1). ( 1)[1 2 ( 1) ] (3.37) Fially, we complete the exact computatio of µ( m, ). From (3.2), (3.3), ad (3.37), we have µ( m, ) = 2µ 1 ( m, ) + µ 2 ( m, ) ( 1) ( ) 1 1 = 2( 1) 8 ( 1)( 2) ( ) B ( 1)(1 2 ) = ( 1) ( ) ( ) B 9 1 ( 1)( 2)(1 2 ) =3 1 ( 1) ( ) 1 4 ( + 1)( 1)(1 2 ) 4 ( 1) ( ) ( 1)[1 2 ( 1) ] +2( 1). (3.38) We rewrite or combie some of the terms i (3.38) for the asymptotic aalysis of µ( m, ) described i the ext sectio. We defie F 1 () := F 2 () := F 3 () := =3 1 1 ( 1) ( ) ( 1)( 2), B (1 2 ) ( 1) ( ) 1, 1 [ ( ) 1 1 ], 43

52 CHAPTER 3. ANALYSIS OF µ( m, ) F 4 () := F 5 () := 1 =3 B [ ( 1 1 ) 1 ( 1)(1 2 ) 2 ( 1) ( ) ( 1)( 2)[1 2 ( 1) ]. =3 1 ], The secod, third, fourth, ad fifth terms i (3.38) ca be writte as 8 F 1(), 4 F 2(), 4 F 9 3(), ad 4F 4 (), respectively. The last three terms i (3.38) ca be combied as follows: 1 ( 1) ( ) 1 4 ( + 1)( 1)(1 2 ) 4 ( 1) ( ) + 2( 1) ( 1)[1 2 ( 1) ] = 4 ( 1) ( ) ( 1)( 2)[1 2 ( 1) ] 4 ( 1) ( ) + 2( 1) ( 1)[1 2 ( 1) ] =3 = 8 ( 1) ( ) ( 1)( 2)[1 2 ( 1) ] = 8 F 5(). Therefore =3 µ( m, ) = 2( 1) 8 F 1() + 4 F 2() F 3() 4F 4 () + 8 F 5(). (3.39) 3.2 Asymptotic aalysis of µ( m, ) We derive a asymptotic expressio for µ( m, ) show i (3.39). The computatios described i this sectio are aalogous to those i Sectio 2.3. Hece we merely sketch details to derive the asymptotic expressio. First, we aalyze F 1 (). A routie complexaalytical argumet similar to (but much easier tha) the oe described i Sectio 2.3 shows 44

53 CHAPTER 3. ANALYSIS OF µ( m, ) that 2 [ ] F 1 () = ( 1) +1! Res s=k s(s 1) 2 (s 2) 2 (s 3) (s ) k=0 = ( 1) +1 [ ( 1) 2 + ( 1) H 1 + ( 1) ( 1) 2 ( H = 1 2 ( 1)H ( 1) H = 1 ( l + 4 γ ) 2 2 l + (γ + 1) + O(1). 2 2( 1) )] (3.40) Sice F 2 () is equal to t, which is defied at (2.17) ad aalyzed i Sectio 2.3, we already have a asymptotic expressio for F 2 (). Next we derive a asymptotic expressio for F 3 (): 1 { } F 3 () = ( 1) ( 1)! Res s=k s(s 1) 2 (s 2) [s ( 1)] k=0 = H 2 H = l + (γ 1) l + O(1). (3.41) To obtai a asymptotic expressio for F 4 (), we closely follow the approach of Sectio 2.3. Let ũ := F 4 ( + 1) F 4 (). The ũ = =3 B ( 1)( 2)(1 2 ) [( ) ] Let ṽ := ũ +1 ũ. The, by computatios similar to those performed for v i Sec- 45

54 CHAPTER 3. ANALYSIS OF µ( m, ) tio 2.3, 2 ( ) ṽ = ( 1) k ζ( 2 k) 1 (k + 2)(k + 1)[1 2 (k+3) ] k k=0 3 { } = ( 1) +1 ζ( 2 s) ( 1)! Res s= k (s + 2)(s + 1)[1 2 (s+3) ] s(s 1) [s ( 1)] k=1 { +( 1) +1 ζ( 2 s) Res s= 3+χk (s + 2)(s + 1)[1 2 (s+3) ] k Z\{0} } ( 1)! s(s 1) [s ( 1)] = 1 [ 9 1 ( + 1) 1 γ ( + 1)( + 2) l H ] +2 ξ, + 2 where Hece 1 ũ = ũ 2 + ṽ ξ := k Z\{0} = 1 9 H 1 + ã + ξ 1 2 l 2 ζ(1 χ k )Γ(1 χ k )Γ(). (l 2)Γ( + 3 χ k ) ( H H ) l 2 2γ l 2 1 ( + 1), where ã := ξ := 7 36 l γ 12 l 2 k Z\{0} k Z\{0} ζ(1 χ k )Γ(1 χ k )Γ() (l 2)(2 χ k )Γ( + 2 χ k ). ζ(1 χ k )Γ(1 χ k ) (l 2)(2 χ k )Γ(4 χ k ), 46

55 CHAPTER 3. ANALYSIS OF µ( m, ) Thus where Therefore 1 F 4 () = F 4 (2) + ũ = 1 9 H H 1 + ( ã 1 ) l l 2 2γ 8 l 2 2ã + b ξ + 1 H 3 + l 2 2γ l 2 4 l 2, (3.42) b := k Z\{0} ξ := k Z\{0} ζ(1 χ k )Γ(1 χ k ) (l 2)(2 χ k )(1 χ k )Γ(3 χ k ), ζ(1 χ k )Γ(1 χ k )Γ() (l 2)(2 χ k )(1 χ k )Γ( + 1 χ k ). F 4 () = 1 ( 9 l + ã γ 1 ) + 8 l + O(1). (3.43) 9 9 Fially, we aalyze F 5 (). Let G (s) :=! [1 2 (s 1) ]s 2 (s 1) 2 (s 2) 2 (s 3) (s ). The, by computatios that are etirely aalogous to those performed for F 1 (), F 2 (), 47

56 CHAPTER 3. ANALYSIS OF µ( m, ) ad F 4 (), 2 F 5 () = ( 1) +1 Res s=k G (s) + ( 1) +1 k Z\{0} k=0 k Z\{0} Res s=1+χk G (s) = 1 4 (2H ( 1) l 2) (H 2 l 2 3) 2 [ ( l 2 (H 1) ) H l 2 2 l 2 H(2) l 2 + l ] 2 + Γ( 1 χ k )Γ( + 1) (l 2)χ k (χ 2 k 1)Γ( χ k) = l l 2 γ l 2 (l )2 + ( 1 l 2 1 ) l + O(). 2 (3.44) Therefore, from (3.39) (3.41) ad (3.43) (3.44), we obtai the followig asymptotic formula for µ( m, ): µ( m, ) = 4(1 + l 2 ã) 4 ( ) 2 l 2 (l )2 + 4 l 2 1 l + O(1). (3.45) The asymptotic slope 4(1 + l 2 ã) is approximately Thus the expected umber of bit comparisos required by QuickRad remais asymptotically liear i. As i the QuickMi case, the expectatio is asymptotically differet from that for key comparisos oly by a costat factor. (The expected umber of key comparisos required by QuickRad is asymptotically 3; see Mahmoud et al. [19].) 48

57 Chapter 4 Derivatio of a closed formula for µ(m, ) The exact expressio for µ(m, ) obtaied i Sectio 2.1 [see (2.8)] ivolves ifiite summatio ad itegratio. Hece it is ot a preferable form for umerically computig the expectatio. I this chapter, we establish aother exact expressio for µ(m, ) that oly ivolves fiite summatio. We also use the formula to compute µ(m, ) for m = 1,...,, = 2,..., 20. As described i Sectio 2.1, it follows from equatios (2.6) (2.8) that µ(m, ) = µ 1 (m, ) + µ 2 (m, ) + µ 3 (m, ), (4.1) where, for q = 1, 2, 3, µ q (m, ) := k=0 2 k l=1 (l 1 2 )2 k (l 1)2 k l2 k (l 1 2 )2 k (k + 1)P q (s, t, m, ) dt ds. (4.2) 49

58 CHAPTER 4. CLOSED FORMULA FOR µ(m, ) The same techique ca be applied to elimiate the ifiite summatio ad itegratio from each µ q (m, ). We describe the techique for obtaiig a closed expressio of µ 1 (m, ) i detail. First, we trasform P 1 (s, t, m, ) show i (2.3) so that we ca elimiate the itegratio i µ 1 (m, ). Defie ( 2 C 1 (i, ) := 1(1 m i < ) m + 1 i 1, 1, i 1, 1, ), (4.3) where 1(1 m i < ) is a idicator fuctio that equals 1 if the evet i braces holds ad 0 otherwise. Sice s i 1 (t s) i 1 (1 t) i 1 = s i 1 it follows that u=0 ( i 1 ( )t u ( 1) i 1 u s i 1 u u v v=0 ) ( 1) v t v, where P 1 (s, t, m, ) = m i< = = m i< 2 f=m 1 C 1 (i, ) C 1 (i, ) f 2 h=0 f+1 C 2 (f, h) := i 1 u=0 2 ( )( i 1 u v v=0 f 2 f=i 1 h= f 2 ( )( i 1 s f t h f i + 1 ) s u 2 t v+u ( 1) i u v 1 h + f + 2 ) ( 1) h i +1 s f t h C 2 (f, h), (4.4) f+h+2 i=m =f+2 ( )( i 1 C 1 (i, ) f i h + f + 2 ) ( 1) h i +1.

59 CHAPTER 4. CLOSED FORMULA FOR µ(m, ) Thus, from (4.2) ad (4.4), we ca elimiate the itegratio i µ 1 (m, ) ad express it usig polyomials i l: µ 1 (m, ) = 2 f=m 1 f 2 h=0 C 3 (f, h) (k + 1) k=0 2 k l=1 2 k(f+h+2) [l h+1 (l 1 2 )h+1 ] [(l 1 2 )f+1 (l 1) f+1 ], (4.5) where C 3 (f, h) := 1 ( + 1)(f + 1) C 2(f, h). Note that Hece [ l h+1 ( l 1 2) h+1 = ( l 1 2) f+1 (l 1) f+1 = l h+1 = h ( ( h + 1 )l 1 h+1, 2) f ( [ f + 1 )l ( 1) f+1 1 =0 =0 ( l 1 ) ] [ h+1 ( l f h ( )( ) f + 1 h + 1 ( 1) f+h =0 =0 which ca be rearraged to where f+h+1 =1 C 4 (f, h, ) := ( 1) f+h +1 ( 1 2 ) f+1 (l 1) f+1 ] [ 1 ( ) ] f ( ) ] f+1 ( ) h l +, 2 2 C 4 (f, h, )l 1, (4.6) ) h +2 ( 1) V f [ 1 51 =0 W ( 1 h) ( )( f + 1 h + 1 ( ) ] f+1 ( ). 1 )

60 CHAPTER 4. CLOSED FORMULA FOR µ(m, ) Therefore, from (4.5) (4.6), we obtai µ 1 (m, ) = = 2 f=m 1 2 f=m 1 f 2 h=0 f 2 h=0 C 3 (f, h) f+h+1 =1 (k + 1) k=0 C 5 (f, h, ) 2 k l=1 (k + 1)2 k=0 f+h+1 2 k(f+h+2) =1 k(f+h+2) 2k C 4 (f, h, )l 1 l 1, l=1 where C 5 (f, h, ) := C 3 (f, h) C 4 (f, h, ). Here, as described i Sectio 2.2, 2 k 1 l 1 = a,r 2 k( r), l=1 r=0 where a,r is defied by (2.12). Now defie C 6 (f, h,, r) := a,r C 5 (f, h, ). The µ 1 (m, ) = = = 2 f=m 1 2 f=m 1 f 2 h=0 f 2 h=0 f+h+1 =1 f+h+1 =1 1 a,r C 5 (f, h, ) (k + 1)2 k(f+h+2+r ) r=0 k=0 1 C 6 (f, h,, r)[1 2 (f+h+2+r ) ] 2 r=0 1 C 7 (a)(1 2 a ) 2, (4.7) a=1 where C 7 (a) := 2 f=m 1 f 2 h=α f+h+1 =β C 6 (f, h,, a + (f + h + 2)), i which α := 0 (a f 1) ad β := 1 (f + h + 2 a). The procedure described above ca be applied to derive aalogous exact formulae 52

61 CHAPTER 4. CLOSED FORMULA FOR µ(m, ) for µ 2 (m, ) ad µ 3 (m, ). I order to derive the aalogous exact formula for µ 2 (m, ), oe eed oly start the derivatio by chagig the idicator fuctio i C 1 (i, ) [see (4.3)] to 1(1 i < m < ) ad follow each step of the procedure; for µ 3 (m, ), start the derivatio by chagig the idicator fuctio to 1(1 i < m ). Expectatio of bit comparisos μ(m,) m Figure 4.1: Expected umber of bit comparisos for Quickselect. The closed formulae for µ 1 (m, ), µ 2 (m, ), ad µ 3 (m, ) were used to compute µ(m, ) for = 1, 2,..., 20 ( represets the umber of keys) ad m = 1, 2,..., (m represets the rak of the target key). 53

Analysis of the Expected Number of Bit Comparisons Required by Quickselect

Analysis of the Expected Number of Bit Comparisons Required by Quickselect Aalysis of the Expected Number of Bit Comparisos Required by Quickselect James Alle Fill Takéhiko Nakama Abstract Whe algorithms for sortig ad searchig are applied to keys that are represeted as bit strigs,

More information

MAT1026 Calculus II Basic Convergence Tests for Series

MAT1026 Calculus II Basic Convergence Tests for Series MAT026 Calculus II Basic Covergece Tests for Series Egi MERMUT 202.03.08 Dokuz Eylül Uiversity Faculty of Sciece Departmet of Mathematics İzmir/TURKEY Cotets Mootoe Covergece Theorem 2 2 Series of Real

More information

CHAPTER 10 INFINITE SEQUENCES AND SERIES

CHAPTER 10 INFINITE SEQUENCES AND SERIES CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

6.3 Testing Series With Positive Terms

6.3 Testing Series With Positive Terms 6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial

More information

The Riemann Zeta Function

The Riemann Zeta Function Physics 6A Witer 6 The Riema Zeta Fuctio I this ote, I will sketch some of the mai properties of the Riema zeta fuctio, ζ(x). For x >, we defie ζ(x) =, x >. () x = For x, this sum diverges. However, we

More information

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + 62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of

More information

Convergence of random variables. (telegram style notes) P.J.C. Spreij

Convergence of random variables. (telegram style notes) P.J.C. Spreij Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space

More information

The Gamma function Michael Taylor. Abstract. This material is excerpted from 18 and Appendix J of [T].

The Gamma function Michael Taylor. Abstract. This material is excerpted from 18 and Appendix J of [T]. The Gamma fuctio Michael Taylor Abstract. This material is excerpted from 8 ad Appedix J of [T]. The Gamma fuctio has bee previewed i 5.7 5.8, arisig i the computatio of a atural Laplace trasform: 8. ft

More information

3. Z Transform. Recall that the Fourier transform (FT) of a DT signal xn [ ] is ( ) [ ] = In order for the FT to exist in the finite magnitude sense,

3. Z Transform. Recall that the Fourier transform (FT) of a DT signal xn [ ] is ( ) [ ] = In order for the FT to exist in the finite magnitude sense, 3. Z Trasform Referece: Etire Chapter 3 of text. Recall that the Fourier trasform (FT) of a DT sigal x [ ] is ω ( ) [ ] X e = j jω k = xe I order for the FT to exist i the fiite magitude sese, S = x [

More information

Sequences. Notation. Convergence of a Sequence

Sequences. Notation. Convergence of a Sequence Sequeces A sequece is essetially just a list. Defiitio (Sequece of Real Numbers). A sequece of real umbers is a fuctio Z (, ) R for some real umber. Do t let the descriptio of the domai cofuse you; it

More information

Chapter 10: Power Series

Chapter 10: Power Series Chapter : Power Series 57 Chapter Overview: Power Series The reaso series are part of a Calculus course is that there are fuctios which caot be itegrated. All power series, though, ca be itegrated because

More information

Random Walks on Discrete and Continuous Circles. by Jeffrey S. Rosenthal School of Mathematics, University of Minnesota, Minneapolis, MN, U.S.A.

Random Walks on Discrete and Continuous Circles. by Jeffrey S. Rosenthal School of Mathematics, University of Minnesota, Minneapolis, MN, U.S.A. Radom Walks o Discrete ad Cotiuous Circles by Jeffrey S. Rosethal School of Mathematics, Uiversity of Miesota, Mieapolis, MN, U.S.A. 55455 (Appeared i Joural of Applied Probability 30 (1993), 780 789.)

More information

Bernoulli numbers and the Euler-Maclaurin summation formula

Bernoulli numbers and the Euler-Maclaurin summation formula Physics 6A Witer 006 Beroulli umbers ad the Euler-Maclauri summatio formula I this ote, I shall motivate the origi of the Euler-Maclauri summatio formula. I will also explai why the coefficiets o the right

More information

CS / MCS 401 Homework 3 grader solutions

CS / MCS 401 Homework 3 grader solutions CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of

More information

Chapter 8. Euler s Gamma function

Chapter 8. Euler s Gamma function Chapter 8 Euler s Gamma fuctio The Gamma fuctio plays a importat role i the fuctioal equatio for ζ(s that we will derive i the ext chapter. I the preset chapter we have collected some properties of the

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i

More information

Quantum Computing Lecture 7. Quantum Factoring

Quantum Computing Lecture 7. Quantum Factoring Quatum Computig Lecture 7 Quatum Factorig Maris Ozols Quatum factorig A polyomial time quatum algorithm for factorig umbers was published by Peter Shor i 1994. Polyomial time meas that the umber of gates

More information

The natural exponential function

The natural exponential function The atural expoetial fuctio Attila Máté Brookly College of the City Uiversity of New York December, 205 Cotets The atural expoetial fuctio for real x. Beroulli s iequality.....................................2

More information

INFINITE SEQUENCES AND SERIES

INFINITE SEQUENCES AND SERIES 11 INFINITE SEQUENCES AND SERIES INFINITE SEQUENCES AND SERIES 11.4 The Compariso Tests I this sectio, we will lear: How to fid the value of a series by comparig it with a kow series. COMPARISON TESTS

More information

DISTRIBUTIONAL CONVERGENCE FOR THE NUMBER OF SYMBOL COMPARISONS USED BY QUICKSELECT (DRAFT, NOT FOR DISTRIBUTION) Abstract

DISTRIBUTIONAL CONVERGENCE FOR THE NUMBER OF SYMBOL COMPARISONS USED BY QUICKSELECT (DRAFT, NOT FOR DISTRIBUTION) Abstract DISTRIBUTIONAL CONVERGENCE FOR THE NUMBER OF SYMBOL COMPARISONS USED BY QUICKSELECT (DRAFT, NOT FOR DISTRIBUTION) JAMES ALLEN FILL TAKÉ NAKAMA Abstract Whe the search algorithm QuickSelect compares keys

More information

Analysis of the Expected Number of Bit Comparisons Required by Quickselect

Analysis of the Expected Number of Bit Comparisons Required by Quickselect Aalyi of the Expected Number of Bit Compario Required by Quickelect Jame Alle Fill Departmet of Applied Mathematic ad Statitic The Joh Hopki Uiverity imfill@hu.edu ad http://www.am.hu.edu/~fill/ ad Takéhiko

More information

Ma 530 Introduction to Power Series

Ma 530 Introduction to Power Series Ma 530 Itroductio to Power Series Please ote that there is material o power series at Visual Calculus. Some of this material was used as part of the presetatio of the topics that follow. What is a Power

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

TR/46 OCTOBER THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION A. TALBOT

TR/46 OCTOBER THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION A. TALBOT TR/46 OCTOBER 974 THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION by A. TALBOT .. Itroductio. A problem i approximatio theory o which I have recetly worked [] required for its solutio a proof that the

More information

x a x a Lecture 2 Series (See Chapter 1 in Boas)

x a x a Lecture 2 Series (See Chapter 1 in Boas) Lecture Series (See Chapter i Boas) A basic ad very powerful (if pedestria, recall we are lazy AD smart) way to solve ay differetial (or itegral) equatio is via a series expasio of the correspodig solutio

More information

Appendix to Quicksort Asymptotics

Appendix to Quicksort Asymptotics Appedix to Quicksort Asymptotics James Alle Fill Departmet of Mathematical Scieces The Johs Hopkis Uiversity jimfill@jhu.edu ad http://www.mts.jhu.edu/~fill/ ad Svate Jaso Departmet of Mathematics Uppsala

More information

Math 113 Exam 3 Practice

Math 113 Exam 3 Practice Math Exam Practice Exam will cover.-.9. This sheet has three sectios. The first sectio will remid you about techiques ad formulas that you should kow. The secod gives a umber of practice questios for you

More information

ECE-S352 Introduction to Digital Signal Processing Lecture 3A Direct Solution of Difference Equations

ECE-S352 Introduction to Digital Signal Processing Lecture 3A Direct Solution of Difference Equations ECE-S352 Itroductio to Digital Sigal Processig Lecture 3A Direct Solutio of Differece Equatios Discrete Time Systems Described by Differece Equatios Uit impulse (sample) respose h() of a DT system allows

More information

Chapter 8. Euler s Gamma function

Chapter 8. Euler s Gamma function Chapter 8 Euler s Gamma fuctio The Gamma fuctio plays a importat role i the fuctioal equatio for ζ(s) that we will derive i the ext chapter. I the preset chapter we have collected some properties of the

More information

ENGI Series Page 6-01

ENGI Series Page 6-01 ENGI 3425 6 Series Page 6-01 6. Series Cotets: 6.01 Sequeces; geeral term, limits, covergece 6.02 Series; summatio otatio, covergece, divergece test 6.03 Stadard Series; telescopig series, geometric series,

More information

Sequences of Definite Integrals, Factorials and Double Factorials

Sequences of Definite Integrals, Factorials and Double Factorials 47 6 Joural of Iteger Sequeces, Vol. 8 (5), Article 5.4.6 Sequeces of Defiite Itegrals, Factorials ad Double Factorials Thierry Daa-Picard Departmet of Applied Mathematics Jerusalem College of Techology

More information

The z-transform. 7.1 Introduction. 7.2 The z-transform Derivation of the z-transform: x[n] = z n LTI system, h[n] z = re j

The z-transform. 7.1 Introduction. 7.2 The z-transform Derivation of the z-transform: x[n] = z n LTI system, h[n] z = re j The -Trasform 7. Itroductio Geeralie the complex siusoidal represetatio offered by DTFT to a represetatio of complex expoetial sigals. Obtai more geeral characteristics for discrete-time LTI systems. 7.

More information

arxiv: v1 [math.pr] 31 Jan 2012

arxiv: v1 [math.pr] 31 Jan 2012 EXACT L 2 -DISTANCE FROM THE LIMIT FOR QUICKSORT KEY COMPARISONS EXTENDED ABSTRACT) arxiv:20.6445v [math.pr] 3 Ja 202 PATRICK BINDJEME JAMES ALLEN FILL Abstract Usigarecursiveapproach, weobtaiasimpleexactexpressioforthel

More information

Math 2784 (or 2794W) University of Connecticut

Math 2784 (or 2794W) University of Connecticut ORDERS OF GROWTH PAT SMITH Math 2784 (or 2794W) Uiversity of Coecticut Date: Mar. 2, 22. ORDERS OF GROWTH. Itroductio Gaiig a ituitive feel for the relative growth of fuctios is importat if you really

More information

Subject: Differential Equations & Mathematical Modeling-III

Subject: Differential Equations & Mathematical Modeling-III Power Series Solutios of Differetial Equatios about Sigular poits Subject: Differetial Equatios & Mathematical Modelig-III Lesso: Power series solutios of differetial equatios about Sigular poits Lesso

More information

Chapter 9: Numerical Differentiation

Chapter 9: Numerical Differentiation 178 Chapter 9: Numerical Differetiatio Numerical Differetiatio Formulatio of equatios for physical problems ofte ivolve derivatives (rate-of-chage quatities, such as velocity ad acceleratio). Numerical

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS MASSACHUSTTS INSTITUT OF TCHNOLOGY 6.436J/5.085J Fall 2008 Lecture 9 /7/2008 LAWS OF LARG NUMBRS II Cotets. The strog law of large umbers 2. The Cheroff boud TH STRONG LAW OF LARG NUMBRS While the weak

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

Regression with an Evaporating Logarithmic Trend

Regression with an Evaporating Logarithmic Trend Regressio with a Evaporatig Logarithmic Tred Peter C. B. Phillips Cowles Foudatio, Yale Uiversity, Uiversity of Aucklad & Uiversity of York ad Yixiao Su Departmet of Ecoomics Yale Uiversity October 5,

More information

A Note on the Symmetric Powers of the Standard Representation of S n

A Note on the Symmetric Powers of the Standard Representation of S n A Note o the Symmetric Powers of the Stadard Represetatio of S David Savitt 1 Departmet of Mathematics, Harvard Uiversity Cambridge, MA 0138, USA dsavitt@mathharvardedu Richard P Staley Departmet of Mathematics,

More information

On Binary Search Tree Recursions with Monomials as Toll Functions

On Binary Search Tree Recursions with Monomials as Toll Functions O Biary Search Tree Recursios with Moomials as Toll Fuctios Ralph Neiiger Istitut für Mathematische Stochastik Albert-Ludwigs-Uiversität Freiburg Eckerstr. 1 79104 Freiburg Germay April 4, 2001 Abstract

More information

Dirichlet s Theorem on Arithmetic Progressions

Dirichlet s Theorem on Arithmetic Progressions Dirichlet s Theorem o Arithmetic Progressios Athoy Várilly Harvard Uiversity, Cambridge, MA 0238 Itroductio Dirichlet s theorem o arithmetic progressios is a gem of umber theory. A great part of its beauty

More information

A PROOF OF THE TWIN PRIME CONJECTURE AND OTHER POSSIBLE APPLICATIONS

A PROOF OF THE TWIN PRIME CONJECTURE AND OTHER POSSIBLE APPLICATIONS A PROOF OF THE TWI PRIME COJECTURE AD OTHER POSSIBLE APPLICATIOS by PAUL S. BRUCKMA 38 Frot Street, #3 aaimo, BC V9R B8 (Caada) e-mail : pbruckma@hotmail.com ABSTRACT : A elemetary proof of the Twi Prime

More information

1 Approximating Integrals using Taylor Polynomials

1 Approximating Integrals using Taylor Polynomials Seughee Ye Ma 8: Week 7 Nov Week 7 Summary This week, we will lear how we ca approximate itegrals usig Taylor series ad umerical methods. Topics Page Approximatig Itegrals usig Taylor Polyomials. Defiitios................................................

More information

Complex Analysis Spring 2001 Homework I Solution

Complex Analysis Spring 2001 Homework I Solution Complex Aalysis Sprig 2001 Homework I Solutio 1. Coway, Chapter 1, sectio 3, problem 3. Describe the set of poits satisfyig the equatio z a z + a = 2c, where c > 0 ad a R. To begi, we see from the triagle

More information

Sequences and Series of Functions

Sequences and Series of Functions Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges

More information

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer. 6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio

More information

Series with Central Binomial Coefficients, Catalan Numbers, and Harmonic Numbers

Series with Central Binomial Coefficients, Catalan Numbers, and Harmonic Numbers 3 47 6 3 Joural of Iteger Sequeces, Vol. 5 (0), Article..7 Series with Cetral Biomial Coefficiets, Catala Numbers, ad Harmoic Numbers Khristo N. Boyadzhiev Departmet of Mathematics ad Statistics Ohio Norther

More information

Lecture 12: November 13, 2018

Lecture 12: November 13, 2018 Mathematical Toolkit Autum 2018 Lecturer: Madhur Tulsiai Lecture 12: November 13, 2018 1 Radomized polyomial idetity testig We will use our kowledge of coditioal probability to prove the followig lemma,

More information

The Growth of Functions. Theoretical Supplement

The Growth of Functions. Theoretical Supplement The Growth of Fuctios Theoretical Supplemet The Triagle Iequality The triagle iequality is a algebraic tool that is ofte useful i maipulatig absolute values of fuctios. The triagle iequality says that

More information

Harmonic Number Identities Via Euler s Transform

Harmonic Number Identities Via Euler s Transform 1 2 3 47 6 23 11 Joural of Iteger Sequeces, Vol. 12 2009), Article 09.6.1 Harmoic Number Idetities Via Euler s Trasform Khristo N. Boyadzhiev Departmet of Mathematics Ohio Norther Uiversity Ada, Ohio 45810

More information

INFINITE SEQUENCES AND SERIES

INFINITE SEQUENCES AND SERIES INFINITE SEQUENCES AND SERIES INFINITE SEQUENCES AND SERIES I geeral, it is difficult to fid the exact sum of a series. We were able to accomplish this for geometric series ad the series /[(+)]. This is

More information

C. Complex Numbers. x 6x + 2 = 0. This equation was known to have three real roots, given by simple combinations of the expressions

C. Complex Numbers. x 6x + 2 = 0. This equation was known to have three real roots, given by simple combinations of the expressions C. Complex Numbers. Complex arithmetic. Most people thik that complex umbers arose from attempts to solve quadratic equatios, but actually it was i coectio with cubic equatios they first appeared. Everyoe

More information

Rotationally invariant integrals of arbitrary dimensions

Rotationally invariant integrals of arbitrary dimensions September 1, 14 Rotatioally ivariat itegrals of arbitrary dimesios James D. Wells Physics Departmet, Uiversity of Michiga, A Arbor Abstract: I this ote itegrals over spherical volumes with rotatioally

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Chapter 4. Fourier Series

Chapter 4. Fourier Series Chapter 4. Fourier Series At this poit we are ready to ow cosider the caoical equatios. Cosider, for eample the heat equatio u t = u, < (4.) subject to u(, ) = si, u(, t) = u(, t) =. (4.) Here,

More information

Lecture 2: April 3, 2013

Lecture 2: April 3, 2013 TTIC/CMSC 350 Mathematical Toolkit Sprig 203 Madhur Tulsiai Lecture 2: April 3, 203 Scribe: Shubhedu Trivedi Coi tosses cotiued We retur to the coi tossig example from the last lecture agai: Example. Give,

More information

Mathematics review for CSCI 303 Spring Department of Computer Science College of William & Mary Robert Michael Lewis

Mathematics review for CSCI 303 Spring Department of Computer Science College of William & Mary Robert Michael Lewis Mathematics review for CSCI 303 Sprig 019 Departmet of Computer Sciece College of William & Mary Robert Michael Lewis Copyright 018 019 Robert Michael Lewis Versio geerated: 13 : 00 Jauary 17, 019 Cotets

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

AP Calculus Chapter 9: Infinite Series

AP Calculus Chapter 9: Infinite Series AP Calculus Chapter 9: Ifiite Series 9. Sequeces a, a 2, a 3, a 4, a 5,... Sequece: A fuctio whose domai is the set of positive itegers = 2 3 4 a = a a 2 a 3 a 4 terms of the sequece Begi with the patter

More information

The log-behavior of n p(n) and n p(n)/n

The log-behavior of n p(n) and n p(n)/n Ramauja J. 44 017, 81-99 The log-behavior of p ad p/ William Y.C. Che 1 ad Ke Y. Zheg 1 Ceter for Applied Mathematics Tiaji Uiversity Tiaji 0007, P. R. Chia Ceter for Combiatorics, LPMC Nakai Uivercity

More information

Analysis of Algorithms. Introduction. Contents

Analysis of Algorithms. Introduction. Contents Itroductio The focus of this module is mathematical aspects of algorithms. Our mai focus is aalysis of algorithms, which meas evaluatig efficiecy of algorithms by aalytical ad mathematical methods. We

More information

We are mainly going to be concerned with power series in x, such as. (x)} converges - that is, lims N n

We are mainly going to be concerned with power series in x, such as. (x)} converges - that is, lims N n Review of Power Series, Power Series Solutios A power series i x - a is a ifiite series of the form c (x a) =c +c (x a)+(x a) +... We also call this a power series cetered at a. Ex. (x+) is cetered at

More information

Alternating Series. 1 n 0 2 n n THEOREM 9.14 Alternating Series Test Let a n > 0. The alternating series. 1 n a n.

Alternating Series. 1 n 0 2 n n THEOREM 9.14 Alternating Series Test Let a n > 0. The alternating series. 1 n a n. 0_0905.qxd //0 :7 PM Page SECTION 9.5 Alteratig Series Sectio 9.5 Alteratig Series Use the Alteratig Series Test to determie whether a ifiite series coverges. Use the Alteratig Series Remaider to approximate

More information

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series Applied Mathematical Scieces, Vol. 7, 03, o. 6, 3-337 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ams.03.3430 Compariso Study of Series Approimatio ad Covergece betwee Chebyshev ad Legedre Series

More information

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014. Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the

More information

Appendix: The Laplace Transform

Appendix: The Laplace Transform Appedix: The Laplace Trasform The Laplace trasform is a powerful method that ca be used to solve differetial equatio, ad other mathematical problems. Its stregth lies i the fact that it allows the trasformatio

More information

Once we have a sequence of numbers, the next thing to do is to sum them up. Given a sequence (a n ) n=1

Once we have a sequence of numbers, the next thing to do is to sum them up. Given a sequence (a n ) n=1 . Ifiite Series Oce we have a sequece of umbers, the ext thig to do is to sum them up. Give a sequece a be a sequece: ca we give a sesible meaig to the followig expressio? a = a a a a While summig ifiitely

More information

Signals & Systems Chapter3

Signals & Systems Chapter3 Sigals & Systems Chapter3 1.2 Discrete-Time (D-T) Sigals Electroic systems do most of the processig of a sigal usig a computer. A computer ca t directly process a C-T sigal but istead eeds a stream of

More information

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018 CSE 353 Discrete Computatioal Structures Sprig 08 Sequeces, Mathematical Iductio, ad Recursio (Chapter 5, Epp) Note: some course slides adopted from publisher-provided material Overview May mathematical

More information

Linear Regression Demystified

Linear Regression Demystified Liear Regressio Demystified Liear regressio is a importat subject i statistics. I elemetary statistics courses, formulae related to liear regressio are ofte stated without derivatio. This ote iteds to

More information

1 1 2 = show that: over variables x and y. [2 marks] Write down necessary conditions involving first and second-order partial derivatives for ( x0, y

1 1 2 = show that: over variables x and y. [2 marks] Write down necessary conditions involving first and second-order partial derivatives for ( x0, y Questio (a) A square matrix A= A is called positive defiite if the quadratic form waw > 0 for every o-zero vector w [Note: Here (.) deotes the traspose of a matrix or a vector]. Let 0 A = 0 = show that:

More information

Beurling Integers: Part 2

Beurling Integers: Part 2 Beurlig Itegers: Part 2 Isomorphisms Devi Platt July 11, 2015 1 Prime Factorizatio Sequeces I the last article we itroduced the Beurlig geeralized itegers, which ca be represeted as a sequece of real umbers

More information

ECE 330:541, Stochastic Signals and Systems Lecture Notes on Limit Theorems from Probability Fall 2002

ECE 330:541, Stochastic Signals and Systems Lecture Notes on Limit Theorems from Probability Fall 2002 ECE 330:541, Stochastic Sigals ad Systems Lecture Notes o Limit Theorems from robability Fall 00 I practice, there are two ways we ca costruct a ew sequece of radom variables from a old sequece of radom

More information

Singular Continuous Measures by Michael Pejic 5/14/10

Singular Continuous Measures by Michael Pejic 5/14/10 Sigular Cotiuous Measures by Michael Peic 5/4/0 Prelimiaries Give a set X, a σ-algebra o X is a collectio of subsets of X that cotais X ad ad is closed uder complemetatio ad coutable uios hece, coutable

More information

In algebra one spends much time finding common denominators and thus simplifying rational expressions. For example:

In algebra one spends much time finding common denominators and thus simplifying rational expressions. For example: 74 The Method of Partial Fractios I algebra oe speds much time fidig commo deomiators ad thus simplifyig ratioal epressios For eample: + + + 6 5 + = + = = + + + + + ( )( ) 5 It may the seem odd to be watig

More information

Ma 530 Infinite Series I

Ma 530 Infinite Series I Ma 50 Ifiite Series I Please ote that i additio to the material below this lecture icorporated material from the Visual Calculus web site. The material o sequeces is at Visual Sequeces. (To use this li

More information

Math 113 Exam 3 Practice

Math 113 Exam 3 Practice Math Exam Practice Exam 4 will cover.-., 0. ad 0.. Note that eve though. was tested i exam, questios from that sectios may also be o this exam. For practice problems o., refer to the last review. This

More information

Chapter 1. Complex Numbers. Dr. Pulak Sahoo

Chapter 1. Complex Numbers. Dr. Pulak Sahoo Chapter 1 Complex Numbers BY Dr. Pulak Sahoo Assistat Professor Departmet of Mathematics Uiversity Of Kalyai West Begal, Idia E-mail : sahoopulak1@gmail.com 1 Module-2: Stereographic Projectio 1 Euler

More information

Resampling Methods. X (1/2), i.e., Pr (X i m) = 1/2. We order the data: X (1) X (2) X (n). Define the sample median: ( n.

Resampling Methods. X (1/2), i.e., Pr (X i m) = 1/2. We order the data: X (1) X (2) X (n). Define the sample median: ( n. Jauary 1, 2019 Resamplig Methods Motivatio We have so may estimators with the property θ θ d N 0, σ 2 We ca also write θ a N θ, σ 2 /, where a meas approximately distributed as Oce we have a cosistet estimator

More information

Analysis of Algorithms -Quicksort-

Analysis of Algorithms -Quicksort- Aalysis of Algorithms -- Adreas Ermedahl MRTC (Mälardales Real-Time Research Ceter) adreas.ermedahl@mdh.se Autum 2004 Proposed by C.A.R. Hoare i 962 Worst- case ruig time: Θ( 2 ) Expected ruig time: Θ(

More information

Math 113 Exam 4 Practice

Math 113 Exam 4 Practice Math Exam 4 Practice Exam 4 will cover.-.. This sheet has three sectios. The first sectio will remid you about techiques ad formulas that you should kow. The secod gives a umber of practice questios for

More information

Axioms of Measure Theory

Axioms of Measure Theory MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that

More information

Fourier Series and the Wave Equation

Fourier Series and the Wave Equation Fourier Series ad the Wave Equatio We start with the oe-dimesioal wave equatio u u =, x u(, t) = u(, t) =, ux (,) = f( x), u ( x,) = This represets a vibratig strig, where u is the displacemet of the strig

More information

The Ratio Test. THEOREM 9.17 Ratio Test Let a n be a series with nonzero terms. 1. a. n converges absolutely if lim. n 1

The Ratio Test. THEOREM 9.17 Ratio Test Let a n be a series with nonzero terms. 1. a. n converges absolutely if lim. n 1 460_0906.qxd //04 :8 PM Page 69 SECTION 9.6 The Ratio ad Root Tests 69 Sectio 9.6 EXPLORATION Writig a Series Oe of the followig coditios guaratees that a series will diverge, two coditios guaratee that

More information

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled 1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how

More information

COMPUTING THE EULER S CONSTANT: A HISTORICAL OVERVIEW OF ALGORITHMS AND RESULTS

COMPUTING THE EULER S CONSTANT: A HISTORICAL OVERVIEW OF ALGORITHMS AND RESULTS COMPUTING THE EULER S CONSTANT: A HISTORICAL OVERVIEW OF ALGORITHMS AND RESULTS GONÇALO MORAIS Abstract. We preted to give a broad overview of the algorithms used to compute the Euler s costat. Four type

More information

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES Peter M. Maurer Why Hashig is θ(). As i biary search, hashig assumes that keys are stored i a array which is idexed by a iteger. However, hashig attempts to bypass

More information

Sequences, Series, and All That

Sequences, Series, and All That Chapter Te Sequeces, Series, ad All That. Itroductio Suppose we wat to compute a approximatio of the umber e by usig the Taylor polyomial p for f ( x) = e x at a =. This polyomial is easily see to be 3

More information

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3 MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special

More information

Fall 2013 MTH431/531 Real analysis Section Notes

Fall 2013 MTH431/531 Real analysis Section Notes Fall 013 MTH431/531 Real aalysis Sectio 8.1-8. Notes Yi Su 013.11.1 1. Defiitio of uiform covergece. We look at a sequece of fuctios f (x) ad study the coverget property. Notice we have two parameters

More information

AMS Mathematics Subject Classification : 40A05, 40A99, 42A10. Key words and phrases : Harmonic series, Fourier series. 1.

AMS Mathematics Subject Classification : 40A05, 40A99, 42A10. Key words and phrases : Harmonic series, Fourier series. 1. J. Appl. Math. & Computig Vol. x 00y), No. z, pp. A RECURSION FOR ALERNAING HARMONIC SERIES ÁRPÁD BÉNYI Abstract. We preset a coveiet recursive formula for the sums of alteratig harmoic series of odd order.

More information

MAT 271 Project: Partial Fractions for certain rational functions

MAT 271 Project: Partial Fractions for certain rational functions MAT 7 Project: Partial Fractios for certai ratioal fuctios Prerequisite kowledge: partial fractios from MAT 7, a very good commad of factorig ad complex umbers from Precalculus. To complete this project,

More information

Section 11.6 Absolute and Conditional Convergence, Root and Ratio Tests

Section 11.6 Absolute and Conditional Convergence, Root and Ratio Tests Sectio.6 Absolute ad Coditioal Covergece, Root ad Ratio Tests I this chapter we have see several examples of covergece tests that oly apply to series whose terms are oegative. I this sectio, we will lear

More information

The Arakawa-Kaneko Zeta Function

The Arakawa-Kaneko Zeta Function The Arakawa-Kaeko Zeta Fuctio Marc-Atoie Coppo ad Berard Cadelpergher Nice Sophia Atipolis Uiversity Laboratoire Jea Alexadre Dieudoé Parc Valrose F-0608 Nice Cedex 2 FRANCE Marc-Atoie.COPPO@uice.fr Berard.CANDELPERGHER@uice.fr

More information

Calculus with Analytic Geometry 2

Calculus with Analytic Geometry 2 Calculus with Aalytic Geometry Fial Eam Study Guide ad Sample Problems Solutios The date for the fial eam is December, 7, 4-6:3p.m. BU Note. The fial eam will cosist of eercises, ad some theoretical questios,

More information

7 Sequences of real numbers

7 Sequences of real numbers 40 7 Sequeces of real umbers 7. Defiitios ad examples Defiitio 7... A sequece of real umbers is a real fuctio whose domai is the set N of atural umbers. Let s : N R be a sequece. The the values of s are

More information

Topics in Probability Theory and Stochastic Processes Steven R. Dunbar. Stirling s Formula Derived from the Gamma Function

Topics in Probability Theory and Stochastic Processes Steven R. Dunbar. Stirling s Formula Derived from the Gamma Function Steve R. Dubar Departmet of Mathematics 23 Avery Hall Uiversity of Nebraska-Licol Licol, NE 68588-3 http://www.math.ul.edu Voice: 42-472-373 Fax: 42-472-8466 Topics i Probability Theory ad Stochastic Processes

More information