Efficient algorithms for for clone items detection
|
|
- Elvin Davis
- 5 years ago
- Views:
Transcription
1 Efficient algoritms for for clone items detection Raoul Medina, Caroline Noyer, and Olivier Raynaud Raoul Medina, Caroline Noyer and Olivier Raynaud LIMOS - Université Blaise Pascal, Campus universitaire LIMOS -des Université Cézeaux, Blaise Clermont-Ferrand, Pascal, France Campus universitaire {medina, Cézeaux, raynaud}@isima.fr Clermont-Ferrand, France {medina, raynaud}@isima.fr Abstract. Tis paper presents efficient algoritms for clone items detection in a binary relation. Best implementation of tese algoritms as O( J. M ) time complexity, wit J corresponding to te set of items of te relation and M corresponding to te size of te relation. Tis result improves te previous algoritm given in [3] wic is O( J 2. M ). Clone items ave been introduced by Medina and Nourine to explain wy, sometimes, te number of rules of a minimum cover of a relation is exponential wit te number of items of te relation. 1 Introduction Te clone items notion as been introduced by Medina and Nourine in [3]. Aim of teir paper was to understand te combinatorial explosion tat migt arise in a minimum basis of a relation. Most famous example of suc exponential minimum basis is given by Manilla and Räiä in [2]. Medina and Nourine noticed tat in tis example some items play symetrical role in te basis. Indeed, for eac rule containing a given item a in te antecedent tere is a symetrical rule were item a is replaced by item b. Suc symetrical items are said to be clone items. Te clone notion is an equivalence relation and tus classes of clone items can be found in a binary relation. In [3], te autors sow ow to compute suc clone classes and, from tose classes, ow to reduce te binary relation in order to obtain a minimum basis wit no clone items. Te detection algoritm as well as te reduction algoritm ave bot polynomial time complexities. Te obtained minimum basis is smaller tan te original one (in te case of te Mannila and Räiä example it reduces to a single rule) and tis later can be reconstructed from te clone free minimum basis and te clone classes information in polynomial time. Recently, Gely et al. (in [1]) extended te notion of clone items (wic are defined on closed sets) to te notion of P-clone items (defined on pseudo-closed sets) and to te notion of A-clone items (defined on wat tey call an atomized context). Teir approac could be generalized to any generation problem were, from a given relation, one wants to compute a (potentially exponential) collection of sets verifying a property (e.g. te sets must be closed, or te sets must be ideals, or te sets are pseudo-closed sets, etc...). Te idea is ten to reduce te combinatorial explosion of te wanted collection by representing it by a clone free collection and te classes of clone items of tis collection. Te problem is Radim Bělolávek, Václav Snášel (Eds.): CLA 2005, pp , ISBN
2 Efficient algoritms for clone items detection 71 ten to be able to compute te clone classes of te (potentially exponential) collection witout generating its sets. To solve tis problem in polynomial time, te general metod could be as follows: Let M be te (potentially exponential) collection of sets verifying a property over a given binary relation R. Compute in polynomial time a collection M suc tat: 1. te size of M is polynomial in te size of R, 2. items a and b are clone in M if and only if tey are clone items in M. Detect te clone classes in M. Our paper focuses on te detection pase of tis approac. Te clone classes computation algoritm given in [3] as an O( J 2. M ) time complexity, were J is te set of items and M is te size of te input collection. In oter words, M = m M m. In tis paper, we present different algoritms to solve te clone classes computation. Te best complexity we obtain is in O( J. M ). Tis paper is organized as follows: section 2 formally defines te problem in terms of collection of sets and introduces te corresponding Abstract Data Type wic will be used by our algoritms. Section 3 describes tree computation strategies and te corresponding time complexities are studied. Section 4 sows ow to take advantage of tose algoritms in order to compute te clone items classes as defined in [3]. 2 General context and definitions In tis section, we first formally define te studied problem. Ten we present te Abstract Data Structure called Map used in our algoritms and discuss on its possible implementations. 2.1 Clone items in a Sets Collection Let J be a set of items {x 1,..., x J } and M a sets collection on J. We denote by ϕ a,b : 2 J 2 J te mapping wic associates to any subset of J its image by swapping items a and b. More formally : (m \ {a}) {b} if b m and a m ϕ a,b (m) = (m \ {b}) {a} if a m and b m m oterwise Definition 1. Let M be a collection of sets defined on J. We say tat items a and b are clone items in M if and only if m M, ϕ a,b (m) M. Te clone items concept is a binary one. To te question are a and b clone items?, only te answer true or false is possible. It could be interesting to ave more precisions wen te negative response is given. Are a and b very far from being clone items or wy are not tey clone? For tis purpose, we introduce a measure to qualify te clone property. Tis measure will represent
3 72 Raoul Medina, Caroline Noyer, Olivier Raynaud a distance between two items a and b, based on te definition of te clone items property. Tis distance is exactly te number of elements m of M wic do not ave an image in M wen applying te swapping function ϕ a,b (m). Wen tis distance is zero, a and b are clone items. Te greater te distance is, te farter a and b are to be clone. More formally: Definition 2. Let M be a sets collection on J and let (a, b) in J 2. We call distance between a and b, denoted by d M (a, b), te mapping : J 2 N d M (a, b) {m M ϕa,b (m) M} Tanks to definition 2, clone items could be caraterized as follows : Proposition 1. Let M be a sets collection on J and (a, b) in J 2, a and b are clone items if and only if d M (a, b) = 0. Te problem we study in tis paper is te computation of distances between all pair of items of J: Problem 1 (Distance). Data : a sets collection M on J; Result : te matrix d M. Here, we present te main property on wic rely our algoritms. It caracterizes a couple (m, m ) of te sets collection M suc tat m = ϕ a,b (m ). Proposition 2. Let M be a sets collection defined over J, m and m two distinct sets of M and (a, b) two items of J suc tat a m and b m. Ten te following assertions are equivalent: 1. m = ϕ a,b (m ) 2. m = ϕ a,b (m) 3. m = m and m \ m = {a} and m \ m = {b} 4. m \ {a} = m \ {b} Tis property states tat two sets m and m are teir respective images by te swapping function ϕ if and only if tey ave same size t and sare t 1 items. Tis property follows directly from te definition of te ϕ mapping. 2.2 Abstract Data Type : Key Mapping Interface. We use a Map abstract data type similar to te Map interface of Java language. Tis data structure maps keys to values. In our case, te keys are te sets of te collection. Te values mapped by te keys depend on te algoritm. Tis abstract data type supplies te following operators: new() operator: creates a Map object and returns an empty map.
4 Efficient algoritms for clone items detection 73 get(e) operator: returns te value associated to te key e if tis key maps a value, or Nil oterwise. put(e,value) operator: inserts set e in te map and associates value to it. Time complexities of tose operators deeply rely on te data structure used for te implementation of te Map data type. We propose an implementation wic takes advantage of te type of te keys, i.e. sets. To implement te Map type we propose a lexicograpic tree: itemsets are represented by brances of te tree. Implementation: lexicograpic tree. We first give a formal definition of a lexicograpic tree corresponding to a sets collection. Definition 3. Let M be a sets collection defined over J, wit a total order on J denoted by < J. A unique lexicograpic tree is associated to M suc tat: Eac edge of te tree is labeled wit an element of J; To eac marked node of te tree corresponds a set of M; To eac set m of M correspond a unique pat in te tree (starting from root and ending wit a marked node) suc tat te union of labels in tis pat corresponds exactly to te set m. For any pat from te root to any node, te order of te successive labels respects te order defined by < J ; Te order of edges leaving a node respects te order defined by < J. Figure 1 gives an example of collection and its associated lexicograpic order. b a e c d {a,d} c d c b d {e} {c,d} e {a,b,c} e {b,c,d,e} {c,d,e} Fig. 1. Te lexicograpic tree corresponding to te collection {abc, ad, bcde, cd, cde, e}, wit J = {a, b, c, d, e} and < J being te alpabetical order of te items. Circled nodes are te marked nodes corresponding to sets of te collection. A boolean can be associated to a node of te tree in order to indicate if te node is marked (i.e. corresponds to a set of te collection and tus to a key) or
5 74 Raoul Medina, Caroline Noyer, Olivier Raynaud not. Any field type can be associated to te node for storing te value associated to te key (on marked nodes only). Tere are two ways of implementing te list of cildren of a node in te lexicograpic tree: Using a List structure, eac entry of te list containing te label of te associated edge and a reference to te cild; Using an Array structure being indexed by te labels and te entries containing eiter NIL or reference to te cild. Complexities of te put and get operators rely on te cosen implementation. Proposition 3. If te lexicograpic tree is implemented wit Lists ten: Te put(m,value) operator as an O( J ) time complexity; Te get(m) operator as an O( J ) time complexity; Access complexity is due to te fact tat an item appears only once in a set. Cost of a node creation is done in constant time. Proposition 4. If te lexicograpic tree is implemented wit Arrays ten: Te put(m,value) operator as an O( m J ) time complexity; Te get(m) operator as an O( m ) time complexity; Acces complexity is due to te fact tat we ave direct access to a cild labeled by a given item. Creation of a node of te tree costs J since we need to create and initialize a J sized array. 3 Strategies and algoritms In tis section, we study tree different strategies for solving te Distance problem. All strategies rely on te same basic idea: first te distance matrix is initialized wit te maximum possible values for eac distance d M (a, b). Ten, eac time te algoritm finds m and m suc tat m = ϕ a,b (m ), te distance d M (a, b) is decreased by one. Main difference between te tree strategies is te way tey detect tat m = ϕ a,b (m ). Te first strategy is te one given in [3]. We call it set existence cecking. Main idea of te algoritm is, given m M, to compute all possible sets ϕ a,b (m) and ten ceck if tese sets belong to te collection. Second strategy is called ϕ a,b relation cecking. Its principle is, for eac pair (m, m ), to ceck if tere exist items a and b suc tat m = ϕ a,b (m ). Tis test is done using Property 2. Tird strategy is called classes computation. Based on Property 2, it computes classes C of itemsets suc tat for any pair (m, m ) of C, tere exist items a and b suc tat m = ϕ a,b (m ). We first discuss about te initialization of te distance matrix since tis is a common ground for all strategies.
6 Efficient algoritms for clone items detection Discussion on te distance matrix Since te notion of distance d M (a, b) is a symetrical one, te distance matrix is also symmetrical. We tus coose to represent it by a triangular matrix suc tat: { dm (a, a) = 0 d M (a, b) = d M (b, a) In tis section we discuss te different strategies for te initialization and te update of te distance matrix, as well as teir respective costs. Let M = M ab + M ab + M ab + M ab, wit: - M ab : te sets m of M suc tat a m and b m - M ab : te sets m of M suc tat a m and b m - M ab : te sets m of M suc tat a m and b m - M ab : te sets m of M suc tat a m and b m. Incrementation or decrementation strategy? Tere are two ways of computing te distance matrix: Eiter by first initializing all distances to 0 and ten by increasing by 1 te distance d M (a, b) eac time we find m M suc tat ϕ a,b (m) M, or by first initializing te distances by a maximal value and ten decreasing by 1 te distance d M (a, b) eac time we find m and m M suc tat m = ϕ a,b (m ). Wat is te maximal value tat can be taken by d M (a, b)? Clearly te answer is M ab + M ab. Indeed, for any item m M ab M ab we ave m = ϕ a,b (m) and tus m cannot increase te distance between a and b. Tis represents te maximum number of basic operations (eiter incrementation or decrementation) needed to compute te distance matrix in te worst case. Tus, watever strategy we coose, te number of basic operations will be te same in te worst case. Wat is te best time complexity for bot strategies? We consider tat te basic operations can be done in O(1). Tus te overall complexity will be: O( M ab + M ab ). a J b J Now, consider m M. In te worst case, m will be taken into account in at most m J \ m distances d M (a, b). Indeed, for m to be taken into account in d M (a, b) eiter a or b belongs to m but not bot. Tus, we ave: O( M ab + M ab ) = O( m J \ m ). a J m M b J m M m M Tis can be rewritten as follows: O( m ( J m )) = O(( m J ) ( m m )). m M
7 76 Raoul Medina, Caroline Noyer, Olivier Raynaud And since m m is lesser or equal tan m J, we obtain te worst case complexity: O( m J ) = O( J M ). m M Tus, watever update strategy is cosen, time complexity cannot be less tan O( J M ) (upon te ypotesis tat te basic operations increment or decrement by 1). In tis paper we coose to adopt te decrementation strategy since our algoritms are based on Property 2. We now discuss te complexity of te initialization of te distance matrix. Initializing te distance matrix. We initialize eac distance d M (a, b) wit te maximal value possible, i.e. wit M ab + M ab. Initially, te distances are equal to 0. Tis can be done in O( J J ). Ten, for eac m M we increment by 1 te distances d M (a, b), wit a m and b m. As sown in previous subsection, tis can be done in O( J M ). Algoritm 1: InitDistance(M) Data : A sets collection M defined over J. Result : Te distance matrix d M suc tat for all a and b in J 2 we ave d M(a, b) = M ab + M ab. begin foreac a J do foreac b J do d M(a, b) = 0; foreac m M do foreac a m do foreac b m do d M(a, b) + +; return d M; end 3.2 Set Existence Cecking Strategy For eac set m of M and for all pair (a, b) of J 2, we ceck if ϕ a,b (m) belongs to M. In order to ceck te existence of ϕ a,b (m), we coose to store te collection M in te Map structure presented before. Te sets of M are te keys wile teir associated value is "present". Beware tat since a distance d M (a, b) is initialized wit M ab + M ab, tis distance sould be decremented only wen m ϕ a,b (m). Indeed, if m = ϕ a,b (m) ten m M ab M ab.
8 Efficient algoritms for clone items detection 77 Algoritm 2: ComputeDistance(M) : Set Existence Cecking Strategy Data : A sets collection M defined over J. Result : Te distance matrix d M. begin d M = InitDistance(M); T = new Map(); foreac m M do T.put(m, present ); 1 foreac m M do 2 foreac couple(a, b) J 2 do if T.get(m) NIL and m ϕ a,b (m) ten d M(a, b) ; return d M; end Proposition 5. Te Set Existence Cecking Strategy as an O( J 2 M ) time complexity. Proof. Initialization of te matrix is done in O( J M ). We suppose tat te T Map structure is implemented using Arrays. Tus, te initialization of T is done in O( m M m J ) = O( J M ). Loop on line 1 does M iterations wile loop of line 2 does J 2 iterations. Te ϕ a,b (m) operation as well as te test m ϕ a,b (m) and te get(m) operation can be done in O( m ) time complexity. Overall complexity is tus, O( m M J 2 m ) = O( J 2 M ). Tis strategy is a sligter improvement of te one presented in [3]. Note tat it can be improved a little more by coosing a in m and b in J \ m. 3.3 ϕ a,b Relation Cecking Strategy For any pair of elements (m, m ) of M, we ceck if tere exist a and b suc tat m = ϕ a,b (m ). According to Property 2, items a and b exist if and only if m and m ave same size and sare m 1 items. In tis case, d M (a, b) is decremented by 1. Proposition 6. Te ϕ a,b relation cecking strategy as an O(( J + M ) M ) time complexity. Proof. Initialisation of te matrix is done in O( J M ). External loop (line 1) does M 2 iterations. All tests of line 2 can be done in O( m ) provided tat te sets m and m are stored sorted according to < J. Te complexity of te loop is in O( M M ). Overall complexity is tus in O(( J + M ) M ). 3.4 Classes Computation Strategy Tis strategy also relies on Property 2. Let consider m, m and m be sets of M suc tat m = ϕ a,b (m ) and m = ϕ a,c (m ). Ten, according to Property
9 78 Raoul Medina, Caroline Noyer, Olivier Raynaud Algoritm 3: ComputeDistance(M): ϕ a,b Relation Cecking Strategy Data : A set collections M defined over J. Result : Te distance matrix d M. begin d M = InitDistance(M); 1 foreac (m, m ) M 2 do 2 if m = m and m \ m = 1 and m \ m = 1 ten d M(m \ m, m \ m) ; return d M; end 2 we ave m \ {a} = m \ {b} = m \ {c}. And tus, m = ϕ b,c (m ). Idea of te algoritm is to compute classes of sets m i of M aving m i 1 common items. Tus, a class C can be represented by te set of common items and we memorize in a set Union all te extra items x i wic are not common. In te Map structure we use, te set C will be te key wile te set Union will be te value associated to te key. Ten, for any m C and for any (a, b) Union, we know tat according to Property 2 we ave ϕ a,b (m) M and m ϕ a,b (m). And tus, d M (a, b) as to be decremented. Note tat a set m can belong to at most m classes. Te algoritm is quite straigtforward using te Map structure. For all sets m of M we insert eac of its m subsets of size m 1 in te Map structure. If te key was already present, we just append te extra item of m to te set Union and update all te necessary entries in te distance matrix. Oterwise, a new key m \ {x} is present in te Map structure and its associated Union value is initialized wit {x}. Proposition 7. Classes computation strategy as O( J M ) time complexity. Proof. Initialization of te distance matrix is done in O( J M ). We suppose tat te Map structure is implemented using a lexicograpic tree wit Lists. Te line 1 loop does M iterations. Loop in line 2 does m iterations. In line 3, te retrieval is done in O( J ). Te loop in line 4 does at most J iterations and te update of te matrix takes constant time. Te insertion of line 5 is done in O( J ). Tus, te overall complexity is in O( m M m J ) = O( J M ). Let us illustrate Algoritm 4 wit an example. Te considered collection is M = {m 1 = {a, e, f, }, m 2 = {b, e, f, }, m 3 = {b, d, f, }}. Te resulting lexicograpic tree obtained wit Algoritm 4 is sown in Figure 2. From tis tree, we conclude tat m 2 and m 3 sare te items {b, f, } and tat m 2 = ϕ d,e (m 3 ). Tus, d M (d, e) sould be decremented. For te same reason, te distance d M (a, b) sould also be decremented since m 1 = ϕ a,b (m 2 ) (tey sare te items {e, f, }).
10 Efficient algoritms for clone items detection 79 Algoritm 4: ComputeDistance(M): Classes Computation Strategy Data : A set collections M defined over J. Result : Te distance matrix d M. begin d M = InitDistance(M); T = new Map(); 1 foreac m M do 2 foreac x m do C = m \ {x} 3 Union = T.get(C) if Union Nil ten 4 foreac y Union do d M(x, y) ; Union = Union {x}; T.put(C, Union); else 5 T.put(C, {x}) return d M; end 3.5 Memory usage In tis section we discuss te space complexity required by eac strategy and sow ow to reduce te memory usage wen possible. First, it is obvious tat te distance matrix sould be present in memory. It requires O( J 2 ) memory space. Concerning te Set Existence Cecking Strategy, a lexicograpic tree implemented wit arrays is used. Te number of nodes is clearly bounded by M. And since eac node requires a J sized array, tis strategy uses O( J M ) memory space. For te ϕ a,b Relation Cecking Strategy, no lexicograpic tree is used. However, te collection M needs to be present in memory. Tus, tis strategy requires O( M ) memory space. Now, for te Classes Computation Strategy, te used lexicograpic tree is implemented using lists. Suc implementation requires O( M ) memory space. But M is not te collection stored in te tree. Indeed, for eac m M, we store its m subsets of size m 1. And since m is bounded by J we conclude tat tis strategy requires O( J M ) memory space. Te conclusion seems to be tat watever strategy is used, at least O( M ) memory space will be needed. But one can notice tat, according to Property 2, not all sets in M need to be present in memory at te same time. Indeed, if m = ϕ a,b (m ), ten m and m ave same size. Te idea is ten to do a partitionning of M according to te size of te sets. Tus, only sets of same size need to be present in memory at te same time. Computations done for
11 80 Raoul Medina, Caroline Noyer, Olivier Raynaud a b d e e f d e f f f f f f () (f) (e) () (f) () (f) (d,e) (b) (a,b) Fig. 2. Te lexicograpic tree corresponding to te collection M = {{a, e, f, }, {b, e, f, }, {b, d, f, }}. Circled nodes correspond to sets of M. Te Union value associated to tese node is presented in parentesis. tose sets is totally independent of computations done for sets wit a different size. Note tat te partitionning of M can be done in O( M ) time complexity, wit a single scan of te collection. Tus, te partitionning does not cange te overall complexity of te different strategies. Anoter remark is tat since computations by size are totally independent, one could easily implement a distributed version of te strategies. Tis could eventually speed up te computation of te distance matrix. But note tat in tis case, te distance matrix sould also be distributed. Best solution sould be to initialize local distance matrices wit te local partition. After local computation (for sets wit same size), all te distance matrices sould be merged togeter (by adding all te obtained values) in order to obtain te global distance matrix. 4 Clone classes computation Te problem stated in [1] and in [3] is te computation of clone classes. We tus give te algoritm wic computes clone classes from a distance matrix. First, let us recall tat two items a and b are clone if and only if d M (a, b) = 0. Since, te clone relation is an equivalence relation, it defines a partition of te set J. Principle of our algoritm 5 is te following. Let a J be an item wic as still not been assigned to a class. We ten searc all remaining items b wic distance wit a is null. All tose items will form a clone class wit a and tus are removed from te list of items wic are not assigned to a class. Te class of a is ten stored in a list L. Total complexity of te clone classes computation is in O( J M ) time and space complexity. 5 Conclusion We ave seen tat if te problem is te computation of te distance matrix and only basic incrementation or decrementation by 1 are allowed, ten te minimal
12 Efficient algoritms for clone items detection 81 Algoritm 5: ComputeCloneClasses(M) Data : A sets collection M defined over J. Result : Te list L of clone classes. begin d M = ComputeDistance(M); L = ; temp = J; wile temp do 1 foreac a temp do l a = newlist(); l a = l a {a}; temp = temp \ {a}; 2 foreac b temp do 3 if d M(a, b) = 0 ten 4 l a = l a {b}; 5 temp = temp \ {b}; return L; end L = L + l a; time complexity for te update of te matrix is in O( J M ). Tus, under tis ypotesis, our algoritm is optimal. Figure 3 gives te different time and space complexities obtained wit our algoritms. Algoritm Time complexity Space complexity Set Existence Cecking J 2 M J M ϕ a,b Relation Cecking ( J + M ) M M Classes Computation J M J M Optimal matrix computation J M? Fig. 3. Complexities of algoritms presented in te paper. An open question is to know weter or not te distance matrix could be incremented (or decremented) by more tan 1 at eac step. Tis could be te only way of improving our algoritm. Anoter open question is to know if tere is a more efficient algoritm to compute te clone classes (for instance witout computing te distance matrix). Tose are two questions we are investigating. References 1. A. Gely, R. Medina, L. Nourine, and Y. Renaud. Uncovering and reducing idden combinatorics in guigues-duquenne covers. In ICFCA 05, H. Manilla and K.J. Räiä. On te complexity of inferring functionnal dependencies. Discret Applied Matematics, 40(2): , R. Medina and L. Nourine. Clone items: a pre-processing information for knowledge discovery. submitted.
Numerical Differentiation
Numerical Differentiation Finite Difference Formulas for te first derivative (Using Taylor Expansion tecnique) (section 8.3.) Suppose tat f() = g() is a function of te variable, and tat as 0 te function
More informationContinuity and Differentiability Worksheet
Continuity and Differentiability Workseet (Be sure tat you can also do te grapical eercises from te tet- Tese were not included below! Typical problems are like problems -3, p. 6; -3, p. 7; 33-34, p. 7;
More informationCombining functions: algebraic methods
Combining functions: algebraic metods Functions can be added, subtracted, multiplied, divided, and raised to a power, just like numbers or algebra expressions. If f(x) = x 2 and g(x) = x + 2, clearly f(x)
More informationMaterial for Difference Quotient
Material for Difference Quotient Prepared by Stepanie Quintal, graduate student and Marvin Stick, professor Dept. of Matematical Sciences, UMass Lowell Summer 05 Preface Te following difference quotient
More informationMVT and Rolle s Theorem
AP Calculus CHAPTER 4 WORKSHEET APPLICATIONS OF DIFFERENTIATION MVT and Rolle s Teorem Name Seat # Date UNLESS INDICATED, DO NOT USE YOUR CALCULATOR FOR ANY OF THESE QUESTIONS In problems 1 and, state
More informationExam 1 Review Solutions
Exam Review Solutions Please also review te old quizzes, and be sure tat you understand te omework problems. General notes: () Always give an algebraic reason for your answer (graps are not sufficient),
More informationDIGRAPHS FROM POWERS MODULO p
DIGRAPHS FROM POWERS MODULO p Caroline Luceta Box 111 GCC, 100 Campus Drive, Grove City PA 1617 USA Eli Miller PO Box 410, Sumneytown, PA 18084 USA Clifford Reiter Department of Matematics, Lafayette College,
More informationDigital Filter Structures
Digital Filter Structures Te convolution sum description of an LTI discrete-time system can, in principle, be used to implement te system For an IIR finite-dimensional system tis approac is not practical
More informationMAT244 - Ordinary Di erential Equations - Summer 2016 Assignment 2 Due: July 20, 2016
MAT244 - Ordinary Di erential Equations - Summer 206 Assignment 2 Due: July 20, 206 Full Name: Student #: Last First Indicate wic Tutorial Section you attend by filling in te appropriate circle: Tut 0
More informationREVIEW LAB ANSWER KEY
REVIEW LAB ANSWER KEY. Witout using SN, find te derivative of eac of te following (you do not need to simplify your answers): a. f x 3x 3 5x x 6 f x 3 3x 5 x 0 b. g x 4 x x x notice te trick ere! x x g
More information1 The concept of limits (p.217 p.229, p.242 p.249, p.255 p.256) 1.1 Limits Consider the function determined by the formula 3. x since at this point
MA00 Capter 6 Calculus and Basic Linear Algebra I Limits, Continuity and Differentiability Te concept of its (p.7 p.9, p.4 p.49, p.55 p.56). Limits Consider te function determined by te formula f Note
More informationSolution. Solution. f (x) = (cos x)2 cos(2x) 2 sin(2x) 2 cos x ( sin x) (cos x) 4. f (π/4) = ( 2/2) ( 2/2) ( 2/2) ( 2/2) 4.
December 09, 20 Calculus PracticeTest s Name: (4 points) Find te absolute extrema of f(x) = x 3 0 on te interval [0, 4] Te derivative of f(x) is f (x) = 3x 2, wic is zero only at x = 0 Tus we only need
More informationConsider a function f we ll specify which assumptions we need to make about it in a minute. Let us reformulate the integral. 1 f(x) dx.
Capter 2 Integrals as sums and derivatives as differences We now switc to te simplest metods for integrating or differentiating a function from its function samples. A careful study of Taylor expansions
More information3.4 Worksheet: Proof of the Chain Rule NAME
Mat 1170 3.4 Workseet: Proof of te Cain Rule NAME Te Cain Rule So far we are able to differentiate all types of functions. For example: polynomials, rational, root, and trigonometric functions. We are
More informationThe derivative function
Roberto s Notes on Differential Calculus Capter : Definition of derivative Section Te derivative function Wat you need to know already: f is at a point on its grap and ow to compute it. Wat te derivative
More informationFundamentals of Concept Learning
Aims 09s: COMP947 Macine Learning and Data Mining Fundamentals of Concept Learning Marc, 009 Acknowledgement: Material derived from slides for te book Macine Learning, Tom Mitcell, McGraw-Hill, 997 ttp://www-.cs.cmu.edu/~tom/mlbook.tml
More information2.8 The Derivative as a Function
.8 Te Derivative as a Function Typically, we can find te derivative of a function f at many points of its domain: Definition. Suppose tat f is a function wic is differentiable at every point of an open
More information2.11 That s So Derivative
2.11 Tat s So Derivative Introduction to Differential Calculus Just as one defines instantaneous velocity in terms of average velocity, we now define te instantaneous rate of cange of a function at a point
More informationExercises for numerical differentiation. Øyvind Ryan
Exercises for numerical differentiation Øyvind Ryan February 25, 2013 1. Mark eac of te following statements as true or false. a. Wen we use te approximation f (a) (f (a +) f (a))/ on a computer, we can
More informationLab 6 Derivatives and Mutant Bacteria
Lab 6 Derivatives and Mutant Bacteria Date: September 27, 20 Assignment Due Date: October 4, 20 Goal: In tis lab you will furter explore te concept of a derivative using R. You will use your knowledge
More informationDifferential Calculus (The basics) Prepared by Mr. C. Hull
Differential Calculus Te basics) A : Limits In tis work on limits, we will deal only wit functions i.e. tose relationsips in wic an input variable ) defines a unique output variable y). Wen we work wit
More information1 Calculus. 1.1 Gradients and the Derivative. Q f(x+h) f(x)
Calculus. Gradients and te Derivative Q f(x+) δy P T δx R f(x) 0 x x+ Let P (x, f(x)) and Q(x+, f(x+)) denote two points on te curve of te function y = f(x) and let R denote te point of intersection of
More informationSymmetry Labeling of Molecular Energies
Capter 7. Symmetry Labeling of Molecular Energies Notes: Most of te material presented in tis capter is taken from Bunker and Jensen 1998, Cap. 6, and Bunker and Jensen 2005, Cap. 7. 7.1 Hamiltonian Symmetry
More information3.1 Extreme Values of a Function
.1 Etreme Values of a Function Section.1 Notes Page 1 One application of te derivative is finding minimum and maimum values off a grap. In precalculus we were only able to do tis wit quadratics by find
More informationHow to Find the Derivative of a Function: Calculus 1
Introduction How to Find te Derivative of a Function: Calculus 1 Calculus is not an easy matematics course Te fact tat you ave enrolled in suc a difficult subject indicates tat you are interested in te
More informationPreface. Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my course tat I teac ere at Lamar University. Despite te fact tat tese are my class notes, tey sould be accessible to anyone wanting to learn or needing a refreser
More informationAverage Rate of Change
Te Derivative Tis can be tougt of as an attempt to draw a parallel (pysically and metaporically) between a line and a curve, applying te concept of slope to someting tat isn't actually straigt. Te slope
More informationFunction Composition and Chain Rules
Function Composition and s James K. Peterson Department of Biological Sciences and Department of Matematical Sciences Clemson University Marc 8, 2017 Outline 1 Function Composition and Continuity 2 Function
More information1. Questions (a) through (e) refer to the graph of the function f given below. (A) 0 (B) 1 (C) 2 (D) 4 (E) does not exist
Mat 1120 Calculus Test 2. October 18, 2001 Your name Te multiple coice problems count 4 points eac. In te multiple coice section, circle te correct coice (or coices). You must sow your work on te oter
More information5.1 We will begin this section with the definition of a rational expression. We
Basic Properties and Reducing to Lowest Terms 5.1 We will begin tis section wit te definition of a rational epression. We will ten state te two basic properties associated wit rational epressions and go
More information4.2 - Richardson Extrapolation
. - Ricardson Extrapolation. Small-O Notation: Recall tat te big-o notation used to define te rate of convergence in Section.: Definition Let x n n converge to a number x. Suppose tat n n is a sequence
More informationAVL trees. AVL trees
Dnamic set DT dnamic set DT is a structure tat stores a set of elements. Eac element as a (unique) ke and satellite data. Te structure supports te following operations. Searc(S, k) Return te element wose
More informationSolving Continuous Linear Least-Squares Problems by Iterated Projection
Solving Continuous Linear Least-Squares Problems by Iterated Projection by Ral Juengling Department o Computer Science, Portland State University PO Box 75 Portland, OR 977 USA Email: juenglin@cs.pdx.edu
More informationDifferentiation in higher dimensions
Capter 2 Differentiation in iger dimensions 2.1 Te Total Derivative Recall tat if f : R R is a 1-variable function, and a R, we say tat f is differentiable at x = a if and only if te ratio f(a+) f(a) tends
More informationCharacterization of reducible hexagons and fast decomposition of elementary benzenoid graphs
Discrete Applied Matematics 156 (2008) 1711 1724 www.elsevier.com/locate/dam Caracterization of reducible exagons and fast decomposition of elementary benzenoid graps Andrej Taranenko, Aleksander Vesel
More informationAnalytic Functions. Differentiable Functions of a Complex Variable
Analytic Functions Differentiable Functions of a Complex Variable In tis capter, we sall generalize te ideas for polynomials power series of a complex variable we developed in te previous capter to general
More informationImproved Algorithms for Largest Cardinality 2-Interval Pattern Problem
Journal of Combinatorial Optimization manuscript No. (will be inserted by te editor) Improved Algoritms for Largest Cardinality 2-Interval Pattern Problem Erdong Cen, Linji Yang, Hao Yuan Department of
More informationThe Krewe of Caesar Problem. David Gurney. Southeastern Louisiana University. SLU 10541, 500 Western Avenue. Hammond, LA
Te Krewe of Caesar Problem David Gurney Souteastern Louisiana University SLU 10541, 500 Western Avenue Hammond, LA 7040 June 19, 00 Krewe of Caesar 1 ABSTRACT Tis paper provides an alternative to te usual
More informationPolynomials 3: Powers of x 0 + h
near small binomial Capter 17 Polynomials 3: Powers of + Wile it is easy to compute wit powers of a counting-numerator, it is a lot more difficult to compute wit powers of a decimal-numerator. EXAMPLE
More informationHOMEWORK HELP 2 FOR MATH 151
HOMEWORK HELP 2 FOR MATH 151 Here we go; te second round of omework elp. If tere are oters you would like to see, let me know! 2.4, 43 and 44 At wat points are te functions f(x) and g(x) = xf(x)continuous,
More informationlecture 26: Richardson extrapolation
43 lecture 26: Ricardson extrapolation 35 Ricardson extrapolation, Romberg integration Trougout numerical analysis, one encounters procedures tat apply some simple approximation (eg, linear interpolation)
More informationCSCE 478/878 Lecture 2: Concept Learning and the General-to-Specific Ordering
Outline Learning from eamples CSCE 78/878 Lecture : Concept Learning and te General-to-Specific Ordering Stepen D. Scott (Adapted from Tom Mitcell s slides) General-to-specific ordering over ypoteses Version
More informationA = h w (1) Error Analysis Physics 141
Introduction In all brances of pysical science and engineering one deals constantly wit numbers wic results more or less directly from experimental observations. Experimental observations always ave inaccuracies.
More informationLIMITS AND DERIVATIVES CONDITIONS FOR THE EXISTENCE OF A LIMIT
LIMITS AND DERIVATIVES Te limit of a function is defined as te value of y tat te curve approaces, as x approaces a particular value. Te limit of f (x) as x approaces a is written as f (x) approaces, as
More informationA MONTE CARLO ANALYSIS OF THE EFFECTS OF COVARIANCE ON PROPAGATED UNCERTAINTIES
A MONTE CARLO ANALYSIS OF THE EFFECTS OF COVARIANCE ON PROPAGATED UNCERTAINTIES Ronald Ainswort Hart Scientific, American Fork UT, USA ABSTRACT Reports of calibration typically provide total combined uncertainties
More informationGeneric maximum nullity of a graph
Generic maximum nullity of a grap Leslie Hogben Bryan Sader Marc 5, 2008 Abstract For a grap G of order n, te maximum nullity of G is defined to be te largest possible nullity over all real symmetric n
More information2011 Fermat Contest (Grade 11)
Te CENTRE for EDUCATION in MATHEMATICS and COMPUTING 011 Fermat Contest (Grade 11) Tursday, February 4, 011 Solutions 010 Centre for Education in Matematics and Computing 011 Fermat Contest Solutions Page
More informationOptimal parameters for a hierarchical grid data structure for contact detection in arbitrarily polydisperse particle systems
Comp. Part. Mec. 04) :357 37 DOI 0.007/s4057-04-000-9 Optimal parameters for a ierarcical grid data structure for contact detection in arbitrarily polydisperse particle systems Dinant Krijgsman Vitaliy
More information1 + t5 dt with respect to x. du = 2. dg du = f(u). du dx. dg dx = dg. du du. dg du. dx = 4x3. - page 1 -
Eercise. Find te derivative of g( 3 + t5 dt wit respect to. Solution: Te integrand is f(t + t 5. By FTC, f( + 5. Eercise. Find te derivative of e t2 dt wit respect to. Solution: Te integrand is f(t e t2.
More informationThese errors are made from replacing an infinite process by finite one.
Introduction :- Tis course examines problems tat can be solved by metods of approximation, tecniques we call numerical metods. We begin by considering some of te matematical and computational topics tat
More informationA.P. CALCULUS (AB) Outline Chapter 3 (Derivatives)
A.P. CALCULUS (AB) Outline Capter 3 (Derivatives) NAME Date Previously in Capter 2 we determined te slope of a tangent line to a curve at a point as te limit of te slopes of secant lines using tat point
More informationIntroduction to Derivatives
Introduction to Derivatives 5-Minute Review: Instantaneous Rates and Tangent Slope Recall te analogy tat we developed earlier First we saw tat te secant slope of te line troug te two points (a, f (a))
More informationRecall from our discussion of continuity in lecture a function is continuous at a point x = a if and only if
Computational Aspects of its. Keeping te simple simple. Recall by elementary functions we mean :Polynomials (including linear and quadratic equations) Eponentials Logaritms Trig Functions Rational Functions
More informationDerivatives. By: OpenStaxCollege
By: OpenStaxCollege Te average teen in te United States opens a refrigerator door an estimated 25 times per day. Supposedly, tis average is up from 10 years ago wen te average teenager opened a refrigerator
More informationLecture 15. Interpolation II. 2 Piecewise polynomial interpolation Hermite splines
Lecture 5 Interpolation II Introduction In te previous lecture we focused primarily on polynomial interpolation of a set of n points. A difficulty we observed is tat wen n is large, our polynomial as to
More informationNotes on wavefunctions II: momentum wavefunctions
Notes on wavefunctions II: momentum wavefunctions and uncertainty Te state of a particle at any time is described by a wavefunction ψ(x). Tese wavefunction must cange wit time, since we know tat particles
More informationTeaching Differentiation: A Rare Case for the Problem of the Slope of the Tangent Line
Teacing Differentiation: A Rare Case for te Problem of te Slope of te Tangent Line arxiv:1805.00343v1 [mat.ho] 29 Apr 2018 Roman Kvasov Department of Matematics University of Puerto Rico at Aguadilla Aguadilla,
More informationHOW TO DEAL WITH FFT SAMPLING INFLUENCES ON ADEV CALCULATIONS
HOW TO DEAL WITH FFT SAMPLING INFLUENCES ON ADEV CALCULATIONS Po-Ceng Cang National Standard Time & Frequency Lab., TL, Taiwan 1, Lane 551, Min-Tsu Road, Sec. 5, Yang-Mei, Taoyuan, Taiwan 36 Tel: 886 3
More informationTime (hours) Morphine sulfate (mg)
Mat Xa Fall 2002 Review Notes Limits and Definition of Derivative Important Information: 1 According to te most recent information from te Registrar, te Xa final exam will be eld from 9:15 am to 12:15
More information7.1 Using Antiderivatives to find Area
7.1 Using Antiderivatives to find Area Introduction finding te area under te grap of a nonnegative, continuous function f In tis section a formula is obtained for finding te area of te region bounded between
More informationLATTICE EXIT MODELS S. GILL WILLIAMSON
LATTICE EXIT MODELS S. GILL WILLIAMSON ABSTRACT. We discuss a class of problems wic we call lattice exit models. At one level, tese problems provide undergraduate level exercises in labeling te vertices
More informationThe Complexity of Computing the MCD-Estimator
Te Complexity of Computing te MCD-Estimator Torsten Bernolt Lerstul Informatik 2 Universität Dortmund, Germany torstenbernolt@uni-dortmundde Paul Fiscer IMM, Danisc Tecnical University Kongens Lyngby,
More informationLines, Conics, Tangents, Limits and the Derivative
Lines, Conics, Tangents, Limits and te Derivative Te Straigt Line An two points on te (,) plane wen joined form a line segment. If te line segment is etended beond te two points ten it is called a straigt
More informationSection 3: The Derivative Definition of the Derivative
Capter 2 Te Derivative Business Calculus 85 Section 3: Te Derivative Definition of te Derivative Returning to te tangent slope problem from te first section, let's look at te problem of finding te slope
More informationRECOGNITION of online handwriting aims at finding the
SUBMITTED ON SEPTEMBER 2017 1 A General Framework for te Recognition of Online Handwritten Grapics Frank Julca-Aguilar, Harold Moucère, Cristian Viard-Gaudin, and Nina S. T. Hirata arxiv:1709.06389v1 [cs.cv]
More informationMath 312 Lecture Notes Modeling
Mat 3 Lecture Notes Modeling Warren Weckesser Department of Matematics Colgate University 5 7 January 006 Classifying Matematical Models An Example We consider te following scenario. During a storm, a
More information232 Calculus and Structures
3 Calculus and Structures CHAPTER 17 JUSTIFICATION OF THE AREA AND SLOPE METHODS FOR EVALUATING BEAMS Calculus and Structures 33 Copyrigt Capter 17 JUSTIFICATION OF THE AREA AND SLOPE METHODS 17.1 THE
More informationOn convexity of polynomial paths and generalized majorizations
On convexity of polynomial pats and generalized majorizations Marija Dodig Centro de Estruturas Lineares e Combinatórias, CELC, Universidade de Lisboa, Av. Prof. Gama Pinto 2, 1649-003 Lisboa, Portugal
More information4. The slope of the line 2x 7y = 8 is (a) 2/7 (b) 7/2 (c) 2 (d) 2/7 (e) None of these.
Mat 11. Test Form N Fall 016 Name. Instructions. Te first eleven problems are wort points eac. Te last six problems are wort 5 points eac. For te last six problems, you must use relevant metods of algebra
More informationPre-Calculus Review Preemptive Strike
Pre-Calculus Review Preemptive Strike Attaced are some notes and one assignment wit tree parts. Tese are due on te day tat we start te pre-calculus review. I strongly suggest reading troug te notes torougly
More informationMathematics 5 Worksheet 11 Geometry, Tangency, and the Derivative
Matematics 5 Workseet 11 Geometry, Tangency, and te Derivative Problem 1. Find te equation of a line wit slope m tat intersects te point (3, 9). Solution. Te equation for a line passing troug a point (x
More informationTHE IDEA OF DIFFERENTIABILITY FOR FUNCTIONS OF SEVERAL VARIABLES Math 225
THE IDEA OF DIFFERENTIABILITY FOR FUNCTIONS OF SEVERAL VARIABLES Mat 225 As we ave seen, te definition of derivative for a Mat 111 function g : R R and for acurveγ : R E n are te same, except for interpretation:
More informationLearning based super-resolution land cover mapping
earning based super-resolution land cover mapping Feng ing, Yiang Zang, Giles M. Foody IEEE Fellow, Xiaodong Xiuua Zang, Siming Fang, Wenbo Yun Du is work was supported in part by te National Basic Researc
More informationDerivatives of Exponentials
mat 0 more on derivatives: day 0 Derivatives of Eponentials Recall tat DEFINITION... An eponential function as te form f () =a, were te base is a real number a > 0. Te domain of an eponential function
More informationPolynomial Interpolation
Capter 4 Polynomial Interpolation In tis capter, we consider te important problem of approximatinga function fx, wose values at a set of distinct points x, x, x,, x n are known, by a polynomial P x suc
More informationQuantum Mechanics Chapter 1.5: An illustration using measurements of particle spin.
I Introduction. Quantum Mecanics Capter.5: An illustration using measurements of particle spin. Quantum mecanics is a teory of pysics tat as been very successful in explaining and predicting many pysical
More informationQuaternion Dynamics, Part 1 Functions, Derivatives, and Integrals. Gary D. Simpson. rev 01 Aug 08, 2016.
Quaternion Dynamics, Part 1 Functions, Derivatives, and Integrals Gary D. Simpson gsim1887@aol.com rev 1 Aug 8, 216 Summary Definitions are presented for "quaternion functions" of a quaternion. Polynomial
More informationThe Verlet Algorithm for Molecular Dynamics Simulations
Cemistry 380.37 Fall 2015 Dr. Jean M. Standard November 9, 2015 Te Verlet Algoritm for Molecular Dynamics Simulations Equations of motion For a many-body system consisting of N particles, Newton's classical
More information(4.2) -Richardson Extrapolation
(.) -Ricardson Extrapolation. Small-O Notation: Recall tat te big-o notation used to define te rate of convergence in Section.: Suppose tat lim G 0 and lim F L. Te function F is said to converge to L as
More informationSolutions to the Multivariable Calculus and Linear Algebra problems on the Comprehensive Examination of January 31, 2014
Solutions to te Multivariable Calculus and Linear Algebra problems on te Compreensive Examination of January 3, 24 Tere are 9 problems ( points eac, totaling 9 points) on tis portion of te examination.
More informationNotes on Neural Networks
Artificial neurons otes on eural etwors Paulo Eduardo Rauber 205 Consider te data set D {(x i y i ) i { n} x i R m y i R d } Te tas of supervised learning consists on finding a function f : R m R d tat
More informationMAT Calculus for Engineers I EXAM #1
MAT 65 - Calculus for Engineers I EXAM # Instructor: Liu, Hao Honor Statement By signing below you conrm tat you ave neiter given nor received any unautorized assistance on tis eam. Tis includes any use
More informationMA119-A Applied Calculus for Business Fall Homework 4 Solutions Due 9/29/ :30AM
MA9-A Applied Calculus for Business 006 Fall Homework Solutions Due 9/9/006 0:0AM. #0 Find te it 5 0 + +.. #8 Find te it. #6 Find te it 5 0 + + = (0) 5 0 (0) + (0) + =.!! r + +. r s r + + = () + 0 () +
More informationMA455 Manifolds Solutions 1 May 2008
MA455 Manifolds Solutions 1 May 2008 1. (i) Given real numbers a < b, find a diffeomorpism (a, b) R. Solution: For example first map (a, b) to (0, π/2) and ten map (0, π/2) diffeomorpically to R using
More informationCopyright c 2008 Kevin Long
Lecture 4 Numerical solution of initial value problems Te metods you ve learned so far ave obtained closed-form solutions to initial value problems. A closedform solution is an explicit algebriac formula
More informationOrder of Accuracy. ũ h u Ch p, (1)
Order of Accuracy 1 Terminology We consider a numerical approximation of an exact value u. Te approximation depends on a small parameter, wic can be for instance te grid size or time step in a numerical
More information(a) At what number x = a does f have a removable discontinuity? What value f(a) should be assigned to f at x = a in order to make f continuous at a?
Solutions to Test 1 Fall 016 1pt 1. Te grap of a function f(x) is sown at rigt below. Part I. State te value of eac limit. If a limit is infinite, state weter it is or. If a limit does not exist (but is
More informationMATH1131/1141 Calculus Test S1 v8a
MATH/ Calculus Test 8 S v8a October, 7 Tese solutions were written by Joann Blanco, typed by Brendan Trin and edited by Mattew Yan and Henderson Ko Please be etical wit tis resource It is for te use of
More informationA Reconsideration of Matter Waves
A Reconsideration of Matter Waves by Roger Ellman Abstract Matter waves were discovered in te early 20t century from teir wavelengt, predicted by DeBroglie, Planck's constant divided by te particle's momentum,
More informationCubic Functions: Local Analysis
Cubic function cubing coefficient Capter 13 Cubic Functions: Local Analysis Input-Output Pairs, 378 Normalized Input-Output Rule, 380 Local I-O Rule Near, 382 Local Grap Near, 384 Types of Local Graps
More informationDomination Problems in Nowhere-Dense Classes of Graphs
LIPIcs Leibniz International Proceedings in Informatics Domination Problems in Nowere-Dense Classes of Graps Anuj Dawar 1, Stepan Kreutzer 2 1 University of Cambridge Computer Lab, U.K. anuj.dawar@cl.cam.ac.uk
More informationNUMERICAL DIFFERENTIATION. James T. Smith San Francisco State University. In calculus classes, you compute derivatives algebraically: for example,
NUMERICAL DIFFERENTIATION James T Smit San Francisco State University In calculus classes, you compute derivatives algebraically: for example, f( x) = x + x f ( x) = x x Tis tecnique requires your knowing
More informationThe Derivative The rate of change
Calculus Lia Vas Te Derivative Te rate of cange Knowing and understanding te concept of derivative will enable you to answer te following questions. Let us consider a quantity wose size is described by
More information158 Calculus and Structures
58 Calculus and Structures CHAPTER PROPERTIES OF DERIVATIVES AND DIFFERENTIATION BY THE EASY WAY. Calculus and Structures 59 Copyrigt Capter PROPERTIES OF DERIVATIVES. INTRODUCTION In te last capter you
More informationWYSE Academic Challenge 2004 Sectional Mathematics Solution Set
WYSE Academic Callenge 00 Sectional Matematics Solution Set. Answer: B. Since te equation can be written in te form x + y, we ave a major 5 semi-axis of lengt 5 and minor semi-axis of lengt. Tis means
More informationFinancial Econometrics Prof. Massimo Guidolin
CLEFIN A.A. 2010/2011 Financial Econometrics Prof. Massimo Guidolin A Quick Review of Basic Estimation Metods 1. Were te OLS World Ends... Consider two time series 1: = { 1 2 } and 1: = { 1 2 }. At tis
More informationChapter 5 FINITE DIFFERENCE METHOD (FDM)
MEE7 Computer Modeling Tecniques in Engineering Capter 5 FINITE DIFFERENCE METHOD (FDM) 5. Introduction to FDM Te finite difference tecniques are based upon approximations wic permit replacing differential
More information64 IX. The Exceptional Lie Algebras
64 IX. Te Exceptional Lie Algebras IX. Te Exceptional Lie Algebras We ave displayed te four series of classical Lie algebras and teir Dynkin diagrams. How many more simple Lie algebras are tere? Surprisingly,
More informationProbabilistic Graphical Models Homework 1: Due January 29, 2014 at 4 pm
Probabilistic Grapical Models 10-708 Homework 1: Due January 29, 2014 at 4 pm Directions. Tis omework assignment covers te material presented in Lectures 1-3. You must complete all four problems to obtain
More information1 1. Rationalize the denominator and fully simplify the radical expression 3 3. Solution: = 1 = 3 3 = 2
MTH - Spring 04 Exam Review (Solutions) Exam : February 5t 6:00-7:0 Tis exam review contains questions similar to tose you sould expect to see on Exam. Te questions included in tis review, owever, are
More information