A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number

Size: px
Start display at page:

Download "A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number"

Transcription

1 Research Journal of Applied Sciences, Engineering and Technology 4(23): , 202 ISSN: Maxwell Scientific Organization, 202 Subitted: April 25, 202 Accepted: May 3, 202 Published: Deceber 0, 202 A Generalized Peranent Estiator and its Application in oputing Multi- Hoogeneous Bézout Nuber Hassan M.S. Bawazir, 2 Ali Abd Rahan and 2 Nor aini binti Aris Departent of Matheatics, Faculty of Education, Hadhraout University of Science and Technology, Seiyun, Hadhraout, Yeen 2 Departent of Matheatics, Faculty of Science, Universiti Teknologi Malaysia, Malaysia Abstract: The peranent of a atrix has any applications in any fields. Its coputation is #P-coplete. The coputation of exact peranent large-scale atrices is very costly in ters of eory and tie. There is a real need for an efficient ethod to deal well with such situations. This study designs a general algorith for estiating the peranents of the coplex square or non-square atrices. We prove that the Multi- Hoogeneous Bézout Nuber (MHBN) can be estiated efficiently using the new algorith. Further, a proposition that provides soe analytic results is presented and proved. The analytic results show the effectiveness and the efficiency of our algorith over soe recent ethods. Furtherore, with the new algorith we can control the accuracy as we need. A large aount of nuerical results are presented in this study. By applying the algorith that estiates MHBN we extend the applicability of the algorith. Keywords: Multi-hoogeneous bézout nuber, peranent, polynoial syste, rando path INTRODUTION The peranent of a atrix is very iportant and has any applications. Its coputation is #P-coplete (Liang et al., 2007). The coputation of exact peranent of large or even oderate atrices is very costly in ters of eory and tie. There is a real need for an efficient ethod to deal well with such situations. Liang et al. (2007) presented an estiator of peranents of square 0-atrices. In this study we present a general estiator, which can estiate the peranent of any atrix, square or non-square, integer atrix or even general coplex atrix, the focus will be on non-negative real atrices. With the new ethod we can deal very efficiently with large-scale atrices and we can control the accuracy as we need. An application of the new ethod is the estiation of MHBN. In this case we recognize the proble fro two sides. Firstly, MHBN of a ultivariate polynoial syste is an estiation of the nuber of isolated solutions of the syste and it is also the nuber of solution paths that can be traced to reach all isolated solutions. A polynoial syste can be hoogenized in any ways, each giving its own MHBN. The space of all ways of hoogenizing the syste (variable partitions) increases exponentially as the syste size grows, this proble is an NP-hard proble (Malaovich and Meer, 2007); we dealt with this proble in details in Bawazir and Abd Rahan (200). Secondly, the coputation of an MHBN at a fixed partition, especially when such a partition has a nuber of eleents close to the syste size, is equivalent to coputing the peranent of a atrix (Verschelde, 996). By Liang et al. (2007) such a proble is #P-coplete. In this study we will focus on coputing the MHBN at a fixed partition as an application of the general estiator of the peranents. The Multi-Hoogeneous Bézout Nuber (MHBN): onsider the ultivariate polynoial syste: F(x) = f (x), f 2 (x),, f n (x)) () where, x(x, x 2,, x n )0 n Let z = {z, z 2,, z } be an -partition of the unknowns X = {x, x 2,., x n } where, z = {z, z 2,, z k }, =, 2,,. =, 2,, Define the degree atrix of the syste F(x) = 0 as the following: d d2 K d d2 d22 K d2 D = d d K d n n2 n (2) orresponding Author: Hassan M.S. Bawazir, Departent of Matheatics, Faculty of Education, Hadhraout University of Science and Technology, Seiyun, Hadhraout, Yeen 5206

2 Res. J. Appl. Sci. Eng. Technol., 4(23): , 202 where, d i is the degree of polynoial f i w.r.t. the variable z. The degree polynoial of F w.r.t. the partition z is defined as: D i = i n f ( y) = d y The -Multi-Hoogeneous Bézout Nuber (or in short -MHBN) of F w.r.t. the partition z equals the coefficient of the onoial y k = y k y k2 2 y k in the degree polynoial f D (y), (3) and denoted by B, where k = (k, k 2,, k ) with k = #(z ), =, 2,, and k = n. = RELATIVE METHODOLOGY (3) Expanding the degree polynoial, (3), is called Basic Algorith (BA) (Wapler, 992). It is easy to find that BA has: N = ni k i ters (Also the nuber of addition operations), where n = n and n i = n i- -k i- for i = 2, 3,, n. This nuber N ranges fro N = for a -MHBN up to N = n for an n- MHBN, i.e., = n. In the following we describe two algoriths provided by Wapler (992). The first is the Row Expansion algorith (RE) and the second is the Row Expansion with Meory (REM). For RE, consider the degree atrix (2), D, first in row of D, suppose we choose eleent d, to coplete the degree product we ust choose only one eleent fro each of the reaining rows and only k eleents fro the th colun, so this procedure can be done by applying the sae steps on a inor atrix derived fro the atrix D by eliinating the row and the colun, denote this procedure by B(D, k-e, ), where e is the th row of the identity atrix of degree. Then, the row expansion algorith coputes the Bézout nuber as the su along the first row expansion procedure and can be expressed by the following recursive relation: BDki (,, ) = i =, k 0, if i = n + d B( D, k e, i + ), otherwise (4) where, -MHBN is B(D, k, ). This forula coputes directly the appropriate coefficient, i.e., -MHBN, so it saves the operations in coparison to expanding the degree polynoial (3). By Wapler (992), for the ost expensive case, = n, we have k i =, I =, 2,, n and the nuber of ultiplications coes to be (/!+/2!+ + /(n!)!)n!. As n increases, this rapidly approaches (e-)n!. Table : P tie for coputing MHBN using RE n Tie: t(n)(sec) Tie (in) t(n)/t(n-) Table 2: P tie for coputing MHBN using REM n Tie: t(n)(sec) Tie (in) t(n)/t(n-) For the row expansion with eory REM, Wapler (992) uses the sae recursive relation (4) with giving consideration to the repeated subtotals as shown fro the following exaple. Exaple : Let n = 4, = 2 and k = (2, 2). Using BA Bézout nuber B is: B = d d 2 d 32 d 42 +d d 22 d 3 d 42 +d d 22 d 32 d 4 +d 2 d 2 d 3 d 42 +d 2 d 2 d 32 d 4 +d 2 d 22 d 3 d 4 which uses 8 ultiplications. Using RE, the following is obtained: B = d (d 2 d 32 d 42 +d 22 (d 3 d 42 +d 32 d 4 ) +d 2 (d 2 (d 3 d 42 +d 32 d 4 )+d 22 d 3 d 4 ) which uses only 2 ultiplies. We note that the expression B(D, (, ), 3) = d 3 d 42 +d 32 d 4 appears twice by both B(D, (, 2), 2) and B(D, (2, ), 2), so REM,avoids such cases. Thus, REM requires a eory array of diension (k +) (k 2 +)... (k +). The nuber of ultiplications in the worst case = n is n2 n- which is uch saller than that of RE. This iproveent coes at the expense of a eory array that in the worst case has 2 n (Wapler, 992 ). We have done soe nuerical experients to show the cost of Wapler s ethods. Table and 2 show the P tie for coputing n!mhbn of the known cyclic n!roots proble by using RE and REM respectively. The algoriths are ipleented in MATLAB and executed on a personal coputer with Intel (R) Pentiu (R) Dual PU E GHz PU and 2.00 GB of RAM. Fro the fourth colun of the Table, we conclude that the tie devoted using RE at step n is about n ties the tie devoted in the step (n!), this is consistent with the analysis of the algorith RE. Fro this observation we can estiate the tie at n = 20 by h or onths. By the sae way, fro Table 2, the tie devoted at step n using REM is about double the tie at step n! by which we conclude that we need about 34 days to copute (n = 30) n-mhbn of such a proble. Further, the best recent algorith REM cannot be applicable for the case n>27 in such a P, because it cannot provide a eory array larger than 2 27 eleents. The recent ethods for iniizing Bézout nuber such as Genetic Algorith (Yan et al., 2008) used RE and 5207

3 Res. J. Appl. Sci. Eng. Technol., 4(23): , 202 REM algoriths for finding the iniu MHBN for oderate systes up to n =. Fro such cases, we conclude that there is a need to use efficient ethods to deal well with large-scale systes. Liang et al. (2007) presented an estiator of the peranents of the square 0-atrices; it is called rando path and shortly RP. This estiator is built up on the estiator of Rasussen (994) by adding the colun pivoting property. In this study we construct a general peranent estiator over RP. The new one is constructed for estiating the peranent of square or non-square atrices. Furtherore, it can be applicable for coputing MHBN. In the following we state in short about RP algorith. Rando path ethod: The peranent of an n n atrix A = (a i ) is defined by: Per ( A) = a i γ () i n γ (5) where, ( ranges over all perutations of {, 2,, n}. The definition of the peranent looks siilar to the definition of the deterinant of the atrix, but it is harder to copute. Using the Gauss eliination ethod, we convert the original atrix into an upper triangular atrix, as a result the deterinant of the original atrix is equal to the product of the diagonal eleents of the converted one and this property akes the coputation of the deterinant easier. There is no such property in the case of the peranent coputation. onsider an n n atrix A = (a i ) with entries 0, Define: M = {i: a i =, # i #n}, =, 2,, n. Naely, M is the set of the row indices of nonzero eleents in the th colun of the atrix A. Definition : Liang et al. (2007) A perutation ( = (i, i 2,, i n ) is called rando path of the atrix A, if there exists ##n, such that = = for t =, 2,, and t = a it t M + \ {i t } = i. Rando path with = n is called a feasible path; while that with < n is called a broken path. Definition 2: Liang et al. (2007) The path value of a feasible path ( = (i, i 2,,, i n ) is defined as M ( = M M 2 \{i } M n \{i, i 2,,, i n- } where M i is the nuber of the eleents in the set M i. Here is the RP algorith. Algorith : Liang et al. (2007) Rando Path algorith (RP). Input: A- an n n 0- atrix, M =, I = i. Output: X A - the estiate for Per(A). Step : For = to n t = Select c such that M c \ {a t } = in s0{,, n = }\I{ M s \ t {at} }; I = I c{c } hoose a fro Mc\c - t = {a t } uniforly at rando; M = M M c \c - t = {a t }. End Step 2: Generate X A = M. General Rando Path Algorith (GRPA): To establish our algorith we first present soe necessary concepts. Definition 3: Let A = (a i ) any coplex atrix of degree n, where ##n, let k = (k, k 2,, k )0N where ki = n. We define the peranent of the atrix A with respect to the vector k as the following: ki Per ( A) = a ( ) γ = γ i i (6) where, ( = (( (), ( (2),, ( () ) with ( (i) = (( (i), ( 2 (i),, ( (i) ki) ranges over all perutations of {, 2,, n} such that ( (i) ( () = i for all i,#i, #. If > nthen for suitable vector k we define Per(A) as the peranent of its transpose. We find that the peranent of a square atrix is a special case fro Definition 3 with = n and k = (,,,). Furtherore, this definition is consistent with the definition of -MHBN, B, so B is considered as a special peranent as following: Let A = D the degree atrix with k = (k, k 2,, k ) the vector that holds the cardinalities of the partition sets of the variables, so B = Per(D, k). onsider an n coplex atrix A = (a i ). Define: M = {i: a i 0, #i #n}, =, 2,,. Naely, M is the set of the row indices of nonzero eleents in the th colun of the atrix A. Let k = (k, k 2,, k )0N with ki = n. For s >, M s = Ø. Definition 4: A perutation ( = (( (), ( (2),, ( () ) of {, 2,, n} with ( (i) = (( (i), ( (i) 2,, ( (i) ki) is called a general rando path of the atrix A, if there exists # #, such that a ( ) 0 for t =, 2,, k i, i =,, and γ i t i M + \{( (i) t: t =,, k i, i =,, }=i. Rando path with = is called a feasible path; while that with < is called a broken path. 5208

4 Res. J. Appl. Sci. Eng. Technol., 4(23): , 202 Definition 5: The path value of a feasible path ( = (( (), ( i ) ( k ) i ( (2),, ( () ) with γ () i γ γ () i,,..., γ () i is defined s k i = γ () i = 2 i ki as s = a where s i = M i \{( (r) i t: t =,, k r, ( ) si si! r =,, i!} and =. ki ( ki)(! si ki)! For the illustration of the previous concepts we consider the following exaple. Exaple 2: onsider the following atrix: A = Suppose we need to find Per(A, k) with k = (2, 2, ) then by the definitions 4, 5 the following are two general rando paths and their values: (( (i), ( () 2, ( (2), ( (2) 2, ( (3) ) = (, 5, 2, 3, 4) and its value is: s s2 s3 a a a a a 2 2 k k 2 k3 4 ( )( ) = 2 ()() () = [()( 6 2)() ][()()() 5 ][( )( 2) ] = 20 ( ) ( ) ( ) ( ) ( 3) γ γ γ γ γ (( (),( () 2, ( (2), ( (2) 2,( (3) ) = (, 2, 3, 5, 4, ) and its value is: s () k a a s2 s3 γ ( ) a 2 a 2 a 3 2 ( ) ( ) k 2 ( ) γ 2 k γ γ 3 γ = 2 ( )( ) ( )( ) ( ) = [( 6) ( 2)( ) ][( )( )( 2) ][( )( 2) ] = 48 In the following we establish our algorith. Algorith 2: General Rando Path Algorith (GRPA). Input: -A -an n coplex atrix: k = (k, k 2, k )0ù with k i = n N 0 ù and M = 0 Output: E (A, k) - the estiate for Per(A, k). Step : Rearrange the coluns of A such that: M # M 2 # # M Step 2: For i = to N For = to hoose {( () ( ),, γ k } fro M \{( (r) w :w =,, k r, r =,,!} uniforly at rando. k Set a = 0, then a = a t = γ ( t ) s Set b = 0, then b = where s k as in Definition 5. End M = M + a b = End M = M/N Step 3: E (A, k) = M Proposition : Algorith 2 requires n + n eory variables, which can be reduced to n + n Proof: A is an array of n diension, the vector ( = (( (),( (2),, ( () ), with ( (i) = (( (i),( (i) () i 2,, ( ) for i =, 2,,, is of diension k + k2 + + k = n, (k, k 2,, k ) is of diension. Further, (s, s 2,,s ), (a, a 2,, a ) and (b, b 2,, b ) have a total of 3 eory variables, in this case we can use ust 3 variables s, a and b instead of 3 variables by accuulating the product in the second For loop of the algorith. Furtherore we have +2 variables (M, M 2,, M ), M and N. Therefore we have in total n + n n = n eory variables which can be reduced to n + n eory variables. We note that in the worst case = n, Algorith 2 requires n n + 5 eory variables. RESULTS AND DISUSSION Nuerical results are given for twelve different polynoial systes ranges fro size 0 up to 20. For each syste we pick up 00 variable partitions, taken at rando. The algorith 2 (GRPA) is used to estiate their MHBNs. The algorith is ipleented for two levels of accuracy N = 00 and N = 000. The results are copared with exact solutions, which are coputed firstly using REM. The algoriths are ipleented in MATLAB and executed on a personal coputer with Intel (R) Pentiu (R) Dual PU E GHz PU and 2.00 GB of RAM. ki 5209

5 Res. J. Appl. Sci. Eng. Technol., 4(23): , 202 We considered four types of polynoial systes as following: cyclic n-roots proble (Börck and Fröberg, 99), econoic n proble (Morgan, 987), noon n proble (Noonberg, 989) and reduced cyclic n proble (Verschelde, 996). The Table 3, 4, 5, 6, 7, 8, 9 and 0 show the percentages that relative errors of the coputational results fall into in the specific ranges. Each table shows the results for three systes of sizes 0, 5 and 20. The last colun of each table, which is denoted by % represents the percentage of the P tie using GRPA to the P tie using REM. The Table 3 and 4 are for the cyclic n polynoial syste; they are for two accuracy levels N=00, 000 respectively, while the Table 5 and 6 are for the econoic n polynoial syste, which are for two accuracy levels N=00, 000, respectively. The results of the noon n polynoial syste are in the Table 7 and 8 for two levels of accuracy, N = 00,000. Finally, the Table 9 and 0 are for the reduced cyclic n polynoial syste for two accuracy levels N = 00,000, respectively. We have three notes here. Firstly, in the case of the size of the syste being sall, say 0, using GRPA with accuracy N = 000, we note that the consuing tie by GRPA is bigger than that of REM, refer to the first row in the Table 4, 6, 8 and 0, but soeties in sall systes it is enough to take the level of accuracy as N = 00, refer to the first row in the Table 3, 5, 7 and 9. Secondly, for those systes with size larger than 0 say 5, 20 as in our exaples, the consuing tie by GRPA is uch saller than that of REM even with using high accuracy N = 000, refer to the second and third rows in the Table 3, 4, 5, 6, 7, 8, 9 and 0. Thirdly, for large systes, we note that the tie consued by GRPA becoes saller and saller Table 3: GRPA results for cyclic n proble with N=00 < n tie tie % s 43 s s 5 2 s s 6 h 3 34 s 0.9 Table 4: GRPA results for cyclic n proble with N=000 n tie tie % s 43 s s 5 2 s s 6 h 3 34 s.90 Table 5: GRPA results for econoic n proble with N=00. n tie tie % s 40 s s 7 5 s s 5 h s 0.2 Table 6: GRPA results for econoic n proble with N = 000. n tie tie % s 40 s s s 5 h s 2.06 Table 7: GRPA results for noon n proble with N = 00. n tie tie % s 43 s s 6 29 s s 5 h s 0.22 Table 8: GRPA results for noon n proble with N=000. n tie tie % s 43 s s 6 29 s s 5 h s 2.2 Table 9: GRPA results for reduced cyclic n proble with N = 00. n tie tie % s 40 s s 5 6 s s 5 h 56 9 s 0.2 Table 0: GRPA results for reduced cyclic n proble with N = 000 < n tie tie % s 40 s s 5 6 s s 5 h 56 9 s 2.03 copared with that of REM as syste size increases, refer to the last colun in the Table 3, 4, 5, 6, 7, 8, 9 and 0. This colun reflects the percentage of GRPA Tie to REM Tie. The nuerical result shows that with GRPA we can save uch tie copared with REM. The euciency increases exponentially as the syste size grows; for exaple, for a syste of size n = 0, GRPA estiates MHBN in about 53% of the tie needed by REM which is the best of the recent ethods; while for a syste of size n = 20 we need ust about 2% of that of REM. onsequently, the speed up of GRPA ipleentation becoes higher and higher as the syste size grows. Further, in the worst case when = n, GRPA requires only n 2 + 3n + 5eory variables, this is by Proposition, while REM requires 2 n eory variables, in other words, the eory storage needed by REM increases exponentially while that of GRPA increases in polynoial tie. Therefore GRPA is an eucient tool for handling the coputation of MHBNs for large systes and when REM becoes intractable or ipossible. 520

6 Res. J. Appl. Sci. Eng. Technol., 4(23): , 202 ONLUSION A General Rando Path Algorith (GRPA) for approxiating the peranent of a general coplex atrix is proposed in this study. The GRPA is constructed as a general algorith (ethod) over RP algorith. RP algorith is used for approxiating the peranent of square 0- atrices while GRPA estiates the peranent of square or non-square coplex atrices. The new algorith has been applied successfully in a new application field, that is the coputation of MHBN, which is considered as a special case of the general peranent. The large aount of nuerical results in the previous section shows considerable accuracy of estiating MHBN. The ethod is flexible in controlling the accuracy. Further, the presented proposition proves analytically the effectiveness and the efficiency of our ethod over soe recent ethods. AKNOWLEDGMENT All praise is due only to ALLAH, the lord of the worlds. Ultiately, only ALLAH has given us the strength and courage to proceed with our entire life. We would like to thank the Ministry of Higher Education, Malaysia for granting us FRGS Vot and Vot We also would like to thank Hudraout University of Science and Technology for their generous support. REFERENES Bawazir, H.M.S. and A. Abd Rahan, 200. A tabu search ethod for finding inial ultihoogeneous bézout nuber. J. Math. Stat., 6(2): Börck, G. and R. Fröberg, 99. A faster way to ount the solutions of inhoogeneous systes of algebraic equations with applications to cyclic n-roots. J. Sybolic op., 2: Liang, H., S. Linsong, B. Fengshan and L. Xiaoyan, Rando path ethod with pivoting for coputing peranents of atrices. Appl. Math. oput., 85: Malaovich, G. and K. Meer, oputing ultihoogeneous bézout nubers is hard. Theory oput. Syst., 40: Morgan, A.P., 987. Solving Polynoial Systes Using ontinuation for Engineering and Scientific Probles. st Edn., Prentice-Hall, Englewood liffs, New Jersey, pp: 48. Noonberg, V.W., 989. A neural network odeled by an adaptive Lotka-Volterra. SIAM J. Appl. Math., 49: Rasussen, L.E., 994. Approxiating the peranent: A siple approach. Rando Struct. Algoriths., 5: Verschelde, J., 996. Hootopy continuation ethods for solving polynoial systes using continuation for solving polynoial systes. Ph.D. Thesis. Katholieke Universiteit Leuven, pp: 78, Retrieved fro: 047&sid = 2&Ft = 2&clientId = 2690&RQT = 309&Vnae = PQD, Wapler,.W., 992. Bézout nuber calculations for ulti-hoogeneous polynoial systes. Appl. Math. oput., 5: Yan, D., J. Zhang, B. Yu,. Luo and S. Zhang, A genetic algorith for finding inial ultihoogeneous Bézout nuber. pp: Proceeding of the 7th IEEE/AIS International onference on oputer and Inforation Science, IEEE oputer Society. 52

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili,

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili, Australian Journal of Basic and Applied Sciences, 5(3): 35-358, 20 ISSN 99-878 Generalized AOR Method for Solving Syste of Linear Equations Davod Khojasteh Salkuyeh Departent of Matheatics, University

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011 Page Lab Eleentary Matri and Linear Algebra Spring 0 Nae Due /03/0 Score /5 Probles through 4 are each worth 4 points.. Go to the Linear Algebra oolkit site ransforing a atri to reduced row echelon for

More information

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x)

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x) 7Applying Nelder Mead s Optiization Algorith APPLYING NELDER MEAD S OPTIMIZATION ALGORITHM FOR MULTIPLE GLOBAL MINIMA Abstract Ştefan ŞTEFĂNESCU * The iterative deterinistic optiization ethod could not

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes Explicit solution of the polynoial least-squares approxiation proble on Chebyshev extrea nodes Alfredo Eisinberg, Giuseppe Fedele Dipartiento di Elettronica Inforatica e Sisteistica, Università degli Studi

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS BIT Nuerical Matheatics 43: 459 466, 2003. 2003 Kluwer Acadeic Publishers. Printed in The Netherlands 459 RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS V. SIMONCINI Dipartiento di

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 38: Linear Multistep Methods: Absolute Stability, Part II

lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 38: Linear Multistep Methods: Absolute Stability, Part II lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 3: Linear Multistep Methods: Absolute Stability, Part II 5.7 Linear ultistep ethods: absolute stability At this point, it ay well

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Research Article Approximate Multidegree Reduction of λ-bézier Curves

Research Article Approximate Multidegree Reduction of λ-bézier Curves Matheatical Probles in Engineering Volue 6 Article ID 87 pages http://dxdoiorg//6/87 Research Article Approxiate Multidegree Reduction of λ-bézier Curves Gang Hu Huanxin Cao and Suxia Zhang Departent of

More information

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University NBN Algorith Bogdan M. Wilaoswki Auburn University Hao Yu Auburn University Nicholas Cotton Auburn University. Introduction. -. Coputational Fundaentals - Definition of Basic Concepts in Neural Network

More information

lecture 36: Linear Multistep Mehods: Zero Stability

lecture 36: Linear Multistep Mehods: Zero Stability 95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,

More information

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng EE59 Spring Parallel LSI AD Algoriths Lecture I interconnect odeling ethods Zhuo Feng. Z. Feng MTU EE59 So far we ve considered only tie doain analyses We ll soon see that it is soeties preferable to odel

More information

Solving initial value problems by residual power series method

Solving initial value problems by residual power series method Theoretical Matheatics & Applications, vol.3, no.1, 13, 199-1 ISSN: 179-9687 (print), 179-979 (online) Scienpress Ltd, 13 Solving initial value probles by residual power series ethod Mohaed H. Al-Sadi

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

AN APPLICATION OF CUBIC B-SPLINE FINITE ELEMENT METHOD FOR THE BURGERS EQUATION

AN APPLICATION OF CUBIC B-SPLINE FINITE ELEMENT METHOD FOR THE BURGERS EQUATION Aksan, E..: An Applıcatıon of Cubıc B-Splıne Fınıte Eleent Method for... THERMAL SCIECE: Year 8, Vol., Suppl., pp. S95-S S95 A APPLICATIO OF CBIC B-SPLIE FIITE ELEMET METHOD FOR THE BRGERS EQATIO by Eine

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

Necessity of low effective dimension

Necessity of low effective dimension Necessity of low effective diension Art B. Owen Stanford University October 2002, Orig: July 2002 Abstract Practitioners have long noticed that quasi-monte Carlo ethods work very well on functions that

More information

Lecture 13 Eigenvalue Problems

Lecture 13 Eigenvalue Problems Lecture 13 Eigenvalue Probles MIT 18.335J / 6.337J Introduction to Nuerical Methods Per-Olof Persson October 24, 2006 1 The Eigenvalue Decoposition Eigenvalue proble for atrix A: Ax = λx with eigenvalues

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Boosting with log-loss

Boosting with log-loss Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Iterative Linear Solvers and Jacobian-free Newton-Krylov Methods

Iterative Linear Solvers and Jacobian-free Newton-Krylov Methods Eric de Sturler Iterative Linear Solvers and Jacobian-free Newton-Krylov Methods Eric de Sturler Departent of Matheatics, Virginia Tech www.ath.vt.edu/people/sturler/index.htl sturler@vt.edu Efficient

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial

More information

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for

More information

Scalable Symbolic Model Order Reduction

Scalable Symbolic Model Order Reduction Scalable Sybolic Model Order Reduction Yiyu Shi Lei He -J Richard Shi Electrical Engineering Dept, ULA Electrical Engineering Dept, UW Los Angeles, alifornia, 924 Seattle, WA, 985 {yshi, lhe}eeuclaedu

More information

Statistical properties of contact maps

Statistical properties of contact maps PHYSICAL REVIEW E VOLUME 59, NUMBER 1 JANUARY 1999 Statistical properties of contact aps Michele Vendruscolo, 1 Balakrishna Subraanian, 2 Ido Kanter, 3 Eytan Doany, 1 and Joel Lebowitz 2 1 Departent of

More information

Analysis of Impulsive Natural Phenomena through Finite Difference Methods A MATLAB Computational Project-Based Learning

Analysis of Impulsive Natural Phenomena through Finite Difference Methods A MATLAB Computational Project-Based Learning Analysis of Ipulsive Natural Phenoena through Finite Difference Methods A MATLAB Coputational Project-Based Learning Nicholas Kuia, Christopher Chariah, Mechatronics Engineering, Vaughn College of Aeronautics

More information

Optimal Control of Nonlinear Systems Using the Shifted Legendre Polynomials

Optimal Control of Nonlinear Systems Using the Shifted Legendre Polynomials Optial Control of Nonlinear Systes Using Shifted Legendre Polynoi Rahan Hajohaadi 1, Mohaad Ali Vali 2, Mahoud Saavat 3 1- Departent of Electrical Engineering, Shahid Bahonar University of Keran, Keran,

More information

An improved self-adaptive harmony search algorithm for joint replenishment problems

An improved self-adaptive harmony search algorithm for joint replenishment problems An iproved self-adaptive harony search algorith for joint replenishent probles Lin Wang School of Manageent, Huazhong University of Science & Technology zhoulearner@gail.co Xiaojian Zhou School of Manageent,

More information

1 Proof of learning bounds

1 Proof of learning bounds COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a

More information

Lean Walsh Transform

Lean Walsh Transform Lean Walsh Transfor Edo Liberty 5th March 007 inforal intro We show an orthogonal atrix A of size d log 4 3 d (α = log 4 3) which is applicable in tie O(d). By applying a rando sign change atrix S to the

More information

Polynomial Division By Convolution

Polynomial Division By Convolution Applied Matheatics E-Notes, (0), 9 c ISSN 0-0 Available free at irror sites of http://wwwathnthuedutw/aen/ Polynoial Division By Convolution Feng Cheng Chang y Received 9 March 0 Abstract The division

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Deflation of the I-O Series Some Technical Aspects. Giorgio Rampa University of Genoa April 2007

Deflation of the I-O Series Some Technical Aspects. Giorgio Rampa University of Genoa April 2007 Deflation of the I-O Series 1959-2. Soe Technical Aspects Giorgio Rapa University of Genoa g.rapa@unige.it April 27 1. Introduction The nuber of sectors is 42 for the period 1965-2 and 38 for the initial

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion Suppleentary Material for Fast and Provable Algoriths for Spectrally Sparse Signal Reconstruction via Low-Ran Hanel Matrix Copletion Jian-Feng Cai Tianing Wang Ke Wei March 1, 017 Abstract We establish

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

arxiv:cond-mat/ v1 [cond-mat.stat-mech] 22 Oct 1998

arxiv:cond-mat/ v1 [cond-mat.stat-mech] 22 Oct 1998 arxiv:cond-at/9810285v1 [cond-at.stat-ech] 22 Oct 1998 Statistical Properties of Contact Maps Michele Vendruscolo (1), Balakrishna Subraanian (2), Ido Kanter (3), Eytan Doany (1) and Joel Lebowitz (2)

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

Study on Markov Alternative Renewal Reward. Process for VLSI Cell Partitioning

Study on Markov Alternative Renewal Reward. Process for VLSI Cell Partitioning Int. Journal of Math. Analysis, Vol. 7, 2013, no. 40, 1949-1960 HIKARI Ltd, www.-hikari.co http://dx.doi.org/10.12988/ia.2013.36142 Study on Markov Alternative Renewal Reward Process for VLSI Cell Partitioning

More information

Optical Properties of Plasmas of High-Z Elements

Optical Properties of Plasmas of High-Z Elements Forschungszentru Karlsruhe Techni und Uwelt Wissenschaftlishe Berichte FZK Optical Properties of Plasas of High-Z Eleents V.Tolach 1, G.Miloshevsy 1, H.Würz Project Kernfusion 1 Heat and Mass Transfer

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

LogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting

LogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting LogLog-Beta and More: A New Algorith for Cardinality Estiation Based on LogLog Counting Jason Qin, Denys Ki, Yuei Tung The AOLP Core Data Service, AOL, 22000 AOL Way Dulles, VA 20163 E-ail: jasonqin@teaaolco

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS MEMBRANE

RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS MEMBRANE Proceedings of ICIPE rd International Conference on Inverse Probles in Engineering: Theory and Practice June -8, 999, Port Ludlow, Washington, USA : RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

AN ALGEBRAIC AND COMBINATORIAL APPROACH TO THE CONSTRUCTION OF EXPERIMENTAL DESIGNS

AN ALGEBRAIC AND COMBINATORIAL APPROACH TO THE CONSTRUCTION OF EXPERIMENTAL DESIGNS Geotec., Const. Mat. & Env., ISSN: 2186-2982(P), 2186-2990(O), Japan AN ALGEBRAIC AND COMBINATORIAL APPROACH TO THE CONSTRUCTION OF EXPERIMENTAL DESIGNS Julio Roero 1 and Scott H. Murray 2 1 Departent

More information

Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns

Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns Fast Structural Siilarity Search of Noncoding RNs Based on Matched Filtering of Ste Patterns Byung-Jun Yoon Dept. of Electrical Engineering alifornia Institute of Technology Pasadena, 91125, S Eail: bjyoon@caltech.edu

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Sangook Moon, Non-eber ABSTRACT The ain back-bone

More information

Explicit Approximate Solution for Finding the. Natural Frequency of the Motion of Pendulum. by Using the HAM

Explicit Approximate Solution for Finding the. Natural Frequency of the Motion of Pendulum. by Using the HAM Applied Matheatical Sciences Vol. 3 9 no. 1 13-13 Explicit Approxiate Solution for Finding the Natural Frequency of the Motion of Pendulu by Using the HAM Ahad Doosthoseini * Mechanical Engineering Departent

More information

arxiv: v2 [math.co] 8 Mar 2018

arxiv: v2 [math.co] 8 Mar 2018 Restricted lonesu atrices arxiv:1711.10178v2 [ath.co] 8 Mar 2018 Beáta Bényi Faculty of Water Sciences, National University of Public Service, Budapest beata.benyi@gail.co March 9, 2018 Keywords: enueration,

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

Kinematics and dynamics, a computational approach

Kinematics and dynamics, a computational approach Kineatics and dynaics, a coputational approach We begin the discussion of nuerical approaches to echanics with the definition for the velocity r r ( t t) r ( t) v( t) li li or r( t t) r( t) v( t) t for

More information

An Improved Particle Filter with Applications in Ballistic Target Tracking

An Improved Particle Filter with Applications in Ballistic Target Tracking Sensors & ransducers Vol. 72 Issue 6 June 204 pp. 96-20 Sensors & ransducers 204 by IFSA Publishing S. L. http://www.sensorsportal.co An Iproved Particle Filter with Applications in Ballistic arget racing

More information

Numerical Solution of the MRLW Equation Using Finite Difference Method. 1 Introduction

Numerical Solution of the MRLW Equation Using Finite Difference Method. 1 Introduction ISSN 1749-3889 print, 1749-3897 online International Journal of Nonlinear Science Vol.1401 No.3,pp.355-361 Nuerical Solution of the MRLW Equation Using Finite Difference Method Pınar Keskin, Dursun Irk

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

P016 Toward Gauss-Newton and Exact Newton Optimization for Full Waveform Inversion

P016 Toward Gauss-Newton and Exact Newton Optimization for Full Waveform Inversion P016 Toward Gauss-Newton and Exact Newton Optiization for Full Wavefor Inversion L. Métivier* ISTerre, R. Brossier ISTerre, J. Virieux ISTerre & S. Operto Géoazur SUMMARY Full Wavefor Inversion FWI applications

More information