Reverse engineering using computational algebra

Size: px
Start display at page:

Download "Reverse engineering using computational algebra"

Transcription

1 Reverse engineering using computational algebra Matthew Macauley Department of Mathematical Sciences Clemson University Math 4500, Fall 2016 M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

2 What is reverse engineering? Sometimes, complex biological systems can seem a bit like this: (click here!). Systems biology is the study of systems of biological components. A central problem in systems biology is to use experimental data to infer the structure of a system such as a gene regulatory network. Modeling approaches Bottom-up: Build a network from the known local information about every single object. Top-down ( Reverse-engineering ): View the system as a black box, then use the available data to make a model. Previously, we ve mostly studied the first approach to modeling. In this lecture, we ll focus on the second approach. Many problems in statistics (e.g., linear regression) deal with the second approach. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

3 The blind men and the elephant An old parable from India tells of several blind men who try to determine what an elephant looks like just by touch. The blind men are trying to reverse engineer an elephant from just a few data points. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

4 Inferring a Boolean network model (elephant) from data (observations) Consider a Boolean network model on n nodes, with update function F : F n 2 Fn 2. There are 2 n input states. Suppose we don t know the actual function F, but through experimental data, we are able to observe several transitions: s 1 = (s 11, s 12,..., s 1n ) s 2 = (s 21,..., s 2n ) s m = (s m1,..., s mn) t 1 = (t 11, t 12,..., t 1n ) t 2 = (t 21,..., t 2n ) t m = (t m1,..., t mn) Reverse engineering Start with experimental data (observations) and reconstruct the model (elephant). The two main features are: (i) the network topology, or wiring diagram, (ii) the Boolean functions at each node: F = (f 1,..., f n). M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

5 Inferring a Boolean network model (elephant) from data (observations) Consider the following polynomial dynamical system: f 1 (x 1, x 2, x 3 ) = x 1 x 2 = x 1 x 2 f 2 (x 1, x 2, x 3 ) = x 1 x 2 x 3 = x 1 x 2 x 3 f 3 (x 1, x 2, x 3 ) = x 1 x 2 = x 1 x 2. The state space of the FDS map F = (f 1, f 2, f 3 ) is the following graph: Question What if we only knew part of this state space, e.g., (1, 1, 0) (1, 0, 1) (0, 0, 0) (0, 0, 0). Could we recover the individual functions? How many possible models could yield this fragment? M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

6 Reverse engineering Broad goal Find the best model F = (f 1,..., f n) that fits the data: Input states: s 1,..., s m F n Output states: t 1,..., t m F n with F (s i ) = t i Note that: F (s i ) = (f 1 (s i ), f 2 (s i ),..., f n(s i )) = (t i1, t i2,..., t in ) = t i. Question What if no models fit the data? What if many models fit the data? (This is more likely.) First, we ll find all models that fit the data. This is called the model space: { } F 1 F 2 F n = (f 1,..., f n) f j (s i ) = t ij for all i and j. Once we do this, the new problem becomes choosing the best one. This is called model selection. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

7 Similar problems in other areas of mathematics 1. Parametrize a line in R n. 2. Parametrize a plane in R n. 3. Solve the underdetermined system Ax = b. 4. Solve the differential equation x + x = 2. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

8 Parametrize a line in R n Suppose we want to write the equation for a line that contains a vector v R n : w z v+w v t v+w t v x y This line, which contains the zero vector, is tv = {tv : t R}. Now, what if we want to write the equation for a line parallel to v? This line, which does not contain the zero vector, is tv + w = {tv + w : t R}. Note that ANY particular w on the line will work!!! M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

9 Solve an underdetermined system Ax = b Suppose we have a system of equations that has too many variables, so there are infinitely many solutions. For example: How to solve: 2x + y 3z = 4 3x 5y + 2z = 6 Ax = b form : [ ] x y = z [ 4 6]. 1. Solve the related homogeneous equation Ax = 0 (this is null space, NS(A)); 2. Find any particular solution x p to Ax = b; 3. Add these together to get the general solution: x = NS(A) + x p. This works because geometrically, the solution space is just a line, plane, etc. Here are two possible ways to write the solution: C , C M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

10 Linear differential equations Solve the differential equation x + x = 2. How to solve: 1. Solve the related homogeneous equation x + x = 0. The solutions are x h (t) = a cos t + b sin t. 2. Find any particular solution x p(t) to x + x = 2. By inspection, we see that x p(t) = 2 works. 3. Add these together to get the general solution: x(t) = x h (t) + x p(t) = a cos t + b sin t + 2. Note that while the general solution above is unique, its presentation need not be. For example, we could write it this way: x(t) = x h (t) + x p(t) = a(2 cos t 3 sin t) + b sin t + (2 cos t + 8 sin t). Here, the particular solution has (unnecessary) extra terms that vanish on the homogeneous part, x + x = 0. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

11 Reverse engineering: Problem statement Definition A finite dynamical system (FDS) is a function F = (f 1,..., f n): X n X n where each f i : X n X is a local function and X < (usually X = F 2 = {0, 1}). Key fact If X = F is a finite field (e.g., Z 2, Z 3, Z p, etc.), then every function f i : F n F is a polynomial in x 1,..., x n. Goal Given a set of data: Input states: s 1,..., s m F n Output states: t 1,..., t m F n with F (s i ) = t i Construct the model space F 1 F n of all models F = (f 1,..., f n) that fit the data: We ll find each F 1,..., F n separately. F (s i ) = (f 1 (s i ),..., f n(s i )) = (t i1,..., t in ) = t i. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

12 Reverse engineering: How to find F j We wish to find the set F j of all local functions (polynomials!) f j that fit the data: F j = {f j : f j (s 1 ) = t 1j,..., f j (s m) = t mj }. Define the set I (it is actually an ideal of the polynomial ring F[x 1,..., x n]) I = {h : h(s i ) = 0 for all i = 1,..., m} = {all polynomials that vanish on the data}. Theorem The set of polynomials that fit the data at node j is F j = f j + I = {f j + h : h I }, where f j is any one particular polynomial that fits the data. Thus, to find F j, we need to do two things: 1. Find the ideal I ; (all solutions to {f j (s i ) = 0, i}) 2. Find any polynomial f j that fits the data. (one solution to {f j (s i ) = t ij, i}) M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

13 Reverse engineering: How to find I and f j 1. Finding I : Define I (s i ) to be the set of polynomials that vanish on s i : I (s i ) = {all polynomials h i such that h i (s i ) = 0} = {(x 1 s i1 )g 1 (x) + (x 2 s i2 )g 2 (x) + + (x n s in )g n(x)} = x 1 s i1, x 2 s i2,..., x n s in Clearly, the set I of polynomials that vanish on all s i (for i = 1,..., m) is m I = I (s i ). i=1 2. Finding f j : There are many algorithms. Lagrange interpolation is one of them. In this lecture, we will learn another method which has the Chinese remainder theorem lurking behind the scenes. We ll get started with this now. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

14 Finding f j (one method) For each data point s i (i = 1,..., m), we ll construct an r-polynomial that has the following property: { 1 x = s i r i (x) = 0 x s i Once we have these, the polynomial f j (x) we seek will be One way to construct the r-polynomials: where f j (x) = t 1j r 1 (x) + t 2j r 2 (x) + + t mj r m(x). r i (x) = m b ik (x), k=1 k i b ik (x) = (s il s kl ) p 2 (x l s kl ) and l is the first coordinate in which s i and s k differ. (Actually, any coordinate where they differ will do.) Remark When our systems are Boolean (over F 2 ), then this reduces to b ik (x) = x l s kl. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

15 A Boolean example Consider the following model of the lac operon, which implicitly assumes that A degrades slower than M or B. f M = x A f B = x M f A = L (B L m) (A B). If lactose levels are low, then L = L m = 0, and this model in polynomial form becomes the following PDS (left) and state space (right): f 1 = x f 2 = x 1 f 3 = (x 2 + 1)x Exercise Let s reverse engineer the Boolean network from just knowing the 6 red nodes and 5 transitions. In other words, find all triples of polynomials f = (h 1, h 2, h 3 ) such that: f (0, 0, 1) = (h 1(0, 0, 1), h 2(0, 0, 1), h 3(0, 0, 1)) = (1, 0, 1), f (1, 0, 1) = (h 1(1, 0, 1), h 2(1, 0, 1), h 3(1, 0, 1)) = (1, 1, 1), f (1, 1, 1) = (h 1(1, 1, 1), h 2(1, 1, 1), h 3(1, 1, 1)) = (1, 1, 0), f (1, 1, 0) = (h 1(1, 1, 0), h 2(1, 1, 0), h 3(1, 1, 0)) = (0, 1, 0), f (0, 1, 0) = (h 1(0, 1, 0), h 2(0, 1, 0), h 3(0, 1, 0)) = (0, 0, 0), M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

16 A Boolean example (cont.) Since we know the original functions a priori, we secretly know the answer to this. (f 1, f 2, f 3 ) = (x 3, x 1, (x 2 + 1)x 3 ) The ideal of polynomials that vanish on each s k is: I1 = ideal(x1, x2, x3-1); I2 = ideal(x1-1, x2, x3-1); I3 = ideal(x1-1, x2-1, x3-1); I4 = ideal(x1-1, x2-1, x3); I5 = ideal(x1, x2-1, x3); The ideal of polynomials that vanish on every s k is: I = intersect{i1,i2,i3,i4,i5}; Thus, the complete model space is F 1 F 2 F 3, F j = f j + I If we hadn t known f 1, f 2, f 3 a priori, then we d have to find our own particular solution that fits the data. We ll do that now. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

17 A Boolean example (cont.) We re looking for a single solution f = (f 1, f 2, f 3 ) that fits the data. We know how to do this. For example: f 1 (x) = t 11 r 1 (x) + t 21 r 2 (x) + t 31 r 3 (x) + t 41 r 4 (x) + t 51 r 5 (x) = 1r 1 (x) + 1r 2 (x) + 1r 3 (x) + 0r 4 (x) + 0r 5 (x) = r 1 (x) + r 2 (x) + r 3 (x), where s 1 = (0, 0, 1)= t 0 r 1 (x) = 5 b 1k (x) = b 12 (x)b 13 (x)b 14 (x)b 15 (x). k=1 k 1 s 2 = (1, 0, 1) = t 1 s 3 = (1, 1, 1) = t 2 s 4 = (1, 1, 0) = t 3 Recall that b 1k (x) = x l s kl, where l is the first coordinate that s 1 differs from s k. skip k = 1 b 12 (x) = (x 1 s 21 ) = x b 13 (x) = (x 1 s 31 ) = x b 14 (x) = (x 1 s 41 ) = x b 15 (x) = (x 2 s 52 ) = x s 5 = (0, 1, 0) = t 4 s 6 =(0, 0, 0) = t 5 Now, r 1 (x) = (x 1 + 1) 3 (x 2 + 1) = (x 1 + 1)(x 2 + 1). M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

18 A Boolean example (cont.) Recall that b ik (x) = x l s kl, where l is the first coordinate that s i differs from s k. s 1 = (0, 0, 1)= t 0 s 2 = (1, 0, 1) = t 1 s 3 = (1, 1, 1) = t 2 b 21 (x) = (x 1 s 11 ) = x 1 skip k = 2 b 23 (x) = (x 2 s 32 ) = x b 24 (x) = (x 2 s 42 ) = x b 25 (x) = (x 1 s 51 ) = x 1 b 31 (x) = (x 1 s 11 ) = x 1 b 32 (x) = (x 2 s 22 ) = x 2 skip k = 3 b 34 (x) = (x 3 s 43 ) = x 3 b 35 (x) = (x 1 s 51 ) = x 1 s 4 = (1, 1, 0) = t 3 s 5 = (0, 1, 0) = t 4 s 6 = (0, 0, 0) = t 5 b 41 (x) = (x 1 s 11 ) = x 1 b 42 (x) = (x 2 s 22 ) = x 2 b 43 (x) = (x 3 s 33 ) = x skip k = 4 b 45 (x) = (x 1 s 51 ) = x 1 b 51 (x) = (x 2 s 12 ) = x 2 b 52 (x) = (x 1 s 21 ) = x b 53 (x) = (x 1 s 31 ) = x b 54 (x) = (x 1 s 42 ) = x skip k = 5 Recall that x k i = x i, and (x j + 1) k = x j + 1, so the r-polynomials are r 1 (x) = (x 1 + 1)(x 2 + 1) r 2 (x) = x 1 (x 2 + 1) r 3 (x) = x 1 x 2 x 3 r 4 (x) = x 1 x 2 (x 3 + 1) r 5 (x) = (x 1 + 1)x 2 M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

19 A Boolean example (cont.) We can now compute our particular solution (f 1, f 2, f 3 ) that fits the data, using: s 1 = (0, 0, 1)= t 0 s 2 = (1, 0, 1) = t 1 s 3 = (1, 1, 1) = t 2 s 4 = (1, 1, 0) = t 3 s 5 = (0, 1, 0) = t 4 s 6 = (0, 0, 0) = t 5 f j (x) = t 1j r 1 (x) + t 2j r 2 (x) + + t mj r m(x). f 1 (x) = t 11 r 1 (x) + t 21 r 2 (x) + t 31 r 3 (x) + t 41 r 4 (x) + t 51 r 5 (x) = r 1 (x) + r 2 (x) + r 3 (x) = 1 + x 2 + x 1 x 2 x 3 f 2 (x) = t 12 r 1 (x) + t 22 r 2 (x) + t 32 r 3 (x) + t 42 r 4 (x) + t 52 r 5 (x) = r 2 (x) + r 3 (x) + r 4 (x) = x 1 f 3 (x) = t 13 r 1 (x) + t 23 r 2 (x) + t 33 r 3 (x) + t 43 r 4 (x) + t 53 r 5 (x) = r 1 (x) + r 2 (x) = 1 + x 2. Our original PDS was (f 1, f 2, f 3 ) = (x 3, x 1, x 3 + x 2 x 3 ), but our algorithm yielded (f 1, f 2, f 3 ) = (1 + x 2 + x 1 x 2 x 3, x 1, 1 + x 2 ) = (x 3, x 1, x 3 + x 2 x 3 ) + (1 + x 2 + x 3 + x 1 x 2 x 3, 0, 1 + x 2 + x 3 + x 2 x 3 ) Remark Each polynomial in the 2nd term above is in the vanishing ideal I. (Why?) M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

20 A Boolean example (cont.) Figure: Left. Phase space of the original PDS: (f 1, f 2, f 3) = (x 3, x 1, x 3(1 + x 2)). Middle. Phase space of the reverse-engineered PDS: (f 1, f 2, f 3) = (1 + x 2 + x 1x 2x 3, x 1, 1 + x 2). Right: Phase space of the reverse-engineered PDS, modulo I : (f 1, f 2, f 3) = (x 3, x 1, 1 + x 2) M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

21 A Boolean example (cont.) Now that we found a particular solution f = (f 1, f 2, f 3 ) that fits the data, we need to (re)compute the ideal I of polynomials that vanish on the data. We ll use Macaulay2 in Sage: %default_mode macaulay2 R=ZZ/2[x1,x2,x3] / ideal(x1^2-x1, x2^2-x2, x3^2-x3); s 1 = (0, 0, 1)= t 0 s 2 = (1, 0, 1) = t 1 s 3 = (1, 1, 1) = t 2 s 4 = (1, 1, 0) = t 3 s 5 = (0, 1, 0) = t 4 s 6 =(0, 0, 0) = t 5 The ideal of polynomials that vanish on each s k is: I1 = ideal(x1, x2, x3-1); I2 = ideal(x1-1, x2, x3-1); I3 = ideal(x1-1, x2-1, x3-1); I4 = ideal(x1-1, x2-1, x3); I5 = ideal(x1, x2-1, x3); The ideal of polynomials that vanish on every s k is: I = intersect{i1,i2,i3,i4,i5} To compute a Gröbner basis: G = gens gb I The output is: x2x3+x2+x3+1 x1x2+x1x3+x1+x2+x3+1 M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

22 A Boolean example (cont.) In conclusion, our model space of all PDSs (f 1, f 2, f 3 ) that fit the data: is the set where I is the vanishing ideal F 1 F 2 F 3, F j = f j + I I = g 1, g 2 = 1 + x 2 + x 3 + x 2 x 3, 1 + x 1 + x 2 + x 3 + x 1 x 2 + x 1 x 3. Our reverse-engineered PDS is slighly different than the true model : (f 1, f 2, f 3 ) = (1 + x 2 + x 1 x 2 x 3, x 1, 1 + x 2 ) = (x 3 + x 1 g 1 + g 2, x 1, (x 2 + 1)x 3 + g 1 ) Note that x 1 g 1 + g 2, 0, and g 1 must be in the vanishing ideal I. Goal ( model selection ) We would like to be able to recover functions in F j = f j + I that have no extra terms in I. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

23 A Boolean example (cont.) Goal ( model selection ) We would like to be able to be able to recover functions in F j = f j + I that have no extra terms in I Fortunately, we can do this with Macaulay2. It s called finding the remainder of f j modulo I, and we use the % symbol. f1 = 1+x2+x1*x2*x3; f2 = x1; f3 = 1+x2; f1%i; f2%i; f3%i; The output is: x3, x1, x2+1. We successfully recovered 2 of the 3 original functions. Question What would happen if we: added the (original) self-loop at 000 to the data? removed the data point ? M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

24 An example over Z 5 Consider the following time series in a 3-node system over Z 5 : s 1 = (2, 0, 0)= t 0 s 2 = (4, 3, 1) = t 1 s 3 = (3, 1, 4) = t 2 s 4 =(0, 4, 3) = t 3 For reference, here are the input vectors s i and output vectors t i : s 1 = (s 11, s 12, s 13 ) = (2, 0, 0), t 1 = (t 11, t 12, t 13 ) = (4, 3, 1), s 2 = (s 21, s 22, s 23 ) = (4, 3, 1), t 2 = (t 21, t 22, t 23 ) = (3, 1, 4), s 3 = (s 31, s 32, s 33 ) = (3, 1, 4), t 3 = (t 31, t 32, t 33 ) = (0, 4, 3). Note that s 1 differs from s 2 and s 3 in the l = 1 coodinate, so this l will work for each of r 1, r 2, and r 3. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

25 An example over Z 5 (cont.) Since we are working in Z 5, we are taking the remainder of everything modulo 5. Particularly useful identities are: 0 = 5, 1 = 4, 2 = 3, 3 = 2, and 4 = 1. Using our formulas for b ij (x), we compute: b 12 (x) = (s 11 s 21 ) 3 (x 1 s 21 ) = (2 4) 3 (x 1 4) = 8(x 1 + 1) = 2x b 13 (x) = (s 11 s 31 ) 3 (x 1 s 31 ) = (2 3) 3 (x 1 3) = x = 4x Therefore, the first r-polynomial is r 1 (x) = b 12 (x)b 13 (x) = (2x 1 + 2)(4x 1 + 3) = 8x x = 3x x In-class Exercise Compute the other two r-polynomials in this example: r 2 (x) and r 3 (x). Solution: r 2 (x) = 3x , r 3(x) = 4x x M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

26 An example over Z 5 (cont.) In summary, we computed the r-polynomials to be: r 1 (x) = b 12 (x)b 13 (x) = (2x 1 + 2)(4x 1 + 3) = 8x x = 3x x r 2 (x) = b 21 (x)b 23 (x) = (3x 1 + 4)(x 1 + 2) = 3x x = 3x r 2 (x) = b 31 (x)b 32 (x) = (x 1 + 3)(4x 1 + 4) = 4x x = 4x1 2 + x Thus, the following functions fit the data: f 1 (x) = t 11 r 1 (x) + t 21 r 2 (x) + t 31 r 3 (x) = 4(3x x 1 + 1) + 3(3x ) + 0(4x2 1 + x 1 + 2) = x1 2 + x f 2 (x) = t 12 r 1 (x) + t 22 r 2 (x) + t 32 r 3 (x) = 3(3x x 1 + 1) + 1(3x ) + 4(4x2 1 + x 1 + 2) = 3x1 2 + x f 2 (x) = t 13 r 1 (x) + t 23 r 2 (x) + t 33 r 3 (x) = 1(3x x 1 + 1) + 4(3x ) + 3(4x2 1 + x 1 + 2) = 2x x Comments on this? [Note that only the variable x 1 appears.] M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

27 An example over Z 5 (cont.) Recall that the ideal I is the set I of polynomials that vanish on all s i : I = I (s 1 ) I (s 2 ) I (s 3 ), where s 1 = (2, 0, 0), s 2 = (4, 3, 1), s 3 = (3, 1, 4). These are precisely the sets I (s 1 ) = x 1 2, x 2, x 3 = {(x 1 2)g 1 (x) + x 2 g 2 (x) + x 3 g 3 (x)} I (s 2 ) = x 1 4, x 2 3, x 3 1 = {(x 1 4)g 1 (x) + (x 2 3)g 2 (x) + (x 3 1)g 3 (x)} I (s 3 ) = x 1 3, x 2 1, x 3 4 = {(x 1 3)g 1 (x) + (x 2 1)g 2 (x) + (x 3 4)g 3 (x)} We ll use Macaulay2 in Sage again to compute this. Remember to work over Z 5 : %default_mode macaulay2 R=ZZ/5[x1,x2,x3] / ideal(x1^5-x1, x2^5-x2, x3^5-x3); M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

28 An example over Z 5 (cont.) As before, we can compute the vanishing ideal I : I1 = ideal(x1-2, x2, x3); I2 = ideal(x1-4, x2-3, x3-1); I3 = ideal(x1-3, x2-1, x3-4); I = intersect{i1,i2,i3}; f1 = x1^2+x1+3; f2 = 3*x1^2+x1+4; f3 = 2*x1^2+2*x1+4; We can view the Gröbner basis (w.r.t. the default monomial ordering, grevlex): flatten entries gens gb I; The output is: 2 2 {x1-2x2 - x3-2, x3 + 2x2-2x3, x2*x3 + 2x2 + x3, x2 + x3} which means G = {x 1 2x 2 x 3 2, x x 2 2x 3, x 2 x 3 + 2x 2 + x 3, x x 3}. If we reduce each f i modulo I : p1=f1%i; and p2=f2%i; and p1=f3%i; we get (p 1, p 2, p 3 ) = ( x 3 1, x 2 2, 2x 3 + 1). This is called the normal form of f j with respect to the Gröbner basis G. M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

29 An aside: why monomial order matters! Let s do the same thing but using lex instead of grevlex: S=ZZ/5[x1,x2,x3] / ideal(x1^5-x1, x2^5-x2, x3^5-x3); p1 = sub(f1,s)%sub(i,s); p2 = sub(f2,s)%sub(i,s); p3 = sub(f3,s)%sub(i,s); These polynomials are now (p 1, p 2, p 3 ) = ( x 3 1, 2x x 3 2, 2x 3 + 1). They are different because the Gröbner basis of I is different with respect to lex: flatten entries gens gb sub(i,s); The output is G = {x 3 3 x 3, x 2 2x 2 3 x 3, x 1 + x x 3 2}. In summary, the model space is F 1 F n = f + (I I ) = (f 1 + I,..., f n + I ). Here are three choices for the particular solution f = (f 1, f 2, f 3 ) that fits the data: our algorithm: (f 1, f 2, f 3 ) = (x x 1 + 3, 3x x 1 + 4, 2x x 1 + 4). normal form w.r.t. grevlex: (f 1, f 2, f 3 ) = ( x 3 1, 2x x 3 2, 2x 3 + 1). normal form w.r.t. lex: (f 1, f 2, f 3 ) = ( x 3 1, x 2 2, 2x 3 + 1). M. Macauley (Clemson) Reverse engineering using computational algebra Math 4500, Fall / 29

Reverse engineering using computational algebra

Reverse engineering using computational algebra Reverse engineering using computational algebra Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Spring 2015 M. Macauley (Clemson)

More information

A&S 320: Mathematical Modeling in Biology

A&S 320: Mathematical Modeling in Biology A&S 320: Mathematical Modeling in Biology David Murrugarra Department of Mathematics, University of Kentucky http://www.ms.uky.edu/~dmu228/as320/ These slides were modified from Matthew Macauley s lecture

More information

MAT 1302B Mathematical Methods II

MAT 1302B Mathematical Methods II MAT 1302B Mathematical Methods II Alistair Savage Mathematics and Statistics University of Ottawa Winter 2015 Lecture 19 Alistair Savage (uottawa) MAT 1302B Mathematical Methods II Winter 2015 Lecture

More information

Boolean models of gene regulatory networks. Matthew Macauley Math 4500: Mathematical Modeling Clemson University Spring 2016

Boolean models of gene regulatory networks. Matthew Macauley Math 4500: Mathematical Modeling Clemson University Spring 2016 Boolean models of gene regulatory networks Matthew Macauley Math 4500: Mathematical Modeling Clemson University Spring 2016 Gene expression Gene expression is a process that takes gene info and creates

More information

Usually, when we first formulate a problem in mathematics, we use the most familiar

Usually, when we first formulate a problem in mathematics, we use the most familiar Change of basis Usually, when we first formulate a problem in mathematics, we use the most familiar coordinates. In R, this means using the Cartesian coordinates x, y, and z. In vector terms, this is equivalent

More information

Algebraic. techniques1

Algebraic. techniques1 techniques Algebraic An electrician, a bank worker, a plumber and so on all have tools of their trade. Without these tools, and a good working knowledge of how to use them, it would be impossible for them

More information

One sided tests. An example of a two sided alternative is what we ve been using for our two sample tests:

One sided tests. An example of a two sided alternative is what we ve been using for our two sample tests: One sided tests So far all of our tests have been two sided. While this may be a bit easier to understand, this is often not the best way to do a hypothesis test. One simple thing that we can do to get

More information

Chapter 14: Divisibility and factorization

Chapter 14: Divisibility and factorization Chapter 14: Divisibility and factorization Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Summer I 2014 M. Macauley (Clemson) Chapter

More information

PURE Math Residents Program Gröbner Bases and Applications Week 3 Lectures

PURE Math Residents Program Gröbner Bases and Applications Week 3 Lectures PURE Math Residents Program Gröbner Bases and Applications Week 3 Lectures John B. Little Department of Mathematics and Computer Science College of the Holy Cross June 2012 Overview of this week The research

More information

Linear Algebra, Summer 2011, pt. 2

Linear Algebra, Summer 2011, pt. 2 Linear Algebra, Summer 2, pt. 2 June 8, 2 Contents Inverses. 2 Vector Spaces. 3 2. Examples of vector spaces..................... 3 2.2 The column space......................... 6 2.3 The null space...........................

More information

Graphs of Polynomial Functions

Graphs of Polynomial Functions Graphs of Polynomial Functions By: OpenStaxCollege The revenue in millions of dollars for a fictional cable company from 2006 through 2013 is shown in [link]. Year 2006 2007 2008 2009 2010 2011 2012 2013

More information

Lab 2 Worksheet. Problems. Problem 1: Geometry and Linear Equations

Lab 2 Worksheet. Problems. Problem 1: Geometry and Linear Equations Lab 2 Worksheet Problems Problem : Geometry and Linear Equations Linear algebra is, first and foremost, the study of systems of linear equations. You are going to encounter linear systems frequently in

More information

Lecture 7.4: Divisibility and factorization

Lecture 7.4: Divisibility and factorization Lecture 7.4: Divisibility and factorization Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Modern Algebra M. Macauley (Clemson)

More information

Lecture Notes: Eigenvalues and Eigenvectors. 1 Definitions. 2 Finding All Eigenvalues

Lecture Notes: Eigenvalues and Eigenvectors. 1 Definitions. 2 Finding All Eigenvalues Lecture Notes: Eigenvalues and Eigenvectors Yufei Tao Department of Computer Science and Engineering Chinese University of Hong Kong taoyf@cse.cuhk.edu.hk 1 Definitions Let A be an n n matrix. If there

More information

Math 4370 Exam 1. Handed out March 9th 2010 Due March 18th 2010

Math 4370 Exam 1. Handed out March 9th 2010 Due March 18th 2010 Math 4370 Exam 1 Handed out March 9th 2010 Due March 18th 2010 Problem 1. Recall from problem 1.4.6.e in the book, that a generating set {f 1,..., f s } of I is minimal if I is not the ideal generated

More information

Lecture 4.1: Homomorphisms and isomorphisms

Lecture 4.1: Homomorphisms and isomorphisms Lecture 4.: Homomorphisms and isomorphisms Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4, Modern Algebra M. Macauley (Clemson) Lecture

More information

2 Discrete Dynamical Systems (DDS)

2 Discrete Dynamical Systems (DDS) 2 Discrete Dynamical Systems (DDS) 2.1 Basics A Discrete Dynamical System (DDS) models the change (or dynamics) of single or multiple populations or quantities in which the change occurs deterministically

More information

8.5 Taylor Polynomials and Taylor Series

8.5 Taylor Polynomials and Taylor Series 8.5. TAYLOR POLYNOMIALS AND TAYLOR SERIES 50 8.5 Taylor Polynomials and Taylor Series Motivating Questions In this section, we strive to understand the ideas generated by the following important questions:

More information

Math101, Sections 2 and 3, Spring 2008 Review Sheet for Exam #2:

Math101, Sections 2 and 3, Spring 2008 Review Sheet for Exam #2: Math101, Sections 2 and 3, Spring 2008 Review Sheet for Exam #2: 03 17 08 3 All about lines 3.1 The Rectangular Coordinate System Know how to plot points in the rectangular coordinate system. Know the

More information

Gröbner Bases. eliminating the leading term Buchberger s criterion and algorithm. construct wavelet filters

Gröbner Bases. eliminating the leading term Buchberger s criterion and algorithm. construct wavelet filters Gröbner Bases 1 S-polynomials eliminating the leading term Buchberger s criterion and algorithm 2 Wavelet Design construct wavelet filters 3 Proof of the Buchberger Criterion two lemmas proof of the Buchberger

More information

22 Approximations - the method of least squares (1)

22 Approximations - the method of least squares (1) 22 Approximations - the method of least squares () Suppose that for some y, the equation Ax = y has no solutions It may happpen that this is an important problem and we can t just forget about it If we

More information

Linear maps. Matthew Macauley. Department of Mathematical Sciences Clemson University Math 8530, Spring 2017

Linear maps. Matthew Macauley. Department of Mathematical Sciences Clemson University  Math 8530, Spring 2017 Linear maps Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 8530, Spring 2017 M. Macauley (Clemson) Linear maps Math 8530, Spring 2017

More information

e x = 1 + x + x2 2! + x3 If the function f(x) can be written as a power series on an interval I, then the power series is of the form

e x = 1 + x + x2 2! + x3 If the function f(x) can be written as a power series on an interval I, then the power series is of the form Taylor Series Given a function f(x), we would like to be able to find a power series that represents the function. For example, in the last section we noted that we can represent e x by the power series

More information

Chapter 1: Linear Equations

Chapter 1: Linear Equations Chapter : Linear Equations (Last Updated: September, 6) The material for these notes is derived primarily from Linear Algebra and its applications by David Lay (4ed).. Systems of Linear Equations Before

More information

To get horizontal and slant asymptotes algebraically we need to know about end behaviour for rational functions.

To get horizontal and slant asymptotes algebraically we need to know about end behaviour for rational functions. Concepts: Horizontal Asymptotes, Vertical Asymptotes, Slant (Oblique) Asymptotes, Transforming Reciprocal Function, Sketching Rational Functions, Solving Inequalities using Sign Charts. Rational Function

More information

3.2 Constructible Numbers

3.2 Constructible Numbers 102 CHAPTER 3. SYMMETRIES 3.2 Constructible Numbers Armed with a straightedge, a compass and two points 0 and 1 marked on an otherwise blank number-plane, the game is to see which complex numbers you can

More information

MATH 115, SUMMER 2012 LECTURE 12

MATH 115, SUMMER 2012 LECTURE 12 MATH 115, SUMMER 2012 LECTURE 12 JAMES MCIVOR - last time - we used hensel s lemma to go from roots of polynomial equations mod p to roots mod p 2, mod p 3, etc. - from there we can use CRT to construct

More information

Interpolation and the Lagrange Polynomial

Interpolation and the Lagrange Polynomial Interpolation and the Lagrange Polynomial MATH 375 J. Robert Buchanan Department of Mathematics Fall 2013 Introduction We often choose polynomials to approximate other classes of functions. Theorem (Weierstrass

More information

Limits Involving Infinity (Horizontal and Vertical Asymptotes Revisited)

Limits Involving Infinity (Horizontal and Vertical Asymptotes Revisited) Limits Involving Infinity (Horizontal and Vertical Asymptotes Revisited) Limits as Approaches Infinity At times you ll need to know the behavior of a function or an epression as the inputs get increasingly

More information

Chapter 1: Linear Equations

Chapter 1: Linear Equations Chapter : Linear Equations (Last Updated: September, 7) The material for these notes is derived primarily from Linear Algebra and its applications by David Lay (4ed).. Systems of Linear Equations Before

More information

MCS 563 Spring 2014 Analytic Symbolic Computation Monday 27 January. Gröbner bases

MCS 563 Spring 2014 Analytic Symbolic Computation Monday 27 January. Gröbner bases Gröbner bases In this lecture we introduce Buchberger s algorithm to compute a Gröbner basis for an ideal, following [2]. We sketch an application in filter design. Showing the termination of Buchberger

More information

LIMITS AT INFINITY MR. VELAZQUEZ AP CALCULUS

LIMITS AT INFINITY MR. VELAZQUEZ AP CALCULUS LIMITS AT INFINITY MR. VELAZQUEZ AP CALCULUS RECALL: VERTICAL ASYMPTOTES Remember that for a rational function, vertical asymptotes occur at values of x = a which have infinite its (either positive or

More information

Physics 331 Introduction to Numerical Techniques in Physics

Physics 331 Introduction to Numerical Techniques in Physics Physics 331 Introduction to Numerical Techniques in Physics Instructor: Joaquín Drut Lecture 12 Last time: Polynomial interpolation: basics; Lagrange interpolation. Today: Quick review. Formal properties.

More information

A brief introduction to computational algebraic geometry

A brief introduction to computational algebraic geometry A brief introduction to computational algebraic geometry Evan M. Bullock This is a collection of lecture notes and problem sets from MATH 499: VIGRE Computational Algebraic Geometry at Rice University

More information

Networks in systems biology

Networks in systems biology Networks in systems biology Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Spring 2017 M. Macauley (Clemson) Networks in systems

More information

A Harvard Sampler. Evan Chen. February 23, I crashed a few math classes at Harvard on February 21, Here are notes from the classes.

A Harvard Sampler. Evan Chen. February 23, I crashed a few math classes at Harvard on February 21, Here are notes from the classes. A Harvard Sampler Evan Chen February 23, 2014 I crashed a few math classes at Harvard on February 21, 2014. Here are notes from the classes. 1 MATH 123: Algebra II In this lecture we will make two assumptions.

More information

COMS 4721: Machine Learning for Data Science Lecture 6, 2/2/2017

COMS 4721: Machine Learning for Data Science Lecture 6, 2/2/2017 COMS 4721: Machine Learning for Data Science Lecture 6, 2/2/2017 Prof. John Paisley Department of Electrical Engineering & Data Science Institute Columbia University UNDERDETERMINED LINEAR EQUATIONS We

More information

Power series and Taylor series

Power series and Taylor series Power series and Taylor series D. DeTurck University of Pennsylvania March 29, 2018 D. DeTurck Math 104 002 2018A: Series 1 / 42 Series First... a review of what we have done so far: 1 We examined series

More information

Chapter Six. Polynomials. Properties of Exponents Algebraic Expressions Addition, Subtraction, and Multiplication Factoring Solving by Factoring

Chapter Six. Polynomials. Properties of Exponents Algebraic Expressions Addition, Subtraction, and Multiplication Factoring Solving by Factoring Chapter Six Polynomials Properties of Exponents Algebraic Expressions Addition, Subtraction, and Multiplication Factoring Solving by Factoring Properties of Exponents The properties below form the basis

More information

From Lay, 5.4. If we always treat a matrix as defining a linear transformation, what role does diagonalisation play?

From Lay, 5.4. If we always treat a matrix as defining a linear transformation, what role does diagonalisation play? Overview Last week introduced the important Diagonalisation Theorem: An n n matrix A is diagonalisable if and only if there is a basis for R n consisting of eigenvectors of A. This week we ll continue

More information

Polynomial Review Problems

Polynomial Review Problems Polynomial Review Problems 1. Find polynomial function formulas that could fit each of these graphs. Remember that you will need to determine the value of the leading coefficient. The point (0,-3) is on

More information

1 Operations on Polynomials

1 Operations on Polynomials 15-251: Great Theoretical Ideas in Computer Science Anupam Gupta Notes on Polynomials, Interpolation, and Codes (draft!!) January 29, 2012 You ve probably all seen polynomials before: e.g., 3x 2 5x+17,

More information

Lecture 1. (i,j) N 2 kx i y j, and this makes k[x, y]

Lecture 1. (i,j) N 2 kx i y j, and this makes k[x, y] Lecture 1 1. Polynomial Rings, Gröbner Bases Definition 1.1. Let R be a ring, G an abelian semigroup, and R = i G R i a direct sum decomposition of abelian groups. R is graded (G-graded) if R i R j R i+j

More information

Infinite Series. Copyright Cengage Learning. All rights reserved.

Infinite Series. Copyright Cengage Learning. All rights reserved. Infinite Series Copyright Cengage Learning. All rights reserved. Taylor and Maclaurin Series Copyright Cengage Learning. All rights reserved. Objectives Find a Taylor or Maclaurin series for a function.

More information

Bézier Curves and Splines

Bézier Curves and Splines CS-C3100 Computer Graphics Bézier Curves and Splines Majority of slides from Frédo Durand vectorportal.com CS-C3100 Fall 2017 Lehtinen Before We Begin Anything on your mind concerning Assignment 1? CS-C3100

More information

Overview of vector calculus. Coordinate systems in space. Distance formula. (Sec. 12.1)

Overview of vector calculus. Coordinate systems in space. Distance formula. (Sec. 12.1) Math 20C Multivariable Calculus Lecture 1 1 Coordinates in space Slide 1 Overview of vector calculus. Coordinate systems in space. Distance formula. (Sec. 12.1) Vector calculus studies derivatives and

More information

Bistability in ODE and Boolean network models

Bistability in ODE and Boolean network models Bistability in ODE and Boolean network models Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Spring 2017 M. Macauley (Clemson)

More information

Quantitative Understanding in Biology Module III: Linear Difference Equations Lecture II: Complex Eigenvalues

Quantitative Understanding in Biology Module III: Linear Difference Equations Lecture II: Complex Eigenvalues Quantitative Understanding in Biology Module III: Linear Difference Equations Lecture II: Complex Eigenvalues Introduction In the previous section, we considered the generalized twovariable system of linear

More information

Quick-and-Easy Factoring. of lower degree; several processes are available to fi nd factors.

Quick-and-Easy Factoring. of lower degree; several processes are available to fi nd factors. Lesson 11-3 Quick-and-Easy Factoring BIG IDEA Some polynomials can be factored into polynomials of lower degree; several processes are available to fi nd factors. Vocabulary factoring a polynomial factored

More information

MATH 12 CLASS 4 NOTES, SEP

MATH 12 CLASS 4 NOTES, SEP MATH 12 CLASS 4 NOTES, SEP 28 2011 Contents 1. Lines in R 3 1 2. Intersections of lines in R 3 2 3. The equation of a plane 4 4. Various problems with planes 5 4.1. Intersection of planes with planes or

More information

Math 10b Ch. 8 Reading 1: Introduction to Taylor Polynomials

Math 10b Ch. 8 Reading 1: Introduction to Taylor Polynomials Math 10b Ch. 8 Reading 1: Introduction to Taylor Polynomials Introduction: In applications, it often turns out that one cannot solve the differential equations or antiderivatives that show up in the real

More information

Dot Products, Transposes, and Orthogonal Projections

Dot Products, Transposes, and Orthogonal Projections Dot Products, Transposes, and Orthogonal Projections David Jekel November 13, 2015 Properties of Dot Products Recall that the dot product or standard inner product on R n is given by x y = x 1 y 1 + +

More information

Math Lecture 18 Notes

Math Lecture 18 Notes Math 1010 - Lecture 18 Notes Dylan Zwick Fall 2009 In our last lecture we talked about how we can add, subtract, and multiply polynomials, and we figured out that, basically, if you can add, subtract,

More information

ENGINEERING MATH 1 Fall 2009 VECTOR SPACES

ENGINEERING MATH 1 Fall 2009 VECTOR SPACES ENGINEERING MATH 1 Fall 2009 VECTOR SPACES A vector space, more specifically, a real vector space (as opposed to a complex one or some even stranger ones) is any set that is closed under an operation of

More information

MCS 563 Spring 2014 Analytic Symbolic Computation Friday 31 January. Quotient Rings

MCS 563 Spring 2014 Analytic Symbolic Computation Friday 31 January. Quotient Rings Quotient Rings In this note we consider again ideals, but here we do not start from polynomials, but from a finite set of points. The application in statistics and the pseudo code of the Buchberger-Möller

More information

We consider the problem of finding a polynomial that interpolates a given set of values:

We consider the problem of finding a polynomial that interpolates a given set of values: Chapter 5 Interpolation 5. Polynomial Interpolation We consider the problem of finding a polynomial that interpolates a given set of values: x x 0 x... x n y y 0 y... y n where the x i are all distinct.

More information

Math 231E, Lecture 25. Integral Test and Estimating Sums

Math 231E, Lecture 25. Integral Test and Estimating Sums Math 23E, Lecture 25. Integral Test and Estimating Sums Integral Test The definition of determining whether the sum n= a n converges is:. Compute the partial sums s n = a k, k= 2. Check that s n is a convergent

More information

Lecture 6.3: Polynomials and irreducibility

Lecture 6.3: Polynomials and irreducibility Lecture 6.3: Polynomials and irreducibility Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Modern Algebra M. Macauley (Clemson)

More information

Permutations and Polynomials Sarah Kitchen February 7, 2006

Permutations and Polynomials Sarah Kitchen February 7, 2006 Permutations and Polynomials Sarah Kitchen February 7, 2006 Suppose you are given the equations x + y + z = a and 1 x + 1 y + 1 z = 1 a, and are asked to prove that one of x,y, and z is equal to a. We

More information

Projections and Least Square Solutions. Recall that given an inner product space V with subspace W and orthogonal basis for

Projections and Least Square Solutions. Recall that given an inner product space V with subspace W and orthogonal basis for Math 57 Spring 18 Projections and Least Square Solutions Recall that given an inner product space V with subspace W and orthogonal basis for W, B {v 1, v,..., v k }, the orthogonal projection of V onto

More information

Integer-Valued Polynomials

Integer-Valued Polynomials Integer-Valued Polynomials LA Math Circle High School II Dillon Zhi October 11, 2015 1 Introduction Some polynomials take integer values p(x) for all integers x. The obvious examples are the ones where

More information

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields Bull. Math. Soc. Sci. Math. Roumanie Tome 56(104) No. 2, 2013, 217 228 Computing Minimal Polynomial of Matrices over Algebraic Extension Fields by Amir Hashemi and Benyamin M.-Alizadeh Abstract In this

More information

Lecture 3.1: Subgroups

Lecture 3.1: Subgroups Lecture 3.1: Subgroups Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Modern Algebra M. Macauley (Clemson) Lecture 3.1: Subgroups

More information

Lecture 7.5: Euclidean domains and algebraic integers

Lecture 7.5: Euclidean domains and algebraic integers Lecture 7.5: Euclidean domains and algebraic integers Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Modern Algebra M. Macauley

More information

Lecture 19: Introduction to Linear Transformations

Lecture 19: Introduction to Linear Transformations Lecture 19: Introduction to Linear Transformations Winfried Just, Ohio University October 11, 217 Scope of this lecture Linear transformations are important and useful: A lot of applications of linear

More information

19. TAYLOR SERIES AND TECHNIQUES

19. TAYLOR SERIES AND TECHNIQUES 19. TAYLOR SERIES AND TECHNIQUES Taylor polynomials can be generated for a given function through a certain linear combination of its derivatives. The idea is that we can approximate a function by a polynomial,

More information

CS261: A Second Course in Algorithms Lecture #8: Linear Programming Duality (Part 1)

CS261: A Second Course in Algorithms Lecture #8: Linear Programming Duality (Part 1) CS261: A Second Course in Algorithms Lecture #8: Linear Programming Duality (Part 1) Tim Roughgarden January 28, 2016 1 Warm-Up This lecture begins our discussion of linear programming duality, which is

More information

Lecture 10: Powers of Matrices, Difference Equations

Lecture 10: Powers of Matrices, Difference Equations Lecture 10: Powers of Matrices, Difference Equations Difference Equations A difference equation, also sometimes called a recurrence equation is an equation that defines a sequence recursively, i.e. each

More information

PREMUR Seminar Week 2 Discussions - Polynomial Division, Gröbner Bases, First Applications

PREMUR Seminar Week 2 Discussions - Polynomial Division, Gröbner Bases, First Applications PREMUR 2007 - Seminar Week 2 Discussions - Polynomial Division, Gröbner Bases, First Applications Day 1: Monomial Orders In class today, we introduced the definition of a monomial order in the polyomial

More information

What if the characteristic equation has complex roots?

What if the characteristic equation has complex roots? MA 360 Lecture 18 - Summary of Recurrence Relations (cont. and Binomial Stuff Thursday, November 13, 01. Objectives: Examples of Recurrence relation solutions, Pascal s triangle. A quadratic equation What

More information

5.2 Infinite Series Brian E. Veitch

5.2 Infinite Series Brian E. Veitch 5. Infinite Series Since many quantities show up that cannot be computed exactly, we need some way of representing it (or approximating it). One way is to sum an infinite series. Recall that a n is the

More information

MTH Linear Algebra. Study Guide. Dr. Tony Yee Department of Mathematics and Information Technology The Hong Kong Institute of Education

MTH Linear Algebra. Study Guide. Dr. Tony Yee Department of Mathematics and Information Technology The Hong Kong Institute of Education MTH 3 Linear Algebra Study Guide Dr. Tony Yee Department of Mathematics and Information Technology The Hong Kong Institute of Education June 3, ii Contents Table of Contents iii Matrix Algebra. Real Life

More information

Diagonalization. MATH 1502 Calculus II Notes. November 4, 2008

Diagonalization. MATH 1502 Calculus II Notes. November 4, 2008 Diagonalization MATH 1502 Calculus II Notes November 4, 2008 We want to understand all linear transformations L : R n R m. The basic case is the one in which n = m. That is to say, the case in which the

More information

Bistability and a differential equation model of the lac operon

Bistability and a differential equation model of the lac operon Bistability and a differential equation model of the lac operon Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Fall 2016 M. Macauley

More information

INTRODUCTION TO DIFFERENTIATION

INTRODUCTION TO DIFFERENTIATION INTRODUCTION TO DIFFERENTIATION GRADIENT OF A CURVE We have looked at the process needed for finding the gradient of a curve (or the rate of change of a curve). We have defined the gradient of a curve

More information

A new parametrization for binary hidden Markov modes

A new parametrization for binary hidden Markov modes A new parametrization for binary hidden Markov models Andrew Critch, UC Berkeley at Pennsylvania State University June 11, 2012 See Binary hidden Markov models and varieties [, 2012], arxiv:1206.0500,

More information

WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE

WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE JEFFREY B. FARR AND ROMAN PEARCE Abstract. We comment on the implementation of various algorithms in multivariate polynomial theory. Specifically, we describe

More information

FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 41

FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 41 FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 41 RAVI VAKIL CONTENTS 1. Normalization 1 2. Extending maps to projective schemes over smooth codimension one points: the clear denominators theorem 5 Welcome back!

More information

IMMERSE 2008: Assignment 4

IMMERSE 2008: Assignment 4 IMMERSE 2008: Assignment 4 4.) Let A be a ring and set R = A[x,...,x n ]. For each let R a = A x a...xa. Prove that is an -graded ring. a = (a,...,a ) R = a R a Proof: It is necessary to show that (a)

More information

ABSTRACT. Department of Mathematics. interesting results. A graph on n vertices is represented by a polynomial in n

ABSTRACT. Department of Mathematics. interesting results. A graph on n vertices is represented by a polynomial in n ABSTRACT Title of Thesis: GRÖBNER BASES WITH APPLICATIONS IN GRAPH THEORY Degree candidate: Angela M. Hennessy Degree and year: Master of Arts, 2006 Thesis directed by: Professor Lawrence C. Washington

More information

Intermediate Algebra. Gregg Waterman Oregon Institute of Technology

Intermediate Algebra. Gregg Waterman Oregon Institute of Technology Intermediate Algebra Gregg Waterman Oregon Institute of Technology c 2017 Gregg Waterman This work is licensed under the Creative Commons Attribution 4.0 International license. The essence of the license

More information

Math 3 Variable Manipulation Part 3 Polynomials A

Math 3 Variable Manipulation Part 3 Polynomials A Math 3 Variable Manipulation Part 3 Polynomials A 1 MATH 1 & 2 REVIEW: VOCABULARY Constant: A term that does not have a variable is called a constant. Example: the number 5 is a constant because it does

More information

Parabolas and lines

Parabolas and lines Parabolas and lines Study the diagram at the right. I have drawn the graph y = x. The vertical line x = 1 is drawn and a number of secants to the parabola are drawn, all centred at x=1. By this I mean

More information

EIGENVALUES AND EIGENVECTORS 3

EIGENVALUES AND EIGENVECTORS 3 EIGENVALUES AND EIGENVECTORS 3 1. Motivation 1.1. Diagonal matrices. Perhaps the simplest type of linear transformations are those whose matrix is diagonal (in some basis). Consider for example the matrices

More information

Absolute and Local Extrema

Absolute and Local Extrema Extrema of Functions We can use the tools of calculus to help us understand and describe the shapes of curves. Here is some of the data that derivatives f (x) and f (x) can provide about the shape of the

More information

Polynomial and Synthetic Division

Polynomial and Synthetic Division Polynomial and Synthetic Division Polynomial Division Polynomial Division is very similar to long division. Example: 3x 3 5x 3x 10x 1 3 Polynomial Division 3x 1 x 3x 3 3 x 5x 3x x 6x 4 10x 10x 7 3 x 1

More information

Assignment 3 with Solutions

Assignment 3 with Solutions Discrete Mathematics (Math 27), Spring 2004 Assignment 3 with Solutions. Recall the definition of functions, one-to-one functions, and onto functions. (a) Consider the function f : R R with f(x) x x. i.

More information

Polynomial Interpolation

Polynomial Interpolation Chapter Polynomial Interpolation. Introduction Suppose that we have a two sets of n + real numbers {x i } n+ i= and {y i} n+ i=, and that the x i are strictly increasing: x < x < x 2 < < x n. Interpolation

More information

Lecture 23: Hermite and Bezier Curves

Lecture 23: Hermite and Bezier Curves Lecture 23: Hermite and Bezier Curves November 16, 2017 11/16/17 CSU CS410 Fall 2017, Ross Beveridge & Bruce Draper 1 Representing Curved Objects So far we ve seen Polygonal objects (triangles) and Spheres

More information

Section Example Determine the Maclaurin series of f (x) = e x and its the interval of convergence.

Section Example Determine the Maclaurin series of f (x) = e x and its the interval of convergence. Example Determine the Maclaurin series of f (x) = e x and its the interval of convergence. Example Determine the Maclaurin series of f (x) = e x and its the interval of convergence. f n (0)x n Recall from

More information

1 Review of the dot product

1 Review of the dot product Any typographical or other corrections about these notes are welcome. Review of the dot product The dot product on R n is an operation that takes two vectors and returns a number. It is defined by n u

More information

Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics. Tan Tran Junior Major-Economics& Mathematics

Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics. Tan Tran Junior Major-Economics& Mathematics Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics Tan Tran Junior Major-Economics& Mathematics History Groebner bases were developed by Buchberger in 1965, who later named

More information

b) since the remainder is 0 I need to factor the numerator. Synthetic division tells me this is true

b) since the remainder is 0 I need to factor the numerator. Synthetic division tells me this is true Section 5.2 solutions #1-10: a) Perform the division using synthetic division. b) if the remainder is 0 use the result to completely factor the dividend (this is the numerator or the polynomial to the

More information

2.5 Complex Zeros and the Fundamental Theorem of Algebra

2.5 Complex Zeros and the Fundamental Theorem of Algebra 210 CHAPTER 2 Polynomial, Power, and Rational Functions What you ll learn about Two Major Theorems Complex Conjugate Zeros Factoring with Real Number Coefficients... and why These topics provide the complete

More information

Numerical Analysis: Interpolation Part 1

Numerical Analysis: Interpolation Part 1 Numerical Analysis: Interpolation Part 1 Computer Science, Ben-Gurion University (slides based mostly on Prof. Ben-Shahar s notes) 2018/2019, Fall Semester BGU CS Interpolation (ver. 1.00) AY 2018/2019,

More information

MATH 113: ELEMENTARY CALCULUS

MATH 113: ELEMENTARY CALCULUS MATH 3: ELEMENTARY CALCULUS Please check www.ualberta.ca/ zhiyongz for notes updation! 6. Rates of Change and Limits A fundamental philosophical truth is that everything changes. In physics, the change

More information

Representation of Functions as Power Series

Representation of Functions as Power Series Representation of Functions as Power Series Philippe B. Laval KSU Today Philippe B. Laval (KSU) Functions as Power Series Today / Introduction In this section and the next, we develop several techniques

More information

Intro to Rings, Fields, Polynomials: Hardware Modeling by Modulo Arithmetic

Intro to Rings, Fields, Polynomials: Hardware Modeling by Modulo Arithmetic Intro to Rings, Fields, Polynomials: Hardware Modeling by Modulo Arithmetic Priyank Kalla Associate Professor Electrical and Computer Engineering, University of Utah kalla@ece.utah.edu http://www.ece.utah.edu/~kalla

More information

Matrices related to linear transformations

Matrices related to linear transformations Math 4326 Fall 207 Matrices related to linear transformations We have encountered several ways in which matrices relate to linear transformations. In this note, I summarize the important facts and formulas

More information

FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 27

FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 27 FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 27 RAVI VAKIL CONTENTS 1. Proper morphisms 1 2. Scheme-theoretic closure, and scheme-theoretic image 2 3. Rational maps 3 4. Examples of rational maps 5 Last day:

More information