Exact Minimization of Fixed Polarity. Specied Functions. Debatosh Debnath and Tsutomu Sasao. Kyushu Institute of Technology

Size: px
Start display at page:

Download "Exact Minimization of Fixed Polarity. Specied Functions. Debatosh Debnath and Tsutomu Sasao. Kyushu Institute of Technology"

Transcription

1 Exact Mnmzaton of Fxed Polarty Reed-Muller Expressons for Incompletely Speced Functons Debatosh Debnath and Tsutomu Sasao Department of Computer Scence and Electroncs Kyushu Insttute of Technology Izuka , Japan Abstract Ths paper presents an exact mnmzaton algorthm for fxed polarty Reed-Muller expressons (FPRMs) for ncompletely specfed functons. For an n-varable functon wth unspecfed mnterms there are 2 n+ dstnct FPRMs. A mnmum FPRM s one wth the fewest products. The mnmzaton algorthm s based on the mult-termnal bnary decson dagrams. Expermental results for a set of functons are shown. The algorthm can be extended to obtan exact mnmum Kronecker expressons for ncompletely specfed functons. Index Terms AND-EXOR, Reed-Muller expresson, Kronecker expresson, exact mnmzaton, ncompletely specfed functon. I. Introducton Fxed polarty Reed-Muller expresson (FPRM) s one of the canoncal AND-EXOR expressons [15]. FPRMs are a generalzaton of postve polarty Reed-Muller expressons (PPRMs). A PPRM, whch s unque for a completely speced functon, s an AND-EXOR expresson wth only uncomplemented lterals. PPRMs are also known as Zhegalkn polynomals after the Russan logcan Ivan I. Zhegalkn who rst publshed ths canoncal form [27]. Each varable n an FPRM can appear ether n complemented or uncomplemented form. An n-varable completely speced functon has 2 n dstnct FPRMs. For ncompletely speced functon, the number of FPRMs ncreases exponentally wth the ncrease n the number of unspeced mnterms: 2 n+ dstnct FPRMs exst for an n-varable functon wth unspeced mnterms. An expresson wth the fewest products s a mnmum expresson. FPRMs are mportant because they can be used to desgn easly testable crcuts [14], to detect symmetrc varables of swtchng functons [22], to desgn multlevel crcuts [23], and n Boolean matchng [24]. Moreover, for some classes of practcal functons, FPRMs requre fewer products than sum-of-products expressons (SOPs) [15{18]. For completely speced functons, numerous exact and heurstc mnmzaton algorthms for FPRMs exst [7, 10, 14, 17, 21]. However, lttle research has been done to mnmze FPRMs for ncompletely speced functons. Tran dscussed a graphcal procedure, whch s based on a tral-and-error method, to smplfy FPRMs for ncompletely speced functons [20]. The method can be applcable to functons wth up to sx varables. By usng spectral technques [9], Varma and Trachtenberg developed heurstc algorthms to smplfy PPRMs for ncompletely speced functons [25]. Chang and Falkowsk reported methods to smplfy FPRMs for ncompletely speced functons [3, 4]. Recently, Zlc and Vranesc presented a heurstc scheme to compute multple-valued Reed-Muller transform for ncompletely speced functons [28]. McKenze et al. developed a branch and bound algorthm for the exact mnmzaton of PPRMs for ncompletely speced functons [13]. Green descrbed an exhaustve search method [8]. Zakrevskj formulated the exact mnmzaton of PPRMs for ncompletely spec- ed functons as a soluton of a system of lnear logcal equatons, and presented expermental results for functons wth up to 20 speced mnterms [26]. McKenze et al. [13] and Zakrevskj [26] also consdered heurstc smplcaton methods. In ths paper we present an algorthm to obtan exact mnmum FPRMs for ncompletely speced functons. The method s based on the computaton of extended truth vector and weght vector, whch are also used for the exact mnmzaton of FPRMs for completely spec- ed functons [6, 17]. Every component of these vectors s an nteger-valued functon represented by mult-termnal bnary decson dagram (MTBDD) [5]. Kronecker expressons [6, 12, 18], ntroduced by Boul et al. [1], are a generalzaton of FPRMs. We also dscuss an extenson

2 of the FPRM mnmzaton algorthm to mnmze Kronecker expressons for ncompletely speced functons. The remander of the paper s organzed as follows: Secton II ntroduces termnology and presents basc propertes. Secton III develops an exact mnmzaton algorthm. Secton IV reports expermental results. Secton V presents concluson and outlnes future work. II. Dentons and Basc Propertes In ths paper, the operators `+' and `' ndcate arthmetc and mod-2 addton, respectvely. Denton 2.1 An n-varable swtchng functon f s a mappng f : f0,1g n!f0,1g andan n-varable ntegervalued functon g s a mappng g : f0,1g n!f0,1, :::,p ; 1g, where p 2. It should be noted that swtchng functons are a subset of nteger-valued functons. Denton 2.2 An n-varable nteger-valued P functon 2 f(x 1,x 2, :::,x n ) can be wrtten as n ;1 j=0 m jx b 1 1 xb 2 2 x b n n, where m j 2f0,1, :::,p ; 1g (p 2), b 1,b 2, :::,b n 2f0,1g such that b 1 b 2 b n s the n-bt bnary number representng j, x b =x when b =0, x b = x when b =1, and = 1,2, :::,n. Then [m 0,m 1, :::,m 2 n ;1 ]sthetruth vector of f. Example 2.1 The truth vector of the three-varable swtchng functon x 1 x 2 x 3 _ x 1 s [1,0,0,0,1,1,1,1], and that of the three-varable nteger-valued functon 3x 1 + 4x 2 x 3 +2x 3 s [2,0,2,4,5,3,5,7]. Property 2.1 Let f be a swtchng functon. Then f + f = 1. Example 2.2 Let the two-varable swtchng functon f be [1,0,0,0]. Then f + f = [1,0,0,0] + [0,1,1,1] = [1,1,1,1] = 1. Property 2.2 Let f be an nteger-valued functon. Then f + f + + f = k f: {z } k operands Example 2.3 Let the two-varable nteger-valued functon f be [1,0,3,5]. Then f + f + f =3 [1,0,3,5] = [3,0,9,15]. Denton 2.3 An n-varable swtchng functon f(x 1,x 2, :::,x n ) can be wrtten as a fxed polarty Reed-Muller P2 n ;1 expresson (FPRM) a j=0 j x b 1 1 xb 2 2 xb n n, where a j 2f0,1g, b 1,b 2, :::,b n 2f0,1g such that b 1 b 2 b n s the n-bt bnary number representng j, x b = 1 when b =0, x b 2fx,x g such that for each ether x or x appear throughout the expresson when b = 1, and = 1,2, :::,n. In an FPRM, each varable can appear ether n complemented or uncomplemented form,.e., polarty ofeach varable can be chosen n two ways. Thus, for an n-varable completely speced functon there are 2 n dstnct FPRMs. Denton 2.4 Polarty vector (b 1,b 2, :::,b n ) for an FPRM of an n-varable swtchng functon f(x 1,x 2, :::,x n ) s a bnary vector wth n elements, where b = 0 ndcates varable x s used n the uncomplemented form (x ) and b = 1 ndcates varable x s used n the complemented form (x ). Example 2.4 Let the three-varable swtchng functon f be x 1 x 3 _ x 2 x 3 and (0,1,1) be a polarty vector for an FPRM of f. Snce x 1 x 3 and x 2 x 3 are dsjont, we can wrte f = x 1 x 3 x 2 x 3. By puttng x 3 =1x 3 n the expresson for f, wehave f = x 1 (1 x 3 ) x 2 x 3 = x 1 x 1 x 3 x 2 x 3,whchs the FPRM for f wth polartyvector (0,1,1). III. Mnmzaton Technques For an n-varable completely speced swtchng functon there are 2 n dstnct FPRMs, and the mnmzaton problem s to nd a polarty vector that produces an FPRM wth mnmum number of products. On the other hand, for an n-varable ncompletely speced swtchng functon wth unspeced mnterms there are 2 n+ dstnct FPRMs, and the mnmzaton problem s to nd a polarty vector and an assgnment of the unspeced mnterms to 0's and 1's that produce an FPRM wth mnmum number of products. Once the polarty vector and the assgnment of the unspeced mnterms are determned, generaton of an FPRM s relatvely easy [6, 17]. Fg. 1 llustrates a method for the exact mnmzaton of FPRMs for three-varable swtchng functon. The method s based on the computaton of extended truth vector and weght vector [6, 17]. The extended truth vector [t 0,t 1, :::,t 26 ] s computed from the truth vector [m 0,m 1, :::,m 7 ] of a gven swtchng functon, and the weght vector [w 0,w 1, :::,w 7 ] s computed from the extended truth vector. In general, for an n-varable completely speced swtchng functon, extended truth vector s a bnary vector [t 0,t 1, :::,t 3 n ;1 ] wth 3 n elements, and weght vectorsannteger vector [w 0,w 1, :::,w 2 n ;1 ]wth 2 n elements. Each element of the weght vector s assocated wth a polarty vector, whch sshown at the rghtmost sde n Fg. 1. In general, for an n-varable swtchng functon f, polarty vector for w j s a bnary vector (b 1,b 2, :::,b n )suchthatb 1 b 2 b n s the n-bt bnary number representng j (j = 0,1, :::,2 n ; 1), and w j represents the number of products n the FPRM for f wth polarty vector (b 1,b 2, :::,b n ).

3 m 0 m 1 m 2 m 3 m 4 m 5 m 6 m 7 r 0 (= m 0 ) r 1 (= m 1 ) r 2 (= m 0 m 1 ) r 3 (= m 2 ) r 4 (= m 3 ) r 5 (= m 2 m 3 ) r 6 (= m 4 ) r 7 (= m 5 ) r 8 (= m 4 m 5 ) r 9 (= m 6 ) r 10 (= m 7 ) r 11 (= m 6 m 7 ) s 0 (= r 0 ) s 1 (= r 1 ) s 2 (= r 2 ) s 3 (= r 3 ) s 4 (= r 4 ) s 5 (= r 5 ) s 6 (= r 0 r 3 ) s 7 (= r 1 r 4 ) s 8 (= r 2 r 5 ) s 9 (= r 6 ) s 10 (= r 7 ) s 11 (= r 8 ) s 12 (= r 9 ) s 13 (= r 10 ) s 14 (= r 11 ) s 15 (= r 6 r 9 ) s 16 (= r 7 r 10 ) s 17 (= r 8 r 11 ) t 0 (= s 0 ) t 1 (= s 1 ) t 2 (= s 2 ) t 3 (= s 3 ) t 4 (= s 4 ) t 5 (= s 5 ) t 6 (= s 6 ) t 7 (= s 7 ) t 8 (= s 8 ) t 9 (= s 9 ) t 10 (= s 10 ) t 11 (= s 11 ) t 12 (= s 12 ) t 13 (= s 13 ) t 14 (= s 14 ) t 15 (= s 15 ) t 16 (= s 16 ) t 17 (= s 17 ) t 18 (= s 0 s 9 ) t 19 (= s 1 s 10 ) t 20 (= s 2 s 11 ) t 21 (= s 3 s 12 ) t 22 (= s 4 s 13 ) t 23 (= s 5 s 14 ) t 24 (= s 6 s 15 ) t 25 (= s 7 s 16 ) t 26 (= s 8 s 17 ) u 0 (= t 0 t 18 ) u 1 (= t 1 t 19 ) u 2 (= t 2 + t 20 ) u 3 (= t 3 t 21 ) u 4 (= t 4 t 22 ) u 5 (= t 5 + t 23 ) u 6 (= t 6 t 24 ) u 7 (= t 7 t 25 ) u 8 (= t 8 + t 26 ) u 9 (= t 9 + t 18 ) u 10 (= t 10 t 19 ) u 11 (= t 11 + t 20 ) u 12 (= t 12 t 21 ) u 13 (= t 13 t 22 ) u 14 (= t 14 + t 23 ) u 15 (= t 15 t 24 ) u 16 (= t 16 t 25 ) u 17 (= t 17 + t 26 ) v 0 (= u 0 u 6 ) v 1 (= u 1 u 7 ) v 2 (= u 2 + u 8 ) v 3 (= u 3 u 6 ) v 4 (= u 4 u 7 ) v 5 (= u 5 + u 8 ) v 6 (= u 9 + u 15 ) v 7 (= u 10 u 16 ) v 8 (= u 11 + u 17 ) v 9 (= u 12 + u 15 ) v 10 (= u 13 u 16 ) v 11 (= u 14 + u 17 ) w 0 (= v 0 + v 2 ) w 1 (= v 1 + v 2 ) w 2 (= v 3 + v 5 ) w 3 (= v 4 + v 5 ) w 4 (= v 6 + v 8 ) w 5 (= v 7 + v 8 ) w 6 (= v 9 + v 11 ) w 7 (= v 10 + v 11 ) (x 1 x 2 x 3 ) (0 0 0) (0 0 1) (0 1 0) (0 1 1) (1 0 0) (1 0 1) (1 1 0) (1 1 1) Fgure 1: Computaton of extended truth and weght vector for three-varable swtchng functon. For an n-varable swtchng functon wth unspeced mnterms d 1,d 2, :::,d, extended truth vector s a vector of swtchng functons t (d 1,d 2, :::,d )( = 0,1, :::,3 n ;1), and weght vector s a vector of nteger-valued functons w j (d 1,d 2, :::,d )(j = 0,1, :::,2 n ; 1). For three-varable case, all the t 's and w j 's can be obtaned from Fg. 1. Extenson to the functons wth more varables s straghtforward. Expressons for several t 's and w 0 for threevarable functon [m 0,m 1, :::,m 7 ] are shown n the followng: w 0 = t 0 + t 2 + t 6 + t 8 + t 18 + t 20 + t 24 + t 26, (3.1) where t 0 = m 0, t 2 = m 0 m 1, t 6 = m 0 m 2, t 8 = m 0 m 1 m 2 m 3, t 18 = m 0 m 4, t 20 = m 0 m 1 m 4 m 5, t 24 = m 0 m 2 m 4 m 6, t 26 = m 0 m 1 m 2 m 3 m 4 m 5 m 6 m 7 : (3.2) Denton 3.1 Let the mnmum value of the -varable nteger-valued functon w(d 1,d 2, :::,d ), denoted by w mn,bemn 02 ;1 m,where[m 0,m 1, :::,m 2 ;1 ]represents the truth vector for w. Let [w 0,w 1, :::,w 2 n ;1 ] be the weght vector for an n-varable ncompletely speced swtchng functon f(x 1,x 2, :::,x n ), and wj mn be the mnmum value for w j (d 1,d 2, :::,d )whered 1,d 2, :::,d represent unspeced mnterms of f. Let 0 k 2 n ;1anda 1,a 2, :::,a 2f0,1g such that w k (a 1,a 2, :::,a ) = mn 0j2 n ;1 wj mn. Let c 1 c 2 c n be the n-bt bnary number representng k. Then, (a 1,a 2, :::,a ) represents an assgnment of (d 1,d 2, :::,d ) and (c 1,c 2, :::,c n ) represents a polarty vector that produce a mnmum FPRM for f. Example 3.1 Consder a three-varable swtchng functon f(x 1,x 2,x 3 ) whose truth vector [m 0,m 1,m 2,m 3,m 4, m 5,m 6,m 7 ]=[d 0,0,d 2,d 3,1,1,1,0], where d 0, d 2,andd 3 are unspeced mnterms. By puttng the value of m ( = 0,1, :::,7) n (3.2), we have t 0 = d 0, t 2 = d 0, t 6 = d 0 d 2, t 8 = d 0 d 2 d 3, t 18 =1 d 0, t 20 = d 0, t 24 = d 0 d 2, t 26 =1 d 0 d 2 d 3 : (3.3) By usng Property 2.1 to (3.3), we have t 18 + t 20 = 1 and t 8 + t 26 = 1. Also, by usng Property 2.2 to (3.3), we have t 6 + t 24 =2(d 0 d 2 )andt 0 + t 2 =2d 0. Thus, from (3.1) and (3.3), we obtan w 0 =2+2d 0 +2(d 0 d 2 ): (3.4)

4 Equaton (3.4) shows that w 0 cannot be less than 2 and t s ndependent ofd 3. By nspecton, we have w 0 =2, when d 0 = d 2 =0 however w 0 = 6, when d 0 = 1 and d 2 =0. Thus, the mnmum value for w 0 s 2. Smlarly, we can obtan mnmum value for w, when = 1,2, :::,7. To manpulate nteger-valued functon we use multtermnal bnary decson dagram (MTBDD) [5]. An MTBDD, whch s a natural extenson of bnary decson dagram (BDD) [2], s a drected acyclc graph wth multple termnal nodes each ofwhch has an nteger value. Arthmetc operatons, such as addton and multplcaton, between nteger-valued functons can be ecently performed by usng MTBDDs. It should be noted that swtchng functons are a subset of nteger-valued functons and an MTBDD for a swtchng functon s a BDD. We use MTBDD data structure to perform Boolean operatons between swtchng functons. A straghtforward method to buld MTBDDs for weght vector requres excessve computaton tme and memory resources, because they represent all possble FPRMs for the gven ncompletely speced functon. However, we are only nterested n an FPRM wth the fewest products. Suppose we have an FPRM for the gven functon wth t threshold + 1 products, then t s sucent to search for an FPRM wth t threshold or fewer products. If suchan FPRM does not exst then the FPRM wth t threshold +1 products s the mnmum FPRM. Thus, to restrct the search space wthout sacrcng the mnmalty of the soluton, we use threshold value, t threshold, durng constructon of MTBDDs. The threshold value can be obtaned by usng any smplcaton program for FPRMs. Based on the above dscussons, we develop the followng algorthm for exact mnmzaton of FPRM for ncompletely speced n-varable swtchng functon f: Algorthm 3.1 (Exact mnmzaton) 1. Get the user suppled threshold value, t threshold. 2. Prepare extended truth vector [t 0,t 1, :::,t 3 n ;1 ] for f. (Fg. 1 shows the computaton method for extended truth vector for three-varable functons. Extenson to the functons wth more varables s straghtforward. Each element of the extended truth vector s a swtchng functon represented as an MTBDD.) 3. Let [w 0,w 1, :::,w 2 n ;1 ] be the weghtvector for f. For =0to2 n ; 1, do the followng: (a) Gather elements from the extended truth vector such that w = X t2t t, (3.5) where T ft 0,t 1, :::,t 3 n ;1 g. (Fg. 1 shows how to gather elements correspondng to w from the 1 procedure Construct MTBDD(a,S,D all ) f 2 D reman, D ths : set of support varables 3 S save, S ths : subset of S 4 c save, c ths :nteger (counter) 5 w a 6 untl S 6= do f 7 D reman D all ; support(w ) 8 c save 0 9 for each d reman 2 D reman do f 10 D ths fd reman g[support(w ) 11 c ths 0 S ths 12 for each b j u j 2 S do f 13 f support(u j ) D ths then f 14 c ths c ths + b j 15 S ths S ths [fb j u j g g g 18 f c ths >c save then f 19 c save c ths 20 S save S ths g g 23 f S save = then 24 S save an element ofs 25 for each b j u j 2 S save do 26 w w + b j u j /*MTBDDoperaton*/ g S S ; S save 29 return w /* MTBDD */ 30g Fgure 2: Pseudocode Construct MTBDD. extended truth vector for three-varable functon. Extenson to the functons wth more varables s straghtforward. It s obvous from Fg. 1 that the number of elements n T s 2 n.) (b) Apply Propertes 2.1 and 2.2 to (3.5). Thus, we have w = a + X 0jL;1 b j u j, where a 0, b j 1, u j 2 T, and L 2 n. (c) Construct an MTBDD for w. Durng constructon () f any termnal value of an ntermedate MTBDD s greater than t threshold,set that termnal value to 1 ()fanntermedate MTBDD represent constant 1, stop the constructon and assgn MTBDD for w to 1. (d) Obtan mnmum value w mn from the MTBDD for w. (Ths corresponds to ndng a path to a termnal node of the MTBDD that produces a mnmum value for w.) (e) If w mn <= t threshold : () save the polarty vector and an assgnment of the unspec-

5 ed mnterms correspondng to w mn () t threshold w mn ; If any polarty vector s saved n step 3(e) then obtan an FPRM by usng the most recently saved polarty vector and assgnment of the unspeced mnterms, otherwse report \No soluton exsts wth t threshold or fewer products." To buld an MTBDD for w at step 3(c) we must do arthmetc addton of a set of MTBDDs. The MTBDDs can be arranged n numerous ways to perform addton. The arrangement nuences the computaton tme and the sze of the ntermedate MTBDDs durng addton. Anave arrangement requres excessve memory resources and long computaton tme. To buld MTBDD for w we use procedure Construct MTBDD(a,S,D all ), the pseudocode of whch s shown n Fg. 2, where S represents fb 0 u 0,b 1 u 1, :::,b L;1 u L;1 g, D all represents fd 1,d 2, :::,d g, and support(w ) represents the set of varables on whch w depends. The procedure rst chose an MTBDD that depends on the fewest varables and then arranged other MTBDDs to slowly ncrease the number of varables n the ntermedate MTBDDs. The mnmzaton method presented n ths secton can be adapted to obtan exact mnmum Kronecker expressons [1, 6, 15] for ncompletely speced swtchng functons. In ths case we must compute extended weght vector [1, 6] nstead of weght vector. IV. Expermental Results We mplemented Algorthm 3.1 n C by usng CUDD package [19] and conducted experments by usng a set of swtchng functons. The detal expermental results are shown n Table 1. The factors on whch the computaton tme manly depends are the threshold value, the number of varables n the functon, and the number of unspeced mnterms. The current mplementaton works favorably for many functons wth eght orfewer varables and wth any number of unspeced mnterms. However, for functons wth nne or more varables t often requres excessve CPU tme and memory resources when the number of unspeced mnterms s more than 30. A comparson wth the other algorthms s dcult, because none of them explctly reported the benchmark functons. V. Conclusons and Comments Exact mnmzaton of FPRMs for ncompletely speced swtchng functons s a computatonally hard problem, Table 1: Expermental results. f(n,t,d,s) Prod y Thre z Peak x Tme { f(6,15,30,25) f(6,12,40,50) f(7,35,50,5) f(7,20,80,5) f(7,20,90,5) f(8,25,200,50) f(8,100,80,10) f(8,35,180,10) f(8,60,160,5) f(8,80,100,50) f(9,250,50,5) f(9,15,480,80) f(10,500,40,25) f(12,2000,30,25) f(14,8000,30,50) f(n,t,d,s): Functon (dened n Appendx). y Prod: Number of products n mnmum FPRM. z Thre: Threshold value. x Peak: Peak number of lve MTBDD nodes. { Tme: CPU seconds on SUN ULTRA 10. because the search space ncreases exponentally wth the ncrease n the unspeced mnterms. Although Algorthm 3.1 requres only one MTBDD at a tme, the present mplementaton of t uses a xed varable order for all the MTBDDs. Currently,we are workng to nd a better varable order for ndvdual MTBDDs. Ths strategy would be useful to solve larger problems wth less memory resources. Acknowledgement Ths work was supported n part by a Postdoctoral Fellowshp of the Japan Socety for the Promoton of Scence and n part by a Grant-n-Ad for the Scentc Research of the Mnstry of Educaton, Scence, Culture, and Sports of Japan. The authors thank anonymous referees for gvng constructve suggestons. References [1] G. Boul, M. Davo, and J.-P. Deschamps, \Mnmzaton of rng-sum expansons of Boolean functons," Phlps Res. Repts., Vol. 28, pp. 17{36, 1973.

6 [2] R. E. Bryant, \Graph-based algorthms for Boolean functon manpulaton," IEEE Trans. Comput., Vol. C-35, No. 8, pp. 677{691, Aug [3] C.-H. Chang and B. J. Falkowsk, \Flexble optmzaton of xed polarty Reed-Muller expansons for multple output completely and ncompletely speced Boolean functons," Proc. Asa and South Pacc Desgn Automaton Conference, pp. 335{340, Sept [4] C.-H. Chang and B. J. Falkowsk, \Adaptve exact optmsaton of mnmally testable FPRM expansons," IEE Proceedngs-Computers and Dgtal Technques, Vol. 145, No. 6, pp. 385{394, Nov [5] E. M. Clarke, K. L. McMllan, X. Zhao, M. Fujta, and J. Yang, \Spectral transforms for large Boolean functons wth applcatons to technology mappng," Proc. Desgn Automaton Conference, pp. 54{60, June [6] M. Davo, J.-P. Deschamps, and A. Thayse, Dscrete and Swtchng Functons, McGraw-Hll Internatonal, [7] R. Drechsler, M. Theobald, and B. Becker, \Fast OFDDbased mnmzaton of xed polarty Reed-Muller expressons," IEEE Trans. Comput., Vol. C-45, No. 11, pp. 1294{1299, Nov [8] D. H. Green, \Reed-Muller expansons of ncompletely speced functons," IEE Proceedngs, Vol. 134, Pt. E, No. 5, pp. 228{236, Sept [9] S. L. Hurst, D. M. Mller, and J. C. Muzo, Spectral Technques n Dgtal Logc, Academc Press Inc., [10] U. Kebschull and W. Rosenstel, \Ecent graph-based computaton and manpulaton of functonal decson dagrams," Proc. European Conference on Desgn Automaton, pp. 278{282, Mar [11] B. W. Kernghan and D. M. Rtche, The C Programmng Language, Second Edton, Prentce-Hall, [12] P. K. Lu and J. C. Muzo, \Boolean matrx transforms for the mnmzaton of modulo-2 canoncal expressons," IEEE Trans. Comput., Vol. C-41, No. 3, pp. 342{347, Mar [13] L. McKenze, A. E. A. Alman, J. F. Mller, and P. Thomson, \Optmsaton of Reed-Muller logc functons," Internatonal Journal of Electroncs, Vol. 75, No. 3, pp. 451{ 466, Sept [14] A. Sarab and M. A. Perkowsk, \Fast exact and quasmnmal mnmzaton of hghly testable xed polarty AND/XOR canoncal networks," Proc. Desgn Automaton Conference, pp. 30{35, June [15] T. Sasao, \AND-EXOR expressons and ther optmzaton," n T. Sasao, ed., Logc Synthess and Optmzaton, Kluwer Academc Publshers, [16] T. Sasao, \Representatons of logc functons usng EXOR operators," n T. Sasao and M. Fujta, eds., Representatons of Dscrete Functons, Kluwer Academc Publshers, [17] T. Sasao and F. Izuhara, \Exact mnmzaton of FPRMs usng mult-termnal EXOR TDDs," n T. Sasao and M. Fujta, eds., Representatons of Dscrete Functons, Kluwer Academc Publshers, [18] T. Sasao, Swtchng Theory for Logc Synthess, Kluwer Academc Publshers, [19] F. Somenz, CUDD: CU Decson Dagram Package, Release 2.3.0, Unversty of Colorado at Boulder, 1998 ( [20] A. Tran, \Graphcal method for the converson of mnterms to Reed-Muller coecents and the mnmzaton of exclusve-or swtchng functons," IEE Proceedngs, Vol. 134, Pt. E, No. 2, pp. 93{99, Mar [21] C. Tsa and M. Marek-Sadowska, \Mnmsaton of xed-polarty AND/XOR canoncal networks," IEE Proceedngs-Computers and Dgtal Technques, Vol. 141, No. 6, pp. 369{374, Nov [22] C. Tsa and M. Marek-Sadowska, \Generalzed Reed- Muller forms as a tool to detect symmetres," IEEE Trans. Comput., Vol. 45, No. 1, pp. 33{40, Jan [23] C. Tsa and M. Marek-Sadowska, \Multlevel logc synthess for arthmetc functons," Proc. 33rd Desgn Automaton Conference, pp. 242{247, June [24] C. Tsa and M. Marek-Sadowska, \Boolean functons classcaton va xed polarty Reed-Muller forms," IEEE Trans. Comput., Vol. C-46, No. 2, pp. 173{186, Feb [25] D. Varma and E. A. Trachtenberg, \Computaton of Reed-Muller expansons of ncompletely speced Boolean functons from reduced representatons," IEE Proceedngs-E, Vol. 138, No. 2, pp. 85{92, Mar [26] A. Zakrevskj, \Mnmzng polynomal mplementaton of weakly speced logc functons and systems," Proc. 3rd Internatonal Workshop on Applcatons of the Reed-Muller Expanson n Crcut Desgn, pp. 157{166, Sept [27] I. I. Zhegalkn, \The technque of calculaton of statements n symbolc logc," Mathe. Sbornk, Vol. 34, pp. 9{28, 1927 (n Russan). [28] Z. Zlc and Z. G. Vranesc, \A multple-valued Reed- Muller transform for ncompletely speced functons," IEEE Trans. Comput., Vol. C-44, No. 8, pp. 1012{1020, Aug Appendx To generate the truth vector of the test nstances shown n Table 1 we used the followng C code, the rst two lnes of whch have been adapted from [11, p. 46]: #defne E(m) s = s * , \ r = (unsgned nt) (s >> 16) % w, m > 0 char *f(nt n, nt t, nt d, unsgned long s) { nt r, w = 1 << n char *v = (char *) calloc(w, 1) whle (E(t)) f (!v[r]) v[r] = 1, t-- whle (E(d)) f (!v[r]) v[r] = 2, d-- return v } The functon f(n,t,d,s) returns a ponter v for the truth vector [v[0],v[1], :::,v[2 n ;1]] where v[](0 2 n ;1) represents a true, false, or ncompletely speced mnterm f v[] s 1, 0, or 2, respectvely for an n-varable swtchng functon wth t true and d ncompletely speced mnterms.

Representations of Elementary Functions Using Binary Moment Diagrams

Representations of Elementary Functions Using Binary Moment Diagrams Representatons of Elementary Functons Usng Bnary Moment Dagrams Tsutomu Sasao Department of Computer Scence and Electroncs, Kyushu Insttute of Technology Izua 82-852, Japan Shnobu Nagayama Department of

More information

Decision Diagrams Derivatives

Decision Diagrams Derivatives Decson Dagrams Dervatves Logc Crcuts Desgn Semnars WS2010/2011, Lecture 3 Ing. Petr Fšer, Ph.D. Department of Dgtal Desgn Faculty of Informaton Technology Czech Techncal Unversty n Prague Evropský socální

More information

LINEAR TRANSFORMATION OF BINARY DECISION DIAGRAMS TROUGH SPECTRAL DOMAIN

LINEAR TRANSFORMATION OF BINARY DECISION DIAGRAMS TROUGH SPECTRAL DOMAIN LINEAR TRANSFORMATION OF BINARY DECISION DIAGRAMS TROUGH SPECTRAL DOMAIN Mlena Stankovc, Suzana Stokovc 2 Faculty of Electronc Engneerng, Unversty of Ns, A Medvedeva 4, 8 Ns, SERBIA, mstankovc@elfaknacyu,

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

X X. f 00. f 0. f 11. f 10. f 1. (b) pd. (a) S. (c) nd. f 110. f 101. f 010. f 011. f 01. f 100. f 000. f 111. f 001

X X. f 00. f 0. f 11. f 10. f 1. (b) pd. (a) S. (c) nd. f 110. f 101. f 010. f 011. f 01. f 100. f 000. f 111. f 001 A Desgn Method for Look-up Table Type FPGA by Pseudo-Kronecker Expanson Tsutomu asao Kyushu Insttute of Technology Izuka 80, Japan Jon T. Butler Naval Postgraduate chool Monterey, CA 99, U..A. Aprl 15,

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION 1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

A property of the elementary symmetric functions

A property of the elementary symmetric functions Calcolo manuscrpt No. (wll be nserted by the edtor) A property of the elementary symmetrc functons A. Esnberg, G. Fedele Dp. Elettronca Informatca e Sstemstca, Unverstà degl Stud della Calabra, 87036,

More information

A Novel, Low-Power Array Multiplier Architecture

A Novel, Low-Power Array Multiplier Architecture A Noel, Low-Power Array Multpler Archtecture by Ronak Bajaj, Saransh Chhabra, Sreehar Veeramachanen, MB Srnas n 9th Internatonal Symposum on Communcaton and Informaton Technology 29 (ISCIT 29) Songdo -

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Complement of Type-2 Fuzzy Shortest Path Using Possibility Measure

Complement of Type-2 Fuzzy Shortest Path Using Possibility Measure Intern. J. Fuzzy Mathematcal rchve Vol. 5, No., 04, 9-7 ISSN: 30 34 (P, 30 350 (onlne Publshed on 5 November 04 www.researchmathsc.org Internatonal Journal of Complement of Type- Fuzzy Shortest Path Usng

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition Sngle-Faclty Schedulng over Long Tme Horzons by Logc-based Benders Decomposton Elvn Coban and J. N. Hooker Tepper School of Busness, Carnege Mellon Unversty ecoban@andrew.cmu.edu, john@hooker.tepper.cmu.edu

More information

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

SOLVING CAPACITATED VEHICLE ROUTING PROBLEMS WITH TIME WINDOWS BY GOAL PROGRAMMING APPROACH

SOLVING CAPACITATED VEHICLE ROUTING PROBLEMS WITH TIME WINDOWS BY GOAL PROGRAMMING APPROACH Proceedngs of IICMA 2013 Research Topc, pp. xx-xx. SOLVIG CAPACITATED VEHICLE ROUTIG PROBLEMS WITH TIME WIDOWS BY GOAL PROGRAMMIG APPROACH ATMII DHORURI 1, EMIUGROHO RATA SARI 2, AD DWI LESTARI 3 1Department

More information

Perron Vectors of an Irreducible Nonnegative Interval Matrix

Perron Vectors of an Irreducible Nonnegative Interval Matrix Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

This column is a continuation of our previous column

This column is a continuation of our previous column Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard

More information

Module 2. Random Processes. Version 2 ECE IIT, Kharagpur

Module 2. Random Processes. Version 2 ECE IIT, Kharagpur Module Random Processes Lesson 6 Functons of Random Varables After readng ths lesson, ou wll learn about cdf of functon of a random varable. Formula for determnng the pdf of a random varable. Let, X be

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

Mathematical Preparations

Mathematical Preparations 1 Introducton Mathematcal Preparatons The theory of relatvty was developed to explan experments whch studed the propagaton of electromagnetc radaton n movng coordnate systems. Wthn expermental error the

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

find (x): given element x, return the canonical element of the set containing x;

find (x): given element x, return the canonical element of the set containing x; COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:

More information

High-Speed Decoding of the Binary Golay Code

High-Speed Decoding of the Binary Golay Code Hgh-Speed Decodng of the Bnary Golay Code H. P. Lee *1, C. H. Chang 1, S. I. Chu 2 1 Department of Computer Scence and Informaton Engneerng, Fortune Insttute of Technology, Kaohsung 83160, Tawan *hpl@fotech.edu.tw

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law:

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law: CE304, Sprng 2004 Lecture 4 Introducton to Vapor/Lqud Equlbrum, part 2 Raoult s Law: The smplest model that allows us do VLE calculatons s obtaned when we assume that the vapor phase s an deal gas, and

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

On a direct solver for linear least squares problems

On a direct solver for linear least squares problems ISSN 2066-6594 Ann. Acad. Rom. Sc. Ser. Math. Appl. Vol. 8, No. 2/2016 On a drect solver for lnear least squares problems Constantn Popa Abstract The Null Space (NS) algorthm s a drect solver for lnear

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

A LINEAR PROGRAM TO COMPARE MULTIPLE GROSS CREDIT LOSS FORECASTS. Dr. Derald E. Wentzien, Wesley College, (302) ,

A LINEAR PROGRAM TO COMPARE MULTIPLE GROSS CREDIT LOSS FORECASTS. Dr. Derald E. Wentzien, Wesley College, (302) , A LINEAR PROGRAM TO COMPARE MULTIPLE GROSS CREDIT LOSS FORECASTS Dr. Derald E. Wentzen, Wesley College, (302) 736-2574, wentzde@wesley.edu ABSTRACT A lnear programmng model s developed and used to compare

More information

LECTURE 9 CANONICAL CORRELATION ANALYSIS

LECTURE 9 CANONICAL CORRELATION ANALYSIS LECURE 9 CANONICAL CORRELAION ANALYSIS Introducton he concept of canoncal correlaton arses when we want to quantfy the assocatons between two sets of varables. For example, suppose that the frst set of

More information

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM Internatonal Conference on Ceramcs, Bkaner, Inda Internatonal Journal of Modern Physcs: Conference Seres Vol. 22 (2013) 757 761 World Scentfc Publshng Company DOI: 10.1142/S2010194513010982 FUZZY GOAL

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

Solution Thermodynamics

Solution Thermodynamics Soluton hermodynamcs usng Wagner Notaton by Stanley. Howard Department of aterals and etallurgcal Engneerng South Dakota School of nes and echnology Rapd Cty, SD 57701 January 7, 001 Soluton hermodynamcs

More information

Chapter 9: Statistical Inference and the Relationship between Two Variables

Chapter 9: Statistical Inference and the Relationship between Two Variables Chapter 9: Statstcal Inference and the Relatonshp between Two Varables Key Words The Regresson Model The Sample Regresson Equaton The Pearson Correlaton Coeffcent Learnng Outcomes After studyng ths chapter,

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Journal of Universal Computer Science, vol. 1, no. 7 (1995), submitted: 15/12/94, accepted: 26/6/95, appeared: 28/7/95 Springer Pub. Co.

Journal of Universal Computer Science, vol. 1, no. 7 (1995), submitted: 15/12/94, accepted: 26/6/95, appeared: 28/7/95 Springer Pub. Co. Journal of Unversal Computer Scence, vol. 1, no. 7 (1995), 469-483 submtted: 15/12/94, accepted: 26/6/95, appeared: 28/7/95 Sprnger Pub. Co. Round-o error propagaton n the soluton of the heat equaton by

More information

A Fast Computer Aided Design Method for Filters

A Fast Computer Aided Design Method for Filters 2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

A Note on Bound for Jensen-Shannon Divergence by Jeffreys

A Note on Bound for Jensen-Shannon Divergence by Jeffreys OPEN ACCESS Conference Proceedngs Paper Entropy www.scforum.net/conference/ecea- A Note on Bound for Jensen-Shannon Dvergence by Jeffreys Takuya Yamano, * Department of Mathematcs and Physcs, Faculty of

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

Amiri s Supply Chain Model. System Engineering b Department of Mathematics and Statistics c Odette School of Business

Amiri s Supply Chain Model. System Engineering b Department of Mathematics and Statistics c Odette School of Business Amr s Supply Chan Model by S. Ashtab a,, R.J. Caron b E. Selvarajah c a Department of Industral Manufacturng System Engneerng b Department of Mathematcs Statstcs c Odette School of Busness Unversty of

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

Self-complementing permutations of k-uniform hypergraphs

Self-complementing permutations of k-uniform hypergraphs Dscrete Mathematcs Theoretcal Computer Scence DMTCS vol. 11:1, 2009, 117 124 Self-complementng permutatons of k-unform hypergraphs Artur Szymańsk A. Paweł Wojda Faculty of Appled Mathematcs, AGH Unversty

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Chapter 8 SCALAR QUANTIZATION

Chapter 8 SCALAR QUANTIZATION Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Appendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis

Appendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis A Appendx for Causal Interacton n Factoral Experments: Applcaton to Conjont Analyss Mathematcal Appendx: Proofs of Theorems A. Lemmas Below, we descrbe all the lemmas, whch are used to prove the man theorems

More information

Calculating the failure intensity of a non-coherent fault tree using the BDD technique.

Calculating the failure intensity of a non-coherent fault tree using the BDD technique. Loughborough Unversty Insttutonal Repostory Calculatng the falure ntensty of a non-coherent fault tree usng the BDD technque. Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an

More information

Zeros and Zero Dynamics for Linear, Time-delay System

Zeros and Zero Dynamics for Linear, Time-delay System UNIVERSITA POLITECNICA DELLE MARCHE - FACOLTA DI INGEGNERIA Dpartmento d Ingegnerua Informatca, Gestonale e dell Automazone LabMACS Laboratory of Modelng, Analyss and Control of Dynamcal System Zeros and

More information

Modulo Magic Labeling in Digraphs

Modulo Magic Labeling in Digraphs Gen. Math. Notes, Vol. 7, No., August, 03, pp. 5- ISSN 9-784; Copyrght ICSRS Publcaton, 03 www.-csrs.org Avalable free onlne at http://www.geman.n Modulo Magc Labelng n Dgraphs L. Shobana and J. Baskar

More information

Color Rendering Uncertainty

Color Rendering Uncertainty Australan Journal of Basc and Appled Scences 4(10): 4601-4608 010 ISSN 1991-8178 Color Renderng Uncertanty 1 A.el Bally M.M. El-Ganany 3 A. Al-amel 1 Physcs Department Photometry department- NIS Abstract:

More information

There are two approaches to Hensel lftng. Lnear lftng starts wth polynomals f = f (0) and teratvely constructs polynomals f () such that ()f () f (?)

There are two approaches to Hensel lftng. Lnear lftng starts wth polynomals f = f (0) and teratvely constructs polynomals f () such that ()f () f (?) On Bvarate Hensel Lftng and ts Parallelzaton Laurent Bernardn Insttut fur Wssenschaftlches Rechnen ETH Zurch bernardn@nf.ethz.ch Abstract We present a new parallel algorthm for performng lnear Hensel lftng

More information

An Algorithm to Solve the Inverse Kinematics Problem of a Robotic Manipulator Based on Rotation Vectors

An Algorithm to Solve the Inverse Kinematics Problem of a Robotic Manipulator Based on Rotation Vectors An Algorthm to Solve the Inverse Knematcs Problem of a Robotc Manpulator Based on Rotaton Vectors Mohamad Z. Al-az*, Mazn Z. Othman**, and Baker B. Al-Bahr* *AL-Nahran Unversty, Computer Eng. Dep., Baghdad,

More information

CHAPTER III Neural Networks as Associative Memory

CHAPTER III Neural Networks as Associative Memory CHAPTER III Neural Networs as Assocatve Memory Introducton One of the prmary functons of the bran s assocatve memory. We assocate the faces wth names, letters wth sounds, or we can recognze the people

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

Some Comments on Accelerating Convergence of Iterative Sequences Using Direct Inversion of the Iterative Subspace (DIIS)

Some Comments on Accelerating Convergence of Iterative Sequences Using Direct Inversion of the Iterative Subspace (DIIS) Some Comments on Acceleratng Convergence of Iteratve Sequences Usng Drect Inverson of the Iteratve Subspace (DIIS) C. Davd Sherrll School of Chemstry and Bochemstry Georga Insttute of Technology May 1998

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Clock-Gating and Its Application to Low Power Design of Sequential Circuits

Clock-Gating and Its Application to Low Power Design of Sequential Circuits Clock-Gatng and Its Applcaton to Low Power Desgn of Sequental Crcuts ng WU Department of Electrcal Engneerng-Systems, Unversty of Southern Calforna Los Angeles, CA 989, USA, Phone: (23)74-448 Massoud PEDRAM

More information

Low-Connectivity Network Design on Series-Parallel Graphs

Low-Connectivity Network Design on Series-Parallel Graphs Low-Connectvty Network Desgn on Seres-Parallel Graphs S. Raghavan The Robert H. Smth School of Busness, Van Munchng Hall, Unversty of Maryland, College Park, Maryland 20742 Network survvablty s a crtcal

More information

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product 12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA Here s an outlne of what I dd: (1) categorcal defnton (2) constructon (3) lst of basc propertes (4) dstrbutve property (5) rght exactness (6) localzaton

More information

Chapter Newton s Method

Chapter Newton s Method Chapter 9. Newton s Method After readng ths chapter, you should be able to:. Understand how Newton s method s dfferent from the Golden Secton Search method. Understand how Newton s method works 3. Solve

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng

More information

CSE4210 Architecture and Hardware for DSP

CSE4210 Architecture and Hardware for DSP 4210 Archtecture and Hardware for DSP Lecture 1 Introducton & Number systems Admnstratve Stuff 4210 Archtecture and Hardware for DSP Text: VLSI Dgtal Sgnal Processng Systems: Desgn and Implementaton. K.

More information

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1 Estmatng the Fundamental Matrx by Transformng Image Ponts n Projectve Space 1 Zhengyou Zhang and Charles Loop Mcrosoft Research, One Mcrosoft Way, Redmond, WA 98052, USA E-mal: fzhang,cloopg@mcrosoft.com

More information

Subset Topological Spaces and Kakutani s Theorem

Subset Topological Spaces and Kakutani s Theorem MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered

More information