Non-deterministic Social Laws

Size: px
Start display at page:

Download "Non-deterministic Social Laws"

Transcription

1 Non-eterministic Social Laws Michael H. Coen MIT Artificial Intelligence Lab 55 Technology Square Cambrige, MA 09 Abstract The paper generalizes the notion of a social law, the founation of the theory of artificial social systems evelope for coorinating Multi-Agent Systems. In an artificial social system, its constituent agents are given a common social law to obey an are free to act within the confines it legislates, which are carefully esigne to avoi inter-agent conflict an ealock. In this paper, we argue that this framework can be overly restrictive in that social laws iniscriminately apply to all istributions of agent behavior, even when the probability of conflicting conitions arising is acceptably small. We efine the notion of a non-eterministic social law applicable to a family of probability istributions that escribe the expecte behaviors of a system s agents. We emonstrate that taking these istributions into account can lea to the formulation of more efficient social laws an the algorithms that ahere to them. We illustrate our approach with a traffic omain problem an emonstrate its utility through an extensive series of simulations. Introuction Agents esigne to exist in multi-agent systems in general cannot affor to be oblivious to the presence of other agents in their environment. The very notion of a multiagent system presupposes that agents, for better or worse, will have some impact on each other. A central problem in Distribute AI (DAI) has been to evelop strategies for coorinating the behaviors of these agents perhaps to cooperatively maximize some measure of the system s global utility or conversely, to insure that non-cooperative agents fin some acceptable way to peacefully coexist. Many coorination strategies have been evelope for managing multi-agent systems (MAS). One axis on which we can contrast these ifferent approaches is the egree of agent autonomy they suppose. For example, a centralize planning system [5] might globally synchronize each agent s activities in avance, taking pains to insure that conflict is avoie among them. Agents can then blinly follow these centrally arrange plans without further consieration. Alternatively, at the other en of the Copyright 000, American Association for Artificial Intelligence ( All rights reserve. spectrum, agents can be wholly autonomous an pursue their iniviual goals without relying on any centralize control mechanism. In the event conflict arises among them, preformulate rules of encounter allow the agents to ynamically negotiate among themselves to resolve it []. An intermeiary approach between these extremes has been explore in the evelopment of artificial social systems [,], whose workings shoul feel familiar to anyone living in a civilize country. In an artificial social system, its constituent agents are given a common social law to obey an are free to act within the confines it legislates. A social law is explicitly esigne to prevent conflict an ealock among the agents; however, for it to be eeme useful, it shoul simultaneously allow each agent to achieve its iniviual set of goals. Thus, esigning a social law is something of a balancing act. It must be sufficiently strict to prevent conflict or ealock, an simultaneously, it must be sufficiently liberal to allow the agents to efficiently achieve their goals. Useful social laws can be esigne that not only avoi inter-agent conflict but also minimize the use of energy, time, an other resources appropriate to the problem omain. Fitoussi has examine an extension of this theory involving minimal social laws. These are social laws that minimize the set of restrictions place upon the agents, while still avoiing inter-agent conflicts. Minimal social laws allow agents to have maximum flexibility uring action selection by only isallowing those activities that woul prevent other agents from obtaining their goals; thus, they are minimally restrictive. We propose here that social laws, incluing even the minimal type escribe above, can be overly restrictive because agents must ahere to them in all circumstances even where the possibility of conflict with other agents is extremely low. By insisting that agents avoi any chance of conflict or ealock when these circumstances are highly unlikely, even minimal social laws may sometimes be overly restrictive an thereby, inherently inefficient. We will refer to this property of a social law as it being eterministic. Consier, for example, a omain consisting of a gri traverse by a group of mobile agents. A eterministic social law for this omain might institute traffic regulations to insure that agents never collie or get stuck an to be useful, it woul also allow the agents to In roceeings of the Seventeenth National Conference on Artificial Intelligence (AAAI'000), pp. 5-. Austin, Texas. 000.

2 reach whichever noes they neee. However, being eterministic, this social law woul be equally applicable to all istributions escribing how agents select noes to visit an how they travel between them. In this paper, we examine how knowlege of the probability istributions governing agent behavior in MAS can be applie towars more efficiently coorinating them through a non-eterministic social law. For example, in the omain above, knowing (or learning) that the agents ten to uniformly select noes in the gri to visit can rastically improve our ability to coorinate their movement. We note that from a social engineering perspective, this might appear somewhat counter-intuitive. Much of the work in artificial social systems has been motivate through analogy with how human societies function. We institute laws that govern iniviual behavior an thereby benefit the community as a whole. However, the analogy between agents an people must not be taken too far. For example, vehicular traffic laws in human society nee to be easily remembere, an are thus rarely specific to particular istributions an flows of traffic. They are even less likely to be change ynamically to reflect learne observations. Instea, epiphenomenal approaches are use: highways are constructe that implicitly reirect vehicles, signal light intervals are ynamically varie, an traffic reports are broacast via raio all of these are centralize mechanisms to reuce both congestion an the cognitive buren on human rivers. Traffic regulations themselves are essentially inviolate an for goo reason people woul fin it ifficult to rive safely otherwise. However, agents o not share this limitation. There is nothing inherently worrisome in optimizing social laws to better fit the particular MAS they are intene to govern. We woul like to clarify a point that has been somewhat unclear in the social law literature regaring the efficiency of social laws. Social laws are not algorithms they o not provie a metho for accomplishing a particular task. Rather, they are guielines that specify a class of vali algorithms (or strategies) for solving problems from a particular omain by partitioning the set of possible algorithms into law-abiing an criminal sets. Social laws are thus not necessarily instructive. Just as traffic laws in human society o not provie irections but simply legislate certain types of behavior in particular situations, social laws maintain a set of constraints that simplify writing an reasoning about algorithms. Therefore, it is not obviously meaningful to speak about a particular social law s efficiency. Instea, what shoul be consiere are the computational an other costs of the best-known algorithms the social law makes realizable. We may then refer to a social law s efficiency solely in this regar. However, others o not always clearly make this iscrimination, particularly with social laws so highly constraine an algorithmically formulate they blur the paraigmatic istinction. In referring to their work, we will sometimes fin it convenient to ignore this istinction as well. More generally, we will efine the notion of a noneterministic social law as one that oes not guarantee it is useful in the technical sense given above, although it is highly likely to be for its expecte istribution of agent goals an behaviors. We will call non-eterministic social algorithms the algorithms that ahere to these laws an only present expecte efficiency results regaring them. In the next section, we iscuss the importance of unerstaning the expecte behaviors of the agents an not simply their goal spaces while formulating social laws. After this, we examine a traffic omain originally presente in []. We formulate a non-eterministic social law for it that is more efficient than its eterministic counterpart. We then present extensive simulation results that emonstrate the efficacy of our approach. Using Distribution Information Social laws in MAS o not always provie sufficient information to write efficient control algorithms for the agents. This is not necessarily a limitation of social laws per se. However, it inicates the importance of unerstaning the expecte behavior of the agents as a group somewhere in the system s coorination mechanism, whether it be irectly incorporate into the system s social laws as we argue in the next section, or instea, into the actual control algorithms for its agents. Even though we are investigating a coorination paraigm that has no centralize controller, there is no reason to insist that iniviual agents have no knowlege of their expecte group behavior. To better unerstan this point, it will be useful to first make explicit the role of social laws from a programmer s perspective. A social law for a multi-agent system is esigne to give its agents some measure of autonomy an self-government. While it is essential that each agent follow the law, it is of no concern what the agent actually oes as long as all of its activities are legal. In other wors, social laws make no recommenations as to how agents shoul spen their time; they simply insure the agents o not unuly interfere with each other. Formulating a useful social law is computationally emaning, an even etermining whether one exists for a MAS is in general N-complete []. Therefore, the evelopment of a social law is taken to be an offline practice. However, once a social law is formulate, it can be repeately use without further computational expense. This may be contraste with negotiation protocols, in which computational effort goes into both formulating a protocol an then subsequently negotiating accoring to it each time is it employe. After a social law is esigne for a system, it is supplie to the agents programmers, who are then responsible for implementing control algorithms for the agents that obey it. However, without more information about the expecte behavior of the other agents in the system, this may be quite ifficult to o efficiently. This is because a social law inicates which set of actions is legal in any encountere situation without proviing guiance for selecting among

3 the legal alternatives. It can be ifficult o so without aitional information. For example, consier the following omain, taken from [], in which m agents synchronously travel circularly aroun an n-noe ring, with noes clockwise labele from n. At each time step, an agent can move to either of its two neighboring noes or it can remain immobile. A minimal social law presente in [] that permitte these agents to travel was: () Staying immobile is forbien if the noe that can be reache by a single counterclockwise movement is occupie. () Moving counterclockwise is allowe only if the two noes that woul be encountere by moving counterclockwise twice are free. While this social law provies a framework that guarantees two agents cannot collie or ealock, it oes not provie any practical guiance for how to actually move agents aroun the ring. If an agent is on noe k an wishes to travel to noe j, j>k, shoul it take a clockwise or counterclockwise path? Supposing j k < n /, the agent shoul clearly move clockwise. However, if j k > n /, it is not obvious which irection is best without knowing both the current value of m an how other agents ten to move (or stay immobile) on the ring. If the agent trie to reach noe j but was blocke k steps along the path between them, it might then have to travel clockwise aroun the ring to j, thereby incurring a k penalty for its unsuccessful counterclockwise attempt. The primary question here is how far an agent can expect to move counterclockwise without being blocke by another agent. Although we o not further analyze this problem here, this simple example makes clear the nee for an iniviual agent to have available more information than that provie irectly by its social law or sensory capabilities. The Multi-Agent Gri System We now examine the multi-agent traffic omain presente in [], which we will refer to as the Gri System. This omain consists of an nxn gri that is traverse by m mobile agents (e.g., robots), as shown in Figure. The rows an columns of the gri form lanes that the agents can navigate. We assume that time is iscrete an the system is synchronous, so at every time step, each agent is locate at some gri coorinate. In this system, agents are given goals in the form of gri coorinates to which they must navigate. Every time an agent reaches its estination, it receives a new goal to visit. For example, the agents might be transporting goos in a warehouse an are alternatively picking up an ropping off items. (We note such systems are currently in frequent commercial use.) The main consieration here is how to insure that the agents o not collie while they navigate the gri. For example, the most naïve strategy woul simply snake the agents in a Hamiltonian cycle aroun the gri, as shown in Figure An 8x8 gri with three agents that will travel along the inicate paths. Notice that in three time steps, agents & will collie at coorinate (,) Figure A. Each trip between any two noes woul take O( n ) time units to complete, which oes not compare favorably with the O(n) steps an agent woul take to make the same trip in isolation i.e., with no other agents present. Because this omain oes not have cooperative goals ones that agents work together to achieve the time an agent woul take to complete a task in isolation is the optimum that any social law coul achieve. In [], a complex, eterministic social law is presente for the Gri System that guarantees agents can achieve their goals within certain time bouns. This law requires that agents only use certain rows an columns in the gri for long istance travel, much like we use a highway. When an agent reaches the neighborhoo of its goal, it then travels to it irectly along the local gri, as illustrate in Figure B. Summarizing their results, an agent that can achieve a goal in time t in isolation can achieve it using their social law in time t + n + o( n), assuming m = O( n) an m << n. For the case where m n, a variant of this law provies that each goal can be achieve in n time steps. It is helpful to keep in min that with m = O( n), the gri is very sparsely populate. For example, if n = 00, a gri containing 0,000 locations woul have on the orer of 0 agents moving on it. We are intereste in answering the following questions: by insuring generality, is the eterministic social law framework overly constraining? How can its assumptions be loosene in orer to achieve a more efficient coorination system? Can we both increase the number of agents travelling on the gri an simultaneously ecrease the amount of time they take to reach their goals? The Uniform Gri System In this section, we consier the gri system presente above uner a particular probability istribution escribing an agent s goal selection. Namely, we will assume that the goals are uniformly istribute over all points (x, y) on the gri:

4 r [( x, y) is a goal] =, 0 x, y < n It is important to note that this assumption will certainly not always be vali, an the non-eterministic social law we present here is not intene for systems where it is not. However, for MAS with agents escribe by this istribution, we can obtain far more efficient results than those in []. Towars etermining a lower boun for the noneterministic social law s efficiency, we first etermine the expecte istance between two ranomly selecte integral coorinates, which we call, on a line from [0, n-] inclusive: n ( n i) n E( ) = i r( = i) = i = n n i= n n i= (A) (C) (B) (D) On a two-imensional gri, the expecte istance between a pair of successive goals will be E ( ), because the total istance will be the sum of the istances along each axis inepenently. We will call this value the isolation time, enote by ; it is the expecte travel time between goals for an unconstraine, isolate agent. It is therefore also a lower boun on the time taken by any social law governing the uniform gri system. Our goal is to formulate a noneterministic social law that approaches this lower boun as closely as possible. Our approach will be to essentially allow the agents to move as they woul in isolation. They will explicitly check to make sure their moves are safe, an take corrective action if necessary. We assume that each agent has sufficient sensory capabilities to realize that other agents are in its immeiate vicinity, i.e. up to steps away. In the event a transition between noes woul cause a collision, an agent simply waits to try again on the next move. If an agent is blocke for an extene perio along its path, the social law requires that it formulate some alternate route to its estination. articularly important in this case is ensuring that the ealock recovery mechanism maintains the assume probability istribution escribing the agents movements through the gri. Notice that this approach oes not guarantee ealock will be avoie. It is possible (however unlikely) that two agents heae in opposite irections along a column or row can inefinitely block one another, even after repeately trying alternate paths to their estinations. In practice, we might try to etect such situations an formulate rules of encounter to avoi them. However, in tens of millions of simulation runs, non-recoverable ealock has never been encountere. Nonetheless, the non-eterministic social law shown below, which we call law Traffic Law U (for uniform), is not guarantee in its present form to be useful in the technical sense efine in the introuction: Traffic Law U Figure Different strategies an agent might use to traverse the gri: (A) Walk a Hamiltonian cycle; (B) Navigate through course gri until reaching appropriate neighborhoo an then use fine gri; (C) Take a minimum length path between points; (D) Loop in a figure 8 path through gri. Circles in the above figures represent goals. ) At step i+, an agent may not move to a spot occupie by another agent at step i. ) If more than one agent simultaneously wants to move to a coorinate, only one, chosen at ranom, is permitte to o so. The rest must remain where they are an wait one turn before trying again. ) If an agent has remaine immobile for more than k turns because its path has been blocke, it must pick another route to its goal. We will refer to the conition of rule of this law as a collision an the requirement of rule as rerouting. Rule in the above law is a conservative measure that prevents an agent from moving to a spot most recently occupie by another agent. While technically unnecessary, it allows us to avoi the nightmare of inter-agent communication an coorination that woul be necessary for moving an immeiately ajacent queue of agents simultaneously. Notice that the Traffic Law U leaves the precise strategy for picking an alternate route in rule unspecifie. Any particular implementation of a non-eterministic social algorithm that aheres to Traffic Law U will have to pick some mechanism for selecting this alternative route. This coul, for example, involve ynamic negotiation between the agents, ranom selection, or some other strategy. Below, we examine a metho that ranomly picks an

5 intermeiate goal to visit along the way to the agent s actual estination in case it gets stuck somewhere. We efine an L-path as a path between two gri points that contains at most one turn (i.e., change of irection), so calle because of its resemblance to the letter L. (See Figure (c).) oints not on the same row or column will have two L-paths connecting them. Otherwise, there will be only one. A route is efine to be a sequence of L- paths. We now give a non-eterministic social algorithm that aheres to Traffic Law U: Algorithm :. Select a new goal g.. Let be a ranom L-ath from current position to g.. Set route R =. Move along route R towars g, following rules an of Traffic Law U. 5. If blocke for more than k steps, o the following: a. Ranomly select new intermeiary goal g b. Let be a ranom L-path from current position to g c. Let be a ranom L-path from g to g.. Set R =, e. Go to step.. Upon reaching goal g, go to step. The insistence that agents travel along L-paths is well motivate for maintaining the assume istribution of agents in the gri. For example, were the agents to travel along ranom paths (i.e., completely shuffle L-paths), this woul inuce a normal istribution of the agents, more heavily favoring the center region of the gri an leaing to higher numbers of collisions an rerouting. L-paths are to be preferre because they more uniformly istribute the agents an thus, make collisions far less likely. Furthermore, assuming that turning mobile robots requires greater energy than moving them in a straight irection an aitionally interferes with ea-reckoning location strategies by introucing aitional uncertainty, L-paths are to be preferre for practical, non-istribution specific reasons as well. Analysis The efficiency of this algorithm is strictly etermine by the number of collisions an amount of rerouting an agent has to o. In the absence of these, each agent woul achieve optimal time, because the L-path to its goal is a shortest length route to it. However, in the presence of other agents, both collisions an rerouting are inevitable an can incur prohibitive time penalties. With respect to each agent, a collision has cost because of the incurre elay. Rerouting has cost of at least, because ealock may occur uring the rerouting process itself. However, there is no recursive rerouting the agent simply reroutes with respect to the original goal, not the intermeiary selecte in step (5a) of the algorithm. We will first provie a loose upper boun to the expecte running time for an agent to travel between successive goals on an nxn gri containing m agents. We use this to etermine how many agents can be allowe on the gri simultaneously given how much overhea (i.e. waste travel time) is acceptable. We then present extensive simulation results for Algorithm, ue to the ifficultly of obtaining tighter bouns for its running time. Analytic Results To etermine how many agents can simultaneously traverse the gri without incurring unreasonable elays ue to congestion, we approximately moel an agent s movement through the Uniform Gri System as if it were governe by a negative binomial istribution. This approximation will become increasingly inaccurate in systems where the gri is more heavily congeste, in which case we must turn to the simulation results given below. For Algorithm, we boun E t, the expecte travel time between goals as: Et E( time moving towars goal ) + E( time recovering from ealock ) We efine the probabilities of colliing an successful transitions as c an s respectively: m =, = n c s c Note that c woul be seem to be ouble the given value but we assume that half the time an agent is involve in a potential collision, it is the one selecte to move per rule of Traffic Law U, an no time penalty is thereby incurre. We boun the probability of ealock by consiering that it occurs only when agents collie an then subsequently block each other. Separately accounting for interior an borer regions, we have: ( n n) n c c c c = + = + c n n n Recall, the isolation time, is given by: n = E( ) = n / n We calculate E goal, the expecte time an agent spens moving towars its goal using our negative binomial istribution assumption: E goal = s We etermine E ealock, the expecte time an agent spens recovering from ealocks, explicitly noting that the agent may ealock in the mist of ealock recovery:

6 Eealock ( G + ( G + ( G +...)...) s = s We then have the expecte time between successive goals is: Et + s s Next, we efine c *, the ratio between the expecte an isolation times when traveling between successive goals. It is a measure of the overhea ue to agent interaction while traversing the gri: * E / t c c = + + s s c c c / Recalling the above efinition of c, we solve for the number of agents m as a function of c* an n: * * c c m ( n ) + = ( n ) + * * c + G c + n We now have a hanle on how many agents can be allowe onto an nxn gri given some level of acceptable overhea c *. For example, on a 00x00 gri, if it is acceptable for an agent to spen. times longer between successive goals than it woul on the gri alone, then we expect that roughly 87 agents can be permitte onto the gri simultaneously. Note that this is actually an unerestimate because of the non-tight boun for E t etermine above. The actual number emonstrate in simulation for c * =. is m=n, or in this case, m=00. Simulation Results A Java-base simulator was written for the Uniform Gri System employing Traffic Law U an Algorithm. Our approach for each gri of size n was to slowly increase the number of agents, m, observing how this impacte the average time of an agent to achieve its goals. We first consier the case where m = c n. As expecte, the time taken for an agent to achieve its goals on average is essentially equal to its isolation time. Tables an contain the cases for c = an 0 respectively. Each simulation was run until the agents globally achieve 0,000 goals. In the table: #S represents the number of time steps simulate; C is the total collision penalty for the simulation; R is the total rerouting penalty; Avg is the average time an agent took to achieve a goal; is the time an agent woul ieally take in isolation; c* is Avg/; an %+ is 00x(Avg )/. We note that lower c* values are better, an a value of is the best that can be achieve by any social law in this omain. We then examine cases where m = cn, where c < n. As c approaches n, the ensity of the agents increases to the point where they become hopelessly crowe, an navigation becomes extraorinarily inefficient. As this happens, it becomes more efficient to simply snake the agents aroun the gri in a Hamiltonian cycle as escribe above. Graphs an isplay the rate of change in c* (=Avg/) as a function of c (=m/n) for n=0 an 00 respectively. Finally, we examine our results for the case where c = (m=n), where we fin that empirically, c* is roughly aroun / for all values of n. Table : m = n n m #S C R Avg c* % Table : m = 0 n n m #S C R Avg c* % Table : m = n n #S C R Avg c* % Comparison of results Algorithm is near optimal in the logarithmic cases shown in Tables an, where m = c n. Only in the case

7 Multiples of isolation time = c* where c m / oes the performance egrae Multiples of isolation time = c* 0 Graph : Gri System with n= Multiples of n agents, m=xn Graph : Gri System with n = Multiples of n agents, m=xn substantially. When m = cn, we observe a near constant multiplicative cost of approximately. for c =. As c starts to increase, we note the expecte penalty observe in the average time it takes an agent to reach its goal. Finally, as c approaches n itself, the number of agents approaches n, an it woul be best to ynamically switch to the Hamiltonian path strategy. In the table below, we compare the expecte time for an agent to reach its goal in our approach an the one taken in []: Table : Comparison of non-eterministic Algorithm with the eterministic social law presente in []: Expecte Time to Goal m = Non-Deterministic Deterministic n (=n/) c, c> 0 n Approaches c, c> n.=n/5 n cn See graphs Not applicable encounter. In particular, we argue that knowlege of the unerlying istributions escribing agent behavior can give us new ways of coorinating MAS an help us formulate more efficient social laws. We emonstrate this by revisiting a previously stuie traffic omain problem. By assuming a particular istribution of both agent goals an their ealock recovery behavior, we were able to formulate a simple an more efficient strategy for coorinating the movement of agents throughout the gri. Future work in this omain inclues more precisely characterizing the runtime complexity of Algorithm, exploring how well the system works when face with other istributions, i.e., how sensitive this formulation is to the actual encountere behavior, an exploring other coorination omains that might be amenable to this approach. Acknowlegements This material is base upon work supporte by the Avance Research rojects Agency of the Department of Defense uner contract number F00 9 C 00, monitore through Rome Laboratory. Special thanks to D. Fitoussi an L. Weisman. References [] Fitoussi, D. an Tennenholtz, M. Minimal Social Laws. In roc. Of the Fifteenth National Conference on Artificial Intelligence, p [] Moses, Y., an Tennenholtz, M. Artificial Social Systems. Computers an Artificial Intelligence. ():5-5. [] Rosenschein, J.S., an Zlotkin, G. Rules of Encounter: Design Conventions for Automate Negotiation among Computers. MIT ress. 99. [] Shoham, Y., an Tennenholtz, M. Social Laws for Artificial Agent Societies: Off-line Design. Artificial Intelligence [5] Stuart, C. An Implementation of a Multi-Agent lan Synchronizer. In roc. Ninth International Joint Conference on Artificial Intelligence Conclusions In this paper, we propose that general purpose, eterministic social laws appropriate for all circumstances may be inappropriate for the situations MAS actually

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson JUST THE MATHS UNIT NUMBER 10.2 DIFFERENTIATION 2 (Rates of change) by A.J.Hobson 10.2.1 Introuction 10.2.2 Average rates of change 10.2.3 Instantaneous rates of change 10.2.4 Derivatives 10.2.5 Exercises

More information

Separation of Variables

Separation of Variables Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay

More information

CMSC 858F: Algorithmic Game Theory Fall 2010 BGP and Interdomain Routing

CMSC 858F: Algorithmic Game Theory Fall 2010 BGP and Interdomain Routing CMSC 858F: Algorithmic Game Theory Fall 2010 BGP an Interomain Routing Instructor: Mohamma T. Hajiaghayi Scribe: Yuk Hei Chan November 3, 2010 1 Overview In this lecture, we cover BGP (Borer Gateway Protocol)

More information

ELECTRON DIFFRACTION

ELECTRON DIFFRACTION ELECTRON DIFFRACTION Electrons : wave or quanta? Measurement of wavelength an momentum of electrons. Introuction Electrons isplay both wave an particle properties. What is the relationship between the

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

Optimization of Geometries by Energy Minimization

Optimization of Geometries by Energy Minimization Optimization of Geometries by Energy Minimization by Tracy P. Hamilton Department of Chemistry University of Alabama at Birmingham Birmingham, AL 3594-140 hamilton@uab.eu Copyright Tracy P. Hamilton, 1997.

More information

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation JOURNAL OF MATERIALS SCIENCE 34 (999)5497 5503 Thermal conuctivity of grae composites: Numerical simulations an an effective meium approximation P. M. HUI Department of Physics, The Chinese University

More information

Lecture 6 : Dimensionality Reduction

Lecture 6 : Dimensionality Reduction CPS290: Algorithmic Founations of Data Science February 3, 207 Lecture 6 : Dimensionality Reuction Lecturer: Kamesh Munagala Scribe: Kamesh Munagala In this lecture, we will consier the roblem of maing

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz A note on asymptotic formulae for one-imensional network flow problems Carlos F. Daganzo an Karen R. Smilowitz (to appear in Annals of Operations Research) Abstract This note evelops asymptotic formulae

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Examining Geometric Integration for Propagating Orbit Trajectories with Non-Conservative Forcing

Examining Geometric Integration for Propagating Orbit Trajectories with Non-Conservative Forcing Examining Geometric Integration for Propagating Orbit Trajectories with Non-Conservative Forcing Course Project for CDS 05 - Geometric Mechanics John M. Carson III California Institute of Technology June

More information

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems Construction of the Electronic Raial Wave Functions an Probability Distributions of Hyrogen-like Systems Thomas S. Kuntzleman, Department of Chemistry Spring Arbor University, Spring Arbor MI 498 tkuntzle@arbor.eu

More information

A simplified macroscopic urban traffic network model for model-based predictive control

A simplified macroscopic urban traffic network model for model-based predictive control Delft University of Technology Delft Center for Systems an Control Technical report 9-28 A simplifie macroscopic urban traffic network moel for moel-base preictive control S. Lin, B. De Schutter, Y. Xi,

More information

u t v t v t c a u t b a v t u t v t b a

u t v t v t c a u t b a v t u t v t b a Nonlinear Dynamical Systems In orer to iscuss nonlinear ynamical systems, we must first consier linear ynamical systems. Linear ynamical systems are just systems of linear equations like we have been stuying

More information

Vectors in two dimensions

Vectors in two dimensions Vectors in two imensions Until now, we have been working in one imension only The main reason for this is to become familiar with the main physical ieas like Newton s secon law, without the aitional complication

More information

Lecture 5. Symmetric Shearer s Lemma

Lecture 5. Symmetric Shearer s Lemma Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here

More information

Short Intro to Coordinate Transformation

Short Intro to Coordinate Transformation Short Intro to Coorinate Transformation 1 A Vector A vector can basically be seen as an arrow in space pointing in a specific irection with a specific length. The following problem arises: How o we represent

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Similarity Measures for Categorical Data A Comparative Study. Technical Report

Similarity Measures for Categorical Data A Comparative Study. Technical Report Similarity Measures for Categorical Data A Comparative Stuy Technical Report Department of Computer Science an Engineering University of Minnesota 4-92 EECS Builing 200 Union Street SE Minneapolis, MN

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

Generalizing Kronecker Graphs in order to Model Searchable Networks

Generalizing Kronecker Graphs in order to Model Searchable Networks Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

Quantum Search on the Spatial Grid

Quantum Search on the Spatial Grid Quantum Search on the Spatial Gri Matthew D. Falk MIT 2012, 550 Memorial Drive, Cambrige, MA 02139 (Date: December 11, 2012) This paper explores Quantum Search on the two imensional spatial gri. Recent

More information

Math 1B, lecture 8: Integration by parts

Math 1B, lecture 8: Integration by parts Math B, lecture 8: Integration by parts Nathan Pflueger 23 September 2 Introuction Integration by parts, similarly to integration by substitution, reverses a well-known technique of ifferentiation an explores

More information

Distributed coordination control for multi-robot networks using Lyapunov-like barrier functions

Distributed coordination control for multi-robot networks using Lyapunov-like barrier functions IEEE TRANSACTIONS ON 1 Distribute coorination control for multi-robot networks using Lyapunov-like barrier functions Dimitra Panagou, Dušan M. Stipanović an Petros G. Voulgaris Abstract This paper aresses

More information

Polynomial Inclusion Functions

Polynomial Inclusion Functions Polynomial Inclusion Functions E. e Weert, E. van Kampen, Q. P. Chu, an J. A. Muler Delft University of Technology, Faculty of Aerospace Engineering, Control an Simulation Division E.eWeert@TUDelft.nl

More information

Center of Gravity and Center of Mass

Center of Gravity and Center of Mass Center of Gravity an Center of Mass 1 Introuction. Center of mass an center of gravity closely parallel each other: they both work the same way. Center of mass is the more important, but center of gravity

More information

The Principle of Least Action

The Principle of Least Action Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of

More information

Multi-robot Formation Control Using Reinforcement Learning Method

Multi-robot Formation Control Using Reinforcement Learning Method Multi-robot Formation Control Using Reinforcement Learning Metho Guoyu Zuo, Jiatong Han, an Guansheng Han School of Electronic Information & Control Engineering, Beijing University of Technology, Beijing

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

Lecture 10 Notes, Electromagnetic Theory II Dr. Christopher S. Baird, faculty.uml.edu/cbaird University of Massachusetts Lowell

Lecture 10 Notes, Electromagnetic Theory II Dr. Christopher S. Baird, faculty.uml.edu/cbaird University of Massachusetts Lowell Lecture 10 Notes, Electromagnetic Theory II Dr. Christopher S. Bair, faculty.uml.eu/cbair University of Massachusetts Lowell 1. Pre-Einstein Relativity - Einstein i not invent the concept of relativity,

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

Calculus in the AP Physics C Course The Derivative

Calculus in the AP Physics C Course The Derivative Limits an Derivatives Calculus in the AP Physics C Course The Derivative In physics, the ieas of the rate change of a quantity (along with the slope of a tangent line) an the area uner a curve are essential.

More information

Situation awareness of power system based on static voltage security region

Situation awareness of power system based on static voltage security region The 6th International Conference on Renewable Power Generation (RPG) 19 20 October 2017 Situation awareness of power system base on static voltage security region Fei Xiao, Zi-Qing Jiang, Qian Ai, Ran

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies Laplacian Cooperative Attitue Control of Multiple Rigi Boies Dimos V. Dimarogonas, Panagiotis Tsiotras an Kostas J. Kyriakopoulos Abstract Motivate by the fact that linear controllers can stabilize the

More information

18 EVEN MORE CALCULUS

18 EVEN MORE CALCULUS 8 EVEN MORE CALCULUS Chapter 8 Even More Calculus Objectives After stuing this chapter you shoul be able to ifferentiate an integrate basic trigonometric functions; unerstan how to calculate rates of change;

More information

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7.

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7. Lectures Nine an Ten The WKB Approximation The WKB metho is a powerful tool to obtain solutions for many physical problems It is generally applicable to problems of wave propagation in which the frequency

More information

Power Generation and Distribution via Distributed Coordination Control

Power Generation and Distribution via Distributed Coordination Control Power Generation an Distribution via Distribute Coorination Control Byeong-Yeon Kim, Kwang-Kyo Oh, an Hyo-Sung Ahn arxiv:407.4870v [math.oc] 8 Jul 204 Abstract This paper presents power coorination, power

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Sharp Thresholds. Zachary Hamaker. March 15, 2010

Sharp Thresholds. Zachary Hamaker. March 15, 2010 Sharp Threshols Zachary Hamaker March 15, 2010 Abstract The Kolmogorov Zero-One law states that for tail events on infinite-imensional probability spaces, the probability must be either zero or one. Behavior

More information

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche Department of Computing Macquarie University, Australia christophe.oche@mq.eu.au. Abstract. The

More information

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics This moule is part of the Memobust Hanbook on Methoology of Moern Business Statistics 26 March 2014 Metho: Balance Sampling for Multi-Way Stratification Contents General section... 3 1. Summary... 3 2.

More information

Linear and quadratic approximation

Linear and quadratic approximation Linear an quaratic approximation November 11, 2013 Definition: Suppose f is a function that is ifferentiable on an interval I containing the point a. The linear approximation to f at a is the linear function

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

Role of parameters in the stochastic dynamics of a stick-slip oscillator

Role of parameters in the stochastic dynamics of a stick-slip oscillator Proceeing Series of the Brazilian Society of Applie an Computational Mathematics, v. 6, n. 1, 218. Trabalho apresentao no XXXVII CNMAC, S.J. os Campos - SP, 217. Proceeing Series of the Brazilian Society

More information

Dot trajectories in the superposition of random screens: analysis and synthesis

Dot trajectories in the superposition of random screens: analysis and synthesis 1472 J. Opt. Soc. Am. A/ Vol. 21, No. 8/ August 2004 Isaac Amiror Dot trajectories in the superposition of ranom screens: analysis an synthesis Isaac Amiror Laboratoire e Systèmes Périphériques, Ecole

More information

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25 Combinatorica 9(1)(1989)91 99 A New Lower Boun for Snake-in-the-Box Coes Jerzy Wojciechowski Department of Pure Mathematics an Mathematical Statistics, University of Cambrige, 16 Mill Lane, Cambrige, CB2

More information

Sparse Reconstruction of Systems of Ordinary Differential Equations

Sparse Reconstruction of Systems of Ordinary Differential Equations Sparse Reconstruction of Systems of Orinary Differential Equations Manuel Mai a, Mark D. Shattuck b,c, Corey S. O Hern c,a,,e, a Department of Physics, Yale University, New Haven, Connecticut 06520, USA

More information

A Second Time Dimension, Hidden in Plain Sight

A Second Time Dimension, Hidden in Plain Sight A Secon Time Dimension, Hien in Plain Sight Brett A Collins. In this paper I postulate the existence of a secon time imension, making five imensions, three space imensions an two time imensions. I will

More information

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency Transmission Line Matrix (TLM network analogues of reversible trapping processes Part B: scaling an consistency Donar e Cogan * ANC Eucation, 308-310.A. De Mel Mawatha, Colombo 3, Sri Lanka * onarecogan@gmail.com

More information

II. First variation of functionals

II. First variation of functionals II. First variation of functionals The erivative of a function being zero is a necessary conition for the etremum of that function in orinary calculus. Let us now tackle the question of the equivalent

More information

inflow outflow Part I. Regular tasks for MAE598/494 Task 1

inflow outflow Part I. Regular tasks for MAE598/494 Task 1 MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the

More information

Quantum Mechanics in Three Dimensions

Quantum Mechanics in Three Dimensions Physics 342 Lecture 20 Quantum Mechanics in Three Dimensions Lecture 20 Physics 342 Quantum Mechanics I Monay, March 24th, 2008 We begin our spherical solutions with the simplest possible case zero potential.

More information

Calculus Class Notes for the Combined Calculus and Physics Course Semester I

Calculus Class Notes for the Combined Calculus and Physics Course Semester I Calculus Class Notes for the Combine Calculus an Physics Course Semester I Kelly Black December 14, 2001 Support provie by the National Science Founation - NSF-DUE-9752485 1 Section 0 2 Contents 1 Average

More information

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels. Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion

More information

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM proceeings This paper was presente as part of the main Technical

More information

A Path Planning Method Using Cubic Spiral with Curvature Constraint

A Path Planning Method Using Cubic Spiral with Curvature Constraint A Path Planning Metho Using Cubic Spiral with Curvature Constraint Tzu-Chen Liang an Jing-Sin Liu Institute of Information Science 0, Acaemia Sinica, Nankang, Taipei 5, Taiwan, R.O.C., Email: hartree@iis.sinica.eu.tw

More information

05 The Continuum Limit and the Wave Equation

05 The Continuum Limit and the Wave Equation Utah State University DigitalCommons@USU Founations of Wave Phenomena Physics, Department of 1-1-2004 05 The Continuum Limit an the Wave Equation Charles G. Torre Department of Physics, Utah State University,

More information

Calculus and optimization

Calculus and optimization Calculus an optimization These notes essentially correspon to mathematical appenix 2 in the text. 1 Functions of a single variable Now that we have e ne functions we turn our attention to calculus. A function

More information

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering, On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications

More information

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy Delay Limite Capacity of A hoc Networks: Asymptotically Optimal Transmission an Relaying Strategy Eugene Perevalov Lehigh University Bethlehem, PA 85 Email: eup2@lehigh.eu Rick Blum Lehigh University Bethlehem,

More information

A Sketch of Menshikov s Theorem

A Sketch of Menshikov s Theorem A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p

More information

Markov Chains in Continuous Time

Markov Chains in Continuous Time Chapter 23 Markov Chains in Continuous Time Previously we looke at Markov chains, where the transitions betweenstatesoccurreatspecifietime- steps. That it, we mae time (a continuous variable) avance in

More information

Equilibrium in Queues Under Unknown Service Times and Service Value

Equilibrium in Queues Under Unknown Service Times and Service Value University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University

More information

Lecture 16: The chain rule

Lecture 16: The chain rule Lecture 6: The chain rule Nathan Pflueger 6 October 03 Introuction Toay we will a one more rule to our toolbo. This rule concerns functions that are epresse as compositions of functions. The iea of a composition

More information

Modeling the effects of polydispersity on the viscosity of noncolloidal hard sphere suspensions. Paul M. Mwasame, Norman J. Wagner, Antony N.

Modeling the effects of polydispersity on the viscosity of noncolloidal hard sphere suspensions. Paul M. Mwasame, Norman J. Wagner, Antony N. Submitte to the Journal of Rheology Moeling the effects of polyispersity on the viscosity of noncolloial har sphere suspensions Paul M. Mwasame, Norman J. Wagner, Antony N. Beris a) epartment of Chemical

More information

Perturbation Analysis and Optimization of Stochastic Flow Networks

Perturbation Analysis and Optimization of Stochastic Flow Networks IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM 2004 1 Perturbation Analysis an Optimization of Stochastic Flow Networks Gang Sun, Christos G. Cassanras, Yorai Wari, Christos G. Panayiotou,

More information

Lecture 2 Lagrangian formulation of classical mechanics Mechanics

Lecture 2 Lagrangian formulation of classical mechanics Mechanics Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,

More information

Prep 1. Oregon State University PH 213 Spring Term Suggested finish date: Monday, April 9

Prep 1. Oregon State University PH 213 Spring Term Suggested finish date: Monday, April 9 Oregon State University PH 213 Spring Term 2018 Prep 1 Suggeste finish ate: Monay, April 9 The formats (type, length, scope) of these Prep problems have been purposely create to closely parallel those

More information

A Better Model for Job Redundancy: Decoupling Server Slowdown and Job Size

A Better Model for Job Redundancy: Decoupling Server Slowdown and Job Size A Better Moel for Job Reunancy: Decoupling Server Slowown an Job Size Kristen Garner 1 Mor Harchol-Balter 1 Alan Scheller-Wolf Benny Van Hout 3 October 1 CMU-CS-1-131 School of Computer Science Carnegie

More information

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Backorers Uner the (Rr) Policy Yihong Fan a Benamin Melame b Yao Zhao c Yorai Wari Abstract This paper aresses Infinitesimal Perturbation

More information

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1 Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of

More information

TMA 4195 Matematisk modellering Exam Tuesday December 16, :00 13:00 Problems and solution with additional comments

TMA 4195 Matematisk modellering Exam Tuesday December 16, :00 13:00 Problems and solution with additional comments Problem F U L W D g m 3 2 s 2 0 0 0 0 2 kg 0 0 0 0 0 0 Table : Dimension matrix TMA 495 Matematisk moellering Exam Tuesay December 6, 2008 09:00 3:00 Problems an solution with aitional comments The necessary

More information

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation A Novel ecouple Iterative Metho for eep-submicron MOSFET RF Circuit Simulation CHUAN-SHENG WANG an YIMING LI epartment of Mathematics, National Tsing Hua University, National Nano evice Laboratories, an

More information

TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM

TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM 265 Asian Journal of Control, Vol. 4, No. 3, pp. 265-273, September 22 TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM Jurachart Jongusuk an Tsutomu Mita

More information

7.1 Support Vector Machine

7.1 Support Vector Machine 67577 Intro. to Machine Learning Fall semester, 006/7 Lecture 7: Support Vector Machines an Kernel Functions II Lecturer: Amnon Shashua Scribe: Amnon Shashua 7. Support Vector Machine We return now to

More information

Math 1271 Solutions for Fall 2005 Final Exam

Math 1271 Solutions for Fall 2005 Final Exam Math 7 Solutions for Fall 5 Final Eam ) Since the equation + y = e y cannot be rearrange algebraically in orer to write y as an eplicit function of, we must instea ifferentiate this relation implicitly

More information

Slide10 Haykin Chapter 14: Neurodynamics (3rd Ed. Chapter 13)

Slide10 Haykin Chapter 14: Neurodynamics (3rd Ed. Chapter 13) Slie10 Haykin Chapter 14: Neuroynamics (3r E. Chapter 13) CPSC 636-600 Instructor: Yoonsuck Choe Spring 2012 Neural Networks with Temporal Behavior Inclusion of feeback gives temporal characteristics to

More information

TCP throughput and timeout steady state and time-varying dynamics

TCP throughput and timeout steady state and time-varying dynamics TCP throughput an timeout steay state an time-varying ynamics Stephan Bohacek an Khushboo Shah Dept. of Electrical an Computer Engineering Dept. of Electrical Engineering University of Delaware University

More information

Constraint Reformulation and a Lagrangian Relaxation based Solution Algorithm for a Least Expected Time Path Problem Abstract 1.

Constraint Reformulation and a Lagrangian Relaxation based Solution Algorithm for a Least Expected Time Path Problem Abstract 1. Constraint Reformulation an a Lagrangian Relaation base Solution Algorithm for a Least Epecte Time Path Problem Liing Yang State Key Laboratory of Rail Traffic Control an Safety, Being Jiaotong University,

More information

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences. S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial

More information

Experiment I Electric Force

Experiment I Electric Force Experiment I Electric Force Twenty-five hunre years ago, the Greek philosopher Thales foun that amber, the harene sap from a tree, attracte light objects when rubbe. Only twenty-four hunre years later,

More information

The total derivative. Chapter Lagrangian and Eulerian approaches

The total derivative. Chapter Lagrangian and Eulerian approaches Chapter 5 The total erivative 51 Lagrangian an Eulerian approaches The representation of a flui through scalar or vector fiels means that each physical quantity uner consieration is escribe as a function

More information

Analysis on a Localized Pruning Method for Connected Dominating Sets

Analysis on a Localized Pruning Method for Connected Dominating Sets JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 1073-1086 (2007) Analysis on a Localize Pruning Metho for Connecte Dominating Sets JOHN SUM 1, JIE WU 2 AND KEVIN HO 3 1 Department of Information Management

More information

A study on ant colony systems with fuzzy pheromone dispersion

A study on ant colony systems with fuzzy pheromone dispersion A stuy on ant colony systems with fuzzy pheromone ispersion Louis Gacogne LIP6 104, Av. Kenney, 75016 Paris, France gacogne@lip6.fr Sanra Sanri IIIA/CSIC Campus UAB, 08193 Bellaterra, Spain sanri@iiia.csic.es

More information

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA

More information

Switching Time Optimization in Discretized Hybrid Dynamical Systems

Switching Time Optimization in Discretized Hybrid Dynamical Systems Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information