Polynomial encryption

Size: px
Start display at page:

Download "Polynomial encryption"

Transcription

1 Polynomial encryption Yeray Cachón Santana May 0, 018 This paper proposes a new method to encrypt and decrypt a message by special functions formed by Hermite, Laguerre, Tchebychev and Bessel The idea to encrypt a message will be by using base changes from the Taylor base to the bases of those special functions. The Hermite, Lagurrre, Tchebychev and Bessel polynomials are orthogonal, so they form a base set on a Hilbert space. The encryption will be using several sequences of those base changes according to a number sequence. According to Hilbert space, as those are orthogonal polynomials, those functions form a orthogonal base. So, a change base can be done between a Taylor base and those bases - this is the method that will be used in order to encrypt a message. Contents 1 Introduction Hermite 3.1 Encryption and decryption Laguerre 6 4 Combining Hermite and Laguerre 7 5 Tschebysche 8 6 Bessel 9 7 A way to combine those methods 10 8 Conclusions 11 9 References 1 1

2 1 Introduction As far as I know, this work proposes a new method to encrypt a decrypt a message using several orthogonal polynomials. This could be interesting in order to extend the ways to encryption of les or any documents shared. As this are not known method, an attack would have more diculties in order to decrypt the message. Also, the fact of combining the several method will make more dicult to attack because there are several patterns used in the encrypted message. A way to attack an encrypted message is by the frequencies of the letters used on the alphabet (in this example, the relative frequencies of letters in the English language). As it will be shown, the fact of sending a chain like EEE, there will be dierences on each sequence, so an attack by frequencies is much more dicult. Also, the Hermite method fails when all the letters of the block are the same but, in this case, other methods can be used (like Laguerre). Maybe, when there are sequences with the same code letter (like AAAA), the Bessel method encryption will give best results,as it's returning dierent numbers for the encryption of the same code letter. But, as several methods are used when encrypting the message, an attack by frequencies cannot be easily applied on the whole message (I don't think that it could be possible), because the same letter will be decrypted by several numbers during the message. Also, the longer the message is, the more dierent numbers will be applied on the encrypted message. I think that other advantage of this method is that it can be parallelized. In this case, with a multi-processor system, each processor can encrypt a block independently the other blocks and, then, put the message together. Similarly, the decryption can be parallelized. A disadvantage of this method is that it's slower than using AES, because there are system equations to be solved. But, as several methods are applied, it seems that it might be more secure. This can be used to encrypt text on a hard drive, and decrypt by a pass code as shown on the section 7. This paper shows the method to encrypt and decrypt a message by the orthogonal functions Hermite, Laguerre, Tchebysche and Bessel. I think that it can be extended to other orthogonal functions. According to a Hilbert space, those functions formed a base set, so it can be used a change base from a Taylor base to those bases. Having said that, other orthogonal functions can be used in order to encrypt a message. In this paper, those orthogonal functions are used as example because their importance on physical-mathematical problems.

3 Hermite In this section, let's dene how to encrypt and decrypt using Hermite polynomial functions. Prior to this, let's see how the Hermite polynomials are dened: H n+1 (x) = xh n (x) nh n 1 (x) H n(x) = nh n 1 The Hermite functions are the eigenvalues of the Fourier transform (see reference Eigenfunctions of the Fourier transform). As the Fourier transform is a linear, self-adjoint and compact operator, its eigenvalues formed a base (see spectral theorem). The orthogonality is given by: + H n(x)h m (x)e x dx = 0,m n So, let's see how to the n-power of x can be set according to the Hermite polynomials: H 0 = 1 H 1 = xh 0 = x, so x = H1 H = xh 1 1 H 0 = 4x H 0, so x = H+H0 4 H 3 = xh H 1 = x(4x ) 4 x = 8x 3 1x, so x 3 = H3+6H1 8 H 4 = xh 3 3 H = x ( 8x 3 1x ) 6 ( 4x ) = 16x 4 48x + 1 = 16x 4 1 (H + H 0 ) + 1H 0 = 16x 4 1H 1H 0, so x 4 = H4+1H+1H0 16 ) H 5 = xh 4 4 H 3 = 3x 5 96x 3 +4x 8 ( 8x 3 1x ) = 3x 5 160x 3 +10x = 3x ( H 3+6H ( H 1 ) = 3x 5 0H 3 60H 1, so x 5 = H5+0H3+60H 3 H 6 = xh 5 10H 4 = 64x 6 30x 4 +40x 10H 4 = 64x 6 30H 4 60H 10H 0, so x 6 = H6+30H4+60H+10H0 64 It seems that it cannot be a general formula to set x n in function of H n. But, even this general formula, the n-power of x can be in function of H n. With this idea, let's see how a polynomial may be encrypted. As the even-power of x is set according to even-nth term of Hermite polynomial (and the same for the odd), let's use a polynomial on even-power of x: P (x) = A + Bx + Cx 4 In this way, let's use linear equations of Hermite polynomials: H 0 = A H = 4Bx A H 4 = 16Cx 4 1H 1H 0 = 16Cx 4 1 ( 4Bx A ) 1A = 16Cx 4 48Bx + 1A So, let's calculate the coecients of each term: Mx 0 = H0 0 = A, M=A Mx = H+H0 4 = 4Bx A+A 4 = Bx,M=B Mx 4 = H 4 +1H +4 3 H0 16 = Cx 4,M=C In order to see this, the idea is putting the coecients H nas linear combinations of H n : H 0 = AH 0 H = 4Bx AH 0 = 4B ( ) H +H 0 4 AH0 = BH + (B A) H 0 H 4 = 16Cx 4 48Bx + 1AH 0 = 16C ( H 4+1H +1H 0 ) ( 16 48B H+H 0 ) 4 + 1AH0 = CH (C B) H + 16 = 16Cx4 48Bx +1A+48Bx 4A+1A 1 (C B + A) H 0 So, in those bases, let's see how it's the base change: B { 1, x, x 4... } B {H 0, H, H 4...} The change of base in Hermite base, it's according to the equations above: H 0 = AH 0 H = BH + (B A) H 0 H 4 = CH 4 + 1(C B)H + 1(C B + A)H 0 H 0 A 0 0 H = (B A) B 0 1 (C B + A) 1 (C B) C H 4 H 0 H The polynomial coecients P (x) = A+Bx +Cx 4 has been transformed on a linear combinations of Hermite polynomials H n. H 4 3

4 .1 Encryption and decryption Let's see how to decrypt a message given by the Hermite polynomials. Firstly, the chain {H 0, H, H 4...} is received. Now, the decrypting system needs to nd the coecient A,B,C in order to decrypt the message. As the system is using a base of Hermite, the change base is: H 0 = AH 0 H = BH + (B A) H 0 H 4 = CH 4 + 1(C B)H + 1(C B + A)H 0 So, A = H 0 H 0 B = H +AH0 H +H 0 C = H 4 +1BH+4BH0 1AH0 H 4+1H +1H 0 Example. Let's encrypt and decrypt the chain ABC. Associating, a number to each letter( A>1,B> and so on), the polynomial will be like this: P (x) = 1 + x + 3x 4 Then, the encryption message on Hermite base, will be: H 0 A 0 0 H = (B A) B 0 H 4 H 0 H H 4 = 1 (C B + A) 1 (C B) C H 0 0 H H 4 Let's see if, with the numbers {, 0, 1} as the encrypted message of ABC, is enough to decrypt the system. Now, having those numbers, as the system knows that it's encrypted via Hermite polynomials, the system needs to solve the equations: (B A) = 1(C B + A) = 0 1(C B) = 1 B A = 1 C B + A = 0 C B = A B = C But, as = 0, the equation cannot be solved. So, let's adding the trace of the matrix on the 1. 1 encrypted message: {, 0, 1, 6}. Now: B A = 1 C B + A = 0 C B = 1 A + B + C = 'A = B = A B C = = 6 6 = 1 = 1 6 = 0 6, whence H 0 H H 4 4

5 C = = 18 6 = 3 Let's see, what happens if a message with the same letter is sent. For example, a message like AAA. As shown previously, the trace of the matrix will be sent: B A = 0 C B + A = 0 C B = 0 A + B + C = 3 A = B = C = A B C = = 6 6 = 1 = 6 6 = 1 = 6 6 = , whence 5

6 3 Laguerre The Laguere functions are the solutions for the dierential equation: xy(x) + (1-x)y'(x) + ny(x) = 0 Where, L n (x) = ex s n e s πi n+1 ds (s x) Following the same method as for the Hermite polynomials, let's see how the Laguerre polynomials are dened: (n + 1) L n+1 (x) = (n + 1 x) L n (x) nl n 1 (x) The rst Laguerre polynomials are dened like this: L 0 (x) = 1 L 1 (x) = x + 1!L (x) = x 4x + 3!L 3 (x) = x 3 + 9x 18x + 6 4!L 4 (x) = x 4 16x 3 + 7x 96x + 4 Now, let's set how to set the n-th power on terms of Laguerre polynomials: L 1 (x) = x ( + 1 = x + L o, so x = L 0 L 1 L (x) = 1! x 4x + ) = 1 x (L 0 L 1 ) + L 0 = 1 x + L 1 L 0, so x = (L L 1 + L 0 ) ( L 3 (x) = 1 3! x 3 + 9x 18x + 6 ) = x3 3! + 9 3! x 3x + 1 = x3 3! + 3 (L L 1 + L 0 ) 3 (L 0 L 1 ) + L 0 = x3 3! + 3 (L L 1 ) + L 0,whence x 3 = 3! (L 0 L (L L 1 )) ( L 4 (x) = 1 4! x 4 16x 3 + 7x 96x + 4 ) = x4 4! + { 1 4! 16x 3 + 7x 96x + 4 } L 4 (x) = x4 4! + 1 4! { 16 (3! (L 0 L (L L 1 ))) + 7 (L L 1 + L 0 ) 96 (L 0 L 1 ) + 4L 0 } L 4 (x) = x4 4! + 1 4! (96L 3 144L + 96L 1 4L 0 ),whence x 4 = 4!L 4 96L L 96L 1 + 4L 0 In this case, it seems that it cannot be found a general formula to nd x n in terms of L n. But, even without this general formula, we can follow the same procedure as shown on the section 1. Let's use a general polynomial of 4th power L(x) = A + Bx + Cx + Dx 3 + Ex 4 In this way, let's use linear equations of Laguerre polynomials: L 0 = A L 1 = Bx A!L = Cx 4Bx + A Let's calculate the coecient of each term: Mx 0 = L o = A L 0 L 1 = Bx A = B (L 0 L 1 ) + A L 0 = (A + B) L 0 BL 1!L = Cx 4Bx+A = C (L L 1 + L 0 ) 4B (L 0 L 1 )+AL 0 = (C 4B + A) L 0 +(4B C) L 1 + CL L 0 L 1 L L = A 0 0 A + B B 0 C B + A B C C Following the same method, let's encrypt the message ABC so A=1, B= and C=3 L 0 L 1 = L 0 L L Sending the numbers {3, 0, 1}as the encrypted message of ABC. A + B = 3 C B + A = 0 B C = A B C = 3 0 1, L 0 L 1 Solving this system of linear equations, as shown previously, A = 1 B = C = 3 L For example, in order to encrypt the message AAA, the sequence {,0,0} will be sent. In general, being x the position of the letter in the alphabet, if the sequence has the same letters, the encrypted sequence will be like {x,0,0}. 6

7 4 Combining Hermite and Laguerre In this section, let's see how those methods can be combined. In order to see this, let's put the equations like H 0 this: H A 0 0 H 0 H = (H B H A ) H B 0 H H 4 1 (H C H B + H A ) 1 (H C H B ) H C H 4 L A 0 0 L 0 = L A + L B L B 0 L 0 L 1 L L C L B + L A L B L C L C L So, combining both of ( operators: ) ( H A 0 0 M HxL = M H xm L = ( ) LA 0 0 H B H A H B 0 L A + L B L B 0 H C M HxL = 1 ( ) H C H B + H A 1 ( ) H C H ( B ) H A L A 0 0 ( ) ( ) H B H A LA + H B LA + L B H B L B 0 1 ( ) H C H B + H A LA + 1 ( ) ( ) ( ) ( ) ( ) H C H B LA + L B + HC LC L B + L A 1L B HC H B + HC LB L C H C L C L 1 L C L B + L A L B L C L C ) In order to encrypt the message ABC, following the same method as previously, let's call: H A = L A = 1 H B = L :B = H C = L C = 3 So, M HxL = = In this case, as H A = L A,H B = L B and H C = L C, the numbers {8, 36, 1}can be sent. In order to decrypt the message, knowing that the message is a combination of Hermite and Laguerre matrix, and H A = L A = M A,H B = L B = M B and H C = L C = M C, ( M HxL = M A 0 0 ( ) M B + 3M A M B M A M B 0 1 M A M B + M C + 5M B M C 36M A M B + 5M A M C + 10M B M C M C 1M B + 13M B M C M C As the numbers {8, 36, 1} are sent, in order to decrypt the message: MB + 3M AM B MA = 8 1 ( MA M B) + M C 36M A M B + 5M A M C + 10M B M C = 36 MC 1M B + 13M BM C = 1 Solving those equations, M A = 1 M B = M C = 3 ) 7

8 5 Tschebysche The Tchebysche polynomials are given by this generating equation: 1 t 1 xt t = T 0 (x) + T n (x)t n n=1 The rst Tchebysche polynomials are dened by: T 0 = 1 T 1 = x, whence x = T 1 T = x 1, x = T+T0 T 3 = 4x 3 3x, x 3 = T3+3T1 4 T 4 = 8x 4 8x + 1, x 4 = T4+8x 1 8 = T4+4T+3T0 8 T 5 = 16x 5 0x 3 + 5x, x 5 = T5+0x3 5x 16 = T5+5(T3+3T1) 5T1 16 = T5+5T3+10T1 16 T 6 = 3x 6 48x x 1, x 6 = T6+6T4+15T+10T0 3 Let's use a general polynomial of Tschebyshe: T (x) = A + Bx + Cx + Dx 3 + Ex 4 T 0 = A = AT 0 T 1 = Bx = BT 1 T = Cx A = C (T + T 0 ) AT 0 = CT + (C A) T 0 T 3 = 4Dx 3 3Bx = D (T 3 + 3T 1 ) 3BT 1 = DT (D B) T 1 T 4 = 8Ex 4 8Cx +A = E (T 4 + 4T + 3T 0 ) 4C (T + T 0 )+AT 0 = ET 4 +4 (E C) T +(3E 4C + A) T 0 T 0 T 1 T T 3 T 4 = A B C A 0 C (D B) 0 D 0 3E 4C + A 0 4(E C) 0 E As shown on the matrix, there are 5 unknown quantities, but the system needs to send 5 numbers in order to decrypt the message. So, let's send this chain of number, adding the trace of the matrix: {A+B+C+D+E,C-A,3(D-B),3E-4C+A,4(E-C)} Following this, let's encrypt the message ABCDE, so T T 0 T 1 T T 3 = T T T 3 T T 4 Sending the numbers {15,,6,4,8} as the encrypted message of ABCDE. A + B + C + D + E = 15 C A = 3(D B) = 6 3E 4C + A = 4 4(E C) = Solving those equations: A = 1 B = C = 3 D = 4 E = 5 A B C D E = T 0 T 1 T T 3 T 4 8

9 6 Bessel In order to introduce the Bessel functions, let's introduce a function of two variables: g(x, t) = e (x/)(t 1/t) Expanding this function in a Laurent series: g(x, t) = e (x/)(t 1/t) = n= The coecient of t n is then: J n (x) = ( x ) n+s s=0 ( 1) s s!(n+s)! J n (x)t n Taking the particular cases J 0 and J 1 : J 0 (x) = 1 x + x4 4 x J 1 (x) = x x3 4 + x x Let's write it in this way: J n (x) = ( x ) n+s s=0 ( 1) s s!(n+s)! So, taking the rst terms of the Bessel function for J 0 : J 0,0 (x) = 1 J 0, (x) = x J 0,4 (x) = J 0,6 (x) = x4 4 x6 4 6 The n-th term of the series will be given by: J 0,n = ( 1) n 1 (m). Following the same procedure as m=1 seen previously, x = J 0, x 4 = 4 J 0,4 x 6 = 4 6 J 0,6 Using a general polynomial: J(x) = A + Bx + Cx 4 + Dx 6 = AJ 0,0 BJ 0, + 4 CJ 0,4 4 6 DJ 0, For the several terms: J 0 = AJ 0,0 J = BJ 0, J 4 = 4 CJ 0,4 J 6 = 4 6 DJ 0,6 In thiscase, as there are no crossed-terms, thematrix will be diagonal: J 0 A J 0,0 J J 4 = B J 0, 4 C J 0,4 J D J 0,6 Example. Let's encrypt and decrypt the chain ABCD. Associating, a number to each letter( A>1,B> and{ so on), so the encryption will be: A, B, 4 C, 4 6 D } Taking A=1,B=,C=3,D=4, the encrypted message will be {1,-8,19,-916}. In this case, for decrypt the message, as the numbers are calculated via Bessel polynomials, A = J 0 J 0 = 1 B = J J 0, = 8 = C = J3 4 = 19 4 = 3 D = J4 4 6 = = 4 In this case, it was used the expansion of the function J 0.But, this can be extended to others Bessel functions (J 1, J...). This allows to extend the method to other orthogonal functions. n 9

10 7 A way to combine those methods Having seen Hermite, Laguerre, Tchebysche and Bessel as ways to encrypt and decrypt messages by base changing, let's see how those method can be combined. As it as shown 4 methods, a possible way could be by generating a pseudo-random number base 4, like. r (4 = Then, the message will be separate into several blocks so, according to the digit, each block will be encrypted/decrypted. For example, Hermite = 1 Laguerre = Tchebysche = 3 Bessel = 4 As shown on the section Combining Hermite and Laguerre, the matrices are combined in order to send a sequence that will be decrypted. In this section this will be reviewed and it will be extended to the other combinations. Let's consider a pseudo-random number as a product of prime random numbers. Seeing this in this schema: The pseudo-random number will be as a product of numbers prime numbers: r (4 = p 1(4 p (4 One of the prime number will be included on the rst block. Then, in order to decrypt the message, the second prime number p (private key) will be needed in order to nd the random number r (4. Once the pseudorandom number is calculated, following the sentence of the numbers, the system can decrypt the block message according to the previous methods (Hermite, Legendre, Tchebyshe and Bessel). So, to decrypt the message, knowing the p 1(4, the pseudo-random number will be calculated and, then, the message can be decrypted. Each block can be, either a single block (Hermite, Laguerre, Tchebyshe or Bessel), or a combined block (as shown on Combining Hermite and Laguerre). So, let's consider those cases: Hermite = 0 Laguerre = 1 Tschebysche= Bessel = 3 Hermite-Laguerre = 4 Hermite-Bessel = 5 Hermite-Tschebysche = 6 Laguerre-Bessel = 7 Laguerre-Tschebysche = 8 Tschebysche-Bessel = 9 As the Bessel matrix is diagonal, the cases Bessel-Hermite, Bessel-Laguerre and Bessel-Tschebysche won't be considered because of the commutation of the matrix Bessel with the others. So, following the same procedure, r = p 1 p Once the number r is calculated as a product of numbers (one of them random), the blocks will be decrypted following the sequence of r.let's see this with an example: 1) p 1 = 199(random key sent on the rst block) and p = 137(private key) ) The sequence of encryption will be r = p 1 p = 763 3) The blocks will be encrypted according the cyclic sequence according to the cases considered previously. In order to decrypt: 1) The random key is sent on the rst block (p 1 ) ) Private key: p 3) The random number is calculated r = p 1 p 4) The blocks will be decrypted according to the sequence generated by r So, the encrypted chain sent will be like this: 10

11 Knowing the random number p 1,the sequence of encryption will be calculated and, then, the message will be decrypted according the sequence, as shown previously. 8 Conclusions This paper proposes a method to encrypt and decrypt a message using orthogonal polynomials. It has been shown as examples the Hermite, Laguerre, Bessel and Tschebysche, as well as combinations of those polynomials. It has also been shown that an attack by frequencies will be dicult as the same letter will be encrypted dierently on each block. Those functions have been used because their importance on physical-mathematical problems, but it can be extended to whatever orthogonal functions. Theorem.Suppose A is a compact self-adjoint operator on a (real or complex) Hilbert space V. Then there is an orthonormal basis of V consisting of eigenvectors of A. Each eigenvalue is real. As the Hermite, Laguerre, Bessel and Tschebysche are compact self-adjoint operator, their eigenvectors formed an orthonormal basis, so they can be used in order to nd a change base from a Taylor base {1, x, x..}to those bases (and vice-versa). This idea is used in order to encrypt and decrypt a message. Using several blocks of strings, each block can be encrypted by a specic method, following a cyclic sequence number which seed is calculated as a product of primes. Feel free to send me any comments to ycachon@gmail.com about this paper. 11

12 9 References Mathematical Methods for Physicists (Arfken and Weber) Eigenfunctions of the Fourier transform : 1

E.G. KALNINS AND WILLARD MILLER, JR. The notation used for -series and -integrals in this paper follows that of Gasper and Rahman [3].. A generalizati

E.G. KALNINS AND WILLARD MILLER, JR. The notation used for -series and -integrals in this paper follows that of Gasper and Rahman [3].. A generalizati A NOTE ON TENSOR PRODUCTS OF -ALGEBRA REPRESENTATIONS AND ORTHOGONAL POLYNOMIALS E.G. KALNINSy AND WILLARD MILLER, Jr.z Abstract. We work out examples of tensor products of distinct generalized s`) algebras

More information

This ODE arises in many physical systems that we shall investigate. + ( + 1)u = 0. (λ + s)x λ + s + ( + 1) a λ. (s + 1)(s + 2) a 0

This ODE arises in many physical systems that we shall investigate. + ( + 1)u = 0. (λ + s)x λ + s + ( + 1) a λ. (s + 1)(s + 2) a 0 Legendre equation This ODE arises in many physical systems that we shall investigate We choose We then have Substitution gives ( x 2 ) d 2 u du 2x 2 dx dx + ( + )u u x s a λ x λ a du dx λ a λ (λ + s)x

More information

Solutions: Problem Set 3 Math 201B, Winter 2007

Solutions: Problem Set 3 Math 201B, Winter 2007 Solutions: Problem Set 3 Math 201B, Winter 2007 Problem 1. Prove that an infinite-dimensional Hilbert space is a separable metric space if and only if it has a countable orthonormal basis. Solution. If

More information

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2.

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2. APPENDIX A Background Mathematics A. Linear Algebra A.. Vector algebra Let x denote the n-dimensional column vector with components 0 x x 2 B C @. A x n Definition 6 (scalar product). The scalar product

More information

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) Contents 1 Vector Spaces 1 1.1 The Formal Denition of a Vector Space.................................. 1 1.2 Subspaces...................................................

More information

1 Ordinary points and singular points

1 Ordinary points and singular points Math 70 honors, Fall, 008 Notes 8 More on series solutions, and an introduction to \orthogonal polynomials" Homework at end Revised, /4. Some changes and additions starting on page 7. Ordinary points and

More information

Math 118, Handout 4: Hermite functions and the Fourier transform. n! where D = d/dx, are a basis of eigenfunctions for the Fourier transform

Math 118, Handout 4: Hermite functions and the Fourier transform. n! where D = d/dx, are a basis of eigenfunctions for the Fourier transform The Hermite functions defined by h n (x) = ( )n e x2 /2 D n e x2 where D = d/dx, are a basis of eigenfunctions for the Fourier transform f(k) = f(x)e ikx dx on L 2 (R). Since h 0 (x) = e x2 /2 h (x) =

More information

ELEMENTARY LINEAR ALGEBRA WITH APPLICATIONS. 1. Linear Equations and Matrices

ELEMENTARY LINEAR ALGEBRA WITH APPLICATIONS. 1. Linear Equations and Matrices ELEMENTARY LINEAR ALGEBRA WITH APPLICATIONS KOLMAN & HILL NOTES BY OTTO MUTZBAUER 11 Systems of Linear Equations 1 Linear Equations and Matrices Numbers in our context are either real numbers or complex

More information

Chapter 6 Inner product spaces

Chapter 6 Inner product spaces Chapter 6 Inner product spaces 6.1 Inner products and norms Definition 1 Let V be a vector space over F. An inner product on V is a function, : V V F such that the following conditions hold. x+z,y = x,y

More information

Equations (3) and (6) form a complete solution as long as the set of functions fy n (x)g exist that satisfy the Properties One and Two given by equati

Equations (3) and (6) form a complete solution as long as the set of functions fy n (x)g exist that satisfy the Properties One and Two given by equati PHYS/GEOL/APS 661 Earth and Planetary Physics I Eigenfunction Expansions, Sturm-Liouville Problems, and Green's Functions 1. Eigenfunction Expansions In seismology in general, as in the simple oscillating

More information

CYK\2010\PH402\Mathematical Physics\Tutorial Find two linearly independent power series solutions of the equation.

CYK\2010\PH402\Mathematical Physics\Tutorial Find two linearly independent power series solutions of the equation. CYK\010\PH40\Mathematical Physics\Tutorial 1. Find two linearly independent power series solutions of the equation For which values of x do the series converge?. Find a series solution for y xy + y = 0.

More information

Physics 137A Quantum Mechanics Fall 2012 Midterm II - Solutions

Physics 137A Quantum Mechanics Fall 2012 Midterm II - Solutions Physics 37A Quantum Mechanics Fall 0 Midterm II - Solutions These are the solutions to the exam given to Lecture Problem [5 points] Consider a particle with mass m charge q in a simple harmonic oscillator

More information

March Algebra 2 Question 1. March Algebra 2 Question 1

March Algebra 2 Question 1. March Algebra 2 Question 1 March Algebra 2 Question 1 If the statement is always true for the domain, assign that part a 3. If it is sometimes true, assign it a 2. If it is never true, assign it a 1. Your answer for this question

More information

x 3y 2z = 6 1.2) 2x 4y 3z = 8 3x + 6y + 8z = 5 x + 3y 2z + 5t = 4 1.5) 2x + 8y z + 9t = 9 3x + 5y 12z + 17t = 7

x 3y 2z = 6 1.2) 2x 4y 3z = 8 3x + 6y + 8z = 5 x + 3y 2z + 5t = 4 1.5) 2x + 8y z + 9t = 9 3x + 5y 12z + 17t = 7 Linear Algebra and its Applications-Lab 1 1) Use Gaussian elimination to solve the following systems x 1 + x 2 2x 3 + 4x 4 = 5 1.1) 2x 1 + 2x 2 3x 3 + x 4 = 3 3x 1 + 3x 2 4x 3 2x 4 = 1 x + y + 2z = 4 1.4)

More information

Classnotes - MA Series and Matrices

Classnotes - MA Series and Matrices Classnotes - MA-2 Series and Matrices Department of Mathematics Indian Institute of Technology Madras This classnote is only meant for academic use. It is not to be used for commercial purposes. For suggestions

More information

Boundary Conditions associated with the Left-Definite Theory for Differential Operators

Boundary Conditions associated with the Left-Definite Theory for Differential Operators Boundary Conditions associated with the Left-Definite Theory for Differential Operators Baylor University IWOTA August 15th, 2017 Overview of Left-Definite Theory A general framework for Left-Definite

More information

. Consider the linear system dx= =! = " a b # x y! : (a) For what values of a and b do solutions oscillate (i.e., do both x(t) and y(t) pass through z

. Consider the linear system dx= =! =  a b # x y! : (a) For what values of a and b do solutions oscillate (i.e., do both x(t) and y(t) pass through z Preliminary Exam { 1999 Morning Part Instructions: No calculators or crib sheets are allowed. Do as many problems as you can. Justify your answers as much as you can but very briey. 1. For positive real

More information

1 Vectors. Notes for Bindel, Spring 2017 Numerical Analysis (CS 4220)

1 Vectors. Notes for Bindel, Spring 2017 Numerical Analysis (CS 4220) Notes for 2017-01-30 Most of mathematics is best learned by doing. Linear algebra is no exception. You have had a previous class in which you learned the basics of linear algebra, and you will have plenty

More information

APPENDIX : PARTIAL FRACTIONS

APPENDIX : PARTIAL FRACTIONS APPENDIX : PARTIAL FRACTIONS Appendix : Partial Fractions Given the expression x 2 and asked to find its integral, x + you can use work from Section. to give x 2 =ln( x 2) ln( x + )+c x + = ln k x 2 x+

More information

Lecture 4.6: Some special orthogonal functions

Lecture 4.6: Some special orthogonal functions Lecture 4.6: Some special orthogonal functions Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4340, Advanced Engineering Mathematics

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

11 a 12 a 21 a 11 a 22 a 12 a 21. (C.11) A = The determinant of a product of two matrices is given by AB = A B 1 1 = (C.13) and similarly.

11 a 12 a 21 a 11 a 22 a 12 a 21. (C.11) A = The determinant of a product of two matrices is given by AB = A B 1 1 = (C.13) and similarly. C PROPERTIES OF MATRICES 697 to whether the permutation i 1 i 2 i N is even or odd, respectively Note that I =1 Thus, for a 2 2 matrix, the determinant takes the form A = a 11 a 12 = a a 21 a 11 a 22 a

More information

Review of Linear Algebra

Review of Linear Algebra Review of Linear Algebra Definitions An m n (read "m by n") matrix, is a rectangular array of entries, where m is the number of rows and n the number of columns. 2 Definitions (Con t) A is square if m=

More information

1 Math 241A-B Homework Problem List for F2015 and W2016

1 Math 241A-B Homework Problem List for F2015 and W2016 1 Math 241A-B Homework Problem List for F2015 W2016 1.1 Homework 1. Due Wednesday, October 7, 2015 Notation 1.1 Let U be any set, g be a positive function on U, Y be a normed space. For any f : U Y let

More information

Introduction to orthogonal polynomials. Michael Anshelevich

Introduction to orthogonal polynomials. Michael Anshelevich Introduction to orthogonal polynomials Michael Anshelevich November 6, 2003 µ = probability measure on R with finite moments m n (µ) = R xn dµ(x)

More information

Lecture 12: Detailed balance and Eigenfunction methods

Lecture 12: Detailed balance and Eigenfunction methods Miranda Holmes-Cerfon Applied Stochastic Analysis, Spring 2015 Lecture 12: Detailed balance and Eigenfunction methods Readings Recommended: Pavliotis [2014] 4.5-4.7 (eigenfunction methods and reversibility),

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

Cryptography. P. Danziger. Transmit...Bob...

Cryptography. P. Danziger. Transmit...Bob... 10.4 Cryptography P. Danziger 1 Cipher Schemes A cryptographic scheme is an example of a code. The special requirement is that the encoded message be difficult to retrieve without some special piece of

More information

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v 250) Contents 2 Vector Spaces 1 21 Vectors in R n 1 22 The Formal Denition of a Vector Space 4 23 Subspaces 6 24 Linear Combinations and

More information

Problem 1A. Suppose that f is a continuous real function on [0, 1]. Prove that

Problem 1A. Suppose that f is a continuous real function on [0, 1]. Prove that Problem 1A. Suppose that f is a continuous real function on [, 1]. Prove that lim α α + x α 1 f(x)dx = f(). Solution: This is obvious for f a constant, so by subtracting f() from both sides we can assume

More information

Department of Applied Mathematics Preliminary Examination in Numerical Analysis August, 2013

Department of Applied Mathematics Preliminary Examination in Numerical Analysis August, 2013 Department of Applied Mathematics Preliminary Examination in Numerical Analysis August, 013 August 8, 013 Solutions: 1 Root Finding (a) Let the root be x = α We subtract α from both sides of x n+1 = x

More information

Linear Algebra- Final Exam Review

Linear Algebra- Final Exam Review Linear Algebra- Final Exam Review. Let A be invertible. Show that, if v, v, v 3 are linearly independent vectors, so are Av, Av, Av 3. NOTE: It should be clear from your answer that you know the definition.

More information

Simple Harmonic Oscillator

Simple Harmonic Oscillator Classical harmonic oscillator Linear force acting on a particle (Hooke s law): F =!kx From Newton s law: F = ma = m d x dt =!kx " d x dt + # x = 0, # = k / m Position and momentum solutions oscillate in

More information

1.4 Linear Transformation I

1.4 Linear Transformation I .4. LINEAR TRANSFORMATION I.4 Linear Transformation I MATH 9 FALL 99 PRELIM # 5 9FA9PQ5.tex.4. a) Consider the vector transformation y f(x) from V to V such that if y (y ; y ); x (x ; x ); y (x + x ) p

More information

Functional Analysis Review

Functional Analysis Review Outline 9.520: Statistical Learning Theory and Applications February 8, 2010 Outline 1 2 3 4 Vector Space Outline A vector space is a set V with binary operations +: V V V and : R V V such that for all

More information

Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition

Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition Prof. Tesler Math 283 Fall 2016 Also see the separate version of this with Matlab and R commands. Prof. Tesler Diagonalizing

More information

Hilbert Space Problems

Hilbert Space Problems Hilbert Space Problems Prescribed books for problems. ) Hilbert Spaces, Wavelets, Generalized Functions and Modern Quantum Mechanics by Willi-Hans Steeb Kluwer Academic Publishers, 998 ISBN -7923-523-9

More information

Group Theory. 1. Show that Φ maps a conjugacy class of G into a conjugacy class of G.

Group Theory. 1. Show that Φ maps a conjugacy class of G into a conjugacy class of G. Group Theory Jan 2012 #6 Prove that if G is a nonabelian group, then G/Z(G) is not cyclic. Aug 2011 #9 (Jan 2010 #5) Prove that any group of order p 2 is an abelian group. Jan 2012 #7 G is nonabelian nite

More information

GQE ALGEBRA PROBLEMS

GQE ALGEBRA PROBLEMS GQE ALGEBRA PROBLEMS JAKOB STREIPEL Contents. Eigenthings 2. Norms, Inner Products, Orthogonality, and Such 6 3. Determinants, Inverses, and Linear (In)dependence 4. (Invariant) Subspaces 3 Throughout

More information

x x2 2 + x3 3 x4 3. Use the divided-difference method to find a polynomial of least degree that fits the values shown: (b)

x x2 2 + x3 3 x4 3. Use the divided-difference method to find a polynomial of least degree that fits the values shown: (b) Numerical Methods - PROBLEMS. The Taylor series, about the origin, for log( + x) is x x2 2 + x3 3 x4 4 + Find an upper bound on the magnitude of the truncation error on the interval x.5 when log( + x)

More information

Chapter 4 Finite Fields

Chapter 4 Finite Fields Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number

More information

= a. a = Let us now study what is a? c ( a A a )

= a. a = Let us now study what is a? c ( a A a ) 7636S ADVANCED QUANTUM MECHANICS Solutions 1 Spring 010 1 Warm up a Show that the eigenvalues of a Hermitian operator A are real and that the eigenkets of A corresponding to dierent eigenvalues are orthogonal

More information

1 Boas, problem p.564,

1 Boas, problem p.564, Physics 6C Solutions to Homewor Set # Fall 0 Boas, problem p.564,.- Solve the following differential equations by series and by another elementary method and chec that the results agree: xy = xy +y ()

More information

Math 312 Final Exam Jerry L. Kazdan May 5, :00 2:00

Math 312 Final Exam Jerry L. Kazdan May 5, :00 2:00 Math 32 Final Exam Jerry L. Kazdan May, 204 2:00 2:00 Directions This exam has three parts. Part A has shorter questions, (6 points each), Part B has 6 True/False questions ( points each), and Part C has

More information

Brief introduction to groups and group theory

Brief introduction to groups and group theory Brief introduction to groups and group theory In physics, we often can learn a lot about a system based on its symmetries, even when we do not know how to make a quantitative calculation Relevant in particle

More information

Math 4263 Homework Set 1

Math 4263 Homework Set 1 Homework Set 1 1. Solve the following PDE/BVP 2. Solve the following PDE/BVP 2u t + 3u x = 0 u (x, 0) = sin (x) u x + e x u y = 0 u (0, y) = y 2 3. (a) Find the curves γ : t (x (t), y (t)) such that that

More information

LINEAR ALGEBRA BOOT CAMP WEEK 4: THE SPECTRAL THEOREM

LINEAR ALGEBRA BOOT CAMP WEEK 4: THE SPECTRAL THEOREM LINEAR ALGEBRA BOOT CAMP WEEK 4: THE SPECTRAL THEOREM Unless otherwise stated, all vector spaces in this worksheet are finite dimensional and the scalar field F is R or C. Definition 1. A linear operator

More information

Mathematical Foundations of Cryptography

Mathematical Foundations of Cryptography Mathematical Foundations of Cryptography Cryptography is based on mathematics In this chapter we study finite fields, the basis of the Advanced Encryption Standard (AES) and elliptical curve cryptography

More information

Parts Manual. EPIC II Critical Care Bed REF 2031

Parts Manual. EPIC II Critical Care Bed REF 2031 EPIC II Critical Care Bed REF 2031 Parts Manual For parts or technical assistance call: USA: 1-800-327-0770 2013/05 B.0 2031-109-006 REV B www.stryker.com Table of Contents English Product Labels... 4

More information

j=1 x j p, if 1 p <, x i ξ : x i < ξ} 0 as p.

j=1 x j p, if 1 p <, x i ξ : x i < ξ} 0 as p. LINEAR ALGEBRA Fall 203 The final exam Almost all of the problems solved Exercise Let (V, ) be a normed vector space. Prove x y x y for all x, y V. Everybody knows how to do this! Exercise 2 If V is a

More information

Linear Algebra Review (Course Notes for Math 308H - Spring 2016)

Linear Algebra Review (Course Notes for Math 308H - Spring 2016) Linear Algebra Review (Course Notes for Math 308H - Spring 2016) Dr. Michael S. Pilant February 12, 2016 1 Background: We begin with one of the most fundamental notions in R 2, distance. Letting (x 1,

More information

Finite-dimensional spaces. C n is the space of n-tuples x = (x 1,..., x n ) of complex numbers. It is a Hilbert space with the inner product

Finite-dimensional spaces. C n is the space of n-tuples x = (x 1,..., x n ) of complex numbers. It is a Hilbert space with the inner product Chapter 4 Hilbert Spaces 4.1 Inner Product Spaces Inner Product Space. A complex vector space E is called an inner product space (or a pre-hilbert space, or a unitary space) if there is a mapping (, )

More information

MAT 22B - Lecture Notes

MAT 22B - Lecture Notes MAT 22B - Lecture Notes 4 September 205 Solving Systems of ODE Last time we talked a bit about how systems of ODE arise and why they are nice for visualization. Now we'll talk about the basics of how to

More information

Nonlinear Integral Equation Formulation of Orthogonal Polynomials

Nonlinear Integral Equation Formulation of Orthogonal Polynomials Nonlinear Integral Equation Formulation of Orthogonal Polynomials Eli Ben-Naim Theory Division, Los Alamos National Laboratory with: Carl Bender (Washington University, St. Louis) C.M. Bender and E. Ben-Naim,

More information

Lecture 15 Review of Matrix Theory III. Dr. Radhakant Padhi Asst. Professor Dept. of Aerospace Engineering Indian Institute of Science - Bangalore

Lecture 15 Review of Matrix Theory III. Dr. Radhakant Padhi Asst. Professor Dept. of Aerospace Engineering Indian Institute of Science - Bangalore Lecture 15 Review of Matrix Theory III Dr. Radhakant Padhi Asst. Professor Dept. of Aerospace Engineering Indian Institute of Science - Bangalore Matrix An m n matrix is a rectangular or square array of

More information

Roots of Unity, Cyclotomic Polynomials and Applications

Roots of Unity, Cyclotomic Polynomials and Applications Swiss Mathematical Olympiad smo osm Roots of Unity, Cyclotomic Polynomials and Applications The task to be done here is to give an introduction to the topics in the title. This paper is neither complete

More information

Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition

Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition Linear Algebra review Powers of a diagonalizable matrix Spectral decomposition Prof. Tesler Math 283 Fall 2018 Also see the separate version of this with Matlab and R commands. Prof. Tesler Diagonalizing

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

LECTURE VI: SELF-ADJOINT AND UNITARY OPERATORS MAT FALL 2006 PRINCETON UNIVERSITY

LECTURE VI: SELF-ADJOINT AND UNITARY OPERATORS MAT FALL 2006 PRINCETON UNIVERSITY LECTURE VI: SELF-ADJOINT AND UNITARY OPERATORS MAT 204 - FALL 2006 PRINCETON UNIVERSITY ALFONSO SORRENTINO 1 Adjoint of a linear operator Note: In these notes, V will denote a n-dimensional euclidean vector

More information

ODE Homework 1. Due Wed. 19 August 2009; At the beginning of the class

ODE Homework 1. Due Wed. 19 August 2009; At the beginning of the class ODE Homework Due Wed. 9 August 2009; At the beginning of the class. (a) Solve Lẏ + Ry = E sin(ωt) with y(0) = k () L, R, E, ω are positive constants. (b) What is the limit of the solution as ω 0? (c) Is

More information

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems CPE 776:DATA SECURITY & CRYPTOGRAPHY Some Number Theory and Classical Crypto Systems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Some Number Theory

More information

Topics in Harmonic Analysis Lecture 1: The Fourier transform

Topics in Harmonic Analysis Lecture 1: The Fourier transform Topics in Harmonic Analysis Lecture 1: The Fourier transform Po-Lam Yung The Chinese University of Hong Kong Outline Fourier series on T: L 2 theory Convolutions The Dirichlet and Fejer kernels Pointwise

More information

MATH 423 Linear Algebra II Lecture 33: Diagonalization of normal operators.

MATH 423 Linear Algebra II Lecture 33: Diagonalization of normal operators. MATH 423 Linear Algebra II Lecture 33: Diagonalization of normal operators. Adjoint operator and adjoint matrix Given a linear operator L on an inner product space V, the adjoint of L is a transformation

More information

Optimization Theory. Linear Operators and Adjoints

Optimization Theory. Linear Operators and Adjoints Optimization Theory Linear Operators and Adjoints A transformation T. : X Y y Linear Operators y T( x), x X, yy is the image of x under T The domain of T on which T can be defined : D X The range of T

More information

ADVANCED ENGINEERING MATHEMATICS MATLAB

ADVANCED ENGINEERING MATHEMATICS MATLAB ADVANCED ENGINEERING MATHEMATICS WITH MATLAB THIRD EDITION Dean G. Duffy Contents Dedication Contents Acknowledgments Author Introduction List of Definitions Chapter 1: Complex Variables 1.1 Complex Numbers

More information

Information Theory. Lecture 7

Information Theory. Lecture 7 Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible

More information

1 Solutions to selected problems

1 Solutions to selected problems Solutions to selected problems Section., #a,c,d. a. p x = n for i = n : 0 p x = xp x + i end b. z = x, y = x for i = : n y = y + x i z = zy end c. y = (t x ), p t = a for i = : n y = y(t x i ) p t = p

More information

Chapter III. Quantum Computation. Mathematical preliminaries. A.1 Complex numbers. A.2 Linear algebra review

Chapter III. Quantum Computation. Mathematical preliminaries. A.1 Complex numbers. A.2 Linear algebra review Chapter III Quantum Computation These lecture notes are exclusively for the use of students in Prof. MacLennan s Unconventional Computation course. c 2017, B. J. MacLennan, EECS, University of Tennessee,

More information

LINEAR SYSTEMS AND MATRICES

LINEAR SYSTEMS AND MATRICES CHAPTER 3 LINEAR SYSTEMS AND MATRICES SECTION 3. INTRODUCTION TO LINEAR SYSTEMS This initial section takes account of the fact that some students remember only hazily the method of elimination for and

More information

Linear algebra II Homework #1 solutions A = This means that every eigenvector with eigenvalue λ = 1 must have the form

Linear algebra II Homework #1 solutions A = This means that every eigenvector with eigenvalue λ = 1 must have the form Linear algebra II Homework # solutions. Find the eigenvalues and the eigenvectors of the matrix 4 6 A =. 5 Since tra = 9 and deta = = 8, the characteristic polynomial is f(λ) = λ (tra)λ+deta = λ 9λ+8 =

More information

Introduction In a recent paper [] Fiedler introduced a simple invariant foraknotk in a line bundle over a surface F by means of a `small' state-sum, w

Introduction In a recent paper [] Fiedler introduced a simple invariant foraknotk in a line bundle over a surface F by means of a `small' state-sum, w The urau matrix and Fiedler's invariant for a closed braid H.R.Morton Department of Mathematical Sciences, University ofliverpool, Liverpool L69 3X, England. Abstract It is shown how Fiedler's `small state-sum'

More information

MS 3011 Exercises. December 11, 2013

MS 3011 Exercises. December 11, 2013 MS 3011 Exercises December 11, 2013 The exercises are divided into (A) easy (B) medium and (C) hard. If you are particularly interested I also have some projects at the end which will deepen your understanding

More information

Introduction to Number Theory

Introduction to Number Theory INTRODUCTION Definition: Natural Numbers, Integers Natural numbers: N={0,1,, }. Integers: Z={0,±1,±, }. Definition: Divisor If a Z can be writeen as a=bc where b, c Z, then we say a is divisible by b or,

More information

LEAST SQUARES APPROXIMATION

LEAST SQUARES APPROXIMATION LEAST SQUARES APPROXIMATION One more approach to approximating a function f (x) on an interval a x b is to seek an approximation p(x) with a small average error over the interval of approximation. A convenient

More information

(the matrix with b 1 and b 2 as columns). If x is a vector in R 2, then its coordinate vector [x] B relative to B satisfies the formula.

(the matrix with b 1 and b 2 as columns). If x is a vector in R 2, then its coordinate vector [x] B relative to B satisfies the formula. 4 Diagonalization 4 Change of basis Let B (b,b ) be an ordered basis for R and let B b b (the matrix with b and b as columns) If x is a vector in R, then its coordinate vector x B relative to B satisfies

More information

Quadratic forms. Here. Thus symmetric matrices are diagonalizable, and the diagonalization can be performed by means of an orthogonal matrix.

Quadratic forms. Here. Thus symmetric matrices are diagonalizable, and the diagonalization can be performed by means of an orthogonal matrix. Quadratic forms 1. Symmetric matrices An n n matrix (a ij ) n ij=1 with entries on R is called symmetric if A T, that is, if a ij = a ji for all 1 i, j n. We denote by S n (R) the set of all n n symmetric

More information

Problem 1A. Find the volume of the solid given by x 2 + z 2 1, y 2 + z 2 1. (Hint: 1. Solution: The volume is 1. Problem 2A.

Problem 1A. Find the volume of the solid given by x 2 + z 2 1, y 2 + z 2 1. (Hint: 1. Solution: The volume is 1. Problem 2A. Problem 1A Find the volume of the solid given by x 2 + z 2 1, y 2 + z 2 1 (Hint: 1 1 (something)dz) Solution: The volume is 1 1 4xydz where x = y = 1 z 2 This integral has value 16/3 Problem 2A Let f(x)

More information

Math Solutions to homework 5

Math Solutions to homework 5 Math 75 - Solutions to homework 5 Cédric De Groote November 9, 207 Problem (7. in the book): Let {e n } be a complete orthonormal sequence in a Hilbert space H and let λ n C for n N. Show that there is

More information

Unitary Dynamics and Quantum Circuits

Unitary Dynamics and Quantum Circuits qitd323 Unitary Dynamics and Quantum Circuits Robert B. Griffiths Version of 20 January 2014 Contents 1 Unitary Dynamics 1 1.1 Time development operator T.................................... 1 1.2 Particular

More information

Polynomial Chaos and Karhunen-Loeve Expansion

Polynomial Chaos and Karhunen-Loeve Expansion Polynomial Chaos and Karhunen-Loeve Expansion 1) Random Variables Consider a system that is modeled by R = M(x, t, X) where X is a random variable. We are interested in determining the probability of the

More information

Chapter 4: Interpolation and Approximation. October 28, 2005

Chapter 4: Interpolation and Approximation. October 28, 2005 Chapter 4: Interpolation and Approximation October 28, 2005 Outline 1 2.4 Linear Interpolation 2 4.1 Lagrange Interpolation 3 4.2 Newton Interpolation and Divided Differences 4 4.3 Interpolation Error

More information

Dynamical Systems. August 13, 2013

Dynamical Systems. August 13, 2013 Dynamical Systems Joshua Wilde, revised by Isabel Tecu, Takeshi Suzuki and María José Boccardi August 13, 2013 Dynamical Systems are systems, described by one or more equations, that evolve over time.

More information

Number theory (Chapter 4)

Number theory (Chapter 4) EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?

More information

Math 250B Midterm III Information Fall 2018 SOLUTIONS TO PRACTICE PROBLEMS

Math 250B Midterm III Information Fall 2018 SOLUTIONS TO PRACTICE PROBLEMS Math 25B Midterm III Information Fall 28 SOLUTIONS TO PRACTICE PROBLEMS Problem Determine whether the following matrix is diagonalizable or not If it is, find an invertible matrix S and a diagonal matrix

More information

Homework 3 solutions Math 136 Gyu Eun Lee 2016 April 15. R = b a

Homework 3 solutions Math 136 Gyu Eun Lee 2016 April 15. R = b a Homework 3 solutions Math 136 Gyu Eun Lee 2016 April 15 A problem may have more than one valid method of solution. Here we present just one. Arbitrary functions are assumed to have whatever regularity

More information

1 Unitary representations of the Virasoro algebra

1 Unitary representations of the Virasoro algebra Week 5 Reading material from the books Polchinski, Chapter 2, 15 Becker, Becker, Schwartz, Chapter 3 Ginspargs lectures, Chapters 3, 4 1 Unitary representations of the Virasoro algebra Now that we have

More information

Functional Analysis Review

Functional Analysis Review Functional Analysis Review Lorenzo Rosasco slides courtesy of Andre Wibisono 9.520: Statistical Learning Theory and Applications September 9, 2013 1 2 3 4 Vector Space A vector space is a set V with binary

More information

114 EUROPHYSICS LETTERS i) We put the question of the expansion over the set in connection with the Schrodinger operator under consideration (an accur

114 EUROPHYSICS LETTERS i) We put the question of the expansion over the set in connection with the Schrodinger operator under consideration (an accur EUROPHYSICS LETTERS 15 April 1998 Europhys. Lett., 42 (2), pp. 113-117 (1998) Schrodinger operator in an overfull set A. N. Gorban and I. V. Karlin( ) Computing Center RAS - Krasnoyars 660036, Russia (received

More information

A TOUR OF LINEAR ALGEBRA FOR JDEP 384H

A TOUR OF LINEAR ALGEBRA FOR JDEP 384H A TOUR OF LINEAR ALGEBRA FOR JDEP 384H Contents Solving Systems 1 Matrix Arithmetic 3 The Basic Rules of Matrix Arithmetic 4 Norms and Dot Products 5 Norms 5 Dot Products 6 Linear Programming 7 Eigenvectors

More information

Calculus C (ordinary differential equations)

Calculus C (ordinary differential equations) Calculus C (ordinary differential equations) Lesson 9: Matrix exponential of a symmetric matrix Coefficient matrices with a full set of eigenvectors Solving linear ODE s by power series Solutions to linear

More information

SPECTRAL THEOREM FOR SYMMETRIC OPERATORS WITH COMPACT RESOLVENT

SPECTRAL THEOREM FOR SYMMETRIC OPERATORS WITH COMPACT RESOLVENT SPECTRAL THEOREM FOR SYMMETRIC OPERATORS WITH COMPACT RESOLVENT Abstract. These are the letcure notes prepared for the workshop on Functional Analysis and Operator Algebras to be held at NIT-Karnataka,

More information

Elementary linear algebra

Elementary linear algebra Chapter 1 Elementary linear algebra 1.1 Vector spaces Vector spaces owe their importance to the fact that so many models arising in the solutions of specific problems turn out to be vector spaces. The

More information

5 Linear Algebra and Inverse Problem

5 Linear Algebra and Inverse Problem 5 Linear Algebra and Inverse Problem 5.1 Introduction Direct problem ( Forward problem) is to find field quantities satisfying Governing equations, Boundary conditions, Initial conditions. The direct problem

More information

Contents. 2 Partial Derivatives. 2.1 Limits and Continuity. Calculus III (part 2): Partial Derivatives (by Evan Dummit, 2017, v. 2.

Contents. 2 Partial Derivatives. 2.1 Limits and Continuity. Calculus III (part 2): Partial Derivatives (by Evan Dummit, 2017, v. 2. Calculus III (part 2): Partial Derivatives (by Evan Dummit, 2017, v 260) Contents 2 Partial Derivatives 1 21 Limits and Continuity 1 22 Partial Derivatives 5 23 Directional Derivatives and the Gradient

More information

Final Exam May 4, 2016

Final Exam May 4, 2016 1 Math 425 / AMCS 525 Dr. DeTurck Final Exam May 4, 2016 You may use your book and notes on this exam. Show your work in the exam book. Work only the problems that correspond to the section that you prepared.

More information

NOTES ON LINEAR ALGEBRA. 1. Determinants

NOTES ON LINEAR ALGEBRA. 1. Determinants NOTES ON LINEAR ALGEBRA 1 Determinants In this section, we study determinants of matrices We study their properties, methods of computation and some applications We are familiar with the following formulas

More information

Vectors in Function Spaces

Vectors in Function Spaces Jim Lambers MAT 66 Spring Semester 15-16 Lecture 18 Notes These notes correspond to Section 6.3 in the text. Vectors in Function Spaces We begin with some necessary terminology. A vector space V, also

More information

Physics 505 Homework No. 1 Solutions S1-1

Physics 505 Homework No. 1 Solutions S1-1 Physics 505 Homework No s S- Some Preliminaries Assume A and B are Hermitian operators (a) Show that (AB) B A dx φ ABψ dx (A φ) Bψ dx (B (A φ)) ψ dx (B A φ) ψ End (b) Show that AB [A, B]/2+{A, B}/2 where

More information

Linear algebra for MATH2601: Theory

Linear algebra for MATH2601: Theory Linear algebra for MATH2601: Theory László Erdős August 12, 2000 Contents 1 Introduction 4 1.1 List of crucial problems............................... 5 1.2 Importance of linear algebra............................

More information

Degree Master of Science in Mathematical Modelling and Scientific Computing Mathematical Methods I Thursday, 12th January 2012, 9:30 a.m.- 11:30 a.m.

Degree Master of Science in Mathematical Modelling and Scientific Computing Mathematical Methods I Thursday, 12th January 2012, 9:30 a.m.- 11:30 a.m. Degree Master of Science in Mathematical Modelling and Scientific Computing Mathematical Methods I Thursday, 12th January 2012, 9:30 a.m.- 11:30 a.m. Candidates should submit answers to a maximum of four

More information