Program Transformations in the POLCA Project

Size: px
Start display at page:

Download "Program Transformations in the POLCA Project"

Transcription

1 Program Transormations in the POLCA Project Jan Kuper 1, Lutz Schubert 2, Kilian Kemp 2, Colin Glass 3, Daniel Rubio Bonilla 3, and Manuel Carro 4 1 University o Twente, Enschede, The Netherlands 2 Ulm University, Ulm, Germany 3 High Perormance Computing Center, Stuttgart, Germany 4 Imdea Sotware Institute, Madrid, Spain Abstract The POLCA project develops annotations on ragments o imperative code to guide program transormations or better utilization o resources. These annotations express the computational essence o the code ragments without reerring to memory usage or execution time. That makes the annotations mathematical in nature such that provably correct transormations can be applied to them and the corresponding code ragment can be transormed accordingly or more optimal resource usage, or example on a multi-core platorm or on an FPGA. Keywords: Program transormations, code partitioning, ormal methods, optimization. I. INTRODUCTION It is widely recognized that parallelism o applications plays an increasingly important role or application developers. However, writing an eicient parallel program is diicult and converting an exitsing iterative program into a parallelised version is is not as straight-orward as in particular the processor manuacturers would have us believe. In act, it is easy to write code which perormance declines once parallelised. The key actor that hampers perormance is thereby the data dependency between parallel threads: concurrent access to memory, in particular read-write dependencies, not only eectively serialises the code again, but also easily leads to lower perormance because o increasing data access times. Much eort is being invested into automating the parallelisation o code and into providing libraries and language extensions to support that. Yet, hardly any o them take the pattern o an algorithm into consideration, a pattern is rather seen as a sotware engineering recommendation than as a characterization o the code itsel. The POLCA project considers the repetitive pattern o an algorithm as a key concept or parallelisation and or improving perormance. This is o particular importance in the areas o High Perormance Computing (HPC) and Embedded Systems, where most applications eectively perorm strongly repetitive tasks on huge data sets or on massive streaming data. In this paper we use the term repetition structure or the regularity with which (a part o) an algorithm is executed multiple times over dierent sets o data. Such repetition structures may thereby take dierent orms, rom iterating over an array, to complex mathematical equations per (sub)set o data. Corresponding author: j.kuper@utwente.nl Repetition structures act over time and space, speciically (a) the data space over which the algorithm acts and (b) its iterations and processing over (simulated and actual) time. Typical examples are escience applications such as luid dynamics, where the algorithm acts over the 3-dimensional space o the luids and objects (expressed as data structures in memory) and the time or processing each iteration on the one hand and or simulating the low over time (ourth dimension) on the other hand. When the repetition structure is known, expert HPC sotware developers can try parallelising the algorithm by breaking up the dependencies and typically distributing the space-time dimension o the algorithm over the dierent processors in a ashion that the dependencies are minimised. Within this paper we will show that the repetition structure can not only explicitly expressed to make it visible or developers, but also that it can be exploited or applying transormation patterns that convert repetition structures into dierent parallel versions with dierent perormance. We exploit this act in the POLCA project to automate not only parallelisation, but also to exploit inrastructure heterogeneity, e.g. by adapting the code to vector platorms, exploiting intrinsics o GPUs or even FPGAs. In the project we develop a method that uses such inormation to partition an algorithm and express that in a datalow graph such that a good mapping can be ound on a given hardware platorm. This paper will explain the underlying mathematical basis, i.e. the repetition structures and how appropriate transormations can be identiied and applied. Related work.: In the POLCA project the mathematical characterization and their transormations o repetition structures in algorithms is investigated to act as annotations on programming ragments in existing code, in order to analyse possibilities or partitioning the code and to distribute it over various platorms. The mathematics will thereby serve as a basis or the analysis o the costs o the dierent distributions. This approach is rooted in a long tradition o mathematical approaches towards program speciication and program development, and goes back to languages such as Iverson s APL (see [Ive62]). Notations used in this classic were later also used in Squiggol, as developed by Bird and Meertens (see [Mee86], [BdM97]), with the bi-annual conerence series Mathematics o Program Construction, started in 1989, as a major platorm. Closely related to a mathematical approach are design methods based on datalow graphs such as the Teralux project

2 ([Gio14, GS15]). The annotations exploited in the POLCA project can indeed be seen as ormal characterizations o data dependencies, but the ocus o the POLCA project is on code transormations based on the (provable) equivalence o dierent variants o an annotation. OpenMP and FORTRAN compilers exploit similar inormation, in particular loop iterations over arrays to break up the code into parallel segments. However, typically these approaches rely on intrinsic concurrency o the inner loop segment, i.e. that the iterations show no data dependencies across iterations, or at best highly controllable one. We deviate rom these approaches in our strong ocus on the structure that is expressed by various higher order unctions (see Figure 1), and by varying on the notation o those structures such that the transormations and the proos o their correctness become more algebraic. Acknowledgment: The work presented here was partially unded by the European Commission under FP7-ICT , grant agreement II. REPETITION STRUCTURES In this section we will elaborate some core repetition structures (time and space iterations) that orm the basis o many computationally intensive problems, i.e., that require perormance through exploitation o the platorm and parallelism. For the purpose o explanation, we will restrict ourselves to one-dimensional structures, several o which are given in Figure 1. In the irst column the name o the structure is given, in the second column its graphical representation, and in the third column the notation in terms o the unctional programming language Haskell 1. Below we will also introduce a more mathematical notation or some repetition structures which gives the possibility to prove the correctness o transormations by algebraic reasoning. As can be seen rom the graphical representation o these repetition structures, some o them can be executed in parallel. This notably holds or map and zipwith, whose results consist o lists o values zs. Other structures, such as oldl, are accumulative in nature, and contain data dependencies, though depending on the platorm, the individual unctional applications still may be executed at the same time. The accumulative structures in Figure 1 all have a starting value a, and an end value w, and sometimes a sequence o intermediate values zs. Finally, the argument n o itn (or iterate) indicates how oten the unction has to be repeated. The iteration structures presented in Figure 1 are higher order unctions in a unctional language, most o them being standard predeined unctions in, e.g., Haskell. A novel aspect o the POLCA project is that, unlike the standard view in a unctional programming language, these higher order 1 We ollow the Haskell convention and separate the arguments o a unction by spaces rather than by commas, and we (usually) will not surround arguments by brackets. Some urther remarks on notations standard in Haskell parlance: we use xs, ys, etc., rather than x, y, or vectors and lists, where xs indicates the plural o x. Likewise, xss denotes a sequence o sequences o values. The operation : denotes the cons operation, i.e., the extension o a given list with an element in ront, denotes concatenation o two lists, [ ] stands or the empty list. unctions are not considered as recursively deined unctions, but rather as denoting computational structures, as shown in Figure 1, and which can be manipulated and transormed by mathematical means. Note also that the repetition structures in Figure 1 may be seen as hardware architectures which makes it possible to translate the structures directly into hardware, or example on an FPGA (see [Baa15]). Though the graphical representation o the various structures should be clear in itsel, we nevertheless give a small example o every structure to illustrate its usage. In the examples below we use the ollowing deinitions: x = 2x1 g a x = (ax, ax) The ollowing examples should explain the meaning o the higher order unctions above: itn 2 5 = 95 itnscanl 2 5 = [2, 5, 11, 23, 47, 95] map [1, 2, 3, 4, 5] = [3, 5, 7, 9, 11] zipwith () [1, 2, 3] [1, 2, 3] = [2, 4, 6] oldl () [1, 2, 3, 4, 5] = 15 scanl () [1, 2, 3, 4, 5] = [, 1, 3, 6, 1, 15] mapaccuml g [1, 2, 3, 4, 5] = (15, [1, 3, 6, 1, 15]) We illustrate the usage o some o the above structures by the dot product o two (equally long) vectors u and v, deined as ollows: n 1 u v = u i v i i= That is, the elements in the vectors u and v are irst multiplied element-wise, and then added. Figure 2 shows how a combination o zipwith and oldl may deine the dot product, expressed as (using us, vs instead o u, v): us vs = oldl () (zipwith us vs) We introduce the ollowing mathematical notation or the two higher order unctions involved here: oldl () a xs : a xs zipwith () xs ys : xs ys These operations are deined as ollows: a [ ] = a a (x:xs) = (ax) xs [ ] [ ] = [ ] (x:xs) (y:ys) = (xy) : (xs ys) In this notation, the deinition o the dot product is: us vs = (us vs)

3 Name Structure Haskell Imperative Code itn a w w = itn a n w = a; or (i = ; i < n; i) w = (w); x x1 x2 x3 x4 map zs = map xs or (i = ; i < n; i) zs[i] = (xs[i]); z z1 z2 z3 z4 zipwith x y x1 y1 x2 y2 x3 y3 x4 y4 zs = zipwith () xs ys or (i = ; i < n; i) zs[i] = xs[i] * ys[i]; z z1 z2 z3 z4 oldl a x x1 x2 x3 x4 w w = oldl () a xs w = a; or (i = ; i < n; i) w = w xs[i]; scanl a x x1 x2 x3 z z1 z2 z3 x4 z4 z5 zs = scanl () a xs zs[] = a; or (i = ; i < n; i) zs[i1] = zs[i] xs[i]; mapaccuml x x1 x2 x3 x4 a w (w, zs) = mapaccuml a xs w = a; or (i = ; i < n; i) (w,zs[i]) = (w,xs[i]); z z1 z2 z3 z4 Figure 1. Some repetition structures u v u 1 u 2 u 3 u v Figure 2. Composition o structures: dot product u 4 III. TRANSFORMATION RULES In this Section we discuss some transormation rules to manipulate the structure o an algorithm, as indicated by higher order unctions which are given as annotations to ragments o imperative code o which they give the computational structure. The transormations on the annotations are mathematical in nature, hence provably correct, and are mirrored by corresponding transormations on the imperative code which by themselves would be very hard to ind. The intention o such transormations is to ind a better distribution over the available hardware and exploit the speciic characteristics o the hardware better, such that the perormance o an algorithm may be improved, as supported by cost models. Here we mention just two types o transormations: Structural transormations ocus on rules or higher order unctions and change the global structure o an algorithm without changing the algebraic ormula that is computed. These rules aim at redistributing an algorithm over space and/or time. Algebraic transormations change the algebraic operations that are present in an algorithm and may inluence the number o algebraic operations, such as additions and multiplications, that are needed. In this paper we limit ourselves to the irst group o transormations and their eect on an imperative algorithm, and illustrate how a correctness proo o a transormation rule looks like. We choose a simple example to discuss the transormation rules: the summation o a sequence o numbers o which we give a ew equivalent ormulations exploiting transormation laws. The basic algorithm is the sequential addition o all the values in vs, as shown as the irst structure in Figure 3, and which is expressed by the unction oldl in Figure 1, where also a corresponding imperative program is given. The variants A, B, C can all be derived by ormal transormations, which we will give below. In order to ormulate these transormations, we will assume a unction s m which splits a list vs o length n into k consecutive sublists o length m (or simplicity we assume that n is divisible by m). For example: s 3 [1, 2, 3, 4, 5, 6] = [[1, 2, 3], [4, 5, 6]] Hence, i vss is deined as s m vs, we have that concat vss = vs. a) Variant A: This variant splits the total list in subsequences o length m by the unction s m. Then all values in the irst subsequence are added, ater which the result o that is used as the starting value or the addition o the second

4 Basic structure: v total Variant A: v total Variant B: v Variant C: total v 1 total Figure 3. Structures or the summation o a row o numbers subsequence, etcetera, see Figure 3. This variant may be useul when the total sequence is too long to it on, e.g., an FPGA. With this transormation it may be cut in pieces where the same combinational circuit is re-used. Here we will ignore the act that in such a case some memory elements should be put in between. In order to derive the speciication o this structure, consider one box as a single operation with a starting value on the let, and a sequence xs rom above, leading to a result y at the right. This value y then is the starting value o the next subsequence. According to Figure 1, the operation on a subsequence is the operation. Thus, the operation has to be repeatedly applied to the sequence o subsequences, starting with. In other words, this again is the oldl structure, but now not over a sequence o numbers, but over a sequence o sequences o numbers. Hence, Haskell-like ormulation the speciication o this partitioning is total = oldl (oldl ()) vss whereas in mathematical notation it is total = vss The advantage o the mathematical ormulation is that the proo o the correctness o this transormation is a straightorward algebraic reasoning. We have to prove: (s m vs) = vs (1) We need one lemma: Lemma 1. a (xs ys) = (a xs) ys Proo. By induction on the list xs: a ([ ] ys) = (a [ ]) ys a ((x:xs) ys) = a (x : (xs ys)) de = (a x) (xs ys) IH = ((a x) xs) ys de = (a (x:xs)) ys Below, the notation xss stands or a sequence o (sub)sequences and concat xss is the concantenation o all subsequences in xss. We prove the ollowing theorem: Theorem 2. a xss = a (concat xss). Proo. By induction on the list xss: a [ ] de = a de = a [ ] = a (concat [ ]) a (xs : xss) = (a xs) xss IH = (a xs) (concat xss) L1 = a (xs concat xss) = a (concat (xs : xss)) Now equation (1) ollows immediately, since concat (s m xs) = xs. b) Variant B: In variant B all values within subsequences are added independently, and then the results are added. Note that or this variant the acts that the operation is associative and that is the unit element o are used. In Haskell ormat the speciication o variant B is ( pts stands or partial totals ): total = oldl () pts where pts = map (oldl () ) vss In mathematical ormat this is expressed as: total = ( vss) Now equation (2) can be proven by the same algebraic reasoning as with Variant A: ( (s m vs)) = vs (2)

5 c) Variant C: The elements in the subsequences are added element-wise in parallel, starting with a sequence o zeroes o adequate length, and add the results. Here, is assumed to be associative and commutative, and is the unit element o. Let zs be the equence o m zeroes needed or the vector o start values or the additions, then this partitioning can be deined in a Haskell-style ormalism as ollows: total = oldl () pts where pts = oldl (zipwith ()) zs vss In a mathematical ormalism the deinition now is be: total = (zs vss) As beore the proo o the relevant equation is by algebraic reasoning: (zs (s m vs)) = vs (3) d) Imperative code.: Figure 4 shows the imperative code that corresponds to the variants A, B, C mentioned above. We remark that the imperative code is (apart rom some cosmetic renamings o variables) generated automatically based on the transormations on the annotations. The automatic code generation is not yet ully developed, as or example can be seen rom the redundant assignment pts=zs in the code or Variant C. However, the power o being guided by the annotations in this code generation is that the annotations are ormulated purely in terms o data dependencies only, and thus memory dependencies, which make traditional code transormations next to impossible, are not a relevant notion. IV. FURTHER REMARKS, FUTURE WORK In the previous sections we sketched the basic idea o the POLCA project: to annotate ragments o imperative code by its essential computational structure which then may guide code transormations or better perormance on alternative platorms, supported by provably correct ormal transormations o the annotations. In addition to the initial linear examples discussed in the previous sections, the POLCA project works on more complex structures, such as underlying vector products, matrix products, image iltering, signal processing, image processing, etc. Also transormations o combinations o various structures are being investigated. We conclude this paper with a short illustration o a somewhat more involved case: the already mentioned dot product o two vectors (see Figure 2). In Figure 5 the partitionings are shown graphically, whereas in Figure 6 the corresponding annotations with the automatically generated imperative code is given, where is deined as ollows: a (u, v) = a u v The unction zip turns the two lists us and vs into one list o 2-tuples (u i, v i ). We conclude with the mathematical orm or this version o the dot product: Variant A or (i = ; i < k; i) { or (j = ; j < m; j) { vss[i][j] = vs[i * m j]; total = ; or (i = ; i < k; i) { or (j = ; j < m; j) { total = total vss[i][j]; Variant B or (i = ; i < k; i) { or (j = ; j < m; j) { vss[i][j] = vs[i * m j]; or (i = ; i < k; i) { pts[i] = ; or (j = ; j < m; j) { pts[i] = pts[i] vss[i][j]; total = ; or (i = ; i < k; i) { total = total pts[i]; Variant C or (i = ; i < m; i) { zs[i] = ; or (i = ; i < k; i) { or (j = ; j < m; j) { vss[i][j] = vs[i * m j]; pts = zs; or (i = ; i < k; i) { or (j = ; j < m; j) { pts[j] = pts[j] vss[i][j]; total = ; or (i = ; i < k; i) { total = total pts[i]; Figure 4. Imperative code or variants A, B, C dotpr = (zip us vs).

6 u v u 1 u 2 u 3 u 4 u 5 u v u v u 1 u 2 u 3 u 4 u 5 [Mee86] Lambert Meertens. Algorithmics towards programming as a mathematical activity. In J.W. de Bakker, M. Hazewinkel, and J.K. Lenstra, editors, Mathematics and Computer Science, volume 1 o CWI Monographs, pages North-Holland Publishing Company, u v Figure 5. Two partitioning variants or the dot product dotpr = oldl () (zipwith () us vs) or (i = ; i < n; i) { ws[i] = us[i] * vs[i]; dotpr = ; or (i = ; i < n; i) { dotpr = dotpr ws[i]; dotpr = oldl ( ) (zip us vs) dotpr = ; or (i = ; i < n; i) { dotpr = dotpr us[i] * vs[i]; Figure 6. Imperative code or the two dot products As has been shown by this paper this orm annotation and transormation allows to easily exploit the behavioural patterns o algorithms without having to express them in a complicated ashion and beyond simple inormation such as loopindependent or similar. With the kind o annotation that is close to the actual intention o the algorithm, we can easily generate a set o dierent types o provably identical code with dierent properties and degrees o parallelism. REFERENCES [Baa15] Christiaan P.R. Baaij. Digital Circuits in CλaSH Functional Speciications and Type Directed Synthesis. PhD thesis, University o Twente, The Netherlands, 215. [BdM97] Richard Bird and Oege de Moor. Algebra o Programming. Prentice Hall, [Gio14] Roberto Giorgi, et al. TERAFLUX: Harnessing datalow in next generation teradevices. Micronprocessors and Microsystems, 38:976 99, 214. [GS15] R. Giorgi and A. Scionti. A scalable thread scheduling co-processor based on data-low principles. Future Generation Computer Systems, 53:1 18, 215. [Ive62] Kenneth E. Iverson. A Programming Language. John Wiley and Sons, 1962.

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points Roberto s Notes on Dierential Calculus Chapter 8: Graphical analysis Section 1 Extreme points What you need to know already: How to solve basic algebraic and trigonometric equations. All basic techniques

More information

Driving Point Impedance Computation Applying Parallel Processing Techniques

Driving Point Impedance Computation Applying Parallel Processing Techniques 7th WSEAS Int. Con. on MATHEMATICAL METHODS and COMPUTATIONAL TECHNIQUES IN ELECTRICAL ENGINEERING, Soia, 27-29/10/05 (pp229-234) Driving Point Impedance Computation Applying Parallel Processing Techniques

More information

( x) f = where P and Q are polynomials.

( x) f = where P and Q are polynomials. 9.8 Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm ( ) ( ) ( ) P where P and Q are polynomials. Q An eample o a simple rational

More information

Simpler Functions for Decompositions

Simpler Functions for Decompositions Simpler Functions or Decompositions Bernd Steinbach Freiberg University o Mining and Technology, Institute o Computer Science, D-09596 Freiberg, Germany Abstract. This paper deals with the synthesis o

More information

The Deutsch-Jozsa Problem: De-quantization and entanglement

The Deutsch-Jozsa Problem: De-quantization and entanglement The Deutsch-Jozsa Problem: De-quantization and entanglement Alastair A. Abbott Department o Computer Science University o Auckland, New Zealand May 31, 009 Abstract The Deustch-Jozsa problem is one o the

More information

On High-Rate Cryptographic Compression Functions

On High-Rate Cryptographic Compression Functions On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48

More information

CHOW S LEMMA. Matthew Emerton

CHOW S LEMMA. Matthew Emerton CHOW LEMMA Matthew Emerton The aim o this note is to prove the ollowing orm o Chow s Lemma: uppose that : is a separated inite type morphism o Noetherian schemes. Then (or some suiciently large n) there

More information

Basic properties of limits

Basic properties of limits Roberto s Notes on Dierential Calculus Chapter : Limits and continuity Section Basic properties o its What you need to know already: The basic concepts, notation and terminology related to its. What you

More information

CS 361 Meeting 28 11/14/18

CS 361 Meeting 28 11/14/18 CS 361 Meeting 28 11/14/18 Announcements 1. Homework 9 due Friday Computation Histories 1. Some very interesting proos o undecidability rely on the technique o constructing a language that describes the

More information

GF(4) Based Synthesis of Quaternary Reversible/Quantum Logic Circuits

GF(4) Based Synthesis of Quaternary Reversible/Quantum Logic Circuits GF(4) ased Synthesis o Quaternary Reversible/Quantum Logic Circuits MOZAMMEL H. A. KHAN AND MAREK A. PERKOWSKI Department o Computer Science and Engineering, East West University 4 Mohakhali, Dhaka, ANGLADESH,

More information

Objectives. By the time the student is finished with this section of the workbook, he/she should be able

Objectives. By the time the student is finished with this section of the workbook, he/she should be able FUNCTIONS Quadratic Functions......8 Absolute Value Functions.....48 Translations o Functions..57 Radical Functions...61 Eponential Functions...7 Logarithmic Functions......8 Cubic Functions......91 Piece-Wise

More information

2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction

2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction . ETA EVALUATIONS USING WEBER FUNCTIONS Introduction So ar we have seen some o the methods or providing eta evaluations that appear in the literature and we have seen some o the interesting properties

More information

Improvement of Sparse Computation Application in Power System Short Circuit Study

Improvement of Sparse Computation Application in Power System Short Circuit Study Volume 44, Number 1, 2003 3 Improvement o Sparse Computation Application in Power System Short Circuit Study A. MEGA *, M. BELKACEMI * and J.M. KAUFFMANN ** * Research Laboratory LEB, L2ES Department o

More information

Supplementary material for Continuous-action planning for discounted infinite-horizon nonlinear optimal control with Lipschitz values

Supplementary material for Continuous-action planning for discounted infinite-horizon nonlinear optimal control with Lipschitz values Supplementary material or Continuous-action planning or discounted ininite-horizon nonlinear optimal control with Lipschitz values List o main notations x, X, u, U state, state space, action, action space,

More information

Educational Procedure for Designing and Teaching Reflector Antennas in Electrical Engineering Programs. Abstract. Introduction

Educational Procedure for Designing and Teaching Reflector Antennas in Electrical Engineering Programs. Abstract. Introduction Educational Procedure or Designing and Teaching Relector Antennas in Electrical Engineering Programs Marco A.B. Terada Klipsch School o Electrical and Computer Engineering New Mexico State University Las

More information

Function Operations. I. Ever since basic math, you have been combining numbers by using addition, subtraction, multiplication, and division.

Function Operations. I. Ever since basic math, you have been combining numbers by using addition, subtraction, multiplication, and division. Function Operations I. Ever since basic math, you have been combining numbers by using addition, subtraction, multiplication, and division. Add: 5 + Subtract: 7 Multiply: (9)(0) Divide: (5) () or 5 II.

More information

Maximum Flow. Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai

Maximum Flow. Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai Maximum Flow Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai Flow Network A low network G ( V, E) is a directed graph with a source node sv, a sink node tv, a capacity unction c. Each edge ( u,

More information

CHAPTER 1: INTRODUCTION. 1.1 Inverse Theory: What It Is and What It Does

CHAPTER 1: INTRODUCTION. 1.1 Inverse Theory: What It Is and What It Does Geosciences 567: CHAPTER (RR/GZ) CHAPTER : INTRODUCTION Inverse Theory: What It Is and What It Does Inverse theory, at least as I choose to deine it, is the ine art o estimating model parameters rom data

More information

Curve Sketching. The process of curve sketching can be performed in the following steps:

Curve Sketching. The process of curve sketching can be performed in the following steps: Curve Sketching So ar you have learned how to ind st and nd derivatives o unctions and use these derivatives to determine where a unction is:. Increasing/decreasing. Relative extrema 3. Concavity 4. Points

More information

9.1 The Square Root Function

9.1 The Square Root Function Section 9.1 The Square Root Function 869 9.1 The Square Root Function In this section we turn our attention to the square root unction, the unction deined b the equation () =. (1) We begin the section

More information

The concept of limit

The concept of limit Roberto s Notes on Dierential Calculus Chapter 1: Limits and continuity Section 1 The concept o limit What you need to know already: All basic concepts about unctions. What you can learn here: What limits

More information

Circuit Complexity / Counting Problems

Circuit Complexity / Counting Problems Lecture 5 Circuit Complexity / Counting Problems April 2, 24 Lecturer: Paul eame Notes: William Pentney 5. Circuit Complexity and Uniorm Complexity We will conclude our look at the basic relationship between

More information

Products and Convolutions of Gaussian Probability Density Functions

Products and Convolutions of Gaussian Probability Density Functions Tina Memo No. 003-003 Internal Report Products and Convolutions o Gaussian Probability Density Functions P.A. Bromiley Last updated / 9 / 03 Imaging Science and Biomedical Engineering Division, Medical

More information

STAT 801: Mathematical Statistics. Hypothesis Testing

STAT 801: Mathematical Statistics. Hypothesis Testing STAT 801: Mathematical Statistics Hypothesis Testing Hypothesis testing: a statistical problem where you must choose, on the basis o data X, between two alternatives. We ormalize this as the problem o

More information

RATIONAL FUNCTIONS. Finding Asymptotes..347 The Domain Finding Intercepts Graphing Rational Functions

RATIONAL FUNCTIONS. Finding Asymptotes..347 The Domain Finding Intercepts Graphing Rational Functions RATIONAL FUNCTIONS Finding Asymptotes..347 The Domain....350 Finding Intercepts.....35 Graphing Rational Functions... 35 345 Objectives The ollowing is a list o objectives or this section o the workbook.

More information

Math 248B. Base change morphisms

Math 248B. Base change morphisms Math 248B. Base change morphisms 1. Motivation A basic operation with shea cohomology is pullback. For a continuous map o topological spaces : X X and an abelian shea F on X with (topological) pullback

More information

(C) The rationals and the reals as linearly ordered sets. Contents. 1 The characterizing results

(C) The rationals and the reals as linearly ordered sets. Contents. 1 The characterizing results (C) The rationals and the reals as linearly ordered sets We know that both Q and R are something special. When we think about about either o these we usually view it as a ield, or at least some kind o

More information

NONLINEAR CONTROL OF POWER NETWORK MODELS USING FEEDBACK LINEARIZATION

NONLINEAR CONTROL OF POWER NETWORK MODELS USING FEEDBACK LINEARIZATION NONLINEAR CONTROL OF POWER NETWORK MODELS USING FEEDBACK LINEARIZATION Steven Ball Science Applications International Corporation Columbia, MD email: sball@nmtedu Steve Schaer Department o Mathematics

More information

Published in the American Economic Review Volume 102, Issue 1, February 2012, pages doi: /aer

Published in the American Economic Review Volume 102, Issue 1, February 2012, pages doi: /aer Published in the American Economic Review Volume 102, Issue 1, February 2012, pages 594-601. doi:10.1257/aer.102.1.594 CONTRACTS VS. SALARIES IN MATCHING FEDERICO ECHENIQUE Abstract. Firms and workers

More information

Fluctuationlessness Theorem and its Application to Boundary Value Problems of ODEs

Fluctuationlessness Theorem and its Application to Boundary Value Problems of ODEs Fluctuationlessness Theorem and its Application to Boundary Value Problems o ODEs NEJLA ALTAY İstanbul Technical University Inormatics Institute Maslak, 34469, İstanbul TÜRKİYE TURKEY) nejla@be.itu.edu.tr

More information

Finger Search in the Implicit Model

Finger Search in the Implicit Model Finger Search in the Implicit Model Gerth Stølting Brodal, Jesper Sindahl Nielsen, Jakob Truelsen MADALGO, Department o Computer Science, Aarhus University, Denmark. {gerth,jasn,jakobt}@madalgo.au.dk Abstract.

More information

Numerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods

Numerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods Numerical Methods - Lecture 1 Numerical Methods Lecture. Analysis o errors in numerical methods Numerical Methods - Lecture Why represent numbers in loating point ormat? Eample 1. How a number 56.78 can

More information

Physics 2B Chapter 17 Notes - First Law of Thermo Spring 2018

Physics 2B Chapter 17 Notes - First Law of Thermo Spring 2018 Internal Energy o a Gas Work Done by a Gas Special Processes The First Law o Thermodynamics p Diagrams The First Law o Thermodynamics is all about the energy o a gas: how much energy does the gas possess,

More information

Extreme Values of Functions

Extreme Values of Functions Extreme Values o Functions When we are using mathematics to model the physical world in which we live, we oten express observed physical quantities in terms o variables. Then, unctions are used to describe

More information

AH 2700A. Attenuator Pair Ratio for C vs Frequency. Option-E 50 Hz-20 khz Ultra-precision Capacitance/Loss Bridge

AH 2700A. Attenuator Pair Ratio for C vs Frequency. Option-E 50 Hz-20 khz Ultra-precision Capacitance/Loss Bridge 0 E ttenuator Pair Ratio or vs requency NEEN-ERLN 700 Option-E 0-0 k Ultra-precision apacitance/loss ridge ttenuator Ratio Pair Uncertainty o in ppm or ll Usable Pairs o Taps 0 0 0. 0. 0. 07/08/0 E E E

More information

SEPARATED AND PROPER MORPHISMS

SEPARATED AND PROPER MORPHISMS SEPARATED AND PROPER MORPHISMS BRIAN OSSERMAN The notions o separatedness and properness are the algebraic geometry analogues o the Hausdor condition and compactness in topology. For varieties over the

More information

A universal symmetry detection algorithm

A universal symmetry detection algorithm DOI 10.1186/s40064-015-1156-7 RESEARCH Open Access A universal symmetry detection algorithm Peter M Maurer * *Correspondence: Peter_Maurer@Baylor.edu Department o Computer Science, Baylor University, Waco,

More information

Section 1.2 Domain and Range

Section 1.2 Domain and Range Section 1. Domain and Range 1 Section 1. Domain and Range One o our main goals in mathematics is to model the real world with mathematical unctions. In doing so, it is important to keep in mind the limitations

More information

RESOLUTION MSC.362(92) (Adopted on 14 June 2013) REVISED RECOMMENDATION ON A STANDARD METHOD FOR EVALUATING CROSS-FLOODING ARRANGEMENTS

RESOLUTION MSC.362(92) (Adopted on 14 June 2013) REVISED RECOMMENDATION ON A STANDARD METHOD FOR EVALUATING CROSS-FLOODING ARRANGEMENTS (Adopted on 4 June 203) (Adopted on 4 June 203) ANNEX 8 (Adopted on 4 June 203) MSC 92/26/Add. Annex 8, page THE MARITIME SAFETY COMMITTEE, RECALLING Article 28(b) o the Convention on the International

More information

Least-Squares Spectral Analysis Theory Summary

Least-Squares Spectral Analysis Theory Summary Least-Squares Spectral Analysis Theory Summary Reerence: Mtamakaya, J. D. (2012). Assessment o Atmospheric Pressure Loading on the International GNSS REPRO1 Solutions Periodic Signatures. Ph.D. dissertation,

More information

Probabilistic Optimisation applied to Spacecraft Rendezvous on Keplerian Orbits

Probabilistic Optimisation applied to Spacecraft Rendezvous on Keplerian Orbits Probabilistic Optimisation applied to pacecrat Rendezvous on Keplerian Orbits Grégory aive a, Massimiliano Vasile b a Université de Liège, Faculté des ciences Appliquées, Belgium b Dipartimento di Ingegneria

More information

Finite Dimensional Hilbert Spaces are Complete for Dagger Compact Closed Categories (Extended Abstract)

Finite Dimensional Hilbert Spaces are Complete for Dagger Compact Closed Categories (Extended Abstract) Electronic Notes in Theoretical Computer Science 270 (1) (2011) 113 119 www.elsevier.com/locate/entcs Finite Dimensional Hilbert Spaces are Complete or Dagger Compact Closed Categories (Extended bstract)

More information

An Alternative Poincaré Section for Steady-State Responses and Bifurcations of a Duffing-Van der Pol Oscillator

An Alternative Poincaré Section for Steady-State Responses and Bifurcations of a Duffing-Van der Pol Oscillator An Alternative Poincaré Section or Steady-State Responses and Biurcations o a Duing-Van der Pol Oscillator Jang-Der Jeng, Yuan Kang *, Yeon-Pun Chang Department o Mechanical Engineering, National United

More information

Definition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series.

Definition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series. 2.4 Local properties o unctions o several variables In this section we will learn how to address three kinds o problems which are o great importance in the ield o applied mathematics: how to obtain the

More information

Categories and Natural Transformations

Categories and Natural Transformations Categories and Natural Transormations Ethan Jerzak 17 August 2007 1 Introduction The motivation or studying Category Theory is to ormalise the underlying similarities between a broad range o mathematical

More information

Mitsuru Matsui , Ofuna, Kamakura, Kanagawa, 247, Japan. which are block ciphers with a 128-bit key, a 64-bit block and a variable

Mitsuru Matsui , Ofuna, Kamakura, Kanagawa, 247, Japan. which are block ciphers with a 128-bit key, a 64-bit block and a variable New Block Encryption Algorithm MISTY Mitsuru Matsui Inormation Technology R&D Center Mitsubishi Electric Corporation 5-1-1, Ouna, Kamakura, Kanagawa, 247, Japan matsui@iss.isl.melco.co.jp Abstract. We

More information

OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION

OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION Xu Bei, Yeo Jun Yoon and Ali Abur Teas A&M University College Station, Teas, U.S.A. abur@ee.tamu.edu Abstract This paper presents

More information

The Impact of Carries on the Complexity of Collision Attacks on SHA-1

The Impact of Carries on the Complexity of Collision Attacks on SHA-1 The Impact o Carries on the Complexity o Collision Attacks on SHA-1 Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen Norbert.Pramstaller@iaik.tugraz.at Institute or Applied

More information

New Functions from Old Functions

New Functions from Old Functions .3 New Functions rom Old Functions In this section we start with the basic unctions we discussed in Section. and obtain new unctions b shiting, stretching, and relecting their graphs. We also show how

More information

Numerical Solution of Ordinary Differential Equations in Fluctuationlessness Theorem Perspective

Numerical Solution of Ordinary Differential Equations in Fluctuationlessness Theorem Perspective Numerical Solution o Ordinary Dierential Equations in Fluctuationlessness Theorem Perspective NEJLA ALTAY Bahçeşehir University Faculty o Arts and Sciences Beşiktaş, İstanbul TÜRKİYE TURKEY METİN DEMİRALP

More information

The Clifford algebra and the Chevalley map - a computational approach (detailed version 1 ) Darij Grinberg Version 0.6 (3 June 2016). Not proofread!

The Clifford algebra and the Chevalley map - a computational approach (detailed version 1 ) Darij Grinberg Version 0.6 (3 June 2016). Not proofread! The Cliord algebra and the Chevalley map - a computational approach detailed version 1 Darij Grinberg Version 0.6 3 June 2016. Not prooread! 1. Introduction: the Cliord algebra The theory o the Cliord

More information

A Consistent Generation of Pipeline Parallelism and Distribution of Operations and Data among Processors

A Consistent Generation of Pipeline Parallelism and Distribution of Operations and Data among Processors ISSN 0361-7688 Programming and Computer Sotware 006 Vol. 3 No. 3 pp. 166176. Pleiades Publishing Inc. 006. Original Russian Text E.V. Adutskevich N.A. Likhoded 006 published in Programmirovanie 006 Vol.

More information

Solving Multi-Mode Time-Cost-Quality Trade-off Problem in Uncertainty Condition Using a Novel Genetic Algorithm

Solving Multi-Mode Time-Cost-Quality Trade-off Problem in Uncertainty Condition Using a Novel Genetic Algorithm International Journal o Management and Fuzzy Systems 2017; 3(3): 32-40 http://www.sciencepublishinggroup.com/j/ijms doi: 10.11648/j.ijms.20170303.11 Solving Multi-Mode Time-Cost-Quality Trade-o Problem

More information

Differentiation. The main problem of differential calculus deals with finding the slope of the tangent line at a point on a curve.

Differentiation. The main problem of differential calculus deals with finding the slope of the tangent line at a point on a curve. Dierentiation The main problem o dierential calculus deals with inding the slope o the tangent line at a point on a curve. deinition() : The slope o a curve at a point p is the slope, i it eists, o the

More information

Scattered Data Approximation of Noisy Data via Iterated Moving Least Squares

Scattered Data Approximation of Noisy Data via Iterated Moving Least Squares Scattered Data Approximation o Noisy Data via Iterated Moving Least Squares Gregory E. Fasshauer and Jack G. Zhang Abstract. In this paper we ocus on two methods or multivariate approximation problems

More information

Math 216A. A gluing construction of Proj(S)

Math 216A. A gluing construction of Proj(S) Math 216A. A gluing construction o Proj(S) 1. Some basic deinitions Let S = n 0 S n be an N-graded ring (we ollows French terminology here, even though outside o France it is commonly accepted that N does

More information

APPENDIX 1 ERROR ESTIMATION

APPENDIX 1 ERROR ESTIMATION 1 APPENDIX 1 ERROR ESTIMATION Measurements are always subject to some uncertainties no matter how modern and expensive equipment is used or how careully the measurements are perormed These uncertainties

More information

Mathematical Notation Math Calculus & Analytic Geometry III

Mathematical Notation Math Calculus & Analytic Geometry III Mathematical Notation Math 221 - alculus & Analytic Geometry III Use Word or WordPerect to recreate the ollowing documents. Each article is worth 10 points and should be emailed to the instructor at james@richland.edu.

More information

Syllabus Objective: 2.9 The student will sketch the graph of a polynomial, radical, or rational function.

Syllabus Objective: 2.9 The student will sketch the graph of a polynomial, radical, or rational function. Precalculus Notes: Unit Polynomial Functions Syllabus Objective:.9 The student will sketch the graph o a polynomial, radical, or rational unction. Polynomial Function: a unction that can be written in

More information

8.4 Inverse Functions

8.4 Inverse Functions Section 8. Inverse Functions 803 8. Inverse Functions As we saw in the last section, in order to solve application problems involving eponential unctions, we will need to be able to solve eponential equations

More information

Special types of Riemann sums

Special types of Riemann sums Roberto s Notes on Subject Chapter 4: Deinite integrals and the FTC Section 3 Special types o Riemann sums What you need to know already: What a Riemann sum is. What you can learn here: The key types o

More information

Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions

Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions Better Than Advertised: Improved Collision-Resistance Guarantees or MD-Based Hash Functions Mihir Bellare University o Caliornia San Diego La Jolla, Caliornia mihir@eng.ucsd.edu Joseph Jaeger University

More information

Separations: Chromatography of M&M and Ink Dyes

Separations: Chromatography of M&M and Ink Dyes Separations: Chromatography o M&M and Ink Dyes Almost all substances we come into contact with on a daily basis are impure; that is, they are mixtures. Similarly, compounds synthesized in the chemical

More information

TESTING TIMED FINITE STATE MACHINES WITH GUARANTEED FAULT COVERAGE

TESTING TIMED FINITE STATE MACHINES WITH GUARANTEED FAULT COVERAGE TESTING TIMED FINITE STATE MACHINES WITH GUARANTEED FAULT COVERAGE Khaled El-Fakih 1, Nina Yevtushenko 2 *, Hacene Fouchal 3 1 American University o Sharjah, PO Box 26666, UAE kelakih@aus.edu 2 Tomsk State

More information

Complexity and Algorithms for Two-Stage Flexible Flowshop Scheduling with Availability Constraints

Complexity and Algorithms for Two-Stage Flexible Flowshop Scheduling with Availability Constraints Complexity and Algorithms or Two-Stage Flexible Flowshop Scheduling with Availability Constraints Jinxing Xie, Xijun Wang Department o Mathematical Sciences, Tsinghua University, Beijing 100084, China

More information

Today. Introduction to optimization Definition and motivation 1-dimensional methods. Multi-dimensional methods. General strategies, value-only methods

Today. Introduction to optimization Definition and motivation 1-dimensional methods. Multi-dimensional methods. General strategies, value-only methods Optimization Last time Root inding: deinition, motivation Algorithms: Bisection, alse position, secant, Newton-Raphson Convergence & tradeos Eample applications o Newton s method Root inding in > 1 dimension

More information

New method for two-point nonuniformity correction of microbolometer detectors

New method for two-point nonuniformity correction of microbolometer detectors 10 th International Conerence on Quantitative InraRed Thermography July 27-30, 2010, Québec (Canada) New method or two-point nonuniormity correction o microbolometer detectors by R. Olbrycht*, B. Wiecek*,

More information

. This is the Basic Chain Rule. x dt y dt z dt Chain Rule in this context.

. This is the Basic Chain Rule. x dt y dt z dt Chain Rule in this context. Math 18.0A Gradients, Chain Rule, Implicit Dierentiation, igher Order Derivatives These notes ocus on our things: (a) the application o gradients to ind normal vectors to curves suraces; (b) the generaliation

More information

( ) ( ) ( ) + ( ) Ä ( ) Langmuir Adsorption Isotherms. dt k : rates of ad/desorption, N : totally number of adsorption sites.

( ) ( ) ( ) + ( ) Ä ( ) Langmuir Adsorption Isotherms. dt k : rates of ad/desorption, N : totally number of adsorption sites. Langmuir Adsorption sotherms... 1 Summarizing Remarks... Langmuir Adsorption sotherms Assumptions: o Adsorp at most one monolayer o Surace is uniorm o No interaction between adsorbates All o these assumptions

More information

RELIABILITY OF BURIED PIPELINES WITH CORROSION DEFECTS UNDER VARYING BOUNDARY CONDITIONS

RELIABILITY OF BURIED PIPELINES WITH CORROSION DEFECTS UNDER VARYING BOUNDARY CONDITIONS REIABIITY OF BURIE PIPEIES WITH CORROSIO EFECTS UER VARYIG BOUARY COITIOS Ouk-Sub ee 1 and ong-hyeok Kim 1. School o Mechanical Engineering, InHa University #53, Yonghyun-ong, am-ku, Incheon, 40-751, Korea

More information

CATEGORIES. 1.1 Introduction

CATEGORIES. 1.1 Introduction 1 CATEGORIES 1.1 Introduction What is category theory? As a irst approximation, one could say that category theory is the mathematical study o (abstract) algebras o unctions. Just as group theory is the

More information

Open Access Dynamic Parameters Identification for the Feeding System of Commercial Numerical Control Machine

Open Access Dynamic Parameters Identification for the Feeding System of Commercial Numerical Control Machine Send Orders or Reprints to reprints@benthamscience.net The Open Automation and Control Systems Journal, 13, 5, 161-166 161 Open Access Dynamic Parameters Identiication or the Feeding System o Commercial

More information

CLASS NOTES MATH 527 (SPRING 2011) WEEK 6

CLASS NOTES MATH 527 (SPRING 2011) WEEK 6 CLASS NOTES MATH 527 (SPRING 2011) WEEK 6 BERTRAND GUILLOU 1. Mon, Feb. 21 Note that since we have C() = X A C (A) and the inclusion A C (A) at time 0 is a coibration, it ollows that the pushout map i

More information

In many diverse fields physical data is collected or analysed as Fourier components.

In many diverse fields physical data is collected or analysed as Fourier components. 1. Fourier Methods In many diverse ields physical data is collected or analysed as Fourier components. In this section we briely discuss the mathematics o Fourier series and Fourier transorms. 1. Fourier

More information

SEPARATED AND PROPER MORPHISMS

SEPARATED AND PROPER MORPHISMS SEPARATED AND PROPER MORPHISMS BRIAN OSSERMAN Last quarter, we introduced the closed diagonal condition or a prevariety to be a prevariety, and the universally closed condition or a variety to be complete.

More information

DETC A GENERALIZED MAX-MIN SAMPLE FOR RELIABILITY ASSESSMENT WITH DEPENDENT VARIABLES

DETC A GENERALIZED MAX-MIN SAMPLE FOR RELIABILITY ASSESSMENT WITH DEPENDENT VARIABLES Proceedings o the ASME International Design Engineering Technical Conerences & Computers and Inormation in Engineering Conerence IDETC/CIE August 7-,, Bualo, USA DETC- A GENERALIZED MAX-MIN SAMPLE FOR

More information

Persistent Data Sketching

Persistent Data Sketching Persistent Data Sketching Zhewei Wei School o Inormation, Renmin University o China Key Laboratory o Data Engineering and Knowledge Engineering, MOE zhewei@ruc.edu.cn Xiaoyong Du School o Inormation, Renmin

More information

Basic mathematics of economic models. 3. Maximization

Basic mathematics of economic models. 3. Maximization John Riley 1 January 16 Basic mathematics o economic models 3 Maimization 31 Single variable maimization 1 3 Multi variable maimization 6 33 Concave unctions 9 34 Maimization with non-negativity constraints

More information

Math Review and Lessons in Calculus

Math Review and Lessons in Calculus Math Review and Lessons in Calculus Agenda Rules o Eponents Functions Inverses Limits Calculus Rules o Eponents 0 Zero Eponent Rule a * b ab Product Rule * 3 5 a / b a-b Quotient Rule 5 / 3 -a / a Negative

More information

Chapter 8: Converter Transfer Functions

Chapter 8: Converter Transfer Functions Chapter 8. Converter Transer Functions 8.1. Review o Bode plots 8.1.1. Single pole response 8.1.2. Single zero response 8.1.3. Right hal-plane zero 8.1.4. Frequency inversion 8.1.5. Combinations 8.1.6.

More information

On the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs

On the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs On the Girth o (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs Sudarsan V S Ranganathan, Dariush Divsalar and Richard D Wesel Department o Electrical Engineering, University o Caliornia, Los

More information

CORRESPONDENCE ANALYSIS

CORRESPONDENCE ANALYSIS CORRESPONDENCE ANALYSIS INTUITIVE THEORETICAL PRESENTATION BASIC RATIONALE DATA PREPARATION INITIAL TRANSFORAMATION OF THE INPUT MATRIX INTO PROFILES DEFINITION OF GEOMETRIC CONCEPTS (MASS, DISTANCE AND

More information

Feasibility of a Multi-Pass Thomson Scattering System with Confocal Spherical Mirrors

Feasibility of a Multi-Pass Thomson Scattering System with Confocal Spherical Mirrors Plasma and Fusion Research: Letters Volume 5, 044 200) Feasibility o a Multi-Pass Thomson Scattering System with Conocal Spherical Mirrors Junichi HIRATSUKA, Akira EJIRI, Yuichi TAKASE and Takashi YAMAGUCHI

More information

A Brief Survey on Semi-supervised Learning with Graph Regularization

A Brief Survey on Semi-supervised Learning with Graph Regularization 000 00 002 003 004 005 006 007 008 009 00 0 02 03 04 05 06 07 08 09 020 02 022 023 024 025 026 027 028 029 030 03 032 033 034 035 036 037 038 039 040 04 042 043 044 045 046 047 048 049 050 05 052 053 A

More information

0,0 B 5,0 C 0, 4 3,5. y x. Recitation Worksheet 1A. 1. Plot these points in the xy plane: A

0,0 B 5,0 C 0, 4 3,5. y x. Recitation Worksheet 1A. 1. Plot these points in the xy plane: A Math 13 Recitation Worksheet 1A 1 Plot these points in the y plane: A 0,0 B 5,0 C 0, 4 D 3,5 Without using a calculator, sketch a graph o each o these in the y plane: A y B 3 Consider the unction a Evaluate

More information

Parallel Numerics. Scope: Revise standard numerical methods considering parallel computations!

Parallel Numerics. Scope: Revise standard numerical methods considering parallel computations! Parallel Numerics Scope: Revise standard numerical methods considering parallel computations! Required knowledge: Numerics Parallel Programming Graphs Literature: Dongarra, Du, Sorensen, van der Vorst:

More information

Solving Continuous Linear Least-Squares Problems by Iterated Projection

Solving Continuous Linear Least-Squares Problems by Iterated Projection Solving Continuous Linear Least-Squares Problems by Iterated Projection by Ral Juengling Department o Computer Science, Portland State University PO Box 75 Portland, OR 977 USA Email: juenglin@cs.pdx.edu

More information

Lab on Taylor Polynomials. This Lab is accompanied by an Answer Sheet that you are to complete and turn in to your instructor.

Lab on Taylor Polynomials. This Lab is accompanied by an Answer Sheet that you are to complete and turn in to your instructor. Lab on Taylor Polynomials This Lab is accompanied by an Answer Sheet that you are to complete and turn in to your instructor. In this Lab we will approimate complicated unctions by simple unctions. The

More information

The achievable limits of operational modal analysis. * Siu-Kui Au 1)

The achievable limits of operational modal analysis. * Siu-Kui Au 1) The achievable limits o operational modal analysis * Siu-Kui Au 1) 1) Center or Engineering Dynamics and Institute or Risk and Uncertainty, University o Liverpool, Liverpool L69 3GH, United Kingdom 1)

More information

Proceedings Bidirectional Named Sets as Structural Models of Interpersonal Communication

Proceedings Bidirectional Named Sets as Structural Models of Interpersonal Communication Proceedings Bidirectional Named Sets as Structural Models o Interpersonal Communication Mark Burgin Department o Computer Science, University o Caliornia, Los Angeles, 520 Portola Plaza, Los Angeles, CA

More information

8. INTRODUCTION TO STATISTICAL THERMODYNAMICS

8. INTRODUCTION TO STATISTICAL THERMODYNAMICS n * D n d Fluid z z z FIGURE 8-1. A SYSTEM IS IN EQUILIBRIUM EVEN IF THERE ARE VARIATIONS IN THE NUMBER OF MOLECULES IN A SMALL VOLUME, SO LONG AS THE PROPERTIES ARE UNIFORM ON A MACROSCOPIC SCALE 8. INTRODUCTION

More information

Accuracy of free-energy perturbation calculations in molecular simulation. I. Modeling

Accuracy of free-energy perturbation calculations in molecular simulation. I. Modeling JOURNAL OF CHEMICAL PHYSICS VOLUME 114, NUMBER 17 1 MAY 2001 ARTICLES Accuracy o ree-energy perturbation calculations in molecular simulation. I. Modeling Nandou Lu and David A. Koke a) Department o Chemical

More information

Analysis Scheme in the Ensemble Kalman Filter

Analysis Scheme in the Ensemble Kalman Filter JUNE 1998 BURGERS ET AL. 1719 Analysis Scheme in the Ensemble Kalman Filter GERRIT BURGERS Royal Netherlands Meteorological Institute, De Bilt, the Netherlands PETER JAN VAN LEEUWEN Institute or Marine

More information

Robust Residual Selection for Fault Detection

Robust Residual Selection for Fault Detection Robust Residual Selection or Fault Detection Hamed Khorasgani*, Daniel E Jung**, Gautam Biswas*, Erik Frisk**, and Mattias Krysander** Abstract A number o residual generation methods have been developed

More information

Lecture 8 Optimization

Lecture 8 Optimization 4/9/015 Lecture 8 Optimization EE 4386/5301 Computational Methods in EE Spring 015 Optimization 1 Outline Introduction 1D Optimization Parabolic interpolation Golden section search Newton s method Multidimensional

More information

A NOTE ON HENSEL S LEMMA IN SEVERAL VARIABLES

A NOTE ON HENSEL S LEMMA IN SEVERAL VARIABLES PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 125, Number 11, November 1997, Pages 3185 3189 S 0002-9939(97)04112-9 A NOTE ON HENSEL S LEMMA IN SEVERAL VARIABLES BENJI FISHER (Communicated by

More information

OBSERVER/KALMAN AND SUBSPACE IDENTIFICATION OF THE UBC BENCHMARK STRUCTURAL MODEL

OBSERVER/KALMAN AND SUBSPACE IDENTIFICATION OF THE UBC BENCHMARK STRUCTURAL MODEL OBSERVER/KALMAN AND SUBSPACE IDENTIFICATION OF THE UBC BENCHMARK STRUCTURAL MODEL Dionisio Bernal, Burcu Gunes Associate Proessor, Graduate Student Department o Civil and Environmental Engineering, 7 Snell

More information

18-660: Numerical Methods for Engineering Design and Optimization

18-660: Numerical Methods for Engineering Design and Optimization 8-66: Numerical Methods or Engineering Design and Optimization Xin Li Department o ECE Carnegie Mellon University Pittsburgh, PA 53 Slide Overview Linear Regression Ordinary least-squares regression Minima

More information

LECTURE 6: FIBER BUNDLES

LECTURE 6: FIBER BUNDLES LECTURE 6: FIBER BUNDLES In this section we will introduce the interesting class o ibrations given by iber bundles. Fiber bundles lay an imortant role in many geometric contexts. For examle, the Grassmaniann

More information

ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS

ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS I. Thirunavukkarasu 1, V. I. George 1, G. Saravana Kumar 1 and A. Ramakalyan 2 1 Department o Instrumentation

More information