Optimal Consecutive-$ $i$ $k$ $/i$ $-out-of-$ $i$ $(2k+1)$ $/i$ $: $ $i$ $G$ $/i$ $ Cycle. Technical Report
|
|
- Chastity Dorsey
- 6 years ago
- Views:
Transcription
1 Optimal Consecutive-$ $i$ $k$ $/i$ $-out-of-$ $i$ $2k1)$ $/i$ $: $ $i$ $G$ $/i$ $ Cycle Technical Report Department of Computer Science and Engineering University of Minnesota EECS Building 2 Union Street SE Minneapolis, MN USA TR -49 Optimal Consecutive-$ $i$ $k$ $/i$ $-out-of-$ $i$ $2k1)$ $/i$ $: $ $i$ $G$ $/i$ $ Cycle Ding-zhu Du, Frank K. Hwang, unjae Jung, and Hung Q. Ngo October 2, 2
2
3 Optimal Consecutiv e-k-out-of-2k 1): G Cycle Ding-Zhu Du z Frank K. Hwang y unjae Jung z Hung Q. Ngo z May 2, 2 Abstract We present a complete proof for the invariant optimal assignment for consecutive-kout-of-2k1): G cycle, which was proposed by Zuo and Kao in 199 with an incomplete proof, pointed out recently by Jalali, Hawkes, Cui, and Hwang. Key Words: Invariant optimal assignment, consecutive-k-out-of-n: G cycle. Institute of Applied Mathematics, Chinese Academy of Sciences, Beijing. y Department of Applied Mathematics, National Chiao-Tung University, Hsinchu, Taiwan. z Department of Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455, USA. fdzd,yunjae,hngog@cs.umn.edu. Support in part by the National Science Foundation under grant CCR
4 1 Introduction A cyclic consecutive-k-out-of-n: G system con C k; n : G) is a cycle of n k) components such that the system works if and only if some k consecutive components all work. Suppose n components with reliabilities p [1] p [2] p [n] are all exchangeable. How can they be assigned to the n positions on the cycle to maximize the reliability of the system? Kuo, Zhang, and Zuo [2] showed that if k 2, then the optimal assignment is invariant, i.e., it depends only on the ordering of reliabilities of the components, but not their value. Invariant optimal assignment is very important in practice. In fact, in the real world, one usually know the ranking of reliabilities of components, but not their exact values. For example, the ages of the components are known and one cannot compute the exact value of reliability from the age of each component. However, one may rank reliabilities of of components according to their age by the rule that the older the less reliable. Kuo, Zhang, and Zuo [2] also showed that for k 3 and n > 2k 1, Con C k; n : G) has no invariant optimal assignment. For n 2k 1, Zuo and Kuo [3] claimed that there exists an invariant optimal assignment p [1] ; p [3] ; p [5] ; ; p [6] ; p [4] ; p [2] ): However, Jalali, Hawkes, Cui, and Hwang [1] found that their proof is incomplete. In this paper, we give a complete proof for this invariant optimal assignment in case n 2k 1. A similar situation occurred in a line system. A linear consecutive-k-out-of-n: G system Con L k; n : G) can be dened in a similar way to the cyclic system Con C k; n : G). Kuo, Zhang, and Zuo [2] presented an invariant optimal assignment for Con L k; n : G) with n 2k. However, the proof is incomplete, too. This was also pointed out by Jalali et al. [1]. In addition, they gave a complete proof for the line system. It is worth pointing out that by setting p [1] p [2k1?n], the cycle system Con C k; 2k 1 : G) becomes the line system Con L k; n : G). Thus, our result yields the result of Jalali et al. [1]. The cycle case is in general much more dicult than the line case, and our proof adopts a new approach dierent from previous attempts. 2
5 2 Main Result In this section, we show the following. Theorem 1 Con C k; 2k 1 : G) has invariant optimal assignment p [1] ; p [3] ; p [5] ; ; p [2k1] ; p [2k] ; ; p [6] ; p [4] ; p [2] ): Let p 1 ; p 2 ; ; p 2k1 be reliabilities of the 2k 1 components on the cycle in counterclockwise direction. For simplicity of the proof, we rst assume that < p [1] < p [2] < < p [2k1] < 1: Our proof is based on the following representation of the reliability of consecutive-kout-of-n: G cycle for n 2k 1 Lemma 1 The reliability of consecutive-k-out-of-n: G cycle for n 2k 1 under assignment C can be represented as RC) p 1 p n p 1 p n where q i 1? p i and p ni p i. n n q i p i1 p ik p i p ik?1? n p i p ik Proof. The system works if and only if all components work or for some i, the ith component fails and the i 1)st component,..., the i k)th component all work. Since n 2k 1, there exists at most one such i. Therefore, RC) p 1 p n Note that n q i p i1 p ik : q i p i1 p ik p i1 p ik? p i p ik : This implies the second representation. 2 3
6 To prove Theorem 1, it suces to show that in any optimal assignment, p i? )p i?1? 1 ) > for 1 < i < j < 2k 1: 1) That is, selecting any component to be labeled p 1, we always have p i? p 2k2?i )p i1? p 2k1?i ) > for i 1; ; k: 2) For simplicity of representation, we denote i 2k 2? i. Note that k 1) k 1 and i ) i. Furthermore, without loss of generality, we assume p 1 > p 1 throughout this proof. Then the condition 2) can be rewritten as p i > p i for i 1; ; k: 3) We will employ an inductive argument to prove these k inequalities in the following ordering: p 1 > p 1 p k > p k p 2 > p 2 p k?1 > p k?1) Let C i be the assignment obtained from C by exchanging components i and i and C i;j;;y;z C i;j;;y ) z. Let C be an optimal assignment. We divide this inductive argument into the following lemmas. Lemma 2 Under assumption that p 1 > p 1, we must have p k > p k and p 2 p k?1 p 2 p k?1). Proof. Consider RC )? RC 1) p 1? p 1 )p 2 p k? p 2 p k )q k1 : Since p 1 > p 1, we have p 2 p k p 2 p k : 4) 4
7 Note that RC )? RC k) p k? p k )[q 1 p 1 q 1 p k1 )p 2 p k?1? p 1 q 1 q 1 p k1 )p 2 p k?1) ] 5) and q 1 p 1 q 1 p k1 )? p 1 q 1 q 1 p k1 ) p 1? p 1 )1? p k1 ) > : We rst claim that p k > p k. In fact, if p 2 p k?1 p 2 p k?1), then it follows from 5) that p k > p k ; If p 2 p k?1 < p 2 p k?1), then it follows from 4) that p k > p k. Now, we show that p 2 p k?1 p 2 p k?1). Note that RC )? RC1;k) [p 1 p k? p 1 p k ) p k? p k )p k1? p 1 p 1 p k? p k )]p 2 p k?1? p 2 p k?1) )q k1 [p 1 p k q 1? p 1 p k q 1 )q k1 1? p 1 p 1 )p k? p k )p k1 ]p 2 p k?1? p 2 p k?1) ): Moreover, p 1 q 1?p 1 q 1 p 1?p 1 > and p k > p k. Therefore, p 2 p k?1 p 2 p k?1). 2 To show inductive step, we rst prove an equality. Lemma 3 Suppose m < k2. Then 2m1 k?1 m?1 Proof. Note that m i 1? p?mij? k )p i1 q i1) ) i ) q 1 p 1 p k q k1 m p?mij ) )[1? k j1 )p 1 q 1) ) ) )[1? ] k j2 k j1 ]: p 1 p 1 p k1 5
8 p 1 p 1 p k1 q k p 1 p 1 p k1 p k p 1 p 1 p k1 q k q 2 p 1 p 1 p k1 p k p 2 p 1 p 1 p k1 p k m?1 m m i i ) ) )p i1 q i1) ) )p 1 q 1) ) ) k j1 ) k j2 k j1 and p 1 p k? p 1 p 1 p k? p 1 p k1 q 1 p 1 p k q k1? p 1 p 1 p k1 : Thus, 2m1 k?1 m i2 p?mij? q?mi?1 k?1 k p?mij p?mij ) 2m1 im2 k?1 q?mik p?mij p?m1 p?mk p 1 p k? p p k? p 1 p k1 m?1 m m i m?1 m )p i1 q i1) ) ) i 1? )p 1 q 1) ) )p i1 q i1) ) i ) ) k j2 ) p 1 p k? p 1 p 1 p k? p 1 p k1 )[1? k j1 )p 1 q 1) ) ] k j2 6
9 m q 1 p 1 p k q k1 ) )[1? k j1 ]: 2 Lemma 4 Suppose m < k2. If p i > p i for i 1; ; m; k? m 1; ; k 6) and 7) then p m1 > p m1) and : Proof. We rst show p m1 > p m1). For contradiction, suppose p m1 < p m1). It follows from 7) that By Lemma 3, > : 8) RC )? RC m1) 2m1 k?1 2m1? p?mij? [ p m1) p m1 k?1 k m?1 p m1? p m1) )f?p i1) q i1 ) m 1? i m k?1 p?mij p?mij)? p?mij? )[ i ) m k k p?mij ) p m1 p m1) )[p i1 q i1) ) ) )][1? k m j1 ) p?mij) ) k?1 ] )p 1 q 1) ) 7 p?mij? ) k p?mij) )]
10 ? m ) )p 1) q 1 )] k j2 q 1 p 1 p m p m2 p k? q 1 p 1 p m p m2) p k )q k1 < ; m )? )[1? k j1 ]g a contradiction. The last inequality holds because it follows from 6) and 8) that every term in f g is positive. Now, we show By Lemma 3, we have : RC )? RC m2;;m?k) m?1 f? i?p i1) q i1 )? m m1 1? ) )[p i1 q i1) ) i ) m1 )[ j1 ) m1 m1 j1 ) ) j1 )][1? j1 )p 1) q 1 )] k ) j1 ] )p 1 q 1) ) k j2 q 1 p 1 p m1 p 1 p k? q 1 p 1 p m1) p 1) p k )q k1 m )p m1? p m1) )[1? k j1 ]g: It follows from 6) and p m1 > p m1) that every term in f g is positive. Therefore, : 8
11 2 Lemma 5 Suppose m < k2. Then 2m2 m k?1 i m 1? 2m2 p?mij? )p i1 q i1) ) i q 1 p 1 p k q k1 1? m ) ) k ) p?m?1ij )[1? k j1 )p 1 q 1) ) k 1 : ] k j2 Proof. It is similar to the proof of Lemma 3. 2 Lemma 6 Suppose m < k2. If p i > p i for i 1; ; m 1; k? m 1; ; k 9) and 1) then p > p ) 11) and?1?1 : 12) Proof. We rst show 11). For contradiction, suppose p > p ).?1 >?1 : 13) 9
12 By Lemma 5, RC )? RC ) p? p ) )f m i?1?p i1) q i1 ) ) < ; m 1??1? i )?1 )[ j1?1 )[p i1 q i1) ) ) j1 ) )][1? j1 )p 1) q 1 )] k j1 j1 ] )p 1 q 1) ) k j2 q 1 p 1 p?1 p 1 p k? q 1 p 1 p?1) p 1) p k )q k1 1? a contradiction. m?1?1 )? ) Now, we prove 12). Consider RC )? RC m2;;?1)?1?1? ) f m i?p i1) q i1 )? m 1? m1 )[p i1 q i1) ) i ) m1 )[ j ) m1 j ) m1 k 1 ) j )][1? j )p 1) q 1 )] g ) k jm?i1 ] )p 1 q 1) ) k j2 q 1 p 1 p m1 p p k? q 1 p 1 p m1) p ) p k )q k1 1? m )p m1 p? p m1) p ) ) 1 k 1 ) g:
13 It follows from 9) and 11) that every term in f g is positive. Thus, 12) holds. 2 By Lemmas 2, 4, and 6, we know that 3) holds. Therefore, Theorem 1 is proved for < p [1] < < p [2k1] < 1. Finally, we deal with the case that some equality signs hold in p [1] p [2] p [2k1] 1. If p [1] p [2] p [2k1], then Theorem 1 is trivially true. If there exists i, 1 i < 2k 1, such that p [i] < p [i1], then for suciently small " >, we have < p [1] " < < p [i] i" < p [i1]? 2k 1? i)" < < p [2k1]? " < 1: For them, we already proved the optimality of assignment C in Theorem 1, that is, for any assignment C, RC ) RC). Now, we can complete our proof of Theorem 1 by setting "!. 3 Discussion Zuo and Kuo [3] proved only that RC ) RCi ) for any i. RC ) RC) for any assignment C. Thus, their proof is incomplete. This cannot imply that Note that Con C k; n : G) for n 2k cannot be induced from Con C k; 2k 1 : G). Moreover, our inductive argument does not work in cycle system Con C k; n : G) for n 2k. Thus, some additional techniques are required to solve the general case. References [1] A. Jalali, A.G. Hawkes, L. Cui, and F.K. Hwang, The optimal consecutive-k-out-of-n: G line for n 2k, to appear in Naval Res. Logist.. [2] W. Kuo, W. Zhang, and M. Zuo, A consecutive-k-out-of-n: G system: The mirror image of a consecutive-k-out-of-n: F system, IEEE Trans. Rel., ), pp
14 [3] M. Zuo and W. Kuo, Design and performance analysis of consecutive-k-out-of-n structure, Naval Res. Logist., ), pp
Anew index of component importance
Operations Research Letters 28 (2001) 75 79 www.elsevier.com/locate/dsw Anew index of component importance F.K. Hwang 1 Department of Applied Mathematics, National Chiao-Tung University, Hsin-Chu, Taiwan
More informationA Quadratic Integer Programming with Application in Chaotic Mappings of Complete Multipartite Graphs. Technical Report
A Quadratic Integer Programming with Application in Chaotic Mappings of Complete Multipartite Graphs Technical Report Department of Computer Science and Engineering University of Minnesota 4-192 EECS Building
More informationRivest-Vuillemin Conjecture Is True for Monotone Boolean Functions with Twelve Variables. Technical Report
Rivest-Vuillemin Conjecture Is True or Monotone Boolean Functions with Twelve Variables Technical Report Department o Computer Science and Engineering University o Minnesota 4-192 EECS Building 200 Union
More informationChannel graphs of bit permutation networks
Theoretical Computer Science 263 (2001) 139 143 www.elsevier.com/locate/tcs Channel graphs of bit permutation networks Li-Da Tong 1, Frank K. Hwang 2, Gerard J. Chang ;1 Department of Applied Mathematics,
More informationLinear Algebra and its Applications
Linear Algebra and its Applications 4 (2010) 118 1147 Contents lists available at ScienceDirect Linear Algebra and its Applications journal homepage: www.elsevier.com/locate/laa Two error-correcting pooling
More informationThe optimal pebbling number of the complete m-ary tree
Discrete Mathematics 222 (2000) 89 00 www.elseier.com/locate/disc The optimal pebbling number of the complete m-ary tree Hung-Lin Fu, Chin-Lin Shiue Department of Applied Mathematics, National Chiao Tung
More information1 Introduction A one-dimensional burst error of length t is a set of errors that are conned to t consecutive locations [14]. In this paper, we general
Interleaving Schemes for Multidimensional Cluster Errors Mario Blaum IBM Research Division 650 Harry Road San Jose, CA 9510, USA blaum@almaden.ibm.com Jehoshua Bruck California Institute of Technology
More informationk-degenerate Graphs Allan Bickle Date Western Michigan University
k-degenerate Graphs Western Michigan University Date Basics Denition The k-core of a graph G is the maximal induced subgraph H G such that δ (H) k. The core number of a vertex, C (v), is the largest value
More informationReliability of A Generalized Two-dimension System
2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V52.81 Reliability of A Generalized Two-dimension
More informationCoins with arbitrary weights. Abstract. Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to
Coins with arbitrary weights Noga Alon Dmitry N. Kozlov y Abstract Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to decide if all the m given coins have the
More informationThe limitedness problem on distance automata: Hashiguchi s method revisited
Theoretical Computer Science 310 (2004) 147 158 www.elsevier.com/locate/tcs The limitedness problem on distance automata: Hashiguchi s method revisited Hing Leung, Viktor Podolskiy Department of Computer
More information. HILBERT POLYNOMIALS
CLASSICAL ALGEBRAIC GEOMETRY Daniel Plaumann Universität Konstan Summer HILBERT POLYNOMIALS T An ane variety V A n with vanishing ideal I(V) K[,, n ] is completely determined by its coordinate ring A(V)
More informationA class of error-correcting pooling designs over complexes
DOI 10.1007/s10878-008-9179-4 A class of error-correcting pooling designs over complexes Tayuan Huang Kaishun Wang Chih-Wen Weng Springer Science+Business Media, LLC 008 Abstract As a generalization of
More informationTHE LARGEST INTERSECTION LATTICE OF A CHRISTOS A. ATHANASIADIS. Abstract. We prove a conjecture of Bayer and Brandt [J. Alg. Combin.
THE LARGEST INTERSECTION LATTICE OF A DISCRIMINANTAL ARRANGEMENT CHRISTOS A. ATHANASIADIS Abstract. We prove a conjecture of Bayer and Brandt [J. Alg. Combin. 6 (1997), 229{246] about the \largest" intersection
More informationPROOF OF TWO MATRIX THEOREMS VIA TRIANGULAR FACTORIZATIONS ROY MATHIAS
PROOF OF TWO MATRIX THEOREMS VIA TRIANGULAR FACTORIZATIONS ROY MATHIAS Abstract. We present elementary proofs of the Cauchy-Binet Theorem on determinants and of the fact that the eigenvalues of a matrix
More informationAn FKG equality with applications to random environments
Statistics & Probability Letters 46 (2000) 203 209 An FKG equality with applications to random environments Wei-Shih Yang a, David Klein b; a Department of Mathematics, Temple University, Philadelphia,
More informationOscillation Criteria for Delay Neutral Difference Equations with Positive and Negative Coefficients. Contents
Bol. Soc. Paran. Mat. (3s.) v. 21 1/2 (2003): 1 12. c SPM Oscillation Criteria for Delay Neutral Difference Equations with Positive and Negative Coefficients Chuan-Jun Tian and Sui Sun Cheng abstract:
More informationOnline Appendixes for \A Theory of Military Dictatorships"
May 2009 Online Appendixes for \A Theory of Military Dictatorships" By Daron Acemoglu, Davide Ticchi and Andrea Vindigni Appendix B: Key Notation for Section I 2 (0; 1): discount factor. j;t 2 f0; 1g:
More informationOn a kind of restricted edge connectivity of graphs
Discrete Applied Mathematics 117 (2002) 183 193 On a kind of restricted edge connectivity of graphs Jixiang Meng a; ;1, Youhu Ji b a Department of Mathematics, Xinjiang University, Urumqi 830046, Xinjiang,
More informationSecret-sharing with a class of ternary codes
Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,
More information4.1 Eigenvalues, Eigenvectors, and The Characteristic Polynomial
Linear Algebra (part 4): Eigenvalues, Diagonalization, and the Jordan Form (by Evan Dummit, 27, v ) Contents 4 Eigenvalues, Diagonalization, and the Jordan Canonical Form 4 Eigenvalues, Eigenvectors, and
More informationCombinatorial Optimisation, Problems I, Solutions Term /2015
/0/205 Combinatorial Optimisation, Problems I, Solutions Term 2 204/205 Tomasz Tkocz, t (dot) tkocz (at) warwick (dot) ac (dot) uk 3. By Problem 2, any tree which is not a single vertex has at least 2
More informationNOTES ON PLANAR SEMIMODULAR LATTICES. IV. THE SIZE OF A MINIMAL CONGRUENCE LATTICE REPRESENTATION WITH RECTANGULAR LATTICES
NOTES ON PLANAR SEMIMODULAR LATTICES. IV. THE SIZE OF A MINIMAL CONGRUENCE LATTICE REPRESENTATION WITH RECTANGULAR LATTICES G. GRÄTZER AND E. KNAPP Abstract. Let D be a finite distributive lattice with
More informationChapter 1. Comparison-Sorting and Selecting in. Totally Monotone Matrices. totally monotone matrices can be found in [4], [5], [9],
Chapter 1 Comparison-Sorting and Selecting in Totally Monotone Matrices Noga Alon Yossi Azar y Abstract An mn matrix A is called totally monotone if for all i 1 < i 2 and j 1 < j 2, A[i 1; j 1] > A[i 1;
More informationLifting to non-integral idempotents
Journal of Pure and Applied Algebra 162 (2001) 359 366 www.elsevier.com/locate/jpaa Lifting to non-integral idempotents Georey R. Robinson School of Mathematics and Statistics, University of Birmingham,
More informationTHE REAL POSITIVE DEFINITE COMPLETION PROBLEM. WAYNE BARRETT**, CHARLES R. JOHNSONy and PABLO TARAZAGAz
THE REAL POSITIVE DEFINITE COMPLETION PROBLEM FOR A SIMPLE CYCLE* WAYNE BARRETT**, CHARLES R JOHNSONy and PABLO TARAZAGAz Abstract We consider the question of whether a real partial positive denite matrix
More informationUpper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139
Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology
More informationDiscrete Optimization 2010 Lecture 2 Matroids & Shortest Paths
Matroids Shortest Paths Discrete Optimization 2010 Lecture 2 Matroids & Shortest Paths Marc Uetz University of Twente m.uetz@utwente.nl Lecture 2: sheet 1 / 25 Marc Uetz Discrete Optimization Matroids
More informationA Note on Radio Antipodal Colourings of Paths
A Note on Radio Antipodal Colourings of Paths Riadh Khennoufa and Olivier Togni LEI, UMR 5158 CNRS, Université de Bourgogne BP 47870, 1078 Dijon cedex, France Revised version:september 9, 005 Abstract
More information[4] T. I. Seidman, \\First Come First Serve" is Unstable!," tech. rep., University of Maryland Baltimore County, 1993.
[2] C. J. Chase and P. J. Ramadge, \On real-time scheduling policies for exible manufacturing systems," IEEE Trans. Automat. Control, vol. AC-37, pp. 491{496, April 1992. [3] S. H. Lu and P. R. Kumar,
More informationEfficient Decoding of Permutation Codes Obtained from Distance Preserving Maps
2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical
More informationin Search Advertising
Eects of the Presence of Organic Listing in Search Advertising Lizhen Xu Jianqing Chen Andrew Whinston Web Appendix: The Case of Multiple Competing Firms In this section, we extend the analysis from duopolistic
More informationON NEAR RELATIVE PRIME NUMBER IN A SEQUENCE OF POSITIVE INTEGERS. Jyhmin Kuo and Hung-Lin Fu
TAIWANESE JOURNAL OF MATHEMATICS Vol. 14, No. 1, pp. 123-129, February 2010 This paper is available online at http://www.tjm.nsysu.edu.tw/ ON NEAR RELATIVE PRIME NUMBER IN A SEQUENCE OF POSITIVE INTEGERS
More informationChih-Hung Yen and Hung-Lin Fu 1. INTRODUCTION
TAIWANESE JOURNAL OF MATHEMATICS Vol. 14, No. 1, pp. 273-286, February 2010 This paper is available online at http://www.tjm.nsysu.edu.tw/ LINEAR 2-ARBORICITY OF THE COMPLETE GRAPH Chih-Hung Yen and Hung-Lin
More informationJ. Symbolic Computation (1995) 11, 1{000 An algorithm for computing an integral basis in an algebraic function eld Mark van Hoeij Department of mathem
J. Symbolic Computation (1995) 11, 1{000 An algorithm for computing an integral basis in an algebraic function eld Mark van Hoeij Department of mathematics University of Nijmegen 6525 ED Nijmegen The Netherlands
More informationErdös-Ko-Rado theorems for chordal and bipartite graphs
Erdös-Ko-Rado theorems for chordal and bipartite graphs arxiv:0903.4203v2 [math.co] 15 Jul 2009 Glenn Hurlbert and Vikram Kamat School of Mathematical and Statistical Sciences Arizona State University,
More informationOptimal Sequences and Sum Capacity of Synchronous CDMA Systems
Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of
More informationLectures 18: Gauss's Remarkable Theorem II. Table of contents
Math 348 Fall 27 Lectures 8: Gauss's Remarkable Theorem II Disclaimer. As we have a textbook, this lecture note is for guidance and supplement only. It should not be relied on when preparing for exams.
More informationThe group (Z/nZ) February 17, In these notes we figure out the structure of the unit group (Z/nZ) where n > 1 is an integer.
The group (Z/nZ) February 17, 2016 1 Introduction In these notes we figure out the structure of the unit group (Z/nZ) where n > 1 is an integer. If we factor n = p e 1 1 pe, where the p i s are distinct
More informationUNCORRECTED PROOF. Importance Index of Components in Uncertain Reliability Systems. RESEARCH Open Access 1
Gao and Yao Journal of Uncertainty Analysis and Applications _#####################_ DOI 10.1186/s40467-016-0047-y Journal of Uncertainty Analysis and Applications Q1 Q2 RESEARCH Open Access 1 Importance
More informationLinear Algebra (part 1) : Matrices and Systems of Linear Equations (by Evan Dummit, 2016, v. 2.02)
Linear Algebra (part ) : Matrices and Systems of Linear Equations (by Evan Dummit, 206, v 202) Contents 2 Matrices and Systems of Linear Equations 2 Systems of Linear Equations 2 Elimination, Matrix Formulation
More informationMidterm 1. Every element of the set of functions is continuous
Econ 200 Mathematics for Economists Midterm Question.- Consider the set of functions F C(0, ) dened by { } F = f C(0, ) f(x) = ax b, a A R and b B R That is, F is a subset of the set of continuous functions
More informationIMA Preprint Series # 2066
THE CARDINALITY OF SETS OF k-independent VECTORS OVER FINITE FIELDS By S.B. Damelin G. Michalski and G.L. Mullen IMA Preprint Series # 2066 ( October 2005 ) INSTITUTE FOR MATHEMATICS AND ITS APPLICATIONS
More informationLower Bounds for Shellsort. April 20, Abstract. We show lower bounds on the worst-case complexity of Shellsort.
Lower Bounds for Shellsort C. Greg Plaxton 1 Torsten Suel 2 April 20, 1996 Abstract We show lower bounds on the worst-case complexity of Shellsort. In particular, we give a fairly simple proof of an (n
More informationClassication of greedy subset-sum-distinct-sequences
Discrete Mathematics 271 (2003) 271 282 www.elsevier.com/locate/disc Classication of greedy subset-sum-distinct-sequences Joshua Von Kor Harvard University, Harvard, USA Received 6 November 2000; received
More informationComputer Science at Kent
Computer Science at Kent New eta-reduction and Church-Rosser Yong Luo Technical Report No. 7-05 October 2005 Copyright c 2005 University of Kent Published by the Computing Laboratory, University of Kent,
More informationMath 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction
Math 4 Summer 01 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If
More informationDenition 2: o() is the height of the well-founded relation. Notice that we must have o() (2 ) +. Much is known about the possible behaviours of. For e
Possible behaviours for the Mitchell ordering James Cummings Math and CS Department Dartmouth College Hanover NH 03755 January 23, 1998 Abstract We use a mixture of forcing and inner models techniques
More informationApril 25 May 6, 2016, Verona, Italy. GAME THEORY and APPLICATIONS Mikhail Ivanov Krastanov
April 25 May 6, 2016, Verona, Italy GAME THEORY and APPLICATIONS Mikhail Ivanov Krastanov Games in normal form There are given n-players. The set of all strategies (possible actions) of the i-th player
More informationWide diameters of de Bruijn graphs
J Comb Optim (2007) 14: 143 152 DOI 10.1007/s10878-007-9066-4 Wide diameters of de Bruijn graphs Jyhmin Kuo Hung-Lin Fu Published online: 14 April 2007 Springer Science+Business Media, LLC 2007 Abstract
More informationOle Christensen 3. October 20, Abstract. We point out some connections between the existing theories for
Frames and pseudo-inverses. Ole Christensen 3 October 20, 1994 Abstract We point out some connections between the existing theories for frames and pseudo-inverses. In particular, using the pseudo-inverse
More information1 Matrices and Systems of Linear Equations
Linear Algebra (part ) : Matrices and Systems of Linear Equations (by Evan Dummit, 207, v 260) Contents Matrices and Systems of Linear Equations Systems of Linear Equations Elimination, Matrix Formulation
More informationRadio Number for Square of Cycles
Radio Number for Square of Cycles Daphne Der-Fen Liu Melanie Xie Department of Mathematics California State University, Los Angeles Los Angeles, CA 9003, USA August 30, 00 Abstract Let G be a connected
More informationProtein-Protein Interaction and Group Testing in Bipartite Graphs
Int. J. Bioinformatics Research and Applications, Vol. x, No. x, xxxx 1 Protein-Protein Interaction and Group Testing in Bipartite Graphs Yingshu Li, My T. Thai, Zhen Liu and Weili Wu Department of Computer
More informationSortabilities of Partition Properties
Journal of Combinatorial Optimization 2, 413 427 (1999) c 1999 Kluwer Academic Publishers. Manufactured in The Netherlands. Sortabilities of Partition Properties GERARD J. CHANG, FU-LOONG CHEN, LINGLING
More informationc i r i i=1 r 1 = [1, 2] r 2 = [0, 1] r 3 = [3, 4].
Lecture Notes: Rank of a Matrix Yufei Tao Department of Computer Science and Engineering Chinese University of Hong Kong taoyf@cse.cuhk.edu.hk 1 Linear Independence Definition 1. Let r 1, r 2,..., r m
More informationMULTI-AGENT TRACKING OF A HIGH-DIMENSIONAL ACTIVE LEADER WITH SWITCHING TOPOLOGY
Jrl Syst Sci & Complexity (2009) 22: 722 731 MULTI-AGENT TRACKING OF A HIGH-DIMENSIONAL ACTIVE LEADER WITH SWITCHING TOPOLOGY Yiguang HONG Xiaoli WANG Received: 11 May 2009 / Revised: 16 June 2009 c 2009
More informationNOTES ON PLANAR SEMIMODULAR LATTICES. IV. THE SIZE OF A MINIMAL CONGRUENCE LATTICE REPRESENTATION WITH RECTANGULAR LATTICES
NOTES ON PLANAR SEMIMODULAR LATTICES. IV. THE SIZE OF A MINIMAL CONGRUENCE LATTICE REPRESENTATION WITH RECTANGULAR LATTICES G. GRÄTZER AND E. KNAPP Abstract. Let D be a finite distributive lattice with
More informationThe Best Circulant Preconditioners for Hermitian Toeplitz Systems II: The Multiple-Zero Case Raymond H. Chan Michael K. Ng y Andy M. Yip z Abstract In
The Best Circulant Preconditioners for Hermitian Toeplitz Systems II: The Multiple-ero Case Raymond H. Chan Michael K. Ng y Andy M. Yip z Abstract In [0, 4], circulant-type preconditioners have been proposed
More informationRichard DiSalvo. Dr. Elmer. Mathematical Foundations of Economics. Fall/Spring,
The Finite Dimensional Normed Linear Space Theorem Richard DiSalvo Dr. Elmer Mathematical Foundations of Economics Fall/Spring, 20-202 The claim that follows, which I have called the nite-dimensional normed
More informationComplexity analysis of job-shop scheduling with deteriorating jobs
Discrete Applied Mathematics 117 (2002) 195 209 Complexity analysis of job-shop scheduling with deteriorating jobs Gur Mosheiov School of Business Administration and Department of Statistics, The Hebrew
More informationII. Determinant Functions
Supplemental Materials for EE203001 Students II Determinant Functions Chung-Chin Lu Department of Electrical Engineering National Tsing Hua University May 22, 2003 1 Three Axioms for a Determinant Function
More informationBalance properties of multi-dimensional words
Theoretical Computer Science 273 (2002) 197 224 www.elsevier.com/locate/tcs Balance properties of multi-dimensional words Valerie Berthe a;, Robert Tijdeman b a Institut de Mathematiques de Luminy, CNRS-UPR
More informationACO Comprehensive Exam 19 March Graph Theory
1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting
More informationMultilevel Distance Labelings for Paths and Cycles
Multilevel Distance Labelings for Paths and Cycles Daphne Der-Fen Liu Department of Mathematics California State University, Los Angeles Los Angeles, CA 90032, USA Email: dliu@calstatela.edu Xuding Zhu
More informationA Z q -Fan theorem. 1 Introduction. Frédéric Meunier December 11, 2006
A Z q -Fan theorem Frédéric Meunier December 11, 2006 Abstract In 1952, Ky Fan proved a combinatorial theorem generalizing the Borsuk-Ulam theorem stating that there is no Z 2-equivariant map from the
More informationAntipodal Labelings for Cycles
Antipodal Labelings for Cycles Justie Su-Tzu Juan and Daphne Der-Fen Liu Submitted: December 2006; revised: August 2007 Abstract Let G be a graph with diameter d. An antipodal labeling of G is a function
More informationChazelle (attribution in [13]) obtained the same result by generalizing Pratt's method: instead of using and 3 to construct the increment sequence use
Average-Case Complexity of Shellsort Tao Jiang McMaster University Ming Li y University of Waterloo Paul Vitanyi z CWI and University of Amsterdam Abstract We prove a general lower bound on the average-case
More informationTHE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS
THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS GÁBOR HORVÁTH, CHRYSTOPHER L. NEHANIV, AND KÁROLY PODOSKI Dedicated to John Rhodes on the occasion of his 80th birthday.
More informationAbstract. We show that a proper coloring of the diagram of an interval order I may require 1 +
Colorings of Diagrams of Interval Orders and -Sequences of Sets STEFAN FELSNER 1 and WILLIAM T. TROTTER 1 Fachbereich Mathemati, TU-Berlin, Strae des 17. Juni 135, 1000 Berlin 1, Germany, partially supported
More informationCourse Notes for EE227C (Spring 2018): Convex Optimization and Approximation
Course Notes for EE7C (Spring 08): Convex Optimization and Approximation Instructor: Moritz Hardt Email: hardt+ee7c@berkeley.edu Graduate Instructor: Max Simchowitz Email: msimchow+ee7c@berkeley.edu October
More informationNote An example of a computable absolutely normal number
Theoretical Computer Science 270 (2002) 947 958 www.elsevier.com/locate/tcs Note An example of a computable absolutely normal number Veronica Becher ; 1, Santiago Figueira Departamento de Computation,
More informationonly nite eigenvalues. This is an extension of earlier results from [2]. Then we concentrate on the Riccati equation appearing in H 2 and linear quadr
The discrete algebraic Riccati equation and linear matrix inequality nton. Stoorvogel y Department of Mathematics and Computing Science Eindhoven Univ. of Technology P.O. ox 53, 56 M Eindhoven The Netherlands
More informationMAXIMAL VERTEX-CONNECTIVITY OF S n,k
MAXIMAL VERTEX-CONNECTIVITY OF S n,k EDDIE CHENG, WILLIAM A. LINDSEY, AND DANIEL E. STEFFY Abstract. The class of star graphs is a popular topology for interconnection networks. However it has certain
More informationABSTRACT A STUDY OF PROJECTIONS OF 2-BOUQUET GRAPHS. A new field of mathematical research has emerged in knot theory,
ABSTRACT A STUDY OF PROJECTIONS OF -BOUQUET GRAPHS A new field of mathematical research has emerged in knot theory, which considers knot diagrams with missing information at some of the crossings. That
More informationNotes on Iterated Expectations Stephen Morris February 2002
Notes on Iterated Expectations Stephen Morris February 2002 1. Introduction Consider the following sequence of numbers. Individual 1's expectation of random variable X; individual 2's expectation of individual
More informationnumber j, we define the multinomial coefficient by If x = (x 1,, x n ) is an n-tuple of real numbers, we set
. Taylor s Theorem in R n Definition.. An n-dimensional multi-index is an n-tuple of nonnegative integer = (,, n. The absolute value of is defined ( to be = + + n. For each natural j number j, we define
More informationOn Computing Signatures of k-out-of-n Systems Consisting of Modules
On Computing Signatures of k-out-of-n Systems Consisting of Modules Gaofeng Da Lvyu Xia Taizhong Hu Department of Statistics Finance, School of Management University of Science Technology of China Hefei,
More informationThe Great Wall of David Shin
The Great Wall of David Shin Tiankai Liu 115 June 015 On 9 May 010, David Shin posed the following puzzle in a Facebook note: Problem 1. You're blindfolded, disoriented, and standing one mile from the
More informationCOMPACT DIFFERENCE OF WEIGHTED COMPOSITION OPERATORS ON N p -SPACES IN THE BALL
COMPACT DIFFERENCE OF WEIGHTED COMPOSITION OPERATORS ON N p -SPACES IN THE BALL HU BINGYANG and LE HAI KHOI Communicated by Mihai Putinar We obtain necessary and sucient conditions for the compactness
More informationConstrained Leja points and the numerical solution of the constrained energy problem
Journal of Computational and Applied Mathematics 131 (2001) 427 444 www.elsevier.nl/locate/cam Constrained Leja points and the numerical solution of the constrained energy problem Dan I. Coroian, Peter
More informationPacking of Rigid Spanning Subgraphs and Spanning Trees
Packing of Rigid Spanning Subgraphs and Spanning Trees Joseph Cheriyan Olivier Durand de Gevigney Zoltán Szigeti December 14, 2011 Abstract We prove that every 6k + 2l, 2k-connected simple graph contains
More informationNew concepts: Span of a vector set, matrix column space (range) Linearly dependent set of vectors Matrix null space
Lesson 6: Linear independence, matrix column space and null space New concepts: Span of a vector set, matrix column space (range) Linearly dependent set of vectors Matrix null space Two linear systems:
More informationOn Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus
On Controllability and Normality of Discrete Event Dynamical Systems Ratnesh Kumar Vijay Garg Steven I. Marcus Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin,
More informationAhlswede Khachatrian Theorems: Weighted, Infinite, and Hamming
Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming Yuval Filmus April 4, 2017 Abstract The seminal complete intersection theorem of Ahlswede and Khachatrian gives the maximum cardinality of
More informationOn the number of cycles in a graph with restricted cycle lengths
On the number of cycles in a graph with restricted cycle lengths Dániel Gerbner, Balázs Keszegh, Cory Palmer, Balázs Patkós arxiv:1610.03476v1 [math.co] 11 Oct 2016 October 12, 2016 Abstract Let L be a
More informationOptimal superimposed codes and designs for Renyi s search model
Journal of Statistical Planning and Inference 100 (2002) 281 302 www.elsevier.com/locate/jspi Optimal superimposed codes and designs for Renyi s search model Arkadii G. D yachkov, Vyacheslav V. Rykov Department
More information2. (25%) Suppose you have an array of 1234 records in which only a few are out of order and they are not very far from their correct positions. Which
COT 6401 The Analysis of Algorithms Midterm Test Open books and notes Name - SSN - 1. (25%) Suppose that the function F is dened for all power of 2 and is described by the following recurrence equation
More information1 Preliminaries We recall basic denitions. A deterministic branching program P for computing a Boolean function h n : f0; 1g n! f0; 1g is a directed a
Some Separation Problems on Randomized OBDDs Marek Karpinski Rustam Mubarakzjanov y Abstract We investigate the relationships between complexity classes of Boolean functions that are computable by polynomial
More informationP(X 0 = j 0,... X nk = j k )
Introduction to Probability Example Sheet 3 - Michaelmas 2006 Michael Tehranchi Problem. Let (X n ) n 0 be a homogeneous Markov chain on S with transition matrix P. Given a k N, let Z n = X kn. Prove that
More informationRestricted b-matchings in degree-bounded graphs
Egerváry Research Group on Combinatorial Optimization Technical reports TR-009-1. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.
More informationIntroduction to modules
Chapter 3 Introduction to modules 3.1 Modules, submodules and homomorphisms The problem of classifying all rings is much too general to ever hope for an answer. But one of the most important tools available
More informationNon-TDI graph-optimization with supermodular functions (extended abstract)
Egerváry Research Group on Combinatorial Optimization Technical reports TR-2015-14. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.
More informationON THE COMPLETE PIVOTING CONJECTURE FOR A HADAMARD MATRIX OF ORDER 12 ALAN EDELMAN 1. Department of Mathematics. and Lawrence Berkeley Laboratory
ON THE COMPLETE PIVOTING CONJECTURE FOR A HADAMARD MATRIX OF ORDER 12 ALAN EDELMAN 1 Department of Mathematics and Lawrence Berkeley Laboratory University of California Berkeley, California 94720 edelman@math.berkeley.edu
More informationSupervisory Control of Petri Nets with. Uncontrollable/Unobservable Transitions. John O. Moody and Panos J. Antsaklis
Supervisory Control of Petri Nets with Uncontrollable/Unobservable Transitions John O. Moody and Panos J. Antsaklis Department of Electrical Engineering University of Notre Dame, Notre Dame, IN 46556 USA
More informationTORIC WEAK FANO VARIETIES ASSOCIATED TO BUILDING SETS
TORIC WEAK FANO VARIETIES ASSOCIATED TO BUILDING SETS YUSUKE SUYAMA Abstract. We give a necessary and sufficient condition for the nonsingular projective toric variety associated to a building set to be
More informationOn an algebra related to orbit-counting. Peter J. Cameron. Queen Mary and Westeld College. London E1 4NS U.K. Abstract
On an algebra related to orbit-counting Peter J. Cameron School of Mathematical Sciences Queen Mary and Westeld College London E1 4NS U.K. Abstract With any permutation group G on an innite set is associated
More informationCycle Time Analysis for Wafer Revisiting Process in Scheduling of Single-arm Cluster Tools
International Journal of Automation and Computing 8(4), November 2011, 437-444 DOI: 10.1007/s11633-011-0601-5 Cycle Time Analysis for Wafer Revisiting Process in Scheduling of Single-arm Cluster Tools
More informationGraphs with large maximum degree containing no odd cycles of a given length
Graphs with large maximum degree containing no odd cycles of a given length Paul Balister Béla Bollobás Oliver Riordan Richard H. Schelp October 7, 2002 Abstract Let us write f(n, ; C 2k+1 ) for the maximal
More informationTight bound for the density of sequence of integers the sum of no two of which is a perfect square
Discrete Mathematics 256 2002 243 255 www.elsevier.com/locate/disc Tight bound for the density of sequence of integers the sum of no two of which is a perfect square A. Khalfalah, S. Lodha, E. Szemeredi
More information