Quantum Secret Sharing with Error Correction
|
|
- Spencer Jenkins
- 6 years ago
- Views:
Transcription
1 Commun. Theor. Phys. 58 (01) Vol. 58, No. 5, November 15, 01 Quntum Secret Shring with Error Correction Aziz Mouzli, 1, Ftih Merzk, nd Dmin Mrkhm 3 1 Electronic Deprtment, Ntionl Polytechnic School, Algiers, Algeri Electronic nd Computer Enginering Fculty, University of Science, nd Technology Houri Boumediéne, Algiers, Algeri 3 Lbortoire Tritement et Communiction de l Informtion CNRS Télécom PrisTech, Frnce (Received Jnury 19, 01; revised mnuscript received My, 01) Abstrct We investigte in this work quntum error correction on five-qubits grph stte used for secret shring through five noisy chnnels. We describe the procedure for the five, seven nd nine qubits codes. It is known tht the three codes lwys llow error recovery if only one mong the sent qubits is disturbed in the trnsmitting chnnel. However, if two qubits nd more re disturbed, then the correction will depend on the used code. We compre in this pper the three codes by computing the verge fidelity between the sent secret nd tht mesured by the receivers. We will tret the cse where, t most, two qubits re ffected in ech one of five depolrizing chnnels. PACS numbers: Ac, Hk, Lx Key words: quntum correction, grph stte, quntum secret shring, Feynmn progrm 1 Introduction The grph stte cn be very useful for severl quntum protocols s secret shring, mesurement-bsed computtion, error correction, teleporttion nd quntum communictions. Then, it would be in the future good wy to unify these topics in one formlism. For exmple, n output of quntum computtion considered s secret cn be included in grph stte, then protected by quntum error correcting code nd sent through noisy chnnel to severl receivers shring this secret. The quntum secret shring with grph stte is very well described in Ref. [1, prticulrly the five qubits grph stte. In this lst cse, only three receivers mong five will ccess the secret, the two others being considered s evesdroppers. In this work, we investigte the effects of the five, seven nd nine qubits codes used to protect five qubits grph stte contining secret nd sent by deler to five plyers. We will compre the fidelity to determine the best code for depolrizing chnnel where only one or two sent qubits re error ffected. Some of the results hve been obtined using simultor clled Feynmn Progrm, which is set of procedures supporting the definition nd mnipultion of n n-qubits system nd the unitry gtes cting on them. This progrm is described in detils in Refs. [ 5. Quntum Secret Shring Quntum secret shring (QSS) is quntum cryptogrphic protocol wherein deler shres privte or public quntum chnnels with ech plyer, while the plyers shre privte quntum or clssicl chnnels between ech other. The deler prepres n encoded version of the secret using qubits string, which he trnsmits to n plyers, only subset k of them cn collborte to reconstruct the secret. We cll (k, n) threshold secret shring protocol where ech plyer receives one equl shre of the encoded secret nd threshold of ny k plyers cn ccess the secret. This scheme is primitive protocol by which ny other secret shring is chieved. In this work, we treted the cse (k, n) = (3, 5) where the deler sends through five depolrizing chnnels, quntum secret encoded in five qubits grph stte. [1.1 Introduction to Grph Stte Grph sttes re n efficient tool for multiprtite quntum informtion processing tsk like secret shring. Also, they hve grphicl representtion which offers n intuitive picture of informtion flow. The secret to be shred is encoded onto clssicl lbels plced on vertices of the grph representing locl opertions. The entnglement of the grph stte llows these lbels to be shifted round, giving us the opportunity to see grphiclly which set of plyers cn ccess the secret. [1. Five-Qubit Grph Stte The five qubits grph stte G given by Eq. (1) is schemtized in Fig. 1 where the vertices represent the qubits nd the edges the controlled-z gte. The grph stte Ψ G given by Eq. () nd contining the quntum secret Ψ s = α 0 β 1 = cos(θ/) 0 e iφ sin(θ/) 1, should be trnsmitted by deler to five plyers through five different chnnels. First, he constructs the stte G from n initil five qubits stte Ψ 0 = 00000, then pplies the Hdmrd gte H on ech qubit nd the controlled-z gte CZ on qubits [1,, [, 3, [3, 4, [4, 5, E-mil: zizmouzli@hotmil.com c 011 Chinese Physicl Society nd IOP Publishing Ltd
2 66 Communictions in Theoreticl Physics Vol. 58 [5, 1 to obtin: G = 1 i 4 CZ [i,i1 5. (1) The deler mkes n intriction between n dditionl qubit clled D nd ech of the five qubits, then dd to the obtined system the secret qubit S in the stte Ψ s = α 0 β 1. Then, he performs Bell mesurement on qubits D nd S nd obtins finlly: [1 [ Ψ G = α G β Z i G. () 1 i 5 the suitble recovering gte R g given in Tble 1 to ccess the secret stte. [1 We describe below this procedure. Eqution (4) cn be written: Ψ G = B Ψ 45 B Ψ b 45 where B Ψ c 45 B Ψ d 45, (5) Ψ 45 = 1 [α β B 01 45, Ψ b 45 = 1 [α β B 10 45, Ψ c 45 = 1 [α β B 00 45, Fig. 1 Five-qubits grph stte G. We obtin in the Dirc nottion: Ψ G = ( /8){(α β)[ (α β)[ ( α β)[ (α β)[ }. (3).3 Perfect Chnnel The grph stte Ψ G cn be decomposed in terms of Bell sttes B ij 13 nd B ij 45 : [1 Ψ G = ( 1 ){ B [α β B B [α β B B [α β B B [α β B )}, (4) where the Bell sttes re: B 00 = B 10 = , B 01 =, , B 11 =. (4b) The secret should be ccessible only for plyers 1,, nd 3, plyers 4 nd 5 being considered s evesdroppers. Plyers 1 nd 3 mesure their qubits in the Bell bsis nd trnsmit the result to plyer which pplies on its qubit Ψ d 45 = 1 [α β B (5b) Mesurement in the Bell bse { B ij 13 } gives only one term of the superposition in Eq. (5), then the globl density mtrix: ρ 1,...,5 = ( B ij B ij ) 13 ( Ψ x Ψ x ) 45 4 = (ρ ij) 13 (ρ x ) 45, (6) 4 with x =, b, c or d. The prtil trce over qubits (4, 5) gives the density mtrix of qubit : ρ = Ψ Ψ = P tr [(ρ x ) 45 4,5. (7) Then the secret stte: ρ = Rg ρ R g or Ψ = R g Ψ. (8) Tble 1 Secret recovering gte R g used by plyer versus the Bell stte B ij 13 mesured by plyers 1 nd 3. B ij 13 B 00 B 01 B 10 B 11 R g H ZH ZXH XH.4 Bit nd Phse Flip The sent qubits cn be ffected by error X, Z or Y represented respectively by the Puli mtrix ( ) ( ) X =, Z =, ( ) 0 1 Y = ixz = i 1 0 corresponding to rottion π round ox or oz or both in the block sphere. We hve pplied the procedure described in Subsec..3 nd hve obtined Tble giving the ffected secret stte Ψ E. Tble Tble Qubit stte Ψ E versus error on qubits 1,, nd 3. Error Ψ E X 1, X 3, Y Z 1, X, Z 3 Z, Y 1, Y 3 α 1 β 0 α 0 β 1 α 1 β 0
3 No. 5 Communictions in Theoreticl Physics Fidelity The fidelity is one of the mthemticl quntities which permits to know how close re two quntum sttes represented by the density mtrix σ nd ρ by mesuring distnce between them: [6 F(σ, ρ) = Tr( σρ σ). (9) In the cse of pure stte σ = Ψ Ψ nd n rbitrry stte ρ, the fidelity is the overlp between the two sttes: [6 F( Ψ, ρ) = Ψ ρ Ψ. (10) In this work we mesure the overlp between the correct secret stte σ s = Ψ s Ψ s nd the qubit stte ρ = Ψ Ψ mesured by plyer to ccess the secret. Then, the fidelity is function of the ngles (θ, φ) in the Block sphere nd the verge fidelity is: F = (1/4π) F(θ, φ)sin(θ)dθdφ, (11) with 0 θ π nd 0 φ π. We will describe below the procedure giving the fidelity. If ny Puli errors E =σ 0, σ x, σ y or σ z ffect the stte Ψ G in the trnsmission chnnel, we cn see from Eq. (4) tht Eq. (5) will keep the sme form nd become: Ψ E G = B Ψ E 45 B Ψ E b 45 B Ψ E c 45 B Ψ E d 45, (1) where Ψ E,b,c,d 45 re the new globl sttes of qubits system (, 4, 5) modified by the chnnel errors. We note tht Ψ E,b,c,d 45 E Ψ,b,c,d 45 s chnnel error cn ffect qubits (1, 3) s well s qubits (, 4, 5). In fct, if n error ffects qubits (1, 3) or (4, 5), then their globl stte will simply chnge to nother Bell stte. Similrly, if qubit is ffected, then its stte will only switch to one of the forms ppering in Eq. (4). After mesuring on the Bell sttes of qubits (1, 3) only one term will remin in Eq. (1): ( 1 Ψ E G = B ij 13 Ψ ) E x 45. (13) The corresponding ffected density mtrix is: ( 1 ) ρ E 1,...,5 = ( B ij B ij ) 13 ( Ψ E x 4 ΨE x ) 45 ( 1 ) = ρ E 1,...,5 = (ρ ij ) 13 (ρ E x 4 ) 45. (14) The prtil trce over qubits (4, 5) gives the mesured density mtrix of qubit : ρ E = Ψ E Ψ E = P tr [(ρ E x ) 45 4,5. (15) Then the ffected secret stte mesured by plyer two: ρ E = R G ρ E R G = Ψ E ΨE. (16) We multiply by the secret stte Ψ s = α 0 β 1 to obtin the fidelity: F(θ, φ) = Ψ s ρ E Ψ s. (17) Tble 3 gives the fidelity F(θ, φ) clculted by Feynmn progrm for ll the errors on qubits i = 1, or 3. Figure shows the fidelity F(θ, φ 0 = 0 or π/) function of the ngle θ for error occurring with probbility P = 1 on one, two nd three noisy chnnels. We note for exmple tht if Ψ s = ( /)( 0 1 ) the fidelity is the best (F = 1) for error X 1 nd the worst (F = 0) for error Z 1. Also, we deduce from Eq. (4) tht ny errors on qubits 4 nd 5 do not ffect the secret stte giving then fidelity equl to one. Fig. Fidelity F(θ,φ) with 0 < θ < π, φ = π/ for errors ε nd φ = 0 for errors ε c. We note tht for errors ε d we hve F(θ, φ) = 1 for 0 < (θ, φ) < π. Tble 3 Fidelity nd mesured stte Ψ versus errors on qubits i = 1,,3. The error groups re depicted on Tble 4. Error Ψ F(θ, φ) F ε α 1 β 0 sin(θ) sinφ 1/3 ε b α 0 β 1 cos (θ) 1/3 ε c α 1 β 0 sin(θ) cos φ 1/3 ε d α 0 β Depolrizing Chnnel The depolrizing chnnel is prticulr model for the noise on quntum systems. In this process, the globl density mtrix ρ is replced by mixed one ρ(p) function of the probbility P tht Puli error E ij = (σ 1j = σ xj, σ j = σ yj or σ 3j = σ zj ) ffects ny qubit j in the n- qubits system. For one-qubit system the mtrix density is given by Eq. (18) [ nd for the n-qubits system it cn be generlized by Eq. (19): ρ 1 (P)=(1 P)ρ P [XρX Y ρy ZρZ, (18) 3 ρ n (P)=(1 P) n ρ P k [ 1 jl n P n 3 n 1 i 3 [ 1 jl n 1 i 3 (Π 1 l k σ ij l ) (1 P)n k 3k ρ(π 1 l k σ ijl ) (Π 1 l n σij l ) ρ(π 1 l n σ ijl ). (19)
4 664 Communictions in Theoreticl Physics Vol. 58 Consider now the cse where the five qubits re sent by the deler through five depolrizing chnnels. Suppose the probbility P tht ny single error occurs on ny qubit is the sme in the five chnnels. Then we cn use Eq. (19) s if the deler sends the five qubits through only one depolrized chnnel. We describe below the procedure to obtin the verge fidelity F (P), considering ll the possible errors in the five trnsmitting noisy chnnels. We begin by writing the ffected density mtrix ρ E 1,...,5(P) received by the five plyers: ρ E 1,...,5(P) = (1 P) 5 ρ 1,...,5 P (1 P)4 3 [ρ E1 1,...,5 ρe 1,...,5 ρe3 1,...,5 ρe4 1,...,5 ρe5 1,...,5 P 9 (1 P)3 [ρ E1E 1,...,5 ρe1e3 1,...,5 ρe1e4 1,...,5 ρ E1E5 1,...,5 ρee3 1,...,5 ρee4 1,...,5 ρee5 1,...,5 ρ E3E4 1,...,5 ρe3e5 1,...,5 ρe4e5 1,...,5 P 3 (1 P) 7 [ρ E1EE3 1,...,5 ρ E1EE4 1,...,5 ρ E1EE5 1,...,5 ρ E1E3E4 1,...,5 ρ E1E3E5 1,...,5 ρ E1E4E5 1,...,5 ρ EE3E4 1,...,5 ρ EE3E5 1,...,5 ρ EE4E5 1,...,5 ρ E3E4E5 1,...,5 P 4 (1 P) 81 [ρ E1EE3E4 1,...,5 ρ E1EE3E5 1,...,5 ρ E1EE4E5 ρ E1E3E4E5 1,...,5 ρ EE3E4E5 1,...,5 P 5 1,...,5. (0) 43 ρe1ee3e4e5 With ρ Ei 1,...,5 the density mtrix ffected by errors on qubit i : ρ Ei 1,...,5 = X iρ 1,...,5 X i Y i ρ 1,...,5 Y i Z i ρ 1,...,5 Z i. (1) The density mtrix ρ EiEj 1,...,5, ρeieje k 1,...,5, ρ EiEjE ke l 1,...,5, nd ρ EiEjE ke l E m 1,...,5 re summtion of respectively 9, 7, 81, nd 43 terms nd represent the density mtrix ffected by error on two, three, four nd five qubits. After mesuring on the Bell sttes of qubits (1, 3) we obtin: ρ E 45(P) = (1 P) 5 ρ 45 P (1 P)4 3 [ρ E1 45 ρe 45 ρe3 45 ρe4 45 ρe5 45 P 9 (1 P)3 [ρ E1E 45 ρ E1E3 45 ρ E1E4 45 ρ E1E5 45 ρ EE3 45 ρ EE4 45 ρ EE5 45 ρ E3E4 45 ρ E3E5 45 ρ E4E5 45 P 3 7 (1 P) [ρ E1EE3 45 ρ E1EE4 45 ρ E1EE5 45 ρ E1E3E4 45 ρ E1E3E5 45 ρ E1E4E5 45 ρ EE3E4 45 ρ EE3E5 45 ρ EE4E5 45 ρ E3E4E5 45 P 4 (1 P)[ρE1EE3E4 45 ρ E1EE3E ρ E1EE4E5 ρ E1E3E4E5 45 ρ EE3E4E5 45 P 5 43 ρe1ee3e4e5 45. () With ρ 45 = (ρ ) 45, (ρ b ) 45, (ρ c ) 45 or (ρ d ) 45 nd ρ E 45 = (ρ E ) 45, (ρ E b ) 45, (ρ E c ) 45 or (ρ E d ) 45. After trcing over qubits (4, 5) nd multiplying by the recovering gte R g we obtin: ρ E (P) = (1 P) 5 ρ P (1 P)4 3 [ρ E1 ρ E ρ E3 ρ E4 ρ E5 P 9 (1 P)3 [ρ E1E ρ E1E3 ρ E1E4 ρ E1E5 ρ EE3 ρ EE4 ρ EE5 ρ E3E4 ρ E3E5 ρ E4E5 P 3 (1 P) 7 [ρ E1EE3 ρ E1EE4 ρ E1EE5 ρ E1E3E4 ρ E1E3E5 ρ E1E4E5 ρ EE3E4 ρ EE3E5 ρ EE4E5 ρ E3E4E5 P 4 (1 P)[ρE1EE3E4 81 ρ E1EE3E5 ρ E1EE4E5 ρ E1E3E4E5 ρ EE3E4E5 P 5 43 ρe1ee3e4e5. (3) With ρ = Ψ s Ψ s the correct secret nd ρ E = (ρe ), (ρ E b ), (ρ E c ) or (ρ E d ) the secret stte disturbed by error E = E i, E i E j, E i E j E k, E i E j E k E l, or E i E j E k E l E m. We multiply by the secret stte nd integrte over (θ, φ) to obtin the verge fidelity: Ψ s ρ E Ψ s = (1 P) 5 P (1 P)4 3 With [F E1 P F E F E3 9 (1 P)3 [F E1E F E1E5 F E3E4 [F E1EE3 F E1E3E4 F EE3E4 F EE3 F E3E5 F E4 F E1E3 F EE4 F E1EE4 F E1E3E5 F EE3E5 F E5 F E1E4 F EE5 F E4E5 P 3 (1 P) 7 F E1EE5 F E1E4E5 F EE4E5 F E3E4E5 P 4 E1EE3E4 (1 P)[F 81 F E1EE3E5 F E1EE4E5 F E1E3E4E5 F EE3E4E5 P 5 43 F E1EE3E4E5. (4) Ψ s ρ Ψ s = 1, nd F E = Ψ s ρ E Ψ s. (5) We cn write Eq. (4) s Ψ s ρ E Ψ s = (1 P) 5 P 3 (1 P)4 [A P 9 (1 P)3 [B P 3 7 (1 P) [C P 4 81 (1 P)[DP5 43 [E.(6) We deduce from Tbles 3 nd 4 the vlues of F E contined in Tble 5:
5 No. 5 Communictions in Theoreticl Physics 665 Tble 4 Error groups with sme verge fidelity. ε X 1, X 3, Y, X 1 X Z 3, Z 1 X X 3, Y 1 X, Y 1 Z 3, Z 1 Y 3, X Y 3, Y 1 Y Y 3, Y 1 Z X 3, X 1 Y X 3, X 1 Z Y 3, Z 1 Y Z 3 ε b Z 1, X, Z 3, X 1 Z, Z X 3, X 1 X X 3, Z 1 X Z 3, Y 1 Y, Y 1 X 3, Y Y 3, X 1 Y 3, Y 1 X Y 3, Y 1 Z Z 3, X 1 Y Z 3, Z 1 Y X 3, Z 1 Z Y 3 ε c Z, Y 1, Y 3, X 1 X, X X 3, Z Z 3, X 1 Z 3, Z 1 Z, Z 1 X 3, Z 1 Z Z 3, X 1 Z X 3, Y Z 3, Z 1 Y, Y 1 Y X 3, Y 1 X Z 3, Y 1 Z Y 3, X 1 Y Y 3, Z 1 X Y 3 ε d X 1 X 3, Z 1 Z 3, Z 1 X, X Z 3, X 1 Z Z 3, Z 1 Z X 3, Y 1 Y 3, Y 1 Z, Y X 3, X 1 Y, Z Y 3, Y 1 Y Z 3, Y 1 X X 3, Z 1 Y Y 3, X 1 X Y 3, Tble 5 Vlues of F E for ll the possible errors. F E Vlues F E 1, F E, F E 3 (3 1/3)= 1 F E 4, F E 5 (3 1)= 3 F E 1E, F E 1E 3, F E E 3 (6 1/3)(3 1)= 5 F E 1E 4, F E 1E 5, F E E 4, (9 1/3)= 3 F E E 5, F E 3E 4, F E 3E 5 F E 4E 5 (9 1)= 9 F E 1E E 3 (1 1/3)(6 1)= 13 F E 1E E 4, F E 1E 3 E 4, F E E 3 E 4, [(6 3) 1/3[(3 3) 1 = 15 F E 1E E 5, F E 1E 3 E 5, F E E 3 E 5 F E 1E 4 E 5, F E E 4 E 5, F E 3E 4 E 5 (3 9) 1/3= 9 F E 1E E 3 E 4, F E 1E E 3 E 5 [(1 3) 1/3[(6 3) 1 = 39 F E 1E E 4 E 5, F E 1E 3 E 4 E 5, F E E 3 E 4 E 5 (6 9) 1/3(3 9) 1 = 45 F E 1E E 3 E 4 E 5 (1 9) 1/3(6 9) 1 = 117 The clculus gives: A = 9, B = 4, C = 130, D = 13, E = 117. (7) The verge fidelity is then: F (P) = (1 P) 5 3P(1 P) P (1 P) 3 Finlly: P 3 (1 P) 71 7 P 4 (1 P) 13 7 P 5. (8) F (P) = 1 P 8 3 P 3 7 P 3. (9) 3 The Five-Qubit Code We describe below the chnnel error correction by the five qubits code. This code is described in Refs. [6 7 nd uses five qubits to protect one of them in superposed stte from ny error X, Y or Z. We note tht when using ny of the three codes, the fidelity is lwys equl to one if only one mong the five sent qubits is disturbed in the trnsmiting chnnel. However, if two sent qubits nd more re disturbed during the trnsmission, then the fidelity will vry upon the used code. 3.1 Bit nd Phse Flip The deler protects ech of the three qubits (1,, 3) with four ncills s showed in Fig. 3 nd sends them through three noisy chnnels, which introduce bit or phse flip or both with probbility P = 1. Fig. 3 Trnsmission of five protected qubits through five chnnels. We note tht in generl the deler will protect the five qubits s he does not know which plyers will ccess the secret. With The grph stte (3) cn be written s follow: Ψ G = ( /8){[α 0 β 1 i Ψ jklm [α 0 β 1 i Ψ b jklm [β 0 α 1 i Ψ c jklm [β 0 α 1 i Ψ d jklm. (30) [i = 1, (j, k, l, m) =, 3, 4, 5, [i =, (j, k, l, m) = 1, 3, 4, 5 or [i = 3, (j, k, l, m) = 1,, 4, 5. (31)
6 666 Communictions in Theoreticl Physics Vol. 58 The sttes Ψ jklm, Ψ b jklm, Ψ c jklm, Ψ d jklm hve different expressions depending on the vlue of i. We suppose tht the deler knows tht the secret will be ccessed by plyers (1,, 3). Then he will not protect the qubits sent to plyers (4, 5) s the chnnel errors on them do not ffect the ccessed secret. To protect qubit i the deler dds four ncills ech one in the stte 0. After pplying the coding circuit we obtin the coded grph stte Ψ G1 sent by the deler, where 0 l nd 1 l re the logicl qubits: [6 Ψ G1 = ( /8){[α 0 l β 1 l i Ψ jklm [α 0 l β 1 l i Ψ b jklm [β 0 l α 1 l i Ψ c jklm [β 0 l α 1 l i Ψ d jklm. (3) After syndrome mesurement, correction nd decoding, the plyers suppress the ncills. If the qubit i is ffected by error E i = X i, Y i or Z i then the grph stte becomes: Ψ Ei G = E i Ψ G = ( /8){E i [α 0 β 1 i Ψ jklm E i [α 0 β 1 i Ψ b jklm E i [β 0 α 1 i Ψ c jklm E i [β 0 α 1 i Ψ d jklm. (33) Tble 6 gives the syndromes S for the five qubits code of single nd double errors occurring in the logicl qubit i. The double errors re corrected s the single error hving sme syndrome. The third column gives the error E i ffecting the to be protected physicl qubit i fter decoding obtined by Feynmn Progrm. Tble 6 The error E i ffecting the physicl qubit i versus errors on the logicl qubit i. The ncills re designed by j ndthe to be protected qubit by i with i = 1,, 3 nd j = 1,,3, 4. Error S E i X i,(z Z 3 ),(X 3 Z 4, Z 1 X ) 0101 I i, (X i ), (Z i ) X 1, (Z 3 Z 4 ),(Z i X 4, Z X 3 ) 0010 I i, (X i ), (Z i ) X,(Z i Z 4 ),(X i Z 1, Z 3 X 4 ) 1001 I i, (X i ), (Z i ) X 3,(Z i Z 1 ), (X i Z 4, X 1 Z ) 0100 I i, (X i ), (Z i ) X 4,(Z 1 Z ), (X Z 3, Z i X 1 ) 1010 I i, (X i ), (Z i ) Z i,(x 1 X 4 ), (X Z 4, Z 1 X 3 ) 1000 I i, (X i ), (Z i ) Z 1,(X i X ), (Z i X 3, Z X 4 ) 1100 I i, (X i ), (Z i ) Z, (X 1 X 3 ), (X i Z 3, Z 1 X 4 ) 0110 I i, (X i ), (Z i ) Z 3,(X X 4 ),(X i Z, X 1 Z 4 ) 0011 I i, (X i ), (Z i ) Z 4, (X i X 3 ), (X 1 Z 3, Z i X ) 0001 I i, (X i ), (Z i ) Y i,(x X 3, Z 1 Z 4 ) 1101 I i, (Y i ) Y 1,(X 3 X 4, Z i Z ) 1110 I i, (Y i ) Y,(X i X 4, Z 1 Z 3 ) 1111 I i, (Y i ) Y 3,(X i X 1, Z Z 4 ) 0111 I i, (Y i ) Y 4,(X 1 X, Z i Z 3 ) 1011 I i, (Y i ) 3. Depolrizing Chnnel Consider three double errors E k E l, E m E n nd E o E p occurring respectively in chnnels 1,, nd 3 on ny qubits (k, l, m, n, o, p) nd corrected s the three single error with similr syndrome. The qubits (4, 5) re not protected nd cn be ffected by ny error X, Y or Z. If the probbility tht chnnel error occurs on one qubit is equl to P, then the density mtrix received by the five plyers is: ρ E (13)(45) = (1 P)8 ρ (13)(45) P 3 (1 P)7[ ρ E x (13)(45) P 3 (1 P)6[ E ρ xe y (13)(45) P 4 P 5 P (1 P)5[ E ρ xe ye z [ E ρ xe ye ze ue v (13)(45) P 6 (13)(45) 3 4 (1 P)4[ E ρ xe ye ze u (13)(45) 3 6 (1 P)[ E ρ xe ye ze ue ve w (13)(45) P 8 (1 P)3 35 P 7 [ [ 3 7 (1 P) E ρ xe ye ze ue ve we s E (13)(45) ρ k E l E me ne oe pe 4E (13)(45). (34) The nottion (13) represents the logicl qubits 1,, nd 3, ech one protected by four ncills nd: ρ E x (13)(45) =ρe k (13)(45) ρe l (13)(45) ρem (13)(45) ρen (13)(45) ρeo (13)(45) ρep (13)(45) ρe4 (13)(45) ρe5 (13)(45), (35) ρ E k (13)(45) = ρx k (13)(45) ρy k (13)(45) ρz k (13)(45) ; ρx k (13)(45) = X k ρ (13)(45)X k. The summtions ρ Ex (13)(45), ρ ExEy (13)(45), ρ ExEyEz (13)(45), ρ ExEyEzEu (13)(45), ρ ExEyEzEuEv (13)(45), ρ ExEyEzEuEvEw (13)(45), nd E ρ xe ye ze ue ve we s (13)(45) contin respectively 8X3, 8X3, 56X3 3, 70X3 4, 56X3 5, 8X 3 6, nd 8X3 7 terms. The expression ρ E ke l E me ne oe pe 4E 5 (13)(45) is the summtion of 3 8 terms. After decoding nd suppressing the ncills we obtin by using Tbles 6 the ffected grph stte: [ ρ E (1,...,5) = (1 P) 8 18 P 3 (1 P)7 108 P 9 (1 P)6 16 P 3 7 (1 P)5 ρ (1,...,5) [3 P 9 (1 P)6 36 P 3 7 (1 P)5 108 P 4 81 (1 P)4 [ρ E1 (1,...,5) ρe (1,...,5) ρe3 (1,...,5) [9 P 4 81 (1 P)4 54 P 5 43 (1 P)3[ ρ E1E (1,...,5) ρe1e3 (1,...,5) ρee3 (1,...,5) [ 1 7 P 6 (1 P) [ρ E1EE3 (1,...,5) (35b)
7 No. 5 Communictions in Theoreticl Physics (1 P)7 18 P 9 (1 P)6 108 P 3 7 (1 P)5 16 P 4 81 (1 P)4 [ρ E4 (1,...,5) ρe5 (1,...,5) 9 (1 P)6 18 P 3 7 (1 P)5 108 P 4 81 (1 P)4 16 P 5 [ 43 (1 P)3 [ρ E4E5 (1,...,5) 36 P 4 81 (1 P)4 108 P 5 43 (1 P)3 [ρ E1E4 (1,...,5) ρe1e5 (1,...,5) ρee4 (1,...,5) ρee5 (1,...,5) ρe3e4 (1,...,5) ρe3e5 (1,...,5) 3 P 3 (1 P)5 7 [3 P 4 81 (1 P)4 36 P 5 43 (1 P)3 108 P 6 [ 3 6 (1 P) [ρ E1E4E5 (1,...,5) ρee4e5 (1,...,5) ρe3e4e5 (1,...,5) 9 P 5 (1 P) P (1 P) [ρ E1EE4 (1,...,5) ρe1ee5 (1,...,5) ρe1e3e4 (1,...,5) ρe1e3e5 (1,...,5) ρee3e4 (1,...,5) ρee3e5 (1,...,5) [9 P (1 P) 54 P (1 P) [ρ E1EE4E5 (1,...,5) ρ E1E3E4E5 (1,...,5) ρ EE3E4E5 (1,...,5) [7 P (1 P) [ρ E1EE3E4 (1,...,5) ρ E1EE3E5 (1,...,5) P [7ρE1EE3E4E5 (1,...,5). (36) After mesuring on the Bell sttes of qubits (1, 3), trcing over qubits (4, 5), multiplying by the recovering gte nd the secret stte nd integrting we obtin the verge fidelity: F (P) = Ψ s ρ E Ψ s = [(1 P) 8 18 P 3 (1 P)7 108 P (1 P)5 [3 P 9 (1 P)6 36 P 3 [9 P 4 81 (1 P)4 54 P 5 3 (1 P)7 18 P 7 (1 P)5 108 P 4 43 (1 P)3 [F E1E 9 (1 P)6 16 P (1 P)4 [F E1 F E1E3 F E F E3 [ 1 F EE3 7 P 6 (1 P) [F E1EE3 F E5 9 (1 P)6 108 P 3 7 (1 P)5 16 P 4 81 (1 P)4 [F E4 9 (1 P)6 18 P 3 7 (1 P)5 108 P 4 81 (1 P)4 16 P 5 43 (1 P)3 [F E4E5 [3 P 3 7 (1 P)5 36 P 4 81 (1 P)4 108 P 5 43 (1 P)3 [F E1E4 F E1E5 F EE4 [3 P 4 81 (1 P)4 36 P 5 43 (1 P)3 108 P (1 P) [F E1E4E5 F EE4E5 [9 P 5 43 (1 P)3 54 P (1 P) [F E1EE4 F E1EE5 F E1E3E4 F E1E3E5 [9 P (1 P) 54 P (1 P) [F E1EE4E5 F E1E3E4E5 F EE3E4E5 [7 P (1 P) [F E1EE3E4 F E1EE3E5 7 P 8 F EE5 F E3E4E5 F E3E4 F EE3E4 F EE3E5 F E3E5 E1EE3E4E5 [F 38. (37) We deduce from Tble 5: F (P) = [(1 P) 8 18 P 3 (1 P)7 108 P 9 (1 P)6 16 P 3 (1 P)5 7 [3 P 9 (1 P)6 36 P 3 7 (1 P)5 108 P 4 81 (1 P)4 [3 [9 P 4 81 (1 P)4 54 P 5 43 (1 P)3 [15 [ 1 7 P 6 (1 P) [13 3 (1 P)7 18 P 9 (1 P)6 108 P 3 7 (1 P)5 16 P 4 81 (1 P)4 [6 9 (1 P)6 18 P 3 7 (1 P)5 108 P 4 81 (1 P)4 16 P 5 43 (1 P)3 [9 [3 P 3 7 (1 P)5 36 P 4 81 (1 P)4 108 P 5 43 (1 P)3 [18 [3 P 4 (1 P) P 5 43 (1 P)3 108 P (1 P) [7 [9 P 5 43 (1 P)3 54 P (1 P) [90 [9 P (1 P) 54 P (1 P) [135 [7 P (1 P) [78 7 P 8 [117. (38) 38
8 668 Communictions in Theoreticl Physics Vol. 58 Then: F (P) = (1 P) 8 8P(1 P) 7 6P (1 P) 6 44P 3 (1 P) P 4 (1 P) P 5 (1 P) P 6 (1 P) P 7 (1 P) 13 7 P 8. (39) 4 The Seven-Qubit Code This code is described in Ref. [8 nd uses five qubits to protect one of them ginst n X, Y or Z error. Tbles 7 9 depict the error E i on the protected qubit i (fter correction) for different chnnel errors E. Tble 7 Syndromes nd the error E i ffecting the protected qubits i fter correction by n opertors X k or Y k (k = 1,..., 7). E S E i E S E i X 1,(X X 3, X 4 X 5, X 6 X 7 ) I i,(x i ) Y I i X, (X 1 X 3, X 4 X 6, X 5 X 7 ) I i,(x i ) Y I i X 3, (X 1 X, X 5 X 6, X 4 X 7 ) I i,(x i ) Y I i X 4,(X 1 X 5, X X 6, X 3 X 7 ) I i, (X i ) Y I i X 5,(X 1 X 4, X X 7, X 3 X6) I i,(x i ) Y I i X 6,(X 1 X 7, X X 4, X 3 X 5 ) I i,(x i ) Y I i X 7,(X 1 X 6, X X 5, X 3 X 4 ) I i,(x i ) Y I i Tble 8 Syndromes nd the error ffecting the protected qubits fter correction by n opertor Z k (k = 1,..., 7). Errors S E i Z1, (Z6Z7, ZZ 3, Z4Z 5) I i,(z i ) Z,(Z1Z 3, Z4Z 6, Z5Z 7) I i,(z i ) Z 3,(Z4Z 7, Z1Z, Z5Z 6) I i,(z i ) Z 4,(Z3Z 7, Z1Z 5, ZZ 6) I i,(z i ) Z 5, (ZZ7, Z1Z 4, Z3Z 6) I i,(z i ) Z 6,(Z1Z 7, ZZ 4, Z3Z 5) I i,(z i ) Z 7,(Z1Z 6, ZZ 5, Z3Z 4) I i,(z i ) Tble 9 Syndromes of double chnnels errors Z k X l not ffecting the protected qubits fter correction. Errors S Errors S Errors S X 1 Z Z 1 X Z 1 X X 1 Z Z X X1Z X 1 Z Z 3 X X1Z X 1 Z Z 1 X X Z X Z Z X X Z X 3 Z Z 1 X X Z X 3 Z Z X X Z X 3 Z Z 3 X X Z X 4 Z Z 1 X Z X X 5 Z Z X X 4 Z X 6 Z Z 3 X X 4 Z X 6 Z Z 4 X Z 4 X X 5 Z Z 3 X X 3 Z The Nine-Qubit Code This code clled the Shor code nd explined in Ref. [6 uses nine qubits to protect one of them in superposed stte from ny error X, Y or Z. The simultion with Feynmn Progrm gives in Tbles the error E i ffecting the protected qubits (fter correction) for different single nd double chnnels errors E on logicl qubit i.
9 No. 5 Communictions in Theoreticl Physics 669 Tble 10 Syndromes S nd the E i error ffecting the protected qubits fter correction by n opertors X k (k = 1,..., 9). E S E i Y 1, X 1 Z, I i Y, X Z 1, I i Y 3, X 3 Z 1, I i Y 4, X 4 Z 5, I i Y 5, X 5 Z 4, I i Y 6, X 6 Z 4, I i Y 7, X 7 Z 8, I i Y 8, X 8 Z 7, I i Y 9, X 9 Z 7, I i Tble 11 Syndromes S nd the E i ffecting the protected qubits fter correction by n opertors Y k (k = 1,..., 9). E S E i Y 1, X 1 Z, I i Y, X Z 1, I i Y 3, X 3 Z 1, I i Y 4, X 4 Z 5, I i Y 5, X 5 Z 4, I i Y 6, X 6 Z 4, I i Y 7, X 7 Z 8, I i Y 8, X 8 Z 7, I i Y 9, X 9 Z 7, I i Tble 1 Syndromes S nd the E i ffecting the protected qubits fter correction by n opertor Z k (k = 1,..., 9). Errors S E i (Z 1, Z, Z 3 ), (Z 4 Z7,8,9, Z 5Z7,8,9, Z6Z7,8,9) (I i ),(X i ) (Z 4, Z 5, Z 6 ), (Z1Z7,8,9, ZZ7,8,9, Z3Z7,8,9) (I i ),(X i ) (Z 7, Z 8, Z 9 ), (Z 1Z 4,5,6, ZZ 4,5,6, Z3Z 4,5,6 ) (I i ),(X i ) (Z1Z,3, ZZ3, Z 4Z5,6, Z5Z6, Z7Z8,9, Z8Z9) (I i ) Tble 13 Syndromes S of double chnnels errors X k X l not ffecting the protected qubits fter correction. E S E S E S X1X XX X4X X1X XX X4X X1X XX X4X X1X X3X X5X X1X X3X X5X X1X X3X X5X XX X3X X 6 X XX X3X X6X XX X 3 X X6X
10 670 Communictions in Theoreticl Physics Vol. 58 Tble 14 Syndromes of double chnnels errors X k Z l not ffecting the protected qubits fter correction. E S E S X 1 Z 4,5, X 4 Z 1,, X 1 Z 7,8, X 5 Z 1,, X Z 7,8, X 6 Z 1,, X Z 4,5, X 7 Z 1,, X 3 Z 4,5, X 8 Z 1,, X 3 Z 7,8, X 9 Z 1,, X 4 Z 7,8, X 7 Z 4,5, X 5 Z 7,8, X 8 Z 4,5, X 6 Z 7,8, X 9 Z 4,5, Comprison Among the Three Codes The procedure giving the verge fidelity described in Sec. 4 is the sme for the seven nd nine qubits codes. The difference comes from the number n of double chnnel errors hving n exclusive syndrome llowing their recovery, then letting the protected qubit error free. We suppose tht triple chnnel errors nd more re very unlikely. We deduce from Tbles 6 14 nd for ech code the next frctions of recoverble double chnnel errors: n 5 N 5 = 0, n 7 = 39 N 7 81, n 9 = 108 N (40) With N 5 =40, N 7 = 81, nd N 9 = 144 the totl number of double errors for ech code. We cn deduce the verge fidelity by chnging the vlue F = 1/3 in Tble 3 by n verge vlue f n nd obtin for ech code: f 5 = 1 3, f 7= (n 7 1 (N 7 n 7 ) 1/3 = , f 9 = (n 9 1 (N 9 n 9 ) 1/3 = (41) We substitute in Tble 5 the vlue 1/3 by the verge vlue f n (except in the lst rrow s for P = 1 the errors re unrecoverble whtever is the code). Eqution (39) becomes: F (P) = Ψ s ρ E Ψ s = [(1 P) 8 18 P 3 (1 P)7 108 P 9 (1 P)6 16 P 3 (1 P)5 7 [3 P 9 (1 P)6 36 P 3 7 (1 P)5 108 P 4 81 (1 P)4 [9f n [9 P 4 81 (1 P)4 54 P 5 43 (1 P)3 [3(6f n 3) [ 1 7 P 6 (1 P) [1f n 6 3 (1 P)7 18 P 9 (1 P)6 108 P 3 7 (1 P)5 16 P 4 81 (1 P)4 [6 9 (1 P)6 18 P 3 7 (1 P)5 108 P 4 81 (1 P)4 16 P 5 43 (1 P)3 [9 [3 P 3 (1 P) P 4 81 (1 P)4 108 P 5 43 (1 P)3 [54f n [3 P 4 81 (1 P)4 36 P 5 43 (1 P)3 108 P (1 P) [81f n [9 P 5 43 (1 P)3 54 P (1 P) [54(f n 1) [9 P (1 P) 54 P (1 P) [81(f n 1 [7 P (1 P) [18(7f n ) 7 P 8 [117. (4) 38 We obtin: F (P) = (1 P) 8 8P(1 P) 7 (3f n 5)P (1 P) 6 7 Summry (18f n 38)P 3 (1 P) 5 (41f n 9)P 4 (1 P) 4 (44f n 1)P 5 (1 P) 3 ( 05fn 47 ) P 6 (1 P) 9 ( 50fn ) P 7 (1 P) P 8. (43) Tble 15 summrizes ll the results nd Fig. 4 compres the verge fidelity without nd with correction by the three codes. Figure 1 shows logiclly tht the verge fidelity is decresing with P without nd with correction by ny code. The vlues of fidelity re lwys better nd the decrese is slower when using codes. The best verge fidelity is given by the nine qubits code, followed by the seven qubits then the five qubits code. The reson is tht for the five qubits code ll the double errors (in logicl qubit) let the protected qubits ffected, while some of them could be covered when using the two other codes. Fig. 4 (Color online) Fidelity without nd with correction by the five, seven nd nine qubits codes.
11 No. 5 Communictions in Theoreticl Physics 671 We consider in this work tht triple errors (in logicl qubits) nd more re very unlikely, so tht syndrome mesurement llows (in seven nd nine qubits code) recovering errors. We note tht if P = 1, then the verge fidelity F(P = 1) =13/7= is the sme regrdless the used code. Tble 15 Fidelity without nd with correction by the five, seven nd nine qubits codes. The symbol C 0 corresponds to no correction. Code F (P) C 0 1 P 8 3 P 3 7 P3 (1 P) 8 8P(1 P) 7 (3f n 5)P (1 P) 6 (18f n 38)P 3 (1 P) 5 (41f n 9)P 4 (1 P) 4 C n ( ) ( ) (44f n 1)P 5 (1 P) 3 05fn 47 P 6 (1 P) 7 50fn P (1 P) P8 (1 P) 8 8P(1 P) 7 6P (1 P) 6 44P 3 (1 P) P4 (1 P) 4 C P5 (1 P) P6 (1 P) P7 (1 P) 13 7 P8 (1 P) 8 8P(1 P) P (1 P) P3 (1 P) P4 (1 P) 4 C P5 (1 P) P6 (1 P) P7 (1 P) 13 7 P8 (1 P) 8 8P(1 P) 7 55 P (1 P) 6 53P 3 (1 P) P4 (1 P) 4 C P5 (1 P) P6 (1 P) P7 (1 P) 13 7 P8 8 Conclusion This work ws devoted to error correction for quntum secret shring. The results show tht the nine qubits code gives the best fidelity, followed by the seven, then the five qubits code, regrdless the depolrizing chnnel error probbility P. This conclusion seems to confirm the simultion work done in Ref. [9 where errors were introduced by the correction process itself. We conclude tht higher is the ncills number better is the fidelity. The reson is tht the nine qubits code offers higher frction of double chnnel errors letting unffected the received useful qubit. In fct, s only single nd double errors hve been considered, the nine qubits code gives specific syndrome for higher number of double errors, then llowing their recovery which led to fidelity equl to one. We hve supposed tht triple errors nd more re very unlikely nd then with negligible effect on the obtined results. Acknowledgments We would like to thnk very much Mrs. S. Fritzsch nd T. Rdtke for providing us with the version 4 (008) of Feynmn Progrm. References [1 Dmin Mrkhm nd Brry C. Snders, Phys. Rev. A 78 (008) [ T. Rdtke nd S. Fritzsche, Compt. Phys. Commun. 173 (005) 91. [3 T. Rdtke nd S. Fritzsche, Compt. Phys. Commun. 175 (006) 145. [4 T. Rdtke nd S. Fritzsche, Compt. Phys. Commun. 176 (007) 617. [5 T. Rdtke nd S Fritzsche, Compt. Phys. Commun. 179 (008) 647. [6 M.A. Nielsen nd I.L. Chung, Quntum Computtion nd Informtion, Cmbridge University Press, Cmbridge (000). [7 Rymond Lflmme, et l., Phys. Rev. Lett. 77 (1996) 198. [8 A.M. Stene, Proc. R. Soc. Lond. A 45 (1996) 551, qunt-ph/ [9 Jumpei Niw, Keiji Mtsumoto, nd Hiroshi Imi, Simulting the Effects of Quntum Error-correction Schemes, rxiv:qunt-ph/011071v1, 13 Nov. (00).
Entanglement Purification
Lecture Note Entnglement Purifiction Jin-Wei Pn 6.5. Introduction( Both long distnce quntum teleporttion or glol quntum key distriution need to distriute certin supply of pirs of prticles in mximlly entngled
More informationExtended nonlocal games from quantum-classical games
Extended nonlocl gmes from quntum-clssicl gmes Theory Seminr incent Russo niversity of Wterloo October 17, 2016 Outline Extended nonlocl gmes nd quntum-clssicl gmes Entngled vlues nd the dimension of entnglement
More informationResearch Collection. Quantum error correction (QEC) Student Paper. ETH Library. Author(s): Baumann, Rainer. Publication Date: 2003
Reserch Collection Student Pper Quntum error correction (QEC) Author(s): Bumnn, Riner Publiction Dte: 3 Permnent Link: https://doi.org/.399/ethz--4778 Rights / License: In Copyright - Non-Commercil Use
More informationScientific notation is a way of expressing really big numbers or really small numbers.
Scientific Nottion (Stndrd form) Scientific nottion is wy of expressing relly big numbers or relly smll numbers. It is most often used in scientific clcultions where the nlysis must be very precise. Scientific
More informationSufficient condition on noise correlations for scalable quantum computing
Sufficient condition on noise correltions for sclble quntum computing John Presill, 2 Februry 202 Is quntum computing sclble? The ccurcy threshold theorem for quntum computtion estblishes tht sclbility
More informationOperations Algorithms on Quantum Computer
IJCSNS Interntionl Journl of Computer Science nd Network Security, VOL. No., Jnury 2 85 Opertions Algorithms on Quntum Computer Moyd A. Fhdil, Ali Foud Al-Azwi, nd Smmer Sid Informtion Technology Fculty,
More informationGoals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite
Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite
More informationDEFINITION OF ASSOCIATIVE OR DIRECT PRODUCT AND ROTATION OF VECTORS
3 DEFINITION OF ASSOCIATIVE OR DIRECT PRODUCT AND ROTATION OF VECTORS This chpter summrizes few properties of Cli ord Algebr nd describe its usefulness in e ecting vector rottions. 3.1 De nition of Associtive
More informationNew data structures to reduce data size and search time
New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute
More informationLocal orthogonality: a multipartite principle for (quantum) correlations
Locl orthogonlity: multiprtite principle for (quntum) correltions Antonio Acín ICREA Professor t ICFO-Institut de Ciencies Fotoniques, Brcelon Cusl Structure in Quntum Theory, Bensque, Spin, June 2013
More informationChapter 4 Contravariance, Covariance, and Spacetime Diagrams
Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz
More informationImproper Integrals, and Differential Equations
Improper Integrls, nd Differentil Equtions October 22, 204 5.3 Improper Integrls Previously, we discussed how integrls correspond to res. More specificlly, we sid tht for function f(x), the region creted
More informationThe Wave Equation I. MA 436 Kurt Bryan
1 Introduction The Wve Eqution I MA 436 Kurt Bryn Consider string stretching long the x xis, of indeterminte (or even infinite!) length. We wnt to derive n eqution which models the motion of the string
More information1 Online Learning and Regret Minimization
2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in
More informationHW3, Math 307. CSUF. Spring 2007.
HW, Mth 7. CSUF. Spring 7. Nsser M. Abbsi Spring 7 Compiled on November 5, 8 t 8:8m public Contents Section.6, problem Section.6, problem Section.6, problem 5 Section.6, problem 7 6 5 Section.6, problem
More informationCHM Physical Chemistry I Chapter 1 - Supplementary Material
CHM 3410 - Physicl Chemistry I Chpter 1 - Supplementry Mteril For review of some bsic concepts in mth, see Atkins "Mthemticl Bckground 1 (pp 59-6), nd "Mthemticl Bckground " (pp 109-111). 1. Derivtion
More informationA REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H. Thomas Shores Department of Mathematics University of Nebraska Spring 2007
A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H Thoms Shores Deprtment of Mthemtics University of Nebrsk Spring 2007 Contents Rtes of Chnge nd Derivtives 1 Dierentils 4 Are nd Integrls 5 Multivrite Clculus
More informationThe Fundamental Theorem of Calculus. The Total Change Theorem and the Area Under a Curve.
Clculus Li Vs The Fundmentl Theorem of Clculus. The Totl Chnge Theorem nd the Are Under Curve. Recll the following fct from Clculus course. If continuous function f(x) represents the rte of chnge of F
More information7.2 The Definite Integral
7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where
More informationa a a a a a a a a a a a a a a a a a a a a a a a In this section, we introduce a general formula for computing determinants.
Section 9 The Lplce Expnsion In the lst section, we defined the determinnt of (3 3) mtrix A 12 to be 22 12 21 22 2231 22 12 21. In this section, we introduce generl formul for computing determinnts. Rewriting
More informationFundamental Theorem of Calculus and Computations on Some Special Henstock-Kurzweil Integrals
Fundmentl Theorem of Clculus nd Computtions on Some Specil Henstock-Kurzweil Integrls Wei-Chi YANG wyng@rdford.edu Deprtment of Mthemtics nd Sttistics Rdford University Rdford, VA 24142 USA DING, Xiofeng
More informationState space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies
Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response
More informationUNIT 1 FUNCTIONS AND THEIR INVERSES Lesson 1.4: Logarithmic Functions as Inverses Instruction
Lesson : Logrithmic Functions s Inverses Prerequisite Skills This lesson requires the use of the following skills: determining the dependent nd independent vribles in n exponentil function bsed on dt from
More informationA BRIEF INTRODUCTION TO UNIFORM CONVERGENCE. In the study of Fourier series, several questions arise naturally, such as: c n e int
A BRIEF INTRODUCTION TO UNIFORM CONVERGENCE HANS RINGSTRÖM. Questions nd exmples In the study of Fourier series, severl questions rise nturlly, such s: () (2) re there conditions on c n, n Z, which ensure
More informationProperties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives
Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn
More information13: Diffusion in 2 Energy Groups
3: Diffusion in Energy Groups B. Rouben McMster University Course EP 4D3/6D3 Nucler Rector Anlysis (Rector Physics) 5 Sept.-Dec. 5 September Contents We study the diffusion eqution in two energy groups
More informationVyacheslav Telnin. Search for New Numbers.
Vycheslv Telnin Serch for New Numbers. 1 CHAPTER I 2 I.1 Introduction. In 1984, in the first issue for tht yer of the Science nd Life mgzine, I red the rticle "Non-Stndrd Anlysis" by V. Uspensky, in which
More informationNUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.
NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with
More informationMATH , Calculus 2, Fall 2018
MATH 36-2, 36-3 Clculus 2, Fll 28 The FUNdmentl Theorem of Clculus Sections 5.4 nd 5.5 This worksheet focuses on the most importnt theorem in clculus. In fct, the Fundmentl Theorem of Clculus (FTC is rgubly
More informationArithmetic & Algebra. NCTM National Conference, 2017
NCTM Ntionl Conference, 2017 Arithmetic & Algebr Hether Dlls, UCLA Mthemtics & The Curtis Center Roger Howe, Yle Mthemtics & Texs A & M School of Eduction Relted Common Core Stndrds First instnce of vrible
More informationThe area under the graph of f and above the x-axis between a and b is denoted by. f(x) dx. π O
1 Section 5. The Definite Integrl Suppose tht function f is continuous nd positive over n intervl [, ]. y = f(x) x The re under the grph of f nd ove the x-xis etween nd is denoted y f(x) dx nd clled the
More informationMath 520 Final Exam Topic Outline Sections 1 3 (Xiao/Dumas/Liaw) Spring 2008
Mth 520 Finl Exm Topic Outline Sections 1 3 (Xio/Dums/Liw) Spring 2008 The finl exm will be held on Tuesdy, My 13, 2-5pm in 117 McMilln Wht will be covered The finl exm will cover the mteril from ll of
More informationSUMMER KNOWHOW STUDY AND LEARNING CENTRE
SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18
More informationFractals on non-euclidean metric
Frctls on non-eucliden metric Yery Cchón Sntn April, 8 As fr s I know, there is no study on frctls on non eucliden metrics.this pper proposes rst pproch method bout generting frctls on non-eucliden metric.
More informationTopological Quantum Compiling
Topologicl Quntum Compiling Work in collbortion with: Lyl Hormozi Georgios Zikos Steven H. Simon Michel Freedmn Nd Petrovic Florid Stte University Lucent Technologies Microsoft Project Q UCSB NEB, L. Hormozi,
More informationRiemann Sums and Riemann Integrals
Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct
More informationNew Expansion and Infinite Series
Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University
More informationCBE 291b - Computation And Optimization For Engineers
The University of Western Ontrio Fculty of Engineering Science Deprtment of Chemicl nd Biochemicl Engineering CBE 9b - Computtion And Optimiztion For Engineers Mtlb Project Introduction Prof. A. Jutn Jn
More informationRiemann is the Mann! (But Lebesgue may besgue to differ.)
Riemnn is the Mnn! (But Lebesgue my besgue to differ.) Leo Livshits My 2, 2008 1 For finite intervls in R We hve seen in clss tht every continuous function f : [, b] R hs the property tht for every ɛ >
More informationHow to simulate Turing machines by invertible one-dimensional cellular automata
How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex
More informationAdvanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004
Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when
More informationDo the one-dimensional kinetic energy and momentum operators commute? If not, what operator does their commutator represent?
1 Problem 1 Do the one-dimensionl kinetic energy nd momentum opertors commute? If not, wht opertor does their commuttor represent? KE ˆ h m d ˆP i h d 1.1 Solution This question requires clculting the
More informationMath 1B, lecture 4: Error bounds for numerical methods
Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the
More informationWe divide the interval [a, b] into subintervals of equal length x = b a n
Arc Length Given curve C defined by function f(x), we wnt to find the length of this curve between nd b. We do this by using process similr to wht we did in defining the Riemnn Sum of definite integrl:
More informationRiemann Sums and Riemann Integrals
Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties
More informationIntro to Nuclear and Particle Physics (5110)
Intro to Nucler nd Prticle Physics (5110) Feb, 009 The Nucler Mss Spectrum The Liquid Drop Model //009 1 E(MeV) n n(n-1)/ E/[ n(n-1)/] (MeV/pir) 1 C 16 O 0 Ne 4 Mg 7.7 14.44 19.17 8.48 4 5 6 6 10 15.4.41
More informationConvert the NFA into DFA
Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:
More informationJack Simons, Henry Eyring Scientist and Professor Chemistry Department University of Utah
1. Born-Oppenheimer pprox.- energy surfces 2. Men-field (Hrtree-Fock) theory- orbitls 3. Pros nd cons of HF- RHF, UHF 4. Beyond HF- why? 5. First, one usully does HF-how? 6. Bsis sets nd nottions 7. MPn,
More informationLecture Notes PH 411/511 ECE 598 A. La Rosa Portland State University INTRODUCTION TO QUANTUM MECHANICS
Lecture Notes PH 4/5 ECE 598. L Ros Portlnd Stte University INTRODUCTION TO QUNTUM MECHNICS Underlying subject of the PROJECT ssignment: QUNTUM ENTNGLEMENT Fundmentls: EPR s view on the completeness of
More informationMath 8 Winter 2015 Applications of Integration
Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl
More information7.1 Integral as Net Change and 7.2 Areas in the Plane Calculus
7.1 Integrl s Net Chnge nd 7. Ares in the Plne Clculus 7.1 INTEGRAL AS NET CHANGE Notecrds from 7.1: Displcement vs Totl Distnce, Integrl s Net Chnge We hve lredy seen how the position of n oject cn e
More informationAPPROXIMATE INTEGRATION
APPROXIMATE INTEGRATION. Introduction We hve seen tht there re functions whose nti-derivtives cnnot be expressed in closed form. For these resons ny definite integrl involving these integrnds cnnot be
More informationSection 6.1 INTRO to LAPLACE TRANSFORMS
Section 6. INTRO to LAPLACE TRANSFORMS Key terms: Improper Integrl; diverge, converge A A f(t)dt lim f(t)dt Piecewise Continuous Function; jump discontinuity Function of Exponentil Order Lplce Trnsform
More information13.4 Work done by Constant Forces
13.4 Work done by Constnt Forces We will begin our discussion of the concept of work by nlyzing the motion of n object in one dimension cted on by constnt forces. Let s consider the following exmple: push
More informationDETERMINATION OF MECHANICAL PROPERTIES OF NANOSTRUCTURES WITH COMPLEX CRYSTAL LATTICE USING MOMENT INTERACTION AT MICROSCALE
Determintion RevAdvMterSci of mechnicl 0(009) -7 properties of nnostructures with complex crystl lttice using DETERMINATION OF MECHANICAL PROPERTIES OF NANOSTRUCTURES WITH COMPLEX CRYSTAL LATTICE USING
More informationClassical Mechanics. From Molecular to Con/nuum Physics I WS 11/12 Emiliano Ippoli/ October, 2011
Clssicl Mechnics From Moleculr to Con/nuum Physics I WS 11/12 Emilino Ippoli/ October, 2011 Wednesdy, October 12, 2011 Review Mthemtics... Physics Bsic thermodynmics Temperture, idel gs, kinetic gs theory,
More informationStudent Activity 3: Single Factor ANOVA
MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether
More informationThe practical version
Roerto s Notes on Integrl Clculus Chpter 4: Definite integrls nd the FTC Section 7 The Fundmentl Theorem of Clculus: The prcticl version Wht you need to know lredy: The theoreticl version of the FTC. Wht
More informationRecitation 3: More Applications of the Derivative
Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech
More informationset is not closed under matrix [ multiplication, ] and does not form a group.
Prolem 2.3: Which of the following collections of 2 2 mtrices with rel entries form groups under [ mtrix ] multipliction? i) Those of the form for which c d 2 Answer: The set of such mtrices is not closed
More informationES.182A Topic 32 Notes Jeremy Orloff
ES.8A Topic 3 Notes Jerem Orloff 3 Polr coordintes nd double integrls 3. Polr Coordintes (, ) = (r cos(θ), r sin(θ)) r θ Stndrd,, r, θ tringle Polr coordintes re just stndrd trigonometric reltions. In
More informationLesson 1: Quadratic Equations
Lesson 1: Qudrtic Equtions Qudrtic Eqution: The qudrtic eqution in form is. In this section, we will review 4 methods of qudrtic equtions, nd when it is most to use ech method. 1. 3.. 4. Method 1: Fctoring
More informationp-adic Egyptian Fractions
p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction
More information1 The fundamental theorems of calculus.
The fundmentl theorems of clculus. The fundmentl theorems of clculus. Evluting definite integrls. The indefinite integrl- new nme for nti-derivtive. Differentiting integrls. Tody we provide the connection
More informationarxiv: v1 [quant-ph] 27 May 2015
Clssicl Verifiction of Quntum Proofs rxiv:1505.0743v1 [qunt-ph] 7 My 015 Zhengfeng Ji Institute for Quntum Computing nd School of Computer Science, University of Wterloo, Wterloo, Ontrio, Cnd Stte Key
More informationNumerical Linear Algebra Assignment 008
Numericl Liner Algebr Assignment 008 Nguyen Qun B Hong Students t Fculty of Mth nd Computer Science, Ho Chi Minh University of Science, Vietnm emil. nguyenqunbhong@gmil.com blog. http://hongnguyenqunb.wordpress.com
More informationSummary: Method of Separation of Variables
Physics 246 Electricity nd Mgnetism I, Fll 26, Lecture 22 1 Summry: Method of Seprtion of Vribles 1. Seprtion of Vribles in Crtesin Coordintes 2. Fourier Series Suggested Reding: Griffiths: Chpter 3, Section
More informationReview of Calculus, cont d
Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some
More informationChapter 3. Vector Spaces
3.4 Liner Trnsformtions 1 Chpter 3. Vector Spces 3.4 Liner Trnsformtions Note. We hve lredy studied liner trnsformtions from R n into R m. Now we look t liner trnsformtions from one generl vector spce
More informationAbstract inner product spaces
WEEK 4 Abstrct inner product spces Definition An inner product spce is vector spce V over the rel field R equipped with rule for multiplying vectors, such tht the product of two vectors is sclr, nd the
More informationPhysics 202H - Introductory Quantum Physics I Homework #08 - Solutions Fall 2004 Due 5:01 PM, Monday 2004/11/15
Physics H - Introductory Quntum Physics I Homework #8 - Solutions Fll 4 Due 5:1 PM, Mondy 4/11/15 [55 points totl] Journl questions. Briefly shre your thoughts on the following questions: Of the mteril
More informationVector potential quantization and the photon wave-particle representation
Vector potentil quntiztion nd the photon wve-prticle representtion Constntin Meis, Pierre-Richrd Dhoo To cite this version: Constntin Meis, Pierre-Richrd Dhoo. Vector potentil quntiztion nd the photon
More informationX Z Y Table 1: Possibles values for Y = XZ. 1, p
ECE 534: Elements of Informtion Theory, Fll 00 Homework 7 Solutions ll by Kenneth Plcio Bus October 4, 00. Problem 7.3. Binry multiplier chnnel () Consider the chnnel Y = XZ, where X nd Z re independent
More informationDIRECT CURRENT CIRCUITS
DRECT CURRENT CUTS ELECTRC POWER Consider the circuit shown in the Figure where bttery is connected to resistor R. A positive chrge dq will gin potentil energy s it moves from point to point b through
More informationMath& 152 Section Integration by Parts
Mth& 5 Section 7. - Integrtion by Prts Integrtion by prts is rule tht trnsforms the integrl of the product of two functions into other (idelly simpler) integrls. Recll from Clculus I tht given two differentible
More information4. Calculus of Variations
4. Clculus of Vritions Introduction - Typicl Problems The clculus of vritions generlises the theory of mxim nd minim. Exmple (): Shortest distnce between two points. On given surfce (e.g. plne), nd the
More informationPhysics 116C Solution of inhomogeneous ordinary differential equations using Green s functions
Physics 6C Solution of inhomogeneous ordinry differentil equtions using Green s functions Peter Young November 5, 29 Homogeneous Equtions We hve studied, especilly in long HW problem, second order liner
More informationIndefinite Integral. Chapter Integration - reverse of differentiation
Chpter Indefinite Integrl Most of the mthemticl opertions hve inverse opertions. The inverse opertion of differentition is clled integrtion. For exmple, describing process t the given moment knowing the
More informationHigher Checklist (Unit 3) Higher Checklist (Unit 3) Vectors
Vectors Skill Achieved? Know tht sclr is quntity tht hs only size (no direction) Identify rel-life exmples of sclrs such s, temperture, mss, distnce, time, speed, energy nd electric chrge Know tht vector
More informationPhysics 201 Lab 3: Measurement of Earth s local gravitational field I Data Acquisition and Preliminary Analysis Dr. Timothy C. Black Summer I, 2018
Physics 201 Lb 3: Mesurement of Erth s locl grvittionl field I Dt Acquisition nd Preliminry Anlysis Dr. Timothy C. Blck Summer I, 2018 Theoreticl Discussion Grvity is one of the four known fundmentl forces.
More informationN 0 completions on partial matrices
N 0 completions on prtil mtrices C. Jordán C. Mendes Arújo Jun R. Torregros Instituto de Mtemátic Multidisciplinr / Centro de Mtemátic Universidd Politécnic de Vlenci / Universidde do Minho Cmino de Ver
More informationDefinition of Continuity: The function f(x) is continuous at x = a if f(a) exists and lim
Mth 9 Course Summry/Study Guide Fll, 2005 [1] Limits Definition of Limit: We sy tht L is the limit of f(x) s x pproches if f(x) gets closer nd closer to L s x gets closer nd closer to. We write lim f(x)
More information( dg. ) 2 dt. + dt. dt j + dh. + dt. r(t) dt. Comparing this equation with the one listed above for the length of see that
Arc Length of Curves in Three Dimensionl Spce If the vector function r(t) f(t) i + g(t) j + h(t) k trces out the curve C s t vries, we cn mesure distnces long C using formul nerly identicl to one tht we
More informationChapter 7 Notes, Stewart 8e. 7.1 Integration by Parts Trigonometric Integrals Evaluating sin m x cos n (x) dx...
Contents 7.1 Integrtion by Prts................................... 2 7.2 Trigonometric Integrls.................................. 8 7.2.1 Evluting sin m x cos n (x)......................... 8 7.2.2 Evluting
More informationAnti-derivatives/Indefinite Integrals of Basic Functions
Anti-derivtives/Indefinite Integrls of Bsic Functions Power Rule: In prticulr, this mens tht x n+ x n n + + C, dx = ln x + C, if n if n = x 0 dx = dx = dx = x + C nd x (lthough you won t use the second
More informationPrecalculus Spring 2017
Preclculus Spring 2017 Exm 3 Summry (Section 4.1 through 5.2, nd 9.4) Section P.5 Find domins of lgebric expressions Simplify rtionl expressions Add, subtrct, multiply, & divide rtionl expressions Simplify
More informationBefore we can begin Ch. 3 on Radicals, we need to be familiar with perfect squares, cubes, etc. Try and do as many as you can without a calculator!!!
Nme: Algebr II Honors Pre-Chpter Homework Before we cn begin Ch on Rdicls, we need to be fmilir with perfect squres, cubes, etc Try nd do s mny s you cn without clcultor!!! n The nth root of n n Be ble
More informationC/CS/Phys C191 Bell Inequalities, No Cloning, Teleportation 9/13/07 Fall 2007 Lecture 6
C/CS/Phys C9 Bell Inequlities, o Cloning, Teleporttion 9/3/7 Fll 7 Lecture 6 Redings Benenti, Csti, nd Strini: o Cloning Ch.4. Teleporttion Ch. 4.5 Bell inequlities See lecture notes from H. Muchi, Cltech,
More informationSOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014
SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 014 Mrk Scheme: Ech prt of Question 1 is worth four mrks which re wrded solely for the correct nswer.
More informationMultivariate problems and matrix algebra
University of Ferrr Stefno Bonnini Multivrite problems nd mtrix lgebr Multivrite problems Multivrite sttisticl nlysis dels with dt contining observtions on two or more chrcteristics (vribles) ech mesured
More informationPrep Session Topic: Particle Motion
Student Notes Prep Session Topic: Prticle Motion Number Line for AB Prticle motion nd similr problems re on the AP Clculus exms lmost every yer. The prticle my be prticle, person, cr, etc. The position,
More informationThings to Memorize: A Partial List. January 27, 2017
Things to Memorize: A Prtil List Jnury 27, 2017 Chpter 2 Vectors - Bsic Fcts A vector hs mgnitude (lso clled size/length/norm) nd direction. It does not hve fixed position, so the sme vector cn e moved
More informationPredict Global Earth Temperature using Linier Regression
Predict Globl Erth Temperture using Linier Regression Edwin Swndi Sijbt (23516012) Progrm Studi Mgister Informtik Sekolh Teknik Elektro dn Informtik ITB Jl. Gnesh 10 Bndung 40132, Indonesi 23516012@std.stei.itb.c.id
More informationChapter 3 MATRIX. In this chapter: 3.1 MATRIX NOTATION AND TERMINOLOGY
Chpter 3 MTRIX In this chpter: Definition nd terms Specil Mtrices Mtrix Opertion: Trnspose, Equlity, Sum, Difference, Sclr Multipliction, Mtrix Multipliction, Determinnt, Inverse ppliction of Mtrix in
More informationWe partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b.
Mth 255 - Vector lculus II Notes 4.2 Pth nd Line Integrls We begin with discussion of pth integrls (the book clls them sclr line integrls). We will do this for function of two vribles, but these ides cn
More information3.1 Review of Sine, Cosine and Tangent for Right Angles
Foundtions of Mth 11 Section 3.1 Review of Sine, osine nd Tngent for Right Tringles 125 3.1 Review of Sine, osine nd Tngent for Right ngles The word trigonometry is derived from the Greek words trigon,
More informationDesigning Information Devices and Systems I Discussion 8B
Lst Updted: 2018-10-17 19:40 1 EECS 16A Fll 2018 Designing Informtion Devices nd Systems I Discussion 8B 1. Why Bother With Thévenin Anywy? () Find Thévenin eqiuvlent for the circuit shown elow. 2kΩ 5V
More informationObjectives. Materials
Techer Notes Activity 17 Fundmentl Theorem of Clculus Objectives Explore the connections between n ccumultion function, one defined by definite integrl, nd the integrnd Discover tht the derivtive of the
More informationQuantum Mechanics Qualifying Exam - August 2016 Notes and Instructions
Quntum Mechnics Qulifying Exm - August 016 Notes nd Instructions There re 6 problems. Attempt them ll s prtil credit will be given. Write on only one side of the pper for your solutions. Write your lis
More informationODE: Existence and Uniqueness of a Solution
Mth 22 Fll 213 Jerry Kzdn ODE: Existence nd Uniqueness of Solution The Fundmentl Theorem of Clculus tells us how to solve the ordinry differentil eqution (ODE) du = f(t) dt with initil condition u() =
More information