McCreight s Suffix Tree Construction Algorithm. Milko Izamski B.Sc. Informatics Instructor: Barbara König
|
|
- Melina McKinney
- 6 years ago
- Views:
Transcription
1 1. Introution MCreight s Suffix Tree Constrution Algorithm Milko Izamski B.S. Informatis Instrutor: Barbara König The main goal of MCreight s algorithm is to buil a suffix tree in linear time. This is an auxiliary searh tree whih helps us to fin a speifi substring S i within a given main string S. 2. The Algorithm Before explaining the algorithm it is neessary to efine some basi rules an onstraints. At the beginning we hek whether the final harater (n) appears elsewhere in S, if it oes, then S has to be extene to a string that satisfies the rule suh that with no suffix S i of S is a prefix of a ifferent suffix S j of S. The suffix tree T represents all possible suffixes of S. An ege (also known as an ar) of the tree is lele with some non-empty string from the alphet that buils S (T1). Eah internal noe has at least two sons (T2). The sibling eges (sons) begin with a ifferent harater(t3) Builing the suffix tree Basially T is reate in n steps, where length (S )= n. Let suf i to be suffix of S. Eah time it is inserte into T i-1. The leftmost harater is at position 1 of the string. Every suffix is built by taking off the first harater of its preeessor. Hene, suf 1 = S an suf n is the last harater. The next lines will explain how exatly the proess work. During this explanation some basis efinitions will be introue. For this task we onsier one example string S =. All possible suffixes of S are efine in the tle below. In Step 1 suf 1 is inserte in an empty tree T 0, so T 1 is proue. In Step 2 we take suf 2 an ompare it to suf 1. We efine hea i as the longest prefix of suf i that is also a prefix of suf j, for some j<i. In our situation, hea 2 is empty (ε). We efine tail i as suf i - hea i suf i = hea i + tail i. It means that tail 2 is b. To insert suf i into T i-1 we shoul fin the extene lous of hea i, if neessary the tree is split with some non-terminal noe ( that is the lous of hea i ), an then tail i is insert. During proessing in Step 3, suf 3 =, hea 3 = ( ompare suf 3 with suf 1 ), hene tail 3 =. We split the ege into two parts ( that is hea 3 ) an, then insert tail 3 as we sai before. The same proeure is repeate until we reah the last possible suffix. 1
2 S= hea i T i-1 Step i suf i hea i tail i α β γ T 0 root Step 1 ε T 1 Step 2 b ε b ε ε ε T 2 b Step 3 a b ε T 3 b Step 4 b b b ε ε T 4 b Step 5 ε ε ε ε T 5 b The main problem in the algorithm esribe ove is to fin the extene lous in T i-1 of hea i. All this shoul be ahieve in a onstant time. For this task we use a simple Lemma that says: If hea i-1 an be written as xδ for some harater x an some (possibly empty) string δ, then δ is a prefix of hea i. 2
3 2.2. Suffix links Using this property, auxiliary links (suffix link) an be ae to the tree struture. Eah lous of xδ, where x is a harater an δ is a string, an be linke to the lous of δ. These links enle us to spee up the searhing of the lous of hea i, starting at the lous of hea i-1, whih has been visite in the previous step. But before exploring exatly how that happens we enote every ege from the tree T with a pair of integers, the first element representing the start position of the ege s lel in the main string an the seon, the length of the ege s lel. Fousing on the following example we will explain how the suffix link is ae. Let S be b 4 3 a 2 b 4. Now we assume that T 10 (T i-1 ) alreay exists an suf 11 (suf i ) is to be ae - using the property of the suffix links. As we an easily see hea 10 (hea i-1 ) is bb. Following the efinition ove we an represent it as χαβ, where χ = x = a an αβ = δ = bbb. If the ontrate lous of hea 10 (hea i-1 ) in T 9 (T i-2 ) is the root then α is empty an we start resanning from the root, otherwise it is the lous of χα. The lous must have existe somewhere in T 9. In our speifi ase α = b, hene, β must be bb.the algorithm then follows the alreay existing suffix link ( between χα an α) an starts resanning. Resanning is a proess whih revisits a sequene of eges whih spell out β. We an be sure that the prefix of hea 11 (hea i ) will be αβ = bbb an some other (possibly empty) string γ. In our speifi ase γ = b. We alreay know the lous of α.so following the logi in the last paragraph β has to be within the tree. Thus we start resanning the tree for β ownwar from the lous of α. In this proess only the first harater ( see onstraint T3) an the length of the hil ege ρ are ompare (enoting of the eges helps us). If ρ is shorter than β then the proess starts reursively from the lous of ρ with (β-ρ), otherwise β is a prefix of ρ an the resan is omplete. A new nonterminal noe is onstrute, whih is the lous of αβ, if one oes not alreay exist. The onstrution of suh a noe is only possible if γ is empty. The only thing we on t know yet is, where the γ is loate within the tree. We alreay have information out the length of β beause of the hea i-1. In this situation we must to travel ownwar into the tree an ompare the haraters one by one from left to right until we fin γ an then reate a new non-terminal lous of αβγ = hea i, if it oes not alreay exist. The proess of fining γ in the tree is alle Sanning. At the en tail i is attahe to the lous of hea i an i-step is finishe. Remember that resanning of β was possible only beause in the previous step sanning on β has been performe. 3
4 3. Time omplexity analysis Let us efine a suffix of S res i = βγ+tail i, where resanning an sanning has been mae to β respetively γ. During the resanning of β there will always be a non empty string (ρ) that is in res i but not in res i+1. Hene, length(res i+1 ) is at most length(res i ) minus number of the noes we ha enountere by the resanning(int i ). We alreay know that length(res n ) = 0 an length(res 0 ) = n, hene by using reursive substitution we see than Σ n i=0int i is at most n. The number of omparisons by the san operation is (length(hea i ) - length(hea i-1 ) + 1) an in total algorithm Σ n i=0(length(hea i ) - length(hea i-1 ) + 1) = length(hea n ) - length(hea 0 ) + n = n. The algorithm nees n step for reating the suffix tree. For every step a onstant time is neee. That means the algorithm runs in linear time epening on the length of the given string. 4. Upating the suffix tree We assume that a substring of the main string S may nee to be replae by S. Thus, suffix tree T has to be hange too. Let S be efine as αβγ, for some strings α, β an γ, an it is to be hange to αδγ. Aopting a string element position numbering sheme, we onsier only those paths that are affete by the replaement of β with δ (or αβγ αδγ). Define α * to be the longest suffix of α that ours in at least two plaes in S. β-splitters are strings in the form εγ, where ε is a non empty suffix of α * β. Hene, β- splitters properly ontain the suffix γ. Equivalently, δ-splitters are in form ωγ, where ω is a non empty suffix of α * δ. Main goal of the algorithm is to fin the β-splitters an replae them by the δ-splitters. It is ahieve in three stages. 1. Disover α * βγ, the longest β-splitter. 2. Delete all paths εγ from the tree, ε = suf(α * β). 3. Insert all paths ωγ into the tree, ω = suf(α * δ). Disovering the longest β-splitter is the first stage. Let us assume our string S is xb, whih is to be hange to a. Hene, =α, xb =β, =γ, a =δ. The longest β-splitter is then bxb beause of b =α *. Note that xb is also a β- splitter but not the longest. In the seon stage we shoul are out eleting paths, whih are suffixes of the longest β-splitter. Deletions are one in sequene from the longest string to the shortest. Let us assume that all suffixes longer than εγ have been elete. We split up εγ into three (possibly empty) substrings u, v an w. Suppose we have the situation shown on the figure below. 4
5 xuv a root potential suffix link k h f u g v w If noe g has more that two sibling eges then we just elete w. If g has exatly two offspring eges ( it is not possible for g to have only one ege) then w-ege an g-noe are remove, k an v are joine together. The only problem is that there oul be a suffix link to g whih will be elete after merging of v an k into vk-ege. The last stage ares out inserting all paths in form ωγ, where ω = suf(α * δ). Now we onsier the remainer of the tree as pre-initialize suffix three, whih surely ontains all suffixes of γ. b xb Stage 2 Stage 3 a ba xb xb xb b ba a Figure. Tree mutation in a ifferent stages. 5. Conlusion In general MCreight s algorithm for builing suffix trees oes not iffer from the Weiner s or Ukonnen s one. They all reate a tree in at most linear time omparative to the length of the input string. A major avantage is MCreight a algorithm uses approximately 25 per ent less ata spae than similarly oe versions of the other algorithms. Of ourse in real omputers the ata movement (loa, store, opy ) takes up linear time. Hene, saving ata spae oul also mean saving time. 5
Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fischer) January 21,
Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 201511 9 Suffix Trees and Suffix Arrays This leture is based on the following soures, whih are all reommended
More informationAnnouncements. Office Hours Swap: OH schedule has been updated to reflect this.
SA Solving Announements Offie Hours Swap: Zavain has offie hours from 4-6PM toay in builing 460, room 040A. Rose has offie hours tonight from 7-9PM in Gates B26B. Keith has offie hours hursay from 2-4PM
More informationSearching All Approximate Covers and Their Distance using Finite Automata
Searhing All Approximate Covers and Their Distane using Finite Automata Ondřej Guth, Bořivoj Melihar, and Miroslav Balík České vysoké učení tehniké v Praze, Praha, CZ, {gutho1,melihar,alikm}@fel.vut.z
More information15.12 Applications of Suffix Trees
248 Algorithms in Bioinformatis II, SoSe 07, ZBIT, D. Huson, May 14, 2007 15.12 Appliations of Suffix Trees 1. Searhing for exat patterns 2. Minimal unique substrings 3. Maximum unique mathes 4. Maximum
More informationMath 225B: Differential Geometry, Homework 6
ath 225B: Differential Geometry, Homework 6 Ian Coley February 13, 214 Problem 8.7. Let ω be a 1-form on a manifol. Suppose that ω = for every lose urve in. Show that ω is exat. We laim that this onition
More informationComputing 2-Walks in Cubic Time
Computing 2-Walks in Cubi Time Anreas Shmi Max Plank Institute for Informatis Jens M. Shmit Tehnishe Universität Ilmenau Abstrat A 2-walk of a graph is a walk visiting every vertex at least one an at most
More informationSupplementary Materials for A universal data based method for reconstructing complex networks with binary-state dynamics
Supplementary Materials for A universal ata ase metho for reonstruting omplex networks with inary-state ynamis Jingwen Li, Zhesi Shen, Wen-Xu Wang, Celso Greogi, an Ying-Cheng Lai 1 Computation etails
More informationLabeling Workflow Views with Fine-Grained Dependencies
Labeling Workflow Views with Fine-Graine Depenenies Zhuowei Bao Department of omputer an Information iene University of Pennsylvania Philaelphia, P 1914, U zhuowei@is.upenn.eu usan B. Davison Department
More informationCSE 5311 Notes 18: NP-Completeness
SE 53 Notes 8: NP-ompleteness (Last upate 7//3 8:3 PM) ELEMENTRY ONEPTS Satisfiability: ( p q) ( p q ) ( p q) ( p q ) Is there an assignment? (Deision Problem) Similar to ebugging a logi iruit - Is there
More informationDetermination the Invert Level of a Stilling Basin to Control Hydraulic Jump
Global Avane Researh Journal of Agriultural Siene Vol. (4) pp. 074-079, June, 0 Available online http://garj.org/garjas/inex.htm Copyright 0 Global Avane Researh Journals Full Length Researh Paper Determination
More informationQ2. [40 points] Bishop-Hill Model: Calculation of Taylor Factors for Multiple Slip
27-750, A.D. Rollett Due: 20 th Ot., 2011. Homework 5, Volume Frations, Single and Multiple Slip Crystal Plastiity Note the 2 extra redit questions (at the end). Q1. [40 points] Single Slip: Calulating
More information2. Properties of Functions
2. PROPERTIES OF FUNCTIONS 111 2. Properties of Funtions 2.1. Injetions, Surjetions, an Bijetions. Definition 2.1.1. Given f : A B 1. f is one-to-one (short han is 1 1) or injetive if preimages are unique.
More informationChapter 2: One-dimensional Steady State Conduction
1 Chapter : One-imensional Steay State Conution.1 Eamples of One-imensional Conution Eample.1: Plate with Energy Generation an Variable Conutivity Sine k is variable it must remain insie the ifferentiation
More informationExpressiveness of the Interval Logics of Allen s Relations on the Class of all Linear Orders: Complete Classification
Proeeings of the Twenty-Seon International Joint Conferene on Artifiial Intelligene Expressiveness of the Interval Logis of Allen s Relations on the Class of all Linear Orers: Complete Classifiation Dario
More informationAn Integer Solution of Fractional Programming Problem
Gen. Math. Notes, Vol. 4, No., June 0, pp. -9 ISSN 9-784; Copyright ICSRS Publiation, 0 www.i-srs.org Available free online at http://www.geman.in An Integer Solution of Frational Programming Problem S.C.
More informationOptimal Distributed Estimation Fusion with Transformed Data
Optimal Distribute Estimation Fusion with Transforme Data Zhansheng Duan X. Rong Li Department of Eletrial Engineering University of New Orleans New Orleans LA 70148 U.S.A. Email: {zuanxli@uno.eu Abstrat
More informationNext: Pushdown automata. Pushdown Automata. Informal Description PDA (1) Informal Description PDA (2) Formal Description PDA
CE 2001: Introdution to Theor of Computation ummer 2007 uprakash Datta datta@s.orku.a Net: Pushdown automata dd stak to definition of Finite utomata Can serve as tpe of memor or ounter More powerful than
More informationc-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories
-Perfet Hashing Shemes for Binary Trees, with Appliations to Parallel Memories (Extended Abstrat Gennaro Cordaso 1, Alberto Negro 1, Vittorio Sarano 1, and Arnold L.Rosenberg 2 1 Dipartimento di Informatia
More informationThe Laws of Acceleration
The Laws of Aeleration The Relationships between Time, Veloity, and Rate of Aeleration Copyright 2001 Joseph A. Rybzyk Abstrat Presented is a theory in fundamental theoretial physis that establishes the
More informationComplexity of Regularization RBF Networks
Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw
More informationPerformance Evaluation of atall Building with Damped Outriggers Ping TAN
Performane Evaluation of atall Builing with Dampe Outriggers Ping TAN Earthquake Engineering Researh an Test Center Guangzhou University, Guangzhou, China OUTLINES RESEARCH BACKGROUND IMPROVED ANALYTICAL
More informationReview Topic 4: Cubic polynomials
Review Topi : ui polynomials Short answer Fatorise Px ( ) = x + 5x + x- 9 into linear fators. The polynomial Px ( ) = x - ax + x- leaves a remainer of when it is ivie y ( x - ) an a remainer of - when
More informationEE 321 Project Spring 2018
EE 21 Projet Spring 2018 This ourse projet is intended to be an individual effort projet. The student is required to omplete the work individually, without help from anyone else. (The student may, however,
More informationExtended Spectral Nonlinear Conjugate Gradient methods for solving unconstrained problems
International Journal of All Researh Euation an Sientifi Methos IJARESM ISSN: 55-6 Volume Issue 5 May-0 Extene Spetral Nonlinear Conjuate Graient methos for solvin unonstraine problems Dr Basim A Hassan
More informationThe numbers inside a matrix are called the elements or entries of the matrix.
Chapter Review of Matries. Definitions A matrix is a retangular array of numers of the form a a a 3 a n a a a 3 a n a 3 a 3 a 33 a 3n..... a m a m a m3 a mn We usually use apital letters (for example,
More informationFORMAL METHODS LECTURE VI BINARY DECISION DIAGRAMS (BDD S)
Alessandro Artale (FM First Semester 2009/2010) p. 1/38 FORMAL METHODS LECTURE VI BINARY DECISION DIAGRAMS (BDD S) Alessandro Artale Faulty of Computer Siene Free University of Bolzano artale@inf.unibz.it
More informationRelativistic Dynamics
Chapter 7 Relativisti Dynamis 7.1 General Priniples of Dynamis 7.2 Relativisti Ation As stated in Setion A.2, all of dynamis is derived from the priniple of least ation. Thus it is our hore to find a suitable
More informationSolving a system of linear equations Let A be a matrix, X a column vector, B a column vector then the system of linear equations is denoted by AX=B.
Matries and Vetors: Leture Solving a sstem of linear equations Let be a matri, X a olumn vetor, B a olumn vetor then the sstem of linear equations is denoted b XB. The augmented matri The solution to a
More informationChapter 3 Church-Turing Thesis. CS 341: Foundations of CS II
CS 341: Foundations of CS II Marvin K. Nakayama Computer Siene Department New Jersey Institute of Tehnology Newark, NJ 07102 CS 341: Chapter 3 3-2 Contents Turing Mahines Turing-reognizable Turing-deidable
More informationModal Horn Logics Have Interpolation
Modal Horn Logis Have Interpolation Marus Kraht Department of Linguistis, UCLA PO Box 951543 405 Hilgard Avenue Los Angeles, CA 90095-1543 USA kraht@humnet.ula.de Abstrat We shall show that the polymodal
More informationGeneral Equilibrium. What happens to cause a reaction to come to equilibrium?
General Equilibrium Chemial Equilibrium Most hemial reations that are enountered are reversible. In other words, they go fairly easily in either the forward or reverse diretions. The thing to remember
More information18 Numerical Integration of Functions
Slightly moifie //9, /8/6 Firstly written at Marh 5 8 Numerial Integration of Funtions Introution Romberg Integration Gauss Quarature Aaptive Quarature Case Stuy: Root-Mean-Square Current DM869/Computational
More informationControl Theory association of mathematics and engineering
Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology
More informationSupplementary Materials
Supplementary Materials Neural population partitioning and a onurrent brain-mahine interfae for sequential motor funtion Maryam M. Shanehi, Rollin C. Hu, Marissa Powers, Gregory W. Wornell, Emery N. Brown
More informationarxiv: v2 [math.pr] 9 Dec 2016
Omnithermal Perfet Simulation for Multi-server Queues Stephen B. Connor 3th Deember 206 arxiv:60.0602v2 [math.pr] 9 De 206 Abstrat A number of perfet simulation algorithms for multi-server First Come First
More information7 Max-Flow Problems. Business Computing and Operations Research 608
7 Max-Flow Problems Business Computing and Operations Researh 68 7. Max-Flow Problems In what follows, we onsider a somewhat modified problem onstellation Instead of osts of transmission, vetor now indiates
More informationPacking Plane Spanning Trees into a Point Set
Paking Plane Spanning Trees into a Point Set Ahmad Biniaz Alfredo Garía Abstrat Let P be a set of n points in the plane in general position. We show that at least n/3 plane spanning trees an be paked into
More informationChapter 8 Hypothesis Testing
Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two
More informationConstraint-free Analog Placement with Topological Symmetry Structure
Constraint-free Analog Plaement with Topologial Symmetry Struture Qing DONG Department of Information an Meia Sienes University of Kitakyushu Wakamatsu, Kitakyushu, Fukuoka, 808-0135, Japan e-mail: ongqing@env.kitakyu-u.a.jp
More informationON THE MOVING BOUNDARY HITTING PROBABILITY FOR THE BROWNIAN MOTION. Dobromir P. Kralchev
Pliska Stud. Math. Bulgar. 8 2007, 83 94 STUDIA MATHEMATICA BULGARICA ON THE MOVING BOUNDARY HITTING PROBABILITY FOR THE BROWNIAN MOTION Dobromir P. Kralhev Consider the probability that the Brownian motion
More informationd-separation: Strong Completeness of Semantics in Bayesian Network Inference
-Separation: Strong Completeness of Semantis in Bayesian Network Inferene Cory J. Butz 1,WenYan 1, an Aners L. Masen 2,3 1 Department of Computer Siene, University of Regina, Canaa {butz,yanwe111}@s.uregina.a
More informationIn this assignment you will build a simulation of the presynaptic terminal.
9.16 Problem Set #2 In this assignment you will buil a simulation of the presynapti terminal. The simulation an be broken own into three parts: simulation of the arriving ation potential (base on the Hogkin-Huxley
More informationτ = 10 seconds . In a non-relativistic N 1 = N The muon survival is given by the law of radioactive decay N(t)=N exp /.
Muons on the moon Time ilation using ot prouts Time ilation using Lorentz boosts Cheking the etor formula Relatiisti aition of eloities Why you an t eee the spee of light by suessie boosts Doppler shifts
More informationFlexible Word Design and Graph Labeling
Flexible Word Design and Graph Labeling Ming-Yang Kao Manan Sanghi Robert Shweller Abstrat Motivated by emerging appliations for DNA ode word design, we onsider a generalization of the ode word design
More information= ν L. C ν L. = ν R. P ν L. CP ν L. CP Violation. Standard Model contains only left-handed neutrinos and right-handed anti-neutrinos
Phy489 Leture 9 1 CP iolation Stanar Moel ontains only left-hane neutrinos an right-hane anti-neutrinos C ν L = ν L harge onjugation not a symmetry of the weak interation P ν L = ν R parity also not onserve
More informationCanimals. borrowed, with thanks, from Malaspina University College/Kwantlen University College
Canimals borrowed, with thanks, from Malaspina University College/Kwantlen University College http://ommons.wikimedia.org/wiki/file:ursus_maritimus_steve_amstrup.jpg Purpose Investigate the rate of heat
More informationLightpath routing for maximum reliability in optical mesh networks
Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer
More informationLecture 6: Coding theory
Leture 6: Coing theory Biology 429 Crl Bergstrom Ferury 4, 2008 Soures: This leture loosely follows Cover n Thoms Chpter 5 n Yeung Chpter 3. As usul, some of the text n equtions re tken iretly from those
More informationState Diagrams. Margaret M. Fleck. 14 November 2011
State Diagrams Margaret M. Flek 14 November 2011 These notes over state diagrams. 1 Introdution State diagrams are a type of direted graph, in whih the graph nodes represent states and labels on the graph
More informationThe Chomsky Hierarchy(review)
The Chomsky Hierarchy(review) Languages Machines Other Moels Recursively Enumerable Sets Turing Machines Post System Markov Algorithms, µ-recursive Functions Context-sensitive Languages Context-free Languages
More informationSome Useful Results for Spherical and General Displacements
E 5 Fall 997 V. Kumar Some Useful Results for Spherial an General Displaements. Spherial Displaements.. Eulers heorem We have seen that a spherial isplaement or a pure rotation is esribe by a 3 3 rotation
More informationMODELS FOR VARIABLE RECRUITMENT (continued)
ODL FOR VARIABL RCRUITNT (ontinue) The other moel ommonly use to relate reruitment strength with the size of the parental spawning population is a moel evelope by Beverton an Holt (957, etion 6), whih
More informationFormal Concept Sampling for Counting and Threshold-Free Local Pattern Mining
Formal Conept Sampling for Counting an Threshol-Free Loal Pattern Mining Mario Boley an Thomas Gärtner an Henrik Grosskreutz Fraunhofer IAIS Shloss Birlinghoven 53754 Sankt Augustin, Germany {mario.boley,
More informationThe gravitational phenomena without the curved spacetime
The gravitational phenomena without the urved spaetime Mirosław J. Kubiak Abstrat: In this paper was presented a desription of the gravitational phenomena in the new medium, different than the urved spaetime,
More informationA Primer on the Statistics of Longest Increasing Subsequences and Quantum States
A Primer on the Statistis of Longest Inreasing Subsequenes an Quantum States Ryan O Donnell John Wright Abstrat We give an introution to the statistis of quantum states, with a fous on reent results giving
More informationViewing the Rings of a Tree: Minimum Distortion Embeddings into Trees
Viewing the Rings of a Tree: Minimum Distortion Embeddings into Trees Amir Nayyeri Benjamin Raihel Abstrat We desribe a 1+ε) approximation algorithm for finding the minimum distortion embedding of an n-point
More informationarxiv:physics/ v1 [physics.class-ph] 8 Aug 2003
arxiv:physis/0308036v1 [physis.lass-ph] 8 Aug 003 On the meaning of Lorentz ovariane Lszl E. Szab Theoretial Physis Researh Group of the Hungarian Aademy of Sienes Department of History and Philosophy
More informationOn the Reverse Problem of Fechnerian Scaling
On the Reverse Prolem of Fehnerian Saling Ehtiar N. Dzhafarov Astrat Fehnerian Saling imposes metris on two sets of stimuli relate to eah other y a isrimination funtion sujet to Regular Minimality. The
More informationCombinatorial remarks on two-dimensional Languages
Combinatorial remarks on two-imensional Languages Franesa De Carli To ite this version: Franesa De Carli. Combinatorial remarks on two-imensional Languages. Mathematis [math]. Université e Savoie 2009.
More informationMillennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion
Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six
More informationPhysical Laws, Absolutes, Relative Absolutes and Relativistic Time Phenomena
Page 1 of 10 Physial Laws, Absolutes, Relative Absolutes and Relativisti Time Phenomena Antonio Ruggeri modexp@iafria.om Sine in the field of knowledge we deal with absolutes, there are absolute laws that
More informationA Characterization of Wavelet Convergence in Sobolev Spaces
A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat
More informationckanren minikanren with Constraints Claire E. Alvis Jeremiah J. Willcock Kyle M. Carter William E. Byrd Daniel P. Friedman
Kanren minikanren with Constraints Claire E. Alvis Jeremiah J. Willok Kyle M. Carter William E. Byrd Daniel P. Friedman Shool of Informatis and Computing, Indiana University, Bloomington, IN 47405 {alvis,jewillo,kylarte,webyrd,dfried}@s.indiana.edu
More informationI 3 2 = I I 4 = 2A
ECE 210 Eletril Ciruit Anlysis University of llinois t Chigo 2.13 We re ske to use KCL to fin urrents 1 4. The key point in pplying KCL in this prolem is to strt with noe where only one of the urrents
More informationDiophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations
Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything
More informationCase I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1
MUTLIUSER DETECTION (Letures 9 and 0) 6:33:546 Wireless Communiations Tehnologies Instrutor: Dr. Narayan Mandayam Summary By Shweta Shrivastava (shwetash@winlab.rutgers.edu) bstrat This artile ontinues
More informationThe Chebyshev Wavelet Method for Numerical Solutions of A Fractional Oscillator
Shiraz University of Tehnology From the SeleteWorks of Habibolla Latifizaeh 01 The Chebyshev Wavelet Metho for Numerial Solutions of A Frational Osillator E. Hesameini, Shiraz University of Tehnology S.
More informationIs the Free Vacuum Energy Infinite?
Is the Free Vauum Energy Infite? H. Razmi () an S. M. Shirazi () Department of Physis, the University of Qom, Qom, I. R. Iran. () razmi@qom.a.ir & razmiha@hotmail.om () sms0@gmail.om Abstrat Consierg the
More informationChapter 9. There are 7 out of 50 measurements that are greater than or equal to 5.1; therefore, the fraction of the
Pratie questions 6 1 a y i = 6 µ = = 1 i = 1 y i µ i = 1 ( ) = 95 = s n 95 555. x i f i 1 1+ + 5+ n + 5 5 + n µ = = = f 11+ n 11+ n i 7 + n = 5 + n = 6n n = a Time (minutes) 1.6.1.6.1.6.1.6 5.1 5.6 6.1
More informationPLANNING OF INSPECTION PROGRAM OF FATIGUE-PRONE AIRFRAME
Yu. aramonov, A. Kuznetsov ANING OF INSECTION ROGRAM OF FATIGUE RONE AIRFRAME (Vol. 2008, Deember ANNING OF INSECTION ROGRAM OF FATIGUE-RONE AIRFRAME Yu. aramonov, A. Kuznetsov Aviation Institute, Riga
More informationA Metric Index for Approximate String Matching
A Metri Index for Approximate String Mathing Edgar Chávez 1 and Gonzalo Navarro 2 1 Esuela de Cienias Físio-Matemátias, Universidad Mihoaana. Edifiio B, Ciudad Universitaria, Morelia, Mih. Méxio 58000.
More informationCMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017
CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,
More informationBidirectionalizing Graph Transformations
Biiretionalizing Graph Transformations Soihiro Hiaka Kazuhiro Inaa Zhenjiang Hu Hiroyuki Kato National Institute of Informatis, Japan {hiaka,hu,kinaa,kato}@nii.a.jp Kazutaka Matsua Tohoku University, Japan
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 3, MARCH A DS CDMA system is said to be approximately synchronized if the modulated
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 3, MARCH 2008 1339 two ases we get infinite lasses of DPM. The most important result is the onstrution of DPM from ternary vetors of lengths at least
More informationSection 7.1 The Pythagorean Theorem. Right Triangles
Setion 7. The Pythagorean Theorem It is better wither to be silent, or to say things of more value than silene. Sooner throw a pearl at hazard than an idle or useless word; and do not say a little in many
More informationWavetech, LLC. Ultrafast Pulses and GVD. John O Hara Created: Dec. 6, 2013
Ultrafast Pulses and GVD John O Hara Created: De. 6, 3 Introdution This doument overs the basi onepts of group veloity dispersion (GVD) and ultrafast pulse propagation in an optial fiber. Neessarily, it
More informationHow to create Matlab Script and Simulink Model for Designing a Pole Placement Controller
How to reate Matlab Sript an Simulink Moel for Designing a Pole Plaement Controller Pole Plaement Controller Design H tot Y( Kr B ( R ( AC ( ( BD ( ( P ( AC ( ( BD ( ( Polplaement Equation ( ( ( ( [egree]
More informationDIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS
CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install
More informationImplementing the Law of Sines to solve SAS triangles
Implementing the Law of Sines to solve SAS triangles June 8, 009 Konstantine Zelator Dept. of Math an Computer Siene Rhoe Islan College 600 Mount Pleasant Avenue Proviene, RI 0908 U.S.A. e-mail : kzelator@ri.eu
More informationLecture 7: Sampling/Projections for Least-squares Approximation, Cont. 7 Sampling/Projections for Least-squares Approximation, Cont.
Stat60/CS94: Randomized Algorithms for Matries and Data Leture 7-09/5/013 Leture 7: Sampling/Projetions for Least-squares Approximation, Cont. Leturer: Mihael Mahoney Sribe: Mihael Mahoney Warning: these
More information23.1 Tuning controllers, in the large view Quoting from Section 16.7:
Lesson 23. Tuning a real ontroller - modeling, proess identifiation, fine tuning 23.0 Context We have learned to view proesses as dynami systems, taking are to identify their input, intermediate, and output
More informationarxiv:gr-qc/ v2 6 Feb 2004
Hubble Red Shift and the Anomalous Aeleration of Pioneer 0 and arxiv:gr-q/0402024v2 6 Feb 2004 Kostadin Trenčevski Faulty of Natural Sienes and Mathematis, P.O.Box 62, 000 Skopje, Maedonia Abstrat It this
More informationCOMPARISON OF GEOMETRIC FIGURES
COMPARISON OF GEOMETRIC FIGURES Spyros Glenis M.Ed University of Athens, Department of Mathematis, e-mail spyros_glenis@sh.gr Introdution the figures: In Eulid, the geometri equality is based on the apability
More informationGEOMETRIC AND STOCHASTIC ERROR MINIMISATION IN MOTION TRACKING. Karteek Alahari, Sujit Kuthirummal, C. V. Jawahar, P. J. Narayanan
GEOMETRIC AND STOCHASTIC ERROR MINIMISATION IN MOTION TRACKING Karteek Alahari, Sujit Kuthirummal, C. V. Jawahar, P. J. Narayanan Centre for Visual Information Tehnology International Institute of Information
More informationSimultaneous and Sequential Auctions of Oligopoly Licenses
Simultaneous an Sequential Autions of Oligopoly Lienses Georgios Katsenos Institut für Mikroökonomik, Leibniz Universität Hannover September 1, 2007 Abstrat This paper ompares two proeures for alloating
More informationZero-Free Region for ζ(s) and PNT
Contents Zero-Free Region for ζs an PN att Rosenzweig Chebyshev heory ellin ransforms an Perron s Formula Zero-Free Region of Zeta Funtion 6. Jensen s Inequality..........................................
More informationThe Effectiveness of the Linear Hull Effect
The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA 009 9 6 Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England http://www.rhul.a.uk/mathematis/tehreports
More informationCounting Paths Between Vertices. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs
Isomorphism of Grphs Definition The simple grphs G 1 = (V 1, E 1 ) n G = (V, E ) re isomorphi if there is ijetion (n oneto-one n onto funtion) f from V 1 to V with the property tht n re jent in G 1 if
More informationCHBE320 LECTURE X STABILITY OF CLOSED-LOOP CONTOL SYSTEMS. Professor Dae Ryook Yang
CHBE320 LECTURE X STABILITY OF CLOSED-LOOP CONTOL SYSTEMS Professor Dae Ryook Yang Spring 208 Dept. of Chemial and Biologial Engineering 0- Road Map of the Leture X Stability of losed-loop ontrol system
More informationChapter 2. Conditional Probability
Chapter. Conditional Probability The probabilities assigned to various events depend on what is known about the experimental situation when the assignment is made. For a partiular event A, we have used
More informationDoes P=NP? Karlen G. Gharibyan. SPIRIT OF SOFT LLC, 4-th lane 5 Vratsakan 45, 0051, Yerevan, Armenia
1 Does P=NP? Om tat sat Karlen G. Gharibyan SPIRIT OF SOFT LLC, 4-th lane 5 Vratsakan 45, 0051, Yerevan, Armenia E-mail: karlen.gharibyan@spiritofsoft.om Abstrat-The P=NP? problem was emerged in 1971.
More informationMathcad Lecture #5 In-class Worksheet Plotting and Calculus
Mathca Lecture #5 In-class Worksheet Plotting an Calculus At the en of this lecture, you shoul be able to: graph expressions, functions, an matrices of ata format graphs with titles, legens, log scales,
More informationReliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems
Reliability Guaranteed Energy-Aware Frame-Based ask Set Exeution Strategy for Hard Real-ime Systems Zheng Li a, Li Wang a, Shuhui Li a, Shangping Ren a, Gang Quan b a Illinois Institute of ehnology, Chiago,
More informationHe s Semi-Inverse Method and Ansatz Approach to look for Topological and Non-Topological Solutions Generalized Nonlinear Schrödinger Equation
Quant. Phys. Lett. 3, No. 2, 23-27 2014) 23 Quantum Physis Letters An International Journal http://x.oi.org/10.12785/qpl/030202 He s Semi-Inverse Metho an Ansatz Approah to look for Topologial an Non-Topologial
More informationPhysics 523, General Relativity Homework 4 Due Wednesday, 25 th October 2006
Physis 523, General Relativity Homework 4 Due Wednesday, 25 th Otober 2006 Jaob Lewis Bourjaily Problem Reall that the worldline of a ontinuously aelerated observer in flat spae relative to some inertial
More informationOn the density of languages representing finite set partitions
On the density of languages representing finite set partitions Nelma Moreira Rogério Reis Tehnial Report Series: DCC-04-07 Departamento de Ciênia de Computadores Fauldade de Ciênias & Laboratório de Inteligênia
More informationNonreversibility of Multiple Unicast Networks
Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast
More informationarxiv: v1 [cs.cc] 27 Jul 2014
DMVP: Foremost Waypoint Coverage of Time-Varying Graphs Eri Aaron 1, Danny Krizan 2, and Elliot Meyerson 2 arxiv:1407.7279v1 [s.cc] 27 Jul 2014 1 Computer Siene Department, Vassar College, Poughkeepsie,
More informationLinear Capacity Scaling in Wireless Networks: Beyond Physical Limits?
Linear Capaity Saling in Wireless Networks: Beyon Physial Limits? Ayfer Özgür, Olivier Lévêque EPFL, Switzerlan {ayfer.ozgur, olivier.leveque}@epfl.h Davi Tse University of California at Berkeley tse@ees.berkeley.eu
More informationOptimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach
Amerian Journal of heoretial and Applied tatistis 6; 5(-): -8 Published online January 7, 6 (http://www.sienepublishinggroup.om/j/ajtas) doi:.648/j.ajtas.s.65.4 IN: 36-8999 (Print); IN: 36-96 (Online)
More information