1. Binary Decomposition Approach: Considering R: Keys ={BEFG, CEFG, EFGH} F = {CD A, EC H, GHB AB, C D, EG A, H B, BE CD, EC B}
|
|
- Bruce Hudson
- 5 years ago
- Views:
Transcription
1 Question 1: Consider R = {A, B, C, D, E, F, G, H} with set of FDs F = {CD A, EC H, GHB AB, C D, EG A, H B, BE CD, EC B} The cndidte keys re: {BEFG, CEFG, EFGH} Is R w.r.t. F in 3NF? If not decompose it into reltions in 3NF. No, R w.r.t. F is NOT in 3NF, becuse CD A violtes the 3NF requirements. i.e. CD A is not trivil FD CD is not superkey CD is not key, but A is not prt of ny key of R either 1. Binry Decomposition Approch: Considering R: Keys ={BEFG, CEFG, EFGH} F = {CD A, EC H, GHB AB, C D, EG A, H B, BE CD, EC B} Decomposition #1: CD A is violting FD R is decomposed into R 1 nd R 2 : R 1 (A,C,D): We need to project FDs F onto reltion R 1 : A+ = A C+ = CDA (C DA) D+ = D AC+ = ACD (AC D) AD+ = AD CD+ = CDA (CD A) So, F 1 = {C DA, AC D, CD A} R 2 ( B,C,D,E,F,G,H): In generl, we should project F onto R 2. However, if we look crefully, we cn esily see tht the only difference between R nd R 2 is ttribute A. Attribute A hs never ppered on LHS of ny FD. So, removing it won t mke ny chnge in F 2. So, F 2 ={EC H, GHB B, C D, H B, BE CD, EC B} FDs tht re lost in Decomposition #1 re: Lost = {GHB A, EG A} Do we need further decomposition? Consider R 1 (A,C,D): 1
2 F 1 = {C DA, AC D, CD A} Since C + =ACD, C is key. C (in C DA), CD (in CD A), nd AC (in AC D) re key/super keys. Therefore, we hve no violting FD. (So, we re done with this brnch.) Consider R 2 : F 2 ={EC H, C D, H B, BE CD, EC B} Keys of R 2 = Keys of R = {BEFG, CEFG, EFGH} EC H is not violting FD, since H is prt of key. C D is violting FD, since C is not super key nd D is not prt of ny key. So, further decomposition is needed. Decomposition #2: C D is violting FD R 2 is decomposed into R 21 nd R 22 : R 21 (C, D): We need to project F 2 onto reltion R 21 : C+=CD D+=D So, F 21 ={C D} R 22 (B,C,E,F,G,H): In generl, we should project F 2 onto R 22. However, if we look crefully, we cn esily see tht the only difference between R 2 nd R 22 is ttribute D. Attribute D hs never ppered on LHS of ny FD. So, removing it won t mke ny chnge in F 22. So, F 22 = {EC H, H B, BE C, EC B} FDs tht re lost in Decomposition #2 is: Lost = {BE D} So, overll, we ve lost the following FDs: Lost = {GHB A, EG A, BE D} Do we need further decomposition? Consider R 21 (C,D): F 21 ={C D} Since C + =CD, C is key. Therefore, we hve no violting FD. (So, we re done with this brnch.) Consider R 22 (B,C,E,F,G,H): Keys of R 22 = Keys of R 2 = {BEFG, CEFG, EFGH} 2
3 F 22 = {EC H, H B, BE C, EC B} EC H is not violting FD since H is prt of key. H B is not violting FD since B is prt of key. BE C is not violting FD since C is prt of key. EC B is not violting FD since B is prt of key. So, we re done with this brnch. Overll, we hve: R 1 (A, C, D) R 21 (C, D) R 22 (B, C, E, F, G, H) F 1 = {C DA, AC D, CD A} F 21 = {C D} F 22 = {EC H, H B, BE C, EC B} Since R 1 includes R 21 we might wnt to remove R 21. This is loss-less join decomposition, but it is not dependency preserving. To mke the decomposition dependency preserving, we need to dd the lost FDs s new reltions. The lost FDs re: Lost = {GHB AB, EG A, BE D} So, we dd three reltions: L 1 (A, B, G, H) F L1 = {GHB AB} L 2 (A, E, G) F L2 = {EG A} L 3 (B, D, E) F L3 = {BE D} 3
4 2. Synthesis Approch: R = {A, B, C, D, E, F, G, H} with set of FDs F = {CD A, EC H, GHB AB, C D, EG A, H B, BE CD, EC B} The cndidte keys re {BEFG, CEFG, EFGH} In the lst tutoril, we found tht the cnonicl cover for F is: F C = {C AD, EC H, GH A, EG A, H B, BE C} Now, we crete the reltions: R 1 = {A, C, D} F 1 = {C AD} R 2 = {E, C, H} F 2 = {EC H} R 3 = {A, G, H} F 3 = {GH A} R 4 = {A, E, G} F 4 = {EG A} R 5 = {B, H} F 5 = {H B} R 6 = {B, C, E} F 6 = {BE C} Now, we need to check if t lest one of the keys exists in the bove reltions. The cndidte keys re {BEFG, CEFG, EFGH} Since none of these keys is in the reltions, this decomposition is not lossless. So, we need to dd n extr reltion contining those ttributes tht form ny key of R: R 7 = {B, E, F, G} F 7 = {} 4
5 Question 2 Check if the decomposition of R(A, B, C, D, E, F, G) with the set of FDs F={C AD, E G, FG A, EF A, G B, BE C} into the following reltions is lossless join. R 1 = {A, C, D} R 2 = {E, C, G} R 3 = {A, F, G} R 4 = {A, E, F} R 5 = {B, G} R 6 = {B, C, E} Step 1- Tble initiliztion R 1 ={A,C,D} b1b b1e b1f b1g R 2 ={E,C,G} b2a b2b b2d b2f R 3 ={A,F,G} b3b b3c b3d b3e R 4 ={A,E,F} b4b b4c b4d b4g R 5 ={B,G } b5a b5c b5d b5e b5f R 6 ={B,C,E} b6a b6d b6f b6g Round 1 Considering C AD R 1 ={A,C,D} b1b b1e b1f b1g R 2 ={E,C,G} new b2b new b2f R 3 ={A,F,G} b3b b3c b3d b3e R 4 ={A,E,F} b4b b4c b4d b4g R 5 ={B,G } b5a b5c b5d b5e b5f R 6 ={B,C,E} new new b6f b6g Considering E G R 1 ={A,C,D} b1b b1e b1f b1g R 2 ={E,C,G} b2b b2f R 3 ={A,F,G} b3b b3c b3d b3e R 4 ={A,E,F} b4b b4c b4d new R 5 ={B,G } b5a b5c b5d b5e b5f R 6 ={B,C,E} b6f new 5
6 Considering FG A R 1 ={A,C,D} b1b b1e b1f b1g R 2 ={E,C,G} b2b b2f R 3 ={A,F,G} b3b b3c b3d b3e R 4 ={A,E,F} b4b b4c b4d R 5 ={B,G } b5a b5c b5d b5e b5f R 6 ={B,C,E} b6f Considering EF A R 1 ={A,C,D} b1b b1e b1f b1g R 2 ={E,C,G} b2b b2f R 3 ={A,F,G} b3b b3c b3d b3e R 4 ={A,E,F} b4b b4c b4d R 5 ={B,G } b5a b5c b5d b5e b5f R 6 ={B,C,E} b6f Considering G B R 1 ={A,C,D} b1b b1e b1f b1g R 2 ={E,C,G} new b2f R 3 ={A,F,G} new b3c b3d b3e R 4 ={A,E,F} new b4c b4d R 5 ={B,G } b5a b5c b5d b5e b5f R 6 ={B,C,E} b6f Considering BE C R 1 ={A,C,D} b1b b1e b1f b1g R 2 ={E,C,G} b2f R 3 ={A,F,G} b3c b3d b3e R 4 ={A,E,F} new b4d R 5 ={B,G } b5a b5c b5d b5e b5f R 6 ={B,C,E} b6f 6
7 Round 2 Considering C AD R 1 ={A,C,D} b1b b1e b1f b1g R 2 ={E,C,G} b2f R 3 ={A,F,G} b3c b3d b3e R 4 ={A,E,F} new R 5 ={B,G } b5a b5c b5d b5e b5f R 6 ={B,C,E} b6f We don t need to continue since we found one row in the tble with ll cells hving So, this is lossless join. R 1 ={A,C,D} b1b b1e b1f b1g R 2 ={E,C,G} b2f R 3 ={A,F,G} b3c b3d b3e R 4 ={A,E,F} R 5 ={B,G } b5a b5c b5d b5e b5f R 6 ={B,C,E} b6f 7
Normal Forms Lossless Join.
Normal Forms Lossless Join http://users.encs.concordia.ca/~m_oran/ 1 Types of Normal Forms A relation schema R is in the first normal form (1NF) if the domain of its each attribute has only atomic values
More informationConsider a relation R with attributes ABCDEF GH and functional dependencies S:
University of Toronto CSC343 Sample 3NF Problem Questions Consider a relation R with attributes ABCDEF GH and functional dependencies S: S = {A CD, ACF G, AD BEF, BCG D, CF AH, CH G, D B, H DEG} 1. Compute
More informationConsider a relation R with attributes ABCDEF GH and functional dependencies S:
University of Toronto CSC343 Sample 3NF Problem Questions Consider a relation R with attributes ABCDEF GH and functional dependencies S: 1. Compute all keys for R. S = {A CD, ACF G, AD BEF, BCG D, CF AH,
More informationad = cb (1) cf = ed (2) adf = cbf (3) cf b = edb (4)
10 Most proofs re left s reding exercises. Definition 10.1. Z = Z {0}. Definition 10.2. Let be the binry reltion defined on Z Z by, b c, d iff d = cb. Theorem 10.3. is n equivlence reltion on Z Z. Proof.
More informationNormal Forms (ii) ICS 321 Fall Asst. Prof. Lipyeow Lim Information & Computer Science Department University of Hawaii at Manoa
ICS 321 Fall 2012 Normal Forms (ii) Asst. Prof. Lipyeow Lim Information & Computer Science Department University of Hawaii at Manoa 9/12/2012 Lipyeow Lim -- University of Hawaii at Manoa 1 Hourly_Emps
More informationDesign theory for relational databases
Design theory for relational databases 1. Consider a relation with schema R(A,B,C,D) and FD s AB C, C D and D A. a. What are all the nontrivial FD s that follow from the given FD s? You should restrict
More information12/3/2010 REVIEW ALGEBRA. Exam Su 3:30PM - 6:30PM 2010/12/12 Room C9000
REVIEW Exam Su 3:30PM - 6:30PM 2010/12/12 Room C9000 2 ALGEBRA 1 RELATIONAL ALGEBRA OPERATIONS Basic operations Selection ( ) Selects a subset of rows from relation. Projection ( ) Deletes unwanted columns
More informationA B CDE F B FD D A C AF DC A F
International Journal of Arts & Sciences, CD-ROM. ISSN: 1944-6934 :: 4(20):121 131 (2011) Copyright c 2011 by InternationalJournal.org A B CDE F B FD D A C A BC D EF C CE C A D ABC DEF B B C A E E C A
More informationIntroduction To Matrices MCV 4UI Assignment #1
Introduction To Mtrices MCV UI Assignment # INTRODUCTION: A mtrix plurl: mtrices) is rectngulr rry of numbers rrnged in rows nd columns Exmples: ) b) c) [ ] d) Ech number ppering in the rry is sid to be
More informationChapter 11, Relational Database Design Algorithms and Further Dependencies
Chapter 11, Relational Database Design Algorithms and Further Dependencies Normal forms are insufficient on their own as a criteria for a good relational database schema design. The relations in a database
More informationHere we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system.
Section 24 Nonsingulr Liner Systems Here we study squre liner systems nd properties of their coefficient mtrices s they relte to the solution set of the liner system Let A be n n Then we know from previous
More informationFunctional Dependency and Algorithmic Decomposition
Functional Dependency and Algorithmic Decomposition In this section we introduce some new mathematical concepts relating to functional dependency and, along the way, show their practical use in relational
More informationAP Calculus Multiple Choice: BC Edition Solutions
AP Clculus Multiple Choice: BC Edition Solutions J. Slon Mrch 8, 04 ) 0 dx ( x) is A) B) C) D) E) Divergent This function inside the integrl hs verticl symptotes t x =, nd the integrl bounds contin this
More informationUVA UVA UVA UVA. Database Design. Relational Database Design. Functional Dependency. Loss of Information
Relational Database Design Database Design To generate a set of relation schemas that allows - to store information without unnecessary redundancy - to retrieve desired information easily Approach - design
More informationRelational Design Theory II. Detecting Anomalies. Normal Forms. Normalization
Relational Design Theory II Normalization Detecting Anomalies SID Activity Fee Tax 1001 Piano $20 $2.00 1090 Swimming $15 $1.50 1001 Swimming $15 $1.50 Why is this bad design? Can we capture this using
More informationHW3, Math 307. CSUF. Spring 2007.
HW, Mth 7. CSUF. Spring 7. Nsser M. Abbsi Spring 7 Compiled on November 5, 8 t 8:8m public Contents Section.6, problem Section.6, problem Section.6, problem 5 Section.6, problem 7 6 5 Section.6, problem
More informationCSC 261/461 Database Systems Lecture 13. Spring 2018
CSC 261/461 Database Systems Lecture 13 Spring 2018 BCNF Decomposition Algorithm BCNFDecomp(R): Find X s.t.: X + X and X + [all attributes] if (not found) then Return R let Y = X + - X, Z = (X + ) C decompose
More informationDESIGN THEORY FOR RELATIONAL DATABASES. csc343, Introduction to Databases Renée J. Miller and Fatemeh Nargesian and Sina Meraji Winter 2018
DESIGN THEORY FOR RELATIONAL DATABASES csc343, Introduction to Databases Renée J. Miller and Fatemeh Nargesian and Sina Meraji Winter 2018 1 Introduction There are always many different schemas for a given
More informationFunctional Dependencies
Functional Dependencies P.J. M c.brien Imperial College London P.J. M c.brien (Imperial College London) Functional Dependencies 1 / 41 Problems in Schemas What is wrong with this schema? bank data no sortcode
More informationSymbols and dingbats. A 41 Α a 61 α À K cb ➋ à esc. Á g e7 á esc. Â e e5 â. Ã L cc ➌ ã esc ~ Ä esc : ä esc : Å esc * å esc *
Note: Although every effort ws tken to get complete nd ccurte tble, the uhtor cn not be held responsible for ny errors. Vrious sources hd to be consulted nd MIF hd to be exmined to get s much informtion
More informationA recursive construction of efficiently decodable list-disjunct matrices
CSE 709: Compressed Sensing nd Group Testing. Prt I Lecturers: Hung Q. Ngo nd Atri Rudr SUNY t Bufflo, Fll 2011 Lst updte: October 13, 2011 A recursive construction of efficiently decodble list-disjunct
More informationHomework 11. Andrew Ma November 30, sin x (1+x) (1+x)
Homewor Andrew M November 3, 4 Problem 9 Clim: Pf: + + d = d = sin b +b + sin (+) d sin (+) d using integrtion by prts. By pplying + d = lim b sin b +b + sin (+) d. Since limits to both sides, lim b sin
More informationCu 3 (PO 4 ) 2 (s) 3 Cu 2+ (aq) + 2 PO 4 3- (aq) circle answer: pure water or Na 3 PO 4 solution This is the common-ion effect.
CHEM 1122011 NAME: ANSWER KEY Vining, Exm # SHORT ANSWER QUESTIONS ============= 4 points ech ============ All work must be shown. 1. Wht re [H O ] nd [OH ] for solution tht hs ph of 9.0? Choose one. ()
More informationLossless Joins, Third Normal Form
Lossless Joins, Third Normal Form FCDB 3.4 3.5 Dr. Chris Mayfield Department of Computer Science James Madison University Mar 19, 2018 Decomposition wish list 1. Eliminate redundancy and anomalies 2. Recover
More informationRecitation 3: More Applications of the Derivative
Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech
More informationChapter 3 Design Theory for Relational Databases
1 Chapter 3 Design Theory for Relational Databases Contents Functional Dependencies Decompositions Normal Forms (BCNF, 3NF) Multivalued Dependencies (and 4NF) Reasoning About FD s + MVD s 2 Remember our
More informationCS 275 Automata and Formal Language Theory
CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.6.: Push Down Automt Remrk: This mteril is no longer tught nd not directly exm relevnt Anton Setzer (Bsed
More informationInformation Systems for Engineers. Exercise 8. ETH Zurich, Fall Semester Hand-out Due
Information Systems for Engineers Exercise 8 ETH Zurich, Fall Semester 2017 Hand-out 24.11.2017 Due 01.12.2017 1. (Exercise 3.3.1 in [1]) For each of the following relation schemas and sets of FD s, i)
More informationset is not closed under matrix [ multiplication, ] and does not form a group.
Prolem 2.3: Which of the following collections of 2 2 mtrices with rel entries form groups under [ mtrix ] multipliction? i) Those of the form for which c d 2 Answer: The set of such mtrices is not closed
More informationLecture 13 - Linking E, ϕ, and ρ
Lecture 13 - Linking E, ϕ, nd ρ A Puzzle... Inner-Surfce Chrge Density A positive point chrge q is locted off-center inside neutrl conducting sphericl shell. We know from Guss s lw tht the totl chrge on
More informationGood Review book ( ) ( ) ( )
7/31/2011 34 Boolen (Switching) Algebr Review Good Review book BeBop to the Boolen Boogie: An Unconventionl Guide to Electronics, 2 nd ed. by Clive Mxwell Hightext Publictions Inc. from Amzon.com for pprox.
More informationCS54100: Database Systems
CS54100: Database Systems Keys and Dependencies 18 January 2012 Prof. Chris Clifton Functional Dependencies X A = assertion about a relation R that whenever two tuples agree on all the attributes of X,
More informationRelational Database Design
Relational Database Design Chapter 15 in 6 th Edition 2018/4/6 1 10 Relational Database Design Anomalies can be removed from relation designs by decomposing them until they are in a normal form. Several
More informationNormaliza)on and Func)onal Dependencies
Normaliza)on and Func)onal Dependencies 1NF and 2NF Redundancy and Anomalies Func)onal Dependencies A9ribute Closure Keys and Super keys 3NF BCNF Minimal Cover Algorithm 3NF Synthesis Algorithm Decomposi)on
More informationHandout: Natural deduction for first order logic
MATH 457 Introduction to Mthemticl Logic Spring 2016 Dr Json Rute Hndout: Nturl deduction for first order logic We will extend our nturl deduction rules for sententil logic to first order logic These notes
More informationa n = 1 58 a n+1 1 = 57a n + 1 a n = 56(a n 1) 57 so 0 a n+1 1, and the required result is true, by induction.
MAS221(216-17) Exm Solutions 1. (i) A is () bounded bove if there exists K R so tht K for ll A ; (b) it is bounded below if there exists L R so tht L for ll A. e.g. the set { n; n N} is bounded bove (by
More informationLecture 2e Orthogonal Complement (pages )
Lecture 2e Orthogonl Complement (pges -) We hve now seen tht n orthonorml sis is nice wy to descrie suspce, ut knowing tht we wnt n orthonorml sis doesn t mke one fll into our lp. In theory, the process
More informationMATRICES AND VECTORS SPACE
MATRICES AND VECTORS SPACE MATRICES AND MATRIX OPERATIONS SYSTEM OF LINEAR EQUATIONS DETERMINANTS VECTORS IN -SPACE AND -SPACE GENERAL VECTOR SPACES INNER PRODUCT SPACES EIGENVALUES, EIGENVECTORS LINEAR
More informationDesign Theory for Relational Databases
Design Theory for Relational Databases FUNCTIONAL DEPENDENCIES DECOMPOSITIONS NORMAL FORMS 1 Functional Dependencies X ->Y is an assertion about a relation R that whenever two tuples of R agree on all
More informationEXTENDED BRST SYMMETRIES IN THE GAUGE FIELD THEORY
Romnin Reports in hysics olume 53 Nos.. 9 4 EXTENDED BRST SYETRIES IN TE GUGE FIELD TEORY UREL BBLEN RDU CONSTNTINESCU CREN IONESCU Deprtment of Theoreticl hysics University of Criov 3.I. Cuz Criov Romni
More informationA B= ( ) because from A to B is 3 right, 2 down.
8. Vectors nd vector nottion Questions re trgeted t the grdes indicted Remember: mgnitude mens size. The vector ( ) mens move left nd up. On Resource sheet 8. drw ccurtely nd lbel the following vectors.
More informationSUBJECT: MATHEMATICS ANSWERS: COMMON ENTRANCE TEST 2012
MOCK TEST 0 SUBJECT: MATHEMATICS ANSWERS: COMMON ENTRANCE TEST 0 ANSWERS. () π π Tke cos - (- ) then sin [ cos - (- )]sin [ ]/. () Since sin - + sin - y + sin - z π, -; y -, z - 50 + y 50 + z 50 - + +
More informationELE B7 Power System Engineering. Unbalanced Fault Analysis
Power System Engineering Unblnced Fult Anlysis Anlysis of Unblnced Systems Except for the blnced three-phse fult, fults result in n unblnced system. The most common types of fults re single lineground
More informationDIRECT CURRENT CIRCUITS
DRECT CURRENT CUTS ELECTRC POWER Consider the circuit shown in the Figure where bttery is connected to resistor R. A positive chrge dq will gin potentil energy s it moves from point to point b through
More informationJackson 2.26 Homework Problem Solution Dr. Christopher S. Baird University of Massachusetts Lowell
Jckson 2.26 Homework Problem Solution Dr. Christopher S. Bird University of Msschusetts Lowell PROBLEM: The two-dimensionl region, ρ, φ β, is bounded by conducting surfces t φ =, ρ =, nd φ = β held t zero
More informationfractions Let s Learn to
5 simple lgebric frctions corne lens pupil retin Norml vision light focused on the retin concve lens Shortsightedness (myopi) light focused in front of the retin Corrected myopi light focused on the retin
More informationA-Level Mathematics Transition Task (compulsory for all maths students and all further maths student)
A-Level Mthemtics Trnsition Tsk (compulsory for ll mths students nd ll further mths student) Due: st Lesson of the yer. Length: - hours work (depending on prior knowledge) This trnsition tsk provides revision
More informationDesign Theory for Relational Databases
Design Theory for Relational Databases Keys: formal definition K is a superkey for relation R if K functionally determines all attributes of R K is a key for R if K is a superkey, but no proper subset
More informationState space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies
Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response
More informationSchema Refinement and Normal Forms. The Evils of Redundancy. Schema Refinement. Yanlei Diao UMass Amherst April 10, 2007
Schema Refinement and Normal Forms Yanlei Diao UMass Amherst April 10, 2007 Slides Courtesy of R. Ramakrishnan and J. Gehrke 1 The Evils of Redundancy Redundancy is at the root of several problems associated
More informationChapter 0. What is the Lebesgue integral about?
Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous
More informationCS 186, Fall 2002, Lecture 6 R&G Chapter 15
Schema Refinement and Normalization CS 186, Fall 2002, Lecture 6 R&G Chapter 15 Nobody realizes that some people expend tremendous energy merely to be normal. Albert Camus Functional Dependencies (Review)
More information1 Linear Least Squares
Lest Squres Pge 1 1 Liner Lest Squres I will try to be consistent in nottion, with n being the number of dt points, nd m < n being the number of prmeters in model function. We re interested in solving
More informationalong the vector 5 a) Find the plane s coordinate after 1 hour. b) Find the plane s coordinate after 2 hours. c) Find the plane s coordinate
L8 VECTOR EQUATIONS OF LINES HL Mth - Sntowski Vector eqution of line 1 A plne strts journey t the point (4,1) moves ech hour long the vector. ) Find the plne s coordinte fter 1 hour. b) Find the plne
More informationCH 9 INTRO TO EQUATIONS
CH 9 INTRO TO EQUATIONS INTRODUCTION I m thinking of number. If I dd 10 to the number, the result is 5. Wht number ws I thinking of? R emember this question from Chpter 1? Now we re redy to formlize the
More informationCS5371 Theory of Computation. Lecture 20: Complexity V (Polynomial-Time Reducibility)
CS5371 Theory of Computtion Lecture 20: Complexity V (Polynomil-Time Reducibility) Objectives Polynomil Time Reducibility Prove Cook-Levin Theorem Polynomil Time Reducibility Previously, we lernt tht if
More informationFormal Languages Simplifications of CFGs
Forml Lnguges implifictions of CFGs ubstitution Rule Equivlent grmmr b bc ubstitute b bc bbc b 2 ubstitution Rule b bc bbc ubstitute b bc bbc bc Equivlent grmmr 3 In generl: xz y 1 ubstitute y 1 xz xy1z
More informationBest Approximation in the 2-norm
Jim Lmbers MAT 77 Fll Semester 1-11 Lecture 1 Notes These notes correspond to Sections 9. nd 9.3 in the text. Best Approximtion in the -norm Suppose tht we wish to obtin function f n (x) tht is liner combintion
More informationBefore we can begin Ch. 3 on Radicals, we need to be familiar with perfect squares, cubes, etc. Try and do as many as you can without a calculator!!!
Nme: Algebr II Honors Pre-Chpter Homework Before we cn begin Ch on Rdicls, we need to be fmilir with perfect squres, cubes, etc Try nd do s mny s you cn without clcultor!!! n The nth root of n n Be ble
More informationThis lecture covers Chapter 8 of HMU: Properties of CFLs
This lecture covers Chpter 8 of HMU: Properties of CFLs Turing Mchine Extensions of Turing Mchines Restrictions of Turing Mchines Additionl Reding: Chpter 8 of HMU. Turing Mchine: Informl Definition B
More informationLine Integrals. Partitioning the Curve. Estimating the Mass
Line Integrls Suppose we hve curve in the xy plne nd ssocite density δ(p ) = δ(x, y) t ech point on the curve. urves, of course, do not hve density or mss, but it my sometimes be convenient or useful to
More informationp(t) dt + i 1 re it ireit dt =
Note: This mteril is contined in Kreyszig, Chpter 13. Complex integrtion We will define integrls of complex functions long curves in C. (This is bit similr to [relvlued] line integrls P dx + Q dy in R2.)
More information1 Functions Defined in Terms of Integrals
November 5, 8 MAT86 Week 3 Justin Ko Functions Defined in Terms of Integrls Integrls llow us to define new functions in terms of the bsic functions introduced in Week. Given continuous function f(), consider
More informationConvex Sets and Functions
B Convex Sets nd Functions Definition B1 Let L, +, ) be rel liner spce nd let C be subset of L The set C is convex if, for ll x,y C nd ll [, 1], we hve 1 )x+y C In other words, every point on the line
More informationCSCI 340: Computational Models. Kleene s Theorem. Department of Computer Science
CSCI 340: Computtionl Models Kleene s Theorem Chpter 7 Deprtment of Computer Science Unifiction In 1954, Kleene presented (nd proved) theorem which (in our version) sttes tht if lnguge cn e defined y ny
More informationCS 330 Formal Methods and Models
CS 330 Forml Methods nd Models Dn Richrds, George Mson University, Spring 2017 Quiz Solutions Quiz 1, Propositionl Logic Dte: Ferury 2 1. Prove ((( p q) q) p) is tutology () (3pts) y truth tle. p q p q
More informationRelational Design Theory
Relational Design Theory CSE462 Database Concepts Demian Lessa/Jan Chomicki Department of Computer Science and Engineering State University of New York, Buffalo Fall 2013 Overview How does one design a
More informationCS 373, Spring Solutions to Mock midterm 1 (Based on first midterm in CS 273, Fall 2008.)
CS 373, Spring 29. Solutions to Mock midterm (sed on first midterm in CS 273, Fll 28.) Prolem : Short nswer (8 points) The nswers to these prolems should e short nd not complicted. () If n NF M ccepts
More informationProperties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives
Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn
More informationBases for Vector Spaces
Bses for Vector Spces 2-26-25 A set is independent if, roughly speking, there is no redundncy in the set: You cn t uild ny vector in the set s liner comintion of the others A set spns if you cn uild everything
More informationFunctional Dependencies and Normalization
Functional Dependencies and Normalization There are many forms of constraints on relational database schemata other than key dependencies. Undoubtedly most important is the functional dependency. A functional
More informationHKDSE2018 Mathematics (Compulsory Part) Paper 2 Solution 1. B 4 (2 ) = (2 ) 2. D. α + β. x x. α β 3. C. h h k k ( 4 ) 6( 2 )
HKDSE08 Mthemtics (Compulsory Prt) Pper Solution. B n+ 8 n+ 4 ( ) ( ) n+ n+ 6n+ 6n+ (6n+ ) (6n+ ). D α β x x α x β ( x) α x β β x α x + β x β ( α + β ) x β β x α + β. C 6 4 h h k k ( 4 ) 6( ) h k h + k
More informationES.182A Topic 32 Notes Jeremy Orloff
ES.8A Topic 3 Notes Jerem Orloff 3 Polr coordintes nd double integrls 3. Polr Coordintes (, ) = (r cos(θ), r sin(θ)) r θ Stndrd,, r, θ tringle Polr coordintes re just stndrd trigonometric reltions. In
More informationDo the one-dimensional kinetic energy and momentum operators commute? If not, what operator does their commutator represent?
1 Problem 1 Do the one-dimensionl kinetic energy nd momentum opertors commute? If not, wht opertor does their commuttor represent? KE ˆ h m d ˆP i h d 1.1 Solution This question requires clculting the
More informationCoordinate Geometry. Coordinate Geometry. Curriculum Ready ACMNA: 178, 214, 294.
Coordinte Geometr Coordinte Geometr Curricuum Red ACMNA: 78, 4, 94 www.mthetics.com Coordinte COORDINATE Geometr GEOMETRY Shpes ou ve seen in geometr re put onto es nd nsed using gebr. Epect bit of both
More informationLet's start with an example:
Finite Automt Let's strt with n exmple: Here you see leled circles tht re sttes, nd leled rrows tht re trnsitions. One of the sttes is mrked "strt". One of the sttes hs doule circle; this is terminl stte
More informationSome Theory of Computation Exercises Week 1
Some Theory of Computtion Exercises Week 1 Section 1 Deterministic Finite Automt Question 1.3 d d d d u q 1 q 2 q 3 q 4 q 5 d u u u u Question 1.4 Prt c - {w w hs even s nd one or two s} First we sk whether
More informationSchema Refinement & Normalization Theory
Schema Refinement & Normalization Theory Functional Dependencies Week 13 1 What s the Problem Consider relation obtained (call it SNLRHW) Hourly_Emps(ssn, name, lot, rating, hrly_wage, hrs_worked) What
More informationConvert the NFA into DFA
Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:
More informationSchema Refinement and Normal Forms
Schema Refinement and Normal Forms UMass Amherst Feb 14, 2007 Slides Courtesy of R. Ramakrishnan and J. Gehrke, Dan Suciu 1 Relational Schema Design Conceptual Design name Product buys Person price name
More informationINTRODUCTION TO INTEGRATION
INTRODUCTION TO INTEGRATION 5.1 Ares nd Distnces Assume f(x) 0 on the intervl [, b]. Let A be the re under the grph of f(x). b We will obtin n pproximtion of A in the following three steps. STEP 1: Divide
More informationLinearly Similar Polynomials
Linerly Similr Polynomils rthur Holshouser 3600 Bullrd St. Chrlotte, NC, US Hrold Reiter Deprtment of Mthemticl Sciences University of North Crolin Chrlotte, Chrlotte, NC 28223, US hbreiter@uncc.edu stndrd
More informationDATABASE DESIGN I - 1DL300
DATABASE DESIGN I - DL300 Fll 00 An introductory course on dtse systems http://www.it.uu.se/edu/course/homepge/dstekn/ht0/ Mnivskn Sesn Uppsl Dtse Lortory Deprtment of Informtion Technology, Uppsl University,
More informationChapter 6 Notes, Larson/Hostetler 3e
Contents 6. Antiderivtives nd the Rules of Integrtion.......................... 6. Are nd the Definite Integrl.................................. 6.. Are............................................ 6. Reimnn
More informationNFAs and Regular Expressions. NFA-ε, continued. Recall. Last class: Today: Fun:
CMPU 240 Lnguge Theory nd Computtion Spring 2019 NFAs nd Regulr Expressions Lst clss: Introduced nondeterministic finite utomt with -trnsitions Tody: Prove n NFA- is no more powerful thn n NFA Introduce
More informationLecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations.
Lecture 3 3 Solving liner equtions In this lecture we will discuss lgorithms for solving systems of liner equtions Multiplictive identity Let us restrict ourselves to considering squre mtrices since one
More informationLinear Algebra 1A - solutions of ex.4
Liner Algebr A - solutions of ex.4 For ech of the following, nd the inverse mtrix (mtritz hofkhit if it exists - ( 6 6 A, B (, C 3, D, 4 4 ( E i, F (inverse over C for F. i Also, pick n invertible mtrix
More information1. Extend QR downwards to meet the x-axis at U(6, 0). y
In the digrm, two stright lines re to be drwn through so tht the lines divide the figure OPQRST into pieces of equl re Find the sum of the slopes of the lines R(6, ) S(, ) T(, 0) Determine ll liner functions
More informationUnit #9 : Definite Integral Properties; Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties; Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationRecitation 3: Applications of the Derivative. 1 Higher-Order Derivatives and their Applications
Mth 1c TA: Pdric Brtlett Recittion 3: Applictions of the Derivtive Week 3 Cltech 013 1 Higher-Order Derivtives nd their Applictions Another thing we could wnt to do with the derivtive, motivted by wht
More informationSect 10.2 Trigonometric Ratios
86 Sect 0. Trigonometric Rtios Objective : Understnding djcent, Hypotenuse, nd Opposite sides of n cute ngle in right tringle. In right tringle, the otenuse is lwys the longest side; it is the side opposite
More informationProblem about anomalies
Problem about anomalies Title Year Genre StarName Star Wars 1977 SciFi Carrie Fisher Star Wars 1977 SciFi Harrison Ford Raiders... 1981 Action Harrison Ford Raiders... 1981 Adventure Harrison Ford When
More informationRegular Language. Nonregular Languages The Pumping Lemma. The pumping lemma. Regular Language. The pumping lemma. Infinitely long words 3/17/15
Regulr Lnguge Nonregulr Lnguges The Pumping Lemm Models of Comput=on Chpter 10 Recll, tht ny lnguge tht cn e descried y regulr expression is clled regulr lnguge In this lecture we will prove tht not ll
More informationUSA Mathematical Talent Search Round 1 Solutions Year 21 Academic Year
1/1/21. Fill in the circles in the picture t right with the digits 1-8, one digit in ech circle with no digit repeted, so tht no two circles tht re connected by line segment contin consecutive digits.
More informationLecture 2: Fields, Formally
Mth 08 Lecture 2: Fields, Formlly Professor: Pdric Brtlett Week UCSB 203 In our first lecture, we studied R, the rel numbers. In prticulr, we exmined how the rel numbers intercted with the opertions of
More informationRelational Database Design Theory Part II. Announcements (October 12) Review. CPS 116 Introduction to Database Systems
Relational Database Design Theory Part II CPS 116 Introduction to Database Systems Announcements (October 12) 2 Midterm graded; sample solution available Please verify your grades on Blackboard Project
More informationChapter 1: Fundamentals
Chpter 1: Fundmentls 1.1 Rel Numbers Types of Rel Numbers: Nturl Numbers: {1, 2, 3,...}; These re the counting numbers. Integers: {... 3, 2, 1, 0, 1, 2, 3,...}; These re ll the nturl numbers, their negtives,
More informationWe will see what is meant by standard form very shortly
THEOREM: For fesible liner progrm in its stndrd form, the optimum vlue of the objective over its nonempty fesible region is () either unbounded or (b) is chievble t lest t one extreme point of the fesible
More informationSUMMER KNOWHOW STUDY AND LEARNING CENTRE
SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18
More informationJackson 2.7 Homework Problem Solution Dr. Christopher S. Baird University of Massachusetts Lowell
Jckson.7 Homework Problem Solution Dr. Christopher S. Bird University of Msschusetts Lowell PROBLEM: Consider potentil problem in the hlf-spce defined by, with Dirichlet boundry conditions on the plne
More information