HASHING METHODS. Hanan Samet

Size: px
Start display at page:

Download "HASHING METHODS. Hanan Samet"

Transcription

1 hs0 HASHING METHODS Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland Copyight 1996 Hanan Samet These notes may not be epoduced by any means (mechanical o electonic o any othe) without the expess witten pemission of Hanan Samet

2 hs1 HASHING OVERVIEW Task: compae the value of a key with a set of key values in a table Conventional solutions: 1. use a compaison on key values (tee-based) 2. banching pocess govened by the digits compising the key value (tie-based) Altenative solution is to find a 1-1 mapping (i.e., function) fom set of possible key values to a memoy addess and use table lookup methods to etieve the ecod O (1) pocess Poblem: the set of possible key values is much lage than the numbe of available memoy addesses 1. developing the 1-1 function h is time-consuming as it equies puzzle-solving abilities esult is called a pefect hashing function 2. once h is found, addition of a single key value may ende the function meaningless need to develop it anew 3. can eplace h by a pogam, which may itself be timeconsuming to compute Result: usually abandon goal of finding 1-1 mapping and use a special method to esolve any ambiguity (i.e., when moe than one key value is mapped to the same addess temed a collision)

3 hs2 HASHING Def: to mess things up Hashing function h(k) is used to calculate addess whee to stat the seach fo the ecod with key value k Issues 1. what kind of a function is h(k)? easy and fast to compute minimize the numbe of collisions 2. what if h(k) does not yield the desied esult? how to handle collisions Assume table of size m and 0 h(k) < m Example hashing functions: 1. division techniques often use h(k) = k mod m choice of m is impotant a. m even bad as h(k) even when k even and odd when k odd b. m is a powe of the adix of alphanumeic set of chaacte values bad as only least significant chaactes matte with m= 3, ABCDEF, IJKDEF, and KLMDEF all hash to the same location c. usually choose m to be pime 2. multiplicative techniques entie key value is used examples: a. multiply fields and take modulo b. add o exclusive-o of fields

4 SEPARATE CHAINING Hash table of size m 3 z 2 1 b hs3 One chain (linked list) fo each of m hash values containing all elements that hash to that location (known as a collision list ) Hash chains ae known as buckets Hash table locations ae known as bucket addesses Fo n key values, aveage chain size is n/m One chain (linked list) fo each of m hash values Retieval 1. use sequential seach though chain 2. speed up unsuccessful seach by soting chain by key value 3. speed up successful seach by self-oganizing methods move key value to stat of chain each time it is accessed Ex: h(k) NAME k=key NEXT 0 JIM 49 Λ 1 JOHN 22 Λ 2 RAY 30 Λ 3 SUZY 3 Λ LUCY 41 Λ JANE 14 Λ 1. add JANE(14) 0 2. add LUCY(41) 6

5 IN-PLACE CHAINING When m is lage, many of the chains ae empty 4 g 3 z 2 1 b hs4 Use empty locations in table fo the chain Must be able to distinguish between fee and occupied locations Insetion algoithm: 1. if key value not pesent, then allocate a fee location 2. link location to chain which was unsuccessfully seached Ex: h(k) NAME k=key NEXT 0 JIM 49 Λ 1 JOHN 22 Λ 2 RAY 30 Λ 3 SUZY 3 Λ LUCY JANE JANE LUCY Λ Λ Λ 1. add JANE(14) 0 which collides with JIM(49) 0 2. add LUCY(41) 6 which collides with JANE(14) 0 which is stoed at 6 esult in coalescing of chains of JANE and LUCY making unsuccessful seach longe as seveal chains must be seached Can avoid coalescing by moving JANE just befoe adding LUCY

6 hs5 IN-PLACE CHAINING INSERTION ALGORITHM location pocedue CHAINING_WITH_COALESCING_INSERTION(k); begin value key k; intege i; global intege ; /* is the most ecently allocated location */ global hashtable table; i h(k); if OCCUPIED(table[i]) then begin while NOT(NULL(NEXT(table[i])) do begin if k=key(table[i]) then etun(i) else i NEXT(table[i]); end; if k=key(table[i]) then etun(i); while OCCUPIED(table[]) do -1; if 0 then etun(`overflow') else begin NEXT(table[i]) ; i ; end; end; MARK(table[i],`OCCUPIED'); KEY(table[i]) k; NEXT(table[i]) NIL; etun(i); end;

7 LAMPSON S IN-PLACE CHAINING hs6 Avoid exta space fo NEXT field by not stoing entie key value with ecod k = m q(k) + h(k), q(k) = k/m, h(k) = k mod m Stoe q(k) in table instead of k Can compute k given m, q(k), and h(k), Ex: 0 k < 2 32 q(k) h(k) Since only compae q(k), all elements in same collision list must have the same value of h(k) and thus no coalescing is allowed Data stuctue: 1. cicula collision lists 2. flag FIRST denoting if fist element on collision list 3. pointe NEXT to next element in cicula list with same h(k) value Ex: h(k) NAME k=key FIRST q(k) NEXT 0 JIM 49 T JOHN 22 T RAY 30 T SUZY 3 T JANE 14 F JANE LUCY F T add JANE(14) 0 2. add LUCY(41) 6 but 6 contains JANE if at least one element of the hash chain stating at 6 exists, then it must be stoed thee must move JANE as it does not belong in 6 Nice compomise between use of a key value as an index to a table, which is impossible due to lage numbe of possible key values, and stoing the entie key value as in a conventional hashing method 4 g 3 z 2 1 b

8 OPEN ADDRESSING hs7 Like chaining but NEXT link field is open o unspecified Pobe sequence: set of locations compising collision list of a key Goal: cycle though all locations with little o no duplication Linea pobing: h(k), h(k)+1, h(k)+2,, m 1, 0, 1, h(k) 1 Insetion Algoithm: 1. calculate hash addess i 2. if TABLE(i ) is empty then inset and exit; else i i+1 mod m and epeat step 2 until exhausting TABLE 6 z 5 4 g 3 z 2 1 b Ex: h(k) NAME k=key 0 JIM 49 1 JOHN 22 2 RAY 30 3 SUZY 3 4 JANE LUCY 41 DELETED N N Y N N N N 1. adding JANE(14) 0 yields a collision; cyclic pobe sequence causes its insetion in 4 2. adding LUCY(41) 6 3. delete RAY(30) 2 poblem: if look up JANE then don t find he since a collision exists at location 0, and pobe sequence finds location 2 unoccupied solution: add DELETED flag to each enty to halt the seach duing insetion but not duing lookup

9 hs8 PILEUP PHENOMENON Next key to be inseted goes into one of the vacant locations Not all vacant locations ae equally pobable Ex: inset k into location 3 if 0 h(k) 3 inset k into location 6 if h(k)=6 3 is fou times as likely as 6 Coalescing in open addessing with linea pobing can lead to big gowth (e.g., inseting into location 9 makes the list of 8 gow by 4) Diffeent fom in-place chaining whee coalescing causes a list to gow by only one element Pileup phenomenon aises wheneve consecutive values ae likely to occu Ovecome by a numbe of techniques: 1. use additive constant instead of 1 should be elatively pime to m so can cycle though table 2. use a pseudo andom numbe geneato to ceate successive offsets fom h(k) (andom pobing) make sue cycle though table unifom hashing = when all possible configuations of empty and occupied locations ae equally likely = model of hashing fo compaing vaious methods

10 hs9 ANALYSIS OF PERFORMANCE n= numbe of key values in table m= maximum size of table α = n/m = load facto Expected numbe of pobes fo successful seach: α linea pobing andom pobing (unde unifom hashing model) sepaate chaining (1 α/2)/(1-α) (ln (1-α))/α 1+α/

11 hs10 QUADRATIC PROBING Altenative to linea pobing Avoids pimay clusteing h i = (h(k)+i 2) mod m Locations in the pobe sequence can be computed with no multiplication 1. h i is location of element i 2. h i+1 = (h i + d i mod m ) whee d 0 = 1 and d i+1 = d i +2 Theoem: if m is pime, then quadatic pobing will seach though at least 50% of the table befoe seeing a paticula location again Ex: m=7 h 0 = 0, h 1 = 1, h 2 = 4 h 3 = 9 mod 7 = 2 and h 4 = 16 mod 7 =2 Poof: 1. let pobes i, j pobe the same location (assume i j ) 2. i 2 mod m = j 2 mod m 3. (i 2 j 2) mod m = (i+j) (i j) mod m = 0 mod m 4. but i,j ae both < m implying (i j ) c m 5. theefoe, i+j = c m and i o j must be at least m/2 since pobe sequence stats with i =1, and ecycling of values won t occu until at least 50% of table has been seached Sequence diffes fom one obtained fom the pseudo andom numbe geneato as the pseudo andom numbe geneato guaantees that evey location will be on a pobe sequence

12 hs11 DOUBLE HASHING Use an additional hash function g(k) to geneate a constant incement fo the pobe sequence Pobe sequence fo key value k: p 0 = h(k) p 1 = (h(k) + g(k)) mod m p 2 = (h(k) + 2 g(k)) mod m p 3 = (h(k) + 3 g(k)) mod m p i = (h(k) + i g(k)) mod m h(k) and g(k) should be independent g(k) geneates values between 1 and m 1 Two diffeent key values will have the same value fo h and g with pobability O (1/m 2) instead of O (1/m) Key value k is stoed at any one of the locations along its pobe sequence Key values stoed along the pobe sequence of k ae not necessaily pat of k s pobe sequence Ex: key values s and t can both hash to location u key value s : u = (h (s) + c g (s)) mod m key value t : u = (h (t ) + d g (t )) mod m

13 SELF-ORGANIZING DOUBLE HASHING 3 z 2 1 b hs12 Collision lists ae long as each location is fequently on the collision lists of many diffeent key values Develop techniques fo eaanging the elements on the collision lists so that subsequent seaches ae shote Assume ecods ae etieved many times once inseted into the table hence it pays to eaange the collision lists Assume tying to inset key value k and pobe locations p 0, p 1, p i, p t, whee p i = (h(k)+i g(k)) mod m befoe finding location p t empty p i = (h(k)+i g(k)) mod m Each p i (0 i <t ) is also pat of a hash chain consisting of locations: (p i +j g(key(p i ))) mod m fo abitay j Assume c i = g(key(p i )), and p i = h(key(p i )) mod m: p 0 p 1 p 2 p 3 p 4 p t p 0 + c 0 1 p 1 + c 1 2 p 2 + c 2 4 p 3 + c 3 7 p 4 + c 4 11 p 0 +2c 0 3 p 1 +2c 1 5 p 2 +2c 2 8 p 3 +2c 3 12 p 0 +3c 0 6 p 1 +3c 1 9 p 2 +3c 2 13 p 0 +4c 0 10 p 1 +4c 1 14 p 0 +5c 0 15 Actually, p i = (h(key(p i )) +d i g(key(p i ))) mod m Bent algoithm: ty to inset key value k in one of p i and move the contents of p i to an empty location along its pobe sequence (column) so as to minimize the effective incemental seach cost Ode fo testing candidate locations fo moving (along diagonals)

14 EXAMPLE OF BRENT ALGORITHM Attempt to inset RUDY 9 g 8 b 7 6 v 5 g 4 z 3 v 2 1 b hs13 p 0 =TIM p 1 =ALAN p 2 =JAY p 3 =KATY p 4 =? RUDY RUDY RUDY RUDY JOAN RUTH JAY KIM RON ALAN ALEX RITA BOB TIM KATY Fist fee location in RUDY s pobe sequence is p 4 fo an incease in cost of 4 Examine locations in diagonal ode fo fist fee location Altenatively, find fist fee location in each hash chain and check if oveall seach cost is inceased by a movement of it Movement must esult in an incease <4 in the seach cost Moving TIM inceases the seach cost by 4 Moving ALAN inceases its seach cost by 2, while inceasing that of RUDY by 1 fo a total of 3 Moving JAY inceases its seach cost by 1, while inceasing that of RUDY by 2 fo a total of 3 Moving KATY inceases its seach cost by 4, while inceasing that of RUDY by 3 fo a total of 7 Move JAY as its incease (3) was the least and was encounteed fist Need 2.5 pobes on the aveage fo successful seach Aveage numbe of pobes fo unsuccessful seach is not educed (as high as (m+1)/2 when the table is full)

15 hs14 GONNET-MUNRO ALGORITHM Moe geneal than the Bent algoithm Bent algoithm only attempts to move ecods on the pobe sequence of the ecod being inseted p 0 =TIM p 1 =ALAN p 2 =JAY p 3 =KATY p 4 =? JOAN RUTH KIM RON ALEX RITA BOB Gonnet-Muno attempts to move in seveal stages instead of just one stage 1. RUDY to TIM, TIM to JOAN, and JOAN to? 2. RUDY to ALAN, ALAN to RUTH, and RUTH to? Need emaining hash chains JOAN RITA KIM RUTH RON ALEX BOB JAY KIM KATY TIM ALAN JAY Can visualize seach fo best movement as a binay tee Best movement is the closest empty node to the oot

16 EXAMPLE OF GONNET-MUNRO ALGORITHM Attempt to inset RUDY RUDY, TIM 5 v 4 g 3 z 2 1 b hs15 denote puning due to epetition ALAN JOAN JAY RUTH RON KATY KIM RITA KIM JAY ALEX TIM JAY ALAN KATY * BOB Right son of a is next element in pobe sequence of KEY(a) Left son of a is next element in pobe sequence of a and a s fathe Seach geneates the tee level by level and chooses the fist empty node as the final taget fo a sequence of elocation steps RUDY can be elocated to any position in the leftmost pat of the tee Apply the elocation step as many times as needed to get to desied empty node Optimal solution moves RUDY to TIM, TIM to JOAN, and JOAN to its empty ight son 1. incease in total seach cost is 2 2. bette than 3 obtained by Bent algoithm Bent algoithm only applies one step and thus must find the empty node in just one iteation 1. move RUDY to JAY; JAY to empty ight son of JAY 2. incease in total seach cost is 3

17 SHORTCOMING OF GONNET-MUNRO ALGORITHM 1 b hs16 Only moves ecods in fowad diection along thei hash chains Sometimes can educe the cost by moving backwad along the chain Ex: suppose ALAN is not in the fist position along the hash chain stating at h(alan) mod m and that BOB immediately pecedes ALAN along the hash chain, although h(alan) h(bob) BOB p 1 =ALAN RUTH BOB BOB JAY ALAN RUDY RUTH Optimal solution moves RUDY to ALAN, ALAN to BOB, and BOB to its empty son 1. incease in total seach cost is 1 2. bette than 2 obtained by Gonnet-Muno algoithm Requies a tenay tee 1. need an additional link fom a to the pevious element in the pobe sequence of KEY(a) e.g., ALAN to BOB 2. seach pocess intepets pevious links as indicating a decease in cost 3. if incoming link to a is a pevious element link, then left son of a is the pio element in pobe sequence of a and its fathe 4. seach pocess is moe complex and empty node at closest level to the oot no longe epesents the cheapest elocation sequence 5. optimal solution may equie exhaustive seach TIM 3 z 2 JOAN

18 hs17 SUMMARY Advantages 1. sepaate chaining is supeio with espect to the numbe of pobes but need moe space 2. open addessing with linea pobing esults in moe accesses but this is compensated by its simplicity 3. compaes favoably with othe seach methods as the seach time is bounded as the numbe of ecods inceases (povided the table does not become too full) Disadvantages 1. size of hash table is usually fixed have to woy about ehashing sepaate chaining with oveflow buckets is good use linea hashing o spial hashing which just split one bucket and ehash its contents instead of ehashing the entie table 2. afte an unsuccessful seach we only know that the ecod is not pesent we don t know about the pesence o absence of othe ecods with simila key values such as the immediate pedecesso o successo contast with B-tees and othe methods based on binay seach which maintain the natual ode of the key values and pemit pocessing along this ode ode-peseving hashing methods such as those used to deal with multiattibute data (and spatial data) ae an exception 3. deletion may be cumbesome (e.g., open addessing) 4. only efficient on the aveage contast with B-tee methods which have guaanteed uppe bounds on seach time, etc. need faith in pobability theoy!

HASHING METHODS. Hanan Samet

HASHING METHODS. Hanan Samet hs0 HASHING METHODS Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

gr0 GRAPHS Hanan Samet

gr0 GRAPHS Hanan Samet g0 GRPHS Hanan Samet ompute Science epatment and ente fo utomation Reseach and Institute fo dvanced ompute Studies Univesity of Mayland ollege Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu opyight 1997 Hanan

More information

Chapter 3: Theory of Modular Arithmetic 38

Chapter 3: Theory of Modular Arithmetic 38 Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences

More information

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS?

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? 6th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? Cecília Sitkuné Göömbei College of Nyíegyháza Hungay Abstact: The

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Pushdown Automata (PDAs)

Pushdown Automata (PDAs) CHAPTER 2 Context-Fee Languages Contents Context-Fee Gammas definitions, examples, designing, ambiguity, Chomsky nomal fom Pushdown Automata definitions, examples, euivalence with context-fee gammas Non-Context-Fee

More information

ASTR415: Problem Set #6

ASTR415: Problem Set #6 ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal

More information

gr0 GRAPHS Hanan Samet

gr0 GRAPHS Hanan Samet g0 GRPHS Hanan Samet ompute Science epatment and ente fo utomation Reseach and Institute fo dvanced ompute Studies Univesity of Mayland ollege Pak, Mayland 0 e-mail: hjs@umiacs.umd.edu opyight 199 Hanan

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

Berkeley Math Circle AIME Preparation March 5, 2013

Berkeley Math Circle AIME Preparation March 5, 2013 Algeba Toolkit Rules of Thumb. Make sue that you can pove all fomulas you use. This is even bette than memoizing the fomulas. Although it is best to memoize, as well. Stive fo elegant, economical methods.

More information

Encapsulation theory: the transformation equations of absolute information hiding.

Encapsulation theory: the transformation equations of absolute information hiding. 1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic. Chapte 9 Pimitive Roots 9.1 The multiplicative goup of a finite fld Theoem 9.1. The multiplicative goup F of a finite fld is cyclic. Remak: In paticula, if p is a pime then (Z/p) is cyclic. In fact, this

More information

ITI Introduction to Computing II

ITI Introduction to Computing II ITI 1121. Intoduction to Computing II Macel Tucotte School of Electical Engineeing and Compute Science Abstact data type: Stack Stack-based algoithms Vesion of Febuay 2, 2013 Abstact These lectue notes

More information

Surveillance Points in High Dimensional Spaces

Surveillance Points in High Dimensional Spaces Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage

More information

4/18/2005. Statistical Learning Theory

4/18/2005. Statistical Learning Theory Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse

More information

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES AGU Intenational Jounal of Science and Technology A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES Ritu Ahuja Depatment of Mathematics Khalsa College fo Women, Civil Lines, Ludhiana-141001, Punjab, (India)

More information

Auchmuty High School Mathematics Department Advanced Higher Notes Teacher Version

Auchmuty High School Mathematics Department Advanced Higher Notes Teacher Version The Binomial Theoem Factoials Auchmuty High School Mathematics Depatment The calculations,, 6 etc. often appea in mathematics. They ae called factoials and have been given the notation n!. e.g. 6! 6!!!!!

More information

To Feel a Force Chapter 7 Static equilibrium - torque and friction

To Feel a Force Chapter 7 Static equilibrium - torque and friction To eel a oce Chapte 7 Chapte 7: Static fiction, toque and static equilibium A. Review of foce vectos Between the eath and a small mass, gavitational foces of equal magnitude and opposite diection act on

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

Web-based Supplementary Materials for. Controlling False Discoveries in Multidimensional Directional Decisions, with

Web-based Supplementary Materials for. Controlling False Discoveries in Multidimensional Directional Decisions, with Web-based Supplementay Mateials fo Contolling False Discoveies in Multidimensional Diectional Decisions, with Applications to Gene Expession Data on Odeed Categoies Wenge Guo Biostatistics Banch, National

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

Australian Intermediate Mathematics Olympiad 2017

Australian Intermediate Mathematics Olympiad 2017 Austalian Intemediate Mathematics Olympiad 207 Questions. The numbe x is when witten in base b, but it is 22 when witten in base b 2. What is x in base 0? [2 maks] 2. A tiangle ABC is divided into fou

More information

Method for Approximating Irrational Numbers

Method for Approximating Irrational Numbers Method fo Appoximating Iational Numbes Eic Reichwein Depatment of Physics Univesity of Califonia, Santa Cuz June 6, 0 Abstact I will put foth an algoithm fo poducing inceasingly accuate ational appoximations

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

Graphs of Sine and Cosine Functions

Graphs of Sine and Cosine Functions Gaphs of Sine and Cosine Functions In pevious sections, we defined the tigonometic o cicula functions in tems of the movement of a point aound the cicumfeence of a unit cicle, o the angle fomed by the

More information

Physics 2A Chapter 10 - Moment of Inertia Fall 2018

Physics 2A Chapter 10 - Moment of Inertia Fall 2018 Physics Chapte 0 - oment of netia Fall 08 The moment of inetia of a otating object is a measue of its otational inetia in the same way that the mass of an object is a measue of its inetia fo linea motion.

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

Encapsulation theory: radial encapsulation. Edmund Kirwan *

Encapsulation theory: radial encapsulation. Edmund Kirwan * Encapsulation theoy: adial encapsulation. Edmund Kiwan * www.edmundkiwan.com Abstact This pape intoduces the concept of adial encapsulation, wheeby dependencies ae constained to act fom subsets towads

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

1D2G - Numerical solution of the neutron diffusion equation

1D2G - Numerical solution of the neutron diffusion equation DG - Numeical solution of the neuton diffusion equation Y. Danon Daft: /6/09 Oveview A simple numeical solution of the neuton diffusion equation in one dimension and two enegy goups was implemented. Both

More information

Fall 2014 Randomized Algorithms Oct 8, Lecture 3

Fall 2014 Randomized Algorithms Oct 8, Lecture 3 Fall 204 Randomized Algoithms Oct 8, 204 Lectue 3 Pof. Fiedich Eisenband Scibes: Floian Tamè In this lectue we will be concened with linea pogamming, in paticula Clakson s Las Vegas algoithm []. The main

More information

MULTILAYER PERCEPTRONS

MULTILAYER PERCEPTRONS Last updated: Nov 26, 2012 MULTILAYER PERCEPTRONS Outline 2 Combining Linea Classifies Leaning Paametes Outline 3 Combining Linea Classifies Leaning Paametes Implementing Logical Relations 4 AND and OR

More information

COMP303 Computer Architecture Lecture 11. An Overview of Pipelining

COMP303 Computer Architecture Lecture 11. An Overview of Pipelining COMP303 Compute Achitectue Lectue 11 An Oveview of Pipelining Pipelining Pipelining povides a method fo executing multiple instuctions at the same time. Laundy Example: Ann, Bian, Cathy, Dave each have

More information

Quantum Fourier Transform

Quantum Fourier Transform Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,

More information

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496

More information

The Chromatic Villainy of Complete Multipartite Graphs

The Chromatic Villainy of Complete Multipartite Graphs Rocheste Institute of Technology RIT Schola Wos Theses Thesis/Dissetation Collections 8--08 The Chomatic Villainy of Complete Multipatite Gaphs Anna Raleigh an9@it.edu Follow this and additional wos at:

More information

Pulse Neutron Neutron (PNN) tool logging for porosity Some theoretical aspects

Pulse Neutron Neutron (PNN) tool logging for porosity Some theoretical aspects Pulse Neuton Neuton (PNN) tool logging fo poosity Some theoetical aspects Intoduction Pehaps the most citicism of Pulse Neuton Neuon (PNN) logging methods has been chage that PNN is to sensitive to the

More information

15.081J/6.251J Introduction to Mathematical Programming. Lecture 6: The Simplex Method II

15.081J/6.251J Introduction to Mathematical Programming. Lecture 6: The Simplex Method II 15081J/6251J Intoduction to Mathematical Pogamming ectue 6: The Simplex Method II 1 Outline Revised Simplex method Slide 1 The full tableau implementation Anticycling 2 Revised Simplex Initial data: A,

More information

Exploration of the three-person duel

Exploration of the three-person duel Exploation of the thee-peson duel Andy Paish 15 August 2006 1 The duel Pictue a duel: two shootes facing one anothe, taking tuns fiing at one anothe, each with a fixed pobability of hitting his opponent.

More information

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22 C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.

More information

Physics 107 TUTORIAL ASSIGNMENT #8

Physics 107 TUTORIAL ASSIGNMENT #8 Physics 07 TUTORIAL ASSIGNMENT #8 Cutnell & Johnson, 7 th edition Chapte 8: Poblems 5,, 3, 39, 76 Chapte 9: Poblems 9, 0, 4, 5, 6 Chapte 8 5 Inteactive Solution 8.5 povides a model fo solving this type

More information

Data Structures. Element Uniqueness Problem. Hash Tables. Example. Hash Tables. Dana Shapira. 19 x 1. ) h(x 4. ) h(x 2. ) h(x 3. h(x 1. x 4. x 2.

Data Structures. Element Uniqueness Problem. Hash Tables. Example. Hash Tables. Dana Shapira. 19 x 1. ) h(x 4. ) h(x 2. ) h(x 3. h(x 1. x 4. x 2. Element Uniqueness Poblem Dt Stuctues Let x,..., xn < m Detemine whethe thee exist i j such tht x i =x j Sot Algoithm Bucket Sot Dn Shpi Hsh Tbles fo (i=;i

More information

Solutions to Problem Set 8

Solutions to Problem Set 8 Massachusetts Institute of Technology 6.042J/18.062J, Fall 05: Mathematics fo Compute Science Novembe 21 Pof. Albet R. Meye and Pof. Ronitt Rubinfeld evised Novembe 27, 2005, 858 minutes Solutions to Poblem

More information

Chapter 3 Optical Systems with Annular Pupils

Chapter 3 Optical Systems with Annular Pupils Chapte 3 Optical Systems with Annula Pupils 3 INTRODUCTION In this chapte, we discuss the imaging popeties of a system with an annula pupil in a manne simila to those fo a system with a cicula pupil The

More information

Fast DCT-based image convolution algorithms and application to image resampling and hologram reconstruction

Fast DCT-based image convolution algorithms and application to image resampling and hologram reconstruction Fast DCT-based image convolution algoithms and application to image esampling and hologam econstuction Leonid Bilevich* a and Leonid Yaoslavsy** a a Depatment of Physical Electonics, Faculty of Engineeing,

More information

The geometric construction of Ewald sphere and Bragg condition:

The geometric construction of Ewald sphere and Bragg condition: The geometic constuction of Ewald sphee and Bagg condition: The constuction of Ewald sphee must be done such that the Bagg condition is satisfied. This can be done as follows: i) Daw a wave vecto k in

More information

MONTE CARLO SIMULATION OF FLUID FLOW

MONTE CARLO SIMULATION OF FLUID FLOW MONTE CARLO SIMULATION OF FLUID FLOW M. Ragheb 3/7/3 INTRODUCTION We conside the situation of Fee Molecula Collisionless and Reflective Flow. Collisionless flows occu in the field of aefied gas dynamics.

More information

A Deep Convolutional Neural Network Based on Nested Residue Number System

A Deep Convolutional Neural Network Based on Nested Residue Number System A Deep Convolutional Neual Netwok Based on Nested Residue Numbe System Hioki Nakahaa Ehime Univesity, Japan Tsutomu Sasao Meiji Univesity, Japan Abstact A pe-tained deep convolutional neual netwok (DCNN)

More information

When two numbers are written as the product of their prime factors, they are in factored form.

When two numbers are written as the product of their prime factors, they are in factored form. 10 1 Study Guide Pages 420 425 Factos Because 3 4 12, we say that 3 and 4 ae factos of 12. In othe wods, factos ae the numbes you multiply to get a poduct. Since 2 6 12, 2 and 6 ae also factos of 12. The

More information

Failure Probability of 2-within-Consecutive-(2, 2)-out-of-(n, m): F System for Special Values of m

Failure Probability of 2-within-Consecutive-(2, 2)-out-of-(n, m): F System for Special Values of m Jounal of Mathematics and Statistics 5 (): 0-4, 009 ISSN 549-3644 009 Science Publications Failue Pobability of -within-consecutive-(, )-out-of-(n, m): F System fo Special Values of m E.M.E.. Sayed Depatment

More information

An Application of Fuzzy Linear System of Equations in Economic Sciences

An Application of Fuzzy Linear System of Equations in Economic Sciences Austalian Jounal of Basic and Applied Sciences, 5(7): 7-14, 2011 ISSN 1991-8178 An Application of Fuzzy Linea System of Equations in Economic Sciences 1 S.H. Nassei, 2 M. Abdi and 3 B. Khabii 1 Depatment

More information

AMC 10 Contest B. Solutions Pamphlet. Wednesday, FEBRUARY 21, American Mathematics Competitions

AMC 10 Contest B. Solutions Pamphlet. Wednesday, FEBRUARY 21, American Mathematics Competitions The MATHEMATICAL ASSOCIATION of AMERICA Ameican Mathematics Competitions 8 th Annual Ameican Mathematics Contest 10 AMC 10 Contest B Solutions Pamphlet Wednesday, FEBRUARY 21, 2007 This Pamphlet gives

More information

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two

More information

LINEAR AND NONLINEAR ANALYSES OF A WIND-TUNNEL BALANCE

LINEAR AND NONLINEAR ANALYSES OF A WIND-TUNNEL BALANCE LINEAR AND NONLINEAR ANALYSES O A WIND-TUNNEL INTRODUCTION BALANCE R. Kakehabadi and R. D. Rhew NASA LaRC, Hampton, VA The NASA Langley Reseach Cente (LaRC) has been designing stain-gauge balances fo utilization

More information

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

Chem 453/544 Fall /08/03. Exam #1 Solutions

Chem 453/544 Fall /08/03. Exam #1 Solutions Chem 453/544 Fall 3 /8/3 Exam # Solutions. ( points) Use the genealized compessibility diagam povided on the last page to estimate ove what ange of pessues A at oom tempeatue confoms to the ideal gas law

More information

Lecture 7 Topic 5: Multiple Comparisons (means separation)

Lecture 7 Topic 5: Multiple Comparisons (means separation) Lectue 7 Topic 5: Multiple Compaisons (means sepaation) ANOVA: H 0 : µ 1 = µ =... = µ t H 1 : The mean of at least one teatment goup is diffeent If thee ae moe than two teatments in the expeiment, futhe

More information

On the integration of the equations of hydrodynamics

On the integration of the equations of hydrodynamics Uebe die Integation de hydodynamischen Gleichungen J f eine u angew Math 56 (859) -0 On the integation of the equations of hydodynamics (By A Clebsch at Calsuhe) Tanslated by D H Delphenich In a pevious

More information

An Exact Solution of Navier Stokes Equation

An Exact Solution of Navier Stokes Equation An Exact Solution of Navie Stokes Equation A. Salih Depatment of Aeospace Engineeing Indian Institute of Space Science and Technology, Thiuvananthapuam, Keala, India. July 20 The pincipal difficulty in

More information

Quasi-Randomness and the Distribution of Copies of a Fixed Graph

Quasi-Randomness and the Distribution of Copies of a Fixed Graph Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

NOTE. Some New Bounds for Cover-Free Families

NOTE. Some New Bounds for Cover-Free Families Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment

More information

SMT 2013 Team Test Solutions February 2, 2013

SMT 2013 Team Test Solutions February 2, 2013 1 Let f 1 (n) be the numbe of divisos that n has, and define f k (n) = f 1 (f k 1 (n)) Compute the smallest intege k such that f k (013 013 ) = Answe: 4 Solution: We know that 013 013 = 3 013 11 013 61

More information

Fresnel Diffraction. monchromatic light source

Fresnel Diffraction. monchromatic light source Fesnel Diffaction Equipment Helium-Neon lase (632.8 nm) on 2 axis tanslation stage, Concave lens (focal length 3.80 cm) mounted on slide holde, iis mounted on slide holde, m optical bench, micoscope slide

More information

Temporal-Difference Learning

Temporal-Difference Learning .997 Decision-Making in Lage-Scale Systems Mach 17 MIT, Sping 004 Handout #17 Lectue Note 13 1 Tempoal-Diffeence Leaning We now conside the poblem of computing an appopiate paamete, so that, given an appoximation

More information

arxiv: v1 [math.nt] 12 May 2017

arxiv: v1 [math.nt] 12 May 2017 SEQUENCES OF CONSECUTIVE HAPPY NUMBERS IN NEGATIVE BASES HELEN G. GRUNDMAN AND PAMELA E. HARRIS axiv:1705.04648v1 [math.nt] 12 May 2017 ABSTRACT. Fo b 2 and e 2, let S e,b : Z Z 0 be the function taking

More information

Physics 161 Fall 2011 Extra Credit 2 Investigating Black Holes - Solutions The Following is Worth 50 Points!!!

Physics 161 Fall 2011 Extra Credit 2 Investigating Black Holes - Solutions The Following is Worth 50 Points!!! Physics 161 Fall 011 Exta Cedit Investigating Black Holes - olutions The Following is Woth 50 Points!!! This exta cedit assignment will investigate vaious popeties of black holes that we didn t have time

More information

Markscheme May 2017 Calculus Higher level Paper 3

Markscheme May 2017 Calculus Higher level Paper 3 M7/5/MATHL/HP3/ENG/TZ0/SE/M Makscheme May 07 Calculus Highe level Pape 3 pages M7/5/MATHL/HP3/ENG/TZ0/SE/M This makscheme is the popety of the Intenational Baccalaueate and must not be epoduced o distibuted

More information

Unobserved Correlation in Ascending Auctions: Example And Extensions

Unobserved Correlation in Ascending Auctions: Example And Extensions Unobseved Coelation in Ascending Auctions: Example And Extensions Daniel Quint Univesity of Wisconsin Novembe 2009 Intoduction In pivate-value ascending auctions, the winning bidde s willingness to pay

More information

Magnetic Field. Conference 6. Physics 102 General Physics II

Magnetic Field. Conference 6. Physics 102 General Physics II Physics 102 Confeence 6 Magnetic Field Confeence 6 Physics 102 Geneal Physics II Monday, Mach 3d, 2014 6.1 Quiz Poblem 6.1 Think about the magnetic field associated with an infinite, cuent caying wie.

More information

The Persistence of Most Probable Explanations in Bayesian Networks

The Persistence of Most Probable Explanations in Bayesian Networks EAI 2014 T. Schaub et al. (Eds.) 2014 The Authos and IOS Pess. This aticle is published online with Open Access by IOS Pess and distibuted unde the tems of the eative ommons Attibution Non-ommecial License.

More information

Voltage ( = Electric Potential )

Voltage ( = Electric Potential ) V-1 of 10 Voltage ( = lectic Potential ) An electic chage altes the space aound it. Thoughout the space aound evey chage is a vecto thing called the electic field. Also filling the space aound evey chage

More information

(n 1)n(n + 1)(n + 2) + 1 = (n 1)(n + 2)n(n + 1) + 1 = ( (n 2 + n 1) 1 )( (n 2 + n 1) + 1 ) + 1 = (n 2 + n 1) 2.

(n 1)n(n + 1)(n + 2) + 1 = (n 1)(n + 2)n(n + 1) + 1 = ( (n 2 + n 1) 1 )( (n 2 + n 1) + 1 ) + 1 = (n 2 + n 1) 2. Paabola Volume 5, Issue (017) Solutions 151 1540 Q151 Take any fou consecutive whole numbes, multiply them togethe and add 1. Make a conjectue and pove it! The esulting numbe can, fo instance, be expessed

More information

Lecture 28: Convergence of Random Variables and Related Theorems

Lecture 28: Convergence of Random Variables and Related Theorems EE50: Pobability Foundations fo Electical Enginees July-Novembe 205 Lectue 28: Convegence of Random Vaiables and Related Theoems Lectue:. Kishna Jagannathan Scibe: Gopal, Sudhasan, Ajay, Swamy, Kolla An

More information

Solution to Problem First, the firm minimizes the cost of the inputs: min wl + rk + sf

Solution to Problem First, the firm minimizes the cost of the inputs: min wl + rk + sf Econ 0A Poblem Set 4 Solutions ue in class on Tu 4 Novembe. No late Poblem Sets accepted, so! This Poblem set tests the knoledge that ou accumulated mainl in lectues 5 to 9. Some of the mateial ill onl

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

6 PROBABILITY GENERATING FUNCTIONS

6 PROBABILITY GENERATING FUNCTIONS 6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to

More information

15 Solving the Laplace equation by Fourier method

15 Solving the Laplace equation by Fourier method 5 Solving the Laplace equation by Fouie method I aleady intoduced two o thee dimensional heat equation, when I deived it, ecall that it taes the fom u t = α 2 u + F, (5.) whee u: [0, ) D R, D R is the

More information

Supplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies

Supplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies Supplementay infomation Efficient Enumeation of Monocyclic Chemical Gaphs with Given Path Fequencies Masaki Suzuki, Hioshi Nagamochi Gaduate School of Infomatics, Kyoto Univesity {m suzuki,nag}@amp.i.kyoto-u.ac.jp

More information

Compactly Supported Radial Basis Functions

Compactly Supported Radial Basis Functions Chapte 4 Compactly Suppoted Radial Basis Functions As we saw ealie, compactly suppoted functions Φ that ae tuly stictly conditionally positive definite of ode m > do not exist The compact suppot automatically

More information

OSCILLATIONS AND GRAVITATION

OSCILLATIONS AND GRAVITATION 1. SIMPLE HARMONIC MOTION Simple hamonic motion is any motion that is equivalent to a single component of unifom cicula motion. In this situation the velocity is always geatest in the middle of the motion,

More information

B. Spherical Wave Propagation

B. Spherical Wave Propagation 11/8/007 Spheical Wave Popagation notes 1/1 B. Spheical Wave Popagation Evey antenna launches a spheical wave, thus its powe density educes as a function of 1, whee is the distance fom the antenna. We

More information

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,

More information

Absorption Rate into a Small Sphere for a Diffusing Particle Confined in a Large Sphere

Absorption Rate into a Small Sphere for a Diffusing Particle Confined in a Large Sphere Applied Mathematics, 06, 7, 709-70 Published Online Apil 06 in SciRes. http://www.scip.og/jounal/am http://dx.doi.og/0.46/am.06.77065 Absoption Rate into a Small Sphee fo a Diffusing Paticle Confined in

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Jounal of Inequalities in Pue and Applied Mathematics COEFFICIENT INEQUALITY FOR A FUNCTION WHOSE DERIVATIVE HAS A POSITIVE REAL PART S. ABRAMOVICH, M. KLARIČIĆ BAKULA AND S. BANIĆ Depatment of Mathematics

More information

Right-handed screw dislocation in an isotropic solid

Right-handed screw dislocation in an isotropic solid Dislocation Mechanics Elastic Popeties of Isolated Dislocations Ou study of dislocations to this point has focused on thei geomety and thei ole in accommodating plastic defomation though thei motion. We

More information

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

Lecture 8 - Gauss s Law

Lecture 8 - Gauss s Law Lectue 8 - Gauss s Law A Puzzle... Example Calculate the potential enegy, pe ion, fo an infinite 1D ionic cystal with sepaation a; that is, a ow of equally spaced chages of magnitude e and altenating sign.

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

Conjugate Gradient Methods. Michael Bader. Summer term 2012

Conjugate Gradient Methods. Michael Bader. Summer term 2012 Gadient Methods Outlines Pat I: Quadatic Foms and Steepest Descent Pat II: Gadients Pat III: Summe tem 2012 Pat I: Quadatic Foms and Steepest Descent Outlines Pat I: Quadatic Foms and Steepest Descent

More information

QUANTUM ALGORITHMS IN ALGEBRAIC NUMBER THEORY

QUANTUM ALGORITHMS IN ALGEBRAIC NUMBER THEORY QUANTU ALGORITHS IN ALGEBRAIC NUBER THEORY SION RUBINSTEIN-SALZEDO Abstact. In this aticle, we discuss some quantum algoithms fo detemining the goup of units and the ideal class goup of a numbe field.

More information

COMP Parallel Computing SMM (3) OpenMP Case Study: The Barnes-Hut N-body Algorithm

COMP Parallel Computing SMM (3) OpenMP Case Study: The Barnes-Hut N-body Algorithm COMP 633 - Paallel Computing Lectue 8 Septembe 14, 2017 SMM (3) OpenMP Case Study: The Banes-Hut N-body Algoithm Topics Case study: the Banes-Hut algoithm Study an impotant algoithm in scientific computing»

More information

EM-2. 1 Coulomb s law, electric field, potential field, superposition q. Electric field of a point charge (1)

EM-2. 1 Coulomb s law, electric field, potential field, superposition q. Electric field of a point charge (1) EM- Coulomb s law, electic field, potential field, supeposition q ' Electic field of a point chage ( ') E( ) kq, whee k / 4 () ' Foce of q on a test chage e at position is ee( ) Electic potential O kq

More information

Uniform Circular Motion

Uniform Circular Motion Unifom Cicula Motion Intoduction Ealie we defined acceleation as being the change in velocity with time: a = v t Until now we have only talked about changes in the magnitude of the acceleation: the speeding

More information

This is a very simple sampling mode, and this article propose an algorithm about how to recover x from y in this condition.

This is a very simple sampling mode, and this article propose an algorithm about how to recover x from y in this condition. 3d Intenational Confeence on Multimedia echnology(icm 03) A Simple Compessive Sampling Mode and the Recovey of Natue Images Based on Pixel Value Substitution Wenping Shao, Lin Ni Abstact: Compessive Sampling

More information

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013 AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the

More information