Finding All Approximate Gapped Palindromes
|
|
- Sophie Carter
- 5 years ago
- Views:
Transcription
1 Fining All Approximate Gappe Palinromes Ping-Hui Hsu 1, Kuan-Yu Chen 1, an Kun-Mao Chao 1,2,3 1 Department of Computer Science an Information Engineering 2 Grauate Institute of Biomeical Electronics an Bioinformatics 3 Grauate Institute of Networking an Multimeia National Taiwan University, Taipei, Taiwan 106 kmchao@csie.ntu.eu.tw Abstract. We stuy the problem of fining all maximal approximate gappe palinromes in a string. More specifically, given a string S of length n, a parameter q 0 an a threshol k>0, the problem is to ientify all substrings in S of the form uvw such that (1) the Levenshtein istance between u an w r is at most k, wherew r is the reverse of w an (2) v is a string of length q. The best previous work requires O(k 2 n) time. In this paper, we propose an O(kn)-time algorithm for this problem by utilizing an incremental string comparison technique. It turns out that the core technique actually solves a more general incremental string comparison problem that allows the insertion, eletion, an substitution of multiple symbols. Keywors: palinrome, incremental string comparison, string matching. 1 Introuction A wor is calle a palinrome if it reas the same both forwar an backwar. In other wors, a palinrome is a wor of the form uau r,whereu is a string, a is a symbol (or an empty wor), an u r is the reverse of u. A palinrome in astringismaximal if it can not be extene outwar while preserving a palinromic structure. The recognition of palinromes in a string has always been an intriguing question both in theory an practice. For example, fining all maximal palinromes in a string was stuie an well solve in linear time with the help of suffix tree [15] an constant-time LCA (least common ancestor) queries [12]. In [4,5], the authors stuie the problems of palinromes in Sturmian wors or in ternary square-free wors. Moreover, the problem of ientifying palinromes in compresse texts were investigate in [10]. In DNA an RNA sequences, there is a similar structure calle quasipalinrome which plays an important role in genome research [3,8,16]. A quasipalinrome can be seen as a pair of reverse complementary repeats in a string that are separate by a number of characters. The complementarity relation on This research was supporte in part by NSC grants NSC E MY3 an NSC E MY3 from the National Science Council, Taiwan. Y. Dong, D.-Z. Du, an O. Ibarra (Es.): ISAAC 2009, LNCS 5878, pp , c Springer-Verlag Berlin Heielberg 2009
2 Fining All Approximate Gappe Palinromes 1085 nucleoties means that A is complementary to T (U) anc is complementary to G. Several functions of the quasi-palinrome in genomes have been iscovere. For example, the quasi-palinromic structure is a sign of replication origins in the nucleotie sequence [3]. By estimating the appearance of replication origins in avance, the biologists can avoi much labor-intensive work. A stuy of quasi-palinromes also shows that they may control male germ-line gene expression [16]. Thus, the recognition of quasi-palinromic structure raws much attention an raises interesting computational problems. For example, the gappe palinrome problem is to recognize a wor structure of the form uvu r,where strings u an u r are calle arms an string v is calle gap. In [8], the computation of gappe palinromes in a string, with some length constraints on the arms an the gap, are one in linear time. Since mutations may occur in DNA an RNA sequences uring evolution, looking for the approximate quasi-palinromes (or gappe palinromes) is in a sense biologically more meaningful. A tool calle Inverte Repeats Finer ( ientifies approximate gappe palinromes heuristically. The tool uses a set of statistically base criteria to etect caniates of approximate gappe palinromes. By applying some alignment techniques, it then conforms whether these caniates are palinromes. In this paper, we stuy the problem of fining all approximate gappe palinromes in a string. More specifically, we allow the Levenshtein istance between two arms to be at most k an the length of gap to be a fixe q. It shoul be note that we ientify all such palinromes while a previous work [1] can only ientify a set of them. We show that solving our problem is essentially solving the incremental string comparison problem. The research of incremental string comparison was initiate by Lanau et al.. The incremental approach propose in [9] allows one to appen a single symbol to one string at a time. Throughout the paper we aim to solve a more general incremental problem in which we allow multiple symbols to be appene to an elete from the strings. As a result, our algorithm fins all maximal approximate gappe palinromes in O(kn) time while the best previous work requires O(k 2 n) time [11], where n is the string size. 2 Preliminaries The Levenshtein istance (eit istance) between two strings is the minimum number of eiting steps that convert one string into another. Given two string A[1..m] anb[1..n], one can calculate their eit istance by ynamic programming. We refer to matrix D[0..m, 0..n] astheeit-istance table of strings A an B. Initially, D[i, 0] = i for 0 i m an D[0,j]=j for 1 j n. Then the cell D[i, j], where i, j > 0, stores the eit istance of strings A[1..i] an B[1..j]. We also say that the cells D[i, j] wherej i = are on iagonal of D. Below we introuce some important properties of the eit-istance table that are constantly use in later iscussion.
3 1086 P.-H. Hsu, K.-Y. Chen, an K.-M. Chao Lemma 1 ([13]). Given an eit-istance table D, we have D[i, j] D[i 1,j 1] {0, 1}. In other wors, Lemma 1 implies that D[i, j] D[i 1,j 1], i.e. the values of the cells on the same iagonal are monotonically increasing. To compute table D, as notice by Ukkonen [13], it suffices to fin the last cell that has value h, for all h, on each iagonal of table D. Inotherwors,allvaluesinD are etermine when those last cells that have value h, for all h, are etermine. To specify the last cells with value h, thetermsl D (h) anh-cell are efine as follows. Definition 1. Given an eit-istance table D, we efine L D (h) to be the last cell on iagonal that has value h. Inotherwors,L D (h) is the cell D[i, j] where i =max{i : D[i,i + ] =h} an j = i +. Furthermore, we refer to such cell L D (h) as the h-cell on iagonal of D. As mentione in [9,13], one can compute the inex (i, j) ofl D (h) for all h>0 by the following recurrence: i 1 i = Slie max i 2 +1,,j = i +, i 3 +1 where Slie (i) =max{i : A[i..i ]=B[i +, i + ]} an i 1,i 2,ani 3 are the row inices of L D 1 (h 1),LD (h 1) an LD +1 (h 1). Notice that, for brevity we o not explicitly specify the bouns of the value of h. However, all the h-cells are assume to be vali while mentione. The following lemmas emonstrate the relationship between the values of ajacent cells of D. Lemma 2 ([14]). Given an eit-istance table D, we have D[i, j] D[i 1,j],D[i, j] D[i, j 1] { 1, 0, 1}. Lemma 3. Given an eit-istance table D, we have D[i +1,j],D[i, j +1] {h, h +1} for any h-cell D[i, j] in D. Proof. Lemma 3 follows Lemmas 1, 2 immeiately. 3 Incremental String Comparison Recall that given a string S of size n, aparameterq 0 an a threshol k>0, our problem is to fin all maximal approximate gappe palinromes in S that are of gap size q an the eit istance between its two arms is at most k. Here we sketch a basic algorithm for fining all approximate gappe palinromes. Note that the maximal property implies that each pair of prefixes foun in the basic algorithm cannot be further extene. At iteration i, tofinallpairwise prefixes one can compute the eit-istance table of strings S[1..i] r an S[i + q +1..n]. At iteration i + 1, we nee to compute the eit-istance table of Cat(S[i +1],S[1..i]) r )andel(1,s[i + q +1..n]). Here Cat(Ŝ,S) enotes the string obtaine by concatenating string Ŝ an string S, andel(c, S) enotes
4 Fining All Approximate Gappe Palinromes 1087 proceure Basic Algorithm 1 for i =1to n q 1 o 2 fin all possible pairs of prefixes of (S[1..i]) r an S[i + q +1..n] such that 3 the eit istance of pairwise prefixes is at most k. 4 en for Fig. 1. A basic algorithm for fining all approximate gappe palinromes the string obtaine by eleting the first c symbols from S. Thus the challenge lies in, given two strings A an B how to compare Cat(a, A) andel(1,b), provie the comparison result of A an B, wherea is an aitional symbol. That is we aim to solve an incremental string comparison problem. In what follows we formulate this problem in a more general form. Problem 1. The (+t 1, t 2 )-Incremental-String-Comparison Problem (abbr. (+t 1, t 2 )-ISC). Given the eit-istance table of strings A an B, how to efficiently compute the eit-istance table of strings Cat(Â, A) an Del(t 2,B), where  is an arbitrarily appene string with size t 1 (t 1 =  ) an t 2 is the number of elete symbols from B? The (+1,0)-ISC problem has been stuie by Lanau et al.. In [9], they show that there exist nice properties between the given eit-istance table an the esire eit-istance table. Base on the properties observe, they further evise a clever incremental algorithm to compute the h-cells for all h 0 on each iagonal of the esire table. In this paper we exten their ieas an show that the same properties hol even for the more general (+t 1, t 2 )-ISC problem, where t 1 0 an 0 t 2 n. Let D enote the eit-istance table of strings A[1..m] anb[1..n], an let D enote the eit-istance table of Cat(Â, A) andel(t 2,B), where  = t 1.The (+t 1, t 2 )-ISC problem is to compute table D from table D. For convenience of our iscussion, we label the inices of table D by an offset. We assume that the first row of D is of inex t 1 an the first column of D is of inex t 2, i.e. D [ t 1..m, t 2..n]. Notice that D[i, j] stores the eit istance of A[1..i]anB[1..j], an D [i, j] stores the eit istance of Cat(Â, A[1..i]) an Del(t 2,B[1..j]). We efine the ifference table C of D an D as follows. Definition 2. The ifference table of D an D is table C[0..m, t 2..n] whose entry C[i, j] =D [i, j] D[i, j] for 0 i m an t 2 j n. In other wors, table C can be obtaine by (1) putting table D on the top of table D such that the cells of the same inices between the two tables are overlappe, an (2) storing the ifference of values of two overlappe cells in a cell of C. Figure 2 shows an example where t 1 =1ant 2 =2. Kim an Park [7] showe that for the case where either t 1 =1ort 2 =1,the value range of the cells in C is constraine. Besies, there exist some monotonic properties in table C. We shall emonstrate that these properties hol for the
5 1088 P.-H. Hsu, K.-Y. Chen, an K.-M. Chao Column n Table D [-1..m, 2..n] Row -1 Row 0 Row 1 Row 2 Row 3 Table C[0..m, 2..n] Row m Table D[0..m,0..n] Diagonal 1 Diagonal 0 Diagonal -1 Fig. 2. Table D [ 1..m, 2..n] (gray cells) is place on the top of table D[0..m, 0..n] (white cells) an the overlappe region forms the ifference table C[0..m, 2..n] (ark cells) more general cases where t 1 0an0 t 2 n. Due to space limitations, the proofs of the following lemmas are omitte. Lemma 4. For 1 i m an t 2 +1 j n, min{c[i 1,j],C[i 1,j 1],C[i, j 1]} C[i, j] max{c[i 1,j],C[i 1,j 1],C[i, j 1]}. Lemma 5. For any column j of C, we have C[0,j] C[1,j]... C[m, j]. Lemma 6. For any row i of C, we have C[i, t 2 ] C[i, t 2 +1]... C[i, n]. We introuce the following notations for comparing the orer of inices of cells in D an D. Definition 3. Given cell D[i, j] an cell D [i,j ], we efine D[i, j] D [i,j ] iff i i. Similarly, we efine D[i, j] D [i,j ] iff i>i. Moreover, we efine D[i, j] D [i,j ] iff i = i an j = j.wesaycelld[i, j] coincies with cell D [i,j ] iff D[i, j] D [i,j ] Suppose that table D is place on the top of D as before. For those h-cells L D (h) lying in the overlappe region, we efine function f, analogous to the notion of key values mentionein[9]. Definition 4. For an h-cell L D (h), weletf(ld (h)) = g if LD (h) LD (g) for some integer g. Otherwise, we let f(l D (h)) = g 1 2 such that g =min{g : L D (g ) L D (h)}. Now we prove the central theorem of our algorithm. Again, we only consier the h-cells L D (h) lying in the overlappe region. Theorem 1. For h-cells L D (h) an LD +1 (h), we have f(ld +1 (h)) f(l D (h)).
6 Fining All Approximate Gappe Palinromes 1089 Fig. 3. (a) Case 1: D [i, j+1] = h (the gray cell). In this case, we show D[i h +1,j h +1] = min{d[i h +1,j h ]+1,D[i h,j h ]+δ(i h +1,j h +1),D[i h,j h +1]+1} >g. Note that each circle represents two overlappe cells when table D is place on the top of table D.The top-right value in a circle inicates the value of the cell from D an the bottom-left value in a circle inicates the value of the cell from D. (b)case2:d[i, i++1] = h+1 (gray cell). In this case, we show that D [i g,j g] h by first proving that D[i g+1,j g]=g an D [i g +1,j g] h. Proof. Let (i, j) be the position of L D (h) an D[i, j] = g. To prove f(l D +1 (h)) f(ld (h)), it must be shown that f(ld +1 (h)) g. By Lemma 1, D [i, j +1] {h, h +1}. Depening on the value of cell D [i, j + 1], we ivie the proof into two cases. Case 1: D [i, j +1]=h. (See Figure 3(a) for an illustration.) Observe that, by efinition, f(l D +1 (h)) g iff LD +1 (h) LD +1 (g). Let (i h,j h ) be the position of L D +1 (h). We have LD +1 (h) LD +1 (g) iff D[i h +1,j h +1] >g. By the recursive relation, we have D[i h +1,j h +1] = min{d[i h +1,j h ]+1,D[i h,j h ]+δ(i h +1,j h +1),D[i h,j h +1]+1}. In the following, we show that the three parameters of function min are greater than g, implying D[i h +1,j h +1]>g. By Lemma 1, D[i h +1,j h ] D[i, j] =g since they both are cells on iagonal an i h +1 is greater than i. Thus,D[i h +1,j h ]+1 > g.wenextshow that the secon parameter, D[i h,j h ]+δ(i h +1,j h + 1), is greater than g. By Lemma 6, C[i, j] C[i, j +1]. That is, D [i, j] D[i, j] D [i, j +1] D[i, j +1]. Because D [i, j] =h, D[i, j] =g an D [i, j +1]=h, wehaved[i, j +1] g. Accoring to Lemma 1, D[i h,j h ] D[i, j +1] g (because they are cells on iagonal +1 an i h i). Besies, since L D +1 (h) = cell D [i h,j h ], which implies A[i h +1] B[i j +1],we haveδ(i h +1,j h +1)=1.Henceweobtain D[i h,j h ]+δ(i h +1,j h +1)>g.
7 1090 P.-H. Hsu, K.-Y. Chen, an K.-M. Chao Finally, we show that the thir parameter, D[i h,j h + 1] + 1, is greater than g. Accoring to Lemma 6, C[i h,j h ] C[i h,j h + 1]. That is, D [i h,j h ] D[i h,j h ] D [i h,j h +1] D[i h,j h + 1]. Together with Lemma 3, we have (1) D [i h,j h ]=h, (2) D[i h,j h ] g an (3) D [i h,j h +1] {h, h +1}. Thus, we conclue that D[i h,j h +1] g, implying D[i h,j h +1]+1>g. Case 2: D [i, j +1]=h + 1. (See Figure 3(b) for an illustration.) If L D +1 (g) oes not exist, i.e. the smallest value of the cells on iagonal +1 of D is at least g +1, we have f(l D +1 (h)) g immeiately. Thus, we assume LD +1 (g) exists. By efinition, f(l D +1 (h)) g iff LD +1 (h) LD +1 (g). Let (i g,j g )bethe position of L D +1 (g). We have LD +1 (h) LD +1 (g) iff h D [i g,j g ]. Hence, in the following we show that h D [i g,j g ]. First we show that i g <i. By Lemma 6, D [i, j] D[i, j] D [i, j+1] D[i, j+ 1]. Besies, we have (1) D [i, j] =h, (2)D[i, j] =g an (3) D [i, j +1] = h+1. It follows that D[i, j +1] g +1, implying i>i g. Combining i>i g with Lemma 1, we further evaluate D [i g +1,j g ]and[i g +1,j g ] as follows. Since D [i g +1,j g ] D [i, j] by Lemma 1 an D [i, j] =h, weerived [i g + 1,j g ] h. Since D[i g +1,j g ] D[i, j] by Lemma 1 an D[i, j] =g, weerived[i g + 1,j g ] g. Moreover,sinceD[i g +1,j g ] {g, g +1} by Lemma 3, it follows that D[i g +1,j g ]=g. By Lemma 5, D [i g +1,j g ] D[i g +1,j g ] D [i g,j g ] D[i g,j g ]. Since D [i g + 1,j g ] h, D[i g +1,j g ]=g, and[i g,j g ]=g, we conclue that h D [i g,j g ]. 4 The Algorithm In this section, inspire by [9], we escribe an algorithm for the (+t 1, t 2 )-ISC problem as follows. Given an eit-istance table D, forafixeh we refer to the list of all h-cells of D as the h-wave of D. A wave is implemente as a oubly-linke list, in which each noe stores the table inex of an h-cell in D. Thus, we can access the h-cells on iagonals 1an + 1 in constant time when provie the pointer to the h-cell on iagonal. Besies, we also construct links across the waves to connect those cells on the same iagonal. Therefore, we can also access the (h-1)-cell an (h+1)-cell on iagonal in constant time when given the pointer to the h-cell on iagonal. As mentione before, let D enote the eit-istance table of strings A an B, anletd enote the eit-istance table of Cat(Â, A) andel(t 2,B), where  = t 1. Note that we label the inices of D by an offset, i.e. the first row is labele t 1 an the first column is labele t 2. The algorithm takes the waves of D as input, an aims to compute the 0-wave, 1-wave,..., k-wave of D.Below we show how the scheme works.
8 Fining All Approximate Gappe Palinromes 1091 We partition a wave of D into a series of blocks accoring to their f s values, i.e. the cells having the ientical f s value are in the same block. By Theorem 1, each block contains either a single cell or several consecutive cells of the wave. For those cells in the same block, if their f s values are integer g, weknoweach of those cells coincies with a certain g-cell of D. Observe that if two noes of the oubly-linke lists represent a cell x of D an x s coincie cell in D respectively, these two noes store the same table inex. That is, we can imitate one noe by the other noe if they represent the coincie cells. Thus, in the implementation we can construct this block by cutting a piece from the g- wave. Ifthef s value of a cell is not an integer, i.e. g 1 2, we compute this cell by the recurrence in Section 2. Observe that the waves of D may inclue cells lying outsie the overlapping region of D an D. We can not obtain those cells (which are outsie the overlapping region) of D by cutting the waves of D; however, they can be compute by the recurrence in Section 2. Definition 5. For h 0, the partition of the h-wave can be parameterize as: s(h): the number of blocks; b i (h): thef s value of cells in the i th (for 1 i s(h)) block; l i (h): the left bounary of the i th (for 1 i s(h)) block (formally, l i (h) is the smallest such that f(l D (h)) = bi (h)); r i (h): the right bounary of the i th (for 1 i s(h)) block (formally, r i (h) is the largest such that f(l D (h)) = bi (h)). The number of blocks, s(h), epens on the possible f s values of cells. Lemma 7 shows that the value of s(h) is boune by O(t 1 + t 2 ). Besies, with Lemma 8 an Corollary 1 we can obtain the f s values of h-cells by checking the f s values of (h-1)-cells. As space is limite, the proofs of these lemmas are omitte. Lemma 7. For h 0, we have s(h) =O(t 1 + t 2 ). Lemma 8. For iagonals an, <,iff(l D (h 1)) = f(ld (h 1)) = g, we have f(l D (h)) = g +1 for < <. Corollary 1. For bounaries l i (h 1) an r i (h 1) of the i th block of the (h 1)-wave, we have f(l D (h)) = bi (h 1) + 1 for l i (h 1) <<r i (h 1). By Corollary 1 we know how to obtain the f s values of h-cells lying in between the bounaries of each block of the (h-1)-wave. These h-cells are calle trivial since we can immeiately retrieve their f s values by examining the partition. As for the remaining h-cells, we compute them by the recurrence in Section 2 an then obtain their f s values. As for the remaining h-cells, theirf s values can be obtaine once we have their table inices, which can be compute by the recurrence in Section 2. Moreover, those h-cells are calle non-trivial. Now we have the f s value (if exists) of each h-cell. The partition of the h- wave is easily etermine by checking the f s values of all the non-trivial h-cells.
9 1092 P.-H. Hsu, K.-Y. Chen, an K.-M. Chao We then cut the corresponing pieces of waves of D to assemble the h-wave of D. Combining those pieces with the non-trivial h-cells compute, we erive the whole h-wave. Theorem 2. There exists an algorithm that computes the 0-wave,..., an k-wave of D an their partitions in O((t 1 + t 2 ) k) time. Proof. We analyze the time of computing the non-trivial cells an the time of oing the cutting operations. For an h-cell, the(h-1)-cell on the same iagonal may (1) lie in the overlappe region, (2) lie outsie the overlappe region, or (3) not exist. Therefore, the nontrivial h-cells can be ivie into three groups. In the following we show that there are in total O((t 1 + t 2 ) k) non-trivial h-cells for h =0, 1,..., an k. The first group are those cells on the iagonals l 1 (h 1), r 1 (h 1), l 2 (h 1), r 2 (h 1),...,l s(h 1) (h 1), an r s(h 1) (h 1). Thus, by Lemma 7 we know that there are O(t 1 + t 2 ) cells for each fixe h, implying that there are in total O((t 1 + t 2 ) k) cells for h =0, 1,..., an k. To calculate the size of the secon group, we count the number of (h-1)-cell lying outsie the overlappe region. We have that the number of 0-cells,1-cells,..., an (k-1)-cells lying outsie the overlappe region is O(t 1 k). The reasons are that (1) all the 0-cells,1- cells,..., an (k-1)-cells lie on O(k) ifferent iagonals an (2) each iagonal of D contains at most t 1 cells lying outsie the overlappe region. The thir group only contains the leftmost an rightmost cells of each wave of D, leaing to a total of O(k) cells for h =1, 2,...,ank. With the help of suffix tree (constructe in avance) an constant-time LCA queries, each non-trivial cell can be compute in constant time. Thus, the computation time of those nontrivial h-cells is O((t 1 + t 2 ) k) time. Due to the oubly-linke list structure, each cutting operation can be one in constant time. Besies, for each wave of D there are O(t 1 + t 2 )blocksby Lemma 7. Therefore, we can o all the cutting operations in O((t 1 + t 2 ) k) time. Theorem 3. Given a string S of size n an a threshol k, wherek specifies the eit istance between two arms, the problem of fining all maximal approximate gappe palinromes (with fixe gap length) can be solve in O(kn) time. Proof. We have shown that to solve the problem is essentially to solve the (+1,- 1)-ISC problem. We first construct the generalize suffix tree for strings S an S r (the reverse of S) in linear time. Thus, the Slie function in Section 2 can be one in constant time. It immeiately implies that uring the process of solving the (+1, 1)-ISC problem, we can compute the h-cell in constant time. Thus, by Theorem 2 each iteration (except the first one) in the basic algorithm of Figure 1 spens O(k) time. By using the approach of [14], the first iteration can be one in O(k 2 ) time. Hence the total time is O(kn).
10 5 Concluing Remarks Fining All Approximate Gappe Palinromes 1093 The core technique use in this paper is calle incremental string comparison. We generalize the previous result of Lanau et al. [9] by allowing multiple symbols appene to an remove from the heas of two strings simultaneously. In fact, this technique can be extene to hanle the substitute operation, since a substitute operation can be seen as a remove operation followe by an appen operation. More specifically, we allow a prefix part of the string to be substitute by another string. References 1. Allison, L.: Fining Approximate Palinromes in Strings Quickly an Simply. In: CoRR, vol. abs/cs/ , informal publication (2004) 2. Chao, K.M., Zhang, L.: Sequence Comparison: Theory an Methos. Springer, Heielberg (2009) 3. Chew, D.S.H., Choi, K.P., Leung, M.Y.: Scoring schemes of palinrome clusters for more sensitive preiction of replication origins in herpesviruses. Nucleic Acis Research 33(15), e134 (2005) 4. Currie, J.D.: Palinrome positions in ternary square-free wors. Theoretical Computer Science 396(1-3), (2008) 5. Glen, A.: Occurrences of palinromes in characteristic Sturmian wors. Theoretical Computer Science 352(1-3), (2006) 6. Gusfiel, D.: Algorithms on strings, trees, an sequences: computer science an computational biology. Cambrige University Press, New York (1997) 7. Kim, S.R., Park, K.: A ynamic eit istance table. In: Giancarlo, R., Sankoff, D. (es.) CPM 2000, vol. 1848, pp Springer, Heielberg (2000) 8. Kolpakov, R., Kucherov, G.: Searching for gappe palinromes. In: Ferragina, P., Lanau, G.M. (es.) CPM LNCS, vol. 5029, pp Springer, Heielberg (2008) 9. Lanau, G.M., Myers, E.W., Schmit, J.P.: Incremental string comparison. SIAM Journal on Computing 27(2), (1998) 10. Matsubara, W., Inenaga, S., Ishino, A., Shinohara, A., Nakamura, T., Hashimoto, K.: Efficient algorithms to compute compresse longest common substrings an compresse palinromes. Theoretical Computer Science 410(8-10), (2009) 11. Porto, A.H.L., Barbosa, V.C.: Fining approximate palinromes in strings. Pattern Recognition 35(11), (2002) 12. Schieber, B., Vishkin, U.: On fining lowest common ancestors: simplification an parallelization. SIAM Journal on Computing 17(6), (1988) 13. Ukkonen, E.: Algorithms for approximate string matching. Information an Control 64, (1985) 14. Ukkonen, E.: Fining approximate patterns in strings. Journal of Algorithms 6(1), (1985) 15. Ukkonen, E.: On-line construction of suffix trees. Algorithmica 14, (1995) 16. Warburton, P.E., Giorano, J., Cheung, F., Gelfan, Y., Benson, G.: Inverte repeat structure of the human genome: the X-chromosome contains a preponerance of large, highly homologous inverte repeats that contain testes genes. Genome Research 14, (2004)
Computing the Longest Common Subsequence of Multiple RLE Strings
The 29th Workshop on Combinatorial Mathematics an Computation Theory Computing the Longest Common Subsequence of Multiple RLE Strings Ling-Chih Yao an Kuan-Yu Chen Grauate Institute of Networking an Multimeia
More informationDiophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations
Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything
More informationComputing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions
Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5
More informationSYNCHRONOUS SEQUENTIAL CIRCUITS
CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents
More informationLeast-Squares Regression on Sparse Spaces
Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction
More informationTOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH
English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We
More informationLower Bounds for the Smoothed Number of Pareto optimal Solutions
Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.
More informationJUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson
JUST THE MATHS UNIT NUMBER 10.2 DIFFERENTIATION 2 (Rates of change) by A.J.Hobson 10.2.1 Introuction 10.2.2 Average rates of change 10.2.3 Instantaneous rates of change 10.2.4 Derivatives 10.2.5 Exercises
More informationMath Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors
Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+
More informationDiscrete Mathematics
Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner
More informationd dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1
Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of
More informationA new proof of the sharpness of the phase transition for Bernoulli percolation on Z d
A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition
More informationProof of SPNs as Mixture of Trees
A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a
More informationPermanent vs. Determinant
Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an
More informationTechnion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.
Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion
More informationLATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION
The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische
More informationRobustness and Perturbations of Minimal Bases
Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important
More informationarxiv: v1 [cs.ds] 31 May 2017
Succinct Partial Sums an Fenwick Trees Philip Bille, Aners Roy Christiansen, Nicola Prezza, an Freerik Rye Skjoljensen arxiv:1705.10987v1 [cs.ds] 31 May 2017 Technical University of Denmark, DTU Compute,
More informationLower bounds on Locality Sensitive Hashing
Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,
More informationA simple model for the small-strain behaviour of soils
A simple moel for the small-strain behaviour of soils José Jorge Naer Department of Structural an Geotechnical ngineering, Polytechnic School, University of São Paulo 05508-900, São Paulo, Brazil, e-mail:
More informationRegular tree languages definable in FO and in FO mod
Regular tree languages efinable in FO an in FO mo Michael Beneikt Luc Segoufin Abstract We consier regular languages of labele trees. We give an effective characterization of the regular languages over
More informationQubit channels that achieve capacity with two states
Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March
More informationPDE Notes, Lecture #11
PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =
More informationA Pairwise Document Analysis Approach for Monolingual Plagiarism Detection
A Pairwise Document Analysis Approach for Monolingual Plagiarism Detection Introuction Plagiarism: Unauthorize use of Text, coe, iea, Plagiarism etection research area has receive increasing attention
More informationEfficiently Decodable Non-Adaptive Threshold Group Testing
Efficiently Decoable Non-Aaptive Threshol Group Testing arxiv:72759v3 [csit] 3 Jan 28 Thach V Bui, Minoru Kuribayashi, Mahi Cheraghchi, an Isao Echizen SOKENDAI The Grauate University for Avance Stuies),
More informationPerfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs
Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite
More informationA Sketch of Menshikov s Theorem
A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p
More informationThe Exact Form and General Integrating Factors
7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily
More informationTwo formulas for the Euler ϕ-function
Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,
More information19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control
19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior
More informationLinear First-Order Equations
5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)
More informationSchrödinger s equation.
Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of
More informationImplicit Differentiation
Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,
More informationLecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations
Lecture XII Abstract We introuce the Laplace equation in spherical coorinates an apply the metho of separation of variables to solve it. This will generate three linear orinary secon orer ifferential equations:
More informationarxiv: v4 [cs.ds] 7 Mar 2014
Analysis of Agglomerative Clustering Marcel R. Ackermann Johannes Blömer Daniel Kuntze Christian Sohler arxiv:101.697v [cs.ds] 7 Mar 01 Abstract The iameter k-clustering problem is the problem of partitioning
More informationThe Wiener Index of Trees with Prescribed Diameter
011 1 15 4 ± Dec., 011 Operations Research Transactions Vol.15 No.4 The Wiener Inex of Trees with Prescribe Diameter XING Baohua 1 CAI Gaixiang 1 Abstract The Wiener inex W(G) of a graph G is efine as
More informationLectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs
Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent
More informationPhysics 505 Electricity and Magnetism Fall 2003 Prof. G. Raithel. Problem Set 3. 2 (x x ) 2 + (y y ) 2 + (z + z ) 2
Physics 505 Electricity an Magnetism Fall 003 Prof. G. Raithel Problem Set 3 Problem.7 5 Points a): Green s function: Using cartesian coorinates x = (x, y, z), it is G(x, x ) = 1 (x x ) + (y y ) + (z z
More informationAxiometrics: Axioms of Information Retrieval Effectiveness Metrics
Axiometrics: Axioms of Information Retrieval Effectiveness Metrics ABSTRACT Ey Maalena Department of Maths Computer Science University of Uine Uine, Italy ey.maalena@uniu.it There are literally ozens most
More informationIterated Point-Line Configurations Grow Doubly-Exponentially
Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection
More informationDiagonalization of Matrices Dr. E. Jacobs
Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is
More informationAgmon Kolmogorov Inequalities on l 2 (Z d )
Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,
More information6 General properties of an autonomous system of two first order ODE
6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x
More informationLecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012
CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration
More informationTable of Common Derivatives By David Abraham
Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec
More informationALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS
ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an
More informationSwitching Time Optimization in Discretized Hybrid Dynamical Systems
Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set
More informationTime-of-Arrival Estimation in Non-Line-Of-Sight Environments
2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor
More informationarxiv: v4 [math.pr] 27 Jul 2016
The Asymptotic Distribution of the Determinant of a Ranom Correlation Matrix arxiv:309768v4 mathpr] 7 Jul 06 AM Hanea a, & GF Nane b a Centre of xcellence for Biosecurity Risk Analysis, University of Melbourne,
More informationOptimization of Geometries by Energy Minimization
Optimization of Geometries by Energy Minimization by Tracy P. Hamilton Department of Chemistry University of Alabama at Birmingham Birmingham, AL 3594-140 hamilton@uab.eu Copyright Tracy P. Hamilton, 1997.
More informationOn colour-blind distinguishing colour pallets in regular graphs
J Comb Optim (2014 28:348 357 DOI 10.1007/s10878-012-9556-x On colour-blin istinguishing colour pallets in regular graphs Jakub Przybyło Publishe online: 25 October 2012 The Author(s 2012. This article
More informationPart I: Web Structure Mining Chapter 1: Information Retrieval and Web Search
Part I: Web Structure Mining Chapter : Information Retrieval an Web Search The Web Challenges Crawling the Web Inexing an Keywor Search Evaluating Search Quality Similarity Search The Web Challenges Tim
More informationCalculus in the AP Physics C Course The Derivative
Limits an Derivatives Calculus in the AP Physics C Course The Derivative In physics, the ieas of the rate change of a quantity (along with the slope of a tangent line) an the area uner a curve are essential.
More informationSeparation of Variables
Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical
More informationarxiv: v1 [math.co] 3 Apr 2019
Reconstructin phyloenetic tree from multipartite quartet system Hiroshi Hirai Yuni Iwamasa April 4, 2019 arxiv:1904.01914v1 [math.co] 3 Apr 2019 Abstract A phyloenetic tree is a raphical representation
More informationA Path Planning Method Using Cubic Spiral with Curvature Constraint
A Path Planning Metho Using Cubic Spiral with Curvature Constraint Tzu-Chen Liang an Jing-Sin Liu Institute of Information Science 0, Acaemia Sinica, Nankang, Taipei 5, Taiwan, R.O.C., Email: hartree@iis.sinica.eu.tw
More informationMath 342 Partial Differential Equations «Viktor Grigoryan
Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite
More information'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21
Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting
More informationOn non-antipodal binary completely regular codes
Discrete Mathematics 308 (2008) 3508 3525 www.elsevier.com/locate/isc On non-antipoal binary completely regular coes J. Borges a, J. Rifà a, V.A. Zinoviev b a Department of Information an Communications
More informationInterconnected Systems of Fliess Operators
Interconnecte Systems of Fliess Operators W. Steven Gray Yaqin Li Department of Electrical an Computer Engineering Ol Dominion University Norfolk, Virginia 23529 USA Abstract Given two analytic nonlinear
More information. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.
S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial
More informationLecture 5. Symmetric Shearer s Lemma
Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here
More information23 Implicit differentiation
23 Implicit ifferentiation 23.1 Statement The equation y = x 2 + 3x + 1 expresses a relationship between the quantities x an y. If a value of x is given, then a corresponing value of y is etermine. For
More informationLie symmetry and Mei conservation law of continuum system
Chin. Phys. B Vol. 20, No. 2 20 020 Lie symmetry an Mei conservation law of continuum system Shi Shen-Yang an Fu Jing-Li Department of Physics, Zhejiang Sci-Tech University, Hangzhou 3008, China Receive
More informationSystems & Control Letters
Systems & ontrol Letters ( ) ontents lists available at ScienceDirect Systems & ontrol Letters journal homepage: www.elsevier.com/locate/sysconle A converse to the eterministic separation principle Jochen
More informationOn the Aloha throughput-fairness tradeoff
On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of
More informationOne-dimensional I test and direction vector I test with array references by induction variable
Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science
More informationu!i = a T u = 0. Then S satisfies
Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace
More informationCalculus of Variations
Calculus of Variations Lagrangian formalism is the main tool of theoretical classical mechanics. Calculus of Variations is a part of Mathematics which Lagrangian formalism is base on. In this section,
More informationDissipative numerical methods for the Hunter-Saxton equation
Dissipative numerical methos for the Hunter-Saton equation Yan Xu an Chi-Wang Shu Abstract In this paper, we present further evelopment of the local iscontinuous Galerkin (LDG) metho esigne in [] an a
More informationMarkov Chains in Continuous Time
Chapter 23 Markov Chains in Continuous Time Previously we looke at Markov chains, where the transitions betweenstatesoccurreatspecifietime- steps. That it, we mae time (a continuous variable) avance in
More informationProteins and DNA sequences evolve predominantly by substitutions,
Recursions for statistical multiple alignment Jotun Hein*, Jens Leet Jensen, an Christian N. S. Peersen *Department of Statistics, Oxfor University, South Parks Roa, Oxfor OX1 3SY, Unite Kingom; an Department
More informationRamsey numbers of some bipartite graphs versus complete graphs
Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer
More information3.7 Implicit Differentiation -- A Brief Introduction -- Student Notes
Fin these erivatives of these functions: y.7 Implicit Differentiation -- A Brief Introuction -- Stuent Notes tan y sin tan = sin y e = e = Write the inverses of these functions: y tan y sin How woul we
More information2Algebraic ONLINE PAGE PROOFS. foundations
Algebraic founations. Kick off with CAS. Algebraic skills.3 Pascal s triangle an binomial expansions.4 The binomial theorem.5 Sets of real numbers.6 Surs.7 Review . Kick off with CAS Playing lotto Using
More informationOn the enumeration of partitions with summands in arithmetic progression
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics
More information12.11 Laplace s Equation in Cylindrical and
SEC. 2. Laplace s Equation in Cylinrical an Spherical Coorinates. Potential 593 2. Laplace s Equation in Cylinrical an Spherical Coorinates. Potential One of the most important PDEs in physics an engineering
More informationThe Subtree Size Profile of Plane-oriented Recursive Trees
The Subtree Size Profile of Plane-oriente Recursive Trees Michael FUCHS Department of Applie Mathematics National Chiao Tung University Hsinchu, 3, Taiwan Email: mfuchs@math.nctu.eu.tw Abstract In this
More informationarxiv: v1 [physics.flu-dyn] 8 May 2014
Energetics of a flui uner the Boussinesq approximation arxiv:1405.1921v1 [physics.flu-yn] 8 May 2014 Kiyoshi Maruyama Department of Earth an Ocean Sciences, National Defense Acaemy, Yokosuka, Kanagawa
More information18 EVEN MORE CALCULUS
8 EVEN MORE CALCULUS Chapter 8 Even More Calculus Objectives After stuing this chapter you shoul be able to ifferentiate an integrate basic trigonometric functions; unerstan how to calculate rates of change;
More informationEstimation of the Maximum Domination Value in Multi-Dimensional Data Sets
Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.
More informationPerturbation Analysis and Optimization of Stochastic Flow Networks
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM 2004 1 Perturbation Analysis an Optimization of Stochastic Flow Networks Gang Sun, Christos G. Cassanras, Yorai Wari, Christos G. Panayiotou,
More informationCalculus of Variations
16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t
More informationPARALLEL-PLATE CAPACITATOR
Physics Department Electric an Magnetism Laboratory PARALLEL-PLATE CAPACITATOR 1. Goal. The goal of this practice is the stuy of the electric fiel an electric potential insie a parallelplate capacitor.
More informationVariable Independence and Resolution Paths for Quantified Boolean Formulas
Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean
More informationComputing a Longest Common Palindromic Subsequence
Fundamenta Informaticae 129 (2014) 1 12 1 DOI 10.3233/FI-2014-860 IOS Press Computing a Longest Common Palindromic Subsequence Shihabur Rahman Chowdhury, Md. Mahbubul Hasan, Sumaiya Iqbal, M. Sohel Rahman
More informationSituation awareness of power system based on static voltage security region
The 6th International Conference on Renewable Power Generation (RPG) 19 20 October 2017 Situation awareness of power system base on static voltage security region Fei Xiao, Zi-Qing Jiang, Qian Ai, Ran
More informationNotes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk
Notes on Lie Groups, Lie algebras, an the Exponentiation Map Mitchell Faulk 1. Preliminaries. In these notes, we concern ourselves with special objects calle matrix Lie groups an their corresponing Lie
More informationNecessary and Sufficient Conditions for Sketched Subspace Clustering
Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This
More informationConstruction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems
Construction of the Electronic Raial Wave Functions an Probability Distributions of Hyrogen-like Systems Thomas S. Kuntzleman, Department of Chemistry Spring Arbor University, Spring Arbor MI 498 tkuntzle@arbor.eu
More informationSimilarity Measures for Categorical Data A Comparative Study. Technical Report
Similarity Measures for Categorical Data A Comparative Stuy Technical Report Department of Computer Science an Engineering University of Minnesota 4-92 EECS Builing 200 Union Street SE Minneapolis, MN
More informationCounting and Verifying Maximal Palindromes
Counting and Verifying Maximal Palindromes Tomohiro I 1, Shunsuke Inenaga 2, Hideo Bannai 1, and Masayuki Takeda 1 1 Department of Informatics, Kyushu University 2 Graduate School of Information Science
More informationMake graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides
Reference 1: Transformations of Graphs an En Behavior of Polynomial Graphs Transformations of graphs aitive constant constant on the outsie g(x) = + c Make graph of g by aing c to the y-values on the graph
More informationThe Principle of Least Action
Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of
More informationPure Further Mathematics 1. Revision Notes
Pure Further Mathematics Revision Notes June 20 2 FP JUNE 20 SDB Further Pure Complex Numbers... 3 Definitions an arithmetical operations... 3 Complex conjugate... 3 Properties... 3 Complex number plane,
More informationOn the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche Department of Computing Macquarie University, Australia christophe.oche@mq.eu.au. Abstract. The
More informationFinal Exam Study Guide and Practice Problems Solutions
Final Exam Stuy Guie an Practice Problems Solutions Note: These problems are just some of the types of problems that might appear on the exam. However, to fully prepare for the exam, in aition to making
More informationQuantum mechanical approaches to the virial
Quantum mechanical approaches to the virial S.LeBohec Department of Physics an Astronomy, University of Utah, Salt Lae City, UT 84112, USA Date: June 30 th 2015 In this note, we approach the virial from
More informationWhat s in an Attribute? Consequences for the Least Common Subsumer
What s in an Attribute? Consequences for the Least Common Subsumer Ralf Küsters LuFG Theoretical Computer Science RWTH Aachen Ahornstraße 55 52074 Aachen Germany kuesters@informatik.rwth-aachen.e Alex
More informationApplications of the Wronskian to ordinary linear differential equations
Physics 116C Fall 2011 Applications of the Wronskian to orinary linear ifferential equations Consier a of n continuous functions y i (x) [i = 1,2,3,...,n], each of which is ifferentiable at least n times.
More information