Finding All Approximate Gapped Palindromes

Size: px
Start display at page:

Download "Finding All Approximate Gapped Palindromes"

Transcription

1 Fining All Approximate Gappe Palinromes Ping-Hui Hsu 1, Kuan-Yu Chen 1, an Kun-Mao Chao 1,2,3 1 Department of Computer Science an Information Engineering 2 Grauate Institute of Biomeical Electronics an Bioinformatics 3 Grauate Institute of Networking an Multimeia National Taiwan University, Taipei, Taiwan 106 kmchao@csie.ntu.eu.tw Abstract. We stuy the problem of fining all maximal approximate gappe palinromes in a string. More specifically, given a string S of length n, a parameter q 0 an a threshol k>0, the problem is to ientify all substrings in S of the form uvw such that (1) the Levenshtein istance between u an w r is at most k, wherew r is the reverse of w an (2) v is a string of length q. The best previous work requires O(k 2 n) time. In this paper, we propose an O(kn)-time algorithm for this problem by utilizing an incremental string comparison technique. It turns out that the core technique actually solves a more general incremental string comparison problem that allows the insertion, eletion, an substitution of multiple symbols. Keywors: palinrome, incremental string comparison, string matching. 1 Introuction A wor is calle a palinrome if it reas the same both forwar an backwar. In other wors, a palinrome is a wor of the form uau r,whereu is a string, a is a symbol (or an empty wor), an u r is the reverse of u. A palinrome in astringismaximal if it can not be extene outwar while preserving a palinromic structure. The recognition of palinromes in a string has always been an intriguing question both in theory an practice. For example, fining all maximal palinromes in a string was stuie an well solve in linear time with the help of suffix tree [15] an constant-time LCA (least common ancestor) queries [12]. In [4,5], the authors stuie the problems of palinromes in Sturmian wors or in ternary square-free wors. Moreover, the problem of ientifying palinromes in compresse texts were investigate in [10]. In DNA an RNA sequences, there is a similar structure calle quasipalinrome which plays an important role in genome research [3,8,16]. A quasipalinrome can be seen as a pair of reverse complementary repeats in a string that are separate by a number of characters. The complementarity relation on This research was supporte in part by NSC grants NSC E MY3 an NSC E MY3 from the National Science Council, Taiwan. Y. Dong, D.-Z. Du, an O. Ibarra (Es.): ISAAC 2009, LNCS 5878, pp , c Springer-Verlag Berlin Heielberg 2009

2 Fining All Approximate Gappe Palinromes 1085 nucleoties means that A is complementary to T (U) anc is complementary to G. Several functions of the quasi-palinrome in genomes have been iscovere. For example, the quasi-palinromic structure is a sign of replication origins in the nucleotie sequence [3]. By estimating the appearance of replication origins in avance, the biologists can avoi much labor-intensive work. A stuy of quasi-palinromes also shows that they may control male germ-line gene expression [16]. Thus, the recognition of quasi-palinromic structure raws much attention an raises interesting computational problems. For example, the gappe palinrome problem is to recognize a wor structure of the form uvu r,where strings u an u r are calle arms an string v is calle gap. In [8], the computation of gappe palinromes in a string, with some length constraints on the arms an the gap, are one in linear time. Since mutations may occur in DNA an RNA sequences uring evolution, looking for the approximate quasi-palinromes (or gappe palinromes) is in a sense biologically more meaningful. A tool calle Inverte Repeats Finer ( ientifies approximate gappe palinromes heuristically. The tool uses a set of statistically base criteria to etect caniates of approximate gappe palinromes. By applying some alignment techniques, it then conforms whether these caniates are palinromes. In this paper, we stuy the problem of fining all approximate gappe palinromes in a string. More specifically, we allow the Levenshtein istance between two arms to be at most k an the length of gap to be a fixe q. It shoul be note that we ientify all such palinromes while a previous work [1] can only ientify a set of them. We show that solving our problem is essentially solving the incremental string comparison problem. The research of incremental string comparison was initiate by Lanau et al.. The incremental approach propose in [9] allows one to appen a single symbol to one string at a time. Throughout the paper we aim to solve a more general incremental problem in which we allow multiple symbols to be appene to an elete from the strings. As a result, our algorithm fins all maximal approximate gappe palinromes in O(kn) time while the best previous work requires O(k 2 n) time [11], where n is the string size. 2 Preliminaries The Levenshtein istance (eit istance) between two strings is the minimum number of eiting steps that convert one string into another. Given two string A[1..m] anb[1..n], one can calculate their eit istance by ynamic programming. We refer to matrix D[0..m, 0..n] astheeit-istance table of strings A an B. Initially, D[i, 0] = i for 0 i m an D[0,j]=j for 1 j n. Then the cell D[i, j], where i, j > 0, stores the eit istance of strings A[1..i] an B[1..j]. We also say that the cells D[i, j] wherej i = are on iagonal of D. Below we introuce some important properties of the eit-istance table that are constantly use in later iscussion.

3 1086 P.-H. Hsu, K.-Y. Chen, an K.-M. Chao Lemma 1 ([13]). Given an eit-istance table D, we have D[i, j] D[i 1,j 1] {0, 1}. In other wors, Lemma 1 implies that D[i, j] D[i 1,j 1], i.e. the values of the cells on the same iagonal are monotonically increasing. To compute table D, as notice by Ukkonen [13], it suffices to fin the last cell that has value h, for all h, on each iagonal of table D. Inotherwors,allvaluesinD are etermine when those last cells that have value h, for all h, are etermine. To specify the last cells with value h, thetermsl D (h) anh-cell are efine as follows. Definition 1. Given an eit-istance table D, we efine L D (h) to be the last cell on iagonal that has value h. Inotherwors,L D (h) is the cell D[i, j] where i =max{i : D[i,i + ] =h} an j = i +. Furthermore, we refer to such cell L D (h) as the h-cell on iagonal of D. As mentione in [9,13], one can compute the inex (i, j) ofl D (h) for all h>0 by the following recurrence: i 1 i = Slie max i 2 +1,,j = i +, i 3 +1 where Slie (i) =max{i : A[i..i ]=B[i +, i + ]} an i 1,i 2,ani 3 are the row inices of L D 1 (h 1),LD (h 1) an LD +1 (h 1). Notice that, for brevity we o not explicitly specify the bouns of the value of h. However, all the h-cells are assume to be vali while mentione. The following lemmas emonstrate the relationship between the values of ajacent cells of D. Lemma 2 ([14]). Given an eit-istance table D, we have D[i, j] D[i 1,j],D[i, j] D[i, j 1] { 1, 0, 1}. Lemma 3. Given an eit-istance table D, we have D[i +1,j],D[i, j +1] {h, h +1} for any h-cell D[i, j] in D. Proof. Lemma 3 follows Lemmas 1, 2 immeiately. 3 Incremental String Comparison Recall that given a string S of size n, aparameterq 0 an a threshol k>0, our problem is to fin all maximal approximate gappe palinromes in S that are of gap size q an the eit istance between its two arms is at most k. Here we sketch a basic algorithm for fining all approximate gappe palinromes. Note that the maximal property implies that each pair of prefixes foun in the basic algorithm cannot be further extene. At iteration i, tofinallpairwise prefixes one can compute the eit-istance table of strings S[1..i] r an S[i + q +1..n]. At iteration i + 1, we nee to compute the eit-istance table of Cat(S[i +1],S[1..i]) r )andel(1,s[i + q +1..n]). Here Cat(Ŝ,S) enotes the string obtaine by concatenating string Ŝ an string S, andel(c, S) enotes

4 Fining All Approximate Gappe Palinromes 1087 proceure Basic Algorithm 1 for i =1to n q 1 o 2 fin all possible pairs of prefixes of (S[1..i]) r an S[i + q +1..n] such that 3 the eit istance of pairwise prefixes is at most k. 4 en for Fig. 1. A basic algorithm for fining all approximate gappe palinromes the string obtaine by eleting the first c symbols from S. Thus the challenge lies in, given two strings A an B how to compare Cat(a, A) andel(1,b), provie the comparison result of A an B, wherea is an aitional symbol. That is we aim to solve an incremental string comparison problem. In what follows we formulate this problem in a more general form. Problem 1. The (+t 1, t 2 )-Incremental-String-Comparison Problem (abbr. (+t 1, t 2 )-ISC). Given the eit-istance table of strings A an B, how to efficiently compute the eit-istance table of strings Cat(Â, A) an Del(t 2,B), where  is an arbitrarily appene string with size t 1 (t 1 =  ) an t 2 is the number of elete symbols from B? The (+1,0)-ISC problem has been stuie by Lanau et al.. In [9], they show that there exist nice properties between the given eit-istance table an the esire eit-istance table. Base on the properties observe, they further evise a clever incremental algorithm to compute the h-cells for all h 0 on each iagonal of the esire table. In this paper we exten their ieas an show that the same properties hol even for the more general (+t 1, t 2 )-ISC problem, where t 1 0 an 0 t 2 n. Let D enote the eit-istance table of strings A[1..m] anb[1..n], an let D enote the eit-istance table of Cat(Â, A) andel(t 2,B), where  = t 1.The (+t 1, t 2 )-ISC problem is to compute table D from table D. For convenience of our iscussion, we label the inices of table D by an offset. We assume that the first row of D is of inex t 1 an the first column of D is of inex t 2, i.e. D [ t 1..m, t 2..n]. Notice that D[i, j] stores the eit istance of A[1..i]anB[1..j], an D [i, j] stores the eit istance of Cat(Â, A[1..i]) an Del(t 2,B[1..j]). We efine the ifference table C of D an D as follows. Definition 2. The ifference table of D an D is table C[0..m, t 2..n] whose entry C[i, j] =D [i, j] D[i, j] for 0 i m an t 2 j n. In other wors, table C can be obtaine by (1) putting table D on the top of table D such that the cells of the same inices between the two tables are overlappe, an (2) storing the ifference of values of two overlappe cells in a cell of C. Figure 2 shows an example where t 1 =1ant 2 =2. Kim an Park [7] showe that for the case where either t 1 =1ort 2 =1,the value range of the cells in C is constraine. Besies, there exist some monotonic properties in table C. We shall emonstrate that these properties hol for the

5 1088 P.-H. Hsu, K.-Y. Chen, an K.-M. Chao Column n Table D [-1..m, 2..n] Row -1 Row 0 Row 1 Row 2 Row 3 Table C[0..m, 2..n] Row m Table D[0..m,0..n] Diagonal 1 Diagonal 0 Diagonal -1 Fig. 2. Table D [ 1..m, 2..n] (gray cells) is place on the top of table D[0..m, 0..n] (white cells) an the overlappe region forms the ifference table C[0..m, 2..n] (ark cells) more general cases where t 1 0an0 t 2 n. Due to space limitations, the proofs of the following lemmas are omitte. Lemma 4. For 1 i m an t 2 +1 j n, min{c[i 1,j],C[i 1,j 1],C[i, j 1]} C[i, j] max{c[i 1,j],C[i 1,j 1],C[i, j 1]}. Lemma 5. For any column j of C, we have C[0,j] C[1,j]... C[m, j]. Lemma 6. For any row i of C, we have C[i, t 2 ] C[i, t 2 +1]... C[i, n]. We introuce the following notations for comparing the orer of inices of cells in D an D. Definition 3. Given cell D[i, j] an cell D [i,j ], we efine D[i, j] D [i,j ] iff i i. Similarly, we efine D[i, j] D [i,j ] iff i>i. Moreover, we efine D[i, j] D [i,j ] iff i = i an j = j.wesaycelld[i, j] coincies with cell D [i,j ] iff D[i, j] D [i,j ] Suppose that table D is place on the top of D as before. For those h-cells L D (h) lying in the overlappe region, we efine function f, analogous to the notion of key values mentionein[9]. Definition 4. For an h-cell L D (h), weletf(ld (h)) = g if LD (h) LD (g) for some integer g. Otherwise, we let f(l D (h)) = g 1 2 such that g =min{g : L D (g ) L D (h)}. Now we prove the central theorem of our algorithm. Again, we only consier the h-cells L D (h) lying in the overlappe region. Theorem 1. For h-cells L D (h) an LD +1 (h), we have f(ld +1 (h)) f(l D (h)).

6 Fining All Approximate Gappe Palinromes 1089 Fig. 3. (a) Case 1: D [i, j+1] = h (the gray cell). In this case, we show D[i h +1,j h +1] = min{d[i h +1,j h ]+1,D[i h,j h ]+δ(i h +1,j h +1),D[i h,j h +1]+1} >g. Note that each circle represents two overlappe cells when table D is place on the top of table D.The top-right value in a circle inicates the value of the cell from D an the bottom-left value in a circle inicates the value of the cell from D. (b)case2:d[i, i++1] = h+1 (gray cell). In this case, we show that D [i g,j g] h by first proving that D[i g+1,j g]=g an D [i g +1,j g] h. Proof. Let (i, j) be the position of L D (h) an D[i, j] = g. To prove f(l D +1 (h)) f(ld (h)), it must be shown that f(ld +1 (h)) g. By Lemma 1, D [i, j +1] {h, h +1}. Depening on the value of cell D [i, j + 1], we ivie the proof into two cases. Case 1: D [i, j +1]=h. (See Figure 3(a) for an illustration.) Observe that, by efinition, f(l D +1 (h)) g iff LD +1 (h) LD +1 (g). Let (i h,j h ) be the position of L D +1 (h). We have LD +1 (h) LD +1 (g) iff D[i h +1,j h +1] >g. By the recursive relation, we have D[i h +1,j h +1] = min{d[i h +1,j h ]+1,D[i h,j h ]+δ(i h +1,j h +1),D[i h,j h +1]+1}. In the following, we show that the three parameters of function min are greater than g, implying D[i h +1,j h +1]>g. By Lemma 1, D[i h +1,j h ] D[i, j] =g since they both are cells on iagonal an i h +1 is greater than i. Thus,D[i h +1,j h ]+1 > g.wenextshow that the secon parameter, D[i h,j h ]+δ(i h +1,j h + 1), is greater than g. By Lemma 6, C[i, j] C[i, j +1]. That is, D [i, j] D[i, j] D [i, j +1] D[i, j +1]. Because D [i, j] =h, D[i, j] =g an D [i, j +1]=h, wehaved[i, j +1] g. Accoring to Lemma 1, D[i h,j h ] D[i, j +1] g (because they are cells on iagonal +1 an i h i). Besies, since L D +1 (h) = cell D [i h,j h ], which implies A[i h +1] B[i j +1],we haveδ(i h +1,j h +1)=1.Henceweobtain D[i h,j h ]+δ(i h +1,j h +1)>g.

7 1090 P.-H. Hsu, K.-Y. Chen, an K.-M. Chao Finally, we show that the thir parameter, D[i h,j h + 1] + 1, is greater than g. Accoring to Lemma 6, C[i h,j h ] C[i h,j h + 1]. That is, D [i h,j h ] D[i h,j h ] D [i h,j h +1] D[i h,j h + 1]. Together with Lemma 3, we have (1) D [i h,j h ]=h, (2) D[i h,j h ] g an (3) D [i h,j h +1] {h, h +1}. Thus, we conclue that D[i h,j h +1] g, implying D[i h,j h +1]+1>g. Case 2: D [i, j +1]=h + 1. (See Figure 3(b) for an illustration.) If L D +1 (g) oes not exist, i.e. the smallest value of the cells on iagonal +1 of D is at least g +1, we have f(l D +1 (h)) g immeiately. Thus, we assume LD +1 (g) exists. By efinition, f(l D +1 (h)) g iff LD +1 (h) LD +1 (g). Let (i g,j g )bethe position of L D +1 (g). We have LD +1 (h) LD +1 (g) iff h D [i g,j g ]. Hence, in the following we show that h D [i g,j g ]. First we show that i g <i. By Lemma 6, D [i, j] D[i, j] D [i, j+1] D[i, j+ 1]. Besies, we have (1) D [i, j] =h, (2)D[i, j] =g an (3) D [i, j +1] = h+1. It follows that D[i, j +1] g +1, implying i>i g. Combining i>i g with Lemma 1, we further evaluate D [i g +1,j g ]and[i g +1,j g ] as follows. Since D [i g +1,j g ] D [i, j] by Lemma 1 an D [i, j] =h, weerived [i g + 1,j g ] h. Since D[i g +1,j g ] D[i, j] by Lemma 1 an D[i, j] =g, weerived[i g + 1,j g ] g. Moreover,sinceD[i g +1,j g ] {g, g +1} by Lemma 3, it follows that D[i g +1,j g ]=g. By Lemma 5, D [i g +1,j g ] D[i g +1,j g ] D [i g,j g ] D[i g,j g ]. Since D [i g + 1,j g ] h, D[i g +1,j g ]=g, and[i g,j g ]=g, we conclue that h D [i g,j g ]. 4 The Algorithm In this section, inspire by [9], we escribe an algorithm for the (+t 1, t 2 )-ISC problem as follows. Given an eit-istance table D, forafixeh we refer to the list of all h-cells of D as the h-wave of D. A wave is implemente as a oubly-linke list, in which each noe stores the table inex of an h-cell in D. Thus, we can access the h-cells on iagonals 1an + 1 in constant time when provie the pointer to the h-cell on iagonal. Besies, we also construct links across the waves to connect those cells on the same iagonal. Therefore, we can also access the (h-1)-cell an (h+1)-cell on iagonal in constant time when given the pointer to the h-cell on iagonal. As mentione before, let D enote the eit-istance table of strings A an B, anletd enote the eit-istance table of Cat(Â, A) andel(t 2,B), where  = t 1. Note that we label the inices of D by an offset, i.e. the first row is labele t 1 an the first column is labele t 2. The algorithm takes the waves of D as input, an aims to compute the 0-wave, 1-wave,..., k-wave of D.Below we show how the scheme works.

8 Fining All Approximate Gappe Palinromes 1091 We partition a wave of D into a series of blocks accoring to their f s values, i.e. the cells having the ientical f s value are in the same block. By Theorem 1, each block contains either a single cell or several consecutive cells of the wave. For those cells in the same block, if their f s values are integer g, weknoweach of those cells coincies with a certain g-cell of D. Observe that if two noes of the oubly-linke lists represent a cell x of D an x s coincie cell in D respectively, these two noes store the same table inex. That is, we can imitate one noe by the other noe if they represent the coincie cells. Thus, in the implementation we can construct this block by cutting a piece from the g- wave. Ifthef s value of a cell is not an integer, i.e. g 1 2, we compute this cell by the recurrence in Section 2. Observe that the waves of D may inclue cells lying outsie the overlapping region of D an D. We can not obtain those cells (which are outsie the overlapping region) of D by cutting the waves of D; however, they can be compute by the recurrence in Section 2. Definition 5. For h 0, the partition of the h-wave can be parameterize as: s(h): the number of blocks; b i (h): thef s value of cells in the i th (for 1 i s(h)) block; l i (h): the left bounary of the i th (for 1 i s(h)) block (formally, l i (h) is the smallest such that f(l D (h)) = bi (h)); r i (h): the right bounary of the i th (for 1 i s(h)) block (formally, r i (h) is the largest such that f(l D (h)) = bi (h)). The number of blocks, s(h), epens on the possible f s values of cells. Lemma 7 shows that the value of s(h) is boune by O(t 1 + t 2 ). Besies, with Lemma 8 an Corollary 1 we can obtain the f s values of h-cells by checking the f s values of (h-1)-cells. As space is limite, the proofs of these lemmas are omitte. Lemma 7. For h 0, we have s(h) =O(t 1 + t 2 ). Lemma 8. For iagonals an, <,iff(l D (h 1)) = f(ld (h 1)) = g, we have f(l D (h)) = g +1 for < <. Corollary 1. For bounaries l i (h 1) an r i (h 1) of the i th block of the (h 1)-wave, we have f(l D (h)) = bi (h 1) + 1 for l i (h 1) <<r i (h 1). By Corollary 1 we know how to obtain the f s values of h-cells lying in between the bounaries of each block of the (h-1)-wave. These h-cells are calle trivial since we can immeiately retrieve their f s values by examining the partition. As for the remaining h-cells, we compute them by the recurrence in Section 2 an then obtain their f s values. As for the remaining h-cells, theirf s values can be obtaine once we have their table inices, which can be compute by the recurrence in Section 2. Moreover, those h-cells are calle non-trivial. Now we have the f s value (if exists) of each h-cell. The partition of the h- wave is easily etermine by checking the f s values of all the non-trivial h-cells.

9 1092 P.-H. Hsu, K.-Y. Chen, an K.-M. Chao We then cut the corresponing pieces of waves of D to assemble the h-wave of D. Combining those pieces with the non-trivial h-cells compute, we erive the whole h-wave. Theorem 2. There exists an algorithm that computes the 0-wave,..., an k-wave of D an their partitions in O((t 1 + t 2 ) k) time. Proof. We analyze the time of computing the non-trivial cells an the time of oing the cutting operations. For an h-cell, the(h-1)-cell on the same iagonal may (1) lie in the overlappe region, (2) lie outsie the overlappe region, or (3) not exist. Therefore, the nontrivial h-cells can be ivie into three groups. In the following we show that there are in total O((t 1 + t 2 ) k) non-trivial h-cells for h =0, 1,..., an k. The first group are those cells on the iagonals l 1 (h 1), r 1 (h 1), l 2 (h 1), r 2 (h 1),...,l s(h 1) (h 1), an r s(h 1) (h 1). Thus, by Lemma 7 we know that there are O(t 1 + t 2 ) cells for each fixe h, implying that there are in total O((t 1 + t 2 ) k) cells for h =0, 1,..., an k. To calculate the size of the secon group, we count the number of (h-1)-cell lying outsie the overlappe region. We have that the number of 0-cells,1-cells,..., an (k-1)-cells lying outsie the overlappe region is O(t 1 k). The reasons are that (1) all the 0-cells,1- cells,..., an (k-1)-cells lie on O(k) ifferent iagonals an (2) each iagonal of D contains at most t 1 cells lying outsie the overlappe region. The thir group only contains the leftmost an rightmost cells of each wave of D, leaing to a total of O(k) cells for h =1, 2,...,ank. With the help of suffix tree (constructe in avance) an constant-time LCA queries, each non-trivial cell can be compute in constant time. Thus, the computation time of those nontrivial h-cells is O((t 1 + t 2 ) k) time. Due to the oubly-linke list structure, each cutting operation can be one in constant time. Besies, for each wave of D there are O(t 1 + t 2 )blocksby Lemma 7. Therefore, we can o all the cutting operations in O((t 1 + t 2 ) k) time. Theorem 3. Given a string S of size n an a threshol k, wherek specifies the eit istance between two arms, the problem of fining all maximal approximate gappe palinromes (with fixe gap length) can be solve in O(kn) time. Proof. We have shown that to solve the problem is essentially to solve the (+1,- 1)-ISC problem. We first construct the generalize suffix tree for strings S an S r (the reverse of S) in linear time. Thus, the Slie function in Section 2 can be one in constant time. It immeiately implies that uring the process of solving the (+1, 1)-ISC problem, we can compute the h-cell in constant time. Thus, by Theorem 2 each iteration (except the first one) in the basic algorithm of Figure 1 spens O(k) time. By using the approach of [14], the first iteration can be one in O(k 2 ) time. Hence the total time is O(kn).

10 5 Concluing Remarks Fining All Approximate Gappe Palinromes 1093 The core technique use in this paper is calle incremental string comparison. We generalize the previous result of Lanau et al. [9] by allowing multiple symbols appene to an remove from the heas of two strings simultaneously. In fact, this technique can be extene to hanle the substitute operation, since a substitute operation can be seen as a remove operation followe by an appen operation. More specifically, we allow a prefix part of the string to be substitute by another string. References 1. Allison, L.: Fining Approximate Palinromes in Strings Quickly an Simply. In: CoRR, vol. abs/cs/ , informal publication (2004) 2. Chao, K.M., Zhang, L.: Sequence Comparison: Theory an Methos. Springer, Heielberg (2009) 3. Chew, D.S.H., Choi, K.P., Leung, M.Y.: Scoring schemes of palinrome clusters for more sensitive preiction of replication origins in herpesviruses. Nucleic Acis Research 33(15), e134 (2005) 4. Currie, J.D.: Palinrome positions in ternary square-free wors. Theoretical Computer Science 396(1-3), (2008) 5. Glen, A.: Occurrences of palinromes in characteristic Sturmian wors. Theoretical Computer Science 352(1-3), (2006) 6. Gusfiel, D.: Algorithms on strings, trees, an sequences: computer science an computational biology. Cambrige University Press, New York (1997) 7. Kim, S.R., Park, K.: A ynamic eit istance table. In: Giancarlo, R., Sankoff, D. (es.) CPM 2000, vol. 1848, pp Springer, Heielberg (2000) 8. Kolpakov, R., Kucherov, G.: Searching for gappe palinromes. In: Ferragina, P., Lanau, G.M. (es.) CPM LNCS, vol. 5029, pp Springer, Heielberg (2008) 9. Lanau, G.M., Myers, E.W., Schmit, J.P.: Incremental string comparison. SIAM Journal on Computing 27(2), (1998) 10. Matsubara, W., Inenaga, S., Ishino, A., Shinohara, A., Nakamura, T., Hashimoto, K.: Efficient algorithms to compute compresse longest common substrings an compresse palinromes. Theoretical Computer Science 410(8-10), (2009) 11. Porto, A.H.L., Barbosa, V.C.: Fining approximate palinromes in strings. Pattern Recognition 35(11), (2002) 12. Schieber, B., Vishkin, U.: On fining lowest common ancestors: simplification an parallelization. SIAM Journal on Computing 17(6), (1988) 13. Ukkonen, E.: Algorithms for approximate string matching. Information an Control 64, (1985) 14. Ukkonen, E.: Fining approximate patterns in strings. Journal of Algorithms 6(1), (1985) 15. Ukkonen, E.: On-line construction of suffix trees. Algorithmica 14, (1995) 16. Warburton, P.E., Giorano, J., Cheung, F., Gelfan, Y., Benson, G.: Inverte repeat structure of the human genome: the X-chromosome contains a preponerance of large, highly homologous inverte repeats that contain testes genes. Genome Research 14, (2004)

Computing the Longest Common Subsequence of Multiple RLE Strings

Computing the Longest Common Subsequence of Multiple RLE Strings The 29th Workshop on Combinatorial Mathematics an Computation Theory Computing the Longest Common Subsequence of Multiple RLE Strings Ling-Chih Yao an Kuan-Yu Chen Grauate Institute of Networking an Multimeia

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson JUST THE MATHS UNIT NUMBER 10.2 DIFFERENTIATION 2 (Rates of change) by A.J.Hobson 10.2.1 Introuction 10.2.2 Average rates of change 10.2.3 Instantaneous rates of change 10.2.4 Derivatives 10.2.5 Exercises

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner

More information

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1 Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of

More information

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition

More information

Proof of SPNs as Mixture of Trees

Proof of SPNs as Mixture of Trees A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels. Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

Robustness and Perturbations of Minimal Bases

Robustness and Perturbations of Minimal Bases Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important

More information

arxiv: v1 [cs.ds] 31 May 2017

arxiv: v1 [cs.ds] 31 May 2017 Succinct Partial Sums an Fenwick Trees Philip Bille, Aners Roy Christiansen, Nicola Prezza, an Freerik Rye Skjoljensen arxiv:1705.10987v1 [cs.ds] 31 May 2017 Technical University of Denmark, DTU Compute,

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

A simple model for the small-strain behaviour of soils

A simple model for the small-strain behaviour of soils A simple moel for the small-strain behaviour of soils José Jorge Naer Department of Structural an Geotechnical ngineering, Polytechnic School, University of São Paulo 05508-900, São Paulo, Brazil, e-mail:

More information

Regular tree languages definable in FO and in FO mod

Regular tree languages definable in FO and in FO mod Regular tree languages efinable in FO an in FO mo Michael Beneikt Luc Segoufin Abstract We consier regular languages of labele trees. We give an effective characterization of the regular languages over

More information

Qubit channels that achieve capacity with two states

Qubit channels that achieve capacity with two states Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March

More information

PDE Notes, Lecture #11

PDE Notes, Lecture #11 PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =

More information

A Pairwise Document Analysis Approach for Monolingual Plagiarism Detection

A Pairwise Document Analysis Approach for Monolingual Plagiarism Detection A Pairwise Document Analysis Approach for Monolingual Plagiarism Detection Introuction Plagiarism: Unauthorize use of Text, coe, iea, Plagiarism etection research area has receive increasing attention

More information

Efficiently Decodable Non-Adaptive Threshold Group Testing

Efficiently Decodable Non-Adaptive Threshold Group Testing Efficiently Decoable Non-Aaptive Threshol Group Testing arxiv:72759v3 [csit] 3 Jan 28 Thach V Bui, Minoru Kuribayashi, Mahi Cheraghchi, an Isao Echizen SOKENDAI The Grauate University for Avance Stuies),

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

A Sketch of Menshikov s Theorem

A Sketch of Menshikov s Theorem A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

Two formulas for the Euler ϕ-function

Two formulas for the Euler ϕ-function Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations Lecture XII Abstract We introuce the Laplace equation in spherical coorinates an apply the metho of separation of variables to solve it. This will generate three linear orinary secon orer ifferential equations:

More information

arxiv: v4 [cs.ds] 7 Mar 2014

arxiv: v4 [cs.ds] 7 Mar 2014 Analysis of Agglomerative Clustering Marcel R. Ackermann Johannes Blömer Daniel Kuntze Christian Sohler arxiv:101.697v [cs.ds] 7 Mar 01 Abstract The iameter k-clustering problem is the problem of partitioning

More information

The Wiener Index of Trees with Prescribed Diameter

The Wiener Index of Trees with Prescribed Diameter 011 1 15 4 ± Dec., 011 Operations Research Transactions Vol.15 No.4 The Wiener Inex of Trees with Prescribe Diameter XING Baohua 1 CAI Gaixiang 1 Abstract The Wiener inex W(G) of a graph G is efine as

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

Physics 505 Electricity and Magnetism Fall 2003 Prof. G. Raithel. Problem Set 3. 2 (x x ) 2 + (y y ) 2 + (z + z ) 2

Physics 505 Electricity and Magnetism Fall 2003 Prof. G. Raithel. Problem Set 3. 2 (x x ) 2 + (y y ) 2 + (z + z ) 2 Physics 505 Electricity an Magnetism Fall 003 Prof. G. Raithel Problem Set 3 Problem.7 5 Points a): Green s function: Using cartesian coorinates x = (x, y, z), it is G(x, x ) = 1 (x x ) + (y y ) + (z z

More information

Axiometrics: Axioms of Information Retrieval Effectiveness Metrics

Axiometrics: Axioms of Information Retrieval Effectiveness Metrics Axiometrics: Axioms of Information Retrieval Effectiveness Metrics ABSTRACT Ey Maalena Department of Maths Computer Science University of Uine Uine, Italy ey.maalena@uniu.it There are literally ozens most

More information

Iterated Point-Line Configurations Grow Doubly-Exponentially

Iterated Point-Line Configurations Grow Doubly-Exponentially Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection

More information

Diagonalization of Matrices Dr. E. Jacobs

Diagonalization of Matrices Dr. E. Jacobs Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

Switching Time Optimization in Discretized Hybrid Dynamical Systems

Switching Time Optimization in Discretized Hybrid Dynamical Systems Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

arxiv: v4 [math.pr] 27 Jul 2016

arxiv: v4 [math.pr] 27 Jul 2016 The Asymptotic Distribution of the Determinant of a Ranom Correlation Matrix arxiv:309768v4 mathpr] 7 Jul 06 AM Hanea a, & GF Nane b a Centre of xcellence for Biosecurity Risk Analysis, University of Melbourne,

More information

Optimization of Geometries by Energy Minimization

Optimization of Geometries by Energy Minimization Optimization of Geometries by Energy Minimization by Tracy P. Hamilton Department of Chemistry University of Alabama at Birmingham Birmingham, AL 3594-140 hamilton@uab.eu Copyright Tracy P. Hamilton, 1997.

More information

On colour-blind distinguishing colour pallets in regular graphs

On colour-blind distinguishing colour pallets in regular graphs J Comb Optim (2014 28:348 357 DOI 10.1007/s10878-012-9556-x On colour-blin istinguishing colour pallets in regular graphs Jakub Przybyło Publishe online: 25 October 2012 The Author(s 2012. This article

More information

Part I: Web Structure Mining Chapter 1: Information Retrieval and Web Search

Part I: Web Structure Mining Chapter 1: Information Retrieval and Web Search Part I: Web Structure Mining Chapter : Information Retrieval an Web Search The Web Challenges Crawling the Web Inexing an Keywor Search Evaluating Search Quality Similarity Search The Web Challenges Tim

More information

Calculus in the AP Physics C Course The Derivative

Calculus in the AP Physics C Course The Derivative Limits an Derivatives Calculus in the AP Physics C Course The Derivative In physics, the ieas of the rate change of a quantity (along with the slope of a tangent line) an the area uner a curve are essential.

More information

Separation of Variables

Separation of Variables Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical

More information

arxiv: v1 [math.co] 3 Apr 2019

arxiv: v1 [math.co] 3 Apr 2019 Reconstructin phyloenetic tree from multipartite quartet system Hiroshi Hirai Yuni Iwamasa April 4, 2019 arxiv:1904.01914v1 [math.co] 3 Apr 2019 Abstract A phyloenetic tree is a raphical representation

More information

A Path Planning Method Using Cubic Spiral with Curvature Constraint

A Path Planning Method Using Cubic Spiral with Curvature Constraint A Path Planning Metho Using Cubic Spiral with Curvature Constraint Tzu-Chen Liang an Jing-Sin Liu Institute of Information Science 0, Acaemia Sinica, Nankang, Taipei 5, Taiwan, R.O.C., Email: hartree@iis.sinica.eu.tw

More information

Math 342 Partial Differential Equations «Viktor Grigoryan

Math 342 Partial Differential Equations «Viktor Grigoryan Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes Discrete Mathematics 308 (2008) 3508 3525 www.elsevier.com/locate/isc On non-antipoal binary completely regular coes J. Borges a, J. Rifà a, V.A. Zinoviev b a Department of Information an Communications

More information

Interconnected Systems of Fliess Operators

Interconnected Systems of Fliess Operators Interconnecte Systems of Fliess Operators W. Steven Gray Yaqin Li Department of Electrical an Computer Engineering Ol Dominion University Norfolk, Virginia 23529 USA Abstract Given two analytic nonlinear

More information

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences. S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial

More information

Lecture 5. Symmetric Shearer s Lemma

Lecture 5. Symmetric Shearer s Lemma Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here

More information

23 Implicit differentiation

23 Implicit differentiation 23 Implicit ifferentiation 23.1 Statement The equation y = x 2 + 3x + 1 expresses a relationship between the quantities x an y. If a value of x is given, then a corresponing value of y is etermine. For

More information

Lie symmetry and Mei conservation law of continuum system

Lie symmetry and Mei conservation law of continuum system Chin. Phys. B Vol. 20, No. 2 20 020 Lie symmetry an Mei conservation law of continuum system Shi Shen-Yang an Fu Jing-Li Department of Physics, Zhejiang Sci-Tech University, Hangzhou 3008, China Receive

More information

Systems & Control Letters

Systems & Control Letters Systems & ontrol Letters ( ) ontents lists available at ScienceDirect Systems & ontrol Letters journal homepage: www.elsevier.com/locate/sysconle A converse to the eterministic separation principle Jochen

More information

On the Aloha throughput-fairness tradeoff

On the Aloha throughput-fairness tradeoff On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of

More information

One-dimensional I test and direction vector I test with array references by induction variable

One-dimensional I test and direction vector I test with array references by induction variable Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Calculus of Variations

Calculus of Variations Calculus of Variations Lagrangian formalism is the main tool of theoretical classical mechanics. Calculus of Variations is a part of Mathematics which Lagrangian formalism is base on. In this section,

More information

Dissipative numerical methods for the Hunter-Saxton equation

Dissipative numerical methods for the Hunter-Saxton equation Dissipative numerical methos for the Hunter-Saton equation Yan Xu an Chi-Wang Shu Abstract In this paper, we present further evelopment of the local iscontinuous Galerkin (LDG) metho esigne in [] an a

More information

Markov Chains in Continuous Time

Markov Chains in Continuous Time Chapter 23 Markov Chains in Continuous Time Previously we looke at Markov chains, where the transitions betweenstatesoccurreatspecifietime- steps. That it, we mae time (a continuous variable) avance in

More information

Proteins and DNA sequences evolve predominantly by substitutions,

Proteins and DNA sequences evolve predominantly by substitutions, Recursions for statistical multiple alignment Jotun Hein*, Jens Leet Jensen, an Christian N. S. Peersen *Department of Statistics, Oxfor University, South Parks Roa, Oxfor OX1 3SY, Unite Kingom; an Department

More information

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

3.7 Implicit Differentiation -- A Brief Introduction -- Student Notes

3.7 Implicit Differentiation -- A Brief Introduction -- Student Notes Fin these erivatives of these functions: y.7 Implicit Differentiation -- A Brief Introuction -- Stuent Notes tan y sin tan = sin y e = e = Write the inverses of these functions: y tan y sin How woul we

More information

2Algebraic ONLINE PAGE PROOFS. foundations

2Algebraic ONLINE PAGE PROOFS. foundations Algebraic founations. Kick off with CAS. Algebraic skills.3 Pascal s triangle an binomial expansions.4 The binomial theorem.5 Sets of real numbers.6 Surs.7 Review . Kick off with CAS Playing lotto Using

More information

On the enumeration of partitions with summands in arithmetic progression

On the enumeration of partitions with summands in arithmetic progression AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics

More information

12.11 Laplace s Equation in Cylindrical and

12.11 Laplace s Equation in Cylindrical and SEC. 2. Laplace s Equation in Cylinrical an Spherical Coorinates. Potential 593 2. Laplace s Equation in Cylinrical an Spherical Coorinates. Potential One of the most important PDEs in physics an engineering

More information

The Subtree Size Profile of Plane-oriented Recursive Trees

The Subtree Size Profile of Plane-oriented Recursive Trees The Subtree Size Profile of Plane-oriente Recursive Trees Michael FUCHS Department of Applie Mathematics National Chiao Tung University Hsinchu, 3, Taiwan Email: mfuchs@math.nctu.eu.tw Abstract In this

More information

arxiv: v1 [physics.flu-dyn] 8 May 2014

arxiv: v1 [physics.flu-dyn] 8 May 2014 Energetics of a flui uner the Boussinesq approximation arxiv:1405.1921v1 [physics.flu-yn] 8 May 2014 Kiyoshi Maruyama Department of Earth an Ocean Sciences, National Defense Acaemy, Yokosuka, Kanagawa

More information

18 EVEN MORE CALCULUS

18 EVEN MORE CALCULUS 8 EVEN MORE CALCULUS Chapter 8 Even More Calculus Objectives After stuing this chapter you shoul be able to ifferentiate an integrate basic trigonometric functions; unerstan how to calculate rates of change;

More information

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.

More information

Perturbation Analysis and Optimization of Stochastic Flow Networks

Perturbation Analysis and Optimization of Stochastic Flow Networks IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM 2004 1 Perturbation Analysis an Optimization of Stochastic Flow Networks Gang Sun, Christos G. Cassanras, Yorai Wari, Christos G. Panayiotou,

More information

Calculus of Variations

Calculus of Variations 16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t

More information

PARALLEL-PLATE CAPACITATOR

PARALLEL-PLATE CAPACITATOR Physics Department Electric an Magnetism Laboratory PARALLEL-PLATE CAPACITATOR 1. Goal. The goal of this practice is the stuy of the electric fiel an electric potential insie a parallelplate capacitor.

More information

Variable Independence and Resolution Paths for Quantified Boolean Formulas

Variable Independence and Resolution Paths for Quantified Boolean Formulas Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean

More information

Computing a Longest Common Palindromic Subsequence

Computing a Longest Common Palindromic Subsequence Fundamenta Informaticae 129 (2014) 1 12 1 DOI 10.3233/FI-2014-860 IOS Press Computing a Longest Common Palindromic Subsequence Shihabur Rahman Chowdhury, Md. Mahbubul Hasan, Sumaiya Iqbal, M. Sohel Rahman

More information

Situation awareness of power system based on static voltage security region

Situation awareness of power system based on static voltage security region The 6th International Conference on Renewable Power Generation (RPG) 19 20 October 2017 Situation awareness of power system base on static voltage security region Fei Xiao, Zi-Qing Jiang, Qian Ai, Ran

More information

Notes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk

Notes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk Notes on Lie Groups, Lie algebras, an the Exponentiation Map Mitchell Faulk 1. Preliminaries. In these notes, we concern ourselves with special objects calle matrix Lie groups an their corresponing Lie

More information

Necessary and Sufficient Conditions for Sketched Subspace Clustering

Necessary and Sufficient Conditions for Sketched Subspace Clustering Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This

More information

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems Construction of the Electronic Raial Wave Functions an Probability Distributions of Hyrogen-like Systems Thomas S. Kuntzleman, Department of Chemistry Spring Arbor University, Spring Arbor MI 498 tkuntzle@arbor.eu

More information

Similarity Measures for Categorical Data A Comparative Study. Technical Report

Similarity Measures for Categorical Data A Comparative Study. Technical Report Similarity Measures for Categorical Data A Comparative Stuy Technical Report Department of Computer Science an Engineering University of Minnesota 4-92 EECS Builing 200 Union Street SE Minneapolis, MN

More information

Counting and Verifying Maximal Palindromes

Counting and Verifying Maximal Palindromes Counting and Verifying Maximal Palindromes Tomohiro I 1, Shunsuke Inenaga 2, Hideo Bannai 1, and Masayuki Takeda 1 1 Department of Informatics, Kyushu University 2 Graduate School of Information Science

More information

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides Reference 1: Transformations of Graphs an En Behavior of Polynomial Graphs Transformations of graphs aitive constant constant on the outsie g(x) = + c Make graph of g by aing c to the y-values on the graph

More information

The Principle of Least Action

The Principle of Least Action Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of

More information

Pure Further Mathematics 1. Revision Notes

Pure Further Mathematics 1. Revision Notes Pure Further Mathematics Revision Notes June 20 2 FP JUNE 20 SDB Further Pure Complex Numbers... 3 Definitions an arithmetical operations... 3 Complex conjugate... 3 Properties... 3 Complex number plane,

More information

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche Department of Computing Macquarie University, Australia christophe.oche@mq.eu.au. Abstract. The

More information

Final Exam Study Guide and Practice Problems Solutions

Final Exam Study Guide and Practice Problems Solutions Final Exam Stuy Guie an Practice Problems Solutions Note: These problems are just some of the types of problems that might appear on the exam. However, to fully prepare for the exam, in aition to making

More information

Quantum mechanical approaches to the virial

Quantum mechanical approaches to the virial Quantum mechanical approaches to the virial S.LeBohec Department of Physics an Astronomy, University of Utah, Salt Lae City, UT 84112, USA Date: June 30 th 2015 In this note, we approach the virial from

More information

What s in an Attribute? Consequences for the Least Common Subsumer

What s in an Attribute? Consequences for the Least Common Subsumer What s in an Attribute? Consequences for the Least Common Subsumer Ralf Küsters LuFG Theoretical Computer Science RWTH Aachen Ahornstraße 55 52074 Aachen Germany kuesters@informatik.rwth-aachen.e Alex

More information

Applications of the Wronskian to ordinary linear differential equations

Applications of the Wronskian to ordinary linear differential equations Physics 116C Fall 2011 Applications of the Wronskian to orinary linear ifferential equations Consier a of n continuous functions y i (x) [i = 1,2,3,...,n], each of which is ifferentiable at least n times.

More information