Balanced Network Flows

Size: px
Start display at page:

Download "Balanced Network Flows"

Transcription

1 revied, June, 1992 Thi paper appeared in Bulletin of the Intitute of Combinatoric and it Application 7 (1993), Balanced Network Flow William Kocay* and Dougla tone Department of Computer cience Univerity of Manitoba Winnipeg, Manitoba CANADA R3T 2N2 BKOCAY@ccu.umanitoba.ca Abtract Let G be a imple, undirected graph. A pecial network N, called a balanced network, i contructed from G uch that maximum matching and f-factor in G correpond to maximum flow in N. A max-balancedflow-min-balanced-cut theorem i proved for balanced network. It i hown that Tutte Factor Theorem i equivalent to thi network flow theorem, and that f-barrier are equivalent to minimum balanced edgecut. A max-balanced-flow algorithm will olve the factor problem. 1. Balanced Network. Let G be a imple graph, directed or undirected, with vertex et V(G) and edge et E(G). A network N i a directed graph which contain two pecial vertice and t, the ource and target, repectively, and in which every edge e i aigned a poitive integervalued capacity cap(e). Terminology for graph, network, and flow i taken from Bondy and Murty [1]. Edge of a directed graph are ordered pair of vertice. If (u,v) i an edge, we indicate that u i adjacent to v by u v. Edge of an undirected graph are unordered pair, and we write the pair {u,v} a uv, where the order i unimportant. In a directed graph we alo often ue uv to indicate one of the edge (u,v) or (v,u), epecially if the direction i not explicitly given. The oppoite direction will then be given by vu. Let f be an integervalued function on E(N). Given any u V(N), the out-flow at u i f + (u) = f(uv) and the v, u v in-flow at u i f (u) = f(vu). The function f i called a flow if it atifie the two v, v u condition: i) f + (u) = f (u), for all vertice u,t, (the conervation condition) ii) 0 f(uv) cap(uv), for all edge uv (the capacity contraint). The value of the flow i val(f) = f + () f (), that i, the net out-flow at the ource. We are intereted in a pecial kind of network, called a balanced network. * Thi work wa upported by an operating grant from the Natural cience and Engineering Reearch Council of Canada. 1

2 1.1 Definition. A balanced network i a network N with the following propertie: The vertice of N conit of a ource, a target t, and two et of vertice X={x 1,x 2,...,x n } and Y={y 1,y 2,...,y n }; N contain the pair of edge (,x i ) and (y i,t) for 1 i n; The remaining edge of N are between X and Y, and occur in pair, either (x i,y j ) and (x j,y i ), or (y i,x j ) and (y j,x i ), where i j; cap(x i )=cap(y i t), cap(x i y j )=cap(x j y i ), and cap(y i x j )=cap(y j x i ), for all i,j. The vertice of N occur in complementary pair. Given any vertex u V(N), the complementary vertex will be denoted by u. Thu =t, t =, x i = y i, and y i = x i. The edge alo occur in complementary pair: (x i,y j ) =(x j,y i ) and (,x i ) =(y i,t). Notice that (u,v) =(v,u ). Complementary edge alway have the ame capacity, cap(uv)=cap(v u ). A balanced flow in N i a flow f in which every complementary pair of edge carrie the ame flow, that i, f(uv)=f(v u ). We want to find a maximum balanced flow in N. A can be een from the following example, a balanced network i bipartite. The network in Fig. 1 ha cap(x i y j )=1 and cap(x i )=cap(y i t)=d i. x 1 y 1 d 1 d 1 x 2 y 2 d 2 d 2 d 3 d 3 t d 4 x 3 y 3 d 4 N x 4 y 4 Fig 1. A balanced network. Edge capacitie are d 1, d 2, d 3, d 4 or 1. Before proceeding further, we explain the motivation for introducing balanced network and balanced flow. Given a graph G, conider the following problem. Max Matching: Find a maximum matching in G; Factor Problem: Given an integer-valued function b on V(G), doe G have a ubgraph H uch that deg H (u) = b(u), for all u V? If G were a bipartite graph, we could olve thee problem with the tandard technique of flow theory. Conider the factor problem. Let the bipartition of G be (X,Y). Create a network N from G a follow. Direct the edge of G from X to Y and aign them a capacity of 1. Add a ource and target t, plu all edge (,x) and (y,t), for all x X and y Y. Aign 2

3 capacitie b(x) and b(y) to x and yt, repectively. Find a maximum flow f in N. It i eay to ee that the ubgraph H exit if and only if the value of f i val(f) = b(x) = b(y). x X y Y To olve the maximum matching problem, jut et b(u)=1 for all vertice u, and find a maximum flow. When G i not bipartite, tandard flow theory doe not apply. However, Tutte Theorem [1,6,10] give neceary and ufficient condition for a perfect matching to exit and can be ued to obtain a formula for the ize of a maximum matching. Tutte Factor Theorem [6,8,9,10] olve the econd problem. In [10], Tutte how that finding an f-factor in G i equivalent to finding a 1-factor in a coniderably larger graph formed by tranforming G. The purpoe of balanced flow i to how that thee problem can in fact be olved by the method of flow theory. It i hown that Tutte factor theorem i equivalent to a min-max flow theorem, the Max-Balanced-Flow-Min-Balanced-Cut Theorem. In term of network flow, an f-barrier i equivalent to a minimum balanced edge-cut. Thee reult are impler to derive than the tandard tructure theory of f-factor (cf. Lovaz and Plummer [6, ection 10.2]), ince the method of network flow and edge-cut apply. In [7] chrijver tate that combinatorial min-max relation often yield elegant theorem and are cloely related to the algorithmic olution to a problem. The correponding algorithm here i the max-balancedflow algorithm [4]. Thi algorithm can alo be ued to olve the capacitated b-matching problem (ee [7]). 2. Balanced Edge-Cut. Let N be a network. Let V(N) and let denote V(N). The edge-cut K=[,] conit of all edge uv uch that u and v. Let K denote [,]. Write f + () = f(uv) and f () = f(uv). uv K uv K By the conervation condition f + ()=f () unle or t i in. We hall aume that and t, unle otherwie indicated. Then val(f)=f + () f (), for all uch. The capacity of the edge-cut i cap(k) and the total flow on K i f(k), where cap(k) = cap(uv) and f(k) = f(uv) = f + () uv K uv K By tandard flow theory, val(f) cap(k) for all flow f and all edge-cut K. The Max-Flow- Min-Cut Theorem tate that in any network, the value of a maximum flow f equal the value of a minimum edge-cut K. Furthermore, the flow f atifie f(uv)=cap(uv) for all uv K, and f(uv)=0 for all uv K. Thee reult alo hold for arbitrary flow and arbitrary edge-cut in a balanced network, of coure. However ince we want a balanced flow in N, we mut retrict attention to certain 3

4 pecial kind of edge-cut. Given an arbitrary edge cut K=[,] in a balanced network N, we divide the vertice of X and Y into 4 et: A = {x i,y i x i, y i } B = {x i,y i x i, y i } C = {x i,y i x i, y i } D = {x i,y i x i, y i } A may then be further ubdivided into A x = A X, and A y = A Y, and the other 3 et may alo be ubdivided in the ame manner. Thi i illutrated in Fig. 2. Ax Ay Bx By Cx Cy t Dx Dy Fig. 2, An edge-cut K. Edge illutrated belong to K. We know that val(f) cap(k) in general, but for balanced network, thi tatement i not a trong a it could be. With arbitrary network one can alway find a flow f uch that val(f)=cap(k) for ome edge cut K, by the method of augmenting path. But with balanced network, it i not alway poible to find a balanced flow f uch that val(f)=cap(k). It would therefore be ueful to find a pecial kind of edge cut K in a balanced network N, uch that K ha propertie in N that are analogou to thoe of the uual kind of edge-cut in an arbitrary network. The ubgraph of N induced by C i denoted N[C]. If C Ø, N[C] will be a graph with one or more connected component. Let C 1, C 2,, C k be it component. Let K i denote thoe edge of K with one endpoint in C i, for i=1,2,,k, and let K r denote the remaining edge of K, that i, thoe with no endpoint in C. We alo define K i to be thoe edge of K with one 4

5 endpoint in C i, and K r to be the remaining edge of K. 2.1 Definition. A balanced edge-cut in N i an edge-cut K that atifie the following condition: i) There are no edge between C and D; ii) If u C i, then u C i ; iii) if C Ø, then cap(k i ) i odd, for 1 i k. It will be een that there i alway an edge-cut of thi type correponding to a maximum balanced flow. The following notation i now required. Any given component C i will be denoted by I. Thu I x denote C i C x and I y denote C i C y. Let E AB denote all edge of N directed from A to B. It can be divided into thoe edge directed from A x to B y and thoe directed from A y to B x. In mot application, N will contain no edge directed from Y to X at all, but it i eay to include them in the following proof. Denote the former et by E+ AB and the latter by E AB. Then EAB =E + AB E AB. (In mot cae EAB=Ø.) Write XAB =cap(e AB ) and F AB =f(e AB ). Then a above we can write X AB = X + + AB + X AB and F AB = F AB + F AB. By + + complementarity, F AB = F BA and F AB = F BA. If EA denote all edge directed from to A, then X A denote cap(e A ) and F A denote f(e A ). Thi notation i extended to the et B,C,D, and I in the obviou way. 2.2 Lemma. Let K be a balanced edge-cut. For any component C i, (F + II F II) + + (FIA F IA) + + (FIB F IB) FI = 0. Proof. ince the C i are connected component of N[C] and there are no edge from C to D, the only edge directed out of I x are thoe from I x to I y, A y, and B y. Hence f + (I x ) = F II F + IA + F + IB. The only edge directed in to I x are thoe from I y, A y, B y, and. Hence f (I x ) = F II + FIA + F IB + F I. Taking the difference give f + (I x ) f (I x ) = 0, by the conervation condition. + + A cap XIA flow F IA B t cap X flow F I I Ix I = C i Iy edge in K i = [,] edge in K i = [,] other edge Fig. 3, The edge K i and K i. 5

6 2.3 Lemma. Let f be a balanced flow in N, and let K be a balanced edge-cut. If f(k i )=0 for ome C i, then there i an edge e K i uch that f(e)<cap(e). Proof. Referring to Fig. 3, we ee that f(k i )=F BI + F + + AI and that f(k i ) = F IB + F IA + F It. By Lemma 2.2, we can add the expreion (F + II F II) + + (FIA F IA) + + (FIB F IB) FI to f(k i ) without changing it value. Thi give f(k i ) = (F + II F II) + + FIA + 2F + IB F IB, ince FIt =F I by complementarity. If f(k i )=0 then F BI = + FAI = 0, o that f(k i ) = (F + II F II) + + 2FIB. But F + II and F II are even quantitie, ince e E II if and only if e E II. o f(k i ) i alo even. But by the definition of K, each cap(k i ) i odd. Therefore f(k i )<cap(k i ). It follow that each K i contain an edge e for which f(e)<cap(e). Thi how that for each et K i, either f(k i )>0, in which cae K i contain an edge e with f(e)>0, or ele f(k i )=0 and K i contain an edge e for which f(e)<cap(e). 2.4 Theorem. Let C 1, C 2,, C k be the connected component of C in the balanced edgecut K=[,]. Then for any balanced flow f, val(f) cap(k) k. Proof. By Lemma 2.3, one of cap(k i ) f(k i ) and f(k i ) i at leat 1, for each C i. Therefore (cap(k) f(k)) + f(k) k, which implie that cap(k) (f(k) f(k)) k. But f(k) f(k) = f + () f () = val(f). Therefore val(f) cap(k) k. The capacity of a balanced edge cut, denoted balcap(k), i therefore defined to be cap(k) k, where k i the number of connected component of N[C]. A minimum balanced edge-cut i a balanced edge-cut uch that no balanced edge-cut ha maller capacity. We have therefore proved: 2.5 Corollary. The value of a balanced flow in a balanced network i le than or equal to the capacity of every balanced edge-cut, that i, val(f) balcap(k), for all balanced f and K. Thi hold alo when f i maximum and K i minimum. In order to prove that the value of a maximum flow actually equal the capacity of a minimum balanced edge-cut, we need to conider augmenting path. 3. The Max-Flow-Min-Cut Theorem in Balanced Network. In general, a flow f in a network N i maximum if and only if there i no augmenting path in N. Becaue of thi theorem, algorithm can ue augmenting path to find a maximum flow. We need a imilar theorem when N and f are balanced. uppoe that P=(v 1,v 2,,v m ) i a path in a balanced network N, that i, P ha no repeated vertice, and conecutive vertice v i and v i+1 are adjacent. Edge can appear in both direction on P, o that either v i v i+1, in which cae v i v i+1 i a forward edge of P; or ele v i+1 v i, and v i v i+1 i a backward edge of P. Let e be an edge on P. The reidual capacity of e i defined in term of the direction in which it i travered: 6

7 recap(e) = cap(e) f(e), if e i a forward edge, f(e), if e i a backward edge. An edge e i aturated if recap(e)=0. Otherwie it i unaturated. Thi depend, of coure, on the direction of traveral. A path P i unaturated if all it edge are unaturated. The complementary path of P i defined to be P =(v m,, v 2, v 1 ). The reidual capacity of an augmenting path P i δ(p)= min recap(e). Clearly e ha the ame reidual capacity on P a e P e ha on P, o δ(p )=δ(p). If P i a uv-path, that i, if it begin at u and end at v, then P i a v u -path. If P i a vv - path, then P i alo a vv -path. Thi i of particular ue when P i an augmenting tpath, ince then P i alo an augmenting t-path. If we begin with a balanced flow f, and augment on P and on P a well, then every edge in N will carry the ame flow a it complementary edge, o that f will till be balanced. Thi i illutrated in Fig. 4. x 1 y 1 1(0) 1(1) x 2 y 2 1(0) 1(1) 1(0) 1(0) t 1(1) x 3 y 3 1(1) x 4 N y 4 aturated edge unaturated edge Fig. 4, Complementary augmenting path P=x 1 y 2 x 4 y 3 t and P =x 3 y 4 x 2 y 1 t. uppoe that P i an augmenting path. Then P i alo an augmenting path. However we may not alway be able to augment on both P and P. It i ometime the cae that augmenting on P detroy the augmenting path P. 3.1 Lemma. Given an augmenting path with reidual capacity δ, we can augment the flow on P and P by at leat one unit (but not necearily by δ unit), if and only if P doe not contain a pair of complementary edge with a reidual capacity of one. Proof. uppoe firt that P doe contain uch a pair of complementary edge. Then P ha the form P=( uv v u t), where recap(uv)=1. When we augment on P, the reidual 7

8 capacity of uv and v u on P become zero, o that P i no longer an augmenting path in N. Now uppoe that P doe not have thi form, and let e be an edge of P. If e i not on P, then augmenting on P doe not change it flow, o it reidual capacity on P remain δ. If e i on P, then recap(e ) 2 before augmenting, o that if we augment by one unit, recap(e ) on P change by one, o we can till augment on P. We mut therefore enure that any algorithm we ue to find a maximum flow in a balanced network N conider an unaturated t path to be an augmenting path only if it doe not contain a pair of complementary edge with a reidual capacity of one. 3.2 Definition. An unaturated uv-path which contain a pair of complementary edge with reidual capacity 1 i called an invalid path. Any other unaturated uv-path i called a valid path, and only a valid t-path i conidered to be an augmenting path in N. A vertex v i -reachable if there i a valid path from to v, and t-reachable if there i a valid path from v to t. Let N and f be balanced, and uppoe that there i no valid augmenting path in N. Let be the et of all -reachable vertice and conider the edge-cut K=[,]. K ha the form illutrated in Fig. 2. The vertice can be partitioned into the 4 et A,B,C, and D. A before, let C i denote the connected component of N[C], for i=1,2,,k, and let K i, K r, K i, and K r be a defined in ection Lemma. Every edge of K r K r i aturated from to. Proof. Let (u,v) be an unaturated edge from to, o that u and v. Then there i a valid u-path, but no valid v-path. Therefore the edge (uv), and hence the vertex u, mut be on every valid path to u. ince u, there i at leat one uch path, o both u and u are -reachable; thi mean that u and u are in C, o uv i in ome K i or K i. 3.4 Lemma. There are no edge between C and D. Proof. Firt notice that D, o no vertex in D i -reachable. uppoe that uch an edge e=(x i,y j ) exited, a in Fig. 5. Then e =(x j,y i ) i alo uch an edge. Either thee two edge carry flow or they do not. If they do, then x j y i i unaturated from to. But then x j would be in, not. If they do not carry flow, then x i y j i unaturated form to, o y j would be in, again a contradiction. x i y C i x j D y j Fig. 5, Edge between C and D. 8

9 3.5 Lemma. Each C i conit entirely of pair of complementary vertice. Proof. The proof i illutrated in Fig. 6. Let P be any valid path from to w C i, and uppoe that P firt enter C i along the edge uv. Then u, o every valid path to v goe through v, and uch a path exit becaue v C. But if Q i the ub path that i a vv -path, then Q i alo a vv -path. Thu every vertex on both Q and Q i in C, and therefore in C i, o Q Q C i. But if w C i then there i a path W connecting either v or v to w, ince C i i connected, o ay v. Then W connect w to v, o w i alo in C i. W u v Q Q v u W C i w w Fig. 6, Complementary vertice in C i. 3.6 Lemma. At leat one edge i unaturated from to in each K i K i, for 1 i k. Proof. The proof i illutrated in Fig. 6 and 7. Take an arbitrary component C i, and any valid path P from to a vertex in C i. Let uv be the firt edge on P where v C i. Then (uv) =v u i unaturated becaue uv i. If uv i a forward edge on P then v u i an unaturated edge from to, and v u K i. If uv i a backward edge, then f(uv)>0, ince it i unaturated. But then v u K i. In either cae, K i K i contain an unaturated edge. A B t C i edge in K i = [,] edge in K i = [,] edge into C i Fig. 7, Edge of K i K i 3.7 Theorem. Let v C i be a vertex uch that there i a valid v-path which firt enter C i at v. Then every w C i can be reached on a valid path Q w from v, where Q w C i. 9

10 Proof. By contradiction. Refer to Fig. 8 and 9. Let C* be the larget non empty et of pair of complementary vertice in C i, with the property that every vertex w C* i reachable from v on a valid path. The path Q and Q of Lemma 3.5 are in C*, o C* Ø. C * u v v u Q w w w q q R R z z C i Fig. 8, C* and C i, v P. Now uppoe that C* C i, o there i ome edge wz uch that w C* and z C i C*; thu w C* and z C i C*. If wz were aturated, then zw, and hence w z, would be unaturated. Thu either wz or w z i an unaturated edge from C* to C i C*, o uppoe it i wz. z C i, o there i a valid z -path P. uppoe firt that v P. v C* and z C*, o let P leave C* for the lat time from a vertex q, and let R be the portion of P from q to z. If wz i on R, then q=w, z R, and the ubequent portion of R i a zz -path. Then it complement would alo be a zz -path. But then we can then enlarge C* with the vertice of R R, a contradiction. Otherwie wz i not on R. Let Q w be a valid path from v to w, contained in C*. R i a valid path becaue R i. The concatenation Q w wzr i a valid path becaue if it were not, then R would contain an edge e uch that either e =wz or e i on Q w. But R contain no edge of Q w, ince Q w C*, and wz i not on R. But then Q w wzr i a valid path and we can again enlarge C* with the vertice of R R, a contradiction. Otherwie v P. Then Pz w i a valid path into C*. Let q be the firt vertex at which P enter C* (maybe q =w ), and let P q be the portion of P up to q. Then P q Q q i a valid v - path that doe not contain v. Thi i a contradiction, o C*=C i, a required. C * u v v u Q Q q q q q Pq C i Fig. 9, C* and C i, v P. 10

11 3.8 Lemma. At mot one edge i unaturated, with reidual capacity at mot 1, from to, in each K i K i, for 1 i k. Proof. If any edge e of K i K i were unaturated from to, with recap(e)>1, then a vertex in would be -reachable, a contradiction. By lemma 3.6 there i alway at leat one unaturated edge v u, o uppoe there i a econd, ay z w, a hown in Fig. 10. Then if R i a valid v-path and Q i valid vz -path contained in C i, which both exit, then RQ would be a valid path to z that doe not ue the edge wz, a contradiction. R u v Q v u w z z w C i Fig. 10, A component C i. Thi prove that there i exactly one edge in each K i K i, for 1 i k, that i unaturated from to. But by lemma 3.3, every edge in K r K r i aturated from to, o we have proved: 3.9 Corollary. Let K=[,], where i the et of all -reachable vertice, a above. Then val(f) = cap(k) k Lemma. cap(k i ) i odd, for 1 i k. Proof. By lemma 3.6 and 3.8, either f(k i )=cap(k i ) and f(k i )=1, or f(k i )=cap(k i ) 1 and f(k i )=0. Referring to the proof of lemma 2.3, we have f(k i )=F BI + + FAI and f(k i ) = (F + II F II) + F + IA + 2F + IB F IB. In the firt cae, f(ki )=F BI + + FAI =1, o one of F + AI and F BI i 0 and the other i 1. But then f(k i ) = cap(k i ) = (F + II F II) + + FIA + 2F + IB F IB, which i an odd number, ince + FII and F II are even. In the econd cae, f(ki )=F BI + + FAI =0, o that f(k i ) = cap(k i ) 1 = (F + II F II) + + i even. It follow that cap(k i ) i odd. 2F IB 3.11 Corollary. K i a balanced edge-cut. Proof. There are no edge between C i and C j, for any i and j, ince the C i are connected component, o by lemma 3.4, 3.5, and 3.10, K i a balanced edge-cut, and balcap(k)=cap(k) k. But val(f)=cap(k) k, by corollary 3.9, o by theorem 2.4, f i a maximum balanced flow in N, and K i a minimum balanced edge-cut. We therefore have: 3.12 Theorem. Let N be a balanced network with a balanced flow f. Then f i maximum if and only if there i no valid augmenting path in N. Proof. If there i a valid augmenting path, then by lemma 3.1, f i not maximum. If there i no valid augmenting path, then by corollary 3.11, the et of -reachable vertice define a 11

12 balanced edge-cut K=[,] for which val(f)=cap(k) k, o that f i maximum, by theorem 2.4. The above reult can be ummarized in a theorem. Max-Balanced-Flow-Min-Balanced-Cut Theorem. Let N be a balanced network. The value of a maximum balanced flow equal the capacity of a minimum balanced edge-cut. Proof. By theorem 2.4 and corollarie 3.9 and Thee reult mean that in a balanced network N, we can begin with the zero flow and ucceively augment the flow on complementary augmenting path until no valid augmenting path remain. At that point the flow will be maximum, and the et of -reachable vertice will define a balanced edge-cut. uch an algorithm i developed in Kocay and tone [4]. One reult i that maximum matching, f-factor, and capacitated b-matching can all be found by a ingle flow algorithm. When the flow i maximum, a balanced edge-cut will be given by the et of -reachable vertice. 4. The Factor Problem. Given the function b(v) of ection 1, a ubgraph H uch that deg H (v)=b(v) i called a factor of G. (Uually H i called an f-factor, ince the function b(v) i uually denoted f(v), but we are uing f to denote a flow.) Given arbitrary et A,B V(G), let A,B tand for the number of edge with one end in A and one in B. Let,T V(G). Write odd(,t) for the number of component C of G ( T) uch that T,C + b(v) i odd. Tutte Factor v C Theorem [10] can be tated a follow. 4.1 Factor Theorem. G i without a factor if and only if there i a ubet of V(G) and a ubet T of V uch that v b(v) < odd(,t) + (b(v) deg G (v) ). v T We how how thi can be derived from the Max-Balanced-Flow-Min-Balanced-Cut Theorem. Let V(G)={v 1, v 2,, v n }. Write 2ε= b(v). Create a balanced network N with vertice v V(G) X={x 1, x 2,, x n } and Y={x 1, x 2,, x n }, a well a and t. N ha edge (x i,y j ) and (x j,y i ) for every edge v i v j of G, and all edge (,x i ) and (y i,t) for all vertice v i of G. o G i a homomorphic image of the [X,Y]-edge of N. The capacitie are cap(x i )=cap(y i t)=b(v i ), and cap(x i y j )=cap(x j y i )=1. Given any balanced flow f in N, the flow-carrying edge of [X,Y] define a ubgraph H of G uch that deg H (v i )=f(x i ). 4.2 Lemma. G ha a factor H if and only if balcap(k) 2ε, for all balanced edge-cut K. Proof. The number of edge of H i twice val(f). 12

13 Let f be a maximum balanced flow, and let K be the correponding balanced edge-cut which define the et A,B,C, and D in N. Let A*, B*, C*, D* be the correponding et of V(G). C 1, C 2,, C k denote the connected component of N[C], and each K i ha odd capacity, by We ue the horthand notation A = b(v), and o forth, for the et B, C, D. v A* 4.3 Lemma. balcap(k)= A B + 2ε + deg G A *(v) k. v B* Proof. Referring to Fig. 2, balcap(k) = 2 A + B,B + B,C + B,D + C + D k. Notice that 2ε= A + B + C + D and that B,B + B,C + B,D = deg G A *(v). The v B* reult follow. 4.4 Proof of the Factor Theorem. uppoe that G i without a factor. Then there i a balanced edge-cut uch that balcap(k)<2ε. By lemma 4.3, thi give A B + deg G A * (v) k < 0. Each K i ha odd capacity. Notice that cap(k i )= B,C i + b(v). v B* Therefore, k odd(a*,b*). It follow that b(v) < odd(a*,b*) + (b(v) deg G A *(v) ). v A* v B* Converely, uppoe that b(v) < odd(a*,b*) + v A* v B* et A* and B* of V(G). Form a balanced edge-cut by taking C* to conit of all component v C i * (b(v) deg G A *(v) ) for dijoint of G (A* B*) uch that B,C + b(v) i odd. D* contain the remaining vertice of G. It v C* i eay to verify that thi determine a balanced edge-cut K of N for which balcap(k)<2ε. Thu we have proved the Factor Theorem with balanced network. In the cae that no factor exit in G, the maximum balanced flow algorithm actually find the et A* and B*; they are part of the edge-cut formed by the et of all -reachable vertice. That i, it either find the factor or find the two et that prove that no factor exit. uppoe that edge of G may be ued more than once by edge of H, o that H i a multigraph, with maximum multiplicity m allowed. Then balcap(k)= A B + 2ε + m deg G A * (v) k, o that G i without a factor H if and only if there are et A * and B* v B* b(v) < odd m (A*,B*) + uch that (b(v) m deg G A *(v) ), v A* v B* where odd m (A*,B*) i the number of component C* of G (A* B*) uch that m B,C* + b(v) i odd. v C* 13

14 When m i allowed to approach, o that edge may be ued any number of time in H, we obtain Tutte olubility Theorem [10]. In thi cae, [B,B]=[B,C]=[B,D]=Ø, for otherwie balcap(k) would be infinite. o G i not oluble if and only if there exit dijoint et A*,B* V(G) uch that A < B + k, where k i the number of component C* of G (A* B*) uch that b(v) i odd. v C* The Erdö-Gallai condition [2] for the exitence of a imple graph with precribed degree equence and precribed maximum edge-multiplicity can be derived directly from the maxbalanced-flow-min-balanced-cut theorem. imilarly it can be ued to find a formula for the number of edge in a maximum matching in an arbitrary graph. In ummary, Tutte Factor Theorem can be viewed a a min-max theorem of flow theory. The theory of f-barrier [6,9,10] can be viewed a the theory of edge-cut in balanced network. A a reult, the theoretical and algorithmic technique of flow theory can be ued for olving thee kind of problem. Balanced network provide a implification of the theory of f-factor, f-barrier, and capacitated b-matching by placing them into the context of network flow. Reference 1. J.A. Bondy and U..R. Murty, Graph Theory with Application, American Elevier Publihing Co., New York, P. Erdö and T. Gallai, Graph with precribed degree of vertice, (Hungarian), Mat. Lapok 11, 1960, pp Frank Harary, Graph Theory, Addion-Weley Publihing Company, Reading, Maachuett, William Kocay and Dougla tone, An algorithm for balanced flow, 1992, ubmitted. 5. Lazlo Lovaz, Three hort proof in graph theory, JCT(B) 19, 1975, pp L. Lovaz and M.D. Plummer, Matching Theory, Annal of Dicrete Mathematic 29, North-Holland, Amterdam, A. chrijver, Min-max reult in combinatorial optimization, in Mathematical Programming the tate of the Art, Ed. Grötchel, Korte, pringer Verlag, Berlin, W.T. Tutte, The factorization of linear graph, J. London Math. oc. 22, 1947, , reprinted in elected Paper of W.T. Tutte, Ed. D. McCarthy and R.G. tanton, Charle Babbage Reearch Centre, Canada, W.T. Tutte, The factor of graph, Can. J. Math., 4, 1952, pp , reprinted in elected Paper of W.T. Tutte, Ed. D. McCarthy and R.G. tanton, Charle Babbage Reearch Centre, Canada, W.T. Tutte, A hort proof of the factor theorem for finite graph, Can. J. Math., 6, 1954, pp , reprinted in elected Paper of W.T. Tutte, Ed. D. McCarthy and R.G. tanton, Charle Babbage Reearch Centre, Canada,

List coloring hypergraphs

List coloring hypergraphs Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity

More information

Multicolor Sunflowers

Multicolor Sunflowers Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of

More information

4. Connectivity Connectivity Connectivity. Whitney's s connectivity theorem: (G) (G) (G) for special

4. Connectivity Connectivity Connectivity. Whitney's s connectivity theorem: (G) (G) (G) for special 4. Connectivity 4.. Connectivity Vertex-cut and vertex-connectivity Edge-cut and edge-connectivty Whitney' connectivity theorem: Further theorem for the relation of and graph 4.. The Menger Theorem and

More information

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end Theoretical Computer Science 4 (0) 669 678 Content lit available at SciVere ScienceDirect Theoretical Computer Science journal homepage: www.elevier.com/locate/tc Optimal algorithm for online cheduling

More information

Preemptive scheduling on a small number of hierarchical machines

Preemptive scheduling on a small number of hierarchical machines Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,

More information

Primitive Digraphs with the Largest Scrambling Index

Primitive Digraphs with the Largest Scrambling Index Primitive Digraph with the Larget Scrambling Index Mahmud Akelbek, Steve Kirkl 1 Department of Mathematic Statitic, Univerity of Regina, Regina, Sakatchewan, Canada S4S 0A Abtract The crambling index of

More information

Problem Set 8 Solutions

Problem Set 8 Solutions Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem

More information

Convex Hulls of Curves Sam Burton

Convex Hulls of Curves Sam Burton Convex Hull of Curve Sam Burton 1 Introduction Thi paper will primarily be concerned with determining the face of convex hull of curve of the form C = {(t, t a, t b ) t [ 1, 1]}, a < b N in R 3. We hall

More information

Computers and Mathematics with Applications. Sharp algebraic periodicity conditions for linear higher order

Computers and Mathematics with Applications. Sharp algebraic periodicity conditions for linear higher order Computer and Mathematic with Application 64 (2012) 2262 2274 Content lit available at SciVere ScienceDirect Computer and Mathematic with Application journal homepage: wwweleviercom/locate/camwa Sharp algebraic

More information

Social Studies 201 Notes for November 14, 2003

Social Studies 201 Notes for November 14, 2003 1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Chapter 4. The Laplace Transform Method

Chapter 4. The Laplace Transform Method Chapter 4. The Laplace Tranform Method The Laplace Tranform i a tranformation, meaning that it change a function into a new function. Actually, it i a linear tranformation, becaue it convert a linear combination

More information

arxiv: v2 [math.co] 11 Sep 2017

arxiv: v2 [math.co] 11 Sep 2017 The maximum number of clique in graph without long cycle Ruth Luo September 13, 017 arxiv:1701.0747v [math.co] 11 Sep 017 Abtract The Erdő Gallai Theorem tate that for k 3 every graph on n vertice with

More information

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281 72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition

More information

A relationship between generalized Davenport-Schinzel sequences and interval chains

A relationship between generalized Davenport-Schinzel sequences and interval chains A relationhip between generalized Davenport-Schinzel equence and interval chain The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed

More information

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004 18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem

More information

SOME RESULTS ON INFINITE POWER TOWERS

SOME RESULTS ON INFINITE POWER TOWERS NNTDM 16 2010) 3, 18-24 SOME RESULTS ON INFINITE POWER TOWERS Mladen Vailev - Miana 5, V. Hugo Str., Sofia 1124, Bulgaria E-mail:miana@abv.bg Abtract To my friend Kratyu Gumnerov In the paper the infinite

More information

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS. Volker Ziegler Technische Universität Graz, Austria

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS. Volker Ziegler Technische Universität Graz, Austria GLASNIK MATEMATIČKI Vol. 1(61)(006), 9 30 ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS Volker Ziegler Techniche Univerität Graz, Autria Abtract. We conider the parameterized Thue

More information

Chapter 7. Network Flow. CS 350: Winter 2018

Chapter 7. Network Flow. CS 350: Winter 2018 Chapter 7 Network Flow CS 3: Winter 1 1 Soviet Rail Network, Reference: On the hitory of the tranportation and maximum flow problem. Alexander Schrijver in Math Programming, 1: 3,. Maximum Flow and Minimum

More information

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS VOLKER ZIEGLER Abtract We conider the parameterized Thue equation X X 3 Y (ab + (a + bx Y abxy 3 + a b Y = ±1, where a, b 1 Z uch that

More information

Social Studies 201 Notes for March 18, 2005

Social Studies 201 Notes for March 18, 2005 1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

List Coloring Graphs

List Coloring Graphs Lit Coloring Graph February 6, 004 LIST COLORINGS AND CHOICE NUMBER Thomaen Long Grotzch girth 5 verion Thomaen Long Let G be a connected planar graph of girth at leat 5. Let A be a et of vertice in G

More information

Avoiding Forbidden Submatrices by Row Deletions

Avoiding Forbidden Submatrices by Row Deletions Avoiding Forbidden Submatrice by Row Deletion Sebatian Wernicke, Jochen Alber, Jen Gramm, Jiong Guo, and Rolf Niedermeier Wilhelm-Schickard-Intitut für Informatik, niverität Tübingen, Sand 13, D-72076

More information

LINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules

LINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules LINEAR ALGEBRA METHOD IN COMBINATORICS 1 Warming-up example Theorem 11 (Oddtown theorem) In a town of n citizen, no more tha club can be formed under the rule each club have an odd number of member each

More information

Lecture 17: Analytic Functions and Integrals (See Chapter 14 in Boas)

Lecture 17: Analytic Functions and Integrals (See Chapter 14 in Boas) Lecture 7: Analytic Function and Integral (See Chapter 4 in Boa) Thi i a good point to take a brief detour and expand on our previou dicuion of complex variable and complex function of complex variable.

More information

Bogoliubov Transformation in Classical Mechanics

Bogoliubov Transformation in Classical Mechanics Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How

More information

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs Chip-firing game and a partial Tutte polynomial for Eulerian digraph Kévin Perrot Aix Mareille Univerité, CNRS, LIF UMR 7279 3288 Mareille cedex 9, France. kevin.perrot@lif.univ-mr.fr Trung Van Pham Intitut

More information

Chapter 7. Network Flow. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

Chapter 7. Network Flow. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Chapter 7 Network Flow Slide by Kevin Wayne. Copyright 5 Pearon-Addion Weley. All right reerved. Soviet Rail Network, 55 Reference: On the hitory of the tranportation and maximum flow problem. Alexander

More information

Discrete Mathematics

Discrete Mathematics Dicrete Mathematic 310 (010) 334 3333 Content lit available at ScienceDirect Dicrete Mathematic journal homepage: www.elevier.com/locate/dic Rank number of grid graph Hannah Alpert Department of Mathematic,

More information

arxiv: v1 [math.mg] 25 Aug 2011

arxiv: v1 [math.mg] 25 Aug 2011 ABSORBING ANGLES, STEINER MINIMAL TREES, AND ANTIPODALITY HORST MARTINI, KONRAD J. SWANEPOEL, AND P. OLOFF DE WET arxiv:08.5046v [math.mg] 25 Aug 20 Abtract. We give a new proof that a tar {op i : i =,...,

More information

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation IEOR 316: Fall 213, Profeor Whitt Topic for Dicuion: Tueday, November 19 Alternating Renewal Procee and The Renewal Equation 1 Alternating Renewal Procee An alternating renewal proce alternate between

More information

An Inequality for Nonnegative Matrices and the Inverse Eigenvalue Problem

An Inequality for Nonnegative Matrices and the Inverse Eigenvalue Problem An Inequality for Nonnegative Matrice and the Invere Eigenvalue Problem Robert Ream Program in Mathematical Science The Univerity of Texa at Dalla Box 83688, Richardon, Texa 7583-688 Abtract We preent

More information

Codes Correcting Two Deletions

Codes Correcting Two Deletions 1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of

More information

New bounds for Morse clusters

New bounds for Morse clusters New bound for More cluter Tamá Vinkó Advanced Concept Team, European Space Agency, ESTEC Keplerlaan 1, 2201 AZ Noordwijk, The Netherland Tama.Vinko@ea.int and Arnold Neumaier Fakultät für Mathematik, Univerität

More information

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems A Contraint Propagation Algorithm for Determining the Stability Margin of Linear Parameter Circuit and Sytem Lubomir Kolev and Simona Filipova-Petrakieva Abtract The paper addree the tability margin aement

More information

arxiv: v4 [math.co] 21 Sep 2014

arxiv: v4 [math.co] 21 Sep 2014 ASYMPTOTIC IMPROVEMENT OF THE SUNFLOWER BOUND arxiv:408.367v4 [math.co] 2 Sep 204 JUNICHIRO FUKUYAMA Abtract. A unflower with a core Y i a family B of et uch that U U Y for each two different element U

More information

NULL HELIX AND k-type NULL SLANT HELICES IN E 4 1

NULL HELIX AND k-type NULL SLANT HELICES IN E 4 1 REVISTA DE LA UNIÓN MATEMÁTICA ARGENTINA Vol. 57, No. 1, 2016, Page 71 83 Publihed online: March 3, 2016 NULL HELIX AND k-type NULL SLANT HELICES IN E 4 1 JINHUA QIAN AND YOUNG HO KIM Abtract. We tudy

More information

c n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k

c n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k 1. Exitence Let x (0, 1). Define c k inductively. Suppoe c 1,..., c k 1 are already defined. We let c k be the leat integer uch that x k An eay proof by induction give that and for all k. Therefore c n

More information

MATEMATIK Datum: Tid: eftermiddag. A.Heintz Telefonvakt: Anders Martinsson Tel.:

MATEMATIK Datum: Tid: eftermiddag. A.Heintz Telefonvakt: Anders Martinsson Tel.: MATEMATIK Datum: 20-08-25 Tid: eftermiddag GU, Chalmer Hjälpmedel: inga A.Heintz Telefonvakt: Ander Martinon Tel.: 073-07926. Löningar till tenta i ODE och matematik modellering, MMG5, MVE6. Define what

More information

Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits

Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits Contemporary Mathematic Symmetric Determinantal Repreentation of Formula and Weakly Skew Circuit Bruno Grenet, Erich L. Kaltofen, Pacal Koiran, and Natacha Portier Abtract. We deploy algebraic complexity

More information

Minimum Cost Noncrossing Flow Problem on Layered Networks

Minimum Cost Noncrossing Flow Problem on Layered Networks Minimum Cot Noncroing Flow Problem on Layered Network İ. Kuban Altınel*, Necati Ara, Zeynep Şuvak, Z. Caner Taşkın Department of Indutrial Engineering, Boğaziçi Univerity, 44, Bebek, İtanbul, Turkey Abtract

More information

CS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division

CS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division 1 1 April 000 Demmel / Shewchuk CS 170: Midterm Exam II Univerity of California at Berkeley Department of Electrical Engineering and Computer Science Computer Science Diviion hi i a cloed book, cloed calculator,

More information

ON TESTING THE DIVISIBILITY OF LACUNARY POLYNOMIALS BY CYCLOTOMIC POLYNOMIALS Michael Filaseta* and Andrzej Schinzel 1. Introduction and the Main Theo

ON TESTING THE DIVISIBILITY OF LACUNARY POLYNOMIALS BY CYCLOTOMIC POLYNOMIALS Michael Filaseta* and Andrzej Schinzel 1. Introduction and the Main Theo ON TESTING THE DIVISIBILITY OF LACUNARY POLYNOMIALS BY CYCLOTOMIC POLYNOMIALS Michael Filaeta* and Andrzej Schinzel 1. Introduction and the Main Theorem Thi note decribe an algorithm for determining whether

More information

Convergence criteria and optimization techniques for beam moments

Convergence criteria and optimization techniques for beam moments Pure Appl. Opt. 7 (1998) 1221 1230. Printed in the UK PII: S0963-9659(98)90684-5 Convergence criteria and optimization technique for beam moment G Gbur and P S Carney Department of Phyic and Atronomy and

More information

Electronic Theses and Dissertations

Electronic Theses and Dissertations Eat Tenneee State Univerity Digital Common @ Eat Tenneee State Univerity Electronic Thee and Diertation Student Work 5-208 Vector Partition Jennifer French Eat Tenneee State Univerity Follow thi and additional

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Deign and Analyi LECTURES 1-1 Network Flow Flow, cut Ford-Fulkeron Min-cut/max-flow theorem Adam Smith // A. Smith; baed on lide by E. Demaine, C. Leieron, S. Rakhodnikova, K. Wayne Detecting

More information

COHOMOLOGY AS A LOCAL-TO-GLOBAL BRIDGE

COHOMOLOGY AS A LOCAL-TO-GLOBAL BRIDGE COHOMOLOGY AS A LOCAL-TO-GLOBAL BRIDGE LIVIU I. NICOLAESCU ABSTRACT. I dicu low dimenional incarnation of cohomology and illutrate how baic cohomological principle lead to a proof of Sperner lemma. CONTENTS.

More information

Clustering Methods without Given Number of Clusters

Clustering Methods without Given Number of Clusters Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,

More information

A PROOF OF TWO CONJECTURES RELATED TO THE ERDÖS-DEBRUNNER INEQUALITY

A PROOF OF TWO CONJECTURES RELATED TO THE ERDÖS-DEBRUNNER INEQUALITY Volume 8 2007, Iue 3, Article 68, 3 pp. A PROOF OF TWO CONJECTURES RELATED TO THE ERDÖS-DEBRUNNER INEQUALITY C. L. FRENZEN, E. J. IONASCU, AND P. STĂNICĂ DEPARTMENT OF APPLIED MATHEMATICS NAVAL POSTGRADUATE

More information

THE SPLITTING SUBSPACE CONJECTURE

THE SPLITTING SUBSPACE CONJECTURE THE SPLITTING SUBSPAE ONJETURE ERI HEN AND DENNIS TSENG Abtract We anwer a uetion by Niederreiter concerning the enumeration of a cla of ubpace of finite dimenional vector pace over finite field by proving

More information

CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS

CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.1 INTRODUCTION 8.2 REDUCED ORDER MODEL DESIGN FOR LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.3

More information

Unbounded solutions of second order discrete BVPs on infinite intervals

Unbounded solutions of second order discrete BVPs on infinite intervals Available online at www.tjna.com J. Nonlinear Sci. Appl. 9 206), 357 369 Reearch Article Unbounded olution of econd order dicrete BVP on infinite interval Hairong Lian a,, Jingwu Li a, Ravi P Agarwal b

More information

Source slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis

Source slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis Source lideplayer.com/fundamental of Analytical Chemitry, F.J. Holler, S.R.Crouch Chapter 6: Random Error in Chemical Analyi Random error are preent in every meaurement no matter how careful the experimenter.

More information

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang

More information

DIFFERENTIAL EQUATIONS

DIFFERENTIAL EQUATIONS DIFFERENTIAL EQUATIONS Laplace Tranform Paul Dawkin Table of Content Preface... Laplace Tranform... Introduction... The Definition... 5 Laplace Tranform... 9 Invere Laplace Tranform... Step Function...4

More information

Inference for Two Stage Cluster Sampling: Equal SSU per PSU. Projections of SSU Random Variables on Each SSU selection.

Inference for Two Stage Cluster Sampling: Equal SSU per PSU. Projections of SSU Random Variables on Each SSU selection. Inference for Two Stage Cluter Sampling: Equal SSU per PSU Projection of SSU andom Variable on Eac SSU election By Ed Stanek Introduction We review etimating equation for PSU mean in a two tage cluter

More information

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin

More information

Physics 741 Graduate Quantum Mechanics 1 Solutions to Final Exam, Fall 2014

Physics 741 Graduate Quantum Mechanics 1 Solutions to Final Exam, Fall 2014 Phyic 7 Graduate Quantum Mechanic Solution to inal Eam all 0 Each quetion i worth 5 point with point for each part marked eparately Some poibly ueful formula appear at the end of the tet In four dimenion

More information

Pacific Journal of Mathematics

Pacific Journal of Mathematics Pacific Journal of Mathematic OSCILLAION AND NONOSCILLAION OF FORCED SECOND ORDER DYNAMIC EQUAIONS MARIN BOHNER AND CHRISOPHER C. ISDELL Volume 230 No. March 2007 PACIFIC JOURNAL OF MAHEMAICS Vol. 230,

More information

SOME PROPERTIES OF CAYLEY GRAPHS OF CANCELLATIVE SEMIGROUPS

SOME PROPERTIES OF CAYLEY GRAPHS OF CANCELLATIVE SEMIGROUPS THE PUBLISHING HOUSE PROEEDINGS OF THE ROMANIAN AADEMY, Serie A, OF THE ROMANIAN AADEMY Volume 7, Number /06, pp 0 MATHEMATIS SOME PROPERTIES OF AYLEY GRAPHS OF ANELLATIVE SEMIGROUPS Bahman KHOSRAVI Qom

More information

Multicast Network Coding and Field Sizes

Multicast Network Coding and Field Sizes Multicat Network Coding and Field Size Qifu (Tyler) Sun, Xunrui Yin, Zongpeng Li, and Keping Long Intitute of Advanced Networking Technology and New Service, Univerity of Science and Technology Beijing,

More information

arxiv: v2 [math.nt] 30 Apr 2015

arxiv: v2 [math.nt] 30 Apr 2015 A THEOREM FOR DISTINCT ZEROS OF L-FUNCTIONS École Normale Supérieure arxiv:54.6556v [math.nt] 3 Apr 5 943 Cachan November 9, 7 Abtract In thi paper, we etablih a imple criterion for two L-function L and

More information

A SIMPLE NASH-MOSER IMPLICIT FUNCTION THEOREM IN WEIGHTED BANACH SPACES. Sanghyun Cho

A SIMPLE NASH-MOSER IMPLICIT FUNCTION THEOREM IN WEIGHTED BANACH SPACES. Sanghyun Cho A SIMPLE NASH-MOSER IMPLICIT FUNCTION THEOREM IN WEIGHTED BANACH SPACES Sanghyun Cho Abtract. We prove a implified verion of the Nah-Moer implicit function theorem in weighted Banach pace. We relax the

More information

Lecture 3. January 9, 2018

Lecture 3. January 9, 2018 Lecture 3 January 9, 208 Some complex analyi Although you might have never taken a complex analyi coure, you perhap till know what a complex number i. It i a number of the form z = x + iy, where x and

More information

arxiv: v1 [math.co] 17 Nov 2014

arxiv: v1 [math.co] 17 Nov 2014 Maximizing proper coloring on graph Jie Ma Humberto Nave arxiv:1411.4364v1 [math.co] 17 Nov 2014 Abtract The number of proper q-coloring of a graph G, denoted by P G q, i an important graph parameter that

More information

Root Locus Diagram. Root loci: The portion of root locus when k assume positive values: that is 0

Root Locus Diagram. Root loci: The portion of root locus when k assume positive values: that is 0 Objective Root Locu Diagram Upon completion of thi chapter you will be able to: Plot the Root Locu for a given Tranfer Function by varying gain of the ytem, Analye the tability of the ytem from the root

More information

Lecture 9: Shor s Algorithm

Lecture 9: Shor s Algorithm Quantum Computation (CMU 8-859BB, Fall 05) Lecture 9: Shor Algorithm October 7, 05 Lecturer: Ryan O Donnell Scribe: Sidhanth Mohanty Overview Let u recall the period finding problem that wa et up a a function

More information

TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL

TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL GLASNIK MATEMATIČKI Vol. 38583, 73 84 TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL p-laplacian Haihen Lü, Donal O Regan and Ravi P. Agarwal Academy of Mathematic and Sytem Science, Beijing, China, National

More information

k-connectivity of uniform s-intersection graphs

k-connectivity of uniform s-intersection graphs k-connectivity of uniform -interection graph Mindauga Blozneli, Katarzyna Rybarczyk Faculty of Mathematic and Informatic, Vilniu Univerity, 03225 Vilniu, Lithuania, E-MAIL: mindauga.blozneli@mif.vu.lt

More information

TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES

TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES DOUGLAS R. ANDERSON Abtract. We are concerned with the repreentation of polynomial for nabla dynamic equation on time cale. Once etablihed,

More information

Some Sets of GCF ϵ Expansions Whose Parameter ϵ Fetch the Marginal Value

Some Sets of GCF ϵ Expansions Whose Parameter ϵ Fetch the Marginal Value Journal of Mathematical Reearch with Application May, 205, Vol 35, No 3, pp 256 262 DOI:03770/jin:2095-26520503002 Http://jmredluteducn Some Set of GCF ϵ Expanion Whoe Parameter ϵ Fetch the Marginal Value

More information

2 Hatad, Jukna & Pudlak gate, namely we hall tudy the ize of depth-three circuit. The technique we hall ue ha two ource. The rt one i a \nite" verion

2 Hatad, Jukna & Pudlak gate, namely we hall tudy the ize of depth-three circuit. The technique we hall ue ha two ource. The rt one i a \nite verion TOP-DOWN LOWER BOUNDS FOR DEPTH-THREE CIRCUITS J. Hatad, S. Jukna and P. Pudlak Abtract. We preent a top-down lower bound method for depth-three ^ _ :-circuit which i impler than the previou method and

More information

Manprit Kaur and Arun Kumar

Manprit Kaur and Arun Kumar CUBIC X-SPLINE INTERPOLATORY FUNCTIONS Manprit Kaur and Arun Kumar manpreet2410@gmail.com, arun04@rediffmail.com Department of Mathematic and Computer Science, R. D. Univerity, Jabalpur, INDIA. Abtract:

More information

CHAPTER 6. Estimation

CHAPTER 6. Estimation CHAPTER 6 Etimation Definition. Statitical inference i the procedure by which we reach a concluion about a population on the bai of information contained in a ample drawn from that population. Definition.

More information

Flag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle

Flag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle Flag-tranitive non-ymmetric -deign with (r, λ = 1 and alternating ocle Shenglin Zhou, Yajie Wang School of Mathematic South China Univerity of Technology Guangzhou, Guangdong 510640, P. R. China lzhou@cut.edu.cn

More information

One Class of Splitting Iterative Schemes

One Class of Splitting Iterative Schemes One Cla of Splitting Iterative Scheme v Ciegi and V. Pakalnytė Vilniu Gedimina Technical Univerity Saulėtekio al. 11, 2054, Vilniu, Lithuania rc@fm.vtu.lt Abtract. Thi paper deal with the tability analyi

More information

On the chromatic number of a random 5-regular graph

On the chromatic number of a random 5-regular graph On the chromatic number of a random 5-regular graph J. Díaz A.C. Kapori G.D. Kemke L.M. Kiroui X. Pérez N. Wormald Abtract It wa only recently hown by Shi and Wormald, uing the differential equation method

More information

Singular perturbation theory

Singular perturbation theory Singular perturbation theory Marc R. Rouel June 21, 2004 1 Introduction When we apply the teady-tate approximation (SSA) in chemical kinetic, we typically argue that ome of the intermediate are highly

More information

ALLOCATING BANDWIDTH FOR BURSTY CONNECTIONS

ALLOCATING BANDWIDTH FOR BURSTY CONNECTIONS SIAM J. COMPUT. Vol. 30, No. 1, pp. 191 217 c 2000 Society for Indutrial and Applied Mathematic ALLOCATING BANDWIDTH FOR BURSTY CONNECTIONS JON KLEINBERG, YUVAL RABANI, AND ÉVA TARDOS Abtract. In thi paper,

More information

Hyperbolic Partial Differential Equations

Hyperbolic Partial Differential Equations Hyperbolic Partial Differential Equation Evolution equation aociated with irreverible phyical procee like diffuion heat conduction lead to parabolic partial differential equation. When the equation i a

More information

DIFFERENTIAL EQUATIONS Laplace Transforms. Paul Dawkins

DIFFERENTIAL EQUATIONS Laplace Transforms. Paul Dawkins DIFFERENTIAL EQUATIONS Laplace Tranform Paul Dawkin Table of Content Preface... Laplace Tranform... Introduction... The Definition... 5 Laplace Tranform... 9 Invere Laplace Tranform... Step Function...

More information

Extension of Inagaki General Weighted Operators. and. A New Fusion Rule Class of Proportional Redistribution of Intersection Masses

Extension of Inagaki General Weighted Operators. and. A New Fusion Rule Class of Proportional Redistribution of Intersection Masses Extenion of nagaki General Weighted Operator and A New Fuion Rule Cla of Proportional Reditribution of nterection Mae Florentin Smarandache Chair of Math & Science Depart. Univerity of New Mexico, Gallup,

More information

3.1 The Revised Simplex Algorithm. 3 Computational considerations. Thus, we work with the following tableau. Basic observations = CARRY. ... m.

3.1 The Revised Simplex Algorithm. 3 Computational considerations. Thus, we work with the following tableau. Basic observations = CARRY. ... m. 3 Computational conideration In what follow, we analyze the complexity of the Simplex algorithm more in detail For thi purpoe, we focu on the update proce in each iteration of thi procedure Clearly, ince,

More information

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes European Wirele, April 7-9,, Vienna, Autria ISBN 978--87-4-9 VE VERLAG GMBH Unavoidable Cycle in Polynomial-Baed Time-Invariant LPC Convolutional Code Hua Zhou and Norbert Goertz Intitute of Telecommunication

More information

CDMA Signature Sequences with Low Peak-to-Average-Power Ratio via Alternating Projection

CDMA Signature Sequences with Low Peak-to-Average-Power Ratio via Alternating Projection CDMA Signature Sequence with Low Peak-to-Average-Power Ratio via Alternating Projection Joel A Tropp Int for Comp Engr and Sci (ICES) The Univerity of Texa at Autin 1 Univerity Station C0200 Autin, TX

More information

Estimation of Current Population Variance in Two Successive Occasions

Estimation of Current Population Variance in Two Successive Occasions ISSN 684-8403 Journal of Statitic Volume 7, 00, pp. 54-65 Etimation of Current Population Variance in Two Succeive Occaion Abtract Muhammad Azam, Qamruz Zaman, Salahuddin 3 and Javed Shabbir 4 The problem

More information

ONLINE APPENDIX: TESTABLE IMPLICATIONS OF TRANSLATION INVARIANCE AND HOMOTHETICITY: VARIATIONAL, MAXMIN, CARA AND CRRA PREFERENCES

ONLINE APPENDIX: TESTABLE IMPLICATIONS OF TRANSLATION INVARIANCE AND HOMOTHETICITY: VARIATIONAL, MAXMIN, CARA AND CRRA PREFERENCES ONLINE APPENDIX: TESTABLE IMPLICATIONS OF TRANSLATION INVARIANCE AND HOMOTHETICITY: VARIATIONAL, MAXMIN, CARA AND CRRA PREFERENCES CHRISTOPHER P. CHAMBERS, FEDERICO ECHENIQUE, AND KOTA SAITO In thi online

More information

Pythagorean Triple Updated 08--5 Drlnoordzij@leennoordzijnl wwwleennoordzijme Content A Roadmap for generating Pythagorean Triple Pythagorean Triple 3 Dicuion Concluion 5 A Roadmap for generating Pythagorean

More information

Embedding large graphs into a random graph

Embedding large graphs into a random graph Embedding large graph into a random graph Aaf Ferber Kyle Luh Oanh Nguyen June 14, 016 Abtract In thi paper we conider the problem of embedding bounded degree graph which are almot panning in a random

More information

Weber Schafheitlin-type integrals with exponent 1

Weber Schafheitlin-type integrals with exponent 1 Integral Tranform and Special Function Vol., No., February 9, 47 53 Weber Schafheitlin-type integral with exponent Johanne Kellendonk* and Serge Richard Univerité de Lyon, Univerité Lyon, Intitut Camille

More information

Logic, Automata and Games

Logic, Automata and Games Logic, Automata and Game Jacque Duparc EJCIM 27 EJCIM, 23-27 January 27 J. Duparc ( & ) Logic, Automata and Game Lyon, 23-27 January 27 / 97 Reference [] K. R. Apt and E. Grädel. Lecture in game theory

More information

Control Systems Analysis and Design by the Root-Locus Method

Control Systems Analysis and Design by the Root-Locus Method 6 Control Sytem Analyi and Deign by the Root-Locu Method 6 1 INTRODUCTION The baic characteritic of the tranient repone of a cloed-loop ytem i cloely related to the location of the cloed-loop pole. If

More information

Lecture 7: Testing Distributions

Lecture 7: Testing Distributions CSE 5: Sublinear (and Streaming) Algorithm Spring 014 Lecture 7: Teting Ditribution April 1, 014 Lecturer: Paul Beame Scribe: Paul Beame 1 Teting Uniformity of Ditribution We return today to property teting

More information

On the Unit Groups of a Class of Total Quotient Rings of Characteristic p k with k 3

On the Unit Groups of a Class of Total Quotient Rings of Characteristic p k with k 3 International Journal of Algebra, Vol, 207, no 3, 27-35 HIKARI Ltd, wwwm-hikaricom http://doiorg/02988/ija2076750 On the Unit Group of a Cla of Total Quotient Ring of Characteritic p k with k 3 Wanambii

More information

Today. Flow review. Augmenting paths. Ford-Fulkerson Algorithm. Intro to cuts (reason: prove correctness)

Today. Flow review. Augmenting paths. Ford-Fulkerson Algorithm. Intro to cuts (reason: prove correctness) Today Flow review Augmenting path Ford-Fulkeron Algorithm Intro to cut (reaon: prove correctne) Flow Network = ource, t = ink. c(e) = capacity of edge e Capacity condition: f(e) c(e) Conervation condition:

More information

Lecture 8: Period Finding: Simon s Problem over Z N

Lecture 8: Period Finding: Simon s Problem over Z N Quantum Computation (CMU 8-859BB, Fall 205) Lecture 8: Period Finding: Simon Problem over Z October 5, 205 Lecturer: John Wright Scribe: icola Rech Problem A mentioned previouly, period finding i a rephraing

More information

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Mathematical and Computational Application Vol. 11 No. pp. 181-191 006. Aociation for Scientific Reearch A BATCH-ARRIVA QEE WITH MTIPE SERVERS AND FZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Jau-Chuan

More information

Beta Burr XII OR Five Parameter Beta Lomax Distribution: Remarks and Characterizations

Beta Burr XII OR Five Parameter Beta Lomax Distribution: Remarks and Characterizations Marquette Univerity e-publication@marquette Mathematic, Statitic and Computer Science Faculty Reearch and Publication Mathematic, Statitic and Computer Science, Department of 6-1-2014 Beta Burr XII OR

More information

ON THE SMOOTHNESS OF SOLUTIONS TO A SPECIAL NEUMANN PROBLEM ON NONSMOOTH DOMAINS

ON THE SMOOTHNESS OF SOLUTIONS TO A SPECIAL NEUMANN PROBLEM ON NONSMOOTH DOMAINS Journal of Pure and Applied Mathematic: Advance and Application Volume, umber, 4, Page -35 O THE SMOOTHESS OF SOLUTIOS TO A SPECIAL EUMA PROBLEM O OSMOOTH DOMAIS ADREAS EUBAUER Indutrial Mathematic Intitute

More information

Max-Planck-Institut für Mathematik Bonn

Max-Planck-Institut für Mathematik Bonn Max-Planck-Intitut für Mathematik Bonn Minimal degree of the difference of two polynomial over Q, and weighted plane tree by Fedor Pakovich Alexander K. Zvonkin Max-Planck-Intitut für Mathematik Preprint

More information

p. (The electron is a point particle with radius r = 0.)

p. (The electron is a point particle with radius r = 0.) - pin ½ Recall that in the H-atom olution, we howed that the fact that the wavefunction Ψ(r) i ingle-valued require that the angular momentum quantum nbr be integer: l = 0,,.. However, operator algebra

More information