A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem

Size: px
Start display at page:

Download "A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem"

Transcription

1 A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem Palo Feofiloff Cristina G. Fernandes Carlos E. Ferreira José Coelho de Pina September 04 Abstract The primal-dal scheme has been sed to provide approximation algorithms for many problems. Goemans and Williamson gave a ( n )-approximation for the Prize-Collecting Steiner Tree Problem that rns in O(n 3 logn) time. Johnson, Minkoff and Phillips proposed a faster implementation of Goemans and Williamson s algorithm. We give a proof that the approximation ratio of this implementation is exactly (in the worst case). Introdction Consider a graph G = (V,E), a fnction c from E into the set Q of non-negative rationals and a fnction π from V into Q. The Prize-Collecting Steiner Tree (PCST) Problem asks for a tree T in G sch that c e + v V\V T π v is minimm. (We denote by V T and E T, respectively, the vertex and edge sets of a sbgraph T.) The rooted variant of the PCST problem reqires T to contain a given root vertex. Goemans and Williamson [, 3] sed a primal-dal scheme to derive a ( n )-approximation for the rooted variant of PCST, where n := V. By trying all possible choices for the root, they obtained a ( n )-approximation for the nrooted PCST. The reslting algorithm rns in time O(n3 logn). Johnson, Minkoff and Phillips [4] proposed a modification of the algorithm that rns the primaldal scheme only once, reslting in a rnning-time of O(n logn). They claimed their algorithm which we refer to as JMP achieves an approximation ratio of n. Unfortnately, their claim does not hold. This note does two things. First, it proves that the JMP algorithm is a -approximation (the proof involves some non-trivial technical details). Second, it shows an example where the approximation ratio achieved by the algorithm is exactly, ths disproving the claimed n ratio. This paper was originally pblished in 006 ( A revised version, pblished in 009 on arxiv.org/abs/ v, made explicit the statement that the algorithm is a Lagrangean-preserving -approximation. The present version corrects some minor mistakes and improves the presentation. DepartamentodeCiênciadaComptação, InstittodeMatemática eestatística, UniversidadedeSãoPalo, Ra do Matão 00, São Palo/SP, Brazil. {pf,cris,cef,coelho}@ime.sp.br. Research spported in part by PRONEX/CNPq 66407/997-4 (Brazil).

2 Notation and preliminaries For any sbset F of E, let c(f) := e F c e. For any sbset X of V, let π(x) := v X π v and let X := V \X. If T is a sbgraph of G, we shall abse notation and write π(t) and π(t) to mean π(v T ) and π(v T ) respectively. Similarly, we shall write c(t) to mean c(e T ). Hence, the goal of problem PCST(G,c,π) is to find a tree T in G sch that c(t)+π(t) is minimm. A collection L of nonempty sbsets of V is laminar if, for any two elements L and L of L, either L L = or L L or L L. For any sbset X of V, let L[X] := {L L : L X} and L X := {L L : L X}. For every L in L that is not in L[X] L[X] L X, the sets L X, L\X and X\L are all nonempty. For any sbgraph T of G, we shall abse notation and write L[T], L[T], and L T in place of L[V T ], L[V T ], and L VT respectively. The nion of all sets in L shall be denoted by L. The set of all maximal elements of L shall be denoted by L. If L is laminar, the elements of L are pairwise disjoint. If, in addition, L = V then L is a partition of V. For any laminar collection L of sbsets of V and any edge e of G, let L(e) := {L L : e δ G L}, where δ G L stands for the set of edges of G with one end in L and the other in L. Let y be a fnction from L into Q. For any sbcollection L of L, let y(l ) := L L y L. We say that y respects c if y(l(e)) c e () for each e in E. We say an edge e is tight for y if eqality holds in (). We say y respects π if y(l[x]) π(x) () for each X in L. We say that y satrates an element X of L if eqality holds in (). The following lemma smmarizes the effect of the two respects constraints on y: Lemma. Let L be a laminar collection of sbsets of V and y a fnction from L into Q. If y respects c and π then y(l\l T ) c(t)+π(t) for any tree T of G. Proof. Collection L is the nion of L T, N, and M, where N is L[T] and M is the set of all L in L sch that both L V T and L\V T are nonempty. Hence, y(l\l T ) y(n)+y(m). Since T is connected, δ T L for each L in M, and therefore y(m) L M δ T L y L = y(l(e)) c e = c(t). Next, observe that y(n) = L N y(l[l]) L N π(l) π(t), where N is the set of maximal elements of N. The lemma follows from these ineqalities. The JMP algorithm finds a tree T sch that c(t)+π(t) y(l\l X ) for any nonempty set X of vertices. Sch tree -approximates a soltion of or problem, as the following corollary of Lemma. shows.

3 Corollary. Let L be a laminar collection of sbsets of V and y a fnction from L into Q that respects c and π. For any tree T in G, if c(t)+π(t) y(l\l X ) for every nonempty sbset X of V, then c(t) +π(t) (c(o) +π(o)), where O is a (optimal) soltion of problem PCST(G, c, π). Proof. We may assme V O is nonempty, whence c(t) + π(t) y(l \ L O ). By Lemma., y(l\l O ) c(o)+π(o). The claimed ineqality follows. 3 Johnson, Minkoff and Phillips algorithm Beforewestate thejmpalgorithm, afewmoredefinitionsareneeded. LetLbealaminarcollection of sbsets of V sch that L = V. We say that an edge is internal to L if both of its ends are in the same element of L. All other edges are external to L. For any external edge, there are two elements of L containing its ends. We call these two elements the extremes of the edge in L. Given a forest F in G and a sbset L of V, we say that F is L-connected if V F L = or the indced sbgraph F[V F L] is connected. In other words, F is L-connected if the following property holds: for any two vertices and v of F in L, there exists a path from to v in F and that path never leaves L. If F spans G (as is the case dring the first phase of the algorithm), the condition F[V F L] is connected can, of corse, be replaced by F[L] is connected. For any collection L of sbsets of V, we shall say that F is L-connected if F is L-connected for each L in L. For any collection S of sbsets of V, we say a tree T has no bridge in S if δ T S (whence δ T S = or δ T S ) for all S in S. We say that a tree T in G is wrapped in S if V T S for some S in S. The JMP algorithm receives G, c, π and retrns a tree T in G sch that c(t) + π(t) (c(o)+π(o)), where O is a soltion of PCST(G,c,π)). (The factor mltiplying π is a bons; becase of it, the JMP algorithm is said to be a Lagrangean-preserving -approximation [].) The algorithm has two phases, the second one operating on the otpt of the first: Phase I: Each iteration in phase I starts with a spanning forest F in G, a laminar collection L of sbsets of V sch that L = V, a sbcollection S of L, and a fnction y from L into Q sch that the following invariants hold: (i) F is L-connected; (i) y respects c and π; (i3) each edge of F is tight for y; (i4) y satrates every element of S; (i5) no element of L \S is the nion of elements of S; (i6) for any L-connected tree T in G that has no bridge in S and is not wrapped in S, y(l(e))+y(l[t]) y(l\l X ) for any nonempty sbset X of V. The first iteration starts with F = (V, ), L = {{v} : v V}, S =, and y = 0. Each iteration consists of the following: 3

4 Case I.: L \S >. For ε in Q, let y ε be the fnction defined as follows: y ε L = y L + ε if L L \S and y ε L = y L otherwise. Let εbe thelargest nmber in Q sch that thefnction y ε respects c and π. Sbcase I..A: y ε satrates some element L of L \S. Start a new iteration with S {L} and y ε in the roles of S and y respectively. (The forest F and the collection L do not change.) Sbcase I..B: some edge e external to L is tight for y ε and has at least one of its extremes in L \S. Let let L and L be the extremes of e in L. Set y ε L L := 0 and start a new iteration with F +e, L {L L }, and y ε in the roles of F, L, and y respectively. (The collection S does not change.) Case I.: L \S =. This is the end of phase I. Start phase II. Phase II: Dring this phase, the collections L and S and the fnction y remain nchanged. Let M be the only element of L \S. Each iteration begins with a sbgraph T of F sch that (i7) T is an L-connected tree; (i8) M \V T admits a partition into elements of S. The first iteration begins with T = F[M]. Each iteration does the following: Case II.: δ T Z = for some Z in S. Start a new iteration with T Z in place of T. Case II.: δ T Z for each Z in S. Retrn T and stop. 4 Analysis of the algorithm Sppose, for the moment, that invariants (i) to (i8) are correct. At the end of phase II, T is a tree by virte of (i7). Since each edge of T is tight (de to (i3)), c(t) = c e = y(l(e)). On the other hand, some sbcollection Z of S partitions V T, becase L S is a partition of M and, by (i8), there is a partition of M \V T into elements of S. Since y satrates the elements of Z (de to (i4)), π(t) = S Z π(s) = S Zy(L[S]) y(l[t]). Now, c(t)+π(t) y(l(e))+y(l[t]) y(l\l X ) (3) 4

5 for every nonempty sbset X of V, by virte of invariant (i6). The applicability of (i6) is jstified as follows. Tree T is L-connected de to (i7) and has no bridge in S since we are in Case II.. Moreover, T is not wrapped in S as this wold imply, by (i8), that M is the nion of elements of S, contradicting (i5). Corollary. can now be applied to ineqality (3) to show that c(t)+π(t) (c(o)+π(o)) for any soltion O of PCST(G,c,π). This proves the following corrected version of Johnson, Minkoff and Phillips Theorem 3. [4]: Theorem 4. The JMP algorithm is a -approximation for the PCST problem. The example in Figre shows that the approximation ratio of the JMP algorithm can be arbitrarily close to, regardless of the size of the graph. So, Theorem 4. is tight. (a) 0 (b) (c) (d) 0 +ρ +ρ +ρ Figre : (a) An instance of the PCST. (b) The soltion prodced by the JMP algorithm when ρ > 0. Its cost is 4. (c) The optimal soltion, consisting of vertex alone, has cost +ρ. (d) A similar instance of arbitrary size consists of a long path. 5 Proofs of the invariants Invariants (i) to (i4) obviosly hold at the beginning of each iteration of phase I. We mst only verify the other for invariants. The verification of (i6) depends on the following lemma: Lemma 5. Let P be a partition of V and (A,B) a bipartition of P. Let T be a tree in G. If T is P-connected, has no bridge in B, and is not wrapped in B, then δ T A + A[T] A. A A Proof. Let s say that two elements of P are adjacent if some edge of T has these two elements as extremes. This adjacency relation defines a graph H having P as set of vertices. Since T is P-connected, the edges of H are in one-to-one correspondence with the edges of T external to P. P P δ TP = E H. Since Hence, the degree of any vertex P of H is exactly δ T P, and therefore T is connected, H has + P[T] components (all are singletons, except at most one). Since T has no cycles and is P-connected, H is a forest. Hence, the nmber of edges of H is the nmber of vertices mins the nmber of components: E H = P P[T]. Therefore δ T P = P P[T]. (4) P P 5

6 Now consider the vertices of H that are in B. Since T has no bridge in B and is not wrapped in B, each B in B is sch that either δ T B or B V T. Hence B B δ TB B \B[T], and therefore δ T B B B[T]. (5) B B The difference between (4) and (5) is ineqality follows. A A δ TA + A[T] A, from which the claimed Proof of (i6). Clearly, (i6) holds at the beginning of the first iteration. Now assme that it holds at the beginning of some iteration where Case I. occrs. Sppose, first, that Sbcase I..A occrs. Let S := S {L}, let X be a nonempty sbset of V, and let T be an L-connected tree that has no bridge in S and is not wrapped in S. Of corse T has no bridge in S and is not wrapped in S, and so we may assme that y(l(e))+y(l[t]) y(l\l X ). (6) We mst show next that (6) holds when y ε is sbstitted for y. Lemma 5., with P := L, A := L \S, and B := L S, implies A A δ TA + A[T] A. Since A X, δ T A ε+ A[T] ε A\A X ε. A A The addition of this ineqality to (6) prodces y ε (L(e))+y ε (L[T]) y ε (L\L X ) since y ε differs from y only on A. Hence, (i6) is tre at the beginning of the next iteration. Now sppose Sbcase I..B occrs. Let L := L {L,L }, let X be any nonempty sbset of V, and let T be an L -connected tree that has no bridge in S and is not wrapped in S. Of corse T is L-connected, and so we may asme that y(l(e))+y(l[t]) y(l\l X ) (7) We mst show next that (7) is tre when y ε and L are sbstitted for y and L respectively. Lemma 5., with P := L, A := L \S, and B := L S, implies A A δ TA + A[T] A. Since A X, δ T A ε+ A[T] ε A\A X ε. A A The addition of this ineqality to (7) prodces y ε (L (e))+y ε (L [T]) y ε (L \L X ) since y ε differs from y only in A and y ε L L = 0. Hence, (i6) is tre at the beginning of the next iteration. 6

7 Proof of (i5). Obviosly (i5) holds at the beginning of the first iteration. Now consider an iteration where Case I. occrs. If Sbcase I..A occrs, then (i5) remains trivially tre at the beginning of the next iteration. Sppose now that Sbcase I..B occrs. Adjst notation so that L / S. Since (i5) holds at the beginning of the crrent iteration, L is not the nion of elements of S. Hence, L L is not the nion of elements of S. Therefore, (i5) is tre at the beginning of the next iteration. Proof of (i7). Sppose we are at the beginning of the first iteration of phase II. Let L be an element of L sch that L V T. Since V T = M L, we have L V T and therefore T[V T L] = T[L] = F[L]. Since F[L] is connected by virte of (i), so is T[V T L]. This argment shows that T is L-connected. In particlar, T is M-connected and therefore T is a tree. Hence, (i7) holds at the beginning of the first iteration. Now sppose (i7) holds at the beginning of some iteration where Case II. occrs. Let L be an element of L and let and v be vertices in L (V T \Z). Let P be the niqe path from to v in T. We may assme that P never leaves L. Moreover, P never enters Z, given that δ T Z =. Hence, T Z is L-connected. For the same reason, T Z is a tree. Hence (i7) holds at the beginning of the next iteration. Proof of (i8). At the beginning of the first iteration of phase II, (i8) holds becase V T = M. Now consider an iteration where Case II. occrs. We may assme that there is a partition U of M \V T into elements of S. If Z V T then U {Z} is a partition of M \(V T \Z) into elements of S. Otherwise, Z incldes some of the elements of U and is disjoint from all the others. Hence, {Z} {U U : U Z = } is a partition of M \(V T \Z) into elements of S. This shows that (i8) holds at the beginning of the next iteration. References [] A. Archer, M. Bateni, M. Hajiaghayi, and H. Karloff. Improved approximation algorithms for Prize-Collecting Steiner Tree and TSP. In Proceedings of the 50th Annal IEEE Symposim on Fondations of Compter Science (FOCS), 009. [] M.X. Goemans and D.P. Williamson. A general approximation techniqe for constrained forest problems. SIAM Jornal on Compting, 4():96 37, 995. [3] D.S. Hochbam, editor. Approximation Algorithms for NP-Hard Problems. PWS Pblishing, 997. [4] D.S. Johnson, M. Minkoff, and S. Phillips. The prize collecting Steiner tree problem: theory and practice. In Symposim on Discrete Algorithms, pages ,

On the tree cover number of a graph

On the tree cover number of a graph On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm

More information

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions OR Spectrm 06 38:53 540 DOI 0.007/s009-06-043-5 REGULAR ARTICLE Worst-case analysis of the LPT algorithm for single processor schedling with time restrictions Oliver ran Fan Chng Ron Graham Received: Janary

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Department of Mathematics University of California, San Diego La Jolla, CA, U.S.A. fan@csd.ed Sbmitted: Feb 0, 206; Accepted: Jne 22, 206;

More information

Network Design and Game Theory Spring 2008 Lecture 6

Network Design and Game Theory Spring 2008 Lecture 6 Network Design and Game Theory Spring 2008 Lecture 6 Guest Lecturer: Aaron Archer Instructor: Mohammad T. Hajiaghayi Scribe: Fengming Wang March 3, 2008 1 Overview We study the Primal-dual, Lagrangian

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical

More information

On oriented arc-coloring of subcubic graphs

On oriented arc-coloring of subcubic graphs On oriented arc-coloring of sbcbic graphs Alexandre Pinlo Alexandre.Pinlo@labri.fr LaBRI, Université Bordeax I, 351, Cors de la Libération, 33405 Talence, France Janary 17, 2006 Abstract. A homomorphism

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Abstract A basic eigenvale bond de to Alon and Boppana holds only for reglar graphs. In this paper we give a generalized Alon-Boppana bond

More information

RESOLUTION OF INDECOMPOSABLE INTEGRAL FLOWS ON A SIGNED GRAPH

RESOLUTION OF INDECOMPOSABLE INTEGRAL FLOWS ON A SIGNED GRAPH RESOLUTION OF INDECOMPOSABLE INTEGRAL FLOWS ON A SIGNED GRAPH BEIFANG CHEN, JUE WANG, AND THOMAS ZASLAVSKY Abstract. It is well-known that each nonnegative integral flow of a directed graph can be decomposed

More information

Cubic graphs have bounded slope parameter

Cubic graphs have bounded slope parameter Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one

More information

Sensitivity Analysis in Bayesian Networks: From Single to Multiple Parameters

Sensitivity Analysis in Bayesian Networks: From Single to Multiple Parameters Sensitivity Analysis in Bayesian Networks: From Single to Mltiple Parameters Hei Chan and Adnan Darwiche Compter Science Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwiche}@cs.cla.ed

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical

More information

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University 9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)

More information

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for

More information

We automate the bivariate change-of-variables technique for bivariate continuous random variables with

We automate the bivariate change-of-variables technique for bivariate continuous random variables with INFORMS Jornal on Compting Vol. 4, No., Winter 0, pp. 9 ISSN 09-9856 (print) ISSN 56-558 (online) http://dx.doi.org/0.87/ijoc.046 0 INFORMS Atomating Biariate Transformations Jeff X. Yang, John H. Drew,

More information

Graph-Modeled Data Clustering: Fixed-Parameter Algorithms for Clique Generation

Graph-Modeled Data Clustering: Fixed-Parameter Algorithms for Clique Generation Graph-Modeled Data Clstering: Fied-Parameter Algorithms for Cliqe Generation Jens Gramm Jiong Go Falk Hüffner Rolf Niedermeier Wilhelm-Schickard-Institt für Informatik, Universität Tübingen, Sand 13, D-72076

More information

The Linear Quadratic Regulator

The Linear Quadratic Regulator 10 The Linear Qadratic Reglator 10.1 Problem formlation This chapter concerns optimal control of dynamical systems. Most of this development concerns linear models with a particlarly simple notion of optimality.

More information

Symmetric Range Assignment with Disjoint MST Constraints

Symmetric Range Assignment with Disjoint MST Constraints Symmetric Range Assignment with Disjoint MST Constraints Eric Schmtz Drexel University Philadelphia, Pa. 19104,USA Eric.Jonathan.Schmtz@drexel.ed ABSTRACT If V is a set of n points in the nit sqare [0,

More information

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL 8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a

More information

CONCERNING A CONJECTURE OF MARSHALL HALL

CONCERNING A CONJECTURE OF MARSHALL HALL CONCERNING A CONJECTURE OF MARSHALL HALL RICHARD SINKHORN Introdction. An «X«matrix A is said to be dobly stochastic if Oij; = and if ï i aik = jj_i akj = 1 for all i and j. The set of «X«dobly stochastic

More information

A Model-Free Adaptive Control of Pulsed GTAW

A Model-Free Adaptive Control of Pulsed GTAW A Model-Free Adaptive Control of Plsed GTAW F.L. Lv 1, S.B. Chen 1, and S.W. Dai 1 Institte of Welding Technology, Shanghai Jiao Tong University, Shanghai 00030, P.R. China Department of Atomatic Control,

More information

Section 7.4: Integration of Rational Functions by Partial Fractions

Section 7.4: Integration of Rational Functions by Partial Fractions Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to

More information

Joint Transfer of Energy and Information in a Two-hop Relay Channel

Joint Transfer of Energy and Information in a Two-hop Relay Channel Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical

More information

FOUNTAIN codes [3], [4] provide an efficient solution

FOUNTAIN codes [3], [4] provide an efficient solution Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn

More information

arxiv: v2 [cs.ds] 17 Oct 2014

arxiv: v2 [cs.ds] 17 Oct 2014 On Uniform Capacitated k-median Beyond the Natral LP Relaxation Shi Li Toyota Technological Institte at Chicago shili@ttic.ed arxiv:1409.6739v2 [cs.ds] 17 Oct 2014 Abstract In this paper, we stdy the niform

More information

9. Tensor product and Hom

9. Tensor product and Hom 9. Tensor prodct and Hom Starting from two R-modles we can define two other R-modles, namely M R N and Hom R (M, N), that are very mch related. The defining properties of these modles are simple, bt those

More information

Essentials of optimal control theory in ECON 4140

Essentials of optimal control theory in ECON 4140 Essentials of optimal control theory in ECON 4140 Things yo need to know (and a detail yo need not care abot). A few words abot dynamic optimization in general. Dynamic optimization can be thoght of as

More information

Weak ε-nets for Axis-Parallel Boxes in d-space

Weak ε-nets for Axis-Parallel Boxes in d-space Weak ε-nets for Axis-Parallel Boxes in d-space Esther Ezra May 25, 2009 Abstract In this note we show the existence of weak ε-nets of size O /ε loglog /ε for point sets and axis-parallel boxes in R d.

More information

Information Source Detection in the SIR Model: A Sample Path Based Approach

Information Source Detection in the SIR Model: A Sample Path Based Approach Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287

More information

Chords in Graphs. Department of Mathematics Texas State University-San Marcos San Marcos, TX Haidong Wu

Chords in Graphs. Department of Mathematics Texas State University-San Marcos San Marcos, TX Haidong Wu AUSTRALASIAN JOURNAL OF COMBINATORICS Volme 32 (2005), Pages 117 124 Chords in Graphs Weizhen G Xingde Jia Department of Mathematics Texas State Uniersity-San Marcos San Marcos, TX 78666 Haidong W Department

More information

Graphs and Networks Lecture 5. PageRank. Lecturer: Daniel A. Spielman September 20, 2007

Graphs and Networks Lecture 5. PageRank. Lecturer: Daniel A. Spielman September 20, 2007 Graphs and Networks Lectre 5 PageRank Lectrer: Daniel A. Spielman September 20, 2007 5.1 Intro to PageRank PageRank, the algorithm reportedly sed by Google, assigns a nmerical rank to eery web page. More

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) EA Procedre for Static Analysis. Prepare the E model a. discretize (mesh) the strctre b. prescribe loads c. prescribe spports. Perform calclations

More information

Restricted cycle factors and arc-decompositions of digraphs. J. Bang-Jensen and C. J. Casselgren

Restricted cycle factors and arc-decompositions of digraphs. J. Bang-Jensen and C. J. Casselgren Restricted cycle factors and arc-decompositions of digraphs J. Bang-Jensen and C. J. Casselgren REPORT No. 0, 0/04, spring ISSN 0-467X ISRN IML-R- -0-/4- -SE+spring Restricted cycle factors and arc-decompositions

More information

Right Trapezoid Cover for Triangles of Perimeter Two

Right Trapezoid Cover for Triangles of Perimeter Two Kasetsart J (Nat Sci) 45 : 75-7 (0) Right Trapezoid Cover for Triangles of Perimeter Two Banyat Sroysang ABSTRACT A convex region covers a family of arcs if it contains a congrent copy of every arc in

More information

arxiv: v3 [cs.ds] 10 Apr 2013

arxiv: v3 [cs.ds] 10 Apr 2013 An LMP O(log n)-approximation Algorithm for Node Weighted Prize Collecting Steiner Tree Jochen Könemann, Sina Sadeghian, Laura Sanità. arxiv:1302.2127v3 [cs.ds] 10 Apr 2013 Abstract In the node-weighted

More information

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks The Cryptanalysis of a New Pblic-Key Cryptosystem based on Modlar Knapsacks Yeow Meng Chee Antoine Jox National Compter Systems DMI-GRECC Center for Information Technology 45 re d Ulm 73 Science Park Drive,

More information

Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introduction The transmission line equations are given by

Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introduction The transmission line equations are given by Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introdction The transmission line eqations are given by, I z, t V z t l z t I z, t V z, t c z t (1) (2) Where, c is the per-nit-length

More information

Connectivity and Menger s theorems

Connectivity and Menger s theorems Connectiity and Menger s theorems We hae seen a measre of connectiity that is based on inlnerability to deletions (be it tcs or edges). There is another reasonable measre of connectiity based on the mltiplicity

More information

The Minimal Estrada Index of Trees with Two Maximum Degree Vertices

The Minimal Estrada Index of Trees with Two Maximum Degree Vertices MATCH Commnications in Mathematical and in Compter Chemistry MATCH Commn. Math. Compt. Chem. 64 (2010) 799-810 ISSN 0340-6253 The Minimal Estrada Index of Trees with Two Maximm Degree Vertices Jing Li

More information

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs Upper Bonds on the Spanning Ratio of Constrained Theta-Graphs Prosenjit Bose and André van Renssen School of Compter Science, Carleton University, Ottaa, Canada. jit@scs.carleton.ca, andre@cg.scs.carleton.ca

More information

A New Approach to Direct Sequential Simulation that Accounts for the Proportional Effect: Direct Lognormal Simulation

A New Approach to Direct Sequential Simulation that Accounts for the Proportional Effect: Direct Lognormal Simulation A ew Approach to Direct eqential imlation that Acconts for the Proportional ffect: Direct ognormal imlation John Manchk, Oy eangthong and Clayton Detsch Department of Civil & nvironmental ngineering University

More information

Online Budgeted Allocation with General Budgets

Online Budgeted Allocation with General Budgets Online Bdgeted Allocation with General Bdgets NATHANIEL KELL, Dke University DEBMALYA PANIGRAHI, Dke University We stdy the online bdgeted allocation (also called ADWORDS problem, where a set of impressions

More information

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control C and U Chart presented by Dr. Eng. Abed

More information

FRTN10 Exercise 12. Synthesis by Convex Optimization

FRTN10 Exercise 12. Synthesis by Convex Optimization FRTN Exercise 2. 2. We want to design a controller C for the stable SISO process P as shown in Figre 2. sing the Yola parametrization and convex optimization. To do this, the control loop mst first be

More information

Non-Lecture I: Linear Programming. Th extremes of glory and of shame, Like east and west, become the same.

Non-Lecture I: Linear Programming. Th extremes of glory and of shame, Like east and west, become the same. The greatest flood has the soonest ebb; the sorest tempest the most sdden calm; the hottest love the coldest end; and from the deepest desire oftentimes enses the deadliest hate. Th extremes of glory and

More information

The Heat Equation and the Li-Yau Harnack Inequality

The Heat Equation and the Li-Yau Harnack Inequality The Heat Eqation and the Li-Ya Harnack Ineqality Blake Hartley VIGRE Research Paper Abstract In this paper, we develop the necessary mathematics for nderstanding the Li-Ya Harnack ineqality. We begin with

More information

When Closed Graph Manifolds are Finitely Covered by Surface Bundles Over S 1

When Closed Graph Manifolds are Finitely Covered by Surface Bundles Over S 1 Acta Mathematica Sinica, English Series 1999, Jan, Vol15, No1, p 11 20 When Closed Graph Manifolds are Finitely Covered by Srface Bndles Over S 1 Yan Wang Fengchn Y Department of Mathematics, Peking University,

More information

1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on

1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on . Tractable and Intractable Comptational Problems So far in the corse we have seen many problems that have polynomial-time soltions; that is, on a problem instance of size n, the rnning time T (n) = O(n

More information

On relative errors of floating-point operations: optimal bounds and applications

On relative errors of floating-point operations: optimal bounds and applications On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors

More information

4.2 First-Order Logic

4.2 First-Order Logic 64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore

More information

A Note on Arboricity of 2-edge-connected Cubic Graphs

A Note on Arboricity of 2-edge-connected Cubic Graphs Ξ44 Ξ6fi ψ ) 0 Vol.44, No.6 205ff. ADVANCES IN MATHEMATICS(CHINA) No., 205 A Note on Arboricity of 2-edge-connected Cbic Graphs HAO Rongxia,, LAI Hongjian 2, 3, LIU Haoyang 4 doi: 0.845/sxjz.204056b (.

More information

Bertrand s Theorem. October 8, µr 2 + V (r) 0 = dv eff dr. 3 + dv. f (r 0 )

Bertrand s Theorem. October 8, µr 2 + V (r) 0 = dv eff dr. 3 + dv. f (r 0 ) Bertrand s Theorem October 8, Circlar orbits The eective potential, V e = has a minimm or maximm at r i and only i so we mst have = dv e L µr + V r = L µ 3 + dv = L µ 3 r r = L µ 3 At this radis, there

More information

GRAY CODES FAULTING MATCHINGS

GRAY CODES FAULTING MATCHINGS Uniersity of Ljbljana Institte of Mathematics, Physics and Mechanics Department of Mathematics Jadranska 19, 1000 Ljbljana, Sloenia Preprint series, Vol. 45 (2007), 1036 GRAY CODES FAULTING MATCHINGS Darko

More information

Gravitational Instability of a Nonrotating Galaxy *

Gravitational Instability of a Nonrotating Galaxy * SLAC-PUB-536 October 25 Gravitational Instability of a Nonrotating Galaxy * Alexander W. Chao ;) Stanford Linear Accelerator Center Abstract Gravitational instability of the distribtion of stars in a galaxy

More information

Elements of Coordinate System Transformations

Elements of Coordinate System Transformations B Elements of Coordinate System Transformations Coordinate system transformation is a powerfl tool for solving many geometrical and kinematic problems that pertain to the design of gear ctting tools and

More information

Discontinuous Fluctuation Distribution for Time-Dependent Problems

Discontinuous Fluctuation Distribution for Time-Dependent Problems Discontinos Flctation Distribtion for Time-Dependent Problems Matthew Hbbard School of Compting, University of Leeds, Leeds, LS2 9JT, UK meh@comp.leeds.ac.k Introdction For some years now, the flctation

More information

Designing MIPS Processor

Designing MIPS Processor CSE 675.: Introdction to Compter Architectre Designing IPS Processor (lti-cycle) Presentation H Reading Assignment: 5.5,5.6 lti-cycle Design Principles Break p eection of each instrction into steps. The

More information

Second-Order Wave Equation

Second-Order Wave Equation Second-Order Wave Eqation A. Salih Department of Aerospace Engineering Indian Institte of Space Science and Technology, Thirvananthapram 3 December 016 1 Introdction The classical wave eqation is a second-order

More information

Cuckoo hashing: Further analysis

Cuckoo hashing: Further analysis Information Processing Letters 86 (2003) 215 219 www.elsevier.com/locate/ipl Cckoo hashing: Frther analysis Lc Devroye,PatMorin School of Compter Science, McGill University, 3480 University Street, Montreal,

More information

Characterizations of probability distributions via bivariate regression of record values

Characterizations of probability distributions via bivariate regression of record values Metrika (2008) 68:51 64 DOI 10.1007/s00184-007-0142-7 Characterizations of probability distribtions via bivariate regression of record vales George P. Yanev M. Ahsanllah M. I. Beg Received: 4 October 2006

More information

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE

More information

On Multiobjective Duality For Variational Problems

On Multiobjective Duality For Variational Problems The Open Operational Research Jornal, 202, 6, -8 On Mltiobjective Dality For Variational Problems. Hsain *,, Bilal Ahmad 2 and Z. Jabeen 3 Open Access Department of Mathematics, Jaypee University of Engineering

More information

Improved Approximation Algorithms for PRIZE-COLLECTING STEINER TREE and TSP

Improved Approximation Algorithms for PRIZE-COLLECTING STEINER TREE and TSP Improved Approximation Algorithms for PRIZE-OLLETING STEINER TREE and TSP Aaron Archer MohammadHossein Bateni MohammadTaghi Hajiaghayi Howard Karloff AT&T Labs Research, 180 Park Avenue, Florham Park,

More information

Nonlinear parametric optimization using cylindrical algebraic decomposition

Nonlinear parametric optimization using cylindrical algebraic decomposition Proceedings of the 44th IEEE Conference on Decision and Control, and the Eropean Control Conference 2005 Seville, Spain, December 12-15, 2005 TC08.5 Nonlinear parametric optimization sing cylindrical algebraic

More information

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane Filomat 3:2 (27), 376 377 https://doi.org/.2298/fil7276a Pblished by Faclty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Conditions for Approaching

More information

Lecture 5 November 6, 2012

Lecture 5 November 6, 2012 Hypercbe problems Lectre 5 Noember 6, 2012 Lectrer: Petr Gregor Scribe by: Kryštof Měkta Updated: Noember 22, 2012 1 Partial cbes A sbgraph H of G is isometric if d H (, ) = d G (, ) for eery, V (H); that

More information

Remarks on strongly convex stochastic processes

Remarks on strongly convex stochastic processes Aeqat. Math. 86 (01), 91 98 c The Athor(s) 01. This article is pblished with open access at Springerlink.com 0001-9054/1/010091-8 pblished online November 7, 01 DOI 10.1007/s00010-01-016-9 Aeqationes Mathematicae

More information

Sign-reductions, p-adic valuations, binomial coefficients modulo p k and triangular symmetries

Sign-reductions, p-adic valuations, binomial coefficients modulo p k and triangular symmetries Sign-redctions, p-adic valations, binomial coefficients modlo p k and trianglar symmetries Mihai Prnesc Abstract According to a classical reslt of E. Kmmer, the p-adic valation v p applied to a binomial

More information

Optimization via the Hamilton-Jacobi-Bellman Method: Theory and Applications

Optimization via the Hamilton-Jacobi-Bellman Method: Theory and Applications Optimization via the Hamilton-Jacobi-Bellman Method: Theory and Applications Navin Khaneja lectre notes taken by Christiane Koch Jne 24, 29 1 Variation yields a classical Hamiltonian system Sppose that

More information

Prandl established a universal velocity profile for flow parallel to the bed given by

Prandl established a universal velocity profile for flow parallel to the bed given by EM 0--00 (Part VI) (g) The nderlayers shold be at least three thicknesses of the W 50 stone, bt never less than 0.3 m (Ahrens 98b). The thickness can be calclated sing Eqation VI-5-9 with a coefficient

More information

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled. Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports

More information

Discrete Applied Mathematics. The induced path function, monotonicity and betweenness

Discrete Applied Mathematics. The induced path function, monotonicity and betweenness Discrete Applied Mathematics 158 (2010) 426 433 Contents lists available at ScienceDirect Discrete Applied Mathematics jornal homepage: www.elsevier.com/locate/dam The indced path fnction, monotonicity

More information

Setting The K Value And Polarization Mode Of The Delta Undulator

Setting The K Value And Polarization Mode Of The Delta Undulator LCLS-TN-4- Setting The Vale And Polarization Mode Of The Delta Undlator Zachary Wolf, Heinz-Dieter Nhn SLAC September 4, 04 Abstract This note provides the details for setting the longitdinal positions

More information

Lecture 11: June 27. Distance Sensitivity Oracles. Succinct Graph Structures and Their Applications Spring Lecturer: Merav Parter

Lecture 11: June 27. Distance Sensitivity Oracles. Succinct Graph Structures and Their Applications Spring Lecturer: Merav Parter Sccinct Graph Strctres and Their Applications Spring 2018 Lectrer: Merav Parter Lectre 11: Jne 27 Distance Sensitivit Oracles A distance oracle scheme (Lectre 2) consists of two algorithms: a preprocessing

More information

Outline. Model Predictive Control: Current Status and Future Challenges. Separation of the control problem. Separation of the control problem

Outline. Model Predictive Control: Current Status and Future Challenges. Separation of the control problem. Separation of the control problem Otline Model Predictive Control: Crrent Stats and Ftre Challenges James B. Rawlings Department of Chemical and Biological Engineering University of Wisconsin Madison UCLA Control Symposim May, 6 Overview

More information

Affine Invariant Total Variation Models

Affine Invariant Total Variation Models Affine Invariant Total Variation Models Helen Balinsky, Alexander Balinsky Media Technologies aboratory HP aboratories Bristol HP-7-94 Jne 6, 7* Total Variation, affine restoration, Sobolev ineqality,

More information

MAXIMUM AND ANTI-MAXIMUM PRINCIPLES FOR THE P-LAPLACIAN WITH A NONLINEAR BOUNDARY CONDITION. 1. Introduction. ν = λ u p 2 u.

MAXIMUM AND ANTI-MAXIMUM PRINCIPLES FOR THE P-LAPLACIAN WITH A NONLINEAR BOUNDARY CONDITION. 1. Introduction. ν = λ u p 2 u. 2005-Ojda International Conference on Nonlinear Analysis. Electronic Jornal of Differential Eqations, Conference 14, 2006, pp. 95 107. ISSN: 1072-6691. URL: http://ejde.math.txstate.ed or http://ejde.math.nt.ed

More information

A Single Species in One Spatial Dimension

A Single Species in One Spatial Dimension Lectre 6 A Single Species in One Spatial Dimension Reading: Material similar to that in this section of the corse appears in Sections 1. and 13.5 of James D. Mrray (), Mathematical Biology I: An introction,

More information

Bridging the Gap Between Multigrid, Hierarchical, and Receding-Horizon Control

Bridging the Gap Between Multigrid, Hierarchical, and Receding-Horizon Control Bridging the Gap Between Mltigrid, Hierarchical, and Receding-Horizon Control Victor M. Zavala Mathematics and Compter Science Division Argonne National Laboratory Argonne, IL 60439 USA (e-mail: vzavala@mcs.anl.gov).

More information

Faster exact computation of rspr distance

Faster exact computation of rspr distance DOI 10.1007/s10878-013-9695-8 Faster exact comptation of rspr distance Zhi-Zhong Chen Ying Fan Lsheng Wang Springer Science+Bsiness Media New Yk 2013 Abstract De to hybridiation eents in eoltion, stdying

More information

Undecidability in Binary Tag Systems and the Post Correspondence Problem for Five Pairs of Words

Undecidability in Binary Tag Systems and the Post Correspondence Problem for Five Pairs of Words Undecidability in Binary Tag Systems and the Post Correspondence Problem for Five Pairs of Words Trlogh Neary Institte of Neroinformatics, University of Zürich and ETH Zürich, Switzerland tneary@ini.phys.ethz.ch

More information

STEP Support Programme. STEP III Hyperbolic Functions: Solutions

STEP Support Programme. STEP III Hyperbolic Functions: Solutions STEP Spport Programme STEP III Hyperbolic Fnctions: Soltions Start by sing the sbstittion t cosh x. This gives: sinh x cosh a cosh x cosh a sinh x t sinh x dt t dt t + ln t ln t + ln cosh a ln ln cosh

More information

A Characterization of Interventional Distributions in Semi-Markovian Causal Models

A Characterization of Interventional Distributions in Semi-Markovian Causal Models A Characterization of Interventional Distribtions in Semi-Markovian Casal Models Jin Tian and Changsng Kang Department of Compter Science Iowa State University Ames, IA 50011 {jtian, cskang}@cs.iastate.ed

More information

Lecture 8: September 26

Lecture 8: September 26 10-704: Information Processing and Learning Fall 2016 Lectrer: Aarti Singh Lectre 8: September 26 Note: These notes are based on scribed notes from Spring15 offering of this corse. LaTeX template cortesy

More information

Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees

Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Bernhard Fuchs Center for Applied Computer Science Cologne (ZAIK) University of Cologne, Weyertal 80, 50931 Köln, Germany Walter Kern

More information

OPTIMUM EXPRESSION FOR COMPUTATION OF THE GRAVITY FIELD OF A POLYHEDRAL BODY WITH LINEARLY INCREASING DENSITY 1

OPTIMUM EXPRESSION FOR COMPUTATION OF THE GRAVITY FIELD OF A POLYHEDRAL BODY WITH LINEARLY INCREASING DENSITY 1 OPTIMUM EXPRESSION FOR COMPUTATION OF THE GRAVITY FIEL OF A POLYHERAL BOY WITH LINEARLY INCREASING ENSITY 1 V. POHÁNKA2 Abstract The formla for the comptation of the gravity field of a polyhedral body

More information

G. Mahadevan 1 Selvam Avadayappan 2 V. G. Bhagavathi Ammal 3 T. Subramanian 4

G. Mahadevan 1 Selvam Avadayappan 2 V. G. Bhagavathi Ammal 3 T. Subramanian 4 G. Mahadean, Selam Aadaappan, V. G. Bhagaathi Ammal, T. Sbramanian / International Jornal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Isse 6, Noember- December

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) MAE 5 - inite Element Analysis Several slides from this set are adapted from B.S. Altan, Michigan Technological University EA Procedre for

More information

Spanning Trees with Many Leaves in Graphs without Diamonds and Blossoms

Spanning Trees with Many Leaves in Graphs without Diamonds and Blossoms Spanning Trees ith Many Leaes in Graphs ithot Diamonds and Blossoms Pal Bonsma Florian Zickfeld Technische Uniersität Berlin, Fachbereich Mathematik Str. des 7. Jni 36, 0623 Berlin, Germany {bonsma,zickfeld}@math.t-berlin.de

More information

From Primal-Dual to Cost Shares and Back: A Stronger LP Relaxation for the Steiner Forest Problem

From Primal-Dual to Cost Shares and Back: A Stronger LP Relaxation for the Steiner Forest Problem From Primal-Dual to Cost Shares and Back: A Stronger LP Relaxation for the Steiner Forest Problem Jochen Könemann 1, Stefano Leonardi 2, Guido Schäfer 2, and Stefan van Zwam 3 1 Department of Combinatorics

More information

Scheduling parallel jobs to minimize the makespan

Scheduling parallel jobs to minimize the makespan J Sched (006) 9:433 45 DOI 10.1007/s10951-006-8497-6 Schedling parallel jobs to minimize the makespan Berit Johannes C Springer Science + Bsiness Media, LLC 006 Abstract We consider the NP-hard problem

More information

arxiv: v1 [cs.dm] 20 Jun 2017

arxiv: v1 [cs.dm] 20 Jun 2017 On the Integrality Gap of the Prize-Collecting Steiner Forest LP Jochen Könemann 1, Neil Olver 2, Kanstantsin Pashkovich 1, R. Ravi 3, Chaitanya Swamy 1, and Jens Vygen 4 arxiv:1706.06565v1 cs.dm 20 Jun

More information

Linear System Theory (Fall 2011): Homework 1. Solutions

Linear System Theory (Fall 2011): Homework 1. Solutions Linear System Theory (Fall 20): Homework Soltions De Sep. 29, 20 Exercise (C.T. Chen: Ex.3-8). Consider a linear system with inpt and otpt y. Three experiments are performed on this system sing the inpts

More information

Simulation investigation of the Z-source NPC inverter

Simulation investigation of the Z-source NPC inverter octoral school of energy- and geo-technology Janary 5 20, 2007. Kressaare, Estonia Simlation investigation of the Z-sorce NPC inverter Ryszard Strzelecki, Natalia Strzelecka Gdynia Maritime University,

More information

Math 116 First Midterm October 14, 2009

Math 116 First Midterm October 14, 2009 Math 116 First Midterm October 14, 9 Name: EXAM SOLUTIONS Instrctor: Section: 1. Do not open this exam ntil yo are told to do so.. This exam has 1 pages inclding this cover. There are 9 problems. Note

More information

On the circuit complexity of the standard and the Karatsuba methods of multiplying integers

On the circuit complexity of the standard and the Karatsuba methods of multiplying integers On the circit complexity of the standard and the Karatsba methods of mltiplying integers arxiv:1602.02362v1 [cs.ds] 7 Feb 2016 Igor S. Sergeev The goal of the present paper is to obtain accrate estimates

More information

Pulses on a Struck String

Pulses on a Struck String 8.03 at ESG Spplemental Notes Plses on a Strck String These notes investigate specific eamples of transverse motion on a stretched string in cases where the string is at some time ndisplaced, bt with a

More information

COMPARATIVE STUDY OF ROBUST CONTROL TECHNIQUES FOR OTTO-CYCLE MOTOR CONTROL

COMPARATIVE STUDY OF ROBUST CONTROL TECHNIQUES FOR OTTO-CYCLE MOTOR CONTROL ACM Symposim Series in Mechatronics - Vol. - pp.76-85 Copyright c 28 by ACM COMPARATIVE STUDY OF ROUST CONTROL TECHNIQUES FOR OTTO-CYCLE MOTOR CONTROL Marcos Salazar Francisco, marcos.salazar@member.isa.org

More information

DYNAMICAL LOWER BOUNDS FOR 1D DIRAC OPERATORS. 1. Introduction We consider discrete, resp. continuous, Dirac operators

DYNAMICAL LOWER BOUNDS FOR 1D DIRAC OPERATORS. 1. Introduction We consider discrete, resp. continuous, Dirac operators DYNAMICAL LOWER BOUNDS FOR D DIRAC OPERATORS ROBERTO A. PRADO AND CÉSAR R. DE OLIVEIRA Abstract. Qantm dynamical lower bonds for continos and discrete one-dimensional Dirac operators are established in

More information

The Steiner k-cut Problem

The Steiner k-cut Problem The Steiner k-cut Problem Chandra Chekuri Sudipto Guha Joseph (Seffi) Naor September 23, 2005 Abstract We consider the Steiner k-cut problem which generalizes both the k-cut problem and the multiway cut

More information

QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING

QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING Jornal of the Korean Statistical Society 2007, 36: 4, pp 543 556 QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING Hosila P. Singh 1, Ritesh Tailor 2, Sarjinder Singh 3 and Jong-Min Kim 4 Abstract In sccessive

More information