Symmetric Range Assignment with Disjoint MST Constraints

Size: px
Start display at page:

Download "Symmetric Range Assignment with Disjoint MST Constraints"

Transcription

1 Symmetric Range Assignment with Disjoint MST Constraints Eric Schmtz Drexel University Philadelphia, Pa ,USA ABSTRACT If V is a set of n points in the nit sqare [0, 1] 2, and if R : V R + is an assignment of positive real nmbers (radii) to to those points, define a graph G(R) as follows: {v, w} is an ndirected edge if and only if the Eclidean distance d(v, w) is less than or eqal to min(r(v),r(w)). Given α 1 and k Z +, let Rk be the range assignment that minimizes the fnction J(R) = P R(v) α, sbject to the v V constraint that G(R) has at least k edge-disjoint spanning trees. For n random points in [0, 1] 2, the expected vale of the optimm, E(J(R k)), is asymptotically Θ(n 1 α 2 ). This is proved by analyzing a crde approximation algorithm that finds a range assignment R a k sch that the ratio J(Ra k ) J(R k ) is bonded. Categories and Sbject Descriptors F.2.m [Analysis of Algorithms and Problem Complexity]: Miscellaneos General Terms Algorithms, Performance, Reliability, Theory Keywords Range assignment, probabilistic analysis, approximation algorithm, spanning tree 1. INTRODUCTION If V is a finite set of points R 2, and R : V R + is an assignment of positive real nmbers (radii) to the points, define an ndirected graph G(R) as follows. The vertex set is V, and {, v} is an ndirected edge if and only if the Eclidean distance d(, v) is less than or eqal to min(r(), R(v)). This is one of the standard models for connections between nodes of a wireless network: R(v) represents the distance that node v can effectively transmit, and the presence of an Permission to make digital or hard copies of all or part of this work for personal or classroom se is granted withot fee provided that copies are not made or distribted for profit or commercial advantage and that copies bear this notice and the fll citation on the first page. To copy otherwise, to repblish, to post on servers or to redistribte to lists, reqires prior specific permission and/or a fee. DialM-POMC 08, Agst 22, 2008, Toronto, Ontario, Canada. Copyright 2008 ACM /08/08...$5.00. edge between two nodes indicates the availability of direct two-way commnication between those nodes. For a sitable vale of α, the fnction J(R) = P R(v) α has been v V sed as a measre of the energy spent by the nodes when transmitting. Hence it is a natral choice for an objective fnction to minimize. Some kind of connectivity constraint is needed to ensre that all pairs of nodes can commnicate (either directly via an edge, or indirectly by forwarding messages). In this paper, the constraint imposed is the existence of k edge-disjoint spanning trees. For positive integers k > 1, and real nmbers α 1, let Π k,α be the following optimization problem. Π k,α : Instance: V, a finite set of points in R 2. Objective: Choose R : V R + so as to minimize J(R) = v V R(v) α. Constraint: G(R) mst have at least k edge-disjoint spanning trees. Given an instance of Π k,α, let Rk denote an optimal choice of R. Ths J(Rk) is the minimm feasible energy. The main reslt in this paper is an asymptotic estimate for the expected vale of J(Rk). For the stochastic model in which a random instance is selected by choosing n points independently and niform randomly from [0,1] 2, we prove that E(J(Rk)) = Θ(n 1 α 2 ). More precisely,sppose that βα is the minimm spanning tree constant [3],that a < 2 βα and 5 that b > (2 + 2 α+2 kα+2 )β α. Then there is a positive constant N k,α sch that, for all n > N k,α, the expected vale of J(Rk) satisfies the ineqalities an 1 α 2 E(J(R k )) bn 1 α 2. One can regard Π k,α as the restriction of a problem Π, in which both the the positive integer k and the exponent α are given along with the points V as inpt. The problem Π is NP-hard, since it can be restricted to problems that are known to be NP-hard. In particlar, for k = 1, the existence of k spanning trees is eqivalent to connectivity. The problem of minimizing power, sbject to the graph being connected, is known to be NP-hard [7],[8].I believe Π k,α is NP-hard for general k and α, bt have not yet completed a proof. Several athors have considered range assignment problems with varios other connectivity constraints. Vertex connectivity is pariclarly important, and several athors

2 have sed this as a constraint. See for example, Lloyd et. al., Hajiaghayi et al., [10]Kortsarz, Mirrokni,Ntov and Tsanko, [12] and the references therein, and Calinesc at.al [2],[5].The work of Blogh et.al.[4]is closely related to ors becase they estimated the expected vale of the optimm power in the case k = 1. We shold particlarly mention Π k,α = the symmetric range assignment problem with the constraint that G has a k-edge-connected spanning sbgraph. It is well-known [9]that any 2k-edge-connected graph has k disjoint spanning trees. Hence any approximation algorithm for Π 2k,α can, ipso facto, be sed as an approximation algorithm for Π k,α. See Calinesc at.al [2],[5],Lloyd et.al.[13], and the work of Kortsarz et.al.,[12] and references therein for algorithms that se edge-connectivity as a constraint for range assignments. It is important to note that a graph with k disjoint spanning trees need not be 2k-edge connected. Hence the optimm soltion for a Π k,α instance may have less power than the lowest power 2k-edge-connected range assignment for that instance. It follows that the worst case ratio of an algorithm for Π 2k,α does not apply when the algorithm is sed as an approximation algorithm for Π k,α. 2. MINIMUM SPANNING TREES In this section, some elementary ineqalities will be sed to bond the objective fnction J from above and below by less complicated fnctions related to minimm spanning trees. Like many athors, we will se minimm spanning tree(s) and related ineqalities to constrct and analyze an approximation algorithm. Let K c = K c(v ) denote the complete graph on V. For v, w V, define the cost of the edge ε = {v, w} to be W(ε) = d(v, w) α. Obviosly W depends on α, bt to limit notational cltter, we write W instead of W α. Throghot this paper, α is a fixed positive constant that is greater than or eqal to one. It is important to note that, for α > 1, W may not satisfy the triangle ineqality. More precisely, one can have vertices v 1, v 2, v 3 for which W({v 1, v 3}) > W({v 1, v 2}) + W({v 2, v 3}). For any spanning sbgraph H K c, define the cost of H to be W(H) = P W(ε), the sm of the costs of of its edges. ε H If H is a spanning sbgraph of K c, let = (H) be the maximm of the degrees of the vertices in the graph H, and define F(H) = P max d(w, v w v v)α, where the maximm is over all neighbors w that v has in H. Then we have Lemma 1. For any spanning sbgraph H of K c, 2 W(H) F(H) 2W(H). Proof. For any finite list of positive real nmbers, the maximm of the nmbers is trivially bonded from above by the sm of the nmbers. Therefore F(H) d(, v) α = 2W(H). v v For the lower bond, note that, for any finite list of real nmbers, the maximm of the nmbers is bonded below by the average of the nmbers. Ths, for each vertex v, max d(, 1 v v)α d(, v) α 1 d(, v) α. degree(v) v v Smming over all vertices v, we get the lower bond in Lemma 1. Let S k be a minimm cost nion of k disjoint spanning trees for G(R k). To apply Lemma 1, we also need the following lemma. Lemma 2. For all vertices v, Rk(v) = max d(, v), where the maximm is over vertices for which {, v} is an edge of S k. Proof. From the definition of S k (as a minimm cost nion of k disjoint spanning trees for G(R k)), it is clear that S k is a sbgraph of G(R k). This, and the definition of G(R k), imply that, for any edge {, v} of S k, we mst have d(, v) min(r k(), R k(v)). Ths R k(v) d(, v) for any vertex that is adjacent to v in S k,i.e. Rk(v) max d(, v). (1) We mst prove that the ineqality (1) cannot be strict. We sppose Rk(v) > max d(, v), and derive a contradiction. Define ( R R(w) = k(w), w v max d(v, ), w = v, where the maximm is over all vertices that are adjacent to v in S k. Note that R is feasible; G( R) has k disjoint spanning trees since it still contains S k. Bt J( R) < J(R k). This contradicts the minimality of J(R k) in the definition of R k Applying Lemma 1 to Lemma 2, we get Corollary 3. If = (S k) is the maximm vertex degree in S k, then 2 W(S k) J(R k) 2W(S k). Let S Kc be minimm cost nion of k spanning trees for K c. In general, W(S k) W(S Kc )) kw(t 1). It is well known that K c(v ) has a minimm weight spanning tree T 1 whose maximm degree less than or eqal to 5. (See, for example, Lemma 7.2 of [14]It is not tre for arbitrary weights, bt is tre for the weights W({, v}) = d(, v) α in this paper.) Hence Corollary 3 does yield a reasonable lower bond for E(J(R k)) in the special case when k = 1, namely E(J(R 1)) 2 5 E(W(T1)). The distribtion of W(T 1) has been intensively stdied by probability theorists[1],[3],[11],[17].for this paper, we need only the expected vale: there is a constant β α, called the minimm spanning tree constant, sch that E(W(T 1)) = β αn 1 α 2 (1 + o(1)). (2) Unfortnately, we do not have any pper bonds on = (S k) for k > 1, and we can no longer se this method to dedce a lower bond. However it is worth observing that R k R 1, so that we at least have these crde lower bonds: J(Rk)) 2 W(T1)) (3) 5

3 and E(J(R k)) E(J(R 1)) 2 5 βαn1 α 2 (1 + o(1)). (4) 3. APPROIMATION ALGORITHM This section presents a method for selecting a (sboptimal) set of k disjoint spanning trees for K c. Then, in the following section, we estimate the expected vale of the sm of the weights of the set of trees that it selects, and then se this nmber to derive an pper bond the expected optimm vale E(J(R k)). Let T 1 be an MST for K c having maximm degree less than 6. Fix a vertex v 1 V as the root, and define the level of each vertex v as the nmber of edges on the niqe path from v to v 1 in the tree T 1. (Level 0 consists of the root vertex v 1.) Let h be the maximm of the levels, and for i = 0,1, 2,..., h, let L i consists of those vertices at level i, i.e. the vertices v for which the graph distance is i. Let f : V/{v 1} V be the following sccessor fnction: f(v) = the first vertex after v on the path from v to v 1. If f (t) denotes f composed with itself t times, then the domain of f (t) is S L i. If f (t) (v) is a vertex in L j, then v is a i t vertex in L t+j. Ths {v, f (t) (v)} is an edge of K c that joins vertices whose levels differ by exactly t. We se f to define k 1 forests as follows. For t = 2,..., k, let F t consist of all edges of the form {v, f (t) (v)} where v is a vertex in level t or higher. Since the edges of F t join vertices that are separated by exactly t levels,it is clear that the k 1 forests are edgedisjoint and also share no edge with T 1. We need to modify them slightly so that they are in fact spanning trees rather than forests. For each t, let ω t be the nmber of components that the forest F t has. Let τ t,j,1 j ω t be the component trees of F t, and let V t,j be the vertex set of τ t,j. Also let ρ t,j be the root (lowest level vertex) of τ t,j. The idea will be to hook all these roots p with low level vertices in the largest of the τ t,j s. Choose tmax,jmax sch that V tmax,jmax has maximm cardinality, and let I = (t, j) : 1 j ω t and 1 t k and (t, j) (tmax,jmax). Let Z consist of those vertices of V tmax,jmax whose level is less than or eqal to 5 k. Later we will verify that Z > I. We can therefore choose a 1 1 fnction φ from I to Z. Now define T t to be the tree that is obtained from F t by adjoining the edges {ρ t,j, φ(t, j)} with 1 j ω t, and (t, j) (tmax,jmax). The validity of or constrction depended pon or assmption that I < Z. To verify this fact, begin with the following observation. For each l, there are at most 5 l vertices in level l (becase the a maximm degree of T 1 is strictly less than 6). On the other hand, each root ρ t,j is at some level less than t. Hence ω t t 1 P I = k P t=2 ω t < 5k Ths l=0 5 l < 5t 4. and I < 5 k. (5) The size of the largest component is at least as large as the average component size, so V tmax,jmax > 4n. If 5 k n ω tmax n > 25k 4 V tmax,jmax > 5 k. (6) Combining (6) and (5), we get the desired reslt: Z > I. 4. ANALYSIS Let S a k be the nion of k spanning trees that was constrcted in the previos section. Define R a k(v) = max d(, v), where the maximm is over all vertices for which {, v} is an edge of S a k. We know that R a k is feasible becase G(R a k) contains S a k. Therefore, by the definition of R k, we mst have By Lemma 1, It follows from (7) and (8) that J(R k) J(R a k). (7) J(R a k) 2W(S a k) (8) E(J(R k)) 2E(W(S a k)). (9) Ths we mst estimate the expected cost of the spanning trees that are constrcted sing method in the previos section. The choice of spanning trees in the preceding section involved three phases: The first phase, in which the MST T 1 is fond. The second phase, in which the forests F t are chosen. The third phases, in which the forests trees roots are linked to vertices in V tmax,jmax Let C 1,k, C 2,k, C 3,k respectively be the costs of the edges added in these phases. Then by (9), we have E(J(R k)) 2E(C 1,k ) + 2E(C 2,k ) + 2E(C 3,k ). (10) We already cited an estimate for the first term (see eqation 2),so or goal in this section is to prove pper bonds for the second and third terms in (10). First we estimate E(C 2,k ). Sppose c = {w, z} is an edge of F t and e = {x, y} is an edge of the MST T 1. We say c covers e, and write either c e or e c, if the niqe path in T 1 from w to z incldes the edge e. Note that every edge c in F t covers exactly t edges e of T 1. In the special case α = 1 we can se the triangle ineqality and write W(c) W(e) e c = e T 1,c e W(e) t e T 1 W(e). Then, by smming on t and then averaging, we get and then E(C 2,k ) k 2 C 2,k k 2 E(W(T 1)) = k 2 W(T 1), (11) β 1n 1/2 (1 + o(1)). (12) Unfortnately, for α > 1, the triangle ineqality does not hold and we need a crder argment. Sppose c = {w, z} is an edge of F t and that w = x 0, x 1, x 2,..., x t 1, x t = z are

4 the vertices on the path in T 1 from w to z. Since d(, ) does satisfy the triangle ineqality, we have Therefore t 1 d(w,z) d(x i, x i+1) t max d(xi, xi+1). 0 i<t i=0 d(w, z) α t α max d(xi, t 1 0 i<t xi+1)α t α d(x i, x i+1) α. As before, we have W(c) = t α e T 1,c e t α i=0 W(e) e c W(e) t α+1 e T 1 W(e). By smming on t and averaging, we get (for any α 1), E(C 2,k ) kα+2 kα+2 α E(W(T1)) = α + 2 α + 2 βαn1 2 (1 + o(1)). (13) The estimate for C 3,k can be qite crde becase only O(1) edges are added in phase three. Let M = max d(, v), where the maximm is over all edges {, v} of T 1.For each edge {r, v} that is added in phase 3, there is a path from r to v in T 1, consisting of at most 5 k + k edges of T 1. By the triangle ineqality (for d), we have d(r,v) (5 k +k)m, and conseqently Combining (5) with (14), we get W({r,v}) (5 k + k) α M α. (14) C 3,k 5 k (5 k + k) α M α. (15) From the reslts in Penrose [15]we know that, with asymptotic probability one, M < ( log n ) 2 1 n. Hence E(C 3,k ) = O(( log n n ) α 2 ) = o(n 1 α 2 ). (16) Ptting (2),(13), and (16) into (10), we get the main reslt: Theorem 4. If b > (2 + 2 α+2 kα+2 )β α, then for all sfficiently large n, E(J(R k)) < bn 1 α WORST CASE RATIO In this section, a slight modification of the preceding argments will be sed to bond the ratio J(Ra k ) of the energy J(R ) k compted by the approximation algorithm to the optimal energy. The idea is that both the nmerator and denominator are Θ(W(T 1)). For the denominator, we have (3), namely J(R k) J(R 1) 2 5 W(T1). For the nmerator, recall that where J(R a k) C 1,k + C 2,k + C 3,k (17) C 1,k = W(T 1) (18) and C 2,k k 2 W(T 1). (19) Recall from (15) that C 3,k 5 k (5 k + k) α M α. where M is the length of the longest edge of the MST T 1. Obviosly no edge of T 1 can be longer than 2, so a ridiclosly crde bond for M α is Hence M α = M α 1 M 2 α 1 M 2 α 1 W(T 1). C 3,k 5 k (5 k + k) α 2 α 1 W(T 1). (20) Define a constant B (depending on k and α, bt not on n) by B = 1 + `k k (5 k + k) α 2 α 1. 2/5 Ptting (18),(19), and (20) into (17), and then sing (3), we get Theorem 5. 1 J(Ra k ) J(R k ) < B. 6. DISCUSSION The method for selecting spanning trees in section 3 is constrctive, bt it clearly inferior to known algorithms for finding a minimm weight set of k disjoint spanning trees [6][16].I chose this method as an analytical device becase it simplified the estimation of E(Jk) = the average vale of the optimm power Jk. However, I was not able to evalate the limit lim E(J k)n α 2 1. Presmably the limit exists for n all α 1, bt even that fact has not been proved. 7. REFERENCES [1] D. Aldos and J. M. Steele. Asymptotics for Eclidean minimal spanning trees on random points. Probab. Theory Related Fields, 92(2): , [2] E. Althas, G. Calinesc, I. I. Mandoi, S. Prasad, N. Tchervenski, and A. Zelikovsky. Power efficient range assignment for symmetric connectivity in static ad hoc wireless networks. Wirel. Netw., 12(3): , [3] F. Avram and D. Bertsimas. The minimm spanning tree constant in geometrical probability and nder the independent model: a nified approach. Ann. Appl. Probab., 2(1): , [4] D. M. Blogh, M. Leoncini, G. Resta, and P. Santi. On the symmetric range assignment problem in wireless ad hoc networks. In TCS 02: Proceedings of the IFIP 17th World Compter Congress - TC1 Stream / 2nd IFIP International Conference on Theoretical Compter Science, pages 71 82, Deventer, The Netherlands, The Netherlands, Klwer, B.V. [5] G. Calinesc and P. jn Wan. Range assignment for biconnectivity and k-edge connectivity in wireless ad hoc networks. Mob. Netw. Appl., 11(2): , [6] J. Clasen and L. A. Hansen. Finding k edge-disjoint spanning trees of minimm total weight in a network: an application of matroid theory. Math. Programming Std., (13):88 101, Combinatorial optimization, II (Proc. Conf., Univ. East Anglia, Norwich, 1979).

5 [7] A. E. F. Clementi, P. Penna, and R. Silvestri. On the power assignment problem in radio networks. Mob. Netw. Appl., 9(2): , [8] B. Fchs. On the hardness of range assignment problems. Networks., 9999(9999), [9] D. Gsfield. Connectivity and edge-disjoint spanning trees. Inform. Process. Lett., 16(2):87 89, [10] M. Hajiaghayi, N. Immorlica, and V. S. Mirrokni. Power optimization in falt-tolerant topology control algorithms for wireless mlti-hop networks. In MobiCom 03: Proceedings of the 9th annal international conference on Mobile compting and networking, pages , New York, NY, USA, ACM. [11] H. Kesten and S. Lee. The central limit theorem for weighted minimal spanning trees on random points. Ann. Appl. Probab., 6(2): , [12] G. Kortsarz, V. S. Mirrokni, Z. Ntov, and E. Tsanko. Approximating minimm-power degree and connectivity problems. In LATIN, pages , [13] E. L. Lloyd, R. Li, M. V. Marathe, R. Ramanathan, and S. S. Ravi. Algorithmic aspects of topology control problems for ad hoc networks. Mob. Netw. Appl., 10(1-2):19 34, [14] C. Monma and S. Sri. Transitions in geometric minimm spanning trees. Discrete Compt. Geom., 8(3): , ACM Symposim on Comptational Geometry (North Conway, NH, 1991). [15] M. D. Penrose. The longest edge of the random minimal spanning tree. Ann. Appl. Probab., 7(2): , [16] J. Roskind and R. E. Tarjan. A note on finding minimm-cost edge-disjoint spanning trees. Math. Oper. Res., 10(4): , [17] J. M. Steele. Probability theory and combinatorial optimization, volme 69 of CBMS-NSF Regional Conference Series in Applied Mathematics. Society for Indstrial and Applied Mathematics (SIAM), Philadelphia, PA, ACM (2008) This is the athor s version of the work. It is posted here by permission of ACM for yor personal se. Not for redistribtion.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled. Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical

More information

A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem

A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem Palo Feofiloff Cristina G. Fernandes Carlos E. Ferreira José Coelho de Pina September 04 Abstract The primal-dal

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Department of Mathematics University of California, San Diego La Jolla, CA, U.S.A. fan@csd.ed Sbmitted: Feb 0, 206; Accepted: Jne 22, 206;

More information

On the tree cover number of a graph

On the tree cover number of a graph On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Abstract A basic eigenvale bond de to Alon and Boppana holds only for reglar graphs. In this paper we give a generalized Alon-Boppana bond

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical

More information

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane Filomat 3:2 (27), 376 377 https://doi.org/.2298/fil7276a Pblished by Faclty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Conditions for Approaching

More information

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions OR Spectrm 06 38:53 540 DOI 0.007/s009-06-043-5 REGULAR ARTICLE Worst-case analysis of the LPT algorithm for single processor schedling with time restrictions Oliver ran Fan Chng Ron Graham Received: Janary

More information

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization Network Coding for Mltiple Unicasts: An Approach based on Linear Optimization Danail Traskov, Niranjan Ratnakar, Desmond S. Ln, Ralf Koetter, and Mriel Médard Abstract In this paper we consider the application

More information

Characterizations of probability distributions via bivariate regression of record values

Characterizations of probability distributions via bivariate regression of record values Metrika (2008) 68:51 64 DOI 10.1007/s00184-007-0142-7 Characterizations of probability distribtions via bivariate regression of record vales George P. Yanev M. Ahsanllah M. I. Beg Received: 4 October 2006

More information

Cubic graphs have bounded slope parameter

Cubic graphs have bounded slope parameter Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one

More information

Cuckoo hashing: Further analysis

Cuckoo hashing: Further analysis Information Processing Letters 86 (2003) 215 219 www.elsevier.com/locate/ipl Cckoo hashing: Frther analysis Lc Devroye,PatMorin School of Compter Science, McGill University, 3480 University Street, Montreal,

More information

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for

More information

Information Source Detection in the SIR Model: A Sample Path Based Approach

Information Source Detection in the SIR Model: A Sample Path Based Approach Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287

More information

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev Pliska Std. Math. Blgar. 2 (211), 233 242 STUDIA MATHEMATICA BULGARICA CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES George P. Yanev We prove that the exponential

More information

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany Sbcritical bifrcation to innitely many rotating waves Arnd Scheel Institt fr Mathematik I Freie Universitat Berlin Arnimallee 2-6 14195 Berlin, Germany 1 Abstract We consider the eqation 00 + 1 r 0 k2

More information

Figure 1 Probability density function of Wedge copula for c = (best fit to Nominal skew of DRAM case study).

Figure 1 Probability density function of Wedge copula for c = (best fit to Nominal skew of DRAM case study). Wedge Copla This docment explains the constrction and properties o a particlar geometrical copla sed to it dependency data rom the edram case stdy done at Portland State University. The probability density

More information

FOUNTAIN codes [3], [4] provide an efficient solution

FOUNTAIN codes [3], [4] provide an efficient solution Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn

More information

On Multiobjective Duality For Variational Problems

On Multiobjective Duality For Variational Problems The Open Operational Research Jornal, 202, 6, -8 On Mltiobjective Dality For Variational Problems. Hsain *,, Bilal Ahmad 2 and Z. Jabeen 3 Open Access Department of Mathematics, Jaypee University of Engineering

More information

Non-Lecture I: Linear Programming. Th extremes of glory and of shame, Like east and west, become the same.

Non-Lecture I: Linear Programming. Th extremes of glory and of shame, Like east and west, become the same. The greatest flood has the soonest ebb; the sorest tempest the most sdden calm; the hottest love the coldest end; and from the deepest desire oftentimes enses the deadliest hate. Th extremes of glory and

More information

The Replenishment Policy for an Inventory System with a Fixed Ordering Cost and a Proportional Penalty Cost under Poisson Arrival Demands

The Replenishment Policy for an Inventory System with a Fixed Ordering Cost and a Proportional Penalty Cost under Poisson Arrival Demands Scientiae Mathematicae Japonicae Online, e-211, 161 167 161 The Replenishment Policy for an Inventory System with a Fixed Ordering Cost and a Proportional Penalty Cost nder Poisson Arrival Demands Hitoshi

More information

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs Upper Bonds on the Spanning Ratio of Constrained Theta-Graphs Prosenjit Bose and André van Renssen School of Compter Science, Carleton University, Ottaa, Canada. jit@scs.carleton.ca, andre@cg.scs.carleton.ca

More information

On oriented arc-coloring of subcubic graphs

On oriented arc-coloring of subcubic graphs On oriented arc-coloring of sbcbic graphs Alexandre Pinlo Alexandre.Pinlo@labri.fr LaBRI, Université Bordeax I, 351, Cors de la Libération, 33405 Talence, France Janary 17, 2006 Abstract. A homomorphism

More information

Joint Transfer of Energy and Information in a Two-hop Relay Channel

Joint Transfer of Energy and Information in a Two-hop Relay Channel Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical

More information

3.4-Miscellaneous Equations

3.4-Miscellaneous Equations .-Miscellaneos Eqations Factoring Higher Degree Polynomials: Many higher degree polynomials can be solved by factoring. Of particlar vale is the method of factoring by groping, however all types of factoring

More information

Restricted cycle factors and arc-decompositions of digraphs. J. Bang-Jensen and C. J. Casselgren

Restricted cycle factors and arc-decompositions of digraphs. J. Bang-Jensen and C. J. Casselgren Restricted cycle factors and arc-decompositions of digraphs J. Bang-Jensen and C. J. Casselgren REPORT No. 0, 0/04, spring ISSN 0-467X ISRN IML-R- -0-/4- -SE+spring Restricted cycle factors and arc-decompositions

More information

The Linear Quadratic Regulator

The Linear Quadratic Regulator 10 The Linear Qadratic Reglator 10.1 Problem formlation This chapter concerns optimal control of dynamical systems. Most of this development concerns linear models with a particlarly simple notion of optimality.

More information

Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis Functional Response and Feedback Controls

Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis Functional Response and Feedback Controls Hindawi Pblishing Corporation Discrete Dynamics in Natre and Society Volme 2008 Article ID 149267 8 pages doi:101155/2008/149267 Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis

More information

Remarks on strongly convex stochastic processes

Remarks on strongly convex stochastic processes Aeqat. Math. 86 (01), 91 98 c The Athor(s) 01. This article is pblished with open access at Springerlink.com 0001-9054/1/010091-8 pblished online November 7, 01 DOI 10.1007/s00010-01-016-9 Aeqationes Mathematicae

More information

Multi-Voltage Floorplan Design with Optimal Voltage Assignment

Multi-Voltage Floorplan Design with Optimal Voltage Assignment Mlti-Voltage Floorplan Design with Optimal Voltage Assignment ABSTRACT Qian Zaichen Department of CSE The Chinese University of Hong Kong Shatin,N.T., Hong Kong zcqian@cse.chk.ed.hk In this paper, we stdy

More information

Approximating Minimum-Power Degree and Connectivity Problems

Approximating Minimum-Power Degree and Connectivity Problems Approximating Minimum-Power Degree and Connectivity Problems Guy Kortsarz Vahab S. Mirrokni Zeev Nutov Elena Tsanko Abstract Power optimization is a central issue in wireless network design. Given a graph

More information

Chords in Graphs. Department of Mathematics Texas State University-San Marcos San Marcos, TX Haidong Wu

Chords in Graphs. Department of Mathematics Texas State University-San Marcos San Marcos, TX Haidong Wu AUSTRALASIAN JOURNAL OF COMBINATORICS Volme 32 (2005), Pages 117 124 Chords in Graphs Weizhen G Xingde Jia Department of Mathematics Texas State Uniersity-San Marcos San Marcos, TX 78666 Haidong W Department

More information

Nonlinear parametric optimization using cylindrical algebraic decomposition

Nonlinear parametric optimization using cylindrical algebraic decomposition Proceedings of the 44th IEEE Conference on Decision and Control, and the Eropean Control Conference 2005 Seville, Spain, December 12-15, 2005 TC08.5 Nonlinear parametric optimization sing cylindrical algebraic

More information

Essentials of optimal control theory in ECON 4140

Essentials of optimal control theory in ECON 4140 Essentials of optimal control theory in ECON 4140 Things yo need to know (and a detail yo need not care abot). A few words abot dynamic optimization in general. Dynamic optimization can be thoght of as

More information

MAXIMUM AND ANTI-MAXIMUM PRINCIPLES FOR THE P-LAPLACIAN WITH A NONLINEAR BOUNDARY CONDITION. 1. Introduction. ν = λ u p 2 u.

MAXIMUM AND ANTI-MAXIMUM PRINCIPLES FOR THE P-LAPLACIAN WITH A NONLINEAR BOUNDARY CONDITION. 1. Introduction. ν = λ u p 2 u. 2005-Ojda International Conference on Nonlinear Analysis. Electronic Jornal of Differential Eqations, Conference 14, 2006, pp. 95 107. ISSN: 1072-6691. URL: http://ejde.math.txstate.ed or http://ejde.math.nt.ed

More information

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation Stability of Model Predictive Control sing Markov Chain Monte Carlo Optimisation Elilini Siva, Pal Golart, Jan Maciejowski and Nikolas Kantas Abstract We apply stochastic Lyapnov theory to perform stability

More information

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE

More information

Formal Methods for Deriving Element Equations

Formal Methods for Deriving Element Equations Formal Methods for Deriving Element Eqations And the importance of Shape Fnctions Formal Methods In previos lectres we obtained a bar element s stiffness eqations sing the Direct Method to obtain eact

More information

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL 8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a

More information

Power Optimization for Connectivity Problems

Power Optimization for Connectivity Problems Mathematical Programming manuscript No. (will be inserted by the editor) Mohammad T. Hajiaghayi 1 Guy Kortsarz 2 Vahab S. Mirrokni 1 Zeev Nutov 3 Power Optimization for Connectivity Problems Abstract.

More information

When are Two Numerical Polynomials Relatively Prime?

When are Two Numerical Polynomials Relatively Prime? J Symbolic Comptation (1998) 26, 677 689 Article No sy980234 When are Two Nmerical Polynomials Relatively Prime? BERNHARD BECKERMANN AND GEORGE LABAHN Laboratoire d Analyse Nmériqe et d Optimisation, Université

More information

Math 116 First Midterm October 14, 2009

Math 116 First Midterm October 14, 2009 Math 116 First Midterm October 14, 9 Name: EXAM SOLUTIONS Instrctor: Section: 1. Do not open this exam ntil yo are told to do so.. This exam has 1 pages inclding this cover. There are 9 problems. Note

More information

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University 9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)

More information

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-

More information

arxiv: v2 [cs.ds] 17 Oct 2014

arxiv: v2 [cs.ds] 17 Oct 2014 On Uniform Capacitated k-median Beyond the Natral LP Relaxation Shi Li Toyota Technological Institte at Chicago shili@ttic.ed arxiv:1409.6739v2 [cs.ds] 17 Oct 2014 Abstract In this paper, we stdy the niform

More information

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks The Cryptanalysis of a New Pblic-Key Cryptosystem based on Modlar Knapsacks Yeow Meng Chee Antoine Jox National Compter Systems DMI-GRECC Center for Information Technology 45 re d Ulm 73 Science Park Drive,

More information

ON THE SHAPES OF BILATERAL GAMMA DENSITIES

ON THE SHAPES OF BILATERAL GAMMA DENSITIES ON THE SHAPES OF BILATERAL GAMMA DENSITIES UWE KÜCHLER, STEFAN TAPPE Abstract. We investigate the for parameter family of bilateral Gamma distribtions. The goal of this paper is to provide a thorogh treatment

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) EA Procedre for Static Analysis. Prepare the E model a. discretize (mesh) the strctre b. prescribe loads c. prescribe spports. Perform calclations

More information

The Lehmer matrix and its recursive analogue

The Lehmer matrix and its recursive analogue The Lehmer matrix and its recrsive analoge Emrah Kilic, Pantelimon Stănică TOBB Economics and Technology University, Mathematics Department 0660 Sogtoz, Ankara, Trkey; ekilic@etedtr Naval Postgradate School,

More information

RESOLUTION OF INDECOMPOSABLE INTEGRAL FLOWS ON A SIGNED GRAPH

RESOLUTION OF INDECOMPOSABLE INTEGRAL FLOWS ON A SIGNED GRAPH RESOLUTION OF INDECOMPOSABLE INTEGRAL FLOWS ON A SIGNED GRAPH BEIFANG CHEN, JUE WANG, AND THOMAS ZASLAVSKY Abstract. It is well-known that each nonnegative integral flow of a directed graph can be decomposed

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) MAE 5 - inite Element Analysis Several slides from this set are adapted from B.S. Altan, Michigan Technological University EA Procedre for

More information

Chapter 2 Difficulties associated with corners

Chapter 2 Difficulties associated with corners Chapter Difficlties associated with corners This chapter is aimed at resolving the problems revealed in Chapter, which are cased b corners and/or discontinos bondar conditions. The first section introdces

More information

A Note on Irreducible Polynomials and Identity Testing

A Note on Irreducible Polynomials and Identity Testing A Note on Irrecible Polynomials an Ientity Testing Chanan Saha Department of Compter Science an Engineering Inian Institte of Technology Kanpr Abstract We show that, given a finite fiel F q an an integer

More information

The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes

The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL 00 177 The Coset Distribtion of iple-error-correcting Binary Primitive BCH Codes Pascale Charpin, Member, IEEE, TorHelleseth, Fellow, IEEE, VictorA.

More information

The Minimal Estrada Index of Trees with Two Maximum Degree Vertices

The Minimal Estrada Index of Trees with Two Maximum Degree Vertices MATCH Commnications in Mathematical and in Compter Chemistry MATCH Commn. Math. Compt. Chem. 64 (2010) 799-810 ISSN 0340-6253 The Minimal Estrada Index of Trees with Two Maximm Degree Vertices Jing Li

More information

Model Discrimination of Polynomial Systems via Stochastic Inputs

Model Discrimination of Polynomial Systems via Stochastic Inputs Model Discrimination of Polynomial Systems via Stochastic Inpts D. Georgiev and E. Klavins Abstract Systems biologists are often faced with competing models for a given experimental system. Unfortnately,

More information

B-469 Simplified Copositive and Lagrangian Relaxations for Linearly Constrained Quadratic Optimization Problems in Continuous and Binary Variables

B-469 Simplified Copositive and Lagrangian Relaxations for Linearly Constrained Quadratic Optimization Problems in Continuous and Binary Variables B-469 Simplified Copositive and Lagrangian Relaxations for Linearly Constrained Qadratic Optimization Problems in Continos and Binary Variables Naohiko Arima, Snyong Kim and Masakaz Kojima October 2012,

More information

Vectors in Rn un. This definition of norm is an extension of the Pythagorean Theorem. Consider the vector u = (5, 8) in R 2

Vectors in Rn un. This definition of norm is an extension of the Pythagorean Theorem. Consider the vector u = (5, 8) in R 2 MATH 307 Vectors in Rn Dr. Neal, WKU Matrices of dimension 1 n can be thoght of as coordinates, or ectors, in n- dimensional space R n. We can perform special calclations on these ectors. In particlar,

More information

L 1 -smoothing for the Ornstein-Uhlenbeck semigroup

L 1 -smoothing for the Ornstein-Uhlenbeck semigroup L -smoothing for the Ornstein-Uhlenbeck semigrop K. Ball, F. Barthe, W. Bednorz, K. Oleszkiewicz and P. Wolff September, 00 Abstract Given a probability density, we estimate the rate of decay of the measre

More information

Minimum-Latency Beaconing Schedule in Multihop Wireless Networks

Minimum-Latency Beaconing Schedule in Multihop Wireless Networks This fll text paper was peer reiewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 009 proceedings Minimm-Latency Beaconing Schedle in Mltihop

More information

On relative errors of floating-point operations: optimal bounds and applications

On relative errors of floating-point operations: optimal bounds and applications On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors

More information

Prandl established a universal velocity profile for flow parallel to the bed given by

Prandl established a universal velocity profile for flow parallel to the bed given by EM 0--00 (Part VI) (g) The nderlayers shold be at least three thicknesses of the W 50 stone, bt never less than 0.3 m (Ahrens 98b). The thickness can be calclated sing Eqation VI-5-9 with a coefficient

More information

Constructive Root Bound for k-ary Rational Input Numbers

Constructive Root Bound for k-ary Rational Input Numbers Constrctive Root Bond for k-ary Rational Inpt Nmbers Sylvain Pion, Chee Yap To cite this version: Sylvain Pion, Chee Yap. Constrctive Root Bond for k-ary Rational Inpt Nmbers. 19th Annal ACM Symposim on

More information

Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS

Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS 3. System Modeling Mathematical Modeling In designing control systems we mst be able to model engineered system dynamics. The model of a dynamic system

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion rocedre (demonstrated with a -D bar element problem) MAE - inite Element Analysis Many slides from this set are originally from B.S. Altan, Michigan Technological U. EA rocedre for Static Analysis.

More information

9. Tensor product and Hom

9. Tensor product and Hom 9. Tensor prodct and Hom Starting from two R-modles we can define two other R-modles, namely M R N and Hom R (M, N), that are very mch related. The defining properties of these modles are simple, bt those

More information

BLOOM S TAXONOMY. Following Bloom s Taxonomy to Assess Students

BLOOM S TAXONOMY. Following Bloom s Taxonomy to Assess Students BLOOM S TAXONOMY Topic Following Bloom s Taonomy to Assess Stdents Smmary A handot for stdents to eplain Bloom s taonomy that is sed for item writing and test constrction to test stdents to see if they

More information

arxiv: v1 [math.co] 25 Sep 2016

arxiv: v1 [math.co] 25 Sep 2016 arxi:1609.077891 [math.co] 25 Sep 2016 Total domination polynomial of graphs from primary sbgraphs Saeid Alikhani and Nasrin Jafari September 27, 2016 Department of Mathematics, Yazd Uniersity, 89195-741,

More information

On relative errors of floating-point operations: optimal bounds and applications

On relative errors of floating-point operations: optimal bounds and applications On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors

More information

Universal Scheme for Optimal Search and Stop

Universal Scheme for Optimal Search and Stop Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated

More information

Optimal Control, Statistics and Path Planning

Optimal Control, Statistics and Path Planning PERGAMON Mathematical and Compter Modelling 33 (21) 237 253 www.elsevier.nl/locate/mcm Optimal Control, Statistics and Path Planning C. F. Martin and Shan Sn Department of Mathematics and Statistics Texas

More information

Optimization via the Hamilton-Jacobi-Bellman Method: Theory and Applications

Optimization via the Hamilton-Jacobi-Bellman Method: Theory and Applications Optimization via the Hamilton-Jacobi-Bellman Method: Theory and Applications Navin Khaneja lectre notes taken by Christiane Koch Jne 24, 29 1 Variation yields a classical Hamiltonian system Sppose that

More information

Discrete Applied Mathematics. The induced path function, monotonicity and betweenness

Discrete Applied Mathematics. The induced path function, monotonicity and betweenness Discrete Applied Mathematics 158 (2010) 426 433 Contents lists available at ScienceDirect Discrete Applied Mathematics jornal homepage: www.elsevier.com/locate/dam The indced path fnction, monotonicity

More information

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control C and U Chart presented by Dr. Eng. Abed

More information

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli 1 Introdction Discssion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen Department of Economics, University of Copenhagen and CREATES,

More information

The Heat Equation and the Li-Yau Harnack Inequality

The Heat Equation and the Li-Yau Harnack Inequality The Heat Eqation and the Li-Ya Harnack Ineqality Blake Hartley VIGRE Research Paper Abstract In this paper, we develop the necessary mathematics for nderstanding the Li-Ya Harnack ineqality. We begin with

More information

A New Approach to Direct Sequential Simulation that Accounts for the Proportional Effect: Direct Lognormal Simulation

A New Approach to Direct Sequential Simulation that Accounts for the Proportional Effect: Direct Lognormal Simulation A ew Approach to Direct eqential imlation that Acconts for the Proportional ffect: Direct ognormal imlation John Manchk, Oy eangthong and Clayton Detsch Department of Civil & nvironmental ngineering University

More information

Sensitivity Analysis in Bayesian Networks: From Single to Multiple Parameters

Sensitivity Analysis in Bayesian Networks: From Single to Multiple Parameters Sensitivity Analysis in Bayesian Networks: From Single to Mltiple Parameters Hei Chan and Adnan Darwiche Compter Science Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwiche}@cs.cla.ed

More information

4.2 First-Order Logic

4.2 First-Order Logic 64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore

More information

Section 7.4: Integration of Rational Functions by Partial Fractions

Section 7.4: Integration of Rational Functions by Partial Fractions Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to

More information

Sources of Non Stationarity in the Semivariogram

Sources of Non Stationarity in the Semivariogram Sorces of Non Stationarity in the Semivariogram Migel A. Cba and Oy Leangthong Traditional ncertainty characterization techniqes sch as Simple Kriging or Seqential Gassian Simlation rely on stationary

More information

Chem 4501 Introduction to Thermodynamics, 3 Credits Kinetics, and Statistical Mechanics. Fall Semester Homework Problem Set Number 10 Solutions

Chem 4501 Introduction to Thermodynamics, 3 Credits Kinetics, and Statistical Mechanics. Fall Semester Homework Problem Set Number 10 Solutions Chem 4501 Introdction to Thermodynamics, 3 Credits Kinetics, and Statistical Mechanics Fall Semester 2017 Homework Problem Set Nmber 10 Soltions 1. McQarrie and Simon, 10-4. Paraphrase: Apply Eler s theorem

More information

A Regulator for Continuous Sedimentation in Ideal Clarifier-Thickener Units

A Regulator for Continuous Sedimentation in Ideal Clarifier-Thickener Units A Reglator for Continos Sedimentation in Ideal Clarifier-Thickener Units STEFAN DIEHL Centre for Mathematical Sciences, Lnd University, P.O. Box, SE- Lnd, Sweden e-mail: diehl@maths.lth.se) Abstract. The

More information

THE HOHENBERG-KOHN THEOREM FOR MARKOV SEMIGROUPS

THE HOHENBERG-KOHN THEOREM FOR MARKOV SEMIGROUPS THE HOHENBERG-KOHN THEOREM FOR MARKOV SEMIGROUPS OMAR HIJAB Abstract. At the basis of mch of comptational chemistry is density fnctional theory, as initiated by the Hohenberg-Kohn theorem. The theorem

More information

Generalized Jinc functions and their application to focusing and diffraction of circular apertures

Generalized Jinc functions and their application to focusing and diffraction of circular apertures Qing Cao Vol. 20, No. 4/April 2003/J. Opt. Soc. Am. A 66 Generalized Jinc fnctions and their application to focsing and diffraction of circlar apertres Qing Cao Optische Nachrichtentechnik, FernUniversität

More information

Least-squares collocation with covariance-matching constraints

Least-squares collocation with covariance-matching constraints J Geodesy DOI 1.17/s19-7-133-5 ORIGINAL ARTICLE Least-sqares collocation with covariance-matching constraints Christopher Kotsakis Received: 18 Agst 26 / Accepted: 28 December 26 Springer-Verlag 27 Abstract

More information

Setting The K Value And Polarization Mode Of The Delta Undulator

Setting The K Value And Polarization Mode Of The Delta Undulator LCLS-TN-4- Setting The Vale And Polarization Mode Of The Delta Undlator Zachary Wolf, Heinz-Dieter Nhn SLAC September 4, 04 Abstract This note provides the details for setting the longitdinal positions

More information

A Contraction of the Lucas Polygon

A Contraction of the Lucas Polygon Western Washington University Western CEDAR Mathematics College of Science and Engineering 4 A Contraction of the Lcas Polygon Branko Ćrgs Western Washington University, brankocrgs@wwed Follow this and

More information

Discontinuous Fluctuation Distribution for Time-Dependent Problems

Discontinuous Fluctuation Distribution for Time-Dependent Problems Discontinos Flctation Distribtion for Time-Dependent Problems Matthew Hbbard School of Compting, University of Leeds, Leeds, LS2 9JT, UK meh@comp.leeds.ac.k Introdction For some years now, the flctation

More information

Workshop on Understanding and Evaluating Radioanalytical Measurement Uncertainty November 2007

Workshop on Understanding and Evaluating Radioanalytical Measurement Uncertainty November 2007 1833-3 Workshop on Understanding and Evalating Radioanalytical Measrement Uncertainty 5-16 November 007 Applied Statistics: Basic statistical terms and concepts Sabrina BARBIZZI APAT - Agenzia per la Protezione

More information

Graphs and Networks Lecture 5. PageRank. Lecturer: Daniel A. Spielman September 20, 2007

Graphs and Networks Lecture 5. PageRank. Lecturer: Daniel A. Spielman September 20, 2007 Graphs and Networks Lectre 5 PageRank Lectrer: Daniel A. Spielman September 20, 2007 5.1 Intro to PageRank PageRank, the algorithm reportedly sed by Google, assigns a nmerical rank to eery web page. More

More information

Some extensions of Alon s Nullstellensatz

Some extensions of Alon s Nullstellensatz Some extensions of Alon s Nllstellensatz arxiv:1103.4768v2 [math.co] 15 Ag 2011 Géza Kós Compter and Atomation Research Institte, Hngarian Acad. Sci; Dept. of Analysis, Eötvös Loránd Univ., Bdapest kosgeza@szta.h

More information

CRITERIA FOR TOEPLITZ OPERATORS ON THE SPHERE. Jingbo Xia

CRITERIA FOR TOEPLITZ OPERATORS ON THE SPHERE. Jingbo Xia CRITERIA FOR TOEPLITZ OPERATORS ON THE SPHERE Jingbo Xia Abstract. Let H 2 (S) be the Hardy space on the nit sphere S in C n. We show that a set of inner fnctions Λ is sfficient for the prpose of determining

More information

Sharp bounds on Zagreb indices of cacti with k pendant vertices

Sharp bounds on Zagreb indices of cacti with k pendant vertices Filomat 6:6 (0), 89 00 DOI 0.98/FIL0689L Pblished by Faclty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Sharp bonds on Zagreb indices of cacti with

More information

A Characterization of the Domain of Beta-Divergence and Its Connection to Bregman Variational Model

A Characterization of the Domain of Beta-Divergence and Its Connection to Bregman Variational Model entropy Article A Characterization of the Domain of Beta-Divergence and Its Connection to Bregman Variational Model Hyenkyn Woo School of Liberal Arts, Korea University of Technology and Edcation, Cheonan

More information

Research Article Uniqueness of Solutions to a Nonlinear Elliptic Hessian Equation

Research Article Uniqueness of Solutions to a Nonlinear Elliptic Hessian Equation Applied Mathematics Volme 2016, Article ID 4649150, 5 pages http://dx.doi.org/10.1155/2016/4649150 Research Article Uniqeness of Soltions to a Nonlinear Elliptic Hessian Eqation Siyan Li School of Mathematics

More information

RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS

RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS Athors: N.UNNIKRISHNAN NAIR Department of Statistics, Cochin University of Science Technology, Cochin, Kerala, INDIA

More information

Restricted Three-Body Problem in Different Coordinate Systems

Restricted Three-Body Problem in Different Coordinate Systems Applied Mathematics 3 949-953 http://dx.doi.org/.436/am..394 Pblished Online September (http://www.scirp.org/jornal/am) Restricted Three-Body Problem in Different Coordinate Systems II-In Sidereal Spherical

More information

A Single Species in One Spatial Dimension

A Single Species in One Spatial Dimension Lectre 6 A Single Species in One Spatial Dimension Reading: Material similar to that in this section of the corse appears in Sections 1. and 13.5 of James D. Mrray (), Mathematical Biology I: An introction,

More information