Rank Modulation with Multiplicity

Size: px
Start display at page:

Download "Rank Modulation with Multiplicity"

Transcription

1 Rak Modulatio with Multiplicity Axiao (Adrew) Jiag Computer Sciece ad Eg. Dept. Texas A&M Uiversity College Statio, TX 778 Abstract Rak modulatio is a scheme that uses the relative order of cell levels to represet data. Its applicatios iclude flash memories, phase-chage memories, etc. A extesio of rak modulatio is studied i this paper, where multiple cells ca have the same rak. We focus o the rewritig of data based o this ew scheme, ad study its basic properties. I. INTRODUCTION Rak modulatio is a scheme that uses the relative order of cell levels to represet data []. Its applicatios iclude flash memories, phase-chage memories (PCMs), etc. The cell level correspods to the cell s charge level for flash memories ad the cell s electrical resistace for PCMs, ad is a real umber. Cosider cells c, c,..., c whose levels are l, l,..., l, respectively, where l i = l j whe i = j. Let (a, a,..., a ) be a permutatio of the set {,,..., }, such that l a > l a > > l a. The for i, the cell c ai has the i-th highest level ad is said to have rak i. The rak modulatio scheme uses the raks of cells (istead of the real values of the cell levels) to represet data; amely, the iformatio bits are mapped to the permutatio (a, a,..., a ) []. Rak modulatio ca make it simpler ad more robust to program flash memory cells, where the cell levels are oly allowed to mootoically icrease durig the programmig process. For PCMs, if the cells are programmed oly through crystallizatio without the reset operatio (which ca happe for multi-level cells or rewritig codes), the same beefit ca be obtaied. It is also robust agaist asymmetric oise i cell levels, such as the charge-leakage oise of flash memories ad the log-term cell crystallizatio oise of PCMs. There has bee a umber of works studyig rak modulatio[], [], [7], [8] ad its error-correctig codes [], [], [], []. I this paper, we study a extesio of rak modulatio, where multiple cells ca have the same rak. The geeral idea is that we see cells of similar levels as havig the same rak, ad see cells of sufficietly differet levels as havig differet raks. There are aturally various ways to defie the similarity of cell levels, icludig the followig oe. Let ad δ be two parameters, where δ 0. For cells whose levels ca be ordered as l a l a l a, we require that for i <, either l ai l ai+ δ or l ai l ai+ >. The for i <, if l ai l ai+ δ, we say the cells c ai ad c ai+ have the same rak; if l ai l ai+ >, we say they have differet raks. For example, assume δ = 0., = 0., = 8 ad (l,..., l 8 ) = (0.8,.,., 0., 0.,.,.,.8). Yue Wag Computer Sciece ad Eg. Dept. Texas A&M Uiversity College Statio, TX 778 yuewag@cse.tamu.edu The (a,..., a 8 ) = (,,, 8, 7,,, ), ad (l a,..., l a8 ) = (.,.,.,.8,., 0.8, 0., 0.); so the cells c, c have rak, c, c 8, c 7 have rak, c has rak, ad c, c have rak. (We may further boud the maximum differece betwee the levels of the cells of the same rak.) Here the parameter esures the cell levels for differet raks are sufficietly apart so that they ca tolerate oise better, ad δ is chose appropriately so that the cell levels for the same rak ca be programmed successfully with high probability. Allowig cells to have the same rak ca help achieve higher storage capacity. Ad sice the gap betwee the cell levels of differet raks does ot have a specific required value i particular it is ot upper bouded the cells ca still be programmed easily without the risk of charge overshootig (as log as the cell levels of each idividual rak are programmed well.) We ca use the same low-rak-to-high-rak method to program cells as i []. Note that whe δ = = 0, as o two cells ca practically have exactly the same level, the scheme is reduced to the origial rak modulatio where every cell has a distict rak []. Let S = {(s, s,..., s k ) k ; s i {,,..., } ad s i for i k; k i= s i = {,..., }; s i s j = for i = j}. Every elemet (s, s,..., s k ) i S is a partitio of the set {,,..., }. We use (s, s,..., s k ) to deote the cells raks, where for i k, the cells with idices i s i have the rak i. (For the previous example, we have (s, s,..., s k ) = ({, }, {, 7, 8}, {}, {, }).) The data are represeted by the elemets of S. Note that the difficulty of programmig cells varies for the differet elemets of S. It is simple to program two cells ito differet raks sice we oly eed the gap betwee their levels to be sufficietly large; but it is more challegig to program cells ito the same rak because their levels eed to be similar. The more cells share the same rak, the more difficult it is to program them. I the followig, we cosider oly the elemets of S where every rak accommodates at most λ cells; that is, let S,λ = {(s, s,..., s k ) S i, s i λ}, ad we use oly the elemets of S,λ to represet data. The parameter λ determies the tradeoff betwee the complexity of cell programmig ad the storage capacity. We call the scheme rak modulatio with multiplicity λ. I this paper, we focus o the rewritig of data based o the ew rak modulatio scheme. We study its basic properties, icludig the rewritig cost, optimal ways to chage rak-

2 S, λ λ= λ= λ= λ= Fig.. The value of S,λ for λ =,,,. modulatio states, ad the expasio of rak-modulatio states give the rewritig cost. II. RANK MODULATION WITH MULTIPLICITY λ I this sectio, we defie the cocepts o rak modulatio with multiplicity λ i particular those related to rewritig ad study some basic properties. A. Basic Cocepts The rak modulatio with multiplicity λ uses the elemets i S,λ, called rak-modulatio states, to represet data. Let L = {0,,..., L } deote the alphabet of the stored data. The there is a surjective map D : S,λ L, such that the rak-modulatio state s = (s, s,..., s k ) S,λ represets the data D(s) L. The umber of stored iformatio bits, log L, ca be maximized by lettig L = S,λ ; ad by lettig L < S,λ, the cost of rewritig data ca be reduced. Example. Let =, λ =. The S,λ = {({}, {}, {}), ({}, {}, {}), ({}, {}, {}), ({}, {}, {}), ({}, {}, {}), ({}, {}, {}), ({}, {, }), ({}, {, }), ({}, {, }), ({, }, {}), ({, }, {}), ({, }, {})}. So S, =. Up to log iformatio bits ca be stored. The geeral value of S,λ ca be computed by recursio: S,λ = mi{,λ} i= ( i ) S i,λ for > 0; ad S 0,λ =. We show S,λ for ad λ =,,, i Fig.. For the rewritig of data, we cosider the memory model where the cell levels ca oly icrease, ot decrease []. For flash memories, this is the way cells are programmed via charge ijectio (without the expesive block erasure operatio). For PCMs, whe the cells are programmed to oly become more ad more crystallized (without the RESET operatio), the same model ca be applied. Let us defie the basic operatio we ca use to chage the rak-modulatio state, i order to rewrite data. The basic operatio is a push operatio, where we either push a cell to a higher rak (if there are fewer tha λ cells of that rak), or push the cell to the top so that it has a higher rak tha all the other cells. More specifically, let s = (s, s,..., s k ) S,λ be a rak-modulatio state. For ay i, j such that i < j k ad s i < λ, if s j >, with a push operatio, we ca chage s to (s,..., s i {p},..., s j \ {p},..., s k ) for some p s j ; if s j =, we ca chage s to (s,..., s i {p},..., s j, s j+,..., s k ) with p beig the oly elemet i s j. Ad for ay i {,,..., k} such that s i >, we ca chage s to ({p}, s,..., s i \ {p},..., s k ) for some p s i. For ay i {,,..., k} such that s i =, we ca chage s to ({p}, s,..., s i, s i+,..., s k ) with p beig the oly elemet i s i. (Note that if λ =, the push operatio here is reduced to the push-to-top operatio for the origial rak modulatio scheme [].) For rewritig data, it is desirable to icrease the cell levels as little as possible with each rewrite, so that more rewrites ca be performed before the cell levels reach the maximum limit. (After that, the block erasure or RESET operatio will be eeded to lower the cell levels back to the miimum value.) So i this sectio, we cosider the cost of chagig the rakmodulatio state from s to s as the miimum umber of push operatios eeded to chage s to s, which we deote by d(s, s ). We call d(s, s ) the uweighted rewritig cost. (A weighted versio of the rewritig cost will be studied i the ext sectio.) It is ot hard to see that max s,s S,λ d(s, s ) =. A example of s ad s that achieve this maximum uweighted rewritig cost, d(s, s ) =, is s = ({},..., {i }, {i}, {i + },..., {}) ad s = ({},..., {i }, {i + },..., {}, {i}) for some i <. (Every cell except c i eeds to be pushed oce to chage s to s.) B. Uweighted Rewritig Cost Give two rak-modulatio states s, s S,λ, we cosider how to compute the uweighted rewritig cost d(s, s ), ad how to chage s to s with this miimum umber of push operatios. For the special case λ =, the aswer is kow []: give s = (s, s,..., s ) ad s = (s, s,..., s ), let φ : {,,..., } {,,..., } be a bijective map such that for i =,,...,, we have s i = s φ(i) ; let r be the miimum iteger i {,,..., } such that φ(r + ) < φ(r + ) < < φ(); the we have d(s, s ) = r, ad the way to chage the rakmodulatio state from s to s with r push operatios is to sequetially pushed the cells with their idices i s r, s r,..., s to the top.

3 For the case λ, we use a tool called virtual levels. Defiitio. Give a rak-modulatio state s = (s, s,..., s k ) S,λ, a realizatio of s is a vector (v, v,..., v ) N that satisfies two coditios: () i k ad j, j s i, we have v j = v j ; () i < i k, j s i ad j s i, we have v j > v j. We call v i the virtual level of the cell c i, for i =,,...,. Defiitio. Let v = (v, v,..., v ) be a realizatio of s S,λ, ad let v = (v, v,..., v ) be a realizatio of s S,λ. The Hammig distace betwee v ad v, deoted by H(v, v ), is H(v, v ) = {i i, v i = v i }. Ad we say v domiates v if two coditios are satisfied: () for i =,,...,, we have v i v i; () we have {v i i, v i max j v j} {v, v,..., v }. We deote v domiates v by v v. Lemma. Let λ. Let s, s S,λ be two rak-modulatio states, let v = (v, v,..., v ) be a realizatio of s, ad let x be a o-egative iteger. The, s ca be chaged ito s by at most x push operatios if ad oly if there exists a realizatio v = (v, v,..., v ) of s such that v v ad H(v, v ) x. Proof: First, assume that s ca be chaged ito s by y x push operatios. We will costruct a correspodig realizatio v of s as follows. Iitially, for i =,,...,, let v i = v i. The for i =,,..., y, if the i-th push operatio pushes a cell c j to the same rak as aother cell c j, the assig to v j the value of v j. Otherwise, the i-th push operatio pushes a cell c j to a rak that is higher tha all the other cells; i this case, let z = max b v b, ad we assig to v j the value z +. The, let v = (v, v,..., v ). It is simple to see that v is a realizatio of s ad v v. Sice at most y cells are pushed, at least y cells have the same virtual levels i v ad v ; so we have H(v, v ) y x. Now cosider the other directio. Assume that there exists a realizatio v = (v, v,..., v ) of s such that v v ad H(v, v ) x. We will show how to chage s to s with H(v, v ) push operatios. We first partitio {v, v,..., v } ito two subsets A ad B as follows: A = {v i i, v i > max j v j}; B = {v i i, v i max j v j}. Sice v v, we kow that B {v, v,..., v }. Here B is the set of virtual levels that are retaied whe we chage s ito s, ad A is the set of virtual levels i v that are higher tha ay virtual level i v. For coveiece, we shall deote A as A = {a, a,..., a A } such that a < a < < a A, ad deote B as B = (b, b,..., b B ) such that b > b > > b B. We chage the rak-modulatio state from s to s as follows. Iitially, for i =,,...,, let the cell c i have the virtual level v i. We will push the cells to higher virtual levels, ad the rakmodulatio state which is determied by the virtual levels of the cells will chage accordigly. We push the cells usig the followig two steps: ) For i =,,..., A, push the cells i {c j j, v j = a i} to the virtual level a i. ) For i =,,..., B, push the cells i {c j j, v j < v j = b i} to the virtual level b i. Durig the above two steps, we will use the followig method to make sure that for i =,,..., B, there is always at least oe cell of the virtual level b i : Whe we are to push a cell c i from the virtual level j B to j > j, if c i is the oly cell of virtual level j at that momet, the before pushig c i, we first push a cell i {c z z, v z = j } to the virtual level j. (Note that if that cell is also the oly cell of its ow virtual level at that momet, the the same rule applies. So there ca be a chai reactio of cell pushig of this type. But this chai reactio will stop somewhere because the virtual level of the cocered cell keeps decreasig.) I the above process, we push every cell at most oce. Whe the above process eds, the cells have virtual levels (v, v,..., v ), which is a realizatio of s. A cell c i ( i ) is pushed if ad oly if v i = v i ; ad if it is pushed, it is pushed directly to the virtual level v i. So the umber of push operatios equals H(v, v ). We ow show that these H(v, v ) push operatios are all valid operatios for the rak-modulatio states. Step ) cosists of the push-totop operatios, ad we sequetially push the cells to higher ad higher raks; clearly, the umber of cells at the virtual level a i (for i A ) is ever more tha λ at ay momet. Step ) cosists of the operatios that push a cell to a higher ad existig rak; ad sice we process the virtual levels b, b,..., b B sequetially (from high to low), whe we process the virtual level b i (for i B ), all the cells that are origially at level b i have already bee pushed up; so as we push cells from below ito the level b i, there will be o more tha λ cells i that level. So we have chaged s ito s with H(v, v ) x valid push operatios. Theorem. Let λ. Let s = (s, s,..., s k ) S,λ ad s = (s, s,..., s k ) S,λ be two rak-modulatio states,

4 let v = (v, v,..., v ) be a realizatio of s, ad defie V as V = {u u is a realizatio of s, u v}. The we have d(s, s ) = mi H(v, u). u V Furthermore, defie v = (v, v,..., v ) as follows: ) Let h k = max j s k v j. i s k, let v i = h k. ) For i = k, k,...,, do: If max j s i v j > h i +, the let h i = max j s i v j ; if max j s i v j h i + < max j v j, the let h i = mi{v j j, v j > h i +}; if max j s i v j h i + ad h i + max j v j, the let h i = h i + +. i s i, let v i = h i. The we have v V ad H(v, v ) = mi u V H(v, u). Proof: Lemma leads to d(s, s ) = mi u V H(v, u). Whe we assig values to (v, v,..., v ) (which are virtual levels for the cells correspodig to the rak-modulatio state s ), we are sequetially assigig virtual levels to the cells with idices i s k, s k,..., s ; ad for i = k, k,...,, we give the cells with idices i s i a virtual level that is as small as possible, as log as the coditio v V is satisfied. A proof by iductio ca show that compared to all the realizatios of s i V, here each h i ( i k ) ad therefore each virtual level v i ( i ) is idividually miimized, ad a cell is pushed oly whe ecessary. (Sice the cells are pushed oly upward, miimizig h i is a greedy ad optimal approach for miimizig h i, h i,..., h ad for miimizig the umber of cells that eed to be pushed.) So H(v, v ) = mi u V H(v, u). Theorem shows how to fid the realizatio v for s such that v domiates v (the realizatio of s) ad H(v, v ) = d(s, s ). The proof of Lemma shows give such a realizatio v, how to chage the rak-modulatio state from s to s with d(s, s ) push operatios. By combiig them, we ca ot oly compute d(s, s ), but also trasform s to s with the miimum uweighted rewritig cost. For simplicity, we skip the presetatio of the algorithm. We show a example below. Example. Suppose λ =, = 8, s = ({, }, {7}, {, }, {, 8}, {}), s = ({, }, {}, {}, {7, 8}, {, }). We let v = (,,,,,,, ) be a realizatio of s. (See Fig..) The by Theorem, we get the realizatio v = (, 7, 7,,,,, ) of s. (It ca be see that v v.) So we get d(s, s ) = H(v, v ) =. The by the steps specified i the proof of Lemma, we get the push operatios that chage s ito s. (See Fig., where the push operatios are show as arrows, ad the umbers beside arrows represet their order.) C. Sizes of Spheres For a rak-modulatio state s S,λ ad a uweighted rewritig cost r 0, we defie the sphere of uweighted radius r cetered at s as θ(s, r) {u S,λ d(s, u) = r}, Fig.. virtual level realizatio of rak modulatio state ({,},{7},{,},{,8},{}) realizatio of rak modulatio state virtual level ({,},{},{},{7,8},{,}) Chage rak-modulatio state from s to s with d(s, s ) pushes. ad defie the ball of uweighted radius r cetered at s as β(s, r) {u S,λ d(s, u) r}. Clearly, β(s, r) = r i=0 θ(s, i). Kowig the sizes of spheres ad balls is useful for aalyzig the performace of rewritig. For example, whe the states i S,λ are used to represet data of the alphabet L, if the rak-modulatio state is curretly s S,λ, for the ext rewrite, the uweighted rewritig cost i the worst case is at least mi{r r 0, β(s, r) L }. We show how to compute θ(s, r) for s S,λ ad 0 r. If λ =, we have θ(s, r) =! ( r)!! ( r+)! for r ad θ(s, 0) = []. So i the followig, we cosider λ. Fix a realizatio v = (v, v,..., v ) for s = (s, s,..., s k ) say the realizatio where the cells have virtual levels from to k ad we see that for ay s S,λ, Theorem fids a uique realizatio v = (v, v,..., v ) for s such that v v, H(v, v ) = d(s, s ) ad every virtual level v i ( i ) is miimized. So to compute θ(s, r), the umber of states i the sphere θ(s, r), we ca equivaletly compute the umber of such uique realizatios (of the states i θ(s, r)), because they have a oe to oe correspodece. Let σ,σ,...,σ κ ad X be κ + mutually disjoit sets of cells, where σ i λ for i κ ad X = x {0,,..., }. For i =,...,κ, we assig the virtual level κ + i to the cells i the set σ i. Let δ {0,,..., }, t {,,..., λ}, γ {x, x +,..., } ad tag {0, } be give parameters. Let R deote the set of realizatios (that is, assigmets of virtual levels to the x + i= κ σ i cells) that we ca chage this curret realizatio ito, give the followig costraits: ) We obtai a realizatio i R by pushig γ x cells i i= κ σ i to higher virtual levels, ad by assigig the x cells i X to the virtual levels betwee ad κ + δ. Every cell is pushed or assiged at most oce. For the realizatio i R, every virtual level has at most λ cells. ) For a realizatio i R, the maximum virtual level that has a cell is level κ + δ, ad exactly t cells are i that virtual level κ + δ. ) For a realizatio i R, if a cell i i= κ σ i is pushed to a level j {,,...,κ + δ}, or if a cell i X is assiged to a level j {,,...,κ + δ}, the for this realizatio 7

5 i R, either some cell is i the virtual level j, or j κ ad some cell i σ κ+ j is i the level j. ) If tag =, the o cell i X ca be assiged to the virtual level uless for this realizatio i R, some cell i σ κ is i the virtual level. We use f ( σ, σ,..., σ κ ; x; δ; t; γ; tag) to deote the cardiality of R. We ca see that the sphere size θ(s, r) = r λ δ=0 t= f ( s, s,..., s k ; 0; δ; t; r; 0). We show how to use recursio to compute the value of f ( σ, σ,..., σ κ ; x; δ; t; γ; tag). For simplicity, we oly itroduce the mai recursio, ad skip itroducig the values of f ( σ, σ,..., σ κ ; x; δ; t; γ; tag) for the boudary cases. (The boudary values ca be obtaied easily.) To chage the give realizatio to a realizatio i R, say that we push y cells i σ κ to the maximum virtual level k + δ, push cells i σ κ to the virtual levels,,..., k + δ, ad assig y cells i X to the virtual level. Note that oce y,, y are fixed, the umber of cells i level becomes fixed, ad we do ot eed to cosider it furthermore. So we get the recursio: If tag = 0, the let P {(y,, y ) Z 0 y < t; 0 σ κ ; 0 y mi{x, λ σ κ + y + }; either y + < σ κ or y + = σ κ ad y > 0 }, let P {(y,, y ) Z 0 y mi{t, σ κ }; = σ κ y ; y = 0}, let P {(y,, y ) Z y = t; 0 σ κ ; 0 y mi{x, λ σ κ + y + }; either y + < σ κ or y + = σ κ ad y > 0 }, ad let P {(y,, y ) Z y = t; = σ κ t 0; y = 0}. If tag =, the let P {(y,, y ) Z 0 y < t; 0 < σ κ y ; 0 y mi{x, λ σ κ + y + }}, let P {(y,, y ) Z 0 y mi{t, σ κ }; = σ κ y ; y = 0}, let P {(y,, y ) Z y = t; 0 < σ κ t; 0 y mi{x, λ σ κ + y + }}, ad let P {(y,, y ) Z y = t; = σ κ t 0; y = 0}. We have f ( σ, σ,..., σ κ ; x; δ; t; γ; tag) = (y,,y ) P y ) y ) f ( σ, σ,, σ κ ; x + y ; δ; t y ; γ y y ; 0) + (y,,y ) P y ) y ) f ( σ, σ,, σ κ ; x + ; δ; t y ; γ y ; ) + (y,,y ) P y ) y σ κ ; x + y ; δ ; z; γ y y ; 0) + (y,,y ) P y ) y σ κ ; x + ; δ ; z; γ y ; ). Give ay s S,λ ad r, the time complexity of computig the sphere size θ(s, r) usig the above recursio is O( λ ). Due to the space limitatio, we skip the proof of the followig theorem. ) z λ f ( σ, σ,, ) z λ f ( σ, σ,, Theorem 7. The above recursio correctly computes θ(s, r). III. WEIGHTED REWRITING COST We have studied the uweighted rewritig cost, where every push operatio is cosidered to have cost oe. I practice, however, the operatios ca have differet cost values: a push operatio that icreases the cell level less is more preferable tha a push operatio that icreases the cell level more. So i this sectio, we preset the defiitio of weighted rewritig cost, which measures the cost of push operatios based o how much they icrease the cell levels. As a combiatorial defiitio, we use the help of virtual levels. Let s = (s, s,..., s k ) S,λ ad s S,λ be two rak-modulatio states. Let v = (v, v,..., v ) be the uique realizatio of s such that {v, v,..., v } = {,,..., k}. Let V {u u is a realizatio of s, u v}. By the previous aalysis, we kow that a sequece of push operatios that chages the rak-modulatio state from s to s also chages the realizatio from v to some u V (ad vice versa). Virtual levels are a reasoable simplificatio of real cell levels. So we defie the weighted rewritig cost of chagig s ito s as w(s, s ) = mi (u,u,...,u ) V i= (u i v i ). Let v = (v, v,..., v ) be the uique realizatio of s that is geerated by Theorem. It has bee show that v miimizes the virtual level of every cell; so we have w(s, s ) = i= (v i v i) = mi i= (u,...,u ) V (u i v i ). Ad it is ot hard to see that max s,s S,λ w(s, s ) = ( ). Give a state s S,λ ad a iteger r 0, we ca defie the sphere of weighted radius r cetered at s as Θ(s, r) {u S,λ w(s, u) = r}. The sphere size, Θ(s, r), ca be computed with a similar recursio as the oe i the previous sectio. For simplicity we skip the details. ACKNOWLEDGMENT This work was supported i part by the NSF CAREER Award CCF-077 ad the NSF grat ECCS REFERENCES [] A. Barg ad A. Mazumdar, Codes i permutatios ad error correctio for rak modulatio, i Proc. IEEE Iteratioal Symposium o Iformatio Theory (ISIT), pp. 8-88, Jue 00. [] F. Zhag, H. Pfister ad A. Jiag, LDPC codes for rak modulatio i flash memories, i Proc. ISIT, pp. 89-8, Jue 00. [] A. Jiag, R. Mateescu, M. Schwartz ad J. Bruck, Rak modulatio for flash memories, i IEEE Trasactios o Iformatio Theory, vol., o., pp. 9-7, Jue 009. [] A. Jiag, M. Schwartz ad J. Bruck, Correctig charge-costraied errors i the rak modulatio scheme, i IEEE Trasactios o Iformatio Theory, vol., o., pp. -0, Ma00. [] M. Schwartz, Costat-weight Gray codes for local rak modulatio, i Proc. ISIT, pp , Jue 00. [] I. Tamo ad M. Schwartz, Correctig limited-magitude errors i the rak-modulatio scheme, i Proc. ITA Workshop, Feb. 00. [7] Z. Wag ad J. Bruck, Partial rak modulatio for flash memories, i Proc. ISIT, pp. 8-88, Jue 00. [8] Z. Wag, A. Jiag ad J. Bruck, O the capacity of bouded rak modulatio for flash memories, i Proc. ISIT, pp. -8, 009.

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

IP Reference guide for integer programming formulations.

IP Reference guide for integer programming formulations. IP Referece guide for iteger programmig formulatios. by James B. Orli for 15.053 ad 15.058 This documet is iteded as a compact (or relatively compact) guide to the formulatio of iteger programs. For more

More information

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ.

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ. 2 5. Weighted umber of late jobs 5.1. Release dates ad due dates: maximimizig the weight of o-time jobs Oce we add release dates, miimizig the umber of late jobs becomes a sigificatly harder problem. For

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function. MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied

More information

Optimization Methods MIT 2.098/6.255/ Final exam

Optimization Methods MIT 2.098/6.255/ Final exam Optimizatio Methods MIT 2.098/6.255/15.093 Fial exam Date Give: December 19th, 2006 P1. [30 pts] Classify the followig statemets as true or false. All aswers must be well-justified, either through a short

More information

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3 MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special

More information

The Boolean Ring of Intervals

The Boolean Ring of Intervals MATH 532 Lebesgue Measure Dr. Neal, WKU We ow shall apply the results obtaied about outer measure to the legth measure o the real lie. Throughout, our space X will be the set of real umbers R. Whe ecessary,

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Beurling Integers: Part 2

Beurling Integers: Part 2 Beurlig Itegers: Part 2 Isomorphisms Devi Platt July 11, 2015 1 Prime Factorizatio Sequeces I the last article we itroduced the Beurlig geeralized itegers, which ca be represeted as a sequece of real umbers

More information

Axioms of Measure Theory

Axioms of Measure Theory MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that

More information

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the

More information

THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS

THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS DEMETRES CHRISTOFIDES Abstract. Cosider a ivertible matrix over some field. The Gauss-Jorda elimiatio reduces this matrix to the idetity

More information

Seunghee Ye Ma 8: Week 5 Oct 28

Seunghee Ye Ma 8: Week 5 Oct 28 Week 5 Summary I Sectio, we go over the Mea Value Theorem ad its applicatios. I Sectio 2, we will recap what we have covered so far this term. Topics Page Mea Value Theorem. Applicatios of the Mea Value

More information

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece,, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet as

More information

Analysis of Algorithms. Introduction. Contents

Analysis of Algorithms. Introduction. Contents Itroductio The focus of this module is mathematical aspects of algorithms. Our mai focus is aalysis of algorithms, which meas evaluatig efficiecy of algorithms by aalytical ad mathematical methods. We

More information

Optimally Sparse SVMs

Optimally Sparse SVMs A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but

More information

CS / MCS 401 Homework 3 grader solutions

CS / MCS 401 Homework 3 grader solutions CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of

More information

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + 62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of

More information

1 Hash tables. 1.1 Implementation

1 Hash tables. 1.1 Implementation Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a

More information

Lecture XVI - Lifting of paths and homotopies

Lecture XVI - Lifting of paths and homotopies Lecture XVI - Liftig of paths ad homotopies I the last lecture we discussed the liftig problem ad proved that the lift if it exists is uiquely determied by its value at oe poit. I this lecture we shall

More information

Lecture 1: Basic problems of coding theory

Lecture 1: Basic problems of coding theory Lecture 1: Basic problems of codig theory Error-Correctig Codes (Sprig 016) Rutgers Uiversity Swastik Kopparty Scribes: Abhishek Bhrushudi & Aditya Potukuchi Admiistrivia was discussed at the begiig of

More information

Best Optimal Stable Matching

Best Optimal Stable Matching Applied Mathematical Scieces, Vol., 0, o. 7, 7-7 Best Optimal Stable Matchig T. Ramachadra Departmet of Mathematics Govermet Arts College(Autoomous) Karur-6900, Tamiladu, Idia yasrams@gmail.com K. Velusamy

More information

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet

More information

# fixed points of g. Tree to string. Repeatedly select the leaf with the smallest label, write down the label of its neighbour and remove the leaf.

# fixed points of g. Tree to string. Repeatedly select the leaf with the smallest label, write down the label of its neighbour and remove the leaf. Combiatorics Graph Theory Coutig labelled ad ulabelled graphs There are 2 ( 2) labelled graphs of order. The ulabelled graphs of order correspod to orbits of the actio of S o the set of labelled graphs.

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

RADICAL EXPRESSION. If a and x are real numbers and n is a positive integer, then x is an. n th root theorems: Example 1 Simplify

RADICAL EXPRESSION. If a and x are real numbers and n is a positive integer, then x is an. n th root theorems: Example 1 Simplify Example 1 Simplify 1.2A Radical Operatios a) 4 2 b) 16 1 2 c) 16 d) 2 e) 8 1 f) 8 What is the relatioship betwee a, b, c? What is the relatioship betwee d, e, f? If x = a, the x = = th root theorems: RADICAL

More information

Classification of problem & problem solving strategies. classification of time complexities (linear, logarithmic etc)

Classification of problem & problem solving strategies. classification of time complexities (linear, logarithmic etc) Classificatio of problem & problem solvig strategies classificatio of time complexities (liear, arithmic etc) Problem subdivisio Divide ad Coquer strategy. Asymptotic otatios, lower boud ad upper boud:

More information

18.657: Mathematics of Machine Learning

18.657: Mathematics of Machine Learning 8.657: Mathematics of Machie Learig Lecturer: Philippe Rigollet Lecture 0 Scribe: Ade Forrow Oct. 3, 05 Recall the followig defiitios from last time: Defiitio: A fuctio K : X X R is called a positive symmetric

More information

4.3 Growth Rates of Solutions to Recurrences

4.3 Growth Rates of Solutions to Recurrences 4.3. GROWTH RATES OF SOLUTIONS TO RECURRENCES 81 4.3 Growth Rates of Solutios to Recurreces 4.3.1 Divide ad Coquer Algorithms Oe of the most basic ad powerful algorithmic techiques is divide ad coquer.

More information

Math 155 (Lecture 3)

Math 155 (Lecture 3) Math 55 (Lecture 3) September 8, I this lecture, we ll cosider the aswer to oe of the most basic coutig problems i combiatorics Questio How may ways are there to choose a -elemet subset of the set {,,,

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution EEL5: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we begi our mathematical treatmet of discrete-time s. As show i Figure, a discrete-time operates or trasforms some iput sequece x [

More information

Disjoint set (Union-Find)

Disjoint set (Union-Find) CS124 Lecture 7 Fall 2018 Disjoit set (Uio-Fid) For Kruskal s algorithm for the miimum spaig tree problem, we foud that we eeded a data structure for maitaiig a collectio of disjoit sets. That is, we eed

More information

Lecture Overview. 2 Permutations and Combinations. n(n 1) (n (k 1)) = n(n 1) (n k + 1) =

Lecture Overview. 2 Permutations and Combinations. n(n 1) (n (k 1)) = n(n 1) (n k + 1) = COMPSCI 230: Discrete Mathematics for Computer Sciece April 8, 2019 Lecturer: Debmalya Paigrahi Lecture 22 Scribe: Kevi Su 1 Overview I this lecture, we begi studyig the fudametals of coutig discrete objects.

More information

Sequences. Notation. Convergence of a Sequence

Sequences. Notation. Convergence of a Sequence Sequeces A sequece is essetially just a list. Defiitio (Sequece of Real Numbers). A sequece of real umbers is a fuctio Z (, ) R for some real umber. Do t let the descriptio of the domai cofuse you; it

More information

A NEW APPROACH TO SOLVE AN UNBALANCED ASSIGNMENT PROBLEM

A NEW APPROACH TO SOLVE AN UNBALANCED ASSIGNMENT PROBLEM A NEW APPROACH TO SOLVE AN UNBALANCED ASSIGNMENT PROBLEM *Kore B. G. Departmet Of Statistics, Balwat College, VITA - 415 311, Dist.: Sagli (M. S.). Idia *Author for Correspodece ABSTRACT I this paper I

More information

The Random Walk For Dummies

The Random Walk For Dummies The Radom Walk For Dummies Richard A Mote Abstract We look at the priciples goverig the oe-dimesioal discrete radom walk First we review five basic cocepts of probability theory The we cosider the Beroulli

More information

6.3 Testing Series With Positive Terms

6.3 Testing Series With Positive Terms 6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial

More information

Theorem: Let A n n. In this case that A does reduce to I, we search for A 1 as the solution matrix X to the matrix equation A X = I i.e.

Theorem: Let A n n. In this case that A does reduce to I, we search for A 1 as the solution matrix X to the matrix equation A X = I i.e. Theorem: Let A be a square matrix The A has a iverse matrix if ad oly if its reduced row echelo form is the idetity I this case the algorithm illustrated o the previous page will always yield the iverse

More information

The Growth of Functions. Theoretical Supplement

The Growth of Functions. Theoretical Supplement The Growth of Fuctios Theoretical Supplemet The Triagle Iequality The triagle iequality is a algebraic tool that is ofte useful i maipulatig absolute values of fuctios. The triagle iequality says that

More information

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014. Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the

More information

Recurrence Relations

Recurrence Relations Recurrece Relatios Aalysis of recursive algorithms, such as: it factorial (it ) { if (==0) retur ; else retur ( * factorial(-)); } Let t be the umber of multiplicatios eeded to calculate factorial(). The

More information

Pairs of disjoint q-element subsets far from each other

Pairs of disjoint q-element subsets far from each other Pairs of disjoit q-elemet subsets far from each other Hikoe Eomoto Departmet of Mathematics, Keio Uiversity 3-14-1 Hiyoshi, Kohoku-Ku, Yokohama, 223 Japa, eomoto@math.keio.ac.jp Gyula O.H. Katoa Alfréd

More information

Efficient GMM LECTURE 12 GMM II

Efficient GMM LECTURE 12 GMM II DECEMBER 1 010 LECTURE 1 II Efficiet The estimator depeds o the choice of the weight matrix A. The efficiet estimator is the oe that has the smallest asymptotic variace amog all estimators defied by differet

More information

Rank Modulation for Flash Memories

Rank Modulation for Flash Memories ISIT 008, Toroto, Caada, July 6 -, 008 Rak Modulatio for Flash Memories Axiao (Adrew) Jiag Robert Mateescu Moshe Schwartz Jehoshua Bruck Departmet of Computer Sciece Califoria Istitute of Techology Electrical

More information

Commutativity in Permutation Groups

Commutativity in Permutation Groups Commutativity i Permutatio Groups Richard Wito, PhD Abstract I the group Sym(S) of permutatios o a oempty set S, fixed poits ad trasiet poits are defied Prelimiary results o fixed ad trasiet poits are

More information

MA131 - Analysis 1. Workbook 3 Sequences II

MA131 - Analysis 1. Workbook 3 Sequences II MA3 - Aalysis Workbook 3 Sequeces II Autum 2004 Cotets 2.8 Coverget Sequeces........................ 2.9 Algebra of Limits......................... 2 2.0 Further Useful Results........................

More information

Notes #3 Sequences Limit Theorems Monotone and Subsequences Bolzano-WeierstraßTheorem Limsup & Liminf of Sequences Cauchy Sequences and Completeness

Notes #3 Sequences Limit Theorems Monotone and Subsequences Bolzano-WeierstraßTheorem Limsup & Liminf of Sequences Cauchy Sequences and Completeness Notes #3 Sequeces Limit Theorems Mootoe ad Subsequeces Bolzao-WeierstraßTheorem Limsup & Limif of Sequeces Cauchy Sequeces ad Completeess This sectio of otes focuses o some of the basics of sequeces of

More information

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer. 6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio

More information

10.6 ALTERNATING SERIES

10.6 ALTERNATING SERIES 0.6 Alteratig Series Cotemporary Calculus 0.6 ALTERNATING SERIES I the last two sectios we cosidered tests for the covergece of series whose terms were all positive. I this sectio we examie series whose

More information

Hoggatt and King [lo] defined a complete sequence of natural numbers

Hoggatt and King [lo] defined a complete sequence of natural numbers REPRESENTATIONS OF N AS A SUM OF DISTINCT ELEMENTS FROM SPECIAL SEQUENCES DAVID A. KLARNER, Uiversity of Alberta, Edmoto, Caada 1. INTRODUCTION Let a, I deote a sequece of atural umbers which satisfies

More information

4 The Sperner property.

4 The Sperner property. 4 The Sperer property. I this sectio we cosider a surprisig applicatio of certai adjacecy matrices to some problems i extremal set theory. A importat role will also be played by fiite groups. I geeral,

More information

A New Solution Method for the Finite-Horizon Discrete-Time EOQ Problem

A New Solution Method for the Finite-Horizon Discrete-Time EOQ Problem This is the Pre-Published Versio. A New Solutio Method for the Fiite-Horizo Discrete-Time EOQ Problem Chug-Lu Li Departmet of Logistics The Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog Phoe: +852-2766-7410

More information

PROBABILITY LOGIC: Part 2

PROBABILITY LOGIC: Part 2 James L Bec 2 July 2005 PROBABILITY LOGIC: Part 2 Axioms for Probability Logic Based o geeral cosideratios, we derived axioms for: Pb ( a ) = measure of the plausibility of propositio b coditioal o the

More information

Math 61CM - Solutions to homework 3

Math 61CM - Solutions to homework 3 Math 6CM - Solutios to homework 3 Cédric De Groote October 2 th, 208 Problem : Let F be a field, m 0 a fixed oegative iteger ad let V = {a 0 + a x + + a m x m a 0,, a m F} be the vector space cosistig

More information

Hashing and Amortization

Hashing and Amortization Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,

More information

End-of-Year Contest. ERHS Math Club. May 5, 2009

End-of-Year Contest. ERHS Math Club. May 5, 2009 Ed-of-Year Cotest ERHS Math Club May 5, 009 Problem 1: There are 9 cois. Oe is fake ad weighs a little less tha the others. Fid the fake coi by weighigs. Solutio: Separate the 9 cois ito 3 groups (A, B,

More information

Introduction to Optimization Techniques. How to Solve Equations

Introduction to Optimization Techniques. How to Solve Equations Itroductio to Optimizatio Techiques How to Solve Equatios Iterative Methods of Optimizatio Iterative methods of optimizatio Solutio of the oliear equatios resultig form a optimizatio problem is usually

More information

Linear Programming and the Simplex Method

Linear Programming and the Simplex Method Liear Programmig ad the Simplex ethod Abstract This article is a itroductio to Liear Programmig ad usig Simplex method for solvig LP problems i primal form. What is Liear Programmig? Liear Programmig is

More information

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects

More information

Riemann Sums y = f (x)

Riemann Sums y = f (x) Riema Sums Recall that we have previously discussed the area problem I its simplest form we ca state it this way: The Area Problem Let f be a cotiuous, o-egative fuctio o the closed iterval [a, b] Fid

More information

The Choquet Integral with Respect to Fuzzy-Valued Set Functions

The Choquet Integral with Respect to Fuzzy-Valued Set Functions The Choquet Itegral with Respect to Fuzzy-Valued Set Fuctios Weiwei Zhag Abstract The Choquet itegral with respect to real-valued oadditive set fuctios, such as siged efficiecy measures, has bee used i

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

CS 270 Algorithms. Oliver Kullmann. Growth of Functions. Divide-and- Conquer Min-Max- Problem. Tutorial. Reading from CLRS for week 2

CS 270 Algorithms. Oliver Kullmann. Growth of Functions. Divide-and- Conquer Min-Max- Problem. Tutorial. Reading from CLRS for week 2 Geeral remarks Week 2 1 Divide ad First we cosider a importat tool for the aalysis of algorithms: Big-Oh. The we itroduce a importat algorithmic paradigm:. We coclude by presetig ad aalysig two examples.

More information

LONG SNAKES IN POWERS OF THE COMPLETE GRAPH WITH AN ODD NUMBER OF VERTICES

LONG SNAKES IN POWERS OF THE COMPLETE GRAPH WITH AN ODD NUMBER OF VERTICES J Lodo Math Soc (2 50, (1994, 465 476 LONG SNAKES IN POWERS OF THE COMPLETE GRAPH WITH AN ODD NUMBER OF VERTICES Jerzy Wojciechowski Abstract I [5] Abbott ad Katchalski ask if there exists a costat c >

More information

Math 475, Problem Set #12: Answers

Math 475, Problem Set #12: Answers Math 475, Problem Set #12: Aswers A. Chapter 8, problem 12, parts (b) ad (d). (b) S # (, 2) = 2 2, sice, from amog the 2 ways of puttig elemets ito 2 distiguishable boxes, exactly 2 of them result i oe

More information

Upper bound for ropelength of pretzel knots

Upper bound for ropelength of pretzel knots Upper boud for ropelegth of pretzel kots Safiya Mora August 25, 2006 Abstract A model of the pretzel kot is described. A method for predictig the ropelegth of pretzel kots is give. A upper boud for the

More information

Notes on Snell Envelops and Examples

Notes on Snell Envelops and Examples Notes o Sell Evelops ad Examples Example (Secretary Problem): Coside a pool of N cadidates whose qualificatios are represeted by ukow umbers {a > a 2 > > a N } from best to last. They are iterviewed sequetially

More information

Nonuniform Codes for Correcting Asymmetric Errors

Nonuniform Codes for Correcting Asymmetric Errors 2011 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Nouiform Codes for Correctig Asymmetric Errors Hogchao Zhou Electrical Egieerig Departmet Califoria Istitute of Techology Pasadea, CA 91125

More information

subcaptionfont+=small,labelformat=parens,labelsep=space,skip=6pt,list=0,hypcap=0 subcaption ALGEBRAIC COMBINATORICS LECTURE 8 TUESDAY, 2/16/2016

subcaptionfont+=small,labelformat=parens,labelsep=space,skip=6pt,list=0,hypcap=0 subcaption ALGEBRAIC COMBINATORICS LECTURE 8 TUESDAY, 2/16/2016 subcaptiofot+=small,labelformat=pares,labelsep=space,skip=6pt,list=0,hypcap=0 subcaptio ALGEBRAIC COMBINATORICS LECTURE 8 TUESDAY, /6/06. Self-cojugate Partitios Recall that, give a partitio λ, we may

More information

Lesson 10: Limits and Continuity

Lesson 10: Limits and Continuity www.scimsacademy.com Lesso 10: Limits ad Cotiuity SCIMS Academy 1 Limit of a fuctio The cocept of limit of a fuctio is cetral to all other cocepts i calculus (like cotiuity, derivative, defiite itegrals

More information

1 of 7 7/16/2009 6:06 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 6. Order Statistics Defiitios Suppose agai that we have a basic radom experimet, ad that X is a real-valued radom variable

More information

HOMEWORK 2 SOLUTIONS

HOMEWORK 2 SOLUTIONS HOMEWORK SOLUTIONS CSE 55 RANDOMIZED AND APPROXIMATION ALGORITHMS 1. Questio 1. a) The larger the value of k is, the smaller the expected umber of days util we get all the coupos we eed. I fact if = k

More information

NEW FAST CONVERGENT SEQUENCES OF EULER-MASCHERONI TYPE

NEW FAST CONVERGENT SEQUENCES OF EULER-MASCHERONI TYPE UPB Sci Bull, Series A, Vol 79, Iss, 207 ISSN 22-7027 NEW FAST CONVERGENT SEQUENCES OF EULER-MASCHERONI TYPE Gabriel Bercu We itroduce two ew sequeces of Euler-Mascheroi type which have fast covergece

More information

3.2 Properties of Division 3.3 Zeros of Polynomials 3.4 Complex and Rational Zeros of Polynomials

3.2 Properties of Division 3.3 Zeros of Polynomials 3.4 Complex and Rational Zeros of Polynomials Math 60 www.timetodare.com 3. Properties of Divisio 3.3 Zeros of Polyomials 3.4 Complex ad Ratioal Zeros of Polyomials I these sectios we will study polyomials algebraically. Most of our work will be cocered

More information

Estimation for Complete Data

Estimation for Complete Data Estimatio for Complete Data complete data: there is o loss of iformatio durig study. complete idividual complete data= grouped data A complete idividual data is the oe i which the complete iformatio of

More information

Pb ( a ) = measure of the plausibility of proposition b conditional on the information stated in proposition a. & then using P2

Pb ( a ) = measure of the plausibility of proposition b conditional on the information stated in proposition a. & then using P2 Axioms for Probability Logic Pb ( a ) = measure of the plausibility of propositio b coditioal o the iformatio stated i propositio a For propositios a, b ad c: P: Pb ( a) 0 P2: Pb ( a& b ) = P3: Pb ( a)

More information

Section 1.1. Calculus: Areas And Tangents. Difference Equations to Differential Equations

Section 1.1. Calculus: Areas And Tangents. Difference Equations to Differential Equations Differece Equatios to Differetial Equatios Sectio. Calculus: Areas Ad Tagets The study of calculus begis with questios about chage. What happes to the velocity of a swigig pedulum as its positio chages?

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

Lecture Notes for Analysis Class

Lecture Notes for Analysis Class Lecture Notes for Aalysis Class Topological Spaces A topology for a set X is a collectio T of subsets of X such that: (a) X ad the empty set are i T (b) Uios of elemets of T are i T (c) Fiite itersectios

More information

Lecture 2. The Lovász Local Lemma

Lecture 2. The Lovász Local Lemma Staford Uiversity Sprig 208 Math 233A: No-costructive methods i combiatorics Istructor: Ja Vodrák Lecture date: Jauary 0, 208 Origial scribe: Apoorva Khare Lecture 2. The Lovász Local Lemma 2. Itroductio

More information

Advanced Stochastic Processes.

Advanced Stochastic Processes. Advaced Stochastic Processes. David Gamarik LECTURE 2 Radom variables ad measurable fuctios. Strog Law of Large Numbers (SLLN). Scary stuff cotiued... Outlie of Lecture Radom variables ad measurable fuctios.

More information

Weakly Connected Closed Geodetic Numbers of Graphs

Weakly Connected Closed Geodetic Numbers of Graphs Iteratioal Joural of Mathematical Aalysis Vol 10, 016, o 6, 57-70 HIKARI Ltd, wwwm-hikaricom http://dxdoiorg/101988/ijma01651193 Weakly Coected Closed Geodetic Numbers of Graphs Rachel M Pataga 1, Imelda

More information

Exponents. Learning Objectives. Pre-Activity

Exponents. Learning Objectives. Pre-Activity Sectio. Pre-Activity Preparatio Epoets A Chai Letter Chai letters are geerated every day. If you sed a chai letter to three frieds ad they each sed it o to three frieds, who each sed it o to three frieds,

More information

MA131 - Analysis 1. Workbook 9 Series III

MA131 - Analysis 1. Workbook 9 Series III MA3 - Aalysis Workbook 9 Series III Autum 004 Cotets 4.4 Series with Positive ad Negative Terms.............. 4.5 Alteratig Series.......................... 4.6 Geeral Series.............................

More information

MA131 - Analysis 1. Workbook 2 Sequences I

MA131 - Analysis 1. Workbook 2 Sequences I MA3 - Aalysis Workbook 2 Sequeces I Autum 203 Cotets 2 Sequeces I 2. Itroductio.............................. 2.2 Icreasig ad Decreasig Sequeces................ 2 2.3 Bouded Sequeces..........................

More information

Simple Polygons of Maximum Perimeter Contained in a Unit Disk

Simple Polygons of Maximum Perimeter Contained in a Unit Disk Discrete Comput Geom (009) 1: 08 15 DOI 10.1007/s005-008-9093-7 Simple Polygos of Maximum Perimeter Cotaied i a Uit Disk Charles Audet Pierre Hase Frédéric Messie Received: 18 September 007 / Revised:

More information

Lecture 11: Channel Coding Theorem: Converse Part

Lecture 11: Channel Coding Theorem: Converse Part EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig

More information

FLOOR AND ROOF FUNCTION ANALOGS OF THE BELL NUMBERS. H. W. Gould Department of Mathematics, West Virginia University, Morgantown, WV 26506, USA

FLOOR AND ROOF FUNCTION ANALOGS OF THE BELL NUMBERS. H. W. Gould Department of Mathematics, West Virginia University, Morgantown, WV 26506, USA INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 7 (2007), #A58 FLOOR AND ROOF FUNCTION ANALOGS OF THE BELL NUMBERS H. W. Gould Departmet of Mathematics, West Virgiia Uiversity, Morgatow, WV

More information

If a subset E of R contains no open interval, is it of zero measure? For instance, is the set of irrationals in [0, 1] is of measure zero?

If a subset E of R contains no open interval, is it of zero measure? For instance, is the set of irrationals in [0, 1] is of measure zero? 2 Lebesgue Measure I Chapter 1 we defied the cocept of a set of measure zero, ad we have observed that every coutable set is of measure zero. Here are some atural questios: If a subset E of R cotais a

More information

CHAPTER 10 INFINITE SEQUENCES AND SERIES

CHAPTER 10 INFINITE SEQUENCES AND SERIES CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece

More information

Confidence interval for the two-parameter exponentiated Gumbel distribution based on record values

Confidence interval for the two-parameter exponentiated Gumbel distribution based on record values Iteratioal Joural of Applied Operatioal Research Vol. 4 No. 1 pp. 61-68 Witer 2014 Joural homepage: www.ijorlu.ir Cofidece iterval for the two-parameter expoetiated Gumbel distributio based o record values

More information

6.003 Homework #3 Solutions

6.003 Homework #3 Solutions 6.00 Homework # Solutios Problems. Complex umbers a. Evaluate the real ad imagiary parts of j j. π/ Real part = Imagiary part = 0 e Euler s formula says that j = e jπ/, so jπ/ j π/ j j = e = e. Thus the

More information

The Local Harmonious Chromatic Problem

The Local Harmonious Chromatic Problem The 7th Workshop o Combiatorial Mathematics ad Computatio Theory The Local Harmoious Chromatic Problem Yue Li Wag 1,, Tsog Wuu Li ad Li Yua Wag 1 Departmet of Iformatio Maagemet, Natioal Taiwa Uiversity

More information

CHAPTER 1 SEQUENCES AND INFINITE SERIES

CHAPTER 1 SEQUENCES AND INFINITE SERIES CHAPTER SEQUENCES AND INFINITE SERIES SEQUENCES AND INFINITE SERIES (0 meetigs) Sequeces ad limit of a sequece Mootoic ad bouded sequece Ifiite series of costat terms Ifiite series of positive terms Alteratig

More information

Spectral Partitioning in the Planted Partition Model

Spectral Partitioning in the Planted Partition Model Spectral Graph Theory Lecture 21 Spectral Partitioig i the Plated Partitio Model Daiel A. Spielma November 11, 2009 21.1 Itroductio I this lecture, we will perform a crude aalysis of the performace of

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Desig ad Aalysis of Algorithms Probabilistic aalysis ad Radomized algorithms Referece: CLRS Chapter 5 Topics: Hirig problem Idicatio radom variables Radomized algorithms Huo Hogwei 1 The hirig problem

More information

6 Sample Size Calculations

6 Sample Size Calculations 6 Sample Size Calculatios Oe of the major resposibilities of a cliical trial statisticia is to aid the ivestigators i determiig the sample size required to coduct a study The most commo procedure for determiig

More information