Two-stage allocations and the double Q-function

Size: px
Start display at page:

Download "Two-stage allocations and the double Q-function"

Transcription

1 Two-stage allocations and the double Q-function Sergey Agievich National Research Center for Applied Problems of Mathematics and Informatics Belarusian State University Fr. Skorina av. 4, Minsk, Belarus Submitted: Apr 2, 2002; Accepted: Jun 10, 2002; Published: May 12, 2003 MR Subject Classifications: 05A15, 05A16, 60C05 Abstract Let m + n particles be thrown randomly, independently of each other into N cells, using the following two-stage procedure. 1. The first m particles are allocated equiprobably, that is, the probability of a particle falling into any particular cell is 1/N. Let the ith cell contain m i particles on completion. Then associate with this cell the probability a i = m i /m and withdraw the particles. 2. The other n particles are then allocated polynomially, that is, the probability of a particle falling into the ith cell is a i. Let ν = νm, N) be the number of the first particle that falls into a non-empty cell during the second stage. We give exact and asymptotic expressions for the expectation E ν. 1 Introduction Problems that deal with random allocations of particles into N cells balls into urns, pellets into boxes) are classical in discrete probability theory and combinatorial analysis see [3, 7] for details). The main results are concerned with determining the probability characteristics of i) the number µ r of cells that contain exactly r particles after allocation, ii) the number ν r,s of the first particle that falls so that some s cells contain at least r particles each, and other random variables. Equiprobable allocations are the most simple and well studied. Consider, for example, an Internet voting on the theme: Which of the N teams will win the world cup?. If voters don t know anything about the teams, then they make a choice particle) for each team cell) with equal probability 1/N. The more common model is so-called polynomial allocations. In this case, the probabilities a 1,...,a N to fall into each cell are given. For the electronic journal of combinatorics ), #R21 1

2 example, we can assume that common preferences exist and voters make a choice for the ith team with the probability a i. Pose the question: how are preferences formed in the absence of a priori information? In this paper we introduce two-stage allocations. At the first stage particles are allocated equiprobably. The number of particles that fell into a particular cell determines the probability to occupy this cell by particles at the second stage. In this model, preferences are formed after the public announcement of the preliminary voting results, i. e. the numbers m 1,...,m N of votes for each team. We can suppose that after seeing these results, influenced voters will make a choice for the ith team with the probability a i = m i /m, wherem = m m N. In the next section, using the generating function for the numbers µ r,weobtainan expectation of the random variable ν = ν 2,1 for allocations at the second stage. To illustrate our interest to the analysis of ν, take the example of cryptographic hash functions [8, chapter 9]. Let A and B be finite alphabets, B = N, andleta be a set of all finite words over A. The hash function h: A Bis applied in cryptography for data compression such that it is computationally infeasible to find a collision: two different words with the same hash value. The model of random equiprobable allocations of particles hash values of different input words) into N cells elements of B) is often used in the analysis of collision search algorithms. The collision waiting time ν is the number of the first particle that occupies non-empty cell. The difficulty of the collision search can be measured by the expectation E ν. From the asymptotic expansion for Ramanujan s Q-function [6, ] it follows that πn E ν = o1) as N. Most cryptographic hash functions have iterative structure based on the compression function σ : A B B. The input word X = X 1...X l is processed in the following way: Beginning with a fixed symbol Y 0 B, successively compute Y k = σx k,y k 1 ), k =1,...,l, and set the hash value hx) toσl, Y l ), where L is the representation of the length l by a symbol of A. To define σ, we must choose N values σl, Y ), where Y runs over B. Suppose that a value B was chosen N B times. Now, if for a random input word of length l an intermediate hash value Y l has uniform distribution on B, then a final hash value B will appear with probability N B /N, that is in general not equal to 1/N. It is clear that collision waiting time for this case is not greater on average than for the case of equiprobable allocations. Indeed, we will show that πn E ν = o1) for the two-stage procedure the random choice of σ the hashing of words with the same length. This expression follows from the asymptotic expansion for the double Q-function introduced in Section 3. the electronic journal of combinatorics ), #R21 2

3 2 Two-stage allocations Let m + n particles be thrown randomly, independently of each other into N cells, using the following two-stage procedure. 1. The first m particles are allocated equiprobably, that is, the probability of a particle falling into any particular cell is 1/N. Let the ith cell contain m i particles on completion. Then associate with this cell the probability a i = m i /m a i =0if m = 0) and withdraw the particles. 2. The next n particles are allocated polynomially, that is, the probability of a particle falling into the ith cell is a i. Let µ r N,m,n) be the number of cells that contain exactly r particles, r =r 1,...,r s ) be the vector of different non-negative integers, and x = x 1,...,x s ). Consider the generating function Φ N,r x,y,z)= k 0 m,n 0 where 0 0 =1,k =k 1,...,k s ), x k = x k x ks s N m m n x k y m z n P {µ r N,m,n) =k}, 1) m!n! and P {µ r N,m,n) =k} = P {µ ri N,m,n) =k i,i=1,...,s}. Theorem 1. The generating function 1) has the form: Φ N,r x,y,z)= expye z )+ ) N s x i 1)ψ ri y) zr i, 2) r i! where ψ r y) = m r m 0 m! ym and moreover ψ 0 y) =e y, ψ r+1 y) =yψ r y), r =0, 1,... Proof. Divide N cells into two groups of sizes N 1 and N 2 = N N 1. By the total probability theorem, P {µ r N,m,n) =k} = k 1 +k 2 =k, k i 0 m 1 +m 2 =m, m i 0 n 1 +n 2 =n, n i 0 m m 1 i=1 ) N1 N ) m1 N2 N ) m2 ) n m1 m n 1 ) n1 m2 ) n2 m P {µ r N 1,m 1,n 1 )=k 1 } P {µ r N 2,m 2,n 2 )=k 2 }, where m i /m =0ifm = 0. Multiplying both sides by N m m n x k y m z n and then summing m!n! over all k 0, m, n 0, we obtain Φ N,r x,y,z)=φ N1,rx,y,z)Φ N2,rx,y,z). the electronic journal of combinatorics ), #R21 3

4 This yields and it is enough to note that Φ 1,r x,y,z)= Φ N,r x,y,z)=φ 1,r x,y,z)) N m,n 0 m n y m z n m!n! =expye z )+ s i=1 + s x i 1) zr i m r i y m r i! m! i=1 x i 1)ψ ri y) zr i r i!. m 0 For comparison, if n particles are equiprobably allocated into N cells, then [7]: Φ N,r x,z)= ) N N n s n! xk z n P {µ r N,n) =k} = e z + x i 1) zr i. r k 0 i=1 i! n 0 Let ν = νm, N) be the number of the first particle that falls into a non-empty cell at the second stage. Theorem 2. If m 1, then the expectation E νm, N) = minm,n) n=0 m [n] N [n] m n N n, 3) where u [k] = uu 1)...u k +1) is the kth factorial power of u, u [0] =1. Proof. Obviously, P {ν = n} =0ifn>mor n>n. Therefore, E ν = and it is enough to show that for n minm, N). We have minm,n) n=1 np {ν = n} = minm,n) n=0 P {ν >n} = m[n] N [n] m n N n P {ν >n} = P {µ 0 N,m,n) =N n} = P {ν >n} m!n! N m m n [ x N n y m z n] Φ N,0 x, y, z). the electronic journal of combinatorics ), #R21 4

5 By Theorem 1, Φ N,0 x, y, z) =expye z )+x 1)e y ) N and ) N [x N n y m z n ]Φ N,0 x, y, z) =[y m z n ] expye z ) e y ) n e N n)y n ) ) n N =[y m z n y i i j z j ] e N n)y n i!j! i 0,j 1 ) ) n N =[y m iy i ] e N n)y =[y m ] n i! i 0 ) ) N N N =[y m n ] e Ny m n = n n m n)!. This implies the required result. N n ) ye y ) n e N n)y For comparison, if particles are equiprobably allocated into N cells and νn) is the number of the first particle that falls into a non-empty cell, then E νn) = N n=0 N [n] N n. In the next section we will give an asymptotic analysis of the sum in the right-hand side of 3). 3 The double Q-function For positive integers m and n define the double Q-function The ordinary Q-function Qm, n) = Qn) = minm,n) k=0 n k=1 m [k] n [k] m k n k. was studied by Ramanujan [1], Watson [10], Knuth [6]. Using the integral representation Qn)+1= e z 1+ n) z n dz, they derived the asymptotic expansion Qn) 0 n [k] n k πn π 12 2n 4 135n +... the electronic journal of combinatorics ), #R21 5

6 In [4] Ramanujan s conjecture on the remainder term of this expansion was proven using another representation: Qn) = n! n n 1 [zn ]log 1 1 tz), tz) = n 1 n n 1 n! z n = ze tz) tz) is the exponential generating function of rooted labeled trees). There exists the third representation Qn)+1= n! e nz n n [zn ] 1 z that provides the next double analog Use 4) to prove the following theorem. Qm, n) = m!n! m m n n [xm y n ] emx+ny 1 xy. 4) Theorem 3. Let m, n so that 0 <c 1 n/m c 2 <. Then πmn Qm, n) = 2m + n) mn ) + o1). 5) 3 m + n) 2 Proof. Without loss of generality, assume that n m. Consider the generating function fx, y) = e m1 x) n1 y) 1 xy = k,l 0 q kl x k y l. By 4), e ) m e ) n Qm, n) =m!n! qmn. 6) m n To obtain numbers q mn, n>1, we use the Cauchy formula q mn = 1 fx, y) dydx. 2πi) 2 x =1 Γ 1 Γ 2 x m+1 yn+1 Here for fixed x = e iθ, π θ π, the positively oriented contour Γ 1 Γ 2 in the complex plane y is given by see Fig. 1): Γ 1 =Γ 1 θ) = { y = e iθ 1 re iϕ ) π/2+δ ϕ π/2 δ }, Γ 2 =Γ 2 θ) = { y = e iϕ π ϕ π, θ + ϕ 2δ }, where r = n 2+6ε,0<ε< 1, δ =arcsin r, and the result of the summation θ + ϕ is 12 2 reduced to the interval [ π, π] by adding ±2π as needed. Note that δ<rbecause sin r r r3 6 >r r 6 > r 2 =sinδ. the electronic journal of combinatorics ), #R21 6

7 I 1 = 1 4π 2 I 2 = 1 4π 2 Figure 1: The contour Γ 1 Γ 2 The chosen integration surface in two-dimensional complex space x, y) encircles the origin and does not intersect with the surface xy =1ofpolesoffx, y). Denote I k = 1 fx, y) dydx. 2πi) 2 x =1 Γ k x m+1 yn+1 After some calculations, π π/2 δ exp nre iϕ θ) ) expg 1 θ)) dϕdθ, π π/2+δ 1 re iϕ ) n+1 where π θ,ϕ π θ+ϕ 2δ expg 2 θ, ϕ)) 1 e iθ+ϕ) dϕdθ, g 1 θ) = m1 e iθ ) miθ n1 e iθ )+niθ, g 2 θ, ϕ) = m1 e iθ ) miθ n1 e iϕ ) niϕ. Further we prove that the integral I 1 gives the main contribution to Qm, n) the first term in the right-hand side of 5)). To estimate I 1, we use the technique related the electronic journal of combinatorics ), #R21 7

8 to Laplace s method see [9] for references). Firstly, we approximate the integrand near θ = 0 by a simpler function and evaluate the contribution of the approximation. Then we show that remaining regions of integration contribute a negligible amount. We apply a similar technique to the integral I 2. The main difficulty is to estimate the contribution of a punctured neighborhood of the singularity ϕ = θ. The integration regions near this singularity contribute large in magnitude, but these contributions mostly cancel each other. The chosen integration path Γ 2 θ) allows us to control this cancellation with desired accuracy. The integral I 1.Since π/2 δ π/2+δ exp nre iϕ θ) ) 1 re iϕ ) n+1 dϕ = π/2 δ π/2+δ 1 + Onr))dϕ =π 2δ)1 + Onr)), we get I 1 = 1 π expg 1 θ))1 + On 1+6ε ))dθ. 4π π Denote θ 0 = m 1/2+ε and split the integral into two parts: θ θ 0 and θ 0 θ π. We have in the first part and g 1 θ) = m + n)θ 2 /2 im n)θ 3 /6+Omθ 4 0) expg 1 θ)) =exp m + n)1 cos θ)) < exp m1 cos θ 0 )) = Oexp mθ 2 0/3)) in the second one. So, accurate to an exponentially small term, θ0 I 1 = 1 exp m + n)θ 2 /2 im n)θ 3 /6)1 + On 1+6ε ))dθ 4π θ 0 = 1 θ0 ) exp m + n)θ 2 /2) e im n)θ3 /6 + e im n)θ3 /6 1 + On 1+6ε ))dθ 4π 0 = 1 θ0 exp m + n)θ 2 /2)2 + Om n) 2 θ 6 ))1 + On 1+6ε ))dθ 4π 0 = 1 θ0 exp m + n)θ 2 /2)1 + On 1+6ε ))dθ. 2π 0 Integrating from 0 to, weget I 1 = 1 2π π 2m + n) 1 + On 1+6ε )). 7) The integral I 2. If θ 0 θ π, then expg 2 θ, ϕ)) 1 e iθ+ϕ) r 1 expg 2 θ, ϕ)) = r 1 Oexp mθ0 2 /3)) = Oexp mθ2 0 /4)). the electronic journal of combinatorics ), #R21 8

9 Similarly, if ϕ 0 = n 1/2+2ε and ϕ 0 ϕ π, then the integrand has the order Oexp nϕ 2 0 /4)). For m and n sufficiently large we have ϕ 0 θ 0 +2δ and accurate to an exponentially small term I 2 = 1 expg 2 θ, ϕ)) dϕdθ, 4π 2 S 0 S 1 1 e iθ+ϕ) where S k = {θ, ϕ) 0 1) k θ θ 0,ϕ [ ϕ 0, θ 2δ] [ θ +2δ, ϕ 0 ]}. Expanding g 2 θ, ϕ) = mθ 2 /2 imθ 3 /6 nϕ 2 /2 inϕ 3 /6+Omθ0 4 + nϕ 4 0) and changing in S 1 directions of integration, we obtain I 2 = 1 exp mθ 2 /2 nϕ 2 /2)Jα, β)1 + On 1+8ε ))dϕdθ, 4π 2 S 0 where α = mθ 3 /6+nϕ 3 /6, β = θ + ϕ, Jα, β) = e iα eiα cos α cosα + β) + = 1 eiβ 1 e iβ 1 cos β =1+Oα 2 )+ 2α β 1 + Oα2 )+Oβ 2 )) = 1+ n3 θ2 θϕ + ϕ 2 m n)θ3 )+ 3θ + ϕ) =cosα + sin α 1 + cos β) sin β ) 1 + On 1/2+6ε )). So, 1 I 2 = 4π I m n ) 12π I On 1/2+6ε )), where I 21 = exp mθ 2 /2 nϕ 2 /2) 1+ n ) S 0 3 θ2 θϕ + ϕ 2 ) dϕdθ, I 22 = exp mθ 2 /2 nϕ 2 θ 3 /2) S 0 θ + ϕ dϕdθ. Since 1+ n 3 θ2 θϕ + ϕ 2 ) = Onθ0 2 ) for 0 θ θ 0 and ϕ [ θ 2δ, θ +2δ], we obtain θ0 ϕ0 I 21 = exp mθ 2 /2 nϕ 2 /2) 1+ n ) 0 ϕ 0 3 θ2 θϕ + ϕ 2 ) dϕdθ +4δθ 0 Onθ0) 2 = exp mθ 2 /2 nϕ 2 /2) 1+ n ) 0 3 θ2 + ϕ 2 ) dϕdθ + On 5/2+9ε ) = π 1+ 1 mn 3 + n ) + On 5/2+9ε ). 3m the electronic journal of combinatorics ), #R21 9

10 Further, I 22 = = + θ0 [ 2δ 0 ϕ 0 +θ θ0 ϕ0 0 θ0 0 [ + ϕ0 +θ 2δ 2δ ϕ0 +θ ϕ0 +θ + ϕ 0 ϕ 0 ] exp mθ 2 /2 nϕ θ) 2 /2) θ3 ϕ dϕdθ exp m + n)θ 2 /2 nϕ 2 /2) θ3 e nθϕ e nθϕ ) dϕdθ+ ϕ ] exp mθ 2 /2 nϕ θ) 2 /2) θ3 ϕ dϕdθ. The last term is exponentially small and θ 3 e nθϕ e nθϕ ) ϕ = Onθ4 0 ) for 0 θ θ 0 and ϕ [0, 2δ]. Therefore, I 22 = = θ0 ϕ exp m + n)θ 2 /2 nϕ 2 /2) θ3 e nθϕ e nθϕ ) dϕdθ +2δθ 0 Onθ0 4 ϕ ) exp m + n)θ 2 /2 nϕ 2 /2) θ3 e nθϕ e nθϕ ) dϕdθ + On 7/2+11ε ). ϕ Write the integrand as the series 2 exp m + n)θ 2 /2 nϕ 2 /2) n2k+1 θ 2k+4 ϕ 2k 2k +1)! k 0 and interchange the summation and integrations it is easy to justify). We get π n I 22 = 3+ ) k n k 2k +3) 1 m + n) 5/2 m + n 2l) ) 1 + On 7/2+11ε ). k 1 l=1 Additionally, 3+ k u k 2k +3) 1 1 ) =31 u) 1/2 + u1 u) 3/2 2l k 1 for a real u, u < 1. Thus I 22 = l=1 π n m + n) 2 3+ n ) + On 7/2+11ε ) m m and, therefore, 1 2 I 2 = 2π mn 3 + n nm n) 1 + 6m m + n) n )) 1 + On 1/2+6ε )). 8) 6m Applying the Stirling formula to 6), we have Qm, n) =2π mni 1 + I 2 )1 + On 1 )). Using here estimates 7) and 8), we obtain the result stated. the electronic journal of combinatorics ), #R21 10

11 The proof above can be easily adapted to the one-dimensional case. In this case, we obtain the first two terms of the asymptotic expansion for Qn) by estimating the integral Γ1 Γ2 e n1 y) 1 y)y n+1dy, Γ k =Γ k 0). Note that the chosen contour Γ 1 Γ 2 differs from ones used in the saddle point method [2, 9] or in the singularity analysis [5], the most useful tools for obtaining asymptotic expansions for the coefficients of generating functions. The saddle point technique cannot be applied to our generating function e n1 y) 1 y) 1 due to a small singularity at y = 1 that yields a slow decay of the corresponding integrand near its saddle point. The singularity analysis works with generating functions of the form L1 y) 1 )1 y) 1, where Lu) must be a special slowly varying at infinity function, but this does not hold in our case. Acknowledgment The author would like to thank the anonymous referees for pointing out the voting interpretation of two-stage allocations. References [1] B. C. Berndt, Ramanujan s notebooks, Part II, Springer-Verlag, Berlin, [2] N. G. debruijn, Asymptotic methods in analysis, North-Holland, Amsterdam, [3] W. Feller, An introduction to probability theory and its applications, VolumeI,3rd edition, John Wiley & Sons, Inc., New York, [4] P. Flajolet, P. Grabner, P. Kirschenhofer, and H. Prodinger, On Ramanujan s Q-function, J. Computational and Applied Mathematics ) [5] P. Flajolet, A. Odlyzko, Singularity analysis of generating functions. SIAM Journal on Discrete Math ) [6] D. E. Knuth, The art of computer programming, Vol. 1: Fundamental algorithms, Addison-Wesley, Reading, Massachusetts, [7] V. F. Kolchin, B. Sevast yanov, and V. Chistyakov, Random allocations, Wiley, New York, [8] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of applied cryptology, CRC Press, New York, the electronic journal of combinatorics ), #R21 11

12 [9] A. Odlyzko. Asymptotic enumeration methods. In R. L. Graham, M. Grötschel, and L. Lovász eds.), Handbook of Combinatorics, Vol. II, Elsevier, Amsterdam 1995) [10] G. H. Watson, Theorems stated by Ramanujan V): Approximations connected with e x, Proc. London Math. Soc ) the electronic journal of combinatorics ), #R21 12

The Number of Inversions in Permutations: A Saddle Point Approach

The Number of Inversions in Permutations: A Saddle Point Approach 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 6 (23), Article 3.2.8 The Number of Inversions in Permutations: A Saddle Point Approach Guy Louchard Département d Informatique CP 212, Boulevard du

More information

The number of inversions in permutations: A saddle point approach

The number of inversions in permutations: A saddle point approach The number of inversions in permutations: A saddle point approach Guy Louchard and Helmut Prodinger November 4, 22 Abstract Using the saddle point method, we obtain from the generating function of the

More information

Some theorems on the explicit evaluations of singular moduli 1

Some theorems on the explicit evaluations of singular moduli 1 General Mathematics Vol 17 No 1 009) 71 87 Some theorems on the explicit evaluations of singular moduli 1 K Sushan Bairy Abstract At scattered places in his notebooks Ramanujan recorded some theorems for

More information

Permutations with Inversions

Permutations with Inversions 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 4 2001, Article 01.2.4 Permutations with Inversions Barbara H. Margolius Cleveland State University Cleveland, Ohio 44115 Email address: b.margolius@csuohio.edu

More information

Counting Palindromes According to r-runs of Ones Using Generating Functions

Counting Palindromes According to r-runs of Ones Using Generating Functions 3 47 6 3 Journal of Integer Sequences, Vol. 7 (04), Article 4.6. Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University

More information

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( ) ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and

More information

Asymptotics of Integrals of. Hermite Polynomials

Asymptotics of Integrals of. Hermite Polynomials Applied Mathematical Sciences, Vol. 4, 010, no. 61, 04-056 Asymptotics of Integrals of Hermite Polynomials R. B. Paris Division of Complex Systems University of Abertay Dundee Dundee DD1 1HG, UK R.Paris@abertay.ac.uk

More information

PAijpam.eu REPEATED RANDOM ALLOCATIONS WITH INCOMPLETE INFORMATION Vladimir G. Panov 1, Julia V. Nagrebetskaya 2

PAijpam.eu REPEATED RANDOM ALLOCATIONS WITH INCOMPLETE INFORMATION Vladimir G. Panov 1, Julia V. Nagrebetskaya 2 International Journal of Pure and Applied Mathematics Volume 118 No. 4 2018, 1021-1032 ISSN: 1311-8080 printed version; ISSN: 1314-3395 on-line version url: http://www.ipam.eu doi: 10.12732/ipam.v118i4.16

More information

Math Homework 2

Math Homework 2 Math 73 Homework Due: September 8, 6 Suppose that f is holomorphic in a region Ω, ie an open connected set Prove that in any of the following cases (a) R(f) is constant; (b) I(f) is constant; (c) f is

More information

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements. Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that

More information

PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS

PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS Jörg Keller Hanno Wiese FernUniversität in Hagen LG Parallelität und VLSI 58084 Hagen, Germany joerg.keller@fernuni-hagen.de ABSTRACT Cryptographic

More information

The Number of Guillotine Partitions in d Dimensions

The Number of Guillotine Partitions in d Dimensions The Number of Guillotine Partitions in d Dimensions Eyal Ackerman Gill Barequet Ron Y. Pinter Dan Romik Abstract Guillotine partitions play an important role in many research areas and application domains,

More information

On the number of matchings of a tree.

On the number of matchings of a tree. On the number of matchings of a tree. Stephan G. Wagner Department of Mathematics, Graz University of Technology, Steyrergasse 30, A-800 Graz, Austria Abstract In a paper of Klazar, several counting examples

More information

Blind Collective Signature Protocol

Blind Collective Signature Protocol Computer Science Journal of Moldova, vol.19, no.1(55), 2011 Blind Collective Signature Protocol Nikolay A. Moldovyan Abstract Using the digital signature (DS) scheme specified by Belarusian DS standard

More information

Enumerating connected labelled graphs

Enumerating connected labelled graphs Enumerating connected labelled graphs Keith Briggs Keith.Briggs@bt.com more.btexact.com/people/briggsk2/ 2004 August 17 conn-lab-graphs.tex typeset 2004 August 17 10:40 in pdflatex on a linux system Enumerating

More information

Counting Palindromes According to r-runs of Ones Using Generating Functions

Counting Palindromes According to r-runs of Ones Using Generating Functions Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University 7602 Stellenbosch South Africa hproding@sun.ac.za Abstract

More information

arxiv: v1 [math.co] 8 Feb 2013

arxiv: v1 [math.co] 8 Feb 2013 ormal numbers and normality measure Christoph Aistleitner arxiv:302.99v [math.co] 8 Feb 203 Abstract The normality measure has been introduced by Mauduit and Sárközy in order to describe the pseudorandomness

More information

1. Introduction Interest in this project began with curiosity about the Laplace transform of the Digamma function, e as ψ(s + 1)ds,

1. Introduction Interest in this project began with curiosity about the Laplace transform of the Digamma function, e as ψ(s + 1)ds, ON THE LAPLACE TRANSFORM OF THE PSI FUNCTION M. LAWRENCE GLASSER AND DANTE MANNA Abstract. Guided by numerical experimentation, we have been able to prove that Z 8 / x x + ln dx = γ + ln) [cosx)] and to

More information

ASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS

ASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS ASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS GUY LOUCHARD ABSTRACT Using the Saddle point method and multiseries expansions we obtain from the generating function of the Eulerian

More information

PHYS 404 Lecture 1: Legendre Functions

PHYS 404 Lecture 1: Legendre Functions PHYS 404 Lecture 1: Legendre Functions Dr. Vasileios Lempesis PHYS 404 - LECTURE 1 DR. V. LEMPESIS 1 Legendre Functions physical justification Legendre functions or Legendre polynomials are the solutions

More information

On a generalization of addition chains: Addition multiplication chains

On a generalization of addition chains: Addition multiplication chains Discrete Mathematics 308 (2008) 611 616 www.elsevier.com/locate/disc On a generalization of addition chains: Addition multiplication chains Hatem M. Bahig Computer Science Division, Department of Mathematics,

More information

Lengyel's Constant Page 1 of 5

Lengyel's Constant Page 1 of 5 Lengyel's Constant Page 1 of 5 Lengyel's Constant Set Partitions and Bell Numbers Let S be a set with n elements. The set of all subsets of S has elements. By a partition of S we mean a disjoint set of

More information

Asymptotics of the Eulerian numbers revisited: a large deviation analysis

Asymptotics of the Eulerian numbers revisited: a large deviation analysis Asymptotics of the Eulerian numbers revisited: a large deviation analysis Guy Louchard November 204 Abstract Using the Saddle point method and multiseries expansions we obtain from the generating function

More information

Forty years of tree enumeration

Forty years of tree enumeration October 24, 206 Canada John Moon (Alberta) Counting labelled trees Canadian mathematical monographs What is our subject? Asymptotic enumeration or Probabilistic combinatorics? What is our subject? Asymptotic

More information

ON THE COEFFICIENTS OF AN ASYMPTOTIC EXPANSION RELATED TO SOMOS QUADRATIC RECURRENCE CONSTANT

ON THE COEFFICIENTS OF AN ASYMPTOTIC EXPANSION RELATED TO SOMOS QUADRATIC RECURRENCE CONSTANT Applicable Analysis and Discrete Mathematics available online at http://pefmath.etf.bg.ac.yu Appl. Anal. Discrete Math. x (xxxx), xxx xxx. doi:10.2298/aadmxxxxxxxx ON THE COEFFICIENTS OF AN ASYMPTOTIC

More information

Minimax Redundancy for Large Alphabets by Analytic Methods

Minimax Redundancy for Large Alphabets by Analytic Methods Minimax Redundancy for Large Alphabets by Analytic Methods Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 March 15, 2012 NSF STC Center for Science of Information CISS, Princeton 2012 Joint

More information

On the stirling expansion into negative powers of a triangular number

On the stirling expansion into negative powers of a triangular number MATHEMATICAL COMMUNICATIONS 359 Math. Commun., Vol. 5, No. 2, pp. 359-364 200) On the stirling expansion into negative powers of a triangular number Cristinel Mortici, Department of Mathematics, Valahia

More information

Growing and Destroying Catalan Stanley Trees

Growing and Destroying Catalan Stanley Trees Discrete Mathematics and Theoretical Computer Science DMTCS vol. 20:1, 2018, #11 Growing and Destroying Catalan Stanley Trees Benjamin Hackl 1 Helmut Prodinger 2 arxiv:1704.03734v3 [math.co] 26 Feb 2018

More information

MULTISECTION METHOD AND FURTHER FORMULAE FOR π. De-Yin Zheng

MULTISECTION METHOD AND FURTHER FORMULAE FOR π. De-Yin Zheng Indian J. pure appl. Math., 39(: 37-55, April 008 c Printed in India. MULTISECTION METHOD AND FURTHER FORMULAE FOR π De-Yin Zheng Department of Mathematics, Hangzhou Normal University, Hangzhou 30036,

More information

Blind Signature Protocol Based on Difficulty of. Simultaneous Solving Two Difficult Problems

Blind Signature Protocol Based on Difficulty of. Simultaneous Solving Two Difficult Problems Applied Mathematical Sciences, Vol. 6, 202, no. 39, 6903-690 Blind Signature Protocol Based on Difficulty of Simultaneous Solving Two Difficult Problems N. H. Minh, D. V. Binh 2, N. T. Giang 3 and N. A.

More information

1 Discussion on multi-valued functions

1 Discussion on multi-valued functions Week 3 notes, Math 7651 1 Discussion on multi-valued functions Log function : Note that if z is written in its polar representation: z = r e iθ, where r = z and θ = arg z, then log z log r + i θ + 2inπ

More information

ON THE TAYLOR COEFFICIENTS OF THE HURWITZ ZETA FUNCTION

ON THE TAYLOR COEFFICIENTS OF THE HURWITZ ZETA FUNCTION ON THE TAYLOR COEFFICIENTS OF THE HURWITZ ZETA FUNCTION Khristo N. Boyadzhiev Department of Mathematics, Ohio Northern University, Ada, Ohio, 45810 k-boyadzhiev@onu.edu Abstract. We find a representation

More information

New asymptotic expansion for the Γ (z) function.

New asymptotic expansion for the Γ (z) function. New asymptotic expansion for the Γ z function. Gergő Nemes Institute of Mathematics, Eötvös Loránd University 7 Budapest, Hungary September 4, 007 Published in Stan s Library, Volume II, 3 Dec 007. Link:

More information

OPSF, Random Matrices and Riemann-Hilbert problems

OPSF, Random Matrices and Riemann-Hilbert problems OPSF, Random Matrices and Riemann-Hilbert problems School on Orthogonal Polynomials in Approximation Theory and Mathematical Physics, ICMAT 23 27 October, 207 Plan of the course lecture : Orthogonal Polynomials

More information

Journal of Mathematical Analysis and Applications

Journal of Mathematical Analysis and Applications J. Math. Anal. Appl. 383 (011) 00 07 Contents lists available at ScienceDirect Journal of Mathematical Analysis and Applications www.elsevier.com/locate/jmaa Asymptotic enumeration of some RNA secondary

More information

On Ramanujan's Q-function

On Ramanujan's Q-function JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS ELSEVIER Journal of Computational and Applied Mathematics 58 (1995) 103-116 On Ramanujan's Q-function Philippe Flajolet*' a, Peter J. Grabner b, Peter Kirschenhofere,

More information

MAT389 Fall 2016, Problem Set 11

MAT389 Fall 2016, Problem Set 11 MAT389 Fall 216, Problem Set 11 Improper integrals 11.1 In each of the following cases, establish the convergence of the given integral and calculate its value. i) x 2 x 2 + 1) 2 ii) x x 2 + 1)x 2 + 2x

More information

A class of trees and its Wiener index.

A class of trees and its Wiener index. A class of trees and its Wiener index. Stephan G. Wagner Department of Mathematics Graz University of Technology Steyrergasse 3, A-81 Graz, Austria wagner@finanz.math.tu-graz.ac.at Abstract In this paper,

More information

Pacific Journal of Mathematics

Pacific Journal of Mathematics Pacific Journal of Mathematics ELLIPTIC FUNCTIONS TO THE QUINTIC BASE HENG HUAT CHAN AND ZHI-GUO LIU Volume 226 No. July 2006 PACIFIC JOURNAL OF MATHEMATICS Vol. 226, No., 2006 ELLIPTIC FUNCTIONS TO THE

More information

The Generating Functions for Pochhammer

The Generating Functions for Pochhammer The Generating Functions for Pochhammer Symbol { }, n N Aleksandar Petoević University of Novi Sad Teacher Training Faculty, Department of Mathematics Podgorička 4, 25000 Sombor SERBIA and MONTENEGRO Email

More information

Pollard s Rho Algorithm for Elliptic Curves

Pollard s Rho Algorithm for Elliptic Curves November 30, 2015 Consider the elliptic curve E over F 2 k, where E = n. Assume we want to solve the elliptic curve discrete logarithm problem: find k in Q = kp. Partition E into S 1 S 2 S 3, where the

More information

MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS

MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS ABDUL HASSEN AND HIEU D. NGUYEN Abstract. This paper investigates a generalization the classical Hurwitz zeta function. It is shown that many of the properties

More information

Almost all trees have an even number of independent sets

Almost all trees have an even number of independent sets Almost all trees have an even number of independent sets Stephan G. Wagner Department of Mathematical Sciences Stellenbosch University Private Bag X1, Matieland 7602, South Africa swagner@sun.ac.za Submitted:

More information

An identity of Andrews and the Askey-Wilson integral

An identity of Andrews and the Askey-Wilson integral Ramanujan J DOI 0.007/s39-008-922-4 An identity of Andrews and the Askey-Wilson integral Zhi-Guo Liu Received: 6 July 2007 / Accepted: 7 January 2008 Springer Science+Business Media, LLC 2008 Abstract

More information

COMPLEXITY IN COOPERATIVE GAME THEORY

COMPLEXITY IN COOPERATIVE GAME THEORY COMPLEXITY IN COOPERATIVE GAME THEORY J. M. Bilbao 1,J.R.Fernández 2 andj.j.lópez 3 Matemática Aplicada II, Escuela Superior de Ingenieros Camino de los Descubrimientos s/n, 41092 Sevilla, Spain http://www.esi.us.es/~mbilbao/

More information

A REMARK ON THE BOROS-MOLL SEQUENCE

A REMARK ON THE BOROS-MOLL SEQUENCE #A49 INTEGERS 11 (2011) A REMARK ON THE BOROS-MOLL SEQUENCE J.-P. Allouche CNRS, Institut de Math., Équipe Combinatoire et Optimisation Université Pierre et Marie Curie, Paris, France allouche@math.jussieu.fr

More information

The Asymptotic Hadamard Conjecture

The Asymptotic Hadamard Conjecture p. 1/4 The Asymptotic Hadamard Conjecture Rod Canfield erc@cs.uga.edu Department of Computer Science University of Georgia Atlanta Lecture Series in Combinatorics and Graph Theory November 13, 2010 p.

More information

2 Write down the range of values of α (real) or β (complex) for which the following integrals converge. (i) e z2 dz where {γ : z = se iα, < s < }

2 Write down the range of values of α (real) or β (complex) for which the following integrals converge. (i) e z2 dz where {γ : z = se iα, < s < } Mathematical Tripos Part II Michaelmas term 2007 Further Complex Methods, Examples sheet Dr S.T.C. Siklos Comments and corrections: e-mail to stcs@cam. Sheet with commentary available for supervisors.

More information

Growth of Solutions of Second Order Complex Linear Differential Equations with Entire Coefficients

Growth of Solutions of Second Order Complex Linear Differential Equations with Entire Coefficients Filomat 32: (208), 275 284 https://doi.org/0.2298/fil80275l Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Growth of Solutions

More information

The Moments of the Profile in Random Binary Digital Trees

The Moments of the Profile in Random Binary Digital Trees Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International

More information

ON POLYNOMIAL REPRESENTATION FUNCTIONS FOR MULTILINEAR FORMS. 1. Introduction

ON POLYNOMIAL REPRESENTATION FUNCTIONS FOR MULTILINEAR FORMS. 1. Introduction ON POLYNOMIAL REPRESENTATION FUNCTIONS FOR MULTILINEAR FORMS JUANJO RUÉ In Memoriam of Yahya Ould Hamidoune. Abstract. Given an infinite sequence of positive integers A, we prove that for every nonnegative

More information

Counting k-marked Durfee Symbols

Counting k-marked Durfee Symbols Counting k-marked Durfee Symbols Kağan Kurşungöz Department of Mathematics The Pennsylvania State University University Park PA 602 kursun@math.psu.edu Submitted: May 7 200; Accepted: Feb 5 20; Published:

More information

(x 1, y 1 ) = (x 2, y 2 ) if and only if x 1 = x 2 and y 1 = y 2.

(x 1, y 1 ) = (x 2, y 2 ) if and only if x 1 = x 2 and y 1 = y 2. 1. Complex numbers A complex number z is defined as an ordered pair z = (x, y), where x and y are a pair of real numbers. In usual notation, we write z = x + iy, where i is a symbol. The operations of

More information

MTH4101 CALCULUS II REVISION NOTES. 1. COMPLEX NUMBERS (Thomas Appendix 7 + lecture notes) ax 2 + bx + c = 0. x = b ± b 2 4ac 2a. i = 1.

MTH4101 CALCULUS II REVISION NOTES. 1. COMPLEX NUMBERS (Thomas Appendix 7 + lecture notes) ax 2 + bx + c = 0. x = b ± b 2 4ac 2a. i = 1. MTH4101 CALCULUS II REVISION NOTES 1. COMPLEX NUMBERS (Thomas Appendix 7 + lecture notes) 1.1 Introduction Types of numbers (natural, integers, rationals, reals) The need to solve quadratic equations:

More information

Computers and Mathematics with Applications

Computers and Mathematics with Applications Computers and Mathematics with Applications 61 (2011) 1261 1265 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: wwwelseviercom/locate/camwa Cryptanalysis

More information

NON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION

NON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION NON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION William D. Banks 1, Frances Griffin 2, Daniel Lieman 3, Igor E. Shparlinski 4 1 Department of Mathematics, University of Missouri Columbia,

More information

Here are brief notes about topics covered in class on complex numbers, focusing on what is not covered in the textbook.

Here are brief notes about topics covered in class on complex numbers, focusing on what is not covered in the textbook. Phys374, Spring 2008, Prof. Ted Jacobson Department of Physics, University of Maryland Complex numbers version 5/21/08 Here are brief notes about topics covered in class on complex numbers, focusing on

More information

IDENTITIES INVOLVING BERNOULLI NUMBERS RELATED TO SUMS OF POWERS OF INTEGERS

IDENTITIES INVOLVING BERNOULLI NUMBERS RELATED TO SUMS OF POWERS OF INTEGERS IDENTITIES INVOLVING ERNOULLI NUMERS RELATED TO SUMS OF POWERS OF INTEGERS PIERLUIGI MAGLI Abstract. Pointing out the relations between integer power s sums and ernoulli and Genocchi polynomials, several

More information

On solving sparse algebraic equations over finite

On solving sparse algebraic equations over finite On solving sparse algebraic equations over finite fields II Igor Semaev Department of Informatics, University of Bergen, Norway Abstract. A system of algebraic equations over a finite field is called sparse

More information

The q-exponential generating function for permutations by consecutive patterns and inversions

The q-exponential generating function for permutations by consecutive patterns and inversions The q-exponential generating function for permutations by consecutive patterns and inversions Don Rawlings Abstract The inverse of Fedou s insertion-shift bijection is used to deduce a general form for

More information

Considering our result for the sum and product of analytic functions, this means that for (a 0, a 1,..., a N ) C N+1, the polynomial.

Considering our result for the sum and product of analytic functions, this means that for (a 0, a 1,..., a N ) C N+1, the polynomial. Lecture 3 Usual complex functions MATH-GA 245.00 Complex Variables Polynomials. Construction f : z z is analytic on all of C since its real and imaginary parts satisfy the Cauchy-Riemann relations and

More information

1. The COMPLEX PLANE AND ELEMENTARY FUNCTIONS: Complex numbers; stereographic projection; simple and multiple connectivity, elementary functions.

1. The COMPLEX PLANE AND ELEMENTARY FUNCTIONS: Complex numbers; stereographic projection; simple and multiple connectivity, elementary functions. Complex Analysis Qualifying Examination 1 The COMPLEX PLANE AND ELEMENTARY FUNCTIONS: Complex numbers; stereographic projection; simple and multiple connectivity, elementary functions 2 ANALYTIC FUNCTIONS:

More information

GROWTH OF SOLUTIONS TO HIGHER ORDER LINEAR HOMOGENEOUS DIFFERENTIAL EQUATIONS IN ANGULAR DOMAINS

GROWTH OF SOLUTIONS TO HIGHER ORDER LINEAR HOMOGENEOUS DIFFERENTIAL EQUATIONS IN ANGULAR DOMAINS Electronic Journal of Differential Equations, Vol 200(200), No 64, pp 7 ISSN: 072-669 URL: http://ejdemathtxstateedu or http://ejdemathuntedu ftp ejdemathtxstateedu GROWTH OF SOLUTIONS TO HIGHER ORDER

More information

On the discrepancy of circular sequences of reals

On the discrepancy of circular sequences of reals On the discrepancy of circular sequences of reals Fan Chung Ron Graham Abstract In this paper we study a refined measure of the discrepancy of sequences of real numbers in [0, ] on a circle C of circumference.

More information

Book announcements. Sukumar Das Adhikari ASPECTS OF COMBINATORICS AND COMBINATORIAL NUMBER THEORY CRC Press, Florida, 2002, 156pp.

Book announcements. Sukumar Das Adhikari ASPECTS OF COMBINATORICS AND COMBINATORIAL NUMBER THEORY CRC Press, Florida, 2002, 156pp. Discrete Mathematics 263 (2003) 347 352 www.elsevier.com/locate/disc Book announcements Sukumar Das Adhikari ASPECTS OF COMBINATORICS AND COMBINATORIAL NUMBER THEORY CRC Press, Florida, 2002, 156pp. Notations

More information

APPLICATION OF SOMMERFELD - WATSON TRANSFORMATION TO AN ELECTROSTATICS PROBLEM*

APPLICATION OF SOMMERFELD - WATSON TRANSFORMATION TO AN ELECTROSTATICS PROBLEM* SLAC -PUB-533 December 19 68 (MISC) APPLICATION OF SOMMERFELD - WATSON TRANSFORMATION TO AN ELECTROSTATICS PROBLEM* Jon Pumplin Stanford Linear Accelerator Center Stanford University, Stanford, California

More information

Higher order asymptotics from multivariate generating functions

Higher order asymptotics from multivariate generating functions Higher order asymptotics from multivariate generating functions Mark C. Wilson, University of Auckland (joint with Robin Pemantle, Alex Raichev) Rutgers, 2009-11-19 Outline Preliminaries References Our

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

A Note about the Pochhammer Symbol

A Note about the Pochhammer Symbol Mathematica Moravica Vol. 12-1 (2008), 37 42 A Note about the Pochhammer Symbol Aleksandar Petoević Abstract. In this paper we give elementary proofs of the generating functions for the Pochhammer symbol

More information

MOCK THETA FUNCTIONS AND THETA FUNCTIONS. Bhaskar Srivastava

MOCK THETA FUNCTIONS AND THETA FUNCTIONS. Bhaskar Srivastava NEW ZEALAND JOURNAL OF MATHEMATICS Volume 36 (2007), 287 294 MOCK THETA FUNCTIONS AND THETA FUNCTIONS Bhaskar Srivastava (Received August 2004). Introduction In his last letter to Hardy, Ramanujan gave

More information

Second Midterm Exam Name: Practice Problems March 10, 2015

Second Midterm Exam Name: Practice Problems March 10, 2015 Math 160 1. Treibergs Second Midterm Exam Name: Practice Problems March 10, 015 1. Determine the singular points of the function and state why the function is analytic everywhere else: z 1 fz) = z + 1)z

More information

Qualification Exam: Mathematical Methods

Qualification Exam: Mathematical Methods Qualification Exam: Mathematical Methods Name:, QEID#41534189: August, 218 Qualification Exam QEID#41534189 2 1 Mathematical Methods I Problem 1. ID:MM-1-2 Solve the differential equation dy + y = sin

More information

On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves

On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves Simon R. Blacburn Department of Mathematics Royal Holloway University of London Egham, Surrey, TW20 0EX, UK s.blacburn@rhul.ac.u

More information

Yunhi Cho and Young-One Kim

Yunhi Cho and Young-One Kim Bull. Korean Math. Soc. 41 (2004), No. 1, pp. 27 43 ANALYTIC PROPERTIES OF THE LIMITS OF THE EVEN AND ODD HYPERPOWER SEQUENCES Yunhi Cho Young-One Kim Dedicated to the memory of the late professor Eulyong

More information

SPRING 2008: POLYNOMIAL IMAGES OF CIRCLES

SPRING 2008: POLYNOMIAL IMAGES OF CIRCLES 18.821 SPRING 28: POLYNOMIAL IMAGES OF CIRCLES JUSTIN CURRY, MICHAEL FORBES, MATTHEW GORDON Abstract. This paper considers the effect of complex polynomial maps on circles of various radii. Several phenomena

More information

Homework 27. Homework 28. Homework 29. Homework 30. Prof. Girardi, Math 703, Fall 2012 Homework: Define f : C C and u, v : R 2 R by

Homework 27. Homework 28. Homework 29. Homework 30. Prof. Girardi, Math 703, Fall 2012 Homework: Define f : C C and u, v : R 2 R by Homework 27 Define f : C C and u, v : R 2 R by f(z) := xy where x := Re z, y := Im z u(x, y) = Re f(x + iy) v(x, y) = Im f(x + iy). Show that 1. u and v satisfies the Cauchy Riemann equations at (x, y)

More information

Math 185 Fall 2015, Sample Final Exam Solutions

Math 185 Fall 2015, Sample Final Exam Solutions Math 185 Fall 2015, Sample Final Exam Solutions Nikhil Srivastava December 12, 2015 1. True or false: (a) If f is analytic in the annulus A = {z : 1 < z < 2} then there exist functions g and h such that

More information

Generating All Circular Shifts by Context-Free Grammars in Greibach Normal Form

Generating All Circular Shifts by Context-Free Grammars in Greibach Normal Form Generating All Circular Shifts by Context-Free Grammars in Greibach Normal Form Peter R.J. Asveld Department of Computer Science, Twente University of Technology P.O. Box 17, 7500 AE Enschede, the Netherlands

More information

An Involution for the Gauss Identity

An Involution for the Gauss Identity An Involution for the Gauss Identity William Y. C. Chen Center for Combinatorics Nankai University, Tianjin 300071, P. R. China Email: chenstation@yahoo.com Qing-Hu Hou Center for Combinatorics Nankai

More information

Asymptotic Estimates for Generalized Stirling Numbers

Asymptotic Estimates for Generalized Stirling Numbers Centrum voor Wiskunde en Informatica REPORTRAPPORT Asmptotic Estimates for Generalized Stirling Numbers R. Chelluri, L.B. Richmond, N.M. Temme Modelling, Analsis and Simulation (MAS) MAS-R9923 September

More information

On the number of ways of writing t as a product of factorials

On the number of ways of writing t as a product of factorials On the number of ways of writing t as a product of factorials Daniel M. Kane December 3, 005 Abstract Let N 0 denote the set of non-negative integers. In this paper we prove that lim sup n, m N 0 : n!m!

More information

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of

More information

On the mean values of an analytic function

On the mean values of an analytic function ANNALES POLONICI MATHEMATICI LVII.2 (1992) On the mean values of an analytic function by G. S. Srivastava and Sunita Rani (Roorkee) Abstract. Let f(z), z = re iθ, be analytic in the finite disc z < R.

More information

Notes: Most of the material presented in this chapter is taken from Jackson, Chap. 2, 3, and 4, and Di Bartolo, Chap. 2. 2π nx i a. ( ) = G n.

Notes: Most of the material presented in this chapter is taken from Jackson, Chap. 2, 3, and 4, and Di Bartolo, Chap. 2. 2π nx i a. ( ) = G n. Chapter. Electrostatic II Notes: Most of the material presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartolo, Chap... Mathematical Considerations.. The Fourier series and the Fourier

More information

LAURENT SERIES AND SINGULARITIES

LAURENT SERIES AND SINGULARITIES LAURENT SERIES AND SINGULARITIES Introduction So far we have studied analytic functions Locally, such functions are represented by power series Globally, the bounded ones are constant, the ones that get

More information

TROPICAL CRYPTOGRAPHY II: EXTENSIONS BY HOMOMORPHISMS

TROPICAL CRYPTOGRAPHY II: EXTENSIONS BY HOMOMORPHISMS TROPICAL CRYPTOGRAPHY II: EXTENSIONS BY HOMOMORPHISMS DIMA GRIGORIEV AND VLADIMIR SHPILRAIN Abstract We use extensions of tropical algebras as platforms for very efficient public key exchange protocols

More information

Suggested Homework Solutions

Suggested Homework Solutions Suggested Homework Solutions Chapter Fourteen Section #9: Real and Imaginary parts of /z: z = x + iy = x + iy x iy ( ) x iy = x #9: Real and Imaginary parts of ln z: + i ( y ) ln z = ln(re iθ ) = ln r

More information

On Quasigroup Pseudo Random Sequence Generators

On Quasigroup Pseudo Random Sequence Generators On Quasigroup Pseudo Random Sequence Generators V. Dimitrova, J. Markovski Institute of Informatics, Faculty of Natural Sciences and Mathematics Ss Cyril and Methodius University, 1 Skopje, FYRO Macedonia

More information

Centrum voor Wiskunde en Informatica

Centrum voor Wiskunde en Informatica Centrum voor Wiskunde en Informatica Modelling, Analysis and Simulation Modelling, Analysis and Simulation Two-point Taylor expansions of analytic functions J.L. Lópe, N.M. Temme REPORT MAS-R0 APRIL 30,

More information

Combinatorial properties of the numbers of tableaux of bounded height

Combinatorial properties of the numbers of tableaux of bounded height Combinatorial properties of the numbers of tableaux of bounded height Marilena Barnabei, Flavio Bonetti, and Matteo Sibani Abstract We introduce an infinite family of lower triangular matrices Γ (s), where

More information

COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125

COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125 COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125 ROBERT S. COULTER AND PAMELA KOSICK Abstract. This note summarises a recent search for commutative semifields of order 243 and 3125. For each of these two orders,

More information

Assignment 2 - Complex Analysis

Assignment 2 - Complex Analysis Assignment 2 - Complex Analysis MATH 440/508 M.P. Lamoureux Sketch of solutions. Γ z dz = Γ (x iy)(dx + idy) = (xdx + ydy) + i Γ Γ ( ydx + xdy) = (/2)(x 2 + y 2 ) endpoints + i [( / y) y ( / x)x]dxdy interiorγ

More information

Fourth Week: Lectures 10-12

Fourth Week: Lectures 10-12 Fourth Week: Lectures 10-12 Lecture 10 The fact that a power series p of positive radius of convergence defines a function inside its disc of convergence via substitution is something that we cannot ignore

More information

arxiv: v1 [math.co] 12 Sep 2018

arxiv: v1 [math.co] 12 Sep 2018 ON THE NUMBER OF INCREASING TREES WITH LABEL REPETITIONS arxiv:809.0434v [math.co] Sep 08 OLIVIER BODINI, ANTOINE GENITRINI, AND BERNHARD GITTENBERGER Abstract. In this paper we study a special subclass

More information

Hypergeometric series and the Riemann zeta function

Hypergeometric series and the Riemann zeta function ACTA ARITHMETICA LXXXII.2 (997) Hypergeometric series and the Riemann zeta function by Wenchang Chu (Roma) For infinite series related to the Riemann zeta function, De Doelder [4] established numerous

More information

Estimates of the error in Gauss-Legendre quadrature for double integrals

Estimates of the error in Gauss-Legendre quadrature for double integrals Estimates of the error in Gauss-Legendre quadrature for double integrals Author Elliott, David, Johnston, Peter, Johnston, Barbara Published 211 Journal Title Journal of Computational and Applied Mathematics

More information

New asymptotic expansion for the Γ (x) function

New asymptotic expansion for the Γ (x) function New asymptotic epansion for the Γ function Gergő Nemes December 7, 2008 http://d.doi.org/0.3247/sl2math08.005 Abstract Using a series transformation, Stirling-De Moivre asymptotic series approimation to

More information

BT Research at Martlesham, Suffolk

BT Research at Martlesham, Suffolk Connectivity of random graphs Keith Briggs Keith.Briggs@bt.com research.btexact.com/teralab/keithbriggs.html Alan Turing Institute 2004 November 19 1330 typeset 2004 November 17 10:55 in pdflatex on a

More information

Periodic trajectories in the regular pentagon, II

Periodic trajectories in the regular pentagon, II Periodic trajectories in the regular pentagon, II Dmitry Fuchs, and Serge Tachnikov December 9, 011 1 Introduction and formulation of results In our recent paper [1], we studied periodic billiard trajectories

More information

Splitting Fields for Characteristic Polynomials of Matrices with Entries in a Finite Field.

Splitting Fields for Characteristic Polynomials of Matrices with Entries in a Finite Field. Splitting Fields for Characteristic Polynomials of Matrices with Entries in a Finite Field. Eric Schmutz Mathematics Department, Drexel University,Philadelphia, Pennsylvania, 19104. Abstract Let M n be

More information