Combating Network Pollution Attacks: A Cascaded Error-Control Coding Approach

Size: px
Start display at page:

Download "Combating Network Pollution Attacks: A Cascaded Error-Control Coding Approach"

Transcription

1 Globcom 0 - Communication and Information Systm Scurity Symposium Combating Ntwork Pollution Attacks: A Cascadd Error-Control Coding Approach Jian Li, Tongtong Li and Jian Rn Dpartmnt of Elctrical and Computr Enginring Michigan Stat Univrsity, East Lansing, MI {lijian, tongli, rnjian}@msu.du Abstract Linar ntwork coding provids a nw communication diagram to significantly incras th ntwork capacity by allowing th rlay nods to ncod th incoming mssags. Howvr, this communication diagram is fragil to communication rrors and nod compromising attacks. How to combat rrors whil maintaining th ntwork fficincy is a challnging rsarch problm. In this papr, w charactriz a linar ntwork coding through a sris of cascadd linar rror-control cods. This rprsntation nabls us to dtrmin th indpndnt sourc of rrors in th cascadd ntwork lvl. It could lad to a succssful dcoding of th original mssag and locating of th malicious ntwork nods. W provid comprhnsiv thortical analysis on ntwork coding in both unicast and multicast scnarios. Our rsarch provids a nw approach to undrstand ntwork coding schms and also a novl mthodology to dvlop ntwork coding schms that can combat nod compromising attacks and locat th malicious nods. I. INTRODUCTION Ntwork coding was first introducd by Ahlswd t al. []. Ntwork coding provids a trad-off btwn communication capacity and computational complity in dirctd ntworks by allowing th rlay nods in th ntwork to ncod th incoming mssags bfor forwarding th mssags to th subsqunt nods. For sink nods to succssfully rtriv th original mssags, all th mssags transmittd in th ntwork must b rcivd rror fr. This rquirs th communication to b rror rsilint. Currntly th rsarch on combating rrors in ntwork coding is mainly focusd to linar ntwork coding [], []. It has bn provd that linar ntwork cods ar sufficint to achiv th multicast capacity. Thrfor, in this papr, w will focus on discussion to linar ntwork coding for th rst of this papr. Th approachs to implmnt rror control in linar ntwork coding can b dividd into two catgoris: rror-dtction at th intrmdiat nods, and rror-corrction at th sink nods. For rror dtction in ntwork coding, Krohn t al. [] proposd to vrify th mssags intgrity at th intrmdiat nods using homomorphic hash functions. Charls t al. [] usd th cryptographic tchniqu to captur and discard corruptd packts. Khdi and Li [] proposd th null kys algorithm, in which th ida of orthogonal spacs was utilizd. Qiao t al. [] improvd th null kys schm by collcting th rronous mssags. For rsarch on rror corrction, Cai t al. [] proposd to corrct rrors at sink nods using rror corrcting ntwork coding. Thy drivd th Hamming bound and th Gilbrt-Varshamov bound. Jaggi t al. [] dvlopd a two-part rat-rgion for thir cods basd on BEC channl cods. In our prvious work [0], w hav provn that ach ntwork coding can b transfrrd into an rror-control cod in a bipartit graph. Howvr, in th papr, w ignord th structur of th undrlying rror-control coding. In this papr by ploring th innr structur of ntwork coding, w can transfr a ntwork coding schm into a sris of cascadd rror-control cods. This mapping nabls us to idntify th minimum numbr of indpndnt rror pattrn in th corrsponding ntwork lvl and idntify th malicious ntwork nods. Th main contributions of this papr ar two-fold: ) W dvlop a mthodology to map ach ntwork coding into a sris of cascadd rror-control cods. ) W provid a novl approach to dsign fficint ntwork coding schms that can combat ntwork rrors and nod compromising attacks utilizing th innr structur of th ntwork cod. Th rst of this papr is organizd as follows: Sction II givs an ovrall of th prliminary. An illustrativ ampl is prsntd in Sction III. Sction IV analyzs th rlationship btwn th ntwork coding and th cascadd rror-control codings in unicast scnario and Sction V provids analysis in multicast cas. W conclud in Sction VI. II. PRELIMINARY A. Ntwork Coding In this papr, w adopt th notations of []. A ntwork is quivalnt to a dirctd graph G = (V,E), whr V rprsnts th st of vrtics corrsponding to th ntwork nods and E rprsnts all th dirctd dgs btwn vrtics corrsponding to th communication link. Th start vrt v of an dg is calld th tail of and writtn as v = tail(), whil th nd vrt u of an dg is calld th had of of and writtn as u = had(). W dfin th capacity of an dg as th numbr of symbols that can b transmittd through th dg in on tim unit. So th capacity should b non-ngativ intgrs. In this papr, w normaliz th capacity of on dg to. If a channl btwn two nods has capacity C largr than, w modl this channl as C multipl dgs ach with capacity. W assum th ntwork is dlay-fr [], that is all th dgs in th graph hav zro dlay. And th ntwork is acyclic, that is all th vrtics in th graph can b organizd in an ancstral ordring. U.S. Govrnmnt work not protctd by U.S. copyright

2 Globcom 0 - Communication and Information Systm Scurity Symposium For a sourc nod u, thr is a st of symbols X (u) = (,..., k ) to b snt. Each of th symbol is from th finit fild F p m, whr p is a prim numbr and m is a positiv intgr. For a link btwn rlay nods r and r, writtn as =(r,r ), th symbol y transmittd on it is th function of all th y such that had( )=r. And y can b writtn as: y = β, y, :had( )=r in which th ncoding cofficints β, F p m. For a sink nod v, thr is a st of incoming symbols y ( : tail( )= v) to b dcodd. As long as X (u) can b rtrivd, w say that th connction from u to v is possibl. If a rlay nod r is compromisd, th symbols transmittd on ach dg such that had() =r will b modifid. Th nods aftr nod r will b pollutd bcaus of th ntwork ncoding. Evntually th sink nod will rciv mor rronous symbols than thos originally brought by th malicious nod. In th sctions blow, w try to plor th innr structur of th ntwork cod to corrct th rrors and locat th malicious nod. B. Error-Control Cods W us (n, k) to rprsnt an rror-control cod in th finit fild F p m with gnrator matri G of siz k n. Suppos msg is a squnc of k symbols, th n-symbol codword c can b obtaind by c = msg G. All th codwords form a subspac of dimnsion k ovr th n dimnsional spac and ach of thm is at last d min distanc apart from th othrs, whr d min is dfind as th minimum hamming distanc for any two distinct codwords and y, i..: d min =min{d(, y) codwords :, y}, whr d(, y) is dfind as th numbr of positions at which th corrsponding symbols ar diffrnt btwn and y. Morovr, an rror-control cod can b dpictd by a bipartit graph with on sid of nods rprsnting th original mssag whil th othr sid of nods rprsnting th codword. Blow ar som important proprtis of th rror-control cod, according to which w can choos th propr cod paramtrs for our rror corrction rquirmnts. Thorm (Singlton bound []). For a (n, k) cod with th minimum distanc d, w hav k + d n +. Thorm ( []). For a (n, k) cod with th minimum distanc d, it can dtct all th d or lss rrors, or it can corrct all th d or lss rrors, whr dnots th largst intgr that is smallr than. Rd-Solomon (RS) cod is a class of rror-control cod that can achiv th Singlton bound. For an RS cod with paramtr (n, k), th minimum distanc d = n k+. Bcaus it has th maimum achivabl d min, it has a strong rrorcontrol capability. W can rprsnt RS cod by (n, k, n k +). Fig..,,, +, +, +, An illustrativ ampl of linar ntwork coding C. Systm Modl W st th ntwork as in []. Th ntwork consists of a sourc nod, rlay nods and sink nods. Mssags ar snt from sourc nod, ncodd thn snt out in rlay nods and finally dcodd in sink nods. Morovr, in this papr w will partition th ntwork into svral cascadd lvls and plor th innr structur of th ntwork cod, thus w must b abl to corrctly accss th outputs of all th rlay nods. To raliz this, w add a spcial monitor nod in th ntwork. This nod can collct th output ncodd mssags from all th rlay nods and can nvr b compromisd. III. AN ILLUSTRATIVE EXAMPLE Lt us amin th classic ampl [] shown in Fig.. In this ampl, sourc nod multicasts two symbols,, to sink nods and. By ncoding at nod, both nods and can rtriv th two symbols succssfully. In our prvious work [0], w mrgd th intrmdiat nods and paths and transfrrd th th ntwork cod into a bipartit graph. Whil in this papr, w try to plor th ntwork cod to hibit th innr structur of th ntwork cod. To plain our main ida, w will only focus on th communication btwn nod and nod (th shadd ara in Fig. ). Th analysis is similar to th communication btwn nod and nod. In this communication, symbol is passd to nod, nod, nod and nod through on hop, two hops, thr hops and two hops rspctivly, and symbol, is passd to nod, nod, nod and nod through on hop, two hops, thr hops and four hops rspctivly. As shown in Fig., if w add two virtual nods and v on dg, w can mak passd to nod through four hops, thus turn all of th intrmdiat nods into cascadd lvls. Each of th lvl can b sn as a singl ntwork cod, so w can rprsnt ach lvl using th bipartit graph shown in Fig. according to [0]. In this way, w plor th innr structur of th original ntwork cod, which is dtrmind by th ntwork topology. Th original ntwork cod can b viwd as cascadd rror-control cods [ ] 0 with th gnrator matrics, 0 [ ] 0 0,

3 Globcom 0 - Communication and Information Systm Scurity Symposium, +, v, +, Lvl Lvl Lvl Path Sourc Path connctions among nods of adjacnt lvls Path n Lvl Lvl Lvl m Fig.. Partition a ntwork cod into svral lvls Sink Fig.. Transfr th ntwork coding schm in Fig. into a -lvl cascadd coding by adding virtual nods. Lvl Lvl Lvl Fig.. Th corrsponding bipartit graphs of cascadd lvls in Fig.,, Fig..,,,,,,, +, 0, z, z, z, z,, z, An ampl of point-to-point ntwork coding z Although in this ampl, thr is no rdundancy in th thr rror-control cods, th corrsponding ntwork cod cannot dtct or corrct rrors, it is sufficint to show that ntwork cod can b pandd to cascadd rror-control cods. In th nt sction, w will show that ntwork cods can b transfrrd into cascadd rror-control cods. In this way, w can charactriz and dsign ntwork cods basd on th undrlying cascadd rror-control cods for rror dtction/corrction and malicious nods locating. IV. CHARACTERIZATION OF NETWORK CODING USING CASCADED ERROR-CONTROL CODING IN POINT-TO-POINT COMMUNICATION In this sction, w will formally stat th rlationship btwn ntwork coding and cascadd rror-control coding in th point-to-point communication. Th sufficincy is studid first thn th ncssity. A. Th Sufficincy Lmma ( [0]). Evry ntwork cod schm can b rprsntd by an rror-control cod. Thorm. Evry ntwork cod schm can b pandd to a sris of cascadd rror-control cods. Sourc h m hops h hops h hops p p p m u Virtual Nodh p p p m h h h ma ma ma h h Fig.. Transfr incoming dgs of nods having multipl incoming dgs by adding virtual nods m u Proof: To prov this, w will first show that th ntwork cod can b partitiond into svral cascadd lvls of on hop ntwork cods. For ach of th nods that hav multipl incoming dgs in th ntwork, w add som virtual nods on ths dgs as shown in Fig.. For ach of th incoming dgs, thr may b svral paths through which mssags ar passd from th sourc nod to nod u including th dg. Among all th paths, w find th longst on and calculat its numbr of hops. Aftr calculating th hop valus h,...,h m for all th incoming dgs, w choos th maimum valu h ma. For ach of th incoming dg i, w add h ma h i virtual nods on it, making all th paths from sourc to nod u hav th sam count of hops. Th virtual nods simply forward th mssags passd on th corrsponding dgs. Aftr th opration in Fig. is prformd in all th nods having multipl incoming dgs, sinc all th paths from sourc nod to th sam th rlay nod hav th sam hop counts and th sink nod itslf must hav multipl incoming dgs, vry path from th sourc nod to th sink nod has th sam numbr of hops, thus th sam numbr of intrmdiat nods, including th rlay nods and th virtual nods. W can put th nods having th sam hop counts togthr as a lvl as shown in Fig.. Evry singl lvl can b viwd as on hop ntwork cod dtrmind by th connctions from nods of th prvious lvl. So vry ntwork cod can b partitiond into svral cascadd lvls of on hop ntwork cod. According to Lmma, ths on hop ntwork cods can b rprsntd by rror-control cods. So th cascadd ntwork cods can b rprsntd by concatnating th corrsponding rror-control cods togthr. W can pand any ntwork cod to a sris of cascadd rror-control cods. Taking th ntwork cod in Fig. as an ampl. Th sourc nod transmits thr symbols,,,, to sink

4 Globcom 0 - Communication and Information Systm Scurity Symposium v +,,, +,,,,,,, + +,,,, Lvl Lvl v v Fig.. Th corrsponding cascadd bipartit graph of Fig. nod in this ntwork cod. And sink nod can rciv ncodd symbols, which indicats that thr ar rdundancis in this ntwork coding. In [0], w analyz th sam cod and transfr it into a (, ) rror-control cod which can corrct rror. Hr w will show this cod can b transfrrd into a sris of cascadd rror-control cods. Following th oprations mntiond in th proof of Thorm, w can gt th corrsponding cascadd ntwork cods and cascadd rrorcontrol cods shown in Fig.. Nods and v ar addd as virtual nods to partition th original ntwork cod. Th first lvl rror-control cod is a (, ) cod and th scond lvl cod is a (, ) cod. If an rror occurs on dg, nod will rciv wrong. Th rror will propagat to th succding nods, thus thr will b two rronous and +, in th sink nod, which is byond th rror corrction capability of th (, ) rror-control cod. Th rrors cannot b dalt using th transforming mthods in [0]. Howvr, if th monitor nod can collct th output symbols of th first lvl (, ) cod, it can corrct th rronous symbol in nod. So th rror propagation is liminatd from th bginning. By ploring th innr structur of th ntwork cod, w can mak bttr us of th rdundancy in th ntwork. If nod is an malicious nod and snd out corruptd mssags, thr will b rrors in th output of both th first lvl rror-control cod and th scond lvl. Th rror is byond th capability of th cascadd rror-control cods, so w cannot corrct rrors or locat th malicious nod. In th sction blow, w will show that w can dsign ntwork cods corrsponding to propr cascadd rror-control cods to corrct rrors and locat malicious nods. B. Th Ncssity W hav provd that any ntwork cod can b viwd as a sris of cascadd rror-control cods, now w will considr th rvrs problm. For a point-to-point communication, a ntwork cod is fasibl only if it can succssfully dlivr all th dsird symbols from th sourc nod to th sink nod. For any (n, k) rror-control cod, w hav th following lmma: Lmma ( [0]). For a linar ntwork with sourc nod u, sink nod v and a dsird connction C =(u, v, X (u)), An (n,k) rror-control cod can b sn as a fasibl ntwork cod in th connction C if w hav th rlationship: k R(C), whr R(C) is th rat of th connction C. Thorm. For a linar ntwork and a dsird connction C =(u, v, X (u)), A sris of cascadd rror-control cods with paramtrs (n,n 0 ), (n,n ),...,(n m,n m ), can b sn as a fasibl ntwork cod in th connction C if w hav th rlationship: n 0 R(C). Proof: Suppos th original mssag is =(,..., k ), th output ncodd mssag for ach lvl of th cascadd rror-control cods is y i =(y i,,...,y i,ni )( i m) and th gnrator matri for ach of th cascadd rror-control cods is G i ( i m) of th siz n i n i. y i for ach lvl can b writtn as: y = G, y = y G,..., y m = y m G m. So th ntir ncoding quation for th cascadd rror-control cods can b writtn as y m = G G G m = G. If w viw th cascadd rror-control cods as an rrorcontrol cod with th gnrator matri G of th siz n 0 n m, th paramtr for th cod is (n m,n 0 ). According to Lmma, if n 0 R(C), th ntwork cod is fasibl. Basd on th analysis, by implmnting th rror-control cod for ach lvl of th cascadd rror-control cods, w can add appropriat rdundancis into th ntwork cod to control rrors and locat malicious nods. This can b don in two stps: ) According to th ntwork topology, dtrmin th numbr of lvls of th cascadd cods. According to th dsign rquirmnts (numbr of rrors to dtct or corrct, numbr of malicious nods to locat), dtrmin an appropriat cod rat and th typ of th rror-control cod for ach lvl. ) According to th sourc rat R(C), choos a propr n 0 such that n 0 R(C), and driv th rst of th n i ( i m) basd on th cod rat for ach lvl of th rror-control cods. Gnrat th gnrator matrics G,...,G m according to th cod typs and apply thm as th systm transfr matrics to ach lvl of th ntwork cods. C. Application in Combating nod comprising attack It is asy to vrify th following thorm. Thorm. Suppos d i,d i+ > ar th minimum distancs of adjacnt lvls (L i,l i+ ) of th cascadd ntwork cod. If d i + >d i+, thn rrors in L i+ sprad by a singl rror in L i is uncorrctabl by th L i+ s rror control cod. Howvr, thy can b corrctd by th L i s rror control cod. Lt us analyz th linar ntwork shown in Fig., th sourc nod is going to snd symbols,, to sink nod. This ntwork can b partitiond into lvls. Nods,,,

5 Globcom 0 - Communication and Information Systm Scurity Symposium Fig.. All mssags snt from Nods,,, y y, y, y, y, y, y, 0 y, y, y, y, y, y, y, y, y, y y,,0 Implmnt a lvl cascadd rror-control cod in ntwork coding All symbols from Lvl Lvl Lvl 0 0 Fig.. Th corrsponding cascadd bipartit graph of Fig. form th first lvl and nods,,,, 0, form th scond lvl. In ordr to gt th bst rror control capability, w implmnt two systmatic RS cods in th two lvls. Thy ar (,, ) cod for lvl and (,, ) cod for lvl. Th minimum distancs of th two cods ar both, thus both of thm can corrct rrors. Bcaus th rrors occurring nt to th sourc nod ar mor snsitiv. Thy may propagat to th subsqunt nods causing much mor rrors. W put th lowr rat cod that has strongr rror control capability at th first lvl. Whn thr is no rror in th ntwork, w hav (y i,,y i,,y i, )=(,, ),i=,. It is asy for th sink nod to dcod th mssags. If nod is a malicious nod and it snds out rronous y,,y,, th monitor nod can corrct ths rrors using th scond lvl RS cod and find out this malicious nod according to th ntwork topology. If nod is a malicious nod and it snds out rronous y,y,, th rrors will propagat to y,,y,,y,,y,,y,0,y,, which prvnts th scond lvl cod from corrcting th rrors. In th corrsponding cascadd bipartit graph Fig., th rrors ar markd with gry color. It is clar that rrors from lvl sprad to rrors in lvl. Evn if w transfr th ntwork cod into on (,, ) RS cod which is capabl of corrcting rrors according to [0], th rrors ar still too many to corrct. Howvr, basd on th fact that th rrors ar burst and corrlatd, aftr th monitor nod collcts th outputs of th first lvl, it can corrct th rrors occurring in nod using th first lvl RS cod, find out th malicious nod basd on th ntwork topology and corrct th rrors in th scond lvl. Our cascadd RS cod can corrct at most rrors by ploring th innr structur of th cod and is mor powrful than rgular RS cods. V. MULTICAST CASE Bcaus in point-to-point communication cas, our proofs for th rlationship (writtn as R nc,cc ) btwn ntwork cod and cascadd rror-control cods ar solly dpndd on th proofs for th rlationship (writtn as R nc,c ) btwn ntwork cod and rror-control cod in [0] (Thorm and Thorm in [0], Lmma and Lmma in this papr) and this kind of dpndnc has no rlationship with th spcific communication cas, w can prov that R nc,cc in th multicast cas is similar to that in th point-to-point communication cas, basd on th fact that in [0] R nc,c stays th sam in both point-to-point and multicast cass. VI. CONCLUSION In this papr, w first analyz th rlationship btwn th cascadd rror-control cods and th ntwork cod in unicast cas and prov that th two cods ar ssntially corrlatd. Furthrmor, w tnd this corrlation to multicast cas. This rsarch provids a nw mthodology that can combat th communication rrors and nod compromising attacks by dsigning fficint ntwork coding schm basd on cascadd rror-control cods and fully utilizing th innr structur of ntwork cods. ACKNOWLEDGEMENT This work was partially supportd by th U.S. National Scinc Foundation undr grants CNS-0, CND-, CNS-0, and ECCS-0 REFERENCES [] R. Ahlswd, N. Cai, S.-Y.Li, and R. Yung, Ntwork information flow, IEEE Transactions on Information Thory, vol., pp. 0, July 000. [] S.-Y. Li, R. W. Yung, and N. Cai, Linar ntwork coding, IEEE Transactions on Information Thory, vol., no., pp., 00. [] R. Kottr and M. Mdard, An algbraic approach to ntwork coding, IEEE/ACM Transactions on Ntworking, vol., no., pp., 00. [] M. Krohn, M. Frdman, and D. Mazirs, On-th-fly vrification of ratlss rasur cods for fficint contnt distribution, in IEEE Symposium on Scurity and Privacy 00, pp. 0, May 00. [] D. Charls, K. Jain, and K. Lautr, Signaturs for ntwork coding, in Proc. of CISS0, pp., 00. [] E. Khdi and B. Li, Null kys: Limiting malicious attacks via null spac proprtis of ntwork coding, in IEEE INFOCOM 00, pp., Apr. 00. [] W. Qiao, J. Li, and J. Rn, An fficint rror-dtction and rrorcorrction (dc) schm for ntwork coding, in IEEE Globcom 0, pp., Dc. 0. [] N. Cai and R. W. Yung, Ntwork coding and rror corrction, in Proc. of IEEE Information Thory Workshop (ITW 00), pp., 00. [] S. Jaggi, M. Langbrg, T. Ho, and M. Effros, Corrction of advrsarial rrors in ntworks, in Proc. of Intrnational Symposium on Information Thory (ISIT 00), pp., 00. [0] J. Li, C. Yang, D. Tang, T. Li, and J. Rn, Charactrization of linar ntwork coding for pollution dtction, Accptd in IEEE Globcom 0. [] S. Lin and D. J. Costllo, Error Control Coding. Prntic Hall, nd d., Jun 00.

Computing and Communications -- Network Coding

Computing and Communications -- Network Coding 89 90 98 00 Computing and Communications -- Ntwork Coding Dr. Zhiyong Chn Institut of Wirlss Communications Tchnology Shanghai Jiao Tong Univrsity China Lctur 5- Nov. 05 0 Classical Information Thory Sourc

More information

Basic Polyhedral theory

Basic Polyhedral theory Basic Polyhdral thory Th st P = { A b} is calld a polyhdron. Lmma 1. Eithr th systm A = b, b 0, 0 has a solution or thr is a vctorπ such that π A 0, πb < 0 Thr cass, if solution in top row dos not ist

More information

Higher order derivatives

Higher order derivatives Robrto s Nots on Diffrntial Calculus Chaptr 4: Basic diffrntiation ruls Sction 7 Highr ordr drivativs What you nd to know alrady: Basic diffrntiation ruls. What you can larn hr: How to rpat th procss of

More information

A Sub-Optimal Log-Domain Decoding Algorithm for Non-Binary LDPC Codes

A Sub-Optimal Log-Domain Decoding Algorithm for Non-Binary LDPC Codes Procdings of th 9th WSEAS Intrnational Confrnc on APPLICATIONS of COMPUTER ENGINEERING A Sub-Optimal Log-Domain Dcoding Algorithm for Non-Binary LDPC Cods CHIRAG DADLANI and RANJAN BOSE Dpartmnt of Elctrical

More information

Construction of asymmetric orthogonal arrays of strength three via a replacement method

Construction of asymmetric orthogonal arrays of strength three via a replacement method isid/ms/26/2 Fbruary, 26 http://www.isid.ac.in/ statmath/indx.php?modul=prprint Construction of asymmtric orthogonal arrays of strngth thr via a rplacmnt mthod Tian-fang Zhang, Qiaoling Dng and Alok Dy

More information

Search sequence databases 3 10/25/2016

Search sequence databases 3 10/25/2016 Sarch squnc databass 3 10/25/2016 Etrm valu distribution Ø Suppos X is a random variabl with probability dnsity function p(, w sampl a larg numbr S of indpndnt valus of X from this distribution for an

More information

Random Access Techniques: ALOHA (cont.)

Random Access Techniques: ALOHA (cont.) Random Accss Tchniqus: ALOHA (cont.) 1 Exampl [ Aloha avoiding collision ] A pur ALOHA ntwork transmits a 200-bit fram on a shard channl Of 200 kbps at tim. What is th rquirmnt to mak this fram collision

More information

cycle that does not cross any edges (including its own), then it has at least

cycle that does not cross any edges (including its own), then it has at least W prov th following thorm: Thorm If a K n is drawn in th plan in such a way that it has a hamiltonian cycl that dos not cross any dgs (including its own, thn it has at last n ( 4 48 π + O(n crossings Th

More information

(Upside-Down o Direct Rotation) β - Numbers

(Upside-Down o Direct Rotation) β - Numbers Amrican Journal of Mathmatics and Statistics 014, 4(): 58-64 DOI: 10593/jajms0140400 (Upsid-Down o Dirct Rotation) β - Numbrs Ammar Sddiq Mahmood 1, Shukriyah Sabir Ali,* 1 Dpartmnt of Mathmatics, Collg

More information

The Matrix Exponential

The Matrix Exponential Th Matrix Exponntial (with xrciss) by Dan Klain Vrsion 28928 Corrctions and commnts ar wlcom Th Matrix Exponntial For ach n n complx matrix A, dfin th xponntial of A to b th matrix () A A k I + A + k!

More information

The Matrix Exponential

The Matrix Exponential Th Matrix Exponntial (with xrciss) by D. Klain Vrsion 207.0.05 Corrctions and commnts ar wlcom. Th Matrix Exponntial For ach n n complx matrix A, dfin th xponntial of A to b th matrix A A k I + A + k!

More information

Introduction to Arithmetic Geometry Fall 2013 Lecture #20 11/14/2013

Introduction to Arithmetic Geometry Fall 2013 Lecture #20 11/14/2013 18.782 Introduction to Arithmtic Gomtry Fall 2013 Lctur #20 11/14/2013 20.1 Dgr thorm for morphisms of curvs Lt us rstat th thorm givn at th nd of th last lctur, which w will now prov. Thorm 20.1. Lt φ:

More information

Two Products Manufacturer s Production Decisions with Carbon Constraint

Two Products Manufacturer s Production Decisions with Carbon Constraint Managmnt Scinc and Enginring Vol 7 No 3 pp 3-34 DOI:3968/jms9335X374 ISSN 93-34 [Print] ISSN 93-35X [Onlin] wwwcscanadant wwwcscanadaorg Two Products Manufacturr s Production Dcisions with Carbon Constraint

More information

Section 6.1. Question: 2. Let H be a subgroup of a group G. Then H operates on G by left multiplication. Describe the orbits for this operation.

Section 6.1. Question: 2. Let H be a subgroup of a group G. Then H operates on G by left multiplication. Describe the orbits for this operation. MAT 444 H Barclo Spring 004 Homwork 6 Solutions Sction 6 Lt H b a subgroup of a group G Thn H oprats on G by lft multiplication Dscrib th orbits for this opration Th orbits of G ar th right costs of H

More information

Supplementary Materials

Supplementary Materials 6 Supplmntary Matrials APPENDIX A PHYSICAL INTERPRETATION OF FUEL-RATE-SPEED FUNCTION A truck running on a road with grad/slop θ positiv if moving up and ngativ if moving down facs thr rsistancs: arodynamic

More information

Addition of angular momentum

Addition of angular momentum Addition of angular momntum April, 07 Oftn w nd to combin diffrnt sourcs of angular momntum to charactriz th total angular momntum of a systm, or to divid th total angular momntum into parts to valuat

More information

Addition of angular momentum

Addition of angular momentum Addition of angular momntum April, 0 Oftn w nd to combin diffrnt sourcs of angular momntum to charactriz th total angular momntum of a systm, or to divid th total angular momntum into parts to valuat th

More information

Mutually Independent Hamiltonian Cycles of Pancake Networks

Mutually Independent Hamiltonian Cycles of Pancake Networks Mutually Indpndnt Hamiltonian Cycls of Pancak Ntworks Chng-Kuan Lin Dpartmnt of Mathmatics National Cntral Univrsity, Chung-Li, Taiwan 00, R O C discipl@ms0urlcomtw Hua-Min Huang Dpartmnt of Mathmatics

More information

Searching Linked Lists. Perfect Skip List. Building a Skip List. Skip List Analysis (1) Assume the list is sorted, but is stored in a linked list.

Searching Linked Lists. Perfect Skip List. Building a Skip List. Skip List Analysis (1) Assume the list is sorted, but is stored in a linked list. 3 3 4 8 6 3 3 4 8 6 3 3 4 8 6 () (d) 3 Sarching Linkd Lists Sarching Linkd Lists Sarching Linkd Lists ssum th list is sortd, but is stord in a linkd list. an w us binary sarch? omparisons? Work? What if

More information

1 Minimum Cut Problem

1 Minimum Cut Problem CS 6 Lctur 6 Min Cut and argr s Algorithm Scribs: Png Hui How (05), Virginia Dat: May 4, 06 Minimum Cut Problm Today, w introduc th minimum cut problm. This problm has many motivations, on of which coms

More information

Math 34A. Final Review

Math 34A. Final Review Math A Final Rviw 1) Us th graph of y10 to find approimat valus: a) 50 0. b) y (0.65) solution for part a) first writ an quation: 50 0. now tak th logarithm of both sids: log() log(50 0. ) pand th right

More information

LINEAR DELAY DIFFERENTIAL EQUATION WITH A POSITIVE AND A NEGATIVE TERM

LINEAR DELAY DIFFERENTIAL EQUATION WITH A POSITIVE AND A NEGATIVE TERM Elctronic Journal of Diffrntial Equations, Vol. 2003(2003), No. 92, pp. 1 6. ISSN: 1072-6691. URL: http://jd.math.swt.du or http://jd.math.unt.du ftp jd.math.swt.du (login: ftp) LINEAR DELAY DIFFERENTIAL

More information

First derivative analysis

First derivative analysis Robrto s Nots on Dirntial Calculus Chaptr 8: Graphical analysis Sction First drivativ analysis What you nd to know alrady: How to us drivativs to idntiy th critical valus o a unction and its trm points

More information

A Propagating Wave Packet Group Velocity Dispersion

A Propagating Wave Packet Group Velocity Dispersion Lctur 8 Phys 375 A Propagating Wav Packt Group Vlocity Disprsion Ovrviw and Motivation: In th last lctur w lookd at a localizd solution t) to th 1D fr-particl Schrödingr quation (SE) that corrsponds to

More information

Square of Hamilton cycle in a random graph

Square of Hamilton cycle in a random graph Squar of Hamilton cycl in a random graph Andrzj Dudk Alan Friz Jun 28, 2016 Abstract W show that p = n is a sharp thrshold for th random graph G n,p to contain th squar of a Hamilton cycl. This improvs

More information

The Equitable Dominating Graph

The Equitable Dominating Graph Intrnational Journal of Enginring Rsarch and Tchnology. ISSN 0974-3154 Volum 8, Numbr 1 (015), pp. 35-4 Intrnational Rsarch Publication Hous http://www.irphous.com Th Equitabl Dominating Graph P.N. Vinay

More information

22/ Breakdown of the Born-Oppenheimer approximation. Selection rules for rotational-vibrational transitions. P, R branches.

22/ Breakdown of the Born-Oppenheimer approximation. Selection rules for rotational-vibrational transitions. P, R branches. Subjct Chmistry Papr No and Titl Modul No and Titl Modul Tag 8/ Physical Spctroscopy / Brakdown of th Born-Oppnhimr approximation. Slction ruls for rotational-vibrational transitions. P, R branchs. CHE_P8_M

More information

2.3 Matrix Formulation

2.3 Matrix Formulation 23 Matrix Formulation 43 A mor complicatd xampl ariss for a nonlinar systm of diffrntial quations Considr th following xampl Exampl 23 x y + x( x 2 y 2 y x + y( x 2 y 2 (233 Transforming to polar coordinats,

More information

NEW APPLICATIONS OF THE ABEL-LIOUVILLE FORMULA

NEW APPLICATIONS OF THE ABEL-LIOUVILLE FORMULA NE APPLICATIONS OF THE ABEL-LIOUVILLE FORMULA Mirca I CÎRNU Ph Dp o Mathmatics III Faculty o Applid Scincs Univrsity Polithnica o Bucharst Cirnumirca @yahoocom Abstract In a rcnt papr [] 5 th indinit intgrals

More information

Homotopy perturbation technique

Homotopy perturbation technique Comput. Mthods Appl. Mch. Engrg. 178 (1999) 257±262 www.lsvir.com/locat/cma Homotopy prturbation tchniqu Ji-Huan H 1 Shanghai Univrsity, Shanghai Institut of Applid Mathmatics and Mchanics, Shanghai 272,

More information

CS 361 Meeting 12 10/3/18

CS 361 Meeting 12 10/3/18 CS 36 Mting 2 /3/8 Announcmnts. Homwork 4 is du Friday. If Friday is Mountain Day, homwork should b turnd in at my offic or th dpartmnt offic bfor 4. 2. Homwork 5 will b availabl ovr th wknd. 3. Our midtrm

More information

Chapter 6 Folding. Folding

Chapter 6 Folding. Folding Chaptr 6 Folding Wintr 1 Mokhtar Abolaz Folding Th folding transformation is usd to systmatically dtrmin th control circuits in DSP architctur whr multipl algorithm oprations ar tim-multiplxd to a singl

More information

Learning Spherical Convolution for Fast Features from 360 Imagery

Learning Spherical Convolution for Fast Features from 360 Imagery Larning Sphrical Convolution for Fast Faturs from 36 Imagry Anonymous Author(s) 3 4 5 6 7 8 9 3 4 5 6 7 8 9 3 4 5 6 7 8 9 3 3 3 33 34 35 In this fil w provid additional dtails to supplmnt th main papr

More information

SCHUR S THEOREM REU SUMMER 2005

SCHUR S THEOREM REU SUMMER 2005 SCHUR S THEOREM REU SUMMER 2005 1. Combinatorial aroach Prhas th first rsult in th subjct blongs to I. Schur and dats back to 1916. On of his motivation was to study th local vrsion of th famous quation

More information

10. The Discrete-Time Fourier Transform (DTFT)

10. The Discrete-Time Fourier Transform (DTFT) Th Discrt-Tim Fourir Transform (DTFT Dfinition of th discrt-tim Fourir transform Th Fourir rprsntation of signals plays an important rol in both continuous and discrt signal procssing In this sction w

More information

That is, we start with a general matrix: And end with a simpler matrix:

That is, we start with a general matrix: And end with a simpler matrix: DIAGON ALIZATION OF THE STR ESS TEN SOR INTRO DUCTIO N By th us of Cauchy s thorm w ar abl to rduc th numbr of strss componnts in th strss tnsor to only nin valus. An additional simplification of th strss

More information

Problem Set 6 Solutions

Problem Set 6 Solutions 6.04/18.06J Mathmatics for Computr Scinc March 15, 005 Srini Dvadas and Eric Lhman Problm St 6 Solutions Du: Monday, March 8 at 9 PM in Room 3-044 Problm 1. Sammy th Shark is a financial srvic providr

More information

4037 ADDITIONAL MATHEMATICS

4037 ADDITIONAL MATHEMATICS CAMBRIDGE INTERNATIONAL EXAMINATIONS GCE Ordinary Lvl MARK SCHEME for th Octobr/Novmbr 0 sris 40 ADDITIONAL MATHEMATICS 40/ Papr, maimum raw mark 80 This mark schm is publishd as an aid to tachrs and candidats,

More information

Approximation and Inapproximation for The Influence Maximization Problem in Social Networks under Deterministic Linear Threshold Model

Approximation and Inapproximation for The Influence Maximization Problem in Social Networks under Deterministic Linear Threshold Model 20 3st Intrnational Confrnc on Distributd Computing Systms Workshops Approximation and Inapproximation for Th Influnc Maximization Problm in Social Ntworks undr Dtrministic Linar Thrshold Modl Zaixin Lu,

More information

Types of Transfer Functions. Types of Transfer Functions. Types of Transfer Functions. Ideal Filters. Ideal Filters

Types of Transfer Functions. Types of Transfer Functions. Types of Transfer Functions. Ideal Filters. Ideal Filters Typs of Transfr Typs of Transfr x[n] X( LTI h[n] H( y[n] Y( y [ n] h[ k] x[ n k] k Y ( H ( X ( Th tim-domain classification of an LTI digital transfr function is basd on th lngth of its impuls rspons h[n]:

More information

Quasi-Classical States of the Simple Harmonic Oscillator

Quasi-Classical States of the Simple Harmonic Oscillator Quasi-Classical Stats of th Simpl Harmonic Oscillator (Draft Vrsion) Introduction: Why Look for Eignstats of th Annihilation Oprator? Excpt for th ground stat, th corrspondnc btwn th quantum nrgy ignstats

More information

Economics 201b Spring 2010 Solutions to Problem Set 3 John Zhu

Economics 201b Spring 2010 Solutions to Problem Set 3 John Zhu Economics 20b Spring 200 Solutions to Problm St 3 John Zhu. Not in th 200 vrsion of Profssor Andrson s ctur 4 Nots, th charactrization of th firm in a Robinson Cruso conomy is that it maximizs profit ovr

More information

3-2-1 ANN Architecture

3-2-1 ANN Architecture ARTIFICIAL NEURAL NETWORKS (ANNs) Profssor Tom Fomby Dpartmnt of Economics Soutrn Mtodist Univrsity Marc 008 Artificial Nural Ntworks (raftr ANNs) can b usd for itr prdiction or classification problms.

More information

The graph of y = x (or y = ) consists of two branches, As x 0, y + ; as x 0, y +. x = 0 is the

The graph of y = x (or y = ) consists of two branches, As x 0, y + ; as x 0, y +. x = 0 is the Copyright itutcom 005 Fr download & print from wwwitutcom Do not rproduc by othr mans Functions and graphs Powr functions Th graph of n y, for n Q (st of rational numbrs) y is a straight lin through th

More information

On spanning trees and cycles of multicolored point sets with few intersections

On spanning trees and cycles of multicolored point sets with few intersections On spanning trs and cycls of multicolord point sts with fw intrsctions M. Kano, C. Mrino, and J. Urrutia April, 00 Abstract Lt P 1,..., P k b a collction of disjoint point sts in R in gnral position. W

More information

Data Assimilation 1. Alan O Neill National Centre for Earth Observation UK

Data Assimilation 1. Alan O Neill National Centre for Earth Observation UK Data Assimilation 1 Alan O Nill National Cntr for Earth Obsrvation UK Plan Motivation & basic idas Univariat (scalar) data assimilation Multivariat (vctor) data assimilation 3d-Variational Mthod (& optimal

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, April 04, 2005, 8:35 AM) PART I: CHAPTER TWO COMB MATH.

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, April 04, 2005, 8:35 AM) PART I: CHAPTER TWO COMB MATH. C:\Dallas\0_Courss\03A_OpSci_67\0 Cgh_Book\0_athmaticalPrliminaris\0_0 Combath.doc of 8 COPUTER GENERATED HOLOGRAS Optical Scincs 67 W.J. Dallas (onday, April 04, 005, 8:35 A) PART I: CHAPTER TWO COB ATH

More information

Week 3: Connected Subgraphs

Week 3: Connected Subgraphs Wk 3: Connctd Subgraphs Sptmbr 19, 2016 1 Connctd Graphs Path, Distanc: A path from a vrtx x to a vrtx y in a graph G is rfrrd to an xy-path. Lt X, Y V (G). An (X, Y )-path is an xy-path with x X and y

More information

Strongly Connected Components

Strongly Connected Components Strongly Connctd Componnts Lt G = (V, E) b a dirctd graph Writ if thr is a path from to in G Writ if and is an quivalnc rlation: implis and implis s quivalnc classs ar calld th strongly connctd componnts

More information

Abstract Interpretation: concrete and abstract semantics

Abstract Interpretation: concrete and abstract semantics Abstract Intrprtation: concrt and abstract smantics Concrt smantics W considr a vry tiny languag that manags arithmtic oprations on intgrs valus. Th (concrt) smantics of th languags cab b dfind by th funzcion

More information

Einstein Equations for Tetrad Fields

Einstein Equations for Tetrad Fields Apiron, Vol 13, No, Octobr 006 6 Einstin Equations for Ttrad Filds Ali Rıza ŞAHİN, R T L Istanbul (Turky) Evry mtric tnsor can b xprssd by th innr product of ttrad filds W prov that Einstin quations for

More information

Exam 1. It is important that you clearly show your work and mark the final answer clearly, closed book, closed notes, no calculator.

Exam 1. It is important that you clearly show your work and mark the final answer clearly, closed book, closed notes, no calculator. Exam N a m : _ S O L U T I O N P U I D : I n s t r u c t i o n s : It is important that you clarly show your work and mark th final answr clarly, closd book, closd nots, no calculator. T i m : h o u r

More information

Fourier Transforms and the Wave Equation. Key Mathematics: More Fourier transform theory, especially as applied to solving the wave equation.

Fourier Transforms and the Wave Equation. Key Mathematics: More Fourier transform theory, especially as applied to solving the wave equation. Lur 7 Fourir Transforms and th Wav Euation Ovrviw and Motivation: W first discuss a fw faturs of th Fourir transform (FT), and thn w solv th initial-valu problm for th wav uation using th Fourir transform

More information

Inter-Packet Symbol Approach To Reed-Solomon FEC Codes For RTP-Multimedia Stream Protection

Inter-Packet Symbol Approach To Reed-Solomon FEC Codes For RTP-Multimedia Stream Protection Intr-Packt Symbol Approach To Rd-Solomon FEC Cods For RTP-Multimdia Stram Protction Filippo Casu, Julián Cabrra, Frnando Jaurguizar, Narciso García Grupo d Trataminto d Imágns Univrsidad Politécnica d

More information

Where k is either given or determined from the data and c is an arbitrary constant.

Where k is either given or determined from the data and c is an arbitrary constant. Exponntial growth and dcay applications W wish to solv an quation that has a drivativ. dy ky k > dx This quation says that th rat of chang of th function is proportional to th function. Th solution is

More information

Answer Homework 5 PHA5127 Fall 1999 Jeff Stark

Answer Homework 5 PHA5127 Fall 1999 Jeff Stark Answr omwork 5 PA527 Fall 999 Jff Stark A patint is bing tratd with Drug X in a clinical stting. Upon admiion, an IV bolus dos of 000mg was givn which yildd an initial concntration of 5.56 µg/ml. A fw

More information

Network Congestion Games

Network Congestion Games Ntwork Congstion Gams Assistant Profssor Tas A&M Univrsity Collg Station, TX TX Dallas Collg Station Austin Houston Bst rout dpnds on othrs Ntwork Congstion Gams Travl tim incrass with congstion Highway

More information

4 x 4, and. where x is Town Square

4 x 4, and. where x is Town Square Accumulation and Population Dnsity E. A city locatd along a straight highway has a population whos dnsity can b approimatd by th function p 5 4 th distanc from th town squar, masurd in mils, whr 4 4, and

More information

On the irreducibility of some polynomials in two variables

On the irreducibility of some polynomials in two variables ACTA ARITHMETICA LXXXII.3 (1997) On th irrducibility of som polynomials in two variabls by B. Brindza and Á. Pintér (Dbrcn) To th mmory of Paul Erdős Lt f(x) and g(y ) b polynomials with intgral cofficints

More information

Limiting value of higher Mahler measure

Limiting value of higher Mahler measure Limiting valu of highr Mahlr masur Arunabha Biswas a, Chris Monico a, a Dpartmnt of Mathmatics & Statistics, Txas Tch Univrsity, Lubbock, TX 7949, USA Abstract W considr th k-highr Mahlr masur m k P )

More information

Derangements and Applications

Derangements and Applications 2 3 47 6 23 Journal of Intgr Squncs, Vol. 6 (2003), Articl 03..2 Drangmnts and Applications Mhdi Hassani Dpartmnt of Mathmatics Institut for Advancd Studis in Basic Scincs Zanjan, Iran mhassani@iasbs.ac.ir

More information

Propositional Logic. Combinatorial Problem Solving (CPS) Albert Oliveras Enric Rodríguez-Carbonell. May 17, 2018

Propositional Logic. Combinatorial Problem Solving (CPS) Albert Oliveras Enric Rodríguez-Carbonell. May 17, 2018 Propositional Logic Combinatorial Problm Solving (CPS) Albrt Olivras Enric Rodríguz-Carbonll May 17, 2018 Ovrviw of th sssion Dfinition of Propositional Logic Gnral Concpts in Logic Rduction to SAT CNFs

More information

MEASURING HEAT FLUX FROM A COMPONENT ON A PCB

MEASURING HEAT FLUX FROM A COMPONENT ON A PCB MEASURING HEAT FLUX FROM A COMPONENT ON A PCB INTRODUCTION Elctronic circuit boards consist of componnts which gnrats substantial amounts of hat during thir opration. A clar knowldg of th lvl of hat dissipation

More information

Application of Vague Soft Sets in students evaluation

Application of Vague Soft Sets in students evaluation Availabl onlin at www.plagiarsarchlibrary.com Advancs in Applid Scinc Rsarch, 0, (6):48-43 ISSN: 0976-860 CODEN (USA): AASRFC Application of Vagu Soft Sts in studnts valuation B. Chtia*and P. K. Das Dpartmnt

More information

EEO 401 Digital Signal Processing Prof. Mark Fowler

EEO 401 Digital Signal Processing Prof. Mark Fowler EEO 401 Digital Signal Procssing Prof. Mark Fowlr Dtails of th ot St #19 Rading Assignmnt: Sct. 7.1.2, 7.1.3, & 7.2 of Proakis & Manolakis Dfinition of th So Givn signal data points x[n] for n = 0,, -1

More information

Coupled Pendulums. Two normal modes.

Coupled Pendulums. Two normal modes. Tim Dpndnt Two Stat Problm Coupld Pndulums Wak spring Two normal mods. No friction. No air rsistanc. Prfct Spring Start Swinging Som tim latr - swings with full amplitud. stationary M +n L M +m Elctron

More information

EXST Regression Techniques Page 1

EXST Regression Techniques Page 1 EXST704 - Rgrssion Tchniqus Pag 1 Masurmnt rrors in X W hav assumd that all variation is in Y. Masurmnt rror in this variabl will not ffct th rsults, as long as thy ar uncorrlatd and unbiasd, sinc thy

More information

CPSC 665 : An Algorithmist s Toolkit Lecture 4 : 21 Jan Linear Programming

CPSC 665 : An Algorithmist s Toolkit Lecture 4 : 21 Jan Linear Programming CPSC 665 : An Algorithmist s Toolkit Lctur 4 : 21 Jan 2015 Lcturr: Sushant Sachdva Linar Programming Scrib: Rasmus Kyng 1. Introduction An optimization problm rquirs us to find th minimum or maximum) of

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July ISSN Intrnational Journal of Scintific & Enginring Rsarch, Volum 6, Issu 7, July-25 64 ISSN 2229-558 HARATERISTIS OF EDGE UTSET MATRIX OF PETERSON GRAPH WITH ALGEBRAI GRAPH THEORY Dr. G. Nirmala M. Murugan

More information

Difference -Analytical Method of The One-Dimensional Convection-Diffusion Equation

Difference -Analytical Method of The One-Dimensional Convection-Diffusion Equation Diffrnc -Analytical Mthod of Th On-Dimnsional Convction-Diffusion Equation Dalabav Umurdin Dpartmnt mathmatic modlling, Univrsity of orld Economy and Diplomacy, Uzbistan Abstract. An analytical diffrncing

More information

3 Finite Element Parametric Geometry

3 Finite Element Parametric Geometry 3 Finit Elmnt Paramtric Gomtry 3. Introduction Th intgral of a matrix is th matrix containing th intgral of ach and vry on of its original componnts. Practical finit lmnt analysis rquirs intgrating matrics,

More information

MCE503: Modeling and Simulation of Mechatronic Systems Discussion on Bond Graph Sign Conventions for Electrical Systems

MCE503: Modeling and Simulation of Mechatronic Systems Discussion on Bond Graph Sign Conventions for Electrical Systems MCE503: Modling and Simulation o Mchatronic Systms Discussion on Bond Graph Sign Convntions or Elctrical Systms Hanz ichtr, PhD Clvland Stat Univrsity, Dpt o Mchanical Enginring 1 Basic Assumption In a

More information

Lecture 37 (Schrödinger Equation) Physics Spring 2018 Douglas Fields

Lecture 37 (Schrödinger Equation) Physics Spring 2018 Douglas Fields Lctur 37 (Schrödingr Equation) Physics 6-01 Spring 018 Douglas Filds Rducd Mass OK, so th Bohr modl of th atom givs nrgy lvls: E n 1 k m n 4 But, this has on problm it was dvlopd assuming th acclration

More information

ECE602 Exam 1 April 5, You must show ALL of your work for full credit.

ECE602 Exam 1 April 5, You must show ALL of your work for full credit. ECE62 Exam April 5, 27 Nam: Solution Scor: / This xam is closd-book. You must show ALL of your work for full crdit. Plas rad th qustions carfully. Plas chck your answrs carfully. Calculators may NOT b

More information

1 General boundary conditions in diffusion

1 General boundary conditions in diffusion Gnral boundary conditions in diffusion Πρόβλημα 4.8 : Δίνεται μονοδιάτατη πλάκα πάχους, που το ένα άκρο της κρατιέται ε θερμοκραία T t και το άλλο ε θερμοκραία T 2 t. Αν η αρχική θερμοκραία της πλάκας

More information

COHORT MBA. Exponential function. MATH review (part2) by Lucian Mitroiu. The LOG and EXP functions. Properties: e e. lim.

COHORT MBA. Exponential function. MATH review (part2) by Lucian Mitroiu. The LOG and EXP functions. Properties: e e. lim. MTH rviw part b Lucian Mitroiu Th LOG and EXP functions Th ponntial function p : R, dfind as Proprtis: lim > lim p Eponntial function Y 8 6 - -8-6 - - X Th natural logarithm function ln in US- log: function

More information

Middle East Technical University Department of Mechanical Engineering ME 413 Introduction to Finite Element Analysis

Middle East Technical University Department of Mechanical Engineering ME 413 Introduction to Finite Element Analysis Middl East Tchnical Univrsity Dpartmnt of Mchanical Enginring ME 43 Introduction to Finit Elmnt Analysis Chaptr 3 Computr Implmntation of D FEM Ths nots ar prpard by Dr. Cünyt Srt http://www.m.mtu.du.tr/popl/cunyt

More information

Partition Information and its Transmission over Boolean Multi-Access Channels

Partition Information and its Transmission over Boolean Multi-Access Channels Partition Information and its Transmission ovr Boolan Multi-Accss Channls Shuhang Wu, Shuangqing Wi, Yu Wang, Ramachandran Vaidyanathan and Jian Yuan 1 arxiv:1404.0425v2 [cs.it] 19 Jul 2014 Abstract In

More information

Recall that by Theorems 10.3 and 10.4 together provide us the estimate o(n2 ), S(q) q 9, q=1

Recall that by Theorems 10.3 and 10.4 together provide us the estimate o(n2 ), S(q) q 9, q=1 Chaptr 11 Th singular sris Rcall that by Thorms 10 and 104 togthr provid us th stimat 9 4 n 2 111 Rn = SnΓ 2 + on2, whr th singular sris Sn was dfind in Chaptr 10 as Sn = q=1 Sq q 9, with Sq = 1 a q gcda,q=1

More information

7' The growth of yeast, a microscopic fungus used to make bread, in a test tube can be

7' The growth of yeast, a microscopic fungus used to make bread, in a test tube can be N Sction A: Pur Mathmatics 55 marks] / Th rgion R is boundd by th curv y, th -ais, and th lins = V - +7 and = m, whr m >. Find th volum gnratd whn R is rotatd through right angls about th -ais, laving

More information

Symmetric centrosymmetric matrix vector multiplication

Symmetric centrosymmetric matrix vector multiplication Linar Algbra and its Applications 320 (2000) 193 198 www.lsvir.com/locat/laa Symmtric cntrosymmtric matrix vctor multiplication A. Mlman 1 Dpartmnt of Mathmatics, Univrsity of San Francisco, San Francisco,

More information

Solution: APPM 1360 Final (150 pts) Spring (60 pts total) The following parts are not related, justify your answers:

Solution: APPM 1360 Final (150 pts) Spring (60 pts total) The following parts are not related, justify your answers: APPM 6 Final 5 pts) Spring 4. 6 pts total) Th following parts ar not rlatd, justify your answrs: a) Considr th curv rprsntd by th paramtric quations, t and y t + for t. i) 6 pts) Writ down th corrsponding

More information

Text: WMM, Chapter 5. Sections , ,

Text: WMM, Chapter 5. Sections , , Lcturs 6 - Continuous Probabilit Distributions Tt: WMM, Chaptr 5. Sctions 6.-6.4, 6.6-6.8, 7.-7. In th prvious sction, w introduc som of th common probabilit distribution functions (PDFs) for discrt sampl

More information

Hardy-Littlewood Conjecture and Exceptional real Zero. JinHua Fei. ChangLing Company of Electronic Technology Baoji Shannxi P.R.

Hardy-Littlewood Conjecture and Exceptional real Zero. JinHua Fei. ChangLing Company of Electronic Technology Baoji Shannxi P.R. Hardy-Littlwood Conjctur and Excptional ral Zro JinHua Fi ChangLing Company of Elctronic Tchnology Baoji Shannxi P.R.China E-mail: fijinhuayoujian@msn.com Abstract. In this papr, w assum that Hardy-Littlwood

More information

5.80 Small-Molecule Spectroscopy and Dynamics

5.80 Small-Molecule Spectroscopy and Dynamics MIT OpnCoursWar http://ocw.mit.du 5.80 Small-Molcul Spctroscopy and Dynamics Fall 008 For information about citing ths matrials or our Trms of Us, visit: http://ocw.mit.du/trms. Lctur # 3 Supplmnt Contnts

More information

Linear-Phase FIR Transfer Functions. Functions. Functions. Functions. Functions. Functions. Let

Linear-Phase FIR Transfer Functions. Functions. Functions. Functions. Functions. Functions. Let It is impossibl to dsign an IIR transfr function with an xact linar-phas It is always possibl to dsign an FIR transfr function with an xact linar-phas rspons W now dvlop th forms of th linarphas FIR transfr

More information

Self-Adjointness and Its Relationship to Quantum Mechanics. Ronald I. Frank 2016

Self-Adjointness and Its Relationship to Quantum Mechanics. Ronald I. Frank 2016 Ronald I. Frank 06 Adjoint https://n.wikipdia.org/wiki/adjoint In gnral thr is an oprator and a procss that dfin its adjoint *. It is thn slf-adjoint if *. Innr product spac https://n.wikipdia.org/wiki/innr_product_spac

More information

ph People Grade Level: basic Duration: minutes Setting: classroom or field site

ph People Grade Level: basic Duration: minutes Setting: classroom or field site ph Popl Adaptd from: Whr Ar th Frogs? in Projct WET: Curriculum & Activity Guid. Bozman: Th Watrcours and th Council for Environmntal Education, 1995. ph Grad Lvl: basic Duration: 10 15 minuts Stting:

More information

What are those βs anyway? Understanding Design Matrix & Odds ratios

What are those βs anyway? Understanding Design Matrix & Odds ratios Ral paramtr stimat WILD 750 - Wildlif Population Analysis of 6 What ar thos βs anyway? Undrsting Dsign Matrix & Odds ratios Rfrncs Hosmr D.W.. Lmshow. 000. Applid logistic rgrssion. John Wily & ons Inc.

More information

Image Filtering: Noise Removal, Sharpening, Deblurring. Yao Wang Polytechnic University, Brooklyn, NY11201

Image Filtering: Noise Removal, Sharpening, Deblurring. Yao Wang Polytechnic University, Brooklyn, NY11201 Imag Filtring: Nois Rmoval, Sharpning, Dblurring Yao Wang Polytchnic Univrsity, Brooklyn, NY http://wb.poly.du/~yao Outlin Nois rmoval by avraging iltr Nois rmoval by mdian iltr Sharpning Edg nhancmnt

More information

Thus, because if either [G : H] or [H : K] is infinite, then [G : K] is infinite, then [G : K] = [G : H][H : K] for all infinite cases.

Thus, because if either [G : H] or [H : K] is infinite, then [G : K] is infinite, then [G : K] = [G : H][H : K] for all infinite cases. Homwork 5 M 373K Solutions Mark Lindbrg and Travis Schdlr 1. Prov that th ring Z/mZ (for m 0) is a fild if and only if m is prim. ( ) Proof by Contrapositiv: Hr, thr ar thr cass for m not prim. m 0: Whn

More information

BINOMIAL COEFFICIENTS INVOLVING INFINITE POWERS OF PRIMES. 1. Statement of results

BINOMIAL COEFFICIENTS INVOLVING INFINITE POWERS OF PRIMES. 1. Statement of results BINOMIAL COEFFICIENTS INVOLVING INFINITE POWERS OF PRIMES DONALD M. DAVIS Abstract. If p is a prim and n a positiv intgr, lt ν p (n dnot th xponnt of p in n, and u p (n n/p νp(n th unit part of n. If α

More information

Types of Transfer Functions. Types of Transfer Functions. Ideal Filters. Ideal Filters. Ideal Filters

Types of Transfer Functions. Types of Transfer Functions. Ideal Filters. Ideal Filters. Ideal Filters Typs of Transfr Typs of Transfr Th tim-domain classification of an LTI digital transfr function squnc is basd on th lngth of its impuls rspons: - Finit impuls rspons (FIR) transfr function - Infinit impuls

More information

There is an arbitrary overall complex phase that could be added to A, but since this makes no difference we set it to zero and choose A real.

There is an arbitrary overall complex phase that could be added to A, but since this makes no difference we set it to zero and choose A real. Midtrm #, Physics 37A, Spring 07. Writ your rsponss blow or on xtra pags. Show your work, and tak car to xplain what you ar doing; partial crdit will b givn for incomplt answrs that dmonstrat som concptual

More information

Machine Detector Interface Workshop: ILC-SLAC, January 6-8, 2005.

Machine Detector Interface Workshop: ILC-SLAC, January 6-8, 2005. Intrnational Linar Collidr Machin Dtctor Intrfac Workshop: ILCSLAC, January 68, 2005. Prsntd by Brtt Parkr, BNLSMD Mssag: Tools ar now availabl to optimiz IR layout with compact suprconducting quadrupols

More information

Deift/Zhou Steepest descent, Part I

Deift/Zhou Steepest descent, Part I Lctur 9 Dift/Zhou Stpst dscnt, Part I W now focus on th cas of orthogonal polynomials for th wight w(x) = NV (x), V (x) = t x2 2 + x4 4. Sinc th wight dpnds on th paramtr N N w will writ π n,n, a n,n,

More information

Content Based Status Updates

Content Based Status Updates Contnt Basd Status Updats li Najm LTHI, PFL, Lausann, Switzrland mail: li.najm@pfl.ch Rajai Nassr LTHI, PFL, Lausann, Switzrland mail: rajai.nassr@pfl.ch mr Tlatar LTHI, PFL, Lausann, Switzrland mail:

More information

PROOF OF FIRST STANDARD FORM OF NONELEMENTARY FUNCTIONS

PROOF OF FIRST STANDARD FORM OF NONELEMENTARY FUNCTIONS Intrnational Journal Of Advanc Rsarch In Scinc And Enginring http://www.ijars.com IJARSE, Vol. No., Issu No., Fbruary, 013 ISSN-319-8354(E) PROOF OF FIRST STANDARD FORM OF NONELEMENTARY FUNCTIONS 1 Dharmndra

More information

ECE 407 Computer Aided Design for Electronic Systems. Instructor: Maria K. Michael. Overview. CAD tools for multi-level logic synthesis:

ECE 407 Computer Aided Design for Electronic Systems. Instructor: Maria K. Michael. Overview. CAD tools for multi-level logic synthesis: 407 Computr Aidd Dsign for Elctronic Systms Multi-lvl Logic Synthsis Instructor: Maria K. Michal 1 Ovrviw Major Synthsis Phass Logic Synthsis: 2-lvl Multi-lvl FSM CAD tools for multi-lvl logic synthsis:

More information

COUNTING TAMELY RAMIFIED EXTENSIONS OF LOCAL FIELDS UP TO ISOMORPHISM

COUNTING TAMELY RAMIFIED EXTENSIONS OF LOCAL FIELDS UP TO ISOMORPHISM COUNTING TAMELY RAMIFIED EXTENSIONS OF LOCAL FIELDS UP TO ISOMORPHISM Jim Brown Dpartmnt of Mathmatical Scincs, Clmson Univrsity, Clmson, SC 9634, USA jimlb@g.clmson.du Robrt Cass Dpartmnt of Mathmatics,

More information