Counting Parameterized Border Arrays for a Binary Alphabet

Size: px
Start display at page:

Download "Counting Parameterized Border Arrays for a Binary Alphabet"

Transcription

1 Counting Parameterized Border Array for a Binary Alphabet Tomohiro I 1, Shunuke Inenaga 2, Hideo Bannai 1, and Maayuki Takeda 1 1 Department of Informatic, Kyuhu Univerity 2 Graduate School of Information Science and Electrical Engineering, Kyuhu Univerity 744 Motooka, Nihiku, Fukuoka, Japan. {tomohiro.i,bannai,takeda}@i.kyuhu-u.ac.jp inenaga@c.cce.kyuhu-u.ac.jp Abtract. The parameterized pattern matching problem i a kind of pattern matching problem, where a pattern i conidered to occur in a text when there exit a renaming bijection on the alphabet with which the pattern can be tranformed into a ubtring of the text. A parameterized border array (p-border array) i an analogue of a border array of a tandard tring, which i alo known a the failure function of the Morri-Pratt pattern matching algorithm. In thi paper we preent a linear time algorithm to verify if a given integer array i a valid p-border array for a binary alphabet. We alo how a linear time algorithm to compute all binary parameterized tring haring a given p-border array. In addition, we give an algorithm which compute all p-border array of length at mot n, where n i a a given threhold. Thi algorithm run in time linear in the number of output p-border array. 1 Introduction 1.1 Parameterized Matching and Parameterized Border Array The parameterized matching (p-matching) problem [1] i a kind of tring matching problem, where a pattern i conidered to occur in a text when there exit a renaming bijection on the alphabet with which the pattern can be tranformed into a ubtring of the text. A parameterized tring (p-tring) i formally an element of (Π Σ), where Π i the et of parameter ymbol and Σ the et of contant ymbol. The renaming bijection ued in p-matching are the identity on Σ, that i, every contant ymbol X Σ i mapped to X, while ymbol in Π can be interchanged. Parameterized matching ha application in oftware maintenance [2, 1], plagiarim detection [3], and RNA tructural matching [4], thu it ha been extenively tudied in the lat decade [5 12]. Of variou efficient method olving the p-matching problem, thi paper focue on the algorithm of Idury and Schäffer [13] that olve the p-matching problem for multiple pattern. Their algorithm modifie the Aho-Coraick automata [14], replacing the goto and fail function with the pgoto and pfail function, repectively. When the input i a ingle pattern p-tring of length m, the

2 2 T. I, S. Inenaga, H. Bannai, and M. Takeda pfail function can be implemented by an array of length m, and we call the array the parameterized border array (p-border array) of the pattern p-tring, which i the parameterized verion of the border array [15]. The p-border array of a given pattern can be computed in linear time [13]. 1.2 Revere and Enumerating Problem on String The revere problem for tandard border array [15] wa firt introduced by Franěk et al. [16]. They propoed a linear time algorithm to verify if a given integer array i the border array of ome tring. Their algorithm work for both bounded and unbounded alphabet. Duval et al. [17] propoed a impler algorithm to olve the ame problem in linear time for bounded alphabet. Moore et al. [18] preented an algorithm to enumerate all border array of length at mot n, where n i a given poitive integer. They propoed a notion of b-equivalence of tring uch that two tring are b-equivalent if they have the ame border array. The lexicographically mallet one of each b-equivalence cla i called b-canonical tring of the cla. Their algorithm i alo able to output all b-canonical tring of length up to a given integer n. Franěk et al. [16] pointed out that the time complexity analyi of [18] i incorrect, and howed a new algorithm which olve the ame problem in O(b n ) time uing O(b n ) pace, where b n denote the number of border array of length at mot n. The revere problem for ome other tring data tructure, uch a uffix array [19], directed acyclic word graph [20], directed acyclic ubequence graph [21] have been olved in linear time [22, 23]. The problem of enumerating all uffix array wa conidered in [24]. An algorithm to enumerate all p-ditinct tring wa propoed in [18], where two tring are aid to be p-ditinct if they do not parameterized-match. 1.3 Our Contribution Thi paper conider the reveral of the problem of computing the p-border array of a given pattern p-tring. That i, given an integer array α, determine if there exit a p-tring whoe p-border array i α. In thi paper, we preent a linear time algorithm which olve the above problem for a binary parameter alphabet ( Π = 2). We then conider a more challenging problem: given a poitive integer n, enumerate all p-border array of length at mot n. We propoe an algorithm that olve the enumerating problem in O(B n ) time for a binary parameter alphabet, where B n i the number of all p-border array of length n for a binary parameter alphabet. We alo give a imple algorithm to output all tring which hare the ame p-border array. A p-border i a dual concept of a parameterized period of a p-tring. Apotolico and Giancarlo [11] howed that a complete analogy to the weak periodicity lemma [25] tand for p-tring over a binary alphabet. Our reult reveal yet another imilarity of p-tring over a binary alphabet and tandard tring in term of periodicity.

3 2 Preliminarie Counting Parameterized Border Array for a Binary Alphabet Parameterized String Matching Let Σ and Π be two dijoint finite et of contant ymbol and parameter ymbol, repectively. An element of (Σ Π) i called a p-tring. The length of any p-tring i the total number of contant and parameter ymbol in and i denoted by. For any p-tring of length n, the i-th ymbol i denoted by [i] for each 1 i n, and the ubtring tarting at poition i and ending at poition j i denoted by [i : j] for 1 i j n. In particular, [1 : j] and [i : n] denote the prefix of length j and the uffix of length n i + 1 of, repectively. Any two p-tring and t of the ame length m are aid to parameterized match if can be tranformed into t by applying a renaming function f from the ymbol of to the ymbol of t, uch that f i the identity on the contant alphabet. For example, let Π = {a, b, c}, Σ = {X, Y}, = abcxaby and t = bcaxbcy. We then have t with the renaming function f uch that f(a) = b, f(b) = c, f(c) = a, f(x) = X, and f(y) = Y. We write t when and t p-match. Amir et al. [5] howed that we have only to conider p-tring over Π when conidering p-matching. Lemma 1 ([5]). The p-matching problem on alphabet Σ Π i reducible in linear time to the p-matching problem on alphabet Π. 2.2 Parameterized Border Array A in the cae of tandard tring matching, we can define the parameterized border (p-border) and the parameterized border array (p-border array). Definition 1. A parameterized border ( p-border) of a p-tring of length n i any integer j uch that 0 j < n and [1 : j] [n j + 1 : n]. For example, the et of p-border of p-tring aabbaa i {4, 2, 1, 0}, ince aabb bbaa, aa aa, a a, and ε ε. Definition 2. The parameterized border array ( p-border array) β of any p- tring of length n i an array of length n uch that β [i] = j, where j i the longet p-border of [1 : i]. For example, the p-border array of p-tring aabbaa i [0, 1, 1, 2, 3, 4]. When it i clear from the context, we abbreviate β a β. The p-border array β of p-tring wa firt explicitly introduced by Idury and Schäffer [13] a the pfail function, where the pfail function i ued in their Aho-Coraick [14] type algorithm that olve the p-matching problem for multiple pattern. Given a pattern p-tring p of length m, the p-border array β p can be computed in O(m log Π ) time, and the p-matching problem can be olved in O(n log Π ) time for any text p-tring of length n.

4 4 T. I, S. Inenaga, H. Bannai, and M. Takeda 2.3 Problem Thi paper deal with the following problem. Problem 1 (Verifying valid p-border array). Given an integer array α of length n, determine if there exit a p-tring uch that β = α. Problem 2 (Computing all p-tring haring the ame p-border array). Given an integer array α which i a valid p-border array, compute every p-tring uch that β = α. Problem 3 (Computing all p-border array). Given a poitive integer n, compute all p-border array of length at mot n. In the following ection, we give efficient olution to the above problem for a binary alphabet, that i, Π = 2. 3 Algorithm Thi ection preent our algorithm which olve Problem 1, Problem 2 and Problem 3 for the cae Π = 2. We begin with the baic propoition on p-border array. Propoition 1. For any p-border array β[1..i] of length i 2, β[1..i 1] i a p-border array of length i 1. Proof. Let be any p-tring uch that β = β. It i clear from Definition 2 that β [1..i 1] i the p-border array of the p-tring [1 : i 1]. Due to the above propoition, given an integer array α[1..n], we can check if it i a p-border array of ome tring of length n by teting each element of α in increaing order (from 1 to n). If we find any 1 i n uch that α[1..i] i not a p-border array of length i, then α[1..n] can never be a p-border of length n. In what follow, we how how to check each element of a given integer array in increaing order. For any p-border array β of length n and any integer 1 i n, let { β k β[i] if k = 1, [i] = β[β k 1 [i]] if k > 1 and β k 1 [i] 1. It follow from Definition 2 that the equence i, β[i], β 2 [i],... i monotone decreaing to zero, hence finite. Lemma 2. For any p-tring of length i, {β 1 [i], β 2 [i],..., 0} i the et of the p-border of.

5 Counting Parameterized Border Array for a Binary Alphabet 5 Proof. Firt we how by induction that for every k, 1 k k, β k [i] i a p- border of, where k i the integer uch that β k [i] = 0. By Definition 2, β[i] 1 i the longet p-border of. Suppoe that for ome k, 1 k < k, β k [i] i a p-border of. Here β k+1 [i] i the longet p-border of β k [i]. Let f and g be the bijection uch that Since f([1])f([2]) f([β k [i]]) = [i β k [i] + 1 : i], g([1])g([2]) g([β k+1 [i]]) = [β k [i] β k+1 [i] + 1 : β k [i]]. f(g([1]))f(g([2])) f(g([β k+1 [i]])) = f([β k [i] β k+1 [i] + 1])f([β k [i] β k+1 [i] + 2]) f([β k [i]]) = [i β k+1 [i] + 1 : i], we obtain [1 : β k+1 [i]] [i β k+1 [i] + 1 : i]. Hence β k+1 [i] i a p-border of. We now how any other j i not a p-border of. Aume for contrary that j, β k+1 Since [i] < j < β k [i], i a p-border of. Let q be the bijection uch that q([i j + 1])q([i j + 2]) q([i]) = [1 : j]. q(f([β k [i] j + 1]))q(f([β k [i] j + 2])) q(f([β k [i]])) = q([i j + 1])q([i j + 2]) q([i]) = [1 : j], we obtain [1 : j] [β k [i] j + 1 : β k [i]]. Hence j i a p-border of [1 : β k [i]]. However thi contradict with the definition that β k+1 [i] i the longet p-border of [1 : β k [i]]. Lemma 3. For any p-tring of length i 1 and a Π, every p-border of a i an element of the et {β 1 [i] + 1, β 2 [i] + 1,..., 1}. Proof. Aume for contrary that a ha a p-border j + 1 / {β[i] 1 + 1, β[i] 2 + 1,..., 1}. Since [1 : j + 1] [i j + 1 : i]a, we have [1 : j] [i j + 1 : i] and j i a p-border of. It follow from Lemma 2 that j {β[i], 1 β[i], 2..., 0}. Thi contradict with the aumption. Baed on Lemma 2 and Lemma 3, we can efficiently compute the p-border array β of a given p-tring. Alo, our algorithm to olve Problem 1 i baed on thee lemma. Note that Propoition 1, Lemma 2 and Lemma 3 hold for p-tring over Π of arbitrary ize. In the equel we how how to elect m {β 1 [i] + 1, β 2 [i] + 1,..., 1} uch that β [1..i]m i a valid p-border array of length i + 1. The following propoition, lemma and theorem hold for a binary parameter alphabet, Π = 2. For p-border array of length at mot 2, we have the next propoition.

6 6 T. I, S. Inenaga, H. Bannai, and M. Takeda i a f β h-1[i]+1 g f β h[i]+1 Fig. 1. Illutration for Lemma 5. Propoition 2. For any p-tring of length 1, β [1] = 0. For any p-tring of length 2, β [2] = 1. Proof. Let Π = {a, b}. It i clear that the longet p-border of a and b i 0. The p-tring of length 2 over Π are aa, ab, ba, and bb. Obviouly the longet p-border of each of them i 1. For p-border array of length more than 2, we have the following lemma. Lemma 4. For any p-tring Π, if j 2 i a p-border of a with a Π, then j i not a p-border of b, where b Π {a}. Proof. Aume for contrary that j i a p-border of b. Then, let f and g be the bijection on Π uch that f([1])f([2]) f([j]) = [i j + 2 : i]a, g([1])g([2]) g([j]) = [i j + 2 : i]b. We get from f([1])f([2]) f([j 1]) = [i j+2 : i] = g([1])f([2]) g([j 1]) that f and g are the ame bijection. However, f([j]) = a b = g([j]) implie that f and g are different bijection, a contradiction. Hence j i not a p-border of b. Lemma 5. For any p-tring of length i, if β [β h 1 [i] + 1] = β h [i] + 1 and [i] + 1 i a p-border of a with a Π, then β h [i] + 1 i a p-border of a. β h 1 (See alo Fig. 1.) Proof. Let f and g be the bijection on Π uch that Since f([1])f([2]) f([β h 1 [i] + 1]) = [i β h 1 [i] + 1 : i]a, g([1])g([2]) g([β h [i] + 1]) = [β h 1 [i] β h [i] + 1 : β h 1 [i] + 1]. f(g([1]))f(g([2])) f(g([β h [i] + 1])) = f([β h 1 [i] β h [i] + 1])f([β h 1 [i] β h [i] + 2]) f([β h 1 [i] + 1]) = [i β h [i] + 1 : i]a,

7 Counting Parameterized Border Array for a Binary Alphabet 7 i a f β h-1[i]+1 q f β h[i] q f a q f b Fig. 2. Illutration for Lemma 6. we obtain [1 : β h [i] + 1] [i β h [i] + 1 : i]a. Hence β h [i] + 1 i a p-border of a. Lemma 6. For any p-tring of length i, if β [β h 1 [i] + 1] β h [i] + 1 and [i] + 1 i a p-border of a with a Π, then β h [i] + 1 i a p-border of b uch β h 1 that b Π {a}. (See alo Fig. 2.) Proof. Let f and g be the bijection on Π uch that f([1])f([2]) f([β h 1 [i] + 1]) = [i β h 1 [i] + 1 : i]a, q([1])q([2]) q([β h [i]]) = [β h 1 [i] β h [i] + 1 : β h 1 Becaue β [β h 1 [i] + 1] β h [i] + 1, we know that q([β h [i] + 1]) [β h 1 [i] + 1]. Since f([β h 1 [i]+1]) = a and Π = {a, b}, f(q([β h [i]+1])) = b. Hence β h [i]+1 i a p-border of b. The following i a key lemma to olving our problem. Lemma 7. For any p-border array β of length i 2, β[1..i]m 1 and β[1..i]m 2 are the p-border array of length i + 1, where m 1 = β[i] + 1 and β l if β[β l 1 [i] + 1] β l [i] + 1 for ome 1 < l < k and [i] + 1 m 2 = β[β h 1 [i] + 1] = β h [i] + 1 for any 1 < h < l, 1 otherwie, where k i the integer uch that β k [i] = 0. Proof. Conider any p-tring of length i uch that β = β. By definition, there exit a bijection f on Π uch that f([1])f([2]) f([β[i]]) = [i β[i]+1 : i]. Let a = f([β[i]+1]). Then f([1])f([2]) f([β[i]])f([β[i]+1]) = [i β[i]+1 : [i]].

8 8 T. I, S. Inenaga, H. Bannai, and M. Takeda Algorithm 1: Algorithm to olve Problem Input: α[1..n] : a given integer array Output: return whether α i a valid p-border array or not if α[1..2] [0, 1] then return invalid; for i = 3 to n do if α[i] = α[i 1] + 1 then continue; d α[i 1]; d α[d ]; while d > 0 & d + 1 = α[d + 1] do d d; d α[d ]; if α[i] = d + 1 then continue; return invalid; return valid; i]a. Note that β[1..i](β[i] + 1) i the p-border array of a becaue a can have no p-border longer than β[i] + 1. It follow from Lemma 5 that β h [i]+1 i a p-border of a. Then, by Lemma 6, β l [i] + 1 i a p-border of b. Since β h [i] 1, by Lemma 4, β h [i] + 1 i not a p- border of b. Hence β l [i] + 1 i the longet p-border of b. We are ready to tate the following theorem. Theorem 1. Problem 1 can be olved in linear time for a binary parameter alphabet. Proof. Algorithm 1 decribe the operation to olve Problem 1. Given an integer array of length n, the algorithm firt check if α[1..2] = [0, 1] due to Propoition 2. If α[1..2] = [0, 1], then for each i = 3,..., n (in increaing order) the algorithm check whether α[i] atifie one of the condition of Lemma 7. The time analyi i imilar to that of Theorem 2.3 of [16]. In each iteration of the for loop, the value of d increae by at mot 1. However, each execution of the while loop decreae the value of d by at leat 1. Hence the total time cot of the for loop i O(n). Theorem 2. Problem 2 can be olved in linear time for a binary parameter alphabet. Proof. It follow from Propoition 2 that the p-border array of all p-tring of length 2 (aa, ab, ba, and bb) i [0, 1]. By Propoition 1, for any p-border array β[1..n] with n 2, we have β[1..2] = [0, 1]. Hence each p-border array β[1..n] with n 2 correpond to exactly four p-tring each of which begin with aa, ab, ba, and bb, repectively. Algorithm 2 i an algorithm to olve Problem 2. Technically x aa can be computed by aa [β[i]] xor aa [β[i]+1] xor aa [i] on binary alphabet Π = {0, 1}. Hence thi counting algorithm work in linear time.

9 Counting Parameterized Border Array for a Binary Alphabet 9 Algorithm 2: Algorithm to compute all p-tring haring the ame p- border array Input: β[1..n] : a p-border array Output: all p-tring haring the ame p-border array β[1..n] aa aa; ab ab; bb bb; ba ba; for i = 3 to n do Let f be the bijection on Π.t. f( aa [β[i]]) = aa [i]; Let g be the bijection on Π.t. g( ab [β[i]]) = ab [i]; x aa f( aa [β[i] + 1]); x ab g( ab [β[i] + 1]); x aa y Π {x aa }; x ab z Π {x ab }; if β[i] = β[i 1] + 1 then aa [i] x aa ; ab [i] x ab ; bb [i] x aa; ba [i] x ab ; ele aa[i] x aa; ab [i] x ab ; bb [i] x aa ; ba [i] x ab ; end Output: aa [1 : n], ab [1 : n], bb [1 : n], ba [1 : n] ( 0 ) ( 1 ) ( 1 ) ( 2 ) ( 1 ) ( 2 ) ( 1 ) ( 3 ) Fig. 3. The tree T 4 which repreent all p-border array of length at mot 4 for a binary alphabet. We now conider Problem 3. By Propoition 1 and Lemma 7, computing all p-border array of length at mot n can be accomplihed uing a rooted tree tructure T n of height n 1. Each node of T n of height i 1 correpond to an integer j uch that j i the longet p-border of ome p-tring of length i over a binary alphabet, hence the path from the root to that node repreent the p-border array of the p-tring. Fig. 3 repreent T 4. Theorem 3. Problem 3 can be olved in O(B n ) time for a binary parameter alphabet, where B n denote the number of p-border array of length n. Proof. Propoition 2 and Lemma 7 imply that every internal node of T n of height at leat 1 ha exactly two children. Hence the total number of node of T n i O(B n ). We compute T n in a depth-firt manner. Algorithm 3 how a function that compute the children of a given node of T n. It i not difficult to ee that

10 10 T. I, S. Inenaga, H. Bannai, and M. Takeda Algorithm 3: Function to compute the children of a node of T n Input: i : length of the current p-border array, 2 i n Reult: compute the children of the current node // β[1..n] i allocated globally and β[1..i] repreent the current p-border array. function getchildren(i) if i = n then return ; β[i + 1] β[i] + 1; report β[i + 1]; getchildren(i + 1); d β[i]; d β[d ]; while d > 0 & d + 1 = β[d + 1] do d d; d β[d ]; β[i + 1] d + 1; report β[i + 1]; getchildren(i + 1); return ; each child of a given node can be computed in amortized contant time. Hence Problem 3 can be olved in O(B n ) time for a binary parameter alphabet. We remark that if each p-border array in T n can be dicarded after it i generated, then we can compute all p-border array of length at mot n uing O(n) pace. Since every internal node of T n of height at leat 1 ha exactly two children and the root ha one child, B n = 2 n 2 for n 2. Thu the pace requirement can be reduced to O(log B n ). 4 Concluion and Open Problem A parameterized border array (p-border array) i a ueful data tructure for parameterized pattern matching. In thi paper, we preented a linear time algorithm which tet if a given integer array i a valid p-border array for a binary alphabet. We alo gave a linear time algorithm to compute all binary p-tring that hare a given p-border array. Finally, we propoed an algorithm which compute all p-border array of length at mot n, where n i a given threhold. Thi algorithm work in O(B n ) time, where B n denote the number of p-border array of length n for a binary alphabet. Problem 1,2, and 3 are open for a larger alphabet. To ee one of the reaon of why, we how that Lemma 4 doe not hold for a larger alphabet. Conider a p-tring = abac over Π = {a, b, c}. Oberve that β = [0, 1, 2, 2]. Although β [4] = 2 i a p-border of abac, it i alo a p-border of another p-tring abab ince ab ab. Hence Lemma 4 doe not hold if Π 3. Our future work alo include the following:

11 Counting Parameterized Border Array for a Binary Alphabet 11 Verify if a given integer array i a parameterized uffix array [12]. Compute all parameterized uffix array of length at mot n. In [12], a linear time algorithm which directly contruct the parameterized uffix array for a given binary tring wa propoed. Thi algorithm might be ued a a bai for olving the above problem regarding parameterized uffix array. Reference 1. Baker, B.S.: Parameterized pattern matching: Algorithm and application. Journal of Computer and Sytem Science 52(1) (1996) Baker, B.S.: A program for identifying duplicated code. Computing Science and Statitic 24 (1992) Fredrikon, K., Mozgovoy, M.: Efficient parameterized tring matching. Information Proceing Letter 100(3) (2006) Shibuya, T.: Generalization of a uffix tree for RNA tructural pattern matching. Algorithmica 39(1) (2004) Amir, A., Farach, M., Muthukrihnan, S.: Alphabet dependence in parameterized matching. Information Proceing Letter 49(3) (1994) Baker, B.S.: Parameterized pattern matching by Boyer-Moore-type algorithm. In: Proc. 6th annual ACM-SIAM Sympoium on Dicrete Algorithm (SODA 95). (1995) Koaraju, S.: Fater algorithm for the contruction of parameterized uffix tree. In: Proc. 36th Annual Sympoium on Foundation of Computer Science (FOCS 95). (1995) Hazay, C., Lewentein, M., Tur, D.: Two dimenional parameterized matching. In: Proc. 16th Annual Sympoium on Combinatorial Pattern Matching (CPM 05). Volume 3537 of Lecture Note in Computer Science. (2005) Hazay, C., Lewentein, M., Sokol, D.: Approximate parameterized matching. ACM Tranaction on Algorithm 3(3) (2007) Article No Apotolico, A., Erdö, P.L., Lewentein, M.: Parameterized matching with mimatche. Journal of Dicrete Algorithm 5(1) (2007) Apotolico, A., Giancarlo, R.: Periodicity and repetition in parameterized tring. Dicrete Applied Mathematic 156(9) (2008) Deguchi, S., Higahijima, F., Bannai, H., Inenaga, S.,, Takeda, M.: Parameterized uffix array for binary tring. In: Proc. The Prague Stringology Conference 08 (PSC 08). (2008) Idury, R.M., Schäffer, A.A.: Multiple matching of parameterized pattern. Theoretical Computer Science 154(2) (1996) Aho, A.V., Coraick, M.J.: Efficient tring matching: An aid to bibliographic earch. Communication of the ACM 18(6) (1975) Morri, J.H., Pratt, V.R.: A linear pattern-matching algorithm. Technical Report Report 40, Univerity of California, Berkeley (1970) 16. Franek, F., Gao, S., Lu, W., Ryan, P.J., Smyth, W.F., Sun, Y., Yang, L.: Verifying a border array in linear time. J. Combinatorial Math. and Combinatorial Computing 42 (2002) Duval, J.P., Lecroq, T., Lefevre, A.: Border array on bounded alphabet. Journal of Automata, Language and Combinatoric 10(1) (2005) 51 60

12 12 T. I, S. Inenaga, H. Bannai, and M. Takeda 18. Moore, D., Smyth, W., Miller, D.: Counting ditinct tring. Algorithmica 23(1) (1999) Manber, U., Myer, G.: Suffix array: a new method for on-line tring earche. SIAM J. Computing 22(5) (1993) Blumer, A., Blumer, J., Hauler, D., Ehrenfeucht, A., Chen, M.T., Seifera, J.: The mallet automaton recognizing the ubword of a text. Theoretical Computer Science 40 (1985) Baeza-Yate, R.A.: Searching ubequence (note). Theoretical Computer Science 78(2) (1991) Duval, J.P., Lefebvre, A.: Word over an ordered alphabet and uffix permutation. Theoretical Informatic and Application 36 (2002) Bannai, H., Inenaga, S., Shinohara, A., Takeda, M.: Inferring tring from graph and array. In: Proc. 28th International Sympoium on Mathematical Foundation of Computer Science (MFCS 2003). Volume 2747 of Lecture Note in Computer Science. (2003) Schürmann, K.B., Stoye, J.: Counting uffix array and tring. Theoretical Computer Science 395(2-1) (2008) Lyndon, R.C., Schützenberger, M.P.: The equation a M = b N c P in a free group. Michigan Math. J. 9(4) (1962)

Codes Correcting Two Deletions

Codes Correcting Two Deletions 1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of

More information

Counting and Verifying Maximal Palindromes

Counting and Verifying Maximal Palindromes Counting and Verifying Maximal Palindromes Tomohiro I 1, Shunsuke Inenaga 2, Hideo Bannai 1, and Masayuki Takeda 1 1 Department of Informatics, Kyushu University 2 Graduate School of Information Science

More information

Problem Set 8 Solutions

Problem Set 8 Solutions Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem

More information

One Class of Splitting Iterative Schemes

One Class of Splitting Iterative Schemes One Cla of Splitting Iterative Scheme v Ciegi and V. Pakalnytė Vilniu Gedimina Technical Univerity Saulėtekio al. 11, 2054, Vilniu, Lithuania rc@fm.vtu.lt Abtract. Thi paper deal with the tability analyi

More information

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004 18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem

More information

The machines in the exercise work as follows:

The machines in the exercise work as follows: Tik-79.148 Spring 2001 Introduction to Theoretical Computer Science Tutorial 9 Solution to Demontration Exercie 4. Contructing a complex Turing machine can be very laboriou. With the help of machine chema

More information

arxiv: v1 [math.mg] 25 Aug 2011

arxiv: v1 [math.mg] 25 Aug 2011 ABSORBING ANGLES, STEINER MINIMAL TREES, AND ANTIPODALITY HORST MARTINI, KONRAD J. SWANEPOEL, AND P. OLOFF DE WET arxiv:08.5046v [math.mg] 25 Aug 20 Abtract. We give a new proof that a tar {op i : i =,...,

More information

SOME RESULTS ON INFINITE POWER TOWERS

SOME RESULTS ON INFINITE POWER TOWERS NNTDM 16 2010) 3, 18-24 SOME RESULTS ON INFINITE POWER TOWERS Mladen Vailev - Miana 5, V. Hugo Str., Sofia 1124, Bulgaria E-mail:miana@abv.bg Abtract To my friend Kratyu Gumnerov In the paper the infinite

More information

Lecture 8: Period Finding: Simon s Problem over Z N

Lecture 8: Period Finding: Simon s Problem over Z N Quantum Computation (CMU 8-859BB, Fall 205) Lecture 8: Period Finding: Simon Problem over Z October 5, 205 Lecturer: John Wright Scribe: icola Rech Problem A mentioned previouly, period finding i a rephraing

More information

New bounds for Morse clusters

New bounds for Morse clusters New bound for More cluter Tamá Vinkó Advanced Concept Team, European Space Agency, ESTEC Keplerlaan 1, 2201 AZ Noordwijk, The Netherland Tama.Vinko@ea.int and Arnold Neumaier Fakultät für Mathematik, Univerität

More information

List coloring hypergraphs

List coloring hypergraphs Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity

More information

Multicolor Sunflowers

Multicolor Sunflowers Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of

More information

Inferring Strings from Graphs and Arrays

Inferring Strings from Graphs and Arrays Inferring Strings from Graphs and Arrays Hideo Bannai 1, Shunsuke Inenaga 2, Ayumi Shinohara 2,3, and Masayuki Takeda 2,3 1 Human Genome Center, Institute of Medical Science, University of Tokyo, 4-6-1

More information

A relationship between generalized Davenport-Schinzel sequences and interval chains

A relationship between generalized Davenport-Schinzel sequences and interval chains A relationhip between generalized Davenport-Schinzel equence and interval chain The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed

More information

Preemptive scheduling on a small number of hierarchical machines

Preemptive scheduling on a small number of hierarchical machines Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,

More information

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs Chip-firing game and a partial Tutte polynomial for Eulerian digraph Kévin Perrot Aix Mareille Univerité, CNRS, LIF UMR 7279 3288 Mareille cedex 9, France. kevin.perrot@lif.univ-mr.fr Trung Van Pham Intitut

More information

Convex Hulls of Curves Sam Burton

Convex Hulls of Curves Sam Burton Convex Hull of Curve Sam Burton 1 Introduction Thi paper will primarily be concerned with determining the face of convex hull of curve of the form C = {(t, t a, t b ) t [ 1, 1]}, a < b N in R 3. We hall

More information

TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL

TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL GLASNIK MATEMATIČKI Vol. 38583, 73 84 TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL p-laplacian Haihen Lü, Donal O Regan and Ravi P. Agarwal Academy of Mathematic and Sytem Science, Beijing, China, National

More information

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281 72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition

More information

Online Appendix for Managerial Attention and Worker Performance by Marina Halac and Andrea Prat

Online Appendix for Managerial Attention and Worker Performance by Marina Halac and Andrea Prat Online Appendix for Managerial Attention and Worker Performance by Marina Halac and Andrea Prat Thi Online Appendix contain the proof of our reult for the undicounted limit dicued in Section 2 of the paper,

More information

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end Theoretical Computer Science 4 (0) 669 678 Content lit available at SciVere ScienceDirect Theoretical Computer Science journal homepage: www.elevier.com/locate/tc Optimal algorithm for online cheduling

More information

CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS

CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.1 INTRODUCTION 8.2 REDUCED ORDER MODEL DESIGN FOR LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.3

More information

Computers and Mathematics with Applications. Sharp algebraic periodicity conditions for linear higher order

Computers and Mathematics with Applications. Sharp algebraic periodicity conditions for linear higher order Computer and Mathematic with Application 64 (2012) 2262 2274 Content lit available at SciVere ScienceDirect Computer and Mathematic with Application journal homepage: wwweleviercom/locate/camwa Sharp algebraic

More information

Chapter 4. The Laplace Transform Method

Chapter 4. The Laplace Transform Method Chapter 4. The Laplace Tranform Method The Laplace Tranform i a tranformation, meaning that it change a function into a new function. Actually, it i a linear tranformation, becaue it convert a linear combination

More information

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS. Volker Ziegler Technische Universität Graz, Austria

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS. Volker Ziegler Technische Universität Graz, Austria GLASNIK MATEMATIČKI Vol. 1(61)(006), 9 30 ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS Volker Ziegler Techniche Univerität Graz, Autria Abtract. We conider the parameterized Thue

More information

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin

More information

c n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k

c n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k 1. Exitence Let x (0, 1). Define c k inductively. Suppoe c 1,..., c k 1 are already defined. We let c k be the leat integer uch that x k An eay proof by induction give that and for all k. Therefore c n

More information

CHAPTER 4 DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL

CHAPTER 4 DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL 98 CHAPTER DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL INTRODUCTION The deign of ytem uing tate pace model for the deign i called a modern control deign and it i

More information

Lecture 9: Shor s Algorithm

Lecture 9: Shor s Algorithm Quantum Computation (CMU 8-859BB, Fall 05) Lecture 9: Shor Algorithm October 7, 05 Lecturer: Ryan O Donnell Scribe: Sidhanth Mohanty Overview Let u recall the period finding problem that wa et up a a function

More information

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS VOLKER ZIEGLER Abtract We conider the parameterized Thue equation X X 3 Y (ab + (a + bx Y abxy 3 + a b Y = ±1, where a, b 1 Z uch that

More information

Bogoliubov Transformation in Classical Mechanics

Bogoliubov Transformation in Classical Mechanics Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How

More information

Exercise set 1 Solution

Exercise set 1 Solution Exercie et 1 Solution 1. What are the main poible advantage of DNA-baed computing? How about diadvantage? Advantage: - More parallel computation - Able to tore tremendou amount of information in very mall

More information

Explicit formulae for J pectral factor for well-poed linear ytem Ruth F. Curtain Amol J. Saane Department of Mathematic Department of Mathematic Univerity of Groningen Univerity of Twente P.O. Box 800

More information

arxiv: v1 [math.ac] 30 Nov 2012

arxiv: v1 [math.ac] 30 Nov 2012 ON MODULAR INVARIANTS OF A VECTOR AND A COVECTOR YIN CHEN arxiv:73v [mathac 3 Nov Abtract Let S L (F q be the pecial linear group over a finite field F q, V be the -dimenional natural repreentation of

More information

Evolutionary Algorithms Based Fixed Order Robust Controller Design and Robustness Performance Analysis

Evolutionary Algorithms Based Fixed Order Robust Controller Design and Robustness Performance Analysis Proceeding of 01 4th International Conference on Machine Learning and Computing IPCSIT vol. 5 (01) (01) IACSIT Pre, Singapore Evolutionary Algorithm Baed Fixed Order Robut Controller Deign and Robutne

More information

A SIMPLE NASH-MOSER IMPLICIT FUNCTION THEOREM IN WEIGHTED BANACH SPACES. Sanghyun Cho

A SIMPLE NASH-MOSER IMPLICIT FUNCTION THEOREM IN WEIGHTED BANACH SPACES. Sanghyun Cho A SIMPLE NASH-MOSER IMPLICIT FUNCTION THEOREM IN WEIGHTED BANACH SPACES Sanghyun Cho Abtract. We prove a implified verion of the Nah-Moer implicit function theorem in weighted Banach pace. We relax the

More information

Avoiding Forbidden Submatrices by Row Deletions

Avoiding Forbidden Submatrices by Row Deletions Avoiding Forbidden Submatrice by Row Deletion Sebatian Wernicke, Jochen Alber, Jen Gramm, Jiong Guo, and Rolf Niedermeier Wilhelm-Schickard-Intitut für Informatik, niverität Tübingen, Sand 13, D-72076

More information

Pacific Journal of Mathematics

Pacific Journal of Mathematics Pacific Journal of Mathematic OSCILLAION AND NONOSCILLAION OF FORCED SECOND ORDER DYNAMIC EQUAIONS MARIN BOHNER AND CHRISOPHER C. ISDELL Volume 230 No. March 2007 PACIFIC JOURNAL OF MAHEMAICS Vol. 230,

More information

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems A Contraint Propagation Algorithm for Determining the Stability Margin of Linear Parameter Circuit and Sytem Lubomir Kolev and Simona Filipova-Petrakieva Abtract The paper addree the tability margin aement

More information

CHAPTER 6. Estimation

CHAPTER 6. Estimation CHAPTER 6 Etimation Definition. Statitical inference i the procedure by which we reach a concluion about a population on the bai of information contained in a ample drawn from that population. Definition.

More information

Multicast Network Coding and Field Sizes

Multicast Network Coding and Field Sizes Multicat Network Coding and Field Size Qifu (Tyler) Sun, Xunrui Yin, Zongpeng Li, and Keping Long Intitute of Advanced Networking Technology and New Service, Univerity of Science and Technology Beijing,

More information

arxiv: v2 [math.nt] 30 Apr 2015

arxiv: v2 [math.nt] 30 Apr 2015 A THEOREM FOR DISTINCT ZEROS OF L-FUNCTIONS École Normale Supérieure arxiv:54.6556v [math.nt] 3 Apr 5 943 Cachan November 9, 7 Abtract In thi paper, we etablih a imple criterion for two L-function L and

More information

Some Sets of GCF ϵ Expansions Whose Parameter ϵ Fetch the Marginal Value

Some Sets of GCF ϵ Expansions Whose Parameter ϵ Fetch the Marginal Value Journal of Mathematical Reearch with Application May, 205, Vol 35, No 3, pp 256 262 DOI:03770/jin:2095-26520503002 Http://jmredluteducn Some Set of GCF ϵ Expanion Whoe Parameter ϵ Fetch the Marginal Value

More information

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays Gain and Phae Margin Baed Delay Dependent Stability Analyi of Two- Area LFC Sytem with Communication Delay Şahin Sönmez and Saffet Ayaun Department of Electrical Engineering, Niğde Ömer Halidemir Univerity,

More information

Clustering Methods without Given Number of Clusters

Clustering Methods without Given Number of Clusters Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,

More information

Electronic Theses and Dissertations

Electronic Theses and Dissertations Eat Tenneee State Univerity Digital Common @ Eat Tenneee State Univerity Electronic Thee and Diertation Student Work 5-208 Vector Partition Jennifer French Eat Tenneee State Univerity Follow thi and additional

More information

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation IEOR 316: Fall 213, Profeor Whitt Topic for Dicuion: Tueday, November 19 Alternating Renewal Procee and The Renewal Equation 1 Alternating Renewal Procee An alternating renewal proce alternate between

More information

Tight Timing Estimation With the Newton-Gregory Formulae

Tight Timing Estimation With the Newton-Gregory Formulae Tight Timing Etimation With the Newton-Gregory Formulae Robert van Engelen, Kyle Gallivan, and Burt Walh Department of Computer Science and School of Computational Science and Information Technology Florida

More information

Online Parallel Scheduling of Non-uniform Tasks: Trading Failures for Energy

Online Parallel Scheduling of Non-uniform Tasks: Trading Failures for Energy Online Parallel Scheduling of Non-uniform Tak: Trading Failure for Energy Antonio Fernández Anta a, Chryi Georgiou b, Dariuz R. Kowalki c, Elli Zavou a,d,1 a Intitute IMDEA Network b Univerity of Cypru

More information

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover Coping With NP-Hardne Chapter 12 Local Search Q Suppoe I need to olve an NP-hard problem What hould I do? A Theory ay you're unlikely to find poly-time algorithm Mut acrifice one of three deired feature

More information

Local Fractional Laplace s Transform Based Local Fractional Calculus

Local Fractional Laplace s Transform Based Local Fractional Calculus From the SelectedWork of Xiao-Jun Yang 2 Local Fractional Laplace Tranform Baed Local Fractional Calculu Yang Xiaojun Available at: http://workbeprecom/yang_iaojun/8/ Local Fractional Laplace Tranform

More information

Hybrid Control and Switched Systems. Lecture #6 Reachability

Hybrid Control and Switched Systems. Lecture #6 Reachability Hbrid Control and Switched Stem Lecture #6 Reachabilit João P. Hepanha Univerit of California at Santa Barbara Summar Review of previou lecture Reachabilit tranition tem reachabilit algorithm backward

More information

Multi-dimensional Fuzzy Euler Approximation

Multi-dimensional Fuzzy Euler Approximation Mathematica Aeterna, Vol 7, 2017, no 2, 163-176 Multi-dimenional Fuzzy Euler Approximation Yangyang Hao College of Mathematic and Information Science Hebei Univerity, Baoding 071002, China hdhyywa@163com

More information

Flag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle

Flag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle Flag-tranitive non-ymmetric -deign with (r, λ = 1 and alternating ocle Shenglin Zhou, Yajie Wang School of Mathematic South China Univerity of Technology Guangzhou, Guangdong 510640, P. R. China lzhou@cut.edu.cn

More information

On the Unit Groups of a Class of Total Quotient Rings of Characteristic p k with k 3

On the Unit Groups of a Class of Total Quotient Rings of Characteristic p k with k 3 International Journal of Algebra, Vol, 207, no 3, 27-35 HIKARI Ltd, wwwm-hikaricom http://doiorg/02988/ija2076750 On the Unit Group of a Cla of Total Quotient Ring of Characteritic p k with k 3 Wanambii

More information

Primitive Digraphs with the Largest Scrambling Index

Primitive Digraphs with the Largest Scrambling Index Primitive Digraph with the Larget Scrambling Index Mahmud Akelbek, Steve Kirkl 1 Department of Mathematic Statitic, Univerity of Regina, Regina, Sakatchewan, Canada S4S 0A Abtract The crambling index of

More information

Math 273 Solutions to Review Problems for Exam 1

Math 273 Solutions to Review Problems for Exam 1 Math 7 Solution to Review Problem for Exam True or Fale? Circle ONE anwer for each Hint: For effective tudy, explain why if true and give a counterexample if fale (a) T or F : If a b and b c, then a c

More information

LINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules

LINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules LINEAR ALGEBRA METHOD IN COMBINATORICS 1 Warming-up example Theorem 11 (Oddtown theorem) In a town of n citizen, no more tha club can be formed under the rule each club have an odd number of member each

More information

A CATEGORICAL CONSTRUCTION OF MINIMAL MODEL

A CATEGORICAL CONSTRUCTION OF MINIMAL MODEL A ATEGORIAL ONSTRUTION OF MINIMAL MODEL A. Behera, S. B. houdhury M. Routaray Department of Mathematic National Intitute of Technology ROURKELA - 769008 (India) abehera@nitrkl.ac.in 512ma6009@nitrkl.ac.in

More information

Stochastic Optimization with Inequality Constraints Using Simultaneous Perturbations and Penalty Functions

Stochastic Optimization with Inequality Constraints Using Simultaneous Perturbations and Penalty Functions Stochatic Optimization with Inequality Contraint Uing Simultaneou Perturbation and Penalty Function I-Jeng Wang* and Jame C. Spall** The John Hopkin Univerity Applied Phyic Laboratory 11100 John Hopkin

More information

Social Studies 201 Notes for November 14, 2003

Social Studies 201 Notes for November 14, 2003 1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Lecture 7: Testing Distributions

Lecture 7: Testing Distributions CSE 5: Sublinear (and Streaming) Algorithm Spring 014 Lecture 7: Teting Ditribution April 1, 014 Lecturer: Paul Beame Scribe: Paul Beame 1 Teting Uniformity of Ditribution We return today to property teting

More information

Introduction to Laplace Transform Techniques in Circuit Analysis

Introduction to Laplace Transform Techniques in Circuit Analysis Unit 6 Introduction to Laplace Tranform Technique in Circuit Analyi In thi unit we conider the application of Laplace Tranform to circuit analyi. A relevant dicuion of the one-ided Laplace tranform i found

More information

The Generation of Words with Special Properties

The Generation of Words with Special Properties The th Workhop on Combinatorial Mathematic and Computation Theory The Generation of Word with Special Propertie J.S. Lin L.C. Juan R.C.T. Lee Abtract We propoe ome new word generation function and tudy

More information

MATEMATIK Datum: Tid: eftermiddag. A.Heintz Telefonvakt: Anders Martinsson Tel.:

MATEMATIK Datum: Tid: eftermiddag. A.Heintz Telefonvakt: Anders Martinsson Tel.: MATEMATIK Datum: 20-08-25 Tid: eftermiddag GU, Chalmer Hjälpmedel: inga A.Heintz Telefonvakt: Ander Martinon Tel.: 073-07926. Löningar till tenta i ODE och matematik modellering, MMG5, MVE6. Define what

More information

Simple Observer Based Synchronization of Lorenz System with Parametric Uncertainty

Simple Observer Based Synchronization of Lorenz System with Parametric Uncertainty IOSR Journal of Electrical and Electronic Engineering (IOSR-JEEE) ISSN: 78-676Volume, Iue 6 (Nov. - Dec. 0), PP 4-0 Simple Oberver Baed Synchronization of Lorenz Sytem with Parametric Uncertainty Manih

More information

NULL HELIX AND k-type NULL SLANT HELICES IN E 4 1

NULL HELIX AND k-type NULL SLANT HELICES IN E 4 1 REVISTA DE LA UNIÓN MATEMÁTICA ARGENTINA Vol. 57, No. 1, 2016, Page 71 83 Publihed online: March 3, 2016 NULL HELIX AND k-type NULL SLANT HELICES IN E 4 1 JINHUA QIAN AND YOUNG HO KIM Abtract. We tudy

More information

Optimal Coordination of Samples in Business Surveys

Optimal Coordination of Samples in Business Surveys Paper preented at the ICES-III, June 8-, 007, Montreal, Quebec, Canada Optimal Coordination of Sample in Buine Survey enka Mach, Ioana Şchiopu-Kratina, Philip T Rei, Jean-Marc Fillion Statitic Canada New

More information

Week 3 Statistics for bioinformatics and escience

Week 3 Statistics for bioinformatics and escience Week 3 Statitic for bioinformatic and escience Line Skotte 28. november 2008 2.9.3-4) In thi eercie we conider microrna data from Human and Moue. The data et repreent 685 independent realiation of the

More information

Advanced D-Partitioning Analysis and its Comparison with the Kharitonov s Theorem Assessment

Advanced D-Partitioning Analysis and its Comparison with the Kharitonov s Theorem Assessment Journal of Multidiciplinary Engineering Science and Technology (JMEST) ISSN: 59- Vol. Iue, January - 5 Advanced D-Partitioning Analyi and it Comparion with the haritonov Theorem Aement amen M. Yanev Profeor,

More information

UNIQUE CONTINUATION FOR A QUASILINEAR ELLIPTIC EQUATION IN THE PLANE

UNIQUE CONTINUATION FOR A QUASILINEAR ELLIPTIC EQUATION IN THE PLANE UNIQUE CONTINUATION FOR A QUASILINEAR ELLIPTIC EQUATION IN THE PLANE SEPPO GRANLUND AND NIKO MAROLA Abtract. We conider planar olution to certain quailinear elliptic equation ubject to the Dirichlet boundary

More information

STOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND

STOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND OPERATIONS RESEARCH AND DECISIONS No. 4 203 DOI: 0.5277/ord30402 Marcin ANHOLCER STOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND The generalized tranportation problem

More information

TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES

TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES DOUGLAS R. ANDERSON Abtract. We are concerned with the repreentation of polynomial for nabla dynamic equation on time cale. Once etablihed,

More information

OBSERVER DESIGN FOR DISCRETE-TIME LINEAR SWITCHING SYSTEMS 1

OBSERVER DESIGN FOR DISCRETE-TIME LINEAR SWITCHING SYSTEMS 1 OBSERVER DESIGN FOR DISCRETE-TIME LINEAR SWITCHING SYSTEMS 1 E. De Santi, M.D. Di Benedetto Department of Electrical Engineering and Computer Science, Univerity of L Aquila. Email: (deanti,dibenede@ing.univaq.it

More information

Reliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay

Reliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay International Journal of Applied Science and Engineering 3., 4: 449-47 Reliability Analyi of Embedded Sytem with Different Mode of Failure Emphaizing Reboot Delay Deepak Kumar* and S. B. Singh Department

More information

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall Beyond Significance Teting ( nd Edition), Rex B. Kline Suggeted Anwer To Exercie Chapter. The tatitic meaure variability among core at the cae level. In a normal ditribution, about 68% of the core fall

More information

Finding the location of switched capacitor banks in distribution systems based on wavelet transform

Finding the location of switched capacitor banks in distribution systems based on wavelet transform UPEC00 3t Aug - 3rd Sept 00 Finding the location of witched capacitor bank in ditribution ytem baed on wavelet tranform Bahram nohad Shahid Chamran Univerity in Ahvaz bahramnohad@yahoo.com Mehrdad keramatzadeh

More information

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Mathematical and Computational Application Vol. 11 No. pp. 181-191 006. Aociation for Scientific Reearch A BATCH-ARRIVA QEE WITH MTIPE SERVERS AND FZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Jau-Chuan

More information

On the Isomorphism of Fractional Factorial Designs 1

On the Isomorphism of Fractional Factorial Designs 1 journal of complexity 17, 8697 (2001) doi:10.1006jcom.2000.0569, available online at http:www.idealibrary.com on On the Iomorphim of Fractional Factorial Deign 1 Chang-Xing Ma Department of Statitic, Nankai

More information

Embedding large graphs into a random graph

Embedding large graphs into a random graph Embedding large graph into a random graph Aaf Ferber Kyle Luh Oanh Nguyen June 14, 016 Abtract In thi paper we conider the problem of embedding bounded degree graph which are almot panning in a random

More information

Sparse Fault-Tolerant BFS Trees. Merav Parter and David Peleg Weizmann Institute Of Science BIU-CS Colloquium

Sparse Fault-Tolerant BFS Trees. Merav Parter and David Peleg Weizmann Institute Of Science BIU-CS Colloquium Spare Fault-Tolerant BFS Tree Merav Parter and David Peleg Weizmann Intitute Of Science BIU-CS Colloquium 16-01-2014 v 5 Breadth Firt Search (BFS) Tree Unweighted graph G=(V,E), ource vertex V. Shortet-Path

More information

CS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division

CS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division 1 1 April 000 Demmel / Shewchuk CS 170: Midterm Exam II Univerity of California at Berkeley Department of Electrical Engineering and Computer Science Computer Science Diviion hi i a cloed book, cloed calculator,

More information

Extension of Inagaki General Weighted Operators. and. A New Fusion Rule Class of Proportional Redistribution of Intersection Masses

Extension of Inagaki General Weighted Operators. and. A New Fusion Rule Class of Proportional Redistribution of Intersection Masses Extenion of nagaki General Weighted Operator and A New Fuion Rule Cla of Proportional Reditribution of nterection Mae Florentin Smarandache Chair of Math & Science Depart. Univerity of New Mexico, Gallup,

More information

Hybrid Projective Dislocated Synchronization of Liu Chaotic System Based on Parameters Identification

Hybrid Projective Dislocated Synchronization of Liu Chaotic System Based on Parameters Identification www.ccenet.org/ma Modern Applied Science Vol. 6, No. ; February Hybrid Projective Dilocated Synchronization of Liu Chaotic Sytem Baed on Parameter Identification Yanfei Chen College of Science, Guilin

More information

Ecient Parallel Algorithms for Computing All Pair. University of Kentucky. Duke University

Ecient Parallel Algorithms for Computing All Pair. University of Kentucky. Duke University Ecient Parallel Algorithm for Computing All Pair Shortet Path in Directed Graph 1 Yijie Han 2 * Victor Y. Pan 3 ** John H. Reif*** *Department of Computer Science Univerity of Kentucky Lexington, KY 40506

More information

Social Studies 201 Notes for March 18, 2005

Social Studies 201 Notes for March 18, 2005 1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Geometric Measure Theory

Geometric Measure Theory Geometric Meaure Theory Lin, Fall 010 Scribe: Evan Chou Reference: H. Federer, Geometric meaure theory L. Simon, Lecture on geometric meaure theory P. Mittila, Geometry of et and meaure in Euclidean pace

More information

Sampling and the Discrete Fourier Transform

Sampling and the Discrete Fourier Transform Sampling and the Dicrete Fourier Tranform Sampling Method Sampling i mot commonly done with two device, the ample-and-hold (S/H) and the analog-to-digital-converter (ADC) The S/H acquire a CT ignal at

More information

Yoram Gat. Technical report No. 548, March Abstract. A classier is said to have good generalization ability if it performs on

Yoram Gat. Technical report No. 548, March Abstract. A classier is said to have good generalization ability if it performs on A bound concerning the generalization ability of a certain cla of learning algorithm Yoram Gat Univerity of California, Berkeley Technical report No. 548, March 999 Abtract A claier i aid to have good

More information

A Full-Newton Step Primal-Dual Interior Point Algorithm for Linear Complementarity Problems *

A Full-Newton Step Primal-Dual Interior Point Algorithm for Linear Complementarity Problems * ISSN 76-7659, England, UK Journal of Information and Computing Science Vol 5, No,, pp 35-33 A Full-Newton Step Primal-Dual Interior Point Algorithm for Linear Complementarity Problem * Lipu Zhang and Yinghong

More information

SOME MONOTONICITY PROPERTIES AND INEQUALITIES FOR

SOME MONOTONICITY PROPERTIES AND INEQUALITIES FOR Kragujevac Journal of Mathematic Volume 4 08 Page 87 97. SOME MONOTONICITY PROPERTIES AND INEQUALITIES FOR THE p k-gamma FUNCTION KWARA NANTOMAH FATON MEROVCI AND SULEMAN NASIRU 3 Abtract. In thi paper

More information

Logic, Automata and Games

Logic, Automata and Games Logic, Automata and Game Jacque Duparc EJCIM 27 EJCIM, 23-27 January 27 J. Duparc ( & ) Logic, Automata and Game Lyon, 23-27 January 27 / 97 Reference [] K. R. Apt and E. Grädel. Lecture in game theory

More information

The Hassenpflug Matrix Tensor Notation

The Hassenpflug Matrix Tensor Notation The Haenpflug Matrix Tenor Notation D.N.J. El Dept of Mech Mechatron Eng Univ of Stellenboch, South Africa e-mail: dnjel@un.ac.za 2009/09/01 Abtract Thi i a ample document to illutrate the typeetting of

More information

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang

More information

arxiv: v2 [math.co] 11 Sep 2017

arxiv: v2 [math.co] 11 Sep 2017 The maximum number of clique in graph without long cycle Ruth Luo September 13, 017 arxiv:1701.0747v [math.co] 11 Sep 017 Abtract The Erdő Gallai Theorem tate that for k 3 every graph on n vertice with

More information

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog Chapter Sampling and Quantization.1 Analog and Digital Signal In order to invetigate ampling and quantization, the difference between analog and digital ignal mut be undertood. Analog ignal conit of continuou

More information

White Rose Research Online URL for this paper: Version: Accepted Version

White Rose Research Online URL for this paper:   Version: Accepted Version Thi i a repoitory copy of Identification of nonlinear ytem with non-peritent excitation uing an iterative forward orthogonal leat quare regreion algorithm. White Roe Reearch Online URL for thi paper: http://eprint.whiteroe.ac.uk/107314/

More information

Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits

Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits Contemporary Mathematic Symmetric Determinantal Repreentation of Formula and Weakly Skew Circuit Bruno Grenet, Erich L. Kaltofen, Pacal Koiran, and Natacha Portier Abtract. We deploy algebraic complexity

More information

arxiv: v1 [math.ca] 23 Sep 2017

arxiv: v1 [math.ca] 23 Sep 2017 arxiv:709.08048v [math.ca] 3 Sep 07 On the unit ditance problem A. Ioevich Abtract. The Erdő unit ditance conjecture in the plane ay that the number of pair of point from a point et of ize n eparated by

More information

Molecular Dynamics Simulations of Nonequilibrium Effects Associated with Thermally Activated Exothermic Reactions

Molecular Dynamics Simulations of Nonequilibrium Effects Associated with Thermally Activated Exothermic Reactions Original Paper orma, 5, 9 7, Molecular Dynamic Simulation of Nonequilibrium Effect ociated with Thermally ctivated Exothermic Reaction Jerzy GORECKI and Joanna Natalia GORECK Intitute of Phyical Chemitry,

More information