A check digit system over a group of arbitrary order

Size: px
Start display at page:

Download "A check digit system over a group of arbitrary order"

Transcription

1 2013 8th International Conference on Communications an Networking in China (CHINACOM) A check igit system over a group of arbitrary orer Yanling Chen Chair of Communication Systems Ruhr University Bochum D Bochum, Germany yanlingchen-q5g@rube Markku Niemenmaa Department of Mathematical Sciences University of Oulu Oulu, Finlan markkuniemenmaa@oulufi A J Han Vinck Institute for Experimental Mathematics University of Duisburg-Essen D Essen, Germany vinck@iemuni-uee Abstract In this paper, we stuy a check igit system over an abelian group of an arbitrary orer The work is a generalization of a recently introuce check igit system which is base on the use of elementary abelian p-group of orer p k Furthermore, we challenge the current stanars by comparing our system with several well-known an wiely use systems such as ISBN, MEID, ISAN an the system over alphanumeric characters We show that our esign outperforms all of them in terms of the error etection capability I INTRODUCTION Accoring to the statistical investigations by D F Beckley [1] an J Verhoeff [2], when transmitting a sequence of igits, the most common transmission errors mae by human operators are the following: 1) single error: a b ; 2) ajacent transposition: ab ba ; 3) twin error: aa bb ; 4) jump transposition: abc cba ; 5) jump twin error: aca bcb For their relative frequency of occurrence, one can refer to Table I Note that insertion an eletion errors are not inclue in above list since they can be etecte easily if all coewors transmitte are of equal length The recognition of these errors is esirable an attracts talente researchers to esign systems with a satisfying error etection capability To o so, it is usually one by appening a check igit a n+1 to a given sequence a 1 a n of information igits (The use of two check igits is not avise since stuies have shown that the absolute number of errors that occur roughly oubles when the number of igits increases by two, as pointe in [4]) Accoring to Table I, it is clear that 1) single errors an 2) ajacent transpositions are the most prevalent ones So research attention was first brought to esign systems over groups with anti-symmetric mappings which ensure these two kins of errors to be etecte One can refer to a long list of research articles such as [3], [4], [5], [6], [7], [8] an a survey of anti-symmetric mappings in ifferent groups in [9] In aition, possibility of constructing error etecting coes base on quasigroups was iscusse in [5] Necessary an sufficient conitions were establishe in orer to etect 2) ajacent transpositions an 4) jump transpositions (but only in the information igits) The control igit involving in both errors was taken into account in [10] A comprehensive TABLE I ERROR TYPES AND THEIR FREQUENCIES [9] Frequency in % Error type Description in symbol Verhoeff Beckley single error a b transposition ab ba jump transposition acb bca 08 twin error aa bb 06 phonetic error (a 2) a0 1a 05 6 jump twin error aca bcb 03 other error 86 investigation on a check igit system over a quasigroup was conucte in [11], [12], where necessary an sufficient conitions were establishe in orer to etect each of the 5 error types So far, the approaches have been taken are in general mathematically analytical In [13], M Niemenmaa propose a check igit system for hexaecimal numbers, base on a suitable automorphism of the elementary abelian group of orer 16 Its esign is concise an elegant, with the capability of etecting all the 5 types of errors Inspire by this simple but effective esign, the authors of [14] propose check igit systems over a group of orer p k, for a prime p an k 1 Their systems coul achieve the same error etection capability an beyon, over groups of prime power orer which is a generalization of hexaecimal numbers In this paper, we further exten their results by proposing check igit system over a group of an arbitrary orer The iea is to employ several parallel subsystems as introuce in [14] which are base on the use of elementary abelian p-groups of orer p k It is worth mentioning that in [14] the authors looke into the following two categories of jump errors, which inclue an further exten the error types 2)-5) 6) t-jump transposition: 7) t-jump twin error: ab 1 b t c cb 1 b t a ab 1 b t a cb 1 b t c It is easy to see that error types 2) ajacent transposition an 4) jump transposition, can be regare as t-jump transpositions for t = 0 an t = 1, respectively; 3) twin error an 5) jump twin error, can be regare as t-jump twin errors for t = 0 an t = 1, respectively IEEE

2 These two kins of errors were first consiere in [15] an treate as transposition an twin errors on places (i, i+t+1), where 1 i n an i + t + 1 n They are of interest, not only because they simplify the list of the error types, but also because they may occur more frequently than expecte, especially when people input ata while using a new keyboar with an unexpecte layout, or when they forget to switch the language to the right one they inten to use In real life applications, there are many well-known examples for use of check igit systems, such as the International Stanar Book Number (ISBN) Coe, the European Article Number (EAN) Coe, the Universal Prouct Coe (UPC), the International Stanar Auiovisual Number (ISAN), the International Mobile Equipment Ientifier (MEID), The rest of the paper is organize as follows: First in Section II, we introuce some preliminaries In Section III, we briefly review the recently introuce check igit system over a group of a prime power orer In Section IV, we present our general esign of a check igit system over a group of an arbitrary orer In Section V, we challenge current stanars by comparing our system with several well-known an wiely use systems such as ISBN, MEID, ISAN an the system over alphanumeric systems Finally we conclue in Section VI II PRELIMINARIES For a given check igit system, we enote t to be the longest jump length such that for any t t, all the t- jump transpositions an t-jump twin errors will be etecte Intuitively we have the etection raius: R = t +1, reflecting the capability of the system to etect these two kins of generalize jump errors By efinition, a system capable of etecting error types 1)-5) has an etection raius R 2 Let t c be the maximum t that coul be achieve, accoringly R c = t c + 1 be the longest etection raius Then a check igit system capable of etecting all the single errors an ouble errors of types 6) an 7) within R c, is of interest ue to its esirable error etection capability In [14], the authors propose systems over a group of orer p k, an emonstrate that { 2 k 2 p = 2; R c = (1) p k p o prime They also provie easy construction of such systems that etect all the single errors an achieve the maximum etection raius R c We will briefly review their constructive approach in Section III Note that in case of k = 1, accoring to (1), we have R c = 0 for p = 3, an R c = 1 for p = 5, respectively This implies that their propose systems over a group of orer 3 an 5, respectively, are unable to etect all the errors of types 1)-5) This is consistent with the note as state in [15, Remark 5] III CHECK DIGIT SYSTEM OVER A GROUP OF ORDER p k In this section, we review the esign of the check igit system propose in [14] which is base on the use of elementary abelian p-groups of orer p k Their propose system has the ability to etect all the five error types 1)-5) an beyon A Group Consier a check igit system over a set of p k numbers: 0, 1, 2,, p k 1, where p is a prime an k > 0 One can represent these p k numbers as elements of the abelian group G = Z p Z p Z p (2) }{{} k Each number correspons to a k-tuple in G For simplicity, one can take the k-tuple to be its base p representation For instance, consier the hexaecimal numbers: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E an F One can represent them as elements of the abelian group G = Z 2 Z 2 Z 2 Z 2 by enoting 0 = (0, 0, 0, 0), 1 = (0, 0, 0, 1),, 9 = (1, 0, 0, 1), A = (1, 0, 1, 0), B = (1, 0, 1, 1), C = (1, 1, 0, 0), D = (1, 1, 0, 1), E = (1, 1, 1, 0), an F = (1, 1, 1, 1) B Check equation Suppose that the information igits a 1,, a n an the check igit a n+1 are all interprete as elements of the group G Then a n+1 can be etermine by the check equation a 1 P + a 2 P a n P n + a n+1 P n+1 = 0, (3) where P is a k k matrix over the prime fiel F p Note that the operations in the check equation are conucte in F p C Check igit system As one can see in (3), P is the only an the key parameter which etermines the performance of the system in terms of error etection In particular, we recall the following theorem: Theorem 31: [14, Theorem 44 & Theorem 46] Let P be a k k matrix whose characteristic polynomial is a primitive polynomial over F p Then a check igit system over an abelian group of orer p k built on P by using the check equation (3) is able to etect all the single errors an ouble errors of type 6) an 7) within etection raius R c as efine in (1) It is known that there are φ(p k 1)/k primitive polynomials of egree k over F p, where φ( ) is Euler s Totient function As inicate in [14], given any of the primitive polynomials, an easy construction of matrix P suitable for Theorem 31, is to take its companion matrix Recall that the companion matrix of a monic polynomial g(z) = c 0 + c 1 z + + c k 1 z k 1 + z k of positive egree k over F p is efine to be the following k k matrix c c c c k 1 The character polynomial of such a matrix is exactly g(z) 898

3 IV CHECK DIGIT SYSTEM OVER A GROUP OF ORDER p k1 1 pk2 2 pk In this section, we exten the esign of the check igit system over a group of orer p k to a general group of arbitrary orer N > 1 Let N = p k1 1 pk2 2 pk be the unique prime factor ecomposition of N We assume that p 1, p 2,, p are istinct primes in the orer such that p k1 1 < pk2 2 < < pk A Group First we recall the funamental theorem of finite abelian groups that every finite abelian aitive group of orer N can be expresse as a irect sum of elementary abelian p j - groups of orer p kj j, where 1 j So we can express the abelian group G of orer N to be the irect sum of G j, ie, G = G 1 G 2 G, where G j is the elementary abelian p j -group of orer p kj j as escribe in Section III-A: ie, for 1 j, G j = Z pj Z pj Z pj }{{} (4) k j Consier a check igit system over a set of N numbers Note that the N numbers, from 0 to p k1 1 pk2 2 pk 1, can be represente as elements of the abelian group G Each number x correspons to a -tuple in G For simplicity, we choose the representation (x 1, x 2,, x ) such that x = q 1 p k1 1 + x 1; q 1 = q 2 p k2 2 + x 2; q 2 = q 3 p k3 3 + x 3; q 2 = q 1 p k 1 1 q 1 = x Note that for x {0, 1, l=j+1 p k l l 1 j ; an j=1 pkj + x 1; (5) j 1}, the quotient q j < for 1 j 1; the remainer 0 x j < p kj j 1 x = x 1 + x 2 p k1 1 + x 3 p k1 1 pk x p k l l (6) Note that x j can be further inteprete as an element in G j an in the sequel we will use its base p j representation in the calculation Therefore, given information igits a 1,, a n, corresponingly we have their representations in G ie, for 1 i n, l=1 for a i (a i,1, a i,2,, a i, ) G (7) Furthermore, for 1 j, a i,j can be regare as an element in G j, ie, a i,j (a i,j (1), a i,j (2),, a i,j (k j )) G j (8) where a i,j (l) Z pj for 1 l k j B Check equation Let the information igits a 1,, a n an the check igit a n+1 be interprete as elements of the group G, ie, a 1 (a 1,1, a 1,2,, a 1, ) a 2 (a 2,1, a 2,2,, a 2, ) a n (a n,1, a n,2,, a n, ) a n+1 (a n+1,1, a n+1,2,, a n+1, ) Consier the j-th coorinate of a 1,, a n an a n+1, for 1 j We have a 1,j, a 2,j,, a n,j an a n+1,j, all of which are elements of G j Thus similar to the approach as escribe in Section III, one can etermine a n+1,j from a 1,j, a 2,j,, a n,j by applying the following check equation: a 1,j P j +a 2,j P 2 j + +a n,j P n j +a n+1,j P n+1 j = 0, (10) where P j is a k j k j matrix in the prime fiel F pj, an the operations in (10) are conucte in F pj In a parallel manner, one can employing subsystems over G 1, G 2,, G, respectively, to obtain (a n+1,1, a n+1,2,, a n+1, ) which correspons to a n+1 accoring to (6) C Check igit system We note that the representation efine in (5) is a bijection So when a transmission error occurs, they will be reflecte by the representations of the erroneous igits at at least one of the coorinates Recall that for each coorinate j, there is an unerneath check igit system which is over G j with a etection raius R j, where 1 j It is easy to see that the overall system over G coul achieve a etection raius R no less than min{r 1, R 2,, R } Therefore, we easily have the following theorem as a generalization of Theorem 31 Theorem 41: For 1 j, let P j be a k j k j matrix whose characteristic polynomial is a primitive polynomial over Z pj Then a check igit system over a group of orer p k1 1 pk2 2 pk built on {P j, 1 j } by using the check equation (10) is able to etect all the single errors an ouble errors of type 6) an 7) within the etection raius R = 2 k1 2 p 1 = 2 & 2p k1 1 < pk2 2 ; (p k2 2 1)/2 1 p 1 = 2 & 2p k1 1 > pk2 2 ; (11) (p k1 1 1)/2 1 otherwise Here p k1 1 < pk2 2 < < pk is assume Remark: Although we use a bijection as efine in (5) to represent numbers in {0,, j=1 pkj j 1} as elements of the abelian group G, however it is worth mentioning that such a bijection is not unique Another alternative is to represent any x {0,, j=1 pkj j 1} to be a -tuple (x 1, x 2,, x ), where x j = x mo p kj j for 1 j Given (x 1, x 2,, x ), one can retrieve x by applying the Chinese Remainer Theorem (9) 899

4 V CHALLENGING CURRENT STANDARDS In this section, we compare our system with some well known an willy use systems such as ISBN, MEID, ISAN an so on A Check igit system over Z 11 Example 51: The International Stanar Book Number coe (ISBN) is over Z 11, an uses the check equation: 10 i x i 0 mo 11 (12) This system etect all the errors of types 1)-5) with the exception of the twin error at places (5, 6) as = 11 In [15, Example 18], a moification of the ISBN coe is propose over Z 11, which uses the following check equation: 5 10 i x i + (5 j) x j 0 mo 11 (13) j=6 This system improves the ISBN coe in the manner that it etects all the errors of types 1)-5) without exceptions In our approach, we apply Theorem 41 for p = 11 an k = 1 Note that over Z 11, the primitive elements are 2, 6, 7, 8 We use α {2, 6, 7, 8} in the following check equation: 10 α i x i 0 mo 11 (14) For instance, if we take α = 6, Equation (14) has coefficients {α i mo 11, 1 i 10} = {6, 3, 7, 9, 10, 5, 8, 4, 2, 1} In particular, the MOD 11-2 system specifie in ISO/IEC 7064 [17] can be consiere as a special case of our system by taking α = 2 By Theorem 41, our system coul etect not only the errors of types 1)-5), but also more generalize errors of types 6)- 7) within etection raius R c = 4 It is easy to check that this hols also for the moification system efine by (13) In fact, both systems are able to etect all the single errors, all the t-jump transposition errors, an almost all the t-jump twin errors with the only exception of the 4-jump twin error The reason is that in our system, α 5 10 mo 11 an thus α i + α i+5 = 11 α i, for 1 i 5; whilst in the moification system propose in [15, Example 18], the coefficients at places (i, i + 5) are i an i, respectively, which sum to 0 As a irect result, the 4-jump twin errors remain unetecte in both systems Moreover, our system outperforms the original ISBN coe an the moification system on etecting the phonetic errors ( a0 1a, where a 2) It only fails to etect the phonetic errors as x i = 10 for 1 i 9 However, in the ISBN coe, number 10 is not use for x i, 1 i 9 at all So we coul say that our system is able to etect all the possible phonetic errors occurre in ISBN; whilst both the original ISBN coe an the moification propose in [15, Example 18] fail to o so (one can refer [15, Example 18] for a etaile list of unetectable phonetic errors for both systems) B Check igit system over hexaecimal numbers Example 52: A Mobile Equipment IDentifier (MEID) [18] is a globally unique 14-igit hexaecimal ientification number for a physical piece of mobile station equipment They are use as a means to facilitate mobile equipment ientification an tracking an therefore shoul be resistant to moification An MEID is compose mainly of two basic components, the manufacturer coe an the serial number, as shown in Table II For an MEID which contains at least one hexaecimal igit in the RR igits, the check igit is calculate using a slight moification of the Luhn formula, in the manner that all arithmetic is performe in base 16 One can refer to [19, Annex B] for the calculation Note that the check igit is not part of the MEID an is not transmitte when the MEID is transmitte It is easy to check that MEID as a hexaecimal check igit system, coul not etect the following errors: t-jump transposition error: (F, 0) (0, F) at places (i, i + t) for all o t such that 1 i 14, i + t 14 t-jump twin error: (x, x) (x + 5, x + 5), where 3 x 7, at places (i, i + t) for all o t such that 1 i 14, i + t 14 Example 53: The International Stanar Auiovisual Number (ISAN) [20] is a numbering system that enables the unique an persistent ientification of any auiovisual works An ISAN consists of 16 hexaecimal igits, which can be ivie into two segments: root segment an episoe segment, as shown in Table III An appene check igit is calculate over the 16 ISAN igits accoring to a MOD 37, 36 system specifie in accorance with ISO/IEC 7064 [17] However, accoring to [17], the MOD 37, 36 system is unable to etect all the errors of types 1)-5) In fact, it fails to etect about 016% of error type 2), 28% of error types 3) an 5), an 17% of error type 4) So both MEID an ISAN, two wiely use hexaecimal check igit systems, fail to etect all the errors of types 1)-5) Example 54: Following our approach as escribe in Theorem 31, one can construct alternative systems for MEID an ISAN as follows: Represent the hexaecimal numbers as elements of the abelian group G = Z 2 Z 2 Z 2 Z 2 as escrible in Section III-A Fin a 4 4 matrix P whose characteristic polynomial is either x 4 + z + 1 or z 4 + z (both are primitive polynomial of egree 4) For instance, we choose the companion matrix of x 4 + z 3 + 1, as an easy choice of such P Apply the following check equation to calculate the check 900

5 TABLE II THE FORMAT OF MEID MEID Manufacturer Coe Serial Number Check Digit R R X X X X X X Z Z Z Z Z Z C x 14 x 13 x 12 x 11 x 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1 TABLE III THE FORMAT OF ISAN ISAN Root Episoe Check Digit R R R R R R R R R R R R E E E E C x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9 x 10 x 11 x 12 x 13 x 14 x 15 x 16 x 17 igit a n+1 from the n information igits a 1,, a n : n+1 a i P i = 0 It is easy to see that the above system serves as an alternative for MEID by letting n = 14, an an alternative for ISAN by letting n = 16 Comparing to both MEID an ISAN, our system is capable of etecting all the errors of types 1)-5) Beyon that, it is able to etect both the t-jump transposition an t-jump twin errors within its etection raius R c = 14 In more etail, our system, as an alternative for MEID, is capable of etecting all the possibles errors of types 1) an 6)- 7); whilst as an alternative for ISAN, is capable of etecting all the single errors, an almost all the possible jump errors of types 6)-7) with the only exception of 14-jump transposition an twin errors at places (1, 16) an (2, 17) C Check igit system over hexatriecimal numbers Alphanumeric is a combination of alphabetic an numeric characters, containing in total 36 symbols Since it is quite popular in human interfaces, it is of great interest to evelop check igit system over hexatriecimal numbers A MOD 37, 36 system as specifie in accorance with ISO/IEC 7064 [17], belongs to such a category an use in the real life application for livestock ientification Example 55: Following our approach as escribe in Theorem 41, one can construct alternative alphanumeric systems as follows: Since 36 = , we can represent the hexatriecimal numbers 0 to 35 as elements of the abelian group G = G 1 G 2 where G 1 = Z 2 Z 2 an G 2 = Z 3 Z 3 Given n characters, a 1,, a n, we easily have (q 1,, q n ) an (r 1,, r n ), where q i an r i are the quotient an remainer, respectively, when iviing a i by 9 for 1 i n Note that the base 2 representation of q i an base 3 representation of r i are actually use in calculation To set up the check equation, we nee two matrices: one binary matrix P 1 an the other ternary matrix P 2, such that their characteristic polynomials are primitive polynomials over the prime fiels F 2 an F 3, respectively That is, P 1 shoul be a matrix which has x 2 +x+1 (which is the only primitive polynomial of egree 2 in F 2 ) as its characteristic polynomial; an P 2 shoul be a matrix whose characteristic matrix is one of the 3 polynomials: x 2 + 2x + 2, x 2 + 1, an x 2 + x + 2 (which are the only 3 monic primitive polynomial of egree 2 in F 3 ) For instance, we can choose ( ) ( ) P 1 = ; P 2 = From the n information igits a 1,, a n, we have (q 1,, q n ) an (r 1,, r n ) Apply the following check equations to obtain (q n+1, r n+1 ) : n+1 n+1 q i P i 1 = 0 over F 2 ; r i P i 2 = 0 over F 3 The check igit a n+1 = q n r n+1 By Theorem 41, the above system has a etection raius R = 2 an thus can etect all the most frequent error types 1)-5) It performs better than existing alphanumeric systems in ISO/IEC 7064 such as MOD 37, 36 system (with one check igit) Recall the fact that the MOD 37, 36 system fail to etect all the most frequent 5 types errors In fact, accoring to [17], the MOD 37, 36 system fails to etect about 016% of error type 2), 28% of error types 3) an 5), an 17% of error type 4) There are another two alphanumeric systems state in ISO/IEC 7064: MOD 37-2 an MOD However, MOD 37-2 is over 37 characters ( 0 to 9, an A to Z, plus * ) an MOD is with 2 check igits VI CONCLUSION In this paper, we stuy a check igit system over an abelian group of an arbitrary orer The work is a generalization of a recently introuce check igit system which is base on the use of elementary abelian p-group of orer p k Furthermore, we challenge the current stanars by comparing our system with several well-known an wiely use check igit systems such as ISBN, MEID, ISAN an the system over alphanumeric characters We show that our esign outperforms all of them in terms of the error etection capability In aition, our approach is in general simple, constructive an easy to be aopte in practice an it therefore serves as an attractive alternative for ISBN coe, MEID, ISAN, alphanumeric ientification system an for other applications 901

6 REFERENCES [1] D F Beckley, An optimum system with moulo 11, Comp Bull, 11, pp , 1967 [2] J Verhoeff, Error etecting ecimal coes, Math Centre Tracts, 29, Math Centrum Amsteram, 1969 [3] H M Damm, Check igit systems over groups an anti-symmetric mappings, Archiv er Mathematik, 75, pp , 2000 [4] H P Gumm, A new class of check-igit methos for arbitrary number systems, IEEE Trans Info Theory, 31, pp , 1985 [5] A Ecker an G Poch, Check character systems, Computing, 37 (4), pp , 1986 [6] J A Gallian an M D Mullin, Groups with anti-symmetric mappings, Arch Math, 65, pp , 1995 [7] S Heiss, Anti-symmetric mappings for finite solvable groups, Arch Math, 69, pp ,1997 [8] R H Schulz, Check character systems over groups an orthogonal Latin squares, Applic Algebra in Eng, Comm an Computing, 7, pp , 1996 [9] R H Schulz, On check igit systems using anti-symmetric mappings, Numbers, Information an Complexity, Kluwer Aca Publ Boston, pp , 2000 [10] R H Schulz, A note on check character systems using Latin squares, Discrete Math, 97, pp , 1991 [11] G B Belyavskaya, V I Izbash an G L Mullen, Check character systems using quasigroups: I, Designs, Coes an Cryptography, 37, pp , 2005 [12] G B Belyavskaya, V I Izbash an G L Mullen, Check character systems using quasigroups: II, Designs, Coes an Cryptography, 37, pp , 2005 [13] M Niemenmaa, A check igit system for hexaecimal numbers, Applic Algebra in Eng, Comm an Computing, 22, pp , 2011 [14] Y Chen, M Niemenmaa, A J Han Vinck an D Gligoroski, On some properties of a check igit system, IEEE International Symposium on Information Theory (ISIT 2012), Cambrige, MA, USA, Jul 1-6, 2012 [15] G L Mullen an V Shcherbacov, n-t-quasigroup coes with one check symbol an their error etection capabilities, Comment Math Univ Carolinae, 45 (2), pp , 2004 [16] J P S Kung, The cycle structure of a linear transformation over a finite fiel, Linear Algebra Appl, 36, pp , 1981 [17] ISO/IEC 7064: 2003(E): Information technology - Security techniques - Check character systems [18] 3GPP2 report S R0048: 3G Mobile Equipment Ientifier (MEID)- Stage 1 Jun 2005 [19] 3GPP2 X S v30: MAP Support for the Mobile Equipment Ientity (MEID) Jan 2009 [20] ISO (E): Information an ocumentation - International Stanar Auiovisual Number (ISAN) 902

ACCORDING to the empirical investigations by

ACCORDING to the empirical investigations by IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 1, JANUARY 2014 261 On the Error Detection Capability of One Check Digit Yanling Chen, Markku Niemenmaa, A. J. Han Vinck, and Danilo Gligoroski Abstract

More information

Check Digit Calculation for Contract-IDs

Check Digit Calculation for Contract-IDs Check Digit Calculation for Contract-IDs Introduction... 1 Mathematical Algorithm... 2 Initiation for the Contract-ID... 2 Setup for the Contract-ID... 2 Lookup Tables... 4 Example... 5 Implementation...

More information

Two formulas for the Euler ϕ-function

Two formulas for the Euler ϕ-function Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25 Combinatorica 9(1)(1989)91 99 A New Lower Boun for Snake-in-the-Box Coes Jerzy Wojciechowski Department of Pure Mathematics an Mathematical Statistics, University of Cambrige, 16 Mill Lane, Cambrige, CB2

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Summary: Differentiation

Summary: Differentiation Techniques of Differentiation. Inverse Trigonometric functions The basic formulas (available in MF5 are: Summary: Differentiation ( sin ( cos The basic formula can be generalize as follows: Note: ( sin

More information

Space-time Linear Dispersion Using Coordinate Interleaving

Space-time Linear Dispersion Using Coordinate Interleaving Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

On the Equivalence Between Real Mutually Unbiased Bases and a Certain Class of Association Schemes

On the Equivalence Between Real Mutually Unbiased Bases and a Certain Class of Association Schemes Worcester Polytechnic Institute DigitalCommons@WPI Mathematical Sciences Faculty Publications Department of Mathematical Sciences 010 On the Equivalence Between Real Mutually Unbiase Bases an a Certain

More information

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread]

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread] Witt vectors. Part 1 Michiel Hazewinkel Sienotes by Darij Grinberg Witt#5: Aroun the integrality criterion 9.93 [version 1.1 21 April 2013, not complete, not proofrea In [1, section 9.93, Hazewinkel states

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

Stable Polynomials over Finite Fields

Stable Polynomials over Finite Fields Rev. Mat. Iberoam., 1 14 c European Mathematical Society Stable Polynomials over Finite Fiels Domingo Gómez-Pérez, Alejanro P. Nicolás, Alina Ostafe an Daniel Saornil Abstract. We use the theory of resultants

More information

arxiv: v1 [physics.flu-dyn] 8 May 2014

arxiv: v1 [physics.flu-dyn] 8 May 2014 Energetics of a flui uner the Boussinesq approximation arxiv:1405.1921v1 [physics.flu-yn] 8 May 2014 Kiyoshi Maruyama Department of Earth an Ocean Sciences, National Defense Acaemy, Yokosuka, Kanagawa

More information

2Algebraic ONLINE PAGE PROOFS. foundations

2Algebraic ONLINE PAGE PROOFS. foundations Algebraic founations. Kick off with CAS. Algebraic skills.3 Pascal s triangle an binomial expansions.4 The binomial theorem.5 Sets of real numbers.6 Surs.7 Review . Kick off with CAS Playing lotto Using

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

On the minimum distance of elliptic curve codes

On the minimum distance of elliptic curve codes On the minimum istance of elliptic curve coes Jiyou Li Department of Mathematics Shanghai Jiao Tong University Shanghai PRChina Email: lijiyou@sjtueucn Daqing Wan Department of Mathematics University of

More information

Code_Aster. Detection of the singularities and calculation of a map of size of elements

Code_Aster. Detection of the singularities and calculation of a map of size of elements Titre : Détection es singularités et calcul une carte [...] Date : 0/0/0 Page : /6 Responsable : DLMAS Josselin Clé : R4.0.04 Révision : Detection of the singularities an calculation of a map of size of

More information

Situation awareness of power system based on static voltage security region

Situation awareness of power system based on static voltage security region The 6th International Conference on Renewable Power Generation (RPG) 19 20 October 2017 Situation awareness of power system base on static voltage security region Fei Xiao, Zi-Qing Jiang, Qian Ai, Ran

More information

Similar Operators and a Functional Calculus for the First-Order Linear Differential Operator

Similar Operators and a Functional Calculus for the First-Order Linear Differential Operator Avances in Applie Mathematics, 9 47 999 Article ID aama.998.067, available online at http: www.iealibrary.com on Similar Operators an a Functional Calculus for the First-Orer Linear Differential Operator

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

Examining Geometric Integration for Propagating Orbit Trajectories with Non-Conservative Forcing

Examining Geometric Integration for Propagating Orbit Trajectories with Non-Conservative Forcing Examining Geometric Integration for Propagating Orbit Trajectories with Non-Conservative Forcing Course Project for CDS 05 - Geometric Mechanics John M. Carson III California Institute of Technology June

More information

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics This moule is part of the Memobust Hanbook on Methoology of Moern Business Statistics 26 March 2014 Metho: Balance Sampling for Multi-Way Stratification Contents General section... 3 1. Summary... 3 2.

More information

Code_Aster. Detection of the singularities and computation of a card of size of elements

Code_Aster. Detection of the singularities and computation of a card of size of elements Titre : Détection es singularités et calcul une carte [...] Date : 0/0/0 Page : /6 Responsable : Josselin DLMAS Clé : R4.0.04 Révision : 9755 Detection of the singularities an computation of a car of size

More information

Spectral Modular Arithmetic for Binary Extension Fields

Spectral Modular Arithmetic for Binary Extension Fields 2011 International Conference on Information an Computer Networks (ICICN 2011) Spectral Moular Arithmetic for Binary Extension Fiels Gokay Salamli MIS epartment, Bogazici University 34342 Bebek, Istanbul,

More information

Lecture 2 Lagrangian formulation of classical mechanics Mechanics

Lecture 2 Lagrangian formulation of classical mechanics Mechanics Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,

More information

Systems & Control Letters

Systems & Control Letters Systems & ontrol Letters ( ) ontents lists available at ScienceDirect Systems & ontrol Letters journal homepage: www.elsevier.com/locate/sysconle A converse to the eterministic separation principle Jochen

More information

From Local to Global Control

From Local to Global Control Proceeings of the 47th IEEE Conference on Decision an Control Cancun, Mexico, Dec. 9-, 8 ThB. From Local to Global Control Stephen P. Banks, M. Tomás-Roríguez. Automatic Control Engineering Department,

More information

Conservation Laws. Chapter Conservation of Energy

Conservation Laws. Chapter Conservation of Energy 20 Chapter 3 Conservation Laws In orer to check the physical consistency of the above set of equations governing Maxwell-Lorentz electroynamics [(2.10) an (2.12) or (1.65) an (1.68)], we examine the action

More information

The new concepts of measurement error s regularities and effect characteristics

The new concepts of measurement error s regularities and effect characteristics The new concepts of measurement error s regularities an effect characteristics Ye Xiaoming[1,] Liu Haibo [3,,] Ling Mo[3] Xiao Xuebin [5] [1] School of Geoesy an Geomatics, Wuhan University, Wuhan, Hubei,

More information

The Non-abelian Hodge Correspondence for Non-Compact Curves

The Non-abelian Hodge Correspondence for Non-Compact Curves 1 Section 1 Setup The Non-abelian Hoge Corresponence for Non-Compact Curves Chris Elliott May 8, 2011 1 Setup In this talk I will escribe the non-abelian Hoge theory of a non-compact curve. This was worke

More information

THE GENUINE OMEGA-REGULAR UNITARY DUAL OF THE METAPLECTIC GROUP

THE GENUINE OMEGA-REGULAR UNITARY DUAL OF THE METAPLECTIC GROUP THE GENUINE OMEGA-REGULAR UNITARY DUAL OF THE METAPLECTIC GROUP ALESSANDRA PANTANO, ANNEGRET PAUL, AND SUSANA A. SALAMANCA-RIBA Abstract. We classify all genuine unitary representations of the metaplectic

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

What s in an Attribute? Consequences for the Least Common Subsumer

What s in an Attribute? Consequences for the Least Common Subsumer What s in an Attribute? Consequences for the Least Common Subsumer Ralf Küsters LuFG Theoretical Computer Science RWTH Aachen Ahornstraße 55 52074 Aachen Germany kuesters@informatik.rwth-aachen.e Alex

More information

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson JUST THE MATHS UNIT NUMBER 10.2 DIFFERENTIATION 2 (Rates of change) by A.J.Hobson 10.2.1 Introuction 10.2.2 Average rates of change 10.2.3 Instantaneous rates of change 10.2.4 Derivatives 10.2.5 Exercises

More information

Switching Time Optimization in Discretized Hybrid Dynamical Systems

Switching Time Optimization in Discretized Hybrid Dynamical Systems Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

Linear Algebra- Review And Beyond. Lecture 3

Linear Algebra- Review And Beyond. Lecture 3 Linear Algebra- Review An Beyon Lecture 3 This lecture gives a wie range of materials relate to matrix. Matrix is the core of linear algebra, an it s useful in many other fiels. 1 Matrix Matrix is the

More information

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies Laplacian Cooperative Attitue Control of Multiple Rigi Boies Dimos V. Dimarogonas, Panagiotis Tsiotras an Kostas J. Kyriakopoulos Abstract Motivate by the fact that linear controllers can stabilize the

More information

The Principle of Least Action

The Principle of Least Action Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of

More information

The effect of dissipation on solutions of the complex KdV equation

The effect of dissipation on solutions of the complex KdV equation Mathematics an Computers in Simulation 69 (25) 589 599 The effect of issipation on solutions of the complex KV equation Jiahong Wu a,, Juan-Ming Yuan a,b a Department of Mathematics, Oklahoma State University,

More information

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides Reference 1: Transformations of Graphs an En Behavior of Polynomial Graphs Transformations of graphs aitive constant constant on the outsie g(x) = + c Make graph of g by aing c to the y-values on the graph

More information

Optimal CDMA Signatures: A Finite-Step Approach

Optimal CDMA Signatures: A Finite-Step Approach Optimal CDMA Signatures: A Finite-Step Approach Joel A. Tropp Inst. for Comp. Engr. an Sci. (ICES) 1 University Station C000 Austin, TX 7871 jtropp@ices.utexas.eu Inerjit. S. Dhillon Dept. of Comp. Sci.

More information

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential Avances in Applie Mathematics an Mechanics Av. Appl. Math. Mech. Vol. 1 No. 4 pp. 573-580 DOI: 10.4208/aamm.09-m0946 August 2009 A Note on Exact Solutions to Linear Differential Equations by the Matrix

More information

Vectors in two dimensions

Vectors in two dimensions Vectors in two imensions Until now, we have been working in one imension only The main reason for this is to become familiar with the main physical ieas like Newton s secon law, without the aitional complication

More information

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1 Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of

More information

Review/Outline Review: Basic computations in finite fields Reed-Solomon codes Hamming codes Bose-Chaudhuri-Hocquengham (BCH) codes

Review/Outline Review: Basic computations in finite fields Reed-Solomon codes Hamming codes Bose-Chaudhuri-Hocquengham (BCH) codes Review/Outline Review: Basic computations in finite fiels Ree-Solomon coes Hamming coes Bose-Chauhuri-Hocquengham (BCH) coes Testing for irreucibility Frobenius automorphisms Other roots of equations Counting

More information

Euler equations for multiple integrals

Euler equations for multiple integrals Euler equations for multiple integrals January 22, 2013 Contents 1 Reminer of multivariable calculus 2 1.1 Vector ifferentiation......................... 2 1.2 Matrix ifferentiation........................

More information

Calculus in the AP Physics C Course The Derivative

Calculus in the AP Physics C Course The Derivative Limits an Derivatives Calculus in the AP Physics C Course The Derivative In physics, the ieas of the rate change of a quantity (along with the slope of a tangent line) an the area uner a curve are essential.

More information

inflow outflow Part I. Regular tasks for MAE598/494 Task 1

inflow outflow Part I. Regular tasks for MAE598/494 Task 1 MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the

More information

One-dimensional I test and direction vector I test with array references by induction variable

One-dimensional I test and direction vector I test with array references by induction variable Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

Periods of quadratic twists of elliptic curves

Periods of quadratic twists of elliptic curves Perios of quaratic twists of elliptic curves Vivek Pal with an appenix by Amo Agashe Abstract In this paper we prove a relation between the perio of an elliptic curve an the perio of its real an imaginary

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Math 342 Partial Differential Equations «Viktor Grigoryan

Math 342 Partial Differential Equations «Viktor Grigoryan Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

Axiometrics: Axioms of Information Retrieval Effectiveness Metrics

Axiometrics: Axioms of Information Retrieval Effectiveness Metrics Axiometrics: Axioms of Information Retrieval Effectiveness Metrics ABSTRACT Ey Maalena Department of Maths Computer Science University of Uine Uine, Italy ey.maalena@uniu.it There are literally ozens most

More information

Computing Derivatives

Computing Derivatives Chapter 2 Computing Derivatives 2.1 Elementary erivative rules Motivating Questions In this section, we strive to unerstan the ieas generate by the following important questions: What are alternate notations

More information

On the Fourier transform of the greatest common divisor arxiv: v1 [math.nt] 16 Jan 2012

On the Fourier transform of the greatest common divisor arxiv: v1 [math.nt] 16 Jan 2012 On the Fourier transform of the greatest common ivisor arxiv:1201.3139v1 [math.nt] 16 Jan 2012 Peter H. van er Kamp Department of Mathematics an Statistics La Trobe University Victoria 3086, Australia

More information

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels. Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion

More information

TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM

TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM 265 Asian Journal of Control, Vol. 4, No. 3, pp. 265-273, September 22 TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM Jurachart Jongusuk an Tsutomu Mita

More information

Strength Analysis of CFRP Composite Material Considering Multiple Fracture Modes

Strength Analysis of CFRP Composite Material Considering Multiple Fracture Modes 5--XXXX Strength Analysis of CFRP Composite Material Consiering Multiple Fracture Moes Author, co-author (Do NOT enter this information. It will be pulle from participant tab in MyTechZone) Affiliation

More information

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche Department of Computing Macquarie University, Australia christophe.oche@mq.eu.au. Abstract. The

More information

Robustness and Perturbations of Minimal Bases

Robustness and Perturbations of Minimal Bases Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important

More information

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

arxiv: v1 [math.mg] 10 Apr 2018

arxiv: v1 [math.mg] 10 Apr 2018 ON THE VOLUME BOUND IN THE DVORETZKY ROGERS LEMMA FERENC FODOR, MÁRTON NASZÓDI, AND TAMÁS ZARNÓCZ arxiv:1804.03444v1 [math.mg] 10 Apr 2018 Abstract. The classical Dvoretzky Rogers lemma provies a eterministic

More information

CHAPTER 1 : DIFFERENTIABLE MANIFOLDS. 1.1 The definition of a differentiable manifold

CHAPTER 1 : DIFFERENTIABLE MANIFOLDS. 1.1 The definition of a differentiable manifold CHAPTER 1 : DIFFERENTIABLE MANIFOLDS 1.1 The efinition of a ifferentiable manifol Let M be a topological space. This means that we have a family Ω of open sets efine on M. These satisfy (1), M Ω (2) the

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

A Path Planning Method Using Cubic Spiral with Curvature Constraint

A Path Planning Method Using Cubic Spiral with Curvature Constraint A Path Planning Metho Using Cubic Spiral with Curvature Constraint Tzu-Chen Liang an Jing-Sin Liu Institute of Information Science 0, Acaemia Sinica, Nankang, Taipei 5, Taiwan, R.O.C., Email: hartree@iis.sinica.eu.tw

More information

Efficient Construction of Semilinear Representations of Languages Accepted by Unary NFA

Efficient Construction of Semilinear Representations of Languages Accepted by Unary NFA Efficient Construction of Semilinear Representations of Languages Accepte by Unary NFA Zeněk Sawa Center for Applie Cybernetics, Department of Computer Science Technical University of Ostrava 17. listopau

More information

05 The Continuum Limit and the Wave Equation

05 The Continuum Limit and the Wave Equation Utah State University DigitalCommons@USU Founations of Wave Phenomena Physics, Department of 1-1-2004 05 The Continuum Limit an the Wave Equation Charles G. Torre Department of Physics, Utah State University,

More information

ON BEAUVILLE STRUCTURES FOR PSL(2, q)

ON BEAUVILLE STRUCTURES FOR PSL(2, q) ON BEAUVILLE STRUCTURES FOR PSL(, q) SHELLY GARION Abstract. We characterize Beauville surfaces of unmixe type with group either PSL(, p e ) or PGL(, p e ), thus extening previous results of Bauer, Catanese

More information

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We

More information

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations Lecture XII Abstract We introuce the Laplace equation in spherical coorinates an apply the metho of separation of variables to solve it. This will generate three linear orinary secon orer ifferential equations:

More information

Placement and tuning of resonance dampers on footbridges

Placement and tuning of resonance dampers on footbridges Downloae from orbit.tu.k on: Jan 17, 19 Placement an tuning of resonance ampers on footbriges Krenk, Steen; Brønen, Aners; Kristensen, Aners Publishe in: Footbrige 5 Publication ate: 5 Document Version

More information

VIRTUAL STRUCTURE BASED SPACECRAFT FORMATION CONTROL WITH FORMATION FEEDBACK

VIRTUAL STRUCTURE BASED SPACECRAFT FORMATION CONTROL WITH FORMATION FEEDBACK AIAA Guiance, Navigation, an Control Conference an Exhibit 5-8 August, Monterey, California AIAA -9 VIRTUAL STRUCTURE BASED SPACECRAT ORMATION CONTROL WITH ORMATION EEDBACK Wei Ren Ranal W. Bear Department

More information

Integration Review. May 11, 2013

Integration Review. May 11, 2013 Integration Review May 11, 2013 Goals: Review the funamental theorem of calculus. Review u-substitution. Review integration by parts. Do lots of integration eamples. 1 Funamental Theorem of Calculus In

More information

New Bounds for Distributed Storage Systems with Secure Repair

New Bounds for Distributed Storage Systems with Secure Repair New Bouns for Distribute Storage Systems with Secure Repair Ravi Tanon 1 an Soheil Mohajer 1 Discovery Analytics Center & Department of Computer Science, Virginia Tech, Blacksburg, VA Department of Electrical

More information

Free rotation of a rigid body 1 D. E. Soper 2 University of Oregon Physics 611, Theoretical Mechanics 5 November 2012

Free rotation of a rigid body 1 D. E. Soper 2 University of Oregon Physics 611, Theoretical Mechanics 5 November 2012 Free rotation of a rigi boy 1 D. E. Soper 2 University of Oregon Physics 611, Theoretical Mechanics 5 November 2012 1 Introuction In this section, we escribe the motion of a rigi boy that is free to rotate

More information

On the dynamics of the electron: Introduction, 1, 9

On the dynamics of the electron: Introduction, 1, 9 On the ynamics of the electron: Introuction,, 9 Henri oincaré Introuction. It seems at first that the aberration of light an relate optical an electrical phenomena will provie us with a means of etermining

More information

OPTIMAL CONTROL PROBLEM FOR PROCESSES REPRESENTED BY STOCHASTIC SEQUENTIAL MACHINE

OPTIMAL CONTROL PROBLEM FOR PROCESSES REPRESENTED BY STOCHASTIC SEQUENTIAL MACHINE OPTIMA CONTRO PROBEM FOR PROCESSES REPRESENTED BY STOCHASTIC SEQUENTIA MACHINE Yaup H. HACI an Muhammet CANDAN Department of Mathematics, Canaale Onseiz Mart University, Canaale, Turey ABSTRACT In this

More information

ERROR-detecting codes and error-correcting codes work

ERROR-detecting codes and error-correcting codes work 1 Convolutional-Coe-Specific CRC Coe Design Chung-Yu Lou, Stuent Member, IEEE, Babak Daneshra, Member, IEEE, an Richar D. Wesel, Senior Member, IEEE arxiv:1506.02990v1 [cs.it] 9 Jun 2015 Abstract Cyclic

More information

arxiv:physics/ v2 [physics.ed-ph] 23 Sep 2003

arxiv:physics/ v2 [physics.ed-ph] 23 Sep 2003 Mass reistribution in variable mass systems Célia A. e Sousa an Vítor H. Rorigues Departamento e Física a Universiae e Coimbra, P-3004-516 Coimbra, Portugal arxiv:physics/0211075v2 [physics.e-ph] 23 Sep

More information

Application of the homotopy perturbation method to a magneto-elastico-viscous fluid along a semi-infinite plate

Application of the homotopy perturbation method to a magneto-elastico-viscous fluid along a semi-infinite plate Freun Publishing House Lt., International Journal of Nonlinear Sciences & Numerical Simulation, (9), -, 9 Application of the homotopy perturbation metho to a magneto-elastico-viscous flui along a semi-infinite

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

Extension of de Weger s Attack on RSA with Large Public Keys

Extension of de Weger s Attack on RSA with Large Public Keys Extension of e Weger s Attack on RSA with Large Public Keys Nicolas T. Courtois, Theoosis Mourouzis an Pho V. Le Department of Computer Science, University College Lonon, Gower Street, Lonon, U.K. {n.courtois,

More information

Upper and Lower Bounds on ε-approximate Degree of AND n and OR n Using Chebyshev Polynomials

Upper and Lower Bounds on ε-approximate Degree of AND n and OR n Using Chebyshev Polynomials Upper an Lower Bouns on ε-approximate Degree of AND n an OR n Using Chebyshev Polynomials Mrinalkanti Ghosh, Rachit Nimavat December 11, 016 1 Introuction The notion of approximate egree was first introuce

More information

Differentiability, Computing Derivatives, Trig Review. Goals:

Differentiability, Computing Derivatives, Trig Review. Goals: Secants vs. Derivatives - Unit #3 : Goals: Differentiability, Computing Derivatives, Trig Review Determine when a function is ifferentiable at a point Relate the erivative graph to the the graph of an

More information

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods Hyperbolic Moment Equations Using Quarature-Base Projection Methos J. Koellermeier an M. Torrilhon Department of Mathematics, RWTH Aachen University, Aachen, Germany Abstract. Kinetic equations like the

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems Construction of the Electronic Raial Wave Functions an Probability Distributions of Hyrogen-like Systems Thomas S. Kuntzleman, Department of Chemistry Spring Arbor University, Spring Arbor MI 498 tkuntzle@arbor.eu

More information