10:00 12:30. Do not open this problem booklet until the start of the examination is announced.
|
|
- Everett Byrd
- 5 years ago
- Views:
Transcription
1 0 I :00 1:30 (1),. Do not open this problem booklet until the start of the examination is announced. () 4.. Answer the following 4 problems. Use the designated answer sheet for each problem. (3). Do not take the answer sheets and the problem booklet out of the examination room.. Fill the following blank with your examinee s number. No.
2 1 3 3 z 3 O z (0, 0,z 0 ) z 0 3 P 1, P, P 3 (x 1,y 1,z 1 ), (x,y,z ), (x 3,y 3,z 3 ) P1 0, P 0, P 3 0 (x0,y 0,z 0 ) (x 0,y 0 ) (1) P 0 1, P 0, P 0 3 (x0 1,y0 1 ), (x0,y0 ), (x0 3,y0 3 ) () P 0 (x 0,y 0 ) 4P1 0P 0P 3 0 P 0 (3) 3 4P 1 P P 3 4P 1 P P 3 (4) P 0 4P1 0P 0P 3 0 P 0 3 4P 1 P P 3 P P 0 P (5) P P 1 P P P 0 P1 0 P 0 P 4P 1 P P 3 P P 0 4P1 0P 0P 3 0 4P 1 P P 3 O
3 Problem 1 Answer the following questions on the projection of objects in a three dimensional space onto a two dimensional screen. For all triangles in the following, assume that each has three vertices that are not on a line, and that each vertex has a positive z coordinate. Suppose that the projection center (viewpoint) is at the origin O of the three dimensional coordinate system, and the projection plane (screen) is perpendicular to the z-axis and intersects with the z-axis at the coordinates (0, 0,z 0 ), where z 0 is a positive constant. Let P 1, P,andP 3 be the three vertices of a triangle and have the coordinates (x 1,y 1,z 1 ), (x,y,z ), and (x 3,y 3,z 3 ), respectively. The points P 0 1, P 0,andP 0 3 are de ned to be the projections of P 1, P,andP 3, respectively, onto the projection plane. To a projected point (x 0,y 0,z 0 ), coordinates (x 0,y 0 )of the two dimensional projection plane coordinate system are associated. (See the gure.) (1) Calculate the projection plane coordinates P 0 1 (x0 1,y0 1 ), P 0 (x0,y0 ), and P 0 3 (x0 3,y0 3 ). () Assume that a point P 0 (x 0,y 0 ) on the projection plane is given. Find a method to determine whetherornotthepointp 0 lies inside the triangle 4P 0 1 P 0 P 0 3. Assume that if P 0 coincides with one of the vertices or on an edge of the triangle, then it is not regarded as inside the triangle. (3) Calculate a normal vector of the triangle 4P 1 P P 3 in the three dimensional coordinate system, and give an equation of the plane that contains the triangle 4P 1 P P 3. (4) Suppose that the point P 0 on 4P 0 1 P 0 P 0 3 is obtained by projecting a point P on 4P 1P P 3 onto the screen. Write the coordinates of P using the coordinates of P 0. (5) Next assume that P isthemiddlepointofp 1 and P. Derive the condition for P 0,which is the projection of P, being the middle point of P1 0 and P 0, and explain its geometric interpretation. Also derive the condition for P 0 being the center of mass of 4P1 0P 0P 3 0 when P is the center of mass of 4P 1 P P 3. Assume that 4P 1 P P 3 and O are not on a plane. 3
4 N 1 L N L N = {a 1 a n {0, 1} n N, a n N+1 =1} (1) L 3 4 () L 3 8 (3) L N N 4
5 Problem For an integer N 1, consider the following language L N L N = {a 1 a n {0, 1} n N, a n N+1 =1}. Answer the following questions. (1) Construct a nondeterministic nite automaton with 4 states which accepts L 3. () Construct a deterministic nite automaton with 8 states which accepts L 3. (3) Prove that any deterministic nite automaton which accepts L N has at least N states. 5
6 3 n X = {x 1,x,...,x n } k X X N 1: Select(k, X) { : if ( X <N) { 3: return X k ; 4: } 5: X 5 m = d X 5 e X 1,X,...,X m ; 6: /* i<m X i =5 X m 5 */ 7: for (i =1tom) { 8: y i Select(d X i e, X i); 9: } 10: a Select(d m e, {y 1,y,...,y m }); 11: X small X a ; 1: X large X a ; 13: if ( X small = k 1) { 14: return a; 15: } 16: if ( X small k) { 17: return Select(k, X small ); 18: } 19: else { 0: return Select(k X small 1, X large ); 1: } : } (1) 3 () N X X small 3 4 X (3) T (n) T (n) n = X (4) T (n) O(n) 6
7 Problem 3 For a sequence of n di erent integers X = {x 1,x,...,x n }, consider the following algorithm that computes the k-th smallest integer in the sequence. X denotes the number of elements in X. N is a positive constant. 1: Select(k, X) { : if ( X <N) { 3: return the k-th smallest integer in X computed by using a heap; 4: } 5: Divide X into m = d X 5 e sequences of 5 or less integers, and let them be X 1,X,...,X m ; 6: /* We let X i =5fori<m. X m can be smaller than 5. */ 7: for (i =1tom) { 8: y i Select(d X i e, X i); 9: } 10: a Select(d m e, {y 1,y,...,y m }); 11: X small the sequence of the integers in X that are smaller than a; 1: X large the sequence of the integers in X that are larger than a; 13: if ( X small = k 1) { 14: return a; 15: } 16: if ( X small k) { 17: return Select(k, X small ); 18: } 19: else { 0: return Select(k X small 1, X large ); 1: } : } Answer the following questions on the above pseudo code. (1) Describe what a heap mentioned in line 3 is. () Prove that 1 4 X X small 3 4 X after line 11 when the constant N is large enough. (3) Let the worst case computational complexity of the above algorithm be T (n). Show a recurrence equation of T (n). (Note that n = X.) (4) Show that T (n) is O(n). 7
8 4 10 Mbps (1) D- AND OR NOT () 10 Mbps 3 (3) () 8
9 Problem 4 Manchester code is used as an encoding method of data in 10 Mbps Ethernet. As shown in the gure below, data 1 is expressed by a 0 1 transition, and data 0 is expressed by a 1 0 transition. Transitions that signify data are generated with regular time intervals as shown in the arrow marks of the gure. (1) Design a Manchester encoder, using D ip- ops, AND, OR, and NOT gates, whose input data is synchronized with a clock. () Explain at least two reasons to use Manchester code in 10 Mbps Ethernet. The answer should be within three lines. (3) Manchester code requires the network bandwidth twice as wide as the data transfer bandwidth. Discuss a coding method that utilizes the network bandwidth better, without much degrading the advantages of Manchester code answered in question (). 9
10 0 II :30 16:00 (1),. Do not open this problem booklet until the start of the examination is announced. () 4.. Answer the following 4 problems. Use the designated answer sheet for each problem. (3). Do not take the answer sheets and the problem booklet out of the examination room.. Fill the following blank with your examinee s number. No.
11 1 N 4 =exp μ i N 1 N i (z 0,z 1,...,z N 1 ) N (Z 0,Z 1,...,Z N 1 ) Z k = N 1 X j=0 z j jk (k =0, 1,..., N 1) (1) z j 0 Z 0 Z N k =1,,..., N 1 Z k = Z N k z z () z j g j = z j + iz j+1 ³j =0, 1,..., N 1 (g 0,g 1,...,gN 1) N (G 0,G 1,...,GN 1) N X 1 G k = g j ³k jk N =0, 1,..., 1 Z 0 Z N j=0 G 0 ( ) (3) () k = 1,,..., N 4 1 Z k Z N k G k G N k
12 Problem 1 Let N be a positive integer that is a multiple of 4, and μ i =exp N be the primitive Nth root of 1 (i is the imaginary unit). For a sequence of complex numbers (z 0,z 1,...,z N 1 ), its N-point discrete Fourier transform (Z 0,Z 1,...,Z N 1 )isde nedas Z k = N 1 X j=0 Answer the following questions. z j jk (k =0, 1,..., N 1). (1) Assume that all z j are real (that is, their imaginary parts are zeros). Show that Z 0 and Z N are real numbers. Also show that Z k = Z N k for k = 1,,..., N 1. ( z is the complex conjugate of z.) () Assume that all z j are real numbers. Let g j = z j + iz j+1 ³j =0, 1,..., N 1 and (G 0,G 1,...,GN 1) bethe N -point discrete Fourier transform of (g 0,g 1,...,gN 1), that is, Express Z 0 and Z N be used.) G k = N 1 X g j ³k jk =0, 1,..., j=0 N 1. in terms of G 0. (Complex conjugates or the real/imaginary parts may (3) Express Z k and Z N k in terms of G k and G N k for k =1,,..., N 4 assumptions as question (). 1, under the same 3
13 c + E w E w c c E 1 w 1 E w E 1 + E w 1 w + E 1 w 1 E w E 1 E w 1 w E eval(e) w s (w, s) (w 1,s 1 ) (w,s ) (w 1,s 1 ) (w,s ) c v c (cw, s) (w, v c s) v = eval(v 1 + v ) (+w, v v 1 s) (w, vs) v = eval(v 1 v ) ( w, v v 1 s) (w, vs) eval(e) =v E w (w, ²) (², v) ² (1) () (3) 4
14 Problem Consider translating an expression made of integer constants (denoted by c below) and binary operators + and to a string in post x notation as follows, where E w means that expression E is translated to string w. c c E 1 w 1 and E w imply E 1 + E w 1 w + E 1 w 1 and E w imply E 1 E w 1 w Let us write eval(e) for the value resulting from evaluating an expression E by usual integer arithmetics. We then introduce the following rules for rewriting a pair (w, s) ofastringw in post x notation and a sequence (stack) s of values, where (w 1,s 1 ) (w,s ) means that pair (w 1,s 1 ) is rewritten into pair (w,s ). if the value of c is v c then (cw, s) (w, v c s) v = eval(v 1 + v )implies(+w, v v 1 s) (w, vs) v = eval(v 1 v )implies( w, v v 1 s) (w, vs) The transitive closure of is denoted by. We now want to prove a proposition that if eval(e) =v and E w hold, then (w, ²) (², v) holds, where ² denotes an empty sequence or an empty string. Answer the following questions. (1) To prove the proposition, should we use induction on what? () In order for induction to go through, we should generalize the proposition. How should the proposition be generalized? (3) Prove the generalized proposition by induction. 5
15 3 U (0 ) U U =(v 1,v,v 3,v 4,v 5 ) (v 1,v 3,v 4 ) U U i U[i] U U f(u, V ) U = V U, V U X f(u, V )= {dist(u[i],v[i]) c} i=1 dist(v,w) v w c U, V U 0 = V 0 U U 0 V V 0 f(u 0,V 0 ) min(u, V ) Umin 0, V min 0 min(u, V ) = min{f(u 0,V 0 ) U 0 U, V 0 V, U 0 = V 0 } = f(umin,v 0 min) 0 U 0 U U 0 U k = Umin 0 = V min 0 1 ` k U 0 min[`] =U[i`], V 0 min[`] =V [j`] i`, j` min(u, V ) = f (U 0 min[1],u 0 min[],...,u 0 min[k]), (V 0 min[1],v 0 min[],...,v 0 min[k]) = f((u[i 1 ],U[i ],...,U[i k ]), (V [j 1 ],V[j ],...,V[j k ])) i 1 <i < <i k j 1 <j < <j k (1) U, V, c min(u, V ) (i 1,i,...,i k ) (j 1,j,...,j k ) U = ((0, ), (1, ), (, ), (3, ), (3, 3), (4, 3), (4, )) V = ((1, 1), (, 1), (, 0), (3, 0), (3, 1), (4, 1), (5, 1)) c = 1. 1 ` k dist(umin 0 [`],V0 min [`]) c () U i j U[i..j] 1 ` k ` min(u[1..i`],v[1..j`]) = f ((U[i 1 ],U[i ],...,U[i`]), (V [j 1 ],V[j ],...,V[j`])) (3) min(u, V ) 6
16 Problem 3 Let U be a sequence of points in two dimensional space, and let us call subsequence of U a sequence of points that can be constructed from U by removing some (more than or equal to 0) points. For example, (v 1,v 3,v 4 ) is a subsequence of U, whereu =(v 1,v,v 3,v 4,v 5 ). Let U[i] denote the i-th point of the sequence U, andlet U denote the number of points in U. For two point sequences U and V such that U = V, we consider the following function. U X f(u, V )= {dist(u[i],v[i]) c}, i=1 where dist(v, w) denotes the Euclidean distance between v and w, and c is a real positive constant. For given U and V (possibly U 6= V ), let min(u, V ) be the minimum of f(u 0,V 0 )whereu 0 and V 0 are subsequences of U and V, respectively, such that U 0 = V 0.LetU 0 min and V 0 min be the subsequences that give the minimum. That is, min(u, V ) = min{f(u 0,V 0 ) U 0 U, V 0 V, U 0 = V 0 } = f(umin,v 0 min), 0 where U 0 U means that U 0 is a subsequence of U. Let k = U 0 min = V 0 min and determine i` and j` for 1 ` k as U 0 min[`] =U[i`], V 0 min[`] =V [j`]. Thus we have min(u, V ) = f (U 0 min[1],u 0 min[],...,u 0 min[k]), (V 0 min[1],v 0 min[],...,v 0 min[k]) = f((u[i 1 ],U[i ],...,U[i k ]), (V [j 1 ],V[j ],...,V[j k ])). Here assume that i 1 <i < <i k and j 1 <j < <j k. Answer the following questions. (1) Compute min(u, V ), (i 1,i,...,i k ), and (j 1,j,...,j k )when U = ((0, ), (1, ), (, ), (3, ), (3, 3), (4, 3), (4, )), V = ((1, 1), (, 1), (, 0), (3, 0), (3, 1), (4, 1), (5, 1)), c = 1.. Note that dist(umin 0 [`],V0 min [`]) c holds for 1 ` k. () Let U[i..j] denote the subsequence from the i-th point to the j-th point of U. Show that the following equation holds for an arbitrary integer ` such that 1 ` k: min(u[1..i`],v[1..j`]) = f ((U[i 1 ],U[i ],...,U[i`]), (V [j 1 ],V[j ],...,V[j`])). (3) Describe an algorithm for computing min(u, V ) and its computational complexity. 7
17 byte/sec 10 msec Sequence Number Packet Type Data Size data (3 Bytes) (1 Byte) ( Bytes) Packet Type: 1 DATA 0 ACK DATA ACK ACK Sequence Number Sequence Number Sequence Number DATA ACK DATA Sequence Number (modulo 4 )1 (1) () (3) (4) (a) (b) 8
18 Problem 4 We assume that two computers are connected by a network of data-link layer whose packet size is xed as 1000 bytes. We also assume that the bandwidth and the latency of this data-link layer network are 10 6 byte/sec and 10 msec, respectively. No packet ow controlling mechanism is supported, and packet arrival is not guaranteed. The following is an un nished design of a network protocol on top of this data-link layer. Packet Format Sequence Number Packet Type Data Size data (3 Bytes) (1 Byte) ( Bytes) Packet Type: 1 DATA 0 ACK Processing in the receiver When a DATA packet is received, an ACK packet, whose Sequence Number is the same as the received DATA packet, is sent back to the sender. Processing in the sender The initial Sequence Number is randomly chosen. After sending a DATA packet, the sender waits for the ACK packet of the DATA packet, and the sender sends the next DATA packet after the receipt of the ACK packet. The Sequence Number is incremented by 1 (modulo 4 )ateachpacketsending. Answer the following questions. (1) Calculate the maximum throughput when no packet is lost. () Modify the protocol so as to consider packet loss. The protocol may be written in a pseudo code. (3) Modify the protocol so as to utilize the data-link network bandwidth better. (4) Assume that 64 computers are connected with a network of 8 8 mesh topology using the same data-link layer as above. Design a new network protocol based on the above protocol so that all the computers may communicate each other. Explain the new protocol from the following points of view. (a) Packet format. (b) Sending, receiving, and routing on each computer. 9
CSE 123: Computer Networks
CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each
More informationAutomata Theory for Presburger Arithmetic Logic
Automata Theory for Presburger Arithmetic Logic References from Introduction to Automata Theory, Languages & Computation and Constraints in Computational Logic Theory & Application Presented by Masood
More informationSolutions. 9. Ans. C. Memory size. 11. Ans. D. a b c d e f a d e b c f a b d c e f a d b c e f a b d e c f a d b e c f. 13. Ans. D. Merge sort n log n
Solutions. Ans. B. ~ p q ~ r ~ s ~ p q r s ~ ~ p q r s p ~ q r s ~ p q ~ r v ~ s For x only the above compound preposition is true.. Ans. B. Case I First bit is 0 Case II First bit is 6. Ans. A. # has
More informationComputer Networks ( Classroom Practice Booklet Solutions)
Computer Networks ( Classroom Practice Booklet Solutions). Concept Of Layering 0. Ans: (b) Sol: Data Link Layer is responsible for decoding bit stream into frames. 0. Ans: (c) Sol: Network Layer has the
More information10:00 12:30. Do not open this problem booklet until the start of the examination is announced.
21 I 20 8 26 10:00 12:30 (1),. Do not open this problem booklet until the start of the examination is announced. (2) 4.. Answer the following 4 problems. Use the designated answer sheet for each problem.
More informationCSCE 551 Final Exam, Spring 2004 Answer Key
CSCE 551 Final Exam, Spring 2004 Answer Key 1. (10 points) Using any method you like (including intuition), give the unique minimal DFA equivalent to the following NFA: 0 1 2 0 5 1 3 4 If your answer is
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer
More informationEECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power)
EECS 150 - Components and esign Techniques for igital Systems Lec 26 CRCs, LFSRs (and a little power) avid Culler Electrical Engineering and Computer Sciences University of California, Berkeley http://www.eecs.berkeley.edu/~culler
More informationThe Design Procedure. Output Equation Determination - Derive output equations from the state table
The Design Procedure Specification Formulation - Obtain a state diagram or state table State Assignment - Assign binary codes to the states Flip-Flop Input Equation Determination - Select flipflop types
More informationUniversity of New Mexico Department of Computer Science. Final Examination. CS 561 Data Structures and Algorithms Fall, 2006
University of New Mexico Department of Computer Science Final Examination CS 561 Data Structures and Algorithms Fall, 2006 Name: Email: Print your name and email, neatly in the space provided above; print
More informationDO NOT ROUND YOUR ANSWERS
Directions: Write your answers on the answer sheet. DO NOT detach the answer sheet from your exam. Answers can be given as integers, fractions or in decimal form. The answers which are given in decimal
More informationREVIEW QUESTIONS. Chapter 1: Foundations: Sets, Logic, and Algorithms
REVIEW QUESTIONS Chapter 1: Foundations: Sets, Logic, and Algorithms 1. Why can t a Venn diagram be used to prove a statement about sets? 2. Suppose S is a set with n elements. Explain why the power set
More informationLecturecise 22 Weak monadic second-order theory of one successor (WS1S)
Lecturecise 22 Weak monadic second-order theory of one successor (WS1S) 2013 Reachability in the Heap Many programs manipulate linked data structures (lists, trees). To express many important properties
More information2015 School Year. Graduate School Entrance Examination Problem Booklet. Mathematics
2015 School Year Graduate School Entrance Examination Problem Booklet Mathematics Examination Time: 10:00 to 12:30 Instructions 1. Do not open this problem booklet until the start of the examination is
More informationCourse 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra
Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra D. R. Wilkins Contents 3 Topics in Commutative Algebra 2 3.1 Rings and Fields......................... 2 3.2 Ideals...............................
More informationIntroduction to Kleene Algebras
Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)
More information3.3 Accumulation Sequences
3.3. ACCUMULATION SEQUENCES 25 3.3 Accumulation Sequences Overview. One of the most important mathematical ideas in calculus is that of an accumulation of change for physical quantities. As we have been
More informationProving languages to be nonregular
Proving languages to be nonregular We already know that there exist languages A Σ that are nonregular, for any choice of an alphabet Σ. This is because there are uncountably many languages in total and
More informationDiscrete Structures Lecture Solving Congruences. mathematician of the eighteenth century). Also, the equation gggggg(aa, bb) =
First Introduction Our goal is to solve equations having the form aaaa bb (mmmmmm mm). However, first we must discuss the last part of the previous section titled gcds as Linear Combinations THEOREM 6
More informationCodingrotations on intervals
Theoretical Computer Science 28 (22) 99 7 www.elsevier.com/locate/tcs Codingrotations on intervals Jean Berstel a, Laurent Vuillon b; a Institut Gaspard Monge (IGM), Universite de Marne-la-Vallee, 5, boulevard
More informationDepartment of Systems Innovation, School of Engineering, The University of Tokyo 2011 Entrance Examination and Answer Sheets.
Examinee s No. Department of Systems Innovation, School of Engineering, The University of Tokyo 2011 Entrance Examination and Answer Sheets Mathematics Monday, August 30, 2010 13:00-15:30 Notice 1. Do
More informationComputability and Complexity
Computability and Complexity Non-determinism, Regular Expressions CAS 705 Ryszard Janicki Department of Computing and Software McMaster University Hamilton, Ontario, Canada janicki@mcmaster.ca Ryszard
More information3130CIT Theory of Computation
GRIFFITH UNIVERSITY School of Computing and Information Technology 3130CIT Theory of Computation Final Examination, Semester 2, 2006 Details Total marks: 120 (40% of the total marks for this subject) Perusal:
More informationInternational Mathematics TOURNAMENT OF THE TOWNS
International Mathematics TOURNAMENT OF THE TOWNS Senior A-Level Paper Fall 2010 1 1 There are 100 points on the plane All 4950 pairwise distances between two points have been recorded (a) A single record
More informationReview Sheet for the Final Exam of MATH Fall 2009
Review Sheet for the Final Exam of MATH 1600 - Fall 2009 All of Chapter 1. 1. Sets and Proofs Elements and subsets of a set. The notion of implication and the way you can use it to build a proof. Logical
More informationThree-Dimensional Coordinate Systems. Three-Dimensional Coordinate Systems. Three-Dimensional Coordinate Systems. Three-Dimensional Coordinate Systems
To locate a point in a plane, two numbers are necessary. We know that any point in the plane can be represented as an ordered pair (a, b) of real numbers, where a is the x-coordinate and b is the y-coordinate.
More informationDistributed Systems Principles and Paradigms. Chapter 06: Synchronization
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 06: Synchronization Version: November 16, 2009 2 / 39 Contents Chapter
More information2.1 Sets. Definition 1 A set is an unordered collection of objects. Important sets: N, Z, Z +, Q, R.
2. Basic Structures 2.1 Sets Definition 1 A set is an unordered collection of objects. Important sets: N, Z, Z +, Q, R. Definition 2 Objects in a set are called elements or members of the set. A set is
More informationOutline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world.
Outline EECS 150 - Components and esign Techniques for igital Systems Lec 18 Error Coding Errors and error models Parity and Hamming Codes (SECE) Errors in Communications LFSRs Cyclic Redundancy Check
More informationRecursion and Induction
Recursion and Induction Themes Recursion Recurrence Definitions Recursive Relations Induction (prove properties of recursive programs and objects defined recursively) Examples Tower of Hanoi Gray Codes
More informationAnalysis on Graphs. Alexander Grigoryan Lecture Notes. University of Bielefeld, WS 2011/12
Analysis on Graphs Alexander Grigoryan Lecture Notes University of Bielefeld, WS 0/ Contents The Laplace operator on graphs 5. The notion of a graph............................. 5. Cayley graphs..................................
More informationB Elements of Complex Analysis
Fourier Transform Methods in Finance By Umberto Cherubini Giovanni Della Lunga Sabrina Mulinacci Pietro Rossi Copyright 21 John Wiley & Sons Ltd B Elements of Complex Analysis B.1 COMPLEX NUMBERS The purpose
More informationPropositional Logic. What is discrete math? Tautology, equivalence, and inference. Applications
What is discrete math? Propositional Logic The real numbers are continuous in the senses that: between any two real numbers there is a real number The integers do not share this property. In this sense
More informationUNIT-II. NONDETERMINISTIC FINITE AUTOMATA WITH ε TRANSITIONS: SIGNIFICANCE. Use of ε-transitions. s t a r t. ε r. e g u l a r
Syllabus R9 Regulation UNIT-II NONDETERMINISTIC FINITE AUTOMATA WITH ε TRANSITIONS: In the automata theory, a nondeterministic finite automaton (NFA) or nondeterministic finite state machine is a finite
More informationFinal exam study sheet for CS3719 Turing machines and decidability.
Final exam study sheet for CS3719 Turing machines and decidability. A Turing machine is a finite automaton with an infinite memory (tape). Formally, a Turing machine is a 6-tuple M = (Q, Σ, Γ, δ, q 0,
More informationReal Analysis - Notes and After Notes Fall 2008
Real Analysis - Notes and After Notes Fall 2008 October 29, 2008 1 Introduction into proof August 20, 2008 First we will go through some simple proofs to learn how one writes a rigorous proof. Let start
More informationMATH 215 Sets (S) Definition 1 A set is a collection of objects. The objects in a set X are called elements of X.
MATH 215 Sets (S) Definition 1 A set is a collection of objects. The objects in a set X are called elements of X. Notation 2 A set can be described using set-builder notation. That is, a set can be described
More informationDecidability of Existence and Construction of a Complement of a given function
Decidability of Existence and Construction of a Complement of a given function Ka.Shrinivaasan, Chennai Mathematical Institute (CMI) (shrinivas@cmi.ac.in) April 28, 2011 Abstract This article denes a complement
More informationPutnam Solutions, 2007
Putnam Solutions, 7 These solutions are based on discussions among our contestants (and our friends from Carlton College) Saturday afternoon and evening, with revisions as various errors were caught by
More informationComputability Theory. CS215, Lecture 6,
Computability Theory CS215, Lecture 6, 2000 1 The Birth of Turing Machines At the end of the 19th century, Gottlob Frege conjectured that mathematics could be built from fundamental logic In 1900 David
More informationLecture on Sensor Networks
Lecture on Sensor Networks Cyclic Historical Redundancy Development Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify
More informationJohns Hopkins Math Tournament Proof Round: Automata
Johns Hopkins Math Tournament 2018 Proof Round: Automata February 9, 2019 Problem Points Score 1 10 2 5 3 10 4 20 5 20 6 15 7 20 Total 100 Instructions The exam is worth 100 points; each part s point value
More informationarxiv: v1 [cs.dc] 22 Oct 2018
FANTOM: A SCALABLE FRAMEWORK FOR ASYNCHRONOUS DISTRIBUTED SYSTEMS A PREPRINT Sang-Min Choi, Jiho Park, Quan Nguyen, and Andre Cronje arxiv:1810.10360v1 [cs.dc] 22 Oct 2018 FANTOM Lab FANTOM Foundation
More informationOn the static assignment to parallel servers
On the static assignment to parallel servers Ger Koole Vrije Universiteit Faculty of Mathematics and Computer Science De Boelelaan 1081a, 1081 HV Amsterdam The Netherlands Email: koole@cs.vu.nl, Url: www.cs.vu.nl/
More information1 Reed Solomon Decoder Final Project. Group 3 Abhinav Agarwal S Branavan Grant Elliott. 14 th May 2007
1 Reed Solomon Decoder 6.375 Final Project Group 3 Abhinav Agarwal S Branavan Grant Elliott 14 th May 2007 2 Outline Error Correcting Codes Mathematical Foundation of Reed Solomon Codes Decoder Architecture
More informationCS Pushdown Automata
Chap. 6 Pushdown Automata 6.1 Definition of Pushdown Automata Example 6.2 L ww R = {ww R w (0+1) * } Palindromes over {0, 1}. A cfg P 0 1 0P0 1P1. Consider a FA with a stack(= a Pushdown automaton; PDA).
More informationCERNY CONJECTURE FOR DFA ACCEPTING STAR-FREE LANGUAGES
CERNY CONJECTURE FOR DFA ACCEPTING STAR-FREE LANGUAGES A.N. Trahtman? Bar-Ilan University, Dep. of Math. and St., 52900, Ramat Gan, Israel ICALP, Workshop synchr. autom., Turku, Finland, 2004 Abstract.
More informationMath Day at the Beach 2016
Multiple Choice Write your name and school and mark your answers on the answer sheet. You have 30 minutes to work on these problems. No calculator is allowed. 1. What is the median of the following five
More informationChristmas Calculated Colouring - C1
Christmas Calculated Colouring - C Tom Bennison December 20, 205 Introduction Each question identifies a region or regions on the picture Work out the answer and use the key to work out which colour to
More informationT (s, xa) = T (T (s, x), a). The language recognized by M, denoted L(M), is the set of strings accepted by M. That is,
Recall A deterministic finite automaton is a five-tuple where S is a finite set of states, M = (S, Σ, T, s 0, F ) Σ is an alphabet the input alphabet, T : S Σ S is the transition function, s 0 S is the
More informationAlgebra. Formal fallacies (recap). Example of base rate fallacy: Monty Hall Problem.
October 15, 2017 Algebra. Formal fallacies (recap). Example of base rate fallacy: Monty Hall Problem. A formal fallacy is an error in logic that can be seen in the argument's form. All formal fallacies
More informationOn the answer-booklet, write your Registration Number, Test Code and Number of this booklet in appropriate places. ATTENTION!
2017 BOOKLET NO. Afternoon Test Code: CSB Time: 2 hours On the answer-booklet, write your Registration Number, Test Code and Number of this booklet in appropriate places. ATTENTION! Read the following
More informationAMTH140 Trimester Question 1. [8 marks] Answer
Question 1 Let A B = {(1, 1), (2, 2), (3, 1), (3, 2), (1, 2), (1, 4), (2, 1), (2, 4), (3, 4)}. Find the power set of B, P(B). The set B = {1, 2, 4}. Then P(B) = {, {1}, {2}, {4}, {1, 2}, {1, 4}, {2, 4},
More informationPseudo-Random Number Generators
Unit 41 April 18, 2011 1 Pseudo-Random Number Generators Recall the one-time pad: k = k 1, k 2, k 3... a random bit-string p = p 1, p 2, p 3,... plaintext bits E(p) = p k. We desire long sequences of numbers
More informationMATH 433 Applied Algebra Lecture 22: Semigroups. Rings.
MATH 433 Applied Algebra Lecture 22: Semigroups. Rings. Groups Definition. A group is a set G, together with a binary operation, that satisfies the following axioms: (G1: closure) for all elements g and
More informationDO NOT OPEN THIS TEST BOOKLET UNTIL YOU ARE ASKED TO DO SO
DO NOT OPEN THIS TEST BOOKLET UNTIL YOU ARE ASKED TO DO SO T.B.C. : P-AQNA-L-ZNGU Serial No.- TEST BOOKLET MATHEMATICS Test Booklet Series Time Allowed : Two Hours and Thirty Minutes Maximum Marks : 00
More informationGroup Homomorphisms and Isomorphisms
CHAPTER 4 Group Homomorphisms and Isomorphisms c WWLChen199119932013. This chapter is available free to all individuals on the understanding that it is not to be used for financial gain and may be downloaded
More informationCS 455/555: Finite automata
CS 455/555: Finite automata Stefan D. Bruda Winter 2019 AUTOMATA (FINITE OR NOT) Generally any automaton Has a finite-state control Scans the input one symbol at a time Takes an action based on the currently
More informationProgram Analysis. Lecture 5. Rayna Dimitrova WS 2016/2017
Program Analysis Lecture 5 Rayna Dimitrova WS 2016/2017 2/21 Recap: Constant propagation analysis Goal: For each program point, determine whether a variale has a constant value whenever an execution reaches
More information3.1 Basic properties of real numbers - continuation Inmum and supremum of a set of real numbers
Chapter 3 Real numbers The notion of real number was introduced in section 1.3 where the axiomatic denition of the set of all real numbers was done and some basic properties of the set of all real numbers
More informationReference Material /Formulas for Pre-Calculus CP/ H Summer Packet
Reference Material /Formulas for Pre-Calculus CP/ H Summer Packet Week # 1 Order of Operations Step 1 Evaluate expressions inside grouping symbols. Order of Step 2 Evaluate all powers. Operations Step
More informationTheory Bridge Exam Example Questions
Theory Bridge Exam Example Questions Annotated version with some (sometimes rather sketchy) answers and notes. This is a collection of sample theory bridge exam questions. This is just to get some idea
More informationClosure Properties of Regular Languages. Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism
Closure Properties of Regular Languages Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism Closure Properties Recall a closure property is a statement
More informationSome hierarchies for the communication complexity measures of cooperating grammar systems
Some hierarchies for the communication complexity measures of cooperating grammar systems Juraj Hromkovic 1, Jarkko Kari 2, Lila Kari 2 June 14, 2010 Abstract We investigate here the descriptional and
More informationDistributed Systems Principles and Paradigms
Distributed Systems Principles and Paradigms Chapter 6 (version April 7, 28) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.2. Tel: (2)
More informationCS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs
CS 42 Lecture 3 Automating lexical analysis 29 August 2 Lecturer: Andrew Myers A lexer generator converts a lexical specification consisting of a list of regular expressions and corresponding actions into
More informationPushdown timed automata:a binary reachability characterization and safety verication
Theoretical Computer Science 302 (2003) 93 121 www.elsevier.com/locate/tcs Pushdown timed automata:a binary reachability characterization and safety verication Zhe Dang School of Electrical Engineering
More informationCHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science
CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science Entrance Examination, 8 May 0 Instructions Enter your Admit Card Number: C This examination has two parts Part A and Part B. The
More informationA field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:
Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under
More informationStudy Guide for Math 095
Study Guide for Math 095 David G. Radcliffe November 7, 1994 1 The Real Number System Writing a fraction in lowest terms. 1. Find the largest number that will divide into both the numerator and the denominator.
More informationRecursion and Induction
Recursion and Induction Themes Recursion Recursive Definitions Recurrence Relations Induction (prove properties of recursive programs and objects defined recursively) Examples Tower of Hanoi Gray Codes
More informationWiFi MAC Models David Malone
WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,
More informationUses of finite automata
Chapter 2 :Finite Automata 2.1 Finite Automata Automata are computational devices to solve language recognition problems. Language recognition problem is to determine whether a word belongs to a language.
More informationDecision, Computation and Language
Decision, Computation and Language Non-Deterministic Finite Automata (NFA) Dr. Muhammad S Khan (mskhan@liv.ac.uk) Ashton Building, Room G22 http://www.csc.liv.ac.uk/~khan/comp218 Finite State Automata
More informationNORTHERN INDIA ENGINEERING COLLEGE, LKO D E P A R T M E N T O F M A T H E M A T I C S. B.TECH IIIrd SEMESTER QUESTION BANK ACADEMIC SESSION
NORTHERN INDIA ENGINEERING COLLEGE, LKO D E P A R T M E N T O F M A T H E M A T I C S B.TECH IIIrd SEMESTER QUESTION BANK ACADEMIC SESSION 011-1 DISCRETE MATHEMATICS (EOE 038) 1. UNIT I (SET, RELATION,
More informationCourse 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography
Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups
More informationA Uniformization Theorem for Nested Word to Word Transductions
A Uniformization Theorem for Nested Word to Word Transductions Dmitry Chistikov and Rupak Majumdar Max Planck Institute for Software Systems (MPI-SWS) Kaiserslautern and Saarbrücken, Germany {dch,rupak}@mpi-sws.org
More informationCPSC 421: Tutorial #1
CPSC 421: Tutorial #1 October 14, 2016 Set Theory. 1. Let A be an arbitrary set, and let B = {x A : x / x}. That is, B contains all sets in A that do not contain themselves: For all y, ( ) y B if and only
More informationRecursion and Induction
Recursion and Induction Themes Recursion Recursive Definitions Recurrence Relations Induction (prove properties of recursive programs and objects defined recursively) Examples Tower of Hanoi Gray Codes
More informationCommunicating and Mobile Systems
Communicating and Mobile Systems Overview:! Programming Model! Interactive Behavior! Labeled Transition System! Bisimulation! The π-calculus! Data Structures and λ-calculus encoding in the π-calculus References:!
More informationNOTES ON AUTOMATA. Date: April 29,
NOTES ON AUTOMATA 1. Monoids acting on sets We say that a monoid S with identity element ɛ acts on a set Q if q(st) = (qs)t and qɛ = q. As with groups, if we set s = t whenever qs = qt for all q Q, then
More information3 Scalar Product. 3.0 The Dot Product. ~v ~w := v 1 w 1 + v 2 w v n w n.
3 Scalar Product Copyright 2017, Gregory G. Smith 28 September 2017 Although vector products on R n are rare, every coordinate space R n is equipped with a binary operation that sends two vectors to a
More informationOn Stateless Multicounter Machines
On Stateless Multicounter Machines Ömer Eğecioğlu and Oscar H. Ibarra Department of Computer Science University of California, Santa Barbara, CA 93106, USA Email: {omer, ibarra}@cs.ucsb.edu Abstract. We
More informationGroup, Rings, and Fields Rahul Pandharipande. I. Sets Let S be a set. The Cartesian product S S is the set of ordered pairs of elements of S,
Group, Rings, and Fields Rahul Pandharipande I. Sets Let S be a set. The Cartesian product S S is the set of ordered pairs of elements of S, A binary operation φ is a function, S S = {(x, y) x, y S}. φ
More informationPart I: Definitions and Properties
Turing Machines Part I: Definitions and Properties Finite State Automata Deterministic Automata (DFSA) M = {Q, Σ, δ, q 0, F} -- Σ = Symbols -- Q = States -- q 0 = Initial State -- F = Accepting States
More informationFinite Universes. L is a fixed-length language if it has length n for some
Finite Universes Finite Universes When the universe is finite (e.g., the interval 0, 2 1 ), all objects can be encoded by words of the same length. A language L has length n 0 if L =, or every word of
More informationComplex numbers. Learning objectives
CHAPTER Complex numbers Learning objectives After studying this chapter, you should be able to: understand what is meant by a complex number find complex roots of quadratic equations understand the term
More information13 th Annual Harvard-MIT Mathematics Tournament Saturday 20 February 2010
13 th Annual Harvard-MIT Mathematics Tournament Saturday 0 February 010 1. [3] Suppose that x and y are positive reals such that Find x. x y = 3, x + y = 13. 3+ Answer: 17 Squaring both sides of x y =
More informationTHEORY OF COMPUTATION
THEORY OF COMPUTATION There are four sorts of men: He who knows not and knows not he knows not: he is a fool - shun him; He who knows not and knows he knows not: he is simple teach him; He who knows and
More informationDISCRETE MATHEMATICS W W L CHEN
DISCRETE MATHEMATICS W W L CHEN c W W L Chen, 1991, 2008. This chapter is available free to all individuals, on the understanding that it is not to be used for financial gain, and may be downloaded and/or
More informationCourse 311: Abstract Algebra Academic year
Course 311: Abstract Algebra Academic year 2007-08 D. R. Wilkins Copyright c David R. Wilkins 1997 2007 Contents 1 Topics in Group Theory 1 1.1 Groups............................... 1 1.2 Examples of Groups.......................
More informationFinal Exam (Version B) December 16, 2014 Name: NetID: Section: 1 2 3
CS 374 : Algorithms and Models of Computation, Fall 2014 Final Exam (Version B) December 16, 2014 Name: NetID: Section: 1 2 3 # 1 2 3 4 5 6 Total Score Max 20 10 10 10 10 10 70 Grader Don t panic! Please
More informationTheory of Computation
Fall 2002 (YEN) Theory of Computation Midterm Exam. Name:... I.D.#:... 1. (30 pts) True or false (mark O for true ; X for false ). (Score=Max{0, Right- 1 2 Wrong}.) (1) X... If L 1 is regular and L 2 L
More information0 Sets and Induction. Sets
0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set
More informationBüchi Automata and their closure properties. - Ajith S and Ankit Kumar
Büchi Automata and their closure properties - Ajith S and Ankit Kumar Motivation Conventional programs accept input, compute, output result, then terminate Reactive program : not expected to terminate
More informationBounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.
Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist
More informationCSE 105 THEORY OF COMPUTATION
CSE 105 THEORY OF COMPUTATION Spring 2016 http://cseweb.ucsd.edu/classes/sp16/cse105-ab/ Today's learning goals Sipser Ch 3.3, 4.1 State and use the Church-Turing thesis. Give examples of decidable problems.
More informationMATH 665: TROPICAL BRILL-NOETHER THEORY
MATH 665: TROPICAL BRILL-NOETHER THEORY 2. Reduced divisors The main topic for today is the theory of v-reduced divisors, which are canonical representatives of divisor classes on graphs, depending only
More informationIS 709/809: Computational Methods in IS Research Fall Exam Review
IS 709/809: Computational Methods in IS Research Fall 2017 Exam Review Nirmalya Roy Department of Information Systems University of Maryland Baltimore County www.umbc.edu Exam When: Tuesday (11/28) 7:10pm
More informationMTH 362: Advanced Engineering Mathematics
MTH 362: Advanced Engineering Mathematics Lecture 1 Jonathan A. Chávez Casillas 1 1 University of Rhode Island Department of Mathematics September 7, 2017 Course Name and number: MTH 362: Advanced Engineering
More information