A PROBABILISTIC POWER DOMAIN ALGORITHM FOR FRACTAL IMAGE DECODING
|
|
- Marsha Robbins
- 5 years ago
- Views:
Transcription
1 Stochastics and Dynamics, Vol. 2, o. 2 (2002) 6 73 c World Scientiic Publishing Company A PROBABILISTIC POWER DOMAI ALGORITHM FOR FRACTAL IMAGE DECODIG V. DRAKOPOULOS Department o Inormatics and Telecommunications, Theoretical Inormatics, University o Athens, Panepistimioupolis 57 84, Athens, Hellas vasilios@di.uoa.gr A. KAKOS and. IKOLAOU Division o Inormation Systems, Bank o Greece, 34 Mesogeion Ave., 52 32, Cholargos, Hellas Received 2 January 2002 Revised April 2002 A new algorithm, called herein the random power domain algorithm, is discussed; it generates the image corresponding to an iterated unction system with probabilities, a technique used in ractal image decoding. A simple complexity analysis or the algorithm is also derived. Keywords: Fractals; random algorithm; image comparison; iterated unction systems; power domain. AMS Subject Classiication: 28A80, 94A08, 68Q0, 68Q55. Introduction A number o algorithms have been proposed or rendering the invariant measure supported by the attractor o an (hyperbolic) iterated unction system, orifs or short, on the plane. In what ollows, however, a competitive alternative will be described and implemented as a consequence o the introduction o domain theory in dynamical systems, measures and ractals [2]. It uses the probabilistic power domain as its computational model and generates the invariant measure o an IFS with probabilities. The proposed algorithm, ater comparing with the most commonly used probabilistic algorithms or rendering the invariant measure supported by the attractor, namely the Random Iteration Algorithm (RIA, see []) and the Random Adaptive Cut Algorithm (RACA, see [4]), shows to be, under all known circumstances, substantially aster than both the others and much more eicient than the RIA in terms o memory requirements. Since the RIA chooses the points o the attractor at random, it will unavoidably redraw some points more than once. Figure shows a demography o the dendrite shown in Fig. 7(e). The dendrite is put on a 6
2 62 V. Drakopoulos, A. Kakos &. ikolaou (a) (b) (c) Fig.. Distribution o an orbit rendering a dendrite displayed in vertical bars using (a) the RIA, (b) the RACA and (c) the proposed algorithm. square lattice on R 2 with small mesh size; the number o points rom the dendrite in each little box o that lattice is measured and represented by a vertical bar, thus visualizing the distribution. Apparently, the border o the dendrite is visited most requently, while the other points seem to be avoided most oten. This substantial waste o time is the main reason why the proposed algorithm, which produces no more than the necessary points, is that aster. Furthermore, many o the points o the attractor will never be plotted, due to the randomness o the RIA; to make matters worse, the attractors produced by two successive runnings o the algorithm will not be exactly the same. The RIA theoretically suggests that its corresponding iterated procedure should be perormed or an ininite number o times beore the actual attractor is produced. In the words o Monro and Dudbridge in [5] There is no deinite stopping criterion or the RIA. On the contrary, the RACA uses a criterion to terminate the recursive descent o the tree o transormations and the idea behind it can be served as a basis or a magniication algorithm. The main advantage o our algorithm is that it encapsulates an economical and enhanced stopping criterion as opposed to the RACA; roughly speaking, it terminates (in inite time) automatically and quickly on any digitized screen without needing to ix a number o iterations in advance. Moreover, or a given discrimination capability o the computer screen, the proposed algorithm has a determined upper and lower bound or the number o computations required beore the best possible attractor or the given resolution is constructed. The exact number o computations, however, cannot be speciied analytically in a closed ormula, but can be very easily computed with the aid o a computer. An analytic description o the algorithm as well as a digest o the theoretical undamentals, on which its model is based, ollows. However, an extended abstract or the theory can be ound in [3], where power domains are discussed along with IFS. A general reerence oriented toward computational theory is [6]. 2. The Probabilistic Power Domain First o all a link between measure theory and domain theory is needed. The link is established in [2]; however, or a deep understanding o the algorithm and its implementation that ollows, we shall make an account o the most undamental conclusions that appear in that paper. We are especially interested in Borel measures, which have the signiicant property that the measure o any Borel set is determined by the topologically important
3 A Probabilistic Power Domain Algorithm or Fractal Image Decoding 63 open sets or, alternatively, the compact sets; such a Borel measure is called regular. More ormally, a Borel measure μ on a locally compact Hausdor space is called regular, i, or all Borel subsets B o, wehave μ(b) =in{μ(o) B O, O open} =sup{μ(f ) B F, F compact}. It can be proved that, i is a locally compact, second countable Hausdor space as in our case, every open set will be σ-compact (it is a countable union o compact sets) and every Borel measure is regular. The computational model o the new algorithm or the construction o the invariant measure o an IFS with probabilities is based on the probabilistic power domain. Hence the ollowing deinitions are essential or the understanding o the proposed algorithm. The lattice o open sets o a topological space is denoted by Ω(). Deinition. An (e)valuation on a topological space is a map ν :Ω() [0, ) which satisies: (i) ν(u)+ν(v )=ν(u V )+ν(u V ) (ii) ν( ) = 0, and (iii) U V ν(u) ν(v ). A continuous (e)valuation is an (e)valuation such that whenever A Ω() isa directed set (with respect to ) oopensetso, then ( ) ν O =supν(o). O A O A Deinition 2. The Probabilistic Power Domain P o a topological space consists o the set o continuous (e)valuations ν on with ν() and is ordered as ollows: μ ν i and only i or all open sets O o, μ(o) ν(o). Deinition 3. For any b, thepoint (e)valuation based at b is the (e)valuation n b :Ω() [0, ) deined by {, i b O, n b (O) = 0, otherwise. Any directed set (μ i ) i I o (e)valuations has a least upper bound (l.u.b.) given by i μ i = μ, whereoro Ω() wehaveμ(o) =sup i I μ i (O); hence (P, ) is a directed complete partial order (d.c.p.o.), with bottom element (which is the P : (O) =0,O Ω()) It is easy to prove that any inite linear combination n i= r in bi o unit point (e)valuations n bi with constant coeicients r i [0, ), i =, 2,,n is also an (e)valuation on. What is really interesting about (e)valuations is that, i is an ω-continuous d.c.p.o., then P is an ω-continuous d.c.p.o. as well; moreover any (e)valuation
4 64 V. Drakopoulos, A. Kakos &. ikolaou on an ω-continuous d.c.p.o. is the directed l.u.b. o linear combinations o point (e)valuations and it extends uniquely to a measure. Hence (e)valuations and measures are in act the same on ω-continuous d.c.p.o s. The set o all positive Borel measures μ on a locally compact, second countable Hausdor space with μ(), denoted by M(), can be partially ordered by putting μ ν i and only i or all Borel sets B, μ(b) ν(b). With this ordering M() becomes a d.c.p.o. 3. A Computational Model For any Hausdor metric space the upper space U consists o all nonempty compact subsets o (see Fig.2), that is U = { C C compact}. This space has a topology, called the upper topology, whose base is the collection a = {C U C a}, where a Ω() isanopenseto. This means that, or any open subset a o, the collection o all compact nonempty subsets o that are included in a orms an element o the base or the upper topology. This topology is T 0 ; the specialisation ordering u o U is the superset inclusion, i.e. A u B a Ω()[A a B a] A B. Under this ordering ( u )thespace(u, ) becomes a d.c.p.o., which means that every directed set has a l.u.b. The l.u.b. o a directed set o compact subsets is their intersection; the elements o are maximal elements o U. The singleton map s: U with s(x) ={x} can be used or embedding onto the set o maximal elements o U. I U is ω-continuous, then we can identiy (e)valuations and measures on U, or a continuous (e)valuation μ on U extends uniquely to a Borel measure on U and a measure on U is a continuous (e)valuation. The support o the invariant measure o an IFS has the very important property that it contains exactly the { x } x O O U =[0, ] [0, ] =[0, ] [0, ] Fig. 2. The upper space or the unit square.
5 A Probabilistic Power Domain Algorithm or Fractal Image Decoding 65 M () M() P U PU : β 0 : O 0 : : O 0 Fig. 3. The probabilistic power domain. points o the attractor. We will now extend the notion o the support in the case o (e)valuations. An (e)valuation μ PU is said to be supported in s(), i μ(u \ s()) = 0; i μ is supported in s(), then the support o μ is the set o points y s() such that μ() > 0 or all neighbourhoods U o y. WedenotebyS() theset that contains all the supported (e)valuations in s() (S() PU). Since the invariant measure o an IFS is a normalized Borel measure, we restrict our attention to normalized measures and normalized (e)valuations. We denote by M (), P U, S () the sets which contain the normalized Borel measures, the normalized (e)valuations and the normalized supported (e)valuations, respectively (see Fig. 3). PU and P U have exactly the same maximal elements and the elements o S () are maximal elements o PU. The maps e: M () S () withe(μ)(o) μ(s (O)) or any O Ω() and j : S () M () withj(ν)(b) ν(s(b)) or any Borel subset B o are well deined and continuous. Since j is the inverse o e, the restrictions o e and j give an isomorphism between M () ands (). Let us recall that PU is ω-continuous whenever U is ω-continuous and in this case any (e)valuation μ PU is the directed l.u.b. o linear combinations o point (e)valuations. I B U is a countable order basis o U, then { n } n r i n bi b i B,r i rational and r i i= is a countable order basis o PU. This observation provides us with an eective way o obtaining measures on as the directed l.u.b. o linear combinations o point (e)valuations on U. I is compact, then both U and P U have bottom elements; the bottom element o U is the space itsel, whereas the bottom element o P U is the unit point (e)valuation n based at U with {, i O U, n (O) = 0, otherwise. i=
6 66 V. Drakopoulos, A. Kakos &. ikolaou The above theoretical ramework can be used or the construction o the invariant measure o an IFS with probabilities as ollows. 4. The Random Power Domain Algorithm Let {;, 2,, ; p,p 2,,p } or, more briely, {; ; p } be an hyperbolic IFS with probabilities; the operator T : P U P U given by T (μ)(o) = p i μ(i (O)) i= is well deined and continuous, and thereore has a least ixed point; it can be proved (see [2]) that the least ixed point o T is supported in and its support is the unique attractor o the IFS. Since an element o S () is a maximal element o P U, we immediately deduce that an hyperbolic IFS with probabilities has a unique ixed point. I μ is the unique ixed point o T,thenj(μ) M () isthe unique invariant measure o the IFS. We correspond the (e)valuation n i i2 in to node i i2 in o the nonprobabilistic tree shown in Fig. 4. The nodes o the tree are point (e)valuations ordered as usual so that the construction o the invariant measure can be obtained by using the tree shown in Fig. 5. Then, the tree is traversed until the outcome o any node i i2 in becomes smaller than a pixel on the computer screen. Then a pruning occurs and the corresponding branch will produce no more children. This tree, however, cannot be employed in any eicient implementation. The solution will be the use o an equivalent tree (see Fig. 6) that can be traversed eiciently. We prove that this alternative tree is computationally equivalent to the original one. The two trees have exactly the same irst two levels. From the third level onwards, however, the dierences start. Even i the second level is identical in both trees, a dierent third level is produced. It is our intention to prove that this does not aect the theoretical basis and that the third level is computationally equivalent. I at some node o the second level s i s i2 2 <εthen holds, due to Fig. 4. The IFS tree.
7 A Probabilistic Power Domain Algorithm or Fractal Image Decoding 67 n p 2 n p p n p p n p 2 n n p 2p n p p 2 n... p n p n p 3 n p 3n p p 2 n p 2 p p n 2p n p p 2 n Fig. 5. The IFS tree with probabilities. n p 2 n p p n p p n p 2 n n p 2p n p p 2n... p n p n p 3 n p 2 p n p 2 p n p p 2 p 2 n p n Fig. 6. The action tree with probabilities. p 3 n the commutative property o the real numbers, s i2 s i 2 <εalso holds. Hence, in the case o the irst tree, s i s i2 2 < ε means that the children o i i2 ( i i2, i i2 2,, i i2 ) will not be produced and the pixel i i2 will be plotted. For this same tree, s i2 s i 2 <εmeans that the children o i2 i ( i2 i, i2 i 2,, i2 i ) will not be produced and the pixel i2 i will be plotted. On the other hand, or the second tree, the condition s i s i2 2 < ε means that the children o i i2 ( i2 i, i2 i 2,, i2 i ) will not be produced and the pixel i i2 will be plotted. Moreover, the condition s i2 s i 2 < ε, or the second tree, means that the children o i2 i ( i i2, i i2 2,, i i2 ) will not be produced and the pixel i2 i will be plotted. It is now more than obvious that the third level o the two trees are computationally equivalent. Using induction we can prove that the two trees are equivalent at all levels. Thus the two trees are, or our purposes, computationally equivalent. Our contribution, i.e. the discovery o the equivalent tree, has beneicially eected the implementation o the algorithm. ot a single redundant computation is perormed. On the other hand, the memory requirements have signiicantly dropped due to the introduction o this second tree.
8 68 V. Drakopoulos, A. Kakos &. ikolaou I a branch is pruned, or example at node i i2 in, then the corresponding atomic measure or the pixel o the attractor will be p i p i2 p in, which is assigned by the corresponding point (e)valuation p i p i2 p in n i i2 in. However, two pruned branches might correspond to the same pixel. In this case, the measure contribution o all branches that end up at the same pixel should be summed up beore any rendering o the pixel takes places. In this way, a record o which branches correspond to the same pixel must be kept so that one is able to add up all individual contributions to determine the actual atomic measure o every screen pixel o the attractor. In this way a graphic representation o the invariant measure is achieved. Although the theory suggests that at depth n, T (n) μ 0 is an (e)valuation, μ 0 being any normalized (e)valuation, the unbalanced pruning o the tree might raise some objections regarding the soundness o our implementation. However, i d max is the level at which the last pruning takes place, then we can saely assume that our approximation to the invariant measure μ is T (dmax) μ 0, μ 0 being the uniorm measure on the screen. This means that we can make the equivalent theoretic assumption that all branches o the point (e)valuation tree o Figs. 5 and 6 are pruned at level d max. The ollowing argument justiies this assumption. For any branch o the tree which is pruned at an earlier stage d than d max we can insert its children and grandchildren eectively pruned in the tree diagram until the complete level d max is reached. Then our approximation to the invariant measure is still a sound one or, i at level d we had decided that the parent node represented less than a pixel on the screen, then its children would still be included in that pixel (due to the ordering o nodes); then their total measure contribution to the pixel would be equal to that o their parent at level d. This means that the sum o the atomic measures that all children have in total would be equal to what the node at level d had. Thus, this balanced pruning which we just proved to be equivalent to the unbalanced one we perorm justiies our argument that what we actual produce is a measure, in act T (dmax) μ The Algorithm and Its Complexity Hence the algorithm can be described roughly as ollows; we start rom the ixed point which corresponds to the transormation with the greatest probability and traverse the action tree until a parallelogram i i2 i becomes small enough so that it is actually a pixel on the computer screen. This happens when s i s i2 s i 2 <ε, ε =/M,whereM is the resolution o the screen, and in that case this branch has contributed p i p i2 p i to the measure o the pixel i i2 i. Ater having sum up all measure contributions or each pixel, we color the attractor pixels accordingly. In that way, a graphic representation o the invariant measure is produced. The actual algorithm in a orm o pseudo-code, which also provides a deinition or the equivalent tree o Fig. 6, has as ollows:
9 A Probabilistic Power Domain Algorithm or Fractal Image Decoding Start.. Compute all contractivity actors s i. 2a. Assign measure on the whole screen, i.e. μ([0, ] 2 )=. 2b. All atomic measures μ(x) opixelsx [0, ] 2 are initially set to zero. 3a. Call procedure measure ([x 0,x 0,,x 0 ], 0, [ 2, 2,, 2], [,,,]), or x 0 [0, ] 2. 3b. Plot all pixels x [0, ] 2 with a color proportional to their atomic measure μ(x). 4. End. where procedure measure([x,x 2,,x ],q,[d,d 2,,d ], [m,m 2,,m ]) { or i =,, do { x i = i (x q ) d i = s i d q m i = p i m q } or i =,, do { i (d i > /M ) then do call measure([x,x 2,,x ], i,[d,d 2,, d ], [m,m 2,,m ]) else do μ(x i ) = μ(x i ) + m i } } Having described the algorithm, we shall try to identiy the number o computations needed or the construction o the attractor. Since the contractivity actors o the aine transormations are known, we can ind an estimation or the depth o the tree. I s max and s min are the largest and the smallest contractivity actors, respectively, then the depth o the tree will lie between [ ln M d max = ln s max ] + and d min = [ ln M ln s min ] + that are the greatest and the smallest depth, respectively. This means that in the worst case we need 0( dmax ) = 0[( dmax+ )/( ) ], thus giving O( dmax ) while in the best case we need 0( dmin )= 0[( dmin+ )/( ) ] computations. This number is explained by the act that nine computations are needed or the calculation o the new point and only one computation is needed or the calculation o the quantity s i (s i2 s in 2) since at each step the quantity s i2 s in 2 has already been computed in previous nodes.
10 70 V. Drakopoulos, A. Kakos &. ikolaou The exact number o computations perormed beore the construction o the attractor is C( 2), where {, i x<ε C(x) = i= C(s ix)+0, otherwise, where is the number o aine transormations and ε =/M, M being the resolution o the screen. Although, it is extremely diicult to ind a closed ormula which gives the exact number o computations, the above mentioned recursive ormula can be used to obtain this number with the aid o a computer. (a) (b) (c) (d) (e) () (g) Fig. 7. The Sierpiński triangle, a dendrite, a spiral, a meander, a second dendrite, a ern lea and a maple lea Sierpinski Dendrite Spiral Meander Dendrite II Fern lea Maple lea Time (sec) RPDA Method RACA RIA Sierpinski Dendrite Spiral Meander Maple lea Fern lea Dendrite II IFS Fig. 8. The time results o the systematic comparison.
11 A Probabilistic Power Domain Algorithm or Fractal Image Decoding 7 6. Comparative Results The current implementation o our algorithm is written in Microsot Visual Basic 6.0. It is capable o drawing ractal images using the Random PDA, the RIA and the RACA, and displaying the depth o the action tree, the number o points used or rendering and the total runtime. The ractal images (M = 00) used or the comparisons o the various algorithms are illustrated in Fig. 7. The Random PDA was inally tested and rated by comparing the various ractal attractors produced by it versus the attractors produced using the RIA and the RACA. Time results are given in CPU seconds on a Pentium III PC with a 400 MHz CPU clock running Windows 98. As we have already stated, the proposed algorithm is more eicient than the RIA and the RACA; the systematic comparison we perormed gave the results shown in Fig. 8 and justiies our argument. 7. Conclusions Our algorithm is extremely eicient or the decoding o pictures which have been coded using some method based on IFS. This is explained by the act that natural images such as the ace o a person lack sel-similarity and hence a lot o aine transormations are employed or the coding; each o them, however, will have a very small contractivity actor and hence our tree will have small depth (0 or the maple lea, 3 or the ern lea, 45 or the spiral and 8 or the other igures); so, the construction o the attractor will terminate very quickly, since only a ew number o points are necessary (see Table ). Table. The number o pixels used or the systematic comparison. Pixels drawn RPDA RACA RIA Sierpiński Dendrite Spiral Meander Dendrite II Fern lea Maple lea One should also mention that without the use o the equivalent trees, it is doubtul i this perormance o the Random PDA could have ever been achieved. Any implementation that avoids their use is bound either to make use o huge amount o memory or unavoidably to resort to recomputations. In both cases, such an implementation becomes highly ineicient and the perormance o the algorithm would be substantially decreased.
12 72 V. Drakopoulos, A. Kakos &. ikolaou Appendix A transormation is aine, i it may be represented by a matrix A and translation t as (x) =Ax + t, or(ix R 2 ) ( ) ( )( ) ( ) x a b x d = +. y c s y e The code o isthe6-tuple(a, b, c, s, d, e), and the code o an IFS is a table whose rows are the codes o, 2,,. I we add one extra column with the corresponding probabilities p,p 2,,p, then we are talking about the code o an IFS with probabilities. We list the IFS codes (see Tables 2 8) or the examples discussed in the main text. Table 2. The IFS code or the Sierpiński triangle. a b c s d e p Table 3. The IFS code or a dendrite. a b c s d e p Table 4. The IFS code or a spiral. a b c s d e p Table 5. The IFS code or a second dendrite. a b c s d e p
13 A Probabilistic Power Domain Algorithm or Fractal Image Decoding 73 Table 6. The IFS code or a meander. a b c s d e p Table 7. The IFS code or a ern lea. a b c s d e p Table 8. The IFS code or a maple lea. a b c s d e p Acknowledgements The authors wish to thank the anonymous reviewer or all the helpul suggestions. Reerences. M. F. Barnsley, Fractals everywhere (Academic Press, 993), 2nd edition. 2. A. Edalat, Dynamical systems, measures and ractals via domain theory, Inorm. Comput. 20 (995) A. Edalat, Power domains and iterated unction systems, Inorm. Comput. 24 (996) D. Hepting, P. Prusinkiewicz and D. Saupe, Rendering methods or iterated unction systems, infractals in the Fundamental and Applied Sciences, eds. H. O. Peitgen, J. M. Henriques and L. F. Penedo (orth-holland, 99), pp D. M. Monro and F. Dudbridge, Rendering algorithms or deterministic ractals, IEEE Computer Graphics Appl. 5 (995) G. D. Plotkin, A note on inductive generalization, in Machine Intelligence, eds. B. Meltzer and D. Michie (orth-holland, 970), Vol. 5,
SEPARATED AND PROPER MORPHISMS
SEPARATED AND PROPER MORPHISMS BRIAN OSSERMAN The notions o separatedness and properness are the algebraic geometry analogues o the Hausdor condition and compactness in topology. For varieties over the
More informationProbabilistic Observations and Valuations (Extended Abstract) 1
Replace this ile with prentcsmacro.sty or your meeting, or with entcsmacro.sty or your meeting. Both can be ound at the ENTCS Macro Home Page. Probabilistic Observations and Valuations (Extended Abstract)
More informationSEPARATED AND PROPER MORPHISMS
SEPARATED AND PROPER MORPHISMS BRIAN OSSERMAN Last quarter, we introduced the closed diagonal condition or a prevariety to be a prevariety, and the universally closed condition or a variety to be complete.
More information(C) The rationals and the reals as linearly ordered sets. Contents. 1 The characterizing results
(C) The rationals and the reals as linearly ordered sets We know that both Q and R are something special. When we think about about either o these we usually view it as a ield, or at least some kind o
More informationVALUATIVE CRITERIA BRIAN OSSERMAN
VALUATIVE CRITERIA BRIAN OSSERMAN Intuitively, one can think o separatedness as (a relative version o) uniqueness o limits, and properness as (a relative version o) existence o (unique) limits. It is not
More informationThe Deutsch-Jozsa Problem: De-quantization and entanglement
The Deutsch-Jozsa Problem: De-quantization and entanglement Alastair A. Abbott Department o Computer Science University o Auckland, New Zealand May 31, 009 Abstract The Deustch-Jozsa problem is one o the
More informationSupplementary material for Continuous-action planning for discounted infinite-horizon nonlinear optimal control with Lipschitz values
Supplementary material or Continuous-action planning or discounted ininite-horizon nonlinear optimal control with Lipschitz values List o main notations x, X, u, U state, state space, action, action space,
More informationObjectives. By the time the student is finished with this section of the workbook, he/she should be able
FUNCTIONS Quadratic Functions......8 Absolute Value Functions.....48 Translations o Functions..57 Radical Functions...61 Eponential Functions...7 Logarithmic Functions......8 Cubic Functions......91 Piece-Wise
More informationChapter 6 Reliability-based design and code developments
Chapter 6 Reliability-based design and code developments 6. General Reliability technology has become a powerul tool or the design engineer and is widely employed in practice. Structural reliability analysis
More informationFIXED POINTS OF RENORMALIZATION.
FIXED POINTS OF RENORMALIZATION. XAVIER BUFF Abstract. To study the geometry o a Fibonacci map o even degree l 4, Lyubich [Ly2] deined a notion o generalized renormalization, so that is renormalizable
More informationCLASS NOTES MATH 527 (SPRING 2011) WEEK 6
CLASS NOTES MATH 527 (SPRING 2011) WEEK 6 BERTRAND GUILLOU 1. Mon, Feb. 21 Note that since we have C() = X A C (A) and the inclusion A C (A) at time 0 is a coibration, it ollows that the pushout map i
More informationVALUATIVE CRITERIA FOR SEPARATED AND PROPER MORPHISMS
VALUATIVE CRITERIA FOR SEPARATED AND PROPER MORPHISMS BRIAN OSSERMAN Recall that or prevarieties, we had criteria or being a variety or or being complete in terms o existence and uniqueness o limits, where
More information2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction
. ETA EVALUATIONS USING WEBER FUNCTIONS Introduction So ar we have seen some o the methods or providing eta evaluations that appear in the literature and we have seen some o the interesting properties
More information1 Relative degree and local normal forms
THE ZERO DYNAMICS OF A NONLINEAR SYSTEM 1 Relative degree and local normal orms The purpose o this Section is to show how single-input single-output nonlinear systems can be locally given, by means o a
More informationRoberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points
Roberto s Notes on Dierential Calculus Chapter 8: Graphical analysis Section 1 Extreme points What you need to know already: How to solve basic algebraic and trigonometric equations. All basic techniques
More informationPart I: Thin Converging Lens
Laboratory 1 PHY431 Fall 011 Part I: Thin Converging Lens This eperiment is a classic eercise in geometric optics. The goal is to measure the radius o curvature and ocal length o a single converging lens
More informationCHOW S LEMMA. Matthew Emerton
CHOW LEMMA Matthew Emerton The aim o this note is to prove the ollowing orm o Chow s Lemma: uppose that : is a separated inite type morphism o Noetherian schemes. Then (or some suiciently large n) there
More informationPower Domains and Iterated Function. Systems. Abbas Edalat. Department of Computing. Imperial College of Science, Technology and Medicine
Power Domains and Iterated Function Systems Abbas Edalat Department of Computing Imperial College of Science, Technology and Medicine 180 Queen's Gate London SW7 2BZ UK Abstract We introduce the notion
More informationMEASUREMENT UNCERTAINTIES
MEASUREMENT UNCERTAINTIES What distinguishes science rom philosophy is that it is grounded in experimental observations. These observations are most striking when they take the orm o a quantitative measurement.
More informationMath 754 Chapter III: Fiber bundles. Classifying spaces. Applications
Math 754 Chapter III: Fiber bundles. Classiying spaces. Applications Laurențiu Maxim Department o Mathematics University o Wisconsin maxim@math.wisc.edu April 18, 2018 Contents 1 Fiber bundles 2 2 Principle
More informationCircuit Complexity / Counting Problems
Lecture 5 Circuit Complexity / Counting Problems April 2, 24 Lecturer: Paul eame Notes: William Pentney 5. Circuit Complexity and Uniorm Complexity We will conclude our look at the basic relationship between
More information8.4 Inverse Functions
Section 8. Inverse Functions 803 8. Inverse Functions As we saw in the last section, in order to solve application problems involving eponential unctions, we will need to be able to solve eponential equations
More informationMath 216A. A gluing construction of Proj(S)
Math 216A. A gluing construction o Proj(S) 1. Some basic deinitions Let S = n 0 S n be an N-graded ring (we ollows French terminology here, even though outside o France it is commonly accepted that N does
More informationA Faster Randomized Algorithm for Root Counting in Prime Power Rings
A Faster Randomized Algorithm or Root Counting in Prime Power Rings Leann Kopp and Natalie Randall July 17, 018 Abstract Let p be a prime and Z[x] a polynomial o degree d such that is not identically zero
More informationTelescoping Decomposition Method for Solving First Order Nonlinear Differential Equations
Telescoping Decomposition Method or Solving First Order Nonlinear Dierential Equations 1 Mohammed Al-Reai 2 Maysem Abu-Dalu 3 Ahmed Al-Rawashdeh Abstract The Telescoping Decomposition Method TDM is a new
More informationCurve Sketching. The process of curve sketching can be performed in the following steps:
Curve Sketching So ar you have learned how to ind st and nd derivatives o unctions and use these derivatives to determine where a unction is:. Increasing/decreasing. Relative extrema 3. Concavity 4. Points
More informationCHAPTER 1: INTRODUCTION. 1.1 Inverse Theory: What It Is and What It Does
Geosciences 567: CHAPTER (RR/GZ) CHAPTER : INTRODUCTION Inverse Theory: What It Is and What It Does Inverse theory, at least as I choose to deine it, is the ine art o estimating model parameters rom data
More informationAH 2700A. Attenuator Pair Ratio for C vs Frequency. Option-E 50 Hz-20 khz Ultra-precision Capacitance/Loss Bridge
0 E ttenuator Pair Ratio or vs requency NEEN-ERLN 700 Option-E 0-0 k Ultra-precision apacitance/loss ridge ttenuator Ratio Pair Uncertainty o in ppm or ll Usable Pairs o Taps 0 0 0. 0. 0. 07/08/0 E E E
More informationRATIONAL FUNCTIONS. Finding Asymptotes..347 The Domain Finding Intercepts Graphing Rational Functions
RATIONAL FUNCTIONS Finding Asymptotes..347 The Domain....350 Finding Intercepts.....35 Graphing Rational Functions... 35 345 Objectives The ollowing is a list o objectives or this section o the workbook.
More information( x) f = where P and Q are polynomials.
9.8 Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm ( ) ( ) ( ) P where P and Q are polynomials. Q An eample o a simple rational
More informationThe Clifford algebra and the Chevalley map - a computational approach (detailed version 1 ) Darij Grinberg Version 0.6 (3 June 2016). Not proofread!
The Cliord algebra and the Chevalley map - a computational approach detailed version 1 Darij Grinberg Version 0.6 3 June 2016. Not prooread! 1. Introduction: the Cliord algebra The theory o the Cliord
More informationAPPENDIX 1 ERROR ESTIMATION
1 APPENDIX 1 ERROR ESTIMATION Measurements are always subject to some uncertainties no matter how modern and expensive equipment is used or how careully the measurements are perormed These uncertainties
More informationON THE DIAMETER OF THE ATTRACTOR OF AN IFS Serge Dubuc Raouf Hamzaoui Abstract We investigate methods for the evaluation of the diameter of the attrac
ON THE DIAMETER OF THE ATTRACTOR OF AN IFS Serge Dubuc Raouf Hamzaoui Abstract We investigate methods for the evaluation of the diameter of the attractor of an IFS. We propose an upper bound for the diameter
More informationTESTING TIMED FINITE STATE MACHINES WITH GUARANTEED FAULT COVERAGE
TESTING TIMED FINITE STATE MACHINES WITH GUARANTEED FAULT COVERAGE Khaled El-Fakih 1, Nina Yevtushenko 2 *, Hacene Fouchal 3 1 American University o Sharjah, PO Box 26666, UAE kelakih@aus.edu 2 Tomsk State
More informationSyllabus Objective: 2.9 The student will sketch the graph of a polynomial, radical, or rational function.
Precalculus Notes: Unit Polynomial Functions Syllabus Objective:.9 The student will sketch the graph o a polynomial, radical, or rational unction. Polynomial Function: a unction that can be written in
More informationIn many diverse fields physical data is collected or analysed as Fourier components.
1. Fourier Methods In many diverse ields physical data is collected or analysed as Fourier components. In this section we briely discuss the mathematics o Fourier series and Fourier transorms. 1. Fourier
More informationCS 361 Meeting 28 11/14/18
CS 361 Meeting 28 11/14/18 Announcements 1. Homework 9 due Friday Computation Histories 1. Some very interesting proos o undecidability rely on the technique o constructing a language that describes the
More informationMicro-canonical ensemble model of particles obeying Bose-Einstein and Fermi-Dirac statistics
Indian Journal o Pure & Applied Physics Vol. 4, October 004, pp. 749-757 Micro-canonical ensemble model o particles obeying Bose-Einstein and Fermi-Dirac statistics Y K Ayodo, K M Khanna & T W Sakwa Department
More informationProbabilistic Optimisation applied to Spacecraft Rendezvous on Keplerian Orbits
Probabilistic Optimisation applied to pacecrat Rendezvous on Keplerian Orbits Grégory aive a, Massimiliano Vasile b a Université de Liège, Faculté des ciences Appliquées, Belgium b Dipartimento di Ingegneria
More informationLecture 8 Optimization
4/9/015 Lecture 8 Optimization EE 4386/5301 Computational Methods in EE Spring 015 Optimization 1 Outline Introduction 1D Optimization Parabolic interpolation Golden section search Newton s method Multidimensional
More informationDefinition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series.
2.4 Local properties o unctions o several variables In this section we will learn how to address three kinds o problems which are o great importance in the ield o applied mathematics: how to obtain the
More informationRESOLUTION MSC.362(92) (Adopted on 14 June 2013) REVISED RECOMMENDATION ON A STANDARD METHOD FOR EVALUATING CROSS-FLOODING ARRANGEMENTS
(Adopted on 4 June 203) (Adopted on 4 June 203) ANNEX 8 (Adopted on 4 June 203) MSC 92/26/Add. Annex 8, page THE MARITIME SAFETY COMMITTEE, RECALLING Article 28(b) o the Convention on the International
More informationThe achievable limits of operational modal analysis. * Siu-Kui Au 1)
The achievable limits o operational modal analysis * Siu-Kui Au 1) 1) Center or Engineering Dynamics and Institute or Risk and Uncertainty, University o Liverpool, Liverpool L69 3GH, United Kingdom 1)
More informationThe concept of limit
Roberto s Notes on Dierential Calculus Chapter 1: Limits and continuity Section 1 The concept o limit What you need to know already: All basic concepts about unctions. What you can learn here: What limits
More informationPower Spectral Analysis of Elementary Cellular Automata
Power Spectral Analysis o Elementary Cellular Automata Shigeru Ninagawa Division o Inormation and Computer Science, Kanazawa Institute o Technology, 7- Ohgigaoka, Nonoichi, Ishikawa 92-850, Japan Spectral
More informationToday. Introduction to optimization Definition and motivation 1-dimensional methods. Multi-dimensional methods. General strategies, value-only methods
Optimization Last time Root inding: deinition, motivation Algorithms: Bisection, alse position, secant, Newton-Raphson Convergence & tradeos Eample applications o Newton s method Root inding in > 1 dimension
More information(One Dimension) Problem: for a function f(x), find x 0 such that f(x 0 ) = 0. f(x)
Solving Nonlinear Equations & Optimization One Dimension Problem: or a unction, ind 0 such that 0 = 0. 0 One Root: The Bisection Method This one s guaranteed to converge at least to a singularity, i not
More informationFractals and Dimension
Chapter 7 Fractals and Dimension Dimension We say that a smooth curve has dimension 1, a plane has dimension 2 and so on, but it is not so obvious at first what dimension we should ascribe to the Sierpinski
More informationCMSC 425: Lecture 11 Procedural Generation: Fractals and L-Systems
CMSC 425: Lecture 11 Procedural Generation: ractals and L-Systems Reading: The material on fractals comes from classic computer-graphics books. The material on L-Systems comes from Chapter 1 of The Algorithmic
More information2 Frequency-Domain Analysis
2 requency-domain Analysis Electrical engineers live in the two worlds, so to speak, o time and requency. requency-domain analysis is an extremely valuable tool to the communications engineer, more so
More informationarxiv:quant-ph/ v2 12 Jan 2006
Quantum Inormation and Computation, Vol., No. (25) c Rinton Press A low-map model or analyzing pseudothresholds in ault-tolerant quantum computing arxiv:quant-ph/58176v2 12 Jan 26 Krysta M. Svore Columbia
More informationAn Alternative Poincaré Section for Steady-State Responses and Bifurcations of a Duffing-Van der Pol Oscillator
An Alternative Poincaré Section or Steady-State Responses and Biurcations o a Duing-Van der Pol Oscillator Jang-Der Jeng, Yuan Kang *, Yeon-Pun Chang Department o Mechanical Engineering, National United
More information3. Several Random Variables
. Several Random Variables. Two Random Variables. Conditional Probabilit--Revisited. Statistical Independence.4 Correlation between Random Variables. Densit unction o the Sum o Two Random Variables. Probabilit
More informationNONLINEAR CONTROL OF POWER NETWORK MODELS USING FEEDBACK LINEARIZATION
NONLINEAR CONTROL OF POWER NETWORK MODELS USING FEEDBACK LINEARIZATION Steven Ball Science Applications International Corporation Columbia, MD email: sball@nmtedu Steve Schaer Department o Mathematics
More informationFigure 1: Bayesian network for problem 1. P (A = t) = 0.3 (1) P (C = t) = 0.6 (2) Table 1: CPTs for problem 1. (c) P (E B) C P (D = t) f 0.9 t 0.
Probabilistic Artiicial Intelligence Problem Set 3 Oct 27, 2017 1. Variable elimination In this exercise you will use variable elimination to perorm inerence on a bayesian network. Consider the network
More informationApproximative Methods for Monotone Systems of min-max-polynomial Equations
Approximative Methods or Monotone Systems o min-max-polynomial Equations Javier Esparza, Thomas Gawlitza, Stean Kieer, and Helmut Seidl Institut ür Inormatik Technische Universität München, Germany {esparza,gawlitza,kieer,seidl}@in.tum.de
More informationNumerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods
Numerical Methods - Lecture 1 Numerical Methods Lecture. Analysis o errors in numerical methods Numerical Methods - Lecture Why represent numbers in loating point ormat? Eample 1. How a number 56.78 can
More informationCHAPTER 8 ANALYSIS OF AVERAGE SQUARED DIFFERENCE SURFACES
CAPTER 8 ANALYSS O AVERAGE SQUARED DERENCE SURACES n Chapters 5, 6, and 7, the Spectral it algorithm was used to estimate both scatterer size and total attenuation rom the backscattered waveorms by minimizing
More informationProblem Set. Problems on Unordered Summation. Math 5323, Fall Februray 15, 2001 ANSWERS
Problem Set Problems on Unordered Summation Math 5323, Fall 2001 Februray 15, 2001 ANSWERS i 1 Unordered Sums o Real Terms In calculus and real analysis, one deines the convergence o an ininite series
More informationROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS
ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS I. Thirunavukkarasu 1, V. I. George 1, G. Saravana Kumar 1 and A. Ramakalyan 2 1 Department o Instrumentation
More informationCategories and Natural Transformations
Categories and Natural Transormations Ethan Jerzak 17 August 2007 1 Introduction The motivation or studying Category Theory is to ormalise the underlying similarities between a broad range o mathematical
More informationSTAT 801: Mathematical Statistics. Hypothesis Testing
STAT 801: Mathematical Statistics Hypothesis Testing Hypothesis testing: a statistical problem where you must choose, on the basis o data X, between two alternatives. We ormalize this as the problem o
More informationA Simple Explanation of the Sobolev Gradient Method
A Simple Explanation o the Sobolev Gradient Method R. J. Renka July 3, 2006 Abstract We have observed that the term Sobolev gradient is used more oten than it is understood. Also, the term is oten used
More informationMidterm Exam Solutions February 27, 2009
Midterm Exam Solutions February 27, 2009 (24. Deine each o the ollowing statements. You may assume that everyone knows the deinition o a topological space and a linear space. (4 a. X is a compact topological
More information9.3 Graphing Functions by Plotting Points, The Domain and Range of Functions
9. Graphing Functions by Plotting Points, The Domain and Range o Functions Now that we have a basic idea o what unctions are and how to deal with them, we would like to start talking about the graph o
More informationReview D: Potential Energy and the Conservation of Mechanical Energy
MSSCHUSETTS INSTITUTE OF TECHNOLOGY Department o Physics 8. Spring 4 Review D: Potential Energy and the Conservation o Mechanical Energy D.1 Conservative and Non-conservative Force... D.1.1 Introduction...
More informationThu June 16 Lecture Notes: Lattice Exercises I
Thu June 6 ecture Notes: attice Exercises I T. Satogata: June USPAS Accelerator Physics Most o these notes ollow the treatment in the class text, Conte and MacKay, Chapter 6 on attice Exercises. The portions
More informationFluctuationlessness Theorem and its Application to Boundary Value Problems of ODEs
Fluctuationlessness Theorem and its Application to Boundary Value Problems o ODEs NEJLA ALTAY İstanbul Technical University Inormatics Institute Maslak, 34469, İstanbul TÜRKİYE TURKEY) nejla@be.itu.edu.tr
More informationRobust Residual Selection for Fault Detection
Robust Residual Selection or Fault Detection Hamed Khorasgani*, Daniel E Jung**, Gautam Biswas*, Erik Frisk**, and Mattias Krysander** Abstract A number o residual generation methods have been developed
More informationOn High-Rate Cryptographic Compression Functions
On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48
More informationImprovement of Sparse Computation Application in Power System Short Circuit Study
Volume 44, Number 1, 2003 3 Improvement o Sparse Computation Application in Power System Short Circuit Study A. MEGA *, M. BELKACEMI * and J.M. KAUFFMANN ** * Research Laboratory LEB, L2ES Department o
More informationEXPANSIONS IN NON-INTEGER BASES: LOWER, MIDDLE AND TOP ORDERS
EXPANSIONS IN NON-INTEGER BASES: LOWER, MIDDLE AND TOP ORDERS NIKITA SIDOROV To the memory o Bill Parry ABSTRACT. Let q (1, 2); it is known that each x [0, 1/(q 1)] has an expansion o the orm x = n=1 a
More information9.1 The Square Root Function
Section 9.1 The Square Root Function 869 9.1 The Square Root Function In this section we turn our attention to the square root unction, the unction deined b the equation () =. (1) We begin the section
More informationProbabilistic Model of Error in Fixed-Point Arithmetic Gaussian Pyramid
Probabilistic Model o Error in Fixed-Point Arithmetic Gaussian Pyramid Antoine Méler John A. Ruiz-Hernandez James L. Crowley INRIA Grenoble - Rhône-Alpes 655 avenue de l Europe 38 334 Saint Ismier Cedex
More informationFinger Search in the Implicit Model
Finger Search in the Implicit Model Gerth Stølting Brodal, Jesper Sindahl Nielsen, Jakob Truelsen MADALGO, Department o Computer Science, Aarhus University, Denmark. {gerth,jasn,jakobt}@madalgo.au.dk Abstract.
More informationIn the index (pages ), reduce all page numbers by 2.
Errata or Nilpotence and periodicity in stable homotopy theory (Annals O Mathematics Study No. 28, Princeton University Press, 992) by Douglas C. Ravenel, July 2, 997, edition. Most o these were ound by
More informationOPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION
OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION Xu Bei, Yeo Jun Yoon and Ali Abur Teas A&M University College Station, Teas, U.S.A. abur@ee.tamu.edu Abstract This paper presents
More informationWhat the No Free Lunch Theorems Really Mean; How to Improve Search Algorithms
What the No Free Lunch Theorems Really Mean; How to Improve Search Algorithms David H. Wolpert SFI WORKING PAPER: 2012-10-017 SFI Working Papers contain accounts o scientiic work o the author(s) and do
More informationExponential and Logarithmic. Functions CHAPTER The Algebra of Functions; Composite
CHAPTER 9 Exponential and Logarithmic Functions 9. The Algebra o Functions; Composite Functions 9.2 Inverse Functions 9.3 Exponential Functions 9.4 Exponential Growth and Decay Functions 9.5 Logarithmic
More information2.6 Two-dimensional continuous interpolation 3: Kriging - introduction to geostatistics. References - geostatistics. References geostatistics (cntd.
.6 Two-dimensional continuous interpolation 3: Kriging - introduction to geostatistics Spline interpolation was originally developed or image processing. In GIS, it is mainly used in visualization o spatial
More informationNumerical Solution of Ordinary Differential Equations in Fluctuationlessness Theorem Perspective
Numerical Solution o Ordinary Dierential Equations in Fluctuationlessness Theorem Perspective NEJLA ALTAY Bahçeşehir University Faculty o Arts and Sciences Beşiktaş, İstanbul TÜRKİYE TURKEY METİN DEMİRALP
More informationRigorous pointwise approximations for invariant densities of non-uniformly expanding maps
Ergod. Th. & Dynam. Sys. 5, 35, 8 44 c Cambridge University Press, 4 doi:.7/etds.3.9 Rigorous pointwise approximations or invariant densities o non-uniormly expanding maps WAEL BAHSOUN, CHRISTOPHER BOSE
More informationSimpler Functions for Decompositions
Simpler Functions or Decompositions Bernd Steinbach Freiberg University o Mining and Technology, Institute o Computer Science, D-09596 Freiberg, Germany Abstract. This paper deals with the synthesis o
More informationEstimation and detection of a periodic signal
Estimation and detection o a periodic signal Daniel Aronsson, Erik Björnemo, Mathias Johansson Signals and Systems Group, Uppsala University, Sweden, e-mail: Daniel.Aronsson,Erik.Bjornemo,Mathias.Johansson}@Angstrom.uu.se
More informationBasic properties of limits
Roberto s Notes on Dierential Calculus Chapter : Limits and continuity Section Basic properties o its What you need to know already: The basic concepts, notation and terminology related to its. What you
More informationDiscrete Mathematics. On the number of graphs with a given endomorphism monoid
Discrete Mathematics 30 00 376 384 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: www.elsevier.com/locate/disc On the number o graphs with a given endomorphism monoid
More informationIrregularities and Scaling in Signal and Image Processing: Multifractal Analysis
Irregularities and Scaling in Signal and Image Processing: Multiractal Analysis P. Abry, S. Jaard, H. Wendt November 7, Abstract: B. Mandelbrot gave a new birth to the notions o scale invariance, selsimilarity
More informationPublished in the American Economic Review Volume 102, Issue 1, February 2012, pages doi: /aer
Published in the American Economic Review Volume 102, Issue 1, February 2012, pages 594-601. doi:10.1257/aer.102.1.594 CONTRACTS VS. SALARIES IN MATCHING FEDERICO ECHENIQUE Abstract. Firms and workers
More informationSolving Monotone Polynomial Equations
Solving Monotone Polynomial Equations Javier Esparza, Stean Kieer, and Michael Luttenberger Institut ür Inormatik, Technische Universität München, 85748 Garching, Germany {esparza,kieer,luttenbe}@in.tum.de
More informationIntroduction to Simulation - Lecture 2. Equation Formulation Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy
Introduction to Simulation - Lecture Equation Formulation Methods Jacob White Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Outline Formulating Equations rom Schematics Struts and Joints
More informationAn Ensemble Kalman Smoother for Nonlinear Dynamics
1852 MONTHLY WEATHER REVIEW VOLUME 128 An Ensemble Kalman Smoother or Nonlinear Dynamics GEIR EVENSEN Nansen Environmental and Remote Sensing Center, Bergen, Norway PETER JAN VAN LEEUWEN Institute or Marine
More informationPhysics 2B Chapter 17 Notes - First Law of Thermo Spring 2018
Internal Energy o a Gas Work Done by a Gas Special Processes The First Law o Thermodynamics p Diagrams The First Law o Thermodynamics is all about the energy o a gas: how much energy does the gas possess,
More informationFinite Dimensional Hilbert Spaces are Complete for Dagger Compact Closed Categories (Extended Abstract)
Electronic Notes in Theoretical Computer Science 270 (1) (2011) 113 119 www.elsevier.com/locate/entcs Finite Dimensional Hilbert Spaces are Complete or Dagger Compact Closed Categories (Extended bstract)
More informationBANDELET IMAGE APPROXIMATION AND COMPRESSION
BANDELET IMAGE APPOXIMATION AND COMPESSION E. LE PENNEC AND S. MALLAT Abstract. Finding eicient geometric representations o images is a central issue to improve image compression and noise removal algorithms.
More informationReceived: 30 July 2017; Accepted: 29 September 2017; Published: 8 October 2017
mathematics Article Least-Squares Solution o Linear Dierential Equations Daniele Mortari ID Aerospace Engineering, Texas A&M University, College Station, TX 77843, USA; mortari@tamu.edu; Tel.: +1-979-845-734
More informationMaximum Flow. Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai
Maximum Flow Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai Flow Network A low network G ( V, E) is a directed graph with a source node sv, a sink node tv, a capacity unction c. Each edge ( u,
More informationOn the Correspondence of Contracts to Salaries in (Many-to-Many) Matching
On the Correspondence o Contracts to Salaries in (Many-to-Many) Matching Scott Duke Kominers 1, Becker Friedman Institute or Research in Economics, University o Chicago Abstract In this note, I extend
More informationGaussian Process Regression Models for Predicting Stock Trends
Gaussian Process Regression Models or Predicting Stock Trends M. Todd Farrell Andrew Correa December 5, 7 Introduction Historical stock price data is a massive amount o time-series data with little-to-no
More informationMulti-Row Cuts in Integer Programming. Tepper School of Business Carnegie Mellon University, Pittsburgh
Multi-Row Cuts in Integer Programming Gérard Cornuéjols Tepper School o Business Carnegie Mellon University, Pittsburgh March 2011 Mixed Integer Linear Programming min s.t. cx Ax = b x j Z or j = 1,...,
More informationAnalytical expressions for field astigmatism in decentered two mirror telescopes and application to the collimation of the ESO VLT
ASTRONOMY & ASTROPHYSICS MAY II 000, PAGE 57 SUPPLEMENT SERIES Astron. Astrophys. Suppl. Ser. 44, 57 67 000) Analytical expressions or ield astigmatism in decentered two mirror telescopes and application
More information