A PROBABILISTIC POWER DOMAIN ALGORITHM FOR FRACTAL IMAGE DECODING

Size: px
Start display at page:

Download "A PROBABILISTIC POWER DOMAIN ALGORITHM FOR FRACTAL IMAGE DECODING"

Transcription

1 Stochastics and Dynamics, Vol. 2, o. 2 (2002) 6 73 c World Scientiic Publishing Company A PROBABILISTIC POWER DOMAI ALGORITHM FOR FRACTAL IMAGE DECODIG V. DRAKOPOULOS Department o Inormatics and Telecommunications, Theoretical Inormatics, University o Athens, Panepistimioupolis 57 84, Athens, Hellas vasilios@di.uoa.gr A. KAKOS and. IKOLAOU Division o Inormation Systems, Bank o Greece, 34 Mesogeion Ave., 52 32, Cholargos, Hellas Received 2 January 2002 Revised April 2002 A new algorithm, called herein the random power domain algorithm, is discussed; it generates the image corresponding to an iterated unction system with probabilities, a technique used in ractal image decoding. A simple complexity analysis or the algorithm is also derived. Keywords: Fractals; random algorithm; image comparison; iterated unction systems; power domain. AMS Subject Classiication: 28A80, 94A08, 68Q0, 68Q55. Introduction A number o algorithms have been proposed or rendering the invariant measure supported by the attractor o an (hyperbolic) iterated unction system, orifs or short, on the plane. In what ollows, however, a competitive alternative will be described and implemented as a consequence o the introduction o domain theory in dynamical systems, measures and ractals [2]. It uses the probabilistic power domain as its computational model and generates the invariant measure o an IFS with probabilities. The proposed algorithm, ater comparing with the most commonly used probabilistic algorithms or rendering the invariant measure supported by the attractor, namely the Random Iteration Algorithm (RIA, see []) and the Random Adaptive Cut Algorithm (RACA, see [4]), shows to be, under all known circumstances, substantially aster than both the others and much more eicient than the RIA in terms o memory requirements. Since the RIA chooses the points o the attractor at random, it will unavoidably redraw some points more than once. Figure shows a demography o the dendrite shown in Fig. 7(e). The dendrite is put on a 6

2 62 V. Drakopoulos, A. Kakos &. ikolaou (a) (b) (c) Fig.. Distribution o an orbit rendering a dendrite displayed in vertical bars using (a) the RIA, (b) the RACA and (c) the proposed algorithm. square lattice on R 2 with small mesh size; the number o points rom the dendrite in each little box o that lattice is measured and represented by a vertical bar, thus visualizing the distribution. Apparently, the border o the dendrite is visited most requently, while the other points seem to be avoided most oten. This substantial waste o time is the main reason why the proposed algorithm, which produces no more than the necessary points, is that aster. Furthermore, many o the points o the attractor will never be plotted, due to the randomness o the RIA; to make matters worse, the attractors produced by two successive runnings o the algorithm will not be exactly the same. The RIA theoretically suggests that its corresponding iterated procedure should be perormed or an ininite number o times beore the actual attractor is produced. In the words o Monro and Dudbridge in [5] There is no deinite stopping criterion or the RIA. On the contrary, the RACA uses a criterion to terminate the recursive descent o the tree o transormations and the idea behind it can be served as a basis or a magniication algorithm. The main advantage o our algorithm is that it encapsulates an economical and enhanced stopping criterion as opposed to the RACA; roughly speaking, it terminates (in inite time) automatically and quickly on any digitized screen without needing to ix a number o iterations in advance. Moreover, or a given discrimination capability o the computer screen, the proposed algorithm has a determined upper and lower bound or the number o computations required beore the best possible attractor or the given resolution is constructed. The exact number o computations, however, cannot be speciied analytically in a closed ormula, but can be very easily computed with the aid o a computer. An analytic description o the algorithm as well as a digest o the theoretical undamentals, on which its model is based, ollows. However, an extended abstract or the theory can be ound in [3], where power domains are discussed along with IFS. A general reerence oriented toward computational theory is [6]. 2. The Probabilistic Power Domain First o all a link between measure theory and domain theory is needed. The link is established in [2]; however, or a deep understanding o the algorithm and its implementation that ollows, we shall make an account o the most undamental conclusions that appear in that paper. We are especially interested in Borel measures, which have the signiicant property that the measure o any Borel set is determined by the topologically important

3 A Probabilistic Power Domain Algorithm or Fractal Image Decoding 63 open sets or, alternatively, the compact sets; such a Borel measure is called regular. More ormally, a Borel measure μ on a locally compact Hausdor space is called regular, i, or all Borel subsets B o, wehave μ(b) =in{μ(o) B O, O open} =sup{μ(f ) B F, F compact}. It can be proved that, i is a locally compact, second countable Hausdor space as in our case, every open set will be σ-compact (it is a countable union o compact sets) and every Borel measure is regular. The computational model o the new algorithm or the construction o the invariant measure o an IFS with probabilities is based on the probabilistic power domain. Hence the ollowing deinitions are essential or the understanding o the proposed algorithm. The lattice o open sets o a topological space is denoted by Ω(). Deinition. An (e)valuation on a topological space is a map ν :Ω() [0, ) which satisies: (i) ν(u)+ν(v )=ν(u V )+ν(u V ) (ii) ν( ) = 0, and (iii) U V ν(u) ν(v ). A continuous (e)valuation is an (e)valuation such that whenever A Ω() isa directed set (with respect to ) oopensetso, then ( ) ν O =supν(o). O A O A Deinition 2. The Probabilistic Power Domain P o a topological space consists o the set o continuous (e)valuations ν on with ν() and is ordered as ollows: μ ν i and only i or all open sets O o, μ(o) ν(o). Deinition 3. For any b, thepoint (e)valuation based at b is the (e)valuation n b :Ω() [0, ) deined by {, i b O, n b (O) = 0, otherwise. Any directed set (μ i ) i I o (e)valuations has a least upper bound (l.u.b.) given by i μ i = μ, whereoro Ω() wehaveμ(o) =sup i I μ i (O); hence (P, ) is a directed complete partial order (d.c.p.o.), with bottom element (which is the P : (O) =0,O Ω()) It is easy to prove that any inite linear combination n i= r in bi o unit point (e)valuations n bi with constant coeicients r i [0, ), i =, 2,,n is also an (e)valuation on. What is really interesting about (e)valuations is that, i is an ω-continuous d.c.p.o., then P is an ω-continuous d.c.p.o. as well; moreover any (e)valuation

4 64 V. Drakopoulos, A. Kakos &. ikolaou on an ω-continuous d.c.p.o. is the directed l.u.b. o linear combinations o point (e)valuations and it extends uniquely to a measure. Hence (e)valuations and measures are in act the same on ω-continuous d.c.p.o s. The set o all positive Borel measures μ on a locally compact, second countable Hausdor space with μ(), denoted by M(), can be partially ordered by putting μ ν i and only i or all Borel sets B, μ(b) ν(b). With this ordering M() becomes a d.c.p.o. 3. A Computational Model For any Hausdor metric space the upper space U consists o all nonempty compact subsets o (see Fig.2), that is U = { C C compact}. This space has a topology, called the upper topology, whose base is the collection a = {C U C a}, where a Ω() isanopenseto. This means that, or any open subset a o, the collection o all compact nonempty subsets o that are included in a orms an element o the base or the upper topology. This topology is T 0 ; the specialisation ordering u o U is the superset inclusion, i.e. A u B a Ω()[A a B a] A B. Under this ordering ( u )thespace(u, ) becomes a d.c.p.o., which means that every directed set has a l.u.b. The l.u.b. o a directed set o compact subsets is their intersection; the elements o are maximal elements o U. The singleton map s: U with s(x) ={x} can be used or embedding onto the set o maximal elements o U. I U is ω-continuous, then we can identiy (e)valuations and measures on U, or a continuous (e)valuation μ on U extends uniquely to a Borel measure on U and a measure on U is a continuous (e)valuation. The support o the invariant measure o an IFS has the very important property that it contains exactly the { x } x O O U =[0, ] [0, ] =[0, ] [0, ] Fig. 2. The upper space or the unit square.

5 A Probabilistic Power Domain Algorithm or Fractal Image Decoding 65 M () M() P U PU : β 0 : O 0 : : O 0 Fig. 3. The probabilistic power domain. points o the attractor. We will now extend the notion o the support in the case o (e)valuations. An (e)valuation μ PU is said to be supported in s(), i μ(u \ s()) = 0; i μ is supported in s(), then the support o μ is the set o points y s() such that μ() > 0 or all neighbourhoods U o y. WedenotebyS() theset that contains all the supported (e)valuations in s() (S() PU). Since the invariant measure o an IFS is a normalized Borel measure, we restrict our attention to normalized measures and normalized (e)valuations. We denote by M (), P U, S () the sets which contain the normalized Borel measures, the normalized (e)valuations and the normalized supported (e)valuations, respectively (see Fig. 3). PU and P U have exactly the same maximal elements and the elements o S () are maximal elements o PU. The maps e: M () S () withe(μ)(o) μ(s (O)) or any O Ω() and j : S () M () withj(ν)(b) ν(s(b)) or any Borel subset B o are well deined and continuous. Since j is the inverse o e, the restrictions o e and j give an isomorphism between M () ands (). Let us recall that PU is ω-continuous whenever U is ω-continuous and in this case any (e)valuation μ PU is the directed l.u.b. o linear combinations o point (e)valuations. I B U is a countable order basis o U, then { n } n r i n bi b i B,r i rational and r i i= is a countable order basis o PU. This observation provides us with an eective way o obtaining measures on as the directed l.u.b. o linear combinations o point (e)valuations on U. I is compact, then both U and P U have bottom elements; the bottom element o U is the space itsel, whereas the bottom element o P U is the unit point (e)valuation n based at U with {, i O U, n (O) = 0, otherwise. i=

6 66 V. Drakopoulos, A. Kakos &. ikolaou The above theoretical ramework can be used or the construction o the invariant measure o an IFS with probabilities as ollows. 4. The Random Power Domain Algorithm Let {;, 2,, ; p,p 2,,p } or, more briely, {; ; p } be an hyperbolic IFS with probabilities; the operator T : P U P U given by T (μ)(o) = p i μ(i (O)) i= is well deined and continuous, and thereore has a least ixed point; it can be proved (see [2]) that the least ixed point o T is supported in and its support is the unique attractor o the IFS. Since an element o S () is a maximal element o P U, we immediately deduce that an hyperbolic IFS with probabilities has a unique ixed point. I μ is the unique ixed point o T,thenj(μ) M () isthe unique invariant measure o the IFS. We correspond the (e)valuation n i i2 in to node i i2 in o the nonprobabilistic tree shown in Fig. 4. The nodes o the tree are point (e)valuations ordered as usual so that the construction o the invariant measure can be obtained by using the tree shown in Fig. 5. Then, the tree is traversed until the outcome o any node i i2 in becomes smaller than a pixel on the computer screen. Then a pruning occurs and the corresponding branch will produce no more children. This tree, however, cannot be employed in any eicient implementation. The solution will be the use o an equivalent tree (see Fig. 6) that can be traversed eiciently. We prove that this alternative tree is computationally equivalent to the original one. The two trees have exactly the same irst two levels. From the third level onwards, however, the dierences start. Even i the second level is identical in both trees, a dierent third level is produced. It is our intention to prove that this does not aect the theoretical basis and that the third level is computationally equivalent. I at some node o the second level s i s i2 2 <εthen holds, due to Fig. 4. The IFS tree.

7 A Probabilistic Power Domain Algorithm or Fractal Image Decoding 67 n p 2 n p p n p p n p 2 n n p 2p n p p 2 n... p n p n p 3 n p 3n p p 2 n p 2 p p n 2p n p p 2 n Fig. 5. The IFS tree with probabilities. n p 2 n p p n p p n p 2 n n p 2p n p p 2n... p n p n p 3 n p 2 p n p 2 p n p p 2 p 2 n p n Fig. 6. The action tree with probabilities. p 3 n the commutative property o the real numbers, s i2 s i 2 <εalso holds. Hence, in the case o the irst tree, s i s i2 2 < ε means that the children o i i2 ( i i2, i i2 2,, i i2 ) will not be produced and the pixel i i2 will be plotted. For this same tree, s i2 s i 2 <εmeans that the children o i2 i ( i2 i, i2 i 2,, i2 i ) will not be produced and the pixel i2 i will be plotted. On the other hand, or the second tree, the condition s i s i2 2 < ε means that the children o i i2 ( i2 i, i2 i 2,, i2 i ) will not be produced and the pixel i i2 will be plotted. Moreover, the condition s i2 s i 2 < ε, or the second tree, means that the children o i2 i ( i i2, i i2 2,, i i2 ) will not be produced and the pixel i2 i will be plotted. It is now more than obvious that the third level o the two trees are computationally equivalent. Using induction we can prove that the two trees are equivalent at all levels. Thus the two trees are, or our purposes, computationally equivalent. Our contribution, i.e. the discovery o the equivalent tree, has beneicially eected the implementation o the algorithm. ot a single redundant computation is perormed. On the other hand, the memory requirements have signiicantly dropped due to the introduction o this second tree.

8 68 V. Drakopoulos, A. Kakos &. ikolaou I a branch is pruned, or example at node i i2 in, then the corresponding atomic measure or the pixel o the attractor will be p i p i2 p in, which is assigned by the corresponding point (e)valuation p i p i2 p in n i i2 in. However, two pruned branches might correspond to the same pixel. In this case, the measure contribution o all branches that end up at the same pixel should be summed up beore any rendering o the pixel takes places. In this way, a record o which branches correspond to the same pixel must be kept so that one is able to add up all individual contributions to determine the actual atomic measure o every screen pixel o the attractor. In this way a graphic representation o the invariant measure is achieved. Although the theory suggests that at depth n, T (n) μ 0 is an (e)valuation, μ 0 being any normalized (e)valuation, the unbalanced pruning o the tree might raise some objections regarding the soundness o our implementation. However, i d max is the level at which the last pruning takes place, then we can saely assume that our approximation to the invariant measure μ is T (dmax) μ 0, μ 0 being the uniorm measure on the screen. This means that we can make the equivalent theoretic assumption that all branches o the point (e)valuation tree o Figs. 5 and 6 are pruned at level d max. The ollowing argument justiies this assumption. For any branch o the tree which is pruned at an earlier stage d than d max we can insert its children and grandchildren eectively pruned in the tree diagram until the complete level d max is reached. Then our approximation to the invariant measure is still a sound one or, i at level d we had decided that the parent node represented less than a pixel on the screen, then its children would still be included in that pixel (due to the ordering o nodes); then their total measure contribution to the pixel would be equal to that o their parent at level d. This means that the sum o the atomic measures that all children have in total would be equal to what the node at level d had. Thus, this balanced pruning which we just proved to be equivalent to the unbalanced one we perorm justiies our argument that what we actual produce is a measure, in act T (dmax) μ The Algorithm and Its Complexity Hence the algorithm can be described roughly as ollows; we start rom the ixed point which corresponds to the transormation with the greatest probability and traverse the action tree until a parallelogram i i2 i becomes small enough so that it is actually a pixel on the computer screen. This happens when s i s i2 s i 2 <ε, ε =/M,whereM is the resolution o the screen, and in that case this branch has contributed p i p i2 p i to the measure o the pixel i i2 i. Ater having sum up all measure contributions or each pixel, we color the attractor pixels accordingly. In that way, a graphic representation o the invariant measure is produced. The actual algorithm in a orm o pseudo-code, which also provides a deinition or the equivalent tree o Fig. 6, has as ollows:

9 A Probabilistic Power Domain Algorithm or Fractal Image Decoding Start.. Compute all contractivity actors s i. 2a. Assign measure on the whole screen, i.e. μ([0, ] 2 )=. 2b. All atomic measures μ(x) opixelsx [0, ] 2 are initially set to zero. 3a. Call procedure measure ([x 0,x 0,,x 0 ], 0, [ 2, 2,, 2], [,,,]), or x 0 [0, ] 2. 3b. Plot all pixels x [0, ] 2 with a color proportional to their atomic measure μ(x). 4. End. where procedure measure([x,x 2,,x ],q,[d,d 2,,d ], [m,m 2,,m ]) { or i =,, do { x i = i (x q ) d i = s i d q m i = p i m q } or i =,, do { i (d i > /M ) then do call measure([x,x 2,,x ], i,[d,d 2,, d ], [m,m 2,,m ]) else do μ(x i ) = μ(x i ) + m i } } Having described the algorithm, we shall try to identiy the number o computations needed or the construction o the attractor. Since the contractivity actors o the aine transormations are known, we can ind an estimation or the depth o the tree. I s max and s min are the largest and the smallest contractivity actors, respectively, then the depth o the tree will lie between [ ln M d max = ln s max ] + and d min = [ ln M ln s min ] + that are the greatest and the smallest depth, respectively. This means that in the worst case we need 0( dmax ) = 0[( dmax+ )/( ) ], thus giving O( dmax ) while in the best case we need 0( dmin )= 0[( dmin+ )/( ) ] computations. This number is explained by the act that nine computations are needed or the calculation o the new point and only one computation is needed or the calculation o the quantity s i (s i2 s in 2) since at each step the quantity s i2 s in 2 has already been computed in previous nodes.

10 70 V. Drakopoulos, A. Kakos &. ikolaou The exact number o computations perormed beore the construction o the attractor is C( 2), where {, i x<ε C(x) = i= C(s ix)+0, otherwise, where is the number o aine transormations and ε =/M, M being the resolution o the screen. Although, it is extremely diicult to ind a closed ormula which gives the exact number o computations, the above mentioned recursive ormula can be used to obtain this number with the aid o a computer. (a) (b) (c) (d) (e) () (g) Fig. 7. The Sierpiński triangle, a dendrite, a spiral, a meander, a second dendrite, a ern lea and a maple lea Sierpinski Dendrite Spiral Meander Dendrite II Fern lea Maple lea Time (sec) RPDA Method RACA RIA Sierpinski Dendrite Spiral Meander Maple lea Fern lea Dendrite II IFS Fig. 8. The time results o the systematic comparison.

11 A Probabilistic Power Domain Algorithm or Fractal Image Decoding 7 6. Comparative Results The current implementation o our algorithm is written in Microsot Visual Basic 6.0. It is capable o drawing ractal images using the Random PDA, the RIA and the RACA, and displaying the depth o the action tree, the number o points used or rendering and the total runtime. The ractal images (M = 00) used or the comparisons o the various algorithms are illustrated in Fig. 7. The Random PDA was inally tested and rated by comparing the various ractal attractors produced by it versus the attractors produced using the RIA and the RACA. Time results are given in CPU seconds on a Pentium III PC with a 400 MHz CPU clock running Windows 98. As we have already stated, the proposed algorithm is more eicient than the RIA and the RACA; the systematic comparison we perormed gave the results shown in Fig. 8 and justiies our argument. 7. Conclusions Our algorithm is extremely eicient or the decoding o pictures which have been coded using some method based on IFS. This is explained by the act that natural images such as the ace o a person lack sel-similarity and hence a lot o aine transormations are employed or the coding; each o them, however, will have a very small contractivity actor and hence our tree will have small depth (0 or the maple lea, 3 or the ern lea, 45 or the spiral and 8 or the other igures); so, the construction o the attractor will terminate very quickly, since only a ew number o points are necessary (see Table ). Table. The number o pixels used or the systematic comparison. Pixels drawn RPDA RACA RIA Sierpiński Dendrite Spiral Meander Dendrite II Fern lea Maple lea One should also mention that without the use o the equivalent trees, it is doubtul i this perormance o the Random PDA could have ever been achieved. Any implementation that avoids their use is bound either to make use o huge amount o memory or unavoidably to resort to recomputations. In both cases, such an implementation becomes highly ineicient and the perormance o the algorithm would be substantially decreased.

12 72 V. Drakopoulos, A. Kakos &. ikolaou Appendix A transormation is aine, i it may be represented by a matrix A and translation t as (x) =Ax + t, or(ix R 2 ) ( ) ( )( ) ( ) x a b x d = +. y c s y e The code o isthe6-tuple(a, b, c, s, d, e), and the code o an IFS is a table whose rows are the codes o, 2,,. I we add one extra column with the corresponding probabilities p,p 2,,p, then we are talking about the code o an IFS with probabilities. We list the IFS codes (see Tables 2 8) or the examples discussed in the main text. Table 2. The IFS code or the Sierpiński triangle. a b c s d e p Table 3. The IFS code or a dendrite. a b c s d e p Table 4. The IFS code or a spiral. a b c s d e p Table 5. The IFS code or a second dendrite. a b c s d e p

13 A Probabilistic Power Domain Algorithm or Fractal Image Decoding 73 Table 6. The IFS code or a meander. a b c s d e p Table 7. The IFS code or a ern lea. a b c s d e p Table 8. The IFS code or a maple lea. a b c s d e p Acknowledgements The authors wish to thank the anonymous reviewer or all the helpul suggestions. Reerences. M. F. Barnsley, Fractals everywhere (Academic Press, 993), 2nd edition. 2. A. Edalat, Dynamical systems, measures and ractals via domain theory, Inorm. Comput. 20 (995) A. Edalat, Power domains and iterated unction systems, Inorm. Comput. 24 (996) D. Hepting, P. Prusinkiewicz and D. Saupe, Rendering methods or iterated unction systems, infractals in the Fundamental and Applied Sciences, eds. H. O. Peitgen, J. M. Henriques and L. F. Penedo (orth-holland, 99), pp D. M. Monro and F. Dudbridge, Rendering algorithms or deterministic ractals, IEEE Computer Graphics Appl. 5 (995) G. D. Plotkin, A note on inductive generalization, in Machine Intelligence, eds. B. Meltzer and D. Michie (orth-holland, 970), Vol. 5,

SEPARATED AND PROPER MORPHISMS

SEPARATED AND PROPER MORPHISMS SEPARATED AND PROPER MORPHISMS BRIAN OSSERMAN The notions o separatedness and properness are the algebraic geometry analogues o the Hausdor condition and compactness in topology. For varieties over the

More information

Probabilistic Observations and Valuations (Extended Abstract) 1

Probabilistic Observations and Valuations (Extended Abstract) 1 Replace this ile with prentcsmacro.sty or your meeting, or with entcsmacro.sty or your meeting. Both can be ound at the ENTCS Macro Home Page. Probabilistic Observations and Valuations (Extended Abstract)

More information

SEPARATED AND PROPER MORPHISMS

SEPARATED AND PROPER MORPHISMS SEPARATED AND PROPER MORPHISMS BRIAN OSSERMAN Last quarter, we introduced the closed diagonal condition or a prevariety to be a prevariety, and the universally closed condition or a variety to be complete.

More information

(C) The rationals and the reals as linearly ordered sets. Contents. 1 The characterizing results

(C) The rationals and the reals as linearly ordered sets. Contents. 1 The characterizing results (C) The rationals and the reals as linearly ordered sets We know that both Q and R are something special. When we think about about either o these we usually view it as a ield, or at least some kind o

More information

VALUATIVE CRITERIA BRIAN OSSERMAN

VALUATIVE CRITERIA BRIAN OSSERMAN VALUATIVE CRITERIA BRIAN OSSERMAN Intuitively, one can think o separatedness as (a relative version o) uniqueness o limits, and properness as (a relative version o) existence o (unique) limits. It is not

More information

The Deutsch-Jozsa Problem: De-quantization and entanglement

The Deutsch-Jozsa Problem: De-quantization and entanglement The Deutsch-Jozsa Problem: De-quantization and entanglement Alastair A. Abbott Department o Computer Science University o Auckland, New Zealand May 31, 009 Abstract The Deustch-Jozsa problem is one o the

More information

Supplementary material for Continuous-action planning for discounted infinite-horizon nonlinear optimal control with Lipschitz values

Supplementary material for Continuous-action planning for discounted infinite-horizon nonlinear optimal control with Lipschitz values Supplementary material or Continuous-action planning or discounted ininite-horizon nonlinear optimal control with Lipschitz values List o main notations x, X, u, U state, state space, action, action space,

More information

Objectives. By the time the student is finished with this section of the workbook, he/she should be able

Objectives. By the time the student is finished with this section of the workbook, he/she should be able FUNCTIONS Quadratic Functions......8 Absolute Value Functions.....48 Translations o Functions..57 Radical Functions...61 Eponential Functions...7 Logarithmic Functions......8 Cubic Functions......91 Piece-Wise

More information

Chapter 6 Reliability-based design and code developments

Chapter 6 Reliability-based design and code developments Chapter 6 Reliability-based design and code developments 6. General Reliability technology has become a powerul tool or the design engineer and is widely employed in practice. Structural reliability analysis

More information

FIXED POINTS OF RENORMALIZATION.

FIXED POINTS OF RENORMALIZATION. FIXED POINTS OF RENORMALIZATION. XAVIER BUFF Abstract. To study the geometry o a Fibonacci map o even degree l 4, Lyubich [Ly2] deined a notion o generalized renormalization, so that is renormalizable

More information

CLASS NOTES MATH 527 (SPRING 2011) WEEK 6

CLASS NOTES MATH 527 (SPRING 2011) WEEK 6 CLASS NOTES MATH 527 (SPRING 2011) WEEK 6 BERTRAND GUILLOU 1. Mon, Feb. 21 Note that since we have C() = X A C (A) and the inclusion A C (A) at time 0 is a coibration, it ollows that the pushout map i

More information

VALUATIVE CRITERIA FOR SEPARATED AND PROPER MORPHISMS

VALUATIVE CRITERIA FOR SEPARATED AND PROPER MORPHISMS VALUATIVE CRITERIA FOR SEPARATED AND PROPER MORPHISMS BRIAN OSSERMAN Recall that or prevarieties, we had criteria or being a variety or or being complete in terms o existence and uniqueness o limits, where

More information

2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction

2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction . ETA EVALUATIONS USING WEBER FUNCTIONS Introduction So ar we have seen some o the methods or providing eta evaluations that appear in the literature and we have seen some o the interesting properties

More information

1 Relative degree and local normal forms

1 Relative degree and local normal forms THE ZERO DYNAMICS OF A NONLINEAR SYSTEM 1 Relative degree and local normal orms The purpose o this Section is to show how single-input single-output nonlinear systems can be locally given, by means o a

More information

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points Roberto s Notes on Dierential Calculus Chapter 8: Graphical analysis Section 1 Extreme points What you need to know already: How to solve basic algebraic and trigonometric equations. All basic techniques

More information

Part I: Thin Converging Lens

Part I: Thin Converging Lens Laboratory 1 PHY431 Fall 011 Part I: Thin Converging Lens This eperiment is a classic eercise in geometric optics. The goal is to measure the radius o curvature and ocal length o a single converging lens

More information

CHOW S LEMMA. Matthew Emerton

CHOW S LEMMA. Matthew Emerton CHOW LEMMA Matthew Emerton The aim o this note is to prove the ollowing orm o Chow s Lemma: uppose that : is a separated inite type morphism o Noetherian schemes. Then (or some suiciently large n) there

More information

Power Domains and Iterated Function. Systems. Abbas Edalat. Department of Computing. Imperial College of Science, Technology and Medicine

Power Domains and Iterated Function. Systems. Abbas Edalat. Department of Computing. Imperial College of Science, Technology and Medicine Power Domains and Iterated Function Systems Abbas Edalat Department of Computing Imperial College of Science, Technology and Medicine 180 Queen's Gate London SW7 2BZ UK Abstract We introduce the notion

More information

MEASUREMENT UNCERTAINTIES

MEASUREMENT UNCERTAINTIES MEASUREMENT UNCERTAINTIES What distinguishes science rom philosophy is that it is grounded in experimental observations. These observations are most striking when they take the orm o a quantitative measurement.

More information

Math 754 Chapter III: Fiber bundles. Classifying spaces. Applications

Math 754 Chapter III: Fiber bundles. Classifying spaces. Applications Math 754 Chapter III: Fiber bundles. Classiying spaces. Applications Laurențiu Maxim Department o Mathematics University o Wisconsin maxim@math.wisc.edu April 18, 2018 Contents 1 Fiber bundles 2 2 Principle

More information

Circuit Complexity / Counting Problems

Circuit Complexity / Counting Problems Lecture 5 Circuit Complexity / Counting Problems April 2, 24 Lecturer: Paul eame Notes: William Pentney 5. Circuit Complexity and Uniorm Complexity We will conclude our look at the basic relationship between

More information

8.4 Inverse Functions

8.4 Inverse Functions Section 8. Inverse Functions 803 8. Inverse Functions As we saw in the last section, in order to solve application problems involving eponential unctions, we will need to be able to solve eponential equations

More information

Math 216A. A gluing construction of Proj(S)

Math 216A. A gluing construction of Proj(S) Math 216A. A gluing construction o Proj(S) 1. Some basic deinitions Let S = n 0 S n be an N-graded ring (we ollows French terminology here, even though outside o France it is commonly accepted that N does

More information

A Faster Randomized Algorithm for Root Counting in Prime Power Rings

A Faster Randomized Algorithm for Root Counting in Prime Power Rings A Faster Randomized Algorithm or Root Counting in Prime Power Rings Leann Kopp and Natalie Randall July 17, 018 Abstract Let p be a prime and Z[x] a polynomial o degree d such that is not identically zero

More information

Telescoping Decomposition Method for Solving First Order Nonlinear Differential Equations

Telescoping Decomposition Method for Solving First Order Nonlinear Differential Equations Telescoping Decomposition Method or Solving First Order Nonlinear Dierential Equations 1 Mohammed Al-Reai 2 Maysem Abu-Dalu 3 Ahmed Al-Rawashdeh Abstract The Telescoping Decomposition Method TDM is a new

More information

Curve Sketching. The process of curve sketching can be performed in the following steps:

Curve Sketching. The process of curve sketching can be performed in the following steps: Curve Sketching So ar you have learned how to ind st and nd derivatives o unctions and use these derivatives to determine where a unction is:. Increasing/decreasing. Relative extrema 3. Concavity 4. Points

More information

CHAPTER 1: INTRODUCTION. 1.1 Inverse Theory: What It Is and What It Does

CHAPTER 1: INTRODUCTION. 1.1 Inverse Theory: What It Is and What It Does Geosciences 567: CHAPTER (RR/GZ) CHAPTER : INTRODUCTION Inverse Theory: What It Is and What It Does Inverse theory, at least as I choose to deine it, is the ine art o estimating model parameters rom data

More information

AH 2700A. Attenuator Pair Ratio for C vs Frequency. Option-E 50 Hz-20 khz Ultra-precision Capacitance/Loss Bridge

AH 2700A. Attenuator Pair Ratio for C vs Frequency. Option-E 50 Hz-20 khz Ultra-precision Capacitance/Loss Bridge 0 E ttenuator Pair Ratio or vs requency NEEN-ERLN 700 Option-E 0-0 k Ultra-precision apacitance/loss ridge ttenuator Ratio Pair Uncertainty o in ppm or ll Usable Pairs o Taps 0 0 0. 0. 0. 07/08/0 E E E

More information

RATIONAL FUNCTIONS. Finding Asymptotes..347 The Domain Finding Intercepts Graphing Rational Functions

RATIONAL FUNCTIONS. Finding Asymptotes..347 The Domain Finding Intercepts Graphing Rational Functions RATIONAL FUNCTIONS Finding Asymptotes..347 The Domain....350 Finding Intercepts.....35 Graphing Rational Functions... 35 345 Objectives The ollowing is a list o objectives or this section o the workbook.

More information

( x) f = where P and Q are polynomials.

( x) f = where P and Q are polynomials. 9.8 Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm ( ) ( ) ( ) P where P and Q are polynomials. Q An eample o a simple rational

More information

The Clifford algebra and the Chevalley map - a computational approach (detailed version 1 ) Darij Grinberg Version 0.6 (3 June 2016). Not proofread!

The Clifford algebra and the Chevalley map - a computational approach (detailed version 1 ) Darij Grinberg Version 0.6 (3 June 2016). Not proofread! The Cliord algebra and the Chevalley map - a computational approach detailed version 1 Darij Grinberg Version 0.6 3 June 2016. Not prooread! 1. Introduction: the Cliord algebra The theory o the Cliord

More information

APPENDIX 1 ERROR ESTIMATION

APPENDIX 1 ERROR ESTIMATION 1 APPENDIX 1 ERROR ESTIMATION Measurements are always subject to some uncertainties no matter how modern and expensive equipment is used or how careully the measurements are perormed These uncertainties

More information

ON THE DIAMETER OF THE ATTRACTOR OF AN IFS Serge Dubuc Raouf Hamzaoui Abstract We investigate methods for the evaluation of the diameter of the attrac

ON THE DIAMETER OF THE ATTRACTOR OF AN IFS Serge Dubuc Raouf Hamzaoui Abstract We investigate methods for the evaluation of the diameter of the attrac ON THE DIAMETER OF THE ATTRACTOR OF AN IFS Serge Dubuc Raouf Hamzaoui Abstract We investigate methods for the evaluation of the diameter of the attractor of an IFS. We propose an upper bound for the diameter

More information

TESTING TIMED FINITE STATE MACHINES WITH GUARANTEED FAULT COVERAGE

TESTING TIMED FINITE STATE MACHINES WITH GUARANTEED FAULT COVERAGE TESTING TIMED FINITE STATE MACHINES WITH GUARANTEED FAULT COVERAGE Khaled El-Fakih 1, Nina Yevtushenko 2 *, Hacene Fouchal 3 1 American University o Sharjah, PO Box 26666, UAE kelakih@aus.edu 2 Tomsk State

More information

Syllabus Objective: 2.9 The student will sketch the graph of a polynomial, radical, or rational function.

Syllabus Objective: 2.9 The student will sketch the graph of a polynomial, radical, or rational function. Precalculus Notes: Unit Polynomial Functions Syllabus Objective:.9 The student will sketch the graph o a polynomial, radical, or rational unction. Polynomial Function: a unction that can be written in

More information

In many diverse fields physical data is collected or analysed as Fourier components.

In many diverse fields physical data is collected or analysed as Fourier components. 1. Fourier Methods In many diverse ields physical data is collected or analysed as Fourier components. In this section we briely discuss the mathematics o Fourier series and Fourier transorms. 1. Fourier

More information

CS 361 Meeting 28 11/14/18

CS 361 Meeting 28 11/14/18 CS 361 Meeting 28 11/14/18 Announcements 1. Homework 9 due Friday Computation Histories 1. Some very interesting proos o undecidability rely on the technique o constructing a language that describes the

More information

Micro-canonical ensemble model of particles obeying Bose-Einstein and Fermi-Dirac statistics

Micro-canonical ensemble model of particles obeying Bose-Einstein and Fermi-Dirac statistics Indian Journal o Pure & Applied Physics Vol. 4, October 004, pp. 749-757 Micro-canonical ensemble model o particles obeying Bose-Einstein and Fermi-Dirac statistics Y K Ayodo, K M Khanna & T W Sakwa Department

More information

Probabilistic Optimisation applied to Spacecraft Rendezvous on Keplerian Orbits

Probabilistic Optimisation applied to Spacecraft Rendezvous on Keplerian Orbits Probabilistic Optimisation applied to pacecrat Rendezvous on Keplerian Orbits Grégory aive a, Massimiliano Vasile b a Université de Liège, Faculté des ciences Appliquées, Belgium b Dipartimento di Ingegneria

More information

Lecture 8 Optimization

Lecture 8 Optimization 4/9/015 Lecture 8 Optimization EE 4386/5301 Computational Methods in EE Spring 015 Optimization 1 Outline Introduction 1D Optimization Parabolic interpolation Golden section search Newton s method Multidimensional

More information

Definition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series.

Definition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series. 2.4 Local properties o unctions o several variables In this section we will learn how to address three kinds o problems which are o great importance in the ield o applied mathematics: how to obtain the

More information

RESOLUTION MSC.362(92) (Adopted on 14 June 2013) REVISED RECOMMENDATION ON A STANDARD METHOD FOR EVALUATING CROSS-FLOODING ARRANGEMENTS

RESOLUTION MSC.362(92) (Adopted on 14 June 2013) REVISED RECOMMENDATION ON A STANDARD METHOD FOR EVALUATING CROSS-FLOODING ARRANGEMENTS (Adopted on 4 June 203) (Adopted on 4 June 203) ANNEX 8 (Adopted on 4 June 203) MSC 92/26/Add. Annex 8, page THE MARITIME SAFETY COMMITTEE, RECALLING Article 28(b) o the Convention on the International

More information

The achievable limits of operational modal analysis. * Siu-Kui Au 1)

The achievable limits of operational modal analysis. * Siu-Kui Au 1) The achievable limits o operational modal analysis * Siu-Kui Au 1) 1) Center or Engineering Dynamics and Institute or Risk and Uncertainty, University o Liverpool, Liverpool L69 3GH, United Kingdom 1)

More information

The concept of limit

The concept of limit Roberto s Notes on Dierential Calculus Chapter 1: Limits and continuity Section 1 The concept o limit What you need to know already: All basic concepts about unctions. What you can learn here: What limits

More information

Power Spectral Analysis of Elementary Cellular Automata

Power Spectral Analysis of Elementary Cellular Automata Power Spectral Analysis o Elementary Cellular Automata Shigeru Ninagawa Division o Inormation and Computer Science, Kanazawa Institute o Technology, 7- Ohgigaoka, Nonoichi, Ishikawa 92-850, Japan Spectral

More information

Today. Introduction to optimization Definition and motivation 1-dimensional methods. Multi-dimensional methods. General strategies, value-only methods

Today. Introduction to optimization Definition and motivation 1-dimensional methods. Multi-dimensional methods. General strategies, value-only methods Optimization Last time Root inding: deinition, motivation Algorithms: Bisection, alse position, secant, Newton-Raphson Convergence & tradeos Eample applications o Newton s method Root inding in > 1 dimension

More information

(One Dimension) Problem: for a function f(x), find x 0 such that f(x 0 ) = 0. f(x)

(One Dimension) Problem: for a function f(x), find x 0 such that f(x 0 ) = 0. f(x) Solving Nonlinear Equations & Optimization One Dimension Problem: or a unction, ind 0 such that 0 = 0. 0 One Root: The Bisection Method This one s guaranteed to converge at least to a singularity, i not

More information

Fractals and Dimension

Fractals and Dimension Chapter 7 Fractals and Dimension Dimension We say that a smooth curve has dimension 1, a plane has dimension 2 and so on, but it is not so obvious at first what dimension we should ascribe to the Sierpinski

More information

CMSC 425: Lecture 11 Procedural Generation: Fractals and L-Systems

CMSC 425: Lecture 11 Procedural Generation: Fractals and L-Systems CMSC 425: Lecture 11 Procedural Generation: ractals and L-Systems Reading: The material on fractals comes from classic computer-graphics books. The material on L-Systems comes from Chapter 1 of The Algorithmic

More information

2 Frequency-Domain Analysis

2 Frequency-Domain Analysis 2 requency-domain Analysis Electrical engineers live in the two worlds, so to speak, o time and requency. requency-domain analysis is an extremely valuable tool to the communications engineer, more so

More information

arxiv:quant-ph/ v2 12 Jan 2006

arxiv:quant-ph/ v2 12 Jan 2006 Quantum Inormation and Computation, Vol., No. (25) c Rinton Press A low-map model or analyzing pseudothresholds in ault-tolerant quantum computing arxiv:quant-ph/58176v2 12 Jan 26 Krysta M. Svore Columbia

More information

An Alternative Poincaré Section for Steady-State Responses and Bifurcations of a Duffing-Van der Pol Oscillator

An Alternative Poincaré Section for Steady-State Responses and Bifurcations of a Duffing-Van der Pol Oscillator An Alternative Poincaré Section or Steady-State Responses and Biurcations o a Duing-Van der Pol Oscillator Jang-Der Jeng, Yuan Kang *, Yeon-Pun Chang Department o Mechanical Engineering, National United

More information

3. Several Random Variables

3. Several Random Variables . Several Random Variables. Two Random Variables. Conditional Probabilit--Revisited. Statistical Independence.4 Correlation between Random Variables. Densit unction o the Sum o Two Random Variables. Probabilit

More information

NONLINEAR CONTROL OF POWER NETWORK MODELS USING FEEDBACK LINEARIZATION

NONLINEAR CONTROL OF POWER NETWORK MODELS USING FEEDBACK LINEARIZATION NONLINEAR CONTROL OF POWER NETWORK MODELS USING FEEDBACK LINEARIZATION Steven Ball Science Applications International Corporation Columbia, MD email: sball@nmtedu Steve Schaer Department o Mathematics

More information

Figure 1: Bayesian network for problem 1. P (A = t) = 0.3 (1) P (C = t) = 0.6 (2) Table 1: CPTs for problem 1. (c) P (E B) C P (D = t) f 0.9 t 0.

Figure 1: Bayesian network for problem 1. P (A = t) = 0.3 (1) P (C = t) = 0.6 (2) Table 1: CPTs for problem 1. (c) P (E B) C P (D = t) f 0.9 t 0. Probabilistic Artiicial Intelligence Problem Set 3 Oct 27, 2017 1. Variable elimination In this exercise you will use variable elimination to perorm inerence on a bayesian network. Consider the network

More information

Approximative Methods for Monotone Systems of min-max-polynomial Equations

Approximative Methods for Monotone Systems of min-max-polynomial Equations Approximative Methods or Monotone Systems o min-max-polynomial Equations Javier Esparza, Thomas Gawlitza, Stean Kieer, and Helmut Seidl Institut ür Inormatik Technische Universität München, Germany {esparza,gawlitza,kieer,seidl}@in.tum.de

More information

Numerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods

Numerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods Numerical Methods - Lecture 1 Numerical Methods Lecture. Analysis o errors in numerical methods Numerical Methods - Lecture Why represent numbers in loating point ormat? Eample 1. How a number 56.78 can

More information

CHAPTER 8 ANALYSIS OF AVERAGE SQUARED DIFFERENCE SURFACES

CHAPTER 8 ANALYSIS OF AVERAGE SQUARED DIFFERENCE SURFACES CAPTER 8 ANALYSS O AVERAGE SQUARED DERENCE SURACES n Chapters 5, 6, and 7, the Spectral it algorithm was used to estimate both scatterer size and total attenuation rom the backscattered waveorms by minimizing

More information

Problem Set. Problems on Unordered Summation. Math 5323, Fall Februray 15, 2001 ANSWERS

Problem Set. Problems on Unordered Summation. Math 5323, Fall Februray 15, 2001 ANSWERS Problem Set Problems on Unordered Summation Math 5323, Fall 2001 Februray 15, 2001 ANSWERS i 1 Unordered Sums o Real Terms In calculus and real analysis, one deines the convergence o an ininite series

More information

ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS

ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS I. Thirunavukkarasu 1, V. I. George 1, G. Saravana Kumar 1 and A. Ramakalyan 2 1 Department o Instrumentation

More information

Categories and Natural Transformations

Categories and Natural Transformations Categories and Natural Transormations Ethan Jerzak 17 August 2007 1 Introduction The motivation or studying Category Theory is to ormalise the underlying similarities between a broad range o mathematical

More information

STAT 801: Mathematical Statistics. Hypothesis Testing

STAT 801: Mathematical Statistics. Hypothesis Testing STAT 801: Mathematical Statistics Hypothesis Testing Hypothesis testing: a statistical problem where you must choose, on the basis o data X, between two alternatives. We ormalize this as the problem o

More information

A Simple Explanation of the Sobolev Gradient Method

A Simple Explanation of the Sobolev Gradient Method A Simple Explanation o the Sobolev Gradient Method R. J. Renka July 3, 2006 Abstract We have observed that the term Sobolev gradient is used more oten than it is understood. Also, the term is oten used

More information

Midterm Exam Solutions February 27, 2009

Midterm Exam Solutions February 27, 2009 Midterm Exam Solutions February 27, 2009 (24. Deine each o the ollowing statements. You may assume that everyone knows the deinition o a topological space and a linear space. (4 a. X is a compact topological

More information

9.3 Graphing Functions by Plotting Points, The Domain and Range of Functions

9.3 Graphing Functions by Plotting Points, The Domain and Range of Functions 9. Graphing Functions by Plotting Points, The Domain and Range o Functions Now that we have a basic idea o what unctions are and how to deal with them, we would like to start talking about the graph o

More information

Review D: Potential Energy and the Conservation of Mechanical Energy

Review D: Potential Energy and the Conservation of Mechanical Energy MSSCHUSETTS INSTITUTE OF TECHNOLOGY Department o Physics 8. Spring 4 Review D: Potential Energy and the Conservation o Mechanical Energy D.1 Conservative and Non-conservative Force... D.1.1 Introduction...

More information

Thu June 16 Lecture Notes: Lattice Exercises I

Thu June 16 Lecture Notes: Lattice Exercises I Thu June 6 ecture Notes: attice Exercises I T. Satogata: June USPAS Accelerator Physics Most o these notes ollow the treatment in the class text, Conte and MacKay, Chapter 6 on attice Exercises. The portions

More information

Fluctuationlessness Theorem and its Application to Boundary Value Problems of ODEs

Fluctuationlessness Theorem and its Application to Boundary Value Problems of ODEs Fluctuationlessness Theorem and its Application to Boundary Value Problems o ODEs NEJLA ALTAY İstanbul Technical University Inormatics Institute Maslak, 34469, İstanbul TÜRKİYE TURKEY) nejla@be.itu.edu.tr

More information

Robust Residual Selection for Fault Detection

Robust Residual Selection for Fault Detection Robust Residual Selection or Fault Detection Hamed Khorasgani*, Daniel E Jung**, Gautam Biswas*, Erik Frisk**, and Mattias Krysander** Abstract A number o residual generation methods have been developed

More information

On High-Rate Cryptographic Compression Functions

On High-Rate Cryptographic Compression Functions On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48

More information

Improvement of Sparse Computation Application in Power System Short Circuit Study

Improvement of Sparse Computation Application in Power System Short Circuit Study Volume 44, Number 1, 2003 3 Improvement o Sparse Computation Application in Power System Short Circuit Study A. MEGA *, M. BELKACEMI * and J.M. KAUFFMANN ** * Research Laboratory LEB, L2ES Department o

More information

EXPANSIONS IN NON-INTEGER BASES: LOWER, MIDDLE AND TOP ORDERS

EXPANSIONS IN NON-INTEGER BASES: LOWER, MIDDLE AND TOP ORDERS EXPANSIONS IN NON-INTEGER BASES: LOWER, MIDDLE AND TOP ORDERS NIKITA SIDOROV To the memory o Bill Parry ABSTRACT. Let q (1, 2); it is known that each x [0, 1/(q 1)] has an expansion o the orm x = n=1 a

More information

9.1 The Square Root Function

9.1 The Square Root Function Section 9.1 The Square Root Function 869 9.1 The Square Root Function In this section we turn our attention to the square root unction, the unction deined b the equation () =. (1) We begin the section

More information

Probabilistic Model of Error in Fixed-Point Arithmetic Gaussian Pyramid

Probabilistic Model of Error in Fixed-Point Arithmetic Gaussian Pyramid Probabilistic Model o Error in Fixed-Point Arithmetic Gaussian Pyramid Antoine Méler John A. Ruiz-Hernandez James L. Crowley INRIA Grenoble - Rhône-Alpes 655 avenue de l Europe 38 334 Saint Ismier Cedex

More information

Finger Search in the Implicit Model

Finger Search in the Implicit Model Finger Search in the Implicit Model Gerth Stølting Brodal, Jesper Sindahl Nielsen, Jakob Truelsen MADALGO, Department o Computer Science, Aarhus University, Denmark. {gerth,jasn,jakobt}@madalgo.au.dk Abstract.

More information

In the index (pages ), reduce all page numbers by 2.

In the index (pages ), reduce all page numbers by 2. Errata or Nilpotence and periodicity in stable homotopy theory (Annals O Mathematics Study No. 28, Princeton University Press, 992) by Douglas C. Ravenel, July 2, 997, edition. Most o these were ound by

More information

OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION

OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION Xu Bei, Yeo Jun Yoon and Ali Abur Teas A&M University College Station, Teas, U.S.A. abur@ee.tamu.edu Abstract This paper presents

More information

What the No Free Lunch Theorems Really Mean; How to Improve Search Algorithms

What the No Free Lunch Theorems Really Mean; How to Improve Search Algorithms What the No Free Lunch Theorems Really Mean; How to Improve Search Algorithms David H. Wolpert SFI WORKING PAPER: 2012-10-017 SFI Working Papers contain accounts o scientiic work o the author(s) and do

More information

Exponential and Logarithmic. Functions CHAPTER The Algebra of Functions; Composite

Exponential and Logarithmic. Functions CHAPTER The Algebra of Functions; Composite CHAPTER 9 Exponential and Logarithmic Functions 9. The Algebra o Functions; Composite Functions 9.2 Inverse Functions 9.3 Exponential Functions 9.4 Exponential Growth and Decay Functions 9.5 Logarithmic

More information

2.6 Two-dimensional continuous interpolation 3: Kriging - introduction to geostatistics. References - geostatistics. References geostatistics (cntd.

2.6 Two-dimensional continuous interpolation 3: Kriging - introduction to geostatistics. References - geostatistics. References geostatistics (cntd. .6 Two-dimensional continuous interpolation 3: Kriging - introduction to geostatistics Spline interpolation was originally developed or image processing. In GIS, it is mainly used in visualization o spatial

More information

Numerical Solution of Ordinary Differential Equations in Fluctuationlessness Theorem Perspective

Numerical Solution of Ordinary Differential Equations in Fluctuationlessness Theorem Perspective Numerical Solution o Ordinary Dierential Equations in Fluctuationlessness Theorem Perspective NEJLA ALTAY Bahçeşehir University Faculty o Arts and Sciences Beşiktaş, İstanbul TÜRKİYE TURKEY METİN DEMİRALP

More information

Rigorous pointwise approximations for invariant densities of non-uniformly expanding maps

Rigorous pointwise approximations for invariant densities of non-uniformly expanding maps Ergod. Th. & Dynam. Sys. 5, 35, 8 44 c Cambridge University Press, 4 doi:.7/etds.3.9 Rigorous pointwise approximations or invariant densities o non-uniormly expanding maps WAEL BAHSOUN, CHRISTOPHER BOSE

More information

Simpler Functions for Decompositions

Simpler Functions for Decompositions Simpler Functions or Decompositions Bernd Steinbach Freiberg University o Mining and Technology, Institute o Computer Science, D-09596 Freiberg, Germany Abstract. This paper deals with the synthesis o

More information

Estimation and detection of a periodic signal

Estimation and detection of a periodic signal Estimation and detection o a periodic signal Daniel Aronsson, Erik Björnemo, Mathias Johansson Signals and Systems Group, Uppsala University, Sweden, e-mail: Daniel.Aronsson,Erik.Bjornemo,Mathias.Johansson}@Angstrom.uu.se

More information

Basic properties of limits

Basic properties of limits Roberto s Notes on Dierential Calculus Chapter : Limits and continuity Section Basic properties o its What you need to know already: The basic concepts, notation and terminology related to its. What you

More information

Discrete Mathematics. On the number of graphs with a given endomorphism monoid

Discrete Mathematics. On the number of graphs with a given endomorphism monoid Discrete Mathematics 30 00 376 384 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: www.elsevier.com/locate/disc On the number o graphs with a given endomorphism monoid

More information

Irregularities and Scaling in Signal and Image Processing: Multifractal Analysis

Irregularities and Scaling in Signal and Image Processing: Multifractal Analysis Irregularities and Scaling in Signal and Image Processing: Multiractal Analysis P. Abry, S. Jaard, H. Wendt November 7, Abstract: B. Mandelbrot gave a new birth to the notions o scale invariance, selsimilarity

More information

Published in the American Economic Review Volume 102, Issue 1, February 2012, pages doi: /aer

Published in the American Economic Review Volume 102, Issue 1, February 2012, pages doi: /aer Published in the American Economic Review Volume 102, Issue 1, February 2012, pages 594-601. doi:10.1257/aer.102.1.594 CONTRACTS VS. SALARIES IN MATCHING FEDERICO ECHENIQUE Abstract. Firms and workers

More information

Solving Monotone Polynomial Equations

Solving Monotone Polynomial Equations Solving Monotone Polynomial Equations Javier Esparza, Stean Kieer, and Michael Luttenberger Institut ür Inormatik, Technische Universität München, 85748 Garching, Germany {esparza,kieer,luttenbe}@in.tum.de

More information

Introduction to Simulation - Lecture 2. Equation Formulation Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy

Introduction to Simulation - Lecture 2. Equation Formulation Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Introduction to Simulation - Lecture Equation Formulation Methods Jacob White Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Outline Formulating Equations rom Schematics Struts and Joints

More information

An Ensemble Kalman Smoother for Nonlinear Dynamics

An Ensemble Kalman Smoother for Nonlinear Dynamics 1852 MONTHLY WEATHER REVIEW VOLUME 128 An Ensemble Kalman Smoother or Nonlinear Dynamics GEIR EVENSEN Nansen Environmental and Remote Sensing Center, Bergen, Norway PETER JAN VAN LEEUWEN Institute or Marine

More information

Physics 2B Chapter 17 Notes - First Law of Thermo Spring 2018

Physics 2B Chapter 17 Notes - First Law of Thermo Spring 2018 Internal Energy o a Gas Work Done by a Gas Special Processes The First Law o Thermodynamics p Diagrams The First Law o Thermodynamics is all about the energy o a gas: how much energy does the gas possess,

More information

Finite Dimensional Hilbert Spaces are Complete for Dagger Compact Closed Categories (Extended Abstract)

Finite Dimensional Hilbert Spaces are Complete for Dagger Compact Closed Categories (Extended Abstract) Electronic Notes in Theoretical Computer Science 270 (1) (2011) 113 119 www.elsevier.com/locate/entcs Finite Dimensional Hilbert Spaces are Complete or Dagger Compact Closed Categories (Extended bstract)

More information

BANDELET IMAGE APPROXIMATION AND COMPRESSION

BANDELET IMAGE APPROXIMATION AND COMPRESSION BANDELET IMAGE APPOXIMATION AND COMPESSION E. LE PENNEC AND S. MALLAT Abstract. Finding eicient geometric representations o images is a central issue to improve image compression and noise removal algorithms.

More information

Received: 30 July 2017; Accepted: 29 September 2017; Published: 8 October 2017

Received: 30 July 2017; Accepted: 29 September 2017; Published: 8 October 2017 mathematics Article Least-Squares Solution o Linear Dierential Equations Daniele Mortari ID Aerospace Engineering, Texas A&M University, College Station, TX 77843, USA; mortari@tamu.edu; Tel.: +1-979-845-734

More information

Maximum Flow. Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai

Maximum Flow. Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai Maximum Flow Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai Flow Network A low network G ( V, E) is a directed graph with a source node sv, a sink node tv, a capacity unction c. Each edge ( u,

More information

On the Correspondence of Contracts to Salaries in (Many-to-Many) Matching

On the Correspondence of Contracts to Salaries in (Many-to-Many) Matching On the Correspondence o Contracts to Salaries in (Many-to-Many) Matching Scott Duke Kominers 1, Becker Friedman Institute or Research in Economics, University o Chicago Abstract In this note, I extend

More information

Gaussian Process Regression Models for Predicting Stock Trends

Gaussian Process Regression Models for Predicting Stock Trends Gaussian Process Regression Models or Predicting Stock Trends M. Todd Farrell Andrew Correa December 5, 7 Introduction Historical stock price data is a massive amount o time-series data with little-to-no

More information

Multi-Row Cuts in Integer Programming. Tepper School of Business Carnegie Mellon University, Pittsburgh

Multi-Row Cuts in Integer Programming. Tepper School of Business Carnegie Mellon University, Pittsburgh Multi-Row Cuts in Integer Programming Gérard Cornuéjols Tepper School o Business Carnegie Mellon University, Pittsburgh March 2011 Mixed Integer Linear Programming min s.t. cx Ax = b x j Z or j = 1,...,

More information

Analytical expressions for field astigmatism in decentered two mirror telescopes and application to the collimation of the ESO VLT

Analytical expressions for field astigmatism in decentered two mirror telescopes and application to the collimation of the ESO VLT ASTRONOMY & ASTROPHYSICS MAY II 000, PAGE 57 SUPPLEMENT SERIES Astron. Astrophys. Suppl. Ser. 44, 57 67 000) Analytical expressions or ield astigmatism in decentered two mirror telescopes and application

More information