A Faster Randomized Algorithm for Root Counting in Prime Power Rings

Size: px
Start display at page:

Download "A Faster Randomized Algorithm for Root Counting in Prime Power Rings"

Transcription

1 A Faster Randomized Algorithm or Root Counting in Prime Power Rings Leann Kopp and Natalie Randall July 17, 018 Abstract Let p be a prime and Z[x] a polynomial o degree d such that is not identically zero mod p. We introduce a Las Vegas randomized algorithm to count the number o roots o in Z/(p k ) or k N with k which runs in time d 1.5+o(1) (log p) +o(1) 1.1 k. We compare the randomized algorithm to simple brute orce to see when we have practical time gains. In addition, we present an upper bound on the number o roots o (as a unction o p, k, and the degree o ) that is optimal or k =. 1 Introduction A deterministic algorithm or counting roots in Z/(p k ) in time (dlog(p) + t ) O(1) is given in []. Here we propose a Las Vegas randomized algorithm which runs in time d 1.5+o(1) (log p) +o(1) 1.1 k. By Las Vegas randomized, we mean that our algorithm undercounts roots with a ixed error probability but otherwise returns a correct root count and always correctly announces ailure. For instance, i we take our ixed error probability to be 1, we can get an overall 3 ailure probability o less than 1 by running the algorithm 100 times. Las Vegas randomized algorithms are common across algorithmic number theory; there are ast, widely accepted Las Vegas randomized algorithms or checking primality and or actoring polynomials over inite ields [1, 3, 4]. In our algorithm, we introduce randomization by using ast actorization (see [3]) to ind roots o in Z/(p). Prior to the deterministic algorithm in [] there was little inormation on counting the roots o a polynomial over prime power rings. We can easily count the number o roots o a polynomial in Z/(p) by taking the degree o gcd(x p x, ), but this method relies on Z/(p) being a unique actorization domain, and Z/(p k ) is not a unique actorization domain or k > 1. To overcome this issue, we consider the Taylor expansion o our polynomial about a root ζ o the mod p reduction o with a perturbation o pε, where ε {0,..., p k 1}. From this expansion, we can divide by certain powers o p in order to recursively isolate the roots o in the ring Z/(p k ). From a similar expansion, we also get an upper bound or the number o roots o in Z/(p k ) given by min{d, p}p k 1 and a sharp upper bound or k = given by min{ d, p}pk 1 + (d mod ). Background and Randomized Algorithm Lemma.1 (Hensel s Lemma). I Z[x] is a polynomial with integer coeicients, p is prime, and ζ J {0,..., p J 1 1} is a root o (mod p J ) and (ζ J ) 0 (mod p), then there is a unique ζ {0,..., p J+1 1} with (ζ) = 0 (mod p J+1 ) and ζ = ζ J (mod p J ). 1

2 We will see below that we can use Hensel s Lemma to determine the number o lits o a root ζ i with s(i, ζ i ) = 1. Consider the expansion o given by (ζ + pε) = (ζ) + (ζ)pε + + p min(d,k 1) ε min(d,k 1) mod p k, where ζ is a root o the mod p reduction o. Let s {1,..., k} be the maximal integer such that p s divides each o (ζ), (ζ)p,..., min(d,k 1)(ζ) p min(d,k 1). More precisely, s = min{ord p ((ζ)), ord p ( (ζ)p),..., ord p ( min(d,k 1)(ζ) p min(d,k 1) )}, where ord p (x) reers to the p-adic valuation o x. I (ζ + pε) = 0 (mod p k ), then we can write p s ( (ζ) + (ζ) ε + + ε min(d,k 1) ) = 0 mod p k, p s p s 1 (p s min(d,k 1) which is true i and only i (ζ) p s + (ζ) ε + + ε min(d,k 1) = 0 mod p k s. p s 1 (p s min(d,k 1) In the case where s = 1, i (ζ) = 0 mod p then we must have that p (ζ) and so ζ has no lits mod p k ; however, i (ζ) 0 mod p, then ζ lits to one unique root by Hensel s Lemma. In the case where s = k, the entire expression p s ( (ζ) + (ζ) ε+ + ε min(d,k 1) ) p s p s 1 (p s min(d,k 1) vanishes identically mod p k, so any ε {0,..., p k 1 } is a zero o (ζ + pε) and thereore we have that ζ has p k 1 lits. The key idea o the randomized algorithm is that counting the number o roots when s = 1 and s = k is simple, as described above, and we can reduce all the computations to these two cases using recursion. I s {,..., k 1}, we can reapply the algorithm to an + (ζ) (p s min(d,k 1) ε min(d,k 1) instance o counting roots or the polynomial (ζ) ε + + p s p s 1 in Z/(p k s ). Eventually this will reduce to the case where either s = 1 or s = k and the recursion will terminate, giving us that the root ζ o mod p has a total number o p s 1 (the number o roots o (ζ) + (ζ) ε + + ε min(d,k 1) mod p k s ) lits to roots p s p s 1 (p s min(d,k 1) in Z/(p k ). Algorithm 1 Randomized Prime Power Root Counting 1: unction count( Z[x] has degree d and is not identically 0 mod p, prime p, k N such that k ) : Factor as in [3] 3: count := number o distinct linear actors o multiplicity 1 These roots in Z/(p) can be lited uniquely to roots in Z/(p k ). 4: Push {ζ 0 {0,..., p 1} (ζ 0 ) = (ζ 0 ) = 0 mod p and (ζ 0 ) = 0 mod p } onto a stack S 5: while S 0 do 6: Pop a root ζ 0 rom the stack and deine s(0, ζ 0 ) := maximal integer such that p s(0,ζ 0) divides each o (ζ 0 ), (z 0 )pε,..., min(d,k 1)(ζ 0 ) p min(d,k 1) 7: i s(0, ζ 0 ) = k then 8: count count + p k 1 9: else 10: Deine ζ0 (x) := 1 (ζ p s(0,ζ 0 ) 0 + px) 11: count count + p s(0,ζ0) 1 count( ζ0 (x), p, k s(0, ζ 0 )) 1: end i 13: end while 14: return count 15: end unction

3 Since the non-degenerate roots o the mod p reduction o have a unique lit by Hensel s Lemma, we only need to keep track o the degenerate roots. Our recurrence takes a degenerate root ζ 0 as a point in a cluster o roots o in Z/(p k ) and recovers the other points in this cluster by expanding ζ 0 to more digits base-p. In this way, we count the number o roots o in Z/(p k ) by counting the number o lits rom each root ζ i o in Z/(p). 3 Discussion o Complexity Bound and Experimental Data d non-degenerate roots o mod p d 1 non-degenerate roots o ζ1 (ε) mod p ζ1 (ε) p s(i,ζ i) ζ1 identically zero mod p k p k 1 d non-degenerate roots o ζ (ε) mod p ζ (ε) p s(i,ζ i) ζ1 identically zero mod p k p k 1 d l non-degenerate roots o ζ1 (ε) mod p ζl (ε) Figure 1: Diagram o complexity tree In the Figure 1, we see the basic tree structure o the algorithm. We need only keep track o the degenerate roots o ; the degenerate roots o, denoted by ζ i, become the children 3

4 nodes rom which more branching occurs. The depth and branching o our recurrence tree is strongly limited by the value o k and the degree o. For the initial parent node, the total number o degenerate roots is less than or equal to d, and or each subsequent child node, the total number o degenerate roots is less than or equal to s(i,ζ i) d ζi. Non-degenerate roots have a unique lit by Hensel s Lemma, so non-degenerate roots require no additional computations and are thereore shown on the let o the tree. We also see that we have a maximum o s(1, ζ 1 ) s(l, ζ l ) nodes at the bottom level o the tree. We use Kedlaya-Umans ast Z/(p)[x] actoring algorithm ound in [3], which takes time d 1.5+o(1) (log p) 1+o(1) + d 1+o(1) (log p) +o(1) or a degree d polynomial, in order to actor the polynomials at each node in Z/(p). In simplest terms, we can consider our total complexity as being less than or equal to (the number o nodes in the recursion tree) (the complexity o actoring over Z/(p)[x]). Optimizing parameters, the worst case occurs when d e.7188 and the depth o the tree is k. The inal complexity o the randomized algorithm is given by e (d 1.5 log p) 1+o(1) + (d log p) 1+o(1) + [(min{d, k 1} 1.5 log p) 1+o(1) + (min{d, k 1} log p) 1+o(1) ](e/) k/e, where (e/) k/e 1.1 k. Based on this complexity bound, we expect to see time improvements even or p as small as when compared to brute-orce counting since brute-orce counting takes time approximately p k, giving us that brute-orce takes time approximately k or p =, while the randomized algorithm takes time approximately 1.1 k. More details regarding computational time with p = are given in Tables 1 and. We now present computational data which illustrates the advantages to using the randomized algorithm over the brute orce method. The brute orce method takes a polynomial, a prime p, and a power k, and evaluates at each value i rom 0 to p k 1. I (i) is identically equal to 0 (mod p k ), then that contributes to the total number o roots o Z/(p k ). We start by comparing the run times o the brute orce algorithm and the randomized algorithm or p =. Table 1 displays the average dierence in computation time or the number o roots o 100 random polynomials o degree less than or equal to 100 in Z/( k ) or the given k, between brute orce and the randomized algorithm (negative implies brute orce was aster). The times are shown in seconds. In general, a single computation took less than a second, so dierences in the milliseconds are not insigniicant. From the table, we see a switch rom brute-orce being more eicient to the randomized algorithm being more eicient at k = 10, and the dierence becomes more pronounced as k increases. k Avg Di (in seconds) Table 1: Average Dierence in Run Times or 100 random polynomials with p =, taken as (time o bruteorce)-(time o randomized algorithm) 4

5 p k Brute Force Randomized Algorithm 71x 4 + 1x 3 84x 47x ns 0 ns 1x 5 66x 4 4x 3 88x 17x ns µs 75x 6 + 8x 5 93x 4 19x 3 + 3x µs µs x 7 + x 6 + 6x 5 3x 3 58x µs µs 48x 8 3x x 5 19x x ms µs 80x 8 37x 7 89x x 3 + 3x ms 0 ns 5x x 6 75x 5 + 3x 3 7x 38x ms 3.00 ms 61x 10 80x 9 17x 6 90x x ms.00 ms 18x x x x 5 64x ms.00 ms 89x 1 56x x 5 x x x ms 6.00 ms 93x 10 36x x 5 78x 4 67x ms.00 ms Table : Run times or 5 k 15, d < k 1 Table shows the dierence in computational time with speciic examples, giving an idea o the overall time it takes or both the randomized algorithm and brute-orce to run when p =. The dierence in computational run time becomes more noticeable when we introduce larger primes. p k Brute Force Randomized Algorithm 44x x 83 17x 67 75x 49 10x sec 11.00ms 10x x 8 51x x x 48 + x min µs 15x 99 59x 74 96x 9 + 7x 8 87x x hours µs Table 3: Run times or p with at least 3 digits Table 3 illustrates the advantages o using the randomized algorithm over brute-orce or computations involving large prime numbers. Table 4 displays the run times or the randomized algorithm or prime numbers with at least our digits. We begin to see a very signiicant dierence between brute orce and the randomized algorithm or large primes; it took the brute orce method almost 4 hours to count the number o roots o a polynomial in Z/(p k ) when p was a 4 digit prime number, while the randomized algorithm counted the roots o a polynomial in Z/(p k ) when p was a 9 digit prime in approximately a minute and a hal. p k t 56x x 64 x x x x ms 53x 94 78x 37 67x x 6 5x 9 36x ms 55x 98 49x x 60 3x x x ms 35x x 84 14x 56 9x 54 90x 7 3x ms 6x 78 31x x x 16 80x 6 51x s 40x 90 10x x 69 40x 41 8x 36 8x s 80x 87 7x x x x x s Table 4: Run times or the randomized algorithm when p has 4 digits 5

6 We expect the randomized algorithm to take the longest when a polynomial has many degenerate roots because a polynomial o this type will require many recursive calls. Polynomials with many degenerate roots do take longer than a random polynomial, but overall the randomized algorithm still outperorms other methods. For instance, counting roots o the 55 degree polynomial (x 1)(x ) (x 10) 10 in Z/(31 10 ) took 6.4 seconds using the randomized algorithm, while counting roots in the same ring with a random polynomial o the same degree took only 1 millisecond. Despite this slowdown or polynomials with very degenerate roots, the randomized algorithm still outperorms other methods; counting roots o a polynomial in just Z/(31 6 ) using brute orce took.7 hours. 4 Bound on Number o Roots Lemma 4.1. I a root ζ o the mod p reduction o has multiplicity j, then s ζ j, where s ζ is the greatest integer such that p s ζ divides each o (ζ),..., (k 1) (ζ) p k 1 ε k 1. (k 1)! Proo. I ζ has multiplicity j, then (ζ) = = j 1 (ζ) = 0 (mod p), but (j) (ζ) 0 (mod p). So j (ζ) j! p j is divisible by p j but not p j+1 and thereore s ζ j. Theorem 4.. Let p be a prime, Z[x] a polynomial o degree d, and k N such that d k. Then N (p, d, k) min{d, p}p k 1, where N (p, d, k) denotes the number o roots o in Z/(p k ). Proo. Let ζ i {0,..., p 1} be any root o the mod p reduction o, and let s(i, ζ i ) be the greatest integer such that p s(i,ζi) divides each o (ζ i ),..., min(d,k 1) (ζ i ) p k 1. Set ζi (x) = 1 (ζ p s(i,ζ i i + px). Clearly, we have that N (p, d, 1) min{d, p}. We know rom Lemma 4.1 that i ζ i Z/(p) is a root o multiplicity J, then J s. Let δ 1 denote the number o non-degenerate roots o mod p. From this, we see that N (p, d, k) δ 1 + min(d,k 1) J= ζ i with s(i,ζ i )=J ps(i,ζ i) 1 N ζi (p, k 1, k s(i, ζ i )) + ζ i with s(i,ζ i )=k pk 1. Considering that N ζi (p, k 1, k s(i, ζ i )) p k s(i,ζi), we get N (p, d, k) min(d,k 1) J=1 ζ i with s(i,ζ i )=J ps(i,ζ i) 1 p k s(i,ζi) + ζ i with s(i,ζ i )=k pk 1, N (p, d, k) min(d,k 1) J=1 ζ i with s(i,ζ i )=J pk 1 + ζ i with s(i,ζ i )=k pk 1, N (p, d, k) k J=1 ζ i with s(i,ζ i )=J pk 1. Since the number o distinct roots o the mod p reduction o is less than min{d, p}, we get that N (p, d, k) min{d, p}p k 1, as desired. Examples o polynomials with more than d k pk 1 roots are given below. These examples show that our bound is within a actor o k o optimality when d p. Example 4.3. (x ) 7 (x 1) 3 with p = 17, k = 7 has 4, 1, 090 roots, which is greater than d k pk 1 = 4, 137, 569. Example 4.4. (x 1) k x has p k roots when d = k + 1 p. The ollowing examples show that we can have p k roots when d p. Example 4.5. (x p x) k is a polynomial o degree pk with p k roots in Z/(p k ). Example 4.6. (x pk p k 1 1)x k has degree p k p k 1 + k and also vanishes on all o Z/(p k ). 6

7 Theorem 4.7. Let p be a prime and Z[x] a polynomial o degree d such that d. Then the number o roots o in Z/(p ) is less than or equal to min{ d, p}p + (d mod k), and this bound is sharp. Proo. Let ζ i {0,..., p 1} be any root o the mod p reduction o, and let s(i, ζ i ) be the greatest integer such that p s(i,ζi) divides each o (ζ i ),..., min(d,k 1) (ζ i ) p k 1. Let δ 1 denote the number o roots o in Z/(p) with s(i, ζ i ) = 1, and let δ denote the number o roots o in Z/(p) with s(i, ζ i ) =. We know that δ 1 + δ d and that δ d by Lemma 4.1. Using this, N (p, d, ) δ 1 + pδ, N (p, d, ) (d δ ) + pδ, N (p, d, ) (d d ) + d p, N (p, d, ) d p + (d mod ). To show that this bound is sharp, we give several examples below or which this bound equals the number o roots o in Z/(p ). Example 4.8. With p = 5, the degree 3 polynomial (x 1) x has (3 mod ) = 6 roots in Z/(p ). Example 4.9. In general, or i, j Z/(p) such that i j, the polynomial (x i) (x j) has d p + (d mod ) roots in Z/(p ) when d and d p. 5 Acknowledgements We would like to thank our advisor, Dr. J. Maurice Rojas, or his assistance and guidance; we would also like to thank Yuyu Zhu or all the suggestions and advice she gave us. We also thank Texas A&M University or hosting and the National Science Foundation (NSF) or unding this program. Reerences [1] Eric Bach and Je Shallit, Algorithmic Number Theory, Vol. 1: Eicient Algorithms, MIT Press, Cambridge, MA, [] Qi Cheng; Shuhong Gao; J. Maurice Rojas; and Daqing Wan, Counting Roots or Polynomials Modulo Prime Powers, Proceedings o ANTS XIII (Algorithmic Number Theory Symposium, July 160, 018, University o Wisconsin, Madison), to appear. [3] Kiran Kedlaya and Christopher Umans, Fast polynomial actorization and modular composition, SIAM J. Comput., 40 (011), no. 6, pp [4] Qi Cheng, Primality Proving via One Round in ECPP and One Iteration in AKS, Journal o Cryptology, July 007, Volume 0, Issue 3, pp [5] Ivan Niven; Herbert S. Zuckerman; and Hugh L. Montgomery, An Introduction to the Theory o Numbers. John Wily & Sons, Inc.,

RANDOMIZED POLYNOMIAL-TIME ROOT COUNTING IN PRIME POWER RINGS

RANDOMIZED POLYNOMIAL-TIME ROOT COUNTING IN PRIME POWER RINGS RANDOMIZED POLYNOMIAL-TIME ROOT COUNTING IN PRIME POWER RINGS LEANN KOPP, NATALIE RANDALL, J. MAURICE ROJAS, AND YUYU ZHU Abstract. Suppose k,p N with p prime and f Z[x] is a univariate polynomial with

More information

COUNTING ROOTS FOR POLYNOMIALS MODULO PRIME POWERS

COUNTING ROOTS FOR POLYNOMIALS MODULO PRIME POWERS COUNTING ROOTS FOR POLYNOMIALS MODULO PRIME POWERS QI CHENG, SHUHONG GAO, J. MAURICE ROJAS, AND DAQING WAN Abstract. Suppose p is a prime, t is a positive integer, and f Z[x] is a univariate polynomial

More information

arxiv: v1 [math.nt] 3 Nov 2017

arxiv: v1 [math.nt] 3 Nov 2017 COUNTING ROOTS OF POLYNOMIALS OVER PRIME POWER RINGS QI CHENG, SHUHONG GAO, J. MAURICE ROJAS, AND DAQING WAN arxiv:1711.01355v1 [math.nt] 3 Nov 2017 Abstract. Suppose p is a prime, t is a positive integer,

More information

CS220/MATH320 Applied Discrete Math Fall 2018 Instructor: Marc Pomplun. Assignment #3. Sample Solutions

CS220/MATH320 Applied Discrete Math Fall 2018 Instructor: Marc Pomplun. Assignment #3. Sample Solutions CS22/MATH2 Applied Discrete Math Fall 28 Instructor: Marc Pomplun Assignment # Sample Solutions Question : The Boston Powerlower Botanists at UMass Boston recently discovered a new local lower species

More information

Supplementary material for Continuous-action planning for discounted infinite-horizon nonlinear optimal control with Lipschitz values

Supplementary material for Continuous-action planning for discounted infinite-horizon nonlinear optimal control with Lipschitz values Supplementary material or Continuous-action planning or discounted ininite-horizon nonlinear optimal control with Lipschitz values List o main notations x, X, u, U state, state space, action, action space,

More information

Chapter 6 Reliability-based design and code developments

Chapter 6 Reliability-based design and code developments Chapter 6 Reliability-based design and code developments 6. General Reliability technology has become a powerul tool or the design engineer and is widely employed in practice. Structural reliability analysis

More information

MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES

MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES 2018 57 5. p-adic Numbers 5.1. Motivating examples. We all know that 2 is irrational, so that 2 is not a square in the rational field Q, but that we can

More information

On Newton-Raphson iteration for multiplicative inverses modulo prime powers

On Newton-Raphson iteration for multiplicative inverses modulo prime powers On Newton-Raphson iteration for multiplicative inverses modulo prime powers Jean-Guillaume Dumas To cite this version: Jean-Guillaume Dumas. On Newton-Raphson iteration for multiplicative inverses modulo

More information

Postmodern Primality Proving

Postmodern Primality Proving Preda Mihăilescu (University of Göttingen) Postmodern Primality Proving June 28, 2013 1 / 29 Postmodern Primality Proving Preda Mihăilescu Mathematical Institute, University of Göttingen, Germany June

More information

Objectives. By the time the student is finished with this section of the workbook, he/she should be able

Objectives. By the time the student is finished with this section of the workbook, he/she should be able FUNCTIONS Quadratic Functions......8 Absolute Value Functions.....48 Translations o Functions..57 Radical Functions...61 Eponential Functions...7 Logarithmic Functions......8 Cubic Functions......91 Piece-Wise

More information

A NOTE ON HENSEL S LEMMA IN SEVERAL VARIABLES

A NOTE ON HENSEL S LEMMA IN SEVERAL VARIABLES PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 125, Number 11, November 1997, Pages 3185 3189 S 0002-9939(97)04112-9 A NOTE ON HENSEL S LEMMA IN SEVERAL VARIABLES BENJI FISHER (Communicated by

More information

Modular Counting of Rational Points over Finite Fields

Modular Counting of Rational Points over Finite Fields Modular Counting of Rational Points over Finite Fields Daqing Wan Department of Mathematics University of California Irvine, CA 92697-3875 dwan@math.uci.edu Abstract Let F q be the finite field of q elements,

More information

Finding all Bessel type solutions for Linear Differential Equations with Rational Function Coefficients

Finding all Bessel type solutions for Linear Differential Equations with Rational Function Coefficients Finding all essel type solutions or Linear Dierential Equations with Rational Function Coeicients Mark van Hoeij & Quan Yuan Florida State University, Tallahassee, FL 06-07, USA hoeij@math.su.edu & qyuan@math.su.edu

More information

Numerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods

Numerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods Numerical Methods - Lecture 1 Numerical Methods Lecture. Analysis o errors in numerical methods Numerical Methods - Lecture Why represent numbers in loating point ormat? Eample 1. How a number 56.78 can

More information

On High-Rate Cryptographic Compression Functions

On High-Rate Cryptographic Compression Functions On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48

More information

2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction

2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction . ETA EVALUATIONS USING WEBER FUNCTIONS Introduction So ar we have seen some o the methods or providing eta evaluations that appear in the literature and we have seen some o the interesting properties

More information

Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields

Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields 1 / 27 Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields Jingguo Bi Institute for Advanced Study Tsinghua University Beijing, China October, 2014 Vienna, Austria This is a joint work

More information

VALUATIVE CRITERIA FOR SEPARATED AND PROPER MORPHISMS

VALUATIVE CRITERIA FOR SEPARATED AND PROPER MORPHISMS VALUATIVE CRITERIA FOR SEPARATED AND PROPER MORPHISMS BRIAN OSSERMAN Recall that or prevarieties, we had criteria or being a variety or or being complete in terms o existence and uniqueness o limits, where

More information

A PROBABILISTIC POWER DOMAIN ALGORITHM FOR FRACTAL IMAGE DECODING

A PROBABILISTIC POWER DOMAIN ALGORITHM FOR FRACTAL IMAGE DECODING Stochastics and Dynamics, Vol. 2, o. 2 (2002) 6 73 c World Scientiic Publishing Company A PROBABILISTIC POWER DOMAI ALGORITHM FOR FRACTAL IMAGE DECODIG V. DRAKOPOULOS Department o Inormatics and Telecommunications,

More information

( x) f = where P and Q are polynomials.

( x) f = where P and Q are polynomials. 9.8 Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm ( ) ( ) ( ) P where P and Q are polynomials. Q An eample o a simple rational

More information

The primitive root theorem

The primitive root theorem The primitive root theorem Mar Steinberger First recall that if R is a ring, then a R is a unit if there exists b R with ab = ba = 1. The collection of all units in R is denoted R and forms a group under

More information

Finger Search in the Implicit Model

Finger Search in the Implicit Model Finger Search in the Implicit Model Gerth Stølting Brodal, Jesper Sindahl Nielsen, Jakob Truelsen MADALGO, Department o Computer Science, Aarhus University, Denmark. {gerth,jasn,jakobt}@madalgo.au.dk Abstract.

More information

APPENDIX 1 ERROR ESTIMATION

APPENDIX 1 ERROR ESTIMATION 1 APPENDIX 1 ERROR ESTIMATION Measurements are always subject to some uncertainties no matter how modern and expensive equipment is used or how careully the measurements are perormed These uncertainties

More information

RATIONAL FUNCTIONS. Finding Asymptotes..347 The Domain Finding Intercepts Graphing Rational Functions

RATIONAL FUNCTIONS. Finding Asymptotes..347 The Domain Finding Intercepts Graphing Rational Functions RATIONAL FUNCTIONS Finding Asymptotes..347 The Domain....350 Finding Intercepts.....35 Graphing Rational Functions... 35 345 Objectives The ollowing is a list o objectives or this section o the workbook.

More information

Finite Dimensional Hilbert Spaces are Complete for Dagger Compact Closed Categories (Extended Abstract)

Finite Dimensional Hilbert Spaces are Complete for Dagger Compact Closed Categories (Extended Abstract) Electronic Notes in Theoretical Computer Science 270 (1) (2011) 113 119 www.elsevier.com/locate/entcs Finite Dimensional Hilbert Spaces are Complete or Dagger Compact Closed Categories (Extended bstract)

More information

Binomial coefficients and k-regular sequences

Binomial coefficients and k-regular sequences Binomial coefficients and k-regular sequences Eric Rowland Hofstra University New York Combinatorics Seminar CUNY Graduate Center, 2017 12 22 Eric Rowland Binomial coefficients and k-regular sequences

More information

Math 216A. A gluing construction of Proj(S)

Math 216A. A gluing construction of Proj(S) Math 216A. A gluing construction o Proj(S) 1. Some basic deinitions Let S = n 0 S n be an N-graded ring (we ollows French terminology here, even though outside o France it is commonly accepted that N does

More information

VALUATIVE CRITERIA BRIAN OSSERMAN

VALUATIVE CRITERIA BRIAN OSSERMAN VALUATIVE CRITERIA BRIAN OSSERMAN Intuitively, one can think o separatedness as (a relative version o) uniqueness o limits, and properness as (a relative version o) existence o (unique) limits. It is not

More information

The 2nd Texas A&M at Galveston Mathematics Olympiad. September 24, Problems & Solutions

The 2nd Texas A&M at Galveston Mathematics Olympiad. September 24, Problems & Solutions nd Math Olympiad Solutions Problem #: The nd Teas A&M at Galveston Mathematics Olympiad September 4, 00 Problems & Solutions Written by Dr. Lin Qiu A runner passes 5 poles in 30 seconds. How long will

More information

Generalization of Hensel lemma: nding of roots of p-adic Lipschitz functions

Generalization of Hensel lemma: nding of roots of p-adic Lipschitz functions Generalization of Hensel lemma: nding of roots of p-adic Lipschitz functions (joint talk with Andrei Khrennikov) Dr. Ekaterina Yurova Axelsson Linnaeus University, Sweden September 8, 2015 Outline Denitions

More information

6.S897 Algebra and Computation February 27, Lecture 6

6.S897 Algebra and Computation February 27, Lecture 6 6.S897 Algebra and Computation February 7, 01 Lecture 6 Lecturer: Madhu Sudan Scribe: Mohmammad Bavarian 1 Overview Last lecture we saw how to use FFT to multiply f, g R[x] in nearly linear time. We also

More information

p-adic Continued Fractions

p-adic Continued Fractions p-adic Continued Fractions Matthew Moore May 4, 2006 Abstract Simple continued fractions in R have a single definition and algorithms for calculating them are well known. There also exists a well known

More information

1 Relative degree and local normal forms

1 Relative degree and local normal forms THE ZERO DYNAMICS OF A NONLINEAR SYSTEM 1 Relative degree and local normal orms The purpose o this Section is to show how single-input single-output nonlinear systems can be locally given, by means o a

More information

arxiv: v5 [cs.sc] 15 May 2018

arxiv: v5 [cs.sc] 15 May 2018 On Newton-Raphson iteration for multiplicative inverses modulo prime powers arxiv:109.666v5 [cs.sc] 15 May 018 Jean-Guillaume Dumas May 16, 018 Abstract We study algorithms for the fast computation of

More information

NAP Module 4. Homework 2 Friday, July 14, 2017.

NAP Module 4. Homework 2 Friday, July 14, 2017. NAP 2017. Module 4. Homework 2 Friday, July 14, 2017. These excercises are due July 21, 2017, at 10 pm. Nepal time. Please, send them to nap@rnta.eu, to laurageatti@gmail.com and schoo.rene@gmail.com.

More information

On the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs

On the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs On the Girth o (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs Sudarsan V S Ranganathan, Dariush Divsalar and Richard D Wesel Department o Electrical Engineering, University o Caliornia, Los

More information

BANDELET IMAGE APPROXIMATION AND COMPRESSION

BANDELET IMAGE APPROXIMATION AND COMPRESSION BANDELET IMAGE APPOXIMATION AND COMPESSION E. LE PENNEC AND S. MALLAT Abstract. Finding eicient geometric representations o images is a central issue to improve image compression and noise removal algorithms.

More information

CS 361 Meeting 28 11/14/18

CS 361 Meeting 28 11/14/18 CS 361 Meeting 28 11/14/18 Announcements 1. Homework 9 due Friday Computation Histories 1. Some very interesting proos o undecidability rely on the technique o constructing a language that describes the

More information

The intrinsic structure of FFT and a synopsis of SFT

The intrinsic structure of FFT and a synopsis of SFT Global Journal o Pure and Applied Mathematics. ISSN 0973-1768 Volume 12, Number 2 (2016), pp. 1671-1676 Research India Publications http://www.ripublication.com/gjpam.htm The intrinsic structure o FFT

More information

Fluctuationlessness Theorem and its Application to Boundary Value Problems of ODEs

Fluctuationlessness Theorem and its Application to Boundary Value Problems of ODEs Fluctuationlessness Theorem and its Application to Boundary Value Problems o ODEs NEJLA ALTAY İstanbul Technical University Inormatics Institute Maslak, 34469, İstanbul TÜRKİYE TURKEY) nejla@be.itu.edu.tr

More information

a = a i 2 i a = All such series are automatically convergent with respect to the standard norm, but note that this representation is not unique: i<0

a = a i 2 i a = All such series are automatically convergent with respect to the standard norm, but note that this representation is not unique: i<0 p-adic Numbers K. Sutner v0.4 1 Modular Arithmetic rings integral domains integers gcd, extended Euclidean algorithm factorization modular numbers add Lemma 1.1 (Chinese Remainder Theorem) Let a b. Then

More information

Computing proximal points of nonconvex functions

Computing proximal points of nonconvex functions Mathematical Programming manuscript No. (will be inserted by the editor) Warren Hare Claudia Sagastizábal Computing proximal points o nonconvex unctions the date o receipt and acceptance should be inserted

More information

Introduction to Simulation - Lecture 2. Equation Formulation Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy

Introduction to Simulation - Lecture 2. Equation Formulation Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Introduction to Simulation - Lecture Equation Formulation Methods Jacob White Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Outline Formulating Equations rom Schematics Struts and Joints

More information

CISE-301: Numerical Methods Topic 1:

CISE-301: Numerical Methods Topic 1: CISE-3: Numerical Methods Topic : Introduction to Numerical Methods and Taylor Series Lectures -4: KFUPM Term 9 Section 8 CISE3_Topic KFUPM - T9 - Section 8 Lecture Introduction to Numerical Methods What

More information

Algorithms and Complexity Results for Exact Bayesian Structure Learning

Algorithms and Complexity Results for Exact Bayesian Structure Learning Algorithms and Complexity Results or Exact Bayesian Structure Learning Sebastian Ordyniak and Stean Szeider Institute o Inormation Systems Vienna University o Technology, Austria Abstract Bayesian structure

More information

Review of Prerequisite Skills for Unit # 2 (Derivatives) U2L2: Sec.2.1 The Derivative Function

Review of Prerequisite Skills for Unit # 2 (Derivatives) U2L2: Sec.2.1 The Derivative Function UL1: Review o Prerequisite Skills or Unit # (Derivatives) Working with the properties o exponents Simpliying radical expressions Finding the slopes o parallel and perpendicular lines Simpliying rational

More information

it simpliies the notation, we write unary unction symbols without parenthesis, e.g., h((h(x);a)) would be written as h(hx; a). By s[t] we indicate tha

it simpliies the notation, we write unary unction symbols without parenthesis, e.g., h((h(x);a)) would be written as h(hx; a). By s[t] we indicate tha Fast Algorithms or Uniorm Semi-Uniication Alberto Oliart Λ Laboratorio Nacional de Inormática Avanzada, A.C. Rébsamen 8, Xalapa, Veracruz, Mexico aoliart@lania.mx Wayne Snyder Boston University Computer

More information

s 1 if xπy and f(x) = f(y)

s 1 if xπy and f(x) = f(y) Algorithms Proessor John Rei Hash Function : A B ALG 4.2 Universal Hash Functions: CLR - Chapter 34 Auxillary Reading Selections: AHU-Data Section 4.7 BB Section 8.4.4 Handout: Carter & Wegman, "Universal

More information

Definition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series.

Definition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series. 2.4 Local properties o unctions o several variables In this section we will learn how to address three kinds o problems which are o great importance in the ield o applied mathematics: how to obtain the

More information

Telescoping Decomposition Method for Solving First Order Nonlinear Differential Equations

Telescoping Decomposition Method for Solving First Order Nonlinear Differential Equations Telescoping Decomposition Method or Solving First Order Nonlinear Dierential Equations 1 Mohammed Al-Reai 2 Maysem Abu-Dalu 3 Ahmed Al-Rawashdeh Abstract The Telescoping Decomposition Method TDM is a new

More information

GF(4) Based Synthesis of Quaternary Reversible/Quantum Logic Circuits

GF(4) Based Synthesis of Quaternary Reversible/Quantum Logic Circuits GF(4) ased Synthesis o Quaternary Reversible/Quantum Logic Circuits MOZAMMEL H. A. KHAN AND MAREK A. PERKOWSKI Department o Computer Science and Engineering, East West University 4 Mohakhali, Dhaka, ANGLADESH,

More information

Probabilistic Optimisation applied to Spacecraft Rendezvous on Keplerian Orbits

Probabilistic Optimisation applied to Spacecraft Rendezvous on Keplerian Orbits Probabilistic Optimisation applied to pacecrat Rendezvous on Keplerian Orbits Grégory aive a, Massimiliano Vasile b a Université de Liège, Faculté des ciences Appliquées, Belgium b Dipartimento di Ingegneria

More information

Computing with polynomials: Hensel constructions

Computing with polynomials: Hensel constructions Course Polynomials: Their Power and How to Use Them, JASS 07 Computing with polynomials: Hensel constructions Lukas Bulwahn March 28, 2007 Abstract To solve GCD calculations and factorization of polynomials

More information

Continuous Solutions of a Functional Equation Involving the Harmonic and Arithmetic Means

Continuous Solutions of a Functional Equation Involving the Harmonic and Arithmetic Means Continuous Solutions o a Functional Equation Involving the Harmonic and Arithmetic Means Rebecca Whitehead and Bruce Ebanks aculty advisor) Department o Mathematics and Statistics Mississippi State University

More information

Categories and Natural Transformations

Categories and Natural Transformations Categories and Natural Transormations Ethan Jerzak 17 August 2007 1 Introduction The motivation or studying Category Theory is to ormalise the underlying similarities between a broad range o mathematical

More information

MEASUREMENT UNCERTAINTIES

MEASUREMENT UNCERTAINTIES MEASUREMENT UNCERTAINTIES What distinguishes science rom philosophy is that it is grounded in experimental observations. These observations are most striking when they take the orm o a quantitative measurement.

More information

The Deutsch-Jozsa Problem: De-quantization and entanglement

The Deutsch-Jozsa Problem: De-quantization and entanglement The Deutsch-Jozsa Problem: De-quantization and entanglement Alastair A. Abbott Department o Computer Science University o Auckland, New Zealand May 31, 009 Abstract The Deustch-Jozsa problem is one o the

More information

arxiv: v1 [math.ho] 12 Sep 2008

arxiv: v1 [math.ho] 12 Sep 2008 arxiv:0809.2139v1 [math.ho] 12 Sep 2008 Constructing the Primitive Roots of Prime Powers Nathan Jolly September 12, 2008 Abstract We use only addition and multiplication to construct the primitive roots

More information

Circuit Complexity / Counting Problems

Circuit Complexity / Counting Problems Lecture 5 Circuit Complexity / Counting Problems April 2, 24 Lecturer: Paul eame Notes: William Pentney 5. Circuit Complexity and Uniorm Complexity We will conclude our look at the basic relationship between

More information

Rivest-Vuillemin Conjecture Is True for Monotone Boolean Functions with Twelve Variables. Technical Report

Rivest-Vuillemin Conjecture Is True for Monotone Boolean Functions with Twelve Variables. Technical Report Rivest-Vuillemin Conjecture Is True or Monotone Boolean Functions with Twelve Variables Technical Report Department o Computer Science and Engineering University o Minnesota 4-192 EECS Building 200 Union

More information

ON AN ESTIMATION OF THE DAMPING PROPERTIES OF WOVEN FABRIC COMPOSITES

ON AN ESTIMATION OF THE DAMPING PROPERTIES OF WOVEN FABRIC COMPOSITES ON AN ESTIMATION OF THE DAMPING PROPERTIES OF WOVEN FABRIC COMPOSITES Masaru Zao 1, Tetsusei Kurashii 1, Yasumasa Naanishi 2 and Kin ya Matsumoto 2 1 Department o Management o Industry and Technology,

More information

Today. Introduction to optimization Definition and motivation 1-dimensional methods. Multi-dimensional methods. General strategies, value-only methods

Today. Introduction to optimization Definition and motivation 1-dimensional methods. Multi-dimensional methods. General strategies, value-only methods Optimization Last time Root inding: deinition, motivation Algorithms: Bisection, alse position, secant, Newton-Raphson Convergence & tradeos Eample applications o Newton s method Root inding in > 1 dimension

More information

Syllabus Objective: 2.9 The student will sketch the graph of a polynomial, radical, or rational function.

Syllabus Objective: 2.9 The student will sketch the graph of a polynomial, radical, or rational function. Precalculus Notes: Unit Polynomial Functions Syllabus Objective:.9 The student will sketch the graph o a polynomial, radical, or rational unction. Polynomial Function: a unction that can be written in

More information

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points Roberto s Notes on Dierential Calculus Chapter 8: Graphical analysis Section 1 Extreme points What you need to know already: How to solve basic algebraic and trigonometric equations. All basic techniques

More information

A Simple Explanation of the Sobolev Gradient Method

A Simple Explanation of the Sobolev Gradient Method A Simple Explanation o the Sobolev Gradient Method R. J. Renka July 3, 2006 Abstract We have observed that the term Sobolev gradient is used more oten than it is understood. Also, the term is oten used

More information

Basic Algorithms in Number Theory

Basic Algorithms in Number Theory Basic Algorithms in Number Theory Algorithmic Complexity... 1 Basic Algorithms in Number Theory Francesco Pappalardi Discrete Logs, Modular Square Roots & Euclidean Algorithm. July 20 th 2010 Basic Algorithms

More information

The Number of Fields Generated by the Square Root of Values of a Given Polynomial

The Number of Fields Generated by the Square Root of Values of a Given Polynomial Canad. Math. Bull. Vol. 46 (1), 2003 pp. 71 79 The Number o Fields Generated by the Square Root o Values o a Given Polynomial Pamela Cutter, Andrew Granville, and Thomas J. Tucker Abstract. The abc-conjecture

More information

Efficient random number generation on FPGA-s

Efficient random number generation on FPGA-s Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 313 320 doi: 10.14794/ICAI.9.2014.1.313 Efficient random number generation

More information

Lecture 25: Heat and The 1st Law of Thermodynamics Prof. WAN, Xin

Lecture 25: Heat and The 1st Law of Thermodynamics Prof. WAN, Xin General Physics I Lecture 5: Heat and he 1st Law o hermodynamics Pro. WAN, Xin xinwan@zju.edu.cn http://zimp.zju.edu.cn/~xinwan/ Latent Heat in Phase Changes Latent Heat he latent heat o vaporization or

More information

18-660: Numerical Methods for Engineering Design and Optimization

18-660: Numerical Methods for Engineering Design and Optimization 8-66: Numerical Methods or Engineering Design and Optimization Xin Li Department o ECE Carnegie Mellon University Pittsburgh, PA 53 Slide Overview Linear Regression Ordinary least-squares regression Minima

More information

ON DIRICHLET S CONJECTURE ON RELATIVE CLASS NUMBER ONE

ON DIRICHLET S CONJECTURE ON RELATIVE CLASS NUMBER ONE ON DIRICHLET S CONJECTURE ON RELATIVE CLASS NUMBER ONE AMANDA FURNESS Abstract. We examine relative class numbers, associated to class numbers of quadratic fields Q( m) for m > 0 and square-free. The relative

More information

Algorithms (II) Yu Yu. Shanghai Jiaotong University

Algorithms (II) Yu Yu. Shanghai Jiaotong University Algorithms (II) Yu Yu Shanghai Jiaotong University Chapter 1. Algorithms with Numbers Two seemingly similar problems Factoring: Given a number N, express it as a product of its prime factors. Primality:

More information

Summary Slides for MATH 342 June 25, 2018

Summary Slides for MATH 342 June 25, 2018 Summary Slides for MATH 342 June 25, 2018 Summary slides based on Elementary Number Theory and its applications by Kenneth Rosen and The Theory of Numbers by Ivan Niven, Herbert Zuckerman, and Hugh Montgomery.

More information

Analysis of the regularity, pointwise completeness and pointwise generacy of descriptor linear electrical circuits

Analysis of the regularity, pointwise completeness and pointwise generacy of descriptor linear electrical circuits Computer Applications in Electrical Engineering Vol. 4 Analysis o the regularity pointwise completeness pointwise generacy o descriptor linear electrical circuits Tadeusz Kaczorek Białystok University

More information

Numerical Solution of Ordinary Differential Equations in Fluctuationlessness Theorem Perspective

Numerical Solution of Ordinary Differential Equations in Fluctuationlessness Theorem Perspective Numerical Solution o Ordinary Dierential Equations in Fluctuationlessness Theorem Perspective NEJLA ALTAY Bahçeşehir University Faculty o Arts and Sciences Beşiktaş, İstanbul TÜRKİYE TURKEY METİN DEMİRALP

More information

arxiv: v2 [math.co] 29 Mar 2017

arxiv: v2 [math.co] 29 Mar 2017 COMBINATORIAL IDENTITIES FOR GENERALIZED STIRLING NUMBERS EXPANDING -FACTORIAL FUNCTIONS AND THE -HARMONIC NUMBERS MAXIE D. SCHMIDT arxiv:6.04708v2 [math.co 29 Mar 207 SCHOOL OF MATHEMATICS GEORGIA INSTITUTE

More information

SOME CHARACTERIZATIONS OF HARMONIC CONVEX FUNCTIONS

SOME CHARACTERIZATIONS OF HARMONIC CONVEX FUNCTIONS International Journal o Analysis and Applications ISSN 2291-8639 Volume 15, Number 2 2017, 179-187 DOI: 10.28924/2291-8639-15-2017-179 SOME CHARACTERIZATIONS OF HARMONIC CONVEX FUNCTIONS MUHAMMAD ASLAM

More information

Physics 11 HW #6 Solutions

Physics 11 HW #6 Solutions Physics HW #6 Solutions Chapter 6: Focus On Concepts:,,, Probles: 8, 4, 4, 43, 5, 54, 66, 8, 85 Focus On Concepts 6- (b) Work is positive when the orce has a coponent in the direction o the displaceent.

More information

The Impact of Carries on the Complexity of Collision Attacks on SHA-1

The Impact of Carries on the Complexity of Collision Attacks on SHA-1 The Impact o Carries on the Complexity o Collision Attacks on SHA-1 Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen Norbert.Pramstaller@iaik.tugraz.at Institute or Applied

More information

Tewodros Amdeberhan, Dante Manna and Victor H. Moll Department of Mathematics, Tulane University New Orleans, LA 70118

Tewodros Amdeberhan, Dante Manna and Victor H. Moll Department of Mathematics, Tulane University New Orleans, LA 70118 The -adic valuation of Stirling numbers Tewodros Amdeberhan, Dante Manna and Victor H. Moll Department of Mathematics, Tulane University New Orleans, LA 7011 Abstract We analyze properties of the -adic

More information

Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair

Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair 1 Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair Kaveh Mahdaviani, Soheil Mohajer, and Ashish Khisti ECE Dept, University o Toronto, Toronto, ON M5S3G4, Canada ECE Dept, University o Minnesota,

More information

Sliding Mode Control and Feedback Linearization for Non-regular Systems

Sliding Mode Control and Feedback Linearization for Non-regular Systems Sliding Mode Control and Feedback Linearization or Non-regular Systems Fu Zhang Benito R. Fernández Pieter J. Mosterman Timothy Josserand The MathWorks, Inc. Natick, MA, 01760 University o Texas at Austin,

More information

New Arithmetic Algorithms for Hereditarily Binary Natural Numbers

New Arithmetic Algorithms for Hereditarily Binary Natural Numbers New Arithmetic Algorithms for Hereditarily Binary Natural Numbers Paul Tarau Department of Computer Science and Engineering University of North Texas SYNASC 2014 research supported by NSF grant 1423324

More information

Curve Sketching. The process of curve sketching can be performed in the following steps:

Curve Sketching. The process of curve sketching can be performed in the following steps: Curve Sketching So ar you have learned how to ind st and nd derivatives o unctions and use these derivatives to determine where a unction is:. Increasing/decreasing. Relative extrema 3. Concavity 4. Points

More information

Physics 2B Chapter 17 Notes - First Law of Thermo Spring 2018

Physics 2B Chapter 17 Notes - First Law of Thermo Spring 2018 Internal Energy o a Gas Work Done by a Gas Special Processes The First Law o Thermodynamics p Diagrams The First Law o Thermodynamics is all about the energy o a gas: how much energy does the gas possess,

More information

Simpler Functions for Decompositions

Simpler Functions for Decompositions Simpler Functions or Decompositions Bernd Steinbach Freiberg University o Mining and Technology, Institute o Computer Science, D-09596 Freiberg, Germany Abstract. This paper deals with the synthesis o

More information

Figure 1: Bayesian network for problem 1. P (A = t) = 0.3 (1) P (C = t) = 0.6 (2) Table 1: CPTs for problem 1. (c) P (E B) C P (D = t) f 0.9 t 0.

Figure 1: Bayesian network for problem 1. P (A = t) = 0.3 (1) P (C = t) = 0.6 (2) Table 1: CPTs for problem 1. (c) P (E B) C P (D = t) f 0.9 t 0. Probabilistic Artiicial Intelligence Problem Set 3 Oct 27, 2017 1. Variable elimination In this exercise you will use variable elimination to perorm inerence on a bayesian network. Consider the network

More information

Scattered Data Approximation of Noisy Data via Iterated Moving Least Squares

Scattered Data Approximation of Noisy Data via Iterated Moving Least Squares Scattered Data Approximation o Noisy Data via Iterated Moving Least Squares Gregory E. Fasshauer and Jack G. Zhang Abstract. In this paper we ocus on two methods or multivariate approximation problems

More information

Lawrence Somer Department of Mathematics, Catholic University of America, Washington, D.C (Submitted February 2001) 1. I N T R O D U C T I O N

Lawrence Somer Department of Mathematics, Catholic University of America, Washington, D.C (Submitted February 2001) 1. I N T R O D U C T I O N THE EXISTENCE OF SPECIAL MULTIPLIERS OF SECOND-ORDER RECURRENCE SEQUENCES Walter Carlip Department of Mathematics and Computer Science Loyola University of Chicago, Chicago, Illinois 60626 Lawrence Somer

More information

Introduction to Cryptology. Lecture 19

Introduction to Cryptology. Lecture 19 Introduction to Cryptology Lecture 19 Announcements HW6 due today HW7 due Thursday 4/20 Remember to sign up for Extra Credit Agenda Last time More details on AES/DES (K/L 6.2) Practical Constructions of

More information

Review D: Potential Energy and the Conservation of Mechanical Energy

Review D: Potential Energy and the Conservation of Mechanical Energy MSSCHUSETTS INSTITUTE OF TECHNOLOGY Department o Physics 8. Spring 4 Review D: Potential Energy and the Conservation o Mechanical Energy D.1 Conservative and Non-conservative Force... D.1.1 Introduction...

More information

Algorithmic Factorization of Polynomials over Number Fields

Algorithmic Factorization of Polynomials over Number Fields Rose-Hulman Institute of Technology Rose-Hulman Scholar Mathematical Sciences Technical Reports (MSTR) Mathematics 5-18-017 Algorithmic Factorization of Polynomials over Number Fields Christian Schulz

More information

Approximative Methods for Monotone Systems of min-max-polynomial Equations

Approximative Methods for Monotone Systems of min-max-polynomial Equations Approximative Methods or Monotone Systems o min-max-polynomial Equations Javier Esparza, Thomas Gawlitza, Stean Kieer, and Helmut Seidl Institut ür Inormatik Technische Universität München, Germany {esparza,gawlitza,kieer,seidl}@in.tum.de

More information

The achievable limits of operational modal analysis. * Siu-Kui Au 1)

The achievable limits of operational modal analysis. * Siu-Kui Au 1) The achievable limits o operational modal analysis * Siu-Kui Au 1) 1) Center or Engineering Dynamics and Institute or Risk and Uncertainty, University o Liverpool, Liverpool L69 3GH, United Kingdom 1)

More information

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald)

Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) 1 Euclid s Algorithm Euclid s Algorithm for computing the greatest common divisor belongs to the oldest known computing procedures

More information

ZEROS OF SPARSE POLYNOMIALS OVER LOCAL FIELDS OF CHARACTERISTIC p

ZEROS OF SPARSE POLYNOMIALS OVER LOCAL FIELDS OF CHARACTERISTIC p ZEROS OF SPARSE POLYNOMIALS OVER LOCAL FIELDS OF CHARACTERISTIC p BJORN POONEN 1. Statement of results Let K be a field of characteristic p > 0 equipped with a valuation v : K G taking values in an ordered

More information

arithmetic properties of weighted catalan numbers

arithmetic properties of weighted catalan numbers arithmetic properties of weighted catalan numbers Jason Chen Mentor: Dmitry Kubrak May 20, 2017 MIT PRIMES Conference background: catalan numbers Definition The Catalan numbers are the sequence of integers

More information

Classification of effective GKM graphs with combinatorial type K 4

Classification of effective GKM graphs with combinatorial type K 4 Classiication o eective GKM graphs with combinatorial type K 4 Shintarô Kuroki Department o Applied Mathematics, Faculty o Science, Okayama Uniervsity o Science, 1-1 Ridai-cho Kita-ku, Okayama 700-0005,

More information

CS Data Structures and Algorithm Analysis

CS Data Structures and Algorithm Analysis CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &

More information

D-MATH Algebra II FS18 Prof. Marc Burger. Solution 26. Cyclotomic extensions.

D-MATH Algebra II FS18 Prof. Marc Burger. Solution 26. Cyclotomic extensions. D-MAH Algebra II FS18 Prof. Marc Burger Solution 26 Cyclotomic extensions. In the following, ϕ : Z 1 Z 0 is the Euler function ϕ(n = card ((Z/nZ. For each integer n 1, we consider the n-th cyclotomic polynomial

More information