A Faster Randomized Algorithm for Root Counting in Prime Power Rings
|
|
- Alexis Tate
- 5 years ago
- Views:
Transcription
1 A Faster Randomized Algorithm or Root Counting in Prime Power Rings Leann Kopp and Natalie Randall July 17, 018 Abstract Let p be a prime and Z[x] a polynomial o degree d such that is not identically zero mod p. We introduce a Las Vegas randomized algorithm to count the number o roots o in Z/(p k ) or k N with k which runs in time d 1.5+o(1) (log p) +o(1) 1.1 k. We compare the randomized algorithm to simple brute orce to see when we have practical time gains. In addition, we present an upper bound on the number o roots o (as a unction o p, k, and the degree o ) that is optimal or k =. 1 Introduction A deterministic algorithm or counting roots in Z/(p k ) in time (dlog(p) + t ) O(1) is given in []. Here we propose a Las Vegas randomized algorithm which runs in time d 1.5+o(1) (log p) +o(1) 1.1 k. By Las Vegas randomized, we mean that our algorithm undercounts roots with a ixed error probability but otherwise returns a correct root count and always correctly announces ailure. For instance, i we take our ixed error probability to be 1, we can get an overall 3 ailure probability o less than 1 by running the algorithm 100 times. Las Vegas randomized algorithms are common across algorithmic number theory; there are ast, widely accepted Las Vegas randomized algorithms or checking primality and or actoring polynomials over inite ields [1, 3, 4]. In our algorithm, we introduce randomization by using ast actorization (see [3]) to ind roots o in Z/(p). Prior to the deterministic algorithm in [] there was little inormation on counting the roots o a polynomial over prime power rings. We can easily count the number o roots o a polynomial in Z/(p) by taking the degree o gcd(x p x, ), but this method relies on Z/(p) being a unique actorization domain, and Z/(p k ) is not a unique actorization domain or k > 1. To overcome this issue, we consider the Taylor expansion o our polynomial about a root ζ o the mod p reduction o with a perturbation o pε, where ε {0,..., p k 1}. From this expansion, we can divide by certain powers o p in order to recursively isolate the roots o in the ring Z/(p k ). From a similar expansion, we also get an upper bound or the number o roots o in Z/(p k ) given by min{d, p}p k 1 and a sharp upper bound or k = given by min{ d, p}pk 1 + (d mod ). Background and Randomized Algorithm Lemma.1 (Hensel s Lemma). I Z[x] is a polynomial with integer coeicients, p is prime, and ζ J {0,..., p J 1 1} is a root o (mod p J ) and (ζ J ) 0 (mod p), then there is a unique ζ {0,..., p J+1 1} with (ζ) = 0 (mod p J+1 ) and ζ = ζ J (mod p J ). 1
2 We will see below that we can use Hensel s Lemma to determine the number o lits o a root ζ i with s(i, ζ i ) = 1. Consider the expansion o given by (ζ + pε) = (ζ) + (ζ)pε + + p min(d,k 1) ε min(d,k 1) mod p k, where ζ is a root o the mod p reduction o. Let s {1,..., k} be the maximal integer such that p s divides each o (ζ), (ζ)p,..., min(d,k 1)(ζ) p min(d,k 1). More precisely, s = min{ord p ((ζ)), ord p ( (ζ)p),..., ord p ( min(d,k 1)(ζ) p min(d,k 1) )}, where ord p (x) reers to the p-adic valuation o x. I (ζ + pε) = 0 (mod p k ), then we can write p s ( (ζ) + (ζ) ε + + ε min(d,k 1) ) = 0 mod p k, p s p s 1 (p s min(d,k 1) which is true i and only i (ζ) p s + (ζ) ε + + ε min(d,k 1) = 0 mod p k s. p s 1 (p s min(d,k 1) In the case where s = 1, i (ζ) = 0 mod p then we must have that p (ζ) and so ζ has no lits mod p k ; however, i (ζ) 0 mod p, then ζ lits to one unique root by Hensel s Lemma. In the case where s = k, the entire expression p s ( (ζ) + (ζ) ε+ + ε min(d,k 1) ) p s p s 1 (p s min(d,k 1) vanishes identically mod p k, so any ε {0,..., p k 1 } is a zero o (ζ + pε) and thereore we have that ζ has p k 1 lits. The key idea o the randomized algorithm is that counting the number o roots when s = 1 and s = k is simple, as described above, and we can reduce all the computations to these two cases using recursion. I s {,..., k 1}, we can reapply the algorithm to an + (ζ) (p s min(d,k 1) ε min(d,k 1) instance o counting roots or the polynomial (ζ) ε + + p s p s 1 in Z/(p k s ). Eventually this will reduce to the case where either s = 1 or s = k and the recursion will terminate, giving us that the root ζ o mod p has a total number o p s 1 (the number o roots o (ζ) + (ζ) ε + + ε min(d,k 1) mod p k s ) lits to roots p s p s 1 (p s min(d,k 1) in Z/(p k ). Algorithm 1 Randomized Prime Power Root Counting 1: unction count( Z[x] has degree d and is not identically 0 mod p, prime p, k N such that k ) : Factor as in [3] 3: count := number o distinct linear actors o multiplicity 1 These roots in Z/(p) can be lited uniquely to roots in Z/(p k ). 4: Push {ζ 0 {0,..., p 1} (ζ 0 ) = (ζ 0 ) = 0 mod p and (ζ 0 ) = 0 mod p } onto a stack S 5: while S 0 do 6: Pop a root ζ 0 rom the stack and deine s(0, ζ 0 ) := maximal integer such that p s(0,ζ 0) divides each o (ζ 0 ), (z 0 )pε,..., min(d,k 1)(ζ 0 ) p min(d,k 1) 7: i s(0, ζ 0 ) = k then 8: count count + p k 1 9: else 10: Deine ζ0 (x) := 1 (ζ p s(0,ζ 0 ) 0 + px) 11: count count + p s(0,ζ0) 1 count( ζ0 (x), p, k s(0, ζ 0 )) 1: end i 13: end while 14: return count 15: end unction
3 Since the non-degenerate roots o the mod p reduction o have a unique lit by Hensel s Lemma, we only need to keep track o the degenerate roots. Our recurrence takes a degenerate root ζ 0 as a point in a cluster o roots o in Z/(p k ) and recovers the other points in this cluster by expanding ζ 0 to more digits base-p. In this way, we count the number o roots o in Z/(p k ) by counting the number o lits rom each root ζ i o in Z/(p). 3 Discussion o Complexity Bound and Experimental Data d non-degenerate roots o mod p d 1 non-degenerate roots o ζ1 (ε) mod p ζ1 (ε) p s(i,ζ i) ζ1 identically zero mod p k p k 1 d non-degenerate roots o ζ (ε) mod p ζ (ε) p s(i,ζ i) ζ1 identically zero mod p k p k 1 d l non-degenerate roots o ζ1 (ε) mod p ζl (ε) Figure 1: Diagram o complexity tree In the Figure 1, we see the basic tree structure o the algorithm. We need only keep track o the degenerate roots o ; the degenerate roots o, denoted by ζ i, become the children 3
4 nodes rom which more branching occurs. The depth and branching o our recurrence tree is strongly limited by the value o k and the degree o. For the initial parent node, the total number o degenerate roots is less than or equal to d, and or each subsequent child node, the total number o degenerate roots is less than or equal to s(i,ζ i) d ζi. Non-degenerate roots have a unique lit by Hensel s Lemma, so non-degenerate roots require no additional computations and are thereore shown on the let o the tree. We also see that we have a maximum o s(1, ζ 1 ) s(l, ζ l ) nodes at the bottom level o the tree. We use Kedlaya-Umans ast Z/(p)[x] actoring algorithm ound in [3], which takes time d 1.5+o(1) (log p) 1+o(1) + d 1+o(1) (log p) +o(1) or a degree d polynomial, in order to actor the polynomials at each node in Z/(p). In simplest terms, we can consider our total complexity as being less than or equal to (the number o nodes in the recursion tree) (the complexity o actoring over Z/(p)[x]). Optimizing parameters, the worst case occurs when d e.7188 and the depth o the tree is k. The inal complexity o the randomized algorithm is given by e (d 1.5 log p) 1+o(1) + (d log p) 1+o(1) + [(min{d, k 1} 1.5 log p) 1+o(1) + (min{d, k 1} log p) 1+o(1) ](e/) k/e, where (e/) k/e 1.1 k. Based on this complexity bound, we expect to see time improvements even or p as small as when compared to brute-orce counting since brute-orce counting takes time approximately p k, giving us that brute-orce takes time approximately k or p =, while the randomized algorithm takes time approximately 1.1 k. More details regarding computational time with p = are given in Tables 1 and. We now present computational data which illustrates the advantages to using the randomized algorithm over the brute orce method. The brute orce method takes a polynomial, a prime p, and a power k, and evaluates at each value i rom 0 to p k 1. I (i) is identically equal to 0 (mod p k ), then that contributes to the total number o roots o Z/(p k ). We start by comparing the run times o the brute orce algorithm and the randomized algorithm or p =. Table 1 displays the average dierence in computation time or the number o roots o 100 random polynomials o degree less than or equal to 100 in Z/( k ) or the given k, between brute orce and the randomized algorithm (negative implies brute orce was aster). The times are shown in seconds. In general, a single computation took less than a second, so dierences in the milliseconds are not insigniicant. From the table, we see a switch rom brute-orce being more eicient to the randomized algorithm being more eicient at k = 10, and the dierence becomes more pronounced as k increases. k Avg Di (in seconds) Table 1: Average Dierence in Run Times or 100 random polynomials with p =, taken as (time o bruteorce)-(time o randomized algorithm) 4
5 p k Brute Force Randomized Algorithm 71x 4 + 1x 3 84x 47x ns 0 ns 1x 5 66x 4 4x 3 88x 17x ns µs 75x 6 + 8x 5 93x 4 19x 3 + 3x µs µs x 7 + x 6 + 6x 5 3x 3 58x µs µs 48x 8 3x x 5 19x x ms µs 80x 8 37x 7 89x x 3 + 3x ms 0 ns 5x x 6 75x 5 + 3x 3 7x 38x ms 3.00 ms 61x 10 80x 9 17x 6 90x x ms.00 ms 18x x x x 5 64x ms.00 ms 89x 1 56x x 5 x x x ms 6.00 ms 93x 10 36x x 5 78x 4 67x ms.00 ms Table : Run times or 5 k 15, d < k 1 Table shows the dierence in computational time with speciic examples, giving an idea o the overall time it takes or both the randomized algorithm and brute-orce to run when p =. The dierence in computational run time becomes more noticeable when we introduce larger primes. p k Brute Force Randomized Algorithm 44x x 83 17x 67 75x 49 10x sec 11.00ms 10x x 8 51x x x 48 + x min µs 15x 99 59x 74 96x 9 + 7x 8 87x x hours µs Table 3: Run times or p with at least 3 digits Table 3 illustrates the advantages o using the randomized algorithm over brute-orce or computations involving large prime numbers. Table 4 displays the run times or the randomized algorithm or prime numbers with at least our digits. We begin to see a very signiicant dierence between brute orce and the randomized algorithm or large primes; it took the brute orce method almost 4 hours to count the number o roots o a polynomial in Z/(p k ) when p was a 4 digit prime number, while the randomized algorithm counted the roots o a polynomial in Z/(p k ) when p was a 9 digit prime in approximately a minute and a hal. p k t 56x x 64 x x x x ms 53x 94 78x 37 67x x 6 5x 9 36x ms 55x 98 49x x 60 3x x x ms 35x x 84 14x 56 9x 54 90x 7 3x ms 6x 78 31x x x 16 80x 6 51x s 40x 90 10x x 69 40x 41 8x 36 8x s 80x 87 7x x x x x s Table 4: Run times or the randomized algorithm when p has 4 digits 5
6 We expect the randomized algorithm to take the longest when a polynomial has many degenerate roots because a polynomial o this type will require many recursive calls. Polynomials with many degenerate roots do take longer than a random polynomial, but overall the randomized algorithm still outperorms other methods. For instance, counting roots o the 55 degree polynomial (x 1)(x ) (x 10) 10 in Z/(31 10 ) took 6.4 seconds using the randomized algorithm, while counting roots in the same ring with a random polynomial o the same degree took only 1 millisecond. Despite this slowdown or polynomials with very degenerate roots, the randomized algorithm still outperorms other methods; counting roots o a polynomial in just Z/(31 6 ) using brute orce took.7 hours. 4 Bound on Number o Roots Lemma 4.1. I a root ζ o the mod p reduction o has multiplicity j, then s ζ j, where s ζ is the greatest integer such that p s ζ divides each o (ζ),..., (k 1) (ζ) p k 1 ε k 1. (k 1)! Proo. I ζ has multiplicity j, then (ζ) = = j 1 (ζ) = 0 (mod p), but (j) (ζ) 0 (mod p). So j (ζ) j! p j is divisible by p j but not p j+1 and thereore s ζ j. Theorem 4.. Let p be a prime, Z[x] a polynomial o degree d, and k N such that d k. Then N (p, d, k) min{d, p}p k 1, where N (p, d, k) denotes the number o roots o in Z/(p k ). Proo. Let ζ i {0,..., p 1} be any root o the mod p reduction o, and let s(i, ζ i ) be the greatest integer such that p s(i,ζi) divides each o (ζ i ),..., min(d,k 1) (ζ i ) p k 1. Set ζi (x) = 1 (ζ p s(i,ζ i i + px). Clearly, we have that N (p, d, 1) min{d, p}. We know rom Lemma 4.1 that i ζ i Z/(p) is a root o multiplicity J, then J s. Let δ 1 denote the number o non-degenerate roots o mod p. From this, we see that N (p, d, k) δ 1 + min(d,k 1) J= ζ i with s(i,ζ i )=J ps(i,ζ i) 1 N ζi (p, k 1, k s(i, ζ i )) + ζ i with s(i,ζ i )=k pk 1. Considering that N ζi (p, k 1, k s(i, ζ i )) p k s(i,ζi), we get N (p, d, k) min(d,k 1) J=1 ζ i with s(i,ζ i )=J ps(i,ζ i) 1 p k s(i,ζi) + ζ i with s(i,ζ i )=k pk 1, N (p, d, k) min(d,k 1) J=1 ζ i with s(i,ζ i )=J pk 1 + ζ i with s(i,ζ i )=k pk 1, N (p, d, k) k J=1 ζ i with s(i,ζ i )=J pk 1. Since the number o distinct roots o the mod p reduction o is less than min{d, p}, we get that N (p, d, k) min{d, p}p k 1, as desired. Examples o polynomials with more than d k pk 1 roots are given below. These examples show that our bound is within a actor o k o optimality when d p. Example 4.3. (x ) 7 (x 1) 3 with p = 17, k = 7 has 4, 1, 090 roots, which is greater than d k pk 1 = 4, 137, 569. Example 4.4. (x 1) k x has p k roots when d = k + 1 p. The ollowing examples show that we can have p k roots when d p. Example 4.5. (x p x) k is a polynomial o degree pk with p k roots in Z/(p k ). Example 4.6. (x pk p k 1 1)x k has degree p k p k 1 + k and also vanishes on all o Z/(p k ). 6
7 Theorem 4.7. Let p be a prime and Z[x] a polynomial o degree d such that d. Then the number o roots o in Z/(p ) is less than or equal to min{ d, p}p + (d mod k), and this bound is sharp. Proo. Let ζ i {0,..., p 1} be any root o the mod p reduction o, and let s(i, ζ i ) be the greatest integer such that p s(i,ζi) divides each o (ζ i ),..., min(d,k 1) (ζ i ) p k 1. Let δ 1 denote the number o roots o in Z/(p) with s(i, ζ i ) = 1, and let δ denote the number o roots o in Z/(p) with s(i, ζ i ) =. We know that δ 1 + δ d and that δ d by Lemma 4.1. Using this, N (p, d, ) δ 1 + pδ, N (p, d, ) (d δ ) + pδ, N (p, d, ) (d d ) + d p, N (p, d, ) d p + (d mod ). To show that this bound is sharp, we give several examples below or which this bound equals the number o roots o in Z/(p ). Example 4.8. With p = 5, the degree 3 polynomial (x 1) x has (3 mod ) = 6 roots in Z/(p ). Example 4.9. In general, or i, j Z/(p) such that i j, the polynomial (x i) (x j) has d p + (d mod ) roots in Z/(p ) when d and d p. 5 Acknowledgements We would like to thank our advisor, Dr. J. Maurice Rojas, or his assistance and guidance; we would also like to thank Yuyu Zhu or all the suggestions and advice she gave us. We also thank Texas A&M University or hosting and the National Science Foundation (NSF) or unding this program. Reerences [1] Eric Bach and Je Shallit, Algorithmic Number Theory, Vol. 1: Eicient Algorithms, MIT Press, Cambridge, MA, [] Qi Cheng; Shuhong Gao; J. Maurice Rojas; and Daqing Wan, Counting Roots or Polynomials Modulo Prime Powers, Proceedings o ANTS XIII (Algorithmic Number Theory Symposium, July 160, 018, University o Wisconsin, Madison), to appear. [3] Kiran Kedlaya and Christopher Umans, Fast polynomial actorization and modular composition, SIAM J. Comput., 40 (011), no. 6, pp [4] Qi Cheng, Primality Proving via One Round in ECPP and One Iteration in AKS, Journal o Cryptology, July 007, Volume 0, Issue 3, pp [5] Ivan Niven; Herbert S. Zuckerman; and Hugh L. Montgomery, An Introduction to the Theory o Numbers. John Wily & Sons, Inc.,
RANDOMIZED POLYNOMIAL-TIME ROOT COUNTING IN PRIME POWER RINGS
RANDOMIZED POLYNOMIAL-TIME ROOT COUNTING IN PRIME POWER RINGS LEANN KOPP, NATALIE RANDALL, J. MAURICE ROJAS, AND YUYU ZHU Abstract. Suppose k,p N with p prime and f Z[x] is a univariate polynomial with
More informationCOUNTING ROOTS FOR POLYNOMIALS MODULO PRIME POWERS
COUNTING ROOTS FOR POLYNOMIALS MODULO PRIME POWERS QI CHENG, SHUHONG GAO, J. MAURICE ROJAS, AND DAQING WAN Abstract. Suppose p is a prime, t is a positive integer, and f Z[x] is a univariate polynomial
More informationarxiv: v1 [math.nt] 3 Nov 2017
COUNTING ROOTS OF POLYNOMIALS OVER PRIME POWER RINGS QI CHENG, SHUHONG GAO, J. MAURICE ROJAS, AND DAQING WAN arxiv:1711.01355v1 [math.nt] 3 Nov 2017 Abstract. Suppose p is a prime, t is a positive integer,
More informationCS220/MATH320 Applied Discrete Math Fall 2018 Instructor: Marc Pomplun. Assignment #3. Sample Solutions
CS22/MATH2 Applied Discrete Math Fall 28 Instructor: Marc Pomplun Assignment # Sample Solutions Question : The Boston Powerlower Botanists at UMass Boston recently discovered a new local lower species
More informationSupplementary material for Continuous-action planning for discounted infinite-horizon nonlinear optimal control with Lipschitz values
Supplementary material or Continuous-action planning or discounted ininite-horizon nonlinear optimal control with Lipschitz values List o main notations x, X, u, U state, state space, action, action space,
More informationChapter 6 Reliability-based design and code developments
Chapter 6 Reliability-based design and code developments 6. General Reliability technology has become a powerul tool or the design engineer and is widely employed in practice. Structural reliability analysis
More informationMA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES
MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES 2018 57 5. p-adic Numbers 5.1. Motivating examples. We all know that 2 is irrational, so that 2 is not a square in the rational field Q, but that we can
More informationOn Newton-Raphson iteration for multiplicative inverses modulo prime powers
On Newton-Raphson iteration for multiplicative inverses modulo prime powers Jean-Guillaume Dumas To cite this version: Jean-Guillaume Dumas. On Newton-Raphson iteration for multiplicative inverses modulo
More informationPostmodern Primality Proving
Preda Mihăilescu (University of Göttingen) Postmodern Primality Proving June 28, 2013 1 / 29 Postmodern Primality Proving Preda Mihăilescu Mathematical Institute, University of Göttingen, Germany June
More informationObjectives. By the time the student is finished with this section of the workbook, he/she should be able
FUNCTIONS Quadratic Functions......8 Absolute Value Functions.....48 Translations o Functions..57 Radical Functions...61 Eponential Functions...7 Logarithmic Functions......8 Cubic Functions......91 Piece-Wise
More informationA NOTE ON HENSEL S LEMMA IN SEVERAL VARIABLES
PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 125, Number 11, November 1997, Pages 3185 3189 S 0002-9939(97)04112-9 A NOTE ON HENSEL S LEMMA IN SEVERAL VARIABLES BENJI FISHER (Communicated by
More informationModular Counting of Rational Points over Finite Fields
Modular Counting of Rational Points over Finite Fields Daqing Wan Department of Mathematics University of California Irvine, CA 92697-3875 dwan@math.uci.edu Abstract Let F q be the finite field of q elements,
More informationFinding all Bessel type solutions for Linear Differential Equations with Rational Function Coefficients
Finding all essel type solutions or Linear Dierential Equations with Rational Function Coeicients Mark van Hoeij & Quan Yuan Florida State University, Tallahassee, FL 06-07, USA hoeij@math.su.edu & qyuan@math.su.edu
More informationNumerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods
Numerical Methods - Lecture 1 Numerical Methods Lecture. Analysis o errors in numerical methods Numerical Methods - Lecture Why represent numbers in loating point ormat? Eample 1. How a number 56.78 can
More informationOn High-Rate Cryptographic Compression Functions
On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48
More information2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction
. ETA EVALUATIONS USING WEBER FUNCTIONS Introduction So ar we have seen some o the methods or providing eta evaluations that appear in the literature and we have seen some o the interesting properties
More informationSub-Linear Root Detection for Sparse Polynomials Over Finite Fields
1 / 27 Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields Jingguo Bi Institute for Advanced Study Tsinghua University Beijing, China October, 2014 Vienna, Austria This is a joint work
More informationVALUATIVE CRITERIA FOR SEPARATED AND PROPER MORPHISMS
VALUATIVE CRITERIA FOR SEPARATED AND PROPER MORPHISMS BRIAN OSSERMAN Recall that or prevarieties, we had criteria or being a variety or or being complete in terms o existence and uniqueness o limits, where
More informationA PROBABILISTIC POWER DOMAIN ALGORITHM FOR FRACTAL IMAGE DECODING
Stochastics and Dynamics, Vol. 2, o. 2 (2002) 6 73 c World Scientiic Publishing Company A PROBABILISTIC POWER DOMAI ALGORITHM FOR FRACTAL IMAGE DECODIG V. DRAKOPOULOS Department o Inormatics and Telecommunications,
More information( x) f = where P and Q are polynomials.
9.8 Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm ( ) ( ) ( ) P where P and Q are polynomials. Q An eample o a simple rational
More informationThe primitive root theorem
The primitive root theorem Mar Steinberger First recall that if R is a ring, then a R is a unit if there exists b R with ab = ba = 1. The collection of all units in R is denoted R and forms a group under
More informationFinger Search in the Implicit Model
Finger Search in the Implicit Model Gerth Stølting Brodal, Jesper Sindahl Nielsen, Jakob Truelsen MADALGO, Department o Computer Science, Aarhus University, Denmark. {gerth,jasn,jakobt}@madalgo.au.dk Abstract.
More informationAPPENDIX 1 ERROR ESTIMATION
1 APPENDIX 1 ERROR ESTIMATION Measurements are always subject to some uncertainties no matter how modern and expensive equipment is used or how careully the measurements are perormed These uncertainties
More informationRATIONAL FUNCTIONS. Finding Asymptotes..347 The Domain Finding Intercepts Graphing Rational Functions
RATIONAL FUNCTIONS Finding Asymptotes..347 The Domain....350 Finding Intercepts.....35 Graphing Rational Functions... 35 345 Objectives The ollowing is a list o objectives or this section o the workbook.
More informationFinite Dimensional Hilbert Spaces are Complete for Dagger Compact Closed Categories (Extended Abstract)
Electronic Notes in Theoretical Computer Science 270 (1) (2011) 113 119 www.elsevier.com/locate/entcs Finite Dimensional Hilbert Spaces are Complete or Dagger Compact Closed Categories (Extended bstract)
More informationBinomial coefficients and k-regular sequences
Binomial coefficients and k-regular sequences Eric Rowland Hofstra University New York Combinatorics Seminar CUNY Graduate Center, 2017 12 22 Eric Rowland Binomial coefficients and k-regular sequences
More informationMath 216A. A gluing construction of Proj(S)
Math 216A. A gluing construction o Proj(S) 1. Some basic deinitions Let S = n 0 S n be an N-graded ring (we ollows French terminology here, even though outside o France it is commonly accepted that N does
More informationVALUATIVE CRITERIA BRIAN OSSERMAN
VALUATIVE CRITERIA BRIAN OSSERMAN Intuitively, one can think o separatedness as (a relative version o) uniqueness o limits, and properness as (a relative version o) existence o (unique) limits. It is not
More informationThe 2nd Texas A&M at Galveston Mathematics Olympiad. September 24, Problems & Solutions
nd Math Olympiad Solutions Problem #: The nd Teas A&M at Galveston Mathematics Olympiad September 4, 00 Problems & Solutions Written by Dr. Lin Qiu A runner passes 5 poles in 30 seconds. How long will
More informationGeneralization of Hensel lemma: nding of roots of p-adic Lipschitz functions
Generalization of Hensel lemma: nding of roots of p-adic Lipschitz functions (joint talk with Andrei Khrennikov) Dr. Ekaterina Yurova Axelsson Linnaeus University, Sweden September 8, 2015 Outline Denitions
More information6.S897 Algebra and Computation February 27, Lecture 6
6.S897 Algebra and Computation February 7, 01 Lecture 6 Lecturer: Madhu Sudan Scribe: Mohmammad Bavarian 1 Overview Last lecture we saw how to use FFT to multiply f, g R[x] in nearly linear time. We also
More informationp-adic Continued Fractions
p-adic Continued Fractions Matthew Moore May 4, 2006 Abstract Simple continued fractions in R have a single definition and algorithms for calculating them are well known. There also exists a well known
More information1 Relative degree and local normal forms
THE ZERO DYNAMICS OF A NONLINEAR SYSTEM 1 Relative degree and local normal orms The purpose o this Section is to show how single-input single-output nonlinear systems can be locally given, by means o a
More informationarxiv: v5 [cs.sc] 15 May 2018
On Newton-Raphson iteration for multiplicative inverses modulo prime powers arxiv:109.666v5 [cs.sc] 15 May 018 Jean-Guillaume Dumas May 16, 018 Abstract We study algorithms for the fast computation of
More informationNAP Module 4. Homework 2 Friday, July 14, 2017.
NAP 2017. Module 4. Homework 2 Friday, July 14, 2017. These excercises are due July 21, 2017, at 10 pm. Nepal time. Please, send them to nap@rnta.eu, to laurageatti@gmail.com and schoo.rene@gmail.com.
More informationOn the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs
On the Girth o (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs Sudarsan V S Ranganathan, Dariush Divsalar and Richard D Wesel Department o Electrical Engineering, University o Caliornia, Los
More informationBANDELET IMAGE APPROXIMATION AND COMPRESSION
BANDELET IMAGE APPOXIMATION AND COMPESSION E. LE PENNEC AND S. MALLAT Abstract. Finding eicient geometric representations o images is a central issue to improve image compression and noise removal algorithms.
More informationCS 361 Meeting 28 11/14/18
CS 361 Meeting 28 11/14/18 Announcements 1. Homework 9 due Friday Computation Histories 1. Some very interesting proos o undecidability rely on the technique o constructing a language that describes the
More informationThe intrinsic structure of FFT and a synopsis of SFT
Global Journal o Pure and Applied Mathematics. ISSN 0973-1768 Volume 12, Number 2 (2016), pp. 1671-1676 Research India Publications http://www.ripublication.com/gjpam.htm The intrinsic structure o FFT
More informationFluctuationlessness Theorem and its Application to Boundary Value Problems of ODEs
Fluctuationlessness Theorem and its Application to Boundary Value Problems o ODEs NEJLA ALTAY İstanbul Technical University Inormatics Institute Maslak, 34469, İstanbul TÜRKİYE TURKEY) nejla@be.itu.edu.tr
More informationa = a i 2 i a = All such series are automatically convergent with respect to the standard norm, but note that this representation is not unique: i<0
p-adic Numbers K. Sutner v0.4 1 Modular Arithmetic rings integral domains integers gcd, extended Euclidean algorithm factorization modular numbers add Lemma 1.1 (Chinese Remainder Theorem) Let a b. Then
More informationComputing proximal points of nonconvex functions
Mathematical Programming manuscript No. (will be inserted by the editor) Warren Hare Claudia Sagastizábal Computing proximal points o nonconvex unctions the date o receipt and acceptance should be inserted
More informationIntroduction to Simulation - Lecture 2. Equation Formulation Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy
Introduction to Simulation - Lecture Equation Formulation Methods Jacob White Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Outline Formulating Equations rom Schematics Struts and Joints
More informationCISE-301: Numerical Methods Topic 1:
CISE-3: Numerical Methods Topic : Introduction to Numerical Methods and Taylor Series Lectures -4: KFUPM Term 9 Section 8 CISE3_Topic KFUPM - T9 - Section 8 Lecture Introduction to Numerical Methods What
More informationAlgorithms and Complexity Results for Exact Bayesian Structure Learning
Algorithms and Complexity Results or Exact Bayesian Structure Learning Sebastian Ordyniak and Stean Szeider Institute o Inormation Systems Vienna University o Technology, Austria Abstract Bayesian structure
More informationReview of Prerequisite Skills for Unit # 2 (Derivatives) U2L2: Sec.2.1 The Derivative Function
UL1: Review o Prerequisite Skills or Unit # (Derivatives) Working with the properties o exponents Simpliying radical expressions Finding the slopes o parallel and perpendicular lines Simpliying rational
More informationit simpliies the notation, we write unary unction symbols without parenthesis, e.g., h((h(x);a)) would be written as h(hx; a). By s[t] we indicate tha
Fast Algorithms or Uniorm Semi-Uniication Alberto Oliart Λ Laboratorio Nacional de Inormática Avanzada, A.C. Rébsamen 8, Xalapa, Veracruz, Mexico aoliart@lania.mx Wayne Snyder Boston University Computer
More informations 1 if xπy and f(x) = f(y)
Algorithms Proessor John Rei Hash Function : A B ALG 4.2 Universal Hash Functions: CLR - Chapter 34 Auxillary Reading Selections: AHU-Data Section 4.7 BB Section 8.4.4 Handout: Carter & Wegman, "Universal
More informationDefinition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series.
2.4 Local properties o unctions o several variables In this section we will learn how to address three kinds o problems which are o great importance in the ield o applied mathematics: how to obtain the
More informationTelescoping Decomposition Method for Solving First Order Nonlinear Differential Equations
Telescoping Decomposition Method or Solving First Order Nonlinear Dierential Equations 1 Mohammed Al-Reai 2 Maysem Abu-Dalu 3 Ahmed Al-Rawashdeh Abstract The Telescoping Decomposition Method TDM is a new
More informationGF(4) Based Synthesis of Quaternary Reversible/Quantum Logic Circuits
GF(4) ased Synthesis o Quaternary Reversible/Quantum Logic Circuits MOZAMMEL H. A. KHAN AND MAREK A. PERKOWSKI Department o Computer Science and Engineering, East West University 4 Mohakhali, Dhaka, ANGLADESH,
More informationProbabilistic Optimisation applied to Spacecraft Rendezvous on Keplerian Orbits
Probabilistic Optimisation applied to pacecrat Rendezvous on Keplerian Orbits Grégory aive a, Massimiliano Vasile b a Université de Liège, Faculté des ciences Appliquées, Belgium b Dipartimento di Ingegneria
More informationComputing with polynomials: Hensel constructions
Course Polynomials: Their Power and How to Use Them, JASS 07 Computing with polynomials: Hensel constructions Lukas Bulwahn March 28, 2007 Abstract To solve GCD calculations and factorization of polynomials
More informationContinuous Solutions of a Functional Equation Involving the Harmonic and Arithmetic Means
Continuous Solutions o a Functional Equation Involving the Harmonic and Arithmetic Means Rebecca Whitehead and Bruce Ebanks aculty advisor) Department o Mathematics and Statistics Mississippi State University
More informationCategories and Natural Transformations
Categories and Natural Transormations Ethan Jerzak 17 August 2007 1 Introduction The motivation or studying Category Theory is to ormalise the underlying similarities between a broad range o mathematical
More informationMEASUREMENT UNCERTAINTIES
MEASUREMENT UNCERTAINTIES What distinguishes science rom philosophy is that it is grounded in experimental observations. These observations are most striking when they take the orm o a quantitative measurement.
More informationThe Deutsch-Jozsa Problem: De-quantization and entanglement
The Deutsch-Jozsa Problem: De-quantization and entanglement Alastair A. Abbott Department o Computer Science University o Auckland, New Zealand May 31, 009 Abstract The Deustch-Jozsa problem is one o the
More informationarxiv: v1 [math.ho] 12 Sep 2008
arxiv:0809.2139v1 [math.ho] 12 Sep 2008 Constructing the Primitive Roots of Prime Powers Nathan Jolly September 12, 2008 Abstract We use only addition and multiplication to construct the primitive roots
More informationCircuit Complexity / Counting Problems
Lecture 5 Circuit Complexity / Counting Problems April 2, 24 Lecturer: Paul eame Notes: William Pentney 5. Circuit Complexity and Uniorm Complexity We will conclude our look at the basic relationship between
More informationRivest-Vuillemin Conjecture Is True for Monotone Boolean Functions with Twelve Variables. Technical Report
Rivest-Vuillemin Conjecture Is True or Monotone Boolean Functions with Twelve Variables Technical Report Department o Computer Science and Engineering University o Minnesota 4-192 EECS Building 200 Union
More informationON AN ESTIMATION OF THE DAMPING PROPERTIES OF WOVEN FABRIC COMPOSITES
ON AN ESTIMATION OF THE DAMPING PROPERTIES OF WOVEN FABRIC COMPOSITES Masaru Zao 1, Tetsusei Kurashii 1, Yasumasa Naanishi 2 and Kin ya Matsumoto 2 1 Department o Management o Industry and Technology,
More informationToday. Introduction to optimization Definition and motivation 1-dimensional methods. Multi-dimensional methods. General strategies, value-only methods
Optimization Last time Root inding: deinition, motivation Algorithms: Bisection, alse position, secant, Newton-Raphson Convergence & tradeos Eample applications o Newton s method Root inding in > 1 dimension
More informationSyllabus Objective: 2.9 The student will sketch the graph of a polynomial, radical, or rational function.
Precalculus Notes: Unit Polynomial Functions Syllabus Objective:.9 The student will sketch the graph o a polynomial, radical, or rational unction. Polynomial Function: a unction that can be written in
More informationRoberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points
Roberto s Notes on Dierential Calculus Chapter 8: Graphical analysis Section 1 Extreme points What you need to know already: How to solve basic algebraic and trigonometric equations. All basic techniques
More informationA Simple Explanation of the Sobolev Gradient Method
A Simple Explanation o the Sobolev Gradient Method R. J. Renka July 3, 2006 Abstract We have observed that the term Sobolev gradient is used more oten than it is understood. Also, the term is oten used
More informationBasic Algorithms in Number Theory
Basic Algorithms in Number Theory Algorithmic Complexity... 1 Basic Algorithms in Number Theory Francesco Pappalardi Discrete Logs, Modular Square Roots & Euclidean Algorithm. July 20 th 2010 Basic Algorithms
More informationThe Number of Fields Generated by the Square Root of Values of a Given Polynomial
Canad. Math. Bull. Vol. 46 (1), 2003 pp. 71 79 The Number o Fields Generated by the Square Root o Values o a Given Polynomial Pamela Cutter, Andrew Granville, and Thomas J. Tucker Abstract. The abc-conjecture
More informationEfficient random number generation on FPGA-s
Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 313 320 doi: 10.14794/ICAI.9.2014.1.313 Efficient random number generation
More informationLecture 25: Heat and The 1st Law of Thermodynamics Prof. WAN, Xin
General Physics I Lecture 5: Heat and he 1st Law o hermodynamics Pro. WAN, Xin xinwan@zju.edu.cn http://zimp.zju.edu.cn/~xinwan/ Latent Heat in Phase Changes Latent Heat he latent heat o vaporization or
More information18-660: Numerical Methods for Engineering Design and Optimization
8-66: Numerical Methods or Engineering Design and Optimization Xin Li Department o ECE Carnegie Mellon University Pittsburgh, PA 53 Slide Overview Linear Regression Ordinary least-squares regression Minima
More informationON DIRICHLET S CONJECTURE ON RELATIVE CLASS NUMBER ONE
ON DIRICHLET S CONJECTURE ON RELATIVE CLASS NUMBER ONE AMANDA FURNESS Abstract. We examine relative class numbers, associated to class numbers of quadratic fields Q( m) for m > 0 and square-free. The relative
More informationAlgorithms (II) Yu Yu. Shanghai Jiaotong University
Algorithms (II) Yu Yu Shanghai Jiaotong University Chapter 1. Algorithms with Numbers Two seemingly similar problems Factoring: Given a number N, express it as a product of its prime factors. Primality:
More informationSummary Slides for MATH 342 June 25, 2018
Summary Slides for MATH 342 June 25, 2018 Summary slides based on Elementary Number Theory and its applications by Kenneth Rosen and The Theory of Numbers by Ivan Niven, Herbert Zuckerman, and Hugh Montgomery.
More informationAnalysis of the regularity, pointwise completeness and pointwise generacy of descriptor linear electrical circuits
Computer Applications in Electrical Engineering Vol. 4 Analysis o the regularity pointwise completeness pointwise generacy o descriptor linear electrical circuits Tadeusz Kaczorek Białystok University
More informationNumerical Solution of Ordinary Differential Equations in Fluctuationlessness Theorem Perspective
Numerical Solution o Ordinary Dierential Equations in Fluctuationlessness Theorem Perspective NEJLA ALTAY Bahçeşehir University Faculty o Arts and Sciences Beşiktaş, İstanbul TÜRKİYE TURKEY METİN DEMİRALP
More informationarxiv: v2 [math.co] 29 Mar 2017
COMBINATORIAL IDENTITIES FOR GENERALIZED STIRLING NUMBERS EXPANDING -FACTORIAL FUNCTIONS AND THE -HARMONIC NUMBERS MAXIE D. SCHMIDT arxiv:6.04708v2 [math.co 29 Mar 207 SCHOOL OF MATHEMATICS GEORGIA INSTITUTE
More informationSOME CHARACTERIZATIONS OF HARMONIC CONVEX FUNCTIONS
International Journal o Analysis and Applications ISSN 2291-8639 Volume 15, Number 2 2017, 179-187 DOI: 10.28924/2291-8639-15-2017-179 SOME CHARACTERIZATIONS OF HARMONIC CONVEX FUNCTIONS MUHAMMAD ASLAM
More informationPhysics 11 HW #6 Solutions
Physics HW #6 Solutions Chapter 6: Focus On Concepts:,,, Probles: 8, 4, 4, 43, 5, 54, 66, 8, 85 Focus On Concepts 6- (b) Work is positive when the orce has a coponent in the direction o the displaceent.
More informationThe Impact of Carries on the Complexity of Collision Attacks on SHA-1
The Impact o Carries on the Complexity o Collision Attacks on SHA-1 Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen Norbert.Pramstaller@iaik.tugraz.at Institute or Applied
More informationTewodros Amdeberhan, Dante Manna and Victor H. Moll Department of Mathematics, Tulane University New Orleans, LA 70118
The -adic valuation of Stirling numbers Tewodros Amdeberhan, Dante Manna and Victor H. Moll Department of Mathematics, Tulane University New Orleans, LA 7011 Abstract We analyze properties of the -adic
More informationProduct Matrix MSR Codes with Bandwidth Adaptive Exact Repair
1 Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair Kaveh Mahdaviani, Soheil Mohajer, and Ashish Khisti ECE Dept, University o Toronto, Toronto, ON M5S3G4, Canada ECE Dept, University o Minnesota,
More informationSliding Mode Control and Feedback Linearization for Non-regular Systems
Sliding Mode Control and Feedback Linearization or Non-regular Systems Fu Zhang Benito R. Fernández Pieter J. Mosterman Timothy Josserand The MathWorks, Inc. Natick, MA, 01760 University o Texas at Austin,
More informationNew Arithmetic Algorithms for Hereditarily Binary Natural Numbers
New Arithmetic Algorithms for Hereditarily Binary Natural Numbers Paul Tarau Department of Computer Science and Engineering University of North Texas SYNASC 2014 research supported by NSF grant 1423324
More informationCurve Sketching. The process of curve sketching can be performed in the following steps:
Curve Sketching So ar you have learned how to ind st and nd derivatives o unctions and use these derivatives to determine where a unction is:. Increasing/decreasing. Relative extrema 3. Concavity 4. Points
More informationPhysics 2B Chapter 17 Notes - First Law of Thermo Spring 2018
Internal Energy o a Gas Work Done by a Gas Special Processes The First Law o Thermodynamics p Diagrams The First Law o Thermodynamics is all about the energy o a gas: how much energy does the gas possess,
More informationSimpler Functions for Decompositions
Simpler Functions or Decompositions Bernd Steinbach Freiberg University o Mining and Technology, Institute o Computer Science, D-09596 Freiberg, Germany Abstract. This paper deals with the synthesis o
More informationFigure 1: Bayesian network for problem 1. P (A = t) = 0.3 (1) P (C = t) = 0.6 (2) Table 1: CPTs for problem 1. (c) P (E B) C P (D = t) f 0.9 t 0.
Probabilistic Artiicial Intelligence Problem Set 3 Oct 27, 2017 1. Variable elimination In this exercise you will use variable elimination to perorm inerence on a bayesian network. Consider the network
More informationScattered Data Approximation of Noisy Data via Iterated Moving Least Squares
Scattered Data Approximation o Noisy Data via Iterated Moving Least Squares Gregory E. Fasshauer and Jack G. Zhang Abstract. In this paper we ocus on two methods or multivariate approximation problems
More informationLawrence Somer Department of Mathematics, Catholic University of America, Washington, D.C (Submitted February 2001) 1. I N T R O D U C T I O N
THE EXISTENCE OF SPECIAL MULTIPLIERS OF SECOND-ORDER RECURRENCE SEQUENCES Walter Carlip Department of Mathematics and Computer Science Loyola University of Chicago, Chicago, Illinois 60626 Lawrence Somer
More informationIntroduction to Cryptology. Lecture 19
Introduction to Cryptology Lecture 19 Announcements HW6 due today HW7 due Thursday 4/20 Remember to sign up for Extra Credit Agenda Last time More details on AES/DES (K/L 6.2) Practical Constructions of
More informationReview D: Potential Energy and the Conservation of Mechanical Energy
MSSCHUSETTS INSTITUTE OF TECHNOLOGY Department o Physics 8. Spring 4 Review D: Potential Energy and the Conservation o Mechanical Energy D.1 Conservative and Non-conservative Force... D.1.1 Introduction...
More informationAlgorithmic Factorization of Polynomials over Number Fields
Rose-Hulman Institute of Technology Rose-Hulman Scholar Mathematical Sciences Technical Reports (MSTR) Mathematics 5-18-017 Algorithmic Factorization of Polynomials over Number Fields Christian Schulz
More informationApproximative Methods for Monotone Systems of min-max-polynomial Equations
Approximative Methods or Monotone Systems o min-max-polynomial Equations Javier Esparza, Thomas Gawlitza, Stean Kieer, and Helmut Seidl Institut ür Inormatik Technische Universität München, Germany {esparza,gawlitza,kieer,seidl}@in.tum.de
More informationThe achievable limits of operational modal analysis. * Siu-Kui Au 1)
The achievable limits o operational modal analysis * Siu-Kui Au 1) 1) Center or Engineering Dynamics and Institute or Risk and Uncertainty, University o Liverpool, Liverpool L69 3GH, United Kingdom 1)
More informationLecture notes: Algorithms for integers, polynomials (Thorsten Theobald)
Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) 1 Euclid s Algorithm Euclid s Algorithm for computing the greatest common divisor belongs to the oldest known computing procedures
More informationZEROS OF SPARSE POLYNOMIALS OVER LOCAL FIELDS OF CHARACTERISTIC p
ZEROS OF SPARSE POLYNOMIALS OVER LOCAL FIELDS OF CHARACTERISTIC p BJORN POONEN 1. Statement of results Let K be a field of characteristic p > 0 equipped with a valuation v : K G taking values in an ordered
More informationarithmetic properties of weighted catalan numbers
arithmetic properties of weighted catalan numbers Jason Chen Mentor: Dmitry Kubrak May 20, 2017 MIT PRIMES Conference background: catalan numbers Definition The Catalan numbers are the sequence of integers
More informationClassification of effective GKM graphs with combinatorial type K 4
Classiication o eective GKM graphs with combinatorial type K 4 Shintarô Kuroki Department o Applied Mathematics, Faculty o Science, Okayama Uniervsity o Science, 1-1 Ridai-cho Kita-ku, Okayama 700-0005,
More informationCS Data Structures and Algorithm Analysis
CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &
More informationD-MATH Algebra II FS18 Prof. Marc Burger. Solution 26. Cyclotomic extensions.
D-MAH Algebra II FS18 Prof. Marc Burger Solution 26 Cyclotomic extensions. In the following, ϕ : Z 1 Z 0 is the Euler function ϕ(n = card ((Z/nZ. For each integer n 1, we consider the n-th cyclotomic polynomial
More information