Algorithm for Equal Distribution of Identical Elements on One Dimensional Field

Size: px
Start display at page:

Download "Algorithm for Equal Distribution of Identical Elements on One Dimensional Field"

Transcription

1 Algorthm for Equal Dstrbuton of Identcal Elements on One Dmensonal Feld Mate Boban, Alen Lovrenčć Unversty of Zagreb, Faculty of Organzaton and Informatcs, Varaždn, Croata Mchael Kreutzer Technsche Unverstät Darmstadt, Darmstadt Centre for IT Securty Abstract: Ths paper descrbes an algorthm for an equal dstrbuton of m dentcal elements on onedmensonal feld of sze n wth m < n. Durng the development of the dscrete event smulaton of MANET (Moble Ad Hoc Networ), the need for equal dstrbuton of specal node roles (e.g. servers, clents or drectores) on the nodes had occurred. The soluton usng some of the exstng random number generators was out of the queston because we wanted to now to whch node had the role been assgned to so we needed an algorthmc soluton n order to predct on whch node whch types of roles wll be placed, f any. In the proposed algorthm, two specfc cases are regarded: trval case wth dstrbuton (n mod m) = 0, where every (n dv m) element of n s selected, and (n mod m) 0, where we mplement our algorthm. We show that usng the proposed algorthm the m elements are equally dstrbuted over sze n one-dmensonal feld. The algorthm s gven n pseudo-code and thoroughly commented. Keywords: one-dmensonal feld, algorthmc soluton. INTRODUCTION Durng the development of the dscrete event smulaton of MANET (Moble Ad Hoc Networ) for the purposes of the ARDOR project [5], we have come across the problem of specal node roles dstrbuton. Specfcally, when we were developng Java mplementaton of the servce dscovery protocol called HYDRA [6], we needed the algorthm whch wll dstrbute each of the node roles (namely clent, server and drectory) on the nodes n a way that we are able to determne where each of the node roles wll be placed, so we can set up the smulaton accordng to our preferences. The mportant fact s that the number of each node role (lets denote them wth m) s less than the number of the nodes (lets denote them wth n). The soluton where we dstrbute node roles every p = n m, was not satsfactory, because t would mean that there would be q (q = n mod m) nodes at the end of the nodes array that would not have node role assgned. Also, mplementng some of the random number generator functons was out of the queston, because the smulaton preferences couldn't be set up properly. Because of ths, we needed a soluton whch wll dstrbute node roles n a way that the mnmum dstance between two employed nodes s p, where p = n m, and the maxmum dstance s p+, where we have q (q = n mod m) of the sze p+ dstances, and m--q dstances of sze p. Also, the second condton the algorthm had to fulfll s that sze p and p+ dstances between employed nodes are unformly dstrbuted across the nodes, so that each node has equal "chance" to get each node role. Concernng the smulaton, t was mplemented n JST/SWANS (Java n Smulaton Tme/Scalable Wreless Ad hoc Networ Smulator, [3]) smulaton envronment. The rest of ths paper s structured as follows: We gve a formal descrpton of problem n Secton, provng that PS and GD problems are equvalent and defnng the optmal soluton to PS and GD problems. In Secton 3 we present a smple algorthmc soluton to the problems, whereas n Secton 4 we enhance the algorthmc soluton so the m- gaps of sze p and p+ are unformly dstrbuted across n (the number of nodes). Fnally, the paper concludes n Secton 5.

2 . FORMAL DESCRIPTION The problem we want to solve can be formally wrtten as followng: Process schedulng (PS): There are m processes and n processors, where m n. We have to dstrbute processes to processors n a way that maxmzes mnmal dstance between two employed processors, as well as t mnmzes maxmal dstance between processes. Formally, we have: x x < x mn j j max j j { } {,..., m,..., m} { } {,..., m,..., m} {,..., n}, where {,..., m} j where < j ( x x ) + ( x x ) + max mn Ths problem t rather unusual optmzaton problem, because t has two optmzaton functons whch have to be consdered. Example: Let we have 7 processors and 8 processes. Then optmal dstrbuton s gven wth followng vector (, 4, 6, 8, 0,, 4, 7). Gap Dstrbuton (GD): There s also an alternatve approach to the problem. We have m- gaps between employed processors. The gap sze s gven by formula δ =x + -x. Sum of all dstances should be n-. Now the problem could be formally wrtten as follows: m δ = n = mn δ max {,..., m } max δ mn {,..., m } Proposton : Problems PS and GD are equvalent problems. Proof: Let we have m processes and n processors. Then we clearly have m- dstances. Let (x,, x n ) be soluton for PS problem. Then vector (x -x,, x n -x n- ) gves soluton of problem GD, and vce versa. Q.E.D. Soluton : Let n be the number of processors and m number of processes. The nteger dvson of (n- ) and (m-) gves (n-)/(m-)=p (n-)=q mod (m-) Then we clam that optmal soluton to GD problem s every vector that has q values of p+ and n-q- values p. Theorem : Soluton descrbed n Soluton s optmal for GD problem. Proof: We have to prove that there s at least one gap that s less or equal to p. For m= the problem s trval. Let us assume therefore that m>. Let us assume that all gaps are greater than p. That means that all gaps are greater or equal to p+. It s easy to see that f there s m processes then there s m- gaps. Let x,, x m- be these gaps. Now we have m = x ( m ) ( p + ) = ( m ) p + ( m ) = n + m > n But ths s contradcton. So, we conclude that assumpton that all gaps are greater than p s wrong. In

3 other words, at least one of the gaps has to be less or equal to p. It s easy to see, by the defnton of the GD problem that m = x = n Let us assume that (n-) = q mod (m-) Then n = ( m ) p + q If q=0 then t s obvous that optmal soluton has to have all gaps of sze p. Let q>0. In ths case we have at least one gap whose sze s greater than p. In the other words, there has to be at least one gap wth sze greater or equal to p+. So, by the mnmzaton condton, t would be optmal f we could mae a decson wth maxmal gap of sze p+. But, as q<(m-), we can mae soluton that has q gaps of sze p+, and m-q- gaps of sze p. The wanted soluton s Soluton. Therefore, the soluton s optmal for GD problem. Q.E.D. Therefore, we have a very smple algorthm whch gves an optmal soluton of PS problem. 3. ALGORITHMIC SOLUTION Gap sze 4 3 Gap dstrbuton n = 6, m = Dstance between: Fgure. Algorthm gap dstrbuton Pseudo-code of Algorthm : CLASS dstrbute(n,m) //n represents number of processors, whle m represents number of processes nt p = (n-)/(m-) //we use n- and m- because frst process always goes //to frst processor nt q = (n-)mod(m-) CREATE ntegerarray[m-] //create nteger array of gaps FOR counter = 0 TO q DO ntegerarray[counter] = p+ //set frst q gaps to sze p+ ENDFOR FOR counter = q+ TO m- DO ntegerarray[counter] = p //set the rest of the gaps to sze p ENDFOR ENDCLASS Bascally, Algorthm dstrbutes gaps n a way that t sets the frst q gaps to sze p+, and the rest of the gaps (m-q-) to sze p. For example, f n = 6, m =, Algorthm wll place gaps as shown n Fg.. It s easy to see that ths algorthm has complexty of O(m), where m s number of processes. 4. ENHANCED ALGORITHMIC SOLUTION There s one more condton that we want to nclude n our soluton. Algorthm gves soluton that maes the frst q gaps of sze p+ and the last m-q- gaps of sze p. We want to fnd a soluton n whch gaps of sze p+ are unformly dstrbuted through the number of processors. Algorthm :

4 To create a soluton n whch gaps of sze p+ are unformly dstrbuted, we devsed an algorthm where we frst mae all the m- gaps of sze p, and afterwards we add the q of the remanng p+ gaps onto the gaps array replacng the exstng sze p gaps wth sze p+ gaps n the followng manner: Frst, we determne the mddle gap,.e. we fnd the mddle of the sze m- gaps array ; f m necessary, the value s rounded up to celng (.e. mddle = ). In the mddle element of the gaps array we replace sze p gap wth sze p+ gap. In the same (quc sort) manner, we are determnng the mddle of the newly created gaps array parts and placng sze p+ gaps nstead of sze p gaps on the mddle elements. Ths means that n the frst teraton over gaps array we are placng one sze p+ gap, n the second two sze p+ gaps, then 4, 8, 6, 3 etc. + So, we have = where equals the number of teratons over sze m- gaps array. = When we now ths, t s easy to calculate how many teratons we wll need to place q gaps of sze p+ over sze m- gaps array : + q + q + / log ( + ) log log( q + ) log( q + ) + log log( q + ) log. e. log( q + ) = log We are sure we wll be able to replace q sze p gaps wth sze p+ gaps n the teraton. However, t s obvous that we wll be able to unformly dstrbute q gaps over m- sze gaps array only f q = j, where j {,,3,... } (f q j, then the last teraton wll not reach the end of the gaps array, thus leadng to non-unformed dstrbuton). t log(q + ) Because of that, we frst dstrbute q gaps of sze p+, where t =. By dong log ths, we ensure that t gaps of sze p+ wll be unformly dstrbuted over m- sze gaps array. t Now we have z = q of sze p+ gaps left to dstrbute, and we wll dstrbute them n the r log(z + ) same manner,.e. n the next teraton we wll dstrbute z, where r = and log so on, untl there s no sze p+ gaps to dstrbute. Ths ensures us much better soluton to the GD (Gap Dstrbuton) problem. Pseudo-code of Algorthm : In pseudo-code we are usng the concept of borders: we ntroduce (left, rght) pars of borders for dstrbuted sze p+ gaps to ease the calculaton of the mddle element ("mddle gap") n the "gaps array". Therefore, the borders array s created. The frst (left, rght) par s the frst and the last element of the "gaps array"; (left, rght) = (0, m-). Example: m- = 9, q = 3 ndex: start p p p p p p p p p left,rght par: (0,8)

5 ndex: st teraton p p p p p+ p p p p left,rght pars: (0,3);(5,8) ndex: nd teraton p p p+ p p+ p p p+ p left,rght pars: (0,);(3,3);(5,6);(8,8) Table. Placement of the borders CLASS dstrbute(n,m) //n represents number of processors, whle m represents number of processes CREATE ArrayLst //create arraylst of sze 0 leftborder = //frst value of left border s zero rghtborder = no_of_nodes //frst value of rght border s the number of nodes arraylst.add(leftborder) //nsert left border arraylst.add(rghtborder) nt p = (n-)/(m-) nt q = (n-)mod(m-) CREATE ntegerarray[m-] //nsert rght border //we use n- and m- because frst process always //goes to the frst processor //create nteger array of gaps FOR counter = 0 TO m- DO ntegerarray[counter] = p //set all gaps to sze p ENDFOR nt = floor(log(q+)/log()) - log(q + ) = log nt SumOfPowerOfTwo = power(,) - //n frst teraton, we wll dstrbute p+ gaps WHILE(SumOfPowerOfTwo > 0) DO mddle = celng((leftborder+rghtborder)/) //fnd the mddle of the observed part of the gaps array, round t up to celng. ntarray[mddle++] //the gap n the mddle of the observed part of the nodes array becomes p+ poweroftwo-- //subtract one gap change At ths pont, we had splt our observed part of the nodes array nto two (as smlar n sze as possble) parts, so now we have to add two new borders, one wth the value that s (mddle - ); ths border s referred to as rghtborder and another wth the value (mddle + ); ths border s referred to as leftborder. Orgnal leftborder and rghtborder wll be the new (left, rght) par n the ArrayLst, and so wll leftborder and orgnal rghtborder. leftborder = mddle + rghtborder = mddle - The next part of the code s executed f the orgnal (n ths teraton) leftborder s less or equal to the new rghtborder AND f the orgnal (n ths teraton) rghtborder s not the last border n array,.e. t s not representng the last element of the "gaps array". IF (leftborder <= rghtborder) AND (rghtborder < no_of_nodes) THEN IF (leftborder + == rghtborder) THEN //don t add borders, leftborder and rghtborder are next to each other, //so we just fetch the next left rght border par store = arraylst. IndexOf(rghtBorder) left = arraylst.get(store + ) rght = arraylst.get(store + ) ELSE //add new borders store = arraylst.indexof(leftborder) //nsert rghtborder and leftborder between left and rght

6 arraylst.add(store +,rghtborder) arraylst.add(store +,leftborder) store = arraylst.indexof(rghtborder) //fetch the next left rght border par leftborder = arraylst.get(store + ) rghtborder = arraylst.get(store + ) The next part of the code s executed f the orgnal (n ths teraton) leftborder s less or equal to the new rghtborder: f leftborder and rghtborder are next to each other, we wll not add borders between them because t maes no sense, and f they are not next to each other we add a new border par. In both cases we are startng the next whle loop step from the start of the borders array. ELSEIF (leftborder <= rghtborder) THEN IF (leftborder + == rghtborder) THEN //don t add borders, leftborder and rghtborder are next to each other left = arraylst.get(0) // fetch the next left, rght border par rght = arraylst.get() ELSE store = arraylst.indexof(leftborder) //nsert rghtborder and leftborder between orgnal borders arraylst.add(store +,rghtborder) arraylst.add(store +,leftborder) //fetch the frst left rght border par of ArrayLst leftborder = arraylst.get(0) rghtborder = arraylst.get() The next part of the code s executed f the orgnal (n ths teraton) leftborder s equal to orgnal (n ths teraton) rghtborder (.e. leftborder = rghtborder). If we haven't reached the end of the borders array, we fetch the next (left, rght) par, else we start from the begnnng of the array. ELSEIF (leftborder == rghtborder) THEN IF((arrayLst.sze- > arraylst.ndexof(rghtborder))then store = arraylst.indexof(rghtborder) //fetch the next left rght par leftborder = arraylst.get(store + ) rghtborder = arraylst.get(store + ) ELSE //fetch the frst left rght par of ArrayLst leftborder = arraylst.get(0) rghtborder = arraylst.get() ELSE brea ENDWHILE IF q = SumOfPowerOfTwo THEN end algorthm //f q = ELSE nt remander = q - power(,) - //we stll have q gaps to dstrbute reman(num_of_border_pars, remander) If q there are stll some sze p+ gaps to dstrbute and we have mplemented recursve functon to dstrbute q of sze p+ gaps over the created border pars: actually, the remander of sze p+ gaps wll be placed n the mddle of the border pars, each sze p+ gap deletng the border par nsde whch t s placed (ths s done to enhance the unformty of dstrbuton: f we delete the border par nsde whch a gap replacement happens, we are sure no more gap replacements

7 wll occur between deleted borders par. Ths means that n the followng recursve functon, gap replacements wll happen only once between the created borders). FUNCTION reman (Num_of_border_pars, remander) IF (remander == ) THEN PowerOfTwo = //f we have just one p+ gap to place ELSE nt = celng(log(remander)/log()) - PowerOfTwo = power(, ) IF (remander > 0) THEN nt step = Num_of_border_pars/PowerOfTwo //calculate the step for gap dstrbuton Num_of_border_pars = Num_of_border_pars - PowerOfTwo //deduct the border pars that wll be removed n ths recurson leftborder = arraylst.get(0) rghtborder = arraylst.get() //fetch the frst border par remander = remander - PowerOfTwo //deduct the number of gaps that wll be placed n ths recurson WHILE (PowerOfTwo > 0) DO mddle = celng((leftborder+rghtborder)/) //fnd the mddle of the observed part of the gaps array, round t up to celng. ntarray[mddle++] //the gap n the mddle of the observed part of the nodes array becomes p+ //nstead of p. arraylst.remove(left) //remove the (left,rght) border par arraylst.remove(rght) leftborder = arraylst.get(store + *step - ) rghtborder = arraylst.get(store + *step) //get the next (left,rght) border par usng stored ponter and step of gaps //placement store = arraylst.indexof(rght) //set the ponter to rght border PowerOfTwo-- ENDWHILE reman(num_of_border_pars, remander) ELSE END ALGORITHM ENDFUNCTION ENDCLASS t In ths functon n each recurson we are dstrbutng gaps, where each placed gap deletes the border par nsde whch t s placed. We are able to do t because we have created border pars, ( > t) and t t, mod = 0 so we are sure recurson wll termnate approprately and all the p+ sze gaps wll be placed nstead of the p sze gaps. As an example, Fg. shows Algorthm gap dstrbuton usng the same n and m values (n = 6, m = ) used by Algorthm shown n Fg. Gap sze 4 3 Gap dstrbuton n = 6, m = Dstance between: Fgure. Algorthm gap dstrbuton

8 Let us see the complexty of ths algorthm. The frst part of the algorthm, n whch we mae all gaps of dstance p, s very smlar to the basc algorthm and has complexty of O(n). The complexty of second part of the algorthm s not so obvous. In ths part of the algorthm we use dvde-and-conquer method, and the complexty of ths part wll be presented by dvde-and conquer recurson: T ( m) = c + T ( m ) Let us use substtuton s = T ( ) () Then ( T ( ) = s = c + T ) = c + T ( ) = c + s The recurson s = c + s has soluton s = C + C (see []). But, because of substtuton () we have the followng formula: T ( m) C + C m That means that the second part of the algorthm has also complexty of O(m), so we can conclude that algorthm has as well as algorthm, complexty of O(m). 5. CONCLUSION In ths paper we develop an algorthm for unform dstrbuton of specfc node roles (clent, server and drectory) across the nodes. We fulfll the demands of the mnmum dstance between two employed nodes, p, where p = n m, and the maxmum dstance, p+, and we also fulfll the demand of unform dstrbuton of the p and p+ dstances across the nodes. There has been a lot of smlar wor n the feld of optmal puncturng scheme for the selecton of the bts for retransmsson n forward error correcton (FEC) and Channel codng [], []. The mnmal dstance between punctured bts s needed n puncturng algorthm also. However, wth puncturng, there s one more constrant: punctured bts have to be dstrbuted on all frames evenly, frames beng represented by two dmensonal array, each frame beng one column. Ths mples that some of the p+ dstances wll be changed n p, resultng wth sub optmal number of p and p+ dstances. Algorthm we developed has exactly q (q = n mod m) of the sze p+ dstances and the rest of the dstances s sze p. Also, algorthm has complexty of O(m), m beng the number of roles to dstrbute. Future research we ntend to conduct ncludes development of the algorthm for unform dstrbuton of the specal node roles regardng already dstrbuted roles of dfferent type. Specfcally, algorthm presented n ths paper, although t dstrbutes roles of one type as evenly as possble, t does not consder the collson of dfferent types of node roles. We ntend to ncorporate "role awareness" n our presented algorthm. REFERENCES [] 3GPP TSG RAN WG (999) R Optmsed puncturng scheme for Turbo codng Fujtsu. [] 3GPP TSG RAN WG (999) R-9964 Propertes of optmsed puncturng scheme, Semens. [3] Barr, Rmon (004) Java n Smulaton Tme/Scalable Wreless Ad hoc Networ Smulator, [4] Dvja,B.; Lovrenčć, A. (005) Dsretna matemata s teorjom grafova (Dscrete Mathematcs wth Graph Theory), TIVA-FOI, Varaždn [5] Kreutzer, Mchael; Kähmer, Martn (004) Ubqutous Computng Technology n Infrastructureless Envronments, Proceedngs of the IEEE Internatonal Conference on Systems, Man and Cybernetcs (IEEE SMC 004). Den Haag, Nederland 004. [6] Kreutzer, Mchael; Kähmer, Martn; Magdc, Karlo (004) Scalable Servce Dscovery n MANETS exemplfed n Moble Hosptals, IADIS e-socety, Avla, Span 004.

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

find (x): given element x, return the canonical element of the set containing x;

find (x): given element x, return the canonical element of the set containing x; COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:

More information

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES BÂRZĂ, Slvu Faculty of Mathematcs-Informatcs Spru Haret Unversty barza_slvu@yahoo.com Abstract Ths paper wants to contnue

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Math Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University

Math Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University Math Revew CptS 223 dvanced Data Structures Larry Holder School of Electrcal Engneerng and Computer Scence Washngton State Unversty 1 Why do we need math n a data structures course? nalyzng data structures

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence) /24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

Chapter Newton s Method

Chapter Newton s Method Chapter 9. Newton s Method After readng ths chapter, you should be able to:. Understand how Newton s method s dfferent from the Golden Secton Search method. Understand how Newton s method works 3. Solve

More information

Economics 101. Lecture 4 - Equilibrium and Efficiency

Economics 101. Lecture 4 - Equilibrium and Efficiency Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of

More information

An Interactive Optimisation Tool for Allocation Problems

An Interactive Optimisation Tool for Allocation Problems An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Singular Value Decomposition: Theory and Applications

Singular Value Decomposition: Theory and Applications Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k. THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty

More information

Some modelling aspects for the Matlab implementation of MMA

Some modelling aspects for the Matlab implementation of MMA Some modellng aspects for the Matlab mplementaton of MMA Krster Svanberg krlle@math.kth.se Optmzaton and Systems Theory Department of Mathematcs KTH, SE 10044 Stockholm September 2004 1. Consdered optmzaton

More information

Section 3.6 Complex Zeros

Section 3.6 Complex Zeros 04 Chapter Secton 6 Comple Zeros When fndng the zeros of polynomals, at some pont you're faced wth the problem Whle there are clearly no real numbers that are solutons to ths equaton, leavng thngs there

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Lecture 4: Constant Time SVD Approximation

Lecture 4: Constant Time SVD Approximation Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Solutions to exam in SF1811 Optimization, Jan 14, 2015

Solutions to exam in SF1811 Optimization, Jan 14, 2015 Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable

More information

Dr. Ing. J. H. (Jo) Walling Consultant Cables Standards Machinery

Dr. Ing. J. H. (Jo) Walling Consultant Cables Standards Machinery The common mode crcut resstance unbalance (CMCU) calculaton based on mn. / max. conductor resstance values and par to par resstance unbalance measurements ncludng loop resstance evsed and extended verson

More information

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition Sngle-Faclty Schedulng over Long Tme Horzons by Logc-based Benders Decomposton Elvn Coban and J. N. Hooker Tepper School of Busness, Carnege Mellon Unversty ecoban@andrew.cmu.edu, john@hooker.tepper.cmu.edu

More information

Maximal Margin Classifier

Maximal Margin Classifier CS81B/Stat41B: Advanced Topcs n Learnng & Decson Makng Mamal Margn Classfer Lecturer: Mchael Jordan Scrbes: Jana van Greunen Corrected verson - /1/004 1 References/Recommended Readng 1.1 Webstes www.kernel-machnes.org

More information

DUE: WEDS FEB 21ST 2018

DUE: WEDS FEB 21ST 2018 HOMEWORK # 1: FINITE DIFFERENCES IN ONE DIMENSION DUE: WEDS FEB 21ST 2018 1. Theory Beam bendng s a classcal engneerng analyss. The tradtonal soluton technque makes smplfyng assumptons such as a constant

More information

Module 2. Random Processes. Version 2 ECE IIT, Kharagpur

Module 2. Random Processes. Version 2 ECE IIT, Kharagpur Module Random Processes Lesson 6 Functons of Random Varables After readng ths lesson, ou wll learn about cdf of functon of a random varable. Formula for determnng the pdf of a random varable. Let, X be

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

Note on EM-training of IBM-model 1

Note on EM-training of IBM-model 1 Note on EM-tranng of IBM-model INF58 Language Technologcal Applcatons, Fall The sldes on ths subject (nf58 6.pdf) ncludng the example seem nsuffcent to gve a good grasp of what s gong on. Hence here are

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

p 1 c 2 + p 2 c 2 + p 3 c p m c 2

p 1 c 2 + p 2 c 2 + p 3 c p m c 2 Where to put a faclty? Gven locatons p 1,..., p m n R n of m houses, want to choose a locaton c n R n for the fre staton. Want c to be as close as possble to all the house. We know how to measure dstance

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Hashing. Alexandra Stefan

Hashing. Alexandra Stefan Hashng Alexandra Stefan 1 Hash tables Tables Drect access table (or key-ndex table): key => ndex Hash table: key => hash value => ndex Man components Hash functon Collson resoluton Dfferent keys mapped

More information

The Gaussian classifier. Nuno Vasconcelos ECE Department, UCSD

The Gaussian classifier. Nuno Vasconcelos ECE Department, UCSD he Gaussan classfer Nuno Vasconcelos ECE Department, UCSD Bayesan decson theory recall that we have state of the world X observatons g decson functon L[g,y] loss of predctng y wth g Bayes decson rule s

More information

Normally, in one phase reservoir simulation we would deal with one of the following fluid systems:

Normally, in one phase reservoir simulation we would deal with one of the following fluid systems: TPG4160 Reservor Smulaton 2017 page 1 of 9 ONE-DIMENSIONAL, ONE-PHASE RESERVOIR SIMULATION Flud systems The term sngle phase apples to any system wth only one phase present n the reservor In some cases

More information

Chapter 12. Ordinary Differential Equation Boundary Value (BV) Problems

Chapter 12. Ordinary Differential Equation Boundary Value (BV) Problems Chapter. Ordnar Dfferental Equaton Boundar Value (BV) Problems In ths chapter we wll learn how to solve ODE boundar value problem. BV ODE s usuall gven wth x beng the ndependent space varable. p( x) q(

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture #16 Scribe: Yannan Wang April 3, 2014

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture #16 Scribe: Yannan Wang April 3, 2014 COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture #16 Scrbe: Yannan Wang Aprl 3, 014 1 Introducton The goal of our onlne learnng scenaro from last class s C comparng wth best expert and

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

SOLVING CAPACITATED VEHICLE ROUTING PROBLEMS WITH TIME WINDOWS BY GOAL PROGRAMMING APPROACH

SOLVING CAPACITATED VEHICLE ROUTING PROBLEMS WITH TIME WINDOWS BY GOAL PROGRAMMING APPROACH Proceedngs of IICMA 2013 Research Topc, pp. xx-xx. SOLVIG CAPACITATED VEHICLE ROUTIG PROBLEMS WITH TIME WIDOWS BY GOAL PROGRAMMIG APPROACH ATMII DHORURI 1, EMIUGROHO RATA SARI 2, AD DWI LESTARI 3 1Department

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.

More information

New modular multiplication and division algorithms based on continued fraction expansion

New modular multiplication and division algorithms based on continued fraction expansion New modular multplcaton and dvson algorthms based on contnued fracton expanson Mourad Goucem a a UPMC Unv Pars 06 and CNRS UMR 7606, LIP6 4 place Jusseu, F-75252, Pars cedex 05, France Abstract In ths

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

18.1 Introduction and Recap

18.1 Introduction and Recap CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng

More information

Vapnik-Chervonenkis theory

Vapnik-Chervonenkis theory Vapnk-Chervonenks theory Rs Kondor June 13, 2008 For the purposes of ths lecture, we restrct ourselves to the bnary supervsed batch learnng settng. We assume that we have an nput space X, and an unknown

More information

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Definition. Measures of Dispersion. Measures of Dispersion. Definition. The Range. Measures of Dispersion 3/24/2014

Definition. Measures of Dispersion. Measures of Dispersion. Definition. The Range. Measures of Dispersion 3/24/2014 Measures of Dsperson Defenton Range Interquartle Range Varance and Standard Devaton Defnton Measures of dsperson are descrptve statstcs that descrbe how smlar a set of scores are to each other The more

More information

Société de Calcul Mathématique SA

Société de Calcul Mathématique SA Socété de Calcul Mathématque SA Outls d'ade à la décson Tools for decson help Probablstc Studes: Normalzng the Hstograms Bernard Beauzamy December, 202 I. General constructon of the hstogram Any probablstc

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

CHALMERS, GÖTEBORGS UNIVERSITET. SOLUTIONS to RE-EXAM for ARTIFICIAL NEURAL NETWORKS. COURSE CODES: FFR 135, FIM 720 GU, PhD

CHALMERS, GÖTEBORGS UNIVERSITET. SOLUTIONS to RE-EXAM for ARTIFICIAL NEURAL NETWORKS. COURSE CODES: FFR 135, FIM 720 GU, PhD CHALMERS, GÖTEBORGS UNIVERSITET SOLUTIONS to RE-EXAM for ARTIFICIAL NEURAL NETWORKS COURSE CODES: FFR 35, FIM 72 GU, PhD Tme: Place: Teachers: Allowed materal: Not allowed: January 2, 28, at 8 3 2 3 SB

More information

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1 Estmatng the Fundamental Matrx by Transformng Image Ponts n Projectve Space 1 Zhengyou Zhang and Charles Loop Mcrosoft Research, One Mcrosoft Way, Redmond, WA 98052, USA E-mal: fzhang,cloopg@mcrosoft.com

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree

More information

THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY. William A. Pearlman. References: S. Arimoto - IEEE Trans. Inform. Thy., Jan.

THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY. William A. Pearlman. References: S. Arimoto - IEEE Trans. Inform. Thy., Jan. THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY Wllam A. Pearlman 2002 References: S. Armoto - IEEE Trans. Inform. Thy., Jan. 1972 R. Blahut - IEEE Trans. Inform. Thy., July 1972 Recall

More information

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s

More information

Lecture 3. Ax x i a i. i i

Lecture 3. Ax x i a i. i i 18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem. prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove

More information

APPROXIMATE PRICES OF BASKET AND ASIAN OPTIONS DUPONT OLIVIER. Premia 14

APPROXIMATE PRICES OF BASKET AND ASIAN OPTIONS DUPONT OLIVIER. Premia 14 APPROXIMAE PRICES OF BASKE AND ASIAN OPIONS DUPON OLIVIER Prema 14 Contents Introducton 1 1. Framewor 1 1.1. Baset optons 1.. Asan optons. Computng the prce 3. Lower bound 3.1. Closed formula for the prce

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

4DVAR, according to the name, is a four-dimensional variational method.

4DVAR, according to the name, is a four-dimensional variational method. 4D-Varatonal Data Assmlaton (4D-Var) 4DVAR, accordng to the name, s a four-dmensonal varatonal method. 4D-Var s actually a drect generalzaton of 3D-Var to handle observatons that are dstrbuted n tme. The

More information

Chapter 6. Supplemental Text Material

Chapter 6. Supplemental Text Material Chapter 6. Supplemental Text Materal S6-. actor Effect Estmates are Least Squares Estmates We have gven heurstc or ntutve explanatons of how the estmates of the factor effects are obtaned n the textboo.

More information

Lecture 10 Support Vector Machines. Oct

Lecture 10 Support Vector Machines. Oct Lecture 10 Support Vector Machnes Oct - 20-2008 Lnear Separators Whch of the lnear separators s optmal? Concept of Margn Recall that n Perceptron, we learned that the convergence rate of the Perceptron

More information

A Simple Inventory System

A Simple Inventory System A Smple Inventory System Lawrence M. Leems and Stephen K. Park, Dscrete-Event Smulaton: A Frst Course, Prentce Hall, 2006 Hu Chen Computer Scence Vrgna State Unversty Petersburg, Vrgna February 8, 2017

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Fundamental loop-current method using virtual voltage sources technique for special cases

Fundamental loop-current method using virtual voltage sources technique for special cases Fundamental loop-current method usng vrtual voltage sources technque for specal cases George E. Chatzaraks, 1 Marna D. Tortorel 1 and Anastasos D. Tzolas 1 Electrcal and Electroncs Engneerng Departments,

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Case Study of Markov Chains Ray-Knight Compactification

Case Study of Markov Chains Ray-Knight Compactification Internatonal Journal of Contemporary Mathematcal Scences Vol. 9, 24, no. 6, 753-76 HIKAI Ltd, www.m-har.com http://dx.do.org/.2988/cms.24.46 Case Study of Marov Chans ay-knght Compactfcaton HaXa Du and

More information

First day August 1, Problems and Solutions

First day August 1, Problems and Solutions FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information