Mapping the Discrete Logarithm: Talk 2

Size: px
Start display at page:

Download "Mapping the Discrete Logarithm: Talk 2"

Transcription

1 Mapping the Discrete Logarithm: Talk 2 Joshua Holden Joint work with Daniel Cloutier, Nathan Lindle (Senior Theses), Max Brugger, Christina Frederick, Andrew Hoffman, and Marcus Mace (RHIT REU) Rose-Hulman Institute of Technology Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 1 / 45

2 The Question Definition A functional graph is a directed graph such that each vertex must have exactly one edge directed out from it. Definition An m-ary functional graph is a functional graph where each node has in-degree of exactly zero or m. We are investigating the functional graph induced by the discrete exponentiation map x g x mod p. Question How much does the discrete exponentiation functional graph (DEFG) look like a random graph? (By random graph we mean a randomly chosen graph of a specified type on a specified number of nodes.) Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 2 / 45

3 Example: x 3 x mod 23 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 3 / 45

4 Some Measurements of Interest Number of connected components Number of cyclic nodes Number of image nodes Average component size (as seen from a node) Average cycle length (as seen from a node) Average tail length (as seen from a node) Maximum cycle length Maximum tail length Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 4 / 45

5 Strategy 1 Figure out what a random graph looks like. (Combinatorics exponential generating functions, Analysis) 2 Figure out what a discrete exponentiation functional graph (DEFG) looks like. (Number Theory, Computation) 3 Compare. (Statistics) Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 5 / 45

6 First Example of Exponential Generating Functions A permutation consists of a set of components, each of which is a (nonempty) cycle of nodes. The number of ways to make nodes into a (nonempty) cycle is counted by x + 2! x 2 2 2! + 3! 3 x 3 3! + = x + x x 3 ( = ln The number of ways to make a permutation is counted by e ln( 1 1 x ) = 1 1 x = 1 + 1!x + 2!x 2 So there are n! permutations on n nodes. 1 x 2! + 3!x 3 3! +. ). Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 6 / 45

7 Second Example of Exponential Generating Functions A component of a functional graph is a cycle of rooted trees (connected by their roots). The number of ways to make a rooted tree is counted by t(x) such that t(x) = xe t(x), so t(x) = W ( x). The number of ways to make nodes into these components is counted by ( ) ( ) c(x) = ln = ln. 1 1 t(x) W ( x) The number of ways to make nodes into a functional graph is counted by f (x) = e c(x) = n=0 n n x n n!. So there are n n functional graphs on n nodes. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 7 / 45

8 Third Example of Exponential Generating Functions A component of a binary functional graph (bfg) is a cycle of nodes, each of which is connected to a binary tree. The number of ways to make a binary tree is counted by b(x) such that b(x) = x + x b(x)2 1, so b(x) = 2 1 2x 2. x The number of ways to make nodes into these components is counted by ( ) ( ) 1 1 c 2 (x) = ln = ln. 1 xb(x) 1 2x 2 The number of ways to make nodes into a bfg is counted by ( ) 2n (2n)! f 2 (x) = e c2(x) x 2n = n 2 n (2n)!. n=0 So there are ( ) 2n (2n)! n 2 binary functional graphs on 2n nodes. n Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 8 / 45

9 Bivariate Egf s Now we can count a total number of functional graphs. How can we find out what a random one looks like? Theorem Let f n be the number of ways to carry out a task on {1,..., n}, n 1. Let g n be the number of ways to carry out a second task on {1,..., n}. Let h k,n be the number of ways to split {1,..., n} into k disjoint nonempty subsets, carry out the first task on each subset, and carry out the second task on the set of subsets. x i Let F(x) = f i i!, G(x) = x i g i i!, and H(x, u) = h k,i u k x i i!. i=1 Then H(x, u) = G(uF(x)). i=0 k,i=0 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 9 / 45

10 Examples of Bivariate Egf s The number of ways to make n nodes into a functional graph with k components is counted by ( ) ξ(x, u) = e uc(x) = e u ln 1 1+W ( x) = 1 + 1ux + (3u + 1u 2 ) x 2 2! + (17u + 9u2 + 1u 3 ) x 3 3! + The number of ways to make n nodes into a bfg with k components is counted by ξ 2 (x, u) = e uc 2(x) = e u ln = 1 + 2u x 2 ( ) 1 1 2x 2 2! + (24u + 12u2 ) x 4 4! + Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 10 / 45

11 Weighted Totals Now we can get total measurements. Theorem (Differentiation Formula) Let f n be the number of ways to carry out a task on {1,..., n}, n 1. Let g n be the number of ways to carry out a second task on {1,..., n}. Let h n be the number of ways to split {1,..., n} into zero or more disjoint nonempty subsets, carry out the first task on each subset, and carry out the second task on the set of subsets, with each way weighted by the number of subsets. x i Let F(x) = f i i!, G(x) = x i g i i!, and H(x) = i=1[ ] i=0 i=0 Then H(x) = u G(uF(x)). u=1 h i x i i!. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 11 / 45

12 Example of Average Measurements The total number of components in all functional graphs with n nodes is counted by [ ] ( ) 1 Ξ(x) = u euc(x) = u=1 1 + W ( x) ln W ( x) = 1x + 5 x ! + 38x 3! + 390x 4! +. So the average number of components in a functional graph with n nodes is 1, 5 2 2, , ,.... Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 12 / 45

13 Example of Variance Measurements The sum of squares of the number of components in all functional graphs with n nodes is counted by [ ( )] Ξ (x) = u u u euc(x) u=1 ( ( ) ( )) 1 1 = ln + ln W ( x) 1 + W ( x) 1 + W ( x) = 1x + 7 x 2 2! + 62x 3 3! + 700x 4 4! +. ( N ) Then we use the formula Var(z) = 1 N i=1 z 2 i z 2. So the variance in the number of components in a functional graph with (e.g.) 2 nodes is ( ) = Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 13 / 45

14 Example of Cumulative Measurements We want to find the average cycle length as seen from a node over all functional graphs. Every node in a component sees the cycle length of that component. So each component should be weighted by the number of nodes times the number of cyclic nodes. This is counted by [ 2 Ξ(x) = u w ec(x) = 1x + 10 x 2 ] 1 = 1 ut(wx) u=1,w=1 2! + 117x 3 3! x 4 4! +. W ( x) (1 + W ( x)) 4 Then we divide by the number of graphs and the number of nodes in each graph. So the average cycle length as seen from a node is 1, , , 1648,... for n = 1, 2, 3, 4,... nodes Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 14 / 45

15 Extremal Measurements Theorem Let f n be the number of ways to carry out a task on {1,..., n}, n 1. Let g n be the number of ways to carry out a second task on {1,..., n}. Let h n be the number of ways to split {1,..., n} into zero or more disjoint nonempty subsets, carry out the first task on each subset, and carry out the second task on the set of subsets, with each way weighted by the size of the largest subset. x i k Let F(x) = f i i!, F [k] (x) = i=1 i=1 x i G(x) = g i i!, and H(x) = i=0 Then H(x) = k=0 i=0 f i x i i!, h i x i i!. [ ] G(F(x)) G(F [k] (x)). Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 15 / 45

16 Explanation of the Extremal Measurements Formula G(F(x)) counts the number of ways to carry out both tasks. G(F [k] (x)) counts the number of ways to carry out both tasks if the largest subset has size at most k. So [ G(F(x)) G(F [k] (x)) ] counts the number of ways to carry out both tasks if the largest subset has size at least k + 1. Let H i (x) count the number of ways to carry out both tasks if the largest subset has size exactly i. Then H(x) = = = ih i (x) = i=1 k=1 k=0 i=1 k=1 i H i (x) = [ G(F(x)) G(F [k 1] (x)) [ ] G(F(x)) G(F [k] (x)) k=1 i=k ] H i (x) Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 16 / 45

17 Example of Extremal Measurements Recall that a permutation consists of a set of components, each of which is a (nonempty) cycle of nodes. The number of ways to make nodes into a (nonempty) cycle is counted by x + 2! x 2 2 2! + 3! 3 x 3 3! + = x + x x 3 ( = ln 1 x The number of ways to make a permutation weighted by the size of the largest cycle is counted by [ e ln( ] 1 1 x ) k e i=1 xi i = x + 3 x ! + 13x 3! + 67x 4! +. k=0 So the average maximum cycle size in a permutation with n nodes is 1, 3 2!, 13 3!, 67,... for n = 1, 2, 3, 4,... nodes. 4! ). Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 17 / 45

18 Random Graph Measurements (Standard Results from Literature) The expected mean values for the measurements of interest in a random functional graph of size n, as n, are: Number of components ln (2n) + γ 2 Number of cyclic nodes πn/2 1 3 Number of image nodes (1 e 1 )n Notation h(n) k(n) will mean h(n) = k(n) + lower order terms Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 18 / 45

19 Random Graph Measurements (II) Average cycle length Average tail length Maximum cycle length πn/8 πn/8 c 1 πn n c 1 = 0 [ ( 1 exp v e u du )] u dv Maximum tail length 2πn ln n Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 19 / 45

20 First data set p = = (2)(50021) + 1 ( safe prime ) p = = (2 3 )(3)(11)(379) + 1 p = = (2 2 )(3)(5)(7)(11)(23) + 1 For each g = 1, 2,..., p 1 we build the graph. Then we compute measurements over all graphs. The original code was written in C++ by Daniel Cloutier (2006), using the RHIT parallel cluster. There were later revisions by Nathan Lindle (2008) and by Andrew Hoffman and Marc Mace (2009). Result Arbitrary random graphs aren t a good model. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 20 / 45

21 Next Step So what is a better model? We will use some number theory(!) to understand why DEFG s aren t quite as random as the graphs we have analyzed so far. We need to account for a little bit more structure. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 21 / 45

22 m-ary Functional Graphs Let φ(k) = # {1 c k gcd(c, k) = 1} be the Euler phi function. Proposition If m (p 1) then there are φ( p 1 m ) m-ary functional graphs produced by varying g for a given p. Furthermore, the values of g that produce an m-ary graph are precisely those for which g is a strictly perfect mth power modulo p. Proof (sketch). Fix a primitive root r. Then g is a strictly perfect mth power modulo p iff g = r a and m = gcd(a, p 1). If y = r b, then g x = r ax y = r b mod p iff ax b mod p 1. This has m solutions if m b and no solutions otherwise, so the graph is m-ary. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 22 / 45

23 Image Nodes Proposition The number of image nodes in an m-ary functional graph with p 1 nodes is exactly p 1 m. Proof. In any finite directed graph, the sum of the in-degrees equals the sum of the out-degrees. In a functional graph, the sum of the out-degrees equals the number of nodes. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 23 / 45

24 Permutation Measurements: Means (Standard Results from Literature) The expected mean values for the measurements of interest in a random unary functional graph (permutation) of size n are: Number of components = n i=1 1 i = Ψ(n + 1) + γ ln n + γ Average cycle length = n Maximum cycle length c 2 n n c 2 = 0 [ ( 1 exp v e u du )] u dv where Ψ(x) = d dx ln(γ(x)). Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 24 / 45

25 Example: x 5 x mod 23 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 25 / 45

26 Permutation Measurements: Variances (Standard Results from Literature) The expected variances for the measurements of interest in a random unary functional graph (permutation) of size n are: Number of components = Ψ(n + 1) + Ψ (n + 1) + γ π2 6 ln n + γ π2 6 Average cycle length = n Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 26 / 45

27 Binary Functional Graphs For binary functional graphs, not all of the results we need seem to be in the literature. A general technique was given by Flajolet and Odlyzko: Explicitly define the structure. Convert to exponential generating functions. Mark the structures of interest. Compute expected value generating functions. Perform automatic singularity analysis to get asymptotic form of coefficients. Normalize. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 27 / 45

28 Example: x 3 x mod 23 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 28 / 45

29 Singularity Analysis How do we get information about the coefficients of generating functions? One way is to use complex analysis, which leads to theorems such as: Notation If f (x) is a generating function, [x n ]f (x) is the coefficient of x n in f (x). Theorem (Example of a Transfer Theorem ) Let α R \ {0, 1, 2, 3, }. Then [x n ](1 x) α n α 1 Γ( α). We did automatic analysis using a Maple package. (Flajolet, Salvy, Zimmerman, et al.) It applies transfer theorems to convert the type of singularity to the asymptotics of the coefficients. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 29 / 45

30 Example of Singularity Analysis Let f (x) = 1 1 2x 2 = (1 2x 2 ) 1/2. Let z = 2x 2, so [z n ](1 z) 1/2 = [2 n x 2n ](1 2x 2 ) 1/2. Now [z n ](1 z) 1/2 n 1/2 Γ(1/2) = 1 πn, so [x 2n ](1 2x 2 ) 1/2 2n πn, and the number of bfg s with n nodes is [ ] x n 2 n/2 n! n even f (x) πn/2 n! 0 n odd. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 30 / 45

31 Alternative Technique In some cases a more precise technique was also used: Explicitly define the structure. Convert to exponential generating functions. Mark the structures of interest. Compute expected value generating functions. Obtain DEs whose solutions are the generating functions. Use the DEs to find recurrence relations. Solve the recurrence relations. Normalize. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 31 / 45

32 Example of Converting to a Recurrence Relation Let f (x) = 1 1 2x 2 = (1 2x 2 ) 1/2 again. so If f (x) = f (x) = 2 2x (1 2x 2 = ) 3/2 1 2x 2 f (x), (1 2x 2 )f (x) = 2xf (x). b i x i, then f (x) = ib i x i 1, so i=0 i=1 2 jb j 1 x j = j=1 b j+1 x j, j=0 and we can extract the recurrence relation: b n+2 = 2n + 2 n + 2 b n, b 0 = 1, b 1 = 0. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 32 / 45

33 Example of Converting to a Recurrence Relation, cont. The solution to is b n+2 = 2n + 2 n + 2 b n, b 0 = 1, b 1 = 0 n! ( [x n n ]f (x) = b n = 2)! 2 2 n/2 n even 0 n odd. Again, Maple can do all of this automatically. The two methods agree: The total number of (labeled) binary functional graphs of size n is ( n 2 n! ) 2! 2 2 n/2 n! 2 n/2. πn/2 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 33 / 45

34 BFG Measurements: Means (Dan Cloutier, 2006 and Nathan Lindle, 2008) The expected mean values for the measurements of interest in a random binary functional graph of size n are: ( ) ( 1 n Number of components = Ψ ln (2n) + γ 2 Number of cyclic nodes = ) + πγ( n 2 + 1) Γ( n ) Γ( n ) πn/2 1 ( ) 1 γ + ln(2) 2 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 34 / 45

35 BFG Measurements: Means (II) Average cycle length = ( 1 2 ) πγ( n 2 + 1) Γ( n ) πn/8 πγ(2 + n 2 Average tail length = ) nγ( n ) Γ( n ) nγ( n ) πn/8 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 35 / 45

36 BFG Measurements: Means (III) (Cloutier, 2006) Maximum cycle length c 1 πn n c 1 = 0 [ ( 1 exp v e u du )] u dv (Holden, 2009) Maximum tail length 2πn ln 2 ln n 2 2 γ ln n.5 ln n Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 36 / 45

37 BFG Measurements: Variances (Nathan Lindle, 2008) The expected variances for the measurements of interest in a random binary functional graph of size n are: Number of components = 1 2 Ψ ( n ) + 2 ln(n) ln(2)2 2γ ln(2) γ 2 4 Number of cyclic nodes ( ) 1 γ + ln(2) γ2 + γ ln(2) + ln(2) 2 + n/2 1 = 2Γ( n )2 + 4 n 2 Γ( n )2 πγ( n 2 + 1)Γ( n ) πγ( n 2 + 1)2 Γ( n )2 ( 2 π ) 2πn n + 2 π l=0 Ψ(l ) (2l + 1) 1 ( n 4 Ψ ) 2 2 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 37 / 45

38 BFG Measurements: Variances (II) Average cycle length = 1 ( 3πΓ( n 2 + 1)2 6 πγ( n 2 + 1)Γ( n ) + 16 n 2 Γ( n )2 + 8Γ( n )2 ) 12 Γ( n )2 ( 2 3 π ) 2πn n π 16 Average tail length = 1 (18Γ( n ) + 8Γ( n ) n 2 9 n 2 6 ( n 2 )Γ( n ) πγ( n 2 + 1) 9 πγ( n 2 + 1)) ( πγ( n 2 + 1) + n 2 πγ( n 2 + 1) 2Γ( n ))2 ( n 2 )2 Γ( n )2 1 4 ( 2 3 π ) n 8 2πn π 16 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 38 / 45

39 Ternary Functional Graphs For ternary functional graphs, a slightly different technique was used: Explicitly define the structure. Convert to exponential generating functions. Mark the structures of interest. Compute expected value generating functions. Obtain DEs whose solutions are the generating functions. Use the DEs to find recurrence relations. Recursively compute expected values. Normalize. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 39 / 45

40 TFG Structure A ternary functional graph (tfg) is a set of components. Each component is a cycle of nodes, each of which is connected to two ternary trees. A ternary tree consists of either a root node or a root node and three interchangeable nonempty ternary tree branches. Shorthand: TernFunGraph = set(components) Component = cycle(node*set(terntree, cardinality=2) TernTree = Node + Node*set(TernTree, cardinality = 3) Node = Atomic Unit Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 40 / 45

41 Convert to Generating Functions f (z) = e c(z) c(z) = ln 1 1 z 2 t2 (z) (Ternary functional graphs) (Connected components) t(z) = z + 1 3! zt3 (z) (Ternary trees) Note the increasing difficulty in solving explicitly for the tree function. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 41 / 45

42 TFG Generating Functions The expected mean values for the measurements of interest in a random ternary functional graph of size n are given by the following generating functions: (Max Brugger and Christina Frederick, 2007) [ ] Number of components: u euc(z) u=1 ( ) Number of cyclic nodes: (Brugger, 2008) Average tail length: u eln [ u uzt2 (z) u=1 zut(z) ( zt2 (z) ) 2 ( uzt2 (z) ) ] u=1 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 42 / 45

43 TFG Generating Functions (II) For the following measurements, a double marking technique was used: (Brugger and Frederick, 2007) [ ( )] 2 1 Average component size: u w ec(z) ln uwzt2 (uwz) [ ( )] 2 1 Average cycle length: u w ec(z) ln uwzt2 (wz) u=1,w=1 u=1,w=1 Generating functions for maximum measurements have not yet been derived in the ternary case. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 43 / 45

44 Next Question How do the actual discrete exponentiation functional graphs compare with this model? We will look at the collected data and some statistical analysis. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 44 / 45

45 Thanks! Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 45 / 45

The Discrete Logarithm Problem and Ternary Functional Graphs

The Discrete Logarithm Problem and Ternary Functional Graphs Rose-Hulman Institute of Technology Rose-Hulman Scholar Mathematical Sciences Technical Reports (MSTR) Mathematics 8-5-2007 The Discrete Logarithm Problem and Ternary Functional Graphs Max F. Brugger Oregon

More information

The Discrete Logarithm Problem and Ternary Functional Graphs

The Discrete Logarithm Problem and Ternary Functional Graphs The Discrete Logarithm Problem and Ternary Functional Graphs Max F. Brugger Christina A. Frederick August 5, 2007 Abstract Encryption is essential to the security of transactions and communications, but

More information

Combinatorial Enumeration. Jason Z. Gao Carleton University, Ottawa, Canada

Combinatorial Enumeration. Jason Z. Gao Carleton University, Ottawa, Canada Combinatorial Enumeration Jason Z. Gao Carleton University, Ottawa, Canada Counting Combinatorial Structures We are interested in counting combinatorial (discrete) structures of a given size. For example,

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements. Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that

More information

Generating Functions

Generating Functions Semester 1, 2004 Generating functions Another means of organising enumeration. Two examples we have seen already. Example 1. Binomial coefficients. Let X = {1, 2,..., n} c k = # k-element subsets of X

More information

Math 2: Algebra 2, Geometry and Statistics Ms. Sheppard-Brick Chapter 4 Test Review

Math 2: Algebra 2, Geometry and Statistics Ms. Sheppard-Brick Chapter 4 Test Review Chapter 4 Test Review Students will be able to (SWBAT): Write an explicit and a recursive function rule for a linear table of values. Write an explicit function rule for a quadratic table of values. Determine

More information

GENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS

GENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS GENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS Michael Drmota Institute of Discrete Mathematics and Geometry Vienna University of Technology A 1040 Wien, Austria michael.drmota@tuwien.ac.at http://www.dmg.tuwien.ac.at/drmota/

More information

2.6 Logarithmic Functions. Inverse Functions. Question: What is the relationship between f(x) = x 2 and g(x) = x?

2.6 Logarithmic Functions. Inverse Functions. Question: What is the relationship between f(x) = x 2 and g(x) = x? Inverse Functions Question: What is the relationship between f(x) = x 3 and g(x) = 3 x? Question: What is the relationship between f(x) = x 2 and g(x) = x? Definition (One-to-One Function) A function f

More information

Combinatorial/probabilistic analysis of a class of search-tree functionals

Combinatorial/probabilistic analysis of a class of search-tree functionals Combinatorial/probabilistic analysis of a class of search-tree functionals Jim Fill jimfill@jhu.edu http://www.mts.jhu.edu/ fill/ Mathematical Sciences The Johns Hopkins University Joint Statistical Meetings;

More information

Differentiation Shortcuts

Differentiation Shortcuts Differentiation Shortcuts Sections 10-5, 11-2, 11-3, and 11-4 Prof. Nathan Wodarz Math 109 - Fall 2008 Contents 1 Basic Properties 2 1.1 Notation............................... 2 1.2 Constant Functions.........................

More information

Applications of Number Theory in Statistics

Applications of Number Theory in Statistics Bonfring International Journal of Data Mining, Vol. 2, No., September 202 Applications of Number Theory in Statistics A.M.S. Ramasamy Abstract--- There have been several fascinating applications of Number

More information

COS597D: Information Theory in Computer Science October 5, Lecture 6

COS597D: Information Theory in Computer Science October 5, Lecture 6 COS597D: Information Theory in Computer Science October 5, 2011 Lecture 6 Lecturer: Mark Braverman Scribe: Yonatan Naamad 1 A lower bound for perfect hash families. In the previous lecture, we saw that

More information

Lesson 18: Problem Set Sample Solutions

Lesson 18: Problem Set Sample Solutions Problem Set Sample Solutions Problems 5 7 serve to review the process of computing f(g(x)) for given functions f and g in preparation for work with inverses of functions in Lesson 19. 1. Sketch the graphs

More information

Skill 6 Exponential and Logarithmic Functions

Skill 6 Exponential and Logarithmic Functions Skill 6 Exponential and Logarithmic Functions Skill 6a: Graphs of Exponential Functions Skill 6b: Solving Exponential Equations (not requiring logarithms) Skill 6c: Definition of Logarithms Skill 6d: Graphs

More information

5. Analytic Combinatorics

5. Analytic Combinatorics ANALYTIC COMBINATORICS P A R T O N E 5. Analytic Combinatorics http://aofa.cs.princeton.edu Analytic combinatorics is a calculus for the quantitative study of large combinatorial structures. Features:

More information

1 Structure of Finite Fields

1 Structure of Finite Fields T-79.5501 Cryptology Additional material September 27, 2005 1 Structure of Finite Fields This section contains complementary material to Section 5.2.3 of the text-book. It is not entirely self-contained

More information

Finite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay

Finite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 25 Finite Fields Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay September 25, 2014 2 / 25 Fields Definition A set F together

More information

Calculus I Sample Exam #01

Calculus I Sample Exam #01 Calculus I Sample Exam #01 1. Sketch the graph of the function and define the domain and range. 1 a) f( x) 3 b) g( x) x 1 x c) hx ( ) x x 1 5x6 d) jx ( ) x x x 3 6 . Evaluate the following. a) 5 sin 6

More information

HMMT February 2018 February 10, 2018

HMMT February 2018 February 10, 2018 HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18

More information

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems!

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Murat Koloğlu, Gene Kopp, Steven J. Miller and Yinghui Wang http://www.williams.edu/mathematics/sjmiller/public html Smith College, January

More information

A first order divided difference

A first order divided difference A first order divided difference For a given function f (x) and two distinct points x 0 and x 1, define f [x 0, x 1 ] = f (x 1) f (x 0 ) x 1 x 0 This is called the first order divided difference of f (x).

More information

MATH 363: Discrete Mathematics

MATH 363: Discrete Mathematics MATH 363: Discrete Mathematics Learning Objectives by topic The levels of learning for this class are classified as follows. 1. Basic Knowledge: To recall and memorize - Assess by direct questions. The

More information

First-Order Logic. 1 Syntax. Domain of Discourse. FO Vocabulary. Terms

First-Order Logic. 1 Syntax. Domain of Discourse. FO Vocabulary. Terms First-Order Logic 1 Syntax Domain of Discourse The domain of discourse for first order logic is FO structures or models. A FO structure contains Relations Functions Constants (functions of arity 0) FO

More information

THE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS

THE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS THE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS Michael Drmota joint work with Omer Giménez and Marc Noy Institut für Diskrete Mathematik und Geometrie TU Wien michael.drmota@tuwien.ac.at http://www.dmg.tuwien.ac.at/drmota/

More information

An Introduction to Combinatorial Species

An Introduction to Combinatorial Species An Introduction to Combinatorial Species Ira M. Gessel Department of Mathematics Brandeis University Summer School on Algebraic Combinatorics Korea Institute for Advanced Study Seoul, Korea June 14, 2016

More information

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems!

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Olivial Beckwith, Murat Koloğlu, Gene Kopp, Steven J. Miller and Yinghui Wang http://www.williams.edu/mathematics/sjmiller/public html Colby

More information

1 Review of di erential calculus

1 Review of di erential calculus Review of di erential calculus This chapter presents the main elements of di erential calculus needed in probability theory. Often, students taking a course on probability theory have problems with concepts

More information

Examples 2: Composite Functions, Piecewise Functions, Partial Fractions

Examples 2: Composite Functions, Piecewise Functions, Partial Fractions Examples 2: Composite Functions, Piecewise Functions, Partial Fractions September 26, 206 The following are a set of examples to designed to complement a first-year calculus course. objectives are listed

More information

Logarithms Dr. Laura J. Pyzdrowski

Logarithms Dr. Laura J. Pyzdrowski 1 Names: (8 communication points) About this Laboratory An exponential function of the form f(x) = a x, where a is a positive real number not equal to 1, is an example of a one-to-one function. This means

More information

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems!

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Murat Koloğlu, Gene Kopp, Steven J. Miller and Yinghui Wang http://www.williams.edu/mathematics/sjmiller/public html College of the Holy Cross,

More information

CSCE 750 Final Exam Answer Key Wednesday December 7, 2005

CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 Do all problems. Put your answers on blank paper or in a test booklet. There are 00 points total in the exam. You have 80 minutes. Please note

More information

Mathematics 426 Robert Gross Homework 9 Answers

Mathematics 426 Robert Gross Homework 9 Answers Mathematics 4 Robert Gross Homework 9 Answers. Suppose that X is a normal random variable with mean µ and standard deviation σ. Suppose that PX > 9 PX

More information

Number Theory. Modular Arithmetic

Number Theory. Modular Arithmetic Number Theory The branch of mathematics that is important in IT security especially in cryptography. Deals only in integer numbers and the process can be done in a very fast manner. Modular Arithmetic

More information

Chapter 3. Formal Number Theory

Chapter 3. Formal Number Theory Chapter 3. Formal Number Theory 1. An Axiom System for Peano Arithmetic (S) The language L A of Peano arithmetic has a constant 0, a unary function symbol, a binary function symbol +, binary function symbol,

More information

De part en retraite de Pierre

De part en retraite de Pierre Introduction Combinatorics Generating Series Oracle Conclusion De part en retraite de Pierre Villetaneuse, fe vrier 2013 1 / 41 De part en retraite de Pierre Introduction Combinatorics Generating Series

More information

Name: Partners: PreCalculus. Review 5 Version A

Name: Partners: PreCalculus. Review 5 Version A Name: Partners: PreCalculus Date: Review 5 Version A [A] Circle whether each statement is true or false. 1. 3 log 3 5x = 5x 2. log 2 16 x+3 = 4x + 3 3. ln x 6 + ln x 5 = ln x 30 4. If ln x = 4, then e

More information

9/21/17. Functions. CS 220: Discrete Structures and their Applications. Functions. Chapter 5 in zybooks. definition. definition

9/21/17. Functions. CS 220: Discrete Structures and their Applications. Functions. Chapter 5 in zybooks. definition. definition Functions CS 220: Discrete Structures and their Applications Functions Chapter 5 in zybooks A function maps elements from one set X to elements of another set Y. A B Brian C Drew range: {A, B, D} Alan

More information

Algorithms: Background

Algorithms: Background Algorithms: Background Amotz Bar-Noy CUNY Amotz Bar-Noy (CUNY) Algorithms: Background 1 / 66 What is a Proof? Definition I: The cogency of evidence that compels acceptance by the mind of a truth or a fact.

More information

BT Research at Martlesham, Suffolk

BT Research at Martlesham, Suffolk Connectivity of random graphs Keith Briggs Keith.Briggs@bt.com research.btexact.com/teralab/keithbriggs.html Alan Turing Institute 2004 November 19 1330 typeset 2004 November 17 10:55 in pdflatex on a

More information

CS 220: Discrete Structures and their Applications. Functions Chapter 5 in zybooks

CS 220: Discrete Structures and their Applications. Functions Chapter 5 in zybooks CS 220: Discrete Structures and their Applications Functions Chapter 5 in zybooks Functions A function maps elements from one set X to elements of another set Y. A Brian Drew Alan Ben B C D F range: {A,

More information

Prime Labeling of Small Trees with Gaussian Integers

Prime Labeling of Small Trees with Gaussian Integers Rose-Hulman Undergraduate Mathematics Journal Volume 17 Issue 1 Article 6 Prime Labeling of Small Trees with Gaussian Integers Hunter Lehmann Seattle University Andrew Park Seattle University Follow this

More information

On the parity of the Wiener index

On the parity of the Wiener index On the parity of the Wiener index Stephan Wagner Department of Mathematical Sciences, Stellenbosch University, Stellenbosch 7602, South Africa Hua Wang Department of Mathematics, University of Florida,

More information

Quasi-reducible Polynomials

Quasi-reducible Polynomials Quasi-reducible Polynomials Jacques Willekens 06-Dec-2008 Abstract In this article, we investigate polynomials that are irreducible over Q, but are reducible modulo any prime number. 1 Introduction Let

More information

CMPSCI 250: Introduction to Computation. Lecture #11: Equivalence Relations David Mix Barrington 27 September 2013

CMPSCI 250: Introduction to Computation. Lecture #11: Equivalence Relations David Mix Barrington 27 September 2013 CMPSCI 250: Introduction to Computation Lecture #11: Equivalence Relations David Mix Barrington 27 September 2013 Equivalence Relations Definition of Equivalence Relations Two More Examples: Universal

More information

Enumerating connected labelled graphs

Enumerating connected labelled graphs Enumerating connected labelled graphs Keith Briggs Keith.Briggs@bt.com more.btexact.com/people/briggsk2/ 2004 August 17 conn-lab-graphs.tex typeset 2004 August 17 10:40 in pdflatex on a linux system Enumerating

More information

Combinatorics of non-associative binary operations

Combinatorics of non-associative binary operations Combinatorics of non-associative binary operations Jia Huang University of Nebraska at Kearney E-mail address: huangj2@unk.edu December 26, 2017 This is joint work with Nickolas Hein (Benedictine College),

More information

A Library of Functions

A Library of Functions LibraryofFunctions.nb 1 A Library of Functions Any study of calculus must start with the study of functions. Functions are fundamental to mathematics. In its everyday use the word function conveys to us

More information

Fighting Fish: enumerative properties. Enrica Duchi. Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena.

Fighting Fish: enumerative properties. Enrica Duchi. Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena. Fighting Fish: enumerative properties Enrica Duchi IRIF, Université Paris Diderot Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena Gilles Schaeffer LIX, CNRS and École Polytechnique Séminaire

More information

A note on the Isomorphism Problem for Monomial Digraphs

A note on the Isomorphism Problem for Monomial Digraphs A note on the Isomorphism Problem for Monomial Digraphs Aleksandr Kodess Department of Mathematics University of Rhode Island kodess@uri.edu Felix Lazebnik Department of Mathematical Sciences University

More information

Part IA Probability. Theorems. Based on lectures by R. Weber Notes taken by Dexter Chua. Lent 2015

Part IA Probability. Theorems. Based on lectures by R. Weber Notes taken by Dexter Chua. Lent 2015 Part IA Probability Theorems Based on lectures by R. Weber Notes taken by Dexter Chua Lent 2015 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after lectures.

More information

Probability & Combinatorics Test and Solutions February 18, 2012

Probability & Combinatorics Test and Solutions February 18, 2012 1. A standard 12-hour clock has hour, minute, and second hands. How many times do two hands cross between 1:00 and 2:00 (not including 1:00 and 2:00 themselves)? Answer: 119 Solution: We know that the

More information

CMSC Discrete Mathematics SOLUTIONS TO FIRST MIDTERM EXAM October 18, 2005 posted Nov 2, 2005

CMSC Discrete Mathematics SOLUTIONS TO FIRST MIDTERM EXAM October 18, 2005 posted Nov 2, 2005 CMSC-37110 Discrete Mathematics SOLUTIONS TO FIRST MIDTERM EXAM October 18, 2005 posted Nov 2, 2005 Instructor: László Babai Ryerson 164 e-mail: laci@cs This exam contributes 20% to your course grade.

More information

COUNTING WITH AB-BA=1

COUNTING WITH AB-BA=1 COUNTING WITH AB-BA=1 PHILIPPE FLAJOLET, ROCQUENCOURT & PAWEL BLASIAK, KRAKÓW COMBINATORIAL MODELS OF ANNIHILATION-CREATION ; IN PREP. (2010) 1 A. = + + B. = 2 Annihilation and Creation A = Annihilate

More information

Chapter Generating Functions

Chapter Generating Functions Chapter 8.1.1-8.1.2. Generating Functions Prof. Tesler Math 184A Fall 2017 Prof. Tesler Ch. 8. Generating Functions Math 184A / Fall 2017 1 / 63 Ordinary Generating Functions (OGF) Let a n (n = 0, 1,...)

More information

CS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5

CS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5 UC Berkeley Handout N5 CS94: Pseudorandomness and Combinatorial Constructions September 3, 005 Professor Luca Trevisan Scribe: Gatis Midrijanis Notes for Lecture 5 In the few lectures we are going to look

More information

*Generating Function Topics

*Generating Function Topics CHAPTER 11 *Generating Function Topics Introduction The four sections in this chapter deal with four distinct topics: systems of recursions, exponential generating functions, Pólya s Theorem and asymptotics

More information

Week 4-5: Binary Relations

Week 4-5: Binary Relations 1 Binary Relations Week 4-5: Binary Relations The concept of relation is common in daily life and seems intuitively clear. For instance, let X be the set of all living human females and Y the set of all

More information

Definition: A binary relation R from a set A to a set B is a subset R A B. Example:

Definition: A binary relation R from a set A to a set B is a subset R A B. Example: Chapter 9 1 Binary Relations Definition: A binary relation R from a set A to a set B is a subset R A B. Example: Let A = {0,1,2} and B = {a,b} {(0, a), (0, b), (1,a), (2, b)} is a relation from A to B.

More information

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems!

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Steven J. Miller (MC 96) http://www.williams.edu/mathematics/sjmiller/public_html Yale University, April 14, 2014 Introduction Goals of the

More information

Maximising the number of induced cycles in a graph

Maximising the number of induced cycles in a graph Maximising the number of induced cycles in a graph Natasha Morrison Alex Scott April 12, 2017 Abstract We determine the maximum number of induced cycles that can be contained in a graph on n n 0 vertices,

More information

On the number of matchings of a tree.

On the number of matchings of a tree. On the number of matchings of a tree. Stephan G. Wagner Department of Mathematics, Graz University of Technology, Steyrergasse 30, A-800 Graz, Austria Abstract In a paper of Klazar, several counting examples

More information

Algorithms for Combinatorial Systems: Between Analytic Combinatorics and Species Theory.

Algorithms for Combinatorial Systems: Between Analytic Combinatorics and Species Theory. Algorithms for Combinatorial Systems: Between Analytic Combinatorics and Species Theory. Carine Pivoteau - LIGM - december 2011 joint work with Bruno Salvy and Michèle Soria Algorithms for Combinatorial

More information

Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers

Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers Christopher Eagle 1 and

More information

Groups, Rings, and Finite Fields. Andreas Klappenecker. September 12, 2002

Groups, Rings, and Finite Fields. Andreas Klappenecker. September 12, 2002 Background on Groups, Rings, and Finite Fields Andreas Klappenecker September 12, 2002 A thorough understanding of the Agrawal, Kayal, and Saxena primality test requires some tools from algebra and elementary

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Calculus I - Homework Chapter 2 Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Determine whether the graph is the graph of a function. 1) 1)

More information

On The Weights of Binary Irreducible Cyclic Codes

On The Weights of Binary Irreducible Cyclic Codes On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:

More information

DISCRETE AND ALGEBRAIC STRUCTURES

DISCRETE AND ALGEBRAIC STRUCTURES DISCRETE AND ALGEBRAIC STRUCTURES Master Study Mathematics MAT40 Winter Semester 015/16 (Due to organisational reasons register for the course at TU and KFU) Edited by Mihyun Kang TU Graz Contents I Lectures

More information

POD. A) Graph: y = 2e x +2 B) Evaluate: (e 2x e x ) 2 2e -x. e 7x 2

POD. A) Graph: y = 2e x +2 B) Evaluate: (e 2x e x ) 2 2e -x. e 7x 2 POD A) Graph: y = 2e x +2 B) Evaluate: (e 2x e x ) 2 2e -x e 7x 2 4.4 Evaluate Logarithms & Graph Logarithmic Functions What is a logarithm? How do you read it? What relationship exists between logs and

More information

Derangements with an additional restriction (and zigzags)

Derangements with an additional restriction (and zigzags) Derangements with an additional restriction (and zigzags) István Mező Nanjing University of Information Science and Technology 2017. 05. 27. This talk is about a class of generalized derangement numbers,

More information

C3 Revision Questions. (using questions from January 2006, January 2007, January 2008 and January 2009)

C3 Revision Questions. (using questions from January 2006, January 2007, January 2008 and January 2009) C3 Revision Questions (using questions from January 2006, January 2007, January 2008 and January 2009) 1 2 1. f(x) = 1 3 x 2 + 3, x 2. 2 ( x 2) (a) 2 x x 1 Show that f(x) =, x 2. 2 ( x 2) (4) (b) Show

More information

Homework 10 (due December 2, 2009)

Homework 10 (due December 2, 2009) Homework (due December, 9) Problem. Let X and Y be independent binomial random variables with parameters (n, p) and (n, p) respectively. Prove that X + Y is a binomial random variable with parameters (n

More information

Recitation 2: Probability

Recitation 2: Probability Recitation 2: Probability Colin White, Kenny Marino January 23, 2018 Outline Facts about sets Definitions and facts about probability Random Variables and Joint Distributions Characteristics of distributions

More information

MASTERS EXAMINATION IN MATHEMATICS

MASTERS EXAMINATION IN MATHEMATICS MASTERS EXAMINATION IN MATHEMATICS PURE MATHEMATICS OPTION FALL 2007 Full points can be obtained for correct answers to 8 questions. Each numbered question (which may have several parts) is worth the same

More information

Networks: Lectures 9 & 10 Random graphs

Networks: Lectures 9 & 10 Random graphs Networks: Lectures 9 & 10 Random graphs Heather A Harrington Mathematical Institute University of Oxford HT 2017 What you re in for Week 1: Introduction and basic concepts Week 2: Small worlds Week 3:

More information

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Jonah Brown-Cohen 1 Introduction The Diffie-Hellman protocol was one of the first methods discovered for two people, say Alice

More information

are the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1).

are the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1). Lecture A jacques@ucsd.edu Notation: N, R, Z, F, C naturals, reals, integers, a field, complex numbers. p(n), S n,, b(n), s n, partition numbers, Stirling of the second ind, Bell numbers, Stirling of the

More information

THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES. Changwoo Lee. 1. Introduction

THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES. Changwoo Lee. 1. Introduction Commun. Korean Math. Soc. 18 (2003), No. 1, pp. 181 192 THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES Changwoo Lee Abstract. We count the numbers of independent dominating sets of rooted labeled

More information

From Fibonacci Numbers to Central Limit Type Theorems

From Fibonacci Numbers to Central Limit Type Theorems From Fibonacci Numbers to Central Limit Type Theorems Murat Koloğlu, Gene Kopp, Steven J. Miller and Yinghui Wang Williams College, October 1st, 010 Introduction Previous Results Fibonacci Numbers: F n+1

More information

Function Practice. 1. (a) attempt to form composite (M1) (c) METHOD 1 valid approach. e.g. g 1 (5), 2, f (5) f (2) = 3 A1 N2 2

Function Practice. 1. (a) attempt to form composite (M1) (c) METHOD 1 valid approach. e.g. g 1 (5), 2, f (5) f (2) = 3 A1 N2 2 1. (a) attempt to form composite e.g. ( ) 3 g 7 x, 7 x + (g f)(x) = 10 x N (b) g 1 (x) = x 3 N1 1 (c) METHOD 1 valid approach e.g. g 1 (5),, f (5) f () = 3 N METHOD attempt to form composite of f and g

More information

Spectra of Semidirect Products of Cyclic Groups

Spectra of Semidirect Products of Cyclic Groups Spectra of Semidirect Products of Cyclic Groups Nathan Fox 1 University of Minnesota-Twin Cities Abstract The spectrum of a graph is the set of eigenvalues of its adjacency matrix A group, together with

More information

Section Summary. Relations and Functions Properties of Relations. Combining Relations

Section Summary. Relations and Functions Properties of Relations. Combining Relations Chapter 9 Chapter Summary Relations and Their Properties n-ary Relations and Their Applications (not currently included in overheads) Representing Relations Closures of Relations (not currently included

More information

Week 4-5: Binary Relations

Week 4-5: Binary Relations 1 Binary Relations Week 4-5: Binary Relations The concept of relation is common in daily life and seems intuitively clear. For instance, let X be the set of all living human females and Y the set of all

More information

Pollard s Rho Algorithm for Elliptic Curves

Pollard s Rho Algorithm for Elliptic Curves November 30, 2015 Consider the elliptic curve E over F 2 k, where E = n. Assume we want to solve the elliptic curve discrete logarithm problem: find k in Q = kp. Partition E into S 1 S 2 S 3, where the

More information

2 Functions of random variables

2 Functions of random variables 2 Functions of random variables A basic statistical model for sample data is a collection of random variables X 1,..., X n. The data are summarised in terms of certain sample statistics, calculated as

More information

Name (print): Question 4. exercise 1.24 (compute the union, then the intersection of two sets)

Name (print): Question 4. exercise 1.24 (compute the union, then the intersection of two sets) MTH299 - Homework 1 Question 1. exercise 1.10 (compute the cardinality of a handful of finite sets) Solution. Write your answer here. Question 2. exercise 1.20 (compute the union of two sets) Question

More information

Reexam in Discrete Mathematics

Reexam in Discrete Mathematics Reexam in Discrete Mathematics First Year at the Faculty of Engineering and Science and the Technical Faculty of IT and Design August 15th, 2017, 9.00-13.00 This exam consists of 11 numbered pages with

More information

Section 6.1: Composite Functions

Section 6.1: Composite Functions Section 6.1: Composite Functions Def: Given two function f and g, the composite function, which we denote by f g and read as f composed with g, is defined by (f g)(x) = f(g(x)). In other words, the function

More information

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY COIMBATORE Discrete Mathematics Functions

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY COIMBATORE Discrete Mathematics Functions 1 SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY COIMBATORE 641010 Discrete Mathematics Functions 1. Define function. Let X and Y be any two sets. A relation f from X to Y is called a function if for every x

More information

Algebra: Groups. Group Theory a. Examples of Groups. groups. The inverse of a is simply a, which exists.

Algebra: Groups. Group Theory a. Examples of Groups. groups. The inverse of a is simply a, which exists. Group Theory a Let G be a set and be a binary operation on G. (G, ) is called a group if it satisfies the following. 1. For all a, b G, a b G (closure). 2. For all a, b, c G, a (b c) = (a b) c (associativity).

More information

Random Boolean expressions

Random Boolean expressions Random Boolean expressions Danièle Gardy PRiSM, Univ. Versailles-Saint Quentin and CNRS UMR 8144. Daniele.Gardy@prism.uvsq.fr We examine how we can define several probability distributions on the set of

More information

Math 262A Lecture Notes - Nechiporuk s Theorem

Math 262A Lecture Notes - Nechiporuk s Theorem Math 6A Lecture Notes - Nechiporuk s Theore Lecturer: Sa Buss Scribe: Stefan Schneider October, 013 Nechiporuk [1] gives a ethod to derive lower bounds on forula size over the full binary basis B The lower

More information

Use a graphing utility to approximate the real solutions, if any, of the equation rounded to two decimal places. 4) x3-6x + 3 = 0 (-5,5) 4)

Use a graphing utility to approximate the real solutions, if any, of the equation rounded to two decimal places. 4) x3-6x + 3 = 0 (-5,5) 4) Advanced College Prep Pre-Calculus Midyear Exam Review Name Date Per List the intercepts for the graph of the equation. 1) x2 + y - 81 = 0 1) Graph the equation by plotting points. 2) y = -x2 + 9 2) List

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms CSE 101, Winter 2018 Design and Analysis of Algorithms Lecture 5: Divide and Conquer (Part 2) Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ A Lower Bound on Convex Hull Lecture 4 Task: sort the

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

A Generic Approach for the Unranking of Labeled Combinatorial Classes

A Generic Approach for the Unranking of Labeled Combinatorial Classes A Generic Approach for the Unranking of Labeled Combinatorial Classes Conrado Martínez, Xavier Molinero Departament de Llenguatges i Sistemes Informàtics, Universitat Politècnica de Catalunya, E-08034

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,

More information

Pre-calculus 12 Curriculum Outcomes Framework (110 hours)

Pre-calculus 12 Curriculum Outcomes Framework (110 hours) Curriculum Outcomes Framework (110 hours) Trigonometry (T) (35 40 hours) General Curriculum Outcome: Students will be expected to develop trigonometric reasoning. T01 Students will be expected to T01.01

More information

Counting false entries in truth tables of bracketed formulae connected by m-implication

Counting false entries in truth tables of bracketed formulae connected by m-implication arxiv:1034645v1 [mathco] 1 Mar 01 Counting false entries in truth tables of bracketed formulae connected by m-implication Volkan Yildiz ah05146@qmulacuk or vo1kan@hotmailcouk Abstract Inthispaperwecount

More information

Spring 2012 Math 541B Exam 1

Spring 2012 Math 541B Exam 1 Spring 2012 Math 541B Exam 1 1. A sample of size n is drawn without replacement from an urn containing N balls, m of which are red and N m are black; the balls are otherwise indistinguishable. Let X denote

More information