Edita Pelantová. Katedra matematiky FJFI. Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

Size: px
Start display at page:

Download "Edita Pelantová. Katedra matematiky FJFI. Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září 2011 1 / 12"

Transcription

1 Redundantní číselné soustavy Edita Pelantová Katedra matematiky FJFI září 2011 Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

2 Problém, jak zapisovat čísla, řeší lidstvo od nepaměti. Poziční zápis, kdy stejný symbol, např. 2, použitý na různých místech vyjadřuje jednou počet dva, jindy počet dvě stě, byl umožněn vynálezem symbolu 0 pro nic. I malému školákovi je jasné, že úloha vynásobit čísla 79 a 37 zapsaná v desítkové soustavě je jednodušší než násobit tato čísla zapsaná římským způsobem LXXIX a XXXVII. Přesto se poziční zápis prosadil v Evropě až ve 13. století. Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

3 Používame poziční numerační systém, určený bází β R, β > 1, a konečnou množinou celočíselných cifer nazývanou abeceda A Z β-rozvoj čísla x n x = x k β k, k= kde x k A Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

4 Používame poziční numerační systém, určený bází β R, β > 1, a konečnou množinou celočíselných cifer nazývanou abeceda A Z β-rozvoj čísla x n x = x k β k, k= kde x k A Dekadický numerační systém: báze β = 10, alphabet A = {0, 1, 2,..., 9} Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

5 Používame poziční numerační systém, určený bází β R, β > 1, a konečnou množinou celočíselných cifer nazývanou abeceda A Z β-rozvoj čísla x n x = x k β k, k= kde x k A Dekadický numerační systém: báze β = 10, alphabet A = {0, 1, 2,..., 9} Binární numerační systém: báze β = 2, alphabet A = {0, 1} Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

6 Parallel Addition as a Local Function dita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

7 Parallel Addition as a Local Function Let us consider finite β-representations of numbers in this alphabet A: Fin A (β) = {x = k I x k β k I Z, I finite, x k A} dita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

8 Parallel Addition as a Local Function Let us consider finite β-representations of numbers in this alphabet A: Fin A (β) = {x = k I x k β k I Z, I finite, x k A} We are looking for an algorithm allowing parallel addition in these numeration systems, i.e., Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

9 Parallel Addition as a Local Function Let us consider finite β-representations of numbers in this alphabet A: Fin A (β) = {x = x k β k I Z, I finite, x k A} k I We are looking for an algorithm allowing parallel addition in these numeration systems, i.e., an algorithm which rewrites in time O(1) (x k + y k )β k = } {{ } k I 1 A+A Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

10 Parallel Addition as a Local Function Let us consider finite β-representations of numbers in this alphabet A: Fin A (β) = {x = x k β k I Z, I finite, x k A} k I We are looking for an algorithm allowing parallel addition in these numeration systems, i.e., an algorithm which rewrites in time O(1) (x k + y k )β k = v } {{ } k β }{{} k k I 1 k I 2 A A+A Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

11 Parallel Addition as a Local Function Let us consider finite β-representations of numbers in this alphabet A: Fin A (β) = {x = x k β k I Z, I finite, x k A} k I We are looking for an algorithm allowing parallel addition in these numeration systems, i.e., an algorithm which rewrites in time O(1) (x k + y k )β k = v } {{ } k β }{{} k k I 1 k I 2 A A+A Definition Let A, B be alphabets, and let A Z, B Z be sets of words on these alphabets. Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

12 Parallel Addition as a Local Function Let us consider finite β-representations of numbers in this alphabet A: Fin A (β) = {x = x k β k I Z, I finite, x k A} k I We are looking for an algorithm allowing parallel addition in these numeration systems, i.e., an algorithm which rewrites in time O(1) (x k + y k )β k = v } {{ } k β }{{} k k I 1 k I 2 A A+A Definition Let A, B be alphabets, and let A Z, B Z be sets of words on these alphabets. Let r, t be non-negative integers, p = r + t + 1 N, and let φ : B p A. Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

13 Parallel Addition as a Local Function Let us consider finite β-representations of numbers in this alphabet A: Fin A (β) = {x = x k β k I Z, I finite, x k A} k I We are looking for an algorithm allowing parallel addition in these numeration systems, i.e., an algorithm which rewrites in time O(1) (x k + y k )β k = v } {{ } k β }{{} k k I 1 k I 2 A A+A Definition Let A, B be alphabets, and let A Z, B Z be sets of words on these alphabets. Let r, t be non-negative integers, p = r + t + 1 N, and let φ : B p A. A function ϕ : B Z A Z acting on u B Z by ϕ(u) = v A Z, where v j = φ(u j+t... u j... u j r ), is called a p-local function, with memory r and anticipation t. Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

14 Parallel Addition as a Local Function Algorithm of such p-local function is also called a sliding block code; we perform addition of two elements x, y Fin A (β) dita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

15 Parallel Addition as a Local Function Algorithm of such p-local function is also called a sliding block code; we perform addition of two elements x, y Fin A (β) x Fin A (β)... x j+t... x j+1 x j x j 1... x j r... x j A y Fin A (β)... y j+t... y j+1 y j y j 1... y j r... y j A dita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

16 Parallel Addition as a Local Function Algorithm of such p-local function is also called a sliding block code; we perform addition of two elements x, y Fin A (β) x Fin A (β)... x j+t... x j+1 x j x j 1... x j r... x j A y Fin A (β)... y j+t... y j+1 y j y j 1... y j r... y j A u j = x j + y j... u j+t... u j+1 u j u j 1... u j r } {{ }... u j A + A Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

17 Parallel Addition as a Local Function Algorithm of such p-local function is also called a sliding block code; we perform addition of two elements x, y Fin A (β) x Fin A (β)... x j+t... x j+1 x j x j 1... x j r... x j A y Fin A (β)... y j+t... y j+1 y j y j 1... y j r... y j A u j = x j + y j... u j+t... u j+1 u j u j 1... u j r } {{ }... u j A + A v j = φ(u j+t... u j r )... v j+t... v j+1 v j v j 1... v j r... v j A Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

18 Parallel Addition as a Local Function Algorithm of such p-local function is also called a sliding block code; we perform addition of two elements x, y Fin A (β) x Fin A (β)... x j+t... x j+1 x j x j 1... x j r... x j A y Fin A (β)... y j+t... y j+1 y j y j 1... y j r... y j A u j = x j + y j... u j+t... u j+1 u j u j 1... u j r } {{ }... u j A + A v j = φ(u j+t... u j r )... v j+t... v j+1 v j v j 1... v j r... v j A At the end of the process, we obtain the sum x + y = v j β j, with v = (v j ) A Z ; i.e. back again in the original set Fin A (β). Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

19 x Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

20 x Redundancy!!! Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

21 Poziční soustavy s celočíselným základem a rozšířenou množinou cifer, tedy soustavy umožňující paralelní zpracování cifer daného čísla, se dnes běžně využívají ve víceprocesorových aritmetických jednotkách. Ty se uplatňují hlavně při algoritmech pro šifrování, které pracují s velkými čísly, např. metoda RSA. Do povědomí širší odborné veřejnosti totiž vstoupily samy kvůli slavné chybě procesoru Pentium odhalené v roce Pentium (tenkráte ale i dnes) používá pro dělení algoritmus SRT a redundantní soustavu se základem β = 4 a pěti ciframi { 2, 1, 0, 1, 2}, viz Muller J.-M., Elementary Functions, Algorithms and Implementation, 2nd ed., 2006, Birkhäuser Boston. Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

22 Algorithm: Base b = 4, alphabet A = { 2 1, 0, 1, 2} Input: two finite sequences of digits (x i ) and (y i ) of { 2 1, 0, 1, 2} Output: a finite sequence of digits (z i ) of { 2 1, 0, 1, 2}, such that xi 4 i + y i 4 i = z i 4 i. for each i in parallel do 0. w i := x i + y { i } wi 3 1. case then q w i = 2 and w i 1 2 i := 1 { } wi 3 case then q w i = 2 and w i 1 2 i := 1 else q i := 0 2. z i := w i q i 4 + q i 1 Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

23 Otázky Jak vypadá p-local function pro předchozí paralelní sčítání, jaké je p? Jak přepsat číslo zapsané ve tvaru x = a k 4 k, kde a k {0, 1, 2, 3} do tvaru x = b k 4 k, kde a k { 2, 1, 0, 1, 2}? Lze to udělat paralelně? Jak porovnávat dvě čísla zapsaná v abeced ve { 2, 1, 0, 1, 2}? Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

24 Algoritmus pro hledání zápisu přirozeného čísla v soustavě s bází β N. Příklad: Při hledání koeficientů a j {0, 1,,..., 6} pro zápis čísla 278 = a k 7 k a a 0 v bázi β = 7, vidíme, že číslo 278 a a 0 musejí mít stejný zbytek po dělení číslem 7. Tedy a 0 = 5. Protože 278 a 0 = 273 = 7 39 = 7 (a k 7 k a 1 ), stačí ted vyjádřit v sedmičkové soustavě číslo 39. Jeho poslední cifru a 1 získáme stejně, tedy a 1 = 4, což je zbytek po dělení čísla 39 sedmičkou. A tak pokračujeme dál. Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

25 Hladový algoritmus pro hledání rozvoje v bázi β > 1: Pro zadané x R, x > 0 nalezneme maximální k Z takové, aby β k x a položíme x k = x β k. Z volby k plyne, že 1 x k < β a číslo x lze napsat jako x = x k β k + y, kde 0 y < β k. Je-li y = 0, končíme, jinak stejný postup použijeme na číslo y. Tuto proceduru opakujeme, ale nemusíme se zastavit po konečném počtu kroků. Získáme tak konečný nebo nekonečný řetězec cifer z množiny {m Z 0 m < β} a číslo x zapsané jako x = x k β k + x k 1 β k 1 + x k 2 β k Např. číslo π v sedmičkové soustavě (π) 7 = Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

26 Báze zlatý řez Příklad: Baze β = , nalezněte rozvoj čísla 2 v této bázi. Edita Pelantová (Katedra matematiky FJFI) Redundantní číselné soustavy září / 12

aneb Perfekt perfektně.

aneb Perfekt perfektně. aneb Perfekt perfektně. 2013 se v angličtině nazývá Present Perfect, tedy Přítomný perfekt. Patří k časům přítomným, ačkoliv se jistě nejedná o klasický přítomný čas tak, jak jsme zvykĺı z češtiny. jistým

More information

8.2 Transformace, množinové operace

8.2 Transformace, množinové operace 8.2. TRANSFORMACE, MNOŽINOVÉ OPERACE 8.2 Transformace, množinové operace 8.2.1 Transformace Posunutí, otočení a změna rozměrů umožňují efektivní práci s objekty. Je jednodušší umístit objekt v požadovaných

More information

Upozorňujeme,že můžete formáty pro čtečky převádět ON-LINE na internetu do formátu PDF apod.

Upozorňujeme,že můžete formáty pro čtečky převádět ON-LINE na internetu do formátu PDF apod. Dobrý den, děkujeme za Nákup,níže máte odkazy pro bezplatné stažení.knihy jsou v archivech PDF(nepotřebujete čtečku e-knih),txt(nepotřebujete čtečku e-knih), a dále pro čtečky : soubory typu: PDB,MOBI,APNX

More information

aneb Perfektní minulost.

aneb Perfektní minulost. aneb Perfektní minulost. 2013 se v angličtině nazývá Past Perfect. Používáme jej tehdy, potřebujeme-li jasně vyjádřit, že nějaký děj proběhl ještě dříve než minulý děj, o kterém hovoříme. Podívejme se

More information

Section IV.1: Recursive Algorithms and Recursion Trees

Section IV.1: Recursive Algorithms and Recursion Trees Section IV.1: Recursive Algorithms and Recursion Trees Definition IV.1.1: A recursive algorithm is an algorithm that solves a problem by (1) reducing it to an instance of the same problem with smaller

More information

Adding and Subtracting Positive and Negative Numbers

Adding and Subtracting Positive and Negative Numbers Adding and Subtracting Positive and Negative Numbers Absolute Value For any real number, the distance from zero on the number line is the absolute value of the number. The absolute value of any real number

More information

RN-coding of Numbers: New Insights and Some Applications

RN-coding of Numbers: New Insights and Some Applications RN-coding of Numbers: New Insights and Some Applications Peter Kornerup Dept. of Mathematics and Computer Science SDU, Odense, Denmark & Jean-Michel Muller LIP/Arénaire (CRNS-ENS Lyon-INRIA-UCBL) Lyon,

More information

6.2 Permutations continued

6.2 Permutations continued 6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of

More information

Week 1: Introduction to Online Learning

Week 1: Introduction to Online Learning Week 1: Introduction to Online Learning 1 Introduction This is written based on Prediction, Learning, and Games (ISBN: 2184189 / -21-8418-9 Cesa-Bianchi, Nicolo; Lugosi, Gabor 1.1 A Gentle Start Consider

More information

Recursive Algorithms. Recursion. Motivating Example Factorial Recall the factorial function. { 1 if n = 1 n! = n (n 1)! if n > 1

Recursive Algorithms. Recursion. Motivating Example Factorial Recall the factorial function. { 1 if n = 1 n! = n (n 1)! if n > 1 Recursion Slides by Christopher M Bourke Instructor: Berthe Y Choueiry Fall 007 Computer Science & Engineering 35 Introduction to Discrete Mathematics Sections 71-7 of Rosen cse35@cseunledu Recursive Algorithms

More information

Jak pracuje. Ondřej Bojar bojar@ufal.mff.cuni.cz Ústav formální a aplikované lingvistiky MFF UK. ELRC Training Workshop, 15. prosinec 2015 1/28

Jak pracuje. Ondřej Bojar bojar@ufal.mff.cuni.cz Ústav formální a aplikované lingvistiky MFF UK. ELRC Training Workshop, 15. prosinec 2015 1/28 Jak pracuje automatický překlad Ondřej Bojar bojar@ufal.mff.cuni.cz Ústav formální a aplikované lingvistiky MFF UK ELRC Training Workshop, 15. prosinec 2015 1/28 Osnova Úloha strojového překladu. Obtížnost

More information

Factoring Algorithms

Factoring Algorithms Factoring Algorithms The p 1 Method and Quadratic Sieve November 17, 2008 () Factoring Algorithms November 17, 2008 1 / 12 Fermat s factoring method Fermat made the observation that if n has two factors

More information

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY LINDSEY R. BOSKO I would like to acknowledge the assistance of Dr. Michael Singer. His guidance and feedback were instrumental in completing this

More information

Algorithms are the threads that tie together most of the subfields of computer science.

Algorithms are the threads that tie together most of the subfields of computer science. Algorithms Algorithms 1 Algorithms are the threads that tie together most of the subfields of computer science. Something magically beautiful happens when a sequence of commands and decisions is able to

More information

TECHNICAL UNIVERSITY OF CRETE DATA STRUCTURES FILE STRUCTURES

TECHNICAL UNIVERSITY OF CRETE DATA STRUCTURES FILE STRUCTURES TECHNICAL UNIVERSITY OF CRETE DEPT OF ELECTRONIC AND COMPUTER ENGINEERING DATA STRUCTURES AND FILE STRUCTURES Euripides G.M. Petrakis http://www.intelligence.tuc.gr/~petrakis Chania, 2007 E.G.M. Petrakis

More information

Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.

Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook. Elementary Number Theory and Methods of Proof CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.edu/~cse215 1 Number theory Properties: 2 Properties of integers (whole

More information

BIRD Internet Routing Daemon

BIRD Internet Routing Daemon BIRD Internet Routing Daemon Ondřej Zajíček CZ.NIC z.s.p.o. IT 13 Úvod I Úvod do dynamického routování I Představení démona BIRD I OSPF a BIRD I BGP a BIRD Dynamické routování I Sestavení routovacích tabulek

More information

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012 Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about

More information

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given

More information

CS 141: Introduction to (Java) Programming: Exam 1 Jenny Orr Willamette University Fall 2013

CS 141: Introduction to (Java) Programming: Exam 1 Jenny Orr Willamette University Fall 2013 Oct 4, 2013, p 1 Name: CS 141: Introduction to (Java) Programming: Exam 1 Jenny Orr Willamette University Fall 2013 1. (max 18) 4. (max 16) 2. (max 12) 5. (max 12) 3. (max 24) 6. (max 18) Total: (max 100)

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

More information

SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov

SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov Serdica Math. J. 30 (2004), 95 102 SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS Nickolay Khadzhiivanov, Nedyalko Nenov Communicated by V. Drensky Abstract. Let Γ(M) where M V (G) be the set of all vertices

More information

A Simple Inventory System

A Simple Inventory System A Simple Inventory System Section 1.3 Discrete-Event Simulation: A First Course Section 1.3: A Simple Inventory System customers. demand items.. facility. order items.. supplier Distributes items from

More information

RN-Codings: New Insights and Some Applications

RN-Codings: New Insights and Some Applications RN-Codings: New Insights and Some Applications Abstract During any composite computation there is a constant need for rounding intermediate results before they can participate in further processing. Recently

More information

Sborník vědeckých prací Vysoké školy báňské - Technické univerzity Ostrava číslo 2, rok 2007, ročník LIII, řada strojní článek č.

Sborník vědeckých prací Vysoké školy báňské - Technické univerzity Ostrava číslo 2, rok 2007, ročník LIII, řada strojní článek č. Sborník vědeckých prací Vysoké školy báňské - Technické univerzity Ostrava číslo 2, rok 2007, ročník LIII, řada strojní článek č. 1556 Abstract Miroslav MAHDAL * CONTROL OF MODEL THROUGH INTRANET/INTERNET

More information

Math 115 Spring 2011 Written Homework 5 Solutions

Math 115 Spring 2011 Written Homework 5 Solutions . Evaluate each series. a) 4 7 0... 55 Math 5 Spring 0 Written Homework 5 Solutions Solution: We note that the associated sequence, 4, 7, 0,..., 55 appears to be an arithmetic sequence. If the sequence

More information

KATALOG JARO LÉTO 2008

KATALOG JARO LÉTO 2008 KATALOG JARO LÉTO 2008 Šperky jsou artiklem, vymykajícím se z většiny ostatního zboží. Nejde o nic, co bychom potřebovali k životu, a přesto po nich touží naprostá většina žen. S muži už to pravda není

More information

On Recognizable Timed Languages FOSSACS 2004

On Recognizable Timed Languages FOSSACS 2004 On Recognizable Timed Languages Oded Maler VERIMAG Grenoble France Amir Pnueli NYU and Weizmann New York and Rehovot USA FOSSACS 2004 Nutrition Facts Classical (Untimed) Recognizability Timed Languages

More information

CSI 333 Lecture 1 Number Systems

CSI 333 Lecture 1 Number Systems CSI 333 Lecture 1 Number Systems 1 1 / 23 Basics of Number Systems Ref: Appendix C of Deitel & Deitel. Weighted Positional Notation: 192 = 2 10 0 + 9 10 1 + 1 10 2 General: Digit sequence : d n 1 d n 2...

More information

Jak pracuje. Ondřej Bojar bojar@ufal.mff.cuni.cz Ústav formální a aplikované lingvistiky MFF UK. ELRC Workshop, 14.

Jak pracuje. Ondřej Bojar bojar@ufal.mff.cuni.cz Ústav formální a aplikované lingvistiky MFF UK. ELRC Workshop, 14. Jak pracuje automatický překlad Ondřej Bojar bojar@ufal.mff.cuni.cz Ústav formální a aplikované lingvistiky MFF UK ELRC Workshop, 14. duben 2016 1/31 Osnova Úloha strojového překladu. Obtížnost překladu.

More information

WLA-5000AP. Quick Setup Guide. English. Slovensky. Česky. 802.11a/b/g Multi-function Wireless Access Point

WLA-5000AP. Quick Setup Guide. English. Slovensky. Česky. 802.11a/b/g Multi-function Wireless Access Point 802.11a/b/g Multi-function Wireless Access Point Quick Setup Guide 1 5 Česky 9 Important Information The AP+WDS mode s default IP address is 192.168.1.1 The Client mode s default IP is 192.168.1.2 The

More information

Coding and decoding with convolutional codes. The Viterbi Algor

Coding and decoding with convolutional codes. The Viterbi Algor Coding and decoding with convolutional codes. The Viterbi Algorithm. 8 Block codes: main ideas Principles st point of view: infinite length block code nd point of view: convolutions Some examples Repetition

More information

Zeros of Polynomial Functions

Zeros of Polynomial Functions Zeros of Polynomial Functions The Rational Zero Theorem If f (x) = a n x n + a n-1 x n-1 + + a 1 x + a 0 has integer coefficients and p/q (where p/q is reduced) is a rational zero, then p is a factor of

More information

Kirchhoff's Current Law (KCL)

Kirchhoff's Current Law (KCL) Kirchhoff's Current Law (KCL) I. Charge (current flow) conservation law (the Kirchhoff s Current law) Pipe Pipe Pipe 3 Total volume of water per second flowing through pipe = total volume of water per

More information

INSURANCE RISK THEORY (Problems)

INSURANCE RISK THEORY (Problems) INSURANCE RISK THEORY (Problems) 1 Counting random variables 1. (Lack of memory property) Let X be a geometric distributed random variable with parameter p (, 1), (X Ge (p)). Show that for all n, m =,

More information

Binary Number System. 16. Binary Numbers. Base 10 digits: 0 1 2 3 4 5 6 7 8 9. Base 2 digits: 0 1

Binary Number System. 16. Binary Numbers. Base 10 digits: 0 1 2 3 4 5 6 7 8 9. Base 2 digits: 0 1 Binary Number System 1 Base 10 digits: 0 1 2 3 4 5 6 7 8 9 Base 2 digits: 0 1 Recall that in base 10, the digits of a number are just coefficients of powers of the base (10): 417 = 4 * 10 2 + 1 * 10 1

More information

2WB05 Simulation Lecture 8: Generating random variables

2WB05 Simulation Lecture 8: Generating random variables 2WB05 Simulation Lecture 8: Generating random variables Marko Boon http://www.win.tue.nl/courses/2wb05 January 7, 2013 Outline 2/36 1. How do we generate random variables? 2. Fitting distributions Generating

More information

Transactions of the VŠB Technical University of Ostrava, Mechanical Series. article No. 1897. Martin IVAN * Alessandra GROSSO **

Transactions of the VŠB Technical University of Ostrava, Mechanical Series. article No. 1897. Martin IVAN * Alessandra GROSSO ** Transactions of the VŠB Technical University of Ostrava, Mechanical Series No. 1, 2012, vol. LVIII article No. 1897 Martin IVAN * Alessandra GROSSO ** DELIVERY RELIABILITY OPTIMALIZATION IN DISTRIBUTION

More information

WHEN DOES A RANDOMLY WEIGHTED SELF NORMALIZED SUM CONVERGE IN DISTRIBUTION?

WHEN DOES A RANDOMLY WEIGHTED SELF NORMALIZED SUM CONVERGE IN DISTRIBUTION? WHEN DOES A RANDOMLY WEIGHTED SELF NORMALIZED SUM CONVERGE IN DISTRIBUTION? DAVID M MASON 1 Statistics Program, University of Delaware Newark, DE 19717 email: davidm@udeledu JOEL ZINN 2 Department of Mathematics,

More information

Introduction to Programming (in C++) Loops. Jordi Cortadella, Ricard Gavaldà, Fernando Orejas Dept. of Computer Science, UPC

Introduction to Programming (in C++) Loops. Jordi Cortadella, Ricard Gavaldà, Fernando Orejas Dept. of Computer Science, UPC Introduction to Programming (in C++) Loops Jordi Cortadella, Ricard Gavaldà, Fernando Orejas Dept. of Computer Science, UPC Example Assume the following specification: Input: read a number N > 0 Output:

More information

Example. Introduction to Programming (in C++) Loops. The while statement. Write the numbers 1 N. Assume the following specification:

Example. Introduction to Programming (in C++) Loops. The while statement. Write the numbers 1 N. Assume the following specification: Example Introduction to Programming (in C++) Loops Assume the following specification: Input: read a number N > 0 Output: write the sequence 1 2 3 N (one number per line) Jordi Cortadella, Ricard Gavaldà,

More information

Integer Factorization using the Quadratic Sieve

Integer Factorization using the Quadratic Sieve Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 seib0060@morris.umn.edu March 16, 2011 Abstract We give

More information

(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems.

(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. 3130CIT: Theory of Computation Turing machines and undecidability (IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. An undecidable problem

More information

MANAGEMENT INFORMATION SYSTEMS

MANAGEMENT INFORMATION SYSTEMS MANAGEMENT INFORMATION SYSTEMS 1. Which one of the following must be conducted first in the implementation and roll out stage? a. create production environment b. train users c. install the applications

More information

Local periods and binary partial words: An algorithm

Local periods and binary partial words: An algorithm Local periods and binary partial words: An algorithm F. Blanchet-Sadri and Ajay Chriscoe Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402 6170, USA E-mail:

More information

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At

More information

k, then n = p2α 1 1 pα k

k, then n = p2α 1 1 pα k Powers of Integers An integer n is a perfect square if n = m for some integer m. Taking into account the prime factorization, if m = p α 1 1 pα k k, then n = pα 1 1 p α k k. That is, n is a perfect square

More information

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies

More information

f(x) = a x, h(5) = ( 1) 5 1 = 2 2 1

f(x) = a x, h(5) = ( 1) 5 1 = 2 2 1 Exponential Functions an their Derivatives Exponential functions are functions of the form f(x) = a x, where a is a positive constant referre to as the base. The functions f(x) = x, g(x) = e x, an h(x)

More information

Nonlinear Algebraic Equations. Lectures INF2320 p. 1/88

Nonlinear Algebraic Equations. Lectures INF2320 p. 1/88 Nonlinear Algebraic Equations Lectures INF2320 p. 1/88 Lectures INF2320 p. 2/88 Nonlinear algebraic equations When solving the system u (t) = g(u), u(0) = u 0, (1) with an implicit Euler scheme we have

More information

UNIVERSITETET I OSLO

UNIVERSITETET I OSLO NIVERSITETET I OSLO Det matematisk-naturvitenskapelige fakultet Examination in: Trial exam Partial differential equations and Sobolev spaces I. Day of examination: November 18. 2009. Examination hours:

More information

CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12

CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12 CONTINUED FRACTIONS AND PELL S EQUATION SEUNG HYUN YANG Abstract. In this REU paper, I will use some important characteristics of continued fractions to give the complete set of solutions to Pell s equation.

More information

Informatica e Sistemi in Tempo Reale

Informatica e Sistemi in Tempo Reale Informatica e Sistemi in Tempo Reale Introduction to C programming Giuseppe Lipari http://retis.sssup.it/~lipari Scuola Superiore Sant Anna Pisa October 25, 2010 G. Lipari (Scuola Superiore Sant Anna)

More information

DOCTORAL THESIS. Combinatorial algorithms for online problems: Semi-online scheduling on related machines

DOCTORAL THESIS. Combinatorial algorithms for online problems: Semi-online scheduling on related machines Charles University Faculty of Mathematics and Physics DOCTORAL THESIS Tomáš Ebenlendr Combinatorial algorithms for online problems: Semi-online scheduling on related machines Institute of Mathematics of

More information

2.6. Probability. In general the probability density of a random variable satisfies two conditions:

2.6. Probability. In general the probability density of a random variable satisfies two conditions: 2.6. PROBABILITY 66 2.6. Probability 2.6.. Continuous Random Variables. A random variable a real-valued function defined on some set of possible outcomes of a random experiment; e.g. the number of points

More information

24 Uses of Turing Machines

24 Uses of Turing Machines Formal Language and Automata Theory: CS2004 24 Uses of Turing Machines 24 Introduction We have previously covered the application of Turing Machine as a recognizer and decider In this lecture we will discuss

More information

Stanford Math Circle: Sunday, May 9, 2010 Square-Triangular Numbers, Pell s Equation, and Continued Fractions

Stanford Math Circle: Sunday, May 9, 2010 Square-Triangular Numbers, Pell s Equation, and Continued Fractions Stanford Math Circle: Sunday, May 9, 00 Square-Triangular Numbers, Pell s Equation, and Continued Fractions Recall that triangular numbers are numbers of the form T m = numbers that can be arranged in

More information

OBSAH: OBSAH: Page 1.varianta... Page 2.varianta... Page 3.varianta... Page 4.varianta...... 1.varianta... 2.varianta... Configurator...... Contact... Order process 1... Order process 2... Order process

More information

An Introduction to the RSA Encryption Method

An Introduction to the RSA Encryption Method April 17, 2012 Outline 1 History 2 3 4 5 History RSA stands for Rivest, Shamir, and Adelman, the last names of the designers It was first published in 1978 as one of the first public-key crytographic systems

More information

Návod k použití: Boxovací stojan DUVLAN s pytlem a hruškou kód: DVLB1003

Návod k použití: Boxovací stojan DUVLAN s pytlem a hruškou kód: DVLB1003 Návod na použitie: Boxovací stojan DUVLAN s vrecom a hruškou kód: DVLB1003 Návod k použití: Boxovací stojan DUVLAN s pytlem a hruškou kód: DVLB1003 User manual: DUVLAN with a boxing bag and a speed bag

More information

ER E P M A S S I CONSTRUCTING A BINARY TREE EFFICIENTLYFROM ITS TRAVERSALS DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF TAMPERE REPORT A-1998-5

ER E P M A S S I CONSTRUCTING A BINARY TREE EFFICIENTLYFROM ITS TRAVERSALS DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF TAMPERE REPORT A-1998-5 S I N S UN I ER E P S I T VER M A TA S CONSTRUCTING A BINARY TREE EFFICIENTLYFROM ITS TRAVERSALS DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF TAMPERE REPORT A-1998-5 UNIVERSITY OF TAMPERE DEPARTMENT OF

More information

Martin Gregor. 7. června 2016

Martin Gregor. 7. června 2016 Co (nového) Vás čeká na IES? Malá ochutnávka z naší kuchyně nejen pro přijaté studenty Institut ekonomických studíı FSV UK 7. června 2016 Šance na přijetí Hlavním kritériem přijetí je kombinovaný NSZ percentil:

More information

Answer: Quantity A is greater. Quantity A: 0.717 0.717717... Quantity B: 0.71 0.717171...

Answer: Quantity A is greater. Quantity A: 0.717 0.717717... Quantity B: 0.71 0.717171... Test : First QR Section Question 1 Test, First QR Section In a decimal number, a bar over one or more consecutive digits... QA: 0.717 QB: 0.71 Arithmetic: Decimals 1. Consider the two quantities: Answer:

More information

x 3 Me stoiqei deic prˆxeic mporoôme na fèroume ton epauxhmèno pðnaka [A B C] sth morf 1 0 1 3 1/5(3c

x 3 Me stoiqei deic prˆxeic mporoôme na fèroume ton epauxhmèno pðnaka [A B C] sth morf 1 0 1 3 1/5(3c Grammik 'Algebra II, IoÔnioc 2009 Jèmata prohgoômenwn exetastik n Didˆskousa: Qarˆ Qaralˆmpouc Grammikˆ Sust mata. 'Estw 2 3 6 7 8, X = 2 3 x x 2, B = 5 0, C = c c 2. 5 x 3 Me stoiqei deic prˆxeic mporoôme

More information

FORUM STATISTICUM SLOVACUM

FORUM STATISTICUM SLOVACUM 6/2007 FORUM STATISTICUM SLOVACUM I S SN 1 3 3 6-7 4 2 0 7 6 9 7 7 1 3 3 6 7 4 2 0 0 1 Slovenská štatistická a demografická spoločnosť Miletičova 3, 824 67 Bratislava www.ssds.sk Naše najbližšie akcie:

More information

Note on some explicit formulae for twin prime counting function

Note on some explicit formulae for twin prime counting function Notes on Number Theory and Discrete Mathematics Vol. 9, 03, No., 43 48 Note on some explicit formulae for twin prime counting function Mladen Vassilev-Missana 5 V. Hugo Str., 4 Sofia, Bulgaria e-mail:

More information

FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME AND BUDGET CONSTRAINTS

FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME AND BUDGET CONSTRAINTS Journal of the Operations Research Society of Japan Vol. 45, No. 3, September 2002 2002 The Operations Research Society of Japan FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME

More information

Theory of Computation Chapter 2: Turing Machines

Theory of Computation Chapter 2: Turing Machines Theory of Computation Chapter 2: Turing Machines Guan-Shieng Huang Feb. 24, 2003 Feb. 19, 2006 0-0 Turing Machine δ K 0111000a 01bb 1 Definition of TMs A Turing Machine is a quadruple M = (K, Σ, δ, s),

More information

Tests for Two Survival Curves Using Cox s Proportional Hazards Model

Tests for Two Survival Curves Using Cox s Proportional Hazards Model Chapter 730 Tests for Two Survival Curves Using Cox s Proportional Hazards Model Introduction A clinical trial is often employed to test the equality of survival distributions of two treatment groups.

More information

Netradiční informační zdroje ve vzdělávání: vliv Personal Learning Environments (PLEs) na informační zdroje a hodnocení přenosu znalostí

Netradiční informační zdroje ve vzdělávání: vliv Personal Learning Environments (PLEs) na informační zdroje a hodnocení přenosu znalostí Netradiční informační zdroje ve vzdělávání: vliv Personal Learning Environments (PLEs) na informační zdroje a hodnocení přenosu znalostí Jakub Štogr ~ Univerzita Karlova v Praze INFORUM ~ Praha ~ 2010

More information

Name: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program.

Name: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program. Name: Class: Date: Exam #1 - Prep True/False Indicate whether the statement is true or false. 1. Programming is the process of writing a computer program in a language that the computer can respond to

More information

Nino Pellegrino October the 20th, 2015

Nino Pellegrino October the 20th, 2015 Learning Behavioral Fingerprints from NetFlows... using Timed Automata Nino Pellegrino October the 20th, 2015 Nino Pellegrino Learning Behavioral Fingerprints October the 20th, 2015 1 / 32 Use case Nino

More information

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study

More information

Multimedia Systems WS 2010/2011

Multimedia Systems WS 2010/2011 Multimedia Systems WS 2010/2011 31.01.2011 M. Rahamatullah Khondoker (Room # 36/410 ) University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de

More information

Agris on-line Papers in Economics and Informatics

Agris on-line Papers in Economics and Informatics Agris on-line Papers in Economics and Informatics Volume III Number 1, 2011 Social Networks as an Integration Tool in Rural Areas Agricultural Enterprises of the Czech Republic E. Červenková 1, P. Šimek

More information

Runtime Enforcement of Timed Properties

Runtime Enforcement of Timed Properties Runtime Enforcement of Timed Properties Srinivas Pinisetty 1,Yliès Falcone 2, Thierry Jéron 1, Hervé Marchand 1, Antoine Rollet 3 and Omer Nguena Timo 3 INRIA Rennes - Bretagne Atlantique, France LIG,

More information

Chapter 11. Asymmetric Encryption. 11.1 Asymmetric encryption schemes

Chapter 11. Asymmetric Encryption. 11.1 Asymmetric encryption schemes Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the asymmetric setting due to the asymmetry in key information held by the parties. Namely one party has a secret

More information

Stirling s formula, n-spheres and the Gamma Function

Stirling s formula, n-spheres and the Gamma Function Stirling s formula, n-spheres and the Gamma Function We start by noticing that and hence x n e x dx lim a 1 ( 1 n n a n n! e ax dx lim a 1 ( 1 n n a n a 1 x n e x dx (1 Let us make a remark in passing.

More information

1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let

1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let Copyright c 2009 by Karl Sigman 1 Stopping Times 1.1 Stopping Times: Definition Given a stochastic process X = {X n : n 0}, a random time τ is a discrete random variable on the same probability space as

More information

Conditionals (with solutions)

Conditionals (with solutions) Conditionals (with solutions) For exercises 1 to 27, indicate the output that will be produced. Assume the following declarations: final int MAX = 25, LIMIT = 100; int num1 = 12, num2 = 25, num3 = 87;

More information

University of Maryland Fraternity & Sorority Life Spring 2015 Academic Report

University of Maryland Fraternity & Sorority Life Spring 2015 Academic Report University of Maryland Fraternity & Sorority Life Academic Report Academic and Population Statistics Population: # of Students: # of New Members: Avg. Size: Avg. GPA: % of the Undergraduate Population

More information

Analysis of Binary Search algorithm and Selection Sort algorithm

Analysis of Binary Search algorithm and Selection Sort algorithm Analysis of Binary Search algorithm and Selection Sort algorithm In this section we shall take up two representative problems in computer science, work out the algorithms based on the best strategy to

More information

The Ergodic Theorem and randomness

The Ergodic Theorem and randomness The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction

More information

Examination paper for MA0301 Elementær diskret matematikk

Examination paper for MA0301 Elementær diskret matematikk Department of Mathematical Sciences Examination paper for MA0301 Elementær diskret matematikk Academic contact during examination: Iris Marjan Smit a, Sverre Olaf Smalø b Phone: a 9285 0781, b 7359 1750

More information

S. Boyd EE102. Lecture 1 Signals. notation and meaning. common signals. size of a signal. qualitative properties of signals.

S. Boyd EE102. Lecture 1 Signals. notation and meaning. common signals. size of a signal. qualitative properties of signals. S. Boyd EE102 Lecture 1 Signals notation and meaning common signals size of a signal qualitative properties of signals impulsive signals 1 1 Signals a signal is a function of time, e.g., f is the force

More information

Rychlý průvodce instalací Rýchly sprievodca inštaláciou

Rychlý průvodce instalací Rýchly sprievodca inštaláciou CZ SK Rychlý průvodce instalací Rýchly sprievodca inštaláciou Intuos5 Poznámka: chraňte svůj tablet. Vyměňujte včas hroty pera. Bližší informace najdete v Uživatelském manuálu. Poznámka: chráňte svoj

More information

Polynomials and Factoring

Polynomials and Factoring 7.6 Polynomials and Factoring Basic Terminology A term, or monomial, is defined to be a number, a variable, or a product of numbers and variables. A polynomial is a term or a finite sum or difference of

More information

NUMBER SYSTEMS. William Stallings

NUMBER SYSTEMS. William Stallings NUMBER SYSTEMS William Stallings The Decimal System... The Binary System...3 Converting between Binary and Decimal...3 Integers...4 Fractions...5 Hexadecimal Notation...6 This document available at WilliamStallings.com/StudentSupport.html

More information

Compression techniques

Compression techniques Compression techniques David Bařina February 22, 2013 David Bařina Compression techniques February 22, 2013 1 / 37 Contents 1 Terminology 2 Simple techniques 3 Entropy coding 4 Dictionary methods 5 Conclusion

More information

Solve addition and subtraction word problems, and add and subtract within 10, e.g., by using objects or drawings to represent the problem.

Solve addition and subtraction word problems, and add and subtract within 10, e.g., by using objects or drawings to represent the problem. Solve addition and subtraction word problems, and add and subtract within 10, e.g., by using objects or drawings to represent the problem. Solve word problems that call for addition of three whole numbers

More information

Table of Contents Appendix 4-9

Table of Contents Appendix 4-9 Table of Contents Appendix 4-9 Appendix Multi-Input Thermometer & Datalogger Software Manual v1.0 4-8 Table of Contents 1. Introduction...1-1 1.1 Operation Environment...1-1 1.2 Hardware...1-1 1.3 Connecting

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

Lecture 10: Regression Trees

Lecture 10: Regression Trees Lecture 10: Regression Trees 36-350: Data Mining October 11, 2006 Reading: Textbook, sections 5.2 and 10.5. The next three lectures are going to be about a particular kind of nonlinear predictive model,

More information

Public Key Cryptography: RSA and Lots of Number Theory

Public Key Cryptography: RSA and Lots of Number Theory Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver

More information

Roots of Polynomials

Roots of Polynomials Roots of Polynomials (Com S 477/577 Notes) Yan-Bin Jia Sep 24, 2015 A direct corollary of the fundamental theorem of algebra is that p(x) can be factorized over the complex domain into a product a n (x

More information

CS321. Introduction to Numerical Methods

CS321. Introduction to Numerical Methods CS3 Introduction to Numerical Methods Lecture Number Representations and Errors Professor Jun Zhang Department of Computer Science University of Kentucky Lexington, KY 40506-0633 August 7, 05 Number in

More information

An Overview of Integer Factoring Algorithms. The Problem

An Overview of Integer Factoring Algorithms. The Problem An Overview of Integer Factoring Algorithms Manindra Agrawal IITK / NUS The Problem Given an integer n, find all its prime divisors as efficiently as possible. 1 A Difficult Problem No efficient algorithm

More information