# 2015:07. Tree Approximation for hp- Adaptivity. Peter Binev

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 INTERDISCIPLINARY MATHEMATICS INSTITUTE 205:07 Tree Approximation for hp- Adaptivity Peter Binev IMI PREPRINT SERIES COLLEGE OF ARTS AND SCIENCES UNIVERSITY OF SOUTH CAROLINA

3 the presentation, from now on we will consider the case of binary subdivision, namely, that is subdivided into two smaller elements and, such that = and is an empty set or a set of measure zero. We shall call and children of that will be referred as their parent. The resulting graph will be a full binary tree with a root R and the elements of the current partition will be identified with the current leaves of the tree. With a slight abuse of the notation, we will refer to as both an element of the partition and a node of the binary tree. For a given tree T we denote the set of its leaves by L(T. The internal nodes of T also form a binary tree T \L(T but it might not be a full tree, i.e. there might be a parent node with just one child. We define the complexity N of a full tree to be #L(T, the number of its leaves. This conveniently corresponds to the number of elements in the partition of Ω constituted by T. The local errors at an element of the partition are denoted by e p (, where p = P( is the order of the polynomial space used in the approximation at. It is important to emphasize that we want to work with additive quantities and to have that the total error E(T, P(T for a given partition defined by T and the assignments ( P(T := P( (. L(T is defined by E(T, P(T := L(T e P( (. (.2 In particular, this means that when working with the L 2 -norm, we define the error to be the square of the L 2 -norm of the difference between the function and the approximating polynomial. This presentation uses very general settings about the error e p (, p only requiring the following two properties: (i subadditivity of the error for the lowest order approximation: where and are the children of ; (ii reduction of the error when the polynomial order increases e ( e ( + e (, (.3 e p ( e p+ (. (.4 In some cases it is convenient and often necessary to consider a less demanding variant of (.3 known as weak subadditivity: e ( c e (, (.5 (T T where c > 0 is a fixed constant independent of the choice of or the tree T. In this formula and everywhere else in the paper T stands for the infinite full binary tree rooted at. It is easy to see that (.5 holds with c = in case (.3 is true. While the proofs presented below can be modified to use (.5 instead of (.3, this will result in additional complications and less favorite constants. To keep the presentation simple, we choose to use the property (.3 and refer the reader to [4] for considerations in full generality in the case of h-adaptivity. The definition of the best approximation depends on the notion of complexity. Here we set the complexity of the hp-adaptive approximation by the pair (T, P(T to be the sum of orders at all the elements of the partition #P(T := P(. (.6 L(T 2

5 Theorem.2 Let the local errors e p satisfy the conditions (.3 and (.4. Then there exists a constructive incremental algorithm for finding a tree T N starting from T = R and for each j receiving T j+ from T j by adding two children nodes to a leaf of T j. In addition, for each tree T N there exists a subtree T N such that the hp-adaptive approximation provided by the pair (T N, T N is near-best, namely, E(T N, T N 2N N n + σ n (. for( any integer n N. The complexity of the algorithm for obtaining (T N, T N is bounded by O P(, T N, where P(, T N is defined by (.9. T N Remark.3 The sum P(, T N estimating the complexity of the algorithm varies from T N O(N log N for well balanced trees T N to O(N 2 for highly unbalanced ones. 2 Near-Best Results for an h-refinement Strategy The setup in the case of h-adaptive approximation is much more simple. In particular, the local approximations are using the same polynomial space, so we denote the local errors by e(. Since this is the basic approximation, although the orders could be higher, we relate e( to e ( in the hp-setup and therefore assume that it satisfies the subadditivity property corresponding to (.3: e( e( + e( (2. where and are the children of. The global h-error for the tree T is then defined by E h (T := e( (2.2 and the best N-tern h-adaptive approximation is σ h N := L(T min T : #L(T N Eh (T. (2.3 To build the algorithm for near-best h-adaptive tree approximation, we define the modified errors ẽ( as follows: ẽ(r := e(r for the root and ẽ( := e( ẽ( e( + ẽ(, (2.4 where is the parent of. In case both e( and ẽ( are zeros, we define ẽ( = 0, as well. It is sometimes beneficial to use the following equivalent formula for ẽ( ẽ( = e( + ẽ(. (2.5 The modified error is independent on the tree and can be used to devise a greedy algorithm for finding a tree T N that provides a near-best approximation. Define T := {R} and receive the tree T N+ from T N by subdividing a leaf L(T N with the largest ẽ( among all leaves from L(T N. The following theorem holds. 4

6 Theorem 2. Let the local errors e( satisfy the condition (2. and the tree T N is received by applying a greedy refinement strategy with respect to the quantities ẽ( defined by (2.4. Then the tree T N provides a near-best h-adaptive approximation E h (T N N N n + σh n (2.6 for any integer n N. The complexity of the algorithm for obtaining T N is O(N safe for the sorting of ẽ( that requires O(N log N operations. Remark 2.2 The sorting can be avoided by binning the values of ẽ( into binary bins and choosing for subdivision any of the that provides a value for the largest nonempty bin. This will only increase the constant in (2.6 by 2. In this case the total complexity of the algorithm is O(N. To prepare for the proof we should make some remarks and prove two lemmas. First, let us mention that the following quantities are decreasing with respect to N t N := max ẽ(. (2.7 L(T N Indeed, from (2.5 it follows that the the value ẽ( for a node is smaller than the value ẽ( for its parent and thus max ẽ( max ẽ( since in the set L(T N+ two children nodes L(T N L(T N+ replace their parent which is in L(T N. Next, we consider a general binary tree T (not necessarily full and a threshold t such that for all of its leaves ẽ( t, L(T and for all other nodes ẽ( t, (T \L(T. The following two results hold. Lemma 2.3 Let t > 0 and T be a general binary tree rooted at R and such that ẽ( t for all leaves L(T. Then e( (#T t. (2.8 L(T Proof. Given a leaf we set = (0 and denote by (j+ the parent of (j, j = 0,,..., l, where l is such that (l = R. Then by (2.5 and ẽ(r = e(r we receive ẽ( (0 = e( (0 + ẽ( ( = e( (0 + e( ( + ẽ( (2 =... = Multiplying both parts of the equation by e( (0 ẽ( (0 we receive l e( (0 = ẽ( (0 e( (0 l e( (j = e( ẽ( (0 (0 + e( (j. j=0 j= l j=0 e( (j. (2.9 Now denoting by A( the set of ancestors of = (0 in the tree and using that ẽ( t, we have e( t + e( e( A( 5

7 and therefore L(T e( t L(T + A( e( e( = t #L(T + (T \L(T e( e(, (T L(T (2.0 where in the derivation of the last expression we change the order of summation and take into account that the set of all leaves of T to which is an ancestor is exactly T L(T. Now we use that (.3 yields (.5 with c = to conclude that each of the fractions in the sum over does not exceed. Thus, the sum is at most #(T \L(T which proves the lemma since L(T T. Lemma 2.4 Let t > 0, be a node in a tree T for which e and ẽ are defined, and let T be a general binary subtree of T rooted at and such that ẽ( t for all nodes T. Then Proof. For any node of T we have e( (#T t. (2. e( ẽ( t. This gives the estimate in the case #T = and =. If, in addition, has a parent node T, then from (2.5 we get ( e( e( t e( + e( ( ẽ( = t + e( ẽ(. (2.2 We are going to prove by induction that if for a node T the tree T rooted at has k nodes in T, then e( tk (2.3 and in case has a parent T ( e( t k + e(. (2.4 ẽ( Assume that T has children T and T such that the trees T and T have k and k nodes in T, correspondingly. Then, the tree T rooted at has k := k + k + nodes in T. Let (2.4 holds for both and. Adding the corresponding inequalities together gives ( e( + e( t k + k + e( + e(. (2.5 ẽ( e( Multiplying both sides by e( +e( we receive ( e( t k + k + e( t(k + k + = tk (2.6 ẽ( 6

8 to establish (2.3 for and k. If has a parent, then we use (2.4 to get ( e( t k + k + e( e( + e( ( ẽ( = t k + e( ẽ( (2.7 to establish (2.4 for and k. In case T has just one child T, the considerations are the same as above, setting k = 0 and e( = 0 where appropriate. The induction argument completes the proof. Proof of Theorem 2.. Let Tn be a tree of best approximation for n, so E h (Tn = σn. h We want to compare the trees T N and Tn. If (Tn \L(Tn (T N \L(T N, then Tn T N and therefore E h (T N E h (Tn. So, we can assume that there is at least one internal node of Tn that is not an internal node of T N. We use Lemma 2.4 to estimate E h (Tn = σn h from below in terms of t N from (2.6. To this end we consider the set F of all nodes in the trees T steming from leaves L(Tn and having as nodes only the nodes from T N \L(T N. Of course, some of the trees T could be empty. The total number of nodes from these trees is #F (N (n 2 = N n + since at list one node from Tn \L(Tn is not in T N \L(T N. The application of (2. gives σ h n = E h (T n = L(T n e( L(T n (#T t N = (#F t N (N n + t N. (2.8 To estimate E h (T N from above we divide the set of its leaves into two parts: the leaves that are nodes in (Tn \L(Tn and the rest of them which combined errors can be estimated by E h (Tn = σn h E h (T N = e( σn h + e(. (2.9 L(T N [L(T N (T n \L(T n ] We apply Lemma 2.3 for the minimal tree T with leaves L(T N (T n \L(T n to receive [L(T N (T n \L(T n ] e( #(T n \L(T n t N n N n + σh n, (2.20 where we have used that T (T n \L(T n and (2.8. Finally, the combination of (2.9 and (2.20 completes the proof of ( Adaptive Strategy for hp-refinements Before formulating our hp-refinement strategy, we describe a recursive algorithm to find the subtree T N for a given T N. We define the local hp-errors E( = E(, T N starting with E( := e ( for L(T N. If E( and E( are already defined for the children and of, we set E( := min { E( + E(, e P( ( }, (3. 7

9 where the order P( = P(, T N is given by (.9. To receive the tree T N we start with T N and trim it at every time E( = e P( ( in (3.. In this way T N becomes the minimal tree for which E( = e P( ( at all its leaves. An important observation about the dependence of quantities E( = E(, T N from T N is that it is based only on changes in the subtree rooted at. Therefore, E(, T N will change with the increasing of N only if the quantity P(, T N changes. It is then convenient to consider the notation E j ( independently of T N setting that E j ( := E(, T N whenever j = P(, T N. As in the h-refinement case, we define via (2.4 the quantities ẽ( based on the local errors e( = e (. These quantities are independent of T N and give information about the local error at the node only in the case is a leaf of T N. To extend our ability to monitor the local error behavior in the process of finding a good hp-adaptive approximation, we define modified local hp-errors Ẽ( as follows Ẽ ( := ẽ( and Ẽ j ( := E j( Ẽj ( E j ( + Ẽj ( for j >. (3.2 In case both E j ( and Ẽj ( are zeros, we define Ẽj( := 0 as well. For a fixed tree T N we set j = P(, T N and consider Ẽ( := Ẽ(, T N := ẼP(,T N (. Remark 3. The independence of the quantities E j ( from the tree T N is understood in the sense that the sequence T, T 2, T 3,... is predetermined by the local errors e p ( and a given hp-refinement strategy. If a different refinement strategy is applied, then it may result in different values of the E j (. This is one of the issues that makes the analysis of the hp-adaptive algorithm more complicated than the one from Section 2. The definition (3.2 of Ẽj( and (2.9 used with the set of ancestors A( give Ẽ j ( = E j ( + Ẽ j ( = j k=2 E k ( + Ẽ ( = j k= E k ( + A( e(. (3.3 Next, we introduce two functions q : T N R + and s : T N L(T N that are critical for defining the hp-adaptive algorithm. For the leaves L(T define q( := ẽ( = Ẽ( and s( :=. (3.4 Recursively, for a node T N \L(T N with children and, for which q and s have been determined, define { } q( := min max{q(, q( }, ẼP( ( and s( := s(argmax{q(, q( }. The principal algorithm for incrementally growing the tree T N is the following: for N = set T N := {R}; while N < N max : for the tree T N subdivide the leaf s(r to form T N+ and set N := N +. (3.5 8

10 Before analyzing the near-best performance of the sequence (T N, T N, we first give a detail description of the algorithm to allow to account for its complexity. hp-algorithm: (i set N =, T s(r := R; := {R}, ẽ(r := e(r, E (R := e(r, Ẽ (R := ẽ(r, q(r := ẽ(r, (ii expand the current tree T N to T N+ by subdividing N := s(r and adding two children nodes N and N to it; (iii for = N and = e( ẽ( N calculate the quantities: ẽ( := e( +ẽ(, E ( := e(, Ẽ ( := ẽ(, q( := ẽ(, s( := ; (iv set := N ; (v set N := N + ; exit if N N max (vi set P( := P( + and calculate e P( ( ; (vii set and to be the children of ; (viii set E P( ( := min{e P( ( + E P( (, e P( ( }; (ix set ẼP( ( := E P( ( ẼP( ( E P( ( +ẼP( ( ; (x set D := argmax{q(, q( } and q( := min (xi if R, replace with its parent and go to (vi; (xii go to (ii; Lemma 3.2 To obtain (T N, T N the hp-algorithm performs { } q(d, ẼP( (, s( := s(d; T N P(, T N steps. Proof. In analysis of the algorithm one can see that P(, T N+ = P(, T N + for all nodes, for which the quantities E, Ẽ, q, and s are updated. to be substantiated a bit more Theorem 3.3 The pair (T N, T N produced by the hp-algorithm provides near-best approximation and satisfies (. for any positive integer n N. Proof. Let the pair (T n, P be the one providing the optimal error of complexity n in (.7 and such that σ n = E(T n, P. We define the threshold parameter q N := q(r for the tree T N. From the fact that the quantities involved in the definition of q( decrease in the process of growing the trees T k it follows that the quantities q k are decreasing with k. To estimate σ n from below we consider the leaves L(T n and their orders P (. In case P(, T N P ( we ignore the contribution of e P ( ( to the E(T n, P. If P(, T N > P (, 9

11 we consider the quantity q k q N at the stage T k of growing the tree T N at which the last decision to subdivide a descendent of was made. From the definitions of q and s it follows that at this stage q( q k and therefore Ẽj( q( q N for j = P(, T N. From the intermediate relation in (3.3 we have Ẽ j ( = j i=p ( + E i ( + Ẽ P ( (. Multiplying by Ẽj( E P ( ( and taking into account that quantities E i ( are monotone decreasing with i and that Ẽi( E i (, we receive j E P ( ( = Ẽj( E P ( ( + E P ( ( q N (j P ( + E i ( Ẽ P ( ( and therefore i=p ( + e P ( ( E P ( ( q N (P(, T N P ( +, (3.6 where we have used the standard notation (x + := max{x, 0}. Before applying this inequality for the estimate of σ n, we exclude the case that P(, T N P ( for all L(Tn since then E P(,TN E P ( e P ( ( and therefore E(T N, T N E(Tn, P = σ n which gives (.. For notational purposes only, we set P ( := for all (Tn\L(T n to derive (P(, T N P ( + = (P(, T N P ( + > L(T n L(T n T N L(T n T N (P(, T N P ( = N L(T n T N P ( N n, (3.7 where we have used that (P(, T N P ( + = 0 in case is in the symmetric difference of the sets L(Tn and L(Tn T N, as well as P ( P ( = n. L(T n T N L(T n Now the combination of (3.6 and (3.7 gives σ n = e P ( ( q N (P(, T N P ( + q N (N n +. (3.8 L(Tn L(Tn To obtain an estimate of E(T N, T N from above, we consider the function q( for the tree T N and denote by L the set of nodes for which q( = ẼP( in (3.5. Let Q be the maximal subtree (not necessarily full of T N for which L Q = L(Q. Then q( = ẼP( for all leaves L(Q. From the procedure of defining q it follows that for all these leaves q( q(r = q N. To estimate E P( for L(Q we multiply both sides of (3.3 by ẼP( E P( to receive for j = P(, T N j E j ( = Ẽj( E j ( E k ( + k= A( 0 E j ( e( q N j + A( e( e( (3.9

12 using that E k ( are monotone decreasing and E ( = e(. Utilizing that T N is the optimal subtree in terms of total hp-error the inequality (3.9 gives E(T N, T N E(T N, Q = E P(,TN ( q N P(, T N + e( e(. L(Q L(Q L(Q A( Applying the same estimate as in (2.0 in Lemma 2.3 to the double sum gives E(T N, T N q N (N #L(Q + #Q = q N (N + #L(Q q N (2N, (3.0 which concludes the proof of (.. Theorem.2 now follows from Theorem 3.3 and Lemma 3.2. Remark 3.4 The estimate (3.0 is a bit rough since it was derived treating in the same way all possible subtrees Q including the worst case scenario Q = T N. However, in this particular case one could derive a much better estimate using that the p-option was never taken in the calculation of the quantities q and applying an argument similar to the one for (2.9. Further exploration of such ideas and thorough analysis of the relative placement of the trees Q and T n will result in a slightly better constant in (. but would complicate significantly the proof. Since the advances are marginal, we have chosen clarity. Still to come: adding a paragraph or two about different strategies for hp-adaptivity and their realizations adding citations polishing of the text Acknowledgment: The author wish to thank Ricardo Nochetto for the fruitful discussions and the various valuable suggestions. References [] P. Binev, Adaptive Methods and Near-Best Tree Approximation, Oberwolfach Report 29/2007, [2] P. Binev, Instance optimality for hp-type approximation, Oberwolfach Report 39/203, 3p., to appear. [3] P. Binev, W. Dahmen, and R. DeVore, Adaptive Finite Element Methods with Convergence Rates, Numer. Math. 97 (2004, [4] P. Binev and R. DeVore, Fast Computation in Adaptive Tree Approximation, Numer. Math. 97 (2004,

13 Peter Binev Department of Mathematics, University of South Carolina, Columbia, SC 29208, USA 2

### Full and Complete Binary Trees

Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full

### Analysis of Algorithms I: Binary Search Trees

Analysis of Algorithms I: Binary Search Trees Xi Chen Columbia University Hash table: A data structure that maintains a subset of keys from a universe set U = {0, 1,..., p 1} and supports all three dictionary

### Binary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R

Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent

### Analysis of Algorithms I: Optimal Binary Search Trees

Analysis of Algorithms I: Optimal Binary Search Trees Xi Chen Columbia University Given a set of n keys K = {k 1,..., k n } in sorted order: k 1 < k 2 < < k n we wish to build an optimal binary search

### HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!

Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following

### INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem

### Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

### Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

### CS 103X: Discrete Structures Homework Assignment 3 Solutions

CS 103X: Discrete Structures Homework Assignment 3 s Exercise 1 (20 points). On well-ordering and induction: (a) Prove the induction principle from the well-ordering principle. (b) Prove the well-ordering

### 2.3 Scheduling jobs on identical parallel machines

2.3 Scheduling jobs on identical parallel machines There are jobs to be processed, and there are identical machines (running in parallel) to which each job may be assigned Each job = 1,,, must be processed

### Data Structures Fibonacci Heaps, Amortized Analysis

Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:

### 3. Mathematical Induction

3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

### Notes: Chapter 2 Section 2.2: Proof by Induction

Notes: Chapter 2 Section 2.2: Proof by Induction Basic Induction. To prove: n, a W, n a, S n. (1) Prove the base case - S a. (2) Let k a and prove that S k S k+1 Example 1. n N, n i = n(n+1) 2. Example

### CHAPTER 5. Number Theory. 1. Integers and Division. Discussion

CHAPTER 5 Number Theory 1. Integers and Division 1.1. Divisibility. Definition 1.1.1. Given two integers a and b we say a divides b if there is an integer c such that b = ac. If a divides b, we write a

### Intro. to the Divide-and-Conquer Strategy via Merge Sort CMPSC 465 CLRS Sections 2.3, Intro. to and various parts of Chapter 4

Intro. to the Divide-and-Conquer Strategy via Merge Sort CMPSC 465 CLRS Sections 2.3, Intro. to and various parts of Chapter 4 I. Algorithm Design and Divide-and-Conquer There are various strategies we

### Lecture 10: Regression Trees

Lecture 10: Regression Trees 36-350: Data Mining October 11, 2006 Reading: Textbook, sections 5.2 and 10.5. The next three lectures are going to be about a particular kind of nonlinear predictive model,

### Induction. Margaret M. Fleck. 10 October These notes cover mathematical induction and recursive definition

Induction Margaret M. Fleck 10 October 011 These notes cover mathematical induction and recursive definition 1 Introduction to induction At the start of the term, we saw the following formula for computing

### Mathematical Induction. Lecture 10-11

Mathematical Induction Lecture 10-11 Menu Mathematical Induction Strong Induction Recursive Definitions Structural Induction Climbing an Infinite Ladder Suppose we have an infinite ladder: 1. We can reach

### The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

### Method To Solve Linear, Polynomial, or Absolute Value Inequalities:

Solving Inequalities An inequality is the result of replacing the = sign in an equation with ,, or. For example, 3x 2 < 7 is a linear inequality. We call it linear because if the < were replaced with

### Uniform Multicommodity Flow through the Complete Graph with Random Edge-capacities

Combinatorics, Probability and Computing (2005) 00, 000 000. c 2005 Cambridge University Press DOI: 10.1017/S0000000000000000 Printed in the United Kingdom Uniform Multicommodity Flow through the Complete

### 1 if 1 x 0 1 if 0 x 1

Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

### arxiv:1112.0829v1 [math.pr] 5 Dec 2011

How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

### Graphs without proper subgraphs of minimum degree 3 and short cycles

Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract

### Regular Languages and Finite Automata

Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a

### Indiana State Core Curriculum Standards updated 2009 Algebra I

Indiana State Core Curriculum Standards updated 2009 Algebra I Strand Description Boardworks High School Algebra presentations Operations With Real Numbers Linear Equations and A1.1 Students simplify and

### The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints

### Binary Search Trees CMPSC 122

Binary Search Trees CMPSC 122 Note: This notes packet has significant overlap with the first set of trees notes I do in CMPSC 360, but goes into much greater depth on turning BSTs into pseudocode than

### Approximation Algorithms

Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

### FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization

### 8 Primes and Modular Arithmetic

8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.

### Overview. Essential Questions. Precalculus, Quarter 4, Unit 4.5 Build Arithmetic and Geometric Sequences and Series

Sequences and Series Overview Number of instruction days: 4 6 (1 day = 53 minutes) Content to Be Learned Write arithmetic and geometric sequences both recursively and with an explicit formula, use them

### Zeros of a Polynomial Function

Zeros of a Polynomial Function An important consequence of the Factor Theorem is that finding the zeros of a polynomial is really the same thing as factoring it into linear factors. In this section we

### IB Math Research Problem

Vincent Chu Block F IB Math Research Problem The product of all factors of 2000 can be found using several methods. One of the methods I employed in the beginning is a primitive one I wrote a computer

### CHAPTER 3 Numbers and Numeral Systems

CHAPTER 3 Numbers and Numeral Systems Numbers play an important role in almost all areas of mathematics, not least in calculus. Virtually all calculus books contain a thorough description of the natural,

### Graphical degree sequences and realizations

swap Graphical and realizations Péter L. Erdös Alfréd Rényi Institute of Mathematics Hungarian Academy of Sciences MAPCON 12 MPIPKS - Dresden, May 15, 2012 swap Graphical and realizations Péter L. Erdös

### SECTION 10-2 Mathematical Induction

73 0 Sequences and Series 6. Approximate e 0. using the first five terms of the series. Compare this approximation with your calculator evaluation of e 0.. 6. Approximate e 0.5 using the first five terms

### CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected

### Balanced Binary Search Tree

AVL Trees / Slide 1 Balanced Binary Search Tree Worst case height of binary search tree: N-1 Insertion, deletion can be O(N) in the worst case We want a tree with small height Height of a binary tree with

### MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete

### GRAPH THEORY LECTURE 4: TREES

GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection

### RECURSIVE ENUMERATION OF PYTHAGOREAN TRIPLES

RECURSIVE ENUMERATION OF PYTHAGOREAN TRIPLES DARRYL MCCULLOUGH AND ELIZABETH WADE In [9], P. W. Wade and W. R. Wade (no relation to the second author gave a recursion formula that produces Pythagorean

### APPLICATIONS OF THE ORDER FUNCTION

APPLICATIONS OF THE ORDER FUNCTION LECTURE NOTES: MATH 432, CSUSM, SPRING 2009. PROF. WAYNE AITKEN In this lecture we will explore several applications of order functions including formulas for GCDs and

### princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming Lecturer: Sanjeev Arora

princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming Lecturer: Sanjeev Arora Scribe: One of the running themes in this course is the notion of

### Lecture 3: Finding integer solutions to systems of linear equations

Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture

### Math 55: Discrete Mathematics

Math 55: Discrete Mathematics UC Berkeley, Fall 2011 Homework # 5, due Wednesday, February 22 5.1.4 Let P (n) be the statement that 1 3 + 2 3 + + n 3 = (n(n + 1)/2) 2 for the positive integer n. a) What

### Math 4310 Handout - Quotient Vector Spaces

Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable

### 8.1 Min Degree Spanning Tree

CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

### Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li. Advised by: Dave Mount. May 22, 2014

Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li Advised by: Dave Mount May 22, 2014 1 INTRODUCTION In this report we consider the implementation of an efficient

### Binary Heaps * * * * * * * / / \ / \ / \ / \ / \ * * * * * * * * * * * / / \ / \ / / \ / \ * * * * * * * * * *

Binary Heaps A binary heap is another data structure. It implements a priority queue. Priority Queue has the following operations: isempty add (with priority) remove (highest priority) peek (at highest

### 6.3 Conditional Probability and Independence

222 CHAPTER 6. PROBABILITY 6.3 Conditional Probability and Independence Conditional Probability Two cubical dice each have a triangle painted on one side, a circle painted on two sides and a square painted

### Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

### CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12

CONTINUED FRACTIONS AND PELL S EQUATION SEUNG HYUN YANG Abstract. In this REU paper, I will use some important characteristics of continued fractions to give the complete set of solutions to Pell s equation.

### Taylor Polynomials and Taylor Series Math 126

Taylor Polynomials and Taylor Series Math 26 In many problems in science and engineering we have a function f(x) which is too complicated to answer the questions we d like to ask. In this chapter, we will

### The program also provides supplemental modules on topics in geometry and probability and statistics.

Algebra 1 Course Overview Students develop algebraic fluency by learning the skills needed to solve equations and perform important manipulations with numbers, variables, equations, and inequalities. Students

### A Note on Maximum Independent Sets in Rectangle Intersection Graphs

A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada tmchan@uwaterloo.ca September 12,

### Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

### 8.1 Makespan Scheduling

600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Dynamic Programing: Min-Makespan and Bin Packing Date: 2/19/15 Scribe: Gabriel Kaptchuk 8.1 Makespan Scheduling Consider an instance

### An example of a computable

An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept

### The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.

The Prime Numbers Before starting our study of primes, we record the following important lemma. Recall that integers a, b are said to be relatively prime if gcd(a, b) = 1. Lemma (Euclid s Lemma). If gcd(a,

### Quotient Rings and Field Extensions

Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

### Some Notes on Taylor Polynomials and Taylor Series

Some Notes on Taylor Polynomials and Taylor Series Mark MacLean October 3, 27 UBC s courses MATH /8 and MATH introduce students to the ideas of Taylor polynomials and Taylor series in a fairly limited

### What is Linear Programming?

Chapter 1 What is Linear Programming? An optimization problem usually has three essential ingredients: a variable vector x consisting of a set of unknowns to be determined, an objective function of x to

### Linear Programming Notes V Problem Transformations

Linear Programming Notes V Problem Transformations 1 Introduction Any linear programming problem can be rewritten in either of two standard forms. In the first form, the objective is to maximize, the material

### x if x 0, x if x < 0.

Chapter 3 Sequences In this chapter, we discuss sequences. We say what it means for a sequence to converge, and define the limit of a convergent sequence. We begin with some preliminary results about the

### Theory of Computation Prof. Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology, Madras

Theory of Computation Prof. Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture No. # 31 Recursive Sets, Recursively Innumerable Sets, Encoding

### 3.4 Complex Zeros and the Fundamental Theorem of Algebra

86 Polynomial Functions.4 Complex Zeros and the Fundamental Theorem of Algebra In Section., we were focused on finding the real zeros of a polynomial function. In this section, we expand our horizons and

### This unit will lay the groundwork for later units where the students will extend this knowledge to quadratic and exponential functions.

Algebra I Overview View unit yearlong overview here Many of the concepts presented in Algebra I are progressions of concepts that were introduced in grades 6 through 8. The content presented in this course

### Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year.

This document is designed to help North Carolina educators teach the Common Core (Standard Course of Study). NCDPI staff are continually updating and improving these tools to better serve teachers. Algebra

### Classification/Decision Trees (II)

Classification/Decision Trees (II) Department of Statistics The Pennsylvania State University Email: jiali@stat.psu.edu Right Sized Trees Let the expected misclassification rate of a tree T be R (T ).

### How High a Degree is High Enough for High Order Finite Elements?

This space is reserved for the Procedia header, do not use it How High a Degree is High Enough for High Order Finite Elements? William F. National Institute of Standards and Technology, Gaithersburg, Maryland,

### A Non-Linear Schema Theorem for Genetic Algorithms

A Non-Linear Schema Theorem for Genetic Algorithms William A Greene Computer Science Department University of New Orleans New Orleans, LA 70148 bill@csunoedu 504-280-6755 Abstract We generalize Holland

### Algorithms and Data Structures

Algorithms and Data Structures Part 2: Data Structures PD Dr. rer. nat. habil. Ralf-Peter Mundani Computation in Engineering (CiE) Summer Term 2016 Overview general linked lists stacks queues trees 2 2

### No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics

No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results

### Mathematical induction. Niloufar Shafiei

Mathematical induction Niloufar Shafiei Mathematical induction Mathematical induction is an extremely important proof technique. Mathematical induction can be used to prove results about complexity of

### Local periods and binary partial words: An algorithm

Local periods and binary partial words: An algorithm F. Blanchet-Sadri and Ajay Chriscoe Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402 6170, USA E-mail:

### Algorithms Chapter 12 Binary Search Trees

Algorithms Chapter 1 Binary Search Trees Outline Assistant Professor: Ching Chi Lin 林 清 池 助 理 教 授 chingchi.lin@gmail.com Department of Computer Science and Engineering National Taiwan Ocean University

### 9.2 Summation Notation

9. Summation Notation 66 9. Summation Notation In the previous section, we introduced sequences and now we shall present notation and theorems concerning the sum of terms of a sequence. We begin with a

### CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e.

CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. This chapter contains the beginnings of the most important, and probably the most subtle, notion in mathematical analysis, i.e.,

### The Ideal Class Group

Chapter 5 The Ideal Class Group We will use Minkowski theory, which belongs to the general area of geometry of numbers, to gain insight into the ideal class group of a number field. We have already mentioned

### k, then n = p2α 1 1 pα k

Powers of Integers An integer n is a perfect square if n = m for some integer m. Taking into account the prime factorization, if m = p α 1 1 pα k k, then n = pα 1 1 p α k k. That is, n is a perfect square

### We shall turn our attention to solving linear systems of equations. Ax = b

59 Linear Algebra We shall turn our attention to solving linear systems of equations Ax = b where A R m n, x R n, and b R m. We already saw examples of methods that required the solution of a linear system

### Binary Search Trees. Data in each node. Larger than the data in its left child Smaller than the data in its right child

Binary Search Trees Data in each node Larger than the data in its left child Smaller than the data in its right child FIGURE 11-6 Arbitrary binary tree FIGURE 11-7 Binary search tree Data Structures Using

### Section 6-2 Mathematical Induction

6- Mathematical Induction 457 In calculus, it can be shown that e x k0 x k k! x x x3!! 3!... xn n! where the larger n is, the better the approximation. Problems 6 and 6 refer to this series. Note that

### ! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

### The Relation between Two Present Value Formulae

James Ciecka, Gary Skoog, and Gerald Martin. 009. The Relation between Two Present Value Formulae. Journal of Legal Economics 15(): pp. 61-74. The Relation between Two Present Value Formulae James E. Ciecka,

### Linear Equations and Inequalities

Linear Equations and Inequalities Section 1.1 Prof. Wodarz Math 109 - Fall 2008 Contents 1 Linear Equations 2 1.1 Standard Form of a Linear Equation................ 2 1.2 Solving Linear Equations......................

### Recursive Algorithms. Recursion. Motivating Example Factorial Recall the factorial function. { 1 if n = 1 n! = n (n 1)! if n > 1

Recursion Slides by Christopher M Bourke Instructor: Berthe Y Choueiry Fall 007 Computer Science & Engineering 35 Introduction to Discrete Mathematics Sections 71-7 of Rosen cse35@cseunledu Recursive Algorithms

### Influences in low-degree polynomials

Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known

### South Carolina College- and Career-Ready (SCCCR) Algebra 1

South Carolina College- and Career-Ready (SCCCR) Algebra 1 South Carolina College- and Career-Ready Mathematical Process Standards The South Carolina College- and Career-Ready (SCCCR) Mathematical Process

### MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

### Offline sorting buffers on Line

Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

### Zeros of Polynomial Functions

Zeros of Polynomial Functions The Rational Zero Theorem If f (x) = a n x n + a n-1 x n-1 + + a 1 x + a 0 has integer coefficients and p/q (where p/q is reduced) is a rational zero, then p is a factor of

### On the k-path cover problem for cacti

On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

### So let us begin our quest to find the holy grail of real analysis.

1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers

### Notes from Week 1: Algorithms for sequential prediction

CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking

### Homework # 3 Solutions

Homework # 3 Solutions February, 200 Solution (2.3.5). Noting that and ( + 3 x) x 8 = + 3 x) by Equation (2.3.) x 8 x 8 = + 3 8 by Equations (2.3.7) and (2.3.0) =3 x 8 6x2 + x 3 ) = 2 + 6x 2 + x 3 x 8

### Glencoe. correlated to SOUTH CAROLINA MATH CURRICULUM STANDARDS GRADE 6 3-3, 5-8 8-4, 8-7 1-6, 4-9

Glencoe correlated to SOUTH CAROLINA MATH CURRICULUM STANDARDS GRADE 6 STANDARDS 6-8 Number and Operations (NO) Standard I. Understand numbers, ways of representing numbers, relationships among numbers,