Membrane Systems with Marked Membranes

Size: px
Start display at page:

Download "Membrane Systems with Marked Membranes"

Transcription

1 Membrne Systems with Mrked Membrnes Mtteo Cvliere Microsoft Reserch - University of Trento Centre for Computtionl nd Systems Biology Itly Dep. of Computer Science nd Artificil Intelligence University of Seville Spin

2 Nturl Computing Nturl\Biologicl processes cn be used: For implementing computtions (Adlemn s experiment, 1994).

3 Nturl Computing Nturl\Biologicl processes cn be used: For implementing computtions (Adlemn s experiment, 1994). Constructing new computing devices (Benenson et l., 2001).

4 Nturl Computing Nturl\Biologicl processes cn be used: For implementing computtions (Adlemn s experiment, 1994). Constructing new computing devices (Benenson et l., 2001). Get inspirtions for new computtionl prdigms.

5 Nturl Computing Nturl\Biologicl processes cn be used: For implementing computtions (Adlemn s experiment, 1994). Constructing new computing devices (Benenson et l., 2001). Get inspirtions for new computtionl prdigms. Membrne Computing Computtionl prdigm inspired by the structure nd functioning of living cells.

6 Forml lnguge theory Alphbet finite set of symbols. V * set of ll strings of symbols from n lphbet V. V + = V * - {λ}. L V * lngugeover V.

7 Forml lnguge theory Alphbet finite set of symbols. V * set of ll strings of symbols from n lphbet V. V + = V * - {λ}. L V * lngugeover V. V = {, b, c} is n lphbet. x = bbbc = 3 b 3 c 2 is string over V. L = { n b n c n > 0} = {bc, bbc, bbbc,... } is lnguge over V.

8 Forml lnguge theory Alphbet finite set of symbols. V * set of ll strings of symbols from n lphbet V. V + = V * - {λ}. L V * lngugeover V. V = {, b, c} is n lphbet. x = bbbc = 3 b 3 c 2 is string over V. L = { n b n c n > 0} = {bc, bbc, bbbc,... } is lnguge over V. How cn we generte lnguges?

9 Forml (Chomsky) grmmrs A grmmr is finite device generting in specified wy the strings of lnguge.

10 Forml (Chomsky) grmmrs A grmmr is finite device generting in specified wy the strings of lnguge. A grmmr is G = (N, T, S, P) N set of nonterminls T set of terminls S xiom P productions u v u (N T) * N (N T) *, v (N T) *

11 Forml (Chomsky) grmmrs A grmmr is finite device generting in specified wy the strings of lnguge. A grmmr is G = (N, T, S, P) N set of nonterminls T set of terminls S xiom P productions u v u (N T) * N (N T) *, v (N T) * x y iff x = x 1 u x 2 x 1, x 2 (N T) * u v P

12 Forml (Chomsky) grmmrs A grmmr is finite device generting in specified wy the strings of lnguge. A grmmr is G = (N, T, S, P) N set of nonterminls T set of terminls S xiom P productions u v u (N T) * N (N T) *, v (N T) * x y iff x = x 1 u x 2 y = x 1 v x 2 x 1, x 2 (N T) * u v P

13 Forml (Chomsky) grmmrs A grmmr is finite device generting in specified wy the strings of lnguge. A grmmr is G = (N, T, S, P) N set of nonterminls T set of terminls S xiom P productions u v u (N T) * N (N T) *, v (N T) * bcd bd bc b x y iff x = x 1 u x 2 y = x 1 v x 2 x 1, x 2 (N T) * u v P

14 The lnguge generted by grmmr G = (N, T, S, P) is L(G) = {x T * S * x }.

15 The lnguge generted by grmmr G = (N, T, S, P) is L(G) = {x T * S * x }. G = ({S}, {,b}, S, {S Sb, S b}).

16 The lnguge generted by grmmr G = (N, T, S, P) is L(G) = {x T * S * x }. G = ({S}, {,b}, S, {S Sb, S b}). S Sb

17 The lnguge generted by grmmr G = (N, T, S, P) is L(G) = {x T * S * x }. G = ({S}, {,b}, S, {S Sb, S b}). S Sb Sbb

18 The lnguge generted by grmmr G = (N, T, S, P) is L(G) = {x T * S * x }. G = ({S}, {,b}, S, {S Sb, S b}). S Sb Sbb bbb

19 The lnguge generted by grmmr G = (N, T, S, P) is L(G) = {x T * S * x }. G = ({S}, {,b}, S, {S Sb, S b}). S Sb Sbb bbb bb

20 The lnguge generted by grmmr G = (N, T, S, P) is L(G) = {x T * S * x }. G = ({S}, {,b}, S, {S Sb, S b}). S Sb Sbb bbb bb Sbbb...

21 The lnguge generted by grmmr G = (N, T, S, P) is L(G) = {x T * S * x }. G = ({S}, {,b}, S, {S Sb, S b}). S Sb Sbb bbb bb Sbbb... L(G) = { n b n n 1} = {b, bb, bbb,... }.

22 Chomsky hierrchy RE = Turing mchines CS = LBA CF = PDA REG =FA

23 Chomsky hierrchy RE = Turing mchines CS = LBA CF = PDA REG =FA { x x L} length set of L (set of numbers).

24 Chomsky hierrchy RE = Turing mchines CS = LBA CF = PDA REG =FA L= () * = {λ,,,,...} Length-set (L) = {x x is n even number} { x x L} length set of L (set of numbers).

25 Chomsky hierrchy RE = Turing mchines CS = LBA CF = PDA REG =FA L= () * = {λ,,,,...} Length-set (L) = {x x is n even number} { x x L} length set of L (set of numbers). NREG, NCF,..., NRE

26 Multisets A multiset is set where ech element hs multiplicity. {,,, b, b, c, c, c, c} = {(,3), (b,2), (c,4)}

27 Multisets A multiset is set where ech element hs multiplicity. {,,, b, b, c, c, c, c} = {(,3), (b,2), (c,4)} A multiset M cn be represented by string w = M( 1 1 ) M( 2 2)... M( n n )

28 Multisets A multiset is set where ech element hs multiplicity. {,,, b, b, c, c, c, c} = {(,3), (b,2), (c,4)} A multiset M cn be represented by string w = M( 1 1 ) M( 2 2)... M( n n ) Any permuttion of w is vlid representtion of M.

29 Multisets A multiset is set where ech element hs multiplicity. {,,, b, b, c, c, c, c} = {(,3), (b,2), (c,4)} A multiset M cn be represented by string w = M( 1 1 ) M( 2 2)... M( n n ) Any permuttion of w is vlid representtion of M. The multiset {(,3), (b,2), (c,4)} cn be represented by:

30 Multisets A multiset is set where ech element hs multiplicity. {,,, b, b, c, c, c, c} = {(,3), (b,2), (c,4)} A multiset M cn be represented by string w = M( 1 1 ) M( 2 2)... M( n n ) Any permuttion of w is vlid representtion of M. The multiset {(,3), (b,2), (c,4)} cn be represented by: bbcccc= 3 b 2 c 4

31 Multisets A multiset is set where ech element hs multiplicity. {,,, b, b, c, c, c, c} = {(,3), (b,2), (c,4)} A multiset M cn be represented by string w = M( 1 1 ) M( 2 2)... M( n n ) Any permuttion of w is vlid representtion of M. The multiset {(,3), (b,2), (c,4)} cn be represented by: bbcccc= 3 b 2 c 4 bbcccc

32 Multisets A multiset is set where ech element hs multiplicity. {,,, b, b, c, c, c, c} = {(,3), (b,2), (c,4)} A multiset M cn be represented by string w = M( 1 1 ) M( 2 2)... M( n n ) Any permuttion of w is vlid representtion of M. The multiset {(,3), (b,2), (c,4)} cn be represented by: bbcccc= 3 b 2 c 4 bbcccc...

33 Multisets A multiset is set where ech element hs multiplicity. {,,, b, b, c, c, c, c} = {(,3), (b,2), (c,4)} A multiset M cn be represented by string w = M( 1 1 ) M( 2 2)... M( n n ) Any permuttion of w is vlid representtion of M. The multiset {(,3), (b,2), (c,4)} cn be represented by: bbcccc= 3 b 2 c 4 bbcccc... The order in the string does not count

34 Membrne systems

35 Membrne systems Membrne systems re models of computtion inspired by some bsic fetures of living cells.

36 Membrne systems Membrne systems re models of computtion inspired by some bsic fetures of living cells. 1 3 b 4 b out b c c 2 c here c out b bout bc b 3 2

37 Membrne systems Membrne systems re models of computtion inspired by some bsic fetures of living cells. membrnes 1 3 b 4 b out b c c 2 c here c out b bout bc b 3 2

38 Membrne systems Membrne systems re models of computtion inspired by some bsic fetures of living cells. membrnes b b c c 2 c here c out multisets of objects (biomolecules) inserted in regions b out b bout bc b 3 2

39 Membrne systems Membrne systems re models of computtion inspired by some bsic fetures of living cells. membrnes b b c c 2 c here c out multisets of objects (biomolecules) inserted in regions b out b bout bc b 3 2 evolution rules with trgets (biochemicl rections)

40 Membrne systems Membrne systems re models of computtion inspired by some bsic fetures of living cells. membrnes b b c c 2 c here c out multisets of objects (biomolecules) inserted in regions b out environment b bout bc b 3 2 evolution rules with trgets (biochemicl rections)

41 Membrne systems Membrne systems re models of computtion inspired by some bsic fetures of living cells. membrnes b b c c 2 c here c out multisets of objects (biomolecules) inserted in regions b out environment b bout bc b 3 2 evolution rules with trgets (biochemicl rections) evolution rules re locl to the regions where they re present

42 Membrne systems A membrne system is construct Π = (V, µ, w 1, w 2,..., w m, R 1, R 2,..., R m, i 0 )

43 Membrne systems A membrne system is construct Π = (V, µ, w 1, w 2,..., w m, R 1, R 2,..., R m, i 0 ) V lphbet - its elements re clled objects.

44 Membrne systems A membrne system is construct Π = (V, µ, w 1, w 2,..., w m, R 1, R 2,..., R m, i 0 ) V lphbet - its elements re clled objects. µ is membrne structure (hierrchicl rrnged) with m membrnes. Ech membrne hs n unique lbel.

45 Membrne systems A membrne system is construct Π = (V, µ, w 1, w 2,..., w m, R 1, R 2,..., R m, i 0 ) V lphbet - its elements re clled objects. µ is membrne structure (hierrchicl rrnged) with m membrnes. Ech membrne hs n unique lbel. w 1, w 2,..., w m strings representing the initil contents of regions 1, 2,..., m of µ.

46 Membrne systems A membrne system is construct Π = (V, µ, w 1, w 2,..., w m, R 1, R 2,..., R m, i 0 ) V lphbet - its elements re clled objects. µ is membrne structure (hierrchicl rrnged) with m membrnes. Ech membrne hs n unique lbel. w 1, w 2,..., w m 1, 2,..., m of µ. strings representing the initil contents of regions R 1, R 2,..., R m finite sets of evolution rules ssocited with regions 1, 2,..., m of µ.

47 Membrne systems A membrne system is construct Π = (V, µ, w 1, w 2,..., w m, R 1, R 2,..., R m, i 0 ) V lphbet - its elements re clled objects. µ is membrne structure (hierrchicl rrnged) with m membrnes. Ech membrne hs n unique lbel. w 1, w 2,..., w m 1, 2,..., m of µ. strings representing the initil contents of regions R 1, R 2,..., R m finite sets of evolution rules ssocited with regions 1, 2,..., m of µ. i 0, output region.

48 Computtion of membrne system There exists globl clock mrking the time of ech step for the whole system.

49 Computtion of membrne system There exists globl clock mrking the time of ech step for the whole system. Configurtion µ (membrne structure) + contents of the regions.

50 Computtion of membrne system There exists globl clock mrking the time of ech step for the whole system. Configurtion µ (membrne structure) + contents of the regions. Step of computtion The evolution rules re used in nondeterministic mximlly prllel wy, in ech region. Next configurtion

51 Computtion of membrne system There exists globl clock mrking the time of ech step for the whole system. Configurtion µ (membrne structure) + contents of the regions. Step of computtion The evolution rules re used in nondeterministic mximlly prllel wy, in ech region. Next configurtion The computtion hlts (successful) when n hlting configurtion is reched.

52 Computtion of membrne system There exists globl clock mrking the time of ech step for the whole system. Configurtion µ (membrne structure) + contents of the regions. Step of computtion The evolution rules re used in nondeterministic mximlly prllel wy, in ech region. Next configurtion The computtion hlts (successful) when n hlting configurtion is reched. The result of successful computtion is the number of objects in the output region.

53 Nondeterministic mximlly prllel Objects nd rules re chosen in nondeterministic wy. The choice is exhustive: fter choice is done no rule cn be pplied to the non ssigned objects.

54 Nondeterministic mximlly prllel Objects nd rules re chosen in nondeterministic wy. The choice is exhustive: fter choice is done no rule cn be pplied to the non ssigned objects. r 1 : bcc cc r 2 : c d r 3 : bc bb b c c

55 Nondeterministic mximlly prllel Objects nd rules re chosen in nondeterministic wy. The choice is exhustive: fter choice is done no rule cn be pplied to the non ssigned objects. Choice 1: (r 1, 1) r 1 : bcc cc r 2 : c d r 3 : bc bb b c c

56 Nondeterministic mximlly prllel Objects nd rules re chosen in nondeterministic wy. The choice is exhustive: fter choice is done no rule cn be pplied to the non ssigned objects. Choice 1: (r 1, 1) Choice 2: (r 2, 2) r 1 : bcc cc r 2 : c d r 3 : bc bb b c c

57 Nondeterministic mximlly prllel Objects nd rules re chosen in nondeterministic wy. The choice is exhustive: fter choice is done no rule cn be pplied to the non ssigned objects. Choice 1: (r 1, 1) Choice 2: (r 2, 2) Choice 3: (r 2, 1), (r 3, 1) r 1 : bcc cc r 2 : c d r 3 : bc bb b c c

58 Nondeterministic mximlly prllel Objects nd rules re chosen in nondeterministic wy. The choice is exhustive: fter choice is done no rule cn be pplied to the non ssigned objects. Choice 1: (r 1, 1) Choice 2: (r 2, 2) Choice 3: (r 2, 1), (r 3, 1) r 1 : bcc cc r 2 : c d r 3 : bc bb b c c Choice 4: (r 2, 1) is not mximlly prllel

59 Nondeterministic mximlly prllel Objects nd rules re chosen in nondeterministic wy. The choice is exhustive: fter choice is done no rule cn be pplied to the non ssigned objects. Choice 1: (r 1, 1) One of the three choices is selected in nondeterministic wy. Choice 2: (r 2, 2) Choice 3: (r 2, 1), (r 3, 1) r 1 : bcc cc r 2 : c d r 3 : bc bb b c c

60 Computtion in membrne system N(Π ) = {} 1 c h h h 2 2

61 Computtion in membrne system N(Π ) = {} 1 c h h h c h h h 2 2

62 Computtion in membrne system N(Π ) = {1} 1 c h h h c h h h hlting c h c h h 2 2

63 Computtion in membrne system N(Π ) = {1} 1 c h h h c h h h c h c h h 2 2

64 Computtion in membrne system N(Π ) = {1} 1 c h h h c h h h c h c h h c h h h 2 2

65 Computtion in membrne system N(Π ) = {1} 1 c h h h c h h h c h c h h c h h h c h h h 2 2

66 Computtion in membrne system N(Π ) = {1, 2} 1 c h h h c h h h c h c h h c h h h c h h h c h c c h h 2 2 hlting

67 Computtion in membrne system N(Π ) = {1, 2} 1 c h h h c h h h c h c h h c h h h c h h h c h c c h h 2 2

68 Computtion in membrne system N(Π ) = {1, 2,...} =N 1 c h h h c h h h c h c h h c h h h c h h h c h c c h h

69 Computtionl power of membrne systems coopertive u v u V +, v V + tr ex: bc 2 1 b here N 1 (coo) = NRE.

70 Computtionl power of membrne systems coopertive u v u V +, v V + tr ex: bc 2 1 b here N 1 (coo) = NRE. noncoopertive v V, v V + tr ex: 2 1 b here N m (ncoo) = NCF, m 1.

71 Computtionl power of membrne systems coopertive u v u V +, v V + tr ex: bc 2 1 b here N 1 (coo) = NRE. noncoopertive v V, v V + tr ex: 2 1 b here N m (ncoo) = NCF, m 1. ctlytic c cv c C, V, v V + tr ex: c c 2 1 b here N 2 (ct) = NRE.

72 Membrne systems with mrked membrnes Membrnes re crucil in living cells: they seprte (protect) the internls of the cell from the environment. Membrnes re: continers coordintors nd loctions of ctivities.

73 The presence of proteins embedded in membrnes is crucil for the ctivities of the membrnes.

74 Membrne system with mrked membrnes is model of membrne systems where membrnes cn evolve depending on the ttched objects (proteins).

75 Membrne system with mrked membrnes is model of membrne systems where membrnes cn evolve depending on the ttched objects (proteins). objects cn move through the regions of the system.

76 Membrne system with mrked membrnes is model of membrne systems where membrnes cn evolve depending on the ttched objects (proteins). pino rules pinocytosis drip rules cellulr dripping objects cn move through the regions of the system.

77 Membrne system with mrked membrnes is model of membrne systems where membrnes cn evolve depending on the ttched objects (proteins). pino rules pinocytosis drip rules cellulr dripping objects cn move through the regions of the system. protein movement rules ttchment/de-ttchment movement of proteins

78 Membrne system with mrked membrnes Ech membrne hs embedded proteins. [ ] u the multiset u (of proteins) mrks the membrne.

79 Membrne system with mrked membrnes Ech membrne hs embedded proteins. [ ] u the multiset u (of proteins) mrks the membrne. [ [ [ ] b bb ] b [ ] bb ] b b b b b b b b

80 Membrne opertions Protein-membrne rules [ Q ] uv [ [ ] ux Q ] v pino [ Q ] uv [ ] ux [ Q] v drip V u, v, x V * Non-involved proteins re rndomly distributed.

81 Pino ccc bb b [Q ] bb [ [ ] b Q ] b

82 Pino ccc bb b [Q ] bb [ [ ] b Q ] b

83 Pino ccc bb b c b b cc b [Q ] bb [ [ ] b Q ] b

84 Drip ccc bb b [Q ] bb [ ] b [Q ] b

85 Drip ccc bb b [Q ] bb [ ] b [Q ] b

86 Drip cc b ccc bb b b c b [Q ] bb [ ] b [Q ] b

87 Protein movement rules [ ] u [ ] u ttch i [ ] u [ ] u ttch o

88 Protein movement rules [ ] u [ ] u ttch i [ ] u [ ] u ttch o [ ] u [ ] u de-ttch i [ ] u [ ] u de-ttch o

89 Protein movement rules [ ] u [ ] u ttch i [ ] u [ ] u ttch o [ ] u [ ] u de-ttch i [ ] u [ ] u de-ttch o [ ] u [ ] u move out [ ] u [ ] u move in

90 ttch i c ccbb b [ b ] c [ ] cb

91 ttch i c ccbb b [ b ] c [ ] cb

92 ttch i c ccbb c ccbb b b [ b ] c [ ] cb

93 move in c ccbb c b [ ] c b [b] c

94 move in c ccbb c b [ ] c b [b] c

95 move in c ccbb c b c ccbb c b [ ] c b [b] c

96 Computtion The computtion of membrne system with mrked membrnes is obtined by pplying t ech step, to ech membrne:

97 Computtion The computtion of membrne system with mrked membrnes is obtined by pplying t ech step, to ech membrne: either the protein movement rules in the non-deterministic mximlly prllel wy (ttch, de-ttch, move)

98 Computtion The computtion of membrne system with mrked membrnes is obtined by pplying t ech step, to ech membrne: either the protein movement rules in the non-deterministic mximlly prllel wy (ttch, de-ttch, move) or one of the protein-membrne rule (pino, drip)

99 Output of n hlting (successful) computtion The numbers of proteins mrking the output membrnes in the hlting configurtion.

100 b ccc bb c d [Q ] bb [ [ ] b Q ] b [b] [ ] b [ ] d b [ ] bd [Q] bd [ [ ] b Q]

101 b ccc bb c d c b cc b c d b [Q ] bb [ [ ] b Q ] b [b] [ ] b [ ] d b [ ] bd [Q] bd [ [ ] b Q]

102 b ccc bb c d c b cc b c d b [Q ] bb [ [ ] b Q ] b [b] [ ] b [ ] d b [ ] bd [Q] bd [ [ ] b Q]

103 b ccc bb c d c b cc c b cc b c d b b c d b [Q ] bb [ [ ] b Q ] b [b] [ ] b [ ] d b [ ] bd [Q] bd [ [ ] b Q]

104 ccc bb c b b c d b c cc b c b cc c b cc b c d b b c d b [Q ] bb [ [ ] b Q ] b [b] [ ] b [ ] d b [ ] bd [Q] bd [ [ ] b Q]

105 ccc bb c b b c d b c cc b c b cc c b cc Hlting flg = b output = {2,3,5} b c d b b c d b [Q ] bb [ [ ] b Q ] b [b] [ ] b [ ] d b [ ] bd [Q] bd [ [ ] b Q]

106 Computtionl power Membrne systems using protein movement rules = NFIN (move, ttch, de-ttch)

107 Computtionl power Membrne systems using protein movement rules = NFIN (move, ttch, de-ttch) protein membrne rules NCF (pino, drip)

108 Computtionl power Membrne systems using protein movement rules = NFIN (move, ttch, de-ttch) protein membrne rules NCF (pino, drip) protein movement rules + = NRE protein membrne rules

109 Rechbility b b

110 Rechbility b b cd b

111 Rechbility b b cd b * b w b b

112 Rechbility b b cd b * b w b Cn we predict whether or not w is obtined? b

113 Rechbility Problem M membrne system, w multiset, rbitrry. Does M rech configurtion contining membrne mrked with w?

114 Rechbility Problem M membrne system, w multiset, rbitrry. Does M rech configurtion contining membrne mrked with w? pino (drip) + move/ttch/de-ttch undecidble

115 Rechbility Problem M membrne system, w multiset, rbitrry. Does M rech configurtion contining membrne mrked with w? pino (drip) + move/ttch/de-ttch undecidble move/ttch/de-ttch decidble

116 Rechbility Problem M membrne system, w multiset, rbitrry. Does M rech configurtion contining membrne mrked with w? pino (drip) + move/ttch/de-ttch undecidble move/ttch/de-ttch pino + drip decidble decidble

117 Boundness A membrne system is bounded if there exists n integer k, such tht, ny rechble configurtion of the system contins less thn k membrnes.

118 Boundness A membrne system is bounded if there exists n integer k, such tht, ny rechble configurtion of the system contins less thn k membrnes. Problem M rbitrry membrne system. Is M bounded?

119 Boundness A membrne system is bounded if there exists n integer k, such tht, ny rechble configurtion of the system contins less thn k membrnes. Problem M rbitrry membrne system. Is M bounded? pino + drip decidble

120 Rechbility of configurtion Problem M membrne system, C configurtion, rbitrry. Does M rech the configurtion C?

121 Rechbility of configurtion Problem M membrne system, C configurtion, rbitrry. Does M rech the configurtion C? pino + drip + move/ttch/de-ttch decidble

122 Perspectives

123 Perspectives Model closer to relity: pino + drip movement of objects evolution rules (inside the regions) trnsport rules (cross the membrnes) symport/ntiport rules

124 Perspectives Model closer to relity: pino + drip movement of objects evolution rules (inside the regions) trnsport rules (cross the membrnes) symport/ntiport rules (x,in) (x,out) (x,in; y,out) x x y x

125 Perspectives Model closer to relity: pino + drip movement of objects evolution rules (inside the regions) trnsport rules (cross the membrnes) symport/ntiport rules Adding time to the model: time of execution, witing time, time-free systems..

126 Perspectives Model closer to relity: pino + drip movement of objects evolution rules (inside the regions) trnsport rules (cross the membrnes) symport/ntiport rules Adding time to the model: time of execution, witing time, time-free systems.. A non-stndrd wy to look t the output: Observing the evolution of (bio) system.

127 References R. Brijder, M. Cvliere, G. Rozenberg, A. Riscos-Núñez, D. Sburln, Membrne Systems with Mrked Membrnes. Submitted. L. Crdelli, Brne Clculi. Interctions of Biologicl Membrnes. Proc. Computtionl Methods in Systems Biology 2004, LNCS 3082, L. Crdelli, Gh. Păun, An Universlity Result for (Mem)Brne Clculus Bsed on Mte/Drip Opertions. Proc. ESF Workshop on Cellulr Computing, Seville, Gh. Păun, Membrne Computing - An Introduction, Springer-Verlg, 2002.

One Minute To Learn Programming: Finite Automata

One Minute To Learn Programming: Finite Automata Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge

More information

Java CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser:

Java CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser: Jv CUP Jv CUP is prser-genertion tool, similr to Ycc. CUP uilds Jv prser for LALR(1) grmmrs from production rules nd ssocited Jv code frgments. When prticulr production is recognized, its ssocited code

More information

Drawing Diagrams From Labelled Graphs

Drawing Diagrams From Labelled Graphs Drwing Digrms From Lbelled Grphs Jérôme Thièvre 1 INA, 4, venue de l Europe, 94366 BRY SUR MARNE FRANCE Anne Verroust-Blondet 2 INRIA Rocquencourt, B.P. 105, 78153 LE CHESNAY Cedex FRANCE Mrie-Luce Viud

More information

Regular Languages and Finite Automata

Regular Languages and Finite Automata N Lecture Notes on Regulr Lnguges nd Finite Automt for Prt IA of the Computer Science Tripos Mrcelo Fiore Cmbridge University Computer Lbortory First Edition 1998. Revised 1999, 2000, 2001, 2002, 2003,

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

4.11 Inner Product Spaces

4.11 Inner Product Spaces 314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

SPECIAL PRODUCTS AND FACTORIZATION

SPECIAL PRODUCTS AND FACTORIZATION MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come

More information

Unambiguous Recognizable Two-dimensional Languages

Unambiguous Recognizable Two-dimensional Languages Unmbiguous Recognizble Two-dimensionl Lnguges Mrcell Anselmo, Dor Gimmrresi, Mri Mdoni, Antonio Restivo (Univ. of Slerno, Univ. Rom Tor Vergt, Univ. of Ctni, Univ. of Plermo) W2DL, My 26 REC fmily I REC

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Algebra Review. How well do you remember your algebra?

Algebra Review. How well do you remember your algebra? Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then

More information

Concept Formation Using Graph Grammars

Concept Formation Using Graph Grammars Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015

More information

A Visual and Interactive Input abb Automata. Theory Course with JFLAP 4.0

A Visual and Interactive Input abb Automata. Theory Course with JFLAP 4.0 Strt Puse Step Noninverted Tree A Visul nd Interctive Input Automt String ccepted! 5 nodes generted. Theory Course with JFLAP 4.0 q0 even 's, even 's q2 even 's, odd 's q1 odd 's, even 's q3 odd 's, odd

More information

Learner-oriented distance education supporting service system model and applied research

Learner-oriented distance education supporting service system model and applied research SHS Web of Conferences 24, 02001 (2016) DOI: 10.1051/ shsconf/20162402001 C Owned by the uthors, published by EDP Sciences, 2016 Lerner-oriented distnce eduction supporting service system model nd pplied

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

The Semantics of Graph Programs

The Semantics of Graph Programs The Semntics of Grph Progrms Detlef Plump Deprtment of Computer Science The University of York, UK Sndr Steinert Deprtment of Computer Science The University of York, UK GP (for Grph Progrms) is rule-bsed,

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

ICOM JTG-II PROPANE OPTIMIZATION PROGRAM (POP) INSTALLATION MANUAL FLEET VEHICLES P13X4-9224-AA. Revision: A - Dated 2/13/13 Replaces: None

ICOM JTG-II PROPANE OPTIMIZATION PROGRAM (POP) INSTALLATION MANUAL FLEET VEHICLES P13X4-9224-AA. Revision: A - Dated 2/13/13 Replaces: None ICOM JTG-II PROPNE OPTIMIZTION PROGRM (POP) INSTLLTION MNUL P13X4-9224- Revision: - Dated 2/13/13 Replaces: None PROPNE OPTIMIZTION PROGRM OVERVIEW SYSTEM DESCRIPTION THE ICOM PROPNE OPTIMIZTION PROGRM

More information

FUNCTIONS AND EQUATIONS. xεs. The simplest way to represent a set is by listing its members. We use the notation

FUNCTIONS AND EQUATIONS. xεs. The simplest way to represent a set is by listing its members. We use the notation FUNCTIONS AND EQUATIONS. SETS AND SUBSETS.. Definition of set. A set is ny collection of objects which re clled its elements. If x is n element of the set S, we sy tht x belongs to S nd write If y does

More information

Learning to Search Better than Your Teacher

Learning to Search Better than Your Teacher Ki-Wei Chng University of Illinois t Urbn Chmpign, IL Akshy Krishnmurthy Crnegie Mellon University, Pittsburgh, PA Alekh Agrwl Microsoft Reserch, New York, NY Hl Dumé III University of Mrylnd, College

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Decision Rule Extraction from Trained Neural Networks Using Rough Sets

Decision Rule Extraction from Trained Neural Networks Using Rough Sets Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT

More information

AAPT UNITED STATES PHYSICS TEAM AIP 2010

AAPT UNITED STATES PHYSICS TEAM AIP 2010 2010 F = m Exm 1 AAPT UNITED STATES PHYSICS TEAM AIP 2010 Enti non multiplicnd sunt preter necessittem 2010 F = m Contest 25 QUESTIONS - 75 MINUTES INSTRUCTIONS DO NOT OPEN THIS TEST UNTIL YOU ARE TOLD

More information

On decidability of LTL model checking for process rewrite systems

On decidability of LTL model checking for process rewrite systems Act Informtic (2009) 46:1 28 DOI 10.1007/s00236-008-0082-3 ORIGINAL ARTICLE On decidbility of LTL model checking for process rewrite systems Lur Bozzelli Mojmír Křetínský Vojtěch Řehák Jn Strejček Received:

More information

Review guide for the final exam in Math 233

Review guide for the final exam in Math 233 Review guide for the finl exm in Mth 33 1 Bsic mteril. This review includes the reminder of the mteril for mth 33. The finl exm will be cumultive exm with mny of the problems coming from the mteril covered

More information

Assumption Generation for Software Component Verification

Assumption Generation for Software Component Verification Assumption Genertion for Softwre Component Verifiction Dimitr Ginnkopoulou Corin S. Păsărenu RIACS/USRA Kestrel Technologies LLC NASA Ames Reserch Center Moffett Field, CA 94035-1000, USA {dimitr, pcorin}@emil.rc.ns.gov

More information

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1 SE3BB4: Softwre Design III Conurrent System Design Winter 2011 Smple Solutions to Assignment 1 Eh question is worth 10pts. Totl of this ssignment is 70pts. Eh ssignment is worth 9%. If you think your solution

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm

Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm Bibhudendr chry, Girij Snkr Rth, Srt Kumr Ptr, nd Sroj Kumr Pnigrhy Novel Methods of Generting Self-Invertible Mtrix for Hill Cipher lgorithm Bibhudendr chry Deprtment of Electronics & Communiction Engineering

More information

Advanced Baseline and Release Management. Ed Taekema

Advanced Baseline and Release Management. Ed Taekema Advnced Bseline nd Relese Mngement Ed Tekem Introduction to Bselines Telelogic Synergy uses bselines to perform number of criticl configurtion mngement tsks. They record the stte of the evolving softwre

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

v T R x m Version PREVIEW Practice 7 carroll (11108) 1

v T R x m Version PREVIEW Practice 7 carroll (11108) 1 Version PEVIEW Prctice 7 crroll (08) his print-out should he 5 questions. Multiple-choice questions y continue on the next colun or pge find ll choices before nswering. Atwood Mchine 05 00 0.0 points A

More information

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,

More information

EU Declaration of Conformity

EU Declaration of Conformity EU Declrtion of Conformity We TurboChef Technologies Inc. 4240 Interntionl Prkwy, uite 105 Crrollton, Texs 75007 UA declre under sole responsibility tht the Model: C3DEW, C3DED, C3DUK, nd C3D to which

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Application Bundles & Data Plans

Application Bundles & Data Plans Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Distributions. (corresponding to the cumulative distribution function for the discrete case).

Distributions. (corresponding to the cumulative distribution function for the discrete case). Distributions Recll tht n integrble function f : R [,] such tht R f()d = is clled probbility density function (pdf). The distribution function for the pdf is given by F() = (corresponding to the cumultive

More information

Modular Generic Verification of LTL Properties for Aspects

Modular Generic Verification of LTL Properties for Aspects Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte

More information

License Manager Installation and Setup

License Manager Installation and Setup The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

and thus, they are similar. If k = 3 then the Jordan form of both matrices is

and thus, they are similar. If k = 3 then the Jordan form of both matrices is Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If

More information

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009 CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

UNLOCKING TECHNOLOGY IVECO

UNLOCKING TECHNOLOGY IVECO UNLOCKING TECHNOLOGY IVECO IVECO - CONTENTS PPLICTIONS PGE DS136 IVECO 3 DS177 IVECO CN 3 DIGNOSTIC SOCKETS LOCTIONS IVECO 4 GENERL OPERTION 5 6 TIPS & HINTS 15 2 Version: 2.3 July 2011 Copyright 2009

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce

More information

PDF hosted at the Radboud Repository of the Radboud University Nijmegen

PDF hosted at the Radboud Repository of the Radboud University Nijmegen PDF hosted t the Rdboud Repository of the Rdboud University Nijmegen The following full text is publisher's version. For dditionl informtion bout this publiction click this link. http://hdl.hndle.net/2066/111343

More information

2001 Attachment Sequence No. 118

2001 Attachment Sequence No. 118 Form Deprtment of the Tresury Internl Revenue Service Importnt: Return of U.S. Persons With Respect to Certin Foreign Prtnerships Attch to your tx return. See seprte instructions. Informtion furnished

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

Efficient load-balancing routing for wireless mesh networks

Efficient load-balancing routing for wireless mesh networks Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,

More information

Lec 2: Gates and Logic

Lec 2: Gates and Logic Lec 2: Gtes nd Logic Kvit Bl CS 34, Fll 28 Computer Science Cornell University Announcements Clss newsgroup creted Posted on we-pge Use it for prtner finding First ssignment is to find prtners Due this

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Learning Workflow Petri Nets

Learning Workflow Petri Nets Lerning Workflow Petri Nets Jvier Esprz, Mrtin Leucker, nd Mximilin Schlund Technische Universität München, Boltzmnnstr. 3, 85748 Grching, Germny {esprz,leucker,schlund}@in.tum.de Abstrct. Workflow mining

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Data Compression. Lossless And Lossy Compression

Data Compression. Lossless And Lossy Compression Dt Compression Reduce the size of dt. ƒ Reduces storge spce nd hence storge cost. Compression rtio = originl dt size/compressed dt size ƒ Reduces time to retrieve nd trnsmit dt. Lossless And Lossy Compression

More information

Outline Y. Thierry-Mieg Octobre 2008 DDD, SDD and Applications Decision Diagrams for Model-checking: Data Decision Diagrams : Saturation

Outline Y. Thierry-Mieg Octobre 2008 DDD, SDD and Applications Decision Diagrams for Model-checking: Data Decision Diagrams : Saturation Dt Decision Digrms, Set Decision Digrms, And Applictions Ynn Thierry-Mieg 3 Oct 8 Presenttion in Nntes Outline Y. Thierry-Mieg Octobre 8 Decision Digrms for Model-checking: Dt Decision Digrms : A dynmic

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

PHY 140A: Solid State Physics. Solution to Homework #2

PHY 140A: Solid State Physics. Solution to Homework #2 PHY 140A: Solid Stte Physics Solution to Homework # TA: Xun Ji 1 October 14, 006 1 Emil: jixun@physics.ucl.edu Problem #1 Prove tht the reciprocl lttice for the reciprocl lttice is the originl lttice.

More information

Multilevel Fuzzy Approach to the Risk and Disaster Management

Multilevel Fuzzy Approach to the Risk and Disaster Management Act Polytechnic Hungric Vol. 7, No. 4, 21 Multilevel Fuzzy Approch to the Risk nd Disster Mngement Márt Tkács John von Neumnn Fculty of Informtics, Óbud University Bécsi út 96/b, H-134 Budpest, Hungry

More information

g(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany

g(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany Lecture Notes to Accompny Scientific Computing An Introductory Survey Second Edition by Michel T Heth Boundry Vlue Problems Side conditions prescribing solution or derivtive vlues t specified points required

More information

. At first sight a! b seems an unwieldy formula but use of the following mnemonic will possibly help. a 1 a 2 a 3 a 1 a 2

. At first sight a! b seems an unwieldy formula but use of the following mnemonic will possibly help. a 1 a 2 a 3 a 1 a 2 7 CHAPTER THREE. Cross Product Given two vectors = (,, nd = (,, in R, the cross product of nd written! is defined to e: " = (!,!,! Note! clled cross is VECTOR (unlike which is sclr. Exmple (,, " (4,5,6

More information

IFC3 India-Android Application Development

IFC3 India-Android Application Development IFC3 Indi-Android Appliction Development Android Operting System hs been progressing quite rpidly. Conceived s counterpoint IOS, Android is grph showing significnt development in this workshop Students

More information

www.mathsbox.org.uk e.g. f(x) = x domain x 0 (cannot find the square root of negative values)

www.mathsbox.org.uk e.g. f(x) = x domain x 0 (cannot find the square root of negative values) www.mthsbo.org.uk CORE SUMMARY NOTES Functions A function is rule which genertes ectl ONE OUTPUT for EVERY INPUT. To be defined full the function hs RULE tells ou how to clculte the output from the input

More information

Humana Critical Illness/Cancer

Humana Critical Illness/Cancer Humn Criticl Illness/Cncer Criticl illness/cncer voluntry coverges py benefits however you wnt With our criticl illness nd cncer plns, you'll receive benefit fter serious illness or condition such s hert

More information

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00 COMP20212 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Digitl Design Techniques Dte: Fridy 16 th My 2008 Time: 14:00 16:00 Plese nswer ny THREE Questions from the FOUR questions provided

More information

Quick Reference Guide: One-time Account Update

Quick Reference Guide: One-time Account Update Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)

More information

Brillouin Zones. Physics 3P41 Chris Wiebe

Brillouin Zones. Physics 3P41 Chris Wiebe Brillouin Zones Physics 3P41 Chris Wiebe Direct spce to reciprocl spce * = 2 i j πδ ij Rel (direct) spce Reciprocl spce Note: The rel spce nd reciprocl spce vectors re not necessrily in the sme direction

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

IaaS Configuration for Virtual Platforms

IaaS Configuration for Virtual Platforms IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To

More information

Section 7-4 Translation of Axes

Section 7-4 Translation of Axes 62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX

More information

19. The Fermat-Euler Prime Number Theorem

19. The Fermat-Euler Prime Number Theorem 19. The Fermt-Euler Prime Number Theorem Every prime number of the form 4n 1 cn be written s sum of two squres in only one wy (side from the order of the summnds). This fmous theorem ws discovered bout

More information

Allocation Strategies of Virtual Resources in Cloud-Computing Networks

Allocation Strategies of Virtual Resources in Cloud-Computing Networks RESEARCH ARTICLE OPEN ACCESS Alloction Strtegies of Virtul Resources in Cloud-Computing Networks 1 K.Delhi Bbu, 2 D.Giridhr Kumr Deprtment of Computer Science nd Engineering, SreeVidynikethnEngg.College,

More information

Innovative and applied research on big data platforms of smart heritage

Innovative and applied research on big data platforms of smart heritage Innovtive nd pplied reserch on big dt pltforms of smrt heritge J. Qiu, J. Li, H. Sun * qiujie@thid.cn lijijun@thid.cn sunhuijio@thid.cn KEY WORDS: Smrt heritge, Big dt, Explntion ABSTRACT: Big dt hs huge

More information

Start Here. IMPORTANT: To ensure that the software is installed correctly, do not connect the USB cable until step 17. Remove tape and cardboard

Start Here. IMPORTANT: To ensure that the software is installed correctly, do not connect the USB cable until step 17. Remove tape and cardboard Strt Here 1 IMPORTANT: To ensure tht the softwre is instlled correctly, do not connect the USB cle until step 17. Follow the steps in order. If you hve prolems during setup, see Trouleshooting in the lst

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

Generating In-Line Monitors For Rabin Automata

Generating In-Line Monitors For Rabin Automata Generting In-Line Monitors For Rin Automt Hugues Chot, Rphel Khoury, nd Ndi Twi Lvl University, Deprtment of Computer Science nd Softwre Engineering, Pvillon Adrien-Pouliot, 1065, venue de l Medecine Queec

More information

Vectors 2. 1. Recap of vectors

Vectors 2. 1. Recap of vectors Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms

More information

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system

More information

GENERAL APPLICATION FOR FARM CLASSIFICATION

GENERAL APPLICATION FOR FARM CLASSIFICATION SCHEDULE 1 (section 1) Plese return to: DEADLINE: Plese return this form to your locl BC Assessment office y Octoer 31. Assessment Roll Numer(s) GENERAL APPLICATION FOR FARM CLASSIFICATION Section 23 (1)

More information

Grammars with Regulated Rewriting

Grammars with Regulated Rewriting Grammars with Regulated Rewriting Jürgen Dassow Otto-von-Guericke-Universität Magdeburg Fakultät für Informatik Lecture in the 5 th PhD Program Formal Languages and Applications PhD Program Formal Languages

More information

Database-Backed Program Analysis for Scalable Error Propagation

Database-Backed Program Analysis for Scalable Error Propagation Dtbse-Bcked Progrm Anlysis for Sclble Error Propgtion Cthrin Weiss cthrin.weiss@gmil.com Cindy Rubio-González University of Cliforni, Dvis crubio@ucdvis.edu Ben Liblit University of Wisconsin Mdison liblit@cs.wisc.edu

More information