Floating Codes for Joint Information Storage in Write Asymmetric Memories

Size: px
Start display at page:

Download "Floating Codes for Joint Information Storage in Write Asymmetric Memories"

Transcription

1 Floatig Codes for Joit Iformatio Storage i Write Asymmetric Memories Axiao (Adrew Jiag Computer Sciece Departmet Texas A&M Uiversity College Statio, TX ajiag@cs.tamu.edu Vaske Bohossia Electrical Egieerig Departmet Califoria Istitute of Techology Pasadea, CA 9115 vicet@paradise.caltech.edu Jehoshua Bruck Electrical Egieerig Departmet Califoria Istitute of Techology Pasadea, CA 9115 bruck@paradise.caltech.edu Abstract Memories whose storage cells trasit irreversibly betwee states have bee commo sice the start of the data storage techology. I recet years, flash memories ad other o-volatile memories based o floatig-gate cells have become a very importat family of such memories. We model them by the Write Asymmetric Memory (WAM, a memory where each cell is i oe of q states state 0, 1,, q 1 ad ca oly trasit from a lower state to a higher state. Data stored i a WAM ca be rewritte by shiftig the cells to higher states. Sice the state trasitio is irreversible, the umber of times of rewritig is limited. Whe multiple variables are stored i a WAM, we study codes, which we call floatig codes, that maximize the total umber of times the variables ca be writte ad rewritte. I this paper, we preset several families of floatig codes that either are optimal, or approach optimality as the codes get loger. We also preset bouds to the performace of geeral floatig codes. The results show that floatig codes ca itegrate the rewritig capabilities of differet variables to a surprisigly high degree. I. INTRODUCTION Memories whose storage cells trasit irreversibly betwee states have bee commo sice the begiig of the data storage techology. Examples iclude puch cards ad digital optical discs, where a cell ca chage from a 0-state to a 1- state but ot vice versa. I recet years, flash memories ad some other o-volatile memories based o floatig-gate cells have become a very importat family of such memories. They have good properties icludig high data desity, fast readig time, physical robustess, etc., ad have bee widely used i mobile, mass as well as stadard storage devices. We use flash memories as a typical example to explai the basic storage mechaisms based o floatig-gate cells. A flash memory cosists of floatig-gate cells as its basic storage elemets. I most products, a cell has two states; but to icrease data desity, multi-level storage (where a cell has 4 to 56 or eve more states is beig developed. For a cell with q states, we deote its states by 0, 1,, q 1. To write (program a cell, the hot-electro ijectio mechaism or the Fowler-Nordheim tuelig mechaism is used to iject electros ito the cell, where the electros become trapped. The umber of trapped electros i a cell determies the threshold voltage of the cell: the more electros, the higher the threshold voltage. The umber of trapped electros is chose to cocetrate aroud q discrete levels, correspodig to the q cell states. The state of a cell ca be read by measurig the threshold voltage. Programmig ad readig cells are fast; however, rewritig data is much more complex. Most of the time, it requires movig cells to lower states for rewritig data, which meas to remove electros from the cells. I flash memories, cells are orgaized ito blocks. A typical block usig biary cells stores 64, 18 or 56 kilobytes of data. Due to circuit complexity reasos, to rewrite, first the whole block has to be erased (which meas to lower all the cells of the block to the 0-state, the all the cells are reprogrammed. This happes eve if oly oe cell really eeds to lower its state for the rewritig, ad it leads to a writig speed about 10 5 times slower tha readig. Therefore, it will be very beeficial to desig codes for storig data such that the data ca be rewritte may times before the block has to be erased. Reducig the umber of block erasig operatios is critical ot oly for reducig the average rewritig time, but also for the flash memory s lifetime. Every erasig reduces the quality of cells, ad curretly, a flash memory s lifetime is bouded by about 10 5 program-erase cycles. Although techically speakig, a cell ca retur to a lower state through block erasig, i this paper, we are iterested i the writig ad rewritig of data betwee two block erasig operatios. I that period, the cells ca oly go from lower states to higher states. We model the memories metioed above usig the followig Write Asymmetric Memory (WAM model. A WAM cosists of cells, where each cell has q states: state 0, 1,, q 1. Such a cell is called a q-ary cell. A cell ca go from state i to state j if ad oly if i < j. WAM is a straightforward geeralizatio of the Write Oce Memory (WOM model, firstly proposed by Rivest ad Shamir [10], where q =. WAM is also a special case of the Geeralized WOM model [3], where the state trasitio diagram of a cell ca be ay directed acyclic graph. Historically, there has bee research o WOM codes, where a sigle variable is stored i a WOM, ad the code eables it to be rewritte multiple times [10]. I practice, a memory stores may let s say k variables. If we wat to apply the codes to a memory, a simple approach is to partitio the memory ito k parts, where each part stores a variable idepedetly. This simple approach, however, has a serious limitatio. If the rewritig frequecies are very ouiform for the variables

2 commo i may applicatios the WAM becomes uusable very soo. For example, say that each storage part allows t times of rewritig of a variable. Oce oe of the k variables eeds rewritig for the (t+1-th time, the WAM ca o loger meet the requiremet, eve if the other k 1 variables have ot bee rewritte yet. Therefore, it will be very beeficial to itegrate the rewritig capabilities of the variables, so that the variables ca be rewritte may times regardless of what the rewritig sequece is. As we will show i this paper, such a itegratio is feasible, may times to a surprisigly high degree. We call the codes that achieve it the Floatig Codes. We formally defie the problem we study as follows. k variables are stored i a WAM, where each variable takes its value from a alphabet of size l: {0, 1,, l 1}. The WAM has q-ary cells. Iitially, all the cells are i the 0-state, ad all the variables have the default value 0. Each rewritig updates the value of oe variable. We use (v 1, v,, v k called the variable vector to deote the values of the k variables, where v i {0, 1,, l 1}. We use (c 1, c,, c called the cell state vector to deote the states of the cells, where c i {0, 1,, q 1}. A cell state vector (c 1, c,, c is said to be above aother cell state vector (c 1, c,, c if c i c i for all i. Whe the cells chage their states, they ca oly chage to a state vector above the curret oe. A floatig code has two fuctios, α : {0, 1,, q 1} {0, 1,, l 1} k, ad β : {0, 1,, q 1} {1,,, k} {0, 1,, l 1} {0, 1,, q 1}. Fuctio α maps each cell state vector to a variable vector, which is used to decode (iterpret the stored data. Fuctio β shows how to rewrite: give the curret cell state vector ad the iformatio o which of the k variables is to be updated to which ew value, the fuctio β outputs the ew cell state vector. The ew cell state vector should correspod to the ew values of the variables. A floatig code allowig t times of rewritig is a code that allows the variables to be rewritte at least t times i total, regardless of what the sequece of rewritig is. A fudametal objective of floatig codes is to maximize t. I the followig, we first preset a brief overview of the related work. The, we preset the costructios of several families of floatig codes, which either are optimal, or approach optimality as the codes get loger. We also preset upper ad lower bouds to t for geeral floatig codes. II. RELATED WORK WOM codes were first studied by Rivest, Shamir [10] et al., where a sigle variable is stored i a WOM ad ca be updated multiple times. Capacities of WOMs have bee studied [3] [4] [6] [8] [10] [11], ad multiple classes of codes have bee iveted. The majority of those codes are biary, ad they iclude tabular codes [10], liear codes [] [10], codes costructed usig Golay codes [] or projective geometries [9], etc. Besides WOM, costraied memories also iclude write efficiet memory (WEM, write uidirectioal memory (WUM ad write isolated memory (WIM [8]. There is o work we are aware of that addresses the use of codes for flash memories for icreasig the umber of (rewrites betwee two erasig operatios, useful for improvig writig speed ad prologig the memory lifetime. The use of error-correctig codes for improvig data reliability i flash memories has bee proposed i some works [1] [5]. III. AN OPTIMAL CODE FOR TWO BINARY VARIABLES I this sectio, we preset a floatig code for biary variables. That is, l =, so each variable has value 0 or 1. I flash memories, the 16 bits of a word are usually stored at the same positio of 16 parallel blocks. Cosequetly, a rewritig operatio o a word becomes the rewritig of a bit i a block. Therefore, it is importat to study the case of l =. The code we preset is for k =, l = ad arbitrary ad q. The code maximizes t, the umber of rewrites, ad is thus optimal. We prove the code s optimality by providig a geeral upper boud to t for floatig codes, which is ot limited to the case k =, l =. A. Optimal Floatig Code for k =, l = ad Arbitrary, q Three examples of the code are show i Fig. 1, correspodig to = 1, ad 3, respectively. We commet that = 1, are, i fact, degeerated cases; it is oly whe = 3 or more that the code reveals the full structure of its costructio. The umbers iside each circle are a cell state vector, while the bold umbers beside the circle are the correspodig variable vector. For example, i Fig. 1(a, the cell state vector (c 1 = (3 correspods to the variable vector (v 1, v = (0, 0; i Fig. 1(c, the cell state vector (c 1, c, c 3 = (1, 0, 0 correspods to the variable vector (v 1, v = (1, 0. The arrows leavig a cell state vector shows how the ext rewritig should be performed whe this cell state vector is the curret cell state vector. For example, for the code i Fig. 1(c, if the curret cell state vector is (1, 0, 0 ad the ew rewritig request is to chage the first variable to 0 (which meas to chage the variable vector from (1, 0 to (0, 0, the the cell state vector will become (1, 1, 0. Similarly, if the sequece of rewritig chages the variable vector as (0, 0 (1, 0 (1, 1 (0, 1 (ote that every rewritig chages the value of just oe variable, the cell state vector chages as (0, 0, 0 (1, 0, 0 (1, 0, 1 (1, 0, We defie the cell state vectors of the i-th geeratio to be the cell state vectors reachable after i times of rewritig. I Fig. 1, all the cell state vectors i the same geeratio are placed at the same horizotal level. For example, i Fig. 1(c, the cell state vectors i the d geeratio are (1, 1, 0, (1, 0, 1 ad (0, 1, 1. The codes i Fig. 1 are all for arbitrarily large q, ad they all have periodic patters; specifically, every code is a repetitio of the structure show i the dotted box labelled by oe period. To see how, otice that the first geeratio i the dotted box cotais two cell state vectors correspodig to two differet variable vectors, ad so is true for the geeratio of cell state vectors directly followig the dotted box; what s more, the latter two cell state vectors ca be obtaied from the former two cell state vectors by raisig every cell s state by. (For example, i Fig. 1(b, the former two cell state vectors are (1, 0 ad (0, 1; whe we raise every cell s state by,

3 q=7 q=5 q= 4,,4 3,3 5 6 (1,0 q=4 (1,0 (1,0 3,,3 3 4,1 1,, (1,0 (1,0,0 0, 1,1 1 q= (1,0 1,0 0,1 oe (1,0 0 period 0,0 (a,,0 3,,,3,,,1,1, 1,,,, (1,0 (1,0 (1,0,0, 0,,,1,1 1,,1,1,0 1,,0,0,1 1,0, 0,,1 (1,0 (1,0 (1,0 1,1,0 1,0,1 0,1,1 1,0,0 0,1,0 (1,0 0,0,0 (c (b 1,1, 0,1, oe period oe period Fig. 1. Three examples of a optimal floatig code for k =, l = ad arbitrary, q. (a = 1. (b =. (c = 3. we get (3, ad (, 3, the latter two cell state vectors. The code is built for arbitrarily large q i the followig way. A period i the code cotais 1 geeratios. The secod period directly follows ad has the same structure as the first period, except that: (i every cell s state is raised by, (ii the pair of variable vectors (1, 0 ad (0, 0 are switched, ad the pair of variable vectors (0, 1 ad (1, 1 are also switched. For i = 1,, 3,, the (i + 1-th (resp., (i + -th period has the same structure as the 1st (resp. d period except that every cell s state is raised by 4i. If q is fiite, it is simple to get the correspodig code: just trucate the above code to the maximum geeratio, subject to the costrait that every cell s state is at most q 1. We preset the formal costructio of the code i Fig. to 3. The costructio is i fact quite regular ad elegat. It is straightforward to verify the correctess (validity of the code i Fig. to 3. The key step is to verify that for every cell state vector, its two outgoig arrows eter two cell state vectors i the ext geeratio that correspod to two differet ad correct variable vectors (v 1, v. It is also straightforward to verify the correctess of the followig theorem. Theorem 1: For the code costructed i Fig. ad Fig. 3, t = ( 1(q 1 + q 1. We see that the floatig code itegrates the WAM s rewritig capabilities for differet variable to a very high degree. Let s call i=1 c i the weight of the cell state vector. Clearly, every rewritig eeds to icrease that weight by at least 1. If the cells are split ito two ad used idepedetly by the k = variables, t ca ever exceed (q 1. The floatig code, however, achieves t ( 0.5(q 1. The code costructio i Fig. to 3 ca be easily coverted ito very efficiet ecodig (for rewritig ad decodig (for mappig cell state vectors to variable vectors algorithms. Due to the space limitatio, we skip the details. Floatig Code Costructio: k =, l = ad arbitrary, q 1. For i = 1,,, 1, do: The i-th geeratio of cell state vectors cotais all the i + 1 elemets that satisfy the followig properties: (1 Amog the first i + 1 cells, i of them are i state 1 ad oe of them is i state 0; ( The last (i + 1 cells are all i state 0. I the i-th geeratio, if a cell state vector is (1, 1,, 1, 0, 0,, 0 (that is, the first i cells are i state 0, ad the last i cells are i state 0, the it correspods to the variable vector (v 1, v = (1, 0 (if i is odd or (v 1, v = (0, 0 (if i is eve; otherwise, the cell state vector correspods to the variable vector (v 1, v = (0, 1 (if i is odd or (v 1, v = (1, 1 (if i is eve. Let a deote a cell state vector i the (i 1-th geeratio. The two outgoig arrows of a are as follows: oe arrow goes to the cell state vector i the i-th geeratio where the first i cells are i state 1 ad the last i cells are i state 0; the other arrow goes to the cell state vector of the i-th geeratio that is the same as a except that its (i + 1-th cell is i state 1 istead of state 0.. Note that by the above costructio, the ( 1-th geeratio cotais cell state vectors, where each cell state vector has 1 cells i the state 1 ad oe cell i the state 0. Let s deote those cell state vectors by s 1, s,, s. For s i (1 i, let s deote the 1 cells i state 1 by b π(i,1, b π(i,,, b π(i, 1, ad deote the cell i state 0 by b π(i,. (1 π(i, j. 3. For i =, + 1,, 3, do: The i-th geeratio of cell state vectors cotais (i + elemets, which we partitio ito groups. For j = 1,,,, the j-th group cotais all the i + = [i ( 1]+1 elemets that satisfy the followig properties: amog the [i ( 1] + 1 cells b π(j,1, b π(j,,, b π(j,i ( 1+1, i ( 1 of them are i state ad oe of them is i state 1; the i 3 cells b π(j,i ( 1+, b π(j,i ( 1+3,, b π(j, 1 are all i state 1; the cell b π(j, is i state 0. I the i-th geeratio, for a cell state vector i the j-th group, if the cells b π(j,1, b π(j,,, b π(j,i ( 1 are all i state, the it correspods to the variable vector (v 1, v = (1, 0 (if i is odd or (v 1, v = (0, 0 (if i is eve; otherwise, the cell state vector correspods to the variable vector (v 1, v = (0, 1 (if i is odd or (v 1, v = (1, 1 (if i is eve. Let a deote a cell state vector i the (i 1-th geeratio ad i the j-th group. (If i 1 = 1, the let a be s j. The two outgoig arrows of a are as follows: oe arrow goes to the cell state vector i the i-th geeratio ad the j-th group where the i ( 1 cells b π(j,1, b π(j,,, b π(j,i ( 1 are all i state ; the other arrow goes to the cell state vector i the i-th geeratio ad the j-th group that is the same as a except that its cell b π(j,i ( 1+1 is i state istead of state Note that by the above costructio, the ( 3-th geeratio cotais ( 1 cell state vectors, where each vector has cells i state, oe cell i state 1, ad oe cell i state ( The ( -th geeratio of cell state vectors cotais + elemets, which we partitio ito two groups. The first group cotais all the vectors where 1 cells are i state ( ad oe cell is i state 0. The secod group cotais all the vectors where cells are i state ad two cells are i state 1. All the cell state vectors i the first (resp., secod group correspod to the variable vector (v 1, v = (0, 0 (resp., (1, 1. The ( 1-th geeratio of cell state vectors cotais + 1 elemets, which we partitio ito two groups. The first group cotais all the cell state vectors where 1 cells are i state ad oe cell is i state 1; the secod group cotais oe cell state vector where all the cells are i state. The cell state vectors i the first (resp. secod group correspod to the variable vector (v 1, v = (1, 0 (resp. (0, 1. Let a deote a cell state vector i the ( 3-th (resp., ( -th geeratio. The two outgoig arrows of a eter two cell state vectors of the ( -th (resp., ( 1-th geeratio, respectively i the first group ad i the secod group, both of which are above a. (To be cotiued i Fig. 3. Fig..

4 Floatig Code Costructio: Cotiuatio of Fig. 6. The above 1 geeratios of cell state vectors form the first period of the code. Repeat the period s structure to get the d, 3rd, periods (as described before i this paper. Just remember that for the i-th period, if i is eve, the switch the variable vector (0, 0 with (1, 0, ad switch the variable vector (1, 1 with (0, 1. If q is fiite, trucate the code to the maximum geeratio subject to the costrait that all the cells states are at most q 1. Fig. 3. B. A Geeral ad Tight Upper Boud to t We ow preset a geeral upper boud to t, which holds for ay k, l, ad q. The boud ca show that the code i Fig. ad Fig. 3 is optimal. Theorem : For ay floatig code, if k(l 1 1, the t [ k(l 1 + 1] (q 1 + [k(l 1 1] (q 1 ; if < k(l 1 1, the t (q 1. Proof: Due to the space limitatio, we preset oly the sketch of the proof here. Please refer to [7] for the details. The idea is to show that for ay floatig code, whe k(l 1 1, there is a sequece of at most [ k(l 1 + 1] (q 1 + [k(l 1 1] (q 1 rewritig operatios after which o more rewritig ca be performed. The case < k(l 1 1 ca be aalyzed similarly. We fid such a bad sequece of rewritig operatios usig the followig method. For i = 0, 1,, after the i-th rewritig operatio, we use a set S i to remember the k(l 1 1 cells whose states are the lowest. The i-th rewritig operatio is selected i this way: if all the choices for the rewritig icreases the weight of the cell state vector by oly oe, we select the i-th rewritig operatio to be the oe that raises the state of a cell outside S i 1 ; otherwise, we select the i-th rewritig operatio to be the oe that icreases the weight of the cell state vector by at least two. Let a 1, a,, a deote the cells, ad let c i j deote the state of the j-th cell after the i-th rewritig operatio. (0 c i j q 1. Let P i = a j S i (q 1 c i j, ad let Q i = a j / S i (q 1 c i j. Let t 0 deote the umber of rewritig operatios i our rewritig sequece. With a careful iductive aalysis, we show that for all i, t 0 i Q i + P i. By replacig i with 0, we obtai the fial coclusio. By pluggig k = ad l = ito Theorem, ad comparig it with Theorem 1, we get the followig coclusio. Theorem 3: The floatig code preseted i Fig. ad Fig. 3 is optimal, amely, it maximizes the umber of rewrites t. The above observatio also shows that i some cases, the upper boud preseted i Theorem is tight. IV. NEARLY OPTIMAL LINEAR CODES I this sectio, we preset two liear codes of similar structures for biary variables. Both codes have lim t = (q 1 + o(. Sice all floatig codes have t (q 1, the two codes approach optimality as. I both codes, every cell essetially correspods to a iteger, ad a liear combiatio of those itegers form the umerical represetatio of the k variables. We borrow the idea from the WOM codes proposed by Fiat ad Shamir i [3]. Those WOM codes are for updatig a sigle variable i a biary WOM. The floatig codes we preset are, respectively, for rewritig two or three variables i q-ary WAMs. We defie a fuctio odd(x as follows: for ay oegative iteger x, if x is odd, odd(x = 1; otherwise, odd(x = 0. Let (a x1 1 ax ax h h deote a strig that cosists of x 1 cosecutive a 1 s, followed by x cosecutive a s,, eded with x h cosecutive a h s. For example, ( is (1, 1, 0, 1, 0, 0, 0. Below are the costructios of the two floatig codes. Code Costructio I: k =, l =, 3, arbitrary q I this code, a valid cell state vector (c 1, c,, c always satisfies the followig two costraits: (1 i, j, c i c j 1; ( (c 1, c,, c = ((a + 1 x 1 a x (a + 1 x 3 for some a, x 1, x, x 3 where 0 a < q 1, x 1 + x + x 3 =, x 1. (For example, whe = 5, q = 3, (1, 1, 1, 0, 1 = ( ad (1, 1, 1, 1, = ( are both valid cell state vectors. A cell state vector ((a + 1 x1 a x (a + 1 x3 correspods to the variable vector (v 1, v i the followig way: v 1 = odd(x 1, v = odd(x 3. The rewritig operatio is as follows. Whe the rewritig chages the value of variable v 1 (resp., v, we usually icrease x 1 (resp., x 3 by 1 ad decrease x by 1. The exceptio happes whe x = 1; i that case, we first raise all the cells to the state a + 1 (which makes x 1 = x 3 = 0 ad x =, the icrease x 1 or x 3 (or both based o ecessity. For example, assume that = 4, q = 3 ad the rewritig operatios chage the variable vector (v 1, v as follows: (0, 0 (0, 1 (0, 0 (1, 0 (1, 1. The, the cell state vector chages as follows: (0, 0, 0, 0 (0, 0, 0, 1 (0, 0, 1, 1 (1, 0, 1, 1 (, 1, 1,. Theorem 4: Whe is odd, the floatig code i Code Costructio I has t = ( 1(q 1; if is eve, it has t = ( (q We skip the proof for theorem 4 due to the space limitatio. Iterested readers please see [7]. By theorems ad 4, we see that whe q =, the above code is strictly optimal. Code Costructio II: k = 3, l =, 5, arbitrary q I this code, a valid cell state vector (c 1, c,, c always satisfies the followig two costraits: (1 i, j, c i c j 1; ( the cell state vector is either i the form ((a + 1 x 1 a x (a + 1 x 3 a x 4 (a + 1 x 5, where 5 i=1 x i =, x 1, x 4 1 (which we call form I, or i the form ((a+1 x1 a x (a+1 x5, where x 1 +x +x 5 =, x 1 (which we call form II. A cell state vector correspods to the variable vector (v 1, v, v 3 i the followig way: if the cell state vector is i form I, the v 1 = odd(x 1, v = odd(x 3, v 3 = odd(x 5 ; if the cell state vector is i form II, the v 1 = odd(x 1, v = 0, v 3 = odd(x 5. The rewritig operatio is as follows. Whe the rewritig chages the value of variable v 1 (resp., v 3, we usually icrease x 1 (resp., x 5 by 1 ad decrease x (resp., x 4 or

5 x, depedig o if the cell state vector is i form I or form II by 1. Whe the rewritig chages the value of variable v, we either icrease x 3 by 1 ad decrease x or x 4 by 1 (whe the cell state vector is i form I, or chage the cell i the middle of the sequece of a s from state a to state a+1 (whe the cell state vector is i form II. If x or x 4 becomes zero due to the above operatio, the cell state vector is reevaluated, ad the operatio described above is carried out agai based o the values of the variables. If the above operatio caot be carried out ay more whe the cells remai i the curret two states state a ad state a + 1 the we start to use the two states a + 1 ad a +, i the same way as we have used the two states a ad a + 1 above. The followig examples show how the code works. Assume that = 10, q = 3. (1 If the cell state vector is ( , the (v 1, v, v 3 = (1, 0, 0; if the ext two rewritig operatios chage (v 1, v, v 3 to (0, 0, 0 ad the to (0, 1, 0, the cell state vector chages to ( , ad the to ( ( If the cell state vector is ( , the (v 1, v, v 3 = (1, 1, 1; if the ext two rewritig operatios chage (v 1, v, v 3 to (0, 1, 1 ad the to (0, 1, 0, the cell state vector chages to ( , ad the to ( Theorem 5: The floatig code i Code Costructio II has t ( 6 log (q 1 +. Proof: We preset the sketch of the proof here because of the space limitatio. Please see [7] for details. The mai idea is that every rewritig icreases the weight of the cell state vector oly by oe except i the followig two cases: (1 The rewritig makes x or x 4 become zero, i which case the weight of the cell state vector ca be icreased by at most 3; ( The rewritig causes the cells to stop usig the curret pair of states say a ad a + 1 ad start usig the ext pair of states a + 1 ad a +, i which case the weight of the cell state vector is icreased by at most 7. The first case ca be show to occur o more tha (q 1 log times, while the secod case happes at most q 1 times. That leads to the fial coclusio. For the detailed proof, please see [7]. V. BOUNDS FOR FLOATING CODES A geeral upper boud to t was show i Theorem. It was also show that whe k =, l =, the boud is exact. For large k or l, the followig theorem ca give a better boud. Theorem 6: Let w be the smallest positive iteger such that ( w+ l k. The, t (q 1 w k. Let w be the smallest positive iteger such that ( w + l k. The, whe k, t (q 1 k. w > Proof: First, cosider the geeral case k 1. Defie S as S = {(a 1, a,, a i=1 a i w, a 1, a,, a are oegative itegers}, ad let w be the smallest iteger such that S l k. Defie S as S = {(d 1, d,, d i=1 d i w+, d 1, d,, d are positive itegers}. By lettig d i = a i + 1 for i = 1,,,, we see that there is a oe-to-oe mappig betwee S ad S. So S = S. A elemet (d 1, d,, d belogs to S if ad oly if it is a solutio to the followig problem: partitio a path of w + vertices ito or more sub-paths such that for i = 1,,,, the i-th sub-path has d i > 0 vertices. Therefore, S = ( w+. So w is also the smallest positive iteger such that ( w+ l k. k cosecutive rewritig operatios ca make the variables chage to or go through ay of the l k possible values. If we see a i (for i = 1,,, as the icrease i c i the state of the i-th cell ad cosider the way S ad w are defied, we see that whatever the curret cell state vector is, there exist k cosecutive rewritig operatios that icreases the weight of the cell state vector i=1 c i by at least w. Now cosider the first batch of such k rewritig operatios, the secod batch, ad so o. Sice the maximum weight of the cell state vector is (q 1, we get t (q 1 w k. The proof for the slightly more restrictive case k is very similar. Please see [7] for its details. Whe k or l is sufficietly large, theorem 6 gives a upper boud to t that is roughly (q 1k. Now we preset a (! 1 l k elemetary lower boud as well as a exact evaluatio for t. Due to the space limitatio, we skip their proofs. Please refer to [7] for the detailed proofs. Theorem 7: There exist floatig codes where t k q l 1. Theorem 8: Whe k, l, q are fixed ad, there exist floatig codes where t = (q 1 + o(. Theorem 8 shows that whe, floatig codes ca itegrate the WAM s rewritig capabilities for differet variables early perfectly. Such a early perfect itegratio also occurs to all the codes preseted i this paper. ACKNOWLEDGMENT This work was supported i part by the Lee Ceter for Advaced Networkig at the Califoria Istitute of Techology. REFERENCES [1] P. Cappelletti, C. Golla, P. Olivo ad E. Zaoi (Ed., Flash memories, Kluwer Academic Publishers, 1st Editio, [] G. D. Cohe, P. Godlewski ad F. Merkx, Liear biary code for writeoce memories, IEEE Tras. Iform. Theory, vol. IT-3, pp , Sept [3] A. Fiat ad A. Shamir, Geeralized write-oce memories, IEEE Tras. Iform. Theory, vol. IT-30, pp , May [4] F. Fu ad A. J. Ha Vick, O the capacity of geeralized write-oce memory with state trasitios described by a arbitrary directed acyclic graph, IEEE Tras. Iform. Theory, vol. 45, o. 1, pp , [5] S. Gregori, A. Cabrii, O. Khouri ad G. Torelli, O-chip error correctig techiques for ew-geeratio flash memories, Proceedigs of The IEEE, vol. 91, o. 4, April 003. [6] C. Heegard, O the capacity of permaet memory, IEEE Tras. Iform. Theory, vol. IT-31, pp. 34-4, Ja [7] A. Jiag, V. Bohossia ad J. Bruck, Floatig codes for joit iformatio storage i write asymmetric memories, electroic techical report, [8] A. V. Kuzetsov ad A. J. H. Vick, O the geeral defective chael with iformed ecoder ad capacities of some costraied memories, IEEE Tras. Iform. Theory, vol. 40, o. 6, pp , Nov [9] F. Merkx, WOMcodes costructed with projective geometries, Traitemet du Sigal, vol. 1, o. -, pp. 7-31, [10] R. L. Rivest ad A. Shamir, How to reuse a write-oce memory, Iformatio ad Cotrol, vol. 55, pp. 1-19, 198. [11] J. K. Wolf, A. D. Wyer, J. Ziv ad J. Korer, Codig for a write-oce memory, AT&T Bell Labs. Tech. J., vol. 63, o. 6, pp , 1984.

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

CS100: Introduction to Computer Science

CS100: Introduction to Computer Science I-class Exercise: CS100: Itroductio to Computer Sciece What is a flip-flop? What are the properties of flip-flops? Draw a simple flip-flop circuit? Lecture 3: Data Storage -- Mass storage & represetig

More information

CS100: Introduction to Computer Science

CS100: Introduction to Computer Science Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

CS103X: Discrete Structures Homework 4 Solutions

CS103X: Discrete Structures Homework 4 Solutions CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here). BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Exploratory Data Analysis

Exploratory Data Analysis 1 Exploratory Data Aalysis Exploratory data aalysis is ofte the rst step i a statistical aalysis, for it helps uderstadig the mai features of the particular sample that a aalyst is usig. Itelliget descriptios

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

. P. 4.3 Basic feasible solutions and vertices of polyhedra. x 1. x 2

. P. 4.3 Basic feasible solutions and vertices of polyhedra. x 1. x 2 4. Basic feasible solutios ad vertices of polyhedra Due to the fudametal theorem of Liear Programmig, to solve ay LP it suffices to cosider the vertices (fiitely may) of the polyhedro P of the feasible

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem Lecture 4: Cauchy sequeces, Bolzao-Weierstrass, ad the Squeeze theorem The purpose of this lecture is more modest tha the previous oes. It is to state certai coditios uder which we are guarateed that limits

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. This documet was writte ad copyrighted by Paul Dawkis. Use of this documet ad its olie versio is govered by the Terms ad Coditios of Use located at http://tutorial.math.lamar.edu/terms.asp. The olie versio

More information

Factors of sums of powers of binomial coefficients

Factors of sums of powers of binomial coefficients ACTA ARITHMETICA LXXXVI.1 (1998) Factors of sums of powers of biomial coefficiets by Neil J. Cali (Clemso, S.C.) Dedicated to the memory of Paul Erdős 1. Itroductio. It is well ow that if ( ) a f,a = the

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Overview on S-Box Design Principles

Overview on S-Box Design Principles Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea

More information

Infinite Sequences and Series

Infinite Sequences and Series CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...

More information

Irreducible polynomials with consecutive zero coefficients

Irreducible polynomials with consecutive zero coefficients Irreducible polyomials with cosecutive zero coefficiets Theodoulos Garefalakis Departmet of Mathematics, Uiversity of Crete, 71409 Heraklio, Greece Abstract Let q be a prime power. We cosider the problem

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Chapter 5 O A Cojecture Of Erdíos Proceedigs NCUR VIII è1994è, Vol II, pp 794í798 Jeærey F Gold Departmet of Mathematics, Departmet of Physics Uiversity of Utah Do H Tucker Departmet of Mathematics Uiversity

More information

A Secure Implementation of Java Inner Classes

A Secure Implementation of Java Inner Classes A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

3. Greatest Common Divisor - Least Common Multiple

3. Greatest Common Divisor - Least Common Multiple 3 Greatest Commo Divisor - Least Commo Multiple Defiitio 31: The greatest commo divisor of two atural umbers a ad b is the largest atural umber c which divides both a ad b We deote the greatest commo gcd

More information

THE HEIGHT OF q-binary SEARCH TREES

THE HEIGHT OF q-binary SEARCH TREES THE HEIGHT OF q-binary SEARCH TREES MICHAEL DRMOTA AND HELMUT PRODINGER Abstract. q biary search trees are obtaied from words, equipped with the geometric distributio istead of permutatios. The average

More information

Approximating Area under a curve with rectangles. To find the area under a curve we approximate the area using rectangles and then use limits to find

Approximating Area under a curve with rectangles. To find the area under a curve we approximate the area using rectangles and then use limits to find 1.8 Approximatig Area uder a curve with rectagles 1.6 To fid the area uder a curve we approximate the area usig rectagles ad the use limits to fid 1.4 the area. Example 1 Suppose we wat to estimate 1.

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized?

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized? 5.4 Amortizatio Questio 1: How do you fid the preset value of a auity? Questio 2: How is a loa amortized? Questio 3: How do you make a amortizatio table? Oe of the most commo fiacial istrumets a perso

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Basic Elements of Arithmetic Sequences and Series

Basic Elements of Arithmetic Sequences and Series MA40S PRE-CALCULUS UNIT G GEOMETRIC SEQUENCES CLASS NOTES (COMPLETED NO NEED TO COPY NOTES FROM OVERHEAD) Basic Elemets of Arithmetic Sequeces ad Series Objective: To establish basic elemets of arithmetic

More information

Convexity, Inequalities, and Norms

Convexity, Inequalities, and Norms Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

1. Introduction. Scheduling Theory

1. Introduction. Scheduling Theory . Itroductio. Itroductio As a idepedet brach of Operatioal Research, Schedulig Theory appeared i the begiig of the 50s. I additio to computer systems ad maufacturig, schedulig theory ca be applied to may

More information

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing SIAM REVIEW Vol. 44, No. 1, pp. 95 108 c 2002 Society for Idustrial ad Applied Mathematics Perfect Packig Theorems ad the Average-Case Behavior of Optimal ad Olie Bi Packig E. G. Coffma, Jr. C. Courcoubetis

More information

Universal coding for classes of sources

Universal coding for classes of sources Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric

More information

Chapter 5 Unit 1. IET 350 Engineering Economics. Learning Objectives Chapter 5. Learning Objectives Unit 1. Annual Amount and Gradient Functions

Chapter 5 Unit 1. IET 350 Engineering Economics. Learning Objectives Chapter 5. Learning Objectives Unit 1. Annual Amount and Gradient Functions Chapter 5 Uit Aual Amout ad Gradiet Fuctios IET 350 Egieerig Ecoomics Learig Objectives Chapter 5 Upo completio of this chapter you should uderstad: Calculatig future values from aual amouts. Calculatig

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

2-3 The Remainder and Factor Theorems

2-3 The Remainder and Factor Theorems - The Remaider ad Factor Theorems Factor each polyomial completely usig the give factor ad log divisio 1 x + x x 60; x + So, x + x x 60 = (x + )(x x 15) Factorig the quadratic expressio yields x + x x

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information

1. MATHEMATICAL INDUCTION

1. MATHEMATICAL INDUCTION 1. MATHEMATICAL INDUCTION EXAMPLE 1: Prove that for ay iteger 1. Proof: 1 + 2 + 3 +... + ( + 1 2 (1.1 STEP 1: For 1 (1.1 is true, sice 1 1(1 + 1. 2 STEP 2: Suppose (1.1 is true for some k 1, that is 1

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

7.1 Finding Rational Solutions of Polynomial Equations

7.1 Finding Rational Solutions of Polynomial Equations 4 Locker LESSON 7. Fidig Ratioal Solutios of Polyomial Equatios Name Class Date 7. Fidig Ratioal Solutios of Polyomial Equatios Essetial Questio: How do you fid the ratioal roots of a polyomial equatio?

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction THE ARITHMETIC OF INTEGERS - multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

Desktop Management. Desktop Management Tools

Desktop Management. Desktop Management Tools Desktop Maagemet 9 Desktop Maagemet Tools Mac OS X icludes three desktop maagemet tools that you might fid helpful to work more efficietly ad productively: u Stacks puts expadable folders i the Dock. Clickig

More information

1 The Gaussian channel

1 The Gaussian channel ECE 77 Lecture 0 The Gaussia chael Objective: I this lecture we will lear about commuicatio over a chael of practical iterest, i which the trasmitted sigal is subjected to additive white Gaussia oise.

More information

How To Solve The Homewor Problem Beautifully

How To Solve The Homewor Problem Beautifully Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log

More information

Permutations, the Parity Theorem, and Determinants

Permutations, the Parity Theorem, and Determinants 1 Permutatios, the Parity Theorem, ad Determiats Joh A. Guber Departmet of Electrical ad Computer Egieerig Uiversity of Wiscosi Madiso Cotets 1 What is a Permutatio 1 2 Cycles 2 2.1 Traspositios 4 3 Orbits

More information

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009) 18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information

Multiplexers and Demultiplexers

Multiplexers and Demultiplexers I this lesso, you will lear about: Multiplexers ad Demultiplexers 1. Multiplexers 2. Combiatioal circuit implemetatio with multiplexers 3. Demultiplexers 4. Some examples Multiplexer A Multiplexer (see

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

The Forgotten Middle. research readiness results. Executive Summary

The Forgotten Middle. research readiness results. Executive Summary The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school

More information

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation HP 1C Statistics - average ad stadard deviatio Average ad stadard deviatio cocepts HP1C average ad stadard deviatio Practice calculatig averages ad stadard deviatios with oe or two variables HP 1C Statistics

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is 0_0605.qxd /5/05 0:45 AM Page 470 470 Chapter 6 Additioal Topics i Trigoometry 6.5 Trigoometric Form of a Complex Number What you should lear Plot complex umbers i the complex plae ad fid absolute values

More information

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean 1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.

More information

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx SAMPLE QUESTIONS FOR FINAL EXAM REAL ANALYSIS I FALL 006 3 4 Fid the followig usig the defiitio of the Riema itegral: a 0 x + dx 3 Cosider the partitio P x 0 3, x 3 +, x 3 +,......, x 3 3 + 3 of the iterval

More information

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations CS3A Hadout 3 Witer 00 February, 00 Solvig Recurrece Relatios Itroductio A wide variety of recurrece problems occur i models. Some of these recurrece relatios ca be solved usig iteratio or some other ad

More information

Chapter 7: Confidence Interval and Sample Size

Chapter 7: Confidence Interval and Sample Size Chapter 7: Cofidece Iterval ad Sample Size Learig Objectives Upo successful completio of Chapter 7, you will be able to: Fid the cofidece iterval for the mea, proportio, ad variace. Determie the miimum

More information

WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER?

WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER? WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER? JÖRG JAHNEL 1. My Motivatio Some Sort of a Itroductio Last term I tought Topological Groups at the Göttige Georg August Uiversity. This

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

Listing terms of a finite sequence List all of the terms of each finite sequence. a) a n n 2 for 1 n 5 1 b) a n for 1 n 4 n 2

Listing terms of a finite sequence List all of the terms of each finite sequence. a) a n n 2 for 1 n 5 1 b) a n for 1 n 4 n 2 74 (4 ) Chapter 4 Sequeces ad Series 4. SEQUENCES I this sectio Defiitio Fidig a Formula for the th Term The word sequece is a familiar word. We may speak of a sequece of evets or say that somethig is

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

Trackless online algorithms for the server problem

Trackless online algorithms for the server problem Iformatio Processig Letters 74 (2000) 73 79 Trackless olie algorithms for the server problem Wolfgag W. Bei,LawreceL.Larmore 1 Departmet of Computer Sciece, Uiversity of Nevada, Las Vegas, NV 89154, USA

More information

FIBONACCI NUMBERS: AN APPLICATION OF LINEAR ALGEBRA. 1. Powers of a matrix

FIBONACCI NUMBERS: AN APPLICATION OF LINEAR ALGEBRA. 1. Powers of a matrix FIBONACCI NUMBERS: AN APPLICATION OF LINEAR ALGEBRA. Powers of a matrix We begi with a propositio which illustrates the usefuless of the diagoalizatio. Recall that a square matrix A is diogaalizable if

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8 CME 30: NUMERICAL LINEAR ALGEBRA FALL 005/06 LECTURE 8 GENE H GOLUB 1 Positive Defiite Matrices A matrix A is positive defiite if x Ax > 0 for all ozero x A positive defiite matrix has real ad positive

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

TruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology

TruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology TruStore: The storage system that grows with you Machie Tools / Power Tools Laser Techology / Electroics Medical Techology Everythig from a sigle source. Cotets Everythig from a sigle source. 2 TruStore

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information