AN ALGORITHM FOR GENERATING BINARY PSEUDO-RANDOM SEQUENCES
|
|
|
- Stuart Douglas
- 10 years ago
- Views:
Transcription
1 ZESZYTY NAUKOWE POLITECHNIKI BIAŁOSTOCKIEJ. INFORMATYKA AN ALGORITHM FOR GENERATING BINARY PSEUDO-RANDOM SEQUENCES Wiktor Dańko Faculty of Computer Science, Bialystok University of Technology, Białystok, Poland Abstract: In the paper it is presented an algorithm for generating pseudo-random binary sequences. There are formulated theorems concerning properties of the sequence generated by the algorithm. The sequence is not periodic. Moreover, for any natural number n > 0, the initial fragment of the generated sequence of the length (2 n) 2 (2 n) contains all (binary) series of the length n. Keywords: pseudo-random computer generators, computer simulations, probabilistic algorithms 1. Introduction Computer modeling of real stochastic processes is mainly based on a pseudo-random computer generator. In the present paper we shall be concerned with uniform binary pseudo-random generators, i.e., with the set {0,1} of values. We can restrict ourselves to the case of uniform binary pseudo-random generators because by means of such a binary generator, we can construct any uniform generator with the set of values of the form {0,1,...,m}, for arbitrary integer m > 1 (cf. [2], [5]). This construction essentially depends on the fact that the results of two successive random assignments x:= random; x:= random; realized by means of a pseudo-random generator, treated as random events, are independent. Each uniform binary pseudo-random generator will be viewed in terms of an infinite sequence b 0 b 1 b 2... b n... Zeszyty Naukowe Politechniki Białostockiej. Informatyka, vol. 9, pp ,
2 Wiktor Dańko of values b n from {0,1}, n = 0,1,2,..., produced by the generator in succession, one after the other. We shall be interested in the case, where the sequence {b n } n=0,1,2,... is not periodic. Typical information on a periodic pseudo-random computer generator concerns the set of obtained values and the period of the generator. Some users of computer generators believe, in an intuitive manner, that the credibility of results of computer simulations seems to essentially depend on the length of the period of the generator. But the dependence is not evident. Let us consider an example of a sequence produced by a generator with the following period sequence: } {{ } } {{ } l l of the length p = l (l + 1). Speaking informally, since the frequencies of appearing of "0" and "1" are the same then this generator is uniform. On the other hand, it is easy to see that the sequence produced by generator does not contain any subsequence of the form } {{ } 2k for k 2. This means that this periodic sequence cannot be used as a straightforward (pseudo) random sequence, in spite of the fact that its period could be arbitrarily large. Other remarks related periodic pseudo-random generator will be formulated in the next section. 2. Remarks on periodic generators Let us consider a fixed periodic binary pseudo-random generator producing a sequence {b n } n=0,1,2,.... We recall that this generator will be called periodic (cf. [13], [14]) if and only if there exist numbers q and p > 0 such that for i q, b i = b i+ j p for j = 0,1,2,... The sequence b q b q+1... b q+p 1 is called the period sequence of the sequence {b n } n=0,1,2,.... We shall now introduce some definitions and notation. 18
3 An algorithm for generating binary pseudo-random sequences By a series we shall understand any finite sequence c of the form c 0 c 1... c k 1 where c i {0,1} for i = 0,1,...,k 1. The number k will be called the length of the series. We shall say that a pseudo-random generator, producing a sequence {b n } n=0,1,2,..., realizes the series c 0 c 1... c k 1 if and only if there exists an index m, m 0, such that the sequence b m b m+1... b m+k 1 and the sequence c 0 c 1... c k 1 are identical. In the case, where such an index m does not exist, we shall say that the generator omits the series c 0 c 1... c k 1. The following remark shows a shortcoming of periodic pseudo-random generators. Remark 1. Any periodic pseudo-random generator omits some series. To argue this fact let us suppose that b q b q+1... b q+p 1 is the period sequence of a generator. It is easy to observe that the generator omits the sequence b q b q+1... b q+p 1 (1 b q ) (its length is length p + 1). In reality, the minimal length of omitted series is essentially less than that period of the generator (cf. [5]). Using the above remark we shall show that the use of periodic generators may lead to important differences between results of computer simulations and theoretically determined facts. Let us consider a fixed binary pseudo-random generator producing a sequence {b n } n=0,1,2,... and let c 0 c 1... c k 1 be a series omitted by the generator. Let P denote the following program below, where the initial values of the variables C 0, C 1,..., C k-1 are c 0 c 1... c k 1, respectively, and the realization of the instructions x:=random{0,1} consists in assigning to the variable x the values produced by the considered generator in succession, one after the other. 19
4 Wiktor Dańko begin t:= 0; while (t = 0) do begin t:= 1; x:= random{0,1}; if ((t=1)&(x=c 0 )) then t:= 1 else t:= 0; x:= random{0,1}; if ((t=1)&(x=c 1 )) then t:= 1 else t:= 0;... end; x:= random{0,1}; if ((t=1)&(x=c k-1 )) then t:= 1 else t:= 0; end; It is easy to observe (cf. [3], [5]) that in the case, where the generator realizes the series c 0 c 1... c k 1, the program P ends its computation and in the case, where the generator omits the series c 0 c 1... c k 1 this program does not end its computation. This means that the results of computer simulations based on periodic pseudorandom generators may essentially differ from the result of computer simulations using straightforward random generators. 3. Grey codes We start with the definition of Grey codes (cf. [1], [11]). First, we give examples of the sequences C (l) =< c l i, i = 0,1,...,2l 1 > of Grey codes of the length l = 1,2,3. l = 1, C (1) =< c 1 0,c1 1 >=< 0,1 >, l = 2, C (2) =< c 2 0,c2 1,c2 2,c2 3 >=< 00,10,11,01 >, l = 3, C (3) =< c 3 0,c3 1,...,c3 7 >=< 000,100,110,010,011,111,101,001 >. The induction step in defining the sequence C (l+1), provided that the sequence C (l) is defined, is the following: 20 for C (l) =< c (l) 0,c(l) 1,...,c(l) 2 l 2,c(l) 2 l 1 > we define C (l+1) =< c (l) 0 0,c(l) 1 0,...,c(l) 2 l 1 0,c(l) 2 l 1 1,...,c(l) 1 1,c(l) 0 1 >.
5 An algorithm for generating binary pseudo-random sequences Let us denote by g(l,i, j) the j-th position of the i-th sequence c (l) i of the sequence C (l), i = 0,1,...,2 l 1, j = 0,1,...,l 1. It is known that the binary values g(l,i, j) can be defined inductively as follows (cf. [1], [11]): g(1,0,0) = 0, g(1,1,0) = 1, 0 for i = 0,1,...,2 l 1 and j = l + 1 g(l,i, j) for i = 0,1,...,2 l 1 and j = 0,1,...,l 1 g(l + 1,i, j) = 1 for i = 2 l,2 l + 1,...,2 l+1 1 and j = l + 1 g(l,2 l+1 1 i, j) for i = 2 l,2 l + 1,...,2 l+1 1 and j = 0,1,...,l 1. We shall now investigate whether the "infinite concatenation" C (1) C (2)... C (l).... of the sequences C (l), l = 1,2,3,..., could play the role of an uniform binary pseudorandom generator. Denote by {r n } n=0,1,2,... the sequence corresponding to the "infinite concatenation" of the sequences C (l), l = 1,2,3,... Let us first note that the length p(l) of the sequence satisfies the inductive equation C (1) C (2)... C (l). p(0) = 0, p(1) = 2, p(l + 1) = p(l) + ((l + 1) 2 l+1 ). Let n be an arbitrary natural number. Denote by l the natural number such that and let p(l) n < p(l + 1) i = (n p(l)) div (2 l ) and j = (n p(l)) mod (2 l ). The sequence {r n } n=0,1,2,... corresponding to the "infinite concatenation" of the sequences C (l) can be defined in the following way: r n = g(l,i, j) where l,g(l,i, j), p(l),i, j have the meaning as in the above. The following algorithm R(n) computes the elements of the sequence {r n } n=0,1,2,.... We shall assume that the program functions P(l), G(l,i,j), used in R(n), have been previously programmed and compute the function p(l), g(l,i, j) defined above. 21
6 Wiktor Dańko function R(n); begin if (n=0) then return(0) else if (n=1) then return(1) else begin l:= 1; while (P(l+1) <= n) do l:= l+1; i:= (n-p(l))div(2^l); j:= (n-p(l))mod(2^l); return(g(l,i,j)); end; end; Remark 2. The complexity of the algorithm R(n) is O(n). To argue this remark it is sufficient to note that the complexity of computation of the functions p(l) and g(l,i, j) is of the order O(l). Now, we recall the well known property o Grey codes of the length l (cf. [1], [11]): Let C (l) =< c (l) 0,c(l) 1,...,c(l) 2 l 2,c(l) > be the sequence of Grey codes of 2 l 1 the length l. For each j = 1,2,...,2 l 1, the codes c (l) j 1 and c(l) j differ on only one position. This property causes that the sequence {r n } n=0,1,2,... cannot be used as a pseudorandom generator. Remark 3. The algorithm R(n) is of any use in pseudo-random generating binary sequences. It can be used in testing whether a binary pseudo-random generator realizes or omits particular binary series. Moreover, since R(n) produces all finite binary sequences, it can be used in algorithm testing. The main motive for the above detailed presentation of the algorithm R(n) is the fact, that the idea of the construction of the binary pseudo-random generator, presented in Section 5, is analogous, in a way, to the construction of R(n). Namely, similarly to the case of R(n), the result sequence of the proposed generator can be 22
7 An algorithm for generating binary pseudo-random sequences viewed as an "infinite" concatenation S (1) S (2) S (3)... S (l).... of sequences, where the length of S (i) is equal to 8, for i = 1 and (i 2 i 1 2 i 2l 1 ) for i > 1. We shall formulate (cf. Theorem 1, Section 5) the fact, that the initial fragment S (1) S (2) S (3)... S (l).... of the generated sequence, being of the length l 2 l, realizes all series of the length 1 2 l. To describe precisely the algorithm we need to introduce a notation and formulate some auxiliary mathematical facts. This will be done in the next section. 4. Mathematical preliminaries The main fact formulated in this section is a lemma concerning a manner of natural number representation. To formulate this lemma we need a notation. By d we shall denote natural numbers of the form 2 u, where u = 0,1,2,. W shall now define: For example, we have: l(d) = 2 d, w(d) = l(d) d, s(d) = 2 l(d) l(d) d, d = 1, l(1) = 2, w(1) = 2, s(1) = 8, d = 2, l(2) = 4, w(2) = 8, s(2) = 64, d = 4, l(4) = 16, w(4) = 64, s(4) = 2048, d = 8, l(8) = 256, w(8) = 2048, s(8) = Using the above notation we shall formulate the main. Lemma Let n be an arbitrary natural number, greater than 7 and let d be the number of the form 2 u, where u = 1,2,..., such that s(d/2) n < s(d). Then there exist natural numbers i, j, k, such that n = i (2 w(d)) + j d + k 23
8 Wiktor Dańko and such that 0 i < l(d), 0 j < 2 l(d), 0 k < d. The numbers i, j, k, are determined univocally. The inductive proof of the lemma is rather technical and is omitted. We end this section with two examples illustrating the lemma. Example 1. n = 47. For d = 2 we have: 8 = s(1) 47 < s(2) = 64, 2 w(2) = 2 8 = 16. For the values i = 2, j = 7,k = 1, satisfying 0 i = 2 < l(d) = 4, 0 j = 7 < 2 l(d) = 8, 0 k = 1 < d = 2, we have 47 = i (2 w(d)) + j d + k = i 16 + j 2 + k = Example 2. n = For d = 4 we have: 64 = s(2) 1831 < s(4) = 2048, 2 w(4) = 2 64 = 128. For the values i = 14, j = 9,k = 3, satisfying 0 i = 14 < l(d) = 16, 0 j = 9 < 2l(d) = 32, 0 k = 3 < d = 4, we have 1831 = i (2 w(d)) + j d + k = i j 4 + k = The algorithm Using the notation introduced in the preceding section we can describe the proposed algorithm generating a binary pseudo-random sequence. For readability of inductive equations, describing the sequence generated by the algorithm, elements of the sequence will be denoted by {B(n)} n=0,1,2,.... The recursive definition of the sequence is as follows: 24
9 An algorithm for generating binary pseudo-random sequences (A) Initial values: We define the values B(n), for n satisfying n < s(1) = 8, i.e., for n = 0,1,2,3,4,5,6,7: B(0) = 1, B(1) = 1, B(2) = 0, B(3) = 1, B(4) = 0, B(5) = 0, B(6) = 1, B(7) = 0. (B) Induction step: Assume that the elements B(n) are defined for all values n satisfying n < s(d/2). We shall now define the values for n satisfying i.e., for s(d/2) n < s(d), n = i (2 w(d)) + j d + k, where i = 0,1,...,l(d) 1, j = 0,1,...,2 l(d) 1, k = 0,1,...,d 1. (B 0 ) We first define the values B(n), for n satisfying Namely, w(d) = s(d/2) n < 2 w(d) : B(n) = B(w(d) + j d + k) = B([(l(d) j 1)modl(d)] d + k) for j = 0,1,...,l(d) 1, k = 0,1,...,d 1. Thus we have defined the values B(n), for n = i (2 w(d)) + j d + k, where i = 0 and j = 0,1,...,2l(d) 1, k = 0,1,...,d 1. (B 1 ) Now, we define B(n) = B((i 1) 2 w(d) + j d + k) if (i is even and j is even), B((i 1) 2 w(d) + [( j + 2)mod(2 l(d)] d + k) if (i is even and j is odd), B((i 1) 2 w(d) + [( j 2)mod(2 l(d)] d + k) if (i is odd and j is even), B((i 1) 2 w(d) + j d + k) if (i is odd and j is odd) 25
10 Wiktor Dańko for where n = i (2 w(d)) + j d + k, i = 1,2,...,l(d) 1, j = 0,1,...,2 l(d) 1, k = 0,1,...,d 1. This ends the induction step. The above inductive definition of the sequence {B(n)} n=0,1,2,... is not convenient for computer implementation. However, it enables us to formulate theorems concerning properties of the sequence. 6. Properties of the sequence generated by the algorithm In this section we formulate (without proofs) several facts about the sequence {B(n)} n=0,1,2,... that concern its probabilistic properties. Theorem 1. For any natural number n > 0, the initial fragment of the generated sequence of the length (2 n) 2 (2 n) contains all (binary) series of the length n. Corollary 1. The sequence {B(n)} n=0,1,2,... is not periodic. Let a denote a fixed series a 0 a 1...a d 1 of the length d being of the form d = 2 u, where u = 0,1,2,.... By N a (n) we shall denote the number of occurrences of the series a in the initial fragment B(0)B(1)...B(n). Let us also define F a (n) = N a(n). n The intuitive meaning of F a (n) is the frequency of appearing of the series a in the initial fragment B(0)B(1)...B(n). 26
11 An algorithm for generating binary pseudo-random sequences Theorem 2. Let a and b denote fixed series of the same length d. Then N a (n) lim n N b (n) = 1 Let us treat the results of successive execution of two random assignments x:= random; x:= random; realized by means of a pseudo-random generator, as random events. The following theorem concerns, in a way, the independence of such events. Theorem 3. Let a and b denote fixed series of the same length d. Then lim n n N a b (n) N a (n) N b (n) = lim n F a b (n) F a (n) F b (n) = 1 The independence of results of random assignments based on a pseudo-random generator is of great importance for modeling real stochastic processes (cf. [3]). 7. Final remarks The proofs of mathematical facts formulated in the paper are too long for presentation in this publication and therefore are omitted here. They will be presented in separate papers. The question of nonrecursive implementation of the inductive definition of the sequence {B(n)} n=0,1,2,... will be discussed in a separate paper. This paper will also contain an analysis of the complexity of such an implementation. References [1] Cormen T., Leiserson C., Riverst R., Stein C., Introduction to Algorithms, Massachusetts Institute of Technology,
12 Wiktor Dańko [2] Dańko A., Dańko W., Improving Pseudo-Random Generators, International Conference on Biometrics and Kansei Engineering, June Cieszyn, Poland, pp , [3] Dańko W., The Set of Probabilistic Algorithmic Formulas Valid in a Finite Structure is Decidable with Respect to Its Diagram, Fundamenta Informaticae, vol. 19 (3-4), pp. ( ), [4] Dańko W., Remarks on Computer Simulations, Biometrics, Computer Security Systems & Artificial Intelligence Applications, red.: Khalid Saeed, Jerzy Pejaś, Romuald Mosdorf, Springer, Science+Business Media, LLC, New York, pp , [5] Dańko W., Algorithmic Models of Probabilistic Processes, Politechnika Białostocka, (in Polish, to appear). [6] Feller W., An Introduction to Probability Theory and Its Applications, John Wiley and Sons, Inc., New York, London, [7] Gentle J.E., Random Number Generation and Monte Carlo Methods, Springer, [8] Jessa M., Designing Security for Number Sequences Generated by Means of The Sawtooth Chaotic Map, IEEE Transactions on Circuits and Systems - I: Regular Papers, vol. 53 (5), pp , [9] L Ecuyer P., Random Numbers for Simulation, Comm. ACM 33 (10), pp [10] L Ecuyer P., Tezuka S., Structural Properties for Two Classes of Combined Random Number Generators, Math. Comput. 57, pp. l35-746, [11] Lipski W., Combinatorics for Computer Scientists, WNT, Warszawa, 1985, (in Polish). [12] Zieliński R., Random Numbers Generators, WNT, Warszawa, 1972, (in Polish), Transaction on Circuit and Systems - I:Regular Papers, vol. 53, 5, pp [13] Zieliński R, Wieczorkowski R., Computer Random Numbers Generators, WNT, Warszawa, 1997, (in Polish). [14] Tezuka S., A Unified View of Large-Period Random Number Generators, J. Oper. Res. Soc. Japan. 37, pp
13 An algorithm for generating binary pseudo-random sequences ALGORYTM GENEROWANIA PSEUDOLOSOWYCH CIAGÓW BINARNYCH Streszczenie: W pracy został przedstawiony algorytm generowania pseudo-losowego ciągu binarnego. Sformułowane zostały twierdzenia dotyczące własności otrzymanego ciągu. Nie jest to ciąg okresowy i dla dowolnego n > 0, początkowy odcinek ciągu o długości (2 n) 2 (2 n) zawiera wszystkie serie binarne o długości n. Słowa kluczowe: pseudolosowy generator komputerowy, symulacja komputerowa, algorytm probabilistyczny Artykuł zrealizowano w ramach pracy badawczej S/WI/1/
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
CHAPTER 5. Number Theory. 1. Integers and Division. Discussion
CHAPTER 5 Number Theory 1. Integers and Division 1.1. Divisibility. Definition 1.1.1. Given two integers a and b we say a divides b if there is an integer c such that b = ac. If a divides b, we write a
FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z
FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
* Research supported in part by KBN Grant No. PBZ KBN 016/P03/1999.
PROBABILrn AND MATHEMATICAL STATISTICS Vol. 24, Fsgc 1 (2W4), pp 1-15 ON ANNUITIES UNDER RANDOM RATES OF INTEREST' WITH PAYMENTS VARYING IN ARITHMETIC AND GEOMETRIC PROGRESSION BY K. BURNECKI*, A. MARCINIUB
Reading 13 : Finite State Automata and Regular Expressions
CS/Math 24: Introduction to Discrete Mathematics Fall 25 Reading 3 : Finite State Automata and Regular Expressions Instructors: Beck Hasti, Gautam Prakriya In this reading we study a mathematical model
Degrees that are not degrees of categoricity
Degrees that are not degrees of categoricity Bernard A. Anderson Department of Mathematics and Physical Sciences Gordon State College [email protected] www.gordonstate.edu/faculty/banderson Barbara
ON GENERALIZED RELATIVE COMMUTATIVITY DEGREE OF A FINITE GROUP. A. K. Das and R. K. Nath
International Electronic Journal of Algebra Volume 7 (2010) 140-151 ON GENERALIZED RELATIVE COMMUTATIVITY DEGREE OF A FINITE GROUP A. K. Das and R. K. Nath Received: 12 October 2009; Revised: 15 December
I. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
Regular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
A simple criterion on degree sequences of graphs
Discrete Applied Mathematics 156 (2008) 3513 3517 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Note A simple criterion on degree
Notes on Determinant
ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without
An example of a computable
An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept
1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let
Copyright c 2009 by Karl Sigman 1 Stopping Times 1.1 Stopping Times: Definition Given a stochastic process X = {X n : n 0}, a random time τ is a discrete random variable on the same probability space as
Kevin James. MTHSC 412 Section 2.4 Prime Factors and Greatest Comm
MTHSC 412 Section 2.4 Prime Factors and Greatest Common Divisor Greatest Common Divisor Definition Suppose that a, b Z. Then we say that d Z is a greatest common divisor (gcd) of a and b if the following
Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy
Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy Kim S. Larsen Odense University Abstract For many years, regular expressions with back referencing have been used in a variety
Math 115 Spring 2011 Written Homework 5 Solutions
. Evaluate each series. a) 4 7 0... 55 Math 5 Spring 0 Written Homework 5 Solutions Solution: We note that the associated sequence, 4, 7, 0,..., 55 appears to be an arithmetic sequence. If the sequence
Gambling Systems and Multiplication-Invariant Measures
Gambling Systems and Multiplication-Invariant Measures by Jeffrey S. Rosenthal* and Peter O. Schwartz** (May 28, 997.. Introduction. This short paper describes a surprising connection between two previously
CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12
CONTINUED FRACTIONS AND PELL S EQUATION SEUNG HYUN YANG Abstract. In this REU paper, I will use some important characteristics of continued fractions to give the complete set of solutions to Pell s equation.
a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1
Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1 J. Zhang Institute of Applied Mathematics, Chongqing University of Posts and Telecommunications, Chongqing
HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!
Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following
Graph Security Testing
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 23 No. 1 (2015), pp. 29-45 Graph Security Testing Tomasz Gieniusz 1, Robert Lewoń 1, Michał Małafiejski 1 1 Gdańsk University of Technology, Poland Department of
F. ABTAHI and M. ZARRIN. (Communicated by J. Goldstein)
Journal of Algerian Mathematical Society Vol. 1, pp. 1 6 1 CONCERNING THE l p -CONJECTURE FOR DISCRETE SEMIGROUPS F. ABTAHI and M. ZARRIN (Communicated by J. Goldstein) Abstract. For 2 < p
MATH 4330/5330, Fourier Analysis Section 11, The Discrete Fourier Transform
MATH 433/533, Fourier Analysis Section 11, The Discrete Fourier Transform Now, instead of considering functions defined on a continuous domain, like the interval [, 1) or the whole real line R, we wish
Cycles in a Graph Whose Lengths Differ by One or Two
Cycles in a Graph Whose Lengths Differ by One or Two J. A. Bondy 1 and A. Vince 2 1 LABORATOIRE DE MATHÉMATIQUES DISCRÉTES UNIVERSITÉ CLAUDE-BERNARD LYON 1 69622 VILLEURBANNE, FRANCE 2 DEPARTMENT OF MATHEMATICS
A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries
Acta Math. Univ. Comenianae Vol. LXVI, 2(1997), pp. 285 291 285 A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE E. T. BASKORO, M. MILLER and J. ŠIRÁŇ Abstract. It is well known that Moore digraphs do
Note on some explicit formulae for twin prime counting function
Notes on Number Theory and Discrete Mathematics Vol. 9, 03, No., 43 48 Note on some explicit formulae for twin prime counting function Mladen Vassilev-Missana 5 V. Hugo Str., 4 Sofia, Bulgaria e-mail:
Competitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l-4] on graphs and matroids I used definitions equivalent to the following.
Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
arxiv:math/0112298v1 [math.st] 28 Dec 2001
Annuities under random rates of interest revisited arxiv:math/0112298v1 [math.st] 28 Dec 2001 Krzysztof BURNECKI, Agnieszka MARCINIUK and Aleksander WERON Hugo Steinhaus Center for Stochastic Methods,
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics
No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results
Nonparametric adaptive age replacement with a one-cycle criterion
Nonparametric adaptive age replacement with a one-cycle criterion P. Coolen-Schrijner, F.P.A. Coolen Department of Mathematical Sciences University of Durham, Durham, DH1 3LE, UK e-mail: [email protected]
COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012
Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about
How to Gamble If You Must
How to Gamble If You Must Kyle Siegrist Department of Mathematical Sciences University of Alabama in Huntsville Abstract In red and black, a player bets, at even stakes, on a sequence of independent games
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
The positive minimum degree game on sparse graphs
The positive minimum degree game on sparse graphs József Balogh Department of Mathematical Sciences University of Illinois, USA [email protected] András Pluhár Department of Computer Science University
Notes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
Section 4.2: The Division Algorithm and Greatest Common Divisors
Section 4.2: The Division Algorithm and Greatest Common Divisors The Division Algorithm The Division Algorithm is merely long division restated as an equation. For example, the division 29 r. 20 32 948
Security Analysis of DRBG Using HMAC in NIST SP 800-90
Security Analysis of DRBG Using MAC in NIST SP 800-90 Shoichi irose Graduate School of Engineering, University of Fukui hrs [email protected] Abstract. MAC DRBG is a deterministic random bit generator
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Jialin Zhang Tsinghua University [email protected] Wei Chen Microsoft Research Asia [email protected] Abstract
Graphs without proper subgraphs of minimum degree 3 and short cycles
Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract
CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
C H A P T E R Regular Expressions regular expression
7 CHAPTER Regular Expressions Most programmers and other power-users of computer systems have used tools that match text patterns. You may have used a Web search engine with a pattern like travel cancun
Continued Fractions. Darren C. Collins
Continued Fractions Darren C Collins Abstract In this paper, we discuss continued fractions First, we discuss the definition and notation Second, we discuss the development of the subject throughout history
SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by
SUBGROUPS OF CYCLIC GROUPS KEITH CONRAD 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by g = {g k : k Z}. If G = g, then G itself is cyclic, with g as a generator. Examples
On the mathematical theory of splitting and Russian roulette
On the mathematical theory of splitting and Russian roulette techniques St.Petersburg State University, Russia 1. Introduction Splitting is an universal and potentially very powerful technique for increasing
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
A SURVEY ON CONTINUOUS ELLIPTICAL VECTOR DISTRIBUTIONS
A SURVEY ON CONTINUOUS ELLIPTICAL VECTOR DISTRIBUTIONS Eusebio GÓMEZ, Miguel A. GÓMEZ-VILLEGAS and J. Miguel MARÍN Abstract In this paper it is taken up a revision and characterization of the class of
Recursive Algorithms. Recursion. Motivating Example Factorial Recall the factorial function. { 1 if n = 1 n! = n (n 1)! if n > 1
Recursion Slides by Christopher M Bourke Instructor: Berthe Y Choueiry Fall 007 Computer Science & Engineering 35 Introduction to Discrete Mathematics Sections 71-7 of Rosen cse35@cseunledu Recursive Algorithms
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA [email protected] Sergey Kitaev Mathematics
Math 55: Discrete Mathematics
Math 55: Discrete Mathematics UC Berkeley, Fall 2011 Homework # 5, due Wednesday, February 22 5.1.4 Let P (n) be the statement that 1 3 + 2 3 + + n 3 = (n(n + 1)/2) 2 for the positive integer n. a) What
CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e.
CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. This chapter contains the beginnings of the most important, and probably the most subtle, notion in mathematical analysis, i.e.,
Properties of BMO functions whose reciprocals are also BMO
Properties of BMO functions whose reciprocals are also BMO R. L. Johnson and C. J. Neugebauer The main result says that a non-negative BMO-function w, whose reciprocal is also in BMO, belongs to p> A p,and
10.2 Series and Convergence
10.2 Series and Convergence Write sums using sigma notation Find the partial sums of series and determine convergence or divergence of infinite series Find the N th partial sums of geometric series and
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
GENERATING SETS KEITH CONRAD
GENERATING SETS KEITH CONRAD 1 Introduction In R n, every vector can be written as a unique linear combination of the standard basis e 1,, e n A notion weaker than a basis is a spanning set: a set of vectors
Counting Primes whose Sum of Digits is Prime
2 3 47 6 23 Journal of Integer Sequences, Vol. 5 (202), Article 2.2.2 Counting Primes whose Sum of Digits is Prime Glyn Harman Department of Mathematics Royal Holloway, University of London Egham Surrey
SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov
Serdica Math. J. 30 (2004), 95 102 SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS Nickolay Khadzhiivanov, Nedyalko Nenov Communicated by V. Drensky Abstract. Let Γ(M) where M V (G) be the set of all vertices
COMMUTATIVITY DEGREES OF WREATH PRODUCTS OF FINITE ABELIAN GROUPS
COMMUTATIVITY DEGREES OF WREATH PRODUCTS OF FINITE ABELIAN GROUPS IGOR V. EROVENKO AND B. SURY ABSTRACT. We compute commutativity degrees of wreath products A B of finite abelian groups A and B. When B
A Brief Introduction to Property Testing
A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as
The sum of digits of polynomial values in arithmetic progressions
The sum of digits of polynomial values in arithmetic progressions Thomas Stoll Institut de Mathématiques de Luminy, Université de la Méditerranée, 13288 Marseille Cedex 9, France E-mail: [email protected]
Section 1.3 P 1 = 1 2. = 1 4 2 8. P n = 1 P 3 = Continuing in this fashion, it should seem reasonable that, for any n = 1, 2, 3,..., = 1 2 4.
Difference Equations to Differential Equations Section. The Sum of a Sequence This section considers the problem of adding together the terms of a sequence. Of course, this is a problem only if more than
Low upper bound of ideals, coding into rich Π 0 1 classes
Low upper bound of ideals, coding into rich Π 0 1 classes Antonín Kučera the main part is a joint project with T. Slaman Charles University, Prague September 2007, Chicago The main result There is a low
CURVES WHOSE SECANT DEGREE IS ONE IN POSITIVE CHARACTERISTIC. 1. Introduction
Acta Math. Univ. Comenianae Vol. LXXXI, 1 (2012), pp. 71 77 71 CURVES WHOSE SECANT DEGREE IS ONE IN POSITIVE CHARACTERISTIC E. BALLICO Abstract. Here we study (in positive characteristic) integral curves
Lecture 7: NP-Complete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
Lecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
Monte Carlo Methods in Finance
Author: Yiyang Yang Advisor: Pr. Xiaolin Li, Pr. Zari Rachev Department of Applied Mathematics and Statistics State University of New York at Stony Brook October 2, 2012 Outline Introduction 1 Introduction
Passive Discovery Algorithms
t t Technische Universität Berlin Telecommunication Networks Group arxiv:1506.05255v1 [cs.ni] 17 Jun 2015 Optimized Asynchronous Passive Multi-Channel Discovery of Beacon-Enabled Networks Niels Karowski,
Chapter ML:IV. IV. Statistical Learning. Probability Basics Bayes Classification Maximum a-posteriori Hypotheses
Chapter ML:IV IV. Statistical Learning Probability Basics Bayes Classification Maximum a-posteriori Hypotheses ML:IV-1 Statistical Learning STEIN 2005-2015 Area Overview Mathematics Statistics...... Stochastics
Integer roots of quadratic and cubic polynomials with integer coefficients
Integer roots of quadratic and cubic polynomials with integer coefficients Konstantine Zelator Mathematics, Computer Science and Statistics 212 Ben Franklin Hall Bloomsburg University 400 East Second Street
Lecture 4: AC 0 lower bounds and pseudorandomness
Lecture 4: AC 0 lower bounds and pseudorandomness Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: Jason Perry and Brian Garnett In this lecture,
Computing Near Optimal Strategies for Stochastic Investment Planning Problems
Computing Near Optimal Strategies for Stochastic Investment Planning Problems Milos Hauskrecfat 1, Gopal Pandurangan 1,2 and Eli Upfal 1,2 Computer Science Department, Box 1910 Brown University Providence,
Every Positive Integer is the Sum of Four Squares! (and other exciting problems)
Every Positive Integer is the Sum of Four Squares! (and other exciting problems) Sophex University of Texas at Austin October 18th, 00 Matilde N. Lalín 1. Lagrange s Theorem Theorem 1 Every positive integer
k, then n = p2α 1 1 pα k
Powers of Integers An integer n is a perfect square if n = m for some integer m. Taking into account the prime factorization, if m = p α 1 1 pα k k, then n = pα 1 1 p α k k. That is, n is a perfect square
OPTIMAl PREMIUM CONTROl IN A NON-liFE INSURANCE BUSINESS
ONDERZOEKSRAPPORT NR 8904 OPTIMAl PREMIUM CONTROl IN A NON-liFE INSURANCE BUSINESS BY M. VANDEBROEK & J. DHAENE D/1989/2376/5 1 IN A OPTIMAl PREMIUM CONTROl NON-liFE INSURANCE BUSINESS By Martina Vandebroek
On the number-theoretic functions ν(n) and Ω(n)
ACTA ARITHMETICA LXXVIII.1 (1996) On the number-theoretic functions ν(n) and Ω(n) by Jiahai Kan (Nanjing) 1. Introduction. Let d(n) denote the divisor function, ν(n) the number of distinct prime factors,
GREATEST COMMON DIVISOR
DEFINITION: GREATEST COMMON DIVISOR The greatest common divisor (gcd) of a and b, denoted by (a, b), is the largest common divisor of integers a and b. THEOREM: If a and b are nonzero integers, then their
Scheduling Real-time Tasks: Algorithms and Complexity
Scheduling Real-time Tasks: Algorithms and Complexity Sanjoy Baruah The University of North Carolina at Chapel Hill Email: [email protected] Joël Goossens Université Libre de Bruxelles Email: [email protected]
OPTIMAL SELECTION BASED ON RELATIVE RANK* (the "Secretary Problem")
OPTIMAL SELECTION BASED ON RELATIVE RANK* (the "Secretary Problem") BY Y. S. CHOW, S. MORIGUTI, H. ROBBINS AND S. M. SAMUELS ABSTRACT n rankable persons appear sequentially in random order. At the ith
Online and Offline Selling in Limit Order Markets
Online and Offline Selling in Limit Order Markets Kevin L. Chang 1 and Aaron Johnson 2 1 Yahoo Inc. [email protected] 2 Yale University [email protected] Abstract. Completely automated electronic
CONTENTS 1. Peter Kahn. Spring 2007
CONTENTS 1 MATH 304: CONSTRUCTING THE REAL NUMBERS Peter Kahn Spring 2007 Contents 2 The Integers 1 2.1 The basic construction.......................... 1 2.2 Adding integers..............................
Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range
THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis
(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems.
3130CIT: Theory of Computation Turing machines and undecidability (IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. An undecidable problem
2.1 Complexity Classes
15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look
Generating Elementary Combinatorial Objects
Fall 2009 Combinatorial Generation Combinatorial Generation: an old subject Excerpt from: D. Knuth, History of Combinatorial Generation, in pre-fascicle 4B, The Art of Computer Programming Vol 4. Combinatorial
= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
Stochastic Inventory Control
Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the
CSE 135: Introduction to Theory of Computation Decidability and Recognizability
CSE 135: Introduction to Theory of Computation Decidability and Recognizability Sungjin Im University of California, Merced 04-28, 30-2014 High-Level Descriptions of Computation Instead of giving a Turing
Probability and statistics; Rehearsal for pattern recognition
Probability and statistics; Rehearsal for pattern recognition Václav Hlaváč Czech Technical University in Prague Faculty of Electrical Engineering, Department of Cybernetics Center for Machine Perception
