Quantum Algorithms. Peter Høyer

Size: px
Start display at page:

Download "Quantum Algorithms. Peter Høyer"

Transcription

1 Quantum Algorithms Peter Høyer University of Calgary CSSQI 2015 Canadian Summer School on Quantum Information Toronto, August 11, 2015

2 QUERY MODEL x1 x2 xn x xn You can ask questions of the form: What is xi?

3 A Query What is xi? i Query xi Remember the input i Query i xi b Reversible i Query i b xi i b Unitary U X i b xi

4 A Query i b U X i b xi ᵢ αᵢ i b ᵢ αᵢ i b xi Query in superposition 1 query 1 unit cost

5 Alternative query model i i b U X i b xi RX (-1) x i i Proof of i UX 1 H H 1 (-1) x i i

6 Alternative query model i i b U X i b xi RX (-1) x i i Proof of i b H RX H i b xi

7 Problems x1 xn For instance we might want to know: Is x1 = x2 = x3 = = xn = 0? Is x1 x2 x3 xn? How many indices are there with xi =1? Find index i such that xi =1 Is graph G connected? Does graph G contain a triangle?

8 1-out-of-4 in one query x1 0 x2 0 x3 1 x RX ψ

9 1-out-of-4 in one query x1 0 x2 0 x3 1 x RX ψ U

10 Non-query x1 0 x2 0 x3 1 0 RX

11 Binary searching x1 x2 x3 x 1 x 2 x 3 = 001, 011, or RX ψ α 1 β 2 γ α 1 + β 2 - γ 3 α 1 - β 2 - γ 3 α 1 - β 2 - γ 3

12 1-out-of-N x1 x2 xn Ψ0 = N RX R Ψ Ψ RX R Ψ = Id - 2 i i i : xi = 1 = Id - 2 Ψ0 Ψ

13 Grover s algorithm x1 x2 xn Ψ0 = N RX R Ψ Ψ RX = Id - 2 i i i : xi = 1 R Ψ = Id - 2 Ψ0 Ψ0

14 Ref * Ref = Rotation θ

15 Grover s algorithm RX R Ψ RX = Id - 2 i i i : xi = 1 = Id - 2 Ψg Ψg R Ψ = Id - 2 Ψ0 Ψ0

16 Two reflections = a rotation RX R Ψ 2θ RX = Id - 2 Ψg Ψg θ R Ψ = Id - 2 Ψ0 Ψ0 If Ψg Ψ0 = sin(θ), then rotation by angle 2θ

17 Amplitude amplification A 0 = Ψ = Ψgood + Ψbad p = sin 2 (θ) = Ψgood Ψgood Ψgood RX = Id - 2 Ψgood Ψgood θ Ψbad R Ψ = Id - 2 Ψ Ψ

18 Amplitude amplification A 0 = Ψ = Ψgood + Ψbad p = sin 2 (θ) = Ψgood Ψgood Ψgood RX = Id - 2 Ψgood Ψgood θ Ψbad R Ψ = Id - 2 Ψ Ψ R Ψ RX R Ψ RX R Ψ RX R Ψ RX R Ψ RX R Ψ RX A 0 #Iterations T to get close to Ψgood = π/2 2θ 1 p

19 De-randomize (if p is known) A 0 = Ψ Ψgood Theorem: If probability p is known, we can de-randomize θ Ψbad Proof: If (2T+1)θ is slightly more than π/2, then choose slightly smaller angle θ < θ such that (2T+1)θ is equal to π/2.

20 Guessing if p is un-known A 0 = Ψ Ψgood Algorithm: A 0 (R Ψ RX) A 0 (R RX) r Ψ A 0 r [1,2] (R RX) r Ψ A 0 r [1,4] (R RX) r Ψ A 0 r [1,8] (R RX) r Ψ A 0 r [1,16] #Iterations T to get close to Ψgood π/2 2θ Ψbad

21 Ref * Ref = Rotation RX = Id - 2 Ψg Ψg R Ψ = Id - 2 Ψ0 Ψ0 # Iterations 1 θ θ1

22 Ref * Ref = Rotation RX = Id - 2 ProjA R Id - 2 Ψ = ProjB # Iterations a1 a2 a3 a4 a5 a θ1 θ2 θ3 θ4 θ5 θ6 a2 θ2 a1 θ1 a5 θ5 a3 θ3 θ4 a4 a6 θ6 Detect versus Finding solutions? Search for state Ψgood a1 + a2 + + a6 = 1

23 Quantum algorithms 0 A RX R Ψ RX R Ψ RX R Ψ A RX R RX RX Ψ R Ψ R Ψ RX RX RX V0 V1 V2 VT T queries to oracle X {0,1} N

24 Life of a student Before One day of work: After Requires lots of days of work

25 Lower bounds 0 0 RX RX RX V0 V1 V2 VT To prove a lower bound, we show 1. We know very little in the beginning 2. We learn only a little by each query 3. We need to learn a lot Then we conclude we need a lot of queries

26 Finding inputs x = x1 x2 x3 x4 {0,1} 4 x1 = 1 x3 = 0

27 Distinguishing inputs x = x1 x2 x3 x4 {0,1} 4 W0 = Σ (Γ)jk jk = 2( ) = 58

28 Distinguishing inputs x = x1 x2 x3 x4 {0,1} W0 = Σ (Γ)jk jk x1 = 1 = 1 Γ 1 ΔW = 2( ) = 28

29 Distinguishing inputs x = x1 x2 x3 x4 {0,1} W0 = Σ (Γ)jk jk WT ε W0 x1 = 1 = 1 Γ 1 ΔW = 2( ) = 28 = 1 Γ 1 1 = 1 Γ 1 T (1-ε) max = i 1 Γ i 1

30 Distinguishing inputs x = x1 x2 x3 x4 {0,1} W0 = Σ (Γ)jk jk WT ε W0 x1 = 1 = Ψ Γ Ψ ΔW = 2( ) = 28 = φ Γ 1 φ = Ψ Γ Ψ T (1-ε) max = i φ Γ i φ

31 Distinguishing inputs x = x1 x2 x3 x4 {0,1} W0 = Σ (Γ)jk jk WT ε W0 T (1-ε) maxi x1 = 1 = Γ ΔW = 2( ) = 28 = Γ 1 Γ Γ i

32 Binary Searching 1/1 1/2 1/3 1/4 1/5 1/1 1/1 1/2 1/3 1/4 1/2 1/1 1 /1 1 /2 1 /3 1/3 1/2 1/1 1/1 1/2 1/4 1 /3 1 /2 1/1 1/1 1/5 1/4 1/3 1/2 1 /1 x1 x2 x5 x1 x2 x5 = 00000, 00001, 00011, 00111, 01111, or Find index i of left-most 1 W0 ΔW WT T = Γ Γi ε Γ (1-ε) Γ Γi = Θ(Nlog N) = Θ(N) = Θ(log N)

33 Polynomial Method i b U X i b xi α i, 0 + β i, 1 { α i, 0 + β i, 1 α i, 1 + β i, 0 if xi = 0 if xi = 1 = [βxi + α(1-xi)] i, 0 + [αxi + β(1-xi)] i, 1 Polynomials of degree 1 in variable xi 0 0 UX UX UX V0 V1 V2 VT

34 Lower bounds OR2 = x1 + x2 - x1x2 Parity3 = x1 + x2 + x3 - x1x2 - x1x3 - x2x3 + x1x2x3 degree(orn) = N QE(ORN) N/2 degree(parityn) = N QE(ParityN) N/2 Polynomials of degree T in variables xi 0 0 UX UX UX V0 V1 V2 VT

35 Lower bounds degree(orn) = Θ( N) degree(parityn) = Θ(N) QE(f) deg(f) Q2(ORN) Q2(ParityN) Ω(N) Q2(f) deg(f) Ω( N) Polynomials of degree T in variables xi 0 0 UX UX UX V0 V1 V2 VT

36 Binary Searching Output = leaf number leaves N leaves = log 2 (N) for binary search

37 Haar Wavelet

38 Binary Searching

39 Binary Searching

40 Binary Searching

41 Binary Searching leaves = 11 pebbles N leaves = log 3 (N) quantum search

42 s Peter Høyer University of Calgary

α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =

More information

University of Maryland Fraternity & Sorority Life Spring 2015 Academic Report

University of Maryland Fraternity & Sorority Life Spring 2015 Academic Report University of Maryland Fraternity & Sorority Life Academic Report Academic and Population Statistics Population: # of Students: # of New Members: Avg. Size: Avg. GPA: % of the Undergraduate Population

More information

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis

More information

0.1 Phase Estimation Technique

0.1 Phase Estimation Technique Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design

More information

The Heat Equation. Lectures INF2320 p. 1/88

The Heat Equation. Lectures INF2320 p. 1/88 The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)

More information

Contrôle dynamique de méthodes d approximation

Contrôle dynamique de méthodes d approximation Contrôle dynamique de méthodes d approximation Fabienne Jézéquel Laboratoire d Informatique de Paris 6 ARINEWS, ENS Lyon, 7-8 mars 2005 F. Jézéquel Dynamical control of approximation methods 7-8 Mar. 2005

More information

A Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems

A Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems myjournal manuscript No. (will be inserted by the editor) A Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems Eduardo Álvarez-Miranda Ivana Ljubić Paolo Toth Received:

More information

Techniques algébriques en calcul quantique

Techniques algébriques en calcul quantique Techniques algébriques en calcul quantique E. Jeandel Laboratoire de l Informatique du Parallélisme LIP, ENS Lyon, CNRS, INRIA, UCB Lyon 8 Avril 25 E. Jeandel, LIP, ENS Lyon Techniques algébriques en calcul

More information

MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets.

MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets. MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets. Norm The notion of norm generalizes the notion of length of a vector in R n. Definition. Let V be a vector space. A function α

More information

6.2 Permutations continued

6.2 Permutations continued 6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of

More information

Introduction to Scheduling Theory

Introduction to Scheduling Theory Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France arnaud.legrand@imag.fr November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling

More information

Part II Redundant Dictionaries and Pursuit Algorithms

Part II Redundant Dictionaries and Pursuit Algorithms Aisenstadt Chair Course CRM September 2009 Part II Redundant Dictionaries and Pursuit Algorithms Stéphane Mallat Centre de Mathématiques Appliquées Ecole Polytechnique Sparsity in Redundant Dictionaries

More information

1 Sufficient statistics

1 Sufficient statistics 1 Sufficient statistics A statistic is a function T = rx 1, X 2,, X n of the random sample X 1, X 2,, X n. Examples are X n = 1 n s 2 = = X i, 1 n 1 the sample mean X i X n 2, the sample variance T 1 =

More information

Math Placement Test Practice Problems

Math Placement Test Practice Problems Math Placement Test Practice Problems The following problems cover material that is used on the math placement test to place students into Math 1111 College Algebra, Math 1113 Precalculus, and Math 2211

More information

v 1 v 3 u v = (( 1)4 (3)2, [1(4) ( 2)2], 1(3) ( 2)( 1)) = ( 10, 8, 1) (d) u (v w) = (u w)v (u v)w (Relationship between dot and cross product)

v 1 v 3 u v = (( 1)4 (3)2, [1(4) ( 2)2], 1(3) ( 2)( 1)) = ( 10, 8, 1) (d) u (v w) = (u w)v (u v)w (Relationship between dot and cross product) 0.1 Cross Product The dot product of two vectors is a scalar, a number in R. Next we will define the cross product of two vectors in 3-space. This time the outcome will be a vector in 3-space. Definition

More information

PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS

PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUM OF REFERENCE SYMBOLS Benjamin R. Wiederholt The MITRE Corporation Bedford, MA and Mario A. Blanco The MITRE

More information

Complex Numbers. w = f(z) z. Examples

Complex Numbers. w = f(z) z. Examples omple Numbers Geometrical Transformations in the omple Plane For functions of a real variable such as f( sin, g( 2 +2 etc ou are used to illustrating these geometricall, usuall on a cartesian graph. If

More information

Additional questions for chapter 4

Additional questions for chapter 4 Additional questions for chapter 4 1. A stock price is currently $ 1. Over the next two six-month periods it is expected to go up by 1% or go down by 1%. The risk-free interest rate is 8% per annum with

More information

Lecture 2: Universality

Lecture 2: Universality CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal

More information

The Ergodic Theorem and randomness

The Ergodic Theorem and randomness The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction

More information

CoNP and Function Problems

CoNP and Function Problems CoNP and Function Problems conp By definition, conp is the class of problems whose complement is in NP. NP is the class of problems that have succinct certificates. conp is therefore the class of problems

More information

(Refer Slide Time: 01:11-01:27)

(Refer Slide Time: 01:11-01:27) Digital Signal Processing Prof. S. C. Dutta Roy Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 6 Digital systems (contd.); inverse systems, stability, FIR and IIR,

More information

1 Approximating Set Cover

1 Approximating Set Cover CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt

More information

Towards a Structuralist Interpretation of Saving, Investment and Current Account in Turkey

Towards a Structuralist Interpretation of Saving, Investment and Current Account in Turkey Towards a Structuralist Interpretation of Saving, Investment and Current Account in Turkey MURAT ÜNGÖR Central Bank of the Republic of Turkey http://www.muratungor.com/ April 2012 We live in the age of

More information

Outline Introduction Circuits PRGs Uniform Derandomization Refs. Derandomization. A Basic Introduction. Antonis Antonopoulos.

Outline Introduction Circuits PRGs Uniform Derandomization Refs. Derandomization. A Basic Introduction. Antonis Antonopoulos. Derandomization A Basic Introduction Antonis Antonopoulos CoReLab Seminar National Technical University of Athens 21/3/2011 1 Introduction History & Frame Basic Results 2 Circuits Definitions Basic Properties

More information

2. Illustration of the Nikkei 225 option data

2. Illustration of the Nikkei 225 option data 1. Introduction 2. Illustration of the Nikkei 225 option data 2.1 A brief outline of the Nikkei 225 options market τ 2.2 Estimation of the theoretical price τ = + ε ε = = + ε + = + + + = + ε + ε + ε =

More information

Parabolic Equations. Chapter 5. Contents. 5.1.2 Well-Posed Initial-Boundary Value Problem. 5.1.3 Time Irreversibility of the Heat Equation

Parabolic Equations. Chapter 5. Contents. 5.1.2 Well-Posed Initial-Boundary Value Problem. 5.1.3 Time Irreversibility of the Heat Equation 7 5.1 Definitions Properties Chapter 5 Parabolic Equations Note that we require the solution u(, t bounded in R n for all t. In particular we assume that the boundedness of the smooth function u at infinity

More information

Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy

Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy Kim S. Larsen Odense University Abstract For many years, regular expressions with back referencing have been used in a variety

More information

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Jie Gao Department of Computer Science Stanford University Joint work with Li Zhang Systems Research Center Hewlett-Packard

More information

Influences in low-degree polynomials

Influences in low-degree polynomials Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known

More information

Lecture 5 - CPA security, Pseudorandom functions

Lecture 5 - CPA security, Pseudorandom functions Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.

More information

Factorization in Polynomial Rings

Factorization in Polynomial Rings Factorization in Polynomial Rings These notes are a summary of some of the important points on divisibility in polynomial rings from 17 and 18 of Gallian s Contemporary Abstract Algebra. Most of the important

More information

4.5 Chebyshev Polynomials

4.5 Chebyshev Polynomials 230 CHAP. 4 INTERPOLATION AND POLYNOMIAL APPROXIMATION 4.5 Chebyshev Polynomials We now turn our attention to polynomial interpolation for f (x) over [ 1, 1] based on the nodes 1 x 0 < x 1 < < x N 1. Both

More information

On the Unique Games Conjecture

On the Unique Games Conjecture On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

Week 1: Introduction to Online Learning

Week 1: Introduction to Online Learning Week 1: Introduction to Online Learning 1 Introduction This is written based on Prediction, Learning, and Games (ISBN: 2184189 / -21-8418-9 Cesa-Bianchi, Nicolo; Lugosi, Gabor 1.1 A Gentle Start Consider

More information

Factoring Algorithms Based on NMR Quantum

Factoring Algorithms Based on NMR Quantum 1295 2002 69-74 69 Factoring Algorithms Based on NMR Quantum Computers (Noboru Kunihiro) (Shigeru Yamashita) NTT NTT Abstract No polynomial time algorithms have been proposed for the factoring and discrete

More information

8 Hyperbolic Systems of First-Order Equations

8 Hyperbolic Systems of First-Order Equations 8 Hyperbolic Systems of First-Order Equations Ref: Evans, Sec 73 8 Definitions and Examples Let U : R n (, ) R m Let A i (x, t) beanm m matrix for i,,n Let F : R n (, ) R m Consider the system U t + A

More information

A General Approach to Variance Estimation under Imputation for Missing Survey Data

A General Approach to Variance Estimation under Imputation for Missing Survey Data A General Approach to Variance Estimation under Imputation for Missing Survey Data J.N.K. Rao Carleton University Ottawa, Canada 1 2 1 Joint work with J.K. Kim at Iowa State University. 2 Workshop on Survey

More information

Cross product and determinants (Sect. 12.4) Two main ways to introduce the cross product

Cross product and determinants (Sect. 12.4) Two main ways to introduce the cross product Cross product and determinants (Sect. 12.4) Two main ways to introduce the cross product Geometrical definition Properties Expression in components. Definition in components Properties Geometrical expression.

More information

MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu

MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic

More information

Error estimates for nearly degenerate finite elements

Error estimates for nearly degenerate finite elements Error estimates for nearly degenerate finite elements Pierre Jamet In RAIRO: Analyse Numérique, Vol 10, No 3, March 1976, p. 43 61 Abstract We study a property which is satisfied by most commonly used

More information

Given three vectors A, B, andc. We list three products with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B);

Given three vectors A, B, andc. We list three products with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B); 1.1.4. Prouct of three vectors. Given three vectors A, B, anc. We list three proucts with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B); a 1 a 2 a 3 (A B) C = b 1 b 2 b 3 c 1 c 2 c 3 where the

More information

Logistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression

Logistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression Logistic Regression Department of Statistics The Pennsylvania State University Email: jiali@stat.psu.edu Logistic Regression Preserve linear classification boundaries. By the Bayes rule: Ĝ(x) = arg max

More information

Current Density Impedance Imaging with Complete Electrode Model

Current Density Impedance Imaging with Complete Electrode Model Current Density Impedance Imaging with Complete Electrode Model Alexandru Tamasan jointly with A. Nachman & J. Veras University of Central Florida Work supported by NSF BIRS Workshop on Hybrid Methods

More information

Trading regret rate for computational efficiency in online learning with limited feedback

Trading regret rate for computational efficiency in online learning with limited feedback Trading regret rate for computational efficiency in online learning with limited feedback Shai Shalev-Shwartz TTI-C Hebrew University On-line Learning with Limited Feedback Workshop, 2009 June 2009 Shai

More information

Notes on Complexity Theory Last updated: August, 2011. Lecture 1

Notes on Complexity Theory Last updated: August, 2011. Lecture 1 Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look

More information

root node level: internal node edge leaf node CS@VT Data Structures & Algorithms 2000-2009 McQuain

root node level: internal node edge leaf node CS@VT Data Structures & Algorithms 2000-2009 McQuain inary Trees 1 A binary tree is either empty, or it consists of a node called the root together with two binary trees called the left subtree and the right subtree of the root, which are disjoint from each

More information

A neurogeometrical model for image completion and visual illusion

A neurogeometrical model for image completion and visual illusion A neurogeometrical model for image completion and visual illusion Benedetta Franceschiello Advisors: A. Sarti, G. Citti CAMS (Unité Mixte CNRS-EHESS), University of Bologna Mid-term review meeting of MAnET

More information

Table of Contents Appendix 4-9

Table of Contents Appendix 4-9 Table of Contents Appendix 4-9 Appendix Multi-Input Thermometer & Datalogger Software Manual v1.0 4-8 Table of Contents 1. Introduction...1-1 1.1 Operation Environment...1-1 1.2 Hardware...1-1 1.3 Connecting

More information

Maximum Likelihood Estimation

Maximum Likelihood Estimation Math 541: Statistical Theory II Lecturer: Songfeng Zheng Maximum Likelihood Estimation 1 Maximum Likelihood Estimation Maximum likelihood is a relatively simple method of constructing an estimator for

More information

Lecture 4: BK inequality 27th August and 6th September, 2007

Lecture 4: BK inequality 27th August and 6th September, 2007 CSL866: Percolation and Random Graphs IIT Delhi Amitabha Bagchi Scribe: Arindam Pal Lecture 4: BK inequality 27th August and 6th September, 2007 4. Preliminaries The FKG inequality allows us to lower bound

More information

Lecture 3 SU(2) January 26, 2011. Lecture 3

Lecture 3 SU(2) January 26, 2011. Lecture 3 Lecture 3 SU(2) January 26, 2 Lecture 3 A Little Group Theory A group is a set of elements plus a compostion rule, such that:. Combining two elements under the rule gives another element of the group.

More information

Concrete Security of the Blum-Blum-Shub Pseudorandom Generator

Concrete Security of the Blum-Blum-Shub Pseudorandom Generator Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science 3796 (2005) 355 375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator

More information

Guessing Game: NP-Complete?

Guessing Game: NP-Complete? Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

FINITE ELEMENT : MATRIX FORMULATION. Georges Cailletaud Ecole des Mines de Paris, Centre des Matériaux UMR CNRS 7633

FINITE ELEMENT : MATRIX FORMULATION. Georges Cailletaud Ecole des Mines de Paris, Centre des Matériaux UMR CNRS 7633 FINITE ELEMENT : MATRIX FORMULATION Georges Cailletaud Ecole des Mines de Paris, Centre des Matériaux UMR CNRS 76 FINITE ELEMENT : MATRIX FORMULATION Discrete vs continuous Element type Polynomial approximation

More information

Monte Carlo Simulation

Monte Carlo Simulation 1 Monte Carlo Simulation Stefan Weber Leibniz Universität Hannover email: sweber@stochastik.uni-hannover.de web: www.stochastik.uni-hannover.de/ sweber Monte Carlo Simulation 2 Quantifying and Hedging

More information

Høgskolen i Narvik Sivilingeniørutdanningen STE6237 ELEMENTMETODER. Oppgaver

Høgskolen i Narvik Sivilingeniørutdanningen STE6237 ELEMENTMETODER. Oppgaver Høgskolen i Narvik Sivilingeniørutdanningen STE637 ELEMENTMETODER Oppgaver Klasse: 4.ID, 4.IT Ekstern Professor: Gregory A. Chechkin e-mail: chechkin@mech.math.msu.su Narvik 6 PART I Task. Consider two-point

More information

4.1 Introduction - Online Learning Model

4.1 Introduction - Online Learning Model Computational Learning Foundations Fall semester, 2010 Lecture 4: November 7, 2010 Lecturer: Yishay Mansour Scribes: Elad Liebman, Yuval Rochman & Allon Wagner 1 4.1 Introduction - Online Learning Model

More information

1 Prior Probability and Posterior Probability

1 Prior Probability and Posterior Probability Math 541: Statistical Theory II Bayesian Approach to Parameter Estimation Lecturer: Songfeng Zheng 1 Prior Probability and Posterior Probability Consider now a problem of statistical inference in which

More information

MAN-BITES-DOG BUSINESS CYCLES ONLINE APPENDIX

MAN-BITES-DOG BUSINESS CYCLES ONLINE APPENDIX MAN-BITES-DOG BUSINESS CYCLES ONLINE APPENDIX KRISTOFFER P. NIMARK The next section derives the equilibrium expressions for the beauty contest model from Section 3 of the main paper. This is followed by

More information

Simple Harmonic Motion

Simple Harmonic Motion Simple Harmonic Motion 1 Object To determine the period of motion of objects that are executing simple harmonic motion and to check the theoretical prediction of such periods. 2 Apparatus Assorted weights

More information

THE REMEZ ALGORITHM FOR TRIGONOMETRIC APPROXIMATION OF PERIODIC FUNCTIONS

THE REMEZ ALGORITHM FOR TRIGONOMETRIC APPROXIMATION OF PERIODIC FUNCTIONS THE REMEZ ALGORITHM FOR TRIGONOMETRIC APPROXIMATION OF PERIODIC FUNCTIONS MOHSIN JAVED AND LLOYD N. TREFETHEN Abstract. In this paper we present an implementation of the Remez algorithm for trigonometric

More information

FACTORING SPARSE POLYNOMIALS

FACTORING SPARSE POLYNOMIALS FACTORING SPARSE POLYNOMIALS Theorem 1 (Schinzel): Let r be a positive integer, and fix non-zero integers a 0,..., a r. Let F (x 1,..., x r ) = a r x r + + a 1 x 1 + a 0. Then there exist finite sets S

More information

Efficient Interference-Aware TDMA Link Scheduling for Static Wireless Networks

Efficient Interference-Aware TDMA Link Scheduling for Static Wireless Networks Efficient Interference-Aware TDMA Link Scheduling for Static Wireless Networks Weizhao Wang Yu Wang Xiang-Yang Li Wen-Zhan Song Ophir Frieder Department of Computer Science, Illinois Institute of Technology,

More information

3. Regression & Exponential Smoothing

3. Regression & Exponential Smoothing 3. Regression & Exponential Smoothing 3.1 Forecasting a Single Time Series Two main approaches are traditionally used to model a single time series z 1, z 2,..., z n 1. Models the observation z t as a

More information

Near Optimal Solutions

Near Optimal Solutions Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.

More information

Trigonometric Functions and Triangles

Trigonometric Functions and Triangles Trigonometric Functions and Triangles Dr. Philippe B. Laval Kennesaw STate University August 27, 2010 Abstract This handout defines the trigonometric function of angles and discusses the relationship between

More information

Algorithm Design and Analysis Homework #1 Due: 5pm, Friday, October 4, 2013 TA email: ada@csie.ntu.edu.tw. === Homework submission instructions ===

Algorithm Design and Analysis Homework #1 Due: 5pm, Friday, October 4, 2013 TA email: ada@csie.ntu.edu.tw. === Homework submission instructions === Algorithm Design and Analysis Homework #1 Due: 5pm, Friday, October 4, 2013 TA email: ada@csie.ntu.edu.tw === Homework submission instructions === For Problem 1, commit your source code and a brief documentation

More information

Lecture L3 - Vectors, Matrices and Coordinate Transformations

Lecture L3 - Vectors, Matrices and Coordinate Transformations S. Widnall 16.07 Dynamics Fall 2009 Lecture notes based on J. Peraire Version 2.0 Lecture L3 - Vectors, Matrices and Coordinate Transformations By using vectors and defining appropriate operations between

More information

PROBLEM SET. Practice Problems for Exam #1. Math 1352, Fall 2004. Oct. 1, 2004 ANSWERS

PROBLEM SET. Practice Problems for Exam #1. Math 1352, Fall 2004. Oct. 1, 2004 ANSWERS PROBLEM SET Practice Problems for Exam # Math 352, Fall 24 Oct., 24 ANSWERS i Problem. vlet R be the region bounded by the curves x = y 2 and y = x. A. Find the volume of the solid generated by revolving

More information

3-17 15-25 5 15-10 25 3-2 5 0. 1b) since the remainder is 0 I need to factor the numerator. Synthetic division tells me this is true

3-17 15-25 5 15-10 25 3-2 5 0. 1b) since the remainder is 0 I need to factor the numerator. Synthetic division tells me this is true Section 5.2 solutions #1-10: a) Perform the division using synthetic division. b) if the remainder is 0 use the result to completely factor the dividend (this is the numerator or the polynomial to the

More information

Statistical Machine Learning from Data

Statistical Machine Learning from Data Samy Bengio Statistical Machine Learning from Data 1 Statistical Machine Learning from Data Gaussian Mixture Models Samy Bengio IDIAP Research Institute, Martigny, Switzerland, and Ecole Polytechnique

More information

Basic Geometry Review For Trigonometry Students. 16 June 2010 Ventura College Mathematics Department 1

Basic Geometry Review For Trigonometry Students. 16 June 2010 Ventura College Mathematics Department 1 Basic Geometry Review For Trigonometry Students 16 June 2010 Ventura College Mathematics Department 1 Undefined Geometric Terms Point A Line AB Plane ABC 16 June 2010 Ventura College Mathematics Department

More information

Statistical Machine Learning

Statistical Machine Learning Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes

More information

Basics of Statistical Machine Learning

Basics of Statistical Machine Learning CS761 Spring 2013 Advanced Machine Learning Basics of Statistical Machine Learning Lecturer: Xiaojin Zhu jerryzhu@cs.wisc.edu Modern machine learning is rooted in statistics. You will find many familiar

More information

Lecture 1: Oracle Turing Machines

Lecture 1: Oracle Turing Machines Computational Complexity Theory, Fall 2008 September 10 Lecture 1: Oracle Turing Machines Lecturer: Kristoffer Arnsfelt Hansen Scribe: Casper Kejlberg-Rasmussen Oracle TM Definition 1 Let A Σ. Then a Oracle

More information

Chapter 2: Binomial Methods and the Black-Scholes Formula

Chapter 2: Binomial Methods and the Black-Scholes Formula Chapter 2: Binomial Methods and the Black-Scholes Formula 2.1 Binomial Trees We consider a financial market consisting of a bond B t = B(t), a stock S t = S(t), and a call-option C t = C(t), where the

More information

Total Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees

Total Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees Total Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees M. M. Arslanov, S. B. Cooper, I. Sh. Kalimullin and M. I. Soskova Kazan State University, Russia University of Leeds, U.K. This paper

More information

Optimal File Sharing in Distributed Networks

Optimal File Sharing in Distributed Networks Optimal File Sharing in Distributed Networks Moni Naor Ron M. Roth Abstract The following file distribution problem is considered: Given a network of processors represented by an undirected graph G = (V,

More information

Homework 2 Solutions

Homework 2 Solutions Homework Solutions 1. (a) Find the area of a regular heagon inscribed in a circle of radius 1. Then, find the area of a regular heagon circumscribed about a circle of radius 1. Use these calculations to

More information

An Overview of Integer Factoring Algorithms. The Problem

An Overview of Integer Factoring Algorithms. The Problem An Overview of Integer Factoring Algorithms Manindra Agrawal IITK / NUS The Problem Given an integer n, find all its prime divisors as efficiently as possible. 1 A Difficult Problem No efficient algorithm

More information

Lecture 7: Finding Lyapunov Functions 1

Lecture 7: Finding Lyapunov Functions 1 Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.243j (Fall 2003): DYNAMICS OF NONLINEAR SYSTEMS by A. Megretski Lecture 7: Finding Lyapunov Functions 1

More information

Calculus with Parametric Curves

Calculus with Parametric Curves Calculus with Parametric Curves Suppose f and g are differentiable functions and we want to find the tangent line at a point on the parametric curve x f(t), y g(t) where y is also a differentiable function

More information

MATH 425, PRACTICE FINAL EXAM SOLUTIONS.

MATH 425, PRACTICE FINAL EXAM SOLUTIONS. MATH 45, PRACTICE FINAL EXAM SOLUTIONS. Exercise. a Is the operator L defined on smooth functions of x, y by L u := u xx + cosu linear? b Does the answer change if we replace the operator L by the operator

More information

Exact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure

Exact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure Exact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure Belyaev Mikhail 1,2,3, Burnaev Evgeny 1,2,3, Kapushev Yermek 1,2 1 Institute for Information Transmission

More information

Quotient Rings and Field Extensions

Quotient Rings and Field Extensions Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

More information

This is the second in a series of two papers investigating the solitary wave solutions of the integrable model wave equation

This is the second in a series of two papers investigating the solitary wave solutions of the integrable model wave equation CONVERGENCE OF SOLITARY-WAVE SOLUTIONS IN A PERTURBED BI-HAMILTONIAN DYNAMICAL SYSTEM. II. COMPLEX ANALYTIC BEHAVIOR AND CONVERGENCE TO NON-ANALYTIC SOLUTIONS. Y. A. Li 1 and P. J. Olver 1, Abstract. In

More information

Cryptography Lecture 8. Digital signatures, hash functions

Cryptography Lecture 8. Digital signatures, hash functions Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting

More information

it = α + β i + γ 1 t + γ 2 t + γ 3 t +λ 1 ( i ) + λ 2 ( i ) + λ 3 ( i ) +δx i + ϵ it, it i i t t t i λ 1 λ 3 t t t i = α + β i + δx i + ϵ i i i i 12 Harrison Cleveland McKinley Roosevelt 10 8 6

More information

Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com

Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com A Dynamic Deployment Policy of Slave Controllers for Software Defined Network Yongqiang Yang and Gang Xu College of Computer

More information

ABSTRACT ALGEBRA: A STUDY GUIDE FOR BEGINNERS

ABSTRACT ALGEBRA: A STUDY GUIDE FOR BEGINNERS ABSTRACT ALGEBRA: A STUDY GUIDE FOR BEGINNERS John A. Beachy Northern Illinois University 2014 ii J.A.Beachy This is a supplement to Abstract Algebra, Third Edition by John A. Beachy and William D. Blair

More information

Midterm Solutions. mvr = ω f (I wheel + I bullet ) = ω f 2 MR2 + mr 2 ) ω f = v R. 1 + M 2m

Midterm Solutions. mvr = ω f (I wheel + I bullet ) = ω f 2 MR2 + mr 2 ) ω f = v R. 1 + M 2m Midterm Solutions I) A bullet of mass m moving at horizontal velocity v strikes and sticks to the rim of a wheel a solid disc) of mass M, radius R, anchored at its center but free to rotate i) Which of

More information

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation MATHEMATICAL ENGINEERING TECHNICAL REPORTS The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation Shinji IMAHORI, Mutsunori YAGIURA METR 2007 53 September 2007 DEPARTMENT

More information

Trigonometric Functions and Equations

Trigonometric Functions and Equations Contents Trigonometric Functions and Equations Lesson 1 Reasoning with Trigonometric Functions Investigations 1 Proving Trigonometric Identities... 271 2 Sum and Difference Identities... 276 3 Extending

More information

Sorting revisited. Build the binary search tree: O(n^2) Traverse the binary tree: O(n) Total: O(n^2) + O(n) = O(n^2)

Sorting revisited. Build the binary search tree: O(n^2) Traverse the binary tree: O(n) Total: O(n^2) + O(n) = O(n^2) Sorting revisited How did we use a binary search tree to sort an array of elements? Tree Sort Algorithm Given: An array of elements to sort 1. Build a binary search tree out of the elements 2. Traverse

More information

MATH 4552 Cubic equations and Cardano s formulae

MATH 4552 Cubic equations and Cardano s formulae MATH 455 Cubic equations and Cardano s formulae Consider a cubic equation with the unknown z and fixed complex coefficients a, b, c, d (where a 0): (1) az 3 + bz + cz + d = 0. To solve (1), it is convenient

More information

1.3. DOT PRODUCT 19. 6. If θ is the angle (between 0 and π) between two non-zero vectors u and v,

1.3. DOT PRODUCT 19. 6. If θ is the angle (between 0 and π) between two non-zero vectors u and v, 1.3. DOT PRODUCT 19 1.3 Dot Product 1.3.1 Definitions and Properties The dot product is the first way to multiply two vectors. The definition we will give below may appear arbitrary. But it is not. It

More information

Nonlinear Algebraic Equations. Lectures INF2320 p. 1/88

Nonlinear Algebraic Equations. Lectures INF2320 p. 1/88 Nonlinear Algebraic Equations Lectures INF2320 p. 1/88 Lectures INF2320 p. 2/88 Nonlinear algebraic equations When solving the system u (t) = g(u), u(0) = u 0, (1) with an implicit Euler scheme we have

More information

R 2 -type Curves for Dynamic Predictions from Joint Longitudinal-Survival Models

R 2 -type Curves for Dynamic Predictions from Joint Longitudinal-Survival Models Faculty of Health Sciences R 2 -type Curves for Dynamic Predictions from Joint Longitudinal-Survival Models Inference & application to prediction of kidney graft failure Paul Blanche joint work with M-C.

More information