Higher order nonlinearity of some cryptographic functions
|
|
- Ἀρέθουσα Λαμέρας
- 7 χρόνια πριν
- Προβολές:
Transcript
1 International Journal of Computational and Applied Mathematics. ISSN Volume 1, Number (017), pp Research India Publications Higher order nonlinearity of some cryptographic functions Deep Singh 1 and Amit Paul Department of Mathematics, Central University of Jammu, Samba, India. Abstract The security of various cryptosystems is strongly related to the higher order nonlinearity of cryptographic functions. This paper investigates some cryptographic functions with good nd and 4th order nonlinearities. Firstly, we tighten the lower bounds on nd order nonlinearity for the function φ λ (u) = Tr1 n (λup ) with p = s + s + 1,λ F s and n = 7s. Further, we give lower bounds for 4th order nonlinearity of 10-variable partial spreads: φ(u) = Tr 10 1 (λu 10 1 ), λ F 10. AMS subject classification: Keywords: Boolean functions, higher-order nonlinearity, trace functions, Kasami functions, Walsh-Hadamard transform. 1. Introduction Boolean functions are considered to be the building blocks in the design of several symmetric key cryptosystems. Let φ : F n F be a Boolean function on n-unknowns. The rth order nonlinearity nl r (φ), 0<r n of φ is the minimum Hamming distance of φ from the functions of degree r (when r = 1, it becomes nl(φ), the first order nonlinearity). The collection of different values of nl r (φ) for 1 r n 1 is nonlinearity profile for φ. The rth order nonlinearity nl r (φ) is a natural generalization of first order nonlinearity of φ which is important for prevention of affine approximation attacks [1, 1, 13]. The best upper bound on nl r (φ) in [6] is asymptotically equivalent to 15 nl r (φ) = n 1 (1 + ) r n + O(n r ). 1 corresponding author
2 D. Singh and A. Paul For rth order nonlinearity (r > 1) of Boolean functions, we do not have an algorithm unlike the first order nonlinearity. The best algorithm presented in [8] for the case r = for n 11 and up to n = 13 for some functions. Cryptographer feels that there is a need to obtain theoretical bounds of higher order nonlinearities of Boolean functions which are satisfied for all values of n. The rth order bent functions with lower bound n r 3 (r + 5) are presented in [13]. Carlet et al. [5] in 006 derived the lower bounds on rth order nonlinearities of Boolean functions by means of algebraic immunity, the bounds were further improved by Carlet [3]. In [4], Carlet presented recursive approach for rth order nonlinearity. He obtained lower bounds of nonlinearity profiles for the Kasami functions, Welch functions, inverse functions. Using the Carlet s recursive approach various authors [11, 14, 18, 0] have obtained the bounds on the second order nonlinearities of some functions. In this article, we deduce lower bounds on nd order nonlinearity of functions φ λ (u) = Tr1 n (λup ) with p = s + s + 1, λ F s and n = 7s. Further, we obtain lower bounds on 4th order nonlinearity of 10-variable monomial partial spreads: φ(u) = Tr (λu 1 ), λ F 10.. Preliminaries Let F n be the n degree extension field of F. The set of all units of F n is denoted by F n. A function φ : F n F is called n-variable Boolean function. Suppose B n is the collection of all Boolean functions such that cardinality B n = n. The support of φ B n is defined as supp(φ) ={u F n : φ(u) = 1}. The Hamming weight of φ B n is defined as wt(φ) = supp(φ). The Hamming distance between two Boolean function h, κ B n is d(h, κ) = {α F n : h(α) = κ(α)}. The algebraic normal form of φ B n is φ(u 1,u,...,u n ) = α J u j, j J J {1,,...,n} where α J F and the terms j J u j are monomials. The maximum degree of the monomial with nonzero coefficient is algebraic degree of φ. For any subfield F t of F n(obviously t n), the function the function Trt n : F n F t defined by Trt n (u) = u + ut + u t + +u (n 1)t is called a trace function. For t = 1, Tr1 n (u) = u + u + u + +u n 1 is absolute trace function. The derivative of φ B n along α F n is given by D α φ(u) = φ(u) + φ(u+ α) for all u F n. If W = v 1,...,v m is a t-dimensional subspace in F n then D W φ(u) = D v1 D vm φ(u), for all u F n is t-th order derivative of φ along W. The Walsh Hadamard Transform of φ B n is defined as W φ (α) = ( 1) φ(u)+trn 1 (αu), α F n u F n
3 Higher order nonlinearity of some cryptographic functions 3 The sequence of Walsh coefficients of φ is Walsh Hadamard spectrum (WHS) of φ. The minimum Hamming distance of φ B n from affine functions is nonlinearity of φ given as nl(φ) = n 1 1 max W φ (α). α F n Parseval s identity Wφ (α) = n, implies that nl(φ) n 1 n 1. The α F n function with maximum possible nonlinearity is called bent function [17] and exists only for n-even. Rothaus [17] in 1976 proved that for even n maximum possible nonlinearity of n-variable Boolean functions is n 1 n 1. Let W be a vector space of dimension n over F q, a field of characteristic. A map Q : W F q is a quadratic form on W if 1. Q(mu) = m Q(u) m F q, u W.. B(u, v) = Q(u) + Q(v) + Q(0) + Q(u + v) is bilinear on W. The kernel of B(u, v) denoted by E Q is the subspace of W and is defined as E Q ={u W : B(u, v) = 0 v W}. Lemma.1. [] Suppose W be a vector space of dimension n over F q, a field of characteristic. For a quadratic form Q on W, the dimension of both W and kernel of B(u, v) possess same parity. Lemma.. [] Suppose φ B n is quadratic. The kernel E φ is E φ ={u F n : D α φ = constant}. Lemma.3. [16] If φ B n is quadratic, then the WHT of φ is only linked with the kernel of φ. Lemma.4. [4] Suppose r<nand φ B n, then nl r (φ) 1 max nl r 1 (D α φ). α F n Lemma.5. [4] Suppose r<nand φ B n, then nl r (φ) n 1 1 n nl r 1 (D α φ). α F n In terms of higher-order derivative, for every positive integer l<r. nl r (φ) n 1 1 n nl r l (D α1 D αl φ). α 1 F n α F n α l F n
4 4 D. Singh and A. Paul Lemma.6. [4] Suppose r < n and φ B n. Also suppose for some nonnegative integers L and θ, and for 0 = α F n, we have Then nl r 1 (D α φ) n 1 L θ. (.1) nl r (φ) n 1 1 ( n 1)L θ+1 + n n 1 L n+θ 1. (.) 3. Main results This section presents lower bounds on higher order nonlinearities of some cryptographic functions. First, we provide bounds on nd order nonlinearities, further, in Subsection 3.1, we discuss 4th order nonlinearities. Theorem 3.1. Let φ λ (u) = Tr1 n (λup ) with p = s + s + 1, n= 7s, λ F s. Then dimension of kernel of bilinear form of D α (φ λ (u)) is either s or 5s. Proof. The derivative D α (φ λ (u)) with respect to α F n is D α φ λ (u) = φ λ (u + α) + φ λ (u) = Tr1 n (λ(u + α)s + s +1 ) + Tr1 n (λus + s +1 ) = Tr1 n (λ(αus + s + α s u s +1 + α s u s +1 + α s +1 u s +α s +1 u s + α s + s u + α s + s +1 )) quadratic. The WHS of D α φ λ (u) is equivalent to that of g λ (u), where g λ (u) is obtained by eliminating linear and constant terms in D α φ λ (u) as g λ (u) can also be written as g λ (u) = Tr n 1 (λ(αus + s + α s u s +1 + α s u s +1 )), g λ (u) = Tr n 1 (λαs u s +1 + (λ 6s α 6s + λα s )u s +1 ). Since s + 1 and s + 1 do not belongs to same cyclotomic coset. So, g λ (u) = 0 for any α F n. Since g λ(u) is a quadratic function. In the view of Lemma. and.3, we collect all those β s for which D β (g λ (u)) is constant. Now, D β (g λ (u)) = g λ (u + β) + g λ (u) = Tr1 n (λ(α(u + β)s + s + α s (u + β) s +1 + α s (u + β) s +1 )) +Tr1 n (λ(αus + s + α s u s +1 + α s u s +1 )) = Tr1 n (λ((αβs + α s β)u s + (αβ s + α s β)u s +(α s β s + α s β s )u)) +Tr n 1 (λ(αβs + s + α s β s +1 + α s β s +1 )).
5 Higher order nonlinearity of some cryptographic functions 5 Since u, α, β F n and λ F s. Using un = u, α n = α, β n = β,λ n = λ, we get D β (g λ (u)) = Tr n 1 (λu((α5s + α s )β 6s + α 6s β 5s + α s β s + (α 6s + α s )β s )) +Tr n 1 (λ(αβs + s + α s β s +1 + α s β s +1 )). Clearly, D β (g λ (u)) is equal to the constant if and only if (α 5s + α s )β 6s + α 6s β 5s + α s β s + (α 6s + α s )β s = 0. Raising power s th, we have (α 4s + α)β 5s + α 5s β 4s + αβ s + (α 5s + α s )β = 0, (3.1) n which is a s -polynomial. The polynomial L(u) = a i x qi with a i F q m,m>1is q polynomial over F q m. Let i=0 M(β) = (α 4s + α)β 5s + α 5s β 4s + αβ s + (α 5s + α s )β. The dimension of kernel of M(β) is lr, l = 0, 1, 4, 5. Now, quadratic form from F q 5 to F q (q = s ) is R(u) = Tr L E (λ(αus + s + α s u s +1 + α s u s +1 )), where L = F 7s and E = F s The roots of M(u) forms kernel of R(u). In fact, kernel of R(u) is the collection of β s where B(u) = 0 u with Since D b (G λ (x)) = Tr E F (B(u)),weget B(u) = R(u) + R(β) + R(u + β). B(u) = Tr L E (u(m(β))). Thus, R(u) and M(u) have same kernel. According to Lemma.1, R(u) has dimension of its kernel either 1 or 5 which implies either s or 5s is one of the root of M(u). Hence the dimension of the kernel of bilinear form of D α (φ λ (u)) is either s or 5s. Theorem 3.. Let φ λ (u) = Tr1 n (λup ) with p = s + s + 1, λ F s and n = 7s. Then nl (φ λ (u)) 7s 1 s 1 s ( 6s + 3s 1). Proof. From Theorem 3.1, dimension k of kernel of bilinear of D a (φ λ (u)) is either s or 5s. The nonlinearity of D α (φ λ (u)) i.e., nl(d α (φ λ (u))) is either n 1 1 n+s or n 1 1 n+5s. Therefore, we have max nl(d α (φ λ (u))) = n 1 1 α F n n+s.
6 6 D. Singh and A. Paul Now, Lemma.5 implies that nl (φ λ (u)) n 1 1 n α F n nl(d α φ λ (u)) = 7s s ( 7s s )( 7s 1 4s 1 ) = 7s 1 s 1 s ( 6s + 3s 1). Hence the result. Now with the help of Lemma.6, we improve the above results in the following theorem. Theorem 3.3. Let φ λ (u) = Tr1 n (λup ) with p = s + s + 1, λ F s and n = 7s. Then nl (φ λ (u)) 7s 1 s 4 4. Proof. From Theorem 3., we have max nl(d α (φ λ (u))) = n 1 1 α F n n+s. On comparing the above equation with equation (.1), we get L = 1 and θ = n + s. Thus, by (.), we obtain nl (φ λ (u)) n 1 3n+s 4 4 = 7s 1 s Lower bounds of 4th-order nonlinearity for monomial partial spread on 10-variables The monomial functions of the form f λ (x) = Tr n 1 (λx n 1 ), where λ F n are called monomial partial spreads on n-variables. For some values of λ these functions becomes PS type bent functions. For details we may refer to [, 7]. Dillon [7] has introduced an important class of Boolean functions called partial spreads. Suppose f B n,n= t. Consider a set {H i : i = 1,...,M} of subspaces of F n of dimension t, with H i H j = {0}, when i = j. The function f with is called a partial spreads (PS). supp(f ) = M i=0 H i
7 Higher order nonlinearity of some cryptographic functions 7 In the following theorem, we obtain lower bound for 4th order nonlinearity of monomial partial spreads on 10-variables: φ(u) = Tr 10 1 (λu 10 1 ) = Tr n 1 (λu31 ). Theorem 3.4. Let φ(u) = Tr (λu 1 ), for all u F n and λ F n. Then, we have nl 4 (φ λ ) 43. Proof. The derivative D α φ λ of φ λ along α F n is D α φ λ (u) = φ λ (u + α) + φ λ (u) = Tr1 n (λ(u + α) ) + Tr1 n (λu ) = Tr1 n (λ(αu α 4 u α 3 u α u α u )) + c(u), where c(u) is cubic function. The second derivative D β D α φ λ of φ λ along β F n (α = β) is D β D α φ λ (u) = φ λ (u + α + β) + φ λ (u + α) + φ λ (u + β) + φ λ (u) = Tr1 n [λ((αβ + βα )u (αβ 4 + βα 4 )u (αβ 3 + βα 3 )u (αβ + βα )u (α β + α β )u (α 3 β + α β 3 )u (α 3 β + α β 3 )u (α 4 β + α β 4 )u (α 4 β k + α k β 4 )u (α 4 β 3 + α 3 β 4 )u ++1 )]+q(u), where q(u) is a quadratic function. The third derivative D γ (D β D α φ λ ) of φ λ along γ F n (α = γ, β = γ)is D γ (D β D α φ λ (u)) = φ λ (u + β + α + γ)+ φ λ (u + β + α) + φ λ (u + α + γ)+ φ λ (u + α) +φ λ (u + β + γ)+ φ λ (u + β) + φ λ (u + γ)+ φ λ (u) = Tr n 1 [λ((αβ γ + βα γ + αβ γ + βα γ + α β γ + α β γ)u (αβ 4 γ 3 + βα γ 3 + αβ 3 γ 4 + βα 3 γ + α 3 β γ + α β 3 γ)u 4 + +(αβ 3 γ + α 3 βγ + αβ γ 3 + α βγ 3 + α 3 β γ + α β 3 γ)u 4 + +(αβ γ 4 + α βγ 4 + αβ 4 γ + α 4 βγ + α 4 β γ + α β 4 γ)u 3 + +(αβ γ 4 + α βγ 4 + αβ 4 γ + α 4 βγ + α 4 β γ + α β 4 γ)u 3 + +(αβ 4 γ 3 + α 4 βγ 3 + αβ 3 γ 4 + α 3 βγ 4 + α 4 β 3 γ + α 3 β 4 γ)u + +(α β γ 3 + α β γ 3 + α 3 β γ + α β 3 γ + α 3 β γ +α β 3 γ )u (α β γ 4 + α β γ 4 + α 4 β γ + α β 4 γ +α 4 β γ + α β 4 γ )u (α 3 β γ 4 + α β 3 γ 4 + α 4 β γ 3 +α β 4 γ 3 + α 4 β 3 γ + α 3 β 4 γ )u +1 + (α 3 β γ 4 + α β 3 γ 4 +α 4 β γ 3 + α β 4 γ 3 + α 4 β 3 γ + α 3 β 4 γ )u +1 )]+l(u).
8 8 D. Singh and A. Paul Since D γ (D β D α φ λ (u)) is quadratic. The WHS of D γ (D β D α φ λ ) is equivalent to the WHS of h λ (u) with h λ (u) = Tr n 1 [λ((αβ γ + βα γ + αβ γ + βα γ + α β γ + α β γ)u (αβ γ 3 + βα γ 3 + αβ 3 γ + βα 3 γ + α 3 β γ + α β 3 γ)u 4 + +(αβ 3 γ + α 3 βγ + αβ γ 3 + α βγ 3 + α 3 β γ + α β 3 γ)u 4 + +(αβ γ 4 + α βγ 4 + αβ 4 γ + α 4 βγ + α 4 β γ + α β 4 γ)u 3 + +(αβ γ 4 + α βγ 4 + αβ 4 γ + α 4 βγ + α 4 β γ + α β 4 γ)u 3 + +(αβ 4 γ 3 + α 4 βγ 3 + αβ 3 γ 4 + α 3 βγ 4 + α 4 β 3 γ + α 3 β 4 γ)u + +(α β γ 3 + α β γ 3 + α 3 β γ + α β 3 γ + α 3 β γ + α β 3 γ )u (α β γ 4 + α β γ 4 + α 4 β γ + α β 4 γ + α 4 β γ + α β 4 γ )u (α 3 β γ 4 + α β 3 γ 4 + α 4 β γ 3 + α β 4 γ 3 + α 4 β 3 γ + α 3 β 4 γ )u +1 +(α 3 β γ 4 + α β 3 γ 4 + α 4 β γ 3 + α β 4 γ 3 + α 4 β 3 γ + α 3 β 4 γ )u +1 )]. Let E hλ ={u F ( n ) : B(u, y) = 0 with y F n}, where B(u, y) is the bilinear form of h λ is given by B(u, y) = h λ (0) + h λ (u) + h λ (u) + h λ (u + y) B(u, y) = Tr1 n [λ(y4 {R 1 u 3 + R u + R 3 u + R 7 u}+y 3 {R 1 u 4 + R 4 u where +R 5 u + R 8 u}+y {R u 4 + R 4 u 3 + R 6 u + R 9 u}+y {R 3 u 4 +R 5 u 3 + R 6 u + R 10 u}+y{r 7 u 4 + R 8 u 3 + R 9 u + R 10 u })] = Tr1 n (yp (u)), R 1 = αβ γ + βα γ + αβ γ + βα γ + α β γ + α β γ R = αβ γ 3 + βα γ 3 + αβ 3 γ + βα 3 γ + α 3 β γ + α β 3 γ R 3 = αβ 3 γ + α 3 βγ + αβ γ 3 + α βγ 3 + α 3 β γ + α β 3 γ R 4 = αβ γ 4 + α βγ 4 + αβ 4 γ + α 4 βγ + α 4 β γ + α β 4 γ R 5 = αβ γ 4 + α βγ 4 + αβ 4 γ + α 4 βγ + α 4 β γ + α β 4 γ R 6 = αβ 4 γ 3 + α 4 βγ 3 + αβ 3 γ 4 + α 3 βγ 4 + α 4 β 3 γ + α 3 β 4 γ R 7 = α β γ 3 + α β γ 3 + α 3 β γ + α β 3 γ + α 3 β γ + α β 3 γ R 8 = α β γ 4 + α β γ 4 + α 4 β γ + α β 4 γ + α 4 β γ + α β 4 γ R 9 = α 3 β γ 4 + α β 3 γ 4 + α 4 β γ 3 + α β 4 γ 3 + α 4 β 3 γ + α 3 β 4 γ R 10 = α 3 β γ 4 + α β 3 γ 4 + α 4 β γ 3 + α β 4 γ 3 + α 4 β 3 γ + α 3 β 4 γ and P (u) = (λr 1 u 3 + λr u + λr 3 u + λr 7 u) n 4 +(λr 1 u 4 + λr 4 u + λr 5 u + λr 8 u) n 3 +(λr u 4 + λr 4 u 3 + λr 6 u + λr 9 u) n +(λr 3 u 4 + λr 5 u 3 + λr 6 u + λr 10 u) n 1 +(λr 7 u 4 + λr 8 u 3 + λr 9 u + R 10 u ).
9 Higher order nonlinearity of some cryptographic functions 9 Let L λ (u) = (P (u)) 4 = λ(r 1 x 3 + R x + R 3 x + R 7 x) + λ [R 1 x5 + R 4 x3 + R 5 x + R 8 x ] +λ [R x6 + R 4 x5 + R 6 x3 + R 9 x ]+λ 3 [R 3 3 x7 + R 3 5 x6 + R 3 6 x5 +R 3 10 x3 ]+λ 4 [R 4 7 x8 + R 7 8 x7 + R 7 9 x6 + R 7 10 x5 ]. (3.) L (λ) (u) is a linearized polynomial in u. The degree of L (λ) (u) is at most 8, this implies that k 6. The Walsh transform of D γ (D β D α φ λ ) at λ F 10 is Therefore, the nonlinearity of D β D α φ λ is W Dγ (D β D α φ λ )(λ) = 10+k nl(d γ (D β D α φ λ )) = 9 1 max W Dγ (D β D α φ λ )(λ) λ F = 56. From Lemma.4, we conclude that the 4th order nonlinearity of φ λ is Hence, nl 4 (φ λ ) 1 3 max nl(d α (D β D α φ λ )) α,β,γ F n nl 4 (φ λ ) 3. (3.3) Also, nl(d γ (D β D α φ λ )) 56, for all α, β, γ F 10 (α = β = γ).so there is a scope to improve the bound obtained in (3.3). Lemma.5 implies that nl 4 (φ λ ) nl(d β D α φ λ ) γ F 10 β F 10 α F 10 = 9 1 ( 10 1) ( 10 ) 0 ( 10 3).56 = = 43.
10 10 D. Singh and A. Paul 4. Conclusion The comparison of the results obtained in Theorem 3.3 with the results given by Iwatakurosawa [13], Singh [18] and general bounds i.e., nl (φ) n 3 [4] is provided in Table 1. It is observed that the results given by us in Theorem 3.3 are better than those given in [4, 13, 18]. Table 1: Comparison of results in Theorem 3.3 with the results obtained in [4, 13, 18] for n = 7s n,s 14, 1,3 8,4 35,5 4,6 Bounds in Theorem Bounds by Singh [18] Bounds by Iwata-kurosawa [13] General bounds by Carlet [4] Since there is always need of functions having good cryptographic properties, in particular, functions with good higher order nonlinearities are employed to prevent higher order approximation attacks. Therefore, we expect that the results in this paper will help in selecting good cryptographic functions. Acknowledgement The second author thanks to UGC, India for providing financial support through Rajiv Gandhi National Fellowship. References [1] Biham, E., and Shamir, A., 1991, Differential cryptyanalysis of DES-like cryptosystems, In Advances in cryptography CRYPTO 1990, Lecture Notes in Computer Science, Springer-Verlag, Vol. 537, pp. 1. [] Canteaut, A., Charpin, P., and Kyureghyan, G., 008, A new class of monomial bent functions, Finite Fields and Their Applications, Vol. 14, pp [3] Carlet, C., 006 On the higher order nonlinearities of algebraic immune functions, In CRYPTO 006, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4117, pp [4] Carlet, C., 008, Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications, IEEE Trans. Inform. Theory, Vol. 54 (3), pp [5] Carlet, C., Dalai, D. K., Gupta, K. C., and Maitra, S., 006, Algebraic immunity for cryptographically significant Boolean functions: Analysis and Construction, IEEE Trans. Inform. Theory, Vol. 5 (7), pp
11 Higher order nonlinearity of some cryptographic functions 11 [6] Caret, C., and Mesnager, S., 007, Improving the upper bounds on the covering radii of binary Reed-Muller codes, IEEE Trans. Inform Theory, Vol. 53 (1), pp [7] Dillon, J. F., 1974 Elementary Hadamard Difference sets, PhD Thesis, University of Maryland. [8] Fourquet, R. and Tavernier, C., 008, An improved list decoding algorithm for the second order ReedMuller codes and its applications, Des. Codes Cryptogr., Vol. 49, pp [9] Gode, R., and Gangopadhyay, S., On second order nonlinearities of cubic monomial Boolean functions, In cryptography eprint Archive, org/009/50.pdf. [10] Gode R. and Gangopadhyay S., 010, Third-order nonlinearities of a subclass of Kasami functions, Cryptography and Communications - Discrete Structures, Boolean functions and Sequences, Vol., pp [11] Gode, R. and Gangopadhyay, S., 010, On higher-order nonlinearity of monomial partial-spreads type Boolean functions, Journal of Combinatorics, Information and System Sciences, Vol. 35, pp [1] Golić, J., 1996, Fast low order approximation of cryptographic functions, In proceedings of the EUROCRYPT 1996, Lecture Notes in Computer Science, Springer- Verlag, Vol. 1070, pp [13] Iwata, T., and kurosawa, K., 1999, Probabilistic higher order differential attack and higher order bent functions, In Proceedings of the ASIACRYPT 1999, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1716, pp [14] Li, X., Hu, Y. and Gao, J., 011, Lower bounds on the second-order nonlinearity of Boolean functions, Int l. Journal of Found. of Computer Science, Vol. (6), pp [15] Lidl, R. and Niederreiter, H., 1994, Introduction to Finite Fields and Their Applications, Cambridge University Press. [16] MacWilliams, F. J., and Sloane, N. J. A., 1977, The Theory of Error Correcting Codes, North-Holland, Amsterdam. [17] Rothaus, O. S., 1976, On bent functions, J. Combi. Theory, Ser. A, Vol. 0, pp [18] Singh, D., 011, Second-order nonlinearities of some classes of cubic Boolean functions based on secondary constructions, International Journal of Computer Science and Information Technologies, Vol. (), pp [19] Sun, G. and Wu, C., 009, The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity, Information Sciences, Vol. 179(3), pp [0] Sun, G. and Wu C., 011, The lower bound on the second order nonlinearity of a class of Boolean functions with high nonlinearity, AAECC, Vol. (1), pp
EE512: Error Control Coding
EE512: Error Control Coding Solution for Assignment on Finite Fields February 16, 2007 1. (a) Addition and Multiplication tables for GF (5) and GF (7) are shown in Tables 1 and 2. + 0 1 2 3 4 0 0 1 2 3
Homomorphism in Intuitionistic Fuzzy Automata
International Journal of Fuzzy Mathematics Systems. ISSN 2248-9940 Volume 3, Number 1 (2013), pp. 39-45 Research India Publications http://www.ripublication.com/ijfms.htm Homomorphism in Intuitionistic
2 Composition. Invertible Mappings
Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan Composition. Invertible Mappings In this section we discuss two procedures for creating new mappings from old ones, namely,
Congruence Classes of Invertible Matrices of Order 3 over F 2
International Journal of Algebra, Vol. 8, 24, no. 5, 239-246 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.2988/ija.24.422 Congruence Classes of Invertible Matrices of Order 3 over F 2 Ligong An and
SCITECH Volume 13, Issue 2 RESEARCH ORGANISATION Published online: March 29, 2018
Journal of rogressive Research in Mathematics(JRM) ISSN: 2395-028 SCITECH Volume 3, Issue 2 RESEARCH ORGANISATION ublished online: March 29, 208 Journal of rogressive Research in Mathematics www.scitecresearch.com/journals
CHAPTER 25 SOLVING EQUATIONS BY ITERATIVE METHODS
CHAPTER 5 SOLVING EQUATIONS BY ITERATIVE METHODS EXERCISE 104 Page 8 1. Find the positive root of the equation x + 3x 5 = 0, correct to 3 significant figures, using the method of bisection. Let f(x) =
Reminders: linear functions
Reminders: linear functions Let U and V be vector spaces over the same field F. Definition A function f : U V is linear if for every u 1, u 2 U, f (u 1 + u 2 ) = f (u 1 ) + f (u 2 ), and for every u U
Coefficient Inequalities for a New Subclass of K-uniformly Convex Functions
International Journal of Computational Science and Mathematics. ISSN 0974-89 Volume, Number (00), pp. 67--75 International Research Publication House http://www.irphouse.com Coefficient Inequalities for
Second Order Partial Differential Equations
Chapter 7 Second Order Partial Differential Equations 7.1 Introduction A second order linear PDE in two independent variables (x, y Ω can be written as A(x, y u x + B(x, y u xy + C(x, y u u u + D(x, y
Homework 3 Solutions
Homework 3 Solutions Igor Yanovsky (Math 151A TA) Problem 1: Compute the absolute error and relative error in approximations of p by p. (Use calculator!) a) p π, p 22/7; b) p π, p 3.141. Solution: For
Ordinal Arithmetic: Addition, Multiplication, Exponentiation and Limit
Ordinal Arithmetic: Addition, Multiplication, Exponentiation and Limit Ting Zhang Stanford May 11, 2001 Stanford, 5/11/2001 1 Outline Ordinal Classification Ordinal Addition Ordinal Multiplication Ordinal
Matrices and Determinants
Matrices and Determinants SUBJECTIVE PROBLEMS: Q 1. For what value of k do the following system of equations possess a non-trivial (i.e., not all zero) solution over the set of rationals Q? x + ky + 3z
Fractional Colorings and Zykov Products of graphs
Fractional Colorings and Zykov Products of graphs Who? Nichole Schimanski When? July 27, 2011 Graphs A graph, G, consists of a vertex set, V (G), and an edge set, E(G). V (G) is any finite set E(G) is
Commutative Monoids in Intuitionistic Fuzzy Sets
Commutative Monoids in Intuitionistic Fuzzy Sets S K Mala #1, Dr. MM Shanmugapriya *2 1 PhD Scholar in Mathematics, Karpagam University, Coimbatore, Tamilnadu- 641021 Assistant Professor of Mathematics,
Partial Differential Equations in Biology The boundary element method. March 26, 2013
The boundary element method March 26, 203 Introduction and notation The problem: u = f in D R d u = ϕ in Γ D u n = g on Γ N, where D = Γ D Γ N, Γ D Γ N = (possibly, Γ D = [Neumann problem] or Γ N = [Dirichlet
Section 8.3 Trigonometric Equations
99 Section 8. Trigonometric Equations Objective 1: Solve Equations Involving One Trigonometric Function. In this section and the next, we will exple how to solving equations involving trigonometric functions.
k A = [k, k]( )[a 1, a 2 ] = [ka 1,ka 2 ] 4For the division of two intervals of confidence in R +
Chapter 3. Fuzzy Arithmetic 3- Fuzzy arithmetic: ~Addition(+) and subtraction (-): Let A = [a and B = [b, b in R If x [a and y [b, b than x+y [a +b +b Symbolically,we write A(+)B = [a (+)[b, b = [a +b
HOMEWORK 4 = G. In order to plot the stress versus the stretch we define a normalized stretch:
HOMEWORK 4 Problem a For the fast loading case, we want to derive the relationship between P zz and λ z. We know that the nominal stress is expressed as: P zz = ψ λ z where λ z = λ λ z. Therefore, applying
Statistical Inference I Locally most powerful tests
Statistical Inference I Locally most powerful tests Shirsendu Mukherjee Department of Statistics, Asutosh College, Kolkata, India. shirsendu st@yahoo.co.in So far we have treated the testing of one-sided
The Simply Typed Lambda Calculus
Type Inference Instead of writing type annotations, can we use an algorithm to infer what the type annotations should be? That depends on the type system. For simple type systems the answer is yes, and
Inverse trigonometric functions & General Solution of Trigonometric Equations. ------------------ ----------------------------- -----------------
Inverse trigonometric functions & General Solution of Trigonometric Equations. 1. Sin ( ) = a) b) c) d) Ans b. Solution : Method 1. Ans a: 17 > 1 a) is rejected. w.k.t Sin ( sin ) = d is rejected. If sin
C.S. 430 Assignment 6, Sample Solutions
C.S. 430 Assignment 6, Sample Solutions Paul Liu November 15, 2007 Note that these are sample solutions only; in many cases there were many acceptable answers. 1 Reynolds Problem 10.1 1.1 Normal-order
6.3 Forecasting ARMA processes
122 CHAPTER 6. ARMA MODELS 6.3 Forecasting ARMA processes The purpose of forecasting is to predict future values of a TS based on the data collected to the present. In this section we will discuss a linear
New bounds for spherical two-distance sets and equiangular lines
New bounds for spherical two-distance sets and equiangular lines Michigan State University Oct 8-31, 016 Anhui University Definition If X = {x 1, x,, x N } S n 1 (unit sphere in R n ) and x i, x j = a
Tridiagonal matrices. Gérard MEURANT. October, 2008
Tridiagonal matrices Gérard MEURANT October, 2008 1 Similarity 2 Cholesy factorizations 3 Eigenvalues 4 Inverse Similarity Let α 1 ω 1 β 1 α 2 ω 2 T =......... β 2 α 1 ω 1 β 1 α and β i ω i, i = 1,...,
Chapter 6: Systems of Linear Differential. be continuous functions on the interval
Chapter 6: Systems of Linear Differential Equations Let a (t), a 2 (t),..., a nn (t), b (t), b 2 (t),..., b n (t) be continuous functions on the interval I. The system of n first-order differential equations
ST5224: Advanced Statistical Theory II
ST5224: Advanced Statistical Theory II 2014/2015: Semester II Tutorial 7 1. Let X be a sample from a population P and consider testing hypotheses H 0 : P = P 0 versus H 1 : P = P 1, where P j is a known
Απόκριση σε Μοναδιαία Ωστική Δύναμη (Unit Impulse) Απόκριση σε Δυνάμεις Αυθαίρετα Μεταβαλλόμενες με το Χρόνο. Απόστολος Σ.
Απόκριση σε Δυνάμεις Αυθαίρετα Μεταβαλλόμενες με το Χρόνο The time integral of a force is referred to as impulse, is determined by and is obtained from: Newton s 2 nd Law of motion states that the action
Lecture 15 - Root System Axiomatics
Lecture 15 - Root System Axiomatics Nov 1, 01 In this lecture we examine root systems from an axiomatic point of view. 1 Reflections If v R n, then it determines a hyperplane, denoted P v, through the
Every set of first-order formulas is equivalent to an independent set
Every set of first-order formulas is equivalent to an independent set May 6, 2008 Abstract A set of first-order formulas, whatever the cardinality of the set of symbols, is equivalent to an independent
Example Sheet 3 Solutions
Example Sheet 3 Solutions. i Regular Sturm-Liouville. ii Singular Sturm-Liouville mixed boundary conditions. iii Not Sturm-Liouville ODE is not in Sturm-Liouville form. iv Regular Sturm-Liouville note
A Note on Intuitionistic Fuzzy. Equivalence Relation
International Mathematical Forum, 5, 2010, no. 67, 3301-3307 A Note on Intuitionistic Fuzzy Equivalence Relation D. K. Basnet Dept. of Mathematics, Assam University Silchar-788011, Assam, India dkbasnet@rediffmail.com
Nowhere-zero flows Let be a digraph, Abelian group. A Γ-circulation in is a mapping : such that, where, and : tail in X, head in
Nowhere-zero flows Let be a digraph, Abelian group. A Γ-circulation in is a mapping : such that, where, and : tail in X, head in : tail in X, head in A nowhere-zero Γ-flow is a Γ-circulation such that
SCHOOL OF MATHEMATICAL SCIENCES G11LMA Linear Mathematics Examination Solutions
SCHOOL OF MATHEMATICAL SCIENCES GLMA Linear Mathematics 00- Examination Solutions. (a) i. ( + 5i)( i) = (6 + 5) + (5 )i = + i. Real part is, imaginary part is. (b) ii. + 5i i ( + 5i)( + i) = ( i)( + i)
ES440/ES911: CFD. Chapter 5. Solution of Linear Equation Systems
ES440/ES911: CFD Chapter 5. Solution of Linear Equation Systems Dr Yongmann M. Chung http://www.eng.warwick.ac.uk/staff/ymc/es440.html Y.M.Chung@warwick.ac.uk School of Engineering & Centre for Scientific
2. THEORY OF EQUATIONS. PREVIOUS EAMCET Bits.
EAMCET-. THEORY OF EQUATIONS PREVIOUS EAMCET Bits. Each of the roots of the equation x 6x + 6x 5= are increased by k so that the new transformed equation does not contain term. Then k =... - 4. - Sol.
Quadratic Expressions
Quadratic Expressions. The standard form of a quadratic equation is ax + bx + c = 0 where a, b, c R and a 0. The roots of ax + bx + c = 0 are b ± b a 4ac. 3. For the equation ax +bx+c = 0, sum of the roots
Phys460.nb Solution for the t-dependent Schrodinger s equation How did we find the solution? (not required)
Phys460.nb 81 ψ n (t) is still the (same) eigenstate of H But for tdependent H. The answer is NO. 5.5.5. Solution for the tdependent Schrodinger s equation If we assume that at time t 0, the electron starts
Homomorphism of Intuitionistic Fuzzy Groups
International Mathematical Forum, Vol. 6, 20, no. 64, 369-378 Homomorphism o Intuitionistic Fuzz Groups P. K. Sharma Department o Mathematics, D..V. College Jalandhar Cit, Punjab, India pksharma@davjalandhar.com
Second Order RLC Filters
ECEN 60 Circuits/Electronics Spring 007-0-07 P. Mathys Second Order RLC Filters RLC Lowpass Filter A passive RLC lowpass filter (LPF) circuit is shown in the following schematic. R L C v O (t) Using phasor
SOME PROPERTIES OF FUZZY REAL NUMBERS
Sahand Communications in Mathematical Analysis (SCMA) Vol. 3 No. 1 (2016), 21-27 http://scma.maragheh.ac.ir SOME PROPERTIES OF FUZZY REAL NUMBERS BAYAZ DARABY 1 AND JAVAD JAFARI 2 Abstract. In the mathematical
4.6 Autoregressive Moving Average Model ARMA(1,1)
84 CHAPTER 4. STATIONARY TS MODELS 4.6 Autoregressive Moving Average Model ARMA(,) This section is an introduction to a wide class of models ARMA(p,q) which we will consider in more detail later in this
3.4 SUM AND DIFFERENCE FORMULAS. NOTE: cos(α+β) cos α + cos β cos(α-β) cos α -cos β
3.4 SUM AND DIFFERENCE FORMULAS Page Theorem cos(αβ cos α cos β -sin α cos(α-β cos α cos β sin α NOTE: cos(αβ cos α cos β cos(α-β cos α -cos β Proof of cos(α-β cos α cos β sin α Let s use a unit circle
On a four-dimensional hyperbolic manifold with finite volume
BULETINUL ACADEMIEI DE ŞTIINŢE A REPUBLICII MOLDOVA. MATEMATICA Numbers 2(72) 3(73), 2013, Pages 80 89 ISSN 1024 7696 On a four-dimensional hyperbolic manifold with finite volume I.S.Gutsul Abstract. In
Fourier Series. MATH 211, Calculus II. J. Robert Buchanan. Spring Department of Mathematics
Fourier Series MATH 211, Calculus II J. Robert Buchanan Department of Mathematics Spring 2018 Introduction Not all functions can be represented by Taylor series. f (k) (c) A Taylor series f (x) = (x c)
Concrete Mathematics Exercises from 30 September 2016
Concrete Mathematics Exercises from 30 September 2016 Silvio Capobianco Exercise 1.7 Let H(n) = J(n + 1) J(n). Equation (1.8) tells us that H(2n) = 2, and H(2n+1) = J(2n+2) J(2n+1) = (2J(n+1) 1) (2J(n)+1)
Lecture 2: Dirac notation and a review of linear algebra Read Sakurai chapter 1, Baym chatper 3
Lecture 2: Dirac notation and a review of linear algebra Read Sakurai chapter 1, Baym chatper 3 1 State vector space and the dual space Space of wavefunctions The space of wavefunctions is the set of all
Other Test Constructions: Likelihood Ratio & Bayes Tests
Other Test Constructions: Likelihood Ratio & Bayes Tests Side-Note: So far we have seen a few approaches for creating tests such as Neyman-Pearson Lemma ( most powerful tests of H 0 : θ = θ 0 vs H 1 :
Finite Field Problems: Solutions
Finite Field Problems: Solutions 1. Let f = x 2 +1 Z 11 [x] and let F = Z 11 [x]/(f), a field. Let Solution: F =11 2 = 121, so F = 121 1 = 120. The possible orders are the divisors of 120. Solution: The
Main source: "Discrete-time systems and computer control" by Α. ΣΚΟΔΡΑΣ ΨΗΦΙΑΚΟΣ ΕΛΕΓΧΟΣ ΔΙΑΛΕΞΗ 4 ΔΙΑΦΑΝΕΙΑ 1
Main source: "Discrete-time systems and computer control" by Α. ΣΚΟΔΡΑΣ ΨΗΦΙΑΚΟΣ ΕΛΕΓΧΟΣ ΔΙΑΛΕΞΗ 4 ΔΙΑΦΑΝΕΙΑ 1 A Brief History of Sampling Research 1915 - Edmund Taylor Whittaker (1873-1956) devised a
Jesse Maassen and Mark Lundstrom Purdue University November 25, 2013
Notes on Average Scattering imes and Hall Factors Jesse Maassen and Mar Lundstrom Purdue University November 5, 13 I. Introduction 1 II. Solution of the BE 1 III. Exercises: Woring out average scattering
( y) Partial Differential Equations
Partial Dierential Equations Linear P.D.Es. contains no owers roducts o the deendent variables / an o its derivatives can occasionall be solved. Consider eamle ( ) a (sometimes written as a ) we can integrate
The k-α-exponential Function
Int Journal of Math Analysis, Vol 7, 213, no 11, 535-542 The --Exponential Function Luciano L Luque and Rubén A Cerutti Faculty of Exact Sciences National University of Nordeste Av Libertad 554 34 Corrientes,
Section 9.2 Polar Equations and Graphs
180 Section 9. Polar Equations and Graphs In this section, we will be graphing polar equations on a polar grid. In the first few examples, we will write the polar equation in rectangular form to help identify
Approximation of distance between locations on earth given by latitude and longitude
Approximation of distance between locations on earth given by latitude and longitude Jan Behrens 2012-12-31 In this paper we shall provide a method to approximate distances between two points on earth
A Bonus-Malus System as a Markov Set-Chain. Małgorzata Niemiec Warsaw School of Economics Institute of Econometrics
A Bonus-Malus System as a Markov Set-Chain Małgorzata Niemiec Warsaw School of Economics Institute of Econometrics Contents 1. Markov set-chain 2. Model of bonus-malus system 3. Example 4. Conclusions
GÖKHAN ÇUVALCIOĞLU, KRASSIMIR T. ATANASSOV, AND SINEM TARSUSLU(YILMAZ)
IFSCOM016 1 Proceeding Book No. 1 pp. 155-161 (016) ISBN: 978-975-6900-54-3 SOME RESULTS ON S α,β AND T α,β INTUITIONISTIC FUZZY MODAL OPERATORS GÖKHAN ÇUVALCIOĞLU, KRASSIMIR T. ATANASSOV, AND SINEM TARSUSLU(YILMAZ)
Local Approximation with Kernels
Local Approximation with Kernels Thomas Hangelbroek University of Hawaii at Manoa 5th International Conference Approximation Theory, 26 work supported by: NSF DMS-43726 A cubic spline example Consider
Arithmetical applications of lagrangian interpolation. Tanguy Rivoal. Institut Fourier CNRS and Université de Grenoble 1
Arithmetical applications of lagrangian interpolation Tanguy Rivoal Institut Fourier CNRS and Université de Grenoble Conference Diophantine and Analytic Problems in Number Theory, The 00th anniversary
Uniform Convergence of Fourier Series Michael Taylor
Uniform Convergence of Fourier Series Michael Taylor Given f L 1 T 1 ), we consider the partial sums of the Fourier series of f: N 1) S N fθ) = ˆfk)e ikθ. k= N A calculation gives the Dirichlet formula
Exercises 10. Find a fundamental matrix of the given system of equations. Also find the fundamental matrix Φ(t) satisfying Φ(0) = I. 1.
Exercises 0 More exercises are available in Elementary Differential Equations. If you have a problem to solve any of them, feel free to come to office hour. Problem Find a fundamental matrix of the given
derivation of the Laplacian from rectangular to spherical coordinates
derivation of the Laplacian from rectangular to spherical coordinates swapnizzle 03-03- :5:43 We begin by recognizing the familiar conversion from rectangular to spherical coordinates (note that φ is used
Chapter 6: Systems of Linear Differential. be continuous functions on the interval
Chapter 6: Systems of Linear Differential Equations Let a (t), a 2 (t),..., a nn (t), b (t), b 2 (t),..., b n (t) be continuous functions on the interval I. The system of n first-order differential equations
Econ 2110: Fall 2008 Suggested Solutions to Problem Set 8 questions or comments to Dan Fetter 1
Eon : Fall 8 Suggested Solutions to Problem Set 8 Email questions or omments to Dan Fetter Problem. Let X be a salar with density f(x, θ) (θx + θ) [ x ] with θ. (a) Find the most powerful level α test
ANSWERSHEET (TOPIC = DIFFERENTIAL CALCULUS) COLLECTION #2. h 0 h h 0 h h 0 ( ) g k = g 0 + g 1 + g g 2009 =?
Teko Classes IITJEE/AIEEE Maths by SUHAAG SIR, Bhopal, Ph (0755) 3 00 000 www.tekoclasses.com ANSWERSHEET (TOPIC DIFFERENTIAL CALCULUS) COLLECTION # Question Type A.Single Correct Type Q. (A) Sol least
PARTIAL NOTES for 6.1 Trigonometric Identities
PARTIAL NOTES for 6.1 Trigonometric Identities tanθ = sinθ cosθ cotθ = cosθ sinθ BASIC IDENTITIES cscθ = 1 sinθ secθ = 1 cosθ cotθ = 1 tanθ PYTHAGOREAN IDENTITIES sin θ + cos θ =1 tan θ +1= sec θ 1 + cot
Strain gauge and rosettes
Strain gauge and rosettes Introduction A strain gauge is a device which is used to measure strain (deformation) on an object subjected to forces. Strain can be measured using various types of devices classified
Math221: HW# 1 solutions
Math: HW# solutions Andy Royston October, 5 7.5.7, 3 rd Ed. We have a n = b n = a = fxdx = xdx =, x cos nxdx = x sin nx n sin nxdx n = cos nx n = n n, x sin nxdx = x cos nx n + cos nxdx n cos n = + sin
Lecture 13 - Root Space Decomposition II
Lecture 13 - Root Space Decomposition II October 18, 2012 1 Review First let us recall the situation. Let g be a simple algebra, with maximal toral subalgebra h (which we are calling a CSA, or Cartan Subalgebra).
Homework 8 Model Solution Section
MATH 004 Homework Solution Homework 8 Model Solution Section 14.5 14.6. 14.5. Use the Chain Rule to find dz where z cosx + 4y), x 5t 4, y 1 t. dz dx + dy y sinx + 4y)0t + 4) sinx + 4y) 1t ) 0t + 4t ) sinx
Section 7.6 Double and Half Angle Formulas
09 Section 7. Double and Half Angle Fmulas To derive the double-angles fmulas, we will use the sum of two angles fmulas that we developed in the last section. We will let α θ and β θ: cos(θ) cos(θ + θ)
Generating Set of the Complete Semigroups of Binary Relations
Applied Mathematics 06 7 98-07 Published Online January 06 in SciRes http://wwwscirporg/journal/am http://dxdoiorg/036/am067009 Generating Set of the Complete Semigroups of Binary Relations Yasha iasamidze
5. Choice under Uncertainty
5. Choice under Uncertainty Daisuke Oyama Microeconomics I May 23, 2018 Formulations von Neumann-Morgenstern (1944/1947) X: Set of prizes Π: Set of probability distributions on X : Preference relation
About these lecture notes. Simply Typed λ-calculus. Types
About these lecture notes Simply Typed λ-calculus Akim Demaille akim@lrde.epita.fr EPITA École Pour l Informatique et les Techniques Avancées Many of these slides are largely inspired from Andrew D. Ker
A summation formula ramified with hypergeometric function and involving recurrence relation
South Asian Journal of Mathematics 017, Vol. 7 ( 1): 1 4 www.sajm-online.com ISSN 51-151 RESEARCH ARTICLE A summation formula ramified with hypergeometric function and involving recurrence relation Salahuddin
6.1. Dirac Equation. Hamiltonian. Dirac Eq.
6.1. Dirac Equation Ref: M.Kaku, Quantum Field Theory, Oxford Univ Press (1993) η μν = η μν = diag(1, -1, -1, -1) p 0 = p 0 p = p i = -p i p μ p μ = p 0 p 0 + p i p i = E c 2 - p 2 = (m c) 2 H = c p 2
Lecture 21: Properties and robustness of LSE
Lecture 21: Properties and robustness of LSE BLUE: Robustness of LSE against normality We now study properties of l τ β and σ 2 under assumption A2, i.e., without the normality assumption on ε. From Theorem
Solutions to Exercise Sheet 5
Solutions to Eercise Sheet 5 jacques@ucsd.edu. Let X and Y be random variables with joint pdf f(, y) = 3y( + y) where and y. Determine each of the following probabilities. Solutions. a. P (X ). b. P (X
Θεωρία Πληροφορίας και Κωδίκων
Θεωρία Πληροφορίας και Κωδίκων Δρ. Νικόλαος Κολοκοτρώνης Λέκτορας Πανεπιστήμιο Πελοποννήσου Τμήμα Επιστήμης και Τεχνολογίας Υπολογιστών Τέρμα Οδού Καραϊσκάκη, 22100 Τρίπολη E mail: nkolok@uop.gr Web: http://www.uop.gr/~nkolok/
SOLUTIONS TO MATH38181 EXTREME VALUES AND FINANCIAL RISK EXAM
SOLUTIONS TO MATH38181 EXTREME VALUES AND FINANCIAL RISK EXAM Solutions to Question 1 a) The cumulative distribution function of T conditional on N n is Pr T t N n) Pr max X 1,..., X N ) t N n) Pr max
( ) 2 and compare to M.
Problems and Solutions for Section 4.2 4.9 through 4.33) 4.9 Calculate the square root of the matrix 3!0 M!0 8 Hint: Let M / 2 a!b ; calculate M / 2!b c ) 2 and compare to M. Solution: Given: 3!0 M!0 8
Solution Series 9. i=1 x i and i=1 x i.
Lecturer: Prof. Dr. Mete SONER Coordinator: Yilin WANG Solution Series 9 Q1. Let α, β >, the p.d.f. of a beta distribution with parameters α and β is { Γ(α+β) Γ(α)Γ(β) f(x α, β) xα 1 (1 x) β 1 for < x
MINIMAL CLOSED SETS AND MAXIMAL CLOSED SETS
MINIMAL CLOSED SETS AND MAXIMAL CLOSED SETS FUMIE NAKAOKA AND NOBUYUKI ODA Received 20 December 2005; Revised 28 May 2006; Accepted 6 August 2006 Some properties of minimal closed sets and maximal closed
CE 530 Molecular Simulation
C 53 olecular Siulation Lecture Histogra Reweighting ethods David. Kofke Departent of Cheical ngineering SUNY uffalo kofke@eng.buffalo.edu Histogra Reweighting ethod to cobine results taken at different
CRASH COURSE IN PRECALCULUS
CRASH COURSE IN PRECALCULUS Shiah-Sen Wang The graphs are prepared by Chien-Lun Lai Based on : Precalculus: Mathematics for Calculus by J. Stuwart, L. Redin & S. Watson, 6th edition, 01, Brooks/Cole Chapter
Higher Derivative Gravity Theories
Higher Derivative Gravity Theories Black Holes in AdS space-times James Mashiyane Supervisor: Prof Kevin Goldstein University of the Witwatersrand Second Mandelstam, 20 January 2018 James Mashiyane WITS)
w o = R 1 p. (1) R = p =. = 1
Πανεπιστήµιο Κρήτης - Τµήµα Επιστήµης Υπολογιστών ΗΥ-570: Στατιστική Επεξεργασία Σήµατος 205 ιδάσκων : Α. Μουχτάρης Τριτη Σειρά Ασκήσεων Λύσεις Ασκηση 3. 5.2 (a) From the Wiener-Hopf equation we have:
Jordan Form of a Square Matrix
Jordan Form of a Square Matrix Josh Engwer Texas Tech University josh.engwer@ttu.edu June 3 KEY CONCEPTS & DEFINITIONS: R Set of all real numbers C Set of all complex numbers = {a + bi : a b R and i =
Srednicki Chapter 55
Srednicki Chapter 55 QFT Problems & Solutions A. George August 3, 03 Srednicki 55.. Use equations 55.3-55.0 and A i, A j ] = Π i, Π j ] = 0 (at equal times) to verify equations 55.-55.3. This is our third
On New Subclasses of Analytic Functions with Respect to Conjugate and Symmetric Conjugate Points
Global Journal of Pure Applied Mathematics. ISSN 0973-768 Volume, Number 3 06, pp. 849 865 Research India Publications http://www.ripublication.com/gjpam.htm On New Subclasses of Analytic Functions with
n=2 In the present paper, we introduce and investigate the following two more generalized
MATEMATIQKI VESNIK 59 (007), 65 73 UDK 517.54 originalni nauqni rad research paper SOME SUBCLASSES OF CLOSE-TO-CONVEX AND QUASI-CONVEX FUNCTIONS Zhi-Gang Wang Abstract. In the present paper, the author
forms This gives Remark 1. How to remember the above formulas: Substituting these into the equation we obtain with
Week 03: C lassification of S econd- Order L inear Equations In last week s lectures we have illustrated how to obtain the general solutions of first order PDEs using the method of characteristics. We
Practice Exam 2. Conceptual Questions. 1. State a Basic identity and then verify it. (a) Identity: Solution: One identity is csc(θ) = 1
Conceptual Questions. State a Basic identity and then verify it. a) Identity: Solution: One identity is cscθ) = sinθ) Practice Exam b) Verification: Solution: Given the point of intersection x, y) of the
Problem Set 3: Solutions
CMPSCI 69GG Applied Information Theory Fall 006 Problem Set 3: Solutions. [Cover and Thomas 7.] a Define the following notation, C I p xx; Y max X; Y C I p xx; Ỹ max I X; Ỹ We would like to show that C
Lecture 34 Bootstrap confidence intervals
Lecture 34 Bootstrap confidence intervals Confidence Intervals θ: an unknown parameter of interest We want to find limits θ and θ such that Gt = P nˆθ θ t If G 1 1 α is known, then P θ θ = P θ θ = 1 α
Optimal Parameter in Hermitian and Skew-Hermitian Splitting Method for Certain Two-by-Two Block Matrices
Optimal Parameter in Hermitian and Skew-Hermitian Splitting Method for Certain Two-by-Two Block Matrices Chi-Kwong Li Department of Mathematics The College of William and Mary Williamsburg, Virginia 23187-8795
b. Use the parametrization from (a) to compute the area of S a as S a ds. Be sure to substitute for ds!
MTH U341 urface Integrals, tokes theorem, the divergence theorem To be turned in Wed., Dec. 1. 1. Let be the sphere of radius a, x 2 + y 2 + z 2 a 2. a. Use spherical coordinates (with ρ a) to parametrize.
ω ω ω ω ω ω+2 ω ω+2 + ω ω ω ω+2 + ω ω+1 ω ω+2 2 ω ω ω ω ω ω ω ω+1 ω ω2 ω ω2 + ω ω ω2 + ω ω ω ω2 + ω ω+1 ω ω2 + ω ω+1 + ω ω ω ω2 + ω
0 1 2 3 4 5 6 ω ω + 1 ω + 2 ω + 3 ω + 4 ω2 ω2 + 1 ω2 + 2 ω2 + 3 ω3 ω3 + 1 ω3 + 2 ω4 ω4 + 1 ω5 ω 2 ω 2 + 1 ω 2 + 2 ω 2 + ω ω 2 + ω + 1 ω 2 + ω2 ω 2 2 ω 2 2 + 1 ω 2 2 + ω ω 2 3 ω 3 ω 3 + 1 ω 3 + ω ω 3 +
D Alembert s Solution to the Wave Equation
D Alembert s Solution to the Wave Equation MATH 467 Partial Differential Equations J. Robert Buchanan Department of Mathematics Fall 2018 Objectives In this lesson we will learn: a change of variable technique
Intuitionistic Fuzzy Ideals of Near Rings
International Mathematical Forum, Vol. 7, 202, no. 6, 769-776 Intuitionistic Fuzzy Ideals of Near Rings P. K. Sharma P.G. Department of Mathematics D.A.V. College Jalandhar city, Punjab, India pksharma@davjalandhar.com