id stringlengths 1 6 | url stringlengths 16 1.82k | content stringlengths 37 9.64M |
|---|---|---|
2000 | https://www.gauthmath.com/solution/1836493876356145/You-are-given-the-polynomial-x3-6x2-x-30-and-one-of-its-zeros-c-2-Use-the-techni | Solved: You are given the polynomial x^3-6x^2-x+30 and one of its zeros c=-2 Use the techniques in [Math]
Drag Image or
Click Here
to upload
Command+to paste
Upgrade
Sign in
Homework
Homework
Assignment Solver
Assignment
Calculator
Calculator
Resources
Resources
Blog
Blog
App
App
Gauth
Unlimited answers
Gauth AI Pro
Start Free Trial
Homework Helper
Study Resources
Math
Expression
Questions
Question
You are given the polynomial x^3-6x^2-x+30 and one of its zeros c=-2 Use the techniques in Section 3.2 to fnd the rest of the real zeros and factor the polynomial. Choose the answer that represents the factored polynomial.
Show transcript
Gauth AI Solution
100%(2 rated)
Answer
The answer is (x+2)(x-3)(x-5)
Explanation
Utilize the Factor Theorem: Since $$c = -2$$c=−2 is a zero of the polynomial $$x^{3} - 6x^{2} - x + 30$$x 3−6 x 2−x+30, then $$(x + 2)$$(x+2) is a factor.
Perform Polynomial Long Division: Divide the polynomial $$x^{3} - 6x^{2} - x + 30$$x 3−6 x 2−x+30 by $$(x + 2)$$(x+2) to obtain the quotient.
\multicolumn 2 r x 2\cline 2−5 x+2\multicolumn 2 r x 3\cline 2−3\multicolumn 2 r 0\multicolumn 2 r\cline 3−4\multicolumn 2 r\multicolumn 2 r\cline 4−5\multicolumn 2 r−8 x x 3+2 x 2−8 x 2−8 x 2 0+15−6 x 2−x−16 x 15 x 15 x 0−x+30+30 0+30
The quotient is $$x^{2} - 8x + 15$$x 2−8 x+15
Factor the Quadratic: Factor the quadratic expression $$x^{2} - 8x + 15$$x 2−8 x+15 to find its roots.
$$x^{2} - 8x + 15 = (x - 3)(x - 5)$$x 2−8 x+15=(x−3)(x−5)
Complete Factorization: Combine the factors to obtain the complete factorization of the original polynomial.
$$x^{3} - 6x^{2} - x + 30 = (x + 2)(x - 3)(x - 5)$$x 3−6 x 2−x+30=(x+2)(x−3)(x−5)
Identify the Zeros: The zeros of the polynomial are the values of $$x$$x that make each factor equal to zero. Therefore, the zeros are $$x = -2$$x=−2, $$x = 3$$x=3, and $$x = 5$$x=5
Helpful
Not Helpful
Explain
Simplify this solution
Gauth AI Pro
Back-to-School 3 Day Free Trial
Limited offer! Enjoy unlimited answers for free.
Join Gauth PLUS for $0
Previous questionNext question
Related
For the polynomial given below, you are given one of its zeros. Use the techniques in this section to find the rest of the real zeros. Enter your answers as a comma-separated list. If there are no other zeros, enter the zero given. x3 12x2+48x-64,c=4 Factor the polynomial.
Verified Answer
In Exercises 31 - 40, you are given a polynomial and one of its zeros. Use the techniques in this section to find the rest of the real zeros and factor the polynomial. 31. x3-6x2+11x-6,c=1
100% (7 rated)
Below you are given a polynomial and one of its zeros. Use the techniques in this section to find the rest of the real zeros and factor the polynomial. a. x3-6x2+11x-6,c=1 b, 2x3-3x2-11x+6,c= 1/2 C. 4x4-28x3+61x2-42x+9,c= 1/2 is a zero of multiplicity 2
100% (5 rated)
For the polynomial given below, you are given one of its zeros. Use the techniques in this section to find the rest of the real zeros. Enter your answers as a comma-separated list. If there are no other zeros, enter the zero given. x4-49x2,c=0 x= Factor the polynomial. Additional Materials Reading
100% (2 rated)
For the polynomial given below, you are given one of its zeros. Use the techniques in this section to find the rest of the real zeros. Enter your answers as a comma-separated list. If there are no other zeros, enter the zero given. 4x4-60x3+253x2-210x+49,c= 1/2 is a zero of multiplicity 2 x=square Factor the polynomial. square
100% (3 rated)
For the polynomial given below, you are given one of its zeros. Use the techniques in this section to find the rest of the real zeros. Enter your answers as a comma-separated list. If there are no other zeros, enter the zero given. 4x4-68x3+321x2-272x+64,c= 1/2 is a zero of multiplicity 2 x=square × Factor the polynomial. square × Additional Materials
100% (7 rated)
Eur the polynomial given below, you are given one of its zeros. Use the techniques in this section to find the rest of the real zeros. Enter your answers as a comma-seporatnson i the zero given. 4x4-44x3+141x2-110x+25,c= 1/2 is a zero of multiplicity 2 x=| 5 square Factor the polynomial square x Additional Material= Reading
100% (1 rated)
Write the quotient in the form a+bi. 7-i/3-6i 7-i/3-6i =square Simplify your answer. Type your answer in the form a+bi . Use integers or fractions for any numbers in the expressio
100% (4 rated)
Solve the following inequality algebraically. 5x-5/x+2 ≤ 4 What is the solution? -2,13 Type your answer in interval notation. Simplify your answer. Use integers or fractions for any numbers in the expression.
100% (4 rated)
How may different arrangements are there of the letters in The number of possible arrangements is MISSISSIPPI?
100% (2 rated)
Gauth it, Ace it!
contact@gauthmath.com
Company
About UsExpertsWriting Examples
Legal
Honor CodePrivacy PolicyTerms of Service
Download App |
2001 | https://www.osmosis.org/learn/Development_of_the_muscular_system | Fall in love with Osmosis at 20% off! Save now until September 30 at 11:59 PM PT.
Learn more
Skip to the video
Development of the muscular system
Foundational SciencesEmbryologyOrgan system developmentMusculoskeletal system
12,216views
00:00 / 00:00
Development of the muscular system
Organ system development
Cardiovascular system
Development of the cardiovascular system
Fetal circulation
Eyes, ears, nose, and throat
Development of the ear
Development of the eye
Development of the face and palate
Pharyngeal arches, pouches, and clefts
Gastrointestinal system
Development of the digestive system and body cavities
Development of the gastrointestinal system
Development of the teeth
Development of the tongue
Integumentary system
Development of the integumentary system
Musculoskeletal system
Development of the axial skeleton
Development of the limbs
Development of the muscular system
Nervous system
Development of the nervous system
Renal system
Development of the renal system
Reproductive system
Development of the reproductive system
Respiratory system
Development of the respiratory system
Assessments
Flashcards
0 / 16 complete
USMLE® Step 1 questions
0 / 1 complete
High Yield Notes
28 pages
Flashcards
Development of the muscular system
0 of 16 complete
Questions
USMLE® Step 1 style questions USMLE
0 of 1 complete
A clinician is testing the function of myotomes in the upper and lower extremities via isometric resisted muscle testing. This provides the clinician with information regarding the level in the spine where a lesion may be present. Which of the following best describes the embryological origin of a myotome?
Transcript
Watch video only
Content Reviewers
Rishi Desai, MD, MPH
Contributors
Marisa Pedron,
Tanner Marshall, MS
The muscular system starts taking shape when the embryo is just a flat little pancake made up of two layers: the epiblast on the dorsal, or back, side, and the hypoblast on the ventral, or front, side.
A line called the primitive streak appears on the epiblast “back” of this two-layered creature.
Cells migrate along the primitive streak during gastrulation, leading to a now three-layered embryo pancake, with each layer containing germ cells that form organs and tissues of the body.
The ventral, or bottom, germ layer is called endoderm, the dorsal, or top, germ layer is called ectoderm, and the layer in between these two is called mesoderm.
Collectively, these germ cells produce all of the organs and tissues in the body.
During week 3, the embryo transitions from a flat organism to a more tubular creature by folding along its longitudinal and lateral axes.
At the same time, a solid rod of mesoderm called the notochord forms on the midline of the embryo.
Above the notochord, the ectoderm invaginates to form the neural tube, an early precursor of the central nervous system.
This is the embryo’s first symmetry axis, and the mesoderm on either side of the neural tube differentiates into three distinct portions: immediately flanking the neural tube there’s the paraxial mesoderm; next, there’s the intermediate mesoderm; and finally, the lateral plate mesoderm.
Between the cells of the lateral plate mesoderm, small gaps appear and coalesce to form the intraembryonic coelom, a cavity inside the embryo’s body.
This cavity separates the lateral plate mesoderm into two layers: a parietal layer that’s in contact with the ectoderm, and a visceral layer that’s in contact with the endoderm.
The paraxial and lateral plate mesoderm will become the skeletal muscles in our body.
Before the mesoderm cells develop into skeletal muscle, they first organize into cell blocks called somites.
Somites arise in pairs from a combination of paraxial mesoderm cells and mesenchyme, which is a soupy fetal tissue containing pluripotent cells.
Around day 20 of development, somites begin to form in the occipital region of the embryo, which is at the base of the head.
Somites continue to form cranio-caudally, or from head-to-tail end of the embryo, with about three pairs forming each day.
Up to 40 somite pairs form by the end of week 5. Some degenerate, while the rest go on to form bone and muscle structures.
Each somite undergoes a split, with cells from the ventral portion forming sclerotome, creating the vertebrae and the ribs.
Cells from the dorsomedial lip of the somite (the top right layer of cubes here) mix with some cells from the ventrolateral lip in the opposite corner of the cube (the bottom left) to form a new, mixed tissue called dermomyotome.
Dermomyotome cells further differentiate into dermatome and myotome cells, which turn into the dermis layer of the skin and into muscles, respectively.
Now, fast forwarding a bit, the muscles of the myotome start to develop.
One way to categorize the muscles is according to their innervation.
Summary
Development of the muscular system starts at around week d of gestation. The muscular system begins with the formation of muscle cells called myoblasts. Myoblasts originate from the mesoderm and fuse together to form long and multinucleated fibers called muscle fibers. Muscle fibers are attached by collagenous connective tissues, and the entire muscle is enclosed in a fibrous capsule. All skeletal and cardiac muscles and most smooth muscles arise from mesoderm cells, except pupillary muscles and the sweat and mammary glands, which arise from ectoderm.
We use cookies that are necessary to make our site work. We may also use additional cookies to analyze, improve, and personalize our content and your digital experience. For more information, see ourCookie Policy
Cookie Preference Center
We use cookies which are necessary to make our site work. We may also use additional cookies to analyse, improve and personalise our content and your digital experience. For more information, see our Cookie Policy and the list of Google Ad-Tech Vendors.
You may choose not to allow some types of cookies. However, blocking some types may impact your experience of our site and the services we are able to offer. See the different category headings below to find out more or change your settings.
You may also be able to exercise your privacy choices as described in our Privacy Policy
Manage Consent Preferences
Strictly Necessary Cookies
Always active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site.
Targeting Cookies
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. If you do not allow these cookies, you will experience less targeted advertising. |
2002 | https://mathoverflow.livejournal.com/49513500.html | A formula for minimum number of $k$-element nonnegative-sum subsets of a zero-sum set: Revisiting Ma
Main
Top
Interesting
Checklist ☕🧦🍂
Help
mathoverflow
Follow us:
Follow us on Twitter
Applications
Download
Huawei
RuStore
COMPANY
About
News
Help
PRODUCTS
"Share" button
COMMUNITY
Frank
CHOOSE LANGUAGE
English
▾
English
Deutsch
Dansk
español
Français
Italiano
Русский
Українська
Беларуская
日本語
Português
Esperanto
עברית
Nederlands
Magyar
Gaeilge
íslenska
suomi
Ελληνικά
Norsk bokmål
Svenska
polski
简体中文
Latviešu
Türkçe
Bahasa Melayu
हिन्दी
Brazilian Portuguese
Chinese Traditional
Lietuvių
Norsk nynorsk
Privacy Policy
User Agreement
Recommendation technologies
Help
LiveJournal — v.880
Main
Top
Interesting
Checklist ☕🧦🍂
Help
Follow us:
Follow us on Twitter
Applications
Download
Huawei
RuStore
COMPANY
About
News
Help
PRODUCTS
"Share" button
COMMUNITY
Frank
CHOOSE LANGUAGE
English
▾
English
Deutsch
Dansk
español
Français
Italiano
Русский
Українська
Беларуская
日本語
Português
Esperanto
עברית
Nederlands
Magyar
Gaeilge
íslenska
suomi
Ελληνικά
Norsk bokmål
Svenska
polski
简体中文
Latviešu
Türkçe
Bahasa Melayu
हिन्दी
Brazilian Portuguese
Chinese Traditional
Lietuvių
Norsk nynorsk
Privacy Policy
User Agreement
Recommendation technologies
Help
LiveJournal — v.880
LiveJournal
Find more
Communities
RSS Reader
Shop
Help
Search
Log in
mathoverflow
Log in
Join free Join
English (en)
English (en)
Русский (ru)
Українська (uk)
Français (fr)
Português (pt)
español (es)
Deutsch (de)
Italiano (it)
Беларуская (be)
Log in
No account?Create an account
[x] Remember me
Forgot password
Log in Log in
QR code
No account?Create an account
By logging in to LiveJournal using a third-party service you accept LiveJournal's User agreement
mathoverflow
Subscribe
April 9 2025, 08:57
0
00 0 0 0 0 00 0
A formula for minimum number of $k$-element nonnegative-sum subsets of a zero-sum set: Revisiting Ma
Define the quantity$A(n,k)$as follows:
$A(n,k)$denotes theminimumnumber of$k$-element non-negative subsets of$n$arbitrary real numbers$x_1,\dots,x_n$whose sum is non-negative.
More formally,$A(n,k)$is given by
$$\min_{x \in \mathbb R^n: \sum_{i\in [n]}x_i \ge 0} \left | \left {S\subseteq [n]: \sum_{i\in S}x_i \ge 0 \right } \right |.$$
Now consider the following result and two conjectures:
Devisable case: Given$\sum_{i\in[n]}x_i \ge 0$, for$k|n$:$$A(n,k)=\binom{n-1}{k-1}.$$
MMS Conjecture:Given$\sum_{i\in[n]}x_i \ge 0, $for$n\ge 4k$:$$A(n,k)=\binom{n-1}{k-1}.$$
MM Conjecture:, Given$\sum_{i\in[n]}x_i \ge 0,$for$n <4k$with$k\not | n$:$$A(n,k) = \binom{n-\lfloor \frac n k \rfloor}{k}.$$
In page 391 of this 1987 paper by Manickam and Miklós, you can find both the Manickam-Miklós-Singhi (MMS) and the Manickam-Miklós (MM) conjectures. The above combinatorial form of the MMS conjecture was phrased in terms of calculating invariants of Johnson Schemes in linear algebra by Manickam and Singhi in 1988 . The MMS conjecture seems to be correct (see these 2014, 2015 and 2017 papers , , , and references therein). In fact, the MMS conjecture has been already proved for$n\ge 10^{46}k,$and$n\ge 8 k^2$. In the literature, I could not find any discussion on the MM conjecture, which only appeared in Manickam and Miklós's paper . Two different proofs for the devisable case are given in and .
WLOG, we can consider$\color{blue}{\sum_{i\in[n]}x_i=0}$instead of$\sum_{i\in[n]}x_i \ge 0$. Then, the number of$k$-element subsets of$x_1,\dots,x_n$whose sum is non-negative equals the number of$(n-k)$-element subsets of$x_1,\dots,x_n$whose sum is non-positive. In this case,the MMS and MM conjectures imply that
$$ \small {A(n,k) = \min \left ( \binom{n-1}{k-1}, \binom{n-1}{n-k-1} \right )} \; k|n \; \text{or} \; n-k|n\tag{1.1} $$$$ \small {A(n,k) = \min \left ( \binom{n-1}{k-1}, \binom{n-\lfloor \frac n k \rfloor}{k},\binom{n-\lfloor \frac n {n-k} \rfloor}{n-k} , \binom{n-1}{n-k-1} \right )} \; \text{otherwise} \; \tag{1.2} $$
In my attempt to answer this question , first, I realized thatthe MM conjecture is not generally correct. Second, I guess that$A(n,k)$has the following general formula:
$$ \fbox{$ A(n,k) = \min_{a \in[n-1]} \sum_{0 \le t \le \frac k n a} \binom{a}{t} \binom{n-a}{k-t}.$} \tag{2} $$
The above is derived based on the intuition:
$ A(n,k)$is always attained for a sequence$x_1,\dots,x_n \in {-\alpha, \beta }$for some$\alpha, \beta>0$.
The structure$x_1,\dots,x_n \in {-\alpha, \beta }$has the minimum flexibility for a non-zero feasible solution of$\sum_{i\in[n]}x_i=0$, included in all other possible structures$$x_1,\dots,x_n \in {-\alpha_p,\dots,-\alpha_1, \beta_1,\dots,\beta_q } \tag{3}$$with$p,q\in \mathbb N$and distinct$\alpha_1,\dots,\alpha_p, \beta_1,\dots,\beta_q>0$. It is why the above conjecture seems to be correct.
If the above is the case,$a$of$x_1,\dots,x_n$are$-\alpha$, and$n-a$of them are$\beta$for some$a \in [n-1]$. As$\sum_{i\in[n]}x_i=0$, then$\alpha= \beta \left ( \frac na -1\right)$. Moreover, for some$ t \in {0,\dots,a}$,$t$of the elements of a$k$-element subset are$-\alpha$, and the subset has a non-negative sum if and only if$-t\alpha+ (k-t) \beta \ge 0$, which is equivalent to$t \le \frac{k}{n} a$(independent of$\alpha$and$\beta$). Then, one can derive the formula (2) by counting different ways of selecting$t$out of$a$and$k-t$out of$n-a$choices, and minimizing over all the possible values of$a \in[n-1]$.
In the following, you can find the plots of the normalized quantity$\frac{A(n,k)}{\binom{n}{k}}$for$n=6 4, 99, 100, 101$based on the old formula in (1.1) and (1.2) (shown in red), and the new formula in (2) (shown in green):
$n=64$
$n=99$
enter image description here
$n=100$
$n=101$
You may notice that the new formula (2)nicely handle both cases in the devisable case and MMS conjecturefor$k|n$and$n\ge 4k$(see where red and green lines overlap; theprooffollows from the results given here ), and it shows thatthe MM conjecture cannot be generally correct(see where red and green lines do not overlap). In fact, the old and new formulas can differ only over the range$n < 4k <3n$, and they are the same for$n \ge 4k$and$4k \ge 3n$($n \ge 4(n-k)$), giving$\binom{n-1}{k-1}$and$\binom{n-1}{n-k-1}$, respectively.
In a case that a counterexample is given, the formula in (2) is an upper bound for$A(n,k)$, which is better than the old one given in (1.2) over$n < 4k <3n$.
I hope one can prove or disprove (2) by seeing the problem with new eyes though a part of it (the MMS conjecture) has been not fully proved yet after about three decades.
Using the result provedhere, one can see thatthe new fromula (2) covers both the devisable case and MMS conjecture, that is, it is equal to$A(n,k)=\binom{n-1}{k-1}$for$k|n$and$n\g e 4k$. The result also suggests thatthe MMS conjecture holds over a wider range of$n\ge \frac {27}{8} k.$
0
0Subscribe0 0 0 0 0 00 0
LJ Video
No comments yet
Post a new comment
)_
Your IP address will be recorded
For a line break, press Shift + Enter Press Enter to send comment
Applications
Download
Huawei
RuStore
Follow us:
Follow us on Twitter
LiveJournal
COMPANY
About
News
Help
PRODUCTS
"Share" button
COMMUNITY
Frank
CHOOSE LANGUAGE
English
▾
English
Deutsch
Dansk
español
Français
Italiano
Русский
Українська
Беларуская
日本語
Português
Esperanto
עברית
Nederlands
Magyar
Gaeilge
íslenska
suomi
Ελληνικά
Norsk bokmål
Svenska
polski
简体中文
Latviešu
Türkçe
Bahasa Melayu
हिन्दी
Brazilian Portuguese
Chinese Traditional
Lietuvių
Norsk nynorsk
v.880
Privacy Policy
User Agreement
Recommendation technologies
Help |
2003 | https://flexbooks.ck12.org/cbook/ck-12-algebra-i-concepts-honors/section/7.8/primary/lesson/applications-of-quadratic-equations-alg-i-hnrs/ | Skip to content
Elementary Math
Grade 1
Grade 2
Grade 3
Grade 4
Grade 5
Math 6
Math 7
Math 8
Algebra I
Geometry
Algebra II
Math 6
Math 7
Math 8
Algebra I
Geometry
Algebra II
Probability & Statistics
Trigonometry
Math Analysis
Precalculus
Calculus
What's the difference?
Grade K to 5
Earth Science
Life Science
Physical Science
Biology
Chemistry
Physics
Advanced Biology
Math FlexLets
Science FlexLets
Writing
Spelling
Social Studies
Economics
Geography
Government
History
World History
Philosophy
Sociology
More
Astronomy
Engineering
Health
Photography
Technology
College
College Algebra
College Precalculus
Linear Algebra
College Human Biology
The Universe
Adult Education
Basic Education
High School Diploma
High School Equivalency
Career Technical Ed
English as 2nd Language
Country
Bhutan
Brasil
Chile
Georgia
India
Translations
Spanish
Korean
Deutsch
Chinese
Greek
Polski
EXPLORE
Flexi
A FREE Digital Tutor for Every Student
FlexBooks 2.0
Customizable, digital textbooks in a new, interactive platform
FlexBooks
Customizable, digital textbooks
Schools
FlexBooks from schools and districts near you
Study Guides
Quick review with key information for each concept
Adaptive Practice
Building knowledge at each student’s skill level
Simulations
Interactive Physics & Chemistry Simulations
PLIX
Play. Learn. Interact. eXplore.
CCSS Math
Concepts and FlexBooks aligned to Common Core
NGSS
Concepts aligned to Next Generation Science Standards
Certified Educator
Stand out as an educator. Become CK-12 Certified.
Webinars
Live and archived sessions to learn about CK-12
Other Resources
CK-12 Resources
Concept Map
Testimonials
CK-12 Mission
Meet the Team
CK-12 Helpdesk
FlexLets
Know the essentials.
Pick a Subject
Donate
Sign Up
7.8
Applications of Quadratic Equations
Written by:Brenda Meery | Kaitlyn Spong
Fact-checked by:The CK-12 Editorial Team
Last Modified: Sep 01, 2025
Two cars leave an intersection at the same time. One car travels north and the other car travels west. When the car traveling north had gone 24 miles, the distance between the cars was four miles more than three times the distance traveled by the car heading west. Find the distance between the cars at that time.
Quadratic Equations
Quadratic functions can be used to help solve many different real world problems. Here are two hints for solving quadratic word problems:
It is often helpful to start by drawing a picture in order to visualize what you are asked to solve.
Once you have solved the problem, it is important to make sure that your answers are realistic given the context of the problem. For example, if you are solving for the age of a person and one of your answers is a negative number, that answer does not make sense in the context of the problem and is not actually a solution.
Let's apply quadratic equations to solve the following problems:
The number of softball games that must be scheduled in a league with @$\begin{align}n\end{align}@$ teams is given by @$\begin{align}G(n)= \frac{n^2 - n}{2}\end{align}@$. Each team can only play every other team exactly once. A league schedules 21 games. How many softball teams are in the league?
You are given the function @$\begin{align}G(n)= \frac{n^2-n}{2}\end{align}@$ and you are asked to find @$\begin{align}n\end{align}@$ when @$\begin{align}G(n)=21\end{align}@$. This means, you have to solve the equation:
@$\begin{align}21=\frac{n^2-n}{2}\end{align}@$
Start by setting the equation equal to zero:
@$$\begin{align}42&=n^2-n\
n^2-n-42&=0\end{align}@$$
Now solve for @$\begin{align}n\end{align}@$ to find the number of teams @$\begin{align}(n)\end{align}@$ in the league. Start by factoring the left side of the equation and rewriting the equation:
@$\begin{align}n^2-n-42=0 \end{align}@$ becomes @$\begin{align}(n-7)(n+6)=0\end{align}@$
There are 7 teams in the softball league.
When a home-made rocket is launched from the ground, it goes up and falls in the pattern of a parabola. The height, in feet, of a home-made rocket is given by the equation @$\begin{align}h(t) = 160t - 16t^2\end{align}@$ where @$\begin{align}t\end{align}@$ is the time in seconds. How long will it take for the rocket to return to the ground?
The formula for the path of the rocket is @$\begin{align}h(t)=160t-16t^2\end{align}@$. You are asked to find @$\begin{align}t\end{align}@$ when @$\begin{align}h(t)=0\end{align}@$, or when the rocket hits the ground and no longer has height. Start by factoring:
@$\begin{align}160t-16t^2=0\end{align}@$ becomes @$\begin{align}16t(10-t)=0\end{align}@$
This means @$\begin{align}16t=0\end{align}@$ (so @$\begin{align}t=0\end{align}@$) or @$\begin{align}10-t=0\end{align}@$ (so @$\begin{align}t=10\end{align}@$). @$\begin{align}t=0\end{align}@$ represents the rocket being on the ground when it starts, so it is not the answer you are looking for. @$\begin{align}t=10\end{align}@$ represents the rocket landing back on the ground.
The rocket will hit the ground after 10 seconds.
Using the information in the previous problem, what is the height of the rocket after 2 seconds?
To solve this problem, you need to replace @$\begin{align}t\end{align}@$ with 2 in the quadratic function.
@$$\begin{align}h(t)&=160t-16t^2\
h(2)&=160(2)-16(2)^2\
h(2)&=320-64\
h(2)&=256.\end{align}@$$
Therefore, after 2 seconds, the height of the rocket is 256 feet.
Examples
Example 1
Earlier, you were told that two cars leave an intersection at the same time, one traveling north and the other traveling west. When the car traveling north had gone 24 miles the distance between the cars was four miles more than three times the distance traveled by the car heading west. What is the distance between the cars at that time?
First draw a diagram. Since the cars are traveling north and west from the same starting position, the triangle made to connect the distance between them is a right triangle. Since you have a right triangle, you can use the Pythagorean Theorem to set up an equation relating the lengths of the sides of the triangle.
The Pythagorean Theorem is a geometry theorem that says that for all right triangles, @$\begin{align}a^2+b^2=c^2\end{align}@$ where @$\begin{align}a\end{align}@$ and @$\begin{align}b\end{align}@$ are legs of the triangle and @$\begin{align}c\end{align}@$ is the longest side of the triangle, the hypotenuse. The equation for this problem is:
@$$\begin{align}x^2+24^2&=(3x+4)^2\
x^2+576&=(3x+4)(3x+4)\
x^2+576&=9x^2+24x+16\end{align}@$$
Now set the equation equal to zero and factor the quadratic expression so that you can use the zero product property.
@$$\begin{align}x^2+576&=9x^2+24x+16\
0&=8x^2+24x-560\
0&=8(x^2+3x-70)\
0&=8(x-7)(x+10)\end{align}@$$
So you now know that @$\begin{align}x = 7\end{align}@$. Since the distance between the cars is represented by the expression @$\begin{align}3x + 4\end{align}@$, the actual distance between the two cars after the car going north has traveled 24 miles is:
@$$\begin{align}3x+4&=3(7)+4\
&=21+4\
&=25 \ miles\end{align}@$$
Example 2
A rectangle is known to have an area of 520 square inches. The lengths of the sides are shown in the diagram below. Solve for both the length and the width.
The rectangle has an area of 520 square inches and you know that the area of a rectangle has the formula: @$\begin{align}A = l \times w\end{align}@$. Therefore:
: @$$\begin{align}520&=(x+7)(2x)\
520&=2x^2+14x\
0&=2x^2+14x-520\
0&=2(x^2+7x-260)\
0&=2(x-13)(x+20)\end{align}@$$
: Therefore the value of @$\begin{align}x\end{align}@$ is 13. This means that the width is @$\begin{align}2x\end{align}@$ or @$\begin{align}2(13) = 26 \ inches\end{align}@$. The length is @$\begin{align}x + 7 = 13 + 7 = 20 \ inches\end{align}@$.
Example 3
The height of a ball in feet can be found by the quadratic function @$\begin{align}h(t)=-16t^2+80t+5\end{align}@$ where @$\begin{align}t\end{align}@$ is the time in seconds that the ball is in the air. Determine the time(s) at which the ball is 69 feet high.
The equation for the ball being thrown is @$\begin{align}h(t)=-16t^2+80t+5\end{align}@$. If you drew the path of the thrown ball, you would see something like that shown below.
: You are asked to find the time(s) when the ball hits a height of 69 feet. In other words, solve for:
: @$$\begin{align}69=-16t^2+80t+5\end{align}@$$
: To solve for @$\begin{align}t\end{align}@$, you have to factor the quadratic and then solve for the value(s) of @$\begin{align}t\end{align}@$.
: @$$\begin{align}&\quad \qquad 0=-16t^2+80t-64\
&\quad \qquad 0=-16(t^2-5t+4)\
&\quad \qquad 0=-16(t-1)(t-4)\
&\qquad \quad \qquad \swarrow \qquad \qquad \searrow\
& \quad t - 1 = 0 \qquad \qquad t-4 = 0\
&\qquad \ \ t = 1 \quad \qquad \qquad \ \ t = 4\end{align}@$$
: Since both values are positive, you can conclude that there are two times when the ball hits a height of 69 feet. These times are at 1 second and at 4 seconds.
Example 4
A manufacturer measures the number of cell phones sold using the binomial @$\begin{align}0.015c + 2.81\end{align}@$. She also measures the wholesale price on these phones using the binomial @$\begin{align}0.011c +3.52\end{align}@$. Calculate her revenue if she sells 100,000 cell phones.
The number of cell phones sold is the binomial @$\begin{align}0.015c + 2.81\end{align}@$. The wholesale price on these phones is the binomial @$\begin{align}0.011c +3.52.\end{align}@$ The revenue she takes in is the wholesale price times the number that she sells. Therefore:
: @$\begin{align}R(c)=(0.015c+2.81)(0.011c+3.52)\end{align}@$
: First, let’s expand the expression for @$\begin{align}R\end{align}@$ to get the quadratic expression. Therefore:
: @$$\begin{align}R(c)&=(0.015c+2.81)(0.011c+3.52)\
R(c)&=0.000165c^2+0.08371c+9.8912\end{align}@$$
: The question then asks if she sold 100,000 cell phones, what would her revenue be. Therefore what is @$\begin{align}R(c)\end{align}@$ when @$\begin{align}c = 100,000\end{align}@$.
: @$$\begin{align}R(c)&=0.000165c^2+0.08371c+9.8912\
R(c)&=0.000165(100,000)^2+0.08371(100,000)+9.8912\
R(c)&=1,658,380.89\end{align}@$$
: Therefore she would make $1,658,380.89 in revenue.
Review
A rectangle is known to have an area of 234 square feet. The length of the rectangle is given by @$\begin{align}x+3\end{align}@$ and the width of the rectangle is given by @$\begin{align}x+8\end{align}@$. What is the value of @$\begin{align}x\end{align}@$?
Solve for @$\begin{align}x\end{align}@$ in the rectangle below given that the area is 9 units.
Solve for @$\begin{align}x\end{align}@$ in the triangle below given that the area is 10 units.
A pool is treated with a chemical to reduce the amount of algae. The amount of algae in the pool @$\begin{align}t\end{align}@$ days after the treatment can be approximated by the function @$\begin{align}A(t)=40t^2-300t+500\end{align}@$.
How many days after treatment will the pool have the no algae?
How much algae is in the pool before treatments are started?
How much less algae is in the pool after 1 day?
A football is kicked into the air. The height of the football in meters can be found by the quadratic function @$\begin{align}h(t)=-5t^2+25t\end{align}@$ where @$\begin{align}t\end{align}@$ is the time in seconds since the ball has been kicked.
How high is the ball after 3 seconds? At what other time is the ball the same height?
When will the ball be 20 meters above the ground?
After how many seconds will the ball hit the ground?
A ball is thrown into the air. The height of the ball in meters can be found by the quadratic function @$\begin{align}h(t)=-5t^2+30t\end{align}@$ where @$\begin{align}t\end{align}@$ is the time in seconds since the ball has been thrown.
How high is the ball after 3 seconds?
When will the ball be 25 meters above the ground?
After how many seconds will the ball hit the ground?
Kim is drafting the windows for a new building. Their shape can be modeled by the function @$\begin{align}h(w)=-w^2+4\end{align}@$, where @$\begin{align}h\end{align}@$ is the height and @$\begin{align}w\end{align}@$ is the width of points on the window frame, measured in meters.
Find the width of each window at its base.
Find the width of each window when the height is 3 meters.
What is the height of the window when the width is 1 meter?
Review (Answers)
Click HERE to see the answer key or go to the Table of Contents and click on the Answer Key under the 'Other Versions' option.
| Image | Reference | Attributions |
---
Student Sign Up
Are you a teacher?
Having issues? Click here
By signing up, I confirm that I have read and agree to the Terms of use and Privacy Policy
Already have an account?
Save this section to your Library in order to add a Practice or Quiz to it.
(Edit Title)35/ 100
This lesson has been added to your library.
|Searching in:
| |
|
Looks like this FlexBook 2.0 has changed since you visited it last time. We found the following sections in the book that match the one you are looking for:
Go to the Table of Contents |
2004 | https://openstax.org/books/university-physics-volume-2/pages/6-2-explaining-gausss-law | Skip to Content
Go to accessibility page
Keyboard shortcuts menu
Log in
University Physics Volume 2
6.2 Explaining Gauss’s Law
University Physics Volume 2
6.2
Explaining Gauss’s Law
Search for key terms or text.
Learning Objectives
By the end of this section, you will be able to:
State Gauss’s law
Explain the conditions under which Gauss’s law may be used
Apply Gauss’s law in appropriate systems
We can now determine the electric flux through an arbitrary closed surface due to an arbitrary charge distribution. We found that if a closed surface does not have any charge inside where an electric field line can terminate, then any electric field line entering the surface at one point must necessarily exit at some other point of the surface. Therefore, if a closed surface does not have any charges inside the enclosed volume, then the electric flux through the surface is zero. Now, what happens to the electric flux if there are some charges inside the enclosed volume? Gauss’s law gives a quantitative answer to this question.
To get a feel for what to expect, let’s calculate the electric flux through a spherical surface around a positive point charge q, since we already know the electric field in such a situation. Recall that when we place the point charge at the origin of a coordinate system, the electric field at a point P that is at a distance r from the charge at the origin is given by
E⃗ P=14πε0qr2rˆ,
where rˆ is the radial unit vector from the charge at the origin to the point P. We can use this electric field to find the flux through the spherical surface of radius R, as shown in Figure 6.13.
Figure
6.13
A closed spherical surface surrounding a point charge q.
Then we apply Φ=∫SE⃗ ⋅nˆdA to this system and substitute known values. On the sphere, nˆ=rˆ and r=R, so for an infinitesimal area dA,
dΦ=E→⋅nˆdA=14πε0qR2rˆ⋅rˆdA=14πε0qR2dA.
We now find the net flux by integrating this flux over the surface of the sphere:
Φ=14πε0qR2∮SdA=14πε0qR2(4πR2)=qε0.
where the total surface area of the spherical surface is 4πR2. This gives the flux through the closed spherical surface at radius r as
Φ=qε0.
6.4
A remarkable fact about this equation is that the flux is independent of the size of the spherical surface. This can be directly attributed to the fact that the electric field of a point charge decreases as 1/r2 with distance, which just cancels the r2 rate of increase of the surface area.
Electric Field Lines Picture
An alternative way to see why the flux through a closed spherical surface is independent of the radius of the surface is to look at the electric field lines. Note that every field line from q that pierces the surface at radius R1 also pierces the surface at R2 (Figure 6.14).
Figure
6.14
Flux through spherical surfaces of radii R1 and R2 enclosing a charge q are equal, independent of the size of the surface, since all E-field lines that pierce one surface from the inside to outside direction also pierce the other surface in the same direction.
Therefore, the net number of electric field lines passing through the two surfaces from the inside to outside direction is equal. This net number of electric field lines, which is obtained by subtracting the number of lines in the direction from outside to inside from the number of lines in the direction from inside to outside gives a visual measure of the electric flux through the surfaces.
You can see that if no charges are included within a closed surface, then the electric flux through it must be zero. A typical field line enters the surface at dA1 and leaves at dA2. Every line that enters the surface must also leave that surface. Hence the net “flow” of the field lines into or out of the surface is zero (Figure 6.15(a)). The same thing happens if charges of equal and opposite sign are included inside the closed surface, so that the total charge included is zero (part (b)). A surface that includes the same amount of charge has the same number of field lines crossing it, regardless of the shape or size of the surface, as long as the surface encloses the same amount of charge (part (c)).
Figure
6.15
Understanding the flux in terms of field lines. (a) The electric flux through a closed surface due to a charge outside that surface is zero. (b) Charges are enclosed, but because the net charge included is zero, the net flux through the closed surface is also zero. (c) The shape and size of the surfaces that enclose a charge does not matter because all surfaces enclosing the same charge have the same flux.
Statement of Gauss’s Law
Gauss’s law generalizes this result to the case of any number of charges and any location of the charges in the space inside the closed surface. According to Gauss’s law, the flux of the electric field E→ through any closed surface, also called a Gaussian surface, is equal to the net charge enclosed (qenc) divided by the permittivity of free space (ε0):
ΦClosed Surface=qencε0.
This equation holds for charges of either sign, because we define the area vector of a closed surface to point outward. If the enclosed charge is negative (see Figure 6.16(b)), then the flux through either SorS' is negative.
Figure
6.16
The electric flux through any closed surface surrounding a point charge q is given by Gauss’s law. (a) Enclosed charge is positive. (b) Enclosed charge is negative.
The Gaussian surface does not need to correspond to a real, physical object; indeed, it rarely will. It is a mathematical construct that may be of any shape, provided that it is closed. However, since our goal is to integrate the flux over it, we tend to choose shapes that are highly symmetrical.
If the charges are discrete point charges, then we just add them. If the charge is described by a continuous distribution, then we need to integrate appropriately to find the total charge that resides inside the enclosed volume. For example, the flux through the Gaussian surface S of Figure 6.17 is Φ=(q1+q2+q5)/ε0. Note that qenc is simply the sum of the point charges. If the charge distribution were continuous, we would need to integrate appropriately to compute the total charge within the Gaussian surface.
Figure
6.17
The flux through the Gaussian surface shown, due to the charge distribution, is Φ=(q1+q2+q5)/ε0.
Recall that the principle of superposition holds for the electric field. Therefore, the total electric field at any point, including those on the chosen Gaussian surface, is the sum of all the electric fields present at this point. This allows us to write Gauss’s law in terms of the total electric field.
Gauss’s Law
The flux Φ of the electric field E→ through any closed surface S (a Gaussian surface) is equal to the net charge enclosed (qenc) divided by the permittivity of free space (ε0):
Φ=∮SE→⋅nˆdA=qencε0.
To use Gauss’s law effectively, you must have a clear understanding of what each term in the equation represents. The field E→ is the total electric field at every point on the Gaussian surface. This total field includes contributions from charges both inside and outside the Gaussian surface. However, qenc is just the charge inside the Gaussian surface. Finally, the Gaussian surface is any closed surface in space. That surface can coincide with the actual surface of a conductor, or it can be an imaginary geometric surface. The only requirement imposed on a Gaussian surface is that it be closed (Figure 6.18).
Figure
6.18
A Klein bottle partially filled with a liquid. Could the Klein bottle be used as a Gaussian surface?
Example 6.5
Electric Flux through Gaussian Surfaces
Calculate the electric flux through each Gaussian surface shown in Figure 6.19.
Figure
6.19
Various Gaussian surfaces and charges.
Strategy
From Gauss’s law, the flux through each surface is given by qenc/ε0, where qenc is the charge enclosed by that surface.
Solution
For the surfaces and charges shown, we find
Φ=2.0μCε0=2.3×105N⋅m2/C.
Φ=−2.0μCε0=−2.3×105N⋅m2/C.
Φ=2.0μCε0=2.3×105N⋅m2/C.
Φ=−4.0μC+6.0μC−1.0μCε0=1.1×105N⋅m2/C.
Φ=4.0μC+6.0μC−10.0μCε0=0.
Significance
In the special case of a closed surface, the flux calculations become a sum of charges. In the next section, this will allow us to work with more complex systems.
Check Your Understanding 6.3
Calculate the electric flux through the closed cubical surface for each charge distribution shown in Figure 6.20.
Figure
6.20
A cubical Gaussian surface with various charge distributions.
Interactive
Use this simulation to adjust the magnitude of the charge and the radius of the Gaussian surface around it. See how this affects the total flux and the magnitude of the electric field at the Gaussian surface.
Previous
Next
Order a print copy
Citation/Attribution
This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.
Want to cite, share, or modify this book? This book uses the
Creative Commons Attribution License and you must attribute OpenStax.
Attribution information
If you are redistributing all or part of this book in a print format,
then you must include on every physical page the following attribution:
Access for free at
If you are redistributing all or part of this book in a digital format,
then you must include on every digital page view the following attribution:
Access for free at
Citation information
Use the information below to generate a citation. We recommend using a
citation tool such as
this one.
Authors: Samuel J. Ling, William Moebs, Jeff Sanny
Publisher/website: OpenStax
Book title: University Physics Volume 2
Publication date: Oct 6, 2016
Location: Houston, Texas
Book URL:
Section URL:
© Jul 8, 2025 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo
are not subject to the Creative Commons license and may not be reproduced without the prior and express written
consent of Rice University. |
2005 | https://math.stackexchange.com/questions/1658476/inequalities-with-floor-function | Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Inequalities with floor function
Ask Question
Asked
Modified 9 years, 7 months ago
Viewed 7k times
6
$\begingroup$
I need some help with this exercise, I'm pretty new solving this exercises.
$$ \lfloor x \rfloor + \lfloor y \rfloor \le \lfloor x + y \rfloor \le \lfloor x \rfloor + \lfloor y \rfloor + 1$$
I know that I had to use the formal definition of the floor function, which is:
$$ \lfloor x \rfloor = \max {{ m \in \Bbb Z \mid m \le x}}$$
ceiling-and-floor-functions
Share
edited Feb 16, 2016 at 17:32
3SAT
7,63744 gold badges2929 silver badges4747 bronze badges
asked Feb 16, 2016 at 17:08
Jesus RamosJesus Ramos
6111 silver badge33 bronze badges
$\endgroup$
1
$\begingroup$ Hi @vonbrand, this a new topic to me, I just start seeing it yesterday. I tried to use the inequality property to prove $ \lfloor x \rfloor + \lfloor y \rfloor \le \lfloor x + y \rfloor \le \lfloor x \rfloor + \lfloor y \rfloor + 1$ first. I use this property: $$ a \le c; b \le d; a + b \le c+d $$ $\endgroup$
Jesus Ramos
– Jesus Ramos
2016-02-17 17:33:09 +00:00
Commented Feb 17, 2016 at 17:33
Add a comment |
4 Answers 4
Reset to default
5
$\begingroup$
Use that $x=\lfloor x\rfloor +\alpha,\,\alpha\in[0,1)$ and $y=\lfloor y\rfloor +\beta,\,\beta\in[0,1)$
$$\lfloor x+y\rfloor =\lfloor \lfloor x\rfloor+\alpha+\lfloor y\rfloor +\beta\rfloor\ge \lfloor x\rfloor+\lfloor y\rfloor $$ because $\lfloor x\rfloor+\alpha+\lfloor y\rfloor +\beta\ge \lfloor x\rfloor+\lfloor y\rfloor$ and therefore $\lfloor x+y\rfloor$ is at least $\lfloor x\rfloor+\lfloor y\rfloor$
For the other inequality: $$\lfloor x\rfloor+\alpha+\lfloor y\rfloor +\beta < \lfloor x\rfloor+\lfloor y\rfloor+2\Rightarrow $$ From here you see that one integer $m\in\mathbb Z$ that satisfies $$()\quad\quad m\leq \lfloor x\rfloor+\alpha+\lfloor y\rfloor +\beta $$ is $m=\lfloor x\rfloor+\lfloor y\rfloor$ and the greatest possible is $\lfloor x\rfloor+\lfloor y\rfloor+1$, because already $\lfloor x\rfloor+\lfloor y\rfloor+2>\lfloor x\rfloor+\lfloor y\rfloor+\alpha+\beta$ -see $()$. Therefore $$\lfloor x+y\rfloor =\lfloor \lfloor x\rfloor+\alpha+\lfloor y\rfloor +\beta\rfloor\leq \lfloor x\rfloor+\lfloor y\rfloor+1$$
Share
edited Feb 16, 2016 at 18:06
answered Feb 16, 2016 at 17:28
SvetoslavSvetoslav
5,32522 gold badges1919 silver badges3636 bronze badges
$\endgroup$
0
Add a comment |
3
$\begingroup$
$$ \lfloor x \rfloor + \lfloor y \rfloor \le \lfloor x + y \rfloor \le \lfloor x \rfloor + \lfloor y \rfloor + 1$$
Note that you can pull integers out from floor\ceil function
Hint: for three first cases
Case one: $x,y \in \mathbb{Z}$ so
$$x+y\le x+y \le x+y+1 $$
Case two $x\in \mathbb{Z}$ but $y\in \mathbb{R}$ and $y\notin \mathbb{Z}$
$$x + \lfloor y \rfloor \le x+\lfloor y \rfloor \le x+\lfloor y \rfloor +1$$
Case three $y\in \mathbb{Z}$ but $x\in \mathbb{R}$ and $x\notin \mathbb{Z}$
$$y+\lfloor x \rfloor \le y +\lfloor x \rfloor \le y+1+\lfloor x \rfloor $$
Now, try to prove case four: $x,y\in \mathbb{R}$ and $x,y\notin \mathbb{Z}$
Share
edited Feb 16, 2016 at 18:30
answered Feb 16, 2016 at 17:30
3SAT3SAT
7,63744 gold badges2929 silver badges4747 bronze badges
$\endgroup$
1
$\begingroup$ Thank you for update and take your time to answer my question @Nehorai. $\endgroup$
Jesus Ramos
– Jesus Ramos
2016-02-17 17:39:04 +00:00
Commented Feb 17, 2016 at 17:39
Add a comment |
3
$\begingroup$
I do not know how rigorous or formal you need/want to be but it's straight forward that $[x]$ is the unique integer such that $[x] \le x < [x] + 1$[]
Therefore $[x] \le x < [x] + 1$ and $[y] \le y < [y] + 1$ so $[x] + [y] \le x + y < [x] +[y] + 2$.
So there are two possible cases:
Case 1: $[x] + [y] \le x + y < [x] + [y] + 1$
This means $[x + y ] = [x] + [y]$. So $[x]+[y] = [x+y] < [x] + [y] + 1$.
Case 2: $[x] + [y] + 1 \le x + y < [x]+ [y] + 2$
This means $[x + y] = [x] + [y] + 1$. So $[x]+[y] < [x+y] = [x]+[y] + 1$.
And that's it.
[] Rigor and formality??
By the archemedian principal, for every real $x$, there is a unique integer $n$ such that $n \le x < n+ 1$.
$n \in \mathbb Z$ and $n \le x$ so $n \in {m \in \mathbb Z| m \le x}$. If $m \in \mathbb Z; m > n$ then $m \ge n+1 > x$ so $m \not \in {m \in \mathbb Z| m \le x}$.
So $n = \max {m \in \mathbb Z| m \le x} = [x]$.
Share
edited Feb 16, 2016 at 22:50
answered Feb 16, 2016 at 18:13
fleabloodfleablood
132k55 gold badges5252 silver badges142142 bronze badges
$\endgroup$
1
$\begingroup$ Thank you for your time @fleablood. $\endgroup$
Jesus Ramos
– Jesus Ramos
2016-02-17 17:37:13 +00:00
Commented Feb 17, 2016 at 17:37
Add a comment |
2
$\begingroup$
As said by Nehorai, you can pull any integer from the floor function, so it suffices to validate with $x,y\in[0,1)$.
Then $$ \lfloor x \rfloor + \lfloor y \rfloor \le \lfloor x + y \rfloor \le \lfloor x \rfloor + \lfloor y \rfloor + 1$$
becomes
$$ 0\le \lfloor x + y \rfloor \le 1,$$
which is obviously true as
$$0\le x+y<2.$$
Share
answered Feb 16, 2016 at 17:52
user65203user65203
$\endgroup$
0
Add a comment |
You must log in to answer this question.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
ceiling-and-floor-functions
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Related
3 Floor and ceiling function proof
3 Limit of sequence with floor function
Proof involving Big O and floor
1 how does a floor function work?
Proving a floor function is surjective
0 How are the following inequalities resolved? (Using Properties of floor function)
2 Equivalence relation with the floor function
0 Greatest Integer Function/Floor Function Definition? (Discrete Mathematics)
2 Computing integral with floor function
2 Identity with the floor function
Hot Network Questions
An odd question
Are there any alternatives to electricity that work/behave in a similar way?
Lingering odor presumably from bad chicken
Mishearing Monica’s line in Friends: “beacon that only dogs…” — is there a “then”?
Exchange a file in a zip file quickly
My dissertation is wrong, but I already defended. How to remedy?
How do I disable shadow visibility in the EEVEE material settings in Blender versions 4.2 and above?
Why is the definite article used in “Mi deporte favorito es el fútbol”?
Calculating the node voltage
How can I show that this sequence is aperiodic and is not even eventually-periodic.
Matthew 24:5 Many will come in my name!
Implications of using a stream cipher as KDF
Why is the fiber product in the definition of a Segal spaces a homotopy fiber product?
Is the cardinality of a set equal to the cardinality of the set of all smaller cardinalities?
How big of a hole can I drill in an exterior wall's bottom plate?
Verify a Chinese ID Number
Is this commentary on the Greek of Mark 1:19-20 accurate?
How random are Fraïssé limits really?
Help understanding moment of inertia
Are there any world leaders who are/were good at chess?
Two calendar months on the same page
Can a Box have a lifetime less than 'static?
How can I get Remote Desktop (RD) to scale properly AND set maximum windowed size?
Determine which are P-cores/E-cores (Intel CPU)
more hot questions
Question feed |
2006 | https://www.youtube.com/watch?v=MBRiaZeuS8c | Algebra 2: 1-2 Evaluate Expressions
MaeMap
38200 subscribers
7 likes
Description
1077 views
Posted: 1 Sep 2016
In this lesson video, we will review the order of operation (PEMDAS) which will be used to evaluate variable expressions throughout the remainder of this Algebra 2 unit. Please pay careful attention and take time to memorize the order in which to evaluate!
This is the lesson video. 👩🏫 To download the lesson worksheet please go to
➡️
Please support me: 💸 ☕
Happy learning!
Transcript:
Intro in this next video we're going to continue reviewing and we're going to go over evaluating expressions but Before we jump into that let's go over order of operations again so when you hear order Order of Operations of operations think PEMDAS remember parenthesis exponents multiplication and division and then addition and subtraction that is the order that you complete operations let's also review variable and what a variable is so variable is a letter or symbol that represents a certain number we can have X as our variable and X in one instance can equal to but in a later expression or equation X could equal negative 5 remember that the variable is changing in different problems so one problem you can have x equals 2 another problem you can have x equals negative 5 sometimes you'll use wise a b c and so on a Algebraic Expressions mathematical expression is like a statement so if i was to say 3-2 that's an expression an algebraic expression is a mathematical statement that contains a variable so an example of an algebraic expression could be B plus negative 5.3 or you could have x squared minus 2 those are algebraic expressions because they contain a variable so let's go ahead and evaluate an algebraic expression the algebraic expression I'm going to use in this video will be the following this is my algebraic expression 5 plus a squared minus 4 over B and i'm going to give you what your variables are equal to a is equal to 1 and b is equal to negative 2 so what's our first step in evaluating this expression first we're going to want to plug in our variables into the expression itself so we're going to have 5 plus a which a is equal to one so 5 plus 1 squared minus 4 over B which is negative 2 now we can evaluate it using the order of operations so what's first parentheses we have one set of parentheses and that's around the 5+1 so we evaluate what's inside of the parentheses first so 5 plus 1 is 6 so we're left with 6 squared minus 4 over negative 2 next we're going to evaluate the exponents there's one exponent in this problem which is the two so we're going to evaluate 6 squared 6 squared is 36 so now we've evaluated our exponent next is multiplication and division remember the order of multiplication division doesn't matter you just have to make sure you do those before addition and subtraction for us we only had division once in this problem and that's with the fraction sign this is 4 divided by negative 2 so we're going to evaluate that so we're going to get 36 minus 4 divided by negative 2 would be negative 2 however when you subtract a negative you're really adding the positive of that number so this instead of 36 minus negative 2 would be 36 plus 2 so now we've done our multiplication and division so we're left with just addition 36 plus 2 is 38 and we just evaluated our original algebraic expression 5 plus a squared minus 4 over B when I gave us answer of 38 when a was equal to 1 and B was equal to negative 2 so expressions are used with in equations in equations contain an equal sign an equation with a variable is known as an open sentence if that equation represents a relationship such as an area or perimeter of a shape then that equation would be known as a formula but in order to solve equations we must first go over some properties of real numbers which we'll do in the next video and don't forget to like and subscribe to my channel |
2007 | https://openstax.org/books/elementary-algebra-2e/pages/6-4-special-products | Skip to Content
Go to accessibility page
Keyboard shortcuts menu
Log in
Elementary Algebra 2e
6.4 Special Products
Elementary Algebra 2e
6.4
Special Products
Search for key terms or text.
Learning Objectives
By the end of this section, you will be able to:
Square a binomial using the Binomial Squares Pattern
Multiply conjugates using the Product of Conjugates Pattern
Recognize and use the appropriate special product pattern
Be Prepared 6.8
Before you get started, take this readiness quiz.
Simplify: ⓐ 9292 ⓑ (−9)2(−9)2 ⓒ −92.−92.
If you missed this problem, review Example 1.50.
Square a Binomial Using the Binomial Squares Pattern
Mathematicians like to look for patterns that will make their work easier. A good example of this is squaring binomials. While you can always get the product by writing the binomial twice and using the methods of the last section, there is less work to do if you learn to use a pattern.
| | |
--- |
| Let's start by looking at (x+9)2(x+9)2. | |
| What does this mean? | (x+9)2(x+9)2 |
| It means to multiply (x+9)(x+9) by itself. | (x+9)(x+9)(x+9)(x+9) |
| Then, using FOIL, we get: | x2+9x+9x+81x2+9x+9x+81 |
| Combining like terms gives: | x2+18x+81x2+18x+81 |
| | |
--- |
| Here's another one: | (y−7)2(y−7)2 |
| Multiply (y−7)(y−7) by itself. | (y−7)(y−7)(y−7)(y−7) |
| Using FOIL, we get: | y2−7y−7y+49y2−7y−7y+49 |
| And combining like terms: | y2−14y+49y2−14y+49 |
| | |
--- |
| And one more: | (2x+3)2(2x+3)2 |
| Multiply. | (2x+3)(2x+3)(2x+3)(2x+3) |
| Use FOIL: | 4x2+6x+6x+94x2+6x+6x+9 |
| Combine like terms. | 4x2+12x+94x2+12x+9 |
Look at these results. Do you see any patterns?
What about the number of terms? In each example we squared a binomial and the result was a trinomial.
(a+b)2=____+____+____
(a+b)2=____+____+____
Now look at the first term in each result. Where did it come from?
The first term is the product of the first terms of each binomial. Since the binomials are identical, it is just the square of the first term!
(a+b)2=a2+____+____
(a+b)2=a2+____+____
To get the first term of the product, square the first term.
Where did the last term come from? Look at the examples and find the pattern.
The last term is the product of the last terms, which is the square of the last term.
(a+b)2=____+____+b2
(a+b)2=____+____+b2
To get the last term of the product, square the last term.
Finally, look at the middle term. Notice it came from adding the “outer” and the “inner” terms—which are both the same! So the middle term is double the product of the two terms of the binomial.
(a+b)2=____+2ab+____(a−b)2=____−2ab+____
(a+b)2=____+2ab+____(a−b)2=____−2ab+____
To get the middle term of the product, multiply the terms and double their product.
Putting it all together:
Binomial Squares Pattern
If aandbaandb are real numbers,
(a+b)2=a2+2ab+b2(a−b)2=a2−2ab+b2
(a+b)2=a2+2ab+b2(a−b)2=a2−2ab+b2
To square a binomial:
square the first term
square the last term
double their product
A number example helps verify the pattern.
| | |
--- |
| | (10+4)2(10+4)2 |
| Square the first term. | 102+___+102+___+ |
| Square the last term. | 102+___+42102+___+42 |
| Double their product. | 102+2·10·4+42102+2⋅10⋅4+42 |
| Simplify. | 100+80+16100+80+16 |
| Simplify. | 196196 |
To multiply (10+4)2(10+4)2 usually you’d follow the Order of Operations.
(10+4)2(14)2196
(10+4)2(14)2196
The pattern works!
Example 6.47
Multiply: (x+5)2.(x+5)2.
Solution
| | |
--- |
| | |
| Square the first term. | |
| Square the last term. | |
| Double the product. | |
| Simplify. | |
Try It 6.93
Multiply: (x+9)2.(x+9)2.
Try It 6.94
Multiply: (y+11)2.(y+11)2.
Example 6.48
Multiply: (y−3)2.(y−3)2.
Solution
| | |
--- |
| | |
| Square the first term. | |
| Square the last term. | |
| Double the product. | |
| Simplify. | |
Try It 6.95
Multiply: (x−9)2.(x−9)2.
Try It 6.96
Multiply: (p−13)2.(p−13)2.
Example 6.49
Multiply: (4x+6)2.(4x+6)2.
Solution
| | |
--- |
| | |
| Use the pattern. | |
| Simplify. | |
Try It 6.97
Multiply: (6x+3)2.(6x+3)2.
Try It 6.98
Multiply: (4x+9)2.(4x+9)2.
Example 6.50
Multiply: (2x−3y)2.(2x−3y)2.
Solution
| | |
--- |
| | |
| Use the pattern. | |
| Simplify. | |
Try It 6.99
Multiply: (2c−d)2.(2c−d)2.
Try It 6.100
Multiply: (4x−5y)2.(4x−5y)2.
Example 6.51
Multiply: (4u3+1)2.(4u3+1)2.
Solution
| | |
--- |
| | |
| Use the pattern. | |
| Simplify. | |
Try It 6.101
Multiply: (2x2+1)2.(2x2+1)2.
Try It 6.102
Multiply: (3y3+2)2.(3y3+2)2.
Multiply Conjugates Using the Product of Conjugates Pattern
We just saw a pattern for squaring binomials that we can use to make multiplying some binomials easier. Similarly, there is a pattern for another product of binomials. But before we get to it, we need to introduce some vocabulary.
What do you notice about these pairs of binomials?
(x−9)(x+9)(y−8)(y+8)(2x−5)(2x+5)
(x−9)(x+9)(y−8)(y+8)(2x−5)(2x+5)
Look at the first term of each binomial in each pair.
Notice the first terms are the same in each pair.
Look at the last terms of each binomial in each pair.
Notice the last terms are the same in each pair.
Notice how each pair has one sum and one difference.
A pair of binomials that each have the same first term and the same last term, but one is a sum and one is a difference has a special name. It is called a conjugate pair and is of the form (a−b),(a+b)(a−b),(a+b).
Conjugate Pair
A conjugate pair is two binomials of the form
(a−b),(a+b).
(a−b),(a+b).
The pair of binomials each have the same first term and the same last term, but one binomial is a sum and the other is a difference.
There is a nice pattern for finding the product of conjugates. You could, of course, simply FOIL to get the product, but using the pattern makes your work easier.
Let’s look for the pattern by using FOIL to multiply some conjugate pairs.
(x−9)(x+9)(y−8)(y+8)(2x−5)(2x+5)x2+9x−9x−81y2+8y−8y−644x2+10x−10x−25x2−81y2−644x2−25
(x−9)(x+9)x2+9x−9x−81x2−81(y−8)(y+8)y2+8y−8y−64y2−64(2x−5)(2x+5)4x2+10x−10x−254x2−25
Each first term is the product of the first terms of the binomials, and since they are identical it is the square of the first term.
(a+b)(a−b)=a2−____To get thefirst term, square the first term.
(a+b)(a−b)=a2−____To get thefirst term, square the first term.
The last term came from multiplying the last terms, the square of the last term.
(a+b)(a−b)=a2−b2To get thelast term, square the last term.
(a+b)(a−b)=a2−b2To get thelast term, square the last term.
What do you observe about the products?
The product of the two binomials is also a binomial! Most of the products resulting from FOIL have been trinomials.
Why is there no middle term? Notice the two middle terms you get from FOIL combine to 0 in every case, the result of one addition and one subtraction.
The product of conjugates is always of the form a2−b2a2−b2. This is called a difference of squares.
This leads to the pattern:
Product of Conjugates Pattern
If aandbaandb are real numbers,
The product is called a difference of squares.
To multiply conjugates, square the first term, square the last term, and write the product as a difference of squares.
Let’s test this pattern with a numerical example.
| | |
--- |
| | (10−2)(10+2)(10−2)(10+2) |
| It is the product of conjudgates, so the result will be the difference of two squares. | ____−________−____ |
| Square the first term. | 102−____102−____ |
| Square the last term. | 102−22102−22 |
| Simplify. | 100−4100−4 |
| Simplify. | 9696 |
| What do you get using the order of operations? | |
| | (10−2)(10+2)(8)(12)96(10−2)(10+2)(8)(12)96 |
Notice, the result is the same!
Example 6.52
Multiply: (x−8)(x+8).(x−8)(x+8).
Solution
First, recognize this as a product of conjugates. The binomials have the same first terms, and the same last terms, and one binomial is a sum and the other is a difference.
| | |
--- |
| It fits the pattern. | |
| Square the first term, x. | |
| Square the last term, 8. | |
| The product is a difference of squares. | |
Try It 6.103
Multiply: (x−5)(x+5).(x−5)(x+5).
Try It 6.104
Multiply: (w−3)(w+3).(w−3)(w+3).
Example 6.53
Multiply: (2x+5)(2x−5).(2x+5)(2x−5).
Solution
Are the binomials conjugates?
| | |
--- |
| It is the product of conjugates. | |
| Square the first term, 2x. | |
| Square the last term, 5. | |
| Simplify. The product is a difference of squares. | |
Try It 6.105
Multiply: (6x+5)(6x−5).(6x+5)(6x−5).
Try It 6.106
Multiply: (2x+7)(2x−7).(2x+7)(2x−7).
The binomials in the next example may look backwards – the variable is in the second term. But the two binomials are still conjugates, so we use the same pattern to multiply them.
Example 6.54
Find the product: (3+5x)(3−5x).(3+5x)(3−5x).
Solution
| | |
--- |
| It is the product of conjugates. | |
| Use the pattern. | |
| Simplify. | |
Try It 6.107
Multiply: (7+4x)(7−4x).(7+4x)(7−4x).
Try It 6.108
Multiply: (9−2y)(9+2y).(9−2y)(9+2y).
Now we’ll multiply conjugates that have two variables.
Example 6.55
Find the product: (5m−9n)(5m+9n).(5m−9n)(5m+9n).
Solution
| | |
--- |
| This fits the pattern. | |
| Use the pattern. | |
| Simplify. | |
Try It 6.109
Find the product: (4p−7q)(4p+7q).(4p−7q)(4p+7q).
Try It 6.110
Find the product: (3x−y)(3x+y).(3x−y)(3x+y).
Example 6.56
Find the product: (cd−8)(cd+8).(cd−8)(cd+8).
Solution
| | |
--- |
| This fits the pattern. | |
| Use the pattern. | |
| Simplify. | |
Try It 6.111
Find the product: (xy−6)(xy+6).(xy−6)(xy+6).
Try It 6.112
Find the product: (ab−9)(ab+9).(ab−9)(ab+9).
Example 6.57
Find the product: (6u2−11v5)(6u2+11v5).(6u2−11v5)(6u2+11v5).
Solution
| | |
--- |
| This fits the pattern. | |
| Use the pattern. | |
| Simplify. | |
Try It 6.113
Find the product: (3x2−4y3)(3x2+4y3).(3x2−4y3)(3x2+4y3).
Try It 6.114
Find the product: (2m2−5n3)(2m2+5n3).(2m2−5n3)(2m2+5n3).
Recognize and Use the Appropriate Special Product Pattern
We just developed special product patterns for Binomial Squares and for the Product of Conjugates. The products look similar, so it is important to recognize when it is appropriate to use each of these patterns and to notice how they differ. Look at the two patterns together and note their similarities and differences.
Comparing the Special Product Patterns
| | |
--- |
| Binomial Squares | Product of Conjugates |
| (a+b)2=a2+2ab+b2(a+b)2=a2+2ab+b2 | (a−b)(a+b)=a2−b2(a−b)(a+b)=a2−b2 |
| (a−b)2=a2−2ab+b2(a−b)2=a2−2ab+b2 | |
| - Squaring a binomial | - Multiplying conjugates |
| - Product is a trinomial | - Product is a binomial |
| - Inner and outer terms with FOIL are the same. | - Inner and outer terms with FOIL are opposites. |
| - Middle term is double the product of the terms. | - There is no middle term. |
Example 6.58
Choose the appropriate pattern and use it to find the product:
ⓐ (2x−3)(2x+3)(2x−3)(2x+3) ⓑ (8x−5)2(8x−5)2 ⓒ (6m+7)2(6m+7)2 ⓓ (5x−6)(6x+5)(5x−6)(6x+5)
Solution
ⓐ (2x−3)(2x+3)(2x−3)(2x+3) These are conjugates. They have the same first numbers, and the same last numbers, and one binomial is a sum and the other is a difference. It fits the Product of Conjugates pattern.
| | |
--- |
| This fits the pattern. | |
| Use the pattern. | |
| Simplify. | |
2. ⓑ (8x−5)2(8x−5)2 We are asked to square a binomial. It fits the binomial squares pattern.
| | |
--- |
| | |
| Use the pattern. | |
| Simplify. | |
3. ⓒ (6m+7)2(6m+7)2 Again, we will square a binomial so we use the binomial squares pattern.
| | |
--- |
| | |
| Use the pattern. | |
| Simplify. | |
4. ⓓ (5x−6)(6x+5)(5x−6)(6x+5) This product does not fit the patterns, so we will use FOIL.
| | |
--- |
| | (5x−6)(6x+5)(5x−6)(6x+5) |
| Use FOIL. | 30x2+25x−36x−3030x2+25x−36x−30 |
| Simplify. | 30x2−11x−3030x2−11x−30 |
Try It 6.115
Choose the appropriate pattern and use it to find the product:
ⓐ (9b−2)(2b+9)(9b−2)(2b+9) ⓑ (9p−4)2(9p−4)2 ⓒ (7y+1)2(7y+1)2 ⓓ (4r−3)(4r+3)(4r−3)(4r+3)
Try It 6.116
Choose the appropriate pattern and use it to find the product:
ⓐ (6x+7)2(6x+7)2 ⓑ (3x−4)(3x+4)(3x−4)(3x+4) ⓒ (2x−5)(5x−2)(2x−5)(5x−2) ⓓ (6n−1)2(6n−1)2
Media
Access these online resources for additional instruction and practice with special products:
Special Products
Section 6.4 Exercises
Practice Makes Perfect
Square a Binomial Using the Binomial Squares Pattern
In the following exercises, square each binomial using the Binomial Squares Pattern.
(w+4)2(w+4)2
303.
(q+12)2(q+12)2
(y+14)2(y+14)2
305.
(x+23)2(x+23)2
(b−7)2(b−7)2
307.
(y−6)2(y−6)2
(m−15)2(m−15)2
309.
(p−13)2(p−13)2
(3d+1)2(3d+1)2
311.
(4a+10)2(4a+10)2
(2q+13)2(2q+13)2
313.
(3z+15)2(3z+15)2
(3x−y)2(3x−y)2
315.
(2y−3z)2(2y−3z)2
(15x−17y)2(15x−17y)2
317.
(18x−19y)2(18x−19y)2
(3x2+2)2(3x2+2)2
319.
(5u2+9)2(5u2+9)2
(4y3−2)2(4y3−2)2
321.
(8p3−3)2(8p3−3)2
Multiply Conjugates Using the Product of Conjugates Pattern
In the following exercises, multiply each pair of conjugates using the Product of Conjugates Pattern.
(m−7)(m+7)(m−7)(m+7)
323.
(c−5)(c+5)(c−5)(c+5)
(x+34)(x−34)(x+34)(x−34)
325.
(b+67)(b−67)(b+67)(b−67)
(5k+6)(5k−6)(5k+6)(5k−6)
327.
(8j+4)(8j−4)(8j+4)(8j−4)
(11k+4)(11k−4)(11k+4)(11k−4)
329.
(9c+5)(9c−5)(9c+5)(9c−5)
(11−b)(11+b)(11−b)(11+b)
331.
(13−q)(13+q)(13−q)(13+q)
(5−3x)(5+3x)(5−3x)(5+3x)
333.
(4−6y)(4+6y)(4−6y)(4+6y)
(9c−2d)(9c+2d)(9c−2d)(9c+2d)
335.
(7w+10x)(7w−10x)(7w+10x)(7w−10x)
(m+23n)(m−23n)(m+23n)(m−23n)
337.
(p+45q)(p−45q)(p+45q)(p−45q)
(ab−4)(ab+4)(ab−4)(ab+4)
339.
(xy−9)(xy+9)(xy−9)(xy+9)
(uv−35)(uv+35)(uv−35)(uv+35)
341.
(rs−27)(rs+27)(rs−27)(rs+27)
(2x2−3y4)(2x2+3y4)(2x2−3y4)(2x2+3y4)
343.
(6m3−4n5)(6m3+4n5)(6m3−4n5)(6m3+4n5)
(12p3−11q2)(12p3+11q2)(12p3−11q2)(12p3+11q2)
345.
(15m2−8n4)(15m2+8n4)(15m2−8n4)(15m2+8n4)
Recognize and Use the Appropriate Special Product Pattern
In the following exercises, find each product.
ⓐ (p−3)(p+3)(p−3)(p+3)
ⓑ (t−9)2(t−9)2
ⓒ (m+n)2
ⓓ (2x+y)(x−2y)
347.
ⓐ (2r+12)2
ⓑ (3p+8)(3p−8)
ⓒ (7a+b)(a−7b)
ⓓ (k−6)2
ⓐ (a5−7b)2
ⓑ (x2+8y)(8x−y2)
ⓒ (r6+s6)(r6−s6)
ⓓ (y4+2z)2
349.
ⓐ (x5+y5)(x5−y5)
ⓑ (m3−8n)2
ⓒ (9p+8q)2
ⓓ (r2−s3)(r3+s2)
Everyday Math
Mental math You can use the product of conjugates pattern to multiply numbers without a calculator. Say you need to multiply 47 times 53. Think of 47 as 50−3 and 53 as 50+3.
ⓐ Multiply (50−3)(50+3) by using the product of conjugates pattern, (a−b)(a+b)=a2−b2.
ⓑ Multiply 47·53 without using a calculator.
ⓒ Which way is easier for you? Why?
351.
Mental math You can use the binomial squares pattern to multiply numbers without a calculator. Say you need to square 65. Think of 65 as 60+5.
ⓐ Multiply (60+5)2 by using the binomial squares pattern, (a+b)2=a2+2ab+b2.
ⓑ Square 65 without using a calculator.
ⓒ Which way is easier for you? Why?
Writing Exercises
How do you decide which pattern to use?
353.
Why does (a+b)2 result in a trinomial, but (a−b)(a+b) result in a binomial?
Marta did the following work on her homework paper:
(3−y)232−y29−y2
Explain what is wrong with Marta’s work.
355.
Use the order of operations to show that (3+5)2 is 64, and then use that numerical example to explain why (a+b)2≠a2+b2.
Self Check
ⓐ After completing the exercises, use this checklist to evaluate your mastery of the objectives of this section.
ⓑ On a scale of 1-10, how would you rate your mastery of this section in light of your responses on the checklist? How can you improve this?
Previous
Next
Order a print copy
Citation/Attribution
This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.
Want to cite, share, or modify this book? This book uses the
Creative Commons Attribution License and you must attribute OpenStax.
Attribution information
If you are redistributing all or part of this book in a print format,
then you must include on every physical page the following attribution:
Access for free at
If you are redistributing all or part of this book in a digital format,
then you must include on every digital page view the following attribution:
Access for free at
Citation information
Use the information below to generate a citation. We recommend using a
citation tool such as
this one.
Authors: Lynn Marecek, MaryAnne Anthony-Smith, Andrea Honeycutt Mathis
Publisher/website: OpenStax
Book title: Elementary Algebra 2e
Publication date: Apr 22, 2020
Location: Houston, Texas
Book URL:
Section URL:
© Jul 8, 2025 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo
are not subject to the Creative Commons license and may not be reproduced without the prior and express written
consent of Rice University. |
2008 | https://www.cs.toronto.edu/~toni/Courses/Complexity2015/handouts/monotone.pdf | Comput. complex. 8 (1999), 1 – 20 1016-3328/99/010001–20 $ 1.50+0.20/0 c ⃝Birkh¨ auser Verlag, Basel 1999 computational complexity SYMMETRIC APPROXIMATION ARGUMENTS FOR MONOTONE LOWER BOUNDS WITHOUT SUNFLOWERS Christer Berg Staffan Ulfberg Abstract. We propose a symmetric version of Razborov’s method of approximation to prove lower bounds for monotone circuit complex-ity. Traditionally, only DNF formulas have been used as approximators, whereas we use both CNF and DNF formulas. As a consequence we no longer need the Sunflower Lemma that has been essential for the method of approximation.
The new approximation argument corres-ponds to Haken’s recent method for proving lower bounds for monotone circuit complexity (counting bottlenecks) in a natural way.
We provide lower bounds for the BMS problem introduced by Haken, Andreev’s polynomial problem, and for Clique. The exponential bounds obtained are the same as those previously best known for the respective problems.
Key words. Circuit complexity; lower bounds; monotone circuits.
Subject classifications. 68Q25.
1. Introduction The difficulty of proving super-linear lower bounds for general circuit complex-ity has led to the study of various restrictions of this computational model. One of these is monotone circuits, i.e., only AND gates and OR gates are allowed.
Since many important problems in complexity theory are monotone, this com-putational model seems to be a natural one. Examples of monotone graph problems are Clique, Vertex cover, and Hamiltonian path, which are all NP-complete. However, for a long time there had been no stronger lower bounds for monotone than for general circuits; the best one was only 4n (by Tieken-heinrich (1984)). A major breakthrough came in 1985, when Razborov (1985) invented the method of approximation.
It allowed him to prove a super-polynomial lower bound, as he showed that Clique requires monotone circuits of size nΩ(log n). Shortly thereafter, Andreev (1985) applied Razborov’s technique 2 Berg & Ulfberg cc 8 (1999) to another function and was thereby able to prove an exponential lower bound.
Later, both these results were improved by Alon and Boppana (1987), and in particular, they were the first to prove an exponential lower bound for Clique.
For a nice exposition of this result, see Section 4 in the survey by Boppana and Sipser (1990).
The idea behind the approximation method is the following. The output of each gate in a given circuit is approximated by a function, the approximator for that gate. The goal is to find a set of approximator functions with the following properties. For every gate in the circuit, the approximator should introduce but a few errors. Also, the approximator for the output gate should differ from the function computed by the circuit for many input values. If this goal is accomplished, we will have proved that the circuit must be large, since errors in the approximator for the output gate must emerge from the approximation of some gate in the circuit.
In 1995, Haken (1995) proposed a new method for proving lower bounds for the size of monotone circuits, which he called “Bottleneck counting”. He demonstrated the method for a graph problem that resembles Clique. Instead of trying to approximate the behavior of the circuit, he defined a function µ which maps input graphs to gates of the circuit. To prove that the circuit contains many gates, he then showed that on the one hand the total number of graphs mapped by µ is large, but on the other hand, only a few graphs are being mapped to each gate.
One purpose of this paper is to show that Haken’s approach to lower bounds is in fact an approximation argument in disguise: it can be turned into an approximation argument by using approximators, which for a gate e, introduce errors for exactly those inputs that are mapped to e by Haken’s function µ.
The approximation version of Haken’s proof is in Section 5.
It is of course nice that Haken’s method of bottleneck counting works in es-sentially the same way as Razborov’s approximation method, but unfortunately this leads to the conclusion that it cannot be used to prove lower bounds better than Ω(n2) for general circuits. The reason for this is, as Razborov showed, that the method of approximation will not work very well for general circuits (1989).
Pudl´ ak (1997) extended Razborov’s approximation method to hold for cir-cuits consisting of bounded fan-in gates computing monotone real functions.
The corresponding extension of Haken’s method was made by Haken and Cook (1996). Based on Haken’s idea, Jukna (1997) was able to derive a general criterion for lower bounds that holds for both monotone boolean and monotone real circuits. Wigderson independently discovered that Haken’s method can be turned into an approximation argument, and he also noted that this holds cc 8 (1999) Symmetric Approximation Arguments 3 for the extension made by Haken and Cook. The extension to real monotone circuits can be found in Section 4.6 of Berg (1997).
Another purpose of the paper is to make the approximation method simpler and more symmetric. Our approximation argument, which is derived from the translation of Haken’s proof, differs from that of Razborov in that we use two approximator functions for each gate. Razborov used only one approximator function which is a monotone depth two circuit. Out of the two possibilities for the form of such circuits, a disjunction of conjunctions or the other way around, Razborov chose the former.
In this paper, however, we do not make this choice at all since we use two approximator functions for each gate—one for each of the two possible forms.
This seems like a natural thing to do, and one consequence is that we do not have to use the Sunflower Lemma by Erd˝ os and Rado (1960). The Sunflower Lemma is traditionally used to reduce the size of approximator functions while not reducing their approximation qualities too much.
The fact that we do not need this lemma is somewhat surprising since it is a central part in earlier approximation results. Although we are unable to improve the bounds obtained by Alon and Boppana, this approach leads to shorter and, to our thinking, simpler proofs.
Note that while most of the known lower bounds obtained using the method of approximation may benefit from being reformulated in this way, it is not clear that all of them do. We do not, for example, know how to present Razborov’s super-polynomial lower bound for perfect matching (which implies that mono-tone circuits are strictly less powerful than non-monotone) using CNF and DNF approximators.
1.1. Recent work.
Ideas from the bottleneck counting argument were also used by Amano and Maruoka (1996) to develop approximators similar to the ones presented in this paper.
They used the approximators to prove lower bounds for Clique and Andreev’s polynomial problem.
Simon and Tsai (1997) showed that the bottleneck counting argument is actually equivalent to the method of approximation. They provided a proof of the fact that errors in the approximation method correspond to mapped inputs in bottleneck counting.
2. Definitions A monotone circuit Ψ is a boolean circuit with AND gates (∧) and OR gates (∨), but without NOT gates. We let all gates have arbitrary fan-in and fan-out, 4 Berg & Ulfberg cc 8 (1999) and measure the size of a circuit, size(Ψ), by the number of gates contained therein.
The monotone functions, for which we provide lower bounds, are all graph problems. An input graph on n vertices is represented in a standard way: as n 2 variables xi,j whose value is 1 if the edge (i, j) exists.
The output of a gate e in Ψ when the input x is applied to the circuit is denoted by e(x). Let the output gate be eo so that the circuit Ψ computes the boolean function eo(x).
Our proofs are based on the method of approximation which was invented by Razborov (1985). It involves the use of a boolean function to approximate the output of every gate in a given circuit. The approximator functions used by Razborov, Andreev (1985), and Alon and Boppana (1987) are all monotone DNF formulas.
The proofs in this paper, however, are influenced by the work of Haken (1995), and every gate e in a circuit Ψ is approximated by two functions f D and f C e , the approximators for the gate e. The approximator f D has the form C1∨C2∨. . .∨Ct, where Ci is a conjunction of limited size: all conjunctions have less than c distinct literals. The approximator f C e has the form D1∧D2∧. . .∧Ds, where Di is a disjunction containing less than d distinct literals. (Notice that we put no explicit restriction on the numbers s and t.) The following characteristics of the approximator functions f D and f C e are essential to the proof.
1. The approximators f D eo(x) and f C eo(x) fail to correctly represent the output of Ψ for many inputs x.
2. For every gate e, the number of inputs for which the approximators in-troduce errors (measured in a specific way) is small.
For every x for which the approximators for eo fail, the error must have been introduced in at least one of the gates in Ψ. We can therefore draw the conclusion that Ψ contains many gates.
For convenience, we consider the inputs to the circuit as being gates them-selves, and for an input variable xi,j, we simply define f D xi,j = f C xi,j = xi,j. We also define empty disjunctions to have the value 0, and empty conjunctions to have the value 1.
Definition 1. For a gate e and an input x for which e(x) = eo(x), we say that the approximator f D fails for x if f D(x) ̸= e(x), and that the approximator f C e fails for x, if f C e (x) ̸= e(x).
cc 8 (1999) Symmetric Approximation Arguments 5 If either f D or f C e fails for x, we say that the approximators for the gate e fail for the input x.
A central notion of the proofs is counting the number of errors that are introduced in the gates of Ψ. This is defined as follows.
Definition 2. An approximator, f D or f C e , is said to introduce an error for the input x if it fails on the input x, but none of the approximators for the input gates to e fail for the input x.
If either f D or f C e introduces an error for the input x, we say that the approximators for the gate e introduce an error for the input x.
We now describe how an ∧gate e is approximated, assuming that its input gates are already approximated by f D e1, f D e2, . . . , f D em and f C e1, f C e2, . . . , f C em. The approximator f C e is simply defined as f C e = m ^ i=1 f C ei = s ^ i=1 Di, in which all disjunctions still have length at most d. If none of f C e1, f C e2, . . . , f C em fails for the input x, neither will f C e , so the approximator f C e introduces no errors.
The approximator f D should be a disjunction of conjunctions; it is formed by converting f C e into the form t _ i=1 Ci.
The standard way of doing this is to form a conjunction Ci for every possible way of picking one literal from each disjunction Di in f C e . All conjunctions that have at least c distinct literals are then discarded, which means that long conjunctions are approximated by the constant 0.
In the proofs to follow, we need to establish upper bounds for the number of errors introduced when forming f D from f C e . To get as good bounds as possible, we have to be more careful when forming f D (so that more conjunctions get shorter than c). We will shortly describe the process we actually use in detail.
Returning to the definitions of f D and f C e , we note that f D is produced from f C e , which, in turn, is constructed from the approximators f C ei of the input gates. Thus, when approximating an ∧gate, we do not use the approximators f D ei for the input gates.
6 Berg & Ulfberg cc 8 (1999) The approximator functions for an ∨gate e are formed analogously. We construct f D from the approximators f D ei of the input gates; this introduces no errors. The disjunction of conjunctions is then converted into a conjunction of disjunctions, and disjunctions with at least d distinct literals are discarded (they are in effect approximated by the constant 1). Notice that the way the approximators are constructed, we have f D ≤f C e for all gates e.
We now end this section by describing the details involved when converting f C e to f D in an ∧gate (this part is analogous for ∨gates as well).
A set of conjunctions is formed which have the property that at least one of them is satisfied if and only if all disjunctions in f C e are satisfied.
The approximator f D is then formed from all resulting conjunctions shorter than c.
The rewriting process can be viewed as the construction of a tree: Each edge in the tree is labeled by a literal. For every node v in the tree, we define a corresponding conjunction that is formed by all literals on the path from the root to v. At the root we create one labeled edge to a new child for each of the literals in the first disjunction. We say that we have expanded D1 under the root.
Suppose w is a leaf that was created while expanding Di, and that C is the conjunction corresponding to w. Then, D1, . . . , Di are all satisfied if C is satisfied. We now take care of Di+1.
First consider the case when C is satisfied.
In this case, we know that for all accepting instances of the problem, at least one of the literals in Di+1, say xu,v, must be satisfied as well. (This happens if Di+1 contains a literal in common with C, but it could also happen in some other situations if there are restrictions on the possible inputs.) We then make only one new child under w for the literal xu,v and skip the rest of Di+1. This results in fewer leaves in the tree and therefore fewer conjunctions. Otherwise, we expand the disjunction Di+1 under w.
The result is that if the conjunction corresponding to one of the new children is satisfied, so is Di+1. Conversely, if all of D1, . . . , Di+1 are satisfied, there is a node on depth i + 1 in the tree whose corresponding conjunction is satisfied.
When there are no more leaves for which there are remaining disjunctions to expand, we are done, and we get one conjunction for each leaf in the tree.
Leaves whose corresponding conjunctions have at least c distinct literals are then removed, which is why f D may make an error for some inputs.
Note that such inputs are always accepted by some conjunction (correspond-ing to a node in the tree) that has exactly c distinct literals, and bounding the number of such conjunctions is the reason for constructing the tree. By count-ing the number of inputs accepted by each conjunction, we can get an upper cc 8 (1999) Symmetric Approximation Arguments 7 bound for the number of errors introduced by f D.
3. The proof method Although they differ in details, the basic strategy for the proofs is the same in the following sections. In this section we therefore describe the strategy by giving generic versions of the theorem, and of the lemmas that are used in the proof of the theorem.
The generic theorem and lemmas contain various unspecified entities, such as numerical functions α, β, and γ. The outline can be turned into an actual proof of an actual theorem by specifying these entities (and checking their required properties).
Let MGP(n) be a monotone language on graphs with n input variables (which indicate the presence or absence of edges). For some function h(n), we want to prove the following.
Generic Theorem.
The monotone circuit complexity for MGP(n) is at least h(n).
Generic proof.
Suppose we are given a circuit Ψ that correctly decides MGP(n). In order to prove that Ψ must consist of at least h(n) gates, we study two subsets of the possible input graphs: the positive test graphs, which are subsets of the graphs in MGP(n), and the negative test graphs, which are subsets of the graphs not in MGP(n). Let γ1(n) be the number of positive test graphs and γ0(n) the number of negative test graphs.
Instead of directly proving that a circuit that decides MGP(n) must be large, we prove that a circuit that separates the positive and negative test graphs from each other must be large; choosing the test graphs in a suitable way is of course essential.
We start by showing that the approximators for the output gate of Ψ fail for most inputs.
Generic Lemma A. At the output gate eo, the approximators either fail for all negative test graphs, or they fail for at least half of the positive test graphs.
Generic proof. Assume that the approximators do not fail for all negative test graphs; otherwise there is nothing to prove. Hence, there exists a negative test graph b, such that f C eo(b) = 0, which implies that f C eo contains a disjunction D. Furthermore, for all positive test graphs g on which f C eo is correct, we must have D(g) = 1. Since D contains less than d distinct literals, we can bound the fraction of positive test graphs for which f C eo = 1 by multiplying the fraction of 8 Berg & Ulfberg cc 8 (1999) positive test graphs for which any specific edge is present with d. A suitable choice of d proves the lemma.
□ The next objective is to bound the number of inputs for which the approx-imators introduce errors at a single gate. Assume e is an ∧gate. In this case f C e introduces no errors at all, and hence, we need only study f D. Also, since f D ≤f C e , no errors are ever introduced for negative test graphs in ∧gates. The next two lemmas introduce the functions α and β as bounds for the number of errors introduced in a single ∧and ∨gate, respectively.
Generic Lemma B. At an ∧gate e, the approximator f D introduces an error for at most α(n, c, d) positive test graphs.
Generic proof. To prove the lemma, we give an upper bound on the number of positive test graphs g such that C(g) = 1 (g is accepted by C), where C is any conjunction with c distinct literals corresponding to a node in the tree that represents the rewriting process.
For each node in the tree that has more than one child, the number of chil-dren is bounded by d, and descending to such a child always adds a distinct literal to the corresponding conjunction. There are therefore at most dc con-junctions with exactly c distinct literals. It remains to find out the number of positive test graphs accepted by each such conjunction.
This is easily done if the edges in the positive test graphs are present in-dependently from each other (as is the case in the lower bound for Andreev’s polynomial problem in Section 4). If the problems are specified in terms of vertices (e.g., the BMS problem in Section 5 and Clique in Section 6), we have to be a bit more careful since edges are not independent in the natural test graphs for these problems. Actually, in the proofs for these specific problems, we do not limit the number of distinct literals in conjunctions, but introduce another more natural measurement of their size.
The lemma should now follow from multiplying the number of conjunctions that have c distinct literals by the number of inputs accepted by each such conjunction.
□ The following lemma is analogous, and it is proved by bounding the number of errors introduced on negative test graphs when f C e is formed from f D.
Generic Lemma C. At an ∨gate e, the approximator f C e introduces an error for at most β(n, c, d) negative test graphs.
To finish the proof of the generic theorem, we need to consider the two cases cc 8 (1999) Symmetric Approximation Arguments 9 from Generic Lemma A. First, if the approximators fail for all negative test graphs, Generic Lemma C implies that size(Ψ) ≥γ0(n)/β(n, c, d). Otherwise, the approximators fail for at least half of the positive test graphs, and then Generic Lemma B implies that size(Ψ) ≥γ1(n)/(2α(n, c, d)). So if h(n) is less than both these values, it bounds MGP(n) as claimed in the Generic Theorem.
□ 4. Andreev’s polynomial problem The best lower bound for the size of monotone circuits computing any monotone function was proved by Alon and Boppana (1987). The function for which this bound was obtained was the same that Andreev (1985) used when he was the first to prove an exponential lower bound for a monotone problem.
We are given a bipartite graph G = (U, V, E) with vertex sets U = GF[q] and V = GF[q], where q is a prime power. The problem POLY(q, s) is to decide whether there exists a polynomial p over GF[q] of degree at most s −1, such that ∀i ∈U: (i, p(i)) ∈E.
Theorem 3 (Alon and Boppana (1987)). The monotone circuit com-plexity for POLY(q, s) is qΩ(s) when s ≤1 2 p q/ ln q.
Proof.
We first define the set of positive test graphs used in the proof. There are qs different polynomials of degree at most s −1, each of which corresponds to a positive test graph in a natural way: the polynomial p defines a test graph with the edges E = {(i, p(i)) | i ∈U}.
The negative test graphs are constructed randomly, by having each possible edge appear with probability 1 −ε for ε = (2s ln q)/q. Notice that this con-struction may result in all possible bipartite graphs on 2q vertices; therefore we need the following lemma.
Lemma 4. The probability that a negative test graph is in POLY(q, s) is at most q−s.
Proof.
The probability that the q specific edges that correspond to a certain polynomial are present in a randomly chosen negative test graph is (1−ε)q. So the probability that the edges corresponding to at least one of the qs possible polynomials are present in a random graph is at most qs(1 −ε)q ≤qse−εq = qsq−2s = q−s.
□ We choose the parameters c = s and d = q2/3/2.
10 Berg & Ulfberg cc 8 (1999) Lemma 5 (Specialization of Generic Lemma A). At the output gate eo, we either have that the approximator f C eo is identically 1, or that the ap-proximators for eo fail for at least half of the positive test graphs.
Proof.
If f C eo is identically 1, we are in the first case. Otherwise, there is a graph b such that f C eo(b) = 0, and hence there is a disjunction D in f C eo.
There are qs−1 positive test graphs that contain every specific edge, since fixing an edge is equivalent to fixing the value of a polynomial at one point. Thus, there are at most dqs−1 = qs−1/3/2 positive test graphs that contain at least one edge from D. Hence D (and therefore also f C eo) is 1 for at most a fraction qs−1/3/(2qs) = q−1/3/2 of the positive test graphs.
□ Lemma 6 (Specialization of Generic Lemma B). At an ∧gate e, f D in-troduces an error for at most dc positive test graphs.
Proof.
When rewriting f C e to f D, we can form at most dc conjunctions that contain c distinct literals, and for the current function, each removed conjunction introduces an error on at most one positive test graph. This follows since c = s and since a polynomial of degree s −1 is completely specified by s function points.
□ Lemma 7 (Specialization of Generic Lemma C). At an ∨gate e, the probability that f C e introduces an error for a random negative test graph is at most (cε)d.
Proof.
We bound the probability of an error being introduced for a random negative test graph by multiplying the number of disjunctions with d distinct literals, cd, by the probability that the d literals are 0 in one disjunction, which is εd.
□ Notice that, in particular, the upper bound in the lemma holds for the number of errors introduced for negative test graphs that are not in the lan-guage POLY(q, s).
To prove the theorem, we have to consider the two cases from Lemma 5.
If the approximators fail for at least half of the positive test graphs, we use Lemma 6 which states that the number of errors introduced in a single ∧gate is at most dc, and to get size(Ψ) ≥qs 2dc = 2sqs/3 2 ∈qΩ(s).
cc 8 (1999) Symmetric Approximation Arguments 11 If, on the other hand, the approximator f C eo is identically 1, the approximat-ors for eo fail for a random negative test graph with probability 1 −q−s ≥1/2 by Lemma 4. The probability of introducing an error in a single ∨gate is at most (cε)d; thus size(Ψ) ≥ 1 2(cε)d = 1 2 q 2s2 ln q q2/3/2 = 1 22q2/3/2 ∈qΩ(s).
□ 5. Broken Mosquito Screens The Broken Mosquito Screens (BMS) problem was introduced by Haken (1995) to illustrate how to count bottlenecks to show that monotone P ̸= NP. In this section we show that the same result can be obtained using our approximator formalism.
Haken defines the BMS problem for graphs with m2−2 vertices as the prob-lem of distinguishing good and bad graphs from each other. Graphs containing m −1 cliques of size m and one clique of size m −2 (but no other edges) are good; graphs containing m−1 independent sets of size m and one independent set of size m −2 but all other edges are bad. Hence, by taking the dual of a good graph (i.e., inverting all the input bits), we get a bad graph. Notice that not all graphs are either good or bad, but the definition can be extended to include all graphs. Haken shows that a monotone circuit that distinguishes good graphs from bad must be large.
We use the following extended definition of the BMS problem.
Definition 8. Instances of BMS(m) are graphs with m2 −2 vertices (m > 2).
A graph is in the language BMS(m) if there exists a partition of the vertices into m −1 sets of size m and one of size m −2, so that each of these subsets forms a clique.
Using this definition, it is easy to see that the BMS problem is monotone and in NP.
Theorem 9 (Haken (1995)). The monotone circuit complexity for BMS(m) is 2Ω(√m).
Proof.
We let the set of positive test graphs G for the BMS problem be all graphs with m2 −2 vertices that contain m −1 cliques of size m and one 12 Berg & Ulfberg cc 8 (1999) clique of size m −2, but no other edges. The set of negative test graphs B is all graphs on m2 −2 vertices that contain m−1 independent sets of size m and one independent set of size m −2, and where all other edges are present. Our positive and negative test graphs correspond to Haken’s good and bad graphs respectively.
Clearly, all positive test graphs are in the BMS language. Negative test graphs are not in the BMS language since they contain only m −2 cliques of size m.
Next we count the number of test graphs. Counting the number of positive test graphs is the same as counting the number of ways that a set of m2 −2 elements can be partitioned into m −1 sets containing m elements and one set containing m −2 elements. We get |G| = (m2 −2)!
(m!)(m−1)(m −2)!(m −1)! , (1) and by duality |B| = |G|.
For each conjunction and disjunction, let a graph correspond to it in the natural way: for every literal, include the corresponding edge in the graph.
Suppose we want to determine whether a positive test graph satisfies a con-junction C. This is the case when the graph corresponding to C is a subgraph of the positive test graph. Therefore, we only have to know how the vertices of the graph corresponding to C are divided into connected components to determine what positive test graphs are accepted by C.
In this section we do not limit the length of conjunctions and disjunctions by their number of literals, but instead we define their size by m2 −2 minus the number of connected components in their corresponding graphs, and require that their size be less than c and d respectively.
We choose c = d = ⌊√m⌋(since c = d we only use c), i.e., the graphs corresponding to the conjunctions and disjunctions in the approximators have more than m2 −2 −⌊√m⌋connected components. Note that, implicitly, the number of literals in conjunctions and disjunctions is bounded by c2/2 ≤m/2.
Lemma 10 (Specialization of Generic Lemma A). At the output gate eo, the approximators either fail for all negative test graphs, or they fail for at least half of the positive test graphs.
Proof.
If the approximator f C eo for the output gate fails for all the graphs in B, we are in the first case. Otherwise, let b ∈B be a graph for which the approximator does not fail at eo.
cc 8 (1999) Symmetric Approximation Arguments 13 Since f C eo(b) = 0, there is a disjunction D in f C eo, and as noted above, this disjunction contains less than c2/2 ≤m/2 literals.
The fraction of graphs in G that contain a specific one of these literals is less than 1/m, which can be seen as follows.
A graph in G has (m−1) m 2 + m−2 2 edges out of the possible m2−2 2 ones.
Since all edges are equally likely, this means that a specific edge appears in a fraction (m −1) m 2 + m−2 2 m2−2 2 < 1 m of the graphs in G. Thus, the fraction of G that contains at least one of the m/2 literals in D is at most 1/2. So, for at least half of all g ∈G, we have that D(g) = 0, and therefore also that f C eo(g) = 0.
□ Next, we establish an upper bound for the number of test graphs for which the approximators introduce an error at a single gate.
Lemma 11 (Specialization of Generic Lemma B). At an ∧gate e, the approximator f D introduces an error for at most m4c(m2 −2 −2c)!
2c(m!)(m−1)(m −2)!(m −1)!
(2) positive test graphs.
Proof.
We introduce errors on positive test graphs by removing conjunctions whose corresponding graphs contain at most m2 −2−c connected components.
When counting the number of positive test graphs for which an error is intro-duced, we consider different orderings of the vertices within the partitions and the order of the partitions as different graphs, and in the end we divide by the same denominator as in (1).
When building the tree, let w be the node that was created while expanding the disjunction Di, and let C be the conjunction corresponding to w.
Consider the case in which Di+1 contains a literal xu,v for which both end-points are in the same connected component in the graph corresponding to C.
Then, we create only one single child under w and label the edge xu,v. In this case, we know that xu,v is satisfied if C is, so dropping all other children does not introduce errors for any positive test graphs. Clearly, ignoring the creation of some children never introduces errors for negative test graphs.
Otherwise, w gets less than c2/2 children, since each disjunction contains less than c2/2 literals.
In this case, the number of connected components 14 Berg & Ulfberg cc 8 (1999) decreases by one for the children, so we will make c such expansions before we reach a node where the graph for the corresponding conjunction contains m2−2−c connected components. Therefore, there are at most (c2/2)c ≤mc/2c such conjunctions.
We now count the number of inputs accepted by a single conjunction whose corresponding graph H contains m2 −2 −c connected components.
Let a denote the number of vertices in H that are part of connected components with more than one vertex. It follows that the number of isolated vertices in H is m2 −2 −a, and that the number of connected components in H with more than one vertex is a −c.
To get an upper bound for the number of positive test graphs that are compatible with H, we count as follows. Each connected component in H with more than one vertex must go into one of the m partitions, which makes at most ma−c choices. Then, each vertex in those connected components can be placed in at most m ways each within the partition. Lastly, the remaining m2 −2 −a vertices can be placed freely in (m2 −2 −a)! ways. To sum up, the total number of choices is at most ma−cma(m2 −2 −a)! = m2a−c(m2 −2 −a)!, which is increasing with a. Since the graph H contains a −c connected com-ponents with more than one vertex, the total number a of vertices in such components is at most 2c. This follows since the number of connected com-ponents with more than one vertex is at most c. So an upper bound for the number of choices is m3c(m2 −2 −2c)!.
Multiplying the maximum number of conjunctions whose corresponding graphs contain m2 −2 −c connected components by the maximum number of inputs accepted by each, and finally, dividing by the same denominator as in (1), yields the lemma.
□ The proof of the lemma above differs slightly from the corresponding proof by Haken. The reason for this is that we make a construction of the approxim-ator for an ∧gate from the approximators for the input gates, whereas Haken only proves the existence of a set of short conjunctions that describe the gate well enough.
Because of the duality of the test graphs and since c = d, the following lemma can be proved analogously to the previous one.
cc 8 (1999) Symmetric Approximation Arguments 15 Lemma 12 (Specialization of Generic Lemma C). At an ∨gate e, the number negative test graphs for which the approximator f C e introduces an error is bounded by (2).
We now consider the two cases from Lemma 10. Either the approximators for the output gate eo fail for at least half the positive test graphs, or they fail for all negative test graphs. Since |G| = |B|, and since we have the bound (2) for the maximum number of errors introduced in a single gate, the minimum size of Ψ is 2c(m2 −2)!
2m4c(m2 −2 −2c)!.
If we expand this expression, we get size(Ψ) ≥ 2c(m2 −2) · · · (m2 −2 −2c + 1) 2m4c ≥ 2c 2 (m2 −2 −2c + 1)2c (m2)2c = 2⌊√m⌋ 2 m2 −2⌊√m⌋−1 m2 2⌊√m⌋ ∈ 2Ω(√m).
□ 6. Clique In this section we prove that deciding whether a graph on n vertices contains any complete subgraph of size m (the problem CLIQUE(m, n)) requires mono-tone circuits of exponential size.
Theorem 13 (Alon and Boppana (1987)). The monotone circuit complex-ity for CLIQUE(m, n) is 2Ω(√m) when m ≤n2/3.
Proof.
Let the positive test graphs be all possible graphs on n vertices with a clique of size m and no other edges. This makes n m positive test graphs. We make one negative test graph for each possible coloring of the n vertices, using m−1 colors by connecting vertices of different colors by edges. Note that some colorings result in the same graph, but we treat them as different for counting purposes and get (m −1)n negative test graphs.
As in the proof of the BMS problem, we define the size of disjunctions by n minus the number of connected components in their corresponding graphs, and require that their size be less than d.
16 Berg & Ulfberg cc 8 (1999) For the conjunctions, however, we introduce a new notation of size that counts the number of vertices they touch. The number of vertices that a con-junction touches is the number of different vertices to which any of the edges connect. A conjunction is required to touch fewer than c vertices.
Choose c = ⌊√m⌋, so that conjunctions touch less than ⌊√m⌋vertices.
Implicitly, the number of literals in conjunctions is bounded by c2/2 ≤m/2.
Let d = ⌊n/(8m)⌋so that the graphs corresponding to disjunctions have more than n −⌊n/(8m)⌋connected components; this implies that they touch less than 2d ≤n/(4m) vertices.
Lemma 14 (Specialization of Generic Lemma A). At the output gate eo, the approximators either fail for all negative test graphs, or they fail for at least half of the positive test graphs.
Proof.
Assume that there is a negative test graph b such that f C eo(b) = 0 (otherwise we are already done). Then there is a disjunction D in f C eo, and we show that this disjunction can be 1 for at most half of the positive test graphs.
A necessary condition for D to be 1 on a positive test graph g is that one of the vertices it touches is in the clique of g. Since any given vertex is part of the clique in a fraction m/n of the positive test graphs, a collection of at most n/(8m) vertices has a vertex in common with less than half the positive test graphs.
□ Lemma 15 (Specialization of Generic Lemma B). At an ∧gate e, the approximator f D introduces an error for at most n −c m −c n 2m c positive test graphs.
Proof.
When building the tree, let w be the node that was created while expanding the disjunction Di, and let C be the conjunction corresponding to w.
Consider the case in which Di+1 contains a literal xu,v for which both end-points are already touched by C. Then a positive test graph that satisfies C also satisfies Di+1, so we only create one single child under w containing xu,v.
Otherwise, Di+1 contains a mix of literals, for some, none of the two endpoints are touched by C, and for some, one endpoint is touched by C.
First, consider the literals that have one endpoint that is already touched by C; they all have another endpoint that is not touched by C. For each such cc 8 (1999) Symmetric Approximation Arguments 17 endpoint, arbitrarily select one of the literals that connects to the endpoint, and form one child for it. The reason that we may disregard some literals from consideration is that two conjunctions that touch the same vertices will accept the same positive test graphs. The total number of children created this way is less than 2d, since Di+1 touches at most 2d vertices.
For the literals that connect to two vertices that are not touched by C, we first select one of their endpoints in some arbitrary way and create a child for it; however, we do not label the edges to these children. At most 2d such children are created. Then, we create less than 2d children under each of these children for the other endpoint, and the edges down to these children are labeled by literals.
The way we have constructed the tree implies that no node has more than 4d = n/(2m) children, and when descending to a child from a node with more than one child, the number of vertices touched by the corresponding conjunc-tion increases by 1. Therefore, there are at most (n/(2m))c conjunctions touch-ing c vertices.
The number of positive test graphs accepted by a single conjunction touch-ing c vertices is the number of ways to choose the remaining m −c vertices for the clique out of the total remaining n −c vertices, which is n−c m−c .
Finally, the lemma follows from multiplying the bound for the number of conjunctions touching c vertices by the maximum number of inputs they may accept.
□ Lemma 16 (Specialization of Generic Lemma C). At an ∨gate e, the approximator f C e introduces an error at most (m/2)d(m −1)n−d negative test graphs.
Proof.
We start by bounding the number of disjunctions corresponding to nodes in the tree, whose corresponding graphs contain n −d connected components.
When building the tree, let w be the node that was created while expanding the conjunction Ci, and let D be the disjunction corresponding to w.
Consider the case that Ci+1 contains a literal xu,v for which both endpoints are in the same connected component in the graph corresponding to D. Then a negative test graph that falsifies D also falsifies Ci+1, since u and v must have the same color. It is therefore enough to create only one single child under w and label the edge xu,v.
Otherwise, w gets at most m/2 children, since each conjunction contains at most m/2 literals. In this case, the number of connected components decreases 18 Berg & Ulfberg cc 8 (1999) by one for the children, so we will make d such expansions before we reach a node for which the graph for the corresponding disjunction contains n − d connected components.
In all, there can hence be at most (m/2)d such disjunctions.
It remains to count the number of negative test graphs rejected by a single disjunction, whose corresponding graph H contains n −d connected compon-ents. The negative test graphs that are rejected by such a disjunction are those that use only one color within each connected component, and their number is (m −1)n−d.
Multiplying the number of disjunctions whose corresponding graphs contain n−d connected components by the number of negative test graphs rejected by each yields the bound in the lemma.
□ We now determine the lower bound for the circuit size. There are two cases to consider: either f D eo fails on at least half the positive test graphs, so that size(Ψ) ≥ n m 2 n−c m−c n 2m c = 1 2 n! (m −c)!
(n −c)! m!
(2m)c nc ≥ 1 22c(n −c)c mc mc nc ∈ 2Ω(√m), or the approximators fail for all negative test graphs, so that size(Ψ) ≥ (m −1)n (m −1)n−d(m/2)d = 2d m −1 m d ∈ 2Ω(n/m).
Since 2Ω(√m) ⊆2Ω(n/m) for m ≤n2/3, the theorem follows.
□ Acknowledgment We thank Johan H˚ astad for helpful discussions and comments on earlier ver-sions of this paper.
cc 8 (1999) Symmetric Approximation Arguments 19 References Noga Alon and Ravi B. Boppana, The monotone circuit complexity of boolean functions. Combinatorica 7 (1987), 1–22.
Kazuyuki Amano and Akira Maruoka, Potential of the approximation method.
In Proc. 37th Ann. IEEE Symp. Found. Comput. Sci., 1996, 431–440.
Alexander E. Andreev, On a method for obtaining lower bounds for the com-plexity of individual monotone functions. Sov. Math. Dokl. 31 (1985), 530–534.
Christer Berg, On Oracles and Circuits—Topics in Computational Complexity.
PhD thesis, Royal Institute of Technology, KTH, Stockholm, Sweden, 1997.
Ravi B. Boppana and Michael Sipser, The complexity of finite functions. In Handbook of theoretical computer science, ed. Jan van Leeuwen, vol. A, Al-gorithms and complexity, 757–804. Elsevier/MIT Press, 1990.
Paul Erd˝ os and Richard Rado, Intersection theorems for systems of sets. J.
London Math. Soc. 35 (1960), 85–90.
Armin Haken, Counting bottlenecks to show monotone P ̸= NP. In Proc. 36th Ann. IEEE Symp. Found. Comput. Sci., 1995, 36–40.
Armin Haken and Stephen Cook, An exponential lower bound for the size of monotone real circuits. Submitted to J. Comput. System Sci., 1996.
Stasys Jukna, Finite limits and monotone computations over the reals. In Twelfth Annual IEEE Conference on Computational Complexity, 1997.
Pavel Pudl´ ak, Lower bounds for resolution and cutting planes proofs and mono-tone computations. J. Symbolic Logic, to appear (1997).
Alexander A. Razborov, Lower bounds on the monotone complexity of some boolean functions. Sov. Math. Dokl. 31 (1985), 354–357.
Alexander A. Razborov, On the method of approximations. In Proc. Twenty-first Ann. ACM Symp. Theor. Comput., 1989, 167–176.
Janos Simon and Shi-Chun Tsai, A note on the bottleneck counting argument.
In Twelfth Annual IEEE Conference on Computational Complexity, 1997.
J¨ urgen Tiekenheinrich, A 4n lower bound on the monotone network complexity of a one-output boolean function. Inform. Process. Lett. 18 (1984), 201–202.
20 Berg & Ulfberg cc 8 (1999) Manuscript received 16 July 1996 Christer Berg Royal Institute of Technology S-100 44 Stockholm, SWEDEN berg@nada.kth.se Staffan Ulfberg Royal Institute of Technology S-100 44 Stockholm, SWEDEN staffanu@nada.kth.se |
2009 | https://radiopaedia.org/articles/kidneys?lang=us | Kidneys
Last revised by Tariq Walizai
on 11 Oct 2024
Edit article
Report problem with article
View revision history
Citation, DOI, disclosures and article data
Citation:
Knipe H, Walizai T, Southi J, et al. Kidneys. Reference article, Radiopaedia.org (Accessed on 28 Aug 2025)
DOI:
Permalink:
rID:
25813
Article created:
10 Nov 2013,
Henry Knipe
Disclosures:
At the time the article was created Henry Knipe had no recorded disclosures.
View Henry Knipe's current disclosures
Last revised:
11 Oct 2024,
Tariq Walizai
Disclosures:
At the time the article was last revised Tariq Walizai had
no financial relationships to ineligible companies to disclose.
View Tariq Walizai's current disclosures
Revisions:
65 times, by
31 contributors -
see full revision history and disclosures
Systems:
Urogenital
Sections:
Anatomy
Tags:
renal
Synonyms:
Kidney
Renal anatomy
Kidney anatomy
kidneys
The kidneys are paired retroperitoneal organs that lie at the level of the T12 to L3 vertebral bodies.
On this page:
Article:
Gross anatomy
Arterial supply
Venous drainage
Innervation
Variant anatomy
Radiographic features
Development
Related pathology
Related articles
References
Images:
Cases and figures
Gross anatomy
Location
The kidneys are located to either side of the vertebral column in the perirenal space of the retroperitoneum, within the posterior abdominal wall. The long axis of the kidney is parallel to the lateral border of the psoas muscle and it lies anterior to the quadratus lumborum muscle. Being parallel to the psoas muscle, the kidneys lie at an oblique angle, with its superior pole more medial and posterior than its inferior pole. Due to the right lobe of the liver, the right kidney usually lies slightly lower than the left kidney 16.
Size
In adults, the normal kidney is 10-14 cm long in males and 9-13 cm long in females, 3-5 cm wide, 3 cm in antero-posterior thickness and weighs 150-260 g. The left kidney is usually slightly larger than the right.
normal kidney size in adults
normal kidney size in children
Structure
The kidney is bean-shaped with a superior and an inferior pole, anterior and posterior surfaces, and lateral and medial borders. The midportion of the kidney is often called the midpole.
The kidney has a fibrous capsule, which is surrounded by perirenal fat. The kidney itself can be divided into renal parenchyma, consisting of renal cortex and medulla, and the renal sinus containing renal pelvis, calyces, renal vessels, nerves, lymphatics and perirenal fat.
The renal parenchyma has two layers: cortex and medulla. The renal cortex lies peripherally under the capsule while the renal medulla consists of 10-14 renal pyramids, which are separated from each other by an inward extension of the renal cortex called renal columns.
Urine is produced in the renal lobes, which consists of the renal pyramid with the associated overlying renal cortex and adjacent renal columns. Each renal lobe drains at a papilla into a minor calyx, four or five of these unite to form a major calyx. Each kidney normally has two or three major calyces, which unite to form the renal pelvis.
The renal hilum is the entry to the renal sinus and lies vertically at the anteromedial aspect of the kidney. It contains the renal vessels and nerves, fat and the renal pelvis, which typically emerges posterior to the renal vessels, with the renal vein being anterior to the renal artery.
Function
filter the blood to remove excess water, minerals, and waste products of protein metabolism, producing urine in the process
are involved in
blood pressure regulation
regulation of body fluid volume, osmolality and pH
vitamin D and red blood cell (RBC) production
Tests of renal function include:
estimated glomerular filtration rate (eGFR)
electrolytes
blood urea nitrogen (BUN) or urea
creatinine levels and creatinine clearance
cystatin C levels
Relations
posterior
diaphragm and associated parietal pleura (upper pole of kidney)
11th rib (left kidney only), 12th rib (both kidneys)
medial and lateral arcuate ligaments
psoas major, quadratus lumborum, transversus abdominis (medial to lateral)
subcostal nerve, iliohypogastric nerve
anterior
right kidney
right lobe of the liver
hepatorenal recess (Morison's pouch)
D2 duodenum (medial margin of the kidney)
right colic flexure (just above inferior pole)
left kidney
stomach
omental bursa/lesser sac (upper pole)
spleen (lateral margin)
tail of the pancreas (hilum)
left colic flexure (lateral to lower pole)
superior
adrenal glands
Arterial supply
renal arteries (from the abdominal aorta)
Venous drainage
renal veins (to inferior vena cava)
Innervation
sympathetic innervation: renal and aorticorenal plexuses, which is derived from lesser and least splanchnic nerves
parasympathetic innervation: vagus nerve via the celiac, renal and aorticorenal plexuses
Variant anatomy
See article: developmental anomalies of the kidney and ureter.
Radiographic features
Plain radiograph
Kidney length should not be less than three vertebral body lengths, and no more than four vertebral body lengths 10.
Ultrasound
Antenatally, fetal kidneys show varying texture depending on gestational age. It is echogenic in the first trimester, with decreasing echogenicity as the pregnancy progresses. Corticomedullary differentiation can be appreciated after 15 weeks of gestation but clear demarcation between cortex and medulla can be seen at 20 weeks. Renal echogenicity decreases compared to liver and spleen after 17 weeks12.
Normal kidney appearance in adult 11:
cortex is less echogenic than the liver
medullary pyramids are slightly less echogenic than the cortex
cortex thickness equals/is more than 6 mm 14
if the pyramids are difficult to differentiate, the parenchymal thickness can be measured instead and should be 15-20 mm 11
central renal sinus, consisting of the calyces, renal pelvis and fat, is more echogenic than the cortex
renal pelvis may appear as a central slit of anechoic fluid at the hilum
normal ureters are generally not well seen on ultrasound
CT
On unenhanced CT the renal pyramids can appear hyperdense 7 (see: white pyramid sign).
MRI
Renal cortex has slightly higher signal than medulla on T1-weighted images. On T2-weighted images, medulla has slightly higher signal than renal cortex 16.
Development
The collecting system arises from the ureteric bud, which arises from the mesonephric duct in the fourth week of gestation. The renal parenchyma arises from the metanephros, which appears in the fifth week, a derivative of the intermediate mesoderm 15.
The ureteric bud penetrates the metanephric mesoderm, which forms as a cup-shaped tissue cap. The ureteric bud dilates and subdivides to form twelve or so generations of tubules with the first generations fusing to form the renal pelvis, major and minor calyces, and renal pyramids with the later generations forming approximately a million renal tubules 15.
Under the regulation of complex signaling pathways, the ureteric bud incites the metanephric tissue to form small renal vesicles that eventually form primitive S-nephrons which are invaginated by endothelial cells from nearby angioblasts; before going on to form the definitive nephron 15. Glomerular filtration begins at 9th week of gestation. Nephron development is complete at birth except in premature infants. The kidney matures functionally after birth 15.
The kidney develops in the pelvis but assumes its normal cranial abdominal location in adults due to disproportionate growth of the body in the lumbar and sacral regions 8-9.
Related pathology
A discrepancy of >2 cm between renal lengths should be considered abnormal 10 and may indicate an underlying disease. Common diseases affecting the kidneys include:
gamuts
delayed nephrogram
persistent nephrogram
striated nephrogram
spotted nephrogram
renal emphysema
neoplastic
benign renal neoplasm
malignant
renal cell carcinoma
metabolic
renal hemosiderosis
renal cortical nephrocalcinosis
infections
renal abscess
renal antibioma
perinephric abscess
pyelonephritis
xanthogranulomatous pyelonephritis (XGP)
emphysematous pyelonephritis
others
renal pseudotumor
renal replacement lipomatosis
renal stones
hydronephrosis
Quiz questions
Question 2401
Report problem with question
Pyonephrosis usually requires antibiotics and what kind of follow-up?
Skip question
References
Keith L. Moore, Arthur F. Dalley, A. M. R. Agur. Clinically Oriented Anatomy. (2013) ISBN: 9781451119459 - Google Books
Drake R, Vogl AW, Mitchell AWM. Gray's Basic Anatomy: with STUDENT CONSULT Online Access (Grays Anatomy for Students). Churchill Livingstone. ISBN:B0092DEQ1U. Read it at Google Books - Find it at Amazon
McMINN. Lasts Anatomy Regional and Applied. CHURCHILL LIVINGSTONE. (2003) ISBN:B0084AQDG8. Read it at Google Books - Find it at Amazon
Emilio Quaia. Radiological Imaging of the Kidney. (2010) ISBN: 9783540875963 - Google Books
Frederic H. Martini, Judi L. Nath, Edwin F. Bartholomew. Fundamentals of Anatomy and Physiology. (2011) ISBN: 9780321719799 - Google Books
Ronald W. Dudek. High-Yield Kidney. (2006) ISBN: 9780781755696 - Google Books
Arjun Kalyanpur. Step by Step in Emergency Radiology: Helical CT in Acute Abdomen. (2006) ISBN: 9788180618031 - Google Books
Dan Longo, Anthony Fauci, Dennis Kasper et al. Harrison's Principles of Internal Medicine, 18th Edition. (2011) ISBN: 9780071748896 - Google Books
Thomas W. Sadler. Langman's Medical Embryology. (2011) ISBN: 9781451113426 - Google Books
Ronald J. Zagoria. Genitourinary Radiology. (2004) ISBN: 9780323018425 - Google Books
Marchal G, Verbeken E, Oyen R, Moerman F, Baert AL, Lauweryns J; Ultrasound of the normal kidney: a sonographic, anatomic and histologic correlation. Ultrasound Med Biol. 1986 Dec;12(12):999-1009.
PMID: 3547990
Hindryckx A & De Catte L. Prenatal Diagnosis of Congenital Renal and Urinary Tract Malformations. Facts Views Vis Obgyn. 2011;3(3):165-74. PMC3991456 - Pubmed
Christopher J. Lote. Principles of Renal Physiology. (2012) ISBN: 9781461437857 - Google Books
El-Reshaid W & Abdul-Fattah H. Sonographic Assessment of Renal Size in Healthy Adults. Med Princ Pract. 2014;23(5):432-6. doi:10.1159/000364876 - Pubmed
Zweyer M. Embryology of the Kidney. Med Radiol. 2010;:3-15. doi:10.1007/978-3-540-87597-0_1
Stephanie Ryan, Michelle McNicholas, Stephen J. Eustace. Anatomy for Diagnostic Imaging. (2011) ISBN: 9780702029714 - Google Books
Incoming Links
Articles:
Solid and hollow abdominal viscera
Urogenital curriculum
Pancreas transplant
Nephroptosis
Kidney sweat sign
Renal emphysema
Organomegaly
Late arterial phase
Persistent fetal lobulation of the kidneys
Normal radiological reference values
Extramedullary haematopoiesis
Renal pelvis
Transversalis fascia
Retrorenal spleen
Splenic vein
Subcostal artery
Urinary system
Left colic artery
Renal vascular pedicle injury
Ascending colon
Load more articles
Cases:
Normal CT KUB
Horseshoe kidney with lithiasis
Perirenal space (Gray's illustrations)
Renal vessels (Gray's illustrations)
Acquired cystic kidney disease
Normal catheter renal angiogram
Focused assessment with sonography for trauma (negative eFAST)
Hair on end sign
Adult polycystic kidney disease
Ureterolithiasis
Page kidney
Normal upper abdominal ultrasound
Ureterolithiasis
Renal cell carcinoma
Ureterolithiasis
Renal cell carcinoma
Ureterolithiasis
Gastric antropyloric adenocarcinoma
Ureterolithiasis
Renal sinus lymphangioma
Load more cases
Multiple choice questions:
Question 2401
Question 2400
Question 2399
Question 49
Related articles: Anatomy: Abdominopelvic
Anatomy: Abdominopelvic
skeleton of the abdomen and pelvis[+][+]
lumbar spine
bony pelvis
innominate bones
pubis
pubic symphysis
obturator foramen
ischium
greater sciatic notch
lesser sciatic notch
ilium
sacrum
sacral hiatus
sacrotuberous ligament
sacrospinous ligament
greater sciatic foramen
lesser sciatic foramen
coccyx
anterior angulation of the coccyx
muscles of the abdomen and pelvis[+][+]
diaphragm
sternocostal triangle
anterior abdominal wall
Scarpa's fascia
muscles
external oblique muscle
inguinal ligament
lacunar ligament
internal oblique muscle
conjoint tendon
transversus abdominis muscle
rectus abdominis muscle
rectus sheath
linea alba
umbilicus
arcuate line
semilunar line
transversalis fascia
pyramidalis muscle
surface anatomy
posterior abdominal wall
psoas major muscle
psoas minor muscle
quadratus lumborum muscle
iliacus muscle
pelvic floor
levator ani muscle
coccygeus muscle
piriformis muscle
obturator internus muscle
spaces of the abdomen and pelvis[+][+]
anterior abdominal wall
sternocostal triangle
posterior abdominal wall
superior lumbar triangle
inferior lumbar triangle
iliopsoas compartment
abdominal cavity
peritoneum
peritoneal ligaments
left triangular ligament
right triangular ligament
falciform ligament
umbilical vein
ligamentum teres
veins of Sappey
omentum
hepatogastric ligament
gastrosplenic ligament
splenorenal ligament
mesentery
small bowel mesentery
root of the mesentery
mesoappendix
transverse mesocolon
sigmoid mesocolon
peritoneal spaces
supramesocolic space
right supramesocolic space
right subphrenic space
right subhepatic space
anterior right subhepatic space
posterior right subhepatic space (Morison pouch)
lesser sac
epiploic foramen (of Winslow)
left supramesocolic space (left perihepatic space)
left subhepatic space
anterior left subhepatic space
posterior left subhepatic space
left subphrenic space
anterior left subphrenic space
posterior left subphrenic (perisplenic) space
inframesocolic space
right inframesocolic space
left inframesocolic space
right paracolic gutter
left paracolic gutter
inguinal canal (mnemonic)
Hesselbach triangle
umbilical folds
median umbilical fold
medial umbilical folds
lateral umbilical folds
retroperitoneum
perirenal fascia
anterior pararenal space
perirenal space
perinephric bridging septa (of Kunin)
posterior pararenal space
properitoneal fat
great vessel space
lateroconal fascia
pelvic cavity
pelvic peritoneal space
rectouterine pouch (pouch of Douglas)
rectovesical pouch
retropubic space (of Retzius)
paravesical space
lateral fossa
supravesical fossa
presacral space
canal of Nuck
pudendal canal
obturator canal
perineum
urogenital triangle
superficial perineal pouch
perineal membrane
deep perineal pouch
anal triangle
transverse perineal muscles
deep transverse perineal muscles
superficial transverse perineal muscles
ischioanal fossa
urogenital diaphragm
abdominal and pelvic viscera
gastrointestinal tract[+][+]
esophagus
phrenic ampulla
gastro-esophageal junction
Z line
stomach
rugal folds
small intestine
duodenum
Brunner gland
duodenojejunal flexure
jejunum
ileum
Meckel diverticulum
ileocecal valve
jejunum vs ileum
valvulae conniventes
large intestine
cecum
appendix
duplex appendix
colon
ascending colon
right colic flexure
transverse colon
left colic flexure
descending colon
loop-to-loop colon
sigmoid colon
rectum
mesorectal fascia
appendix epiploica
haustral folds
taeniae coli
anal canal
anal sphincters
spleen[+][+]
variants
splenunculus
wandering spleen
asplenia
polysplenia
splenogonadal fusion
retrorenal spleen
hepatobiliary system[+][+]
liver
beaver tail liver
ductus venosus
ligamentum venosum
porta hepatis
Riedel lobe
segmental liver anatomy (mnemonic)
supradiaphragmatic liver
biliary tree
common hepatic duct
cystic duct
common bile duct
ampulla of Vater
sphincter of Oddi
subvesical bile ducts
gallbladder
accessory gallbladder
gallbladder duplication
gallbladder triplication
gallbladder agenesis
Rokitansky-Aschoff sinuses
Phrygian cap
septate gallbladder
endocrine system[+][+]
adrenal gland
adrenal vessels
adrenal arteries
adrenal veins
chromaffin cells
variants
horseshoe adrenal gland
pancreas
pancreatic ducts
pancreatic duct diameter
variants
pancreas divisum
meandering main pancreatic duct
ansa pancreatica
anomalous pancreaticobiliary junction
variants
ectopic pancreatic tissue
annular pancreas
organs of Zuckerkandl
urinary system
kidney
renal pelvis
extrarenal pelvis
renal sinus
avascular plane of Brodel
variants
number[+][+]
renal agenesis
supernumerary kidney
fusion[+][+]
horseshoe kidney
sigmoid kidney
crossed fused renal ectopia
junctional parenchymal defect
pancake kidney
location[+][+]
ectopic kidney
pelvic kidney
fused pelvic kidney
intrathoracic kidney
crossed renal ectopia
abnormal renal rotation
nephroptosis
shape[+][+]
persistent fetal lobulation
hypertrophied column of Bertin
renal hilar lip
dromedary hump
faceless kidney
ureter[+][+]
variants
ectopic ureter
duplex collecting system
Weigert-Meyer law
bifid ureter
ureteral duplication
retrocaval ureter
ureterocele
urinary bladder[+][+]
detrusor
bladder neuroanatomy (micturition)
urethra[+][+]
fossa navicularis
male urethra
verumontanum
prostatic utricle
musculus compressor nuda
female urethra
paraurethral glands
paraurethral ducts
embryology[+][+]
metanephric blastema
ureteric bud
Wolffian duct
male reproductive system[+][+]
prostate
seminal vesicles
ejaculatory duct
bulbourethral glands
urethral glands of Littré
spermatic cord (mnemonic)
ductus deferens
cremaster muscle
scrotum (mnemonic)
dartos muscle
epididymis
testes
descent
tunica vaginalis
tunica albuginea
testicular appendages
appendix of the testis
appendix of the epididymis
polyorchidism
bilobed testis
penis
female reproductive system[+][+]
vulva
mons pubis
labia majora
labia minora
clitoris
bulbs of the vestibule
vestibule of the vulva
vaginal opening
hymen
Bartholin glands
vagina
fornix
uterus
cervix
parametrium
chorion
amnion
endometrium
placenta
basal plate
chorionic plate
variation in morphology
retroplacental complex
umbilical cord
Wharton jelly
adnexa
Fallopian tubes
ovaries
ovarian follicle
dominant ovarian follicle
primary follicle
secondary follicle
mature vesicular follicle
corpus luteum
corpus albicans
cumulus oophorus
broad ligament (mnemonic)
variant anatomy
retroverted uterus
congenital uterovaginal anomalies
transverse vaginal septum
Mullerian duct anomalies
uterine duplication anomalies
uterus didelphys
bicornuate uterus
septate uterus
uterine agenesis
unicornuate uterus
arcuate uterus
T-shaped uterus
embryology
Mullerian duct
blood supply of the abdomen and pelvis[+][+]
arteries
abdominal aorta
inferior phrenic artery
superior suprarenal artery
celiac artery
common hepatic artery (variant anatomy)
hepatic artery proper
left hepatic artery
middle hepatic artery
falciform artery
right hepatic artery
cystic artery
gastroduodenal artery
supraduodenal artery
right gastroepiploic artery
superior pancreaticoduodenal artery
right gastric artery
left gastric artery
splenic artery
left gastroepiploic artery
short gastric arteries
greater pancreatic artery
dorsal pancreatic artery
transverse pancreatic artery
superior mesenteric artery
inferior pancreaticoduodenal artery
jejunal and ileal branches
ileocolic artery
appendicular artery
accessory appendicular artery
colic branch
right colic artery
middle colic artery
middle suprarenal artery
renal artery (variant anatomy)
inferior suprarenal artery
gonadal artery (ovarian artery | testicular artery)
inferior mesenteric artery
left colic artery
sigmoid arteries
superior rectal artery
lumbar arteries
median sacral artery
common iliac artery
external iliac artery
inferior epigastric artery
cremasteric artery
deep circumflex artery
internal iliac artery (mnemonic)
anterior division
umbilical artery
superior vesical artery
deferential artery
obturator artery
vaginal artery
inferior vesical artery
uterine artery
middle rectal artery
internal pudendal artery
inferior rectal artery
perineal artery
posterior scrotal artery
transverse perineal artery
artery to the bulb
deep artery of the penis/clitoris
dorsal artery of the penis/clitoris
inferior gluteal artery
posterior division (mnemonic)
iliolumbar artery
lateral sacral artery
superior gluteal artery
variant anatomy
persistent sciatic artery
corona mortis
portal venous system
portal vein
splenic vein
inferior mesenteric vein
superior mesenteric vein
left gastric vein (coronary vein)
veins
inferior vena cava
hepatic veins
accessory right inferior hepatic vein
renal vein
ascending lumbar communicant vein
gonadal vein
pampiniform plexus
suprarenal vein
variant anatomy
retro-aortic left renal vein
double retroaortic left renal vein
circumaortic left renal vein
pancreaticoduodenal veins
common iliac vein
internal iliac vein
internal pudendal vein
obturator vein
prostatic venous plexus
vesical venous plexus
uterine venous plexus
vaginal venous plexus
external iliac vein
variant caval anatomy
absent infrarenal inferior vena cava
azygos continuation
circumcaval ureter
circumaortic venous collar
Eustachian valve
left-sided IVC
IVC duplication
anastomoses
arterioarterial anastomoses
arc of Barkow
arc of Buhler
arc of Riolan
marginal artery of Drummond
portal-systemic venous collateral pathways
watershed areas
Griffiths point
Sudeck point
lymphatics[+][+]
lymph node groups
para-aortic lymph nodes
preaortic lymph nodes
portal and portocaval lymph nodes
gastric lymph node stations
peripancreatic lymph nodes
common iliac lymph nodes
external iliac lymph nodes
internal iliac lymph nodes
cisterna chyli
innervation of the abdomen and pelvis[+][+]
thoracic splanchnic nerves
lumbar plexus
subcostal nerve
Iliohypogastric nerve
ilioinguinal nerve
genitofemoral nerve
lateral femoral cutaneous nerve
femoral nerve
obturator nerve
lumbosacral trunk
sacral plexus
lumbosacral trunk
sciatic nerve
superior gluteal nerve
inferior gluteal nerve
nerve to piriformis
perforating cutaneous nerve
posterior femoral cutaneous nerve
parasympathetic pelvic splanchnic nerves
pudendal nerve
perineal branch
inferior rectal nerve
dorsal nerve of the penis or clitoris
nerve to quadratus femoris and inferior gemellus muscles
nerve to internal obturator and superior gemellus muscles
autonomic ganglia and plexuses
phrenic plexus
celiac plexus
hepatic plexus
aorticorenal plexus
renal plexus
superior mesenteric plexus
inferior mesenteric plexus
superior hypogastric plexus
inferior hypogastric plexus
ganglion impar
Promoted articles (advertising)
ADVERTISEMENT: Supporters see fewer/no ads
Cases and figures
Figure 1: normal kidney
Case 1: normal on renal MRA
Figure 2: normal development
Case 2: normal on CT
Figure 3
Figure 4a: renal vessels
Figure 4b: renal vessels
Figure 5: perirenal space
Figure 6: perirenal space
© 2005–2025 Radiopaedia.org |
2010 | https://www.sciencedirect.com/topics/immunology-and-microbiology/pericardium | Skip to Main content
Sign in
Chapters and Articles
You might find these chapters and articles relevant to this topic.
Epicardial Ventricular Tachycardia
Anatomical Considerations
The pericardium is a double-walled, flask-shaped sac that contains the heart and the roots of the great vessels, superior vena cava (SVC), and pulmonary veins (PVs). By separating the heart from its surroundings—the descending aorta, lungs, diaphragm, esophagus, trachea, and tracheobronchial lymph nodes—the pericardial space allows complete freedom of cardiac motion within this sac.10
The pericardium consists of two sacs intimately connected with one another: an outer fibrous envelope (the fibrous pericardium) and an inner serous sac (the serous pericardium). The fibrous pericardium consists of fibrous tissue and forms a flask-shaped bag, the neck of which is closed by its fusion with the external coats of the great vessels, while its base is attached by loose fibroareolar tissue to the central tendon and to the muscular fibers of the left side of the diaphragm. The fibrous pericardium is also attached to the posterior sternal surface by superior and inferior sternopericardial ligaments.10 These attachments are essential to maintain the normal cardiac position in relation to the surrounding structures, to restrict the volume of the thin-walled cardiac chambers (right atrium and ventricle), and also to serve as direct protection against injuries.
The vessels receiving fibrous prolongations from the fibrous pericardium are the aorta, the SVC, the right and left pulmonary arteries, and the four PVs. The inferior vena cava (IVC) enters the pericardium through the central tendon of the diaphragm, and receives no covering from the fibrous layer.
The serous pericardium is a delicate membrane that lies within the fibrous pericardium and lines its walls; it is composed of two layers: the parietal pericardium and the visceral pericardium. The parietal pericardium is fused to and inseparable from the fibrous pericardium. On the other hand, the visceral pericardium, which is composed of a single layer of mesothelial cells, is part of the epicardium (i.e., the layer immediately outside of the myocardium) and covers the heart and the great vessels except for a small area on the posterior wall of the atria. The visceral layer extends to the beginning of the great vessels, and is reflected from the heart onto the parietal layer of the serous pericardium along the great vessels in tubelike extensions. This happens at two areas: where the aorta and pulmonary trunk leave the heart and where the SVC, IVC, and PVs enter the heart.10 The serous pericardium is also metabolically active.
At the pericardial reflections and at the posterior wall between the great vessels, the pericardial space is divided up into a contiguous network of recesses and sinuses. There are three sinuses in the pericardial space: the superior sinus, the transverse sinus, and the oblique sinus. The superior sinus (superior aortic recess) lies anterior to the upper ascending aorta and main pulmonary artery. The transverse sinus is limited by a pericardial reflection between the superior PVs and contains the right pulmonary artery. The oblique sinus is confined by the pericardial reflections around the PVs and the IVC. The postcaval recess lies behind the SVC, the right pulmonary artery, and the right superior PV. The right and left PV recesses extend between their respective superior and inferior PVs.10
The pericardial cavity or sac is a continuous virtual space that lies between the parietal and visceral layers of serous pericardium. The heart invaginates the wall of the serous sac from above and behind, and practically obliterates its cavity, the space being merely a potential one. The sac normally contains 20 to 40 mL of clear fluid that occupies the virtual space between the two layers. Because all pericardial reflections are located basally in relation to the great vessels, the entire epicardial surface is accessible from the pericardial space, except for the atrial and ventricular septa, which are not in direct contact with the pericardium. Unlike the endovascular approach, the pericardial space is notable for the absence of obstacles and the relative ease with which catheter manipulation can be performed.10 By the same token, achieving firm, stable contact with the catheter tip at the target site may be difficult.
View chapterExplore book
Read full chapter
URL:
Book2012, Clinical Arrhythmology and Electrophysiology: A Companion to Braunwald's Heart Disease (Second Edition)Ziad F. Issa MD, ... Douglas P. Zipes MD
Chapter
Epicardial Ventricular Tachycardia
2019, Clinical Arrhythmology and Electrophysiology (Third Edition)Ziad F. Issa MD, ... Douglas P. Zipes MD
Anatomical Considerations
The pericardium is a double-walled sac that contains the heart and the roots of the great arteries, the superior vena cava (SVC), and pulmonary veins (PVs). By separating the heart from its surroundings—the descending aorta, lungs, diaphragm, esophagus, trachea, and tracheobronchial lymph nodes—the pericardial space allows complete freedom of cardiac motion within this sac.35,36
The pericardium consists of two sacs intimately connected with one another: an outer fibrous envelope (the fibrous pericardium) and an inner serous sac (the serous pericardium). The fibrous pericardium (0.8 to 2.5 mm in thickness) consists of fibrous tissue and forms a flask-shaped bag, the neck of which is closed by its fusion with the adventitia of the great vessels, while its base is attached by loose fibro-areolar tissue to the central tendon and to the muscular fibers of the left side of the diaphragm. The fibrous pericardium is also attached to the posterior sternal surface by the superior and inferior sterno-pericardial ligaments. These attachments are essential to maintain the normal cardiac position in relation to the surrounding structures, to restrict the volume of the thin-walled cardiac chambers (right atrium [RA] and ventricle), and to serve as direct protection against injuries.
The fibrous pericardium extends up to 5 to 6 cm along the great vessels, including the aorta, the SVC, the right and left pulmonary arteries, and the four PVs. The inferior vena cava (IVC) enters the pericardium through the central tendon of the diaphragm and receives no covering from the fibrous pericardium.37 Nerve fibers from the parietal layer of the pericardium transmitted by the phrenic nerve are sensitive to pain (e.g., during pericarditis). In contrast, the visceral pericardial layer on the cardiac surface is insensitive to pain.38
The serous pericardium is a delicate membrane that lies within the fibrous pericardium and lines its walls; it is composed of two layers: the parietal pericardium and the visceral pericardium. The parietal pericardium is fused to and inseparable from the fibrous pericardium. On the other hand, the visceral pericardium, which is composed of a single layer of mesothelial cells, is part of the epicardium (i.e., the layer immediately outside the myocardium) and covers the heart and the great vessels except for a small area on the posterior wall of the atria. The visceral layer extends to the beginning of the great vessels, and is reflected from the heart onto the parietal layer of the serous pericardium along the great vessels in tube-like extensions. This happens at two areas: where the aorta and pulmonary trunk leave the heart and where the SVC, IVC, and PVs enter the heart.
At the pericardial reflections and at the posterior wall between the great vessels, the pericardial space is divided up into a contiguous network of recesses and sinuses (eFig. 27.2). There are three sinuses in the pericardial space: superior, transverse, and oblique. The two pericardial space sinuses that can be accessed in electrophysiological (EP) procedures are the transverse and oblique sinuses. The superior sinus (superior aortic recess), which lies anterior to the upper ascending aorta and main pulmonary artery, is irrelevant to the EP procedure.19
The oblique sinus is a cul-de-sac located posterior to the atria (particularly the left atrium [LA] in the region between the four PVs) and anterior to the esophagus and descending aorta. The oblique sinus is an inverted U-shaped pericardial reflection bordered by the right PVs and IVC on the right side, the left PVs on the left side, and the right and left PVs superiorly (Fig. 27.2). The right and left PV recesses extend from the oblique sinus between the upper and lower PVs on each side.19,35–37
The tunnel-shaped transverse sinus lies posterior to the ascending aorta and pulmonary trunk, anterior to the SVC and superior PVs (eFig. 27.3). The roof of the transverse sinus is formed in parts by the aortic arch, the floor of the right pulmonary artery, and a part of the main pulmonary artery. Inferiorly, the transverse sinus is bound by the LA roof and by the pericardial reflection between the right and left superior PVs (which separates the transverse sinus from the oblique sinus below). The transverse sinus contains the right pulmonary artery and the inferior aortic recess (between the ascending aorta and the LA).37 Catheter exploration of the sinus allows access to the anterior portion of the LA, the area of Bachman's bundle, and via the inferior aortic recess, the noncoronary and right coronary aortic sinuses of Valsalva.19,39 The transverse sinus can be accessed by a catheter passed posteriorly around the lateral wall of the LV and LA, and then under the pulmonary arteries.35,36
The pericardial cavity or sac is a continuous virtual space that lies between the parietal and visceral layers of serous pericardium. The heart invaginates the wall of the serous sac from above and behind, and practically obliterates its cavity, the space being merely a potential one. The sac normally contains 20 to 40 mL of clear fluid that occupies the virtual space between the two layers. Although pericardial reflections can become anatomical obstacles for catheter navigation, all those reflections are located basally in relation to the great vessels; thus most of the epicardial surface is freely accessible from the pericardial space, except for the atrial and ventricular septa (which are not in direct contact with the pericardium) and the atrioventricular (AV) grooves and interventricular sulci (which are separated from the visceral pericardium by epicardial fat). Unlike the endovascular approach, the pericardial space is notable for the absence of obstacles and the relative ease with which catheter manipulation can be performed. By the same token, achieving firm, stable contact with the catheter tip at the target site can be difficult.19
View chapterExplore book
Read full chapter
URL:
Book2019, Clinical Arrhythmology and Electrophysiology (Third Edition)Ziad F. Issa MD, ... Douglas P. Zipes MD
Chapter
Chiralic contractile field (C-CF)
2010, Muscles and MeridiansPhillip Beach DO DAc OSNZ
The pericardium
The pulsating heart is encased by a structure called the pericardium. It is a thin sac that surrounds the heart. The pericardium has two layers, one of which is intimately connected to the heart, whilst the outer layer is attached to the sternum, the proximal ends of the major heart vessels, the top of the diaphragm, and the mediastinum. Between the layers is a microscopic film of serous fluid that acts to reduce friction between the pulsating heart and the chest cavity. The pericardium is a tough structure that anchors the heart to stop it writhing like a high-pressure garden hose in your chest, and it will resist the swelling of the heart during high blood pressure events.
Pericarditis is an inflammation between the layers that may arise slowly or suddenly, usually felt as chest pain described as sharp and stabbing. The pain may radiate to the back, scapula, neck, or arm. Pericarditis is often positional, where lying on one's back increases the pain and shortness of breath whereas bending forward usually relieves it.
The pleurae
A closed invaginated sac surrounds each lung. The visceral pleura (the surface attached to the lung) slide on the parietal pleura (the surface attached to the chest wall, diaphragm, and the mediastinal contents) via a serous pleural fluid. The pleurae allow the lungs to move within the chest with little friction, and surface tension within the pleural cavity holds the lung closely to the internal chest wall. Hence large excursions of the rib cage will change the shape of the lungs.
When the pleural cavity is ruptured or inflamed (called pleurisy or pleuritis) the symptoms usually include severe chest pain that is often worse when breathing in, an inability to take a deep breath, a shortness of breath, and if the cause is infective, fever/chills will accompany this distress.
The peritoneum
The peritoneum is similar in form and function to the other remnants of the coelom. It is a bilaminar serous membrane that contains a slippery fluid that encloses most of the abdominal contents. Visceral organs are tethered to the wall of the torso by mesenteries that are derived from the peritoneum. Blood vessels and nerves enter the viscera via these mesenteries. Each organ has a range of normal physiological movement that can be contemplated only with reference to the other viscera that closely constrain it.
Peritonitis, i.e. inflammation of the peritoneum, may affect the whole peritoneum or it may be isolated to an area as a pus-filled abscess. Rupture or obstruction anywhere along the GIT is the most common pathway for the entry of an infectious agent. Peritonitis causes acute severe pain in all or part of the abdomen; the abdominal wall muscles contract to a board-like rigidity, the abdomen becomes swollen and bloated, there is nausea, vomiting and sweating, the skin is pale and clammy, and peristalsis stops. It is a serious condition that requires antibiotics and often surgical intervention.
View chapterExplore book
Read full chapter
URL:
Book2010, Muscles and MeridiansPhillip Beach DO DAc OSNZ
Chapter
Anatomic Considerations and Examination of Cardiovascular Specimens (Excluding Devices)
2016, Cardiovascular Pathology (Fourth Edition)J.J. Maleszewski, ... J.P. Veinot
Pericardium and Pericardial Reflections
The pericardium is a roughly conical structure that both covers and surrounds the heart as the serous visceral and fibrous parietal pericardia, respectively (Figure 1.1a). Between these two layers, in a space called the pericardial sac, is contained 15-50 mL of straw-colored, serous fluid .
The parietal pericardium attaches along the great vessels such that the ascending aorta, main pulmonary artery, terminal superior vena cava, and terminal pulmonary veins are intrapericardial (Figure 1.1b). The pericardium is attached to the central tendon of the diaphragm and the adjacent diaphragmatic muscle at its base. The parietal pericardium consists of an outer fibrous layer with an inner layer of mesothelial cells. Its outer surface also contains variable amounts of adipose tissue that may contribute to the cardiac silhouette radiologically. The dense collagen limits the acute distensibility of the parietal pericardium such that as little as 200 mL of rapidly accumulated fluid can compromise diastolic filling (cardiac tamponade) (see Chapter 13).
The visceral pericardium (also called the epicardium) consists of a lining of mesothelial cells with variable deposits of subjacent adipose tissue. Typically, the visceral pericardium is transparent with the subjacent structures readily visible; however, focal pale white thickening can be encountered in many structurally normal specimens. Often referred to as “soldier's plaques,” the incidence of these epicardial collagen plaques rises with age and may represent healed pericarditis (Figure 1.2) . The fatty deposits are most pronounced in the region of the atrioventricular, interventricular, and interatrial grooves. Prominent fat tags also cover the origins of the coronary arteries between the aorta and atrial appendages.
Embryologically, rapid bulboventricular growth pushes the developing heart into the pericardial space analogous to a fluid-filled balloon with a fist being pressed into it. The parietal and visceral pericardia meet along the great vessels at the pericardial reflection. Likewise, the pericardium reflects around the region of the great veins, forming the oblique pericardial sinus immediately posterior to the left atrium. A tunnel-shaped reflection is also formed by the great arteries and the atrial walls, called the transverse pericardial sinus. The appreciation of these sinuses is increasingly important with catheter-based intrapericardial procedures being developed.
View chapterExplore book
Read full chapter
URL:
Book2016, Cardiovascular Pathology (Fourth Edition)J.J. Maleszewski, ... J.P. Veinot
Chapter
Safety Assessment including Current and Emerging Issues in Toxicologic Pathology
2013, Haschek and Rousseaux's Handbook of Toxicologic Pathology (Third Edition)Eric D. Lombardini, ... Mark A. Melanson
Pericardium
The pericardium is the primary heart tissue affected, presenting frequently as an acute pericarditis with associated pericardial effusion or fibrosis leading to restrictive cardiac function. While the pathogenesis is poorly understood, it is theorized to be the result of insult to the microvasculature as discussed earlier in the chapter. The acute lesion can lead to chronic constrictive pericarditis, myocarditis, conduction abnormalities, coronary arteritis, and valvular dysfunction. Chronic restrictive pericarditis was noted in up to 5% of human patients who underwent irradiation for lung and breast cancers, but increased to 10% in those treated for lymphoma. The disease typically presents with pericardial effusion and cardiac tamponade.
View chapterExplore book
Read full chapter
URL:
Book2013, Haschek and Rousseaux's Handbook of Toxicologic Pathology (Third Edition)Eric D. Lombardini, ... Mark A. Melanson
Chapter
The Pericardium
2019, Cardiovascular Magnetic Resonance (Third Edition)Jay S. Leb, Susie N. Hong
Conclusion
The pericardium is a complex and important structure in the evaluation of the cardiovascular system. Pericardial pathology can result in a spectrum of clinical presentations, ranging from little or no symptoms to severe hemodynamic compromise and collapse. Advanced noninvasive imaging modalities such as CMR have broadened our understanding of pericardial diseases and their impact on the cardiovascular system. When combined with a high degree of clinical suspicion, CMR can serve as an important tool to diagnose and guide clinical management and therapeutic strategies.
View chapterExplore book
Read full chapter
URL:
Book2019, Cardiovascular Magnetic Resonance (Third Edition)Jay S. Leb, Susie N. Hong
Chapter
Pericarditis, Pericardial Constriction, and Pericardial Tamponade
2018, Cardiology Secrets (Fifth Edition)Rahul Thomas, Brian D. Hoit
1 The pericardium is not necessary for life. What does it do? Why is it important?
The pericardium serves many important but subtle functions. It limits distention and facilitates interaction of the cardiac chambers, influences ventricular filling, prevents excessive torsion and displacement of the heart, minimizes friction with surrounding structures, prevents the spread of infection from contiguous structures, and equalizes gravitational, hydrostatic, and inertial forces over the surface of the heart. The pericardium also has immunologic, vasomotor, fibrinolytic, and metabolic activities. Therapeutically the pericardial space can be used for drug delivery.
2 What diseases affect the pericardium?
The pericardium is affected by virtually every category of disease (Box 67.1), including idiopathic, infectious, neoplastic, immune/inflammatory, metabolic, iatrogenic, traumatic, and congenital.
3 What is pericarditis? What are the clinical manifestations? What are the causes?
Acute pericarditis is a syndrome of pericardial inflammation characterized by typical chest pain (sharp, retrosternal pain that radiates to the trapezius ridge, often aggravated by lying down and relieved by sitting up), a pathognomonic pericardial friction rub (characterized as superficial, scratchy, crunchy, and evanescent), and specific electrocardiographic changes (diffuse ST-T wave changes [Fig. 67.1] with characteristic evolutionary changes and PR segment depression). These manifestations vary in terms of presentation (chest pain >85% to 90%, pericardial friction rub ≤33%, electrocardiogram [ECG] changes 60%). The 2015 European Society of Cardiology (ESC) Guidelines suggest that at least two of four of the following criteria are needed to make the diagnosis: pericardial pain, pericardial rub, ECG changes, and pericardial effusion. Additional supporting findings include elevation in inflammatory markers (erythrocyte sedimentation rate [ESR], C-reactive protein [CRP], white blood cell [WBC]) count and evidence of pericardial inflammation by computed tomography (CT) or magnetic resonance imaging (MRI).
Causes of pericarditis include infection (viral, bacterial, fungal, mycobacterial, human immunodeficiency virus [HIV] associated), neoplasm (usually metastatic from lung or breast; melanoma, lymphoma, or acute leukemia), myocardial infarction, injury (post pericardiotomy, traumatic), radiation, myxedema, and connective tissue disease. In the developed world the most common cause remains viral etiologies, whereas tuberculosis is the most frequent cause in developing countries.
4 Should patients presenting with acute pericarditis be hospitalized? Why?
Hospitalization is warranted for high-risk patients with an initial episode of acute pericarditis to determine a cause and to observe for the development of cardiac tamponade; close, early follow-up is critically important for the remainder of patients not hospitalized. Features indicative of high-risk pericarditis include fever greater than 38°C, subacute onset, an immunosuppressed state, trauma, oral anticoagulant therapy, myopericarditis, a moderate or large pericardial effusion, cardiac tamponade, and failure of initial outpatient medical therapy.
5 What is the treatment for acute pericarditis?
Acute pericarditis usually responds to oral nonsteroidal anti-inflammatory drugs (NSAIDs), such as aspirin (650-1000 mg every 4-6 hours) or ibuprofen (600-800 mg every 6-8 hours). Colchicine (1 mg/day) may be used to supplement the NSAIDs because it may reduce symptoms and decrease the rate of recurrences. Chest pain is usually alleviated in 1 to 2 days, and the friction rub and ST-segment elevation resolve shortly thereafter. Most mild cases of idiopathic and viral pericarditis are adequately treated within a week or two of treatment, but the duration of therapy is variable and patients should be treated until inflammation or an effusion, if present, has resolved. The intensity of therapy is dictated by the distress of the patient, and narcotics may be required for severe pain. Corticosteroids should be avoided unless there is a specific indication (such as connective tissue disease or uremic pericarditis) because they enhance viral multiplication and may result in recurrences when the dosage is tapered.
Based on the colchicine for acute pericarditis (COPE) trial the ESC Guidelines recommend a weight-adjusted colchicine dose of 0.5 mg once daily for patients less than 70 kg or 0.5 mg BID for those ≥70 kg for at least 3 months to improve response to medical therapy and prevent recurrences.
6 What is recurrent pericarditis? How is it treated?
Recurrences of pericarditis (with or without pericardial effusion) occur in up to one-third of patients, usually within 18 months of the acute attack and may follow a course of many years. Although they may be spontaneous, occurring at varying intervals after discontinuation of drug, they are more commonly associated with either discontinuation or tapering of anti-inflammatory drugs. A poor initial response to therapy with NSAIDs and the use of corticosteroids predict recurrences. Two randomized placebo-controlled trials of colchicine for recurrent pericarditis (CORE, CORP) reported marked and significant reductions in symptom persistence at 72 hours and recurrence at 18 months when colchicine was added to conventional therapy. Although painful recurrences of pericarditis may require corticosteroids (preferably at low to moderate doses with slow tapering), once administered, dependency and the development of steroid-induced abnormalities are potential perils.
Tapering of therapy should be done gradually, with tapering of a single class of drug at a time before colchicine is discontinued. For patients who require high-dose, long-term steroids or who do not respond to anti-inflammatory therapies, several drugs (azathioprine, intravenous immunoglobulin (IVIG), and anakinra, a recombinant interleukin IL- 1) have been used; however, strong evidence-based data supporting these therapies are lacking. Pericardiectomy should be considered only when repeated attempts at medical treatment have clearly failed.
7 What is postcardiac injury syndrome?
Postcardiac injury syndrome (PCIS) refers to pericarditis or pericardial effusion that results from injury of the pericardium. The principal conditions considered under these headings include postmyocardial infarction syndrome, postpericardiotomy syndrome, and traumatic (blunt, sharp, or iatrogenic) pericarditis. Clinical features include the following:
•
: Prior injury of the pericardium, myocardium, or both
•
: A latent period between the injury and development of pericarditis or pericardial effusion
•
: A tendency for recurrence
•
: Responsiveness to NSAIDs and corticosteroids
•
: Fever, leukocytosis, and elevated ESR (and other markers of inflammation)
•
: Pericardial and sometimes pleural effusion, with or without a pulmonary infiltrate
•
: Alterations in the populations of lymphocytes in peripheral blood
When the PCIS occurs after an acute myocardial infarction, it is also known as Dressler syndrome, which is now much less common than in the past. In the randomized multicenter Colchicine for the Prevention of Post-pericardiotomy Syndrome (COPPS) study, prophylactically administered colchicine reduced the incidence of postpericardiotomy syndrome after cardiac surgery. According to the 2015 ESC Guidelines on Pericardial Disease, colchicine should be considered (class IIa) after cardiac surgery, using weight-based doses, for a 1-month duration as prevention.
8 What are the pericardial compressive syndromes? What are their variants?
The complications of acute pericarditis include cardiac tamponade, constrictive pericarditis, and effusive-constrictive pericarditis. Cardiac tamponade is characterized by the accumulation of pericardial fluid under pressure and may be acute, subacute, low pressure (occult), or regional. Constrictive pericarditis is the result of thickening, calcification, and loss of elasticity of the pericardial sac. Pericardial constriction is typically chronic but may be subacute, transient, and occult. Effusive-constrictive pericarditis is characterized by constrictive physiology with a coexisting pericardial effusion, usually with tamponade. Elevation of the right atrial and pulmonary wedge pressures persists after drainage of the pericardial fluid.
9 What are the similarities between tamponade and constrictive pericarditis?
Characteristic of both tamponade and constrictive pericarditis is greatly enhanced ventricular interaction (interdependence), in which the hemodynamics of the left and right heart chambers are directly influenced by each other to a much greater degree than normal. Other similarities include diastolic dysfunction and preserved ventricular ejection fraction; increased respiratory variation of ventricular inflow and outflow; equally elevated central venous, pulmonary venous, and ventricular diastolic pressures; and mild pulmonary hypertension.
10 What are the differences between tamponade and constrictive pericarditis?
In tamponade the pericardial space is open and transmits the respiratory variation in thoracic pressure to the heart, whereas in constrictive pericarditis the cavity is obliterated and the pericardium does not transmit these pressure changes. The dissociation of intrathoracic and intracardiac pressures (along with ventricular interaction) is the basis for the physical, hemodynamic, and echocardiographic findings of constriction.
In tamponade, systemic venous return increases with inspiration, enlarging the right side of the heart and encroaching on the left, whereas in constrictive pericarditis, systemic venous return does not increase with inspiration. The mechanism of diminished left ventricular and increased right ventricular volume in constrictive pericarditis is impaired left ventricular filling because of a lesser pressure gradient from the pulmonary veins.
In tamponade, early ventricular filling is impaired, whereas it is enhanced in constriction.
11 What are the physical findings of tamponade?
Cardiac tamponade is a hemodynamic condition characterized by equal elevation of atrial and pericardial pressures, an exaggerated inspiratory decrease in arterial systolic pressure (pulsus paradoxus), and arterial hypotension. The physical findings are dictated by both the severity of cardiac tamponade and the time course of its development. Inspection of the jugular venous pulse waveform reveals elevated venous pressure with a loss of the Y descent (because of the decrease in intrapericardial pressure that occurs during ventricular ejection, the systolic atrial filling wave and the X descent are maintained). Pulsus paradoxus is an inspiratory decline of systolic arterial pressure exceeding 10 mm Hg, which is measured by subtracting the pressure at which Korotkoff sounds are heard only during expiration from the pressure at which sounds are heard throughout the respiratory cycle. Tachycardia and tachypnea are usually present.
12 What are the physical findings of constrictive pericarditis?
Constrictive pericarditis resembles the congestive states caused by myocardial disease and chronic liver disease. Physical findings include ascites, hepatosplenomegaly, edema, and, in long-standing cases, severe wasting. The venous pressure is elevated and displays deep Y and often deep X descents. The venous pressure fails to decrease with inspiration (Kussmaul sign). A pericardial knock that is similar in timing to the third heart sound is pathognomonic but occurs infrequently. Except in severe cases, the arterial blood pressure is normal.
13 What is the role of echocardiography in tamponade?
Although tamponade is a clinical diagnosis, echocardiography plays major roles in the identification of pericardial effusion and in the assessment of its hemodynamic significance (Fig. 67.2). The use of echocardiography for the evaluation of all patients with suspected pericardial disease was given a class I recommendation by a 2003 task force of the American College of Cardiology (ACC), the American Heart Association (AHA), and the American Society of Echocardiography (ASE). This recommendation was supported by a 2013 ASE Expert Consensus Statement and the 2015 ESC Guidelines. Except in hyperacute cases, a moderate to large effusion is usually present, and swinging of the heart within the effusion may be seen. Reciprocal changes in left and right ventricular volumes occur with respiration. Echocardiographic findings suggesting hemodynamic compromise (atrial and ventricular diastolic collapses) are the result of transiently reversed right atrial and right ventricular diastolic transmural pressures and typically occur before hemodynamic embarrassment. The respiratory variation of mitral and tricuspid flow velocities is greatly increased and out of phase, reflecting the increased ventricular interaction. Less than a 50% inspiratory reduction in the diameter of a dilated inferior vena cava reflects a marked elevation in central venous pressure, and abnormal right-sided venous flows (systolic predominance and expiratory diastolic reversal) are diagnostic. In patients who do not have tamponade on first assessment, repeat echocardiography during clinical follow-up was given a class IIa recommendation by the 2003 ACC/AHA/ASE task force.
14 What is the role of echocardiography in constrictive pericarditis?
Echocardiography is an essential adjunctive procedure in patients with suspected pericardial constriction. The use of echocardiography for the evaluation of all patients with suspected pericardial disease is a class I ACC/AHA/ASE task force recommendation. Echocardiography findings to be sought include increased pericardial thickness (best with transesophageal echocardiography), abrupt inspiratory posterior motion of the ventricular septum in early diastole, plethora of the inferior vena cava and hepatic veins, enlarged atria, and an abnormal contour between the posterior left ventricular the left atrial posterior walls. Although no sign or combination of signs on M-mode is diagnostic of constrictive pericarditis, a normal study virtually rules out the diagnosis. Doppler is particularly useful, showing a high E velocity of right and left ventricular inflow and rapid deceleration, a normal or increased tissue Doppler E′, and a 25% to 40% fall in transmitral flow and marked increase of tricuspid velocity in the first beat after inspiration. Increased respiratory variation of mitral inflow may be missing in patients with markedly elevated left atrial pressure but may be brought out by preload reduction (e.g., head-up tilt). Hepatic vein flow reversals increase with expiration, reflecting the ventricular interaction and the dissociation of intracardiac and intrathoracic pressures, and pulmonary venous flow shows marked respiratory variation.
15 Are other imaging modalities useful in pericardial disease?
Other imaging techniques, such as CT and cardiovascular magnetic resonance (CMR), are not necessary if two-dimensional and Doppler echocardiography are available. However, pericardial effusion may be detected, quantified, and characterized by CT and CMR. CT scanning of the heart is extremely useful in the diagnosis of constrictive pericarditis; findings include increased pericardial thickness (>4 mm) and calcification. CMR provides direct visualization of the normal pericardium, which is composed of fibrous tissue and has a low MRI signal intensity. CMR is claimed by some to be the diagnostic procedure of choice for the detection of constrictive pericarditis (Fig. 67.3). Late gadolinium enhancement of the pericardium may predict reversibility of transitory constrictive pericarditis (see later) following treatment with anti-inflammatory agents. The 2015 ESC Guidelines recommend CT and/or CMR as second-level testing in the diagnostic workup of pericarditis.
16 What is the role for medical therapy in constrictive pericarditis?
Constrictive pericarditis is a surgical disease, except in cases of very early constriction or in severe, advanced disease. Medical therapy of constrictive pericarditis plays a small but important role. Medical therapy of specific etiologies (e.g., tuberculosis pericarditis) may significantly reduce progression to constriction. Medical therapy with anti-inflammatory drugs may resolve constriction (transitory constriction). Finally, medical therapy may be supportive therapy to control symptoms in patients not candidates for pericardiectomy due to their surgical risk. Diuretics and digoxin (in the presence of atrial fibrillation) are useful in these patients.
Preoperative, before pericardiectomy, diuretics should be used sparingly with the goal of reducing, not eliminating, elevated jugular pressure, edema, and ascites. Postoperatively, diuretics should be given if spontaneous diuresis does not occur; the central venous pressure may take weeks to months to return to normal after pericardiectomy. In some patients, constrictive pericarditis resolves either spontaneously or in response to various combinations of NSAIDs, steroids, and antibiotics (transitory constriction). Therefore, before pericardiectomy is recommended, conservative management for 2 to 3 months in hemodynamically stable patients with subacute constrictive pericarditis is recommended.
View chapterExplore book
Read full chapter
URL:
Book2018, Cardiology Secrets (Fifth Edition)Rahul Thomas, Brian D. Hoit
Chapter
The Cardiovascular System
2009, Equine Anesthesia (Second Edition)Colin C. Schwarzwald, ... William W. Muir
Pericardium
The pericardial space is formed by the reflection of the two pericardial membranes, the parietal pericardium and the visceral pericardium (epicardium) and normally contains a small amount of fluid. The pericardium, although not an essential structure, serves to restrain and protect the heart, acts as a barrier against contiguous infection, balances right and left ventricular output through diastolic and systolic interactions, limits acute chamber dilation, and exerts lubricant effects that minimize friction between cardiac chambers and surrounding structures.8 Pericardial constraint limits chamber dilation at high filling volumes or in the presence of pathologic conditions such as pericardial effusion or constriction, particularly of the thinner-walled right atrium and ventricle; augments ventricular interdependence; and limits diastolic ventricular filling.8
View chapterExplore book
Read full chapter
URL:
Book2009, Equine Anesthesia (Second Edition)Colin C. Schwarzwald, ... William W. Muir
Chapter
History and background of traditional Chinese medicine in neurological conditions
2010, Acupuncture in Neurological ConditionsVal Hopwood PhD FCSP Dip Ac Nanjing, Clare Donnellan MSc MCSP Dip Shiatsu MRSS
Pericardium (Xin Bao)
The Pericardium is closely related to the Heart; traditionally it is thought to shield the Heart from the invasion of External Pathogenic factors. It is also known as the Heart Protector. The ancient manuscripts, most particularly the Spiritual Pivot , do not grant the Pericardium true Zang Fu status, describing the Heart as the master of the five Zang and the six Fu. The Heart is considered to be the dwelling of the Shen and no Pathogen can be allowed past the barrier of the Pericardium in case the Heart is damaged and the Shen departs and death occurs. The Pericardium displays some of the characteristics of Xin Heart but is far less important, in that it only assists with the government of Blood and housing the Mind.
However, as stated earlier, Worsley considered the Pericardium more of a function than an entity and the points on the channel are often used to treat emotional problems, having a perceived cheering effect . They are also frequently used for their sedative effect. The meridian is also used in treatment of the Heart but is considered to be a less intense form of therapy than the use of Heart points.
In effect the Pericardium is considered as the active mechanism of the Heart, the physical pumping activity, whereas the Heart itself is more involved with containing the Spirit and maintaining full consciousness.
In spite of this lesser importance in Zang Fu terms, the meridian is a very useful one with many internal connections and wide-ranging physiological effects.
View chapterExplore book
Read full chapter
URL:
Book2010, Acupuncture in Neurological ConditionsVal Hopwood PhD FCSP Dip Ac Nanjing, Clare Donnellan MSc MCSP Dip Shiatsu MRSS
Chapter
Uncommon Cardiac Diseases
2018, Kaplan's Essentials of Cardiac Anesthesia (Second Edition)Jonathan F. Fox MD, ... William C. OliverJr. MD
Pericardial Heart Disease
The pericardium is a two-layer sac that encloses the heart and great vessels. The inner layer is a serous membrane (visceral pericardium) covering the surface of the heart. The outer layer is a fibrinous sac (parietal pericardium), which is attached to the great vessels, diaphragm, and sternum. The parietal pericardium is a stiff collagenous membrane that is resistant to acute expansion. The space between the two layers is the pericardial space, normally containing up to 50 mL of clear fluid that is an ultrafiltrate of plasma. It can gradually dilate to accept large volumes of fluid if slowly accumulated; however, rapid fluid accumulation leads to cardiac tamponade. The two layers of the pericardium are joined at the level of the great vessels and at the central tendon of the diaphragm caudally, and a serous layer extends past these junctions to line the inside of the fibrinous sac (parietal pericardium). The lateral course of the phrenic nerve on either side of the heart is an important anatomic relationship because this nerve is encapsulated in the pericardium and thus can easily be damaged during pericardiectomy. The pericardium is not essential for life, and pericardiectomy causes no apparent disability, but it has many subtle functions that are advantageous. Foremost, it acts to minimize torsion of the heart and reduces the friction from surrounding organs.
Acute Pericarditis
Acute pericarditis is common, but the actual incidence is unknown because it often goes unrecognized. It is generally self-limited, with symptoms lasting 6 weeks. Acute pericarditis has many causes (Box 18.6), the most common of which is viral (30–50%). Anesthesiologists encounter patients with acute pericarditis in the context of malignancy, MI, postcardiotomy syndrome, uremia, or infection when surgery is required, because symptoms are incapacitating and medical therapy has failed.
Constrictive Pericarditis
CP is a dense fusion of the parietal and visceral pericardium that limits diastolic filling of the heart, irrespective of the cause. The changes in the pericardium can be due to scarring, induced by a single episode of acute pericarditis, or caused by a prolonged exposure to a recurrent or chronic inflammatory process. Table 18.5 lists some of the causes of chronic CP. Up to 18% of pericardiectomies are attributed to previous cardiac surgeries, which may explain the increase in the number of cases of CP over the last 15 years.
Surgical Considerations for Pericardial Disease
Pericardiectomy is performed for recurrent pericardial effusion and CP refractory to conservative therapies. Pericardial dissection for effusive pericarditis is straightforward; however, pericardiectomy for CP is often a surgical challenge, with an operative mortality of 5.9% to 11.9%. The occurrence of tricuspid regurgitation may occur, similar to CP with signs of right-sided heart failure and volume overload. The presence of tricuspid regurgitation may identify a subset of patients with CP who have more advanced disease.
Persistent low CO immediately after pericardiectomy is a major cause of morbidity and mortality, occurring in 14% to 28% of patients in the immediate postoperative period. These findings are in contrast to the accepted belief that the pericardium is the problem in these patients and the myocardium is normal. Although patients with cardiac tamponade usually improve clinically once the pericardium is opened, improvement is not always apparent immediately after pericardiectomy for patients with CP. Noticeable improvement in cardiac function may take weeks; however, 90% of patients will experience relief of symptoms postoperatively.
Anesthetic Considerations
Anesthetic goals for managing patients with CP for pericardiectomy include minimizing bradycardia, myocardial depression, and decreases in preload and afterload. PAC monitoring is often used because of the risk of low CO syndrome postoperatively. Low CO syndrome develops in a subset of patients with CP, irrespective of the approach or extent of pericardiectomy. Low CO, hypotension, and arrhythmias (atrial and ventricular) are common during chest dissection. Because of limited and relatively fixed ventricular diastolic filling, CO becomes rate-dependent. If myocardial function or heart rate is depressed, then β-agonists or pacing will improve CO. Catastrophic hemorrhage can occur suddenly if the atrium or ventricle is perforated, necessitating adequate central venous access. Damage to coronary arteries may also occur during dissection; so careful monitoring of the ECG for signs of ischemia is prudent.
Cardiac Tamponade
Tamponade exists when fluid accumulation in the pericardial space dramatically increases intrapericardial pressure and limits filling of the heart. The rate of pericardial fluid accumulation, rather than the absolute fluid volume, is the determinant of tamponade sequelae. The classic Beck triad of acute tamponade, consisting of: (1) decreasing arterial pressure; (2) increasing venous pressure; and (3) a small, quiet heart, is only observed in 10% to 40% of patients. Pulsus paradoxus (Fig. 18.14) may also be observed, which is a fall in systolic blood pressure of more than 10 mm Hg during inspiration, caused by a reduced left ventricular stroke volume that is generated by increased filling of the right-sided heart during inspiration. Pulsus paradoxus is not sensitive or specific for tamponade, because it may be present in those with obstructive pulmonary disease, right ventricular infarction, or CP. Hemodynamic monitoring may aid in the diagnosis of cardiac tamponade. Ultimately, the right atrial pressure, pulmonary artery diastolic pressure, and pulmonary capillary wedge pressure equilibrate. Equilibration of these pressures (within 5 mm Hg of each other) merits immediate action to rule out acute tamponade. Echocardiography is the current method of choice and the most reliable noninvasive method to detect pericardial effusion and exclude tamponade.
Echocardiographic features of tamponade include an exaggerated motion of the heart within the pericardial sac in conjunction with atrial and ventricular collapse. Specific two-dimensional echocardiographic findings that support cardiac tamponade include diastolic collapse of the RV, inversion of the RA during diastole, abnormal ventricular septal motion, and variation of ventricular size with the respiratory cycle. Diastolic collapse of the right-sided chambers occurs because of pericardial pressure exceeding intracardiac pressure during diastole. Right atrial collapse is a specific finding during echocardiographic examination if it is present for more than one-third of the cardiac cycle.
Pericardiocentesis is indicated for life-threatening cardiac tamponade in conjunction with fluid resuscitation to maintain adequate filling pressures. Hemodynamic improvement should ensue after pericardiocentesis. Although pericardiocentesis relieves the symptoms of tamponade, definitive therapy directed at the underlying cause should be pursued. Major complications of pericardiocentesis include coronary artery laceration, cardiac puncture, and pneumothorax. Tamponade attributable to hemorrhage in the patient after cardiac surgery requires immediate mediastinal exploration to determine the source of bleeding and to stabilize hemodynamics.
Anesthetic Considerations
Severe hypotension or cardiac arrest has followed the induction of general anesthesia in patients with tamponade. The causes include myocardial depression, sympatholysis, decreased venous return, and changes in heart rate that often accompany anesthetic medications and positive pressure ventilation. Resuscitation requires immediate drainage of pericardial fluid. Pericardiotomy via a subxiphoid incision with only local anesthetic infiltration or light sedation is an option. If intrapericardial injury is confirmed, then general anesthesia can be induced after decompression of the pericardial space. Ketamine (0.5 mg/kg) and 100% oxygen have been used with local anesthetic infiltration of the preexisting sternotomy to drain severe pericardial tamponade. Spontaneous respirations, instead of positive-pressure ventilation, will support CO more effectively until tamponade is relieved. Correction of metabolic derangements is mandatory. Volume expansion is likely warranted in hypotensive patients. Similar to CP, patients with tamponade have a relatively low and fixed stroke volume and thus rely on heart rate and adequate filling to maintain CO. Catecholamine infusions or pacing may be used to avoid bradycardia.
View chapterExplore book
Read full chapter
URL:
Book2018, Kaplan's Essentials of Cardiac Anesthesia (Second Edition)Jonathan F. Fox MD, ... William C. OliverJr. MD
Related terms:
Pulmonary Artery
Constrictive Pericarditis
Pericarditis
Pleurae
Hemodynamic
Qi
Surface Property
Click
Liquid
Diaphragm
View all Topics |
2011 | https://cplusplus.com/reference/ostream/basic_ostream/operator-free/ | C++
Reference
C library:
Containers:
Input/Output:
Multi-threading:
Other:
class templates
classes
manipulators
basic_ostream
member classes
member functions
non-member overloads
protected members
std::operator<< (basic_ostream)
| | |
--- |
| single character (1) | template<class charT, class traits>basic_ostream<charT,traits>& operator<< (basic_ostream<charT,traits>& os, charT c);template<class charT, class traits>basic_ostream<charT,traits>& operator<< (basic_ostream<charT,traits>& os, char c);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<char,traits>& os, char c);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<char,traits>& os, signed char c);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<char,traits>& os, unsigned char c); |
| character sequence (2) | template<class charT, class traits>basic_ostream<charT,traits>& operator<< (basic_ostream<charT,traits>& os, const charT s);template<class charT, class traits>basic_ostream<charT,traits>& operator<< (basic_ostream<charT,traits>& os, const char s);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<charT,traits>& os, const char s);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<charT,traits>& os, const signed char s);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<charT,traits>& os, const unsigned char s); |
| | |
--- |
| single character (1) | template<class charT, class traits>basic_ostream<charT,traits>& operator<< (basic_ostream<charT,traits>& os, charT c);template<class charT, class traits>basic_ostream<charT,traits>& operator<< (basic_ostream<charT,traits>& os, char c);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<char,traits>& os, char c);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<char,traits>& os, signed char c);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<char,traits>& os, unsigned char c); |
| character sequence (2) | template<class charT, class traits>basic_ostream<charT,traits>& operator<< (basic_ostream<charT,traits>& os, const charT s);template<class charT, class traits>basic_ostream<charT,traits>& operator<< (basic_ostream<charT,traits>& os, const char s);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<charT,traits>& os, const char s);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<charT,traits>& os, const signed char s);template<class traits>basic_ostream<char,traits>& operator<< (basic_ostream<charT,traits>& os, const unsigned char s); |
| rvalue insertion (3) | template<class charT, class traits, class T>basic_ostream<charT,traits>& operator<< (basic_ostream<charT,traits>&& os, const T& val); |
<<
os<<val
os.width()
Parameters
char
os.widen(c)
char
os.widen
Return Value
| flag | error |
--- |
| eofbit
| failbit | The function failed while formatting the output (it may also be set if the construction of sentry failed). |
| badbit | Either the insertion on the stream failed, or some other error happened (such as when this function catches an exception thrown by an internal operation). When set, the integrity of the stream may have been affected. |
Example
| | |
--- |
| 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 | // example on insertion #include <iostream> // std::cout int main () { const char str[] = "Example string"; char ch = 'X'; std::cout << str << '\n'; // Insert string std::cout.width(5); std::cout.fill(''); std::cout << ch << '\n'; // Insert single character return 0; } |
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
`// example on insertion
include // std::cout
int main () {
const char str[] = "Example string";
char ch = 'X';
std::cout << str << '\n'; // Insert string
std::cout.width(5);
std::cout.fill('');
std::cout << ch << '\n'; // Insert single character
return 0;
}`
| |
| Example string X |
Data races
Exception safety
See also |
2012 | https://blog.csdn.net/qixiang_chen/article/details/112028613 | 等差数列前n项和推导过程_等差数列前n项和公式二次函数-CSDN博客
博客
下载
学习
社区
GitCode
InsCodeAI
会议
搜索
AI 搜索
登录
登录后您可以:
复制代码和一键运行
与博主大V深度互动
解锁海量精选资源
获取前沿技术资讯
立即登录
会员·新人礼包
消息
历史
创作中心
创作
等差数列前n项和推导过程
原创 已于 2022-12-13 16:51:18 修改·4.1k 阅读
· 2
· 0·
CC 4.0 BY-SA版权
版权声明:本文为博主原创文章,遵循CC 4.0 BY-SA版权协议,转载请附上原文出处链接和本声明。
文章标签:
#数学
于 2020-12-31 16:46:10 首次发布
初中数学解题方法汇总 专栏收录该内容
16 篇文章
订阅专栏
由于未提供博客具体内容,无法生成包含关键信息的摘要。
确定要放弃本次机会?
福利倒计时
: :
立减 ¥
普通VIP年卡可用
立即使用
华科易迅
关注关注
2点赞
踩
0 收藏 觉得还不错? 一键收藏
0评论
分享复制链接 分享到 QQ 分享到新浪微博 扫一扫
举报 举报
专栏目录
算法:求 等差数列 的n 项 和
weixin_41964616的博客
07-05 423
@华为算法题等形式读取数据 ) python实现 while True: try: a = int(input()) v = 2 s = 0 for i in range(a): s += v
等差数列 java用等差 公式 写_ 等差数列 求 和 公式 及 推导 方法
weixin_33693600的博客
02-25 2040
等差数列 是指从第二 项 起,每一 项 与它的 前 一 项 的差等于同一个常数的一种数列,常用A、P表示。这个常数叫做 等差数列 的公差。前 n 项 和 公式 为:Sn=a1n+[n(n-1)d]/2或Sn=[n(a1+an)]/2。等差数列 公式 1.定义式2.通 项 公式 3.求 和 公式 4.前 n 项 和 公式 等差数列 推论(1)从通 项 公式 可以看出,a(n)是n的一次函数(d≠0)或常数函数(d=0),(n,an)排在一条直线上,由 前 n 项...
参与评论 您还未登录,请先 登录 后发表或查看评论
等差数列 求 和 公式 - 等差数列 解析
9-17
等差数列 是常见数列的一种,可以用AP表示,如果一个数列从第二 项 起,每一 项 与它的 前 一 项 的差等于同一个常数,这个数列就叫做 等差数列,而这个常数叫做 等差数列 的公差,公差常用字母d表示。例如:1,3,5,7,9……(2n-1)。等差数列{an}的通 项 公式 为:an=a1+(n-1)d。前 n 项 和 公式 为:Sn=na1+n(n-1)d/2或Sn=n(a1+an)/2。注意:
管理类联考——数学——汇总篇——知识点突破——代数——等差数列
9-11
该博客主要围绕 等差数列 展开,介绍了其分类方式,罗列了定义、通 项、前 n 项 和 等 公式,讲解了考点、考试解读 和 命题方向,还阐述了通 项 公式、性质、前 n 项 和 的相关内容,以及基本问题、奇数 项 和 之比、Sn最值问题的求解方法。 读书笔记 等差数列 可以分为: 1.等差数列 基本问题:求 和、求 项 数、求某 项、轮换对称性。 2. 两...
2.3-等差数列 前 项 n 和 的性质及 推导--2.3(第二课时).pdf
04-21
人教版--高中 数学 必修5--2.3 等差数列 前 项 n 和 的常用的性质以及这些性质的 推导 证明,适用于老师复习 和 学生复习
等差数列 的 前 n 项 和
12-13
等差数列 的 前 n 项 和
等差数列 解析
9-18
(2)式知,Sn是n的 二次函数(d≠0)或一次函数(d=0,a1≠0),且常数 项 为0。 在 等差数列 中,等差中 项: , 且任意两 项 am,an的关系为: an=am+(n-m)d 它可以看作 等差数列 广义的通 项 公式。 从 等差数列 的定义、通 项 公式,前 n 项 和 公式 还可推出: a1+an=a2+an-1=a3+an-2=…=ak+an-k+1,k∈{1,2,…...
数学 术语大全
9-21
argument of a function 函数的自变量 arithmetic 算术 arithmetic mean 算术平均;等差中顶;算术中顶 arithmetic progression 算术级数;等差级数 arithmetic sequence 等差序列 arithmetic series 等差级数 arm 边 array 数组; 数组 arrow 前 号 ascending order 递升序 ascending powers of X X 的升幂 assertion 断语; ...
等差数列 前 n 项 和 公式 证明
那么巧合 的专栏
02-25 1万+
等差数列 前 n 项 和 公式 证明 等差数列 第一 项 为 a1公差为 d则 前 n 项 的 和 为:Sn=[(a1+an)∗n]/2Sn = [ (a1 + an)n ] / 2证明 过程 如下: Sn = a1 + (a1 + d) + ... + (a1 + (n-1)d) Sn = an + (an - d) + ... + (an - (n-1)d) 上边两式相加得到 2Sn = (a1 + an)n 即 Sn =
等差数列 前 n 项 和
网站开发初中级代码参考-转载
11-08 1242
#include<iostream.h> void main() { int s,i,n,sum; cout<<"输入初始值s:"<<"\t"; cin>>s; cout<<"输入增量i:"<<"\t"; cin>>i;
二分查找、三分查找求极点、二分求等比数列【模板】找出最大等比数列 _和...
9-16
二分求等比数列 LL Power(LL p,LL n) { LL ret=1;while(n>0) {if(n&1) ret=retp%9901; p=pp%9901; n>>=1; }returnret; } LLSum(LL p,LL n)//递归二分求(1 + p^1 + p^2 + … + p^n)%mod{if(n==0)return1;if(n&1)return(Sum(p,n/2)(1+Power(p,n/2+1)))%...
辽宁省专升本考 数学 样例真题及解析_专升本 数学 辽宁真题
9-26
文章讨论了如何通过分析 二次函数 在特定区间上的性质找到参数a的值,以及如何利用 等差数列 前 n 项 和 公式 解决给定S10 和 S100求S110的问题。 题目:已知函数 f(x) = x^2 + ax + 3 在区间 [-1, 2] 上的最小值为-3,求 a 的值。 解析:首先,二次函数 f(x) = x^2 + ax + 3 的对称轴为 x = -a/2...
高二 数学 等差数列 前 n 项 和 PPT课件.pptx
10-10
等差数列 前 n 项 和 的求解是 等差数列 理论的重要组成部分,它在实际问题解决中有着广泛的应用。 首先,我们要理解什么是 等差数列。等差数列 是一个序列,其中任意两 项 之间的差是一个常数,这个常数被称为公差。例如,...
高中 数学 数列 等差数列 的 前 n 项 和 北师大必修PPT课件.pptx
10-10
此外,等差数列 的 前 n 项 和 公式 体现了 数学 中的对称美,以及从具体实例到 数学 模型的构建 过程,有助于培养学生的 数学 兴趣 和 自信心。 在教学反思环节,教师应关注学生是否真正掌握了 等差数列 的 前 n 项 和 公式,是否能够灵活...
...这些看看有没有掌握_ 二次函数 顶点式、等差数列 通 项 公式
9-17
三角函数也是重点,正弦函数 sinα,余弦函数 cosα,正切函数 tanα,它们之间存在众多的关系式,如 sin²α + cos²α = 1。 数列方面,等差数列 通 项 公式 为 an = a1 + (n - 1)d,前 n 项 和 公式 为 Sn = n(a1 + an) / 2 ;等比数列通 项 公式 为 an = a1×q^(n - 1),前 n 项 和 公式 为 Sn ...
求数列中连续数值组成的 等差数列 最大长度_ 二次函数 与 等差数列 也可以扯...
9-15
等差数列 前 n 项 之 和 Sn是 项 数n的 二次函数: 它没有常数 项(图像过原点),开口朝向可上可下,视d的正负而定,以d>0为例: 若n的取值为连续实数,则图像为完整的抛物线。但在 等差数列 中,n的取值为正整数,故图像为一连串的点(图中红点)。 例2:已知 等差数列{an}的 前 n 项 之 和 为Sn。若a1<0,S8=S14,则{Sn}有最...
等差数列 前 n 项 和 教案.doc
10-21
教学内容主要围绕 等差数列 前 n 项 和 的 推导 过程 和 简单应用展开。这一部分的教学是在学生已经掌握了 等差数列 通 项 公式 的基础上进行的,因此学生应具备一定的函数 和 数列基础知识,包括 等差数列 的定义 和 性质,以及高斯求 和...
等差数列 前 n 项 和 公开课.ppt
11-07
通过本节公开课,学生不仅能够复习 和 巩固 等差数列 的基础知识,还能深入理解 等差数列 前 n 项 和 的 推导 过程 及其几何意义,进一步提升 数学 思维 和 问题解决能力。通过课堂练习 和 小测验,学生可以检验自己的学习效果,并在...
推导 等差数列 前 n 项 积
weixin_42613018的博客
02-09 2161
等差数列 前 n 项 积可以使用递推 公式 推导: 设 等差数列 前 n 项 积为S_n,公差为d,首 项 为a_1 则:S_n = a_1 (a_1 + d) (a_1 + 2d) …… (a_1 + (n-1)d) 由此可得:S_n = a_1^n ((a_1 + d) / a_1) ((a_1 + 2d) / (a_1 + d)) …… ((a_1 + (n-1)d) / (a_1 +...
等差数列 2,5,8,11,14。。。。 输入:正整数N>0 输出:求 等差数列 前 N 项 和
黄昏的晨曦
08-17 3427
#include using namespace std; int main() { int a1=2,d=3,n,sum; while(cin>>n) { sum=na1+n(n-1)/2d; //等差数列 求 和 公式 cout<<sum<<endl; ...
语言求 等差数列 前 n 项 和 【尧哥说数列2】_等差数列
weixin_42372573的博客
01-12 758
教学理论上的目标:1.理解 等差数列 的概念;2.掌握 等差数列 的通 项 公式 与 前 n 项 和 公式;3.能在具体的问题情境中识别数列的等差关系,并能用有关知识解决相应的问题;4.了解 等差数列 与一次函数、二次函数 的关系.尧哥的教学目标:熟练掌握万能法知识点一 等差数列 的定义如果一个数列从第2 项 起,每一 项 与它的 前 一 项 的差等于同一个常数,那么这个数列就叫做 等差数列,这个常数叫做 等差数列 的公差,公差通常用字...
Java编程 等差数列
琉和四月的博客
07-09 6716
sum=2+5+8+11+14+⋯,输入正整数nn,求sumsum的 前 nn 项 和。 公式 描述:公式 中首 项 为a1,末 项 为an,项 数为n,公差为d,前 n 项 和 为Sn。 第一种是直接写出 公式 的方法 public static void main(String[] args) { Scanner sc=new Scanner(System.in); System.out.println("请输入数")...
Java:1006: 求 等差数列 的 和
bairimeng16的博客
05-25 735
1006: 求 等差数列 的 和 时间限制:1Sec内存限制:30 MB 提交:55615解决:35498 [状态] [讨论版] [提交] [命题人:admin] 题目描述 给出三个整数,分别表示 等差数列 的第一 项、最后一 项 和 公差,求该数列的 和。 输入 输入三个整数,之间用空格隔开。第1个数作为首 项,第2个数作为末 项,第3个数作为公差。 输出 输出占一行,包含一个整数,为该 等差数列 的 和。 样例输入Copy 2 11 3 样例输出Copy 26 提示 本题在...
2.3 等差数列 的 前 n 项 和
kingBook928的博客
05-06 615
一般地,我们称 a 1+a 2+a 3+…+a n a 1+a 2+a 3+…+a n 为数列{a n}{a n}的 前 n 项 和,用 S n S n 表示,即 S n=a 1+a 2+a 3+…+a n.S n=a 1+a 2+a 3+…+a n. 由高斯算法的启示,对于公差为 d d 的 等差数列,我们用两种方式表示 S n S n: [S_n=a_1+(a_1+d)+(a_1+2d)+\ldots+[a_1+(n-1)d],\ \ ...
等比数列 前 n 项 和 推导
qixiang_chen的博客
12-31 2099
等比数列 前 n 项 和 推导
c语言 求分数序列 前 N 项 和 热门推荐
inooll的博客
03-08 1万+
本题要求编写程序,计算序列 2/1+3/2+5/3+8/5+… 的 前 N 项 之 和。注意该序列从第 2 项 起,每一 项 的分子是 前 一 项 分子与分母的 和,分母是 前 一 项 的分子。 输入格式: 输入在一行中给出一个正整数 N。 输出格式: 在一行中输出部分 和 的值,精确到小数点后两位。题目保证计算结果不超过双精度范围。 尝试 #include int main() { int n; ...
差分法求高阶 等差数列 的通 项 公式
Happig的博客
09-21 4871
高阶 等差数列 对于一个给定的数列,将连续两 项 之间的差bn=an+1−anb_n=a_{n+1}-a_nbn=an+1−an得到一个新的数列,那么bnb_nbn称为原数列的一阶 等差数列,若cn=bn+1−bnc_n=b_{n+1}-b_ncn=bn+1−bn,那么cnc_ncn称为原数列的二阶 等差数列,以此类推… 高阶 等差数列 都有一个多 项 式的通 项 公式。 差分法 给定序列aaa,依次求出该序列的kkk阶等差序列,直到某个序列全为000为止,按照下列排列规则排列在纸上 Cn+11&nb
等差数列 前 n 项 和 公式 最新发布
03-19
### 等差数列 前 n 项 和 的 数学 定义 等差数列 是一种特殊的数列,其特点是每一 项 与其 前 一 项 之差是一个固定常数,称为公差 d d。设首 项 为 a 1 a 1,则第 k k 项 可以表示为: a k=a 1+(k−1)da k=a 1+(k−1)d 对于 等差数列 的 前 n n 项 和 S n S n 的定义如下: S n=a 1+a 2+a 3+⋯+a nS n=a 1+a 2+a 3+⋯+a n 通过代入通 项 公式 可得: S n=∑k=1 n a k=∑k=1 n(a 1+(k−1)d)S n=∑k=1 n a k=∑k=1 n(a 1+(k−1)d) 展开求 和 表达式并简化得到最终 公式: S n=n 2⋅(2 a 1+(n−1)d)S n=n 2⋅(2 a 1+(n−1)d) 或者更常见的形式为: S n=n 2⋅(a 1+a n)S n=n 2⋅(a 1+a n) 其中 a n a n 是该序列中的最后一 项。 ### 等差数列 前 n 项 和 的 推导 过程 为了验证上述 公式,可以通过高斯法来直观理解这一结论。假设我们有以下 等差数列 及其反向排列: 正序:a 1,a 2,...,a n a 1,a 2,...,a n 倒序:a n,a n−1,...,a 1 a n,a n−1,...,a 1 当我们将这两组相加时,每一对对应位置上的元素总 和 均为相同的定值: (a 1+a n),(a 2+a n−1),...,(a n+a 1)6,(a 2+a n−1),...,(a n+a 1) 由于共有 n n 对这样的组合,因此整个序列的两倍 和 等于这些配对的总数乘以单个配对的数值: 2 S n=n⋅(a 1+a n)2 S n=n⋅(a 1+a n) 由此得出标准 公式: S n=n 2⋅(a 1+a n)S n=n 2⋅(a 1+a n) 如果替换掉 a n a n 使用通 项 公式,则会获得另一种表述方式: S n=n 2⋅(2 a 1+(n−1)d)S n=n 2⋅(2 a 1+(n−1)d) 以下是实现计算的一个简单 Python 函数示例: python def arithmetic_sum(n, first_term, common_difference): """ 计算 _等差数列_ _前_ n _项_ _和_ 参数: n : int _前_ 几 _项_ 的数量 first_term : float 首 _项_ common_difference : float 公差 返回: sum_of_series : float 序列 _前_ n _项_ _和_ """ return n / 2 (2 first_term + (n - 1) common_difference)
关于我们
招贤纳士
商务合作
寻求报道
400-660-0108
kefu@csdn.net
在线客服
工作时间 8:30-22:00
公安备案号11010502030143
京ICP备19004658号
京网文〔2020〕1039-165号
经营性网站备案信息
北京互联网违法和不良信息举报中心
家长监护
网络110报警服务
中国互联网举报中心
Chrome商店下载
账号管理规范
版权与免责声明
版权申诉
出版物许可证
营业执照
©1999-2025北京创新乐知网络技术有限公司
华科易迅
博客等级
码龄7年
497 原创463 点赞 934 收藏 305 粉丝
关注
私信
🔥2核2G ARM架构云服务器 每月750小时免费试用🆓 灵活弹性又可靠💪早用早省~广告
热门文章
SpringBoot四大组件 30699
VUE集成ElementUI开发 18766
管理后台界面基本框架设计 18731
Java常用的设计模式 18015
证明三角形tanA+tanB+tanC=tanAtanBtanC 15413
分类专栏
人工智能22篇
高考备考4篇
中考备考14篇
SQL(Mysql-Oracle)5篇
华科易迅信息化系统4篇
初中物理6篇
高中数学24篇
初中数学123篇
高中数学解题方法汇总9篇
初中数学解题方法汇总16篇
笔记3篇
初中英语4篇
Mint-ui2篇
ShardingSphere1篇
微信小程序2篇
Android4篇
SpringBoot29篇
Java17篇
Freemarker15篇
Redis11篇
Solr8篇
RabbitMQ11篇
Dubbo4篇
Nginx9篇
SQL(Mysql,Oracle)3篇
华科易迅创客平台项目21篇
Git
SpringCloud10篇
NodeJS3篇
Shiro2篇
VUE18篇
Docker1篇
Angular2篇
Fdfs分布文件系统3篇
Test11篇
Mybatis2篇
PostgreSQL1篇
面试知识集锦4篇
Elasticsearch1篇
Java基础27篇
Activiti
展开全部收起
上一篇: 绝对值和最小逆向法则 下一篇: 等比数列前n项和推导
最新评论
SpringBoot集成JasperReport
生产队队长:jasperreports 6.0.0版本无法下载
Ubuntu 20安装微信客户端
华科易迅:操作系统版本是ubuntu-20.04.5-desktop-amd64,试过其他安装方式都未成功,只要这种方式可以安装并使用电脑版微信,只是消息不弹屏的缺陷。
Ubuntu 20安装微信客户端
Silent976:没,现在只能用网页的微信文件传输助手传文件了
Ubuntu 20安装微信客户端
Silent976:下载的版本太低了,打开软件要求更新
VUE入门案例
CSDN-Ada助手:哇, 你的文章质量真不错,值得学习!不过这么高质量的文章, 还值得进一步提升, 以下的改进点你可以参考下: (1)使用更多的站内链接;(2)增加除了各种控件外,文章正文的字数;(3)使用标准目录。
大家在看
JavaScript身份证号校验算法
XXE - 实体注入(xml外部实体注入)
论文精读(六):微服务系统服务依赖发现技术综述 5100
二.栈和队列
【每日一问】为什么PCB布线要避免直角? 322
最新文章
使用Dlib实现人脸识别
人工智能学习83-Yolo训练类
人工智能学习81-Yolo预测类
2025
07月 10篇
06月 35篇
05月 29篇
2024年 1篇
2023年 6篇
2022年 7篇
2021年 14篇
2020年 215篇
2019年 78篇
2018年 102篇
🔥2核2G ARM架构云服务器 每月750小时免费试用🆓 灵活弹性又可靠💪早用早省~广告
上一篇: 绝对值和最小逆向法则 下一篇: 等比数列前n项和推导
分类专栏
人工智能22篇
高考备考4篇
中考备考14篇
SQL(Mysql-Oracle)5篇
华科易迅信息化系统4篇
初中物理6篇
高中数学24篇
初中数学123篇
高中数学解题方法汇总9篇
初中数学解题方法汇总16篇
笔记3篇
初中英语4篇
Mint-ui2篇
ShardingSphere1篇
微信小程序2篇
Android4篇
SpringBoot29篇
Java17篇
Freemarker15篇
Redis11篇
Solr8篇
RabbitMQ11篇
Dubbo4篇
Nginx9篇
SQL(Mysql,Oracle)3篇
华科易迅创客平台项目21篇
Git
SpringCloud10篇
NodeJS3篇
Shiro2篇
VUE18篇
Docker1篇
Angular2篇
Fdfs分布文件系统3篇
Test11篇
Mybatis2篇
PostgreSQL1篇
面试知识集锦4篇
Elasticsearch1篇
Java基础27篇
Activiti
展开全部收起
登录后您可以享受以下权益:
免费复制代码
和博主大V互动
下载海量资源
发动态/写文章/加入社区
×立即登录
评论
被折叠的 条评论 为什么被折叠?到【灌水乐园】发言
查看更多评论
添加红包
祝福语
请填写红包祝福语或标题
红包数量
个
红包个数最小为10个
红包总金额
元
红包金额最低5元
余额支付
当前余额 3.43 元 前往充值 >
需支付:10.00 元
取消 确定
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付 元
使用余额支付
点击重新获取
扫码支付
钱包余额 0
抵扣说明:
1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。
余额充值
确定 取消
举报
选择你想要举报的内容(必选)
内容涉黄
政治相关
内容抄袭
涉嫌广告
内容侵权
侮辱谩骂
样式问题
其他
原文链接(必填)
请选择具体原因(必选)
包含不实信息
涉及个人隐私
请选择具体原因(必选)
侮辱谩骂
诽谤
请选择具体原因(必选)
搬家样式
博文样式
补充说明(选填)
取消
确定
AI助手
AI 搜索 智能体 AI 编程 AI 作业助手
下载APP 程序员都在用的中文IT技术交流社区 公众号 专业的中文 IT 技术社区,与千万技术人共成长 视频号 关注【CSDN】视频号,行业资讯、技术分享精彩不断,直播好礼送不停!客服返回顶部 |
2013 | https://artofproblemsolving.com/wiki/index.php/2025_AIME_I_Problems/Problem_2?srsltid=AfmBOoq2LaPgTePTyMrsqi4ABjI0p41TnWHsy7XclsZMSWZQM7-cbIZY | Art of Problem Solving
2025 AIME I Problems/Problem 2 - AoPS Wiki
Art of Problem Solving
AoPS Online
Math texts, online classes, and more
for students in grades 5-12.
Visit AoPS Online ‚
Books for Grades 5-12Online Courses
Beast Academy
Engaging math books and online learning
for students ages 6-13.
Visit Beast Academy ‚
Books for Ages 6-13Beast Academy Online
AoPS Academy
Small live classes for advanced math
and language arts learners in grades 2-12.
Visit AoPS Academy ‚
Find a Physical CampusVisit the Virtual Campus
Sign In
Register
online school
Class ScheduleRecommendationsOlympiad CoursesFree Sessions
books tore
AoPS CurriculumBeast AcademyOnline BooksRecommendationsOther Books & GearAll ProductsGift Certificates
community
ForumsContestsSearchHelp
resources
math training & toolsAlcumusVideosFor the Win!MATHCOUNTS TrainerAoPS Practice ContestsAoPS WikiLaTeX TeXeRMIT PRIMES/CrowdMathKeep LearningAll Ten
contests on aopsPractice Math ContestsUSABO
newsAoPS BlogWebinars
view all 0
Sign In
Register
AoPS Wiki
ResourcesAops Wiki 2025 AIME I Problems/Problem 2
Page
ArticleDiscussionView sourceHistory
Toolbox
Recent changesRandom pageHelpWhat links hereSpecial pages
Search
2025 AIME I Problems/Problem 2
Contents
1 Problem
2 Video solution by grogg007
3 Solution 1
4 Solution 2
5 Solution 3
6 Solution 4 (Vectors)
7 Video Solution 1 by SpreadTheMathLove
8 Video Solution(Fast! Easy!)
9 Video Solution by Mathletes Corner
10 Video Solution by yjtest
11 See also
Problem
On points , , , and lie in that order on side with , , and . Points , , , and lie in that order on side with , , and . Let be the reflection of through , and let be the reflection of through . Quadrilateral has area . Find the area of heptagon .
Video solution by grogg007
Solution 1
Note that the triangles outside have the same height as the unshaded triangles in . Since they have the same bases, the area of the heptagon is the same as the area of triangle . Therefore, we need to calculate the area of . Denote the length of as and the altitude of to as . Since , and the altitude of is . The area . The area of is equal to .
~alwaysgonnagiveyouup
Solution 2
Because of reflections, and various triangles having the same bases, we can conclude that . Through the given lengths of on the left and on the right, we conclude that the lines through are parallel, and the sides are in a ratio. Because these lines are parallel, we can see that , are similar, and from our earlier ratio, we can give the triangles side ratios of , or area ratios of . Quadrilateral corresponds to the , which corresponds to the ratio . Dividing by , we get , and finally multiplying gives us our answer of
~shreyan.chethan, cleaned up by cweu001
Solution 3
By area lemma, we can see that the areas of the shaded areas are equivalent to the areas of the unshaded areas. Thus, we see that the desired area is equivalent to the area of the triangle . Since , we have , meaning . Thus, since , we can calculate .
~cweu001, cleaned up by shreyan.chethan
Solution 4 (Vectors)
Let △A B C be given with points D,E on segment A B such that A,D,E,B lie in that order, and A D=4, D E=16, and E B=8. Similarly, points F,G lie on segment A C such that A,F,G,C lie in that order with A F=13, F G=52, and G C=26.
Note that the segment A B is partitioned into three parts with lengths 4:16:8, which simplifies to the ratio 1:4:2. Similarly, segment A C is partitioned into parts 13:52:26, also reducing to the ratio 1:4:2. This implies that the points D,E divide A B and points F,G divide A C in the same proportions.
Because the divisions correspond proportionally on A B and A C, the line segments D E and F G are parallel to B C. In particular, triangles A D F, A E G, and A B C are similar by the Angle-Angle similarity criterion.
Let us introduce vector notation for convenience. Represent points A,B,C by vectors A→,B→,C→ respectively. Then the points on A B satisfy:
D→=A→+1 7(B→−A→), E→=A→+5 7(B→−A→), D=A+1 7(B−A), E=A+5 7(B−A),
and the points on A C satisfy:
F→=A→+1 7(C→−A→), G→=A→+5 7(C→−A→). F=A+1 7(C−A), G=A+5 7(C−A).
The point M is the reflection of D about F, so
M→=2 F→−D→, M=2 F−D,
and N is the reflection of G about E, so
N→=2 E→−G→. N=2 E−G.
The polygon A F N B C E M has vertices at A→,F→,N→,B→,C→,E→,M→.
Because M and N are reflections of points D and G about points F and E respectively, the triangles △D F M and △E G N are congruent to △A D F and △A E G respectively. Thus, the area of polygon A F N B C E M can be decomposed as
Since △A D F, △A E G, and △A B C are similar with similarity ratios in lengths of 1:5:7, their areas are in the ratio
Given the quadrilateral D E G F is the region between △A E G and △A D F, its area is
where k=[A D F].
From the problem, [D E G F]=288, so
Hence,
Since the heptagon's area is [A B C]+[A D F]+[A E G]=[A B C]+k+25 k=[A B C]+26 k, but recalling that △D F M and △E G N are precisely the reflected copies of △A D F and △A E G that replace these smaller triangles inside A B C, the total area of the heptagon A F N B C E M is exactly the area of △A B C: 588.
~Pinotation
Video Solution 1 by SpreadTheMathLove
Video Solution(Fast! Easy!)
~MC
Video Solution by Mathletes Corner
~GP102
Video Solution by yjtest
See also
2025 AIME I (Problems • Answer Key • Resources)
Preceded by
Problem 1Followed by
Problem 3
1•2•3•4•5•6•7•8•9•10•11•12•13•14•15
All AIME Problems and Solutions
These problems are copyrighted © by the Mathematical Association of America, as part of the American Mathematics Competitions.
Retrieved from "
Art of Problem Solving is an
ACS WASC Accredited School
aops programs
AoPS Online
Beast Academy
AoPS Academy
About
About AoPS
Our Team
Our History
Jobs
AoPS Blog
Site Info
Terms
Privacy
Contact Us
follow us
Subscribe for news and updates
© 2025 AoPS Incorporated
© 2025 Art of Problem Solving
About Us•Contact Us•Terms•Privacy
Copyright © 2025 Art of Problem Solving
Something appears to not have loaded correctly.
Click to refresh. |
2014 | https://www.scoilnet.ie/uploads/resources/28771/28507.pdf | 4.4.5 - De Moivre’s Theorem II - Proof 4.4 - Algebra - Complex Numbers Leaving Certificate Mathematics Higher Level ONLY 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 1 / 4 De Moivre’s Theorem Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for all n.
4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 2 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 3 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 3 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Proof: 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 3 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Proof: Use induction.
4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 3 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Proof: Use induction.
Step 1: Test for n = 1.
4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 3 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Proof: Use induction.
Step 1: Test for n = 1.
LHS = (cos θ + i sin θ)1 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 3 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Proof: Use induction.
Step 1: Test for n = 1.
LHS = (cos θ + i sin θ)1 = cos θ + i sin θ 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 3 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Proof: Use induction.
Step 1: Test for n = 1.
LHS = (cos θ + i sin θ)1 = cos θ + i sin θ RHS = cos(1θ) + i sin(1θ) 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 3 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Proof: Use induction.
Step 1: Test for n = 1.
LHS = (cos θ + i sin θ)1 = cos θ + i sin θ RHS = cos(1θ) + i sin(1θ) = cos θ + i sin θ 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 3 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Proof: Use induction.
Step 1: Test for n = 1.
LHS = (cos θ + i sin θ)1 = cos θ + i sin θ RHS = cos(1θ) + i sin(1θ) = cos θ + i sin θ LHS = RHS 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 3 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Proof: Use induction.
Step 1: Test for n = 1.
LHS = (cos θ + i sin θ)1 = cos θ + i sin θ RHS = cos(1θ) + i sin(1θ) = cos θ + i sin θ LHS = RHS ∴ Equation is true for n = 1.
4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 3 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) = (cos kθ + i sin kθ)(cos θ + i sin θ) . . . assumed 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) = (cos kθ + i sin kθ)(cos θ + i sin θ) . . . assumed = cos(kθ + θ) + i sin(kθ + θ) 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) = (cos kθ + i sin kθ)(cos θ + i sin θ) . . . assumed = cos(kθ + θ) + i sin(kθ + θ) = cos [(k + 1)θ] + i sin [(k + 1)θ] 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) = (cos kθ + i sin kθ)(cos θ + i sin θ) . . . assumed = cos(kθ + θ) + i sin(kθ + θ) = cos [(k + 1)θ] + i sin [(k + 1)θ] Step 4: Conclusion.
4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) = (cos kθ + i sin kθ)(cos θ + i sin θ) . . . assumed = cos(kθ + θ) + i sin(kθ + θ) = cos [(k + 1)θ] + i sin [(k + 1)θ] Step 4: Conclusion.
True for n = k + 1, 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) = (cos kθ + i sin kθ)(cos θ + i sin θ) . . . assumed = cos(kθ + θ) + i sin(kθ + θ) = cos [(k + 1)θ] + i sin [(k + 1)θ] Step 4: Conclusion.
True for n = k + 1, assuming true for n = k.
4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) = (cos kθ + i sin kθ)(cos θ + i sin θ) . . . assumed = cos(kθ + θ) + i sin(kθ + θ) = cos [(k + 1)θ] + i sin [(k + 1)θ] Step 4: Conclusion.
True for n = k + 1, assuming true for n = k.
But true for n = 1.
4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) = (cos kθ + i sin kθ)(cos θ + i sin θ) . . . assumed = cos(kθ + θ) + i sin(kθ + θ) = cos [(k + 1)θ] + i sin [(k + 1)θ] Step 4: Conclusion.
True for n = k + 1, assuming true for n = k.
But true for n = 1.
∴ True for n = 2, 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) = (cos kθ + i sin kθ)(cos θ + i sin θ) . . . assumed = cos(kθ + θ) + i sin(kθ + θ) = cos [(k + 1)θ] + i sin [(k + 1)θ] Step 4: Conclusion.
True for n = k + 1, assuming true for n = k.
But true for n = 1.
∴ True for n = 2, 3, 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) = (cos kθ + i sin kθ)(cos θ + i sin θ) . . . assumed = cos(kθ + θ) + i sin(kθ + θ) = cos [(k + 1)θ] + i sin [(k + 1)θ] Step 4: Conclusion.
True for n = k + 1, assuming true for n = k.
But true for n = 1.
∴ True for n = 2, 3, . . . and all n ∈N 4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 Theorem: (cos θ + i sin θ)n = cos nθ + i sin nθ, for n ∈N.
Step 2: Assume true for n = k.
i.e. (cos θ + i sin θ)k = cos kθ + i sin kθ Step 3: Prove true for n = k + 1, assuming true for n = k.
(cos θ + i sin θ)k+1 = (cos θ + i sin θ)k(cos θ + i sin θ) = (cos kθ + i sin kθ)(cos θ + i sin θ) . . . assumed = cos(kθ + θ) + i sin(kθ + θ) = cos [(k + 1)θ] + i sin [(k + 1)θ] Step 4: Conclusion.
True for n = k + 1, assuming true for n = k.
But true for n = 1.
∴ True for n = 2, 3, . . . and all n ∈N by induction.
4.4 - Algebra - Complex Numbers 4.4.5 - De Moivre’s Theorem II - Proof Higher Level ONLY 4 / 4 |
2015 | https://gap-packages.github.io/numericalsgps/doc/chap6.html | Goto Chapter: Top 1 2 3 4 5 6 7 8 9 10 11 12 13 14 A B C Bib Ind
[Top of Book] [Contents] [Previous Chapter] [Next Chapter]
[MathJax on] [Style]
6
Irreducible numerical semigroups
6.1
Irreducible numerical semigroups
6.1-1 IsIrreducible
6.1-2 IsSymmetric
6.1-3 IsPseudoSymmetric
6.1-4 AnIrreducibleNumericalSemigroupWithFrobeniusNumber
6.1-5 IrreducibleNumericalSemigroupsWithFrobeniusNumber
6.1-6 IrreducibleNumericalSemigroupsWithFrobeniusNumberAndMultiplicity
6.1-7 DecomposeIntoIrreducibles
6.2
Complete intersection numerical semigroups
6.2-1 AsGluingOfNumericalSemigroups
6.2-2 IsCompleteIntersection
6.2-3 CompleteIntersectionNumericalSemigroupsWithFrobeniusNumber
6.2-4 IsFree
6.2-5 FreeNumericalSemigroupsWithFrobeniusNumber
6.2-6 IsTelescopic
6.2-7 TelescopicNumericalSemigroupsWithFrobeniusNumber
6.2-8 IsUniversallyFree
6.2-9 IsNumericalSemigroupAssociatedIrreduciblePlanarCurveSingularity
6.2-10 NumericalSemigroupsPlanarSingularityWithFrobeniusNumber
6.2-11 IsAperySetGammaRectangular
6.2-12 IsAperySetBetaRectangular
6.2-13 IsAperySetAlphaRectangular
6.3
Almost-symmetric numerical semigroups
6.3-1 AlmostSymmetricNumericalSemigroupsFromIrreducible
6.3-2 AlmostSymmetricNumericalSemigroupsFromIrreducibleAndGivenType
6.3-3 IsAlmostSymmetric
6.3-4 AlmostSymmetricNumericalSemigroupsWithFrobeniusNumber
6.3-5 AlmostSymmetricNumericalSemigroupsWithFrobeniusNumberAndType
6.4
Several approaches generalizing the concept of symmetry
6.4-1 IsGeneralizedGorenstein
6.4-2 IsNearlyGorenstein
6.4-3 NearlyGorensteinVectors
6.4-4 IsGeneralizedAlmostSymmetric
6 Irreducible numerical semigroups
An irreducible numerical semigroup is a semigroup that cannot be expressed as the intersection of numerical semigroups properly containing it.
It is not difficult to prove that a semigroup is irreducible if and only if it is maximal (with respect to set inclusion) in the set of all numerical semigroups having its same Frobenius number (see [RB03]). Hence, according to [FGR87] (respectively [BDF97]), symmetric (respectively pseudo-symmetric) numerical semigroups are those irreducible numerical semigroups with odd (respectively even) Frobenius number.
In [RGGJ03] it is shown that a nontrivial numerical semigroup is irreducible if and only if it has only one special gap. We use this characterization.
In old versions of the package, we first constructed an irreducible numerical semigroup with the given Frobenius number (as explained in [RG04]), and then we constructed the rest from it. The present version uses a faster procedure presented in [BR13].
Every numerical semigroup can be expressed as an intersection of irreducible numerical semigroups. If S can be expressed as S=S_1∩ ⋯∩ S_n, with S_i irreducible numerical semigroups, and no factor can be removed, then we say that this decomposition is minimal. Minimal decompositions can be computed by using Algorithm 26 in [RGGJ03].
6.1 Irreducible numerical semigroups
In this section we provide membership tests to the two families that conform the set of irreducible numerical semigroups. We also give a procedure to compute the set of all irreducible numerical semigroups with fixed Frobenius number (or equivalently genus, since for irreducible numerical semigroups once the Frobenius number is fixed, so is the genus). Also we give a function to compute the decomposition of a numerical semigroup as an intersection of irreducible numerical semigroups.
6.1-1 IsIrreducible
| | |
--- |
| ‣ IsIrreducible( s ) | ( property ) |
| | |
--- |
| ‣ IsIrreducibleNumericalSemigroup( s ) | ( property ) |
s is a numerical semigroup. The output is true if s is irreducible, false otherwise.
This filter implies IsAlmostSymmetricNumericalSemigroup (6.3-3) and IsAcuteNumericalSemigroup (3.1-30).
```
gap> IsIrreducible(NumericalSemigroup(4,6,9));
true
gap> IsIrreducibleNumericalSemigroup(NumericalSemigroup(4,6,7,9));
false
```
6.1-2 IsSymmetric
| | |
--- |
| ‣ IsSymmetric( s ) | ( attribute ) |
| | |
--- |
| ‣ IsSymmetricNumericalSemigroup( s ) | ( attribute ) |
s is a numerical semigroup. The output is true if s is symmetric, false otherwise.
This filter implies IsIrreducibleNumericalSemigroup (6.1-1).
```
gap> IsSymmetric(NumericalSemigroup(10,23));
true
gap> IsSymmetricNumericalSemigroup(NumericalSemigroup(10,11,23));
false
```
6.1-3 IsPseudoSymmetric
| | |
--- |
| ‣ IsPseudoSymmetric( s ) | ( property ) |
| | |
--- |
| ‣ IsPseudoSymmetricNumericalSemigroup( s ) | ( property ) |
s is a numerical semigroup. The output is true if s is pseudo-symmetric, false otherwise.
This filter implies IsIrreducibleNumericalSemigroup (6.1-1).
```
gap> IsPseudoSymmetric(NumericalSemigroup(6,7,8,9,11));
true
gap> IsPseudoSymmetricNumericalSemigroup(NumericalSemigroup(4,6,9));
false
```
6.1-4 AnIrreducibleNumericalSemigroupWithFrobeniusNumber
| | |
--- |
| ‣ AnIrreducibleNumericalSemigroupWithFrobeniusNumber( f ) | ( function ) |
f is an integer. When f=0 or f≤ -2, the output is fail. Otherwise, the output is an irreducible numerical semigroup with Frobenius number f. From the way the procedure is implemented, the resulting semigroup has at most four generators (see [RG04]).
```
gap> s := AnIrreducibleNumericalSemigroupWithFrobeniusNumber(28);
gap> MinimalGenerators(s);
[ 3, 17, 31 ]
gap> FrobeniusNumber(s);
28
```
6.1-5 IrreducibleNumericalSemigroupsWithFrobeniusNumber
| | |
--- |
| ‣ IrreducibleNumericalSemigroupsWithFrobeniusNumber( f ) | ( function ) |
f is an integer. The output is the set of all irreducible numerical semigroups with Frobenius number f. The algorithm is inspired in [BR13].
```
gap> Length(IrreducibleNumericalSemigroupsWithFrobeniusNumber(19));
20
```
6.1-6 IrreducibleNumericalSemigroupsWithFrobeniusNumberAndMultiplicity
| | |
--- |
| ‣ IrreducibleNumericalSemigroupsWithFrobeniusNumberAndMultiplicity( f, m ) | ( function ) |
f and m are integers. The output is the set of all irreducible numerical semigroups with Frobenius number f and multiplicity m. The implementation appears in [BOR21].
```
gap> Length(IrreducibleNumericalSemigroupsWithFrobeniusNumberAndMultiplicity(31,11));
16
```
6.1-7 DecomposeIntoIrreducibles
| | |
--- |
| ‣ DecomposeIntoIrreducibles( s ) | ( function ) |
s is a numerical semigroup. The output is a set of irreducible numerical semigroups containing it. These elements appear in a minimal decomposition of s as intersection into irreducibles.
```
gap> DecomposeIntoIrreducibles(NumericalSemigroup(5,6,8));
[ ,
]
```
6.2 Complete intersection numerical semigroups
The cardinality of a minimal presentation of a numerical semigroup is always greater than or equal to its embedding dimension minus one. Complete intersection numerical semigroups are numerical semigroups reaching this bound, and they are irreducible. It can be shown that every complete intersection (other that N) is a complete intersection if and only if it is the gluing of two complete intersections. When in this gluing, one of the copies is isomorphic to N, then we obtain a free semigroup in the sense of [BC77]. Two special kinds of free semigroups are telescopic semigroups ([KP95]) and those associated to an irreducible planar curve ([Zar86]). We use the algorithms presented in [AG13] to find the set of all complete intersections (also free, telescopic and associated to irreducible planar curves) numerical semigroups with given Frobenius number.
6.2-1 AsGluingOfNumericalSemigroups
| | |
--- |
| ‣ AsGluingOfNumericalSemigroups( s ) | ( function ) |
s is a numerical semigroup. Returns all partitions {A_1,A_2} of the minimal generating set of s such that s is a gluing of ⟨ A_1⟩ and ⟨ A_2⟩ by gcd(A_1)gcd(A_2).
```
gap> s := NumericalSemigroup( 10, 15, 16 );
gap> AsGluingOfNumericalSemigroups(s);
[ [ [ 10, 15 ], [ 16 ] ], [ [ 10, 16 ], [ 15 ] ] ]
gap> s := NumericalSemigroup( 18, 24, 34, 46, 51, 61, 74, 8 );
gap> AsGluingOfNumericalSemigroups(s);
[ ]
```
6.2-2 IsCompleteIntersection
| | |
--- |
| ‣ IsCompleteIntersection( s ) | ( property ) |
| | |
--- |
| ‣ IsACompleteIntersectionNumericalSemigroup( s ) | ( property ) |
s is a numerical semigroup. The output is true if the numerical semigroup is a complete intersection, that is, the cardinality of a (any) minimal presentation equals its embedding dimension minus one.
This filter implies IsSymmetricNumericalSemigroup (6.1-2) and IsCyclotomicNumericalSemigroup (10.1-8).
```
gap> s := NumericalSemigroup( 10, 15, 16 );
gap> IsCompleteIntersection(s);
true
gap> s := NumericalSemigroup( 18, 24, 34, 46, 51, 61, 74, 8 );
gap> IsACompleteIntersectionNumericalSemigroup(s);
false
```
6.2-3 CompleteIntersectionNumericalSemigroupsWithFrobeniusNumber
| | |
--- |
| ‣ CompleteIntersectionNumericalSemigroupsWithFrobeniusNumber( f ) | ( function ) |
f is an integer. The output is the set of all complete intersection numerical semigroups with Frobenius number f.
```
gap> Length(CompleteIntersectionNumericalSemigroupsWithFrobeniusNumber(57));
34
```
6.2-4 IsFree
| | |
--- |
| ‣ IsFree( s ) | ( property ) |
| | |
--- |
| ‣ IsFreeNumericalSemigroup( s ) | ( property ) |
s is a numerical semigroup. The output is true if the numerical semigroup is free in the sense of [BC77]: it is either N or the gluing of a copy of N with a free numerical semigroup.
This filter implies IsACompleteIntersectionNumericalSemigroup (6.2-2).
```
gap> IsFree(NumericalSemigroup(10,15,16));
true
gap> IsFreeNumericalSemigroup(NumericalSemigroup(3,5,7));
false
```
6.2-5 FreeNumericalSemigroupsWithFrobeniusNumber
| | |
--- |
| ‣ FreeNumericalSemigroupsWithFrobeniusNumber( f ) | ( function ) |
f is an integer. The output is the set of all free numerical semigroups with Frobenius number f.
```
gap> Length(FreeNumericalSemigroupsWithFrobeniusNumber(57));
33
```
6.2-6 IsTelescopic
| | |
--- |
| ‣ IsTelescopic( s ) | ( property ) |
| | |
--- |
| ‣ IsTelescopicNumericalSemigroup( s ) | ( property ) |
s is a numerical semigroup. The output is true if the numerical semigroup is telescopic in the sense of [KP95]: it is either N or the gluing of ⟨ n_e⟩ and s'=⟨ n_1/d,..., n_e-1/d⟩, and s' is again a telescopic numerical semigroup, where n_1 < ⋯ < n_e are the minimal generators of s.
This filter implies IsAperySetBetaRectangular (6.2-12) and IsFree (6.2-4).
```
gap> IsTelescopic(NumericalSemigroup(4,11,14));
false
gap> IsTelescopicNumericalSemigroup(NumericalSemigroup(4,11,14));
false
gap> IsFree(NumericalSemigroup(4,11,14));
true
```
6.2-7 TelescopicNumericalSemigroupsWithFrobeniusNumber
| | |
--- |
| ‣ TelescopicNumericalSemigroupsWithFrobeniusNumber( f ) | ( function ) |
f is an integer. The output is the set of all telescopic numerical semigroups with Frobenius number f.
```
gap> Length(TelescopicNumericalSemigroupsWithFrobeniusNumber(57));
20
```
6.2-8 IsUniversallyFree
| | |
--- |
| ‣ IsUniversallyFree( s ) | ( property ) |
| | |
--- |
| ‣ IsUniversallyFreeNumericalSemigroup( s ) | ( property ) |
s is a numerical semigroup. The output is true if the numerical semigroup is free for all the arrangements of its minimal generators.
This filter implies IsTelescopic (6.2-6).
```
gap> s:=NumericalSemigroup(10,15,18);;
gap> IsUniversallyFree(s);
true
gap> s:=NumericalSemigroup(4,6,9);;
gap> IsFree(s);
true
gap> IsUniversallyFree(s);
false
```
6.2-9 IsNumericalSemigroupAssociatedIrreduciblePlanarCurveSingularity
| | |
--- |
| ‣ IsNumericalSemigroupAssociatedIrreduciblePlanarCurveSingularity( s ) | ( property ) |
s is a numerical semigroup. The output is true if the numerical semigroup is associated to an irreducible planar curve singularity ([Zar86]). These semigroups are telescopic.
This filter implies IsAperySetAlphaRectangular (6.2-13) and IsTelescopicNumericalSemigroup (6.2-6).
```
gap> ns := NumericalSemigroup(4,11,14);;
gap> IsNumericalSemigroupAssociatedIrreduciblePlanarCurveSingularity(ns);
false
gap> ns := NumericalSemigroup(4,11,19);;
gap> IsNumericalSemigroupAssociatedIrreduciblePlanarCurveSingularity(ns);
true
```
6.2-10 NumericalSemigroupsPlanarSingularityWithFrobeniusNumber
| | |
--- |
| ‣ NumericalSemigroupsPlanarSingularityWithFrobeniusNumber( f ) | ( function ) |
f is an integer. The output is the set of all numerical semigroups associated to irreducible planar curves singularities with Frobenius number f.
```
gap> Length(NumericalSemigroupsPlanarSingularityWithFrobeniusNumber(57));
7
```
6.2-11 IsAperySetGammaRectangular
| | |
--- |
| ‣ IsAperySetGammaRectangular( S ) | ( function ) |
S is a numerical semigroup.
Test for the γ-rectangularity of the Apéry Set of a numerical semigroup. This test is the implementation of the algorithm given in [DMS14]. Numerical Semigroups with this property are free and thus complete intersections.
This filter implies IsFreeNumericalSemigroup (6.2-4).
```
gap> s:=NumericalSemigroup(30, 35, 42, 47, 148, 153, 157, 169, 181, 193);;
gap> IsAperySetGammaRectangular(s);
false
gap> s:=NumericalSemigroup(4,6,11);;
gap> IsAperySetGammaRectangular(s);
true
```
6.2-12 IsAperySetBetaRectangular
| | |
--- |
| ‣ IsAperySetBetaRectangular( S ) | ( function ) |
S is a numerical semigroup.
Test for the β-rectangularity of the Apéry Set of a numerical semigroup. This test is the implementation of the algorithm given in [DMS14]; β-rectangularity implies γ-rectangularity.
This filter implies IsAperySetGammaRectangular (6.2-11).
```
gap> s:=NumericalSemigroup(30, 35, 42, 47, 148, 153, 157, 169, 181, 193);;
gap> IsAperySetBetaRectangular(s);
false
gap> s:=NumericalSemigroup(4,6,11);;
gap> IsAperySetBetaRectangular(s);
true
```
6.2-13 IsAperySetAlphaRectangular
| | |
--- |
| ‣ IsAperySetAlphaRectangular( S ) | ( function ) |
S is a numerical semigroup.
Test for the α-rectangularity of the Apéry Set of a numerical semigroup. This test is the implementation of the algorithm given in [DMS14]; α-rectangularity implies β-rectangularity.
This filter implies IsAperySetBetaRectangular (6.2-12).
```
gap> s:=NumericalSemigroup(30, 35, 42, 47, 148, 153, 157, 169, 181, 193);;
gap> IsAperySetAlphaRectangular(s);
false
gap> s:=NumericalSemigroup(4,6,11);;
gap> IsAperySetAlphaRectangular(s);
true
```
6.3 Almost-symmetric numerical semigroups
A numerical semigroup is almost-symmetric ([BF97]) if its genus is the arithmetic mean of its Frobenius number and type. We use a procedure presented in [RG14] to determine the set of all almost-symmetric numerical semigroups with given Frobenius number. In order to do this, we first calculate the set of all almost-symmetric numerical semigroups that can be constructed from an irreducible numerical semigroup.
6.3-1 AlmostSymmetricNumericalSemigroupsFromIrreducible
| | |
--- |
| ‣ AlmostSymmetricNumericalSemigroupsFromIrreducible( s ) | ( function ) |
s is an irreducible numerical semigroup. The output is the set of almost-symmetric numerical semigroups that can be constructed from s by removing some of its generators (as explained in [RG14]).
```
gap> ns := NumericalSemigroup(5,8,9,11);;
gap> AlmostSymmetricNumericalSemigroupsFromIrreducible(ns);
[ ,
,
]
gap> List(last,MinimalGeneratingSystemOfNumericalSemigroup);
[ [ 5, 8, 9, 11 ], [ 5, 8, 11, 14, 17 ], [ 5, 9, 11, 13, 17 ] ]
```
6.3-2 AlmostSymmetricNumericalSemigroupsFromIrreducibleAndGivenType
| | |
--- |
| ‣ AlmostSymmetricNumericalSemigroupsFromIrreducibleAndGivenType( s, t ) | ( function ) |
s is an irreducible numerical semigroup and t is a positive integer. The output is the set of almost-symmetric numerical semigroups with type t that can be constructed from s by removing some of its generators (as explained in [BOR18]).
```
gap> ns := NumericalSemigroup(5,8,9,11);;
gap> AlmostSymmetricNumericalSemigroupsFromIrreducibleAndGivenType(ns,4);
[ ,
]
gap> List(last,MinimalGenerators);
[ [ 5, 8, 11, 14, 17 ], [ 5, 9, 11, 13, 17 ] ]
```
6.3-3 IsAlmostSymmetric
| | |
--- |
| ‣ IsAlmostSymmetric( s ) | ( function ) |
| | |
--- |
| ‣ IsAlmostSymmetricNumericalSemigroup( s ) | ( function ) |
s is a numerical semigroup. The output is true if the numerical semigroup is almost symmetric.
```
gap> IsAlmostSymmetric(NumericalSemigroup(5,8,11,14,17));
true
gap> IsAlmostSymmetricNumericalSemigroup(NumericalSemigroup(5,8,11,14,17));
true
```
6.3-4 AlmostSymmetricNumericalSemigroupsWithFrobeniusNumber
| | |
--- |
| ‣ AlmostSymmetricNumericalSemigroupsWithFrobeniusNumber( f[, ts] ) | ( function ) |
f is an integer, and so is ts. The output is the set of all almost symmetric numerical semigroups with Frobenius number f, and type greater than or equal to ts. If ts is not specified, then it is considered to be equal to one, and so the output is the set of all almost symmetric numerical semigroups with Frobenius number f.
```
gap> Length(AlmostSymmetricNumericalSemigroupsWithFrobeniusNumber(12));
15
gap> Length(IrreducibleNumericalSemigroupsWithFrobeniusNumber(12));
2
gap> List(AlmostSymmetricNumericalSemigroupsWithFrobeniusNumber(12,4),Type);
[ 12, 10, 8, 8, 6, 6, 6, 6, 4, 4, 4, 4, 4 ]
```
6.3-5 AlmostSymmetricNumericalSemigroupsWithFrobeniusNumberAndType
| | |
--- |
| ‣ AlmostSymmetricNumericalSemigroupsWithFrobeniusNumberAndType( f, t ) | ( function ) |
f is an integer and so is t. The output is the set of all almost symmetric numerical semigroups with Frobenius number f and type t.
```
gap> Length(AlmostSymmetricNumericalSemigroupsWithFrobeniusNumberAndType(12,4));
5
```
6.4 Several approaches generalizing the concept of symmetry
Let S be a numerical semigroup and let R be its semigroup ring K. We say that S has the generalized Gorenstein property if its semigroup ring has this property. For the definition and characterization of generalized Gorenstein rings please see [tttt17].
A numerical semigroup is said to be nearly Gorenstein if its maximal ideal is contained in its trace ideal [HHS19]. Every almost symmetric numerical semigroup is nearly Gorenstein.
A numerical semigroup S with canonical ideal K is a generalized almost symmetric numerical semigroup if either 2K=K (symmetric) or 2K∖ K={F(S)-x_1,dots, F(S)-x_r,F(S)} for some x_1,dots,x_r ∈ M∖ 2M (minimal generators) and x_i-x_jnot\in (S-M)∖ S (not pseudo-Frobenius numbers), see [DS21]. As expected, every almost symmetric numerical semigroup is a generalized almost symmetric numerical semigroup.
6.4-1 IsGeneralizedGorenstein
| | |
--- |
| ‣ IsGeneralizedGorenstein( s ) | ( property ) |
s is a numerical semigroup. The output is true if the semigroup ring K is generalized Gorenstein using the characterization by Goto-Kumashiro [MK17].
```
gap> s:=NumericalSemigroup(3,7,8);;
gap> IsAlmostSymmetric(s);
false
gap> IsGeneralizedGorenstein(s);
true
```
6.4-2 IsNearlyGorenstein
| | |
--- |
| ‣ IsNearlyGorenstein( s ) | ( property ) |
s is a numerical semigroup. The output is true if the semigroup is nearly Gorenstein, and false otherwise.
```
gap> s:=NumericalSemigroup(10,11,12,25);;
gap> IsAlmostSymmetric(s);
false
gap> IsNearlyGorenstein(s);
true
gap> s:=NumericalSemigroup(3,7,8);;
gap> IsNearlyGorenstein(s);
false
```
6.4-3 NearlyGorensteinVectors
| | |
--- |
| ‣ NearlyGorensteinVectors( s ) | ( operation ) |
s is a numerical semigroup. The output is a lists of lists (making the cartesian product of them yields all possible NG-vectors). If n_i is the ith generator of s, in the ith position of the list it returns all pseudo-Frobenius numbers f of s such that n_i+f-f' is in s for all f a pseudo-Frobenius number of s, [MS21].
```
gap> s:=NumericalSemigroup(10,11,12,25);;
gap> IsAlmostSymmetric(s);
false
gap> IsNearlyGorenstein(s);
true
gap> s:=NumericalSemigroup(3,7,8);;
gap> IsNearlyGorenstein(s);
false
```
6.4-4 IsGeneralizedAlmostSymmetric
| | |
--- |
| ‣ IsGeneralizedAlmostSymmetric( s ) | ( property ) |
s is a numerical semigroup. Determines whether or not s is a generalized almost symmetric numerical semigroup.
```
gap> s:=NumericalSemigroup(9, 24, 39, 43, 77);;
gap> IsGeneralizedAlmostSymmetric(s);
true
gap> IsAlmostSymmetric(s);
false
```
[Top of Book] [Contents] [Previous Chapter] [Next Chapter]
Goto Chapter: Top 1 2 3 4 5 6 7 8 9 10 11 12 13 14 A B C Bib Ind
generated by GAPDoc2HTML |
2016 | https://math.stackexchange.com/questions/3310421/reverse-triangle-inequality-proof-verification | Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Reverse triangle inequality proof verification
Ask Question
Asked
Modified 6 years, 2 months ago
Viewed 1k times
2
$\begingroup$
Whilst trying to come up with a proof for the reverse triangle inequality, I came up with this. I know that I overcomplicated things, but still wanted to know whether what I did was correct.
What I need to prove is that $\forall x, y \in \mathbb{R}: |x-y|\geq ||xy||$. I tackled this problem with a proof by contradiction. So, assume that $\forall x, y\in \mathbb{R}: |x-y| < ||xy||$.
Then I squared both sides in order to get rid of the absolute values. Because both the left and right hand side of the inequality are positive, the inequality stays the same.
$(x-y)^2 < (|xy|)^2$
$x^2 - 2xy + y^2 < x^2 - 2|xy| + y^2$
Simplifying this gives
$-2xy < -2|xy|$
Division by a negative number, so inequality changes
$xy > |xy|$
Which can never be true because $\forall a \in \mathbb{R}: |a| \geq a$, thus we have a contradiction and so $\forall x, y \in \mathbb{R}: |x-y|\geq ||xy||$ must be true.
I'm fairly new to writing my own proofs, so any help would be much appreciated!
real-analysis
proof-verification
Share
asked Aug 1, 2019 at 13:13
mrMoonpenguinmrMoonpenguin
7566 bronze badges
$\endgroup$
1
2
$\begingroup$ Your proof looks good to me, and I do not think it's overly complicated. I would even say it's more elegant than the brute force one from the Wikipedia page :) $\endgroup$
janosch
– janosch
2019-08-01 13:25:58 +00:00
Commented Aug 1, 2019 at 13:25
Add a comment |
1 Answer 1
Reset to default
2
$\begingroup$
I think your proof is correct. There is an easier proof though. Notice that $|x| = |x - y + y| \leq |x - y| + |y|$ by the triangle equality. This expression rearranges to $|xy| \leq |x - y|$. Similarly, $|y| = |y - x + x| \leq |y - x| + |x| = |x - y| + |x|$, which rearranges to $|yx| \leq |x - y|$. Multiplying by -1 yields $|xy| \geq -|x - y|$. Combining this inequality with the previous one yields $-|x - y| \leq |xy| \leq |x - y|$, or $||xy|| \leq |x - y|$.
Share
answered Aug 1, 2019 at 13:37
Amy NgoAmy Ngo
89044 silver badges77 bronze badges
$\endgroup$
Add a comment |
You must log in to answer this question.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
real-analysis
proof-verification
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Related
4 Generalization of Bernoulli's Inequality.
1 Proof of the Reverse Triangle Inequality
1 (Proof verification) Proving the equivalence between two statements about a limit.
1 Proof verification: Determine whether $f(x)$ is one-to-one or not
Proof Verification: Infinitely many Primes Using Euclid's Algorithm
4 Is there a reverse triangle inequality equivalent for $L^p$ spaces with $0
2 Alternative proofs to inequality problems
1 Function limits proof problem.
Hot Network Questions
What happens if you miss cruise ship deadline at private island?
Is existence always locational?
Real structure on a complex torus
I have a lot of PTO to take, which will make the deadline impossible
Verify a Chinese ID Number
Why is the definite article used in “Mi deporte favorito es el fútbol”?
Copy command with cs names
Calculating the node voltage
Checking model assumptions at cluster level vs global level?
Clinical-tone story about Earth making people violent
Is encrypting the login keyring necessary if you have full disk encryption?
Is it ok to place components "inside" the PCB
Identifying a movie where a man relives the same day
Numbers Interpreted in Smallest Valid Base
Spectral Leakage & Phase Discontinuites
How do trees drop their leaves?
How can blood fuel space travel?
What is the meaning of 率 in this report?
A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man
Is it safe to route top layer traces under header pins, SMD IC?
What can be said?
Analog story - nuclear bombs used to neutralize global warming
Where is the first repetition in the cumulative hierarchy up to elementary equivalence?
Fix integral lower bound kerning in textstyle or smaller with unicode-math
more hot questions
Question feed |
2017 | https://www.ncbi.nlm.nih.gov/books/NBK513264/ | An official website of the United States government
The .gov means it's official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you're on a federal government site.
The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.
Log in
Account
Logged in as:username
Dashboard
Publications
Account settings
Log out
Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Browse Titles
Advanced
Help
Disclaimer
NCBI Bookshelf. A service of the National Library of Medicine, National Institutes of Health.
StatPearls [Internet]. Treasure Island (FL): StatPearls Publishing; 2025 Jan-.
StatPearls [Internet].
Show details
Treasure Island (FL): StatPearls Publishing; 2025 Jan-.
Hepatocellular Adenoma
Aparna P. Shreenath; Lafaine M. Grant; Arslan Kahloon.
Author Information and Affiliations
Authors
Aparna P. Shreenath1; Lafaine M. Grant2; Arslan Kahloon3.
Affiliations
1 University of Tennessee
2 University of Texas Southwestern Medical Center
3 University of Tennessee, Chattanooga
Last Update: May 6, 2024.
Continuing Education Activity
Hepatocellular adenoma, also called "hepatic adenoma," is a rare, benign epithelial liver tumor frequently associated with oral contraceptive pill intake. Conditions like anabolic steroid abuse, Fanconi anemia, and aplastic anemia have also been implicated in the development of this lesion. Hepatic adenomas are benign but carry a higher hemorrhage and malignant transformation risk.
Elective resection is recommended in all men with adenomas of any size and women with tumors larger than 5 cm. Rupture may complicate untreated lesions, manifesting with hemorrhage, severe abdominal pain, and hypotension, and may lead to hypovolemic shock and death. Women on oral contraceptives are most susceptible to liver adenoma rupture, which requires immediate recognition due to its potentially catastrophic consequences.
This activity for healthcare professionals is designed to improve learners' competence in evaluating and managing hepatocellular adenoma. Participants gain profound insights into the condition's pathophysiology, symptomatology, and evidence-based diagnostic and treatment practices. Learners become prepared to collaborate within an interprofessional team caring for patients with or at risk for hepatic adenoma.
Objectives:
Identify the historical and physical examination features suggestive of a hepatocellular adenoma.
Create a clinically guided diagnostic strategy for a person with suspected hepatic adenoma.
Implement current evidence-based treatment options for an individual diagnosed with hepatocellular adenoma.
Collaborate with the interprofessional team to educate, treat, and monitor individuals with or at risk for hepatocellular adenoma.
Access free multiple choice questions on this topic.
Introduction
Hepatocellular adenoma (HCA), otherwise known as hepatic adenoma, is a rare, benign epithelial hepatic neoplasm often linked to exogenous estrogen intake, usually in the form of oral contraceptive pills. The lesion is also associated with steroid abuse, Fanconi anemia, aplastic anemia, metabolic syndrome, and glycogen storage disease (GSD). HCAs are benign but are at high risk of hemorrhage and malignant transformation.
Although typically solitary, multiple adenomas can occur. Hepatic adenomatosis refers to the presence of 10 or more tumors. Advances in radiologic diagnosis and subtype classifications based on molecular behavior have emerged, which provide a more systematic approach to treating patients with hepatic adenomas. Elective resection is recommended in men with adenomas regardless of size and in women with adenomas greater than 5 cm.
Liver Anatomy and Histology
The liver is located inferior to the diaphragm and occupies the abdominal right upper quadrant (RUQ). This organ has a complex anatomical configuration crucial for its multifunctional roles. The liver is encased in the visceral peritoneum and extends from the midclavicular line to the right costal margin at the level of the 5th intercostal space. The organ's superoposterior aspect houses the bare area where the diaphragm and inferior vena cava (IVC) converge.
The Couinaud classification subdivides the liver into 8 functionally independent segments based on vascularization, bile duct distribution, and lymphatic drainage. These wedge-shaped segments have apices directed toward the hepatic hilum and receive a single branch each of the bile duct, portal vein, and hepatic artery.
Hepatic veins run between adjacent segments, ultimately draining into the IVC, while the middle hepatic vein delineates the liver's right and left lobes. The right hepatic vein further partitions the right lobe into posterior and anterior segments, while the falciform ligament separates the left lobe into medial and lateral segments. The portal vein horizontally divides segments into superior and inferior sections. Segment I is the caudate lobe, distinguished from other lobes by its unique characteristics, such as a dual blood supply and direct drainage into the IVC. Segments II, III, and IV constitute the left hepatic lobe sections. Segments V, VI, VII, and VIII constitute the right lobe hepatic sections.
The liver's blood supply, primarily from the portal vein, enhances liver imaging during the portal venous phase—a property crucial for diagnostic purposes. Tumors supplied by the hepatic artery exhibit enhanced imaging during arterial phases, a principle utilized in therapeutic interventions like transarterial chemoembolization. Hepatic veins appear as anechoic tubes on ultrasound and drain into the IVC. The portal triad—consisting of portal veins, hepatic arteries, and bile ducts—manifests as echogenic foci within the liver parenchyma.
The hepatic lobule serves as the primary functional unit, comprising hexagonal arrays of hepatocytes surrounding central veins. Hepatocytes organize into cords within lobules, enveloping sinusoids housing Kupffer and stellate cells. The lobule's organization into portal triads ensures efficient blood flow across zones delineated by their proximity to portal tracts or central veins. This alternative organization, known as the portal acinus, delineates functional zones. Zone 1 surrounds portal tracts involved in oxidative metabolism. Zone 3 envelopes central veins primarily engaged in drug biotransformation. Zone 2 exhibits mixed functionality.
Etiology
Chen and colleagues enhanced our understanding of hepatocellular adenoma formation when their 2002 study identified the role of β-catenin in the Wnt signaling pathway. Subsequently, Bioulac-Sage and associates developed a phenotypic-genotypic classification system for hepatocellular adenomas based on molecular behavior patterns.Other groups have since validated this classification scheme, which categorizes hepatocellular adenomas into 4 main groups:
Hepatocyte Nuclear Factor -1α Inactivated Mutations
Patients with hepatocyte nuclear factor-1α (HNF-1α) inactivated mutations comprise 35% to 40% of cases. The condition involves biallelic mutations of the T-cell factor-1 gene that encodes the transcription factor HNF-1α. This protein is involved in hepatocyte differentiation, liver development, and glucose and lipid metabolism. HCA lesions in this group are noticeably more steatotic on biopsy. Women are mostly affected. The mutation is likewise often associated with mature-onset diabetes of the young (MODY3). About 90% of the mutations are somatic, although MODY3 association can involve the germline and commonly manifests with adenomatosis. Lesion size smaller than 5 cm reduces complication risk.
β-Catenin Activated Mutations
Individuals with β-catenin activated mutationsconstitute 15% to 20% of liver adenoma cases. The condition is frequently linked to androgen exposure, glycogenesis, and familial adenomatous polyposis. Mild hepatic cytological or architectural abnormalities lead to an acinar, pseudoglandular pattern. The mutation is rarely detected in liver steatosis and inflammatory cases. Adenomas in this group have an increased malignant transformation risk. The lesions typically exhibit positivity for glutamine synthetase and abnormal β-catenin expression on immunohistochemical staining.
Inflammatory Hepatocellular Adenomas
Inflammatory HCA (IHCA) is seen in 40% to 50% of patients with HCA (see Image. Inflammatory Hepatocellular Adenoma Histopathology). Risk factors include female sex, high body mass index (BMI), excessive alcohol consumption, and systemic inflammatory syndrome. The lesions lack both HNF-1α and β-catenin mutations. IL-6 inflammatory pathway activation is implicated in IHCA development, manifesting with dystrophic vessels and telangiectasia. Specifically, the arteries have thick walls, and the sinusoids are dilated, a condition called "peliosis." Adenomas in this category were formerly called “telangiectatic focal nodular hyperplasia.” The tumors exhibit positivity for serum amyloid A (SAA) and C-reactive protein (CRP) and demonstrate inflammatory infiltrates and ductular reactions.
Unclassified Type
Patients with unclassified HCA comprise 10% of cases. The lesions are negative for CRP, SAA, β-catenin, and glutamine synthetase but exhibit typical liver fatty acid-binding protein (LFABP) staining.
Epidemiology
HCA's annual incidence among patients taking oral contraceptive pills is 30 to 40 cases per million, compared to 1 case per million in people who do not take these medications. A higher risk is seen after more than 2 years of use. A study found a 25-fold relative risk increase in women using oral contraceptive pills for over 109 months compared to those using them for less than 12 months. Discontinuation of oral contraceptives often results in spontaneous tumor regression, supporting the link to sex hormones. HCA is more common in women than men, with a ratio of 4 to 1, although this ratio is changing due to sports-related anabolic drug use.
Other populations at risk for developing HCA include individuals with GSD types I and III, iron-overload conditions like β-thalassemia and hemochromatosis, and states of endogenous sex hormonal imbalance such as Klinefelter and polycystic ovarian syndromes. Except for polycystic ovarian syndrome, these other conditions predominantly affect men and are often diagnosed during childhood.
Pathophysiology
Genetic mutations offer new insights into the behavior of these tumors. However, traditional knowledge highlights the strong association between sex hormones, notably oral contraceptive pills and anabolic steroids, and HCA development. Other drugs that have been implicated include clomiphene, recombinant human growth hormones, and barbiturates.
Histopathology
Gross examination of HCAs reveals yellow or light brown well-circumscribed lesions with a soft consistency. The lesions are usually solitary, with sizes ranging from 2 to 15 cm. HCAs tend to be larger in women on oral contraceptives. Most are located in the right lobe and are subscapular. Microscopic examination shows a lack of malignancy features and abundant glycogen or fat. Liver architecture is absent, with central veins, bile ducts, and portal tracts often not visualized. However, HCAs are well-vascularized with small, thin-walled arterioles.
HCAs are typically solitary tumors with monoclonal cell lines. These tumors lack a true capsule, though hepatocyte sheets in the outer boundaries form their "pseudo-capsule" and are surrounded by otherwise normal liver tissue. The lack of biliary ducts distinguishes the lesion from normal liver tissue (see Image. Hepatocellular Adenoma Histopathology).
History and Physical
History
About half of patients with HCAs are asymptomatic, with the tumor discovered incidentally on imaging. The condition presents variably in symptomatic individuals, ranging from mild, ill-defined epigastric pain with bloating to severe, acute RUQ pain. Adenoma rupture may be accompanied by dizziness, intractable vomiting, and lethargy. The pain may radiate to the right flank in some cases, resembling cholecystitis or a urinary tract pathology. Rupture occurs in up to 27% of HCAs, resulting in a 5% to 10% mortality rate.
Individuals with suspected HCA should be asked about the symptoms, especially abdominal pain and its characteristics. Risk factors must be assessed, including prolonged sex hormone use and underlying conditions like GSD and obesity. The family history may reveal liver diseases or malignancies and other genetic conditions predisposing to HCA evolution.
Physical Examination
A complete physical examination helps determine the diagnosis and the patient's hemodynamic status. Individuals with abdominal pain due to gastrointestinal pathology often lie still, in contrast to patients with renal colic. Tachycardia and hypotension are possible indicators of shock. Fever may manifest due to inflammation and is a physical feature shared with many other conditions, including hepatitis.
Some patients may have dry oral mucosa and poor skin turgor from dehydration. Pallor and poor pulses may be appreciated due to hemorrhage. Normal chest auscultation findings may rule out a cardiac or pulmonary cause of referred abdominal pain unless such illnesses coexist. The abdominal examination may reveal hepatomegaly with tenderness. Abdominal rigidity may be a sign of peritoneal irritation from hemoperitoneum due to tumor rupture.
Evaluation
Laboratory tests are generally unhelpful in diagnosing hepatocellular adenomas, though they can help rule out other disorders and determine hematologic and metabolic status. α-fetoprotein (AFP) levels are typically normal but can rise if malignant transformation to hepatocellular carcinoma (HCC) occurs. Hepatitis tests should be conducted to rule out these infections. Alkaline phosphatase and γ-glutamyl transferase levels may increase two- to threefold, especially in IHCAs. White blood cell count, fibrinogen, and CRP may also be elevated.
Core needle biopsy has limited diagnostic value in HCA. However, immunohistochemical markers may be helpful in expert centers. Biopsy should be limited to rare cases where imaging is equivocal, and the diagnosis may alter management strategy.
Ultrasonography often fails to distinguish between benign and malignant tumors. Doppler ultrasonography may demonstrate arterial hypervascularity with vessels running along the lesion's border in a "basket" pattern. Some tumors may appear hyperechoic due to the hepatocytes' steatotic content.
Dynamic magnetic resonance imaging (MRI) with a hepatocyte-specific contrast agent like gadobenate dimeglumine is the modality of choice for diagnosing HCAs. This method can distinguish between hepatocellular adenomas and other benign and malignant liver tumors (see Image. Hepatocellular Adenoma on Magnetic Resonance Imaging). The lesion may exhibit a clearly defined central margin with nearly parallel vessels entering from the periphery, giving the appearance of a spoked wheel. In some cases, dynamic MRI may demonstrate a tortuosity of peripheral vessels with central necrosis.
A dynamic computed tomography (CT) scan is also potentially useful in evaluating HCAs. Dynamic CT may show peripheral enhancement of the tumors during the early phase, transitioning to centripetal flow in the later portal venous phase.
Treatment / Management
HCAs less than 5 cm in size and linked to oral contraceptive pills are initially approached conservatively. Oral contraceptive withdrawal with regular imaging surveillance has demonstrated significant tumor regression in numerous cases. Resuming oral contraceptive intake requires careful radiologic monitoring. The optimal follow-up duration remains unestablished, with some authors suggesting surveillance until menopause. Refractory tumors often correlate with obesity.
Most hepatic adenomas remain stable during pregnancy. Tertiary centers often monitor adenomas smaller than 5 cm serially in pregnant women every 3 months and during the postpartum period. Patients with small adenomas are not discouraged from getting pregnant.
Surgical resection is recommended for all male patients regardless of the tumor size and for women with tumors larger than 5 cm. The technique does not require a wide margin or regional lymphadenectomy. Emergent surgery for a ruptured hepatic adenoma with intraperitoneal bleeding has a mortality rate of 5% to 10%. In contrast, elective resection's mortality rate is less than 1%.
Transarterial embolization (TAE) is recommended for hepatic adenomas complicated by hemorrhage. Patients with intratumoral hemorrhage rarely present with hemodynamic instability. In such cases, TAE may be followed by elective surgical resection of the adenoma. TAE is indicated within 2 to 3 days of tumoral hemorrhage.
Radiofrequency ablation is appropriate only for a very select patient population. The modality is not appropriate for surgical candidates and individuals with hormone-sensitive tumors, underlying liver disease, or a desire for pregnancy. Radiofrequency ablation should be used to treat patients with adenomas less than 4 cm in size.
Obesity, nonalcoholic steatohepatitis, and metabolic syndromes increase the risk of developing hepatic adenomatosis. Complications like hemorrhage or malignant transformation correlate less with adenomatosis than the tumors' molecular signatures. Moreover, most liver adenomatoses are typically associated with HNF-1α mutations, which have a low risk for malignant transformations. Thus, a liver transplant is generally not indicated for nonresectable hepatic adenomas. Exceptions involve men with intrahepatic portosystemic venous shunts with nonresectable hepatic adenomas. Genetic counseling is recommended for patients with liver adenomatosis, especially if associated with familial adenomatous polyposis or MODY3.
About 4% to 5% of hepatic adenomas are at risk for malignant transformation to HCC, with the risk increased by Fanconi anemia and androgen treatments. The Wnt and β-catenin pathways are particularly associated with malignant transformation. Surgical resection is typically recommended for this subtype.
Differential Diagnosis
The differential diagnosis of liver lesions suspicious for HCA includes hemangioma, focal nodular hyperplasia (FNH), HCC, and metastatic tumors. Dynamic contrast-enhanced MRI can differentiate between HCA and hemangiomas, which generally exhibit peripheral enhancement and a centripetal fill-in pattern. Gadolinium-based contrast MRI often shows FNH taking up more contrast in the hepatobiliary phase than HCA, along with a central scar and lobulated appearance.
The clinical scenario is crucial in distinguishing between HCA and HCC or metastatic disease. Individuals with HCC typically have underlying chronic liver disease with or without cirrhosis. People with metastatic disease typically have a known extrahepatic primary malignancy and associated risk factors.
Prognosis
The prognosis for patients with hepatocellular adenoma remains poorly established. Oral contraceptive discontinuation may result in the regression or resolution of some lesions. As previously stated, about 27% of HCAs may rupture, which has a 5% to 10% mortality risk. The risk of HCA's malignant transformation is 4.2%. The risk of malignancy generally persists even after discontinuing oral contraceptives.
Complete HCA resolution is unlikely in most patients. About 25% of women will continue to have RUQ pain, with hemorrhage potentially occurring in up to 30% to 45% of women. Bleeding may occur within the lesion or peritoneum. The larger the lesion, the higher the risk of hemorrhage. Pregnancy has been associated with HCA enlargement and increased rupture risk.
Complications
HCA's complications include tumor rupture and hemorrhage, which may result in hemorrhagic shock and death. Tumors larger than 5 cm have an increased rupture risk. The malignant transformation of HCAs is greater in men than women with tumors larger than 5 cm.
Consultations
HCA management requires interprofessional care coordination involving gastroenterologists, radiologists, and surgeons. The interprofessional approach enhances diagnostic accuracy and therapeutic or surveillance efficacy.
Deterrence and Patient Education
Primary prevention of HCAs involves minimizing exposure to known risk factors, such as oral contraceptives and anabolic steroids. Education about the risks associated with these medications and their potential to induce HCA development is crucial. Making healthy lifestyle choices, including weight management and avoiding excessive alcohol consumption, may also help decrease the risk of developing HCAs.
Meanwhile, patients with the condition or genetic risks for its development must be counseled about potential complications, eg, rupture and HCC, and their likelihood if no treatment is taken. Female patients should be advised that pregnancy is not contraindicated, especially with lesions of 5 cm or less. However, pregnant patients with HCA must receive interprofessional care and meticulous tumor monitoring. If surgery is warranted during pregnancy, resections should ideally occur during the 2nd trimester when risks to both mother and fetus are at their lowest. Patients must be fully informed of their condition and any action's options, risks, and benefits.
Pearls and Other Issues
HCAs are rare liver tumors often linked to oral contraceptive intake in reproductive-age women. Obesity, metabolic dysfunction associated with steatohepatitis, and metabolic syndromes are associated with hepatocellular adenomatosis. The most dreaded complications of this condition include rupture and HCC.
The phenotypic-genotypic classification system for this condition is validated and valuable in understanding molecular behavior patterns. The HNF-1α subtype, associated with hepatocyte differentiation, is prevalent in women and individuals with MODY3. β-catenin-activated mutations, found in 15% to 20% of HCAs, are often linked to male hormone exposure and carry a greater risk of malignant transformation. Surgical resection is recommended for this subtype. IHCAs, prevalent in women with higher BMI and alcohol intake, stain positively for SAA and CRP. Unclassified types lack the features exhibited by other types and comprise 10% of HCA cases.
Laboratory diagnosis is often unhelpful diagnostically. However, MRI can help reliably distinguish HCAs from other liver conditions. Imaging complements clinical examination during the diagnostic process. Discontinuation of oral contraceptives can induce regression in adenomas less than 5 cm, warranting continued imaging surveillance. Surgery is generally recommended for tumors greater than 5 cm in size but does not require wide margins or regional lymphadenectomy.
Enhancing Healthcare Team Outcomes
Prevention rather than treatment is the main focus of HCA management. Patient education involves the primary care physician, pharmacist, and nurse, contributing to better outcomes through interprofessional management. Once detected, the gastroenterologist and surgeon's roles—primarily surveillance and possibly treatment—become invaluable in minimizing morbidity and mortality. Pregnant women must be under the care of a high-risk obstetric care specialist, who may coordinate with the interprofessional team.
All women prescribed oral contraceptives should be warned about the risk of developing this lesion, with lower doses potentially reducing the risk. Patients without other contraception options should be educated on HCA symptoms and when to seek help. Pregnancy increases HCA's hemorrhage risk and maternal mortality. Women with large or symptomatic tumors who desire pregnancy should be counseled about considering HCA removal before conceiving. Ongoing imaging surveillance, possibly annually, is recommended, especially for lesions larger than 5 cm.
Review Questions
Access free multiple choice questions on this topic.
Click here for a simplified version.
Comment on this article.
Figure
Inflammatory Hepatocellular Adenoma Histopathology. A woman born in 1947 experienced massive bleeding with no history of oral contraceptive use and a BMI of 21.5. She underwent a right hepatectomy in 2000, revealing massive liver necrosis and (more...)
Figure
Hepatocellular Adenoma Histopathology. High-magnification micrograph of a hepatic adenoma showing sheets of hepatocytes with vacuolated cytoplasm, arranged on a regular reticulin scaffold and measuring less than or equal to 3 cells thick. Portal (more...)
Figure
Hepatocellular Adenoma on Magnetic Resonance Imaging. This image shows multiple hepatocellular adenomas (yellow arrows). The imaging characteristics of these tumors include signals ranging from hyperintense to mildly hypointense compared (more...)
References
1.
: Tsilimigras DI, Rahnemai-Azar AA, Ntanasis-Stathopoulos I, Gavriatopoulou M, Moris D, Spartalis E, Cloyd JM, Weber SM, Pawlik TM. Current Approaches in the Management of Hepatic Adenomas. J Gastrointest Surg. 2019 Jan;23(1):199-209. [PubMed: 30109469]
2.
: Aziz H, Underwood PW, Gosse MD, Afyouni S, Kamel I, Pawlik TM. Hepatic adenoma: evolution of a more individualized treatment approach. J Gastrointest Surg. 2024 Jun;28(6):975-982. [PubMed: 38521190]
3.
: Vernon H, Wehrle CJ, Alia VSK, Kasi A. StatPearls [Internet]. StatPearls Publishing; Treasure Island (FL): Nov 26, 2022. Anatomy, Abdomen and Pelvis: Liver. [PubMed: 29763190]
4.
: Azizaddini S, Mani N. StatPearls [Internet]. StatPearls Publishing; Treasure Island (FL): Feb 20, 2023. Liver Imaging. [PubMed: 32491392]
5.
: Chen YW, Jeng YM, Yeh SH, Chen PJ. P53 gene and Wnt signaling in benign neoplasms: beta-catenin mutations in hepatic adenoma but not in focal nodular hyperplasia. Hepatology. 2002 Oct;36(4 Pt 1):927-35. [PubMed: 12297840]
6.
: Jiang K, Al-Diffhala S, Centeno BA. Primary Liver Cancers-Part 1: Histopathology, Differential Diagnoses, and Risk Stratification. Cancer Control. 2018 Jan-Mar;25(1):1073274817744625. [PMC free article: PMC5933592] [PubMed: 29350068]
7.
: Dharmana H, Saravana-Bawan S, Girgis S, Low G. Hepatocellular adenoma: imaging review of the various molecular subtypes. Clin Radiol. 2017 Apr;72(4):276-285. [PubMed: 28126185]
8.
: Bioulac-Sage P, Balabaud C, Zucman-Rossi J. Subtype classification of hepatocellular adenoma. Dig Surg. 2010;27(1):39-45. [PubMed: 20357450]
9.
: Castelli G, Pelosi E, Testa U. Liver Cancer: Molecular Characterization, Clonal Evolution and Cancer Stem Cells. Cancers (Basel). 2017 Sep 20;9(9) [PMC free article: PMC5615342] [PubMed: 28930164]
10.
: Haring MPD, Gouw ASH, de Haas RJ, Cuperus FJC, de Jong KP, de Meijer VE. The effect of oral contraceptive pill cessation on hepatocellular adenoma diameter: A retrospective cohort study. Liver Int. 2019 May;39(5):905-913. [PMC free article: PMC6593966] [PubMed: 30773766]
11.
: Brady PC, Missmer SA, Laufer MR. Hepatic Adenomas in Adolescents and Young Women with Endometriosis Treated with Norethindrone Acetate. J Pediatr Adolesc Gynecol. 2017 Jun;30(3):422-424. [PubMed: 28024920]
12.
: Grazioli L, Ambrosini R, Frittoli B, Grazioli M, Morone M. Primary benign liver lesions. Eur J Radiol. 2017 Oct;95:378-398. [PubMed: 28987695]
13.
: Dhingra S, Fiel MI. Update on the new classification of hepatic adenomas: clinical, molecular, and pathologic characteristics. Arch Pathol Lab Med. 2014 Aug;138(8):1090-7. [PubMed: 25076298]
14.
: Mittal S, Gopal P, Khatri G, Singal AG. Evaluation and Management of Hepatocellular Adenomas. Clin Liver Dis (Hoboken). 2021 Feb;17(2):57-60. [PMC free article: PMC7916436] [PubMed: 33680436]
15.
: Kis LE, Centeno BA, Anaya DA, Kis B. Hepatic adenoma rupture following portal vein embolization. Radiol Case Rep. 2020 Jun;15(6):664-667. [PMC free article: PMC7136602] [PubMed: 32280397]
16.
: Yoon PD, Chen AZL, Tovmassian D, Pleass H. Spontaneous hepatic haemorrhage secondary to ruptured hepatocellular adenoma in a young male patient. BMJ Case Rep. 2020 Aug 25;13(8) [PMC free article: PMC7449593] [PubMed: 32843462]
17.
: He MN, Lv K, Jiang YX, Jiang TA. Application of superb microvascular imaging in focal liver lesions. World J Gastroenterol. 2017 Nov 21;23(43):7765-7775. [PMC free article: PMC5703936] [PubMed: 29209117]
18.
: Thyagarajan MS, Sharif K. Space Occupying Lesions in the Liver. Indian J Pediatr. 2016 Nov;83(11):1291-1302. [PubMed: 27783314]
19.
: Chiorean L, Cui XW, Tannapfel A, Franke D, Stenzel M, Kosiak W, Schreiber-Dietrich D, Jüngert J, Chang JM, Dietrich CF. Benign liver tumors in pediatric patients - Review with emphasis on imaging features. World J Gastroenterol. 2015 Jul 28;21(28):8541-61. [PMC free article: PMC4515836] [PubMed: 26229397]
20.
: Klompenhouwer AJ, de Man RA, Dioguardi Burgio M, Vilgrain V, Zucman-Rossi J, Ijzermans JNM. New insights in the management of Hepatocellular Adenoma. Liver Int. 2020 Jul;40(7):1529-1537. [PMC free article: PMC7383747] [PubMed: 32464711]
21.
: Patacsil SJ, Noor M, Leyva A. A Review of Benign Hepatic Tumors and Their Imaging Characteristics. Cureus. 2020 Jan 29;12(1):e6813. [PMC free article: PMC7047931] [PubMed: 32140369]
22.
: LeGout JD, Bolan CW, Bowman AW, Caserta MP, Chen FK, Cox KL, Sanyal R, Toskich BB, Lewis JT, Alexander LF. Focal Nodular Hyperplasia and Focal Nodular Hyperplasia-like Lesions. Radiographics. 2022 Jul-Aug;42(4):1043-1061. [PubMed: 35687520]
23.
: Mathew RP, Manolea F, Girgis S, Patel V, Low G. Malignant transformation of hepatic adenoma complicated by rupture and hemorrhage: An extremely rare clinical entity. Intractable Rare Dis Res. 2019 Nov;8(4):266-270. [PMC free article: PMC6929599] [PubMed: 31890454]
24.
: Venkatesh SK, Chandan V, Roberts LR. Liver masses: a clinical, radiologic, and pathologic perspective. Clin Gastroenterol Hepatol. 2014 Sep;12(9):1414-29. [PMC free article: PMC3959647] [PubMed: 24055987]
25.
: Thapar M, Grapp O, Fisher C. Management of hepatic adenomatosis. Curr Gastroenterol Rep. 2015 Mar;17(3):12. [PubMed: 25740249]
: Disclosure: Aparna Shreenath declares no relevant financial relationships with ineligible companies.
: Disclosure: Lafaine Grant declares no relevant financial relationships with ineligible companies.
: Disclosure: Arslan Kahloon declares no relevant financial relationships with ineligible companies.
Copyright © 2025, StatPearls Publishing LLC.
This book is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) ( ), which permits others to distribute the work, provided that the article is not altered or used commercially. You are not required to obtain permission to distribute this article, provided that you credit the author and journal.
Bookshelf ID: NBK513264PMID: 30020636
Share
Views
PubReader
Print View
Cite this Page
Shreenath AP, Grant LM, Kahloon A. Hepatocellular Adenoma. [Updated 2024 May 6]. In: StatPearls [Internet]. Treasure Island (FL): StatPearls Publishing; 2025 Jan-.
In this Page
Continuing Education Activity
Introduction
Etiology
Epidemiology
Pathophysiology
Histopathology
History and Physical
Evaluation
Treatment / Management
Differential Diagnosis
Prognosis
Complications
Consultations
Deterrence and Patient Education
Pearls and Other Issues
Enhancing Healthcare Team Outcomes
Review Questions
References
Related information
PMC
PubMed Central citations
PubMed
Links to PubMed
Similar articles in PubMed
Anatomy, Abdomen and Pelvis: Liver.[StatPearls. 2025]
Anatomy, Abdomen and Pelvis: Liver.
Vernon H, Wehrle CJ, Alia VSK, Kasi A. StatPearls. 2025 Jan
Lower Genitourinary Trauma.[StatPearls. 2025]
Lower Genitourinary Trauma.
Tullington JE, Blecker N. StatPearls. 2025 Jan
[Dorsal sector of the liver].[Chirurgie. 1998]
[Dorsal sector of the liver].
Couinaud C. Chirurgie. 1998 Feb; 123(1):8-15.
Review Biliary tract anatomy and its relationship with venous drainage.[J Clin Exp Hepatol. 2014]
Review Biliary tract anatomy and its relationship with venous drainage.
Ramesh Babu CS, Sharma M. J Clin Exp Hepatol. 2014 Feb; 4(Suppl 1):S18-26. Epub 2013 May 25.
Review The caudate lobe of the liver: implications of embryology and anatomy for surgery.[Surg Oncol Clin N Am. 2002]
Review The caudate lobe of the liver: implications of embryology and anatomy for surgery.
Abdalla EK, Vauthey JN, Couinaud C. Surg Oncol Clin N Am. 2002 Oct; 11(4):835-48.
See reviews...See all...
Recent Activity
Clear)Turn Off)Turn On)
Hepatocellular Adenoma - StatPearls
Hepatocellular Adenoma - StatPearls
Your browsing activity is empty.
Activity recording is turned off.
Turn recording back on)
See more...
Follow NCBI
Connect with NLM
National Library of Medicine8600 Rockville Pike Bethesda, MD 20894
Web Policies FOIA HHS Vulnerability Disclosure
Help Accessibility Careers |
2018 | https://link.springer.com/chapter/10.1007/978-1-4757-2600-8_5 | Advertisement
Quadratic Programming with Box Constraints
Part of the book series:
Nonconvex Optimization and Its Applications ((NOIA,volume 18))
1104 Accesses
46 Citations
Abstract
The global minimization of quadratic problems with box constraints naturally arises in many applications and as a subproblem of more complex optimization problems. In this paper we briefly describe the main results on global optimality conditions. Moreover, some of the most interesting computational approaches for the problem will be summarized.
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Adaptive Global Algorithm for Solving Box-Constrained Non-convex Quadratic Minimization Problems
On global minimizers of quadratic functions with cubic regularization
On global integer extrema of real-valued box-constrained multivariate quadratic functions
Explore related subjects
Abbreviations
box constrained quadratic problem
Karush, Kuhn, Tucker stationarity conditions.
References
H.H. Benson. Concave Minimization: Theory, Applications and Algorithms. Handbook of Global Optimization (Eds: R. Horst and P.M. Pardalos), Kluwer, 43–142, (1995).
Google Scholar
I.M. Bomze. Copositivity Conditions for Global Optimality in Indefinite Quadratic Programming Problems. Czechoslovak J. for OR 1:7–19, (1992).
MATH
Google Scholar
I.M. Bomze and G. Danninger. A Global Optimization Algorithm for Concave Quadratic Problems. Siam J. Optim., 3:826–842, (1993).
Article
MathSciNet
MATH
Google Scholar
I.M. Bomze and G. Danninger. A Finite Algorithm for Solving General Quadratic Problems. J. of Glo. Optim., 4:1–16, (1994).
Article
MathSciNet
MATH
Google Scholar
T.F. Coleman and L.A. Hulbert. A direct active set algorithm for large sparse quadratic programs with simple bounds. Mathematical Programming, 45:373–406 (1989).
Article
MathSciNet
MATH
Google Scholar
A.R. Conn, N.I.M. Gould, and P.L. Toint. Lancelot. A Fortran Package for Large-Scale Nonlinear Optimization. Springer-Verlag, (1992).
MATH
Google Scholar
G. Danninger. Role of Copositivity in Optimality Criteria for Nonconvex Optimization Problems. J. of Optim. Theory and Appl., 75:535–558, (1992).
Article
MathSciNet
MATH
Google Scholar
R. Fletcher and M.P. Jackson. Minimization of a quadratic function of many variables subject only to lower and upper bounds. J. Inst. Maths Applics, 14:159–174 (1974).
Article
MathSciNet
MATH
Google Scholar
C.A. Floudas and V. Visweswaran. Quadratic Optimization, Handbook of Global Optimisation (Eds: R. Horst and P.M. Pardalos), Kluwer, 217–270, (1995).
Google Scholar
M. Frank and P. Wolfe. An algorithm for quadratic programming. Naval Res. Logist. Quart., 3:95–110 (1956).
Article
MathSciNet
Google Scholar
P.E. Gill, W. Murray, M.A. Saunders, and M.H. Wright. User’s guide for SOL/QPSOL: A Fortran Package for Quadratic Programming TECHNICAL REPORT SOL 83–7.
Google Scholar
P.E. Gill, W. Murray, M.A. Saunders, and M.H. Wright. Inertia-controlling methods for general quadratic programming. SIAM Review, 33 (1) :1–36 (1991).
Article
MathSciNet
MATH
Google Scholar
L. Grippo and S. Lucidi. A differentiable Exact Penalty Function for Bound Constrained Quadratic Programming Problems. Optimization, 22 (4): 557–578, (1991).
Article
MathSciNet
MATH
Google Scholar
S. Gupta and P.M. Pardalos. A note on a quadratic formulation for linear complementarity problems. JOTA, 57(1): 197–202 (1988).
Article
MathSciNet
MATH
Google Scholar
W.W. Hager, P.M. Pardalos, I.M. Roussos, and H.D. Sahinoglou. Active constraints, indefinite quadratic test problems, and complexity. JOTA, 68(3):499–511 (1991).
Article
MathSciNet
MATH
Google Scholar
C.G. Han, P.M. Pardalos, and Y. Ye. Computational aspects of an interior point algorithm for quadratic programming problems with box constraints. Large-Scale Numerical Optimization (Eds: T.F. Coleman and Y. Li), SIAM, 92–112 (1990).
Google Scholar
C.G. Han, P.M. Pardalos, and Y. Ye. On the Solution of Indefinite Quadratic Problems Using an Interior Point Algorithm. Informatica, 3(4):474–496, (1992).
MathSciNet
MATH
Google Scholar
P. Hansen, B. Jaumard, M. Ruiz, and J. Xiong. Global Minimization of Indefinite Quadratic functions Subject to Box Constraints. Nav. Research Log., 40:373–392, (1993).
Article
MathSciNet
MATH
Google Scholar
J.B. Hiriart-Urruty. From Convex Optimization to Nonconvex Optimization. Part I: Necessary and Sufficient Conditions for Global Optimality. Nonsmooth Optimization and Related Topics, Plenum Press, 219–239 (1989).
Google Scholar
J.B. Hiriart-Urruty. Conditions for Global Optimality. Handbook of Global Optimisation (Eds: R. Horst and P.M. Pardalos), Kluwer, 1–26 (1995).
Google Scholar
J.B. Hiriart-Urruty and C. Lemarechal. Testing Necessary and Sufficient Conditions for Global Optimality in the Problem of Maximizing a Convex Quadratic function over a Convex Polyhedron. Seminaire d’Analyse Numerique, Univ. P. Sabatier de Tonlose, (1990).
Google Scholar
R. Horst, P.M. Pardalos, and N.V. Thoai. Introduction to Global Optimization, Kluwer (1995).
MATH
Google Scholar
Optimization Subroutine Library Guide and Reference Release 2. IBM Corporation, (1991).
Google Scholar
F. John, Collected papers, vol2, Extremum problems with inequalities as subsidiary Conditions (J. Moser ed.) Birkhäuser, Boston, 543–560.
Google Scholar
D.S. Johnson, C.H. Papadimitriou and M. Yannakakis. How Easy is Local Search? J. of Comp. and Syst. Science, 37:79–100, (1988).
Article
MathSciNet
MATH
Google Scholar
J. Judice and M. Pires. Direct Methods for Convex Quadratic Programs subject to Box Constraints. Investicação Operacional, 9:23–56, (1989).
Google Scholar
W. Li. Differentiable Piecewise Quadratic Exact Penalty Functions for Quadratic Programs with Simple bound Constraints. Dept. of Math. and Stat., Old Dominion University, Norfolk, (1994)
Google Scholar
W. Li. Differentiable Piecewise Quadratic Exact Penalty Functions for Quadratic Programs via Hestenes-Powell-Rockafellar’s Augmented Lagrangian Function. Dept. of Math. and Stat., Old Dominion University, Norfolk, (1994)
Google Scholar
P. Kamath and N.K. Karmarkar. An O(nL) iteration algorithm for computing bounds in quadratic optimization problems, In P.M. Pardalos (ed), Complexity in Numerical Optimization. World Scientific, 1993.
Google Scholar
M.K. Kozlov, S.P. Tarasov, and L.G. Khachian. Polynomial solvability of convex quadratic programming. Soviet Math. Dokl., 20:1108–1111, (1979).
MATH
Google Scholar
H.W. Kuhn and A.W. Tucker. Nonlinear programming, Proc. 2nd Berkeley Symposium Math. Stat. Prob., (J. Neyman ed.) Univ. of California Press, Berkeley, California, 481–492, 1951.
Google Scholar
M. Manas. An Algorithm for a Nonconvex Programming Problem. Econ. Math. Obzor Acad. Nacl. Ceskoslov 4:202–212, (1968).
MathSciNet
Google Scholar
M. Minoux. Mathematical programming, theory and algorithms. New York Wiley (1986).
MATH
Google Scholar
J.J. Moré and D.C. Sorensen. Computing a Trust Region Step. SIAM J. Sci. Stat. Comput., 4:553–572 (1983).
Article
MATH
Google Scholar
J.J. Moré and G. Toraldo. Algorithms for Bound Constrained Quadratic Programming Problems Numer. Math., 55:377–400, (1989).
Article
MathSciNet
MATH
Google Scholar
J.J. Moré and G. Toraldo. On the Solution of Large Quadratic Programming Problems with Bound Constraints. SIAM J. Optim., 1:93–113, (1991).
Article
MathSciNet
MATH
Google Scholar
K.G. Murty and S.N. Kabadi. Some NP-complete problems in quadratic and nonlinear programming. Mathematical Programming, 39:117–129 (1987).
Article
MathSciNet
MATH
Google Scholar
B.A. Murtagh and M.A. Saunders. MINOS 5.0 User’s Guide. Tech. Rep. SOL 83–20, Syst. Opt. Lab., Dept. Oper. Res., Stanford Univ., (1986).
Google Scholar
A. Neumaier. An optimality criterion for global quadratic optimization. J. of Glo. Optim., 2:201–208 (1992).
Article
MathSciNet
MATH
Google Scholar
A. Neumaier. Second-order sufficient optimality conditions for local and global nonlinear programming. Journal of Global Optimization, to appear, (1995).
Google Scholar
P.M. Pardalos. Polynomial Time Algorithms for some Classes of Constrained Non-convex Quadratic Problems. Optimization 21:843–853, (1990).
Article
MathSciNet
MATH
Google Scholar
P.M. Pardalos. Integer and Separable Programming Techniques for Large Scale Optimization Problems. PhD thesis, Computer Sc. Dept. Univ. of Minnesota, (1985).
Google Scholar
P.M. Pardalos. Global Optimisation Algorithms for Linearly Constrained Indefinite Quadratic Problems. Comp. and Math. with Appl. 21:87–97, (1991).
Article
MathSciNet
MATH
Google Scholar
P.M. Pardalos, J.H. Glick, and J.B. Rosen. Global Minimization of Indefinite Quadratic problems. Computing 39:281–291, (1987).
Article
MathSciNet
MATH
Google Scholar
P.M. Pardalos and M.G.C. Resende. Interior Point Methods for Global Optimization. In Interior point methods in mathematical programming, T. Terlaky (ed.), Kluwer Academic Publishers, 1996.
Google Scholar
P.M. Pardalos, G.P. Rodgers. Computational Aspects of Branch and Bound Algorithm for Quadratic Zero-one Programming. Computing 45,131–144, (1990).
Article
MathSciNet
MATH
Google Scholar
P.M. Pardalos and J.B. Rosen. Methods for Global Concave Minimization: A Bibliographic Survey. SIAM Review 28:367–379, (1986).
Article
MathSciNet
MATH
Google Scholar
P.M. Pardalos and J.B. Rosen. Constrained Global Optimization: Algorithms and Applications. Springer-Verlag, Lecture Notes in Computer Science 268, (1987).
Book
MATH
Google Scholar
P.M. Pardalos and G. Schnitger. Checking local optimality in constrained quadratic programming is NP-hard. Operations Research Letters, 7(1):33–35, (1988).
Article
MathSciNet
MATH
Google Scholar
P.M. Pardalos and S.A. Vavasis. Quadratic programming with one negative eigenvalue is NP-hard. Journal of Global Optimization, 1(1):15–22, (1991).
Article
MathSciNet
MATH
Google Scholar
A.T. Phillips and J.B. Rosen. A Parallel Algorithm for Constrained Concave Quadratic Global Minimization. Math. Program. 42:421–448, (1988).
Article
MathSciNet
MATH
Google Scholar
A.T. Phillips and J.B. Rosen. A Parallel Algorithm for Partially Separable Non-Convex Global Minimization: Linear Constraints. A. of Oper. Research 25:101–118, (1990).
Article
MathSciNet
MATH
Google Scholar
J.B. Rosen. Global Minimization of a linearly constrained Concave Function by partition of feasible domain. Math. Oper. Res., 8:215–230, (1983).
Article
MathSciNet
MATH
Google Scholar
J.B. Rosen and P.M. Pardalos. Global Minimization of Large-Scale Constrained Concave Quadratic Problems by Separable Programming. Math. Program. 34:163–174, (1986).
Article
MathSciNet
MATH
Google Scholar
H.D. Sherali and A. R. Alameddine. A New Reformulation-Linearization Technique for Bilinear Programming Problems. J. of Glob. Optim., 2:379–410, (1992).
Article
MathSciNet
MATH
Google Scholar
H.D. Sherali and C.H. Tuncbilek. A global Optimization Algorithm for Polynomial Programming Problems Using a Reformulation-Linearization Technique. J. of Glob. Optim., 2:101–112, (1992).
Article
MathSciNet
MATH
Google Scholar
H.D. Sherali and C.H. Tuncbilek. A Reformulation-Convexification Approach for Solving Nonconvex Quadratic Programming Problems. J. of Glob. Optim., 7:1–31, (1995).
Article
MathSciNet
MATH
Google Scholar
D.C. Sorensen. Newton’s method with a model trust region modification. SIAM J. Numer. Anal., 19:409–426, (1982).
Article
MathSciNet
MATH
Google Scholar
S.A. Vavasis. Nonlinear Optimization: Complexity Issues. Oxford University Press, (1991).
MATH
Google Scholar
S.A. Vavasis. Approximate algorithms for indefinite quadratic programming. Mathematical Programming, 57:279–311, 1992.
Article
MathSciNet
MATH
Google Scholar
S.A. Vavasis. Polynomial time weak approximation algorithms for quadratic programming. In P.M. Pardalos (ed), Complexity in Numerical Optimization. World Scientific, 1993.
Google Scholar
J. Warga. A necessary and sufficient condition for a constrained Minimum. SIAM J. Opt. 2(4): 665–667, (1992).
Article
MathSciNet
MATH
Google Scholar
Y. Ye and E. Tse. An extension of Karmarkar’s projective algorithm for convex quadratic programming. Mathematical Programming, 44:157–179, (1989).
Article
MathSciNet
MATH
Google Scholar
Y. Ye. On the affine scaling algorithm for nonconvex quadratic programming. Mathematical Programming, 56:285–300, 1992.
Article
MathSciNet
MATH
Google Scholar
Download references
Author information
Authors and Affiliations
Facoltà di Economia, Istituto Universitario Navale, Via A. de Gasperi, 5, 80136, Napoli, Italy
Pasquale L. De Angelis
Dept. of Industrial and System Engineering, University of Florida, Gainesville, FL, 32611, USA
Panos M. Pardalos
Facoltà di Agraria, Istituto di Idraulica, University of Naples “Federico II” & CPS, Via Cintia, ed. T, 80126, Napoli, Italy
Gerardo Toraldo
Search author on:PubMed Google Scholar
Search author on:PubMed Google Scholar
Search author on:PubMed Google Scholar
Editor information
Editors and Affiliations
University of Vienna, Vienna, Austria
Immanuel M. Bomze
József Attila University, Szeged, Hungary
Tibor Csendes
University of Trier, Trier, Germany
Reiner Horst
University of Florida, Gainesville, Florida, USA
Panos M. Pardalos
Rights and permissions
Reprints and permissions
Copyright information
© 1997 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
De Angelis, P.L., Pardalos, P.M., Toraldo, G. (1997). Quadratic Programming with Box Constraints.
In: Bomze, I.M., Csendes, T., Horst, R., Pardalos, P.M. (eds) Developments in Global Optimization. Nonconvex Optimization and Its Applications, vol 18. Springer, Boston, MA.
Download citation
DOI:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-4768-0
Online ISBN: 978-1-4757-2600-8
eBook Packages: Springer Book Archive
Share this chapter
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
Key words
MSC Classification
Publish with us
Policies and ethics
Search
Navigation
Discover content
Publish with us
Products and services
Our brands
44.222.168.244
Not affiliated
© 2025 Springer Nature |
2019 | https://tasks.illustrativemathematics.org/content-standards/EE/8/C | Illustrative Mathematics
Loading [MathJax]/jax/input/TeX/config.js
Engage your students with effective distance learning resources. ACCESS RESOURCES>>
Domain Expressions and Equations
Grade 8
Cluster Analyze and solve linear equations and pairs of simultaneous linear equations.
8.EE.C
Analyze and solve linear equations and pairs of simultaneous linear equations.
View all 8.EE.C TasksDownload all tasks for this grade
Standards
8.EE.C.7 Solve linear equations in one variable.
View DetailsView Tasks
8.EE.C.8 Analyze and solve pairs of simultaneous linear equations.
View DetailsView Tasks
Tasks aligned to this cluster
Two Lines
View Details
Typeset May 4, 2016 at 18:58:52. Licensed by Illustrative Mathematics under a
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. |
2020 | https://fluidpower.pro/temperature-viscosity-chart/ | Temperature-Viscosity Chart – FluidPower.Pro
Fluid Power Pro - LinkedIn
Become an author | Login
Articles
Formulas
Unit Converter
Calculators
Links
About
Temperature-Viscosity Chart
Dzyanis September 8, 201920Calculatorstemperature, viscosity, Viscosity Index 86010 Views
The interpolation calculator provided below is used to determine:
the kinematic viscosity values, depends from temperature, calculated by the formulas specified in ASTM D341 – (‘Standard Practice for Viscosity-Temperature Charts for Liquid Petroleum Products’);
the Viscosity Index (VI) by the formulas specified in ASTM D2270 (Standard Practice for Calculating Viscosity Index from Kinematic Viscosity at 40 and 100°C 1) or in ISO 2909 (Standard Practice for Calculating Viscosity Index from Kinematic Viscosity at 40 and 100°C 1) or in ГОСТ 25371-2018 (Нефтепродукты. Расчёт индекса вязкости по кинематической вязкости)
Annotation.
Any mineral oil is supplied with the specification of kinematic viscosity values at two different temperatures, usually at 40°C and at 100°C (or at 100°F and at 210°F). These data is enough to determine kinematic viscosity at any other values of temperature and as well Viscosity Index.
You can calculate pre-filled values of oil classified by ISO 3448 with grades VG22, VG32, VG46 or VG68 (at viscosity Index = 100) or enter specific values for any other oils.
Warning!
The calculator below is for informative purposes only. The use of any of the calculators’ results is at the user’s sole risk.
How to use calculator
Just put your values (either imperial or metrical) in the appropriate fields below and press ENTER. All other values will be re-calculated automatically. The graphic curve will be updated as well.
| Operation data | Metrical | Imperial |
---
| Select hydraulic oil: | |
| Temperature #1 | °C | °F |
| Kinematic viscosity at Temperature #1 | cSt | SUS |
| Temperature #2 | °C | °F |
| Kinematic viscosity at Temperature #2 | cSt | SUS |
| Temperature to calculate | °C | °F |
| Results: | |
| Kinematic viscosity at calc. temperature | cSt | SUS |
| Viscosity Index | by ISO 2909:2002 Procedures A and B by ASTM D2270-04 Procedures A and B by ГОСТ 25371-2018 Методы А и Б |
| Temperature, C | Viscosity, cSt |
--- |
| -30 | 18,046.788 |
| -29 | 15,568.815 |
| -28 | 13,468.949 |
| -27 | 11,684.393 |
| -26 | 10,163.55 |
| -25 | 8,863.9 |
| -24 | 7,750.298 |
| -23 | 6,793.613 |
| -22 | 5,969.629 |
| -21 | 5,258.163 |
| -20 | 4,642.347 |
| -19 | 4,108.044 |
| -18 | 3,643.38 |
| -17 | 3,238.353 |
| -16 | 2,884.516 |
| -15 | 2,574.723 |
| -14 | 2,302.908 |
| -13 | 2,063.916 |
| -12 | 1,853.35 |
| -11 | 1,667.457 |
| -10 | 1,503.023 |
| -9 | 1,357.289 |
| -8 | 1,227.886 |
| -7 | 1,112.77 |
| -6 | 1,010.18 |
| -5 | 918.591 |
| -4 | 836.68 |
| -3 | 763.301 |
| -2 | 697.455 |
| -1 | 638.273 |
| 0 | 584.996 |
| 1 | 536.958 |
| 2 | 493.579 |
| 3 | 454.348 |
| 4 | 418.815 |
| 5 | 386.586 |
| 6 | 357.313 |
| 7 | 330.686 |
| 8 | 306.434 |
| 9 | 284.316 |
| 10 | 264.118 |
| 11 | 245.649 |
| 12 | 228.74 |
| 13 | 213.24 |
| 14 | 199.014 |
| 15 | 185.943 |
| 16 | 173.919 |
| 17 | 162.844 |
| 18 | 152.633 |
| 19 | 143.209 |
| 20 | 134.5 |
| 21 | 126.444 |
| 22 | 118.985 |
| 23 | 112.072 |
| 24 | 105.657 |
| 25 | 99.699 |
| 26 | 94.161 |
| 27 | 89.007 |
| 28 | 84.207 |
| 29 | 79.732 |
| 30 | 75.557 |
| 31 | 71.658 |
| 32 | 68.013 |
| 33 | 64.604 |
| 34 | 61.412 |
| 35 | 58.421 |
| 36 | 55.616 |
| 37 | 52.983 |
| 38 | 50.511 |
| 39 | 48.186 |
| 40 | 46 |
| 41 | 43.942 |
| 42 | 42.003 |
| 43 | 40.175 |
| 44 | 38.451 |
| 45 | 36.823 |
| 46 | 35.285 |
| 47 | 33.832 |
| 48 | 32.457 |
| 49 | 31.156 |
| 50 | 29.923 |
| 51 | 28.755 |
| 52 | 27.647 |
| 53 | 26.596 |
| 54 | 25.598 |
| 55 | 24.65 |
| 56 | 23.75 |
| 57 | 22.893 |
| 58 | 22.077 |
| 59 | 21.301 |
| 60 | 20.562 |
| 61 | 19.857 |
| 62 | 19.185 |
| 63 | 18.544 |
| 64 | 17.932 |
| 65 | 17.347 |
| 66 | 16.789 |
| 67 | 16.255 |
| 68 | 15.744 |
| 69 | 15.256 |
| 70 | 14.788 |
| 71 | 14.34 |
| 72 | 13.911 |
| 73 | 13.5 |
| 74 | 13.106 |
| 75 | 12.727 |
| 76 | 12.364 |
| 77 | 12.016 |
| 78 | 11.681 |
| 79 | 11.359 |
| 80 | 11.05 |
| 81 | 10.752 |
| 82 | 10.466 |
| 83 | 10.191 |
| 84 | 9.926 |
| 85 | 9.67 |
| 86 | 9.424 |
| 87 | 9.187 |
| 88 | 8.959 |
| 89 | 8.738 |
| 90 | 8.526 |
| 91 | 8.321 |
| 92 | 8.123 |
| 93 | 7.931 |
| 94 | 7.747 |
| 95 | 7.568 |
| 96 | 7.395 |
| 97 | 7.229 |
| 98 | 7.067 |
| 99 | 6.911 |
| 100 | 6.76 |
| 101 | 6.614 |
| 102 | 6.472 |
| 103 | 6.335 |
| 104 | 6.202 |
| 105 | 6.073 |
| 106 | 5.949 |
| 107 | 5.828 |
| 108 | 5.71 |
| 109 | 5.596 |
| 110 | 5.486 |
| 111 | 5.379 |
| 112 | 5.274 |
| 113 | 5.173 |
| 114 | 5.075 |
| 115 | 4.98 |
| 116 | 4.887 |
| 117 | 4.797 |
| 118 | 4.709 |
| 119 | 4.624 |
| 120 | 4.541 |
Temperature-Viscosity Chart
If you find some mismatch or an error or just have any questions please do not hesitate to leave your comments below.
← Previous post
Next post →
20 Comments
ALIAugust 18, 2020 at 5:36 am OUR FUEL VISCOSITY IS 39.9MM AT 50 DEG C
I WANT VISCOSITY OF 18MM2 AT BOILER WHAT WILL BE TEMPERATURE TO MAINTAIN THAT VISCOSITY.
Reply↓
1. Dzyanis(Post author)October 21, 2020 at 8:09 am Hello Ali. I assume when you say 39.9MM and 18MM2 you mean viscosity 39.9mm^2/s and 18mm^2/s what are equivalents to 39.9 cSt and 18.0 cSt accordingly. Unfortunately, it means you have oil with the custom grade and just one parameter of viscosity at temp is not enough to make this calculation in accordance with the standard. Please check your oil specification – there should be two lines of viscosity at temp. Put them in the table above and find the value of temp at any value of viscosity.
Reply↓
SHOctober 23, 2020 at 9:39 am Amazing tool!
Extremely helpful.
Thank you very much for making it available to everybody!
Reply↓
1. Dzyanis(Post author)October 23, 2020 at 11:12 am Thank you!
Reply↓
IkhsanNovember 4, 2020 at 6:25 pm Amazing tool!
thank you very much for your effort.
is this calculator applicable to another oil type (engine, gear, etc)?
Reply↓
1. Dzyanis(Post author)November 5, 2020 at 8:19 am Thanks for your feedback! This chart uses equations as per ASTM D341 standard to calculate relationship temp-visc for any liquid petroleum products and lubricants.
Reply↓
asfDecember 4, 2020 at 11:22 am hey , given viscosity of 1000 cSt at -20 deg C , and ASTM slope of 0.6 , how to find VI?
Reply↓
5. Carlos J AguirreMarch 20, 2021 at 1:32 pm GREAT TOOL GOO JOB!!!
Reply↓
6. Pankaj PatelJune 22, 2021 at 3:18 pm I am using a SAE 75-90 wt synthetic gear oil. I am needing to find out viscosity as per temperature – viscosity chart in reyn. Can you help me how I can do it.
Reply↓
1. Dzyanis(Post author)July 13, 2021 at 12:00 pm Hello! Reyn is a British unit of dynamic viscosity. This chart is for kinematic viscosity extrapolation.
Reply↓
ThomasJuly 13, 2021 at 5:54 am Hi, Great work!
The ASTM D341 states that it’s possible to use 3 points for the extrapolation. Do you know how this could be achieved?
Thanks!
Reply↓
1. Dzyanis(Post author)July 13, 2021 at 11:56 am hello Thomas. Thanks for you comment.
Standard D341-03, paragraph 1.1:
“1.1 The kinematic viscosity-temperature charts (see Figs. 1
and 2) covered by this standard are a convenient means to
ascertain the kinematic viscosity of a petroleum oil or liquid
hydrocarbon at any temperature within a limited range, pro-
vided that the kinematic viscosities at two temperatures are
known.”
So, like you see this standard for the extrapolation using 2 points. Sorry, I didn’t find any states about 3 points in this standard, did you?
And… what is the sense to make a calculator for 3 points if all oil manufacturers provide temp/visc parameters for their oil only for 2 points?
Reply↓
Mohd SaquibOctober 27, 2021 at 5:29 am My lubricant is SAE 20W-40 at 60 °C, what would be its absolute viscosity in mPa. s
Reply↓
9. haniFebruary 1, 2022 at 5:29 am For ISO VG 100 oil, how to find constants A&B
using Walther-ASTM equation to determine the
effect of temperature on viscosity of the oil as per the
parameters given below.
Given parameters:-
a. Temperature range (273 – 523 K)
b. Kinematic viscosity: 99.4 cSt at 40 C and 11.12 cSt at 100 C.
and Show the relationship between viscosity (vertical)
and temperature (horizontal) of ISO VG 100 oil
using a graph and discuss the results as the
temperature varies.
please any one answer this question?
Reply↓
10. GeorgeMarch 4, 2022 at 4:34 pm Would it be possible to list the A & B Constants for the oils in the chart? I’m trying to do an Excel calculation with a curve fit based on the data points in the tool but it is not accurate enough. I’d like to use the equations directly but I don’t know where to get the A and B constants.
Reply↓
11. maryJuly 11, 2022 at 2:24 am Hello,
Would you be able to send me the excel file so i can create graphs using andrade equation?
How is it calculated?
Reply↓
1. Dzyanis Sukhanitski(Post author)July 11, 2022 at 6:49 am I do not have an Excel file, the kinematic viscosity values are calculated by the formulas specified in ASTM D341 – (‘Standard Practice for Viscosity-Temperature Charts for Liquid Petroleum Products’).
Reply↓
MitchJanuary 13, 2023 at 2:57 pm Hi Dzyanis, I really love this tool and it’s helped me to understand both VI and the relationship between viscosity and temperature in a way that other explanations have not. I think this is great for those of us that lack your engineering knowledge and experience.
I have one suggestion. It would be really great, if you could input TWO different oil products, and have them both charted on the same graph with the the x/y scaling fixed to whichever is the larger data range. With two lines showing overlapped, you could make very convincing visual comparisons between TWO different oil products.
Reply↓
1. Dzyanis(Post author)August 22, 2023 at 9:28 am Good suggestion, I will work on it.
Also, I’m thinking to add autofill into input fields from the URL to get the required diagram by link.
Reply↓
Metin SimsekJune 11, 2025 at 8:09 am Hello Great help, very useful. Would it be possible to adjust this for HVİ oils where the curve will go near-flat? Regards.
Metin
Reply↓
Leave a Comment Cancel reply
Your email address will not be published.Required fields are marked
[x] Save my name, email, and website in this browser for the next time I comment.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
The reCAPTCHA verification period has expired. Please reload the page.
Δ
This site uses Akismet to reduce spam. Learn how your comment data is processed.
FluidPower.Pro is a free resource where any Fluid Power specialists can share their knowledge, interesting info about new products or just make a discussion on any topics related to the hydraulic or pneumatic.
CONTACT US
LinkedIn: Follow Us!
Fluidpower.pro
Read our Privacy Policy
Hosting @HostBrook
){};tLlB(tLTB);)
©2022 FluidPower.Pro |
2021 | https://stackoverflow.com/questions/3809044/how-many-values-can-be-represented-with-n-bits | Stack Overflow
About
For Teams
Stack Overflow for Teams Where developers & technologists share private knowledge with coworkers
Advertising Reach devs & technologists worldwide about your product, service or employer brand
Knowledge Solutions Data licensing offering for businesses to build and improve AI tools and models
Labs The future of collective knowledge sharing
About the company Visit the blog
Collectives¢ on Stack Overflow
Find centralized, trusted content and collaborate around the technologies you use most.
Learn more about Collectives
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
How many values can be represented with n bits?
Ask Question
Asked
Modified 6 years, 4 months ago
Viewed 263k times
46
For example, if n=9, then how many different values can be represented in 9 binary digits (bits)?
My thinking is that if I set each of those 9 bits to 1, I will make the highest number possible that those 9 digits are able to represent. Therefore, the highest value is 1 1111 1111 which equals 511 in decimal. I conclude that, therefore, 9 digits of binary can represent 511 different values.
Is my thought process correct? If not, could someone kindly explain what I'm missing? How can I generalize it to n bits?
binary
bit
Share
Improve this question
edited Nov 1, 2012 at 18:03
NullUserException
85.7k3131 gold badges212212 silver badges239239 bronze badges
asked Sep 28, 2010 at 1:26
SeanSean
5,42355 gold badges2525 silver badges2626 bronze badges
4
13
You forgot 000000000.
David R Tribble
– David R Tribble
2010-09-28 02:05:19 +00:00
Commented Sep 28, 2010 at 2:05
9
+1 for a very well-asked homework question. If all homework questions on Stack Overflow were like this, it would be a much better place.
James McNellis
– James McNellis
2010-09-28 02:26:41 +00:00
Commented Sep 28, 2010 at 2:26
2
Why it closed :( It is not related to "specific moment in time" .....
Kanagavelu Sugumar
– Kanagavelu Sugumar
2015-02-17 06:53:46 +00:00
Commented Feb 17, 2015 at 6:53
e.g. 2 pow 3 represents two combinations (0,1) for three place holders like 000, 001, 010, 100, 101, 110, 111. If you have 8 (octal 0-7) combination for five places then total possible combinations will be 8 pow 5.
Kanagavelu Sugumar
– Kanagavelu Sugumar
2015-02-17 07:01:17 +00:00
Commented Feb 17, 2015 at 7:01
Add a comment |
7 Answers 7
Reset to default
63
29 = 512 values, because that's how many combinations of zeroes and ones you can have.
What those values represent however will depend on the system you are using. If it's an unsigned integer, you will have:
000000000 = 0 (min) 000000001 = 1 ... 111111110 = 510 111111111 = 511 (max)
In two's complement, which is commonly used to represent integers in binary, you'll have:
000000000 = 0 000000001 = 1 ... 011111110 = 254 011111111 = 255 (max) 100000000 = -256 (min) <- yay integer overflow 100000001 = -255 ... 111111110 = -2 111111111 = -1
In general, with k bits you can represent 2k values. Their range will depend on the system you are using:
Unsigned: 0 to 2k-1 Signed: -2k-1 to 2k-1-1
Share
Improve this answer
edited Sep 28, 2010 at 2:58
answered Sep 28, 2010 at 1:29
NullUserExceptionNullUserException
85.7k3131 gold badges212212 silver badges239239 bronze badges
2 Comments
Sean
Sean
You raise a very interesting point. I hadn't thought of signed and unsigned integers.
Nathan
Nathan
but in any case the number of different values is always 2^k
11
What you're missing: Zero is a value
Share
Improve this answer
answered Sep 28, 2010 at 1:27
SamStephensSamStephens
5,87166 gold badges3939 silver badges4646 bronze badges
Comments
3
A better way to solve it is to start small.
Let's start with 1 bit. Which can either be 1 or 0. That's 2 values, or 10 in binary.
Now 2 bits, which can either be 00, 01, 10 or 11 That's 4 values, or 100 in binary... See the pattern?
Share
Improve this answer
answered Sep 28, 2010 at 1:33
Randy the DevRandy the Dev
26.9k66 gold badges4646 silver badges5454 bronze badges
Comments
1
Okay, since it already "leaked": You're missing zero, so the correct answer is 512 (511 is the greatest one, but it's 0 to 511, not 1 to 511).
By the way, an good followup exercise would be to generalize this:
How many different values can be represented in n binary digits (bits)?
Share
Improve this answer
answered Sep 28, 2010 at 1:29
schnaaderschnaader
49.9k1010 gold badges108108 silver badges139139 bronze badges
1 Comment
Sean
Sean
Thank you for explaining that I was missing the 0 value. The way you reworded the question will definitely help me in the future.
1
Without wanting to give you the answer here is the logic.
You have 2 possible values in each digit. you have 9 of them.
like in base 10 where you have 10 different values by digit say you have 2 of them (which makes from 0 to 99) : 0 to 99 makes 100 numbers. if you do the calcul you have an exponential function
base^numberOfDigits: 10^2 = 100 ; 2^9 = 512
Share
Improve this answer
answered Sep 28, 2010 at 1:30
community wiki
pastjean
Comments
1
There's an easier way to think about this. Start with 1 bit. This can obviously represent 2 values (0 or 1). What happens when we add a bit? We can now represent twice as many values: the values we could represent before with a 0 appended and the values we could represent before with a 1 appended.
So the the number of values we can represent with n bits is just 2^n (2 to the power n)
Share
Improve this answer
answered Sep 28, 2010 at 1:32
davedave
13.4k44 gold badges2323 silver badges1313 bronze badges
Comments
1
The thing you are missing is which encoding scheme is being used. There are different ways to encode binary numbers. Look into signed number representations. For 9 bits, the ranges and the amount of numbers that can be represented will differ depending on the system used.
Share
Improve this answer
edited Sep 28, 2010 at 1:57
answered Sep 28, 2010 at 1:43
James KastrantasJames Kastrantas
7611 silver badge33 bronze badges
5 Comments
Lie Ryan
Lie Ryan
The range of numbers that is represented will differ depending on the encoding, but the number of distinct values that can be represented stays the same no matter the encoding used
James Kastrantas
James Kastrantas
I just worked out 3-bit fixed precision on paper to check myself. The unsigned and 2's compliment representations can represent 8 values. I count 7 values for signed magnitude and 1's compliment because those systems have representations for positive and negative zero. Are positive and negative zero also counted?
Lie Ryan
Lie Ryan
for 1's compliment, positive and negative zeros are considered as two distinct values. I'm not sure what you meant by "signed magnitude", can you elaborate what you meant by that?
James McNellis
James McNellis
@Lie: One could argue that +0 and -0 are two different datums that represent the same value. Using that terminology, the number of datums in a sequence of k bits is always 2^k, but the number of values those datums may represent is less than or equal to 2^k.
James Kastrantas
James Kastrantas
@Lie Ryan: en.wikipedia.org/wiki/… I didn't know (or forgot...) that +0 and -0 are both counted. I'll remember that in the future. Thanks.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
binary
bit
See similar questions with these tags.
The Overflow Blog
The history and future of software development (part 1)
Getting Backstage in front of a shifting dev experience
Featured on Meta
Spevacus has joined us as a Community Manager
Introducing a new proactive anti-spam measure
New and improved coding challenges
New comment UI experiment graduation
Policy: Generative AI (e.g., ChatGPT) is banned
Linked
0 How many unique conditions can be defined using only two on and off mode switches?
Why is the max integer in java 2^31 - 1 and not 2^31
0 Given N bits, how many integers can be represented in binary?
0 7-bit two's complement
Related
11 Calculating the total number of possibilities in binary?
How many bits do you need to store a positive integer?
1 Bits Required to Store Values
14 count Number of 1 Bits in java
1 How many Int32 numbers can be represented when N number of bits is set?
0 How can I represent all the possible values of n bits in base 2 using n bits in C?
0 Given N bits, how many integers can be represented in binary?
0 What's the range of numbers we can represent with N bits?
0 How many numbers can we store with 1 bit?
2 [Given a integer N>0, how many integers in the interval 0, 2^N) have exactly N-1 set bits? Write a short function that returns the correct answer
Hot Network Questions
Are there any world leaders who are/were good at chess?
What is the meaning of 率 in this report?
How exactly are random assignments of cases to US Federal Judges implemented? Who ensures randomness? Are there laws regulating how it should be done?
Is existence always locational?
Calculating the node voltage
Bypassing C64's PETSCII to screen code mapping
How to rsync a large file by comparing earlier versions on the sending end?
Should I let a player go because of their inability to handle setbacks?
How to locate a leak in an irrigation system?
Real structure on a complex torus
ICC in Hague not prosecuting an individual brought before them in a questionable manner?
how do I remove a item from the applications menu
Exchange a file in a zip file quickly
Traversing a curve by portions of its arclength
Can I go in the edit mode and by pressing A select all, then press U for Smart UV Project for that table, After PBR texturing is done?
How to start explorer with C: drive selected and shown in folder list?
Is it safe to route top layer traces under header pins, SMD IC?
How many stars is possible to obtain in your savefile?
Spectral Leakage & Phase Discontinuites
Switch between math versions but without math versions
A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man
Is there a specific term to describe someone who is religious but does not necessarily believe everything that their religion teaches, and uses logic?
What is this chess h4 sac known as?
Why, really, do some reject infinite regresses?
more hot questions
Question feed |
2022 | https://www.mathsisfun.com/calculus/derivative-vs-integral.html | Graphical Intro toDerivatives and Integrals
Derivatives and Integrals have a two-way relationship!
Let's start by looking at sums and slopes:
Example: walking in a straight line
Walk slow, the distance increases slowly
Walk fast, the distance increases fast
Stand still and the distance won't change
A distance increase of 4 km in 1 hour gives a speed of 4 km per hour
Or, walking at 4 km per hour for 1 hour increases the distance by 4 km
Speed is the rate of change of distance
Change in distance is the sum of the speed over time
It will make more sense when you play with it below: change the distance line, or the speed line, to see its affect on the other:
images/deriv-integ.js?mode=1&topic=walking
Play with that a little and get comfortable with the two-way relationship. Try zero speed, or negative speed.
The slope of the distance line gives us the speed line, like this:
The "area" under the speed line gives us the increase in distance, like this:
Many things have that same two-way relationship:
Wealth and income
Volume and flow rate
Energy and power
lots more!
Here is the same app as above, but you can choose different topics:
images/deriv-integ.js?mode=multi
Integrals and Derivatives also have that two-way relationship!
Try it below, but first note:
Δx (the gap between x values) only gives an approximate answer
dx (when Δx approaches zero) gives the actual derivative and integral
images/deriv-integ.js?mode=fn
Note: this is a computer model and actually uses a very small Δx to simulate dx, and can make erors.
For true derivatives refer to Derivative Rules, and for integrals refer to Introduction to Integration
Derivative Rules Introduction to Integration Integral Approximations Calculus Index
Copyright © 2023 Rod Pierce |
2023 | Jump to content
Search
File:PascalTriangleAnimated2.gif
File
Talk
Read
View on Commons
Edit local description
View history
Tools
Actions
Read
View on Commons
Edit local description
View history
General
What links here
Related changes
Upload file
Permanent link
Page information
Get shortened URL
Download QR code
Print/export
Download as PDF
Printable version
In other projects
Appearance
From Wikipedia, the free encyclopedia
File
File history
File usage
Global file usage
No higher resolution available.
PascalTriangleAnimated2.gif (260 × 240 pixels, file size: 27 KB, MIME type: image/gif, looped, 84 frames, 12 s)
| |
| This is a file from the Wikimedia Commons. Information from its description page there is shown below.Commons is a freely licensed media file repository. You can help. |
| |
| This image was selected as picture of the month on the Mathematics Portal for October 2008. |
Summary
| | |
--- |
| DescriptionPascalTriangleAnimated2.gif | English: Pascal's triangle is a geometric arrangement of integers representing the binomial coefficients in a polynominal equation of the format (x + y)n. The formation also demonstrates many other mathematical properties, such as listing the entire set of the natural numbers in the first diagonal rows. This phenomenon is named after Blaise Pascal in the western world, however was studied in detail before his time in many Asian countries. It is also called the Halayudha's triangle, in honor of the Sanskrit prosody scholar who described it. (See: Alexander Zawaira and Gavin Hitchcock (2008), A Primer for Mathematics Competitions, Oxford University Press, ISBN 978-0-19-156170-2, page 237) It is alternately referred to as "Khayyam's triangle" after the Persian Omar Khayyám. Each number is the sum of the two directly above it. This animation shows this relation in the construction of the first five rows, however the pattern applies for an infinite range. This version has the 1 cells already filled in, and includes actual animation to better demonstrate the construction. Čeština: Animace zobrazuje vytváření Pascalova trojúhelníku. |
| Date | |
| Source | Own work |
| Author | Hersfold |
| Other versions | |
Licensing
| |
| Public domainPublic domainfalsefalse |
| | |
--- |
| | I, the copyright holder of this work, release this work into the public domain. This applies worldwide.In some countries this may not be legally possible; if so:I grant anyone the right to use this work for any purpose, without any conditions, unless such conditions are required by law. |
Captions
Pascal's triangle
Pascalův trojúhelník
треугольник Паскаля - это геометрическое расположение целых чисел, представляющих биномиальные коэффициенты в полиномиальном уравнении формата (x + y)n. формирование также демонстрирует множество других математических свойств, таких как перечисление
Items portrayed in this file
depicts
Pascal's triangle
copyright status
copyrighted, dedicated to the public domain by copyright holder
copyrighted
copyright license
released into the public domain by the copyright holder
inception
18 April 2008
source of file
original creation by uploader
media type
File history
Click on a date/time to view the file as it appeared at that time.
| Date/Time | Thumbnail | Dimensions | User | Comment |
--- ---
| current | 18:59, 21 May 2023 | 260 × 240 (27 KB) | Phreneticc | Reduced file weight with FileOptimizer in lossless compression mode. |
| 19:45, 2 May 2012 | 260 × 240 (28 KB) | Dratini0 | Optimized and fixed with Gimp, because it did not work for me in LibreOffice and Gimp. I might have made a mistake. |
| 20:49, 18 April 2008 | 260 × 240 (41 KB) | Hersfold | {{Information |Description=Pascal's triangle is a geometric arrangement of integers representing the binomial coefficients in a polynominal equation of the format (x + y)n. The |
File usage
The following 9 pages use this file:
Blaise Pascal
Mathematics education in the United States
Pascal's triangle
Sanskrit prosody
Wikipedia:Featured picture candidates/April-2008
Wikipedia:Featured picture candidates/Pascal's triangle
Wikipedia:Graphics Lab/Illustration workshop/Archive/Nov 2012
Portal:Mathematics/Featured picture/2008 10
Portal:Mathematics/Featured picture archive
Global file usage
The following other wikis use this file:
Usage on als.wikipedia.org
Pascalsches Dreieck
Usage on ar.wikipedia.org
بوابة:رياضيات/صورة مختارة
مثلث باسكال
بوابة:رياضيات/صورة مختارة/أرشيف
بوابة:رياضيات/صورة مختارة/3
Usage on ary.wikipedia.org
قيسارية:لماط
Usage on arz.wikipedia.org
باسكال
Usage on az.wikipedia.org
Tusi-Paskal üçbucağı
Usage on ba.wikipedia.org
Блез Паскаль
Usage on be.wikipedia.org
Гісторыя тэорыі імавернасцей
Usage on bn.wikipedia.org
প্যাসকেলের ত্রিভুজ
Usage on bs.wikipedia.org
Blaise Pascal
Pascalov trougao
Usage on ca.wikipedia.org
Triangle de Tartaglia
Usage on ckb.wikipedia.org
سێگۆشەی پاسکاڵ
Usage on cs.wikipedia.org
Pascalův trojúhelník
Usage on cv.wikipedia.org
Паскаль, Блез
Паскаль виçкĕтеслĕхĕ
Usage on da.wikipedia.org
Blaise Pascal
Pascals trekant
Usage on de.wikipedia.org
Blaise Pascal
Pascalsches Dreieck
Binomische Formeln
Benutzer:Das Volk/Spielzeugladen
Wikipedia:Auskunft/Archiv/2012/Woche 42
Benutzer:Googolplexian1221/Binomische Formeln
Usage on de.wikibooks.org
Mathe für Nicht-Freaks: Binomialkoeffizient: Rechenregeln
Benutzer:Dirk Hünniger/mnf
Mathematrix: AT BRP/ Theorie/ Mittleres Niveau 3
Mathematrix: MA TER/ Theorie/ Arbeiten mit Termen
Mathematrix: AT PSA/ Theorie/ Expertenniveau 2
Mathematrix: AT BRP/ Theorie nach Thema/ Arbeiten mit Termen
Mathematrix: AT PSA/ Theorie nach Thema/ Arbeiten mit Termen
Mathematrix: AT AHS/ Theorie nach Thema/ Arbeiten mit Termen
Mathematrix: AT AHS/ Theorie/ Klasse 4
Mathematrix: BY GYM/ Theorie/ Klasse 8
Mathematrix: BY GYM/ Theorie nach Thema/ Arbeiten mit Termen
Mathematrix: AT PSA/ Theorie/ X
Ing Mathematik: Permutationen, Kombinationen, binomischer Lehrsatz
Usage on diq.wikipedia.org
Blaise Pascal
Usage on en.wikiquote.org
Tao Te Ching
Usage on eo.wikipedia.org
Triangulo de Pascal
Usage on es.wikipedia.org
Blaise Pascal
Triángulo de Pascal
Usuario:Envilchez/Taller
Usage on et.wikipedia.org
Tuumamagnetresonantsspektroskoopia
Usage on eu.wikipedia.org
Pascalen hirukia
Usage on fa.wikipedia.org
بلز پاسکال
Usage on fi.wikipedia.org
Pascalin kolmio
Usage on fr.wikipedia.org
Triangle de Pascal
View more global usage of this file.
Retrieved from "
Category:
Mathematics portal selected pictures
File:PascalTriangleAnimated2.gif
Add topic | |
2024 | https://math.libretexts.org/Bookshelves/Applied_Mathematics/Contemporary_Mathematics_(OpenStax)/10%3A__Geometry/10.04%3A_Polygons_Perimeter_and_Circumference | Skip to main content
10.4: Polygons, Perimeter, and Circumference
Last updated
: Jan 2, 2025
Save as PDF
10.3.0: Exercises
10.4.0: Exercises
Page ID
: 129643
OpenStax
OpenStax
( \newcommand{\kernel}{\mathrm{null}\,})
Learning Objectives
Identify polygons by their sides.
Identify polygons by their characteristics.
Calculate the perimeter of a polygon.
Calculate the sum of the measures of a polygon’s interior angles.
Calculate the sum of the measures of a polygon’s exterior angles.
Calculate the circumference of a circle.
Solve application problems involving perimeter and circumference.
In our homes, on the road, everywhere we go, polygonal shapes are so common that we cannot count the many uses. Traffic signs, furniture, lighting, clocks, books, computers, phones, and so on, the list is endless. Many applications of polygonal shapes are for practical use, because the shapes chosen are the best for the purpose.
Modern geometric patterns in fabric design have become more popular with time, and they are used for the beauty they lend to the material, the window coverings, the dresses, or the upholstery. This art is not done for any practical reason, but only for the interest these shapes can create, for the pure aesthetics of design.
When designing fabrics, one has to consider the perimeter of the shapes, the triangles, the hexagons, and all polygons used in the pattern, including the circumference of any circular shapes. Additionally, it is the relationship of one object to another and experimenting with different shapes, changing perimeters, or changing angle measurements that we find the best overall design for the intended use of the fabric. In this section, we will explore these properties of polygons, the perimeter, the calculation of interior and exterior angles of polygons, and the circumference of a circle.
Identifying Polygons
A polygon is a closed, two-dimensional shape classified by the number of straight-line sides. See Figure 10.82 for some examples. We show only up to eight-sided polygons, but there are many, many more.
If all the sides of a polygon have equal lengths and all the angles are equal, they are called regular polygons. However, any shape with sides that are line segments can classify as a polygon. For example, the first two shapes, shown in Figure {PageIndex3, are both pentagons because they each have five sides and five vertices. The third shape Figure {PageIndex31 is a hexagon because it has six sides and six vertices. We should note here that the hexagon in Figure {PageIndex3 is a concave hexagon, as opposed to the first two shapes, which are convex pentagons. Technically, what makes a polygon concave is having an interior angle that measures greater than 180∘. They are hollowed out, or cave in, so to speak. Convex refers to the opposite effect where the shape is rounded out or pushed out.
While there are variations of all polygons, quadrilaterals contain an additional set of figures classified by angles and whether there are one or more pairs of parallel sides. See Figure {PageIndex4.
Example {PageIndex1: Identifying Polygons
Identify each polygon.
Answer
: 1. This shape has six sides. Therefore, it is a hexagon.
2. This shape has four sides, so it is a quadrilateral. It has two pairs of parallel sides making it a parallelogram.
3. This shape has eight sides making it an octagon.
4. This is an equilateral triangle, as all three sides are equal.
5. This is a rhombus; all four sides are equal.
6. This is a regular octagon, eight sides of equal length and equal angles.
Your Turn {PageIndex1
Identify the shape.
Example {PageIndex2: Determining Multiple Polygons
What polygons make up Figure 10.85?
Answer
: Shapes 1 and 5 are hexagons; shapes 2, 3, 4, 6, 7, 9, 10, 12, 13, 14, 15, and 16 are triangles; shapes 8 and 17 are parallelograms; and shape 11 is a trapezoid.
Your Turn {PageIndex2
What polygons make up the figure shown?
Figure {PageIndex6
Perimeter
Perimeter refers to the outside measurements of some area or region given in linear units. For example, to find out how much fencing you would need to enclose your backyard, you will need the perimeter. The general definition of perimeter is the sum of the lengths of the sides of an enclosed region. For some geometric shapes, such as rectangles and circles, we have formulas. For other shapes, it is a matter of just adding up the side lengths.
A rectangle is defined as part of the group known as quadrilaterals, or shapes with four sides. A rectangle has two sets of parallel sides with four angles. To find the perimeter of a rectangle, we use the following formula:
FORMULA
The formula for the perimeter P of a rectangle is P=2L+2W, twice the length L plus twice the width W.
For example, to find the length of a rectangle that has a perimeter of 24 inches and a width of 4 inches, we use the formula. Thus,
2424−8168=2l+2(4)=2l+8=2l=2l=l
The length is 8 units.
The perimeter of a regular polygon with n sides is given as
P=n⋅s.
For example, the perimeter of an equilateral triangle, a triangle with three equal sides, and a side length of 7 cm is P=3(7)=21 cm.
Example {PageIndex3: Finding the Perimeter of a Pentagon
Find the perimeter of a regular pentagon with a side length of 7 cm (Figure {PageIndex7).
Figure {PageIndex7
Answer
: A regular pentagon has five equal sides. Therefore, the perimeter is equal to P=5(7)=35 cm.
Your Turn {PageIndex3
Find the perimeter of a square table that measures 30 inches across from one side to its opposite side.
Example {PageIndex4: Finding the Perimeter of an Octagon
Find the perimeter of a regular octagon with a side length of 14 cm (Figure {PageIndex8).
Figure {PageIndex8
Answer
: A regular octagon has eight sides of equal length. Therefore, the perimeter of a regular octagon with a side length of 14 cm is P=8(14)=112 cm.
Your Turn {PageIndex1
Find the perimeter of a regular heptagon with a side length of 3.2 as shown in the figure.
Figure {PageIndex9
Sum of Interior and Exterior Angles
To find the sum of the measurements of interior angles of a regular polygon, we have the following formula.
FORMULA
The sum of the interior angles of a polygon with n sides is given by
S=(n−2)180∘.
For example, if we want to find the sum of the interior angles in a parallelogram, we have
S=(4−2)180∘=2(180)=360∘
Similarly, to find the sum of the interior angles inside a regular heptagon, we have
S=(7−2)180∘=5(180)=900∘.
To find the measure of each interior angle of a regular polygon with n sides, we have the following formula.
FORMULA
The measure of each interior angle of a regular polygon with n sides is given by
a=(n−2)180∘n
For example, find the measure of an interior angle of a regular heptagon, as shown in Figure {PageIndex10. We have
a=(7−2)180∘7=128.57∘
Figure {PageIndex10: Interior Angles
Example {PageIndex5: Calculating the Sum of Interior Angles
Find the measure of an interior angle in a regular octagon using the formula, and then find the sum of all the interior angles using the sum formula.
Answer
: An octagon has eight sides, so n=8.
Step 1: Using the formula a=(n−2)180∘8 :
a=(8−2)180∘8=(6)180∘8=135∘.
So, the measure of each interior angle in a regular octagon is 135∘.
Step 2: The sum of the angles inside an octagon, so using the formula:
S=(n−2)180∘=(8−2)180∘=6(180)=1,080∘.
Step 3: We can test this, as we already know the measure of each angle is 135∘. Thus, 8(135∘)=1,080∘.
Your Turn {PageIndex5
Find the measure of each interior angle of a regular pentagon and then find the sum of the interior angles.
Example {PageIndex6: Calculating Interior Angles
Use algebra to calculate the measure of each interior angle of the five-sided polygon (Figure {PageIndex11).
Figure {PageIndex11
Answer
: Step 1: Let us find out what the total of the sum of the interior angles should be. Use the formula for the sum of the angles in a polygon with n sides: S=(n−2)180∘. So, S=(5−2)180∘=540∘.
Step 2: We add up all the angles and solve for x :
5(x+7)+120+(6x+25)+5(2x+5)+5(3x−5)5x+6x+10x+15x+18036xx=540=540=360=10
Step 3: We can then find the measure of each interior angle:
m∡A=5(10+7)=85∘m∡B=120∘m∡C=6(10)+25=85∘m∡D=5(2∗10+5)=125∘m∡E=5(3∗10−5)=125∘
Your Turn {PageIndex6
Find the sum of the measures of the interior angles and then find the measure of each interior angle in the figure shown.
Figure {PageIndex12
An exterior angle of a regular polygon is an angle formed by extending a side length beyond the closed figure. The measure of an exterior angle of a regular polygon with n sides is found using the following formula:
FORMULA
To find the measure of an exterior angle of a regular polygon with n sides we use the formula
b=360∘n.
In Figure {PageIndex13, we have a regular hexagon ABCDEF. By extending the lines of each side, an angle is formed on the exterior of the hexagon at each vertex. The measure of each exterior angle is found using the formula, b=360∘6=60∘.
Figure {PageIndex13: Exterior Angles
Now, an important point is that the sum of the exterior angles of a regular polygon with n sides equals 360∘. This implies that when we multiply the measure of one exterior angle by the number of sides of the regular polygon, we should get 360∘. For the example in Figure {PageIndex13, we multiply the measure of each exterior angle, 60∘, by the number of sides, six. Thus, the sum of the exterior angles is 6(60∘)=360∘.
Example {PageIndex7: Calculating the Sum of Exterior Angles
Find the sum of the measure of the exterior angles of the pentagon (Figure {PageIndex14).
Figure {PageIndex14
Answer
: Each individual angle measures 3605=72∘. Then, the sum of the exterior angles is 5(72∘)=360∘.
Your Turn {PageIndex7
Find the sum of the measures of the exterior angles in the figure shown.
Figure {PageIndex15
Circles and Circumference
The perimeter of a circle is called the circumference. To find the circumference, we use the formula
C=πd
where d is the diameter, the distance across the center, or
C=2πr
where r is the radius.
FORMULA
The circumference of a circle is found using the formula C=πd, where d is the diameter of the circle, or C=2πr, where r is the radius.
The radius is 1/2 of the diameter of a circle. The symbol π=3.141592654… is the ratio of the circumference to the diameter. Because this ratio is constant, our formula is accurate for any size circle. See Figure {PageIndex16.
Figure {PageIndex16: Circle Diameter and Radius
Let the radius be equal to 3.5 inches. Then, the circumference is
C=2π(3.5)=21.99in.
Example {PageIndex8: Finding Circumference with Diameter
Find the circumference of a circle with diameter 10 cm.
Answer
: If the diameter is 10 cm, the circumference is C=10π=31.42 cm.
Your Turn {PageIndex8
Find the circumference of a circle with a radius of 2.25 cm.
Example {PageIndex9: Finding Circumference with Radius
Find the radius of a circle with a circumference of 12 in.
Answer
: If the circumference is 12 in, then the radius is
12=2πr122π=r=1.91in.
Your Turn {PageIndex9
Find the radius of a circle with a circumference of 15.71cm.
Example {PageIndex10: Calculating Circumference for the Real World
You decide to make a trim for the window in Figure {PageIndex17. How many feet of trim do you need to buy?
Figure {PageIndex17
Answer
: The trim will cover the 6 feet along the bottom and the two 12-ft sides plus the half circle on top. The circumference of a semicircle is ½ the circumference of a circle. The diameter of the semicircle is 6 ft. Then, the circumference of the semicircle would be 12πd=12π(6)=3πft=9.4ft.12πd=12π(6)=3πft=9.4ft.
Therefore, the total perimeter of the window is 6+12+12+9.4=39.4ft. You need to buy 39.4 ft of trim.
Your Turn {PageIndex10
To make a trim for the window in the figure shown, you need the perimeter. How many feet of trim do you need to buy?
Figure {PageIndex18
People in Mathematics: Archimedes
The overwhelming consensus is that Archimedes (287–212 BCE) was the greatest mathematician of classical antiquity, if not of all time. A Greek scientist, inventor, philosopher, astronomer, physicist, and mathematician, Archimedes flourished in Syracuse, Sicily. He is credited with the invention of various types of pulley systems and screw pumps based on the center of gravity. He advanced numerous mathematical concepts, including theorems for finding surface area and volume. Archimedes anticipated modern calculus and developed the idea of the “infinitely small” and the method of exhaustion. The method of exhaustion is a technique for finding the area of a shape inscribed within a sequence of polygons. The areas of the polygons converge to the area of the inscribed shape. This technique evolved to the concept of limits, which we use today.
Figure {PageIndex19: Archimedes (credit: “Archimedes” Engraving from the book Les vrais pourtraits et vies des hommes illustres grecz, latins et payens (1586)/Wikimedia Commons, Public Domain)
One of the more interesting achievements of Archimedes is the way he estimated the number pi, the ratio of the circumference of a circle to its diameter. He was the first to find a valid approximation. He started with a circle having a diameter of 1 inch. His method involved drawing a polygon inscribed inside this circle and a polygon circumscribed around this circle. He knew that the perimeter of the inscribed polygon was smaller than the circumference of the circle, and the perimeter of the circumscribed polygon was larger than the circumference of the circle. This is shown in the drawing of an eight-sided polygon. He increased the number of sides of the polygon each time as he got closer to the real value of pi. The following table is an example of how he did this.
| Sides | Inscribed Perimeter | Circumscribed Perimeter |
| 4 | 2.8284 | 4.00 |
| 8 | 3.0615 | 3.3137 |
| 16 | 3.1214 | 3.1826 |
| 32 | 3.1365 | 3.1517 |
| 64 | 3.1403 | 3.1441 |
Archimedes settled on an approximation of π≈3.1416 after an iteration of 96 sides. Because pi is an irrational number, it cannot be written exactly. However, the capability of the supercomputer can compute pi to billions of decimal digits. As of 2002, the most precise approximation of pi includes 1.2 trillion decimal digits.
Who Knew?: The Platonic Solids
The Platonic solids (Figure 10.100) have been known since antiquity. A polyhedron is a three-dimensional object constructed with congruent regular polygonal faces. Named for the philosopher, Plato believed that each one of the solids is associated with one of the four elements: Fire is associated with the tetrahedron or pyramid, earth with the cube, air with the octahedron, and water with the icosahedron. Of the fifth Platonic solid, the dodecahedron, Plato said, “… God used it for arranging the constellations on the whole heaven.”
Figure {PageIndex20: Platonic Solids
Plato believed that the combination of these five polyhedra formed all matter in the universe. Later, Euclid proved that exactly five regular polyhedra exist and devoted the last book of the Elements to this theory. These ideas were resuscitated by Johannes Kepler about 2,000 years later. Kepler used the solids to explain the geometry of the universe. The beauty and symmetry of the Platonic solids have inspired architects and artists from antiquity to the present.
Exercise 10.4.1
In the following exercises, identify the regular polygons.
Exercise 10.4.2
Find the perimeter of the regular pentagon with side length of 6 cm.
Exercise 10.4.3
Find the sum of the interior angles of a regular hexagon.
Exercise 10.4.4
Find the measure of each interior angle of a regular hexagon.
Exercise 10.4.5
Find the measurements of each angle in the given figure.
Exercise 10.4.6
Find the circumference of the circle with radius equal to 3 cm.
10.3.0: Exercises
10.4.0: Exercises |
2025 | https://calculator-online.net/proportion-calculator/ | CALCULATOR
ONLINE
AI Tools
Health
Math
Everyday Life
Finance
Physics
Chemistry
Statistics
Construction
Pets
Time & Date
Conversion Calculator
| | | |
---
| EN | PL | ID |
| DE | JA | PT |
| ES | IT | RU |
| FI |
AI Tools
AI Math Solver
Word Problem Solver
AI Answer Generator
Question AI
Chemistry AI Solver
Physics AI Solver
Geometry AI Solver
Accounting AI Solver
Economics AI Solver
AI Question Generator
See More AI Tools
Chemistry
Ideal Gas Law Calculator
Mole Fraction Calculator
Percent Yield Calculator
Theoretical Yield Calculator
Empirical Formula Calculator
Charles Law Calculator
Electron Configuration Calculator
Chemical Equation Balancer
Molar Mass Calculator
Titration Calculator
See More ChemistryTools
Construction
Roof Pitch Calculator
Gravel Calculator
Mulch Calculator
Sand Calculator
Asphalt Calculator
Square Footage Calculator
Cubic Feet Calculator
Concrete Calculator
Paver Calculator
Feet and Inches Calculator
See More ConstructionTools
Finance
Income Tax Calculator
Stamp Duty Calculator
VAT Calculator
Salary Calculator
Sales Tax Calculator
Discount Calculator
FIFO & LIFO Calculator
Price Elasticity of Demand Calculator
Margin Calculator
Enterprise Value Calculator
See More FinanceTools
Health
BMI Calculator
Ovulation Calculator
Pregnancy Calculator
Weight Loss Calculator
6 Minute Walk Test Calculator
TDEE Calculator
Macro Calculator
Estimated Energy Requirement Calculator
RMR Calculator
BMR Calculator
See More HealthTools
Everyday Life
Distance Calculator
Love Calculator
Age Calculator
PPI Calculator
ERA Calculator
ASU GPA Calculator
IU GPA Calculator
Age Difference Calculator
Vorici Calculator
Freight Class Calculator
See More Everyday LifeTools
Math
Prime Factorization Calculator
Fraction Calculator
GPA Calculator
Online Graphing Calculator
Math Calculator
Percentage Calculator
Percent Error Calculator
Modulo Calculator
Significant Figures Calculator
Circumference Calculator
See More MathTools
Pets
Puppy Weight Calculator
Pearson Age Calculator
Dog Age Calculator by Breed
Cat Age Calculator
Dog Pregnancy Calculator
Benadryl for Dogs Calculator
Dog Crate Size Calculator
Cat Calorie Calculator
Dog Food Calculator
See More PetsTools
Physics
Ohms Law Calculator
Cross Product Calculator
Velocity Calculator
Kinetic Energy Calculator
Acceleration Calculator
Average Velocity Calculator
Instantaneous Velocity Calculator
Torque Calculator
Horsepower Calculator
Momentum Calculator
See More PhysicsTools
Statistics
Probability Calculator
Coefficient of Variation Calculator
Hypergeometric Calculator
Critical Value Calculator
Covariance Calculator
Empirical Rule Calculator
Mean Median Mode Range Calculator
Quartile Calculator
Geometric Mean Calculator
Harmonic Mean Calculator
See More StatisticsTools
Time & Date
Time Calculator
Date Calculator
Time Card Calculator
Business Days Calculator
Time Span Calculator
Time Duration Calculator
Lead Time Calculator
Add Time Calculator
Date Duration Calculator
Military Time Converter
See More Time & DateTools
CALCULATOR
ONLINE
Sign In
Sign Up
CALCULATOR
ONLINE
Languages:
EN ▾
| | | |
---
| EN | PL | ID |
| DE | JA | PT |
| ES | IT | RU |
| FI |
Pages
Home
About Us
Blog
Contact Us
Category
AI Tools
Health
Math
Everyday Life
Finance
Physics
Chemistry
Statistics
Construction
Pets
Time & Date
Conversion Calculator
Follow Us On:
×
Clear All
Proportion Calculator
Enter three known numbers and one unknown (x) to calculate the proportional relationship between two ratios instantly.
Note: One of the inputs must be alphabetic (For Example, x).
Please enter exactly one variable (x)
and three numbers
Proportion Calculator:
Use this proportion calculator to find missing values in proportional relationships. It uses two methods such as cross-multiplication and proportion formula to represent the equality between two ratios.
What Is A Proportion?
“When two ratios are set equal to each other, then it is called a proportion”
The symbol of proportion is ‘::’ and ‘=’.
Two variables are said to be directly proportional if one variable is equal to the product of the other variable and a constant. If the product of the two variables is a constant, then they are said inversely proportional ( x·y is a constant).
What Is The Proportion Formula?
The formula for proportion is stated as:
a:b::c:d=(\frac{a}{b}=\frac{c}{d})
How To Solve Proportions?
There are two main and easiest ways to solve proportions:
We have used both in the given example for better understanding:
Example:
The two ratios are 8:?::6:4, solve for the unknown variable x.
Solution:
Using Cross Multiplication:
Step #1: Construct a Proportion
(\frac{8}{x}=\frac{6}{4})
Step 2: Apply Cross Multiplication
(\ x\ \times\ 6=\ 8\ \times\ 4)
(\ 6x= 32)
(\ x=\frac{32}{6})
(\ x=\frac{16}{3}= 5.33…)
Using The Proportion Formula:
a:b::c:d=(\frac{a}{b}=\frac{c}{d})
(\frac{8}{x}=\frac{6}{4})
(\frac{8}{x}=\ 1.5)
(\ x =\frac{8}{1.5} = 5.33..)
(\ x = 5.33..)
In this example, we have found the proportion manually. But for more complex problems, you can use the above proportion calculator.
Other Languages: Kalkulator Proporcji, Kalkulator Proporsi, Proportions Rechner, 比例計算, Calculo De Proporção, Calculadora De Proporciones, Calcolo Proporzioni, Калькулятор Пропорций, Mittasuhteet Laskin.
Related
Fraction Calculator
Ratio Calculator
Fraction to Decimal Calculator
Fraction to Percent Calculator
Divisible Calculator
Simplify Radicals Calculator
Mixed Numbers to Improper Fractions Calculator
Add this calculator to your site.
Just copy a given code & paste it right now into your website HTML (source) for suitable page.
Preview:
Easter into Action, Save With Satisfaction
UPTO
50 %
OFF
Give Us Your Feedback
Share Result
Proportion Calculator
Facebook
Twitter
Linkedin
CALCULATOR
ONLINE
Get the ease of calculating anything from the source of calculator online
Links
Support
Email us at
© Copyrights 2025 by Calculator-Online.net |
2026 | https://par.nsf.gov/servlets/purl/10313443 | An Accurate Computational Model for the Hydration Extent of 1
Atmospherically Relevant Carbonyls on Aqueous Atmospheric 2
Particles 3
4
Matthew J. Elrod , Jane A. Sedlak , and He Ren 5
Department of Chemistry and Biochemistry, Oberlin College, Oberlin, Ohio, 44074 USA 6
Email: mjelrod@oberlin.ed u7
8
Abstract 9
The carbonyl hydration equilibria of several atmospherically relevant carbonyl compounds were 10
studied using nuclear magnetic resonance (NMR) spectroscopy and computationally investigated 11
using the MG2MS elect ronic structure method . The results were used to build an empirically 12
adjusted computational model that resulted in the calculation of free energies of hydration that 13
were accurate to within 1 kcal mol -1. The new model was use d to predict the hydration extent of 14
other potentially atmospherically relevant carbonyl compounds for which no experimental data 15
exists. Because the hydration extent of a carbonyl compound dramatically affects its effective 16
volatility and Henry’s law solu bility, the more accurate estimates for the extent of carbonyl 17
hydration predicted by th is new model will help improve our understanding of which carbonyl 18
compounds are major constituents of aqueous atmospheric particles. 19
Keywords: atmosphere, aerosol, carbonyl, hydration, equilibrium 20
21 Introduction 22
Secondary organic aerosol (SOA) 1 forms in the atmosphere via gas -particle partitioning . SOA 23
chemical composition can also be affected by in -particle chemical processing of condensed 24
components . T he particular chemical makeup of SOA likely plays a role in the effect that it has 25
on human respiratory and cardiovascular disease, 2, 3 visibility loss 4 and climate modification. 5 In 26
orde r to help predict the occurrence of different atmospheric constituents on atmospheric 27
particles such as SOA and clouds , attention has been focused on parametrizing these constituents 28
with respect to their volatility and Henry’s law solubility , which is rel evant to the ir interaction 29
with aqueous atmospheric particles .6 Although many carbonyl compounds are directly emitted 30
into the atmosphere by natural and anthropogenic sources, 7 the oxidizing nature of the 31
atmosphere is also capable of installing carbonyl functional groups into almost any organic 32
compound , including the dominant non -methane hydrocarbon, isoprene. 8 Given their ubiquitous 33
presence in the atmosphere , it is important to understand the physical and chemical properties of 34
the se carbonyl compounds present in the atmosphere under various atmospheric conditions, 35
including their interactions with aqueous atmospheric particles .36
Carbonyl compounds , like propi onaldehyde , are capable of undergoing nucleophilic addition of 37
water across the carbonyl double bond to form hydrated geminal diol species (Figure 1) .9
38
39
Figure 1: Hydration equilibrium for propionaldehyde , a known atmospheric constituent .40
41 This hydration process dramatically affects both the volatility and Henry’s law solubility of 42
propionaldehyde in aqueous solutions. The EPA’s chemical and physical property calculator, 43
EPISUITE, predicts that the hydrated form of propionaldehyde is almost 300 times less volatile 44
and 20 times more water soluble than the unhydrated form 10 owing to the strong effect of the two 45
hydrogen bonding groups in the hydrated form. This clearly illustrates that the ability of a 46
partic ular carbonyl compound to undergo hydration significantly increa ses the probability that it 47
will be incorporated into aqueous atmospheric particles. However, the propensity of a particular 48
compound to undergo hydration can vary enormously – while formaldehyde exists almost 49
entirely in the hydrated form under aqueous c onditions, 11 acetone remains almost entirely 50
unhydrated. 12 51
There have been several previous experimental and computational studies of the hydration of 52
potentially atmospherically relevant carbonyl compounds. 13 -20 However, these studies have 53
focused on parameterizing the properties of a subset of chemical species for a particular 54
atmospheric system, as opposed to developing qualitati ve general structure -property 55
relationships or quantitatively predictive models for carbonyl hydration. We conducted 56
temperature dependent measurements of the hydration equilibrium constant for several simple 57
atmospherically relevant carbonyl compounds in order to establish the van’t Hoff 58
thermodynamic parameters using nuclear magnetic resonance (NMR). We then use d the se 59
results , and other experimental measurements of the free energy of hydration , to empirically 60
calibrate MG2MS ab initio electronic structure calculations , and create a quantitative model that 61
accurately predicts free energies of hydration . We also use d MG2MS results to assess the 62
accuracy of group contribution thermodynamic methods for carbonyl hydration reactions. 63
Finally, t he calibrated computed hydration properties were used to establish structure -free energy 64 of hydration relationships and predict the hydration extent of a number of potentially 65
atmospherically relevant carbonyl compounds for which experimental data is lacking. 66
67
Methods and Materials 68
69
Chemicals . The following commercially available chemicals were used from MilliporeSigma 70
(acetaldehyde, 99.5%; propionaldehyde, 97%, pyruvic acid, 98%, methylglyoxal solution, 40% 71
in H 2O; acetone, 99.5%, hydroxyacetone, 90%; 2,3 -butanedione, 97%), TCI America 72
(dihydroxyacetone, 97% ) and Cambridge Isotope Laboratories, Inc. (deuterium oxide, 99. 5%) .73
The potassium salts of 1 -sulfatoacetone and 3 -sulfato -1-hydroxyacetone were each prepared and 74
characterized according to the procedure outlined by Hettiyadura et al. .21
75
Hydration Equilibrium Constant Measurements . All systems were investigated in bulk 76
solutions with total volumes of 750 μL (the amount required for NMR analysis) with either 10 77
μL or 50 μL (or 10 mg of the appropriate potassium salt of the sulfato compounds) of the 78
carbonyl compound added to an appropriate volume of D 2O. The systems were observed to 79
achieve equilibrium within the five minute preparation and NMR measurement timeframe. This 80
fast establishment of equilibrium is consistent with previous measurements of short hydration 81
lifetimes ( hydration < 30 s) for formaldehyde, 22 glycoaldehyde, 23 glyoxylic acid, 22 and pyruvic 82
acid. 24 NMR spectra were collected on a Bruker 400 MHz instrument using built -in pulse 83
sequences. 1H s pectra were calibrated to the HDO peak at 4.79 ppm . The relative concentrations 84
of the various species were determined by integration of one or more unique peaks in the 1H85
spectra. The overall precision of the relative concentration ratios was estimated to be better than 86
10 % (with much better precisions fo r systems with K H near unity) . van’t Hoff data was collected 87 by performing temperature dependent measurements of the concentration ratios. The built -in 88
Bruker temperature control apparatus was used to vary the temperatures from 298 K to 318 K. A 89
relativ ely narrow temperature range was used to prevent loss of volatile components and thermal 90
degradation of unstable compounds. 91
Computation s. The van’t Hoff parameters for the hydration equilibria of potentially 92
atmospherically relevant carbonyl compounds wer e calculated according to the following 93
procedure. Geometries (determined at the B3LYP/6 -31G(d,p) level) and energies of the relevant 94
species were calculated using a modified version of the G2MS compound method (MG2MS) 25 a95
variation on G2 theory. 26 The Polarizable Continuum Model (PCM) method 27 was used to 96
account for the effects of water solvation on the reactant and product properties. All calculations 97
were carried out with the Gaussian 09 computational suite. 28 Each stationary point was 98
confirmed as a potential energy minimum by inspection of the calculated frequencies. The 99
overall energy expression for the MG2MS scheme is defined in equation 1: 100
Eelec (0 K) = E CCSD(T)/6 -31G(d) + E MP2/6 -311+G(2df,2p) – EMP2/6 -31G (d) + HLC (1) 101
where HLC is an empirically -defined correction term with HLC = An α + Bn β where nα and nβ are 102
the number of α - and β -electrons, respectively, and the constants A and B are 6.06 and 0.19 mH, 103
respectively (all species investigated were closed shell; therefore n
= n
.). The enthalpy is 104
calculated from equation 2: 105
H (298 K) = E elec (0 K) + E zpe + Ethermal (2)106
where Ezpe is the zero point energy and Ethermal includes the corrections to necessary to adjust the 107
internal energy to 298 K and convert to enthalpy. The free energy is calculated from equation 3 :108 G (298 K) = H(298 K) – 298 K S(298 K) (3) 109
where S(298 K) is the entropy calculated at 298 K. 110
Our previous MG2MS results for atmospherically relevant systems (including radicals and ions) 111
indicate that the MG2MS calculated enthalpies of reaction are typically accurate to within 2 kcal 112
mol -1 for systems similar to those under study here. 29
113
The MG2MS free energy results were observed to be systematically in error for compounds for 114
which experimental values are available . To correct for this error, two methods were used to 115
empirically adjust the MG2MS results in order to achieve more accurate predictions for 116
compounds that have not been experimentally studied. The first method involved using the 117
experimental van’t Hoff parameters to determine a MG2MS c orrection factor for the enthalpy 118
and entropy of hydration individually. The second method involved determining a MG2MS 119
correction factor for the free energy of hydration at 298 K , which was possible b ecause many 120
more experimental 298 K free energy of hydration values are availabl e. The advantage of the 121
first method is that it should lead to more accurate predictions for the free energy of hydration at 122
temperatures other than 298 K, while the advantage of the second method is that it should be 123
better calibrated to experimental values and lead to more accurate predictions for the free energy 124
of hydration at 298 K. 125
126
Results and Discussion 127
NMR Assignments. As an example of the typical NMR spectra collecte d for the hydration of 128
carbonyl compound s, the 1H NMR spectrum and assignments for the species present in the 129 propionaldehyde hydration sy stem are given in Figure 2. Because the hydration of the carbonyl 130
carbon atom causes significant changes in the electron density experienced by the nearby 131
hydrogen atoms, large chemical shifts changes are associated with the hydration of carbonyls and 132
the identification and quantification of all species is straightforward. 133
134
Figure 2: 1H NMR spectrum for the propionaldehyde hydration system at 298 K. 135
Experimental Thermodynamics Parameters. The hydration equilibrium constants were 136
calculated directly from the NMR -determined concentration ratio of the hydrated compound to 137 the carbonyl compound. For example, for the propionaldehyde hydration system, K H is defined 138
as 139 3 2 2H3 2
[CH CH CH(OH) ] K [CH CH C( O)H]
= =
(4) 140
The standard free energies of hydration were directly determined from the hydration equilibrium 141
constants measured at T = 298 K :142 or HG RTln K = −
(5)143
The van’t Hoff parameters were determined via linear regression analysis from measurem ents of 144
the temperature dependence of the equilibrium constant :145 o or rH
H 1 Sln K R T R
− = +
(6)146
Figure 3 shows the van’t Hoff plot resulting from experimental measurements for 147
propionaldehyde. In this ideal case where K H is near unity, rHo and rSo were determined with 148
only 3% (1 ) error. Table 1 contains the van’t Hoff parameters (and one standard deviation 149
uncertainties) for all systems experimentally studied in the present work. The expected 150
uncertainty for a rGo value near zero using the previously stated 10% concentration 151
uncertainties is about 0.1 kcal mol -1, which is consistent with the lowest regression analysis -152
determined rGo uncertainties cited in Table 1. For the rGo values , the present results are in 153
very good agreement with most previous literature reports , while statistically significant 154
differences for some of the rHo and rSo values are observed. The good rGo agreement and 155
subpar rHo and rSo agreement suggests that some of the earlier studies might have been 156 impacted by inaccuracies in the temperature dependent measurements and/or analysis. For 157
example, the previous rHo and rSo parameters for acetaldehyde and acetone were determined 158
from measurements at only three different temperatures. 12
159
160
161
Figure 3: van’t Hoff plot for the propionaldehyde hydration system . The corresponding 162
thermodynamic values (and associated uncertainties) are given in Table 1. 163 system
experimental, this work experimental, literature MG2MS, this work
r rSo rGo r rSo rGo r rSo rGo
acetaldehyde -6.44 1 ± 0.093 -21.0 0 ± 0.30 -0.1 9 ± 0.13 -5.3 12 -17 12 -0.2 12 -6.0 -39 5.4
pro pionaldehyde -5.80 ± 0.19 -19.0 1 ± 0.62 -0.1 4 ± 0.26 -0.1 18 -6.0 -39 5.5
pyruvic acid -6.02 1 ± 0.038 -18.8 4 ± 0.12 -0.407 ± 0.052 -8.2 30 -27 30 -0.2 30 -6.5 -40 5.5
methylglyoxal -7.6 2 ± 0.62 -26 .2 ± 2.0 0.19 ± 0.87 0.2 31 -6.9 -41 5.4
acetone -2.6 4 ± 0.37 -21 .3 ± 1.2 3.7 1 ± 0.51 -3.1 12 -23 12 3.7 12 -0.4 -42 12.2
hyd roxyacetone -6.1 ± 0.34 -28 .2 ± 1.1 2. 27 ± 0.47 2.3 32 -5.1 -41 7.2
dihydroxyacetone -6.1 ± 0.70 -19 .3 ± 2.3 -0. 35 ± 0.98 -7.8 -42 4.7
2,3 -butanedione -5. 78 ± 0.84 -16.9 ± 2.8 -0.7 ± 1.2 -0.4 33 -4.7 -39 7.0
164
Table 1: van’t Hoff parameters (and one standard deviation uncertainties) for experimentally studied systems (units: rHo and rGo
165
(kcal mol -1) and rSo (cal mol -1 K-1)). 166
167
168 169
Computational Thermodynamic Model Performance . Table 1 also contains the MG2MS 170
computational thermodynamics results for the set of presently experimentally studied carbonyl 171
compounds, while Table S1 contains the MG2MS computational thermodynamics results for a 172
wider s et of potentially atmospherically relevant compounds. The results in Table 1 indicate 173
that , as expected, the MG2MS rHo values are within the expected 2 kcal mol -1 of the 174
experimental values, with no obvious systematic error. However , large systematic error is 175
observed for the rSo values . This is likely because t he MG2MS method leads to rSo values that 176
are about a factor of two too negative compared to the experi mental results , which then leads to 177
G values that are about five kcal mol -1 too positive at 298 K. This computational systematic 178
error has also been observed in previous ab initio electronic structure studies of the hydration of 179
glyoxal .13 , 19 Kua et al . identify problems with the treatment of translation and rotation, 180
differing solubilities of the re action components, and the problem of inseparability of the thermal 181
corrections to free energy and effect of the solvent as potential reasons for the systematic error .13
182
A method in which the entropy contribution to free energy is estimated as -0.5TS ( i.e., half of its 183
computed contribution) was previously shown to be effecti ve in compensating for the systematic 184
error. 13 While this method impro ved the agreement of the present computational MG2MS values 185
with experimental values, we found that, somewhat surprisingly, a single system -independent 186
correction factor was even more effective . In particular , we used two different models in which 187
the MG2 MS results are empirically calibrated to achieve the best agreement with available 188
experimental results , as discussed above in the Methods and Materials section . The first model 189
has separate correction factors for the rHo and rSo terms which are determined from the 190
experimental van’t Hoff results . For this first model, the rHo MG2MS results are systematically 191 too positive by 0.4 kcal mol -1, while the rSo MG2MS results are systematically too negative by 192
19 cal mol -1 K-1 when compared to the a vailable experimental results (Table 1). The MG2MS 193
results are adjusted by these constant values to achieve new, more accurate “van’t Hoff adjusted” 194
thermodynamic values (Table S1 ). The second model has a single correction factor for rGo is 195
determined f rom a larger set of experimental rGo values. For this second model , the rGo
196
MG2MS results are systematically too positive by 5.4 kcal mol -1 (Table S1 ). Therefore, the 197
MG2MS results are adjusted by this constant value to achieve new, more accurate “ rGexp
198
adjusted” rGo values (Table S1 ). When comparing the predictions from the “van’t Hoff 199
adjusted” rGo values to all available experimental rGo values, the average err or is 1.0 kcal mol -
200
1
, with a standard deviation of errors of 0.7 kcal mol -1. When comparing the predictions from the 201
“rGexp adjusted” rGo values to all available experimental rGo values, the average error is 0.7 202
kcal mol -1, with a standard deviation of errors of 0.8 kcal mol -1. Therefore the “ rGexp adjusted” 203
model leads to slightly more accurate rGo values, but there is a slightly larger fraction of outlier 204
values as well. However , both models lead to similar predicted values which are significantly 205
more accurate than the unadjusted MG2MS values , and more accurate than purely computational 206
models which used much more computational ly intensive high levels of theory. 34 Since 207
equilibrium constants are more useful for the purpose of assessing the potential atmospheric 208
relevance of carbonyl hydration process, Table 2 contains the experimental, van’t Hoff adjusted, 209
difference b etween van’t Hoff adjusted and experimental and rGexp adjusted, difference 210
between rGexp adjusted and experimental log 10 KH values for a number of C 1-C3 atmospherically 211
relevant carbonyls. Table 3 contains the same information for a number of C 4-C7212
atm ospherically relevant carbonyls. All of the values in Tables 2 and 3 were calculated from the 213
thermodynamic data reported in Table S1. 214 experimental van’t Hoff
adjusted
van’t Hoff
(adj -exp)
rGezp
adjusted
rGezp
(adj -exp)
C1 compounds
formaldehyde 3.4 11 3.4 0.0 2.9 -0.5
sulfato formaldehyde
ion
-4.7 -5.2
C2 compounds
acetaldehyde 0.1 a 0.5 0.4 0.0 -0.1
glycoaldehyde 1.0 23 1.6 0.6 1.1 0.1
2-sulfato acetaldehyde
ion
1.8 1.2
glyoxal 3.3 2.8
monohydrated glyoxal 3.0 2.5
glyoxylic acid 2.5 22 4.5 2.0 4.0 1.5
C3 compounds
propionaldehyde 0.0 a 0.4 0.3 -0.1 -0.2
acetone -2.7 a -4.5 -1.8 -5.0 -2.3
hydroxyacetone -1.7 a -0.8 0.9 -1.3 0.4
fluoroacetone -0.8 33 -0.7 0.1 -1.2 -0.4
chloroacetone -1.0 33 0.0 1.0 -0.5 0.5
sulfatoacetone ion -1.1 a -0.2 0.9 -0.7 0.4
nitratoacetone 0.1 -0.4
1,1 -dichloroacetone 0.4 33 1.0 0.6 0.5 0.1
dihydroxyacetone 0.3 a 1.1 0.8 0.5 0.2
1,3 -dichloroacetone 0.6 33 1.5 0.9 1.0 0.4
3-sulfato -1-
hydroxyacetone ion 0.0 a 0.5 0.5 0.0 0.0
lactaldehyde 1.4 35 1.7 0.3 1.2 -0.2
methylglyoxal (1) 2.8 2.3
methylglyoxal (2) 1.2 0.7
monohydrated (1)
methylglyoxal -0.2 31 0.6 0.8 0.0 0.2
pyruvic acid 0.1 a 0.6 0.5 0.1 0.0
215
Table 2 : log 10 KH values for C 1-C3 compounds . athis work .216
217
218 219
experimental van’t Hoff
adjusted
van’t Hoff
(adj -exp)
rGezp
adjusted
rGezp
(adj -exp)
C4 compounds
butanal -0.1 12 0.5 0.6 -0.1 0. 0
2-butanone -3.3 -3.8
2,3 -butanedione 0.3 33 -0.6 -0.9 -1.2 -1.5
1-sulfato -2,3 -
butanedione ion -0.2 -0.7
methyl vinyl ketone < -2.3 18 -2.1 -2.6
3,4 -dihydroxy -2-butan -
2-one (DHBO) -1.7 -2.3
methacrolein < -2.3 18 0.0 -0.5
2,3 -dihydroxy -2-
methylpropanal (DHMP)
0.0 -0.5
4-hydroxy -2-butanone -2.6 -3.1
4-nitrato -2-butanone -1.9 -2.5
4-sulfato -2-butanone
ion -2.7 -3.2
C5 compounds
2-pentanone -3.0 -3.6
3-pentanone -4.6 -5.1
2-hydroxy -2-methyl -4-
sulfato -3-butanone -0.1 -0.6
3-(hydroxymethyl) -2-
methyloxirane -2-
carbaldehyde (1 -
IEPOXO) 2.0 1.4
3-(hydroxymethyl) -3-
methyloxirane -2-
carbaldehyde (4 -
IEPOXO) 3.1 2.6
2,3,4 -trihydroxy -2-
methylbutanal (2 -MT -1-
aldehyde) 0.6 0.1
2,3,4 -trihydroxy -3-
methylbutanal (2 -MT -4-
aldehyde) -0.5 -1.1
C7 compound
benzaldehyde -1.9 -2.4
220
Table 3: log 10 KH values for C 4-C7 compounds. athis work. 221 Structure -Free Energy Relationships. The log 10 KH values (Tabl es 2 and 3 ) allow for the 222
opportunity to assess whether there are significant structure -free energy relationships that can be 223
used to qualitatively predict the hydration propensity of potentiall y atmospherically relevant 224
carbonyl compounds. The results clearly indicate that the aldehydes generally have much larger 225
KH values than do the ketones, a distinction that is true of most carbonyl compounds. 9 As most 226
clearly illustrated by acetone and its derivatives in Table 2 , the present results indicate that 227
neighboring electronegative functional groups such as other carbonyl, hydroxyl, and halogen 228
groups serve to increase the extent of hydration, most likely by drawing electron density away 229
from the carbonyl carbon atom whi ch makes for a more electropositive target for nucleophilic 230
attack by water. This effect is quantitatively significant because acetone has a K H value so 231
small (log 10 KH = -2.7) that it is difficult to experimentally measure, while several of its 232
electron egative functional group -derivatized forms have K H values greater than unity (log 10 KH >233
0) . Neighboring carbonyl groups have the largest effect on K H values, with glyoxal and 234
glyoxylic acid having much larger K H values than the base compound acetaldehyde , and 235
methylglyoxal and pyruvic acid having much larger K H values than the base compounds 236
propionaldehyde and acetone. With the exception of formaldehyde, neighboring sulfate and 237
nitrate functional groups have a stronger effect than hydroxyl groups in the ir raising of K H, thus 238
suggesting that carbonyl -containing organosulfates and organonitrates are more likely to be 239
significantly hydrated under atmospheric conditions than multifunctional hydroxy and 240
monofunctional carbonyl compounds .241
Comparison to Group Contribution Methods. In addition to ab initio electronic structure 242
methods, the Joback group contribution method 36 has been used to estimate the thermodynamic 243
values of carbonyl hydration reactions. 20 This method uses the molecular structure and 244 functional group identities of a variety of chemical species to parametrize the contribution of 245
each structural aspect to a particular experimentally measur ed thermodynamic value. This 246
approach has the benefit of a very simple and fast computational algorithm, but its accuracy is 247
constrained by the type of molecules used to “train” the group contribution parameters. For 248
example, this method was shown to per form extremely well , accuracies of better than 1 kcal mol -
249
1
, for the prediction of the gas phase free energies of formation of a number of atmospherically 250
relevant carbonyl compounds , some of which were themselves used in the Joback training set. 20
251
Because the present study focused on the aqueous phase thermodynamic parameters , there is not 252
a simple way to compare the present thermodynamic parameters to the gas phase ones predicted 253
by the Joback method . However, we have carried out separate calculations on the gas phase 254
hydration reaction of acetaldehyde in order to allow a direct comparison to the results obtained 255
by the Joback method. While ab initio methods are often characterized by significant system atic 256
errors, as discussed above for the calculation of rGo values for the carbonyl hydration reactions, 257
the use of isodesmic (bond -conserving) reactions allows for the cancellation of most systematic 258
error and can lead to highly accurate ab initio G valu es. For example, an isodesmic reaction 259
approach was used to calculate the free energy of formation of carbon dioxide, via the 260
disproportionation reaction of formaldehyde to form methane and carbon dioxide, with less than 261
1 kcal mol -1 error using a level of theory significantly lower than the present MG2MS 262
approach. 37 Since the standard gas phase enthalpy of formation of ethylene glycol is a well -263
established experimental property and its standard entropy of formation can be calculated from 264
similarly well -kno wn experimental values, 38 an isodesmic isomerization reaction between 265
ethylene glycol and the acetaldehyde hydration prod uct was used to establish a value for the gas 266
phase free energy of formation of the acetaldehyde hydration product, 267 o o or f 3 2 f 2 2
G G (CH CH(OH) ) G (CH (OH)CH (OH)) = − (7) 268
such that 269 o o of 3 2 r f 2 2
G (CH CH(OH) ) G G (CH (OH)CH (OH)) = +
(8) 270
The MG2MS value for rGo for the isodesmic gas phase ethylene glycol to acetaldehyde 271
hydration product isomerization reaction was found to be -11.4 kcal mol -1. Using the 272
experimental fGo value for gaseous ethylene glycol 38 of -73.1 kcal mol -1, the fGo value for the 273
gaseous acetaldehyde hydration product is determined to be -84.5 kcal mol -1, with an uncertainty 274
on the order of 1 kcal mol -1, as discussed above. Th e Joback method, using the Yaws 36
275
parameterization, predicts a value fGo value for the acetaldehyde hydration product of -74.1 276
kcal mol -1; this large error likely results from the lack of geminal diol species thermodynamic 277
data in the Joback training set. Therefore, while group contribut ion algorithms such as the 278
Joback method are considerably easier to apply than the present empirically adjusted MG2MS 279
method, those methods can be highly inaccurate , particularly when relatively unusual structural 280
components such as geminal diols are prese nt in the reaction system. Because the group 281
contribution term for geminal diols is therefore likely in error in the Joback method and would 282
lead to erroneous results for the hydration of any carbonyl , this method is not recommended for 283
the prediction of the hydration extent of atmospherically relevant carbonyls. 284
Atmospheric Implications. As outlined in the Introduction section, the ability to accurately 285
predict the hydration extent of atmospherically important carbonyl compounds on aqueous 286
atmospheric particles is a primary motivation of the present stud y. Here we have shown that it is 287
possible to generate accurate hydration extent predictions for a number of the most 288 atmospherically abundant carbonyl compounds (Tables 2 and 3) ,7 as well as a number of 289
important SOA components that are thought to derive from isoprene photochemistry and SOA 290
processing (Table 3). 39 -41 Atmospheric proce ssing of organic compounds tends to add 291
electronegative oxygen -containing functional groups . Our model suggests that these new 292
multifunctional carbonyl compounds are more likely to be hydrated under atmospheric 293
conditions than simple aldehydes and ketones. More specifically, our results support th ose of 294
previous studies which have shown that glyoxal 13 -15 and methylglyoxal 16 , 17 undergo significant 295
hydration under atmospheric conditions. Interestingly, experimental measurements illustrate that 296
the terminal carbonyl group of methylglyoxal undergoes hydration , followed by hydration of the 297
internal carbonyl group, but that a compound with a hydrated internal carbonyl group and an 298
unhydrated terminal carbonyl group was not observed .31 Th is result indicates that either our 299
prediction that KH for the internal carbonyl group of methylglyoxal is also greater than unity is 300
incorrect, or that kinetic effects prohibit the experimental observation of this species on the 301
experimental time scales .302
The predictions of this model suggest that some of the carbonyl organosulfates detected in SOA 303
in Atlanta, GA, 41 such as 1 -sulfato acetone ion and 2-sulfato acet aldehyde ion are present in their 304
hydrated form , while other organosulfates, such as 4 -sulfat o-2-butanone, will not be significantly 305
hydrated under atmospheric conditions . Our predictions also suggest that the aldehydic isoprene 306
oxidation intermediates, IEPOXO, 39 , 42 will undergo significant hydration on aqueous 307
atmospheric particles, which would lea d to greater partitioning to the particle phase , which in 308
turn would allow for more efficient processing by nucleophilic reactions involving IEPOXO’s 309
epoxide functional group. However , if the epoxide group of IEPOX is hydrolyzed first, the 310
hydration of th e carbonyl group is predicted to be less favorable, which indicates that epoxide 311 functional groups act to increase the hydration propensity of carbonyl groups even more than 312
hydroxyl groups. The high -NO x isoprene oxidation product nitratoacetone 43 is also pr edicted to 313
be significantly hydrated, which would also increase its partitioning to the particle phase and 314
potentially promote such processes as the hydrolysis of the nitrate group and/or substitution of 315
the nitrate group by sulfate. 44 , 45
316
This model has shown that many atmospher ically important carbonyl compounds are predicted 317
to undergo significant hydration on aqueous atmospheric particles which confers lower volatility 318
and higher Henry’s law solubility on the hydrated compound as compared to the unhydrated 319
compound s, which has important ramifications for gas -particle partitioning and subsequent 320
particle phase reactivity. 321
Supporting Information 322
The Supporting Information is available free of charge on the ACS Publications website at DOI: 323
thermodynamic parameters .324
Acknowledgement s325
This material is based upon work supported by the National Scie nce Foundation under Grant 326
No s. 1559319 and 1841019. 327
328 References and Notes 329
Kanakidou, M.; Seinfeld, J. H.; Pandis, S. N.; Barnes, I.; Dentener, F. J.; Facchini, M. C.; 330
Van Dingenen, R.; Ervens, B.; Nenes, A.; Nielsen, C. J.; Swietlicki, E.; Putaud, J. P.; Balkanski, 331
Y.; Fuzzi, S.; Horth, J.; Moortgat, G. K.; Winterhalter, R.; Myh re, C. E. L.; Tsigaridis, K.; 332
Vignati, E.; Stephanou, E. G.; Wilson, J., Organic aerosol and global climate modelling: a 333
review. Atmos. Chem. Phys. 2005, 5, (4), 1053 -1123. 334
Pope III, C. A.; Dockery, D. W., Health effects of fine particulate air pollutio n: lines that 335
connect. J. Air Waste Manage. 2006, 56 , 709 -742. 336
West, J. J.; Cohen, A.; Dentener, F.; Brunekreef, B.; Zhu, T.; Armstrong, B.; Bell, M. L.; 337
Brauer, M.; Carmichael, G.; Costa, D. L.; Dockery, D. W.; Kleeman, M.; Krzyzanowski, M.; 338
Kunzli, N .; Liousse, C.; Lung, S. C.; Martin, R. V.; Poschl, U.; Pope, C. A., 3rd; Roberts, J. M.; 339
Russell, A. G.; Wiedinmyer, C., "What we breathe impacts our health: improving understanding 340
of the link between air pollution and health". Environ. Sci. Technol. 201 6, 50 , (10), 4895 -904. 341
Seinfeld, J. H.; Pandis, S. N., Atmospheric chemistry and physics . 3rd ed.; John Wiley 342
and Sons, Inc.: New Jersey, 2016. 343
Hallquist, M.; Wenger, J. C.; Baltensperger, U.; Rudich, Y.; Simpson, D.; Claeys, M.; 344
Dommen, J.; Donahue, N. M.; George, C.; Goldstein, A. H.; Hamilton, J. F.; Herrmann, H.; 345
Hoffmann, T.; Iinuma, Y.; Jang, M.; Jenkin, M. E.; Jimenez, J. L.; Kiendler -Scharr, A.; 346
Maenhaut, W.; McFiggans, G.; Mentel, T. F.; Monod, A.; Prevot, A. S. H.; Seinfeld, J. H.; 347
Surratt, J. D.; Szmigielski, R.; Wildt, J., The formation, properties and impact of secondary 348
organic aerosol: current and emerging issues. Atmos. Chem. Phys. 2009, 9, 5155 -5236. 349
McNeill, V. F., Aqueous organic chemistry in the atmosphere: sources and chemical 350
processing of organic aerosols. Environ. Sci. Technol. 2015, 49 , (3), 1237 -44. 351
Li, M.; Li, Q.; Nantz, M. H.; Fu, X. A., Analysis of carbonyl compounds in ambient air 352
by a microreactor approach. ACS Omega 2018, 3, (6), 6764 -6769. 353
Wennberg, P. O.; Bate s, K. H.; Crounse, J. D.; Dodson, L. G.; McVay, R. C.; Mertens, L. 354
A.; Nguyen, T. B.; Praske, E.; Schwantes, R. H.; Smarte, M. D.; St Clair, J. M.; Teng, A. P.; 355
Zhang, X.; Seinfeld, J. H., Gas -phase reactions of isoprene and its major oxidation products. 356
Chem Rev 2018 .357
Carey, F.; Giuliano, R., Organic chemistry . McGraw Hill Education: New York, 2013. 358
U.S. Environmental Protection Agency EPISUITE 4.11. ht tps://www.epa.gov/tsca -359
screening -tools/epi -suitetm -estimation -program -interface 360
Betterton, E. A.; Hoffmann, M. R., Henry's law constants of some environmentally 361
important aldehydes. Environ. Sci. Technol. 1988, 22 , (12), 1415 -1418. 362
Wiberg, K. B.; Morgan, K. M.; Maltz, H., Thermochemistry of carbonyl reactions. 6. a 363
study of hydration equilibria. J. Am. Chem. Soc. 1994, 116 , (24), 11067 -11077. 364
Kua, J.; Hanley, S. W.; De Haan, D. O., Thermodynamics and kinetics of glyoxal dimer 365
formation: a comp utational study. J. Phys. Chem. A 2008, 112 , 66 -72. 366
Galloway, M. M.; Chhabra, P. S.; Chan, A. W. H.; Surratt, J. D.; Flagan, R. C.; Seinfeld, 367
J. H.; Keutsch, F. N., Glyoxal update on ammonium sulphate seed aerosol: reaction products 368
and reversibility of uptake under dark and irradiated conditions. Atmos. Chem. Phys. 2009, 9,369
3331 -3345. 370
Liggio, J.; Li, S. -M.; McLaren, R., Heterogeneous reactions of glyoxal on particulate 371
matter: identification of acetals and sulfate esters. Environ. Sci. Technol. 2005, 39 , (6), 1532 -372
373 16. Altieri, K. E.; Seitzinger, S. P.; Carlton, A. G.; Turpin, B. J.; Klein, G. C.; Marshall, A. 374
G., Oligomers formed through in -cloud methylglyoxal reactions: Chemical composition, 375
properties, and mechanisms investigated by ultra -high resolution FT -ICR mass spectrometry. 376
Atmos. Environ. 2008, 42 , (7), 1476 -1490. 377
Krizner, H. E.; De Haan, D. O.; Kua, J., Thermodynamics and kinetics of methylglyoxal 378
dimer formation: a computational study. J. Phys. Chem. A 2009, 113 , (25), 6994 -7001. 379
Zhao, R.; Lee, A. K. Y.; Soong, R.; Simpson, A. J.; Abbatt, J. P. D., Formation of 380
aqueous -phase α -hydroxyhydroperoxides (α -HHP): potential atmospheric impacts. Atmos. Chem. 381
Phys. 2013, 13 , (12), 5857 -5872. 382
Tong, C.; Blanco, M.; Goddard, W. A.; Seinfel d, J. H., Secondary organic aerosol 383
formation by heterogeneous reactions of aldehydes and ketones: a quantum mechanical study. 384
Environ. Sci. Technol. 2006, 40 , (7), 2333 -2338. 385
Barsanti, K. C.; Pankow, J. F., Thermodynamics of the formation of atmosphe ric organic 386
particulate matter by accretion reactions —Part 1: aldehydes and ketone. Atmos. Environ. 2004, 387
38 , (26), 4371 -4382. 388
Hettiyadura, A. P. S.; Stone, E. A.; Kundu, S.; Baker, Z.; Geddes, E.; Richards, K.; 389
Humphry, T., Determination of atmospheri c organosulfates using HILIC chromatography with 390
MS detection. Atmospheric Measurement Techniques 2015, 8, (6), 2347 -2358. 391
Sorensen, P. E.; Bruhn, K.; Lindelov, F., Kinetics and equilibria for the reversible 392
hydration of the aldehyde group in glyoxylic acid. Acta Chem. Scand. 1974, 28a , 162 -168. 393
Sorensen, P. E., The reversible addition of water to glycolaldehyde in aqueous solution. 394
Acta Chem. Scand. 1972, 26 , 3357 -3365. 395
Pocker, Y.; Meany, J. E., Reversible hydration of pyruvic acid. II. Metal i on and enzymic 396
catalysis. The Journal of Physical Chemistry 1970, 74 , (7), 1486 -1492. 397
Froese, R. D. J.; Humbel, S.; Svensson, M.; Morokuma, K., IMOMO(G2MS): A new 398
high -level G2 -like method for large molecules and its applications to Diels−Alder reactio ns. J. 399
Phys. Chem. A 1997, 101 , 227 -233. 400
Curtiss, L. A.; Raghavachari, K.; Redfern, P. C.; Pople, J. A., Assessment of Gaussian -2401
and density functional theories for the computation of enthalpies of formation. J. Chem. Phys. 402
1997, 106 , 1063 -1079. 403
Tomasi, J.; Mennucci, B.; Cammi, R., Quantum mechanical continuum solvation models. 404
Chem. Rev. 2005, 105 , 2999 -3093. 405
Frisch, M. J. T., G. W.; Schlegel, H. B.; Scuseria, G. E.; Robb, M. A.; Cheeseman, J. R.; 406
Montgomery, Jr., J. A.; Vreven, T.; Kudin, K. N.; Burant, J. C.; Millam, J. M.; Iyengar, S. S.; 407
Tomasi, J.; Barone, V.; Mennucci, B.; Cossi, M.; Scalmani, G.; Rega, N.; Petersson, G. A.; 408
Nakatsuji, H.; Hada, M.; Ehara, M.; Toyota, K.; Fukuda, R.; Hasegawa, J.; Ishida, M.; Nakajima, 409
T.; Honda, Y.; Kita o, O.; Nakai, H.; Klene, M.; Li, X.; Knox, J. E.; Hratchian, H. P.; Cross, J. B.; 410
Bakken, V.; Adamo, C.; Jaramillo, J.; Gomperts, R.; Stratmann, R. E.; Yazyev, O.; Austin, A. J.; 411
Cammi, R.; Pomelli, C.; Ochterski, J. W.; Ayala, P. Y.; Morokuma, K.; Voth, G . A.; Salvador, 412
P.; Dannenberg, J. J.; Zakrzewski, V. G.; Dapprich, S.; Daniels, A. D.; Strain, M. C.; Farkas, O.; 413
Malick, D. K.; Rabuck, A. D.; Raghavachari, K.; Foresman, J. B.; Ortiz, J. V.; Cui, Q.; Baboul, 414
A. G.; Clifford, S.; Cioslowski, J.; Stefanov , B. B.; Liu, G.; Liashenko, A.; Piskorz, P.; 415
Komaromi, I.; Martin, R. L.; Fox, D. J.; Keith, T.; Al -Laham, M. A.; Peng, C. Y.; Nanayakkara, 416
A.; Challacombe, M.; Gill, P. M. W.; Johnson, B.; Chen, W.; Wong, M. W.; Gonzalez, C.; and 417
Pople, J. A.;, Gaussian 03 . Gaussian, Inc.: Wallingford, CT, 2003. 418 29. Cappa, C. D.; Elrod, M. J., A computational investigation of the electron affinity of CO 3419
and the thermodynamic feasibility of CO 3-(H 2O) n + ROOH reactions. Phys. Chem. Chem. Phys. 420
2001, 3, 2986 -2994. 421
Pocke r, Y.; Meany, J. E.; Nist, B. J.; Zadorojny, C., Reversible hydration of pyruvic acid. 422
I. Equilibrium studies. The Journal of Physical Chemistry 1969, 73 , (9), 2879 -2882. 423
Nemet, I.; Vikić -Topić, D.; Varga -Defterdarović, L., Spectroscopic studies of 424
met hylglyoxal in water and dimethylsulfoxide. Bioorg. Chem. 2004, 32 , (6), 560 -570. 425
Glushonok, G. K.; Glushonok, T. G.; Maslovskaya, L. A.; Shadyro, O. I., A 1H and 13C 426
NMR and UV study of the state of hydroxyacetone in aqueous solutions. Russ. J. Gen. Ch em. 427
2003, 73 , (7), 1027 -1031. 428
Buschmann, H. -J.; Füldner, H. -H.; Knoche, W., The reversible hydration of carbonyl 429
compounds in aqueous solution. part I, the keto/gem -diol equilibrium. Ber. Bunsenges. Phys. 430
Chem. 1980, 84 , (1), 41 -44. 431
Gómez -Bombarelli, R.; González -Pérez, M.; Pérez -Prior, M. T.; Calle, E.; Casado, J., 432
Computational calculation of equilibrium constants: addition to carbonyl compounds. J. Phys. 433
Chem. A 2009, 113 , (42), 11423 -11428. 434
Nielsen, H.; Sorensen, P. E., Kineti cs and equilibria for the solvolysis of lactaldehyde in 435
aqueous solution. Acta Chem. Scand. 1977, 31a , 739 -742. 436
Reid, R. C. P., J. M.; Poling, B. E., Properties of Gases and Liquids . 4th ed.; McGraw -437
Hill: New York, 1987. 438
Foresman, J. B.; Frisch, A. , Exploring chemistry with electronic structure methods .439
Gaussian Inc.: Pittsburgh, 1996. 440
NIST Chemistry Webbook. (accessed 1/11/2021 ).441
Bates, K. H.; Nguyen, T. B.; Teng, A. P.; Crounse, J. D.; Kjaergaard, H. G.; Stoltz, B. 442
M.; Seinfeld, J. H.; Wennberg, P. O., Production and fate of C 4 dihydroxycarbonyl compounds 443
from isoprene oxidation. J. Phys. Chem. A 2016, 120 , (1), 106 -17. 444
Hettiyadura, A. P. S.; Jayarath ne, T.; Baumann, K.; Goldstein, A. H.; de Gouw, J. A.; 445
Koss, A.; Keutsch, F. N.; Skog, K.; Stone, E. A., Qualitative and quantitative analysis of 446
atmospheric organosulfates in Centreville, Alabama. Atmos. Chem. Phys. 2017, 17 , (2), 1343 -447
448
Hettiyadu ra, A. P. S.; Al -Naiema, I. M.; Hughes, D. D.; Fang, T.; Stone, E. A., 449
Organosulfates in Atlanta, Georgia: anthropogenic influences on biogenic secondary organic 450
aerosol formation. Atmos. Chem. Phys. 2019, 19 , (5), 3191 -3206. 451
Jacobs, M. I.; Darer, A. I .; Elrod, M. J., Rate constants and products of the OH reaction 452
with isoprene -derived epoxides. Environ. Sci. Technol. 2013, 47 , (22), 12868 -12876. 453
Fisher, J. A.; Jacob, D. J.; Travis, K. R.; Kim, P. S.; Marais, E. A.; Chan Miller, C.; Yu, 454
K.; Zhu, L.; Yantosca, R. M.; Sulprizio, M. P.; Mao, J.; Wennberg, P. O.; Crounse, J. D.; Teng, 455
A. P.; Nguyen, T. B.; St. Clair, J. M.; Cohen, R. C.; Romer, P.; Nault, B. A.; Wooldridge, P. J.; 456
Jimenez, J. L.; Campuzano -Jost, P.; Day, D. A.; Hu, W.; Shepson, P. B.; Xi ong, F.; Blake, D. R.; 457
Goldstein, A. H.; Misztal, P. K.; Hanisco, T. F.; Wolfe, G. M.; Ryerson, T. B.; Wisthaler, A.; 458
Mikoviny, T., Organic nitrate chemistry and its implications for nitrogen budgets in an isoprene -459
and monoterpene -rich atmosphere: constra ints from aircraft (SEAC 4RS) and ground -based 460
(SOAS) observations in the Southeast US. Atmos. Chem. Phys. 2016, 16 , (9), 5969 -5991. 461
Darer, A. I.; Cole -Filipiak, N. C.; O'Connor, A. E.; Elrod, M. J., Formation and stability 462
of atmospherically relevant i soprene -derived organosulfates and organonitrates. Environ. Sci. 463
Technol. 2011, 45 , 1895 -1902. 464 45. Hu, K. S.; Darer, A. I.; Elrod, M. J., Thermodynamics and kinetics of the hydrolysis of 465
atmospherically relevant organonitrates and organosulfates. Atmos. Chem. Phys. 2011, 11 , (16), 466
8307 -8320. 467
468
469 TOC Graphic 470
471
472 |
2027 | File:Circle Properties.png - Wikipedia
[x]
Olupapupa olusooka
Okulondoba empapula
Kumpi ne
Yingiramu
seetingi ez'enjawulo
Donate Now If Wikipedia is useful to you, please give today.
Okutangaaza ku Wikipedia
Okutangaaza ku kkomo ery'obuvunaaniro bwaffe obw'omu mateeka
Noonya
File:Circle Properties.png
Olulimi
Goberera olupapula luno
View on Wikimedia Commons
Add local description
Fayiro
Ebyafaayo ebya fayiro eno
Emiko ekifaananyi kino mwe kikozeseddwa
Global file usage
Ebikwata ku kifaananyi
Tewali kisingako wano.
Circle_Properties.png(pikseli 300 ku 300 , bunene bwa fayiro: KB 39, kika kya MIME: image/png)
Fayiro eno eva ku Wikimedia Commons era eyinza okukozesebwa pulojekiti endala. Ennyonnyola ku lupapula lwayo [ file description page] eyo eragiddwa wansi.
Mu bufunze
Ennyinyonnyola Circle Properties.pngEnglish: This diagram consists of the components of a circle (Circumference, Diameter, Radius), of which, the number pi may be derived as the ratio of the circumference to the diameter. pi = C / D = 3.1415926535...
Ennaku z'omwezi 21 Gwakkuminogumu(Museenene) 2022
Ensibuko Omulimu gwo kennyini
OmuwandiisiZacguymarino
Licensing
I, the copyright holder of this work, hereby publish it under the following license:
This file is licensed under the Creative CommonsAttribution-Share Alike 4.0 International license.
You are free:
to share – to copy, distribute and transmit the work
to remix – to adapt the work
Mu bukwakkulizo buno wammanga:
attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.
CC BY-SA 4.0 Creative Commons Attribution-Share Alike 4.0 true true
Captions
Luganda
Add a one-line explanation of what this file represents
Lungereza
Simple diagram of the components of a circle
Items portrayed in this file
depictsLungereza
circleLungereza
obwetoloovu
π
diameterLungereza
radiusLungereza
creatorLungereza
some value
author name stringLungereza: Zacguymarino
Wikimedia usernameLungereza: Zacguymarino
URL:
copyright statusLungereza
copyrightedLungereza
copyright licenseLungereza
Creative Commons Attribution-ShareAlike 4.0 InternationalLungereza
source of fileLungereza
original creation by uploaderLungereza
inceptionLungereza
21 Gwakkuminogumu(Museenene) 2022
media typeLungereza
image/png
checksumLungereza
9f2d65a04ebd2057d9e5022c9f0f11ee2b523af5
determination method or standardLungereza: SHA-1
data sizeLungereza
40,329 byte
heightLungereza
300 pixel
widthLungereza
300 pixel
Ebyafaayo ebya fayiro eno
Bw'onyiga ku nnaku n'essaawa, ojjakulaba fayiro nga bwe yali efaanana ku kiseera ekyo.
| | Ennaku n'obudde | Kulingiza | Obuwanvu n'obugazi bwakyo | Eyakiteekawo | Okulw'ogerako |
--- --- --- |
| oluwandika oluliwo kakano | 17:10, 21 Gwakkuminogumu(Museenene) 2022 | | 300 × 300 (KB 39) | Zacguymarino | Uploaded own work with UploadWizard |
Emiko ekifaananyi kino mwe kikozeseddwa
Empapula 1 ezikuggusa ku fayiro eno ze:
Entoloovu = Enkula ennetoloovu
Global file usage
Wiki endala zino wammanga zikozesa fayiro eno:
Enkozesa ku fr.wiktionary.org
Wiktionnaire:Entrée étrangère du jour
gaandíñja
Modèle:Entrée étrangère du jour/2025/04/02
Enkozesa ku ms.wikipedia.org
Pi
Enkozesa ku yo.wikipedia.org
Roboto
Ebikwata ku kifaananyi
Ekyakozesebwa okutegeka fayiro eno esobole okugenda ku kompyuta, okugeza kamera oba sikaana, kyagiwandikamu ebigikwatako. Ebyawandikibwa ebyo biyinz'okuba nga tebikyamalayo fayiro ebigikwatako bw'ebanga okuva lweyasooka kutegebwa yakolebwako n'ate.
| Unique ID of original document | xmp.did:5a4fa38e-476b-4e00-8406-68784ab6525e |
| Software used | GIMP 2.10 |
| Horizontal resolution | 28.35 dpc |
| Vertical resolution | 28.35 dpc |
| File change date and time | 14:52, 19 Gwamusanvu(Kasambula) 2022 |
Bino bigyidwa ku "
Languages
This page is not available in other languages.
Enkola yaffe ku kukuuma ebikufako
Okutangaaza ku Wikipedia
Okutangaaza ku kkomo ery'obuvunaaniro bwaffe obw'omu mateeka
Enneeyisa
Abakola software wa Wiki
Ebibalo
Ekiwandiiko kya Cookie
Ebigobererwa
Ekibanja eky'oku mugguukiriro | |
2028 | https://stackoverflow.com/questions/41956541/intersection-point-between-circle-and-line-polar-coordinates | matlab - Intersection point between circle and line (Polar coordinates) - Stack Overflow
Join Stack Overflow
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
Sign up with GitHub
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Overflow
1. About
2. Products
3. For Teams
Stack Overflow for Teams Where developers & technologists share private knowledge with coworkers
Advertising Reach devs & technologists worldwide about your product, service or employer brand
Knowledge Solutions Data licensing offering for businesses to build and improve AI tools and models
Labs The future of collective knowledge sharing
About the companyVisit the blog
Loading…
current community
Stack Overflow helpchat
Meta Stack Overflow
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Let's set up your homepage Select a few topics you're interested in:
python javascript c#reactjs java android html flutter c++node.js typescript css r php angular next.js spring-boot machine-learning sql excel ios azure docker
Or search from our full list:
javascript
python
java
c#
php
android
html
jquery
c++
css
ios
sql
mysql
r
reactjs
node.js
arrays
c
asp.net
json
python-3.x
.net
ruby-on-rails
sql-server
swift
django
angular
objective-c
excel
pandas
angularjs
regex
typescript
ruby
linux
ajax
iphone
vba
xml
laravel
spring
asp.net-mvc
database
wordpress
string
flutter
postgresql
mongodb
wpf
windows
xcode
amazon-web-services
bash
git
oracle-database
spring-boot
dataframe
azure
firebase
list
multithreading
docker
vb.net
react-native
eclipse
algorithm
powershell
macos
visual-studio
numpy
image
forms
scala
function
vue.js
performance
twitter-bootstrap
selenium
winforms
kotlin
loops
express
dart
hibernate
sqlite
matlab
python-2.7
shell
rest
apache
entity-framework
android-studio
csv
maven
linq
qt
dictionary
unit-testing
asp.net-core
facebook
apache-spark
tensorflow
file
swing
class
unity-game-engine
sorting
date
authentication
go
symfony
t-sql
opencv
matplotlib
.htaccess
google-chrome
for-loop
datetime
codeigniter
perl
http
validation
sockets
google-maps
object
uitableview
xaml
oop
visual-studio-code
if-statement
cordova
ubuntu
web-services
email
android-layout
github
spring-mvc
elasticsearch
kubernetes
selenium-webdriver
ms-access
ggplot2
user-interface
parsing
pointers
c++11
google-sheets
security
machine-learning
google-apps-script
ruby-on-rails-3
templates
flask
nginx
variables
exception
sql-server-2008
gradle
debugging
tkinter
delphi
listview
jpa
asynchronous
web-scraping
haskell
pdf
jsp
ssl
amazon-s3
google-cloud-platform
jenkins
testing
xamarin
wcf
batch-file
generics
npm
ionic-framework
network-programming
unix
recursion
google-app-engine
mongoose
visual-studio-2010
.net-core
android-fragments
assembly
animation
math
svg
session
intellij-idea
hadoop
rust
next.js
curl
join
winapi
django-models
laravel-5
url
heroku
http-redirect
tomcat
google-cloud-firestore
inheritance
webpack
image-processing
gcc
keras
swiftui
asp.net-mvc-4
logging
dom
matrix
pyspark
actionscript-3
button
post
optimization
firebase-realtime-database
web
jquery-ui
cocoa
xpath
iis
d3.js
javafx
firefox
xslt
internet-explorer
caching
select
asp.net-mvc-3
opengl
events
asp.net-web-api
plot
dplyr
encryption
magento
stored-procedures
search
amazon-ec2
ruby-on-rails-4
memory
canvas
audio
multidimensional-array
random
jsf
vector
redux
cookies
input
facebook-graph-api
flash
indexing
xamarin.forms
arraylist
ipad
cocoa-touch
data-structures
video
azure-devops
model-view-controller
apache-kafka
serialization
jdbc
woocommerce
razor
routes
awk
servlets
mod-rewrite
excel-formula
beautifulsoup
filter
docker-compose
iframe
aws-lambda
design-patterns
text
visual-c++
django-rest-framework
cakephp
mobile
android-intent
struct
react-hooks
methods
groovy
mvvm
ssh
lambda
checkbox
time
ecmascript-6
grails
google-chrome-extension
installation
cmake
sharepoint
shiny
spring-security
jakarta-ee
plsql
android-recyclerview
core-data
types
sed
meteor
android-activity
activerecord
bootstrap-4
websocket
graph
replace
scikit-learn
group-by
vim
file-upload
junit
boost
memory-management
sass
import
async-await
deep-learning
error-handling
eloquent
dynamic
soap
dependency-injection
silverlight
layout
apache-spark-sql
charts
deployment
browser
gridview
svn
while-loop
google-bigquery
vuejs2
dll
highcharts
ffmpeg
view
foreach
makefile
plugins
redis
c#-4.0
reporting-services
jupyter-notebook
unicode
merge
reflection
https
server
google-maps-api-3
twitter
oauth-2.0
extjs
terminal
axios
pip
split
cmd
pytorch
encoding
django-views
collections
database-design
hash
netbeans
automation
data-binding
ember.js
build
tcp
pdo
sqlalchemy
apache-flex
mysqli
entity-framework-core
concurrency
command-line
spring-data-jpa
printing
react-redux
java-8
lua
html-table
ansible
jestjs
neo4j
service
parameters
enums
material-ui
flexbox
module
promise
visual-studio-2012
outlook
firebase-authentication
web-applications
webview
uwp
jquery-mobile
utf-8
datatable
python-requests
parallel-processing
colors
drop-down-menu
scipy
scroll
tfs
hive
count
syntax
ms-word
twitter-bootstrap-3
ssis
fonts
rxjs
constructor
google-analytics
file-io
three.js
paypal
powerbi
graphql
cassandra
discord
graphics
compiler-errors
gwt
socket.io
react-router
solr
backbone.js
memory-leaks
url-rewriting
datatables
nlp
oauth
terraform
datagridview
drupal
oracle11g
zend-framework
knockout.js
triggers
neural-network
interface
django-forms
angular-material
casting
jmeter
google-api
linked-list
path
timer
django-templates
arduino
proxy
orm
directory
windows-phone-7
parse-platform
visual-studio-2015
cron
conditional-statements
push-notification
functional-programming
primefaces
pagination
model
jar
xamarin.android
hyperlink
uiview
visual-studio-2013
vbscript
google-cloud-functions
gitlab
azure-active-directory
jwt
download
swift3
sql-server-2005
configuration
process
rspec
pygame
properties
combobox
callback
windows-phone-8
linux-kernel
safari
scrapy
permissions
emacs
scripting
raspberry-pi
clojure
x86
scope
io
expo
azure-functions
compilation
responsive-design
mongodb-query
nhibernate
angularjs-directive
request
bluetooth
reference
binding
dns
architecture
3d
playframework
pyqt
version-control
discord.js
doctrine-orm
package
f#
rubygems
get
sql-server-2012
autocomplete
tree
openssl
datepicker
kendo-ui
jackson
yii
controller
grep
nested
xamarin.ios
static
null
statistics
transactions
active-directory
datagrid
dockerfile
uiviewcontroller
webforms
discord.py
phpmyadmin
sas
computer-vision
notifications
duplicates
mocking
youtube
pycharm
nullpointerexception
yaml
menu
blazor
sum
plotly
bitmap
asp.net-mvc-5
visual-studio-2008
yii2
electron
floating-point
css-selectors
stl
jsf-2
android-listview
time-series
cryptography
ant
hashmap
character-encoding
stream
msbuild
asp.net-core-mvc
sdk
google-drive-api
jboss
selenium-chromedriver
joomla
devise
cors
navigation
anaconda
cuda
background
frontend
binary
multiprocessing
pyqt5
camera
iterator
linq-to-sql
mariadb
onclick
android-jetpack-compose
ios7
microsoft-graph-api
rabbitmq
android-asynctask
tabs
laravel-4
environment-variables
amazon-dynamodb
insert
uicollectionview
linker
xsd
coldfusion
console
continuous-integration
upload
textview
ftp
opengl-es
macros
operating-system
mockito
localization
formatting
xml-parsing
vuejs3
json.net
type-conversion
data.table
kivy
timestamp
integer
calendar
segmentation-fault
android-ndk
prolog
drag-and-drop
char
crash
jasmine
dependencies
automated-tests
geometry
azure-pipelines
android-gradle-plugin
itext
fortran
sprite-kit
header
mfc
firebase-cloud-messaging
attributes
nosql
format
nuxt.js
odoo
db2
jquery-plugins
event-handling
jenkins-pipeline
nestjs
leaflet
julia
annotations
flutter-layout
keyboard
postman
textbox
arm
visual-studio-2017
gulp
stripe-payments
libgdx
synchronization
timezone
uikit
azure-web-app-service
dom-events
xampp
wso2
crystal-reports
namespaces
swagger
android-emulator
aggregation-framework
uiscrollview
jvm
google-sheets-formula
sequelize.js
com
chart.js
snowflake-cloud-data-platform
subprocess
geolocation
webdriver
html5-canvas
centos
garbage-collection
dialog
sql-update
widget
numbers
concatenation
qml
tuples
set
java-stream
smtp
mapreduce
ionic2
windows-10
rotation
android-edittext
modal-dialog
spring-data
nuget
doctrine
radio-button
http-headers
grid
sonarqube
lucene
xmlhttprequest
listbox
switch-statement
initialization
internationalization
components
apache-camel
boolean
google-play
serial-port
gdb
ios5
ldap
youtube-api
return
eclipse-plugin
pivot
latex
frameworks
tags
containers
github-actions
c++17
subquery
dataset
asp-classic
foreign-keys
label
embedded
uinavigationcontroller
copy
delegates
struts2
google-cloud-storage
migration
protractor
base64
queue
find
uibutton
sql-server-2008-r2
arguments
composer-php
append
jaxb
zip
stack
tailwind-css
cucumber
autolayout
ide
entity-framework-6
iteration
popup
r-markdown
windows-7
airflow
vb6
g++
ssl-certificate
hover
clang
jqgrid
range
gmail
Next You’ll be prompted to create an account to view your personalized homepage.
Home
Questions
AI Assist Labs
Tags
Challenges
Chat
Articles
Users
Jobs
Companies
Collectives
Communities for your favorite technologies. Explore all Collectives
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Collectives™ on Stack Overflow
Find centralized, trusted content and collaborate around the technologies you use most.
Learn more about Collectives
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
Intersection point between circle and line (Polar coordinates)
Ask Question
Asked 8 years, 8 months ago
Modified7 years, 4 months ago
Viewed 2k times
This question shows research effort; it is useful and clear
0
Save this question.
Show activity on this post.
I'm wondering if there is a way of finding the intersection point between a line and a circle written in polar coordinates.
matlab
% Line
x_line = 10 + r cos(th);
y_line = 10 + r sin(th);
%Circle
circle_x = circle_r cos(alpha);
circle_y = circle_r sin(alpha);
So far I've tried using the intersect(y_line, circle_y) function without any success. I'm relatively new to MATLAB so bear with me.
matlab
line
geometry
intersection
Share
Share a link to this question
Copy linkCC BY-SA 4.0
Improve this question
Follow
Follow this question to receive notifications
edited May 29, 2018 at 18:47
Jonathan Hall
80.3k 19 19 gold badges 161 161 silver badges 206 206 bronze badges
asked Jan 31, 2017 at 11:34
bullbobullbo
131 1 1 silver badge 10 10 bronze badges
Add a comment|
2 Answers 2
Sorted by: Reset to default
This answer is useful
1
Save this answer.
Show activity on this post.
I have generalised the below so that other values than a=10 can be used...
```matlab
a = 10; % constant line offset
th = 0; % constant angle of line
% rl = ?? - variable to find
% Coordinates of line:
% [xl, yl] = [ a + rl cos(th), a + rl sin(th) ];
rc = 1; % constant radius of circle
% alpha = ?? - variable to find
% Coordinates of circle:
% [xc, yc] = [ rc cos(alpha), rc sin(alpha) ];
```
We want the intersection, so xl = xc, yl = yc
matlab
% a + rl cos(th) = rc cos(alpha)
% a + rl sin(th) = rc sin(alpha)
Square both sides of both equations and sum them. Simplifying sin(a)^2 + cos(a)^2 = 1. Expanding brackets and simplifying further gives
matlab
% rl^2 + 2 a rl (cos(th) + sin(th)) + 2 a - rc^2 = 0
Now you can use the quadratic formula to get the value of rl.
Test discriminant:
```matlab
dsc = (2 a (cos(th) + sin(th)) )^2 - 4 (2 a - rc^2);
rl = [];
if dsc < 0
% no intersection
elseif dsc == 0
% one intersection at
rl = - cos(th) - sin(th);
else
% two intersection points
rl = -cos(th) - sin(th) + [ sqrt(dsc)/2, -sqrt(dsc)/2];
end
% Get alpha from an earlier equation
alpha = acos( ( a + rl . cos(th) ) ./ rc );
```
Now you have 0, 1 or 2 points of intersection of the line with the circle, from certain known and unknown values about each line. Essentially this is just simultaneous equations, see the start of this article for a basis of the maths
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Improve this answer
Follow
Follow this answer to receive notifications
edited Jan 31, 2017 at 12:26
answered Jan 31, 2017 at 12:17
WolfieWolfie
30.7k 7 7 gold badges 30 30 silver badges 60 60 bronze badges
Comments
Add a comment
This answer is useful
0
Save this answer.
Show activity on this post.
Do you need to do it numerically? This problem would have an easy analytical solution: The point (10 + rcos(th),10 + rsin(th)) is on a circle with radius R iff
(10+rcos(th))^2 + (10+rsin(th))^2 == R^2
<=>200+r^2 + 2r(cos(th)+sin(th)) == R^2
<=>r^2 + 2rsqrt(2)sin(th+pi/4) + 200 - R^2 = 0
which is a quadratic equation in r. If the discriminant is positive, there are two solutions (corresponding to two intersection points), otherwise, there are none.
If you work out the math, the condition for intersection is 100(sin(2th)-1)+circle_r^2 >= 0 and the roots are -10sqrt(2)sin(th+pi/4)[1,1] + sqrt(100(sin(2th)-1)+circle_r^2)[1,-1].
Here is a Matlab plot as an example for th = pi/3 and circle_r = 15. The magenta markers are calculated in closed-form using the equation shown above.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Improve this answer
Follow
Follow this answer to receive notifications
answered Jan 31, 2017 at 12:18
FlorianFlorian
1,844 2 2 gold badges 12 12 silver badges 19 19 bronze badges
1 Comment
Add a comment
Wolfie
WolfieOver a year ago
Beat me to the maths!
2017-01-31T12:23:24.987Z+00:00
0
Reply
Copy link
Your Answer
Thanks for contributing an answer to Stack Overflow!
Please be sure to answer the question. Provide details and share your research!
But avoid …
Asking for help, clarification, or responding to other answers.
Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Draft saved
Draft discarded
Sign up or log in
Sign up using Google
Sign up using Email and Password
Submit
Post as a guest
Name
Email
Required, but never shown
Post Your Answer Discard
By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
matlab
line
geometry
intersection
See similar questions with these tags.
The Overflow Blog
The history and future of software development (part 1)
Getting Backstage in front of a shifting dev experience
Featured on Meta
Spevacus has joined us as a Community Manager
Introducing a new proactive anti-spam measure
New and improved coding challenges
New comment UI experiment graduation
Policy: Generative AI (e.g., ChatGPT) is banned
Report this ad
Report this ad
Community activity
Last 1 hr
Users online activity 10410 users online
12 questions
14 answers
46 comments
174 upvotes
Popular tags
pythoncssandroidc#java
Popular unanswered question
How to get vector embedding of (lat, long) points or GPS trajectories?
pythonpandasgpsgeospatialword-embedding
robot
13
1,033 days ago
Related
2Collision Handling Between Circle and Line Segments
1Intersection points of two circles in MATLAB
0Problems finding the intersecting point of circle
12Line Segment Circle Intersection
0Find intersection of circle and line
28What is most efficient way to find the intersection of a line and a circle in python?
1Processing: Distance of intersection between line and circle
1What could be wrong with my function for finding a solution for circle-line collision?
1Draw angles lines over circle and get the intersecting points
2LibGDX coordinates of intersection points between a Line Segment and a Circle
Hot Network Questions
Exchange a file in a zip file quickly
How can the problem of a warlock with two spell slots be solved?
Origin of Australian slang exclamation "struth" meaning greatly surprised
How to locate a leak in an irrigation system?
In the U.S., can patients receive treatment at a hospital without being logged?
RTC battery and VCC switching circuit
Gluteus medius inactivity while riding
Bypassing C64's PETSCII to screen code mapping
Triangle with Interlacing Rows Inequality [Programming]
With with auto-generated local variables
Program that allocates time to tasks based on priority
How do you emphasize the verb "to be" with do/does?
Languages in the former Yugoslavia
Lingering odor presumably from bad chicken
Where is the first repetition in the cumulative hierarchy up to elementary equivalence?
For every second-order formula, is there a first-order formula equivalent to it by reification?
Checking model assumptions at cluster level vs global level?
Can a cleric gain the intended benefit from the Extra Spell feat?
How to start explorer with C: drive selected and shown in folder list?
Overfilled my oil
In Dwarf Fortress, why can't I farm any crops?
Do we need the author's permission for reference
Any knowledge on biodegradable lubes, greases and degreasers and how they perform long term?
An odd question
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
lang-matlab
Why are you flagging this comment?
Probable spam.
This comment promotes a product, service or website while failing to disclose the author's affiliation.
Unfriendly or contains harassment/bigotry/abuse.
This comment is unkind, insulting or attacks another person or group. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Stack Overflow
Questions
Help
Chat
Products
Teams
Advertising
Talent
Company
About
Press
Work Here
Legal
Privacy Policy
Terms of Service
Contact Us
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings |
2029 | https://hinative.com/questions/24038612 | Quality Point(s): 69
Answer: 62
Like: 35
What is the difference between To unveil and To reveal ?Feel free to just provide example sentences.
Quality Point(s): 5354
Answer: 1085
Like: 756
The verbs "to unveil" and "to reveal" share the common idea of disclosing or making something known, but there are slight nuances in their usage. Here are example sentences to illustrate their differences: 1. To unveil: - The company unveiled its new product line during the press conference. - The artist will unveil her latest artwork at the gallery opening. "When we say 'unveil,' it typically refers to the act of publicly presenting or disclosing something for the first time. It often implies a sense of anticipation, ceremony, or official announcement." 2. To reveal: - The detective slowly revealed the truth behind the mysterious crime. - The author's memoir reveals intimate details about his personal life. "'Reveal' generally means to make something known or disclose information that was previously hidden, secret, or unknown. It can refer to any act of making information, facts, or truths known." While both verbs involve making something known, "unveil" tends to imply a formal or public presentation, often associated with events, announcements, or new introductions. On the other hand, "reveal" has a broader application and can be used in various contexts, including uncovering secrets, sharing information, or exposing truths. In summary, "unveil" specifically suggests the act of presenting something new or previously concealed to the public, while "reveal" is a more general term for making something known or disclosing information, regardless of the setting or circumstances.
Was this answer helpful?
The Language Level symbol shows a user's proficiency in the languages they're interested in. Setting your Language Level helps other users provide you with answers that aren't too complex or too simple.
Has difficulty understanding even short answers in this language.
Can ask simple questions and can understand simple answers.
Can ask all types of general questions and can understand longer answers.
Can understand long, complex answers.
Show your appreciation in a way that likes and stamps can't.
By sending a gift to someone, they will be more likely to answer your questions again!
If you post a question after sending a gift to someone, your question will be displayed in a special section on that person’s feed.
Ask native speakers questions for free
Solve your problems more easily with the app! |
2030 | https://books.google.com/books?id=EfvZAQAAQBAJ | Inequalities - G. H. Hardy, J. E. Littlewood, G. Pólya - Google Books
Sign in
Hidden fields
Try the new Google Books
Books
View sample
Add to my library
Try the new Google Books
Check out the new look and enjoy easier access to your favorite features
Try it now
No thanks
Try the new Google Books
My library
Help
Advanced Book Search
Good for:
Web
Tablet / iPad
eReader
Smartphone#### Features:
Flowing text
Scanned pages
Help with devices & formats
Learn more about books on Google Play
Buy eBook - $99.99
Get this book in print▼
Cambridge University Press
Amazon.com
Barnes&Noble.com
Books-A-Million
IndieBound
All sellers»
My library
My History
Inequalities ============ G. H. Hardy, J. E. Littlewood, G. Pólya Cambridge University Press, Feb 25, 1988 - Mathematics - 336 pages This classic of the mathematical literature forms a comprehensive study of the inequalities used throughout mathematics. First published in 1934, it presents clearly and exhaustively both the statement and proof of all the standard inequalities of analysis. The authors were well known for their powers of exposition and were able here to make the subject accessible to a wide audience of mathematicians. More » Preview this book »
Selected pages
Title Page
Table of Contents
References
Contents
INTRODUCTION1
4647 43
MEAN VALUES WITH AN ARBITRARY 65
9 75
INFINITE SERIES 114
Miscellaneous theorems and examples 124
SOME APPLICATIONS OF 172
SOME THEOREMS CONCERNING 196
1 227
Thorins proof and extension 306
Copyright
Common terms and phrases
a₁a₂ambnargumentassertsbest possiblebilinearCalculus of Variationsconsiderconstantcontinuous and strictlyconvergentconvex functioncorrespondingcurvededuce Theoremdeduced from Theoremdefineddefinitiondenoteeffectively proportionalequalityequationexampleF₁finite numberfollows from TheoremFourierFourier seriesgeneralisationsHardy and LittlewoodHenceHilbert'sHölder's inequalityhomogeneousi₁increasing functioninfiniteintervalLebesgueLebesgue integralsmaximummeansmonotonic functionalmultilinear formsnecessary and sufficientnon-negativenull setobtainPólyapositive and finiteproof of Theoremprove Theoremproves the theoremquadratic formr+s+t=0rearrangementreplacedresultRieszsatisfiedStieltjes integralstrictly monotonicstrictly positivesufficient conditionsuffixessummationSupposeTheorem 13Theorem 9theorem concerningtheorytrueunlessupper boundvaluesW. H. Youngwritex₁zeroα₁ακΣαΣΣ
Bibliographic information
Title Inequalities
Cambridge Mathematical Library
AuthorsG. H. Hardy, J. E. Littlewood, G. Pólya
Publisher Cambridge University Press, 1988
ISBN 1107647398, 9781107647398
Length 336 pages
SubjectsMathematics
›
Algebra
›
Abstract
Mathematics / Algebra / Abstract
Mathematics / Calculus
Export CitationBiBTeXEndNoteRefMan
About Google Books - Privacy Policy - Terms of Service - Information for Publishers - Report an issue - Help - Google Home |
2031 | https://www.investopedia.com/ask/answers/what-is-the-rule-72/ | Skip to content
Please fill out this field.
Top Stories
Don't Miss the Most Important Medicare Message You’ll See This Year
I’ve Saved Thousands by Refusing to Buy an iPhone.
Kevin O'Leary: 'If You Don't Have Money, You Don't Have a Marriage'
This Amazon Prime Member Perk Is Going Away in a Week
Table of Contents
Table of Contents
What Is the Rule of 72?
How It Works
Natural Logs
How to Adjust for Accuracy
Using MATLAB
Rule of 72 and Inflation
Limitations of the Rule of 72
FAQs
The Bottom Line
The Rule of 72: What It Is and How to Use It in Investing
By
Caroline Banton
Full Bio
Caroline Banton has 6+ years of experience as a writer of business and finance articles. She also writes biographies for Story Terrace.
Learn about our editorial policies
Updated April 23, 2025
Reviewed by
Andy Smith
Reviewed by Andy Smith
Full Bio
Andy Smith is a Certified Financial Planner (CFP®), licensed realtor and educator with over 35 years of diverse financial management experience. He is an expert on personal finance, corporate finance and real estate and has assisted thousands of clients in meeting their financial goals over his career.
Learn about our Financial Review Board
Fact checked by
Suzanne Kvilhaug
Fact checked by Suzanne Kvilhaug
Full Bio
Suzanne is a content marketer, writer, and fact-checker. She holds a Bachelor of Science in Finance degree from Bridgewater State University and helps develop content strategies.
Learn about our editorial policies
What Is the Rule of 72?
The Rule of 72 is an easy way to calculate how long an investment will take to double in value given a fixed annual rate of interest. Dividing 72 by the annual rate of return gives investors an estimate of how many years it will take for the initial investment to duplicate.
It is a reasonably accurate estimate, especially at low interest rates. For a more accurate estimate, taking compound interest into account, you can use the rule of 69.3%.
Key Takeaways
The Rule of 72 is a quick way to get a useful ballpark figure.
For investments without a fixed rate of return, you can instead divide 72 by the number of years you hope it will take to double your money. This will give you an estimate of the annual rate of return you’ll need to achieve that goal.
The calculation is most accurate for rates of return of about 5% to 10%.
For more precise outcomes, divide 69.3 by the rate of return. While not as easy to do in one’s head, it is more accurate.
How the Rule of 72 Works
For example, the Rule of 72 states that $1 invested at an annual fixed interest rate of 10% would take 7.2 years ((72 ÷ 10) = 7.2) to grow to $2. In reality, a 10% investment will take 7.3 years to double (1.107.3 = 2).
The Rule of 72 is reasonably accurate for low rates of return. The chart below compares the numbers given by the Rule of 72 and the actual number of years it takes an investment to double. Notice that the Rule of 72 is less precise as rates of return increase.
| | | | |
--- --- |
| Rate of Return | Rule of 72 | Actual # of Years | Difference (#) of Years |
| 2% | 36.0 | 35 | 1.0 |
| 3% | 24.0 | 23.45 | 0.6 |
| 5% | 14.4 | 14.21 | 0.2 |
| 7% | 10.3 | 10.24 | 0.0 |
| 9% | 8.0 | 8.04 | 0.0 |
| 12% | 6.0 | 6.12 | 0.1 |
| 25% | 2.9 | 3.11 | 0.2 |
| 50% | 1.4 | 1.71 | 0.3 |
| 72% | 1.0 | 1.28 | 0.3 |
| 100% | 0.7 | 1 | 0.3 |
The Rule of 72 and Natural Logs
The Rule of 72 can estimate compounding periods using natural logarithms. In mathematics, the logarithm is the opposite concept of a power; for example, the opposite of 10³ is log base 10 of 1,000.
Rule of 72=ln(e)=1where:e=2.718281828
Important
e is a famous irrational number similar to pi. The most important property of the number e is related to the slope of exponential and logarithm functions, and its first few digits are 2.718281828.
The natural logarithm is the amount of time needed to reach a certain level of growth with continuous compounding.
The time value of money (TVM) formula is the following:
Future Value=PV×(1+r)nwhere:PV=Present Valuer=Interest Raten=Number of Time Periods
To see how long it will take an investment to double, state the future value as 2 and the present value as 1.
2=1×(1+r)n
Simplify, and you have the following:
2=(1+r)n
To remove the exponent on the right-hand side of the equation, take the natural log of each side:
ln(2)=n×ln(1+r)
This equation can be simplified again because the natural log of (1 + interest rate) equals the interest rate as the rate gets continuously closer to zero. In other words, you are left with:
ln(2)=r×n
The natural log of 2 is equal to 0.693 and, after dividing both sides by the interest rate, you have:
0.693/r=n
By multiplying the numerator and denominator on the left-hand side by 100, you can express each as a percentage. This gives:
69.3/r%=n
Fast Fact
The number 72 has sacred significance in many religions, including Judaism, Christianity, and Islam. This has no relevance to the Rule of 72, where the number was probably chosen because it's simpler to use than the more accurate 69.3.
How to Adjust the Rule of 72 for Higher Accuracy
The Rule of 72 is more accurate if it is adjusted to more closely resemble the compound interest formula—which effectively transforms the Rule of 72 into the Rule of 69.3.
The number 72, however, has many convenient factors, including two, three, four, six, and nine. This convenience makes it easier to use the Rule of 72 for a close approximation of compounding periods.
Tip
Many investors prefer to use the Rule of 69.3 rather than the Rule of 72. For maximum accuracy—particularly for continuous compounding interest rate instruments—use the Rule of 69.3.
How to Calculate the Rule of 72 Using MATLAB
The calculation of the Rule of 72 in the MATLAB platform requires running a simple command of “years = 72/return,” where the variable “return” is the rate of return on investment and “years” is the result for the Rule of 72. The Rule of 72 is also used to determine how long it takes for money to halve in value for a given rate of inflation.
For example, if the rate of inflation is 4%, a command “years = 72/inflation” where the variable inflation is defined as “inflation = 4” gives 18 years.
MATLAB, short for matrix laboratory, is a programming platform from MathWorks used for analyzing data.
Rule of 72 and Inflation
The Rule of 72 isn't just a useful tool for estimating how fast your investments might double. It can also be used to understand how quickly inflation erodes your purchasing power. Instead of calculating how long it takes to grow your money, you can use the same formula to see how long it takes for inflation to cut your money’s value in half. It’s a sobering perspective, but a powerful one for understanding the need to invest.
Let’s say inflation is running at 3% per year. Using the Rule of 72, you divide 72 by the inflation rate (3), which gives you 24. That means that in just 24 years, your money will only buy half of what it can today, if it’s just sitting idle. Keep in mind that’s assuming a moderate inflation rate. At a higher rate of 6%, the purchasing power of your cash would be halved in just 12 years. The takeaway is that even if your money isn’t growing, the world around it keeps getting more expensive.
Limitations of the Rule of 72
The biggest drawback of the Rule of 72 is that it’s only an approximation. The rule assumes compounded annual interest and works best with rates between 6% and 10%. At those mid-range percentages, the math lines up fairly closely with the actual compound interest formula. Once you go outside that range, the accuracy drops off.
For example, if you’re looking at an investment with a 1% return, the Rule of 72 says it would take 72 years to double your money. However, the real number, using exact compound interest math, is about 70.5 years—not a huge difference, but still off. At the other end of the spectrum, if you’re getting a 24% return, the Rule of 72 says your money doubles in 3 years. In reality, it would double in closer to 3.2 years. These discrepancies may seem small, but they can add up over time or matter if you're trying to gauge specific portfolio balances at specific times. Also, keep in mind that the error here is roughly 6% of the months projected.
Another limitation is that the Rule doesn’t take into account taxes, fees, or changing interest rates. Most real-world investments don’t have a fixed, guaranteed return. The stock market fluctuates, bond yields rise and fall, and inflation changes over time. In addition, the amount you actually take home isn't tied to your return rate; it might be eroded by those added costs, which restrict your ability to compound earnings.
Lastly, the Rule of 72 assumes reinvestment of returns and no withdrawals, which isn't always realistic. In real life, you might take profits, adjust your portfolio, or deal with unexpected financial needs that interrupt the compounding process. Therefore, keep in mind there are a lot of assumptions that need to be in place for the Rule of 72 to work.
Does the Rule of 72 Work for Stocks?
Stocks do not have a fixed rate of return, so you cannot use the Rule of 72 to determine how long it will take to double your money. However, you still can use it to estimate what kind of average annual return you would need to double your money in a fixed amount of time. Instead of dividing 72 by the rate of return, divide by the number of years you hope it takes to double your money.
For example, if you want to double your money in eight years, divide 72 by eight. This tells you that you need an average annual return of 9% to double your money in that time.
What 3 Things Can the Rule of 72 Determine?
There are two things the Rule of 72 can tell you with reasonable accuracy: how many years it will take to double your money and what kind of return you will need to double your money in a fixed period of time.
Because you know how long it will take to double your money, it’s also easy to figure out how long it would take to quadruple your money. For example, if you can double your money in seven years, you can quadruple it in 14 years by allowing the interest to compound.
Where Is the Rule of 72 Most Accurate?
The Rule of 72 provides only an estimate, but that estimate is most accurate for rates of return of 5% to 10%. Looking at the chart in this article, you can see that the calculations become less precise for rates of return lower or higher than that range.
The Bottom Line
The Rule of 72 is a quick and easy method for determining how long it will take to double the money you're investing, assuming it has a fixed annual rate of return. While it is not precise, it does provide a ballpark figure and is easy to calculate.
Investments such as stocks do not have a fixed rate of return, but the Rule of 72 still can give you an idea of the kind of return you would need to double your money in a certain amount of time. For example, to double your money in six years, you would need a rate of return of 12%.
Article Sources
Investopedia requires writers to use primary sources to support their work. These include white papers, government data, original reporting, and interviews with industry experts. We also reference original research from other reputable publishers where appropriate. You can learn more about the standards we follow in producing accurate, unbiased content in our editorial policy.
MathWorks. “Matlab.”
The offers that appear in this table are from partnerships from which Investopedia receives compensation. This compensation may impact how and where listings appear. Investopedia does not include all offers available in the marketplace.
Popular Accounts from Our Partners
Read more
Investing
Bonds
Fixed Income
Partner Links
Take the Next Step to Invest
The offers that appear in this table are from partnerships from which Investopedia receives compensation. This compensation may impact how and where listings appear. Investopedia does not include all offers available in the marketplace.
Related Articles
Effective Yield Explained: Definition, Calculation, and Examples Understanding Amortized Bonds: Definition, Mechanics, and Examples Fidelity Bonds Explained: Types, Benefits, and Uses How Fed Rate Hikes Impact Your Bond Portfolio's Performance Understanding Investment Notes: Types, Benefits, and Risks When Do Issuers Redeem Callable Bonds? Understanding Rates and Strategy Understanding Current Yield: Definition, Formula, and Calculation Understanding Bull Steepeners: Yield Curve Changes Explained
Understanding Maturity Dates: Types, Impacts, and Examples Understanding Indenture: Types and Roles in Bond Agreements What Is Discount Margin (DM)? Definition, Application, and Calculation AAA Credit Rating Explained: Definition, Criteria, and Bond Types Treasury Bills (T-Bills): What They Are and How to Invest Strip Bonds Explained: Definition, Function, Returns, and Examples What Does At Par Mean? Understanding How Bonds and Stocks Trade at Face Value Convertible Bond Arbitrage Explained: Strategy, Benefits, and Examples
Newsletter Sign Up
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. |
2032 | https://math.libretexts.org/Courses/Stanford_Online_High_School/Logic_for_All%3A_An_Introduction_to_Logical_Reasoning/10%3A_Predicate_Logic | Skip to main content
10: Predicate Logic
Last updated
: Mar 27, 2025
Save as PDF
9: More on Truth Tables
11: Modal Logic
Page ID
: 182581
( \newcommand{\kernel}{\mathrm{null}\,})
\definecolorfillinmathshadegray0.9
Table of contents
Part 9: Predicate Logic
Why Predicate Logic Matters
Propositional logic treats entire statements as indivisible units (propositions). But often we want to talk about properties of objects or relationships between objects. For example, "All cats are mammals" or "Some numbers are prime." Propositional logic can't easily express "all" or "some" — it would just see "All cats are mammals" as a single black box statement. Predicate logic (also known as first-order logic) allows us to peek inside that box. It lets us use variables and quantifiers to say things about many instances at once, greatly expanding the expressiveness of our logic.
In simpler terms, predicate logic answers questions like: - How do we say every member of a category has some property?
- How do we say there exists something with a certain property?
These abilities are crucial in mathematics, computer science (database queries, AI), and philosophy.
From Aristotle to Modern Logic
Aristotle's syllogisms (e.g., "All men are mortal; Socrates is a man; therefore Socrates is mortal") were an early form of predicate logic dealing with categories and membership. Modern predicate logic (developed by Frege in 1879 and others) formalized these ideas with quantifiers and variables, laying the groundwork for much of modern mathematics and computer science.
From Propositions to Predicates
A predicate is like a property or relation that can be true or false of something. It’s often represented as a capital letter with parentheses, e.g. P(x) might mean "x is prime" or "x is a philosopher", depending on context. The variable x can stand for an object in the domain of discourse (the set of things we're talking about).
Example: Let M(x) mean "x is mortal" and H(x) mean "x is human." The statement "All humans are mortal" can be expressed in predicate logic, whereas propositional logic could not directly capture it.
Quantifiers: Universal and Existential
Predicate logic introduces quantifiers to indicate how many or which elements of the domain we’re talking about:
Universal Quantifier (∀): Means "for all" or "for every".
∀xP(x) says "for all x, P(x) is true." (Every x has property P.)
Existential Quantifier (∃): Means "there exists" or "for at least one".
∃xP(x) says "there exists at least one x such that P(x) is true." (Some x has property P.)
Let's see them in use:
"All" statements (Universal)
All cats are mammals.
Domain: animals.
Let C(x) = "x is a cat", M(x) = "x is a mammal."
In logic: ∀x(C(x)→M(x)).
This says: for every creature x, if x is a cat, then x is a mammal.
No dogs can fly.
Let D(x) = "x is a dog", F(x) = "x can fly."
"No dogs can fly" can be written as: ∀x(D(x)→¬F(x)).
(For every x, if x is a dog, then x cannot fly.)
Alternatively, one could write ¬∃x(D(x)∧F(x)) meaning "there does not exist an x that is a dog and can fly," which is logically equivalent.
"Some" statements (Existential)
There exists a prime number greater than 100.
Domain: numbers.
Let P(x) = "x is prime", G(x) = "x > 100$.
In logic: ∃x(P(x)∧G(x)).
(There is at least one number x such that x is prime and x>100.)
Someone in the class speaks French.
Domain: people (in the class).
Let F(x) = "x speaks French."
∃xF(x) says "There is at least one person x such that x speaks French."
Combining Quantifiers and Logic
We can make more complex statements:
"Every even number greater than 2 is not prime."
Domain: natural numbers.
E(x) = "x is even", P(x) = "x is prime", G(x) = "x > 2$.
Logic: ∀x((E(x)∧G(x))→¬P(x)).
(For any number, if it's even and >2, then it is not prime.)
"There is a student who is in both the chess club and the debate club."
Domain: students.
C(x) = "x is in the chess club", D(x) = "x is in the debate club".
∃x(C(x)∧D(x)).
(At least one student is in both clubs.)
Translating 'none' or 'no one'
Statements like "No x satisfy condition Y" can be translated in two equivalent ways:
- Universal form: ∀x(if Y(x) then false) – e.g., ∀x(Y(x)→false), which simplifies to ∀x¬Y(x) (if we mean no x at all have property Y). But more typically, "No X are Y" is translated as ∀x(X(x)→¬Y(x)).
- Negated existential form: ¬∃xY(x) – "There does not exist an x with property Y."
These are equivalent: saying no x has property Y is the same as saying "for all x, x does not have property Y."
Domains and Scope of Quantifiers
When we write ∀x or ∃x, we presume a domain of discourse for x (the set of all things x could refer to). Sometimes it's stated explicitly ("for all people x, ..."), other times it's implied by context (if we're talking about numbers, x ranges over numbers).
Quantifiers have a scope similar to how parentheses or logical operators have scope. For example, in ∀x(P(x)∨Q(y)), the ∀x applies only to the P(x) part (and not to Q(y) which might involve a different variable).
If we need multiple quantifiers, we can use different variables or nest them:
"Every student admires some professor."
Domain: people at a university.
Let S(x) = "x is a student", Prof(y) = "y is a professor", A(x,y) = "x admires y".
Logic: ∀x[S(x)→∃y(Prof(y)∧A(x,y))].
(For each person x, if x is a student, then there exists at least one person y who is a professor and x admires y.)
Order matters for different quantifiers:
∀x∃yA(x,y) is not the same as ∃y∀xA(x,y). The first says "for each x, you can find a (potentially different) y such that A(x,y)." The second says "there is a single y that works for every x." This distinction is huge.
Order of Quantifiers
Pay attention to quantifier order:
- ∀x∃yP(x,y): For each x, maybe different ys can witness the truth.
- ∃y∀xP(x,y): There is one particular y that works for all x.
These can mean very different things. For example, "For every person, there is someone whom they love" versus "There is a person whom everyone loves."
Translating Between English and Predicate Logic
It takes practice to capture English precisely in symbols:
Each, every, all →∀
Some, there is/are, at least one →∃
None, no → use ∀ with a negation, or ¬∃
Example translations:
"Every car has wheels."
Domain: vehicles (or things).
C(x) = "x is a car", W(x) = "x has wheels".
∀x(C(x)→W(x)).
"Some cars have no wheels."
C(x) = "x is a car", W(x) = "x has wheels".
∃x(C(x)∧¬W(x)).
(There exists an object that is a car and does not have wheels — perhaps this is false in reality, but that's the logical form.)
"Not every car has wheels."
This is the negation of "every car has wheels."
We can write: ¬∀x(C(x)→W(x)), which is equivalent to ∃x¬(C(x)→W(x)) which simplifies to ∃x(C(x)∧¬W(x)).
So "Not all have wheels" means "Some car has no wheels" — note how English "not every" turns into an existential statement logically.
"At least two people have the same birthday." (A bit trickier)
Domain: people.
B(x,d) = "Person x has birthday on date d".
One way: ∃x∃y∃d[(x≠y)∧B(x,d)∧B(y,d)].
(There exist two different people x and y and a date d such that x and y both have birthday d.)
Real-World Applications of Predicate Logic
Database Queries: SQL and other query languages are built on predicate logic. A query like "SELECT FROM Employees WHERE age > 30 AND department = 'Sales'" is basically finding all x such that Age(x)>30 and Dept(x,"Sales").
Artificial Intelligence: Knowledge representation often uses first-order logic to encode facts and rules. E.g., in an expert system: ∀x(Cat(x)→Mammal(x)) encodes a general fact about the world.
Mathematics: Almost all definitions and theorems in mathematics are expressed in predicate logic ("For every ε>0, there exists a δ>0 such that ...", which is a ∀∃ statement).
Formal Verification: When verifying hardware or software, one often writes specifications like "for all possible inputs satisfying condition P, the output will satisfy Q" (∀x(P(x)→Q(x))) and uses automated theorem provers to check it.
Common Misconceptions
"∀xP(x) means the same as P(x) for a generic x."
Reality: ∀xP(x) means every possible x in the domain makes P(x) true. You can't assume a specific one without stating it. It's a statement about the entire domain at once.
"∃xP(x) asserts the existence but we know nothing else about that x."
Reality: Yes, existential just guarantees at least one exists, but we usually can't give it a name unless we use a witness. It's a logical guarantee without identification (unless the context or proof finds a concrete example).
"If ∀xP(x) is true, then ∃xP(x) must be true."
Reality: True. If everything has property P, certainly at least one thing does. (In logic, ∀xP(x) implies ∃xP(x) provided the domain is nonempty. Usually we assume domains are nonempty.)
"If ∃xP(x) is true, then ∀xP(x) might be true."
Reality: Having one example doesn't mean all have it. E.g., "There exists a number that is even" is true, but "For all numbers, they are even" is false.
Mixing up ∀ and ∃: It's common but critical to keep them straight. "Every" vs "Some" are not interchangeable.
Exercises
9.1. Translate into predicate logic: "All birds can fly." (Define appropriate predicates for being a bird and being able to fly.)
9.2. Translate: "Some birds cannot fly." (You might know real examples, but just do it logically.)
9.3. Translate: "Every student in this class has taken at least one programming course." (Define predicates like S(x) for "x is a student in this class", and P(x,y) for "x has taken course y", and maybe a set or predicate for programming courses.)
9.4. Translate: "There is a prime number that is even." (Remember what the only even prime is!)
9.5. Consider the statement: "If a number is rational, then it can be written as a ratio of two integers." Express this as a logical statement with a universal quantifier. (Let R(x) = "x is rational", and define a predicate for "x can be written as m/n with m,n integers".)
9.6. Express the negation of the statement in 9.5 in a normalized way (so that negation symbol directly precedes the predicate, not the quantifier). Explain the meaning of the negation in words.
9.7. Translate: "Not every book is interesting." Then contrast it with "No book is interesting." (They are different! Provide both translations.)
9.8. Translate: "Everyone has exactly one mother." (Hint: This one is a bit advanced. It means: for every person x, there exists a person y such that y is the mother of x, and for all z, if z is a mother of x then z=y.)
9.9. Is the following statement true or false (in ordinary arithmetic)? "For every integer y, there exists an integer x such that x<y." Translate it to logic as well, then answer.
9.10. Explain in your own words the difference between ∀x∃yP(x,y) and ∃y∀xP(x,y). Give a real-life example where one is true but the other is false.
Advanced: Predicate logic is a powerful tool, but with great power comes additional complexity. In further studies, you'll encounter concepts like relations, functions, multiple quantifiers, and even logical paradoxes that arise with unrestricted domains (like Russell's paradox about "the set of all sets that don't contain themselves"). Predicate logic is the gateway to these deeper explorations, including the foundations of mathematics and computer science.
9: More on Truth Tables
11: Modal Logic |
2033 | https://www.pearson.com/channels/college-algebra/learn/patrick/1-equations-and-inequalities/powers-of-i | Skip to main content
My Courses
Chemistry
General Chemistry
Organic Chemistry
Analytical Chemistry
GOB Chemistry
Biochemistry
Intro to Chemistry
Biology
General Biology
Microbiology
Anatomy & Physiology
Genetics
Cell Biology
Physics
Physics
Math
College Algebra
Trigonometry
Precalculus
Calculus
Business Calculus
Statistics
Business Statistics
Social Sciences
Psychology
Health Sciences
Personal Health
Nutrition
Business
Microeconomics
Macroeconomics
Financial Accounting
Product & Marketing
Agile & Product Management
Digital Marketing
Project Management
AI in Marketing
Programming
Introduction to Python
Microsoft Power BI
Data Analysis - Excel
Introduction to Blockchain
HTML, CSS & Layout
Introduction to JavaScript
R Programming
Calculators
AI Tools
Study Prep Blog
Study Prep Home
Table of contents
Skip topic navigation
Skip topic navigation
Review of Algebra
4h 18m
Algebraic Expressions
36m
+ 32m
+ Polynomials Intro
19m
+ Multiplying Polynomials
36m
+ Factoring Polynomials
1h 2m
+ Radical Expressions
15m
+ Simplifying Radical Expressions
35m
+ Rationalize Denominator
15m
+ Rational Exponents
4m
1. Equations & Inequalities
3h 18m
Linear Equations
31m
+ Rational Equations
21m
+ The Imaginary Unit
6m
+ Powers of i
11m
+ Complex Numbers
36m
+ Intro to Quadratic Equations
18m
+ The Square Root Property
11m
+ Completing the Square
12m
+ The Quadratic Formula
18m
+ Choosing a Method to Solve Quadratics
9m
+ Linear Inequalities
20m
2. Graphs of Equations
43m
Graphs and Coordinates
7m
+ Two-Variable Equations
23m
+ Lines
12m
3. Functions
2h 17m
Intro to Functions & Their Graphs
35m
+ Common Functions
5m
+ Transformations
45m
+ Function Operations
21m
+ Function Composition
29m
4. Polynomial Functions
1h 44m
Quadratic Functions
39m
+ Understanding Polynomial Functions
34m
+ Graphing Polynomial Functions
30m
+ Dividing Polynomials
+ Zeros of Polynomial Functions
5. Rational Functions
1h 23m
Introduction to Rational Functions
9m
+ Asymptotes
35m
+ Graphing Rational Functions
38m
6. Exponential & Logarithmic Functions
2h 28m
Introduction to Exponential Functions
9m
+ Graphing Exponential Functions
25m
+ The Number e
8m
+ Introduction to Logarithms
22m
+ Graphing Logarithmic Functions
18m
+ Properties of Logarithms
27m
+ Solving Exponential and Logarithmic Equations
35m
7. Systems of Equations & Matrices
4h 6m
Two Variable Systems of Linear Equations
1h 8m
+ Introduction to Matrices
1h 11m
+ Determinants and Cramer's Rule
1h 3m
+ Graphing Systems of Inequalities
42m
8. Conic Sections
2h 23m
Introduction to Conic Sections
5m
+ Circles
15m
+ Ellipses: Standard Form
33m
+ Parabolas
36m
+ Hyperbolas at the Origin
40m
+ Hyperbolas NOT at the Origin
12m
9. Sequences, Series, & Induction
1h 22m
Sequences
40m
+ Arithmetic Sequences
25m
+ Geometric Sequences
15m
10. Combinatorics & Probability
1h 45m
Factorials
11m
+ Combinatorics
46m
+ Probability
47m
Equations & Inequalities
Powers of i
Equations & Inequalities
Powers of i: Videos & Practice Problems
Video Lessons
Practice
Worksheet
Topic summary
Understanding the powers of the imaginary unit Math input error
1
concept
Powers of i
Video duration:
4m
Play a video:
Powers of i Video Summary
The imaginary unit is defined as the square root of negative one, . When raising to various powers, a pattern emerges that simplifies calculations significantly. Understanding the first few powers of allows us to easily determine higher powers.
Starting with the basic powers:
Continuing this pattern, we can express higher powers of in terms of these four results. For example:
This reveals a repeating cycle every four powers: . Therefore, any power of can be simplified by finding the remainder when the exponent is divided by 4:
For any integer :
If , then
If , then
If , then
If , then
This cyclical nature allows for quick calculations of any power of , making it a powerful tool in complex number arithmetic.
2
concept
Higher Powers of i
Video duration:
5m
Play a video:
Higher Powers of i Video Summary
Understanding the powers of the imaginary unit is essential in complex number calculations. The powers of cycle through four distinct values: , , , and . This cyclical nature allows for efficient computation of higher powers without the need to manually count through each power.
To simplify calculations, we can express any power of in terms of , which equals . For instance, to evaluate , we can rewrite it as . Since , it follows that .
For powers that are not multiples of four, such as , we can still utilize the cyclical pattern. We start by determining how many complete sets of fit into the exponent. In this case, can be expressed as . Since , we find that .
To further streamline the process, we can determine the remainder when the exponent is divided by . If the exponent is evenly divisible by , the result is . For example, can be evaluated by checking if has a remainder. Since is divisible by , .
For exponents that yield a remainder, we can find the equivalent power of based on the remainder. For instance, when calculating , dividing by gives a quotient of and a remainder of . Thus, . Knowing that , we conclude that .
In summary, to evaluate powers of , determine if the exponent is divisible by . If it is, the result is . If not, calculate the remainder and use it to find the corresponding power of from the cycle: , , , and . This method provides a quick and efficient way to handle complex exponentiation.
3
Problem
Simplify the power of i. i 1003
A
i
B
−
1
C
−
i
D
1
4
Problem
Simplify the power of i. i 85
A
i
B
-1
C
−
i
D
1
Do you want more practice?
More sets
Powers of i
Equations & Inequalities
6 problems
Topic
Callie
1. Equations & Inequalities - Part 1 of 3
4 topics 11 problems
Chapter
Callie
1. Equations & Inequalities - Part 2 of 3
4 topics 10 problems
Chapter
Callie
1. Equations & Inequalities - Part 3 of 3
4 topics 10 problems
Chapter
Callie
Go over this topic definitions with flashcards
More sets
Powers of i definitions
Equations & Inequalities
15 Terms
Take your learning anywhere!
Prep for your exams on the go with video lessons and practice problems in our mobile app.
Here’s what students ask on this topic:
What is the imaginary unit 'i' and how do its powers cycle?
The imaginary unit 'i' is defined as the square root of -1. Its powers cycle through four values: i, -1, -i, and 1. This cyclical pattern occurs every four powers, making it easier to calculate higher powers of i. Specifically, i1 = i, i2 = -1, i3 = -i, and i4 = 1. Understanding this cycle allows us to simplify calculations involving powers of i, especially when dealing with large exponents. By recognizing this repeating pattern, we can express any power of i in terms of these four values, facilitating quick and efficient computation.
How can I calculate higher powers of 'i' using divisibility by 4?
To calculate higher powers of 'i', check if the exponent is divisible by 4. If it is, the result is 1, as i4 = 1. If not, divide the exponent by 4 to find the remainder. The remainder determines the equivalent lower power of i: a remainder of 1 corresponds to i, 2 to -1, and 3 to -i. For example, i22 has a remainder of 2 when divided by 4, so it equals -1. Similarly, i67 has a remainder of 3, equating to -i. This method simplifies calculations by reducing the exponent to one of the four known values.
What is the pattern for powers of 'i' and how does it help in calculations?
The pattern for powers of 'i' is a cycle of four values: i, -1, -i, and 1. This pattern repeats every four powers, which helps simplify calculations for higher powers of 'i'. By recognizing this cycle, we can express any power of 'i' in terms of these four values, making it easier to compute large exponents. For instance, i20 can be expressed as (i4)5 = 1. This cyclical nature allows us to quickly determine the value of 'i' raised to any power by checking divisibility by 4 and using the remainder to find the corresponding value.
How do you simplify i100 using the powers of 'i' cycle?
To simplify i100, use the cycle of powers of 'i'. First, check if 100 is divisible by 4. Since 100 divided by 4 equals 25 with no remainder, i100 simplifies to 1, as i4 = 1. This method leverages the cyclical pattern of powers of 'i', which repeats every four powers: i, -1, -i, and 1. By recognizing this cycle, we can efficiently compute large powers of 'i' without manually cycling through each power, saving time and effort in calculations.
What is the remainder method for calculating powers of 'i'?
The remainder method for calculating powers of 'i' involves dividing the exponent by 4 and using the remainder to determine the equivalent lower power of 'i'. If the exponent is divisible by 4, the result is 1. If not, the remainder will be 1, 2, or 3, corresponding to i, -1, or -i, respectively. For example, dividing 22 by 4 gives a remainder of 2, so i22 equals -1. Similarly, dividing 67 by 4 gives a remainder of 3, so i67 equals -i. This method simplifies calculations by reducing the exponent to one of the four known values.
Your College Algebra tutors
Patrick Ford
Physics and Math Lead Instructor
Nick Kaneko
Math Instructor
Callie Rethman
Math Instructor |
2034 | https://www.generationgenius.com/videolessons/solve-problems-with-decimals-using-models/ | Solve Problems with Decimals (Using Models) Video | 3rd, 4th & 5th Grade
1%
Processing, please wait...
It was processed successfully!
It was processed successfully!
Create a free account to unlock all videos & resources!
Create a free account to unlock all resources!
Create Free Account
Try It Absolutely Free - Choose a role to get started
TeacherParentStudent
Science Lessons
Math Lessons
Standards
About
Pricing
Help
EN
English
Español
bool(false)
LoginCreate Free Account
Choose a role:
x
School
Home
Subscribe
Membership Plans
Logout
Subscribe
Subscribe
Create Free Account
Choose a role:
x
School
Home
Science Lessons
Math Lessons
Standards
About
Pricing
Help
Login
Login
Login
Membership Plans
Manage Account
Logout
EN
language
English
Español
Create Free Account
Preview Only
Preview Only: Watch this full video Absolutely Free. Choose a role to get started:
Choose a role to watch this full video:
TeacherParentStudent
You're In!
Enjoy any 5 free lessons!
You can pick. No account needed.
Watch Video
Choose a role to play
TeacherParentStudent
Already a member? Sign In
5 Free Lessons Left
Get All Access PlanLogin
X
Thanks For Watching!
Replay Lesson
New! Whos Is Dr. Jeff?
Back To All Lessons
We hope you enjoyed trying 5 lessons!
Become a member to get full access to our entire library of learning videos, reading material, quiz games, simple DIY activities & more.
Become a member to get full access to our entire library of learning videos, quiz games, & more.
Plans & Pricing
Create a Free Account to Continue Watching...
Create a Free Account to Continue Watching!
Sign Up
Login
Teacher
Principal or School Admin
District-level
Parent
Student
Alabama
Alaska
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of Columbia
Florida
Georgia
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Maryland
Massachusetts
Michigan
Minnesota
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
North Carolina
North Dakota
Ohio
Oklahoma
Oregon
Pennsylvania
Rhode Island
South Carolina
South Dakota
Tennessee
Texas
Utah
Vermont
Virginia
Washington
West Virginia
Wisconsin
Wyoming
International
Continue Watching
By creating a Generation Genius account, you agree to our Terms and Privacy Policy
Already a member?Sign In
UNLOCK ALL RESOURCES TO GO ALONG WITH THIS VIDEO TOO!
HANDS-ON ACTIVITIES
PRINTABLE/ONLINE QUIZZES
ADDITIONAL READING MATERIAL
DISCUSSION QUESTIONS & ANSWERS
READY-TO-GO LESSON PLANS
SO MUCH MORE
Choose a role
to continue watching
Teacher
Parent
Student
Already a member? Sign In
Welcome to Our New Math Lessons!
Your subscription is currently only to our science lessons.
5 Free Math Lesson s Left
Add Math To My Plan (+$75/yr)
We hope you enjoyed sampling 5 Math Lessons!
Your subscription is currently only to our science lessons.
Add Math To My Plan (+$75/yr)
0 Free Math Lessons Left
Create a free account
to watch this full video.
Start your free trial!
Access All Videos
and Lessons, No Limits.
Access All Videos
No credit card required,
takes 7 sec to signup.
No card required
Ready-to-go lessons
that save you time.
Ready-to-go lessons
Create a free accountContinue preview only
Oops! It looks like your security settings are blocking this video 🙁
If you are on a school computer or network, ask your tech person to whitelist these URLs:
.wistia.com, fast.wistia.com, fast.wistia.net, embed-fastly.wistia.com, embed-cloudfront.wistia.com, embedwistia-a.akamaihd.net
Sometimes a simple refresh solves this issue. If you need further help, contact us.
Click for sound
13:02
1:00 min of preview left Create a free account for full access
Create a free account to unlock all content!
Get Full Access
Solve Problems with Decimals (Using Models)
LESSON MATERIALSGenerate Student Link
Solve Problems with Decimals (Using Models)
Lesson PDFsGenerate Student Link
What you will learn from this video What you will learn
We’ll add, subtract, multiply and divide decimals using models.
We will also learn how to use estimation to decide if our answer is reasonable.
And that this knowledge can help us feed our pets, go hiking and even grow crystals!
Discussion Questions --------------------
Before Video Give the value of each digit in 5.39.ANSWER
5 wholes, 3 tenths, and 9 hundredths
What is another way to name 56 hundredths?ANSWER
Every 10 hundredths can be regrouped as 1 tenth. So, 56 hundredths is 5 tenths and 6 hundredths.
What is another way to name 48 tenths?ANSWER
Every 10 tenths can be regrouped as 1 whole. So, 48 tenths is 4 wholes and 8 tenths.
Describe how to solve 63 ÷ 9.ANSWER
If I divide 63 wholes equally among 9 groups, each group has 7 wholes. 63 ÷ 9 = 7.
How can you use estimation to check if 58 × 32 = 1,856 makes sense?ANSWER
I can round 58 to 60, and 32 to 30. 60 × 30 is 1,800, which is close to 1,856. This is how I know my answer makes sense.
After Video If you are calculating 3.64 – 2.14, which number should you represent using the fraction square model? What is the second step?ANSWER;)
The greater number, 3.64. Then, take away blocks that represent 2.14 in total.
You want to calculate 3.4 – 0.8. You represent 3.4 using 3 wholes and 4 tenths. What else do you need to do before you can subtract 8 tenths?ANSWER
I don’t have enough tenths to subtract 8 tenths, so I need to regroup 1 of the wholes as 10 tenths. Then, I have 2 wholes and 14 tenths. Now I can subtract 8 tenths from 14 tenths. The answer is what remains, 2 wholes and 6 tenths, or 2.6.
How can you use skip counting to multiply 6 × 1.4?ANSWER
1.4 means 1 whole and 4 tenths. I need to multiply each number by 6, which is the same as skip counting sixes. 6 × 1 = 6. 6 × 4 tenths = 24 tenths. 24 tenths is the same as 2 wholes and 4 tenths, so altogether I have 8 wholes and 4 tenths, or 8.4.
Mimi multiplies 4 by 2 wholes, 3 tenths, and 7 hundredths and gets 8 wholes, 12 tenths, and 28 hundredths. Is that the final answer?ANSWER
No, Mimi needs to do some regrouping, starting with the smallest place, the hundredths place. 28 hundredths can be regrouped as 2 tenths and 8 hundredths. So, now there are 8 wholes, 12 + 2 = 14 tenths, and 8 hundredths. Next, regroup some of the tenths. 10 tenths can be regrouped as 1 whole, so the final answer is 9 wholes, 4 tenths, and 8 hundredths, or 9.48.
What can you do to check if 3.8 × 5.1 = 19.38 makes sense?ANSWER
I can round 3.8 to 4 and 5.1 to 5. Multiply: 4 × 5 = 20. 20 is close to 19.38, so the answer makes sense.
Vocabulary ----------
Place valueDEFINE
Tells us the value of a digit based on its position in a number.
DecimalsDEFINE;)
Numbers that allow us to show parts of a whole.
Ones placeDEFINE;)
Shows the number of wholes.
Tenths placeDEFINE;)
Shows the number of parts out of 10.
Hundredths placeDEFINE;)
To the right of the tenths place, and shows us the number of parts out of 100.
ModelsDEFINE;)
Visual tools that help us to represent numbers.
RegroupDEFINE;)
When we have 10 of one place value, we can regroup to create 1 of the place value on its left.
Reading Material ----------------
Download as PDFDownload PDFView as Separate PageWHAT IS SOLVING PROBLEMS WITH DECIMALS?
You can solve problems with decimals exactly the way you solved problems with whole numbers. Use keywords to identify if you need to add, subtract, multiply, or divide to solve.
To better understand solving problems with decimals… WHAT IS SOLVING PROBLEMS WITH DECIMALS?. You can solve problems with decimals exactly the way you solved problems with whole numbers. Use keywords to identify if you need to add, subtract, multiply, or divide to solve. To better understand solving problems with decimals… LET’S BREAK IT DOWN!
-------------------- ### Hiking
Adesina, April, and Marcos hiked all day. They need to add up the distances they hiked to find out how far they traveled in all. The first trail was 1.7 kilometers long. The second trail was 3.2 kilometers long. To find out how much they hiked altogether, add 1.7 + 3.2. To do this, use models that represent whole and decimal numbers. We can represent 3.2 as 3 wholes and 2 tenths. We can represent 1.7 as 1 whole and 7 tenths. To add, group the wholes and group the tenths. 3 wholes plus 1 whole is 4 whole kilometers. 7 tenths plus 2 tenths is 9 tenths of a kilometer. Then we have 4 wholes and 9 tenths, or 4.9 kilometers. This means that they hiked 4.9 kilometers altogether. To check the answer, round the starting numbers to the nearest whole. 3.2 can be rounded to 3 and 1.7 can be rounded to 2. Add 3 and 2 to get 5. 5 is close to 4.9, so the answer is reasonable. Numbers with hundredths can be added the same way. If Marcos bought an energy bar for $2.34 and April bought trail mix for $1.89, how much money did they spend in all? 2.34 can be represented as 2 wholes, 3 tenths, and 4 hundredths. 1.89 can be represented as 1 whole, 8 tenths, and 9 hundredths. Adding them together, we have 3 wholes, 11 tenths, and 13 hundredths. Because we have more than 9 hundredths and tenths, we have to regroup some numbers. 10 hundredths can be regrouped to make 1 tenth, so 13 hundredths is 1 tenth and 3 hundredths. Then we have 12 tenths in total. 10 tenths can be regrouped to become 1 whole, so 12 tenths is 1 whole and 2 tenths. Altogether there are 4 wholes, 2 tenths, and 3 hundredths, or $4.23. Now you try: Add 4.58 + 2.39. Hiking Adesina, April, and Marcos hiked all day. They need to add up the distances they hiked to find out how far they traveled in all. The first trail was 1.7 kilometers long. The second trail was 3.2 kilometers long. To find out how much they hiked altogether, add 1.7 + 3.2. To do this, use models that represent whole and decimal numbers. We can represent 3.2 as 3 wholes and 2 tenths. We can represent 1.7 as 1 whole and 7 tenths. To add, group the wholes and group the tenths. 3 wholes plus 1 whole is 4 whole kilometers. 7 tenths plus 2 tenths is 9 tenths of a kilometer. Then we have 4 wholes and 9 tenths, or 4.9 kilometers. This means that they hiked 4.9 kilometers altogether. To check the answer, round the starting numbers to the nearest whole. 3.2 can be rounded to 3 and 1.7 can be rounded to 2. Add 3 and 2 to get 5. 5 is close to 4.9, so the answer is reasonable. Numbers with hundredths can be added the same way. If Marcos bought an energy bar for $2.34 and April bought trail mix for $1.89, how much money did they spend in all? 2.34 can be represented as 2 wholes, 3 tenths, and 4 hundredths. 1.89 can be represented as 1 whole, 8 tenths, and 9 hundredths. Adding them together, we have 3 wholes, 11 tenths, and 13 hundredths. Because we have more than 9 hundredths and tenths, we have to regroup some numbers. 10 hundredths can be regrouped to make 1 tenth, so 13 hundredths is 1 tenth and 3 hundredths. Then we have 12 tenths in total. 10 tenths can be regrouped to become 1 whole, so 12 tenths is 1 whole and 2 tenths. Altogether there are 4 wholes, 2 tenths, and 3 hundredths, or $4.23. Now you try: Add 4.58 + 2.39. ### Science Project
Marcos, April, and Adesina grew crystals for a science project. Marcos’s crystal weighs 5.6 grams, and April’s weighs 3.5 grams. How much more does Marcos’ crystal weigh than April's? We can use decimal square models to find the answer. To find the difference, we always start with the bigger number, and we can represent 5.6 using 5 wholes and 6 tenths. To subtract, we need to take away 3.5, or 3 wholes and 5 tenths. 5 – 3 = 2 wholes. 6 tenths – 5 tenths = 1 tenth. We have 2 wholes and 1 tenth, or 2.1, remaining. Marcos’ crystal weighs 2.1 more grams than April’s. Estimate the difference to check the answer. Round 5.6 to 6 and 3.5 to 4. 6 – 4 = 2. 2 is close to 2.1, so the answer is reasonable. April’s crystal display cost $3.59. Marcos’ display cost $1.95. How much more did April’s display cost than Marcos's? Find 3.59 – 1.95 to find the difference. Use the decimal square model to show the larger number. 3.59 is 3 wholes, 5 tenths, and 9 hundredths. To subtract, cross out 1.95, or 1 whole, 9 tenths, and 5 hundredths in all. First, cross out 5 hundredths. There are 4 hundredths left. Next, we need to cross out 9 tenths, but there are only 5 tenths. Regroup 1 whole into 10 tenths. Now there are 2 wholes and 15 tenths. Subtract the 9 tenths. 15 – 9 = 6, so there are 6 tenths left. Lastly, subtract 1 whole from 2. We have 1 whole, 6 tenths, and 4 hundredths left. That means that April's display cost $1.64 more than Marcos's. Now you try: What is $6.72 – $3.45? Science Project Marcos, April, and Adesina grew crystals for a science project. Marcos’s crystal weighs 5.6 grams, and April’s weighs 3.5 grams. How much more does Marcos’ crystal weigh than April's? We can use decimal square models to find the answer. To find the difference, we always start with the bigger number, and we can represent 5.6 using 5 wholes and 6 tenths. To subtract, we need to take away 3.5, or 3 wholes and 5 tenths. 5 – 3 = 2 wholes. 6 tenths – 5 tenths = 1 tenth. We have 2 wholes and 1 tenth, or 2.1, remaining. Marcos’ crystal weighs 2.1 more grams than April’s. Estimate the difference to check the answer. Round 5.6 to 6 and 3.5 to 4. 6 – 4 = 2. 2 is close to 2.1, so the answer is reasonable. April’s crystal display cost $3.59. Marcos’ display cost $1.95. How much more did April’s display cost than Marcos's? Find 3.59 – 1.95 to find the difference. Use the decimal square model to show the larger number. 3.59 is 3 wholes, 5 tenths, and 9 hundredths. To subtract, cross out 1.95, or 1 whole, 9 tenths, and 5 hundredths in all. First, cross out 5 hundredths. There are 4 hundredths left. Next, we need to cross out 9 tenths, but there are only 5 tenths. Regroup 1 whole into 10 tenths. Now there are 2 wholes and 15 tenths. Subtract the 9 tenths. 15 – 9 = 6, so there are 6 tenths left. Lastly, subtract 1 whole from 2. We have 1 whole, 6 tenths, and 4 hundredths left. That means that April's display cost $1.64 more than Marcos's. Now you try: What is $6.72 – $3.45? ### Stacking Shelves
Adesina stacks 4 drawers on top of each other. Each drawer is 0.3 meter tall. How tall is the stack? Find out by multiplying 4 by 0.3. Since multiplication is just repeated addition, 4 times 0.3 is the same as 0.3 + 0.3 + 0.3 + 0.3. Use decimal squares to model the addition. 0.3 means 3 parts out of 10. Show that 4 times. Next, count up all the tenths: there are 3, 6, 9, 12 tenths. To write this as a decimal, regroup 10 tenths to make 1 whole. That gives 1 whole and 2 tenths, or 1.2 meters. What if you stack 3 bigger shelves that are each 2.53 feet tall? To find the height of this stack, multiply 2.53 by 3. 2.53 can be modeled as 2 wholes, 5 tenths, and 3 hundredths. To multiply by 3, add each number of units 3 times. This gives 6 wholes, 15 tenths, and 9 hundredths in all. Regroup 15 tenths as 1 whole and 5 tenths. The answer is 7 wholes, 5 tenths, and 9 hundredths, or 7.59 meters tall. To use estimation to check the answer, round 2.53 to 3. 3 × 3 = 9, which is close to the answer. To multiply a decimal by a decimal, such as 0.7 times 0.3, use a model to show 0.3 as 3 parts out of 10. To show 7 tenths of 3 tenths, split each tenth into 10 equal parts, and then color only 7 of the parts in each tenth. When tenths are split into 10 parts each, there are 100 pieces in the whole. That means that each of those small squares represents one hundredth. Each model shows 7 hundredths. There are 3 models to show the original 3 tenths. So the answer is 21 hundredths, or 0.21. Now you try: Multiply 4 by 2.61 meters. Stacking Shelves Adesina stacks 4 drawers on top of each other. Each drawer is 0.3 meter tall. How tall is the stack? Find out by multiplying 4 by 0.3. Since multiplication is just repeated addition, 4 times 0.3 is the same as 0.3 + 0.3 + 0.3 + 0.3. Use decimal squares to model the addition. 0.3 means 3 parts out of 10. Show that 4 times. Next, count up all the tenths: there are 3, 6, 9, 12 tenths. To write this as a decimal, regroup 10 tenths to make 1 whole. That gives 1 whole and 2 tenths, or 1.2 meters. What if you stack 3 bigger shelves that are each 2.53 feet tall? To find the height of this stack, multiply 2.53 by 3. 2.53 can be modeled as 2 wholes, 5 tenths, and 3 hundredths. To multiply by 3, add each number of units 3 times. This gives 6 wholes, 15 tenths, and 9 hundredths in all. Regroup 15 tenths as 1 whole and 5 tenths. The answer is 7 wholes, 5 tenths, and 9 hundredths, or 7.59 meters tall. To use estimation to check the answer, round 2.53 to 3. 3 × 3 = 9, which is close to the answer. To multiply a decimal by a decimal, such as 0.7 times 0.3, use a model to show 0.3 as 3 parts out of 10. To show 7 tenths of 3 tenths, split each tenth into 10 equal parts, and then color only 7 of the parts in each tenth. When tenths are split into 10 parts each, there are 100 pieces in the whole. That means that each of those small squares represents one hundredth. Each model shows 7 hundredths. There are 3 models to show the original 3 tenths. So the answer is 21 hundredths, or 0.21. Now you try: Multiply 4 by 2.61 meters. ### Pets
Adesina has a puppy and April and Marcos each have a rabbit. Adesina feeds her dog 3 times a day. She fed her dog 0.6 kg of food in one day. How much did she feed her dog for each meal? To find the answer, divide 0.6 by 3. Model 0.6 by showing 6 tenths, or 6 out of 10 parts of a whole. If 6 tenths is split into 3 equal groups, each group has 2 tenths in it. Then the answer is 0.2 kg. Marcos has 0.48 kg of rabbit food and needs to feed his rabbit 4 equal meals. To split 0.48 into 4 equal parts, show 0.48 as 4 tenths and 8 hundredths. If they are divided into 4 equal groups, each group contains 1 tenth and 2 hundredths, or 0.12 kg. Now you try: What is 0.72 kg divided by 6? Pets Adesina has a puppy and April and Marcos each have a rabbit. Adesina feeds her dog 3 times a day. She fed her dog 0.6 kg of food in one day. How much did she feed her dog for each meal? To find the answer, divide 0.6 by 3. Model 0.6 by showing 6 tenths, or 6 out of 10 parts of a whole. If 6 tenths is split into 3 equal groups, each group has 2 tenths in it. Then the answer is 0.2 kg. Marcos has 0.48 kg of rabbit food and needs to feed his rabbit 4 equal meals. To split 0.48 into 4 equal parts, show 0.48 as 4 tenths and 8 hundredths. If they are divided into 4 equal groups, each group contains 1 tenth and 2 hundredths, or 0.12 kg. Now you try: What is 0.72 kg divided by 6?
Practice Word Problems ----------------------
Practice Number Problems ------------------------
Teacher Resources ----------------- Create Free Account To Unlock
Teacher Resources -----------------
Lesson Plan
Download PDF
### Teacher Guide
Download PDF
### Answer Key
Download PDF
These downloadable teacher resources can help you create a full lesson around the video. These PDFs incorporate using class discussion questions, vocabulary lists, printable math worksheets, quizzes, games, and more.
Assessment
Online Quiz GameQuiz PDFExit Ticket
Explore Our Science Topics
Previous
Natural Resource Distribution
Human Impacts on the Environment
The Fossil Record
How To Be A Scientist (College & Careers)
Four Seasons and Day Length
Chemical vs. Physical Changes
Bacteria & Viruses
Who is Dr. Jeff?
Patterns in the Sky
Variation of Traits
Multicellular Organisms
Introduction to Sound
Balanced & Unbalanced Forces
Atoms & Molecules
What is Engineering?
Weathering & Erosion
Tectonic Plates
The Five Senses
Structure of Living Things
Solar & Lunar Eclipses
Introduction to Weather
Water Cycle (3-5 Version)
Chemical Reactions
Simple Machines
Properties of Matter
Natural Selection
Oceans, Lakes and Rivers
Earth’s Orbit & Rotation
Electricity & Circuits
Living vs. Non-Living Things
Fossils & Extinction
Electromagnetic Spectrum
Heating and Cooling
Energy Transfer
Plant & Animal Cells
Inspired by Nature (Biomimicry)
Sun and Other Stars
Causes of Seasons
Introduction to Light
Brain Processing of Senses
Symbiosis (Interactions Between Organisms)
Pollination and Seed Dispersal
Adaptations and the Environment
Electric & Magnetic Fields
Material Properties and Purposes
Collisions
Classification of Living Things
Gravity Pulls Things Down
Magnets & Static Electricity
Gravitational Forces Between Objects
Pushes and Pulls
Food Webs
Synthetic Materials
Introduction to Traits
Conservation of Matter
Competition in Ecosystems
Plant Growth Conditions
Ecosystems
Wave Reflection, Absorption & Transmittance
Animals Help Their Babies Survive
Patterns of Motion & Friction
Comparative Anatomy
Solids, Liquids and Gases
Renewable vs. Nonrenewable Resources
Engineering Design Process
Plants Need Water And Light
Human Body Systems
What is Science? (6-8 Version)
Biodiversity of Life on Earth
Natural Disasters
Intro to Thermal Energy
Sunlight Warms the Earth
Extreme Weather Solutions
Food Webs: Cycling of Matter & Flow of Energy
Habitats
How Do We Use Food
Properties of Elements
Parts of a Plant
Wave Properties
Water Cycle (6-8 Version)
Communication Over Distances
Moon & Its Phases
Potential vs. Kinetic Energy
Maps of Landforms
Interactions of Earth’s Spheres
Reproduction of Living Things
What Is Science? (K-2 Version)
Light Reflection & Vision
Genes & Mutations
Classification of Materials
Particle Nature of Matter
The Solar System
Natural Resources
Weather vs. Climate
Photosynthesis & Respiration
Changing the Shape of Land
Animal Group Behavior
Rocks & Minerals (Including Rock Cycle)
Reducing Our Impact on Earth
Information Transfer
Rock Layers (Geologic Time)
External Animal Parts
Earth’s Landscapes
Heat: Transfer of Thermal Energy
Living Things Change Their Environment
Animal & Plant Life Cycles
Biotechnology
Timescale of Earth’s Events
Water Quality & Distribution
Maintaining Biodiversity
Animals Need Food
What Is Science? (3-5 Version)
Predicting Natural Disasters
Digital vs. Analog Signals
Newton’s Laws of Motion
Climate Zones & Ocean Currents
Air Masses & Weather Fronts
Intro to Climate Change
Natural Resource Distribution
Human Impacts on the Environment
The Fossil Record
How To Be A Scientist (College & Careers)
Four Seasons and Day Length
Chemical vs. Physical Changes
Bacteria & Viruses
Who is Dr. Jeff?
Patterns in the Sky
Variation of Traits
Multicellular Organisms
Introduction to Sound
Balanced & Unbalanced Forces
Atoms & Molecules
What is Engineering?
Weathering & Erosion
Tectonic Plates
The Five Senses
Structure of Living Things
Solar & Lunar Eclipses
Introduction to Weather
Water Cycle (3-5 Version)
Chemical Reactions
Simple Machines
Properties of Matter
Natural Selection
Oceans, Lakes and Rivers
Earth’s Orbit & Rotation
Electricity & Circuits
Living vs. Non-Living Things
Fossils & Extinction
Electromagnetic Spectrum
Heating and Cooling
Energy Transfer
Plant & Animal Cells
Inspired by Nature (Biomimicry)
Sun and Other Stars
Causes of Seasons
Introduction to Light
Brain Processing of Senses
Symbiosis (Interactions Between Organisms)
Pollination and Seed Dispersal
Adaptations and the Environment
Electric & Magnetic Fields
Material Properties and Purposes
Collisions
Classification of Living Things
Gravity Pulls Things Down
Magnets & Static Electricity
Gravitational Forces Between Objects
Pushes and Pulls
Food Webs
Synthetic Materials
Introduction to Traits
Conservation of Matter
Competition in Ecosystems
Plant Growth Conditions
Ecosystems
Wave Reflection, Absorption & Transmittance
Animals Help Their Babies Survive
Patterns of Motion & Friction
Comparative Anatomy
Solids, Liquids and Gases
Renewable vs. Nonrenewable Resources
Engineering Design Process
Plants Need Water And Light
Human Body Systems
What is Science? (6-8 Version)
Biodiversity of Life on Earth
Natural Disasters
Intro to Thermal Energy
Sunlight Warms the Earth
Extreme Weather Solutions
Food Webs: Cycling of Matter & Flow of Energy
Habitats
How Do We Use Food
Properties of Elements
Parts of a Plant
Wave Properties
Water Cycle (6-8 Version)
Communication Over Distances
Moon & Its Phases
Potential vs. Kinetic Energy
Maps of Landforms
Interactions of Earth’s Spheres
Reproduction of Living Things
What Is Science? (K-2 Version)
Light Reflection & Vision
Genes & Mutations
Classification of Materials
Particle Nature of Matter
The Solar System
Natural Resources
Weather vs. Climate
Photosynthesis & Respiration
Changing the Shape of Land
Animal Group Behavior
Rocks & Minerals (Including Rock Cycle)
Reducing Our Impact on Earth
Information Transfer
Rock Layers (Geologic Time)
External Animal Parts
Earth’s Landscapes
Heat: Transfer of Thermal Energy
Living Things Change Their Environment
Animal & Plant Life Cycles
Biotechnology
Timescale of Earth’s Events
Water Quality & Distribution
Maintaining Biodiversity
Animals Need Food
What Is Science? (3-5 Version)
Predicting Natural Disasters
Digital vs. Analog Signals
Newton’s Laws of Motion
Climate Zones & Ocean Currents
Air Masses & Weather Fronts
Intro to Climate Change
Natural Resource Distribution
Human Impacts on the Environment
The Fossil Record
How To Be A Scientist (College & Careers)
Next
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Explore Our Science Topics
Four Seasons and Day Length
Chemical vs. Physical Changes
Bacteria & Viruses
Who is Dr. Jeff?
Patterns in the Sky
Variation of Traits
Multicellular Organisms
Introduction to Sound
Balanced & Unbalanced Forces
Atoms & Molecules
What is Engineering?
Weathering & Erosion
Tectonic Plates
The Five Senses
Structure of Living Things
Solar & Lunar Eclipses
Introduction to Weather
Water Cycle (3-5 Version)
Chemical Reactions
Simple Machines
Properties of Matter
Natural Selection
Oceans, Lakes and Rivers
Earth’s Orbit & Rotation
Electricity & Circuits
Living vs. Non-Living Things
Fossils & Extinction
Electromagnetic Spectrum
Heating and Cooling
Energy Transfer
Plant & Animal Cells
Inspired by Nature (Biomimicry)
Sun and Other Stars
Causes of Seasons
Introduction to Light
Brain Processing of Senses
Symbiosis (Interactions Between Organisms)
Pollination and Seed Dispersal
Adaptations and the Environment
Electric & Magnetic Fields
Material Properties and Purposes
Collisions
Classification of Living Things
Gravity Pulls Things Down
Magnets & Static Electricity
Gravitational Forces Between Objects
Pushes and Pulls
Food Webs
Synthetic Materials
Introduction to Traits
Conservation of Matter
Competition in Ecosystems
Plant Growth Conditions
Ecosystems
Wave Reflection, Absorption & Transmittance
Animals Help Their Babies Survive
Patterns of Motion & Friction
Comparative Anatomy
Solids, Liquids and Gases
Renewable vs. Nonrenewable Resources
Engineering Design Process
Plants Need Water And Light
Human Body Systems
What is Science? (6-8 Version)
Biodiversity of Life on Earth
Natural Disasters
Intro to Thermal Energy
Sunlight Warms the Earth
Extreme Weather Solutions
Food Webs: Cycling of Matter & Flow of Energy
Habitats
How Do We Use Food
Properties of Elements
Parts of a Plant
Wave Properties
Water Cycle (6-8 Version)
Communication Over Distances
Moon & Its Phases
Potential vs. Kinetic Energy
Maps of Landforms
Interactions of Earth’s Spheres
Reproduction of Living Things
What Is Science? (K-2 Version)
Light Reflection & Vision
Genes & Mutations
Classification of Materials
Particle Nature of Matter
The Solar System
Natural Resources
Weather vs. Climate
Photosynthesis & Respiration
Changing the Shape of Land
Animal Group Behavior
Rocks & Minerals (Including Rock Cycle)
Reducing Our Impact on Earth
Information Transfer
Rock Layers (Geologic Time)
External Animal Parts
Earth’s Landscapes
Heat: Transfer of Thermal Energy
Living Things Change Their Environment
Animal & Plant Life Cycles
Biotechnology
Timescale of Earth’s Events
Water Quality & Distribution
Maintaining Biodiversity
Animals Need Food
What Is Science? (3-5 Version)
Predicting Natural Disasters
Digital vs. Analog Signals
Newton’s Laws of Motion
Climate Zones & Ocean Currents
Air Masses & Weather Fronts
Intro to Climate Change
Natural Resource Distribution
Human Impacts on the Environment
The Fossil Record
How To Be A Scientist (College & Careers)
Show More Show Less
Select a Google Form
#### Paper Quiz
Make a Copy
#### Discussion Questions
Make a Copy
#### Exit Ticket
Make a Copy
Choose a way to play this quiz game
Kahoot - Best For In Class
Play live in class Questions appear on the teacher's screen. Students answer on their own devices.
Exciting News:
GENERATION GENIUS
JOINED THE NEWSELA FAMILY!
LEARN MORE!
Our Science Videos Are Produced In Partnership with:
Our Math Videos Are Produced In Partnership with:
Standards AlignmentPlans & Pricing
Science
Math
Standards
Activities
Pricing
Definitions
About
Privacy
Blog
Terms
Help
Accessibility
© 2025 Generation Genius, Inc. A Public Benefit Corporation.
Start a Free Trial Today. Get a $5 Amazon Gift Card!
Teachers! Start a free trial & we'll send your gift card within 1 day. Only cards left. Try it now.
Special Bonus: Get a $5 Amazon gift card within 1 day if you join now. Only left.
X
Login To
Watch Videos
Username or email
Password SHOW
By signing into Generation Genius, you agree to our Terms and Privacy Policy
Forgot Password?
Don't Have an Account?
Subscribe
X
Reset Your Password
Email Address
Back to Login
X
Success
We’ve sent you an email with instructions how to reset your password.
Ok
X
Science Kit Users
This email is associated with a Science Kit subscription. Kit subscriptions are managed on this separate page: Manage Subscription
Back to Login
x
Oh-no, Your Free Trial Has Expired
We hope you enjoyed using Generation Genius!
Extend Your Trial for 24-Hours
One-time use only
Extend My Trial
MAR PROMO OFFER ENDS MARCH 31, 2023
Half Price for the Rest of the School Year!
Access for the rest of this school year (now - Aug 31, 2025)
View Plans & Pricing
Choose a Renewal Option
Science & Math $/yr Download Invoice
Science Only $/yr Download Invoice
X
Enter your PIN
For account admin access.
Please contact us if you need help.
Account manager
4-Digit PIN
Account email
Manage AccountSend PIN by EmailForgot PIN?Back to PIN Entry
Success
We’ve sent you an email with your 4-digit PIN.
Ok
X
Authorize Charge
Confirm your account PIN to authorize upgrading your plan to Science & Math for +$600/yr.
Account manager
4-Digit PIN
Confirm
X
Exit Ticket
Level 1
Add: 3.14 + 4.53
Level 2
Subtract: 6.47 – 2.19
Level 3
Multiply: 0.31 × 0.8
×
Choose a role
No credit card required.
School Continue
Home Continue
×
Login
Create a free account to
access all lessons
• No credit card required •
Please select your role...
Teacher
Principal or School Admin
District-level
Parent
Student
SHOW
[x] I agree to receive emails about my Generation Genius trial.
By creating a Generation Genius account, you agree to our Terms and Privacy Policy
Watch Now
Already a member? Sign In
×
"My students loved the videos. I started the video subscription in May and used them as a review before the state test, which I know contributed to 100% of my class passing the state test."
Rhonda Fox4th Grade Teacher, Ocala, Florida
Login
Try it FREE!
Use Generation Genius in Your School
Access all lessons free for 30 days.
Please select your role...
Teacher
Principal or School Admin
District-level
Student
SHOW
District State
Alabama
Alaska
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of Columbia
Florida
Georgia
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Maryland
Massachusetts
Michigan
Minnesota
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
North Carolina
North Dakota
Ohio
Oklahoma
Oregon
Pennsylvania
Rhode Island
South Carolina
South Dakota
Tennessee
Texas
Utah
Vermont
Virginia
Washington
West Virginia
Wisconsin
Wyoming
International
[x] I agree to receive emails about my Generation Genius trial.
Watch Now
By creating a Generation Genius account, you agree to our Terms and Privacy Policy
×
"My students loved the videos. I started the video subscription in May and used them as a review before the state test, which I know contributed to 100% of my class passing the state test."
Rhonda Fox4th Grade Teacher, Ocala, Florida
Login
Get Free Access to 5 Videos
• No credit card required •
[x] I agree to receive emails about my Generation Genius trial.
Watch Now
By creating a Generation Genius account, you agree to our Terms and Privacy Policy
Create a free account to continue watching
Teacher
Parent
Student
Facebook/Instagram
Pinterest
Web Search
Email
YouTube
TV Commercial
Podcast
TikTok
Other
Continue Watching
Already a member? Sign In
×
Create a FREE account to get instant access!
no credit card required
Choose Your Role
Teacher
Parent
Student
SHOW
Please choose an option.
I want access to everything!
Already a member? Login
×
Create a FREE account to get instant access!
no credit card required
Teacher
Parent
Student
SHOW
Please choose an option.
I want access to everything!
Already a member? Login
Choose a role to continue watching
Teacher
Parent
Student
Already a member? Sign In
×
Create a FREE account to get full access!
no credit card required
Choose Your Role
Teacher
Parent
Student
SHOW
Please choose an option.
[x] I agree to receive emails about my Generation Genius trial.
I want access to everything!
Already a member? Login
×
Subscribe to our monthly newsletter
You have subscribed to our monthly newsletter!
Please enter a valid email
Subscribe Now
×
Answer Keys Available to Paid Users
Please subscribe to unlock all answer keys.
Subscribe Now Already a Subscriber? Sign In
×
Get District Quote
Discounts start at 3 schools.
By submitting your information to us you acknowledge that you have reviewed, and agree to our Terms and Privacy Policy
Sent!
Thank you for your inquiry.
We will email you a quote as soon as we can.
×
Schedule a 15-min Call
to Discover the Benefits of Generation Genius
Learn How to Save for Your School & District!
SKIP
×
Teacher Resources are not available
Please login or create an account to access additional resources
Log InView Plans
Generation Genius joined the Newsela, Inc. family this year!
We've updated our Terms of Use and Privacy Policy for our evolving business and new features.
By selecting the “Agree” button below, you acknowledge that you have reviewed and accepted the Terms of Use and Privacy Policy.
Agree
x
Choose Your Free Trial Period
3 Days
3 days to access to all of our teaching resources for free.
Continue to Lessons
30 Days
Get 30 days free by inviting other teachers to try it too.
Share with Teachers
Choose your free trial period
no credit card required
3 Days Enjoy 3 days of full access to all of our teaching resources for free.30 Days Get 30 days free by inviting other teachers to try it too.
Get 30 Days Free
By inviting 4 other teachers to try it too.
Your name
Teachers email addresses 4 required
only school emails accepted.
Share & Extend Instantly
Skip, I will use a 3 day free trial
Thank You!
Enjoy your free 30 days trial
1
2
Account Information
Billing Information
Start Your Free Trial
Free for 14 days, then only $10 CAD/month.
Unlimited access to our full library
of videos & lessons for grades K-5.
You won’t be billed unless you keep your
account open past your 14-day free trial.
You can cancel anytime in 1 click on the
manage account page or by emailing us.
Unlimited access to our full library of videos & lessons for grades K-5.
You won't be billed unless you keep your account open past 14 days.
You can cancel anytime in 1-click on the manage account page.
SHOW
Next
1
2
Account Information
Billing Information
You won’t be billed unless you keep your account open past your 14-day free trial (October 10, 2025).
Cancel anytime in 1-click on the manage account page before the trial ends and you won't be charged.
Otherwise you will pay just $10 CAD/month for the service as long as your account is open.
Cancel anytime on the manage account page in 1-click and you won't be charged.
Otherwise you will pay $10 CAD/month for the service as long as your account is open.
[x] I agree to the Terms of Services and Privacy Policy.
Start free trial
Your free trial is now active!
You are now logged in as: username
We just sent you a confirmation email. Enjoy!
Done
Members Only.
Please login or join.
Try it Free
Login to My Account
Help. My teacher gave me this link.
For full access to this video, please ask your teacher for a student link.
X
Sorry, student links are only for school & district accounts.
If you upgrade to a school account, we will fully reimburse your individual plan. School accounts give all students and all teachers unlimited access, both in school and at home.
View PlansClose
Please login to generate a student link.
LoginTry it Free
Generate Student Link
Share this link with your students to go right to this lesson without needing an account. Links active for 30 days.
Copy
Show lesson plan & teacher guide- [x]
Show answers to discussion questions- [x]
Show video only- [x]
Allow visiting of other pages- [x]
Hide assessments- [x]
Close this box
Generation Genius uses cookies to enhance user experience and to analyze performance and ensure proper functioning of our website. By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. See our Cookie Policy for more information or visit our preference center to change your cookie settings.Cookie Policy.
Cookies Settings
Reject All Accept All Cookies
Privacy Preference Center
When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
More information
Allow All
Manage Consent Preferences
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Targeting Cookies
[x] Targeting Cookies
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Reject All Confirm My Choices |
2035 | https://www.cell.com/immunity/fulltext/S1074-7613(94)80021-9 | Skip to Main Content
Skip to Main Menu
Life & medical sciences journals
Cell
Cancer Cell
Cell Chemical Biology
Cell Genomics
Cell Host & Microbe
Cell Metabolism
Cell Reports
Cell Reports Medicine
Cell Stem Cell
Cell Systems
Current Biology
Developmental Cell
Immunity
Med
Molecular Cell
Neuron
Structure
American Journal of Human Genetics (partner)
Biophysical Journal (partner)
Biophysical Reports (partner)
Human Genetics and Genomics Advances (partner)
Molecular Plant (partner)
Molecular Therapy (partner)
Molecular Therapy Methods & Clinical Development (partner)
Molecular Therapy Nucleic Acids (partner)
Molecular Therapy Oncology (partner)
Plant Communications (partner)
Stem Cell Reports (partner)
Trends in Biochemical Sciences
Trends in Cancer
Trends in Cell Biology
Trends in Ecology & Evolution
Trends in Endocrinology & Metabolism
Trends in Genetics
Trends in Immunology
Trends in Microbiology
Trends in Molecular Medicine
Trends in Neurosciences
Trends in Parasitology
Trends in Pharmacological Sciences
Trends in Plant Science
Physical sciences & engineering journals
Cell Biomaterials
Cell Reports Physical Science
Chem
Chem Catalysis
Chem Circularity
Device
Joule
Matter
Newton
Trends in Chemistry
Multidisciplinary journals
Cell Reports Methods
Cell Reports Sustainability
Heliyon
iScience
One Earth
Patterns
STAR Protocols
Nexus (partner)
The Innovation (partner)
Trends in Biotechnology
Trends in Cognitive Sciences
Authors
Submit article
Multi-Journal Submission
STAR Methods
Sneak Peek – Preprints
Reviewers
Information for reviewers
News & events
Newsroom
Events
Cell Symposia
Consortia Hub
Webinars
Multimedia
Cell Press Podcast
Cell Press Videos
Coloring and Comics
Cell Picture Show
Research Arc
About
About Cell Press
Open access
COVID Hub
Sustainability hub
Inclusion and diversity
Careers
Cell Press Careers
Access
Subscribe
Claim
Read-It-Now
Recommend to Librarian
Publication Alerts
Collections
Best of Cell Press
Cell Press Reviews
Cell Press Selections
Nucleus Collections
SnapShot Archive
Information
For Librarians
The content on this site is intended for healthcare professionals and researchers across all fields of science.
We use cookies to help provide and enhance our service and tailor content. To update your cookie settings, please visit the
for this site.
All content on this site: Copyright © 2025 Elsevier Inc., its licensors, and contributors.
All rights are reserved, including those for text and data mining, AI training, and similar technologies.
For all open access content, the relevant licensing terms apply.
Privacy Policy
Terms & Conditions
Accessibility
Help & Support
Contact |
2036 | https://remote2.ece.illinois.edu/~erhan/FieldsWaves/secure/notes/ECE450Sp10/350lect09.pdf | 9 Poynting vector, radiated power, radiation re-sistance Consider the radiation fields of a ˆ z-polarized short-dipole antenna shown in the margin in a compact form.
x y z θ φ r ˜ I(z) ˜ E = ˆ θ ˜ Eθ ˜ H = ˆ φ ˜ Hφ ˜ E × ˜ H∗ Radiation fields of short dipole: ˜ E = ˜ Eθˆ θ and ˜ H = ˜ Eθ ηo ˆ φ where ˜ Eθ = jηoIokℓsin θe−jkr 4πr and ℓ= L/2.
• How much average power is radiated by the short-dipole antenna to sustain these fields, and • how can we determine this amount, Prad, by electrical measurements which can be performed at the antenna input port — the small gap at the dipole center where the dipole is connected to the source circuit (typically via some transmission line network)?
To answer these questions we will calculate in this lecture the average Poynting vector of radiation fields of the dipole antenna and the “flux” of the same vector computed over a sphere imagined to surround the dipole.
• Recall once again that Poynting vector S ≡E × H denotes the energy transported by electromagnetic fields per unit time and per unit area normal to the vector itself. With time-harmonic fields the average value of Poynting vector can be denoted and computed as ⟨E × H⟩= 1 2Re{˜ E × ˜ H∗} in terms of field phasors ˜ E and ˜ H.
1 • It is this quantity ⟨S⟩= ⟨E × H⟩ which is independent of the storage fields of dipole antennas and only depend on their radiation fields.
• Using (see margin once again) x y z θ φ r ˜ I(z) ˜ E = ˆ θ ˜ Eθ ˜ H = ˆ φ ˜ Hφ ˜ E × ˜ H∗ Radiation fields of short dipole: ˜ E = ˜ Eθˆ θ and ˜ H = ˜ Eθ ηo ˆ φ where ˜ Eθ = jηoIokℓsin θe−jkr 4πr and ℓ= L/2.
˜ E = ˆ θ ˜ Eθ and ˜ H = ˆ φ ˜ Eθ ηo with ˜ Eθ = jηoIkℓsin θe−jkr 4πr , we find ˜ E × ˜ H∗= ˆ θ ˜ Eθ × (ˆ φ ˜ Eθ ηo )∗= ˆ θ × ˆ φ| ˜ Eθ|2 ηo = ˆ r|˜ E|2 ηo and ⟨E × H⟩= 1 2Re{˜ E × ˜ H∗} = ˆ r|˜ E|2 2ηo .
• Since |˜ E|2 = | ˜ Eθ|2 = η2 o|Io|2k2|ℓ|2 sin2 θ (4πr)2 = η2 o|Io|2|ℓ|2 sin2 θ 4(λr)2 , we have ⟨E × H⟩= ˆ r|˜ E|2 2ηo = ηo 8 |Io|2 |ℓ|2 (λr)2 sin2 θˆ r.
• The expression above is the energy flux density or transmitted power density of the dipole antenna as a function of distance r from the dipole and angle θ of viewing direction offthe dipole axis.
2 • The average power output of the dipole — radiated power Prad — can next be obtained by computing the flux of ⟨E × H⟩over any closed surface surrounding the dipole.
x y z φ θ r r sin θ dr rdθ r sin θdφ Infinitesimal area on a con-stant r surface is dS = (rdθ)(r sin θdφ) = r2dΩ where dΩ≡sin θdθdφ is called infinitesimal solid angle.
– This calculation is most easily carried out over a spherical surface of radius r having infinitesimal surface elements dS = ˆ r(r sin θdφ)(rdθ) = ˆ rr2 sin θdθdφ ≡ˆ rr2dΩ, where dΩ≡sin θdθdφ (introduced to maintain a compact notation) is called a solid an-gle increment.
We then note that ⟨E × H⟩· dS = ηo 8λ2|Io|2|ℓ|2 sin2 θdΩ and the flux of ⟨E × H⟩is !
⟨E × H⟩· dS " #$ % = ηo 8λ2|Io|2 & dΩ|ℓ|2 sin2 θ Prad where it is implied that & dΩ= & 2π φ=0 dφ & π θ=0 dθ sin θ.
3 – This result can be cast as Prad = 1 2Rrad|Io|2 where Rrad = ηo 4λ2 & dΩ|ℓsin θ|2 is known as radiation resistance.
• If ℓis the effective length of a dipole — distinct from its physical length L because of current weighting — then ℓsin θ is “how long the effective length looks” when one sees it (the dipole) at an angle (see margin).
Solid angle integral of the square of this “foreshortened” effective length, namely x z θ φ r ℓsin 90◦ ℓsin θ ℓ Note: recall that ℓmay be a function of θ itself!
& dΩ|ℓsin θ|2, determines the radiation resistance of the dipole antenna.
Since for a short dipole ℓ= L 2 is independent of angle θ (unlike for half-wave dipole), we have & dΩ|ℓsin θ|2 = (L 2 )2 & dΩ| sin θ|2 = (L 2 )2 & 2π 0 dφ & π 0 dθ sin θ| sin θ|2 = (L 2 )22π & π 0 dθ sin θ| sin θ|2 " #$ % = 2πL2 3 .
4/3 Hence the radiation resistance of the short dipole is Rrad = ηo 4λ2 & dΩ|ℓsin θ|2 = ηo 4λ2 2πL2 3 = 20π2(L λ)2 Ω.
4 • Since a short dipole is constrained to have L λ ≪1, say 1 10 or smaller, Rrad will be equal to or less than about 2 Ω.
• Thus, a short dipole with an input current of ˜ I(0) = Io = 1 A will have at best an average power output 1 2I2 oRrad of about 1 W.
This is not quite at the level of 100s of W’s of power that typical radio stations transmit!
Using antennas with higher Rrad than a short dipole1 — e.g., a half-wave dipole for which Rrad ≈73 Ω— is the best way of addressing this difficulty since the alternate solution of increasing Io (as needed) is not recommended because of antenna losses: – In practice, antennas appear as a circuit element with input resis-tance Ro = Rrad + Rloss where Rloss represents ohmic losses (heating of antenna wires) — an antenna consumes an average power of 1 2I2 o(Rrad + Rloss) out of which only 1 2I2 oRrad 1Short dipoles are typically employed as receiving antennas rather than transmitting antennas because of this. Receiving properties of antennas are closely related to their transmission properties, but figures of merit of antennas pertinent in transmission and reception are somewhat different as we will learn later on in the course.
5 is the useful radiated power.
Typically Rloss ∝L, whereas Rrad ∝L2 for small L, so going to longer dipoles (and learning more about them in ECE 454) really helps.
• A source circuit connected to the antenna terminals “sees” the antenna (and the radiation volume with which the antenna interacts) as a two-terminal element having some impedance + -Source Circuit Antenna ZT ˜ I(0) = Io ˜ VT Zo = Ro + jXo ˜ Vo + -Zo ≡ ˜ Vo ˜ I(0) = Ro + jXo known as antenna impedance.
Antenna reactance: Short dipoles have capacitive reactances, just like the line-impedance at a small dis-tance away from an open ter-mination on a transmission line.
Capacitive reactance switches to an inductive one when the dipole length is about λ/2, just like the line-impedance at a distance λ/4 away from an open termination.
Thus the half-wave dipole is resonant, having a zero input reactance — Zo = Rrad +j0 for an ideal half-wave dipole.
In practice, resonant half-wave dipole with a length L and wire radius a has L+2a = λ/2 to a good approximation.
– We have already discussed the resistive component Ro above.
– Modeling the reactive component Xo requires working with storage fields of the antenna as well, matching components of total fields to proper boundary conditions imposed by the actual sur-faces of antenna wires (i.e., antenna geometry needs to be specified in detail before Xo can be determined).
Antenna reactance will be examined in some detail in ECE 454 (along with methods of calculating ˜ I(z)).
– We will not need to calculate antenna reactances in this course.
However, it is worth mentioning that 1. antennas with Xo = 0 are known as resonant antennas, and 2. half-wave dipole is a resonant antenna (see margin note).
6 |
2037 | https://www.teacherspayteachers.com/browse?search=percent%20worksheets | Percent Worksheets | TPT
Log InSign Up
Cart is empty
Total:
$0.00
View Wish ListView Cart
Grade
Elementary
Preschool
Kindergarten
1st grade
2nd grade
3rd grade
4th grade
5th grade
Middle school
6th grade
7th grade
8th grade
High school
9th grade
10th grade
11th grade
12th grade
Adult education
Resource type
Student practice
Independent work packet
Worksheets
Assessment
Graphic organizers
Task cards
Flash cards
Teacher tools
Classroom management
Teacher manuals
Outlines
Rubrics
Syllabi
Unit plans
Lessons
Activities
Games
Centers
Projects
Laboratory
Songs
Clip art
Classroom decor
Bulletin board ideas
Posters
Word walls
Printables
Seasonal
Holiday
Black History Month
Christmas-Chanukah-Kwanzaa
Earth Day
Easter
Halloween
Hispanic Heritage Month
Martin Luther King Day
Presidents' Day
St. Patrick's Day
Thanksgiving
New Year
Valentine's Day
Women's History Month
Seasonal
Autumn
Winter
Spring
Summer
Back to school
End of year
ELA
ELA by grade
PreK ELA
Kindergarten ELA
1st grade ELA
2nd grade ELA
3rd grade ELA
4th grade ELA
5th grade ELA
6th grade ELA
7th grade ELA
8th grade ELA
High school ELA
Elementary ELA
Reading
Writing
Phonics
Vocabulary
Grammar
Spelling
Poetry
ELA test prep
Middle school ELA
Literature
Informational text
Writing
Creative writing
Writing-essays
ELA test prep
High school ELA
Literature
Informational text
Writing
Creative writing
Writing-essays
ELA test prep
Math
Math by grade
PreK math
Kindergarten math
1st grade math
2nd grade math
3rd grade math
4th grade math
5th grade math
6th grade math
7th grade math
8th grade math
High school math
Elementary math
Basic operations
Numbers
Geometry
Measurement
Mental math
Place value
Arithmetic
Fractions
Decimals
Math test prep
Middle school math
Algebra
Basic operations
Decimals
Fractions
Geometry
Math test prep
High school math
Algebra
Algebra 2
Geometry
Math test prep
Statistics
Precalculus
Calculus
Science
Science by grade
PreK science
Kindergarten science
1st grade science
2nd grade science
3rd grade science
4th grade science
5th grade science
6th grade science
7th grade science
8th grade science
High school science
By topic
Astronomy
Biology
Chemistry
Earth sciences
Physics
Physical science
Social studies
Social studies by grade
PreK social studies
Kindergarten social studies
1st grade social studies
2nd grade social studies
3rd grade social studies
4th grade social studies
5th grade social studies
6th grade social studies
7th grade social studies
8th grade social studies
High school social studies
Social studies by topic
Ancient history
Economics
European history
Government
Geography
Native Americans
Middle ages
Psychology
U.S. History
World history
Languages
Languages
American sign language
Arabic
Chinese
French
German
Italian
Japanese
Latin
Portuguese
Spanish
Arts
Arts
Art history
Graphic arts
Visual arts
Other (arts)
Performing arts
Dance
Drama
Instrumental music
Music
Music composition
Vocal music
Special education
Speech therapy
Social emotional
Social emotional
Character education
Classroom community
School counseling
School psychology
Social emotional learning
Specialty
Specialty
Career and technical education
Child care
Coaching
Cooking
Health
Life skills
Occupational therapy
Physical education
Physical therapy
Professional development
Service learning
Vocational education
Other (specialty)
Percent Worksheets
8,700+results
Sort by: Relevance
Relevance
Rating
Rating Count
Price (Ascending)
Price (Descending)
Most Recent
Sort by: Relevance
Relevance
Rating
Rating Count
Price (Ascending)
Price (Descending)
Most Recent
Search
Grade
Subject
Supports
Price
Format
All filters
Filters
Grade
Elementary
Preschool
Kindergarten
1st grade
2nd grade
3rd grade
4th grade
5th grade
Middle school
6th grade
7th grade
8th grade
High school
9th grade
10th grade
11th grade
12th grade
Higher education
Adult education
More
Not grade specific
Subject
Art
Coloring pages
Graphic arts
Visual arts
Other (arts)
English language arts
Alphabet
Balanced literacy
Close reading
Creative writing
ELA test prep
Grammar
Handwriting
Informational text
Literature
Phonics & phonological awareness
Poetry
Reading
Reading strategies
Science of reading
Sight words
Spelling
Vocabulary
Writing
Writing-essays
Writing-expository
Other (ELA)
Health
Math
Algebra
Algebra 2
Applied math
Arithmetic
Basic operations
Calculus
Decimals
Financial literacy
Fractions
Geometry
Graphing
Math test prep
Measurement
Mental math
Money math
Numbers
Order of operations
Place value
Precalculus
Statistics
Telling time
Other (math)
Performing arts
Music
More
Physical education
Science
Anatomy
Astronomy
Basic principles
Biology
Chemistry
Computer science - technology
Earth sciences
Engineering
Environment
Family consumer sciences
General science
Instructional technology
Physical science
Physics
Other (science)
Social emotional
Character education
Classroom community
School psychology
Social emotional learning
Social studies
African history
Ancient history
Black history
Business
Canadian history
Civics
Criminal justice - law
Economics
Elections - voting
European history
Geography
Government
Latino and Hispanic studies
Psychology
U.S. history
World history
Other (social studies)
Speaking & listening
World languages
French
Latin
Spanish
Other (world language)
For all subjects
Price
Free
Under $5
$5-10
$10 and up
On sale
Format
Digital
Canva
Other (digital)
Easel
Easel Activities
Easel Assessments
Google Apps
Image
Interactive whiteboards
Activboard Activities
SMART Notebook
More
Microsoft
Microsoft Excel
Microsoft OneDrive
Microsoft PowerPoint
Microsoft Publisher
Microsoft Word
PDF
Video
Resource type
Classroom decor
Bulletin board ideas
Posters
Word walls
Forms
Classroom forms
Professional documents
Teacher tools
Lessons
Awards and certificates
Classroom management
Homeschool curricula
Lectures
Outlines
Reflective journals for teachers
Rubrics
Teacher manuals
Teacher planners
Thematic unit plans
Tools for common core
Tools for sellers
Unit plans
Yearlong curriculum
Printables
Clip art
More
Hands-on activities
Activities
Centers
Projects
Internet activities
Bell ringers
Cultural activities
DBQs
Escape rooms
Games
Laboratory
Literature circles
Project-based learning
Research
Scripts
Simulations
Songs
WebQuests
Instruction
Guided reading books
Handouts
Interactive notebooks
Scaffolded notes
Student assessment
Assessment
Critical thinking and problem solving
Study guides
Study skills
Test preparation
Student practice
Independent work packet
Worksheets
Flash cards
Graphic organizers
Homework
Movie guides
Task cards
Workbooks
Standard
Theme
Seasonal
Autumn
Back to school
End of year
Spring
Summer
Winter
Holiday
Arbor Day
Black history month
Christmas-Chanukah-Kwanzaa
Cinco de Mayo
Earth Day
Easter
Halloween
Hispanic heritage month
July 4/Independence Day
Labor Day
Martin Luther King Day
Memorial Day
New Year
Presidents' Day
St. Patrick's Day
Thanksgiving
Valentine's Day
Veterans' Day
More
Audience
TPT sellers
Homeschool
Parents
Staff & administrators
More
Language
En español
En français
English (UK)
More
Programs & methods
Programs
Advanced Placement (AP)
Early intervention
GATE / Gifted and Talented
International Baccalaureate (IB)
Montessori
More
Supports
ESL, EFL, and ELL
Special education
Data
Life skills
Neurodiversity
Screenings and assessments
Visual supports
Other (special education)
Specialty
Career and technical education
Coaching
Cooking
Leadership
Occupational therapy
Physical therapy
Service learning
Vocational education
Other (specialty)
Speech therapy
Fluency and stuttering
More
Percent of a Number Math Activity - Percent Coloring Worksheet
Created by
Beyond the Worksheet with Lindsay Gould
⭐️⭐️⭐️This Percent of a Number Coloring Worksheet is a dynamic resource designed to help students master the concept of finding percents in a fun and interactive way. This worksheet is perfect for a 30-minute class activity, providing a creative twist to math lessons during the holiday season. By solving problems to find the percent of a number and coloring based on their answers, students reinforce their understanding through visual learning. This resource focuses on finding the percent of a
6 th - 10 th
Math, Other (Math)
CCSS
6.RP.A.3c
Also included in:6th Grade Math Curriculum Supplemental Activities Bundle
$2.00
Original Price $2.00
Rated 4.86 out of 5, based on 614 reviews
4.9(614)
Add to cart
Wish List
Part Whole Percent Word Problem Worksheets 6th Grade
Created by
Simone's Math Resources
Part Whole Percent Word Problem Worksheets 6th Grade Included:6 worksheets with answer keys. More PercentsPercent Problems Task Cards Percent Word Problems Scavenger Hunt Bingo Common Core State Standards6.RP.3c Use ratio and rate reasoning to solve real-world and mathematical problems, Find a percent of a quantity as a rate per 100 (e.g., 30% of a
6 th
Math, Other (Math)
Also included in:Part, Whole, or Percent Word Problems Bundle
$3.00
Original Price $3.00
Rated 4.85 out of 5, based on 112 reviews
4.9(112)
Add to cart
Wish List
Fraction Decimal Percent Conversion Chart Practice Worksheet
Created by
Rise over Run
Practice converting fractions, decimals, and percentages with this print & go worksheet. This activity has 15 rows of problems. Each one provides a percent, decimal, or fraction for students to fill in the equivalent values. All percentages are whole numbers. The download includes 1 page handout + answer key. Understanding how fractions, decimals, percents relate is an important concept for students to grasp to understand middle school and high school math. Extra practice in this area is o
5 th - 7 th
Decimals, Fractions, Math
Also included in:8th Grade Math Foundation Skills for Beginning of the Year First Week of School
$1.50
Original Price $1.50
Rated 4.87 out of 5, based on 122 reviews
4.9(122)
Add to cart
Wish List
Converting Fractions, Decimals, Percents Math Coloring by Number Worksheets
Created by
Cognitive Cardio Math
Converting fractions, decimals, and percentages is always more fun when there's some coloring! In this set of easy-prep, paper and digital color by number activities, students solve 20 problems, self-check, and color. Students will immediately know whether or not they solved correctly - if their answer is incorrect, they won't find it on the coloring sheet! Great for centers, sub days, assessments, fun days, or fast finishers!Check out the Preview above to see how the digital version works (stu
6 th - 7 th
Decimals, Fractions
Also included in:6th Grade Math Warm Ups, Anchor Charts, Math Wheel Note Taking, Units, Test Prep
$4.25
Original Price $4.25
Rated 4.81 out of 5, based on 220 reviews
4.8(220)
Add to cart
Wish List
Fractions Decimals Percents (Fun Games Worksheets and Activities)
Created by
Miss Giraffe
Fractions decimals percents math centers, worksheets, and activities to make this concept fun! Let's Roll is a great center game where students roll 2 dice to get the percent (ex: rolling a 3 and 4 would be 34%) and converting it to a fraction, a decimal, and filling in a decimal model. Recording sheet, student directions, and teacher directions are included. Match It! is a math center where students match the 4 pieces of each puzzle and then fill out their recording sheet. I have included 10 p
3 rd - 5 th
Decimals, Fractions, Math
$4.00
Original Price $4.00
Rated 4.83 out of 5, based on 1202 reviews
4.8(1.2K)
Add to cart
Wish List
Converting Fractions, Decimals, and Percents Cut and Paste Worksheet Activity
Created by
Math With Meaning
Students will practice converting between fractions, decimals, and percents with this fun activity! Students will find the equivalent fraction, decimal, and percent to complete each row of the table. They will then then find their answer from the answer choices at the bottom and glue it in the appropriate place. Please view the preview file to see make sure that this activity is appropriate for your students. An answer key is included. Please note that this activity is NOT editable. The text, p
5 th - 8 th
Decimals, Fractions, Math
Also included in:6th Grade Math Printable Activities Mega Bundle - 37 Activities
$1.50
Original Price $1.50
Rated 4.81 out of 5, based on 98 reviews
4.8(98)
Add to cart
Wish List
Fractions, Decimals, Percents Worksheets 6th, 7th Grade Math Task Cards Activity
Created by
Cognitive Cardio Math
Use this Converting Fractions, Decimals, and Percents Footloose math task card activity to get students moving while they are reviewing concepts! Footloose can be used with the whole class or with small groups for center work.This engaging, easy-prep fraction, decimal, percent resource includes:30 Footloose task cards (a set with a background and a set without)Footloose gridAnswer key3 practice worksheets w/keysFootloose cards require students to:Convert fractions to decimals and percentsConvert
5 th - 7 th
Decimals, Fractions, Math Test Prep
CCSS
7.EE.B.3
Also included in:6th Grade Math Task Cards Footloose, Task Card Stations, Recording Sheets
$3.95
Original Price $3.95
Rated 4.85 out of 5, based on 134 reviews
4.9(134)
Add to cart
Wish List
Grade 5 Ontario Math Worksheets | Fractions Ratios Percent | PDF & Google Slides
Created by
My Call to Teach
OverviewAre you looking for practical and easy to use supplement practice for the NEW Grade 5 Ontario Math Curriculum? These ready-to-print PDF and EDITABLE worksheets is exactly what you need! Note this resource compliments my digital Fractions, Ratios, Percent Unit but can also be used separately! This resource contains 6 worksheets for your students to apply what they have learned in the Number strand for Number Sense and Operations. Each worksheet specifies which Ontario Curriculum Expe
4 th - 6 th
Basic Operations, Fractions, Math
Also included in:Grade 5 Ontario Math Worksheets | FULL-YEAR Bundle | All Expectations
$10.49
Original Price $10.49
Rated 4.91 out of 5, based on 32 reviews
4.9(32)
Add to cart
Wish List
Percent Increase and Decrease Worksheet - Maze Activity
Created by
Amazing Mathematics
Printable PDF & Digital Versions are included in this distance learning ready activity which consists of a variety of problems where students will have to calculate Percent Increase and Percent Decrease to work their way through a maze. This Google Classroom and Easel by TPT ready activity come in both digital & PDF format. Your students are sure to have a fun and engaging lesson whether you are teaching physically in the classroom or virtual! Distance learning?No problem! This activity now
7 th - 8 th
Basic Operations, Math, Other (Math)
CCSS
7.RP.A.3
Also included in:Algebra 1 Bundle ~ All My Algebra Products for 1 Low Price
$1.50
Original Price $1.50
Rated 4.79 out of 5, based on 241 reviews
4.8(241)
Add to cart
Wish List
Grade 6 Ontario Math Worksheets | Fractions Ratios Percent | PDF & Google Slides
Created by
My Call to Teach
OverviewAre you looking for practical and easy to use supplement practice for the NEW Grade 6 Ontario Math Curriculum? These ready-to-print PDF and EDITABLE worksheets is exactly what you need! Note this resource compliments my digital Fractions, Ratios, Percent unit, but can also be used separately! This resource contains 6 worksheets for your students to apply what they have learned in the Number strand for Number Sense and Operations. Each worksheet specifies which Ontario Curriculum Exp
5 th - 7 th
Basic Operations, Decimals, Fractions
Also included in:Grade 6 Ontario Math Curriculum | FULL-YEAR Worksheet Bundle | All Expectations
$10.49
Original Price $10.49
Rated 4.88 out of 5, based on 32 reviews
4.9(32)
Add to cart
Wish List
Fraction, Decimal, and Percent Conversions Activity Coloring Worksheet
Created by
Jessica Barnett Math
Make math more engaging by incorporating creativity and problem-solving with this fun fractions, decimals, and percent operations conversion activity! Students will practice essential conversion skills while adding an artistic touch to their work. Perfect for classwork, homework, math centers, or early finishers! WHAT'S INCLUDED:• a 10 problem version - converting between fractions, decimals and percents • a 18 problem version - includes additional practice for students who need a little more
6 th
Math
CCSS
6.RP.A.3c
Also included in:Fraction, Decimal, and Percent Conversions Activity Worksheet Bundle
$2.00
Original Price $2.00
Rated 4.9 out of 5, based on 31 reviews
4.9(31)
Add to cart
Wish List
Percent Markup and Markdown Worksheet - Maze Activity
Created by
Amazing Mathematics
Printable PDF, Google Slides & Easel by TPT Versions are included in this distance learning ready activity which consists of 14 problems that students must calculate the new price after a markdown or markup. This maze will help strengthen your students’ skills at calculating retail cost of an item when it has been marked up or marked down. Not all boxes are used in the maze to prevent students from just guessing the correct route. In order to complete the maze students will have to correct
6 th - 8 th
Applied Math, Math, Other (Math)
CCSS
7.RP.A.3
Also included in:Algebra 1 Bundle ~ All My Algebra Products for 1 Low Price
$1.50
Original Price $1.50
Rated 4.74 out of 5, based on 72 reviews
4.7(72)
Add to cart
Wish List
Percent Applications - Notes, Task Cards, Worksheets, and Assessment
Created by
Math on the Move
UPDATED 1/30/18 - Task cards were added! 12 task cards for each concept (discount/sale price, tax/tip/commission, simple interest, percent change/percent error) This bundle contains resources used to teach the following concepts: - Discount and sale price - Tax, tips and commission - Simple interest - Percent change - Percent error Included in this set: - Six pages of guided notes (a review of finding percent of a number + one page for each of the above concepts). - Five worksheets, all of
6 th - 8 th
Math
CCSS
7.RP.A.3
$12.00 Original Price $12.00
$10.00
Price $10.00
Rated 4.91 out of 5, based on 144 reviews
4.9(144)
Add to cart
Wish List
Consumer Math Skill Practice Worksheet. Budget Check Percents Cost Comparison
Created by
A Love for Special Learning
Practice staying in budget, comparing prices, writing a check, balancing a checking account, and finding a percent of an amount of money all on 1 worksheet! These consumer math and financial literacy skills are important to learn and review at any age. With 40 pages, this resource will last you 1 full school year if used once a week! Read about why I created this resource, see a full page example, and learn how it's great for your students and saves you time!Design and graphics are appropria
3 rd - 12 th
Applied Math
Also included in:Consumer Math Curriculum + 4 Projects & Weekly Practice Workbook.Special Ed
$13.00
Original Price $13.00
Rated 4.82 out of 5, based on 22 reviews
4.8(22)
Add to cart
Wish List
Percent of Change and Error Activity and Worksheet Bundle
Created by
Jessica Barnett Math
Are you looking for engaging, no prep activities to supplement a lesson on percent of change and error? This activity pack is THE RESOURCE for you! PRINT AND GOOGLE SLIDES™ VERSIONS ARE INCLUDED FOR EACH ACTIVITY!WHAT'S INCLUDED:• MATCHING ACTIVITY - 10 PROBLEMS • COLORING ACTIVITY - 10 PROBLEMS - 2 PICTURE OPTIONS • MISTORY LIB ACTIVITY - 10 PROBLEMS • PICTURE PUZZLE ACTIVITY - 20 PROBLEMS & 9 PROBLEM VERSIONS ANSWER KEYSGRAB A FULL YEAR OF 7TH GRADE MATH RESOURCES HERE!The purchase of this r
6 th - 8 th
Math
CCSS
7.RP.A.3
Bundle (4 products)
$7.25 Original Price $7.25
$5.75
Price $5.75
Rated 4.87 out of 5, based on 74 reviews
4.9(74)
Add to cart
Wish List
Converting Fractions Decimals &Percents Activities Coloring, Worksheets, Notes
Created by
Cognitive Cardio Math
Converting fractions, decimals, and percentages practice is easy to implement with this variety of engaging activities. Use the activities for stations, homework, assessments, fast finishers, review days, or even sub days.This bundle includes a variety of activities and resources (some print, some digital, some both) for teaching and practicing fraction, decimal, percent conversions: Notes: Fold It Ups, Math WheelNumber linesColor by numbersTruth or Dare review gamesFootloose activitiesDecima
5 th - 6 th
Decimals, Fractions, Math
CCSS
7.NS.A.2d
Bundle (16 products)
$36.50 Original Price $36.50
$19.75
Price $19.75
Rated 4.74 out of 5, based on 94 reviews
4.7(94)
Add to cart
Wish List
Expressions and Percents - Worksheet (7.EE.2)
Created by
Math on the Move
With this worksheet, students practice writing equivalent expressions involving percent problems. Students can see how taking 25% off an original price is the same as paying 75% of the price. Or how adding a 15% tip is the same as multiplying the bill by 1.15. An example problem: Jack bought a bike that was 35% off the original price. Let p represent the original price. What expressions can be used to calculate the sale price? Answer: p - 0.35p and 0.65p Answer key included! This work
7 th - 9 th
Algebra, Math
$1.50
Original Price $1.50
Rated 4.89 out of 5, based on 112 reviews
4.9(112)
Add to cart
Wish List
Calculating Tax & Tip Percent Proportions Activity for 7th Grade Math Worksheet
Created by
Math All Day
In this 7th grade resource, students will calculate tax and tip in real world scenarios. Using percent proportions, students will answer 2 questions per situation to determine the tax or tip and then the final cost or a related question. Students will calculate the part, whole, or percent of each problem. The same problems are also provided on the printable version, so that students can write out their work on paper. This product includes:Self Checking Google Sheet with 8 problemsPrintable v
6 th - 8 th
Math, Other (Math)
CCSS
7.RP.A.3
Also included in:Calculating Tax Tip Discount Percent Proportions Activities for 7th Grade Math
$3.00
Original Price $3.00
Rated 4.95 out of 5, based on 21 reviews
5.0(21)
Add to cart
Wish List
PERCENT NOTES, REFERENCE & PRACTICE WORKSHEETS- PROPORTION
Created by
Teach Easy
Find the Part, Whole, and Percent using the proportion method! This is a percent reference/notes sheet that will help students to learn how to do percents using the proportion method. The proportion method is described fully along with examples. Cross multiplication is covered as well. Included: 2 practice worksheets. One with 20 questions and answer key and the other is as word problem worksheet with 12 questions and answer key AND a solutions page to show each problem and the steps used to
6 th - 12 th, Adult Education, Higher Education
Basic Operations, Math
$6.00
Original Price $6.00
Rated 4.75 out of 5, based on 132 reviews
4.8(132)
Add to cart
Wish List
Converting Fractions Decimals and Percents Worksheets Review Quiz Test, Practice
Created by
Printables and Worksheets
This is a collection of converting fraction, decimal, percent worksheets. The sheets include conversion, interpreting images, and fill-in-the-blanks type of questions. In all, you can pick from over a hundred worksheets. Just print the sheets that match your preference, and you're ready to go! The problems include denominators of 100, and between 2 and 50. It can be used as a review, quiz, test, assessment, homework, or practice. These decimal worksheets suit 4th, 5th, 6th, and 7th grades and
4 th - 7 th
Decimals, Fractions
$3.99
Original Price $3.99
Rated 4.86 out of 5, based on 34 reviews
4.9(34)
Add to cart
Wish List
Percent Activity Tax, Tip, and Markup Coloring Worksheet
Created by
Jessica Barnett Math
Are you looking for something more engaging than an average worksheet? Students of all ages enjoy coloring! Pair it with math, and the work becomes fun! This 10 problem activity sheet is a great way to incorporate art into a math lesson on taxes, tips, and markups. Both a PDF for printing and a digital version created in Google Slides™ are included.★WHAT'S INCLUDED★• a 10 problem worksheet - (Fall picture) • a 10 problem worksheet - (evergreen picture) • blank coloring sheets for students to col
6 th - 8 th
Math
CCSS
7.RP.A.3
Also included in:7th Grade Math Activity Bundle Full Year
$2.00
Original Price $2.00
Rated 4.87 out of 5, based on 45 reviews
4.9(45)
Add to cart
Wish List
Converting Fractions Decimals Percents Activity Math Problem Solving Worksheets
Created by
Cognitive Cardio Math
Converting fractions, decimals, and percents is more meaningful in word problem activities! Engage students in problem solving fun with this set of word problems that focuses on fraction, decimal, and percent conversions and comparisons. The included word problems help students practice:Comparing fractions, decimals, and percentsConverting fractions, decimals, and percents This easy-prep resource includes:1) Four problem solving pagesEach page presents a different situationEach situation
6 th - 7 th
Decimals, Fractions, Other (Math)
CCSS
7.EE.B.3
Also included in:6th Grade Math Warm Ups, Anchor Charts, Math Wheel Note Taking, Units, Test Prep
$2.65
Original Price $2.65
Rated 4.79 out of 5, based on 61 reviews
4.8(61)
Add to cart
Wish List
Valentine's Day Math Activity Worksheet Percent Change 7th Grade Math
Created by
Make Sense of Math
Fun and engaging Valentine's Math activity! Students practice percent change with percent increase and percent decrease in this coloring activity. 20 practice problems for students to calculate the percent change of a given price. Students then color the Valentine's coloring sheet according to their answer. Included in this product:20 Percent Change QuestionsFun Valentine’s Coloring SheetAnswer KeyThis is great to keep your students' attention. CHECK OUT WHAT EDUCATORS ARE SAYINGThis was a
6 th - 8 th
Decimals
Also included in:Holiday Math Coloring Activities Middle School Math Bundle | Fun Worksheets
$3.00
Original Price $3.00
Rated 4.93 out of 5, based on 30 reviews
4.9(30)
Add to cart
Wish List
Converting Fractions to Percents Color Worksheet
Created by
Aric Thomas
25 unique and thought out questions on converting fractions to percents. Each question corresponds to a matching answer that gets colored in to form a symmetrical design. Not only does this make it fun and rewarding for students but it also makes it easy for students and teachers to know if the worksheet has been completed correctly. Great for classwork, homework, additional practice, extra credit, and subs. The designs can also be cut out and quilted together to make a great art piece. The pdf
6 th - 9 th
Arithmetic, Fractions, Math
$2.50
Original Price $2.50
Rated 4.96 out of 5, based on 54 reviews
5.0(54)
Add to cart
Wish List
1
2
3
4
5
Showing 1-24 of 8,700+results
TPT is the largest marketplace for PreK-12 resources, powered by a community of educators.
Facebook
Instagram
Pinterest
Twitter
About
Who we are
We're hiring
Press
Blog
Gift Cards
Support
Help & FAQ
Security
Privacy policy
Student privacy
Terms of service
Tell us what you think
Updates
Get our weekly newsletter with free resources, updates, and special offers.
Get newsletter
IXL family of brands
IXL Comprehensive K-12 personalized learning
Rosetta Stone Immersive learning for 25 languages
Wyzant Trusted tutors for 300 subjects
Education.com 35,000 worksheets, games, and lesson plans
Vocabulary.com Adaptive learning for English vocabulary
Emmersion Fast and accurate language certification
Thesaurus.com Essential reference for synonyms and antonyms
Dictionary.com Comprehensive resource for word definitions and usage
SpanishDictionary.com Spanish-English dictionary, translator, and learning
FrenchDictionary.com French-English dictionary, translator, and learning
Ingles.com Diccionario inglés-español, traductor y sitio de aprendizaje
ABCya Fun educational games for kids
© 2025 by IXL Learning
|Protected by reCAPTCHAPrivacy•Terms |
2038 | https://prithvijc.pythonanywhere.com/static/clique_article.pdf | A note on the search for maximal pairwise coprime subsets Prithvijit Chakrabarty Abstract: of integers. Introduction: No polynomial time algorithm to factorize integers is known. There is however, an algorithm to factorize an integer into a set of pairwise coprime numbers. This algorithm, called factor refinement, was introduced by Bach, Driscoll and Shallit in , and allowed factoring an integer into coprime numbers in quadratic time. The approach was further investigated by Bernstein in , where he introduced an algorithm to do same in approximately linear time. Indeed, in many applications, factor refinement can be used instead of integer factorization. Factor refinement is thus closely linked to integer factorization. This could be useful in investigating the complexity class of integer factorization. Instead of directly looking for a polynomial time algorithm, or proof of NP completeness of factoring, an auxiliary problem, the PC problem is introduced. This is linked to both factor refinement and integer factorization. This paper proves the intermediate result that the PC problem is NP complete. In following work, I will describe the relationship between the PC problem and integer factorization. Notations: G is a graph with vertex set V and edge set E 𝐺̅ is the complement of graph G E(G) is the edge set of graph G e(v1, v2) represents an edge from vertex v1 to v2 L :(𝑉∪𝐸) Z is the label function that maps vertices and edges to integral labels The PC problem: Pairwise coprime set: A set S is called pairwise coprime if and only if gcd(𝑝1, 𝑝2) = 1∀𝑝1, 𝑝2 ∈𝑆 The PC problem: Given a set of integers, the PC problem is to find the largest subset that is pairwise coprime. The factor refinement algorithm generates a pairwise coprime set of numbers, all of which are factors of a given integer (called the coprime base set of the integer in ). The PC problem may be related to the integer factorization problem through the fact that every integer can be decomposed into a corresponding coprime base set. NP Completeness: The PC problem is proven to be NP complete by reduction from the max clique problem. Algorithm 2: Reduction from clique to PC Input: Graph G = (V, E). Output: Set of vertex labels for the vertices of G The algorithm maintains a list of labels L for each node and edge. L = {(v1, p1), (v2, p2), (v3, p3)... (eN, pN)}, where p1, p2, p3, ..., pN are distinct primes. for e(v1,v2) in E(𝐺̅) begin: This proves the NP completeness of the search for the largest pairwise coprime subset in a set L(v1) L(v1) L(e) L(v2) L(v2) L(e) end return L The set of vertex labels L is the input to the corresponding PC problem. Theorem: The graph G contains a clique of size 'k' if and only if its corresponding label set contains a pairwise coprime subset with 'k' elements. Proof: Consider a subgraph SG = {v1, v2, v3, ..., vk}. The corresponding set of labels will be Sk = {L(v1), L(v2), L(v3), ..., L(vk)}. Algorithm 2 ensures that labels L(v1) and L(v2) have a common factor if and only if e(v1 , v2) is in E. 1. Sk is pairwise coprime: This implies that e(vi, vj) is in E for all (vi, vj) in SG. Thus, SG must be a clique. 2. Sk is not pairwise coprime: This implies that there exists at least one pair L(vi), L(vj) that are not pairwise coprime and the corresponding edge e(v1,v2) is not in E. Thus, SG will not be a clique if Sk is not pairwise coprime. Thus, G contains a clique of size 'k' if and only if S contains a pairwise coprime subset with 'k' elements. Theorem: The length of the labels generated by algorithm 1 is O(|V|+|E|). Proof: The labels of the vertices in G are initialized to |V| distinct primes. To restrict the size of the numbers generated as labels, we use the first |V| prime numbers to label the vertices and the next |E| primes to label the edges before running algorithm 1. Due to the labelling algorithm, the final label of a vertex vj will have the maximum value if it is connected to all the other vertices in G. In this case, L(vj) = ∏ 𝑝𝑖 ∣𝑉∣+∣𝐸∣ 𝑖=∣𝑉∣+1 < ∏ 𝑝𝑖 ∣𝑉∣+|𝐸| 𝑖=0 . Thus, L(v ) < prim(|V|+|E|) ∀ |V|,|E| > 0 (1) ). Consider N(x) such that N(x) = number of digits in x. If the vertex vj has the highest label value, the number of digits in L(vj) will be: N(L(vj)) = (⌊log (𝐿(𝑣𝑗))⌋+ 1) < log(𝑝𝑟𝑖𝑚(∣𝑉∣+ |𝐸|)). The logarithm of the primorial function is the first Chebyshev function 𝜃(∣𝑉∣+ |𝐸|), which grows linearly, as proved in . Thus, the number of digits in the labels of the vertices of G is generated by the labelling algorithm is O(|V|+|E|). Theorem: The reduction of the clique to the PC problem runs in polynomial time. Proof: Algorithm 2 traverses the list of edges in E and performs 2 multiplications for every edge. The number of digits of the labels is O(|V|+|E|). Using a simple multiplication algorithm running in quadratic time yields the product in O((|V|+|E|)2). Thus, the complexity of generating the label set L is O(|E|.(|V|+|E|)2). Conclusion and further work: classifying the complexity of integer factorization. In future papers, I will investigate the exact where prim() is the primorial function. The value of the labels is thus bounded by prim(|V|+|E| This proved the NP completeness of the PC problem, which may serve as an auxiliary to relationship of this problem with integer factorization. References: Eric Bach, James Driscoll, Jeffrey Shallit, Factor Refinement, in SODA '90 Proceedings of the first annual ACM-SIAM symposium on Discrete algorithms Pages 201-211. Daniel J. Bernstein, Factoring into coprimes in essentially linear time, ACM Journal of Algorithms, Volume 54 Issue 1, January 2005. Hardy, G. H. and Wright, E. M. The Functions θ(x) and ψ(x) and Proof that θ(x) and ψ(x) are of Order x, in An Introduction to the Theory of Numbers, 5th edition, Pages 340-342, 1979. |
2039 | https://sites.cc.gatech.edu/classes/AY2010/cs6505_spring/lectures/FFT.pdf | CS 6505, Computability and Algorithms Fast Fourier Transform Spring 2010; Lecturer: Santosh Vempala 1 Evaluating polynomials at many points Suppose that we want to evaluate a polynomial A(x) = a0 + a1x+· · ·+anxn at many points – say n points in all. If we were just evaluating A at one point, say x0, then we can naively perform the multiplication in O(n2) multiplications, but divide-and-conquer algorithms should make us think that we can do better. First, we can rewrite our computation of A as A (x) = a0 + x(a1 + x (a2 + x (· · · + xan))) This is known as Horner’s Rule: each coefficient ai is associated with a single multiplication with x. So calculating A can be done in n multiplications for a single value of x. If we want to use this method to evaluate, say, n points, then we need O n2 multiplications.
Can we do better than this? With divide-and-conquer methods, we would want to find some way to eliminate redundant multiplications. If the xj are chosen randomly, it seems like we will have no hope for overlapping or weeding out our multiplications. What if we chose our xj cleverly so that a multiplication for one gives us the same answer for some other xi? This is at the heart of the Fast Fourier Transform: we will choose our xj so that we can cut out multiplications.
Suppose we choose xj = −xi. Then all of the even monomials are the same, and the odd monomials have opposite sign. In other words, a2kx2k = a2k(−x)2k and a2k+1x2k+1 = −a2k+1(−x)2k+1 for 0 ≤k ≤n 2 . There is a set of numbers that have this property. In complex numbers, we have n solutions to the equation xn = 1, and these solutions are known as the nth roots of unity. These are denoted as 1, ω, ω2, ω3, . . . , ωn−1, where ω = e 2Πi n .
There are some special properties of the nth roots of unity that we can see right away. For example, if n is even and xn = 1, then (−x)n = 1. How do we find −x? If n is even, then we have ω n 2 = −1.
So if x = ωk, then we know that ωk+ n 2 = x ∗−1 = −x.
Now let’s take a look at our polynomial A(x) again. Let’s examine A (ω) and A(-ω): A (ω) = a0 + a1ω + a2ω2 + a3ω3 + . . .
A ω n 2 +1 = A (−ω) = a0 −a1ω + a2ω2 −a3ω3 + . . .
This looks like something that can be tackled with divide-and-conquer techniques. All of the even-exponent monomials, such as a0, a2ω2, a4 ω4, and so on, are the same in A (ω) and A (−ω), while all of the odd-exponent monomials, such as a1, a3ω3, a5ω5, and so on, are of the opposite sign in A(ω) and A(−ω).So now we can split up A into two polynomials of even and odd degree, say A0 and A1, as follows: 1 A (ω) = A0 ω2 + ωA1 ω2 A0 (ω) = a0 + a2ω + a4ω2 + · · · + adω d 2 A1 (ω) = a1 + a3ω + a5ω2 + · · · + ad−1ω d−1 2 So what has happened? We have broken the original polynomial A into two smaller polynomials A0 and A1 of degree d 2. How many distinct nth roots of unity (ωk) do we need? We don’t need to calculate all n - since we’re squaring them, we only need n 2 of them. So our original problem has now been halved: we originally were evaluating A, which has degree d, at n points, and now we’re evaluating two polynomials A0 and A1 that are of degree d 2 at n 2 points. So our recurrence for evaluating A will involve two variables: n and d. If n = d, then we have: T (n) = 2T n 2 + O (n) Then we can evaluate A over n points in time O(n log n). Now what if n ̸= d? If d = 1, then all polynomials are of degree 1 and it just takes O(n) time to evaluate them. Otherwise, we have T (n, d) = 2T n 2 , d 2 + O (n) From Horner’s Rule, we also have T (1, d) = O(d) (i.e., we’re evaluating one point of degree k).
Then we can derive T (n, d) = O(d log n). Likewise, if the degree d is larger, then we could derive a running time of O(n log d).
2 Equivalence between function values and coefficients So we can go from values of the polynomial, say A (1) , A (ω) , A ω2 , . . . , A ωn−1 , to the coefficients a0, a1, . . . , an−1 of A (so we are assuming that d = n)? If we want to calculate all of A’s values, we could represent them in matrix form as follows: A(1) A(ω) .
.
.
A(ωn−1) = 1 1 1 . . .
1 1 ω ω2 . . .
ωn−1 1 ω2 ω4 . . .
ω2(n−1) .
.
.
.
.
.
1 ωn−1 ω2(n−1) . . .
ω(n−1)(n−1) a0 a1 a2 .
.
.
an−1 We can write the nxn matrix of ω values as M (ω). It is also known as the Vandermonde matrix.
How do we solve for the coefficients of A? If we have to calculate an inverse naively, then this calculation could take a long time to compute – O n3 . However, our nxn matrix with the values of ωk has some special properties. First, note that ωn −1 = (ω −1) ωn−1 + ωn−2 + · · · + ω + 1 2 If we take ω ̸= 1, then we have ωn−1 + ωn−2 + · · · + ω + 1 = ωn−1 ω−1 = 0 because we know that ω is an nth root of unity (and so ωn = 1). This helps when we generate M(ω)−1, since the identity matrix I = M (ω) ∗M(ω)−1 will have 1s on the diagonal and 0s everywhere else.
We now claim that M(ω)−1 = 1 n ∗M(−ω). We can validate this for both the diagonal and off-diagonal entries. For the kth diagonal entries, we will take the dot product of the kth row of M(ω) with the kth column of M(ω)−1. This gives us ˙ 1 n 1 ωk ω2k . . . ωk(n−1) 1 (−ω)k (−ω)2k . . . (−ω)(n−1)k = ˙ 1 n 1 ωkω2k . . . ωk(n−1) (1 ω−k ω−2k . . . ω−(n−1)k) = 1 n (1 + 1 + · · · + 1) = 1 For the off-diagonal entry at position (j,k), we multiply the j row of M (ω) with the k column of M (−ω). That gives 1 n ˙ 1 ωjω2j . . . ω(n−1)j (1 ω−k ω−2k . . . ω−(n−1)k) = 1 n 1 + ωj−k + ω2j−2k + . . . ω(n−1)(j−k) = 1 n ωn(j−k) −1 ωj−k −1 = 0 So the inverse matrix M(ω)−1 is easy to calculate. That means that, using the method we previously described, we can recover the coefficients of the polynomial A in time O (n log n). This has important applications to signal analysis, where we can uncover the frequencies of a signal.
3 Multiplying Polynomials Suppose that we now have two polynomials, A(x) and B(x), of degree d, and we want to calculate C (x) = A (x) B(x). Then C (x) has degree 2d, so it is determined by any 2d + 1 points. So we can determine enough information to reconstruct C(x) from any 2d + 1 values of A(x) and B(x).
So our procedure for determining C is as follows: 1. Calculate A(x) and B (x) at n = 2d + 1 points, which will require time O(n log n); 2. Calculate C (x) = A (x) B(x) at the n selected points, which will require time O(n); 3. Determine C’s coefficients, which will take time O(n log n).
All three of these steps have already been described in detail. We just need to select the nth roots of unity for the n selected points, and we’re done.
3 4 String Matching Suppose that we have a pattern p = pm−1pm−2 . . . p0 that we want to match against an n-character string s = sn−1sn−2 . . . s0. We could compare the m-character pattern against all possible n−(m−1) starting positions of the pattern, but that gives a running time of O(m(n −m + 1)). For example, take p = abba and s = aababbabba. Then we might have to compare abba against aaba, abab, babb, and so on. Can we do better using the FFT?
Let’s assume that the pattern and string have the same binary characters, say a and b. Now let’s map a to -1 and b to 1. Then the product of the mapped pattern, abba →(-1)11(-1), with the first four characters of the string, aaba →(-1)(-1)1(-1) gives us a dot product of (-1)(-1)+1(-1) +11 +(-1)(-1) = 2. When we do have a match, the dot product is (-1)(-1)+11+11+(-1)(-1) = 4. So when we have a match, each term in the dot product is 1 and the dot product is m. If we do not have a match, then at least one term in the dot product is -1 and so the dot product is less than m.
This looks just like the polynomial multiplication that we just saw – the pattern can be translated to one polynomial, and the text string can be translated to another polynomial.
We want to know if the text starting at position k agrees with the input pattern. Let the pattern’s polynomial A (x) = pm−1xm−1+pm−2xm−2+· · ·+p0 and take the m text polynomial to be B (x) = sn−1xn−1+ sn−2xn−2+· · ·+s0. Then C (x) = A (x) B(x) will not give us information about whether the pattern matches up at position k in the text – we cannot just look at a coefficient of C and determine if we have m matches at the corresponding text position. Instead, we want coefficient ck to tell us if position k in the text matches with position m in the pattern, if position k + 1 in the text matches with position m −1 in the pattern, and so on. So we want to know if sk = pm−1, sk+1 = pm−2, and so on until sk+m−1 = p0. Notice that the sum of the two indices is always k + m −1.
Our insight is to reverse the order of one of these strings with respect to how its polynomial is created. So now let’s try A (x) = pm +pm−1x+· · ·+p0xm (i.e., A(x) with its coefficients reversed) and use the same B (x) . We can see that the jth coefficient of C, which we will denote cj, is as follows: cj = Σipisj−1 So we get exactly what we want: if we want to know if the text and pattern match up in the kth position, then we just need to examine ck.
How does FFT help with pattern matching? We can see that we have just reduced the problem of pattern matching to polynomial multiplication: we multiplied the polynomial A(x) with B(x).
The polynomial multiplication algorithm above tells us that we can do this in n log m, where n is the length of the text and m is the length of the pattern. This is not the last word on string matching, but it is an interesting application of FFT and divide-and-conquer methods in general.
4 |
2040 | https://www.chegg.com/homework-help/questions-and-answers/21-drawing-free-body-diagram-simple-pendulum-breaking-forces-components-show-restoring-for-q73086384 | Solved 2.1: By drawing a free body diagram for a simple | Chegg.com
Skip to main content
Books
Rent/Buy
Read
Return
Sell
Study
Tasks
Homework help
Understand a topic
Writing & citations
Tools
Expert Q&A
Math Solver
Citations
Plagiarism checker
Grammar checker
Expert proofreading
Career
For educators
Help
Sign in
Paste
Copy
Cut
Options
Upload Image
Math Mode
÷
≤
≥
o
π
∞
∩
∪
√
∫
Math
Math
Geometry
Physics
Greek Alphabet
Science
Physics
Physics questions and answers
2.1: By drawing a free body diagram for a simple pendulum and breaking the forces into components, show that the restoring force on a pendulum obeys equation 3 if we ignore friction and air resistance. (Hint: the net restoring force for a pendulum is the component of the sum of the forces that is perpendicular to the pendulum's string.) 2.2: Reconsider the
Your solution’s ready to go!
Our expert help has broken down your problem into an easy-to-learn solution you can count on.
See Answer See Answer See Answer done loading
Question: 2.1: By drawing a free body diagram for a simple pendulum and breaking the forces into components, show that the restoring force on a pendulum obeys equation 3 if we ignore friction and air resistance. (Hint: the net restoring force for a pendulum is the component of the sum of the forces that is perpendicular to the pendulum's string.) 2.2: Reconsider the
Show transcribed image text
There are 4 steps to solve this one.Solution Share Share Share done loading Copy link Step 1 A pendulum is a combination of a string and a mass attached to the string. The mass oscillates to at... View the full answer Step 2 UnlockStep 3 UnlockStep 4 UnlockAnswer Unlock Previous questionNext question
Transcribed image text:
2.1: By drawing a free body diagram for a simple pendulum and breaking the forces into components, show that the restoring force on a pendulum obeys equation 3 if we ignore friction and air resistance. (Hint: the net restoring force for a pendulum is the component of the sum of the forces that is perpendicular to the pendulum's string.) 2.2: Reconsider the section in the introduction concerning the small angle approximation. Based on equation 4, what is the effective "spring constant," k, of a pendulum for small angles of displacement? (Hint: compare equations 4 and 1.) 2.3: For small angles, find an expression for the period of a pendulum. (Hint: compare the value of the "spring constant" you found in 2.2 and equation 2.) F = -kx (1) T = 271 k 加心 (2) where T is called the period of oscillation. If the spring is stiff (large k), the period would be small. Similarly, a larger mass leads to a longer period of oscillation. In this lab, you will measure oscillation period as a function of hanging mass. So a plot of T versus m will be a square root curve going through the origin with a fit parameter of A = 2 You will test this prediction to see if it accurately describes the "mass on a spring" system. The Physics of a Simple Pendulum and the Small Angle Approximation: A simple pendulum consists of two main components: (1) A "massless" string suspended from a pivot point, and (2) a mass or "bob" hanging from the end of the string. A pendulum, like a mass on a spring, can exhibit harmonic oscillation. It can be shown (see 3.1) that the restoring force for a simple pendulum is F = -mg sin (3) F- -mg i
Not the question you’re looking for?
Post any question and get expert help quickly.
Start learning
Chegg Products & Services
Chegg Study Help
Citation Generator
Grammar Checker
Math Solver
Mobile Apps
Plagiarism Checker
Chegg Perks
Company
Company
About Chegg
Chegg For Good
Advertise with us
Investor Relations
Jobs
Join Our Affiliate Program
Media Center
Chegg Network
Chegg Network
Busuu
Citation Machine
EasyBib
Mathway
Customer Service
Customer Service
Give Us Feedback
Customer Service
Manage Subscription
Educators
Educators
Academic Integrity
Honor Shield
Institute of Digital Learning
© 2003-2025 Chegg Inc. All rights reserved.
Cookie NoticeYour Privacy ChoicesDo Not Sell My Personal InformationGeneral PoliciesPrivacy PolicyHonor CodeIP Rights
Do Not Sell My Personal Information
When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.
More information
Allow All
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Sale of Personal Data
[x] Sale of Personal Data
Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link.
If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.
Targeting Cookies
[x] Switch Label label
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Reject All Confirm My Choices
mmmmmmmmmmlli mmmmmmmmmmlli mmmmmmmmmmlli |
2041 | https://11physicsahs.weebly.com/graphing.html | Graphing
AHS SACE Stage 1 Physics
Home
The Basics
Manipulating Equations
Recording Data
Analysing Data
Glossary
Home
The Basics
Manipulating Equations
Recording Data
Analysing Data
Glossary
Back
SI Units
Scientific Notation
Prefixes
Significant Figures
Variables
Back
Proportionalities
Rearranging Equations
Right Angled Trigonometry
Back
Tables
Manipulating Data in Excel
Graphing
Graphing in Excel
Back
Calculating slope
Trends and Relationships
Precision vs Accuracy
Random Error
Systematic Error
Graphing
Tips for drawing a graph by hand
Graphing checklist
Work through the following checklist when drawing a graph.
1. Put the dependent variable on the y-axis and the independent variable on the x-axis. If you are asked to plot A against B, put A on the y-axis and B on the x-axis.
2. Label the axes with the name of each variable.
3. Next to each variable name, label the units in brackets if appropriate.
4. Choose appropriate scales for each axis (see below for further details).
5. Plot each point correctly according to the major and minor grid lines provided.
6. Draw a suitable trend line. This may be straight or curved but plotted points should be evenly scattered on either side of it. In Physics, always extend any straight trend lines back to the axis.
7. A title is good but not necessary. In a practical report, always provide a captionunderneatha graph e.g.Figure 1: the period squared of a pendulum versus the mass.
Choosing axes scales
Find the highest data value.Choose a scale that allows your data to be graphed as large as possible in the space provided. The scale should be large enough to reach the highest value without lots of extra space.
In our Physics classes, always start the scale at zero and never break it. This is important since breaking or truncating the axis will make it difficult to read the y-intercept which we often want to read for calculations.
The scale of each axis may be different but each one must be consistent. If one box represents one metre at the beginning of the graph, one box always represents one metre.
Choose a scale that makes it easy to plot data correctly. Setting one box equal to 7 metres would make it hard to identify what one-fifth of that box represents and will lead to misplotted points.
Common mistakes
Each square on a scale should be worth the same value. Both scales here are incorrect.
The scales are not large enough for the space given. The trend line has not been extended back to the axis.
Do not fudge a trend line to pass through each point. Here, the trend is clearly linear.
Here the y axis scale does not start at 0. This makes it difficult to determine the y intercept.
Never draw dot to dot trend lines.
Do not curve a trend line to try and force it through the origin. Also, always mark the axis values on major grid lines, not between them (on the x axis, the 0.1, 0.3, 0.5 etc. marks are unnecessary).
Do not break the scales at the start of the axis. Always start at 0 and go up in even intervals. The scale choices here also make it difficult to plot points correctly (here, each square on the x axis is worth 0.017)
Interpolating and Extrapolating
Besides being able to show trends between variables, plotting data on a graph allows us to predict values for which we have taken no data.
When we predict values that fall within the range of data points taken, it is called interpolation. When we predict values for points outside the range of data taken, it is called extrapolation. Extrapolation over too far a range can be unreliable unless it is certain that the observed relationship between the variables continues.
Watch the video to learn how to interpolate and extrapolate. When doing this for tests, always rule in the lines that you used to deduce the answer.
Choosing a graph type
Note that a scatter plot is not always the most appropriate graph to use. The nature of each variable affects how the data collected is best displayed.
Continuous numerical variable: A numerical variable that can have any number. If dependent and independent variables are both continuous, then the data can be represented by a scatter plot with a trend line.
Discrete numerical variable: A variable that can only take a finite number of values such as the number of springs connected together. These can also be represented by a scatter plot but it often does not make sense to connect the points. Otherwise, a column graph can be used.
Categorical variable: Something that can be described by a label and not a number, e.g. colour, or material of construction. These can be displayed as a column graph.
A scatter plot with a trend line for the continuous numerical variable of time in years
A column graph for the categorical variable of flavour
SI Units
Scientific Notation
Prefixes
Significant Figures
Variables
Proportionalities
Rearranging Equations
Right Angled Trigonometry
Tables
Manipulating Data in Excel
Graphing
Graphing in Excel
Calculating slope
Trends and Relationships
Precision vs Accuracy
Random Error
Systematic Error
Powered by Create your own unique website with customizable templates.Get Started |
2042 | https://www.chegg.com/homework-help/questions-and-answers/exercise-find-indefinite-integral-t-1-3-frac-1-t-2-2-t-respect-t--int-left-t-1-3-frac-1-t--q122230606 | Solved Exercise. Find the indefinite integral of t1/3+t21+2t | Chegg.com
Skip to main content
Books
Rent/Buy
Read
Return
Sell
Study
Tasks
Homework help
Understand a topic
Writing & citations
Tools
Expert Q&A
Math Solver
Citations
Plagiarism checker
Grammar checker
Expert proofreading
Career
For educators
Help
Sign in
Paste
Copy
Cut
Options
Upload Image
Math Mode
÷
≤
≥
o
π
∞
∩
∪
√
∫
Math
Math
Geometry
Physics
Greek Alphabet
Math
Calculus
Calculus questions and answers
Exercise. Find the indefinite integral of t1/3+t21+2t with respect to t. ∫(t1/3+t21+2t)dt=+C
Your solution’s ready to go!
Our expert help has broken down your problem into an easy-to-learn solution you can count on.
See Answer See Answer See Answer done loading
Question: Exercise. Find the indefinite integral of t1/3+t21+2t with respect to t. ∫(t1/3+t21+2t)dt=+C
Show transcribed image text
There are 3 steps to solve this one.Solution 100%(1 rating) Share Share Share done loading Copy link Step 1 View the full answer Step 2 UnlockStep 3 UnlockAnswer Unlock Next question
Transcribed image text:
Exercise. Find the indefinite integral of t 1/3+t 2 1+2 t with respect to t. ∫(t 1/3+t 2 1+2 t)d t=+C
Not the question you’re looking for?
Post any question and get expert help quickly.
Start learning
Chegg Products & Services
Chegg Study Help
Citation Generator
Grammar Checker
Math Solver
Mobile Apps
Plagiarism Checker
Chegg Perks
Company
Company
About Chegg
Chegg For Good
Advertise with us
Investor Relations
Jobs
Join Our Affiliate Program
Media Center
Chegg Network
Chegg Network
Busuu
Citation Machine
EasyBib
Mathway
Customer Service
Customer Service
Give Us Feedback
Customer Service
Manage Subscription
Educators
Educators
Academic Integrity
Honor Shield
Institute of Digital Learning
© 2003-2025 Chegg Inc. All rights reserved.
Cookie NoticeYour Privacy ChoicesDo Not Sell My InfoGeneral PoliciesPrivacy PolicyHonor CodeIP Rights |
2043 | https://skinimages.ca/skin-image/eczema-herpeticum/ | Eczema Herpeticum - skin images
Skip to content
Home
About
Chair
Image Contributors
Working Group
Founding Contributors
Content Contributors
Funding Sources
Patient Resources
Contribute an Image
skin images
Image Atlas
Contact Us
X
Login
Eczema Herpeticum
Home
Eczema Herpeticum
Eczema Herpeticum
Author: Kawaroreet Karwal MS2, Y, Miller-Monthrope, Dermatologist/Dermatopathologist, Toronto, Canada, 2024
Definition: Eczema herpeticum (also known as Kaposi varicelliform eruption) is a severe, potentially life-threatening skin infection caused by the herpes simplex virus (HSV) in individuals with atopic dermatitis or other underlying skin conditions.
Epidemiology:It typically occurs in children and young adults but can affect individuals of any age.
Symptoms: Eczema herpeticum usually presents with clusters of painful, monomorphic, punched-out erosions that rapidly spread over eczematous skin areas. The affected areas may become swollen, and the lesions can develop into pustules, vesicles, and crusts. Systemic symptoms such as fever, malaise, and lymphadenopathy may also be present.
Diagnosis:Early diagnosis and treatment are crucial to prevent complications. Antiviral medications, such as acyclovir or valacyclovir, are the primary treatment options and should be administered promptly. In severe cases, hospitalization may be required for intravenous antiviral therapy and supportive care. Corticosteroids and antibiotics may be used to manage concurrent inflammation and bacterial infections.
References:
Eichenfield, L. F., Tom, W. L., Chamlin, S. L., Feldman, S. R., Hanifin, J. M., Simpson, E. L., & Paller, A. S. (2014). Guidelines of care for the management of atopic dermatitis. Journal of the American Academy of Dermatology, 71(1), 116-132.
Wollenberg, A., Oranje, A., Deleuran, M., Simon, D., Szalai, Z., Kunz, B., … & Taïeb, A. (2016). ETFAD/EADV eczema task force position paper on diagnosis and treatment of atopic dermatitis. Journal of the European Academy of Dermatology and Venereology, 30(5), 729-747.
Hebert, A. A., & Rodriguez, L. A. (2016). Management of eczema herpeticum in children. Pediatric Dermatology, 33(4), 357-361.
Related Diseases
Lentigines, Solar Lentigines
Read More
Leiomyosarcoma
Read More
Leiomyosarcoma
Read More
Keloid
Read More
Keloid
Read More
Keloid
Read More
SkinImages.ca is designed to establish a comprehensive and easily accessible digital database of dermatology images categorized according to skin types.
Quick Links
Home
About Us
Contact Us
Quick Links
Term Of Use
Contribute An Image
Founding Contributors
Our Newsletter
Subscribe
FacebookTwitterYoutube
Copyright© 2025 skinimages.ca All Rights Reserved. |
2044 | https://microbenotes.com/biochemical-test-of-klebsiella-granulomatis/ | Microbe Notes
Home » Biochemical Test
Biochemical Test of Klebsiella granulomatis
Image: Granuloma inguinale (donovanosis) in a conventional Pap test.
A: Granulomatous inflammation is shown with epithelioid histiocytes and lymphocytes.
B: The organisms (Donovan bodies) can be seen in thin-walled intracytoplasmic vacuoles (circle ). (Pap stain, Mag ×200 in a and ×400 in b).
C: Macrophages show numerous safety pin-shaped structures with polar thickening of chromatin (Donovan bodies) and a halo around them (circle) (Pap, ×100).
Image Source: PathologyOutlines.com
Table of Contents
Some of the characteristics are as follows:
| | |
--- |
| Basic Characteristics | Properties (Klebsiella granulomatis) |
| Capsule | Positive (+ve) |
| Catalase | Positive (+ve) |
| Citrate | Positive (+ve) |
| Flagella | Negative (-ve) |
| Gram Staining | Gram-negative |
| H2S | Negative (-ve) |
| Indole | Negative (-ve) |
| Motility | Non-motile |
| MR (Methyl Red) | Negative (-ve) |
| Nitrate Reduction | Negative (-ve) |
| Oxidase | Positive (+ve) |
| Shape | Pleomorphic rods (coccobacillus) with rounded ends. Occur singly or in clusters |
| Urease | Positive (+ve) |
| VP (Voges Proskauer) | Positive (+ve) |
| Fermentation of | |
| Arabinose | Negative (-ve) |
| Dulcitol | Negative (-ve) |
| Glucose | Positive (+ve) |
| Lactose | Positive (+ve) |
| Malonate | Positive (+ve) |
| Raffinose | Negative (-ve) |
| Rhamnose | Positive (+ve) |
| Xylose | Positive (+ve) |
| Enzymatic Reactions | |
| Lysine decarboxylase | Positive (+ve) |
| ONPG (β-galactosidase) | Positive (+ve) |
Basic Characteristics
Properties (Klebsiella granulomatis)
Occur singly or in clusters
Fermentation of
Enzymatic Reactions
References
About Author
Sagar Aryal, PhD
Leave a Comment Cancel reply
Comment
Save my name, email, and website in this browser for the next time I comment.
Topics / Categories |
2045 | https://en.wikipedia.org/wiki/Antibody | Published Time: Sat, 13 Sep 2025 18:53:03 GMT
Antibody - Wikipedia
Jump to content
[x] Main menu
Main menu
move to sidebar hide
Navigation
Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Contribute
Help
Learn to edit
Community portal
Recent changes
Upload file
Special pages
Search
Search
[x] Appearance
Donate
Create account
Log in
[x] Personal tools
Donate
Create account
Log in
Pages for logged out editors learn more
Contributions
Talk
Contents
move to sidebar hide
(Top)
1 StructureToggle Structure subsection
1.1 Antigen-binding site
1.2 Fc region
1.3 Protein structure
1.4 Antibody complexes
1.5 B cell receptors
2 ClassesToggle Classes subsection
2.1 Light chain types
2.2 In non-mammalian animals
3 Antibody–antigen interactions
4 FunctionToggle Function subsection
4.1 Activation of complement
4.2 Activation of effector cells
4.3 Natural antibodies
5 Immunoglobulin diversityToggle Immunoglobulin diversity subsection
5.1 Domain variability
5.2 V(D)J recombination
5.3 Somatic hypermutation and affinity maturation
5.4 Class switching
5.5 Specificity designations
5.6 Asymmetrical antibodies
5.7 Interchromosomal DNA Transposition
6 History
7 Medical applicationsToggle Medical applications subsection
7.1 Disease diagnosis
7.2 Disease therapy
7.3 Prenatal therapy
8 Research applications
9 RegulationsToggle Regulations subsection
9.1 Production and testing
9.2 Before clinical trials
9.3 Preclinical studies
10 Structure prediction and computational antibody design
11 Antibody mimetic
12 Binding antibody unit
13 See also
14 References
15 External links
[x] Toggle the table of contents
Antibody
[x] 83 languages
Alemannisch
አማርኛ
العربية
অসমীয়া
Azərbaycanca
বাংলা
Беларуская
भोजपुरी
Български
Bosanski
Català
Чӑвашла
Čeština
Dansk
Deutsch
ދިވެހިބަސް
Eesti
Ελληνικά
Español
Esperanto
Euskara
فارسی
Français
Gaeilge
Galego
한국어
Հայերեն
हिन्दी
Hrvatski
Bahasa Indonesia
Interlingua
Íslenska
Italiano
עברית
Jawa
ಕನ್ನಡ
ქართული
Қазақша
Kreyòl ayisyen
Kurdî
Кыргызча
Latina
Latviešu
Lietuvių
Magyar
Македонски
მარგალური
Bahasa Melayu
Nederlands
日本語
Norsk bokmål
Norsk nynorsk
Occitan
ଓଡ଼ିଆ
Oʻzbekcha / ўзбекча
ਪੰਜਾਬੀ
پښتو
Plattdüütsch
Polski
Português
Qaraqalpaqsha
Română
Русиньскый
Русский
Simple English
Slovenčina
Slovenščina
کوردی
Српски / srpski
Srpskohrvatski / српскохрватски
Suomi
Svenska
Tagalog
தமிழ்
ไทย
Türkçe
Українська
اردو
Tiếng Việt
Winaray
吴语
粵語
中文
Edit links
Article
Talk
[x] English
Read
Edit
View history
[x] Tools
Tools
move to sidebar hide
Actions
Read
Edit
View history
General
What links here
Related changes
Upload file
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Print/export
Download as PDF
Printable version
In other projects
Wikimedia Commons
Wikidata item
Appearance
move to sidebar hide
From Wikipedia, the free encyclopedia
Protein(s) forming a major part of an organism's immune system
This article is about the class of proteins. For other uses, see Antibody (disambiguation).
Each antibody binds to a specific antigen in a highly specific interaction analogous to a lock and key.
An antibody (Ab), or immunoglobulin (Ig), is a large, Y-shaped protein belonging to the immunoglobulin superfamily which is used by the immune system to identify and neutralize antigens such as bacteria and viruses, including those that cause disease. Each individual antibody recognizes one or more specific antigens, and antigens of virtually any size and chemical composition can be recognized. Antigen literally means "antibody generator", as it is the presence of an antigen that drives the formation of an antigen-specific antibody. Each of the branching chains comprising the "Y" of an antibody contains a paratope that specifically binds to one particular epitope on an antigen, allowing the two molecules to bind together with precision. Using this mechanism, antibodies can effectively "tag" the antigen (or a microbe or an infected cell bearing such an antigen) for attack by cells of the immune system, or can neutralize it directly (for example, by blocking a part of a virus that is essential for its ability to invade a host cell).
Antibodies may be borne on the surface of an immune cell, as in a B cell receptor, or they may exist freely by being secreted into the extracellular space. The term antibody often refers to the free (secreted) form, while the term immunoglobulin can refer to both forms. Since they are, broadly speaking, the same protein, the terms are often treated as synonymous.
To allow the immune system to recognize millions of different antigens, the antigen-binding paratopes at each tip of the antibody come in an equally wide variety. The rest of an antibody's structure is much less variable; in humans, antibodies occur in five classes or isotypes: IgA, IgD, IgE, IgG, and IgM. Human IgG and IgA antibodies are also divided into discrete subclasses (IgG1, IgG2, IgG3, and IgG4; IgA1 and IgA2). The class refers to the functions triggered by the antibody (also known as effector functions), in addition to some other structural features. Antibodies from different classes also differ in where they are released in the body and at what stage of an immune response. Between species, while classes and subclasses of antibodies may be shared (at least in name), their function and distribution throughout the body may be different. For example, mouse IgG1 is closer to human IgG2 than to human IgG1 in terms of its function.
The term humoral immunity is often treated as synonymous with the antibody response, describing the function of the immune system that exists in the body's humors (fluids) in the form of soluble proteins, as distinct from cell-mediated immunity, which generally describes the responses of T cells (especially cytotoxic T cells). In general, antibodies are considered part of the adaptive immune system, though this classification can become complicated. For example, natural IgM, which are made by B-1 lineage cells that have properties more similar to innate immune cells than adaptive, refers to IgM antibodies made independently of an immune response that demonstrate polyreactivity – i.e. they recognize multiple distinct (unrelated) antigens. These can work with the complement system in the earliest phases of an immune response to help facilitate clearance of the offending antigen and delivery of the resulting immune complexes to the lymph nodes or spleen for initiation of an immune response. Hence in this capacity, the functions of antibodies are more akin to that of innate immunity than adaptive. Nonetheless, in general, antibodies are regarded as part of the adaptive immune system because they demonstrate exceptional specificity (with some exceptions), are produced through genetic rearrangements (rather than being encoded directly in the germline), and are a manifestation of immunological memory.
In the course of an immune response, B cells can progressively differentiate into antibody-secreting cells or into memory B cells. Antibody-secreting cells comprise plasmablasts and plasma cells, which differ mainly in the degree to which they secrete antibodies, their lifespan, metabolic adaptations, and surface markers. Plasmablasts are rapidly proliferating, short-lived cells produced in the early phases of the immune response (classically described as arising extrafollicularly rather than from a germinal center) which have the potential to differentiate further into plasma cells. Occasionally plasmablasts are mis-described as short-lived plasma cells; formally this is incorrect. Plasma cells, in contrast, do not divide (they are terminally differentiated), and rely on survival niches comprising specific cell types and cytokines to persist. Plasma cells will secrete huge quantities of antibody regardless of whether or not their cognate antigen is present, ensuring that antibody levels to the antigen in question do not fall to zero, provided the plasma cell stays alive. The rate of antibody secretion, however, can be regulated, for example, by the presence of adjuvant molecules that stimulate the immune response such as toll-like receptor ligands. Long-lived plasma cells can live for potentially the entire lifetime of the organism. Classically, the survival niches that house long-lived plasma cells reside in the bone marrow, though it cannot be assumed that any given plasma cell in the bone marrow will be long-lived. However, other work indicates that survival niches can readily be established within the mucosal tissues- though the classes of antibodies involved show a different hierarchy from those in the bone marrow. B cells can also differentiate into memory B cells which can persist for decades, similarly to long-lived plasma cells. These cells can be rapidly recalled in a secondary immune response, undergoing class switching, affinity maturation, and differentiating into antibody-secreting cells.
Antibodies are central to the immune protection elicited by most vaccines and infections (although other components of the immune system certainly participate and for some diseases are considerably more important than antibodies in generating an immune response, e.g. in the case of herpes zoster). Durable protection from infections caused by a given microbe – that is, the ability of the microbe to enter the body and begin to replicate (not necessarily to cause disease) – depends on sustained production of large quantities of antibodies, meaning that effective vaccines ideally elicit persistent high levels of antibody, which relies on long-lived plasma cells. At the same time, many microbes of medical importance have the ability to mutate to escape antibodies elicited by prior infections, and long-lived plasma cells cannot undergo affinity maturation or class switching. This is compensated for through memory B cells: novel variants of a microbe that still retain structural features of previously encountered antigens can elicit memory B cell responses that adapt to those changes. It has been suggested that long-lived plasma cells secrete B cell receptors with higher affinity than those on the surfaces of memory B cells, but findings are not entirely consistent on this point.
Structure
[edit]
Schematic structure of an antibody: two heavy chains (blue, yellow) and the two light chains (green, pink). The antigen binding site is circled.
A more accurate depiction of an antibody (3D structure at RCSB PDB). Glycans in the Fc region are shown in black.
Antibodies are heavy (~150 kDa) proteins of about 10 nm in size, arranged in three globular regions that roughly form a Y shape.
In humans and most other mammals, an antibody unit consists of four polypeptide chains; two identical heavy chains and two identical light chains connected by disulfide bonds. Each chain is a series of domains: somewhat similar sequences of about 110 amino acids each. These domains are usually represented in simplified schematics as rectangles. Light chains consist of one variable domain V L and one constant domain C L, while heavy chains contain one variable domain V H and three to four constant domains C H 1, C H 2, ...
Structurally an antibody is also partitioned into two antigen-binding fragments (Fab), containing one V L, V H, C L, and C H 1 domain each, as well as the crystallisable fragment (Fc), forming the trunk of the Y shape. In between them is a hinge region of the heavy chains, whose flexibility allows antibodies to bind to pairs of epitopes at various distances, to form complexes (dimers, trimers, etc.), and to bind effector molecules more easily.
In an electrophoresis test of blood proteins, antibodies mostly migrate to the last, gamma globulin fraction. Conversely, most gamma-globulins are antibodies, which is why the two terms were historically used as synonyms, as were the symbols Ig and γ. This variant terminology fell out of use due to the correspondence being inexact and due to confusion with γ (gamma) heavy chains which characterize the IgG class of antibodies.
Antigen-binding site
[edit]
The variable domains can also be referred to as the F V region. It is the subregion of Fab that binds to an antigen. More specifically, each variable domain contains three hypervariable regions – the amino acids seen there vary the most from antibody to antibody. When the protein folds, these regions give rise to three loops of β-strands, localized near one another on the surface of the antibody. These loops are referred to as the complementarity-determining regions (CDRs), since their shape complements that of an antigen. Three CDRs from each of the heavy and light chains together form an antibody-binding site whose shape can be anything from a pocket to which a smaller antigen binds, to a larger surface, to a protrusion that sticks out into a groove in an antigen. Typically though, only a few residues contribute to most of the binding energy.
The existence of two identical antibody-binding sites allows antibody molecules to bind strongly to multivalent antigen (repeating sites such as polysaccharides in bacterial cell walls, or other sites at some distance apart), as well as to form antibody complexes and larger antigen-antibody complexes.
The structures of CDRs have been clustered and classified by Chothia et al. and more recently by North et al. and Nikoloudis et al. However, describing an antibody's binding site using only one single static structure limits the understanding and characterization of the antibody's function and properties. To improve antibody structure prediction and to take the strongly correlated CDR loop and interface movements into account, antibody paratopes should be described as interconverting states in solution with varying probabilities.
In the framework of the immune network theory, CDRs are also called idiotypes. According to immune network theory, the adaptive immune system is regulated by interactions between idiotypes.
Fc region
[edit]
Main article: Fragment crystallizable region
The Fc region (the trunk of the Y shape) is composed of constant domains from the heavy chains. Its role is in modulating immune cell activity: it is where effector molecules bind to, triggering various effects after the antibody Fab region binds to an antigen.Effector cells (such as macrophages or natural killer cells) bind via their Fc receptors (FcR) to the Fc region of an antibody, while the complement system is activated by binding the C1q protein complex. IgG or IgM can bind to C1q, but IgA cannot, therefore IgA does not activate the classical complement pathway.
Another role of the Fc region is to selectively distribute different antibody classes across the body. In particular, the neonatal Fc receptor (FcRn) binds to the Fc region of IgG antibodies to transport it across the placenta, from the mother to the fetus. In addition to this, binding to FcRn endows IgG with an exceptionally long half-life relative to other plasma proteins of 3-4 weeks. IgG3 in most cases (depending on allotype) has mutations at the FcRn binding site which lower affinity for FcRn, which are thought to have evolved to limit the highly inflammatory effects of this subclass.
Antibodies are glycoproteins, that is, they have carbohydrates (glycans) added to conserved amino acid residues. These conserved glycosylation sites occur in the Fc region and influence interactions with effector molecules.
Protein structure
[edit]
The N-terminus of each chain is situated at the tip. Each immunoglobulin domain has a similar structure, characteristic of all the members of the immunoglobulin superfamily: it is composed of between 7 (for constant domains) and 9 (for variable domains) β-strands, forming two beta sheets in a Greek key motif. The sheets create a "sandwich" shape, the immunoglobulin fold, held together by a disulfide bond.
Antibody complexes
[edit]
Some antibodies form complexes that bind to multiple antigen molecules.
Secreted antibodies can occur as a single Y-shaped unit, a monomer. However, some antibody classes also form dimers with two Ig units (as with IgA), tetramers with four Ig units (like teleost fish IgM), or pentamers with five Ig units (like shark IgW or mammalian IgM, which occasionally forms hexamers as well, with six units). IgG can also form hexamers, though no J chain is required. IgA tetramers and pentamers have also been reported.
Antibodies also form complexes by binding to antigen: this is called an antigen-antibody complex or immune complex. Small antigens can cross-link two antibodies, also leading to the formation of antibody dimers, trimers, tetramers, etc. Multivalent antigens (e.g., cells with multiple epitopes) can form larger complexes with antibodies. An extreme example is the clumping, or agglutination, of red blood cells with antibodies in blood typing to determine blood groups: the large clumps become insoluble, leading to visually apparent precipitation.
B cell receptors
[edit]
Main article: B-cell receptor
The membrane-bound form of an antibody may be called a surface immunoglobulin (sIg) or a membrane immunoglobulin (mIg). It is part of the B cell receptor (BCR), which allows a B cell to detect when a specific antigen is present in the body and triggers B cell activation. The BCR is composed of surface-bound IgD or IgM antibodies and associated Ig-α and Ig-β heterodimers, which are capable of signal transduction. A typical human B cell will have 50,000 to 100,000 antibodies bound to its surface. Upon antigen binding, they cluster in large patches, which can exceed 1 micrometer in diameter, on lipid rafts that isolate the BCRs from most other cell signaling receptors. These patches may improve the efficiency of the cellular immune response. In humans, the cell surface is bare around the B cell receptors for several hundred nanometers, which further isolates the BCRs from competing influences.
Classes
[edit]
Antibodies can come in different varieties known as isotypes or classes. In humans there are five antibody classes known as IgA, IgD, IgE, IgG, and IgM, which are further subdivided into subclasses such as IgA1, IgA2. The prefix "Ig" stands for immunoglobulin, while the suffix denotes the type of heavy chain the antibody contains: the heavy chain types α (alpha), γ (gamma), δ (delta), ε (epsilon), μ (mu) give rise to IgA, IgG, IgD, IgE, IgM, respectively. The distinctive features of each class are determined by the part of the heavy chain within the hinge and Fc region.
The classes differ in their biological properties, functional locations and ability to deal with different antigens, as depicted in the table. For example, IgE antibodies are responsible for an allergic response consisting of histamine release from mast cells, often a sole contributor to asthma (though other pathways exist as do symptoms very similar to yet not technically asthma). The variable region of these antibodies bind to allergic antigen, for example house dust mite particles, while its Fc region (in the ε heavy chains) binds to Fc receptor ε on a mast cell, triggering its degranulation: the release of molecules stored in its granules.
Antibody isotypes of humans | Class | Subclasses | Description |
---
| IgA | 2 | Found in mucosal areas, such as the gut, respiratory tract and urogenital tract, and prevents colonization by pathogens. Also found in saliva, tears, and breast milk. Early clinical studies suggest that IgA isotype antibodies have potential as anti-cancer therapeutics, demonstrating the ability to reduce tumor growth. |
| IgD | 1 | Functions mainly as an antigen receptor on B cells that have not been exposed to antigens. It has been shown to activate basophils and mast cells to produce antimicrobial factors. In addition, IgD has also been reported to induce the release of immunoactivity and pro-inflammatory mediators. |
| IgE | 1 | IgE antibodies are the least abundant class of immunoglobulin. They can engage Fc receptors on monocytes and macrophages to activate various effector cell populations. Binds to allergens and triggers histamine release from mast cells and basophils, and is involved in allergy. Humans and other animals evolved IgE to protect against parasitic worms, though in the present, IgE is primarily related to allergies and asthma. |
| IgG | 4 | In its four forms, provides the majority of antibody-based immunity against invading pathogens. The only antibody capable of crossing the placenta to give passive immunity to the fetus. IgG is the most commonly used molecular format in current antibody drugs because it neutralizes infectious agents and activates the complement system to engage immune cells. |
| IgM | 1 | Expressed on the surface of B cells (monomer) and in a secreted form (pentamer) with very high avidity. Eliminates pathogens in the early stages of B cell-mediated (humoral) immunity before there is sufficient IgG. IgM also is a pro-inflammatory antibody that serves as the primary defense and effectively stimulates the complement system with specialized immune functions, including higher avidity and steric hindrance, allowing it to neutralize viruses. |
The antibody isotype of a B cell changes during cell development and activation. Immature B cells, which have never been exposed to an antigen, express only the IgM isotype in a cell surface bound form. The B lymphocyte, in this ready-to-respond form, is known as a "naive B lymphocyte." The naive B lymphocyte expresses both surface IgM and IgD. The co-expression of both of these immunoglobulin isotypes renders the B cell ready to respond to antigen. B cell activation follows engagement of the cell-bound antibody molecule with an antigen, causing the cell to divide and differentiate into an antibody-producing cell called a plasma cell. This requires cytokines from T helper cells, unless antigen cross-links B cell receptors. In this activated form, the B cell starts to produce antibody in a secreted form rather than a membrane-bound form. Activated B cells that encounter certain signaling molecules undergo immunoglobulin class switching, also known as isotope switching, which causes the production of antibodies to change from IgM or IgD to the other antibody isotypes, IgE, IgA, or IgG.
Light chain types
[edit]
Further information: Immunoglobulin light chain
In mammals there are two types of immunoglobulin light chain, which are called lambda (λ) and kappa (κ). However, there is no known functional difference between them, and both can occur with any of the five major types of heavy chains. Each antibody contains two identical light chains: both κ or both λ. Proportions of κ and λ types vary by species and can be used to detect abnormal proliferation of B cell clones. Other types of light chains, such as the iota (ι) chain, are found in other vertebrates like sharks (Chondrichthyes) and bony fishes (Teleostei).
In non-mammalian animals
[edit]
In most placental mammals, the structure of antibodies is generally similar. Jawed fish appear to be the most primitive animals that are able to make antibodies similar to those of mammals, although many features of their adaptive immunity appeared somewhat earlier.
Cartilaginous fish (such as sharks) produce heavy-chain-only antibodies (i.e., lacking light chains) which moreover feature longer chain pentamers (with five constant units per molecule). Camelids (such as camels, llamas, alpacas) are also notable for producing heavy-chain-only antibodies.
Antibody classes not found in mammals | Class | Types | Description |
---
| IgY | | Found in birds and reptiles; related to mammalian IgG. |
| IgW | | Found in sharks and skates; related to mammalian IgD. |
| IgT/Z | | Found in teleost fish |
Antibody–antigen interactions
[edit]
The antibody's paratope interacts with the antigen's epitope. An antigen usually contains different epitopes along its surface arranged discontinuously, and dominant epitopes on a given antigen are called determinants.[citation needed]
Antibody and antigen interact by spatial complementarity (lock and key). The molecular forces involved in the Fab-epitope interaction are weak and non-specific – for example electrostatic forces, hydrogen bonds, hydrophobic interactions, and van der Waals forces. This means binding between antibody and antigen is reversible, and the antibody's affinity towards an antigen is relative rather than absolute. Relatively weak binding also means it is possible for an antibody to cross-react with different antigens of different relative affinities.[citation needed]
Function
[edit]
Further information: Immune system
Antibodies (A) and pathogens (B) free roam in the blood.
The antibodies bind to pathogens, and can do so in different formations such as:
opsonization,
neutralisation, and
agglutination.
A phagocyte (C) approaches the pathogen, and the Fc region (D) of the antibody binds to one of the Fc receptors (E) of the phagocyte.
Phagocytosis occurs as the pathogen is ingested.
The main categories of antibody action include the following:[citation needed]
Neutralisation, in which neutralizing antibodies block parts of the surface of a bacterial cell or virion to render its attack ineffective
Agglutination, in which antibodies "glue together" foreign cells into clumps that are attractive targets for phagocytosis
Precipitation, in which antibodies "glue together" serum-soluble antigens, forcing them to precipitate out of solution in clumps that are attractive targets for phagocytosis
Complement activation (fixation), in which antibodies that are latched onto a foreign cell encourage complement to attack it with a membrane attack complex, which leads to the following:
Lysis of the foreign cell
Encouragement of inflammation by chemotactically attracting inflammatory cells
More indirectly, an antibody can signal immune cells to present antibody fragments to T cells, or downregulate other immune cells to avoid autoimmunity.[citation needed]
Activated B cells differentiate into either
antibody-producing cells called plasma cells that secrete soluble antibody or
memory cells that survive in the body for years afterward in order to allow the immune system to remember an antigen and respond faster upon future exposures.
At the prenatal and neonatal stages of life, the presence of antibodies is provided by passive immunization from the mother. Early endogenous antibody production varies for different kinds of antibodies, and usually appear within the first years of life. Since antibodies exist freely in the bloodstream, they are said to be part of the humoral immune system. Circulating antibodies are produced by clonal B cells that specifically respond to only one antigen (an example is a viruscapsid protein fragment). Antibodies contribute to immunity in three ways: They prevent pathogens from entering or damaging cells by binding to them; they stimulate removal of pathogens by macrophages and other cells by coating the pathogen; and they trigger destruction of pathogens by stimulating other immune responses such as the complement pathway. Antibodies will also trigger vasoactive amine degranulation to contribute to immunity against certain types of antigens (helminths, allergens).
The secreted mammalian IgM has five Ig units. Each Ig unit (labeled 1) has two epitope binding Fab regions, so IgM is capable of binding up to 10 epitopes.
Activation of complement
[edit]
Antibodies that bind to surface antigens (for example, on bacteria) will attract the first component of the complement cascade with their Fc region and initiate activation of the "classical" complement system. This results in the killing of bacteria in two ways. First, the binding of the antibody and complement molecules marks the microbe for ingestion by phagocytes in a process called opsonization; these phagocytes are attracted by certain complement molecules generated in the complement cascade. Second, some complement system components form a membrane attack complex to assist antibodies to kill the bacterium directly (bacteriolysis).
Activation of effector cells
[edit]
To combat pathogens that replicate outside cells, antibodies bind to pathogens to link them together, causing them to agglutinate. Since an antibody has at least two paratopes, it can bind more than one antigen by binding identical epitopes carried on the surfaces of these antigens. By coating the pathogen, antibodies stimulate effector functions against the pathogen in cells that recognize their Fc region.
Those cells that recognize coated pathogens have Fc receptors, which, as the name suggests, interact with the Fc region of IgA, IgG, and IgE antibodies. The engagement of a particular antibody with the Fc receptor on a particular cell triggers an effector function of that cell; phagocytes will phagocytose, mast cells and neutrophils will degranulate, natural killer cells will release cytokines and cytotoxic molecules; that will ultimately result in destruction of the invading microbe. The activation of natural killer cells by antibodies initiates a cytotoxic mechanism known as antibody-dependent cell-mediated cytotoxicity (ADCC) – this process may explain the efficacy of monoclonal antibodies used in biological therapies against cancer. The Fc receptors are isotype-specific, which gives greater flexibility to the immune system, invoking only the appropriate immune mechanisms for distinct pathogens.
Natural antibodies
[edit]
Humans and higher primates also produce "natural antibodies" that are present in serum before viral infection. Natural antibodies have been defined as antibodies that are produced without any previous infection, vaccination, other foreign antigen exposure or passive immunization. These antibodies can activate the classical complement pathway leading to lysis of enveloped virus particles long before the adaptive immune response is activated. Antibodies are produced exclusively by B cells in response to antigens where initially, antibodies are formed as membrane-bound receptors, but upon activation by antigens and helper T cells, B cells differentiate to produce soluble antibodies. Many natural antibodies are directed against the disaccharide galactose α(1,3)-galactose (α-Gal), which is found as a terminal sugar on glycosylated cell surface proteins, and generated in response to production of this sugar by bacteria contained in the human gut. These antibodies undergo quality checks in the endoplasmic reticulum (ER), which contains proteins that assist in proper folding and assembly. Rejection of xenotransplantated organs is thought to be, in part, the result of natural antibodies circulating in the serum of the recipient binding to α-Gal antigens expressed on the donor tissue.
Immunoglobulin diversity
[edit]
Virtually all microbes can trigger an antibody response. Successful recognition and eradication of many different types of microbes requires diversity among antibodies; their amino acid composition varies allowing them to interact with many different antigens. It has been estimated that humans generate about 10 billion different antibodies, each capable of binding a distinct epitope of an antigen. Although a huge repertoire of different antibodies is generated in a single individual, the number of genes available to make these proteins is limited by the size of the human genome. Several complex genetic mechanisms have evolved that allow vertebrate B cells to generate a diverse pool of antibodies from a relatively small number of antibody genes.
Domain variability
[edit]
The complementarity determining regions of the heavy chain are shown in red (PDB: 1IGT)
The chromosomal region that encodes an antibody is large and contains several distinct gene loci for each domain of the antibody—the chromosome region containing heavy chain genes (IGH@) is found on chromosome 14, and the loci containing lambda and kappa light chain genes (IGL@ and IGK@) are found on chromosomes 22 and 2 in humans. One of these domains is called the variable domain, which is present in each heavy and light chain of every antibody, but can differ in different antibodies generated from distinct B cells. Differences between the variable domains are located on three loops known as hypervariable regions (HV-1, HV-2 and HV-3) or complementarity-determining regions (CDR1, CDR2 and CDR3). CDRs are supported within the variable domains by conserved framework regions. The heavy chain locus contains about 65 different variable domain genes that all differ in their CDRs. Combining these genes with an array of genes for other domains of the antibody generates a large cavalry of antibodies with a high degree of variability. This combination is called V(D)J recombination and discussed below.
V(D)J recombination
[edit]
Further information: V(D)J recombination
Simplified overview of V(D)J recombination of immunoglobulin heavy chains
Somatic recombination of immunoglobulins, also known as V(D)J recombination, involves the generation of a unique immunoglobulin variable region. The variable region of each immunoglobulin heavy or light chain is encoded in several pieces—known as gene segments (subgenes). These segments are called variable (V), diversity (D) and joining (J) segments. V, D and J segments are found in Ig heavy chains, but only V and J segments are found in Ig light chains. Multiple copies of the V, D and J gene segments exist, and are tandemly arranged in the genomes of mammals. In the bone marrow, each developing B cell will assemble an immunoglobulin variable region by randomly selecting and combining one V, one D and one J gene segment (or one V and one J segment in the light chain). As there are multiple copies of each type of gene segment, and different combinations of gene segments can be used to generate each immunoglobulin variable region, this process generates a huge number of antibodies, each with different paratopes, and thus different antigen specificities. The rearrangement of several subgenes (i.e. V2 family) for lambda light chain immunoglobulin is coupled with the activation of microRNA miR-650, which further influences biology of B-cells.[citation needed]
RAG proteins play an important role with V(D)J recombination in cutting DNA at a particular region. Without the presence of these proteins, V(D)J recombination would not occur.
After a B cell produces a functional immunoglobulin gene during V(D)J recombination, it cannot express any other variable region (a process known as allelic exclusion) thus each B cell can produce antibodies containing only one kind of variable chain.
Somatic hypermutation and affinity maturation
[edit]
Further information: Somatic hypermutation and Affinity maturation
Following activation with antigen, B cells begin to proliferate rapidly. In these rapidly dividing cells, the genes encoding the variable domains of the heavy and light chains undergo a high rate of point mutation, by a process called somatic hypermutation (SHM). SHM results in approximately one nucleotide change per variable gene, per cell division. As a consequence, any daughter B cells will acquire slight amino acid differences in the variable domains of their antibody chains.[citation needed]
This serves to increase the diversity of the antibody pool and impacts the antibody's antigen-binding affinity. Some point mutations will result in the production of antibodies that have a weaker interaction (low affinity) with their antigen than the original antibody, and some mutations will generate antibodies with a stronger interaction (high affinity). B cells that express high affinity antibodies on their surface will receive a strong survival signal during interactions with other cells, whereas those with low affinity antibodies will not, and will die by apoptosis. Thus, B cells expressing antibodies with a higher affinity for the antigen will outcompete those with weaker affinities for function and survival allowing the average affinity of antibodies to increase over time. The process of generating antibodies with increased binding affinities is called affinity maturation. Affinity maturation occurs in mature B cells after V(D)J recombination, and is dependent on help from helper T cells.
Class switching
[edit]
Mechanism of class switch recombination that allows isotype switching in activated B cells
Isotype or class switching is a biological process occurring after activation of the B cell, which allows the cell to produce different classes of antibody (IgA, IgE, or IgG). The different classes of antibody, and thus effector functions, are defined by the constant (C) regions of the immunoglobulin heavy chain. Initially, naive B cells express only cell-surface IgM and IgD with identical antigen binding regions. Each isotype is adapted for a distinct function; therefore, after activation, an antibody with an IgG, IgA, or IgE effector function might be required to effectively eliminate an antigen. Class switching allows different daughter cells from the same activated B cell to produce antibodies of different isotypes. Only the constant region of the antibody heavy chain changes during class switching; the variable regions, and therefore antigen specificity, remain unchanged. Thus the progeny of a single B cell can produce antibodies, all specific for the same antigen, but with the ability to produce the effector function appropriate for each antigenic challenge. Class switching is triggered by cytokines; the isotype generated depends on which cytokines are present in the B cell environment.
Class switching occurs in the heavy chain gene locus by a mechanism called class switch recombination (CSR). This mechanism relies on conserved nucleotide motifs, called switch (S) regions, found in DNA upstream of each constant region gene (except in the δ-chain). The DNA strand is broken by the activity of a series of enzymes at two selected S-regions. The variable domain exon is rejoined through a process called non-homologous end joining (NHEJ) to the desired constant region (γ, α or ε). This process results in an immunoglobulin gene that encodes an antibody of a different isotype.
Specificity designations
[edit]
An antibody can be called monospecific if it has specificity for a single antigen or epitope, or bispecific if it has affinity for two different antigens or two different epitopes on the same antigen. A group of antibodies can be called polyvalent (or unspecific) if they have affinity for various antigens or microorganisms.Intravenous immunoglobulin, if not otherwise noted, consists of a variety of different IgG (polyclonal IgG). In contrast, monoclonal antibodies are identical antibodies produced by a single B cell.
Asymmetrical antibodies
[edit]
Heterodimeric antibodies, which are also asymmetrical antibodies, allow for greater flexibility and new formats for attaching a variety of drugs to the antibody arms. One of the general formats for a heterodimeric antibody is the "knobs-into-holes" format. This format is specific to the heavy chain part of the constant region in antibodies. The "knobs" part is engineered by replacing a small amino acid with a larger one. It fits into the "hole", which is engineered by replacing a large amino acid with a smaller one. What connects the "knobs" to the "holes" are the disulfide bonds between each chain. The "knobs-into-holes" shape facilitates antibody dependent cell mediated cytotoxicity. Single-chain variable fragments (scFv) are connected to the variable domain of the heavy and light chain via a short linker peptide. The linker is rich in glycine, which gives it more flexibility, and serine/threonine, which gives it specificity. Two different scFv fragments can be connected together, via a hinge region, to the constant domain of the heavy chain or the constant domain of the light chain. This gives the antibody bispecificity, allowing for the binding specificities of two different antigens. The "knobs-into-holes" format enhances heterodimer formation but does not suppress homodimer formation.[citation needed]
To further improve the function of heterodimeric antibodies, many scientists are looking towards artificial constructs. Artificial antibodies are largely diverse protein motifs that use the functional strategy of the antibody molecule, but are not limited by the loop and framework structural constraints of the natural antibody. Being able to control the combinational design of the sequence and three-dimensional space could transcend the natural design and allow for the attachment of different combinations of drugs to the arms.[citation needed]
Heterodimeric antibodies have a greater range in shapes they can take and the drugs that are attached to the arms do not have to be the same on each arm, allowing for different combinations of drugs to be used in cancer treatment. Pharmaceuticals are able to produce highly functional bispecific, and even multispecific, antibodies. The degree to which they can function is impressive given that such a change of shape from the natural form should lead to decreased functionality.[citation needed]
Interchromosomal DNA Transposition
[edit]
Antibody diversification typically occurs through somatic hypermutation, class switching, and affinity maturation targeting the BCR gene loci, but on occasion more unconventional forms of diversification have been documented. For example, in the case of malaria caused by Plasmodium falciparum, some antibodies from those who had been infected demonstrated an insertion from chromosome 19 containing a 98-amino acid stretch from leukocyte-associated immunoglobulin-like receptor 1, LAIR1, in the elbow joint. This represents a form of interchromosomal transposition. LAIR1 normally binds collagen, but can recognize repetitive interspersed families of polypeptides (RIFIN) family members that are highly expressed on the surface of P. falciparum-infected red blood cells. In fact, these antibodies underwent affinity maturation that enhanced affinity for RIFIN but abolished affinity for collagen. These "LAIR1-containing" antibodies have been found in 5-10% of donors from Tanzania and Mali, though not in European donors. European donors did show 100-1000 nucleotide stretches inside the elbow joints as well, however. This particular phenomenon may be specific to malaria, as infection is known to induce genomic instability.
History
[edit]
See also: History of immunology
The first use of the term "antibody" occurred in a text by Paul Ehrlich. The term Antikörper (the German word for antibody) appears in the conclusion of his article "Experimental Studies on Immunity", published in October 1891, which states that, "if two substances give rise to two different Antikörper, then they themselves must be different". However, the term was not accepted immediately and several other terms for antibody were proposed; these included Immunkörper, Amboceptor, Zwischenkörper, substance sensibilisatrice, copula, Desmon, philocytase, fixateur, and Immunisin. The word antibody has formal analogy to the word antitoxin and a similar concept to Immunkörper (immune body in English). As such, the original construction of the word contains a logical flaw; the antitoxin is something directed against a toxin, while the antibody is a body directed against something.
Angel of the West (2008) by Julian Voss-Andreae is a sculpture based on the antibody structure published by E. Padlan. Created for the Florida campus of the Scripps Research Institute, the antibody is placed into a ring referencing Leonardo da Vinci'sVitruvian Man thus highlighting the similarity of the antibody and the human body.
The study of antibodies began in 1890 when Emil von Behring and Kitasato Shibasaburō described antibody activity against diphtheria and tetanus toxins. Von Behring and Kitasato put forward the theory of humoral immunity, proposing that a mediator in serum could react with a foreign antigen. His idea prompted Paul Ehrlich to propose the side-chain theory for antibody and antigen interaction in 1897, when he hypothesized that receptors (described as "side-chains") on the surface of cells could bind specifically to toxins– in a "lock-and-key" interaction– and that this binding reaction is the trigger for the production of antibodies. Other researchers believed that antibodies existed freely in the blood and, in 1904, Almroth Wright suggested that soluble antibodies coated bacteria to label them for phagocytosis and killing; a process that he named opsoninization.
Michael Heidelberger
In the 1920s, Michael Heidelberger and Oswald Avery observed that antigens could be precipitated by antibodies and went on to show that antibodies are made of protein. The biochemical properties of antigen-antibody-binding interactions were examined in more detail in the late 1930s by John Marrack. The next major advance was in the 1940s, when Linus Pauling confirmed the lock-and-key theory proposed by Ehrlich by showing that the interactions between antibodies and antigens depend more on their shape than their chemical composition. In 1948, Astrid Fagraeus discovered that B cells, in the form of plasma cells, were responsible for generating antibodies.
Further work concentrated on characterizing the structures of the antibody proteins. A major advance in these structural studies was the discovery in the early 1960s by Gerald Edelman and Joseph Gally of the antibody light chain, and their realization that this protein is the same as the Bence-Jones protein described in 1845 by Henry Bence Jones. Edelman went on to discover that antibodies are composed of disulfide bond-linked heavy and light chains. Around the same time, antibody-binding (Fab) and antibody tail (Fc) regions of IgG were characterized by Rodney Porter. Together, these scientists deduced the structure and complete amino acid sequence of IgG, a feat for which they were jointly awarded the 1972 Nobel Prize in Physiology or Medicine. The Fv fragment was prepared and characterized by David Givol. While most of these early studies focused on IgM and IgG, other immunoglobulin isotypes were identified in the 1960s: Thomas Tomasi discovered secretory antibody (IgA); David S. Rowe and John L. Fahey discovered IgD; and Kimishige Ishizaka and Teruko Ishizaka discovered IgE and showed it was a class of antibodies involved in allergic reactions. In a landmark series of experiments beginning in 1976, Susumu Tonegawa showed that genetic material can rearrange itself to form the vast array of available antibodies.
Medical applications
[edit]
Disease diagnosis
[edit]
Detection of particular antibodies is a very common form of medical diagnostics, and applications such as serology depend on these methods. For example, in biochemical assays for disease diagnosis, a titer of antibodies directed against Epstein–Barr virus or Lyme disease is estimated from the blood. If those antibodies are not present, either the person is not infected or the infection occurred a very long time ago, and the B cells generating these specific antibodies have naturally decayed.[citation needed]
In clinical immunology, levels of individual classes of immunoglobulins are measured by nephelometry (or turbidimetry) to characterize the antibody profile of patient. Elevations in different classes of immunoglobulins are sometimes useful in determining the cause of liver damage in patients for whom the diagnosis is unclear. For example, IgM levels are often elevated in patients with primary biliary cirrhosis, whereas IgA deposition along hepatic sinusoids can suggest alcoholic liver disease.
Autoimmune disorders can often be traced to antibodies that bind the body's own epitopes; many can be detected through blood tests. Antibodies directed against red blood cell surface antigens in immune mediated hemolytic anemia are detected with the Coombs test. The Coombs test is also used for antibody screening in blood transfusion preparation and also for antibody screening in antenatal women.
Practically, several immunodiagnostic methods based on detection of complex antigen-antibody are used to diagnose infectious diseases, for example ELISA, immunofluorescence, Western blot, immunodiffusion, immunoelectrophoresis, and magnetic immunoassay.
Over-the-counter home pregnancy tests rely on human chorionic gonadotropin (hCG)-directed antibodies.
New dioxaborolane chemistry enables radioactive fluoride (18 F) labeling of antibodies, which allows for positron emission tomography (PET) imaging of cancer.
Disease therapy
[edit]
Targeted monoclonal antibody therapy is employed to treat diseases such as rheumatoid arthritis,multiple sclerosis,psoriasis, and many forms of cancer including non-Hodgkin's lymphoma,colorectal cancer, head and neck cancer and breast cancer.
Some immune deficiencies, such as X-linked agammaglobulinemia and hypogammaglobulinemia, result in partial or complete lack of antibodies. These diseases are often treated by inducing a short-term form of immunity called passive immunity. Passive immunity is achieved through the transfer of ready-made antibodies in the form of human or animal serum, pooled immunoglobulin or monoclonal antibodies, into the affected individual.
Prenatal therapy
[edit]
Rh factor, also known as Rh D antigen, is an antigen found on red blood cells; individuals that are Rh-positive (Rh+) have this antigen on their red blood cells and individuals that are Rh-negative (Rh–) do not. During normal childbirth, delivery trauma or complications during pregnancy, blood from a fetus can enter the mother's system. In the case of an Rh-incompatible mother and child, consequential blood mixing may sensitize an Rh- mother to the Rh antigen on the blood cells of the Rh+ child, putting the remainder of the pregnancy, and any subsequent pregnancies, at risk for hemolytic disease of the newborn.
Rho(D) immune globulin antibodies are specific for human RhD antigen. Anti-RhD antibodies are administered as part of a prenatal treatment regimen to prevent sensitization that may occur when a Rh-negative mother has a Rh-positive fetus. Treatment of a mother with Anti-RhD antibodies prior to and immediately after trauma and delivery destroys Rh antigen in the mother's system from the fetus. This occurs before the antigen can stimulate maternal B cells to "remember" Rh antigen by generating memory B cells. Therefore, her humoral immune system will not make anti-Rh antibodies, and will not attack the Rh antigens of the current or subsequent babies. Rho(D) Immune Globulin treatment prevents sensitization that can lead to Rh disease, but does not prevent or treat the underlying disease itself.
Research applications
[edit]
Immunofluorescence image of the eukaryoticcytoskeleton. Microtubules as shown in green, are marked by an antibody conjugated to a green fluorescing molecule, FITC.
Specific antibodies are produced by injecting an antigen into a mammal, such as a mouse, rat, rabbit, goat, sheep, or horse for large quantities of antibody. Blood isolated from these animals contains polyclonal antibodies—multiple antibodies that bind to the same antigen—in the serum, which can now be called antiserum. Antigens are also injected into chickens for generation of polyclonal antibodies in egg yolk. To obtain antibody that is specific for a single epitope of an antigen, antibody-secreting lymphocytes are isolated from the animal and immortalized by fusing them with a cancer cell line. The fused cells are called hybridomas, and will continually grow and secrete antibody in culture. Single hybridoma cells are isolated by dilution cloning to generate cell clones that all produce the same antibody; these antibodies are called monoclonal antibodies. Polyclonal and monoclonal antibodies are often purified using Protein A/G or antigen-affinity chromatography.
In research, purified antibodies are used in many applications. Antibodies for research applications can be found directly from antibody suppliers, or through use of a specialist search engine. Research antibodies are most commonly used to identify and locate intracellular and extracellular proteins. Antibodies are used in flow cytometry to differentiate cell types by the proteins they express; different types of cells express different combinations of cluster of differentiation molecules on their surface, and produce different intracellular and secretable proteins. They are also used in immunoprecipitation to separate proteins and anything bound to them (co-immunoprecipitation) from other molecules in a cell lysate, in Western blot analyses to identify proteins separated by electrophoresis, and in immunohistochemistry or immunofluorescence to examine protein expression in tissue sections or to locate proteins within cells with the assistance of a microscope. Proteins can also be detected and quantified with antibodies, using ELISA and ELISpot techniques.
Antibodies used in research are some of the most powerful, yet most problematic reagents with a tremendous number of factors that must be controlled in any experiment including cross reactivity, or the antibody recognizing multiple epitopes and affinity, which can vary widely depending on experimental conditions such as pH, solvent, state of tissue etc. Multiple attempts have been made to improve both the way that researchers validate antibodies and ways in which they report on antibodies. Researchers using antibodies in their work need to record them correctly in order to allow their research to be reproducible (and therefore tested, and qualified by other researchers). Less than half of research antibodies referenced in academic papers can be easily identified. Papers published in F1000 in 2014 and 2015 provide researchers with a guide for reporting research antibody use. The RRID paper, is co-published in 4 journals that implemented the RRIDs Standard for research resource citation, which draws data from the antibodyregistry.org as the source of antibody identifiers (see also group at Force11).
Antibody regions can be used to further biomedical research by acting as a guide for drugs to reach their target. Several application involve using bacterial plasmids to tag plasmids with the Fc region of the antibody such as pFUSE-Fc plasmid.[citation needed]
Regulations
[edit]
Production and testing
[edit]
There are several ways to obtain antibodies, including in vivo techniques like animal immunization and various in vitro approaches, such as the phage display method. Traditionally, most antibodies are produced by hybridoma cell lines through immortalization of antibody-producing cells by chemically induced fusion with myeloma cells. In some cases, additional fusions with other lines have created "triomas" and "quadromas". The manufacturing process should be appropriately described and validated. Validation studies should at least include:
The demonstration that the process is able to produce in good quality (the process should be validated)
The efficiency of the antibody purification (all impurities and virus must be eliminated)
The characterization of purified antibody (physicochemical characterization, immunological properties, biological activities, contaminants, ...)
Determination of the virus clearance studies
Before clinical trials
[edit]
Product safety testing: Sterility (bacteria and fungi), in vitro and in vivo testing for adventitious viruses, murineretrovirus testing..., product safety data needed before the initiation of feasibility trials in serious or immediately life-threatening conditions, it serves to evaluate dangerous potential of the product.
Feasibility testing: These are pilot studies whose objectives include, among others, early characterization of safety and initial proof of concept in a small specific patient population (in vitro or in vivo testing).[citation needed]
Preclinical studies
[edit]
Testing cross-reactivity of antibody: to highlight unwanted interactions (toxicity) of antibodies with previously characterized tissues. This study can be performed in vitro (reactivity of the antibody or immunoconjugate should be determined with a quick-frozen adult tissues) or in vivo (with appropriates animal models).[citation needed]
Preclinicalpharmacology and toxicity testing: preclinical safety testing of antibody is designed to identify possible toxicity in humans, to estimate the likelihood and severity of potential adverse events in humans, and to identify a safe starting dose and dose escalation, when possible.
Animal toxicity studies: Acute toxicity testing, repeat-dose toxicity testing, long-term toxicity testing
Pharmacokinetics and pharmacodynamics testing: Use for determinate clinical dosages, antibody activities, evaluation of the potential clinical effects
Structure prediction and computational antibody design
[edit]
The importance of antibodies in health care and the biotechnology industry demands knowledge of their structures at high resolution. This information is used for protein engineering, modifying the antigen binding affinity, and identifying an epitope, of a given antibody. X-ray crystallography is one commonly used method for determining antibody structures. However, crystallizing an antibody is often laborious and time-consuming. Computational approaches provide a cheaper and faster alternative to crystallography, but their results are more equivocal, since they do not produce empirical structures. Online web servers such as Web Antibody Modeling (WAM) and Prediction of Immunoglobulin Structure (PIGS) enable computational modeling of antibody variable regions. Rosetta Antibody is a novel antibody F V region structure prediction server, which incorporates sophisticated techniques to minimize CDR loops and optimize the relative orientation of the light and heavy chains, as well as homology models that predict successful docking of antibodies with their unique antigen. However, describing an antibody's binding site using only one single static structure limits the understanding and characterization of the antibody's function and properties. To improve antibody structure prediction and to take the strongly correlated CDR loop and interface movements into account, antibody paratopes should be described as interconverting states in solution with varying probabilities.
The ability to describe the antibody through binding affinity to the antigen is supplemented by information on antibody structure and amino acid sequences for the purpose of patent claims. Several methods have been presented for computational design of antibodies based on the structural bioinformatics studies of antibody CDRs.
There are a variety of methods used to sequence an antibody including Edman degradation, cDNA, etc.; albeit one of the most common modern uses for peptide/protein identification is liquid chromatography coupled with tandem mass spectrometry (LC-MS/MS). High volume antibody sequencing methods require computational approaches for the data analysis, including de novo sequencing directly from tandem mass spectra and database search methods that use existing protein sequence databases. Many versions of shotgun protein sequencing are able to increase the coverage by utilizing CID/HCD/ETD fragmentation methods and other techniques, and they have achieved substantial progress in attempt to fully sequence proteins, especially antibodies. Other methods have assumed the existence of similar proteins, a known genome sequence, or combined top-down and bottom up approaches. Current technologies have the ability to assemble protein sequences with high accuracy by integrating de novo sequencingpeptides, intensity, and positional confidence scores from database and homology searches.
Antibody mimetic
[edit]
Antibody mimetics are organic compounds, like antibodies, that can specifically bind antigens. They consist of artificial peptides or proteins, or aptamer-based nucleic acid molecules with a molar mass of about 3 to 20 kDa. Antibody fragments, such as Fab and nanobodies are not considered as antibody mimetics. Common advantages over antibodies are better solubility, tissue penetration, stability towards heat and enzymes, and comparatively low production costs. Antibody mimetics have been developed and commercialized as research, diagnostic and therapeutic agents.
Binding antibody unit
[edit]
BAU (binding antibody unit, often as BAU/mL) is a measurement unit defined by the WHO for the comparison of assays detecting the same class of immunoglobulins with the same specificity.
See also
[edit]
Affimer
Anti-mitochondrial antibodies
Anti-nuclear antibodies
Antibody mimetic
Aptamer
Colostrum
ELISA
Humoral immunity
Immunology
Immunosuppressive drug
Intravenous immunoglobulin (IVIg)
Magnetic immunoassay
Microantibody
Monoclonal antibody
Neutralizing antibody
Optimer Ligand
Secondary antibodies
Single-domain antibody
Slope spectroscopy
Surrobody
Synthetic antibody
Western blot normalization
References
[edit]
^ abcdefghiJaneway C (2001). Immunobiology (5th ed.). Garland Publishing. ISBN978-0-8153-3642-6.
^Litman GW, Rast JP, Shamblott MJ, Haire RN, Hulst M, Roess W, et al. (January 1993). "Phylogenetic diversification of immunoglobulin genes and the antibody repertoire". Molecular Biology and Evolution. 10 (1): 60–72. doi:10.1093/oxfordjournals.molbev.a040000. PMID8450761.
^Wilson IA, Stanfield RL (3 May 2021). "50 Years of structural immunology". The Journal of Biological Chemistry. 296 100745. doi:10.1016/j.jbc.2021.100745. ISSN0021-9258. PMC8163984. PMID33957119. Antibodies (A–D) can recognize virtually any antigen whether large or small, and which can have diverse chemical compositions from small molecules (A) to carbohydrates to lipids to peptides (B) to proteins (C and D) and combinations thereof.
^ abRhoades RA, Pflanzer RG (2002). Human Physiology (5th ed.). Thomson Learning. p.584. ISBN978-0-534-42174-8.
^Ehrenstein MR, Notley CA (15 October 2010). "The importance of natural IgM: scavenger, protector and regulator". Nature Reviews Immunology. 10 (11): 778–786. doi:10.1038/nri2849. ISSN1474-1733. PMID20948548. S2CID35784099.
^Akkaya M, Kwak K, Pierce SK (April 2020). "B cell memory: building two walls of protection against pathogens". Nature Reviews Immunology. 20 (4): 229–238. doi:10.1038/s41577-019-0244-2. ISSN1474-1741. PMC7223087. PMID31836872.
^Tellier J, Nutt SL (15 October 2018). "Plasma cells: The programming of an antibody-secreting machine". European Journal of Immunology. 49 (1): 30–37. doi:10.1002/eji.201847517. hdl:11343/284565. ISSN0014-2980. PMID30273443.
^"B Cell Memory and Plasma Cell Development", Molecular Biology of B Cells, Elsevier, pp.227–249, 2015, doi:10.1016/b978-0-12-397933-9.00014-x, ISBN978-0-12-397933-9, retrieved 24 January 2024
^Chu VT, Berek C (19 December 2012). "The establishment of the plasma cell survival niche in the bone marrow". Immunological Reviews. 251 (1): 177–188. doi:10.1111/imr.12011. ISSN0105-2896. PMID23278749. S2CID205212187.
^Dorner M, Brandt S, Tinguely M, Zucol F, Bourquin JP, Zauner L, et al. (6 November 2009). "Plasma cell toll-like receptor (TLR) expression differs from that of B cells, and plasma cell TLR triggering enhances immunoglobulin production". Immunology. 128 (4): 573–579. doi:10.1111/j.1365-2567.2009.03143.x. ISSN0019-2805. PMC2792141. PMID19950420.
^Joyner CJ, Ley AM, Nguyen DC, Ali M, Corrado A, Tipton C, et al. (March 2022). "Generation of human long-lived plasma cells by developmentally regulated epigenetic imprinting". Life Science Alliance. 5 (3): e202101285. doi:10.26508/lsa.202101285. ISSN2575-1077. PMC8739272. PMID34952892.{{cite journal}}: CS1 maint: article number as page number (link)
^Halliley JL, Tipton CM, Liesveld J, Rosenberg AF, Darce J, Gregoretti IV, et al. (July 2015). "Long-Lived Plasma Cells Are Contained within the CD19−CD38hiCD138+ Subset in Human Bone Marrow". Immunity. 43 (1): 132–145. doi:10.1016/j.immuni.2015.06.016. PMC4680845. PMID26187412.
^Tellier J, Tarasova I, Nie J, Smillie CS, Fedele PL, Cao WH, et al. (3 January 2024). "Unraveling the diversity and functions of tissue-resident plasma cells". Nature Immunology. 25 (2): 330–342. doi:10.1038/s41590-023-01712-w. ISSN1529-2908. PMID38172260. S2CID266752931.
^Landsverk OJ, Snir O, Casado RB, Richter L, Mold JE, Réu P, et al. (February 2017). "Antibody-secreting plasma cells persist for decades in human intestine". The Journal of Experimental Medicine. 214 (2): 309–317. doi:10.1084/jem.20161590. ISSN1540-9538. PMC5294861. PMID28104812.
^Plotkin SA (2022). "Recent updates on correlates of vaccine-induced protection". Frontiers in Immunology. 13 1081107. doi:10.3389/fimmu.2022.1081107. ISSN1664-3224. PMC9912984. PMID36776392.
^Sutton HJ, Gao X, Kelly HG, Parker BJ, Lofgren M, Dacon C, et al. (12 January 2024). "Lack of affinity signature for germinal center cells that have initiated plasma cell differentiation". Immunity. 57 (2): S1074–7613(23)00541–1. doi:10.1016/j.immuni.2023.12.010. ISSN1097-4180. PMC10922795. PMID38228150.
^Reth M (August 2013). "Matching cellular dimensions with molecular sizes"(PDF). Nature Immunology. 14 (8): 765–7. doi:10.1038/ni.2621. PMID23867923. S2CID24333875. Archived from the original(PDF) on 2 May 2018. Retrieved 1 May 2018.
^ abWoof JM, Burton DR (February 2004). "Human antibody-Fc receptor interactions illuminated by crystal structures". Nature Reviews. Immunology. 4 (2): 89–99. doi:10.1038/nri1266. PMID15040582. S2CID30584218.
^Barclay AN (August 2003). "Membrane proteins with immunoglobulin-like domains—a master superfamily of interaction molecules". Seminars in Immunology. 15 (4): 215–23. doi:10.1016/S1044-5323(03)00047-2. PMID14690046.
^Putnam FW, Liu YS, Low TL (April 1979). "Primary structure of a human IgA1 immunoglobulin. IV. Streptococcal IgA1 protease, digestion, Fab and Fc fragments, and the complete amino acid sequence of the alpha 1 heavy chain". The Journal of Biological Chemistry. 254 (8): 2865–74. Bibcode:1979JBiCh.254.2865P. doi:10.1016/S0021-9258(17)30153-9. PMID107164.
^ abDelves PJ, Martin SJ, Burton DR, Roitt IM (2017). Roitt's essential immunology (13th ed.). Chichester, West Sussex. ISBN978-1-118-41577-1. OCLC949912256.{{cite book}}: CS1 maint: location missing publisher (link)
^"MeSH Browser – gamma-Globulins". meshb.nlm.nih.gov. Retrieved 18 October 2020.
^"Recommendations for the nomenclature of human immunoglobulins". Journal of Immunology. 108 (6): 1733–4. June 1972. doi:10.4049/jimmunol.108.6.1733. PMID5031329.
^Al-Lazikani B, Lesk AM, Chothia C (November 1997). "Standard conformations for the canonical structures of immunoglobulins". Journal of Molecular Biology. 273 (4): 927–48. doi:10.1006/jmbi.1997.1354. PMID9367782.
^North B, Lehmann A, Dunbrack RL (February 2011). "A new clustering of antibody CDR loop conformations". Journal of Molecular Biology. 406 (2): 228–56. doi:10.1016/j.jmb.2010.10.030. PMC3065967. PMID21035459.
^Nikoloudis D, Pitts JE, Saldanha JW (2014). "A complete, multi-level conformational clustering of antibody complementarity-determining regions". PeerJ. 2 (e456): e456. doi:10.7717/peerj.456. PMC4103072. PMID25071986.
^ abFernández-Quintero ML, Georges G, Varga JM, Liedl KR (2021). "Ensembles in solution as a new paradigm for antibody structure prediction and design". mAbs. 13 (1) 1923122. doi:10.1080/19420862.2021.1923122. PMC8158028. PMID34030577.
^"Antibody Structure". BioAtla. 8 January 2016. Retrieved 18 December 2024.
^Woof JM, Russell RW (2011). "Structure and function relationships in IgA". Mucosal Immunology. 4 (6): 590–597. doi:10.1038/mi.2011.39. PMID21937984.
^Damelang T, Rogerson SJ, Kent SJ, Chung AW (March 2019). "Role of IgG3 in Infectious Diseases". Trends in Immunology. 40 (3): 197–211. doi:10.1016/j.it.2019.01.005. hdl:11343/284299. ISSN1471-4906. PMID30745265. S2CID73419807.
^ abcMaverakis E, Kim K, Shimoda M, Gershwin ME, Patel F, Wilken R, et al. (February 2015). "Glycans in the immune system and The Altered Glycan Theory of Autoimmunity: a critical review". Journal of Autoimmunity. 57 (6): 1–13. doi:10.1016/j.jaut.2014.12.002. PMC4340844. PMID25578468.
^Mattu TS, Pleass RJ, Willis AC, Kilian M, Wormald MR, Lellouch AC, et al. (January 1998). "The glycosylation and structure of human serum IgA1, Fab, and Fc regions and the role of N-glycosylation on Fcα receptor interactions". The Journal of Biological Chemistry. 273 (4): 2260–72. doi:10.1074/jbc.273.4.2260. PMID9442070.
^Cobb BA (March 2020). "The history of IgG glycosylation and where we are now". Glycobiology. 30 (4): 202–213. doi:10.1093/glycob/cwz065. PMC7109348. PMID31504525.
^Cruse JM, Lewis RE, Wang H, eds. (1 January 2004), "Molecules, Cells, and Tissues of Immunity", Immunology Guidebook, San Diego: Academic Press, pp.1–15, doi:10.1016/b978-012198382-6/50025-x, ISBN978-0-12-198382-6, retrieved 15 February 2025
^Bajorath J (1 January 1998), "Cell Surface Receptors and Adhesion Molecules, Three-Dimensional Structures", in Delves PJ (ed.), Encyclopedia of Immunology (Second Edition), Oxford: Elsevier, pp.515–520, doi:10.1006/rwei.1999.0136, ISBN978-0-12-226765-9, retrieved 15 February 2025
^Roux KH (October 1999). "Immunoglobulin structure and function as revealed by electron microscopy". International Archives of Allergy and Immunology. 120 (2): 85–99. doi:10.1159/000024226. PMID10545762. S2CID12187510.
^Diebolder CA, Beurskens FJ, de Jong RN, Koning RI, Strumane K, Lindorfer MA, et al. (14 March 2014). "Complement Is Activated by IgG Hexamers Assembled at the Cell Surface". Science. 343 (6176): 1260–1263. Bibcode:2014Sci...343.1260D. doi:10.1126/science.1248943. ISSN0036-8075. PMC4250092. PMID24626930.
^Kumar N, Arthur CP, Ciferri C, Matsumoto ML (28 February 2020). "Structure of the secretory immunoglobulin A core". Science. 367 (6481): 1008–1014. Bibcode:2020Sci...367.1008K. doi:10.1126/science.aaz5807. ISSN0036-8075. PMID32029686.
^Actor JK (2012). "Immunoassays". Elsevier's Integrated Review Immunology and Microbiology (2nd ed.). Elsevier. p.71. doi:10.1016/B978-0-323-07447-6.00009-0. ISBN978-0-323-07447-6. Antibody-antigen interactions: the basis of quantitative and qualitative assays. Experimentally, if a known concentration of antibody is mixed with increasing amounts of specific antigen, then cross-linked antibody-antigen complexes begin to precipitate from the solution.
^"Immunology Laboratory: Hemagglutination". medicine.mcgill.ca. The McGill Physiology Virtual Lab. Retrieved 29 August 2024.
^Yeow N, Tabor RF, Garnier G (3 February 2017). "Mapping the distribution of specific antibody interaction forces on individual red blood cells". Scientific Reports. 7 (1): 41956. Bibcode:2017NatSR...741956Y. doi:10.1038/srep41956. PMC5291206. PMID28157207.{{cite journal}}: CS1 maint: article number as page number (link)
^Parker DC (1993). "T cell-dependent B cell activation". Annual Review of Immunology. 11 (1): 331–60. doi:10.1146/annurev.iy.11.040193.001555. PMID8476565.
^ abcdWintrobe MM (2004). Greer JG, Foerster F, Lukens JN, Rodgers GM, Paraskevas F (eds.). Wintrobe's clinical hematology (11 ed.). Hagerstown, MD: Lippincott Williams & Wilkins. pp.453–456. ISBN978-0-7817-3650-3.
^Tolar P, Sohn HW, Pierce SK (February 2008). "Viewing the antigen-induced initiation of B-cell activation in living cells". Immunological Reviews. 221 (1): 64–76. doi:10.1111/j.1600-065X.2008.00583.x. PMID18275475. S2CID38464264.
^Williams CM, Galli SJ (May 2000). "The diverse potential effector and immunoregulatory roles of mast cells in allergic disease". The Journal of Allergy and Clinical Immunology. 105 (5): 847–59. doi:10.1067/mai.2000.106485. PMID10808163.
^Underdown BJ, Schiff JM (1986). "Immunoglobulin A: strategic defense initiative at the mucosal surface". Annual Review of Immunology. 4 (1): 389–417. doi:10.1146/annurev.iy.04.040186.002133. PMID3518747.
^ abcdefgMark JK, Lim CS, Nordin F, Tye GJ (1 November 2022). "Expression of mammalian proteins for diagnostics and therapeutics: a review". Molecular Biology Reports. 49 (11): 10593–10608. doi:10.1007/s11033-022-07651-3. ISSN1573-4978. PMC9175168. PMID35674877.
^ abGeisberger R, Lamers M, Achatz G (August 2006). "The riddle of the dual expression of IgM and IgD". Immunology. 118 (4): 429–37. doi:10.1111/j.1365-2567.2006.02386.x. PMC1782314. PMID16895553.
^Chen K, Xu W, Wilson M, He B, Miller NW, Bengtén E, et al. (August 2009). "Immunoglobulin D enhances immune surveillance by activating antimicrobial, proinflammatory and B cell-stimulating programs in basophils". Nature Immunology. 10 (8): 889–98. doi:10.1038/ni.1748. PMC2785232. PMID19561614.
^ abcdePier GB, Lyczak JB, Wetzler LM (2004). Immunology, Infection, and Immunity. ASM Press. ISBN978-1-55581-246-1.
^Goding JW (1978). "Allotypes of IgM and IgD Receptors in the Mouse: A Probe for Lymphocyte Differentiation". Contemporary Topics in Immunobiology. Vol.8. pp.203–43. doi:10.1007/978-1-4684-0922-2_7. ISBN978-1-4684-0924-6. PMID357078.
^Charles A Janeway J, Travers P, Walport M, Shlomchik MJ (2001), "General principles of transmembrane signaling", Immunobiology: The Immune System in Health and Disease. 5th edition, Garland Science, retrieved 27 January 2025
^Yu K, Lieber MR (4 July 2019). "Current insights into the mechanism of mammalian immunoglobulin class switch recombination". Critical Reviews in Biochemistry and Molecular Biology. 54 (4): 333–351. doi:10.1080/10409238.2019.1659227. ISSN1040-9238. PMC6856442. PMID31509023.
^Oettgen H, Broide DH (1 January 2012), Holgate ST, Church MK, Broide DH, Martinez FD (eds.), "1 - Introduction to mechanisms of allergic disease", Allergy (Fourth Edition), Edinburgh: W.B. Saunders, pp.1–32, doi:10.1016/b978-0-7234-3658-4.00005-6, ISBN978-0-7234-3658-4, retrieved 15 February 2025
^Lefranc MP, Lefranc G (28 February 2022). "IMGT®Homo sapiens IG and TR Loci, Gene Order, CNV and Haplotypes: New Concepts as a Paradigm for Jawed Vertebrates Genome Assemblies". Biomolecules. 12 (3): 381. doi:10.3390/biom12030381. ISSN2218-273X. PMC8945572. PMID35327572.
^Xia Z (2016), "Structure, Classification, and Naming of Therapeutic Monoclonal Antibodies", Biosimilars of Monoclonal Antibodies, John Wiley & Sons, Ltd, pp.63–83, doi:10.1002/9781118940648.ch2, ISBN978-1-118-94064-8, retrieved 15 February 2025
^Litman GW, Rast JP, Fugmann SD (August 2010). "The origins of vertebrate adaptive immunity". Nature Reviews. Immunology. 10 (8): 543–53. doi:10.1038/nri2807. PMC2919748. PMID20651744.
^Litman GW, Rast JP, Fugmann SD (August 2010). "The origins of vertebrate adaptive immunity". Nature Reviews. Immunology. 10 (8): 543–53. doi:10.1038/nri2807. PMC2919748. PMID20651744.
^Lundqvist ML, Middleton DL, Radford C, Warr GW, Magor KE (2006). "Immunoglobulins of the non-galliform birds: antibody expression and repertoire in the duck". Developmental and Comparative Immunology. 30 (1–2): 93–100. doi:10.1016/j.dci.2005.06.019. PMC1317265. PMID16150486.
^Berstein RM, Schluter SF, Shen S, Marchalonis JJ (April 1996). "A new high molecular weight immunoglobulin class from the carcharhine shark: implications for the properties of the primordial immunoglobulin". Proceedings of the National Academy of Sciences of the United States of America. 93 (8): 3289–93. Bibcode:1996PNAS...93.3289B. doi:10.1073/pnas.93.8.3289. PMC39599. PMID8622930.
^Salinas, I., & Parra, D. (2015). Fish mucosal immunity: Intestine. In Mucosal Health in Aquaculture. Elsevier Inc.
^Borghesi L, Milcarek C (2006). "From B cell to plasma cell: regulation of V(D)J recombination and antibody secretion". Immunologic Research. 36 (1–3): 27–32. doi:10.1385/IR:36:1:27. PMID17337763. S2CID27041937.
^ abRavetch JV, Bolland S (2001). "IgG Fc receptors". Annual Review of Immunology. 19 (1): 275–90. doi:10.1146/annurev.immunol.19.1.275. PMID11244038.
^Rus H, Cudrici C, Niculescu F (2005). "The role of the complement system in innate immunity". Immunologic Research. 33 (2): 103–12. doi:10.1385/IR:33:2:103. PMID16234578. S2CID46096567.
^Racaniello, Vincent (6 October 2009). "Natural antibody protects against viral infection". Virology Blog. Archived from the original on 20 February 2010. Retrieved 22 January 2010.
^Milland J, Sandrin MS (December 2006). "ABO blood group and related antigens, natural antibodies and transplantation". Tissue Antigens. 68 (6): 459–66. doi:10.1111/j.1399-0039.2006.00721.x. PMID17176435.
^Mian IS, Bradwell AR, Olson AJ (January 1991). "Structure, function and properties of antibody binding sites". Journal of Molecular Biology. 217 (1): 133–51. doi:10.1016/0022-2836(91)90617-F. PMID1988675.
^Fanning LJ, Connor AM, Wu GE (April 1996). "Development of the immunoglobulin repertoire". Clinical Immunology and Immunopathology. 79 (1): 1–14. doi:10.1006/clin.1996.0044. PMID8612345.
^ abNemazee D (October 2006). "Receptor editing in lymphocyte development and central tolerance". Nature Reviews. Immunology. 6 (10): 728–40. doi:10.1038/nri1939. PMID16998507. S2CID2234228.
^Peter Parham. The Immune System. 2nd ed. Garland Science: New York, 2005. pg.47–62
^ abcdMarket E, Papavasiliou FN (October 2003). "V(D)J recombination and the evolution of the adaptive immune system". PLOS Biology. 1 (1): E16. doi:10.1371/journal.pbio.0000016. PMC212695. PMID14551913.
^Bergman Y, Cedar H (October 2004). "A stepwise epigenetic process controls immunoglobulin allelic exclusion". Nature Reviews. Immunology. 4 (10): 753–61. doi:10.1038/nri1458. PMID15459667. S2CID8579156.
^Diaz M, Casali P (April 2002). "Somatic immunoglobulin hypermutation". Current Opinion in Immunology. 14 (2): 235–40. doi:10.1016/S0952-7915(02)00327-8. PMC4621002. PMID11869898.
^Honjo T, Habu S (1985). "Origin of immune diversity: genetic variation and selection". Annual Review of Biochemistry. 54 (1): 803–30. doi:10.1146/annurev.bi.54.070185.004103. PMID3927822.
^ abOr-Guil M, Wittenbrink N, Weiser AA, Schuchhardt J (April 2007). "Recirculation of germinal center B cells: a multilevel selection strategy for antibody maturation". Immunological Reviews. 216: 130–41. doi:10.1111/j.1600-065X.2007.00507.x. PMID17367339. S2CID37636392.
^Neuberger MS, Ehrenstein MR, Rada C, Sale J, Batista FD, Williams G, et al. (March 2000). "Memory in the B-cell compartment: antibody affinity maturation". Philosophical Transactions of the Royal Society of London. Series B, Biological Sciences. 355 (1395): 357–60. doi:10.1098/rstb.2000.0573. PMC1692737. PMID10794054.
^Stavnezer J, Amemiya CT (August 2004). "Evolution of isotype switching". Seminars in Immunology. 16 (4): 257–75. doi:10.1016/j.smim.2004.08.005. PMID15522624.
^Durandy A (August 2003). "Activation-induced cytidine deaminase: a dual role in class-switch recombination and somatic hypermutation". European Journal of Immunology. 33 (8): 2069–73. doi:10.1002/eji.200324133. PMID12884279. S2CID32059768.
^Casali P, Zan H (November 2004). "Class switching and Myc translocation: how does DNA break?". Nature Immunology. 5 (11): 1101–3. doi:10.1038/ni1104-1101. PMC4625794. PMID15496946.
^Lieber MR, Yu K, Raghavan SC (September 2006). "Roles of nonhomologous DNA end joining, V(D)J recombination, and class switch recombination in chromosomal translocations". DNA Repair. 5 (9–10): 1234–45. doi:10.1016/j.dnarep.2006.05.013. PMID16793349.
^p. 22 in: Shoenfeld Y, Meroni PL, Gershwin ME (2007). Autoantibodie. Amsterdam; Boston: Elsevier. ISBN978-0-444-52763-9.
^Spiess C, Zhai Q, Carter PJ (October 2015). "Alternative molecular formats and therapeutic applications for bispecific antibodies". Molecular Immunology. 67 (2 Pt A): 95–106. doi:10.1016/j.molimm.2015.01.003. PMID25637431.
^ abFarlex dictionary > polyvalent Citing: The American Heritage Medical Dictionary. 2004
^Nelson PN (1 June 2000). "Demystified ...: Monoclonal antibodies". Molecular Pathology. 53 (3): 111–117. doi:10.1136/mp.53.3.111. PMC1186915. PMID10897328.
^Gunasekaran K, Pentony M, Shen M, Garrett L, Forte C, Woodward A, et al. (June 2010). "Enhancing antibody Fc heterodimer formation through electrostatic steering effects: applications to bispecific molecules and monovalent IgG". The Journal of Biological Chemistry. 285 (25): 19637–46. doi:10.1074/jbc.M110.117382. PMC2885242. PMID20400508.
^Muller KM (1998). "The first constant domain (CH1 and CL) of an antibody used as heterodimerization domain for bispecific miniantibodies". FEBS Letters. 422 (2): 259–264. Bibcode:1998FEBSL.422..259M. doi:10.1016/s0014-5793(98)00021-0. PMID9490020. S2CID35243494.
^Gao C, Mao S, Lo CH, Wirsching P, Lerner RA, Janda KD (May 1999). "Making artificial antibodies: a format for phage display of combinatorial heterodimeric arrays". Proceedings of the National Academy of Sciences of the United States of America. 96 (11): 6025–30. Bibcode:1999PNAS...96.6025G. doi:10.1073/pnas.96.11.6025. PMC26829. PMID10339535.
^Kanyavuz A, Marey-Jarossay A, Lacroix-Desmazes S, Dimitrov JD (June 2019). "Breaking the law: unconventional strategies for antibody diversification". Nature Reviews Immunology. 19 (6): 355–368. doi:10.1038/s41577-019-0126-7. ISSN1474-1741. PMID30718829. S2CID59603663.
^Pieper K, Tan J, Piccoli L, Foglierini M, Barbieri S, Chen Y, et al. (August 2017). "Public antibodies to malaria antigens generated by two LAIR1 insertion modalities". Nature. 548 (7669): 597–601. Bibcode:2017Natur.548..597P. doi:10.1038/nature23670. ISSN0028-0836. PMC5635981. PMID28847005.
^Robbiani DF, Deroubaix S, Feldhahn N, Oliveira TY, Callen E, Wang Q, et al. (August 2015). "Plasmodium Infection Promotes Genomic Instability and AID-Dependent B Cell Lymphoma". Cell. 162 (4): 727–737. doi:10.1016/j.cell.2015.07.019. PMC4538708. PMID26276629.
^ abcdLindenmann J (April 1984). "Origin of the terms 'antibody' and 'antigen'". Scandinavian Journal of Immunology. 19 (4): 281–5. doi:10.1111/j.1365-3083.1984.tb00931.x. PMID6374880. S2CID222200504.
^Padlan EA (February 1994). "Anatomy of the antibody molecule". Molecular Immunology. 31 (3): 169–217. doi:10.1016/0161-5890(94)90001-9. PMID8114766.
^Sauter E (10 November 2018). "New Sculpture Portraying Human Antibody as Protective Angel Installed on Scripps Florida Campus". News & Views. Vol.8, no.34. The Scripps Research Institute. Archived from the original on 10 January 2011. Retrieved 12 December 2008.
^Pescovitz D (22 October 2008). "Protein sculpture inspired by Vitruvian Man". boingboing (Blog). Archived from the original on 4 November 2010. Retrieved 12 December 2008.
^Emil von Behring – Biographical. NobelPrize.org. Nobel Media AB 2020. Mon. 20 January 2020.
^AGN (August 1931). "The Late Baron Shibasaburo Kitasato". Canadian Medical Association Journal. 25 (2): 206. PMC382621. PMID20318414.
^Winau F, Westphal O, Winau R (July 2004). "Paul Ehrlich—in search of the magic bullet". Microbes and Infection. 6 (8): 786–9. doi:10.1016/j.micinf.2004.04.003. PMID15207826.
^Silverstein AM (May 2003). "Cellular versus humoral immunology: a century-long dispute". Nature Immunology. 4 (5): 425–8. doi:10.1038/ni0503-425. PMID12719732. S2CID31571243.
^Van Epps HL (January 2006). "Michael Heidelberger and the demystification of antibodies". The Journal of Experimental Medicine. 203 (1): 5. doi:10.1084/jem.2031fta. PMC2118068. PMID16523537.
^Marrack JR (1938). Chemistry of antigens and antibodies (2nd ed.). London: His Majesty's Stationery Office. OCLC3220539.
^"The Linus Pauling Papers: How Antibodies and Enzymes Work". Archived from the original on 5 December 2010. Retrieved 5 June 2007.
^Silverstein AM (December 2004). "Labeled antigens and antibodies: the evolution of magic markers and magic bullets"(PDF). Nature Immunology. 5 (12): 1211–7. doi:10.1038/ni1140. PMID15549122. S2CID40595920. Archived from the original(PDF) on 25 March 2009.
^Edelman GM, Gally JA (August 1962). "The nature of Bence-Jones proteins. Chemical similarities to polypetide chains of myeloma globulins and normal gamma-globulins". The Journal of Experimental Medicine. 116 (2): 207–27. doi:10.1084/jem.116.2.207. PMC2137388. PMID13889153.
^Stevens FJ, Solomon A, Schiffer M (July 1991). "Bence Jones proteins: a powerful tool for the fundamental study of protein chemistry and pathophysiology". Biochemistry. 30 (28): 6803–5. doi:10.1021/bi00242a001. PMID2069946.
^ abRaju TN (September 1999). "The Nobel chronicles. 1972: Gerald M Edelman (b 1929) and Rodney R Porter (1917–85)". Lancet. 354 (9183): 1040. doi:10.1016/S0140-6736(05)76658-7. PMID10501404. S2CID54380536.
^Hochman J, Inbar D, Givol D (March 1973). "An active antibody fragment (Fv) composed of the variable portions of heavy and light chains". Biochemistry. 12 (6): 1130–5. doi:10.1021/bi00730a018. PMID4569769.
^Tomasi TB (October 1992). "The discovery of secretory IgA and the mucosal immune system". Immunology Today. 13 (10): 416–8. doi:10.1016/0167-5699(92)90093-M. PMID1343085.
^Preud'homme JL, Petit I, Barra A, Morel F, Lecron JC, Lelièvre E (October 2000). "Structural and functional properties of membrane and secreted IgD". Molecular Immunology. 37 (15): 871–87. doi:10.1016/S0161-5890(01)00006-2. PMID11282392.
^Johansson SG (2006). "The discovery of immunoglobulin E". Allergy and Asthma Proceedings. 27 (2 Suppl 1): S3–6. PMID16722325.
^Hozumi N, Tonegawa S (October 1976). "Evidence for somatic rearrangement of immunoglobulin genes coding for variable and constant regions". Proceedings of the National Academy of Sciences of the United States of America. 73 (10): 3628–32. Bibcode:1976PNAS...73.3628H. doi:10.1073/pnas.73.10.3628. PMC431171. PMID824647.
^"Animated depictions of how antibodies are used in ELISA assays". Cellular Technology Ltd.—Europe. Archived from the original on 14 June 2011. Retrieved 8 May 2007.
^"Animated depictions of how antibodies are used in ELISPOT assays". Cellular Technology Ltd.—Europe. Archived from the original on 16 May 2011. Retrieved 8 May 2007.
^Stern P (2006). "Current possibilities of turbidimetry and nephelometry"(PDF). Klin Biochem Metab. 14 (3): 146–151. Archived from the original(PDF) on 10 April 2008.
^Martin DM, Vroon DH, Nasrallah SM (June 1984). "Value of serum immunoglobulins in the diagnosis of liver disease". Liver. 4 (3): 214–218. doi:10.1111/j.1600-0676.1984.tb00930.x. ISSN0106-9543. PMID6748875.
^Van De Wiel A, Delacroix DL, Van Hattum J, Schuurman HJ, Kater L (January 1987). "Characteristics of serum IgA and liver IgA deposits in alcoholic liver disease". Hepatology. 7 (1): 95–99. doi:10.1002/hep.1840070120. ISSN0270-9139. PMID3542782.
^ abDean L (2005). "Chapter 4: Hemolytic disease of the newborn". Blood Groups and Red Cell Antigens. NCBI Bethesda (MD): National Library of Medicine (US).
^Sullivan MV, Stockburn WJ, Hawes PC, Mercer T, Reddy SM (26 February 2021). "Green synthesis as a simple and rapid route to protein modified magnetic nanoparticles for use in the development of a fluorometric molecularly imprinted polymer-based assay for detection of myoglobin". Nanotechnology. 32 (9): 095502. Bibcode:2021Nanot..32i5502S. doi:10.1088/1361-6528/abce2d. PMC8314874. PMID33242844.
^Gnoth C, Johnson S (1 August 2014). "Strips of Hope: Accuracy of Home Pregnancy Tests and New Developments". Geburtshilfe und Frauenheilkunde (in German). 74 (7): 661–669. doi:10.1055/s-0034-1368589. ISSN0016-5751. PMC4119102. PMID25100881.
^Rodriguez EA, Wang Y, Crisp JL, Vera DR, Tsien RY, Ting R (May 2016). "New Dioxaborolane Chemistry Enables [(18)F]-Positron-Emitting, Fluorescent [(18)F]-Multimodality Biomolecule Generation from the Solid Phase". Bioconjugate Chemistry. 27 (5): 1390–1399. doi:10.1021/acs.bioconjchem.6b00164. PMC4916912. PMID27064381.
^Feldmann M, Maini RN (2001). "Anti-TNF alpha therapy of rheumatoid arthritis: what have we learned?". Annual Review of Immunology. 19 (1): 163–96. doi:10.1146/annurev.immunol.19.1.163. PMID11244034.
^Doggrell SA (June 2003). "Is natalizumab a breakthrough in the treatment of multiple sclerosis?". Expert Opinion on Pharmacotherapy. 4 (6): 999–1001. doi:10.1517/14656566.4.6.999. PMID12783595. S2CID16104816.
^Krueger GG, Langley RG, Leonardi C, Yeilding N, Guzzo C, Wang Y, et al. (February 2007). "A human interleukin-12/23 monoclonal antibody for the treatment of psoriasis". The New England Journal of Medicine. 356 (6): 580–92. doi:10.1056/NEJMoa062382. PMID17287478.
^Plosker GL, Figgitt DP (2003). "Rituximab: a review of its use in non-Hodgkin's lymphoma and chronic lymphocytic leukaemia". Drugs. 63 (8): 803–43. doi:10.2165/00003495-200363080-00005. PMID12662126.
^Vogel CL, Cobleigh MA, Tripathy D, Gutheil JC, Harris LN, Fehrenbacher L, et al. (2001). "First-line Herceptin monotherapy in metastatic breast cancer". Oncology. 61. 61 (Suppl. 2): 37–42. doi:10.1159/000055400. PMID11694786. S2CID24924864.
^LeBien TW (July 2000). "Fates of human B-cell precursors". Blood. 96 (1): 9–23. doi:10.1182/blood.V96.1.9. PMID10891425. Archived from the original on 29 April 2010. Retrieved 31 March 2007.
^Ghaffer A (26 March 2006). "Immunization". Immunology— Chapter 14. University of South Carolina School of Medicine. Archived from the original on 18 October 2010. Retrieved 6 June 2007.
^Urbaniak SJ, Greiss MA (March 2000). "RhD haemolytic disease of the fetus and the newborn". Blood Reviews. 14 (1): 44–61. doi:10.1054/blre.1999.0123. PMID10805260.
^ abFung Kee Fung K, Eason E, Crane J, Armson A, De La Ronde S, Farine D, et al. (September 2003). "Prevention of Rh alloimmunization". Journal of Obstetrics and Gynaecology Canada. 25 (9): 765–73. doi:10.1016/S1701-2163(16)31006-4. PMID12970812.
^Tini M, Jewell UR, Camenisch G, Chilov D, Gassmann M (March 2002). "Generation and application of chicken egg-yolk antibodies". Comparative Biochemistry and Physiology. Part A, Molecular & Integrative Physiology. 131 (3): 569–74. doi:10.1016/S1095-6433(01)00508-6. PMID11867282.
^Cole SP, Campling BG, Atlaw T, Kozbor D, Roder JC (June 1984). "Human monoclonal antibodies". Molecular and Cellular Biochemistry. 62 (2): 109–20. doi:10.1007/BF00223301. PMID6087121. S2CID12616168.
^Kabir S (2002). "Immunoglobulin purification by affinity chromatography using protein A mimetic ligands prepared by combinatorial chemical synthesis". Immunological Investigations. 31 (3–4): 263–78. doi:10.1081/IMM-120016245. PMID12472184. S2CID12785078.
^ abBrehm-Stecher BF, Johnson EA (September 2004). "Single-cell microbiology: tools, technologies, and applications". Microbiology and Molecular Biology Reviews. 68 (3): 538–59, table of contents. doi:10.1128/MMBR.68.3.538-559.2004. PMC515252. PMID15353569.
^Williams NE (2000). "Chapter 23 Immunoprecipitation Procedures". Methods in Cell Biology Volume 62. Vol.62. San Diego, CA: Academic Press. pp.449–53. doi:10.1016/S0091-679X(08)61549-6. ISBN978-0-12-544164-3. PMID10503210.
^Kurien BT, Scofield RH (April 2006). "Western blotting". Methods. 38 (4): 283–93. doi:10.1016/j.ymeth.2005.11.007. PMID16483794.
^Scanziani E (1998). "Immunohistochemical staining of fixed tissues". Mycoplasma Protocols. Methods in Molecular Biology. Vol.104. Totowa, N.J.: Humana Press. pp.133–40. doi:10.1385/0-89603-525-5:133. ISBN978-0-89603-525-6. PMID9711649.
^Reen DJ (1994). "Enzyme-linked immunosorbent assay (ELISA)". Basic Protein and Peptide Protocols. Methods in Molecular Biology. Vol.32. pp.461–6. doi:10.1385/0-89603-268-X:461. ISBN978-0-89603-268-2. PMC2366430. PMID7951745.
^Kalyuzhny AE (2005). "Chemistry and biology of the ELISPOT assay". Handbook of ELISPOT. Methods in Molecular Biology. Vol.302. pp.15–31. doi:10.1385/1-59259-903-6:015. ISBN978-1-59259-903-5. PMID15937343.
^Saper CB (December 2005). "An open letter to our readers on the use of antibodies". The Journal of Comparative Neurology. 493 (4): 477–8. doi:10.1002/cne.20839. PMID16304632. S2CID14082678.
^"NOT-OD-16-011: Implementing Rigor and Transparency in NIH & AHRQ Research Grant Applications". grants.nih.gov.
^Vasilevsky NA, Brush MH, Paddock H, Ponting L, Tripathy SJ, Larocca GM, et al. (2 September 2013). "On the reproducibility of science: unique identification of research resources in the biomedical literature". PeerJ. 1: e148. doi:10.7717/peerj.148. PMC3771067. PMID24032093.
^Bandrowski A, Brush M, Grethe JS, Haendel MA, Kennedy DN, Hill S, et al. (2015). "The Resource Identification Initiative: A cultural shift in publishing". F1000Research. 4: 134. doi:10.12688/f1000research.6555.2. PMC4648211. PMID26594330.
^Helsby MA, Fenn JR, Chalmers AD (23 August 2013). "Reporting research antibody use: how to increase experimental reproducibility". F1000Research. 2: 153. doi:10.12688/f1000research.2-153.v2. PMC3829129. PMID24358895.
^"The Antibody Registry". antibodyregistry.org.
^"Resource Identification Initiative". FORCE11. 14 August 2013. Retrieved 18 April 2016.
^Eberle C (20 February 2023). "Antibody Production simply explained". evitria -. Retrieved 7 December 2023.
^Archived 17 July 2011 at the Wayback Machine
WAM
147. ^Marcatili P, Rosi A, Tramontano A (September 2008). "PIGS: automatic prediction of antibody structures". Bioinformatics. 24 (17): 1953–4. doi:10.1093/bioinformatics/btn341. PMID18641403. Archived from the original on 26 November 2010.
Prediction of Immunoglobulin Structure (PIGS)
148. ^Archived 19 July 2011 at the Wayback Machine
RosettaAntibody
149. ^Park H. "Written Description Problems of the Monoclonal Antibody Patents after Centocor v. Abbott". jolt.law.harvard.edu. Archived from the original on 13 December 2014. Retrieved 12 December 2014.
150. ^Adolf-Bryfogle J, Kalyuzhniy O, Kubitz M, Weitzner BD, Hu X, Adachi Y, et al. (April 2018). "RosettaAntibodyDesign (RAbD): A general framework for computational antibody design". PLOS Computational Biology. 14 (4): e1006112. Bibcode:2018PLSCB..14E6112A. doi:10.1371/journal.pcbi.1006112. PMC5942852. PMID29702641.{{cite journal}}: CS1 maint: article number as page number (link)
151. ^Lapidoth GD, Baran D, Pszolla GM, Norn C, Alon A, Tyka MD, et al. (August 2015). "AbDesign: An algorithm for combinatorial backbone design guided by natural conformations and sequences". Proteins. 83 (8): 1385–406. doi:10.1002/prot.24779. PMC4881815. PMID25670500.
152. ^Li T, Pantazes RJ, Maranas CD (2014). "OptMAVEn--a new framework for the de novo design of antibody variable region models targeting specific antigen epitopes". PLOS ONE. 9 (8): e105954. Bibcode:2014PLoSO...9j5954L. doi:10.1371/journal.pone.0105954. PMC4143332. PMID25153121.{{cite journal}}: CS1 maint: article number as page number (link)
153. ^Pham V, Henzel WJ, Arnott D, Hymowitz S, Sandoval WN, Truong BT, et al. (May 2006). "De novo proteomic sequencing of a monoclonal antibody raised against OX40 ligand". Analytical Biochemistry. 352 (1): 77–86. doi:10.1016/j.ab.2006.02.001. PMID16545334.
154. ^Ma B, Zhang K, Hendrie C, Liang C, Li M, Doherty-Kirby A, et al. (2003). "PEAKS: powerful software for peptide de novo sequencing by tandem mass spectrometry". Rapid Communications in Mass Spectrometry. 17 (20): 2337–42. Bibcode:2003RCMS...17.2337M. doi:10.1002/rcm.1196. PMID14558135.
155. ^Zhang J, Xin L, Shan B, Chen W, Xie M, Yuen D, et al. (April 2012). "PEAKS DB: de novo sequencing assisted database search for sensitive and accurate peptide identification". Molecular & Cellular Proteomics. 11 (4) M111.010587. doi:10.1074/mcp.M111.010587. PMC3322562. PMID22186715.
156. ^Perkins DN, Pappin DJ, Creasy DM, Cottrell JS (December 1999). "Probability-based protein identification by searching sequence databases using mass spectrometry data". Electrophoresis. 20 (18): 3551–67. doi:10.1002/(SICI)1522-2683(19991201)20:18<3551::AID-ELPS3551>3.0.CO;2-2. PMID10612281. S2CID42423655.
157. ^Bandeira N, Tang H, Bafna V, Pevzner P (December 2004). "Shotgun protein sequencing by tandem mass spectra assembly". Analytical Chemistry. 76 (24): 7221–33. Bibcode:2004AnaCh..76.7221B. doi:10.1021/ac0489162. PMID15595863.
158. ^Liu X, Han Y, Yuen D, Ma B (September 2009). "Automated protein (re)sequencing with MS/MS and a homologous database yields almost full coverage and accuracy". Bioinformatics. 25 (17): 2174–80. doi:10.1093/bioinformatics/btp366. PMID19535534.
159. ^Castellana NE, Pham V, Arnott D, Lill JR, Bafna V (June 2010). "Template proteogenomics: sequencing whole proteins using an imperfect database". Molecular & Cellular Proteomics. 9 (6): 1260–70. doi:10.1074/mcp.M900504-MCP200. PMC2877985. PMID20164058.
160. ^Liu X, Dekker LJ, Wu S, Vanduijn MM, Luider TM, Tolić N, et al. (July 2014). "De novo protein sequencing by combining top-down and bottom-up tandem mass spectra". Journal of Proteome Research. 13 (7): 3241–8. doi:10.1021/pr401300m. PMID24874765.
161. ^Tran NH, Rahman MZ, He L, Xin L, Shan B, Li M (August 2016). "Complete De Novo Assembly of Monoclonal Antibody Sequences". Scientific Reports. 6 31730. Bibcode:2016NatSR...631730T. doi:10.1038/srep31730. PMC4999880. PMID27562653.
162. ^Gebauer M, Skerra A (June 2009). "Engineered protein scaffolds as next-generation antibody therapeutics". Current Opinion in Chemical Biology. 13 (3): 245–55. doi:10.1016/j.cbpa.2009.04.627. PMID19501012.
163. ^Kristiansen PA, Page M, Bernasconi V, Mattiuzzo G, Dull P, Makar K, et al. (10 April 2021) [2021-02-23]. "WHO International Standard for anti-SARS-CoV-2 immunoglobulin". The Lancet. 397 (10282). World Health Organization / Elsevier: 1347–1348. doi:10.1016/S0140-6736(21)00527-4. PMC7987302. PMID33770519.
164. ^Knezevic I, Mattiuzzo G, Page M, Minor P, Griffiths E, Nuebling M, et al. (26 October 2021). "WHO International Standard for evaluation of the antibody response to COVID-19 vaccines: call for urgent action by the scientific community". The Lancet Microbe. 3 (3). World Health Organization / Elsevier: e235 –e240. doi:10.1016/S2666-5247(21)00266-4. PMC8547804. PMID34723229.
165. ^Knezevic I (10 November 2021). "Training webinar for the calibration of quantitative serology assays using the WHO International Standard for anti-SARS-CoV-2 immunoglobulin"(PDF). Archived(PDF) from the original on 18 February 2022. Retrieved 5 March 2022. (68 pages)
External links
[edit]
Wikimedia Commons has media related to Antibodies.
Mike's Immunoglobulin Structure/Function Page at University of Cambridge
Antibodies as the PDB molecule of the month Discussion of the structure of antibodies at RCSB Protein Data Bank
A hundred years of antibody therapy History and applications of antibodies in the treatment of disease at University of Oxford
How Lymphocytes Produce Antibody from Cells Alive!
| v t e Lymphocyticadaptive immune system and complement |
| Lymphoid | | Antigens | Antigen Superantigen Allergen Antigenic variation Hapten Epitope Linear Conformational Mimotope Antigen presentation/professional APCs: Dendritic cell Macrophage B cell Immunogen | | Antibodies | Antibody Monoclonal antibodies Polyclonal antibodies Autoantibody Microantibody Polyclonal B cell response Allotype Isotype Idiotype Immune complex Paratope | | Immunity vs. tolerance | Action: Immunity Autoimmunity Alloimmunity Allergy Hypersensitivity Inflammation Cross-reactivity Co-stimulation Inaction: Tolerance Central Peripheral Clonal anergy Clonal deletion T-cell depletion Tolerance in pregnancy Immunodeficiency Immune privilege | | Immunogenetics | Affinity maturation Somatic hypermutation Clonal selection V(D)J recombination Junctional diversity Immunoglobulin class switching MHC/HLA | |
| Lymphocytes | Cellular T cell Humoral B cell NK cell |
| Substances | Cytokines Opsonin Cytolysin |
| v t e Globular proteins |
| Serumglobulins | | Alpha globulins | | serpins: | alpha-1 (Alpha 1-antichymotrypsin, Alpha 1-antitrypsin) alpha-2 (Alpha 2-antiplasmin) Antithrombin (Heparin cofactor II) | | carrier proteins: | alpha-1 (Transcortin) alpha-2 (Ceruloplasmin) Retinol binding protein | | other: | alpha-1 (Orosomucoid) alpha-2 (alpha-2-Macroglobulin, Haptoglobin) | | | Beta globulins | | carrier proteins: | Sex hormone-binding globulin Transferrin | | other: | Angiostatin Hemopexin Beta-2 microglobulin Factor H Plasminogen Properdin | | | Gamma globulin | Immunoglobulins | | Other | Fibronectin (fFN: Fetal fibronectin) Macroglobulin/Microglobulin Transcobalamin Edestin | |
| Other globulins | Beta-lactoglobulin Lactoferrin Thyroglobulin Alpha-lactalbumin 11S globulin family 7S seed storage protein |
| Albumins | | Egg white | Conalbumin Ovalbumin Avidin | | Serum albumin | Human serum albumin Bovine serum albumin Prealbumin | | Other | C-reactive protein Lactalbumin (Alpha-lactalbumin) Parvalbumin Ricin Vitamin D-binding protein Extracellular matrix protein 1 | |
| see alsodisorders of globin and globulin proteins |
| v t e Antibodies |
| Main types | IgA IgD IgE IgG IgM IgY |
| Chains | Light chain IGK@ IGL@ surrogate IGLL1 Heavy chain IGH@ IGHM Heavy-chain antibody/IgNAR |
| v t e Autoantibodies |
| Anti-nuclear antibody | PBC: Anti-gp210 Anti-p62 Anti-sp100 ENA: Anti-topoisomerase/Scl-70 Anti-Jo1 ENA4 Anti-Sm Anti-nRNP Anti-Ro Anti-La Anti-centromere Anti-dsDNA Anti-histone |
| Anti-mitochondrial antibody | Anti-cardiolipin |
| Anti-cytoplasm antibody | Anti-neutrophil cytoplasmic C-ANCA P-ANCA Anti-smooth muscle Anti-actin Anti-TPO/Antimicrosomal |
| Cell membrane | Anti-ganglioside Anti-GBM Anti-glutamate |
| Extracellular | Anti-thrombin Lupus anticoagulant Coeliac disease: Anti-transglutaminase Anti-gliadin not autoantibody RA Rheumatoid factor Anti-citrullinated peptide |
| Multiple locations | Anti-phospholipid Anti-apolipoprotein |
| Authority control databases |
| National | Germany France BnF data Czech Republic |
| Other | Encyclopedia of Modern Ukraine Yale LUX |
Retrieved from "
Categories:
Antibodies
Glycoproteins
Immunology
Reagents for biochemistry
Hidden categories:
CS1 maint: article number as page number
CS1 maint: location missing publisher
CS1 German-language sources (de)
Webarchive template wayback links
Articles with short description
Short description is different from Wikidata
Use dmy dates from March 2020
All articles with unsourced statements
Articles with unsourced statements from July 2024
Commons category link is on Wikidata
This page was last edited on 4 September 2025, at 20:14(UTC).
Text is available under the Creative Commons Attribution-ShareAlike 4.0 License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
Privacy policy
About Wikipedia
Disclaimers
Contact Wikipedia
Code of Conduct
Developers
Statistics
Cookie statement
Mobile view
Search
Search
[x] Toggle the table of contents
Antibody
83 languagesAdd topic |
2046 | https://emedicine.medscape.com/article/331864-treatment | Scleroderma Treatment & Management
Updated: Mar 01, 2023
Author: Abhishek Nandan, MD; Chief Editor: Herbert S Diamond, MD more...;)
Share
Print
Feedback
Approach Considerations
Current treatment of systemic sclerosis is directed toward managing complications and providing symptomatic relief. In addition, a range of disease-modifying treatments have been investigated.
Disease-modifying treatment aims at inhibiting tissue fibrosis and vascular and immune system alterations, which are the three crucial components of disease pathogenesis. [131, 132, 133, 134, 135] Therapies targeting cytokine signalling, including interleukin-6 (IL-6), and other immune-inflammatory therapies, have produced promising results.
To date, the US Food and Drug Administration (FDA) has approved nintedanib and as well as tocilizumab for refractory, progressive intersitial lung disease due to systemic sclerosis.
A phase 3 trial of tocilizumab in systemic sclerosis failed to meet its primary endpoint of improvement in modified Rodnan skin score; however, tocilizumab therapy did result in preservation of lung function. After 48 weeks, decline in lung function from baseline, as defined by changes in predicted forced vital capacity (FVC), had occurred 50.5% of patients in the tocilizumab arm, versus 70.3% of those in the placebo arm (P = 0.015). In patients with systemic sclerosis–related interstitial lung disease, a clinically meaningful decline of 10% or more in lung function was seen in 24.5% of placebo recipients, compared with 8.6% of tocilizumab recipients. Supporting the FVC results, high-resolution computed tomography showed less progression of lung fibrosis with tocilizumab than with placebo. [137, 138, 139]
No placebo-controlled studies have demonstrated clear superiority for any drug except for a modest benefit from use of methotrexate [140, 141] and improvement in scleroderma-related interstitial lung disease with cyclophosphamide. [142, 143] Numerous uncontrolled prospective and retrospective trials along with post-hoc analysis have suggested a beneficial effect from mycophenolate mofetil. [144, 145, 146] Retrospective uncontrolled studies also supported a beneficial role for D-penicillamine, but a large high-dose versus low-dose controlled trial failed to demonstrate benefits of the higher dose versus the lower dose.
Other agents are currently being studied for skin and lung involvement. For example, trials of rituximab have yielded promising results, with improvement of skin fibrosis and prevention of worsening lung fibrosis. [149, 150, 151, 152] The tyrosine kinase inhibitor nintedanib is approved for slowing the rate of decline in pulmonary function in adults with systemic sclerosis–related interstitial lung disease.
Phototherapy using longer-wavelength ultraviolet A (UVA) light (ie, UVA1, 340-400 nm) has proved beneficial for cutaneous lesions in scleroderma. UVA1 inhibits the inflammatory process and can soften former sclerotic skin lesions. However, data on this technique remain limited, and the most effective dose has yet to be determined.
No serious systemic effects of UVA1 phototherapy have been reported. Skin pigmentation or tanning, which can persist for months, is the most common acute adverse effect; uncommon acute adverse effects include reactivation of herpes simplex, cholinergic urticaria, and transient and reversible changes in the appearance of moles. The risk of long-term adverse effects, particularly skin cancer, has not been determined.
Transplantation
Hematopoietic stem cell transplantation (HSCT) has been shown to be effective. However, it is associated with a high rate of procedure-related complications. [154, 155, 156, 157]
In the prospective Autologous Stem Cell Transplantation International Scleroderma (ASTIS) trial, a phase 3 comparison of autologous HSCT with 12 successive monthly intravenous pulses of cyclophosphamide in 156 patients with early diffuse cutaneous systemic sclerosis, HCST was associated with higher treatment-related mortality than in the first year after treatment. However, HCST conferred a significant long-term survival benefit.
In ASTIS during the first year, 13 events, including 8 treatment-related deaths, occurred in the HSCT group and 8 events with no treatment-related deaths occurred in the control group (16.5% vs. 10.4%, respectively). At 4 years, however, 15 events had occurred cumulatively in the HSCT group compared with 20 events in the control group (19% vs 26%, respectively).
In the Scleroderma: Cyclophosphamide Or Transplantation (SCOT) trial, a randomized, open-label, phase 2 trial in 75 patients with severe scleroderma, autologous HSCT improved event-free and overall survival, at a cost of increased expected toxicity, compared with 12 monthly infusions of cyclophosphamide. Rates of treatment-related death and post-transplantation use of disease-modifying antirheumatic drugs (DMARDs) were lower than those in previous reports of nonmyeloablative transplantation.
In SCOT participants who received a transplant or completed 9 or more doses of cyclophosphamide, event-free survival was 79% in the transplantation group and 50% in the cyclophosphamide group (P = 0.02) at 54 months and 74% vs 47%, respectively, at 72 months (P = 0.03), By 54 months, 9% of the participants in the transplantation group had initiated DMARDs, as compared with 44% of those in the cyclophosphamide group (P = 0.001). Treatment-related mortality in the transplantation group was 3% at 54 months and 6% at 72 months; no treatment-related deaths occurred in the cyclophosphamide group.
A review by Sullivan et al of HSCT for patients with scleroderma and pulmonary involvement suggested that indications for referral for HSCT in this population may include the following :
Diffuse cutaneous systemic sclerosis with internal organ involvement
Age < 65 years
Disease duration < 5 years
Modified Rodnan skin thickness score (MRSS) >15
Early pulmonary involvement, documented on high-resolution computed tomography (HRCT) and pulmonary function tests (PFTs)
These authors recommended the following as PFT criteria for pulmonary involvement :
Forced vital capacity (FVC) or hemoglobin‐adjusted diffusing capacity of the lungs for carbon monoxide (DLCO) between 80% and 45% predicted
A decline in FVC of > 10% or DLCO of > 15% on serial testing
Failure to respond to initial therapy on serial PFT monitoring
Recommended exclusion criteria for HSCT include the following :
FVC or hemoglobin‐adjusted DLCO of < 45% predicted
Pulmonary arterial hypertension
Cardiac insufficiency or involvement with systemic sclerosis
Kidney insufficiency
Prior cyclophosphamide treatment of > 6 months’ duration
Skin Fibrosis
Numerous experimental drugs or interventions have been investigated for treatment of skin induration and fibrosis in systemic sclerosis. Interventions that have demonstrated benefit include the following:
D-penicillamine [147, 148]
Bovine collagen - Possible benefit in late-phase disease
Methotrexate [140, 141]
Mycophenolate mofetil [144, 145, 146]
Allogeneic bone marrow transplantation [149, 150, 151, 152, 154, 155, 156]
Interventions that have failed to demonstrate significant benefit for treatment of skin induration and fibrosis in systemic sclerosis include the following:
Human relaxin
Interferon-alpha
Anti–transforming growth factor beta antibodies
Next: Pruritus
Pruritus
Treatment measures for pruritus include the following :
Moisturizers
Histamine 1 (H1) and histamine 2 (H2) blockers
Tricyclic antidepressants
Trazodone
Previous
Next: Pruritus
Raynaud Phenomenon
Raynaud phenomenon can be treated with the following agents [50, 51, 166] :
Calcium channel blockers (increasing the dose to tolerance)
Prazosin
Prostaglandin derivatives (eg, prostaglandin E1)
Dipyridamole
Aspirin
Topical nitrates
Sildenafil, an inhibitor of phosphodiesterase 5 (PDE-5), has been approved for treatment of pulmonary hypertension. In addition, it has been shown to be effective and well tolerated in patients with Raynaud phenomenon. [167, 168, 169]
In the event of thrombosis and vascular flow compromise, a tissue plasminogen activator, heparin, and urokinase may be necessary. In very severe cases, patients may benefit from intravenous iloprost or related prostanoids. Some patients may require pharmacologic cervical sympathectomy or surgical digital sympathectomy. [171, 172, 173]
Digital ulcers
Repeated episodes of Raynaud phenomenon in individuals with systemic sclerosis may result in digital ulcers. Bosentan, a dual endothelin receptor antagonist approved for treatment of systemic sclerosis–associated pulmonary hypertension, may curtail the formation of new digital ulcers. [174, 175] Combination therapy with iloprost and bosentan has also shown benefit in reducing new digital ulcers. Ambrisentan and other endothelin receptor antagonists have also shown beneficial effects in preliminary or open-label studies. [177, 178]
Previous
Next: Pruritus
Gastrointestinal Involvement
Treatments for gastrointestinal symptoms of systemic sclerosis are listed below. [56, 179, 180]
Gastroesophageal reflux disease:
Antacids
Histamine 2 (H2) blockers
Reflux and aspiration precautions
Proton pump inhibitors
Gastroparesis:
Prokinetic agents
Octreotide
Colonic / anorectal dysmotility:
Stool softeners
Laxatives
Some patients with scleroderma may also develop small intestinal bacterial overgrowth (SIBO). This manifestation generally improves with the addiition of rifaximin.
Previous
Next: Pruritus
Pulmonary Fibrosis/Alveolitis
Although there is some controversy regarding the beneficial effects of immunosuppressive therapy in idiopathic pulmonary fibrosis, numerous studies support the use of these agents in systemic sclerosis–associated interstitial lung disease. [182, 183] Pulmonary fibrosis in systemic sclerosis has been successfully treated with cyclophosphamide, either orally or in intravenous pulses. [184, 142, 143] Several nonrandomized studies showed benefit from mycophenolate mofetil. [144, 145, 146, 185, 186] The Scleroderma Lung Study II (SLS-II), a double-blind, parallel group, randomized controlled trial, found that a 2-year course of mycophenolate mofetil was better tolerated and associated with less toxicity than 12 months of oral cyclophosphamide, and yielded comparable significant improvements in lung function, dyspnea, lung imaging, and skin disease.
Nintedanib was approved by the FDA in 2019 to slow the rate of decline in pulmonary function in patients who have interstitial lung disease associated with scleroderma. Nintedanib is a tyrosine kinase inhibitor that targets growth factors (eg, vascular endothelial growth factor receptor [VEGFR], fibroblast growth factor receptor [FGFR], platelet-derived growth factor receptor [PDGFR] 1-3, colony-stimulating factor 1 receptor [CSFIR]) that are implicated in the pathogenesis of interstitial lung diseases.
Approval of nintedanib was based on results from the phase 3 SENSCIS trial (n=576). Results showed that nintedanib slowed the loss of pulmonary function by 41 mL/year in patients with systemic sclerosis–related interstitial lung disease relative to placebo, as measured by forced vital capacity (FVC) over a 52-week period.
Tocilizumab, an anti-IL-6 inhibitor has also shown promise for the treatment of interstitial lung disease due to scleroderma. In the focuSSed trial with open-label extension, the decline in FVC over 48 months was 14 mL in the tocilizumab group compared with 255 mL in the placebo group.
Previous
Next: Pruritus
Pulmonary Hypertension
Numerous agents have been approved by the FDA for the treatment of pulmonary arterial hypertension (PAH). These include the following:
Prostaglandin derivatives such as epoprostenol, treprostinil, beraprost, and iloprost
Phosphodiesterase type 5 (PDE-5) inhibitors such as sildenafil and tadalafil
Endothelin receptor antagonists such as bosentan, ambrisentan and macitentan
The combination of ambrisentan and tadalafil was approved by the FDA in 2015 as up-front therapy for PAH to reduce the risk of worsening disease and improve exercise ability. In a prospective multicenter open-label trial by Hassoun et al, this combination significantly improved hemodynamics, right ventricular structure and function, and functional status in treatment-naïve systemic sclerosis patients with PAH.
One study reported that warfarin provided no significant benefit in either systemic sclerosis–associated or idiopathic pulmonary arterial hypertension.
Previous
Next: Pruritus
Scleroderma Renal Crisis
Patients with diffuse, rapidly progressive skin involvement have the highest risk of developing scleroderma renal crisis. Renal crisis occurs in about 10% of all patients with systemic sclerosis.
Renal crisis is observed within 4 years of diagnosis in about 75% of patients but may develop as late as 20 years after diagnosis. Renal crises are slightly more common in Blacks than in Whites, and men have a greater risk than women. The presence of RNA polymerase III antibodies increases the risk for renal crisis.
Scleroderma renal crisis that is not treated promptly and aggressively invariably leads to kidney failure requiring dialysis or kidney transplantation, or even death. Consequently, it is critical to check blood pressure, monitor serum creatinine, and start angiotensin-converting enzyme (ACE) inhibitors at the earliest signs of hypertension in at-risk patients. The preferred ACE inhibitor of choice is captopril, owing to its short half-life and ease to titrate quickly, which aid in managing the hypertensive urgency that is common in patients presenting with scleroderma renal crisis.
High doses of corticosteroids (> 20 mg) should be avoided in patients with systemic sclerosis owing to an increased risk of developing renal crisis.
Previous
Next: Pruritus
Musculoskeletal Symptoms
Carpal tunnel entrapment symptoms may require local corticosteroid injections although frequently these symptoms resolve spontaneously.
Myositis may be treated cautiously with corticosteroids (first choice), or with methotrexate or azathioprine in corticosteroid-resistant cases or when there are contraindications to corticosteroid use. Doses of prednisone greater than 40 mg/d are associated with a higher incidence of scleroderma renal crisis. Use of methotrexate should be guarded if there is severe or active baseline pulmonary interstitial disease.
Arthralgias can be treated with acetaminophen. In cases of more severe arthritis or inflammatory arthritis, low-dose prednisone (10 mg) may be considered for the short term. Hydroxychloroquine is generally the preferred first-line therapy for long-term treatment. Methotrexate, biologics (such as tocilizumab or abatacept), and Janus kinase inhibitors (such as tofacitinib) may also be considered in refractory cases.
Physical therapy has been shown to be beneficial in improving hand function in patients with scleroderma. [193, 194, 195] In a randomized controlled trial in 24 patients with systemic sclerosis, Maitland's joint mobilization and therapeutic exercises, twice weekly for 12 weeks, improved hand functionality, reduced pain in the hands and wrists, increased range of motion, and improved quality of life. In another study, a 4-week complex, supervised rehabilitation protocol in 27 patients improved hand and overall function for up to 6 months, compared with a control group of 24 patients prescribed a home exercise program alone. However, the improvement was not sustained after 6 months, suggesting that the rehabilitation program should be repeated every 3-6 months.
Previous
Next: Pruritus
Pregnancy
Pregnancy in women with systemic sclerosis is considered a high risk because of a higher risk of pregnancy loss and higher complication rates, but a diagnosis of systemic sclerosis without pulmonary hypertension is not an absolute contraindication for pregnancy. However, maternal mortality during pregnancy is increased in patients with pulmonary hypertension and some consider pulmonary hypertension to be a contraindication for pregnancy. A study of 50 patients (67 pregnancies) showed that 18% miscarried, 26% delivered preterm, and 55% delivered at full term.
Pregnancy risk is greatest in those who have had the disease for less than 4 years and who also have diffuse cutaneous involvement.
Some systemic sclerosis symptoms may increase during pregnancy (eg, edema, arthralgias, gastroesophageal reflux disease [GERD]). Skin manifestations are not reported to worsen. Raynaud symptoms may improve during pregnancy, only to worsen after delivery.
Certain medications, such as D-penicillamine, mycophenolate mofetil, cytotoxic agents, and angiotensin-converting enzyme (ACE) inhibitors, should be discontinued prior to pregnancy
Previous
Next: Pruritus
Surgical Care
Digital sympathectomy and botulinum toxin injections may be used in patients with severe Raynaud phenomenon who have an unrelenting acute attack and who are threatened by digital loss. Many ulcers require management by a wound care specialist. Debridement or amputation may be required in severe ischemic or infected digital lesions. Digital sympathectomy may be indicated in severe cases.
Hand surgery may be performed to correct severe flexion contractures.
Removal of severely painful, draining or infected calcinotic deposits is occasionally required.
Surgical fundoplication may be required to treat severe esophageal reflux with complicating aspiration pneumonitis. Laser ablation or even gastric antrectomy may be required to control persistent bleeding caused by gastric antral vascular ectasia (GAVE).
Episodes of acute abdominal pain need to be evaluated with extreme care to avoid the misdiagnosis of an acute abdomen, since occasionally patients with systemic sclerosis present with symptoms of acute abdomen that resolve with proper medical treatment and do not require surgical intervention (pseudo acute abdomen).
Previous
Next: Pruritus
Diet
There are no specific dietary recommendations in patients with systemic sclerosis. Appropriate caloric intake should be encouraged. The following points may be considered:
Patients with esophageal involvement should avoid hard solid foods.
Patients with intestinal hypomotility may benefit from high-fiber diets.
Vitamin deficiencies and malabsorption should be addressed in patients with frequent or severe bacterial overgrowth.
Large doses of vitamin C (> 1000 mg/d) should be avoided because this stimulates collagen formation and may enhance fibrotic tissue deposition.
A study of 51 Romanian patients with systemic sclerosis found that 25hydroxy-hydroxyvitamin D serum levels were insufficient in approximately two thirds of cases, and inadequate in almost one quarter. Vitamin D levels did not correlate with extent of skin involvement, but low levels did seem to be related to more aggressive disease with multivisceral and severe organ involvement, especially pulmonary and cardiac.
Previous
Next: Pruritus
Activity
Recommendations regarding activity include the following:
Ensure that the patient maintains a core body temperature to try to minimize the occurrence of Raynaud phenomenon episodes.
Assist the patient in avoiding contamination of any skin wound caused by ischemic lesions or calcinosis.
Digital ulcers must be kept clean and dry.
Instruct the patient to perform continuous physical and occupational therapy to maintain joint range of motion and to minimize or delay joint contractures.
Encourage patients with pulmonary fibrosis to receive pulmonary rehabilitation treatment.
Previous
Next: Pruritus
Consultations
All patients with systemic sclerosis should be treated in conjunction with an experienced rheumatologist who has a full understanding of the disease, the complications of the therapies, and the frequently serious adverse effects. Consultation with an experienced practitioner can help avoid potentially fatal pulmonary, vascular, or renal complications.
Patients with systemic sclerosis may need to be treated by other subspecialists, depending on the involvement of specific organ systems (eg, cardiologist, pulmonologist, gastroenterologist, nephrologist, endocrinologist, vascular surgeon, wound care specialist, hand surgeon).
Kidney and lung transplantation are performed in specialized centers for patients with end-stage kidney or lung involvement.
Previous
Next: Pruritus
Long-term Monitoring
Evaluate the patient every 3-6 months, depending on the disease activity and progression. Serial skin scoring (also known as the modified Rodnan skin score) is useful for monitoring skin changes over time. Patients with scleroderma need annual ECGs (to screen for cardiac arrhythmias) and serial pulmonary function tests (PFTs) to screen for interstitital lung disease/pulmonary hypertension. Annual transthoracic echocardiograms may also be considered for screening. Durometry, a technique for objectively measuring skin involvement, uses digital, hand-held, spring-loaded devices that measure hardness by applying an indentation load.
Previous
Medication
References
van den Hoogen F, Khanna D, Fransen J, Johnson SR, Baron M, Tyndall A. 2013 classification criteria for systemic sclerosis: an American College of Rheumatology/European League against Rheumatism collaborative initiative. Arthritis Rheum. 2013 Nov. 65(11):2737-47. [QxMD MEDLINE Link].
van den Hoogen F, Khanna D, Fransen J, Johnson SR, Baron M, Tyndall A. 2013 classification criteria for systemic sclerosis: an American college of rheumatology/European league against rheumatism collaborative initiative. Ann Rheum Dis. 2013 Nov. 72(11):1747-55. [QxMD MEDLINE Link].
RODNAN GP, BENEDEK TG. An historical account of the study of progressive systemic sclerosis (diffuse scleroderma). Ann Intern Med. 1962 Aug. 57:305-19. [QxMD MEDLINE Link].
David M. A case of scleroderma mentioned by Hippocrates in his aphorisms. Korot. 1981. 8(1-2):61-3. [QxMD MEDLINE Link].
Rodnan G, Benedeck T. History of scleroderma. Ann Intern Med. 1978. 89:725.
Goetz RH. Pathology of progressive systemic sclerosis (generalized scleroderma) with special reference to changes in the viscera. Clin Proc S Afr. 1945. 4:337-342.
Katsumoto TR, Whitfield ML, Connolly MK. The pathogenesis of systemic sclerosis. Annu Rev Pathol. 2011. 6:509-37. [QxMD MEDLINE Link].
Varga J, Abraham D. Systemic sclerosis: a prototypic multisystem fibrotic disorder. J Clin Invest. 2007 Mar. 117(3):557-67. [QxMD MEDLINE Link].
Matucci-Cerinic M, Kahaleh B, Wigley FM. Review: evidence that systemic sclerosis is a vascular disease. Arthritis Rheum. 2013 Aug. 65(8):1953-62. [QxMD MEDLINE Link].
Jimenez SA. Role of Endothelial to Mesenchymal Transition in the Pathogenesis of the Vascular Alterations in Systemic Sclerosis. ISRN Rheumatol. 2013. 2013:835948. [QxMD MEDLINE Link].
Varga J, Whitfield ML. Transforming growth factor-beta in systemic sclerosis (scleroderma). Front Biosci (Schol Ed). 2009. 1:226-35. [QxMD MEDLINE Link].
Gilbane AJ, Denton CP, Holmes AM. Scleroderma pathogenesis: a pivotal role for fibroblasts as effector cells. Arthritis Res Ther. 2013. 15(3):215. [QxMD MEDLINE Link].
Gu YS, Kong J, Cheema GS, Keen CL, Wick G, Gershwin ME. The immunobiology of systemic sclerosis. Semin Arthritis Rheum. 2008 Oct. 38(2):132-60. [QxMD MEDLINE Link].
Chizzolini C, Brembilla NC, Montanari E, Truchetet ME. Fibrosis and immune dysregulation in systemic sclerosis. Autoimmun Rev. 2011 Mar. 10(5):276-81. [QxMD MEDLINE Link].
Barsotti S, Stagnaro C, d'Ascanio A, Della Rossa A. One year in review 2016: systemic sclerosis. Clin Exp Rheumatol. 2016 Sep-Oct. 34 Suppl 100 (5):3-13. [QxMD MEDLINE Link].[Full Text].
Dospinescu P, Jones GT, Basu N. Environmental risk factors in systemic sclerosis. Curr Opin Rheumatol. 2013 Mar. 25(2):179-83. [QxMD MEDLINE Link].
Nietert PJ, Sutherland SE, Silver RM, Pandey JP, Knapp RG, Hoel DG. Is occupational organic solvent exposure a risk factor for scleroderma?. Arthritis Rheum. 1998 Jun. 41(6):1111-8. [QxMD MEDLINE Link].
Marie I, Gehanno JF, Bubenheim M, Duval-Modeste AB, Joly P, Dominique S. Prospective study to evaluate the association between systemic sclerosis and occupational exposure and review of the literature. Autoimmun Rev. 2014 Feb. 13(2):151-6. [QxMD MEDLINE Link].
Rubio-Rivas M, Moreno R, Corbella X. Occupational and environmental scleroderma. Systematic review and meta-analysis. Clin Rheumatol. 2017 Mar. 36 (3):569-582. [QxMD MEDLINE Link].
Barragán-Martínez C, Speck-Hernández CA, Montoya-Ortiz G, Mantilla RD, Anaya JM, Rojas-Villarraga A. Organic solvents as risk factor for autoimmune diseases: a systematic review and meta-analysis. PLoS One. 2012. 7(12):e51506. [QxMD MEDLINE Link].[Full Text].
Barbosa NS, Wetter DA, Wieland CN, Shenoy NK, Markovic SN, Thanarajasingam U. Scleroderma Induced by Pembrolizumab: A Case Series. Mayo Clin Proc. 2017 Jul. 92 (7):1158-1163. [QxMD MEDLINE Link].
Moroncini G, Mori S, Tonnini C, Gabrielli A. Role of viral infections in the etiopathogenesis of systemic sclerosis. Clin Exp Rheumatol. 2013 Mar-Apr. 31(2 Suppl 76):3-7. [QxMD MEDLINE Link].
Mayes MD. Scleroderma epidemiology. Rheum Dis Clin North Am. 2003 May. 29(2):239-54. [QxMD MEDLINE Link].
Chifflot H, Fautrel B, Sordet C, Chatelus E, Sibilia J. Incidence and prevalence of systemic sclerosis: a systematic literature review. Semin Arthritis Rheum. 2008 Feb. 37(4):223-35. [QxMD MEDLINE Link].
Barnes J, Mayes MD. Epidemiology of systemic sclerosis: incidence, prevalence, survival, risk factors, malignancy, and environmental triggers. Curr Opin Rheumatol. 2012 Mar. 24(2):165-70. [QxMD MEDLINE Link].
Ranque B, Mouthon L. Geoepidemiology of systemic sclerosis. Autoimmun Rev. 2010 Mar. 9(5):A311-8. [QxMD MEDLINE Link].
Calderon LM, Pope JE. Scleroderma epidemiology update. Curr Opin Rheumatol. 2021 Mar 1. 33 (2):122-127. [QxMD MEDLINE Link].
Silver RM, Bogatkevich G, Tourkina E, Nietert PJ, Hoffman S. Racial differences between blacks and whites with systemic sclerosis. Curr Opin Rheumatol. 2012 Nov. 24(6):642-8. [QxMD MEDLINE Link].
Reveille JD. Ethnicity and race and systemic sclerosis: how it affects susceptibility, severity, antibody genetics, and clinical manifestations. Curr Rheumatol Rep. 2003 Apr. 5(2):160-7. [QxMD MEDLINE Link].
Gelber AC, Manno RL, Shah AA, Woods A, Le EN, Boin F, et al. Race and association with disease manifestations and mortality in scleroderma: a 20-year experience at the Johns Hopkins Scleroderma Center and review of the literature. Medicine (Baltimore). 2013 Jul. 92(4):191-205. [QxMD MEDLINE Link].
Laing TJ, Gillespie BW, Toth MB, Mayes MD, Gallavan RH Jr, Burns CJ. Racial differences in scleroderma among women in Michigan. Arthritis Rheum. 1997 Apr. 40(4):734-42. [QxMD MEDLINE Link].
Arnett FC, Howard RF, Tan F, Moulds JM, Bias WB, Durban E, et al. Increased prevalence of systemic sclerosis in a Native American tribe in Oklahoma. Association with an Amerindian HLA haplotype. Arthritis Rheum. 1996 Aug. 39(8):1362-70. [QxMD MEDLINE Link].
De Angelis R, et al; Systemic sclerosis PRogression INvestiGation group (SPRING). Sex-related Differences in Systemic Sclerosis: A Multicenter Cross-sectional Study From the National Registry of the Italian Society for Rheumatology. J Rheumatol. 2022 Feb. 49 (2):176-185. [QxMD MEDLINE Link].
Frerix M, Kröger K, Szalay G, Müller-Ladner U, Tarner IH. Is osteonecrosis of the lunate bone an underestimated feature of systemic sclerosis? A case series of nine patients and review of literature. Semin Arthritis Rheum. 2015 Aug 4. [QxMD MEDLINE Link].
Heřmánková B, Špiritović M, Šmucrová H, Oreská S, Štorkánová H, Komarc M, et al. Female Sexual Dysfunction and Pelvic Floor Muscle Function Associated with Systemic Sclerosis: A Cross-Sectional Study. Int J Environ Res Public Health. 2022 Jan 5. 19 (1):[QxMD MEDLINE Link].[Full Text].
Barnett AJ, Miller MH, Littlejohn GO. A survival study of patients with scleroderma diagnosed over 30 years (1953-1983): the value of a simple cutaneous classification in the early stages of the disease. J Rheumatol. 1988 Feb. 15(2):276-83. [QxMD MEDLINE Link].
Mayes MD, Lacey JV Jr, Beebe-Dimmer J, Gillespie BW, Cooper B, Laing TJ, et al. Prevalence, incidence, survival, and disease characteristics of systemic sclerosis in a large US population. Arthritis Rheum. 2003 Aug. 48(8):2246-55. [QxMD MEDLINE Link].
Elhai M, Meune C, Avouac J, Kahan A, Allanore Y. Trends in mortality in patients with systemic sclerosis over 40 years: a systematic review and meta-analysis of cohort studies. Rheumatology (Oxford). 2012 Jun. 51(6):1017-26. [QxMD MEDLINE Link].
Nikpour M, Baron M. Mortality in systemic sclerosis: lessons learned from population-based and observational cohort studies. Curr Opin Rheumatol. 2014 Mar. 26(2):131-7. [QxMD MEDLINE Link].
Nihtyanova SI, Tang EC, Coghlan JG, Wells AU, Black CM, Denton CP. Improved survival in systemic sclerosis is associated with better ascertainment of internal organ disease: a retrospective cohort study. QJM. 2010 Feb. 103(2):109-15. [QxMD MEDLINE Link].
Cottrell TR, Wise RA, Wigley FM, Boin F. The degree of skin involvement identifies distinct lung disease outcomes and survival in systemic sclerosis. Ann Rheum Dis. 2014 Jun 1. 73(6):1060-6. [QxMD MEDLINE Link].
Winstone TA, Assayag D, Wilcox PG, Dunne JV, Hague CJ, Leipsic J. Predictors of mortality and progression in scleroderma-associated interstitial lung disease: A systematic review. Chest. 2014 Feb 27. [QxMD MEDLINE Link].
Chung L, Domsic RT, Lingala B, Alkassab F, Bolster M, Csuka ME, et al. Survival and predictors of mortality in systemic sclerosis-associated pulmonary arterial hypertension: outcomes from the pulmonary hypertension assessment and recognition of outcomes in scleroderma registry. Arthritis Care Res (Hoboken). 2014 Mar. 66(3):489-95. [QxMD MEDLINE Link].
Woodworth TG, Suliman YA, Li W, Furst DE, Clements P. Scleroderma renal crisis and renal involvement in systemic sclerosis. Nat Rev Nephrol. 2016 Nov. 12 (11):678-691. [QxMD MEDLINE Link].
Jancin B. Be vigilant for scleroderma renal crisis. Rheumatology News. Available at June 15, 2020; Accessed: February 3 2022.
Krieg T, Takehara K. Skin disease: a cardinal feature of systemic sclerosis. Rheumatology (Oxford). 2009 Jun. 48 Suppl 3:iii14-8. [QxMD MEDLINE Link].
Czirják L, Foeldvari I, Müller-Ladner U. Skin involvement in systemic sclerosis. Rheumatology (Oxford). 2008 Oct. 47 Suppl 5:v44-5. [QxMD MEDLINE Link].
Abignano G, Del Galdo F. Quantitating skin fibrosis: innovative strategies and their clinical implications. Curr Rheumatol Rep. 2014 Mar. 16(3):404. [QxMD MEDLINE Link].
Kahaleh MB. Raynaud phenomenon and the vascular disease in scleroderma. Curr Opin Rheumatol. 2004 Nov. 16(6):718-22. [QxMD MEDLINE Link].
Herrick AL. The pathogenesis, diagnosis and treatment of Raynaud phenomenon. Nat Rev Rheumatol. 2012 Aug. 8(8):469-79. [QxMD MEDLINE Link].
Prete M, Fatone MC, Favoino E, Perosa F. Raynaud's phenomenon: from molecular pathogenesis to therapy. Autoimmun Rev. 2014 Jun. 13(6):655-67. [QxMD MEDLINE Link].
Ennis H, Vail A, Wragg E, Taylor A, Moore T, Murray A. A prospective study of systemic sclerosis-related digital ulcers: prevalence, location, and functional impact. Scand J Rheumatol. 2013. 42(6):483-6. [QxMD MEDLINE Link].
Guiducci S, Giacomelli R, Cerinic MM. Vascular complications of scleroderma. Autoimmun Rev. 2007 Sep. 6(8):520-3. [QxMD MEDLINE Link].
Hettema ME, Bootsma H, Kallenberg CG. Macrovascular disease and atherosclerosis in SSc. Rheumatology (Oxford). 2008 May. 47(5):578-83. [QxMD MEDLINE Link].
Chu SY, Chen YJ, Liu CJ, Tseng WC, Lin MW, Hwang CY. Increased risk of acute myocardial infarction in systemic sclerosis: a nationwide population-based study. Am J Med. 2013 Nov. 126(11):982-8. [QxMD MEDLINE Link].
Gyger G, Baron M. Gastrointestinal manifestations of scleroderma: recent progress in evaluation, pathogenesis, and management. Curr Rheumatol Rep. 2012 Feb. 14(1):22-9. [QxMD MEDLINE Link].
Christmann RB, Wells AU, Capelozzi VL, Silver RM. Gastroesophageal reflux incites interstitial lung disease in systemic sclerosis: clinical, radiologic, histopathologic, and treatment evidence. Semin Arthritis Rheum. 2010 Dec. 40(3):241-9. [QxMD MEDLINE Link].
Butt S, Emmanuel A. Systemic sclerosis and the gut. Expert Rev Gastroenterol Hepatol. 2013 May. 7(4):331-9. [QxMD MEDLINE Link].
Di Ciaula A, Covelli M, Berardino M, Wang DQ, Lapadula G, Palasciano G, et al. Gastrointestinal symptoms and motility disorders in patients with systemic scleroderma. BMC Gastroenterol. 2008 Feb 27. 8:7. [QxMD MEDLINE Link].[Full Text].
Hung EW, Mayes MD, Sharif R, Assassi S, Machicao VI, Hosing C. Gastric antral vascular ectasia and its clinical correlates in patients with early diffuse systemic sclerosis in the SCOT trial. J Rheumatol. 2013 Apr. 40(4):455-60. [QxMD MEDLINE Link].
Ghrénassia E, Avouac J, Khanna D, Derk CT, Distler O, Suliman YA, et al. Prevalence, correlates and outcomes of gastric antral vascular ectasia in systemic sclerosis: a EUSTAR case-control study. J Rheumatol. 2014 Jan. 41(1):99-105. [QxMD MEDLINE Link].
Steen VD. The lung in systemic sclerosis. J Clin Rheumatol. 2005 Feb. 11(1):40-6. [QxMD MEDLINE Link].
Wells AU, Margaritopoulos GA, Antoniou KM, Denton C. Interstitial lung disease in systemic sclerosis. Semin Respir Crit Care Med. 2014 Apr. 35(2):213-21. [QxMD MEDLINE Link].
Chaisson NF, Hassoun PM. Systemic sclerosis-associated pulmonary arterial hypertension. Chest. 2013 Oct. 144(4):1346-56. [QxMD MEDLINE Link].
Clements PJ, Allanore Y, Khanna D, Singh M, Furst DE. Arthritis in systemic sclerosis: systematic review of the literature and suggestions for the performance of future clinical trials in systemic sclerosis arthritis. Semin Arthritis Rheum. 2012 Jun. 41(6):801-14. [QxMD MEDLINE Link].
Avouac J, Clements PJ, Khanna D, Furst DE, Allanore Y. Articular involvement in systemic sclerosis. Rheumatology (Oxford). 2012 Aug. 51(8):1347-56. [QxMD MEDLINE Link].
Randone SB, Guiducci S, Cerinic MM. Musculoskeletal involvement in systemic sclerosis. Best Pract Res Clin Rheumatol. 2008 Apr. 22(2):339-50. [QxMD MEDLINE Link].
Stoenoiu MS, Houssiau FA, Lecouvet FE. Tendon friction rubs in systemic sclerosis: a possible explanation--an ultrasound and magnetic resonance imaging study. Rheumatology (Oxford). 2013 Mar. 52(3):529-33. [QxMD MEDLINE Link].
Doré A, Lucas M, Ivanco D, Medsger TA Jr, Domsic RT. Significance of palpable tendon friction rubs in early diffuse cutaneous systemic sclerosis. Arthritis Care Res (Hoboken). 2013 Aug. 65(8):1385-9. [QxMD MEDLINE Link].[Full Text].
Steen V. The heart in systemic sclerosis. Curr Rheumatol Rep. 2004 Apr. 6(2):137-40. [QxMD MEDLINE Link].
Desai CS, Lee DC, Shah SJ. Systemic sclerosis and the heart: current diagnosis and management. Curr Opin Rheumatol. 2011 Nov. 23(6):545-54. [QxMD MEDLINE Link].
Meune C, Vignaux O, Kahan A, Allanore Y. Heart involvement in systemic sclerosis: evolving concept and diagnostic methodologies. Arch Cardiovasc Dis. 2010 Jan. 103(1):46-52. [QxMD MEDLINE Link].
Kahan A, Allanore Y. Primary myocardial involvement in systemic sclerosis. Rheumatology (Oxford). 2006 Oct. 45 Suppl 4:iv14-7. [QxMD MEDLINE Link].
Vacca A, Meune C, Gordon J, Chung L, Proudman S, Assassi S. Cardiac arrhythmias and conduction defects in systemic sclerosis. Rheumatology (Oxford). 2013 Nov 15. [QxMD MEDLINE Link].
Chu SY, Chen YJ, Liu CJ, Tseng WC, Lin MW, Hwang CY. Increased risk of acute myocardial infarction in systemic sclerosis: a nationwide population-based study. Am J Med. 2013 Nov. 126(11):982-8. [QxMD MEDLINE Link].
Steen VD. Scleroderma renal crisis. Rheum Dis Clin North Am. 2003 May. 29(2):315-33. [QxMD MEDLINE Link].
Penn H, Howie AJ, Kingdon EJ, Bunn CC, Stratton RJ, Black CM. Scleroderma renal crisis: patient characteristics and long-term outcomes. QJM. 2007 Aug. 100(8):485-94. [QxMD MEDLINE Link].
Steen VD, Syzd A, Johnson JP, Greenberg A, Medsger TA Jr. Kidney disease other than renal crisis in patients with diffuse scleroderma. J Rheumatol. 2005 Apr. 32(4):649-55. [QxMD MEDLINE Link].
Steen VD, Medsger TA Jr. Case-control study of corticosteroids and other drugs that either precipitate or protect from the development of scleroderma renal crisis. Arthritis Rheum. 1998 Sep. 41(9):1613-9. [QxMD MEDLINE Link].
Lally EV, Jimenez SA. Impotence in progressively systemic sclerosis. Ann Intern Med. 1981 Aug. 95(2):150-3. [QxMD MEDLINE Link].
Foocharoen C, Tyndall A, Hachulla E, Rosato E, Allanore Y, Farge-Bancel D, et al. Erectile dysfunction is frequent in systemic sclerosis and associated with severe disease: a study of the EULAR Scleroderma Trial and Research group. Arthritis Res Ther. 2012 Feb 20. 14(1):R37. [QxMD MEDLINE Link].[Full Text].
Minervini R, Morelli G, Minervini A, Pampaloni S, Tognetti A, Fiorentini L, et al. Bladder involvement in systemic sclerosis: urodynamic and histological evaluation in 23 patients. Eur Urol. 1998. 34(1):47-52. [QxMD MEDLINE Link].
Bhadauria S, Moser DK, Clements PJ, Singh RR, Lachenbruch PA, Pitkin RM. Genital tract abnormalities and female sexual function impairment in systemic sclerosis. Am J Obstet Gynecol. 1995 Feb. 172(2 Pt 1):580-7. [QxMD MEDLINE Link].
Kobak S, Oksel F, Aksu K, Kabasakal Y. The frequency of sicca symptoms and Sjögren's syndrome in patients with systemic sclerosis. Int J Rheum Dis. 2013 Feb. 16(1):88-92. [QxMD MEDLINE Link].
Albilia JB, Lam DK, Blanas N, Clokie CM, Sándor GK. Small mouths ... Big problems? A review of scleroderma and its oral health implications. J Can Dent Assoc. 2007 Nov. 73(9):831-6. [QxMD MEDLINE Link].
Derk CT, Rasheed M, Spiegel JR, Jimenez SA. Increased incidence of carcinoma of the tongue in patients with systemic sclerosis. J Rheumatol. 2005 Apr. 32(4):637-41. [QxMD MEDLINE Link].
Busquets J, Lee Y, Santamarina L, Federman JL, Abel A, Del Galdo F. Acute retinal artery occlusion in systemic sclerosis: a rare manifestation of systemic sclerosis fibroproliferative vasculopathy. Semin Arthritis Rheum. 2013 Oct. 43(2):204-8. [QxMD MEDLINE Link].
Antonelli A, Fallahi P, Ferrari SM, Mancusi C, Giuggioli D, Colaci M, et al. Incidence of thyroid disorders in systemic sclerosis: results from a longitudinal follow-up. J Clin Endocrinol Metab. 2013 Jul. 98(7):E1198-202. [QxMD MEDLINE Link].
Marasini B, Ferrari PA, Solaro N, Selmi C. Thyroid dysfunction in women with systemic sclerosis. Ann N Y Acad Sci. 2007 Jun. 1108:305-11. [QxMD MEDLINE Link].
Amaral TN, Peres FA, Lapa AT, Marques-Neto JF, Appenzeller S. Neurologic involvement in scleroderma: a systematic review. Semin Arthritis Rheum. 2013 Dec. 43(3):335-47. [QxMD MEDLINE Link].
Thombs BD, Taillefer SS, Hudson M, Baron M. Depression in patients with systemic sclerosis: a systematic review of the evidence. Arthritis Rheum. 2007 Aug 15. 57(6):1089-97. [QxMD MEDLINE Link].
Malcarne VL, Fox RS, Mills SD, Gholizadeh S. Psychosocial aspects of systemic sclerosis. Curr Opin Rheumatol. 2013 Nov. 25(6):707-13. [QxMD MEDLINE Link].
Nguyen C, Ranque B, Baubet T, Bérezné A, Mestre-Stanislas C, Rannou F, et al. Clinical, functional and health-related quality of life correlates of clinically significant symptoms of anxiety and depression in patients with systemic sclerosis: a cross-sectional survey. PLoS One. 2014. 9(2):e90484. [QxMD MEDLINE Link].[Full Text].
Frech TM, Smith G, Reily M, Chamberlain J, Murtaugh MA, Penrod J. Peripheral neuropathy: a complication of systemic sclerosis. Clin Rheumatol. 2013 Jun. 32(6):885-8. [QxMD MEDLINE Link].
Hsu V, Varga J, Schlesinger N. Calcinosis in scleroderma made crystal clear. Curr Opin Rheumatol. 2019 Nov. 31 (6):589-594. [QxMD MEDLINE Link].
Tyndall A, Fistarol S. The differential diagnosis of systemic sclerosis. Curr Opin Rheumatol. 2013 Nov. 25(6):692-9. [QxMD MEDLINE Link].
Yaqub A, Chung L, Rieger KE, Fiorentino DF. Localized cutaneous fibrosing disorders. Rheum Dis Clin North Am. 2013 May. 39(2):347-64. [QxMD MEDLINE Link].
Ferreli C, Gasparini G, Parodi A, Cozzani E, Rongioletti F, Atzori L. Cutaneous Manifestations of Scleroderma and Scleroderma-Like Disorders: a Comprehensive Review. Clin Rev Allergy Immunol. 2017 Dec. 53 (3):306-336. [QxMD MEDLINE Link].
Canady J, Karrer S, Fleck M, Bosserhoff AK. Fibrosing connective tissue disorders of the skin: molecular similarities and distinctions. J Dermatol Sci. 2013 Jun. 70(3):151-8. [QxMD MEDLINE Link].
Zuccaro G Jr. Esophagoscopy and endoscopic esophageal ultrasound in the assessment of esophageal function. Semin Thorac Cardiovasc Surg. 2001 Jul. 13(3):226-33. [QxMD MEDLINE Link].
Chapin R, Hant FN. Imaging of scleroderma. Rheum Dis Clin North Am. 2013 Aug. 39(3):515-46. [QxMD MEDLINE Link].
Strange C, Bolster MB, Roth MD, Silver RM, Theodore A, Goldin J, et al. Bronchoalveolar lavage and response to cyclophosphamide in scleroderma interstitial lung disease. Am J Respir Crit Care Med. 2008 Jan 1. 177(1):91-8. [QxMD MEDLINE Link].[Full Text].
Kowal-Bielecka O, Kowal K, Highland KB, Silver RM. Bronchoalveolar lavage fluid in scleroderma interstitial lung disease: technical aspects and clinical correlations: review of the literature. Semin Arthritis Rheum. 2010 Aug. 40(1):73-88. [QxMD MEDLINE Link].
van Bon L, Affandi AJ, Broen J, Christmann RB, Marijnissen RJ, Stawski L, et al. Proteome-wide analysis and CXCL4 as a biomarker in systemic sclerosis. N Engl J Med. 2014 Jan 30. 370(5):433-43. [QxMD MEDLINE Link].[Full Text].
Allanore Y, Meune C. N-terminal pro brain natriuretic peptide: the new cornerstone of cardiovascular assessment in systemic sclerosis. Clin Exp Rheumatol. 2009 May-Jun. 27(3 Suppl 54):59-63. [QxMD MEDLINE Link].
Chighizola C, Meroni PL, Schreiber BE, Coghlan JG, Denton CP, Ong VH. Role of N-terminal pro-brain natriuretic peptide in detecting clinically significant cardiac involvement in systemic sclerosis patients. Clin Exp Rheumatol. 2012 Mar-Apr. 30(2 Suppl 71):S81-5. [QxMD MEDLINE Link].
Thakkar V, Stevens W, Prior D, Youssef P, Liew D, Gabbay E, et al. The inclusion of N-terminal pro-brain natriuretic peptide in a sensitive screening strategy for systemic sclerosis-related pulmonary arterial hypertension: a cohort study. Arthritis Res Ther. 2013. 15(6):R193. [QxMD MEDLINE Link].[Full Text].
Hughes M, Lilleker JB, Herrick AL, Chinoy H. Cardiac troponin testing in idiopathic inflammatory myopathies and systemic sclerosis-spectrum disorders: biomarkers to distinguish between primary cardiac involvement and low-grade skeletal muscle disease activity. Ann Rheum Dis. 2015 May. 74 (5):795-8. [QxMD MEDLINE Link].[Full Text].
Hsu VM, Moreyra AE, Wilson AC, Shinnar M, Shindler DM, Wilson JE, et al. Assessment of pulmonary arterial hypertension in patients with systemic sclerosis: comparison of noninvasive tests with results of right-heart catheterization. J Rheumatol. 2008 Mar. 35(3):458-65. [QxMD MEDLINE Link].
Avouac J, Huscher D, Furst DE, Opitz CF, Distler O, Allanore Y. Expert consensus for performing right heart catheterisation for suspected pulmonary arterial hypertension in systemic sclerosis: a Delphi consensus study with cluster analysis. Ann Rheum Dis. 2014 Jan. 73(1):191-7. [QxMD MEDLINE Link].
Freire V, Bazeli R, Elhai M, Campagna R, Pessis É, Avouac J. Hand and wrist involvement in systemic sclerosis: US features. Radiology. 2013 Dec. 269(3):824-30. [QxMD MEDLINE Link].
Boutry N, Hachulla E, Zanetti-Musielak C, Morel M, Demondion X, Cotten A. Imaging features of musculoskeletal involvement in systemic sclerosis. Eur Radiol. 2007 May. 17(5):1172-80. [QxMD MEDLINE Link].
Cutolo M, Sulli A, Smith V. How to perform and interpret capillaroscopy. Best Pract Res Clin Rheumatol. 2013 Apr. 27(2):237-48. [QxMD MEDLINE Link].
Sulli A, Ruaro B, Alessandri E, Pizzorni C, Cimmino MA, Zampogna G. Correlations between nailfold microangiopathy severity, finger dermal thickness and fingertip blood perfusion in systemic sclerosis patients. Ann Rheum Dis. 2014 Jan. 73(1):247-51. [QxMD MEDLINE Link].
Herrick AL, Cutolo M. Clinical implications from capillaroscopic analysis in patients with Raynaud's phenomenon and systemic sclerosis. Arthritis Rheum. 2010 Sep. 62(9):2595-604. [QxMD MEDLINE Link].
Smith V, Riccieri V, Pizzorni C, Decuman S, Deschepper E, Bonroy C. Nailfold capillaroscopy for prediction of novel future severe organ involvement in systemic sclerosis. J Rheumatol. 2013 Dec. 40(12):2023-8. [QxMD MEDLINE Link].
Steen VD. Autoantibodies in systemic sclerosis. Semin Arthritis Rheum. 2005 Aug. 35(1):35-42. [QxMD MEDLINE Link].
Mehra S, Walker J, Patterson K, Fritzler MJ. Autoantibodies in systemic sclerosis. Autoimmun Rev. 2013 Jan. 12(3):340-54. [QxMD MEDLINE Link].
Perera A, Fertig N, Lucas M, Rodriguez-Reyna TS, Hu P, Steen VD. Clinical subsets, skin thickness progression rate, and serum antibody levels in systemic sclerosis patients with anti-topoisomerase I antibody. Arthritis Rheum. 2007 Aug. 56(8):2740-6. [QxMD MEDLINE Link].
D'Aoust J, Hudson M, Tatibouet S, Wick J, Mahler M, Baron M, et al. Clinical and Serologic Correlates of Anti-PM/Scl Antibodies in Systemic Sclerosis: A Multicenter Study of 763 Patients. Arthritis Rheumatol. 2014 Jun. 66(6):1608-15. [QxMD MEDLINE Link].
Pignone A, Matucci-Cerinic M, Lombardi A, Fedi R, Fargnoli R, De Dominicis R. High resolution computed tomography in systemic sclerosis. Real diagnostic utilities in the assessment of pulmonary involvement and comparison with other modalities of lung investigation. Clin Rheumatol. 1992 Dec. 11(4):465-72. [QxMD MEDLINE Link].
Khanna D, Tseng CH, Farmani N, Steen V, Furst DE, Clements PJ. Clinical course of lung physiology in patients with scleroderma and interstitial lung disease: analysis of the Scleroderma Lung Study Placebo Group. Arthritis Rheum. 2011 Oct. 63(10):3078-85. [QxMD MEDLINE Link].
Hudson M, Assayag D, Caron M, Fox BD, Hirsch A, Steele R. Comparison of different measures of diffusing capacity for carbon monoxide (DLCO) in systemic sclerosis. Clin Rheumatol. 2013 Oct. 32(10):1467-74. [QxMD MEDLINE Link].
Schreiber BE, Valerio CJ, Keir GJ, Handler C, Wells AU, Denton CP. Improving the detection of pulmonary hypertension in systemic sclerosis using pulmonary function tests. Arthritis Rheum. 2011 Nov. 63(11):3531-9. [QxMD MEDLINE Link].
Steen VD, Graham G, Conte C, Owens G, Medsger TA Jr. Isolated diffusing capacity reduction in systemic sclerosis. Arthritis Rheum. 1992 Jul. 35(7):765-70. [QxMD MEDLINE Link].
Codullo V, Caporali R, Cuomo G, Ghio S, D'Alto M, Fusetti C. Stress Doppler echocardiography in systemic sclerosis: evidence for a role in the prediction of pulmonary hypertension. Arthritis Rheum. 2013 Sep. 65(9):2403-11. [QxMD MEDLINE Link].
Draeger HT, Assassi S, Sharif R, Gonzalez EB, Harper BE, Arnett FC, et al. Right bundle branch block: a predictor of mortality in early systemic sclerosis. PLoS One. 2013. 8(10):e78808. [QxMD MEDLINE Link].[Full Text].
Nordin A, Björnådal L, Larsson A, Svenungsson E, Jensen-Urstad K. Electrocardiography in 110 patients with systemic sclerosis: a cross-sectional comparison with population-based controls. Scand J Rheumatol. 2014. 43(3):221-5. [QxMD MEDLINE Link].
Thonhofer R, Siegel C, Trummer M, Graninger W. Early endoscopy in systemic sclerosis without gastrointestinal symptoms. Rheumatol Int. 2012 Jan. 32(1):165-8. [QxMD MEDLINE Link].
Lahcene M, Oumnia N, Matougui N, Boudjella M, Tebaibia A, Touchene B. Esophageal involvement in scleroderma: clinical, endoscopic, and manometric features. ISRN Rheumatol. 2011. 2011:325826. [QxMD MEDLINE Link].
Denton CP, Ong VH. Targeted therapies for systemic sclerosis. Nat Rev Rheumatol. 2013 Aug. 9(8):451-64. [QxMD MEDLINE Link].
Bhattacharyya S, Wei J, Varga J. Understanding fibrosis in systemic sclerosis: shifting paradigms, emerging opportunities. Nat Rev Rheumatol. 2012 Jan. 8(1):42-54. [QxMD MEDLINE Link].
Cappelli S, Guiducci S, Bellando Randone S, Matucci Cerinic M. Immunosuppression for interstitial lung disease in systemic sclerosis. Eur Respir Rev. 2013 Sep 1. 22(129):236-43. [QxMD MEDLINE Link].
Frech TM, Shanmugam VK, Shah AA, Assassi S, Gordon JK, Hant FN. Treatment of early diffuse systemic sclerosis skin disease. Clin Exp Rheumatol. 2013 Mar-Apr. 31(2 Suppl 76):166-71. [QxMD MEDLINE Link].
Nihtyanova SI, Ong VH, Denton CP. Current management strategies for systemic sclerosis. Clin Exp Rheumatol. 2014 Mar-Apr. 32(2 Suppl 81):156-64. [QxMD MEDLINE Link].
Denton CP. Systemic sclerosis: from pathogenesis to targeted therapy. Clin Exp Rheumatol. 2015 Sep-Oct. 33 (4 Suppl 92):3-7. [QxMD MEDLINE Link].
A Study of the Efficacy and Safety of Tocilizumab in Participants With Systemic Sclerosis (SSc) (focuSSced). ClinicalTrials.gov. Available at April 16, 2019; Accessed: September 9, 2019.
Khanna D, Lin CJF, Goldin J, et al. OP0245 PRESERVATION OF LUNG FUNCTION OBSERVED IN A PHASE 3 RANDOMIZED CONTROLLED TRIAL OF TOCILIZUMAB FOR THE TREATMENT OF EARLY SSC. Ann Rheum Dis. June 14, 2019. 78 Suppl 2:202. [Full Text].
Freeman S. Tocilizumab preserves lung function in systemic sclerosis. MDedge. Available at June 26, 2019; Accessed: June 24, 2020.
van den Hoogen FH, Boerbooms AM, Swaak AJ, Rasker JJ, van Lier HJ, van de Putte LB. Comparison of methotrexate with placebo in the treatment of systemic sclerosis: a 24 week randomized double-blind trial, followed by a 24 week observational trial. Br J Rheumatol. 1996 Apr. 35(4):364-72. [QxMD MEDLINE Link].
Pope JE, Bellamy N, Seibold JR, Baron M, Ellman M, Carette S. A randomized, controlled trial of methotrexate versus placebo in early diffuse scleroderma. Arthritis Rheum. 2001 Jun. 44(6):1351-8. [QxMD MEDLINE Link].
Tashkin DP, Elashoff R, Clements PJ, Goldin J, Roth MD, Furst DE. Cyclophosphamide versus placebo in scleroderma lung disease. N Engl J Med. 2006 Jun 22. 354(25):2655-66. [QxMD MEDLINE Link].
Nannini C, West CP, Erwin PJ, Matteson EL. Effects of cyclophosphamide on pulmonary function in patients with scleroderma and interstitial lung disease: a systematic review and meta-analysis of randomized controlled trials and observational prospective cohort studies. Arthritis Res Ther. 2008. 10(5):R124. [QxMD MEDLINE Link].[Full Text].
Derk CT, Grace E, Shenin M, Naik M, Schulz S, Xiong W. A prospective open-label study of mycophenolate mofetil for the treatment of diffuse systemic sclerosis. Rheumatology (Oxford). 2009 Dec. 48(12):1595-9. [QxMD MEDLINE Link].
Mendoza FA, Nagle SJ, Lee JB, Jimenez SA. A prospective observational study of mycophenolate mofetil treatment in progressive diffuse cutaneous systemic sclerosis of recent onset. J Rheumatol. 2012 Jun. 39(6):1241-7. [QxMD MEDLINE Link].
Le EN, Wigley FM, Shah AA, Boin F, Hummers LK. Long-term experience of mycophenolate mofetil for treatment of diffuse cutaneous systemic sclerosis. Ann Rheum Dis. 2011 Jun. 70(6):1104-7. [QxMD MEDLINE Link].
Derk CT, Huaman G, Jimenez SA. A retrospective randomly selected cohort study of D-penicillamine treatment in rapidly progressive diffuse cutaneous systemic sclerosis of recent onset. Br J Dermatol. 2008 May. 158(5):1063-8. [QxMD MEDLINE Link].
Clements PJ, Furst DE, Wong WK, Mayes M, White B, Wigley F. High-dose versus low-dose D-penicillamine in early diffuse systemic sclerosis: analysis of a two-year, double-blind, randomized, controlled clinical trial. Arthritis Rheum. 1999 Jun. 42(6):1194-203. [QxMD MEDLINE Link].
Smith V, Piette Y, van Praet JT, Decuman S, Deschepper E, Elewaut D, et al. Two-year results of an open pilot study of a 2-treatment course with rituximab in patients with early systemic sclerosis with diffuse skin involvement. J Rheumatol. 2013 Jan. 40(1):52-7. [QxMD MEDLINE Link].
Jordan S, Distler JH, Maurer B, Huscher D, van Laar JM, Allanore Y, et al. Effects and safety of rituximab in systemic sclerosis: an analysis from the European Scleroderma Trial and Research (EUSTAR) group. Ann Rheum Dis. 2015 Jun. 74 (6):1188-94. [QxMD MEDLINE Link].
Moazedi-Fuerst FC, Kielhauser SM, Brickmann K, Hermann J, Lutfi A, Meilinger M. Rituximab for systemic sclerosis: arrest of pulmonary disease progression in five cases. Results of a lower dosage and shorter interval regimen. Scand J Rheumatol. 2014. 43(3):257-8. [QxMD MEDLINE Link].
Daoussis D, Liossis SN, Tsamandas AC, Kalogeropoulou C, Paliogianni F, Sirinian C, et al. Effect of long-term treatment with rituximab on pulmonary function and skin fibrosis in patients with diffuse systemic sclerosis. Clin Exp Rheumatol. 2012 Mar-Apr. 30(2 Suppl 71):S17-22. [QxMD MEDLINE Link].
Keyal U, Bhatta AK, Wang XL. UVA1 a promising approach for scleroderma. Am J Transl Res. 2017. 9 (9):4280-4287. [QxMD MEDLINE Link].[Full Text].
Naraghi K, van Laar JM. Update on stem cell transplantation for systemic sclerosis: recent trial results. Curr Rheumatol Rep. 2013. 15(5):326.
van Laar JM, Sullivan K. Stem cell transplantation in systemic sclerosis. Curr Opin Rheumatol. 2013 Nov. 25(6):719-25. [QxMD MEDLINE Link].
Milanetti F, Bucha J, Testori A, Burt RK. Autologous hematopoietic stem cell transplantation for systemic sclerosis. Curr Stem Cell Res Ther. 2011 Mar. 6(1):16-28. [QxMD MEDLINE Link].
Burt RK, Milanetti F. Hematopoietic stem cell transplantation for systemic sclerosis: history and current status. Curr Opin Rheumatol. 2011 Nov. 23(6):519-29. [QxMD MEDLINE Link].
van Laar JM, et al; EBMT/EULAR Scleroderma Study Group. Autologous hematopoietic stem cell transplantation vs intravenous pulse cyclophosphamide in diffuse cutaneous systemic sclerosis: a randomized clinical trial. JAMA. 2014 Jun 25. 311 (24):2490-8. [QxMD MEDLINE Link].
Sullivan KM, et al; SCOT Study Investigators. Myeloablative Autologous Stem-Cell Transplantation for Severe Scleroderma. N Engl J Med. 2018 Jan 4. 378 (1):35-47. [QxMD MEDLINE Link].[Full Text].
Sullivan KM, Shah A, Sarantopoulos S, Furst DE. Review: Hematopoietic Stem Cell Transplantation for Scleroderma: Effective Immunomodulatory Therapy for Patients With Pulmonary Involvement. Arthritis Rheumatol. 2016 Oct. 68 (10):2361-71. [QxMD MEDLINE Link].[Full Text].
Postlethwaite AE, Wong WK, Clements P, Chatterjee S, Fessler BJ, Kang AH, et al. A multicenter, randomized, double-blind, placebo-controlled trial of oral type I collagen treatment in patients with diffuse cutaneous systemic sclerosis: I. oral type I collagen does not improve skin in all patients, but may improve skin in late-phase disease. Arthritis Rheum. 2008 Jun. 58(6):1810-22. [QxMD MEDLINE Link].
Khanna D, Clements PJ, Furst DE, Korn JH, Ellman M, Rothfield N. Recombinant human relaxin in the treatment of systemic sclerosis with diffuse cutaneous involvement: a randomized, double-blind, placebo-controlled trial. Arthritis Rheum. 2009 Apr. 60(4):1102-11. [QxMD MEDLINE Link].
Black CM, Silman AJ, Herrick AI, Denton CP, Wilson H, Newman J, et al. Interferon-alpha does not improve outcome at one year in patients with diffuse cutaneous scleroderma: results of a randomized, double-blind, placebo-controlled trial. Arthritis Rheum. 1999 Feb. 42(2):299-305. [QxMD MEDLINE Link].
Denton CP, Merkel PA, Furst DE, Khanna D, Emery P, Hsu VM, et al. Recombinant human anti-transforming growth factor beta1 antibody therapy in systemic sclerosis: a multicenter, randomized, placebo-controlled phase I/II trial of CAT-192. Arthritis Rheum. 2007 Jan. 56(1):323-33. [QxMD MEDLINE Link].
Frech TM, Baron M. Understanding itch in systemic sclerosis in order to improve patient quality of life. Clin Exp Rheumatol. 2013 Mar-Apr. 31(2 Suppl 76):81-8. [QxMD MEDLINE Link].
Herrick AL. Management of Raynaud's phenomenon and digital ischemia. Curr Rheumatol Rep. 2013 Jan. 15(1):303. [QxMD MEDLINE Link].
Fries R, Shariat K, von Wilmowsky H, Böhm M. Sildenafil in the treatment of Raynaud's phenomenon resistant to vasodilatory therapy. Circulation. 2005 Nov 8. 112(19):2980-5. [QxMD MEDLINE Link].
Brueckner CS, Becker MO, Kroencke T, Huscher D, Scherer HU, Worm M. Effect of sildenafil on digital ulcers in systemic sclerosis: analysis from a single centre pilot study. Ann Rheum Dis. 2010 Aug. 69(8):1475-8. [QxMD MEDLINE Link].
Della Rossa A, Doveri M, D'Ascanio A, Tavoni A, Consensi A, Neri R, et al. Oral sildenafil in skin ulcers secondary to systemic sclerosis. Scand J Rheumatol. 2011. 40(4):323-5. [QxMD MEDLINE Link].
Hummers LK, Wigley FM. Management of Raynaud's phenomenon and digital ischemic lesions in scleroderma. Rheum Dis Clin North Am. 2003 May. 29(2):293-313. [QxMD MEDLINE Link].
Wigley FM, Wise RA, Seibold JR, McCloskey DA, Kujala G, Medsger TA Jr. Intravenous iloprost infusion in patients with Raynaud phenomenon secondary to systemic sclerosis. A multicenter, placebo-controlled, double-blind study. Ann Intern Med. 1994 Feb 1. 120(3):199-206. [QxMD MEDLINE Link].
Shah AA, Schiopu E, Hummers LK, Wade M, Phillips K, Anderson C, et al. Open label study of escalating doses of oral treprostinil diethanolamine in patients with systemic sclerosis and digital ischemia: pharmacokinetics and correlation with digital perfusion. Arthritis Res Ther. 2013 Apr 18. 15(2):R54. [QxMD MEDLINE Link].
Tomaino MM, Goitz RJ, Medsger TA. Surgery for ischemic pain and Raynaud's' phenomenon in scleroderma: a description of treatment protocol and evaluation of results. Microsurgery. 2001. 21(3):75-9. [QxMD MEDLINE Link].
Romaniello A, Viola G, Salsano F, Rosato E. In systemic sclerosis patients, bosentan is safe and effective for digital ulcer prevention and it seems to attenuate the development of pulmonary arterial hypertension. Rheumatology (Oxford). 2014 Mar. 53(3):570-1. [QxMD MEDLINE Link].
Agard C, Carpentier P, Mouthon L, Clerson P, Gressin V, Bérezné A. Use of bosentan for digital ulcers related to systemic sclerosis: a real-life retrospective French study of 89 patients treated since specific approval. Scand J Rheumatol. 2014 Apr 11. [QxMD MEDLINE Link].
Trombetta AC, Pizzorni C, Ruaro B, Paolino S, Sulli A, Smith V, et al. Effects of Longterm Treatment with Bosentan and Iloprost on Nailfold Absolute Capillary Number, Fingertip Blood Perfusion, and Clinical Status in Systemic Sclerosis. J Rheumatol. 2016 Oct 1. 7(11):1487-501. [QxMD MEDLINE Link].
Parisi S, Peroni CL, Laganà A, Scarati M, Ambrogio F, Bruzzone M, et al. Efficacy of ambrisentan in the treatment of digital ulcers in patients with systemic sclerosis: a preliminary study. Rheumatology (Oxford). 2013 Jun. 52(6):1142-4. [QxMD MEDLINE Link].
Patel T, McKeage K. Macitentan: first global approval. Drugs. 2014 Jan. 74(1):127-33. [QxMD MEDLINE Link].
Sallam H, McNearney TA, Chen JD. Systematic review: pathophysiology and management of gastrointestinal dysmotility in systemic sclerosis (scleroderma). Aliment Pharmacol Ther. 2006 Mar 15. 23(6):691-712. [QxMD MEDLINE Link].
Forbes A, Marie I. Gastrointestinal complications: the most frequent internal complications of systemic sclerosis. Rheumatology (Oxford). 2009 Jun. 48 Suppl 3:iii36-9. [QxMD MEDLINE Link].
Sakkas LI, Simopoulou T, Daoussis D, Liossis SN, Potamianos S. Intestinal Involvement in Systemic Sclerosis: A Clinical Review. Dig Dis Sci. 2018 Apr. 63 (4):834-844. [QxMD MEDLINE Link].
Lota HK, Wells AU. The evolving pharmacotherapy of pulmonary fibrosis. Expert Opin Pharmacother. 2013 Jan. 14(1):79-89. [QxMD MEDLINE Link].
Cappelli S, Guiducci S, Bellando Randone S, Matucci Cerinic M. Immunosuppression for interstitial lung disease in systemic sclerosis. Eur Respir Rev. 2013 Sep 1. 22(129):236-43. [QxMD MEDLINE Link].
Hoyles RK, Ellis RW, Wellsbury J, Lees B, Newlands P, Goh NS, et al. A multicenter, prospective, randomized, double-blind, placebo-controlled trial of corticosteroids and intravenous cyclophosphamide followed by oral azathioprine for the treatment of pulmonary fibrosis in scleroderma. Arthritis Rheum. 2006 Dec. 54(12):3962-70. [QxMD MEDLINE Link].
Gerbino AJ, Goss CH, Molitor JA. Effect of mycophenolate mofetil on pulmonary function in scleroderma-associated interstitial lung disease. Chest. 2008 Feb. 133(2):455-60. [QxMD MEDLINE Link].
Owen C, Ngian GS, Elford K, Moore O, Stevens W, Nikpour M, et al. Mycophenolate mofetil is an effective and safe option for the management of systemic sclerosis-associated interstitial lung disease: results from the Australian Scleroderma Cohort Study. Clin Exp Rheumatol. 2016 Sep-Oct. 34 Suppl 100 (5):170-176. [QxMD MEDLINE Link].
Tashkin DP, et al; Sclerodema Lung Study II Investigators. Mycophenolate mofetil versus oral cyclophosphamide in scleroderma-related interstitial lung disease (SLS II): a randomised controlled, double-blind, parallel group trial. Lancet Respir Med. 2016 Sep. 4 (9):708-719. [QxMD MEDLINE Link].[Full Text].
Distler O, Highland KB, Gahlemann M, Azuma A, Fischer A, Mayes MD, et al. Nintedanib for Systemic Sclerosis-Associated Interstitial Lung Disease. N Engl J Med. 2019 Jun 27. 380 (26):2518-2528. [QxMD MEDLINE Link].
Khanna D, Lin CJF, Furst DE, Wagner B, Zucchetto M, Raghu G, et al. Long-Term Safety and Efficacy of Tocilizumab in Early Systemic Sclerosis-Interstitial Lung Disease: Open-Label Extension of a Phase 3 Randomized Controlled Trial. Am J Respir Crit Care Med. 2022 Mar 15. 205 (6):674-684. [QxMD MEDLINE Link].
Brooks M. FDA Clears Two-Drug Combo as First-Line Treatment for PAH. Medscape Medical News. Available at October 6, 2015; Accessed: October 23, 2015.
Hassoun PM, Zamanian RT, Damico R, Lechtzin N, Khair R, Kolb TM, et al. Ambrisentan and Tadalafil Upfront Combination Therapy in Scleroderma-Associated PAH. Am J Respir Crit Care Med. 2015 Sep 11. 47 (1-2):63-7. [QxMD MEDLINE Link].
Johnson SR, Granton JT, Tomlinson GA, Grosbein HA, Le T, Lee P, et al. Warfarin in systemic sclerosis-associated and idiopathic pulmonary arterial hypertension. A Bayesian approach to evaluating treatment for uncommon disease. J Rheumatol. 2012 Feb. 39(2):276-85. [QxMD MEDLINE Link].
Santos Cardozo Roque LC, Tenório ADS, de Aquino LT, Ferreira RDS, Duarte ALBP, Dantas AT. Joint mobilization and therapeutic exercises in the hands of patients with systemic sclerosis: A preliminary randomized controlled trial. Clin Rehabil. 2022 Jan. 36 (1):113-124. [QxMD MEDLINE Link].
Murphy SL, Barber M, Huang S, Sabbagh M, Cutter G, Khanna D. Intensive and app-delivered occupational therapy to improve upper extremity function in early diffuse cutaneous systemic sclerosis: a pilot two-arm trial. Rheumatology (Oxford). 2021 Nov 3. 60 (11):5002-5011. [QxMD MEDLINE Link].
Waszczykowski M, Dziankowska-Bartkowiak B, Podgórski M, Fabiś J, Waszczykowska A. Role and effectiveness of complex and supervised rehabilitation on overall and hand function in systemic sclerosis patients-one-year follow-up study. Sci Rep. 2021 Jul 26. 11 (1):15174. [QxMD MEDLINE Link].
Pieper PG, Lameijer H, Hoendermis ES. Pregnancy and pulmonary hypertension. Best Pract Res Clin Obstet Gynaecol. 2014 May. 28(4):579-91. [QxMD MEDLINE Link].
Groseanu L, Bojinca V, Gudu T, Saulescu I, Predeteanu D, Balanescu A, et al. Low vitamin D status in systemic sclerosis and the impact on disease phenotype. Eur J Rheumatol. 2016 Jun. 3 (2):50-55. [QxMD MEDLINE Link].
Merkel PA, Silliman NP, Denton CP, Furst DE, Khanna D, Emery P, et al. Validity, reliability, and feasibility of durometer measurements of scleroderma skin disease in a multicenter treatment trial. Arthritis Rheum. 2008 May 15. 59(5):699-705. [QxMD MEDLINE Link].[Full Text].
Media Gallery
Scleroderma: Tightening of the skin in the face, with a characteristic beaklike facies and paucity of wrinkles.
Scleroderma: Sclerodactyly with digital ulceration, loss of skin creases, joint contractures, and sparse hair.
Scleroderma: Anterior chest demonstrating salt-and-pepper hypopigmentation and diffuse hyperpigmentation in a white woman.
A radiograph of the distal digits demonstrating calcinosis and distal phalanx reabsorption (acral osteolysis).
Scleroderma: Fingernail capillary bed demonstrating capillary dropout with large dilated vessels.
Lung biopsy demonstrating severe interstitial fibrosis and medial fibrosis and smooth muscle hyperplasia of a pulmonary arteriole compatible with pulmonary hypertension.
Lung biopsy demonstrating expansion of the interstitium of the lung by fibrous tissue along with chronic inflammatory cells.
Scleroderma: Barium swallow demonstrating reflux into the distal esophagus, as well as an accordion appearance in the duodenum.
Skin biopsy showing extensive fibrosis. The biopsy has a square morphology, which reflects the rigidity of the tissue biopsy specimen due to striking pan-dermal sclerosis. In addition, the fibrosing reaction extends into the panniculus. The number of adnexal structures is reduced, another characteristic feature of scleroderma. A significant inflammatory cell infiltrate is not observed. This is in contradistinction to morphea, in which a prominent inflammatory cell infiltrate is present.
Skin biopsy showing severe fibrosis. The fibrosis reflects a widening of collagen bundles in concert with an increase in the number of collagen fibers. Note the superimposed deposition of the newly synthesized delicate collagen bundles interposed between the preexisting collagen bundles, the latter appearing wide and manifesting a hyalinized morphology.
Overall scheme illustrating a proposed sequence of events involved in tissue fibrosis and fibroproliferative vasculopathy in systemic sclerosis. An unknown causative agent induces activation of immune and inflammatory cells in genetically predisposed hosts, resulting in chronic inflammation. Activated inflammatory and immune cells secrete cytokines, chemokines, and growth factors, which cause fibroblast activation, differentiation of endothelial and epithelial cells into myofibroblasts, and recruitment of fibrocytes from the bone marrow and the peripheral blood. The activated myofibroblasts produce exaggerated amounts of extracellular matrix, resulting in tissue fibrosis.
of 11
Tables
Table 1. ACR/EULAR Revised Systemic Sclerosis Classification Criteria;)
Table 1. ACR/EULAR Revised Systemic Sclerosis Classification Criteria
| | | |
---
| Item | Sub-item(s) | Score |
| Skin thickening of the fingers of both hands extending proximally to the metacarpophalangeal joints (presence of this criterion is sufficient criterion for SSc classification) | None | 9 |
| Skin thickening of the fingers (count the higher score only) | Puffy fingers | 2 |
| Sclerodactyly (distal to the metacarpophalangeal joints but proximal to the proximal interphalangeal joints) | 4 |
| Fingertip lesions (count the higher score only) | Digital tip ulcers | 2 |
| Fingertip pitting scars | |
| | None | 2 |
| Abnormal nailfold capillaries | None | 2 |
| Pulmonary arterial hypertension and/or interstitial lung disease (maximum score is 2) | Pulmonary arterial hypertension | 2 |
| Interstitial lung disease | 2 |
| Raynaud phenomenon | None | 3 |
| Systemic sclerosis–related autoantibodies (maximum score is 3) | | 3 |
| Anti–topoisomerase I | 3 |
| Anti–RNA polymerase III | 3 |
| The total score is determined by adding the maximum score in each category. Patients with a total score ≥ 9 are classified as having definite systemic sclerosis (modified from van den Hoogen F, Khanna D, Fransen J, et al. 2013 classification criteria for systemic sclerosis: an American College of Rheumatology/European League against Rheumatism collaborative initiative. Arthritis Rheum. Nov 2013;65(11):2737-47. ) | | |
Back to List
encoded search term (Scleroderma) and Scleroderma
What to Read Next on Medscape
Log in or register for free to unlock more Medscape content
Unlimited access to our entire network of sites and services
Log in or Register |
2047 | https://en.wikipedia.org/wiki/Entropy_of_activation | Jump to content
Entropy of activation
Čeština
Deutsch
Français
Magyar
Українська
Edit links
From Wikipedia, the free encyclopedia
In chemical kinetics, the entropy of activation of a reaction is one of the two parameters (along with the enthalpy of activation) that are typically obtained from the temperature dependence of a reaction rate constant, when these data are analyzed using the Eyring equation of the transition state theory. The standard entropy of activation is symbolized ΔS‡ and equals the change in entropy when the reactants change from their initial state to the activated complex or transition state (Δ = change, S = entropy, ‡ = activation).
Importance
[edit]
Entropy of activation determines the preexponential factor A of the Arrhenius equation for temperature dependence of reaction rates. The relationship depends on the molecularity of the reaction:
for reactions in solution and unimolecular gas reactions
: A = (ekBT/h) exp(ΔS‡/R),
while for bimolecular gas reactions
: A = (e2kBT/h) (RT/p) exp(ΔS‡/R).
In these equations e is the base of natural logarithms, h is the Planck constant, kB is the Boltzmann constant and T the absolute temperature. R′ is the ideal gas constant. The factor is needed because of the pressure dependence of the reaction rate. R′ = 8.3145×10−2 (bar·L)/(mol·K).
The value of ΔS‡ provides clues about the molecularity of the rate determining step in a reaction, i.e. the number of molecules that enter this step. Positive values suggest that entropy increases upon achieving the transition state, which often indicates a dissociative mechanism in which the activated complex is loosely bound and about to dissociate. Negative values for ΔS‡ indicate that entropy decreases on forming the transition state, which often indicates an associative mechanism in which two reaction partners form a single activated complex.
Derivation
[edit]
It is possible to obtain entropy of activation using Eyring equation. This equation is of the form
where:
= reaction rate constant
= absolute temperature
= enthalpy of activation
= gas constant
= transmission coefficient
= Boltzmann constant = R/NA, NA = Avogadro constant
= Planck constant
= entropy of activation
This equation can be turned into the form The plot of versus gives a straight line with slope from which the enthalpy of activation can be derived and with intercept from which the entropy of activation is derived.
References
[edit]
^ Laidler, K.J. and Meiser J.H. Physical Chemistry (Benjamin/Cummings 1982) p. 381–382 ISBN 0-8053-5682-7
^ Laidler and Meiser p. 365
^ James H. Espenson Chemical Kinetics and Reaction Mechanisms (2nd ed., McGraw-Hill 2002), p. 156–160 ISBN 0-07-288362-6
Retrieved from "
Category:
Chemical kinetics |
2048 | https://www.youtube.com/watch?v=7dRlpi8SZQ4 | Altitude Geometric Mean Theorem
Mario's Math Tutoring
458000 subscribers
1052 likes
Description
98221 views
Posted: 22 Feb 2016
Learn how to use the Altitude Geometric Mean Theorem in this free math video tutorial by Mario's Math Tutoring.
Timestamps:
00:00 Intro
0:09 What is the Geometric Mean
1:08 Using Similar Triangles to Show Why the Altitude Geometric Mean Theorem Works
1:49 Example 1 Solving for the Altitude
2:17 Example 2 Solving for a Portion of the Hypotenuse
2:54 Example 3
3:26 Further Exploration of How to Compare the 3 Similar Triangles Formed When an Altitude is Drawn from the Right Angle to the Hypotenuse
Related Videos:
Leg Geometric Mean Theorem
Organized List of My Video Lessons to Help You Raise Your Scores & Pass Your Class. Videos Arranged by Math Subject as well as by Chapter/Topic. (Bookmark the Link Below)
➡️JOIN the channel as a CHANNEL MEMBER at the "ADDITIONAL VIDEOS" level to get access to my math video courses(Algebra 1, Algebra 2/College Algebra, Geometry, and PreCalculus), midterm & final exam reviews, ACT and SAT prep videos and more! (Over 390+ videos)
72 comments
Transcript:
Intro geometric mean okay the geometric mean are these two values and the extremes are these two values and there's something called the means extremes What is the Geometric Mean property you probably know it as the cross multiplication where this product equals this product okay but what we're going to do here is we're going to solve for the altitude or one of these pieces of the hypotenuse when you drop an altitude to the hypotenuse of a right triangle it splits this hypotenuse into two parts a and B and what happens is you hand up with three similar triangles a small one this medium one and this over all right triangle and these triangles are all similar to one another the corresponding angles are congruent the corresponding sides are going to be proportional and what happens is you end up having a proportion that you can set up this triangle and this triangle or the triangle is really compared and I'll just show you real quick if you take this triangle okay and you rotate it and you take this triangle and you rotate it so you have them in the same orientation same direction here you've got a and the Using Similar Triangles to Show Why the Altitude Geometric Mean Theorem Works altitude here you've got V and the altitude and you can see you can set up a proportion so a is 2 the altitude as the altitude is to B so you're comparing the base to the base as the height is to the height so these two triangles are similar so the corresponding sides are proportional but practicality just practically speaking how do we use this well let's go over here and look at some examples if we want to find this altitude here X all we do is we set up a proportion we say 4 is 2 X as X is 2 9 so the altitude Example 1 Solving for the Altitude okay that's the geometric mean that's these guys these are the means these are the extremes 4 & 9 cross multiply so you get x squared equals 36 and take the square root of both sides and you get x equals 6 so that's going to be the altitude okay this one same thing we have a right triangle we drop an altitude to the hypotenuse to the base here this altitude splits the hypotenuse up into Example 2 Solving for a Portion of the Hypotenuse two pieces axon 16 so we know that all three of these triangles formed are similar so we can set up a proportion so same thing access to 8 as 8 is 216 okay so again you can see the altitude is the mean okay these are the means and these are the extremes so if we cross multiply we get 16 x equals 64 divided by 16 and we get 4 okay last example sometimes what people do is they'll give you this whole length so by taking 29 minus 25 we see that this is 4 okay and let's just verify that this Example 3 works so you can see that 4 is 210 as 10 is 225 100 equals 100 so you can see the altitude here is the geometric mean of the two parts of the hypotenuse that it divides it up into |
2049 | http://www.pressure-drop.com/Online-Calculator/rauh.html | Roughness of pipes
SF Pressure Drop Online-Calculator:
Roughness of pipes
Aluminium, drawn/pressed new 0.0013 - 0.0015 mm
Aluminium, drawn/pressed used to 0.03 mm
Asbestos-cement new, smooth 0.03 - 0.1 mm
Brass, drawn/pressed new 0.0013 - 0.0014 mm
Brass, drawn/pressed used to 0.03 mm
Cast iron average city severage 1.2 mm
Cast iron incrusted to 3.0 mm
Cast iron new, bituminized 0.10 - 0.13 mm
Cast iron new, with skin 0.2 - 0.6 mm
Cast iron operating several years, cleaned 1.5 mm
Cast iron slightly rusty 1.0 - 1.5 mm
Clay new, clay tile 9.0 mm
Clay, Drainage-pipe new, calcined 0.7 mm
Concrete new, medium rough 1.0 - 2.0 mm
Concrete new, rough 2.0 - 3.0 mm
Concrete new, smooth 0.3 - 0.8 mm
Concrete operating several years 0.2 - 0.3 mm
Concrete, Centrifugal-new, smooth plastered 0.1 - 0.15 mm
Concrete, Centrifugal-new, without plaster 0.2 - 0.8 mm
Concrete, Steel-new, smooth 01. - 0.15 mm
Copper, drawn/pressed new 0.0013 - 0.0015 mm
Copper, drawn/pressed used to 0.03 mm
Glass, drawn/pressed new 0.0013 - 0.0015 mm
Glass, drawn/pressed used to 0.03 mm
Plastic, drawn/pressed new 0.0013 - 0.0015 mm
Plastic, drawn/pressed used to 0.03 mm
Rubber new, smoot 0.0016 mm
Steel after long operation cleaned 0.15 - 0.20 mm
Steel homogeneous corrosion pits 0.15 mm
Steel intensely incrusted 2.0 - 4.0 mm
Steel slightly rusty and incrusted 0.15 - 0.40 mm
Steel, longitudinal welded new, bituminized 0.01 - 0.05 mm
Steel, longitudinal welded new, galvanized 0.008 mm
Steel, longitudinal welded new, rolling skin 0.04 - 0.1 mm
Steel, weldless new, comm.size galvanized 0.10 - 0.16 mm
Steel, weldless new, neatly galvanized 0.07 - 0.10 mm
Steel, weldless new, pickled 0.03 - 0.04 mm
Steel, weldless new, rolling skin 0.02 - 0.06 mm
Steel, weldless new, unpickled 0.03 - 0.06 mm
Stoneware 0.25 mm
Wood after long operating 0.1 mm
Wood new 0.2 - 1.0 mm |
2050 | https://uroonkolojibulteni.com/articles/a-rare-side-effect-of-intravesical-bacillus-calmette-guerin-therapy-reactive-arthritis/uob.915 | A Rare Side Effect of Intravesical Bacillus Calmette-Guérin Therapy: Reactive Arthritis - Bulletin of Urooncology
Abstracting and Indexing
Web Site of Urooncology Association
E-ISSN: 2667-4610
About Us
Journal History
Aims and Scope
Abstracting and Indexing
Editorial Board
Recruitment of Editors
Roles and Responsibilities
Editorial Board
Journal Policies
Advertising
Allegations of Misconduct
Appeals and Complaints
Archiving and Preservation
Article Processing Charges (APC)
Artificial Intelligence (AI)
Authorship and Contributorship
Conflicts of Interest
Copyright and Licensing
Data Availability and Reproducibility
Diversity, Equity, Inclusion, and Accessibility (DEIA)
Editorial Oversight
Ethical Misconduct
Open Access
Peer Review Policy
Post Publication Discussions
Research Ethics
Instructions to Authors
Instructions to Authors
Instructions for Reviewers
Ethical Policy
Peer Review Process
Contact Us
A Rare Side Effect of Intravesical Bacillus Calmette-Guérin Therapy: Reactive Arthritis
PDF
Cite
Share
Request
Case Report
VOLUME: 17 ISSUE: 1
P: 33 - 35
March 2018
A Rare Side Effect of Intravesical Bacillus Calmette-Guérin Therapy: Reactive Arthritis
Bull Urooncol 2018;17(1):33-35
DOI: 10.4274/uob.915
Bahattin Kızılgök 1
Volkan İzol 1
Eren Erken 2
Mustafa Zühtü Tansuğ 1
Author Information Copyright & Licence Information Galenos & Bull Urooncol Disclaimer
Çukurova University Faculty of Medicine, Department of Urology, Adana, Turkey
Çukurova University Faculty of Medicine, Department of Internal Diseases, Division of Rheumatology, Adana, Turkey
No information available.
No information available
Received Date: 15.09.2017
Accepted Date: 04.10.2017
Publish Date: 30.03.2018
PDF
Cite
Share
Request
ABSTRACTIntroductionDiscussion
ABSTRACT
Approximately 70-80% of bladder cancers are superficial tumors and not muscle invasive. Complete transurethral resection of the bladder tumour (TUR-BT) is the standard approach to these patients. Intravesical treatments such as adriamycin, doxorubicin, epirubicin, mitomycin-c and Bacillus Calmette-Guérin (BCG) may be performed after TUR-BT in order to prevent further recurrence or progression. BCG is generally used in high-risk patients and causes local or systemic side effects in less than 5% of patients. Osteoarticular side effects are very rare and usually manifest as joint pain and arthritis (%0.5-1). In this case report, we present the management of reactive arthritis in a patient treated with intravesical BCG for bladder cancer.
Keywords:
Intravesical Bacillus Calmette-Guérin, bladder cancer, reactive arthritis
Introduction
Bladder cancer is the seventh most common cancer in males worldwide, and eleventh most common when both genders are considered. It is 3-4 times more common in men than in women, especially after 60 years of age. Histopathologically, more than 90% of bladder cancers are transitional cell carcinomas and 70-80% are muscle non-invasive. Approximately 70% of non-invasive bladder cancers are Ta tumors, 20% are T1 tumors, and 10% are carcinoma in situ (1). The treatment approach in these cases is complete transurethral resection of bladder tumor (TUR-BT). A well-performed TUR-BT allows correct staging and administration of intravesical treatment, which can prevent recurrence or progression (2,3,4). These intravesical treatments include adriamycin, doxorubicin, epirubicin, mitomycin-c, and Bacillus Calmette-Guérin (BCG).
BCG is obtained from an attenuated strain of Mycobacterium bovis(5). Intravesical BCG application, performed since 1976, is believed to have an antitumor effect (5,6,7). Severe local or systemic side effects related to BCG occur in less than 5% of patients. Local side effects include cystitis findings, hematuria, granulomatous prostatitis, and epididymuritis. Systemic side effects may manifest as fever, allergic reaction, sepsis, arthralgia, or arthritis (8,9). Of these adverse systemic effects, osteoarticular involvement is rare, occurring in 1-5% of cases. Osteoarticular side effects usually manifest clinically with joint pain and arthritis (0.5-1%) (10,11). In this case report, we present a patient who developed reactive arthritis after undergoing TUR-BT for non-muscle-invasive bladder cancer and intravesical BCG treatment.
Case Report
Ultrasound examination in a 43-year-old male patient with hematuria revealed a pelvic mass approximately 3 cm in diameter. In cystoscopy, a papillary formation about 3 cm in size was observed on the left sidewall and was resected. Following TUR-BT, T1G3 was identified in histopathological examination and intravesicular BCG therapy was planned. The first instillation was done on postoperative day 18. After the fifth instillation, the patient developed complaints of fever (38.2 °C), fatigue, and pain, redness, and tenderness in his right big toe. The following day he developed pain in the right knee and shoulder joints and was readmitted to the hospital. After consultation with the rheumatology department, laboratory analysis of complete blood count, acute phase reactants, complete urinalysis, urine culture, and serological markers was requested. Complete blood count revealed leukocytosis (white blood cell count: 14.2x10 3/µL), acute phase reactants were elevated (C-reactive protein: 15.7 mg/dL), and erythrocyte sedimentation rate was 18 mm/L. Urinalysis and urine culture were normal. Serologic examination was negative for rheumatoid factor negative and positive for human leukocyte antigen (HLA)-B27. Anteroposterior X-rays of the right foot and knee were taken. X-ray to investigate the cause of swelling in the knee revealed no evidence other than edema in the soft tissue (Figure 1). The orthopedics and traumatology department was consulted and magnetic resonance imaging (MRI) of the right knee joint was requested. MRI of the right knee joint revealed fluid accumulation around the medial and collateral ligaments. Samples of the fluid were obtained under sterile conditions. On microscopic examination, 10-12 leukocytes were observed in each field. Cultures of the fluid were negative. Therefore, a diagnosis of septic arthritis was excluded.
Reactive arthritis secondary to intravesical BCG treatment was suspected due to fever, oligoarthritis, and HLA-B27 positivity. The patient was treated with prednisolone (32 mg/day for 7 days, followed by 24 mg/day), betamethasone (once a week), and diclofenac sodium. Steroid therapy was tapered and discontinued after 3 months, and the patient’s complaints resolved completely (Figure 2).
The patient provided informed consent for his case to be presented in this report.
Discussion
Osteoarticular side effects rarely develop due to intravesical BCG therapy. In a 2006 review, Tinazzi et al. (6) screened 48 articles and classified 61 autoimmune complications developed after intravesical BCG treatment. They reported that 64% of the patients developed joint pain and arthritis, 24% had Reiter’s syndrome, 4% had arthritis and fever, 2% had psoriatic arthritis, and 2% had Sjogren’s syndrome.
Reactive arthritis secondary to intravesical BCG treatment is usually seen in the fifth and sixth decades. It typically occurs after the fourth or fifth instillation. Onset occurred after the fifth instillation in our case. It is characterized by asymmetric oligoarticular involvement. The most commonly involved joints are the knee, wrist, and ankle. In addition to arthritis, patients may exhibit dactylitis, urethritis, and uveitis (7,12,13,14). Elevated acute phase reactants, inflammatory response in the synovial fluid, and negative mycobacterial cultures of synovial fluid are expected findings of laboratory studies. Other findings should raise suspicion of septic arthritis. Blood and urine analyses negative for infection support a diagnosis of reactive arthritis (7,9,11). We suspected reactive arthritis in our case due to the asymmetric articular involvement as well as the patient’s high acute phase reactants levels and our findings of 10-12 leukocytes/field and negative cultures of fluid obtained from the knee.
The mechanism by which reactive arthritis develops secondary to intravesical BCG therapy is not yet clear. In a case report published in 2002, Pardalidis et al. (15) claimed that mycobacterial heat shock protein 65 shared similar homology to human cartilage tissue, and suggested that this may cause cross-reaction and increase cytokine production. The increase in cytokine release activates CD8+ T cells, and cellular immunity may lead to tissue damage (15). This autoimmune response is more common after intravesical BCG treatment in individuals who are positive for HLA-B27 and B7 (6). About 60% of patients are HLA-B27 positive, as was our patient.
Reactive arthritis secondary to intravesical BCG therapy resolves with treatment in most cases. The condition may become chronic in small proportion of patients, but they can be treated with non-steroidal anti-inflammatory drugs (NSAIDs) and corticosteroids either alone or in combination, and if necessary, immunosuppressive treatments such as methotrexate can be used (6,7).
Antituberculous therapy may also be needed in some patients who do not respond to treatment (7). The condition resolved in our patient after a successful three months of treatment with combined corticosteroid and NSAID.
Reactive arthritis is a rare side effect of intravesical BCG therapy. Despite the low incidence of osteoarticular side effects, it should be remembered that such reactions are more likely to occur in HLA-B27 and HLA-B7 positive patients.
In the event of osteoarticular side effects, the patient should be evaluated in collaboration with relevant departments, particularly rheumatology, to determine whether the clinical presentation is inflammatory in nature, to rule out septic arthritis, and to initiate treatment as early as possible.
Ethics
Informed Consent: It was taken.
Peer-review: Internally peer-reviewed.
Authorship Contributions
Surgical and Medical Practices: V.İ., Concept: B.K., V.İ., Design: B.K., Data Collection or Processing: B.K., Analysis or Interpretation: M.Z.T., E.E., Literature Search: B.K., Writing: B.K.
Conflict of Interest:No conflict of interest was declared by the authors.
Financial Disclosure:The authors declared that this study received no financial support.
About US
Aims and Scope
Editorial Board
Instructions to Authors
Contact Us
2024 ©️ Galenos Publishing House |
2051 | https://www.khanacademy.org/science/ka-chemistry-grade-12/xde7d06e720e32944:electrochemistry | Use of cookies
Cookies are small files placed on your device that collect information when you use Khan Academy. Strictly necessary cookies are used to make our site work and are required. Other types of cookies are used to improve your experience, to analyze how Khan Academy is used, and to market our service. You can allow or disallow these other cookies by checking or unchecking the boxes below. You can learn more in our cookie policy
Privacy Preference Center
When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
More information
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
Certain cookies and other technologies are essential in order to enable our Service to provide the features you have requested, such as making it possible for you to access our product and information related to your account.
For example, each time you log into our Service, a Strictly Necessary Cookie authenticates that it is you logging in and allows you to use the Service without having to re-enter your password when you visit a new page or new unit during your browsing session.
Functional Cookies
These cookies provide you with a more tailored experience and allow you to make certain selections on our Service. For example, these cookies store information such as your preferred language and website preferences.
Targeting Cookies
These cookies are used on a limited basis, only on pages directed to adults (teachers, donors, or parents). We use these cookies to inform our own digital marketing and help us connect with people who are interested in our Service and our mission.
We do not use cookies to serve third party ads on our Service.
Performance Cookies
These cookies and other technologies allow us to understand how you interact with our Service (e.g., how often you use our Service, where you are accessing the Service from and the content that you’re interacting with). Analytic cookies enable us to support and improve how our Service operates.
For example, we use Google Analytics cookies to help us measure traffic and usage trends for the Service, and to understand more about the demographics of our users.
We also may use web beacons to gauge the effectiveness of certain communications and the effectiveness of our marketing campaigns via HTML emails.
Cookie List
Consent Leg.Interest
label
label
label |
2052 | https://www.cliffsnotes.com/study-notes/21062878 | Epidemiology-exam-practice-questions (pdf) - CliffsNotes
Lit NotesStudy GuidesDocumentsQ&AAsk AI
Chat PDF
Log InSign Up
Literature NotesStudy GuidesDocumentsHomework QuestionsChat PDFLog InSign Up
Epidemiology-exam-practice-questions
.pdf
School
University of GuelphWe aren't endorsed by this school
Course
POPM 4040
Subject
Health Science
Date
Oct 15, 2024
Pages
19
Uploaded by NickPetro16
Download
Helpful Unhelpful
Download
Helpful Unhelpful
Home/
Health Science
This is a preview
Want to read all 19 pages? Go Premium today.
View Full Document
Already Premium? Sign in here
Epidemiology Exam Practice Questions Epidemiology F (University of Guelph) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or university Epidemiology Exam Practice Questions Epidemiology F (University of Guelph) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or university Downloaded by Nicholas Petruzella (nicholas.petruzella@gmail.com)lOMoARcPSD|12497200
Practice Exam 1)On August 12 th, Paolo is bitten by a mosquito and infected with the Zika virus. Five days later (August 17 th ), he would test positive for the virus using a serum IgM antibody test. Ten days after that (August 27 th), Paolo begins to feel ill (fever, chills, muscle soreness). Fifteen days later (September 11 th ), Paolo feels healthy again, but will still test positive for the antibody for another 100 days. What is the incubation period of Zika? a.5 days b.15 days c.30 days d.130 days 2)You want to randomly sample 20 cows from a herd of 800. You decide to line the animals up and send them through a chute into another paddock, and you select every 40 th cow for your study. What type of sampling is this? a.Systematic random sampling b.Simple random sampling c.Multi-stage sampling d.Cluster sampling 3)Wealth is negatively associated with obesity in Mexico City. Which of the following about the association between wealth and obesity is true? a.OR>0 b.RD>1 c.RR<1 d.PAR>0 4)The Black Death was an outbreak of bubonic plague from 1346-53 that originated in Central Asia, then travelled along the Silk Road to Crimea and the rest of Europe. It killed an estimated 75 to 200 million people. Which of the following disease patterns best describes the Black Death? a.Endemic b.Epidemic c.Sporadic d.Pandemic 5)Which of the following accurately describes the difference between the terms "infected" and "diseased"? a.Malaria is an infection but not a disease b.A person whose blood contains the malaria protozoa is infected, whereas someone displaying clinical symptoms of malaria is diseased c."Infected" and "diseased" are synonyms d.People with the zombie virus in The Walking Dead are diseased, and when they are reanimated as zombies they are infected 6)Which of the following is the WHO definition of health? a.A state of complete physical, mental, and social well-being, and not merely the absence of disease or infirmity b.The lack of derangement in the function of the whole body of the host or any of its part c.The lack of physiological/psychological disfunction Downloaded by Nicholas Petruzella (nicholas.petruzella@gmail.com)lOMoARcPSD|12497200
Why is this page out of focus?
Because this is a premium document. Subscribe to unlock this document and more.
d.A state of physical well-being, including the absence of infection or illness 7)Who discovered that scurvy is caused by vitamin C deficiency based on randomized trials with British seamen? a.James Lind b.Percival Pott c.John Snow d.Cathy Bauman 8)HIV is of particular concern for pregnant women, who can pass the virus to their unborn children. What is this an example of? a.Vector-borne disease b.Vertical transmission of disease c.Indirect transmission of disease d.Horizontal transmission of disease 9)West Nile virus originates in birds, is picked up by mosquitoes, and is transported to humans, who are infected when the mosquito bites them. What are the bird, mosquito, and human (respectively) in this scenario? a.Disease pool, fomite, host b.Environment, agent, host c.Reservoir, vector, host d.Disease, indirect contact, infected 10) Donald Trump was just elected president of the US, but most polls predicted otherwise. Some experts believe that this is due to pollsters disproportionately sampling people from cities (and ignoring rural areas), where populations were more likely to support Hillary Clinton. What type of bias is this? a.Confounding bias b.Selection bias c.Nonresponse bias d.Misclassification bias 11) Joe Biden was just elected president of the US, but the margin was much narrower than the polls predicted. Some experts believe this is due to Trump supporters being more likely to refuse to disclose their voting intentions (refused to disclose who they would for or if they were going to vote)to pollsters. What type of bias is this? a.Confounding bias b.Selection bias c.Information bias d.Reporting bias Downloaded by Nicholas Petruzella (nicholas.petruzella@gmail.com)lOMoARcPSD|12497200
Why is this page out of focus?
Because this is a premium document. Subscribe to unlock this document and more.
12) Donald Trump was just elected president of the US, but most polls predicted otherwise. You are a political analyst and you're trying to determine how rural vs. urban households responded to polls. You conclude that rural voters are more likely to lie to pollsters and tell them they were going to vote for Clinton, when in fact they voted for Trump (compared to urban voters). What type of bias would this lead to? a.Confounding bias b.Differential misclassification bias c.Non-differential misclassification bias d.Selection bias 13) You are an epidemiologist who is tired of questions about the US election, so you decide to conduct a study the association between physical activity and cardiovascular disease. Your supervisor tells you to stratify your analysis based on age. Why would he tell you this? a.Older people are less likely to respond to surveys (nonresponse bias) b.Young people are more likely to lie about physical activity (misclassification bias) c.Age is likely associated with both cardiovascular disease and physical activity and may affect the association of interest (confounding bias) d.Older people have a higher mortality rate than younger people (healthy worker effect) 14) Herpes simplex virus is present in about 75% of the adult population. It is generally asymptomatic, but when combined with stress, lowered immune function (e.g. during infection with flu or cold), or exposure to sunlight, it can cause cold sores to form on the lips and mouth. Herpes cold sores cannot occur in the absence of the virus. Herpes simplex virus is therefore: a.Sufficient cause b.Necessary cause and sufficient cause c.Necessary cause but not sufficient cause d.Neither necessary cause nor sufficient cause 15) There are three sufficient causes of a disease: Sufficient cause Component cause A (P=present, N=not present)Component cause B (P=present, N=not present)Componen t cause C (P=present,N=not present)Component cause D (P=present, N=not present) PAF Sufficient cause #1 P N P P 30% Sufficient cause #2 P P P N 35% Sufficient cause #3 P P N P 35% What proportion of this disease (in the general population) could you remove if you eliminated component cause A? a.30% b.60% c.65% Downloaded by Nicholas Petruzella (nicholas.petruzella@gmail.com)lOMoARcPSD|12497200
Why is this page out of focus?
Because this is a premium document. Subscribe to unlock this document and more.
d.100% 16) You are testing the effectiveness of a new, relatively inexpensive diagnostic test for Lyme disease. You test 1000 people. The actual prevalence of Lyme disease among the study group is 100. The apparent prevalence using the new test is 132, of which 83 have been previously diagnosed with Lyme disease (and thus actually have it). Seventeen people who have Lyme disease test negative on the new diagnostic test. What are the sensitivity and specificity of the new test? a.1.69 and 0.02 b.0.83 and 0.95 c.0.63 and 0.98 d.0.13 and 0.1 Disease +-Totals Test+ - Totals 17) You are testing the effectiveness of a new diagnostic test for prostate cancer. Here are the results of your analysis: Gold Standard +-Totals New Test+92 15 - Totals 120 1300 What is the PPV of the above test? a.86% b.76.7% c.9.2% d.8.2% 18) Is the above test better at ruling in or ruling out a disease? a.Ruling out b.Ruling in c.It's the same at both d.It's impossible to know 19) What is the apparent prevalence of prostate cancer among the study population (using the new test)? a.8.2% b.76.7% c.7.1% d.9.2% Downloaded by Nicholas Petruzella (nicholas.petruzella@gmail.com)lOMoARcPSD|12497200
Why is this page out of focus?
Because this is a premium document. Subscribe to unlock this document and more.
20) You are in charge of a screening program for breast cancer, which is easy and inexpensive to treat, but may be fatal if not diagnosed early. You have access to existing hospital databases, and you can use up to two diagnostic tests on anyone selected for screening. Which of the following screening protocols would you suggest? a.Passive surveillance b.A protocol involving parallel testing c.A protocol involving series testing d.Use whichever test has highest sensitivity 21) You are screening an at-risk Aboriginal population for mercury poisoning following a mining disaster on the Athabasca River. You have two tests: One is a symptoms check- list, is not invasive, and has a sensitivity of 0.8 and a specificity of 0.7. The other is a blood test, which is invasive, but has a sensitivity of 0.95 and a specificity of 0.9. Since the treatment for mercury poisoning is invasive and expensive, you decide to use the tests in series on 5000 people. What is the net sensitivity of the protocol? Note that 1000 people actually have mercury poisoning. a.0.97 b.0.83 c.0.76 d.0.8 Mercury Poison +-Totals Symptoms+ - Totals Mercury Poison +-Totals Blood Test+ - Totals 22) Which of the following is true about parallel testing? a.Only those who test positive on one test are subjected to the next test b.Only those subjects that test positive on both tests are considered outcome positive c.Parallel testing implements the same test multiple times d.Parallel testing increases net sensitivity e.Parallel testing increases net specificity Downloaded by Nicholas Petruzella (nicholas.petruzella@gmail.com)lOMoARcPSD|12497200
Why is this page out of focus?
Because this is a premium document. Subscribe to unlock this document and more.
Page 1 of 19
Students also studied
W01 Syllabus Quiz_ Steps for Success_ Epidemiology.pdf 1/8/24, 9:33 AM W01 Syllabus Quiz: Steps for Success: Epidemiology W01 Syllabus Quiz: Steps for Success Due Jan 13 at 11:59pm Points 15 Questions 15 Available Jan 8 at 12am - Jan 13 at 11:59pm Time Limit None Instructions To succeed in this class, it is e Brigham Young University, Idaho ECON 370
RCIS Exam Practice Questions and Answers 2023 Graded A.docx RCIS Exam Practice Questions and Answers 2023 Graded A What is the formula for calculating cardiac output? a. CO= PA- 1SVC b. CO= AO x PA c. CO= HR x SV Ans- c. CO= HR x SV Stoke Volume is _? a. Related to preload b. Related to afterload c. The same as ej Romanian-American University ACC MISC
9-2 Textbook Questions.docx Aja Burns 9-2 Textbook Questions: Chapter 9 IHP-515-Q4466 Population-Based Epidemiology 24TW4 Southern New Hampshire University 1. Calculate the etiologic fraction when the RR for disease associated with a given exposure is Etiologic Fraction: (RR-1) RR ( Southern New Hampshire University PHE 690
Fundamentals of Epi 2025 Spring Homework 3.pdf Fundamentals of Epidemiology, 280.350, Spring 2025 Homework Assignment 3 Johns Hopkins University Fundamentals of Epidemiology 280.350 Spring 2025 Homework Assignment 3 1. 2. A case-control study was designed to determine if coffee drinking (exposed: >3 c Johns Hopkins University AS.280 280.350
Principles Of Epidemiology.pdf Principles of epidemiology Principles of epidemiology Topic 1: Overview of Epidemiology Objectives: 1. 2. 3. 4. Discuss historically significant epidemiological advances. Evaluate the three types of prevention used in public health interventions. Explore Galen College of Nursing NSG 410
Study Guide #5 (1).doc Course: PH 2000 Assignment: Study Guide #5, Chapter 5 & Quiz #2 Due: See syllabus for due date Instructions: For this assignment, read Chapter #5 of your textbook, refer to the glossary when necessary, and answer the following questions as a way of taking Appalachian State University PH 2000
Study your doc or PDF
Upload your materials to get instant AI help
Try for free
Students also studied
W01 Syllabus Quiz_ Steps for Success_ Epidemiology.pdf 1/8/24, 9:33 AM W01 Syllabus Quiz: Steps for Success: Epidemiology W01 Syllabus Quiz: Steps for Success Due Jan 13 at 11:59pm Points 15 Questions 15 Available Jan 8 at 12am - Jan 13 at 11:59pm Time Limit None Instructions To succeed in this class, it is e Brigham Young University, Idaho ECON 370 RCIS Exam Practice Questions and Answers 2023 Graded A.docx RCIS Exam Practice Questions and Answers 2023 Graded A What is the formula for calculating cardiac output? a. CO= PA- 1SVC b. CO= AO x PA c. CO= HR x SV Ans- c. CO= HR x SV Stoke Volume is _? a. Related to preload b. Related to afterload c. The same as ej Romanian-American University ACC MISC 9-2 Textbook Questions.docx Aja Burns 9-2 Textbook Questions: Chapter 9 IHP-515-Q4466 Population-Based Epidemiology 24TW4 Southern New Hampshire University 1. Calculate the etiologic fraction when the RR for disease associated with a given exposure is Etiologic Fraction: (RR-1) RR ( Southern New Hampshire University PHE 690 Fundamentals of Epi 2025 Spring Homework 3.pdf Fundamentals of Epidemiology, 280.350, Spring 2025 Homework Assignment 3 Johns Hopkins University Fundamentals of Epidemiology 280.350 Spring 2025 Homework Assignment 3 1. 2. A case-control study was designed to determine if coffee drinking (exposed: >3 c Johns Hopkins University AS.280 280.350 Principles Of Epidemiology.pdf Principles of epidemiology Principles of epidemiology Topic 1: Overview of Epidemiology Objectives: 1. 2. 3. 4. Discuss historically significant epidemiological advances. Evaluate the three types of prevention used in public health interventions. Explore Galen College of Nursing NSG 410 Study Guide #5 (1).doc Course: PH 2000 Assignment: Study Guide #5, Chapter 5 & Quiz #2 Due: See syllabus for due date Instructions: For this assignment, read Chapter #5 of your textbook, refer to the glossary when necessary, and answer the following questions as a way of taking Appalachian State University PH 2000
Other related materials
Data_Analysis_Cholesterol_Data_Submission.pdf Data Analysis Lab Instructions You will be using Microsoft Excel to complete this assignment. We would recommend watching the following Excel tutorial videos before you begin: ● #1 Getting Started; #1 Getting Started transcript ● #2 Finding Stuff and Gett Arizona State University BIO 181 c2c80dbdfa0df9de29ddffaee969daf23d2cbef8.pdf PRACTICE QUESTIONS GENETICS AND EVOLUTION MULTIPLE CHOICE QUESTIONS 1. Assisting others with the expectation that they return the favour is known as... A. B. C. D. E. Cheating Altruism Selfishness Reciprocal Cooperation Inclusive Fitness 2. What is a Chromo Simon Fraser University CRIM 104 chapter4hwblankfall2022updated (1).docx BNAD 277 HW Assignment 4 - Fall 2022 Scenario 1 Use the scenario described below to answer the following questions. A realty company in Phoenix, Arizona is interested in analyzing how the square footage (Sqft), number of bedrooms (Bedrooms), number of bat University Of Arizona BNAD 277 enzyme_bio_test.pdf enzyme bio test Name: 1. Date: The major function of digestive enzymes is the A. regulation of the rate of chemical reactions B. transport of substances within organisms C. synthesis of cell walls and membranes 3. The graph shown represents the relationsh Freeland Middle School/high School BIOLOGY 101 Understanding the Daubert Standard in Forensic Evidence Applying the Daubert Standard to Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 01 Introduction One legal standard that is key to forensics and too often overlooked in forensic books is the Daubert standard. Th National University College FORENSICS 643 BIOL380 2021 Final Key.pdf 2021 Final Exam 1. NO LATE WORK WILL BE ACCEPTED. Therefore, you should be sure to click the "Save Answer" button after completing each question. (You can always go back and update your answer.) This will also protect you in case of a network interruption Brown University BIOL 380
You might also like
Week 4.docx Comment: Why do we need to evaluate what we do in education? How do we do it most effectively? It is especially important that we evaluate what we do in education, because we work with the minds and lives of children. We need to ensure that what we do and Humble High School MANA MISC Case Study 5.6.docx 5.6 Delinquent Medical Records 1. Recommend a minimum of four options that could be implemented easily and have a positive impact on the record completion process. ● Create and implement a deficiency slip that identifies the pertinent documentation and wh Lakeland Community College HIMT 1100 FNH 160 Syllabus Sept 2024-1.pdf N THE UNIVERSITY OF BRITISH COLUMBIA Food, Nutrition and Health (FNH) Program Faculty of Land and Food Systems FNH 160: INTEGRATED PHYSIOLOGY FOR HUMAN NUTRITION I (3 credits) ACKNOWLEDGMENT: UBC's Point Grey Campus is located on the ancestral and unceded University of British Columbia FNH_V 160 Psy 211 Module 8 Discussion Post.docx According to Dr. Rebecca Levy, referenced in the article, how do aging selfstereotypes form? Dr. Rebecca Levy states that according to her own research she has discovered that aging selfstereotypes start in childhood, and you are stuck on having these st Southern New Hampshire University PSY 211 Quantitative Methods in Public Health.pdf PH717 Module 1B - Descriptive Tools Descriptive Epidemiology & Descriptive Statistics Introduction Disease surveillance systems and health data sources provide the raw information necessary to monitor trends in health and disease. Descriptive epidemiology University of Texas, Health Science Center at San Antonio PUBLIC HEA 6002 Study guide Exam 2(1).docx Pharmacology NSG 205 Exam 2 study guide NOTE: This is not an inclusive list of topics for Exam 1. This can be used as a guide to assist with exam preparation. Respiratory/TB 1. What mechanisms come into play in Asthma and COPD?(THE MECHANISMS FOR ASMA ARE CUNY College of Staten Island BIO 382
You might also like
Week 4.docx Comment: Why do we need to evaluate what we do in education? How do we do it most effectively? It is especially important that we evaluate what we do in education, because we work with the minds and lives of children. We need to ensure that what we do and Humble High School MANA MISC Case Study 5.6.docx 5.6 Delinquent Medical Records 1. Recommend a minimum of four options that could be implemented easily and have a positive impact on the record completion process. ● Create and implement a deficiency slip that identifies the pertinent documentation and wh Lakeland Community College HIMT 1100 FNH 160 Syllabus Sept 2024-1.pdf N THE UNIVERSITY OF BRITISH COLUMBIA Food, Nutrition and Health (FNH) Program Faculty of Land and Food Systems FNH 160: INTEGRATED PHYSIOLOGY FOR HUMAN NUTRITION I (3 credits) ACKNOWLEDGMENT: UBC's Point Grey Campus is located on the ancestral and unceded University of British Columbia FNH_V 160 Psy 211 Module 8 Discussion Post.docx According to Dr. Rebecca Levy, referenced in the article, how do aging selfstereotypes form? Dr. Rebecca Levy states that according to her own research she has discovered that aging selfstereotypes start in childhood, and you are stuck on having these st Southern New Hampshire University PSY 211 Quantitative Methods in Public Health.pdf PH717 Module 1B - Descriptive Tools Descriptive Epidemiology & Descriptive Statistics Introduction Disease surveillance systems and health data sources provide the raw information necessary to monitor trends in health and disease. Descriptive epidemiology University of Texas, Health Science Center at San Antonio PUBLIC HEA 6002 Study guide Exam 2(1).docx Pharmacology NSG 205 Exam 2 study guide NOTE: This is not an inclusive list of topics for Exam 1. This can be used as a guide to assist with exam preparation. Respiratory/TB 1. What mechanisms come into play in Asthma and COPD?(THE MECHANISMS FOR ASMA ARE CUNY College of Staten Island BIO 382
CliffsNotes study guides are written by real teachers and professors, so no matter what you're studying, CliffsNotes can ease your homework headaches and help you score high on exams.
Quick Links
Literature NotesStudy GuidesDocumentsHomework Questions
Company
About CliffsNotesContact us Do Not Sell My Personal Information
Legal
Service TermsPrivacy policyCopyright, Community Guidelines & other legal resourcesHonor CodeDisclaimer
CliffsNotes, a Learneo, Inc. business
© Learneo, Inc. 2025
AI homework help Explanations instantly
Do Not Sell or Share My Personal Information
When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.
More information
Allow All
Manage Consent Preferences
Essential Cookies
Always Active
Essential Cookies are required for providing you with features or services that you have requested. For example, certain Cookies enable you to log into secure areas of our Services.
Share or Sale of Personal Data
Always Active
Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link.
If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.
Advertising Cookies
Always Active
Advertising Cookies collect data about your online activity and identify your interests so that we can provide advertising that we believe is relevant to you. Advertising Cookies may include Retargeting Cookies.
Analytics Cookies
Always Active
Analytics Cookies allow us to understand how visitors use our Services. They do this by collecting information about the number of visitors to the Services, what pages visitors view on our Services and how long visitors are viewing pages on the Services. Analytics Cookies also help us measure the performance of our advertising campaigns in order to help us improve our campaigns and the Services’ content for those who engage with our advertising.
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Confirm My Choices |
2053 | https://hellothinkster.com/math-tutor/fractions/what-is-0.4-as-a-fraction | These coaching plans come with a learning guarantee and two tutors - a dedicated math coach for 1:1 live tutoring & an expert AI Learning Lab coach). Get access to world-class curriculum, homework help, and continuous personalization. Designed to make your child math confident for life!
Our high school live tutoring packs match students with a dedicated math tutor for help with school topics, test prep, and homework help.
Book a call to find out all the ways we can help your child! Book Call
Math Tutor Explains: What is 0.4 as a fraction?
Numbers can be represented in various forms, including decimals, percentages, and fractions. With guidance from a math tutor, mastering these conversions becomes even easier. In this article, we’ll show you how to convert a decimal to a fraction, helping you build confidence and accuracy in your math skills!
Math Tutor's Solution: 0.4 as a fraction is 2/5
Converting 0.4 to a fraction, Step-by-Step from a Math Tutor
Step 1:
The first step to converting 0.4 to a fraction is to re-write 0.4 in the form p/q where p and q are both positive integers. To start with, 0.4 can be written as simply 0.4/1 to technically be written as a fraction.
Step 2:
Next, we will count the number of fractional digits after the decimal point in 0.4, which in this case is 1. For however many digits after the decimal point there are, we will multiply the numerator and denominator of 0.4/1 each by 10 to the power of that many digits. For instance, for 0.45, there are 2 fractional digits so we would multiply by 100; or for 0.324, since there are 3 fractional digits, we would multiply by 1000. So, in this case, we will multiply the numerator and denominator of 0.4/1 each by 10:
0.4×101×10=410\frac{0.4 × 10}{1 × 10} = \frac{4}{10}1×100.4×10=104
Step 3:
Now the last step is to simplify the fraction (if possible) by finding similar factors and cancelling them out, which leads to the following answer:
410=25\frac{4}{10} = \frac{2}{5}104=52
Math Tutor Suggests: Try to Convert Other Values to Fractions
Become a pro at converting decimals or percentages to fractions by exploring some examples from our math tutors, like the ones below:
What is 88.51 as a fraction?
What is 701.7 as a fraction?
What is 668.5 as a fraction?
What is 32.82 as a fraction?
What is 6.258 as a fraction?
Download FREE Math Resources
Take advantage of our free downloadable resources and study materials for at-home learning.
8 Math Hacks and Tricks to Turn Your ‘Okay’ Math Student Into a Math Champion!
One thing we teach our students at Thinkster is that there are multiple ways to solve a math problem. This helps our students learn to think flexibly and non-linearly.
How to Make Sure Your Child is Highly Successful and Becomes a Millionaire
As a parent, you hope your child is extremely successful and likely become the next Gates, Zuckerberg, or Meg Whitman. To set your child on the right path, there are many skills and traits that you can start building and nurturing now. Doing so plants the seeds for future success.
Want to Prepare for Success and Boost Math Skills?
Access even more math problems! Grab your FREE copy of "10 Critical Thinking Math Questions for Grades K - Geometry." Equip your child with the knowledge of how to solve must-know questions from every grade.
Math Tutoring to Boost Your Child’s Math Skills & Scores by 90% in Just 3 Months – Guaranteed!
Does your child struggle with math homework or understanding tricky math concepts? Do they do okay in math, but express excitement to learn new material or advanced math?
A Thinkster Math tutor provides one-to-one support to help elementary, middle school, and high school students build confidence and master math subjects like K-8 math, pre-algebra, algebra, geometry, calculus, and more.
Our expert math tutors customize math lessons to your child’s unique needs, making learning math fun and effective. We help students improve grades, develop strong critical thinking skills through solving word problems, excel in standardized tests, and develop strong problem-solving skills.
Our expert math tutors are ready to help make your child a champion and develop strong math mastery! Sign up for our 7-day free trial and get the best math tutor for your child today! |
2054 | https://en.wikipedia.org/wiki/Parabola_(disambiguation) | Parabola (disambiguation) - Wikipedia
Jump to content
[x] Main menu
Main menu
move to sidebar hide
Navigation
Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Contribute
Help
Learn to edit
Community portal
Recent changes
Upload file
Special pages
Search
Search
[x] Appearance
Appearance
move to sidebar hide
Text
Small Standard Large
This page always uses small font size
Width
Standard Wide
The content is as wide as possible for your browser window.
Color (beta)
Automatic Light Dark
This page is always in light mode.
Donate
Create account
Log in
[x] Personal tools
Donate
Create account
Log in
Pages for logged out editors learn more
Contributions
Talk
[x] Toggle the table of contents
Contents
move to sidebar hide
(Top)
1 Arches
2 Music
3 Other uses
4 See also
Parabola (disambiguation)
[x] 10 languages
Čeština
Euskara
Français
Italiano
Latina
Magyar
Oʻzbekcha / ўзбекча
Polski
Slovenčina
Slovenščina
Edit links
Article
Talk
[x] English
Read
Edit
View history
[x] Tools
Tools
move to sidebar hide
Actions
Read
Edit
View history
General
What links here
Related changes
Upload file
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Edit interlanguage links
Print/export
Download as PDF
Printable version
In other projects
Wikimedia Commons
Wikidata item
From Wikipedia, the free encyclopedia
Look up parabola, parábola, paràbola, or parabolă in Wiktionary, the free dictionary.
Look up parabole, parabolé, or parabolë in Wiktionary, the free dictionary.
A parabola is a mathematical curve.
Parabola or Parabole may also refer to:
Arches
[edit]
Parabolic arch
Music
[edit]
Parabola (album), an album by Gil Evans
"Parabola" (song), a song by Tool
"Parabola", a song by Jawbreaker from Bivouac
Other uses
[edit]
Parabola (magazine), a magazine published by The Society for the Study of Myth and Tradition
Parabola (moth), a genus of moth
Parabola (operating system), a GNU/Linux-libre distribution
Parabola Allegory, a Rosicrucian allegory attributed to Hinricus Madathanus
See also
[edit]
Parable
Parabola of safety
Topics referred to by the same term
This disambiguation page lists articles associated with the title Parabola.
If an internal link led you here, you may wish to change the link to point directly to the intended article.
Retrieved from "
Category:
Disambiguation pages
Hidden categories:
Short description is different from Wikidata
All article disambiguation pages
All disambiguation pages
This page was last edited on 23 May 2022, at 05:08(UTC).
Text is available under the Creative Commons Attribution-ShareAlike 4.0 License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
Privacy policy
About Wikipedia
Disclaimers
Contact Wikipedia
Code of Conduct
Developers
Statistics
Cookie statement
Mobile view
Edit preview settings
Search
Search
[x] Toggle the table of contents
Parabola (disambiguation)
10 languagesAdd topic |
2055 | https://artofproblemsolving.com/wiki/index.php/Coordinate_system?srsltid=AfmBOorbDJcIYxr_0MKgZ5Lk-bYPoUHehdU7zxwb2N2cxRl2Ugsa2j8c | Art of Problem Solving
Coordinate system - AoPS Wiki
Art of Problem Solving
AoPS Online
Math texts, online classes, and more
for students in grades 5-12.
Visit AoPS Online ‚
Books for Grades 5-12Online Courses
Beast Academy
Engaging math books and online learning
for students ages 6-13.
Visit Beast Academy ‚
Books for Ages 6-13Beast Academy Online
AoPS Academy
Small live classes for advanced math
and language arts learners in grades 2-12.
Visit AoPS Academy ‚
Find a Physical CampusVisit the Virtual Campus
Sign In
Register
online school
Class ScheduleRecommendationsOlympiad CoursesFree Sessions
books tore
AoPS CurriculumBeast AcademyOnline BooksRecommendationsOther Books & GearAll ProductsGift Certificates
community
ForumsContestsSearchHelp
resources
math training & toolsAlcumusVideosFor the Win!MATHCOUNTS TrainerAoPS Practice ContestsAoPS WikiLaTeX TeXeRMIT PRIMES/CrowdMathKeep LearningAll Ten
contests on aopsPractice Math ContestsUSABO
newsAoPS BlogWebinars
view all 0
Sign In
Register
AoPS Wiki
ResourcesAops Wiki Coordinate system
Page
ArticleDiscussionView sourceHistory
Toolbox
Recent changesRandom pageHelpWhat links hereSpecial pages
Search
Coordinate system
The coordinate system is often used in geometry. The plane determined by a horizontal number line, called the x-axis, and a vertical number line, called the y-axis, intersecting at a point called the origin. Each point in the coordinate plane can be specified by an ordered pair of numbers, (x,y). The cordinate system is organized to 4 quadrants. In the first quadrant, both (x,y) are positive. In the second quadrant x is negative, while y is positive.In the third quadrant, both (x,y) are negative. Finally, in the fourth quadrant x is positive while y is negative. To find the slope of a line on the coordinate system with points we need to compute . The slope is usually expressed as . Also, there is the point-slope form which states for some real numbers b,x,y. Also, if two lines are perpendicular, then product of the slopes is -1. (For example, the slope could be -3/4 and 4/3.) The coordinate system is also widely useful were right triangle, since there is 90 degrees.
Related: Cartesian coordinate system Wikipedia: A Cartesian coordinate system is a coordinate system that specifies each point uniquely in a plane by a pair of numerical coordinates, which are the signed distances to the point from two fixed perpendicular directed lines, measured in the same unit of length. Each reference line is called a coordinate axis or just axis of the system, and the point where they meet is its origin, usually at ordered pair (0, 0). The coordinates can also be defined as the positions of the perpendicular projections of the point onto the two axes, expressed as signed distances from the origin.
One can use the same principle to specify the position of any point in three-dimensional space by three Cartesian coordinates, its signed distances to three mutually perpendicular planes (or, equivalently, by its perpendicular projection onto three mutually perpendicular lines). In general, n Cartesian coordinates (an element of real n-space) specify the point in an n-dimensional Euclidean space for any dimension n. These coordinates are equal, up to sign, to distances from the point to n mutually perpendicular hyperplanes.
Cartesian coordinate system with a circle of radius 2 centered at the origin marked in red. The equation of a circle is (x − a)2 + (y − b)2 = r2 where a and b are the coordinates of the center (a, b) and r is the radius. The invention of Cartesian coordinates in the 17th century by René Descartes (Latinized name: Cartesius) revolutionized mathematics by providing the first systematic link between Euclidean geometry and algebra. Using the Cartesian coordinate system, geometric shapes (such as curves) can be described by Cartesian equations: algebraic equations involving the coordinates of the points lying on the shape. For example, a circle of radius 2, centered at the origin of the plane, may be described as the set of all points whose coordinates x and y satisfy the equation x2 + y2 = 4.
Cartesian coordinates are the foundation of analytic geometry, and provide enlightening geometric interpretations for many other branches of mathematics, such as linear algebra, complex analysis, differential geometry, multivariate calculus, group theory and more. A familiar example is the concept of the graph of a function. Cartesian coordinates are also essential tools for most applied disciplines that deal with geometry, including astronomy, physics, engineering and many more. They are the most common coordinate system used in computer graphics, computer-aided geometric design and other geometry-related data processing
Retrieved from "
Art of Problem Solving is an
ACS WASC Accredited School
aops programs
AoPS Online
Beast Academy
AoPS Academy
About
About AoPS
Our Team
Our History
Jobs
AoPS Blog
Site Info
Terms
Privacy
Contact Us
follow us
Subscribe for news and updates
© 2025 AoPS Incorporated
© 2025 Art of Problem Solving
About Us•Contact Us•Terms•Privacy
Copyright © 2025 Art of Problem Solving
Something appears to not have loaded correctly.
Click to refresh. |
2056 | https://link.springer.com/article/10.1007/s11269-008-9351-8 | Advertisement
Impact of Dam Construction on Water Quality and Water Self-Purification Capacity of the Lancang River, China
3097 Accesses
159 Citations
Explore all metrics
Abstract
Along with the sequent completion of Manwan and Dachaoshan Dam, the river continuum of the middle and lower reaches of the Lancang River was separated into three types of segments: reservoir, below-dam segment and downstream flowing segment. The long-term series of water quality and river flow data over 20 years were analyzed in order to study the impact of dam construction and operation on water quality and water self-purification capacity of these different river segments. From pre-dam period to the first 7 years after Manwan Dam had been accomplished, the water quality of Manwan Reservoir became worse due to the accumulation of pollutants, and then to the next 5 years the water quality became better in virtue of the water self-purification of the reservoir. The cooperative operation of Manwan and Dachaoshan Dam had cumulatively positive impacts on water quality of their below-dam segment but no impacts on that of downstream flowing segment. From pre-dam period to the first 7 years after the closure of Manwan Dam, the water self-purification capacity of Xiaowan–Manwan segment for BOD5, CODMn and NH3–N decreased. Also, the water self-purification capacity of Manwan–Dachaoshan segment for BOD5 and CODMn decreased but for NH3–N increased. However, the water self-purification capacity of Jinghong–Ganlanba segment changed contrary to Manwan–Dachaoshan segment. In general, the construction of Manwan Dam negatively affected the water self-purification capacity of reservoir and below-dam segment but impose little impact on that of downstream flowing segment. This study suggested that it is necessary to pay attention to the effect of complicated temporal and spatial characteristics of dam on aquatic ecosystem.
This is a preview of subscription content, log in via an institution
to check access.
Access this article
Subscribe and save
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
Institutional subscriptions
Similar content being viewed by others
Influences of anthropogenic activities and topography on water quality in the highly regulated Huai River basin, China
Assessing changes in flow and water quality emerging from hydropower development and operation in the Sesan River Basin of the Lower Mekong Region
Water Quality in Main Dam Reservoirs in Poland
Explore related subjects
References
Agthe DE, Billings RB, Ince S (2000) Integrating market solutions into government flood control policies. Water Resour Manage 14:247–256. doi:10.1023/A:1008133825980
Article
Google Scholar
Ben Alaya A, Souissi A, Tarhouni J, Ncib K (2003) Optimization of Nebhana Reservoir water allocation by stochastic dynamic programming. Water Resour Manage 17:259–272. doi:10.1023/A:1024721507339
Article
Google Scholar
Chen YC, Liu ZW (2005) Analysis and evaluation of water environmental carrying capacity in Three Gorges Reservoir. Adv Water Sci 16(5):715–719
Google Scholar
Cortes RMV, Ferreira MT, Oliveira SV, Oliveira D (2002) Macroinvertebrate community structure in a regulated river segment with different flow conditions. River Res Appl 18:367–382. doi:10.1002/rra.679
Article
Google Scholar
Dolgonosov BM (2003) Problemy obespecheniya kachestva vody v prirodno-tekhnologicheskom komplekse vodosnabzheniya, Inzh. Ekologia (Bratisl) 5:2–14
Google Scholar
Dynesius M, Nilsson C (1994) Fragmentation and flow regulation in river systems in the northern third of the world. Science 266:753–762. doi:10.1126/science.266.5186.753
Article
Google Scholar
Everitt BL (1993) Channel responses to declining flow on the Rio Grande between Ft. Quitman and the Presidio, Texas. Geomorphology 6:225–242. doi:10.1016/0169-555X(93)90048-7
Article
Google Scholar
Ewa SG, Grażyna MB (2002) Deposition of copper in the eutrophic, submontane Ddobczyce Dam Reservoir (Southern Poland)—role of speciation. Water Air Soil Pollut 140:203–218. doi:10.1023/A:1020139716502
Article
Google Scholar
Fearnside PM (2001) Environmental impacts of Brazil’s Tucuruí Dam: unlearned lessons for hydroelectric development in Amazonia. Environ Manage 27(3):377–396. doi:10.1007/s002670010156
Article
Google Scholar
Feder DR (2004) A regionally based energy end-use strategy: case studies from centre county, Pennsylvania. Prof Geogr 56(2):185–200
Google Scholar
Groot RS, Wilson MA, Boumans RMJ (2002) A typology for the classification, description and valuation of ecosystem functions, goods and services. Ecol Econ 41:393–408. doi:10.1016/S0921-8009(02)00089-7
Article
Google Scholar
Gülbahar N, Elhatip H (2005) Estimation of environmental impacts on the water quality of the Tahtal dam watershed in Izmir, Turkey. Environ Geol 47:725–728. doi:10.1007/s00254-004-1206-x
Article
Google Scholar
Harding JPC, Burrows IG, Whitton BA (1981) Heavy metals in the Derwent Reservoir Catchment, Northern England. In: Say PJ, Whitton BA (eds) Proceedings of a Conference on Heavy Metals and the Environment. Durham, England, pp 17–18, 73–86
He DM (1996) Facilitating regional sustainable development through integrated multi-objective utilization management of water resources in the Lancang–Mekong River Basin. Yunnan Geogr Environ Res 8(1):25–36
Google Scholar
He DM, Feng Y, Gan S, You WH (2006) Transboundary hydrological effects of hydropower dam construction on the Lancang River. Chin Sci Bull 51(Supp):16–24. doi:10.1007/s11434-006-8203-2
Google Scholar
Heidenwag I, Langheinrich U, Lüderitz V (2001) Self-purification in upland and lowland streams. Acta Hydrochim Hydrobiol 29:22–33. doi:10.1002/1521-401X()29:1<22::AID-AHEH22>3.0.CO;2-M
Article
Google Scholar
Huang ZL, Li YL, Li JX, Chen YC (2004) Water environmental capacity for the reservoir of Three Gorges Project. ShuiLi XueBao 3:7–14
Google Scholar
Ibáñez-Castillo LA, Chávez-Morales J, Mariño M (1997) A planning model for the Fuerte-Carrizo Irrigation System, Mexico. Water Resour Manage 11:165–183. doi:10.1023/A:1007910530591
Article
Google Scholar
Jacobs JW (2002) The Mekong River Commission: transboundary water resources planning and regional security. Geogr J 168(4):354–364. doi:10.1111/j.0016-7398.2002.00061.x
Article
Google Scholar
Jansson R, Nilsson C, Dynesius M, Andersson E (2000) Effects of river regulation on river-margin vegetation: a comparison of eight boreal rivers. Ecol Appl 10:203–224. doi:10.1890/1051-0761(2000)010[0203:EORROR]2.0.CO;2
Article
Google Scholar
Jewitt G (2002) Can integrated water resources management sustain the provision of ecosystem goods and services? Phys Chem Earth 27:887–895
Google Scholar
Kileshye Onema J-M, Mazvimavi D, Love D, Mul ML (2006) Effects of selected dams on river flows of Insiza River, Zimbabwe. Phys Chem Earth 31:870–875
Google Scholar
Kim L-H, Choi E, Gil K-I, Stenstrom MK (2004) Phosphorus release rates from sediments and pollutant characteristics in Han River, Seoul, Korea. Sci Total Environ 321:115–125. doi:10.1016/j.scitotenv.2003.08.018
Article
Google Scholar
Korfali SI, Davies BE (2005) Seasonal variations of trace metal chemical forms in bed sediments of a karstic river in Lebanon: implications for self-purification. Environ Geochem Health 27:385–395. doi:10.1007/s10653-004-7096-8
Article
Google Scholar
Kurunc A, Yurekli K, Okman C (2006) Effects of Kilickaya Dam on concentration and load values of water quality constituents in Kelkit Stream in Turkey. J Hydrol (Amst) 317:17–30. doi:10.1016/j.jhydrol.2005.05.006
Article
Google Scholar
Le TVH, Nguyen HN, Wolanski E, Tran TC, Haruyama S (2007) The combined impact on the flooding in Vietnam’s Mekong River delta of local man-made structures, sea level rise, and dams upstream in the river catchment. Estuar Coast Shelf Sci 71:110–116. doi:10.1016/j.ecss.2006.08.021
Article
Google Scholar
Ligon FK, Dietrich WE, Trush WJ (1995) Downstream ecological effect of dams: a geomorphic perspective. Bioscience 45:183–192. doi:10.2307/1312557
Article
Google Scholar
Luo GY, Liu GT, Wang WB (1999) About the control of entrophication pollution to the Three Gorge Reservoir. J Chongqing Jianzhu Univ 21(3):1–4
Google Scholar
Marneffe Y, Comblin S, Thomé JP (1998) Ecological water quality assessment of the Bütgenbach lake (Belgium) and its impact on the River Warche using rotifers as bioindicators. Hydrobiologia 387/388:459–467. doi:10.1023/A:1017024730052
Article
Google Scholar
Moiseenko TI (1999) The fate of metals in Arctic surface waters. Method for defining critical levels. Sci Total Environ 236:19–39. doi:10.1016/S0048-9697(99)00280-6
Article
Google Scholar
Mugabe FT, Hodnett MG, Senzanje A (2003) Opportunities for increasing productive water use from dam water: a case study from semi-arid Zimbabwe. Agric Water Manage 62:149–163. doi:10.1016/S0378-3774(03)00077-5
Article
Google Scholar
Newham LTH, Letcher RA, Jakeman AJ, Kobayashi (2004) A framework for integrated hydrologic, sediment and nutrient export modelling for catchment-scale management. Environ Model Softw 19:1029–1038. doi:10.1016/j.envsoft.2003.11.006
Article
Google Scholar
Ostroumov SA (2002) Inhibitory analysis of top-down control: new keys to studying eutrophication, algal blooms, and water self-purification. Hydrobiologia 469:117–129. doi:10.1023/A:1015559123646
Article
Google Scholar
Ostroumov SA (2005) On some issues of maintaining water quality and self-purification. Water Resour 32(3):337–346. doi:10.1007/s11268-005-0039-7
Article
Google Scholar
Penczak T (1999) Fish production and food consumption in the Warta River (Poland): continued post-impoundment study (1990–1994). Hydrobiologia 416:107–123. doi:10.1023/A:1003859303004
Article
Google Scholar
Petts GE (1979) Complex response of river channel morphology subsequent to reservoir construction. Prog Phys Geogr 3:329–362. doi:10.1177/030913337900300302
Article
Google Scholar
Pohl M (2004) Channel bed mobility downstream from the Elwha Dams, Washington. Prof Geogr 56(3):422–431
Google Scholar
Power ME, Sun A, Parker G, Dietrich WE, Wootton Timothy J (1995) Hydraulic food chain models. Bioscience 45:159–167. doi:10.2307/1312555
Article
Google Scholar
Qi JY, Ruan XH (2005) Dam construction-induced environmental impact on riverine ecosystem. J Hohai Univ (Nat Sci) 33(1):37–40
Google Scholar
Saadatpour M, Afshar A (2007) Waste load allocation modeling with fuzzy goals: simulation-optimization approach. Water Resour Manage 21:1207–1224. doi:10.1007/s11269-006-9077-4
Article
Google Scholar
Scodanibbio L, Mañez G (2005) The World Commission on Dams: a fundamental step towards integrated water resources management and poverty reduction? A pilot case in the Lower Zambezi, Mozambique. Phys Chem Earth 30:976–983
Google Scholar
Selifonova ZP, Lukina NV (2001) Estimation of standing stock and decomposition rates of labile organic matter in waters of Novorossiisk bay, Black Sea. Russ J Mar Biol 27(3):180–183. doi:10.1023/A:1016773720363
Article
Google Scholar
Skurlatov YI (1988) Principles of quality control of natural waters, in Ekologicheskaya khimiya vodnoi sredy [Ecological Chemistry of the Aquatic Environment], vol 1. Moscow, pp 230–255
Sule BF (1988) Reservoir operation polices for optimizing energy generation at the Shiroro Dam. Water Resour Manage 2:209–219. doi:10.1007/BF00429902
Article
Google Scholar
Topping DJ, Rubin DM, Vierra LE (2000) Colorado River sediment transport 1. Natural sediment supply limitation and the influence of Glen Canyon Dam. Water Resour Res 36:515–542. doi:10.1029/1999WR900285
Article
Google Scholar
Vagnetti R, Miana P, Fabris M, Pavoni B (2003) Self-purification ability of a resurgence stream. Chemosphere 52:1781–1795. doi:10.1016/S0045-6535(03)00445-4
Article
Google Scholar
World Commission on Dams (2000) Dams and development: a new framework for decision-making. Earthscan, London, UK, pp 8–10, 75–293
Xie SP (2004) Study on the acceleration of navigation on the Chuanjiang River by the Three Gorge Dam at initial stage of filling dam. Transp Sci Technol (3):88–90
Zhang J, She ZL, Wang CJ, Sun BQ (2003) Study on the water environmental capacity of the mainstream of the Dagu River (Qingdao Reach). J Ocean Univ Qingdao 33(5):665–670
Google Scholar
Zhou JB, Yuan DH (2001) Analysis of changes in biological environment in Dongjiang hydropower station after reservoir establishment. J Hydrol Electr Eng (4):108–116
Zhu EM (2004) Hydraulic projects and water environment. J Chin Three Gorges Univ (Nat Sci) 26(3):198–201
Google Scholar
Download references
Author information
Authors and Affiliations
State Key Laboratory of Water Environment Simulation, School of Environment, Beijing Normal University, Beijing, 100875, P. R. China
GuoLiang Wei, ZhiFeng Yang, BaoShan Cui, He Chen, JunHong Bai & ShiKui Dong
Nuclear and Radiation Safety Centre, State Environmental Protection Administration, Beijing, 100088, P. R. China
GuoLiang Wei & Bing Li
Search author on:PubMed Google Scholar
Search author on:PubMed Google Scholar
Search author on:PubMed Google Scholar
Search author on:PubMed Google Scholar
Search author on:PubMed Google Scholar
Search author on:PubMed Google Scholar
Search author on:PubMed Google Scholar
Corresponding author
Correspondence to
BaoShan Cui.
Rights and permissions
Reprints and permissions
About this article
Cite this article
Wei, G., Yang, Z., Cui, B. et al. Impact of Dam Construction on Water Quality and Water Self-Purification Capacity of the Lancang River, China.
Water Resour Manage 23, 1763–1780 (2009).
Download citation
Received: 25 August 2007
Accepted: 09 September 2008
Published: 07 November 2008
Issue Date: July 2009
DOI:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
Keywords
Access this article
Subscribe and save
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
Institutional subscriptions
Advertisement
Search
Navigation
Discover content
Publish with us
Products and services
Our brands
98.86.177.21
Not affiliated
© 2025 Springer Nature |
2057 | https://math.libretexts.org/Bookshelves/Precalculus/Book%3A_Precalculus__An_Investigation_of_Functions_(Lippman_and_Rasmussen)/03%3A_Polynomial_and_Rational_Functions./3.01%3A_Power_Functions | Published Time: 2018-12-04T02:39:07Z
3.1: Power Functions - Mathematics LibreTexts
Skip to main content
Table of Contents menu
search Search build_circle Toolbar fact_check Homework cancel Exit Reader Mode
school Campus Bookshelves
menu_book Bookshelves
perm_media Learning Objects
login Login
how_to_reg Request Instructor Account
hub Instructor Commons
Search
Search this book
Submit Search
x
Text Color
Reset
Bright Blues Gray Inverted
Text Size
Reset
+-
Margin Size
Reset
+-
Font Type
Enable Dyslexic Font - [x]
Downloads expand_more
Download Page (PDF)
Download Full Book (PDF)
Resources expand_more
Periodic Table
Physics Constants
Scientific Calculator
Reference expand_more
Reference & Cite
Tools expand_more
Help expand_more
Get Help
Feedback
Readability
x
selected template will load here
Error
This action is not available.
chrome_reader_mode Enter Reader Mode
3: Polynomial and Rational Functions.
Precalculus - An Investigation of Functions (Lippman and Rasmussen)
{ "3.1E:Power_Functions(Exercises)" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1" }
{ "3.01:_Power_Functions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "3.02:_Quadratic_Functions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "3.03:_Graphs_of_Polynomial_Functions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "3.04:_Factor_Theorem_and_Remainder_Theorem" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "3.05:_Real_Zeros_of_Polynomials" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "3.06:_Complex_Zeros" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "3.07:_Rational_Functions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "3.08:_Inverses_and_Radical_Functions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1" }
{ "00:_Front_Matter" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "01:_Functions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "02:_Linear_Functions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "03:_Polynomial_and_Rational_Functions." : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "04:_Exponential_and_Logarithmic_Functions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "05:_Trigonometric_Functions_of_Angles" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "06:_Periodic_Functions" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "07:_Trigonometric_Equations_and_Identities" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "08:_Further_Applications_of_Trigonometry" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "09:_Conics" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "zz:_Back_Matter" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1" }
Wed, 13 Jul 2022 01:13:33 GMT
3.1: Power Functions
13840
13840
Inseon Kim
{ }
Anonymous
Anonymous
2
false
false
[ "article:topic", "power function", "license:ccbysa", "showtoc:no", "authorname:lippmanrasmussen", "licenseversion:40", "source@ ]
[ "article:topic", "power function", "license:ccbysa", "showtoc:no", "authorname:lippmanrasmussen", "licenseversion:40", "source@ ]
Search site Search Search Go back to previous article
Sign in
Username Password Sign in
Sign in
Sign in
Forgot password
Contents
1. Home
2. Bookshelves
3. Precalculus & Trigonometry
4. Precalculus - An Investigation of Functions (Lippman and Rasmussen)
5. 3: Polynomial and Rational Functions.
6. 3.1: Power Functions
Expand/collapse global location
Precalculus - An Investigation of Functions (Lippman and Rasmussen)
Front Matter
1: Functions
2: Linear Functions
3: Polynomial and Rational Functions.
4: Exponential and Logarithmic Functions
5: Trigonometric Functions of Angles
6: Periodic Functions
7: Trigonometric Equations and Identities
8: Further Applications of Trigonometry
9: Conics
Back Matter
3.1: Power Functions
Last updated Jul 13, 2022
Save as PDF
3: Polynomial and Rational Functions.
3.1E: Power Functions (Exercises)
Page ID 13840
David Lippman & Melonie Rasmussen
The OpenTextBookStore
( \newcommand{\kernel}{\mathrm{null}\,})
Table of contents
1. Characteristics of Power Functions
2. Polynomials
3. Short Run Behavior
4. Important Topics of this Section
A square is cut out of cardboard, with each side having length L L. If we wanted to write a function for the area of the square, with L L as the input and the area as output, you may recall that the area of a rectangle can be found by multiplying the length times the width. Since our shape is a square, the length & the width are the same, giving the formula:
A(L)=L⋅L=L 2(3.1.1)(3.1.1)A(L)=L⋅L=L 2
Likewise, if we wanted a function for the volume of a cube with each side having some length L L, you may recall volume of a rectangular box can be found by multiplying length by width by height, which are all equal for a cube, giving the formula:
V(L)=L⋅L⋅L=L 3(3.1.2)(3.1.2)V(L)=L⋅L⋅L=L 3
These two functions are examples of power functions, functions that are some power of the variable.
Definition: Power Function
A power function is a function that can be represented in the form
f(x)=x p(3.1.3)(3.1.3)f(x)=x p
Where the base is a variable and the exponent, p p, is a number.
Example 3.1.1 3.1.1
Which of our toolkit functions are power functions? (This chapter is part of Precalculus: An Investigation of Functions© Lippman & Rasmussen 2017, and contains content remixed with permission from College Algebra© Stitz & Zeager 2013. This material is licensed under a Creative Commons CC-BY-SA license.)
Solutions
The constant and identity functions are power functions, since they can be written as f(x)=x 0 f(x)=x 0 and f(x)=x 1 f(x)=x 1 respectively.
The quadratic and cubic functions are both power functions with whole number powers: f(x)=x 2 f(x)=x 2 and f(x)=x 3 f(x)=x 3.
The reciprocal and reciprocal squared functions are both power functions with negative whole number powers since they can be written as f(x)=x−1 f(x)=x−1 and f(x)=x−2 f(x)=x−2.
The square and cube root functions are both power functions with fractional powers since they can be written as f(x)=x 1 2 f(x)=x 1 2 or f(x)=x 1 3 f(x)=x 1 3
Exercise 3.1.1 3.1.1
What point(s) do the toolkit power functions have in common?
Answer
(0, 0) and (1, 1) are common to all power functions.
Characteristics of Power Functions
Shown to the right are the graphs of f(x)=x 2 f(x)=x 2, f(x)=x 4 f(x)=x 4, and f(x)=x 6 f(x)=x 6, all even whole number powers. Notice that all these graphs have a fairly similar shape, very similar to the quadratic toolkit, but as the power increases the graphs flatten somewhat near the origin, and become steeper away from the origin.
To describe the behavior as numbers become larger and larger, we use the idea of infinity. The symbol for positive infinity is ∞∞, and −∞−∞ for negative infinity. When we say that “x x approaches infinity”, which can be symbolically written as x→∞x→∞, we are describing a behavior – we are saying that x x is getting large in the positive direction.
With the even power functions, as the x x becomes large in either the positive or negative direction, the output values become very large positive numbers. Equivalently, we could describe this by saying that as x x approaches positive or negative infinity, the f(x)f(x) values approach positive infinity. In symbolic form, we could write: as x→±∞x→±∞, f(x)→∞f(x)→∞.
Shown here are the graphs of f(x)=x 3 f(x)=x 3, f(x)=x 5 f(x)=x 5, and f(x)=x 7 f(x)=x 7, all odd whole number powers. Notice all these graphs look similar to the cubic toolkit, but again as the power increases the graphs flatten near the origin and become steeper away from the origin.
For these odd power functions, as x x approaches negative infinity, f(x)f(x) approaches negative infinity. As x x approaches positive infinity, f(x)f(x) approaches positive infinity. In symbolic form we write: as x→−∞x→−∞, f(x)→−∞f(x)→−∞ and as x→∞x→∞, f(x)→∞f(x)→∞.
Definition: long run behavior
The behavior of the graph of a function as the input takes on large negative values,x→−∞x→−∞, and large positive values, x→∞x→∞, is referred to as the long run behavior of the function.
Example 3.1.2 3.1.2
Describe the long run behavior of the graph of f(x)=x 8 f(x)=x 8.
Solution
Since f(x)=x 8 f(x)=x 8 has a whole, even power, we would expect this function to behave somewhat like the quadratic function. As the input gets large positive or negative, we would expect the output to grow without bound in the positive direction. In symbolic form, as x→±∞x→±∞, f(x)→∞f(x)→∞.
Example 3.1.3 3.1.3
Describe the long run behavior of the graph of f(x)=−x 9 f(x)=−x 9
Solution
Since this function has a whole odd power, we would expect it to behave somewhat like the cubic function. The negative in front of the x 9 x 9 will cause a vertical reflection, so as the inputs grow large positive, the outputs will grow large in the negative direction, and as the inputs grow large negative, the outputs will grow large in the positive direction. In symbolic form, for the long run behavior we would write: as x→∞x→∞, f(x)→−∞f(x)→−∞and as x→−∞x→−∞, f(x)→∞f(x)→∞.
You may use words or symbols to describe the long run behavior of these functions.
Exercise 3.1.2 3.1.2
Describe in words and symbols the long run behavior of f(x)=−x 4 f(x)=−x 4
Answer
As x x approaches positive and negative infinity, f(x)f(x) approaches negative infinity: as x→±∞x→±∞, f(x)→−∞f(x)→−∞ because of the vertical flip.
Treatment of the rational and radical forms of power functions will be saved for later.
Polynomials
An oil pipeline bursts in the Gulf of Mexico, causing an oil slick in a roughly circular shape. The slick is currently 24 miles in radius, but that radius is increasing by 8 miles each week. If we wanted to write a formula for the area covered by the oil slick, we could do so by composing two functions together. The first is a formula for the radius, r r, of the spill, which depends on the number of weeks, w, that have passed.
Hopefully you recognized that this relationship is linear:
r(w)=24+8 w r(w)=24+8 w
We can combine this with the formula for the area, A A, of a circle:
A(r)=π r 2 A(r)=π r 2
Composing these functions gives a formula for the area in terms of weeks:
A(w)=A(r(w))=A(24+8 w)=π(24+8 w)2 A(w)=A(r(w))=A(24+8 w)=π(24+8 w)2
Multiplying this out gives the formula
A(w)=576 π+384 π w+64 π w 2 A(w)=576 π+384 π w+64 π w 2
This formula is an example of a polynomial. A polynomial is simply the sum of terms each consisting of a vertically stretched or compressed power function with non-negative whole number power.
terminology of polynomial functions
A polynomial is function that can be written as
f(x)=a 0+a 1 x+a 2 x 2+⋯+a n x n(3.1.4)(3.1.4)f(x)=a 0+a 1 x+a 2 x 2+⋯+a n x n
Each of the a i a i constants are called coefficients and can be positive, negative, or zero, and be whole numbers, decimals, or fractions.
A term of the polynomial is any one piece of the sum, that is any a i x i a i x i. Each individual term is a transformed power function.
The degree of the polynomial is the highest power of the variable that occurs in the polynomial.
The leading term is the term containing the highest power of the variable: the term with the highest degree.
The leading coefficient is the coefficient of the leading term.
Because of the definition of the “leading” term we often rearrange Equation 3.1.43.1.4 so that the powers are descending.
f(x)=a n x n+.....+a 2 x 2+a 1 x+a 0(3.1.5)(3.1.5)f(x)=a n x n+.....+a 2 x 2+a 1 x+a 0
Example 3.1.4 3.1.4
Identify the degree, leading term, and leading coefficient of these polynomials:
f(x)=3+2 x 2−4 x 3 f(x)=3+2 x 2−4 x 3
g(t)=5 t 5−2 t 3+7 t g(t)=5 t 5−2 t 3+7 t
h(p)=6 p−p 3−2 h(p)=6 p−p 3−2
Solution
For the function f(x)f(x), the degree is 3, the highest power on x x. The leading term is the term containing that power, −4 x 3−4 x 3. The leading coefficient is the coefficient of that term, -4.
For g(t)g(t), the degree is 5, the leading term is 5 t 5 5 t 5, and the leading coefficient is 5.
For h(p)h(p), the degree is 3, the leading term is −p 3−p 3, so the leading coefficient is -1.
Definition: long run behavior of polynomials
For any polynomial, the long run behavior of the polynomial will match the long run behavior of the leading term.
Example 3.1.5 3.1.5
What can we determine about the long run behavior and degree of the equation for the polynomial graphed here?
Solution
Since the output grows large and positive as the inputs grow large and positive, we describe the long run behavior symbolically by writing: as x→∞x→∞, f(x)→∞f(x)→∞. Similarly, as x→−∞x→−∞, f(x)→−∞f(x)→−∞.
In words, we could say that as x x values approach infinity, the function values approach infinity, and as x x values approach negative infinity the function values approach negative infinity.
We can tell this graph has the shape of an odd degree power function which has not been reflected, so the degree of the polynomial creating this graph must be odd, and the leading coefficient would be positive.
Exercise 3.1.3 3.1.3
Given the function f(x)=0.2(x−2)(x+1)(x−5)f(x)=0.2(x−2)(x+1)(x−5) use your algebra skills to write the function in standard polynomial form (as a sum of terms) and determine the leading term, degree, and long run behavior of the function.
Answer
The leading term is 0.2 x 3 0.2 x 3, so it is a degree 3 polynomial.As x x approaches infinity (or gets very large in the positive direction) f(x)f(x) approaches infinity; as x x approaches negative infinity (or gets very large in the negative direction) f(x)f(x) approaches negative infinity. (Basically the long run behavior is the same as the cubic function).
Short Run Behavior
Characteristics of the graph such as vertical and horizontal intercepts and the places the graph changes direction are part of the short run behavior of the polynomial.
Like with all functions, the vertical intercept is where the graph crosses the vertical axis, and occurs when the input value is zero. Since a polynomial is a function, there can only be one vertical intercept, which occurs at the point (0,a 0)(0,a 0). The horizontal intercepts occur at the input values that correspond with an output value of zero. It is possible to have more than one horizontal intercept.
Horizontal intercepts are also called zeros, or roots of the function.
Example 3.1.6 3.1.6
Given the polynomial function f(x)=(x−2)(x+1)(x−4)f(x)=(x−2)(x+1)(x−4), written in factored form for your convenience, determine the vertical and horizontal intercepts.
Solution
The vertical intercept occurs when the input is zero.
f(0)=(0−2)(0+1)(0−4)=8 f(0)=(0−2)(0+1)(0−4)=8
The graph crosses the vertical axis at the point (0, 8).
The horizontal intercepts occur when the output is zero.
0=(x−2)(x+1)(x−4)0=(x−2)(x+1)(x−4)
when x x = 2, -1, or 4.
f(x)f(x) has zeros, or roots, at x x = 2, -1, and 4.
The graph crosses the horizontal axis at the points (2, 0), (-1, 0), and (4, 0)
Notice that the polynomial in the previous example, which would be degree three if multiplied out, had three horizontal intercepts and two turning points – places where the graph changes direction. We will now make a general statement without justifying it – the reasons will become clear later in this chapter.
intercepts and turning points of polynomials
A polynomial of degree n n will have:
At most n n horizontal intercepts. An odd degree polynomial will always have at least one.
At most n−1 n−1 turning points
Example 3.1.7 3.1.7
What can we conclude about the graph of the polynomial shown here?
Solution
Based on the long run behavior, with the graph becoming large positive on both ends of the graph, we can determine that this is the graph of an even degree polynomial. The graph has 2 horizontal intercepts, suggesting a degree of 2 or greater, and 3 turning points, suggesting a degree of 4 or greater. Based on this, it would be reasonable to conclude that the degree is even and at least 4, so it is probably a fourth degree polynomial.
Exercise 3.1.4 3.1.4
Given the function f(x)=0.2(x−2)(x+1)(x−5)f(x)=0.2(x−2)(x+1)(x−5), determine the short run behavior.
Answer
Horizontal intercepts are (2, 0) (-1, 0) and (5, 0), the vertical intercept is (0, 2) and there are 2 turns in the graph.
Important Topics of this Section
Power Functions
Polynomials
Coefficients
Leading coefficient
Term
Leading Term
Degree of a polynomial
Long run behavior
Short run behavior
This page titled 3.1: Power Functions is shared under a CC BY-SA 4.0 license and was authored, remixed, and/or curated by David Lippman & Melonie Rasmussen (The OpenTextBookStore) via source content that was edited to the style and standards of the LibreTexts platform.
Back to top
3: Polynomial and Rational Functions.
3.1E: Power Functions (Exercises)
Was this article helpful?
Yes
No
Recommended articles
5.3: Power Functions and Polynomial FunctionsSuppose a certain species of bird thrives on a small island. The population can be estimated using a polynomial function. We can use this model to est...
5.2: Power Functions and Polynomial FunctionsSuppose a certain species of bird thrives on a small island. The population can be estimated using a polynomial function. We can use this model to est...
1.2: Basic Classes of FunctionsWe begin by reviewing the basic properties of linear and quadratic functions, and then generalize to include higher-degree polynomials. By combining r...
Article typeSection or PageAuthorDavid Lippman & Melonie RasmussenLicenseCC BY-SALicense Version4.0Show Page TOCno
Tags
power function
source@
© Copyright 2025 Mathematics LibreTexts
Powered by CXone Expert ®
?
The LibreTexts libraries arePowered by NICE CXone Expertand are supported by the Department of Education Open Textbook Pilot Project, the UC Davis Office of the Provost, the UC Davis Library, the California State University Affordable Learning Solutions Program, and Merlot. We also acknowledge previous National Science Foundation support under grant numbers 1246120, 1525057, and 1413739. Privacy Policy. Terms & Conditions. Accessibility Statement.For more information contact us atinfo@libretexts.org.
Support Center
How can we help?
Contact Support Search the Insight Knowledge Base Check System Status×
contents readability resources tools
☰
3: Polynomial and Rational Functions.
3.1E: Power Functions (Exercises) |
2058 | https://math.stackexchange.com/questions/626251/is-there-a-general-algebraic-way-of-solving-this-seating-arrangement-problem | linear algebra - Is there a general, algebraic way of solving this seating arrangement problem? - Mathematics Stack Exchange
Join Mathematics
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Loading…
Tour Start here for a quick overview of the site
Help Center Detailed answers to any questions you might have
Meta Discuss the workings and policies of this site
About Us Learn more about Stack Overflow the company, and our products
current community
Mathematics helpchat
Mathematics Meta
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Home
Questions
Unanswered
AI Assist Labs
Tags
Chat
Users
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
Is there a general, algebraic way of solving this seating arrangement problem?
Ask Question
Asked 11 years, 9 months ago
Modified11 years, 9 months ago
Viewed 1k times
This question shows research effort; it is useful and clear
0
Save this question.
Show activity on this post.
The following question is from the "OECD Pisa questions"
[I found it via a link from the guardian newspaper].
```
It is Alan's birthday and he is having a party.
Seven other people will attend: Amy, Brad, Beth, Charles, Debbie,
Emily and Frances.
Everyone will sit around the circular dining table.
The seating arrangement must meet the following conditions:
• Amy and Alan sit together
• Brad and Beth sit together
• Charles sits next to either Debbie or Emily
• Frances sits next to Debbie
• Amy and Alan do not sit next to either Brad or Beth
• Brad does not sit next to Charles or Frances
• Debbie and Emily do not sit next to each other
• Alan does not sit next to either Debbie or Emily
• Amy does not sit next to Charles
Arrange the guests around the table to meet all of the conditions listed above.
```
If I were to use each name as a variable name, and their seat number as the value of that variable (wrapping 8's to 1's - yes I realize there's still an issue around that); and arbitrarily assigning Alan = 1, we have:
Alan = 1
Amy = (2 or 7)
Brad = (Beth + 1) or (Beth - 1)
Charles = (Debbie + 1) or (Debbie - 1) or (Emily + 1) or (Emily-1)
...and now we get into a bunch more or's and equations stating inequalities.
I'm not really sure if I could solve it this way...or whether this is even be a good way of looking at the problem. When I solved it by trial-and-error, I treated the pairs that had to sit together as one, and just swapped their positions whenever some inconsistency came up. I think I was basically just solving via brute force. Is there a better way?
I'm not really interested in the actual solution per se (I found a solution through trial and error in a few minutes), but an algebraic way of finding a solution to these types of problems in general. And by these types of problems, I guess I mean this class of word problems. Is this still just a bunch of linear equations when it involves inequalities and logical operators?
linear-algebra
Share
Share a link to this question
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this question to receive notifications
asked Jan 3, 2014 at 19:44
GerratGerrat
97 7 7 bronze badges
Add a comment|
3 Answers 3
Sorted by: Reset to default
This answer is useful
2
Save this answer.
Show activity on this post.
One way to simplify the circular part is to seat (say) Amy and Alan, chop the table between them, and then unroll the table. So Alan sits in space 1 (say) and Amy in space 8.
You can do this because it doesn't matter where Alan sits, so you can pick space 1. It also doesn't matter whether Amy sits to his right or his left, so pick one of those.
Now you have hard boundary conditions for the other six, and it's clear who's sitting next to whom without needing to "wrap around the end of the table."
From here on, though, the "polarity" of each pair matters, since we've broken the symmetry of the problem. Whether Brad is to Beth's right or to her left matters now.
Now, Alan seems pretty picky. There are only two people left that he can sit next to: Charles or Frances. The breadth of the search is reduced considerably if you tackle this one next; you've eliminated a whole bunch of possibilities.
If Charles or Frances is in space 2, then Brad cannot be in space 3. Which means that Beth cannot be in space 4.
To sum up, look for the "long poles" in the tent to reduce your search space, and simplify out things by symmetry.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this answer to receive notifications
edited Jan 3, 2014 at 20:46
answered Jan 3, 2014 at 20:16
JohnJohn
26.6k 3 3 gold badges 41 41 silver badges 63 63 bronze badges
4
Yup. I'm really just looking for the "mathy" way of solving it.Gerrat –Gerrat 2014-01-03 20:32:00 +00:00 Commented Jan 3, 2014 at 20:32
I deleted that last sentence. I should stop selling my answers short like that.John –John 2014-01-03 20:47:17 +00:00 Commented Jan 3, 2014 at 20:47
This isn't really what I'm looking for, but you get a +1 for the neat trick in your first sentence. Nice.Gerrat –Gerrat 2014-01-03 21:01:46 +00:00 Commented Jan 3, 2014 at 21:01
I am curious to know how I may adapt similar concept to fit into an algorithm for dynamic seating in places like cafes where we merge and split tables...bonCodigo –bonCodigo 2014-06-17 01:03:25 +00:00 Commented Jun 17, 2014 at 1:03
Add a comment|
This answer is useful
0
Save this answer.
Show activity on this post.
These problems are best solved with methods of discrete mathematics (combinations, permutations, etc). You see many of these type of questions in coding problems (projecteuler.net is a good example) where one is to write an efficient algorithm to solve the problem at hand. Dynamic programming is usually used to solve such problems.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this answer to receive notifications
answered Jan 3, 2014 at 20:15
abden003abden003
101 1 1 bronze badge
4
This is a PISA problem, but a programming problem.copper.hat –copper.hat 2014-01-03 20:18:35 +00:00 Commented Jan 3, 2014 at 20:18
Did you mean "not a programming problem"?abden003 –abden003 2014-01-03 20:23:06 +00:00 Commented Jan 3, 2014 at 20:23
Yes, thanks, I meant 'not, not 'but'.copper.hat –copper.hat 2014-01-03 20:26:11 +00:00 Commented Jan 3, 2014 at 20:26
When these problems get complicated they can only be solved (in reasonable time) with computers. To solve these problems you need a well thought out algorithm involving a lot of math and cleverness (a naive algorithm would be exponential or n!, which would take too long even on a modern computer). The link between the computer and algorithm is programming. That is why I felt it was appropriate to mention it.abden003 –abden003 2014-01-03 20:35:39 +00:00 Commented Jan 3, 2014 at 20:35
Add a comment|
This answer is useful
0
Save this answer.
Show activity on this post.
Premises:
Amy and Alan sit together
Brad and Beth sit together
Charles sits next to either Debbie or Emily
Frances sits next to Debbie
Amy and Alan do not sit next to either Brad or Beth
Brad does not sit next to Charles or Frances
Debbie and Emily do not sit next to each other
Alan does not sit next to either Debbie or Emily
Amy does not sit next to Charles
Additionally (implicitly), we have:
Alan != Amy != Brad != Charles != Frances != Emily != Beth != Debbie
Let's designate the seats 1-8, and seat Alan at 1.
We'll just start filling in seats that are consistent with the premises and backtrack when we hit an inconsistency:
Alan = 1 (arbitrary, so I assigned)
Amy = 8 (neat trick John mentioned)
Try: Brad = 2...fail (#5)
Try: Charles = 2: (next #3 says pick between Debbie and Emily):
Try: Debbie = 3, Frances = 4 (from #4),
Try: Brad = 5...fail (#6)
Try: Beth = 5, Brad = 6 (from #2), Emily = 7 (last seat)
...success!!!
Ok, much, much faster than I expected (I think this run just got lucky and didn't have to backtrack).
So we have Alan-Charles-Debbie-Frances-Beth-Brad-Emily-Amy (and back to Alan, in a circle). Double checking the original premises, this satisfies.
I like this method, as it is algorithmic (but I'd still prefer a (simple) method that solved a system of equations involving inequalities and booleans if such a thing existed).
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Follow
Follow this answer to receive notifications
answered Jan 3, 2014 at 21:55
GerratGerrat
97 7 7 bronze badges
1
Ok, I guess one way of categorizing this type of problem is a Constraint satisfaction problem, and backtracking is actually a half decent way to solve these!Gerrat –Gerrat 2014-01-03 22:04:42 +00:00 Commented Jan 3, 2014 at 22:04
Add a comment|
You must log in to answer this question.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
linear-algebra
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Report this ad
Related
2What's the algebraic way to solve this coding problem?
3The multiplication of 2D vectors produces what?
3Is there an algebraic solution to this problem?
1Elegant way to solve trigonometric algebraic problem
1Best way to solve 2 2 equations in an efficient manner?
3Is there a general transformation for this problem?
1Give a basis for S={M∈M 3(K)|Tr(M)=0∧∑3 j=1 M i,j=0}S={M∈M 3(K)|Tr(M)=0∧∑j=1 3 M i,j=0}
2Is there an efficient way to solve this problem?
Hot Network Questions
Matthew 24:5 Many will come in my name!
Any knowledge on biodegradable lubes, greases and degreasers and how they perform long term?
How to rsync a large file by comparing earlier versions on the sending end?
Are there any world leaders who are/were good at chess?
ConTeXt: Unnecessary space in \setupheadertext
What meal can come next?
Does the Mishna or Gemara ever explicitly mention the second day of Shavuot?
PSTricks error regarding \pst@makenotverbbox
Do we need the author's permission for reference
Why include unadjusted estimates in a study when reporting adjusted estimates?
Proof of every Highly Abundant Number greater than 3 is Even
How can the problem of a warlock with two spell slots be solved?
Explain answers to Scientific American crossword clues "Éclair filling" and "Sneaky Coward"
How exactly are random assignments of cases to US Federal Judges implemented? Who ensures randomness? Are there laws regulating how it should be done?
Alternatives to Test-Driven Grading in an LLM world
I have a lot of PTO to take, which will make the deadline impossible
Xubuntu 24.04 - Libreoffice
The geologic realities of a massive well out at Sea
What were "milk bars" in 1920s Japan?
Storing a session token in localstorage
An odd question
Languages in the former Yugoslavia
Suggestions for plotting function of two variables and a parameter with a constraint in the form of an equation
Can I go in the edit mode and by pressing A select all, then press U for Smart UV Project for that table, After PBR texturing is done?
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
It contains harassment, bigotry or abuse.
This comment attacks a person or group. Learn more in our Code of Conduct.
It's unfriendly or unkind.
This comment is rude or condescending. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Mathematics
Tour
Help
Chat
Contact
Feedback
Company
Stack Overflow
Teams
Advertising
Talent
About
Press
Legal
Privacy Policy
Terms of Service
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Cookies Details
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Cookies Details
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookies Details
Targeting Cookies
[x] Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Cookies Details
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Necessary cookies only Confirm my choices |
2059 | https://satprepget800.com/2016/11/23/exponential-growth-decay/ | Exponential Growth and Decay
Home
Resources
About
Contact
Books
Blog
Join the Newsletter
Learn strategies to help you get a perfect score and into your dream school with the Get 800 Newsletter.
Exponential Growth and Decay
The current version of the SAT gives problems on exponential growth and decay. Here are the basics that you should know if you want to get a perfect SAT score:
A general exponential function has the form f(t) = a(1 +r)ct, where a=f(0) is the initial amount and r is the growth rate. If r> 0, then we have exponential growth and if r< 0 we have exponential decay.
Examples:(1) The exponential function f(t) = 300(2)t can be used to model a population with a growth rate of 1 = 100% each year that begins with 300 specimens. The growth rate of 100% tells us that the population doubles each year.
(2) The exponential function f(t) = 50(3)2t can be used to model a population with a growth rate of 2 = 200% every 6 months that begins with 50 specimens. The growth rate of 200% tells us that the population triples. Since c= 2, the tripling occurs every 1/2 year or 6 months.
(3) The exponential function f(t) = 120(0.75)t/3 can be used to model a substance which is decaying at a rate of 1 – 0.75 = 0.25 = 25% every 3 years. The initial amount of the substance might be 120 grams. Since c= 1/3, the 25% decay occurs every 3 years.
(4) A quantity that continually doubles over a fixed time period can be modeled by the exponential function f(t) = a(2)t/d where a is the quantity at time t= 0, and d is the doubling time in years.
Now try the following SAT math problem. I will post a solution after Thanksgiving, but feel free to post your own solutions in the comments meanwhile.
Level 4 SAT Exponential Growth
On January 1, 2015, a family living on an island releases their two pet rabbits into the wild. Due to the short gestation period of rabbits, and the fact that the rabbits have no natural predators on this island, the rabbit population doubles each month. If P represents the rabbit population years after January 1, 2015, then which of the following equations best models the rabbit population on this island over time?
A)P= 2 t/12 + 1
B)P= 2 t+ 1
C)P= 2 12 t
D)P= 2 12 t + 1
More SAT and ACT Math Problems with Explanations
If you are preparing for the SAT or ACT, you may want to take a look at the Get 800 collection of test prep books.
And if you liked this article, please share it with your Facebook friends:
Comments
comments |
2060 | https://mathspace.co/textbooks/syllabuses/Syllabus-949/topics/Topic-18867/subtopics/Subtopic-255081/ | Book a Demo
Topics
Conic Sections & Parametric Equations
9.01 Review: Completing the square
9.02 Parabolas
9.03 Circles
9.04 Ellipses
9.05 Hyperbolas
9.06 Eccentricity and identifying conic sections
LessonPractice
9.07 Parametric equations
9.08 Applications of parametric equations
Log inSign upBook a Demo
United States of America
Algebra 1- Precalculus
9.06 Eccentricity and identifying conic sections
Lesson
What is Mathspace
About Mathspace |
2061 | https://www.youtube.com/watch?v=-xGANPeP3iw | Art of Problem Solving: Radical Equations
Art of Problem Solving
103000 subscribers
14 likes
Description
700 views
Posted: 9 Jan 2025
Art of Problem Solving's Richard Rusczyk gets us started with solving equations including radical expressions.
This video is part of our AoPS Algebra curriculum. Take your math skills to the next level with our Algebra materials:
📚 AoPS Introduction to Algebra Textbook:
🖥️ AoPS Introduction to Algebra A Course (Textbook Chapters 1-13):
🖥️ AoPS Introduction to Algebra B Course (Textbook Chapters 10-22):
🔔 Subscribe to our channel for more engaging math videos and updates
Transcript: |
2062 | https://theoremoftheweek.wordpress.com/2010/08/18/theorem-34-halls-marriage-theorem/ | Theorem of the week
Theorem 34: Hall’s marriage theorem
I was recently given a box of chocolates. This was a very nice surprise, but closer inspection revealed that I don’t like all of the flavours in the box. There were twelve chocolates, and I like six of them. I thought that perhaps I could invite some other people to share the chocolates with me, hoping that they’d take the ones I don’t like. Naturally, if I do that I have to make sure that everyone gets one chocolate each, to be fair. But I expect that some of them will like only certain chocolates too. So I thought that I’d ask eleven people which of these chocolates they like. That would give me twelve lists of acceptable chocolates (including my own). But will I be able to assign chocolates to people so that everybody gets a chocolate they like? If not, I’ll have to revise my guest list.
Well, I could try assigning theoretical chocolates to people in advance, to check. But that sounds terribly time-consuming. Is there some easy way in which I could tell whether it will be possible? Are there any circumstances in which I could immediately tell that it would be impossible?
Here’s a scenario in which it’s obviously impossible. Twelve people, twelve chocolates. So no spares (on either side). So if everybody tells me that, like me, they don’t like Scotch whisky chocolates, we’re going to have a problem: there’ll be twelve people fighting over the other eleven chocolates. I should uninvite one person, and find someone who likes whisky in their chocolate.
Can I say more? Well, we could extend the above idea. I only like six of the chocolates. If there are six other people who also only like those same six chocolates, we’re going to have a disagreement: seven people, six chocolates. Disaster!
Hopefully you’re starting to get the idea. Let’s be a bit more general. For any collection of k people, I need to know that they (between them) like at least k different chocolates, don’t I?
So we have a necessary condition: any collection of k people must like at least k different chocolates. If that condition isn’t satisfied, then I’m not going to be able to share the chocolates to everyone’s satisfaction. Is that also a sufficient condition? That is, if we know that condition is satisfied, can we be sure that I can share the chocolates, or might there be some other problem?
This week’s theorem tells us that this is both a necessary and a sufficient condition.
Theorem (Hall) I can match chocolates to people so that everyone gets a chocolate they like if, and only if, for each k (between 1 and 12), each possible group of k people likes at least k different chocolates between them.
OK, Hall did not write about chocolates. I’ve usually come across this theorem in graph theory, where it talks about finding matchings in bipartite graphs, and where it’s usually phrased in terms of marrying men and women (which is why it’s called Hall’s marriage theorem). But it can also be phrased in the language of group theory (in a way that Wikipedia seems to make particularly hard to understand).
It’s one of those theorems where one direction is pretty easy (it didn’t take us long to prove that the condition was necessary), but the other direction takes a bit more work (it’s certainly not obvious that the condition is sufficient). I wrote about this phenomenon in Theorem 1 on this blog (for example). I think it’s pretty interesting that the condition is indeed sufficient here, because it really isn’t obvious.
I think I’m going to skip the proof here. There are various ways of proving the result, including induction (which is the proof that the Wikipedia page describes). You should be able to find a proof in a graph theory textbook, or just try searching online (or try to prove it for yourself!). There are some very nice proofs, and they’re not terribly difficult.
Where next? It turns out that it’s possible to generalise this result. For example, what would happen if I decided to invite just five people, so that we each get two chocolates? What would the necessary and sufficient condition be then? (You might think of this as the polygamous version of Hall’s theorem!) I’ll leave this as a nice exercise for you.
Of course, I have no intention of allocating chocolates in this way. I intend to eat the ones that I like, and then pass the rest on to some lucky person (who may or may not like Scotch whisky and Earl Grey tea chocolates). But that doesn’t make for a good blog post!
Share this:
Related
This entry was posted on August 18, 2010 at 7:57 am and is filed under Cambridge Maths Tripos, II Graph Theory, Theorem. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
4 Responses to “Theorem 34: Hall’s marriage theorem”
hey, nice blog…really like it and added to bookmarks. keep up with good work
[…] been a bit vague here. The only key idea that I haven’t mentioned, though, is the use of Hall’s marriage theorem to show that it’s possible to do the `joining’ I’ve […]
Thanks a lot for avoiding the term marriage or matching men an women! At least I could finally understand the idea of this theorem without getting my head on anoying analogies.
I love this post. You have a good sense of humour. 🙂
Leave a comment
Δ
Create a free website or blog at WordPress.com.
Entries (RSS) and Comments (RSS). |
2063 | https://courses.lumenlearning.com/slcc-elementaryalgebra/chapter/3-1-intro-functions/ | 3.2: Intro to Functions | Elementary Algebra
Skip to main content
Elementary Algebra
Module 3: Linear Functions and Their Graphs
Search for:
3.2: Intro to Functions
section 3.2 Learning Objectives
3.2: Introduction to Functions
Determine if a relation is a function
Identify the domain and range of a set of ordered pairs
Evaluate a function written in function notation
Find the domain of a rational function
There are many kinds of relations. A relation is simply a correspondence between sets of values or information. Think about members of your family and their ages. The pairing of each member of your family and their age is a relation. Each family member can be paired with an age in the set of ages of your family members. Another example of a relation is the pairing of a state with its U.S. senators. Each state can be matched with two individuals who have each been elected to serve as a senator. In turn, each senator can be matched with one specific state that he or she represents. Both of these are real-life examples of relations.
Determine if a relation is a function
The first value of a relation is an input value and the second value is the output value. A function is a specific type of relation in which each input value has one and only one output value. An input is the independent value, and the output is the dependent value, as it depends on the value of the input.
Which set of values make up the input values and output values can affect whether or not the relation is a function. Notice in the first table below, where the input is “name” and the output is “age,” each input matches with exactly one output. This is an example of a function.
| Family Member’s Name (Input) | Family Member’s Age (Output) |
--- |
| Nellie | 13 13 |
| Marcos | 11 11 |
| Esther | 46 46 |
| Samuel | 47 47 |
| Nina | 47 47 |
| Paul | 47 47 |
| Katrina | 21 21 |
| Andrew | 16 16 |
| Maria | 13 13 |
| Ana | 81 81 |
Compare this with the next table where the input is “age” and the output is “name.” Some of the inputs result in more than one output. This is an example of a correspondence that is not a function.
| Family Member’s Age (Input) | Family Member’s Name (Output) |
--- |
| 11 11 | Marcos |
| 13 13 | Nellie, Maria |
| 16 16 | Andrew |
| 21 21 | Katrina |
| 46 46 | Esther |
| 47 47 | Samuel, Nina, Paul |
| 81 81 | Ana |
Now let us look at some other examples to determine whether the relations are functions or not and under what circumstances. Remember that a relation is a function if there is only one output for each input.
Example 1
Fill in the table.
| Input | Output | Function? | Why or why not? |
--- --- |
| Name of senator | Name of state | | |
| Name of state | Name of senator | | |
| Time elapsed | Height of a tossed ball | | |
| Height of a tossed ball | Time elapsed | | |
| Number of cars | Number of tires | | |
| Number of tires | Number of cars | | |
Show Solution
| Input | Output | Function? | Why or why not? |
--- --- |
| Name of senator | Name of state | Yes | For each input, there will only be one output because a senator only represents one state. |
| Name of state | Name of senator | No | For each state that is an input, 2 names of senators would result because each state has two senators. |
| Time elapsed | Height of a tossed ball | Yes | At a specific time, the ball has one specific height. |
| Height of a tossed ball | Time elapsed | No | Remember that the ball was tossed up and fell down. So for a given height, there could be two different times when the ball was at that height. The input height can result in more than one output. |
| Number of cars | Number of tires | Yes | For any input of a specific number of cars, there is one specific output representing the number of tires. |
| Number of tires | Number of cars | Yes | For any input of a specific number of tires, there is one specific output representing the number of cars (assuming each car has all four of its tires). |
Relations can be written as ordered pairs of numbers or as numbers in a table of values. Unless stated otherwise, the first number of an ordered pair is the x-value and is the input, while the second number is the y-value and is the output.By examining the inputs (x-coordinates) and outputs (y-coordinates), you can determine whether or not the relation is a function. Remember, in a function, each input has only one output.
Identify the domain and range of a set of ordered pairs
There is a name for the set of input values and another name for the set of output values for a function. The set of input values is called the domain of the function. The set of output values is called the range of the function.
If you have a set of ordered pairs, you can find the domain by listing all of the input values, which are the x-coordinates. To find the range, list all of the output values, which are the y-coordinates.
Consider the following set of ordered pairs:
{(−2,0),(0,6),(2,12),(4,18)}{(−2,0),(0,6),(2,12),(4,18)}
You have the following:
Domain:{−2,0,2,4}Range:{0,6,12,18}Domain:{−2,0,2,4}Range:{0,6,12,18}
Now try it yourself.
Example 2
List the domain and range for the following table of values where x is the input and y is the output. Then determine if the relation is a function.
| x | y |
--- |
| −3−3 | 4 4 |
| −2−2 | 4 4 |
| −1−1 | 4 4 |
| 2 2 | 4 4 |
| 3 3 | 4 4 |
Show Solution
The domain describes all the inputs, and we can use set notation with brackets { } to make the list.
Domain:{−3,−2,−1,2,3}Domain:{−3,−2,−1,2,3}
The range describes all the outputs.
Range:{4}Range:{4}
We only listed 4 4 once because it is not necessary to list a number every time it appears in a set.
Each input has only one output, and the fact that it is the same output (4) does not matter.
Therefore, this relation is a function.
A helpful way to visualize this is through an “arrow diagram.” We list our domain and range (and as mentioned above with our range, do not list an element more than once in either set). Then, for each input in the range, we draw an arrow to the output it maps to in the range. This table of values corresponds to the arrow diagram shown below.
Since each input maps to only one output (equivalently, there is only one arrow coming from each input), the relation is a function.
Answer
Domain:{−3,−2,−1,2,3}Domain:{−3,−2,−1,2,3}
Range:{4}Range:{4}
The relation is a function.
In the following video we provide another example of identifying whether a table of values represents a function as well as determining the domain and range of each.
Example 3
Define the domain and range for the following set of ordered pairs, and determine whether the relation given is a function.
{(−3,−6),(−2,−1),(1,0),(1,5),(2,0)}{(−3,−6),(−2,−1),(1,0),(1,5),(2,0)}
Show Solution
We list all of the input values as the domain. The input values are represented first in the ordered pair as a matter of convention.
Domain: {−3,−2,1,2−3,−2,1,2}
Note how we did not enter repeated values more than once; it is not necessary.
The range is the list of outputs for the relation; they are entered second in the ordered pair.
Range: {−6,−1,0,5−6,−1,0,5}
Organizing the ordered pairs in a table can help you tell whether this relation is a function. By definition, the inputs in a function have only one output.
| x | y |
--- |
| −3−3 | −6−6 |
| −2−2 | −1−1 |
| 1 1 | 0 0 |
| 1 1 | 5 5 |
| 2 2 | 0 0 |
The relation is not a function because the input 1 1 has two outputs:0 0 and 5 5.
Again, we could use an arrow diagram to see this visually. Making sure to only list the input 1 once in our domain, we get the following diagram:
Because the input of 1 maps to two different outputs (two arrows coming from one input), this confirms that the relation is not a function.
Answer
Domain: {−3,−2,1,2−3,−2,1,2}
Range: {−6,−1,0,5−6,−1,0,5}
The relation is not a function.
In the following video, we show how to determine whether a relation is a function and how to find the domain and range.
Summary: Determining Whether a Relation is a Function
Identify the input values – this is your domain.
Identify the output values – this is your range.
If each value in the domain leads to only one value in the range, classify the relationship as a function. If any value in the domain leads to two or more values in the range, do not classify the relationship as a function.
Function notation
Some people think of functions as “mathematical machines.” Imagine you have a machine that changes a number according to a specific rule such as “multiply by 3 3 and add 2 2” or “divide by 5 5, add 25 25, and multiply by −1−1.” If you put a number into the machine, a new number will pop out the other end having been changed according to the rule. The number that goes in is called the input, and the number that is produced is called the output.
You can also call the machine “f” for function. If you put x into the machine, f(x), comes out. Mathematically speaking, x is the input, or the “independent variable,” and f(x) is the output, or the “dependent variable,” since it depends on the value of x.
f(x)=4 x+1 f(x)=4 x+1 is written in function notation and is read “f of x equals 4 x 4 x plus 1” It represents the following situation: A function named f acts upon an input, x, and produces f(x) which is equal to 4 x+1 4 x+1. This is the same as the equation y=4 x+1 y=4 x+1.
Function notation gives you more flexibility because you do not have to use y y for every equation. Instead, you could use f(x)f(x) or g(x)g(x)or even c(x)c(x). This can be a helpful way to distinguish equations of functions when you are dealing with more than one at a time.
Using Function Notation
Once we determine that a relationship is a function, we need to display and define the functional relationship so that we can understand it, use it, and possibly even program it into a computer. There are various ways of representing functions. A standard function notation is one representation that facilitates working with functions.
A General Note: Function Notation
The notation y=f(x)y=f(x) defines a function named f f. This is read as “y y is a function of x x.” The letter x x represents the input value, or independent variable. The letter y y or f(x)f(x), represents the output value, or dependent variable.
Example 4
Use function notation to represent a function whose input is the name of a month and output is the number of days in that month.
Show Solution
The number of days in a month is a function of the name of the month, so if we name the function f f, we write f(month)=days f(month)=days or f(m)=d f(m)=d. The name of the month is the input to a “rule” that associates a specific number (the output) with each input.
For example, f(March)=31 f(March)=31, because March has 31 31 days. The notation d=f(m)d=f(m) reminds us that the number of days, d d (the output), is dependent on the name of the month, m m (the input).
Note that the inputs to a function do not have to be numbers; function inputs can be names of people, labels of geometric objects, or any other element that determines some kind of output. However, most of the functions we will work with here will have numbers as inputs and outputs.
Example 5
A function f(y)=N f(y)=N gives the number of police officers, N N, in a town in year y y. What does f(2005)=300 f(2005)=300 represent?
Show Solution
When we read f(2005)=300 f(2005)=300, we see that the input year is 2005. The value for the output, the number of police officers, N N, is 300. The statement f(2005)=300 f(2005)=300 tells us that in the year 2005 there were 300 300 police officers in the town.The notation N=f(y)N=f(y) reminds us that the number of police officers, N N (the output), is dependent on the year, y y (the input).
In the following videos we show two more examples of how to express a relationship using function notation.
Evaluating a function written in function notation
Throughout this course, you have been and will continue working with algebraic equations. Many of these equations are functions. For example, y=4 x+1 y=4 x+1 is an equation that represents a function. When you input values for x, you can determine a single output for y. In this case, if you substitute x=10 x=10 into the equation you will find that y must be 41 41; there is no other value of y that would make the equation true.
Rather than using the variable y, the equations of functions can be written using function notation. Function notation is very useful when you are working with more than one function at a time and substituting more than one value in for x.
Equations written using function notation can also be evaluated. With function notation, you might see the following:
Given f(x)=4 x+1 f(x)=4 x+1 , find f(2)f(2).
You read this problem like this: “given f f of x x equals 4 x 4 x plus one, find f f of 2 2.” While the notation and wording is different, the process of evaluating a function is the same as evaluating an expression at a specific value. In both cases, you substitute 2 2 for x x, multiply it by 4 4 and add 1 1, simplifying to get 9 9. In this function, an input of 2 2 results in an output of 9 9.
f(x)=4 x+1 f(2)=4(2)+1=8+1=9 f(x)=4 x+1 f(2)=4(2)+1=8+1=9
You can simply apply what you already know about evaluating expressions to evaluate a function. It is important to note that the parentheses that are part of function notation do not mean multiply. The notation f(x)f(x)does not mean f f multiplied by x x. Instead, the notation means “f f of x x” or “the function of x x .” To evaluate the function, take the value given for x x , and substitute that value in for x x in the expression. Let us look at a couple of examples.
Example 6
Given f(x)=3 x–4 f(x)=3 x–4,find f(5)f(5).
Show Solution
Substitute 5 5 in for x in the function.
f(5)=3(5)−4 f(5)=3(5)−4
Simplify the expression on the right side of the equation.
f(5)=15−4 f(5)=15−4
f(5)=11 f(5)=11
Functions can be evaluated for negative values of x, too. Keep in mind the rules for integer operations.
Example 7
Given p(x)=2 x 2+5 p(x)=2 x 2+5, find p(−3)p(−3).
Show Solution
Substitute −3−3 in for x in the function.
p(−3)=2(−3)2+5 p(−3)=2(−3)2+5
Simplify the expression on the right side of the equation.
p(−3)=2(9)+5 p(−3)=2(9)+5
p(−3)=18+5 p(−3)=18+5
p(−3)=23 p(−3)=23
You may also be asked to evaluate a function for more than one value as shown in the example that follows.
Example 8
Given f(x)=|4 x−3|f(x)=|4 x−3|, find f(0)f(0), f(2)f(2), and f(−1)f(−1).
Show Solution
Treat each of these like three separate problems. In each case, you substitute the value in for x and simplify.
Start with x=0 x=0.
f(0)=|4(0)−3|=|−3|=3 f(0)=|4(0)−3|=|−3|=3
f(0)=3 f(0)=3
Evaluate for x=2 x=2.
f(2)=|4(2)−3|=|5|=5 f(2)=|4(2)−3|=|5|=5
f(2)=5 f(2)=5
Evaluate for x=−1 x=−1.
f(−1)=|4(−1)−3|=|−7|=7 f(−1)=|4(−1)−3|=|−7|=7
f(−1)=7 f(−1)=7
Next we look at an example where one of the inputs leads to a problem.
Example 9
Given f(x)=2 x x+4 f(x)=2 x x+4, find f(0)f(0), f(3)f(3), and f(−4)f(−4).
Show Solution
We treat this like the previous problems, replacing x x by the given inputs. For the first two, we get
f(0)=2(0)0+4 f(0)=2(0)0+4
f(0)=0 4 f(0)=0 4
f(0)=0 f(0)=0
and
f(3)=2(3)3+4 f(3)=2(3)3+4
f(3)=6 7 f(3)=6 7
However, if we try plugging in x=−4 x=−4, we encounter an issue since division by 0 is undefined.
f(−4)=2(−4)−4+4 f(−4)=2(−4)−4+4
f(−4)=−8 0 f(−4)=−8 0
f(−4)f(−4) is undefined
Finding the domain of a rational function
The previous example has an important implication about the domain of this fractional function, called arational function. Expanding upon our earlier definition of domain, thedomain of a function is the set of input values that lead to valid output values. It follows that for the function f(x)=2 x x+4 f(x)=2 x x+4, x=−4 x=−4 is not in the domain. Moreover, we can see that −4−4 is the only value of x x that results in a zero denominator, so the domain is all x x-values except x=−4 x=−4. In set-builder notation, we would write the domain as {x|x≠−4}{x|x≠−4}.
We conclude this section with an example that explicitly asks for the domain of a rational function.
Example 10
Find the domain of f(x)=1 3 x+4 f(x)=1 3 x+4.
Show Solution
As seen in the previous example, the problem we must avoid is a zero denominator. However, for this function, it may be less obvious what value of x x results in a zero denominator. To find this, we set the denominator equal to zero and solve.
3 x+4=0 3 x+4=0
−4−4––––––––––––−4−4 _
3 x 3=−4 3 3 x 3=−4 3
x=−4 3 x=−4 3
Recall that we don’t want the denominator to be zero, so this is the only value for x x that is not in the domain. In set-builder notation, we would write this as
D={x|x≠−4 3}D={x|x≠−4 3}
Candela Citations
CC licensed content, Shared previously
Modified from Beginning and Intermediate Algebra. Authored by: Tyler Wallace. License: CC BY: Attribution
Provided by: Openstax. Located at: License: CC BY: Attribution
Ex: Function Notation Application Problem. Authored by: James Sousa (Mathispower4u.com) . Located at: License: CC BY: Attribution
Function Notation Application. Authored by: James Sousa (Mathispower4u.com) for Lumen Learning. Located at: License: CC BY: Attribution
Provided by: OpenStax. Located at: License: CC BY: Attribution. License Terms: Download for free at :
Authored by: James Sousa (Mathispower4u.com) . Located at: License: CC BY: Attribution
Licenses and Attributions
CC licensed content, Shared previously
Modified from Beginning and Intermediate Algebra. Authored by: Tyler Wallace. License: CC BY: Attribution
Provided by: Openstax. Located at: License: CC BY: Attribution
Ex: Function Notation Application Problem. Authored by: James Sousa (Mathispower4u.com) . Located at: License: CC BY: Attribution
Function Notation Application. Authored by: James Sousa (Mathispower4u.com) for Lumen Learning. Located at: License: CC BY: Attribution
Provided by: OpenStax. Located at: License: CC BY: Attribution. License Terms: Download for free at :
Authored by: James Sousa (Mathispower4u.com) . Located at: License: CC BY: Attribution
PreviousNext |
2064 | https://www.nagwa.com/en/videos/390194892059/ | Question Video: Investigating the Relation between the Orbital Speed and the Orbital Radius for Objects in Circular Orbits Physics • First Year of Secondary School
Which line on the graph shows the relation between orbital speed and orbital radius for objects moving along circular orbits due to gravity?
Video Transcript
Which line on the graph shows the
relation between orbital speed and orbital radius for objects moving along circular
orbits due to gravity?
The question asks us to identify
which of the curves on this graph, which has orbital radius on the horizontal axis
and orbital speed on the vertical axis, corresponds to the correct functional
relationship between those two quantities. Recall that by equating the
centripetal force and the gravitational force for an object in a circular orbit. We find that the orbital speed is
equal to the square root of the universal gravitation constant times the mass of the
body being orbited divided by the radius of the orbit.
Since our question is only about
the relationship between orbital speed and orbital radius, we can treat the mass of
the body being orbited, that is capital 𝑀, as constant. Then, since capital 𝐺 is also
constant, we can rewrite our formula as orbital speed is equal to the square root of
a constant divided by the orbital radius, where we’ve used the fact that a constant
times a constant is just another constant. Now, using the fact that the square
root of a constant is just another constant, we can rewrite this form as orbital
speed is equal to a constant divided by the square root of the orbital radius.
We don’t actually care about the
identity of this constant. So, we can rewrite this equation as
a qualitative proportionality relationship. And that relationship is that 𝑣 is
proportional to one over the square root of 𝑟. We’ve written the relationship this
way to focus on the connection between orbital speed and orbital radius and avoid
getting confused by constants that are not relevant to this particular question. Let’s now use this functional form
to make predictions for the orbital speed corresponding to large orbital radii, that
is the right edge of the graph, and to small orbital radii, that is the left edge of
the graph.
We can then match those predictions
to the appropriate line. Let’s see what happens as 𝑟
increases. As the orbital radius gets larger,
the square root of the orbital radius also gets larger. So one over the square root of the
orbital radius gets smaller because as the denominator of a fraction grows, the size
of the fraction shrinks. So when orbital radius increases,
we expect orbital speed to decrease. Although because orbital radius can
never be infinite, the orbital speed can never be zero.
Looking at the graph, clearly, the
green line doesn’t work because it never changes, so it isn’t decreasing with
increasing radius. The blue, orange, and red lines all
decrease with increasing radius. But it also can’t be the red line
because the red line reaches zero. And we know that the orbital speed
can never be zero. Let’s now see what happens as the
orbital radius shrinks.
As 𝑟 decreases, so does the square
root of 𝑟. So, the denominator of our fraction
is shrinking. And so, the fraction itself is
growing. And since the fraction is
proportional to orbital speed, the orbital speed is also growing. We also know that as the
denominator of a fraction gets closer and closer to zero, the value of that fraction
increases without limit. So here, too, we expect the orbital
speed to increase without limit as the orbital radius gets closer to zero. The orange curve has a maximum
value as the radius approaches zero. So, the orange curve is not the
right curve because the orbital speed doesn’t increase without limit.
This leaves the blue line as the
correct answer. Indeed, the blue line shows an
orbital speed that gets smaller and smaller as the radius increases and gets larger
and larger without limit as the radius decreases. So, the answer is that the blue
line shows the correct relationship between orbital speed and orbital radius for
objects moving in circular orbits due to gravity.
Lesson Menu
Join Nagwa Classes
Attend live sessions on Nagwa Classes to boost your learning with guidance and advice from an expert teacher!
Nagwa is an educational technology startup aiming to help teachers teach and students learn.
Company
Content
Copyright © 2025 Nagwa
All Rights Reserved
Nagwa uses cookies to ensure you get the best experience on our website. Learn more about our
Privacy Policy |
2065 | https://pressbooks.cuny.edu/oerversiondonotedit/chapter/memory/ | Memory – Psychology 2e OpenStax Updated 2025
Skip to content
Menu
Primary Navigation
Home
Read
Sign in
Search in book: Search
Book Contents Navigation
Contents
Preface
Acknowledgements and Ancillary Materials
1.Introduction to Psychology
2.Psychological Research
3.Biopsychology
4.States of Consciousness
5.Sensation and Perception
6.Learning
7.Thinking and Intelligence
8.Memory
9.Lifespan Development
10.Emotion and Motivation
11.Personality
12.Social Psychology
13.Industrial-Organizational Psychology
14.Stress, Lifestyle, and Health
15.Psychological Disorders
16.Therapy and Treatment
References
Psychology 2e OpenStax Updated 2025
8
Figure 8.1 Photographs can trigger our memories and bring past experiences back to life. (credit: modification of work by Cory Zanker)
CHAPTER OUTLINE
8.1 How Memory Functions
8.2 Parts of the Brain Involved with Memory
8.3 Problems with Memory
8.4 Ways to Enhance Memory
INTRODUCTION:We may be top-notch learners, but if we don’t have a way to store what we’ve learned, what good is the knowledge we’ve gained?
Take a few minutes to imagine what your day might be like if you could not remember anything you had learned. You would have to figure out how to get dressed. What clothing should you wear, and how do buttons and zippers work? You would need someone to teach you how to brush your teeth and tie your shoes. Who would you ask for help with these tasks, since you wouldn’t recognize the faces of these people in your house? Wait . . . is this even your house? Uh oh, your stomach begins to rumble and you feel hungry. You’d like something to eat, but you don’t know where the food is kept or even how to prepare it. Oh dear, this is getting confusing. Maybe it would be best just go back to bed. A bed . . . what is a bed?
We have an amazing capacity for memory, but how, exactly, do we process and store information? Are there different kinds of memory, and if so, what characterizes the different types? How, exactly, do we retrieve our memories? And why do we forget? This chapter will explore these questions as we learn about memory.
8.1 How Memory Functions
LEARNING OBJECTIVES
By the end of this section, you will be able to:
Discuss the three basic functions of memory
Describe the three stages of memory storage
Describe and distinguish between procedural and declarative memory and semantic and episodic memory
Memory is an information processing system; therefore, we often compare it to a computer.Memory is the set of processes used to encode, store, and retrieve information over different periods of time (Figure 8.2).
Figure 8.2 Encoding involves the input of information into the memory system. Storage is the retention of the encoded information. Retrieval, or getting the information out of memory and back into awareness, is the third function.
LINK TO LEARNING: Watch this video of unexpected facts about memoryto learn more.
Encoding
We get information into our brains through a process calledencoding, which is the input of information into the memory system. Once we receive sensory information from the environment, our brains label or code it. We organize the information with other similar information and connect new concepts to existing concepts. Encoding information occurs through automatic processing and effortful processing.
If someone asks you what you ate for lunch today, more than likely you could recall this information quite easily. This is known as automatic processing, or the encoding of details like time, space, frequency, and the meaning of words. Automatic processing is usually done without any conscious awareness. Recalling the last time you studied for a test is another example of automatic processing. But what about the actual test material you studied? It probably required a lot of work and attention on your part in order to encode that information. This is known as effortful processing(Figure 8.3).
Figure 8.3 When you first learn new skills such as driving a car, you have to put forth effort and attention to encode information about how to start a car, how to brake, how to handle a turn, and so on. Once you know how to drive, you can encode additional information about this skill automatically. (credit: Robert Couse-Baker)
What are the most effective ways to ensure that important memories are well encoded? Even a simple sentence is easier to recall when it is meaningful (Anderson, 1984). Read the following sentences (Bransford & McCarrell, 1974), then look away and count backwards from 30 by threes to zero, and then try to write down the sentences (no peeking back at this page!).
The notes were sour because the seams split.
The voyage wasn’t delayed because the bottle shattered.
The haystack was important because the cloth ripped.
How well did you do? By themselves, the statements that you wrote down were most likely confusing and difficult for you to recall. Now, try writing them again, using the following prompts: bagpipe, ship christening, and parachutist. Next count backwards from 40 by fours, then check yourself to see how well you recalled the sentences this time. You can see that the sentences are now much more memorable because each of the sentences was placed in context. Material is far better encoded when you make it meaningful.
There are three types of encoding. The encoding of words and their meaning is known assemantic encoding. It was first demonstrated by William Bousfield (1935) in an experiment in which he asked people to memorize words. The 60 words were actually divided into 4 categories of meaning, although the participants did not know this because the words were randomly presented. When they were asked to remember the words, they tended to recall them in categories, showing that they paid attention to the meanings of the words as they learned them.
Visual encodingis the encoding of images, and acoustic encoding is the encoding of sounds, words in particular. To see how visual encoding works, read over this list of words:car, level, dog, truth, book, value. If you were asked later to recall the words from this list, which ones do you think you’d most likely remember? You would probably have an easier time recalling the words car, dog, and book, and a more difficult time recalling the words level, truth, and value. Why is this? Because you can recall images (mental pictures) more easily than words alone. When you read the words car, dog, and book you created images of these things in your mind. These are concrete, high-imagery words. On the other hand, abstract words like level, truth, and value are low-imagery words. High-imagery words are encoded both visually and semantically (Paivio, 1986), thus building a stronger memory.
Now let’s turn our attention to acoustic encoding. You are driving in your car and a song comes on the radio that you haven’t heard in at least 10 years, but you sing along, recalling every word. In the United States, children often learn the alphabet through song, and they learn the number of days in each month through rhyme:“ Thirty days hath September, / April, June, and November; / All the rest have thirty-one, / Save February, with twenty-eight days clear, / And twenty-nine each leap year.” These lessons are easy to remember because of acoustic encoding. We encode the sounds the words make. This is one of the reasons why much of what we teach young children is done through song, rhyme, and rhythm.
Which of the three types of encoding do you think would give you the best memory of verbal information? Some years ago, psychologists Fergus Craik and Endel Tulving (1975) conducted a series of experiments to find out. Participants were given words along with questions about them. The questions required the participants to process the words at one of the three levels. The visual processing questions included such things as asking the participants about the font of the letters. The acoustic processing questions asked the participants about the sound or rhyming of the words, and the semantic processing questions asked the participants about the meaning of the words. After participants were presented with the words and questions, they were given an unexpected recall or recognition task.
Words that had been encoded semantically were better remembered than those encoded visually or acoustically. Semantic encoding involves a deeper level of processing than the shallower visual or acoustic encoding. Craik and Tulving concluded that we process verbal information best through semantic encoding, especially if we apply what is called the self-reference effect. The self-reference effect is the tendency for an individual to have better memory for information that relates to oneself in comparison to material that has less personal relevance (Rogers, Kuiper, & Kirker, 1977). Could semantic encoding be beneficial to you as you attempt to memorize the concepts in this chapter?
Storage
Once the information has been encoded, we have to somehow retain it. Our brains take the encoded information and place it in storage.Storageis the creation of a permanent record of information.
In order for a memory to go into storage (i.e., long-term memory), it has to pass through three distinct stages:Sensory Memory,Short-Term Memory, and finally Long-Term Memory. These stages were first proposed by Richard Atkinson and Richard Shiffrin(1968). Their model of human memory (Figure 8.4), called Atkinson and Shiffrin's model, is based on the belief that we process memories in the same way that a computer processes information.
Figure 8.4 According to the Atkinson-Shiffrin model of memory, information passes through three distinct stages in order for it to be stored in long-term memory.
Atkinson and Shiffrin’s model is not the only model of memory. Baddeley and Hitch (1974) proposed a working memory model in which short-term memory has different forms. In their model, storing memories in short-term memory is like opening different files on a computer and adding information. The working memory files hold a limited amount of information. The type of short-term memory (or computer file) depends on the type of information received. There are memories in visual-spatial form, as well as memories of spoken or written material, and they are stored in three short-term systems: a visuospatial sketchpad, an episodic buffer (Baddeley, 2000), and a phonological loop. According to Baddeley and Hitch, a central executive part of memory supervises or controls the flow of information to and from the three short-term systems, and the central executive is responsible for moving information into long-term memory.
Sensory Memory
In the Atkinson-Shiffrin model, stimuli from the environment are processed first insensory memory: storage of brief sensory events, such as sights, sounds, and tastes. It is very brief storage—up to a couple of seconds. We are constantly bombarded with sensory information. We cannot absorb all of it, or even most of it. And most of it has no impact on our lives. For example, what was your professor wearing the last class period? As long as the professor was dressed appropriately, it does not really matter what she was wearing. Sensory information about sights, sounds, smells, and even textures, which we do not view as valuable information, we discard. If we view something as valuable, the information will move into our short-term memory system.
Short-Term Memory
Short-term memory (STM)is a temporary storage system that processes incoming sensory memory. The terms short-term and working memory are sometimes used interchangeably, but they are not exactly the same. Short-term memory is more accurately described as a component of working memory. Short-term memory takes information from sensory memory and sometimes connects that memory to something already in long-term memory. Short-term memory storage lasts 15 to 30 seconds. Think of it as the information you have displayed on your computer screen, such as a document, spreadsheet, or website. Then, information in STM goes to long-term memory (you save it to your hard drive), or it is discarded (you delete a document or close a web browser).
Rehearsalmoves information from short-term memory to long-term memory. Active rehearsal is a way of attending to information to move it from short-term to long-term memory. During active rehearsal, you repeat (practice) the information to be remembered. If you repeat it enough, it may be moved into long-term memory. For example, this type of active rehearsal is the way many children learn their ABCs by singing the alphabet song. Alternatively, elaborative rehearsal is the act of linking new information you are trying to learn to existing information that you already know. For example, if you meet someone at a party and your phone is dead but you want to remember his phone number, which starts with area code 203, you might remember that your uncle Abdul lives in Connecticut and has a 203 area code. This way, when you try to remember the phone number of your new prospective friend, you will easily remember the area code. Craik and Lockhart (1972) proposed the levels of processing hypothesis that states the deeper you think about something, the better you remember it.
You may find yourself asking, “How much information can our memory handle at once?” To explore the capacity and duration of your short-term memory, have a partner read the strings of random numbers (Figure 8.5) out loud to you, beginning each string by saying, “Ready?” and ending each by saying, “Recall,” at which point you should try to write down the string of numbers from memory.
Figure 8.5 Work through this series of numbers using the recall exercise explained above to determine the longest string of digits that you can store.
Note the longest string at which you got the series correct. For most people, the capacity will probably be close to 7 plus or minus 2. In 1956, George Miller reviewed most of the research on the capacity of short-term memory and found that people can retain between 5 and 9 items, so he reported the capacity of short-term memory was the “magic number” 7 plus or minus 2. However, more contemporary research has found working memory capacity is 4 plus or minus 1 (Cowan, 2010). Generally, recall is somewhat better for random numbers than for random letters (Jacobs, 1887) and also often slightly better for information we hear (acoustic encoding) rather than information we see (visual encoding) (Anderson, 1969).
Memory trace decay and interference are two factors that affect short-term memory retention. Peterson and Peterson (1959) investigated short-term memory using the three-letter sequences called trigrams (e.g., CLS) that had to be recalled after various time intervals between 3 and 18 seconds. Participants remembered about 80% of the trigrams after a 3-second delay, but only 10% after a delay of 18 seconds, which caused them to conclude that short-term memory decayed in 18 seconds. During decay, the memory trace becomes less activated over time, and the information is forgotten. However, Keppel and Underwood (1962) examined only the first trials of the trigram task and found that proactive interference also affected short-term memory retention. During proactive interference, previously learned information interferes with the ability to learn new information. Both memory trace decay and proactive interference affect short-term memory. Once the information reaches long-term memory, it has to be consolidated at both the synaptic level, which takes a few hours, and into the memory system, which can take weeks or longer.
Long-term Memory
Long-term memory (LTM)is the continuous storage of information. Unlike short-term memory, long-term memory storage capacity is believed to be unlimited. It encompasses all the things you can remember that happened more than just a few minutes ago. One cannot really consider long-term memory without thinking about the way it is organized. Really quickly, what is the first word that comes to mind when you hear “peanut butter”? Did you think of jelly? If you did, you probably have associated peanut butter and jelly in your mind. It is generally accepted that memories are organized in semantic (or associative) networks (Collins & Loftus, 1975). A semantic network consists of concepts, and as you may recall from what you’ve learned about memory, concepts are categories or groupings of linguistic information, images, ideas, or memories, such as life experiences. Although individual experiences and expertise can affect concept arrangement, concepts are believed to be arranged hierarchically in the mind (Anderson & Reder, 1999; Johnson & Mervis, 1997, 1998; Palmer, Jones, Hennessy, Unze, & Pick, 1989; Rosch, Mervis, Gray, Johnson, & Boyes-Braem, 1976; Tanaka & Taylor, 1991). Related concepts are linked, and the strength of the link depends on how often two concepts have been associated.
Semantic networks differ depending on personal experiences. Importantly for memory, activating any part of a semantic network also activates the concepts linked to that part to a lesser degree. The process is known as spreading activation (Collins & Loftus, 1975). If one part of a network is activated, it is easier to access the associated concepts because they are already partially activated. When you remember or recall something, you activate a concept, and the related concepts are more easily remembered because they are partially activated. However, the activations do not spread in just one direction. When you remember something, you usually have several routes to get the information you are trying to access, and the more links you have to a concept, the better your chances of remembering.
There are two types of long-term memory:explicit and implicit(Figure 8.6). Understanding the difference between explicit memory and implicit memory is important because aging, particular types of brain trauma, and certain disorders can impact explicit and implicit memory in different ways.Explicit memories are those we consciously try to remember, recall, and report. For example, if you are studying for your chemistry exam, the material you are learning will be part of your explicit memory. In keeping with the computer analogy, some information in your long-term memory would be like the information you have saved on the hard drive. It is not there on your desktop (your short-term memory), but most of the time you can pull up this information when you want it. Not all long-term memories are strong memories, and some memories can only be recalled using prompts. For example, you might easily recall a fact, such as the capital of the United States, but you might struggle to recall the name of the restaurant at which you had dinner when you visited a nearby city last summer. A prompt, such as that the restaurant was named after its owner, might help you recall the name of the restaurant. Explicit memory is sometimes referred to as declarative memory, because it can be put into words. Explicit memory is divided into episodic memory and semantic memory.
LINK TO LEARNING: View this video that explains short-term and long-term memoryto learn more about how memories are stored and retrieved.
Episodic memoryis information about events we have personally experienced (i.e., an episode). For instance, the memory of your last birthday is an episodic memory. Usually, episodic memory is reported as a story. The concept of episodic memory was first proposed about in the 1970s (Tulving, 1972). Since then, Tulving and others have reformulated the theory, and currently scientists believe that episodic memory is memory about happenings in particular places at particular times—the what, where, and when of an event (Tulving, 2002). It involves recollection of visual imagery as well as the feeling of familiarity (Hassabis & Maguire, 2007).Semantic memoryis knowledge about words, concepts, and language-based knowledge and facts. Semantic memory is typically reported as facts. Semantic means having to do with language and knowledge about language. For example, answers to the following questions like “what is the definition of psychology” and “who was the first African American president of the United States” are stored in your semantic memory.
Implicit memories are long-term memories that are not part of our consciousness. Although implicit memories are learned outside of our awareness and cannot be consciously recalled, implicit memory is demonstrated in the performance of some task (Roediger, 1990; Schacter, 1987). Implicit memory has been studied with cognitive demand tasks, such as performance on artificial grammars (Reber, 1976), word memory (Jacoby, 1983; Jacoby & Witherspoon, 1982), and learning unspoken and unwritten contingencies and rules (Greenspoon, 1955; Giddan & Eriksen, 1959; Krieckhaus & Eriksen, 1960). Returning to the computer metaphor, implicit memories are like a program running in the background, and you are not aware of their influence. Implicit memories can influence observable behaviors as well as cognitive tasks. In either case, you usually cannot put the memory into words that adequately describe the task. There are several types of implicit memories, including procedural, priming, and emotional conditioning.
Figure 8.6 There are two components of long-term memory: explicit and implicit. Explicit memory includes episodic and semantic memory. Implicit memory includes procedural memory and things learned through conditioning.
Implicitprocedural memoryis often studied using observable behaviors (Adams, 1957; Lacey & Smith, 1954; Lazarus & McCleary, 1951). Implicit procedural memory stores information about the way to do something, and it is the memory for skilled actions, such as brushing your teeth, riding a bicycle, or driving a car. You were probably not that good at riding a bicycle or driving a car the first time you tried, but you were much better after doing those things for a year. Your improved bicycle riding was due to learning balancing abilities. You likely thought about staying upright in the beginning, but now you just do it. Moreover, you probably are good at staying balanced, but cannot tell someone the exact way you do it. Similarly, when you first learned to drive, you probably thought about a lot of things that you just do now without much thought. When you first learned to do these tasks, someone may have told you how to do them, but everything you learned since those instructions that you cannot readily explain to someone else as the way to do it is implicit memory.
Implicit priming is another type of implicit memory (Schacter, 1992). During priming exposure to a stimulus affects the response to a later stimulus. Stimuli can vary and may include words, pictures, and other stimuli to elicit a response or increase recognition. For instance, some people really enjoy picnics. They love going into nature, spreading a blanket on the ground, and eating a delicious meal. Now, unscramble the following letters to make a word.
AETPL
What word did you come up with? Chances are good that it was “plate.”
Had you read, “Some people really enjoy growing flowers. They love going outside to their garden, fertilizing their plants, and watering their flowers,” you probably would have come up with the word “petal” instead of plate.
Do you recall the earlier discussion of semantic networks? The reason people are more likely to come up with “plate” after reading about a picnic is that plate is associated (linked) with picnic. Plate was primed by activating the semantic network. Similarly, “petal” is linked to flower and is primed by flower. Priming is also the reason you probably said jelly in response to peanut butter.
Implicit emotional conditioning is the type of memory involved in classically conditioned emotion responses (Olson & Fazio, 2001). These emotional relationships cannot be reported or recalled but can be associated with different stimuli. For example, specific smells can cause specific emotional responses for some people. If there is a smell that makes you feel positive and nostalgic, and you don’t know where that response comes from, it is an implicit emotional response. Similarly, most people have a song that causes a specific emotional response. That song’s effect could be an implicit emotional memory (Yang, Xu, Du, Shi, & Fang, 2011).
EVERYDAY CONNECTION
Can You Remember Everything You Ever Did or Said?
Episodic memories are also called autobiographical memories. Let’s quickly test your autobiographical memory. What were you wearing exactly five years ago today? What did you eat for lunch on April 10, 2009? You probably find it difficult, if not impossible, to answer these questions. Can you remember every event you have experienced over the course of your life—meals, conversations, clothing choices, weather conditions, and so on? Most likely none of us could even come close to answering these questions; however, American actress Marilu Henner, best known for the television show Taxi, can remember. She has an amazing and highly superior autobiographical memory (Figure 8.7).
Figure 8.7 Marilu Henner’s super autobiographical memory is known as hyperthymesia. (credit: Mark Richardson)
Very few people can recall events in this way; right now, fewer than 20 have been identified as having this ability, and only a few have been studied (Parker, Cahill & McGaugh 2006). And although hyperthymesia normally appears in adolescence, two children in the United States appear to have memories from well before their tenth birthdays.
LINK TO LEARNING: Watch this video about superior autobiographical memoryfrom the television news show 60 Minutes to learn more.
Retrieval
So you have worked hard to encode (via effortful processing) and store some important information for your upcoming final exam. How do you get that information back out of storage when you need it? The act of getting information out of memory storage and back into conscious awareness is known asretrieval. This would be similar to finding and opening a paper you had previously saved on your computer’s hard drive. Now it’s back on your desktop, and you can work with it again. Our ability to retrieve information from long-term memory is vital to our everyday functioning. You must be able to retrieve information from memory in order to do everything from knowing how to brush your hair and teeth, to driving to work, to knowing how to perform your job once you get there.
There are three ways you can retrieve information out of your long-term memory storage system: recall, recognition, and relearning.Recallis what we most often think about when we talk about memory retrieval: it means you can access information without cues. For example, you would use recall for an essay test.Recognitionhappens when you identify information that you have previously learned after encountering it again. It involves a process of comparison. When you take a multiple-choice test, you are relying on recognition to help you choose the correct answer. Here is another example. Let’s say you graduated from high school 10 years ago, and you have returned to your hometown for your 10-year reunion. You may not be able to recall all of your classmates, but you recognize many of them based on their yearbook photos.
The third form of retrieval isrelearning, and it’s just what it sounds like. It involves learning information that you previously learned. Whitney took Spanish in high school, but after high school she did not have the opportunity to speak Spanish. Whitney is now 31, and her company has offered her an opportunity to work in their Mexico City office. In order to prepare herself, she enrolls in a Spanish course at the local community center. She’s surprised at how quickly she’s able to pick up the language after not speaking it for 13 years; this is an example of relearning.
8.1 TEST YOURSELF
Summary:
Summary: 8.1 How Memory Functions
Memory is a system or process that stores what we learn for future use.
Our memory has three basic functions: encoding, storing, and retrieving information. Encoding is the act of getting information into our memory system through automatic or effortful processing. Storage is retention of the information, and retrieval is the act of getting information out of storage and into conscious awareness through recall, recognition, and relearning. The idea that information is processed through three memory systems is called the Atkinson-Shiffrin model of memory. First, environmental stimuli enter our sensory memory for a period of less than a second to a few seconds. Those stimuli that we notice and pay attention to then move into short-term memory. According to the Atkinson-Shiffrin model, if we rehearse this information, then it moves into long-term memory for permanent storage. Other models like that of Baddeley and Hitch suggest there is more of a feedback loop between short-term memory and long-term memory. Long-term memory has a practically limitless storage capacity and is divided into implicit and explicit memory.
8.2 Parts of the Brain Involved with Memory
LEARNING OBJECCTIVES
By the end of this section, you will be able to:
Explain the brain functions involved in memory
Recognize the roles of the hippocampus, amygdala, and cerebellum
Are memories stored in just one part of the brain, or are they stored in many different parts of the brain? Karl Lashley began exploring this problem, about 100 years ago, by making lesions in the brains of animals such as rats and monkeys. He was searching for evidence of the engram: the group of neurons that serve as the “physical representation of memory” (Josselyn, 2010). First, Lashley (1950) trained rats to find their way through a maze. Then, he used the tools available at the time—in this case a soldering iron—to create lesions in the rats’ brains, specifically in the cerebral cortex. He did this because he was trying to erase the engram, or the original memory trace that the rats had of the maze.
Lashley did not find evidence of the engram, and the rats were still able to find their way through the maze, regardless of the size or location of the lesion. Based on his creation of lesions and the animals’ reaction, he formulated theequipotentiality hypothesis: if part of one area of the brain involved in memory is damaged, another part of the same area can take over that memory function (Lashley, 1950). Although Lashley’s early work did not confirm the existence of the engram, modern psychologists are making progress locating it. For example, Eric Kandel has spent decades studying the synapse and its role in controlling the flow of information through neural circuits needed to store memories (Mayford, Siegelbaum, & Kandel, 2012).
Many scientists believe that the entire brain is involved with memory. However, since Lashley’s research, other scientists have been able to look more closely at the brain and memory. They have argued that memory is located in specific parts of the brain, and specific neurons can be recognized for their involvement in forming memories. The main parts of the brain involved with memory are the amygdala, the hippocampus, the cerebellum, and the prefrontal cortex (Figure 8.8).
Figure 8.8 The amygdala is involved in fear and fear memories. The hippocampus is associated with declarative and episodic memory as well as recognition memory. The cerebellum plays a role in processing procedural memories, such as how to play the piano. The prefrontal cortex appears to be involved in remembering semantic tasks.
The Amygdala
First, let’s look at the role of the amygdala in memory formation. The main job of the amygdala is to regulate emotions, such as fear and aggression (Figure 8.8). The amygdala plays a part in how memories are stored because storage is influenced by stress hormones. For example, one researcher experimented with rats and the fear response (Josselyn, 2010). Using Pavlovian conditioning, a neutral tone was paired with a foot shock to the rats. This produced a fear memory in the rats. After being conditioned, each time they heard the tone, they would freeze (a defense response in rats), indicating a memory for the impending shock. Then the researchers induced cell death in neurons in the lateral amygdala, which is the specific area of the brain responsible for fear memories. They found the fear memory faded (became extinct). Because of its role in processing emotional information, the amygdala is also involved in memory consolidation: the process of transferring new learning into long-term memory. The amygdala seems to facilitate encoding memories at a deeper level when the event is emotionally arousing.
LINK TO LEARNING:In this TED Talk called “A Mouse. A Laser Beam. A Manipulated Memory,” Steve Ramirez and Xu Liu from MIT talk about using laser beams to manipulate fear memory in rats. Find out why their work caused a media frenzy once it was published in Science.
The Hippocampus
Another group of researchers also experimented with rats to learn how the hippocampus functions in memory processing (Figure 8.8). They created lesions in the hippocampi of the rats, and found that the rats demonstrated memory impairment on various tasks, such as object recognition and maze running. They concluded that the hippocampus is involved in memory, specifically normal recognition memory as well as spatial memory (when the memory tasks are like recall tests) (Clark, Zola, & Squire, 2000). Another job of the hippocampus is to project information to cortical regions that give memories meaning and connect them with other memories. It also plays a part in memory consolidation: the process of transferring new learning into long-term memory.
Injury to this area leaves us unable to process new declarative memories. One famous patient, known for years only as H. M., had both his left and right temporal lobes (hippocampi) removed in an attempt to help control the seizures he had been suffering from for years (Corkin, Amaral, González, Johnson, & Hyman, 1997). As a result, his declarative memory was significantly affected, and he could not form new semantic knowledge. He lost the ability to form new memories, yet he could still remember information and events that had occurred prior to the surgery.
The Cerebellum and Prefrontal Cortex
Although the hippocampus seems to be more of a processing area for explicit memories, you could still lose it and be able to create implicit memories (procedural memory, motor learning, and classical conditioning), thanks to your cerebellum(Figure 8.8). For example, one classical conditioning experiment is to accustom subjects to blink when they are given a puff of air to the eyes. When researchers damaged the cerebellums of rabbits, they discovered that the rabbits were not able to learn the conditioned eye-blink response (Steinmetz, 1999; Green & Woodruff-Pak, 2000).
Other researchers have used brain scans, including positron emission tomography (PET) scans, to learn how people process and retain information. From these studies, it seems the prefrontal cortex is involved. In one study, participants had to complete two different tasks: either looking for the letter a in words (considered a perceptual task) or categorizing a noun as either living or non-living (considered a semantic task) (Kapur et al., 1994). Participants were then asked which words they had previously seen. Recall was much better for the semantic task than for the perceptual task. According to PET scans, there was much more activation in the left inferior prefrontal cortex in the semantic task. In another study, encoding was associated with left frontal activity, while retrieval of information was associated with the right frontal region (Craik et al., 1999).
Neurotransmitters
There also appear to be specific neurotransmitters involved with the process of memory, such as epinephrine, dopamine, serotonin, glutamate, and acetylcholine (Myhrer, 2003). There continues to be discussion and debate among researchers as to which neurotransmitter plays which specific role (Blockland, 1996). Although we don’t yet know which role each neurotransmitter plays in memory, we do know that communication among neurons via neurotransmitters is critical for developing new memories. Repeated activity by neurons leads to increased neurotransmitters in the synapses and more efficient and more synaptic connections. This is how memory consolidation occurs.
It is also believed that strong emotions trigger the formation of strong memories, and weaker emotional experiences form weaker memories; this is called arousal theory(Christianson, 1992). For example, strong emotional experiences can trigger the release of neurotransmitters, as well as hormones, which strengthen memory; therefore, our memory for an emotional event is usually better than our memory for a non-emotional event. When humans and animals are stressed, the brain secretes more of the neurotransmitter glutamate, which helps them remember the stressful event (McGaugh, 2003). This is clearly evidenced by what is known as the flashbulb memory phenomenon.
Aflashbulb memoryis an exceptionally clear recollection of an important event (Figure 8.9). Where were you when you first heard about the 9/11 terrorist attacks? Most likely you can remember where you were and what you were doing. In fact, a Pew Research Center (2011) survey found that for those Americans who were age 8 or older at the time of the event, 97% can recall the moment they learned of this event, even a decade after it happened.
Figure 8.9 Most people can remember where they were when they first heard about the 9/11 terrorist attacks. This is an example of a flashbulb memory: a record of an atypical and unusual event that has very strong emotional associations. (credit: Michael Foran)
DIG DEEPER
Inaccurate and False Memories
Even flashbulb memories for important events can have decreased accuracy with the passage of time. For example, on at least three occasions, when asked how he heard about the terrorist attacks of 9/11, President George W. Bush responded inaccurately. In January 2002, less than 4 months after the attacks, the then sitting President Bush was asked how he heard about the attacks. He responded:
I was sitting there, and my Chief of Staff—well, first of all, when we walked into the classroom, I had seen this plane fly into the first building. There was a TV set on. And you know, I thought it was pilot error and I was amazed that anybody could make such a terrible mistake. (Greenberg, 2004, p. 2)
Contrary to what President Bush stated, no one saw the first plane hit, except people on the ground near the twin towers. Video footage of the first plane was not recorded because it was a normal Tuesday morning, until the first plane hit.
Memory is not like a video recording. Human memory, even flashbulb memories, can be frail. Different parts of them, such as the time, visual elements, and smells, are stored in different places. When something is remembered, these components have to be put back together for the complete memory, which is known as memory reconstruction. Each component creates a chance for an error to occur.False memory is remembering something that did not happen. Research participants have recalled hearing a word, even though they never heard the word (Roediger & McDermott, 2000).
Do you remember where you were when you heard about a historic or perhaps a tragic event? Who were you with and what were you doing? What did you talk about? Can you contact those people you were with? Do they have the same memories as you or do they have different memories?
8.2 TEST YOURSELF
Summary: 8.2 Part of the Brain Involved with Memory
Beginning with Karl Lashley, researchers and psychologists have been searching for the engram, which is the physical trace of memory. Lashley did not find the engram, but he did suggest that memories are distributed throughout the entire brain rather than stored in one specific area. Now we know that three brain areas do play significant roles in the processing and storage of different types of memories: cerebellum, hippocampus, and
amygdala. The cerebellum’s job is to process procedural memories; the hippocampus is where new memories are encoded; the amygdala helps determine what memories to store, and it plays a part in determining where the memories are stored based on whether we have a strong or weak emotional response to the event. Strong emotional experiences can trigger the release of neurotransmitters, as well as hormones, which strengthen memory, so that memory for an emotional event is usually stronger than memory for a non-emotional event. This is shown by what is known as the flashbulb memory phenomenon: our ability to remember significant life events. However, our memory for life events (autobiographical memory) is not always accurate.
8.3 Problems with Memory
LEARNING OBJECTIVES
By the end of this section, you will be able to:
Compare and contrast the two types of amnesia
Discuss the unreliability of eyewitness testimony
Discuss encoding failure
Discuss the various memory errors
Compare and contrast the two types of interference
You may pride yourself on your amazing ability to remember the birthdates and ages of all of your friends and family members, or you may be able recall vivid details of your 5th birthday party at Chuck E. Cheese’s. However, all of us have at times felt frustrated, and even embarrassed, when our memories have failed us. There are several reasons why this happens.
Amnesia
Amnesiais the loss of long-term memory that occurs as the result of disease, physical trauma, or psychological trauma. Endel Tulving (2002) and his colleagues at the University of Toronto studied K. C. for years. K. C. suffered a traumatic head injury in a motorcycle accident and then had severe amnesia. Tulving writes,
the outstanding fact about K.C.’s mental make-up is his utter inability to remember any events, circumstances, or situations from his own life. His episodic amnesia covers his whole life, from birth to the present. The only exception is the experiences that, at any time, he has had in the last minute or two. (Tulving, 2002, p. 14)
Anterograde Amnesia
There are two common types of amnesia: anterograde amnesia and retrograde amnesia (Figure 8.10). Anterograde amnesia is commonly caused by brain trauma, such as a blow to the head. With anterograde amnesia, you cannot remember new information, although you can remember information and events that happened prior to your injury. The hippocampus is usually affected (McLeod, 2011). This suggests that damage to the brain has resulted in the inability to transfer information from short-term to long-term memory; that is, the inability to consolidate memories.
Many people with this form of amnesia are unable to form new episodic or semantic memories, but are still able to form new procedural memories (Bayley & Squire, 2002). This was true of H. M., which was discussed earlier. The brain damage caused by his surgery resulted in anterograde amnesia. H. M. would read the same magazine over and over, having no memory of ever reading it—it was always new to him. He also could not remember people he had met after his surgery. If you were introduced to H. M. and then you left the room for a few minutes, he would not know you upon your return and would introduce himself to you again. However, when presented the same puzzle several days in a row, although he did not remember having seen the puzzle before, his speed at solving it became faster each day (because of relearning) (Corkin, 1965, 1968).
Figure 8.10 This diagram illustrates the timeline of retrograde and anterograde amnesia. Memory problems that extend back in time before the injury and prevent retrieval of information previously stored in long-term memory are known as retrograde amnesia. Conversely, memory problems that extend forward in time from the point of injury and prevent the formation of new memories are called anterograde amnesia.
Retrograde Amnesia
Retrograde amnesiais loss of memory for events that occurred prior to the trauma. People with retrograde amnesia cannot remember some or even all of their past. They have difficulty remembering episodic memories. What if you woke up in the hospital one day and there were people surrounding your bed claiming to be your spouse, your children, and your parents? The trouble is you don’t recognize any of them. You were in a car accident, suffered a head injury, and now have retrograde amnesia. You don’t remember anything about your life prior to waking up in the hospital. This may sound like the stuff of Hollywood movies, and Hollywood has been fascinated with the amnesia plot for nearly a century, going all the way back to the film Garden of Lies from 1915 to more recent movies such as the Jason Bourne spy thrillers. However, for real-life sufferers of retrograde amnesia, like former NFL football player Scott Bolzan, the story is not a Hollywood movie. Bolzan fell, hit his head, and deleted 46 years of his life in an instant. He is now living with one of the most extreme cases of retrograde amnesia on record.
LINK TO LEARNING: View the video story about Scott Bolzan’s amnesia and his attempts to get his life backto learn more.
Memory Construction and Reconstruction
The formulation of new memories is sometimes calledconstruction, and the process of bringing up old memories is calledreconstruction. Yet as we retrieve our memories, we also tend to alter and modify them. A memory pulled from long-term storage into short-term memory is flexible. New events can be added and we can change what we think we remember about past events, resulting in inaccuracies and distortions. People may not intend to distort facts, but it can happen in the process of retrieving old memories and combining them with new memories (Roediger & DeSoto, 2015).
Suggestibility
When someone witnesses a crime, that person’s memory of the details of the crime is very important in catching the suspect. Because memory is so fragile, witnesses can be easily (and often accidentally) misled due to the problem of suggestibility.Suggestibilitydescribes the effects of misinformation from external sources that leads to the creation of false memories. In the fall of 2002, a sniper in the DC area shot people at a gas station, leaving Home Depot, and walking down the street. These attacks went on in a variety of places for over three weeks and resulted in the deaths of ten people. During this time, as you can imagine, people were terrified to leave their homes, go shopping, or even walk through their neighborhoods. Police officers and the FBI worked frantically to solve the crimes, and a tip hotline was set up. Law enforcement received over 140,000 tips, which resulted in approximately 35,000 possible suspects (Newseum, n.d.).
Most of the tips were dead ends, until a white van was spotted at the site of one of the shootings. The police chief went on national television with a picture of the white van. After the news conference, several other eyewitnesses called to say that they too had seen a white van fleeing from the scene of the shooting. At the time, there were more than 70,000 white vans in the area. Police officers, as well as the general public, focused almost exclusively on white vans because they believed the eyewitnesses. Other tips were ignored. When the suspects were finally caught, they were driving a blue sedan.
As illustrated by this example, we are vulnerable to the power of suggestion, simply based on something we see on the news. Or we can claim to remember something that in fact is only a suggestion someone made. It is the suggestion that is the cause of the false memory.
Eyewitness Misidentification
Even though memory and the process of reconstruction can be fragile, police officers, prosecutors, and the courts often rely on eyewitness identification and testimony in the prosecution of criminals. However, faulty eyewitness identification and testimony can lead to wrongful convictions (Figure 8.11).
Figure 8.11 In studying cases where DNA evidence has exonerated people from crimes, the Innocence Project discovered that eyewitness misidentification is the leading cause of wrongful convictions (Benjamin N. Cardozo School of Law, Yeshiva University, 2009).
How does this happen? In 1984, Jennifer Thompson, then a 22-year-old college student in North Carolina, was brutally raped at knifepoint. As she was being raped, she tried to memorize every detail of her rapist’s face and physical characteristics, vowing that if she survived, she would help get him convicted. After the police were contacted, a composite sketch was made of the suspect, and Jennifer was shown six photos. She chose two, one of which was of Ronald Cotton. After looking at the photos for 4–5 minutes, she said, “Yeah. This is the one,” and then she added, “I think this is the guy.” When questioned about this by the detective who asked, “You’re sure? Positive?” She said that it was him. Then she asked the detective if she did OK, and he reinforced her choice by telling her she did great. These kinds of unintended cues and suggestions by police officers can lead witnesses to identify the wrong suspect. The district attorney was concerned about her lack of certainty the first time, so she viewed a lineup of seven men. She said she was trying to decide between numbers 4 and 5, finally deciding that Cotton, number 5, “Looks most like him.” He was 22 years old.
By the time the trial began, Jennifer Thompson had absolutely no doubt that she was raped by Ronald Cotton. She testified at the court hearing, and her testimony was compelling enough that it helped convict him. How did she go from, “I think it’s the guy” and it “Looks most like him,” to such certainty? Gary Wells and Deah Quinlivan (2009) assert it’s suggestive police identification procedures, such as stacking lineups to make the defendant stand out, telling the witness which person to identify, and confirming witnesses choices by telling them “Good choice,” or “You picked the guy.”
After Cotton was convicted of the rape, he was sent to prison for life plus 50 years. After 4 years in prison, he was able to get a new trial. Jennifer Thompson once again testified against him. This time Ronald Cotton was given two life sentences. After serving 11 years in prison, DNA evidence finally demonstrated that Ronald Cotton did not commit the rape, was innocent, and had served over a decade in prison for a crime he did not commit.
LINK TO LEARNING: Watch this first video about Ronald Cotton who was falsely convictedand then watch this second video about the task of his accuser to learn more about the fallibility of memory.
DIG DEEPER
Preserving Eyewitness Memory: The Elizabeth Smart Case
Contrast the Cotton case with what happened in the Elizabeth Smart case. When Elizabeth was 14 years old and fast asleep in her bed at home, she was abducted at knifepoint. Her nine-year-old sister, Mary Katherine, was sleeping in the same bed and watched, terrified, as her beloved older sister was abducted. Mary Katherine was the sole eyewitness to this crime and was very fearful. In the following weeks, the Salt Lake City police and the FBI proceeded with caution with Mary Katherine. They did not want to implant any false memories or mislead her in any way. They did not show her police line-ups or push her to do a composite sketch of the abductor. They knew if they corrupted her memory, Elizabeth might never be found. For several months, there was little or no progress on the case. Then, about 4 months after the kidnapping, Mary Katherine first recalled that she had heard the abductor’s voice prior to that night (he had worked exactly one day as a handyman at the family’s home) and then she was able to name the person whose voice it was. The family contacted the press and others recognized him—after a total of nine months, the suspect was caught and Elizabeth Smart was returned to her family.
The Misinformation Effect
Cognitive psychologist Elizabeth Loftus has conducted extensive research on memory. She has studied false memories as well as recovered memories of childhood sexual abuse. Loftus also developed themisinformation effect paradigm, which holds that after exposure to additional and possibly inaccurate information, a person may misremember the original event.
According to Loftus, an eyewitness’s memory of an event is very flexible due to the misinformation effect. To test this theory, Loftus and John Palmer (1974) asked 45 U.S. college students to estimate the speed of cars using different forms of questions (Figure 8.12). The participants were shown films of car accidents and were asked to play the role of the eyewitness and describe what happened. They were asked, “About how fast were the cars going when they (smashed, collided, bumped, hit, contacted) each other?” The participants estimated the speed of the cars based on the verb used.
Participants who heard the word “smashed” estimated that the cars were traveling at a much higher speed than participants who heard the word “contacted.” The implied information about speed, based on the verb they heard, had an effect on the participants’ memory of the accident. In a follow-up one week later, participants were asked if they saw any broken glass (none was shown in the accident pictures). Participants who had been in the “smashed” group were more than twice as likely to indicate that they did remember seeing glass. Loftus and Palmer demonstrated that a leading question encouraged them to not only remember the cars were going faster, but to also falsely remember that they saw broken glass.
Figure 8.12 When people are asked leading questions about an event, their memory of the event may be altered. (credit a: modification of work by Rob Young)
Controversies over Repressed and Recovered Memories
Other researchers have described how whole events, not just words, can be falsely recalled, even when they did not happen. The idea that memories of traumatic events could be repressed has been a theme in the field of psychology, beginning with Sigmund Freud, and the controversy surrounding the idea continues today.
Recall of false autobiographical memories is calledfalse memory syndrome. This syndrome has received a lot of publicity, particularly as it relates to memories of events that do not have independent witnesses—often the only witnesses to the abuse are the perpetrator and the victim (e.g., sexual abuse).
On one side of the debate are those who have recovered memories of childhood abuse years after it occurred. These researchers argue that some children’s experiences have been so traumatizing and distressing that they must lock those memories away in order to lead some semblance of a normal life. They believe that repressed memories can be locked away for decades and later recalled intact through hypnosis and guided imagery techniques (Devilly, 2007).
Research suggests that having no memory of childhood sexual abuse is quite common in adults. For instance, one large-scale study conducted by John Briere and Jon Conte (1993) revealed that 59% of 450 men and women who were receiving treatment for sexual abuse that had occurred before age 18 had forgotten their experiences. Ross Cheit (2007) suggested that repressing these memories created psychological distress in adulthood. The Recovered Memory Project was created so that victims of childhood sexual abuse can recall these memories and allow the healing process to begin (Cheit, 2007; Devilly, 2007).
On the other side, Loftus has challenged the idea that individuals can repress memories of traumatic events from childhood, including sexual abuse, and then recover those memories years later through therapeutic techniques such as hypnosis, guided visualization, and age regression.
Loftus is not saying that childhood sexual abuse doesn’t happen, but she does question whether or not those memories are accurate, and she is skeptical of the questioning process used to access these memories, given that even the slightest suggestion from the therapist can lead to misinformation effects. For example, researchers Stephen Ceci and Maggie Brucks (1993, 1995) asked three-year-old children to use an anatomically correct doll to show where their pediatricians had touched them during an exam. Fifty-five percent of the children pointed to the genital/anal area on the dolls, even when they had not received any form of genital exam.
Ever since Loftus published her first studies on the suggestibility of eyewitness testimony in the 1970s, social scientists, police officers, therapists, and legal practitioners have been aware of the flaws in interview practices. Consequently, steps have been taken to decrease suggestibility of witnesses. One way is to modify how witnesses are questioned. When interviewers use neutral and less leading language, children more accurately recall what happened and who was involved (Goodman, 2006; Pipe, 1996; Pipe, Lamb, Orbach, & Esplin, 2004). Another change is in how police lineups are conducted. It’s recommended that a blind photo lineup be used. This way the person administering the lineup doesn’t know which photo belongs to the suspect, minimizing the possibility of giving leading cues. Additionally, judges in some states now inform jurors about the possibility of misidentification. Judges can also suppress eyewitness testimony if they deem it unreliable.
Forgetting
“I’ve a grand memory for forgetting,” quipped Robert Louis Stevenson.Forgettingrefers to loss of information from long-term memory. We all forget things, like a loved one’s birthday, someone’s name, or where we put our car keys. As you’ve come to see, memory is fragile, and forgetting can be frustrating and even embarrassing. But why do we forget? To answer this question, we will look at several perspectives on forgetting.
Encoding Failure
Sometimes memory loss happens before the actual memory process begins, which is encoding failure. We can’t remember something if we never stored it in our memory in the first place. This would be like trying to find a book on your e-reader that you never actually purchased and downloaded. Often, in order to remember something, we must pay attention to the details and actively work to process the information (effortful encoding). Lots of times we don’t do this. For instance, think of how many times in your life you’ve seen a penny. Can you accurately recall what the front of a U.S. penny looks like? When researchers Raymond Nickerson and Marilyn Adams (1979) asked this question, they found that most Americans don’t know which one it is. The reason is most likely encoding failure. Most of us never encode the details of the penny. We only encode enough information to be able to distinguish it from other coins. If we don’t encode the information, then it’s not in our long-term memory, so we will not be able to remember it.
Figure 8.13 Can you tell which coin, (a), (b), (c), or (d) is the accurate depiction of a US nickel? The correct answer is (c).
Memory Errors
Psychologist Daniel Schacter (2001), a well-known memory researcher, offers seven ways our memories fail us. He calls them the seven sins of memory and categorizes them into three groups: forgetting, distortion, and intrusion (Table 8.1).
Table 8.1
Let’s look at the first sin of the forgetting errors:transience, which means that memories can fade over time. Here’s an example of how this happens. Nathan’s English teacher has assigned his students to read the novel To Kill a Mockingbird. Nathan comes home from school and tells his mom he has to read this book for class. “Oh, I loved that book!” she says. Nathan asks her what the book is about, and after some hesitation, she says, “Well . . . I know I read the book in high school, and I remember that one of the main characters is named Scout, and her father is an attorney, but I honestly don’t remember anything else.” Nathan wonders if his mother actually read the book, and his mother is surprised she can’t recall the plot. What is going on here is storage decay: unused information tends to fade with the passage of time.
In 1885, German psychologist Hermann Ebbinghaus analyzed the process of memorization. First, he memorized lists of nonsense syllables. Then he measured how much he learned (retained) when he attempted to relearn each list. He tested himself over different periods of time from 20 minutes later to 30 days later. The result is his famous forgetting curve (Figure 8.14). Due to storage decay, an average person will lose 50% of the memorized information after 20 minutes and 70% of the information after 24 hours (Ebbinghaus, 1885/1964). Your memory for new information decays quickly and then eventually levels out.
Figure 8.14 The Ebbinghaus forgetting curve shows how quickly memory for new information decays.
Are you constantly losing your cell phone? Have you ever driven back home to make sure you turned off the stove? Have you ever walked into a room for something, but forgotten what it was? You probably answered yes to at least one, if not all, of these examples—but don’t worry, you are not alone. We are all prone to committing the memory error known as absentmindedness, which describes lapses in memory caused by breaks in attention or our focus being somewhere else.
Cynthia, a psychologist, recalls a time when she recently committed the memory error of absentmindedness.
When I was completing court-ordered psychological evaluations, each time I went to the court, I was issued a temporary identification card with a magnetic strip which would open otherwise locked doors. As you can imagine, in a courtroom, this identification is valuable and important and no one wanted it to be lost or be picked up by a criminal. At the end of the day, I would hand in my temporary identification. One day, when I was almost done with an evaluation, my daughter’s day care called and said she was sick and needed to be picked up. It was flu season, I didn’t know how sick she was, and I was concerned. I finished up the evaluation in the next ten minutes, packed up my briefcase, and rushed to drive to my daughter’s day care. After I picked up my daughter, I could not remember if I had handed back my identification or if I had left it sitting out on a table. I immediately called the court to check. It turned out that I had handed back my identification. Why could I not remember that? (personal communication, September 5, 2013)
When have you experienced absentmindedness?
“I just streamed this movie called Oblivion, and it had that famous actor in it. Oh, what’s his name? He’s been in all of those movies, like The Shawshank Redemption and The Dark Knight trilogy. I think he’s even won an Oscar. Oh gosh, I can picture his face in my mind, and hear his distinctive voice, but I just can’t think of his name! This is going to bug me until I can remember it!” This particular error can be so frustrating because you have the information right on the tip of your tongue. Have you ever experienced this? If so, you’ve committed the error known as[pb_glossary id=”862″]blocking[/pb_glossary]: you can’t access stored information (Figure 8.15).
Figure 8.15 Blocking is also known as tip-of-the-tongue (TOT) phenomenon. The memory is right there, but you can’t seem to recall it, just like not being able to remember the name of that very famous actor, Morgan Freeman. (credit: modification of work by D. Miller)
Now let’s take a look at the three errors of distortion: misattribution, suggestibility, and bias. Misattribution happens when you confuse the source of your information. Let’s say Alejandra was dating Lucia and they saw the first Hobbit movie together. Then they broke up and Alejandra saw the second Hobbit movie with someone else. Later that year, Alejandra and Lucia get back together. One day, they are discussing how the Hobbit books and movies are different and Alejandra says to Lucia, “I loved watching the second movie with you and seeing you jump out of your seat during that super scary part.” When Lucia responded with a puzzled and then angry look, Alejandra realized she’d committed the error of misattribution.
What if someone is a victim of rape shortly after watching a television program? Is it possible that the victim could actually blame the rape on the person she saw on television because of misattribution? This is exactly what happened to Donald Thomson.
Australian eyewitness expert Donald Thomson appeared on a live TV discussion about the unreliability of eyewitness memory. He was later arrested, placed in a lineup and identified by a victim as the man who had raped her. The police charged Thomson although the rape had occurred at the time he was on TV. They dismissed his alibi that he was in plain view of a TV audience and in the company of the other discussants, including an assistant commissioner of police. . . . Eventually, the investigators discovered that the rapist had attacked the woman as she was watching TV—the very program on which Thomson had appeared. Authorities eventually cleared Thomson. The woman had confused the rapist’s face with the face that she had seen on TV. (Baddeley, 2004, p. 133)
The second distortion error is suggestibility. Suggestibility is similar to misattribution, since it also involves false memories, but it’s different. With misattribution you create the false memory entirely on your own, which is what the victim did in the Donald Thomson case above. With suggestibility, it comes from someone else, such as a therapist or police interviewer asking leading questions of a witness during an interview.
Memories can also be affected bybias, which is the final distortion error. Schacter (2001) says that your feelings and view of the world can actually distort your memory of past events. There are several types of bias:
Stereotypical bias involves racial and gender biases. For example, when Asian American and European American research participants were presented with a list of names, they more frequently incorrectly remembered typical African American names such as Jamal and Tyrone to be associated with the occupation basketball player, and they more frequently incorrectly remembered typical White names such as Greg and Howard to be associated with the occupation of politician (Payne, Jacoby, & Lambert, 2004).
Egocentric bias involves enhancing our memories of the past (Payne et al., 2004). Did you really score the winning goal in that big soccer match, or did you just assist?
Hindsight bias happens when we think an outcome was inevitable after the fact. This is the “I knew it all along” phenomenon. The reconstructive nature of memory contributes to hindsight bias (Carli, 1999). We remember untrue events that seem to confirm that we knew the outcome all along.
Have you ever had a song play over and over in your head? How about a memory of a traumatic event, something you really do not want to think about? When you keep remembering something, to the point where you can’t “get it out of your head” and it interferes with your ability to concentrate on other things, it is calledpersistence. It’s Schacter’s seventh and last memory error. It’s actually a failure of our memory system because we involuntarily recall unwanted memories, particularly unpleasant ones (Figure 8.16). For instance, you witness a horrific car accident on the way to work one morning, and you can’t concentrate on work because you keep remembering the scene.
Figure 8.16 Many veterans of military conflicts involuntarily recall unwanted, unpleasant memories. (credit: Department of Defense photo by U.S. Air Force Tech. Sgt. Michael R. Holzworth)
Interference
Sometimes information is stored in our memory, but for some reason it is inaccessible. This is known as interference, and there are two types: proactive interference and retroactive interference (Figure 8.17). Have you ever gotten a new phone number or moved to a new address, but right after you tell people the old (and wrong) phone number or address? When the new year starts, do you find you accidentally write the previous year? These are examples ofproactive interference: when old information hinders the recall of newly learned information.Retroactive interferencehappens when information learned more recently hinders the recall of older information. For example, this week you are studying about memory and learn about the Ebbinghaus forgetting curve. Next week you study lifespan development and learn about Erikson’s theory of psychosocial development, but thereafter have trouble remembering Ebbinghaus’s work because you can only remember Erickson’s theory.
Figure 8.17 Sometimes forgetting is caused by a failure to retrieve information. This can be due to interference, either retroactive or proactive.
8.3 TEST YOURSELF
Summary: 8.3 Problems with Memory
All of us at times have felt dismayed, frustrated, and even embarrassed when our memories have failed us. Our memory is flexible and prone to many errors, which is why eyewitness testimony has been found to be largely unreliable. There are several reasons why forgetting occurs. In cases of brain trauma or disease, forgetting may be due to amnesia. Another reason we forget is due to encoding failure. We can’t remember something if we never stored it in our memory in the first place. Schacter presents seven memory errors that also contribute to forgetting. Sometimes, information is actually stored in our memory, but we cannot access it due to interference. Proactive interference happens when old information hinders the recall of newly learned information. Retroactive interference happens when information learned more recently hinders the recall of older information.
8.4 Ways to Enhance Memory
LEARNING OBJECTIVES
By the end of this section, you will be able to:
Recognize and apply memory-enhancing strategies
Recognize and apply effective study techniques
Most of us suffer from memory failures of one kind or another, and most of us would like to improve our memories so that we don’t forget where we put the car keys or, more importantly, the material we need to know for an exam. In this section, we’ll look at some ways to help you remember better, and at some strategies for more effective studying.
Memory-Enhancing Strategies
What are some everyday ways we can improve our memory, including recall? To help make sure information goes from short-term memory to long-term memory, you can usememory-enhancing strategies. One strategy isrehearsal, or the conscious repetition of information to be remembered (Craik & Watkins, 1973). Think about how you learned your multiplication tables as a child. You may recall that 6 x 6 = 36, 6 x 7 = 42, and 6 x 8 = 48. Memorizing these facts is rehearsal.
Another strategy ischunking: you organize information into manageable bits or chunks (Bodie, Powers, & Fitch-Hauser, 2006). Chunking is useful when trying to remember information like dates and phone numbers. Instead of trying to remember 5205550467, you remember the number as 520-555-0467. So, if you met an interesting person at a party and you wanted to remember his phone number, you would naturally chunk it, and you could repeat the number over and over, which is the rehearsal strategy.
LINK TO LEARNING: Try this fun activity that employs a memory-enchancing strategyto learn more.
You could also enhance memory by usingelaborative rehearsal: a technique in which you think about the meaning of new information and its relation to knowledge already stored in your memory (Tigner, 1999). Elaborative rehearsal involves both linking the information to knowledge already stored and repeating the information. For example, in this case, you could remember that 520 is an area code for Arizona and the person you met is from Arizona. This would help you better remember the 520 prefix. If the information is retained, it goes into long-term memory.
Mnemonic devicesare memory aids that help us organize information for encoding (Figure 8.18). They are especially useful when we want to recall larger bits of information such as steps, stages, phases, and parts of a system (Bellezza, 1981). Brian needs to learn the order of the planets in the solar system, but he’s having a hard time remembering the correct order. His friend Kelly suggests a mnemonic device that can help him remember. Kelly tells Brian to simply remember the name Mr. VEM J. SUN, and he can easily recall the correct order of the planets:Mercury,Venus,Earth,Mars,Jupiter,Saturn,Uranus, andNeptune. You might use a mnemonic device to help you remember someone’s name, a mathematical formula, or the order of mathematical operations.
Figure 8.18 This is a knuckle mnemonic to help you remember the number of days in each month. Months with 31 days are represented by the protruding knuckles and shorter months fall in the spots between knuckles. (credit: modification of work by Cory Zanker)
If you have ever watched the television show Modern Family, you might have seen Phil Dunphy explain how he remembers names:
The other day I met this guy named Carl. Now, I might forget that name, but he was wearing a Grateful Dead t-shirt. What’s a band like the Grateful Dead? Phish. Where do fish live? The ocean. What else lives in the ocean? Coral. Hello, Co-arl. (Wrubel & Spiller, 2010)
It seems the more vivid or unusual the mnemonic, the easier it is to remember. The key to using any mnemonic successfully is to find a strategy that works for you.
LINK TO LEARNING: Joshua Foer is a science writer who “accidentally” won the U.S. Memory Championships. Watch his TEDTalk, titled “Feats of Memory Anyone Can Do,” in which he explains a mnemonic device called the memory palaceto learn more.
Some other strategies that are used to improve memory include expressive writing and saying words aloud. Expressive writing helps boost your short-term memory, particularly if you write about a traumatic experience in your life. Masao Yogo and Shuji Fujihara (2008) had participants write for 20-minute intervals several times per month. The participants were instructed to write about a traumatic experience, their best possible future selves, or a trivial topic. The researchers found that this simple writing task increased short-term memory capacity after five weeks, but only for the participants who wrote about traumatic experiences. Psychologists can’t explain why this writing task works, but it does.
What if you want to remember items you need to pick up at the store? Simply say them out loud to yourself. A series of studies (MacLeod, Gopie, Hourihan, Neary, & Ozubko, 2010) found that saying a word out loud improves your memory for the word because it increases the word’s distinctiveness. Feel silly, saying random grocery items aloud? This technique works equally well if you just mouth the words. Using these techniques increased participants’ memory for the words by more than 10%. These techniques can also be used to help you study.
How to Study Effectively
Based on the information presented in this chapter, here are some strategies and suggestions to help you hone your study techniques (Figure 8.19). The key with any of these strategies is to figure out what works best for you.
Figure 8.19 Memory techniques can be useful when studying for class. (credit: Barry Pousman)
Use elaborative rehearsal: In a famous article, Fergus Craik and Robert Lockhart (1972) discussed their belief that information we process more deeply goes into long-term memory. Their theory is called levels of processing. If we want to remember a piece of information, we should think about it more deeply and link it to other information and memories to make it more meaningful. For example, if we are trying to remember that the hippocampus is involved with memory processing, we might envision a hippopotamus with excellent memory and then we could better remember the hippocampus.
Apply the self-reference effect: As you go through the process of elaborative rehearsal, it would be even more beneficial to make the material you are trying to memorize personally meaningful to you. In other words, make use of the self-reference effect. Write notes in your own words. Write definitions from the text, and then rewrite them in your own words. Relate the material to something you have already learned for another class, or think how you can apply the concepts to your own life. When you do this, you are building a web of retrieval cues that will help you access the material when you want to remember it.
Use distributed practice: Study across time in short durations rather than trying to cram it all in at once. Memory consolidation takes time, and studying across time allows time for memories to consolidate. In addition, cramming can cause the links between concepts to become so active that you get stuck in a link, and it prevents you from accessing the rest of the information that you learned.
Rehearse, rehearse, rehearse: Review the material over time, in spaced and organized study sessions. Organize and study your notes, and take practice quizzes/exams. Link the new information to other information you already know well.
Study efficiently: Students are great highlighters, but highlighting is not very efficient because students spend too much time studying the things they already learned. Instead of highlighting, use index cards. Write the question on one side and the answer on the other side. When you study, separate your cards into those you got right and those you got wrong. Study the ones you got wrong and keep sorting. Eventually, all your cards will be in the pile you answered correctly.
Be aware of interference: To reduce the likelihood of interference, study during a quiet time without interruptions or distractions (like television or music).
Keep moving: Of course you already know that exercise is good for your body, but did you also know it’s also good for your mind? Research suggests that regular aerobic exercise (anything that gets your heart rate elevated) is beneficial for memory (van Praag, 2008). Aerobic exercise promotes neurogenesis: the growth of new brain cells in the hippocampus, an area of the brain known to play a role in memory and learning.
Get enough sleep: While you are sleeping, your brain is still at work. During sleep the brain organizes and consolidates information to be stored in long-term memory (Abel & Bäuml, 2013).
Make use of mnemonic devices: As you learned earlier in this chapter, mnemonic devices often help us to remember and recall information. There are different types of mnemonic devices, such as the acronym. An acronym is a word formed by the first letter of each of the words you want to remember. For example, even if you live near one, you might have difficulty recalling the names of all five Great Lakes. What if I told you to think of the word Homes? HOMES is an acronym that represents Huron, Ontario, Michigan, Erie, and Superior: the five Great Lakes. Another type of mnemonic device is an acrostic: you make a phrase of all the first letters of the words. For example, if you are taking a math test and you are having difficulty remembering the order of operations, recalling the following sentence will help you: “Please Excuse My Dear Aunt Sally,” because the order of mathematical operations is Parentheses, Exponents, Multiplication, Division, Addition, Subtraction. There also are jingles, which are rhyming tunes that contain keywords related to the concept, such as i before e, except after c.
8.4 TEST YOURSELF
Summary: 8.4 Ways to Enhance Memory
There are many ways to combat the inevitable failures of our memory system. Some common strategies that can be used in everyday situations include mnemonic devices, rehearsal, self-referencing, and adequate sleep. These same strategies also can help you to study more effectively.
Critical Thinking Questions
Compare and contrast implicit and explicit memory.
According to the Atkinson-Shiffrin model, name and describe the three stages of memory.
Compare and contrast the two ways in which we encode information.
What might happen to your memory system if you sustained damage to your hippocampus?
Compare and contrast the two types of interference.
Compare and contrast the two types of amnesia.
What is the self-reference effect, and how can it help you study more effectively?
You and your roommate spent all of last night studying for your psychology test. You think you know the material; however, you suggest that you study again the next morning an hour prior to the test. Your roommate asks you to explain why you think this is a good idea. What do you tell them?
Personal Application Questions
Describe something you have learned that is now in your procedural memory. Discuss how you learned this information.
Describe something you learned in high school that is now in your semantic memory.
Describe a flashbulb memory of a significant event in your life.
Which of the seven memory errors presented by Schacter have you committed? Provide an example of each one.
Jurors place a lot of weight on eyewitness testimony. Imagine you are an attorney representing a defendant who is accused of robbing a convenience store. Several eyewitnesses have been called to testify against your client. What would you tell the jurors about the reliability of eyewitness testimony?
Create a mnemonic device to help you remember a term or concept from this chapter.
What is an effective study technique that you have used? How is it similar to/different from the strategies suggested in this chapter?
Study Guide Outline: Memory Chapter 8.
(Note: Any of the information below can be placed on flash cards or used to create a flowchart or a concept map.)
1. How Memory Functions
A. Overview
Memory is the system we use to encode, store, and retrieve information—similar to how a computer processes data.
B. Encoding: Getting Information In
Definition: Input of information into the memory system.
Encoding information occurs through:
Automatic Processing: Unconscious (e.g., time, space, what you ate for lunch).
Effortful Processing: Requires focus and attention (e.g., studying for a test).
Types of Encoding:
Semantic: Meaning of words and concepts
Example: Grouping related words together
Visual: Mental Images
Example: Remembering “dog” better than “truth”
Acoustic: Sound (especially words)
Example: Remembering a rhyme or song
Semantic encoding is the most effective for learning verbal information—especially if it’s personally meaningful (self-reference effect).
C. Storage: Keeping Information
Definition: Creating a permanent record of information.
Based on Atkinson &Shiffrin’s 3-stage model:
Sensory Memory: Brief input from senses (lasts 1–2 seconds).
Short-Term Memory (STM): Temporary (15–30 seconds), limited (5–9 items).
Long-Term Memory (LTM): Lasts potentially forever, unlimited capacity.
Working Memory (Baddeley &Hitch)
STM isn’t just one system—it includes:
Visuospatial Sketchpad (visual info)
Phonological Loop (sound info)
Episodic Buffer (links to long-term memory)
Central Executive (controls and organizes info)
D. Short-Term Memory (STM)
Holds current thoughts/info.
Capacity: ~7 items (±2), or possibly ~4 (newer research).
Rehearsal:
Maintenance (Active): Repetition (e.g., repeating phone number).
Elaborative: Linking new info to existing knowledge (e.g., area code = uncle’s).
Interference and Decay:
Decay: Info fades quickly if not rehearsed (~18 seconds).
Proactive Interference: Old info blocks new info.
E. Long-Term Memory (LTM)
Unlimited and durable storage.
Organized in semantic networks (related concepts linked).
Spreading activation: Triggering one idea activates related ones.
Types of Long-Term Memory:
| Type | Description | Example |
---
| Explicit (Declarative) | Conscious recall | Facts, experiences |
| – Semantic | Facts, meanings | “Capital of France is Paris” |
| – Episodic | Personal events | “My 18th birthday party” |
| Implicit | Unconscious recall | Riding a bike, classical conditioning |
| – Procedural | Motor skills | Typing, brushing teeth |
| – Priming | Earlier exposure affects response | Recognizing a word faster if seen before |
| – Emotional Conditioning | Learned emotional responses | Feeling anxious at dentist’s office |
F. Retrieval
Retrieval is the process of getting information out of long-term memory and bringing it back into conscious awareness.
Think of it like opening a saved file on your computer—you stored it earlier, and now you’re accessing it to use again.
Types:
Recall:
Definition: Accessing information without any cues.
Example: Answering an essay question on a test.
Key Idea: You must “pull” the info from memory on your own.
Recognition:
Definition: Identifying previously learned information when you see it again.
Example: Choosing the correct answer on a multiple-choice test.
Key Idea: Involves comparison—you recognize the right answer from options.
Relearning:
Definition: Learning something again that you previously learned.
Example: Taking a Spanish class years after high school and finding it easier than expected.
Key Idea: Shows how memory can be retained even if not actively used for years.
2. Parts of the Brain Involved with Memory
A. Are Memories Stored in One Part of the Brain?
No, memories are stored in many parts of the brain.
Early research by Karl Lashley:
Tried to find the engram (physical trace of memory) using lesions on rats’ cerebral cortex.
Equipotentiality Hypothesis: If one area is damaged, other areas can take over memory functions.
Modern research shows specific brain areas are involved in different types of memory.
B. Key Brain Structures Involved in Memory
Amygdala
Function: Regulates emotion (fear, aggression).
Role in Memory:
Helps store emotional memories.
Involved in memory consolidation, especially for emotionally charged events.
Damage can erase fear memories (e.g., tone-shock conditioning in rats).
Hippocampus
Function: Involved in forming new memories.
Role in Memory:
Supports recognition memory and spatial memory.
Connects new memories with existing knowledge.
Crucial for declarative memory (facts/events).
Case of H.M.: Removal of hippocampi led to loss of ability to form new memories, but old memories remained.
Cerebellum
Function: Coordinates movement and motor skills.
Role in Memory:
Involved in implicit memories (like skills and conditioned responses).
Example: Rabbits with cerebellum damage could not learn a conditioned eye-blink.
Prefrontal Cortex
Function: Involved in thinking, decision-making, and memory tasks.
Role in Memory:
Active during semantic tasks (understanding meaning).
PET scans show:
Left frontal lobe: encoding information.
Right frontal lobe: retrieving information.
C. Neurotransmitters and Memory
Key neurotransmitters: Epinephrine, dopamine, serotonin, glutamate, acetylcholine.
Function:
Help neurons communicate, which is essential for memory formation.
Repeated neural activity strengthens synapses – basis of memory consolidation.
D. Arousal and Memory
Arousal Theory
Strong emotional experiences = strong memories.
Weak emotions = weaker memories.
Emotional events trigger neurotransmitter and hormone release, enhancing memory.
Flashbulb Memory:
Vivid, detailed memory of an emotionally significant event.
Example: Remembering where you were during 9/11.
Supported by studies showing long-lasting emotional memory recall.
3. Problems with Memory
A. What is Amnesia?
Definition: Loss of long-term memory due to disease, injury, or trauma.
Example: Patient K.C. could not recall any personal life events—only retained experiences from the last minute or two.
B. Types of Amnesia
Anterograde Amnesia:
Inability to form new long-term memories after trauma.
Hippocampus usually affected.
Example: H.M. couldn’t form new memories but could improve on puzzles through procedural memory.
Retrograde Amnesia:
Inability to recall past memories from before trauma.
Affects episodic memory.
Example: Scott Bolzan lost 46 years of memory after a head injury.
C. Memory Construction and Reconstruction
Construction: Forming new memories.
Reconstruction: Recalling and potentially altering existing memories.
Memory is flexible—can unintentionally change when combined with new information.
D. Suggestibility and False Memories
Suggestibility: Memory can be influenced by external information, leading to false memories.
Example: D.C. sniper case—focus on a white van led to thousands of false tips due to suggestion.
False Memory: A distorted or fabricated recollection of an event.
Often occurs during retrieval when suggestion alters memory content.
E. Eyewitness Misidentification
Eyewitness memory can be inaccurate, leading to wrongful convictions.
Causes: Leading questions, police reinforcement, non-blind lineups.
Example: Ronald Cotton was wrongly convicted based on misidentification.
F. The Misinformation Effect
Introduced by Elizabeth Loftus
Misinformation Effect Paradigm: After being given misleading info, people may misremember the original event.
Study: Car crash video—wording like “smashed” vs. “contacted” affected speed estimates and memory of broken glass (even when there was none).
G. Repressed and Recovered Memories
False Memory Syndrome: Remembering an event (like abuse) that didn’t actually happen.
Controversy: Can traumatic memories be repressed and later recovered?
Supporters: Say trauma can be blocked and later recalled (e.g., through hypnosis).
Critics (Loftus): Warn that suggestion during therapy can create inaccurate memories.
Example: Children misidentified genital exams with dolls due to suggestive questioning.
Modern Safeguards
Use neutral questioning.
Blind lineups in police work.
Judges may inform jurors about risks of misidentification or exclude unreliable testimony.
H. Forgetting
Forgetting is the loss of information from long-term memory.
Memory is not perfect — it’s fragile and prone to errors and failure.
I. Encoding Failure
Occurs before memory storage — information never enters long-term memory.
Example: Most people can’t recall what a penny looks like in detail — we never paid enough attention to encode it.
Effortful encoding is needed for strong memories.
J. Memory Errors:
Memory researcher Daniel Schacter identified seven ways memory fails (See Table 8.1 for a summary of the information found below), grouped into:
Forgetting
Distortion
Intrusion
Forgetting Errors
Transience
Memory fades over time (storage decay).
Example: Forgetting details of a book you read in high school. Ebbinghaus’s Forgetting Curve:
50% of learned info is lost after 20 minutes.
70% is lost after 24 hours.
Absentmindedness
Lapses in memory due to inattention.
Example: Forgetting if you returned your ID badge because your mind was on your sick child.
Blocking
“Tip of the tongue” phenomenon — you know the info but can’t retrieve it.
Example: Trying to remember an actor’s name you know well.
Distortion Errors
Misattribution
Confusing the source of a memory.
Example: Thinking you saw a movie with one person, when it was someone else.
Famous case: Donald Thomson was wrongly identified as a rapist because the victim confused him with someone on TV.
Suggestibility
False memories form due to external influence, such as leading questions.
Differs from misattribution, which is internally generated.
Bias
Current beliefs or feelings distort memory
Stereotypical bias: Racial/gender assumptions.
Egocentric bias: Inflating your role in past events.
Hindsight bias: Thinking “I knew it all along” after an event.
Intrusion Error
Persistence
Unwanted, intrusive memories keep recurring.
Often involves trauma or emotionally charged memories.
Example: Witnessing a car crash and being unable to focus afterward.
K. Interference: Memory Competition
Proactive Interference
Old info blocks new learning
Example: Giving out your old address instead of your new one.
Retroactive Interference
New info blocks access to old memories.
Example: Learning new psychology terms makes it hard to remember previously studied concepts.
4. Ways to Enhance Memory
A. Memory Enhancing Strategies
Rehearsal
Definition:Repeating information over and over to remember it.
Example:Repeating multiplication facts like 6 × 6 = 36.
Chunking
Definition:Breaking down information into smaller, manageable units.
Example:Phone number 5205550467 becomes 520-555-0467.
Elaborative Rehearsal
Definition:Linking new info to existing knowledge and giving it meaning.
Example:Connecting area code 520 to someone being from Arizona.
Mnemonic Devices
Definition:Memory aids that help encode and recall large amounts of information.
Examples:
Acronym:HOMES for the Great Lakes (Huron, Ontario, Michigan, Erie, Superior).
Acrostic:Please Excuse My Dear Aunt Sally for math operations.
Jingles:Rhymes like “i before e, except after c.”
Expressive Writing
Definition:Writing about personal experiences to improve short-term memory.
Note:Works best when writing about emotional or traumatic events.
Saying Words Aloud
Definition:Speaking or mouthing words boosts distinctiveness and recall.
Example:Saying grocery items aloud improves memory of them.
B. How to Study Effectively
Use Elaborative Rehearsal
Deeply process info and link it to what you already know.
Example: Picture a “hippopotamus with great memory” to remember the hippocampus.
Apply the Self-Reference Effect
Make the info personally meaningful.
Example: Relate psychology terms to your daily life or other classes.
Use Distributed Practice
Study a little over time (not all at once).
Promotes memory consolidation and reduces overload.
Rehearse Regularly
Review info in spaced sessions.
Use practice quizzes and connect ideas.
Study Efficiently
Avoid over-highlighting. Instead:
Use flashcards.
Focus on what you get wrong and keep practicing.
Minimize Interference
Study in a quiet, distraction-free environment.
Avoid multitasking (like watching TV or listening to music).
Exercise
Regular aerobic exercise (like jogging or biking) improves brain health and memory.
Promotes growth of new brain cells in the hippocampus.
Sleep Well
Sleep helps your brain consolidate and store memories.
Use Mnemonics (Again !)
Great for memorizing lists, orders, or systems.
Types: Acronyms, acrostics, rhymes, jingles.
Access for free at
definition
set of processes used to encode, store, and retrieve information over different periods of time
×Close definition
input of information into the memory system
×Close definition
encoding of informational details like time, space, frequency, and the meaning of words
×Close definition
encoding of information that takes effort and attention
×Close definition
input of words and their meaning
×Close definition
input of images
×Close definition
input of sounds, words, and music
×Close definition
creation of a permanent record of information
×Close definition
memory model that states we process information through three systems: sensory memory, short-term memory, and long-term memory
×Close definition
storage of brief sensory events, such as sights, sounds, and tastes
×Close definition
holds about seven bits of information before it is forgotten or stored, as well as information that has been retrieved and is being used
×Close definition
repetition of information to be remembered
×Close definition
thinking about the meaning of new information and its relation to knowledge already stored in your memory
×Close definition
old information hinders the recall of newly learned information
×Close definition
continuous storage of information
×Close definition
memories we consciously try to remember and recall
×Close definition
memories that are not part of our consciousness
×Close definition
type of declarative memory that contains information about events we have personally experienced, also known as autobiographical memory
×Close definition
type of declarative memory about words, concepts, and language-based knowledge and facts
×Close definition
type of long-term memory for making skilled actions, such as how to brush your teeth, how to drive a car, and how to swim
×Close definition
act of getting information out of long-term memory storage and back into conscious awareness
×Close definition
accessing information without cues
×Close definition
identifying previously learned information after encountering it again, usually in response to a cue
×Close definition
learning information that was previously learned
×Close definition
physical trace of memory
×Close definition
some parts of the brain can take over for damaged parts in forming and storing memories
×Close definition
exceptionally clear recollection of an important event
×Close definition
recall of false autobiographical memories
×Close definition
loss of long-term memory that occurs as the result of disease, physical trauma, or psychological trauma
×Close definition
loss of memory for events that occur after the brain trauma
×Close definition
loss of memory for events that occurred prior to brain trauma
×Close definition
formulation of new memories
×Close definition
process of bringing up old memories that might be distorted by new information
×Close definition
effects of misinformation from external sources that leads to the creation of false memories
×Close definition
after exposure to additional and possibly inaccurate information, a person may misremember the original event
×Close definition
recall of false autobiographical memories
×Close definition
loss of information from long-term memory
×Close definition
memory error in which unused memories fade with the passage of time
×Close definition
lapses in memory that are caused by breaks in attention or our focus being somewhere else
×Close definition
memory error in which you confuse the source of your information
×Close definition
how feelings and view of the world distort memory of past events
×Close definition
failure of the memory system that involves the involuntary recall of unwanted memories, particularly unpleasant ones
×Close definition
information learned more recently hinders the recall of older information
×Close definition
techniques to help make sure information goes from short-term memory to long-term memory
×Close definition
organizing information into manageable bits or chunks
×Close definition
memory aids that help organize information for encoding
×Close definition
tendency for an individual to have better memory for information that relates to oneself in comparison to material that has less personal relevance
×Close definition
Previous/next navigation
Previous: Thinking and Intelligence
Next: Lifespan Development
Back to top
License
Psychology 2e OpenStax Updated 2025 Copyright © 2020 by Openstax is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.
Share This Book
Pressbooks
Powered by Pressbooks
Pressbooks User Guide
|Pressbooks Directory
|Contact
Pressbooks on YouTubePressbooks on LinkedIn |
2066 | https://stackify.com/solid-design-liskov-substitution-principle/ | Stackify is now BMC. Read theBlog
SOLID Design Principles Explained: The Liskov Substitution Principle with Code Examples
By: Thorben
| April 11, 2018
The Open/Closed Principle, which I explained in a previous article, is one of the key concepts in OOP that enables you to write robust, maintainable and reusable software components. But following the rules of that principle alone is not enough to ensure that you can change one part of your system without breaking other parts. Your classes and interfaces also need to follow the Liskov Substitution Principle to avoid any side-effects.
The Liskov Substitution Principle is the 3rd of Robert C. Martin‘s famous SOLID design principles:
Single Responsibility Principle
Open/Closed Principle
Liskov Substitution Principle
Interface Segregation Principle
Dependency Inversion
It extends the Open/Closed Principle by focusing on the behavior of a superclass and its subtypes. As I will show you in this article, this is at least as important but harder to validate that the structural requirements of the Open/Closed Principle.
Definition of the Liskov Substitution Principle
The Liskov Substitution principle was introduced by Barbara Liskov in her conference keynote “Data abstraction” in 1987. A few years later, she published a paper with Jeanette Wing in which they defined the principle as:
Let Φ(x) be a property provable about objects x of type T. Then Φ(y) should be true for objects y of type S where S is a subtype of T.
OK, let’s be honest. Such a scientific definition might be necessary, but it doesn’t help a lot in our daily work as software developers. So, what does it mean for our code?
The Liskov Substitution Principle in practical software development
The principle defines that objects of a superclass shall be replaceable with objects of its subclasses without breaking the application. That requires the objects of your subclasses to behave in the same way as the objects of your superclass. You can achieve that by following a few rules, which are pretty similar to the design by contract concept defined by Bertrand Meyer.
An overridden method of a subclass needs to accept the same input parameter values as the method of the superclass. That means you can implement less restrictive validation rules, but you are not allowed to enforce stricter ones in your subclass. Otherwise, any code that calls this method on an object of the superclass might cause an exception, if it gets called with an object of the subclass.
Similar rules apply to the return value of the method. The return value of a method of the subclass needs to comply with the same rules as the return value of the method of the superclass. You can only decide to apply even stricter rules by returning a specific subclass of the defined return value, or by returning a subset of the valid return values of the superclass.
Enforcing the Liskov Substitution Principle
If you decide to apply this principle to your code, the behavior of your classes becomes more important than its structure. Unfortunately, there is no easy way to enforce this principle. The compiler only checks the structural rules defined by the Java language, but it can’t enforce a specific behavior.
You need to implement your own checks to ensure that your code follows the Liskov Substitution Principle. In the best case, you do this via code reviews and test cases. In your test cases, you can execute a specific part of your application with objects of all subclasses to make sure that none of them causes an error or significantly changes its performance. You can try to do similar checks during a code review. But what’s even more important is that you check that you created and executed all the required test cases.
Okay, enough theory. Let’s take a look at an example
Making coffee with the Liskov Substitution Principle
Most articles about the Liskov Substitution Principle use an example in which they implement a Rectangle and a Square class to show that you break the design principle if your Square class extends the Rectangle class.
But that example is a little bit boring. There are already lots of articles about it, and I have never implemented an application that just requires a set of simple geometric shapes. So, let’s create an example that’s a little bit more fun.
I enjoy drinking a good cup of coffee in the morning, and I want to show you a simple application that uses different kinds of coffee machines to brew a cup of coffee. You might already know very similar examples from my previous articles about the Single Responsibility Principle or the Open/Closed Principle. You can get all source files of this example at
If you enjoy coffee as much as I do, you most likely used several different coffee machines in the past. There are relatively basic ones that you can use to transform one or two scoops of ground coffee and a cup of water into a nice cup of filter coffee. And there are others that include a grinder to grind your coffee beans and you can use to brew different kinds of coffee, like filter coffee and espresso.
If you decide to implement an application that automatically brews a cup of coffee every morning so that you don’t have to get out of bed before it’s ready, you might decide to model these coffee machines as two classes with the methods addCoffee and brewCoffee.
A basic coffee machine
The BasicCoffeeMachine can only brew filter coffee. So, the brewCoffee method checks if the provided CoffeeSelection value is equal to FILTER_COFFEE before it calls the private brewFilterCoffee method to create and return a CoffeeDrink object.
```
public class BasicCoffeeMachine {
private Map configMap;
private Map groundCoffee;
private BrewingUnit brewingUnit;
public BasicCoffeeMachine(Map coffee) {
this.groundCoffee = coffee;
this.brewingUnit = new BrewingUnit();
this.configMap = new HashMap();
this.configMap.put(CoffeeSelection.FILTER_COFFEE,
new Configuration(30, 480));
}
public CoffeeDrink brewCoffee(CoffeeSelection selection)
throws CoffeeException {
switch (selection) {
case FILTER_COFFEE:
return brewFilterCoffee();
default:
throw new CoffeeException(
"CoffeeSelection [" + selection + "] not supported!");
}
}
private CoffeeDrink brewFilterCoffee() {
Configuration config = configMap.get(CoffeeSelection.FILTER_COFFEE);
// get the coffee
GroundCoffee groundCoffee = this.groundCoffee.get(
CoffeeSelection.FILTER_COFFEE);
// brew a filter coffee
return this.brewingUnit.brew(CoffeeSelection.FILTER_COFFEE,
groundCoffee, config.getQuantityWater());
}
public void addCoffee(CoffeeSelection sel, GroundCoffee newCoffee)
throws CoffeeException {
GroundCoffee existingCoffee = this.groundCoffee.get(sel);
if (existingCoffee != null) {
if (existingCoffee.getName().equals(newCoffee.getName())) {
existingCoffee.setQuantity(
existingCoffee.getQuantity() + newCoffee.getQuantity());
} else {
throw new CoffeeException(
"Only one kind of coffee supported for each CoffeeSelection.");
}
} else {
this.groundCoffee.put(sel, newCoffee);
}
}
}
```
The addCoffee method expects a CoffeeSelection enum value and a GroundCoffee object. It uses the CoffeeSelection as the key of the internal groundCoffee Map.
These are the most important parts of the BasicCoffeeMachine class. Let’s take a look at the PremiumCoffeeMachine.
A premium coffee machine
The premium coffee machine has an integrated grinder, and the internal implementation of the brewCoffee method is a little more complex. But you don’t see that from the outside. The method signature is identical to the one of the BasicCoffeeMachine class.
```
public class PremiumCoffeeMachine {
private Map<CoffeeSelection, Configuration> configMap;
private Map<CoffeeSelection, CoffeeBean> beans; private Grinder grinder;
private BrewingUnit brewingUnit;
public PremiumCoffeeMachine(Map<CoffeeSelection, CoffeeBean> beans) {
this.beans = beans;
this.grinder = new Grinder();
this.brewingUnit = new BrewingUnit();
this.configMap = new HashMap<>();
this.configMap.put(CoffeeSelection.FILTER_COFFEE,
new Configuration(30, 480));
this.configMap.put(CoffeeSelection.ESPRESSO,
new Configuration(8, 28));
}
@Override
public CoffeeDrink brewCoffee(CoffeeSelection selection)
throws CoffeeException {
switch(selection) {
case ESPRESSO:
return brewEspresso();
case FILTER_COFFEE:
return brewFilterCoffee();
default:
throw new CoffeeException(
"CoffeeSelection [" + selection + "] not supported!");
}
}
private CoffeeDrink brewEspresso() {
Configuration config = configMap.get(CoffeeSelection.ESPRESSO);
// grind the coffee beans
GroundCoffee groundCoffee = this.grinder.grind(
this.beans.get(CoffeeSelection.ESPRESSO),
config.getQuantityCoffee());
// brew an espresso
return this.brewingUnit.brew(CoffeeSelection.ESPRESSO,
groundCoffee, config.getQuantityWater());
}
private CoffeeDrink brewFilterCoffee() {
Configuration config = configMap.get(CoffeeSelection.FILTER_COFFEE);
// grind the coffee beans
GroundCoffee groundCoffee = this.grinder.grind(
this.beans.get(CoffeeSelection.FILTER_COFFEE),
config.getQuantityCoffee());
// brew a filter coffee
return this.brewingUnit.brew(CoffeeSelection.FILTER_COFFEE,
groundCoffee, config.getQuantityWater());
}
public void addCoffee(CoffeeSelection sel, CoffeeBean newBeans)
throws CoffeeException {
CoffeeBean existingBeans = this.beans.get(sel);
if (existingBeans != null) {
if (existingBeans.getName().equals(newBeans.getName())) {
existingBeans.setQuantity(
existingBeans.getQuantity() + newBeans.getQuantity());
} else {
throw new CoffeeException(
"Only one kind of coffee supported for each CoffeeSelection.");
}
} else {
this.beans.put(sel, newBeans);
}
}
}
```
But that’s not the case for the addCoffee method. It expects an object of type CoffeeBean instead of an object of type GroundCoffee. If you add a shared superclass or an interface that gets implemented by the BasicCoffeeMachine and the PremiumCoffeeMachine class, you will need to decide how to handle this difference.
Introducing a shared interface
You can either create another abstraction, e.g., Coffee, as the superclass of CoffeeBean and GroundCoffee and use it as the type of the method parameter. That would unify the structure of both addCoffee methods, but require additional validation in both methods. The addCoffee method of the BasicCoffeeMachine class would need to check that the caller provided an instance of GroundCoffee, and the addCoffee implementation of the PremiumCoffeeMachine would require an instance of CoffeeBean. This would obviously break the Liskov Substitution Principle because the validation would fail if you provide a BasicCoffeeMachine object instead of a PremiumCoffeeMachine and vice versa.
The better approach is to exclude the addCoffee method from the interface or superclass because you can’t interchangeably implement it. The brewCoffee method, on the other hand, could be part of a shared interface or a superclass, as long as the superclass or interface only guarantees that you can use it to brew filter coffee. The input parameter validation of both implementations accept the CoffeeSelection value FILTER_COFFEE. The addCoffee method of the PremiumCoffeeMachine class also accepts the enum value ESPRESSO. But as I explained at the beginning of this article, the different subclasses may implement less restrictive validation rules.
Summary
The Liskov Substitution Principle is the third of Robert C. Martin’s SOLID design principles. It extends the Open/Closed principle and enables you to replace objects of a parent class with objects of a subclass without breaking the application. This requires all subclasses to behave in the same way as the parent class. To achieve that, your subclasses need to follow these rules:
Don’t implement any stricter validation rules on input parameters than implemented by the parent class.
Apply at the least the same rules to all output parameters as applied by the parent class.
With APM, server health metrics, and error log integration, improve your application performance with Stackify Retrace. Try your free two week trial today
Related posts:
How Spring Boot Can Level Up your Spring Application
Top Java Tools: 63 Tools to Power Every Phase of Java Development
How to Specify and Handle Exceptions in Java
What to Do About Java Memory Leaks: Tools, Fixes, and More
Finally Getting the Most out of the Java Thread Pool
Improve Your Code with Retrace APM
Stackify's APM tools are used by thousands of .NET, Java, PHP, Node.js, Python, & Ruby developers all over the world.
Explore Retrace's product features to learn more.
App Performance Management
Code Profiling
Error Tracking
Centralized Logging
App & Server Metrics
Learn More
Author
Thorben
More articles by Thorben
Get the latest news, tips, and guides on software development.
Join the community of 40,000 developers that subscribe to our newsletter.
By submitting your email address, you agree to be contacted via e-mail about our products and services. You can unsubscribe at any time.
Popular Posts
###### Performance Testing Types, Steps, Best Practices, and More
###### Learn Python: Tutorials for Beginners, Intermediate, and Advanced Programmers
###### Learn Java: Tutorials for Beginners, Intermediate, and Advanced Programmers
###### What are CRUD Operations: How CRUD Operations Work, Examples, Tutorials & More
###### Node.js Error Handling Best Practices: Ship With Confidence
Topics/Keywords
.NET.NET CoreJavanode.jsPHPPythonRubyagileagile methodologyAIAPIapmAPM for Allapplication optimizationapplication performanceapplication profilingApplication Programming
Latest Posts
###### Stackify Retrace Use Cases – Quality Assurance
###### Stackify Retrace Use Cases – Customer Support
###### What Is Powershell? An Introduction
###### Strategy Pattern: Definition, Examples, and Best Practices
###### PHP Try Catch: A PHP Exception Handling Tutorial |
2067 | https://pubmed.ncbi.nlm.nih.gov/40234111/ | Familial chylomicronemia syndrome: An expert clinical review from the National Lipid Association - PubMed
Clipboard, Search History, and several other advanced features are temporarily unavailable.
Skip to main page content
An official website of the United States government
Here's how you know
The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.
The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.
Log inShow account info
Close
Account
Logged in as:
username
Dashboard
Publications
Account settings
Log out
Access keysNCBI HomepageMyNCBI HomepageMain ContentMain Navigation
Search: Search
AdvancedClipboard
User Guide
Save Email
Send to
Clipboard
My Bibliography
Collections
Citation manager
Display options
Display options
Format
Save citation to file
Format:
Create file Cancel
Email citation
On or after July 28, sending email will require My NCBI login. Learn more about this and other changes coming to the email feature.
Subject: 1 selected item: 40234111 - PubMed
To:
From:
Format:
[x] MeSH and other data
Send email Cancel
Add to Collections
Create a new collection
Add to an existing collection
Name your collection:
Name must be less than 100 characters
Choose a collection:
Unable to load your collection due to an error
Please try again
Add Cancel
Add to My Bibliography
My Bibliography
Unable to load your delegates due to an error
Please try again
Add Cancel
Your saved search
Name of saved search:
Search terms:
Test search terms
Would you like email updates of new search results? Saved Search Alert Radio Buttons
Yes
No
Email: (change)
Frequency:
Which day?
Which day?
Report format:
Send at most:
[x] Send even when there aren't any new results
Optional text in email:
Save Cancel
Create a file for external citation management software
Create file Cancel
Your RSS Feed
Name of RSS Feed:
Number of items displayed:
Create RSS Cancel
RSS Link Copy
Full text links
Elsevier Science
Full text links
Actions
Cite
Collections
Add to Collections
Create a new collection
Add to an existing collection
Name your collection:
Name must be less than 100 characters
Choose a collection:
Unable to load your collection due to an error
Please try again
Add Cancel
Permalink
Permalink
Copy
Display options
Display options
Format
Page navigation
Title & authors
Abstract
Conflict of interest statement
Similar articles
Cited by
Publication types
MeSH terms
Substances
Supplementary concepts
Related information
LinkOut - more resources
Review
J Clin Lipidol
Actions
Search in PubMed
Search in NLM Catalog
Add to Search
. 2025 May-Jun;19(3):382-403.
doi: 10.1016/j.jacl.2025.03.013. Epub 2025 Mar 22.
Familial chylomicronemia syndrome: An expert clinical review from the National Lipid Association
Fiza Javed1,Robert A Hegele2,Abhimanyu Garg3,Nivedita Patni4,Daniel Gaudet5,Lauren Williams6,Mohamed Khan7,Qingyang Li7,Zahid Ahmad8
Affiliations Expand
Affiliations
1 Department of Medicine, Faculty of Health Sciences, McMaster University, Hamilton, ON, Canada (Dr Javed).
2 Department of Medicine and Robarts Research Institute, Schulich School of Medicine and Dentistry, Western University, London, ON, Canada (Dr Hegele).
3 Section of Nutrition and Metabolic Diseases, Division of Endocrinology, Department of Internal Medicine and the Center for Human Nutrition, UT Southwestern Medical Center, Dallas, TX, USA (Dr Garg).
4 Division of Pediatric Endocrinology, Department of Pediatrics, UT Southwestern Medical Center, Dallas, TX, USA (Dr Patni).
5 ECOGENE-21 Department of Medicine, Université de Montréal, Chicoutimi, QC, Canada (Dr Gaudet).
6 Department of Pediatric Cardiology, Baylor Scott & White McLane Children's Medical Center, Temple, TX, USA (Ms Williams).
7 FCS Foundation, San Diego, CA, USA (Mr Khan and Mr Li).
8 Section of Nutrition and Metabolic Diseases, Division of Endocrinology, Department of Internal Medicine, UT Southwestern Medical Center, Dallas, TX, USA (Dr Ahmad). Electronic address: Zahid.ahmad@utsouthwestern.edu.
PMID: 40234111
DOI: 10.1016/j.jacl.2025.03.013
Item in Clipboard
Review
Familial chylomicronemia syndrome: An expert clinical review from the National Lipid Association
Fiza Javed et al. J Clin Lipidol.2025 May-Jun.
Show details
Display options
Display options
Format
J Clin Lipidol
Actions
Search in PubMed
Search in NLM Catalog
Add to Search
. 2025 May-Jun;19(3):382-403.
doi: 10.1016/j.jacl.2025.03.013. Epub 2025 Mar 22.
Authors
Fiza Javed1,Robert A Hegele2,Abhimanyu Garg3,Nivedita Patni4,Daniel Gaudet5,Lauren Williams6,Mohamed Khan7,Qingyang Li7,Zahid Ahmad8
Affiliations
1 Department of Medicine, Faculty of Health Sciences, McMaster University, Hamilton, ON, Canada (Dr Javed).
2 Department of Medicine and Robarts Research Institute, Schulich School of Medicine and Dentistry, Western University, London, ON, Canada (Dr Hegele).
3 Section of Nutrition and Metabolic Diseases, Division of Endocrinology, Department of Internal Medicine and the Center for Human Nutrition, UT Southwestern Medical Center, Dallas, TX, USA (Dr Garg).
4 Division of Pediatric Endocrinology, Department of Pediatrics, UT Southwestern Medical Center, Dallas, TX, USA (Dr Patni).
5 ECOGENE-21 Department of Medicine, Université de Montréal, Chicoutimi, QC, Canada (Dr Gaudet).
6 Department of Pediatric Cardiology, Baylor Scott & White McLane Children's Medical Center, Temple, TX, USA (Ms Williams).
7 FCS Foundation, San Diego, CA, USA (Mr Khan and Mr Li).
8 Section of Nutrition and Metabolic Diseases, Division of Endocrinology, Department of Internal Medicine, UT Southwestern Medical Center, Dallas, TX, USA (Dr Ahmad). Electronic address: Zahid.ahmad@utsouthwestern.edu.
PMID: 40234111
DOI: 10.1016/j.jacl.2025.03.013
Item in Clipboard
Full text links Cite
Display options
Display options
Format
Abstract
Familial chylomicronemia syndrome (FCS) is a rare Mendelian autosomal recessive disorder (MIM 238600) characterized by extreme and sustained hypertriglyceridemia due to profound reduction of lipoprotein lipase (LPL) activity. This expert opinion statement synthesizes current knowledge on the definition, pathophysiology, genetics, prevalence, diagnosis, and management of FCS. FCS typically manifests at a young age with persistent severe hypertriglyceridemia-defined as ≥10 mmol/L (≥885 mg/dL), or ≥1000 mg/dL (≥11.2 mmol/L) depending on region and whether Systeme International (SI) units are utilized-in the absence of secondary factors, resistance to conventional lipid-lowering therapies, and a high lifetime risk of acute pancreatitis. It is caused by biallelic pathogenic variants in the LPL gene encoding LPL, or 1 of 4 other related genes that encode proteins that interact with LPL. Affected individuals require a strict, lifelong very low-fat diet with <15% of energy from fat. Emerging therapies inhibiting apolipoprotein C-III show promise in reducing serum triglycerides and pancreatitis risk in patients with FCS. A multidisciplinary approach, encompassing dietary management, pharmacotherapy, and patient education, is pivotal in mitigating the significant morbidity associated with FCS.
Keywords: Acute pancreatitis; Chylomicronemia; Familial chylomicronemia syndrome; Hyperlipoproteinemia type 1; Hypertriglyceridemia; Hypertriglyceridemic pancreatitis; Lipemia; Lipoprotein lipase; Lipoprotein lipase deficiency; Triglyceride.
Copyright © 2025 National Lipid Association. Published by Elsevier Inc. All rights reserved.
PubMed Disclaimer
Conflict of interest statement
Declaration of competing interest F.J., M.K., Q.L. reports no conflicts of interest. A.G. consults for Chiesi, Regeneron, and Zvelt Pharmaceuticals, and has received grant support from Chiesi, Regeneron, Quintiles, Akcea Pharmaceuticals, and Intercept Pharmaceuticals. AG has NIH funding related to treatment options for FCS R33-HL66373 (Garg) NHLBI. N.P. has consulted for Chiesi, and has NIH funding related to treatment options for FCS R33-HL66373 (Garg) NHLBI. D.G. has received funding and/or consulting fees from Alnylam, Amgen, Chiesi (Amryt), Applied therapeutics, Arrowhead, Astra Zeneca, Boehringer-Ingelheim, CRISPR Therapeutics, Eli Lilly, Esperion, Flagship Pioneering, Ionis, Kowa, National Research Council Canada, New Amsterdam Pharma, Novartis, Novo Nordisk, Pfizer, Regeneron, Sanofi, Ultragenyx, Uniqure, and Verve therapeutics. L.W. has no conflicts of interest to declare. R.A.H. reports grants or contracts from Ionis, Arrowhead, Novartis, Amryt; consulting fees from Arrowhead, Amgen, Acasti Pharma, Aegerion Pharmaceuticals, Akcea Therapeutics/Ionis Pharmaceuticals, HLS Therapeutics, Novartis, Pfizer, Regeneron, Sanofi, and Ultragenyx; honoraria from Amgen, Sanofi, HLS Therapeutics, and Ionis; and participation on a data safety monitoring board or advisory board for Novartis. Z.A. reports institutional grants or contracts from the US Department of Defense, the NIH, and Ionis. Chair of metreleptin adjudication committee for Amyrt Pharmaceuticals.
Similar articles
Differential effects of volanesorsen on apoC-III, triglycerides, and pancreatitis in familial chylomicronemia syndrome diagnosed by genetic or nongenetic criteria.Tsimikas S, Ginsberg HN, Alexander VJ, Karwatowska-Prokopczuk E, Dibble A, Li L, Witztum JL, Hegele RA.Tsimikas S, et al.J Clin Lipidol. 2025 May-Jun;19(3):422-431. doi: 10.1016/j.jacl.2024.12.018. Epub 2024 Dec 21.J Clin Lipidol. 2025.PMID: 39848842 Clinical Trial.
Familial Chylomicronemia Syndrome: A Clinical Guide For Endocrinologists.Falko JM.Falko JM.Endocr Pract. 2018 Aug;24(8):756-763. doi: 10.4158/EP-2018-0157.Endocr Pract. 2018.PMID: 30183397 Review.
Familial chylomicronemia syndrome caused by 2 genetic variants in the APOA5 gene: Severe hypertriglyceridemia that complicates pregnancy.Gutiérrez J, Castaño P, Fariña G, Berg G, Gálvez JM, Nogueira JP.Gutiérrez J, et al.J Clin Lipidol. 2025 May-Jun;19(3):701-706. doi: 10.1016/j.jacl.2024.12.020. Epub 2025 Jan 6.J Clin Lipidol. 2025.PMID: 40023744
Etiology and emerging treatments for familial chylomicronemia syndrome.Spagnuolo CM, Hegele RA.Spagnuolo CM, et al.Expert Rev Endocrinol Metab. 2024 Jul;19(4):299-306. doi: 10.1080/17446651.2024.2365787. Epub 2024 Jun 12.Expert Rev Endocrinol Metab. 2024.PMID: 38866702 Review.
Epidemiology and longitudinal course of chylomicronemia: Insights from NHANES and a large health care system.Saadatagah S, Naderian M, Larouche M, Gaudet D, Kullo IJ, Ballantyne CM.Saadatagah S, et al.J Clin Lipidol. 2025 May-Jun;19(3):432-441. doi: 10.1016/j.jacl.2025.02.008. Epub 2025 Mar 28.J Clin Lipidol. 2025.PMID: 40155283
See all similar articles
Cited by
Recognition and management of persistent chylomicronemia: A joint expert clinical consensus by the National Lipid Association and the American Society for Preventive Cardiology.Saadatagah S, Larouche M, Naderian M, Nambi V, Brisson D, Kullo IJ, Duell PB, Michos ED, Shapiro MD, Watts GF, Gaudet D, Ballantyne CM.Saadatagah S, et al.Am J Prev Cardiol. 2025 Mar 28;22:100978. doi: 10.1016/j.ajpc.2025.100978. eCollection 2025 Jun.Am J Prev Cardiol. 2025.PMID: 40242365 Free PMC article.
Publication types
Review
Actions
Search in PubMed
Search in MeSH
Add to Search
MeSH terms
Humans
Actions
Search in PubMed
Search in MeSH
Add to Search
Hyperlipoproteinemia Type I / diagnosis
Actions
Search in PubMed
Search in MeSH
Add to Search
Hyperlipoproteinemia Type I / epidemiology
Actions
Search in PubMed
Search in MeSH
Add to Search
Hyperlipoproteinemia Type I / genetics
Actions
Search in PubMed
Search in MeSH
Add to Search
Hyperlipoproteinemia Type I / therapy
Actions
Search in PubMed
Search in MeSH
Add to Search
Lipoprotein Lipase / genetics
Actions
Search in PubMed
Search in MeSH
Add to Search
Lipoprotein Lipase / metabolism
Actions
Search in PubMed
Search in MeSH
Add to Search
Substances
Lipoprotein Lipase
Actions
Search in PubMed
Search in MeSH
Add to Search
Supplementary concepts
Familial hyperchylomicronemia syndrome
Actions
Search in PubMed
Search in MeSH
Add to Search
Related information
Cited in Books
MedGen
PubChem Compound (MeSH Keyword)
LinkOut - more resources
Full Text Sources
ClinicalKey
Elsevier Science
Full text links[x]
Elsevier Science
[x]
Cite
Copy Download .nbib.nbib
Format:
Send To
Clipboard
Email
Save
My Bibliography
Collections
Citation Manager
[x]
NCBI Literature Resources
MeSHPMCBookshelfDisclaimer
The PubMed wordmark and PubMed logo are registered trademarks of the U.S. Department of Health and Human Services (HHS). Unauthorized use of these marks is strictly prohibited.
Follow NCBI
Connect with NLM
National Library of Medicine
8600 Rockville Pike Bethesda, MD 20894
Web Policies
FOIA
HHS Vulnerability Disclosure
Help
Accessibility
Careers
NLM
NIH
HHS
USA.gov |
2068 | https://www.vhlab.umn.edu/atlas/cardiac-veins/index.shtml | | |
| University of Minnesota 612-625-5000 |
| |
| |
| | | | | | | | | | | | | | | | | | | | | | | | | | |
--- --- --- --- --- --- --- --- --- --- --- --- --- |
| |
| | | | | | | | | | --- --- --- --- | | | | | | | | | | | | | | | | | | | | | | | | | | | --- --- --- | | | | --- | | | | | | Location: The coronary system is composed of arteries, arterioles, capillaries, venules and veins. From the innumerable cardiac capillaries, blood flows back to the cardiac chambers through venules, which in turn coalesce into the cardiac veins. Most cardiac veins collect and return blood to the right atrium through the coronary sinus; there may or not be a Thebesian valve covering the ostium of the coronary sinus. The major venous vessels of the human heart are: coronary sinus, the anterior interventricular veins, left marginal veins, posterior veins of the left ventricle, and the posterior interventricular veins (see also the Coronary System Tutorial). Function: The cardiac veins returns deoxygenated blood (containing metabolic waste products) from the myocardium to the right atrium. This blood then flows back to the lungs for reoxygenation and removal of carbon dioxide. Importance in cardiovascular diseases: Cardiac veins contain valves preventing back flow; a Thebesian valve may or may not cover the ostium of the coronary sinus. Typically cardiac veins are free of atherosclerotic plaques. Importance in device delivery: Left heart pacing can be achieved by placing leads into the cardiac veins through the coronary sinus, which is located within the right atrium. While cannulating the coronary sinus ostium can be challenging due to the presence of the Thebesian valve, venous valves within the coronary venous system may hinder advancement of guide wires, catheters or pacing leads. Stem cell or other biologic therapies can be delivered to the heart via the coronary vasculature. Localización: El sistema coronario está compuesto por arterias, arteriolas, capilares, vénulas y venas. Desde los innumerables capilares cardíacos, la sangre regresa a las cámaras cardíacas a través de las vénulas, que a su vez se fusionan en las venas cardíacas. La mayoría de las venas cardíacas devuelven la sangre a la aurícula derecha a través del seno coronario; puede haber o no una válvula de Tebes que cubre el ostium del seno coronario. Los principales vasos venosos del corazón humano son: el seno coronario, la vena interventricular anterior, la vena marginal izquierda, las venas posteriores del ventrículo izquierdo y las venas interventriculares posteriores (ver también el Tutorial del sistema coronario). Función: Las venas cardíacas devuelven sangre desoxigenada (contiene productos de desecho metabólico) del miocardio a la aurícula derecha. Esta sangre luego regresa a los pulmones para la oxigenación y eliminación del dióxido de carbono. Importancia en las enfermedades cardiovasculares: Las venas cardíacas contienen válvulas que evitan el reflujo; la válvula de Tebesio puede cubrir o no el ostium del seno coronario. Normalmente, las venas cardíacas están libres de placas ateroscleróticas. Importancia en implante de dispositivos: La estimulación cardíaca izquierda se puede lograr implantando electrodos en las venas cardíacas a través del seno coronario, ubicado dentro de la aurícula derecha. Si bien la canulación del ostium del seno coronario puede ser un desafío debido a la presencia de la válvula de Tebesio, las válvulas venosas dentro del sistema venoso coronario pueden obstaculizar el avance de los alambres guía, catéteres o cables de estimulación. Las terapias con células madre u otras terapias biológicas se pueden administrar a través de la vasculatura coronaria. | | | | | Download movie: Cardiac-Veins-startimage.mp4 | | |
| |
| © 2025 Regents of the University of Minnesota. All rights reserved. The University of Minnesota is an equal opportunity educator and employer. Privacy Statement | |
2069 | https://cs.stackexchange.com/questions/80774/prove-that-hitting-set-is-np-complete | complexity theory - Prove that Hitting Set is NP-Complete - Computer Science Stack Exchange
Join Computer Science
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Loading…
Tour Start here for a quick overview of the site
Help Center Detailed answers to any questions you might have
Meta Discuss the workings and policies of this site
About Us Learn more about Stack Overflow the company, and our products
current community
Computer Science helpchat
Computer Science Meta
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Home
Questions
Unanswered
AI Assist Labs
Tags
Chat
Users
Companies
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
Prove that Hitting Set is NP-Complete
Ask Question
Asked 8 years ago
Modified5 years, 7 months ago
Viewed 22k times
This question shows research effort; it is useful and clear
4
Save this question.
Show activity on this post.
The Hitting Set Problem (HS) is defined as follow. Let (C,k(C,k)
C={S 1,S 2,...,S m}C={S 1,S 2,...,S m} collection of subset of S i.e. S i⊆S,∀i S i⊆S,∀i
k∈N
We want to know if exists S′⊂S where |S′|<k such that S i∩S′≠∅, i=1,2,...,m.
Prove that HS is Np-Complete.
Hint: When |S i|=2, HS becomes Vertex Cover, already know to be NP-complete.
complexity-theory
np-complete
decision-problem
information-theory
Share
Share a link to this question
Copy linkCC BY-SA 3.0
Cite
Improve this question
Follow
Follow this question to receive notifications
asked Sep 2, 2017 at 17:44
NickNick
169 1 1 gold badge 1 1 silver badge 12 12 bronze badges
1
4 What did you try? Where did you get stuck? We're happy to help you understand the concepts but just solving exercises for you is unlikely to achieve that. You might find this page helpful in improving your question.D.W. –D.W.♦ 2017-09-03 02:46:48 +00:00 Commented Sep 3, 2017 at 2:46
Add a comment|
3 Answers 3
Sorted by: Reset to default
This answer is useful
9
Save this answer.
Show activity on this post.
3SAT is reduced to the Hitting Set problem. Given a 3SAT ϕ having m clauses and n variables, define
S={x 1,…x n,¯x 1,…,¯x n}
S i={y 1,y 2,y 3},if y 1,y 2,y 3∈S and(y 1∨y 2∨y 3)is a clause.S x={x,¯x},for all variable x.k=n
Assume ϕ is satisfiable, then there a is true-value assignment for n variables. So, add x to S′ if x=t r u e, otherwise add ¯x to S′.
Now, assume the HS problem has a solution S′. Then since for every variable x, S′∩S x≠∅, S′ has at least n literals of the form x or ¯x for each variable x. Furthermore, no x and ¯x may belong to S′ at the same time since the size of S′ is at most n. Also, for each clause C i, S′∩S i≠∅ and so for each clause we select y i∈S′∩S i, and set x=t r u e if y i=x and x=f a l s e if y i=¯x.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Improve this answer
Follow
Follow this answer to receive notifications
edited Sep 2, 2017 at 22:35
answered Sep 2, 2017 at 18:15
fade2blackfade2black
9,895 2 2 gold badges 26 26 silver badges 36 36 bronze badges
1
can you show a positive and a negative instance?Nick –Nick 2017-11-03 02:37:18 +00:00 Commented Nov 3, 2017 at 2:37
Add a comment|
This answer is useful
1
Save this answer.
Show activity on this post.
It is easy to show that Hitting Set is in NP. A solution just needs to exhibit the set H – one can easily verify in polynomial time whether H is of size k and intersects each of the sets B1, . . . , Bm.
We reduce from vertex cover. Consider an instance of the vertex cover problem – graph G = (V, E) and a positive integer k. We map it to an instance of the hitting set problem as follows. The set A is the set of vertices V . For every edge e ∈ E, we have a set Se consisting of the two end-points of e. It is easy to see that a set of vertices S is a vertex cover of G iff the corresponding elements form a hitting set in the hitting set instance.
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Cite
Improve this answer
Follow
Follow this answer to receive notifications
answered Feb 22, 2020 at 23:12
NehaNeha
11 1 1 bronze badge
2
Welcome to ComputerScience@SE. Interesting use of special symbol ∈ - it is common to use MathJax, allowing, e.g., proper subscripting: B 1,…,B m.greybeard –greybeard 2020-02-22 23:31:04 +00:00 Commented Feb 22, 2020 at 23:31
what if size of Se is greater than 2? Will it work?Dhruvil Amin –Dhruvil Amin 2020-11-19 12:14:42 +00:00 Commented Nov 19, 2020 at 12:14
Add a comment|
This answer is useful
0
Save this answer.
Show activity on this post.
The Hitting Set Problem is equivalent to the Set Cover Problem, that is defined as follow:
INPUT: a collection C of subsets of a finite set S.
SOLUTION: A set cover for S, i.e., a subset C′⊆C such that every element in S belongs to at least one member of C′.
Given k does it exist a set cover C′ such that |C′|≤k?
This looks like a homework, so I let you figure how, given an instance of Set Cover you can convert it to an equivalent instance of Hitting Set.
Otherwise, if you want to follow the hint, you first show that Hitting Set in in N P, that is given a solution you can verify it in polynomial-time.
Then, you show that given a graph G=(V,E), finding a vertex cover of size k is equivalent to find a hitting set of size k. That is, if |E|=m, you can build a hitting set instance with the same amount of sets.
Share
Share a link to this answer
Copy linkCC BY-SA 3.0
Cite
Improve this answer
Follow
Follow this answer to receive notifications
edited Sep 2, 2017 at 18:17
answered Sep 2, 2017 at 18:01
abcabc
1,675 2 2 gold badges 12 12 silver badges 22 22 bronze badges
Add a comment|
Your Answer
Thanks for contributing an answer to Computer Science Stack Exchange!
Please be sure to answer the question. Provide details and share your research!
But avoid …
Asking for help, clarification, or responding to other answers.
Making statements based on opinion; back them up with references or personal experience.
Use MathJax to format equations. MathJax reference.
To learn more, see our tips on writing great answers.
Draft saved
Draft discarded
Sign up or log in
Sign up using Google
Sign up using Email and Password
Submit
Post as a guest
Name
Email
Required, but never shown
Post Your Answer Discard
By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
complexity-theory
np-complete
decision-problem
information-theory
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Report this ad
Report this ad
Linked
4Hitting Set Problem with non-minimal Greedy Algorithm
Related
5Is the set partitioning problem NP-complete?
3Reduce Set problem to SAT
2Is this variant of set cover NP-complete?
1Reduce EXACT 3-SET COVER to a Crossword Puzzle
6Partitioning bag of sets such that each set in a group has a unique element
2A variant of hitting set problem? Is this also a NP-hard problem?
0Struggling with NP-Complete Problem
2Show that a problem about permutations is NP-Complete
Hot Network Questions
Analog story - nuclear bombs used to neutralize global warming
A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man
The geologic realities of a massive well out at Sea
For every second-order formula, is there a first-order formula equivalent to it by reification?
в ответе meaning in context
Another way to draw RegionDifference of a cylinder and Cuboid
What's the expectation around asking to be invited to invitation-only workshops?
Why do universities push for high impact journal publications?
What is the feature between the Attendant Call and Ground Call push buttons on a B737 overhead panel?
If Israel is explicitly called God’s firstborn, how should Christians understand the place of the Church?
Do sum of natural numbers and sum of their squares represent uniquely the summands?
Cannot build the font table of Miama via nfssfont.tex
Is it ok to place components "inside" the PCB
Numbers Interpreted in Smallest Valid Base
Is it safe to route top layer traces under header pins, SMD IC?
Matthew 24:5 Many will come in my name!
Childhood book with a girl obsessessed with homonyms who adopts a stray dog but gives it back to its owners
In Dwarf Fortress, why can't I farm any crops?
How can the problem of a warlock with two spell slots be solved?
Does a Linux console change color when it crashes?
Should I let a player go because of their inability to handle setbacks?
Can a cleric gain the intended benefit from the Extra Spell feat?
Where is the first repetition in the cumulative hierarchy up to elementary equivalence?
What meal can come next?
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
It contains harassment, bigotry or abuse.
This comment attacks a person or group. Learn more in our Code of Conduct.
It's unfriendly or unkind.
This comment is rude or condescending. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Computer Science
Tour
Help
Chat
Contact
Feedback
Company
Stack Overflow
Teams
Advertising
Talent
About
Press
Legal
Privacy Policy
Terms of Service
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Cookies Details
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Cookies Details
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookies Details
Targeting Cookies
[x] Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Cookies Details
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Necessary cookies only Confirm my choices |
2070 | https://air-source.com/blog/industrial-and-commercial-acetylene-gas-applications/ | Skip to content
Gas Delivery for Los Angeles and Orange County
Get a quote
Industrial and Commercial Acetylene Gas Applications
Compressed Air
Acetylene is a colorless gas that has a strong garlic-like odor. When combined with oxygen, it becomes very hot and is classified as the hottest fuel gas. It is also the only fuel gas that can weld steel, making it the preferred choice for welders. Air Source Industries is a trusted provider of acetylene gas for a variety of commercial and industrial applications in the local Long Beach area.
Acetylene can be produced three different ways: It can be produced by the reaction of water and calcium carbide, by partial combustion of oxygen and methane, and by passing hydrocarbon through an electric arc. To get a better understanding on how acetylene gas works, we’ll take a look at some of the most common uses of acetylene and how they are applied in various industries.
Welding and Cutting
Acetylene gas is commonly used for welding and cutting in a process known as oxy fuel cutting. Acetylene is commonly used because it produces the highest flame temperature that can reach up to 3,160 degrees Celsius (5,720 degrees Fahrenheit). The flame temperature aids in speeding up the cutting process due to the quick piercing movements and is considered a safe fuel gas to use when handled properly.
During the welding process, acetylene is known for reducing the area of the Heat Affected Zone (HAZ), which is the base area of a piece of metal that has not been melted, but altered by the heat. Because of its high temperature and precise cutting ability, acetylene is the ideal gas for oxy fuel welding and cutting. With its quality welding abilities, it’s the perfect fuel gas to get the job done in a timely and efficient manner, thus saving you money in the long run.
Portable Lighting Back in the late 1800’s, people used acetylene to create light using portable gas lamps called carbides. They were used to illuminate homes, cars, mines and sometimes small cities. When acetylene is burned with just the right amount of air or oxygen, it reacts with a pure white light, which is why it was used to illuminate areas that did not have electricity.
Carbide lamps work by the reaction of mixing calcium carbide and water to produce acetylene. Carbide lamps contain an upper chamber which control the amount of water that drips through and mixes with the calcium carbide. The amount of acetylene produced directly affects the magnitude of the flame, which is why the chamber is an important piece of the carbide lamp. Carbide lamps are still used today in some coal mining industries in areas without safety laws.
Chemical Production
Acetylene gas is most commonly used for the production of other chemicals used in perfumes, vitamins, polymers, solvents and other materials due to its versatility and ease of reactive control in comparison to other gases. It combines nicely with a variety of elements and compounds, making it the most important of starting materials for organic synthesis.
Acetylene Safety & Handling
Although acetylene is among the safer gases to use when handled correctly, it is still highly combustible. That’s why it is very important to be knowledgeable on the safety and handling of the gas. When transporting, make sure the cylinder is settled upright to avoid any hazards. After the gases settle within the cylinder and are ready to release, make sure you dispense the gas slowly to avoid any combustion or malfunctions that could occur. As always, please make sure you are knowledgeable on the safety regulations or have a professional technician from Air Source Industries deliver the cylinder for you.
CONCLUSION
If you have a business or project that requires the use of acetylene gas, we carry it in commercial and atomic absorption (AA) grades. For assistance with gas specifications, please call us directly at (562) 426-4017 or get a quote online if you already know what you need. We also offer next day delivery services for local businesses in LA and Orange County.
Sources:
Share Article
Tags: acetylene, commercial, industrial
Gases
Acetylene
Air
Argon
Carbon Dioxide
Helium
High Purity Gas Supply
Mixes
Nitrogen
Nitrous Oxide
Oxygen
Acetylene
Air
Argon
Carbon Dioxide
Helium
High Purity Gas Supply
Mixes
Nitrogen
Nitrous Oxide
Oxygen
Services
Cylinder Rentals & Refills
Cylinder Repairs & Testing
Delivery
Equipment
Online Ordering
Cylinder Rentals & Refills
Cylinder Repairs & Testing
Delivery
Equipment
Online Ordering
Industries Served
Automotive Nitrous Oxide
Medical Gases for Clinics
Medical Gases for Dentists
Medical Gases for Physicians
Medical Gases for Veterinarians
Medical Gases
Restaurant/Food Grade Gases
Automotive Nitrous Oxide
Medical Gases for Clinics
Medical Gases for Dentists
Medical Gases for Physicians
Medical Gases for Veterinarians
Medical Gases
Restaurant/Food Grade Gases
About Us
Testimonials
Meet the Team
Case Studies
Testimonials
Meet the Team
Case Studies
Air Source Industries
3976 Cherry AvenueLong Beach, CA 90807
Phone (562) 426-4017
Fax 562.490.9477
in@ce.com
© 2015 – 2025 Air Source Industries. All Rights Reserved | Privacy Policyweb design and development by newtarget, inc.
Gases
Acetylene
Air
Argon
Automotive Nitrous Oxide
Carbon Dioxide
Helium
High Purity Gas Supply
Mixes
Nitrogen
Nitrous Oxide
Oxygen
Services
Cylinder Repairs & Testing
Delivery
Cylinder Rentals & Refills
Equipment
Industries Served
Medical
Dentist
Physicians
Veterinarians
Clinics
Industrial
Automotive
Restaurant/Food Grade
High Purity Gas
About Us
Testimonials
Meet the Team
Case Studies
Blog
Contact |
2071 | https://coconote.app/notes/3d5eb1bf-0d0b-409c-94f1-b07c7b64392c | Pressure Measurement in Fluids | Coconote
Coconote AI notes AI voice & video notes
Try for free
💧
Pressure Measurement in Fluids
Sep 17, 2025
Overview
This lecture covers pressure measurement in fluids, focusing on types of manometers, their working principles, advantages, limitations, and a numerical example using a U-tube manometer.
Pressure Measurement Devices
Pressure is measured using manometers (studied in fluid mechanics) and mechanical gauges (studied in metrology).
Manometers are glass tubes containing a manometric fluid and work on the hydrostatic law: Pressure = ρgh.
Types of Manometers
Simple Manometer: Measures pressure at a single point; includes piezometer and U-tube manometer.
Differential Manometer: Measures pressure difference between two points in a fluid system.
Piezometer
Simplest manometer; a glass tube connected to a pipe or vessel and open to the atmosphere.
Measures pressure using the rise (h) in fluid column: Pressure = ρgh, where ρ is fluid density in the pipe.
Limitations:
Only measures positive (gauge) pressure.
Cannot measure vacuum (negative) or high pressures.
Not suitable for measuring gas pressure or pressure of very light liquids (requires impractically long tube).
U-Tube Manometer
Consists of a U-shaped tube, one end connected to the pressure point, the other open to the atmosphere.
Uses a manometric fluid denser than the fluid in the vessel, allowing measurement of higher and both positive and negative pressures.
Pressure measurement uses the hydrostatic law and reference to the lower level of manometric fluid.
Manometric Equation and Numerical Example
Apply hydrostatic law and sign convention: pressure increases downward (+), decreases upward (–).
Reference the lower level of manometric fluid for measurements.
Example: Calculate pressure using known specific gravities and heights of columns, applying the manometric equation.
Key Terms & Definitions
Manometer — Device using liquid columns to measure fluid pressure.
Hydrostatic Law — Pressure at a point in a fluid = ρgh.
Piezometer — Simple manometer with only the system fluid, measuring positive pressures.
U-Tube Manometer — U-shaped device using a denser manometric fluid to measure pressure differences.
Gauge Pressure — Pressure relative to atmospheric pressure.
Absolute Pressure — Total pressure including atmospheric pressure.
Action Items / Next Steps
Review the numerical example calculation for clarity.
Prepare for upcoming topics: Micro Manometer and Differential Manometer in the next lecture.
Practice related numerical problems for exam preparation.
📄 Full transcript
Overview
This lecture covers pressure measurement in fluids, focusing on types of manometers, their working principles, advantages, limitations, and a numerical example using a U-tube manometer.
Pressure Measurement Devices
Pressure is measured using manometers (studied in fluid mechanics) and mechanical gauges (studied in metrology).
Manometers are glass tubes containing a manometric fluid and work on the hydrostatic law: Pressure = ρgh.
Types of Manometers
Simple Manometer: Measures pressure at a single point; includes piezometer and U-tube manometer.
Differential Manometer: Measures pressure difference between two points in a fluid system.
Piezometer
Simplest manometer; a glass tube connected to a pipe or vessel and open to the atmosphere.
Measures pressure using the rise (h) in fluid column: Pressure = ρgh, where ρ is fluid density in the pipe.
Limitations:
Only measures positive (gauge) pressure.
Cannot measure vacuum (negative) or high pressures.
Not suitable for measuring gas pressure or pressure of very light liquids (requires impractically long tube).
U-Tube Manometer
Consists of a U-shaped tube, one end connected to the pressure point, the other open to the atmosphere.
Uses a manometric fluid denser than the fluid in the vessel, allowing measurement of higher and both positive and negative pressures.
Pressure measurement uses the hydrostatic law and reference to the lower level of manometric fluid.
Manometric Equation and Numerical Example
Apply hydrostatic law and sign convention: pressure increases downward (+), decreases upward (–).
Reference the lower level of manometric fluid for measurements.
Example: Calculate pressure using known specific gravities and heights of columns, applying the manometric equation.
Key Terms & Definitions
Manometer — Device using liquid columns to measure fluid pressure.
Hydrostatic Law — Pressure at a point in a fluid = ρgh.
Piezometer — Simple manometer with only the system fluid, measuring positive pressures.
U-Tube Manometer — U-shaped device using a denser manometric fluid to measure pressure differences.
Gauge Pressure — Pressure relative to atmospheric pressure.
Absolute Pressure — Total pressure including atmospheric pressure.
Action Items / Next Steps
Review the numerical example calculation for clarity.
Prepare for upcoming topics: Micro Manometer and Differential Manometer in the next lecture.
Practice related numerical problems for exam preparation. |
2072 | https://math.stackexchange.com/questions/4189462/proof-of-fx-0-implies-text-function-is-increasing-proof-verification?noredirect=1&lq=1 | Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Proof of $f'(x) > 0 \implies \text{ Function is increasing }$ proof verification [duplicate]
Ask Question
Asked
Modified 4 years, 2 months ago
Viewed 310 times
-1
$\begingroup$
I tried to prove the theorem myself, that if for every $x$ in the domain $f'(x)$ is positive, then the function $f$ is strictly increasing. This is how it went:
$$f(x_1) < f(x_2)$$
$$f(x) < f(x+h), h>0 $$
$$f(x) < f(x) + f'(x)\cdot h + O(h), \lim_{h \rightarrow 0} \frac{O(h)}{h} = 0$$
$$0 < f'(x) \cdot h + O(h) $$ $$0 < f'(x) + \frac{O(h)}{h}$$
Now here is where I am not sure about the correctness of what I am about to do next...to take the limit of both sides and then:
$$ 0 < f'(x) + 0$$
Is the proof correct ?
real-analysis
calculus
solution-verification
Share
edited Jul 3, 2021 at 17:04
VLCVLC
asked Jul 3, 2021 at 16:57
VLCVLC
2,5431010 silver badges1818 bronze badges
$\endgroup$
2
1
$\begingroup$ This isn't a proof, it's a list of formulas with no explanation of how they are connected. Furthermore, you appear to be reasoning backwards. Don't start with what you're supposed to prove. Start with what you know, and reason from there to what you're supposed to prove. So start with "Assume that $f'(x) > 0$ for all $x$ in some interval $I$. Suppose $x_1, x_2 \in I$ and $x_1 < x_2$." Now explain (in sentences, not just a list of formulas) why it must be the case that $f(x_1) < f(x_2)$. $\endgroup$
Dan Velleman
– Dan Velleman
2021-07-03 17:05:43 +00:00
Commented Jul 3, 2021 at 17:05
$\begingroup$ What about the Lagrange mean value theorem? $\endgroup$
Matcha Latte
– Matcha Latte
2021-07-03 17:09:11 +00:00
Commented Jul 3, 2021 at 17:09
Add a comment |
1 Answer 1
Reset to default
1
$\begingroup$
You actually attempted to prove the converse of the statement (counterexample given below). In order to prove the desired statement, you would start with $f'(x) > 0$ for all $x$ in the domain of $f$, and try to conclude $f(x_1) < f(x_2)$ for all $x_2 > x_1$.
Share
edited Jul 3, 2021 at 17:44
answered Jul 3, 2021 at 17:06
Jeff ChengJeff Cheng
15666 bronze badges
$\endgroup$
1
2
$\begingroup$ Increasing function doesn't imply $f'>0$. $x^3$ is even strictly increasing, yet $f'(0)=0$. $\endgroup$
Matcha Latte
– Matcha Latte
2021-07-03 17:17:44 +00:00
Commented Jul 3, 2021 at 17:17
Add a comment |
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
real-analysis
calculus
solution-verification
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Linked
9 Positive derivative implies increasing without Mean Value Theorem
Related
$f'$ strictly increases and $f'(c)=0$. There exist $x_1 < c < x_2$ such that $f'(c)=\frac{f(x_2)-f(x_1)}{x_2 - x_1}$
2 Showing that a function is strictly increasing in $(a,b)$
2 Bound for $\prod_i^\infty(1+x_i)$ if $\sum_i^\infty x_i$ converges to $L$.
1 Show $|\mathbb R| = |(0, 1)|$
1 [Let $f$ be continuous in $a,b)$ with no mimimum at all open interval and tend to infinity. Prove it is strictly increasing.
2 Inverse of strictly increasing function is continuous (proof verification)
1 [Solution verification of $f$ convex, positive for $x>0$ and $f(0)=0$ implies $f$ increasing in $0,\infty)$.
$f:\mathbb{R}\to \mathbb{R}$ is a strictly increasing function, such that, $0
2 Example of unbounded, strictly increasing, strictly concave real-valued function on the real line
Hot Network Questions
Exchange a file in a zip file quickly
How to use \zcref to get black text Equation?
What "real mistakes" exist in the Messier catalog?
What meal can come next?
Is encrypting the login keyring necessary if you have full disk encryption?
Proof of every Highly Abundant Number greater than 3 is Even
Spectral Leakage & Phase Discontinuites
What is the feature between the Attendant Call and Ground Call push buttons on a B737 overhead panel?
Matthew 24:5 Many will come in my name!
Origin of Australian slang exclamation "struth" meaning greatly surprised
Determine which are P-cores/E-cores (Intel CPU)
Two calendar months on the same page
Copy command with cs names
What is the meaning of 率 in this report?
How to home-make rubber feet stoppers for table legs?
Where is the first repetition in the cumulative hierarchy up to elementary equivalence?
Can I go in the edit mode and by pressing A select all, then press U for Smart UV Project for that table, After PBR texturing is done?
Why, really, do some reject infinite regresses?
How to start explorer with C: drive selected and shown in folder list?
Separating trefoil knot on torus
How to rsync a large file by comparing earlier versions on the sending end?
How do trees drop their leaves?
Why do universities push for high impact journal publications?
Is it possible that heinous sins result in a hellish life as a person, NOT always animal birth?
more hot questions |
2073 | https://chemequations.com/en/?s=KI+%2B+H2SO4+%3D+I2+%2B+K2SO4+%2B+H2S+%2B+H2O | Chemical Equations online!
Chemical Equations online!
Submit
Advanced search
Error:
KI H2SO4 = I2 K2SO4 H2S H2O
^
Unexpected character, expected the character '+' or the end of the equation
Discover more
Sodium bicarbonate
Hydrogen hydroxide
Calcium carbonate
calcium carbonate
Caustic soda
Carbonate de calcium
Carbonato de calcio
oxidane
Sulfuric acid
Sodium hydrogen carbonate
Found a bug?Do you know what to improve?
© Michal Punčochář |
2074 | https://www.biointeractive.org/taxonomy/term/283 | Rock Pocket Mice | HHMI BioInteractive
Skip to main content
User MenuBioInteractive HomeMenu
Community
Classroom Resources
Teaching Tools
Professional Development
Partner Content
Site Search
Log in
Create Account
Español
HHMI BioInteractive
Español
Site Search
Log in
Create Account
Community
Classroom Resources
Teaching Tools
Professional Development
Partner Content
How Do Some Cells Affect Mouse Color?
In this phenomenon-driven activity, students investigate how cells are signaled to make melanin and explain how mutations in melanin pathway proteins affect the coat color of various organisms.
Cell Biology
Genetics
Lessons
High School — General
High School — AP/IB
College
What Causes Different Fur Colors?
In this inquiry-based activity, students investigate the phenomenon of fur colors in rock pocket mice to connect genotypes to phenotypes and molecular genetics to evolution.
Genetics
Evolution
Lessons
High School — General
High School — AP/IB
Color Variation Over Time in Rock Pocket Mouse Populations
This activity allows students to collect and analyze data on the evolution of coat color in rock pocket mouse populations living on differently colored substrates.
Evolution
Card Activities
High School — General
High School — AP/IB
Molecular Genetics of Color Mutations in Rock Pocket Mice
In these activities, students transcribe and translate portions of the rock pocket mouse Mc1r gene to further explore the genetic variations responsible for different coat colors as described in the short film Making of the Fittest: Natural Selection and Adaptation.
Genetics
Evolution
Lessons
High School — General
High School — AP/IB
College
Developing an Explanation for Mouse Fur Color
In this activity, students collect and analyze evidence for each of the major conditions for evolution by natural selection to develop an explanation for how populations change over time.
Evolution
Science Practices
Lessons
High School — AP/IB
College
Interactive Assessment for Natural Selection and Adaptation
Several questions are embedded within the short film The Making of the Fittest: Natural Selection and Adaptation, which uses the rock pocket mouse as a living example of natural selection.
Genetics
Evolution
Interactive Videos
High School — General
High School — AP/IB
College
The Making of the Fittest: Natural Selection and Adaptation
This film describes natural selection and adaptation in populations of rock pocket mice living in the American Southwest.
Genetics
Evolution
Short Films
High School — General
High School — AP/IB
College
Natural Selection and Evolution of Rock Pocket Mouse Populations
This activity supports concepts covered in the film Natural Selection and Adaptation. Students analyze genetic sequence data and draw conclusions about the evolution of coat-color phenotypes in the rock pocket mouse.
Genetics
Evolution
Lessons
High School — General
High School — AP/IB
College
Biochemistry and Cell Signaling Pathway of the Mc1r Gene
This activity supports concepts presented in the short film Natural Selection and Adaptation about the evolution of different fur colors among rock pocket mouse populations. The activity challenges students to analyze partial DNA sequences of the Mc1r gene to identify the effects of mutations on the MC1R protein pathway.
Biochemistry & Molecular Biology
Genetics
Lessons
High School — AP/IB
College
Allele and Phenotype Frequencies in Rock Pocket Mouse Populations
This activity reinforces concepts of variation and natural selection covered in the short film Natural Selection and Adaptation. Students apply the Hardy-Weinberg equation to real data collected on rock pocket mouse populations.
Evolution
Science Practices
Lessons
High School — General
High School — AP/IB
College
Pagination
Currently on page 1 1
Next page›
Subscribe to Rock Pocket Mice
HHMI BioInteractive
About Us
Our Research
Our Team
Our Advisors
FAQ
Contact Us
Facebook
Instagram
YouTube
Newsletter Signup
HHMI.org
Terms of Use
Privacy Policy
Accessibility
This site uses cookies or similar technologies.
To learn more, please review our Privacy Policy and Cookie Notice. By continuing to browse the site, you agree to these uses.
More info
Accept |
2075 | https://crei.cat/wp-content/uploads/users/pages/gov_%20size%20and%20macro.pdf | European Economic Review 38 (1994) 117-l 32. North-Holland Government stability size and macroeconomic Jordi Gali Columbia University. New York, USA Received July 1990, final version received March 1993 We analyze the effects of government size on output variability in the context of a RBC model in which government size is parameterized by the income tax rate and the share of government purchases in output. The model implies that: (i) income taxes are destabilizing, and (ii) for most specifications considered, government purchases are stabilizing. We compare those predictions with the results of simple cross-country regressions using data for 22 OECD countries. The estimated relationship between empirical indicators of government size and measures of GDP variability appears far stronger than the model predicts, and often has the opposite sign. 1. Introduction The present paper investigates the relationship between government size and macroeconomic stability in the context of a real business cycle (RBC) model. Focus on the previous relationship can be traced back to the traditional Keynesian literature on ‘automatic stabilizers’ [e.g., Burns (1960), Baily (1978), DeLong and Summers (1986)]. That literature points to the increase in income taxes, government purchases, unemployment insurance benetits and other governmental programs as some of the ‘structural changes’ underlying the greater stability of the U.S. economy after World War. II. Underlying the notion of automatic stabilizers found in the Keynesian literature there is a framework in which households face some sort of liquidity constraints that link consumption to current disposable income, and where short-run fluctuations are demand-driven. In the present paper we revisit the concept of automatic stabilizers by studying its potential role in the context of the basic RBC model, the central paradigm of modern Correspondence to: Jordi Gali, 607 Uris Hall, Graduate School of Business, Columbia University, New York, NY 10027, USA. Thanks are due to Glenn Hubbard, four different referees, and workshop participants at the NBER Summer Institute, I.M.F. and U. Pomneu Fabra for helnful comments. and Joon-Ho Hahm for expert research assistance. Part of the present research was funded by a CBS Faculty Grant. 0014-2921/94/$07.00 ~3 1994-Elsevier Science B.V. All rights reserved SSDI 0014-2921(93)E0045-M 118 J. Gali, Government size und macroeconomic stability macroeconomics.’ We pose the following basic question: do income taxes and government purchases behave as automatic stabilizers in the basic, technology shock-driven, RBC model? In other words, can the government alter the intensity of the business cycle by changing its own ‘size’, when technology shocks are the source of economic fluctuations? In section 2 we attempt to provide an answer to those questions, by augmenting an otherwise standard RBC model with a government sector. More precisely, we introduce two fiscal parameters in the model: (i) an income tax rate, and (ii) the share of government purchases in output. Then we analyze the effects of variations in the model’s fiscal parameters on output variability, as measured by the standard deviation of either percent devi- ations of output from its steady-state value or output growth rates, depending on the specification.’ We show that, for most specifications considered, both a low tax rate and a high share of government purchases are associated with low output variability. The magnitude of the predicted effects is, however, very small. In section 3 we confront those predictions with evidence based on postwar data corresponding to 22 OECD countries. We seek to characterize a possible correlation between (i) average share of government revenues and purchases in GDP (the empirical counterpart to our fiscal variables) and (ii) the standard deviations of GDP growth or detrended log GDP (our measures of output variability). Given the theoretical results of section 2, we view this exercise as an attempt to assess the ability of the basic RBC model to match dimensions of the data other than the time series dimension, e.g. differences in the characteristics of business cycles across countries. Though calibrated versions of simple RBC models are capable of generating time series with properties that roughly match those of actual U.S. macroecono- mic time series, the number of stylized facts which current RBC models are able to replicate is very limited and, as Danthine and Donaldson (1993) have emphasized, any progress in modeling must necessarily involve confronting existing models with an increasingly richer set of stylized facts3 The empirical results of section 3 point to the presence of a significant relationship between fiscal variables and measures of GDP variability. ‘Expositions of the basic RBC model can be found in Prescott (1986). For a survey of the literature see King et al. (1988) and Plosser (1989). ‘Danthine and Donaldson (1985) and Greenwood and Huffman (1991) contain related exercises involving the effect of changes in tax rates on output variability in a RBC model, but neither paper looks at government purchases. See below for a discussion of their models and results, as well as for other relevant references. jA similar approach underlies some of the recent developments in growth theory, where alternatives to the standard neoclassical growth model have been developed in response to the latter’s inability to account for some cross-country evidence (e.g., the lack of convergence of income levels). As Lucas (1988) points out, that critical assessment has taken place despite the fact that the neoclassical model is consistent with most features of long-term U.S. time series, the main aspect of the data it was originally meant to explain. J. tiali, tiovernmmt size and macroeconomic stability 119 Nevertheless, the sign and magnitude of the effect detected empirically cannot always be reconciled with the predictions of the standard RBC model. This is true even when we control for policy variability factors which, though ignored by the model, may potentially affect output variability while being correlated with our fiscal measures. Section 4 discusses the implications of our results and concludes. 2. Government size and macroeconomic stability in a RBC model In this section we develop a basic one-sector RBC model augmented with a government sector. We assume an infinite-lived representative consumer who seeks to maximize (1) where C is consumption and L is leisure. We specify the utility function to be given by U(C,, L,) = log C, + H log Lt.4 Our agent has access to a constant-returns technology represented by a Cobb-Douglas production function,5 Y, = A&: ~“(X,NJU (2) for t=0,1,2 ,..., where Y is output, K is physical capital, and N is employment. (X,} represents n onstochastic technical progress, and is given by X,=X,?/‘. {A,) is the stochastic component of technology; its logarithm, denoted by .& is assumed to follow the AR( 1) process (1 --pL) A, =F, where 05~5 1, and {Ed} is an i.i.d. sequence with zero mean and variance v2. The government budget constraint is given by B,, 1 = B, [ 1 + (1 -z)v,] + G, + r, -T Y,, for t = 0, 1,2,. . where T denotes lump-sum transfers, B is the outstanding one-period riskless government debt, r is the interest rate on one-period riskless assets, z is the income tax rate, and G denotes govern- ment purchases. In the initial period the policy maker chooses a tax rate 7 as well as the steady-state share of government purchases in output. That share is denoted by sp. Two alternative rules for government purchases are considered. Under the first rule, G, = sg Y,, all t, i.e. government purchases are a constant fraction of output. Under the second rule, G,=gX,, i.e. govern- ment purchases grow at a constant (gross) growth rate y. Henceforth we refer to those rules as ‘constant share’ and ‘constant growth’ rules, respectively. %uch for U consistent by a constant and constant growth for Y and K, as argued in and Rebel0 (1988). Experimentation with did not affect any the qualitative results we could as selling labor and capital services in to firm to the specified technology. As well known, two market arrangements 120 J. Gali, Gowxment size and macroeconomic stability Admittedly, our assumptions on government behavior are highly stylized and somewhat unrealistic, but they allow us to focus on the impact of the government’s relative size. From this viewpoint, our analysis can be seen as complementary to certain RBC literature that analyzes the effects of stochas- tic variations in the tax rate and/or the share of government purchases in GDP [e.g., Christian0 and Eichenbaum (1992), Braun (1989), McGrattan (1991), Chari et al. (1993)]. Our consumer-producer maximizes (1) subject to K t+l+B,+,=(l-~)K,+(l-z)Y,+B,[I+(l-~)rt]+T~-Cr, (3) L,$N,=l, (4) for t=0,1,2 ,..., as well as a non-negativity condition for K and C, and the transversality condition lim,, 3. E,{n,T=,[l +(I -z)r,]}-’ BTzO. 6 in (3) is the rate of depreciation of physical capital. In solving this problem he takes z, the stochastic sequences {G,), {T,), {r,} and the initial level of capital and government debt as given. It is useful to transform the model above into a stationary one by dividing all variables (except N and L) by X. The transformed variables are denoted by lower case letters: c, r(C’,/X,), k, z(K,/X,), etc. A competitive equilibrium in our economy can then be defined as a sequence {cL,k,, yt, Nt,gt)zO satisfying the following conditions: ec,=(l-N,)r(l-z)(y,lN,), E, {(c&t + i )C(l-~)+(~-~)(l-a)(y,+llk,+,)l)=yB-’, y, = A,k; -‘N’ t> (5) (6) (7) g, = ssy, (‘constant share’), or g, =g (‘constant growth’), $,+I = (I-W,+J+-_g,-c,> for t =O, 1,2,. . . , and the transversality condition lim E,flT(l/c,)k,=O. T-m (10) and initial capital stock, eqs. fully characterize equilibrium k,, yt, N,,g,izo indepen- of the transfer/debt sequence jtr, b,}zO chosen by the government among infinite number of yb, + , = b,[ 1 + ( 1 - T)r, J + g, + t, - T_Yt, for t=O,1,2 )...) and the transversality condition lim T+ n E, p’( l/c,) h, = 0. In other words, a version of Ricardian equivalence holds in the model above. To further characterize the economy’s competitive equilibrium we use the log-linear, certainty equivalence methods described in King et al. (1988). The J. Gali, Government size and macroeconomic stability 121 idea is to solve for the perfect-foresight equilibrium path and to linearize the latter around the economy’s balanced-growth path, replacing future ,? values in that solution with their expected values. Further details can be found in the above reference. That approach can be used to generate univariate processes describing the fluctuations of different variables around their stationary values. Given the purpose of the exercise we focus on the univariate representation for output implied by the model, which takes the form where j, -log(y,/y) is the percent deviation of output from its steady state value y. ,n, &0 and 4i are complicated functions of the model’s parameters.6 Given values for the parameters characterizing technology (y, CI, p, v), prefer- ences (/I, O), and fiscal policy (r, s,, and a rule for government purchases) we can compute the coefficients of the above ARMA(2,l) process and determine the implied unconditional standard deviation of j. In order to do that, we calibrate the model in a way consistent with some stylized features of the postwar U.S. economy. We let y= 1.02, roughly the average (gross) growth rate in per capita income in the postwar period. Under perfect competition, a corresponds to the labor income share, which we set at 0.75. Following King et al. (1988) we use the average return to equity for the postwar period (6.5%) as r’s empirical counterpart. As in other studies a value of 0.10 is assumed for 6, the annual depreciation rate. A benchmark value for r is 0.3, roughly the average ratio of government revenues to GDP, sg is assigned a benchmark value of 0.2, the average share of government purchases in GDP. Given our assumptions on y, r, and Y, and exploiting the fact that /I= y/ [1 + (1 - z)r] must hold in the steady state, we set fl=O.975. We experiment with two alternative values for parameter 8: (i) 8= 1.6014, which, under our benchmark fiscal settings, is consistent with a steady-state value for N equal to l/3, the latter being the average fraction of time allocated to production [Prescott (1986)], and (ii) 8=0, which corresponds to an inelastic labor supply (N, = 1). Finally, v and p are chosen in each case so that, under the benchmark values for the policy parameters, the standard deviation and the first-order autocorrelation of j predicted by the model equal 3.57 and 0.74, their respective sample counterparts our U.S. data set7 Table 1 reports the implied standard deviations of j, for alternative r and sg settings, under the assumptions of a ‘constant growth’ rule for government purchases and transitory shocks (lpi< 1). The model predicts that, holding sg ‘p corresponds to the stable eigenvalue of the linearized dynamical system for k, and ?,. Again, we refer the reader to the King et al. (1988) paper for details. ‘The statement does not apply to the simulation reported in table 4, for which p is no longer a free parameter. See discussion below. 122 .I. Gali, Government size and macroeconomic stability Table 1 Transitory shocks, constant growth rule.” SK = 0.00 s,=O.lO s, = 0.40 “9=0.20 A= 0.30 5 = 0.00 3.33 3.20 3.06 2.92 2.16 r=0.15 3.58 3.44 3.29 3.13 2.96 s=o.30 3.88 3.73 3.51 3.40 3.22 r = 0.45 4.21 4.11 3.95 3.76 3.56 s=O.60 4.78 4.62 4.45 4.26 4.04 “For each pair (r. sJ the table shows the standard deviation of lOOF (i.e. the percent deviations of output from trend) predicted by the RBC model under a ‘constant growth’ rule for government purchases and the following parameter settings: p =0.62, v =0.0132, ;a = 1.02, ~~0.75, 6=0.10, 0= 1.601, and fi=O.975. Table 2 Transitory shocks, constant share rule.” s, = 0.00 s,=O.lO Sg = 0.20 s =0.30 g s,=o.40 s=o.OO 3.36 3.21 3.05 2.87 2.69 s=O.lS 3.61 3.45 3.27 3.09 2.89 r=0.30 3.91 3.74 3.57 3.36 3.14 r = 0.45 4.30 4.13 3.94 3.73 3.49 z=O.60 4.81 4.64 4.45 4.24 3.99 “For each pair (r,sJ the table shows the standard deviation of 1009 (i.e. the percent deviations of output from trend) predicted by the RBC model under a ‘constant share’ rule for government purchases and the following parameter settings: ~~0.63, v=O.O132. y=1.02, x=0.75, 6=0.10, 0=1.601, and p=O.975. constant, variations in z generate changes in the same direction in our measure of output variability. Thus, and given s,=O.2, a reduction in the tax rate from 30 percent to zero lowers the standard deviation of j by 51 basis points. Doubling the tax rate to 60 percent actually increases the variability of j by 88 basis points. In other words, higher taxes appear to be destabilizing in the model, though the effect is relatively small. That basic result carries over to a version of the model with a ‘constant share’ for government purchases (table 2), as well as a version with inelastic labor supply (table 3). We also consider the case of permanent technology shocks, in which the technology parameter is specified to follow a random walk (p= 1). In that case, equilibrium (log) output is a nonstationary process, SO we use the standard deviation of output growth rute as a variability measure.8 We calibrate v so that the implied standard deviation of output growth under benchmark values for r and sp matches its U.S. sample counterpart (2.26). The corresponding results, reported in table 4, are ‘The latter specification excludes the possibility of a ‘constant growth’ rule for government purchases consistent with a constant steady state share, so the analysis in that case was restricted to the ‘constant share’ rule case. J. Gali, Government size and macroeconomic stability 123 Table 3 Transitory shocks, constant growth rule, inelastic labor supply.” sg = 0.00 s,=O.lO sg = 0.20 s = 0.30 sg = 0.40 T=o.m 3.40 3.42 3.44 3.47 3.51 T=0.15 3.45 3.47 3.49 3.53 3.51 rz0.30 3.51 3.53 3.51 3.60 3.65 T = 0.45 3.59 3.62 3.66 3.70 3.76 T = 0.60 3.70 3.74 3.79 3.84 3.92 “For each pair (T,sJ the table shows the standard deviation of 1OOj (i.e. the percent deviations of output from trend) predicted by the RBC model under a ‘constant growth’ rule for government purchases and the following parameter settings: p = 0.59, r= 0.0239 , ~=1.02, a=0.75, 6=0.10, O=O.OO. and fi=O.975. Table 4 Permanent shocks, constant share rule.” s,=o.oo s&.=0.10 sg = 0.20 sg = 0.30 ss = 0.40 T=o.oo 2.19 2.15 2.11 2.07 2.02 T=0.15 2.26 2.22 2.17 2.12 2.07 T =0.30 2.35 2.30 2.26 2.19 2.14 T = 0.45 2.47 2.42 2.36 2.30 2.23 1~0.60 2.64 2.58 2.52 2.45 2.38 “For each pair (r,sJ the table shows the-standard deviation of 10043, (i.e. the percent output growth rates) predicted by the RBC model under a ‘constant share’ rule for government purchases and the following parameter settings: p= 1.00, v=O.o086, y= 1.02, ~~0.75, 6=0.10, O= 1.601, and /I=O.975. qualitatively very similar to the ones discussed above: higher tax rates tend to increase the variability of output growth rates in this case, i.e. they behave as automatic destabilizers. Somewhat related results can be found in other authors’ work. Danthine and Donaldson (1985) introduce a capital income tax in a RBC model with inelastic labor supply, i.i.d. shocks, and one-hundred percent depreciation of physical capital. Under the previous assumptions the equilibrium dynamics can be solved for explicitly. Using the Danthine-Donaldson formulas for steady state y and var(y,) it is straightforward to show that, under their assumptions, var(j) [g (l/y’) var(y,)] is independent of the tax rate level. Our analysis thus shows that the Danthine-Donaldson result depends heavily on their strong assumptions, and does not carry over to a more general RBC setup. Greenwood and Huffman (1991) introduce capital and labor income taxes in a somewhat nonstandard RBC model.9 When evaluating the effects of tax changes on macroeconomic stability, their findings are similar to ours: lower taxes lead to a reduction in volatility. ‘Their model has a variable rate of capital utilization, and technology shocks affect only the ‘efhciency of new additions to the capital stock (but not that of the capital stock in place). 124 .I. Guli, Gol;ernment size and stability What is the economic mechanism underlying the destabilizing effects of taxes? Much of the observed effect results from the increase in the labor supply elasticity brought about by a higher tax rate, through its negative impact on steady state employment. lo The higher labor supply elasticity enhances the response of employment to a given technology shock, leading in turn to a larger response of both output and investment (and thus future output). Yet, the previous mechanism cannot be the only one at work, for (qualitatively) similar results are observed when we assume an inelastic labor supply (see table 3). In that case, the magnitude of the output reponse to a given technology shock ii, depends on the size of the multiplier (~?k^,+,/G;i,), but the latter is positively related to the steady-state output/capital ratio which is, in turn, increasing in z.l’ It follows that higher income tax rate will imply a larger multiplier (8j f+ l/~At), thus explaining the output variability effects observed in table 3. Tables I to 4 can also be used to examine the effects on output variability of changes in the steady-state share of government purchases sg, holding the tax rate constant. The sign of those effects is no longer robust across specifications. In all the specifications considered with Q>O - see tables 1, 2, and 4 - the government spending share sg appears to be inversely related to the standard deviation of output. Thus, for instance, under the calibration corresponding to table 1, a reduction of sg from 20 percent to zero leads to an increase of 31 basis points in our output variability statistic, given r=0.30. Raising s, from 20 to 40 percent reduces the same statistic by 35 basis points. In other words, government spending behaves as an automatic stabilizer under those specifications. That result carries over to the calib- rations corresponding to tables 2 and 4. The basic mechanism responsible for those results is essentially the same as in the tax rate case, though now it works in the opposite direction: an increase in ss leads to a higher steady-state employment and, consequently, a lower labor supply elasticity, and a smaller reponse of employment and output to a technology shock.” On the other hand, when we set H=O ~ thus making labor supply perfectly ‘% our model a higher income tax rate reduces steady-state employment through its negative effect on (after tax) labor productivity, which more than offsets the wealth effect working in the opposite direction. The reduction in N leads to a higher labor supply elasticity, which can be shown to be given by (1~ N)/N. “Some intuition for this result can be obtained by noticing that the (absolute) change in output in response to a technology shock is given by yd,. Letting 4, denote the marginal investment share (i.e., the fraction of the change in output that is allocated to investment) it follows that k^ ,+, =qb, (y/k) ii,. Though 4, also depends on the tax rate (as well as other parameters) in a complicated way, the positive effect of higher tax rates on (p/k) is dominant under all the calibrations considered. “In contrast with the case of distortionary taxation, a change in sg does not affect labor productivity and thus, has no substitution effects on employment. The positive relationship between sg and N arises from the negative wealth erect of higher government purchases (which lead to a lower consumption of leisure). J. Gali, Government size and macroeconomic stability 125 inelastic - the opposite results obtains (see table 3): output variability increases with sgr though, quantitatively, the effect is very sma11.r3 Doubling the value of both the income tax rate and the purchases share simultaneously (from 30 to 60 percent and from 20 to 40 percent, respectively) leads to greater output variability in all the cases considered. Alternatively, when, starting from the benchmark fiscal settings, we eliminate the govern- ment altogether, the standard deviation of output goes down. Given the findings discussed above, this is not surprising in the d =0 case. However, in all the other cases the net effects of such a resealing of both z and s, could not be predicted a priori. The results suggest that the stabilizing effect of a higher spending share is more than offset by the destabilizing effects of a proportional increase in the tax rate. Quantitatively, however, the net effect is very small: for the specification corresponding to table 1, a simultaneous increase in r and sp of 20 and 30 percentage points, respectively, increases the standard deviation of output by less than half a percentage point. When shocks are permanent (table 4) a similar resealing of fiscal variables leads to an increase in the standard deviation of output growth of just 0.12 percentage points. In the following section we confront some of these predictions with the data. 3. Government size and macroeconomic stability: The evidence In this section we present some econometric evidence bearing on the role of income taxes and government purchases as automatic stabilizers. Table 5 reports several statistics related to those fiscal variables, as well as measures of output variability, for 22 OECD countries. All the data are annual, covering the 196&1990 sample period, and were obtained from the OECD database. As proxies for z and s, we use the tax revenues/GDP ratio and the government purchases/GDP ratio, respective1y.14 Their average values for each country over the 1960-1990 sample period are reported under Z and S, in table 5. In the same table we also report three indicators of ‘policy variability’ for each country: the standard deviation of both the tax revenues/ GDP and government purchases/GDP ratios ($71 and s[s,]), as well as their correlation with both the (linearly) detrended and first-differenced logarithm “Again with constant employment the initial response of capital to a technology shock is given by t,+, =v4 (y/k) ii, with c$, being the marginal investment share. Even though an increase in sg does not affect (y/k), it causes the marginal investment share to go up in all our calibrated models, thus amplifying the response of capital and output. 14The model in section 2 treats all government purchases symmetrically, as nonproductive expenditures absorbing part of private sector output. This symmetric treatment is extended to our empirical measure of government purchases which includes both public consumption and public investment. In a way also consistent with our theoretical model, our measure of government purchases does not include government transfers. Table 5 Basic statisttcs.” Country U.S.A. Japan Germany France U.K. Italy Canada Austria Belgium Denmark Finland Greece Iceland Ireland Luxembourg Netherlands Norway Portugal Spain Sweden Switzerland Australia Mean Maximum Minimum i .TlTl 29.2 I .97 24.8 5.22 41.4 3.86 41.4 4.14 37.9 3.74 33.5 3.99 34.5 4.92 42.7 4.22 41.7 9.34 45.0 10.6 35.9 3.85 28.2 4.42 32.5 2.41 35.2 6.20 43.5 9.27 49.6 4.24 46.5 7.30 27.3 7.19 25.4 6.20 50.7 9.71 29.6 4.65 28.7 3.73 36.6 5.51 50.7 10.6 24.8 1.97 ~ 0.01 ~ 0.29 -0.31 -0.65 0.11 -0.43 -0.31 - 0.69 -0.17 ~ 0.28 -0.36 -0.41 0.08 -0.45 0.0 I -0.55 -0.01 -0.62 0.02 ~ 0.48 0.01 - 0.42 -0.18 -0.63 0.93 - 0.46 -0.04 -0.23 ~ 0.027 -0.25 -0.61 -0.71 0.28 -0.29 -0.17 - 0.43 ~ 0.67 -0.49 -0.03 ~ 0.64 -0.20 - 0.48 -0.10 -0.29 -0.09 - 0.46 0.93 -0.23 -0.67 -0.71 19.7 0.78 0.07 14.8 1.63 0.12 22.8 2.07 0.43 20.4 1.65 -0.17 23.3 2.04 0.09 18.7 1.90 -0.35 21.5 2.0 I 0.22 22.6 1.92 0.28 18.5 2.87 0.43 25.8 4.25 0.18 20.9 2.52 -0.25 15.2 3.42 -0.29 21.9 3.49 0.09 20.8 2.86 0.49 19.0 3.99 -0.31 21.5 1.19 0.29 21.8 2.60 0.31 17.0 3.64 -0.16 15.5 2.97 -0.75 28.4 4.12 0.19 11.7 1.39 -0.27 18.8 2.40 0.10 20.1 2.53 0.03 28.4 4.25 0.49 11.7 0.78 -0.75 -0.17 3.57 2.26 -0.79 11.9 3.31 -0.58 5.21 2.14 -0.80 6.77 1.80 - 0.40 3.08 2.04 -0.59 5.59 2.37 -0.49 5.15 2.21 - 0.62 6.23 1.97 -0.65 6.54 2.12 ~ 0.053 4.82 2.38 - 0.42 3.72 2.35 - 0.67 11.5 3.59 -0.29 6.55 4.27 -0.31 3.71 2.17 -0.38 4.28 3.05 ~ 0.064 7.77 2.26 -0.26 3.31 1.82 - 0.47 8.43 3.19 - 0.50 10.3 2.94 -0.63 5.03 1.85 -0.53 6.42 2.73 - 0.42 5.32 2.12 -0.51 6.15 2.50 -0.17 Il.9 4.27 -0.80 3.08 I .80 a7 is the government revenues/GDP ratio. .sp is the government purchases/GDP ratio. An upper bar denotes the average over the period 196&1990. j is the percent deviation of per capita GDP from trend. Ay is the growth rate of per capita GDP. s[ ] and p[.] are the standard deviation and the correlation coefficient. .I. Gali, Gowrnment size and macroeconomic stability 127 of GDP (p[r,j], p[~, dy], p[s,, 91 and p[~~,dy]).~’ Finally, the last two columns of table 5 contain two measures of output variability for each country: the standard deviation of linearly detrended log GDP ($91) and the standard deviation of GDP growth (s[dy]). At the bottom of table 5 we report the mean and both the maximum and minimum values taken by each variable in our cross section of countries. We want to stress here the large observed variability in Z and .Q. We take that feature as being the result of different tastes and/or historical and political experiences, and exogenous to the phenomenon of macroeconomic instabi- lity. In particular, we find it reasonable to assume that the degree to which policy makers pursue active ‘countercyclical’ policies (reflected in short term variations in T and sg) is not systematically related to the size of government. In addition to the large differences in fiscal parameters, the substantial variation across countries in our two measures of GDP variability, s[j] and s[dy], stands out as an important feature of the data, as becomes clear by looking at the corresponding columns of table 5. To what extent can those differences be accounted for by the differences in t and Sg? We address this issue by estimating several cross-country regressions, using the data shown in table 5. We discuss the results of that exercise in the remainder of this section. Table 6 reports the estimated coefficients in regressions with s[jj] as a dependent variable and alternative combinations of fiscal policy statistics as regressors. Standard errors are reported in brackets. The estimates in the first two regressions point to the presence of a significant negative correlation between $91 and each of our government size measures, S and Sg. Interpret- ing the coefficient estimates as partial derivatives, the estimated effects appear to be quantitatively large: an increase of 10 percentage points in Z (without controlling for other variables) is associated with a reduction of 1.5 percentage points in the standard deviation of detrended output. The latter value is even higher (3.9 percentage points) in the case of an analogous increase in Sg. Because of the high correlation between Z and S, across countries, when both variables are included as regressors the individual coefftcients estimates become insignificant [see regression (3)], though they remain negative. Neverthless, they are still highly jointly significant, as indicated by the F-statistics. The high collinearity between the two regressors, makes it difficult to evaluate the importance of each factor as a stabilizing force. Yet, estimates of some linear combinations of the coefficients are still precise. Consider, for instance, an increase of 30 percentage points in Z accompanied by a simultaneous increase of 20 percentage points in Tg, a change well within the “Similar results were obtained when we used p[d~,j}, p[dr,dy], p[ds,,j] and p[ds,, y] as indicators of the extent of fiscal policy variability. For the sake of saving space we do not report those additional results. 128 J. Gali, Government size and macroeconomic stability Table 6 Cross-country regressions, dependent variable: .s[j].” s S(T) f(T>j,) sg 4s.J (1) -0.159 _ 0.22 - _ (0.063) (2) - -0.394 _ 0.34 - _ (0.122) (3) -0.026 _ -0.353 - _ 0.35 5.02 -7.865 (0.089) (0.187) (2.505) (4) -0.162 0.150 -2.400 0.35 (0.069) (0.225) (1.528) (5) _ -0.432 0.517 - 0.029 0.38 (0.161) (0.525) (1.843) (6) -0.012 -0.054 ~ -0.412 0.609 _ 0.38 5.18 -8.622 (0.114) (0.351) (0.220) (0.799) (2.684) (7) -0.056 - 1.695 -0.257 0.149 0.38 2.62 - 6.844 (0.099) (1.838) (0.219) (1.965) (3.110) (8) -0.015 -0.453 -3.856 -0.415 1.720 2.527 0.48 3.66 -8.794 (0.111) (0.419) (2.256) (0.237) (1.052) (2.375) (3.259) ‘T is the government revenues/GDP ratio. sg is the government purchases/GDP ratio. An upper bar denotes the average over the sample period, 196&1990. j is the percent deviation of per capita GDP from trend. s[ ] and p[ .] are the standard deviation and the correlation coefficient, respectively. Each row reports the coefftcient estimates of a cross-country regression of s[j] on a constant term and the listed regressors. The F statistic corresponds to the null hypothesis that the coefftcients of i and S, are jointly zero. A is the linear combination 30 (? coefficient) +20 (Sp coej’kient). Standard errors are reported in brackets. An asterisk denotes significance at the 5:” level. range of the observed variability of Z and Sp in our sample of countries. This experiment is conceptually analogous to the comparative dynamics exercise described in the previous section. Here, we estimate the effect of such a change by looking at the statistic A = 30 (&[Q]/&) +20 (a$$]/&,), while using the individual coefficient estimates to approximate the partial deriva- tives. Our results from regression (3) imply that such a ‘resealing’ of fiscal variables is associated with a reduction of 7.8 percentage points (s.e. = 2.5) in $31. This stands in contrast with the increase of less than 0.5 percentage points predicted by our benchmark mode1 (see table 1). The results just discussed, corresponding to regressions (l)-(3) of table 6, embed the key finding of the paper: the estimated relationship between empirical measures of government size and output variability appears to be far stronger than the standard RBC model predicts and, at least in the case of tax effects, it has the opposite sign. The remaining results in tables 6 and 7 confirm the robustness of the previous finding under alternative regression specifications. We briefly discuss them next. Regressions (4) to (8) aim to overcome a potential source of bias in the J. tiali, Gwernment size and macroeconomic stability 129 Table 7 Cross-country regressions, dependent variable: s[dy]. r $5) P(L AJ’) sg sb,) P(.~~>AY) R F A (1) -0.045 0.31 (0.015) (2) _ -o.oso 0.22 (0.033) (3) -0.037 _ PO.022 0.32 4.41 - 1.569 (0.023) (0.048) (0.648) (4) -0.052 0.036 -0.817 0.36 - (0.017) (0.055) (0.818) (5) -0.106 0.320 -0.383 0.46 (0.031) (0.118) (0.677) (6) -0.001 -0.176 -0.099 0.624 0.67 8.25 -2.004 (0.021) (0.064) (0.040) (0.147) (0.493) (7) -0.039 - 2.934 -0.026 2.360 0.45 5.63 - 1.719 (0.023) ( 1.480) (0.048) (1.351) (0.628) (8) -0.010 -0.149 -2.379 -0.089 0.579 1.61 I 0.76 10.5 -2.100 (0.020) (0.061) (1.067) (0.038) (0.138) (0.984) (0.461) Note: T is the government revenues/GDP ratio, sg is the government purchases/GDP ratio. An upper bar denotes the average over the sample period. dy is the percent growth rate of per capita GDP. s[ ] and p[.] are the standard deviation and the correlation coefficient, respectively. Each row reports the coefficient estimates of a cross-country regression of s[Ay] on a constant term and the listed regressors. The F statistic corresponds to the null hypothesis that the coeflicients of S and Sp are jointly zero. A is the linear combination 30 (5 coefficient) + 20 (se coefficient). Standard errors are reported in brackets. An asterisk denotes significance at the 5% level. results just discussed. That bias would arise if, contrary to our exogeneity assumption, government size was systematically related to some feature of the time series variation in r and/or sg which had a dominant influence in determining the variability of output.” Regressions (4)gS) in table 6 attempt to control for that potential bias by including several combinations of the policy variability statistics introduced in table 5 as regressors, in addition to Z and/or S,. Notice that, with the exception of (7), the ? and S, coefficients in the augmented regressions are always either individually or jointly significant and have a negative sign. Furthermore, the A statistic described above still points to a large (and significant) negative effect on output variability of a simultaneous increase in Y and S,. Table 7 reports the results of a similar exercise, now using the standard deviation of GDP growth, s[dy], as a measure of output variability. Qualitatively, the results are similar to those discussed above. Taking 16For instance, one might argue that the estimated negative correlation between T and s[j] could be reflecting, say, the possibility that countries with higher average tax/GDP ratios tend to engage more in (successful) short-term countercyclical fiscal policies. 130 J. Gali, Government size and macroeconomic stability Fig. I regression (3) as a benchmark, we see that the estimated effect of the government resealing described above is a reduction of 1.56 percentage points (s.e.=0.648) in the standard deviation of output growth (as measured by the d statistic), in contrast with the increase of 0.12 percentage points predicted by the model (see table 4). Even stronger results obtain for the other regressions.17 Our basic finding of this section is illustrated graphically by fig. 1, which plots the position of each OECD country in the (Z,s[dy]) plane, together with a fitted regression line. r8 The picture’s message is clear: economies with ‘large governments’ (e.g., Norway, Sweden, Netherlands) have experienced milder economic fluctuations than economies with ‘small governments’ (e.g., Japan, Spain, Portugal). Our regression analysis suggests that such a conclusion is robust to the use of alternative measures of output variability and government size, and is not altered when we control for a possible policy variability effect. “Notice also that some of the proxies for fiscal policy variability are significant in regressions (5)+8) of table 7 in contrast with the results reported in the previous table. This does not affect any of our conclusions. “A similar picture emerges when we use other combinations of output variability and government size measures. J. 4. Summary and concluding comments Our results in section 3 suggest that both taxes and government purchases seem to be effectively working as ‘automatic stabilizers’, a theme often found in some of the Keynesian literature cited above. We do not view any of those findings as having a normative content, even if consumers value macroecono- mic stability, for large tax rates and government purchases are likely to have important welfare-reducing steady-state effects.” Despite that lack of norma- tive value, we find the results above useful to the extent that they point to a dimension of the data - the role of taxes and government purchases as automatic stabilizers - which the canonical RBC model fails to match. In all the specifications of that model analysed in section 2 income taxes effectively behave as ‘automatic destabilizers’; in contrast, all the evidence points to the presence of a negative relationship between output variability and the tax/ GDP ratio. Such a negative relationship is also found in the data when we look instead at the government purchases/GDP ratio as a measure of government size, but that empirical finding appears to be (qualitatively) consistent with at least some specifications of the RBC model. A more striking contrast between theory and evidence emerges when we focus on the magnitude of the effects: the variability effects of government size predicted by the model (regardless of their sign) is far smaller than those detected in the data. We interpret those results as suggesting that some factors responsible for the stabilizing effects of government size observed in the data are not accounted for in standard versions of the RBC model. To the extent that those factors play a significant role in economic fluctuations and, more specifically, in determining the response of the economy to changes in policy variables, many of the conclusions drawn from the RBC model may be misleading. This will generally be true no matter how well calibrated versions of the model lit time-series data. What are some of the possible elements that are missing in the canonical RBC model, and whose absence is responsible for the model’s counterfactual predictions? It is tempting to point to our stylized modelling of the fiscal sector as the main culprit. One can certainly argue that neither taxes nor government purchases show the kind of stable behavior assumed in our model. Yet, we believe little progress would be made if we were to allow for time variation in t or s,, unless we were willing to assume some systematic relationship between the time series properties of those fiscal parameters and “% our model of section 2 government purchases are wasteful, i.e. they absorb part of the economy’s output without increasing consumers’ utility or private sector Droductivitv. Since there are no other market imperfections the optimal government size in ou; model is zero, in which case the model’s equilibrium allocation is efficient, and any policy that manages to limit the fluctuations induced by technology shocks is welfare reducing. This point was forcefully argued in Kydland and Prescott (1980). 132 J. Gali, Government size and macroeconomic stability their average values. Furthermore, none of our empirical findings were significantly affected when we controlled for some policy variability measures, suggesting that auerage values of tax/GDP and government purchases/GDP ratios are themselves correlated with output variability, independently of their variations. A more fruitful avenue of inquiry, though one that falls beyond the scope of this paper, would augment our government sector model by allowing for possible effects of government purchases on utility [e.g., Christian0 and Eichenbaum (1992)] or private sector productivity [e.g., Baxter and King (1990)]. References Baily, Martin N., 1978, Stabilization policy and private economic behavior, Brookings Papers on Economic Activity 78, 1 I-50. Baxter, Marianne and Robert G. King, 1990, Fiscal policy in general equilibrium, Manuscript (University of Rochester, Rochester, NY). Braun, R. Anton, 1989, The dynamic interaction of distortionary taxes and aggregate variables in postwar U.S. data, Manuscript (University of Virginia, Charlottesville, VA). Burns, Arthur F., 1960, Progress towards economic stability, American Economic Review 50, l-19. Chari, V.V., Lawrence J. Christian0 and Patrick Kehoe. 1993, Optimal fiscal policy in a business cycle model, Manuscript (Northwestern University, Evanston, IL). Christiano, Lawrence J. and Martin Eichenbaum, 1992, Current real business cycle theories and aggregate labor market fluctuations, American Economic Review 82, no. 3, 43&450. Danthine, Jean-Pierre and John B. Donaldson, 1985, A note on the effects of capital income taxation on the dynamics of a competitive economy, Journal of Public Economics 28, 2555265. Danthine, Jean-Pierre and John B. Donaldson, 1993, Methodological and empirical issues in real business cycle theory, European Economic Review 37, no. I, l-36. DeLong, J. Bradford and Lawrence H. Summers, 1986, The changing cyclical variability of economic activity in the United States, in: Robert J. Gordon, ed., The American business cycle: Continuity and change (University of Chicago Press, Chicago, IL). Greenwood, Jeremy and Gregory W. Huffman, 1991, Tax analysis in a real business cycle model: On measuring Harberger triangles and Okun gaps, Journal of Monetary Economics 27, 1677190. King, Robert G., Charles I. Plosser and Sergio T. Rebelo, 1988, Production, growth and business cycles: I. The basic neoclassical model, Journal of Monetary Economics 21, 1955232. Kydland, Finn and Edward C. Prescott, 1980, A competitive theory of fluctuations and the feasibility and desirability of stabilization policy, in: Stanley Fischer, ed., Rational expec- tations and economic policy (University of Chicago Press, Chicago, IL). Lucas, Robert E., 1988, On the mechanics of economic development, Journal of Monetary Economics 22, 342. McGrattan, E.R., 1991, The macroeconomic effects of distortionary taxation, Discussion paper no. 37 (Institute for Empirical Macroeconomics, University of Minnesota, Minneapolis, MN). Plosser, Charles I., 1989, Understanding real business cycles, Journal of Economic Perspectives 3, 51-77. Prescott, Edward C., 1986, Theory ahead of business cycle measurement, Federal Reserve Bank of Minneapolis Quarterly Review 10, 9922. |
2076 | https://brainly.com/question/45367874 | [FREE] What is a benchmark and datum in surveying? - brainly.com
4
Search
Learning Mode
Cancel
Log in / Join for free
Browser ExtensionTest PrepBrainly App Brainly TutorFor StudentsFor TeachersFor ParentsHonor CodeTextbook Solutions
Log in
Join for free
Tutoring Session
+64,4k
Smart guidance, rooted in what you’re studying
Get Guidance
Test Prep
+11,5k
Ace exams faster, with practice that adapts to you
Practice
Worksheets
+7,4k
Guided help for every grade, topic or textbook
Complete
See more
/
Social Studies
Textbook & Expert-Verified
Textbook & Expert-Verified
What is a benchmark and datum in surveying?
1
See answer Explain with Learning Companion
NEW
Asked by Levantine3768 • 01/01/2024
0:00
/
--
Read More
Community
by Students
Brainly
by Experts
ChatGPT
by OpenAI
Gemini
Google AI
Community Answer
This answer helped 10624759 people
10M
0.0
0
Upload your school material for a more relevant answer
In surveying, a benchmark is a fixed reference point for elevation, while a datum is a standardized elevation reference level, such as sea level.
Explanation
In surveying, a benchmark is a fixed reference point of known position and elevation against which the heights of other points are measured. It acts as a starting or reference point for vertical measurements to ensure consistency in the elevational data across a survey. On the other hand, a datum in surveying is a theoretical or virtual reference level from which vertical measurements are taken. It provides a standardized base elevation that is applied universally across a region or country, such as sea level, against which heights and depths are measured.
The importance of benchmarks and datums lies in their ability to provide a consistent framework for surveyors to precisely measure and compare elevational changes, ensuring accurate and reliable data that is crucial for various engineering projects, land assessments, and construction planning.
Answered by TaylorSmith474 •36.7K answers•10.6M people helped
Thanks 0
0.0
(0 votes)
Textbook &Expert-Verified⬈(opens in a new tab)
This answer helped 10624759 people
10M
0.0
0
Laboratory Manual for Introductory Geology - Bradley Deline
Essentials of Geographic Information Systems - Campbell and Shin
Geographic Information Systems and Cartography - Adam Dastrup
Upload your school material for a more relevant answer
In surveying, a benchmark is a fixed reference point for measuring elevation, while a datum is a standardized reference level, such as sea level. Benchmarks provide specific elevations for measurement accuracy, while datums serve as common starting points for various surveying activities. Both are vital for ensuring reliable and consistent data in engineering and construction projects.
Explanation
In surveying, a benchmark is a fixed reference point used to measure the elevation of other locations. It provides a known elevation point that surveyors can use to ensure their measurements are accurate and consistent. Benchmarks are often marked on maps with symbols like 'BM', 'X', or triangles, and have specific elevations written next to them.
On the other hand, a datum is a reference level used as a starting point for measuring elevations or depths. A common type of datum is mean sea level, which serves as a standardized base elevation from which measurements are made across regions. This ensures that all surveyors use the same reference point for their calculations, improving the accuracy of maps and construction designs.
Both benchmarks and datums are essential in construction, land surveying, and geographic information systems (GIS) as they contribute to establishing reliable data for various projects. The relationship between a benchmark (specific point) and a datum (the theoretical reference level) is crucial for ensuring that measurements can be understood and compared consistently across different projects and locations.
Examples & Evidence
For instance, if a surveyor measures a new road's elevation, they might refer to a benchmark labeled 'BM 100' which indicates an elevation of 100 meters. If another point is measured at 105 meters according to the datum of sea level, then the elevation of the new road is 5 meters above the benchmark.
Standards for benchmarks and datums are provided by surveying organizations and are critical for engineering projects and mapping, demonstrating their importance in maintaining accurate geographical information.
Thanks 0
0.0
(0 votes)
Advertisement
Levantine3768 has a question! Can you help?
Add your answer See Expert-Verified Answer
### Free Social Studies solutions and answers
Community Answer 7 You want to restrict the values entered in a cell to a specified set, such as hop, skip, jump. Which type of data validation should you use?.
Community Answer 26 Explain four reasons the youth do not want to participate in civic life.
Community Answer 4.1 5 as a bystander, which approach may not work when the person you’re trying to stop is likely to become defensive or hostile?
Community Answer 6 Outline and analyse the limitations of the traditional medical approach to inclusive education.
Community Answer 10 Does the Youth Service Project, or a Civic Organisation, or Community Service Centre pursue the aims of the service centre? YES/NO Elaborate
Community Answer In a presentation about voter turnout, you are illustrating various data with charts. Which type of information would you present in a pie chart?.
Community Answer 3 Researchers designing online studies should consider the following with respect to participant protections.
Community Answer 3 At which event must special care be taken when preparing food for the guests?.
Community Answer Additional protections researchers can include in their practice to protect subject privacy and data confidentiality include:
Community Answer 4.8 16 You work for caring health, a medicare advantage (ma) plan sponsor. recently, mrs. garcia has completed an enrollment application for a plan offered by caring health, which is waiting for a reply from cms indicating whether or not mrs. garcia’s enrollment has been accepted. once cms replies, how long does caring health have to notify mrs. garcia that her enrollment has been accepted and in what format?
New questions in Social Studies
Here are several examples of different sources. Sort them based on whether they are primary, secondary, or tertiary sources. Sources: 1. A news article written some time after the event, which cites previous news coverage and summarizes the events. 2. An academic essay analyzing the importance of the event which cites only other academic essays and articles written after the fact. 3. A news article written right after the event, which includes direct quotes and descriptions from attendees. 4. A diary entry written by an attendee's child describing their parent's experiences. 5. A photograph taken at the event/place in question. 6. An academic essay analyzing the importance of the event which cites firsthand accounts. 7. A painting done years later, based on firsthand accounts. 8. A letter written by an attendee describing the event to someone else. 9. An encyclopedia entry summarizing information from various sources.
The equal protection clause of the Fourteenth Amendment was most clearly responsible for which of the following? A. the increase in state control of social welfare programs B. the increase in equality promoted by the Civil Rights Act of 1964 C. the Supreme Court's decision in United States v. Lopez D. the desegregation of public schools
If the judicial branch declares a law unconstitutional, what option does the legislative branch have? A. override a veto B. propose a constitutional amendment C. issue a pardon D. impeach a Supreme Court justice
In a mixed market economy, who makes most of the daily economic decisions? A. an economic expert B. an elected leader C. individual citizens D. the military
Analyze why Article II, Section 2 helps the nation provide for the common defense. A. Article II, Section 2 provides for Congress to impeach the president. B. Article II, Section 2 gives the president the role of commander in chief. C. Article II, Section 2 allows for amendments to the Constitution. D. Article II, Section 2 sets up the federal court system.
Previous questionNext question
Learn
Practice
Test
Open in Learning Companion
Company
Copyright Policy
Privacy Policy
Cookie Preferences
Insights: The Brainly Blog
Advertise with us
Careers
Homework Questions & Answers
Help
Terms of Use
Help Center
Safety Center
Responsible Disclosure Agreement
Connect with us
(opens in a new tab)(opens in a new tab)(opens in a new tab)(opens in a new tab)(opens in a new tab)
Brainly.com
Dismiss
Materials from your teacher, like lecture notes or study guides,
help Brainly adjust this answer to fit your needs.
Dismiss |
2077 | https://www.quora.com/How-do-I-show-that-any-palindrome-with-an-even-number-of-digits-is-divisible-by-11 | Something went wrong. Wait a moment and try again.
Divisibility Tests
Even Digits
Maths of 11
Number Theory
Palindromic Numbers
Divisibility Rules
5
How do I show that any palindrome with an even number of digits is divisible by 11?
Amitabha Tripathi
have more than a working knowledge of Z
·
Upvoted by
David Joyce
, Ph.D. Mathematics, University of Pennsylvania (1979) · Author has 4.7K answers and 13.9M answer views
·
7y
A k-digit number with decimal digits ak−1, ak−2, ak−3, …, a2, a1, a0 read from left to right is a palindrome if it reads the same whether read left to right or right to left. Thus, ak−i=ai−1 for i∈{1,2,3,…,k}. Further, if k=2ℓ, a palindrome is of the form
N=2ℓ−1∑i=0ai⋅10i=ℓ−1∑i=0ai(10i+102ℓ−1−i).
Since i+(2ℓ−1−i) is odd, i, 2ℓ−1−i are of opposite parity. Hence (−1)i+(−1)2ℓ−1−i=0 for each i∈{0,1,2,…,ℓ−1}. Since 10≡−1(mod11), each term 10^i+10^
A k-digit number with decimal digits ak−1, ak−2, ak−3, …, a2, a1, a0 read from left to right is a palindrome if it reads the same whether read left to right or right to left. Thus, ak−i=ai−1 for i∈{1,2,3,…,k}. Further, if k=2ℓ, a palindrome is of the form
N=2ℓ−1∑i=0ai⋅10i=ℓ−1∑i=0ai(10i+102ℓ−1−i).
Since i+(2ℓ−1−i) is odd, i, 2ℓ−1−i are of opposite parity. Hence (−1)i+(−1)2ℓ−1−i=0 for each i∈{0,1,2,…,ℓ−1}. Since 10≡−1(mod11), each term 10i+102ℓ−1−i≡0(mod11). Thus 11∣N. ■
Ankit Verma
Reshaping product programs @ Meta (formerly called facebook)
·
Upvoted by
David Joyce
, Ph.D. Mathematics, University of Pennsylvania (1979)
·
11y
Originally Answered: how do I show that any palindrome with an even number of digits is divisible by 11?
·
According to the divisibility rule of 11... Difference of the Sum of digits at even places and sum of digits at odd no of places should be zero or divisible by 11.
For any palandron with even no of digits this difference will always be zero.
Hence divisible by 11.
For example,
1991=
(9+1)-(9+1)= 0
123321=
(1+3+2)- (2+3+1)=0
You can take any example.
Theodore Rice
Data Scientist at Samaritan Ministries (2016–present)
·
Author has 346 answers and 320.1K answer views
·
3y
Originally Answered: A palindrome is a number that reads the same backward as forward (for instance, 373 and 521125 are palindromes). How can you prove that any Palindrome with an even number of digits is divisible by 11?
·
A number (expressed in base 10) is divisible by 11 if and only if the sum of the digits in the odd places and the sum of the digits in the even places differ by a multiple of 11. In the case of an even digit palindrome, the difference is 0, which is, of course 110.
The reason this is true is that odd powers of 10 are equivalent to -1 mod 11 and even powers of 10 are equivalent to 1 mod 11.
So the number abcd is equivalent to a-b+c-d mod 11.
Related questions
What is the six-digit palindromic number that is divisible by 11?
What is the least 7-digit palindromic number divisible by 11 without a single digit 0?
How many palindromic numbers have 11 digits and are divisible by 101?
What is a palindrome number and give one 5-digit example?
Why odd-digit palindromic numbers not divisible by 11?
Doug Dillon
Ph.D. Mathematics
·
Author has 12.4K answers and 11.4M answer views
·
3y
Originally Answered: A palindrome is a number that reads the same backward as forward (for instance, 373 and 521125 are palindromes). How can you prove that any Palindrome with an even number of digits is divisible by 11?
·
A number with an even number of digits, say, astuffb is divisible by 11 if stuff+a-b is divisible by 11. We use this in a proof by induction and using careless notation. Clearly any 2-digit number of the form aa is divisible by 11.
Suppose the palindrome of an even number of digits, called, stuff is divisible by 11. Then the number astuffa is a palindrome of an even number of digits. Since stuff+a-a=stuff divisibility by 11 is for sure.
Sponsored by Grammarly
Is your writing working as hard as your ideas?
Grammarly’s AI brings research, clarity, and structure—so your writing gets sharper with every step.
Assistant
Bot
·
1y
To show that any palindrome with an even number of digits is divisible by 11, we can use the properties of palindromes and the divisibility rule for 11.
Step-by-step Explanation
Definition of a Palindrome: A palindrome is a number that reads the same forwards and backwards. For an even-digit palindrome, we can express it in the following form:
N=a1a2a3…akak…a3a2a1
where N has 2k digits.
Structure of the Palindrome: The palindrome consists of k digits followed by the same k digits in reverse order. For example, if k=3, the palindrome could be 123321.
Divisibilit
To show that any palindrome with an even number of digits is divisible by 11, we can use the properties of palindromes and the divisibility rule for 11.
Step-by-step Explanation
Definition of a Palindrome: A palindrome is a number that reads the same forwards and backwards. For an even-digit palindrome, we can express it in the following form:
N=a1a2a3…akak…a3a2a1
where N has 2k digits.
Structure of the Palindrome: The palindrome consists of k digits followed by the same k digits in reverse order. For example, if k=3, the palindrome could be 123321.
Divisibility Rule for 11: A number is divisible by 11 if the difference between the sum of its digits in odd positions and the sum of its digits in even positions is either 0 or divisible by 11.
Identifying Odd and Even Positioned Digits:
For the palindrome N=a1a2a3…akak…a3a2a1:
Odd-positioned digits: a1,a3,…,ak,ak,ak−1,…,a1
Even-positioned digits: a2,a4,…,ak−1,ak−1,a4,…,a2
Calculating the Sums:
The sum of the digits in odd positions:
Sodd=a1+a3+…+ak+ak+ak−1+…+a1=2(a1+a3+…+ak)
The sum of the digits in even positions:
Seven=a2+a4+…+ak−1+ak−1+a4+…+a2=2(a2+a4+…+ak−1)
Difference Calculation:
The difference Sodd−Seven becomes:
Sodd−Seven=2(a1+a3+…+ak)−2(a2+a4+…+ak−1)=2((a1+a3+…+ak)−(a2+a4+…+ak−1))
Conclusion:
Since Sodd−Seven is multiplied by 2, the overall difference is clearly divisible by 2.
However, for divisibility by 11, we need to check if the difference (a1+a3+…+ak)−(a2+a4+…+ak−1) results in a number that is either 0 or divisible by 11.
But since the sums of the digits are structured symmetrically, the sums of the odd and even positioned digits will always balance out, leading us to conclude that the difference will indeed be divisible by 11.
Final Statement
Thus, we can conclude that any palindrome with an even number of digits is divisible by 11.
David Vanderschel
PhD in Mathematics & Physics, Rice (Houston neighborhood) (Graduated 1970)
·
Author has 37.6K answers and 50.1M answer views
·
3y
Originally Answered: A palindrome is a number that reads the same backward as forward (for instance, 373 and 521125 are palindromes). How can you prove that any Palindrome with an even number of digits is divisible by 11?
·
A2A: See the following divisibility by 11 rule. Each digit appearing in an odd position on the right also occurs in an even position on the left. Similarly for even/odd. So the odd and even sums cancel out.
Divisibility by Eleven
It is easy to tell that the following are multiples of 11: 22, 33, 44, 55, etc. But how about: 2728, or 31415? Are they divisible by 11? Here an easy way to test for divisibility by 11. Take the alternating sum of the digits in the number, read from left to right. If that is divisible by 11, so is the original number. So, for instance, 2728 has alternating sum of digits 2 – 7 + 2 – 8 = -11. Since -11 is divisible by 11, so is 2728. Similarly, for 31415, the alternating sum of digits is 3 – 1 + 4 – 1 + 5 = 10. This is not divisible by 11, so neither is 31415. Presentation Suggestions: Students may enjoy thinking about how this divisibility test is related to the Fun Fact Divisibility by Seven. The Math Behind the Fact: This curious fact can be easily shown using modular arithmetic. Since 10 n is congruent to (-1) n mod 11, we see that 1, 100, 10000, 1000000, etc. have remainders 1 when divided by 11, and 10, 1000, 10000, etc. have remainders (-1) when divided by 11. Thus 2728 = 2 1000 + 7 100 + 2 10 + 8, so its remainder when divided by 11 is just 2(-1) + 7(1) + 2(-1) + 8(1), the alternating sum of the digits. (It’s sum is the negative of what we found above because the alternation here begins with a -1.) But either way, if this alternating sum is divisible by 11, then so is the original number. In fact, our observation shows more: that in fact when we take the alternating sum of the digits read from right to left (so that the sign of the units digit is always positive), then we obtain N mod 11. How to Cite this Page: Su, Francis E., et al. “Divisibility by Eleven.” Math Fun Facts . Fun Fact suggested by: Francis Su
Related questions
How many 7-digit palindromes are there?
How many palindromes can you find between 500 and 599?
What is the greatest 5-digit palindrome number divisible by 45?
How do I find the number of 6 digit palindrome numbers which are divisible by 5?
What is the greatest three-digit number divisible by 11 and 12?
Wes Browning
Studied Mathematics at Cornell University
·
Author has 8.9K answers and 6.1M answer views
·
3y
Originally Answered: A palindrome is a number that reads the same backward as forward (for instance, 373 and 521125 are palindromes). How can you prove that any Palindrome with an even number of digits is divisible by 11?
·
By noting that 10 is congruent to -1 modulo 11, and therefore even powers of 10 are congruent to 1 modulo 11, and odd powers of 10 are congruent to -1 modulo 11. It follows easily that a palindrome with an even number of digits is congruent to zero modulo 11.
Promoted by The Penny Hoarder
Lisa Dawson
Finance Writer at The Penny Hoarder
·
Updated Sep 16
What's some brutally honest advice that everyone should know?
Here’s the thing: I wish I had known these money secrets sooner. They’ve helped so many people save hundreds, secure their family’s future, and grow their bank accounts—myself included.
And honestly? Putting them to use was way easier than I expected. I bet you can knock out at least three or four of these right now—yes, even from your phone. Don’t wait like I did.
Cancel Your Car Insurance
You might not even realize it, but your car insurance company is probably overcharging you. In fact, they’re kind of counting on you not noticing. Luckily, this problem is easy to fix.
Don’t waste your time
Here’s the thing: I wish I had known these money secrets sooner. They’ve helped so many people save hundreds, secure their family’s future, and grow their bank accounts—myself included.
And honestly? Putting them to use was way easier than I expected. I bet you can knock out at least three or four of these right now—yes, even from your phone. Don’t wait like I did.
Cancel Your Car Insurance
You might not even realize it, but your car insurance company is probably overcharging you. In fact, they’re kind of counting on you not noticing. Luckily, this problem is easy to fix.
Don’t waste your time browsing insurance sites for a better deal. A company calledInsurify shows you all your options at once — people who do this save up to $996 per year.
If you tell them a bit about yourself and your vehicle, they’ll send you personalized quotes so you can compare them and find the best one for you.
Tired of overpaying for car insurance? It takes just five minutes to compare your options with Insurify andsee how much you could save on car insurance.
Ask This Company to Get a Big Chunk of Your Debt Forgiven
A company calledNational Debt Relief could convince your lenders to simply get rid of a big chunk of what you owe. No bankruptcy, no loans — you don’t even need to have good credit.
If you owe at least $10,000 in unsecured debt (credit card debt, personal loans, medical bills, etc.), National Debt Relief’s experts will build you a monthly payment plan. As your payments add up, they negotiate with your creditors to reduce the amount you owe. You then pay off the rest in a lump sum.
On average, you could become debt-free within 24 to 48 months. It takes less than a minute to sign up and see how much debt you could get rid of.
Set Up Direct Deposit — Pocket $300
When you set up direct deposit withSoFi Checking and Savings (Member FDIC), they’ll put up to $300 straight into your account. No… really. Just a nice little bonus for making a smart switch.
Why switch? With SoFi, you can earn up to 3.80% APY on savings and 0.50% on checking, plus a 0.20% APY boost for your first 6 months when you set up direct deposit or keep $5K in your account. That’s up to 4.00% APY total. Way better than letting your balance chill at 0.40% APY.
There’s no fees. No gotchas.Make the move to SoFi and get paid to upgrade your finances.
You Can Become a Real Estate Investor for as Little as $10
Take a look at some of the world’s wealthiest people. What do they have in common? Many invest in large private real estate deals. And here’s the thing: There’s no reason you can’t, too — for as little as $10.
An investment called the Fundrise Flagship Fund lets you get started in the world of real estate by giving you access to a low-cost, diversified portfolio of private real estate. The best part? You don’t have to be the landlord. The Flagship Fund does all the heavy lifting.
With an initial investment as low as $10, your money will be invested in the Fund, which already owns more than $1 billion worth of real estate around the country, from apartment complexes to the thriving housing rental market to larger last-mile e-commerce logistics centers.
Want to invest more? Many investors choose to invest $1,000 or more. This is a Fund that can fit any type of investor’s needs. Once invested, you can track your performance from your phone and watch as properties are acquired, improved, and operated. As properties generate cash flow, you could earn money through quarterly dividend payments. And over time, you could earn money off the potential appreciation of the properties.
So if you want to get started in the world of real-estate investing, it takes just a few minutes tosign up and create an account with the Fundrise Flagship Fund.
This is a paid advertisement. Carefully consider the investment objectives, risks, charges and expenses of the Fundrise Real Estate Fund before investing. This and other information can be found in the Fund’s prospectus. Read them carefully before investing.
Cut Your Phone Bill to $15/Month
Want a full year of doomscrolling, streaming, and “you still there?” texts, without the bloated price tag? Right now, Mint Mobile is offering unlimited talk, text, and data for just $15/month when you sign up for a 12-month plan.
Not ready for a whole year-long thing? Mint’s 3-month plans (including unlimited) are also just $15/month, so you can test the waters commitment-free.
It’s BYOE (bring your own everything), which means you keep your phone, your number, and your dignity. Plus, you’ll get perks like free mobile hotspot, scam call screening, and coverage on the nation’s largest 5G network.
Snag Mint Mobile’s $15 unlimited deal before it’s gone.
Get Up to $50,000 From This Company
Need a little extra cash to pay off credit card debt, remodel your house or to buy a big purchase?
We found a company willing to help.
Here’s how it works: If your credit score is at least 620, AmONE can help you borrow up to $50,000 (no collateral needed) with fixed rates starting at 6.40% and terms from 6 to 144 months.
AmONE won’t make you stand in line or call a bank. And if you’re worried you won’t qualify, it’s free tocheck online. It takes just two minutes, and it could save you thousands of dollars.
Totally worth it.
Get Paid $225/Month While Watching Movie Previews
If we told you that you could get paid while watching videos on your computer, you’d probably laugh.
It’s too good to be true, right?
But we’re serious. By signing up for a free account with InboxDollars, you could add up to $225 a month to your pocket. They’ll send you short surveys every day, which you can fill out while you watch someone bake brownies or catch up on the latest Kardashian drama.
No, InboxDollars won’t replace your full-time job, but it’s something easy you can do while you’re already on the couch tonight, wasting time on your phone.
Unlike other sites, InboxDollars pays you in cash — no points or gift cards. It’s already paid its users more than $56 million.
Signing up takes about one minute, and you’ll immediately receive a $5 bonus to get you started.
Earn $1000/Month by Reviewing Games and Products You Love
Okay, real talk—everything is crazy expensive right now, and let’s be honest, we could all use a little extra cash. But who has time for a second job?
Here’s the good news. You’re already playing games on your phone to kill time, relax, or just zone out. So why not make some extra cash while you’re at it?
WithKashKick, you can actually get paid to play. No weird surveys, no endless ads, just real money for playing games you’d probably be playing anyway. Some people are even making over $1,000 a month just doing this!
Oh, and here’s a little pro tip: If you wanna cash out even faster, spending $2 on an in-app purchase to skip levels can help you hit your first $50+ payout way quicker.
Once you’ve got $10, you can cash out instantly through PayPal—no waiting around, just straight-up money in your account.
Seriously, you’re already playing—might as well make some money while you’re at it.Sign up for KashKick and start earning now!
Ali Anwar Rocker
love numbers the same As the RAin
·
Author has 139 answers and 595.7K answer views
·
9y
Related
How many four digit numbers divisible by 11 are not palindromes?
All the four digit palindromes are of the form:- abba
Check the divisibility of the no abba by 11
a-b+b-a=0
Hence it is divisible by 11.
So,all the four digit palindromes are divisible by 11.
Calculate total no of 4-digit no divided by 11.
4-digit no divided by 11 are in AP:-
1001,1012,1023,………,9999
Tn=a+(n-1)d
9999=1001+(n-1)11
9999=1001+11n-11
=990+11n
I.e 11n=9009
So,n=819
So,there are 819 4-digit no divided by 11.
now, find the total no of 4-digit palindroms:-
4-digit palindromes are of the form “abba”….where a can't be zero,otherwise, it will become a 3-digit no.But there is no problem in “b” being zero.
All the four digit palindromes are of the form:- abba
Check the divisibility of the no abba by 11
a-b+b-a=0
Hence it is divisible by 11.
So,all the four digit palindromes are divisible by 11.
Calculate total no of 4-digit no divided by 11.
4-digit no divided by 11 are in AP:-
1001,1012,1023,………,9999
Tn=a+(n-1)d
9999=1001+(n-1)11
9999=1001+11n-11
=990+11n
I.e 11n=9009
So,n=819
So,there are 819 4-digit no divided by 11.
now, find the total no of 4-digit palindroms:-
4-digit palindromes are of the form “abba”….where a can't be zero,otherwise, it will become a 3-digit no.But there is no problem in “b” being zero.
Now,pair of a in Abba can be gotten in 9 ways:-11,22,33,44..,99
And pair of b in abba can be gotten in 10 ways:-00,11,22……,99(00 is also allowed)
So total no of 4-digit palindromes=910=90
Finally,total no of 4-digit no divided by11 but not palindromes=819–90=729.
Ellis Cave
48 U.S. Patents
·
Author has 7.9K answers and 4.3M answer views
·
Feb 13
Related
How many palindromic numbers have 11 digits and are divisible by 101?
Brute force solution, using the J programming language:
'a b c d e f'=.|:odo 9,5#10
a=.a+1
m=.n#~0=101|n=.10#.a,.b,.c,.d,.e,.f,.e,.d,.c,.b,.a
36000
The answer is there are 36,000 palindromic 11-digit integers that are divisible by 101.
List the first & last few:
m
10000000001 10001010001 10002020001 10003030001 10004040001 10005050001 10006060001 10007070001 10008080001 10009090001 10010201001 10011211001 10012221001 10013231001 10014241001 10015251001 10016261001 10017271001 10018281001 10019291001 10020402001 10021412001 10022422001 10023432001 10024442001 10025452001 10026462001 10027472001 100284
Brute force solution, using the J programming language:
'a b c d e f'=.|:odo 9,5#10
a=.a+1
m=.n#~0=101|n=.10#.a,.b,.c,.d,.e,.f,.e,.d,.c,.b,.a
36000
The answer is there are 36,000 palindromic 11-digit integers that are divisible by 101.
List the first & last few:
m
10000000001 10001010001 10002020001 10003030001 10004040001 10005050001 10006060001 10007070001 10008080001 10009090001 10010201001 10011211001 10012221001 10013231001 10014241001 10015251001 10016261001 10017271001 10018281001 10019291001 10020402001 10021412001 10022422001 10023432001 10024442001 10025452001 10026462001 10027472001 10028482001 10029492001 10030603001 10031613001 10032623001 10033633001 10034643001 10035653001 10036663001 10037673001 10038683001 10039693001 10040804001 10041814001 10042824001 10043834001 10044844001 10045854001 10046864001 10047874001
……………
99592029599 99593039599 99594049599 99595059599 99596069599 99597079599 99598089599 99599099599 99690009699 99691019699 99692029699 99693039699 99694049699 99695059699 99696069699 99697079699 99698089699 99699099699 99790009799 99791019799 99792029799 99793039799 99794049799 99795059799 99796069799 99797079799 99798089799 99799099799 99890009899 99891019899 99892029899 99893039899 99894049899 99895059899 99896069899 99897079899 99898089899 99899099899 99990009999 99991019999 99992029999 99993039999 99994049999 99995059999 99996069999 99997079999 99998089999 99999099999
Promoted by Webflow
Metis Chan
Works at Webflow
·
Aug 11
What are the best AI website builders now?
When it comes to AI website builders, there are a growing number of options, but a few stand out for their power, flexibility, and ability to grow with your needs.
Webflow’s AI Site Builder is a top choice for small businesses, in-house teams, and agencies who want the speed of AI and the freedom to fully customize every part of their site. With Webflow, you can:
Describe your business or idea and instantly generate a unique, production-ready website—no coding required.
Edit visually in a powerful no-code canvas, customize layouts, and add advanced interactions.
Collaborate with your team in real
When it comes to AI website builders, there are a growing number of options, but a few stand out for their power, flexibility, and ability to grow with your needs.
Webflow’s AI Site Builder is a top choice for small businesses, in-house teams, and agencies who want the speed of AI and the freedom to fully customize every part of their site. With Webflow, you can:
Describe your business or idea and instantly generate a unique, production-ready website—no coding required.
Edit visually in a powerful no-code canvas, customize layouts, and add advanced interactions.
Collaborate with your team in real time, streamline feedback, and manage all your content in one place.
Publish instantly on enterprise-grade hosting with built-in SEO, security, and the flexibility to scale as you grow.
Many other tools offer AI-powered templates or quick site launches, but Webflow stands out by letting you take control—so your site never feels generic, and you can easily update, expand, or redesign as your needs change.
Want to see what AI-powered site building can really do? Try Webflow AI Site Builder for free today.
Mario Skrtic
IT at Public Libraries (2003–present)
·
Author has 4.5K answers and 1.1M answer views
·
Feb 13
Related
How many palindromic numbers have 11 digits and are divisible by 101?
The answer is 36000.
Brute force in PariGP:
{
s=0;
for(i=10^5,10^6-1,
d=digits(i);
a=i10^5+d+d10+d100+d1000+d10000;
if (a%101==0,
s+=1;
if (s<=10 || s>35990, print(s,". solution ",a));
);
);
}
solution 10000000001
solution 10001010001
solution 10002020001
solution 10003030001
solution 10004040001
solution 10005050001
solution 10006060001
solution 10007070001
solution 10008080001
solution 10009090001
solution 99990009999
solution 99991019999
solution 99992029999
solution 99993039999
solution 99994049999
solution 99995059999
35997.
The answer is 36000.
Brute force in PariGP:
{
s=0;
for(i=10^5,10^6-1,
d=digits(i);
a=i10^5+d+d10+d100+d1000+d10000;
if (a%101==0,
s+=1;
if (s<=10 || s>35990, print(s,". solution ",a));
);
);
}
solution 10000000001
solution 10001010001
solution 10002020001
solution 10003030001
solution 10004040001
solution 10005050001
solution 10006060001
solution 10007070001
solution 10008080001
solution 10009090001
solution 99990009999
solution 99991019999
solution 99992029999
solution 99993039999
solution 99994049999
solution 99995059999
solution 99996069999
solution 99997079999
solution 99998089999
solution 99999099999
Pablo Emanuel
MSc in Math and IMO medalist
·
Upvoted by
Jeremy Collins
, M.A. Mathematics, Trinity College, Cambridge and
Ermal Feleqi
, PhD Mathematics, University of Padua (2010) · Author has 847 answers and 5.5M answer views
·
Updated 4y
Related
How do I prove that among any 39 consecutive natural numbers, it is always possible to find one whose sum of digits is divisible by 11?
Expanding on
Roman Andronov
’s answer, let’s try and answer a much more general question:
For each natural number
n
, find the smallest natural number
μ
(
n
)
with the property that among any
μ
(
n
)
consecutive natural numbers there exists at least one whose sum of (decimal) digits is divisible by
n
.
Your question is equivalent to
μ
(
19
)
≤
39
. We’ll prove that actually
μ
(
19
)
=
39
, and will derive a general explicit formula for
μ
(
n
)
for every
n
.
First of all, it isn’t obvious that
μ
(
n
)
is well defined for every
n
. That is, we could potentially have, for some
n
, arbitrarily long sequences of
Expanding on Roman Andronov’s answer, let’s try and answer a much more general question:
For each natural number n, find the smallest natural number μ(n) with the property that among any μ(n) consecutive natural numbers there exists at least one whose sum of (decimal) digits is divisible by n.
Your question is equivalent to μ(19)≤39. We’ll prove that actually μ(19)=39, and will derive a general explicit formula for μ(n) for every n.
First of all, it isn’t obvious that μ(n) is well defined for every n. That is, we could potentially have, for some n, arbitrarily long sequences of consecutive natural numbers none of which having its sum of digits divisible by n.
I claim this is not possible, and that μ(n)<2⋅10n for all n. Indeed, any set of 2⋅10n natural numbers contains a whole block going from A⋅10n to A⋅10n+999…9=(A+1)⋅10n−1. That means, in particular, that it contains the numbers A000⋯001,A000⋯011,A000⋯111,⋯A011⋯111,A111⋯111. The digit sum of those numbers form a set of n consecutive integers, which therefore span every possible residue class modulo n, including 0, that is, one of them needs to be a multiple of n.
So now let’s try and explicitly calculate the value of μ(n) for some small values of n.
As we move through the natural number, their digit sum keeps getting increased by 1, until we reach a number whose representation ends in 9. At that point, the digit sum will decrease by exactly 9j−1 where j is the number of nines at the end of the decimal representation.
That’s all the preparation we need, let the games begin!
μ(1) is trivially 1
For n=2, we need to start with a number with an odd digit sum. Then, if this number doesn’t end in 9, we can move no further. If it ends in an odd number of 9s, though, the next sum will still be odd, but then the next number necessarily needs to have an even sum. So μ(2)=3, and 9, 10 is an example of a maximal sequence of lenght 2.
For n=3 we also start with s=1(mod3), then the next will be 2(mod3), and we need it to end in 9 to have a next move. But that doesn’t help much, because will be [math]+1 \mod 3[/math], regardless of [math]j[/math], and we’ll get to a multiple of 3 in 3 steps, i.e. [math]\mu(3) = 3[/math].
For [math]n = 4[/math], we start again with [math]s = 1 \pmod 4[/math] and advance with +1 as far as we can, i.e., until [math]3 \mod 4[/math]. Then we need to bring it back as far as possible, so we can continue further, i.e., ideally we want to bring it all the way back to [math]1 \mod 4[/math]. For that, we need to find [math]j[/math] such that [math]1 - 9j = -2 \pmod{4}[/math], which we can always do because 9 and 4 are relatively prime (we could have simply calculated [math]j[/math] explicitly: [math]1–9\times 3 = -26 = -2 \pmod 4[/math], but the general observation will be useful for us moving forward).
In summary, our sequence [math]\pmod 4[/math] will be:
[math]1,2,3,1,2,3,0[/math]
which means [math]\mu(4) = 7[/math]. And, in fact, one example of a counter-sequence of length 6 would be (remember we had [math]j = 3[/math], so the number where the sequence “turns” needs to end in 999):
[math]997, 998, 999, 1000, 1001, 1002[/math]
Now we’ve found an useful pattern!
For [math]n = 5, 7, 8[/math] we can use the exact same strategy than for [math]n = 4[/math], i.e we start on [math]1 \pmod n[/math], advance with +1’s until [math]n-1[/math], pull it back to [math]1[/math] with a suitable number of 9’s (which we can always do since those numbers are relatively prime to 9), and then we advance again until 0. So the sequence [math]\mod n[/math] will be:
[math]1,2,\cdot,n-1, 1,2,\cdot, n-1, 0[/math]
and [math]\mu(n) = 2n-1[/math]. For example, for [math]n = 7[/math], we need [math]1–9j = -5 \pmod 7[/math], i.e. [math]j=3[/math], and a counter-sequence of length [math]12[/math] would be
[math]994, 995, 996, 997, 998, 999, 1000, 1001, 1002, 1003, 1004, 1005[/math]
For [math]n = 6[/math], we can’t get the same result, because [math]1–9j[/math] can only be [math]+1[/math] or [math]-2 \pmod 6[/math], so the best we can do is
[math]1,2,3,4,5,3,4,5,0[/math]
and [math]\mu(6) = 9[/math]
For [math]n=9[/math], every move is a [math]+1[/math], and [math]\mu(9)[/math] is trivially [math]9[/math].
Putting it all together so far:
If [math]n \leq 9[/math], then:
[math]\mu(3) = 3[/math]
[math]\mu(6) = \mu(9) = 9[/math]
[math]\mu(n) = 2n-1[/math], otherwise
For [math]n = 10[/math], we can follow the same strategy (gcd(10,9) = 1):
[math]1, 2, 3, \cdots 9, 1, \cdots 9, 0[/math]
and [math]\mu(10) = 19[/math].
But, when we get to [math]n = 11[/math], things get a little more interesting! Let’s start the same way:
[math]1, 2, \cdots 10, 1, 2, \cdots 10[/math]
But now, notice that the last number in our sequence will end in 9, because that second “1” corresponded to a number ending in 0. Which means that the next number won’t be 11 = 0. More than that, since we had to use more than one 9 on the first turn (actually, we needed to use 6, to have [math]1–9\times 6 = -9 \pmod {11}[/math]), that number ended in “00″, and our last number ends in “09” which has exactly one 9. Therefore, the next move is a -8 instead of a +1, and we have
[math]1,2,\cdots 10, 1, 2, \cdots 10, 2, 3, \cdots, 10, 0[/math]
But that also means that our very first number ends in “90”, and, moving back, we wouldn’t have a -1, which would bring us to 0, but a +8. So we can also extend the sequence back, to
[math]1,2,\cdots, 9, 1, 2, \cdots 10, 1,2, \cdots 10, 2, 3, \cdots 10, 0[/math]
which has 9 + 10 + 10 + 10 = 39 terms yielding [math]\mu(19) = 39[/math]. Using the information that our middle turning point had to end in 999999, we can explicit create the optimal 38-term sequence
[math]999981 - 1000018[/math]
Let’s skip [math]n=12[/math] for a moment (gcd(9,12) = 3) and let’s look at [math]n = 13[/math]. The optimal strategy is still the same. Find a suitable power of 10 such that, on one side we have the sum being obviously 1 (10000…00), and on the other side (99….99) having it being [math]-1 \pmod{13}[/math]. Again, we can do it because gcd(9,13) = 1. When we do it, we’ll be able to extend “forward” all the way to 10…039, and the extension backwards will be similar, as we start at -1, and the steps backwards will be either -1 or +8: going backwards is exactly symmetric to going forward. So we’ll go back 38 steps to 99…960. The complete sequence modulo 13 will be:
[math]0 ,-12, \cdots, -4; -12, -11 \cdots -3; -11, \cdots, -2; -10 \cdots -1 : 1 \cdots 10; 2 \cdots 11; 3 \cdots 12; 4 \cdots 0[/math]
i.e. [math]\mu(13) = 80 - 1 = 79[/math]
We can do the same for [math]n = 14, 16, 17[/math]. The turning point will be a number such that the sum of digits of [math]10^j - 1[/math], i.e. [math]9j[/math] is [math]-1 \pmod n[/math]. Then we’ll be able to extend it fowards to [math]10\cdots 0(k-1)9[/math], i.e. [math]10k[/math] steps, where [math]k = n-9[/math] and backwards the exact number of steps, yielding [math]\mu(9+k) = 20k - 1[/math].
Now, if [math]n = 12[/math] or [math]n=15[/math], the best we can do is to have [math]9j = -3 \pmod n[/math], which means that our sequence will start as
[math]-12, \cdots ,-3 : 1 \cdots 10[/math]
From that point, we still can extend it forward all the way up to [math]10\cdots 0(k-1)9[/math], i.e. [math]10k[/math] steps. But we lose 2 full blocks going backwards, i.e. we can only go [math]10(k-2)[/math] steps. And we end up with [math]\mu(9+k) = 10(2k-2) - 1 = 20(k-1) - 1[/math].
For [math]n = 18[/math], the situation is even worse, as the best we can hope [math]9j[/math] to be is [math]-9 \pmod n[/math]. That means that we still can go 90 steps going forward, but we lose 8 full blocks going backwards, and we only can go 10 steps. Which means that [math]\mu(18) = 99[/math].
And now it’s pretty straightforward to generalize. If [math]n = 9m + k[/math], with [math]k[/math] not divisible by [math]3[/math], starting with a good [math]10^j[/math], such that [math]9j = -1 \pmod n[/math], we’ll be able to move forward all the way up to [math]10 \cdots 0(k-1)99\cdots9[/math], where we have [math]m[/math] nines at the end, i.e. [math]k\cdot 10^m[/math] steps, and the same number of steps backwards, i.e. [math]\mu(9m + k) = 2k\cdot 10^m - 1[/math].
If [math]n = 9m +k[/math] where [math]k = 3[/math] or [math]k = 6[/math], we’ll be able to go [math]k \cdot 10^m[/math] steps forward and math \cdot 10^m[/math] steps backwards, getting [math]\mu(9m +k) = 2(k-1)\cdot 10^m - 1[/math].
If [math]n = 9m[/math], we’ll be able to go [math]9\cdot 10^{m-1}[/math] steps forward and only [math]10^{m-1}[/math] steps backwards, getting [math]\mu(9m) = 10^m - 1[/math].
Pallav Sahu
Mah lyf, mah-thematics!
·
Author has 646 answers and 2.8M answer views
·
Updated 10y
Related
What is an eight digit palindrome divisible by 45?
First of all, for a number to be divisible by 45 it should be divisible by 5 and 9 both.
A number divisible by 5 has unit digits 0 or 5. Since we require a palindromic number, 0 as a unit digit is ruled out.
Let the palindromic number be of the form
a, b, c
are integers less than or equal to 9.
Now, as the number is also divisible by 9, the sum of its digits should be an even multip
First of all, for a number to be divisible by 45 it should be divisible by 5 and 9 both.
A number divisible by 5 has unit digits 0 or 5. Since we require a palindromic number, 0 as a unit digit is ruled out.
Let the palindromic number be of the form
5abccba5
where
a, b, c
are integers less than or equal to 9.
Now, as the number is also divisible by 9, the sum of its digits should be an even multiple of nine i.e.
5+a+b+c+c+b+a+5 =
even multiple of nine. Consequently,
multiple of nine (say 9k)...
Tanmay Pandit
IITJ CSE '22
·
Author has 571 answers and 2.7M answer views
·
9y
Related
How many four digit numbers divisible by 11 are not palindromes?
4 digit palindromes are of a form
abba
where a & b are digits.
Let's apply divisibility test for 11 to
abba.
As a+b=b+a, we can conclude that
all palindromes are divisible by 11.
Now, let's find the total number of 4 digit palindromes.
As a= any digit from 1 to 9 ( if we take a=0, abba will be a 3 digit number. ) & b= any digit from 0 to 9, there are
9 & 10
alternatives for values of a & b respectively.
No.of 4 digit palindromes = 910=90.
Now, let's find the total number of 4 digit multiples of 11.
Their series is -
1001, 1012,......, 9988, 9999.
This is an
A.P.
with
a=1001 & d=11.
Let
tn= 9
4 digit palindromes are of a form
abba
where a & b are digits.
Let's apply divisibility test for 11 to
abba.
As a+b=b+a, we can conclude that
all palindromes are divisible by 11.
Now, let's find the total number of 4 digit palindromes.
As a= any digit from 1 to 9 ( if we take a=0, abba will be a 3 digit number. ) & b= any digit from 0 to 9, there are
9 & 10
alternatives for values of a & b respectively.
No.of 4 digit palindromes = 910=90.
Now, let's find the total number of 4 digit multiples of 11.
Their series is -
1001, 1012,......, 9988, 9999.
This is an
A.P.
with
a=1001 & d=11.
Let
tn= 9999 & n=?
tn= a+(n-1) d
9999=1001+ 11n - 11=11n+990
909=n+90 so
n=819.
Answer=819-90=729.
Related questions
What is the six-digit palindromic number that is divisible by 11?
What is the least 7-digit palindromic number divisible by 11 without a single digit 0?
How many palindromic numbers have 11 digits and are divisible by 101?
What is a palindrome number and give one 5-digit example?
Why odd-digit palindromic numbers not divisible by 11?
How many 7-digit palindromes are there?
How many palindromes can you find between 500 and 599?
What is the greatest 5-digit palindrome number divisible by 45?
How do I find the number of 6 digit palindrome numbers which are divisible by 5?
What is the greatest three-digit number divisible by 11 and 12?
How many 6 digit palindromes are divisible by 495?
What is the least 10 digit prime palindromic number?
How many four digit numbers divisible by 11 are not palindromes?
What is an eight digit palindrome divisible by 45?
What is the smallest digit to make the number divisible by 11?
About
·
Careers
·
Privacy
·
Terms
·
Contact
·
Languages
·
Your Ad Choices
·
Press
·
© Quora, Inc. 2025 |
2078 | https://www.pathologyoutlines.com/topic/cnsmultiplesclerosis.html | Chapters By Subspecialty
Autopsy & forensics
Bone, joints & soft tissue
Bone & joints
Soft tissue
Breast
Clinical pathology
Chemistry, toxicology & UA
Coagulation
Hematology & immune disorders
Lab admin & management
Microbiology & infectious diseases
Transfusion medicine
Cytopathology
Dermatopathology
Skin melanocytic tumor
Skin nonmelanocytic tumor
Skin nontumor
GI / liver
Anus & perianal
Appendix
Colon
Esophagus
Gallbladder & extrahep bile ducts
Liver & intrahepatic bile ducts
Pancreas
Small intestine & ampulla
Stomach
GU / adrenal
Adrenal gland & paraganglia
Bladder & urothelial tract
Kidney tumor
Penis & scrotum
Prostate gland & seminal vesicles
Testis & paratestis
Gyn
Cervix
Fallopian tubes & broad ligament
Ovary
Placenta
Pleura & peritoneum
Uterus
Vulva & vagina
Head & neck
Ear
Larynx, hypopharynx & trachea
Mandible & maxilla
Nasal cavity & nasopharynx
Oral cavity & oropharynx
Salivary glands
Thyroid & parathyroid
Hematopathology
Bone marrow neoplastic
Bone marrow nonneoplastic
Hematology & immune disorders
Lymph nodes & spleen, nonlymphoma
Lymphoma & related disorders
Informatics / digital pathology
Medical renal
Neuropathology
CNS & pituitary tumors
CNS nontumor
Eye
Muscle & peripheral nerve nontumor
Staging
Stains & CD markers / molecular
Molecular markers
Stains & CD markers
Thoracic
Heart & vascular pathology
Lung
Mediastinum
Pleura & peritoneum
WHO classification of tumors
Jobs
Fellowships
Conferences / Webinars
Authors
Editorial Board
Authors
Author Information
Author Instructions
Directory
Books
Question Bank
Other Links
About Us
Advertise
Blog
Cases
CCN
CME (online)
Comment
Contact Us
FAQ
Games
Grants
Newsletters
Statistics
Testimonials
Videos
Textbook
Autopsy & forensics
Bone, joints & soft tissue
Bone & joints
Soft tissue
Breast
Clinical pathology
Chemistry, toxicology & UA
Coagulation
Hematology & immune disorders
Lab admin & management
Microbiology & infectious diseases
Transfusion medicine
Cytopathology
Dermatopathology
Skin melanocytic tumor
Skin nonmelanocytic tumor
Skin nontumor
GI / liver
Anus & perianal
Appendix
Colon
Esophagus
Gallbladder & extrahep bile ducts
Liver & intrahepatic bile ducts
Pancreas
Small intestine & ampulla
Stomach
GU / adrenal
Adrenal gland & paraganglia
Bladder & urothelial tract
Kidney tumor
Penis & scrotum
Prostate gland & seminal vesicles
Testis & paratestis
Gyn
Cervix
Fallopian tubes & broad ligament
Ovary
Placenta
Pleura & peritoneum
Uterus
Vulva & vagina
Head & neck
Ear
Larynx, hypopharynx & trachea
Mandible & maxilla
Nasal cavity & nasopharynx
Oral cavity & oropharynx
Salivary glands
Thyroid & parathyroid
Hematopathology
Bone marrow neoplastic
Bone marrow nonneoplastic
Hematology & immune disorders
Lymph nodes & spleen, nonlymphoma
Lymphoma & related disorders
Informatics / digital pathology
Medical renal
Neuropathology
CNS & pituitary tumors
CNS nontumor
Eye
Muscle & peripheral nerve nontumor
Staging
Stains & CD markers / molecular
Molecular markers
Stains & CD markers
Thoracic
Heart & vascular pathology
Lung
Mediastinum
Pleura & peritoneum
WHO classification of tumors
Jobs
Fellowships
Conferences
Directory
Books
Cases
Advertise
The Directory now requires login - if you have a profile, click the "Forgot your password?" link to activate it.
Authors
Editorial Board
Authors
Author Information
Author Instructions
Author Awards
Blog
Question Bank
CCN
CME
Comment
Contact Us
Games
Grants
Newsletters
Statistics
Testimonials
Home > CNS nontumor > Multiple sclerosis
CNS nontumor
CNS myelin disorders
Multiple sclerosis
Authors:Rachel A. Multz, M.D., Jared T. Ahrendsen, M.D., Ph.D.
Editorial Board Member:Meaghan Morris, M.D., Ph.D.
Deputy Editor-in-Chief:Chunyu Cai, M.D., Ph.D.
Last author update: 23 January 2023
Last staff update: 19 March 2025
Copyright: 2023-2025, PathologyOutlines.com, Inc. PubMed Search: Multiple sclerosis
Page views in 2024: 8,742
Page views in 2025 to date: 5,954
Table of Contents
Definition / general | Essential features | Terminology | ICD coding | Epidemiology | Sites | Pathophysiology | Etiology | Clinical features | Diagnosis | Laboratory | Radiology description | Radiology images | Prognostic factors | Case reports | Treatment | Gross description | Gross images | Frozen section description | Frozen section images | Microscopic (histologic) description | Microscopic (histologic) images | Cytology images | Positive stains | Negative stains | Electron microscopy description | Sample pathology report | Differential diagnosis | Additional references | Practice question #1 | Practice answer #1 | Practice question #2 | Practice answer #2
Cite this page: Multz R, Ahrendsen JT. Multiple sclerosis. PathologyOutlines.com website. Accessed September 28th, 2025.
Definition / general
Chronic, inflammatory demyelinating disease that may involve any part of the central nervous system
Lesions, known as plaques, are characterized by loss of myelin with relative axonal preservation, reactive gliosis and the presence of lymphocytes or macrophages
Essential features
Most common immune mediated demyelinating disorder of the central nervous system and most common cause of nontrauma related neurologic disability in young adults
Female predominant neurologic disorder consisting of episodic nervous system dysfunction and characteristic radiologic findings that demonstrate both dissemination in time (multiple episodes) and dissemination in space (multiple lesions seen on imaging)
Terminology
Multiple sclerosis
MS
ICD coding
ICD-10: G35 - multiple sclerosis
Epidemiology
Most frequent cause of nontrauma related permanent disability in young adults (Neurol Clin 2011;29:207)
Female predominance with F:M = 2.3:1
Mean age of onset: 28 - 31 years
Risk factors:
Genetics (HLA::DRB1)
Presence of coexisting autoimmune disease
Decreased sunlight exposure
Low vitamin D levels
Geographic location, with a higher latitude corresponding with a higher incidence of disease (Nature 2011;476:214)
More recently, it has been posited that there may be an association between EBV infection and the development of MS (Science 2022;375:296)
Sites
Can involve any site in the central nervous system (CNS), typically within the white matter but also involves the gray matter (Brain 2019;142:1858)
Most common sites for MS plaques:
Optic chiasm and tract (nearly always involved)
Periventricular white matter
Subcortical white matter
Deep gray nuclei
Periventricular areas of the brainstem, cerebellum and spinal cord
Pathophysiology
Since the cause of MS is unknown, a detailed pathophysiologic pathway has not yet been established (see Etiology)
Etiology
Cause of MS is unknown, though it is favored to be due to an autoimmune activation of lymphocytes (Arch Neurol 2004;61:1613)
Clinical features
Patients present with one or more distinct episodes of CNS dysfunction and characteristic MRI findings (dissemination in time and space) (Lancet Neurol 2018;17:162, Nat Rev Dis Primers 2018;4:43)
Relapsing remitting MS (RRMS)
Most common subtype of MS
Episodic neurologic deficits that may partially or fully resolve but are followed by additional relapses
Primary progressive MS (PPMS)
Nonepisodic progression of disease from the initial onset of symptoms
Secondary progressive MS (SPMS)
Typically follows RRMS, where the disease transitions from episodic to continued progression
Acute Marburg MS
Fulminant MS that is monophasic and rapidly progressive, usually leading to death within a year of symptom onset
Often seen in children and young adults
Tumefactive MS:
Uncommon subtype of acute MS that presents as a mass-like lesion with a radiologic differential diagnosis that includes demyelination, infection or neoplasm
Radiologically characterized by contrast enhancement often with unique open or incomplete ring
Surgical biopsy (with intraoperative frozen section consultation) is sometimes performed to help resolve the differential diagnosis
Diagnosis
MS is a clinical diagnosis, combining clinical history and physical exam findings with imaging findings
2017 McDonald criteria can be applied where there is clinical suspicion for MS (Lancet Neurol 2018;17:162)
Evoked potentials and optical coherence tomography (OCT) can also be used to aid in diagnosis (Lancet Neurol 2006;5:853, Mult Scler 2014;20:1342)
Laboratory
Lumbar puncture is not required for the diagnosis of MS but can test for the presence of oligoclonal IgG bands in the cerebrospinal fluid (CSF), which is supportive of MS
E.g., if a patient is symptomatic with classic MRI findings showing dissemination in space but there is no known dissemination in time, oligoclonal bands can support a diagnosis of MS (Brain 2018;141:1075)
Majority of cells in the CSF differential count are lymphocytes (specifically T cells) and the protein levels should be within the reference range (Neurology 2004;63:1966)
Radiology description
MRI is the best imaging modality since CT findings can be nonspecific
Best visualized on T2 / FLAIR sequences:
Extends perpendicularly on sagittal view, known as Dawson fingers (Cold Spring Harb Perspect Med 2018;8:a028969)
Enhancement is a nonspecific marker of disease activity
Tumefactive MS will present as an incomplete / open ring enhancing lesion following contrast administration (Neurol Neuroimmunol Neuroinflamm 2019;6:e589)
Persistent hypointensities on T1 weighted images are characteristic of chronic plaques and are referred to as black holes (Acta Neurol Scand 2010;122:1)
Healing or fully healed plaques will convert from hypointense to isointense on T1 (Acta Neurol Scand 2010;122:1)
Radiology images
Contributed by Jared T. Ahrendsen, M.D., Ph.D. and Pouya Jamshidi, M.D.
Dawson fingers
Inactive MS lesion
Images hosted on other servers:
Plaques in spinal cord
Tumefactive MS
Prognostic factors
There are no consistently reliable prognostic factors for MS and outcomes for MS patients cannot be accurately predicted
Generally, patients with relapsing and remitting courses have a better prognosis than those with progressive forms of the disease (Brain 2006;129:584)
Rate of cervical cord atrophy, bowel / bladder symptoms at disease onset and incomplete recovery from initial attack are associated with a worse prognosis (Arch Neurol 2006;63:1686)
Pregnancy is thought to be protective, though disease can worsen in the initial postpartum period (Neurology 2017;89:563)
Extent of MRI abnormalities does not necessarily correlate with disease severity or prognosis (Neurology 2006;66:1384)
Case reports
34 year old woman with acute onset left hemiparesis (Front Neurol 2022;13:891113)
36 year old man with blurred vision, vertigo, perioral numbness and confusion (CMAJ 2022;194:E776)
41 year old man with dysphagia, apraxia and ataxia (Neurol India 2022;70:1226)
47 year old woman with fatigue, blurry vision and numbness 3 weeks after recovering from SARS-CoV-2 infection (Cureus 2021;13:e19036)
Treatment
Acute exacerbation / episode (Mult Scler 2020;26:1352458520924595)
High dose glucocorticoids are the mainstay of treatment for an acute exacerbation
Plasma exchange can be considered in patients with poor response
Relapsing remitting MS (Mult Scler 2020;26:1352458520924595, Neurology 2018;90:777)
Monoclonal antibodies (natalizumab, alemtuzumab, ocrelizumab, rituximab) are generally first line therapy
Oral therapies including fumarates and S1P receptor modulators (siponimod, fingolimod) can be used in patients who do not wish to have or are unable to tolerate infusions / injectables
Interferons and glatiramer acetate
Secondary progressive MS
Same treatment as for relapsing remitting MS, though generally ineffective
Primary progressive MS
Ocrelizumab is the only FDA approved drug that has been shown to slow the progression of disease in PPMS (N Engl J Med 2017;376:209)
Gross description
Chronic plaques tend to be rounded, tan-gray and variably sized with a sharp demarcation from the surrounding brain tissue
More recent lesions will be tan-pink or tan-yellow with less sharply defined borders
In the spinal cord, plaques will have a fanned out appearance with sharp borders and can potentially involve multiple adjacent signaling pathways (Pract Neurol 2016;16:279)
Gross images
Contributed by Rachel A. Multz, M.D. and Jared T. Ahrendsen, M.D., Ph.D.
Subcortical and periventricular plaques
Subcortical plaques
Periventricular plaques
Frozen section description
Typically only performed in cases of acute tumefactive MS, where there is radiologic suspicion for neoplasm or infection
Findings are similar for any type of demyelinating disease:
Sheets of foamy macrophages in a background of reactive gliosis
Can be misdiagnosed as high grade glioma, especially since reactive atypia and mitotic can activity seen (Creutzfeldt cells)
Cell populations will be more heterogeneous than neoplastic processes
On permanent sections, there will be a sharp border between the area of interest and background brain tissue
Reference: Acta Neuropathol 2017;133:13
Frozen section images
Contributed by Jared T. Ahrendsen, M.D., Ph.D.
Frozen section of demyelination lesion
Microscopic (histologic) description
Active MS plaque (Brain Pathol 2005;15:217):
Prominent perivascular lymphoid infiltrates consisting predominantly of CD8+ T lymphocytes
Parenchymal and perivascular macrophages, some with visible myelin globules on Luxol fast blue / periodic acid-Schiff stain (LFB / PAS)
More specific for active demyelination than lymphocytes
Preferential loss of myelin with relative axonal preservation and the formation of axonal spheroids (swellings)
Reactive astrocytosis
In the periphery of the plaque will see remyelination with thinner myelin sheaths than background axons
Chronic / inactive MS plaque (Brain Pathol 2005;15:217):
Relatively acellular lesions with near complete loss of myelin and sharp borders
Should not see inflammation (or if present, rare lymphocytes) and will only see oligodendrocytes at the margin
Reactive gliosis
Baló concentric sclerosis (Neurol Sci 2004;25:S319):
Rare histologic subtype of MS with concentric and alternating rings of demyelination and preserved myelin
Areas of demyelination will show features similar to those of an active MS plaque
Acute multiple sclerosis, Marburg type (Mult Scler 2015;21:485)
Multiple, poorly defined plaques
All plaques are active, with numerous macrophages, reactive astrogliosis and perivascular lymphocyte cuffs
Sometimes edema or necrosis may be seen
Microscopic (histologic) images
Contributed by Rachel A. Multz, M.D. and Jared T. Ahrendsen, M.D., Ph.D.
Chronic demyelination plaque
Partial remyelination
Active MS lesion
Active MS lesion
Cytology images
Contributed by Jared T. Ahrendsen, M.D., Ph.D.
Smear preparation of demyelination lesion
Positive stains
Luxol fast blue (LFB):
In active plaques, will highlight normal background myelin with complete loss of staining in the area of demyelination
Border between demyelination and normal appearing white matter will be distinct but not as sharp as that of an inactive plaque
In areas where remyelination has occurred, myelin will be present but less dense than the uninvolved white matter (shadow plaque)
Highlights myelin globules within macrophages in areas of active demyelination
CD68 or CD163 will highlight macrophages in areas of active demyelination
Neurofilament or a silver stain will highlight relative axonal preservation and the presence of occasional axonal spheroids
GFAP highlights reactive astrogliosis
Ki67 may be elevated in active plaques
CD3 will highlight perivascular T lymphocytes but is not necessary for diagnosis
Reference: Acta Neuropathol 2017;133:13
Negative stains
Viral stains (HIV, HSV, SV40, etc.)
Markers of high grade glioma (IDH1 [R132H], p53, ATRX, etc.)
There should not be a significant CD20+ B cell population
Reference: Acta Neuropathol 2017;133:13
Electron microscopy description
No longer used in routine clinical practice
Active lesions will show lymphocytes entering the endothelium of blood vessels, axonal spheroids filled with mitochondria and neurofilaments, a vesicular network of degenerated myelin surrounding axons and myelin globules within macrophages
Chronic lesions will show demyelinated axons or remyelinated axons with thinner myelin sheaths (N Engl J Med 2006;354:942)
Sample pathology report
Brain lesion, left parietal lobe, biopsy:
Reactive brain tissue with numerous macrophages and evidence of demyelination (see comment)
Comment: The findings are suggestive of a demyelinating process. Given the radiologic impression of a mass-like lesion in the brain, tumefactive multiple sclerosis should be considered as a diagnostic consideration.
Differential diagnosis
Cerebral infarction:
Sheets of macrophages with engulfed myelin and evidence of demyelination (but primarily distributed along vascular territories)
Loss of axons (as opposed to demyelination, in which axons are relatively spared)
Other features of hypoxic ischemic injury are generally present
Neuromyelitis optica (NMO):
Formerly considered a variant of multiple sclerosis
Predominantly involves the optic tract and spinal cord, sometimes extensively involving the gray matter
Unique pathogenesis with antiaquaporin 4 antibodies
Neutrophils present in areas of demyelination, which are absent in MS
Prominent axonal loss and destruction of astrocytes
Acute disseminated encephalomyelitis (ADEM):
Marked T cell perivascular inflammation with local demyelination, however, will lack large plaque formation
Often with history of recent viral illness or vaccination
Self limited with rapid recovery and low probability of lasting neurologic sequelae
Progressive multifocal leukoencephalopathy (PML):
Clinical history of immunosuppression
Multiple foci of demyelination with sheets of macrophages and minimal lymphoid infiltrates
Unique plum colored viral inclusions in oligodendrocytes and bizarre appearing astrocytes
Demonstration of JC viral (PCR assay on cerebrospinal fluid; SV40 immunostain on tissue sections)
Note that MS patients treated with certain immunomodulatory agents (especially natalizumab) are at increased risk of developing PML (Front Neurol 2020;11:579438)
Additional references
Gray: Escourolle & Poirier's Manual of Basic Neuropathology, 6th Edition, 2018, Perry: Practical Surgical Neuropathology - A Diagnostic Approach, 2nd Edition, 2017
Practice question #1
The pathologic features seen in this axial section of the spinal cord (H&E with Luxol fast blue [LFB]) taken at autopsy are most consistent with which of the following conditions?
Amyotrophic lateral sclerosis
Foix-Alajouanine syndrome
Multiple sclerosis
Subacute combined degeneration
Tabes dorsalis
Practice answer #1
C. Multiple sclerosis (MS). As shown in the image, there is asymmetric demyelination in random areas of the spinal cord in MS. Answer A is incorrect because amyotrophic lateral sclerosis shows symmetric degeneration of lateral corticospinal tracts. Answer B is incorrect because Foix-Alajouanine syndrome demonstrates myelopathy caused by dural arteriovenous malformation located in the spinal cord. Answer D is incorrect because subacute combined degeneration demonstrates relatively symmetric degeneration of both the lateral corticospinal tracts and the dorsal columns. Answer E is incorrect because tabes dorsalis shows symmetric degeneration of dorsal columns and dorsal nerve roots. Comment Here Reference: Multiple sclerosis
Practice question #2
A 48 year old woman with multiple sclerosis treated with natalizumab develops numerous FLAIR signal abnormalities in the right centrum semiovale and left occipital lobe white matter. The patient deteriorated clinically and died 2 weeks after presentation. Brain autopsy was performed, revealing the microscopic features shown in the image above in areas of FLAIR signal abnormality. What is the most likely diagnosis?
Active multiple sclerosis plaque
Acute disseminated encephalomyeltis
Infiltrating astrocytoma
Progressive multifocal leukoenceophalopathy
Toxoplasma encephalitis
Practice answer #2
D. Progressive multifocal leukoencephalopathy (PML). The presence of macrophages, reactive gliosis, bizarre appearing astrocytes and plum colored oligodendroglial inclusions, along with the characteristic history described in the vignette, is most suggestive of PML. Active multiple sclerosis lesion is incorrect: active MS lesions are characterized by numerous macrophages and reactive gliosis; however, viral inclusions would not be seen in oligodendrocytes. Acute disseminated encephalomyelitis is incorrect: this is a monophasic demyelinating illness, distinct from multiple sclerosis and classically associated with recent viral infection or immunization; viral inclusions would not be seen in oligodendrocytes. Infiltrating astrocytoma is incorrect: while the atypical glial cells shown in the image might raise a concern for an infiltrating astrocytoma, the clinical history and imaging findings are not suggestive of a neoplastic process. Toxoplasma encephalitis is incorrect: Toxoplasma infection in the brain is characterized by necrotizing abscesses and the presence of parasites within pseudocysts (bradyzoites) or free parasites (tachyzoites). Comment Here Reference: Multiple sclerosis
Back to top
Home > CNS nontumor > Multiple sclerosis
© Copyright PathologyOutlines.com, Inc. Click here for information on linking to our website or using our content or images.
Home
About Us
Advertise
Amazon.com
Authors
Board Review
Books
Cases
CCN
CME (online)
Comment Here
Conferences / Webinars
Contact Us
Copyright
Directory
FAQ
Fellowships
Games
Grants
Jobs
Libraries
Merchandise
Newsletters
Privacy Policy
Statistics
Testimonials
30150 Telegraph Road, Suite 119, Bingham Farms, Michigan 48025 (USA)
Telephone: (248) 646-0325; Email: Comments@pathologyoutlines.com
This website is intended for pathologists and laboratory personnel but not for patients. We welcome suggestions or questions about using the website. However, we cannot answer medical or research questions or give advice.
© Copyright PathologyOutlines.com, Inc. Click here for information on linking to our website or using our content or images. |
2079 | https://www.census.gov/quickfacts/fact/table/sandiegocitycalifornia/HSG010223 | U.S. Census Bureau QuickFacts
An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Ongoing Maintenance:
We are actively working on the QuickFacts data application and are aware of instances where some features may be unavailable.
Please visit data.census.gov to explore Census data through data profiles.
QuickFacts is currently undergoing a maintenance cycle. Please check back later.
CONNECT WITH US
Information Quality
Data Linkage Infrastructure
Data Protection and Privacy Policy
Accessibility
FOIA
Inspector General
No FEAR Act
U.S. Department of Commerce
USA.gov
Measuring America's People and Economy
✕
Is this page helpful?YesNo
Thank you for your feedback.Comments or suggestions?
Comments or suggestions?
255 characters maximum⚠ 255 characters maximum reached
NO THANKS SUBMIT |
2080 | http://www.360doc.com/content/22/1222/05/80695768_1061064044.shtml | 小学数学知识点解读与学习策略49——轴对称
搜索
我的图书馆
查看信箱
系统消息
官方通知
设置
开始对话
有 11 人和你对话,查看 忽略
历史对话记录
通知设置
发文章
发文工具
撰写网文摘手文档视频思维导图随笔相册原创同步助手
其他工具
图片转文字文件清理AI助手
留言交流
搜索
分享
QQ空间QQ好友新浪微博微信
生成长图转Word打印朗读全屏修改转藏+1
×
微信扫一扫
关注作者
×
微信扫一扫
将文章发送给好友
了解公众号宣传计划
【原】小学数学知识点解读与学习策略49——轴对称
慢点数学 2022-12-22 发布于江苏来源|54阅读|2 转藏
大 中 小
转藏全屏朗读打印转Word生成长图分享
QQ空间QQ好友新浪微博微信
展开全文
说起轴对称,就不得不提轴对称图形,这两个概念学生最容易混淆。轴对称研究的是两个图形之间的关系,当这两个图形沿着某条直线进行对折,在直线两旁的两个图形或两个图形的部分能够完全重合,那么这两个图形就被称为成轴对称关系的两个图形,简称为成轴对称。而轴对称图形指的是一个图形,如果该图形沿某条直线对折后,能够使图形的两部分完全重合,那么这样的图形就被称为轴对称图形。小学数学所研究的轴对称,指的是轴对称图形,是一个图形的两个部分之间的关系。明确这一点,才能有针对性地指导孩子学习数学。
轴对称的学习一定要让学生亲自操作、亲身体验,才能建构起轴对称图形的模型。
1、动手折纸
可以先让孩子准备长方形、正方形和平行四边形的纸片各一张,再通过对折纸片,让折痕两边的部分完全重合。操作后发现,长方形、正方形是轴对称图形,平行四边形不是轴对称图形。
接着通过不同的对折方法,认识长方形有两条对称轴,正方形有四条对称轴,对称轴的条数因图形的不同而不同。此时有必要指出,对称轴并不是那条折痕,而是那条折痕所在的直线。
2、动手画“轴”
在方格纸上画一些平面图形的对称轴,如:
① 只是轴对称图形:角、等腰三角形、等边三角形、等腰梯形等。
② 只是中心对称图形:平行四边形等。
③ 既是轴对称图形又是中心对称图形:正方形、长方形、圆等。
④ 既不是轴对称图形又不是中心对称图形:不等边三角形、非等腰梯形等。
经历画“轴”的过程,可以进一步加深对轴对称图形的认识,初步体会轴对称图形的特征。
3、动手画图
轴对称图形到底有什么特征,不妨通过下面三个层次的画图操作,实现对其特征的认识。
把下面的图形补全,使其成为轴对称图形。
①
说明补全图形的方法,体会轴对称图形的对称点到对称轴的距离相等。也就是说,对称点连成的线段被对称轴垂直平分,此结论只要体会理解,不作掌握要求。
②
说明补全图形的方法,加深对轴对称图形特征的理解(对称点到对称轴的距离相等)。
③
该题有些难度,目的就是强化对称点到对称轴的距离相等这一特征。刚开始画图时,如果出现错误也是正常的,不妨提醒孩子联系上面两题得出的结论,再进行操作探究,一定会对轴对称图形有一个统一的认识。
4、动手设计
我们可以根据轴对称图形的特征,由一个图形得到与它对称的另一个图形,重复这个过程,便可以得到美丽的图案。经历设计图形的过程不但可以巩固对轴对称图形的认识,而且可以从运动的角度加深对图形的认识。
+关注
慢点数学
立即填写简介( 查看如何填写简介 )
共 1298 篇原创
微信公众号:微信扫一扫关注
赞赏
转藏分享
QQ空间QQ好友新浪微博微信
献花(0) +1
来自: 慢点数学>《待分类》
举报/认领
上一篇:
同样是1/4为什么不相等?
下一篇:
从画到算的转变,是思维能力提升的表现
猜你喜欢
0 条评论
发表
请遵守用户评论公约
查看更多评论
类似文章更多
轴对称与轴对称图形
轴对称与轴对称图形欣赏大自然的风景观察下面的图形,你能发现它们有什么共同的特征吗?DEF对称点对称轴轴对称的两个图形是全等的对称轴是对称点连线的垂直平分线轴对称图形轴对称图形\5642.swf如果把...
对称的认识
数学上是先定义一个点对一条直线(对称轴)的对称点,再定义一个图形对一条直线(对称轴)的对称图形,最后才透过如果一个图形对直线L(...
中心对称优质教学材料课件PPT
选填
中心对称
(1)点O是线段AA的中点(2)△ABC≌△A′B′C′想一想中心对称与轴对称有什么区别?又有什么联系?轴对称中心对称有一条对称轴---直线图形沿对称轴对折(翻折1800)后重合对称点的连线被对称轴垂直平分有一...
第27讲 轴对称与中心对称
把一个图形沿着某一条直线翻折过去,如果它能够和另一个图形重合,那么这两个图形关于直线对称,两个图形关于直线对称也称轴对称.这条直线叫做对称轴..【答案】略4.(2012·青岛)下列图形中,既...
解答版《火线100天》2015中考数学复习第24讲图形的平移、对称与旋转
中心对称中心对称图形定义把一个图形绕着一点旋转后,如果与另一个图形重合,那么这两个图形成中心对称,这个点叫做其对称中心,旋转前后重合的点叫做对称点.把一个图形绕着某点旋转后,能与其自身重合...
七年级数学下册《轴对称与旋转》练习题及答案(湘教版)
(2)满足条件的图形有很多,只要画正确一个,都可以得满分.23.解:24.解:(1)如图所示(2 )图形A的最小旋转角是60度,它是中心对称图形.图形B的最小旋转角是72度,它不是中心对称图形.图形C的最小旋转角...
【人教版】2017届中考复习:第26讲《轴对称与中心对称》ppt课件
第七章图形的变化第26讲轴对称与中心对称。考点一轴对称图形与轴对称1.轴对称图形如果一个平面图形沿着一条直线折叠后直线两旁的部分能够互相重合那么这个图形就叫做轴对称图形..如果一个图形绕某点...
【初二数学】画轴对称图形经典例题解析,逢考必错的高频考点
个图VIP年卡,限时优惠价168元>>x
慢点数学
教育领域优质作者
关注对话
TA的最新馆藏
结合经验,让除法自然生长 什么是合适的问题? 初次学习小括号的主要教学目标 小括号有什么作用? 分步算式变成综合算式的常用方法 “时间”与“时刻”的区别
喜欢该文的人也喜欢更多
热门阅读换一换
复制
打印文章
发送到手机微信扫码,在手机上查看选中内容
全屏阅读
朗读全文
分享文章QQ空间QQ好友新浪微博微信
AI解释
复制
打印文章
adsbygoogle.js 发送到手机微信扫码,在手机上查看选中内容
全屏阅读
朗读全文
AI助手
阅读时有疑惑?点击向AI助手提问吧
联系客服
在线客服:
360doc小助手2
客服QQ:
1732698931
联系电话:4000-999-276
客服工作时间9:00-18:00,晚上非工作时间,请在QQ留言,第二天客服上班后会立即联系您。 |
2081 | https://www.dummies.com/article/academics-the-arts/math/geometry/applying-the-transversal-theorems-187559/ | Book & Article Categories
Collections
Book & Article Categories
Book & Article Categories
Collections
Applying the Transversal Theorems
When you cross two lines with a third line, the third line is called a transversal. You can use the transversal theorems to prove that angles are congruent or supplementary.
Here’s a problem that lets you take a look at some of the theorems in action: Given that lines m and n are parallel, find the measure of angle 1.
Here’s the solution:
(Or you can also say that because you’ve got the parallel-lines-plus-transversal diagram and two angles that are both obviously acute, they must be congruent.) Set them equal to each other and solve for x:
This equation has two solutions, so take them one at a time and plug them into the x’s in the alternate exterior angles.
So 144° and 155° are your possible answers for angle 1.
When you get two solutions (such as x = 6 and x = –5) in a problem like this, you do not plug one of them into one of the x’s
and the other solution into the other x (like –5 + 30 = 25). You have to plug one of the solutions into allx’s, giving you one result for both angles
then you have to separately plug the other solution into all x’s, giving you a second result for both angles
Angles and segments can’t have negative measures or lengths. Make sure that each solution for x produces positive answers for all the angles or segments in a problem.
If a solution makes any angle or segment in the diagram negative, it must be rejected even if the angles or segments you care about end up being positive. However, do not reject a solution just because x is negative: x can be negative as long as the angles and segments are positive (x = –5, for example, works just fine in this problem).
Now here’s a proof that uses some of the transversal theorems:
Check out the formal proof:
Statement 1:
Reason for statement 1: Given.
Statement 2:
Reason for statement 2: Given.
Statement 3:
Reason for statement 3: If lines are parallel, then alternate interior angles are congruent.
Statement 4:
Reason for statement 4: Given.
Statement 5:
Reason for statement 5: If a segment (segment GJ) is subtracted from two congruent segments, then the differences are congruent.
Statement 6:
Reason for statement 6:SAS (using lines 1, 3, and 5).
Statement 7:
Reason for statement 7:CPCTC (Corresponding Parts of Congruent Triangles are Congruent).
Statement 8:
Reason for statement 8: If alternate exterior angles are congruent, then lines are parallel.
Extend the lines in transversal problems. Extending the parallel lines and transversals may help you see how the angles are related.
For instance, if you have a hard time seeing that angle K and angle H are indeed alternate interior angles (for step 3 of the proof),
After doing that, you’re looking at the familiar parallel-line scheme shown in the following figure.
You can do the same thing for angle LJK and angle IGH by extending
About This Article
This article is from the book:
About the book author:
Mark Ryan has more than three decades’ experience as a calculus teacher and tutor. He has a gift for mathematics and a gift for explaining it in plain English. He tutors students in all junior high and high school math courses as well as math test prep, and he’s the founder of The Math Center on Chicago’s North Shore. Ryan is the author of Calculus For Dummies, Calculus Essentials For Dummies, Geometry For Dummies, and several other math books.
This article can be found in the category:
Quick Links
Connect
About Dummies
Dummies has always stood for taking on complex concepts and making them easy to understand. Dummies helps everyone be more knowledgeable and confident in applying what they know. Whether it's to pass that big test, qualify for that big promotion or even master that cooking technique; people who rely on dummies, rely on it to learn the critical skills and relevant information necessary for success.
Copyright © 2000-2025 by John Wiley & Sons, Inc., or related companies. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.
© 2025 MARVEL |
2082 | https://bmcmicrobiol.biomedcentral.com/articles/10.1186/s12866-018-1319-0 | Efficient transposon mutagenesis mediated by an IPTG-controlled conditional suicide plasmid | BMC Microbiology | Full Text
Your privacy, your choice
We use essential cookies to make sure the site can function. We also use optional cookies for advertising, personalisation of content, usage analysis, and social media.
By accepting optional cookies, you consent to the processing of your personal data - including transfers to third parties. Some third parties are outside of the European Economic Area, with varying standards of data protection.
See our privacy policy for more information on the use of your personal data.
Manage preferences for further information and to change your choices.
Accept all cookies
Skip to main content
Advertisement
Search
Explore journals
Get published
About BMC
Login
Menu
Explore journals
Get published
About BMC
Login
Search all BMC articles
Search
BMC Microbiology
Home
About
Articles
Submission Guidelines
Collections
Join the Editorial Board
Submit manuscript
Efficient transposon mutagenesis mediated by an IPTG-controlled conditional suicide plasmid
Download PDF
Download PDF
Methodology article
Open access
Published: 24 October 2018
Efficient transposon mutagenesis mediated by an IPTG-controlled conditional suicide plasmid
Santa S. Naorem1na1,
Jin Han1na1,
Stephanie Y. Zhang1,
Junyi Zhang1,
Lindsey B. Graham1,
Angelou Song1,
Cameron V. Smith1,
Fariha Rashid1&
…
Huatao GuoORCID: orcid.org/0000-0002-2396-19341
Show authors
BMC Microbiologyvolume 18, Article number:158 (2018) Cite this article
10k Accesses
11 Citations
9 Altmetric
Metrics details
Abstract
Background
Transposon mutagenesis is highly valuable for bacterial genetic and genomic studies. The transposons are usually delivered into host cells through conjugation or electroporation of a suicide plasmid. However, many bacterial species cannot be efficiently conjugated or transformed for transposon saturation mutagenesis. For this reason, temperature-sensitive (ts) plasmids have also been developed for transposon mutagenesis, but prolonged incubation at high temperatures to induce ts plasmid loss can be harmful to the hosts and lead to enrichment of mutants with adaptive genetic changes. In addition, the ts phenotype of a plasmid is often strain- or species-specific, as it may become non-ts or suicidal in different bacterial species.
Results
We have engineered several conditional suicide plasmids that have a broad host range and whose loss is IPTG-controlled. One construct, which has the highest stability in the absence of IPTG induction, was then used as a curable vector to deliver hyperactive miniTn5 transposons for insertional mutagenesis. Our analyses show that these new tools can be used for efficient and regulatable transposon mutagenesis in Escherichia coli, Acinetobacter baylyi and Pseudomonas aeruginosa. In P. aeruginosa PAO1, we have used this method to generate a Tn5 insertion library with an estimated diversity of ~ 10 8, which is ~ 2 logs larger than the best transposon insertional library of PAO1 and related Pseudomonas strains previously reported.
Conclusion
We have developed a number of IPTG-controlled conditional suicide plasmids. By exploiting one of them for transposon delivery, a highly efficient and broadly useful mutagenesis system has been developed. As the assay condition is mild, we believe that our methodology will have broad applications in microbiology research.
Background
Transposon mutagenesis is a powerful technique for bacterial genetic and genomic studies. One of the most widely used transposons is derived from Tn5. The Tn5 transposon contains two IS50 elements as inverted terminal repeats (Additional file1: Figure S1) [1, 2]. Both IS50 and Tn5 can be mobilized by their encoded transposase (Tnp) protein, which recognizes two 19 base pair (bp) sequences at their ends, namely outside end (OE) and inside end (IE), for transposition . OE and IE differ by 7 bp (Additional file 1: Figure S1). As Tn5 insertion is almost completely random, it can insert into any gene in a bacterium. The native Tn5/IS50 is not very active, thus avoiding overt deleterious effect on their hosts, but hyperactive mutants have been engineered as genetic manipulation tools [2, 3]. The most active one contains a mosaic sequence of OE and IE (mosaic end; ME) at the transposon termini and an engineered tnp gene encoding a highly active transposase enzyme (Tnp H), which together increase Tn5 transposition by more than 1000-fold.
Transposons for insertional mutagenesis are usually delivered into bacteria through conjugation of a suicide plasmid [4,5,6]. Insertion mutants are then selected as the transposons are tagged with an antibiotic-resistance gene. The success of a transposon mutagenesis assay, especially a saturation mutagenesis assay, requires generation of an insertion library with high diversity, which requires efficient plasmid conjugation and transposon transposition. However, conjugation is inefficient in many bacterial species. Occasionally, electroporation has also been used to deliver transposon-containing suicide plasmids for mutagenesis, but low library diversities were often achieved using such approaches [7,8,9]. To perform efficient transposon mutagenesis in these organisms, temperature-sensitive (ts) plasmids are sometimes used for transposon delivery [10,11,12,13,14,15,16]. However, many organisms do not have a ts and easily manipulatable plasmid, and sometimes a ts plasmid in one organism is either non-ts or suicidal in a different organism [10, 14, 17]. In addition, a high temperature is often required to cure the ts plasmids after mutagenesis, which can be inhibitory to cell growth and may result in selection of mutants with adaptive genetic changes [10, 11, 14].
In this study, we have developed an efficient and regulatable transposon mutagenesis tool that exploits an IPTG-controlled conditional suicide plasmid. It contains an RSF1010 replicon, an IncQ-type replication origin that allows plasmid replication in most Gram-negative bacteria, as well as a few Gram-positive bacteria . It is relatively small, so it can be easily modified. To control plasmid replication by IPTG, a second copy of the plasmid-encoded repF repressor gene is cloned downstream of the Escherichia coli tac promoter. For efficient and regulatable transposon mutagenesis, we used miniTn5 (mTn5) transposons and cloned the hyperactive transposase gene downstream of a lac promoter. We show that the resulting constructs can be used for efficient insertional mutagenesis in three different bacterial species. In Pseudomonas aeruginosa PAO1, we show that our system is able to generate a Tn5 insertion library that is almost 2 logs larger than the best library of PAO1 and related Pseudomonas strains previously reported, demonstrating that we have developed a powerful mutagenesis tool that is highly useful for microbiology studies.
Results
Construction of IPTG-controlled suicide plasmids
To develop a method for efficient transposon mutagenesis in bacterial species that are difficult to transform and conjugate, we created multiple IPTG-controlled suicide plasmids that have a broad host range (Fig.1a). The plasmids were derived from pMMB208, which is a conjugatable plasmid containing an RSF1010 oriV (an IncQ-type origin of replication) that can replicate in most Gram-negative bacteria and a few Gram-positive bacteria . Plasmid replication requires three proteins, RepA, MobA/RepB and RepC, which are a helicase, a primase and an oriV-binding protein, respectively. repF encodes a small repressor protein that binds the P4 promoter and controls the repF-repA-repC operon through feedback inhibition [19, 20]. pMMB208 also contains a tac promoter (P tac), a lacI Q gene and a chloramphenicol resistance marker (Cam R). To create a conditional suicide plasmid (pMMB-repF), a second copy of the repF gene was inserted downstream of P tac. Upon IPTG induction, efficient plasmid loss from transformed E. coli DH10B cells was observed (99.97%; Fig. 1b). As an alternative strategy, we inserted two repA helicase dominant negative mutants, K42A and D139A, downstream of P tac . Similarly, IPTG was able to induce efficient plasmid loss from the transformed DH10B cells. In fact, plasmid retention rates of the dominant negative mutants (K42A, 4.9 × 10− 7; D139A, 1.5 × 10− 5) were much lower than that of pMMB-repF (3.5 × 10− 4) (Fig. 1b). However, the two repA dominant negative mutants showed significantly lower plasmid stability in the absence of IPTG induction (Fig. 1b), suggesting that plasmid replication is strongly inhibited by leaky expression of the dominant negative mutants, or by spontaneous recombination of the wild-type and the dominant negative repA genes (~ 861 bp direct repeats). Consistent with that, there were ~ 20–30-fold less plasmid isolated from the same amount of cells for the two mutant constructs (Fig. 1c). Therefore, we decided to choose pMMB-repF for further experiments. To kill the cells that still retain the plasmid after IPTG induction, we inserted a sacB counter selection marker into the vector , resulting in pMMB-repF/sacB. Indeed, insertion of sacB allows efficient killing of plasmid-containing cells by sucrose (data not shown; also see below).
Fig. 1
IPTG-controlled conditional suicide plasmids. a Plasmid pMMB208 and its conditional-suicide derivatives. pMMB208 contains an RSF1010 oriV for replication and an oriT for conjugation. Genes repA, mobA/repB and repC encode proteins required for plasmid replication, and repF encodes a transcription repressor that binds promoter P4. pMMB208 also has Cam R and lacI Q genes and a P tac promoter. Plasmid pMMB-repF is a derivative of pMMB208 that has a second copy of the repF gene inserted downstream of P tac. Plasmids pMMB-repA K42A and pMMB-repA D139A have a dominant-negative repA mutant gene, either K42A or D139A, inserted downstream of P tac. b Amount of E. coli DH10B cells retaining the indicated plasmids after 24 h growth in the absence of antibiotics, either with or without IPTG induction. Results were average of three independent experiments, and bars represent mean ± SD (standard deviation). p< 0.0001, p< 0.0001, and p< 0.0001 by unpaired Student’s t-test for IPTG induced cultures. c pMMB208 and its derivatives are digested with Hin dIII (H) and Pst I (P). Comparing to pMMB208 and pMMB-repF, the repA K42A and D139A mutants showed reduced yields in plasmid minipreps (no IPTG induction; 3.0% and 4.7% of that of pMMB208, respectively). Hin dIII and Pst I digestion generates two fragments for each plasmid. The ~ 9 kb fragment is seen on the gel, while the shorter ones, ranging from 18 bp for pMMB208 to 861 bp for the repA mutants, are not visible. Another large band (~ 9 kb) is also seen in restriction digestion of pMMB208 and its derivatives, even after complete digestion, and the cause is unknown
Full size image
IPTG-controlled mutagenesis of E. coli by a highly-active mTn5 transposon
A Kan R-tagged mTn5 was then inserted in pMMB-repF/sacB for transposon mutagenesis (Fig.2a) . The mTn5 contains an OE and an IE at the termini. In addition, it contains an uncoupled, lac promoter (P lac)-controlled tnp H gene encoding the hyperactive transposase (Tnp H) , thus allowing inducible expression of Tnp H. E. coli cells transformed with this plasmid, pSNC-mTn5, were cultured in LB media with and without IPTG induction for 24 h. Cells were then analyzed for efficiencies of plasmid loss, sucrose counter selection and transposon insertion (See Methods). The plasmid is stable without IPTG induction, as ~ 91.4% of cells retained the plasmid (Cam R) after 24 h culture in the absence of antibiotics (Fig. 2b). In contrast, ~ 2.6 × 10− 3 of the cells retained the plasmid post IPTG induction, suggesting that overexpression of the RepF repressor caused efficient plasmid loss. Sucrose counter selection further reduced plasmid-bearing cells (~ 1.6 × 10− 6 are Cam R; ~ 1600-fold reduction). In comparison, the percentage of Suc R Kan R cells after IPTG induction was found to be ~ 2.3 × 10− 4 (Tn5-containing), significantly higher than that of Suc R Cam R cells (~ 1.6 × 10− 6, plasmid-containing), suggesting that Tn5 transposition had occurred efficiently (Suc R Kan R Cam S: ~ 2.3 × 10− 4). Colony restreaking showed that 150/150 Suc R Kan R colonies were Kan R Cam S (Fig. 2c). Colony PCRs, which used two sets of primers (P1 + P2 for detection of Kan R, or mTn5, and P3 + P4 for detection of tac-repF, or plasmid), confirmed plasmid loss in 10 out of 10 colonies (10/10) (Fig. 2d). Sequence analysis showed that all 13 Suc R Kan R colonies analyzed had different Tn5 insertion sites (Fig.3a).
Fig. 2
mTn5 transposon mutagenesis using an IPTG-controlled conditional suicide plasmid. a Diagram of plasmid pSNC-mTn5. pSNC-mTn5 is a derivative of pMMB-repF that contains a Kan R-tagged mTn5, a lac promoter-controlled hyperactive transposase gene (tnp H), and a sacB counter selection marker (with its own promoter). OE and IE are outside and inside ends of the mTn5. b Plasmid and transposon retention frequencies in E. coli DH10B. A “+” symbol for IPTG indicates that the inducer was added to the liquid culture, and a “+” symbol for Suc, Cam, and Kan indicates that the chemicals were added to the plates. Black columns represent plasmid retention frequencies, and the blue column represents Tn5 retention frequency. Results were average of three independent experiments, and bars represent mean ± SD (p < 0.0001 and p = 0.0054 by unpaired t-test). (see Methods for details) (c) Colony restreaking. 150/150 Suc R Kan R colonies of DH10B were found to be Kan R Cam S and 50 are shown here. d Colony PCR of 10 restreaked clones in (c). Primer sets P1&P2 and P3&P4 detect Kan R and repF, respectively. All were mTn5-positive and plasmid-negative. Primers P3 and P4 are a functional pair for PCR-amplification of the plasmid sequence (data not shown). e Plasmid and transposon retention frequencies in A. baylyi. Results were average of three independent experiments, and bars represent mean ± SD (p = 0.024 and p < 0.0001 by unpaired t-test). f Plasmid and transposon retention frequencies in P. aeruginosa. Results were average of three independent experiments, and bars represent mean ± SD (p = 0.0013 and p = 0.0038 by unpaired t-test). Colony restreaking and PCR analysis are shown in Additional file 2: Figure S2
Full size image
Fig. 3
mTn5 insertion sites in different bacteria. a mTn5 insertion sites in E. coli DH10B. b mTn5 insertion sites in A. baylyi 33,305. c mTn5 insertion sites in P. aeruginosa PAO1. Only the chromosomal sequences next to the OE are shown. The 9 bp duplicated sequences are shown in capital letters. Identical clones are shown only once, with numbers indicated in parenthesis. Either gene names or locus tags are given as genetic locations
Full size image
Efficient mutagenesis of Acinetobacter baylyi and P. aeruginosa by a highly-active mTn5 transposon
Construct pSNC-mTn5 was then tested in two Gram-negative, capsule-bearing bacteria, A. baylyi 33,305 and P. aeruginosa PAO1 [23, 24]. Comparing to E. coli DH10B, transformed A. baylyi 33,305 and P. aeruginosa PAO1 appeared to lose the plasmid more easily in the absence of IPTG, with ~ 56.3% of A. baylyi and ~ 59.6% of P. aeruginosa retaining the plasmid after 24 h culture in LB media without antibiotics (Fig. 2e, f). Following IPTG induction, ~ 14.7% of A. baylyi and ~ 3.2% of P. aeruginosa retained the plasmid, suggesting that IPTG induced additional plasmid loss from these organisms, although their efficiencies were lower than that in DH10B cells. With sucrose counter selection, ~ 1.6 × 10− 7 of A. baylyi remained Cam R, indicating that they contained the plasmid (Fig. 2e). Similarly, ~ 5.4 × 10− 7 of P. aeruginosa cells were found to be Suc R Cam R (Fig. 2f). These results suggest that IPTG and sucrose both contributed in reducing plasmid-bearing cells. In comparison, the percentages of Suc R Kan R cells were 8.4 × 10− 6 for A. baylyi and 3.4 × 10− 6 for P. aeruginosa, suggesting that Tn5 transposition occurred in both organisms prior to plasmid loss. Colony restreaking showed that 100/100 Suc R Kan R colonies are Suc R Cam S, suggesting that efficient plasmid loss had occurred following Tn5 transposition (~ 100% for both; Additional file2: Figure S2a, c). Loss of plasmids was further confirmed by PCR tests (Additional file 2: Figure S2b, d). As observed in DH10B cells, Tn5 insertion also seemed to be random, as 9/9 A. baylyi and 13/15 P. aeruginosa mutants had different Tn5 insertion sites (Fig. 3b, c). The detection of identical mutants suggests that cell growth ensued following transposon transposition (Fig. 3c), which is common in different transposon mutagenesis assays [5, 6, 25].
Construction of a Tn5 insertion library of P. aeruginosa using the highly-active mTn5 transposon
To determine whether we can construct a transposon insertion library of P. aeruginosa PAO1 with high diversity, ten pSNC-mTn5 transformants of the bacterium were cultured independently and then combined and induced with IPTG to initiate transposon mutagenesis. Following 24 h culture in LB media containing IPTG, ~ 6.4% of cells retained the plasmid (Additional file3: Figure S3a). The frequencies of Suc R Cam R and Suc R Kan R cells in the IPTG-induced culture were found to be ~ 6.5 × 10− 7 and ~ 3.5 × 10− 6, respectively. Based on the total number of cells cultured and the frequency of Suc R Kan R Cam S cells, the total diversity of the mTn5 insertion library was estimated to be ~ 1.3 × 10 7, which covers the entire gene repertoire (5697) of P. aeruginosa PAO1 by ~ 2238 times . To our knowledge, the diversity of this transposon insertion library is bigger than the best transposon insertion library of PAO1 and related strains previously reported (Table1) [5, 6, 9, 26,27,28,29,30,31,32]. Colony restreaking and PCR tests confirmed plasmid loss in the mutants (Additional file 3: Figure S3b, c), and 28/37 clones analyzed had different Tn5 insertion sites (Additional file 3: Figure S3d). Based on the percentage of independent clones in the library, its diversity is re-estimated to be ~ 1.0 × 10 7.
Table 1 Comparison of transposon insertion libraries of P. aeruginosa strains
Full size table
An mTn5 with MEs enables generation of a P. aeruginosa mutant library with even higher diversity
To determine whether the efficiency of mTn5 transposition can be further improved, we replaced both OE and IE of the mTn5 with MEs (Fig.4a). The new plasmid, pSNC-mTn5ME, was transformed into DH10B cells. Cell growth (or colony sizes) appeared to be normal, suggesting that basal-level transposition, if any, did not lead to obvious cellular toxicity, which was our initial concern. The behavior of the plasmid and Tn5 transposition efficiency were determined under the same conditions described above. Without IPTG induction, the plasmid remained relatively stable, as ~ 100% of the cells retained the plasmid (Cam R). After IPTG induction for 24 h, 1.1 × 10− 3 of the cells retained the plasmid, suggesting that RepF overexpression caused efficient plasmid loss. With sucrose counter selection, ~ 2.4 × 10− 5 cells remained Suc R Cam R. Interestingly, the frequency of Suc R Kan R cells was found to be very high (~ 28.0%), indicating that mTn5ME is much more active than the non-ME version (~ 1200 folds). Restreaking of Suc R Kan R colonies showed that they were all Kan R Cam S (100/100) (Additional file4: Figure S4a), and colony PCRs confirmed plasmid loss (10/10) (Additional file 4: Figure S4b). Sequence analysis of the transposon insertion junctions showed that all 13 Suc R Kan R colonies analyzed had different Tn5 integration sites (Additional file 4: Figure S4c).
Fig. 4
Generation of a P. aeruginosa insertion library with pSNC-mTn5ME. a Diagram of pSNC-mTn5ME, a derivative of pSNC-mTn5 that has MEs instead of OE and IE at the termini of mTn5. b Plasmid and transposon retention frequencies in E. coli DH10B. Results were average of three independent experiments, and bars represent mean ± SD (p< 0.0001 and p = 0.0004 by unpaired t-test). Colony restreaking and PCR assays are shown in Additional file 4: Figure S4. c Plasmid and transposon retention frequencies in A. baylyi. Results were average of three independent experiments, and bars represent mean ± SD (p = 0.0029 and p = 0.0006 by unpaired t-test). Colony restreaking and PCR assays are shown in Additional file 5: Figure S5. d Plasmid and transposon retention frequencies in P. aeruginosa PAO1. Results were average of three independent experiments, and bars represent mean ± SD (p< 0.0001 and p = 0.0065 by unpaired t-test). Colony restreaking and PCR assays are shown in Additional file 6: Figure S6. e Plasmid and transposon retention frequencies in the P. aeruginosa PAO1 mutant library generated with pSNC-mTn5ME. f Colony restreaking. 100/100 Suc R Kan R colonies of the mTn5ME library of P. aeruginosa were found to be Kan R Cam S. 50 are shown here. g Colony PCR of ten restreaked clones in (f) with the indicated primers. All were mTn5-positive and plasmid-negative. h Transposon insertion sites of 46 mutant clones from the mTn5ME insertion library of P. aeruginosa. Identical clones are shown only once, with their duplication numbers indicated in parenthesis
Full size image
We then determined whether construct pSNC-mTn5ME would also be more active in A. baylyi 33,305 and in P. aeruginosa PAO1. For A. baylyi, the efficiencies of plasmid loss were higher for pSNC-mTn5ME than for pSNC-mTn5, both in the absence and presence of IPTG induction (Figs. 2e and 4c). Sucrose counter selection was highly effective for both constructs (Figs. 2e and 4c). As in E. coli, mTn5ME was found to be much more active than the non-ME version (~ 140 fold higher; Suc R Kan R cells: ~ 1.2 × 10− 3 for mTn5ME vs. ~ 8.4 × 10− 6 for mTn5). Similarly, colony restreaking of Suc R Kan R cells showed that 100/100 colonies are Kan R Cam S (Additional file5: Figure S5a), and plasmid loss was further verified by PCR (Additional file 5: Figure S5b). 9/14 colonies were found to have different Tn5 insertion sites (Additional file 5: Figure S5c). For PAO1, efficiencies of plasmid loss (±IPTG) were found to be similar for both pSNC-mTn5 and pSNC-mTn5ME (Figs. 2f and 4d), and sucrose counter selection was also effective for pSNC-mTn5ME (Fig. 4d). As in E. coli and in A. baylyi, mTn5ME was found to be more active than mTn5 in PAO1 (~ 11 fold higher; Suc R Kan R cells: ~ 3.9 × 10− 5 for mTn5ME vs. ~ 3.4 × 10− 6 for mTn5) (Figs. 2f and 4d). In the colony restreaking assay, 100/100 Suc R Kan R colonies were found to be Kan R Cam S (Additional file6: Figure S6a), and PCR assays further confirmed plasmid loss (10/10) (Additional file 6: Figure S6b). Sequence determination showed that 7/10 colonies tested had different Tn5 insertion sites (Additional file 6: Figure S6c).
We then determined whether pSNC-mTn5ME would be a better construct than pSNC-mTn5 for transposon saturation mutagenesis in P. aeruginosa. Ten transformants were randomly picked for Tn5 insertion library construction using the protocol described above. About 0.87% of cells retained the plasmid after IPTG induction, and the frequency of Suc R Cam R cells was found to be 6.8 × 10− 8. In comparison, the frequency of Suc R Kan R cells was found to be ~ 9.5 × 10− 5, suggesting that efficient mTn5ME transposition has occurred. Based on the total amount of cells cultured and the mTn5ME transposition efficiency (~ 9.5 × 10− 5), the diversity of the mTn5ME insertion library was estimated to be 1.02 × 10 8, which is ~ 3 logs larger than the best PAO1 transposon insertion library previously reported and ~ 2 logs larger than a Tn5 insertion library of P. aeruginosa MPAO1, a derivative of PAO1 with ~ 0.2% genetic variation [6, 33]. This new library is by far the biggest transposon insertion library of PAO1 and related species ever reported (Table 1). The size of our new library is enough to cover the entire gene repertoire of PAO1 by ~ 18,000 times. Colony restreaking (100) and PCR tests (10) confirmed plasmid loss in all the Suc R Kan R clones analyzed (Fig. 4f, g), and 34/46 clones tested had different Tn5 insertion sites (Fig. 4h). Thus, the independent clones in the library (library diversity) are estimated to be ~ 7.5 × 10 7.
Discussion
We have developed a new transposon mutagenesis system that is efficient, regulatable, easy-to-use, and broadly useful. We believe it will be especially useful for functional genomics studies of Gram-negative bacteria that are difficult to transform and conjugate, such as certain capsule-containing bacteria, obligate anaerobes, and possibly obligate intracellular pathogens as well. The advantage of this method relies on the following features: (i) A broadly-functional plasmid replicon; (ii) Replication of the plasmid is regulated by IPTG; (iii) The inclusion of the sacB gene for counter selection; (iv) A highly-active/hyperactive transposon; (v) Regulatable expression of the hyperactive transposase gene; (vi) mTn5 and mTn5ME transposons insert almost completely randomly in different bacteria (Additional file7: Figure S7) [34, 35]. In addition, the relatively small sizes of the RSF1010-based plasmids also facilitate their transformation and conjugation. Similar to transposon mutagenesis using ts plasmids, our system does not depend on efficient plasmid transformation and conjugation, and requires as few as one transformant or conjugated cell for transposon saturation mutagenesis. Using this new tool, we have generated a Tn5 transposon insertion library of P. aeruginosa PAO1 with a diversity of ~ 10 8, which is ~ 2 logs larger than the best transposon insertion library of PAO1 and related Pseudomonas strains ever generated (Table 1). P. aeruginosa is an important opportunistic pathogen that frequently causes nosocomial infections and many of the strains are multidrug-resistant. The mutant PAO1 library we generated should also be valuable for P. aeruginosa pathogenesis studies.
To our knowledge, our plasmids are the only non-ts, conditional suicide plasmids used for transposon mutagenesis, and they replicate in a wide range of bacterial species . In contrast, many ts mutant plasmids seem to have limited host ranges, either due to the limited host ranges of the parental plasmids, or due to the species-specificity of their ts phenotypes [10, 11, 14,15,16,17, 36]. In addition, ts plasmids often require prolonged incubation at high temperatures for plasmid curing, which can be harsh conditions for bacterial growth and survival, thus may lead to accumulation of adaptive genetic changes. Additional file8: Table S1 is a detailed comparison of our systems (pSNC-mTn5 and pSNC-mTn5ME) with various ts plasmid-based platforms that have been used for transposon mutagenesis in Gram-negative bacterial species, which clearly shows that our systems will be more broadly useful. In addition to their utilities in transposon mutagenesis, the IPTG-controlled conditional suicide plasmids that we developed should have many other applications, such as for allelic exchange or as curable vectors for delivering gene targeting systems, e.g., TargeTrons, λ Red, RecET, etc [37, 38].
Conclusion
In this work, we have developed a number of IPTG-controlled conditional suicide plasmids that contain the broad-host-range RSF1010 origin. Using one of the constructs to deliver a hyperactive mTn5 transposon, we showed that this system can be used for efficient mutagenesis of different bacterial species. As the assay condition is mild and the host range of the RSF1010 plasmid is extremely wide, we believe that our methodology will have broad applications in microbiology research.
Methods
Bacterial strains and growth conditions
E. coli DH10B was purchased from Invitrogen. A. baylyi (ATCC 33305) and P. aeruginosa PAO1 (ATCC BAA-47) were purchased from ATCC. Unless stated otherwise, all the strains were grown at 37°C in Luria Broth (LB) liquid media with agitation at 200 rpm or on LB plates with 1.5% agar. For sacB counter selection, we used LBNS plates (LB n o s alt: 1% Tryptone, 0.5% yeast extract and 1.5% agar) supplemented with 10% sucrose (Fisher Scientific). Appropriate antibiotics and concentrations were used to select for bacterial cells that are antibiotic resistant. E. coli DH10B: chloramphenicol (Cam; Gold Biotechnology), 25 μg/ml; kanamycin (Kan; Fisher Scientific), 50 μg/ml. A. baylyi: Cam, 10 μg/ml; Kan, 10 μg/ml. P. aeruginosa PAO1: Cam, 250 μg/ml; Kan, 500 μg/ml.
Plasmid construction
To construct plamsid pMMB-repF, we PCR-amplified the repF gene from pMMB208 . The PCR fragment was digested with Hin dIII and Pst I, and inserted at the corresponding sites of pMMB208, downstream of the tac promoter (P tac). To construct plasmid pMMB-repF/sacB, the sacB gene and its promoter were PCR amplified from plasmid pRE112 and inserted between the unique Sac I and Kpn I sites of pMMB-repF.
To construct plasmids pMMB-repA K42A and pMMB-repA D139A, repA genes containing K42A and D139A mutations were generated in two-step PCRs from plasmid pMMB208 . The mutant genes were cloned between the Hin dIII and Pst I sites of pMMB208.
Plasmid pSNC-mTn5 was constructed in multiple steps. First, plasmid pUT-mTn5Km/lacEZ was constructed from plasmid pUT-mTn5Km . It contains a lac promoter-driven hyperactive transposase gene (tnp H) that has E54K, M56A and L372P mutations . In addition, inside the mTn5 transposon, the inverted repeats flanking the kanamycin resistance marker (Kan R) were deleted . The entire mTn5 cassette of pUT-mTn5Km/lacEZ, which contains the Kan R-mTn5 transposon and P lac-tnp H, was then PCR amplified and cloned at the Xba I site of pMMB-repF/sacB, resulting in plasmid pSNC-mTn5. It has an OE and an IE at the termini of the mTn5. Plasmid pSNC-mTn5ME was derived from pSNC-mTn5 by replacing both OE and IE with MEs.
Characterization of IPTG-induced plasmid loss and transposon mutagenesis
To test IPTG-induced plasmid loss of pMMB-repF, pMMB-repA K42A and pMMB-repA D139A, single colonies of E. coli DH10B cells transformed with the plasmids were inoculated into 5 ml LB + Cam media and cultured at 37°C for ~ 14 h (h). After measuring OD 600, 1 ml of each culture was pelleted by centrifugation and washed with 500 μl of fresh LB to remove antibiotics. Cells were then resuspended in 1 ml LB. An aliquot was added to 5 ml LB (final OD 600 = 0.001) with and without 1 mM IPTG and cultured at 37°C for 24 h. 1 ml of the IPTG-induced samples was then pelleted, washed with 500 μl LB, and resuspended in 1 ml LB. Serial dilutions of the samples (±IPTG) were plated on LB and LB + Cam plates to evaluate plasmid loss. Plasmid retention frequencies were calculated as ratios of cfu (colony forming units) on LB + Cam plates and those on LB plates.
To perform transposon mutagenesis in E. coli DH10B, single colonies of pSNC-mTn5 and pSNC-mTn5ME transformants were cultured in 5 ml LB + Cam + Kan media overnight at 37°C. Cells were then pelleted and washed as above to remove antibiotics, and an aliquot was inoculated to 5 ml LB (final OD 600 = 0.001) in a 14 ml culture tube and grown at 37°C for 24 h with and without 1 mM IPTG induction. A 1 ml aliquot of the IPTG-induced samples was then pelleted, washed with 500 μl LBNS, and resuspended in 1 ml LBNS. Serial dilutions of the samples (±IPTG) were plated on LB and LB + Cam plates to evaluate plasmid loss. The IPTG induced samples were also plated on LBNS+ 10% sucrose and LBNS+ 10% sucrose+Cam plates to estimate percentage of plasmid-retaining cells in the presence of sucrose counter selection; and LBNS+ 10% sucrose+Kan plates to select for transposition events. Plasmid retention frequencies (PRF) were calculated as the following: (1) -IPTG: (cfu on LB + Cam)/(cfu on LB); (2) + IPTG: (cfu on LB + Cam)/(cfu on LB); (3) + IPTG+Suc: (cfu on LBNS+Suc + Cam)/(cfu on LBNS+Suc). Transposon retention frequencies (TRF) were calculated as the following: +IPTG+Suc: (cfu on LBNS+Suc + Kan)/(cfu on LBNS+Suc). mTn5 (or mTn5ME) transposition frequencies were calculated as TRF+IPTG + Suc – PRF+IPTG + Suc, which essentially equals to TRF+IPTG + Suc if the background (PRF+IPTG + Suc) is low. The same protocol, except for the concentrations of antibiotics (indicated above) and IPTG (10 mM for PAO1), was followed to perform transposon mutagenesis in P. aeruginosa PAO1.
Similarly, to perform transposon mutagenesis in A. baylyi 33,305, single colonies of pSNC-mTn5 and pSNC-mTn5ME transformants were cultured in 5 ml LB + Cam + Kan media overnight at 37°C. Cells were pelleted and washed as for E. coli and P. aeruginosa. Then, an aliquot was inoculated to 100 ml LB (final OD 600 = 0.001) in a baffled flask. The cultures were shaken vigorously (~ 250 rpm) at 37°C for 24 h with and without 10 mM IPTG induction. A 1 ml aliquot of the IPTG-induced samples was then pelleted, washed with 500 μl LBNS, and resuspended in 1 ml LBNS. Serial dilutions of the samples (±IPTG) were then plated on appropriate plates to evaluate plasmid loss and mTn5 (or mTn5ME) transposition as in the assays for E. coli and for P. aeruginosa.
To verify plasmid loss in cells with potential transposition events, 100–150 Suc R Kan R colonies in each assay were then restreaked on LB + Kan and LB + Cam plates. In addition, presence of the transposon and the plasmid was determined by colony PCRs in a 25 μl reaction containing 25 mM TAPS-HCl (pH 9.3), 50 mM KCl, 2 mM MgCl 2, 1 mM β-mercaptoethanol, 1x GC enhancer, 0.2 mM dNTPs, 0.1 μl of Q5 polymerase (2 u/μl; NEB), 1 μl of resuspended cells, and 150 ng each of the primers (final concentration = ~ 0.5 μM; see figure legends and in Additional file9: Table S2 form oligos used). PCRs were performed using the following condition: 1x (94°C, 2 min); 25x (94°C, 30 s; 50°C, 30 s; 72°C, 1 min); 1x (72°C, 10 min); 1x (4°C, hold).
Determination of transposon insertion sites
Transposon insertion sites in bacterial chromosomes were determined by arbitrarily primed PCR, in which transposon junctions were amplified in two steps [5, 39]. Bacterial cells were resuspended in 10–20 μl of deionized water and 1 μl was used directly as the PCR template. In the first PCR step, the reaction was performed using a specific primer annealing to the transposon region (Tn5Km1) and a semi-degenerate primer (BDC1) that anneals to many sites on the bacterial chromosome. In the second step, aliquots of the first-round PCR products were amplified using a primer annealing to the transposon region (Tn5Km2), slightly closer to the insertion junction, and a non-degenerate primer (BDC2) that anneals to the constant region of the BDC1-derived sequence. PCRs were carried out under the conditions described above. PCR products from Step 2 were resolved in a 2% agarose gel and major products were gel-purified for sequencing to determine Tn5 insertion sites.
Construction of transposon insertion libraries of P. aeruginosa PAO1
To construct an mTn5 (or mTn5ME) insertion library of P. aeruginosa PAO1, plasmid pSNC-mTn5 (or pSNC-mTn5ME) was first electroporated into the bacterial cells. Ten transformants were cultured independently in 5 ml LB + Cam + Kan media at 37°C for ~ 14 h. Equal amount of each sample (equivalent to 0.5 OD 600 × 1 ml) was then combined, pelleted, washed with 500 μl LB, and the pellet was resuspended in 1 ml LB. An aliquot of the mixture was then inoculated into 500 ml LB supplemented with 10 mM IPTG in a baffled flask (final OD 600 = 0.01) and shaken vigorously (300 rpm) at 37°C for 24 h to perform transposon mutagenesis. The cells were then pelleted by centrifugation and washed with 250 ml LBNS medium. The pellet was resuspended in 50 ml LBNS medium and serial dilutions were plated on LB, LB + Cam, LBNS+ 10% sucrose, LBNS+ 10% sucrose+Cam, and LBNS+ 10% sucrose+Kan plates to determine plasmid loss, mTn5 (mTn5ME) transposition, and total library diversity. Arbitrary PCR and DNA sequencing were then performed to determine Tn5 insertion sites.
Determination of mTn5 and mTn5ME target site preferences in P. aeruginosa PAO1
To determine if mTn5 and mTn5ME have any target site preferences in P. aeruginosa PAO1, we generated sequence logos of their insertion sites in the bacterium using the WebLogo server ( In total, 40 mTn5 insertion sites and 41 mTn5ME insertion sites were used for the analysis.
Abbreviations
bp:
Base pair
Cam:
Chloramphenicol
IE:
Inside end
IPTG:
Isopropyl β-D-1-thiogalactopyranoside
Kan:
Kanamycin
LB:
Luria Broth
LBNS:
LB no salt
ME:
Mosaic end
OD:
Optical density
OE:
Outside end
ts :
Temperature-sensitive
References
Phadnis SH, Berg DE. Identification of base pairs in the outside end of insertion sequence IS50 that are needed for IS50 and Tn5 transposition. Proc Natl Acad Sci U S A. 1987;84(24):9118–22.
ArticleCASGoogle Scholar
Reznikoff WS. Transposon Tn5. Annu Rev Genet. 2008;42:269–86.
ArticleCASGoogle Scholar
Goryshin IY, Reznikoff WS. Tn5 in vitro transposition. J Biol Chem. 1998;273(13):7367–74.
ArticleCASGoogle Scholar
de Lorenzo V, Herrero M, Jakubzik U, Timmis KN. Mini-Tn5 transposon derivatives for insertion mutagenesis, promoter probing, and chromosomal insertion of cloned DNA in gram-negative eubacteria. J Bacteriol. 1990;172(11):6568–72.
ArticleCASGoogle Scholar
Jacobs MA, Alwood A, Thaipisuttikul I, Spencer D, Haugen E, Ernst S, Will O, Kaul R, Raymond C, Levy R, et al. Comprehensive transposon mutant library of Pseudomonas aeruginosa. Proc Natl Acad Sci U S A. 2003;100(24):14339–44.
ArticleCASGoogle Scholar
Lee SA, Gallagher LA, Thongdee M, Staudinger BJ, Lippman S, Singh PK, Manoil C. General and condition-specific essential functions of Pseudomonas aeruginosa. Proc Natl Acad Sci U S A. 2015;112(16):5189–94.
ArticleCASGoogle Scholar
Metzger M, Bellemann P, Schwartz T, Geider K. Site-directed and transposon-mediated mutagenesis with pfd-plasmids by electroporation of Erwinia amylovora and Escherichia coli cells. Nucleic Acids Res. 1992;20(9):2265–70.
ArticleCASGoogle Scholar
Leahy JG, Jonesmeehan JM, Colwell RR. Transformation of Acinetobacter-Calcoaceticus Rag-1 by electroporation. Can J Microbiol. 1994;40(3):233–6.
ArticleCASGoogle Scholar
Shan Z, Xu H, Shi X, Yu Y, Yao H, Zhang X, Bai Y, Gao C, Saris PE, Qiao M. Identification of two new genes involved in twitching motility in Pseudomonas aeruginosa. Microbiology. 2004;150(Pt 8):2653–61.
ArticleCASGoogle Scholar
Sasakawa C, Yoshikawa M. A series of Tn5 variants with various drug-resistance markers and suicide vector for transposon mutagenesis. Gene. 1987;56(2–3):283–8.
CASPubMedGoogle Scholar
Harayama S, Tsuda M, Iino T. Tn1 insertion mutagenesis in Escherichia coli K-12 using a temperature-sensitive mutant of plasmid RP4. Mol Gen Genet. 1981;184(1):52–5.
ArticleCASGoogle Scholar
Le Breton Y, Mohapatra NP, Haldenwang WG. In vivo random mutagenesis of Bacillus subtilis by use of TnYLB-1, a mariner-based transposon. Appl Environ Microbiol. 2006;72(1):327–33.
ArticleCASGoogle Scholar
Stubbendieck RM, Straight PD. Linearmycins activate a two-component signaling system involved in bacterial competition and biofilm morphology. J Bacteriol. 2017;199(18).
Maier TM, Pechous R, Casey M, Zahrt TC, Frank DW. In vivo Himar1-based transposon mutagenesis of Francisella tularensis. Appl Environ Microbiol. 2006;72(3):1878–85.
ArticleCASGoogle Scholar
Rholl DA, Trunck LA, Schweizer HP. In vivo Himar1 transposon mutagenesis of Burkholderia pseudomallei. Appl Environ Microbiol. 2008;74(24):7529–35.
ArticleCASGoogle Scholar
Pelicic V, Jackson M, Reyrat JM, Jacobs WR Jr, Gicquel B, Guilhot C. Efficient allelic exchange and transposon mutagenesis in Mycobacterium tuberculosis. Proc Natl Acad Sci U S A. 1997;94(20):10955–60.
ArticleCASGoogle Scholar
Choi KH, Mima T, Casart Y, Rholl D, Kumar A, Beacham IR, Schweizer HP. Genetic tools for select-agent-compliant manipulation of Burkholderia pseudomallei. Appl Environ Microbiol. 2008;74(4):1064–75.
ArticleCASGoogle Scholar
Morales VM, Backman A, Bagdasarian M. A series of wide-host-range low-copy-number vectors that allow direct screening for recombinants. Gene. 1991;97(1):39–47.
ArticleCASGoogle Scholar
Meyer R. Replication and conjugative mobilization of broad host-range IncQ plasmids. Plasmid. 2009;62(2):57–70.
ArticleCASGoogle Scholar
Maeser S, Scholz P, Otto S, Scherzinger E. Gene F of plasmid RSF1010 codes for a low-molecular-weight repressor protein that autoregulates expression of the repAC operon. Nucleic Acids Res. 1990;18(21):6215–22.
ArticleCASGoogle Scholar
Ziegelin G, Niedenzu T, Lurz R, Saenger W, Lanka E. Hexameric RSF1010 helicase RepA: the structural and functional importance of single amino acid residues. Nucleic Acids Res. 2003;31(20):5917–29.
ArticleCASGoogle Scholar
Edwards RA, Keller LH, Schifferli DM. Improved allelic exchange vectors and their use to analyze 987P fimbria gene expression. Gene. 1998;207(2):149–57.
ArticleCASGoogle Scholar
Barbe V, Vallenet D, Fonknechten N, Kreimeyer A, Oztas S, Labarre L, Cruveiller S, Robert C, Duprat S, Wincker P, et al. Unique features revealed by the genome sequence of Acinetobacter sp. ADP1, a versatile and naturally transformation competent bacterium. Nucleic Acids Res. 2004;32(19):5766–79.
ArticleCASGoogle Scholar
Stover CK, Pham XQ, Erwin AL, Mizoguchi SD, Warrener P, Hickey MJ, Brinkman FS, Hufnagle WO, Kowalik DJ, Lagrou M, et al. Complete genome sequence of Pseudomonas aeruginosa PAO1, an opportunistic pathogen. Nature. 2000;406(6799):959–64.
ArticleCASGoogle Scholar
Wang N, Ozer EA, Mandel MJ, Hauser AR. Genome-wide identification of Acinetobacter baumannii genes necessary for persistence in the lung. MBio. 2014;5(3):e01163–14.
ArticleGoogle Scholar
Withers TR, Yin Y. Yu HD: identification of novel genes associated with alginate production in Pseudomonas aeruginosa using mini-himar1 mariner transposon-mediated mutagenesis. J Vis Exp. 2014;85:51346.
Google Scholar
Lewenza S, Falsafi RK, Winsor G, Gooderham WJ, McPhee JB, Brinkman FS, Hancock RE. Construction of a mini-Tn5-luxCDABE mutant library in Pseudomonas aeruginosa PAO1: a tool for identifying differentially regulated genes. Genome Res. 2005;15(4):583–9.
ArticleCASGoogle Scholar
Gallagher LA, Shendure J, Manoil C. Genome-scale identification of resistance functions in Pseudomonas aeruginosa using Tn-seq. MBio. 2011;2(1):e00315–0.
ArticleGoogle Scholar
Wong SM, Mekalanos JJ. Genetic footprinting with mariner-based transposition in Pseudomonas aeruginosa. Proc Natl Acad Sci U S A. 2000;97(18):10191–6.
ArticleCASGoogle Scholar
Skurnik D, Roux D, Aschard H, Cattoir V, Yoder-Himes D, Lory S, Pier GB. A comprehensive analysis of in vitro and in vivo genetic fitness of Pseudomonas aeruginosa using high-throughput sequencing of transposon libraries. PLoS Pathog. 2013;9(9):e1003582.
ArticleCASGoogle Scholar
Liberati NT, Urbach JM, Miyata S, Lee DG, Drenkard E, Wu G, Villanueva J, Wei T, Ausubel FM. An ordered, nonredundant library of Pseudomonas aeruginosa strain PA14 transposon insertion mutants. Proc Natl Acad Sci U S A. 2006;103(8):2833–8.
ArticleCASGoogle Scholar
Seet Q, Zhang LH. Anti-activator QslA defines the quorum sensing threshold and response in Pseudomonas aeruginosa. Mol Microbiol. 2011;80(4):951–65.
ArticleCASGoogle Scholar
Klockgether J, Munder A, Neugebauer J, Davenport CF, Stanke F, Larbig KD, Heeb S, Schock U, Pohl TM, Wiehlmann L, et al. Genome diversity of Pseudomonas aeruginosa PAO1 laboratory strains. J Bacteriol. 2010;192(4):1113–21.
ArticleCASGoogle Scholar
Green B, Bouchier C, Fairhead C, Craig NL, Cormack BP. Insertion site preference of mu, Tn5, and Tn7 transposons. Mob DNA. 2012;3(1):3.
ArticleCASGoogle Scholar
Goryshin IY, Miller JA, Kil YV, Lanzov VA, Reznikoff WS. Tn5/IS50 target recognition. Proc Natl Acad Sci U S A. 1998;95(18):10716–21.
ArticleCASGoogle Scholar
Maier TM, Havig A, Casey M, Nano FE, Frank DW, Zahrt TC. Construction and characterization of a highly efficient Francisella shuttle plasmid. Appl Environ Microbiol. 2004;70(12):7511–9.
ArticleCASGoogle Scholar
Enyeart PJ, Mohr G, Ellington AD, Lambowitz AM. Biotechnological applications of mobile group II introns and their reverse transcriptases: gene targeting, RNA-seq, and non-coding RNA analysis. Mob DNA. 2014;5(1):2.
ArticleGoogle Scholar
Court DL, Sawitzke JA, Thomason LC. Genetic engineering using homologous recombination. Annu Rev Genet. 2002;36:361–88.
ArticleCASGoogle Scholar
Saavedra JT, Schwartzman JA, Gilmore MS. Mapping transposon insertions in bacterial genomes by arbitrarily primed PCR. Curr Protoc Mol Biol. 2017;118:15.15.11–5.
Google Scholar
Download references
Acknowledgements
We thank Drs. Mark McIntosh, David Pintel and Donald H. Burke for helpful discussions.
Funding
This work was supported by the University of Missouri startup fund to H.G. The funding body had no role in the design of the study and collection, analysis, and interpretation of data and in writing the manuscript.
Availability of data and materials
The dataset supporting the conclusion of this article are available from the corresponding author on reasonable request.
Author information
Author notes
1. Santa S. Naorem and Jin Han contributed equally to this work.
Authors and Affiliations
Department of Molecular Microbiology and Immunology, University of Missouri School of Medicine, Columbia, MO, 65212, USA
Santa S. Naorem,Jin Han,Stephanie Y. Zhang,Junyi Zhang,Lindsey B. Graham,Angelou Song,Cameron V. Smith,Fariha Rashid&Huatao Guo
Authors
1. Santa S. NaoremView author publications Search author on:PubMedGoogle Scholar
2. Jin HanView author publications Search author on:PubMedGoogle Scholar
3. Stephanie Y. ZhangView author publications Search author on:PubMedGoogle Scholar
4. Junyi ZhangView author publications Search author on:PubMedGoogle Scholar
5. Lindsey B. GrahamView author publications Search author on:PubMedGoogle Scholar
6. Angelou SongView author publications Search author on:PubMedGoogle Scholar
7. Cameron V. SmithView author publications Search author on:PubMedGoogle Scholar
8. Fariha RashidView author publications Search author on:PubMedGoogle Scholar
9. Huatao GuoView author publications Search author on:PubMedGoogle Scholar
Contributions
SSN, JH and HG conceived the study and designed the experiments; SSN, JH, SYZ, JZ, LBG, AS, CVS and FR performed the experiments; SSN and HG analyzed and wrote the manuscript. All authors have read and approved the manuscript.
Corresponding author
Correspondence to Huatao Guo.
Ethics declarations
Ethics approval and consent to participate
Not applicable.
Consent for publication
Not applicable.
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Additional files
Additional file 1:
Figure S1. Tn5 transposons. (a) Full-length Tn5. The full-length Tn5 contains two inverted IS50 elements at its ends. Only one of them encodes an active Tnp and an Inh (Inhibitor of Tnp). Kan R, kanamycin-resistance gene; Str R, streptomycin-resistance gene; and Ble R, bleomycin-resistance gene. (b) mTn5s. Top, an mTn5 with an OE and an IE at the termini. Bottom, an mTn5 with MEs at the ends. (c) Comparison of OE, IE and ME, with their polymorphisms highlighted in red. (TIF 4125 kb)
Additional file 2:
Figure S2. Confirmation of mTn5 transposition events in A. baylyi and in P. aeruginosa. (a) Colony restreaking assay of A. baylyi. 100 Suc R Kan R colonies of A. baylyi were restreaked on LB + Kan and LB + Cam plates, and all were found to be Kan R Cam S. 50 are shown here. (b) Colony PCR of 10 restreaked A. baylyi clones with the indicated primers. All were mTn5-positive and plasmid-negative. (c) Colony restreaking assay of P. aeruginosa. 100 Suc R Kan R colonies of P. aeruginosa were restreaked on LB + Kan and LB + Cam plates, and all were found to be Kan R Cam S. 50 are shown here. (d) Colony PCR of ten restreaked P. aeruginosa clones with primers indicated in the diagram. All were mTn5-positive and plasmid-negative. (TIF 6384 kb)
Additional file 3:
Figure S3. A transposon insertion library of P. aeruginosa PAO1 generated with pSNC-mTn5. (a) Plasmid and transposon retention frequencies of the mTn5 insertion library of P. aeruginosa PAO1. (b) Colony restreaking assay. 100 random Suc R Kan R colonies were restreaked on LB + Kan and LB + Cam plates.100/100 were found to be Kan R Cam S and 50 are shown here. (c) Colony PCR of ten restreaked clones in (b). All were found to be mTn5-positive and plasmid-negative. (d) mTn5 insertion sites of 37 mutant clones from the transposon insertion library of P. aeruginosa. Identical clones are only shown once, and their numbers are indicated in parenthesis. (TIF 1363 kb)
Additional file 4:
Figure S4. Confirmation of mTn5ME transposition events in E. coli DH10B. (a) Colony restreaking. 100 random Suc R Kan R colonies of E. coli were restreaked on LB + Kan and LB + Cam plates.100/100 were found to be Kan R Cam S and 50 restreaked colonies are shown here. (b) Colony PCR of ten restreaked clones in (a). All were found to be Tn5-positive and plasmid-negative. (c) Tn5 insertion sites of 13 independent DH10B clones. (TIF 7051 kb)
Additional file 5:
Figure S5. Confirmation of mTn5ME transposition events in A. baylyi 33,305. (a) Colony restreaking. 100 random Suc R Kan R colonies of A. baylyi were restreaked on LB + Kan and LB + Cam plates.100/100 were found to be Kan R Cam S and 50 restreaked colonies are shown here. (b) Colony PCR of ten restreaked clones in (a). All were found to be Tn5-positive and plasmid-negative. (c) Sequence analysis shows that 9/14 A. baylyi clones had different Tn5 insertion sites. (TIF 6938 kb)
Additional file 6:
Figure S6. Confirmation of mTn5ME transposition events in P. aeruginosa PAO1. (a) Colony restreaking. 100 random Suc R Kan R colonies of P. aeruginosa PAO1 were restreaked on LB + Kan and LB + Cam plates.100/100 were found to be Kan R Cam S and 50 restreaked colonies are shown here. (b) Colony PCR of ten restreaked clones in (a). All were found to be Tn5-positive and plasmid-negative. (c) Sequence analysis shows that 7/10 P. aeruginosa clones had different Tn5 insertion sites. (TIF 6280 kb)
Additional file 7:
Figure S7. Target site preferences of mTn5 and mTn5ME in P. aeruginosa. (a) Sequence logo of mTn5 insertion sites generated with WebLogo. 40 target sequences were analyzed. The 9 bp duplicated sequences adjacent to the OE are shown. There is a slight preference for certain nucleotides at several positions. (b) Sequence logo of mTn5ME insertion sites. 41 target sequences were analyzed. The 9 bp duplicated sequences adjacent to an ME are shown. It appears that mTn5ME has less nucleotide preference at the duplicated target sequence than mTn5 in Pseudomonas. (TIF 3834 kb)
Additional file 8:
Table S1. Comparison of conditional suicide vector-based transposon mutagenesis strategies used in Gram-negative bacteria. (TIF 7782 kb)
Additional file 9:
Table S2. List of primers used. (TIF 2042 kb)
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License ( which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver ( applies to the data made available in this article, unless otherwise stated.
Reprints and permissions
About this article
Cite this article
Naorem, S.S., Han, J., Zhang, S.Y. et al. Efficient transposon mutagenesis mediated by an IPTG-controlled conditional suicide plasmid. BMC Microbiol18, 158 (2018).
Download citation
Received: 12 July 2018
Accepted: 16 October 2018
Published: 24 October 2018
DOI:
Share this article
Anyone you share the following link with will be able to read this content:
Get shareable link
Sorry, a shareable link is not currently available for this article.
Copy shareable link to clipboard
Provided by the Springer Nature SharedIt content-sharing initiative
Keywords
Transposon mutagenesis
IPTG
Conditional suicide plasmid
Escherichia coli
Pseudomonas
Acinetobacter
Download PDF
Sections
Figures
References
Abstract
Background
Results
Discussion
Conclusion
Methods
Abbreviations
References
Acknowledgements
Author information
Ethics declarations
Additional files
Rights and permissions
About this article
Advertisement
Fig. 1
View in articleFull size image
Fig. 2
View in articleFull size image
Fig. 3
View in articleFull size image
Fig. 4
View in articleFull size image
Phadnis SH, Berg DE. Identification of base pairs in the outside end of insertion sequence IS50 that are needed for IS50 and Tn5 transposition. Proc Natl Acad Sci U S A. 1987;84(24):9118–22.
ArticleCASGoogle Scholar
Reznikoff WS. Transposon Tn5. Annu Rev Genet. 2008;42:269–86.
ArticleCASGoogle Scholar
Goryshin IY, Reznikoff WS. Tn5 in vitro transposition. J Biol Chem. 1998;273(13):7367–74.
ArticleCASGoogle Scholar
de Lorenzo V, Herrero M, Jakubzik U, Timmis KN. Mini-Tn5 transposon derivatives for insertion mutagenesis, promoter probing, and chromosomal insertion of cloned DNA in gram-negative eubacteria. J Bacteriol. 1990;172(11):6568–72.
ArticleCASGoogle Scholar
Jacobs MA, Alwood A, Thaipisuttikul I, Spencer D, Haugen E, Ernst S, Will O, Kaul R, Raymond C, Levy R, et al. Comprehensive transposon mutant library of Pseudomonas aeruginosa. Proc Natl Acad Sci U S A. 2003;100(24):14339–44.
ArticleCASGoogle Scholar
Lee SA, Gallagher LA, Thongdee M, Staudinger BJ, Lippman S, Singh PK, Manoil C. General and condition-specific essential functions of Pseudomonas aeruginosa. Proc Natl Acad Sci U S A. 2015;112(16):5189–94.
ArticleCASGoogle Scholar
Metzger M, Bellemann P, Schwartz T, Geider K. Site-directed and transposon-mediated mutagenesis with pfd-plasmids by electroporation of Erwinia amylovora and Escherichia coli cells. Nucleic Acids Res. 1992;20(9):2265–70.
ArticleCASGoogle Scholar
Leahy JG, Jonesmeehan JM, Colwell RR. Transformation of Acinetobacter-Calcoaceticus Rag-1 by electroporation. Can J Microbiol. 1994;40(3):233–6.
ArticleCASGoogle Scholar
Shan Z, Xu H, Shi X, Yu Y, Yao H, Zhang X, Bai Y, Gao C, Saris PE, Qiao M. Identification of two new genes involved in twitching motility in Pseudomonas aeruginosa. Microbiology. 2004;150(Pt 8):2653–61.
ArticleCASGoogle Scholar
Sasakawa C, Yoshikawa M. A series of Tn5 variants with various drug-resistance markers and suicide vector for transposon mutagenesis. Gene. 1987;56(2–3):283–8.
CASPubMedGoogle Scholar
Harayama S, Tsuda M, Iino T. Tn1 insertion mutagenesis in Escherichia coli K-12 using a temperature-sensitive mutant of plasmid RP4. Mol Gen Genet. 1981;184(1):52–5.
ArticleCASGoogle Scholar
Le Breton Y, Mohapatra NP, Haldenwang WG. In vivo random mutagenesis of Bacillus subtilis by use of TnYLB-1, a mariner-based transposon. Appl Environ Microbiol. 2006;72(1):327–33.
ArticleCASGoogle Scholar
Stubbendieck RM, Straight PD. Linearmycins activate a two-component signaling system involved in bacterial competition and biofilm morphology. J Bacteriol. 2017;199(18).
Maier TM, Pechous R, Casey M, Zahrt TC, Frank DW. In vivo Himar1-based transposon mutagenesis of Francisella tularensis. Appl Environ Microbiol. 2006;72(3):1878–85.
ArticleCASGoogle Scholar
Rholl DA, Trunck LA, Schweizer HP. In vivo Himar1 transposon mutagenesis of Burkholderia pseudomallei. Appl Environ Microbiol. 2008;74(24):7529–35.
ArticleCASGoogle Scholar
Pelicic V, Jackson M, Reyrat JM, Jacobs WR Jr, Gicquel B, Guilhot C. Efficient allelic exchange and transposon mutagenesis in Mycobacterium tuberculosis. Proc Natl Acad Sci U S A. 1997;94(20):10955–60.
ArticleCASGoogle Scholar
Choi KH, Mima T, Casart Y, Rholl D, Kumar A, Beacham IR, Schweizer HP. Genetic tools for select-agent-compliant manipulation of Burkholderia pseudomallei. Appl Environ Microbiol. 2008;74(4):1064–75.
ArticleCASGoogle Scholar
Morales VM, Backman A, Bagdasarian M. A series of wide-host-range low-copy-number vectors that allow direct screening for recombinants. Gene. 1991;97(1):39–47.
ArticleCASGoogle Scholar
Meyer R. Replication and conjugative mobilization of broad host-range IncQ plasmids. Plasmid. 2009;62(2):57–70.
ArticleCASGoogle Scholar
Maeser S, Scholz P, Otto S, Scherzinger E. Gene F of plasmid RSF1010 codes for a low-molecular-weight repressor protein that autoregulates expression of the repAC operon. Nucleic Acids Res. 1990;18(21):6215–22.
ArticleCASGoogle Scholar
Ziegelin G, Niedenzu T, Lurz R, Saenger W, Lanka E. Hexameric RSF1010 helicase RepA: the structural and functional importance of single amino acid residues. Nucleic Acids Res. 2003;31(20):5917–29.
ArticleCASGoogle Scholar
Edwards RA, Keller LH, Schifferli DM. Improved allelic exchange vectors and their use to analyze 987P fimbria gene expression. Gene. 1998;207(2):149–57.
ArticleCASGoogle Scholar
Barbe V, Vallenet D, Fonknechten N, Kreimeyer A, Oztas S, Labarre L, Cruveiller S, Robert C, Duprat S, Wincker P, et al. Unique features revealed by the genome sequence of Acinetobacter sp. ADP1, a versatile and naturally transformation competent bacterium. Nucleic Acids Res. 2004;32(19):5766–79.
ArticleCASGoogle Scholar
Stover CK, Pham XQ, Erwin AL, Mizoguchi SD, Warrener P, Hickey MJ, Brinkman FS, Hufnagle WO, Kowalik DJ, Lagrou M, et al. Complete genome sequence of Pseudomonas aeruginosa PAO1, an opportunistic pathogen. Nature. 2000;406(6799):959–64.
ArticleCASGoogle Scholar
Wang N, Ozer EA, Mandel MJ, Hauser AR. Genome-wide identification of Acinetobacter baumannii genes necessary for persistence in the lung. MBio. 2014;5(3):e01163–14.
ArticleGoogle Scholar
Withers TR, Yin Y. Yu HD: identification of novel genes associated with alginate production in Pseudomonas aeruginosa using mini-himar1 mariner transposon-mediated mutagenesis. J Vis Exp. 2014;85:51346.
Google Scholar
Lewenza S, Falsafi RK, Winsor G, Gooderham WJ, McPhee JB, Brinkman FS, Hancock RE. Construction of a mini-Tn5-luxCDABE mutant library in Pseudomonas aeruginosa PAO1: a tool for identifying differentially regulated genes. Genome Res. 2005;15(4):583–9.
ArticleCASGoogle Scholar
Gallagher LA, Shendure J, Manoil C. Genome-scale identification of resistance functions in Pseudomonas aeruginosa using Tn-seq. MBio. 2011;2(1):e00315–0.
ArticleGoogle Scholar
Wong SM, Mekalanos JJ. Genetic footprinting with mariner-based transposition in Pseudomonas aeruginosa. Proc Natl Acad Sci U S A. 2000;97(18):10191–6.
ArticleCASGoogle Scholar
Skurnik D, Roux D, Aschard H, Cattoir V, Yoder-Himes D, Lory S, Pier GB. A comprehensive analysis of in vitro and in vivo genetic fitness of Pseudomonas aeruginosa using high-throughput sequencing of transposon libraries. PLoS Pathog. 2013;9(9):e1003582.
ArticleCASGoogle Scholar
Liberati NT, Urbach JM, Miyata S, Lee DG, Drenkard E, Wu G, Villanueva J, Wei T, Ausubel FM. An ordered, nonredundant library of Pseudomonas aeruginosa strain PA14 transposon insertion mutants. Proc Natl Acad Sci U S A. 2006;103(8):2833–8.
ArticleCASGoogle Scholar
Seet Q, Zhang LH. Anti-activator QslA defines the quorum sensing threshold and response in Pseudomonas aeruginosa. Mol Microbiol. 2011;80(4):951–65.
ArticleCASGoogle Scholar
Klockgether J, Munder A, Neugebauer J, Davenport CF, Stanke F, Larbig KD, Heeb S, Schock U, Pohl TM, Wiehlmann L, et al. Genome diversity of Pseudomonas aeruginosa PAO1 laboratory strains. J Bacteriol. 2010;192(4):1113–21.
ArticleCASGoogle Scholar
Green B, Bouchier C, Fairhead C, Craig NL, Cormack BP. Insertion site preference of mu, Tn5, and Tn7 transposons. Mob DNA. 2012;3(1):3.
ArticleCASGoogle Scholar
Goryshin IY, Miller JA, Kil YV, Lanzov VA, Reznikoff WS. Tn5/IS50 target recognition. Proc Natl Acad Sci U S A. 1998;95(18):10716–21.
ArticleCASGoogle Scholar
Maier TM, Havig A, Casey M, Nano FE, Frank DW, Zahrt TC. Construction and characterization of a highly efficient Francisella shuttle plasmid. Appl Environ Microbiol. 2004;70(12):7511–9.
ArticleCASGoogle Scholar
Enyeart PJ, Mohr G, Ellington AD, Lambowitz AM. Biotechnological applications of mobile group II introns and their reverse transcriptases: gene targeting, RNA-seq, and non-coding RNA analysis. Mob DNA. 2014;5(1):2.
ArticleGoogle Scholar
Court DL, Sawitzke JA, Thomason LC. Genetic engineering using homologous recombination. Annu Rev Genet. 2002;36:361–88.
ArticleCASGoogle Scholar
Saavedra JT, Schwartzman JA, Gilmore MS. Mapping transposon insertions in bacterial genomes by arbitrarily primed PCR. Curr Protoc Mol Biol. 2017;118:15.15.11–5.
Google Scholar
BMC Microbiology
ISSN: 1471-2180
Contact us
General enquiries: journalsubmissions@springernature.com
Read more on our blogs
Receive BMC newsletters
Manage article alerts
Language editing for authors
Scientific editing for authors
Policies
Accessibility
Press center
Support and Contact
Leave feedback
Careers
Follow BMC
BMC Twitter page
BMC Facebook page
BMC Weibo page
By using this website, you agree to our Terms and Conditions, Your US state privacy rights, Privacy statement and Cookies policy. Your privacy choices/Manage cookies we use in the preference centre.
© 2025 BioMed Central Ltd unless otherwise stated. Part of Springer Nature. |
2083 | https://asq.org/quality-resources/quality-tools?srsltid=AfmBOopMA_df8tnGsgq7deQ1JHlVheq0W6qddV0_m5sb3h-dzbd3ftJJ | Quality Tools & Templates - List of Quality Tools | ASQ
Hello, Guest
Login
Register
Contact Us
Become a Member
Quincy AI
Login
Register
Contact Us
Become a Member
Search Term
Search
| Cart Total:
Checkout
Dismiss
Menuclose menu
ASQ - Excellence Through Quality
Home
Membership
Individual
Organizations
Plan Your Career - In Beta
Learning
Corporate Training
Specialized Credentials
Learning Catalog
ASQConnEx
Find an Expert
Certification
Certification Preparation
Recertification
Quality Resources
Conferences & Events
Books & Standards
Communities
Quality Progress Magazine
ASQ TV
Find Quality Jobs
About ASQ
About ASQE
Learn About Quality
About Quality Tools & Templates
Resources
Related Topics
Quality Tools & Templates Resources
Articles
Books
Case Studies
Jobs
Training
Quality Tools & Templates Related Topics
Cause Analysis Tools
Data Collection & Analysis Tools
Decision Making Tools
Idea Creation Tools
New Management Planning Tools
Process Analysis Tools
Project Planning Tools
Seven Basic Quality Tools
Six Sigma Tools
Home /
Quality Resources /
Quality Tools
Quality Tools
Quality Glossary Definition: Quality tools
Quality tools are defined as an instrument or technique to support and improve the activities of quality management and improvement.
ASQ's quality tools can help you find new ways to identify causes, understand processes, collect and analyze data, generate ideas, keep projects on track, and make informed decisions for all of your continuous improvement activities.
Quality tools A to Z
Download quality templates and Excel tools
Quality tools resources
Quality glossary
Quality Tools on ASQTV™
Quality Tools A to Z
A
A3 report
A3 report template (DOC)
Affinity diagram
Arrow diagram
B
Balanced scorecard
Benchmarking
Box and whisker plot
Box and whisker plot template (XLS)
Brainstorming
C
Cause-and-effect diagram (also called Ishikawa diagram or fishbone diagram)
Cause-and-effect/Ishikawa/fishbone diagram template (XLS)
Cause analysis tools
Check sheet
Check sheet template (XLS)
Control chart (also called Shewhart chart)
Control chart template (XLS)
Critical incident
D
Data collection and analysis tools
Decision matrix
Design of experiments (DOE)
Design of experiments (DOE) template (XLS)
E
Eight disciplines (8D)
Evaluation and decision-making tools
F
Failure mode effects analysis (FMEA)
Failure mode effects analysis (FMEA) template (XLS)
Fishbone diagram (also called Ishikawa diagram or cause-and-effect diagram)
Fishbone/Ishikawa/cause-and-effect diagram template (XLS)
Five S (5S)
Five whys and five hows
Flowchart
Flowchart template (XLS)
Force field analysis
G
Gage repeatability and reproducibilty (GR&R)
Gantt chart
Gantt chart template (XLS)
H
Histogram
Histogram template (XLS)
House of Quality (HOQ)
I
Idea creation tools
Impact effort matrix
Interrelationship diagram (also called relations diagram)
K
Kano model
M
Matrix diagram
Mistake-proofing (also called poka-yoke)
Multivoting
N
Nine windows
Nominal group technique
P
Pareto chart
Pareto chart template (XLS)
Plan-do-check-act (PDCA) cycle or plan-do-study-act (PDSA) cycle
Problem concentration diagram
Process analysis tools
Process decision program chart (PDPC)
Project planning and implementation tools
Q
Quality function deployment (QFD)
Quality plans
R
Relations diagram (also called interrelationship diagram)
Relations diagram checklist (DOC)
Relations diagram template (DOC)
Relations diagram instructions (PDF)
S
Scatter diagram (also called scatter plot or X-Y graph)
Scatter diagram template (XLS)
Seven basic quality tools (7BQT)
Seven new management and planning tools
SIPOC+CM diagram
SMART matrix
Spaghetti diagram
Stratification
Stratification template (XLS)
Success and effect diagram
Survey
T
Tree diagram
V
Value stream mapping
Voice of the customer table (VOCT)
X
X-Y graph (also called scatter diagram or scatter plot)
Download Quality Templates and Excel Tools
Box and whisker plot (Excel) This graphical plotting tool goes beyond the traditional histogramby providing you with easy-to-read displays of variation data from multiple sources, for more effective decision making.
Check sheet (Excel) Use this simple, flexible tool to collect data and analyze it with histogramand Pareto charts.
Control chart (Excel) See how a control chart tracks process change over time, and create your own.
Design of experiments (DOE)(Excel) This powerful tool helps you see the effect multiple input factors can have on a desired output (response), exposing important interactions that may be missed when experimenting with one factor at a time.
Employee instruction sheet (Excel) Use this employee instruction sheet to capture the components of process documentation on one comprehensive worksheet. The downloadable spreadsheet includes separate tabs with instructions, a template, and an example from Heartland Regional Medical Center, St. Joseph, MO.
Failure Mode and Effects Analysis (FMEA)(Excel) Use this template to evaluate the potential failure of a product or process and its effects, and then identify actions that could eliminate or reduce the occurrence of the potential failure.
Fishbone (cause-and-effect) diagram (Excel) Analyze process dispersion with this simple, visual tool. The resulting diagram illustrates the main causes and subcauses leading to an effect (symptom).
Flowchart(Excel) Create a graphical representation of the steps in a process to better understand it and reveal opportunities for improvement.
Gantt chart (Excel) This tool can be used in process planning and control to display planned tasks and finished work in relation to time.
Histogram(Excel) Analyze the frequency distribution of up to 200 data points using this simple—but powerful—histogram generating tool.
Pareto chart(Excel)Use this quick and very basic tool to capture and analyze problem occurrences.
Relations diagramchecklist, template, and template instructions (DOCs and PDF) Mainly used to identify logical relationships in a complex and confusing problem situation, the strength of an interrelationship diagram is its ability to visualize such relationships. The process of creating an interrelationship diagram can help groups analyze the natural links between different aspects of a complex situation.
Scatter diagram(Excel)This tool shows the relationship between an input, X, and the output, Y. If a relationship exists, the input is correlated to the output.
Stratification diagram (Excel) Analyze data collected from various sources to reveal patterns or relationships often missed by other data analysis techniques. By using unique symbols for each source, you can view data sets independently or in correlation to other data sets.
Quality Tools Resources
You can also search articles, case studies, and publicationsfor quality tool resources.
Books
The Quality Toolbox
The ASQ Quality Improvement Pocket Guide
Failure Mode And Effect Analysis
Articles
Fish(bone) Stories (Quality Progress) Today’s technology makes it easier than ever to communicate complex concepts more clearly, which is why older, "analog" quality methods should be digitized. The authors explore how digitizing one of the seven basic quality tools—the fishbone diagram—using mind mapping can significantly improve the tool.
Tools@Work: More New Twists On Traditional Quality Tools And Techniques (Journal for Quality and Participation) Quality tools and techniques have been developed over the years with specific purposes in mind. This column describes tips for using traditional quality tools in nontraditional applications.
Get the Whole Picture(Quality Progress) Two healthcare programs used systems thinking, which helps you analyze how multiple processes fit together and work in tandem, to improve service to patients, save money, and cut waste.
A Disciplined Approach (Quality Progress) Nothing causes anxiety for a team quite like the release of a corrective action preventive action (CAPA) system and accompanying eight disciplines (8D) model. Reassure your team that it can easily perform 8D—all that must be done is fit routine problem solving into the eight disciplines.
Solve Your FMEA Frustrations (Quality Progress) Despite failure mode and effects analysis (FMEA) being a simple concept, in practice, variations in process and competency exist. Six areas of FMEA that warrant further discussion in the quality community include: types of failure modes, cause or effect, risk assessment, types of control, process vs. design, and interaction between structures.
To DMAIC Or Not To DMAIC? (Quality Progress) Define, measure, analyze, improve and control (DMAIC) is a structured problem-solving method. In this Back to Basics article, Carl F. Berardinelli explains how each phase of DMAIC builds on the previous one, with the goal of implementing long-term solutions to problems.
Case Studies
A Dose of DMAIC(Quality Progress) Hospital pharmacy's use ofprocess capabilitystudies as part of a Six Sigma and lean effort to improve wait times, efficiency, and patient flow.
Using Control Charts In A Healthcare Setting(PDF)This teaching case study features characters, hospitals, and healthcare data that are all fictional. Upon use of the case study in classrooms or organizations, readers should be able to create a control chart and interpret its results, and identify situations that would be appropriate for control chart analysis.
Featured Advertisers
About ASQ
Career Center
Community Guidelines
Contact Us
Advertisers & Sponsors
Newsroom
Privacy & Legal
Publish with ASQ
Book/Publications Returns
Course Cancellations/Refunds
Site Map
Cookie Settings
With members and customers in over 130 countries, ASQ brings together the people, ideas and tools that make our world work better.
ASQ celebrates the unique perspectives of our community of members, staff and those served by our society. Collectively, we are the voice of quality, and we increase the use and impact of quality in response to the diverse needs in the world.
© 2025 American Society for Quality. All rights reserved.
We Value Your Privacy
This website uses advertising and analytics cookies and similar technologies to enable certain website functions, enhance user experience, analyze website performance and traffic, or deliver targeted advertising to you. We may share information about your use of our site with our social media, advertising, and analytics partners. For more details, see our Cookie Policy or our complete Cookie List. You may choose “Accept” to consent to the use of these technologies, or you may choose “Reject Non-Essential Cookies.” You can customize the cookies we use when you visit the site, by clicking on Cookie Settings.
Accept Cookies Reject Non-Essential Cookies
Cookie Settings
Do Not Sell or Share My Personal Data
When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.
Cookie Settings.
Allow All
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Performance Cookies
[x] Performance Cookies Active
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Targeting Cookies
[x] Targeting Cookies Active
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Reject All Confirm My Choices |
2084 | https://www.sciencedirect.com/topics/agricultural-and-biological-sciences/restriction-fragment-length-polymorphism | Skip to Main content
Sign in
Chapters and Articles
You might find these chapters and articles relevant to this topic.
CROP IMPROVEMENT | Marker Assisted Selection
Restriction fragment length polymorphism; variation between individuals in DNA fragment sizes cut by specific restriction enzymes. Polymorphic sequences that result in RFLPs are used as markers on genetic linkage maps.
View chapterExplore book
Read full chapter
URL:
Reference work2003, Encyclopedia of Applied Plant SciencesP. Langridge, ... K.J. Chalmers
Chapter
Molecular Markers
2014, Animal BiotechnologyAvinash Marwal, ... R.K. Gaur
Restriction Fragment Length Polymorphism (RFLP)
Restriction fragment length polymorphism (RFLP) analysis is a method used to indirectly collect information on mutations occurring at specific short regions (restriction sites) (Botstein et al., 1980). RFLP enabled the detection of polymorphisms at the DNA sequence level. RFLP are first class genetic markers, allowing the construction of highly saturated linkage maps. Restriction Fragment Length Polymorphism (RFLP) is a technique in which organisms may be differentiated by analysis of patterns derived from cleavage of their DNA (Flow Chart 16.1). If two organisms differ in the distance between sites of cleavage of a particular restriction endonuclease, the length of the fragments produced will differ when the DNA is digested with a restriction enzyme. The similarity of the patterns generated can be used to differentiate species (and even strains) from one another.
Steps Involved in RFLP Analysis
1.
: The first step in DNA typing is extraction of the DNA from the sample, be it blood, saliva, semen, or some other biological sample.
2.
: The purified DNA is then cut into fragments by restriction enzymes. For example take the pattern GCGC and imagine it occurs more than once in the DNA. The number of times it occurs is unique to the individual. The restriction enzyme chops the DNA in two at every place where the GCGC pattern occurs.
3.
: The restriction fragments have negative charge and can be separated by a technique called gel electrophoresis, which separates the pieces of DNA based on their size. The samples of DNA that have been treated with restriction enzymes are placed in separate lanes on a slab of electrophoretic gel across which is placed an electric field. The fragments migrate towards the positive electrode, the smaller fragments moving faster than the larger fragments, thus separating the DNA samples into distinct bands.
4.
: Put the nylon membrane onto the porous support, then the plastic mask (the mask must be slightly smaller than the gel), being very careful to slide the gel onto the mask. Close the apparatus and start the pump (you should be able to see if a vacuum is formed; if not, look for the problem).
5.
: If the membrane to be used is being employed for the first time, then an overnight pre-hybridization is needed, otherwise 4–5 hours should be enough. Incubate in the rotating hybridization oven at 65°C. After pre-hybridization, start hybridization by adding the boiled, labeled probe to the pre-hybridization.
6.
: Incubate overnight. The bands can be visualized using luminescent dyes.
Applications of RFLP
Analysis of RFLP variation in genomes was a vital tool in genome mapping and genetic disease analysis. If a researcher were to try to initially determine the chromosomal location of a particular disease gene, he/she would analyze the DNA of members of a family afflicted by the disease and look for RFLP alleles that show a similar pattern of inheritance as that of the disease. Once a disease gene was localized, RFLP analysis of other families would reveal who was at risk for the disease, or who was likely to be a carrier of the mutant genes. RFLP analysis was also the basis for early methods of genetic fingerprinting, useful in the identification of samples retrieved from crime scenes, in the determination of paternity, and in the characterization of genetic diversity or breeding patterns in animal populations. RFLP assay was carried out for rapid identification of three target species (Siganus canaliculatus, S. corallinus and S. javus) using mitochondrial gene regions to facilitate studies on species-specific spatio-temporal patterns of larval dispersal and population connectivity to aid fishery management (Ravago-Gotanco et al., 2010).
View chapterExplore book
Read full chapter
URL:
Book2014, Animal BiotechnologyAvinash Marwal, ... R.K. Gaur
Chapter
Volume 2
2022, Encyclopedia of Dairy Sciences (Third Edition)Jasna Kovac, ... Keith A. Lampel
Restriction Fragment Length Polymorphisms (RFLP)
PCR-restriction fragment length polymorphism is used to differentiate strains based on mutations within a gene of interest (Rasmussen, 2012). The analyses involve the amplification of a target region, followed by restriction enzyme digestion. Restriction endonucleases, such as EcoRI and Hind III, cut the amplified DNA products at certain recognition sequences, usually 4–8 bp long. Sequence polymorphisms that may be present in the amplified product, may alter the site of cleavage for the restriction enzymes. Alterations in the positions of cleavage sites result in DNA fragments of different sizes. The fragments of DNA produced by restriction analysis are then separated by size using gel electrophoresis. PCR-RFLP has been used to characterize Staphylococcus aureus strains obtained from raw milk products (Morandi et al., 2010).
View chapterExplore book
Read full chapter
URL:
Reference work2022, Encyclopedia of Dairy Sciences (Third Edition)Jasna Kovac, ... Keith A. Lampel
Chapter
Diagnostic tools and techniques in tree pathology
2022, Forest MicrobiologyEmad Jaber, ... Fred O. Asiegbu
3.1.5 Restriction fragment length polymorphism (RFLP)
Restriction fragment length polymorphism (RFLP) is a technique that displays length differences of restriction fragments on polyacrylamide or agarose gels following hybridization (Jeffreys et al., 1985). The approach is often applied to visualize the specific variations in a sequence of double-stranded DNA. It is based on the specificity of restriction endonucleases and the presence of the restriction sites, and cleaves the DNA at those sites. A specific RFLP pattern emerges on electrophoretic separation of digested DNA, generating different lengths of cleavage fragments which are characteristic of a sequence of DNA from particular isolates. For more specific visualization of the polymorphism, the cleaved fragment pattern from the double-stranded DNA fragments is subjected to blotting, hybridization, and exposed to a labeled probe. Specific probes are usually synthetic DNA that are radioactively labeled and generated from the same genomic DNA, and the resultant pattern of marks is visualized using photographic films. PCR products are equally well suitable as starting material to prepare probes. There are also several non-radioactive options available. RFLP markers were the first markers to be developed, and they are co-dominant (both alleles in heterozygous sample will be detected) and highly locus specific. Indeed, RFLP is useful for detecting locus-specific polymorphisms (genetic variation) in populations even across species boundaries (Liu et al., 1994). RFLP can distinguish between organisms or species based on the presence of any mutation that results in alteration of a restriction site and hence a change in the pattern of fragments obtained. RFLP has previously been widely used in genotyping, DNA fingerprinting, mapping of genes (Neale and Williams, 1991), and diagnosis of genetic disorders (Jeffreys et al., 1985). As direct sequencing has become much more precise and informative, these techniques are rarely used.
RFLP was utilized to distinguish two fungal pathogen species causing the oaks canker (Diplodia corticola and Diplodia quercivora) to facilitate survey and detection efforts. This was achieved by developing selective primers based on available published phylogenetic studies and sequence information retrieved from the GenBank. The PCR products were digested by the MseI enzyme to differentiate D. corticola from D. quercivora amplicons (Dreaden et al., 2014). Also, RFLP is one of the most common techniques for phytoplasma identification using phytoplasma-specific PCR primers based on sequences of the 16S-23S rRNA spacer region (Wei et al., 2007). A well-established protocol of RFLP phytoplasma detection and identification is presented by Bertaccini et al. (2018). In many hosts or pathogens, suitable probes may not yet be available; hence, the RFLP analysis would depend on creating a similarity matrix based on either the variations in band intensities or the presence or absence of bands. Thereafter, the fingerprints are grouped based on pattern similarities and the results presented as a dendrogram. A dendrogram is a tree that illustrates the similarities of the RFLP patterns included in the analysis by grouping the fingerprints sharing common bands into a subset or cluster. Sequencing of the digested PCR product is required to develop a specific probe or verify the restriction site base alteration. RFLP is a highly reproducible marker to assess polymorphism in co-dominant alleles. However, RFLP marker generation is a laborious and time-consuming process. Additionally, RFLP requires high-quality DNA and sequence knowledge prior to RFLP development (Liu et al., 1994).
The PCR-RFLP procedure for phytoplasma strain diagnostic comprises the following major steps:
(1)
: DNA extraction: high-yield and high-quality DNA is a requisite for RFLP analysis.
(2)
: PCR amplification of the sequence diversity of the 16S-23S intergenic spacer (ITS) regions of ribosomal DNA (rDNA) using specific primers.
(3)
: Digestion of the PCR product by the restriction enzyme.
(4)
: Digested PCR products are then observed in an agarose gel. Band patterns are determined against a standard ladder or against other digested PCR products.
View chapterExplore book
Read full chapter
URL:
Book2022, Forest MicrobiologyEmad Jaber, ... Fred O. Asiegbu
Chapter
Scallops
2016, Developments in Aquaculture and Fisheries ScienceMaureen K. Krause, Elisabeth von Brand
Restriction Fragment Length Polymorphism
DNA digested by restriction enzymes results in fragments of varying length because of nucleotide variation within the sequence of bases recognised by the enzyme. Originally, this method required relatively large amounts of DNA because the polymorphisms were detected by probing restriction-digested DNA using southern blots. Modern restriction fragment length polymorphism (RFLP) analyses are applied to regions of DNA amplified by PCR, often for a known region, which are then restriction digested and subject to electrophoresis. Ultimately, what is detected is nucleotide variation for a restriction enzyme recognition site. The variation must lie within the site, a single RFLP typically can only distinguish between two variants and the overall level of polymorphism detected is low in comparison to other markers. One perceived strength of this approach is that these markers are co-dominant, meaning that both alleles contributing to a genotype are scorable.
View chapterExplore book
Read full chapter
URL:
Book series2016, Developments in Aquaculture and Fisheries ScienceMaureen K. Krause, Elisabeth von Brand
Chapter
DNA-Based Technique: Polymerase Chain Reaction (PCR)
2018, Modern Techniques for Food Authentication (Second Edition)Robert E. Levin, ... Da-Wen Sun
4.5 Restriction Fragment Length Polymorphism (RFLP)
Restriction fragment length polymorphism (RFLP) is a technique in which species may be differentiated by analysis of patterns derived from cleavage of their DNA by restriction nucleases. If two species differ in the distance between sites of cleavage by a particular restriction endonuclease, the length of the fragments produced will differ when the DNA is digested with such a restriction enzyme. The differences in the patterns generated can be used to differentiate species (and even strains) from one another. DNA is first extracted from tissue and purified, followed by PCR amplification of a sequence from a gene such as that of mitochondrial 12S ribosomal RNA (mt12S rRNA). The resulting amplicon is then cleaved with one or more restriction endonucleases and the resulting segments resolved by AGE with visualization of the DNA bands with EB. Species identification based on PCR-RFLP principally depends on the target sequence chosen, the restriction endonucleases employed, and the length of the amplified fragment. PCR-RFLP is popular among researchers for identification of meat species but may not be suitable for examination of meats exposed to destructive DNA processing, because fairly large DNA fragments are needed for enzymatic restriction and amplification may be hindered by thermal DNA degradation (Wang et al., 2010). Thus, the terminal restriction fragment length polymorphism (T-RFLP) approach based on the amplification of a specific gene using fluorescently labeled primers has been developed for the detection of small restriction fragments. The method entails digesting a mixture of PCR-amplified variants of a single gene using one or more restriction enzymes and detecting the size of each of the individual resulting terminal fragments by CE with laser-induced fluorescence detection. Unlike RFLP that can be done directly on genomic DNA or on PCR products, T-RFLP is specifically designed to be used on PCR amplicons of conserved region genes and can modulate the enumeration of endophytes based on variable number of fragments generated; hence, it is more beneficial since it requires one or two labeled primers.
View chapterExplore book
Read full chapter
URL:
Book2018, Modern Techniques for Food Authentication (Second Edition)Robert E. Levin, ... Da-Wen Sun
Chapter
Molecular markers as tools to improve date palms
2020, Advancement in Crop Improvement TechniquesPushpa Kharb, Rakshita Singh
3.1 Restriction fragment length polymorphism (RFLP)
The relative ease with which DNA molecules can currently be cloned along with the availability of a wide range of restriction endonucleases have allowed the assay of a much greater length of the plant genome for genetic markers. DNA samples that differ from one another in base sequence or have been rearranged by insertions, deletions, or inversions produce restriction fragments of different sizes on enzyme digestion, and have therefore been termed “restriction fragment length polymorphism” (RFLP) (Grodzicker et al., 1974; Bostein et al., 1980). RFLP requires both large amounts of DNA and the isolation of informative probes that yield differences between the sources of DNA. The most frequent sources of probes for RFLP analysis include cDNA clones and microsatellites. The use of RFLP in the traditional form of hybridization of labeled probes to filter-bound DNA has been replaced by PCR-based techniques.
Cornicquel and Mercier (1994) performed RFLP analysis of five elite cultivars of the date palm (cvs. Barhee, Deglet Nour, Khalassa, Khadrawy, and Medjool) using offshoot leaves surrounding the shoot tips used to initiate tissue culture. Total DNA digested by EcoR1 was hybridized with cDNA probes randomly selected from a cDNA library constructed from the highly organogenic calli of cv. Boustammi Noire, and with a heterologous 1.7 kb nuclear rDNA fragment amplified during the polymerase chain reaction (PCR) of jojoba genomic DNA. Discrimination among the fire cultivars was easily made with cDNA probe 1, which was highly polymorphic.
View chapterExplore book
Read full chapter
URL:
Book2020, Advancement in Crop Improvement TechniquesPushpa Kharb, Rakshita Singh
Chapter
Recent advances in fish disease diagnosis, therapeutics, and vaccine development
2023, Frontiers in Aquaculture BiotechnologySudhansus Mishra, ... P. Swain
3.2.2 Restriction fragment length polymorphism/DNA fingerprinting
Restriction fragment length polymorphism (RFLP) is a commonly used technique that can be used for genotyping for nearly all organisms, including plants, animals, and humans. RFLP is widely used in genetic and genomic research, such as genome mapping and gene identification . The availability of a variety of restriction endonuclease enzymes that cleave DNA at specific sites has made it possible to identify the presence of polymorphic regions in the isolated fragments. Such RFLP results owing to a variation in the number of tandem repeats (VNTR) of a short DNA segment. These VNTR sequences can uniquely specify an individual and, as such, are used in DNA fingerprinting and in paternity testing . RFLP, as a molecular marker, is specific to a single clone/restriction enzyme combination. RFLP utilizes restriction endonuclease digestion to identify DNA sequence polymorphisms in genes or DNA regions of interest. When investigating families for inheritance of an RFLP, aliquots of genomic DNA from individual family members are digested to completion with the restriction enzyme known to generate the polymorphism of interest. After size fractionation on an agarose gel, DNA is transferred to a membrane by capillary action in a high-salt buffer. The gel is first treated with NaOH to denature DNA, and after neutralization, the gel is placed between buffer-soaked filter paper and a sheet of membrane. Labeled probe is hybridized overnight to the Southern blot. The blot is washed under conditions designed to remove all nonspecifically adherent probe and exposed to X-ray film. Identified fragment sizes differ among individuals and can be traced from generation to generation . An RFLP probe is a labeled DNA sequence that hybridizes with one or more fragments of the digested DNA sample after they were separated by gel electrophoresis, thus revealing a unique blotting pattern characteristic to a specific genotype at a specific locus. Short, single- or low-copy genomic DNA or cDNA clones are typically used as RFLP probes. The RFLP probes are frequently used in genome mapping and in variation analysis (genotyping, forensics, paternity tests, hereditary disease diagnostics, etc.). Certain criteria need to be fulfilled, however, for RFLP to be useful as a genetic disease marker, such as its closeness to the disease gene. Materials and methodology for detecting RFLP are reviewed with the current emphasis on amplification procedures utilizing the PCR . The advantage of RFLP is that it is a highly specific, reliable, and repeatable method but the method is more time-consuming (10–14 days to produce results).
View chapterExplore book
Read full chapter
URL:
Book2023, Frontiers in Aquaculture BiotechnologySudhansus Mishra, ... P. Swain
Chapter
Modern molecular and omics tools for understanding the plant growth-promoting rhizobacteria
2019, Role of Plant Growth Promoting Microorganisms in Sustainable Agriculture and NanotechnologyRam Krishna, ... Major Singh
3.3.5 Restriction fragment-length polymorphism
Restriction fragment-length polymorphism (RFLP) is based on polymorphisms of DNA and is used analyze various communities of microbes (Moyer et al., 1996). A very easy and potent technique for bacterial strain's identification of species and below species level. In RFLP techniques, digested DNA is electrophoresed and then blotted onto nitrocellulose or nylon membranes from agarose gels and hybridized with suitable probes prepared from cloned DNA fragments of linked microbes. This technique has proven to be suitable especially in DNA–DNA hybridization and enzyme electrophoresis combinations for discriminating closely related strains and in intraspecies variation determination. However, occasionally the same banding pattern does not denote a close linkage between the microbes to be compared.
View chapterExplore book
Read full chapter
URL:
Book2019, Role of Plant Growth Promoting Microorganisms in Sustainable Agriculture and NanotechnologyRam Krishna, ... Major Singh
Chapter
Plant Molecular Systematics
2019, Plant Systematics (Third Edition)Michael G. Simpson
RFLPs AND AFLPs
Restriction fragment length polymorphism, or RFLP, refers to differences between taxa in restriction sites, and therefore the lengths of fragments of DNA following cleavage with restriction enzymes. For example, Figure 14.9A illustrates, for two hypothetical species, amplified DNA lengths of 10,000 base pairs that are subjected to (“digested with”) the restriction enzyme EcoRI. Note, after a reaction with the EcoRI enzyme, that the DNA of species A is cleaved into three fragments, corresponding to two EcoRI restriction sites, whereas that of species B is cleaved into four fragments, corresponding to three EcoRI restriction sites. The relative locations of these restriction sites on the DNA can be mapped; one possibility is seen at Figure 14.9B. (Note that there are other possibilities for this map; precise mapping requires additional work.) More than one (typically two) restriction enzymes can be used.
Restriction site fragment data can be coded as characters and character states in a phylogenetic analysis, based on the presence of different sized fragments. Restriction site analysis contains far less data than complete DNA sequencing, accounting only for the presence or absence of sites 6–8 base pairs long. It has the advantage, however, of surveying considerably larger segments of DNA. However, with improved and less expensive sequencing techniques, like RADSeq (above), it is much less often used than in the past.
Similar to analysis of RFLPs is that of AFLPs, Amplified Fragment Length Polymorphism. This method also uses a restriction enzyme to cut DNA into numerous, smaller pieces, each of which (because of the action of the restriction enzymes) terminates in a characteristic nucleotide sequence. The numerous, cut DNA fragments are then modified by binding to each end a primer adapter. Primers are then constructed that bind to the primer adapters and amplify the DNA fragments using a polymerase chain reaction. Electrophoresis separates the amplified DNA fragments that exhibit length polymorphism (hence, AFLP), enabling the recognition of numerous genetic markers.
View chapterExplore book
Read full chapter
URL:
Book2019, Plant Systematics (Third Edition)Michael G. Simpson
Related terms:
Quantitative Trait Locus
RAPD
Restriction Enzyme
Ascus
Amplified Fragment Length Polymorphism
Polymerase Chain Reaction
Genetic Divergence
Allele
Single Nucleotide Polymorphism
Ascospore
View all Topics
We use cookies that are necessary to make our site work. We may also use additional cookies to analyze, improve, and personalize our content and your digital experience. You can manage your cookie preferences using the “Cookie Settings” link. For more information, see ourCookie Policy
Cookie Preference Center
We use cookies which are necessary to make our site work. We may also use additional cookies to analyse, improve and personalise our content and your digital experience. For more information, see our Cookie Policy and the list of Google Ad-Tech Vendors.
You may choose not to allow some types of cookies. However, blocking some types may impact your experience of our site and the services we are able to offer. See the different category headings below to find out more or change your settings.
You may also be able to exercise your privacy choices as described in our Privacy Policy
Manage Consent Preferences
Strictly Necessary Cookies
Always active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site.
Contextual Advertising Cookies
These cookies are used for properly showing banner advertisements on our site and associated functions such as limiting the number of times ads are shown to each user. |
2085 | https://en.wikipedia.org/wiki/Two-point_equidistant_projection | Two-point equidistant projection - Wikipedia
Jump to content
[x] Main menu
Main menu
move to sidebar hide
Navigation
Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Contribute
Help
Learn to edit
Community portal
Recent changes
Upload file
Special pages
Search
Search
[x] Appearance
Appearance
move to sidebar hide
Text
Small Standard Large
This page always uses small font size
Width
Standard Wide
The content is as wide as possible for your browser window.
Color (beta)
Automatic Light Dark
This page is always in light mode.
Donate
Create account
Log in
[x] Personal tools
Donate
Create account
Log in
Pages for logged out editors learn more
Contributions
Talk
[x] Toggle the table of contents
Contents
move to sidebar hide
(Top)
1 See also
2 References
Two-point equidistant projection
[x] 1 language
Nederlands
Edit links
Article
Talk
[x] English
Read
Edit
View history
[x] Tools
Tools
move to sidebar hide
Actions
Read
Edit
View history
General
What links here
Related changes
Upload file
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Expand all
Edit interlanguage links
Print/export
Download as PDF
Printable version
In other projects
Wikidata item
From Wikipedia, the free encyclopedia
Two-point equidistant map projection
Two-point equidistant projection of Eurasia. All distances are correct from the two points (45°N, 40°E) and (30°N, 110°E).
Two-point equidistant projection of the entire world with Tissot's indicatrix of deformation. The two points are Rome, Italy and Luoyang, China.
The two-point equidistant projection or doubly equidistant projection is a map projection first described by Hans Maurer in 1919 and Charles Close in 1921. It is a generalization of the much simpler azimuthal equidistant projection. In this two-point form, two locus points are chosen by the mapmaker to configure the projection. Distances from the two loci to any other point on the map are correct: that is, they scale to the distances of the same points on the sphere.
The two-point equidistant projection maps a family of confocal spherical conics onto two families of planar ellipses and hyperbolas.
The projection has been used for all maps of the Asian continent by the National Geographic Society atlases since 1959, though its purpose in that case was to reduce distortion throughout Asia rather than to measure from the two loci. The projection sometimes appears in maps of air routes. The Chamberlin trimetric projection is a logical extension of the two-point idea to three points, but the three-point case only yields a sort of minimum error for distances from the three loci, rather than yielding correct distances. Tobler extended this idea to arbitrarily large number of loci by using automated root-mean-square minimization techniques rather than using closed-form formulae.
The projection can be generalized to an ellipsoid of revolution by using geodesic distance.
See also
[edit]
List of map projections
Chamberlin trimetric projection
3D projection
References
[edit]
^Hans Maurer (1919). „Doppelbüschelstrahlige, orthodromische“ statt „doppelazimutale, gnomonische“ Kartenentwürfe. Doppel-mittabstandstreue Kartogramme. (Bemerkungen zu den Aufsätzen von W. Immler und H. Thorade. Ann. d. Hydr. usw 1919, S. 22 und 35.), Annalen der Hydrographie und Maritimen Meteorologie, 47 (3–4), 75–8.
^Close, Charles (1921). "Note on a Doubly-Equidistant Projection". The Geographical Journal. 57 (6): 446–448. Bibcode:1921GeogJ..57..446C. doi:10.2307/1780793. ISSN0016-7398. JSTOR1780793.
^Cox, J. F. (1946-10-01). "The doubly equidistant projection". Bulletin Géodésique. 2 (1): 74–76. Bibcode:1946BGeod..20...74C. doi:10.1007/BF02521618. ISSN0007-4632.
^Snyder, J.P. (1993). Flattening the Earth: 2,000 years of map projections. University of Chicago Press. pp.234–235. ISBN0226767469.
^"Portrait of Earth's largest continent", National Geographic Magazine, vol.116, no.6, p.751, 1959
^Tobler, Waldo (April 1986). "Measuring the Similarity of Map Projections". Cartography and Geographic Information Science. 13 (2): 135–139. doi:10.1559/152304086783900103 – via ResearchGate.
^Karney, Charles F. F. (2011-02-07). "Geodesics on an ellipsoid of revolution". arXiv:1102.1215 [physics.geo-ph].
Charles Close (1934). “A doubly equidistant projection of the sphere.” The Geographical Journal 83(2): 144-145.
Charles Close (1947). Geographical By-ways: And Some Other Geographical Essays. E. Arnold.
Waldo R. Tobler (1966). “Notes on two projections.” The Cartographic Journal 3(2). 87–89.
François Reignier (1957). Les systèmes de projection et leurs applications a la géographie, a la cartographie, a la navigation, a la topométrie, etc... Institut géographique national.
| show v t e Map projection |
| History List Portal |
| | show By surface | | | Cylindrical | | Mercator-conformal | Gauss–Krüger Transverse Mercator Oblique Mercator | | Equal-area | Balthasart Behrmann Gall–Peters Hobo–Dyer Lambert Smyth equal-surface Trystan Edwards | | Cassini Central Equirectangular Gall stereographic Gall isographic Miller Space-oblique Mercator Web Mercator | | | Pseudocylindrical | | Equal-area | Collignon Eckert II Eckert IV Eckert VI Equal Earth Goode homolosine Mollweide Sinusoidal Tobler hyperelliptical | | Kavrayskiy VII Wagner VI Winkel I and II | | | Conical | Albers Equidistant Lambert conformal | | Pseudoconical | Bonne Bottomley Polyconic American Chinese Werner | | Azimuthal (planar) | | General perspective | Gnomonic Orthographic Stereographic | | Equidistant Lambert equal-area | | | Pseudoazimuthal | Aitoff Hammer Wiechel Winkel tripel | | |
| | show By metric | | | Conformal | Adams hemisphere-in-a-square Gauss–Krüger Guyou hemisphere-in-a-square Lambert conformal conic Mercator Peirce quincuncial Stereographic Transverse Mercator | | Equal-area | | Bonne | Sinusoidal Werner | | Bottomley | Sinusoidal Werner | | Cylindrical | Balthasart Behrmann Gall–Peters Hobo–Dyer Lambert cylindrical equal-area Smyth equal-surface Trystan Edwards | | Tobler hyperelliptical | Collignon Mollweide | | Albers Briesemeister Eckert II Eckert IV Eckert VI Equal Earth Goode homolosine Hammer Lambert azimuthal equal-area Quadrilateralized spherical cube Strebe 1995 | | | Equidistant in some aspect | Conic Equirectangular Sinusoidal Two-point Werner | | Gnomonic | Gnomonic | | Loxodromic | Loximuthal Mercator | | Retroazimuthal (Mecca or Qibla) | Craig Hammer Littrow | | |
| | show By construction | | | Compromise | Chamberlin trimetric Kavrayskiy VII Miller cylindrical Natural Earth Robinson Van der Grinten Wagner VI Winkel tripel | | Hybrid | Goode homolosine HEALPix | | Perspective | | Planar | Gnomonic Orthographic Stereographic | | Central cylindrical | | | Polyhedral | AuthaGraph Cahill Butterfly Cahill–Keyes M-shape Dymaxion ISEA Quadrilateralized spherical cube Waterman butterfly | | |
| | show See also | | Interruption (map projection) Latitude Longitude Tissot's indicatrix Map projection of the tri-axial ellipsoid | |
This cartography or mapping term article is a stub. You can help Wikipedia by expanding it.
v
t
e
Retrieved from "
Categories:
Equidistant projections
Cartography stubs
Hidden categories:
Articles with short description
Short description is different from Wikidata
All stub articles
This page was last edited on 7 September 2025, at 17:06(UTC).
Text is available under the Creative Commons Attribution-ShareAlike 4.0 License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
Privacy policy
About Wikipedia
Disclaimers
Contact Wikipedia
Code of Conduct
Developers
Statistics
Cookie statement
Mobile view
Edit preview settings
Search
Search
[x] Toggle the table of contents
Two-point equidistant projection
1 languageAdd topic |
2086 | https://www.lumoslearning.com/llwp/resources/math-and-ela-worksheets/probability-worksheets.html | What We Do
For Schools
State Test Prep Blended program
State Test Prep Online Program
Summer Learning
Writing Program
Oral Reading Fluency Program
Reading Skills Improvement Program
After School Program
High School Program
Professional Development Platform
Teacher PD Online Course
Smart Communication Platform
For Teachers
State Assessment Prep
Classroom Tools
State Test Teacher PD Course
For Families
State Test Prep Blended Program
State Test Prep Online Program
Summer Learning
Oral Reading Fluency Online Program
Oral Reading Fluency Workbooks
College Readiness – SAT/ACT
High School Math & ELA
Curious Reader Series
For Libraries
For High School Students
High School Math, Reading and Writing
College Readiness – SAT/ACT
For Professionals
Online Professional Certification Exams
Job Interview Practice Tool
For Enterprises and Associations
HR Software
Online Pre-employment Assessment Platform
Online Employee Training & Development Platform
Enterprise Video Library
Association Software
Association Learning Management System
Online Course Platform
After-event Success Platform
Self-service FAQ and Help Center
Who Are We
Resources
Free Resources
Success Stories
Podcasts
Program Evaluation Reports
Events
Login
Free & Printable Probability Worksheets for 3rd to 8th Grades
Table of Contents
What are Probability Worksheets?
Try Now:
Purpose of Probability Worksheets
Benefits of Probability Worksheets
What is Probability?
Importance of Probability in Mathematics
Real-World Applications of Probability in Daily Life
Different Types of Probability in Mathematics
How to Find Probability?
Basic Steps in Calculating Probability of Simple and Compound Events
Understanding and Constructing Sample Spaces
Introduction to Probability Notation
Everyday Examples of Probability: Rolling Dice, Flipping Coins, Drawing Cards
Probability Word Problems with Step-by-Step Solutions
Examples of Single Events vs. Compound Events in Probability
Role of Probability in Making Predictions and Inferences
Understanding Predictions and Inferences through Probability
Frequently Asked Questions (FAQs) for Probability Worksheets
What are Probability Worksheets?
Probability worksheets are educational resources designed to help students understand and practice the fundamental concepts of probability. They typically include exercises, word problems, and real-life scenarios that challenge learners to calculate probabilities, interpret data, and apply mathematical reasoning. These worksheets cater to a range of skill levels and grades, providing structured practice for mastering probability.
Try Now:
Download Free Probability Worksheet!
Probability Sample Questions!
Purpose of Probability Worksheets
Introduce Probability Concepts: Probability worksheets familiarize students with terms like event, outcome, sample space, and likelihood.
Reinforce Learning: Worksheets provide repetitive practice to strengthen comprehension of basic and advanced probability concepts.
Encourage Analytical Thinking: By solving real-world problems, students develop critical thinking and problem-solving skills.
Promote Hands-On Learning: Worksheets often include interactive activities like drawing probability trees, creating sample spaces, and interpreting data from charts or tables.
Benefits of Probability Worksheets
Enhanced Understanding of Core Concepts: Worksheets break down abstract probability principles into manageable exercises.
Practical Problem-Solving Skills: Through real-world examples, students learn to apply probability to everyday situations like making predictions and evaluating risks.
Preparation for Tests and Exams: Probability worksheets align with curriculum standards, ensuring students are ready for assessments.
Customizable Learning: Printable worksheets allow educators and parents to tailor practice sessions to individual needs.
Builds Confidence: Consistent practice through worksheets helps students master challenging topics and boosts confidence.
What is Probability?
Probability is a branch of mathematics that measures the likelihood or chance of an event occurring. It is a fundamental concept used to make predictions and analyze outcomes in various scenarios, ranging from simple games of chance to complex real-world situations like weather forecasting, stock market analysis, and decision-making processes.At its core, probability quantifies uncertainty by assigning a numerical value to the likelihood of an event. This value typically ranges between 0 and 1, where:
0 indicates that the event is impossible.
1 indicates that the event is certain to occur.
Values between 0 and 1 represent varying degrees of likelihood.
For instance:
The probability of flipping a coin and landing on heads is 0.5 (50%).
The probability of rolling a standard die and getting a 6 is 16\frac{1}{6}61(approximately 0.167 or 16.7%).
Importance of Probability in Mathematics:
Decision-Making: Helps in assessing risks and predicting outcomes in fields such as finance, healthcare, and weather forecasting.
Scientific Research: Facilitates experimental design and data interpretation.
Daily Applications: Guides choices, from insurance to games of chance.
Real-World Applications of Probability in Daily Life
Weather Forecasting: Predicting the likelihood of rain or sunshine.
Sports: Analyzing team performances and game outcomes.
Healthcare: Assessing the effectiveness of treatments or predicting disease outbreaks.
Insurance: Determining premiums based on risk analysis.
Gaming: Designing fair games and understanding odds in gambling.
Different Types of Probability in Mathematics
Probability can be categorized into the following types:
Theoretical Probability: Based on reasoning and equally likely outcomes.
Formula: P(E) = Number of favorable outcomes/Total number of possible outcomes
Experimental Probability: Determined through repeated trials of an experiment.
Formula: P(E) = Number of times event occurs/Total trials
Subjective Probability: Based on personal judgment or experience rather than data.
How to Find Probability?
The process of finding probability involves the following steps:
Identify the event (e.g., rolling a six on a die).
Determine the total number of possible outcomes.
Calculate favorable outcomes.
Use the formula: P(E) = Number of favorable outcomes/Total number of possible outcomes
Basic Steps in Calculating Probability of Simple and Compound Events
Simple Events: Involve a single outcome, such as rolling a die once.
For Example: Probability of rolling a 4: P(E) = 1/6
Compound Events: Involve two or more outcomes, such as rolling two dice.
Independent Events: Outcomes do not affect each other. For Example: Rolling a die and flipping a coin.
Dependent Events: Outcomes are interconnected. For Example: Drawing cards without replacement.
Understanding and Constructing Sample Spaces
A sample space is the set of all possible outcomes of an experiment.
Examples:
Flipping a coin: {H,T}
Rolling a die: {1,2,3,4,5,6}
Constructing a sample space helps in analyzing probabilities of events accurately.
Introduction to Probability Notation
P(E): Probability of event E.
E^c: Complement of event E (event not happening).
P(A∩B): Probability of events A and B occurring together.
P(A∪B): Probability of either A or B occurring.
Everyday Examples of Probability: Rolling Dice, Flipping Coins, Drawing Cards
Rolling Dice: Probability of rolling an even number: 3/6 = 1/2
Flipping Coins: Probability of getting heads: 1/2
Drawing Cards: Probability of drawing a spade from a standard deck: 13/52 = 1/4
Probability Word Problems with Step-by-Step Solutions
Problem: What is the probability of drawing a king from a standard deck of cards?
Solution:
Total cards = 52
Kings = 4
Probability = 4/52 = 1/13
Problem: A bag contains 3 red, 2 blue, and 5 green balls. What is the probability of picking a red ball?
Solution:
Total balls = 10
Red balls = 3
Probability = 3/10
Examples of Single Events vs. Compound Events in Probability
Single Event: Flipping a coin once.
Probability of heads = 1/2
Compound Event: Flipping a coin and rolling a die.
Probability of heads and rolling a 5 = 1/2 × 1/6 = 1/12.
Role of Probability in Making Predictions and Inferences
Probability plays a crucial role in making predictions and drawing inferences in various fields. By quantifying uncertainty, probability allows us to analyze data, evaluate risks, and anticipate outcomes in both everyday situations and complex systems.
Understanding Predictions and Inferences through Probability
Predictions: Using probability to anticipate future events based on existing data or patterns.
Example: Forecasting the likelihood of rain based on historical weather patterns.
Inferences: Drawing conclusions or making decisions based on probabilistic analysis.
Example: Concluding the effectiveness of a new drug based on clinical trial results.
Frequently Asked Questions (FAQs) for Probability Worksheets
1. Why Are Probability Worksheets Important?
Probability worksheets are essential for a variety of reasons:
Foundational Understanding: They introduce students to the basics of probability, such as understanding outcomes, events, and likelihood, which are essential for more advanced studies in mathematics and statistics.
Application to Real-World Scenarios: Probability is used in everyday decisions, such as determining risks, predicting outcomes, and understanding trends. Worksheets provide practical examples that connect math to real life.
Skill Development: Working through probability problems helps students improve their logical reasoning, critical thinking, and data analysis skills.
Test Preparation: Probability worksheets are designed to align with curriculum standards and are often featured on standardized tests, making them a valuable resource for preparation.
2. What Topics Are Covered in Probability Worksheets?
Probability worksheets encompass a wide range of topics, including:
Basic Probability Concepts: Understanding outcomes, sample spaces, and the probability of single events.
Theoretical vs. Experimental Probability: Exploring the differences between calculated probabilities and those determined through experiments.
Compound Events: Working with independent and dependent events, and calculating probabilities for multiple events.
Probability Using Fractions, Decimals, and Percentages: Representing probabilities in various forms and converting between them.
Tree Diagrams and Tables: Visual tools for organizing outcomes and calculating probabilities systematically.
Conditional Probability: Understanding how one event affects the probability of another.
Probability Distributions: Exploring concepts like uniform, binomial, and normal distributions (for higher grade levels).
Word Problems: Real-world scenarios that require applying probability concepts to solve complex problems.
3. What Grade Levels Are Probability Worksheets Appropriate For?
Probability worksheets are tailored to suit various grade levels:
Elementary School (Grades 3-5): Worksheets focus on basic probability concepts, such as identifying possible outcomes, simple events, and using visual aids like spinners or dice.
Middle School (Grades 6-8): At this stage, students delve into compound events, theoretical vs. experimental probability, and basic probability formulas. Worksheets also incorporate word problems and visual tools like tree diagrams.
4. How Do Probability Worksheets Benefit Students?
Probability worksheets provide numerous benefits:
Hands-On Practice: They offer a structured way for students to practice and reinforce concepts taught in class.
Confidence Building: Regular practice boosts students’ confidence in tackling probability problems.
Conceptual Clarity: Worksheets often include visual aids and step-by-step problems, helping students better understand abstract concepts.
Skill Enhancement: They improve students’ ability to analyze data, think logically, and solve problems systematically.
Exam Readiness: Worksheets align with curriculum standards, ensuring students are well-prepared for tests.
5. What Are Some Key Probability Formulas?
Here are some essential probability formulas covered in worksheets:
Probability of a Single Event: P(A) = Number of favorable outcomes/Total number of outcomes
Probability of Complementary Events: P(Not A) = 1−P(A)
Probability of Two Independent Events: P(A and B) = P(A) × P(B)
Probability of Two Dependent Events: P(A and B) = P(A) × P(B|A)
Probability of Either of Two Events (Mutually Exclusive): P(A or B) = P(A) + P(B)
Probability of Either of Two Events (Non-Mutually Exclusive): P(A or B) = P(A) + P(B) − P(A and B)
6. What Are Some Tips for Solving Probability Worksheet Problems?
Understand the Question: Carefully read the problem and identify the key elements, such as outcomes and events.
Organize Information: Use visual tools like tables or tree diagrams to arrange data systematically.
Break Down Problems: Divide complex problems into smaller, manageable steps.
Double-Check Calculations: Ensure accuracy, especially when using fractions, decimals, or percentages.
Practice Regularly: Frequent practice improves speed and accuracy.
7. Can Probability Worksheets Be Used for Group Activities?
Yes, probability worksheets are excellent for group activities. Group work fosters collaboration and helps students learn from each other. Here are some ideas:
Experiments: Use worksheets alongside physical tools like dice or spinners to conduct experiments.
Problem-Solving Races: Divide students into teams and have them solve worksheet problems competitively.
Collaborative Projects: Assign real-world problems that require students to gather and analyze data together.
8. How Can Probability Worksheets Help with Test Preparation?
Probability worksheets are highly effective for test preparation as they:
Reinforce Key Concepts: Worksheets cover all essential topics likely to appear on exams.
Improve Problem-Solving Speed: Timed practice helps students solve problems more efficiently.
Expose Students to Various Question Types: From multiple-choice to word problems, worksheets simulate exam formats.
9. What Is the Difference Between Theoretical and Experimental Probability in Worksheets?
Theoretical Probability: Based on mathematical calculations and assumes all outcomes are equally likely.
Example: Probability of rolling a 4 on a fair die is 1/6.
Experimental Probability: Based on actual experiments and observed outcomes.
Example: Rolling a die 60 times and observing 10 fours gives a probability of 10/60 = 1/6.
11. How Do I Use Probability Worksheets to Help a Struggling Student?
Start with Simple Problems: Focus on basic concepts before introducing complex problems.
Use Visual Aids: Help students organize their thoughts using tree diagrams or charts.
Provide Step-by-Step Guidance: Walk students through problems systematically.
Offer Frequent Feedback: Correct mistakes and reinforce correct approaches.
12. What Is the Best Way to Teach Probability Concepts Using Worksheets?
Begin with Hands-On Activities: Use dice, cards, or spinners to demonstrate concepts before transitioning to worksheets.
Incorporate Real-Life Scenarios: Create relatable problems, such as calculating the probability of weather forecasts or sports outcomes.
Encourage Group Discussions: Let students discuss and solve problems together for better understanding.
13. Are Probability Worksheets Helpful for Understanding Real-World Applications?
Absolutely! Probability is used in many real-world scenarios, including:
Risk Assessment: Understanding probabilities is essential in insurance, finance, and health.
Sports and Games: Probability helps in analyzing strategies and predicting outcomes.
Science and Research: Probability is used to analyze data and validate results.
Enhance Learning with Other Free Math and ELA Resources
Conjunction Worksheets
Adverb Worksheets
Punctuation Worksheets
Noun Worksheets
Context Clues Worksheets
Cause and Effect Worksheets
Probability Worksheets
Figurative Language Worksheets
Text Structure Worksheets
Rounding Worksheets
Graphing Worksheets
Idiom Worksheets
Literature Worksheets
Summarizing Worksheets
Telling Time Worksheets
Percent Worksheets
Vocabulary Worksheets
Geometry Worksheets
Ratio Worksheets
Verb Worksheets
Fraction Worksheets
Place Value Worksheets
Perimeter Worksheets
Adjective Worksheets
Prefix and Suffix Worksheets
Sentence Structure Worksheets
Multiple Meaning Words Worksheets
Mean Median and Mode Worksheets
Adages and Proverbs Worksheet
Author’s Point of View Worksheets
Thesis Statement Worksheet
Pronouns Worksheets
Drawing Conclusions Worksheets
Fill in the Blank Worksheets
Reading Comprehension Worksheets
Multiplication Worksheets
Division Worksheets
Theme Worksheets
Point of View Worksheets
Pythagorean Theorem Worksheets
Rational Numbers Worksheet
Word Relationships Worksheets
Parts of Speech Worksheets
Main Idea Worksheets |
2087 | https://stackoverflow.com/questions/50191502/find-a-point-where-maximum-intersection-of-interval-occurs-2-times | algorithm - Find a point where maximum intersection of interval occurs 2 times - Stack Overflow
Join Stack Overflow
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
Sign up with GitHub
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Overflow
1. About
2. Products
3. For Teams
Stack Overflow for Teams Where developers & technologists share private knowledge with coworkers
Advertising Reach devs & technologists worldwide about your product, service or employer brand
Knowledge Solutions Data licensing offering for businesses to build and improve AI tools and models
Labs The future of collective knowledge sharing
About the companyVisit the blog
Loading…
current community
Stack Overflow helpchat
Meta Stack Overflow
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Let's set up your homepage Select a few topics you're interested in:
python javascript c#reactjs java android html flutter c++node.js typescript css r php angular next.js spring-boot machine-learning sql excel ios azure docker
Or search from our full list:
javascript
python
java
c#
php
android
html
jquery
c++
css
ios
sql
mysql
r
reactjs
node.js
arrays
c
asp.net
json
python-3.x
.net
ruby-on-rails
sql-server
swift
django
angular
objective-c
excel
pandas
angularjs
regex
typescript
ruby
linux
ajax
iphone
vba
xml
laravel
spring
asp.net-mvc
database
wordpress
string
flutter
postgresql
mongodb
wpf
windows
xcode
amazon-web-services
bash
git
oracle-database
spring-boot
dataframe
azure
firebase
list
multithreading
docker
vb.net
react-native
eclipse
algorithm
powershell
macos
visual-studio
numpy
image
forms
scala
function
vue.js
performance
twitter-bootstrap
selenium
winforms
kotlin
loops
express
dart
hibernate
sqlite
matlab
python-2.7
shell
rest
apache
entity-framework
android-studio
csv
maven
linq
qt
dictionary
unit-testing
asp.net-core
facebook
apache-spark
tensorflow
file
swing
class
unity-game-engine
sorting
date
authentication
go
symfony
t-sql
opencv
matplotlib
.htaccess
google-chrome
for-loop
datetime
codeigniter
perl
http
validation
sockets
google-maps
object
uitableview
xaml
oop
visual-studio-code
if-statement
cordova
ubuntu
web-services
email
android-layout
github
spring-mvc
elasticsearch
kubernetes
selenium-webdriver
ms-access
ggplot2
user-interface
parsing
pointers
c++11
google-sheets
security
machine-learning
google-apps-script
ruby-on-rails-3
templates
flask
nginx
variables
exception
sql-server-2008
gradle
debugging
tkinter
delphi
listview
jpa
asynchronous
web-scraping
haskell
pdf
jsp
ssl
amazon-s3
google-cloud-platform
jenkins
testing
xamarin
wcf
batch-file
generics
npm
ionic-framework
network-programming
unix
recursion
google-app-engine
mongoose
visual-studio-2010
.net-core
android-fragments
assembly
animation
math
svg
session
intellij-idea
hadoop
rust
next.js
curl
join
winapi
django-models
laravel-5
url
heroku
http-redirect
tomcat
google-cloud-firestore
inheritance
webpack
image-processing
gcc
keras
swiftui
asp.net-mvc-4
logging
dom
matrix
pyspark
actionscript-3
button
post
optimization
firebase-realtime-database
web
jquery-ui
cocoa
xpath
iis
d3.js
javafx
firefox
xslt
internet-explorer
caching
select
asp.net-mvc-3
opengl
events
asp.net-web-api
plot
dplyr
encryption
magento
stored-procedures
search
amazon-ec2
ruby-on-rails-4
memory
canvas
audio
multidimensional-array
random
jsf
vector
redux
cookies
input
facebook-graph-api
flash
indexing
xamarin.forms
arraylist
ipad
cocoa-touch
data-structures
video
azure-devops
model-view-controller
apache-kafka
serialization
jdbc
woocommerce
razor
routes
awk
servlets
mod-rewrite
excel-formula
beautifulsoup
filter
docker-compose
iframe
aws-lambda
design-patterns
text
visual-c++
django-rest-framework
cakephp
mobile
android-intent
struct
react-hooks
methods
groovy
mvvm
ssh
lambda
checkbox
time
ecmascript-6
grails
google-chrome-extension
installation
cmake
sharepoint
shiny
spring-security
jakarta-ee
plsql
android-recyclerview
core-data
types
sed
meteor
android-activity
activerecord
bootstrap-4
websocket
graph
replace
scikit-learn
group-by
vim
file-upload
junit
boost
memory-management
sass
import
async-await
deep-learning
error-handling
eloquent
dynamic
soap
dependency-injection
silverlight
layout
apache-spark-sql
charts
deployment
browser
gridview
svn
while-loop
google-bigquery
vuejs2
dll
highcharts
ffmpeg
view
foreach
makefile
plugins
redis
c#-4.0
reporting-services
jupyter-notebook
unicode
merge
reflection
https
server
google-maps-api-3
twitter
oauth-2.0
extjs
terminal
axios
pip
split
cmd
pytorch
encoding
django-views
collections
database-design
hash
netbeans
automation
data-binding
ember.js
build
tcp
pdo
sqlalchemy
apache-flex
mysqli
entity-framework-core
concurrency
command-line
spring-data-jpa
printing
react-redux
java-8
lua
html-table
ansible
jestjs
neo4j
service
parameters
enums
material-ui
flexbox
module
promise
visual-studio-2012
outlook
firebase-authentication
web-applications
webview
uwp
jquery-mobile
utf-8
datatable
python-requests
parallel-processing
colors
drop-down-menu
scipy
scroll
tfs
hive
count
syntax
ms-word
twitter-bootstrap-3
ssis
fonts
rxjs
constructor
google-analytics
file-io
three.js
paypal
powerbi
graphql
cassandra
discord
graphics
compiler-errors
gwt
socket.io
react-router
solr
backbone.js
memory-leaks
url-rewriting
datatables
nlp
oauth
terraform
datagridview
drupal
oracle11g
zend-framework
knockout.js
triggers
neural-network
interface
django-forms
angular-material
casting
jmeter
google-api
linked-list
path
timer
django-templates
arduino
proxy
orm
directory
windows-phone-7
parse-platform
visual-studio-2015
cron
conditional-statements
push-notification
functional-programming
primefaces
pagination
model
jar
xamarin.android
hyperlink
uiview
visual-studio-2013
vbscript
google-cloud-functions
gitlab
azure-active-directory
jwt
download
swift3
sql-server-2005
configuration
process
rspec
pygame
properties
combobox
callback
windows-phone-8
linux-kernel
safari
scrapy
permissions
emacs
scripting
raspberry-pi
clojure
x86
scope
io
expo
azure-functions
compilation
responsive-design
mongodb-query
nhibernate
angularjs-directive
request
bluetooth
reference
binding
dns
architecture
3d
playframework
pyqt
version-control
discord.js
doctrine-orm
package
f#
rubygems
get
sql-server-2012
autocomplete
tree
openssl
datepicker
kendo-ui
jackson
yii
controller
grep
nested
xamarin.ios
static
null
statistics
transactions
active-directory
datagrid
dockerfile
uiviewcontroller
webforms
discord.py
phpmyadmin
sas
computer-vision
notifications
duplicates
mocking
youtube
pycharm
nullpointerexception
yaml
menu
blazor
sum
plotly
bitmap
asp.net-mvc-5
visual-studio-2008
yii2
electron
floating-point
css-selectors
stl
jsf-2
android-listview
time-series
cryptography
ant
hashmap
character-encoding
stream
msbuild
asp.net-core-mvc
sdk
google-drive-api
jboss
selenium-chromedriver
joomla
devise
cors
navigation
anaconda
cuda
background
frontend
binary
multiprocessing
pyqt5
camera
iterator
linq-to-sql
mariadb
onclick
android-jetpack-compose
ios7
microsoft-graph-api
rabbitmq
android-asynctask
tabs
laravel-4
environment-variables
amazon-dynamodb
insert
uicollectionview
linker
xsd
coldfusion
console
continuous-integration
upload
textview
ftp
opengl-es
macros
operating-system
mockito
localization
formatting
xml-parsing
vuejs3
json.net
type-conversion
data.table
kivy
timestamp
integer
calendar
segmentation-fault
android-ndk
prolog
drag-and-drop
char
crash
jasmine
dependencies
automated-tests
geometry
azure-pipelines
android-gradle-plugin
itext
fortran
sprite-kit
header
mfc
firebase-cloud-messaging
attributes
nosql
format
nuxt.js
odoo
db2
jquery-plugins
event-handling
jenkins-pipeline
nestjs
leaflet
julia
annotations
flutter-layout
keyboard
postman
textbox
arm
visual-studio-2017
gulp
stripe-payments
libgdx
synchronization
timezone
uikit
azure-web-app-service
dom-events
xampp
wso2
crystal-reports
namespaces
swagger
android-emulator
aggregation-framework
uiscrollview
jvm
google-sheets-formula
sequelize.js
com
chart.js
snowflake-cloud-data-platform
subprocess
geolocation
webdriver
html5-canvas
centos
garbage-collection
dialog
sql-update
widget
numbers
concatenation
qml
tuples
set
java-stream
smtp
mapreduce
ionic2
windows-10
rotation
android-edittext
modal-dialog
spring-data
nuget
doctrine
radio-button
http-headers
grid
sonarqube
lucene
xmlhttprequest
listbox
switch-statement
initialization
internationalization
components
apache-camel
boolean
google-play
serial-port
gdb
ios5
ldap
youtube-api
return
eclipse-plugin
pivot
latex
frameworks
tags
containers
github-actions
c++17
subquery
dataset
asp-classic
foreign-keys
label
embedded
uinavigationcontroller
copy
delegates
struts2
google-cloud-storage
migration
protractor
base64
queue
find
uibutton
sql-server-2008-r2
arguments
composer-php
append
jaxb
zip
stack
tailwind-css
cucumber
autolayout
ide
entity-framework-6
iteration
popup
r-markdown
windows-7
airflow
vb6
g++
ssl-certificate
hover
clang
jqgrid
range
gmail
Next You’ll be prompted to create an account to view your personalized homepage.
Home
Questions
AI Assist Labs
Tags
Challenges
Chat
Articles
Users
Jobs
Companies
Collectives
Communities for your favorite technologies. Explore all Collectives
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Collectives™ on Stack Overflow
Find centralized, trusted content and collaborate around the technologies you use most.
Learn more about Collectives
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
Find a point where maximum intersection of interval occurs 2 times
Ask Question
Asked 7 years, 4 months ago
Modified7 years, 4 months ago
Viewed 440 times
This question shows research effort; it is useful and clear
1
Save this question.
Show activity on this post.
I recently went to a competition held offline and they asked this question.
Given n intervals, you have to find a point where there is maximum intersection of intervals.
You can do this 2 times so the sum of intervals should be maximum.
Eg. n=6, (1,3) (2,5) (4,8) (4,8) (3, 7), (6,8)
If we greedily choose 4 first time, we'll get 4 intervals overlap.
4: (2,5) (4,8) (4,8) (3, 7).
Next time we can get only 1 for a total of 5.
either (1,3) or (6,8)
But if we choose 2 in the first instance and 7 in the second instance we'll get 6 as answer.
2: (1,3) (2,5)
7: (4,8) (4,8) (3, 7), (6,8)
Intervals can be in the range [1, 10^9] and 1 <= n <= 10^5
Note: Twice means, You can do that 2 times. You are allowed to choose 2 points such that the sum of intersections in each interval is maximum.Like, you first do that, find a set of ranges which intersect, then remove those and again run on the remaining set. We need to maximise their sum of intersection as such.
algorithm
data-structures
Share
Share a link to this question
Copy linkCC BY-SA 4.0
Improve this question
Follow
Follow this question to receive notifications
edited May 5, 2018 at 17:05
ThomasThomas
asked May 5, 2018 at 16:14
ThomasThomas
11 2 2 bronze badges
Add a comment|
2 Answers 2
Sorted by: Reset to default
This answer is useful
1
Save this answer.
Show activity on this post.
the optimal solution can be seen visually. there are 3 best solution 2+6, 2+7 and 3+8.
algorithmically, the best way is to use the brute force method.
start with 1 (see what number remains -> 4,5,6,7,8) check each of the remaining number and remember the score for each pair.
proceed to 2 (see what number remains -> 6,7,8) check each of the remaining number and remember the score for each pair.
continue all the way then get the pairs with the highest score.
note that you don't need to check pairs that was already been checked. e.g. for 4, you don't need to compare with 1,2 or 3 because they have already been checked previously (1+4, 2+4, 3+4).
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Improve this answer
Follow
Follow this answer to receive notifications
edited May 5, 2018 at 16:42
answered May 5, 2018 at 16:37
Angel KohAngel Koh
13.6k 9 9 gold badges 72 72 silver badges 98 98 bronze badges
1 Comment
Add a comment
Thomas
ThomasOver a year ago
Intervals can be in the range [1, 10^9]. Sorry for not mentioning.
2018-05-05T16:45:31.5Z+00:00
0
Reply
Copy link
This answer is useful
0
Save this answer.
Show activity on this post.
Lest visualize the data set you have:
```
======= (6,8)
============= (3,7)
============= (4,8)
============= (4,8)
========== (2,5)
======= (1,3)
----------
1 2 3 4 5 6 7 8
Overlaps: 1 2 3 4 4 4 4 3
```
It becomes clear that assuming that the interval ends are closed and that all the values are integers there are several point where the maximum amount of intervals overlap: 4, 5, 6 and 7.
Finding them should be very simple:
```
(pseudocode)
intervals=(
(6,8),
(3,7),
(4,8),
(4,8),
(2,5),
(1,3)
)
//Find the maximum point because it would be pointless to compute
//up to 10^9. You already know that the line starts at 1, otherwise
//you should find the minimum too.
lastPoint=1
for each interval
if interval(1)>lastPoint then
lastPoint=interval(1)
//Check each point
maxPoint=0
matchesAtMax=0
for i=1 to lastPoint
matches=0
for each interval
if interval(0)<=i and interval(1)>=i then
matches++
end for
if matches>=matchesAtMax then
maxPoint=i
matchesAtMax=matches
end if
end for
```
This will find the last maximum point, stored at maxPoint, which should be 7 with the sample data.
Now, to run it again, we should somehow exclude the intervals that include the maximum point, and check only the remaining intervals. We can do it in the same loop.
```
(pseudocode)
intervals=(
(6,8),
(3,7),
(4,8),
(4,8),
(2,5),
(1,3)
)
//Find the maximum point because it would be pointless to compute
//up to 10^9. You already know that the line starts at 1, otherwise
//you should find the minimum too.
lastPoint=1
for each interval
if interval(1)>lastPoint then
lastPoint=interval(1)
//Check each point (the greatest first)
remainingIntervals=() //some kind of dynamic array
maxPoint2=0
matchesAtMax2=0 //Lets save both max matches so we can print the final sum
for i=1 to lastPoint
matches=0
remainingIntervalsTemp=()
for each interval
if interval(0)<=i and interval(1)>=i then
matches++
else
push interval into remainingIntervalsTemp
end if
end for
if matches>=matchesAtMax2 then
maxPoint2=i
matchesAtMax2=matches
remainingIntervals=remainingIntervalsTemp
end if
end for
//Check the points again using only the remaining intervals
//(Maybe update lastPoint first?)
maxPoint=0
matchesAtMax=0
for i=1 to lastPoint
matches=0
allMatchedAreRemaining=true
for each interval
if interval(0)<=i and interval(1)>=i then
//If this interval is not in the remaining, ignore the point
if interval is not in remainingIntervals then
allMatchedAreRemaining=false
exit for
end if
matches++
end if
end for
if allMatchedAreRemaining and matches>=matchesAtMax then
maxPoint=i
matchesAtMax=matches
end if
end for
print maxPoint "+" maxPoint2 "=" (matchesAtMax+matchesAtMax2)
```
The answer will be stored at maxPoint and maxPoint2. This should print 2+7=6 with the sample data.
It would be wise to optimize it and maybe use functions, it was just an idea, written to be easy to read, not to run perfectly.
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Improve this answer
Follow
Follow this answer to receive notifications
edited May 5, 2018 at 18:27
answered May 5, 2018 at 16:49
GabrielGabriel
2,180 1 1 gold badge 17 17 silver badges 20 20 bronze badges
4 Comments
Add a comment
Thomas
ThomasOver a year ago
You can do that 2 times. You are allowed to choose 2 points such that the sum of intersections in each interval is maximum.Like, you first do that find a set of ranges which intersect, then remove those and again run on the remaining set. We need to maximise their sum of intersection as such.
2018-05-05T16:51:31.513Z+00:00
0
Reply
Copy link
Thomas
ThomasOver a year ago
Will always finding maximum help us? Say first we find a point which covers maximum sets but others are disjoint. Whereas if we can choose sum other points so that their sum is maximum but individually not maximum. I will come up with a testcase to make it more clear.
2018-05-05T17:41:48.91Z+00:00
0
Reply
Copy link
Gabriel
GabrielOver a year ago
The issue this may have is that by completely excluding the matched intervals, the final solution will be 3+7, because (3,7) literally won't exist in the second loop, therefore 2 and 3 are the maximums with the remainder intervals. This can be solved by using the whole data set both times and, in the second time, discarding the points that matches any already matched intervals. I'll update the answer in a moment.
2018-05-05T18:17:50.28Z+00:00
0
Reply
Copy link
Thomas
ThomasOver a year ago
Will having a count of overlap an interval has, be of any use to us?
2018-05-06T03:40:52.667Z+00:00
0
Reply
Copy link
Add a comment
Your Answer
Thanks for contributing an answer to Stack Overflow!
Please be sure to answer the question. Provide details and share your research!
But avoid …
Asking for help, clarification, or responding to other answers.
Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Draft saved
Draft discarded
Sign up or log in
Sign up using Google
Sign up using Email and Password
Submit
Post as a guest
Name
Email
Required, but never shown
Post Your Answer Discard
By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
algorithm
data-structures
See similar questions with these tags.
The Overflow Blog
The history and future of software development (part 1)
Getting Backstage in front of a shifting dev experience
Featured on Meta
Spevacus has joined us as a Community Manager
Introducing a new proactive anti-spam measure
New and improved coding challenges
New comment UI experiment graduation
Policy: Generative AI (e.g., ChatGPT) is banned
Report this ad
Report this ad
Community activity
Last 1 hr
Users online activity 21177 users online
11 questions
9 answers
92 comments
391 upvotes
Popular tags
.netasp.netjavapythonc#javascript
Popular unanswered question
Can I store JSON object in Azure key vault? just like I would in DB, I'd want to store it using a POST route and also GET it
azureazure-keyvaultlicensingvaultlicense-key
Ishwar R
1
1 hour ago
Related
10Finding elementary intervals in overlapping intervals
8giving lots of intervals [ai, bi], find a interval which intersect with the most number of intervals
4Find the time period with the maximum number of overlapping intervals
2Maximum sum of two intervals
15Given a set of intervals, find the interval which has the maximum number of intersections
1Maximum intersecting intervals
4Given a set of intervals, how to find the maximum number of intersections among them,
3Finding longest overlapping interval pair
1The interval with the smallest number of overlaps
0Max interval intersection point
Hot Network Questions
Do we need the author's permission for reference
How many color maps are there in PBR texturing besides Color Map, Roughness Map, Displacement Map, and Ambient Occlusion Map in Blender?
A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man
What can be said?
Can a cleric gain the intended benefit from the Extra Spell feat?
An odd question
How to rsync a large file by comparing earlier versions on the sending end?
Weird utility function
"Unexpected"-type comic story. Aboard a space ark/colony ship. Everyone's a vampire/werewolf
Vampires defend Earth from Aliens
Gluteus medius inactivity while riding
What is a "non-reversible filter"?
What happens if you miss cruise ship deadline at private island?
Does the curvature engine's wake really last forever?
Is it safe to route top layer traces under header pins, SMD IC?
Direct train from Rotterdam to Lille Europe
Interpret G-code
Any knowledge on biodegradable lubes, greases and degreasers and how they perform long term?
Is it possible that heinous sins result in a hellish life as a person, NOT always animal birth?
Who is the target audience of Netanyahu's speech at the United Nations?
If Israel is explicitly called God’s firstborn, how should Christians understand the place of the Church?
What NBA rule caused officials to reset the game clock to 0.3 seconds when a spectator caught the ball with 0.1 seconds left?
Are there any legal strategies to modify the nature and rules of the UN Security Council in the face of one, or more SC vetos?
Explain answers to Scientific American crossword clues "Éclair filling" and "Sneaky Coward"
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
Probable spam.
This comment promotes a product, service or website while failing to disclose the author's affiliation.
Unfriendly or contains harassment/bigotry/abuse.
This comment is unkind, insulting or attacks another person or group. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Stack Overflow
Questions
Help
Chat
Products
Teams
Advertising
Talent
Company
About
Press
Work Here
Legal
Privacy Policy
Terms of Service
Contact Us
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.29.34589
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings |
2088 | https://math.libretexts.org/Courses/Angelo_State_University/Mathematical_Computing_with_Python/3%3A_Interpolation_and_Curve_Fitting/3.2%3A_Polynomial_Interpolation | Published Time: 2023-01-26T16:27:55Z
3.2: Polynomial Interpolation - Mathematics LibreTexts
Skip to main content
Table of Contents menu
search Search build_circle Toolbar fact_check Homework cancel Exit Reader Mode
school Campus Bookshelves
menu_book Bookshelves
perm_media Learning Objects
login Login
how_to_reg Request Instructor Account
hub Instructor Commons
Search
Search this book
Submit Search
x
Text Color
Reset
Bright Blues Gray Inverted
Text Size
Reset
+-
Margin Size
Reset
+-
Font Type
Enable Dyslexic Font - [x]
Downloads expand_more
Download Page (PDF)
Download Full Book (PDF)
Resources expand_more
Periodic Table
Physics Constants
Scientific Calculator
Reference expand_more
Reference & Cite
Tools expand_more
Help expand_more
Get Help
Feedback
Readability
x
selected template will load here
Error
This action is not available.
chrome_reader_mode Enter Reader Mode
3: Interpolation and Curve Fitting
Mathematical Computing with Python
{ }
{ "3.1:_Introduction_to_Interpolation_and_Curve_Fitting" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "3.2:_Polynomial_Interpolation" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1" }
{ "00:_Front_Matter" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "01:_Introduction_to_Python" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "02:_Stochastic_Simulation" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "3:_Interpolation_and_Curve_Fitting" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1", "zz:_Back_Matter" : "property get Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass230_0.b__1" }
Thu, 09 Feb 2023 21:53:52 GMT
3.2: Polynomial Interpolation
122729
122729
Dennis Hall
{ }
Anonymous
Anonymous
2
false
false
[ "article:topic" ]
[ "article:topic" ]
Search site Search Search Go back to previous article
Sign in
Username Password Sign in
Sign in
Sign in
Forgot password
Contents
1. Home
2. Campus Bookshelves
3. Angelo State University
4. Mathematical Computing with Python
5. 3: Interpolation and Curve Fitting
6. 3.2: Polynomial Interpolation
Expand/collapse global location
Mathematical Computing with Python
Front Matter
1: Introduction to Python
2: Monte-Carlo Simulation
3: Interpolation and Curve Fitting
Back Matter
3.2: Polynomial Interpolation
Last updated Feb 9, 2023
Save as PDF
3.1: Introduction to Interpolation and Curve Fitting
Back Matter
picture_as_pdf Full Book Page Downloads Full PDF Import into LMS Individual ZIP Buy Print Copy Print Book Files Buy Print CopySubmit Adoption Report Peer ReviewDonate
Page ID 122729
( \newcommand{\kernel}{\mathrm{null}\,})
Table of contents
1. 3.2.1: Lagrange Polynomial
1. THE LAGRANGE POLYNOMIAL
3.2.2: Newton interpolation
NEWTON INTERPOLATION
3.2.3: Cubic Splines
Given a set of data, polynomial interpolation is a method of finding a polynomial function that fits a set of data points exactly. Though there are several methods for finding this polynomial, the polynomial itself is unique, which we will prove later.
3.2.1: Lagrange Polynomial
One of the most common ways to perform polynomial interpolation is by using the Lagrange polynomial. To motivate this method, we begin by constructing a polynomial that goes through 2 data points (x 0,y 0)(x 0,y 0) and x 1,y 1 x 1,y 1. We use two equations from college algebra.
y−y 1=m(x−x 1)and m=y 1−y 0 x 1−x 0(3.2.1)(3.2.1)y−y 1=m(x−x 1)and m=y 1−y 0 x 1−x 0
Combining these, we end up with:
y=y 1−y 0 x 1−x 0(x−x 1)+y 1.(3.2.2)(3.2.2)y=y 1−y 0 x 1−x 0(x−x 1)+y 1.
Now, to derive a formula similar to that used for the Lagrange polynomial, we perform some algebra. We begin by swapping the terms y 1−y 0 y 1−y 0 and x−x 1 x−x 1:
y=x−x 1 x 1−x 0(y 1−y 0)+y 1.(3.2.3)(3.2.3)y=x−x 1 x 1−x 0(y 1−y 0)+y 1.
Distributing the fraction:
y=x−x 1 x 1−x 0 y 1−x−x 1 x 1−x 0 y 0+y 1.(3.2.4)(3.2.4)y=x−x 1 x 1−x 0 y 1−x−x 1 x 1−x 0 y 0+y 1.
Multiplying the right-most y 1 y 1 term by x 1−x 0 x 1−x 0=1 x 1−x 0 x 1−x 0=1:
y=x−x 1 x 1−x 0 y 1−x−x 1 x 1−x 0 y 0+x 1−x 0 x 1−x 0 y 1.(3.2.5)(3.2.5)y=x−x 1 x 1−x 0 y 1−x−x 1 x 1−x 0 y 0+x 1−x 0 x 1−x 0 y 1.
Combining to the y 1 y 1 terms:
y=−x−x 1 x 1−x 0 y 0+x−x 0 x 1−x 0 y 1.(3.2.6)(3.2.6)y=−x−x 1 x 1−x 0 y 0+x−x 0 x 1−x 0 y 1.
and finally flipping the denominator of the first term to get rid of the negative:
y=x−x 1 x 0−x 1 y 0+x−x 0 x 1−x 0 y 1.(3.2.7)(3.2.7)y=x−x 1 x 0−x 1 y 0+x−x 0 x 1−x 0 y 1.
In the above, we can observe that, when x=x 1 x=x 1, it follows that the first term cancels out with a zero on top and the second term ends up as 1⋅y 1=y 1 1⋅y 1=y 1, as desired. Similarly, if x=x 0 x=x 0, then the first term ends up as 1⋅y 0=y 0 1⋅y 0=y 0 and the second term cancels out with a zero on top, causing the entire expression to be y 0 y 0, as desired.
For three data points (x 0,y 0),(x 1,y 1),and(x 2,y 2),(x 0,y 0),(x 1,y 1),and(x 2,y 2), we can derive a polynomial that behaves similarly:
y=(x−x 1)(x−x 2)(x 0−x 1)(x 0−x 2)y 0+(x−x 0)(x−x 2)(x 1−x 0)(x 1−x 2)y 1+(x−x 0)(x−x 1)(x 2−x 0)(x 2−x 1)y 2.(3.2.8)(3.2.8)y=(x−x 1)(x−x 2)(x 0−x 1)(x 0−x 2)y 0+(x−x 0)(x−x 2)(x 1−x 0)(x 1−x 2)y 1+(x−x 0)(x−x 1)(x 2−x 0)(x 2−x 1)y 2.
In the above, plugging in, for example, x=x 1 x=x 1 has the first and third terms cancelling out with zero and the middle term turning into 1⋅y 1 1⋅y 1, as desired. We can follow this pattern to arrive at the full Lagrange polynomial.
THE LAGRANGE POLYNOMIAL
Given n+1 n+1 data points (x 0,y 0),(x 1,y 1),…,(x n,y n)(x 0,y 0),(x 1,y 1),…,(x n,y n) with x 0<x 1<⋯<x n x 0<x 1<⋯<x n, the Lagrange polynomial is the n n th degree polynomial passing through each of these points and written as:
y=(x−x 1)(x−x 2)⋯(x−x n)(x 0−x 1)(x 0−x 2)⋯(x 0−x n)y 0+(x−x 0)(x−x 2)⋯(x−x n)(x 1−x 0)(x 1−x 2)⋯(x 1−x n)y 1+⋯+(x−x 0)(x−x 1)⋯(x−x n−1)(x n−x 0)(x n−x 1)⋯(x n−x n−1)y n(3.2.9)(3.2.9)y=(x−x 1)(x−x 2)⋯(x−x n)(x 0−x 1)(x 0−x 2)⋯(x 0−x n)y 0+(x−x 0)(x−x 2)⋯(x−x n)(x 1−x 0)(x 1−x 2)⋯(x 1−x n)y 1+⋯+(x−x 0)(x−x 1)⋯(x−x n−1)(x n−x 0)(x n−x 1)⋯(x n−x n−1)y n
Equivalently, we can use product notation:
y=∑i=0 n⎛⎝⎜⎜y i∏j=0 j≠i n x−x j x i−x j⎞⎠⎟⎟(3.2.10)(3.2.10)y=∑i=0 n(y i∏j=0 j≠i n x−x j x i−x j)
Note that in the above polynomial, each numerator is written such that, for x=x i x=x i, each coefficient vanishes except for the coefficient to y i y i, which evaluates to y i y i. Thus the above polynomial passes through each of the desired data points and, as can be checked, is of degree n n.
Now, let's work with Python. To do this, we use function blocks for the first time. We have used functions in the past in Python, such as sin(x) or cos(x). Here, we create our own function using thedefkeyword. Below, we define f(o), where o is the dynamic variable. At the end of a function block, we "return", using thereturnkeyword, the result of the function calculation. In the code below, the variable o represents the variable x in the Lagrange Polynomial definition above. We do this since x is already used for our data points.
view sourceprint?
01``import``numpy as np
02``import``matplotlib.pyplot as plot
03
04``#Data goes through the points (1,3) and (5,7)
05``x``=``[``1``,``5``]
06``y``=``[``3``,``7``]
07
08``#Set the number of data points
09``pts``=``len``(x)``-``1
10``prange``=``np.linspace(x[``0``],x[pts],``50``)
11
12``plot.plot(x,y,marker``=``'o'``, color``=``'r'``, ls``=``'',markersize``=``10``)
13
14``def``f(o):
15````z``=``((o``-``x[``1``])``/``(x[``0``]``-``x[``1``]))````y[``0``]``+``((o``-``x[``0``])``/``(x[``1``]``-``x[``0``]))````y[``1``]
16````return``z
17
18``plot.plot(prange,f(prange))
19``plot.show()
output:
Now, we do the same as the above except with 3 data points. Notice how the only changes are the data point lists and the function. Below, we again use the "\" symbol to let Python know to continue on the next line. This is done to make the polynomial easier to read.
view sourceprint?
01``import``numpy as np
02``import``matplotlib.pyplot as plot
03
04``#data goes through the points (4,1), (6,1) and (8,0)
05``x``=``[``4``,``6``,``8``]
06``y``=``[``53``,``32``,``60``]
07
08``n``=``len``(x)``-``1
09``prange``=``np.linspace(x[``0``],x[n],``50``)
10
11``plot.plot(x,y,marker``=``'o'``, color``=``'r'``, ls``=``'', markersize``=``10``)
12
13``def``f(o):
14````z``=``\
15````(((o``-``x[``1``])````(o``-``x[``2``]))``/``((x[``0``]``-``x[``1``])````(x[``0``]``-``x[``2``])))````y[``0``]``+``\
16````(((o``-``x[``0``])````(o``-``x[``2``]))``/``((x[``1``]``-``x[``0``])````(x[``1``]``-``x[``2``])))````y[``1``]``+``\
17````(((o``-``x[``0``])````(o``-``x[``1``]))``/``((x[``2``]``-``x[``0``])````(x[``2``]``-``x[``1``])))````y[``2``]
18````return``z
19
20``plot.plot(prange,f(prange))
21``plot.show()
output:
Using the product notation of Lagrange Polynomials, we can even come up with a program that accepts any number of data points.
y=∑i=0 n⎛⎝⎜⎜y i∏j=0 j≠i n x−x j x i−x j⎞⎠⎟⎟(3.2.11)(3.2.11)y=∑i=0 n(y i∏j=0 j≠i n x−x j x i−x j)
In the code below, i i and j j represent the i i and j j in the definition above.
view sourceprint?
01``import``numpy as np
02``import``matplotlib.pyplot as plot
03
04``x``=``[``1``,``3``,``5``,``7``,``8``,``9``,``10``,``12``,``13``]
05``y``=``[``50``,``-``30``,``-``20``,``20``,``5``,``1``,``30``,``80``,``-``10``]
06
07``n``=``len``(x)``-``1
08``prange``=``np.linspace(``min``(x),``max``(x),``500``)
09
10``plot.plot(x,y,marker``=``'o'``, color``=``'r'``, ls``=``'', markersize``=``10``)
11
12``def``f(o):
13````sum``=``0
14````for``i``in``range``(n``+``1``):
15````prod``=``y[i]
16````for``j``in``range``(n``+``1``):
17````if``i!``=``j:
18````prod``=``prod````(o``-``x[j])``/``(x[i]``-``x[j])
19````sum``=``sum``+``prod
20````return``sum
21
22``plot.plot(prange,f(prange))
23``plot.show()
output:
While Lagrange polynomials are among the easiest methods to understand intuitively and are efficient for calculating a specific y(x)y(x), they fail when when attempting to either find an explicit formula y=a 0+a 1 x+⋯+a n x n y=a 0+a 1 x+⋯+a n x n or when performing incremental interpolation, that is, adding data points after the initial interpolation is performed. For incremental interpolation, we would need to complete re-perform the entire evaluation.
3.2.2: Newton interpolation
Newton interpolation is an alternative to the Lagrange polynomial. Though it appears more cryptic, it allows for incremental interpolation and provides an efficient way to find an explicit formula y=a 0+a 1 x+⋯+a n x n y=a 0+a 1 x+⋯+a n x n.
Newton interpolation is all about finding coefficients and then using those coefficients to calculate subsequent coefficients.Since an important part of Newton interpolation is that it can be used for incremental interpolation, let's start with a single data point and show the calculations as we add points.
With one data point (x 0,y 0)(x 0,y 0), the calculation is simple:
b 0=y 0(3.2.12)(3.2.12)b 0=y 0
and the polynomial is
y=b 0.(3.2.13)(3.2.13)y=b 0.
Let's add a new data point (x 1,y 1)(x 1,y 1). The next coefficient b 1 b 1 is usually denoted by [y 0,y 1][y 0,y 1]:
b 1=[y 0,y 1]=y 1−y 0 x 1−x 0(3.2.14)(3.2.14)b 1=[y 0,y 1]=y 1−y 0 x 1−x 0
and the polynomial is
y=b 0+b 1(x−x 0).(3.2.15)(3.2.15)y=b 0+b 1(x−x 0).
Notice how we did not have to re-calculate the entire polynomial, only the new coefficient to (x−x 0)(x−x 0).
With a third data point (x 2,y 2)(x 2,y 2), we find the coefficient b 2=[y 0,y 1,y 2]b 2=[y 0,y 1,y 2]:
b 2=[y 0,y 1,y 2]=[y 1,y 2]−[y 0,y 1]x 2−x 0=y 2−y 1 x 2−x 1−y 1−y 0 x 1−x 0 x 2−x 0(3.2.16)(3.2.16)b 2=[y 0,y 1,y 2]=[y 1,y 2]−[y 0,y 1]x 2−x 0=y 2−y 1 x 2−x 1−y 1−y 0 x 1−x 0 x 2−x 0
with polynomial
y=b 0+b 1(x−x 0)+b 2(x−x 0)(x−x 1).(3.2.17)(3.2.17)y=b 0+b 1(x−x 0)+b 2(x−x 0)(x−x 1).
You may have noticed the recursive nature of the previous definitions. This continues for Newton interpolation in general.
NEWTON INTERPOLATION
Given n+1 n+1 data points (x 0,y 0),(x 1,y 1),…,(x n,y n)(x 0,y 0),(x 1,y 1),…,(x n,y n) with x 0<x 1<⋯<x n x 0<x 1<⋯<x n, the Newton interpolation polynomial is the n n th degree polynomial passing through each of these points and written as:
y=b 0+b 1(x−x 0)+b 2(x−x 0)(x−x 1)+⋯+b n(x−x 0)(x−x 1)⋯(x−x n−1)(3.2.18)(3.2.18)y=b 0+b 1(x−x 0)+b 2(x−x 0)(x−x 1)+⋯+b n(x−x 0)(x−x 1)⋯(x−x n−1)
where
b 0 b 2 b 2 b n=y 0=[y 0,y 1]=y 1−y 0 x 1−x 0=[y 0,y 1,y 2]=y 2−y 1 x 2−x 1−y 1−y 0 x 1−x 0 x 2−x 0⋮=[y 0,y 2,…,y n]=[y 1,y 2,…,y n]−[y 0,y 1,…,y n−1]x n−x 0(3.2.19)(3.2.20)(3.2.21)(3.2.22)(3.2.23)(3.2.19)b 0=y 0(3.2.20)b 2=[y 0,y 1]=y 1−y 0 x 1−x 0(3.2.21)b 2=[y 0,y 1,y 2]=y 2−y 1 x 2−x 1−y 1−y 0 x 1−x 0 x 2−x 0(3.2.22)⋮(3.2.23)b n=[y 0,y 2,…,y n]=[y 1,y 2,…,y n]−[y 0,y 1,…,y n−1]x n−x 0
Let's begin by finding a polynomial with three data points using Newton's Method.
Example:Use Newton's method to calculating a polynomial through the points (1,3),(5,7)(1,3),(5,7) and (8,0)(8,0).
For this example, we will use a "tableau" to help organize our data.
x 0 x 0 y 0 y 0
x 1 x 1 y 1 y 1[y 1,y 0][y 1,y 0]
x 2 x 2 y 2 y 2[y 2,y 1][y 2,y 1][y 0,y 1,y 2][y 0,y 1,y 2]
We start by filling in our data points:
1 3
5 7[y 1,y 0][y 1,y 0]
8 0[y 2,y 1][y 2,y 1][y 0,y 1,y 2][y 0,y 1,y 2]
Then we calculate:
[y 1,y 0]=7−3 5−1=1(3.2.24)(3.2.24)[y 1,y 0]=7−3 5−1=1
[y 2,y 1]=0−7 8−5=−7 3(3.2.25)(3.2.25)[y 2,y 1]=0−7 8−5=−7 3
and fill in this data:
1 3
5 7 1
8 0−7 3−7 3[y 0,y 1,y 2][y 0,y 1,y 2]
Now, we calculate the remaining item, using the previously-calculated terms:
[y 0,y 1,y 2]=[y 1,y 2]−[y 0,y 1]x 2−x 0=−7 3−1 8−1=−10 21(3.2.26)(3.2.26)[y 0,y 1,y 2]=[y 1,y 2]−[y 0,y 1]x 2−x 0=−7 3−1 8−1=−10 21
1 3
5 7 1
8 0−7 3−7 3−10 21−10 21
Note, now, that b 0,b 1,b 0,b 1, and b 2 b 2 are written on the top diagonal. Thus our final polynomial is:
y=b 0+b 1(x−x 0)+b 2(x−x 0)(x−x 1)=3+1(x−1)−10 21(x−1)(x−5)(3.2.27)(3.2.27)y=b 0+b 1(x−x 0)+b 2(x−x 0)(x−x 1)=3+1(x−1)−10 21(x−1)(x−5)
Now, let's program this for three data points to check our work!
view sourceprint?
01``import``numpy as np
02``import``matplotlib.pyplot as plot
03
04``x``=``[``1``,``5``,``8``]
05``y``=``[``3``,``7``,``0``]
06
07``n``=``len``(x)``-``1
08``prange``=``np.linspace(``min``(x),``max``(x),``500``)
09
10``plot.plot(x,y,marker``=``'o'``, color``=``'r'``, ls``=``'', markersize``=``10``)
11
12``def``f(o):
13````b0``=``y[``0``]
14````b1``=``(y[``1``]``-``y[``0``])``/``(x[``1``]``-``x[``0``])
15````b1p``=``(y[``2``]``-``y[``1``])``/``(x[``2``]``-``x[``1``])
16````b2``=``(b1p``-``b1)``/``(x[``2``]``-``x[``0``])
17````poly``=``b0``+``b1````(o``-``x[``0``])``+``b2````(o``-``x[``0``])````(o``-``x[``1``])
18````return``poly
19
20``plot.plot(prange,f(prange))
21``plot.show()
output:
A general program can be made by using a recursive function.
view sourceprint?
01``import``numpy as nm
02``import``matplotlib.pyplot as plot
03
04``x``=``[``-``5``,``-``4``,``-``3``,``-``2``,``-``1``,``0``,``1``,``2``,``3``,``4``,``5``]
05``y``=``[``0``,``0``,``0.1``,``0.3``,``0.7``,``1``,``0.7``,``0.3``,``0.1``,``0``,``0``]
06
07``plot.plot(x,y,marker``=``'o'``, color``=``'r'``, ls``=``'',markersize``=``10``)
08
09``def``grad(a,b):
10````if``a``=``=``0``:``return``y[b]
11````return``(grad(a``-``1``,b)``-``grad(a``-``1``,a``-``1``))``/``(x[b]``-``x[a``-``1``])
`12```
13
14``def``f(o):
15````yres``=``0
16````for``p``in``range``(``len``(x)):
17````prodres``=``grad(p,p)
18````for``q``in``range``(p):
19````prodres````=``(o``-``x[q])
20````yres``+``=``prodres
21````return``yres
22``prange``=``nm.linspace(x[``0``],x[``-``1``],``200``)
23``plot.plot(prange,f(prange))
24``plot.show()
output:
Note that above, we have something strange happening near the end points. This is known asRunge's phenomenonand mainly occurs at the endges of an interval when using polynomial interpolation with polynomials of high degree over a set of points that are equally spaced. Because of Runge's phenomenon, it is often the case that going to higher degrees does not always improve accuracy. To combat this, we can use a method such as cubic splines, which we discuss here.
3.2.3: Cubic Splines
Asplineis a function defined piecewise by polynomials. Instead of having a single polynomial that goes through each data point, as we have done so far, we instead define several polynomials between each of the points. While defining several polynomials might take more work, it is usually preferred since it gives similar results while avoiding Runge's phenomenon.
A linear spline is created by simply drawing lines between each of the data points. Using our data points from earlier, we can create a reasonable approximation of our underlying function.
While simplistic, this approximation is likely better than that generated when using the same data points and Newton's method. This is due to the absence of Runge's phenomenon. To make the picture look even better, we can replace the lines by cubic functions. When doing so, we will end up with a number of cubic functions equal to one less than the number of data points - that is, one for every interval between the data points. We call this function s(x)s(x), which can be defined as follows.
s(x)=\left{\begin{array}{lr}s_0(x)=a_0x^3+b_0x^2+c_0x+d_0&\text{if}x_0\leq x\leq x_1\s_1(x)=a_1x^3+b_1x^2+c_1x+d_1&\text{if}x_1\leq x\leq x_2\\vdots\s_{n-1}(x)=a_{n-1}x^3+b_{n-1}x^2+c_{n-1}x+d_{n-1}&\text{if}x_{n-1}\leq x\leq x_n\\end{array}\right s(x)=\left{\begin{array}{lr}s_0(x)=a_0x^3+b_0x^2+c_0x+d_0&\text{if}x_0\leq x\leq x_1\s_1(x)=a_1x^3+b_1x^2+c_1x+d_1&\text{if}x_1\leq x\leq x_2\\vdots\s_{n-1}(x)=a_{n-1}x^3+b_{n-1}x^2+c_{n-1}x+d_{n-1}&\text{if}x_{n-1}\leq x\leq x_n\\end{array}\right
3.2: Polynomial Interpolation is shared under a not declared license and was authored, remixed, and/or curated by LibreTexts.
Back to top
3.1: Introduction to Interpolation and Curve Fitting
Back Matter
Was this article helpful?
Yes
No
Recommended articles
3.1: Introduction to Interpolation and Curve Fitting
1: Introduction to PythonA brief introduction to Python, especially those functions and packages that will be used throughout this text.
Front Matter
Back Matter
2: Monte-Carlo SimulationWe seek to understand how variations of a system's defining parameters, in particular those composed of a set of static random variables, lead to vari...
Article typeSection or Page
Tags
This page has no tags.
© Copyright 2025 Mathematics LibreTexts
Powered by CXone Expert ®
?
The LibreTexts libraries arePowered by NICE CXone Expertand are supported by the Department of Education Open Textbook Pilot Project, the UC Davis Office of the Provost, the UC Davis Library, the California State University Affordable Learning Solutions Program, and Merlot. We also acknowledge previous National Science Foundation support under grant numbers 1246120, 1525057, and 1413739. Privacy Policy. Terms & Conditions. Accessibility Statement.For more information contact us atinfo@libretexts.org.
Support Center
How can we help?
Contact Support Search the Insight Knowledge Base Check System Status×
contents readability resources tools
☰
3.1: Introduction to Interpolation and Curve Fitting
Back Matter
Complete your gift to make an impact |
2089 | https://www.reddit.com/r/German/comments/cc9dhm/b1_self_study_guide/ | B1 Self Study Guide : r/German
Skip to main contentB1 Self Study Guide : r/German
Open menu Open navigationGo to Reddit Home
r/German A chip A close button
Get App Get the Reddit app Log InLog in to Reddit
Expand user menu Open settings menu
Go to German
r/German
r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online
•6 yr. ago
Nerrroo
B1 Self Study Guide
Resource
I've seen a lot of requests and questions regarding the B1 level, how to reach it, B1 Exams (Goethe Zertifikat B1), etc. and I was wondering if there's any way you can reach B1 on your own. So as soon as I finished my Goethe A2 course, I started my B1 journey. I researched, I asked my teachers about the books/resources before I used them and I studied every day, at least an hour a day and sometimes even three hours/day. So I thought I'd share some of my experiences
NOTE: Be aware that some of the things mentioned here might or might not work for you; this is just my personal self-study experience
These are the resources that I've used and also how I've used them:
1) BOOKS
Get some good books. I can't speak for all the books out there, probably there are better/worse ones, but these are the ones I've used:
Menschen B1 Kursbuch, Hueber
Menschen B1 Arbeitsbuch (mit CD), Hueber
Aspekte Neu B1+ (Teil 1) Lehr- und Arbeitsbuch, Klett
I picked these ones because I got them at a very good price and also a friend of mine who was B1 at the time, told me that that's what they use in class at Goethe Institut. I worked through the books every day, doing one chapter from the KB and then one chapter the next day from the AB, so that I could apply what I learned from the previous day. Don't move on to the next chapter if there's something you didn't understand (especially Grammar), because you will encounter it again and again, and you'll soon find yourself unable to understand anything.
USE THE CDs. Very important: once you finished a chapter, or a module, go back and do all the listening exercises (especially those in the Arbeitsbuch) because they use the vocab and grammar learned in those chapters.
Note: Unfortunately, the Arbeitsbuch has no answers at the back of the book, so if you're not sure about how you did the questions, here are the links to the official answers from Hueber Verlag
Menschen Loesungsschluessel Arbeitsbuch B1.1
Menschen Loesungsschluessel Arbeitsbuch B1.2
2) GRAMMAR
Grammar is essential and B1 is where it becomes essential. And you MUST know it. (Personal experience: I thought I had a well-consolidated vocabulary because I was able to understand a lot of words, but once I started to encounter structures like "je...desto or entweder...oder" things might start to get a bit tricky and no matter how much vocabulary you know, it'll be really hard to tell the meaning of a sentence. So Learn the GRAMMAR.
German level B1 has a lot of grammar topics. In every chapter at least 3–4 grammar topics are present. List of Grammar topics in B1 is as follows.
VERB
Praeteritum formen: Ich suchte, du suchtest, etc. using “te” instead of partizip II.
Vergangenes berichten
vergangenheit, vorvergangenheit, plusquamperfekt
Futur I
Bildung des passiv; werden+partizip II, wurde+partizip II, sein+partizip II
Passiv mit Modalverb: Modalverb+Partizip II+werden im infinitiv
Konjuktiv II der Modalverben
Irreale Bedingungssaetze mit Konjuktiv II
Verb mit Pareposition
nicht/kein+brauchen+zu, nur+brauchen+zu
SUBSTANTIVE
Genetiv: “des”
n-Deklination
Adjektive als Substantive
ADJEKTIVE
Komparitiv und Superlativ vor Substativen
Adjektiv nach dem bestimmten und unbestimmten Artikel: Genitiv
Adjektivdeklination ohne Artikel
Partizip als Adjektive
PRONOMEN
Reflexivpronomen im Akkusativ und Dativ
Pronomen mit Praeposition und Pronominaladverbien
Artikelwoerter als Pronomen
Reflexivpronomen was und wo
PRAEPOSITIONEN
Wegen und Trotz
Innerhalb und Ausserhalb
Temporale praepositionen Vor, Nach, waehrend
aus+material
WORTSTELLUNG
Stellung von nicht im satz
Temporale nebensaetze: bevor, nachdem, seit/seitdem, waehrend, bis
Folgen ausdruecken:
deshalb, darum, deswegen
sodass, so….dass
Gruende und Gegenguende ausdruecken: weil/da, obwohl
Infinitiv mit zu
Relativsaetze: Relativpronomen im Dativ
Relativsaetze: Relativpronomen mit Praeposition
Verben mit praeposition und Nebensatz
Zweiteilige Konnektoren:
Sowohl, als auch
nicht nur, sondern auch
entweder, oder
weder, noch
zwar, aber
einerseits, andererseits
Saetze mit je….desto…
I recommend using this website: Longua All the Grammar Topics are listed there, from Adjective endings to Irregular Verbs and it also has downloadable PDF files with all essential Grammar (A1-C1)
I also suggest getting this book: Deutsch üben Taschentrainer - Fit in Grammatik B1 (Hueber) It has good and really simple to understand questions and exercises and answers as well
Note: Some of these (if not all of them) are explained in Textbooks, but some textbooks just go over them briefly. That's why I suggest if you didn't understand something or if it isn't very well explained in the book, look it up
3) VOCABULARY (+Listening)
Vocabulary is probably the most important part of learning German, and especially B1 Vocab is the starting point for all the daily and basic conversations that you might have in a German-speaking country.
Official Goethe B1 Wortliste: The official B1 vocabulary issued by the Goethe Institut
Memrise: It's a great tool honestly, use it every day as much as you can. (I've linked the B1 deck for the exact same B1 Goethe Word List) Search for B1 decks and relevant vocab
Duolingo - You can still use Duolingo, but at some point, it's not effective anymore (I use it only for vocabulary)
Read as much as you can - Fiction books, magazines, newspapers, articles, etc. This way you'll start encountering the words you've been learning and also understanding them because if you see them in a context they're easier to remember
Arte.tv ( - One of the best resources out there if you enjoy watching documentaries, movies and pretty much anything. Arte is a free, and on-demand European (French & German) culture TV channel and most of the content is in German and has German subtitles
DW Deutsch - Lots of resources for all levels:
For Listening:
German Radio - Deutschland.fm (I recommend these: SWR2, NDR1, NDR Info, Bayern 2, WDR 5)
ARD Audiothek App (Radio broadcasts/podcasts in German)
50 States - Through the USA with Dirk Rohrbach - Dirk Rohrbach is the first European that goes on America's longest river, Missouri. An amazing & very exciting podcast. Easy to understand as well (Also available in ARD Audiothek App)
Herr Professor Podcast (I just found these podcasts, but they are very useful and easy to understand)
Watch Youtube Channels in German - there are so many good channels out there and with good content. Here are a few examples:
Easy German
24h Deutsch
Y-Kollektiv (interesting videos with subtitles in German)
WDR Doku (documentaries) - probably a bit more advanced, but good content and clear spoken German
Tagesschau in 100 Sekunden - News in 100 seconds, but you can also watch the whole thing (~15 min) Do this before you go to bed if you can every night
4) SPEAKING
This is where it gets tricky. If you're like me (you don't live in a German-speaking country/don't have any German friends) then you know what are the odds of running into a Native/Fluent speaker of German. It gets even trickier if you live in an English speaking country because the odds are even thinner. But there are still a couple of things that you might try in order to practice speaking.
Apps - it's true, it's not the same thing as speaking with someone in person, but at least it challenges and forces your brain to come up with stuff that you might say in a daily conversation.
Tandem - This is a really nice app, where you can connect with people that are native speakers of different languages, and also people that are interested in learning your language.
HelloTalk - More people have recommended me this one, but for some reason, I used a lot more Tandem. I thought I'd just link them both here, so you can pick whichever you like
Some of you might have friends or at least know people that can speak German on a decent level. Talk to them and tell them to correct you. If not, don't worry, you'll get the chance at some point. Apps are totally fine for B1.
Bonus: This is something you don't hear a lot of people do, but I did it a couple of times and it's helpful. Try having mental conversations with yourself and see how long you can keep talking. For example, you can say "Wie war dein Tag?" and go on from there. And you'll see that if you avoid answers like "Gut" or "Toll", it actually gets pretty hard to say everything that you did in one day because you don't have the vocab yet. It's a bit strange, but helpful because it shows you instantly what you know and what you don't know.
Other resources for B1:
(Goethe Zertifikat B1 Practice)
(B1 Exam guide)
(More listening)
(More German Radio)
(Conjugates verbs - Very useful!)
(More B1 Practice)
I hope this helps! :)
Read more
Share Share
etrade_official•Promoted
Focus on your future. Open an account today and get up to $1,000.
Sign Up
etrade.com
Sort by:
Best
Open comment sort options
Best
Top
New
Controversial
Old
Q&A
melina_gamgee
•6y ago
Definitely ask a mod to include a link to this in the sticky post, or to sticky it! I feel like such a well researched guide would be very helpful for a lot of people.
Reply reply Share Share
5 more replies
5 more replies
More replies
Bhima
•6y ago
Hi folks.
I have copied all this info into the wiki under the heading "Self Study Guides".
The wiki can be found here: r/German/wiki/index
If anyone has more info to add, contributions are always welcome!
Reply reply Share Share
no_memes_no_me
•6y ago
I also have mental convos with myself in German! It does help A LOT
Reply reply Share Share
B-vinread
•6y ago
Thank you so much!
Would you say that the B1 wortliste is made up of "only B1 words" or "ALL words you must know when you reach B1" ?
Reply reply Share Share
Nerrroo
•6y ago
There are also the A1 and A2 words included in there, so the answer would be
"ALL words you must know when you reach B1"
Reply reply Share Share
More replies
cstrovn
•6y ago
Vielen Danke! I just started but like you I've been studying at least 1h a day completely on my own, I know this is going to be extremely helpful and (hopefully) soon! I saved the post for future reference pls never delete it ;)
Reply reply Share Share
1 more reply
1 more reply
More replies
[deleted]
•6y ago
Thank you, wonderful person! These links are really useful!
Reply reply Share Share
1 more reply
1 more reply
More replies
JeremyDataAnnotation•Promoted
Coders: Work wherever you want, whenever you want at DataAnnotation.
Apply Now
dataannotation.tech
melismelismel
•6y ago
Thank you!
Reply reply Share Share
ExplosiveGrotto
•6y ago
Great info, Thanks!
Reply reply Share Share
aloysiussnuffleupagu
•6y ago
Thanks for this very detailed post!
Reply reply Share Share
1 more reply
1 more reply
More replies
New to Reddit?
Create your account and connect with a world of communities.
Continue with Email
Continue With Phone Number
By continuing, you agree to ourUser Agreementand acknowledge that you understand thePrivacy Policy.
More posts you may like
I passed my B1 exam after a year of self-study! r/German•1 mo. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### I passed my B1 exam after a year of self-study! 758 upvotes ·65 comments
German B1 Grammar Guide r/German•3 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### German B1 Grammar Guide 119 upvotes ·46 comments
How to study B2 by yourself r/German•4 mo. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### How to study B2 by yourself 22 upvotes ·34 comments
Promoted What's the best book for self studying B1? r/German•4 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### What's the best book for self studying B1? 3 upvotes ·3 comments
Self learners from B1 up r/German•1 mo. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Self learners from B1 up 30 upvotes ·28 comments
What does it feel like to actually be at a B1 level? r/German•1 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### What does it feel like to actually be at a B1 level? 97 upvotes ·61 comments
Easiest B1 test for citizenship? r/German•1 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Easiest B1 test for citizenship? 9 upvotes ·31 comments
B1 in 6 months possible? r/German•5 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### B1 in 6 months possible? 16 upvotes ·39 comments
Promoted So I just took my Goethe B1 German Exam 😵💫 r/German•16 days ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### So I just took my Goethe B1 German Exam 😵💫 337 upvotes ·71 comments
😩🙌🏾🥳🥹 I passed my Goethe B1 Exam r/German•5 days ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### 😩🙌🏾🥳🥹 I passed my Goethe B1 Exam 361 upvotes ·52 comments
Self-Studying German r/German•3 mo. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Self-Studying German 57 upvotes ·34 comments
Is there like a free past paper bank for Goethe A2/B1/B2 exams? r/German•4 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Is there like a free past paper bank for Goethe A2/B1/B2 exams? 20 upvotes ·15 comments
How can I prepare for the Goethe B1 Exam r/German•2 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### How can I prepare for the Goethe B1 Exam 2 upvotes ·1 comment
B1 yet struggle to from basic sentences on the spot. r/German•2 mo. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### B1 yet struggle to from basic sentences on the spot. 80 upvotes ·32 comments
Got B2 test next month, a bit lost, confused, and... scared r/German•2 mo. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Got B2 test next month, a bit lost, confused, and... scared 31 upvotes ·12 comments
How to pass B1 in two months r/German•9 days ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### How to pass B1 in two months 13 upvotes ·16 comments
Need help to get to B1 faster without being full time student r/German•6 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Need help to get to B1 faster without being full time student 9 upvotes ·6 comments
Feeling like I'm studying for nothing r/German•6 mo. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Feeling like I'm studying for nothing 74 upvotes ·85 comments
Just get a good coursebook??? r/German•3 mo. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Just get a good coursebook??? 83 upvotes ·43 comments
Any recommendations for online sites that has german exercises? r/German•4 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Any recommendations for online sites that has german exercises? 5 upvotes ·6 comments
Passed B1 Goethe with 2 weeks of studying r/German•1 mo. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Passed B1 Goethe with 2 weeks of studying 6 comments
B1 exam experience tips r/German•1 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### B1 exam experience tips 41 upvotes ·12 comments
Does anyone have a list (online) of the grammar topics for each level A1, A2, B1.... in German? r/German•1 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Does anyone have a list (online) of the grammar topics for each level A1, A2, B1.... in German? 4 upvotes ·1 comment
This is the single most definite .pdf document I have found on german irregular verbs. r/German•3 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### This is the single most definite .pdf document I have found on german irregular verbs. 266 upvotes ·13 comments
Can an average person get to B1 level German in about 1 year? r/German•4 yr. ago r/German
/r/German is a community focused on discussion related to learning the German language. It is also a place to discuss the language at large. New visitors, please read the FAQ: /r/German/wiki/faq
410K Members 67 Online ### Can an average person get to B1 level German in about 1 year? 14 upvotes ·27 comments
Related discussion
Best GRE Prep Course
Top 1%Rank by size
Public
Anyone can view, post, and comment to this community
Top Posts
RedditreReddit: Top posts of July 12, 2019
RedditreReddit: Top posts of July 2019
RedditreReddit: Top posts of 2019
Reddit RulesPrivacy PolicyUser AgreementReddit, Inc. © 2025. All rights reserved.
Expand Navigation Collapse Navigation
TOPICS
Internet Culture (Viral)
Amazing
Animals & Pets
Cringe & Facepalm
Funny
Interesting
Memes
Oddly Satisfying
Reddit Meta
Wholesome & Heartwarming
Games
Action Games
Adventure Games
Esports
Gaming Consoles & Gear
Gaming News & Discussion
Mobile Games
Other Games
Role-Playing Games
Simulation Games
Sports & Racing Games
Strategy Games
Tabletop Games
Q&As
Q&As
Stories & Confessions
Technology
3D Printing
Artificial Intelligence & Machine Learning
Computers & Hardware
Consumer Electronics
DIY Electronics
Programming
Software & Apps
Streaming Services
Tech News & Discussion
Virtual & Augmented Reality
Pop Culture
Celebrities
Creators & Influencers
Generations & Nostalgia
Podcasts
Streamers
Tarot & Astrology
Movies & TV
Action Movies & Series
Animated Movies & Series
Comedy Movies & Series
Crime, Mystery, & Thriller Movies & Series
Documentary Movies & Series
Drama Movies & Series
Fantasy Movies & Series
Horror Movies & Series
Movie News & Discussion
Reality TV
Romance Movies & Series
Sci-Fi Movies & Series
Superhero Movies & Series
TV News & Discussion
RESOURCES
About Reddit
Advertise
Reddit Pro BETA
Help
Blog
Careers
Press
Communities
Best of Reddit
Topics
JeremyDataAnnotation•Promoted
Coders: Work wherever you want, whenever you want at DataAnnotation.
Apply Now
dataannotation.tech |
2090 | https://prase.cz/kalva/putnam/psoln/psol715.html | Putnam 1971/A5 solution
32nd Putnam 1971
Problem A5
A player scores either A or B at each turn, where A and B are unequal positive integers. He notices that his cumulative score can take any positive integer value except for those in a finite set S, where |S| =35, and 58 ∈ S. Find A and B.
Solution
Answer: A, B = 8, 11.
Let us call a number green if it can be expressed as a non-negative multiple of A plus a non-negative multiple of B. Assume A > B. A and B must be coprime. Otherwise there would be infinitely many non-green numbers. The set of integers 0, A, 2A, ... , (B-1)A are all incongruent mod B (since A and B are coprime), so they form a complete set of residues mod B. Hence any integer ≥ (B-1)A can be expressed as the sum of a multiple of B and one of the members of the set and is thus green. In fact, the none of the numbers (B-1)A - B + 1, (B-1)A - B + 2, ... , (B-A)A - 1is a multiple of A and they are are incongruent to (B-1)A mod B, so they must equal one of the numbers 0, A, 2A, ... , (B-2)A plus a multiple of B. Thus any integer greater than (B-1)A - B is green. On the other hand, (B-1)A - B itself cannot because it is (B-1)A mod B, so it is incongruent to kA mod B for k < (B-1) (and it cannot be (B-1)A plus a multiple of B because it is too small).
So we need to look at the numbers ≤ AB - A - B. Exactly [A/B] of them are congruent to A mod B, but are not green. For if A = [A/B] B + r (with 0 < r < B), then they are r, r + B, r + 2B, ... , r + ([A/B] - 1)B. Similarly, [2A/B] are congruent to 2A mod B, but not green. So the total number of non-green numbers is: [A/B] + [2A/B] + ... + [(B-1)A/B] (). But kA/B cannot be integral for k = 0, 1, ... , (B-1) since A and B are coprime, so [A/B] + [(B-1)A/B] = A-1, [2A/B] + [(B-2)A/B] = A-1, ... . If B - 1 is even, then this establishes that () is 1/2 (A-1)(B-1). If B - 1 is odd, then the central term is [A/2]. B is even, so A must be odd, so [A/2] = 1/2 (A - 1). So in this case also () is 1/2 (A-1)(B-1).
So we have (A-1)(B-1) = 2·35 = 70 = 2·5·7. So A = 11, B = 8, or A = 15, B = 6, or A = 36, B = 3. But the last two cases are ruled out because they do not have A, B coprime. So we have A = 11, B = 8. We can easily check that 58 is not green in this case.
32nd Putnam 1971
© John Scholes
jscholes@kalva.demon.co.uk
7 Feb 2001 |
2091 | https://artofproblemsolving.com/wiki/index.php/AM-GM_Inequality?srsltid=AfmBOoofjFUbh9fzHLey1-yiU1alBuZDaizfNpyd2CN2zKzaFh6SbMIR | Art of Problem Solving
AM-GM Inequality - AoPS Wiki
Art of Problem Solving
AoPS Online
Math texts, online classes, and more
for students in grades 5-12.
Visit AoPS Online ‚
Books for Grades 5-12Online Courses
Beast Academy
Engaging math books and online learning
for students ages 6-13.
Visit Beast Academy ‚
Books for Ages 6-13Beast Academy Online
AoPS Academy
Small live classes for advanced math
and language arts learners in grades 2-12.
Visit AoPS Academy ‚
Find a Physical CampusVisit the Virtual Campus
Sign In
Register
online school
Class ScheduleRecommendationsOlympiad CoursesFree Sessions
books tore
AoPS CurriculumBeast AcademyOnline BooksRecommendationsOther Books & GearAll ProductsGift Certificates
community
ForumsContestsSearchHelp
resources
math training & toolsAlcumusVideosFor the Win!MATHCOUNTS TrainerAoPS Practice ContestsAoPS WikiLaTeX TeXeRMIT PRIMES/CrowdMathKeep LearningAll Ten
contests on aopsPractice Math ContestsUSABO
newsAoPS BlogWebinars
view all 0
Sign In
Register
AoPS Wiki
ResourcesAops Wiki AM-GM Inequality
Page
ArticleDiscussionView sourceHistory
Toolbox
Recent changesRandom pageHelpWhat links hereSpecial pages
Search
AM-GM Inequality
In algebra, the AM-GM Inequality, also known formally as the Inequality of Arithmetic and Geometric Means or informally as AM-GM, is an inequality that states that any list of nonnegative reals' arithmetic mean is greater than or equal to its geometric mean. Furthermore, the two means are equal if and only if every number in the list is the same.
In symbols, the inequality states that for any real numbers , with equality if and only if .
The AM-GM Inequality is among the most famous inequalities in algebra and has cemented itself as ubiquitous across almost all competitions. Applications exist at introductory, intermediate, and olympiad level problems, with AM-GM being particularly crucial in proof-based contests.
Contents
1 Proofs
2 Generalizations
2.1 Weighted AM-GM Inequality
2.2 Mean Inequality Chain
2.3 Power Mean Inequality
3 Problems
3.1 Introductory
3.2 Intermediate
3.3 Olympiad
4 See Also
Proofs
Main article: Proofs of AM-GM
All known proofs of AM-GM use induction or other, more advanced inequalities. Furthermore, they are all more complex than their usage in introductory and most intermediate competitions. AM-GM's most elementary proof utilizes Cauchy Induction, a variant of induction where one proves a result for , uses induction to extend this to all powers of , and then shows that assuming the result for implies it holds for .
Generalizations
The AM-GM Inequality has been generalized into several other inequalities. In addition to those listed, the Minkowski Inequality and Muirhead's Inequality are also generalizations of AM-GM.
Weighted AM-GM Inequality
The Weighted AM-GM Inequality relates the weighted arithmetic and geometric means. It states that for any list of weights such that , with equality if and only if . When , the weighted form is reduced to the AM-GM Inequality. Several proofs of the Weighted AM-GM Inequality can be found in the proofs of AM-GM article.
Mean Inequality Chain
Main article: Mean Inequality Chain
The Mean Inequality Chain, also called the RMS-AM-GM-HM Inequality, relates the root mean square, arithmetic mean, geometric mean, and harmonic mean of a list of nonnegative reals. In particular, it states that with equality if and only if . As with AM-GM, there also exists a weighted version of the Mean Inequality Chain.
Power Mean Inequality
Main article: Power Mean Inequality
The Power Mean Inequality relates all the different power means of a list of nonnegative reals. The power mean is defined as follows: The Power Mean inequality then states that if , then , with equality holding if and only if Plugging into this inequality reduces it to AM-GM, and gives the Mean Inequality Chain. As with AM-GM, there also exists a weighted version of the Power Mean Inequality.
Problems
Introductory
For nonnegative real numbers , demonstrate that if then . (Solution)
Find the maximum of for all positive . (Solution)
Intermediate
Find the minimum value of for .
(Source)
Olympiad
Let , , and be positive real numbers. Prove that
(Source)
See Also
Proofs of AM-GM
Mean Inequality Chain
Power Mean Inequality
Cauchy-Schwarz Inequality
Inequality
Retrieved from "
Categories:
Algebra
Inequalities
Definition
Art of Problem Solving is an
ACS WASC Accredited School
aops programs
AoPS Online
Beast Academy
AoPS Academy
About
About AoPS
Our Team
Our History
Jobs
AoPS Blog
Site Info
Terms
Privacy
Contact Us
follow us
Subscribe for news and updates
© 2025 AoPS Incorporated
© 2025 Art of Problem Solving
About Us•Contact Us•Terms•Privacy
Copyright © 2025 Art of Problem Solving
Something appears to not have loaded correctly.
Click to refresh. |
2092 | https://community.cadence.com/cadence_blogs_8/b/cic/posts/skill-for-the-skilled-many-ways-to-sum-a-list-part-1 | SKILL for the Skilled: Part 1, Many Ways to Sum a List - Analog/Custom Design - Cadence Blogs - Cadence Community
Skip to main content
Skip to search
Skip to footer
Login
New User
Community Search Search This search text may be transcribed, used, stored, or accessed by our third-party service providers per our Cookie Policy and Privacy Policy.
Blogs
Analog/Custom Design
SKILL for the Skilled: Part 1, Many Ways to Sum a List
SKILL for the Skilled: Part 1, Many Ways to Sum a List
5 Sep 2012 • 3 minute read
A while back I presented a one day SKILL++ seminar to a group of beginner and advanced SKILL programmers. One example I showed was Variations on how to sum a list of numbers. This is a good example because the problem itself is easy to understand,so the audience can concentrate on the solution techniques rather than on the problem itself.
I want to show a few of these examples in this blog post (and a few upcoming posts) in hopes you may find some of the techniques useful.
Summing Straightforward
One straightforward way to sum a given list of numbers is to use simple iteration and mimic a primitive microprocessor.That is,establish an accumulator initialized to zero, and continue to increment the accumulator by successive numbers from the list until the list is exhausted, and finally return the accumulated value.
(defun sumlist_1a (numbers)
(let ((sum 0))
(foreach number numbers
sum = sum + number)
sum))
I imagine the code in this function would look very similar in many different languages such as C or Java -- of course with syntax variations.
Summing with apply
In SKILL++ (as well as in traditional SKILL) this is not a particularly efficient implementation because the SKILL virtual machine compiler, unlike a native compiler,is not able to make particularly good use of the processor registers. The way to force SKILL to use the processor registers is to organize your code, when possible, to call built-in compiled functions.
(defun sumlist_1b (numbers)
(apply plus numbers))
Remember -- to force this function to be defined as SKILL++ rather than traditional SKILL, you'll either need to load it from a file with a .ils extension, or you'll need two wrap the definition in (inScheme ...) when you copy and paste it into the CIWindow.
A quick test with measureTime shows that sumlist_1b is roughly 10 times faster than sumlist_1a on a 10,000 element list of numbers.
How does it work?
The plus function returns the sum in its argument list. For example: (plus 1 2 3 4 5) evaluates to 15.
The apply function, when called with two arguments, calls the function designated by its first argument. In particular apply calls that function argument list given as its second argument. For example:
(apply plus '(1 2 3 4 5))
is a call to plus with two arguments. The first argument plus is the function which apply should call. The second argument, '(1 2 3 4 5) is the list of arguments to call plus with. Thus this use of apply is equivalent to the following.
(plus 1 2 3 4 5)
Note that plus is used without a leading quote because in SKILL++ all global functions are available in a SKILL++ global variable of the same name. The variable plus evaluates to the plus function.
Since sumlist_1b is so much faster (execution-wise) and simpler (line-of-code-wise), it is very tempting to use, but be careful! It suffers from some limitations that do not exist withsumlist_1a. For example, sumlist_1b cannot sum the elements of the nil list. The sumlist_1a, however, claims the sum of the list nil is 0, which indeed sounds like a reasonable answer. Furthermore, sumlist_1a, claims that the sum of a singleton list such as (3.4) is the first (and only) element of the list, which again seems like a reasonable result.
Apply in other languages
Actually the apply function is not an invention of the SKILL (or SKILL++) language. It is in fact central to programming languages derived from lambda calculus. A quick search on Wikipedia finds an article explaining its use in several languages.
More to come
In the next posting, I'll show some ways to get the speed and conciseness of sumlist_1b without the caveats.
See Also
Jim Newton
PreviousMixed Signal Design IP Embraces Metric-Driven Verification Using RNM
NextThings You Didn't Know About Virtuoso: The (Setup) State of Things
CDNS - RequestDemo
Try Cadence Software for your next design!
Free Trials
Team SKILL
Community Member
Blog Activity
Options
Subscribe by email
CDNS - RequestDemo
Have a question? Need more information?
Contact Us
Jim Newton
sum a list
summing
Virtuoso
apply
software development
SKILL++
sumlist
SKILL
Related Posts
SKILL for the Skilled: Part 9, Many Ways to Sum a List
In the previous postings of SKILL for the Skilled , we've looked at different ways to sum the elements of a list of numbers...
Team SKILL22 May 2013 • 9 min read
Team SKILL, programming, Jim Newton, sum a list, IC615
SKILL for the Skilled: Part 6, Many Ways to Sum a List
In a previous post I presented sumlist_2b as a function that would sum lists of length 0, 1, or more. (defun sumlist_2b ...
Team SKILL10 Jan 2013 • 5 min read
Team SKILL, programming, Jim Newton, sum a list, IC615
SKILL for the Skilled: Part 5, Many Ways to Sum a List
In the most recent posts of SKILL for the Skilled (see previous post here ) we looked at different ways to sum a given list...
Team SKILL26 Nov 2012 • 5 min read
Team SKILL, Jim Newton, summing, Virtuoso, Lisp
© 2025 Cadence Design Systems, Inc. All Rights Reserved.
Terms of Use
Privacy
Cookie Policy
US Trademarks
Do Not Sell or Share My Personal Information
About Cookies On This Site
This website uses essential cookies that are necessary for the operation of this website and that are always set. With your consent and by selecting "Accept All Cookies," we may also enable non-essential cookies (such as analytics and behavioral cookies) in order to personalize and enhance your experience on our website. You can modify or further customize your selections at any time.
We also share your personal data with our trusted third-party providers to achieve the purposes described above. For a list of our third-party providers and for more information about our cookies and how we use them, please see our Cookie Policy and Privacy Policy. To opt out of sale and sharing, click here: Do Not Sell or Share My Personal Information.
Customize Cookies Accept All Cookies
We Value Your Privacy
Cadence and certain third parties use cookies on Cadence.com. Details regarding the types of cookies used, their purpose(s), and the third parties involved are described below and in our Cookie Policy. You may accept or reject certain cookies, as designated below (except for strictly necessary or essential cookies, which are always set).
Cookie Policy
Allow All
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
View Vendor Details
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
View Vendor Details
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
View Vendor Details
Targeting Cookies
[x] Targeting Cookies
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
View Vendor Details
Vendors List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Decline All Confirm My Choices |
2093 | https://cs.stackexchange.com/questions/108914/prime-implicants-in-boolean-function | digital circuits - Prime Implicants in Boolean Function - Computer Science Stack Exchange
Join Computer Science
By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy.
Sign up with Google
OR
Email
Password
Sign up
Already have an account? Log in
Skip to main content
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Visit Stack Exchange
Loading…
Tour Start here for a quick overview of the site
Help Center Detailed answers to any questions you might have
Meta Discuss the workings and policies of this site
About Us Learn more about Stack Overflow the company, and our products
current community
Computer Science helpchat
Computer Science Meta
your communities
Sign up or log in to customize your list.
more stack exchange communities
company blog
Log in
Sign up
Home
Questions
Unanswered
AI Assist Labs
Tags
Chat
Users
Companies
Teams
Ask questions, find answers and collaborate at work with Stack Overflow for Teams.
Try Teams for freeExplore Teams
3. Teams
4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams
Teams
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Learn more about Teams
Hang on, you can't upvote just yet.
You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it?
Instead, you can save this post to reference later.
Save this post for later Not now
Thanks for your vote!
You now have 5 free votes weekly.
Free votes
count toward the total vote score
does not give reputation to the author
Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation.
Got it!Go to help center to learn more
Prime Implicants in Boolean Function
Ask Question
Asked 6 years, 5 months ago
Modified6 years, 4 months ago
Viewed 1k times
This question shows research effort; it is useful and clear
2
Save this question.
Show activity on this post.
A Boolean function F(X 1,X 2,X 3,X 4,X 5,X 6)F(X 1,X 2,X 3,X 4,X 5,X 6) of six variables is defined as F=1 F=1, when three or more input variables are at logic 1. otherwise 0. How many essential prime implicants does F have?
How to visualize this problem. A Six Variable k-map is very difficult to manage. Any hints?
boolean-algebra
digital-circuits
Share
Share a link to this question
Copy linkCC BY-SA 4.0
Cite
Improve this question
Follow
Follow this question to receive notifications
asked May 3, 2019 at 14:31
VineetVineet
123 5 5 bronze badges
1
see Majoritylox –lox 2019-05-03 15:20:57 +00:00 Commented May 3, 2019 at 15:20
Add a comment|
2 Answers 2
Sorted by: Reset to default
This answer is useful
2
Save this answer.
Show activity on this post.
Hints
Here are two independent hints.
Try an easier case such as exercise 1 or exercise 2 below.
Can you find one implicant? Can you expand that implicant to a prime implicant? Can you find more?
Answer
X 1 X 2 X 3 X 1 X 2 X 3 is an implicant since F F becomes 1 when X 1,X 2,X 3 X 1,X 2,X 3 are 1.
Since none of X 1 X 2 X 1 X 2, X 1 X 3 X 1 X 3 and X 2 X 3 X 2 X 3 is an implicant, X 1 X 2 X 3 X 1 X 2 X 3 is a prime implicant.
Similarly, all X i X j X k X i X j X k are prime implicant where triple i,j,k i,j,k are different from each other. There are (6 3)=20(6 3)=20 of them.
Can there be other prime implicant? No. Here is how to see it. Suppose A 1 A 2⋯A m A 1 A 2⋯A m is a prime implicant, where each A i A i is one of X 1,⋯,X 6,X¯¯¯¯1,⋯,X¯¯¯¯6 X 1,⋯,X 6,X¯1,⋯,X¯6.
None of A i A i s is X¯¯¯¯1,⋯,X¯¯¯¯6 X¯1,⋯,X¯6. Otherwise, we can remove them to get a larger implicant.
The number of A i A i s that are one of X 1,⋯,X 6 X 1,⋯,X 6 must be at least 3. Otherwise, F F can become 1 when only those X i X i s are 1, i.e., less than 3 of input variables are 1.
The number of A i A i s that are one of X 1,⋯,X 6 X 1,⋯,X 6 must be at most 3. Otherwise, we can select A i 1,A i 2,A i 3 A i 1,A i 2,A i 3 that are X 1,⋯,X 6 X 1,⋯,X 6. F F can be expanded to the implicant A i 1 A i 2 A i 3 A i 1 A i 2 A i 3
An essential prime implicant is an prime implicant that covers an output of the function that no combination of other prime implicants is able to cover. Based on symmetry, we should expect that every prime implicant is an essential prime implicant, which is indeed the case. Can you find the output that is covered only by X 1 X 2 X 3 X 1 X 2 X 3?
In summary, there are 20 essential prime implicants of F F, which are X 1 X 2 X 3,X 1 X 2 X 4,X 1 X 2 X 5,X 1 X 2 X 6,X 1 X 3 X 4,X 1 X 3 X 5,X 1 X 3 X 6,X 1 X 4 X 5,X 1 X 4 X 6,X 1 X 5 X 6,X 1 X 2 X 3,X 1 X 2 X 4,X 1 X 2 X 5,X 1 X 2 X 6,X 1 X 3 X 4,X 1 X 3 X 5,X 1 X 3 X 6,X 1 X 4 X 5,X 1 X 4 X 6,X 1 X 5 X 6,
X 2 X 3 X 4,X 2 X 3 X 5,X 2 X 3 X 6,X 2 X 4 X 5,X 2 X 4 X 6,X 2 X 5 X 6,X 2 X 3 X 4,X 2 X 3 X 5,X 2 X 3 X 6,X 2 X 4 X 5,X 2 X 4 X 6,X 2 X 5 X 6,
X 3 X 4 X 5,X 3 X 4 X 6,X 3 X 5 X 6,X 3 X 4 X 5,X 3 X 4 X 6,X 3 X 5 X 6,
X 4 X 5 X 6 X 4 X 5 X 6.
It is not necessary to draw or visualize the Karnaugh map.
Exercises
Exercise 1. A Boolean function B(X 1,X 2)B(X 1,X 2) of two variables is defined as B=1 B=1, when one or more input variables are at logic 1. Otherwise 0. How many essential prime implicants does B have?
Exercise 2. A Boolean function C(X 1,X 2,X 3)C(X 1,X 2,X 3) of three variables is defined as C=1 C=1, when two or more input variables are at logic 1. Otherwise 0. How many essential prime implicants does C have?
Exercise 3. A Boolean function F 2(X 1,X 2,X 3,X 4,X 5,X 6)F 2(X 1,X 2,X 3,X 4,X 5,X 6) of six variables is defined as F 2=1 F 2=1, when two or more input variables are at logic 1. Otherwise 0. How many essential prime implicants does F 2 F 2 have?
Exercise 4. A Boolean function P(X 1,X 2,X 3,X 4,X 5,X 6)P(X 1,X 2,X 3,X 4,X 5,X 6) of six variables is defined as P=1 P=1, when one or more input variables among X 1,X 2,X 3 X 1,X 2,X 3 are at logic 1 and one or more input variables among X 4,X 5,X 6 X 4,X 5,X 6 are at logic 1. Otherwise 0. How many essential prime implicants does P P have?
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Cite
Improve this answer
Follow
Follow this answer to receive notifications
edited Jun 16, 2020 at 10:30
CommunityBot
1
answered May 4, 2019 at 16:17
喜欢算法和数学喜欢算法和数学
39.2k 4 4 gold badges 35 35 silver badges 96 96 bronze badges
Add a comment|
This answer is useful
1
Save this answer.
Show activity on this post.
An implicant of F F is a partial assignment to the variables of F F which guarantees that F F is satisfied. A prime implicant is a minimal implicant, that is, an implicant that is no longer an implicant if we remove any single variable.
Let us start by finding all the implicants of F F. Let α α be any partial assignment to the variables of F F, and suppose that α α assigns k k variables to true. We can complete α α to an assignment by assigning the rest of the variables to false, in which case we get an assignment containing k k true variables. Hence α α can only be an implicant if k≥3 k≥3. Conversely, it is not hard to check that if α α assigns at least 3 variables to true then it is an implicant of F F.
When is an implicant a prime implicant? It must be a partial assignment with at least 3 true variables, such that if we remove any single variable, there are at most 2 true variables. Can you figure out how all such implicants look like? Give it a try.
As an aside, your function is monotone, and so its prime implicants are also known as minterms. Minterms have a special structure – they cannot be arbitrary partial assignments. I'll let you figure out the special property that minterms have.
Share
Share a link to this answer
Copy linkCC BY-SA 4.0
Cite
Improve this answer
Follow
Follow this answer to receive notifications
answered May 3, 2019 at 23:55
Yuval FilmusYuval Filmus
281k 27 27 gold badges 317 317 silver badges 515 515 bronze badges
2
As per my understanding I think all such prime implicants must have at most 3 true values. eg. X 2=1,X 4=1,X 6=1 X 2=1,X 4=1,X 6=1 all others X i=0 X i=0. correct me if I am wrong.Vineet –Vineet 2019-05-04 16:07:41 +00:00 Commented May 4, 2019 at 16:07
Implicants are partial assignments. They also need to imply your function.Yuval Filmus –Yuval Filmus 2019-05-04 16:08:48 +00:00 Commented May 4, 2019 at 16:08
Add a comment|
Your Answer
Thanks for contributing an answer to Computer Science Stack Exchange!
Please be sure to answer the question. Provide details and share your research!
But avoid …
Asking for help, clarification, or responding to other answers.
Making statements based on opinion; back them up with references or personal experience.
Use MathJax to format equations. MathJax reference.
To learn more, see our tips on writing great answers.
Draft saved
Draft discarded
Sign up or log in
Sign up using Google
Sign up using Email and Password
Submit
Post as a guest
Name
Email
Required, but never shown
Post Your Answer Discard
By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
boolean-algebra
digital-circuits
See similar questions with these tags.
Featured on Meta
Introducing a new proactive anti-spam measure
Spevacus has joined us as a Community Manager
stackoverflow.ai - rebuilt for attribution
Community Asks Sprint Announcement - September 2025
Report this ad
Report this ad
Related
1Counterexample for equality in Quantified Boolean Formula
2How to fill cell-network partition matrix of a function?
3Number of n-variable symmetric boolean functions that are linear
Hot Network Questions
How to rsync a large file by comparing earlier versions on the sending end?
A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man
alignment in a table with custom separator
Is it ok to place components "inside" the PCB
в ответе meaning in context
Direct train from Rotterdam to Lille Europe
Is encrypting the login keyring necessary if you have full disk encryption?
Gluteus medius inactivity while riding
How to solve generalization of inequality problem using substitution?
Discussing strategy reduces winning chances of everyone!
Do sum of natural numbers and sum of their squares represent uniquely the summands?
Are there any legal strategies to modify the nature and rules of the UN Security Council in the face of one, or more SC vetos?
Vanishing ext groups of sheaves with disjoint support
Does the mind blank spell prevent someone from creating a simulacrum of a creature using wish?
Does the Mishna or Gemara ever explicitly mention the second day of Shavuot?
Lingering odor presumably from bad chicken
Checking model assumptions at cluster level vs global level?
How to fix my object in animation
Why is a DC bias voltage (V_BB) needed in a BJT amplifier, and how does the coupling capacitor make this possible?
Why does LaTeX convert inline Python code (range(N-2)) into -NoValue-?
how do I remove a item from the applications menu
Proof of every Highly Abundant Number greater than 3 is Even
On being a Maître de conférence (France): Importance of Postdoc
Storing a session token in localstorage
Question feed
Subscribe to RSS
Question feed
To subscribe to this RSS feed, copy and paste this URL into your RSS reader.
Why are you flagging this comment?
It contains harassment, bigotry or abuse.
This comment attacks a person or group. Learn more in our Code of Conduct.
It's unfriendly or unkind.
This comment is rude or condescending. Learn more in our Code of Conduct.
Not needed.
This comment is not relevant to the post.
Enter at least 6 characters
Something else.
A problem not listed above. Try to be as specific as possible.
Enter at least 6 characters
Flag comment Cancel
You have 0 flags left today
Computer Science
Tour
Help
Chat
Contact
Feedback
Company
Stack Overflow
Teams
Advertising
Talent
About
Press
Legal
Privacy Policy
Terms of Service
Your Privacy Choices
Cookie Policy
Stack Exchange Network
Technology
Culture & recreation
Life & arts
Science
Professional
Business
API
Data
Blog
Facebook
Twitter
LinkedIn
Instagram
Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.29.34589
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
Accept all cookies Necessary cookies only
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Cookies Details
Performance Cookies
[x] Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Cookies Details
Functional Cookies
[x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookies Details
Targeting Cookies
[x] Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Cookies Details
Cookie List
Clear
[x] checkbox label label
Apply Cancel
Consent Leg.Interest
[x] checkbox label label
[x] checkbox label label
[x] checkbox label label
Necessary cookies only Confirm my choices |
2094 | https://wayground.com/admin/quiz/67963a423bf870addaaef0b7/solving-two-step-inequalities-with-positive-coefficients | Solving Two-Step Inequalities with Positive Coefficients 6th Grade Quiz | Wayground (formerly Quizizz)
Enter code
Login/Signup
Find similar resources
solving and graphing two step inequalities
[x]
two step inequalities word problems
[x]
writing two step inequalities
[x]
Solving Two-Step Inequalities with Positive Coefficients
6th Grade
•
21 Qs
Try it as a student
Similar activities
Solving Inequalities
6th Grade
•
25 Qs
Test 4.1
6th Grade
•
20 Qs
Solving & Graphing Inequalities
6th - 7th Grade
•
18 Qs
Operations with Inequalities
6th Grade
•
20 Qs
One Step Inequalities Adding and Subtracting
6th Grade - University
•
19 Qs
One Step Inequalities Adding and Subtracting
6th Grade - University
•
19 Qs
Variable and Inequalities
6th Grade
•
20 Qs
WMMMS Integers #2B Plotting Inequalities
6th Grade
•
16 Qs
View more activities
Solving Two-Step Inequalities with Positive Coefficients
Quiz
•
Mathematics
•
6th Grade
•
Easy
•
CCSS
7.EE.B.4B, 6.EE.B.8
Edit
Worksheet
Share
Save
Preview
Use this activity
Standards-aligned
Barbara White
Used 2+ times
FREE Resource
21 questions
Show all answers
[x]
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Preview
Edit
-4x + 14 ≤ 54
x ≥ - 10
x ≤ -10
x ≥ 10
x ≤ 10
Tags
CCSS.7.EE.B.4B
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Preview
Edit
x > 3
x ≤ ⅕
x ≥ 3
x ≤ ⅕
Tags
CCSS.7.EE.B.4B
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Preview
Edit
Solve for k.
2k - 9≤ -19
k≤ -5
k≤ 5
k< -5
k< 5
Tags
CCSS.7.EE.B.4B
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Preview
Edit
-3x − 4 < 5
x > -3
x < -3
x < 3
x > 3
Tags
CCSS.7.EE.B.4B
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Preview
Edit
Solve for k.
7k–2 ≥ -9
k ≤ -1
k≤1
k≥1
k≥ -1
Tags
CCSS.7.EE.B.4B
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Preview
Edit
Solve for t.
6t+4 ≤ -2
t≤ -1
t≤ 1
t=1
1=t
Tags
CCSS.7.EE.B.4B
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Preview
Edit
Do I need to flip my sign?
-3x ≥ 12
Yes, because I'll be dividing by a negative number
No, because you never flip the sign.
Tags
CCSS.6.EE.B.8
8.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Preview
Edit
Solve and graph the inequality.
7n - 1 > 76
A
B
C
D
Tags
CCSS.7.EE.B.4B
9.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Preview
Edit
Match the graph with its inequality.
b > –2
b < –2
b ≥ –2
b ≤ –2
Tags
CCSS.6.EE.B.8
10.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Preview
Edit
When graphing b<6 b<6 b<6 , would you use an open circle or a filled-in/closed dot?
open circle
filled-in/closed dot
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports
Continue with GoogleContinue with EmailContinue with ClasslinkContinue with Clever or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service&Privacy PolicyAlready have an account?Log in
Let me read it first
Similar Resources on Wayground
View all
20 questions Inequalities Quiz • 6th - 9th Grade 18 questions Write Inequalities Quiz • 6th - 8th Grade 18 questions Equations and Inequalities Review Quiz • 6th Grade 20 questions Word Problem Test Review (Inequalities and Equations) Quiz • 6th - 8th Grade 20 questions Solving 1-Step Inequalities Quiz • 6th - 8th Grade 20 questions Solving Inequalities Quiz • 6th - 7th Grade 20 questions Math 6 - Lesson 8.3B: Solving Simple Inequalities Quiz • 6th Grade 20 questions Equations and Tables Quiz • 6th Grade
Popular Resources on Wayground
10 questions Video Games Quiz • 6th - 12th Grade 10 questions Lab Safety Procedures and Guidelines Interactive video • 6th - 10th Grade 25 questions Multiplication Facts Quiz • 5th Grade 10 questions UPDATED FOREST Kindness 9-22 Lesson • 9th - 12th Grade 22 questions Adding Integers Quiz • 6th Grade 15 questions Subtracting Integers Quiz • 7th Grade 20 questions US Constitution Quiz Quiz • 11th Grade 10 questions Exploring Digital Citizenship Essentials Interactive video • 6th - 10th Grade
Discover more resources for Mathematics
22 questions Adding Integers Quiz • 6th Grade 20 questions Adding and Subtracting Integers Quiz • 6th Grade 21 questions Convert Fractions, Decimals, and Percents Quiz • 6th Grade 20 questions Integers, Opposites and Absolute Value Quiz • 6th Grade 15 questions Equivalent Ratios Quiz • 6th Grade 20 questions Order of Operations Quiz • 6th Grade 20 questions Ratios/Rates and Unit Rates Quiz • 6th Grade 18 questions Adding Integers Quiz • 6th - 7th Grade
Features
School & District
Wayground for Business
Create a quiz
Create a lesson
Subjects
Mathematics
Social Studies
Science
Physics
Chemistry
Biology
About
Our Story
Wayground Blog
Media Kit
Careers
Support
F.A.Q.
Help & Support
Privacy Policy
Terms of Service
Teacher Resources
© 2025 Quizizz Inc. (DBA Wayground)
Sitemap
Get our app |
2095 | https://alpha.chem.umb.edu/chemistry/ch313/Exp%205%20vinegar.pdf | Experiment 5 Chem 313 Preparation of Standard Sodium Hydroxide Solution and Titration of a Commercial Vinegar Product In this experiment we prepare a standard solution of NaOH, and then use it to determine the concentration of acetic acid in vinegar. We will require knowledge of the exact concentration of the NaOH solution, but it is not convenient either weigh solid NaOH, because it is hydroscopoic. Therefore, we must use a primary standard to determine the sodium hydroxide concentration to four significant figures. The primary standard that is most often used for standardizing sodium hydroxide solutions if potassium hydrogen phthalate, KHP. KHP of very high purity can be purchased, dried it in an oven, cooled it in a desiccator, and a sample can be accurately weighed on an analytical balance. After dissolving a known amount of KHP in distilled water, one can titrate the resulting solution with a sodium hydroxide solution. The volume of the sodium hydroxide solution required to reach the equivalence point and the mass of KHP is used to calculate the concentration of the sodium hydroxide solution to 4 or 5 significant figures. Once the NaOH solution is standardized it can be used to analyze acidic solutions, such as vinegar. The presence of carbon dioxide is another reason why NaOH can not be used as a primary standard. Water can readily absorb carbon dioxide. Dissolved carbon dioxide acts as a weak acid in aqueous solutions. CO2(g) ↔ CO2(aq) CO2(aq) + H2O H2CO3 HCO3 - + H+ If basic solutions are prepared using water containing dissolved carbon dioxide, a portion of the base reacts with HCO3 - to yield CO3 2-. Sodium hydroxide solutions are often prepared by diluting a 50 % aqueous solution of sodium hydroxide to the desired concentration, followed immediately by standardization against a primary standard. This removes possible sources of error due to varying amounts of carbon dioxide, because the dissolved CO2 precipitates out as sodium carbonate in a 50 % NaOH solution. We will also be using water that has recently been boiled to prepare all of the solution in this experiment. Boiling drives the above equilibriums to the left, driving off CO2(g) and dramatically reducing the bicarbonate concentration. KHP is a weak acid. It is the intermediate species of the phthalic acid system Ka2 = 3.9010-6 pKa2 = 5.408 KHP titration C8H5O4 - + OH- H2O + C8H4O4 2- Prelab Assignment A 0.5123-g sample of KHP (FW 204.23) was dissolved in about 25 mL of distilled water, and titrated to the phenolphthalein end point with 28.75 mL of a sodium hydroxide solution. Calculate the molar (M) concentration of the hydroxide solution. Apparatus 250 mL Erlenmeyer Flasks 50 mL burette 10 mL graduated cylinder 100 mL graduated cylinder 1000 mL boiling flasks 1 L polyethylene bottles Weighing bottle for drying KHP Chemicals Vinegar Phenolphthalein solution Potassium hydrogen phthalate solid 50 % sodium hydroxide solution PROCEDURE PART A: 1. Dry the KHP in a 105 C oven for at least one hour. Use your weighing bottle, without lid, to hold the solid. Label a 150-mL beaker, put the weighing bottle in the beaker and cover the beaker with a watch glass. 2. Clean the following glassware thoroughly; 25 mL pipet, 250 mL volumetric, and a buret. 3. Add about 6 mL of the 50 % NaOH solution using a 10-mL graduated cylinder to a 1-L bottle. Fill the bottle almost to the top with the boiled water, screw on the cap, and mix the solution thoroughly. (Leaving little head space and screwing on the cap will prevent CO2 in the atmosphere from dissolving into your NaOH). Label it! Handle the 50% NaOH with care!! Avoid contact with your skin or clothes. If you do spill some on yourself wash it off at once with a large amount of water. 4. Obtain about 30 mL of vinegar. There will be two different brands available. Write down the brand of the vinegar that you sample. Pipet a 25 mL of this sample into a 250 mL volumetric flask. Dilute to the mark with the de-ionized water and mix thoroughly. Label it! 5. Pipet 25-mL aliquots of the diluted vinegar solution to five 250 mL Erlenmeyer flask. Add 50 mL of de-ionized water and 3 drops of phenolphthalein indicator and mix thoroughly. Label the flasks. 6. Rinse a clean 50-mL burette with 25 mL of your sodium hydroxide solution. Fill it with approximately 45 mL of the sodium hydroxide solution. Record the level of the of the NaOH solution to the nearest ±0.01 mL. Take your time with this to really understand how to read and work the burette. 7. Take the KHP out of the oven. Place it in a desiccator to cool for 15-20 minutes (until cooled to room temperature). 8. Titrate the diluted vinegar in the five labeled Erlenmeyer flasks. The endpoint is reached when the solution changes from colorless to faint pink. Be careful not to overshoot the endpoint. One drop takes it from clear to faint pink. Be sure to refill burette with NaOH in between titrations. Also, make sure that you recap your 1 L-bottle in between fills. 9. Weigh five portions of 0.4-0.7 g to the nearest 0.1 mg. Place each portion in a labeled 250-mL Erlenmeyer flask. Add about 30 mL of the boiled water, 3 drops of phenolphthalein indicator and mix thoroughly. 10. Titrate each of the five samples to the same phenolphthalein end point as with the vinegar samples. 11. Carefully label your NaOH solution. 12. Trade data with a classmate that sampled from the other brand of vinegar PART 2 CLEAN-UP Rinse the buret, pipet and volumetric flask with several (10) portions of de-ionized water and put them away. (THIS IS CRITICALLY IMPORTANT). If it is not done the pipet and buret will essentially be destroyed. Use a brush and soapy water to wash the Erlenmeyer flasks. (SCRUB!) Data Analysis and Discussion Points: 1. With the data from each of you each of your six KHP samples calculate values for the concentration of your NaOH solution. (5 pts) 2. Calculate the mean, se, sm, and 95% CL of the concentration of your NaOH solution. (5 pts) 3. Calculate the mean, se, sm, and 95% CL of the volume of NaOH used to titrate the diluted vinegar samples (5 pts) 4. Using the mean [NaOH] and the mean V for the diluted vinegar titration, calculate the percentage of acetic acid in the vinegar (w/v). (5 pts) 5. Propagate the uncertainties in this calculation to estimate the uncertainty in the % acetic acid (use se values for [NaOH] and V and the uncertainties in the pipet and volumetric flask for the propagation). (5 pts) 6. Repeat 1-6 with your classmate’s data. (25 pts) 7. Using your estimate of the propagated uncertainties obtained from Question 5 as estimates of standard deviations, se, determine whether the percentage of acetic acid in the different brands of vinegar is statistically different to the 95 % CL. (5 pts) 8. Produce a Master Table that summarizes the results from this experiment and incorporate it into your report. (5 pts) Lab Report Abstract (10 pts) Brief procedure (less detail then in the write-up) (10 pts) Data (10) Data Analysis and Questions (60 pts) Discussion (10 pts) |
2096 | https://hal.science/hal-01378829/document | Published Time: Sat, 02 Aug 2025 00:02:27 GMT
HAL Id: hal-01378829
Submitted on 10 Oct 2016
HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL , est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
Distributed under a Creative Commons Attribution 4.0 International License
Circulant Matrices and Their Application to Vibration Analysis
Brian Olson, Steven Shaw, Chengzhi Shi, Christophe Pierre, Robert Parker
To cite this version:
Brian Olson, Steven Shaw, Chengzhi Shi, Christophe Pierre, Robert Parker. Circulant Matri-ces and Their Application to Vibration Analysis. Applied Mechanics Reviews, 2014, 66 (4), 10.1115/1.4027722. hal-01378829 Brian J. Olson
Applied Physics Laboratory, Air and Missile Defense Department,
The Johns Hopkins University,
Laurel, MD 20723-6099 e-mail: brian.olson@jhuapl.edu
Steven W. Shaw
University Distinguished Professor Department of Mechanical Engineering, Michigan State University, East Lansing, MI 48824-1226 e-mail: shawsw@egr.msu.edu
Chengzhi Shi
Department of Mechanical Engineering, University of California, Berkeley, Berkeley, CA 94720 e-mail: chengzhi.shi@berkeley.edu
Christophe Pierre
Professor and Vice President for Academic Affairs Department of Mechanical Science and Engineering, University of Illinois at Urbana-Champaign, Urbana, IL 61801 e-mail: chpierre@uillinois.edu
Robert G. Parker
L.S. Randolph Professor and Department Head
Department of Mechanical Engineering,
Virginia Polytechnic Institute and State University, Blacksburg, VA 24061 e-mail: r.parker@vt.edu
Circulant Matrices and Their Application to
Vibration Analysis
This paper provides a tutorial and summary of the theory of circulant matrices and their application to the modeling and analysis of the
free and forced vibration of mechanical structures with cyclic symmetry. Our presentation of the basic theory is distilled from the classic
book of Davis (1979, Circulant Matrices , 2nd ed., Wiley, New York) with results, proofs, and examples geared specifically to vibration
applications. Our aim is to collect the most relevant results of the existing theory in a single paper, couch the mathematics in a form that
is accessible to the vibrations analyst, and provide examples to highlight key concepts. A nonexhaustive survey of the relevant literature
is also included, which can be used for further examples and to point the reader to important extensions, applica-tions, and
generalizations of the theory.
1 Introduction
“The theory of matrices exhibits much that is visually attractive. Thus, diagonal matrices, symmetric matrices, (0, 1) matrices, and the like are attractive independently of their applications. In the same category are the circulants.” Philip J. Davis
The modeling and analysis of structural vibration is amature field, especially when vibration amplitudes are small and linear models apply. For such models, the powerful tools of modal analysis and superposition allow one to decompose the system and its response into a set of uncoupled single degree-of-freedom (DOF) systems, each of which captures the motion of the overall system in a given normal mode. For geometrically simple continua, the natural frequencies, vibra-tion modes, and response to known excitations can be analyti-cally determined. When discrete models are developed, matrix methods are readily applied for both natural frequency and response analyses. For general system models with no special properties, which occur in the majority of applications, large-scale computational models must be developed, typically using finite element methods. However, certain classes of systems possess special properties, such as symmetries, which aid in the analysis by enabling significant reduction of the fi-nite element models (Fig. 1( a)). This is particularly true for systems with cyclic symmetry. The main goal of this tutorial is to consider the vibrations of structural systems with cyclic symmetry, also known as rotation-ally periodic systems. A useful geometric view of these systems is that of a circular disk (a pie) split into N equal sectors (i.e., equally sized pieces of the pie), each of which contains an identical mechanical structure with identical coupling to forward-nearest-neighbors and to ground (Fig. 1( b)). The theory of circulants also applies to more general forms of coupling with non-nearest-neighbors, for example through a base substructure, as long as the rotational symmetry is preserved. These structural arrangements arise naturally in certain types of rotating machines. Turbomachinery examples include bladed disks, such as fans, compressors, turbines, and impeller stages of aircraft, helicopter engines, power plants, as well as propellers, pumps, and the like. Rotational perio-dicity also arises in some stationary structures such as satel-lite antennae. In some systems, such as planetary gears and rotors with pendulum vibration absorbers, the overall system is not necessarily cyclic, but subcomponents of it may be. When perfect cyclic symmetry of a model is assumed, special modal properties exist that significantly facilitate its vibration analysis. 1The nature of rotationally periodic systems imposes a cyclic structure on their mass and stiffness matrices, which are block cir-culant for systems with many DOFs per sector (Fig. 1( a)) and cir-culant for the special case of a single DOF per sector (Fig. 1( b)). By denoting the stiffness of the internal elements of each sector by K0 and the coupling stiffness between sectors as – K1, the stiff-ness matrices of rotationally periodic structures with nearest-neighbor coupling have the general form
K ¼
K0 K1 0 … 0 K1
K1 K0 K1 … 0 00 K1 K0 … 0 0
... ... ... . .. ... ...
0 0 0 … K0 K1
K1 0 0 … K1 K0
266666664377777775
where K0 and K1 are themselves matrices for the complex model shown in Fig. 1( a) and scalars for the simplest prototypical model shown in Fig. 1( b). A key property of K is that the elements of each row are obtained from the previous row by cyclically per-muting its entries. That is, for j ¼ 2; 3; …; N, row j is obtained from row j – 1 by shifting the elements of row j – 1 to the right by one position and wrapping the right-end element of row j – 1 into the first position. This is precisely the form of a circulant matrix, which is formally defined in Sec. 2.2. The mass matrix of a rota-tionally periodic structure with nearest-neighbor coupling is block diagonal and also shares this cyclic property. The size of the ele-ments of K is equal to the number of DOFs per sector, and is denoted by M. Thus, a system with N sectors and M DOFs per sec-tor has a total of NM DOFs. The most important utility of the theory of circulants in analyzing rotationally periodic systems is that they enable a NM -DOF system to be decomposed to a set of
NM -DOF uncoupled systems using the appropriate coordinate transformation. Admittedly, the same can be accomplished using brute-force methods to uncouple the entire system using modal analysis, but such an approach overlooks fundamental properties that are crucial to understanding the free and forced response of these systems and requires significantly more computational power. This is the central motivation for understanding and utiliz-ing circulants to analyze cyclic systems. The vibration modes of rotationally periodic systems consist of multiple pairs of repeated natural frequencies (eigenvalues) that lead to pairs of degenerate normal modes (eigenvectors). The number and nature of such pairs depend on whether N is even or odd. Each mode pair is characterized as a pair of standing waves (SWs) with different spatial phases, or a pair of traveling waves, labeled as a forward traveling wave (FTW) and backward travel-ing wave (BTW) when following the terminology used in applica-tions to rotating machinery. The choice of formulation is based on convenience for a given application, which depends on the nature of the system excitation. For example, the excitation frequency is proportional to the engine speed for many cyclic rotating systems, which leads to the so-called engine order (e.o.) excitation , and often the spatial nature of the excitation (in the rotating frame of reference) is in the form of a traveling wave. When such excita-tion is applied to systems with cyclic symmetry, the response also has special properties that can be easily uncovered by making use of the system traveling wave vibration modes. The strength of the intersector coupling is an important parame-ter in rotationally periodic systems. When the intersector coupling is strong, the frequencies of the mode pairs are well separated. In contrast, weak intersector coupling yields closely spaced frequen-cies, high modal density, and large sensitivity to cyclic-symme-try-breaking imperfections. A wave representation of the response shows that the strength of the coupling determines frequency passband widths, wherein unattenuated propagation of waves takes place. Weak intersector coupling leads to narrow passbands, and the passbands widen as the coupling strength increases. Another important parameter for cyclically symmetric structures is the total number of sectors. The modal density is larger for large
N, which corresponds to more natural frequencies within each fre-quency passband. In all cases, the modes are spatially distributed, or extended, for models of cyclic systems. That is, the pattern of displacements in a modal response is uniformly spread around the circumference of the structure. Systems with cyclic symmetry have been studied in the context of vibration analysis for over 40 yr. Early work considered proper-ties of the vibration modes [3,4] and the steady-state response to harmonic excitation [5–7] of tuned and mistuned turbomachinery rotors. Many of these contributions were motivated by vibration studies of general rotationally periodic systems [8–20], bladed disks [1,3,21–30], planetary gear systems [31–43], rings [44,45], circular plates [46–48], disk spindle systems [49–51], centrifugal pendulum vibration absorbers [52–56], space antennae , and microelectromechanical system frequency filters . Implicit in these investigations is the assumption of perfect symmetry which, of course, is an idealization. Perfect symmetry gives rise to well-structured vibration modes [9,31,33–37,39,53,56], which are char-acterized by certain phase indices that define specific phase rela-tionships between cyclic components in each vibration mode . This vibration mode structure is critical in the investigation of dynamic response of cyclic systems using modal analysis . These special properties of rotationally periodic structures save tremendous calculation effort in the analysis of the system dynamics [59–61]. The properties of cyclic symmetry are not only used in the study of mechanical vibrations, they are also important
Fig. 1 (a) Finite element model of a bladed disk assembly and ( b) general cyclic system with Nidentical sectors and nearest-neighbor coupling 2
to the analysis of elastic stress [62,63] and coupled cell networks . The special properties of systems with cyclic symmetry extend to nonlinear systems, where they are expressed quite naturally in terms of symmetry groups: the cyclic group, in particular [65–68]. The group theoretic formulation can also be applied to the linear vibration problems considered in this paper [69,70], but the approach presented here is more approachable to readers with a standard engineering background in linear algebra. The extension to systems with small imperfections that perturb the cyclic symmetry has led to important results related to mode localization , which arises in systems with high modal density caused by weak intersector coupling or a large number of sectors. In particular parameter regimes, the mode shapes are highly sensi-tive to small, symmetry-breaking imperfections among the nomi-nally identical sectors, and the spatial nature of the vibration modes can become highly localized. For these cases, the vibration energy is focused in a small number of sectors, and sometimes even a single sector. This behavior, which stems from the seminal work of Anderson on lattices , was originally recognized to be relevant to structural vibrations by Hodges and Woodhouse [72,73] and Pierre and Dowell , and has been extensively studied from both fundamental and applied [76–78] points of view. The phenomenon of mode localization is also observed in the forced response and has practical implications for the fatigue life of bladed disks in turbomachinery [79,80]. It is interesting to note that localization also arises in nonlinear systems with perfect symmetry, where the dependence of the system natural frequen-cies on the amplitudes of vibration naturally leads to the possibil-ity of mistuning of frequencies between sectors if their amplitudes are different [81–88]. Another topic central to vibration analysis that relies on the theory of circulants is the discrete Fourier transform (DFT) [89,90]. The DFT was known to Gauss , and is the most com-mon tool used to process vibration signals from experimental measurements and numerical simulations. The DFT and inverse DFT (IDFT) provide a computationally convenient means of determining the frequency content of a given signal. Because the mathematics of circulants is at the heart of the computation of the DFT, we include a brief introduction to the relationship between the DFT and IDFT, and its connection to the theory of circulants. The goal of this paper is to provide a detailed theory of circu-lant matrices as it applies to the analysis of free and forced struc-tural vibrations. Much of the material was developed as part of the Ph.D. research of the lead author [21,22,92–95]. References to other relevant work are included throughout this paper, but we do not claim to provide an exhaustive survey of the relevant literature. The remainder of the paper is organized as follows. Section 2 gives a quite exhaustive and self-contained treatment of the theory of circulants, which is distilled from the seminal work by Davis . We adopt a presentation style similar to that of
Ottarsson , one that should be familiar to an analyst in the vibrations engineering community. This section is meant to act simultaneously as a detailed reference and tutorial, including proofs of the main results and simple illustrative examples. Section 3 provides three examples that make use of the theory, including ordinary circulants and the more general block circulant matrices. Particular attention is given to cyclic systems under trav-eling wave engine order excitation because this type of system forcing appears naturally in many relevant applications of rotating machinery. The apprised reader, or the reader who wishes to learn by example, can skip directly to Sec. 3, depending on their back-ground, and revisit Sec. 2 as warranted. The paper closes with a brief summary in Sec. 4.
2 The Theory of Circulants
This section details the theory and mathematics of circulant matrices that are relevant to vibration analysis of mechanical structures with cyclic symmetry. The basic theory is distilled from the seminal work by Davis and is presented using mathemat-ics and notation that should be familiar to the vibrations engineer. Selected topics from linear algebra are reviewed in Sec. 2.1 to introduce relevant notion and support the theoretical development of circulant matrices in Secs. 2.2–2.8. This material is included for completeness; the apprised reader can skip directly to Secs. 2.2 and 2.3, where circulant and block circulant matrices (also referred to as circulants and block circulants ) are defined. Representations of circulants are discussed in Sec. 2.4. Diagonal-ization of circulants and block circulants is discussed at length in Sec. 2.5, which begins with a treatment of the Nth roots of unity in Sec. 2.5.1 and the Fourier matrix in Sec. 2.5.2. It is subse-quently shown how to diagonalize the cyclic forward shift matrix in Sec. 2.5.3 a circulant in Sec. 2.5.4, and a block circulant in Sec. 2.5.5. Some generalizations of the theory are discussed in Sec. 2.6, including the diagonalization of block circulants with circulant blocks. Relevant mathematics of the DFT and IDFT are summarized in Sec. 2.7. Finally, the circulant eigenvalue problem (cEVP) is discussed in Sec. 2.8, including the eigenvalues and eigenvectors of circulants and block circulants, their symmetry characteristics, and connection to the DFT process.
2.1 Mathematical Preliminaries. Definitions and relevant properties of special operators and matrices are discussed in Secs. 2.1.1 and 2.1.2, respectively, including the direct (Kro-necker) product, and Hermitian, unitary, cyclic forward shift, and flip matrices. This is followed in Sec. 2.1.3 with a treatment of matrix diagonalizability.
2.1.1 Special Operators. Let C denote the set of complex numbers and Zþ be the set of positive integers. D EFINITION 1 (Direct Sum). For each i ¼ 1; 2; …; N and p i 2 Zþ, let Ai 2 Cpi pi . Then the direct sum of Ai is denoted by
Ni¼1 Ai ¼ A1 A2 … ANand results in the block diagonal square matrix
A ¼
A1 0 … 00 A2 … 0
... ... . .. ...
0 0 … AN
2666437775
of order p 1 þ p2 þ þ p N , where each zero matrix 0 has the appropriate dimension.
It is convenient to define the operator diag ðÞ that takes as its argument the ordered set of matrices A1; A2; …; AN and results in the block diagonal matrix given in Definition 1, that is,
A ¼ diag ðA1; A2; …; AN Þ ¼ diag
i¼1;…;N
ðAiÞ
For the case when each Ai ¼ a i is a scalar (1 1), the direct sum of a i is denoted by the diagonal matrix diag ða1; a2; …; aN Þ ¼ diag
i¼1;…;N
ðaiÞ
D EFINITION 2 (Direct Product). Let a; b 2 Cn . Then the direct prod-uct (or Kronecker product) of a and bT is the square matrix
a bT ¼
a1b1 a1b2 a1bna2b1 a2b2 a2bn
... ... . .. ...
an b1 an b2 an bn
2666437775
where ðÞ T denotes transposition. If A 2 Cmn and B 2 Cpq are matrices, then the direct product of A and B is the matrix 3A B ¼
a11 B a12 B a1nB
a21 B a22 B a2nB
... ... . .. ...
am1B am2B amn B
2666437775
of dimension mp nq.
Example 1 . Consider the matrices
A ¼ 1 2 3½ and B ¼ 1 23 4
Then the direct product of A and B is given by
A B ¼ 1 2 3½ 1 23 4
¼ 1 1 23 4
; 2 1 23 4
; 3 1 23 4
¼ 1 23 4
; 2 46 8
; 3 69 12
¼ 1 2 2 4 3 63 4 6 8 9 12
Because A is 1 3 and B is 2 2, the direct product A B has dimension 1 2 3 2, or 2 6.
Some important properties of the direct product are as follows: (1) The direct product is a bilinear operator. If A and B are square matrices and a is a scalar, then
aðA BÞ ¼ ð aAÞ B ¼ A ðaBÞ (1) (2) The direct product distributes over addition. If A, B, and C
are square matrices with the same dimension, then
ðA þ BÞ C ¼ A C þ B C (2 a)
A ðB þ CÞ ¼ A B þ A C (2 b)(3) The direct product is associative. If A, B, and C are square matrices, then
A ðB CÞ ¼ ð A BÞ C (3) (4) The product of two direct products yields another direct product. If A, B, C, and D are square matrices such that AC
and BD exist, then
ðA BÞð C DÞ ¼ ð AC Þ ðBD Þ (4) (5) The inverse of a direct product yields the direct product of two matrix inverses. If A and B are invertible matrices, then
ðA BÞ1 ¼ A1 B1 (5) where ðÞ 1 denotes the matrix inverse. (6) The transpose or conjugate transpose of a direct product yields the direct product of two transposes or conjugate transposes. If A and B are square matrices, then
ðA BÞT ¼ AT BT (6 a)
ðA BÞH ¼ AH BH (6 b)where ðÞ H ¼ ðÞ T is the conjugate transpose and ðÞ denotes complex conjugation. (7) If A and B are square matrices with dimensions n and m,respectively, then det ðA BÞ ¼ ð det AÞmðdet BÞn (7 a)tr ðA BÞ ¼ tr ðAÞtr ðBÞ (7 b)where det ðÞ and tr ðÞ denote the matrix determinant and trace.
2.1.2 Special Matrices. The definitions and relevant proper-ties of selected special matrices are summarized. Hermitian and unitary matrices are defined first (see Table 1), followed by a brief treatment of two important permutation matrices: the cyclic for-ward shift matrix and the flip matrix. The details of circulant mat-rices and the Fourier matrix, which are employed extensively throughout this work, are deferred to Secs. 2.2, 2.3, and 2.5.2. DEFINITION 3 (Hermitian Matrix). A matrix H 2 CNN is Hermi-tian if H ¼ HH.
The elements of a Hermitian matrix H satisfy hik ¼ h ki for all
i; k ¼ 1; 2; …; N. Thus, the diagonal elements h ii of a Hermitian matrix must be real, while the off-diagonal elements may be com-plex. If H ¼ HT then H is said to be symmetric .D EFINITION 4 (Unitary Matrix). A matrix U 2 CNN is unitary if
UHU ¼ I, where I is the N N identity matrix.
Real unitary matrices are orthogonal matrices. If a matrix U is unitary, then so too is UH. To see this, consider ðUH ÞH ðUH Þ¼ UU H ¼ I, from which it follows that
UHU ¼ UU H ¼ I (8) Finally, if U is unitary and nonsingular, then UH ¼ U1 .A general permutation matrix is formed from the identity matrix by reordering its columns or rows. Here, we introduce two such matrices: the cyclic forward shift matrix and the flip matrix. D EFINITION 5 (Cyclic Forward Shift Matrix). The N N cyclic forward shift matrix is given by
rN ¼
0 1 0 0 00 0 1 0 0
... ... ... . .. ... ...
0 0 0 1 00 0 0 0 11 0 0 0 0
2666666437777775
NN
which is populated with ones along the superdiagonal and in the (N, 1) position, and zeros otherwise.
The cyclic forward shift matrix plays a key role in the represen-tation and diagonalization of circulant matrices, which are dis-cussed in Secs. 2.4 and 2.5.
Example 2. Let a ¼ (a, b, c) be a three-vector. Then the operation
ar3 ¼ a b c½
0 1 00 0 11 0 0
264375
¼ ð c; a; bÞ
Table 1 Selected special matrices
Type Condition Symmetric A¼ATHermitian A¼AH
Orthogonal ATA¼I(or) AT¼A1Unitary AHA¼I(or) AH¼A14
cyclically shifts the entries of a by one entry to the right. That is, the ith entry of a is shifted to entry i þ 1, except for entry N ¼ 3, which is placed in position 1 of a.
D EFINITION 6 (Flip Matrix). The N N flip matrix is given by
jN ¼
1 0 0 0 00 0 0 0 10 0 0 1 0
... ... ... . .. ... ...
0 0 1 0 00 1 0 0 0
2666666437777775
NN
which is populated with ones in the (1, 1) position and along the subantidiagonal, and zeros otherwise .
C OROLLARY 1. Let jN be the flip matrix. Then
j2
N
¼ IN
jH
N
¼ jTN ¼ jN ¼ j1
N
)
where IN is the N N identity matrix .
2.1.3 Matrix Diagonalizability. Matrix diagonalization is the process of taking a square matrix and transforming it into a diago-nal matrix that shares the same fundamental properties of the underlying matrix, such as its characteristic polynomial, trace, and determinant. This section defines matrix diagonalizability in terms of similarity, provides necessary conditions for a matrix to be diagonalizable, and summarizes relevant properties of diagonaliz-able matrices. Diagonalization of circulant matrices is deferred to Sec. 2.5. DEFINITION 7 (Similarity Transformation). Let Q be an arbitrary nonsingular matrix. Then B ¼ Q1AQ is a similarity transforma-tion and B is said to be similar to A.
If B is similar to A, then A ¼ Q1
1B Q 1
is similar to B.It therefore suffices to say that A and B are similar . A summary of selected additional linear transformations is provided in Table 2. If B is orthogonally (resp. unitarily) similar to A, then we say that
A and B are orthogonally (resp. unitarily) similar matrices. T HEOREM 1. If A and B are similar matrices, then they have the same characteristic equation and hence the same eigenvalues.
Theorem 1 guarantees that the eigenvalues of a matrix are preserved under a similarity transformation. A proof can be found in any standard textbook on linear algebra [98,99]. Because
QT ¼ Q1 for orthogonal Q and QH ¼ Q1 for unitary Q, the eigenvalues are also preserved under orthogonal and unitary transformations. T HEOREM 2. Let the matrices A and B be similar. Then if pðtÞ ¼ XNk¼0
c k tkdenotes a finite polynomial in t with arbitrary coefficients c k ðk ¼ 1; 2; …; NÞ, the matrix polynomials p (A) and p (B) are similar.
Proof . Let Q be an arbitrary nonsingular matrix. Then
pðBÞ ¼ pðQ1AQ Þ¼ XNk¼0
c kðQ1AQ Þk
¼ c0I þ c1Q1AQ þ c2Q1AQQ 1AQ þ þ c N Q1AQ Q1AQ
¼ c0I þ c1Q1AQ þ c2Q1A2Q þ þ cN Q1AN Q
¼ Q1 c0I þ c1A þ c2A2 þ þ c N AN
Q
¼ Q1pðAÞQ
which completes the proof.
If p(t) ¼ t k with k > 0 in Theorem 2, then we have the following result. C OROLLARY 2. If B ¼ Q1 AQ , then Bk ¼ Q1AkQ for any k 2 Zþ.
DEFINITION 8 (Diagonalizable Matrix). A square matrix A is diagonalizable if there exists a nonsigular matrix Q and a diago-nal matrix D such that Q1AQ ¼ D.
Thus, a matrix is diagonalizable if it is similar to a diagonal ma-trix. If A is diagonalizable by Q, we say that Q diagonalizes A
and that Q is the diagonalizing matrix .T HEOREM 3. An N N matrix A is diagonalizable if it has N lin-early independent eigenvectors .
Proof . Suppose A has N linearly independent eigenvectors and denote them by q1; q2; …; qN . Let ki be the eigenvalue of A corre-sponding to qi for each i ¼ 1; …; N. Then if Q is the matrix that has as its ith column the vector qi, it follows that
AQ ¼ Aq 1; Aq 2; …; Aq Nð Þ¼ q1k1; q2k2; …; qN kNð Þ¼ q1; q2; …; qNð Þ diag
i¼1;…;N
ðkiÞ QD
Because Q is nonsingular by hypothesis, D ¼ Q1AQ .
2.2 Circulant Matrices
DEFINITION 9 (Circulant Matrix). A N N circulant matrix (or circulant, or ordinary circulant) is generated from the N-vector
fc1; c2; …; cN g by cyclically permuting its entries, and is of the form
C ¼
c1 c2 c Nc N c1 cN1
... ... . .. ...
c2 c3 c1
2666437775 D
D EFINITION 10 (Generating Elements). Let the N N circulant matrix C be given by Definition 9. Then the elements of the N-vector
fc1; c2; …; c N g
are said to be the generating elements of C.
Thus, a circulant matrix is defined completely by the generating elements in its first row, which are cyclically shifted to the right by one position per row to form the subsequent rows. The set of all such matrices of order N is denoted by CN . A matrix contained in CN is said to be a circulant of type N.It is convenient to define the circulant operator circ ðÞ that takes as its argument the generating elements c1; c2; …; cN and results in the array given in Definition 9, that is,
Table 2 Selected types of linear transformations
Type Condition Transformation Equivalence Pand Qare nonsingular B¼PAQ
Congruence Qis nonsingular B¼QTAQ
Similarity Qis nonsingular B¼Q1AQ
Orthogonal Qis nonsingular and orthogonal B¼QTAQ ¼Q1AQ
Unitary Qis nonsingular and unitary B¼QHAQ ¼Q1AQ 5
C ¼ circ ðc1; c2; …; c N Þ (9) An N N circulant is also characterized in terms of its ( i, k) entry by ðCÞik ¼ ckiþ1ðmod NÞ for i; k ¼ 1; 2; …; N.
Example 3 . The circulant array formed by the generating ele-ments a, b, c, d can be written as circ ða; b; c; dÞ ¼
a b c dd a b cc d a bb c d a
26643775 2 C4which is a circulant matrix of type 4.
If a matrix is both circulant and symmetric, its generating ele-ments are
c1; …; cN
2
; cNþ22 ; cN
2
; …; c3; c2; N even
c1; …; cN12 ; cNþ12 ; cNþ12 ; cN12 ; …; c3; c2; N odd
(
(10) which are necessarily repeated. Only ( N þ 2)/2 generating ele-ments are distinct if N is even and ( N þ 1)/2 are distinct if N is odd. The set of all N N symmetric circulants is denoted by
SC N . A matrix contained in SC N is said to be a symmetric circu-lant of type N.
Example 4 . The 5 5 matrix circ ða; b; c; c; bÞ ¼
a b c c bb a b c cc b a b cc c b a bb c c b a
266664377775 2 SC 5is both symmetric and circulant. Because N ¼ 5 is odd, it has (N þ 1)/2 ¼ 3 distinct elements.
The matrix defined in Example 3 is not a symmetric circulant because its generating elements are distinct. Next, we give a nec-essary and sufficient condition for a square matrix to be circulant. T HEOREM 4. Let rN be the cyclic forward shift matrix. Then a
N N matrix C is circulant if and only if CrN ¼ rN C.
Proof. Let C be an N N matrix with arbitrary elements cik for
i; k ¼ 1; 2; …; N. Then
CrN ¼
c1N c11 c12 c1ðN1Þ
c2N c21 c22 c2ðN1Þ
... ... ... . .. ...
cNN c N1 c N2 cNðN1Þ
2666437775
and
rN C ¼
c21 c22 c23 c2Nc31 c32 c33 c3N
... ... ... . .. ...
c11 c12 c13 c1N
2666437775
These matrices are equal if and only if the equalities
c1N ¼ c21 ; c11 ¼ c22 ; c1ðN1Þ ¼ c2Nc2N ¼ c31 ; c21 ¼ c32 ; c2ðN1Þ ¼ c3N
... ... . .. ...
c NN ¼ c11 ; c N1 ¼ c12 ; c NðN1Þ ¼ c1N
are satisfied. Then C can be written as
C ¼
c11 c12 c1Nc21 c22 c2N
... ... . .. ...
cN1 c N2 c NN
2666437775 ¼
c11 c12 c1Nc1N c11 c1ðN1Þ
... ... . .. ...
c12 c13 c11
2666437775
which is a N N circulant matrix with generating elements
c11 ; c12 ; …; c1N .
Any matrix that commutes with the cyclic forward shift matrix is, therefore, a circulant. Theorem 4 also says that circulant matrices are invariant under similarity transformations involving the cyclic forward shift matrix. That is, C is similar to itself for a similarity transformation using rN .
Example 5 . Consider the 3 3 matrix
A ¼
a b cc a bb c a
2435
Then
a b cc a bb c a
264375
0 1 00 0 11 0 0
264375 ¼
c a bb c aa b c
264375
¼
0 1 00 0 11 0 0
264375
a b cc a bb c a
264375
which implies that Ar3 ¼ r3A. Thus, A ¼ circ ða; b; cÞ 2 C3 is a circulant matrix of type N ¼ 3.
Next we introduce block circulant matrices, which are natural generalizations of ordinary circulants.
2.3 Block Circulant Matrices. A block circulant matrix is obtained from a circulant matrix by replacing each entry ck in Definition 9 by the M M matrix Ci for i ¼ 1; 2; …; N.DEFINITION 11 (Block Circulant Matrix). Let Ci be a M Mmatrix for each i ¼ 1; 2; …; N. Then a NM NM block circulant matrix (or block circulant) is generated from the ordered set
fC1; C2; …; CN g, and is of the form
C ¼
C1 C2 CN
CN C1 CN1
... ... . .. ...
C2 C3 C1
2666437775 D
D EFINITION 12 (Generating Matrices). Let the NM NM block circulant C be given by Definition 11. Then the elements of the ordered set
fC1; C2; ; CN g
are said to be the generating matrices of C.
A block circulant is therefore defined completely by its generat-ing matrices. The matrix array given by Definition 11 is said to be a block circulant of type ( M, N). The set of all such matrices is denoted by BC M;N . A matrix C 2 BC M;N is not necessarily a cir-culant, as the following example demonstrates.
Example 6 . Let
A ¼ 2 1
1 2
and B ¼ 1 00 1
Then 6C ¼
A B 0 BB A B 00 B A BB 0 B A
2666437775
¼
2 1 1 0 0 0 1 0
1 2 0 1 0 0 0 1
1 0 2 1 1 0 0 00 1 1 2 0 1 0 00 0 1 0 2 1 1 00 0 0 1 1 2 0 1
1 0 0 0 1 0 2 10 1 0 0 0 1 1 2
377777777777775266666666666664
is a block circulant of type (2, 4), but it is not a circulant.
Next we give a necessary and sufficient condition for a matrix to be block circulant. T HEOREM 5. Let rN be the cyclic forward shift matrix of dimen-sion N and IM be the identity matrix of dimension M. Then a NM NM matrix C is a block circulant of type (M, N) if and only if CðrN IM Þ ¼ ð rN IM ÞC.
The proof of Theorem 5 follows similarly to that of Theorem 4 by replacing the scalar elements c ik with M M matrices Cik
for i; k ¼ 1; 2; …; N. The reader can verify that the matrix C in Example 6 satisfies the condition in Theorem 5, but not that in Theorem 4. A block circulant, block symmetric matrix of type ( M, N) has generating matrices of the same form as Eq. (10), and is obtained by replacing each entry ck by the M M matrix Ck for
k ¼ 1; 2; …; N. The set of all such matrices is denoted by
BCBS M;N . The matrix C in Example 6 is recognized to be a block symmetric, block circulant matrix of type (2, 4), that is, it is contained in BCBS 2;4 , which is a subset of BC 2;4 .
2.4 Representations of Circulants. It is clear from Defini-tion 5 that the N N cyclic forward shift matrix is a circulant with
N generating elements 0 ; 1; 0; …; 0; 0. The integer powers of rN
can be written as
r0
N
¼ circ ð1; 0; 0; 0; 0; …; 0; 0Þ ¼ IN
r1
N
¼ rN ¼ circ ð0; 1; 0; 0; 0; …; 0; 0Þ
r2
N
¼ circ ð0; 0; 1; 0; 0; …; 0; 0Þ
...
rN1
N
¼ circ ð0; 0; 0; 0; 0; …; 0; 1Þ
rNN ¼ circ ð1; 0; 0; 0; 0; …; 0; 0Þ ¼ r0
N
¼ IN
9>>>>>>>>>>>=>>>>>>>>>>>;
(11) where each successive power cyclically permutes the generating elements. This enables the representation of a general circulant in terms of a finite matrix polynomial involving the cyclic forward shift matrix and its powers. C OROLLARY 3. Let C 2 CN be a circulant matrix of type N with generating elements c 1; c2; …; c N . Then C can be represented by the matrix sum
C ¼ c1r0
N
þ c2r1
N
þ c3r2
N
þ þ c N rN1
N
where rN is the N N cyclic forward shift matrix .
Example 7 . The matrix A ¼ circ ða; b; cÞ from Example 5 can be represented by the matrix sum
A ¼ ar03 þ br13 þ cr23
¼ aI3 þ br3 þ cr23
¼ a
1 0 00 1 00 0 1
264375 þ b
0 1 00 0 11 0 0
264375 þ c
0 0 11 0 00 1 0
264375
¼
a b cc a bb c a
264375
where I3 and r3 are the 3 3 identity and cyclic forward shift matrices.
Corollary 3 is exploited in Sec. 2.5.4 to diagonalize a general circulant matrix, and can be generalized to represent a general block circulant matrix in terms of the cyclic forward shift matrix and its powers. C OROLLARY 4. Let C 2 BC M;N be a block circulant matrix of type (M, N) with generating matrices C1; C2; …; CN . Then C can be represented by the matrix sum
C ¼ r0
N
C1 þ r1
N
C2 þ þ rN1
N
CNwhere rN is the cyclic forward shift matrix.
Corollaries 3 and 4 motivate the following result, which cap-tures the representation of circulant and block circulant matrices in terms of the cyclic forward shift matrix, and facilitates their diagonalization in Secs. 2.5.4 and 2.5.5. DEFINITION 13. Let t and s be arbitrary square matrices. Then the function
qðt; sÞ ¼ XNk¼1
tk1 s
is a finite sum of direct products .
C OROLLARY 5. Let rN be the N N cyclic forward shift matrix. Then a circulant matrix with generating elements c 1; c2; …; cNand a block circulant matrix with generating elements
C1; C2; …; CN can be represented by the matrix sums
qðrN ; ckÞ ¼ XNk¼1
rk1
N
c k ¼ circ ðc1; c2; …; c N Þ
qðrN ; CkÞ ¼ XNk¼1
rk1
N
Ck ¼ circ ðC1; C2; …; CN Þ
where the function qðÞ is given by Definition 13 .
What is meant by the notation qðrN ; ckÞ, for example, is to sub-stitute t with rN and s with c k in Definition 13 and then perform the summation observing any indices k introduced by the substitution .
2.5 Diagonalization of Circulants. Any circulant or block circulant matrix can be represented in terms of the cyclic forward shift matrix according to Corollary 5. The diagonalization of a general circulant begins, therefore, by finding a matrix that diago-nalizes rN . Together with some basic results from linear algebra (these are summarized in Sec. 2.1), this leads naturally to the diagonalization of an arbitrary circulant. Regarding a suitable diagonalizing matrix, there are a number of candidates [10–12,16,17,100], but all feature powers of the Nth roots of unity or their real/imaginary parts. In this work, we employ an array composed of the distinct Nth roots of unity (Sec. 2.5.1) and their integer powers in the form of the complex Fourier matrix (Sec. 2.5.2). A unitary transformation involving the Fourier matrix is used to diagonalize the cyclic forward shift matrix (Sec. 2.5.3), 7general circulant matrices (Sec. 2.5.4), and general block circulant matrices (Sec. 2.5.5).
2.5.1 Nth Roots of Unity. A root of unity is any complex num-ber that results in 1 when raised to some integer N 2 Zþ . More generally, the Nth roots of a complex number z o ¼ r o e jho are given by a nonzero number z ¼ re jh such that
zN ¼ zo or r N e jN h ¼ ro e jho (12) where j ¼ ffiffiffiffiffiffiffi
1
p . Equation (12) holds if and only if r N ¼ ro and
Nh ¼ ho þ 2pk with k 2 Z. Therefore,
r ¼ ffiffiffiffi
r oN
p
h ¼ ho þ 2pkN
9=;; k 2 Z (13) and the Nth roots are
z ¼ ffiffiffiffi
r oN
p exp j ho þ 2pkN
; k 2 Z (14) Equation (14) shows that the roots all lie on a circle of radius ffiffiffiffi
r oN
p
centered at the origin in the complex plane, and that they are equally distributed every 2 p=N radians. Thus, all of the distinct
roots correspond to k ¼ 0; 1; 2; …; N 1. DEFINITION 14 (Distinct Nth Roots of Unity). The distinct N th
roots of unity follow from Eq. (14) by setting r o ¼ 1 and ho ¼ 0and are denoted by wðkÞ
N
¼ e j 2pkNfor integers k ¼ 0; 1; 2; …; N 1.
DEFINITION 15 (Primitive Nth Root of Unity). The primitive N th
root of unity is denoted by w N ¼ e j 2p
N
which corresponds to k ¼ 1 in Definition 14 .
C OROLLARY 6. The integer powers w kN of the primitive Nth root of unity are equivalent to the distinct N th roots of unity w ðkÞ
N
for k ¼ 1; 2; …; N.
Proof . Consider wkN ¼ ð e j 2p
N
Þk ¼ e j 2pkN ¼ wðkÞ
N
, which follows from Definition 14. Thus, the powers 1; w1
N
; w2
N
; …; w N1
N
are equivalent to the distinct Nth roots of unity 1; wð1Þ
N
; wð2Þ
N
; …; wðN1Þ
N
where w0
N
¼ wð0Þ
N
¼ 1.
Example plots of the distinct Nth roots of unity are shown in Fig. 2, where wðkÞ
N
are arranged on the unit circle in the complex plane (centered at the origin) for N ¼ 1; 2; …; 9. Note that
wð0Þ
N
¼ 1 is real, as is wðN=2Þ
N
¼ 1 if N is even. The remaining roots appear in complex conjugate pairs. Thus, the distinct Nth roots of unity are symmetric about the real axis in the complex plane.
Example 8 . Let N ¼ 4. Then the distinct Nth roots of unity are given by the set
fw04; w14; w24; w34g ¼ f e j 2p
40
; e j 2p
41
; e j 2p
42
; e j 2p
43
g¼ f e0; e j p
2
; e j p; e j 3p
2
g¼ f 1; j; 1; jg
These four distinct roots of unity can be visualized in Fig. 2 for the case of N ¼ 4.
D EFINITION 16. Let w N be the primitive N th root of unity. Then
XN ¼
1 0
w Nw2
N
. ..
0 wN1
N
266666664377777775
NN
¼ diag ð1; wN ; w2
N
; …; wN1
N
Þ
is the N N diagonal matrix formed by placing the distinct N th
roots of unity 1; w N ; w2
N
; …; w N1
N
along its diagonal .
The matrix XN appears naturally in the diagonalization of cir-culants, which is discussed in Secs. 2.5.3–2.5.5.
2.5.2 The Fourier Matrix. This section introduces the com-plex Fourier matrix and its relevant properties, including the sym-metric structure of the N-vectors that compose its columns. A key result is that the Fourier matrix is unitary, which is systematically developed and proved. DEFINITION 17 (Fourier Matrix). The N N Fourier matrix is defined as
EN ¼ 1ffiffiffiffi
N
p
1 1 1 11 w N w2
N
w N1
N
1 w2
N
w4
N
w2ðN1Þ
N
... ... ... . .. ...
1 w N1
N
w2ðN1Þ
N
wðN1Þð N1Þ
N
266666664377777775
NN
where w N is the primitive N th root of unity and N 2 Zþ.
Fig. 2 Example plots of the distinct Nth roots of unity 8Example 9 . For the special case of N ¼ 4, the Fourier matrix is given by
E4 ¼ 1ffiffiffi
4
p
1 1 1 11 j 1 j
1 1 1 11 j 1 j
2666437775
Clearly the Fourier matrix is symmetric, but generally it is not Hermitian. It can be written element wise as
ðEN Þik ¼ 1ffiffiffiffi
N
p wði1Þð k1Þ
N
¼ 1ffiffiffiffi
N
p e jði1Þuk
¼ 1ffiffiffiffi
N
p e jðk1Þui ; i; k ¼ 1; 2; …; N (15) where
ui ¼ 2p
N ði 1Þ (16) is the angle subtended from the positive real axis in the complex plane to the ith power of w N, which is also the ði þ 1Þth of the N
roots of unity according to Definition 14 and the numbering scheme in Fig. 2. C OROLLARY 7. The matrix EH
N
is obtained from EN by changing the signs of the powers of each element .
Proof . The Fourier matrix is unaffected by transposition because it is symmetric. Thus, the ( i, k) element of EH
N
is
EH
N
ik
¼ ð EN Þik ¼ 1ffiffiffiffi
N
p wði1Þð k1Þ
N
¼ 1ffiffiffiffi
N
p wð i1Þð k1Þ
N
where the identity
w kN ¼ e j 2p
Nk
¼ ej 2p
Nk
¼ e j 2p
N
k
¼ wkN ; k 2 Z
is employed. It follows that EH
N
can be obtained from EN by changing the sign of the powers of the Nth roots of unity.
It is shown in Sec. 2.8 that all circulant matrices contained in
CN share the same linearly independent eigenvectors, the ele-ments of which compose the N columns (or rows) of EN.DEFINITION 18. Let w N be the primitive Nth root of unity. Then for i ¼ 1; 2; …; N the columns of the Fourier matrix EN are defined by
ei ¼ 1ffiffiffiffi
N
p 1; wði1Þ
N
; w2ði1Þ
N
; …; wðN1Þð i1Þ
N
T
¼ 1ffiffiffiffi
N
p 1; ejui ; ej2ui ; …; e jðN1Þui
T
where ui is given by Eq. (16) .
Example 10 . The third column of the Fourier matrix E4 is given by
e3 ¼ 1ffiffiffi
4
p 1; wð31Þ
4
; w2ð31Þ
4
; w3ð31Þ
4
T
¼ 12 1; w24; w44; w64
T
¼ 12 1; e j 2p
42
; e j 2p
44
; e j 2p
46
T
¼ 12 1; ejp; ej2p; ej3p
T
¼ 12 ð1; 1; 1; 1ÞTfor the special case of N ¼ 4.
The columns ei of the Fourier matrix EN ¼ ð e1; …; eN Þ exhibit a symmetric structure with respect to the index i ¼ (N þ 2)/2 for even N. In Example 9, for instance, the vectors e1 and
eðNþ2Þ=2 ¼ e3 are real and distinct, and the vectors e2 and e4appear in complex conjugate pairs. This same structure generally holds for any EN with even N. To see this, consider
eNþ22 6q ¼ 1ffiffiffiffi
N
p 1; wðN
26qÞ
N
1
; …; wðN
26qÞ
N
N1
T
¼ 1ffiffiffiffi
N
p 1; w6qN
1; …; w6qN
N1
T(17) where the integers 6q correspond to vector pairs relative to the index i ¼ ð N þ 2Þ=2 and the identity
w N
26qN
¼ w N
2
N
w6qN ¼ w6qN
is employed. The case of q ¼ 0 corresponds to i ¼ ð N þ 2Þ=2 and yields the real vector
eNþ22 ¼ 1ffiffiffiffi
N
p ð1; 1; 1; …; 1; 1ÞT (18) which has the same value for each element with alternating signs from element to element. For q 6 ¼ 0 the terms w6qN are complex conjugates according to the proof of Corollary 7 such that
e ðNþ2Þ=2ð Þþ q and e ðNþ2Þ=2ð Þ q are complex conjugate pairs. There are (N 2)/2 such pairs corresponding to q ¼ f 1; 2; …; ðN 2Þ=2g in Eq. (17). Finally, the case of i ¼ 1 always yields the real vector
e1 ¼ 1ffiffiffiffi
N
p ð1; 1; 1; …; 1; 1ÞT (19) for even and odd N. A similar formulation for odd N shows that e1is real and distinct and the remaining ( N – 1)/2 vectors appear in complex conjugate pairs. This is shown by example in Sec. 3.3 in the context of vibration modes for a cyclic structure with a single DOF per sector. A key feature of the Fourier matrix is that it is unitary. This is essentially a statement of orthogonality of each column of EN and is captured by the following lemmas. L EMMA 1 (Finite Geometric Series Identity). Let N 2 Zþ and q 2 C. Then
XsþN1
r¼s
qr ¼ qsð1 qN Þ
1 qfor any s 2 Z and q 6 ¼ 1.
Proof. Consider the finite geometric series
XsþN1
r¼s
qr ¼ qs þ q sþ1 þ qsþ2 þ qsþN1
¼ qsð1 þ q þ q2 þ þ qN1Þ
Multiplying from the left by q yields
q XsþN1
r¼s
qr ¼ qsðq þ q2 þ q3 þ þ q N Þ
Subtraction of the second equation from the first results in
ð1 qÞ XsþN1
r¼s
qr ¼ qsð1 qN Þ9from which the proof is established by division of the term (1 – q)because q 6 ¼ 1 by restriction.
Lemma 1 is used to establish the following result, which is required to show that the Fourier matrix is unitary. The orthogon-ality condition is fundamental to the diagonalization of circulants in Secs. 2.5.3–2.5.5, and the relationship between the DFT and IDFT in Sec. 2.7. L EMMA 2. Let w N be the primitive Nth root of unity with N 2 Zþ. Then
XsþN1
r¼s
wrðikÞ
N
¼ N; i k ¼ mN
0; otherwise
for i ; k 2 Z and any s ; m 2 Z.
Proof. Let q ¼ wðikÞ
N
¼ e j 2p
NðikÞ
and note that qN ¼ 1. If
ik ¼ mN , then q ¼ e j2pm ¼ 1 for any integer m, and it follows that
XsþN1
r¼s
w rðikÞ
N
¼ XsþN1
r¼s
qr
¼ ð 1Þs þ ð 1Þsþ1 þ þ ð 1ÞsþN1
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
Nterms
¼ N
For the case of i k 6 ¼ mN it follows from Lemma 1 that
XN1
r¼0
w rðikÞ
N
¼ XN1
r¼0
qr
¼ 1 qN
1 q
¼ 1 11 q
¼ 0(Lem. 1) which completes the proof.
Example 11 . Consider the orthogonality condition given by Lemma 2 for s ¼ 0. Then if i k ¼ N ¼ 5,
X51
r¼0
wr55 ¼ X4
r¼0
e j 2p
5
5r
¼ X4
r¼0
e j 2p
55r
¼ e0 þ e j2p þ e j4p þ e j6p þ e j8p
¼ 1 þ 1 þ 1 þ 1 þ 1
¼ 5which is numerically equal to N, as expected. If instead we set
i k ¼ 5 but N ¼ 4, then
X41
r¼0
w r54 ¼ X3
r¼0
e j 2p
4
5r
¼ X3
r¼0
e j 2p
45r
¼ X3
r¼0
e j 5p
2r
¼ e5p
20
þ e5p
21
þ e5p
22
þ e5p
23
¼ e0 þ e5p
2
þ e5p þ e15 p
2
¼ 1 þ j 1 j
¼ 0sums to zero.
Lemma 2 allows for representations of the N N identity, flip, and cyclic forward shift matrices in terms of certain conditions on their indices relative to N.C OROLLARY 8. For i ; k ¼ 1; …; N and any integer m, the (i, k) elements of the N N identity, flip, and cyclic forward shift matri-ces can be represented by the summations
dik ¼ ð IN Þik ¼ 1
N
XN1
r¼0
w rðikÞ
N
¼ 1; i k ¼ mN
0; otherwise
(
ðjN Þik ¼ 1
N
XN1
r¼0
wrðiþk2Þ
N
¼ 1; i þ k 2 ¼ mN
0; otherwise
(
ðrN Þik ¼ 1
N
XN1
r¼0
wrðikþ1Þ
N
¼ 1; i k þ 1 ¼ mN
0; otherwise
(
where dik is the Kronecker delta .
The reader can verify Corollary 8 for the special case of N ¼ 3by inspection of the arrays in Fig. 3. We are now ready to state the key result required to diagonalize a general circulant matrix. Corollaries 7 and 8 are used to show that the Fourier matrix is unitary. T HEOREM 6 (Unitary Fourier Matrix). The Fourier matrix EN is unitary.
Proof. For 1 i; k N, the ( i, k) entry of EH
N
EN is given by
EH
N
EN
ik
¼ XNr¼1
ðEH
N
Þir ðEN Þrk
¼ XNr¼11ffiffiffiffi
N
p wð i1Þð r1Þ
N
1ffiffiffiffi
N
p wðr1Þð k1Þ
N
¼ 1
N
XNr¼1
wðr1Þð ikÞ
N
¼ 1
N
XN1
r¼0
w rðikÞ
N
(Eq. 15 and Cor. 7)
¼ INð Þik (Cor. 8) from which it follows that EH
N
EN ¼ IN .
Example 12 . Consider the matrix E4 from Example 9. Because the Fourier matrix is unitary, it follows that
Fig. 3 Arrays showing the ( i, k) elements of the ( a) identity, ( b)flip, and ( c) cyclic forward shift matrices of dimension N 5 3 for
i, k 5 1, 2, 3 10 EH
4
E4 ¼ 1ffiffiffi
4
p
1 1 1 11 j 1 j
1 1 1 11 j 1 j
2666666437777775
1ffiffiffi
4
p
1 1 1 11 j 1 j
1 1 1 11 j 1 j
2666666437777775
¼ 144 0 0 00 4 0 00 0 4 00 0 0 4
2666666437777775
¼ I4where I4 is the 4 4 identity matrix.
The following corollaries follow from Theorem 6. C OROLLARY 9. If EN is the unitary Fourier matrix, then EN is also unitary .
Proof. Note that EH
N
¼ ETN ¼ EN because EN ¼ ETN is symmet-ric. It follows that
EH
N
EN ¼ ETN EN
¼ EN EN
¼ EN EH
N
¼ EH
N
EN (Eq. 8)
¼ IN (Thm. 6) which implies that EN is unitary.
Example 13 . Consider the unitary matrix E4 from Example 12. Corollary 9 guarantees that E4 is also unitary. Thus,
EH
4
E4 ¼ 1ffiffiffi
4
p
1 1 1 11 j 1 j
1 1 1 11 j 1 j
2666666437777775
1ffiffiffi
4
p
1 1 1 11 j 1 j
1 1 1 11 j 1 j
2666666437777775
¼ 144 0 0 00 4 0 00 0 4 00 0 0 4
2666666437777775
¼ I4as expected.
C OROLLARY 10. Let ei denote the ith column of the Fourier matrix EN and dik be the Kronecker delta. Then
eH
i
ek ¼ dik for i ; k ¼ 1; 2; …; N.
Proof. For i; k ¼ 1; 2; …; N, the ( i, k) entry of EH
N
EN can be written as
eH
i
ek
ik
¼ EH
N
EN
ik
¼ INð Þik (Thm. 6) where IN is the N N identity matrix. Thus, eH
i
ek ¼ dik .
Corollary 10 shows that the columns (and rows) of the Fourier matrix are mutually orthogonal. The result can also be proved by expanding the product eH
i
ek according to Eq. (15) and invoking Lemma 2, as is done in the proof of Theorem 6. The same result also follows by expanding
EH
N
EN ¼
eH
1
...
eH
i
...
eH
N
2666666666666437777777777775
e1 ek eN½ ¼
eH
1
e1 eH
1
ek … eH
1
eN
... . .. ... ...
eH
i
e1 eH
i
ek eH
i
eN
... ... . .. ...
eH
N
e1 … eH
N
ek … eH
N
eN
2666666666666437777777777775
¼ IN
(20) which is a statement of unitary EN. The matrix equality holds only if each eH
i
ek ¼ dik for i; k ¼ 1; 2; …N.
Example 14 . Consider the vector e3 ¼ 12 ð1; 1; 1; 1ÞT from Example 10. Then the product
eH
3
e3 ¼ 12 1 1 1 1½ 121
11
1
2666666437777775
¼ 14 ð1 þ 1 þ 1 þ 1Þ¼ 1corresponds to d33 ¼ 1 in Corollary 10. However, the product
eH
3
e2 ¼ 12 1 1 1 1½ 121
j
1
j
2666666437777775
¼ 14 ð1 j 1 þ jÞ¼ 0vanishes because e2 and e3 are mutually orthogonal.
C OROLLARY 11. If EN is the N N Fourier matrix and IM is the identity matrix of dimension M, then the NM NM matrix
EN IM is unitary .
Proof. Consider the matrix product
ðEN IM ÞH ðEN IM Þ¼ ð EH
N
IH
M
Þð EN IM Þ (Eq. 6 b)
¼ ð EH
N
EN Þ ðIH
M
IMÞ (Eq. 4) 11 ¼ IN IM
¼ INM (Thm. 6) where IN and INM are identity matrices of dimension N and NM ,respectively.
C OROLLARY 12. If ei denotes the ith column of the Fourier matrix
EN , IM is the identity matrix of dimension M, and dik is the Kro-necker delta, then the NM M matrices ei IM are such that
ðei IMÞH ðek IMÞ ¼ dik IMfor i ; k ¼ 1; 2; …; N.
Proof. Consider the matrix product
ðei IM ÞH ðek IM Þ ¼ ð eH
i
IH
M
Þð ek IM Þ (Eq. 6 b)
¼ ð eH
i
ekÞ ðIH
M
IM Þ (Eq. 4)
¼ dik IM (Cor. 10)
¼ dik IM
which completes the proof.
Corollary 12 can also be obtained directly from Corollary 11 by writing
EH
N
IM ¼
eH
1
eH
2
...
eH
N
266666664377777775
IM ¼
eH
1
IM
eH
2
IM
...
eH
N
IM
266666664377777775
and
EN IM ¼ ð e1; e2; …; eN Þ IM
¼ ð e1 IM; e2 IM; …; eN IM Þ
expanding these matrices similarly to Eq. (20), and setting the result equal to INM ¼ diag ðIM; IM; …; IMÞ.Next we derive a relationship between the Fourier and flip matrices. T HEOREM 7. Let EN and jN denote the N N Fourier and flip matrices, respectively. Then
E2
N
¼ jN ¼ EH
N
2:
Proof. We first shown that E2
N
¼ EN EN ¼ jN . For any inte-ger m and i; k ¼ 1; 2; …; N, the ( i, k) entry of ENEN is given by
EN ENð Þik ¼ XNr¼1
ðEN Þir ðEN Þrk
¼ XNr¼11ffiffiffiffi
N
p wði1Þð r1Þ
N
1ffiffiffiffi
N
p wðr1Þð k1Þ
N
(Eq. 15)
¼ 1
N
XN1
r¼0
w rðiþk2Þ
N
¼ jNð Þik (Cor. 8) from which it follows that E2
N
¼ jN . The result jN ¼ EH
N
2follows from complex conjugation and transposition of
jN ¼ EN EN , and by invoking the properties jH
N
¼ jN and
E2
N
H ¼ EH
N
2 .
A number of properties follow directly from Theorem 7. C OROLLARY 13. Let EN and jN be the N N Fourier and flip matrices. Then
(a) EN jN ¼ jN EN ;(b) j2
N
¼ IN or jN ¼ ffiffiffiffiffi
IN
p ; and (c) E4
N
¼ IN or EN ¼ ffiffiffiffiffi
IN
4
p
where IN is the N N identity matrix .
Property ( a) of Corollary 13 says that the flip and Fourier matri-ces commute or, since EN is unitary, that jN is invariant under a unitary transformation with respect to EN. Thus, jN is not diago-nalizable by EN. Properties ( b) and ( c) give alternative definitions of the flip and Fourier matrices. Moreover, because the power of a diagonal matrix is obtained by raising each diagonal element to the power in question, if follows that the eigenvalues of jN are
61 and those of EN are 61 and 6j, each with the appropriate multiplicities.
2.5.3 Diagonalization of the Cyclic Forward Shift Matrix. In light of Corollary 5, diagonalization of a general circulant or block circulant matrix begins by diagonalizing the cyclic forward shift matrix. T HEOREM 8. Let EN be the N N Fourier matrix and rN be the N N cyclic forward shift matrix. Then
EH
N
rN EN ¼ XNis a diagonal matrix, where XN is given by Definition 16 .
Proof. For i; k ¼ 1; 2; …; N, the ( i, k) entry of EN XN EH
N
is given by
EN XN EH
N
ik
¼ XNr¼1
XNp¼1
ðEN Þip ðXN Þpr ðEH
N
Þrk
¼ XNr¼1
XNp¼11ffiffiffiffi
N
p wði1Þð p1Þ
N
dpr wðr1Þ
N
1ffiffiffiffi
N
p wð r1Þð k1Þ
N
(Eq. 15)
¼ 1
N
XNr¼1
wði1Þð r1Þ
N
wðr1Þ
N
wð r1Þð k1Þ¼ 1
N
XNr¼1
wðr1Þð ikþ1Þ
N
¼ 1
N
XN1
r¼0
wrðikþ1Þ
N
¼ rNð Þik (Cor. 8) from which it follows that EN XN EH
N
¼ rN . The desired result fol-lows by multiplying from the left by EH
N
, multiplying from the right by EN, and invoking Theorem 6.
Theorem 8 implies that rN is unitarily similar to a diagonal ma-trix whose diagonal elements are the distinct Nth root of unity (i.e., Definition 16). Because the eigenvalues of a matrix are pre-served under such a transformation (this is guaranteed by Theo-rem 1), it follows that
aðrN Þ ¼ aðXN Þ ¼ f 1; w N ; w2
N
; …; w N1
N
g
where aðÞ denotes the matrix spectrum. The eigenvectors of the circulant matrix rN are the linearly independent columns of
EN ¼ ð e1; e2; …; eN Þ, which are given by Definition 18. In fact,
all circulant matrices contained in CN share the same eigenvectors 12 ei, which is shown in Sec. 2.8. In light of Corollary 2, we have the following results. C OROLLARY 14. Let EN and rN be the N N Fourier and cyclic forward shift matrices. Then for any n 2 Zþ,
EH
N
rnN EN ¼ XnNwhere XN given by Definition 16 .
C OROLLARY 15. Let ei be the ith column of the Fourier matrix
EN and rN be cyclic forward shift matrix. Then for any n 2 Zþ
and i ; k ¼ 1; 2; … N,
eH
i
rnN ek ¼ ð w i1
N
Þndik
¼ w nði1Þ
N
dik where dik is the Kronecker delta .
Corollary 15 shows that the columns of the Fourier matrix are orthogonal with respect to the cyclic forward shift matrix and its powers. It is shown in Sec. 2.5.4 that they are in fact orthogonal with respect to any circulant matrix.
2.5.4 Diagonalization of a Circulant.
Corollary 16. Let the matrix XN be populated with the distinct Nth roots of unity according to Definition 16 and s be an arbitrary square matrix. Then
qðXN ; sÞ ¼ diag
i¼1;…;N
ðqðw i1
N
; sÞÞ
where qðÞ is given by Definition 13 .
Proof. Consider the representation
qðXN ; sÞ ¼ qðdiag ð1; w N ; w2
N
; …; w N1
N
Þ; sÞ¼ XNk¼1diag ðw0ð k1Þ
N
; w1ð k1Þ
N
; …; wðN1Þð k1Þ
N
Þ s
¼ XNk¼1diag ðsw0ð k1Þ
N
; sw1ð k1Þ
N
; …; swðN1Þð k1Þ
N
Þ¼ diag
i¼1;…;N
XNk¼1
swði1Þð k1Þ
N
!
¼ diag
i¼1;…;N
ðqðwi1
N
; sÞÞ
which is diagonal when s is a scalar and block diagonal when s is a matrix.
T HEOREM 9 (Diagonalization of a Circulant). Let C 2 CN have generating elements c 1; c2; …; c N . Then if EN is the N N Fourier matrix ,
EH
N
CE N ¼
k1 0
k2
. ..
0 kN
26666643777775
is a diagonal matrix. For i ¼ 1; 2; …; N, the diagonal elements are
ki ¼ qðw i1
N
; ckÞ ¼ XNk¼1
c k wðk1Þð i1Þ
N
(21)
where w N is the primitive Nth root of unity and the function qðÞ is given by Definition 13 .
Proof. Consider the representation
C ¼ qðrN ; ckÞ (Cor. 5)
¼ qðEN XN EH
N
; ckÞ (Thm. 8)
¼ EN qðXN ; c kÞEH
N
(Thms. 2 and 6) where the last step follows directly from the proof of Theorem 2 and the polynomial term
qðXN ; c kÞ ¼ diag
i¼1;…;N
XNk¼1
c k wðk1Þð i1Þ
N
!
¼ diag
i¼1;…;N
ðqw i1
N
; ckÞÞ
follows from Corollary 16 and Definition 13. The desired result is obtained by multiplying from the left by EH
N
, multiplying from the right by EN, and invoking Theorem 6.
Theorem 9 shows that the Fourier matrix EN diagonalizes any N N circulant matrix. As discussed in Sec. 2.8, the columns
e1; e2; …; eN of EN are the eigenvectors of C. The scalars ki in Theorem 9 are the eigenvalues of C. Unlike the eigenvectors, they depend on the elements (i.e., generating elements) of C. In fact, Eq. (21) has the same form as the DFT of a discrete time series, which is clear by comparing it to Definition 20 of Sec. 2.7. In this case, c k ðk ¼ 1; 2; …; NÞ and kiði ¼ 1; 2; …; NÞ are analogous to a discrete signal and its DFT, and are related by
k1
k2
...
kN
26666643777775
¼ ffiffiffiffi
N
p ENc1
c2
...
cN
26666643777775
(22) which has the same form as the matrix–vector representation of the DFT defined by Eq. (27) of Sec. 2.7. Thus, the eigenvalues ki
can be calculated directly using Eq. (21) or Eq. (22), which are equivalent. If the circulant matrix in Theorem 9 is also symmetric, the eigenvalues are real-valued and certain ones are repeated, as shown in Corollary 17. C OROLLARY 17. If C 2 SC N is a symmetric circulant, Eq. (21) reduces to
ki ¼
c1 þ 2 XN=2
k¼2
c k cos 2pðk 1Þð i 1Þ
N
þ ð 1Þi1c Nþ22 ; N even
c1 þ 2 XðNþ1Þ=2
k¼2
c k cos 2pðk 1Þð i 1Þ
N
; N odd
8>>>>>>>>><>>>>>>>>>:
where the generating elements are given by Eq. (10) .
Proof. If N is even, the generating elements of C are given by
c1; c2; …; cN
2
; c Nþ22 ; c N
2
; …; c3; c2and Eq. (21) reduces to 13 ki ¼ XNk¼1
c k wðk1Þð i1Þ
N
¼ c1w0ð i1Þ
N
þ c2w1ð i1Þ
N
þ c3w2ð i1Þ
N
þ þ c N
2
w N
21
ð Þði1Þ
N
þ c Nþ22 w Nþ22 1ð Þði1Þ
N
þ c N
2
w Nþ42 1ð Þði1Þ
N
þ þ c3wðN11Þð i1Þ
N
þ c2wðN1Þð i1Þ
N
¼ c1 þ c2 wði1Þ
N
þ wðN1Þð i1Þ
N
þ c3 w2ði1Þ
N
þ wðN2Þð i1Þ
N
þ þ c N
2
wN22 ði1Þ
N
þ w NN22ð Þði1Þ
N
þ c Nþ22 wN
2ði1Þ
N
¼ c1 þ 2 XN=2
k¼2
c k cos 2pðk 1Þð i 1Þ
N
þ c Nþ22 ð 1Þi1where the identity
wkði1Þ
N
þ wðNkÞð i1Þ
N
¼ 2 cos 2pkN ði 1Þ
is employed. If N is odd, the generating elements of C are given by
c1; c2; …; c N12 ; c Nþ12 ; c Nþ12 ; c N12 ; …; c3; c2and Eq. (21) reduces similarly to the case for even N, which is left as an exercise for the reader.
The cosinusoidal nature of ki in Corollary 17 implies that k1 is distinct for a symmetric circulant matrix C 2 SC N , but the remaining elements ki ¼ kNþ2i appear in repeated pairs. How-ever, k Nþ2=2ð Þ is also distinct if N is even.
Example 15 . Let C ¼ circ ð4; 1; 0; 1Þ 2 SC 4 be a symmetric circulant matrix. Then the product
EH
4
CE 4 ¼ 1ffiffiffi
4
p
1 1 1 11 j 1 j
1 1 1 11 j 1 j
2666666437777775
4 1 0 1
1 4 1 00 1 4 1
1 0 1 4
2666666437777775
1ffiffiffi
4
p
1 1 1 11 j 1 j
1 1 1 11 j 1 j
2666666437777775
¼ 141 1 1 11 j 1 j
1 1 1 11 j 1 j
2666666437777775
2 4 6 42 4j 6 4j
2 4 6 42 4j 6 4j
2666666437777775
¼
2 0 0 00 4 0 00 0 6 00 0 0 4
2666666437777775
¼ diag ð2; 4; 6; 4Þ
is a diagonal matrix. The diagonal elements can be computed directly using Eq. (21) for N ¼ 4. For example,
k3 ¼ X4
k¼1
c k wðk1Þð 31Þ
4
¼ 4wð11Þð 31Þ
4
þ ð 1Þwð21Þð 31Þ
4
þ 0 wð31Þð 31Þ
4
þ ð 1Þwð41Þð 31Þ
4
¼ 4ð1Þ e j 2p
42
þ 0 e j 2p
46
¼ 4 e jp þ 0 e j3p
¼ 4 ð 1Þ þ 0 ð 1Þ ¼ 6which is recognized to be the third diagonal element of the matrix product EH
4
CE 4 . Because C is a symmetric circulant matrix, Corol-lary 17 can also be used. Observing that N ¼ 4 is even, it follows that
k3 ¼ c1 þ 2 X4=2
k¼2
c k cos 2pðk 1Þð 3 1Þ
4
þ ð 1Þ ð31Þc4þ22
¼ 4 þ 2 ð 1Þ cos 2pð2 1Þð 3 1Þ
4
þ ð 1Þ2 0
¼ 4 2 cos p þ 0
¼ 4 2ð 1Þ þ 0 ¼ 6as before. The eigenvalues and eigenvectors of C are discussed in Example 24 of Sec. 2.8.
Example 16 . Let C ¼ circ ð4; 1; 0; 1Þ 2 C4 be a nonsymmetric circulant matrix. Then the product
EH
4
CE 4 ¼ 1ffiffiffi
4
p
1 1 1 11 j 1 j
1 1 1 11 j 1 j
26666643777775
4 1 0 11 4 1 00 1 4 1
1 0 1 4
26666643777775
1ffiffiffi
4
p
1 1 1 11 j 1 j
1 1 1 11 j 1 j
26666643777775
¼ 141 1 1 11 j 1 j
1 1 1 11 j 1 j
26666643777775
4 4 2j 4 4 þ 2j
4 2 þ 4j 4 2 4j
4 4 þ 2j 4 4 2j
4 2 4j 4 2 þ 4j
26666643777775
¼
4 0 0 00 4 2j 0 00 0 4 00 0 0 4 þ 2j
26666643777775
is a diagonal matrix. The diagonal elements are the eigenvalues of C,which is stated explicitly for general C in the following corollary. They may be computed directly using Eq. (21), as it is done in Example 15, but Corollary 17 cannot be used because C is not symmetric.
The eigenvalue magnitudes of the nonsymmetric matrix C in Example 16 are observed to exhibit the same multiplicity (and symmetry) as the eigenvalues in Example 15 for a symmetric cir-culant. It is shown in Sec. 2.8.3 that the eigenvalues of any circu-lant matrix C 2 CN with real-valued generating elements exhibit 14 a certain symmetry about the so-called “Nyquist” component, which is analogous to the DFT of a real-valued sequence. This is because Eq. (22) represents the DFT of the generating elements
c1; c2; …; c N .C OROLLARY 18. Let ei be the ith column of the Fourier matrix
EN and C be a N N circulant matrix. Then for i ; k ¼ 1; 2; …; N,
eH
i
Ce k ¼ kidik where dik is the Kronecker delta and ki is defined by Eq. (21) for
C 2 CN or Corollary 17 if C 2 SC N .
Thus, the columns of the Fourier matrix are mutually orthogo-nal (Corollary 10) and orthogonal with respect to any circulant matrix (Corollary 18), not just the cyclic forward shift matrix and its integer powers (Corollary 15).
Example 17 . Consider the circulant C ¼ circ ð4; 1; 0; 1Þ
from Example 15. Then
eH
3
Ce 3 ¼ 1ffiffiffi
4
p 1 1 1 1½
4 1 0 1
1 4 1 00 1 4 1
1 0 1 4
2666437775
1ffiffiffi
4
p
1
11
1
2666437775
¼ 14 1 1 1 1½
6
66
6
2666437775
¼ 14 24 ¼ 6which is recognized to be the third diagonal element k3 of the ma-trix EH
4
CE 4 in Example 15. However, the scalar
eH
3
Ce 1 ¼ 1ffiffiffi
4
p 1 1 1 1½
4 1 0 1
1 4 1 00 1 4 1
1 0 1 4
26666643777775
1ffiffiffi
4
p
1111
26666643777775
¼ 14 1 1 1 1½
2222
26666643777775
¼ 14 0 ¼ 0vanishes, as expected, because i 6 ¼ k in Corollary 18 such that
dik ¼ 0.
2.5.5 Block Diagonalization of a Block Circulant. Theorem 9 is generalized to handle block circulants using the Fourier and identity matrices together with the Kronecker product. The choice of diagonalizing matrix EH
N
IM is discussed in Sec. 2.6, where generalizations of Theorem 10 are considered. T HEOREM 10 (Block Diagonalization of a Block Circulant). Let
C 2 BC M;N and denote its M M generating matrices by
C1; C2; …; CN . Then if EN is the N N Fourier matrix and IM is the identity matrix of dimension M,
ðEH
N
IM ÞCðEN IMÞ ¼
K1 0
K2
. ..
0 KN
266664377775
is a NM NM block diagonal matrix. For i ¼ 1; 2; …; N, the M M diagonal blocks are
Ki ¼ qðw i1
N
; CkÞ ¼ XNk¼1
Ck wðk1Þð i1Þ
N
(23)
where w N is the primitive Nth root of unity and the function qðÞ is given by Definition 13.
Proof. Consider the representation
C ¼ XNk¼1
rk1
N
Ck (Cor. 5)
¼ XNk¼1
ðEN Xk1
N
EH
N
Þ Ck (Cor. 14)
¼ XNk¼1
ðEN IMÞ Xk1
N
Ck
ðEH
N
IMÞ (Eq. 4)
¼ ð EN IMÞqðXN ; CkÞð EH
N
IMÞ (Def. 13) where
qðXN ; CkÞ ¼ diag
i¼1;…;N
XNk¼1
Ck wðk1Þð i1Þ
N
!
¼ diag
i¼1;…;N
ðqðw i1
N
; CkÞÞ
follows from Corollary 16 and Definition 13. The desired result follows by multiplying from the left by
ðEH
N
IM Þ ¼ ð EN IMÞH
multiplying from the right by ðEN IM Þ, and invoking Corollary 11.
Thus, the unitary matrix EN IM reduces any NM NM block circulant matrix with M M blocks to a block diagonal matrix with M M diagonal blocks.
Example 18 . Consider C ¼ circ ðA; B; 0; BÞ 2 BC 2;4 from Example 6. It can be block diagonalized via the transformation
ðEH
4
I2ÞCðE4 I2Þ. That is, 1ffiffiffi
4
p
1 0 1 0 1 0 1 00 1 0 1 0 1 0 11 0 j 0 1 0 j 00 1 0 j 0 1 0 j
1 0 1 0 1 0 1 00 1 0 1 0 1 0 11 0 j 0 1 0 j 00 1 0 j 0 1 0 j
377777777777777777775
C
266666666666666666664
1ffiffiffi
4
p
1 0 1 0 1 0 1 00 1 0 1 0 1 0 11 0 j 0 1 0 j 00 1 0 j 0 1 0 j
1 0 1 0 1 0 1 00 1 0 1 0 1 0 11 0 j 0 1 0 j 00 1 0 j 0 1 0 j
377777777777777777775266666666666666666664
¼ diag 0 1
1 0
" #
; 2 1
1 2
" #
; 4 1
1 4
" #
; 2 1
1 2
" #! 15 which is a block diagonal matrix with 2 2 diagonal blocks. The eigenvalues and eigenvectors of C are discussed in Example 25 of Sec. 2.8.
C OROLLARY 19. Let C 2 BC M;N have M M generating matri-ces C1; C2; …; CN and Ki be defined by Eq. (23). Then if each Ciis symmetric, it follows that Ki is symmetric for i ¼ 1; 2; …; N.
Proof. If each Ck is symmetric for k ¼ 1; 2; …; N, then so too are the matrices Ck wðk1Þð i1Þ
N
for each i because wðk1Þð i1Þ
N
is a scalar. Moreover, the sum and difference of two symmetric matri-ces is again symmetric. If follows that
Ki ¼ XNk¼1
Ck wðk1Þð i1Þ
N
is symmetric for i ¼ 1; 2; …; N.
C OROLLARY 20. Let C 2 BC M;N be a NM NM block circulant matrix. Then for i ; k ¼ 1; 2; …; N,
ðeH
i
IM ÞCðek IMÞ ¼ Kidik where Ki is defined by Eq. (23) .
Example 19 . Consider C ¼ circ ðA; B; 0; BÞ 2 BC 2;4 from Examples 6 and 18. Then
ðeH
3
I2ÞCðe3 I2Þ ¼ 1ffiffiffi
4
p 1 1 1 1½ 1 00 1
C
1ffiffiffi
4
p
1
11
1
2666437775
1 00 1
0BBB@1CCCA
¼ 4 1
1 4
is the third 2 2 block of the block diagonal matrix obtained in Example 18.
2.6 Generalizations. Let ðÞ denote an arbitrary operation that takes a square matrix as its argument and returns another square matrix with the same dimension. For example, the opera-tion could denote a matrix inverse such that ðÞ ¼ ðÞ 1 . Let ðÞ #
be another arbitrary matrix operation with the same restrictions (i.e., returns another square matrix with the same dimension). Then if C 2 BC M;N has generating matrices C1; C2; …; CN , it fol-lows that
ðA B#ÞCðA BÞ¼ ð A B#Þ XNk¼1
rk1
N
Ck
!
ðA BÞ (Cor. 5)
¼ XNk¼1
ðð A rk1
N
Þ ðB#CkÞÞð A BÞ (Eq. 4)
¼ XNk¼1
ðA rk1
N
AÞ ðB#CkBÞ (Eq. 4) for any matrices A 2 CNN and B 2 CMM . The importance of this result is that C can be decomposed into a summation of direct products of two separate equivalence transformations, one that operates on the cyclic forward shift matrix and the other on the generating matrices of C. This decomposition justifies the diago-nalizing matrix used in Sec. 2.5, motivates some generalizations of Theorem 10, and aids in proving orthogonality relationships for the cyclic eigenvalue problems described in Sec. 2.8. In light of Corollary 14, it is clear that the choice of A ¼ EN
and ðÞ ¼ ðÞ H accomplishes block diagonalization of a matrix
C 2 BC M;N . Then if B ¼ IM , the appropriate diagonalizing matrix to block decouple C without operating on its generating matrices
is EN IM (see Theorem 10). However, if B and ðÞ # are kept general, we have the following result. T HEOREM 11. Let C 2 BC M;N have M M generating matrices
C1; C2; …; CN and EN be the N N Fourier matrix. Then for an arbitrary matrix B 2 CMM and operator ðÞ #,
ðEH
N
B#ÞCðEN BÞ ¼
W1 0
W2
. ..
0 WN
2666437775
is a block diagonal matrix, where
Wi ¼ qðw i1
N
; B#CkBÞ ¼ XNk¼1
B#CkBwðk1Þð i1Þ
N
(24)
is the ith M M diagonal block for i ¼ 1; 2; …; N.
C OROLLARY 21. Let C 2 BC M;N be a NM NM block circulant matrix, B 2 CMM be an arbitrary square matrix, and ðÞ # denote an arbitrary operation that takes a square matrix as its argument and returns another square matrix with the same dimension. Then for i ; k ¼ 1; 2; …; N,
ðeH
i
B#ÞCðek BÞ ¼ Widik where Wi is defined by Eq. (24) .
Theorem 11 is useful if there exists an equivalence transforma-tion B#CkB that simplifies each of the generating matrices. For example, if each Ck is a circulant of type M, then the additional choice of B ¼ EM and ðÞ # ¼ ðÞ H fully diagonalizes a block cir-culant matrix C 2 BC N;M with circulant blocks. C OROLLARY 22. Let C 2 BC M;N have generating matrices
C1; C2; …; CN 2 CM and denote the generating elements of each
Ci by c ð1Þ
i
; cð2Þ
i
; …; cðMÞ
i
. Then
ðEH
N
EH
M
ÞCðEN EM Þ ¼ diag
i¼1;…;N
kð1Þ
i
0
kð2Þ
i
. ..
0 kðMÞ
i
2666666437777775
is a NM NM diagonal matrix, where
kðpÞ
i
¼ XNk¼1
XMl¼1
cðlÞ
k
wðl1Þð p1Þ
M
wðk1Þð i1Þ
N
(25)
is the pth diagonal element of the ith M M block for i ¼ 1; 2; …; N and p ¼ 1; 2; …; M.
Corollary 22 shows that the NM -dimensional eigenvectors qðpÞ
i
of C are the columns of EN EM . This is in contrast to rotation-ally periodic structures, where q is partitioned into N M -vectors corresponding to each sector and decomposed into a set of N
reduced-order eigenvalue problems described in Sec. 2.8.
Example 20 . Consider C ¼ circ ðA; B; 0; BÞ 2 BC 2;4 from Examples 6, 18, and 19. Because each of its generating matrices is a circulant, that is, ðA; B; 0Þ 2 C2 , the block circulant C is diagon-alized via the transformation 16 ðEH
4
EH
2
ÞCðE4 E2Þ ¼ 1ffiffiffi
4
p
1 1 1 11 j 1 j
1 1 1 11 j 1 j
26666643777775
1 11 j
" #0BBBBB@1CCCCCA
C
1ffiffiffi
4
p
1 1 1 11 j 1 j
1 1 1 11 j 1 j
26666643777775
1 11 j
" #0BBBBB@1CCCCCA
¼1 0 0 0 0 0 0 00 1 0 0 0 0 0 00 0 1 0 0 0 0 00 0 0 3 0 0 0 00 0 0 0 3 0 0 00 0 0 0 0 5 0 00 0 0 0 0 0 1 00 0 0 0 0 0 0 3
37777777777777777752666666666666666664
from which is follows that aðCÞ ¼ f 1; 1; 1; 3; 3; 5; 1; 3g. Observ-ing that
cð1Þ
1
¼ 2; cð1Þ
2
¼ 1; cð1Þ
3
¼ 0; cð1Þ
4
¼ 1
cð2Þ
1
¼ 1; cð2Þ
2
¼ 0; cð2Þ
3
¼ 0; cð2Þ
4
¼ 0
9=;
are the generating elements of C, the NM ¼ 4 2 ¼ 8 diagonal elements can be calculated directly using Eq. (25). For example, the second diagonal element ( p ¼ 2) of the third 4 4 diagonal block ( i ¼ 3) is given by
kð2Þ
3
¼ cð1Þ
1
wð11Þð 21Þ
2
wð11Þð 31Þ
4
þ cð2Þ
1
wð21Þð 21Þ
2
wð11Þð 31Þ
4
þ cð1Þ
2
wð11Þð 21Þ
2
wð21Þð 31Þ
4
þ cð2Þ
2
wð21Þð 21Þ
2
wð21Þð 31Þ
4
þ cð1Þ
3
wð11Þð 21Þ
2
wð31Þð 31Þ
4
þ cð2Þ
3
wð21Þð 21Þ
2
wð31Þð 31Þ
4
þ cð1Þ
4
wð11Þð 21Þ
2
wð41Þð 31Þ
4
þ cð2Þ
4
wð21Þð 21Þ
2
wð41Þð 31Þ
4
¼ ð 2Þð 1Þð 1Þ þ ð 1Þð 1Þð 1Þþ ð 1Þð 1Þð 1Þ þ ð 0Þð 1Þð 1Þþ ð 0Þð 1Þð 1Þ þ ð 0Þð 1Þð 1Þþ ð 1Þð 1Þð 1Þ þ ð 0Þð 1Þð 1Þ¼ 5The reader can compare this matrix decomposition to the results in Example 25 of Sec. 2.8.1. Finally, the eigenvectors qðpÞ
i
are the columns of E4 E2 and are stated explicitly in Example 25.
2.7 Relationship to the Discrete Fourier Transform.
Before turning to the circulant eigenvalue problem, we consider a somewhat tangential but relevant subject on the DFT and its inverse, which are central to the analysis of experimental data in a wide range of fields, including mechanical vibrations. In this detour we show that computation of the DFT is, in fact, a multipli-cation of an N-vector of discrete signal samples by the Fourier matrix and a constant c f. The IDFT is similarly defined using the Hermitian of the Fourier matrix and a constant ci, where
c f c i ¼ 1=N. More importantly, it is shown that the DFT computation is exactly analogous to the determination of the eigenvalues of a circulant matrix given its generating elements. We begin by defining the DFT sinusoids, which provide a conven-ient means of representing the DFT of a discretized signal, and then develop the relationships of interest for the DFT and the IDFT. We present only the basic results as they relate to the theory and mathematics of circulants. The reader can find a vast literature on related topics [89–91,102–110]. DEFINITION 19 (DFT Sinusoids). Let w kN denote the distinct Nth roots of unity, where w N ¼ e j 2p
N
is the primitive root. Then the DFT sinusoids are SkðrÞ ¼ ð w kN Þr ¼ wkr N ¼ e j 2p
Nkr
for k ; r ¼ 0; 1; …; N 1.
C OROLLARY 23. The DFT sinusoids are orthogonal .
Proof. Consider the DFT sinusoids
SiðrÞ ¼ e j 2p
Nir
SkðrÞ ¼ e j 2p
Nkr
)
; i; k; r ¼ 0; 1; …; N 1The inner product of Si(r) and Sk(r) is given by
hSiðrÞ; SkðrÞi ¼ XN1
r¼0
SiðrÞS kðrÞ¼ XN1
r¼0
wir N w kr N (Def. 19)
¼ XN1
r¼0
w ir N wkr N (Cor. 7)
¼ XN1
r¼0
w rðikÞ
N
¼ N; i ¼ k
0; otherwise
(
(Lem. 2) which shows that the DFT sinusoids are orthogonal.
The Fourier matrix in Definition 17 can be written element wise as
ðEN Þik ¼ 1ffiffiffiffi
N
p wðk1Þð i1Þ
N
¼ 1ffiffiffiffi
N
p e j 2p
Nðk1Þð i1Þ
¼ 1ffiffiffiffi
N
p Si1ðk 1Þ ¼ 1ffiffiffiffi
N
p Sk1ði 1Þ
for each i; k ¼ 1; 2; …; N. It follows that
EN ¼ 1ffiffiffiffi
N
p
S0ð0Þ S0ð1Þ … S0ðN 1Þ
S1ð0Þ S1ð1Þ … S1ðN 1Þ
S2ð0Þ S2ð1Þ … S2ðN 1Þ
... ... . .. ...
SN1ð0Þ SN1ð1Þ … S N1ðN 1Þ
2666666666437777777775
¼ 1ffiffiffiffi
N
p WN (26) is a representation of the Fourier matrix in terms of the DFT sinu-soids, where WN is the DFT sinusoid matrix. The DFT is formally 17 defined next and subsequently reformulated in terms of a matrix multiplication involving WN.D EFINITION 20 (DFT). Let x(i) denote a finite sequence with indi-ces i ¼ 1; 2; …; N. Then for k ¼ 1; 2; …; N, the DFT of x(i) is the sequence XðkÞ ¼ XNi¼1
xðiÞe j 2p
Nði1Þð k1Þ
¼ XNi¼1
xðiÞwði1Þð k1Þ
N
¼ XNi¼1
xðiÞSi1ðk 1Þ
where w N is the primitive Nth root of unity and S iðkÞ ¼ w ik N is a DFT sinusoid .
The DFT preserves the units of x(i). That is, if x(i) has engineer-ing units EU , then the units of X(k) are also EU . This is clear from Definition 20, where the exponential function is dimensionless. Expanding each X(k) in Definition 20 yields
Xð1Þ ¼ xð1ÞS0ð0Þ þ þ xðNÞS0ðN 1Þ
Xð2Þ ¼ xð1ÞS1ð0Þ þ þ xðNÞS1ðN 1Þ
...
XðkÞ ¼ xð1ÞSi1ð0Þ þ þ xðNÞSi1ðN 1Þ
...
XðNÞ ¼ xð1ÞSN1ð0Þ þ þ xðNÞS N1ðN 1Þ
9>>>>>>>>>>>>=>>>>>>>>>>>>;
If the discrete samples x(i) and corresponding sequence of DFTs
X(k) are assembled into the configuration vectors
xN ¼ ð xð1Þ; xð2Þ; …; xðNÞÞ T
XN ¼ ð Xð1Þ; Xð2Þ; …; XðNÞÞ T
)
then the DFT of xN can be represented in the matrix–vector form
XN ¼ WN xN (27) where WN ¼ ffiffiffiffi
N
p EN follows from Eq. (26). Thus, the DFT com-putation is simply a multiplication of the configuration vector xN
with the DFT sinusoid matrix WN and constant c f ¼ 1. Equation (27) has exactly the same form as Eq. (22), where the generating elements of a circulant matrix are analogous to the sequence of signals x(i) and the resulting eigenvalues are analogous to the sequence of DFTs X(k).
Example 21 . Consider the configuration vector of samples
x4 ¼ ð 0; 1; 2; 3ÞT . The DFT of x4 follows from Eq. (27) with
N ¼ 4 and is given by
X4 ¼ W4x4
¼
S0ð0Þ S0ð1Þ S0ð2Þ S0ð3Þ
S1ð0Þ S1ð1Þ S1ð2Þ S1ð3Þ
S2ð0Þ S2ð1Þ S2ð2Þ S2ð3Þ
S3ð0Þ S3ð1Þ S3ð2Þ S3ð3Þ
266664377775
xð1Þ
xð2Þ
xð3Þ
xð4Þ
266664377775
¼
1 1 1 11 j 1 j
1 1 1 11 j 1 j
266664377775
0123
266664377775
¼ ð 6; 2 þ 2j; 2; 2 2jÞTwhere W4 ¼ ffiffiffi
4
p E4 follows from Example 9 or by elementwise direct computation according to Definition 19. Alternatively, each element X(k) of X4 can be computed using the summation given in Definition 20. If k ¼ 3, for example,
Xð3Þ ¼ X4
i¼1
xðiÞe j 2p
4ði1Þð 31Þ
¼ X4
i¼1
xðiÞe jpði1Þ¼ xð1Þejp0 þ xð2Þejp1 þ xð3Þejp2 þ xð4Þejp3
¼ ð 0Þð 1Þ þ ð 1Þð 1Þ þ ð 2Þð 1Þ þ ð 3Þð 1Þ¼ 0 1 þ 2 3
¼ 2which is the third element of X4 , as expected. Results for k ¼ 1, 2, 4 follow similarly.
If XN is known, the N-vector xN is recovered from Eq. (27) by multiplying from the left by EH
N
and invoking Theorem 6. Then
EH
N
XN ¼ EH
N
WN xN (Eq. 27)
¼ EH
N
ffiffiffiffi
N
p EN
xN (Eq. 26)
¼ ffiffiffiffi
N
p EH
N
EN xN
¼ ffiffiffiffi
N
p IN xN (Thm. 6)
¼ ffiffiffiffi
N
p xN
and it follows that
xN ¼ 1ffiffiffiffi
N
p EH
N
XN ¼ 1
N WH
N
XN (28) is a matrix–vector representation of the IDFT of XN. That is, the IDFT computation is simply a matrix multiplication of XN with the Hermitian of WN and constant c i ¼ 1=N such that cf c i ¼ 1=N.In light of Corollary 7, Eq. (28) can be written as
xð1Þ
xð2Þ
...
xðNÞ
2666666437777775
¼ 1
NS0ð0Þ S0ð1Þ … S0ðN 1Þ
S1ð0Þ S1ð1Þ … S1ðN 1Þ
... ... . .. ...
SN1ð0Þ SN1ð1Þ … S N1ðN 1Þ
266666664377777775
Xð1Þ
Xð2Þ
...
XðNÞ
2666666437777775
Expanding each row yields
xð1Þ ¼ 1
N ðXð1ÞS0ð0Þ þ þ XðNÞS0ðN 1ÞÞ
xð2Þ ¼ 1
N ðXð1ÞS1ð0Þ þ þ XðNÞS1ðN 1ÞÞ
...
xðiÞ ¼ 1
N ðXð1ÞSk1ð0Þ þ þ XðNÞSk1ðN 1ÞÞ
...
xðNÞ ¼ 1
N ðXð1ÞSN1ð0Þ þ þ XðNÞS N1ðN 1ÞÞ
9>>>>>>>>>>>>>>>>>>=>>>>>>>>>>>>>>>>>>;
which provides an alternative representation of the IDFT. 18 D EFINITION 21 (IDFT). Let the sequence X(k) be defined accord-ing to Definition 20. Then for each i ¼ 1; 2; …; N, the IDFT of X(k) is the sequence xðiÞ ¼ 1
N
XNk¼1
XðkÞSk1ði 1Þ¼ 1
N
XNk¼1
XðkÞwð i1Þð k1Þ
N
¼ 1
N
XNk¼1
XðkÞej 2p
Nði1Þð k1Þ
where w N is the primitive Nth root of unity and S iðkÞ ¼ w ik N is a DFT sinusoid .
The IDFT preserves the units of X(k). If X(k) has engineering units EU , then the units of x(i) are also EU . This is clear from Def-inition 21, where the exponential function is dimensionless, as is the number N.
Example 22 . Reconsider Example 21, where it is shown that the DFT of x4 ¼ ð 0; 1; 2; 3ÞT is the four-vector X4 ¼ ð 6; 2 þ 2j;
2; 2 2jÞT . The IDFT of X4 follows from Eq. (28) with N ¼ 4and is given by
x4 ¼ 1
N WH
4
X4
¼ 1
NS0ð0Þ S0ð1Þ S0ð2Þ S0ð3Þ
S1ð0Þ S1ð1Þ S1ð2Þ S1ð3Þ
S2ð0Þ S2ð1Þ S2ð2Þ S2ð3Þ
S3ð0Þ S3ð1Þ S3ð2Þ S3ð3Þ
2666666437777775
Xð1Þ
Xð2Þ
Xð3Þ
Xð4Þ
2666666437777775
¼ 141 1 1 11 j 1 j
1 1 1 11 j 1 j
2666666437777775
6
2 þ 2j
2
2 2j
2666666437777775
¼ 14 ð0; 4; 8; 12 ÞT
¼ ð 0; 1; 2; 3ÞTwhich is the same four-vector from Example 21. Alternatively, each element x(i) of x4 can be computed using the summation given in Definition 21. If i ¼ 3, for example,
xð3Þ ¼ 14
X4
k¼1
XðkÞej 2p
4ð31Þð k1Þ
¼ 14 Xð1Þejp0 þ Xð2Þejp1 þ Xð3Þejp2 þ Xð4Þejp3
¼ 14 ð6Þð 1Þ þ ð 2 2jÞð 1Þ þ ð 2Þð 1Þ þ ð 2 þ 2jÞð 1Þð Þ¼ 2which is the third element of x4 , as expected. Results for k ¼ 1, 2, 4 follow similarly.
There are other suitable definitions of the DFT/IDFT pair. For example, the signs of the exponents are irrelevant as long as they are opposite in the DFT and IDFT. To see this, suppose that the sign of the exponential in Definition 20 is negative instead of positive. Then each entry S k(r) in WN is replaced with SkðrÞ to produce WN (see Corollary 7), and the DFT is instead given by
XN ¼ WN xN (29) The corresponding IDFT takes the form
xN ¼ 1
N WH
N
XN (30) which follows in the same way as Eq. (28) by replacing EN with
EN and invoking Corollary 9. Similarly, the multiplicative con-stants that define the DFT/IDFT pair are arbitrary as long as the product of the constants is equal to 1/ N. This is important for applications involving a transformation of data to the frequency domain for analysis and then back to the time domain for results. However, the multiplicative constant is irrelevant if the analysis goal is only to identify periodicities in a data set (e.g., frequencies that correspond to amplification of a structural response). Thus, Definitions 20 and 21 form a representation of the DFT/ IDFT pair, where Eqs. (27) and (28) are the corresponding matrix–vector forms. The DFT and IDFT pair can be written in the general form
XðkÞ ¼ cf
XNi¼1
xðiÞe6j 2p
Nði1Þð k1Þ
(31 a)
xðiÞ ¼ c i
XNk¼1
XðkÞe j 2p
Nði1Þð k1Þ
(31 b)where c i and c f are such that cf c i ¼ 1=N but are otherwise arbi-trary. Common choices are fcf ; cig ¼ f 1= ffiffiffiffi
N
p ; 1= ffiffiffiffi
N
p g or
fcf ; cig ¼ f 1; 1=Ng, where the multiplicative constants in the matrix–vector formulation (i.e., Eqs. (27) and (28) or Eqs. (29) and (30)) are adjusted accordingly. If the generally complex sequences x(i) and X(k) are dissected into their real and imaginary parts, the DFT/IDFT pair is repre-sented by
xðiÞ ¼ xRðiÞ þ jx I ðiÞ (32 a)
XðkÞ ¼ XRðkÞ þ jX I ðkÞ (32 b)where the subscripts R and I denote the real and imaginary parts and each sequence pair ðxRðiÞ; x I ðiÞÞ and ðX RðkÞ; XI ðkÞÞ is real for
i; k ¼ 1; 2; …; N. An alternative representation of the DFT and IDFT is obtained by substituting Eq. (32) in Definition 20, writing the complex exponential in terms of sines and cosines, and col-lecting the real and imaginary terms. The result is
XRðkÞ ¼ XNi¼1
x RðiÞ cos 2pði 1Þð k 1Þ
N
x I ðiÞ sin 2pði 1Þð k 1Þ
N
(33 a)
X I ðkÞ ¼ XNi¼1
x RðiÞ sin 2pði 1Þð k 1Þ
N
þ x I ðiÞ cos 2pði 1Þð k 1Þ
N
(33 b)which together form the DFT of x(i) according to Eq. (32 b). A similar relationship for the IDFT is obtained by substituting Eq. (32) into Definition 21 and collecting the real and imaginary terms. Then 19 x RðiÞ ¼ þ 1
N
XNi¼1
X RðkÞ cos 2pði 1Þð k 1Þ
N
þ X I ðkÞ sin 2pði 1Þð k 1Þ
N
(34 a)
x I ðiÞ ¼ 1
N
XNi¼1
X RðkÞ sin 2pði 1Þð k 1Þ
N
XI ðkÞ cos 2pði 1Þð k 1Þ
N
(34 b)together form the IDFT of X(k) according to Eq. (32 a). The DFT/ IDFT pair defined by Eqs. (32)–(34) are equivalent to Definitions 20 and 21.
Example 23 . Reconsider Example 21, where it is shown that the DFT of x4 ¼ ð 0; 1; 2; 3ÞT is the four-vector X4 ¼ ð 6; 2 2j;
2; 2 þ 2jÞT . Because x4 is real, Eq. (33) can be used to com-pute each XðkÞ ¼ X RðkÞ þ jX I ðkÞ for k ¼ 1, 2, 3, 4. If k ¼ 2, for example, the real and imaginary DFT components are given by
XRð2Þ ¼ X4
i¼1
x RðiÞ cos 2pði 1Þð 2 1Þ
4
¼ 0 cos 2pð1 1Þð 1Þ
4
þ 1 cos 2pð2 1Þð 1Þ
4
þ 2 cos 2pð3 1Þð 1Þ
4
þ 3 cos 2pð4 1Þð 1Þ
4
¼ 0 cos 0p
2
þ 1 cos 1p
2
þ 2 cos 2p
2
þ 3 cos 3p
2
¼ ð 0Þð 1Þ þ ð 1Þð 0Þ þ ð 2Þð 1Þ þ ð 3Þð 0Þ¼ 2
XI ð2Þ ¼ X4
i¼1
x RðiÞ sin 2pði 1Þð 2 1Þ
4
¼ 0 sin 0p
2
þ 1 sin 1p
2
þ 2 sin 2p
2
þ 3 sin 3p
2
¼ ð 0Þð 0Þ þ ð 1Þð 1Þ þ ð 2Þð 0Þ þ ð 3Þð 1Þ¼ 2such that Xð2Þ ¼ 2 2j, as expected. Results for k ¼ 1, 3, 4 fol-low similarly.
2.8 The Circulant Eigenvalue Problem. The eigenvalues and eigenvectors of circulants and block circulants with circulant blocks have thus far been inferred from Theorem 9 (circulant matrix) and Corollary 22 (block circulant matrix with circulant blocks), where these matrices are fully diagonalized. Determination of the eigenvalues and eigenvectors of a block circulant matrix with gener-ally noncirculant and nonsymmetric blocks is systematically described here, which reinforces the results already obtained for the special cases of C 2 CN and C 2 BC M;N with circulant generating matrices. The standard cEVP is discussed in Sec. 2.8.1, where an eigensolution is obtained for a general matrix C 2 BC M;N . Section 2.8.2 generalizes these results to handle ( M,K) systems with system matrices contained in BC M;N , which arise naturally in vibration stud-ies of rotationally periodic structures. The structure of the eigenval-ues and eigenvectors is discussed in Sec. 2.8.3, which builds upon the relationship to the DFT described in Sec. 2.7. Section 2.8.4 intro-duces fundamental orthogonality conditions for the special case of block circulants with symmetric generating matrices.
2.8.1 Standard Circulant Eigenvalue Problem. Consider the block circulant matrix C 2 BC M;N with arbitrary generating mat-rices C1; C2; …; CN . The standard cEVP involves determination of the scalar eigenvalues k and NM 1 eigenvectors q of C such that
0NM ¼ C kINM ð Þq (35) where 0NM is a NM 1 vector of zeros and INM is the identity ma-trix of dimension NM . The problem can be simplified consider-ably by exploiting the block circulant nature of C. To this end, partition q ¼ q1; q2; …; qNð ÞT into M 1 vectors qi ði ¼ 1; …; NÞ
and introduce the change of coordinates
q ¼ ð EN IMÞu (36) where IM is the M M identity matrix (same dimension as the gener-ating matrices of C) and u ¼ u1; u2; …; uNð ÞT is composed of N M -vectors ui. Substituting Eq. (36) into Eq. (35) and multiplying from the left by the unitary matrix ðEN IM ÞH ¼ ð EH
N
IM Þ yields
0NM ¼ ð EH
N
IM Þ C kINM ð Þð EN IM Þu
¼ ðEH
N
IM ÞCðEN IM Þ
kðEH
N
IMÞINM ðEN IM Þu
¼
K1 0
K2
. ..
0 KN
2666666437777775
k
IM 0IM
. ..
0 IM
26666664377777750BBBBBB@1CCCCCCA
u1
u2
...
uN
2666666437777775
which follows from Theorem 10, and from
ðEH
N
IM ÞINM ðEN IMÞ ¼ ð EN IM ÞH ðEN IM Þ¼ INM
¼ diag ðIM; IM; …; IMÞ
|fflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflffl}
Nterms
in light of Corollary 11. Thus, the single eigenvalue problem defined by Eq. (35) is decomposed into the N reduced-order stand-ard EVPs
0M ¼ Ki kIMð Þui; i ¼ 1; 2; …; N (37) where 0M is a M 1 vector of zeros and each Ki is defined by Eq. (23) in terms of the generating matrices of C. Because the transforma-tion defined by Eq. (36) is unitary, it preserves the eigenvalues of C.Thus, the NM eigenvalues of C are the eigenvalues of the N M M
matrices Ki, which follow from the characteristic polynomials det ðKi kIM Þ ¼ 0; i ¼ 1; 2; …; N (38) If k ¼ kðpÞ
i
denotes the pth eigenvalue of the ith matrix Ki for
p ¼ 1; 2; …; M, then the attendant M 1 eigenvector uðpÞ
i
is obtained from Eq. (37). The corresponding NM 1 eigenvector of
C follows from Eq. (36) and is given by
qðpÞ
i
¼ ð EN IM Þ 0M; …; uðpÞ
i
; …; 0M
T
¼ e1; …; ei; …; eNð Þ IMð Þ 0M ; …; uðpÞ
i
; …; 0M
T
¼ e1 IM; …; ei IM; …eN IMð Þ 0M; …; uðpÞ
i
; …; 0M
T
¼ ð ei IM ÞuðpÞ
i
¼ ei uðpÞ
i
(39) 20 for i ¼ 1; 2; …; N and p ¼ 1; 2; …; M. If the scalars aðpÞ
i
are such that each
~uðpÞ
i
¼ aðpÞ
i
uðpÞ
i
(40) is orthonormal with respect to Ki, then the corresponding ortho-normal eigenvectors of C are given by
~qðpÞ
i
¼ ei ~uðpÞ
i
¼ ei aðpÞ
i
uðpÞ
i
¼ aðpÞ
i
ei uðpÞ
i
¼ aðpÞ
i
qðpÞ
i
(41) for i ¼ 1; 2; …; N and p ¼ 1; 2; …; M.If C is an ordinary (not block) circulant with M ¼ 1, Eq. (41) reduces to
~qð1Þ
i
¼ qð1Þ
i
¼ ei 1 ¼ ei; ðM ¼ 1Þ (42) which confirms that all circulants contained in CN share the same
N 1 eigenvectors e1; e2; …; eN , and each ei is orthonormal with respect to C. The eigenvalues of a matrix C 2 CN with generating elements c1; c2; …; cN are given by Eq. (21), or equivalently by Eq. (22). If C 2 SC N , the eigenvalues follow from Corollary 17.
Example 24 . Consider C ¼ circ ð4; 1; 0; 1Þ 2 C4 from Examples 15 and 17, where it is shown that
EH
4
CE 4 ¼ diag ð2; 4; 6; 4Þ
Thus, the eigenvalues of C are 2, 4, 6, and 4. Because N ¼ 4 is even, k1 ¼ 2 and kðNþ2Þ=2 ¼ k3 ¼ 6 are distinct and k2 ¼ k4 ¼ 4are repeated. The reason for this eigenvalue symmetry is dis-cussed in Sec. 2.8.3. The eigenvalues can be verified using
ki ¼ 4 2 cos p
2 ði 1Þ; i ¼ 1; 2; 3; 4which follows from Corollary 17 for the case of even N because C
is also contained in SC 4 . Because C is an ordinary circulant, its orthonormal eigenvectors are simply the columns of the Fourier matrix E4 , and are given by Definition 18 according to Eq. (42). For example,
e2 ¼ 1ffiffiffi
4
p 1; w14; w24; w34
T
¼ 12 1; e j 2p
41
; e j 2p
42
; e j 2p
43
T
¼ 12 1; e j p
2
; e j p; e j 3p
2
T
¼ 12 ð1; j; 1; jÞTwhich can be visualized in Fig. 2 for the case of N ¼ 4. The com-plete set of eigenvectors is given by
e1 ¼ 121111
266664377775; e2 ¼ 121
j
1
j
266664377775; e3 ¼ 121
11
1
266664377775; e4 ¼ 121
j
1
j
266664377775
The eigenvectors e1 and e3 are real and correspond to the distinct eigenvalues k1 ¼ 2 and k3 ¼ 6. The eigenvectors e2 and e4 are complex conjugates according to Eq. (17) and correspond to the repeated eigenvalue k2 ¼ k4 ¼ 4. Example 29 of Sec. 2.8.4 dis-cusses orthogonality of the orthonormal eigenvectors 1=2ð Þei with respect to the matrix C.
The same basic results also hold for the nonsymmetric circulant
C ¼ circ ð4; 1; 0; 1Þ 2 C4 in Example 16, where it is shown that
EH
4
CE 4 ¼ diag ð4; 4 2j; 4; 4 þ 2jÞ. In this case, the eigenvalues are given by
aðCÞ ¼ f 4; 4 2j; 4; 4 þ 2jg
and the corresponding eigenvectors are the same as those in Example 24 because all circulants contained in CN share the same linearly independent eigenvectors.
Example 25 . Consider C ¼ circ ðA; B; 0; BÞ 2 BC 2;4 from Examples 6, 18, 19, and 20, where it is shown that
ðEH
4
I2ÞCðE4 I2Þ¼ diag 0 1
1 0
" #
; 2 1
1 2
" #
; 4 1
1 4
" #
; 2 1
1 2
" #!
diag ðK1; K2; K3; K4Þ
The eigenvalues of C are obtained from the reduced-order matri-ces Ki ði ¼ 1; 2; 3; 4Þ. For example, the eigenvalues of K3 follow from the characteristic polynomial det ðK3 kI2Þ ¼
4 1
1 4
" #
k
1 00 1
" #
¼ k2 8k þ 15
¼ ð k 3Þð k 5Þ ¼ 0and are given by aðK3Þ ¼ f 3; 5g. Similarly, aðK1Þ ¼ f 1; 1g and
aðK2Þ ¼ aðK4Þ ¼ f 1; 3g. Because N ¼ 4 is even, aðK1Þ and aðK3Þ
are distinct sets of eigenvalues and aðK2Þ ¼ aðK4Þ are repeated sets. Section 2.8.3 discusses the symmetry characteristics and multiplicities of these groups of eigenvalues. The eigenvectors of
C follow from the eigenvectors of each Ki according to Eq. (39). For example, for the eigenvector uð1Þ
3
¼ ð 1; 1ÞT of K3 with eigen-value kð1Þ
3
¼ 3, the corresponding eigenvector of C is
qð1Þ
3
¼ e3 uð1Þ
3
¼ 1ffiffiffiffi
N
p ð1; w24; w44; w64ÞT 11
" #
¼ 1ffiffiffi
4
p ð1; 1; 1; 1ÞT 11
" #
¼ 1211
" #
; 1
1
" #
; 11
" #
; 1
1
" #! T
¼ 12 ð1; 1; 1; 1; 1; 1; 1; 1ÞTThe entire set of NM ¼ 8 reduced-order eigenvectors and eigen-values is given by
uð1Þ
1
¼ ð 1; 1ÞT; kð1Þ
1
¼ 1
uð2Þ
1
¼ ð 1; 1ÞT; kð2Þ
1
¼ 1
uð1Þ
2
¼ ð 1; 1ÞT; kð1Þ
2
¼ 1
uð2Þ
2
¼ ð 1; 1ÞT; kð2Þ
2
¼ 3
uð1Þ
3
¼ ð 1; 1ÞT; kð1Þ
3
¼ 3
uð2Þ
3
¼ ð 1; 1ÞT; kð2Þ
3
¼ 5
uð1Þ
4
¼ ð 1; 1ÞT; kð1Þ
4
¼ 1
uð2Þ
4
¼ ð 1; 1ÞT; kð2Þ
4
¼ 3
9>>>>>>>>>>>>>>>>>>>=>>>>>>>>>>>>>>>>>>>;21 where each pair satisfies Eq. (37). The corresponding eigenvectors of C are
qð1Þ
1
¼ 12 ð1; 1; 1; 1; 1; 1; 1; 1ÞT
qð2Þ
1
¼ 12 ð 1; 1; 1; 1; 1; 1; 1; 1ÞT
qð1Þ
2
¼ 12 ð 1; 1; j; j; 1; 1; j; jÞT
qð2Þ
2
¼ 12 ð 1; 1; j; j; 1; 1; j; jÞT
qð1Þ
3
¼ 12 ð 1; 1; 1; 1; 1; 1; 1; 1ÞT
qð2Þ
3
¼ 12 ð 1; 1; 1; 1; 1; 1; 1; 1ÞT
qð1Þ
4
¼ 12 ð 1; 1; j; j; 1; 1; j; jÞT
qð2Þ
4
¼ 12 ð 1; 1; j; j; 1; 1; j; jÞT
9>>>>>>>>>>>>>>>>>>>>>>>>>>>>>=>>>>>>>>>>>>>>>>>>>>>>>>>>>>>;
The eigenvectors are made orthonormal according to Eqs. (40) and (41) by setting each aðpÞ
i
¼ 1= ffiffiffi
2
p for i ¼ 1; 2; …; N and
p ¼ 1; 2; …; M. Orthogonality of the eigenvectors ~qðpÞ
i
with respect to C is discussed in Example 30 of Sec. 2.8.4.
The determinant of any matrix is the product of its eigenvalues, which yields the following result. C OROLLARY 24. Let C 2 BC M;N be a block circulant matrix. Then the determinant of C is given by
det C ¼ YNM i¼1
kiwhere ki is the ith eigenvalue of C.
The determinant of C 2 CN follows from Corollary 24 by set-ting M ¼ 1. In light of Eq. (21), det C ¼ YNi¼1
XNk¼1
c k wðk1Þð i1Þ
N
ðC 2 CN Þ (43) for an ordinary circulant matrix with generating elements
c1; c2; …; c N . For the special case of C 2 SC N , the ith eigenvalue
ki in Corollary 24 can be replaced by the result given in Corollary 17. Similarly, ki can be replaced with Eq. (25) if C 2 BC M;N has circulant generating matrices.
Example 26 . Consider C ¼ circ ðA; B; 0; BÞ 2 BC 2;4 from Example 25, where it is shown that the eigenvalues are given by the set aðCÞ ¼ f 1; 1; 1; 3; 3; 5; 1; 3g. The determinant of C fol-lows from Corollary (24) and is given by det C ¼ 1 1 1 3 3 5 1 3 ¼ 135 which is simply the product of the eigenvalues of C.
2.8.2 Generalized Circulant Eigenvalue Problem. The gener-alized cEVP involves determination of the scalar eigenvalues k
and NM 1 eigenvectors q of a cyclic system ( M,K) such that
0NM ¼ K kMð Þq (44) where
M ¼ circ ðM1; M2; …; MN Þ
K ¼ circ ðK1; K2; …; KN Þ
)
are block circulant matrices contained in BC M;N . This type of problem arises in the study of cyclic vibratory mechanical systems composed of N sectors with M DOFs per sector, where M and K
are NM NM block circulant mass and stiffness matrices. Several examples are discussed in Sec. 3, where the eigenvectors q are the system mode shapes and the eigenvalues k correspond to the sys-tem natural frequencies. The generalized cEVP defined by Eq. (44) is handled in the same way as the standard cEVP of Sec. 2.8.1. To this end, partition q ¼ q1; q2; …; qNð ÞT into M 1 vec-tors qi ði ¼ 1; 2; …; NÞ, transform to a new set of coordinates
u ¼ u1; u2; …; uNð ÞT by substituting Eq. (36) into Eq. (44), and left-multiply the result by the unitary matrix EH
N
IM. It follows that
0NM ¼ ð EH
N
IMÞ K kMð Þð EN IM Þu
¼ ðEH
N
IMÞKðEN IMÞ
kðEH
N
IM ÞMðEN IM Þu
¼
eK1 0
eK2
. ..
0 eKN
266664377775 k
eM1 0
eM2
. ..
0 eMN
2666643777750BBBB@1CCCCA
u1
u2
...
uN
266664377775 (45) where the decomposed M M matrices
eMi ¼ XNk¼1
Mk wðk1Þð i1Þ
N
eKi ¼ XNk¼1
Kk wðk1Þð i1Þ
N
9>>>>>=>>>>>;
; i ¼ 1; 2; …; N (46) follow from Theorem 10. Equation (45) represents a set of N
reduced-order generalized EVPs
0M ¼ eKi k eMi
ui; i ¼ 1; 2; …; N (47) which are analogous to the reduced-order standard EVPs defined by Eq. (37). The eigenvalues are determined from the characteris-tic polynomials det ð eKi k eMiÞ ¼ 0; i ¼ 1; 2; …; N (48) and are denoted by k ¼ kðpÞ
i
for p ¼ 1; 2; …; M. Each kðpÞ
i
also satisfies Eq. (44) because the transformation to new coordi-nates via Eq. (36) is unitary, and hence preserves the system eigenvalues. The reduced-order eigenvectors ui ¼ uðpÞ
i
are obtained from Eq. (47) for each kðpÞ
i
. The eigenvectors of the full system ( M,K) are given by qðpÞ
i
¼ ei uðpÞ
i
, which is the same as Eq. (39). The relationships defined by Eqs. (40) and (41) also hold for the generalized cEVP to make the eigen-vectors orthonormal. If M and K are ordinary circulants (i.e., M ¼ 1), then the system eigenvectors reduce to ~qð1Þ
i
¼ qð1Þ
i
¼ ei 1 ¼ ei, which is the same as Eq. (42) and shows that e1; e2; …; eN are the orthonormal eigenvectors of all generalized eigensystems defined by
M; K 2 CN . If M1; M2; …; MN and K1; K2; …; K N are the generat-ing elements of M and K, respectively, the corresponding eigen-values are
ki ¼
XNk¼1
Kk wðk1Þð i1Þ
N
XNk¼1
Mk wðk1Þð i1Þ
N
; i ¼ 1; 2; …; N (49) 22 which follows from Eq. (45) by replacing each eMk with M k and
eKk with Kk. For the special case of M ¼ IN with generating ele-ments 1 ; 0; …; 0 (i.e., for the standard cEVP), Eq. (49) reduces to the form shown in Theorem 9, as expected. It is clear from this formulation that the same basic steps are followed to solve the standard and generalized cEVPs. For the standard cEVP, we say that kðpÞ
i
and qðpÞ
i
are the eigenvalues and eigenvectors of the matrix C. For the generalized cEVP, the eigenvalues and eigenvectors correspond to the system (M,K), not the individual matrices M and K.
Example 27 . Consider the generalized cEVP defined by Eq. (44). Let the generating elements of M 2 C2 be M1 ¼ 2 and
M2 ¼ 1 and the generating elements of K 2 C2 be K1 ¼ 5 and
K2 ¼ 1 such that
M ¼ 2 1
1 2
and K ¼ 5 1
1 5
Then the eigenvalues of the system ( M, K ) follow from Eq. (49) with N ¼ 2 and are given by
ki ¼
X2
p¼1
Kp wðp1Þð i1Þ
N
X2
p¼1
M p wðp1Þð i1Þ
N
¼ 5w02 þ ð 1Þw i122w02 þ ð 1Þw i12
¼ 5 e jpði1Þ
2 e jpði1Þ
for i ¼ 1, 2. It follows that k1 ¼ 4 and k2 ¼ 2. The corresponding orthonormal eigenvectors are given by
~qð1Þ
1
¼ e1 ¼ 1ffiffiffi
2
p 11
" #
~qð1Þ
2
¼ e2 ¼ 1ffiffiffi
2
p 1
w2
" #
¼ 1ffiffiffi
2
p 1
1
" #
which follow from Definition 18 according to Eq. (42).
2.8.3 Eigenvalue and Eigenvector Structure. For real-valued generating elements, such as those that arise in models of physical systems with cyclic symmetry, the eigenvalues of a circulant ma-trix C 2 CN are endowed with certain symmetry characteristics, and the same is true for the eigenvalues of systems M; K 2 CN .However, we do not require the circulants to be symmetric, as it is assumed in Corollary 17. We begin by systematically describing the eigenvalue structure of an ordinary circulant with real generat-ing elements. The results are generalized by inspection to handle block circulants and ( M,K) systems composed of circulant or block circulant matrices. The eigenvalues ki of a circulant matrix C 2 CN with generat-ing elements c1; c2; …; c N are given by Eq. (21), or the equivalent matrix–vector form in Eq. (22). It is convenient to re-index each
c k and ki such that
yðpÞj p¼0;1;2;…;N1 ¼ c kjk¼1;2;3;…;NYðrÞj r¼0;1;2;…;N1 ¼ kiji¼1;2;3;…;N
)
(50) which facilitates the results for real generating elements and clari-fies their interpretation. If the eigenvalues are dissected according to YðrÞ ¼ Y RðrÞ þ jY I ðrÞ, then the real and imaginary components
Y RðrÞ ¼ XN1
p¼0
yðpÞ cos 2ppr N
(51 a)
Y I ðrÞ ¼ XN1
p¼0
yðpÞ sin 2ppr N
(51 b)follow from the formulation of Eq. (33) in Sec. 2.7 for a real-valued signal where, recall, the eigenvalue expression defined by Eq. (21) has exactly the same form as the DFT in Definition 20. That is, Eq. (51) also represents the real and imaginary parts of the DFT of a real-valued signal, where the sequence of generating elements y(p) is analogous to a real signal and the eigenvalues
Y(r) are analogous to its DFT. It is shown that the symmetry of the DFT about the so-called Nyquist component also exists for the eigenvalues of a circulant matrix with real generating elements. As is customary in signal processing, we restrict the formulation to even N. The case of odd N also yields symmetric eigenvalues, but with multiplicity of the Nyquist component. This is handled by example in Sec. 3 (for instance, see Fig. 9). For even N, the zeroth eigenvalue Y(0) and “Nyquist” eigen-value Y N =2ð Þ are always real because
Y0 Y Rð0Þ ¼ XN1
p¼0
yðpÞ cos ð0Þ ¼ XN1
p¼0
yðpÞ
YI ð0Þ ¼ XN1
p¼0
yðpÞ sin ð0Þ ¼ 0(52 a)
Y N=2 YRN
2
¼ XN1
p¼0
yðpÞ cos ðppÞ ¼ XN1
p¼0
yðpÞð 1ÞpY IN
2
¼ XN1
p¼0
yðpÞ sin ðppÞ ¼ 0(52 b)are such that the imaginary parts vanish. 2 The remaining eigenval-ues appear in complex conjugate pairs, as the following corolla-ries show. C OROLLARY 25. Let y(p) be the real-valued generating elements of a circulant matrix for p ¼ 0; 1; 2… ; N 1 and Y(r) denote its eigenvalues according to Eq. (21). Then YðN rÞ ¼ YðrÞ ¼ Yð rÞ
fo r r ¼ 0; 1; 2… ; N 1.
Proof. The eigenvalues of y(p) are given by
YðrÞ ¼ YRðrÞ þ jY I ðrÞ, where
Y RðrÞ ¼ XN1
p¼0
yðpÞ cos 2ppr N
¼ XN1
p¼0
yðpÞ cos 2ppð rÞ
N
¼ YRð rÞ
(Eq. 51 a)and the property cos ð hÞ ¼ cos ðhÞ is employed. Similarly,
YI ðrÞ ¼ XN1
p¼0
yðpÞ sin 2ppr N
¼ XN1
p¼0
yðpÞ sin 2ppð rÞ
N
¼ Y I ð rÞ
(Eq. 51 b)2Equation (52 a) also holds if N is odd, but the Nyquist component is repeated with multiplicity of two. 23 where the property sin ð hÞ ¼ sin ðhÞ is employed. It follows that
YðrÞ ¼ Y RðrÞ jY I ðrÞ¼ Y Rð rÞ þ jY I ð rÞ¼ Yð rÞ
which completes the right-hand side of the proof. To prove the left-hand side, consider
Y RðN rÞ ¼ XN1
p¼0
yðpÞ cos 2ppðN rÞ
N
¼ XN1
p¼0
yðpÞ cos 2pp 2ppr N
¼ XN1
p¼0
yðpÞ
cos ð2ppÞ cos
2ppr N
sin ð2ppÞ sin
2ppr N
¼ XN1
p¼0
yðpÞ
1 cos
2ppr N
0 sin
2ppr N
¼ XN1
p¼0
yðpÞ cos
2ppð rÞ
N
¼ YRð rÞ (Eq. 51 a)and a similar expansion shows that Y I ðN rÞ ¼ Y I ðrÞ. It follows that
YðN rÞ ¼ Y RðN rÞ jY I ðN rÞ¼ Y RðrÞ jY I ðrÞ¼ YðrÞ
which completes the proof.
Corollary 25 establishes the following result. C OROLLARY 26. Let y(p) be the real-valued generating elements of a circulant matrix for p ¼ 0; 1; 2… ; N 1 and Y(r) denote its eigenvalues according to Eq. (21). Then
jYðN rÞj ¼ j YðrÞj ff YðN rÞ ¼ ff YðrÞ
for integers r ¼ 0; 1; 2… ; N 1.
The magnitudes jYðrÞj and arguments ff YðrÞ of the eigenvalues
Y(r) are listed in Table 3 for the special case of even N ¼ 8, where
YðrÞ ¼ YðN rÞ follows from complex conjugation of the left-hand equality given by Corollary 25. The zeroth eigenvalue
Y(0) ¼ Y0 is real and generally distinct, as is Y N =2ð Þ ¼ Y N=2 for even N, but the remaining eigenvalues generally appear in com-plex conjugate pairs. It follows that the eigenvalue magnitudes (frequencies) are symmetric about the Nyquist component Y N=2 ,as are the arguments (phase angles) but with the opposite sign for indices r > N=2. The eigenvalue symmetries can be observed in the examples of Sec. 2.5.4. The eigenvalues of the matrix C ¼ circ ð4; 1; 0; 1Þ
in Example 15 are aðCÞ ¼ f 2; 4; 6; 4g, where Y(0) ¼ 2 and
YN=2 ¼ Yð2Þ ¼ 6 are real and distinct and Y(1) ¼ Y(3) ¼ 4 are real and repeated. Similarly, for the matrix C ¼ circ ð4; 1; 0; 1Þ in Example 16, the eigenvalues are aðCÞ ¼ f 4; 4 2j; 4; 4 þ 2jg,where Yð1Þ ¼ 4 2j and Yð3Þ ¼ 4 þ 2j are complex conjugates and Yð0Þ ¼ Y N=2 ¼ Yð2Þ ¼ 4 are real-valued. As expected, these same symmetries are also observed in Example 21 for the DFT of a real-valued signal. A similar formulation shows that the eigenvalues of real-valued (M,K) systems exhibit the same symmetry characteristics because the numerator and denominator of Eq. (49) have exactly the same form as Eq. (21). If the scalars Mk and K k in Eq. (49) are re-indexed and restricted to be real-valued, then Corollaries 25 and 26 are generalized accordingly. For signal processing applications, the symmetry characteristics summarized in Table 3 have practical significance because the subset of ðN þ 2Þ=2 frequency-domain components 0 r N=2is endowed with the same basic “information” contained in all N
time-domain signal samples for 0 p N 1. That is, when transformed to the frequency domain by the DFT process, any real-valued signal has a zero-frequency or dc component ( r ¼ 0), distinct magnitude and phase information for 0 r N=2, and repeated magnitude and phase information for r > N=2. For circu-lant matrices that describe physical systems with cyclic symmetry,
Y0 and YN=2 correspond to standing wave vibration modes and the remaining eigenvalues are associated with traveling wave modes. This is discussed in Sec. 3. Equation (42) shows that e1; e2; …; eN are the eigenvectors of any circulant matrix C, and the same is true for ( M,K) systems com-posed of circulant matrices. Each eigenvector ei is associated with an eigenvalue Y(r) (i.e., ki) according to the indices defined by Eq. (50). For the special case of real generating elements, the eigenvalues summarized in Table 3 have exactly the same symmetry characteris-tics as the vectors e1; e2; …; eN , which are discussed in Sec. 2.5.2. For example, if N is even, the real eigenvalues YN/2 (i.e., k(N+2)/2 ) and
Y(0) (i.e., k1) correspond to the real eigenvectors e Nþ2=2ð Þ and e1defined by Eqs. (18) and (19), respectively. The remaining eigenval-ues appear in complex conjugate pairs and are associated with the complex conjugate eigenvectors according to Eq. (17). If the scalar sequences y(p) and Y(r) for a circulant matrix are replaced by a sequence of matrices y(p) and Y(r), it is clear that the formulation given above also holds for Eq. (23), which defines the eigenvalues for block circulant matrices. In this case, the
groups of eigenvalues associated with each Ki are endowed with the symmetry properties given in Table 3. This is confirmed by Example 25 where, using the indexing scheme of that section,
aðK1Þ ¼ f 1; 1g and aðK3Þ ¼ f 3; 5g are distinct sets of eigenval-ues and aðK2Þ ¼ aðK4Þ ¼ f 1; 3g are repeated.
2.8.4 Eigenvector Orthogonality. Here, we consider eigen-vector orthogonality relationships for block circulant matrices C
and systems ( M,K) contained in BC M;N for the special case of
symmetric generating matrices . However, we do not restrict either
C or ( M,K) to be symmetric or block symmetric. We require only that the generating matrices C1; C2; …; CN of C are symmetric for the standard cEVP, which guarantees that each Ki is symmetric according to Corollary 19. Similarly, we require that the generat-ing matrices M1; M2; …; MN and K1; K2; …; KN of ( M,K) are symmetric for the generalized cEVP, which implies that ð eKi; eMiÞ
are symmetric. Symmetric generating matrices commonly arise in models of rotating flexible structures, including the ones consid-ered in Sec. 3, where the sector models and intersector coupling are described by symmetric matrices. Then the usual orthogonal-ity relationships hold for the reduced-order eigenvectors defined in Secs. 2.8.1 and 2.8.2. It is first shown that each ~uðpÞ
i
is
Table 3 Magnitudes and arguments of Y(r) for even N58
Index Eigenvalue Magnitude Argument
rY(r)YðNrÞjYðrÞj ff YðrÞ
0Yð0Þ ¼ Y0Yð8ÞjYð0Þj ¼ Y0ff Yð0Þ
1Y(1) Yð7ÞjYð1Þj ff Yð1Þ
2Y(2) Yð6ÞjYð2Þj ff Yð2Þ
3Y(3) Yð5ÞjYð3Þj ff Yð3Þ
4¼N=2ðÞYð4Þ ¼ Yð4Þ ¼ YN=2Yð4ÞjYð4Þj ¼ YN=2ff Yð4Þ
5Yð5Þ ¼ Yð3ÞYð3ÞjYð3Þj ff Yð3Þ
6Yð6Þ ¼ Yð2ÞYð2ÞjYð2Þj ff Yð2Þ
7Yð7Þ ¼ Yð1ÞYð1ÞjYð1Þj ff Yð1Þ24
orthogonal with respect to Ki for the standard cEVP. Proofs can be found in any standard textbook on linear algebra [98,99]. To-gether with generic orthogonality conditions on the basic circulant structure of a matrix C 2 BC M;N , this gives rise to an orthogonal-ity condition on the eigenvector ~qðpÞ
i
¼ ei ~uðpÞ
i
with respect to C.Orthogonality of ~qðpÞ
i
with respect to the system M; K 2 BC M;N is handled similarly. The results of this section, and the requirement of symmetric gener-ating matrices, are meant to highlight how orthogonality of an eigen-vector ~qðpÞ
i
¼ ei ~uðpÞ
i
is essentially dissected into the orthogonality of ei with respect to the circulant structure of C 2 BC M;N and ortho-gonality of ~uðpÞ
i
with respect to the generating matrices (e.g., Ki), where the latter requires symmetric C1; C2; …; CN . It should be noted that none of the results in Sec. 2, aside from this section, require symmetric generating matrices. In particular, Theorems 9 and 10, upon which block reduction of the cEVPs in Secs. 2.8.1 and 2.8.2 are based, are valid for arbitrary M M generating matrices. COROLLARY 27. Suppose each Ki defined by Eq. (23) is symmetric. Let ~uðpÞ
i
be the pth orthonormal eigenvector of Ki and kðpÞ
i
be the corresponding eigenvalue. Then if eUi ¼ ð ~uð1Þ
i
; ~uð2Þ
i
; …; ~uðMÞ
i
Þ is the M M orthonormal modal matrix associated with Ki , it follows that
eUT
i
Ki eUi ¼
kð1Þ
i
0
kð2Þ
i
. ..
0 kðMÞ
i
2666437775; i ¼ 1; 2; …; Nis a diagonal matrix with eigenvalues kðpÞ
i
along its diagonal for p ¼ 1; 2; …; M and
~uðpÞT
i
Ki ~uðqÞ
i
¼ kðpÞ
i
dpq where dpq is the Kronecker delta .
Example 28 . Consider the eigensolutions
~uð1Þ
3
¼ 1ffiffiffi
2
p ð1; 1ÞT; kð1Þ
3
¼ 3
~uð2Þ
3
¼ 1ffiffiffi
2
p ð 1; 1ÞT; kð2Þ
3
¼ 5
9>>=>>;
corresponding to the symmetric matrix
K3 ¼ 4 1
1 4
from Example 25, where the reduced-order eigenvectors are in orthonormal form. The corresponding reduced-order modal matrix is denoted by
eU3 ¼ ð ~uð1Þ
3
; ~uð2Þ
3
Þ¼ 1ffiffiffi
2
p 1 11 1
" #
It follows from Corollary 27 that the diagonal matrix
eUT3 K3 eU3 ¼ 1ffiffiffi
2
p 1 11 1
" #T 4 1
1 4
" #
1ffiffiffi
2
p 1 11 1
" #
¼ 121 1
1 1
" # 3 53 5
" #
¼ 126 00 10
" #
¼
3 00 5
" #
has eigenvalues kð1Þ
3
¼ 3 and kð2Þ
3
¼ 5 as its diagonal elements. The reader can verify that ~uð1ÞT3 K3 ~uð1Þ
3
¼ 3 and ~uð2ÞT3 K3 ~uð2Þ
3
¼ 5according to Corollary 27.
Orthogonality of an eigenvector ~qðpÞ
i
¼ ei ~uðpÞ
i
with respect to
C 2 BC M;N is essentially decomposed into orthogonality of ei
with respect to the circulant structure of C and orthogonality of each ~uðpÞ
i
with respect to the symmetric matrices Ki. These indi-vidual orthogonality conditions are captured by Corollaries 18 and 27, which lead to the following fundamental result. C OROLLARY 28. Let C 2 BC M;N be a block circulant matrix with symmetric generating matrices, ei be the ith column of the N NFourier matrix EN , and ~uðpÞ
i
be the pth reduced-order orthonormal eigenvector corresponding to Ki defined by Eq. (23). Then
ðeH
i
ð~uðpÞ
i
ÞTÞCðek ~uðqÞ
i
Þ ¼ kðpÞ
i
dik dpq for i ; k ¼ 1; 2; …; N and p ; q ¼ 1; 2; …; M, where kðpÞ
i
is the eigen-value associated with ~uðpÞ
i
and dik is the Kronecker delta .
Proof. Let eUi ¼ ð ~uð1Þ
i
; ~uð2Þ
i
; …; ~uðMÞ
i
Þ be the orthonormal modal matrix associated with Ki and C1; C2; …; CN be the symmetric generating matrices of C. Corollary 19 guarantees that Ki is sym-metric because the generating matrices are symmetric. By setting
B ¼ eUi and ðÞ # ¼ ðÞ T in Corollary 21, it follows that
ðeH
i
eUT
i
ÞCðek eUiÞ ¼ Widik
¼ Wi; i ¼ k
0; otherwise
(
where
Wi ¼ XNn¼1
B#CnBwðn1Þð i1Þ
N
(Eq. 24)
¼ XNn¼1
eUTi Cn eUi wðn1Þð i1Þ
N
(by substitution)
¼ eUTi
XNn¼1
Cn wðn1Þð i1Þ
N
!eUi
¼ eUTi Ki eUi (Eq. 23)
¼
kð1Þ
i
0
kð2Þ
i
. ..
0 kðMÞ
i
2666437775 (Cor. 27) for i ¼ 1; 2; …; N. Expanding the M M matrix product
ðeH
i
eUTi ÞCðek eUiÞ yields
eH
i
ð~uð1Þ
i
ÞT
...
ð~uðpÞ
i
ÞT
...
ð~uðMÞ
i
ÞT
2666666666643777777777750BBBBBBBBBB@1CCCCCCCCCCA
C e k ð~uð1Þ
i
; …; ~uðqÞ
i
; …; ~uðMÞ
i
Þ
¼
eH
i
ð~uð1Þ
i
ÞT
...
eH
i
ð~uðpÞ
i
ÞT
...
eH
i
ð~uðMÞ
i
ÞT
266666666664377777777775
Cðek ~uð1Þ
i
; …; ek ~uðqÞ
i
; …; ek ~uðMÞ
i
Þ
which produces an M M array with scalar elements 25 ðeH
i
ð~uðpÞ
i
ÞTÞCðek ~uðqÞ
i
Þ
in the ( p, q) position for p; q ¼ 1; 2; …; M. However, in light of the diagonal structure of each Wi, only the diagonal elements sur-vive in this expansion. That is,
ðeH
i
ð~uðpÞ
i
ÞTÞCðek ~uðqÞ
i
Þ ¼ kðpÞ
i
dik ; p ¼ q
0; otherwise
(
¼ kðpÞ
i
dik dpq
which completes the proof.
If i ¼ k in Corollary 28, the orthogonality condition can be stated in terms of the eigenvectors ~qðpÞ
i
¼ ei ~uðpÞ
i
. That is,
ð~qðpÞ
i
ÞHC~qðqÞ
i
¼ kðpÞ
i
dpq ; i ¼ 1; 2; …; N (53) For an ordinary circulant, each ~uðpÞ
i
¼ 1 and Corollary 28 reduces to
eH
i
Ce k ¼ kidik ; i ¼ 1; 2; …; N (54) which is the same result given by Corollary 18.
Example 29 . Consider C ¼ circ ð4; 1; 0; 1Þ 2 C4 from Examples 15, 17, and 24, where it is shown that
e2 ¼ 12 ð1; j; 1; jÞT is an eigenvector of C corresponding to the eigenvalue k2 ¼ 4. Thus, the product
eH
2
Ce 2 ¼ 12 1 j 1 j½
4 1 0 1
1 4 1 00 1 4 1
1 0 1 4
2666666437777775
121
j
1
j
2666666437777775
¼ 14 1 j 1 j½ ð 4; 4j; 4; 4jÞT
¼ 14 ð4 þ 4 þ 4 þ 4Þ¼ 4is numerically equal to k2 according to Eq. (54). However, the product
eH
4
Ce 2 ¼ 14 1 j 1 j½ ð 4; 4j; 4; 4jÞT
¼ 14 ð4 4 þ 4 4Þ¼ 0vanishes because i 6 ¼ k.
Example 30 . Consider C ¼ circ ðA; B; 0; BÞ 2 BC 2;4 from Examples 6, 18, 19, 20, and 25, where it is shown that
~qð2Þ
3
¼ 1ffiffiffi
2
p qð2Þ
3
¼ 12 ffiffiffi
2
p ð 1; 1; 1; 1; 1; 1; 1; 1ÞTis an orthonormal eigenvector of C corresponding to the eigen-value kð2Þ
3
¼ 5. Because the generating matrices A, B, 0, B are symmetric (see Example 6), Corollary 28 guarantees that each
~qðpÞ
i
¼ ei ~uðpÞ
i
is mutually orthogonal with respect to C. For example, it follows from Eq. (53) that
qð2ÞH
3
Cq ð2Þ
3
¼ 12 ffiffiffi
2
p 1 1 1 1 1 1 1 1½
2 1 1 0 0 0 1 0
1 2 0 1 0 0 0 1
1 0 2 1 1 0 0 00 1 1 2 0 1 0 00 0 1 0 2 1 1 00 0 0 1 1 2 0 1
1 0 0 0 1 0 2 10 1 0 0 0 1 1 2
377777777777777775266666666666666664
12 ffiffiffi
2
p111
1
111
1
266666666666666664377777777777777775
¼ 18 1 1 1 1 1 1 1 1½ ð 5; 5; 5; 5; 5; 5; 5; 5ÞT
¼ 5which is numerically equal to the eigenvalue kð2Þ
3
. However, the matrix product
ðe3 uð1Þ
3
ÞHCðe3 uð2Þ
3
Þ¼ ð eH
3
ðuð1Þ
3
ÞH ÞCðe3 uð2Þ
3
Þ¼ ð eH
3
ðuð1Þ
3
ÞTÞCðe3 uð2Þ
3
Þ¼ 12 ffiffiffi
2
p 1 1 1 1 1 1 1 1½ C
12 ffiffiffi
2
p ð 1; 1; 1; 1; 1; 1; 1; 1ÞT
¼ 18 1 1 1 1 1 1 1 1½ ð 5; 5; 5; 5; 5; 5; 5; 5ÞT
¼ 0vanishes because dpq ¼ 0 ðp 6 ¼ qÞ in Corollary 28. Similarly,
ðe2 uð2Þ
3
ÞHCðe3 uð2Þ
3
Þ¼ 12 ffiffiffi
2
p 1 1 j j 1 1 j j½ C
12 ffiffiffi
2
p ð 1; 1; 1; 1; 1; 1; 1; 1ÞT
¼ 18 1 1 j j 1 1 j j½ ð 5; 5; 5; 5; 5; 5; 5; 5ÞT
¼ 0because dik ¼ 0 ði 6 ¼ kÞ.26 If instead we set A ¼ 4 and B ¼ 1 such that C 2 C4 is an ordi-nary circulant, we recover the orthogonality condition in Example 15 for i ¼ 3.
The orthogonality conditions used in Example 30 for the special case of an ordinary circulant does not require that the circulant structure is symmetric (i.e., C need not be contained in SC N ). The reader can verify that Eq. (54) also holds for nonsymmetric matrices C 2 CN by inspection of Example 16. The fundamental orthogonality relationship given by Corollary 28 also holds for M; K 2 BC M;N systems with symmetric generat-ing matrices, as the following corollary shows. Corollary 29. Let M; K 2 BC M;N be block circulant with symmetric generating matrices, ei be the ith column of the N NFourier matrix EN , and ~uðpÞ
i
be the pth M 1 reduced-order orthonormal eigenvector corresponding to the ith system ð eMi; eKiÞ
defined by Eq. (46). Then
ðeH
i
ð~uðpÞ
i
ÞTÞMðei uðpÞ
i
Þ ¼ dik dpq
ðeH
i
ð~uðpÞ
i
ÞTÞKðei uðpÞ
i
Þ ¼ kðpÞ
i
dik dpq
9=;
for i ; k ¼ 1; 2; …; N and p ; q ¼ 1; 2; …; M, where kðpÞ
i
is the eigen-value associated with ~uðpÞ
i
and dik is the Kronecker delta .
In practice, of course, the M 1 reduced-order eigenvectors
~uðpÞ
i
are not known a priori. Instead, Theorem 10 is used in Sec. 3 to decouple the NM -DOF system equations into a set of N
reduced-order M-DOF standard vibratory problems, from which the system eigenvalues (natural frequencies) and eigenvectors (normal modes) are extracted.
3 Example Applications
In this section we apply the results developed in Sec. 2 to vibra-tion models of systems with cyclic symmetry. For each model considered, we begin by formulating the equations of motion (EOM) and then use the theory of circulants to diagonalize or block diagonalize the governing equations. This is achieved by a coordinate transformation that exploits the special relationship between circulant matrices and the Fourier matrix. The process also shows how external forces are projected on the resulting block diagonal EOM. The special case of traveling wave engine order excitation is also presented in some detail because it appears in many relevant applications of rotating machinery. Three examples are presented. The first example (Sec. 3.1) con-siders the structure of the EOM for a general cyclic system with N
sectors, M DOFs per sector, and arbitrary excitation. It is shown how to block diagonalize the system equations via a modal trans-formation involving the Fourier matrix, which results in NM -DOF reduced-order vibratory systems. If engine order excitation is assumed (Sec. 3.2), it is shown that the steady-state forced response of the NM -DOF system can be obtained from a single M -DOF harmonically forced, reduced-order system in modal space. The mathematical and physical details of engine order excitation are discussed, including its temporal and spatial duality. The sec-ond example (Sec. 3.3) considers a cyclic system with one DOF per sector under engine order excitation. This system is fully dia-gonalized by the Fourier matrix. The example is presented in detail, showing the nature of the natural modes and frequencies, and the resonant response to excitation of various engine orders. The third example (Sec. 3.4) has two DOFs per sector and demon-strates the block diagonalization process for a perfectly cyclic sys-tem with specified sector models, as opposed to the general sector models in the first example. In each sector, one DOF is due to flexure, and thus has a constant frequency, while the other DOF is a centrifugally driven pendulum whose frequency is proportional to the rotor speed. The coupling between these DOFs leads to some interesting behavior in both the free and forced vibration of the system, which is discussed in Refs. [21,22] and [92–95]. More importantly, this example shows the process of handling multiple DOFs per sector, which easily extends from two to M DOFs per sector using the theory presented in Sec. 2.
3.1 General Cyclic System
3.1.1 Equations of Motion. Consider the general cyclic vibra-tory system shown schematically in Fig. 4, which consists of N
sectors with coupling (elastic and damping) to adjacent neighbors. The topology diagram only indicates nearest-neighbor coupling, but more general coupling is admissible as long as the cyclic sym-metry is preserved. If there are M DOFs per sector, each M 1vector qi describes the dynamics of the ith sector for
i 2 f 1; 2; …; Ng N . Then the linear EOM takes the form
M€q þ C _q þ Kq ¼ bf (55) where q ¼ ð q1; q2; …; qN ÞT is a NM 1 configuration vector, the system matrices are block circulant with M M blocks, and over-dots denote differentiation with respect to time. If the M 1 vec-tor fi denotes the component of forcing on the ith sector, then
bf ¼ ð f1; f2; …; fN ÞT is a NM 1 general forcing vector. The
NM NM system mass, damping, and stiffness matrices are of the form
M ¼ circ ðM1; M2; …; MN Þ 2 BC M;N
C ¼ circ ðC1; C2; …; CN Þ 2 BC M;N
K ¼ circ ðK1; K2; …; KN Þ 2 BC M;N
9>=>; (56) where the generating matrices Mi, Ci, and Ki depend on the
M M sector mass, damping, and stiffness matrices and the inter-sector coupling (stiffness and damping). Equation (55) is a general model for any linear, lumped-parameter, conservative, nongyro-scipic, cyclic vibratory system with N sectors and M DOFs per sector. For example, a linearized lumped-parameter model of a bladed disk assembly under engine order excitation is captured by Eq. (55), where N is the number of blades, M is the number of DOFs per blade, f has the special properties described in Sec. 3.2, and the system matrices depend on the structural details of each blade (i.e., sector) and its connectivity to adjacent blades and rotating hub.
3.1.2 Modal Transformation. Of course, one can apply stand-ard techniques to investigate the free and forced response of the model given by Eq. (55). However, this requires solving an
NM NM eigenvalue problem to determine the modal properties, or inversion of an NM NM impedance matrix to determine the response to harmonic excitation. Such an approach may be pro-hibitive or computationally expensive for practical models with
Fig. 4 Topology diagram of a general cyclic system 27
many sectors and many DOFs per sector, nor does it highlight or exploit the underlying features of the cyclic system. It is precisely these special features that are brought to light by the properties of the circulants or block circulants that describe the system. Solving for the system response is significantly facilitated by a modal transformation that exploits the cyclic symmetry among the N sectors. Specifically, it is straightforward to block decouple the EOM into a set of N systems, each with M DOFs. To this end, we introduce the change of coordinates
q ¼ ð EN IMÞu (57) where u ¼ ð u1; u2; …; uN ÞT is a NM 1 vector of modal coordi-nates. Each ui is M 1 and describes the sector dynamics in modal space, where the EOM are block decoupled (as described below). In this formulation the physical coordinates q are expressed in terms of the modal coordinates ui and the Fourier elements of length N, which accounts for the overall cyclic nature of the EOM. Substituting Eq. (57) into Eq. (55) and multiplying from the left by ðEN IMÞH ¼ ð EH
N
IMÞ yields
ðEH
N
IMÞMðEN IMÞ€u þ ð EH
N
IMÞCðEN IMÞ _u
þ ð EH
N
IMÞKðEN IMÞu
¼ ð EH
N
IMÞbf
or
eM1 0
eM2
. ..
0 eMN
2666666437777775
€u1
€u2
...€uN
26666643777775
þ
eC1 0
eC2
. ..
0 eCN
2666666437777775
_u1
_u2
..._uN
26666643777775
þ
eK1 0
eK2
. ..
0 eKN
2666666437777775
u1
u2
...
uN
26666643777775
¼ðeH
1
IM Þbf
ðeH
2
IM Þbf
...
ðeH
N
IM Þbf
2666666437777775
(58) The block diagonal structure on the left-hand side of Eq. (58) fol-lows from Theorem 10, where the M M modal mass, damping, and stiffness matrices associated with the pth mode follow from Eq. (23) and are given by
eMp ¼ XNk¼1
Mk wðk1Þð p1Þ
N
eCp ¼ XNk¼1
Ck wðk1Þð p1Þ
N
eKp ¼ XNk¼1
Kk wðk1Þð p1Þ
N
9>>>>>>>>>=>>>>>>>>>;
; p 2 N (59) The forcing terms on the right-hand side of Eq. (58) follow from the decomposition
ðEH
N
IM Þbf ¼ ðeH
1
; eH
2
; …; eH
N
ÞT IM
bf
¼ eH
1
IM ; eH
2
IM ; …; eH
N
IM
Tbf
¼ðeH
1
IMÞbf
ðeH
2
IMÞbf
...
ðeH
N
IMÞbf
2666666437777775
(60) and make no assumptions on the nature of the applied forcing. Thus, the solution to the NM -DOF matrix EOM given by Eq. (58) reduces to solving NM -DOF uncoupled systems
eMp €up þ eCp _up þ eKpup ¼ ð eH
p
IMÞbf; p 2 N (61) for the modal solutions up. These N reduced-order EOMs of order
M offer a substantial computational savings compared to the full
NM -DOF system defined by Eq. (55). The reduced equations can be solved directly or with standard modal analysis by solving a set of N generalized eigenvalue problems, each of order M, from which one can form the global eigenvectors of the system. Specifi-cally, solving the N eigenvalue problems associated with Eq. (61) yields a set of normalized M M modal matrices Up, which define a change to reduced modal coordinates via up ¼ Upsp. The sp are modes that define the behavior of the internal sector dynamics and account for the manner in which these are coupled to each other in a given Fourier mode of the overall system. The EOM for the si
form a set of M uncoupled equations, and these are related to the physical coordinates of the original system by q ¼ ð EN IM Þu
where u ¼ ð U1s1; U2s2; …; UN sN ÞT . This process is general, and it allows one to decouple the full EOM in two steps, one which accounts for the global cyclic nature of the system, and the other which accounts for the details of the sector model. Equation (61) can be simplified even further if the system is subjected to the so-called engine order excitation . The mathemat-ics and physics of this type of excitation are developed in the next section, which closes with a treatment of the general cyclic system governed by Eq. (61) under engine order excitation.
3.2 Engine Order Excitation. Traveling wave engine order excitation arises in rotating machinery and is a primary source of forced vibration response in bladed disk assemblies [11,111]. A mathematical model of this common form of excitation is devel-oped in Sec. 3.2.1 and its traveling wave characteristics are described in Sec. 3.2.2. While this material is known, the discus-sion that follows is unique because it provides physical insights and a systematic explanation of the temporal and spatial duality of engine order excitation. The general cyclic system of Sec. 3.1 is reconsidered in Sec. 3.2.3 under engine order excitation, where it is shown that the steady-state forced response of the NM -DOF system reduces to that of a single sector in modal space.
3.2.1 Mathematical Model. Ideally, the steady axial gas pres-sure in a jet engine might vary with radius but is otherwise uni-form in the circumferential direction, thus resulting in an identical force field on each blade in a particular fan, compressor, or turbine within the engine. In practice, however, flow entering an engine inlet invariably meets static obstructions, such as struts, stator vanes, etc., in addition to rotating bladed disk assemblies in its path to the exhaust. Even in steady operation, therefore, the flow slightly upstream of these bladed assemblies is nonuniform in pressure, temperature, and so on. This results in a static pressure (effective force) field on the blades that vary circumferentially, a notional example of which is shown in Fig. 5. Consider, for example, an engine in steady operation with n
evenly spaced struts slightly upstream (or downstream) of a bladed assembly. As explained in Ref. , these obstructions produce a circumferential variation upon the mean axial gas pressure that is essentially proportional to cos nh, where h is an angular posi-tion. Thus, a blade rotating through this static pressure field expe-riences a force proportional to cos nXt, where X is the constant angular speed of the bladed disk assembly and t is time. An adjacent blade experiences the same force, but at a constant frac-tion of time later. This type of excitation is defined as engine order
(e.o.) excitation and n is said to be the order of the excitation. To be more precise, the axial gas pressure of a steady flow through a jet engine may be described by the function
pðhÞ ¼ pðh þ 2pÞ, where h is an angular coordinate measured 28 relative to a fixed origin on the machine. That is, the pressure field is rotationally periodic and can therefore be expanded in a Fourier series with terms of the form po cos nh. If the angular position of the ith blade relative to the same origin is defined by
hiðtÞ ¼ Xt þ 2p
N ði 1Þ; i 2 N
where N is the total number of blades and N ¼ f 1; 2; …; Ng is the set of blade, or sector numbers, it follows that the total effective force exerted on blade i due to the nth harmonic of the pressure field pðhÞ is captured by
F cos nXt þ 2p nN ði 1Þ
; i 2 N (62) Upon complexifying,
FiðtÞ ¼ Fe j/i e jn Xt; i 2 N (63) is a model for the nth predominant component of the excitation. Eq. (63) has period T ¼ 2p=nX, strength F, and is said to have angular speed X. The so-called interblade phase angle is defined by
/i ¼ /ðnÞ
i
¼ 2p nN ði 1Þ ¼ nui; i 2 N (64) where n 2 Zþ and ui is the angle subtended from blade 1 to blade
i and is defined by Eq. (16). Equation (63) is defined as nth engine order, or traveling wave excitation. The traveling wave character-istics of this type of excitation are considered next.
3.2.2 Traveling Wave Characteristics. The function defined by Eq. (63) is continuous in time and discretized in space via the index i. This gives rise to two interpretations of engine order exci-tation relative to the rotating hub, one discrete and the other con-tinuous. These can be visualized in Fig. 6, which shows adissection of the excitation amplitudes along time and sector axes. In the first and usual sense, Eq. (63) is a discrete temporal varia-tion of the dynamic loading applied to individual blades. That is, under an engine order n excitation, each sector is harmonically forced with strength F and frequency nX, but with a fixed phase difference relative to its nearest neighbors. Physically, one can think of this as placing N different observers at the discrete sectors and having the ith observer record the excitation strength applied to sector i as a function of time. Their recorded time traces would resemble those shown in Fig. 6( a). In the second and more general sense, Eq. (63) can be viewed as a continuous spatial variation of the excitation strength relative to the rotating hub (along the sector axis) that evolves with increasing time, i.e., it is a propagating waveform, or traveling wave . If a single observer was placed on the rotating hub and recorded the strength of this traveling wave as a function of i (taken here to be continuous ), it would resemble the curve shown in Fig. 6( b). In this context, the instantaneous loading applied to individual blades is obtained by essentially “sampling” the continuous traveling wave at each sector i 2 N
and, as time evolves, these sampled points define N time profiles of the force amplitudes, which is equivalent to the discrete tempo-ral interpretation described above. However, the latter interpreta-tion illuminates some important traveling wave characteristics of the engine order excitation that are otherwise difficult to explain, and in what follows these are systematically described. To explain the traveling wave mathematically, it is convenient to define the function
UkðvÞ ¼ cos 2pðk 1Þ
N v
¼ cos ðukvÞ (65) which is a harmonic waveform with wavelength 2 p=uk. Then for
i 2 N and noting that /i ¼ unþ1ði 1Þ, Eq. (63) can be written in real form as
F iðtÞ ¼ F cos ðunþ1ði 1Þ þ nXtÞ¼ F cos unþ1 i 1 þ nX
unþ1
t
¼ FUnþ1ði 1 þ Ct Þ
(66) which is a harmonic function with a wavelength of 2p=unþ1 ¼ N=n (unþ1 is the wave number) and angular frequency
nX. Equation (66) shows that engine order excitation is a TW in the negative i-direction (descending blade number) with speed
C ¼ nX=unþ1 ¼ NX=2p, measured in sectors per second . An example plot of this continuous BTW is shown in Fig. 6( b) and, as described above, the applied loads can be obtained from this figure by continuously “sampling” the waveform at the discrete sector numbers as time evolves. Then the engine order excitation applied to the individual blades consists of a wave composed of these N discrete points, examples of which are shown in Figs. 7( a)–7( d). Interestingly, this gives rise to discrete SW or even FTW applied dynamic loads (depending on the value of n
relative to N), even though Eq. (66) is strictly a BTW relative to the rotating hub. These additional possibilities arise due to alias-ing of the “sampled points” just as it occurs in elementary signal processing theory [112,113]. Before characterizing the traveling and standing waveforms, it is shown that one need only consider engine orders n 2 N .The traveling wave nature of the discrete applied loads (i.e., SW, BTW, or FTW) depends only on the value of n relative to N.To see this, let
n ¼ n mod N 2 N ; n 2 Zþ (67) and assume n ¼ n þ mN for some integer m. Then
UnþmN þ1ðvÞ ¼ Unþ1ðvÞ
That is, if n ¼ n corresponds to a SW, BTW, or FTW, then so does n þ mN for any m 2 Zþ. In this sense, the traveling wave na-ture of the applied dynamic loads is seen to alias relative to N.These features are characterized for engine orders
n 2 N ¼ N O;EBTW [ N O;EFTW [ N O;ESW where it is understood that the results apply to any n > N simply by taking n modulo N, as appropriate. The subsets N O;EBTW , N O;EFTW ,and N O;ESW are defined in Table 4 and discussed below. For the special case of n ¼ N the rotating blades become entrained with the excitation because /ðNÞ
i
¼ 2pnði 1Þ with
Fig. 5 The axial gas pressure pðhÞ: ideal and (notional) actual conditions 29
i; n 2 Zþ, and hence each is forced with the same strength and
phase. As illustrated in Fig. 7( d), this is a SW excitation where each blade is harmonically forced according to F iðtÞ ¼ F cos nXt.Entrainment also occurs when n ¼ N/2 if N is even, in which case
/ðN=2Þ
i
¼ pnði 1Þ, where ( i 1) is odd (resp. even) for even (resp. odd) sector numbers i 2 N . Accordingly, all blades with odd sector numbers are driven by FiðtÞ ¼ F cos nXt, as are the blades with even sector numbers, but with a 180-deg phase shift. As shown in Fig. 7( b), this amounts to the same standing wave ex-citation as the n ¼ N case, except for a phase reversal in the excita-tion among adjacent blades. The engine orders corresponding to SW excitations for odd and even N are denoted by the sets
N O;ESW N , and all other values of n 2 N correspond to traveling waves. Engine orders n 2 N O;EBTW (resp. n 2 N O;EFTW ) correspond to BTW (resp. FTW) excitation, an example of which is shown in Fig. 7( a) (resp. Fig. 7( c)), where N O;EBTW and N O;EFTW are also defined in Table 4. These sets can be visualized in Figs. 7( i) and 7( ii ) for odd and even N, respectively. The manner in which cyclic systems respond to this type of excitation is considered in the examples that follow. In Sec. 3.2.3, we prove the most important result related to the forced response of cyclic systems, namely, that in the case of perfect symmetry each engine order excites only a single mode. This is clear mathe-matically and will be explored with more physical insight in the examples presented in Secs. 3.3 and 3.4.
3.2.3 Forced Response of a General Cyclic System Under Engine Order Excitation. The general cyclic system governed by Eq. (55) is reconsidered here under engine order excitation. Using the notation of Sec. 3.1, a model for the nth engine order excita-tion is
fi ¼ fe jn ui e jn Xt; i 2 N (68) where f is a constant M M vector of sector force amplitudes, t is time, ui is the angle subtended from sector 1 to sector i and is defined by Eq. (16), n is the order of the excitation, nX is the angular frequency of the excitation, and X is the angular speed of the system relative to the excitation. Under this type of excitation, the system forcing vector becomes
bf ¼
f1
f2
...
fN
26666666643777777775
¼
fe jn u1 e jn Xt
fe jn u2 e jn Xt
...
fe jn uN e jn Xt
26666666643777777775
¼ f0 fe jn Xt
where
Fig. 6 Example illustration of the discrete temporal and continuous spatial variations of the traveling wave excitation defined by Eq. (63) in real form: ( a) the discrete dynamic loads with amplitude Fand period T52p=nXapplied to each sector; and ( b) the continuous BTW excitation with wavelength N/nand speed C5NX=2prelative to the rotating hub 30
f0 ¼ ð e jn u1 ; ejn u2 ; …; e jn uN ÞT
¼ ð e j/1 ; e j/2 ; …; e j/N ÞT (69) is a vector of constant intersector phase angles /i ¼ nui. Thus, the pth modal forcing term on the right-hand side of Eq. (61) reduces to
ðeH
p
IMÞbf ¼ ð eH
p
IMÞð f0 fÞe jn Xt
¼ ð eH
p
f0Þ ðIM fÞe jn Xt
¼ ð eH
p
f0Þ fe jn Xt; p 2 N
(70) which is a direct product of the scalar product eH
p
f0 with the nth order harmonic excitation fe jn Xt imparted to each sector. This dis-section of the modal forcing term highlights an orthogonality con-dition that is shared by all cyclic systems under engine order excitation. In particular,
eH
p
f0 ¼ 1ffiffiffiffi
N
p ej0up ; ej1up ; …; ejðN1Þup
e jn u1 ; e jn u2 ; …; ejn uN
T
¼ 1ffiffiffiffi
N
p XNk¼1
ejðk1Þup e jn uk
¼ 1ffiffiffiffi
N
p XNk¼1
ejðk1Þ2p
Nðp1Þ
e jn 2p
Nðk1Þ
¼ 1ffiffiffiffi
N
p XNk¼1
wð k1Þð p1Þ
N
wnðk1Þ
N
¼ 1ffiffiffiffi
N
p XNk¼1
wðk1Þð nþ1pÞ
N
¼
ffiffiffiffi
N
p ; p ¼ n þ 10; otherwise
(
(71) which follows from Lemma 2 and shows that the force vector f0 is mutually orthogonal to all but one of the modal vectors ep. This result is obtained more directly from Corollary 10 by observing that
f0 ¼ e jn u1 ; ejn u2 ; …; e jn uN
T
¼ e j0unþ1 ; ej1unþ1 ; …; e jðN1Þunþ1
T
¼ ffiffiffiffi
N
p enþ1where enþ1 is the ðn þ 1Þth column of the Fourier matrix. It fol-lows that
eH
p
f0 ¼ eH
p
ffiffiffiffi
N
p enþ1
¼ ffiffiffiffi
N
p eH
p
enþ1
¼ ffiffiffiffi
N
p dpðnþ1Þ
(72) which is the same orthogonality condition given by Eq. (71). Thus, for p 2 N , the only excited mode is
p ¼ n mod N þ 1 (73) for an engine order n 2 Zþ excitation. Then Eq. (70) becomes
ðeH
p
IMÞbf ¼
ffiffiffiffi
N
p fejn Xt; p ¼ n þ 10; otherwise
(
(74) and the forced response of the NM -DOF matrix EOM given by Eq. (58) reduces to solving a single , M-DOF system
eMnþ1 €unþ1 þ eCnþ1 _unþ1 þ eKnþ1unþ1 ¼ ffiffiffiffi
N
p fejn Xt (75) in modal space. Assuming harmonic motion, the steady-state modal response is given by
uss
nþ1
ðtÞ ¼ ffiffiffiffi
N
p eZnþ1fe jn Xt (76) where
Fig. 7 Engine orders n mod N corresponding to BTW, FTW and SW applied dynamic loading for ( i) odd N and ( ii ) even N (see also Table 4); example plots of applied dynamic loading (represented by the dots) for a model with N 5 10 sectors and with ( a) n 5 1(BTW), ( b) n 5 5 (SW), ( c) n 5 9 (FTW), and ( d) n 5 10 (SW). The BTW engine order excitation is represented by the solid lines. Table 4 Sets of engine orders nðmod NÞ ‰ N corresponding to BTW, FTW, SW dynamics loads applied to the blades for odd and even N. These can be visualized in Figs. 7( i) and 7( ii ).
N Type Set Odd BTW N OBTW ¼ n 2 Zþ : 1 n N 12
FTW N OFTW ¼ n 2 Zþ : N þ 12 n N 1
SW N OSW ¼ Nf g
Even BTW N EBTW ¼ n 2 Zþ : 1 n N 22
FTW N EFTW ¼ n 2 Zþ : N þ 22 n N 1
SW N ESW ¼ N
2 ; N
31 eZnþ1 ¼ eKnþ1 þ jn XeCnþ1 ð nXÞ2 eMnþ1is the ðn þ 1Þth modal impedance matrix. All other steady-state modal responses are zero because only mode p ¼ n þ 1 is excited. In light of the decomposition shown in Eq. (39), the forced response in physical coordinates follows from Eq. (57) and is given by
qss ðtÞ ¼ enþ1 uss
nþ1
ðtÞ (77) where enþ1 is the ðn þ 1Þth column of the Fourier matrix and
uss
nþ1
ðtÞ is given by Eq. (76). Expanding Eq. (77) into its sector components yields
qss 1 ðtÞ
qss 2 ðtÞ
...
qss
i
ðtÞ
...
qss
N
ðtÞ
266666666664377777777775
¼ 1ffiffiffiffi
N
p
e j0unþ1
e j1unþ1
...
ejð i1Þ unþ1
...
e jð N1Þ unþ1
266666666664377777777775
ffiffiffiffi
N
p eZnþ1fe jn Xt (78) Thus, the steady-state forced response of the ith sector in physical coordinates is given by
qss
i
ðtÞ ¼ 1ffiffiffiffi
N
p e jð i1Þ unþ1
ffiffiffiffi
N
p eZnþ1fe jn Xt
¼ eZnþ1fe jn /i e jn Xt; i 2 N
(79) where /i ¼ 2pðn=NÞð i 1Þ. The response of each sector is identi-cal but simply shifted in time by a constant phase relative to its nearest neighbors.
3.3 Cyclic System With One DOF Per Sector. This exam-ple considers the simplest prototypical model for vibrations of a bladed disk with only one DOF per sector, nearest-neighbor cou-pling, and perfect symmetry. Despite the simplicity of the model, we show that the resonant response can be quite complicated when the system is subjected to engine order excitation with mul-tiple orders. We begin by formulating the EOM, and then consider a direct (traditional) approach to deriving the response to traveling wave excitation. The forced response is then derived using the modal analysis based on the Fourier matrix, which decouples the EOM. The nature of the natural frequencies and modes is consid-ered next, which sets the stage for examining the resonance behavior of the system when subjected to engine order excitation. This provides a quite general view of the forced response of these models.
3.3.1 Equations of Motion. The undamped cyclic system to be considered is shown in Fig. 8 in dimensionless form. It consists of a cyclic chain of N identical and identically coupled single-DOF oscillators with unit mass, the dynamics of which are cap-tured by the dimensionless transverse displacements qi for i 2 N .The oscillators are uniformly attached around the circumference of a stationary rigid hub via linear elastic elements with unit stiff-ness and unit effective length. Adjacent masses are elastically coupled via linear springs, each with nondimensional stiffness .It is assumed that the elastic elements are unstressed when the oscillators are in a purely radial configuration, that is, when qi ¼ 0for each i 2 N . An individual oscillator, together with the for-ward-nearest-neighbor elastic coupling, forms one fundamental
sector and there are N such sectors in the overall system. The os-cillator chain has cyclic boundary conditions such that q0 ¼ qN
and qNþ1 ¼ q1. Finally, the system is subjected to engine order ex-citation (Sec. 3.2) according to
f iðtÞ ¼ fe j/i e jn rs ; i 2 N (80) where f is the strength of the excitation, the interphase blade angle
/i is defined by Eq. (64), n 2 Zþ is the excitation order, r is the angular speed, and s is time (all dimensionless). The linear dynamics of the ith sector are obtained using New-ton’s laws and are governed by
€qi þ q i þ t2ð qi1 þ 2qi qiþ1Þ ¼ fe j/i e jn rs ; i 2 N (81) where overdots denote differentiation with respect to dimension-less time s. In Eq. (81), the qi61 terms arise from the left-nearest-neighbor ( i 1) and right-nearest-neighbor ( i þ 1) elastic cou-pling. By stacking the N coordinates qi into the configuration vector q ¼ ð q1; q2; …; qN ÞT , the governing EOM for the overall
N-DOF system takes the form
€q þ K11 q ¼ f11 e jn rs ; i 2 N (82) where f11 ¼ ð fe j/1 ; fe j/2 ; …; fe j/N ÞT is the system forcing vector, which accounts for the constant phase difference in the dynamic loading from one sector to the next. The N N matrix
K11 ¼
1 þ 2t2 t2 0 … 0 t2
t2 1 þ 2t2 t2 … 0 00 t2 1 þ 2t2 … 0 0
... ... ... . .. ... ...
0 0 0 … 1 þ 2t2 t2
t2 0 0 … t2 1 þ 2t2
2666666666437777777775
(83) captures the nondimensional stiffness of each sector relative to the hub (additive unity along its diagonal) and the intersector cou-pling ( t2 along the super-diagonal and subdiagonal). The elements
t2 appearing in the (1, N) and ( N, 1) positions of K11 are due to the cyclic boundary conditions q0 ¼ q N and q Nþ1 ¼ q1 . In the ab-sence of these cyclic coupling terms, the system represents a finite chain of N oscillators. Thus, in addition to being symmetric, Eq. (83) is also a circulant and can be written as
K11 ¼ circ ð1 þ 2t2; t2; 0; …; 0; t2Þ 2 SC N (84) where 1 þ 2t2; t2; 0; …; 0; t2 are the N generating elements. In the absence of coupling (that is, if t ¼ 0) K11 is diagonal and Eq. (82) represents a decoupled set of N harmonically forced, single-DOF oscillators. The forced response of Eq. (82) is considered next with empha-sis on a modal analysis whereby the fully coupled system (that is, one in which t 6 ¼ 0) is reduced to a set of N single-DOF oscilla-tors, only one of which is harmonically excited. The approach taken here, and a generalization in which each sector has multiple DOFs, is applied to the linear system in Sec. 3.4 to block decouple the system matrices as it is done in Sec. 3.1.
3.3.2 Forced Response. The steady-state forced response of Eq. (82) can be obtained using standard techniques and, for nonresonant forcing, is given by
Fig. 8 Linear cyclic vibratory system with Nsectors and one DOF per sector 32
qss ðsÞ ¼ ð K11 n2r2IÞ1f11 e jn rs (85) where I is the N N identity matrix. However, this requires inver-sion of the impedance matrix K11 n2r2I, which is computation-ally expensive for a large number of sectors, and it offers little insight into the basic vibration characteristics. In what follows, a transformation based on the cyclic symmetry of the system is exploited to fully decouple the single N-DOF system to a set of N
single-DOF oscillators from which the steady-state response is easily obtained. The procedure is similar to the usual modal analy-sis from elementary vibration theory. However, a key difference is that the transformation matrix (and hence the system mode shapes) is known a priori and, because the transformation is uni-tary (thus preserving the system eigenvalues), the natural frequen-cies are obtained after the transformation is carried out. Moreover, due to orthogonality conditions between the normal modes and forcing vector, the steady-state response of the overall system reduces to finding the forced response of a single harmoni-cally forced, single-DOF oscillator in modal space, which offers a clear advantage over the direct computation of Eq. (85). As described in Sec. 3.2.2, engine order excitation can be regarded as traveling wave dynamic loading. It is therefore rea-sonable to expect steady-state solutions of the same type. We begin with a simple way to show the existence of such a response, and then systematically describe it using the modal analysis tech-niques described in Secs. 3.1.2 and 3.2.3.
Existence of a Traveling Wave Response. It is natural to search for steady-state solutions of the form
qss
i
ðsÞ ¼ Ae j/i e jn rs ; i 2 N (86) which has the same traveling wave characteristics as the engine order excitation described in Sec. 3.2.2. Equation (86) assumes that each sector responds with the same amplitude A, but with a constant phase difference relative to its nearest neighbors, and to-gether all N such solutions form a traveling wave response among the sectors. By mapping this trial solution into Eq. (81) and divid-ing through by the common term e j/i e jn rs , it follows that
ð nrÞ2A þ A þ t2 Ae junþ1 þ 2A Ae junþ1
¼ f (87) where the identity /i61 /i ¼ 6unþ1 is employed. Solving for the amplitude A yields
A ¼ f
1 þ 2t2ð1 cos unþ1Þ ð nrÞ2 (88) from which it follows that
xnþ1 ¼
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1 þ 2t2ð1 cos unþ1Þ
q
is one of the N natural frequencies of the coupled system corre-sponding to mode p ¼ n mod N þ 1. Equation (88) shows that mode n þ 1 is excited, but the reason is not clear from this approach. A modal analysis that considers the fully coupled sys-tem is required to systematically describe the response character-istics of the cyclic system under engine order excitation.
Modal Analysis. Theorem 9 guarantees that circulant matrices, such as the stiffness matrix defined by Eq. (84), are diagonalizable via a unitary transformation involving the Fourier matrix, and in what follows this property is exploited to fully decouple the matrix EOM defined by Eq. (82). To this end, the change of coordinates
qðsÞ ¼ Eu ðsÞ or q iðsÞ ¼ eTi uðsÞ; i 2 N (89) is introduced, where E is the N N complex Fourier matrix (Defini-tion 17), ei is its ith column (Definition 18), and u ¼ ð u1; u2; …; uN ÞTis a vector of modal, or cyclic coordinates. Substituting Eq. (89) in Eq. (82) and multiplying from the left by EH yields
EHE€u þ EHK11 Eu ¼ EHf11 e jn rs (90) where EHE ¼ I because E is unitary (Theorem 6). In light of Theorem 9, it follows that
€u1
€u2
...€uN
26666643777775
þ
x21 0
x22
. ..
0 x2
N
26666643777775
u1
u2
...
uN
26666643777775
¼
eH
1
f11
eH
2
f11
...
eH
N
f11
26666643777775
e jn rs (91) where the pth scalar element of the N 1 modal forcing vector
EHf11 is eH
p
f11 . Decomposition of EHf11 follows from Eq. (60) by replacing the identity matrix IM with unity and the vector bf with
f11 . Equation (89) is a unitary (similarity) transformation and hence the system natural frequencies are preserved, which is guar-anteed by Theorem 1. For each p 2 N , the dimensionless natural frequencies follow from Eq. (21) and are given by
x2
p
¼ 1 þ 2t2 t2wðp1Þ
N
þ 0 þ þ 0 t2wðN1Þð p1Þ
N
¼ 1 þ 2t2 t2 wðp1Þ
N
þ wðN1Þð p1Þ
N
¼ 1 þ 2t2ð1 cos upÞ
(92) where w N is the primitive Nth root of unity and the identity
wðp1Þ
N
þ wðN1Þð p1Þ
N
¼ 2 cos up is employed. Equation (91) is a decoupled set of N single-DOF harmonically forced modal oscil-lators of the form
€up þ x2
p
up ¼ eH
p
f11 e jn rs ; p 2 N (93) Thus, the single N-DOF system given by Eq. (82) is transformed to a system of N decoupled single-DOF systems defined by Eq. (93). The steady-state, nonresonant modal response of the pth decoupled system follows from Eq. (93) using standard techniques . Assuming harmonic motion, the solution is
uss
p
ðsÞ ¼ eH
p
f11
x2
p
ð nrÞ2 e jn rs ; p 2 N (94) from which the steady-state modal response vector
uss ðsÞ ¼ uss 1 ðsÞ; uss 2 ðsÞ; …; uss
N
ðsÞ
T is constructed. In physical coordinates, the steady-state response of sector i follows from Eq. (89) and is given by
qss
i
ðsÞ ¼ eTi uss ðsÞ¼ 1ffiffiffiffi
N
p e j0ui ; ej1ui ; …; e jðN1Þui
uss 1 ðsÞ; uss 2 ðsÞ; …; uss
N
ðsÞ
T
¼ XNp¼11ffiffiffiffi
N
p e jðp1Þui uss
p
ðsÞ¼ XNp¼11ffiffiffiffi
N
p e jup ði1Þ eH
p
f11
x2
p
ð nrÞ2 e jn rs
¼ 1ffiffiffiffi
N
p XNp¼1
eH
p
f11
x2
p
ð nrÞ2e jði1Þup e jn rs ; i 2 N
(95) where the identity ðp 1Þui ¼ upði 1Þ is employed. Equation (95) shows that there are N possible resonances, depending on the details of the modal forcing terms eH
p
f11 . However, only a single
mode survives under an engine order excitation of order n, which 33 is clear from the orthogonality condition described in Sec. 3.2.3. Noting that f11 ¼ f f0 ¼ ffiffiffiffi
N
p f enþ1 , it follows from Eq. (72) that
eH
p
f11 ¼ ffiffiffiffi
N
p f eH
p
enþ1
¼ ffiffiffiffi
N
p f dpðnþ1Þ¼
ffiffiffiffi
N
p f ; p ¼ n þ 10; otherwise
( (96) which shows that the force vector f11 is mutually orthogonal to all but one of the modal vectors ep. That is, for p 2 N , the only excited mode is
p ¼ n mod N þ 1 (97) for an engine order n 2 Zþ excitation. Thus, Eq. (95) reduces to
qss
i
ðsÞ ¼ f
x2
nþ1
ð nrÞ2 e j/i e jn rs ; i 2 N (98) where the identity ði 1Þunþ1 ¼ /i is employed and
x2
nþ1
¼ 1 þ 2t2ð1 cos unþ1Þ
from Eq. (92). Equation (98) is the same result as that obtained from Eq. (88). Indeed, the process described here is significantly more laborious than the direct approach, but many general fea-tures can be gleaned from the analysis. The eigenfrequency char-acteristics (Sec. 3.3.3), normal modes of vibration (Sec. 3.3.4), and resonance structure (Sec. 3.3.5) are systematically described based on the modal decomposition results of this section.
3.3.3 Eigenfrequency Characteristics. The dimensionless nat-ural frequencies follow from Eq. (92) and are given by
xp ¼
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1 þ 2t2ð1 cos upÞ
q
; p 2 N (99) which clearly exhibit the effect of cyclic coupling. For the special case of t ¼ 0, the sectors are dynamically isolated and each has the same natural frequency xp ¼ 1. There are repeated natural fre-quencies for nonzero coupling ðt 6 ¼ 0Þ, a degeneracy that is due to the circulant structure of K. This is captured by the cyclic term cos up ¼ cos 2pðp 1Þ
N
¼ Re w p1
N
(100) which is obtained by projecting the powers of the Nth roots of unity onto the real axis (see Fig. 2). Multiplicity of the eigenfre-quencies can also be visualized in Fig. 9, which shows the dimen-sionless natural frequencies in terms of the number of nodal diameters (n.d.) in their attendant mode shapes versus: the mode number p for the special case of N ¼ 10 sectors; the wave type (i.e., BTW, FTW, or SW); the number of n.d.; and the sector num-ber i. 3 Results are shown for weak coupling (WC), strong cou-pling (SC), odd N (Fig. 9( a)), and even N (Fig. 9( b)). These cyclic features are described in terms of mode numbers
p 2 N ¼ P O;ESW [ P O;EBTW [ P O;EFTW where each subset is defined in Table 5. A description of the BTW, FTW, and SW designations of these sets is deferred to Sec 3.3.4. The natural frequency corresponding to mode p ¼ 1 2 P O;ESW (zero harmonic of Eq. (100)) is distinct, but the remaining natural frequencies appear in repeated pairs, except for the case of even
N, in which case the p ¼ ð N þ 2Þ=2 2 P ESW frequency ( N/2 har-monic) is also distinct. There are ( N 1)/2 such pairs if N is odd, and these correspond to mode numbers in POBTW and POFTW ,respectively. For even N there are ( N 2)/2 repeated natural fre-quencies corresponding to mode numbers in PEBTW and PEFTW .Finally, if k 2 P O;EBTW then the mode number of the corresponding repeated eigenfrequency is N þ 2 k 2 P O;EFTW . The normal modes
Table 5 Sets of mode numbers p ‰ N corresponding to BTW, FTW, and SW normal modes of free vibration for odd and even N
N Type Set Odd BTW POBTW ¼ p 2 Zþ : 2 n N þ 12
FTW POFTW ¼ p 2 Zþ : N þ 32 n N
SW POSW ¼ 1f g
Even BTW PEBTW ¼ p 2 Zþ : 2 n N
2
FTW PEFTW ¼ p 2 Zþ : N þ 42 n N
SW PESW ¼ 1; N þ 22
Fig. 9 Dimensionless natural frequencies xp in terms of the number of n.d. versus mode number p for WC and SC: ( a)
N 5 11 (odd) and ( b) N 5 10 (even). Also indicated below each figure is, for general N, the number of n.d. at each value of p
and also the mode numbers corresponding to SW, BTW, and FTW.
3A mode shape nodal diameter refers to a line of zero sector responses across which adjacent sectors respond out of phase. For example, in Fig. 11 of Sec. 3.3.4, mode 1 has 0 n.d., modes 2 and 100 have 1 n.d., modes 3 and 99 have 2 n.d., and so on.
34 of vibration are described next, where it is shown that each can be categorized as a SW, BTW, or FTW.
3.3.4 Normal Modes of Vibration. It was shown that Eq. (82) can be decoupled via a unitary transformation involving the Fou-rier matrix E ¼ ð e1; e2; …; eN Þ. As a consequence, ep is the pth normal mode of vibration corresponding to the natural frequency
xp. In what follows these mode shapes are characterized by inves-tigating the free response of the system, and it is shown that they are of the SW, BTW, or FTW variety. The free response of the system in its pth mode of vibration can be described by
qðpÞ ðsÞ ¼ a pep e j xp s
where ap is a modal amplitude and the natural frequency xp is defined by Eq. (99). There is generally a phase angle as well, which is omitted because its presence does not affect the arguments that follow. Noting that element i of ep can be written as wðp1Þð i1Þ
N
¼ e jup ði1Þ, the free response of sector i can be written in real form as
qðpÞ
i
ðsÞ ¼ ap cos ðupði 1Þ þ xpsÞ¼ ap cos up i 1 þ xp
up
s
!!
¼ apUpði 1 þ C psÞ; i; p 2 N
(101) where Cp ¼ xp=up and the function UpðvÞ is defined by Eq. (65). Equation (101) is a function of continuous time s and it is discre-tized according to the sector number i. In this way, it is endowed with the same discrete temporal and continuous spatial duality that is described in Sec. 3.2.2 in the context of traveling wave engine order excitation. That is, it can be regarded as the time–res-ponse of individual (discrete) sectors, or a continuous spatial vari-ation of displacements among the sectors that evolves with increasing time (i.e., a traveling wave). The propagating wave-form is strictly a BTW in the negative i-direction (descending sec-tor number) with wavelength 2 p=up ¼ N=ðp 1Þ and speed C p,an illustration of which is shown in Fig. 10. However, depending on the value of p, this gives rise to SW, BTW, or FTW mode shapes, a property that follows analogously from the features described in Sec. 3.2.2, where it is seen that Eq. (101) has the same form as Eq. (66). For the special case of p ¼ 1 it is clear from Eq. (101) that each sector behaves identically with the same amplitude and the same phase because u1 ¼ 0. An additional special case occurs when
p ¼ (N þ 2)/2 if N is even. Then uðNþ2Þ=2 ¼ p and each sector has the same amplitude but adjacent sectors oscillate with a 180-deg phase difference. In this case, the vibration modes p 2 P O;ESW corre-spond to SW mode shapes whose characteristics can be visualized in Figs. 7( b) and 7( d) by replacing the amplitude F with ap. The remaining mode shapes correspond to repeated natural frequen-cies and are either BTWs or FTWs. In particular, the normal modes p 2 P O;EBTW (resp. p 2 P O;EFTW ) are backward (resp. forward) traveling waves and can be visualized in Fig. 7( a) (resp. Fig 7( c)). If mode k 2 P O;EBTW is a BTW corresponding to a natural frequency
xk, then the attendant FTW mode is N þ 2 k 2 P O;EFTW with the same natural frequency xNþ2k ¼ xk.Figure 11 illustrates the normal modes of free vibration for a model with N ¼ 100 sectors. In this figure, the extent of the radial lines represents sector displacements. Those appearing outside the hub are to be interpreted as being positively displaced relative to their zero positions, and the opposite is true for lines inside the hub. Modes 1 and 51 are SWs, modes 2–50 are BTWs, and modes 52–100 are FTWs. Finally, the number of nodal diameters can be clearly identi-fied in Fig. 11. For example, modes 4 and 98 have 3 n.d.
3.3.5 Resonance Structure. In general, there may be a system resonance if the excitation frequency matches a natural frequency, that is, if nr ¼ xp. These possible resonances are conveniently identified in a Campbell diagram , an example of which is shown in Fig. 12( a) for engine orders n 2 N (the general case of n 2 Zþ
is considered below), N ¼ 10, and ¼ 0:5. The natural frequen-cies are plotted in terms of the dimensionless rotor speed and sev-eral engine order lines n r are superimposed. Possible resonances correspond to intersections of the order lines and eigenfrequency loci. There are ðN þ 2Þ=2 such possibilities for each engine order if N is odd and ðN þ 1Þ=2 possible resonances if N is even. In light of Eq. (96), however, there is only a single resonance associated with each n under the traveling wave dynamic loading of Sec. 3.2, which corresponds to mode p ¼ n mod N þ 1. The set of N
resonances for a system excited by N engine orders
ðn ¼ 1; 2; …; NÞ are indicated by the black dots in Fig. 12( a) and the corresponding frequency response curves jqss
i
ðsÞj (for each n)are shown in Fig. 12( b) for a model with f ¼ 0.01. For example, a 3 e.o. excitation resonates mode 4 ( p ¼ 4), which is a BTW with 3 n.d. Mode 8 ( p ¼ 4) also has 3 n.d. and is excited by a 7 e.o. exci-tation. The TW and n.d. designations can be verified in Fig. 9. The basic resonance structure shown in Fig. 12( a) for n 2 N
essentially aliases relative to the total number of sectors, in the sense that the excited modes for n ¼ mN þ 1; …; ðm þ 1ÞN with
m 2 Zþ are the same as those for n 2 N . This follows from the orthogonality condition given by Eq. (96) and is manifested in Eq. (97), which gives a relationship for the excited mode in terms of the engine order n and total number of sectors N. Because
n > 0 by assumption (see Sec. 3.2) the first mode ( p ¼ 1) is excited when n ¼ mN ¼ 10 ; 20 ; 30 ; …, the second mode ( p ¼ 2) is excited when n ¼ 1 þ mN ¼ 1; 11 ; 21 ; …, and so on. Table 6 summarizes these conditions for a model with N ¼ 10 sectors and the corresponding resonance structure for n ¼ N 1; …; 20 N is shown in Fig. 13( a). Each collection of resonance points
n ¼ mN þ 1; …; ðm þ 1ÞN is qualitatively the same in structure. However, for m > 1 the resonances become increasingly clustered, which is shown in Fig. 13( b) for n ¼ N; …; 2N. In terms of the sets defined in Tables 4 and 5, an engine order n mod N 2 N O;ESW excites a SW mode p 2 P O;ESW . Similarly, an engine order
n mod N 2 N O;EFTW (resp. n mod N 2 N O;EBTW ) excites a FTW (resp. BTW) mode p 2 P O;EFTW (resp. p 2 P O;EBTW ). While each engine order excites only a single mode, realistic excitation it composed of multiple harmonics (that is, orders), so that many modes can be excited. The nature of the natural fre-quencies and the order excitation lines leads to nontrivial reso-nance behavior even in the case of perfect symmetry. Of course, as noted elsewhere in this paper, imperfections that disturb the symmetry lead to even more complicated responses, in which ev-ery intersection between e.o. and natural frequency lines can lead to a resonance. These are especially important when the intersec-tor coupling is small.
Fig. 10 Abackward traveling wave apUpði11CpsÞ
5apcos ðupði21Þ1xpsÞwith amplitude ap, wavelength 2 p=up
5N=ðp21Þ, and speed Cp5xp=up35
3.4 Cyclic System With Two DOFs Per Sector. This exam-ple generalizes the one DOF per sector model of Sec. 3.3 to a sim-ple system with two DOFs per sector, which demonstrates the process of block diagonalizing the EOM when there are multiple DOFs per sector. The mathematics of the decoupling process described here applies equally as well to models with two or N
DOFs per sector. Of course, the nature of the natural frequencies and mode shapes depend on the details of each sector model which, for the cyclic system considered here, is discussed in Refs. [92–94]. There is much more to the topic of multiple DOFs per sector; the reader is referred to the works of Ottarsson [97,114] and Bladh [29,115–117] for more details and more complex examples.
3.4.1 Equations of Motion. The nondimensional bladed disk model shown in Fig. 14( a) consists of a rotationally periodic array of N identical, identically coupled sector models (Fig. 14( b)). The disk has radius d and rotates with a fixed speed r about an axis through C. Each blade is modeled by a simple pendulum with unit mass and length, the dynamics of which are captured by the nor-malized angles x i with i 2 N . The blades are attached to the rotat-ing disk via linear torsional springs with unit stiffness, and adjacent blades are elastically coupled by linear springs with stiff-ness . It is assumed that the springs are unstretched when the blades are in a purely radial configuration, that is, when each
x i ¼ 0. As shown in the inset of Fig. 14( b), each blade is fitted with a pendulum like, circular-path vibration absorber with radius
c and mass l at an effective distance a along the blade length. The absorber dynamics are captured by the normalized pendulum angles yi, which are physically limited to jy ij 1 by stops that represent the rattling space limits imposed by the blade geometry. This feature is included for generality, but in all of what follows it is assumed that jyij < 1, i.e., that impacts do not occur. Linear
Fig. 11 Normal modes of free vibration for a model with N5100 sectors. Mode 1 consists of a SW, in which each sector oscillates with the same amplitude and phase. Mode 51 also corresponds to a SW, but neighboring oscillators oscillate exactly 180 deg out of phase. Modes 2–50 (resp. 52–100) consist of BTWs (resp. FTWs). 36
viscous damping is also included at the spring locations, but is not indicated in Fig. 14. Blade and interblade damping is captured by linear torsional and translational dampers with constants nb and nc,respectively, and the absorber damping is captured by a torsional damper with constant na. Finally, the system is subjected to the traveling wave dynamic loading defined by Eq. (80), as shown in Fig. 14( b).
Sector Model. The EOM for each two-DOF sector are derived using Lagrange’s method and linearized for small motions of the primary and absorber systems, that is, for small xi and yi. Then for each i 2 N , the dynamics of the ith sector are governed by [92,93]
lc 2ð€x i þ €y iÞ þ na _y i þ lcdr 2ðx i þ y iÞþ lca ð€x i þ r2y iÞ ¼ 0 (102 a)
€x i þ nb _x i na _y i þ x i þ dr 2x i
þ l a2 €x i þc2ð€x i þ €y iÞ þ ac ð€y i þ 2€x iÞþadr 2x i þ cdr 2ðx i þ y iÞ
" #
þ ncð _xi 1 þ 2 _x i _x iþ1Þþ 2ð xi 1 þ 2x i x iþ1Þ ¼ fe j/i e jn rs (102 b)where Eq. (102 a) describes the absorber dynamics and Eq. (102 b)describes the blade dynamics. The indices i are taken mod N
such that x Nþ1 ¼ x1 and x0 ¼ x N , which are cyclic boundary con-ditions implying that the Nth blade is coupled to the first. In matrix–vector form, and for each i 2 N , Eq. (102) becomes
M€zi þ C_zi þ Kz iþCcð _zi1 þ 2_zi _ziþ1Þþ Kcð zi1 þ 2zi ziþ1Þ¼ fe j/i e jn rs
9>=>; (103) where zi ¼ x i; yið ÞT captures the sector dynamics, f ¼ f ; 0ð ÞT is a sector forcing vector, and the elements of the sector mass, damp-ing, and stiffness matrices are defined in Table 7. The matrices
Cc ¼ nc 00 0
" #
; Kc ¼ 2 00 0
" #
(104) capture the interblade coupling and vanish if nc ¼ ¼ 0, in which case Eq. (103) describes the forced motion of N isolated blade/ absorber systems.
System Model. By stacking each zi into the configuration vector
q ¼ z1; z2; …; zNð ÞT , the governing matrix EOM for the overall 2N-DOF system takes the form
bM€q þ bC _q þ bKq ¼ bfe jn rs (105) where bM 2 BCBS 2;N is block diagonal with diagonal blocks M
and bK 2 BCBS 2;N has generating matrices K þ 2Kc; Kc;
0; …; 0; Kc. The matrix bC 2 BCBS 2;N is similarly defined by replacing K with C and Kc with Cc in bK. In terms of the circulant
Fig. 12 (a) Campbell diagram and ( b) corresponding frequency response curves jqss
i
ðsÞj for N 5 10, m 5 0:5, f 5 0.01, and each
n 5 1; 2; . . . ; N
Table 6 Condition on the engine order n ‰ Zþ to excite mode
p ‰ N for N 5 10
Excited mode Conditions on engine order n
1 mN ¼ 10 ; 20 ; 30 ; …2 1 þ mN ¼ 1; 11 ; 21 ; …3 2 þ mN ¼ 2; 12 ; 22 ; …
... ...
N 1 N 2 þ mN ¼ 8; 18 ; 28 ; …
N N 1 þ mN ¼ 9; 19 ; 29 ; …
Fig. 13 (a) Campbell diagram for N 5 10, m 5 0:5, f 5 0.01, and
n 5 1; . . . ; 20 N and ( b) the corresponding frequency response curves jqss
i
ðsÞj corresponding to n 5 N; . . . ; 2N. Engine order lines are not shown for n 5 N 1 1; N 1 2; . . . ; 2N 2 1, and so on. 37 operator, the system mass, damping, and stiffness matrices are defined by
bM ¼ circ ðM; 0; 0; …; 0; 0Þ
bC ¼ circ ðC þ 2Cc; Cc; 0; …; 0; CcÞ
bK ¼ circ ðK þ 2Kc; Kc; 0; …; 0; KcÞ
9>>=>>;
(106) The 2 N 1 system forcing vector is
bf ¼ fej/1 ; fe j/2 ; …; fej/N
T
¼ f0 f (107) where the N 1 vector f0 is defined by Eq. (69) and the interblade phase angle /i is given by Eq. (64).
3.4.2 Forced Response. The forced response of the overall system defined by Eq. (105) can be handled directly using stand-ard techniques . Its nonresonant solution in the steady-state follows in the usual way and is given by
qss ðsÞ ¼ bZ1bfe jn rs (108) where bZ ¼ bK n2r2 bM þ jn rbC is the system impedance matrix of dimension 2 N 2N. However, Eq. (108) does not offer any insight into the system’s modal characteristics and it requires computation of bZ1 , which can be prohibitive for practical bladed disk models with many sectors and many DOFs per sector. We thus turn to a decoupling strategy that exploits the system symme-try and the theory developed in Sec. 2. The analysis follows simi-larly to that presented in Sec. 3.1, except in this case the single coupled 2 N-DOF system is transformed into a set of N block decoupled two-DOF systems. To this end, we introduce the change of coordinates
q ¼ ð E IÞu; or zi ¼ ð eTi IÞu; i 2 N (109) where E is the N N complex Fourier matrix and ei is its ith col-umn, is the Kronecker product, I is the 2 2 identity matrix (the dimension of I corresponds to the number of DOFs per sec-tor), and u ¼ u1; u2; …; uNð ÞT is a vector of modal, or cyclic coor-dinates. Each up is 2 1 and describes the sector dynamics in modal space. Substituting Eq. (109) into Eq. (105), multiplying from the left by the unitary matrix ðE IÞ H ¼ ð EH IÞ, and invoking Theorem 10 yields a system of N block decoupled equa-tions, each with two DOFs. They are
eMp €up þ eCp _up þ eKpup ¼ ð eH
p
IÞbfe jn rs ; p 2 N (110) where ðeH
p
IÞbf is the pth 2 1 block of ðEH IÞbf. Equation (110) is analogous to the N M -DOF systems given by Eq. (61) for the general formulation in Sec. 3.1, but in this case M ¼ 2 and engine order excitation is assumed from the onset. Figure 15 illus-trates the transformation of the single 2 N-DOF system given by Eq. (105) to a system of N block decoupled two-DOF forced oscil-lators defined by Eq. (110). The 2 2 mass, damping, and stiffness matrices associated with the pth mode follow from Theorem 10 and are given by
eMp ¼ M
eCp ¼ C þ 2Ccð1 cos upÞ
eKp ¼ K þ 2Kcð1 cos upÞ
9>>=>>;
; p 2 N (111) where up is defined by Eq. (16), the elements of M, C, and K are defined in Table 7 and the coupling matrices Cc and Kc are defined by Eq. (104). In light of Eqs. (70) and (71), the pth modal forcing vector takes the form
ðeH
p
IÞbf ¼ ð eH
p
IÞð f0 fÞ¼ eH
p
f0 f (112)
¼
ffiffiffiffi
N
p f; p ¼ n þ 1
0; otherwise
(
Fig. 14 (a) Model of bladed disk assembly and ( b) sector model Table 7 Elements of the sector mass, damping, and stiffness matrices M, C, and K
Matrix Notation Elements Mass MM11 ¼1þlðaþcÞ2
M12 ¼lc ðaþcÞ
M21 ¼M12
M22 ¼lc 2Damping CC11 ¼nbC12 ¼ naC21 ¼0
C22 ¼na
Stiffness KK11 ¼1þ1þlðaþcÞðÞdr 2
K12 ¼lcdr 2
K21 ¼K12
K22 ¼lc a þdðÞr238
where 0 ¼ (0,0) T and the scalar product eH
p
f0 vanishes except for
p ¼ n þ 1. Because only mode p ¼ n þ 1 is excited, unþ1ðsÞ is the only nonzero modal response in the steady-state. Assuming harmonic motion, and in light of Eq. (112), the pth steady-state modal response follows easily from Eq. (110) and is given by
uss
p
ðsÞ ¼
ffiffiffiffi
N
p eZ1
nþ1
fe jn rs ; p ¼ n þ 1
0; otherwise
(
(113) where
eZp ¼ eKp n2r2 eMp þ jn reCp; p 2 N (114) is the pth modal impedance matrix. The response of sector i (in physical coordinates) follows from the transformation given by Eq. (109) with
uss ðsÞ ¼ ð 0; …; 0; uss
nþ1
ðsÞ; 0; …; 0ÞTand is given by
zss
i
ðsÞ ¼ eZ1
nþ1
fe j/i e jn rs ; i 2 N (115) where w nði1Þ ¼ e j/i is employed. From Eq. (115) it is clear that each blade/absorber combination behaves identically except for a constant phase shift from one sector to another, which is captured by the interblade phase angle /i. This approach offers a signifi-cant computational advantage over the direct solution to the full 2N-DOF system, as given by Eq. (108).
4 Conclusions
The goal of this paper is to provide the mathematical tools for handling circulant matrices as they apply to the free and forced vibration analysis of structures with cyclic symmetry. As demon-strated by past work in this area and the review provided here, the theory of circulants provides a useful description of the fundamen-tal structure of the mode shapes and spectrum of systems with cyclic symmetry, including those of large scale. The theory also provides a convenient means for computing the vibration response of these systems, even when the idealized symmetry is broken by mistuning or by nonlinear effects. As with any mathematical tool, the overhead in learning it must provide appropriate benefit, whether in terms of fundamental understanding, insight, or ease of computation. We trust that the results presented here offer such benefits to readers interested in vibration analysis of cyclic systems. It must be noted that no physical system has perfect symmetry, as assumed herein. This assumption must be examined in light of the system under consideration. One key to the suitability of a cyclically symmetric model is the intersector coupling. If the cou-pling is strong, so that the pairs of modes have well separated fre-quencies, then small imperfections will not alter the picture substantially, and one can consider each mode pair as robust against coupling to other modes. However, if the coupling is weak, so that the system frequencies are clustered near those of the isolated sector model, the possibility of localization is signifi-cantly increased. This topic has been investigated quite thor-oughly, primarily in the context of the vibration of bladed disk assemblies with small blade mistuning; see, for example, [72–88]. Also, nonlinear effects can couple linear modes under certain res-onance conditions, even at small amplitudes . In cyclic sys-tems this can occur for the pairs of modes with equal frequencies , and this possibility expands to groups of modes for the case of weak coupling, leading to extremely complicated behavior [82,84,88]. In such cases, the tools from group theory can be applied to categorize the possible modes and forced response in terms of their symmetries . This topic, while interesting, is outside the scope of the present paper.
Acknowledgment
The work of the second author related to this topic was funded by the National Science Foundation, currently by Grant No. CMMI-1100260.
References
Bladh, J. R., Pierre, C., Castanier, M. P., and Kruse, M. J., 2002, “Dynamic Response Predictions for a Mistuned Industrial Turbomachinery Rotor Using Reduced-Order Modeling,” ASME J. Eng. Gas Turbines Power, 124 (2), pp. 311–324. Brillouin, L., 1953, Wave Propagation in Periodic Structures , Dover, New York. Ewins, D. J., 1973, “Vibration Characteristics of Bladed Disc Assemblies,” J. Mech. Eng. Sci., 15 (3), pp. 165–186. Ewins, D. J., 1976, “Vibration Modes of Mistuned Bladed Disks,” ASME J. Eng. Power, 98 (3), pp. 349–355.
Fig. 15 The topology of a bladed disk assembly fitted with absorbers in ( a) physical space and ( b) modal space. The modal transformation qðsÞ 5 ðE IÞuðsÞ reduces the cyclic array of
N, two-DOF sector models ðB; AÞ, which together form a 2 N-DOF coupled system, to a set of
N, two-DOF block decoupled models ðB p ; Ap Þ.39 Dye, R. C. F., and Henry, T. A., 1969, “Vibration Amplitudes of Compressor Blades Resulting From Scatter in Blade Natural Frequencies,” ASME J. Eng. Power, 91 (3), pp. 182–188. Ewins, D. J., 1969, “The Effect of Detuning Upon the Forced Vibrations of Bladed Disks,” J. Sound Vib., 9(1), pp. 65–79. Fabunmi, J., 1980, “Forced Vibration of a Single Stage Axial Compressor Rotor,” ASME J. Eng. Power, 102 (2), pp. 322–329. Orris, R. M., and Petyt, M., 1974, “A Finite Element Study of Harmonic Wave Propagation in Periodic Structures,” J. Sound Vib., 33 (2), pp. 223–236. Thomas, D. L., 1974, “Standing Waves in Rotationally Periodic Structures,” J. Sound Vib., 37 (2), pp. 288–290. Thomas, D. L., 1979, “Dynamics of Rotationally Periodic Structures,” Int. J. Numer. Methods Eng., 14 (1), pp. 81–102. Wildheim, J., 1981, “Excitation of Rotating Circumferentially Periodic Structures,” J. Sound Vib., 75 (3), pp. 397–416. Wildheim, J., 1981, “Vibrations of Rotating Circumferentially Periodic Structures,” Q. J. Mech. Appl. Math., 34 (2), pp. 213–229. Fricker, A. J., and Potter, S., 1981, “Transient Forced Vibration of Rotation-ally Periodic Structures,” Int. J. Numer. Methods Eng., 17 (7), pp. 957–974. Williams, F. W., 1986, “An Algorithm for Exact Eigenvalue Calculations for Rotationally Periodic Structures,” Int. J. Numer. Methods Eng., 23 (4), pp. 609–622. Williams, F. W., 1986, “Exact Eigenvalue Calculations for Structures With Rotationally Periodic Substructures,” Int. J. Numer. Methods Eng., 23 (4), pp. 695–706. Cai, C. W., Cheung, Y. K., and Chan, H. C., 1990, “Uncoupling of Dynamic Equations for Periodic Structures,” J. Sound Vib., 139 (2), pp. 253–263. Shen, I. Y., 1994, “Vibration of Rotationally Periodic Structures,” J. Sound Vib., 172 (4), pp. 459–470. Kim, M., Moon, J., and Wickert, J. A., 2000, “Spatial Modulation of Repeated Vibration Modes in Rotationally Periodic Structures,” ASME J. Vib. Acoust.,
122 (1), pp. 62–68. Kaveh, A., 2013, “Introduction to Symmetry and Regularity,” Optimal Analysis of Structures by Concepts of Symmetry and Regularity , Springer, New York, pp. 1–14. Shi, C., and Parker, R. G., “Vibration Mode and Natural Frequency Structure of General Cyclically Symmetric Systems,” Proc. R. Soc. A (submitted). Olson, B., and Shaw, S., 2010, “Vibration Absorbers for a Rotating Flexible Structure With Cyclic Symmetry: Nonlinear Path Design,” Nonlinear Dyn.,
60 (1–2), pp. 149–182. Gozen, S., Olson, B., Shaw, S., and Pierre, C., 2012, “Resonance Suppression in Multi-Degree-of-Freedom Rotating Flexible Structures Using Order-Tuned Absorbers,” ASME J. Vib. Acoust., 134 (6), p. 061016. Petrov, E. P., 2004, “A Method for Use of Cyclic Symmetry Properties in Analysis of Nonlinear Multiharmonic Vibrations of Bladed Disks,” ASME J. Turbomach., 126 (1), pp. 175–183. Jacquet-Richardet, G., Ferraris, G., and Rieutord, P., 1996, “Frequencies and Modes of Rotating Flexible Bladed Disc-Shaft Assemblies: A Global Cyclic Symmetry Approach,” J. Sound Vib., 191 (5), pp. 901–915. Castanier, M. P., Ottarsson, G., and Pierre, C., 1997, “A Reduced Order Mod-eling Technique for Mistuned Bladed Disks,” ASME J. Vib. Acoust., 119 (3), pp. 439–447. Omprakash, V., and Ramamurti, V., 1988, “Natural Frequencies of Bladed Disks by a Combined Cyclic Symmetry and Rayleigh–Ritz Method,” J. Sound Vib., 125 (2), pp. 357–366. Laxalde, D., Thouverez, F., and Lombard, J. P., 2007, “Dynamical Analysis of Multi-Stage Cyclic Structures,” Mech. Res. Commun., 34 (4), pp. 379–384. Laxalde, D., Lombard, J. P., and Thouverez, F., 2007, “Dynamics of Multistage Bladed Disks Systems,” ASME J. Eng. Gas Turbines Power,
129 (4), pp. 1058–1064. Bladh, J. R., 2001, “Efficient Predictions of the Vibratory Response of Mis-tuned Bladed Disks by Reduced Order Modeling,” Ph.D. thesis, University of Michigan, Ann Arbor, MI. Chang, J. Y., and Wickert, J. A., 2002, “Measurement and Analysis of Modu-lated Doublet Mode Response in Mock Bladed Disks,” J. Sound Vib., 250 (3), pp. 379–400. Lin, J., and Parker, R. G., 1999, “Analytical Characterization of the Unique Properties of Planetary Gear Free Vibration,” ASME J. Vib. Acoust., 121 (3), pp. 316–321. Lin, J., and Parker, R. G., 2000, “Structured Vibration Characteristics of Planetary Gears With Unequally Spaced Planets,” J. Sound Vib., 233 (5), pp. 921–928. Parker, R. G., 2000, “A Physical Explanation for the Effectiveness of Planet Phasing to Suppress Planetary Gear Vibration,” J. Sound Vib., 236 (4), pp. 561–573. Kiracofe, D. R., and Parker, R. G., 2007, “Structured Vibration Modes of General Compound Planetary Gear Systems,” ASME J. Vib. Acoust., 129 (1), pp. 1–16. Wu, X., and Parker, R. G., 2008, “Modal Properties of Planetary Gears With an Elastic Continuum Ring Gear,” ASME J. Appl. Mech., 75 (3), p. 031014. Eritenel, T., and Parker, R. G., 2009, “Modal Properties of Three-Dimensional Helical Planetary Gears,” J. Sound Vib., 325 (1), pp. 397–420. Guo, Y., and Parker, R. G., 2010, “Purely Rotational Model and Vibration Modes of Compound Planetary Gears,” Mech. Mach. Theory, 45 (3), pp. 365–377. Parker, R. G., and Wu, X., 2010, “Vibration Modes of Planetary Gears With Unequally Spaced Planets and an Elastic Ring Gear,” J. Sound Vib., 329 (11), pp. 2265–2275. Cooley, C. G., and Parker, R. G., 2012, “Vibration Properties of High-Speed Planetary Gears With Gyroscopic Effects,” ASME J. Vib. Acoust., 134 (6), p. 061014. Bahk, C. J., and Parker, R. G., 2011, “Analytical Solution for the Nonlinear Dynamics of Planetary Gears,” ASME J. Comput. Nonlinear Dyn., 6(2), p. 021007. Cooley, C. G., and Parker, R. G., 2013, “Mechanical Stability of High-Speed Planetary Gears,” Int. J. Mech. Sci., 69 , pp. 59–71. Lin, J., and Parker, R. G., 2002, “Planetary Gear Parametric Instability Caused by Mesh Stiffness Variation,” J. Sound Vib., 249 (1), pp. 129–145. Parker, R. G., and Wu, X., 2012, “Parametric Instability of Planetary Gears Having Elastic Continuum Ring Gears,” ASME J. Vib. Acoust., 134 (4), p. 041001. Wu, X., and Parker, R. G., 2006, “Vibration of Rings on a General Elastic Foundation,” J. Sound Vib., 295 (1), pp. 194–213. Ivanov, V. P., 1971, “Some Problems of the Vibrations of Blading Rings and Other Elastic Bodies With Cyclic Symmetry,” Prochn. Din. Aviats. Dvigatelei,
6, pp. 113–132. Yu, R. C., and Mote, C. D., Jr., 1987, “Vibration and Parametric Excitation in Asymmetric Circular Plates Under Moving Loads,” J. Sound Vib., 119 (3), pp. 409–427. Parker, R. G., and Mote, C. D., Jr., 1991, “Tuning of the Natural Frequency Spectrum of a Circular Plate by In-Plate Stress,” J. Sound Vib., 145 (1), pp. 95–110. Tseng, J. G., and Wickert, J. A., 1994, “On the Vibration of Bolted Plate and Flange Assemblies,” ASME J. Vib. Acoust., 116 (4), pp. 468–473. Shahab, A. A. S., and Thomas, J., 1987, “Coupling Effects of Disc Flexibility on the Dynamic Behaviour of Multi Disc-Shaft Systems,” J. Sound Vib.,
114 (3), pp. 435–452. Kim, H., and Shen, I.-Y., 2009, “Ground-Based Vibration Response of a Spin-ning, Cyclic, Symmetric Rotor With Gyroscopic and Centrifugal Softening Effects,” ASME J. Vib. Acoust., 131 (2), p. 021007. Kim, H., Colonnese, N. T. K., and Shen, I. Y., 2009, “Mode Evolution of Cyclic Symmetric Rotors Assembled to Flexible Bearings and Housing,” ASME J. Vib. Acoust., 131 (5), p. 051008. Shaw, S. W., and Pierre, C., 2006, “The Dynamic Response of Tuned Impact Absorbers for Rotating Flexible Structures,” ASME J. Comput. Nonlinear Dyn., 1(1), pp. 13–24. Shi, C., and Parker, R. G., 2012, “Modal Properties and Stability of Centrifu-gal Pendulum Vibration Absorber Systems With Equally Spaced, Identical Absorbers,” J. Sound Vib., 331 (21), pp. 4807–4824. Shi, C., Parker, R. G., and Shaw, S. W., 2013, “Tuning of Centrifugal Pendu-lum Vibration Absorbers for Translational and Rotational Vibration Reduc-tion,” Mech. Mach. Theory, 66 , pp. 56–65. Shi, C., and Parker, R. G., 2013, “Modal Structure of Centrifugal Pendulum Vibration Absorber Systems With Multiple Cyclically Symmetric Groups of Absorbers,” J. Sound Vib., 332 (18), pp. 4339–4353. Shi, C., and Parker, R. G., 2014, “Vibration Modes and Natural Fre-quency Veering in Three-Dimensional, Cyclically Symmetric Centrifugal Pendulum Vibration Absorber Systems,” ASME J. Vib. Acoust., 136 (1), p. 011014. Cornwell, P. J., and Bendiksen, O. O., 1987, “Localization of Vibrations in Large Space Reflectors,” AIAA J., 25 (2), pp. 219–226. Chivukula, V. B., and Rhoads, J. F., 2010, “Microelectromechanical Bandpass Filters Based on Cyclic Coupling Architectures,” J. Sound Vib., 329 (20), pp. 4313–4332. Tran, D. M., 2001, “Component Mode Synthesis Methods Using Interface Modes: Application to Structures With Cyclic Symmetry,” Comput. Struct.,
79 (2), pp. 209–222. Tran, D. M., 2009, “Component Mode Synthesis Methods Using Partial Inter-face Modes: Application to Tuned and Mistuned Structures With Cyclic Symmetry,” Comput. Struct., 87 (17), pp. 1141–1153. Dickens, J. M., and Pool, K. V., 1992, “Modal Truncation Vectors and Periodic Time Domain Analysis Applied to a Cyclic Symmetry Structure,” Comput. Struct., 45 (4), pp. 685–696. Wu, G., and Yang, H., 1994, “The Use of Cyclic Symmetry in Two-Dimensional Elastic Stress Analysis by BEM,” Int. J. Solids Struct., 31 (2), pp. 279–290. He, Y., Yang, H., Xu, M., and Deeks, A. J., 2013, “A Scaled Boundary Finite Element Method for Cyclically Symmetric Two-Dimensional Elastic Analy-sis,” Comput. Struct., 120 , pp. 1–8. Stewart, I., and Parker, M., 2008, “Periodic Dynamics of Coupled Cell Net-works II: Cyclic Symmetry,” Dyn. Syst., 23 (1), pp. 17–41. Golubitsky, M., and Schaeffer, D., 1985, “Singularities and Groups in Bifurca-tion Theory. Volume I” (Applied Mathematical Sciences Volume 51), Springer, New York. McWeeny, R., 1963, “Topic 1: Mathematical Techniques,” Symmetry: An Introduction to Group Theory and its Applications (The International Encyclo-pedia of Physical Chemistry and Chemical Physics), Vol. 3, H. Jones, ed., Macmillan, New York. F €assler, A., and Stiefel, E., 1992, Group Theoretical Methods and Their Appli-cations , Birkh €auser, Boston. Sagan, B. E., 2001, The Symmetric Group: Representations, Combinatorial Algorithms, and Symmetric Functions, 2nd ed., Vol. 203 (Graduate Texts in Mathematics), Springer, New York. Banakh, L. Y., and Kempner, M., 2010, Vibrations of Mechanical Systems With Regular Structure , Springer, New York. 40 Evensen, D. A., 1976, “Vibration Analysis of Multi-Symmetric Structures,” AIAA J., 14 (4), pp. 446–453. Anderson, P. W., 1958, “Absence of Diffusion in Certain Random Lattices,” Phys. Rev., 109 (5), pp. 1492–1505. Hodges, C. H., 1982, “Confinement of Vibration by Structural Irregularity,” J. Sound Vib., 82 (3), pp. 411–424. Hodges, C. H., and Woodhouse, J., 1983, “Vibration Isolation From Irregular-ity in a Nearly Periodic Structure: Theory and Measurements,” J. Acoust. Soc. Am., 74 (3), pp. 894–905. Pierre, C., and Dowell, E. H., 1987, “Localization of Vibrations by Structural Irregularity,” J. Sound Vib., 114 (3), pp. 549–564. Happawana, G. S., Bajaj, A. K., and Nwokah, O. D. I., 1993, “A Singular Per-turbation Analysis of Eigenvalue Veering and Modal Sensitivity in Perturbed Linear Periodic Systems,” J. Sound Vib., 160 (2), pp. 225–242. Wei, S. T., and Pierre, C., 1988, “Localization Phenomena in Mistuned Assemblies With Cyclic Symmetry I: Free Vibrations,” J. Vib., Acoust., Stress, Reliab. Des., 110 (4), pp. 429–438. Wei, S. T., and Pierre, C., 1988, “Localization Phenomena in Mistuned Assemblies With Cyclic Symmetry II: Forced Vibrations,” J. Vib., Acoust., Stress, Reliab. Des., 110 (4), pp. 439–449. Valero, N. A., and Bendiksen, O. O., 1986, “Vibration Characteristics of Mis-tuned Shrouded Blade Assemblies,” ASME J. Eng. Gas Turbines Power,
108 (2), pp. 293–299. Castanier, M., and Pierre, C., 2006, “Modeling and Analysis of Mistuned Bladed Disk Vibration: Status and Emerging Directions,” AIAA J. Propul. Power, 22 (2), pp. 384–396. Lim, S. H., Pierre, C., and Castanier, M. P., 2006, “Predicting Blade Stress Levels Directly From Reduced-Order Vibration Models of Mistuned Bladed Disks,” ASME J. Turbomach., 128 (1), pp. 206–210. Vakais, A. F., and Cetinkaya, C., 1993, “Mode Localization in a Class of Multidegree-of-Freedom Nonlinear Systems With Cyclic Symmetry,” SIAM J. Appl. Math., 53 (1), pp. 265–282. Vakakis, A. F., 1992, “Dynamics of a Nonlinear Periodic Structure With Cyclic Symmetry,” Acta Mech., 95 (1–4), pp. 197–226. Georgiades, F., Peeters, M., Kerschen, G., Golinval, J. C., and Ruzzene, M., 2009, “Modal Analysis of a Nonlinear Periodic Structure With Cyclic Symmetry,” AIAA J., 47 (4), pp. 1014–1025. King, M. E., and Vakakis, A. F., 1995, “A Very Complicated Structure of Resonances in a Nonlinear System With Cyclic Symmetry: Nonlinear Forced Localization,” Nonlinear Dyn., 7(1), pp. 85–104. Samaranayake, S., Bajaj, A. K., and Nwokah, O. D. I., 1995, “Amplitude Modulated Dynamics and Bifurcations in the Resonant Response of a Struc-ture With Cyclic Symmetry,” Acta Mech., 109 (1–4), pp. 101–125. Samaranayake, S., and Bajaj, A. K., 1997, “Subharmonic Oscillations in Har-monically Excited Mechanical Systems With Cyclic Symmetry,” J. Sound Vib., 206 (1), pp. 39–60. Samaranayake, S., Samaranayake, G., and Bajaj, A. K., 2000, “Resonant Vibrations in Harmonically Excited Weakly Coupled Mechanical Systems With Cyclic Symmetry,” Chaos, Solitons Fractals, 11 (10), pp. 1519–1534. Vakakis, A. F., Nayfeh, T., and King, M., 1993, “A Multiple-Scales Analysis of Nonlinear Localized Modes in a Cyclic Periodic System,” ASME J. Appl. Mech., 60 (2), pp. 388–397. Briggs, W. L., and Henson, V. E., 1995, The DFT: Owner’s Manual for the Discrete Fourier Transform , Society for Industrial and Applied Mathematics, Philadelphia, PA. Proakis, J. G., and Manolakis, D. K., 2006, Digital Signal Processing , 4th ed., Prentice Hall, Upper Saddle River, NJ. Dickinson, B. W., and Steiglitz, K., 1982, “Eigenvectors and Functions of the Discrete Fourier Transform,” IEEE Trans. Acoust. Speech Signal Process,
30 (1), pp. 25–31. Olson, B. J., 2006, “Order-Tuned Vibration Absorbers for Systems With Cyclic Symmetry With Applications to Turbomachinery,” Ph.D. dissertation, Michigan State University, East Lansing, MI. Olson, B. J., Shaw, S. W., and Pierre, C., 2005, “Order-Tuned Vibration Absorbers for Cyclic Rotating Flexible Structures,” ASME Paper No. DETC2005-84641. Oson, B. J., and Shaw, S. W., 2008, “Vibration Absorbers for Cyclic Rotating Flexible Structures: Linear and Nonlinear Tuning,” ASME Paper No. SMA-SIS08-632. Gozen, S., Olson, B., Shaw, S., and Pierre, C., 2009, “Resonance Suppression in Multi-DOF Rotating Flexible Structures Using Order-Tuned Absorbers,” ASME Paper No. DETC2009-86287. Davis, P. J., 1979, Circulant Matrices , 2nd ed., Wiley, New York. Ottarsson, G. S., 1994, “Dynamic Modeling and Vibration Analysis of Mistuned Bladed Disks,” Ph.D. dissertation, University of Michigan, Ann Arbor, MI. Leon, S. J., 2009, Linear Algebra With Applications , 8th ed., Pearson, Upper Saddle River, NJ. Meirovitch, L., 1997, Principles and Techniques of Vibrations , Prentice Hall, Upper Saddle River, NJ. Wagner, L. F., and Griffin, J. H., 1996, “Forced Harmonic Response of Grouped Blade Systems: Part I–Discrete Theory,” ASME J. Eng. Gas Turbines Power, 118 (1), pp. 130–136. Brown, J. W., and Churchill, R. V., 1996, Complex Variables and Applica-tions , 6th ed., McGraw-Hill, New York. Abramowitz, M., and Stegun, I. A., 1965, Handbook of Mathematical Func-tions , Dover, New York. Allen, J. B., and Rabiner, L. R., 1977, “A Unified Approach to Short-Time Fourier Analysis and Synthesis,” Proc. IEEE, 65 (11), pp. 1558–1564. Burrus, C. S., and Parks, T. W., 1985, DFT/FFT and Convolution Algorithms ,Wiley, New York. Champeney, D. C., 1987, A Handbook of Fourier Theorems , Cambridge Uni-versity, Cambridge, UK. Cooley, J., and Tukey, J., 1965, “An Algorithm for the Machine Computation of the Complex Fourier Series,” Math. Comput., 19 , pp. 297–301. Duhamel, P., and Vetterli, M., 1990, “Fast Fourier Transforms: A Tutorial Review and State of the Art,” Signal Process, 19 , pp. 259–299. Heideman, M. T., Johnson, D. H., and Burrus, C. S., 1984, “Gauss and the His-tory of the FFT,” IEEE Signal Process Mag., 1, pp. 14–21. Johnson, S. G., and Frigo, M., 2007, “A Modified Split-Radix FFT With Fewer Arithmetic Operations,” IEEE Trans. Signal Process, 55 (1), pp. 111–119. Kolba, D., and Parks, T., 1977, “A Prime Factor FFT Algorithm Using High-Speed Convolution,” IEEE Trans. Acoust. Speech Signal Process, 29 (4), pp. 281–294. Chang, J. Y., and Wickert, J. A., 2001, “Response of Modulated Doublet Modes to Traveling Wave Excitation,” J. Sound Vib., 242 (1), pp. 69–83. Proakis, J. G., and Manolakis, D. G., 1988, Introduction to Digital Signal Processing , Macmillan, New York. Williams, C. S., 1986, Designing Digital Filters , Prentice-Hall, Englewood Cliffs, NJ. Ottarsson, G. S., and Pierre, C., 1996, “A Transfer Matrix Approach to Vibration Localization in Mistuned Blade Assemblies,” J. Sound Vib., 197 (5), pp. 589–618. Bladh, R., Castanier, M. P., and Pierre, C., 2001, “Component-Mode-Based Reduced Order Modeling Techniques for Mistuned Bladed Disks, Part I: The-oretical Models,” ASME J. Eng. Gas Turbines Power, 123 (1), pp. 89–99. Bladh, R., Castanier, M. P., and Pierre, C., 2001, “Component-Mode-Based Reduced Order Modeling Techniques for Mistuned Bladed Disks, Part II: Application,” ASME J. Eng. Gas Turbines Power, 123 (1), pp. 100–108. Bladh, R., Castanier, M. P., and Pierre, C., 1999, “Reduced Order Modeling and Vibration Analysis of Mistuned Bladed Disk Assemblies With Shrouds,” ASME J. Eng. Gas Turbines Power, 121 (3), pp. 515–522. Nayfeh, A. H., and Balachandran, B., 1989, “Modal Interactions in Dynamical and Structural Systems,” ASME Appl. Mech. Rev., 42 (11S), pp. S175–S201. Nayfeh, T., and Vakakis, A. F., 1994, “Subharmonic Travelling Waves in a Geometrically Nonlinear Circular Plate,” Int. J. Non-Linear Mech., 29 (2), pp. 233–246. 41 |
2097 | https://ocw.mit.edu/courses/8-01sc-classical-mechanics-fall-2016/resources/36-1/ | 36.2 Worked Example - Wheel Rolling Without Slipping Down Inclined Plane - Torque Method | Classical Mechanics | Physics | MIT OpenCourseWare
Browse Course Material
Syllabus
About the Team
Online Textbook
Readings
Assignments
Review: Vectors
[Lesson 0: Vectors [0.1 - 0.6]](
Week 1: Kinematics
Week 1 Introduction
[Lesson 1: 1D Kinematics - Position and Velocity [1.1-1.7]](
[Lesson 2: 1D Kinematics - Acceleration [2.1-2.5]](
[Lesson 3: 2D Kinematics [3.1-3.5]](
[Week 1 Worked Examples [PS.1.1-PS.1.5]](
Problem Set 1
Week 2: Newton's Laws
Week 2 Introduction
[Lesson 4: Newton's Laws of Motion [4.1-4.4]](
[Lesson 5: Gravity [5.1-5.3]](
[Lesson 6: Contact Forces [6.1-6.2]](
[Lesson 7: Tension and Springs [7.1-7.4]](
[Deep Dive: Friction [DD 1.1]](
[Week 2 Worked Examples [PS.2.1-PS.2.3]](
Problem Set 2
Week 3: Circular Motion
Week 3 Introduction
[Lesson 8: Circular Motion - Position and Velocity [8.1-8.3]](
[Lesson 9: Uniform Circular Motion [9.1-9.3]](
[Lesson 10: Circular Motion – Acceleration [10.1-10.4]](
[Lesson 11: Newton's 2nd Law and Circular Motion [11.1-11.3]](
Week 3 Worked Example
Problem Set 3
Week 4: Drag Forces, Constraints and Continuous Systems
Week 4 Introduction
[Lesson 12: Pulleys and Constraints [12.1-12.5]](
[Lesson 13: Massive Rope [13.1-13.6]](
[Lesson 14: Resistive Forces [14.1-14.3]](
Problem Set 4
Week 5: Momentum and Impulse
Week 5 Introduction
[Lesson 15: Momentum and Impulse [15.1-15.5]](
[Lesson 16: Conservation of Momentum [16.1-16.2]](
[Lesson 17: Center of Mass and Motion [17.1-17.7]](
Problem Set 5
Week 6: Continuous Mass Transfer
Week 6 Introduction
[Lesson 18: Relative Velocity and Recoil [18.1-18.4]](
[Lesson 19: Continuous Mass Transfer [19.1-19.7]](
[Week 6 Worked Examples [PS.6.1-PS.6.2]](
Problem Set 6
Week 7: Kinetic Energy and Work
Week 7 Introduction
[Lesson 20: Kinetic Energy and Work in 1D [20.1-20.6]](
[Lesson 21: Kinetic Energy and Work in 2D and 3D [21.1-21.6]](
[Lesson 22: Conservative and Non-Conservative Forces [22.1-22.5]](
Week 7 Worked Example
Problem Set 7
Week 8: Potential Energy and Energy Conservation
Week 8 Introduction
[Lesson 23: Potential Energy [23.1-23.5]](
[Lesson 24: Conservation of Energy [24.1-24.4]](
[Lesson 25: Potential Energy Diagrams [25.1-25.3]](
Problem Set 8
Week 9: Collision Theory
Week 9 Introduction
[Lesson 26: Types of Collision [26.1-26.3]](
[Lesson 27: Elastic Collisions [27.1-27.6]](
[Deep Dive: Center of Mass Reference Frame [DD.2.1-DD.2.7]](
Problem Set 9
Week 10: Rotational Motion
Week 10 Introduction
[Lesson 28: Motion of a Rigid Body [28.1-28.3]](
[Lesson 29: Moment of Inertia [29.1-29.6]](
[Lesson 30: Torque [30.1-30.5]](
[Lesson 31: Rotational Dynamics [31.1-31.7]](
Week 10 Worked Example
Problem Set 10
Week 11: Angular Momentum
Week 11 Introduction
[Lesson 32: Angular Momentum of a Point Particle [32.1-32.4]](
[Lesson 33: Angular Momentum of a Rigid Body [33.1-33.5]](
[Lesson 34: Torque and Angular Impulse [34.1-34.5]](
Problem Set 11
Week 12: Rotations and Translation - Rolling
Week 12 Introduction
[Lesson 35: Rolling Kinematics [35.1-35.5]](
[Lesson 36: Rolling Dynamics [36.1-36.5]](
[Lesson 37: Rolling Kinetic Energy & Angular Momentum [37.1-37.4]](
[Deep Dive: Gyroscopes [DD.3.1-DD.3.3]](
Problem Set 12
Course Info
Instructors
Prof. Deepto Chakrabarty
Dr. Peter Dourmashkin
Dr. Michelle Tomasik
Prof. Anna Frebel
Prof. Vladan Vuletic
Departments
Physics
As Taught In
Fall 2016
Level
Undergraduate
Topics
Science
Physics
Classical Mechanics
Learning Resource Types
theaters Lecture Videos
assignment Problem Sets
menu_book Open Textbooks
Download Course
menu
search
Give Now
About OCW
Help & Faqs
Contact Us
searchGIVE NOWabout ocwhelp & faqscontact us
8.01SC | Fall 2016 | Undergraduate
Classical Mechanics
Menu
More Info
Syllabus
About the Team
Online Textbook
Readings
Assignments
Review: Vectors
[Lesson 0: Vectors [0.1 - 0.6]](
Week 1: Kinematics
Week 1 Introduction
[Lesson 1: 1D Kinematics - Position and Velocity [1.1-1.7]](
[Lesson 2: 1D Kinematics - Acceleration [2.1-2.5]](
[Lesson 3: 2D Kinematics [3.1-3.5]](
[Week 1 Worked Examples [PS.1.1-PS.1.5]](
Problem Set 1
Week 2: Newton's Laws
Week 2 Introduction
[Lesson 4: Newton's Laws of Motion [4.1-4.4]](
[Lesson 5: Gravity [5.1-5.3]](
[Lesson 6: Contact Forces [6.1-6.2]](
[Lesson 7: Tension and Springs [7.1-7.4]](
[Deep Dive: Friction [DD 1.1]](
[Week 2 Worked Examples [PS.2.1-PS.2.3]](
Problem Set 2
Week 3: Circular Motion
Week 3 Introduction
[Lesson 8: Circular Motion - Position and Velocity [8.1-8.3]](
[Lesson 9: Uniform Circular Motion [9.1-9.3]](
[Lesson 10: Circular Motion – Acceleration [10.1-10.4]](
[Lesson 11: Newton's 2nd Law and Circular Motion [11.1-11.3]](
Week 3 Worked Example
Problem Set 3
Week 4: Drag Forces, Constraints and Continuous Systems
Week 4 Introduction
[Lesson 12: Pulleys and Constraints [12.1-12.5]](
[Lesson 13: Massive Rope [13.1-13.6]](
[Lesson 14: Resistive Forces [14.1-14.3]](
Problem Set 4
Week 5: Momentum and Impulse
Week 5 Introduction
[Lesson 15: Momentum and Impulse [15.1-15.5]](
[Lesson 16: Conservation of Momentum [16.1-16.2]](
[Lesson 17: Center of Mass and Motion [17.1-17.7]](
Problem Set 5
Week 6: Continuous Mass Transfer
Week 6 Introduction
[Lesson 18: Relative Velocity and Recoil [18.1-18.4]](
[Lesson 19: Continuous Mass Transfer [19.1-19.7]](
[Week 6 Worked Examples [PS.6.1-PS.6.2]](
Problem Set 6
Week 7: Kinetic Energy and Work
Week 7 Introduction
[Lesson 20: Kinetic Energy and Work in 1D [20.1-20.6]](
[Lesson 21: Kinetic Energy and Work in 2D and 3D [21.1-21.6]](
[Lesson 22: Conservative and Non-Conservative Forces [22.1-22.5]](
Week 7 Worked Example
Problem Set 7
Week 8: Potential Energy and Energy Conservation
Week 8 Introduction
[Lesson 23: Potential Energy [23.1-23.5]](
[Lesson 24: Conservation of Energy [24.1-24.4]](
[Lesson 25: Potential Energy Diagrams [25.1-25.3]](
Problem Set 8
Week 9: Collision Theory
Week 9 Introduction
[Lesson 26: Types of Collision [26.1-26.3]](
[Lesson 27: Elastic Collisions [27.1-27.6]](
[Deep Dive: Center of Mass Reference Frame [DD.2.1-DD.2.7]](
Problem Set 9
Week 10: Rotational Motion
Week 10 Introduction
[Lesson 28: Motion of a Rigid Body [28.1-28.3]](
[Lesson 29: Moment of Inertia [29.1-29.6]](
[Lesson 30: Torque [30.1-30.5]](
[Lesson 31: Rotational Dynamics [31.1-31.7]](
Week 10 Worked Example
Problem Set 10
Week 11: Angular Momentum
Week 11 Introduction
[Lesson 32: Angular Momentum of a Point Particle [32.1-32.4]](
[Lesson 33: Angular Momentum of a Rigid Body [33.1-33.5]](
[Lesson 34: Torque and Angular Impulse [34.1-34.5]](
Problem Set 11
Week 12: Rotations and Translation - Rolling
Week 12 Introduction
[Lesson 35: Rolling Kinematics [35.1-35.5]](
[Lesson 36: Rolling Dynamics [36.1-36.5]](
[Lesson 37: Rolling Kinetic Energy & Angular Momentum [37.1-37.4]](
[Deep Dive: Gyroscopes [DD.3.1-DD.3.3]](
Problem Set 12
36.2 Worked Example - Wheel Rolling Without Slipping Down Inclined Plane - Torque Method
36.2 Worked Example - Wheel Rolling Without Slipping Down Inclined Plane - Torque Method
Instructor: Dr. Peter Dourmashkin
Video Player is loading.
Play Video
Play
Mute
Current Time 0:00
/
Duration 6:05
Loaded: 0%
0:00
Stream Type LIVE
Seek to live, currently behind live LIVE
Remaining Time-6:05
1x
Playback Rate
Chapters
Chapters
Descriptions
descriptions off, selected
Captions
captions settings, opens captions settings dialog
captions off, selected
English Captions
Audio Track
Picture-in-Picture
download button
Download video
Fullscreen
playback speed
Playback speed
0.25
0.5
0.75
1, selected
1.25
1.5
This is a modal window.
Beginning of dialog window. Escape will cancel and close the window.
Text Color Transparency Background Color Transparency Window Color Transparency
Font Size Text Edge Style Font Family
Reset restore all settings to the default values Done
Close Modal Dialog
End of dialog window.
Transcript
Download video
Download transcript
0:03 Now let's go back and analyze that same problem
0:05 that we were looking at before of a wheel
0:09 rolling down an incline plane.
0:11 And it's rolling without slipping.
0:15 But instead of using the energy method,
0:18 we're now going to use the torque method.
0:21 So let's consider the center of mass.
0:24 And what we want to do is draw the forces.
0:26 We have a normal force.
0:28 We have gravity.
0:30 And we have the friction force about the center of mass.
0:34 Our wheel has a radius R.
0:37 Let's choose a coordinate system i hat, j hat.
0:42 And so we have a right-handed system k hat,
0:45 and that will correspond to some angle theta.
0:49 Now here we're now going to enlarge how we apply
0:54 both translation and rotation.
0:56 And the beauty of this problem is
0:58 we now can decompose our motion into translational motion
1:04 and rotational motion.
1:05 So for the transitional motion, we'll
1:07 apply Newton's second law.
1:11 Now, if this is the angle phi, then that's
1:13 the angle phi as well.
1:15 And so our forces in the i hat direction, we
1:19 have mg sine phi minus the friction force.
1:25 And that's equal to the x component of the acceleration.
1:31 Now we also can choose the center of mass
1:35 to calculate the torque.
1:38 And so what we're really just studying here
1:40 is simply our old problem in the center of mass frame of fixed
1:44 axis rotation.
1:46 And you can see gravity is acting at the center of mass.
1:49 So it produces no torque about the center of mass.
1:52 The normal force is directed towards the center of mass.
1:56 And so when we take that vector product of R cross n from cm
2:06 to this point down here, the contact point,
2:08 these forces are anti-parallel.
2:10 So the normal force produces no torque.
2:12 And the only torque that we have is from the friction force,
2:16 and that friction torque is going
2:18 to give us a positive angular acceleration in the k hat
2:22 direction.
2:23 It's at right angles with the vector R.
2:26 So we have fs times R equals I center of mass times alpha.
2:33 And these are our two dynamic equations.
2:37 But remember, when the object is rolling without slipping,
2:40 let's just remind ourselves that Vcm equals R omega.
2:45 And if I differentiate, the Acm which is what we're calling ax,
2:50 is equal to R alpha.
2:53 So this ax here is the acceleration
2:57 of the center of mass.
2:59 And that's our third condition.
3:02 And so now I see that I have three equations
3:06 and my unknowns--
3:09 fs, ax and alpha.
3:12 And so I'm going to solve these equations for a.
3:16 And I'll look at these equations.
3:18 And what I'll do is I'll just substitute for alpha ax over R.
3:24 And then solve this equation for fs, and put it in there.
3:28 And so I get mg sine phi.
3:32 Now my fs is equal to Icm over R times alpha.
3:39 But alpha is ax over R. So that's ax and an R squared.
3:45 Notice dimensionally, I is mr squared.
3:48 So this is just ma, the dimensions
3:51 of force, mg dimensions of force, and that's equal to max.
3:56 And now I can solve for ax.
4:00 And I get mg sine phi divided by m plus Icm over R squared.
4:11 Now ax is a constant.
4:15 And we can, from our kinematic equations,
4:19 if our object is moving a distance s
4:28 as it drops height h, we know from kinematics
4:34 and we can work this out.
4:35 We have that Xcm is one half Acm t squared.
4:42 And we know that the velocity Vcm equals Acm times t.
4:53 And so when we put these two together,
4:56 this is the distance s, we get that the velocity
5:02 cm is equal to the square root of 2s times Acm.
5:12 Now s is equal to h over sine phi.
5:21 S h over s is sine phi.
5:26 And so the Vcm equals the square root of 2h sine phi times Acm--
5:34 but we've solved for Acm--
5:36 mg sine phi over m plus Icm over R squared.
5:44 And so we get the square root of 2mgh
5:50 over m plus Icm divided by R squared.
5:56 And this agrees with our energy method.
Course Info
Instructors
Prof. Deepto Chakrabarty
Dr. Peter Dourmashkin
Dr. Michelle Tomasik
Prof. Anna Frebel
Prof. Vladan Vuletic
Departments
Physics
As Taught In
Fall 2016
Level
Undergraduate
Topics
Science
Physics
Classical Mechanics
Learning Resource Types
theaters Lecture Videos
assignment Problem Sets
menu_book Open Textbooks
Download Course
Over 2,500 courses & materials
Freely sharing knowledge with learners and educators around the world. Learn more
© 2001–2025 Massachusetts Institute of Technology
Accessibility
Creative Commons License
Terms and Conditions
Proud member of:
© 2001–2025 Massachusetts Institute of Technology
You are leaving MIT OpenCourseWare
close
Please be advised that external sites may have terms and conditions, including license rights, that differ from ours. MIT OCW is not responsible for any content on third party sites, nor does a link suggest an endorsement of those sites and/or their content.
Stay Here Continue |
2098 | https://www.chemguide.co.uk/14to16/equations/equations.html | How to write equations for simple reactions
Chemguide: Core Chemistry 14 - 16
How to write symbol equations for simple chemical reactions
This page explains how to work out equations for simple chemical reactions. You have to get this right, because chemistry will be a nightmare to you if you find equations a mystery - it is an essential tool in understanding chemistry.
Learning to write equations can take quite a lot of time when you are starting chemistry. This is one of the major hurdles in the subject. Don't try to rush it - spending time now will save you a lot of problems later on.
You will need to be reasonably competent at writing formulae for ionic compounds and there is no point in continuing with this page until you are.
How writing equations works
You need to know what is actually happening!
You can't just make up an equation - it has to be based on exactly what happened in a chemical reaction. You need to know what you started with and what you ended up with.
Have a look at this YouTube video which is a snippet from a Royal Society of Chemistry lecture, and shows magnesium metal burning in oxygen in the air. It forms magnesium oxide.
The video displayed this as a simple word equation.
magnesium + oxygen magnesium oxide
The arrow here be translated as "goes to" or "produces" or whatever similar term you want to use.
In the very early stages of a chemistry course, you might be asked to write word equations - usually for reactions slightly more complicated than this one.
But if you are doing chemistry properly, you may never actually write a word equation down, but it has to be in your mind. You have to know what you started with and what you ended up with.
Translating the words into symbols
Still using the example of magnesium burning in oxygen . . .
The next thing you have to do is to translate the names of the substances involved into their formulae.
Mg + O 2 MgO
Don't forget that oxygen (in common with things like hydrogen and chlorine) goes around in pairs.
But this isn't the finished equation.
Note:I know I keep on about this, but if you can't work out that magnesium oxide is MgO, or you didn't know that oxygen goes around in pairs, then you must go back and read the pages about writing formulae. It is pointless going on with this page if you can't do basic things like that.
Balancing the equation
Each symbol you write counts as one atom (or one ion) of that element. (You will later come across another more mathematical way of looking at this, but that is some distance in the future.)
That means that in the equation we have just written, you seem to have started with 2 atoms of oxygen, but only ended up with 1 in the product. You can't just lose an oxygen atom - everything must be accounted for.
Here is the unfinished equation again . . .
Mg + O 2 MgO
So how do you get another oxygen on the right-hand side?
What you absolutely must not do is change the formula of the magnesium oxide. You can't just re-write the formula of magnesium oxide as MgO 2 - that doesn't exist! You must never try to balance an equation by changing a formula.
What you need is to form twice as much MgO. You can do this by writing a big "2" in front of the formula.
A big number in front of a formula multiplies up the whole formula until you get to a break - the end of the equation, a plus sign, or an arrow, for example.
So a revised version would be . . .
Mg + O 2 2MgO
But beware! By writing that 2, you have messed up the balance of the magnesium. If you leave it like that, it seems that you have by magic generated another magnesium atom out of nowhere.
That is easily put right, of course, by re-writing the equation to start with 2 atoms of magnesium.
2Mg + O 2 2MgO
And that is the proper equation - everything is now balanced on both sides of it.
This is a trivial example, of course, and all of this would just be running through your head, but it illustrates the principles.
You have to start with a word equation, even if that only exists in your head.
Write down the formulae for everything in your word equation.
Look for where the equation doesn't balance, and put it right. (I will give you some more help with this in examples to come.)
At the end, go back and check everything again in case by altering something you have messed up something you have already checked - as, for example, with the magnesium above.
Examples
Example 1
Heptane is one of the hydrocarbons in petrol (gasoline). It has the formula C 7 H 16, and burns to form carbon dioxide and water. Write the equation for this.
You have all the information you need in the question, so all you need to do is to write the formulae down to start the equation writing process. (I am assuming you know the formulae for carbon dioxide and water.)
C 7 H 16 + O 2 CO 2 + H 2 O
The best way of balancing most equations is to start from the beginning and work through the elements one at a time. However, it is a good idea to leave until the end anything which occurs more than once on either side of the equation - in this case, oxygen.
You will usually find that this will sort itself out easily later on.
So start with the carbon. If there are 7 atoms on the left-hand side, there must be 7 on the right-hand side as well. That means you must have produced 7 molecules of carbon dioxide.
C 7 H 16 + O 2 7CO 2 + H 2 O
Now the hydrogens. There are 16 hydrogens on the left, and so there have to be 16 on the right as well. You must have produced 8 molecules of water.
C 7 H 16 + O 2 7CO 2 + 8H 2 O
Now count the oxygens. There are a total of 22 on the right-hand side. To get 22 atoms, you must have started with 11 molecules of oxygen.
C 7 H 16 + 11O 2 7CO 2 + 8H 2 O
And that's all OK. You wouldn't normally write all these stages down, of course - you just write the original formulae down leaving enough space for the balancing numbers, and then write them in as you work them out.
Example 2
Calcium carbonate reacts with dilute hydrochloric acid to give a solution of calcium chloride, carbon dioxide gas and water. Write the equation for this.
You have to know that dilute hydrochloric acid is a solution of hydrogen chloride in water. For equation purposes, you can just write this as HCl. Obviously, you should know how to work this formula out but, to be honest, you will meet it so many times, that you will just know it.
If you work out the other formulae, you will get . . .
CaCO 3 + HCl CaCl 2 + CO 2 + H 2 O
Working from left to right, the calcium is OK; the carbon is also OK; the oxygen is OK. The hydrogen and chlorine are obviously not OK.
You can put the chlorine right by having two lots of HCl - NOT by turning the HCl into the non-existent HCl 2. This also puts the hydrogen right.
That gives the final balanced equation . . .
CaCO 3 + 2HCl CaCl 2 + CO 2 + H 2 O
Example 3
This is to illustrate how you get around a particular problem that comes up now and then.
If you heat solid copper(II) nitrate, you get copper(II) oxide, nitrogen dioxide and oxygen. The unbalanced symbol equation is . . .
Cu(NO 3)2 CuO + NO 2 + O 2
Working systematically, the copper is OK.
On the left-hand side, there are 2 nitrogen atoms. The little 2 after the brackets applies to everything inside the brackets. You therefore need 2 nitrogen dioxides on the right-hand side.
Cu(NO 3)2 CuO + 2NO 2 + O 2
That now leaves a tricky problem with the oxygens. There are 6 (2 lots of 3) on the left-hand side, and 7 on the right. It isn't immediately obvious how to sort that out.
The trick is to allow yourself to have half an oxygen molecule - half an oxygen molecule is just one oxygen atom.
Cu(NO 3)2 CuO + 2NO 2 + ½O 2
Now there are 6 oxygen atoms on both sides.
You wouldn't normally leave it like this though. Having halves in equations feels wrong, although if you do chemistry to a more advanced level, they aren't uncommon. You can get rid of the half by doubling everything in the equation.
2Cu(NO 3)2 2CuO + 4NO 2 + O 2
If you count everything up now, it all balances.
Note:If you can't get the adding up right, it is probably because you have a problem with the 2Cu(NO 3)2.
The 2 at the beginning means that there are two lots of Cu(NO 3)2. That is two times 1 copper, 2 nitrogens and 6 oxygens. The 2 after the bracket multiplies everything inside the bracket.
So 2Cu(NO 3)2 has 2 coppers, 4 nitrogens and 12 oxygens.
Problems to practise on
Do one set of these questions at a time, and then check your answers. Don't go on to the next set until you are sure you understand any mistakes that you made.
Set 1
Balance these equations where the formulae are given to you.
Mg + HCl MgCl 2 + H 2
Ba + H 2 O Ba(OH)2 + H 2
FeSO 4 + NaOH Fe(OH)2 + Na 2 SO 4
Al + Fe 2 O 3 Al 2 O 3 + Fe
Na 2 CO 3 + HNO 3 NaNO 3 + CO 2 + H 2 O
set 1 balancing equations answers
Set 2
Balance these equations where the formulae are also given to you.
Al + H 2 SO 4 Al 2(SO 4)3 + H 2
Fe 2(SO 4)3 + KOH Fe(OH)3 + K 2 SO 4
C 4 H 10 + O 2 CO 2 + H 2 O
K + H 2 O KOH + H 2
HNO 3H 2 O + NO 2 + O 2
set 2 balancing equations answers
The rest of these questions are likely to take longer because you are being asked to work out formulae as well as balancing the equation. Take your time to make sure the formulae are right - you can't get the equation properly balanced it it contains a wrong formula.
There aren't any difficult problems here. If you find an equation impossible to balance it is probably because you have got a formula wrong. Don't be surprised if the occasional equation is actually balanced when you have written the formulae - it isn't uncommon.
Set 3
Write balanced equations for the following reactions.
sodium carbonate + hydrochloric acid (HCl) sodium chloride + carbon dioxide + water
sodium + chlorine sodium chloride
magnesium + copper(II) oxide magnesium oxide + copper
sodium hydroxide + sulfuric acid (H 2 SO 4) sodium sulfate + water
copper(II) oxide + hydrochloric acid (HCl) copper(II) chloride + water
set 3 balancing equations answers
Set 4
Write balanced equations for the following reactions.
potassium + water potassium hydroxide + hydrogen
iron(III) oxide + nitric acid (HNO 3) iron(III) nitrate + water
barium chloride + potassium sulfate barium sulfate + potassium chloride
magnesium + sulfuric acid (H 2 SO 4) magnesium sulfate + hydrogen
sodium + oxygen sodium oxide
set 4 balancing equations answers
State symbols in equations
I don't want to make too big a deal of this at the moment, because for now you need to concentrate on learning to write the basic equations that we have covered above.
But quite often you will find equations which have state symbols added in brackets after each formula. There are four of these, and they tell you what physical state the substance is in.
| state symbol | means |
--- |
| (s) | The substance is a solid. |
| (l) | The substance is a liquid. |
| (g) | The substance is a gas. |
| (aq) | The substance is in solution in water. "aq" is short for aqueous. An aqueous solution is a solution in water. |
So, for example, if you just wrote H 2 O in an equation, it isn't always clear whether you are talking about water or steam. Liquid water would be written H 2 O(l) and steam would be H 2 O(g).
Solid magnesium burns in steam to produce a white powder, magnesium oxide, and hydrogen gas. That would be shown using state symbols as . . .
Mg(s) + H 2 O(g) MgO(s) + H 2(g)
In this case, the state symbols matter, because magnesium has only a very, very slight reaction with cold water, and produces a different product - magnesium hydroxide rather than magnesium oxide.
To take another example, if you write HCl in an equation, it isn't always totally obvious whether you are talking about hydrogen chloride gas, or the solution of hydrogen chloride gas in water, known as hydrochloric acid.
The gas would be HCl(g) and its solution (hydrochloric acid) would be HCl(aq).
We will talk some more about this in places where it really matters.
Note:If you have worked through these formulae and equations pages and still feel you need more examples to practise with, you could explore Philip Sheldon's site.
This has numerous examples of writing formulae and equations, as well as a section on basic atomic structure which you might also want to look at. For now, ignore the part which deals with ionic equations. I prefer to introduce these gently a bit at a time when they are needed, and if you start worrying about them at this point, you will just get confused.
It is important that you read the short User Guide before you begin because the site is correctly fussy about how you enter subscripts (e.g. H 2) and superscripts (e.g. Cu 2+). You will get reminders about this on the pages where it is relevant. Use the keyboard shortcuts wherever possible - it's a bit tedious otherwise. It is much easier to use the site on a computer with a traditional keyboard rather than a tablet.
You can access a necessary Periodic Table from the title bar on each page. This should open in a new tab, which makes it easy to keep referring to.
You can set the level of difficulty yourself. If you are coming at this for the first time, choose "beginner".
Where would you like to go now?
To the formulae and equations menu . . .
To the Chemistry 14-16 menu . . .
To Chemguide Main Menu . . .
© Jim Clark 2019 |
2099 | https://dokumen.pub/a-classical-introduction-to-modern-number-theory-2nbsped-1441930949-9781441930941.html | Copyright Notice – Content Removal Policy
This book is published by Springer. In compliance with copyright regulations and upon request, all books published by Springer and its affiliated publishers—including Apress, Palgrave Macmillan, Macmillan Education, Nature, Scientific American, and the American Chemical Society—will be permanently disabled and removed from our platform.
Additionally, we honor takedown requests from other major academic publishers including Elsevier and Taylor & Francis.
We ask all users to respect the rights of authors and publishers by refraining from uploading or distributing copyrighted materials without proper authorization.
Notice to Rights Holders (Springer & Affiliates, Elsevier, Taylor & Francis)
If you are a representative of Springer, its affiliated publishers (including the American Chemical Society), or other publishers such as Elsevier and Taylor & Francis, and have identified books or URLs that remain accessible on our platform, please report them via the form below:
🔗 Submit a Takedown Request
We are committed to promptly addressing valid takedown requests and ensuring full compliance with intellectual property laws.
Thank you for your cooperation and understanding. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.