id
stringlengths
1
6
url
stringlengths
16
1.82k
content
stringlengths
37
9.64M
4100
https://dictionary.cambridge.org/us/example/english/obese-person
obese person meanings of obese and person Your browser doesn't support HTML5 audio Your browser doesn't support HTML5 audio Your browser doesn't support HTML5 audio Your browser doesn't support HTML5 audio (Definition of obese and person from the Cambridge English Dictionary © Cambridge University Press) Examples of obese person Word of the Day Victoria sponge Your browser doesn't support HTML5 audio Your browser doesn't support HTML5 audio a soft cake made with eggs, sugar, flour, and a type of fat such as butter. It is made in two layers with jam or cream, or both, between them Blog Calm and collected (The language of staying calm in a crisis) New Words vibe coding © Cambridge University Press & Assessment 2025 © Cambridge University Press & Assessment 2025 Learn more with +Plus Learn more with +Plus {{message}} {{message}} There was a problem sending your report. {{message}} {{message}} There was a problem sending your report.
4101
https://pressbooks.bccampus.ca/technicalwriting/chapter/figurestables/
Skip to content Want to create or adapt books like this? Learn more about how Pressbooks supports open publishing practices. DOCUMENT DESIGN 3.4 Figures and Tables Suzan Last Visual elements such as graphs, charts, tables, photographs, diagrams, and maps capture your readers’ attention and help them to understand your ideas more fully. They are like the illustrations that help tell the story. These visuals help to augment your written ideas and simplify complicated textual descriptions. They can help the reader understand a complicated process or visualize trends in the data. The key concept to remember here is that visuals clarify, illustrate, and augment your written text; they are not a replacement for written text. The old adage, “a picture is worth a thousand words” may not always not hold true in technical writing, but adding visuals may save you a hundred words or so of additional explanation and clarification. If you have visual elements in your document, they must be based on and supplement your written content. Throwing in “gratuitous graphics” just to decorate or take up space can confuse your reader. It is important to choose the right kind of visual to convey the story you want your reader to understand. If visuals are poorly chosen or poorly designed for the task, they can actually confuse the reader and have negative consequences. For example, it’s very likely that the first thing you noticed when you opened this page was the image above. Did you wonder why is it there? Has it distracted you? Conventions for Integrating Visuals in your Document Each style of visual has its own conventions that you will recognize after you have seen enough of them. In addition, different publications have different style guides that dictate the specifics of how to format and integrate visual elements. In general, however, whenever you integrate any kind of visual, you should adhere to five key rules. Five Rules for Integrating Visual Elements into your Document Give each visual a numbered caption that includes a clear descriptive title Refer to the caption number within the body text and discuss its content Label all units (x and y axes, legends, column box heads, parts of diagrams, etc) Provide the source of the data and/or visual image if you did not create it yourself Avoid distorting the data or image. In addition, visual elements should also be surrounded with sufficient passive space to emphasize the image and enhance its readability. If copying and pasting an image, make sure all elements are clear and the print size is readable. A visual that has been shrunk down to an unreadable size does not help the reader understand your ideas. Whenever possible, try to orient the visual image in the same direction as the body text. Examine Figure 3.4.1 below. Do you understand what information it conveys? What story it’s trying to tell? What is missing? If you look carefully, you might be able to guess what story this graph is telling. However, the lack of a descriptive caption and labelling of axes makes it impossible to know for sure. Compare it to Figure 3.4.2 below. Figure 3.4.2 has a numbered caption (which I have just referred to in my paragraph), a descriptive title, and it has properly labelled x and y axes and legends. With this added information, the story starts to take shape. The graph tells the story of the fluxuating water demand in Edmonton during the 2010 Olympic gold medal hockey game. If you add some context that flushing of toilets is one of the main causes of water demand, the story comes into focus. The figure also cites the source the graph was retrieved from in the caption using an in-text citation, which is linked to a full reference below. Therefore, if you want more information about this data, you can find it. The original image has not been distorted in any way. Thus, Figure 3.4.2 follows the five key rules listed above. In addition to those five general rules, there are specific guidelines for implementing them. These are outlined in detail in the Faculty of Engineering Co-op Work Term Report Guideline (.pdf). Specific Guidelines for Integrating Graphics Terminology Visual elements are referred to as either Tables or Figures. Tables are made up of rows and columns and the cells usually have numbers in them (but may also have words or images). Figures refer to any visual elements—graphs, charts, diagrams, photos, etc.—that are not Tables. They may be included in the main sections of the report, or if they contain supplemental material they may be contained in an appendix. Try to ensure that figures and tables are not broken over two pages. Tables that require a full page might be best put in an appendix. Labelling Tables and Figures Tables and figures must all be labelled with numbered captions that clearly identify and describe them. Figure captions are generally placed below the figures, while table captions must be placed above the tables. This is because we generally read tables from the top down, and therefore want to see the caption at the top. Figures are not always read top down. When you open a page and see a figure, the first thing you want to know is “what is that?” The caption below it should immediately identify what the figure represents for the reader. If you choose to place figure captions above the figures, do so consistently throughout your document. Use the following conventions to assist the reader in understanding your graphics: Numbering: Table and Figures are numbered sequentially, but separately e.g. Table 1, Table 2, Figure 1, Figure 2, Table 3, etc. Captioning: After the Figure or Table number, add a descriptive caption that clearly indicate what the figure or table illustrates without having to read anything else on the page. There are two systems for numbering figures and tables within your document: Simple Consecutive Numbering: All figures and tables are numbered consecutively (Figure 1, Figure 2, Figure 3, Table 1, Table 2, Table, 3 etc.) throughout the document regardless of which section they are in. Section-based Numbering: Within each section, figures and tables may be numbered sequentially through each section (e.g. Table 1.1 refers to the first table in section 1, Table 2.4 refers to the fourth table in section 2). If a large number of illustrations are presented, the latter option is the better choice. This can become confusing, however, when using sub-sections. If the table or figure that you present in your report was not created by you, but comes from other sources, you must include a reference for the original source in your caption: e.g.: Figure 1. Network Design . You must ensure that all figures and tables represent data accurately and ethically, and that they do not distort data to create bias. Using the Insert → Caption … function will allow Word to keep track of the Figure and Table numbering for you, and allow you to auto-create a List of Figures and Tables at the beginning of your document. If you don’t use the Insert Caption function, then you should manually change the font of your captions to distinguish them from body text. Caption font is usually slightly smaller than body font and is often italicized. The numbered portion is often bolded in both the caption and in the in-paragraph reference to the figure or table for ease of cross-referencing. Referring to Tables and Figures in your Text Any figures or tables you use in your document must be discussed in your text. Use the following guidelines when discussing and referring to tables and figures: Place the table/figure close to where it is first referred to in the text (preferably immediately below the paragraph in which it is first mentioned). Refer to tables and figures in your text by their numbers, not their placement in the text. E.g, “See Figure 9 for a detailed schematic” (not “see the figure below”); “the test results are summarized in Table 1.” When referring to a figure or table in your body text, it is helpful to place the reference in bold font. Selecting the Right Visual Table 3.1.1 lists common kinds of visual elements used in technical writing, along with their general purpose or description (for a more detailed discussion of how and when to use these kinds of visuals, see Graves and Graves. Notice the “box head” on the top and “stubs” on the left are bolded and centred to enhance readability. Tables that have text in the cells instead of numbers can also be referred to as figures. Thus, Table 3.1.1 could have been captioned as Figure 3.7 instead. TABLE 3.1.1 Common types of illustrative graphics | [Skip Table] | | | | Type of Visual | | Description and Purpose | | Tables | | Place detailed data/information in categories formatted into rows and columns for comparison; use when exact figures are important. Label column headings (box heads) and/or rows (stubs). | | Graphs | Bar Graph | Compare and contrast two or more subjects at the same point in time, or compare change over time. | | Column Graph | Reveal change in a subject at regular intervals of time. | | Line Graph | Show the degree and direction of change relative to two variables; compare items over time, show frequency or distribution, or show correlations. | | Charts | Pie Chart | Display the number and relative size of the divisions of a subject; shows relation of parts to a whole (parts must sum to 100% to make sense). | | Org. Chart | Map the divisions and levels of responsibility or hierarchy within an organization. | | Flow Chart | Show the sequence of steps in a process or procedure. | | Gantt Chart | Indicates timelines for multi-stepped projects, especially used in proposals and progress reports. | | Illustrations | Diagram | Identify the parts of a subject and their spatial or functional relationship; emphasize detail or show dimensions. | | Photo | Show what a subject looks like in realistic detail or show it being used. | | Animation | Simulate a process, operation, or incident. | | Film clip | Depict a process, operation, or incident in realistic detail. | For more information on how to format a long report, see the Faculty of Engineering’s “Co-op Work Term Report Guidelines.” EXERCISE 3.7 Design a figure to match the data Using what you have learned about figures and tables, create two different visual representations of the data described in the following paragraph, and caption them as Figure 1. Add your descriptive caption. Explain why you chose those methods and list the pros and cons of each: We surveyed the students in 3 sections of ENGR 240 (total of 100 students) to gauge which aspect of the writing process they found most challenging: Pre-writing, Drafting, or Revising. The results among the 3 sections were consistent. Overall 50% of students said that they found the Pre-writing stage to be the most challenging, while 28% found the Drafting stage most difficult and 22% said the Revision stage was most challenging (see Figure 1). These results suggest that we should place more emphasis on teaching and practicing pre-writing strategies during the course. [create a Figure 1 and a descriptive caption that illustrates the data above] Additional Resources For a look at how professionals can animate data, check out Hans Rosling’s “The Joy of Stats” on YouTube [Online]. Image descriptions Figure 3.4.1 image description: A graph with no figure number or caption and no x or y axis labels, so it is difficult to determine what point it is trying to make. It shows something rising and falling during a hockey game. This thing spikes at the end of each period and drops dramatically when Canada wins. [Return to Figure 3.4.1] Figure 3.4.2 image description: A graph charting water consumption in Edmonton during the 2010 Gold Medal Hockey Game. The graphs shows spikes in water consumption at the end of each period, followed by very low usage periods, especially near the end of the 3rd period, and between the end of the game and the medal ceremony. It also has a line depicting water usage the previous day, which was fairly steady throughout the day. [Return to Figure 3.4.2] EPCOR, Edmonton’s Water Utility. “Water Consumption in Edmonton during 2010 Gold Medal hockey game,” Cited on Flowing Data[Online] Available: ↵ H. Graves and R. Graves, “Communicating through visuals,” in A Strategic Guide to Technical Communications, 2nd ed. Peterborough, ONT: Broadview Press, 2011, pp. 137-148. ↵ Engineering Co-op Work Term Report Guidelines (.pdf) ↵
4102
https://storage.outreach.psu.edu/autism/64.%20and%2074.%20Handout.PDF
State Board of Education-Adopted Appendix F: Methods Used for Solving Single-Digit Addition and Subtraction Problems Page 1 of 4 Appendix F: Methods used for solving single-digit addition and subtraction problems Level 1. Direct Modeling by Counting All or Taking Away. Represent situation or numerical problem with groups of objects, a drawing, or fingers. Model the situation by composing two addend groups or decomposing a total group. Count the resulting total or addend. Adding (8 + 6 = ): Represent each addend by a group of objects. Put the two groups together. Count the total. Use this strategy for Add To/Result Unknown and Put Together/Total Unknown. Subtracting (14 – 8 = ): Represent the total by a group of objects. Take the known addend number of objects away. Count the resulting group of objects to find the unknown added. Use this strategy for Take From/Result Unknown. Levels 8 + 6 = 14 14 - 8 = 6 Level 1: Count all Count All a b 1 2 3 4 5 6 7 8 1 2 3 4 5 6 ο ο ο ο ο ο ο ο ο ο ο ο ο ο 1 2 3 4 5 6 7 8 9 10 11 12 13 14 c Take Away a 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ο ο ο ο ο ο ο ο ο ο ο ο ο ο 1 2 3 4 5 6 7 8 1 2 3 4 5 6 b Level 2: Count on Count On 8 ο ο ο ο ο ο ο ο ο ο ο ο ο ο 9 10 11 12 13 14 8 To solve 14 – 8 I count on 8 + ? = 14 10 11 12 13 I took away 8 9 14 8 to 14 is 6 so 14 – 8 = 6 Level 3: Recompose Make a ten (general): one addend breaks apart to make 10 with the other addend Make a ten (from 5’s within each addend) Recompose: Make a Ten ο ο ο ο ο ο ο ο ο ο ο ο ο ο 10 + 4 ο ο ο ο ο ο ο ο ο ο ο ο ο ο 10 + 4 14 – 8: I make a ten for 8 + ? = 14 ο ο ο ο ο ο ο ο ο ο ο ο ο ο 8 + 2 + 4 6 8 + 6 = 14 Doubles = n 6 + 8 = 6 + 6 + 2 = 12 + 2 = 14 Note: Many children attempt to count down for subtraction, but counting down is difficult and error-prone. Children are much more successful with counting on; it makes subtraction as easy as addition. The Mathematics Framework was adopted by the California State Board of Education on November 6, 2013. The Mathematics Framework has not been edited for publication. State Board of Education-Adopted Appendix F: Methods Used for Solving Single-Digit Addition and Subtraction Problems Page 2 of 4 Level 2. Counting On. Embed an addend within the total (the addend is perceived simultaneously as an addend and as part of the total). Count this total but abbreviate the counting by omitting the count of this addend; instead, begin with the number word of this addend. Some method of keeping track (fingers, objects, mentally imagined objects, body motions, other count words) is used to monitor the count. For addition, the count is stopped when the amount of the remaining addend has been counted. The last number word is the total. For subtraction, the count is stopped when the total occurs in the count. The tracking method indicates the difference (seen as an unknown addend). Counting on can be used to find the total or to find an addend. These look the same to an observer. The difference is what is monitored: the total or the known addend. Some students count down to solve subtraction problems, but this method is less accurate and more difficult than counting on. Counting on is not a rote method. It requires several connections between cardinal and counting meanings of the number words and extended experience with Level 1 methods in kindergarten. Adding (e.g., 8 + 6 = ) uses counting on to find a total: One counts on from the first addend (or the larger number is taken as the first addend). Counting on is monitored so that it stops when the second addend has been counted on. The last number word is the total. Finding an unknown addend (e.g., 8 + = 14): One counts on from the known addend. The keeping track method is monitored so that counting on stops when the known total has been reached. The keeping track method tells the unknown addend. Subtracting (14 – 8 = ): One thinks of subtracting as finding the unknown addend, as 8 + = 14 and uses counting on to find an unknown addend (as above). The problems in Table 1 in the Glossary which can be solved by Level 1 methods in kindergarten can also be solved using Level 2 methods: counting on to find the total (adding) or counting on to find the unknown addend (subtracting). Level 2 and 3 methods are generally used in grades one and two. Finding an unknown addend (e.g., 8 + = 14) is used for Add To/Change Unknown, Put Together/Take Apart/Addend Unknown, and Compare/Difference Unknown. It is also used for Take From/Change Unknown (14 - = 8) after a student has decomposed the total into two addends, which means they can represent the situation as 14 – 8 = . Adding or subtracting by counting on is used by some students for each of the kinds of Compare problems (see the equations in Table 1 of the Glossary). Grade one students do not necessarily master the Compare Bigger Unknown or The Mathematics Framework was adopted by the California State Board of Education on November 6, 2013. The Mathematics Framework has not been edited for publication. State Board of Education-Adopted Appendix F: Methods Used for Solving Single-Digit Addition and Subtraction Problems Page 3 of 4 Smaller Unknown problems with the misleading language in the bottom row of Table 1 of the Glossary. Solving an equation such as 6 + 8 = by counting on from 8 relies on the understanding that 8 + 6 gives the same total, an implicit use of the commutative property without the accompanying written representation 6 + 8 = 8 + 6. Level 3. Convert to an Easier Equivalent Problem. Decompose an addend and compose a part with another addend. These methods can be used to add or to find an unknown addend (and thus to subtract). These methods implicitly use the associative property. Adding Make a ten. E.g., for 8 + 6 = , 8 + 6 = 8 + 2 + 4 = 10 + 4 = 14, so 8 + 6 becomes 10 + 4. Doubles plus or minus 1. E.g., for 6 + 7 = , 6 + 7 = 6 + 6 + 1 = 12 + 1 = 13, so 6 + 7 becomes 12 + 1. Finding an unknown addend. Make a ten. E.g., for 8 + = 14, 8 + 2 = 10 and 4 more makes 14. 2 + 4 = 6. So 8 + = 14 is done as two steps: how many up to ten and how many over ten (which can be seen in the ones place of 14). Doubles plus or minus 1. E.g., for 6 + = 13, 6 + 6 + 1 = 12 + 1. 6 + 1 = 7. So 6 + = 13 is done as two steps: how many up to 12 (6 + 6) and how many from 12 to 13. The Mathematics Framework was adopted by the California State Board of Education on November 6, 2013. The Mathematics Framework has not been edited for publication. State Board of Education-Adopted Appendix F: Methods Used for Solving Single-Digit Addition and Subtraction Problems Page 4 of 4 Subtracting. Thinking of subtracting as finding an unknown addend. E.g., solve 14 – 8 = or 13 – 6 = as 8 + = 14 or 6 + = 13 by the above methods (make a ten or doubles plus or minus 1). Make a ten by going down over ten. E.g., 14 – 8 = can be done in two steps by going down over ten: 14 – 4 (to get to 10) – 4 = 6. The Level 1 and Level 2 problem types can be solved using these Level 3 methods. Level 3 problem types can be solved by representing the situation with an equation or drawing, then re-representing to create a situation solved by adding, subtracting, or finding an unknown addend as shown above by methods at any level, but usually at Level 2 or 3. Many students only show in their writing part of this multi-step process of re-representing the situation. Students re-represent Add To/Start Unknown + 6 = 14 situations as 6 + = 14 by using the commutative property (formally or informally). Students re-represent Take From/Start Unknown - 8 = 6 situations by reversing as 6 + 8 = , which may then be solved by counting on from 8 or using a Level 3 method. At Level 3, the Compare misleading language situations can be solved by representing the known quantities in a diagram that shows the bigger quantity in relation to the smaller quantity. The diagram allows the student to find a correct situation by representing the difference between quantities and seeing the relationship among the three quantities. Such diagrams are the same diagrams used for the other versions of compare situations; focusing on which quantity is bigger and which is smaller helps to overcome the misleading language. Some students may solve Level 3 problem types by doing the above re-representing but use Level 2 counting on. As students move through levels of solution methods, they increasingly use equations to represent problem situations as situation equations and then to re-represent the situation with a solution equation or a solution computation. They relate equations to diagrams, facilitating such re-representing. Labels on diagrams can help connect the parts of the diagram to the corresponding parts of the situation. But students may know and understand things that they may not use for a given solution of a problem as they increasingly do various representing and re-representing steps mentally. (Adapted from Progressions, K-5 CC and OA 2011) The Mathematics Framework was adopted by the California State Board of Education on November 6, 2013. The Mathematics Framework has not been edited for publication.
4103
https://www.teacherspayteachers.com/browse?search=dividing%20fractions%20puzzles
Dividing Fractions Puzzles | TPT Log InSign Up Cart is empty Total: $0.00 View Wish ListView Cart Grade Elementary Preschool Kindergarten 1st grade 2nd grade 3rd grade 4th grade 5th grade Middle school 6th grade 7th grade 8th grade High school 9th grade 10th grade 11th grade 12th grade Adult education Resource type Student practice Independent work packet Worksheets Assessment Graphic organizers Task cards Flash cards Teacher tools Classroom management Teacher manuals Outlines Rubrics Syllabi Unit plans Lessons Activities Games Centers Projects Laboratory Songs Clip art Classroom decor Bulletin board ideas Posters Word walls Printables Seasonal Holiday Black History Month Christmas-Chanukah-Kwanzaa Earth Day Easter Halloween Hispanic Heritage Month Martin Luther King Day Presidents' Day St. Patrick's Day Thanksgiving New Year Valentine's Day Women's History Month Seasonal Autumn Winter Spring Summer Back to school End of year ELA ELA by grade PreK ELA Kindergarten ELA 1st grade ELA 2nd grade ELA 3rd grade ELA 4th grade ELA 5th grade ELA 6th grade ELA 7th grade ELA 8th grade ELA High school ELA Elementary ELA Reading Writing Phonics Vocabulary Grammar Spelling Poetry ELA test prep Middle school ELA Literature Informational text Writing Creative writing Writing-essays ELA test prep High school ELA Literature Informational text Writing Creative writing Writing-essays ELA test prep Math Math by grade PreK math Kindergarten math 1st grade math 2nd grade math 3rd grade math 4th grade math 5th grade math 6th grade math 7th grade math 8th grade math High school math Elementary math Basic operations Numbers Geometry Measurement Mental math Place value Arithmetic Fractions Decimals Math test prep Middle school math Algebra Basic operations Decimals Fractions Geometry Math test prep High school math Algebra Algebra 2 Geometry Math test prep Statistics Precalculus Calculus Science Science by grade PreK science Kindergarten science 1st grade science 2nd grade science 3rd grade science 4th grade science 5th grade science 6th grade science 7th grade science 8th grade science High school science By topic Astronomy Biology Chemistry Earth sciences Physics Physical science Social studies Social studies by grade PreK social studies Kindergarten social studies 1st grade social studies 2nd grade social studies 3rd grade social studies 4th grade social studies 5th grade social studies 6th grade social studies 7th grade social studies 8th grade social studies High school social studies Social studies by topic Ancient history Economics European history Government Geography Native Americans Middle ages Psychology U.S. History World history Languages Languages American sign language Arabic Chinese French German Italian Japanese Latin Portuguese Spanish Arts Arts Art history Graphic arts Visual arts Other (arts) Performing arts Dance Drama Instrumental music Music Music composition Vocal music Special education Speech therapy Social emotional Social emotional Character education Classroom community School counseling School psychology Social emotional learning Specialty Specialty Career and technical education Child care Coaching Cooking Health Life skills Occupational therapy Physical education Physical therapy Professional development Service learning Vocational education Other (specialty) Dividing Fractions Puzzles 2,000+results Sort by: Relevance Relevance Rating Rating Count Price (Ascending) Price (Descending) Most Recent Sort by: Relevance Relevance Rating Rating Count Price (Ascending) Price (Descending) Most Recent Search Grade Subject Supports Price Format All filters Filters Grade Elementary Preschool Kindergarten 1st grade 2nd grade 3rd grade 4th grade 5th grade Middle school 6th grade 7th grade 8th grade High school 9th grade 10th grade 11th grade 12th grade Higher education Adult education More Not grade specific Subject Art Coloring pages Graphic arts Visual arts English language arts Balanced literacy Close reading Creative writing ELA test prep Grammar Handwriting Informational text Literature Phonics & phonological awareness Reading Reading strategies Spelling Vocabulary Writing Writing-essays Writing-expository Other (ELA) Math Algebra Algebra 2 Applied math Arithmetic Basic operations Calculus Decimals Financial literacy Fractions Geometry Graphing Math test prep Measurement Mental math Money math Numbers Order of operations Place value Precalculus Statistics Telling time Other (math) Performing arts Music Physical education More Science Basic principles Computer science - technology General science Instructional technology Other (science) Social emotional Classroom community Social emotional learning Social studies Geography Latino and Hispanic studies Religion World history World languages French Spanish For all subjects Price Free Under $5 $5-10 $10 and up On sale Format Digital Canva Other (digital) Easel Easel Activities Google Apps Image Interactive whiteboards Activboard Activities SMART Notebook More Microsoft Microsoft Excel Microsoft OneDrive Microsoft PowerPoint Microsoft Word PDF Resource type Classroom decor Bulletin board ideas Posters Forms Classroom forms Teacher tools Lessons Classroom management Homeschool curricula Teacher manuals Thematic unit plans Tools for common core Unit plans Yearlong curriculum Printables Hands-on activities Activities Centers Projects Internet activities Bell ringers Cultural activities Escape rooms Games Project-based learning Simulations More Instruction Handouts Interactive notebooks Scaffolded notes Student assessment Assessment Critical thinking and problem solving Study guides Study skills Test preparation Student practice Independent work packet Worksheets Flash cards Graphic organizers Homework Movie guides Task cards Workbooks Standard Theme Seasonal Autumn Back to school End of year Spring Summer Winter Holiday AAPI history month April Fools' Day Arbor Day Black history month Christmas-Chanukah-Kwanzaa Cinco de Mayo Day of the Dead / Dia de los Muertos Diwali Earth Day Easter Father's Day Groundhog Day Halloween Hispanic heritage month July 4/Independence Day Juneteenth Labor Day Lunar New Year Mardi Gras Martin Luther King Day Memorial Day Mother's Day New Year Presidents' Day St. Patrick's Day Thanksgiving Valentine's Day Veterans' Day Women's History Month More Audience TPT sellers Homeschool Parents Staff & administrators More Language En français English (UK) More Programs & methods Programs GATE / Gifted and Talented Montessori More Supports ESL, EFL, and ELL Special education Life skills Neurodiversity Specialty Career and technical education Cooking Other (specialty) More TEKS 6.3E ✩ Multiply &Divide Fractions ✩ Google Sheets Puzzle Activity Created by MathTexas Looking for a SELF-CHECKING digital activity? Make online learning fun with these 3 Google Sheets activities + a Paper Version! Try a Sample ➯ ✩ FREE ✩ Rounding Decimals ✩ Mystery PictureTry a Sample ➯ ✩ FREE ✩ Fraction Arithmetic ✩ Digital PuzzleTry a Sample ➯ ✩ FREE ✩ Direct Variation ✩ Digital ColoringThese 3 puzzles are SELF-CHECKING. Each correct solution automatically puts together a bit of the puzzle. Students do NOT need to be familiar with Google Sheets and there is NO prep. A paper 6 th Arithmetic, Math, Other (Math) Also included in:6.3E ★ Activities BUNDLE ★ Multiply & Divide Rational Numbers ★ STAAR 2.0 Prep $3.49 Original Price $3.49 Rated 4.83 out of 5, based on 40 reviews 4.8(40) Add to cart Wish List Multiplying and Dividing Fractions and Mixed Numbers | Crossword Puzzles Created by Math is Easy Multiplication and Division of Fractions and Mixed Numbers Doing crosswords is fun and exciting, so students will be happy to do the task. Students have to put the numbers into empty cells based on a crossword puzzle. This product contains 5 crosswords with a different number of problems (from 16 to 30). There are more empty cells in the “Hard” crossword. Each page is presented both in color and in an ink-saving black and white version. Answers included. This resource is great for:homewo 4 th - 6 th Basic Operations, Fractions, Math CCSS 4.NF.B.4 , 5.NF.B.4 , 5.NF.B.7 +2 Also included in:Multiplication and Division of Fractions Bundle $3.00 Original Price $3.00 Rated 4.78 out of 5, based on 9 reviews 4.8(9) Add to cart Wish List Free Math Maze Puzzles Add & Subtract Fractions, Multiply &Divide Whole Numbers Created by count on kupe Do you want to add mazes and puzzles to your math workshop? These mazes are a perfect addition to any math class. Students will work through the maze by solving 5th grade math problems. The goal of the mazes is to review computation in an engaging way! Digital Version now included! Included in this Download: -2 Different Mazes - Multiply &Divide Whole Numbers, Add & Subtract Fractions - Digital Google Slides version of the puzzles -Answer Keys Check out more here! :5th Grade Math Maz 4 th - 6 th Basic Operations, Decimals, Fractions CCSS 5.NBT.B.5 , 5.NBT.B.6 , 5.NF.A.1 FREE Rated 4.75 out of 5, based on 159 reviews 4.8(159) Log in to Download Wish List Divide Fractions& Mixed Numbers Mystery Pixel Puzzle Digital Activity Created by BD Designs Your students will love this self checking activity! Students will divide fractions and mixed numbers. Answers will include whole numbers, fractions and mixed numbers in simplest form. Answers will use a backslash (/) for a fraction bar, and an underscore to separate the whole number from the fraction. (example 3_1/2) Google Sheet will reveal pixels of a mystery picture as students answer questions correctly. Incorrect answers will highlight red, allowing students to self check their understandi 4 th - 8 th Fractions, Math Also included in:Multiply & Divide Fractions & Mixed Numbers Mystery Pixel Puzzles Bundle $4.00 Original Price $4.00 Rated 4.64 out of 5, based on 14 reviews 4.6(14) Add to cart Wish List Fraction Division Enrichment Activities - Dividing Fractions Math Logic Puzzles Created by Live Laugh Math Divide Fractions Challenge Puzzles are a fun way to differentiate for your students while they gain a deeper understanding of dividing with unit fractions and fraction division. These puzzles are available as a printable PDF and a paperless version made with Google Slides™ for distance learning. Three different types of puzzles are included: grid logic puzzles, determine the fractions puzzlers, and missing digits puzzles. These 14 different dividing fractions enrichment puzzles allow students t 5 th - 8 th Fractions CCSS 5.NF.B.7 Also included in:Fraction Operations Enrichment Activities, Math Challenges, & Logic Puzzles $4.00 Original Price $4.00 Rated 4.57 out of 5, based on 21 reviews 4.6(21) Add to cart Wish List Dividing with Unit Fractions Digital Mystery Puzzle Pixel Art| 5.NF.7 Created by Teaching in the Big Sky Practice dividing by unit fractions in this fun and engaging activity! This is an amazing resource because it is digital, no prep, no print,and self-checking! This resource features 12-questions where students must solve problems that divide a unit fraction by a whole number, a whole number by a unit fraction, as well as word problems that involve fraction division! This resource also includes a PDF document with answer key and tips for using this digital resource. What is a Mystery Puzzl 5 th - 6 th Fractions, Math, Math Test Prep CCSS 5.NF.B.7 , 5.NF.B.7a , 5.NF.B.7b +1 Also included in:March Digital Mystery Puzzle Pixel Art Bundle | St. Patrick's Day| March Madness $2.00 Original Price $2.00 Rated 4.78 out of 5, based on 9 reviews 4.8(9) Add to cart Wish List Multiplying and Dividing Fractions Activity Game Puzzles 6th Grade Math 6.NS.1 Created by Ready Lessons Looking for a fun interactive teaching idea for a multiplying and dividing fractions activity ? Well look no further as Dividing Fractions by Fractions Game Puzzles, for CCSS 6.NS.1, will serve as an exciting lesson plan for 6th grade middle school classrooms. This is a great resource to incorporate into your unit as a guided math center rotation, review exercise, small group work, morning work, remediation, intervention or rti. It can also be used as a quiz, drill, test, or assessment tool to h 5 th - 7 th Basic Operations, Fractions, Math CCSS 6.NS.A.1 $4.90 Original Price $4.90 Rated 5 out of 5, based on 8 reviews 5.0(8) Add to cart Wish List Interpret Fractions as Division Digital Puzzles {5.NF.3} 5th Grade Math Activity Created by Fun in 5th Grade Puzzling over how to make math review both fun and effective? These differentiated, digital measurement puzzles for practicing and understanding interpreting fractions as division (5.NF.3) will provide your students with an engaging way to build their math skills in a way that feels like a game! Use on ANY DEVICE with an internet connection! ⭐️⭐️⭐️ Save BIG when you buy the BUNDLE! Click here to check it out. ⭐️⭐️⭐️ You’ll get 3 puzzles with 3 different levels (easy, medium, hard) to make diffe 5 th Fractions, Math, Math Test Prep CCSS 5.NF.B.3 Also included in:5th Grade Digital Math Puzzles - ALL Standards Bundle {78 puzzles} $4.00 Original Price $4.00 Rated 5 out of 5, based on 4 reviews 5.0(4) Add to cart Wish List Fractions as Division Digital Mystery Puzzle Pixel Art | 5.NF.3 Created by Teaching in the Big Sky Strengthen student’s understanding of fractions as division in this mystery picture art! This is an amazing resource because it is digital, no prep, no print,and self-checking! This resource features 12-questions where students must write the division problem as a fraction. This resource also includes a PDF document with answer key and tips for using this digital resource. What is a Mystery Puzzle?A mystery puzzle is a digital math activity using Google Sheets that is similar to a color by 5 th - 6 th Basic Operations, Fractions, Other (Math) CCSS 5.NF.B.3 Also included in:March Digital Mystery Puzzle Pixel Art Bundle | St. Patrick's Day| March Madness $2.00 Original Price $2.00 Rated 5 out of 5, based on 3 reviews 5.0(3) Add to cart Wish List Dividing Fractions Solve the Mystery Puzzle Created by Jennifer Hall Fun classroom practice for dividing fractions! Easy prep--Just print and cut out the answer cards and print out the worksheets for your students. Place the answer cards around the room and have your students begin solving the mystery. Who stole the sixth graders pizza? Students will solve eighteen fraction division problems and then match their answers with clue cards around the room to eliminate suspects, locations, and pizza types. When they have finished all the problems, they will be able 6 th - 8 th Fractions, Math CCSS 6.NS.A.1 $2.00 Original Price $2.00 Rated 4.82 out of 5, based on 13 reviews 4.8(13) Add to cart Wish List 5th Grade Dividing Whole Numbers by Unit Fractions Game Activity Puzzles 5.NF.7 Created by Ready Lessons Looking for a fun interactive teaching idea for dividing whole numbers by unit fractions? Well look no further as Dividing Whole Numbers by Fractions Game Puzzles, for CCSS 5.NF.7, will serve as an exciting lesson plan for 5th grade elementary school classrooms. This is a great resource to incorporate into your unit as a guided math center rotation, review exercise, small group work, morning work, remediation, intervention or rti. It can also be used as a quiz, drill, test, or assessment tool to 4 th - 6 th Basic Operations, Fractions, Math CCSS 5.NF.B.7 , 5.NF.B.7b Also included in:5th Grade Math Review Games Bundle for Center Activities $4.90 Original Price $4.90 Rated 4.88 out of 5, based on 8 reviews 4.9(8) Add to cart Wish List Multiplying and Dividing Fractions Digital Puzzle Activity| Google Classroom Created by Let's Break it Down Students will match up strips by solving multiplication and division fraction equations. This is digital activity and also printable. Perfect for in-class or remote learning! Students can drag and drop the strips on the digital version or can match up the strips on the printable version. Perfect for small group, intervention, stations, for early finishers, homework, review etc. Puzzle 1: Multiplying Fractions Puzzle 2 Dividing Fractions Puzzle 3 + 4: Multiplying and Dividing Fractions This pur 4 th - 7 th Arithmetic, Fractions, Math CCSS 5.NF.B.4 , 6.NS.A.1 Also included in:6th Grade Fun Math Digital Activities Bundle | Google Classroom $3.00 Original Price $3.00 Rated 4.6 out of 5, based on 5 reviews 4.6(5) Add to cart Wish List Multiply &Divide Fractions& Mixed Numbers Mystery Pixel Puzzles Bundle Created by BD Designs Your students will love these self checking activities! Students will multiply and divide fractions and mixed numbers. Answers will include whole numbers, fractions and mixed numbers in simplest form. Answers will use a backslash (/) for a fraction bar, and an underscore to separate the whole number from the fraction. (example 3_1/2) Google Sheet will reveal pixels of a mystery picture as students answer questions correctly. Incorrect answers will highlight red, allowing students to self check t 4 th - 8 th Fractions, Math Bundle (5 products) $20.00 Original Price $20.00 $16.00 Price $16.00 Rated 5 out of 5, based on 4 reviews 5.0(4) Add to cart Wish List 4th Grade Math Puzzles Math Riddles BUNDLE Division Multiplication Fractions Created by Fishyrobb This is a bundle of 4th grade secret code math riddle activities. Each individual resource includes two standards-aligned activities that provide students with targeted skill practice. Includes: Multiplication (2-digt x 1-digit)Multiplication (3-digit x 1-digit)Division (dividends up to 4 digits)Equivalent FractionsMultiplying Fractions by Whole NumbersAddition up to 999,999Subtraction up to 999,999To complete the activities, place a set of cards around the room. When students find a card, they 4 th Basic Operations, Fractions, Measurement CCSS 4.MD.A.1 , 4.NBT.B.4 , 4.NBT.B.5 +3 Bundle (6 products) $15.00 Original Price $15.00 $11.50 Price $11.50 Rated 5 out of 5, based on 2 reviews 5.0(2) Add to cart Wish List Puzzle - Dividing Fractions - PP Created by Pupsaroni Puzzles This puzzle was created by Pupsaroni Puzzlesfor use in classrooms studying fractions. Typically, this is in grades 5 thru Algebra 1. The focus of this activity is to practice dividing fractions. Cut out the cards on pages 2-5. Have students match up the problem with the answer to the problem. When the problems are completed, the student should have the puzzle completed. An an-swer key has been provided on page 6 for your convenience in grading. This set of cards has a focus of dividing fractio 5 th - 10 th Basic Operations, Fractions, Math $2.50 Original Price $2.50 Rated 5 out of 5, based on 52 reviews 5.0(52) Add to cart Wish List Dividing Fractions Ghost Puzzle | 6th Grade | Math | Halloween Created by Middles and Mayhem Dividing Fractions Ghost Puzzle This is a quick resource to help students review, or practice, dividing fractions! This is a PHYSICAL resource and requires you to print it out yourself. Students will match 33 dividing fractions problems with their answer and glue them down to make a ghost puzzle. This is a great activity to use as a review, group activity, or if you need a quick, no prep, activity at the end of a unit! The answers are NOT in simplest form, but you can have your students work 5 th - 8 th Applied Math, Math $3.00 Original Price $3.00 Rated 5 out of 5, based on 1 reviews 5.0(1) Add to cart Wish List Fractions - multiplying and dividing - Math puzzle Created by Math World Fractions – multiplying and dividing – Math puzzleI’ve included three different sizes of the same puzzle. The smaller size is only three pages and is great if you are going to print of individual copies for students to practice in class or at home. The larger size requires 8 pieces of paper and quite a bit of space to solve – fun for centers and group work. The extra-large size requires 24 pieces of paper. Cut out the puzzle pieces (or even better if your students do it themselves) and students 6 th - 11 th Fractions, Math, Numbers $3.50 Original Price $3.50 Rated 5 out of 5, based on 10 reviews 5.0(10) Add to cart Wish List Dividing Unit Fractions and Whole Numbers Puzzle Created by Jessica Ridgway This puzzle is a fun way to review dividing fractions with your students. Includes dividing a whole number by a unit fraction and unit fraction by a whole number. Simply cut the puzzle up and give it your students to put together. Perfect activity for a math center or small group time! 5 th - 6 th Basic Operations, Fractions $1.00 Original Price $1.00 Rated 4.96 out of 5, based on 24 reviews 5.0(24) Add to cart Wish List Divide Whole Numbers by Fractions Mystery Pixel Puzzle Digital Activity Created by BD Designs Your students will love this self checking activity! Students will find the reciprocal of fractions. Students will divide whole numbers by fractions. Answers include whole numbers, fractions and mixed numbers. Answers will use a backslash (/) for a fraction bar, and an underscore to separate the whole number from the fraction. (example 3_1/2) Google Sheet will reveal pixels of a mystery picture as students answer questions correctly. Incorrect answers will highlight red, allowing students to sel 4 th - 8 th Fractions, Math Also included in:Multiply & Divide Fractions & Mixed Numbers Mystery Pixel Puzzles Bundle $4.00 Original Price $4.00 Rated 5 out of 5, based on 2 reviews 5.0(2) Add to cart Wish List Multiplying &Dividing Fractions: Square Puzzles Created by Amy Ruffo Included are 6 challenging square puzzles. Students are given the puzzle pieces and must solve the problems to match the pieces together. This makes for a great center activity! Simply cut and laminate the pieces for repeated use OR give the students the scrambled puzzle pages to cut out and assemble. The 6 puzzles are: 1. Multiplying Fractions with Whole Numbers 2. Multiplying Fractions by Fractions 3. Multiplying Mixed Numbers 4. Dividing Fractions with Whole Numbers 5. Dividing Fractions b 5 th - 6 th Fractions, Math CCSS 5.NF.B.4 , 5.NF.B.7 , 6.NS.A.1 $3.00 Original Price $3.00 Rated 4.94 out of 5, based on 69 reviews 4.9(69) Add to cart Wish List Dividing Fractions Number Search: Keep Change Flip Puzzle: Paper + Digital Created by Middle School Matt This comprehensive dividing fractions number search is a captivating and effective way to help students master the concept of division with fractions. This ready-to-use worksheet turns a typical math assignment into an engaging puzzle activity by challenging students to find the answers in a number search grid. How It Works: To complete the activity, students first solve a division problem using the "Keep, Change, Flip" method and then search for the numerical answer within the grid. Inc 6 th - 9 th Basic Operations, Fractions, Math Test Prep Bundle (2 products) $9.98 Original Price $9.98 $5.99 Price $5.99 Add to cart Wish List Multiplying &Dividing Fractions and Mixed Numbers Crossword Puzzle Created by Maya Khalil You could create a word bank for this puzzle since students are going to need help spelling out the fraction answers. Make sure "Actual Size" is checked in the print dialogue box when printing, otherwise the printer might shrink the worksheet. 5 th - 8 th Fractions, Math FREE Rated 5 out of 5, based on 16 reviews 5.0(16) Log in to Download Wish List Writing Fractions as Division Problems Activity 5th Grade Fractions Math Puzzle Created by Chloe Campbell Are you looking for a fun and simple puzzle activity to help your 5th grade students practice fractions as division problems? This fractions math puzzle is the perfect solution! Use it as a low-prep math center, for practice after a whole group lesson, in small groups, or as a teacher table game. It's also great for spiral review throughout the year and makes a fun test prep activity too! Your students will love completing these math puzzles while mastering the content standards along the w 3 rd - 5 th Algebra, Fractions, Math CCSS 5.NF.B.3 Also included in:5th Grade Math Early Finishers BUNDLE - Math Puzzles 5th Grade Math Choice Board $3.00 Original Price $3.00 Rated 5 out of 5, based on 4 reviews 5.0(4) Add to cart Wish List Multiplying And Dividing Fractions Puzzle Summer Packet For 5th To 6th Grade Created by Printables and Worksheets These are fun worksheets on multiplying and dividing fractions by whole numbers. It's a Summer coloring activity that your students will love! Select the right set of problems for your students. To solve the mystery picture, they must first answer the questions correctly. After that, they can match their answers to the colors and then color the grid to reveal the hidden image. This packet is a subset of Summer Fractions and Decimals Mystery Pictures. (Click for more details)Product Contents 4 th - 7 th Fractions, Math $3.99 Original Price $3.99 Rated 5 out of 5, based on 1 reviews 5.0(1) Add to cart Wish List 1 2 3 4 5 Showing 1-24 of 2,000+results TPT is the largest marketplace for PreK-12 resources, powered by a community of educators. Facebook Instagram Pinterest Twitter About Who we are We're hiring Press Blog Gift Cards Support Help & FAQ Security Privacy policy Student privacy Terms of service Tell us what you think Updates Get our weekly newsletter with free resources, updates, and special offers. Get newsletter IXL family of brands IXL Comprehensive K-12 personalized learning Rosetta Stone Immersive learning for 25 languages Wyzant Trusted tutors for 300 subjects Education.com 35,000 worksheets, games, and lesson plans Vocabulary.com Adaptive learning for English vocabulary Emmersion Fast and accurate language certification Thesaurus.com Essential reference for synonyms and antonyms Dictionary.com Comprehensive resource for word definitions and usage SpanishDictionary.com Spanish-English dictionary, translator, and learning FrenchDictionary.com French-English dictionary, translator, and learning Ingles.com Diccionario inglés-español, traductor y sitio de aprendizaje ABCya Fun educational games for kids © 2025 by IXL Learning |Protected by reCAPTCHAPrivacy•Terms
4104
https://openstax.org/books/university-physics-volume-2/pages/11-5-force-and-torque-on-a-current-loop
Skip to ContentGo to accessibility pageKeyboard shortcuts menu University Physics Volume 2 11.5 Force and Torque on a Current Loop University Physics Volume 211.5 Force and Torque on a Current Loop Search for key terms or text. Learning Objectives By the end of this section, you will be able to: Evaluate the net force on a current loop in an external magnetic field Evaluate the net torque on a current loop in an external magnetic field Define the magnetic dipole moment of a current loop Motors are the most common application of magnetic force on current-carrying wires. Motors contain loops of wire in a magnetic field. When current is passed through the loops, the magnetic field exerts torque on the loops, which rotates a shaft. Electrical energy is converted into mechanical work in the process. Once the loop’s surface area is aligned with the magnetic field, the direction of current is reversed, so there is a continual torque on the loop (Figure 11.15). This reversal of the current is done with commutators and brushes. The commutator is set to reverse the current flow at set points to keep continual motion in the motor. A basic commutator has three contact areas to avoid and dead spots where the loop would have zero instantaneous torque at that point. The brushes press against the commutator, creating electrical contact between parts of the commutator during the spinning motion. Figure 11.15 A simplified version of a dc electric motor. (a) The rectangular wire loop is placed in a magnetic field. The forces on the wires closest to the magnetic poles (N and S) are opposite in direction as determined by the right-hand rule-1. Therefore, the loop has a net torque and rotates to the position shown in (b). (b) The brushes now touch the commutator segments so that no current flows through the loop. No torque acts on the loop, but the loop continues to spin from the initial velocity given to it in part (a). By the time the loop flips over, current flows through the wires again but now in the opposite direction, and the process repeats as in part (a). This causes continual rotation of the loop. In a uniform magnetic field, a current-carrying loop of wire, such as a loop in a motor, experiences both forces and torques on the loop. Figure 11.16 shows a rectangular loop of wire that carries a current I and has sides of lengths a and b. The loop is in a uniform magnetic field: The magnetic force on a straight current-carrying wire of length l is given by To find the net force on the loop, we have to apply this equation to each of the four sides. The force on side 1 is 11.14 where the direction has been determined with the RHR-1. The current in side 3 flows in the opposite direction to that of side 1, so 11.15 The currents in sides 2 and 4 are perpendicular to and the forces on these sides are 11.16 We can now find the net force on the loop: 11.17 Although this result has been obtained for a rectangular loop, it is far more general and holds for current-carrying loops of arbitrary shapes; that is, there is no net force on a current loop in a uniform magnetic field. Figure 11.16 (a) A rectangular current loop in a uniform magnetic field is subjected to a net torque but not a net force. (b) A side view of the coil. To find the net torque on the current loop shown in Figure 11.16, we first consider and Since they have the same line of action and are equal and opposite, the sum of their torques about any axis is zero (see Fixed-Axis Rotation). Thus, if there is any torque on the loop, it must be furnished by and Let’s calculate the torques around the axis that passes through point O of Figure 11.16 (a side view of the coil) and is perpendicular to the plane of the page. The point O is a distance x from side 2 and a distance from side 4 of the loop. The moment arms of and are and respectively, so the net torque on the loop is 11.18 This simplifies to 11.19 where is the area of the loop. Notice that this torque is independent of x; it is therefore independent of where point O is located in the plane of the current loop. Consequently, the loop experiences the same torque from the magnetic field about any axis in the plane of the loop and parallel to the x-axis. A closed-current loop is commonly referred to as a magnetic dipole and the term IA is known as its magnetic dipole moment Actually, the magnetic dipole moment is a vector that is defined as 11.20 where is a unit vector directed perpendicular to the plane of the loop (see Figure 11.16). The direction of is obtained with the RHR-2—if you curl the fingers of your right hand in the direction of current flow in the loop, then your thumb points along If the loop contains N turns of wire, then its magnetic dipole moment is given by 11.21 In terms of the magnetic dipole moment, the torque on a current loop due to a uniform magnetic field can be written simply as 11.22 This equation holds for a current loop in a two-dimensional plane of arbitrary shape. Using a calculation analogous to that found in Capacitance for an electric dipole, the potential energy of a magnetic dipole is 11.23 Example 11.7 Forces and Torques on Current-Carrying Loops A circular current loop of radius 2.0 cm carries a current of 2.0 mA. (a) What is the magnitude of its magnetic dipole moment? (b) If the dipole is oriented at 30 degrees to a uniform magnetic field of magnitude 0.50 T, what is the magnitude of the torque it experiences and what is its potential energy? Strategy The dipole moment is defined by the current times the area of the loop. The area of the loop can be calculated from the area of the circle. The torque on the loop and potential energy are calculated from identifying the magnetic moment, magnetic field, and angle oriented in the field. Solution The magnetic moment μ is calculated by the current times the area of the loop or The torque and potential energy are calculated by identifying the magnetic moment, magnetic field, and the angle between these two vectors. The calculations of these quantities are: Significance The concept of magnetic moment at the atomic level is discussed in the next chapter. The concept of aligning the magnetic moment with the magnetic field is the functionality of devices like magnetic motors, whereby switching the external magnetic field results in a constant spinning of the loop as it tries to align with the field to minimize its potential energy. Check Your Understanding 11.4 Check Your Understanding In what orientation would a magnetic dipole have to be to produce (a) a maximum torque in a magnetic field? (b) A maximum energy of the dipole? PreviousNext Order a print copy Citation/Attribution This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission. Want to cite, share, or modify this book? This book uses the Creative Commons Attribution License and you must attribute OpenStax. Attribution information If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution: Access for free at If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution: Access for free at Citation information Use the information below to generate a citation. We recommend using a citation tool such as this one. Authors: Samuel J. Ling, William Moebs, Jeff Sanny Publisher/website: OpenStax Book title: University Physics Volume 2 Publication date: Oct 6, 2016 Location: Houston, Texas Book URL: Section URL: © Jul 8, 2025 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.
4105
https://openstax.org/books/biology-2e/pages/11-1-the-process-of-meiosis
Skip to Content Go to accessibility page Keyboard shortcuts menu Log in Biology 2e 11.1 The Process of Meiosis Biology 2e 11.1 The Process of Meiosis Search for key terms or text. Learning Objectives By the end of this section, you will be able to do the following: Describe the behavior of chromosomes during meiosis, and the differences between the first and second meiotic divisions Describe the cellular events that take place during meiosis Explain the differences between meiosis and mitosis Explain the mechanisms within the meiotic process that produce genetic variation among the haploid gametes Sexual reproduction requires the union of two specialized cells, called gametes, each of which contains one set of chromosomes. When gametes unite, they form a zygote, or fertilized egg that contains two sets of chromosomes. (Note: Cells that contain one set of chromosomes are called haploid; cells containing two sets of chromosomes are called diploid.) If the reproductive cycle is to continue for any sexually reproducing species, then the diploid cell must somehow reduce its number of chromosome sets to produce haploid gametes; otherwise, the number of chromosome sets will double with every future round of fertilization. Therefore, sexual reproduction requires a nuclear division that reduces the number of chromosome sets by half. Most animals and plants and many unicellular organisms are diploid and therefore have two sets of chromosomes. In each somatic cell of the organism (all cells of a multicellular organism except the gametes or reproductive cells), the nucleus contains two copies of each chromosome, called homologous chromosomes. Homologous chromosomes are matched pairs containing the same genes in identical locations along their lengths. Diploid organisms inherit one copy of each homologous chromosome from each genetic contributor. Meiosis is the nuclear division that forms haploid cells from diploid cells, and it employs many of the same cellular mechanisms as mitosis. However, as you have learned, mitosis produces daughter cells whose nuclei are genetically identical to the original parent nucleus. In mitosis, both the parent and the daughter nuclei are at the same “ploidy level”—diploid in the case of most multicellular animals. Plants use mitosis to grow as sporophytes, and to grow and produce eggs and sperm as gametophytes; so they use mitosis for both haploid and diploid cells (as well as for all other ploidies). In meiosis, the starting nucleus is always diploid and the daughter nuclei that result are haploid. To achieve this reduction in chromosome number, meiosis consists of one round of chromosome replication followed by two rounds of nuclear division. Because many events that occur during each of the division stages are analogous to the events of mitosis, the same stage names are assigned. However, because there are two rounds of division, the major process and the stages are designated with a “I” or a “II.” Thus, meiosis I is the first round of meiotic division and consists of prophase I, prometaphase I, and so on. Likewise, Meiosis II (during which the second round of meiotic division takes place) includes prophase II, prometaphase II, and so on. Figure 11.2 Overview of Meiosis. The production of gametes is a crucial process for sexually reproducing organisms. Meiosis is the mechanism used to reduce diploid cells to haploid gametes while introducing genetic diversity. Prior to meiosis, chromosomes are replicated in S-phase to ensure proper number of chromosomes in the resulting gametes. During meiosis, two successive rounds of division reduces the number of chromosomes (ploidy) of the cell by half. going from diploid cells to haploid gametes. Credit: Rao, A., Tag, A, Fletcher, S., and Ryan, K. Department of Biology, Texas A&M University. Meiosis I Meiosis is preceded by an interphase consisting of G1, S, and G2 phases, which are nearly identical to the phases preceding mitosis. The G1 phase (the “first gap phase”) is focused on cell growth. During the S phase—the second phase of interphase—the cell copies or replicates the DNA of the chromosomes. Finally, in the G2 phase (the “second gap phase”) the cell undergoes the final preparations for meiosis. During DNA duplication in the S phase, each chromosome is replicated to produce two identical copies—sister chromatids that are held together at the centromere by cohesin proteins, which hold the chromatids together until anaphase II. (Note: these chromosome copies are called sister chromatids regardless of whether they are in a female gamete or a male gamete.) Prophase I Early in prophase I, before the chromosomes can be seen clearly with a microscope, the homologous chromosomes are attached at their tips to the nuclear envelope by proteins. As the nuclear envelope begins to break down, the proteins associated with homologous chromosomes bring the pair closer together. Recall that in mitosis, homologous chromosomes do not pair together. The synaptonemal complex, a lattice of proteins between the homologous chromosomes, first forms at specific locations and then spreads outward to cover the entire length of the chromosomes. The tight pairing of the homologous chromosomes is called synapsis. In synapsis, the genes on the chromatids of the homologous chromosomes are aligned precisely with each other. The synaptonemal complex supports the exchange of chromosomal segments between homologous nonsister chromatids—a process called crossing over. Crossing over can be observed visually after the exchange as chiasmata (singular = chiasma) (Figure 11.3). In humans, even though the X and Y sex chromosomes are not completely homologous (that is, most of their genes differ), there is a small region of homology that allows the X and Y chromosomes to pair up during prophase I. A partial synaptonemal complex develops only between the regions of homology. Figure 11.3 Early in prophase I, homologous chromosomes come together to form a synapse. The chromosomes are bound tightly together and in perfect alignment by a protein lattice called a synaptonemal complex and by cohesin proteins at the centromere. Located at intervals along the synaptonemal complex are large protein assemblies called recombination nodules. These assemblies mark the points of later chiasmata and mediate the multistep process of crossover—or genetic recombination—between the nonsister chromatids. Near the recombination nodule, the double-stranded DNA of each chromatid is cleaved, the cut ends are modified, and a new connection is made between the nonsister chromatids. As prophase I progresses, the synaptonemal complex begins to break down and the chromosomes begin to condense. When the synaptonemal complex is gone, the homologous chromosomes remain attached to each other at the centromere and at chiasmata. The chiasmata remain until anaphase I. The number of chiasmata varies according to the species and the length of the chromosome. There must be at least one chiasma per chromosome for proper separation of homologous chromosomes during meiosis I, but there may be as many as 25. Following crossover, the synaptonemal complex breaks down and the cohesin connection between homologous pairs is removed. At the end of prophase I, the pairs are held together only at the chiasmata (Figure 11.4). These pairs are called tetrads because a total of four sister chromatids of each pair of homologous chromosomes are now visible. The crossover events are the first source of genetic variation in the nuclei produced by meiosis. A single crossover event between homologous nonsister chromatids leads to a reciprocal exchange of equivalent DNA between an egg-derived chromosome and a sperm-derived chromosome. When a recombinant sister chromatid is moved into a gamete cell it will carry a combination of maternal and paternal genes that did not exist before the crossover. Crossover events can occur almost anywhere along the length of the synapsed chromosomes. Different cells undergoing meiosis will therefore produce different recombinant chromatids, with varying combinations of maternal and parental genes. Multiple crossovers in an arm of the chromosome have the same effect, exchanging segments of DNA to produce genetically recombined chromosomes. Figure 11.4 Crossover occurs between nonsister chromatids of homologous chromosomes. The result is an exchange of genetic material between homologous chromosomes (for clarity, only one recombination event between two of the four chromatids is represented). Prometaphase I The key event in prometaphase I is the attachment of the spindle fiber microtubules to the kinetochore proteins at the centromeres. Kinetochore proteins are multiprotein complexes that bind the centromeres of a chromosome to the microtubules of the mitotic spindle. Microtubules grow from microtubule-organizing centers (MTOCs). In animal cells, MTOCs are centrosomes located at opposite poles of the cell. The microtubules from each pole move toward the middle of the cell and attach to one of the kinetochores of the two fused homologous chromosomes. Each member of the homologous pair attaches to a microtubule extending from opposite poles of the cell so that in the next phase, the microtubules can pull the homologous pair apart. A spindle fiber that has attached to a kinetochore is called a kinetochore microtubule. At the end of prometaphase I, each tetrad is attached to microtubules from both poles, with one homologous chromosome facing each pole. The homologous chromosomes are still held together at the chiasmata. In addition, the nuclear membrane has broken down entirely. Metaphase I During metaphase I, the homologous chromosomes are arranged at the metaphase plate—roughly in the midline of the cell, with the kinetochores facing opposite poles. Each homologous pair is oriented randomly at the equator. For example, if the two homologous members of chromosome 1 are labeled a and b, then the chromosomes could line up a-b or b-a. This is important in determining the genes carried by a gamete, as each will only receive one of the two homologous chromosomes. (Recall that homologous chromosomes are not identical. They contain different versions of the same genes, and after recombination during crossing over, each gamete will have a unique genetic makeup that has never existed before.) The randomness in the alignment of recombined chromosomes at the metaphase plate, coupled with the crossing over events between nonsister chromatids, are responsible for much of the genetic variation in the offspring. To clarify this further, remember that the homologous chromosomes of a sexually reproducing organism are originally inherited as two separate sets, one from each parent. Using humans as an example, one set of 23 chromosomes is present in the egg cell, often called maternal chromosomes because the genetic contributor is often the mother. The other set of 23 chromosomes is contained in the sperm, and the genetic contributor is called a father who provides the paternal chromosomes. Every cell of the multicellular offspring has copies of the original two sets of homologous chromosomes. When the offspring human creates their own gametes through meiosis, the two sets of chromosomes will be rearranged. In prophase I of meiosis, the homologous chromosomes form the tetrads. In metaphase I, these pairs line up at the midway point between the two poles of the cell to form the metaphase plate. Because there is an equal chance that a microtubule fiber will encounter a maternally or paternally inherited chromosome, the arrangement of the tetrads at the metaphase plate is random. Thus, any maternally inherited chromosome may face either pole. Likewise, any paternally inherited chromosome may also face either pole. The orientation of each tetrad is independent of the orientation of the other 22 tetrads. This event—the random (or independent) assortment of homologous chromosomes at the metaphase plate—is the second mechanism that introduces variation into the gametes or spores. In each cell that undergoes meiosis, the arrangement of the tetrads is different. The number of variations is dependent on the number of chromosomes making up a set. There are two possibilities for orientation at the metaphase plate; the possible number of alignments therefore equals 2n in a diploid cell, where n is the number of chromosomes per haploid set. Humans have 23 chromosome pairs, which results in over eight million (223) possible genetically-distinct gametes just from the random alignment of chromosomes at the metaphase plate. This number does not include the variability that was previously produced by crossing over between the nonsister chromatids. Given these two mechanisms, it is highly unlikely that any two haploid cells resulting from meiosis will have the same genetic composition (Figure 11.5). To summarize, meiosis I creates genetically diverse gametes in two ways. First, during prophase I, crossover events between the nonsister chromatids of each homologous pair of chromosomes generate recombinant chromatids with new combinations of maternal and paternal genes. Second, the random assortment of tetrads on the metaphase plate produces unique combinations of maternal and paternal chromosomes that will make their way into the gametes. Figure 11.5 Random, independent assortment during metaphase I is demonstrated by considering a cell with a set of two chromosomes (n = 2). There are two possible homologous chromosome arrangements at the equatorial plane in metaphase I, that are then separated during anaphase I. The total possible number of different gametes is 2n, where n equals the number of chromosomes in a set. In this example, there are four possible genetic combinations for the gametes. With n = 23 in human cells, there are over eight million possible combinations of paternal and maternal chromosomes. Credit: Rao, A.and Fletcher, S. Department of Biology, Texas A&M University. Anaphase I In anaphase I, the microtubules pull the linked chromosomes apart. The sister chromatids remain tightly bound together at the centromere. The chiasmata are broken in anaphase I as the microtubules attached to the fused kinetochores pull the homologous chromosomes apart (Figure 11.6). Telophase I and Cytokinesis In telophase, the separated chromosomes arrive at opposite poles. The remainder of the typical telophase events may or may not occur, depending on the species. In some organisms, the chromosomes “decondense” and nuclear envelopes form around the separated sets of chromatids produced during telophase I. In other organisms, cytokinesis—the physical separation of the cytoplasmic components into two daughter cells—occurs without reformation of the nuclei. In nearly all species of animals and some fungi, cytokinesis separates the cell contents via a cleavage furrow (constriction of the actin ring that leads to cytoplasmic division). In plants, a cell plate is formed during cell cytokinesis by Golgi vesicles fusing at the metaphase plate. This cell plate will ultimately lead to the formation of cell walls that separate the two daughter cells. Two haploid cells are the result of the first meiotic division of a diploid cell. The cells are haploid because at each pole, there is just one of each pair of the homologous chromosomes. Therefore, only one full set of the chromosomes is present. This is why the cells are considered haploid—there is only one chromosome set, even though each chromosome still consists of two sister chromatids. Recall that sister chromatids are merely duplicates of one of the two homologous chromosomes (except for changes that occurred during crossing over). In meiosis II, these two sister chromatids will separate, creating four haploid daughter cells. Link to Learning Watch this video about meiosis to review the process. Meiosis II In some species, cells enter a brief interphase, or interkinesis, before entering meiosis II. Interkinesis lacks an S phase, so chromosomes are not duplicated. The two cells produced in meiosis I go through the events of meiosis II in synchrony. During meiosis II, the sister chromatids within the two daughter cells separate, forming four new haploid gametes. The mechanics of meiosis II are similar to mitosis, except that each dividing cell has only one set of homologous chromosomes, each with two chromatids. Therefore, each cell has half the number of sister chromatids to separate out as a diploid cell undergoing mitosis. In terms of chromosomal content, cells at the start of meiosis II are similar to haploid cells in G2, preparing to undergo mitosis. Prophase II If the chromosomes decondensed in telophase I, they condense again. If nuclear envelopes were formed, they fragment into vesicles. The MTOCs that were duplicated during interkinesis move away from each other toward opposite poles, and new spindles are formed. Prometaphase II The nuclear envelopes are completely broken down, and the spindle is fully formed. Each sister chromatid forms an individual kinetochore that attaches to microtubules from opposite poles. Metaphase II The sister chromatids are maximally condensed and aligned at the equator of the cell. Anaphase II The sister chromatids are pulled apart by the kinetochore microtubules and move toward opposite poles. Nonkinetochore microtubules elongate the cell. Figure 11.6 The process of chromosome alignment differs between meiosis I and meiosis II. In prophase I, pairs of homologous chromosomes form chiasmata which allow for crossing over events (genetic diversity). These pairs of homologous chromosomes arrange at the metaphase plate in metaphase I. In anaphase I, homologous chromosomes separate. Telophase I and cytokinesis result in haploid cells with 2 sister chromatids of each chromosome. In prophase II, spindle microtubules form and elongate and any nuclear envelope disappears. Sister chromatids arrange at the midpoint of the cells in metaphase II. In anaphase II, the sister chromatids separate. Telophase II and cytokinesis result in haploid cells with a single copy of each chromosome. Credit: Rao, A., Ryan, K., Fletcher, S. and Tag, A. Department of Biology, Texas A&M University. Telophase II and Cytokinesis The chromosomes arrive at opposite poles and begin to decondense. Nuclear envelopes form around the chromosomes. If the parent cell was diploid, as is most commonly the case, then cytokinesis now separates the two cells into four unique haploid cells. The cells produced are genetically unique because of the random assortment of paternal and maternal homologs and because of the recombination of maternal and paternal segments of chromosomes (with their sets of genes) that occurs during crossover. The entire process of meiosis is outlined in Figure 11.7. Figure 11.7 An animal cell with a diploid number of four (2n = 4) proceeds through the stages of meiosis to form four haploid daughter cells. Comparing Meiosis and Mitosis Mitosis and meiosis are both forms of division of the nucleus in eukaryotic cells. They share some similarities, but also exhibit a number of distinct processes that lead to very different outcomes (Figure 11.8). Mitosis is a single nuclear division that results in two nuclei that are usually partitioned into two new cells. The nuclei resulting from a mitotic division are genetically identical to the original nucleus. They have the same number of sets of chromosomes: one set in the case of haploid cells and two sets in the case of diploid cells. In contrast, meiosis consists of two nuclear divisions resulting in four nuclei that are usually partitioned into four new, genetically distinct cells. The four nuclei produced during meiosis are not genetically identical, and they contain one chromosome set only. This is half the number of chromosome sets of the original cell, which is diploid. The main differences between mitosis and meiosis occur in meiosis I, which is a very different nuclear division than mitosis. In meiosis I, the homologous chromosome pairs physically meet and are bound together with the synaptonemal complex. Following this, the chromosomes develop chiasmata and undergo crossover between nonsister chromatids. In the end, the chromosomes line up along the metaphase plate as tetrads—with kinetochore fibers from opposite spindle poles attached to each kinetochore of a homolog to form a tetrad. All of these events occur only in meiosis I. When the chiasmata resolve and the tetrad is broken up with the homologous chromosomes moving to one pole or another, the ploidy level—the number of sets of chromosomes in each future nucleus—has been reduced from two to one. For this reason, meiosis I is referred to as a reductional division. There is no such reduction in ploidy level during mitosis. Meiosis II is analogous to a mitotic division. In this case, the duplicated chromosomes (only one set of them) line up on the metaphase plate with divided kinetochores attached to kinetochore fibers from opposite poles. During anaphase II, as in mitotic anaphase, the kinetochores divide and one sister chromatid—now referred to as a chromosome—is pulled to one pole while the other sister chromatid is pulled to the other pole. If it were not for the fact that there had been crossover, the two products of each individual meiosis II division would be identical (as in mitosis). Instead, they are different because there has always been at least one crossover per chromosome. Meiosis II is not a reduction division because although there are fewer copies of the genome in the resulting cells, there is still one set of chromosomes, as there was at the end of meiosis I. Figure 11.8 Meiosis and mitosis are both preceded by one cycle of DNA replication; however, meiosis includes two nuclear divisions. The four daughter cells resulting from meiosis are haploid and genetically distinct. The daughter cells resulting from mitosis are diploid and identical to the parent cell. Evolution Connection The Mystery of the Evolution of Meiosis Some characteristics of organisms are so widespread and fundamental that it is sometimes difficult to remember that they evolved like other simple traits. Meiosis is such an extraordinarily complex series of cellular events that biologists have had trouble testing hypotheses concerning how it may have evolved. Although meiosis is inextricably entwined with sexual reproduction and its advantages and disadvantages, it is important to separate the questions of the evolution of meiosis and the evolution of sex, because early meiosis may have been advantageous for different reasons than it is now. Thinking outside the box and imagining what the early benefits from meiosis might have been is one approach to uncovering how it may have evolved. Meiosis and mitosis share obvious cellular processes, and it makes sense that meiosis evolved from mitosis. The difficulty lies in the clear differences between meiosis I and mitosis. Adam Wilkins and Robin Holliday1 summarized the unique events that needed to occur for the evolution of meiosis from mitosis. These steps are homologous chromosome pairing and synapsis, crossover exchanges, sister chromatids remaining attached during anaphase, and suppression of DNA replication in interphase. They argue that the first step is the hardest and most important and that understanding how it evolved would make the evolutionary process clearer. They suggest genetic experiments that might shed light on the evolution of synapsis. There are other approaches to understanding the evolution of meiosis in progress. Different forms of meiosis exist in single-celled protists. Some appear to be simpler or more “primitive” forms of meiosis. Comparing the meiotic divisions of different protists may shed light on the evolution of meiosis. Marilee Ramesh and colleagues2 compared the genes involved in meiosis in protists to understand when and where meiosis might have evolved. Although research is still ongoing, recent scholarship into meiosis in protists suggests that some aspects of meiosis may have evolved later than others. This kind of genetic comparison can tell us what aspects of meiosis are the oldest and what cellular processes they may have borrowed from in earlier cells. Link to Learning Click through the steps of this interactive animation to compare the meiotic process of cell division to that of mitosis at How Cells Divide. Footnotes 1Adam S. Wilkins and Robin Holliday, “The Evolution of Meiosis from Mitosis,” Genetics 181 (2009): 3–12. 2Marilee A. Ramesh, Shehre-Banoo Malik and John M. Logsdon, Jr, “A Phylogenetic Inventory of Meiotic Genes: Evidence for Sex in Giardia and an Early Eukaryotic Origin of Meiosis,” Current Biology 15 (2005):185–91. Previous Next Order a print copy Citation/Attribution This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission. Want to cite, share, or modify this book? This book uses the Creative Commons Attribution License and you must attribute OpenStax. Attribution information If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution: Access for free at If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution: Access for free at Citation information Use the information below to generate a citation. We recommend using a citation tool such as this one. Authors: Mary Ann Clark, Matthew Douglas, Jung Choi Publisher/website: OpenStax Book title: Biology 2e Publication date: Mar 28, 2018 Location: Houston, Texas Book URL: Section URL: © Jul 7, 2025 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.
4106
https://magoosh.com/gmat/gmat-math-weighted-averages/
GMAT Math: Weighted Averages - Magoosh Blog — GMAT® Exam GMAT®Blog Magoosh is the leader in GMAT prep, helping millions of students study since 2010. Our affordable self-study plans include 800+ practice questions, full-length practice tests, and a 70 point score improvement guarantee. Prep with Magoosh Top Resources:Free GMAT Practice Test400+ GMAT Math FlashcardsDaily Study PlansGMAT Score CalculatorTop MBA Programs GMAT®Blog Top Resources: Free GMAT Practice Test 400+ GMAT Math Flashcards Daily Study Plans GMAT Score Calculator Top MBA Programs Magoosh is the leader in GMAT prep having helped millions of students study since 2010. Try GMAT Prep with Magoosh GMAT Math: Weighted Averages By Mike MᶜGarry — Last updated on February 23, 2015 in GMAT Word Problems Problems range from easy to hard. 1) On a ferry, there are 50 cars and 10 trucks. The cars have an average mass of 1200 kg and the trucks have an average mass of 3000 kg. What is the average mass of all 60 vehicles on the ferry? (A) 1200 kg (B) 1500 kg (C) 1800 kg (D) 2100 kg (E) 2400 kg 2) In Plutarch Enterprises, 70% of the employees are marketers, 20% are engineers, and the rest are managers. Marketers make an average salary of $50,000 a year, and engineers make an average of $80,000. What is the average salary for managers if the average for all employees is also $80,000? (A) $80,000 (B) $130,000 (C) $240,000 (D) $290,000 (E) $320,000 3) At Didymus Corporation, there are just two classes of employees: silver and gold. The average salary of gold employees is $56,000 higher than that of silver employees. If there are 120 silver employees and 160 gold employees, then the average salary for the company is how much higher than the average salary for the silver employees? (A) $24,000 (B) $28,000 (C) $32,000 (D) $36,000 (E) $40,000 4) In a company of only 20 employees, 10 employees make $80,000/yr, 6 employees make $150,000/yr, and the 4 highest-paid employees all make the same amount. If the average annual salary for the 20 employees is $175,000/yr, then what is the annual salary of each highest-paid employee? (A) $250,000 (B) $300,000 (C) $350,000 (D) $400,000 (E) $450,000 5) In a certain apartment building, there are one-bedroom and two-bedroom apartments. The rental prices of the apartment depend on a number of factors, but on average, two-bedroom apartments have higher rental prices than do one-bedroom apartments. Let R be the average rental price for all apartments in the building. If R is $5,600 higher than the average rental price for all one-bedroom apartments, and if the average rental price for all two-bedroom apartments is $10,400 higher that R, then what percentage of apartments in the building are two-bedroom apartments? (A) 26% (B) 35% (C) 39% (D) 42% (E) 52% 6) At a certain upscale restaurant, there just two kinds of food items: entrees and appetizers. Each entrée item costs $30, and each appetizer item costs $12. Last year, it had a total of 15 food items on the menu, and the average price of a food item on its menu was $18. This year, it added more appetizer items, and the average price of a food item on its menu dropped to $15. How many appetizer items did it add this year? (A) 3 (B) 6 (C) 9 (D) 12 (E) 15 Solutions will appear at the end of the article. Weighted average For the purposes of the GMAT, the weighted average situations occurs when we combine groups of different sizes and different group averages. For example, suppose in some parameter, suppose male employees in a company have one average score, the females have another average score, and gender non-binary/non-conforming employees (GNB/NC) have yet another average. If there were an equal number of men, women, and GNB/NC folks, we could just average the three separate gender averages: that would be ridiculously easy, which is precisely why the GMAT will never present you with groups of equal size in such a question. Instead, the number of male, female, and GNB/NC employees will be profoundly different, one significantly outnumbering the other, and then we will have to combine the individual gender averages to produce a total average for all employees. That’s a weighted average. It is common for weighted average problems on the GMAT to have only two groups, but sometimes there are three (like the above problem), and conceivably, on a very hard problem, there could be four groups. Each group is a different size, each has its own average, and the job is to find the average of everyone all together. Or, perhaps the question will give us most of the info for the individual groups, and give us the total average for everyone, and then ask us to find the size or average of a particular group. We have three basic approaches we can take to these question. Approach I: averages & sums Remember that, even with ordinary average questions, thinking in terms of the sum can often be helpful. We can’t add or subtract averages, but we can add or subtract sums! Right there is the key to one approach to the weighted average situation. If we calculate the sums for each separate group, we can simply add these sums to get the sum of the whole group. Alternately, if we know the size of the total group and the total average for everyone, we can figure out the total sum for everyone, and simply subtract the sums of the individual groups in order to find what we need. Some weighted average problems give percents, not actual counts, of individual groups. In that case, we could simply pick a convenient number for the size of the population, and use the sums method from there. For example, if group A has 20% of the population, group B has 40% of the population, and group C also has 40% of the population, then we could just pretend that group A has one person, groups B & C each have two people, and total population has five people. From this, we could calculate all our sums. This method always works, although is not always the most convenient in more advanced problems. This will be demonstrated in a few of the answers below. Approach II: proportional & percentages Sometimes the information about the sizes of individual groups is given, not in absolute counts of members, but simply in percents or proportions. In the problems above, question #2 simply gives percents, and question #5 asks for a percent. Yes, we could use Approach I, but there’s a faster way. In Approach II, we simply multiply each group average by the percent of the population, expressed as a decimal, which that group occupies. When we add these products up, the sum is magically the total average for everyone. Suppose we have three groups, groups J and K and L which together constitute the entire population. Suppose this summarizes their separate information: The percent have to be expressed in decimal form, so that: Then, the total average is simply given by This approach will be demonstrated in #2 below. Approach III: proportional placement of total average This final method can be hard to understand at first, but if you appreciate it, it is an incredibly fast time-saver. This approach only works if there are exactly two groups, no more. Suppose there are two groups in a population, group 1 and group 2, and suppose that group 1 is bigger than group 2. Let’s also suppose that group 1 has a lower group average, and group 2 has the higher group average. Of course, the total combined average of the two groups together will be between the two individual group averages. In fact, because group 1 is bigger, the combined average will have to be closer to group 1’s average, and further away from group 2’s average. Now, think about a number line, with the two individual group averages and the total averages indicated on the number line. On that number line, I have labeled d1, the distance from the average of group #1 to the combined average, and d2, the distance from the combined average to the average of group 2. The ratio of these two distances is equal to a ratio of the size of the two individual groups. Let’s think about this. The bigger group, here group 1, will have more of an effect on the combined average and therefore will be closer to the combined average—a smaller distance. Therefore, the ratio of the distances must equal the reciprocal of the same ratio of the sizes of the groups: Let’s say group 1 is 3 times larger than group 2. This means d2, the distance from group 2’s average to the combined average, would have to be 3 times bigger than d1, the distance from group 1’s average to the combined average. If the latter is x, then the former is 3x, and the total distance is 4x. If we know the averages of the two groups individually, we would simply have to divide the difference between those group averages by 4: the combined average would be one part away from group 1’s average, or three parts away from group 2’s average. This approach is hard to explain clearly in words. You really have to see it demonstrated in the solutions below to understand it fully. Once you understand it, though, this is an extremely fast method to solve many problems. Summary If the above article gave you any insights, you may want to give the practice problems another look. Remember, in your practice problems on weighted averages, practice all three of these methods. The more ways you have to understand any problems, the more options you will have on test day! Practice problem explanations 1) Method I: using sums We will divide the two masses by 1000, 1.2 and 3 respectively, to simplify calculations. Note the use of the Doubling and Halving trick in the first multiplication. sum for cars = 501.2 = 1000.6 = 60 sum for trucks = 103 = 30 total sum = 60 + 30 = 90 To find the total average, we need to divide this total sum by the total number of vehicles, 60. Since we divided masses by 1000 earlier, we need to multiply by 1000 to get the answer. Total average = 1500 kg. Answer =(B) Method II: proportional placement of the total average Cars to trucks is 5:1, so if the distance between the car’s average and truck’s average were divided into 6 parts, the car’s average is 1 part away from the total average, and the truck’s average is 5 parts away. Well, the difference in the two group averages is 3000 – 1200 = 1800 kg. Divide that by six: each “part” is 300 kg. Well, the total average must be 300 kg bigger than 1200 kg, or 5300 kg smaller than 3000 kg. Either way, that’s 1500 kg. Answer =(B) 2) We will approach this use the proportion & percents approach. Divide all dollar amounts by 1000 for smaller numbers. Multiply each group average by the percent expressed as a decimal: marketers = 0.7050 = 35 engineers = 0.2080 = 16 managers = 0.10x = 0.1x where x is the average salary for the managers. These three should add up to the average for all employees: 35 + 16 + 0.1x = 80 0.1x = 80 – 35 – 16 0.1x = 29 x = 290 Now, multiply the 1000 again, to get back to real dollar amounts. The average salary for managers is $290,000. Answer = (D) 3) Method I: using sums We can use this if we pick a value for the average salary for the silver employees. It actually doesn’t matter what value we pick, because averages will fall in the same relative places regardless of whether all the individual values are slid up and down the number line. The easiest value by far to pick is zero. Let’s pretend that the silver folks make $0, and the gold folks make $56. (I divided dollars by 1000 for simplicity). Now, we also have to simplify the numbers of employees. We could reduce the number of employees as long as we preserve the relative ratio. silver : gold = 120:160 = 12:16 = 3:4 So everything would be the same if we just had 3 silver employees and 4 gold employees. OK, now find the sums. silver = 30 = 0 gold = 456 I am not even going to bother to multiply that out, because we know that the next step is to divide by 7, the total number of employees. total average = 456/7 = 48 = 32 The average salary is $32,000, which is $32,000 higher than the average for the silver employees. Answer = (C) Method II: proportional placement of the total average The ratio of silver employees to gold employees is silver : gold = 120:160 = 12:16 = 3:4 If we divide the distance between the two averages by 7, then silver will be “four parts” away from the total average, and gold will be “three parts” away. Well, the difference is $56,000, so that divided by 7 is $8000. That’s one part. Four parts would be $32,000, which has to be the distance from the silver average to the total average. Answer = (C) 4) We will approach this using sums. The individual employee numbers are small. We will divide all dollar amounts by 1000, for easier calculations. Call the highest-paid employee salary x. Then the sums are lowest = 1080 = 800 middle = 6150 = 3300 = 900 highest = 4x Individual sums must add up to the total sum. 800 + 900 + 4x = 3500 4x = 1800 2x = 900 x = 450 The salary of each of those four highest paid employees is $450,000. Answer = (E) 5) This question is designed for an analysis involving proportional placement of the mean. First, observe that R is much closer to the average for one-bedroom apartments, so there must be more one-bedroom apartments and fewer two-bedroom apartments. The ratio of the distances to R is 5600:10400 = 56:104 Cancel a factor of 8 from both 56 and 104 56:104 = 7:13 One-bedroom apartments are “13 parts” of the building, and two-bedroom apartments are “7 parts.” That’s a total of 7 + 13 = 20 parts in the building. Two-bedroom apartments constitute 7/20 of the apartments in the building. Since 1/20 = 5%, 7/20 = 35%. Answer = (B) 6) Method I: using sums First, last year. Let x be the number of entrees. Then (15 – x) is the number of appetizers. The sums are: entrees = 30x appetizers = (15 – x)12 = 1215 – 12x = 630 – 12x = 180 – 12x total = 1518 = 309 = 270 Notice the use of the Doubling and Halving trick in the second and third lines. The two individual sums should add up to the total sum. 30x + 180 – 12x = 270 18x = 90 x = 5 They start out with 5 entrees and 10 appetizers. Let N be the number of appetizers added, so now there are 5 entrees and (10 + N) appetizers. We need to solve for N. Again, the sums: entrees = 530 = 150 appetizers = (10 + N)12 = 120 + 12N total = (15 + N)15 = 225 + 15N Again, the two individual sums should add up to the total sum. 150 + 120 + 12N = 225 + 15N 270 = 225 + 3N 45 = 3N 15 = N They added 15 more appetizers. Answer = (E) Method I was do-able, but we had to solve for many values. Method II: proportional placement of the total average Originally, the entrée price was 30 – 18 = 12 from the total average, and the appetizer price was 18 – 12 = 6. This means there must have been twice as many appetizers as entrees. Therefore , with 15 items, there must have been 10 appetizers and 5 entrees. The number of entrees doesn’t change. The average drops to $15, so the distance from the entrée price is now 30 – 15 = 15, and the distance from the appetizer price is now 15 – 12 = 3. That’s a 5-to-1 ratio, which means there must be 5x as many appetizers as entrees. Since there still are 5 entrees, there must now be 25 appetizers, so 15 have been added. Answer = (E) If you know how to employ this method, it is much more elegant. Author Mike MᶜGarry Mike served as a GMAT Expert at Magoosh, helping create hundreds of lesson videos and practice questions to help guide GMAT students to success. He was also featured as “member of the month” for over two years at GMAT Club. Mike holds an A.B. in Physics (graduating magna cum laude) and an M.T.S. in Religions of the World, both from Harvard. Beyond standardized testing, Mike has over 20 years of both private and public high school teaching experience specializing in math and physics. In his free time, Mike likes smashing foosballs into orbit, and despite having no obvious cranial deficiency, he insists on rooting for the NY Mets. Learn more about the GMAT through Mike’s Youtubevideo explanations and resources like What is a Good GMAT Score? and the GMAT Diagnostic Test. View all posts More from Magoosh Nova’s GMAT Math Prep Course (Book Review) Common GMAT Math Mistakes GMAT Math: Possibilities for Variables GMAT Math – What Kind of Math is in the Quantitative Section? Share Tweet Pin GRE vs GMAT: Which Should I Take? More from Magoosh Nova’s GMAT Math Prep Course (Book Review) Common GMAT Math Mistakes GMAT Math: Possibilities for Variables GMAT Math – What Kind of Math is in the Quantitative Section? Our Products GRE PrepGMAT PrepSAT PrepACT PrepSAT & ACT Prep for High SchoolsIELTS PrepTOEFL PrepLSAT PrepMCAT PrepPraxis Prep Our Blogs GRE BlogGMAT BlogSAT BlogACT BlogIELTS BlogTOEFL BlogLSAT BlogMCAT BlogPraxis BlogCompany Blog Company Magoosh HomeAbout UsPrivacy PolicyMissionPartner With UsContact Us GMAT® is a registered trademark of the Graduate Management Admission Council (GMAC). This website is not endorsed or approved by GMAC. GRE®, TOEFL®, and Praxis® are registered trademarks of Educational Testing Service (ETS). This website is not endorsed or approved by ETS. SAT® is a registered trademark of the College Board, which was not involved in the production of, and does not endorse this product. LSAT® is a registered trademark of the Law School Admission Council, Inc. This website is not endorsed or approved by the LSAC. ACT® is a registered trademark of ACT, inc. This website is not endorsed or approved by ACT, inc. MCAT is a registered trademark of the Association of American Medical Colleges (AAMC). This website is not endorsed or approved by AAMC. Follow us on social media @2025 Magoosh All Rights Reserved
4107
https://emedicine.medscape.com/article/854424-overview
For You News & Perspective Tools & Reference Edition English Medscape Editions About You Professional Information Newsletters & Alerts Your Watch List Formulary Plan Manager Log Out Log In Medscape Editions English Deutsch Español Français Português UK Univadis from Medscape About You Professional Information Newsletters & Alerts Your Watch List Formulary Plan Manager Log Out Register Log In close Please confirm that you would like to log out of Medscape. If you log out, you will be required to enter your username and password the next time you visit. Log out Cancel Tools & Reference>Clinical Procedures Sentinel Lymph Node Biopsy in Patients With Melanoma Updated: Oct 14, 2021 Author: Amy E Somerset, MD, ABOM; Chief Editor: Arlen D Meyers, MD, MBA more...;) Share Print Feedback Facebook Twitter LinkedIn WhatsApp Email Sentinel Lymph Node Biopsy in Patients With Melanoma Sections Sentinel Lymph Node Biopsy in Patients With Melanoma Overview Practice Essentials Background Indications Contraindications Guidelines Anatomic Considerations Staging Outcomes Show All Periprocedural Care Patient Education and Consent Patient Preparation Monitoring & Follow-up Show All Technique Overview Post Procedure Complications Show All Media Gallery;) Tables) References;) Overview Practice Essentials The incidence of melanoma has risen in the last three decades, with an estimated 106,110 new diagnoses and 7,180 deaths in 2021. Survival rates are profoundly affected by the stage at time of diagnosis, which is determined by nodal involvement. Biopsy of sentinel lymph nodes (SLNs)€”the first lymph nodes involved in lymphatic spread€”can predict the potential for cancer in the local nodal basin or beyond. The histology of the sentinel node reflects the histology of the remaining lymphatic basin. Lymphatic mapping with SLN biopsy (SLNB) (see the image below) is associated with significantly fewer complications than regional lymphadenectomy and is recommended for patients at risk for metastasis. SLNB provides important information for both prognostic and treatment purposes. Intraoperative left axillary sentinel lymph node seen after uptake with blue dye. View Media Gallery) Technical expertise is necessary for adequate identification of the sentinel node. Indications (see below) for SNLB should be evaluated individually, and a thorough discussion regarding the risks and benefits of performing SLNB should be undertaken with the patient. Indications for SLNB SLNB is designated for patients with significant risk of metastasis. Risk of metastasis is directly related to tumor thickness. SLNB should not be offered for melanoma in situ, where cancer cells are confined to the epidermis. SLNB should not be recommended routinely for thin melanomas that are T1a (nonulcerated lesions < 0.8 mm Breslow thickness), as the probability of positivity is less than 5%. However, if adverse features such as mitotic index greater than 2 mm2 (especially in younger patients) or lymphovascular invasion are present, the probability is increased to 5-10%, and SLNB may be considered. SLNB should be considered for thin melanomas that are T1b (0.8 to 1 mm thickness or < 0.8 mm with ulceration). SLNB should be recommended to patients with a clinically negative nodal basin and intermediate thickness primary melanomas (T2 or T3; >1 mm to 4 mm). SLNB should be considered for thick melanomas (T4; >4 mm) and clinically negative nodes. SLNB may be considered for melanoma that exhibits regression (controversial). Potential contraindications for SLNB SLNB is unnecessary if systemic disease is present. SLNB may not be reliable if there has been previous extensive surgery in the targeted lymph node basin. Fine-needle aspiration (FNA) or core needle biopsy of the node is preferable to SLNB as a first step when a clinically evident node is present. There is debate about SLNB following a wide local excision; however, it may be acceptable if extensive reconstruction has not been performed. Some suggest that repeat SLNB following a prior SLNB is inadvisable; however, no definitive recommendations exist in the melanoma literature. The authors do not consider prior SLNB a contraindication for repeat biopsy. For patients who are deemed nonsurgical candidates owing to health conditions, or for patients who will not follow postbiopsy recommendations, an SNLB may be avoided. Currently available genetic expression profiling testing should not be used to determine SLNB candidacy. Staging Clinical staging is based on physical examination and lesion biopsy. Clinical staging commonly involves the tumor, node, metastasis (TNM) staging system as developed by the American Joint Committee on Cancer (AJCC) in collaboration with the Union for International Cancer Control (UICC). This system incorporates the primary tumor (T), lymph nodes (N), and distant metastases (M). Tumor thickness (T) is recorded to the nearest 0.1 mm. Pathologic staging is based on pathologic examination of excised tissue. Tis refers to melanoma in situ. Clinical staging is as follows: Stage 0: TisN0M0 Stage IA: T1aN0M0 Stage IB: T1bN0M0; T2aN0M0 Stage IIA: T2bN0M0; T3aN0M0 Stage IIB: T3bN0M0; T4aN0M0 Stage IIC: T4bN0M0 Stage III: Any T, ‰¥N1, M0 Stage IV: Any T, Any N, M1 Pathologic staging is as follows: Stage 0: TisN0M0 Stage IA: T1aN0M0 Stage IIA: T2bN0M0; T3aN0M0 Stage IB: T1bN0M0; T2aN0M0 Stage IIB: T3bN0M0; T4aN0M0 Stage IIC: T4bN0M0 Stage IIIA: T1a/b-T2a, N1a or N2a, M0 Stage IIIB: T0N1b or N1c, M0 Stage IIIB: T1a/b-T2a, N1b/c or N2b, M0 Stage IIIB: T2b/T3a, N1a-N2b, M0 Stage IIIC: T0, N2b, N2c, N3b or N3c Stage IIIC: T1a-T3a, N2c or N3a/b/c, M0 Stage IIIC: T4b, N1a-N2c, M0 Stage IIID: T4b, N3a/b/c, M0 Stage IV: Any T, Any N, M1 Procedure The main elements of SLNB are as follows: Preoperative intradermal injection of a technetium Tc-99m radiocolloid around the primary melanoma followed by lymphoscintigraphy to image lymphatic drainage patterns The injection may occur the day prior to the procedure, but generally requires a larger dose of radiocolloid Transport to the operative suite and induction of anesthesia Optional intradermal injection of approximately 1 mL of blue dye (isosulfan blue or methylene blue [preferred]) at the site of the primary melanoma followed by massage of the lesion for 4-5 minutes to enhance lymphatic drainage Use of a handheld gamma probe to identify €œhot spots€ with high radiotracer activity (ie, sentinel nodes) Placement of a small incision overlying the hot spot; incisions should be planned to allow for further dissection if this proves necessary Use of a handheld gamma probe to identify hot nodes in the field and guide dissection; visual search for grossly blue nodes (guided by blue lymphatics) may assist if dye is injected Removal of any nodes with significant radiotracer activity, followed by ex vivo measurement of their radioactivity Collection of SLNs (defined as any nodes that are grossly suspicious, harbor blue dye, or have a radioactivity count >10% of the hottest node value) for histologic evaluation, including serial sectioning and appropriate staining Continuation of dissection until the nodal bed count is 10% of that of the hottest node removed (awareness that after four negative nodes, subsequent nodes are very unlikely to be positive) Wide local excision (WLE) of the primary melanoma; lymphatic mapping is generally performed prior to WLE, although it is acceptable to perform after Postprocedure follow up is as follows: All patients: At least annual skin examination for life; regular self-skin and lymph node examination; routine blood tests not recommended Stage I-IIA: Physical examinations and medical history, with attention to skin and lymph nodes, every 6-12 months for 5 years, then annually; routine radiologic surveillance not recommended Stage IIB-IIC: Physical examinations and medical history, with attention to skin and lymph nodes, every 3-6 months for 2 years, and then every 3-12 months for 3 years; consider imaging every 3-12 months for 2 years, then every 6-12 months for an additional 1-3 years Stage IIB-IV: Examinations every 3-6 months for 2 years, then every 3-12 months for 3 years, then annually; consider imaging every 3-12 months to screen for recurrence or metastasis (not recommended after 3-5 years) Stage III with positive sentinel node: Consider ultrasonography Follow up is dictated by the stage of disease, as outlined by the National Comprehensive Cancer Network (NCCN) (Guidelines Version 2.2021). Next: Background Although it has been known since the time of Hippocrates, melanoma was not described in Western literature until recognized by John Hunter in 1787. It was not until 1968 that specimens were examined microscopically when Dr Bodenham confirmed that the €œblack cancer€ described by Hunter was in fact melanoma. Melanoma is the most lethal type of skin cancer and continues to rise in incidence. The American Cancer Society€™s estimates for melanoma include 106,110 new diagnoses in 2021, with 7,180 deaths. Melanoma is one of the fastest growing cancers and its incidence has continued to rise for the last few decades. It is also one of the most common malignancies in patients younger than 30 years, surpassing cervical cancer in young women. Risk factors for development of melanoma include multiple clinically atypical moles or dysplastic nevi, family history, prior melanoma, inherited genetic mutations, and sun exposure. [3, 4] Although melanoma often arises in patients with fair skin and with significant sun exposure, it can affect any ethnicity and areas of the body with limited sun exposure. The concept of lymphatic spread of cancer has been known for quite some time. Accordingly, it was reasoned that removing lymph nodes before the spread of melanoma could prevent systemic disease. In 1898, Snow published his work on the concept of €œanticipatory gland excision,€ or what would be later known as elective lymph node dissection (ELND). Although Snow€™s reasoning was sound, multiple randomized controlled trials, short of subset analysis, showed no beneficial effect on survival or local control. [7, 8, 9] These trials were performed mainly on intermediate-depth melanomas (1-4 mm). In patients with thin melanomas (< 1 mm), the rate of nodal involvement seemed low enough that an ELND was not warranted. For thicker melanomas (>4 mm), the risk of systemic metastasis appeared to outweigh the potential benefit of ELND. In 1955, Seaman and Powers used radiolabeled colloidal gold to describe the path of lymphatic channels followed by cancer cells. Subsequent studies by Gould et al described the first node involved in lymphatic spread, which was then termed the "sentinel lymph node" (SLN). Finally, in 1992, Morton et al showed that the SLN could accurately predict the potential for cancer in the associated nodal basin. Although the complex anatomy and lymphatic drainage of the head and neck (see Anatomic Considerations) can make treatment of melanoma in this area quite challenging, SLN biopsy (SLNB) can be performed with acceptable morbidity. SLNB carries profound prognostic implications and dictates subsequent therapeutic decisions. The impact of further therapy in patients with a positive SLN (eg, completion lymph node dissection [CLND] and/or systemic therapy) remains an active area of investigation. For more information, see Malignant Melanoma, Head and Neck Mucosal Melanomas, and Malignant Melanoma Staging. Previous Next: Indications The National Comprehensive Cancer Network (NCCN) provides recommendations based on probability of sentinel lymph node (SLN) positivity. In patients with clinical stage I/II melanoma, SLN status is the most significant predictor of survival. SNL biopsy (SLNB) is not recommended for patients with melanoma in situ (stage 0) or melanoma less than 0.8 mm in thickness in the absence of ulceration (T1a). Patients with melanomas less than or equal to 1 mm in thickness are at lower risk for nodal involvement (2-5%). For clinical stage IB, T1b melanoma (Breslow depth < 0.8 mm with ulceration or other adverse features including age < 40 years, lymphovascular invasion, significant vertical growth phase, increased mitotic rate), the probability of SLN positivity is increased to 5-10% . Thus, SNLB should be considered in these patients. For patients with stage IB (T2a) or II (T2b and higher) melanoma, the probability of a positive SLN is generally greater than 10%. SLNB should be offered to these patients. For some patients (nonmitogenic, older patients) with stage IB (T2a) and stage II, the probability is actually < 10%. For these cases, SNLB may be considered but not necessarily offered. SLNB should be offered to all patients with a clinically negative nodal basin and a primary melanoma greater than 1 mm in depth. As noted, evaluation of the nodal basins via elective lymph node dissection (ELND) was most commonly limited to melanoma with a depth of 1-4 mm. Biopsy of the sentinel node carries a lower risk of morbidity in comparison to a more extensive lymph node dissection. This has allowed for the expansion of the indications for evaluation of the nodal basins associated with melanoma, and SLNB should be routinely recommended for patients with 1-4 mm thick lesions (T2-T3). SLNB may also be offered to patients with deep (>4 mm; T4) melanoma and clinically negative nodes, as it has proven to yield valuable prognostic information, with rates of positive SLNs ranging from 30-40%. [16, 17] The choice of adjuvant therapy or clinical trial enrollment for patients with very thick melanomas may be influenced by SLNB results. Patients with melanoma exhibiting regression may also be considered for SLNB, although this is more controversial. Some studies have indicated that there may be no association between regression and positive SLN status. [18, 19, 20] SLNB may still be performed following prior wide local excision, despite possible concern regarding accuracy. For clinically or radiographically negative regional nodes and absence of distant metastases, SNLB may be considered for isolated in-transit metastasis or local recurrence of a primary melanoma. Previous Next: Contraindications Sentinel lymph node biopsy (SLNB) is not always warranted. It may be deemed unnecessary when patients present with systemic disease, as it does not alter treatment and does not offer any survival advantage. If a patient presents with a clinically evident node, the first step should be evaluation of that node with fine-needle aspiration (FNA) or core needle biopsy as opposed to SLNB. Whether SLNB should be performed after a wide local excision is somewhat controversial as there is concern regarding altered lymphatics. It appears, however, that if extensive reconstruction has not been performed, SLNB can be used in patients with a prior wide local excision. [21, 22] For patients who have previously undergone SLNB, there is nothing in the melanoma literature to establish definitive recommendations. The breast cancer literature suggests that SLNB may be feasible, but whether such limited data can be applied to melanoma patients is a matter of debate. Nevertheless, given the reliability of lymphatic mapping for the identification of nodal pathways, the authors believe that prior SLNB is not a contraindication to repeat biopsy. Lastly, SNLB should not be recommended to patients who are poor surgical candidates. For patients who will not follow postbiopsy imaging and treatment recommendations, it is reasonable to avoid SNLB. Previous Next: Guidelines Guidelines from the American Society of Clinical Oncology and Society of Surgical Oncology are as follows : Routine sentinel lymph node biopsy (SLNB) not recommended for T1a melanomas (nonulcerated lesions < 0.8 mm in Breslow thickness) SLNB considered for T1b melanomas (0.8-1 mm Breslow thickness or < 0.8 mm Breslow thickness with ulceration) after a thorough discussion with patient about potential benefits and risks associated with the procedure SLNB recommended for T2 and T3 melanomas (Breslow thickness of >1 mm to 4 mm) SLNB may be recommended for T4 melanomas (>4 mm in Breslow thickness), after a discussion of potential benefits and risks In the case of a positive SLNB, completion lymph node dissection (CLND) or careful observation are options for patients with low-risk micrometastatic disease, with due consideration of clinicopathologic factors; for higher-risk patients, careful observation may be considered only after a thorough discussion with patients about potential risks and benefits of foregoing CLND Previous Next: Anatomic Considerations Anatomically following the lymphatic channels below the neck is relatively straightforward. The lymphatics follow the path toward either the ipsilateral axilla or groin in the upper and lower extremities, respectively. Clinicians should be aware that although the majority of sentinel lymph nodes (SLNs) are found in the major nodal basins, some can also be found in the epitrochlear nodal basin in the upper extremities and the popliteal nodal basin in the lower extremities. In the truncal region, lymphatic pathways can travel to multiple nodal basins. This highlights the value of SLN mapping, which eliminates some of the guesswork for determination of melanoma spread. It is important, however, to keep in mind that nodes may be found anywhere along the line from the melanoma site to the nodal basin and that any of these nodes has the potential to harbor metastasis. The lymphatic drainage of the head and neck is more extensive and variable than that of the trunk or extremities. The lymphatic drainage of the anterior neck is based on a system developed at Memorial Sloan-Kettering in the 1930s. Seven levels of lymph nodes exist (see the image below). Lateral cervical lymph nodes I-VI. Level VII nodes are not shown. View Media Gallery) Levels I-V describe the lateral neck lymph node basins, while levels VI and VII describe the central lymph node basins, as follows: Level I: Submandibular nodes, which lie between the mandible and the posterior and anterior bellies of the digastric muscle Level II: Upper jugular nodes, which lie between the skull and the hyoid bone along the internal jugular vein Level III: Middle jugular nodes, which lie between the hyoid bone and the omohyoid muscle along the internal jugular vein Level IV: Lower jugular nodes, which lie between the omohyoid muscle and the clavicle along the internal jugular vein Level V: Posterior triangle nodes, which lie between the trapezius and the sternocleidomastoid muscle above the clavicle Level VI: Centrally located nodes between the carotid sheath and above the suprasternal notch Level VII: Superior mediastinal nodes, which lie below the suprasternal notch Traditionally, a line that bisected the ear caudad to cephalad marked the boundaries of the anterior and posterior drainage of the scalp (see the image below). Lesions anterior to this line would drain to the parotid, submandibular, and cervical lymph nodes (levels I-V). Lesions posterior to this line would drain to the posterior auricular, suboccipital, upper jugular, and posterior triangle lymph nodes. It was assumed that lymphatic drainage would not cross the midline. Drainage patterns of the scalp. View Media Gallery) The advent of lymphoscintigraphy, however, demonstrated that these assumptions are not always accurate. In 1994, Wells et al found that lymphoscintigraphy was discordant with clinical predictions of nodal drainage 84% of the time. Even after revision of the clinical parameters, a study by O€™Brien et al the following year still found a discordance rate of 33%. Uren also reported discordance rates of 33% and demonstrated nodal basins draining across midline in 10% of cases. Previous Next: Staging The staging of melanoma has undergone multiple changes. Common staging is according to the tumor, node, metastasis (TNM) system of the American Joint Committee on Cancer (AJCC) in collaboration with the Union for International Cancer Control (UICC). Changes were made to the 8th edition, which are included in the Table below. Stage groupings are as above. Table. AJCC TNM Classification of Melanoma (Open Table in a new window)) | | | | --- | T | Thickness, mm | Ulceration Status/Mitosis | | Tis | n/a | n/a | | T1 | < 0.8 0.8-1 | a: Without ulceration b: < 0.8 with ulceration or 0.8-1 with or without ulceration | | T2 | >1-2 | a: Without ulceration b: With ulceration | | T3 | >2-4 | a: Without ulceration b: With ulceration | | T4 | >4 | a: Without ulceration b: With ulceration | | N | No. of Metastatic Nodes or Microsatellite, Satellite, or In-transit Metastasis (MSI) | Nodal Metastatic Burden | | NX N0 | Regional lymph nodes not assessed 0 | No lymph node spread | | N1 | 1 | a: 1 clinically occult, no MSI b: 1 clinically detected, no MSI c: No regional lymph node disease, but MSI present | | N2 | 2-3 | a: 2-3 clinically occult, no MSI b: 2-3 with at least 1 clinically detected c: 1 clinically occult or clinically detected and MSI present | | N3 | ‰¥4 | a: ‰¥4 clinically occult, no MSI b: ‰¥4 at least 1 clinically detected or any number of nodes stuck together, no MSI c: ‰¥2 clinically occult or clinically detected and MSI present | | M | Site | Lactate Dehydrogenase Level | | M0 | No distant metastases | n/a | | M1a | Distant skin, soft tissue, and/or nonregional lymph node | M1a(0) Not elevated M1a(1) Elevated | | M1b | Lung metastasis with or without M1a sites of disease | M1b(0) Not elevated M1b(1) Elevated | | M1c | Non-CNS visceral metastases with or without M1a or M1b sites of disease | M1c(0) Not elevated M1c(1) Elevated | | M1d | Distant to CNS with or without M1a, M1b, or M1c sites of disease | M1d(0) Not elevated M1d(1) Elevated | Previous Next: Outcomes A positive sentinel lymph node (SLN) carries extremely valuable prognostic information. Survival rates for patients with a negative SLN have been shown to be superior to those with a positive SLN. In addition, the method of detection has been shown to be a predictor of survival as well. SLNs that are positive only on polymerase chain reaction (PCR) are associated with a better survival rate than those detected with hematoxylin and eosin (H&E) staining (see the image below). Survival rates of negative sentinel lymph node versus detection by polymerase chain reaction (PCR) and detection by PCR and H&E. View Media Gallery) In patients with a positive SLN, previous recommendations were to perform completion lymph node dissection (CLND) and treat with adjuvant interferon€”this was the first adjuvant therapy to show benefit in patients with positive nodes. There have since been major advances in immunotherapy for melanoma, and monoclonal antibodies like ipilimumab have shown equivalent efficacy. More recent studies show protein kinase (PK) inhibitors may be superior as adjuvant therapy and for stage IV disease. There has been identification of several drug targets for the treatment of stage IV disease, with newer drugs inhibiting BRAF, MEK, NRAS, and KIT. Significant clinical benefit has been seen for patients with BRAF mutations, although the most superior systemic therapy has not been established. There is no question that SLN biopsy (SLNB) provides tremendous prognostic information but the actual degree of sentinel node disease that would benefit from treatment is not known. Some studies have shown that a small volume of disease within the SLN is rarely associated with disease in other lymph nodes. Some suggest that even a small amount of disease is associated with recurrence and decreased survival compared with patients with no SLN disease. The MSLT-II trial confirmed prior studies showing that with current treatment paradigms, while immediate CLND reduces regional recurrence slightly (ie, improves regional control), it does not increase melanoma-specific survival. Thus, current NCCN Guidelines indicate both nodal basin surveillance and CLND as primary treatment options in the setting of a microscopically positive SLN, with adjuvant systemic therapy versus observation. The threshold of disease at which patients truly benefit from further surgical or immunologic treatment has not been determined. Previous Periprocedure References American Cancer Society. Key Statistics for Melanoma Skin Cancer. Cancer.org. Available at January 12, 2021; Accessed: October 10, 2021. Bodenham DC. Malignant melanoma. Br J Dermatol. 1968 Mar. 80(3):190-2. [QxMD MEDLINE Link]. Ivry GB, Ogle CA, Shim EK. Role of sun exposure in melanoma. Dermatol Surg. 2006 Apr. 32(4):481-92. [QxMD MEDLINE Link]. Rigel DS, Rivers JK, Kopf AW, Friedman RJ, Vinokur AF, Heilman ER. Dysplastic nevi. Markers for increased risk for melanoma. Cancer. 1989 Jan 15. 63(2):386-9. [QxMD MEDLINE Link]. Coit DG, Andtbacka R, Bichakjian CK, Dilawari RA, Dimaio D, Guild V, et al. Melanoma. J Natl Compr Canc Netw. 2009 Mar. 7(3):250-75. [QxMD MEDLINE Link]. Snow H. Twenty two years' Experience in the Treatment of Cancerous and Other Tumours. London: Balliere, Tindall and Cox; 1898. Balch CM, Soong SJ, Bartolucci AA, Urist MM, Karakousis CP, Smith TJ, et al. Efficacy of an elective regional lymph node dissection of 1 to 4 mm thick melanomas for patients 60 years of age and younger. Ann Surg. 1996 Sep. 224(3):255-63; discussion 263-6. [QxMD MEDLINE Link]. Sim FH, Taylor WF, Ivins JC, Pritchard DJ, Soule EH. A prospective randomized study of the efficacy of routine elective lymphadenectomy in management of malignant melanoma. Preliminary results. Cancer. 1978 Mar. 41(3):948-56. [QxMD MEDLINE Link]. Cascinelli N, Morabito A, Santinami M, MacKie RM, Belli F. Immediate or delayed dissection of regional nodes in patients with melanoma of the trunk: a randomised trial. WHO Melanoma Programme. Lancet. 1998 Mar 14. 351(9105):793-6. [QxMD MEDLINE Link]. Stadelmann WK. The role of lymphatic mapping and sentinel lymph node biopsy in the staging and treatment of melanoma. Clin Plast Surg. 2010 Jan. 37(1):79-99. [QxMD MEDLINE Link]. Crowley NJ, Seigler HF. The role of elective lymph node dissection in the management of patients with thick cutaneous melanoma. Cancer. 1990 Dec 15. 66(12):2522-7. [QxMD MEDLINE Link]. SEAMAN WB, POWERS WE. Studies on the distribution of radioactive colloidal gold in regional lymph nodes containing cancer. Cancer. 1955 Sep-Oct. 8(5):1044-6. [QxMD MEDLINE Link]. Gould EA, Winship T, Philbin PH, Kerr HH. Observations on a "sentinel node" in cancer of the parotid. Cancer. 1960 Jan-Feb. 13:77-8. [QxMD MEDLINE Link]. Morton DL, Wen DR, Wong JH, Economou JS, Cagle LA, Storm FK. Technical details of intraoperative lymphatic mapping for early stage melanoma. Arch Surg. 1992 Apr. 127(4):392-9. [QxMD MEDLINE Link]. Thompson JF, Shaw HM. Sentinel node mapping for melanoma: results of trials and current applications. Surg Oncol Clin N Am. 2007 Jan. 16(1):35-54. [QxMD MEDLINE Link]. Ferrone CR, Panageas KS, Busam K, Brady MS, Coit DG. Multivariate prognostic model for patients with thick cutaneous melanoma: importance of sentinel lymph node status. Ann Surg Oncol. 2002 Aug. 9(7):637-45. [QxMD MEDLINE Link]. Gershenwald JE, Mansfield PF, Lee JE, Ross MI. Role for lymphatic mapping and sentinel lymph node biopsy in patients with thick (> or = 4 mm) primary melanoma. Ann Surg Oncol. 2000 Mar. 7(2):160-5. [QxMD MEDLINE Link]. Fontaine D, Parkhill W, Greer W, Walsh N. Partial regression of primary cutaneous melanoma: is there an association with sub-clinical sentinel lymph node metastasis?. Am J Dermatopathol. 2003 Oct. 25(5):371-6. [QxMD MEDLINE Link]. Morris KT, Busam KJ, Bero S, Patel A, Brady MS. Primary cutaneous melanoma with regression does not require a lower threshold for sentinel lymph node biopsy. Ann Surg Oncol. 2008 Jan. 15(1):316-22. [QxMD MEDLINE Link]. Socrier Y, Lauwers-Cances V, Lamant L, Garrido I, Lauwers F, Lopez R, et al. Histological regression in primary melanoma: not a predictor of sentinel lymph node metastasis in a cohort of 397 patients. Br J Dermatol. 2010 Apr. 162(4):830-4. [QxMD MEDLINE Link].[Full Text]. Gannon CJ, Rousseau DL Jr, Ross MI, Johnson MM, Lee JE, Mansfield PF. Accuracy of lymphatic mapping and sentinel lymph node biopsy after previous wide local excision in patients with primary melanoma. Cancer. 2006 Dec 1. 107(11):2647-52. [QxMD MEDLINE Link]. Evans HL, Krag DN, Teates CD, Patterson JW, Meijer S, Harlow SP. Lymphoscintigraphy and sentinel node biopsy accurately stage melanoma in patients presenting after wide local excision. Ann Surg Oncol. 2003 May. 10(4):416-25. [QxMD MEDLINE Link]. Roumen RM, Kuijt GP, Liem IH. Lymphatic mapping and sentinel node harvesting in patients with recurrent breast cancer. Eur J Surg Oncol. 2006. 32:1076-1081. [QxMD MEDLINE Link]. [Guideline] Wong SL, Faries MB, Kennedy EB, Agarwala SS, Akhurst TJ, Ariyan C, et al. Sentinel Lymph Node Biopsy and Management of Regional Lymph Nodes in Melanoma: American Society of Clinical Oncology and Society of Surgical Oncology Clinical Practice Guideline Update. Ann Surg Oncol. 2018 Feb. 25 (2):356-377. [QxMD MEDLINE Link]. Thompson JF, Uren RF, Shaw HM, McCarthy WH, Quinn MJ, O'Brien CJ. Location of sentinel lymph nodes in patients with cutaneous melanoma: new insights into lymphatic anatomy. J Am Coll Surg. 1999 Aug. 189(2):195-204. [QxMD MEDLINE Link]. Wells KE, Cruse CW, Daniels S, Berman C, Norman J, Reintgen DS. The use of lymphoscintigraphy in melanoma of the head and neck. Plast Reconstr Surg. 1994 Apr. 93(4):757-61. [QxMD MEDLINE Link]. O'Brien CJ, Uren RF, Thompson JF, Howman-Giles RB, Petersen-Schaefer K, Shaw HM. Prediction of potential metastatic sites in cutaneous head and neck melanoma using lymphoscintigraphy. Am J Surg. 1995 Nov. 170(5):461-6. [QxMD MEDLINE Link]. Uren RF. Lymphatic drainage of the skin. Ann Surg Oncol. 2004 Mar. 11(3 Suppl):179S-85S. [QxMD MEDLINE Link]. Balch CM, Gershenwald JE, Soong SJ, Thompson JF, Atkins MB, Byrd DR, et al. Final version of 2009 AJCC melanoma staging and classification. J Clin Oncol. 2009 Dec 20. 27(36):6199-206. [QxMD MEDLINE Link].[Full Text]. Ribuffo D, Gradilone A, Vonella M, Chiummariello S, Cigna E, Haliassos N. Prognostic significance of reverse transcriptase-polymerase chain reaction-negative sentinel nodes in malignant melanoma. Ann Surg Oncol. 2003 May. 10(4):396-402. [QxMD MEDLINE Link]. Faries MB, Thompson JF, Cochran AJ, et al. Completion Dissection or Observation for Sentinel-Node Metastasis in Melanoma. N Engl J Med. 2017 Jun 8. 376 (23):2211-2222. [QxMD MEDLINE Link]. Valsecchi ME, Silbermins D, de Rosa N, Wong SL, Lyman GH. Lymphatic mapping and sentinel lymph node biopsy in patients with melanoma: a meta-analysis. J Clin Oncol. 2011 Apr 10. 29 (11):1479-87. [QxMD MEDLINE Link]. Gershenwald JE, Tseng CH, Thompson W, Mansfield PF, Lee JE, Bouvet M. Improved sentinel lymph node localization in patients with primary melanoma with the use of radiolabeled colloid. Surgery. 1998 Aug. 124(2):203-10. [QxMD MEDLINE Link]. Carlson GW, Murray DR, Lyles RH, Hestley A, Cohen C. Sentinel lymph node biopsy in the management of cutaneous head and neck melanoma. Plast Reconstr Surg. 2005 Mar. 115(3):721-8. [QxMD MEDLINE Link]. Vermeeren L, Valdés Olmos RA, Klop WM, van der Ploeg IM, Nieweg OE, Balm AJ, et al. SPECT/CT for sentinel lymph node mapping in head and neck melanoma. Head Neck. 2011 Jan. 33 (1):1-6. [QxMD MEDLINE Link]. Stoffels I, Boy C, Pöppel T, Kuhn J, Klötgen K, Dissemond J, et al. Association between sentinel lymph node excision with or without preoperative SPECT/CT and metastatic node detection and disease-free survival in melanoma. JAMA. 2012 Sep 12. 308 (10):1007-14. [QxMD MEDLINE Link]. Patel SG, Coit DG, Shaha AR, Brady MS, Boyle JO, Singh B. Sentinel lymph node biopsy for cutaneous head and neck melanomas. Arch Otolaryngol Head Neck Surg. 2002 Mar. 128(3):285-91. [QxMD MEDLINE Link]. Carlson GW, Murray DR, Thourani V, Hestley A, Cohen C. The definition of the sentinel lymph node in melanoma based on radioactive counts. Ann Surg Oncol. 2002 Nov. 9(9):929-33. [QxMD MEDLINE Link]. Scolyer RA, Thompson JF, McCarthy SW, Gershenwald JE, Ross MI, Cochran AJ. Intraoperative frozen-section evaluation can reduce accuracy of pathologic assessment of sentinel nodes in melanoma patients. J Am Coll Surg. 2005 Nov. 201(5):821-3; author reply 823-4. [QxMD MEDLINE Link]. Koopal SA, Tiebosch AT, Albertus Piers D, Plukker JT, Schraffordt Koops H, Hoekstra HJ. Frozen section analysis of sentinel lymph nodes in melanoma patients. Cancer. 2000 Oct 15. 89(8):1720-5. [QxMD MEDLINE Link]. Tanis PJ, Boom RP, Koops HS, Faneyte IF, Peterse JL, Nieweg OE, et al. Frozen section investigation of the sentinel node in malignant melanoma and breast cancer. Ann Surg Oncol. 2001 Apr. 8(3):222-6. [QxMD MEDLINE Link]. Alkhatib W, Hertzenberg C, Jewell W, Al-Kasspooles MF, Damjanov I, Cohen MS. Utility of frozen-section analysis of sentinel lymph node biopsy specimens for melanoma in surgical decision making. Am J Surg. 2008 Dec. 196(6):827-32; discussion 832-3. [QxMD MEDLINE Link].[Full Text]. Ariyan S, Ariyan C, Farber LR, Fischer DS, Flynn SD, Truini C. Reliability of identification of 655 sentinel lymph nodes in 263 consecutive patients with malignant melanoma. J Am Coll Surg. 2004 Jun. 198(6):924-32. [QxMD MEDLINE Link]. Gipponi M, Solari N, Lionetto R, Di Somma C, Villa G, Schenone F. The prognostic role of the sentinel lymph node in clinically node-negative patients with cutaneous melanoma: experience of the Genoa group. Eur J Surg Oncol. 2005 Dec. 31(10):1191-7. [QxMD MEDLINE Link]. Eicher SA, Clayman GL, Myers JN, Gillenwater AM. A prospective study of intraoperative lymphatic mapping for head and neck cutaneous melanoma. Arch Otolaryngol Head Neck Surg. 2002 Mar. 128(3):241-6. [QxMD MEDLINE Link]. Schmalbach CE, Nussenbaum B, Rees RS, Schwartz J, Johnson TM, Bradford CR. Reliability of sentinel lymph node mapping with biopsy for head and neck cutaneous melanoma. Arch Otolaryngol Head Neck Surg. 2003 Jan. 129(1):61-5. [QxMD MEDLINE Link]. Wells KE, Rapaport DP, Cruse CW, Payne W, Albertini J, Berman C, et al. Sentinel lymph node biopsy in melanoma of the head and neck. Plast Reconstr Surg. 1997 Sep. 100(3):591-4. [QxMD MEDLINE Link]. Jacobs IA, Chevinsky AH, Swayne LC, Magidson JG, Britto EJ, Smith TJ. Gamma probe-directed lymphatic mapping and sentinel lymphadenectomy in primary melanoma: Reliability of the procedure and analysis of failures after long-term follow-up. J Surg Oncol. 2001 Jul. 77(3):157-64. [QxMD MEDLINE Link]. Carlson GW, Page AJ, Cohen C, Parker D, Yaar R, Li A, et al. Regional recurrence after negative sentinel lymph node biopsy for melanoma. Ann Surg. 2008 Sep. 248(3):378-86. [QxMD MEDLINE Link]. Media Gallery Lateral cervical lymph nodes I-VI. Level VII nodes are not shown. Drainage patterns of the scalp. Lymphoscintigraphy of a forehead melanoma with uptake in the parotid and submandibular nodes. Survival rates of negative sentinel lymph node versus detection by polymerase chain reaction (PCR) and detection by PCR and H&E. Intraoperative left axillary sentinel lymph node seen after uptake with blue dye. Confirmation of the sentinel node based on a high radioactive count. of 6 Tables Table. AJCC TNM Classification of Melanoma;) Table. AJCC TNM Classification of Melanoma | | | | --- | T | Thickness, mm | Ulceration Status/Mitosis | | Tis | n/a | n/a | | T1 | < 0.8 0.8-1 | a: Without ulceration b: < 0.8 with ulceration or 0.8-1 with or without ulceration | | T2 | >1-2 | a: Without ulceration b: With ulceration | | T3 | >2-4 | a: Without ulceration b: With ulceration | | T4 | >4 | a: Without ulceration b: With ulceration | | N | No. of Metastatic Nodes or Microsatellite, Satellite, or In-transit Metastasis (MSI) | Nodal Metastatic Burden | | NX N0 | Regional lymph nodes not assessed 0 | No lymph node spread | | N1 | 1 | a: 1 clinically occult, no MSI b: 1 clinically detected, no MSI c: No regional lymph node disease, but MSI present | | N2 | 2-3 | a: 2-3 clinically occult, no MSI b: 2-3 with at least 1 clinically detected c: 1 clinically occult or clinically detected and MSI present | | N3 | ‰¥4 | a: ‰¥4 clinically occult, no MSI b: ‰¥4 at least 1 clinically detected or any number of nodes stuck together, no MSI c: ‰¥2 clinically occult or clinically detected and MSI present | | M | Site | Lactate Dehydrogenase Level | | M0 | No distant metastases | n/a | | M1a | Distant skin, soft tissue, and/or nonregional lymph node | M1a(0) Not elevated M1a(1) Elevated | | M1b | Lung metastasis with or without M1a sites of disease | M1b(0) Not elevated M1b(1) Elevated | | M1c | Non-CNS visceral metastases with or without M1a or M1b sites of disease | M1c(0) Not elevated M1c(1) Elevated | | M1d | Distant to CNS with or without M1a, M1b, or M1c sites of disease | M1d(0) Not elevated M1d(1) Elevated | Back to List Contributor Information and Disclosures Author Amy E Somerset, MD, ABOM General and Bariatric Surgeon, Harper Bariatric Medicine Institute, General and Bariatric Surgery of Grosse Pointe; Clinical Assistant Professor of Surgery, Wayne State University School of MedicineAmy E Somerset, MD, ABOM is a member of the following medical societies: American College of Surgeons, American Society for Metabolic and Bariatric Surgery, Society of American Gastrointestinal and Endoscopic SurgeonsDisclosure: Nothing to disclose. Coauthor(s) Mark J Jameson, MD, PhD, FACS Medical Director, Avera Medical Group ENT-Head and Neck Surgery, Avera McKennan Hospital and University Health CenterMark J Jameson, MD, PhD, FACS is a member of the following medical societies: American Academy of Otolaryngology-Head and Neck Surgery, American Association for Cancer Research, American College of Surgeons, American Head and Neck SocietyDisclosure: Serve(d) as a speaker or a member of a speakers bureau for: Castle Biosciences. Specialty Editor Board Francisco Talavera, PharmD, PhD Adjunct Assistant Professor, University of Nebraska Medical Center College of Pharmacy; Editor-in-Chief, Medscape Drug ReferenceDisclosure: Received salary from Medscape for employment. Nader Sadeghi, MD, FRCSC Professor and Chairman, Department of Otolaryngology-Head and Neck Surgery, McGill University Faculty of Medicine; Chief Otolaryngologist, MUHC; Director, McGill Head and Neck Cancer Program, Royal Victoria Hospital, CanadaNader Sadeghi, MD, FRCSC is a member of the following medical societies: American Academy of Otolaryngology-Head and Neck Surgery, American Head and Neck Society, American Thyroid Association, Royal College of Physicians and Surgeons of CanadaDisclosure: Nothing to disclose. Chief Editor Arlen D Meyers, MD, MBA Emeritus Professor of Otolaryngology, Dentistry, and Engineering, University of Colorado School of MedicineArlen D Meyers, MD, MBA is a member of the following medical societies: American Academy of Facial Plastic and Reconstructive Surgery, American Academy of Otolaryngology-Head and Neck Surgery, American Head and Neck SocietyDisclosure: Serve(d) as a director, officer, partner, employee, advisor, consultant or trustee for: Cerescan; Neosoma; MI10;Invitrocaptal,Medtechsyndicates Received income in an amount equal to or greater than $250 from: Neosoma; Cyberionix (CYBX);MI10;Invitrocaptal;MTS Received ownership interest from Cerescan for consulting for: Neosoma, MI10 advisor. Additional Contributors Mimi S Kokoska, MD Physician, Department of Otolaryngology-Head and Neck Surgery, Aurora Health CareMimi S Kokoska, MD is a member of the following medical societies: American Academy of Facial Plastic and Reconstructive Surgery, American Academy of Otolaryngology-Head and Neck Surgery, American Association for Physician Leadership, American College of Surgeons, American Head and Neck SocietyDisclosure: Nothing to disclose. Richard D Keidan, MD Attending Surgeon, Director, Melanoma Clinic, William Beaumont HospitalRichard D Keidan, MD is a member of the following medical societies: American College of Surgeons, Association for Academic Surgery, Society of Surgical OncologyDisclosure: Nothing to disclose. Philip Fong, MD Resident Physician, Department of Surgery, William Beaumont HospitalPhilip Fong, MD is a member of the following medical societies: American College of SurgeonsDisclosure: Nothing to disclose. William L Kestenberg, MD Surgeon, Kestenberg Surgical GroupWilliam L Kestenberg, MD is a member of the following medical societies: American College of SurgeonsDisclosure: Nothing to disclose. Thabet Abbarah, MD, FACS Consulting Staff, Department of Otolaryngology, North Oakland Medical Centers Thabet Abbarah, MD, FACS is a member of the following medical societies: American College of Surgeons Disclosure: Nothing to disclose. Dhananjay A Chitale, MBBS Senior Staff Pathologist, Division Head, Molecular Pathology and Genomic Medicine, Director, Tissue Biorepository, Henry Ford Hospital Dhananjay A Chitale, MBBS is a member of the following medical societies: American Society for Clinical Pathology and College of American Pathologists Disclosure: Nothing to disclose. Amit Dwivedi, MD Assistant Professor of Surgery, University of Louisville School of Medicine Amit Dwivedi, MD is a member of the following medical societies: American College of Surgeons and American Medical Association Disclosure: Nothing to disclose. Venkata Subramanian Kanthimathinathan, MD Staff Physician, Department of General Surgery, Loma Linda University Medical Center Disclosure: Nothing to disclose. Nafisa K Kuwajerwala, MD Staff Surgeon, Breast Care Center, William Beaumont Hospital Nafisa K Kuwajerwala, MD is a member of the following medical societies: American College of Surgeons, American Society of Breast Disease, and American Society of Breast Surgeons Disclosure: Nothing to disclose. Close;) What would you like to print? What would you like to print? Print this section Print the entire contents of Print the entire contents of article Sections Sentinel Lymph Node Biopsy in Patients With Melanoma Overview Practice Essentials Background Indications Contraindications Guidelines Anatomic Considerations Staging Outcomes Show All Periprocedural Care Patient Education and Consent Patient Preparation Monitoring & Follow-up Show All Technique Overview Post Procedure Complications Show All Media Gallery;) Tables) References;) encoded search term (Sentinel Lymph Node Biopsy in Patients With Melanoma) and Sentinel Lymph Node Biopsy in Patients With Melanoma What to Read Next on Medscape Related Conditions and Diseases Malignant Melanoma Staging Malignant Melanoma Malignant Melanoma Treatment Protocols Melanoma Conjunctival Melanoma Choroidal Melanoma Cutaneous Melanoma News & Perspective Tell Me, ChatGPT, Is This a Melanoma? Pembrolizumab for Advanced Melanoma: Is It Worth It? Amelanotic Melanoma Tied to Worse Survival American Society of Clinical Oncology (ASCO) 2025 11th World Congress of Melanoma (WCM) and 21st EADO Congress 2025 Weighing the Balance: Immunotherapy for Cancer Treatment Drug Interaction Checker Pill Identifier Calculators Formulary Deadly Skin Cancers 2002 2007147-overview Diseases & Conditions Diseases & Conditions Malignant Melanoma Staging 2003 /viewarticle/1001795 Case Series: Defining the Role of Immunotherapy Across Melanoma Care 0.5 CME / CE / ABIM MOC Credits You are being redirected to Medscape Education Yes, take me there 0.5 CME / CE / ABIM MOC Case Series: Defining the Role of Immunotherapy Across Melanoma Care 2002 280245-overview Diseases & Conditions Diseases & Conditions Malignant Melanoma 2002 2006810-overview Diseases & Conditions Diseases & Conditions Malignant Melanoma Treatment Protocols
4108
https://www.ncbi.nlm.nih.gov/books/NBK606103/
Urinary Crystals Identification and Analysis - StatPearls - NCBI Bookshelf An official website of the United States government Here's how you know The .gov means it's official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you're on a federal government site. The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely. Log inShow account info Close Account Logged in as: username Dashboard Publications Account settings Log out Access keysNCBI HomepageMyNCBI HomepageMain ContentMain Navigation Bookshelf Search database Search term Search Browse Titles Advanced Help Disclaimer NCBI Bookshelf. A service of the National Library of Medicine, National Institutes of Health. StatPearls [Internet]. Treasure Island (FL): StatPearls Publishing; 2025 Jan-. StatPearls [Internet]. Show details Treasure Island (FL): StatPearls Publishing; 2025 Jan-. Search term Urinary Crystals Identification and Analysis Prathap Kumar Simhadri; Preeti Rout; Stephen W. Leslie. Author Information and Affiliations Authors Prathap Kumar Simhadri 1; Preeti Rout 2; Stephen W. Leslie 3. Affiliations 1 Advent Health 2 Wilson Case Western University 3 Creighton University School of Medicine Last Update: July 27, 2024. Go to: Continuing Education Activity Urinary crystal formation is a marker of urinary supersaturation with different substances and can occur secondary to inherited diseases, metabolic disorders, or drugs. Urine sediment examination by microscopy is an excellent tool for clinicians to understand underlying pathology,although it is often not performed. Different crystals have recognizable appearances and patterns. The presence of crystals can be a clue to underlying disease pathologies. Commonly associated conditions include hyperoxaluria, hypercalciuria, hyperuricemia, metabolic syndrome, and drug-related crystalluria. Proper identification of urinary crystals can aid in selecting therapeutic interventions, from dietary changes to prescribing or discontinuing medications. Given the significant prevalence of nephrolithiasis, proper diagnosis and treatment of risk factors can decrease patient morbidity. This activity reviews the methods used in urine sediment examination and the appropriate identification of various urinary crystals. Participants learn to recognize different types of urine crystals, understand their clinical significance, and apply this knowledge to improve patient outcomes. This activity also highlights the role of the interprofessional team in identifying and interpreting urine crystals, leading to more accurate diagnoses and targeted and effective treatment plans for patients with nephrolithiasis and other urinary crystal–associated diseases. Objectives: Differentiate the various types of urinary crystals observed in urine sediment and their characteristic appearances. Screen patients for metabolic disorders and drug-related causes based on the presence and type of urinary crystals. Apply knowledge of urinary crystal pathogenesis to inform and adjust therapeutic interventions. Coordinate follow-up care and monitoring for patients diagnosed with conditions associated with urinary crystals to prevent recurrence and manage complications. Access free multiple choice questions on this topic. Go to: Introduction Urinary crystal formation is a marker of urinary supersaturation with various substances. Crystals can occur secondary to inherited diseases, metabolic disorders, and medications. The presence of crystals in the urine is not always pathognomic for an abnormal metabolic or renal condition, as uric acid, calcium oxalate, calcium phosphate (CaP), and drug-induced crystals can also be observed under normal physiological conditions. The diagnosis of various monogenetic diseases, such as cystinuria, primary hyperoxaluria, and adenine phosphoribosyl transferase deficiency, can be suggested by examining the urinary sediment and correct identification of the associated urinary crystals. Urinary crystal formation always precedes renal stone formation but does not always lead to nephrolithiasis. When kidney stones are formed, they have the potential to cause acute kidney injury, obstructive uropathy, hydronephrosis, renal colic, pyonephrosis, and urosepsis. Urinary crystals can also cause renal crystal deposition disease, resulting in acute kidney injury, progressive chronic kidney disease, and end-stage kidney disease. Urine sediment examination can be considered a liquid biopsy of the kidney because it provides valuable information about the events occurring in an individual's kidney. However, with the increased utilization of automated systems, urine sediment examination is becoming a lost art. Nonetheless, it remains an excellent source of clinical information to help appropriately diagnose and manage patients with various diseases associated with urinary crystal formation. Please see StatPearls' companion resource, "Calcium Deposition and Other Renal Crystal Diseases," for more information. Go to: Etiology and Epidemiology Metabolic factors, inherited diseases, medications, dietary habits, dehydration, and anatomical abnormalities are the common etiologies contributing to urinary crystal formation. Kidney stone formation is a known risk factor for developing diabetes, cardiovascular disease, fractures, and chronic renal disease. Conversely, these conditions also increase the risk of nephrolithiasis. Kidney stone disease is a polygenetic and multifactorial health problem worldwide that affects between 1% and 13% of the global population and almost 11% of the Western population.Over the past 30 years, the prevalence of kidney stones has been rising across all ages, genders, racial and ethnic groups globally. Approximately 10% of the United States population experience nephrolithiasis in their lifetime. Estimating the overall prevalence of urinary crystalluria is challenging, as this condition is underdiagnosed and underreported.Although scant literature is available on the prevalence of urinary crystalluria, several studies showed crystalluria in approximately 8% of urine collections.Calcium oxalate, uric acid, and amorphous urate crystals accounted for most of the crystals encountered. Brushite, ammonium biurate, and cystine crystals were rare. Go to: Pathophysiology Urine contains both promoters and inhibitors of crystal formation. Crystallization occurs when the concentration of crystal promoters in the glomerular filtrate exceeds the kidney's ability to keep them as soluble molecules. Stone inhibitors include citrate; uromodulin, also known as Tamm-Horsfall protein; magnesium; glycosaminoglycans; and pyrophosphate. Some chemical mediators decrease the urinary crystal's growth, aggregation, and adhesion to the tubular epithelium and the tubular cell; examples are osteopontin, matrix Gla protein, Tamm-Horsfall protein, and urinary fragment 1 of prothrombin. Calcium, oxalate, urate, and phosphate ions are the leading promoters of crystal formation. Physiological factors influencing kidney stone formation include high urinary osmolarity or low urine volume, bacteria in the urinary tract, and urine pH. Structural factors influencing nephrolithiasis include urinary reflux, instrumentation, and genetic abnormalities of the urinary tract. Please see StatPearls' companion resource, "Renal Calculi, Nephrolithiasis," for more information. Go to: Specimen Requirements and Procedure A first-morning urine sample (void after awakening) is ideal for crystal analysis as it tends to be the most concentrated for crystal formation. The urine sample should be brought to the lab and processed within 2 hours of collection.Uric acid and phosphorous crystallization can occur if the urine stays stagnant for longer than 2 hours. Refrigeration of the urine specimen is necessary after 2 hours, and examination within 8 hours of collection is recommended, even when refrigerated. Urine analysis through automated and manual methods can provide significant clues to the type and characteristics of urinary crystals. When examining the sediment, urine pH, specific gravity, and a dipstick analysis should always be recorded. Of note, casts degrade quickly in alkaline urine. Red blood cells (RBCs) and white blood cells (WBCs) can swell in low osmolality and shrink in high osmolality. Urine pH plays a key role in crystallization, as CaP, struvite, and ciprofloxacin crystals precipitate in alkaline urine. In contrast, uric acid, cystine, and other drug-induced crystals tend to precipitate in acidic urine. These characteristics assist clinicians in accurately identifying urinary crystals. For microscopic examination, 10 mL of urine should be centrifuged at 1500 to 3000 revolutions per minute for at least 5 min. The sediment is obtained through a pipette after discarding the top 9.5 cc of supernatant and gentle manual agitation of the test tube. A single drop of urine sediment is placed on the glass slide and covered with a cover slip for direct observation.The sediment is examined using a standard brightfield or phase contrast microscope at low and high magnification. A minimum of 10 fields should be reviewed at each power.The specimen is then examined under polarization to determine birefringence and identify other detailed characteristics. Automated urinary analyzers also often miss crystals when compared to manual microscopic evaluation.Off note, a recent study found significant interoperator variability identifying urinary sediment components, even among experienced nephrologists. Therefore, when possible, a personal examination of urine sediment is preferable. Go to: Diagnostic Tests A comprehensive workup is essential for diagnosing the etiology of urinary crystals. This approach includes obtaining a detailed history and performing a thorough physical examination, and may also include x-ray KUB, renal or abdominal ultrasound, and plain computed tomography (CT) of the abdomen and pelvis to help localize the renal stones. Simple urinalysis and analysis of the urinary crystals can help understand a stone's chemical composition. A chemical analysis of a passed stone can give a definitive answer. Crystalluria indicates supersaturation of the components in the urine, leading to precipitation of the crystals. However, supersaturation alone is insufficient to cause nephrolithiasis; other inciting factors are also typically present. The process can be related to metabolic disorders, inherited diseases, drug use, or toxins. The initial diagnostic test is generally a 24-hour urine collection evaluating the following parameters—urinary volume, pH, calcium, citrate, creatinine, magnesium, phosphate, uric acid, sodium, serum calcium, oxalate, and uric acid levels. The collection should ideally be performed in nonacute conditions at the patient's home with their normal diet and fluid intake for optimal information.Additional workup is typically guided by the type of crystal identified and patient history. Please see StatPearls' companion resources, "24-Hour Urine Collection," and "24-Hour Urine Testing for Nephrolithiasis: Interpretation and Treatment Guidelines,"for more information. Further Diagnostic Testing Based on Stone Composition Calcium oxalate:Calcium oxalate stones comprise up to 80% of all nephrolithiasis cases. Calcium oxalate and CaP often coexist in stones, but 1 component is typically primary. Patients with calcium oxalate crystals should be considered for primary and secondary causes of hyperoxaluria. Please see StatPearls' companion resource, "Calcium Deposition and Other Renal Crystal Diseases," for more information.Calcium oxalate dihydrate (COD) crystals are also highly associated with hypercalcemia, which should also be considered. Calcium oxalate crystalluria is not necessarily pathologic, as these crystals can sometimes be found in patients with high oxalate diets. Hyperoxaluria of >75 mg/d in a 24-hour urine collection suggests possible hereditary hyperoxaluria (types I, II, or III). Calcium phosphate:CaP nephrolithiasis is the second most common type, representing about 10% to 20% of kidney stones. The presence of these stones should prompt evaluation for conditions causing hypercalciuria, hyperphosphaturia, and alkaline urine formation. These crystals can also be found under normal physiological conditions. Struvite:Struvite comprises ammonium, magnesium, and calcium binding with phosphate (triple phosphate). The presence of struvite stones, even in lower quantities, is almost always associated with infection by urease-producing microorganisms, such as Proteus mirabilis,Klebsiella pneumonia,Staphylococcus aureus,Pseudomonas aeruginosa, _Providencia_ stuartii,Serratia,and Morganella morganii. Uric acid:Uric acid dihydrate crystals primarily depend on low urine pH, whereas the amorphous ones are mainly related to high urinary urate concentration.Uric acid crystals are only found when the urinary pH is acidic, as uric acid becomes much more soluble as the pH increases.The presence of uric acid dihydrate crystals should prompt the workup for conditions causing impaired renal ammoniogenesis, such as metabolic syndrome and type 2 diabetes. Xanthine:Xanthine crystals are found in xanthinuria, a rare genetic disorder with autosomal recessive pattern inheritance caused by the deficiency of the enzyme xanthine dehydrogenase. Not all laboratories can test for xanthine and hypoxanthine, nor are these part of a routine urine collection. If this rare disorder is suspected, this test must be ordered specifically. Biopsy of the gastrointestinal tract to quantify xanthine dehydrogenase is rarely performed.An allopurinol loading test can also be used to detect a lack of xanthine oxidase, as allopurinol is abnormally metabolized in patients with hereditary xanthinuria; however, these measurements may not be available in all laboratories. Xanthinuria is also associated with hypouricemia and hypouricosuria. Patients with 2,8-dihydroxyadenine (DHA) crystalluria, cystinuria, and suspected primary hyperoxaluria can also be genetically tested to confirm the diagnosis. Please see StatPearls' companion resources, "Calcium Deposition and Other Renal Crystal Diseases," "Hyperoxaluria," "Uric Acid Nephrolithiasis,""Struvite and Triple Phosphate Renal Calculi,"and "Cystinuria,"for more information. Go to: Testing Procedures Effective testing procedures for urine crystal identification and analysis are crucial for accurate diagnosis and patient care. Techniques commonly used for crystal analysis in clinical practice include the following: Standard light microscopy Optical polarization microscopy Automated microscopy Flow cytometry Digitalized microscopy Scanning electron microscopy Spectroscopy Standard Light Microscopy Manual direct microscopic examination is the gold standard technique used in clinics to identify various urinary crystals based on their morphology.When sufficiently trained and equipped, nephrologists can acquire important diagnostic information through direct microscopy. Brightfield microscopy is more commonly used compared to phase contrast microscopy, but phase contrast microscopy may be more beneficial for analyzing urine sediment. Optical Polarization Microscopy Polarized light microscopy is used to observe the color, morphology, and birefringence of crystals for identification. The color, refraction of the light, and double refraction are the parameters used in mineral identification. However, contaminants can sometimes distort or interfere with the interpretations of results. Automated Microscopy Automated microscopy is a method used in laboratory practice that does not require urine centrifugation or standardized microscope measuring parameters. These machines are based on the Colter principle and became popular in hematology laboratory procedures in 1954 for the rapid and accurate enumeration of cells in the blood. They have been used for urine microscopy since the 1990s. Automated microscopy has been expanded to laser-based flow cytometry for better cell characterization. This technique can utilize a large sample size, reducing the laboratories' workload. Automated microscopy can deliver a complete urine analysis result if urinary biochemical data are combined and integrated with the microscopy analysis. The practical approach is to use automated and manual machines to survey many specimens and expert microscopic examination for selected specimens. Automated systems have significant advantages over manual microscopy, as the specimens do not need centrifugation. They are also highly effective in diagnostic screening for blood, bacteria, and WBCs. However, automated systems significantly underperform in recognizing urinary casts and crystals compared to manual examinations performed by experienced lab technicians, pathologists, and nephrologists. The 2 major types of automated microscopy techniques are as follows: Flow cytometry: These machines use laser-based flow cytometry with fluorescent dyes. Flow cytometry can reduce the need for microscopy or culture and is more useful in screening bacteriuria, pyuria, and hematuria, although sometimes microscopy is still required. This machine produces scattergrams, not actual images. Microscopy is required to differentiate similar particles, such as various types of crystals, dysmorphic or isomorphic RBCs, and different types of epithelial cells. The advantage of this machine is that minimum expertise is required to operate it, and approximately 100 samples can be tested in 1 hour. Digitalized microscopy: The digitalized microscopy technique uses computerized software to analyze digitalized monochrome images of urine particles. Two different instruments that supply digitized images are available. One is based on automated intelligent microscopy, which shows particles in the samples by categories such as RBCs and WBCs. The other uses cuvette-based microscopy, which displays particles in the same way they appear in the microscopic field during manual examination. A significant advantage of this technique is that it can be used for many samples and selective individual specimens. The images can be stored on a computer and sent to different sites, including other laboratories and clinics, for review by pathologists or nephrologists. In addition, this method is relatively cheaper compared to flow cytometry. Scanning Electron Microscopy Scanning electron microscopy produces high-resolution images of the crystal surface, aiding in studying the morphology and texture of urinary calculi.This method can analyze the characteristics of stones ranging from 1 mm to 5 mm without changing the morphology of their components,and it does not destroy the stone sample. This method is also a proposed tool for diagnosing primary hyperoxaluria. Spectroscopy Spectroscopy identifies the molecular structure of a sample by investigating its interaction with electromagnetic radiation.In this technique, infrared light passes through the sample, and the detector analyzes the intensity of the transmitted light. Vibrational spectroscopy identifies a sample's composition and molecular structure through its vibrational characteristics when interacting with a beam source. This technique is analyzed based on the sample's vibrational characteristics when interacting with electromagnetic waves. Other spectroscopy methods, such as Raman and Fourier transform-infrared spectroscopy,are increasingly used in clinical practice. These rapid, nondestructive, and relatively inexpensive methods have been increasingly used in recent years to identify the chemical nature of urinary crystals and detect organic matter.Infrared spectroscopy is extremely useful in identifying calcium oxalate crystals. Overall, clinicians should be able to identify most crystals by checking urine pH and urinalysis, then examining the urine sediment under bright field, phase contrast, and polarizing light microscopy. Fourier transform-infrared and Raman spectroscopy and solubility testing can be additional resources for unclear crystal composition. Go to: Results, Reporting, and Critical Findings The presence of urinary crystals associated with active urinary sediment, acute kidney injury, or kidney stones suggests a pathogenic process. Identifying and characterizing urinary crystals are essential for diagnosing the type of stone, especially when the actual stone is not available for analysis (see Table 1. Characteristics of Commonly Observed Urinary Crystals). The results of urinary crystal analysis are reported after identifying various characteristics of urinalysis and microscopic examination of the urine sediment. Commonly Reported Urinary Crystals Calcium oxalate crystals:There are 2 significant types of calcium oxalate crystals—monohydrate and dihydrate. The calcium oxalate monohydrate (COM) crystals are typically colorless on light microscopy. Their shape varies from oval, biconvex, and dumbbells to elongated rods (see Image.Calcium Oxalate Monohydrate Crystals). These crystals are strongly birefringent on polarized microscopy. COD crystals are colorless on light microscopy and are bipyramidal or envelope-shaped, and their size is variable (see Image. Calcium Oxalate Dihydrate Crystals). These crystals are non-birefringent on polarization. Calcium oxalate crystallization is commonly observed in the urine pH range of 5.0 to 6.5 and is rarely observed when the urine pH increases to >7.0. A rare third form of calcium oxalate crystals, calcium oxalate trihydrate or caoxite, is hexagonal and seldom found in urine. Calcium phosphate crystals:There are calcium orthophosphate crystals, mainly amorphous carbonated CaP and carbapatite, whereas brushite is dicalcium phosphate dihydrate. CaP crystals are colorless on light microscopy. Calcium orthophosphate crystals are amorphous crystals that appear as small granulations with or without large plates and have no polarization (seeImage.Amorphous Phosphate and Triple Phosphate Crystals in the Urine). Brushite crystals have a broad spectrum of shapes,such as prisms, rosettes, starts, needle-like or splinter-like, or sticks or rods (see Image. Calcium Phosphate Crystals). These crystals are strongly birefringent on polarized microscopy and precipitate in alkaline urine. Struvite or triple phosphate crystals:These are radioopaque magnesium ammonium phosphate hexahydrate or triple phosphate crystals. Struvite crystals are colorless under light microscopy. The most common shape observed is a coffin lid; the other shapes are feather-like structures, elongated prisms, and trapezoids. These crystals are weak to strongly birefringent on polarization and precipitate in alkaline urine (see Images. Triple Phosphate Crystals; and Amorphous Phosphate and Triple Phosphate Crystals in the Urine). Cystine crystals:Cystine crystals are colorless on light microscopy and are either found alone or heaped onto each other,resembling perfect hexagonal plates. These crystals show weak birefringence on polarized microscopy and precipitate in urine with an acidic pH (see Image. Cystine Crystals in the Urinary Sediment).Please see StatPearls' companion resource,"Cystinuria,"for more information. Uric acid and urate crystals:There are 4 types of uric acid crystals in urine—amorphous, anhydrous uric acid (uricite), monohydrate, and dihydrate crystals. Among these, uric acid dihydrate and amorphous uric acid crystals are most commonly observed. Uric acid crystals are often amber-colored on light microscopy and have various shapes, such as rho boards, barrels, rosettes, 4-sided plates, needles, rounds, or parallelograms. These crystals show a very strong polychromatic birefringence on polarization (seeImages. Uric Acid Crystals, Barrel-Shaped; Uric Acid Crystals, Rosette-Shaped; and Uric Acid Crystals, Birefringent on Polarized Light).These crystals precipitate in urine with an acidic pH. Xanthine crystals:Xanthine crystals are nonspecific in appearance and can be observed as polarized granules or sticks without a characteristic aspect. Crystal identification requires infrared spectroscopy, high-pressure liquid chromatography, or chemical analysis of a xanthine stone. These crystals precipitate in urine with an acidic pH. Dihydroxyadenine crystals:DHA crystals are somewhat brown or reddish-brown with a dark perimeter and central spicules that are round in shape on light microscopy. These crystals turn yellow and may demonstrate a characteristic birefringent Maltese-cross pattern on polarized microscopy. In suspected 2,8-DHA crystalluria, it is mandatory to investigate the crystals using infrared spectroscopy on a centrifuged pellet. These crystals precipitate in urine with an acidic or alkaline pH (4.8 to 9.0) and are relatively insoluble at any urinary pH. Table Table 1. Characteristics of Commonly Observed Urinary Crystals. Drug-Induced Crystals Drug-induced urinary crystals are variable in size, shape, and other characteristics depending on the specific medication (seeTable 2. Characteristics of Various Drug-Induced Crystals). These rare crystals comprise only 1% to 2% of all nephrolithiasis (seeImages.Sulfamethoxazole Crystals;Sulfadiazine Crystals; and Acyclovir Crystals). Table Table 2. Characteristics of Various Drug-Induced Crystals. Rare Crystals Tyrosine crystals are colorless, thin, and needle-shaped, whereas leucine crystals are oval or round with circular striations. Both these crystals are found in acidic urine and are associated with aminoaciduria secondary to liver disease. Bilirubin crystals, which are clumped needles or yellow granules, are highly birefringent on polarization, and they are observed in conditions associated with hyperbilirubinemia. Cholesterol crystals are thin, transparent plates with cut edges. They are highly birefringent on polarization, typically observed in association with nephrotic syndrome. Solubility Testing The solubility test involves exposing the crystals to 10% KOH, 30% acetic acid, 30% HCL, and chloroform. The solubility of crystals in these fluids provides additional clues that aid in crystal identification (see Table 3. Solubility Characteristics of Crystals). This test is beneficial in identifying crystals with similar shapes. Table Table 3. Solubility Characteristics of Crystals. Interfering Factors Identifying urinary crystals can be challenging due to similarities in their shapes. Calcium sulfate, CaP, and sodium urate crystals can be needle-shaped or rectangle-shaped with blunt ends. COM, hippuric acid, uric acid, and ammonium biurate crystals can be rectangles with pointed ends. Amorphous urate and phosphate granules can have similar minor granular appearances. Solubility tests can help differentiate urinary crystals with similar shapes. Key considerations include: Free hemosiderin granules are yellow-brown coarse granules that can be confused with amorphous phosphate and urate granules. 2,8-DHA crystals can be confused with ammonium hydrogen urate as both have a small spherical shape. Starch granules are oval or round and highly refractive. Their irregular central indentation can resemble molar tooth grooves. Under polarized light,starch granules can appear similar to a Maltese cross and be confused with 2,8-DHA crystals. Cholesterol and leucine crystals can also exhibit a typical Maltese-cross appearance under polarized light. Go to: Clinical Significance Renal stone formation is always preceded by crystalluria, although the presence of urinary crystals does not always result in nephrolithiasis. Investigating crystalluria is crucial for diagnosing and managing acute and chronic renal failure due to crystal precipitations associated with various inherited and acquired diseases. Identifying the type of urinary crystals is also helpful in offering specific targeted treatment for nephrolithiasis. Calcium Oxalate Crystals Calcium oxalate stones comprise up to 80% of all nephrolithiasis. Patients with calcium oxalate crystals should be considered for primary and secondary causes of hyperoxaluria. Please see StatPearls' companion resource, "Calcium Deposition and Other Renal Crystal Diseases," for more information.Calcium oxalate crystalluria is not necessarily pathologic, as these crystals can sometimes be found in those with high oxalate diets.As an overview, calcium monohydrate crystals are generally associated with high urinary oxalate levels, calcium dihydrate crystals are generally associated with high urinary calcium, and the rare dodecahedral calcium dihydrate crystals are associated with very high urinary calcium. Secondary hyperoxaluria is much more common compared to primary hyperoxaluria and is often related to 1 of 3 mechanisms as follows: Increased dietary intake of oxalate-containing foods, such as peanuts, cashews, almonds, spinach, rhubarb, star fruit, chaga mushroom powder, and black iced tea. Increased intestinal absorption of oxalate in a setting of fat malabsorption (enteric hyperoxaluria secondary to intestinal bypass surgery, short gut syndrome, Crohn disease, celiac disease, chronic pancreatitis, and orlistat). Increased intake of oxalate precursors, such as ethylene glycol and vitamin C, can develop increased gut oxalate absorption, leading to excess urinary oxalate excretion. These patients are also at high risk for developing calcium oxalate crystalluria, crystalline nephropathy, chronic kidney disease, and end-stage kidney disease. Ingestion of the toxic substance, ethylene glycol, results in severe hyperoxaluria, and a very peculiar kind of monohydrate crystals with elongated and narrow hexagonal shapes similar to diamonds are found in the urine. COD crystals are typically associated with hypercalciuria, such as hyperparathyroidism; hyperthyroidism; multiple myeloma; paraneoplastic syndrome; bone metastasis; vitamin D toxicity; particular drug use, including loop diuretics and vitamin-D supplements; and milk-alkali syndrome. According to Daudon et al, over 94% of urine specimens containing calcium oxalate crystals with a calcium-to-oxalate ratio of <5 show either monohydrate crystals alone or along with dihydrate crystals. In contrast, over 90% of urine specimens containing calcium oxalate crystals with a calcium-to-oxalate ratio >14 contain dihydrate crystals alone. Dodecahedral COD crystals typically indicate severe hypercalciuria, >7 mmol/L. All types of calcium-containing crystals are radioopaque. Calcium Phosphate Crystals Carbapatite crystals are typically observed in patients with hypercalciuria on a background urine pH of 5.8 to 6.5. In contrast, amorphous CaP crystals are typically observed in patients with near-normal calcium and phosphate concentrations with a pH >6.6. Amorphous CaP crystals suggest a possible environment created by urinary tract infections or metabolic disorders keeping the urine alkaline. When associated with the calcium monohydrate crystals, they indicate the presence of medullary sponge kidneys and other causes related to urinary stasis. When carbapatite crystals are associated with struvite crystals, they indicate the presence of urea-splitting organisms causing urinary tract infections. Brushite crystals are made of dicalcium phosphate dihydrate ions. These crystals are mainly observed in conditions associated with marked hypercalciuria and hyperphosphaturia and are generally favored by low concentrations of citrates. The presence of >500/mL brushite crystals should prompt an evaluation for primary hyperparathyroidism. CaP crystals are radioopaque. Struvite Crystals Struvite crystals are associated with high ammonium content and precipitate in alkaline urine. These crystals are always associated with urinary tract infections by urea-splitting bacteria, where the bacteria hydrolyze the urea, producing ammonia and leading to alkaline urine. These bacteria are Klebsiella, Pseudomonas, Proteus, Providencia, and some species of Staphylococcus. These are radioopaque, sometimes large enough to be called staghorn stones. Cystine Crystals Cystine crystals are associated with hereditary cystinuria,in which a proximal tubular dysfunction leads to increased excretion of dibasic amino acids such as cystine, ornithine, lysine, and arginine. Cystinuria is an autosomal recessive Mendelian disorder, and there are reports of acquired cystinuria post-renal transplant. Cystine forms radiolucent stones, which are not detected on x-rays but can be detected by ultrasound if the stones are large enough. CT scan is the gold standard for diagnosing renal stones and can detect cystine stones. Cystine becomes more soluble as the pH increases. The therapeutic urinary pH level to maximize solubility is ≥7.5, typically higher compared to uric acid. Uric Acid Crystals Uric acid crystals are associated with medical conditions leading to increased uric acid production or altered uric acid metabolism, such as gout, Lesch-Nyhan syndrome, tumor lysis, chemotherapy, or conditions associated with decreased urine pH, such as chronic diarrhea, metabolic syndrome, and diabetes mellitus. However, over half of patients with uric acid stones do not have hyperuricemia. These crystals form radiolucent renal stones that are not detectable on x-rays but can be visualized on CT and ultrasound. Xanthine Stones Xanthine crystals are found in xanthinuria, a rare genetic disorder with autosomal recessive pattern inheritance caused by the deficiency of the enzyme xanthine dehydrogenase. This disorder leads to xanthine accumulation and highly insoluble xanthine excretion. Xanthinuria is associated with hypouricemia and hypouricosuria.Rarely, xanthinuria can occur related to allopurinol use for Lesch-Nyan syndrome or tumor lysis syndrome.More recently, the xanthine oxidase inhibitor, febuxostat, has also been noted to cause xanthinuria when used for tumor lysis syndrome. 2,8-Dihydroxyadenine Crystals 2,8-DHA crystalluria is secondary to adenine phosphoribosyltransferase (APRT) deficiency, an autosomal recessive condition leading to excess DHA production, 2,8-DHA crystalluria, and kidney stones. The condition is underdiagnosed in the United States, with fewer than 300 cases reported in the medical literature. The worldwide prevalence is 1/5000 to 1/100,000 population. A significant number of patients remain asymptomatic, whereas 90% of patients develop urinary crystals and radiolucent renal stones. In addition, 10% of patients with 2,8-DHA crystalluria progress to end-stage renal failure. The diagnosis is confirmed by kidney stone analysis, histologic findings of crystal nephropathy, genetic testing, or lack of APRT activity in RBC lysate. Treatment is recommended with allopurinol or febuxostat, which blocks the conversion of adenosine to DHA. The dosage should be titrated to eliminate 2,8-DHA crystalluria. Drug-Induced Crystals Drug-induced crystals are formed in association with the use of various drugs, as previously described. These crystals precipitate in the urine when used at a high dose, for long durations, or both. They form radiolucent renal stones when they contain no calcium or other radioopaque constituents. Patients experiencing signs and symptoms of nephrolithiasis while using these drugs should prompt the search for renal stones by ultrasound or contrast-enhanced CT imaging for diagnosis. Analyzing these crystals is crucial for identifying at-risk patients and clarifying the drugs or medications involved. Follow-UpMonitoring The complete disappearance of crystalluria is the best indicator of improved lithogenic activity in CaP, uric acid, and other common forms of nephrolithiasis. However, high-risk patients, such as those with cystinuria and PH1, can have active urinary crystallization even when the disease is under reasonable control. Global crystal volume (GCV) helps determine lithogenicity in patients with crystalluria. GCV is the product of the number of crystals/mm 3 multiplied by the average size of crystals (in μm) and by a numerical factor given for each crystal species (the numerical number is provided based on the geometrical form of a crystal). GCV of <500 μm 3/mm 3 is associated with the lowest risk for tubular obstruction and crystalline nephropathy in patients with PH1. In patients with cystinuria, a GCV of >3000 μm 3/mm 3 is associated with an increased risk for recurrent nephrolithiasis. Go to: Enhancing Healthcare Team Outcomes Clinical outcomes can be significantly improved by emphasizing the importance of urine sediment examination and ensuring that medical students, residents, physician assistants, nurse practitioners, laboratory technicians, and other healthcare professionals receive comprehensive training on its routine application. The preanalytical phase is the most vulnerable part of the evaluation, accounting for up to 75% of all laboratory errors. Outcomes can be improved by following appropriate protocol-based patient preparation, obtaining mid-stream urine samples, rapid sample transportation, and preparation techniques. Nursing, lab processing, and transporting staff are crucial in these collection steps. Physicians must often collect samples shortly before examination for the optimal specimens. Effective communication among team members is paramount. Conscientious laboratory staff are paramount in the accurate processing and calibration of microscopic and analytic equipment. Clear and open communication facilitates rapid diagnosis and treatment decisions, preventing errors and ensuring a coordinated interprofessional team response. Go to: Review Questions Access free multiple choice questions on this topic. Comment on this article. Figure Calcium Oxalate Monohydrate Crystals. The calcium oxalate monohydrate crystals are typically colorless on light microscopy, with shapes that vary from oval and biconvex to dumbbell and elongated rod forms. Contributed by R Naik, MD, PhD Figure Calcium Oxalate Dihydrate Crystals. The calcium oxalate dihydrate crystals are colorless on light microscopy and have a bipyramidal or envelope shape. Contributed by R Naik, MD, PhD Figure Calcium Phosphate Crystals. Calcium phosphate crystals are colorless on light microscopy. Brushite crystals have a broad spectrum of shapes, such as prisms, rosettes, starts, needle-like or splinter-like, sticks, or rods. Contributed by R Naik, (more...) Figure Triple Phosphate Crystals. Struvite crystals are colorless under light microscopy and often appear in distinctive coffin-lid shapes. Other shapes, such as feather-like structures, elongated prisms, and trapezoids, can also be observed. Contributed by (more...) Figure Amorphous Phosphate and Triple Phosphate Crystals in the Urine. Calcium orthophosphate crystals are amorphous crystals that appear as small granulations with or without large plates and have no polarization. Contributed by M Zubair, MBBS, FCPS Figure Uric Acid Crystals, Barrel-Shaped. The image shows barrel-shaped uric acid crystals on light microscopy. Contributed by R Naik, MD, PhD Figure Uric Acid Crystals, Rosette-Shaped. The image shows rosette-shaped uric acid crystals on light microscopy. Iqbal Osman, Public Domain, via Wikimedia Commons Figure Uric Acid Crystals, Birefringent on Polarized Light. Uric acid crystals show a strong polychromatic birefringence on polarization. Contributed by S Bhimji, MD Figure Sulfamethoxazole Crystals. Urine sediment without staining ×400. Left: bright field light microscopy;right: polarized light microscopy. Seltzer J, Velez JC, Buchkremer F, Poloni JAT. Urine sediment of the month: drugs & crystalluria. (more...) Figure Sulfadiazine Crystals. Unstained urine sediment ×100. Left: bright field light microscopy;right: polarized light microscopy. Seltzer J, Velez JC, Buchkremer F, Poloni JAT. Urine sediment of the month: drugs & crystalluria . Renal (more...) Figure Acyclovir Crystals. Left: light microscopy unstained;right: polarized light with birefringence. Seltzer J, Velez JC, Buchkremer F, Poloni JAT. Urine sediment of the month: drugs & crystalluria. Renal Fellow Network Web site. (more...) Go to: References 1. Sorokin I, Mamoulakis C, Miyazawa K, Rodgers A, Talati J, Lotan Y. Epidemiology of stone disease across the world. World J Urol. 2017 Sep;35(9):1301-1320. [PubMed: 28213860] 2. Lang J, Narendrula A, El-Zawahry A, Sindhwani P, Ekwenna O. Global Trends in Incidence and Burden of Urolithiasis from 1990 to 2019: An Analysis of Global Burden of Disease Study Data. Eur Urol Open Sci. 2022 Jan;35:37-46. [PMC free article: PMC8738898] [PubMed: 35024630] 3. Chewcharat A, Curhan G. Trends in the prevalence of kidney stones in the United States from 2007 to 2016. Urolithiasis. 2021 Feb;49(1):27-39. [PubMed: 32870387] 4. Couto J, Dos Santos LP, Alves JC, López R, Maldonado C. Amoxicillin Crystalluria: A Rare Side-Effect of a Commonly Prescribed Antibiotic. Eur J Case Rep Intern Med. 2017;4(10):000736. [PMC free article: PMC6346802] [PubMed: 30755915] 5. Verdesca S, Fogazzi GB, Garigali G, Messa P, Daudon M. Crystalluria: prevalence, different types of crystals and the role of infrared spectroscopy. Clin Chem Lab Med. 2011 Mar;49(3):515-20. [PubMed: 21143023] 6. Cavanaugh C, Perazella MA. Urine Sediment Examination in the Diagnosis and Management of Kidney Disease: Core Curriculum 2019. Am J Kidney Dis. 2019 Feb;73(2):258-272. [PubMed: 30249419] 7. Shastri S, Patel J, Sambandam KK, Lederer ED. Kidney Stone Pathophysiology, Evaluation and Management: Core Curriculum 2023. Am J Kidney Dis. 2023 Nov;82(5):617-634. [PMC free article: PMC11370273] [PubMed: 37565942] 8. Wang Z, Zhang Y, Zhang J, Deng Q, Liang H. Recent advances on the mechanisms of kidney stone formation (Review). Int J Mol Med. 2021 Aug;48(2) [PMC free article: PMC8208620] [PubMed: 34132361] 9. Frochot V, Daudon M. Clinical value of crystalluria and quantitative morphoconstitutional analysis of urinary calculi. Int J Surg. 2016 Dec;36(Pt D):624-632. [PubMed: 27847293] 10. Fogazzi GB. Crystalluria: a neglected aspect of urinary sediment analysis. Nephrol Dial Transplant. 1996 Feb;11(2):379-87. [PubMed: 8671802] 11. İnce FD, Ellidağ HY, Koseoğlu M, Şimşek N, Yalçın H, Zengin MO. The comparison of automated urine analyzers with manual microscopic examination for urinalysis automated urine analyzers and manual urinalysis. Pract Lab Med. 2016 Aug 01;5:14-20. [PMC free article: PMC5574505] [PubMed: 28856199] 12. Palsson R, Colona MR, Hoenig MP, Lundquist AL, Novak JE, Perazella MA, Waikar SS. Assessment of Interobserver Reliability of Nephrologist Examination of Urine Sediment. JAMA Netw Open. 2020 Aug 03;3(8):e2013959. [PMC free article: PMC7442930] [PubMed: 32821922] 13. Letavernier E, Bazin D, Daudon M. Description of Stone Morphology and Crystalluria Improve Diagnosis and Care of Kidney Stone Formers. Healthcare (Basel). 2022 Dec 20;11(1) [PMC free article: PMC9818792] [PubMed: 36611462] 14. Lee AJ, Yoo EH, Bae YC, Jung SB, Jeon CH. Differential identification of urine crystals with morphologic characteristics and solubility test. J Clin Lab Anal. 2022 Nov;36(11):e24707. [PMC free article: PMC9701861] [PubMed: 36164743] 15. Nagae A, Murakami E, Hiwada K, Sato Y, Kawachi M, Kono N. Asymptomatic hereditary xanthinuria: a case report. Jpn J Med. 1990 May-Jun;29(3):287-91. [PubMed: 2273608] 16. Ichida K, Amaya Y, Okamoto K, Nishino T. Mutations associated with functional disorder of xanthine oxidoreductase and hereditary xanthinuria in humans. Int J Mol Sci. 2012 Nov 21;13(11):15475-95. [PMC free article: PMC3509653] [PubMed: 23203137] 17. Grases F, Costa-Bauza A, Roig J, Rodriguez A. Xanthine urolithiasis: Inhibitors of xanthine crystallization. PLoS One. 2018;13(8):e0198881. [PMC free article: PMC6114289] [PubMed: 30157195] 18. Sadiq S, Cil O. Cystinuria: An Overview of Diagnosis and Medical Management. Turk Arch Pediatr. 2022 Jul;57(4):377-384. [PMC free article: PMC9317473] [PubMed: 35822468] 19. Fogazzi GB, Delanghe J. Microscopic examination of urine sediment: Phase contrast versus bright field. Clin Chim Acta. 2018 Dec;487:168-173. [PubMed: 30287257] 20. Singh VK, Rai PK. Kidney stone analysis techniques and the role of major and trace elements on their pathogenesis: a review. Biophys Rev. 2014 Dec;6(3-4):291-310. [PMC free article: PMC5418413] [PubMed: 28510032] 21. Steenbeke M, De Bruyne S, Boelens J, Oyaert M, Glorieux G, Van Biesen W, Linjala J, Delanghe JR, Speeckaert MM. Exploring the possibilities of infrared spectroscopy for urine sediment examination and detection of pathogenic bacteria in urinary tract infections. Clin Chem Lab Med. 2020 Sep 25;58(10):1759-1767. [PubMed: 32649292] 22. Khan AH, Imran S, Talati J, Jafri L. Fourier transform infrared spectroscopy for analysis of kidney stones. Investig Clin Urol. 2018 Jan;59(1):32-37. [PMC free article: PMC5754580] [PubMed: 29333512] 23. Simhadri PK, Vaitla PK, Marathi R, Khan A. Donor-transmitted cystinuria in a renal transplant recipient. J Nephrol. 2024 Jul;37(6):1715-1717. [PubMed: 38512367] 24. LaRosa C, McMullen L, Bakdash S, Ellis D, Krishnamurti L, Wu HY, Moritz ML. Acute renal failure from xanthine nephropathy during management of acute leukemia. Pediatr Nephrol. 2007 Jan;22(1):132-5. [PubMed: 17039332] 25. Ito S, Fujiwara SI, Yoshizawa T, Hayatsu K, Sekiguchi K, Murahashi R, Nakashima H, Matsuoka S, Ikeda T, Toda Y, Kawaguchi S, Nagayama T, Umino K, Minakata D, Nakano H, Morita K, Yamasaki R, Ashizawa M, Yamamoto C, Hatano K, Sato K, Ohmine K, Kanda Y. Urine Xanthine Crystals in Hematologic Malignancies with Tumor Lysis Syndrome. Intern Med. 2022 Nov 01;61(21):3271-3275. [PMC free article: PMC9683812] [PubMed: 35370238] 26. Runolfsdottir HL, Palsson R, Agustsdottir IM, Indridason OS, Edvardsson VO. Kidney Disease in Adenine Phosphoribosyltransferase Deficiency. Am J Kidney Dis. 2016 Mar;67(3):431-8. [PMC free article: PMC4819988] [PubMed: 26724837] 27. Nasr SH, Sethi S, Cornell LD, Milliner DS, Boelkins M, Broviac J, Fidler ME. Crystalline nephropathy due to 2,8-dihydroxyadeninuria: an under-recognized cause of irreversible renal failure. Nephrol Dial Transplant. 2010 Jun;25(6):1909-15. [PubMed: 20064951] 28. Perazella MA, Herlitz LC. The Crystalline Nephropathies. Kidney Int Rep. 2021 Dec;6(12):2942-2957. [PMC free article: PMC8640557] [PubMed: 34901567] Disclosure:Prathap Kumar Simhadri declares no relevant financial relationships with ineligible companies. Disclosure:Preeti Rout declares no relevant financial relationships with ineligible companies. Disclosure:Stephen Leslie declares no relevant financial relationships with ineligible companies. Continuing Education Activity Introduction Etiology and Epidemiology Pathophysiology Specimen Requirements and Procedure Diagnostic Tests Testing Procedures Results, Reporting, and Critical Findings Clinical Significance Enhancing Healthcare Team Outcomes Review Questions References Copyright © 2025, StatPearls Publishing LLC. This book is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) ( which permits others to distribute the work, provided that the article is not altered or used commercially. You are not required to obtain permission to distribute this article, provided that you credit the author and journal. Bookshelf ID: NBK606103 PMID: 39163441 Share on Facebook Share on Twitter Views PubReader Print View Cite this Page In this Page Continuing Education Activity Introduction Etiology and Epidemiology Pathophysiology Specimen Requirements and Procedure Diagnostic Tests Testing Procedures Results, Reporting, and Critical Findings Clinical Significance Enhancing Healthcare Team Outcomes Review Questions References Bulk Download Bulk download StatPearls data from FTP Related information PMCPubMed Central citations PubMedLinks to PubMed Similar articles in PubMed Review Recurrence of crystalline nephropathy after kidney transplantation in APRT deficiency and primary hyperoxaluria.[Can J Kidney Health Dis. 2015]Review Recurrence of crystalline nephropathy after kidney transplantation in APRT deficiency and primary hyperoxaluria.Bollée G, Cochat P, Daudon M. Can J Kidney Health Dis. 2015; 2:31. Epub 2015 Sep 15. Potential role of fluctuations in the composition of renal tubular fluid through the nephron in the initiation of Randall's plugs and calcium oxalate crystalluria in a computer model of renal function.[Urolithiasis. 2015]Potential role of fluctuations in the composition of renal tubular fluid through the nephron in the initiation of Randall's plugs and calcium oxalate crystalluria in a computer model of renal function.Robertson WG. Urolithiasis. 2015 Jan; 43 Suppl 1:93-107. Epub 2014 Nov 20. Review Management of urinary stones: state of the art and future perspectives by experts in stone disease.[Arch Ital Urol Androl. 2024]Review Management of urinary stones: state of the art and future perspectives by experts in stone disease.Papatsoris A, Alba AB, Galán Llopis JA, Musafer MA, Alameedee M, Ather H, Caballero-Romeu JP, Costa-Bauzá A, Dellis A, El Howairis M, et al. Arch Ital Urol Androl. 2024 Jun 27; 96(2):12703. Epub 2024 Jun 27. Vesicoureteral Reflux.[StatPearls. 2025]Vesicoureteral Reflux.Lotfollahzadeh S, Leslie SW, Aeddula NR. StatPearls. 2025 Jan Acute Renal Colic.[StatPearls. 2025]Acute Renal Colic.Patti L, Leslie SW. StatPearls. 2025 Jan See reviews...See all... Recent Activity Clear)Turn Off)Turn On) Urinary Crystals Identification and Analysis - StatPearlsUrinary Crystals Identification and Analysis - StatPearls Your browsing activity is empty. Activity recording is turned off. Turn recording back on) See more... Follow NCBI Connect with NLM National Library of Medicine 8600 Rockville Pike Bethesda, MD 20894 Web Policies FOIA HHS Vulnerability Disclosure Help Accessibility Careers NLM NIH HHS USA.gov PreferencesTurn off External link. Please review our privacy policy. Cite this Page Close Simhadri PK, Rout P, Leslie SW. Urinary Crystals Identification and Analysis. [Updated 2024 Jul 27]. In: StatPearls [Internet]. Treasure Island (FL): StatPearls Publishing; 2025 Jan-. Available from: Making content easier to read in Bookshelf Close We are experimenting with display styles that make it easier to read books and documents in Bookshelf. Our first effort uses ebook readers, which have several "ease of reading" features already built in. The content is best viewed in the iBooks reader. You may notice problems with the display of some features of books or documents in other eReaders. Cancel Download Share Share on Facebook Share on Twitter URL
4109
https://eprints.lse.ac.uk/84520/7/Swenson_Legal%20Pluralism_Published.pdf
Geoffrey Swenson Legal pluralism in theory and practice Article (Published version) (Refereed) Original citation: Swenson, Geoffrey (2018) Legal pluralism in theory and practice. International Studies Review, 20 (2). p. 342. ISSN 1521-9488 DOI: 10.1093/isr/vix060 © 2018 International Studies Association CC BY 4.0 This version available at: Available in LSE Research Online: July 2018 LSE has developed LSE Research Online so that users may access research output of the School. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LSE Research Online to facilitate their private study or for non-commercial research. You may not engage in further distribution of the material or use it for any profit-making activities or any commercial gain. You may freely distribute the URL ( of the LSE Research Online website. International Studies Review (2018) 0, 1–25 ANALYTICAL Legal Pluralism in Theory and Practice GEOFFREY SWENSON London School of Economics and Political Science Legal pluralism has vast policy and governance implications. In develop-ing countries, for instance, non-state justice systems often handle most dis-putes and retain substantial autonomy and authority. Legal pluralism’s im-portance, however, is rarely recognized and dramatically under theorized. This article advances scholarly understanding of legal pluralism both theo-retically and empirically. It proposes a new typological framework for con-ceptualizing legal pluralism through four distinct archetypes – combative, competitive, cooperative, and complementary – to help clarify the range of relationships between state and non-state actors. It posits five main strate-gies used by domestic and international actors in attempts to influence the relationship between state and non-state justice systems: bridging, har-monization, incorporation, subsidization, and repression. As post-conflict situations are fluid and can feature a wide range of relationships between state and non-state actors, they are particularly instructive for showing how legal pluralism archetypes can be shifted over time. Case studies from Timor-Leste and Afghanistan highlight that selecting an appropriate pol-icy is vital for achieving sustainable positive outcomes. Strategies that rely on large scale spending or even the use of substantial military force in isolation are unlikely to be successful. The most promising approaches are culturally intelligible and constructively engage non-state justice net-works of authority and legitimacy to collectively advance the judicial state-building process. While the case studies focus on post-conflict states, the theory presented can help understand and improve efforts to promote the rule of law as well as good governance and development more broadly in all legally pluralist settings. Keywords: rule of law, post-conflict, legal pluralism Mainstream international relations theory tends to assume a unitary state with a monopoly on the use of legitimate violence domestically; however, the reality of po-litical and legal authority is far more complicated (Weber 1978).1 Legal pluralism whereby “two or more legal systems coexist in the same social field” is the domi-nant feature of most legal orders worldwide (Merry 1988, 870). All states feature legal pluralism, and only a limited number of high capacity states have nonstate jus-tice actors firmly under their control. Even in these states, legal pluralism thrives through alternative dispute resolution mechanisms, arbitration agreements, and 1As Lake highlights, “the state is central to the study of international relations and will remain so for the foreseeable future” because it is “fundamental” to neorealist, neoliberal institutionalism, and constructivist approaches, and usually plays a key role in “critical, post-modern, and feminist theories” (Lake 2008, 41). Swenson, Geoffrey. (2018) Legal Pluralism in Theory and Practice. International Studies Review, doi: 10.1093/isr/vix060 © International Studies Association 2018. This is an Open Access article distributed under the terms of the Creative Commons Attribution License ( which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. Downloaded from by London School of Economics user on 09 July 2018 2 Legal Pluralism in Theory and Practice international treaty obligations. In the developing world, an estimated 80 to 90 per-cent of disputes are handled outside of the state justice system (Albrecht and Kyed 2010, 1). The role of legal pluralism is particularly vital in conflict and postconflict settings, as they tend to have weak state institutions and contested governing au-thority (Fearon and Laitin 2004). In states with lower levels of capacity, legitimacy, or both, seeking support from nonstate actors can serve as a conflict avoidance tactic or even a broader governance strategy that attempts to secure buy-in from powerful groups that may be skeptical of the state.2 While the prevalence and endurance of nonstate justice mechanisms could be seen as an indictment of the need for state justice to underpin the rule of law, non-state justice mechanisms often have significant negative externalities. Nonstate legal orders frequently reflect cultural or religious norms unconcerned with basic human rights. Women and other vulnerable groups are particularly at risk when nonstate legal systems embrace overtly patriarchal ideals. These systems can also reflect sig-nificant bias toward powerful individuals and families, and the legal processes often lack core protections, such as procedural and substantive due process norms. As Waldorf highlights, nonstate ““judicial” elites are neither independent nor impar-tial, and their discretionary rulings serve community harmony not individualized justice” (Waldorf 2006, 10). Furthermore, the relationship between state and non-state justice is often unclear, and cases may be resolved in different ways, encourag-ing forum shopping by parties, particularly those with more economic or political clout. The state system’s predominance in itself does not guarantee a just outcome at a systemic level, as it could be a means for more effective despotism (Krygier 2011, 19–21). Nevertheless, an effective state-operated justice system is a functional prerequisite for a state capable of fulfilling the rule-of-law’s requirements of being prospective, generalized, clear, fixed, and equally applied (Tamanaha 2007, 3). While central governments prefer a monopoly on legal authority, state power is frequently contested even after violence ends. Domestically, the state’s ability to function justly and effectively is a life or death matter for millions of people world-wide and dramatically impacts the quality of life for millions more. Internationally, “poorly governed societies can generate conflicts that spill across international bor-ders” as well as facilitate criminal networks and transnational violent extremism (Krasner 2004, 86). Establishing a viable state justice sector is vital to the overall success or failure of state-building efforts (Paris 2004, 205–6).3 As nonstate justice is the dominant form of legal order, it is important to understand its implications. State-building provides a powerful analytical lens to examine and understand the implications of legal pluralism, as situations tend to be fluid with a wide range of re-alistic outcomes. Little attention, however, has been paid to the unique challenges and opportunities for judicial state-building presented by legal pluralism. The rules that matter most may not stem from the state at all. Custom, tradition, religion, 2 These strategies are by no means limited to postconflict states. In Malaysia, for instance, the long-time ruling party has used state-sponsored Islamic Courts as an integral part of its efforts “to validate its Islamic credentials—relegitimize the party and the state—and thus co-opt, or at least undercut, both the Islamic resurgents and the opposition party” (Peletz 2002, 10). 3The record of international state-building efforts has been at best uneven and all too often profoundly discour-aging (for example, see Doyle and Sambanis 2006; Paris 2010). Past state-building efforts have often left much to be desired, and the endeavor involves a number of intrinsic contradictions and tensions (Paris and Sisk 2009). Some schol-ars go even further and argue that the international state-building enterprise itself is inherently illegitimate (Bain 2006, 537–38, Chandler 2006). Jahn, for instance, contends that state building and related activities such as democracy pro-motion are “counterproductive . . . ultimately producing enemies instead of allies and heightening insecurity instead of enhancing security” (Jahn 2007, 212). While these criticisms deserve consideration, as Paris notes, “for all the shortcom-ings of liberal peacebuilding—and there have been many—most host countries would probably be much worse off if not for the assistance they received,” and forsaking state building entirely would be akin to “abandoning tens of millions of people to lawlessness, predation, disease and fear” (Paris 2009, 108). Regardless of how one ultimately conceptualizes state building, the practice is here to stay for the foreseeable future. Thus, deepening scholarly understanding of what makes state building more or less successful in environments marked by a high degree of legal pluralism constitutes a worthwhile endeavor. Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 3 family lineage, powers not sanctioned by law (such as those of criminal enterprises or powerful commercial interests), and a host of other sources may have equal or even greater influence than state law. Robust legal pluralism challenges the state’s claim to a monopoly on legitimate resolution of legal disputes as well as the ideal of uniform application of the law. It enables participants to select dispute resolution forums based on accessibility, efficiency, legitimacy, jurisdiction, and cost, as well as the state and nonstate systems’ respective abilities to make binding decisions and sanction individuals that choose other systems. This process leads to a sustained struggle between state and nonstate justice actors for legitimacy, resources, and authority. Apart from their adjudicatory role, nonstate justice authorities can even become “state-building spoilers” and help trigger a return to conflict (Menkhaus 2007, 76). Whether state officials can “gain[] the right and ability to make . . . rules” and whether nonstate actors can effectively resist the state has major implications for state-building (Migdal 1988, 30–31). On the other hand, seeking support from nonstate judicial actors can be an important strategy for maintaining stability and securing elite and popular support for the state. In short, legal pluralism has major implications in all states, but the prevalence, autonomy, role, and authority of nonstate justice systems vary dramatically across contexts. It is not enough to merely recognize that legal pluralism exists; schol-ars and policymakers must understand how legal pluralism actually functions. The purpose of this article is to advance scholarly understanding of legal pluralism both theoretically and empirically. This is done by, first, articulating four new le-gal pluralism archetypes along with the major strategies for domestic and interna-tional policymakers dealing with legally pluralistic environments. Second, as these situations tend to be fluid with a wide range of realistic outcomes, this paper draws on postconflict state-building to provide an analytical lens to examine and understand legal pluralism’s implications. The case studies of Timor-Leste and Afghanistan highlight how both positive and negative change in the overarching relationship between state and nonstate justice can occur. They demonstrate that when promoting the rule of law, judicial state-builders could benefit greatly from understanding the legal pluralism archetype and its programmatic implications, along with developing a credible and appropriate strategy for transforming the cur-rent environment toward a more constructive situation that ideally secures buy-in from nonstate actors or at least mitigates their opposition. Article Overview This article examines legal pluralism and its implications for policy through five sections. The first section demonstrates the need for new legal pluralism archetypes through a brief literature review. The second section proposes four dis-tinct archetypes: (1) combative, (2) competitive, (3) cooperative, and (4) comple-mentary. It likewise identifies commonly used strategies for interacting with non-state justice actors across different legally pluralistic environments: (1) bridging, (2) harmonization, (3) incorporation, (4) subsidization, and (5) repression. Sec-tions three and four present two divergent case studies of postconflict judicial state-building in legally pluralist settings, specifically Timor-Leste and Afghanistan. The case studies highlight how domestic and international policy decisions can help shift the overarching archetype. These decisions can help promote a change from competitive legal pluralism to cooperative as occurred in Timor-Leste or a deterio-ration of the situation into combative legal pluralism as happened in Afghanistan. The final section offers overarching lessons from the experiences in Afghanistan and Timor-Leste. Downloaded from by London School of Economics user on 09 July 2018 4 Legal Pluralism in Theory and Practice Current Understandings of Legal Pluralism Remain Insufficient While important scholarly work exists, current explanations remain inadequate for understanding the form and implications of legal pluralism in all settings but par-ticularly those in the wake of conflict. The nonstate system is usually seen as either an obstacle to progress (Farran 2006) or effective, efficient, and reflective of true community preferences (Harper 2011). For example, a major United Nations re-port defines nonstate justice systems as involving “a neutral third party not part of the judiciary” while also noting “custom-based systems appear to have the advan-tages of sustainability and legitimacy” (United Nations Development Program et al. 2012, 8). In both instances, the stark binary between the state and nonstate justice sectors is radically oversimplified. Existing work has been largely historical or theoretical. Legal pluralism has a long historical pedigree. It is deeply embedded with the creation of the modern state. Fukuyama (2011, 245–75), for instance, contends that competition between legal systems has driven the formation of certain modern states. Legal pluralism also shaped interactions between different societies, and “dual legal systems were widespread in colonized parts of Africa, Asia, Latin America, and the Pacific” (Merry 1991, 890). Legal pluralism became a defining feature of colonial administrations that sought to harness local dispute resolution mechanisms to help legitimize and institutionalize their rule (Benton 2002). Likewise, multiethnic domains, such as the Ottoman Empire, embraced legal pluralism (Barkey 2013). Nor is the preva-lence of legal pluralism largely a historical phenomenon. Currently, legal pluralism exists everywhere in forms as varied as community dispute resolution to the interna-tional system where there has been a proliferation of treaties as well as transnational regimes with veto capacity or even legislative ability (Berman 2012). State and non-state legal systems can work together relatively smoothly or find themselves clashing frequently (Tamanaha 2008, 400). Some noteworthy attempts have been made to understand the interactions be-tween the state and nonstate justice sectors. Connolly (2005) proposes the ap-proaches of abolition of nonstate systems or, alternatively, incorporation, partial incorporation, or no incorporation of nonstate mechanisms. Forsyth (2009, 202) conceptualizes the relationship between state and nonstate justice mechanisms as a seven-stage “spectrum of increasing state acceptance of the validity of adjudica-tive power by the non-state justice system.” While stopping short of a full typology, numerous scholars have addressed the interaction between state and nonstate jus-tice systems in postconflict settings (Mac Ginty 2008; Richmond 2009; Baker 2010). Country-specific analyses have also recognized that legal pluralism has implications for state-building in places such as Afghanistan (Barfield 2008) and Timor-Leste (Nixon 2012), but these works do not sufficiently account for different types of re-lationships between state and nonstate justice and the fluidity between different legal pluralism archetypes. While these approaches can help illuminate state efforts to engage nonstate justice mechanisms, they offer limited insights for understand-ing efforts to engage in postconflict judicial state-building in highly legally pluralist states. Direct application of existing models to judicial state-building efforts presents serious problems because they do not recognize postconflict settings’ systemic chal-lenges. Successfully asserting and maintaining authority domestically and interna-tionally invariably challenges even relatively high capacity states (Fukuyama 2014). As Krasner and Risse (2014, 549) note, “while no state governs hierarchically all the time, consolidated states possess the ability to authoritatively make, implement, and enforce decisions for a collectivity.” In postconflict settings, state power is al-most always actively contested. The archetypes and strategies proposed below help contextualize all state-building efforts regardless of whether they are undertaken Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 5 by local elites under the auspices of the state, international state-builders, or some combination thereof. Legal Pluralism Archetypes An alternative typology more attuned to legal pluralism’s structure and implications provides for a more robust understanding of its function in all states, as well as its relationship to the rule of law. Here the concept of the rule of law is used in a “thin” rather than “thick” sense (Peerenboom 2002). At minimum, a “thin” concept of the rule of law requires that “law must be set forth in advance (be prospective), be made public, be general, be clear, be stable and certain, and be applied to everyone” (Tamanaha 2007, 3). While admirable, thicker conceptualizations include extensive institutional, economic, cultural, and political requirements that are unrealistic for most postconflict states in the short or even medium term (West 2003). The cre-ation of a state and society with even a thin version of the rule of law after conflict is a daunting, time-consuming task that requires buy-in from both state officials and society at large. On the part of the state, “even the most formal, minimalist concep-tion of the rule of law requires a normative commitment to the project of the rule of law itself” by state officials (Stromseth, Wippman, and Brooks 2006, 76). At the same time, state action alone is not enough; establishing the rule of law requires formal and informal popular accountability mechanisms. Regardless of the partic-ular setting, “the rule of law is as much a culture as a set of institutions, as much a matter of the habits, commitments, and beliefs of ordinary people as legal codes” (Stromseth, Wippman, and Brooks 2006, 310). Respect for the law largely hinges on the broad social belief that the law, at its core, is basically fair and legitimate (Tyler 2006). Thus, establishing the rule of law is inherently a dynamic, contested process that includes both top-down and bottom-up elements. These dynamics are particularly acute in postconflict settings because public trust in state institutions has almost inevitably been undermined, often severely. In practical terms, establish-ing the rule of law requires consolidation of popular legitimacy of new legal norms and institutions just as much as the construction of courthouses or the passage of laws. This section posits new theoretical archetypes for understanding the fluid rela-tionship between state and nonstate justice in a wide range of settings: (1) com-bative, (2) competitive, (3) cooperative, and (4) complementary. Furthermore, it proposes and examines five main strategies for understanding international and do-mestic judicial state-builders’ engagement techniques. The strategies of: (1) bridg-ing, (2) harmonization, (3) incorporation, (4) subsidization, and (5) repression. These strategies illuminate the main domestic and international approaches to en-gaging the nonstate legal sector in legally pluralist societies. The strategies discussed here are top down in the sense that they examine how domestic and international actors can attempt to proactively influence the overar-ching type of legal pluralism in a given setting. In practice, however, the overarching legal pluralism archetype invariably reflects both top-down and bottom-up factors. Whether nonstate actors choose to engage the state and on what terms is decidedly bottom-up, as is to what extent and under what conditions people use the state and nonstate justice systems. As with other areas of state policy, popular mobilization and political advocacy is a potential tool to change the state’s approach to nonstate justice (Jordan and Van Tuijl 2000).4 Therefore, both the overarching archetype of legal pluralism present at a given moment and movement between different types of legal pluralism reflect a mixture of top down and bottom up elements. 4For instance, bottom-up activities could include popular efforts to end repression of nonstate justice actors and institutions or alternatively through political advocacy against recognizing legal dispute systems that are seen as violating human rights. Downloaded from by London School of Economics user on 09 July 2018 6 Legal Pluralism in Theory and Practice In practical terms, the strategies help inform which activities can help foster change from one archetype to another, as well as how advances in judicial state-building could be achieved within a given archetype. Rather than viewing the pro-cess as linear, advancing the rule of law after conflict should be conceptualized as highly fluid with points of progress and regression. Even in favorable circumstances, establishing the rule of law and the inclusive institutions that underpin it is usually a prolonged, highly contingent process with both top-down and bottom-up elements (North, Wallis, and Weingast 2009; Acemoglu and Robinson 2012). Nevertheless, a well-informed understanding of the legal pluralism archetype that is present can significantly bolster domestic and international initiatives designed to influence the nonstate justice sector and minimize the risk of costly missteps.5 While invariably a simplification, archetypes help conceptualize the core features of the relationship between state and nonstate judicial actors. They can inform ju-dicial state-building efforts as well as other domestic and international postconflict policy initiatives that influence or can be influenced by nonstate actors, such as economic development initiatives or broader governance endeavors. Although the case studies presented in this article focus on postconflict settings, the archetypes can also help actors understand and improve their engagement with a wide vari-ety of legally pluralist states. Whatever the context, by understanding the dominant archetype, it is possible to constructively engage with the nonstate justice sector in a given area.6 Constructive engagement with the nonstate justice sector requires thinking critically about how to deal with current realities while simultaneously seek-ing to transform the environment to one more favorable to judicial state-building. Combative Legal Pluralism In combative legal pluralism, state and nonstate systems are overtly hostile to one another. Where the normative underpinnings of the respective legal systems are not even tacitly accepted, the state and nonstate justice sectors seek explicitly to undermine, discredit, supplant, and—ideally—destroy the other. Combative legal pluralism can involve nonstate actors rejecting the state system’s ideological founda-tion in a largely nonviolent manner. For instance, in the fight against the apartheid state in South Africa, there were active efforts to establish “structures of justice and policing that contested the legitimacy of their equivalent in the apartheid institu-tion” (Nina 2000, 24). While compatible with nonviolence, combative legal plural-ism flourishes in countries facing an active insurgency or separatist movement. In many instances, nonstate justice forms a cornerstone of those movements (Mampilly 2011; Arjona, Kasfir, and Mampilly 2015). Unsurprisingly, combative legal pluralism prevails where postconflict state-building has failed or is clearly trending in a nega-tive direction. In many instances, this dynamic coincides with an active insurgency characterized by parallel antagonistic state-building enterprises (Wickham-Crowley 1992; Kalyvas 2006, 218–20). Thus, the scope for even limited collaboration tends to be minimal. 5These missteps can take a wide variety of forms and can involve both domestic and international actors. Isser highlights that state policies attempting to regulate the conduct and jurisdiction of nonstate systems in Liberia and Guatemala “have undermined the effectiveness of TAs [traditional authorities] without providing an alternative outlet” (Isser 2011, 333). In Afghanistan, US-funded rule of law programs sought to establish new nonstate dispute resolu-tion mechanisms in the hopes of rendering Taliban justice unnecessary. These new shuras, however, could be quite destabilizing to local communities by distributing large amounts of external funding as well as empowering individuals through military force who did not enjoy substantial popular support (Miakhel and Coburn 2010). 6The relationship may vary by geographic location as well as by religious, tribal, or ethnic group. The state may enjoy a cooperative relationship with nonstate actors in one part of the country, while facing a competitive or even combative relationship in other areas. For example, the Afghan state has a competitive relationship with many tribal and religious nonstate authorities but a combative relationship with the Taliban insurgents. Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 7 Competitive Legal Pluralism Competitive legal pluralism, where the state’s overarching authority is not chal-lenged but nonstate actors retain substantial autonomy, characterizes many develop-ing countries and is extremely common after conflict. Indeed, it is the default con-dition in postconflict settings. While a postconflict political and legal settlement has been reached, it has not yet been consolidated or institutionalized. The prospect of a return to conflict is disturbingly common (Collier, Hoeffler, and Söderbom 2008). The state invariably finds itself trying to assert a new order in places previously be-yond its control or in places where that control was contested.7 It is also common in many developing counties where societal actors retain autonomy and still exercise the right to maintain order in a way not dictated by state officials (Migdal 1988). Competitive legal pluralism features significant, often deep, tensions between state and nonstate legal systems, especially where legal norms and procedure diverge significantly (Tamanaha 2008). Yet, in these situations, clashes rarely endanger the state’s formal judicial authority because the nonstate justice sector does not make a concerted effort to supplant state authority entirely. While the nonstate justice sector retains a sizable degree of autonomy, the state and nonstate systems respect each other’s right to exist in some form and are willing to engage with each other, at least tactically (Baker and Scheye 2007). Competitive nonstate legal systems are most frequently rooted in religious be-liefs or shared culture, custom, or heritage. These legal systems often exist outside the state and do not necessarily share the state’s values. Competitive legal plural-ism also exists where criminal actors have established separate, parallel orders that rarely seek to take over the state but actively work to retain autonomy by circum-venting state law (Volkov 2000). There may be collusion between political elites and criminal actors to evade the law or profit illegally; however, the activities themselves remain fundamentally opposed to state law. In postconflict settings, the level of competition tends to mirror the success of the state-building process. For example, postconflict state-building efforts in Afghanistan and Timor-Leste both started against a backdrop of competitive legal pluralism. In Afghanistan, where state-building trended in a decidedly negative di-rection that helped spur renewed violent conflict, competitive legal pluralism has slipped into combative legal pluralism. Alternatively, when the state gains legitimacy, authority, and capacity, the environment and the incentives change, as occurred in Timor-Leste. Nonstate actors increasingly favor collaboration because both the ad-vantages of partnership with the state and the disadvantages of opposing it increase. Nonetheless, as long as nonstate actors retain a high degree of autonomy, the po-tential for setbacks is ever-present. Competitive legal pluralism can be prolonged and endemic, particularly when nonstate dispute resolution is seen as legitimate and authoritative. In relatively sta-ble states, it can even be an explicit strategy.8 These difficulties are compounded in postconflict settings where the state’s legal authority and institutions have often been severely compromised.9 While states often seek to supplant nonstate competi-tors over time, in other circumstances, engagement with nonstate authorities forms the basis of the governance system. Domestic judicial state-builders often rely on 7This dynamic is by no means a purely modern phenomenon, as almost every successful judicial endeavor has historically required the state to suppress, outperform, or collaborate with nonstate rivals (Fukuyama 2011). 8For example, during the period of stability from 1923 to 1978, Afghan rulers used just such a strategy. The state demanded the allegiance of tribal leaders and the local population. Local politics and the resolution of local disputes, however, were left largely to local populations (Barfield 2010, 220). 9With regards to the state, legitimacy reflects “normative acceptance and expectation by a political community that the cluster of rules and institutions that compose the state ought to be obeyed” and the extent that “the state is seen as the natural provider of goods and services” (Call 2008, 14). Downloaded from by London School of Economics user on 09 July 2018 8 Legal Pluralism in Theory and Practice powerful, established nonstate actors and structures to support their rule, includ-ing but not limited to tribal or clan groups and religious authorities (Migdal 2001). Cooperative Legal Pluralism In a cooperative legal pluralist environment, nonstate justice authorities still retain significant autonomy and authority. Nonstate judicial actors, however, have by and large accepted the state’s normative legitimacy and are generally willing to work together toward shared goals. Major clashes are far less frequent and tend to fo-cus on social issues where values clash, such as women’s rights, rather than exis-tential issues of state judicial power. Cooperative legal pluralism tends to thrive in places where progress is being made toward consolidating legitimate state author-ity. This shift may coincide with meaningful advances toward the consolidation of democratic governance bound by the rule of law. However, the establishment of a high-capacity state that enjoys a cooperative relationship with nonstate authorities does not necessarily require democracy or the rule of law. This dynamic is reflected by postconflict transformations in places like Zimbabwe (Kriger 2006). Yet coopera-tion has its limits. In many postcolonial African states, nonstate justice actors largely backed the nascent state, but their support often waned “when the state-building project [became] too exclusivist or predatory” (Dorman 2006, 1087). At the same time, it is important to stress that cooperative legal pluralism is co-operative only in terms of the relationship between the predominant forms of state and nonstate justice. Cooperative legal pluralism does not necessarily mean that, in terms of substance, the law is just. A legal order characterized by this archetype invariably still produces winners and losers. Under cooperative legal pluralism, the law, whether state or nonstate, can still be used to violate human rights, oppress citizens, or perpetrate systematic discrimination against certain groups. Complementary Legal Pluralism Legal pluralism does not disappear in a state with a high-capacity, effective legal system, but it is complementary. In other words, nonstate is subordinated and struc-tured by the state because the state enjoys both the legitimacy to have its rule ac-cepted and the capacity to actually enforce its mandates (Ellickson 1991; Mac Ginty 2008, 142). The United States, Western Europe, and many other countries with high-capacity legal systems choose to allow private arbitration, mediation, and other forms of alternative dispute resolution (ADR). ADR takes a wide variety of forms, but “they share the feature that a third party is involved who offers an opinion or communicates information about the dispute to the disputants” (Shavell 1995, 1). For civil disputes, state courts frequently mandate claimants’ attempts to settle their disputes outside of court before being allowed to access state courts (Stipanowich 2004). However, substantively and procedurally, state and nonstate law can still clash. Arbitration agreements facilitate the evasion of state law and legal process, but the extent of circumvention depends on the policy preferences of state offi-cials. In all instances, these processes are integrated into, and fall under the ulti-mate regulatory purview of, the state, exist at its pleasure, and largely depend on state courts for enforcement. ADR processes are allowed and often encouraged be-cause the state deems them useful for addressing real and perceived “inefficiencies and injustices of traditional court systems” (Edwards 1986, 668). This form of legal pluralism is complementary from a governance perspective be-cause the state has effectively outsourced alternative forums, such as court-referred mediation, or at least tactically licensed dispute venues, such as binding arbitra-tion. Complementary legal pluralism features a similarly cooperative ethos, but the nonstate justice authorities operate under the umbrella of state authority and without substantial autonomy to reject state decisions. Only complementary legal Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 9 pluralism can truly uphold that oft-stated requirement for the rule of law: that the law is applied equally to all people (Carothers 1998). Complementary legal plural-ism is a worthwhile long-term goal, but it is important to have reasonable expecta-tions about what is feasible in the short to medium term after conflict. As with co-operative legal pluralism, complementary legal pluralism refers only to the nature of the relationship between state and nonstate justice. These types of legal orders can uphold the rule of law, but that does not mean that states with complementary legal pluralism necessarily do uphold the rule of law. Strategies for Addressing the Nonstate Justice Sector While the predominant legal pluralism archetype is important, it is not immovable. Domestic and international state-builders have a number of strategies that have at least the potential to promote significant change. Of course, the results of those efforts will reflect domestic or international actors’ ability to persuade, or in some case coerce, nonstate actors and society at large.10 Based on the range of available options, this section identifies five main strategies for how best to understand inter-actions between state and nonstate systems: (1) bridging, (2) harmonization, (3) in-corporation, (4) subsidization, and (5) repression. These strategies are by no means mutually exclusive or hermetically sealed, but they are, nevertheless, conceptually and functionally distinct. Success cannot be guaranteed, but certain strategies are better suited to certain environments. As will be demonstrated in the case study sec-tions, local and international state-builders often employ these strategies with little regard for the complex relationship between the state and nonstate justice systems, which can lead to decidedly suboptimal outcomes. This need not be the case. Savvy strategic planning and pragmatic adaptation, ideally combined with a bit of good fortune, could improve the relationship between the state and nonstate justice sec-tors regardless of the dynamics present. Bridging With a bridging strategy, judicial state-builders attempt to ensure that cases are allo-cated between the state and nonstate justice systems as appropriate based on state law, participants’ preferences, and venue appropriateness. Almost invariably, bridg-ing asserts jurisdictional claims regarding both state and nonstate venues. Certain legal matters, most notably homicide and other serious crimes involving physical harms, must be resolved in state courts, while small, nonviolent claims are almost always left to nonstate venues. Public information campaigns are frequently under-taken to enhance understanding of the state legal system and how to access it. Sim-ilarly, training is often provided to local leaders and citizens about the state legal system and how to access it. Free or subsidized legal aid can give citizens an econom-ically viable choice. A bridging strategy can be paired with a formal incorporation approach that seeks to provide a state legislative framework for nonstate justice, but it can also be a stand-alone initiative that seeks to increase individuals’ choices with-out trying to resolve larger questions regarding the relationship between state and nonstate justice venues. Bridging can work well where unmet demand exists for access to state courts or when increased awareness stimulates demand for state justice. A bridging strat-egy’s impact also hinges on nonstate authorities’ willingness to facilitate or accept 10As with any other area of policy, there is no guarantee that all organs of the state are going to pursue a consistent, coordinated approach to nonstate justice. While justice policy is often dealt with at the national level, in states with a degree of decentralization, local or regional government may pursue distinct policy approaches (Benjamin 2008). In practice, decentralized units’ ability to pursue distinct approaches will vary according to both their de facto and de jure level of authority. Nevertheless, state actors have the same set of strategies available whether or not they are actually able to pursue them. Downloaded from by London School of Economics user on 09 July 2018 10 Legal Pluralism in Theory and Practice referrals to the state system, which by extension decrease their autonomy. Thus, bridging is frequently a useful approach in competitive and cooperative legal plu-ralistic environments while offering little utility for situations where the state has a combative relationship with nonstate authorities. Harmonization Harmonization attempts to ensure that the outputs of the nonstate justice system are consistent with the state system’s core values. At the same time, the nonstate justice system is incorporated and legitimatized to some extent. To support harmo-nization, states and international donors often fund activities to encourage non-state justice practitioners to act in a manner consistent with state law in general. However, there is often at least tacit recognition that nonstate actors retain a signif-icant degree of autonomy and independent legitimacy. Thus, there is a willingness to tolerate some normative differences in adjudication standards. As opposed to try-ing to get nonstate venues to act like state courts of first instance, there is a focus on changing the treatment of certain legal matters, for example, nonstate actors’ treatment of women (Chopra and Isser 2012). State judicial actors also frequently discriminate against women, but usually this is done in violation of state law rather than as a matter of accepted practice (Campbell and Swenson 2016). In general, the greater the state’s ability to offer a compelling and legitimate forum for dispute resolution worth emulating, the greater the prospects of successfully implement-ing a harmonization approach. Successful harmonization occurs most frequently in competitive—and especially cooperative—legal pluralism environments. Neverthe-less, as long as nonstate actors retain a significant degree of autonomy, meaningful divergence with state policy remains possible. Incorporation Under incorporation, the distinction between state and nonstate justice is elimi-nated at least from the state’s perspective. Nonstate justice, in a formal sense, be-comes state justice. In practical terms, the nonstate justice systems’ decisions are endorsed but also regulated by state officials. Incorporation can mean the creation of explicitly religious or customary courts with state support and regulation, the labeling of nonstate justice actors as courts of first instance, or simply offering an avenue for appeal from nonstate venues to state courts. Decisions of the nonstate system could be subject to appeal or ratification by the state system. For example, a local council’s decision regarding a property dispute could be formalized through a district court or administrative entity. At its extreme, the entire nonstate justice system could be brought under the state justice system’s purview (Peters and Ubink 2015). While nonstate systems are allowed to continue and perhaps even grow, in practice incorporation is a bold move to assert practical and ideological authority over nonstate actors by limiting their independence. Judicial state-builders seek to both harness the authority of the state system and control it. Once incorporated, states may further seek to regulate “customary” nonstate law by codifying it, an in-herently subjective and selective process, or even by creating new nonstate law. Incorporation strategies may also be less overt through professional regulation or the induction of elections to nonstate posts previously allocated through other means. There is no guarantee that nonstate actors will be willing or able to be incor-porated into the state justice system. The state may envision itself as the principal with the nonstate judicial actors as its agent. This approach is highly problematic, however, if the nonstate actors have notably different norms and values from the state and accountability mechanisms are weak. Thus, the prospects and effective-ness of incorporation strategies track the state’s ability to persuade or compel large numbers of nonstate judicial actors to engage with it. This enabling dynamic is most Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 11 likely in cooperative settings, possible but tentative in competitive scenarios, and very unlikely in combative environments. Subsidization Subsidization of the state system is the most common strategy, and certain key subsi-dization techniques tend to recur across settings, notably legislative reform, capacity building and establishing physical infrastructure used by the justice sector, support-ing symbolic representation, and promoting public engagement. Subsidization has a vast number of potential targets. Unlike harmonization, bridging, and incorpora-tion, it does not require any meaningful acquiescence by nonstate judicial actors as a prerequisite. Consequently, under subsidization approaches, the nonstate system is largely left alone or at least is not the primary target of action. The state system receives assistance to increase its capacity, performance, and appeal relative to the nonstate system. This task sounds straightforward. However, as Fukuyama (2004, 59) notes, “establishing the rule of law involves extensive construction not just of laws, but also courts, judges, a bar, and enforcement mechanisms across the country,” thereby making it “one of the most complex administrative tasks that state-builders need to accomplish.” Subsidization can take an immense variety of forms and can be implemented re-gardless of whether the environment is marked by cooperative, combative, or com-petitive legal pluralism. Subsidization is by far the most common strategy in post-conflict settings, as well as for judicial state-building in general. It is also most likely to influence the overarching relationship between the state and nonstate justice systems because it is the only form of aid directed at improving the performance, legitimacy, and effectiveness of state justice. Repression Repression strategies seek to fundamentally undermine, and ideally eliminate, the state’s nonstate rivals. Repression strategies are not concerned with persuading or incentivizing nonstate justice actors to work with state authorities. Nor does re-pression hinge on the state system persuading or influencing its nonstate rivals or encouraging citizens to use state courts. Repression can simply be a matter of outlawing nonstate justice forums, particularly in relatively peaceful places such as Botswana, and using the state’s power to enforce its mandate (Forsyth 2009). Where the state can effectively outlaw nonstate justice, however, the state is already predom-inant. Almost invariably repression involves significant violence, rather than merely the threat of sanction. As the state seeks to eliminate nonstate justice actors, repres-sion often results in reciprocal violence by nonstate actors. Alternatively, violence by nonstate actors can trigger state repression efforts. Repression efforts are rarely paired with bridging, harmonization, and incorpora-tion strategies because those approaches depend on constructive engagement with nonstate justice systems. However, the state frequently subsidizes the state justice system in an attempt to increase its authority and effectiveness relative to nonstate justice systems, as well as to protect state judicial authorities from insurgent attacks. While invariably unpleasant in practice, repression can be an important tool when the state faces an existential threat from nonstate justice actors, particularly when linked to an armed insurgency. Nevertheless, repression alone, even when backed by force, is unlikely to be sufficient for the state to consolidate a monopoly on legal authority since force must be paired with another form of legitimacy to be sustain-able over time (Beetham 2013). Downloaded from by London School of Economics user on 09 July 2018 12 Legal Pluralism in Theory and Practice Legal Pluralism Archetypes in Practice This article presents case studies “as an in-depth study of a single unit (a rela-tively bounded phenomenon) where the scholar’s aim is to elucidate the features of a larger class of similar phenomena,” in this instance postconflict judicial state-building in legally pluralist environments (Gerring 2004, 341). This examination relies on a structured comparison of approaches to the state and nonstate justice sectors after conflict (George and Bennett 2005). It is important to stress that the goal of these case studies is not to provide a definitive, detailed account of state-building relating to the state and nonstate justice sectors. Rather they highlight key developments and illuminate how the archetypes and strategies discussed above can offer important insights into how relationships between state and nonstate actors can change for the better or worse. As the default condition for postconflict states and the most common arrange-ment in developing countries, it worth examining competitive legally pluralist states in more detail. Thus, this article focuses on the most common setting for postcon-flict states rather than trying to highlight examples from each archetype. At the on-set of judicial state-building efforts after war, states are very rarely in a postconflict situation characterized by combative legal pluralism. After all, combative legal plu-ralism is usually a sign of continued or renewed conflict. In contrast, after conflict, tensions are still fresh and powerful nonstate actors often have found themselves on both sides of the conflict (Staniland 2012). Thus, it is unlikely that the nascent postconflict regime will initially enjoy a cooperative, let alone complementary, re-lationship with the major nonstate judicial actors. The rare exceptions tend to be places where a legitimate, high capacity state that featured complementary legal pluralism existed prior to the conflict, and one side of the conflict has experienced a clear victory that has been generally accepted by the former combatants. For ex-ample, post–World War II Germany and Japan would meet these criteria (Dobbins, et al. 2003). Timor-Leste and Afghanistan are paradigmatic examples of postconflict, com-petitive legally pluralistic settings where domestic and international policy choices had major consequences. From the outset, policymakers themselves recognized that these cases would have broad significance and inform future endeavors (Chesterman 2002; Chopra 2002). Timor-Leste was explicitly envisioned as a model for postconflict Libya, though that option was ultimately rejected (Doyle 2016, 26), while policymakers are now fixated on trying to avoid replicating the state-building failures of Afghanistan elsewhere (Swenson 2017). Other important similarities exist that further enhance the value of a compari-son between states. Afghanistan and Timor-Leste both established new regimes and new legal systems in the early 2000s in contexts marked by competitive legal plu-ralism where the state justice sector needed to demonstrate its value, effectiveness, and legitimacy. Both states saw their infrastructures devastated by conflict and high levels of poverty. They enjoyed a period of stability, but the prospect of renewed violence remained a very real possibility. While it is now regarded as a success, state-building efforts in Timor were “punctuated by initially sporadic, and then intense, episodes of violence” (Gledhill 2012, 48). The 2006 Crisis cast serious doubt on the state-building endeavor and even the viability of the state itself as many proclaimed Timor-Leste a “failed state” (Cotton 2007). Afghanistan likewise faced a prospect of renewed conflict, but it also had a meaningful opportunity for successful state-building efforts after the Taliban regime’s fall (Rashid 2008, Barfield 2010, 300–10). The country’s history demonstrates that peace is possible. Prior to the 1978 Com-munist coup, Afghanistan had enjoyed decades of domestic tranquility, and the Tal-iban itself had previously established a monopoly on the use of force under even more chaotic conditions in the 1990s. Even since late 2001, Afghanistan enjoyed relative peace before the Taliban insurrection rapidly metastasized and reached the Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 13 level of “a full-blown insurgency by 2006” (Jones 2008, 7). Thus, the divergent shifts in the legal pluralist environment were not inevitable. As the subsequent section highlights, their decisions had significant consequences. In both cases, local and international state-builders invested heavily in the state justice sector in an initially competitive legal pluralism environment where the vast majority of disputes were settled outside of state courts. The prevalence of the non-state justice sector, unsurprisingly, coincided with a history of very limited state ca-pacity and weak central rule. Nonstate justice systems faced few jurisdictional re-strictions or meaningful attempts by the state to regulate their conduct, particularly outside of urban centers. Despite these shared circumstances, the outcomes in each country have been very different. Timor-Leste has successfully shifted to cooperative legal pluralism, while decisions in Afghanistan helped trigger a slide to combative legal pluralism. Notwithstanding the upheaval surrounding the 2006 Crisis, judicial state-builders in Timor-Leste have made significant progress toward developing the rule of law by working to build an effective state justice sector and collaborating with local nonstate authorities. In contrast, the post-Taliban regime has helped trigger a slide from competitive legal pluralism to combative legal pluralism due to state officials’ lack of commitment to the rule of law and failure to engage key nonstate actors. The case studies draw on a mixture of primary and secondary sources relating to state-building and legal pluralism generally and in Timor-Leste and Afghanistan specifically. I interviewed over 40 key stakeholders related to postconflict judicial state-building and legal pluralism in these countries in 2014 and 2015. The case studies also draw on personal insights from working on judicial state-building ini-tiatives in both countries between 2008 and 2012. These cases possess clear tem-poral and spatial boundaries. The temporal boundaries result from the extent of large-scale international involvement after conflict, particularly the presence of sig-nificant military forces. The Timor-Leste case covers from independence in May 2002 through to the exit of international forces in 2012. The Afghanistan case study covers from the start of post-Taliban transitional administration in late 2001 through to the election of Karzai’s successor in 2014 and the subsequent drawdown of inter-national forces. Timor-Leste (2002–2012): Competition to Cooperation Legal order in East Timor has long been predicated on competitive legal plural-ism. For over four centuries in East Timor, legal order hinged on tactical alliances between Portuguese colonial officials and nonstate authorities who oversaw order at the local level (Robinson 2009, 23). After the collapse of Marcello Caetano’s authoritarian regime in Portugal in 1974, East Timor entered a rapid, haphazard decolonization process. Decolonization culminated in an East Timorese declara-tion of independence in November 1975. Indonesia invaded on December 7, 1975, and embarked on an intense twenty-five-year occupation. Despite Indonesia’s brutal occupation, the vast majority of disputes continued to be settled through nonstate mechanisms (Babo Soares 2003, 267). The resistance movement combined sup-port from nonstate authority to sustain the domestic resistance (McWilliam 2005), coupled with a compelling vision of an independent, democratic East Timor that upholds the rule of law to bolster international support (Strohmeyer 2000). In-donesian President B. J. Habibie agreed to a referendum on East Timor’s status that was held in August 1999. Despite extensive intimidation efforts by militias, vot-ers overwhelming supported independence. Shortly thereafter, pro-integrationist militias unleashed systemic destruction that ultimately led to the dispatch of in-ternational peacekeepers in mid-September 1999. East Timor was placed under United Nations’ trusteeship until mid-2002 when it became the independent Demo-cratic Republic of Timor-Leste (RDTL). During this time, nonstate authorities were Downloaded from by London School of Economics user on 09 July 2018 14 Legal Pluralism in Theory and Practice essential in maintaining order. Preexisting nonstate structures remained and be-came even more important under United Nations’ administration. Thus, at the onset, the state faced a competitive situation as the nonstate justice system was en-trenched, legitimate, and could not simply be compelled to the work with the state. Since independence, the nascent state has faced immense challenges in the judi-cial state-building process. Effective postconflict state-building demands legitimacy and authority (Call 2008). The state has worked hard to enhance both. By investing in a modern state justice system and democratic elections, while drawing on the legacy of the independence struggle and a vision of a modern state committed to development, the state has harnessed nonstate authorities’ power, legitimacy, and capacity to an extent far greater than Portuguese or Indonesian authorities ever achieved. The state and international community have invested heavily in the state justice sector. While the state still had limited reach and capacity, it enjoyed sub-stantial legitimacy as the end goal of the independence struggle and due to its asso-ciation with prominent independence leaders. The state’s legitimacy helped trans-form nonstate judicial actors long skeptical of state authority into almost de facto state actors through elections and by offering a vision of the state that commanded widespread support. This section shows how the state, with significant international support, transformed a competitive legal pluralism environment into a cooperative one. Slow but Steady Subsidization Building a state justice system proved challenging due to the inherent difficulties arising from minimal human resources, limited judicial infrastructure, and the pub-lic impression inherited from Indonesian rule that courts were instruments of state power rather than neutral arbitrators. Thus, domestic initiatives and international assistance emphasized the creation of basic state justice institutions. This approach reflected a straightforward rationale. The state justice sector was still in an embry-onic state. International aid emphasized building modern state institutions that acted in accordance with the rule of law. In other words, international assistance focused overwhelmingly on subsidization. Since independence in 2002, procedural due process concerns were endemic along with substantial case backlogs and spotty opening hours (West 2007, 336– 338). Even prior to independence during the period of UN control from 1999 to 2002, there was a focus on empowering domestic legal personnel. Yet, this strategy faced systemic problems because local judicial actors were inexperienced and needed extensive training as Indonesia had prevented the development of a professional class in East Timor. In 2005, all UN appointed Timorese court ac-tors underwent evaluation. Subsequently, all Timorese personnel were disqualified (Jensen 2008, 133). This left the justice sector almost entirely dependent on in-ternational staff. While a difficult situation, international judicial actors mitigated the dismissal’s impact and allowed time for domestic capacity to bear fruit. The most important of these institutions was the Legal Training Centre. It was estab-lished to oversee the training and professional certification of all judges, prose-cutors, and public defenders. By 2012, the judicial system was staffed almost ex-clusively with Timorese judges, courts operated consistently nationwide, backlogs had decreased significantly, and popular faith in the justice system had increased (Marx 2013). Enhanced reach and robustness from to 2002 to 2012 made the state justice sector an increasingly powerful force in dispute resolution. The nonstate justice sector re-mained dominant in 2012, but an ever-increasing number of citizens experienced a meaningful choice between the two systems. Not surprisingly, challenges remained. The quality of justice was uneven. The legal system retained a myopic focus on Portuguese as the preferred legal language. However, most people, including those with university educations, cannot understand the language and the often wholesale Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 15 importation of Portuguese laws gives them little relevance to the local context. Case resolution was time consuming, and participants did not necessarily understand the proceedings, especially when conducted in Portuguese. Nevertheless, real progress was achieved against a difficult backdrop. Stealth Incorporation Historically, the relationship between state and nonstate justice in Timor-Leste has been overwhelmingly competitive whereby there has been tactical engagement but also deep skepticism. One of the nascent state’s greatest achievements was to facil-itate a transformation into cooperative legal pluralism where state, international, and nonstate actors worked together as well as established a largely respected juris-dictional divide between courts and local (suco) councils. The state handled major issues, particularly violent crimes, while most civil matters and petty crimes were left to local dispute resolution mechanisms. Nonstate authorities continued to resolve most disputes in Timor-Leste. Nevertheless, nonstate authorities viewed the state and the state-building endeavor as legitimate and were largely open to constructive engagement because state leaders were recognized as key actors in the indepen-dence struggle. The state has achieved this feat through a remarkably simple yet powerful mech-anism: competitive local elections. Elections for suco chiefs were codified under state legislation on community authorities in 2004, with additional reforms in 2009 (RDTL, 2004a, b, 2009a). Suco elections were held during 2004 to 2005, and a sub-sequent set of elections was undertaken in October 2009. The legal framework is largely procedural and jurisdictional. However, its goal is transformational. The law roots the legitimacy of nonstate judicial actors in modern democratic ideas, most notably through recurring, state-administered democratic elections and a workable jurisdictional divide. Less than a decade after independence, state authorities were already able to establish democratic elections as the primary source of legitimacy— a view that has been internalized by the suco chiefs themselves (RDTL Ministry of State Administration and The Asia Foundation 2013). The state administered suco election system forms the backbone of state influence at the local level. The suco reforms enacted in 2009 subtly changed the suco chief’s role by more tightly linking it with state development through program planning and monitor-ing, creating an annual development plan, and submitting an annual report (RDTL 2009a). These responsibilities were paired with major state community develop-ment initiatives. Suco chiefs were thus expected to bring state developmental funds to their communities. Consequently, not only were suco chiefs active state-building agents; their constituents demanded it. The Limits of Cooperation However, the situation always fell short of complementary legal pluralism. There have been major harmonization efforts in the area of gender based-violence, which were backed by both state officials and international actors. Domestic violence was unequivocally a public crime under the Penal Code (RDTL 2009b: Articles 146, 154) and the Law Against Domestic Violence (RDTL 2010). However, the nonstate justice system continued to resolve most cases of domestic violence, including in many instances where the victim preferred to use state courts (Wigglesworth 2013). Nonstate authorities still retained an effective veto over state law in their jurisdic-tion. Thus, their willingness to be directed by the state in most matters reflected their acceptance of the state’s legitimacy and persuasive authority rather than its ability to impose its will. At the end of 2012, Timor-Leste still faced a host of system-atic problems that could arrest or even retract advances toward the consolidation of the rule of law in the future. Nevertheless, its accomplishments were significant and offer insights into how to transform a situation marked by competitive legal pluralism into cooperative legal pluralism. Downloaded from by London School of Economics user on 09 July 2018 16 Legal Pluralism in Theory and Practice Afghanistan (2001–2014): Competition to Combat Afghanistan from 2001 to 2014 demonstrates how domestic and international state-building missteps can help transform an environment from competitive into com-bative legal pluralism. Competitive legal pluralism has long defined Afghanistan. Since the start of the constitutional era in 1923, the Afghan state apparatus has long sought sources of legitimacy that were less dependent on tribal support, ex-ternal religious sanction, and individual charismatic leadership (Poullada 1973). Nevertheless, state power largely rested on its relationships with religious and tribal authority (Rubin 2002). The most effective form of legal order was not state law. Rather it was Pashtunwali, a nonstate legal code that served as both “an ideology and a body of common law which has evolved its own sanctions and institutions,” as implemented through local dispute resolutions: jirgas for Pashtuns and shuras for non-Pashtuns (Roy 1990, 35). For nearly a hundred years, all legitimate state-sponsored legal orders in Afghanistan were grounded in a combination of state performance, Islam, and tribal approval. The system broke down, however, when Communists toppled the regime in 1978 and plunged the country into decades of civil strife. Eventually the Taliban seized control. The Taliban imposed a harsh but effective state legal order in the mid-1990s based on religious authority in tacit agreement with prominent forms of tribal justice. Pashtunwali and other nonstate adjudication systems were largely tolerated and not seen as inconsistent with Taliban understand-ings of Islam. The Taliban regime was sympathetic to Al Qaeda’s radical brand of Islam and harbored the perpetrators of the September 11, 2011, terrorist attacks.11 Shortly thereafter, a major international effort was undertaken to dislodge the Taliban. Subsidization Without Strategy After the Taliban’s defeat, postconflict judicial state-building efforts in Afghanistan started optimistically. The new, multiethnic state under President Hamid Karzai had the opportunity to prove itself a valid governing entity committed to democracy and the rule of law (Rashid 2008; Barfield 2010). While it enjoyed overwhelming inter-national support, the new regime eschewed the traditional pillars of legitimate au-thority domestically. Religion was acknowledged but the state was not clothed in re-ligious legitimacy. Karzai lacked robust religious credentials and, having dislodged the Taliban, his international backers were wary of any government that seemed too Islamic. Moreover, the international community’s emphasis on human rights clashed with Pashtunwali and Islamic law as frequently understood in Afghanistan and gave the Taliban grounds to criticize the regime as unrepresentative and un-Islamic. The state’s most plausible path to legitimacy was through elections and the provision of public goods, most notably a more just legal order, but it failed to de-liver. From 2001 to 2014, Karzai, with international support, worked ceaselessly to cen-tralize authority and undermine constitutional checks and balances. While nomi-nally tolerant of democratic competition, the regime never displayed a normative commitment to democracy and the rule of law. The state built a judiciary that had the outside appearance of a modern state legal system but instead focused on rent extraction. At the same time, international subsidization occurred on a staggering scale. The legal system and human resource base had been devastated by decades of conflict, so the needs were certainly daunting (Swenson and Sugerman 2011). During Karzai’s time in office, Afghanistan’s justice sector received over USD$1 bil-lion in aid from the United States alone, yet the Office of Special Inspector General for Afghanistan Reconstruction (SIGAR) determined that this assistance generated 11Sinno (2008: 244) goes so far as to posit that the reason the Taliban refused to turn over Bin Laden was that it would violate Pashtunwali’s guest hospitality requirements. Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 17 no notable improvements (SIGAR 2015). The ability of international subsidization to advance the rule of law was quite limited absent an ideological commitment by the state to those ideals. There was no progress toward the rule of law, and there were few significant gains in the reach, effectiveness, and legitimacy of the state justice system by the end of Karzai’s presidency in 2014 (Singh 2015). Instead, the Karzai regime was phenomenally corrupt. Rather than seeking to promote the rule of law, it consistently functioned as a “vertically integrated criminal organization . . . whose core activity was not in fact exercising the functions of a state but rather extracting resources for personal gain” (Chayes 2015, 62). International assistance unintentionally institutionalized a rentier state. On occasions when international actors tried to “investigat[e] corruption, they were rebuked by Karzai’s officials for misunderstanding the nature of patronage networks that served to support the gov-ernment” (Chaudhuri and Farrell 2011, 285). State Attempts at Incorporation, Bridging, and Harmonization Tribal dispute resolution mechanisms continued to be the forum of choice for many Afghans, particularly in Pashtun tribal areas (Wardak and Braithwaite 2013). Non-state justice mechanisms remained the most prominent form of dispute resolution, settling 80 to 90 percent of disputes (Barfield, Nojumi and Thier 2006, 9). Nev-ertheless, engaging nonstate legal providers was not a state priority. Only in 2009 did Afghan state officials express meaningful interest in the nonstate justice sector through the “Draft National Policy on Relations between the Formal Justice System and Dispute Resolution Councils” (Ministry of Justice 2009). State policy, with inter-national support, envisioned simultaneous harmonization, bridging, and incorpora-tion strategies in relation to nonstate justice. At no point, however, was there serious outreach to tribal or religious authorities. The state policy bluntly proclaimed non-state legal decisions must be consistent with Sharia, the Constitution, other Afghan laws, and international human rights standards. The policy envisioned voluntary jir-gas and shuras, and their jurisdiction was limited to certain civil matters. Ultimately, the official policy consensus came at the expense of feasibility, as the final report was drafted in a manner designed to appease all state parties but was disconnected from reality. As a state policy has no independent legal bearing, a law was required to opera-tionalize it. The “Draft Law on Dispute Resolution: Shuras and Jirgas” was produced in September 2010 (Ministry of Justice 2010). The legislation formally incorporated shuras and jirgas into the state system and asserted the state’s authority to regulate all aspects of nonstate dispute resolution. The law even imposed criminal liability by stipulating that jirga participants “and parties of dispute shall be duty bound to observe provisions of this law” or face potential criminal charges. The draft law only authorized shuras and jirgas to hear civil disputes and petty juvenile crimes on refer-ral from state authorities. The Ministry of Women’s Affairs and the Human Rights Commission strongly opposed the law because they believed it endorsed dispute resolution mechanisms that violated human rights standards by legitimizing and in-stitutionalizing jirgas and shuras (International Rule of Law Professional 2014). As the tenuous alliance among state agencies broke down, the legislation did not move forward. Combative Legal Pluralism and the Failure of Repression The Taliban justice system constituted the state’s fiercest rival. Taliban justice ex-ploited the widespread view that state courts were corrupt, ineffective, and cultur-ally unintelligible in an attempt to displace state justice itself. Effective legal order rooted in religious beliefs constituted the core of the Taliban’s political program. It also underpinned their claim to be Afghanistan’s legitimate rulers and highlighted the state justice system’s failures. By the time its insurgency had become full blown in 2006, the Taliban had established a lean, but sophisticated network of parallel Downloaded from by London School of Economics user on 09 July 2018 18 Legal Pluralism in Theory and Practice governance structures (Jones 2010). The Taliban’s legal system tapped into the well-spring of legitimacy offered by religion, culture, and working constructively with tribal leaders. The Taliban justice system claimed to adjudicate based on Sharia law “strengthens their legitimacy in a deeply religious population, particularly when the codes of law used by the state are little known, misunderstood, and sometimes re-sented” (Giustozzi and Baczko 2014, 219). By drawing a contrast with the highly corrupt state courts, Taliban insurgents ac-tively contended with the state system, especially outside the capital, by offering inexpensive, expedient, and relatively fair dispute resolution. The Taliban operated “a parallel legal system that is acknowledged by local communities as being legiti-mate, fair, free of bribery, swift, and enduring” if brutal, and their system was “easily one of the most popular and respected elements of the Taliban insurgency by lo-cal communities, especially in southern Afghanistan” (Johnson 2013, 9). Unlike in the state system, decisions were enforced, and addressing corruption was taken seri-ously (Kilcullen 2011). In short, the Taliban justice system sought to provide exactly what the state justice system did not: predictable, effective, legitimate, and accessi-ble dispute resolution. Recognizing the profound threat to the state’s authority, the Afghan state and international forces undertook a robust repression campaign against the Taliban justice system (US Mission Afghanistan 2010). It achieved little, however, as state justice remained highly inefficient, ineffective, and corrupt. Unsurprisingly, the Tal-iban legal order steadily gained ground (Ahmed 2015). The campaign was mutual as the Taliban sought to disrupt state court operations, targeted judges and other state officials for assassination, and denied the courts’ legitimacy as a legal author-ity. Both sides refused to recognize the other’s right to exist, let alone promulgate binding legal decisions. The Karzai regime lacked the capacity to defeat its rivals militarily or embody a cause worth fighting for. Nowhere is this failure more prevalent than in the jus-tice sector, where the state failed to promote, let alone provide, a just legal order. The Taliban’s success at judicial state-building dispels the notion that establishing legal order was impossible in post-2001 Afghanistan. The Taliban’s justice system had major shortcomings, and its human rights record was appalling, but the Tal-iban possessed a comprehensive legal strategy with a clear long-term vision rooted in local values and beliefs. The state judicial system decidedly did not. State legal authority could have increased dramatically if the Afghan state improved its perfor-mance and committed to fostering the rule of law. Taliban justice thrived in large part due to the Afghan state’s abysmal performance. Timor-Leste and Afghanistan in Comparison Since the early 2000s, Timor-Leste and Afghanistan have taken sharply divergent paths as noted in Table 1. Despite initial optimism, Afghanistan has seen little progress. The Afghan legal system, as with the state more broadly, became known primarily for corruption and predation. As the case study shows, the country was once again subsumed in widespread civil conflict. In contrast, Timor-Leste saw po-litical violence and major upheaval in 2006 but has since enjoyed domestic stability and made significant progress toward consolidating democratic governance and the rule of law. Judicial state-building in Timor-Leste made progress from 2002 to 2012 because there was a credible and sustained effort to develop democratic institutions bound by the rule of law in a manner intelligible and compelling to nonstate actors. Dur-ing the decades-long independence struggle, political leaders offered a persua-sive vision of a democratic state committed to the rule of law. Even more impor-tantly, since achieving independence, policymakers in Timor-Leste sought to cre-ate an effective, just legal order and to constructively engage with nonstate actors Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 19 Table 1. Legal pluralism archetypes Archetype Key Features Examples Combative The state and nonstate justice sectors do not recognize each other’s right to exist and actively seek to destroy each other. Afghan state since 2004 with Taliban justice system; Iraq since 2003. Competitive Deep tensions exist between the state and nonstate justice sectors and there are frequent clashes between systems; however, the state’s formal juridical authority is not challenged. While the nonstate justice sector retains autonomy, the state and nonstate systems respect each other’s right to exist in some form. Afghanistan from 2001 to 2003; Afghan state with tribal authorities from 2004; East Timor from 1998 to 2002. Cooperative The nonstate justice sector retains a significant degree of authority and autonomy; however, state and nonstate legal authorities are generally willing to work together towards shared goals. Timor-Leste after independence, particularly since 2006; Zimbabwe after 1980. Complementary Both state and nonstate justice exist, but nonstate justice mechanisms operate under the umbrella of state authority. United States, United Kingdom, Germany, Japan. nationwide. They worked to establish an independent judiciary and inclusive gov-ernance institutions underpinned by competitive, free, and fair national elections in 2002, 2007, and 2012. Both the ability to change the government through free elections and the creation of inclusive institutions are essential for a democratic state underpinned by the rule of law (Huntington 1993, 266–67). With regards to the legal system, state officials worked to develop a sensible legal framework for nonstate actors that granted them discretion over small matters but funneled more serious crimes to the state courts. Moreover, the foundation of nonstate actors’ legit-imacy was transformed through regular, competitive local elections for suco coun-cils in 2004/2005 and 2009. Local elections grounded the legitimacy of traditional nonstate judicial actors in modern democratic ideas of popular sovereignty and ac-countability rather than lineage or custom. The international community’s subsidization of the nascent state justice sector reinforced positive domestic trends in Timor-Leste. While not without flaws, inter-national assistance improved state justice institutions and their auxiliaries (Marriott 2009). Furthermore, in the wake of the 2006 Crisis, international aid helped facil-itate the transition to cooperative legal pluralism by offering aid to improve the performance of nonstate justice and build links between local suco councils and state courts. International efforts reinforced the domestic trends that ultimately led to a shift to cooperative legal pluralism. In short, Timor-Leste demonstrates the need for regulations that reflect shared values and institutions that make a good faith effort to translate those values into reality. Afghanistan presents a stark contrast. Afghan policymakers offered neither a com-pelling ideological vision of the state committed to justice nor a serious attempt to construct legitimate, culturally intelligible institutions. The Karzai-led state squan-dered the opportunity to build a new, more inclusive and effective democratic state. Despite rhetoric to the contrary, Afghanistan under Karzai’s leadership never displayed a normative commitment to the rule of law. Worse, the regime systemati-cally undermined institutional, legal, and political checks on its authority, includ-ing suppressing political parties, manipulating elections, and undermining judi-cial independence and all institutional accountability mechanisms. Finally, Karzai’s regime never seriously engaged with key tribal and religious nonstate justice actors that historically constituted the building blocks of legitimate order in Afghanistan. Downloaded from by London School of Economics user on 09 July 2018 20 Legal Pluralism in Theory and Practice Table 2. Nonstate justice sector strategies Strategy Key Features Examples Bridging Judicial state-builders seek to ensure that cases are allocated between the state and nonstate justice systems as appropriate based on state law, participants’ preferences, and venue appropriateness. State-builders seek to ensure serious crimes cannot be resolved outside state courts regardless of the disputants’ preferences by using paralegals to direct cases to state courts or offering trainings on how to access state courts. Alternatively, minor disputes may be sent to nonstate venues by state courts. Harmonization Judicial state-builders seek to ensure that the nonstate justice systems’ outputs are consistent with the state system’s core values. Laws to outlaw discriminatory practices in nonstate adjudication and training to end discriminatory practices. Incorporation Judicial state-builders eliminate the distinction between state and nonstate justice. Nonstate justice, at least in a formal sense, becomes state justice. Outcomes of the nonstate justice systems are endorsed but also regulated by the state system. In practice, incorporation could mean the creation of explicitly religious or customary courts with state support or the labeling of nonstate justice venues as state courts of first instance. Subsidization Judicial state-builders support the state system to increase its capacity, performance, and appeal relative to the nonstate system. Facilitating legislative reform, establishing physical infrastructure used by the justice sector, supporting symbolic representation, capacity building, and promoting public engagement. Repression Judicial state-builders seek to fundamentally undermine and ideally eliminate the state’s nonstate rivals. Outlawing nonstate justice forums or seeking to arrest or kill nonstate justice actors. Instead, state actors simply sought to impose their will on tribal and religious au-thorities. This failure to engage meaningfully with tribal and religious authorities helps explain judicial state-building’s lack of progress in Afghanistan and the cor-responding slide from competitive legal pluralism into combative legal pluralism against an increasingly potent Taliban insurgency. Despite their tremendous influence, international actors in Afghanistan achieved little in terms of advancing the rule of law or constructively engaging with nonstate actors (Swenson 2017). International backing secured the top state post for Karzai and encouraged the immense concentration of power in the executive. Through-out Karzai’s tenure, international actors retained enough sway to encourage or dis-courage state actions. That influence was never used effectively, however, as the Karzai regime was ultimately deemed too strategically important to fail. At the same time, the international community never recognized the legal pluralism archetype in place and, therefore, did not strategize accordingly. Massive, largely uncoordi-nated international subsidization efforts were continued, even when it was apparent that such programs were not improving the situation. This left the Taliban as the only major group with a credible strategy for engaging nonstate justice actors. The case studies highlight that judicial state-builders, whether domestic or inter-national, need an informed strategy backed by institutions, regulations, and poli-cies that recognize nonstate legal authorities’ importance. A successful, sustainable strategy must be rooted in a deep understanding of how a country’s culture, poli-tics, and history can help underpin a legitimate legal order. Strategies, detailed in Table 2, must also recognize that advancing the rule of law depends primarily on Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 21 domestic actors, and longer-term time horizons are essential, as developing the rule of law takes decades not years. While Timor-Leste has achieved admirable progress, it has yet to consolidate either democracy or the rule of law. At the same time, Afghanistan by all accounts faces a challenging future, but the fluidity of legal plu-ralism and Afghanistan’s own history suggest that combative legal pluralism is not inevitable. In both instances, the international community can still offer incentives (or disincentives) to influence the behavior of both state and nonstate justice actors. Conclusion Understanding legal pluralism is important for any legal or policy intervention, in-cluding but by no means limited to state building. Without understanding legal pluralism’s dynamics in a given context, interventions are likely to be ineffective. Even initiatives that enjoy short-term success are unlikely to be sustainable, as they reflect good fortune rather than an informed approach. Sound strategy requires un-derstanding how state and nonstate actors interact systematically. This article helps build that knowledge by presenting the four main types of relationships between state and nonstate actors through a typological framework that illuminates the dy-namics of legal pluralism across contexts. By understanding the archetype in which a policy is operating, an appropriate strategy or package of strategies for engag-ing with nonstate actors can be selected. By identifying the main strategies avail-able to policymakers, the article illustrates how each approach works within each archetype and which strategies might be appropriate to deploy depending on the context. Against a backdrop of competitive legal pluralism, state-builders in both Timor-Leste and Afghanistan had the chance to promote a democratic state bound by the rule of law or spark a return to conflict. Collectively, the success of Timor-Leste and the failure of Afghanistan demonstrate two key propositions. First, they illuminate the importance of strategy selection by showing how policy choices can influence outcomes. Second, they show how strategy selection, while vital for long-term suc-cess, is largely irrelevant if the policy intervention in question is not culturally in-telligible and ultimately persuasive. Thus, the structure and implications of legal pluralism must be considered when creating and implementing policy. Legal pluralism in Timor-Leste and Afghanistan ultimately offers both reasons for hope and trepidation. Legal pluralism can help form a vital foundation of state le-gitimacy. As the relationship between state and nonstate sectors is inherently fluid, the institutions and initiatives present can help or hinder the development of more constructive relationships between state and nonstate actors. Competitive legally pluralist relationships can be positively developed into cooperative ones. Relation-ships between state and nonstate justice authorities can also quickly sour as com-petitive relationships deteriorate into combative ones. Relationships are not static. Even situations of combative legal pluralism that seem dire are not preordained to remain that way in perpetuity. Insights from Afghanistan and Timor-Leste into ju-dicial state-building within a competitive legal pluralist archetype offer lessons for future endeavors. However, as legal pluralism has major implications for institu-tional design and policy initiatives in areas such as governance and development, the theory presented here has broader applications. Future research into state and nonstate relationships in other settings, postconflict and otherwise, would be a valu-able next step in enabling better policy decisions through enhanced knowledge. Acknowledgements I am grateful to Nancy Bermeo, E. A. Brett, Frances Z. Brown, Richard Ca-plan, Meghan Campbell, Lillian Dang, Richard Ponzio, Lyal Sunga, and Richard Downloaded from by London School of Economics user on 09 July 2018 22 Legal Pluralism in Theory and Practice Youngs, as well as to seminar participants at the University of Oxford and the London School of Economics for their feedback. The extremely helpful com-ments of the two anonymous reviewers and the editors is likewise much appre-ciated. This article was made possible by fieldwork support from Pembroke Col-lege and the Cyril Foster Fund of the Department of Politics and International Relations, University of Oxford. References ACEMOGLU, DARON, AND JAMES ROBINSON. 2012. Why Nations Fail: The Origins of Power, Prosperity and Poverty. London: Profile. AHMED, AZAM. 2015. “Taliban Justice Gains Favor as Official Afghan Courts Fail.” New York Times, A1. ALBRECHT, PETER, AND HELENE MARIA KYED. 2010. “Justice and Security: When the State Isn’t the Main Provider.” Copenhagen: Danish Institute for International Studies Policy Brief. ARJONA, ANA, NELSON KASFIR, AND ZACHARIAH MAMPILLY, Eds. 2015. Rebel Governance in Civil War. Cambridge: Cambridge University Press. BABO SOARES, DIONISIO. 2003. “Challenges for the Future.” In Out of the Ashes: Destruction and Reconstruction of East Timor, edited by James J. Fox and Dionisio Babo Soares, 262–76. Canbera: Australian National University E Press. BAIN, WILLIAM. 2006. “In Praise of Folly: International Administration and the Corruption of Humanity.” International Affairs 82 (3): 525–38. BAKER, BRUCE. 2010. “Linking State and Non-state Security and Justice.” Development Policy Review 28 (5): 597–616. BAKER, BRUCE, AND ERIC SCHEYE. 2007. “Multi-layered Justice and Security Delivery in Post-conflict and Fragile States.” Conflict, Security & Development 7 (4): 503–28. BARFIELD, THOMAS. 2008. “Culture and Custom in Nation-building: Law in Afghanistan.” Maine Law Review 60 (2): 347–73. ——. 2010. Afghanistan: A Cultural and Political History. Princeton, NJ: Princeton University Press. BARFIELD, THOMAS, NEAMAT NOJUMI, AND J. ALEXANDER THIER. 2006. The Clash of Two Goods: State and Non-state Dispute Resolution in Afghanistan. Washington, DC: United States Institute of Peace. BARKEY, KAREN. 2013. “Aspects of Legal Pluralism in the Ottoman Empire.” In Legal Pluralism and Empires, 1500–1850, edited by Lauren Benton and Richard J. Ross, 83–107. New York: New York University Press. BEETHAM, DAVID. 2013. The Legitimation of Power. London: Palgrave Macmillan. BENJAMIN, CHARLES E. 2008. “Legal Pluralism and Decentralization: Natural Resource Management in Mali.” World Development 36 (11): 2255–76. BENTON, LAUREN. 2002. Law and Colonial Cultures: Legal Regimes in World History, 1400–1900. Cambridge: Cambridge University Press. BERMAN, PAUL S. 2012. Global Legal Pluralism: A Jurisprudence of Law Beyond Borders. Cambridge: Cambridge University Press. CALL, CHARLES T. 2008. “Ending Wars, Building States.” Building States to Build Peace. Edited by Charles T. Call and Vanessa Wyeth, 1–19. Boulder: Lynne Rienner. CAMPBELL, MEGHAN, AND GEOFFREY SWENSON. 2016. “Legal Pluralism and Women’s Rights after Conflict: The Role of CEDAW.” Columbia Human Rights Law Review 48 (1): 112–46. CAROTHERS, THOMAS. 1998. “The Rule of Law Revival.” Foreign Affairs 77 (2): 95–106. CHANDLER, DAVID C. 2006. Empire in Denial: The Politics of State-Building. London: Pluto. CHAUDHURI, RUDRA, AND THEO FARRELL. 2011. “Campaign Disconnect: Operational Progress and Strategic Obstacles in Afghanistan, 2009–2011.” International Affairs 87 (2): 271–96. CHAYES, SARAH. 2015. Thieves of State: Why Corruption Threatens Global Security. New York: W. W. Norton & Company. CHESTERMAN, SIMON. 2002. “Walking Softly in Afghanistan: The Future of UN State-Building.” Survival 44 (3): 37–45. CHOPRA, JARAT. 2002. “Building State Failure in East Timor.” Development and Change 33 (5): 979–1000. CHOPRA, TANJA, AND DEBORAH ISSER. 2012. “Access to Justice and Legal Pluralism in Fragile States: The Case of Women’s Rights.” Hague Journal on the Rule of Law 4 (2): 337–58. COLLIER, PAUL, ANKE HOEFFLER, AND MÅNS SÖDERBOM. 2008. “Post-conflict Risks.” Journal of Peace Research 45 (4): 461–78. CONNOLLY, BRYNNA. 2005. “Non-state Justice Systems and the State: Proposals for a Recognition Typology.” Connecticut Law Review 38 (2): 239–94. Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 23 COTTON, JAMES. 2007. “Timor-Leste and the Discourse of State Failure.” Australian Journal of International Affairs. 61 (4): 455–70. DOBBINS, JAMES, JOHN G. MCGINN, KEITH CRANE, SETH G. JONES, ROLLIE LAL, ANDREW RATHMELL, RACHEL M. SWANGER, AND ANGA R. TIMILSINA. 2003. America’s Role in Nation-Building: From Germany to Iraq. Santa Monica: RAND Corporation. DORMAN, SARA R. 2006. “Post-liberation Politics in Africa: Examining the Political Legacy of Struggle.” Third World Quarterly 27 (6): 1085–101. DOYLE, MICHAEL W., AND NICHOLAS SAMBANIS. 2006. Making War and Building Peace: United Nations Peace Operations. Princeton, NJ: Princeton University Press. DOYLE, MICHAEL W. 2016. “The Politics of Global Humanitarianism: The Responsibility to Protect Before and After Libya.” International Politics 53 (1): 14–31. EDWARDS, HARRY T. 1986. “Alternative Dispute Resolution: Panacea or Anathema?” Harvard Law Review 99 (3): 668–84. ELLICKSON, ROBERT. 1991. Order without Law: How Neighbors Settle Disputes. Cambridge, MA: Harvard Uni-versity Press. FARRAN, SUE. 2006. “Is Legal Pluralism An Obstacle to Human Rights-Considerations? Considerations from the South Pacific.” Journal of Legal Pluralism & Unofficial Law 38 (52): 77–105. FEARON, JAMES D., AND DAVID D. LAITIN. 2004. “Neotrusteeship and the Problem of Weak States.” Interna-tional Security 28 (4): 5–43. FORSYTH, MIRANDA. 2009. A Bird That Flies with Two Wings: The Kastom and State Justice Systems in Vanuatu. Canberra: ANU E Press. FUKUYAMA, FRANCIS. 2004. State-Building: Governance and World Order in the 21st Century. Ithaca, NY: Cornell University Press. ——. 2011. The Origins of Political Order: From Prehuman Times to the French Revolution. New York: Farrar, Straus and Giroux. ——. 2014. Political Order and Political Decay: From the Industrial Revolution to the Globalization of Democracy. London: Profile. GEORGE, ALEXANDER L., AND ANDREW BENNETT. 2005. Case Studies and Theory Development in the Social Sciences. Cambridge, MA: MIT Press. GERRING, JOHN. 2004. “What Is a Case Study and What Is It Good For?” American Political Science Review 98 (2): 341–54. GIUSTOZZI, ANTONIO, AND ADAM BACZKO. 2014. “The Politics of the Taliban’s Shadow Judiciary, 2003–2013.” Central Asian Affairs 1 (2): 199–224. GLEDHILL, JOHN. 2012. “Competing for Change: Regime Transition, Intrastate Competition, and Vio-lence.” Security Studies 21 (1): 43–82. HARPER, ERICA. 2011. Engaging with Customary Justice Systems. Rome: International Law Development Orga-nization. HUNTINGTON, SAMUEL. 1993. The Third Wave: Democratization in the Late Twentieth Century. Norman: Univer-sity of Oklahoma Press. International Rule of Law Professional. 2014. Interview with International Rule of Law Professional in Afghanistan. Kabul: Afghanistan. ISSER, DEBORAH. 2011. “Conclusion: Understanding and Engaging Customary Justice Systems.” In Custom-ary Justice and the Rule of Law in War-Torn Societies, edited by Deborah Isser, 325–67. Washington, DC: US Institute of Peace Press. JAHN, BEATE. 2007. “The Tragedy of Liberal Diplomacy: Democratization, Intervention, Statebuilding (Part II).” Journal of Intervention and Statebuilding 1 (2): 211–29. JENSEN, ERIK G. 2008. “Justice and the Rule of Law” In Building States to Build Peace, edited by Charles T. Call and Vanessa Wyeth, 119–42. Boulder: Lynne Rienner. JOHNSON, THOMAS H. 2013. “Taliban Adaptations and Innovations.” Small Wars & Insurgencies 24 (1): 3–27. JONES, SETH G. 2008. “The Rise of Afghanistan’s Insurgency: State Failure and Jihad.” International Security 32 (4): 7–40 ——. 2010. In the Graveyard of Empires: America’s War in Afghanistan. New York: W. W. Norton. JORDAN, LISA, AND PETER VAN TUIJL. 2000. “Political Responsibility in Transnational NGO Advocacy.” World Development 28 (12): 2051–65. KALYVAS, STATHIS. 2006. The Logic of Violence in Civil War. Cambridge: Cambridge University Press. KILCULLEN, DAVID. 2011. “Deiokes and the Taliban: Local Governance, Bottom-up State Formation and the Rule of Law in Counter-insurgency.” The Rule of Law in Afghanistan: Missing in Inaction, edited by Whit Mason, 35–49. Cambridge: Cambridge University Press. KRASNER, STEPHEN D. 2004. “Sharing Sovereignty: New Institutions for Collapsed and Failing States.” Inter-national Security 29 (2): 85–120. Downloaded from by London School of Economics user on 09 July 2018 24 Legal Pluralism in Theory and Practice KRASNER, STEPHEN D., AND THOMAS RISSE. 2014. “External Actors, State-Building, and Service Provision in Areas of Limited Statehood: Introduction.” Governance 27 (4): 545–67. KRIGER, NORMA. 2006. “From Patriotic Memories to ‘Patriotic History’ in Zimbabwe, 1990–2005.” Third World Quarterly 27 (6): 1151–69. KRYGIER, MARTIN. 2011. “Approaching the Rule of Law.” The Rule of Law in Afghanistan: Missing in Inaction, edited by Whit Mason. Cambridge: Cambridge University Press, 15–34. LAKE, DAVID A. 2008. “The State and International Relations.” In The Oxford Handbook of International Relations, edited by Christian Reus-Smit and Duncan Snidal. Oxford: Oxford University Press, 41–61. MAC GINTY, ROGER. 2008. “Indigenous Peace-Making versus the Liberal Peace.” Cooperation and Conflict 43 (2): 139–63. MAMPILLY, ZACHARIAH. 2011. Rebel Rulers: Insurgent Governance and Civilian Life during War. Ithaca, NY: Cor-nell University Press. MARRIOTT, ANDREW. 2009. “Legal Professionals in Development: Timor-Leste’s Legislative Experiment.” Conflict, Security & Development 9 (2): 239–63. MARX, SUSAN. 2013. Timor-Leste Law and Justice Survey 2013. Dili: The Asia Foundation. MCWILLIAM, ANDREW. 2005. “Houses of Resistance in East Timor: Structuring Sociality in the New Nation.” Anthropological Forum 15 (1): 27–44. MENKHAUS, KEN. 2007. “Governance without Government in Somalia: Spoilers, State Building, and the Politics of Coping.” International Security 31 (3): 74–106. MERRY, SALLY ENGLE. 1988. “Legal Pluralism.” Law & Society Review 22 (5): 869–96. ——. 1991. “Law and Colonialism.” Law & Soiety Reiew 25 (4): 889–922. MIAKHEL, SHAHMAHMOOD, AND NOAH COBURN. 2010. “Many Shuras Do Not a Government Make: International Community Engagement with Local Councils in Afghanistan.” Washington, DC: United States Institute for Peace. MIGDAL, JOEL S. 1988. Strong Societies and Weak States: State-Society Relations and State Capabilities in the Third World. Princeton, NJ: Princeton University Press. —— 2001. State in Society: Studying how States and Societies Transform and Constitute One Another. Cambridge: Cambridge University Press. MINISTRY OF JUSTICE. 2009. Draft National Policy on Relations between the Formal Justice System and Dispute Reso-lution Councils. Kabul: Islamic Republic of Afghanistan. ——. 2010. Draft Law on Dispute Resolution Shuras and Jirgas. Kabul: Islamic Republic of Afghanistan. NINA, DANIEL. 2000. “Dirty Harry is Back: Vigilantism in South Africa—The (Re) emergence of the ‘Good’and ‘Bad’ Community.” African Security Review 9 (1): 18–28. NIXON, ROD. 2012. Justice and Governance in East Timor: Indigenous Approaches and the ‘New Subsistence State.’ London: Routledge. NORTH, DOUGLASS C., JOHN JOSEPH WALLIS, AND BARRY R. WEINGAST. 2009. Violence and Social Orders: A Concep-tual Framework for Interpreting Recorded Human History. Cambridge: Cambridge University Press. PARIS, ROLAND. 2004. At War’s End: Building Peace after Civil Conflict. Cambridge: Cambridge University Press. ——. 2009. “Does Liberal Peacebuilding Have a Future?” New Perspectives on Liberal Peacebuilding, edited by Edward Newman, Roland Paris, and Oliver P. Richmond. Tokyo: United Nations University Press, 97–111. ——. 2010. “Saving Liberal Peacebuilding.” Review of International Studies 36 (2): 337–65. PARIS, ROLAND, AND TIMOTHY D. SISK, eds. 2009. The Dilemmas of Statebuilding: Confronting the Contradictions of Postwar Peace Operations. London: Routledge. PEERENBOOM, RANDALL. 2002. “Let One Hundred Flowers Bloom, One Hundred Schools Contend: Debat-ing Rule of Law in China.” Michigan Journal of International Law 23 (3): 471–544. PELETZ, MICHAEL G. 2002. Islamic Modern: Religious Courts and Cultural Politics in Malaysia. Princeton, NJ: Princeton University Press. PETERS, ELINE, AND JANINE M. UBINK. 2015. “Restorative and Flexible Customary Procedures and their Gen-dered Impact: A Preliminary View on Namibia’s Formalization of Traditional Courts.” The Journal of Legal Pluralism & Unofficial Law 47 (2): 291–311. POULLADA, LEON B. 1973. Reform and Rebellion in Afghanistan, 1919–1929: King Amanullah’s Failure to Mod-ernize a Tribal Society. Ithaca, NY: Cornell University Press. RASHID, AHMED. 2008. Descent into Chaos: The US and the Disaster in Pakistan, Afghanistan, and Central Asia. New York: Penguin. RDTL. 2004a. On Community Authorities. Decree Law No. 5/2004. Dili: RDTL. ——. 2004b. On the Election of Suco Chiefs and Suco Councils. Law No. 2/2004. Dili: RDTL. ——. 2009a. Community Leadership and Their Election. Law 3/2009. Dili: RDTL. ——. 2009b. Penal Code. Decree-Law 19/2009. Dili: RDTL. Downloaded from by London School of Economics user on 09 July 2018 GEOFFREY SWENSON 25 ——. 2010. Law against Domestic Violence. Law 7/2010. Dili: RDTL. RDTL MINISTRY OF STATE ADMINISTRATION AND THE ASIA FOUNDATION. 2013. Reflections on Law no. 3/2009: Community Leadership and their Election. Dili: The Asia Foundation. RICHMOND, OLIVER P. 2009. “Becoming Liberal, Unbecoming Liberalism: Liberal-Local Hybridity via the Everyday as a Response to the Paradoxes of Liberal Peacebuilding.” Journal of Intervention and State-building 3 (3): 324–44. ROBINSON, GEOFFREY. 2009. “If You Leave Us Here, We Will Die”: How Genocide Was Stopped in East Timor. Princeton, NJ: Princeton University Press. ROY, OLIVIER. 1990. Islam and Resistance in Afghanistan. Cambridge: Cambridge University Press. RUBIN, BARNETT R. 2002. The Fragmentation of Afghanistan: State Formation and Collapse in the International System. New Haven, CT: Yale University Press. SHAVELL, STEVEN. 1995. “Alternative Dispute Resolution: An Economic Analysis.” The Journal of Legal Studies 24 (1): 1–28. SIGAR. 2015. SIGAR 15–68 Audit Report: Rule of Law In Afghanistan: U.S. Agencies Lack a Strategy and Cannot Fully Determine the Effectiveness of Programs Costing More than $1 Billion. Washington, DC: SIGAR. SINGH, DANNY. 2015. “Explaining Varieties of Corruption in the Afghan Justice Sector.” Journal of Interven-tion and Statebuilding 9 (2): 231–55. SINNO, ABDULKADER H. 2008. Organizations at War in Afghanistan and Beyond. Ithaca, NY: Cornell University Press. STANILAND, PAUL. 2012. “States, Insurgents, and Wartime Political Orders.” Perspectives on Politics 10 (2): 243–64. STIPANOWICH, THOMAS J. 2004. “ADR and the “Vanishing Trial”: The Growth and Impact of “Alternative Dispute Resolution.” Journal of Empirical Legal Studies 1 (3): 843–912. STROHMEYER, HANSJOERG. 2000. “Building a New Judiciary for East Timor: Challenges of a Fledgling Na-tion.” Criminal Law Forum 11 (3): 259–85. STROMSETH, JANE E, DAVID WIPPMAN, AND ROSA BROOKS. 2006. Can Might Make Rights? Building the Rule of Law after Military Interventions. Cambridge: Cambridge University Press. SWENSON, GEOFFREY. 2017. “Why U.S. Efforts to Promote the Rule of Law in Afghanistan Failed.” Interna-tional Security 42 (1): 114–51. SWENSON, GEOFFREY, AND ELI SUGERMAN. 2011. “Building the Rule of Law in Afghanistan: The Importance of Legal Education.” Hague Journal on the Rule of Law 3 (1): 130–46. TAMANAHA, BRIAN Z. 2007. “A Concise Guide to the Rule of Law.” St. John’s Legal Studies Research Paper No. 07–0082. ——. 2008. “Understanding Legal Pluralism: Past to Present, Local to Global.” Sydney Law Review 30 (3): 375–411. TYLER, TOM R. 2006. Why People Obey the Law. Princeton, NJ: Princeton University Press. UNITED NATIONS DEVELOPMENT PROGRAM, UNICEF, AND UN WOMEN. 2012. Informal Justice Systems: Charting a Course for Human Rights-based Engagement. New York: United Nations Development Program. US MISSION AFGHANISTAN. 2010. U.S. Foreign Assistance for Afghanistan: Post Performance Management Plan 2011–2015. Kabul: US Mission Afghanistan. VOLKOV, VADIM. 2000. “The Political Economy of Protection Rackets in the Past and the Present.” Social Research 67 (3): 709–44. WALDORF, LARS. 2006. “Mass Justice for Mass Atrocity: Rethinking Local Justice as Transitional Justice.” Temple Law Review 79 (1): 1–87. WARDAK, ALI, AND JOHN BRAITHWAITE. 2013. “Crime and War in Afghanistan: Part II: A Jeffersonian Alterna-tive?” British Journal of Criminology 53(2): 197–214. WEBER, MAX. 1978. Economy and Society: An Outline of Interpretive Sociology. Berkeley: University of California Press. WEST, ROBIN. 2003. Re-Imagining Justice: Progressive Interpretations of Formal Equality, Rights, and the Rule of Law. Farnham, UK: Ashgate. WEST, RONALD A. 2007. “Lawyers, Guns and Money: Justice and Security Reform in East Timor.” In Con-structing Justice and Security after War, edited by Charles T. Call, 313–50. Washington, DC: United States Institute for Peace. WICKHAM-CROWLEY, TIMOTHY P. 1992. Guerrillas and Revolution in Latin America: A Comparative Study of Insur-gents and Regimes since 1956. Princeton, NJ: Princeton University Press. WIGGLESWORTH, ANN. 2013. “Community Leadership and Gender Equality: Experiences of Representation in Local Governance in Timor-Leste.” Asian Politics & Policy 5 (4): 567–84. Downloaded from by London School of Economics user on 09 July 2018
4110
https://artofproblemsolving.com/wiki/index.php/1962_IMO_Problems/Problem_2?srsltid=AfmBOorF8T9Md4pcnikcM5XeiquSI7PosLU9fZp1yqyminkugJ7st914
Art of Problem Solving 1962 IMO Problems/Problem 2 - AoPS Wiki Art of Problem Solving AoPS Online Math texts, online classes, and more for students in grades 5-12. Visit AoPS Online ‚ Books for Grades 5-12Online Courses Beast Academy Engaging math books and online learning for students ages 6-13. Visit Beast Academy ‚ Books for Ages 6-13Beast Academy Online AoPS Academy Small live classes for advanced math and language arts learners in grades 2-12. Visit AoPS Academy ‚ Find a Physical CampusVisit the Virtual Campus Sign In Register online school Class ScheduleRecommendationsOlympiad CoursesFree Sessions books tore AoPS CurriculumBeast AcademyOnline BooksRecommendationsOther Books & GearAll ProductsGift Certificates community ForumsContestsSearchHelp resources math training & toolsAlcumusVideosFor the Win!MATHCOUNTS TrainerAoPS Practice ContestsAoPS WikiLaTeX TeXeRMIT PRIMES/CrowdMathKeep LearningAll Ten contests on aopsPractice Math ContestsUSABO newsAoPS BlogWebinars view all 0 Sign In Register AoPS Wiki ResourcesAops Wiki 1962 IMO Problems/Problem 2 Page ArticleDiscussionView sourceHistory Toolbox Recent changesRandom pageHelpWhat links hereSpecial pages Search 1962 IMO Problems/Problem 2 Contents 1 Problem 2 Solution 3 Solution 2 4 See Also Problem Determine all real numbers which satisfy the inequality: (Note that the problem as written in the official PDF does not have the outer ) Solution Obviously we need for the outer square root to be defined, for the first inner square root to be defined, and for the second inner square root to be defined. Solving these we get that the left hand side is defined for . Now obviously the function is continuous on , with and . Moreover, as is a decreasing and an increasing function, both and are decreasing functions, and hence is a decreasing function. Therefore there is exactly one solution to . We can now find this solution: (Note the little trick in the third row: placing the square roots on opposite sides of the equation. Squaring the equation in the second row would work as well, but this way is a little more pleasant, as the one remaining square root after the squaring will essentially be one of the original two, not their product.) Solving the quadratic equation for , we get The reason why we got two roots is that while solving the original equation we squared both sides twice, and this could have created additional solutions. In this case, obviously the root that is larger than is the additional solution, and is the root we need. Hence the solutions to the given inequality are precisely the reals in the interval ![Image 33: $\boxed{ \left ~ -1,\quad 1-\dfrac{\sqrt{127}}{32} ~ \right) }$. Solution 2 We first do some substitution, Let , then , and the expression becomes: . Squaring both sides, we have: Solving yields or Substituting back for , or . This is two solutions, however, note that for the square root to be determinant, we need to have: Obviously, conflicted with , and the lower bound for x is , so our final solution is: ![Image 50: [\boxed{x \in \left ~ -1,\quad 1-\dfrac{\sqrt{127}}{32} ~ \right) }] ~IDKHowtoaddsolution See Also 1962 IMO (Problems) • Resources Preceded by Problem 11•2•3•4•5•6Followed by Problem 3 All IMO Problems and Solutions Retrieved from " Art of Problem Solving is an ACS WASC Accredited School aops programs AoPS Online Beast Academy AoPS Academy About About AoPS Our Team Our History Jobs AoPS Blog Site Info Terms Privacy Contact Us follow us Subscribe for news and updates © 2025 AoPS Incorporated © 2025 Art of Problem Solving About Us•Contact Us•Terms•Privacy Copyright © 2025 Art of Problem Solving Something appears to not have loaded correctly. Click to refresh.
4111
https://www.wyzant.com/resources/answers/933830/write-the-equation-of-the-transformed-graph-of-tangent-with-period-6-that-h
Write the equation of the transformed graph of tangent with period 6 that has been shifted vertically up 2 units. (3 points) | Wyzant Ask An Expert Log inSign up Find A Tutor Search For Tutors Request A Tutor Online Tutoring How It Works For Students FAQ What Customers Say Resources Ask An Expert Search Questions Ask a Question Wyzant Blog Start Tutoring Apply Now About Tutors Jobs Find Tutoring Jobs How It Works For Tutors FAQ About Us About Us Careers Contact Us All Questions Search for a Question Find an Online Tutor Now Ask a Question for Free Login WYZANT TUTORING Log in Sign up Find A Tutor Search For Tutors Request A Tutor Online Tutoring How It Works For Students FAQ What Customers Say Resources Ask An Expert Search Questions Ask a Question Wyzant Blog Start Tutoring Apply Now About Tutors Jobs Find Tutoring Jobs How It Works For Tutors FAQ About Us About Us Careers Contact Us Subject ZIP Search SearchFind an Online Tutor NowAsk Ask a Question For Free Login Trigonometry Joe B. asked • 10/05/23 Write the equation of the transformed graph of tangent with period 6 that has been shifted vertically up 2 units. (3 points) Write the equation of the transformed graph of tangent with period 6 that has been shifted vertically up 2 units. (3 points) Follow •1 Add comment More Report 1 Expert Answer Best Newest Oldest By: William C.answered • 10/05/23 Tutor 4.9(118) Experienced Tutor Specializing in Chemistry, Math, and Physics About this tutor› About this tutor› Note that tan(x) has a period of π (not 2π). Below, this affects the equation for our b coefficient. y = ±a tan (b x – c) + d a = amplitude = 1 There is no flipping across the x-axis means start with a = 1 (so there is no a coefficient in our transformed equation) period = 6 = π/b, so b = π/(period) = π/6 there’s no phase shift, so c = 0 (so there is no c coefficient in our transformed equation) shifted vertically up 2 units means d = 2 So our required equation is y = tan ((π/6)x) + 2 Upvote • 0Downvote Add comment More Report Still looking for help? Get the right answer, fast. Ask a question for free Get a free answer to a quick problem. Most questions answered within 4 hours. OR Find an Online Tutor Now Choose an expert and meet online. No packages or subscriptions, pay only for the time you need. ¢€£¥‰µ·•§¶ß‹›«»<>≤≥–—¯‾¤¦¨¡¿ˆ˜°−±÷⁄׃∫∑∞√∼≅≈≠≡∈∉∋∏∧∨¬∩∪∂∀∃∅∇∗∝∠´¸ª º†‡À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö Ø Œ Š Ù Ú Û Ü Ý Ÿ Þ à á â ã ä å æ ç è é ê ë ì í î ï ð ñ ò ó ô õ ö ø œ š ù ú û ü ý þ ÿ Α Β Γ Δ Ε Ζ Η Θ Ι Κ Λ Μ Ν Ξ Ο Π Ρ Σ Τ Υ Φ Χ Ψ Ω α β γ δ ε ζ η θ ι κ λ μ ν ξ ο π ρ ς σ τ υ φ χ ψ ω ℵ ϖ ℜ ϒ℘ℑ←↑→↓↔↵⇐⇑⇒⇓⇔∴⊂⊃⊄⊆⊇⊕⊗⊥⋅⌈⌉⌊⌋〈〉◊ RELATED TOPICS MathAlgebra 2CalculusGeometryPrecalculusAlgebraWord ProblemPre CalculusMathsMath Help...TrigTrigonometry IdentitiesTrianglesMathematicsMath Word ProblemTangentTrigonometric IdentitiesTrigonometric FunctionsCosineSine RELATED QUESTIONS ##### tan^2x-sin^2x=tan^2xsin^2x Answers · 5 ##### I need help trying to sole tan^2 x =1 where x is more than or equal to 0 but x is less than or equal to pi Answers · 5 ##### find all solutions to the equation in (0, 2pi) sin(6x)+sin(2x)=0 Answers · 4 ##### (2sin18)(cos18) Answers · 5 ##### how do i go about solving a trig identity; that simplify s 1-sin^2 theta/1-cos theta Answers · 2 RECOMMENDED TUTORS Max C. 5(1,123) Roger M. 4.9(546) Cindy M. 5.0(1,241) See more tutors find an online tutor Trigonometry tutors Precalculus tutors Geometry tutors Multivariable Calculus tutors Calculus tutors College Algebra tutors Differential Equations tutors AP Calculus BC tutors Download our free app A link to the app was sent to your phone. Please provide a valid phone number. App StoreGoogle Play ##### Get to know us About Us Contact Us FAQ Reviews Safety Security In the News ##### Learn with us Find a Tutor Request a Tutor Online Tutoring Learning Resources Blog Tell Us What You Think ##### Work with us Careers at Wyzant Apply to Tutor Tutor Job Board Affiliates Download our free app App StoreGoogle Play Let’s keep in touch Need more help? Learn more about how it works ##### Tutors by Subject Algebra Tutors Calculus Tutors Chemistry Tutors Computer Tutors Elementary Tutors English Tutors Geometry Tutors Language Tutors Math Tutors Music Lessons Physics Tutors Reading Tutors SAT Tutors Science Tutors Spanish Tutors Statistics Tutors Test Prep Tutors Writing Tutors ##### Tutors by Location Atlanta Tutors Boston Tutors Brooklyn Tutors Chicago Tutors Dallas Tutors Denver Tutors Detroit Tutors Houston Tutors Los Angeles Tutors Miami Tutors New York City Tutors Orange County Tutors Philadelphia Tutors Phoenix Tutors San Francisco Tutors Seattle Tutors San Diego Tutors Washington, DC Tutors Making educational experiences better for everyone. ##### IXL Comprehensive K-12 personalized learning ##### Rosetta Stone Immersive learning for 25 languages ##### Education.com 35,000 worksheets, games, and lesson plans ##### TPT Marketplace for millions of educator-created resources ##### Vocabulary.com Adaptive learning for English vocabulary ##### ABCya Fun educational games for kids ##### SpanishDictionary.com Spanish-English dictionary, translator, and learning ##### Inglés.com Diccionario inglés-español, traductor y sitio de aprendizaje ##### Emmersion Fast and accurate language certification SitemapTerms of UsePrivacy Policy © 2005 - 2025 Wyzant, Inc, a division of IXL Learning - All Rights Reserved Privacy Preference Center Your Privacy Strictly Necessary Cookies Performance Cookies Functional Cookies Targeting Cookies Your Privacy When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Performance Cookies [x] Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Functional Cookies [x] Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Targeting Cookies [x] Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookie List Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Clear [x] checkbox label label Apply Cancel Confirm My Choices Allow All
4112
https://pubmed.ncbi.nlm.nih.gov/11506097/
A double-blind, randomized comparison of i.v. lorazepam versus midazolam for sedation of ICU patients via a pharmacologic model - PubMed Clipboard, Search History, and several other advanced features are temporarily unavailable. Skip to main page content An official website of the United States government Here's how you know The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site. The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely. Log inShow account info Close Account Logged in as: username Dashboard Publications Account settings Log out Access keysNCBI HomepageMyNCBI HomepageMain ContentMain Navigation Search: Search AdvancedClipboard User Guide Save Email Send to Clipboard My Bibliography Collections Citation manager Display options Display options Format Save citation to file Format: Create file Cancel Email citation On or after July 28, sending email will require My NCBI login. Learn more about this and other changes coming to the email feature. Subject: 1 selected item: 11506097 - PubMed To: From: Format: [x] MeSH and other data Send email Cancel Add to Collections Create a new collection Add to an existing collection Name your collection: Name must be less than 100 characters Choose a collection: Unable to load your collection due to an error Please try again Add Cancel Add to My Bibliography My Bibliography Unable to load your delegates due to an error Please try again Add Cancel Your saved search Name of saved search: Search terms: Test search terms Would you like email updates of new search results? Saved Search Alert Radio Buttons Yes No Email: (change) Frequency: Which day? Which day? Report format: Send at most: [x] Send even when there aren't any new results Optional text in email: Save Cancel Create a file for external citation management software Create file Cancel Your RSS Feed Name of RSS Feed: Number of items displayed: Create RSS Cancel RSS Link Copy Full text links Wolters Kluwer Full text links Actions Cite Collections Add to Collections Create a new collection Add to an existing collection Name your collection: Name must be less than 100 characters Choose a collection: Unable to load your collection due to an error Please try again Add Cancel Permalink Permalink Copy Display options Display options Format Page navigation Title & authors Abstract Comment in Similar articles Cited by Publication types MeSH terms Substances Related information LinkOut - more resources Clinical Trial Anesthesiology Actions Search in PubMed Search in NLM Catalog Add to Search . 2001 Aug;95(2):286-98. doi: 10.1097/00000542-200108000-00007. A double-blind, randomized comparison of i.v. lorazepam versus midazolam for sedation of ICU patients via a pharmacologic model J Barr1,K Zomorodi,E J Bertaccini,S L Shafer,E Geller Affiliations Expand Affiliation 1 VA Palto Alto Health Care System, Stanford University School of Medicine, Anesthesiology Service, California 94304, USA. barrj@leland.stanford.edu PMID: 11506097 DOI: 10.1097/00000542-200108000-00007 Item in Clipboard Clinical Trial A double-blind, randomized comparison of i.v. lorazepam versus midazolam for sedation of ICU patients via a pharmacologic model J Barr et al. Anesthesiology.2001 Aug. Show details Display options Display options Format Anesthesiology Actions Search in PubMed Search in NLM Catalog Add to Search . 2001 Aug;95(2):286-98. doi: 10.1097/00000542-200108000-00007. Authors J Barr1,K Zomorodi,E J Bertaccini,S L Shafer,E Geller Affiliation 1 VA Palto Alto Health Care System, Stanford University School of Medicine, Anesthesiology Service, California 94304, USA. barrj@leland.stanford.edu PMID: 11506097 DOI: 10.1097/00000542-200108000-00007 Item in Clipboard Full text links Cite Display options Display options Format Abstract Background: Benzodiazepines, such as lorazepam and midazolam, are frequently administered to surgical intensive care unit (ICU) patients for postoperative sedation. To date, the pharmacology of lorazepam in critically ill patients has not been described. The aim of the current study was to characterize and compare the pharmacokinetics and pharmacodynamics of lorazepam and midazolam administered as continuous intravenous infusions for postoperative sedation of surgical ICU patients. Methods: With Institutional Review Board approval, 24 consenting adult surgical patients were given either lorazepam or midazolam in a double-blind fashion (together with either intravenous fentanyl or epidural morphine for analgesia) through target-controlled intravenous infusions titrated to maintain a moderate level of sedation for 12-72 h postoperatively. Moderate sedation was defined as a Ramsay Sedation Scale score of 3 or 4. Sedation scores were measured, together with benzodiazepine plasma concentrations. Population pharmacokinetic and pharmacodynamic parameters were estimated using nonlinear mixed-effects modeling. Results: A two-compartment model best described the pharmacokinetics of both lorazepam and midazolam. The pharmacodynamic model predicted depth of sedation for both midazolam and lorazepam with 76% accuracy. The estimated sedative potency of lorazepam was twice that of midazolam. The predicted C50,ss (plasma benzodiazepine concentrations where P(Sedation > or = ss) = 50%) values for midazolam (sedation score [SS] > or = n, where n = a Ramsay Sedation Score of 2, 3, ... 6) were 68, 101, 208, 304, and 375 ng/ml. The corresponding predicted C50,ss values for lorazepam were 34, 51, 104, 152, and 188 ng/ml, respectively. Age, fentanyl administration, and the resolving effects of surgery and anesthesia were significant covariates of benzodiazepine sedation. The relative amnestic potency of lorazepam to midazolam was 4 (observed). The predicted emergence times from sedation after a 72-h benzodiazepine infusion for light (SS = 3) and deep (SS = 5) sedation in a typical patient were 3.6 and 14.9 h for midazolam infusions and 11.9 and 31.1 h for lorazepam infusions, respectively. Conclusions: The pharmacology of intravenous infusions of lorazepam differs significantly from that of midazolam in critically ill patients. This results in significant delays in emergence from sedation with lorazepam as compared with midazolam when administered for ICU sedation. PubMed Disclaimer Comment in Pharmacokinetic-pharmacodynamic modeling and ICU sedation: unexplored territories.Bailey JM.Bailey JM.Anesthesiology. 2001 Aug;95(2):281-2. doi: 10.1097/00000542-200108000-00005.Anesthesiology. 2001.PMID: 11506095 No abstract available. Useful information about the pharmacokinetics and pharmacodynamics of midazolam and lorazepam.Deem S.Deem S.Anesthesiology. 2002 Aug;97(2):522; author reply 522-3. doi: 10.1097/00000542-200208000-00039.Anesthesiology. 2002.PMID: 12151951 No abstract available. Similar articles Comparative population pharmacokinetics of lorazepam and midazolam during long-term continuous infusion in critically ill patients.Swart EL, Zuideveld KP, de Jongh J, Danhof M, Thijs LG, Strack van Schijndel RM.Swart EL, et al.Br J Clin Pharmacol. 2004 Feb;57(2):135-45. doi: 10.1046/j.1365-2125.2003.01957.x.Br J Clin Pharmacol. 2004.PMID: 14748812 Free PMC article.Clinical Trial. Optimal intravenous dosing strategies for sedatives and analgesics in the intensive care unit.Barr J, Donner A.Barr J, et al.Crit Care Clin. 1995 Oct;11(4):827-47.Crit Care Clin. 1995.PMID: 8535981 Review. Continuous infusions of lorazepam, midazolam, and propofol for sedation of the critically ill surgery trauma patient: a prospective, randomized comparison.McCollam JS, O'Neil MG, Norcross ED, Byrne TK, Reeves ST.McCollam JS, et al.Crit Care Med. 1999 Nov;27(11):2454-8. doi: 10.1097/00003246-199911000-00022.Crit Care Med. 1999.PMID: 10579264 Clinical Trial. Propofol dosing regimens for ICU sedation based upon an integrated pharmacokinetic-pharmacodynamic model.Barr J, Egan TD, Sandoval NF, Zomorodi K, Cohane C, Gambus PL, Shafer SL.Barr J, et al.Anesthesiology. 2001 Aug;95(2):324-33. doi: 10.1097/00000542-200108000-00011.Anesthesiology. 2001.PMID: 11506101 Clinical Trial. Altered Pharmacokinetics in Prolonged Infusions of Sedatives and Analgesics Among Adult Critically Ill Patients: A Systematic Review.Tse AHW, Ling L, Lee A, Joynt GM.Tse AHW, et al.Clin Ther. 2018 Sep;40(9):1598-1615.e2. doi: 10.1016/j.clinthera.2018.07.021. Epub 2018 Aug 31.Clin Ther. 2018.PMID: 30173953 See all similar articles Cited by Treatment of Alcohol Withdrawal Syndrome with and without Dexmedetomidine.Beg M, Fisher S, Siu D, Rajan S, Troxell L, Liu VX.Beg M, et al.Perm J. 2016 Spring;20(2):49-53. doi: 10.7812/TPP/15-113.Perm J. 2016.PMID: 27168398 Free PMC article. Chlorpromazine as Treatment for Refractory Agitation Associated with Pediatric Delirium.Kim SY, Simone S, Kishk OA, Graciano AL, Seung H, Edwards S.Kim SY, et al.J Pediatr Pharmacol Ther. 2022;27(8):725-731. doi: 10.5863/1551-6776-27.8.725. Epub 2022 Nov 17.J Pediatr Pharmacol Ther. 2022.PMID: 36415772 Free PMC article. Intensive Care Unit Analgosedation After Cardiac Surgery in Children with Williams Syndrome : a Matched Case-Control Study.Mills M, Algaze C, Journel C, Suarez G, Lechich K, Kwiatkowski MD, Schmidt AR, Collins RT.Mills M, et al.Pediatr Cardiol. 2024 Jan;45(1):107-113. doi: 10.1007/s00246-023-03321-8. Epub 2023 Oct 26.Pediatr Cardiol. 2024.PMID: 37882809 The Sedative Effect of Propranolol on Critically Ill Patients: A Case Series.Shiotsuka J, Steel A, Downar J.Shiotsuka J, et al.Front Med (Lausanne). 2017 May 4;4:44. doi: 10.3389/fmed.2017.00044. eCollection 2017.Front Med (Lausanne). 2017.PMID: 28523268 Free PMC article. Co-administration of midazolam and psilocybin: differential effects on subjective quality versus memory of the psychedelic experience.Nicholas CR, Banks MI, Lennertz RC, Wenthur CJ, Krause BM, Riedner BA, Smith RF, Hutson PR, Sauder CJ, Dunne JD, Roseman L, Raison CL.Nicholas CR, et al.Transl Psychiatry. 2024 Sep 12;14(1):372. doi: 10.1038/s41398-024-03059-8.Transl Psychiatry. 2024.PMID: 39266503 Free PMC article. See all "Cited by" articles Publication types Clinical Trial Actions Search in PubMed Search in MeSH Add to Search Comparative Study Actions Search in PubMed Search in MeSH Add to Search Randomized Controlled Trial Actions Search in PubMed Search in MeSH Add to Search Research Support, Non-U.S. Gov't Actions Search in PubMed Search in MeSH Add to Search Research Support, U.S. Gov't, Non-P.H.S. Actions Search in PubMed Search in MeSH Add to Search MeSH terms Adolescent Actions Search in PubMed Search in MeSH Add to Search Adult Actions Search in PubMed Search in MeSH Add to Search Aged Actions Search in PubMed Search in MeSH Add to Search Aged, 80 and over Actions Search in PubMed Search in MeSH Add to Search Amnesia / chemically induced Actions Search in PubMed Search in MeSH Add to Search Double-Blind Method Actions Search in PubMed Search in MeSH Add to Search Female Actions Search in PubMed Search in MeSH Add to Search Hemodynamics / drug effects Actions Search in PubMed Search in MeSH Add to Search Humans Actions Search in PubMed Search in MeSH Add to Search Hypnotics and Sedatives / administration & dosage Actions Search in PubMed Search in MeSH Add to Search Hypnotics and Sedatives / pharmacokinetics Actions Search in PubMed Search in MeSH Add to Search Intensive Care Units Actions Search in PubMed Search in MeSH Add to Search Lorazepam / administration & dosage Actions Search in PubMed Search in MeSH Add to Search Lorazepam / pharmacokinetics Actions Search in PubMed Search in MeSH Add to Search Male Actions Search in PubMed Search in MeSH Add to Search Midazolam / administration & dosage Actions Search in PubMed Search in MeSH Add to Search Midazolam / pharmacokinetics Actions Search in PubMed Search in MeSH Add to Search Middle Aged Actions Search in PubMed Search in MeSH Add to Search Models, Biological Actions Search in PubMed Search in MeSH Add to Search Prospective Studies Actions Search in PubMed Search in MeSH Add to Search Substances Hypnotics and Sedatives Actions Search in PubMed Search in MeSH Add to Search Lorazepam Actions Search in PubMed Search in MeSH Add to Search Midazolam Actions Search in PubMed Search in MeSH Add to Search Related information PubChem Compound PubChem Compound (MeSH Keyword) PubChem Substance LinkOut - more resources Full Text Sources Ovid Technologies, Inc. Wolters Kluwer Full text links[x] Wolters Kluwer [x] Cite Copy Download .nbib.nbib Format: Send To Clipboard Email Save My Bibliography Collections Citation Manager [x] NCBI Literature Resources MeSHPMCBookshelfDisclaimer The PubMed wordmark and PubMed logo are registered trademarks of the U.S. Department of Health and Human Services (HHS). Unauthorized use of these marks is strictly prohibited. Follow NCBI Connect with NLM National Library of Medicine 8600 Rockville Pike Bethesda, MD 20894 Web Policies FOIA HHS Vulnerability Disclosure Help Accessibility Careers NLM NIH HHS USA.gov
4113
https://www.teacherspayteachers.com/browse?search=state%20quarters
State Quarters End of the Year or Quarter Reflection Worksheet After State Testing Activity 50 State Quarters Clip Art State Quarter Clip Art Coins Clip Art Money Clip Art State Quarters Research 50 State Quarter Research Book and Map U.S. State Quarters - Great for President's Day, Lincoln & Washington's Birthday Texas State Symbols / Shape / Location / Quarter - Mini Preschool Theme New Jersey State Symbols / Shape / Location / Quarter - Mini Preschool Theme New Hampshire State Symbols / Shape / Location / Quarter - Mini Preschool Theme Louisiana State Symbols / Shape / Location / Quarter - Mini Preschool Theme Vermont State Symbols / Shape / Location / Quarter - Mini Preschool Theme Rhode Island State Symbols / Shape / Location / Quarter - Mini Preschool Theme 50 State Quarters Picture Pack Nebraska State Symbols / Shape / Location / Quarter - Mini Preschool Theme California State Symbols / Shape / Location / Quarter - Mini Preschool Theme Connecticut State Symbols / Shape / Location / Quarter - Mini Preschool Theme New York State Symbols / Shape / Location / Quarter - Mini Preschool Theme Letter Tracing Page - Entire Alphabet - Texas - State Quarter Letter Tracing Page - Entire Alphabet - Tennessee - State Quarter Letter Tracing Page - Entire Alphabet - Utah - State Quarter Letter Tracing Page - Entire Alphabet - South Dakota - State Quarter Letter Tracing Page - Entire Alphabet - South Carolina - State Quarter Letter Tracing Page - Entire Alphabet - Rhode Island - State Quarter Letter Tracing Page - Entire Alphabet - Pennsylvania - State Quarter Letter Tracing Page - Entire Alphabet - Oregon - State Quarter
4114
https://languagetool.org/insights/es/publicacion/dequeismo-y-queismo/
¿Qué es el dequeísmo y el queísmo? Definición y ejemplos Insights by LanguageTool Corrector ortográfico Parafrasear Premium Sobre nosotros English German French Spanish Corrige tu ortografía y gramática Corrector ortográfico Parafrasear Premium Sobre nosotros English German French Spanish Corrige tu ortografía y gramática iOS macOS Windows Gramática Inicio Gramática ¿Qué es el dequeísmo y el queísmo? Definición y ejemplos ¿Qué es el dequeísmo y el queísmo? Definición y ejemplos Publicado el 15 de junio de 2025 por Ana Fernández, MA ¿Te preocupa “de que” cometas este error sin darte cuenta? El “dequeísmo” y el “queísmo” son usos inadecuados de las secuencias “de que” y “que”, respectivamente. Te explicamos cómo evitarlos. Es difícil que algo así vuelva a suceder. Ni me di cuenta de que había acabado la película. Es difícil ~~de que~~ algo así vuelva a suceder. Ni me di cuenta ~~que~~ que había acabado la película. Tabla de contenidos ¿Qué es el “dequeísmo” y qué es el “queísmo”? ¿Qué es y por qué se produce el “dequeísmo”? Ejemplos ilustrativos ¿Qué es el “dequeísmo” y qué es el “queísmo”? Es probable “de que” hayas cometido un error como este en alguna que otra ocasión. De manera oral es habitual escuchar en distintas conversaciones un “que” o un “de que”que se cuela en cierto tipo de oraciones. Pero ¿qué son y por qué ocurren estos fenómenos antinormativos? Según la RAE, la Real Academia Española, el dequeísmo es: El uso indebido de la preposición “de” delante de la conjunción “que” cuando la preposición no viene exigida por ninguna palabra del enunciado. A su vez, la RAE define el queísmo como: La supresión indebida de una preposición (generalmente “de”) delante de la conjunción “que”, cuando la preposición viene exigida por alguna palabra del enunciado. Histórica y socialmente estos errores se perciben de manera bastante negativa. La presión por no caer en el dequeísmo hace que, en algunos casos, se caiga en el fenómeno opuesto, el queísmo. A continuación, vamos a darte todas las pistas necesarias para aliviar esa presión y aprender a detectar si estás utilizando incorrectamente “de” o “que” al escribir o al hablar. ¿Qué es y por qué se produce el “dequeísmo”? Ejemplos ilustrativos Ahora que ya sabemos qué son estos fenómenos lingüísticos que conducen a un uso indebido de la conjunción “que” y de la preposición “de”, es importante saber por qué se producen y cómo evitar el queísmo y dequeísmo. Empecemos abordando el dequeísmo. Existen diversos casos que dan lugar al dequeísmo y que deben tenerse en cuenta para tratar de evitar este fenómeno: 1) En primer lugar, cuando se antepone la preposición “de” a una oración sustantiva que hace la función de sujeto. Para no caer en el dequeísmo debemos recordar siempre que el sujeto de una oración nunca va precedido de preposición. Es posible ~~de que~~ no llueva más en todo el verano. Es posible que no llueva más en todo el verano. Dicen los expertos: “Es posible que” no llueva más en todo el verano. 2) Por otro lado, al anteponerse la preposición “de” a una oración sustantiva que hace la función de complemento directo. Suele ocurrir con los verbos que se conocen como verbos de pensamiento. Forman parte de estos verbos: pensar, opinar, creer, considerar, etc. También ocurre con los verbos de habla, que serían verbos como comunicar, exponer, etc.; con los verbos de temor (verbos como temer, etc.), y con los verbos de percepción (como ver, oír, etc.). Debes tener en cuenta que el complemento directo nunca va precedido de la preposición “de”. Pienso ~~de que~~ es mejor no ir a la cena. Pienso que es mejor no ir a la cena. 3) Cuando aparece la preposición “de” antes de una oración subordinada con funciones de atributo en oraciones copulativas con el verbo ser u otros verbos similares. Nuestra intención es ~~de que~~ todos participemos en el proyecto. Nuestra intención es que todos participemos en el proyecto. Las oraciones copulativas se llaman así porque sus formas verbales no tienen de por sí ningún significado pleno y su función es únicamente la de unir el sujeto con el atributo o el predicado. 4) Cuando se añade la preposición “de” en locuciones conjuntivas que no la llevan como una vez que, a medida que o a no ser que. A medida ~~de que~~ pasa el tiempo, lo aprecio más. A medida que pasa el tiempo, lo aprecio más. 5) Cuando se usa la preposición “de” en vez de la que realmente pide el verbo. Nos fijamos ~~de que~~ no viniste al concierto. Nos fijamos en que no viniste al concierto. Siguiendo estas cinco reglas, deberíamos evitar el dequeísmo y escribir frases correctas sin ese “de” innecesario. Sin embargo, existen otros verbos que dificultan nuestra misión de impedir el dequeísmo. Algunos verbos pueden construirse con o sin el “de”, según el sentido que tenga la propia frase. Esto ocurre con verbos como: _\Advertir:\__\_Advertir\ (algo) a alguien y \advertir\ \de\ algo (a alguien)._ _\Avisar:\__\Avisar\ (algo) a alguien y \avisar\ \de\ algo (a alguien)._ _\Cuidar:\__\Cuidar\ (algo o a alguien) y \cuidar\ \de\ algo o alguien._ _\Dudar:\__\Dudar\ (algo) y \dudar\ \de\ algo._ _\Informar:\__\Informar\ (algo) a alguien (este uso se da solo en Latinoamérica) e \informar\ \de\ algo (a alguien) (este uso se da solo en España).__ “A medida que” iba leyendo, se iba preocupando más por todo el trabajo que tenía. Cómo evitar el “dequeísmo” Ya conocemos la definición de dequeísmo y hemos visto algunos ejemplos de frases en las que se produce dicho fenómeno. Ahora nos falta averiguar cómo evitarlo. El truco más sencillo que casi siempre funciona, para evitar caer en el dequeísmo y hacer un uso indebido de la preposición “de” es sustituir la oración subordinada que incluya la conjunción “que” por “eso”. Si se debe seguir usando esa preposición, significa que su uso es correcto. Veamos algunos ejemplos: Pienso ~~de que~~ mañana va a llover → Pienso ~~de eso~~. Pienso que mañana va a llover → Pienso eso. Otro truco que a menudo funciona es convertir la oración sobre la que estamos dudando en una oración interrogativa. Si la oración interrogativa solo tiene sentido con el uso de la preposición “de”, significa que la oración original también debe incluirla. Por ejemplo: ¿De qué nos enteramos? Nos enteramos de que era imposible parar el calentamiento global. ¿~~Qué~~ nos enteramos? Nos enteramos ~~que~~ era imposible parar el calentamiento global. ¿“De qué” me están hablando con todo esto del “dequeísmo y queísmo”? Ejemplos de frases en las que se produce “dequeísmo” Estas son algunas oraciones ejemplo en las que se produce dequeísmo y cómo podemos solucionarlo. Es posible ~~de que~~ llueva mañana. Es posible que llueva mañana. He oído ~~de que~~ has cambiado de trabajo. ¡Enhorabuena! He oído que has cambiado de trabajo. ¡Enhorabuena! Le preocupa ~~de que~~ llueva el día de su boda. Le preocupa que llueva el día de su boda. Mi idea es ~~de que~~ nos levantemos temprano y salgamos a las 7:00 am. Mi idea es que nos levantemos temprano y salgamos a las 7:00 am. ¿Por qué se produce y cómo evitar el “queísmo”? Ejemplos Como ya hemos visto,el queísmo o antidequeísmo es el fenómeno contrario al dequeísmo. Los principales casos en los que no se debe suprimir la preposición “de” son: 1) Con verbos pronominales que llevan un complemento de régimen, como acordarse de algo, alegrarse de algo, arrepentirse de algo, fijarse en algo, olvidarse de algo, etc. Nos olvidamos ~~que~~ teníamos que llegar pronto. Nos olvidamos de que teníamos que llegar pronto. 2) Con verbos no pronominales que llevan un complemento de régimen como convencer de algo, insistir en algo, tratar de algo, etc. Le convencí ~~que~~ viniera a cenar. Le convencí de que viniera a cenar. 3) Con sustantivos que llevan complementos preposicionales. Me muero de ganas ~~que~~ lleguen mis vacaciones. Me muero de ganas de que lleguen mis vacaciones. 4) Con adjetivos que necesitan complementos preposicionales. Estamos seguros ~~que~~ aprobarás el examen Estamos seguros de que aprobarás el examen. 5) En locuciones como: _\A condición de\_ _\A fin de\_ _\A pesar de\_ _\En caso de\_ _\A pesar de quees jueves\__\, las terrazas están llenas.\_ 6) En _locuciones verbales_ como: _\Caer en la cuenta de\_ _\Darse cuenta de\_ _\Dudar de algo\_ _\Dudo de quese\__\_haya dado cuenta del error que ha cometido.\__ Para comprobar cuándo se debe emplear la secuencia “preposición + que” o simplemente “que” se pueden usar los mismos trucos que vimos para evitar el dequeísmo y, además, se deben tener en cuenta los casos que acabamos de analizar. Además de experimentar con estos trucos y estudiar la gramática de manera exhaustiva, siempre puedes disponer de un asistente de escritura como LanguageTool que haga la corrección ortográfica, gramatical y de estilo por ti. ¿Te has dado cuenta ya de que te ahorrarás muchísimo tiempo, esfuerzo y, hasta casi, salud mental? ¡Es posible que pronto no puedas vivir sin él! Resumamos: El dequeísmo es el uso incorrecto de la preposición “de” delante de la conjunción “que” cuando la preposición no viene exigida por ninguna palabra del enunciado. El queísmo o antidequeísmo es el fenómeno contrario al dequeísmo. Consiste en la supresión incorrecta de la preposición “de” delante de la conjunción “que” cuando la preposición viene exigida por alguna palabra de la oración. ¿Te ha resultado útil este artículo? 3 4 Ya has votado. ¡Muchas gracias! :-)Se ha guardado tu voto.Procesando tu voto... Ana Fernández, MA Ana estudió Traducción e Interpretación en la Universidad de Granada (España) y tiene un máster en Traducción Audiovisual de la University of Roehampton, en Londres (Reino Unido). Tiene experiencia como traductora, editora y como Content Manager. Otros temas interesantes Actualizaciones del producto Estilo y redacción Etimología y lingüística Figuras literarias Gramática Ortografía Redacción de textos Vocabulario Artículos relacionados Ningún artículo relacionado Quizás también te interese #### ¿Cómo se dice: numerar o enumerar? Ejemplos Numerar significa contar por el orden de los números o marcar con números. Enumerar significa nombrar varias cosas, una detrás de otra. #### ¿Cómo se escribe: deprisa o de prisa? Ejemplos prácticos Es habitual la confusión entre de prisa y deprisa. Tanto deprisa como de prisa son correctas y están aceptadas. #### ¿Cómo se escribe: enmedio o en medio? Ejemplos y usos En medio es una locución adverbial que cuenta con varias acepciones en español. Enmedio es una forma incorrecta. LanguageToolRevisa el texto de forma fácil y rápida. Gramática, puntuación, estilo y ortografía. Twitter Facebook Instagram TikTok LinkedIn Idiomas Corrector gramatical para inglés Corrector gramatical para alemán Corrector gramatical para español Corrector gramatical para francés Corrector gramatical para portugués Corrector gramatical para neerlandés Corrector gramatical para catalán Aplicaciones iOS macOS Windows Complementos de navegador Chrome Microsoft Edge Mozilla Firefox Safari Opera Extensiones de Office Google Docs Microsoft Word Apple Pages LibreOffice Extensiones de correo electrónico Gmail Apple Mail Thunderbird Producto Revisa gramática y ortografía Revisión de puntuación Parafrasear Premium Corrección gramatical en documentos de Word LanguageTool para empresas LanguageTool para OSAL y estudiantes LanguageTool para escritores profesionales API de revisión Desarrollo de código abierto Centro de ayuda Empresa Sobre nosotros Materiales multimedia Community Código fuente Empleo Hecho con ♥ en Alemania, España, Francia, Holanda y el Reino Unido. Privacidad Términos & condiciones Créditos Política de cookies Buscar... × 0 resultados
4115
https://fiveable.me/key-terms/intermediate-algebra/slope-intercept-form
Slope-Intercept Form - (Intermediate Algebra) - Vocab, Definition, Explanations | Fiveable | Fiveable new!Printable guides for educators Printable guides for educators. Bring Fiveable to your classroom ap study content toolsprintablespricing my subjectsupgrade All Key Terms Intermediate Algebra Slope-Intercept Form 📘intermediate algebra review key term - Slope-Intercept Form Citation: MLA Definition The slope-intercept form is a way to represent a linear equation in two variables, $y$ and $x$, in the form $y = mx + b$, where $m$ represents the slope of the line and $b$ represents the $y$-intercept, the point where the line crosses the $y$-axis. This form provides a straightforward method for graphing linear equations and understanding their key features. 5 Must Know Facts For Your Next Test The slope-intercept form, $y = mx + b$, is a widely used representation of linear equations that provides a clear and intuitive way to understand the behavior of a line. The slope, $m$, in the slope-intercept form determines the direction and steepness of the line, with positive slopes indicating an upward trend and negative slopes indicating a downward trend. The $y$-intercept, $b$, in the slope-intercept form represents the point where the line crosses the $y$-axis, providing information about the starting value of the line. The slope-intercept form is particularly useful for graphing linear equations, as the slope and $y$-intercept can be used to easily plot the line on a coordinate plane. Understanding the slope-intercept form is crucial for solving linear equations, as it allows for the identification of key features of the line, such as its direction, steepness, and starting point. Review Questions Explain how the slope-intercept form, $y = mx + b$, can be used to solve linear equations in the context of 2.1 Use a General Strategy to Solve Linear Equations. The slope-intercept form, $y = mx + b$, is a valuable tool for solving linear equations in the context of 2.1 Use a General Strategy to Solve Linear Equations. By rearranging the equation into the slope-intercept form, you can isolate the variable $y$ and solve for the unknown variable, whether it is $x$ or $b$. The slope $m$ and $y$-intercept $b$ provide key information about the structure of the linear equation, allowing you to determine the solution and understand the relationship between the variables. Describe how the slope-intercept form can be used to graph linear equations in the context of 3.1 Graph Linear Equations in Two Variables. In the context of 3.1 Graph Linear Equations in Two Variables, the slope-intercept form, $y = mx + b$, is essential for graphing linear equations. The slope $m$ determines the direction and steepness of the line, while the $y$-intercept $b$ provides the starting point on the $y$-axis. By using the values of $m$ and $b$, you can easily plot the line on a coordinate plane and visualize the relationship between the variables $x$ and $y$. This understanding of the slope-intercept form is crucial for accurately graphing and interpreting linear equations. Analyze how the slope-intercept form, $y = mx + b$, can be used to find the equation of a line in the context of 3.3 Find the Equation of a Line. In the context of 3.3 Find the Equation of a Line, the slope-intercept form, $y = mx + b$, provides a powerful tool for determining the equation of a line. Given the slope $m$ and a point $(x_1, y_1)$ on the line, you can use the slope-intercept form to solve for the $y$-intercept $b$, which, along with the slope $m$, fully defines the equation of the line. Alternatively, if you know two points on the line, you can use the slope-intercept form to calculate the slope $m$ and then solve for the $y$-intercept $b$, again yielding the complete equation of the line. This understanding of the slope-intercept form is essential for finding the equation of a line in various contexts. Related terms Slope: The slope of a line is a measure of its steepness, indicating the rate of change between the $y$-values and $x$-values. It is represented by the variable $m$ in the slope-intercept form. y-Intercept:The $y$-intercept is the point where the line crosses the $y$-axis, represented by the variable $b$ in the slope-intercept form. It indicates the starting value of the line on the $y$-axis. Linear Equation: A linear equation is an equation that represents a straight line in the coordinate plane, where the variables $x$ and $y$ are related by a constant rate of change, or slope. "Slope-Intercept Form" also found in: Subjects (3) Calculus I College Algebra Elementary Algebra Study Content & Tools Study GuidesPractice QuestionsGlossaryScore Calculators Company Get $$ for referralsPricingTestimonialsFAQsEmail us Resources AP ClassesAP Classroom every AP exam is fiveable history 🌎 ap world history🇺🇸 ap us history🇪🇺 ap european history social science ✊🏿 ap african american studies🗳️ ap comparative government🚜 ap human geography💶 ap macroeconomics🤑 ap microeconomics🧠 ap psychology👩🏾‍⚖️ ap us government english & capstone ✍🏽 ap english language📚 ap english literature🔍 ap research💬 ap seminar arts 🎨 ap art & design🖼️ ap art history🎵 ap music theory science 🧬 ap biology🧪 ap chemistry♻️ ap environmental science🎡 ap physics 1🧲 ap physics 2💡 ap physics c: e&m⚙️ ap physics c: mechanics math & computer science 🧮 ap calculus ab♾️ ap calculus bc📊 ap statistics💻 ap computer science a⌨️ ap computer science p world languages 🇨🇳 ap chinese🇫🇷 ap french🇩🇪 ap german🇮🇹 ap italian🇯🇵 ap japanese🏛️ ap latin🇪🇸 ap spanish language💃🏽 ap spanish literature go beyond AP high school exams ✏️ PSAT🎓 Digital SAT🎒 ACT honors classes 🍬 honors algebra II🐇 honors biology👩🏽‍🔬 honors chemistry💲 honors economics⚾️ honors physics📏 honors pre-calculus📊 honors statistics🗳️ honors us government🇺🇸 honors us history🌎 honors world history college classes 👩🏽‍🎤 arts👔 business🎤 communications🏗️ engineering📓 humanities➗ math🧑🏽‍🔬 science💶 social science RefundsTermsPrivacyCCPA © 2025 Fiveable Inc. All rights reserved. AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website. every AP exam is fiveable Study Content & Tools Study GuidesPractice QuestionsGlossaryScore Calculators Company Get $$ for referralsPricingTestimonialsFAQsEmail us Resources AP ClassesAP Classroom history 🌎 ap world history🇺🇸 ap us history🇪🇺 ap european history social science ✊🏿 ap african american studies🗳️ ap comparative government🚜 ap human geography💶 ap macroeconomics🤑 ap microeconomics🧠 ap psychology👩🏾‍⚖️ ap us government english & capstone ✍🏽 ap english language📚 ap english literature🔍 ap research💬 ap seminar arts 🎨 ap art & design🖼️ ap art history🎵 ap music theory science 🧬 ap biology🧪 ap chemistry♻️ ap environmental science🎡 ap physics 1🧲 ap physics 2💡 ap physics c: e&m⚙️ ap physics c: mechanics math & computer science 🧮 ap calculus ab♾️ ap calculus bc📊 ap statistics💻 ap computer science a⌨️ ap computer science p world languages 🇨🇳 ap chinese🇫🇷 ap french🇩🇪 ap german🇮🇹 ap italian🇯🇵 ap japanese🏛️ ap latin🇪🇸 ap spanish language💃🏽 ap spanish literature go beyond AP high school exams ✏️ PSAT🎓 Digital SAT🎒 ACT honors classes 🍬 honors algebra II🐇 honors biology👩🏽‍🔬 honors chemistry💲 honors economics⚾️ honors physics📏 honors pre-calculus📊 honors statistics🗳️ honors us government🇺🇸 honors us history🌎 honors world history college classes 👩🏽‍🎤 arts👔 business🎤 communications🏗️ engineering📓 humanities➗ math🧑🏽‍🔬 science💶 social science RefundsTermsPrivacyCCPA © 2025 Fiveable Inc. All rights reserved. AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website. Study Content & Tools Study GuidesPractice QuestionsGlossaryScore Calculators Company Get $$ for referralsPricingTestimonialsFAQsEmail us Resources AP ClassesAP Classroom every AP exam is fiveable history 🌎 ap world history🇺🇸 ap us history🇪🇺 ap european history social science ✊🏿 ap african american studies🗳️ ap comparative government🚜 ap human geography💶 ap macroeconomics🤑 ap microeconomics🧠 ap psychology👩🏾‍⚖️ ap us government english & capstone ✍🏽 ap english language📚 ap english literature🔍 ap research💬 ap seminar arts 🎨 ap art & design🖼️ ap art history🎵 ap music theory science 🧬 ap biology🧪 ap chemistry♻️ ap environmental science🎡 ap physics 1🧲 ap physics 2💡 ap physics c: e&m⚙️ ap physics c: mechanics math & computer science 🧮 ap calculus ab♾️ ap calculus bc📊 ap statistics💻 ap computer science a⌨️ ap computer science p world languages 🇨🇳 ap chinese🇫🇷 ap french🇩🇪 ap german🇮🇹 ap italian🇯🇵 ap japanese🏛️ ap latin🇪🇸 ap spanish language💃🏽 ap spanish literature go beyond AP high school exams ✏️ PSAT🎓 Digital SAT🎒 ACT honors classes 🍬 honors algebra II🐇 honors biology👩🏽‍🔬 honors chemistry💲 honors economics⚾️ honors physics📏 honors pre-calculus📊 honors statistics🗳️ honors us government🇺🇸 honors us history🌎 honors world history college classes 👩🏽‍🎤 arts👔 business🎤 communications🏗️ engineering📓 humanities➗ math🧑🏽‍🔬 science💶 social science RefundsTermsPrivacyCCPA © 2025 Fiveable Inc. All rights reserved. AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website. every AP exam is fiveable Study Content & Tools Study GuidesPractice QuestionsGlossaryScore Calculators Company Get $$ for referralsPricingTestimonialsFAQsEmail us Resources AP ClassesAP Classroom history 🌎 ap world history🇺🇸 ap us history🇪🇺 ap european history social science ✊🏿 ap african american studies🗳️ ap comparative government🚜 ap human geography💶 ap macroeconomics🤑 ap microeconomics🧠 ap psychology👩🏾‍⚖️ ap us government english & capstone ✍🏽 ap english language📚 ap english literature🔍 ap research💬 ap seminar arts 🎨 ap art & design🖼️ ap art history🎵 ap music theory science 🧬 ap biology🧪 ap chemistry♻️ ap environmental science🎡 ap physics 1🧲 ap physics 2💡 ap physics c: e&m⚙️ ap physics c: mechanics math & computer science 🧮 ap calculus ab♾️ ap calculus bc📊 ap statistics💻 ap computer science a⌨️ ap computer science p world languages 🇨🇳 ap chinese🇫🇷 ap french🇩🇪 ap german🇮🇹 ap italian🇯🇵 ap japanese🏛️ ap latin🇪🇸 ap spanish language💃🏽 ap spanish literature go beyond AP high school exams ✏️ PSAT🎓 Digital SAT🎒 ACT honors classes 🍬 honors algebra II🐇 honors biology👩🏽‍🔬 honors chemistry💲 honors economics⚾️ honors physics📏 honors pre-calculus📊 honors statistics🗳️ honors us government🇺🇸 honors us history🌎 honors world history college classes 👩🏽‍🎤 arts👔 business🎤 communications🏗️ engineering📓 humanities➗ math🧑🏽‍🔬 science💶 social science RefundsTermsPrivacyCCPA © 2025 Fiveable Inc. All rights reserved. AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website. 0
4116
https://electronics.stackexchange.com/questions/408205/confusion-with-output-impedance-using-h-parameters
Stack Exchange Network Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. current community your communities more stack exchange communities Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams Teams Q&A for work Connect and share knowledge within a single location that is structured and easy to search. Confusion with output impedance using h parameters Regarding the below liner circuit model, as far as I understand to find the output impedance the input current Ib is set to zero and the output resistance is calculated as Vc/Ic. I think this way of modeling and calculating the output resistance comes from the Thevenin model. So the definition output impedance will be Vc/Ic when input port is open circuit (?). So if I set Ib to zero, hfr Ib becomes zero and the only thing left is hoe where Ic = Vc hoe so can we say that the output impedance is 1/hoe ? I'm not sure above is correct but in some texts they say the output impedance is infinity theoretically? How can that be estimated? If wrong how is the output impedance is derived following the circuit above? What is meant by the following? I had to take photo to add the original text: 1 Answer 1 can we say that the output impedance is 1/hoe ? The output admittance is simply \$h_{OE}\$. That's what \$h_{OE}\$ is by definition. So yes output impedance is the reciprocal. Your Answer Thanks for contributing an answer to Electrical Engineering Stack Exchange! But avoid … Use MathJax to format equations. MathJax reference. To learn more, see our tips on writing great answers. Sign up or log in Post as a guest Required, but never shown Post as a guest Required, but never shown By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy. Start asking to get answers Find the answer to your question by asking. Explore related questions See similar questions with these tags. Related Hot Network Questions Subscribe to RSS To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Electrical Engineering Company Stack Exchange Network Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA . rev 2025.9.26.34547
4117
https://www.khanacademy.org/math/precalculus/x9e81a4f98389efdf:trig/x9e81a4f98389efdf:sinus-eq/e/solve-basic-sinusoidal-equations
Khan Academy Skip to main content If you're seeing this message, it means we're having trouble loading external resources on our website. If you're behind a web filter, please make sure that the domains .kastatic.org and .kasandbox.org are unblocked. Explore Browse By Standards Explore Khanmigo Math: Florida B.E.S.T. Math: Pre-K - 8th grade Math: Get ready courses Math: High school & college Math: Multiple grades Science Math: Illustrative Math-aligned Math: Eureka Math-aligned Test prep Computing Reading & language arts Economics Life skills Social studies Partner courses Khan for educators Select a category to view its courses Search AI for Teachers FreeDonateLog inSign up Search for courses, skills, and videos Use of cookies Cookies are small files placed on your device that collect information when you use Khan Academy. Strictly necessary cookies are used to make our site work and are required. Other types of cookies are used to improve your experience, to analyze how Khan Academy is used, and to market our service. You can allow or disallow these other cookies by checking or unchecking the boxes below. You can learn more in our cookie policy Accept All Cookies Strictly Necessary Only Cookies Settings Privacy Preference Center When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All Manage Consent Preferences Strictly Necessary Cookies Always Active Certain cookies and other technologies are essential in order to enable our Service to provide the features you have requested, such as making it possible for you to access our product and information related to your account. For example, each time you log into our Service, a Strictly Necessary Cookie authenticates that it is you logging in and allows you to use the Service without having to re-enter your password when you visit a new page or new unit during your browsing session. Functional Cookies [x] Functional Cookies These cookies provide you with a more tailored experience and allow you to make certain selections on our Service. For example, these cookies store information such as your preferred language and website preferences. Targeting Cookies [x] Targeting Cookies These cookies are used on a limited basis, only on pages directed to adults (teachers, donors, or parents). We use these cookies to inform our own digital marketing and help us connect with people who are interested in our Service and our mission. We do not use cookies to serve third party ads on our Service. Performance Cookies [x] Performance Cookies These cookies and other technologies allow us to understand how you interact with our Service (e.g., how often you use our Service, where you are accessing the Service from and the content that you’re interacting with). Analytic cookies enable us to support and improve how our Service operates. For example, we use Google Analytics cookies to help us measure traffic and usage trends for the Service, and to understand more about the demographics of our users. We also may use web beacons to gauge the effectiveness of certain communications and the effectiveness of our marketing campaigns via HTML emails. Cookie List Clear [x] checkbox label label Apply Cancel Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Reject All Confirm My Choices
4118
https://www.youtube.com/watch?v=HrD_vpFzrBk
Complement of a Set Math and Stats Help 28700 subscribers 759 likes Description 63726 views Posted: 25 Aug 2020 This video defines the complement of a set. I also show all of the different symbols used by different authors of textbooks. I demonstrate a few examples of finding the complement of a set in a couple of different ways that could show up in a course. If you want to view all of my videos in a nicely organized way, please visit . It is free for anyone to use. Please share with others you know who are struggling with math topics or statistics. 33 comments Transcript: hi for this video what i want to do is talk to you about a complement of a set so the complement of a set contains all the elements that are not in the given set okay um so different textbooks have different notations my current textbook uses this notation so all of the examples that i'm using i'm using that notation just to make it easier for my students but any one of these are acceptable notations for the complement of a set the first one is a to the c power a prime and tilde a but no matter what symbol is used we just read this as not in set a so it's not in a okay you don't always even have to say the set um so whenever you see these symbols you're looking for everything that is not in the given set so if i just looked at set a one three five seven and nine there are a lot of numbers in our real number system that are not in this set so it could be a very large amount of numbers or you can narrow it down to where you're dealing with multiple sets so i have set a as one three five seven and nine b is one four six seven and nine and d is two three four five and six i chose not to use c um as a set name even though you can just because of the symbol that i'm using but it doesn't matter what your sets are called okay so for this first one we are looking for everything that is not in b and in d so remember that this symbol means and so basically what we're looking for here is everything that is in set d that is not also in b so i have the numbers 2 3 4 5 and 6. we can see that 4 and 6 are both in b so those we would want to eliminate so our answer to this the not in b and in d we would just say are the numbers two three and five okay so moving to the next one we're looking for everything that is not in a but it is in b so this time we're going to look at b and i'm going to eliminate anything that i see in a so we know that a has 1 in common i tried to switch colors all right so we're looking at b and we know that one is in there four six seven and nine so the only two numbers that are left that we would not eliminate for this one would just be 4 and 6. so 4 and 6 are the numbers that are in b and not in a okay and then for the last one that we have we have um set d so it's not in set d and it is in a okay so this time we're gonna be looking at my elements in a and we're going to eliminate any elements that we see that are in d because we only want things that are in a but not d okay so i would eliminate the 3 and the 5 the 1 7 and 9 are not in d so i can just say that this is 1 7 [Music] and 9. okay so for this one we're looking for the elements that are in set a and not in d so we eliminated everything that they have in common a lot of times you won't see it like this in a textbook the textbook that i'm currently teaching from does do it this way most of the time you're going to see complement given this way where you're given a universal set and you're given values for two other sets so this is known as the universal set whenever a u is used and that's saying those are the only numbers that can be used for this particular problem so for this one our u is 1 2 3 4 5 6 7 8 9 and 10. and so for our first example we're looking for everything that is not in a so your textbook could have written this as find a prime or it could have said find tilde a same for this one it could have said find b prime or tilde b so all three of these mean the same thing as far as the notation goes so it's just a matter of preference of the author i personally prefer either this one or this one but like i said the book that i'm using right now uses this symbol okay so what we're going to do is we're looking at a so we're looking at all of the values that are in our universal set that are not in a okay so i can eliminate basically all of the even numbers for this one and so the complement of a would end up being 1 3 5 7 and 9. because in our universal set 1 3 5 7 and 9 are contained there but they are not in a okay um so for the last one for b um we're looking for all things that are in our universal set but not in b so we could say that b c or b prime or tilde b whichever one you want to use we can see that 1 and 2 are both there so if it helps you can always go through and cross out okay 1 and 2 are there 3 is not so that's the first thing that i would write down 4 is there so we would cancel that one out 5 is not in b 6 and 7 are both here so we would cancel those out so we would have 8 we would cancel out 9 and we would be left with 10. so these are all of the values that are in our universal set that are not in set b and for the previous one these were all the values that were in the universal set but not in set a as always thanks for watching if you have any questions please let me know if there are additional topics you would like me to cover please let me know that as well
4119
https://flexbooks.ck12.org/cbook/ck-12-middle-school-math-concepts-grade-6/section/3.1/primary/lesson/numbers-with-decimal-place-value-msm6/
Skip to content Math Elementary Math Grade 1 Grade 2 Grade 3 Grade 4 Grade 5 Interactive Math 6 Math 7 Math 8 Algebra I Geometry Algebra II Conventional Math 6 Math 7 Math 8 Algebra I Geometry Algebra II Probability & Statistics Trigonometry Math Analysis Precalculus Calculus What's the difference? Science Grade K to 5 Earth Science Life Science Physical Science Biology Chemistry Physics Advanced Biology FlexLets Math FlexLets Science FlexLets English Writing Spelling Social Studies Economics Geography Government History World History Philosophy Sociology More Astronomy Engineering Health Photography Technology College College Algebra College Precalculus Linear Algebra College Human Biology The Universe Adult Education Basic Education High School Diploma High School Equivalency Career Technical Ed English as 2nd Language Country Bhutan Brasil Chile Georgia India Translations Spanish Korean Deutsch Chinese Greek Polski EXPLORE Flexi A FREE Digital Tutor for Every Student FlexBooks 2.0 Customizable, digital textbooks in a new, interactive platform FlexBooks Customizable, digital textbooks Schools FlexBooks from schools and districts near you Study Guides Quick review with key information for each concept Adaptive Practice Building knowledge at each student’s skill level Simulations Interactive Physics & Chemistry Simulations PLIX Play. Learn. Interact. eXplore. CCSS Math Concepts and FlexBooks aligned to Common Core NGSS Concepts aligned to Next Generation Science Standards Certified Educator Stand out as an educator. Become CK-12 Certified. Webinars Live and archived sessions to learn about CK-12 Other Resources CK-12 Resources Concept Map Testimonials CK-12 Mission Meet the Team CK-12 Helpdesk FlexLets Know the essentials. Pick a Subject Donate Sign Up 3.1 Numbers with Decimal Place Value Written by:Jen Kershaw, M.ed | Kimberly Hopkins Fact-checked by:The CK-12 Editorial Team Last Modified: Sep 01, 2025 Julie goes to the gas station with her father. She notices that the gas pump says 2.076 gallons, but she doesn't know how to say the number. What is the number written in words? In this concept, you will learn about decimals. Decimal and Place Values There are a couple of ways to write a part of a whole. One of the ways is to write it is as a decimal. A decimal is a part of a whole. An example of a decimal is 4.56. Notice that there is a point in the middle of the number. The point is called the decimal point. The decimal point divides the number between wholes and parts. To the right of the decimal point are the parts of the whole and to the left of the decimal point is the whole number. Another example of a decimal is 0.43. This decimal has 0 whole parts and .43 parts of a whole. This decimal has two decimal places. Each digit after the decimal is in a different place. These places are called place values. To express a decimal using place value you need to use a place value chart. Here is a place value chart. | Tens | Ones | | Tenths | Hundredths | Thousandths | Ten Thousandths | --- --- --- | | | . | | | | | Notice that the words after the decimal point each has a 'ths' in it. The 'ths' lets you know that you are working with a part of a whole. You can take the decimal 0.43 and write it in the place value chart. Take the last example and write it in the place value chart. Above each number is a word. That word gives you the value of that digit according to its place in the chart. This number is forty-three hundredths. The three is the last number and is in the hundredths place so that lets you know to read the entire number as hundredths. | Tens | Ones | | Tenths | Hundredths | Thousandths | Ten Thousandths | --- --- --- | | | . | 4 | 3 | | | To better understand what whole the decimal is a part of, you can use a hundreds grid. Notice that the number in the last example was 0.43 or 43 hundredths. The hundredths tells you that this is “out of one hundred.” Here is a picture of a hundreds grid. Now show 43 hundredths of the hundreds grid. To do that, shade 43 squares. Each square is one part of one hundred. If you look at a place value chart, you can see that there are other decimal names besides hundredths. You can also have tenths. An example of tenths is 0.5. Here is a number that is five-tenths. You can create a picture of five-tenths using a grid of ten units. If you want to show 0.5 in this box, shade five boxes of the ten. You can make pictures of tenths, hundredths, thousandths and ten-thousandths. Examples Example 1 Earlier, you were given a problem about Julie and the number of gallons on the gas pump. If there are 2.076 gallons, what is the number of gallons written in words? First, place the number in a place value chart. | Tens | Ones | | Tenths | Hundredths | Thousandths | Ten Thousandths | --- --- --- | | 2 | . | 0 | 7 | 6 | Next, write the name of the place value above the 6. thousandths Then, write the number in words. two and seventy-six thousandths The answer is two and seventy-six thousandths. Example 2 Write the number as a decimal using the grid. First, identify the type of grid. hundreds grid Next, count the shaded squares. 57 Then, write the decimal. 0.57 The answer is 0.57. Example 3 Write the number as a decimal using the grid. Fist, identify the type of grid. hundreds grid Next, count the shaded squares. 12 Then, write the decimal. 0.12 The answer is 0.12. Example 4 Write the number as a decimal using the grid. First, identify the type of grid. hundreds grid Next, count the shaded squares. 25 Then, write the decimal. 0.25 The answer is 0.25. Example 5 Write the number in words and as a decimal using the grid. First, identify the type of grid. hundreds grid Next, count the shaded squares. 80 Then, write the decimal. 0.80 The answer is 0.80. Review Look at each hundreds grid and write a decimal to represent the shaded portion of the grid. Identify the place value of each of the digits in the following decimals. @$\begin{align}.32\end{align}@$ @$\begin{align}.43\end{align}@$ @$\begin{align}.125\end{align}@$ @$\begin{align}.6\end{align}@$ @$\begin{align}.789\end{align}@$ @$\begin{align}.209\end{align}@$ @$\begin{align}.1\end{align}@$ @$\begin{align}.009\end{align}@$ @$\begin{align}.08\end{align}@$ @$\begin{align}.003\end{align}@$ Review (Answers) Click HERE to see the answer key or go to the Table of Contents and click on the Answer Key under the 'Other Versions' option. Resources Student Sign Up Are you a teacher? Having issues? Click here By signing up, I confirm that I have read and agree to the Terms of use and Privacy Policy Already have an account? No Results Found Your search did not match anything in . This lesson has been added to your library.
4120
https://mathquestions.quora.com/If-a-2-b-2-c-2-d-2-ab-cd-how-can-you-prove-that-a-b-c-d
If a^2+b^2/c^2+d^2 = ab/cd, how can you prove that a:b=c:d? - Math Questions - Quora Something went wrong. Wait a moment and try again. Try again Skip to content Skip to search Sign In Math Questions PROBABLY THE MOST ACTIVE MATH COMMUNITY ON THE WEB!! UP/DOWN VOTE GOOD/BAD Qs/As Follow · 379.1K 379.1K If a^2+b^2/c^2+d^2 = ab/cd, how can you prove that a:b=c:d? Submission accepted by Abu Khan · See parent question Answer Request Follow · 9 1 5 Answers Sort Recommended Enrico Gregorio Associate professor in Algebra ·3y If you set a=b x a=b x and c=d y c=d y, you get a 2+b 2 c 2+d 2=b 2(x 2+1)d 2(y 2+1)a 2+b 2 c 2+d 2=b 2(x 2+1)d 2(y 2+1) and a b c d=b 2 x d 2 y a b c d=b 2 x d 2 y Thus your problem becomes to prove that if x 2+1 y 2+1=x y x 2+1 y 2+1=x y then x=y x=y Cross multiply in the given relation to obtain x 2 y+y=x y 2+x x 2 y+y=x y 2+x that can be rewritten as x 2 y−x y 2−x+y=0 x 2 y−x y 2−x+y=0 and so x y(x−y)−(x−y)=0 x y(x−y)−(x−y)=0 hence (x y−1)(x−y)=0(x y−1)(x−y)=0 Thus either x=y x=y or x y=1 x y=1. No, you cannot prove that x=y x=y. 9 3 Lai Johnny M. Phil in Mathematics Major, The Chinese University of Hong Kong (Graduated 1985) ·3y We can’t prove the statement because it is not true! For any a>b>0 a>b>0, then letting a 2+b 2 c 2+d 2=a b c d=k a 2+b 2 c 2+d 2=a b c d=k for some positive k k yields a 2+b 2=k(c 2+d 2)and a b=k c d a 2+b 2+2 a b=k(c 2+d 2)+2 k c d(a+b)2=k(c+d)2 a 2+b 2=k(c 2+d 2)and a b=k c d a 2+b 2+2 a b=k(c 2+d 2)+2 k c d(a+b)2=k(c+d)2 a+b=√k(c+d)(1)(1)a+b=k(c+d) If c<d c<d, then we similarly get a−b=−√k(c−d)(2)(2)a−b=−k(c−d) (1)+(2)(1)−(2)yields(1)+(2)(1)−(2)yields a b=d c≠c d a b=d c≠c d Continue Reading We can’t prove the statement because it is not true! For any a>b>0 a>b>0, then letting a 2+b 2 c 2+d 2=a b c d=k a 2+b 2 c 2+d 2=a b c d=k for some positive k k yields a 2+b 2=k(c 2+d 2)and a b=k c d a 2+b 2+2 a b=k(c 2+d 2)+2 k c d(a+b)2=k(c+d)2 a 2+b 2=k(c 2+d 2)and a b=k c d a 2+b 2+2 a b=k(c 2+d 2)+2 k c d(a+b)2=k(c+d)2 a+b=√k(c+d)(1)(1)a+b=k(c+d) If c<d c<d, then we similarly get a−b=−√k(c−d)(2)(2)a−b=−k(c−d) (1)+(2)(1)−(2)yields(1)+(2)(1)−(2)yields a b=d c≠c d a b=d c≠c d Remark: By the way, if a>b>0 a>b>0 and c>d>0 c>d>0 satisfying the condition, then a b=c d a b=c d 9 1 Kevin Solari 3y Assuming you really mean (a^2+b^2)/(c^2+d^2) = ab/cd then the statement is incorrect. Eg put a=1,b=2,c=2 and d=1. The reason is that c and d are interchangeable so if (a^2+b^2)/(c^2+d^2) = ab/cd then either a:b=c:d or a:b=d:c 9 1 Sankaran Murthy Retired Engineer, Teacher & Small Businessman ·3y Cross multiply the denominators and solve it as a quadratic equation in a. cd a^2 - b (c^2 + d^2) a + cdb^2 = 0 a = (b (c^2 + d^2) +or- sqrt(b^2 (c^4 + d^4 + 2c^2 d^2) - 4c^2 d^2 b^2)) /(2cd) = (b (c^2 + d^2) +or- sqrt(b^2 (c^4 + d^4 - 2c^2 d^2))/(2cd) = (b (c^2 + d^2) +or- b (c^2 - d^2))/(2cd) = b... Milana 11th Grader 2025-2026 ·3y If a≠b≠c≠d, then: a^2cd + b^2cd = c^2ab + d^2ab a^2cd + b^2cd - c^2ab - d^2ab = 0 ac((ad-bc) - bd(ad-bc) = 0 (ad-bc)(ac-bd) = 0 ad - bc = 0 ad = bc a/b = c/d =>a:b = c:d PROVED View 9 other answers on parent question Related questions What is 09035440007+234? If (a × b) = 15812 then what are the values of a and b? What is 0.02099587921? Can you help me solve (2-x) ^ (x²-1) =2? What is 5000x 454 x67 x90? If 5^2(x-1) × 5^x+1=0.04, what is the value of x? Can 41 books be placed on more than one shelf, provided that each shelf has the same number of books? Do you write 0.85 as a fraction? When we look at the equation 2=2, there is a 2 on the left side of the equal sign and a 2 on the right side of the equal sign, so how does the equal sign represent complete equality? Can we guess the correct prime number divisor of 90861 in our head? Does Euclidean Space only work because Gödel's first order completeness? Is Euclidean space an objective feature of the universe, or is it a mental abstraction produced by human perception? If Euclidean space is an abstraction derived from reality, can it ever capture the “completeness” of reality itself? And is this something set theory should have resolved? If Euclidean space is a cognitive encoding of perceptual deltas rather than an ontological substrate, does this imply that orthodox mathematics and physics are structurally flawed in their foundational assumptions? Did Gödel’s incompleteness theorems prove that Descartes’ Euclidean sandbox cannot prove or disprove reality, and that Plato’s assertions about eternal mathematical forms are therefore false? About · Careers · Privacy · Terms · Contact · Languages · Your Ad Choices · Press · © Quora, Inc. 2025
4121
https://www.youtube.com/watch?v=dUb2sT-oa2M
Simplifying Fractions | EasyTeaching EasyTeaching 254000 subscribers 649 likes Description 123608 views Posted: 3 Aug 2021 Reducing fractions to their simplest form makes them easier to work with and helps with communication. 1) Find the greatest common factor (GCF) of both the numerator and the denominator. 2) Divide numerator and denominator by the GCF. Find more resources at 64 comments Transcript: simplifying fractions we should always reduce fractions to their simplest form it makes fractions easier to work with and it also helps us to communicate more clearly let's take this example we can see from this fraction wall that one half is equivalent to 4 8. but what is the process of simplifying 4 8 so we end up with the simplest form one-half first we find the greatest common factor of both the top number and the bottom number the greatest common factor is the largest number that will divide evenly into both numbers 1 2 and 4 are all common factors the largest or greatest common factor is four then we divide both the numerator and the denominator by the greatest common factor 4 divided by 4 1. 8 divided by four two four eight simplified is one-half it's important to remember that we must always divide the numerator and the denominator by the same number whatever we do to the top number we must do to the bottom number and vice versa let's have a go together at simplifying the following two fractions we'll start with this one 12 16. step one find the greatest common factor the factors of 12 are 1 2 3 4 6 and 12. and here are the factors of 16. one two four eight and sixteen 12 and 16 have these factors in common the largest of the common factors is four step two divide the numerator and the denominator by the greatest common factor 12 divided by 4 and 16 divided by 4. 12 divided by 4 is 3. 16 divided by 4 is 4. 12 16 reduced to its simplest form is three quarters now let's simplify the second fraction 25 30 fifths step one find the greatest common factor the factors of 25 are 1 5 and 25. the factors of 35 are 1 5 7 and 35. 25 and 35 have these factors in common five is the largest common factor step two divide the numerator and the denominator by the greatest common factor 25 divided by 5 is 5. 35 divided by 5 is 7. 25 35 reduced to its simplest form is 5 7. if we are having trouble working out the greatest common factor we can choose any common factor divide both the numerator and the denominator by this factor and then repeat the steps until they can be reduced no further this can be particularly helpful when simplifying fractions with large numbers for example let's simplify this fraction I know a common factor of both numbers is 2 because both are even numbers I'll divide the numerator and the denominator by 2. 64 divided by 2 is 32. 112 divided by 2 is 56. we've reduced the original fraction but it's not yet in its simplest form we know this because we can still divide further both can still be divided by two 32 divided by 2 is 16. 56 divided by 2 is 28. we can divide further still we could divide by 2 again but now I can see a larger common factor can you see it [Music] 4. 4 is a factor of both the numerator and the denominator if we divide the numerator by 4 we get 4. and remember whatever we do to the top number we must do to the bottom number 28 divided by 4 is 7. 4 7. we know this fraction is now in its simplest form because there are no more common factors other than one now it's your turn reduce the following fractions to their simplest form pause here while you work let's see how you went the greatest common factor of 24 and 30 is 6. 24 divided by 6 is 4. 30 divided by 6 is 5. four fifths the greatest common factor of 10 and 15 is 5. 10 divided by 5 is 2. 15 divided by 5 is 3. two-thirds the greatest common factor of 28 and 32 is 4. 28 divided by 4 is 7. 32 divided by 4 is 8. 7 8. [Music] easyteaching.net
4122
https://pmc.ncbi.nlm.nih.gov/articles/PMC6182472/
Pediatric Dehydration Assessment at Triage: Prospective Study on Refilling Time - PMC Skip to main content An official website of the United States government Here's how you know Here's how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock ( ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. PMC Search Update PMC Beta search will replace the current PMC search the week of September 7, 2025. Try out PMC Beta search now and give us your feedback. Learn more Search Log in Dashboard Publications Account settings Log out Search… Search NCBI Primary site navigation Search Logged in as: Dashboard Publications Account settings Log in Search PMC Full-Text Archive Search in PMC Journal List User Guide New Try this search in PMC Beta Search View on publisher site Download PDF Add to Collections Cite Permalink PERMALINK Copy As a library, NLM provides access to scientific literature. Inclusion in an NLM database does not imply endorsement of, or agreement with, the contents by NLM or the National Institutes of Health. Learn more: PMC Disclaimer | PMC Copyright Notice Pediatr Gastroenterol Hepatol Nutr . 2018 Oct 10;21(4):278–288. doi: 10.5223/pghn.2018.21.4.278 Search in PMC Search in PubMed View in NLM Catalog Add to search Pediatric Dehydration Assessment at Triage: Prospective Study on Refilling Time Samuele Caruggi Samuele Caruggi Pediatric Department, Ospedale “F. Del Ponte”, University of Insubria, Varese, Italy. Find articles by Samuele Caruggi ,✉, Martina Rossi Martina Rossi Pediatric Department, Ospedale “F. Del Ponte”, University of Insubria, Varese, Italy. Find articles by Martina Rossi , Costantino De Giacomo Costantino De Giacomo Paediatrics Division, ASST Grande Ospedale Metropolitano Niguarda, Milan, Italy. Find articles by Costantino De Giacomo , Chiara Luini Chiara Luini Pediatric Department, Ospedale “F. Del Ponte”, University of Insubria, Varese, Italy. Find articles by Chiara Luini , Nicola Ruggiero Nicola Ruggiero Pediatric Department, Ospedale “F. Del Ponte”, University of Insubria, Varese, Italy. Find articles by Nicola Ruggiero , Alessandro Salvatoni Alessandro Salvatoni Pediatric Department, Ospedale “F. Del Ponte”, University of Insubria, Varese, Italy. Find articles by Alessandro Salvatoni , Silvia Salvatore Silvia Salvatore Pediatric Department, Ospedale “F. Del Ponte”, University of Insubria, Varese, Italy. Find articles by Silvia Salvatore Author information Article notes Copyright and License information Pediatric Department, Ospedale “F. Del Ponte”, University of Insubria, Varese, Italy. Paediatrics Division, ASST Grande Ospedale Metropolitano Niguarda, Milan, Italy. ✉ Corresponding author: Samuele Caruggi, Pediatric Department, Ospedale “F. Del Ponte”, University of Insubria, Via F. Del Ponte 19, 21100 Varese, Italy. Tel: +39-0332299390, Fax: +39-3460451714, s.caruggi@gmail.com ✉ Corresponding author. Received 2017 Dec 18; Revised 2018 Apr 20; Accepted 2018 Apr 23; Issue date 2018 Oct. Copyright © 2018 by The Korean Society of Pediatric Gastroenterology, Hepatology and Nutrition This is an open-access article distributed under the terms of the Creative Commons Attribution Non-Commercial License ( which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. PMC Copyright notice PMCID: PMC6182472 PMID: 30345241 Abstract Purpose Dehydration is a paediatric medical emergency but there is no single standard parameter to evaluate it at the emergency department. Our aim was to evaluate the reliability and validity of capillary refilling time as a triage parameter to assess dehydration in children. Methods This was a prospective pilot cohort study of children who presented to two paediatric emergency departments in Italy, with symptoms of dehydration. Reliability was assessed by comparing the triage nurse's measurements with those obtained by the physician. Validity was demonstrated by using 6 parameters suggestive of dehydration. Comparison between refilling time (RT) and a validated Clinical Dehydration Score (CDS) was also considered. The scale's discriminative ability was evaluated for the outcome of starting intravenous rehydration therapy by using a receiver operating characteristic (ROC) curve. Results Participants were 242 children. All nurses found easy to elicit the RT after being trained. Interobserver reliability was fair, with a Cohen's kappa of 0.56 (95% confidence interval [CI], 0.41 to 0.70). There was a significant correlation between RT and weight loss percentage (r-squared=−0.27; 95% CI, −0.47 to −0.04). The scale's discriminative ability yielded an area under the ROC curve (AUC) of 0.65 (95% CI, 0.57 to 0.73). We found a similarity between RT AUC and CDS-scale AUC matching the two ROC curves. Conclusion The study showed that RT represents a fast and handy tool to recognize dehydrated children who need a prompt rehydration and may be introduced in the triage line-up. Keywords: Dehydration, Triage, Child, Gastroenteritis, Diarrhea, Vomiting INTRODUCTION Dehydration is a significant depletion of body electrolytes and water, often secondary to acute gastroenteritis , or to other diseases that cause vomiting, diarrhea or polyuria . In the United States, acute diarrhea is responsible for around 1.5 million outpatient visits, 200,000 hospitalizations and 300 deaths annually . In Europe, according to an Italian study, it is estimated that rotavirus produces 3.6 million episodes of gastroenteritis [4,5]. Dehydration is a medical emergency, but there is no single standard parameter to evaluate it during the triage [6,7,8,9] and there are no systematic reviews regarding the usefulness of history, objective examination, and laboratory tests to assess dehydration . Weight loss recognized as an objective “gold standard” for dehydration rate often cannot be calculated because recent or “baseline” hydrated weights are rarely available on acute-care visits . Thus, several other related symptoms and signs should be considered including: urine output, sunken eyes, lack of tears, dry mucous membranes, heart rate (RR), respiratory rate (RR) and effort, capillary refilling time (RT), and skin turgor . The European Society of Paediatric Gastroenterology Hepatology and Nutrition (ESPGHAN) guideline suggests different score systems to quantify dehydration, based on clinical signs and symptoms considered together (for example, RT, skin turgor, and urine output), called “dehydration scales” . The American Academy of Paediatrics (AAP) guidelines recommend making clinical decisions based on the degree of dehydration: mild (3–5%), moderate (6–9%), or severe (>10%) . In 2008, the Working Group of ESPGHAN highlighted that none of the dehydration scales available at that time had a valid utility in individual patients and started a series of studies to validate the system introduced by Friedman et al. , the Clinical Dehydration Score (CDS). This scale consists in four clinical elements: general and eyes appearance, hydration of mucous and tears. Each item is rated from 0 to 2, and the total score is between 0 and 8. The three final categories are: no degree of dehydration (CDS score, 0), mild dehydration (CDS score, 1–4), and moderate/severe dehydration (CDS score, 5–8). In the last 15 years, the CDS has been validated by different studies [16,17,18,19]. In 2014, the Working Group of ESPGHAN published an update of the guidelines, which substantially confirm the results and conclusions obtained in 2008: the CDS scale had moderate interobserver reliability but should be used in combination with other criteria to guide the physician intervention . The RT is a simple and quick parameter to be obtained; the examiner presses fingernail for 5 seconds, and estimates the time needed to return at normal color after releasing the finger pressure . The value for the non-dehydrated children is less than 2 seconds, whilst severity of dehydration increases with prolonged time up to 4 seconds which corresponds to severe shock . Usefulness and validity of the RT in the assessment and severity of dehydration were attested in a systematic review included in the National Institute for Health and Care Excellence (NICE) guidelines of 2009 . The aim of this study was to assess the reliability and validity of the RT in children who presented to the emergency department (ED) with symptoms suggestive of dehydration, such as diarrhea and vomiting. The second aim of the study was to demonstrate the feasibility of RT as a triage parameter. MATERIALS AND METHODS Setting and participants This was a prospective comparative cohort pilot study. We collected data on children with symptoms at risk of dehydration, who presented to two Italian pediatric ED in Varese (between August 2015 and March 2017) and in Milano (between December 2016 and March 2017) whenever the physicians in charge of the study were on call. Informed consent was obtained from the guardians of all participants. The study was approved by the Institutional Review Board of Ospedale F. Del Ponte (No. 2015-0807). Eligibility criteria included the presence of: acute diarrhea (at least three stools in liquid or semi-liquid consistency in the previous 24 hours) and/or vomiting (at least 3 episodes in the previous 24 hours). As exclusion criteria were considered: new born babies (correct age, <1 month), children on tube feeding, or with metabolic, or kidney or type 1 diabetes or mental retardation or severe neurological diseases, incomplete data collection form, poor Italian language comprehension and absence of informed consent. Procedures The study included two sequential parts, performed first by the nurse triage, and later by the attending clinician in the examining room. Eight nurses and four doctors participated in the study. We have included all nurses who were currently working in our accident and emergency (A&E) department as a fixed job and all doctors who were also working in the pediatric gastroenterology outpatient clinic. The decision to limit the number of health care professionals was based on personal willingness to participate to this pilot study and on frequent work overloading in A&E. Besides, we tried to have participants with both high motivation and similar experience to get better results. Each nurse working in our ED was instructed about the study protocol and the correct way to elicit the RT prior to the study with a training session. The nurses training on RT and dehydration assessment was based on a short frontal lecture on acute diarrhea and dehydration and explanation of the study performed by an expert physician (S.S.) followed by an interactive theorical and practical session during which doubts were clarified. The method of detecting the RT was first showed using slides, explained as reported in the literature and then practically performed and checked. Particularly it was highlighted that to obtain a correct measured the pressure should gradually be greater on the palmar surface of the distal fingertip, which must be released immediately after the capillary bed becomes pale, after which the elapsed time must be measured until the restoration of the normal color. A time less than 2 seconds means no dehydration; the longer the RT, the greater the dehydration. We then carried out practical tests on children admitted to A&E in the same day to make sure everyone has understood the method. All nurses found the explanation clear and the test simple to perform and the physicians were fully satisfied of the ability acquired by the nurses. We decided to repeat the training at the end of the first part of the study, to assess the nurses' performance and the re-evaluation was again excellent (Fig. 1). Fig. 1. How to assess capillary refilling time at the triage. Open in a new tab To all nurses the CDS scale appeared more subjective, difficult to score and time consuming than RT, so this scale was included only in the physician assessment. For data collection we used a standardized evaluation form which included items shown in Fig. 2. Fig. 2. Data collection form. Open in a new tab At triage the nurses enrolled all children reporting symptoms of acute diarrhea or vomiting and filled in the first part of the form recording the RT. According to the triage code determining the time priority, the doctor reassessed the child performed a detailed history and physical examination, assigned a CDS score and RT, completed the form and started treatment. Whenever the nurse noticed a state of dehydration based on an alteration of the capillary RT, the physician was informed about the general condition of the child and the nurse assessment and authorized the administration of oral rehydration therapy (ORS) even before the visit, unless a suspicion of severe infection, lethargy or acute abdomen was raised. The partial results we obtained allowed us to create a new form (Fig. 3), which replaced the old one starting from July 2016. In this new form, we added the weight gain after rehydration, measured by a physician after the ORS rehydration therapy, to use it as an indicative weight of a state of good hydration and compare it with the weight measured at triage. At the beginning we not consider the patients' waiting time between nurse's and physician's RT assessment, so in the new form we introduce this measure and the quantity of ORS assumed by the dehydrated child. Fig. 3. New data collection form. Open in a new tab Patient assessment and data collection The data collected by the triage nurse included basic demographics, presenting symptoms (diarrhea, vomiting), general appearance and state of consciousness (unconscious, lethargic, normal, irritable), RT at the arrival in ED and the providing of ORS (after triage rating). The physician completed the assessment and filled in the second part of the same standardized form, recording the general appearance and state of consciousness; HR and RR, temperature, current weight and the previous weight (if available); symptoms (presence and type of diarrhea or vomiting, timing of onset, number of episodes in the previous 24 hours); RT, skin turgor, urine output reported at home, intake of ORS or other drink at home and CDS scale. RR was measured for 60 seconds by observing chest wall movements with the child quiet and comfortable . We have defined tachycardia and tachypnea when HR and RR were above the 90th centiles, according to different age, as reported by a systematic review by Fleming et al. in 2011 . Capillary RT was assessed at the fingertip by using a standardized technique . Skin turgor was assessed by pinching a small skin fold between the thumb and index finger on the lateral abdominal wall at the level of the umbilicus . Type of rehydration needed and the pop up of episodes of vomiting during oral rehydration were also reported. Finally, we considered the patient evolution in terms of discharge timing or hospitalization. In the new form we considered weight gain after rehydration to overcome the lack of an available previous weight in most of cases. Outcomes The primary outcome of our project was reliability of RT; to demonstrate the equivalence between triage nurse and clinician assessments of the RT, by comparing results of the tests and finding out if they match for every child or if they were different. Our final purpose is to introduce this parameter in the triage line up for quantification of dehydration and assignment of the priority code. The secondary outcome was to demonstrate the validity of RT for the rapid quantification of presence and degree of dehydration. We compared RT with parameters thought to be reflective of dehydration presence and severity; the CDS scale, the number of episodes of vomiting and diarrhea before presentation to the ED, RR, HR, length of hospital staying, percentage of weight loss . Discriminative validity was assessed by the need of intravenous rehydration therapy. Analysis Characteristics of the study sample were described with frequency counts and percentages for categorical variables. The triage nurse evaluation of general aspect and RT were compared with the valuation of attending physician by using chi-squre test of Pearson's and Cohen's kappa to demonstrate interobserver reliability. A p-value less than 0.05 was considered statistically significant. Results were interpreted according to the criteria of Landis and Koch , in which κ values of 0.21 to 0.40, 0.41 to 0.60, 0.61 to 0.80, and 0.80 signify fair, moderate, substantial, and almost perfect agreement, respectively. In estimating validity, correlations were quantified by using Pearson correlation coefficient (Pearson's ρ). We sought statistical associations between variables indicative of dehydration (weight loss, cardiac and respiratory frequency, the number of episodes of diarrhea, vomiting, combination of diarrhea and vomiting, and the discharge time) and the RT; we repeated the analysis also for the score obtained on the CDS scale. Finally, discriminative validity was assessed as the area under the receiver operating characteristic (ROC) curve. We calculated the area under the curve (AUC), to estimate the specificity and sensitivity of RT and CDS, using as discriminating positive for the state of dehydration the start of intravenous therapy, then measuring the difference between the two AUC. Sensitivity, specificity, positive likelihood ratio, positive predictive value, and negative predictive value were quantified by using the start of intravenous therapy as parameter reflective of dehydration severity. RESULTS We included 242 children aged 9 months to 17 years. In our population 133 (55.0%) children aged between 0 and 3 years, 92 (38.0%) children aged between 4 and 12 years and only 17 (7.0%) adolescents were between 13 and 17 years old. The presenting symptom was: diarrhea in 39 (16.1% of the population), vomiting in 112 (46.3%), association of vomiting and diarrhea in 89 (36.8%) children, whilst only one case (0.4%) complete refuse to feed and to drink was reported. Only 57 (23.6%) patients had a documented previous weight assessed by a physician or, in the new form, a weight after the rehydration therapy (which was found in 24 children [9.9% of the total]). Among this group, 41 (71.9%) showed a <5% weight loss (respect to the previous evaluation) and 7 (12.3%) a weight loss between 5% and 10% of the usual weight. The others 9 children (15.8%) showed an increased weight: only one pointed out signs of dehydration (RT=2, CDS=1) (Table 1). Table 1. Weight and CDS Scale Evaluation. Open in a new tab CDS: Clinical Dehydration Score. The new form allowed us to analyse patients' waiting time between nurse's and physician's RT assessment in 70 children: the average expectation between patients with altered RT at the triage was 24 minutes, with a median of 20 minutes, compared to an average of 41 minutes and a median of 30 minutes in children with a normal RT. A post-rehydration weight was collected in 24 children: 41.7% showed a <1% weight gain; 33.3% a weight gain between 1% and 2%; 20.8% between 2% and 3%; only 4.2% a >3% weight gain. The CDS at the visit was found equal to 0 in 151 (62.4%) cases and between 1 and 4 in 83 (34.3%) children. There were no cases with CDS above 4, as we can see in Table 1. The physician reported that the lack of crying limit the validity of assessment for the presence of tears in 27 cases (11.2%) and because of this uncertain parameter the score was not completed in 8 children (3.3%). RT reliability The RT evaluated by the triage nurse was <2 seconds in 196/242 children (81.0%) and ≥2 seconds in 46 cases (19.0%). The attending physician found the RT <2 seconds in 208/242 children (86.0%) and, ≥2 seconds in just 34 (14.0%) cases (Table 2). Table 2. Refilling Time Elicited at Triage and at Visit. Open in a new tab We compared the RT test results obtained by nurses and physicians. The evaluation was concordant in 207 cases (85.5%), discordant in 35 cases (14.5%): among these, in 26 children (74.3%, or 10.7% of the total) the triage nurse overestimated the dehydration compared to the physician's one. In 9 of these 26 children, the nurse gave the ORS to the children after the triage, so the rehydration therapy was started before the visit; this can explain the relative overrating of dehydration in these children. The correlation between the measurements obtained by the nurse with the physician's evaluations was rated as moderate in accordance with the valuation guidelines Cohen's kappa (κ=0.480; 95% confidence interval [CI], 0.073 to 0.534). After that we ruled out the children whom a nurse gave ORS before the physician's visit and we calculated the Cohen's kappa with the new data: the result was similar, with a moderate Cohen's kappa value (κ=0.556; 95% CI, 0.411 to 0.701). Pearson's chi-square test showed a moderate contingency between the measurements (contingency coefficient, 0.42). RT validity Results of correlation between RT, CDS scale scores and variables are shown in Table 3. Table 3. Statistical Analysis of the Correlation Coefficient of the Main Variables. Open in a new tab The highest degree of correlation was found between RT and weight loss of percentage calculated using a previous weight reported by the parents, when available (ρ=−0.27; 95% CI, −0.47 to −0.04; p=0.019); it confirmed the statistical significance of the parameter. The correlation between length of stay and RT was lower but still significant (ρ=0.22; 95% CI, 0.09 to 0.35; p<0.01). The number of diarrhea associated with vomiting episodes in 24 hours was correlated with the increase in RT (ρ=0.33; 95% CI, 0.12 to 0.51; p<0.01). The correlation between CDS scale scores and the different parameters was similar: we found the maximum degree of correlation between CDS and percentage of weight loss (ρ=−0.37; 95% CI, −0.55 to −0.15; p<0.01), with statistical significance. A significant correlation was found between CDS and length of stay (ρ=0.15; 95% CI, 0.01 to 0.28; p=0.03) and between CDS and the number of episodes of diarrhea associated with vomiting during the previous 24 hours (ρ=0.37, 95% CI, 0.16 to 0.54; p<0.01). For the outcome of intravenous rehydration therapy, the AUC was 0.65 for the CDS (95% CI, 0.57 to 0.73; p<0.01). Sensitivity and specificity were found to be respectively 51.2% and 72.5%. AUC for the RT score was 0.65 (95% CI, 0.57 to 0.72; p<0.01). The sensitivity and specificity were evaluated as 33.0% and 97.6%, respectively (Fig. 4). Fig. 4. Receiver operating characteristic curve results of refilling time (A) and Clinical Dehydration Score (B). Open in a new tab DISCUSSION Proper assessment of dehydration is the critical step for a correct management and prompt rehydration treatment of children with acute diarrhea and vomiting. However, no specific parameter of dehydration is currently included in the triage line-up. In our study, we evaluated the reliability of the RT performed by the triage nurses and compared the signs of dehydration, RT and CDS scale in a population of children who presented to our ED. Our results confirmed that acute vomiting and diarrhea is a common cause of referring to ED and in most cases rehydration therapy with ORS is the only treatment needed and can be started immediately, even before the during the time the patient is waiting before the visit, as recommended by several authors [4,8,13] and international guidelines [11,13]. According to our results, the evaluation of RT in triage allowed nurses to give priority to patients who present dehydration and so to reduce the waiting time. Our goal was twofold; first, to demonstrate the equivalence between RT measurement by triage nurse and attending physician and, then, to prove the reliability, validity and easiness of the RT in the evaluation of children at risk of dehydration because of diarrhea and vomit. The Pearson's chi-square test evaluated the contingency between the two measurements (nurse and physician) as moderate, according to current statistical guidelines (ρ=0.42). The Cohen's kappa, however, defined a moderate correlation (κ=0.56): the result could have been higher, but due to there an imbalance in the appearance frequency of the system variables, with an excess of non-dehydrated children, the “kappa paradox” phenomenon occurred [25,26]. In most cases the triage nurse correctly assessed the hydration status of the children and ensured a prompt introduction of ORS and a speedy handling of the dehydrated patient who needs an earlier physician assessment. In 14.5% of our children we found a discrepancy in the evaluation of dehydration between nurses and physicians, mainly related to an overestimation by the nurse of the degree of dehydration (74.3%) compared to an underestimation (25.7%) of these cases. This discrepancy can be due to some limits of our study; the lack of data regarding the elapsed time between triage assessment and the physician visit and the number of inter-current episodes of vomiting or diarrhea could explain the nurses' underestimation. The children's grade of dehydration could get worse with a long time between triage evaluation and physician's visit. On the other hand, the assumption of ORS during the time spent in the waiting room could change in a better way the state of hydration of the children. The nurse's overestimation allows a good management of the patient; the prompt administration of ORS in case of not clinically detectable dehydration can be configured as a preventive treatment. For the secondary outcome of our study we found that RT moderately correlated with other two parameters previously reported in the literature as indicative of dehydration, such as weight loss (ρ=−0.27) and the length of staying in ED, assumed as a direct indicator of the time required to complete rehydration of the patient (ρ=0.22) and showed a similar correlation compared to the CDS scale. The ROC curve pointed out that there's no differences between the two AUC; it means that the two methods are comparable to assess dehydration in children. Current guidelines on gastroenteritis in children [11,13], consider the CDS scale as the best method to assess the presence and the severity of dehydration; the results obtained with the ROC curve in our population equate RT to CDS scale and demonstrate its validity and reliability. RT has more specificity (97.6%) than CDS (72.5%) for the outcome of intravenous rehydration therapy need: children with a RT <2 seconds are certainly not dehydrated and a RT >2 seconds is indicative of rehydration therapy need. It is noteworthy that weight loss estimation, considered as the ideal parameter to assess dehydration, is not frequently available in children and may limit the validity of our analysis. Finally, all nurses of our ED learned to use RT in a few minutes, appreciated to have an easy, quick and reliable parameter for the dehydration assessment of the children at triage and reported that the CDS scale appeared more subjective than RT, difficult to score and time consuming. The limits of our study consisted mainly by the small number of children referring to our A&E department with moderate or severe dehydration and by the lack of a recent weight data in most of our children. In accordance with the literature [11,13], the utility of dehydration estimation by the triage nurses was limited by the low proportion of children with RT >2 seconds. The low sensitivity shown by the RT and CDS could therefore be attributable to the large number of children who were not or slightly dehydrated (RT <2), who did not need this therapy. Another limitation to our study was the impossibility to calculate the weight loss due to unavailable recent weight in many of our children. To minimize this effect, we introduced in the final form and analysis the post rehydration weight as a surrogate of the weight loss and we have considered the difference in weight as a mirror of the rehydration rate. We also analyzed, whenever reported, the need of intravenous rehydration that could be considered as an indirect indicator of dehydration. In our population the low sensitivity shown by the RT and CDS compared to this treatment could be due to the low sample size that was on intravenous treatment. Besides, the rate of intravenous rehydration could also be related to other factors not dependent on hydration state such as persistent vomit, parental or patient non-compliance with oral rehydration solution, suspicious of acute abdomen, electrolyte imbalance. To improve the quality of the study we added other evaluation parameters to the study's form; the length of waiting time, the number of vomits or diarrhea episodes during that period and the quantity of ORS solution taken by children before visit. We reached some results about the evaluation of the length of the waiting time, but for the other aspects the results were accurate, but partial and so we decided not to include them in this study to not distort the structure of the original study. Our intention is to propose it as multicentric using the new form, to evaluate the replicability especially of the RT in different hospitals and triage and to increase the number of children with dehydration and allow a more accurate statistical analysis. Our study showed that the RT is a quick and easily measurable parameter that can be introduced during the triage assessment and represents a reliable and valid method for the valuation of dehydration in children. Although most children referring to the ED are not dehydrated, the nurse fast recognition of dehydration can allow a prompt start of ORS rehydration and determine a different priority access to physician assessment compared to the symptom reported by parents or the general appearance in patients with acute vomiting or diarrhea. References 1.Pringle K, Shah SP, Umulisa I, Mark Munyaneza RB, Dushimiyimana JM, Stegmann K, et al. Comparing the accuracy of the three popular clinical dehydration scales in children with diarrhea. Int J Emerg Med. 2011;4:58. doi: 10.1186/1865-1380-4-58. [DOI] [PMC free article] [PubMed] [Google Scholar] 2.Tam RK, Wong H, Plint A, Lepage N, Filler G. Comparison of clinical and biochemical markers of dehydration with the clinical dehydration scale in children: a case comparison trial. BMC Pediatr. 2014;14:149. doi: 10.1186/1471-2431-14-149. [DOI] [PMC free article] [PubMed] [Google Scholar] 3.World Bank. Levels and trends in child mortality: estimates developed by the UN Inter-agency Group for Child Mortality Estimation (IGME) - report 2015. Washington, D.C.: World Bank Group; 2015. Sep, p. 36. Report No.: 99335. [Google Scholar] 4.Donà D, Mozzo E, Scamarcia A, Picelli G, Villa M, Cantarutti L, et al. Community-acquired rotavirus gastroenteritis compared with adenovirus and norovirus gastroenteritis in Italian children: a pedianet study. Int J Pediatr. 2016;2016:5236243. doi: 10.1155/2016/5236243. [DOI] [PMC free article] [PubMed] [Google Scholar] 5.Lo Vecchio A, Liguoro I, Dias JA, Berkley JA, Boey C, Cohen MB, et al. Rotavirus immunization: global coverage and local barriers for implementation. Vaccine. 2017;35:1637–1644. doi: 10.1016/j.vaccine.2017.01.082. [DOI] [PMC free article] [PubMed] [Google Scholar] 6.Commissione Triage Pediatrico della SIMEUP. Manuale formativo di triage pediatrico. Milano: Biomedia; 2015. [Google Scholar] 7.Travers DA, Waller AE, Katznelson J, Agans R. Reliability and validity of the emergency severity index for pediatric triage. Acad Emerg Med. 2009;16:843–849. doi: 10.1111/j.1553-2712.2009.00494.x. [DOI] [PubMed] [Google Scholar] 8.Hendrickson MA, Zaremba J, Wey AR, Gaillard PR, Kharbanda AB. The use of a triage-based protocol for oral rehydration in a pediatric emergency department. Pediatr Emerg Care. 2018;34:227–232. doi: 10.1097/PEC.0000000000001070. [DOI] [PMC free article] [PubMed] [Google Scholar] 9.Zangardi T, Dalt LD. Il triage pediatrico. Padova: Piccin; 2008. p. 269. [Google Scholar] 10.Parkin PC, Macarthur C, Khambalia A, Goldman RD, Friedman JN. Clinical and laboratory assessment of dehydration severity in children with acute gastroenteritis. Clin Pediatr (Phila) 2010;49:235–239. doi: 10.1177/0009922809336670. [DOI] [PubMed] [Google Scholar] 11.National Collaborating Centre for Women's and Children's Health (Great Britain) Diarrhoea and vomiting caused by gastroenteritis: diagnosis, assessment and management in children younger than 5 years. National Institute for Health and Care Excellence: Clinical Guidelines. London: RCOG Press; 2009. [PubMed] [Google Scholar] 12.CaJacob NJ, Cohen MB. Update on diarrhea. Pediatr Rev. 2016;37:313–322. doi: 10.1542/pir.2015-0099. [DOI] [PubMed] [Google Scholar] 13.Guarino A, Ashkenazi S, Gendrel D, Lo Vecchio A, Shamir R, Szajewska H, et al. European Society for Paediatric Gastroenterology, Hepatology, and Nutrition/ European Society for Paediatric Infectious Diseases evidence-based guidelines for the management of acute gastroenteritis in children in Europe: update 2014. J Pediatr Gastroenterol Nutr. 2014;59:132–152. doi: 10.1097/MPG.0000000000000375. [DOI] [PubMed] [Google Scholar] 14.American Academy of Pediatrics, Provisional Committee on Quality Improvement, Subcommittee on Acute Gastroenteritis. Practice parameter: the management of acute gastroenteritis in young children. Pediatrics. 1996;97:424–435. [PubMed] [Google Scholar] 15.Guarino A, Albano F, Ashkenazi S, Gendrel D, Hoekstra JH, Shamir R, et al. European Society for Paediatric Gastroenterology, Hepatology, and Nutrition/European Society for Paediatric Infectious Diseases evidencebased guidelines for the management of acute gastroenteritis in children in Europe: executive summary. J Pediatr Gastroenterol Nutr. 2008;46:619–621. doi: 10.1097/MPG.0b013e31816e219e. [DOI] [PubMed] [Google Scholar] 16.Friedman JN, Goldman RD, Srivastava R, Parkin PC. Development of a clinical dehydration scale for use in children between 1 and 36 months of age. J Pediatr. 2004;145:201–207. doi: 10.1016/j.jpeds.2004.05.035. [DOI] [PubMed] [Google Scholar] 17.Kinlin LM, Freedman SB. Evaluation of a clinical dehydration scale in children requiring intravenous rehydration. Pediatrics. 2012;129:e1211–e1219. doi: 10.1542/peds.2011-2985. [DOI] [PubMed] [Google Scholar] 18.Jauregui J, Nelson D, Choo E, Stearns B, Levine AC, Liebmann O, et al. External validation and comparison of three pediatric clinical dehydration scales. PLoS One. 2014;9:e95739. doi: 10.1371/journal.pone.0095739. [DOI] [PMC free article] [PubMed] [Google Scholar] 19.Goldman RD, Friedman JN, Parkin PC. Validation of the clinical dehydration scale for children with acute gastroenteritis. Pediatrics. 2008;122:545–549. doi: 10.1542/peds.2007-3141. [DOI] [PubMed] [Google Scholar] 20.Henricson J, Toll John R, Anderson CD, Björk Wilhelms D. Diffuse reflectance spectroscopy: getting the capillary refill test under one's thumb. J Vis Exp. 2017;(130):e56737. doi: 10.3791/56737. [DOI] [PMC free article] [PubMed] [Google Scholar] 21.Fleming S, Thompson M, Stevens R, Heneghan C, Plüddemann A, Maconochie I, et al. Normal ranges of heart rate and respiratory rate in children from birth to 18 years of age: a systematic review of observational studies. Lancet. 2011;377:1011–1018. doi: 10.1016/S0140-6736(10)62226-X. [DOI] [PMC free article] [PubMed] [Google Scholar] 22.Hoxha T, Xhelili L, Azemi M, Avdiu M, Ismaili-Jaha V, Efendija-Beqa U, et al. Performance of clinical signs in the diagnosis of dehydration in children with acute gastroenteritis. Med Arch. 2015;69:10–12. doi: 10.5455/medarh.2015.69.10-12. [DOI] [PMC free article] [PubMed] [Google Scholar] 23.Landis JR, Koch GG. The measurement of observer agreement for categorical data. Biometrics. 1977;33:159–174. [PubMed] [Google Scholar] 24.Ross SM. Introduzione alla statistica. 2nd ed. Santarcangelo di Romagna: Maggioli; 20414. p. 687. [Google Scholar] 25.Feinstein AR, Cicchetti DV. High agreement but low kappa: I. The problems of two paradoxes. J Clin Epidemiol. 1990;43:543–549. doi: 10.1016/0895-4356(90)90158-l. [DOI] [PubMed] [Google Scholar] 26.Cicchetti DV, Feinstein AR. High agreement but low kappa: II. Resolving the paradoxes. J Clin Epidemiol. 1990;43:551–558. doi: 10.1016/0895-4356(90)90159-m. [DOI] [PubMed] [Google Scholar] Articles from Pediatric Gastroenterology, Hepatology & Nutrition are provided here courtesy of Korean Society of Pediatric Gastroenterology, Hepatology and Nutrition ACTIONS View on publisher site PDF (987.3 KB) Cite Collections Permalink PERMALINK Copy RESOURCES Similar articles Cited by other articles Links to NCBI Databases On this page Abstract INTRODUCTION MATERIALS AND METHODS RESULTS DISCUSSION References Cite Copy Download .nbib.nbib Format: Add to Collections Create a new collection Add to an existing collection Name your collection Choose a collection Unable to load your collection due to an error Please try again Add Cancel Follow NCBI NCBI on X (formerly known as Twitter)NCBI on FacebookNCBI on LinkedInNCBI on GitHubNCBI RSS feed Connect with NLM NLM on X (formerly known as Twitter)NLM on FacebookNLM on YouTube National Library of Medicine 8600 Rockville Pike Bethesda, MD 20894 Web Policies FOIA HHS Vulnerability Disclosure Help Accessibility Careers NLM NIH HHS USA.gov Back to Top
4123
https://www.combinatorics.org/ojs/index.php/eljc/article/download/v28i1p35/pdf/
Cycle decompositions of complete digraphs A. C. Burgess ∗ Department of Mathematics and Statistics University of New Brunswick Saint John, NB E2L 4L5 Canada P. Danziger † Department of Mathematics Ryerson University Toronto, ON M5B 2K3 Canada M. T. Javed Department of Computer Science Ryerson University Toronto, ON M5B 2K3 Canada Submitted: Oct 3, 2018; Accepted: Oct 21, 2020; Published: Feb 12, 2021 © The authors. Released under the CC BY-ND license (International 4.0). Abstract In this paper, we consider the problem of decomposing the complete directed graph K∗ n into cycles of given lengths. We consider general necessary conditions for a directed cycle decomposition of K∗ n into t cycles of lengths m1, m 2, . . . , m t to exist and provide a powerful construction for creating such decompositions in the case where there is one ‘large’ cycle. Finally, we give a complete solution in the case when there are exactly three cycles of lengths α, β, γ 6 = 2. Somewhat surprisingly, the general necessary conditions turn out not to be sufficient in this case. In particular, when γ = n, α + β > n + 2 and α + β ≡ n (mod 4), K∗ n is not decomposable. Mathematics Subject Classifications: 05C51, 05B30, 05C20, 05C38 1 Introduction Let G be a graph and H = {H1, H 2, . . . , H r} be a collection of subgraphs of G. We say that H decomposes G if the edges of the graphs in H partition the edges of G. In this case, we write G = H1 ⊕ H2 ⊕ · · · ⊕ Hr. If H1 ∼= H2 ∼= · · · ∼= Hr ∼= H, we refer to an ∗ Supported by NSERC Discovery Grant RGPIN-2019-04328. † Supported by NSERC Discovery Grant RGPIN-2016-04178. the electronic journal of combinatorics 28(1) (2021), #P1.35 H-decomposition of G; in this case, we call the decomposition uniform . An oft-studied case is that G is the complete graph Kn and each element of H is a cycle. It is easy to see that if n is even, then there can be no cycle decomposition of Kn. In this case, it is common instead to consider Kn − I the complete graph with the edges of a 1-factor I removed. We will use Cm to denote a cycle of length m.The existence question for cycle decompositions of complete graphs has a history dating to the mid-1800s; among the first landmark results were Kirkman’s 1847 proof that Kn has a C3-decomposition if and only if n ≡ 1 or 3 (mod 6) and Walecki’s construction of Hamilton cycle decompositions of the complete graph . The existence problem for uniform cycle decomposition of Kn and Kn −I was only settled over a century later [2, 9]. Theorem 1 ([2, 9]) . Let n, k > 3 be integers. There exists a Cm-decomposition of Kn if and only if n is odd and k | n(n−1) 2 . There exists a Cm-decomposition of Kn − I if and only if n is even and m | n(n−2) 2 . A more general question is the existence of possibly non-uniform cycle decompositions of Kn or Kn − I. It was conjectured by Alspach in 1981 that the obvious necessary conditions for the existence of such a decomposition were sufficient. Alspach’s conjecture was finally verified in a 2014 paper by Bryant, Horsley and Pettersson . Theorem 2 () . Let n > 3 be an integer, and let Gn denote Kn if n is odd, and Kn − I if n is even. Let H = {Cm1 , C m2 , . . . , C mr }. Then H decomposes Gn if and only if 3 6 mi 6 n for each i = 1 , 2, . . . , r and m1 + m2 + · · · + mr = nbn−12 c. More recently, Bryant, Horsley, Maenhaut and Smith have extended this result, finding necessary and sufficient conditions for the existence of a cycle decomposition of the complete multigraph λK n. Theorem 3 () . Let C = {Cm1 , C m2 , . . . , C mr }. Then C decomposes λK n if and only if the following conditions all hold: 1. λ(n − 1) is even; 2. 2 6 m1, m 2, . . . , m r 6 n;3. m1 + m2 + · · · + mr = λ(n 2 );4. max( m1, m 2, . . . , m r) + r − 2 6 λ 2 (n 2 ) when λ is even; and 5. ∑ mi=2 mi 6 (λ − 1) (n 2 ) when λ is odd. Also, C decomposes λK n − I if and only if the following conditions all hold: 1. λ(n − 1) is odd; 2. 2 6 m1, m 2, . . . , m r 6 n; the electronic journal of combinatorics 28(1) (2021), #P1.35 2 m1 + m2 + · · · + mr = λ(n 2 ) − n 2 ; and 4. ∑ mi=2 mi 6 (λ − 1) (n 2 ). In this paper, we consider an alternative generalization of Alspach’s conjecture, to cycle decompositions of the complete symmetric digraph. For a graph G, we let G∗ denote the digraph formed from G by replacing each edge {x, y } with two arcs xy and yx . In particular, K∗ n denotes the complete symmet-ric digraph on n vertices. We will use −→ P k to denote a directed path on k vertices, and −→ C k a directed cycle of length k. We use [ u1, u 2, . . . , u k] to denote a directed path with arcs u1u2, u 2u3, . . . , u k−1uk and ( u1, u 2, . . . , u k) to denote a directed cycle with arcs u1u2, u 2u3, . . . , u k−1uk together with uku1.The case of uniform cycle decomposition of K∗ n was settled by Alspach, Gavlas, ˇSajna and Verrall . Theorem 4 () . Let n, m > 2 be integers. There is a −→ C m-decomposition of K∗ n if and only if m | n(n − 1) and (n, m ) /∈ { (4 , 4) , (6 , 3) , (6 , 6) }. Let C denote a collection of r directed cycles of lengths m1, m 2, . . . , m r. It is clear that by ignoring the direction on the arcs, any C-decomposition of K∗ n yields a C-decomposition of 2 Kn. Thus, any such decomposition must satisfy the conditions of Theorem 3 with λ = 2, giving the following necessary conditions: Lemma 5. Let C = {−→ C m1 , −→ C m2 , . . . , −→ C mr }. If C decomposes K∗ n , then: 1. 2 6 m1, m 2, . . . , m r 6 n;2. m1 + m2 + · · · + mr = n(n − 1) ; and 3. max( m1, m 2, . . . , m r) + r − 2 6 (n 2 ) In light of Theorem 3, one possible method of constructing directed cycle decomposi-tions of K∗ n would be to orient the edges in a cycle decomposition of 2 Kn. However, it is worth noting that the methods of for 2 Kn do not in general produce decompositions whose cycles can be oriented to give a directed cycle decomposition of K∗ n . In fact, as we shall see in Theorem 24, the necessary conditions stated in Lemma 5 are not also sufficient in all cases. Definition 6. A nondecreasing list M = ( m1, m 2, . . . , m r) of nonnegative integers will be called n-admissible if it satisfies conditions 1–3 of Lemma 5. We refer to a directed cycle decomposition of K∗ n corresponding to the admissible list M as an M -decomposition of K∗ n .Using the notation of and , for a given n-admissible list M , we let νi(M ) denote the number of instances of i in M . It is worth noting that one of the major differences in decomposing K∗ n (or λK n) rather than Kn is the possibility of cycles of length 2. Further, if there are cycles of length 2 in a decomposition of K∗ n , removing them corresponds to the electronic journal of combinatorics 28(1) (2021), #P1.35 3 removing edges from the underlying undirected graph, Kn. Thus directed cycle decom-position of K∗ n can be seen as a directed cycle decomposition of G∗ into cycles of lengths greater than 2, where G is an arbitrary graph of order n. This observation leads to a strategy for decomposing K∗ n . Definition 7. We say that a directed cycle −→ C decouples the arc xy if −→ C contains yx but not xy . If C = {−→ C m1 , −→ C m2 , . . . , −→ C mr } is a collection of pairwise edge-disjoint cycles, we say that an arc xy is decoupled by C if yx is contained in a cycle of C but xy is not. The following is an obvious consequence of Definition 7. Lemma 8. Let C = {−→ C m1 , −→ C m2 , . . . , −→ C mr } be a set of pairwise edge-disjoint directed cycles in K∗ n . There is a −→ C 2-decomposition of K∗ n − C if and only if C leaves no arc decoupled. For convenience of notation, we will henceforth let ν = ν2(M ) denote the number of cycles of length 2 in the list M . In light of Lemma 8, it will sometimes be convenient to list only the cycle lengths which are greater than 2, particularly when a decomposition is to contain many 2-cycles. Therefore, we make the following definition. Definition 9. Let M be an n-admissible list. The associated canonical list is the non-decreasing list ˆM formed from M by removing all instances of 2 from M . Note that the sum of the entries in ˆM is n(n − 1) − 2ν.In this paper, we give further results on cycle decompositions of K∗ n . In Section 2, we give general constructions and show sufficiency of the necessary conditions in certain cases. In Section 3, we determine necessary and sufficient conditions for the existence of an M -decomposition of K∗ n when ν > |M | − 3, summarized in Theorem 24. As we will see, the necessary conditions of Lemma 5 turn out not to be sufficient in general. In particular, in Lemma 23 we exhibit a family of n-admissible lists for which K∗ n admits no M -decomposition. 2 General constructions We begin by noting some easy consequences of conditions 2 and 3 of Lemma 5. Lemma 10. Let M be an n-admissible list with associated canonical list ˆM = ( m1,. . . , m r). Then 1. m1 + · · · + mr−1 ≡ mr (mod 2) 2. m1 + · · · + mr−1 > mr + 2( r − 2) . Hence when r > 3, m1 + · · · + mr−1 > m r.Conversely, given a list ˆM = ( m1, . . . , m r) with 3 6 mi 6 n for each i ∈ { 1, . . . , r } and m1 +· · · +mr 6 n(n−1) , if ˆM satisfies conditions 1 and 2 above, then ˆM is the associated canonical list of some n-admissible list M . the electronic journal of combinatorics 28(1) (2021), #P1.35 4 Note that the case where equality holds in condition 2 corresponds with the case where equality holds in condition 3 of Lemma 5. We now give some constructions of cycle decompositions of K∗ n from known decompo-sitions of complete graphs or complete symmetric digraphs. Theorem 11. Let M = ( m1, m 2, . . . , m r) be an n-admissible list, where νk(M ) is even for each 3 6 k 6 n. If either 1. n is odd and either ν = 0 or ν > 3; or 2. n is even and either ν = n 2 or ν > n 2 3 ,then K∗ n is M -decomposable. Proof. We form a new list M ′ which decomposes Kn. We then form the corresponding directed graph K∗ n , using some of the cycles from Kn to form 2-cycles in K∗ n . We consider two cases according to the parity of n.First, suppose that n is odd. Let s ∈ { 0, 4, 5} be such that ν ≡ s (mod 3). Let M ′ be the nondecreasing list satisfying that, for i ∈ { 3, 4, . . . , n }, νi(M ′) =  12 ν3(M ) + 13 (ν − s), if i = 3 12 νs(M ) + 1 , if i = s 6 = 0 12 νi(M ), otherwise Since m1 + m2 + · · · mr = n(n − 1), it follows that the sum of the entries of M ′ is (n 2 ), and so by Theorem 2, Kn is M ′-decomposable. From such a decomposition, take νi(M)2 cycles of length i for each 3 6 i 6 n, and orient them both ways to obtain νi(M )directed cycles of length i. Each edge in the remaining cycles can be directed both ways to form a directed 2-cycle, giving ν2(M ) in total. It is easy to see that we obtain an M -decomposition of K∗ n .The case where n is even is similar. Again, let s ∈ { 0, 4, 5} such that ν ≡ s + n 2 (mod 3). Let M ′ be the nondecreasing list satisfying that, for i ∈ { 3, 4, . . . , n } νi(M ′) =  12 ν3(M ) + 13 (ν − s − n 2 ), if i = 3 12 νs(M ) + 1 , if i = s 6 = 0 12 νi(M ), otherwise. In this case, we note that Kn − I is M ′-decomposable, and proceed as before, except that the edges of the 1-factor I are also directed both ways to form n 2 directed 2-cycles. Lemma 12. Let M be an n-admissible list and M ′ an n′-admissible list, where n < n ′.If νk(M ) = νk(M ′) for each k > 3 and there exists an M -decomposition of K∗ n , then there exists an M ′-decomposition of K∗ n′ . the electronic journal of combinatorics 28(1) (2021), #P1.35 5 Proof. Decompose K∗ n′ = K∗ n ⊕ K∗ n′−n ⊕ K∗ n,n ′−n . Decomposing K∗ n into directed cycles of lengths given in M , it is easy to see that no arc of K∗ n′ is left decoupled. Since all remaining directed cycles to be formed are of length 2, the result follows by Lemma 8. In the remainder of this section, we will give constructions which give directed cycle decomposition in a wide array of cases. Before proceeding, we note the following result which settles existence in the case that the canonical list has size at most 2. Theorem 13. Let M = ( m1, m 2, . . . , m r). Suppose M has at most two cycle lengths other than 2, i.e. ν > r − 2. There is an M -decomposition of K∗ n if and only if M is n-admissible. Proof. It is easy to see that if ν = r (i.e. M = (2 , 2, . . . , 2)), an M -decomposition of K∗ n exists. Also, note that conditions 2 and 3 of Lemma 5 imply that no n-admissible list has ν = r − 1. Finally, if M is an n-admissible list with ν = r − 2, its canonical list has the form ˆM = ( mr−1, m r). By condition 3 of Lemma 5 and since M is non-decreasing, mr−1+r−2 6 mr + r − 2 6 n(n−1) 2 . But condition 2 implies that 2( r − 2) + mr−1 + mr = n(n − 1), i.e. (mr−1 +r−2)+( mr +r−2) = n(n−1), so it must be that mr−1 +r−2 = mr +r−2 = n(n−1) 2 ,and hence mr−1 = mr. In this case, it is easy to see that an M -decomposition of K∗ n exists. Recall that condition 3 of Lemma 5 states that in an n-admissible list M of size t with maximum entry m, we have that m + t − 2 6 (n 2 ). Written in terms of the canonical list ˆM = ( m1, m 2, . . . , m r), the total number of cycles is t = r + ν, so this condition becomes mr + r + ν − 2 6 (n 2 ). The next result shows that if equality holds, then an M -decomposition does indeed exist. Lemma 14. Let M be an n-admissible list with associated canonical list ˆM = ( m1, m 2,. . . , m r). If mr + r + ν − 2 = (n 2 ) , then K∗ n is M -decomposable. Proof. First, suppose that mr−1 = mr. Since M is n-admissible and contains ν entries equal to 2, counting edges we have that 2ν + m1 + m2 + · · · + mr = 2 ν + m1 + m2 + · · · + mr−2 + 2 mr = n(n − 1) = 2( mr + r + ν − 2) . Rearranging gives m1 + m2 + · · · + mr−2 = 2( r − 2), and since mi > 3 for each i ∈{1, 2, . . . , r − 2}, it follows that r = 2, which was dealt with in Theorem 13. Now suppose mr−1 < m r. Let the vertex set of K∗ n be Zn. We form the cycles of lengths m1, m 2, . . . , m r. An illustration of this construction can be found in Figure 1. the electronic journal of combinatorics 28(1) (2021), #P1.35 6 0 `0 `1 `2 `3 Figure 1: A (2 , . . . , 2, 4, 5, 7, 12)-decomposition of K∗ 12 Let −→ C mr = ( mr − 1, m r − 2, . . . , 2, 1, 0) be the directed cycle of length mr. Define 0 = 1,r−1 = mr − 1, and for i = 1 , 2, . . . , r − 2, let `i = (∑ij=1 mj ) − (2 i − 1). Note that, since n(n − 1) = 2( mr + r + ν − 2) = 2 ν + m1 + m2 + · · · + mr, `r−2 = (m1 + m2 + · · · + mr−2) − (2( r − 2) − 1) = (mr − mr−1 + 2 r − 4) − (2 r − 5) = mr − mr−1 + 1 . Hence, i −i−1 = mi − 2 for each i = 1 , . . . , r − 1. For i = 1 , 2, . . . , r − 1, define the mi-cycle −→ C mi = (0 , i−1, i−1 + 1 , i−1 + 2 , . . . , i). It is easy to verify that −→ C mi has length i −i−1 + 2 = mi.Note that the cycles −→ C m1 , . . . , −→ C mr−1 , −→ C mr leave no decoupled arc, and the result follows by Lemma 8. Theorem 15. Let M be an n-admissible list with associated canonical list ˆM =(m1, m 2, . . . , m r). Let S = ( s0, s 1, . . . , s r−2, s r−1, s r) be a sequence of non-negative in-tegers with s0 = sr−1 = sr = 0 , and let s be the sum of the entries of S. If M is an n-admissible list such that: 1. mr + r + ν − 2 = (n 2 ); and 2. mr + s 6 n,then K∗ n is M ′-decomposable, where ˆM ′ = ( m′ σ(1) , m ′ σ(2) , . . . , m ′ σ(r) ) such that m′ i = mi + si−1 + si for each i ∈ { 1, . . . , r } and σ is a permutation which ensures that ˆM ′ is in nondecreasing order. the electronic journal of combinatorics 28(1) (2021), #P1.35 7 Proof. We proceed in a similar manner to the proof of Lemma 14, except that we add s vertices x1, . . . , x s to the cycles in ˆM , and modify the cycles −→ C mi , 1 6 i 6 r, from that lemma as follows. Let `i and −→ C mr be as defined as in the proof of Lemma 14. For i ∈ { 0, 1, . . . , r }, let s′ i = s0 + s1 + · · · + si. We define directed paths Pi = [0 , x s′ i−1+1 , x s′ i−1+2 , . . . , x s′ i , ` i]. Note that if si = 0, we take Pi = [0 , ` i] of length 1. We also define Qi to be the reversal of Pi, i.e. if si 6 = 0 then Qi = [ `i, x s′ i , x s′ i−1 , . . . , x s′ i−1+1 , 0] , and Qi = [ `i, 0] otherwise. Now, define −→ C m1 as the concatenation of the path [0 , 1, . . . , ` 1]and Q1. For i ∈ { 2, . . . , r − 2}, define −→ C mi as the concatenation of the paths Pi−1,[i−1, i−1 + 1 , . . . , ` i] and Qi. Finally, define −→ C mr−1 as the concatenation of Pr−2 and [r−2, r−2 + 1 , . . . , r−1, 0] (recall thatr−1 = mr − 1). See Figure 2. It is clear that these cycles leave no decoupled arcs, so the result follows by Lemma 8. x3 x2 x4 x1 Figure 2: A (2 , . . . , 2, 5, 9, 10 , 12)-decomposition of K∗ 16 formed using Theorem 15 with ˆM = (4 , 5, 7, 12), S = (0 , 1, 3, 0, 0). Note that although the statements of Lemma 14 and Theorem 15 are written so that the cycle lengths m1, . . . , m r are in non-decreasing order, this is not actually required in the proof, as long as mr > max 16i6r−1{mi}. Theorem 16. Let H be an n-admissible list with associated canonical list ˆH = ( h1, . . . , h r) such that r > 3, hr > 2( r − 1) , h1 + · · · + hr 6 2( n + r − 2) , and, if r is even, r 6 = 4 and h1 6 r. Then K∗ n is H-decomposable. the electronic journal of combinatorics 28(1) (2021), #P1.35 8 Proof. We begin by defining a list K = ( k1, k 2, . . . , k r) by permuting the elements of ˆH with the purpose of ensuring that K satisfies the inequalities (1) and (2) below, while retaining the property that kr > max 16i6r−1{ki}.(1) If r is odd, then k1 + k3 + · · · + kr−2 + kr > k2 + k4 + · · · + kr−1 + ( r + 1). (2) If r is even, then k2 + k4 + · · · + kr−2 + kr > k1 + k3 + · · · + kr−1 + ( r − 2). If r is odd, take kr = hr, and define k1, . . . , k r−1 by (k2, k 4, . . . , k r−1) = ( h1, h 2, . . . , h (r−1) /2)and (k1, k 3, . . . , k r−2) = ( h(r+1) /2, h (r+3) /2, . . . , h r−1). This ensures that the elements of ( k1, . . . , k r) with odd index are greater than or equal to those with even index, i.e. k2i−1 > k2i for i ∈ { 1, . . . , (r − 1) /2}. Since kr > 2( r − 1), it is now easy to see that (1) is satisfied. If r is even, take kr = hr, kr−1 = h4, kr−2 = h3, kr−3 = h2 and k1 = h1, and define k2, . . . , k r−4 so that (k3, k 5, . . . , k r−5) = ( h5, h 6 . . . , h (r+2) /2)and (k2, k 4, . . . , k r−4) = ( h(r+4) /2, h (r+6) /2, . . . , h r−1). Thus, kr = max {k1, . . . , k r}, kr−2 > kr−3, kr−4 > kr−1, and k2i > k2i+1 for i ∈ { 1, . . . , (r − 6) /2}. Since the elements of H are written in nondecreasing order, using the assumptions that kr = hr > 2( r − 1) and k1 = h1 6 r, it is now easy to check that (2) is satisfied. We now define lists ( m1, . . . , m r) and ( s0, . . . , s r) of integers with mr > max 16i6r−1 {mi} satisfying the conditions of Theorem 15, such that for each i ∈ { 1, . . . , r }, ki = mi +si−1 + si. The inequalities (1) and (2) will ensure that mr−2 > 3. Note that by Lemma 10 and the assumptions that kr = hr > 2( r − 1) and r > 3, we have 3( r − 1) 6 kr + 2( r − 2) 6 k1 + · · · + kr−1. Thus, we can find integers m1, . . . , m r such that 3 6 mi 6 ki for each i ∈ { 1, . . . , r } and m1 + · · · + mr−1 = kr + 2( r − 2). Specifically, define t = k1 + k2 + · · · + kr−1 − kr − 2( r − 2) 2 , and note that t is a non-negative integer by Lemma 10. We define a sequence of non-negative integers s0, s 1, s 2, . . . , s r by s0 = sr−1 = sr = 0, for i ∈ { 1, 2, . . . , r − 3}, set si = min {ki − si−1 − 3, t − (s1 + · · · + si−1)}, and define sr−2 = t−(s1 +· · · +sr−3). It is evident from the definition that si−1 +si 6 ki −3for each i ∈ { 1, . . . , r − 3} and s1 + s2 + · · · + sr = t. the electronic journal of combinatorics 28(1) (2021), #P1.35 9 We now show by induction that si > 0 for each 0 6 i 6 r. First note that s0 =0 > 0 and s1 = min {k1 − 3, t } > 0. Now suppose that i > 1 and assume as the inductive hypothesis that sj > 0 for each 0 6 j < i . Firstly, if si = ki − si−1 − 3 then si−1 + si−2 6 ki−1 − 3, so si−1 6 ki−1 − 3, which implies that ki − si−1 − 3 > 0, since ki > ki−1. Alternatively if si = t − (s1 + · · · + si−1), then by the definition of si−1, si−1 6 t − (s1 + · · · + si−2) which implies t − (s1 + · · · + si−1) > 0. Hence, noting that sr−1 = sr = 0, each si > 0. For each i ∈ { 1, . . . , r }, set mi = ki − si−1 − si. By choice of sr−2, it is easy to see that s = r−1 ∑ i=1 si = t, and hence r−1 ∑ i=1 mi = r−1 ∑ i=1 ki − 2 r−1 ∑ i=1 si = r−1 ∑ i=1 ki − 2t = kr + 2( r − 2) = mr + 2( r − 2) . It is now easy to check that ( m1, . . . , m r) satisfy conditions 1 and 2 of Lemma 10. Also, since mi 6 ki for each i ∈ { 1, . . . , r }, we have that each mi 6 ki 6 n, and m1 + · · · + mr 6 k1 + · · · + kr 6 n(n − 1). Thus, to show that ( m1, . . . , m r) can be viewed as the (suitably ordered) canonical list of an n-admissible list M , we need only to show that mi > 3 for each i ∈ { 1, . . . , r }. This is clear if 1 6 i 6 r − 3 since si 6 ki − si−1 − 3, and if i = r since mr = kr.For i = r − 2, we have mr−2 = kr−2 − sr−3 − sr−2. If sr−2 = 0, then mr−2 = kr−2 − sr−3 > kr−3 − sr−3 > mr−3 > 3. Otherwise, mr−2 = kr−2 − sr−3 − sr−2 = kr−2 − sr−3 − (t − (s1 + s2 + · · · + sr−3)) = kr−2 − t + s1 + s2 + · · · + sr−4. To bound the value of mr−2, we rewrite this quantity in terms of k1, . . . , k r. Note that for each j ∈ { 1, . . . , r − 3}, if sj = t − (s1 + · · · + sj−1), then sj+1 = 0. Hence the condition sr−2 6 = 0 implies that sj = kj − sj−1 − 3 for each j ∈ { 1, . . . , r − 3}. Thus s1 + · · · + sr−4 = r−4 ∑ i=1 (ki − si−1 − 3) = ( k1 − 3) + [( k2 − 3) − (k1 − 3)] + [( k3 − 3) − (k2 − 3) + ( k1 − 3)] + · · · +[( kr−4 − 3) + · · · + ( −1) r−5(k1 − 3)] = { k1 + k3 + · · · + kr−4 − 3( r − 3) /2 if r is odd k2 + k4 + · · · + kr−4 − 3( r − 4) /2 if r is even . the electronic journal of combinatorics 28(1) (2021), #P1.35 10 If r is odd, it follows that mr−2 = kr−2 − t + s1 + · · · + sr−4 = k1 + k3 + · · · + kr−4 + kr−2 − 3( r − 3) 2 − k1 + k2 + · · · + kr−1 − kr − 2( r − 2) 2= k1 + k3 + · · · + kr−2 + kr 2 − k2 + k4 + · · · + kr−1 2 − r − 52 3, since k1 + k3 + · · · + kr−2 + kr > k2 + k4 + · · · + kr−1 + r + 1. If r is even, then mr−2 = kr−2 − t + s1 + · · · + sr−4 = k2 + k4 + · · · + kr−4 + kr−2 − 3( r − 4) 2 − k1 + k2 + · · · + kr−1 − kr − 2( r − 2) 2= k2 + k4 + · · · + kr−2 + kr 2 − k1 + k3 + · · · + kr−1 2 − r − 82 3since k2 + k4 + · · · + kr−2 + kr > k1 + k3 + · · · + kr−1 + r − 2. Finally, we show that mr−1 > 3. Since sr−1 = 0 and by construction kr−1 > kr−2, we have that mr−1 = kr−1 − sr−2 > kr−2 − sr−2 − sr−3 = mr−2 > 3. We now show that the list satisfies Condition 2 of Theorem 15, i.e. that mr + s 6 n.Since s = r−1 ∑ i=1 si = r−1 ∑ i=1 (ki − mi − si−1) = (r−1∑ i=1 ki ) − (kr + 2( r − 2)) − s, we have 2s = ( r∑ i=1 ki ) − 2kr − 2( r − 2) , giving s = 12 ( r∑ i=1 ki ) − kr − r + 2 6 (n + r − 2) − kr − r + 2 = n − kr, so that mr + s = kr + s 6 n.The result now follows by applying Theorem 15, taking ˆM ′ = K.We note that the conclusion of Theorem 16 holds whenever r > 3, hr > 2( r − 1), h1 + · · · + hr 6 2( n + r − 2) and there is a reordering of the hi, 1 6 i < r , so that inequalities (1) and (2) are satisfied. In particular, when r is even, the conditions r 6 = 4 and h1 6 r may be dropped if (2) holds in the reordering of the hi.Recall that a directed cycle decomposition of K∗ n can be considered as a decomposition of G∗ into directed cycles of lengths greater than 2 for some graph G of order n. Theo-rem 16 applies when the underlying (undirected) graph G formed by cycles not of length the electronic journal of combinatorics 28(1) (2021), #P1.35 11 two is sparse. In particular, it solves all cases where G has one vertex of degree r > 5(r > 3 if r is odd) and all the rest of degree at most three, and which is a subdivision of a Hamiltonian graph. It thus gives a solution in all cases where G can be decomposed into subgraphs which either have this form or are 2-regular. 3 Admissible lists with three cycles of length greater than 2 Recall that Theorem 13 states that K∗ n is M -decomposable whenever M is an admissible list containing at most two cycles of length greater than 2. In this section we give necessary and sufficient conditions for the existence of an M -decomposition of K∗ n in the case that the associated canonical list ˆM has size 3. We begin by noting the following special case of Lemma 10. Lemma 17. If M is an n-admissible list with associated canonical list ˆM = ( α, β, γ ),then α + β ≡ γ (mod 2) and α + β > γ . For the case that α + β + γ 6 2( n + 1), sufficiency follows directly from Theorem 16. Specifically, we have the following lemma. Lemma 18. Let M be an n-admissible list with associated canonical list ˆM = ( α, β, γ ).If α + β + γ 6 2( n + 1) , then K∗ n is M -decomposable. Proof. Note that the conditions of Theorem 16 when r = 3 are that α + β + γ 6 2( n + 1) (as in the assumption) and γ > 4. However, if γ = 3, then α = β = γ = 3, so that α + β 6 ≡ γ (mod 2), in contradiction to Lemma 17. If ˆM = ( α, β, γ ) and α + β + γ > 2( n + 1), the existence of an M -decomposition of K∗ n depends on the value of γ as well as the congruence classes of α + β and γ modulo 4. Lemma 19. Let M be an n-admissible list with associated canonical list ˆM = ( α, β, γ ).If α + β + γ > 2( n + 1) and α + β 6 ≡ γ (mod 4) , then K∗ n is M -decomposable. Proof. We construct directed cycles of lengths α, β and γ, leaving no decoupled arcs, so that the remaining arcs can be used to form directed 2-cycles by Lemma 8. By Lemma 12, it is sufficient to consider the case γ = n.Let −→ C n = (0 , n −1, n −2, . . . , 1). To construct −→ C α and −→ C β , we must use the decoupled arcs along the directed cycle −→ C = (0 , 1, . . . , n − 1), together with t = ( α + β − n)/2 further pairs of arcs. Note that t is odd and t > 1. We first form the cycle of length β. Let ` = n − β. If t = 3, let −→ C β = (0 , + 3 , + 4 , + 1 , + 2 , + 5 , + 6 , ` + 7 , . . . , n − 1) . Otherwise, we build −→ C β by concatenating directed paths. Let P = [0 , + 3 , + 4 , + 1 , + 2] . the electronic journal of combinatorics 28(1) (2021), #P1.35 12 For each i = 0 , 1, . . . , (t − 5) /2, let Pi = [ + 4 i + 2 , + 4 i + 7 , + 4 i + 8 , + 4 i + 5 , ` + 4 i + 6] . Note that: • The initial vertex of P0 is ` + 2, the terminal vertex of P . • For each i = 1 , 2, . . . , (t − 5) /2, the terminal vertex of Pi−1 and the initial vertex of Pi coincide. Moreover, the paths P, P 0, P 1, . . . , P (t−5) /2 are pairwise internally vertex-disjoint, so that the concatenation P P 0P1 · · · P(t−5) /2 is a path. • Each Pi and P uses two arcs of −→ C and two other arcs. In total, these paths contain (t − 1) arcs of −→ C and decouple ( t − 1) further arcs. Next let Q = [ +2 t−4, +2 t−1]. Note that the initial vertex of Q is the terminal vertex of P(t−5) /2, and the terminal vertex of Q is +2 t−1 = α−1 6 n−1, which has not occurred in any of the paths so far. Finally, let Q′ = [+2 t−1, +2 t, . . . , +2 t−1+( n−2t−+1)]. Since the terminal vertex of Q′ is + 2 t − 1 + n − 2t − ` + 1 = n = 0, it is now easy to see that the concatenation P P 0P1 · · · P(t−5) /2QQ ′ forms a directed cycle of length 4 + 4( t − 3) /2 + 1 + ( n − 2t − + 1) = n − = β. 0 00 Figure 3: An illustration of the construction of Lemma 19. Here α = 11, β = 15, γ = 16 = n.It is not difficult to show that the remaining decoupled arcs form a cycle of length α;see Figure 3. Lemma 20. Let M be an n-admissible list with associated canonical list ˆM = ( α, β, γ ).If α + β + γ > 2( n + 1) , α + β ≡ γ (mod 4) and γ < n , then K∗ n is M -decomposable. the electronic journal of combinatorics 28(1) (2021), #P1.35 13 Proof. First, note that α > 4, as otherwise 2( n+1) < α +β+γ 6 3+ β+( n−1) = β+n+2, implying β > n . Let M ′ be the ( n − 1)-admissible list with associated canonical list ˆM ′ = ( α − 1, β − 1, γ ). Since α + β + γ > 2( n + 1), we have that ( α − 1) + ( β − 1) + γ > 2n, and so by Lemma 19, K∗ n−1 is M ′-decomposable. Consider the cycles −→ C α−1, −→ C β−1 and −→ C γ in the decomposition constructed by Lemma 19. It is easy to see that there exist arcs xy and yx with xy ∈ −→ C α−1 and yx ∈ −→ C β−1. Add a new vertex z, and replace arcs xy and yx with directed paths xzy and yzx . We thus obtain three cycles of lengths α, β and γ in K∗ n which between them leave no arc decoupled. The result follows by Lemma 12. Note that the conditions of Lemma 20 require that the largest cycle be non-Hamiltonian. Indeed, if γ = n but all other conditions remain the same as those of Lemma 20, no M -decomposition exists. To prove this result, we will exploit a connection between an M -decomposition with ˆM = ( α, β, n ) and perfect 1-factorizations, which we now define. Definition 21. A 1-factorization F of a graph G is a perfect 1-factorization if, for any two 1-factors F1 and F2 in F, F1 ∪ F2 is a Hamiltonian cycle. We will need the following result on perfect 1-factorizations of cubic bipartite graphs, due to Kotzig and Labelle . Lemma 22 () . Let G be a cubic bipartite graph with bipartition (X, Y ), where |X| = |Y | = t. If G admits a perfect 1-factorization, then t is odd. Lemma 23. Let M be an n-admissible list with associated canonical list ˆM = ( α, β, n ).If α + β + n > 2( n + 1) (i.e. α + β > n + 2 ) and α + β ≡ n (mod 4) , then K∗ n is not M -decomposable. Proof. Suppose that such a decomposition exists, and let −→ C = ( n − 1, n − 2, . . . , 1, 0) be the directed n-cycle in the decomposition. Colour the edges of the directed α-cycle green and those of the directed β-cycle red, and without loss of generality, suppose that the arc 01 is green. Note that each arc of ←− C = (0 , 1, . . . , n − 1), the reversal of −→ C , must be coloured green or red; in fact, ←− C is partitioned into an equal number of green and red directed paths, say G0, G 1, . . . , G t−1 and R0, R 1, . . . , R t−1, where the green path Gi has initial and terminal vertices xi and yi, and the red path Ri has initial and terminal vertices yi and xi+1 (where xt+1 = x0), and t = 12 (α + β − n) is the number of edges of K∗ n which are in the cycles of length α and β but not in ←− C .We form a bipartite graph B with partite sets {x0, x 1, . . . , x t−1} and {y0, y 1, . . . , y t−1} as follows. For i = 0 , 1, . . . , t − 1, we join xi to yi, forming a 1-factor F1 of B, and yi to xi+1 (computing subscripts modulo t), forming a second 1-factor F2 of B. Also, join yi to xj , where yixj is an arc of the green cycle; these edges form a third 1-factor F3 of B. Note that j 6 = i + 1, as otherwise the α-cycle in the decomposition must be ( yi, y i + 1 , . . . , y i+1 ), implying t = 1 and hence α + β − n = 2 ≡ 2 (mod 4). An example of the α- and β-cycles together with the associated cubic bipartite graph can be found in Figure 4. the electronic journal of combinatorics 28(1) (2021), #P1.35 14 y0 R0 G0 x0 x1 G1 y1 R2 x2 G2 y2 R2 x3 G3 y3 R3 x3 G4 y4 R4 x4 x3 x2 x1 x0 y4 y3 y2 y1 y0 Figure 4: Directed α- and β-cycles together with the associated cubic bipartite graph It is clear that B is a cubic bipartite graph. We show that {F1, F 2, F 3} is a per-fect 1-factorization of B. First, notice that F1 ∪ F2 induces the Hamiltonian cycle (x0, y 0, x 1, y 1, . . . , x t−1, y t−1). Next, consider the green α-cycle in the decomposition. Re-placing the arcs of each Gi with a single arc xiyi and disregarding direction, we obtain a cycle whose edges correspond to those of F1 and F3, and so F1 ∪ F3 induces a Hamiltonian cycle in B. In a similar way, looking at the red β-cycle shows that F2 ∪ F3 induces a Hamiltonian cycle in B.By Lemma 22, the existence of a perfect 1-factorization of B implies that t is odd, contradicting the fact that α + β − n ≡ 0 (mod 4). Summarizing the results of this section, we have the following complete result for canonical lists of size at most three. Theorem 24. Let M = (2 , 2, . . . , 2, α, β, γ ), where 2 < α 6 β 6 γ 6 n. The complete symmetric digraph K∗ n is M -decomposable if and only if M is n-admissible and it is not the case that α + β > n + 2 , γ = n and α + β ≡ n (mod 4) . One immediate consequence is the following result regarding cycle decomposition of certain 3-regular digraphs. Corollary 25. Let α, β, γ > 3 be integers with α + β > γ + 2 and α + β ≡ γ (mod 4) . If G is a 3-regular graph with γ vertices and (α + β + γ)/2 edges, then G∗ is not (α, β, γ )-decomposable. 4 Conclusion In this paper, we have made progress on the problem of decomposing a complete symmetric digraph into cycles of given lengths. Theorem 16 shows that if the greatest cycle length the electronic journal of combinatorics 28(1) (2021), #P1.35 15 and the number of 2-cycles in an n-admissible list M are both large enough, then K∗ n admits an M -decomposition. In the case that there are at most three cycles of length greater than 2, we have given a complete solution (Theorem 24). Notably, there is a family of n-admissible lists M ,namely those with ˆM = ( α, β, n ) where α + β > n + 2 and α + β ≡ n (mod 4), for which 2 Kn is decomposable but K∗ n is not. This result implies that no cubic graph G of order n exists such that G∗ is decomposable into three cycles of lengths α, β and n,where α + β > n + 2 and α + β ≡ n (mod 4). In particular, G∗ has no Hamiltonian cycle decomposition if n ≡ 0 (mod 4). The method used in this paper to show non-existence by constructing an auxiliary bipartite graph with a perfect 1-factorization does not apply in general to canonical lists of size greater than three. It remains an interesting open question to determine if there are other infinite families of n-admissible lists M for which K∗ n is not M -decomposable. We have checked all n-admissible lists with n 6 13 and have verified that the correspond-ing decompostions exist, except for those given by Lemma 23 and the decompositions corresponding to the canonical lists: n = 4 : (4 , 4, 4); n = 5 : (4 , 4, 5, 5) , (3 , 4, 4, 4, 5) , (3 , 3, 3, 3, 3, 5); n = 6 : (3 , 3, 3, 3, 3, 3, 3, 3, 3, 3) , (3 , 3, 6, 6, 6, 6) , (4 , 6, 6, 6) , (6 , 6, 6, 6, 6) , which do not exist. We conjecture that these are the only exceptions. References B. Alspach. Research Problem 3. Discrete Math. 36 (1981), 333. B. Alspach and H. Gavlas. Cycle decompositions of Kn and Kn − I. J. Combin. Theory Ser. B 81 (2001), 77–99. B. Alspach, H. Gavlas, M. ˇSajna and H. Verrall. Cycle decompositions IV: complete directed graphs and fixed length directed cycles. J. Combin. Theory Ser. A 103 (2003), 165–208. D. Bryant, D. Horsley, B. Maenhaut and B.R. Smith. Decompositions of complete multigraphs into cycles of varying lengths. J. Combin. Theory Ser. B 129 (2018), 79–106. D. Bryant, D. Horsley and W. Pettersson. Cycle decompositions V: Complete graphs into cycles of arbitrary lengths. Proc. London Math. Soc. 108 (2014), 1153–1192. T.P. Kirkman. On a problem in combinations. Cambridge and Dublin Math J. 2 (1847), 191–204. A. Kotzig and J. Labelle. Strongly Hamiltonian graphs. Utilitas Math. 14 (1978), 99–116. E. Lucas. R´ ecr´ eations Math´ ematiques , Vol. II. Gauthier-Villars, Paris, 1892. M. ˇSajna. Cycle decompositions III: Complete graphs and fixed length cycles. J. Combin. Des. 10 (2002), 27–78.
4124
https://webstersdictionary1828.com/Dictionary/swing
Websters 1828 - Webster's Dictionary 1828 - Swing Menu Home Menu Home Preface History Quotations Constitution The Bible Literature Grammar Education Science Mathematics Medical American Dictionary of the English Language Dictionary Search Home Preface History Quotations Noah Webster Topics Bible Constitution Literature Grammar Education Science Mathematics Medical Swing SWING, verb intransitive preterit tense and participle passive swung. 1. To move to and fro, as a body suspended in the air; to wave; to vibrate. I tried if a pendulum would swing faster, or continue swinging longer in our receiver, if exhausted. 2. To practice swinging; as, a man swings for health or pleasure. 3. To move or float; also, to turn round an anchor; as, a ship swings with the tide. SWING, verb transitive To make to play loosely; to cause to wave or vibrate; as a body suspended in the air. 1. To whirl round in the air. --Swing thee in air, then dash thee down. 2. To wave; to move to and from; as, a man swings his arms when he walks. He swings his tail, and swiftly turns him round. 3. To brandish; to flourish. SWING, noun A waving or vibratory motion; oscillation; as the swing of a pendulum. 1. Motion from one side to the other. A haughty man struts or walks with a swing 2. A line, cord or other thing suspended and hanging loose; also, an apparatus suspended for persons to swing in. 3. Influence or power of a body put in motion. The ram that batters down the wall, For the great swing and rudeness of his poise-- 4. Free course; unrestrained liberty or license. Take thy swing To prevent any thing which may prove an obstacle to the full swing of his genius. 5. The sweep or compass of a moving body. 6. Unrestrained tendency; as the prevailing swing of corrupt nature; the swing of propensities. SWING'-BRIDGE, noun [swing and bridge.] A bridge that may be moved by swinging; used on canals. Websters Dictionary 1828 SITEMAP Home Preface History Quotations INFORMATION About Us Statement of Accessibility Terms of Use Privacy Policy Copyright Notice OUR WEBSITES The Kings Bible King James Bible 1611 King James Bible Dictionary Websters Dictionary 1828 Textus Receptus Bibles Treasury of Scripture Knowledge ©Copyright 2025 MasonSoft Technology Ltd v4 (7.10.2024) X Cookies & Privacy We use cookies to ensure you get the best experience on our website. By using our site you acknowledge that you have read and understand our Privacy Policy. Accept Reject
4125
http://www.dfmf.uned.es/~aperea/material_docente/MyO/tema2_3bis.pdf
Problemas Resueltos 2.20 Un satélite describe una órbita circular en torno a la Tierra. Si se cambia de repente la dirección de su velocidad, pero no su módulo, estudiar el cambio en su órbita y en su período. • Al cambiar sólo la dirección de la velocidad, el momento angular varía pero la energía total no. La órbita nueva corresponderá a una trayectoria asociada a una energía negativa, que como hemos visto, puede ser una órbita circular o elíptica. El nuevo valor del momento angular es α α sin sin 0 L mVr L = = ′ siendo α el ángulo entre la velocidad y el radio vector en el instante del cambio, y 0 r el radio de la órbita circular, y la energía tiene el valor 0 2r GMm E E − = = ′ La fuerza central que actúa entre al satélite y la Tierra es i nversamente proporcional al cuadrado de la distancia entre ellos. Para dicha fuerza se satisfacen las leyes de Kepler. La tercera ley nos dice que el período de una órbita sólo está relacionado con la energía total, de la forma siguiente a GMm E 2 − = y 2 2 3 4π GM T a = donde a es el semieje mayor de la nueva órbita, que en este caso coincide con 0 r . Es decir, 3 2 2 2 4       − = E GMm GM T π Al no variar la energía durante el cambio de la velocidad, no varía el período orbital. • La segunda ley de Kepler es la ley de las áreas y establece que T S m L = 2 siendo S el área de la órbita y T el período orbital. Como el período no varía, T T ′ = , L S m L mS ′ ′ = 2 2 con lo cual, el área de la nueva órbita es α sin S S L L S = ′ = ′ Ya que la energía no varía, la nueva órbita es una elipse centrada en O, con semieje 0 r a = , y nos falta calcular su excentricidad. Tenemos 2 2 0 a r S π π = = y 2 2 1 e a ab S − = = ′ π π con lo cual 2 1 sin e S S − = ′ = α Es decir, la excentricidad de la nueva órbita viene dada por α cos = e 2.21 Un satélite de masa m describe una órbita circular a una distancia H de la superficie terrestre. Otra partícula de masa m/2 se mueve sobre la misma órbita pero en sentido contrario, de modo que choca con el satélite quedando unida a él. Calcular el apogeo y el perigeo de la órbita del cuerpo compuesto. • La velocidad de una masa m en una órbita circular de radio r puede obtenerse de la condición de equilibrio de las fuerzas en dirección radial r V m r GMm 2 2 = ó r GM V = La velocidad no depende de la masa en movimiento. Concluimos que la velocidad del satélite y de la partícula antes del choque tiene el mismo módulo y sentido contrario con el valor H R GM Vi + = siendo R el radio de la Tierra y M su masa. Durante el choque sólo actúan fuerzas interiores, y el momento angular respecto a O se conserva constante. Antes del choque ) ( 2 ) ( 2 ) ( H R GM m H R V m H R mV L i i + = + − + = Este es el valor del mom ento angular para el movimiento del cuerpo compuesto, después del choque. • Para determinar los puntos apsidales de la nueva órbita nos falta conocer la energía del cuerpo compuesto. Como la colisión no es elástica, la energía no se conserva en la colisión. Sin embargo, si se conserva la velocidad del centro de masas, que corresponde a la velocidad V del cuerpo compuesto después del choque. Tenemos i i V m mV V m m 2 2 − =       + con lo cual i V V 3 1 = Justo después de la colisión, el cuerpo compuesto lleva una velocidad V y se encuentra a una distancia R+H del centro de la Tierra. Por tanto, su energía total tiene el valor       + + −       + = 2 2 2 1 2 m m H R GM V m m E Introduciendo el valor de la velocidad, llegamos a H R GMm H R GM m H R GM m E + − = + − + = 12 17 2 3 9 1 4 3 • Una vez conocidos los valores L y E, hallamos los parámetros de la órbita a y e, del cuerpo compuesto. Para el semieje mayor obtenemos el valor ) ( 17 9 2 2 3 12 17 H R a a GMm H R GMm + = − = + − La excentricidad de la órbita satisface la fórmula 3 2 2 2 2 3 2 1       + = m M G EL e Desarrollando el radicando 81 17 4 1 12 17 27 16 27 16 3 2 2 2 − = − = m M G EL encontramos 9 8 81 17 1 = − = e • La distancia de máximo acercamiento, perigeo, está dada por ( ) ) ( 17 1 ) ( 9 8 1 17 9 1 H R H R e a rP + = +      − = − = y la distancia de máximo alejamiento, apogeo, es ( ) H R H R e a rA + = +      + = + = ) ( 9 8 1 17 9 1 2.22 Un satélite artificial de masa m recorre una órbita elíptica, con período T. Las velocidades máxima y mínima en su órbita son min max ,V V respectivamente. Determinar los parámetros de la órbita. • La ecuación de la elipse es φ cos 1 ) 1 ( 2 e e a r + − = Las distancias al apogeo y perigeo son ) 1 ( ) 1 ( e a r e a r A P + = − = Por conservación del momento angular L en los puntos apsidales P A r mV r mV max min = con lo cual, de las ecuaciones anteriores, eliminando el semieje mayor a obtenemos la excentricidad de la órbita min max min max V V V V e + − = • Para hallar el semieje mayor, utilizamos la ley de las áreas. Si T es el período, ab π el área de la elipse, la ley de las áreas se escribe ) 1 ( 2 1 2 min e a V m L T ab + = = π Como 2 1 e a b − = , despejamos el valor del semieje mayor 2 min 1 1 2 e e T V a − + = π Tenemos min max 2 1 1 1 1 V V e e e e = − + = − + Por tanto, max min 2 V V T a π = • Finalmente la energía total E se encuentra a partir de la expresión a GMm E 2 − = obteniendo max minV V GMm E π − = 2.23 Un planeta de masa M tiene un satélite de masa m, describiendo en torno a él una trayectoria circular de radio R, con período T. Súbitamente el satélite se para. Determinar el tiempo de caída del satélite sobre el planeta. • La energía del satélite en su órbita circular es R GMm mV E − = 2 2 1 Además, hay equilibrio de las fuerzas en dirección radial. La fuerza gravitatoria se compensa con la fuerza centrífuga 2 2 R GMm R V m = con lo cual, la energía es R GMm E 2 − = • Cuando el satélite se frena, su energía cinética se hace cero, y su energía se reduce a la energía potencial, con lo cual E R GMm E 2 = − = ′ Según la tercera ley de Kepler, existe la relación entre el período de una órbita y la energía del sistema ( ) 3 2 2 2 3 2 2 m M G E T π = − El período de la nueva órbita satisface 2 2 ' 2 / 3 T T E E T =       = ′ • Cuando el satélite se frena, su velocidad se hace cero, y así el momento angular de la nueva órbita es cero. Esto quiere decir que la órbita del satélite pasará por el centro del planeta. El punto de máximo alejamiento se produce en el momento inicial, R r = , y el punto de máximo acercamiento es 0 = r . Por tanto, el tiempo que tarda en caer es igual al tiempo que tarda en ir de R r = a 0 = r , es decir, el tiempo que tarda en ir del máximo alejamiento al máximo acercamiento, esto es, un semiperíodo. El tiempo de caída es, entonces 2 4 2 T T t = ′ = Problemas Propuestos 2.24 Un satélite artificial se lanza desde la superficie terrestre verticalmente hacia arriba con una velocidad inicial R GM U α = . En el momento en que se para, se le da una velocidad transversal R GM V β = . Hallar los parámetros de la órbita en función de α y β. Aquí, R es el radio terrestre. Solución: ( ) ( ) 2 2 2 2 2 2 2 2 2 4 1 2 α β β α β α − − − − = − − = e R a 2.25 Una nave espacial de masa m llega con una velocidad 0 V a las proximidades de la Luna siguiendo una trayectoria hiperbólica cuya asíntota está a una distancia b del centro de la Luna. Sea a la distancia de aproximación máxima de la n ave al centro de la Luna. Calcular la velocidad necesaria 0 V para que R a R b 2 , 3 10 = = , siendo R el radio de la Luna, y la velocidad en el punto de aproximación máxima en dicho caso. En el punto de máxima aproximación, la nave frena para describir una órbita circular de observación de radio a. Calcular la energía perdida por la nave. Solución: 2 2 2 2 0 2 4 5 4 3 a b a b a GMm E R GM V R GM V P − + = ∆ = =
4126
https://www.grc.nasa.gov/www/BGH/machrole.html
| | | | | | | | | | | | | | | | | | --- --- --- --- --- --- --- --- | | | | --- | | + Text Only Site + Non-Flash Version + Contact Glenn | | | | | | | | | | --- --- --- | | | | | | | | | | | | | As an aircraft moves through the air, the air molecules near the aircraft are disturbed and move around the aircraft. If the aircraft passes at a low speed, typically less than 250 mph, it is observed that the density of the air remains constant. For higher speeds, some of the energy of the aircraft goes into compressing the air and locally changing the density of the air. This compressibility effect alters the amount of resulting force on the aircraft since the aerodynamic force depends on the air density. The effect becomes more important as speed increases. Near and beyond the speed of sound, about 330 m/s or 760 mph at sea level, small disturbances in the flow are transmitted to other locations isentropically or with constant entropy. Sharp disturbances generate shock waves that affect both the lift and drag of the aircraft, and the flow conditions downstream of the shock wave. On this slide, we will investigate the dependence of the density change on the Mach number of the flow. The Mach number is the ratio of the speed of the aircraft, or the speed of the gas, to the speed of sound in the gas. The speed of sound is equal to the speed of transmission of small, isentropic disturbances in the flow. To determine the role of the Mach number on compressibility effects. we begin with the conservation of momentum equation: rho V dV = - dp where rho is the fluid density, V is the velocity, and p is the pressure. dV and dp denote differential changes in the velocity and pressure. From our derivation of the conditions for isentropic flow, we know that: dp/p = gamma drho/rho dp = gamma p / rho drho where gamma is the specific heat ratio. We can use the ideal equation of state to simplify the expression on the right: p = rho R T dp = gamma R T drho where R is the specific gas constant and T is the absolute temperature. We recognize that: gamma R T = a^2 where a is equal to the speed of sound. So, dp = a^2 drho Substituting this expression for the change of pressure into the conservation of momentum equation gives: rho V dV = - a^2 drho - (V^2 / a^2) dV / V = drho / rho - M^2 dV / V = drho / rho where M is the Mach number. What does this expression tell us about the role of the Mach number in compressible flows? 1. For low speed, or subsonic conditions, the Mach number is less than one, M < 1 and the square of the Mach number is very small. Then the left hand side of the equation is very small, and the change in density is very small. For the low subsonic conditions, compressibility can be ignored. 2. As the speed of the object approaches the speed of sound, the flight Mach number is nearly equal to one, M = 1, and the flow is said to be transonic. If the Mach number is near one, the square of the Mach number is also nearly equal to one. For transonic flows, the change in density is nearly equal to the change in velocity, and compressibility effects can not be ignored. 3. As the speed increases beyond the speed of sound, the flight Mach number is greater than one M > 1 and the flow is said to be supersonic or hypersonic. For supersonic and hypersonic flows, the density changes faster than the velocity changes by a factor equl to the square of the Mach number. Compressibility effects become more important with higher Mach numbers. Activities: Guided Tours Navigation .. Beginner's Guide Home Page | | | | | | | | --- --- | | | + Inspector General Hotline + Equal Employment Opportunity Data Posted Pursuant to the No Fear Act + Budgets, Strategic Plans and Accountability Reports + Freedom of Information Act + The President's Management Agenda + NASA Privacy Statement, Disclaimer, and Accessibility Certification | | Editor: Tom Benson NASA Official: Tom Benson Last Updated: May 07 2021 + Contact Glenn | | |
4127
https://math.stackexchange.com/questions/2176767/prove-that-every-8-regular-graph-has-4-and-2-regular-spanning-subgraph
hamiltonian path - Prove that every 8-regular graph has 4-and 2-regular spanning subgraph! - Mathematics Stack Exchange Join Mathematics By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy. Sign up with Google OR Email Password Sign up Already have an account? Log in Skip to main content Stack Exchange Network Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. Visit Stack Exchange Loading… Tour Start here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the workings and policies of this site About Us Learn more about Stack Overflow the company, and our products current community Mathematics helpchat Mathematics Meta your communities Sign up or log in to customize your list. more stack exchange communities company blog Log in Sign up Home Questions Unanswered AI Assist Labs Tags Chat Users Teams Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Try Teams for freeExplore Teams 3. Teams 4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams Teams Q&A for work Connect and share knowledge within a single location that is structured and easy to search. Learn more about Teams Hang on, you can't upvote just yet. You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it? Instead, you can save this post to reference later. Save this post for later Not now Thanks for your vote! You now have 5 free votes weekly. Free votes count toward the total vote score does not give reputation to the author Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation. Got it!Go to help center to learn more Prove that every 8-regular graph has 4-and 2-regular spanning subgraph! Ask Question Asked 8 years, 6 months ago Modified8 years, 6 months ago Viewed 1k times This question shows research effort; it is useful and clear 5 Save this question. Show activity on this post. Prove that every 8 8-regular graph has 4 4- and 2 2-regular spanning subgraphs. Note: A graph is spanning subgraph, if it contains every vertex of the original graph. Furthermore this example's from Hamiltonian cycle/path topic. graph-theory hamiltonian-path Share Share a link to this question Copy linkCC BY-SA 3.0 Cite Follow Follow this question to receive notifications edited Mar 7, 2017 at 23:48 Botond KissBotond Kiss asked Mar 7, 2017 at 23:36 Botond KissBotond Kiss 75 7 7 bronze badges 1 The 2 2-regular claim is easy -- think about the components of the original 8 8-regular graph. Make a connection to the Hamiltonian cycle topic.hardmath –hardmath 2017-03-07 23:40:49 +00:00 Commented Mar 7, 2017 at 23:40 Add a comment| 1 Answer 1 Sorted by: Reset to default This answer is useful 6 Save this answer. Show activity on this post. This is part of a general result called Petersen's 2-factor theorem, which is not too difficult to prove as a whole. Theorem (Petersen): Let G G be a 2 k 2 k-regular graph. Then G G has a decomposition into k k edge-disjoint 2 2-factors (where a 2 2-factor is a 2 2-regular spanning graph). Proof: Without loss of generality, let G G be connected. Since G G has only vertices of even degree, it follows that G G has an Euler cycle. Take an Euler cycle of G G and define a corresponding orientation D(G)D(G) according to the cycle. Now, split each vertex v v of G G into two distinct vertices colored red and blue, say v r v r and v b v b. Let us now define another (undirected) graph G′G′ with vertex set V r×V b V r×V b. For each directed arc (u,v)(u,v) in our digraph D(G)D(G), draw the edge (u r,v b)∈E(G′)(u r,v b)∈E(G′). This makes G′G′ into a k k-regular bipartite graph. By Hall's marriage theorem, G′G′ has a decomposition into k k edge-disjoint perfect matchings. If we now identify v r v r and v b v b for each vertex, the previously defined perfect matchings gives us a decomposition of G G into k k edge-disjoint 2 2-factors, as required. □◻ Your result now follows easily from Petersen's theorem. Take any 2 2-factor to get your 2 2-regular spanning graph. Take any two 2 2-factors to get a 4 4-regular spanning graph. In general, for any 2 k 2 k-regular graph G G, there exists 2 r 2 r-regular spanning graphs of G G for any 0<r≤k 0<r≤k. Share Share a link to this answer Copy linkCC BY-SA 3.0 Cite Follow Follow this answer to receive notifications answered Mar 8, 2017 at 0:43 EuYuEuYu 42.8k 9 9 gold badges 96 96 silver badges 142 142 bronze badges 2 Thank you, I appreciate it, but as I have noticed this proof demands deeper knowledge of graph theory. (Hall's marriage theorem, perfect matching ect.) I should solve this problem without these. I will look for an alternative form of the Petersen theorem's proof!Botond Kiss –Botond Kiss 2017-03-08 15:27:24 +00:00 Commented Mar 8, 2017 at 15:27 @BotondKiss Did you ever find an alternative proof? Because I have the same problem now! These theorems are too advanced, yet I was supposed to solve this question on my exam.Sha Vuklia –Sha Vuklia 2017-05-09 16:30:59 +00:00 Commented May 9, 2017 at 16:30 Add a comment| You must log in to answer this question. Start asking to get answers Find the answer to your question by asking. Ask question Explore related questions graph-theory hamiltonian-path See similar questions with these tags. Featured on Meta Introducing a new proactive anti-spam measure Spevacus has joined us as a Community Manager stackoverflow.ai - rebuilt for attribution Community Asks Sprint Announcement - September 2025 Report this ad Related 0Every nonhamiltonian 2-connected graph has a theta subgraph 3Spanning 2-regular subgraphs in even regular graphs. 2Using Dirac's theorem show if G G is a simple graph with |V(G)|=ν=2 k|V(G)|=ν=2 k and ν 2+1≤δ ν 2+1≤δ then G G has a 3-factor. 1What is a spanning path in graph theory? 1Prove that every simple graph G G contains a spanning subgraph, which is bipartite and deg(v′)≥1 2 deg(v)deg⁡(v′)≥1 2 deg⁡(v). 5Prove that if G G is a graph of order 101 101 and δ(G)=51 δ(G)=51, then every vertex of G G lies on a cycle of length 27 27 4Is there a graph with 2-factor that is not hamiltonian? 5Every connected graph has a spanning subtree Hot Network Questions Xubuntu 24.04 - Libreoffice Interpret G-code Can you formalize the definition of infinitely divisible in FOL? With with auto-generated local variables What's the expectation around asking to be invited to invitation-only workshops? в ответе meaning in context Can a cleric gain the intended benefit from the Extra Spell feat? Another way to draw RegionDifference of a cylinder and Cuboid I have a lot of PTO to take, which will make the deadline impossible Is direct sum of finite spectra cancellative? Does the Mishna or Gemara ever explicitly mention the second day of Shavuot? Can I go in the edit mode and by pressing A select all, then press U for Smart UV Project for that table, After PBR texturing is done? Does the curvature engine's wake really last forever? A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man Riffle a list of binary functions into list of arguments to produce a result Program that allocates time to tasks based on priority ConTeXt: Unnecessary space in \setupheadertext Is there a way to defend from Spot kick? Matthew 24:5 Many will come in my name! With line sustain pedal markings, do I release the pedal at the beginning or end of the last note? How different is Roman Latin? Vampires defend Earth from Aliens Childhood book with a girl obsessed with homonyms who adopts a stray dog but gives it back to its owners If Israel is explicitly called God’s firstborn, how should Christians understand the place of the Church? more hot questions Question feed Subscribe to RSS Question feed To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Why are you flagging this comment? It contains harassment, bigotry or abuse. This comment attacks a person or group. Learn more in our Code of Conduct. It's unfriendly or unkind. This comment is rude or condescending. Learn more in our Code of Conduct. Not needed. This comment is not relevant to the post. Enter at least 6 characters Something else. A problem not listed above. Try to be as specific as possible. Enter at least 6 characters Flag comment Cancel You have 0 flags left today Mathematics Tour Help Chat Contact Feedback Company Stack Overflow Teams Advertising Talent About Press Legal Privacy Policy Terms of Service Your Privacy Choices Cookie Policy Stack Exchange Network Technology Culture & recreation Life & arts Science Professional Business API Data Blog Facebook Twitter LinkedIn Instagram Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547 By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. Accept all cookies Necessary cookies only Customize settings Cookie Consent Preference Center When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy Accept all cookies Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details‎ Performance Cookies [x] Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details‎ Functional Cookies [x] Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details‎ Targeting Cookies [x] Targeting Cookies These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. Cookies Details‎ Cookie List Clear [x] checkbox label label Apply Cancel Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Necessary cookies only Confirm my choices
4128
https://warrenweckesser.github.io/papers/weckesser-scipy-linear-filters.pdf
DRAFT PyData CookBook 1 Signal Processing with SciPy: Linear Filters Warren Weckesser∗ ! Abstract—The SciPy library is one of the core packages of the PyData stack. It includes modules for statistics, optimization, interpolation, integration, linear algebra, Fourier transforms, signal and image processing, ODE solvers, special functions, sparse matrices, and more. In this chapter, we demonstrate many of the tools provided by the signal subpackage of the SciPy library for the design and analysis of linear filters for discrete-time signals, including filter representation, frequency response computation and optimal FIR filter design. Index Terms—algorithms, signal processing, IIR filter, FIR filter CONTENTS Introduction . . . . . . . . . . . . . . . . . . . . 1 IIR filters in scipy.signal . . . . . . . . . . 1 IIR filter representation . . . . . . . . . 2 Lowpass filter . . . . . . . . . . . . . . 3 Initializing a lowpass filter . . . . . . . 5 Bandpass filter . . . . . . . . . . . . . . 5 Filtering a long signal in batches . . . . 6 Solving linear recurrence relations . . . 6 FIR filters in scipy.signal . . . . . . . . . . 7 Apply a FIR filter . . . . . . . . . . . . 7 Specialized functions that are FIR filters 8 FIR filter frequency response . . . . . . 8 FIR filter design . . . . . . . . . . . . . 8 FIR filter design: the window method . 8 FIR filter design: least squares . . . . . 9 FIR filter design: Parks-McClellan . . . 10 FIR filter design: linear programming . 10 Determining the order of a FIR filter . . 13 Kaiser’s window method . . . . . . . . 13 Optimizing the FIR filter order . . . . . 13 References 14 Introduction The SciPy library, created in 2001, is one of the core pack-ages of the PyData stack. It includes modules for statistics, optimization, interpolation, integration, linear algebra, Fourier transforms, signal and image processing, ODE solvers, special functions, sparse matrices, and more. The signal subpackage within the SciPy library includes tools for several areas of computation, including signal pro-cessing, interpolation, linear systems analysis and even some elementary image processing. In this Cookbook chapter, we ∗Corresponding author: warren.weckesser@gmail.com Copyright c ○2016 Warren Weckesser. focus on a specific subset of the capabilities of of this sub-package: the design and analysis of linear filters for discrete-time signals. These filters are commonly used in digital signal processing (DSP) for audio signals and other time series data with a fixed sample rate. The chapter is split into two main parts, covering the two broad categories of linear filters: infinite impulse response (IIR) filters and finite impulse response (FIR) filters. Note. We will display some code samples as transcripts from the standard Python interactive shell. In each interactive Python session, we will have executed the following without showing it: >>> import numpy as np >>> import matplotlib.pyplot as plt >>> np.set_printoptions(precision=3, linewidth=50) Also, when we show the creation of plots in the transcripts, we won’t show all the other plot commands (setting labels, grid lines, etc.) that were actually used to create the corresponding figure in the paper. Complete scripts for all the figures in this paper are available in the papers/scipy directory at IIR filters in scipy.signal An IIR filter can be written as a linear recurrence relation, in which the output yn is a linear combination of xn, the M previous values of x and the N previous values of y: a0yn = M ∑ i=0 bixn−i − N ∑ i=1 aiyn−N (1) (See, for example, Oppenheim and Schafer [OS], Chapter 6. Note, however, that the sign convention for a, ..., a[N] in Eqn. (1) and used in SciPy is the opposite of that used in Oppenheim and Schafer.) By taking the z-transform of Eqn. (1), we can express the filter as Y(z) = H(z)X(z) (2) where H(z) = b0 +b1z−1 +···+bMz−M a0 +a1z−1 +···+aNz−N (3) is the transfer function associated with the filter. The functions in SciPy that create filters generally set a0 = 1. Eqn. (1) is also known as an ARMA(N, M) process, where "ARMA" stands for Auto-Regressive Moving Average. b holds the moving average coefficients, and a holds the auto-regressive coefficients. DRAFT 2 PyData CookBook When a1 = a2 = ··· = aN = 0, the filter is a finite impulse response filter. We will discuss those later. IIR filter representation In this section, we discuss three representations of a linear filter: • transfer function • zeros, poles, gain (ZPK) • second order sections (SOS) SciPy also provides a state space representation, but we won’t discuss that format here. Transfer function. The transfer function representation of a filter in SciPy is the most direct representation of the data in Eqn. (1) or (3). It is two one-dimensional arrays, conventionally called b and a, that hold the coefficients of the polynomials in the numerator and denominator, respectively, of the transfer function H(z). For example, we can use the function scipy.signal.butter to create a Butterworth lowpass filter of order 6 with a normalized cutoff frequency of 1/8 the Nyquist frequency. The default representation created by butter is the transfer function, so we can use butter(6, 0.125): >>> from scipy.signal import butter >>> b, a = butter(6, 0.125) >>> b array([ 2.883e-05, 1.730e-04, 4.324e-04, 5.765e-04, 4.324e-04, 1.730e-04, 2.883e-05]) >>> a array([ 1. , -4.485, 8.529, -8.779, 5.148, -1.628, 0.217]) The representation of a filter as a transfer function with coef-ficients (b, a) is convenient and of theoretical importance, but with finite precision floating point, applying an IIR filter of even moderately large order using this format is susceptible to instability from numerical errors. Problems can arise when designing a filter of high order, or a filter with very narrow pass or stop bands. ZPK. The ZPK representation consists of a tuple containing three items, (z, p, k). The first two items, z and p, are one-dimensional arrays containing the zeros and poles, respectively, of the transfer function. The third item, k, is a scalar that holds the overall gain of the filter. We can tell butter to create a filter using the ZPK representation by using the argument output="zpk": >>> z, p, k = butter(6, 0.125, output=’zpk’) >>> z array([-1., -1., -1., -1., -1., -1.]) >>> p array([ 0.841+0.336j, 0.727+0.213j, 0.675+0.072j, 0.675-0.072j, 0.727-0.213j, 0.841-0.336j]) >>> k 2.8825891944002783e-05 A limitation of the ZPK representation of a filter is that SciPy does not provide functions that can directly apply the filter to a signal. The ZPK representation must be converted to either the SOS format or the transfer function format to actually filter a signal. If we are designing a filter using butter or one of the other filter design functions, we might as well create the filter in the transfer function or SOS format when the filter is created. SOS. In the second order sections (SOS) representation, the filter is represented using one or more cascaded second order filters (also known as "biquads"). The SOS representation is implemented as an array with shape (n, 6), where each row holds the coefficients of a second order transfer function. The first three items in a row are the coefficients of the numerator of the biquad’s transfer function, and the second three items are the coefficients of the denominator. The SOS format for an IIR filter is more numerically stable than the transfer function format, so it should be preferred when using filters with orders beyond, say, 7 or 8, or when the bandwidth of the passband of a filter is sufficiently small. (Unfortunately, we don’t have a precise specification for what "sufficiently small" is.) A disadvantage of the SOS format is that the function sosfilt (at least at the time of this writing) applies an SOS filter by making multiple passes over the data, once for each second order section. Some tests with an order 8 filter show that sosfilt(sos, x) can require more than twice the time of lfilter(b, a, x). Here we create a Butterworth filter using the SOS represen-tation: >>> sos = butter(6, 0.125, output="sos") >>> sos array() The array sos has shape (3, 6). Each row represents a biquad; for example, the transfer function of the biquad stored in the last row is H(z) = 1+2z−1 +z−2 1−1.681z−1 +0.8198z−2 Converting between representations. The signal module provides a collection of functions for converting one represen-tation to another: sos2tf, sos2zpk, ss2tf, ss2zpk, tf2sos, tf2zz, tf2zpk, zpk2sos, zpk2ss, zpk2tf For example, zpk2sos converts from the ZPK representation to the SOS representation. In the following, z, p and k have the values defined earlier: >>> from scipy.signal import zpk2sos >>> zpk2sos(z, p, k) array() Limitations of the transfer function representation. Earlier we said that the transfer function representation of moderate to large order IIR filters can result in numerical problems. Here we show an example. DRAFT SIGNAL PROCESSING WITH SCIPY: LINEAR FILTERS 3 0 20 40 60 80 100 120 Sample number 6 4 2 0 Fig. 1: Incorrect step response of the Butterworth bandpass filter of order 10 created using the transfer function representation. Ap-parently the filter is unstable--something has gone wrong with this representation. We consider the design of a Butterworth bandpass filter with order 10 with normalized pass band cutoff frequencies of 0.04 and 0.16.: >>> b, a = butter(10, [0.04, 0.16], btype="bandpass") We can compute the step response of this filter by applying it to an array of ones: >>> x = np.ones(125) >>> y = lfilter(b, a, x) >>> plt.plot(y) The plot is shown in Figure 1. Clearly something is going wrong. We can try to determine the problem by checking the poles of the filter: >>> z, p, k = tf2zpk(b, a) >>> np.abs(p) array([ 0.955, 0.955, 1.093, 1.093, 1.101, 1.052, 1.052, 0.879, 0.879, 0.969, 0.969, 0.836, 0.836, 0.788, 0.788, 0.744, 0.744, 0.725, 0.725, 0.723]) The filter should have all poles inside the unit circle in the complex plane, but in this case five of the poles have mag-nitude greater than 1. This indicates a problem, which could be in the result returned by butter, or in the conversion done by tf2zpk. The plot shown in Figure 1 makes clear that something is wrong with the coefficients in b and a. Let’s design the same 10th order Butterworth filter as above, but in the SOS format: >>> sos = butter(10, [0.04, 0.16], ... btype="bandpass", output="sos") In this case, all the poles are within the unit circle: >>> z, p, k = sos2zpk(sos) >>> np.abs(p) array([ 0.788, 0.788, 0.8 , 0.8 , 0.818, 0.818, 0.854, 0.854, 0.877, 0.877, 0.903, 0.903, 0.936, 0.936, 0.955, 0.955, 0.964, 0.964, 0.988, 0.988]) We can check the frequency response using scipy.signal.sosfreqz: >>> w, h = sosfreqz(sos, worN=8000) >>> plt.plot(w/np.pi, np.abs(h)) [] 0.0 0.2 0.4 0.6 0.8 1.0 0.00 0.25 0.50 0.75 1.00 Gain 0.0 0.2 0.4 0.6 0.8 1.0 Normalized frequency /2 0 /2 Phase Fig. 2: Frequency response of the Butterworth bandpass filter with order 10 and normalized cutoff frequencies 0.04 and 0.16. 0 50 100 150 200 Sample number 0.2 0.0 0.2 Fig. 3: Step response of the Butterworth bandpass filter with order 10 and normalized cutoff frequencies 0.04 and 0.16. The plot is shown in Figure 2. As above, we compute the step response by filtering an array of ones: >>> x = np.ones(200) >>> y = sosfilt(sos, x) >>> plt.plot(y) The plot is shown in Figure 3. With the SOS representation, the filter behaves as expected. In the remaining examples of IIR filtering, we will use only the SOS representation. Lowpass filter Figure 4 shows a times series containing pressure measure-ments [SO]. At some point in the interval 20 < t < 22, an event occurs in which the pressure jumps and begins oscillating around a "center". The center of the oscillation decreases and appears to level off. We are not interested in the oscillations, but we are interested in the mean value around which the signal is DRAFT 4 PyData CookBook 20 25 30 0 2 4 6 8 10 Pressure (MPa) 20 25 30 Time (ms) 0 5 10 15 20 25 Frequency (kHz) Fig. 4: Top: Pressure, for the interval 15 < t < 35 (milliseconds). Bottom: Spectrogram of the pressure time series (generated using a window size of 1.6 milliseconds). oscillating. To preserve the slowly varying behavior while eliminating the high frequency oscillations, we’ll apply a low-pass filter. To apply the filter, we can use either sosfilt or sosfiltfilt from scipy.signal. The function sosfiltfilt is a forward-backward filter--it applies the filter twice, once forward and once backward. This effectively doubles the order of the filter, and results in zero phase shift. Because we are interesting in the "event" that occurs in 20 < t < 22, it is important to preserve the phase characteristics of the signal, so we use sosfiltfilt. The following code snippet defines two convenience func-tions. These functions allow us to specify the sampling fre-quency and the lowpass cutoff frequency in whatever units are convenient. They take care of scaling the values to the units expected by scipy.signal.butter. from scipy.signal import butter, sosfiltfilt def butter_lowpass(cutoff, fs, order): normal_cutoff = cutoff / (0.5fs) sos = butter(order, normal_cutoff, btype=’low’, output=’sos’) return sos def butter_lowpass_filtfilt(data, cutoff, fs, order): sos = butter_lowpass(cutoff, fs, order=order, output=’sos’) y = sosfiltfilt(sos, data) return y The results of filtering the data using sosfiltfilt are shown in Figure 5. 20 25 30 0 2 4 6 8 10 Pressure (MPa) 20 25 30 Time (ms) 0 5 10 15 20 25 Frequency (kHz) Fig. 5: Top: Filtered pressure, for the interval 15 < t < 35 (milliseconds). The light gray curve is the unfiltered data. Bottom: Spectrogram of the filtered time series (generated using a window size of 1.6 milliseconds). The dashed line is at 1250 Hz. Comments on creating a spectrogram. A spectrogram is a plot of the power spectrum of a signal computed repeatedly over a sliding time window. The spectrograms in Figures 4 and 5 were created using spectrogram from scipy.signal and pcolormesh from matplotlib.pyplot. The func-tion spectrogram has several options that control how the spectrogram is computed. It is quite flexible, but obtaining a plot that effectively illustrates the time-varying spectrum of a signal sometimes requires experimentation with the parame-ters. In keeping with the "cookbook" theme of this book, we include here the details of how those plots were generated. Here is the essential part of the code that computes the spectrograms. pressure is the one-dimensional array of measured data. fs = 50000 nperseg = 80 noverlap = nperseg - 4 f, t, spec = spectrogram(pressure, fs=fs, nperseg=nperseg, noverlap=noverlap, window=’hann’) The spectrogram for the filtered signal is computed with the same arguments: f, t, filteredspec = spectrogram(pressure_filtered, ...) Notes: • fs is the sample rate, in Hz. • spectrogram computes the spectrum over a sliding DRAFT SIGNAL PROCESSING WITH SCIPY: LINEAR FILTERS 5 segment of the input signal. nperseg specifies the number of time samples to include in each segment. Here we use 80 time samples (1.6 milliseconds). This is smaller than the default of 256, but it provides sufficient resolution of the frequency axis for our plots. • noverlap is the length (in samples) of the overlap of the segments over which the spectrum is computed. We use noverlap = nperseq - 4; in other words, the window segments slides only four time samples (0.08 milliseconds). This provides a fairly fine resolution of the time axis. • The spectrum of each segment of the input is computed after multiplying it by a window function. We use the Hann window. The function spectrogram computes the data to be plotted. Next, we show the code that plots the spectrograms shown in Figures 4 and 5. First we convert the data to decibels: spec_db = 10np.log10(spec) filteredspec_db = 10np.log10(filteredspec) Next we find the limits that we will use in the call to pcolormesh to ensure that the two spectrograms use the same color scale. vmax is the overall max, and vmin is set to 80 dB less than vmax. This will suppress the very low amplitude noise in the plots. vmax = max(spec_db.max(), filteredspec_db.max()) vmin = vmax - 80.0 Finally, we plot the first spectrogram using pcolormesh(): cmap = plt.cm.coolwarm plt.pcolormesh(1000t, f/1000, spec_db, vmin=vmin, vmax=vmax, cmap=cmap, shading=’gouraud’) An identical call of pcolormesh with filteredspec_db generates the spectrogram in Figure 5. Initializing a lowpass filter By default, the initial state of an IIR filter as implemented in lfilter or sosfilt is all zero. If the input signal does not start with values that are zero, there will be a transient during which the filter’s internal state "catches up" with the input signal. Here is an example. The script generates the plot shown in Figure 6. import numpy as np from scipy.signal import butter, sosfilt, sosfilt_zi import matplotlib.pyplot as plt n = 101 t = np.linspace(0, 1, n) np.random.seed(123) x = 0.45 + 0.1np.random.randn(n) sos = butter(8, 0.125, output=’sos’) # Filter using the default initial conditions. y = sosfilt(sos, x) # Filter using the state for which the output # is the constant x[:4].mean() as the initial # condition. 0.0 0.2 0.4 0.6 0.8 1.0 t 0.0 0.2 0.4 0.6 Filter with different initial conditions x y (zero ICs) y2 (mean(x[:4]) ICs) Fig. 6: A demonstration of two different sets of initial conditions for a lowpass filter. The orange curve is the output of the filter with zero initial conditions. The green curve is the output of the filter initialized with a state associated with the mean of the first four values of the input x. zi = x[:4].mean() sosfilt_zi(sos) y2, zo = sosfilt(sos, x, zi=zi) # Plot everything. plt.plot(t, x, alpha=0.75, linewidth=1, label=’x’) plt.plot(t, y, label=’y (zero ICs)’) plt.plot(t, y2, label=’y2 (mean(x[:4]) ICs)’) plt.legend(framealpha=1, shadow=True) plt.grid(alpha=0.25) plt.xlabel(’t’) plt.title(’Filter with different ’ ’initial conditions’) plt.show() By setting zi=x[:4].mean() sosfilt_zi(sos), we are, in effect, making the filter start out as if it had been filtering the constant x[:4].mean() for a long time. There is still a transient associated with this assumption, but it is usually not as objectionable as the transient associated with zero initial conditions. This initialization is usually not needed for a bandpass or highpass filter. Also, the forward-backward filters implemented in filtfilt and sosfiltfilt already have options for controlling the initial conditions of the forward and backward passes. Bandpass filter In this example, we will use synthetic data to demonstrate a bandpass filter. We have 0.03 seconds of data sampled at 4800 Hz. We want to apply a bandpass filter to remove frequencies below 400 Hz or above 1200 Hz. Just like we did for the lowpass filter, we define two functions that allow us to create and apply a Butterworth bandpass filter with the frequencies given in Hz (or any other units). The functions take care of scaling the values to the normalized range expected by scipy.signal.butter. from scipy.signal import butter, sosfilt def butter_bandpass(lowcut, highcut, fs, order): DRAFT 6 PyData CookBook 0 500 1000 1500 2000 Frequency (Hz) 0.0 0.2 0.4 0.6 0.8 1.0 Gain lowcut: 400 Hz highcut: 1200 Hz Amplitude response for Butterworth bandpass filters order = 3 order = 6 order = 12 2/2 Fig. 7: Amplitude response for a Butterworth bandpass filter with several different orders. nyq = 0.5 fs low = lowcut / nyq high = highcut / nyq sos = butter(order, [low, high], btype=’band’, output=’sos’) return sos def butter_bandpass_filt(data, lowcut, highcut, fs, order): sos = butter_bandpass(lowcut, highcut, fs, order) y = sosfilt(sos, data) return y First, we’ll take a look at the frequency response of the Butterworth bandpass filter with order 3, 6, and 12. The code that generates Figure 7 demonstrates the use of scipy.signal.sosfreqz: for order in [3, 6, 12]: sos = butter_bandpass(lowcut, highcut, fs, order) w, h = sosfreqz(sos, worN=2000) plt.plot((fs0.5/np.pi)w, abs(h), ’k’, alpha=(order+1)/13, label="order = %d" % order) Figure 8 shows the input signal and the filtered signal. The order 12 bandpass Butterworth filter was used. The plot shows the input signal x; the filtered signal was generated with y = butter_bandpass_filt(x, lowcut, highcut, fs, order=12) where fs = 4800, lowcut = 400 and highcut = 1200. Filtering a long signal in batches The function lfilter applies a filter to an array that is stored in memory. Sometimes, however, the complete signal 0.000 0.005 0.010 0.015 0.020 0.025 0.030 Time (seconds) 0.025 0.000 0.025 0.050 0.075 0.100 0.125 Noisy signal Filtered signal Fig. 8: Original noisy signal and the filtered signal. The order 12 Butterworth bandpass filter shown in Figure 7 was used. to be filtered is not available all at once. It might not fit in memory, or it might be read from an instrument in small blocks and it is desired to output the filtered block before the next block is available. Such a signal can be filtered in batches, but the state of the filter at the end of one batch must be saved and then restored when lfilter is applied to the next batch. Here we show an example of how the zi argument of lfilter allows the state to be saved and restored. We will again use synthetic data generated by the same function used in the previous example, but for a longer time interval. A pattern that can be used to filter an input signal x in batches is shown in the following code. The filtered signal is stored in y. The array sos contains the filter in SOS format, and is presumed to have already been created. batch_size = N # Number of samples per batch # Array of initial conditions for the SOS filter. z = np.zeros((sos.shape, 2)) # Preallocate space for the filtered signal. y = np.empty_like(x) start = 0 while start < len(x): stop = min(start + batch_size, len(x)) y[start:stop], z = sosfilt(sos, x[start:stop], zi=z) start = stop In this code, the next batch of input is fetched by simply indexing x[start:stop], and the filtered batch is saved by assigning it to y[start:stop]. In a more realistic batch processing system, the input might be fetched from a file, or directly from an instrument, and the output might be written to another file, or handed off to another process as part of a batch processing pipeline. Solving linear recurrence relations Variations of the question: How do I speed up the following calculation? y[i+1] = alphay[i] + cx[i] DRAFT SIGNAL PROCESSING WITH SCIPY: LINEAR FILTERS 7 0.00 0.01 0.02 0.03 0.04 0.05 0.06 Time (seconds) 0.025 0.000 0.025 0.050 0.075 0.100 0.125 Noisy signal Filtered signal Fig. 9: Original noisy signal and the filtered signal. The order 12 Butterworth bandpass filter shown in Figure 7 was used. The signal was filtered in batches of size 72 samples (0.015 seconds). The alternating light and dark blue colors of the filtered signal indicate batches that were processed in separate calls to sosfilt. often arise on mailing lists and online forums. Sometimes more terms such as betay[i-1] or dx[i-1] are in-cluded on the right. These recurrence relations show up in, for example, GARCH models and other linear stochastic models. Such a calculation can be written in the form of Eqn. (1), so a solution can be computed using lfilter. Here’s an example that is similar to several questions that have appeared on the programming Q&A website stackoverflow.com. The one-dimensional array h is an input, and alpha, beta and gamma are constants: y = np.empty(len(h)) y = alpha for i in np.arange(1, len(h)): y[i] = alpha + betay[i-1] + gammah[i-1] To use lfilter to solve the problem, we have to translate the linear recurrence: y[i] = alpha + betay[i-1] + gammah[i-1] into the form of Eqn. (1), which will give us the coefficients b and a of the transfer function. Define: x[i] = alpha + gammah[i] so the recurrence relation is: y[i] = x[i-1] + betay[i-1] Compare this to Eqn. (1); we see that a0 = 1, a1 = −beta, b0 = 0 and b1 = 1. So we have our transfer function coefficients: b = [0, 1] a = [1, -beta] We also have to ensure that the initial condition is set correctly to reproduce the desired calculation. We want the initial condition to be set as if we had values x[-1] and y[-1], and y is computed using the recurrence relation. Given the above recurrence relation, the formula for y is: y = x[-1] + betay[-1] We want y to be alpha, so we’ll set y[-1] = 0 and x[-1] = alpha. To create initial conditions for lfilter that will set up the filter to act like it had just operated on those previous values, we use scipy.signal.lfiltic: zi = lfiltic(b, a, y=, x=[alpha]) The y and x arguments are the "previous" values that will be used to set the initial conditions. In general, one sets y=[y[-1], y[-2], ..] and x=[x[-1], x[-2], ...], giving as many values as needed to deter-mine the initial condition for lfilter. In this example, we have just one previous value for y and x. Putting it all together, here is the code using lfilter that replaces the for-loop shown above: b = [0, 1] a = [1, -beta] zi = lfiltic(b, a, y=, x=[alpha]) y, zo = lfilter(b, a, alpha + gammah, zi=zi) FIR filters in scipy.signal A finite impulse response filter is basically a weighted moving average. Given an input sequence xn and the M + 1 filter coefficients {b0,...,bM}, the filtered output yn is computed as the discrete convolution of x and b: yn = M ∑ i=0 bixn−i = (b∗x)n (4) where ∗is the convolution operator. M is the order of the filter; a filter with order M has M +1 coefficients. It is common to say that the filter has M +1 taps. Apply a FIR filter To apply a FIR filter to a signal, we can use scipy.signal.lfilter with the denominator set to the scalar 1, or we can use one of the convolution functions available in NumPy or SciPy, such as scipy.signal.convolve. For a signal {x0,x1,...,xS−1} of finite length S, Eq. (4) doesn’t specify how to compute the result for n < M. The convolution functions in NumPy and SciPy have an option called mode for specifying how to handle this. For example, mode=’valid’ only computes output values for which all the values of xi in Eq. 4 are defined, and mode=’same’ in effect pads the input array x with zeros so that the output is the same length as the input. See the docstring of numpy.convolve or scipy.signal.convolve for more details. For example, from scipy.signal import convolve # Make a signal to be filtered. np.random.seed(123) x = np.random.randn(50) # taps is the array of FIR filter coefficients. taps = np.array([ 0.0625, 0.25 , 0.375 , 0.25 , 0.0625]) # Filtered signal. y has the same length as x. y = convolve(x, taps, mode=’same’) There are also convolution functions in scipy.ndimage. The function scipy.ndimage.convolve1d provides an DRAFT 8 PyData CookBook axis argument, which allows all the signals stored in one axis of a multidimensional array to be filtered with one call. For example, from scipy.ndimage import convolve1d # Make an 3-d array containing 1-d signals # to be filtered. x = np.random.randn(3, 5, 50) # Apply the filter along the last dimension. y = convolve1d(x, taps, axis=-1) Note that scipy.ndimage.convolve1d has a different set of options for its mode argument. Consult the docstring for details. Specialized functions that are FIR filters The uniform filter and the Gaussian filter implemented in scipy.ndimage are FIR filters. In the case of one-dimensional time series, the specific functions are uniform_filter1d and gaussian_filter1d. The Savitzky-Golay filter [SavGol] is also a FIR filter. In the module scipy.signal, SciPy provides the function savgol_coeffs to create the coefficients of a Savitzy-Golay filter. The function savgol_filter applies the Savitzky-Golay filter to an input signal without returning the filter coefficients. FIR filter frequency response The function scipy.signal.freqz computes the fre-quency response of a linear filter represented as a transfer function. This class of filters includes FIR filters, where the representation of the numerator of the transfer function is the array of taps and the denominator is the scalar a0 = 1. As an example, we’ll compute the frequency response of a uniformly weighted moving average. For a moving average of length n, the coefficients in the FIR filter are simply 1/n. Translated to NumPy code, we have taps = np.full(n, fill_value=1.0/n). The response curves in Figure 10 were generated with this code: for n in [3, 7, 21]: taps = np.full(n, fill_value=1.0/n) w, h = freqz(taps, worN=2000) plt.plot(w, abs(h), label="n = %d" % n) The function freqz returns the frequencies in units of radians per sample, which is why the values on the abscissa in Figure 10 range from 0 to π. In calculations where we have a given sampling frequency fs, we usually convert the frequencies returned by freqz to dimensional units by multiplying by fs/(2π). FIR filter design We’ll demonstrate how SciPy can be used to design a FIR filter using the following four methods. • The window method. The filter is designed by computing the impulse response of the desired ideal filter and then multiplying the coefficients by a window function. • Least squares design. The weighted integral of the squared frequency response error is minimized. 0 4 2 3 4 Frequency (radians/sample) 0.0 0.2 0.4 0.6 0.8 1.0 Gain Amplitude Response for Moving Average Filter n = 3 n = 7 n = 21 Fig. 10: Frequency response of a simple moving average. n is the number of taps (i.e. the length of the sliding window). • Parks-McClellan equiripple design. A "minimax" method, in which the maximum deviation from the desired response is minimized. • Linear programming. The "minimax" design problem can be formulated as a linear programming problem. In the following sections, we discuss each design method. For this discussion, we define the following functions, where ω is the frequency in radians per sample: A(ω), the filter’s (real, signed) frequency response; D(ω), the desired frequency response of the filter; and W(ω), the weight assigned to the response error at ω (i.e. how "important" is the error A(ω)− D(ω)). FIR filter design: the window method The window method for designing a FIR filter is to compute the filter coefficients as the impulse response of the desired ideal filter, and then multiply the coefficents by a window function to both truncate the set of coefficients (thus making a finite impulse response filter) and to shape the actual filter response. Most textbooks on digital signal processing include a discussion of the method; see, for example, Section 7.5 of Oppenheim and Schafer [OS]. Two functions in the module scipy.signal implement the window method, firwin and firwin2. Here we’ll show an example of firwin2. We’ll use firwin when we discuss the Kaiser window method. We’ll design a filter with 185 taps for a signal that is sampled at 2000 Hz. The filter is to be lowpass, with a linear transition from the pass band to the stop band over the range 150 Hz to 175 Hz. We also want a notch in the pass band between 48 Hz and 72 Hz, with sloping sides, centered at 60 Hz where the desired gain is 0.1. The dashed line in Figure 12 shows the desired frequency response. To use firwin2, we specify the desired response at the endpoints of a piecewise linear profile defined over the frequency range [0, 1000] (1000 Hz is the Nyquist frequency). freqs = [0, 48, 60, 72, 150, 175, 1000] gains = [1, 1, 0.1, 1, 1, 0, 0] DRAFT SIGNAL PROCESSING WITH SCIPY: LINEAR FILTERS 9 0 92 184 Sample number 0.0 0.2 0.4 0.6 0.8 1.0 Window functions Hamming Kaiser, =2.70 rectangular Fig. 11: Window functions used in the firwin2 filter design example. To illustrate the affect of the window on the filter, we’ll demonstrate the design using three different windows: the Hamming window, the Kaiser window with parameter β set to 2.70, and the rectangular or "boxcar" window (i.e. simple truncation without tapering). The code to generate the FIR filters is fs = 2000 numtaps = 185 # window=None is equivalent to using the # rectangular window. taps_none = firwin2(numtaps, freqs, gains, nyq=0.5fs, window=None) # The default window is Hamming. taps_h = firwin2(numtaps, freqs, gains, nyq=0.5fs) beta = 2.70 taps_k = firwin2(numtaps, freqs, gains, nyq=0.5fs, window=(’kaiser’, beta)) Figure 12 shows the frequency response of the three filters. FIR filter design: least squares The weighted least squares method creates a filter for which the expression Z π 0 W(ω)(A(ω)−D(ω))2 dω (5) is minimized. The function scipy.signal.firls im-plements this method for piecewise linear desired response D(ω) and piecewise constant weight function W(ω). Three arguments (one optional) define the shape of the desired response: bands, desired and (optionally) weights. The argument bands is sequence of frequency values with an even length. Consecutive pairs of values define the bands on which the desired response is defined. The frequencies covered by bands does not have to include the entire spectrum from 0 to the Nyquist frequency. If there are gaps, the response in the gap is ignored (i.e. the gaps are "don’t care" regions). The desired input array defines the amplitude of the desired frequency response at each point in bands. 0 50 100 150 200 Frequency (Hz) 0.0 0.2 0.4 0.6 0.8 1.0 Gain 185 taps Filters designed with the window method ideal Hamming Kaiser, =2.70 rectangular Fig. 12: Frequency response for a filter designed using firwin2 with several windows. The ideal frequency response is a lowpass filter with a ramped transition starting at 150 Hz. There is also a notch with ramped transitions centered at 60 Hz. The weight input, if given, must be an array with half the length of bands. The values in weight define the weight of each band in the objective function. A weight of 0 means the band does not contribute to the result at all--it is equivalent to leaving a gap in bands. As an example, we’ll design a filter for a signal sampled at 200 Hz. The filter is a lowpass filter, with pass band [0, 15] and stop band [30, 100], and we want the gain to vary linearly from 1 down to 0 in the transition band [15, 30]. We’ll design a FIR filter with 43 taps. We create the arrays bands and desired as described above: bands = np.array([0, 15, 15, 30, 30, 100]) desired = np.array([1, 1, 1, 0, 0, 0]) Then we call firls: numtaps = 43 taps1 = firls(numtaps, bands, desired, nyq=100) The frequency response of this filter is the blue curve in Figure 13. By default, the firls function weights the bands uni-formly (i.e. W(ω) ≡1 in Eqn. (5)). The weights argument can be used to control the weight W(ω) on each band. The argument must be a sequence that is half the length of bands. That is, only piecewise constant weights are allowed. Here we rerun firls, giving the most weight to the pass band and the least weight to the transition band: wts = [100, .01, 1] taps2 = firls(numtaps, bands, desired, nyq=100, weight=wts) The frequency response of this filter is the orange curve in Figure 13. As expected, the frequency response now deviates DRAFT 10 PyData CookBook 0 15 30 100 0.0 0.5 1.0 Gain Least Squares Filter Design uniform weight weight:[100, 0.01, 1] 0 15 0.99 1.00 1.01 Gain 30 100 Frequency (Hz) 0.00 0.01 0.02 Gain Fig. 13: Result of a least squares FIR filter design. The desired frequency response comprises three bands. On [0, 15], the desired gain is 1 (a pass band). On [15, 30], the desired gain decreases linearly from 1 to 0. The band [30, 100] is a stop band, where the desired gain is 0. The filters have 43 taps. The middle and bottom plots are details from the top plot. more from the desired gain in the transition band, and the ripple in the pass band is significantly reduced. The rejection in the stop band is also improved. Equivalence of least squares and the window method. When uniform weights are used, and the desired result is specified for the complete interval [0,π], the least squares method is equivalent to the window method with no window function (i.e. the window is the "boxcar" function). To verify this numerically, it is necessary to use a sufficiently high value for the nfreqs argument of firwin2. Here’s an example: >>> bands = np.array([0, 0.5, 0.5, 0.6, 0.6, 1]) >>> desired = np.array([1, 1, 1, 0.5, 0.5, 0]) >>> numtaps = 33 >>> taps_ls = firls(numtaps, bands, desired) >>> freqs = bands >>> gains = desired >>> taps_win = firwin2(numtaps, freqs, gains, ... nfreqs=8193, window=None) >>> np.allclose(taps_ls, taps_win) True In general, the window method cannot be used as a replace-ment for the least squares method, because it does not provide an option for weighting distinct bands differently; in particular, it does not allow for "don’t care" frequency intervals (i.e. intervals with weight 0). FIR filter design: Parks-McClellan The Parks-McClellan algorithm [PM] is based on the Remez exchange algorithm [RemezAlg]. This is a "minimax" opti-mization; that is, it miminizes the maximum value of |E(ω)| over 0 ≤ω ≤π, where E(ω) is the (weighted) deviation of the actual frequency response from the desired frequency response: E(ω) = W(ω)(A(ω)−D(ω)), 0 ≤ω ≤π, (6) We won’t give a detailed description of the algorithm here; most texts on digital signal processing explain the algorithm (e.g. Section 7.7 of Oppenheim and Schafer [OS]). The method is implemented in scipy.signal by the function remez. As an example, we’ll design a bandpass filter for a signal with a sampling rate of 2000 Hz using remez. For this filter, we want the stop bands to be [0, 250] and [700, 1000], and the pass band to be [350, 550]. We’ll leave the behavior outside these bands unspecified, and see what remez gives us. We’ll use 31 taps. fs = 2000 bands = [0, 250, 350, 550, 700, 0.5fs] desired = [0, 1, 0] numtaps = 31 taps = remez(numtaps, bands, desired, fs=fs) The frequency response of this filter is the curve labeled (a) in Fig. 14. To reduce the ripple in the pass band while using the same filter length, we’ll adjust the weights, as follows: weights = [1, 25, 1] taps2 = remez(numtaps, bands, desired, weights, fs=fs) The frequency response of this filter is the curve labeled (b) in Fig. 14. It is recommended to always check the frequency response of a filter designed with remez. Figure 15 shows the fre-quency response of the filters when the number of taps is increased from 31 to 47. The ripple in the pass and stop bands is decreased, as expected, but the behavior of the filter in the interval [550, 700] might be unacceptable. This type of behavior is not unusual for filters designed with remez when there are intervals with unspecified desired behavior. In some cases, the exchange algorithm implemented in remez can fail to converge. Failure is more likely when the number of taps is large (i.e. greater than 1000). It can also happen that remez converges, but the result does not have the expected equiripple behavior in each band. When a problem occurs, one can try increasing the maxiter argument, to allow the algorithm more iterations before it gives up, and one can try increasing grid_density to increase the resolution of the grid on which the algorithm seeks the maximum of the response errors. FIR filter design: linear programming The design problem solved by the Parks-McClellan method can also be formulated as a linear programming problem ([Rabiner1972a], [Rabiner1972b]). DRAFT SIGNAL PROCESSING WITH SCIPY: LINEAR FILTERS 11 0 200 400 600 800 1000 Frequency (Hz) 0.0 0.2 0.4 0.6 0.8 1.0 Gain 31 taps Bandpass filters designed with remez (a) (b) Fig. 14: Frequency response of bandpass filters designed using scipy.signal.remez. The stop bands are [0, 250] and [700, 1000], and the pass band is [350, 550]. The shaded regions are the "don’t care" intervals where the desired behavior of the filter is unspecified. The curve labeled (a) uses the default weights--each band is given the same weight. For the curve labeled (b), weight = [1, 25, 1] was used. 0 200 400 600 800 1000 Frequency (Hz) 0.0 0.2 0.4 0.6 0.8 1.0 Gain 47 taps Bandpass filters designed with remez (a) (b) Fig. 15: This plot shows the results of the same calculation that produced Figure 14, but the number of taps has been increased from 31 to 47. Note the possibly undesirable behavior of the filter in the transition interval [550, 700]. To implement this method, we’ll use the function linprog from scipy.optimize. In particular, we’ll use the interior point method that was added in SciPy 1.0. In the following, we first review the linear programming formulation, and then we discuss the implementation. Formulating the design problem as a linear program. Like the Parks-McClellan method, this approach is a "mini-max" optimization of Eq. (6). We’ll give the formulation for a Type I filter design (that is, an odd number of taps with even symmetry), but the same ideas can be applied to other FIR filter types. For convenience, we’ll consider the FIR filter coefficients for a filter of length 2R+1 using centered indexing: b−R,b−R+1,...,b−1,b0,b1,...,bM−1,bR Consider a sinusoidal signal with frequency ω radians per sample. The frequency response can be written A(ω) = R ∑ i=−R bi cos(ωi) = b0 + R ∑ i=0 2bi cos(ωi) = R ∑ i=0 pi cos(ωi) where we define p0 = b0 and, for 1 ≤i ≤R, pi = 2bi. We’ve used the even symmetry of the cosine function and the of filter coefficients about the middle coefficient (b−i = bi). The "minimax" problem is to minimize the maximum error. That is, choose the filter coefficients such that |E(ω)| ≤ε for 0 ≤ω ≤π for the smallest possible value of ε. After substituting the expression for E(ω) from Eqn. (6), replacing the absolute value with two inequalities, and doing a little algebra, the problem can be written as minimize ε over  p0, p1, ..., pR, ε subject to A(ω)− ε W(ω) ≤D(ω) and −A(ω)− ε W(ω) ≤−D(ω) ω is a continuous variable in the above formulation. To implement this as a linear programming problem, we use a suitably dense grid of L frequencies ω0,ω1,...,ωL−1 (not necessarily uniformly spaced). We define the L × (R + 1) matrix C as Cij = cos(ωi−1( j −1)), 1 ≤i ≤L and 1 ≤j ≤R+1 (7) Then the vector of frequency responses is the matrix product Cp, where p = [p0, p1,..., pR]T. Let dk = D(ωk), and d = [d0,d1,...,dL−1]T. Similarly, de-fine v = [v0,v1,...,vL−1]T, where vk = 1/W(ωk). The linear programming problem is minimize ε over  p0, p1, ..., pR, ε subject to  C −v −C −v  p ε  ≤  d −d  This is the formulation that can be used with, for example, scipy.optimize.linprog. This formulation, however, provides no advantages over the solver provided by remez, and in fact it is generally much slower and less robust than remez. When designing a filter beyond a hundred or so taps, there is much more likely to be a convergence error in the linear programming method than in remez. The advantage of the linear programming method is its ability to easily handle additional constraints. Any constraint, either equality or inequality, that can be written as a linear constraint can be added to the problem. DRAFT 12 PyData CookBook We will demonstrate how to implement a lowpass filter design using linear programming with the constraint that the gain for a constant input is exactly 1. That is, A(0) = R ∑ i=0 pi = 1 which may be written Aeq  p ε  = 1, where Aeq = [1,1,...,1,0]. Implementing the linear program. Let’s look at the code required to set up a call to linprog to design a lowpass filter with a pass band of [0,ωp] and a stop band of [ωs,π], where the frequencies ωp and ωs are expressed in radians per sample, and 0 < ωp < ωs < π. We’ll also impose the constraint that A(0) = 1. A choice for the density of the frequency samples on [0,π] that works well is 16N, where N is the number of taps (numtaps in the code). Then the number of samples in the pass band and the stop band can be computed as density = 16numtaps/np.pi numfreqs_pass = int(np.ceil(wpdensity)) numfreqs_stop = int(np.ceil((np.pi - ws)density)) The grids of frequencies on the pass and stop bands are then wpgrid = np.linspace(0, wp, numfreqs_pass) wsgrid = np.linspace(ws, np.pi, numfreqs_stop) We will impose an equality constraint on A(0), so we can can remove that frequency from wpgrid--there is no point in requiring both the equality and inequality constraints at ω = 0. Then wpgrid and wsgrid are concatenated to form wgrid, the grid of all the frequency samples. wpgrid = wpgrid[1:] wgrid = np.concatenate((wpgrid, wsgrid)) Let wtpass and wtstop be the constant weights that we will use in the pass and stop bands, respectively. We create the array of weights on the grid with weights = np.concatenate( (np.full_like(wpgrid, fill_value=wtpass), np.full_like(wsgrid, fill_value=wtstop))) The desired values of the frequency response are 1 in the pass band and 0 in the stop band. Evaluated on the grid, we have desired = np.concatenate((np.ones_like(wpgrid), np.zeros_like(wsgrid))) Now we implement Eq. (7) and create the L×(R+1) array of coefficients C that are used to compute the frequency response, where R = M/2: R = (numtaps - 1)//2 C = np.cos(wgrid[:, np.newaxis]np.arange(R+1)) The column vector of the reciprocals of the weights is V = 1/weights[:, np.newaxis] 0 0.16 Frequency (radians/sample) 0.999 1.000 1.001 1.002 Gain Pass band detail linear programming, H(0)=1 remez Fig. 16: Result of solving a lowpass FIR filter design problem by linear programming with the constraint A(0) = 1. The response without the extra constraint, solved using remez, is also plotted. Next we assemble the pieces that define the inequality con-straints that are actually passed to linprog: A = np.block() b = np.block().T c = np.zeros(M+2) c[-1] = 1 In code, the arrays for the equality constraint needed to define A(0) = 1 are: A_eq = np.ones((1, R+2)) A_eq[:, -1] = 0 b_eq = np.array() Finally, we set up and call linprog: options = dict(maxiter=5000, tol=1e-6) sol = linprog(c, A, b, A_eq=A_eq, b_eq=b_eq, bounds=(None, None), method=’interior-point’, options=options) if sol.success: p = sol.x[:-1] taps = 0.5np.concatenate((p[:0:-1], [2p], p[1:])) Notes: • For different problems, the parameters defined in the dictionary options may have to be adjusted. See the documentation for linprog for more details. • By default, linprog assumes that all the variables must be nonnegative. We use the bounds argument to override that behavior. • We have had more success using the interior point method than the default simplex method. See Figure 16 for a plot of the pass band response of the filter designed using linprog. The number of taps was N = 81, and the transition boundary frequencies, expressed in radians per sample, were ωp = 0.16π and ωs = 0.24π. For the weight in each band we used wtpass = 2 and wtstop = 1. DRAFT SIGNAL PROCESSING WITH SCIPY: LINEAR FILTERS 13 Determining the order of a FIR filter Most of the filter design tools in SciPy require the number of taps as an input. Typically, however, a designer has require-ments on the pass band ripple and the stop band rejection, and wants the FIR filter with the minimum number of taps that satisfies these requirements. The diagram shown in Figure 17 illustrates the design parameters for a lowpass filter. The graph of the magnitude of the frequency response of the filter must not enter the shaded area. The parameter δp defines the allowed pass band ripple, and δs defines the required attenuation in the stop band. The maximum width of the transition from the pass band to stop band is ∆ω, and the cutoff frequency ωc is centered in the transition band. In the next two sections, we’ll consider the following filter design problem. We need a lowpass filter for a signal that is sampled at 1000 Hz. The desired cutoff frequency is 180 Hz, and the transition from the pass band to the stop band must not exceed 30 Hz. In the pass band, the gain of the filter should deviate from 1 by no more than 0.005 (i.e. worst case ripple is 0.5%). In the stop band, the gain must be less than 0.002 (about 54 dB attenuation). In the next section, we’ll tackle the design using the Kaiser window method. After that, we’ll obtain an optimal design by using the Parks-McClellan method. Kaiser’s window method The Kaiser window is a window function with a parameter β that controls the shape of the function. An example of a Kaiser window is plotted in Figure 11. Kaiser [Kaiser66], [Kaiser74] developed formulas that, for a given transition width ∆ω and error tolerance for the frequency response, determine the order M and the parameter β required to meet the requirements. Summaries of the method can be found in many sources, including Sections 7.5.3 and 7.6 of the text by Oppenheim and Schafer [OS]. In Kaiser’s method, there is only one parameter that con-trols the passband ripple and the stopband rejection. That is, Kaiser’s method assumes δp = δs. Let δ be that common value. The stop band rejection in dB is −20log10(δ). This value (in dB) is the first argument of the function kaiserord. One can interpret the argument ripple as the maximum deviation (expressed in dB) allowed in |A(ω) −D(ω)|, where A(ω) is the magnitude of the actual frequency response of the filter and D(ω) is the desired frequency response. (That is, in the pass band, D(ω) = 1, and in the stop band, D(ω) = 0.) In Figure 18, the bottom plot shows |A(ω)−D(ω)|. The Kaiser window design method, then, is to de-termine the length of the filter and the Kaiser win-dow parameter β using Kaiser’s formula (implemented in scipy.signal.kaiserord), and then design the filter using the window method with a Kaiser window (using, for example, scipy.signal.firwin): numtaps, beta = kaiserord(ripple, width) taps = firwin(numtaps, cutoff, window=(’kaiser’, beta), [other args as needed]) For our lowpass filter design problem, we first define the input parameters: 0 c Frequency (radians per sample) 0 s 1 p 1 1 + p |H(ej )| Lowpass Filter Design Specifications Fig. 17: Lowpass filter design specifications. The magnitude of the frequency response of the filter should not enter the shaded regions. Frequency values in Hz fs = 1000.0 cutoff = 180.0 width = 30.0 # Desired pass band ripple and stop band attenuation deltap = 0.005 deltas = 0.002 As already mentioned, the Kaiser method allows for only a single parameter to constrain the approximation error. To ensure we meet the design criteria in the pass and stop bands, we take the minimum of δp and δs: delta = min(deltap, deltas) The first argument of kaiserord must be expressed in dB, so we set: delta_db = -20np.log10(delta) Then we call kaiserord to determine the number of taps and the Kaiser window parameter β: numtaps, beta = kaiserord(delta_db, width/(0.5fs)) numtaps |= 1 # Must be odd for a Type I FIR filter. For our lowpass filter design problem, we find numtaps is 109 and β is 4.990. Finally, we use firwin to compute the filter coefficients: taps = firwin(numtaps, cutoff/(0.5fs), window=(’kaiser’, beta), scale=False) The results of the Kaiser method applied to our lowpass filter design problem are plotted in Figure 18. The tip of the right-most ripple in the pass band violates the δ-constraint by a very small amount; this is not unusual for the Kaiser method. In this case, it is not a problem, because the original requirement for the pass band is δp = 0.005, so the behavior in the pass band is overly conservative. Optimizing the FIR filter order The Kaiser window method can be used to create a filter that meets (or at least is very close to meeting) the design requirements, but it will not be optimal. That is, generally there will exist FIR filters with fewer taps that also satisfy the design requirements. At the time this chapter is being written, SciPy does not provide a tool that automatically determines DRAFT 14 PyData CookBook 0 100 200 300 400 500 50 0 Gain (dB) Kaiser Window Filter Design 0 50 100 150 0.998 1.000 1.002 Gain 0 100 200 300 400 500 Frequency (Hz) 0.000 0.001 0.002 |A( ) - D( )| Fig. 18: Result of the Kaiser window filter design of a lowpass filter. The number of taps is 109. Top: Magnitude (in dB) of the frequency response. Middle: Detail of the frequency response in the pass band. Bottom: The deviation of the actual magnitude of the frequency response from that of the ideal lowpass filter. the optimal number of taps given pass band ripple and stop band rejection requirements. It is not difficult, however, to use the existing tools to find an optimal filter in a few steps (at least if the filter order is not too large). Here we show a method that works well, at least for the basic lowpass, highpass, bandpass and bandstop filters on which it has been tested. The idea: given the design requirements, first estimate the length of the filter. Create a filter of that length using remez, with 1/δp and 1/δs as the weights for the pass and stop bands, respectively. Check the frequency response of the filter. If the initial estimate of the length was good, the filter should be close to satisfying the design requirements. Based on the observed frequency response, adjust the number of taps, then create a new filter and reevaluate the frequency response. Iterate until the shortest filter that meets the design requirements is found. For moderate sized filters (up to 1000 or so taps), this simple iterative process can be automated. (For higher order filters, this method has at least two weaknesses: it might be difficult to get a reasonably accurate estimate of the filter length, and it is more likely that remez will fail to converge.) A useful formula for estimating the length of a FIR filter was given by Bellanger [Bellanger]: N ≈−2 3 log10 (10δpδs) fs ∆f (8) which has a straightforward Python implementation: def bellanger_estimate(deltap, deltas, width, fs): n = (-2/3)np.log10(10deltapdeltas)fs/width n = int(np.ceil(n)) return n We’ll apply this method to the lowpass filter design problem that was described in the previous section. As before, we define the input parameters: # Frequency values in Hz fs = 1000.0 cutoff = 180.0 width = 30.0 # Desired pass band ripple and stop band attenuation deltap = 0.005 deltas = 0.002 Then the code numtaps = bellanger_estimate(deltap, deltas, width, fs) numtaps |= 1 gives numtaps = 89. (Compare this to the result of the Kaiser method, where numtaps is 109.) Now we’ll use remez to design the filter. trans_lo = cutoff - 0.5width trans_hi = cutoff + 0.5width taps = remez(numtaps, bands=[0, trans_lo, trans_hi, 0.5fs], desired=[1, 0], weight=[1/deltap, 1/deltas], fs=fs) The frequency response of the filter is shown in Figure 19. We see that the filter meets the design specifications. If we decrease the number of taps to 87 and check the response, we find that the design specifications are no longer met, so we accept 89 taps as the optimum. REFERENCES [Bellanger] M. Bellanger, Digital Processing of Signals: Theory and Practice (3rd Edition), Wiley, Hoboken, NJ, 2000. [Kaiser66] J. F. Kaiser, Digital filters, in System Analysis by Digital Computer, Chapter 7, F. F. Kuo and J. F. Kaiser, eds., Wiley, New York, NY, 1966 [Kaiser74] J. F. Kaiser, Nonrecursive digital filter design using the I0-sinh window function, Proc. 1974 IEEE International Symp. on Circuits and Systems, San Francisco, CA, 1974. [Lyons] Richard G. Lyons. Understanding Digital Signal Processing (2nd ed.), Pearson Higher Education, Inc., Upper Saddle River, New Jersey (2004) [OS] Alan V. Oppenheim, Ronald W. Schafer. Discrete-Time Sig-nal Processing (3rd ed.), Pearson Higher Education, Inc., Upper Saddle River, New Jersey (2010) [PM] Parks-McClellan filter design algorithm. Wikipedia, filter_design_algorithm [Rabiner1972a] L. R. Rabiner, The design of finite impulse response digital filters using linear programming techniques, The Bell System Technical Journal, Vol. 51, No. 6, July-August, 1972. [Rabiner1972b] L. R. Rabiner, Linear program design of finite impulse response (FIR) digital filters, IEEE Trans. on Audio and Electroacoustics, Vol. AU-20, No. 4, Oct. 1972. [RemezAlg] Remez algorithm. Wikipedia, [SavGol] A. Savitzky, M. J. E. Golay. Smoothing and Differentiation of Data by Simplified Least Squares Procedures. Analytical Chemistry, 1964, 36 (8), pp 1627-1639. DRAFT SIGNAL PROCESSING WITH SCIPY: LINEAR FILTERS 15 0 100 200 300 400 500 50 0 Gain (dB) 30 Hz Lowpass Filter Optimal Remez Design 0 50 100 150 0.995 1.000 1.005 Gain 0 100 200 300 400 500 Frequency (Hz) 0.000 0.002 0.004 |A( ) - D( )| Fig. 19: Optimal lowpass filter frequency response. The number of taps is 89. [SO] Nimal Naser, How to filter/smooth with SciPy/Numpy?,
4129
https://thirdspacelearning.com/gcse-maths/algebra/algebraic-fractions/
What are algebraic fractions? How to solve equations including algebraic fractions Algebraic fractions worksheet Algebraic fractions examples Example 1: Equation with one fraction Example 2: Equation with two fractions Example 3: Equation with x in the denominator Example 4: Equation with three fractions Example 5: Denominators are expressions in terms of x Example 6: Equation including a quadratic Common misconceptions Practice algebraic fractions questions Algebraic fractions GCSE questions Learning checklist Next lessons Still stuck? GCSE Tutoring Programme Our chosen students improved 1.19 of a grade on average - 0.45 more than those who didn't have the tutoring. Teacher-trusted tutoring In order to access this I need to be confident with: Fractions Simplifying fractions Adding and subtracting fractions Rearranging equations Solving equations Quadratic equations (factorisation) Quadratic formula Expanding brackets Simultaneous equations This topic is relevant for: Introduction What are algebraic fractions? How to solve equations including algebraic fractions Algebraic fractions worksheet Algebraic fractions examples ↓ Example 1: Equation with one fraction Example 2: Equation with two fractions Example 3: Equation with x in the denominator Example 4: Equation with three fractions Example 5: Denominators are expressions in terms of x Example 6: Equation including a quadratic Common misconceptions Practice algebraic fractions questions Algebraic fractions GCSE questions Learning checklist Next lessons Still stuck? GCSE Maths Algebra Algebraic Expressions Simplifying Expressions Algebraic Fractions Algebraic Fractions Here we will learn about algebraic fractions, including operations with fractions, and solving linear and quadratic equations written in the form of algebraic fractions. There are also algebraic fractions worksheets based on Edexcel, AQA and OCR exam questions, along with further guidance on where to go next if you’re still stuck. What are algebraic fractions? Algebraic fractions are fractions that contain at least one variable. The following algebraic expressions are examples of algebraic fractions: x is the numerator: \quad \quad \quad \frac{x}{12} Both the numerator and the denominator contain an x term: \quad \quad \quad \frac{x+1}{2x} An expression in terms of x is the denominator: \quad \quad \frac{3}{x+1}\ Both the numerator and the denominator contain an expression with x : \quad \quad \frac{3x+4}{2x-5} The numerator is a multiple of x : \quad\quad \quad \quad \frac{2x}{15} The numerator and the denominator are quadratic expressions: \quad\quad \quad \quad \frac{(x+3)^{2}}{x^{2}-9} The main aim of this lesson is to understand how to solve equations that include algebraic fractions. All the examples above are expressions whereas the examples below are equations as we can find specific values for x for each example to solve the equation. E.g. One step equation: \quad \quad \frac{x}{12}=4 A separate constant term: \quad \frac{x+1}{2x}+4=x A quadratic equation: \quad\frac{3}{x+1}=x+5 A linear equation: \quad \frac{3x+4}{2x-5}=6 A second fraction: \quad \frac{2x}{15}=\frac{5x}{2} Double brackets, difference of two squares and simultaneous equations: \quad \frac{(x+3)^{2}}{x^{2}-9}=2x-1 It is important to be able to simplify algebraic fractions into their simplest form. If you need to practice this or need a quick refresher, see the lesson on simplifying algebraic fractions for further information. Step-by-step guide: Simplifying algebraic fractions What are algebraic fractions? How to solve equations including algebraic fractions We need to be able to solve equations including algebraic fractions. Let’s look at a simple example when \frac{8}{x}=2 . Here, the denominator of the fraction contains the variable, so we first need to get the variable out of the denominator. Rearranging the equation by multiplying both sides by x and then dividing by 2, we get the value of x=4. We can substitute this into the original equation to prove that the answer is correct. Here, \frac{8}{4}=2 so we have the correct answer. We shall now consider more complicated cases when equations involve algebraic fractions. In order to solve equations including algebraic fractions. Convert each fraction so they all have a common denominator. Multiply the equation throughout by the common denominator. Solve the equation (linear or quadratic). Explain how to solve equations including algebraic fractions Algebraic fractions worksheet Get your free algebraic fractions worksheet of 20+ questions and answers. Includes reasoning and applied questions. DOWNLOAD FREE x Algebraic fractions worksheet Get your free algebraic fractions worksheet of 20+ questions and answers. Includes reasoning and applied questions. DOWNLOAD FREE Algebraic fractions examples Example 1: Equation with one fraction Solve the equation \frac{2x-1}{3}+x=3 Convert each fraction so they all have a common denominator. Here, we only have one fraction and so we do not need to convert any other term into a fraction. 2Multiply the equation throughout by the common denominator. Multiplying the equation throughout by 3 (the denominator of the fractional term), we get Make sure that you multiply every term in the equation by 3 . 3Solve the equation (linear or quadratic). You can check your solution by substituting the value for x into the original equation and evaluating it. Here, Example 2: Equation with two fractions Solve the equation \frac{x+1}{2}+\frac{x+3}{5}=6 Convert each fraction so they all have a common denominator. Here, we have the two fractions with the denominators of 2 and 5 . The lowest common multiple of 2 and 5 is 10 and so we can convert the two fractions so that they have the same denominator. Remember to use brackets to ensure that you multiply the entire numerator by 5 . Remember to use brackets to ensure that you multiply the entire numerator by 2 . We now have the equation Multiply the equation throughout by the common denominator. Multiplying the equation throughout by 10 (the denominator of the fractional terms), we get Solve the equation (linear or quadratic). You can check your solution by substituting the value for x into the original equation and evaluating it. Here, Example 3: Equation with x in the denominator Solve the equation 3-\frac{5}{x+1}=1 Convert each fraction so they all have a common denominator. Here, we have one fraction so we do not need to find a common denominator. Multiply the equation throughout by the common denominator. Multiplying the equation throughout by x + 1 (the denominator of the fractional terms), we get Solve the equation (linear or quadratic). You can check your solution by substituting the value for x into the original equation and evaluating it. Here, Example 4: Equation with three fractions Solve the equation \frac{1}{x}+\frac{1}{2x}+\frac{1}{3x}=11 Convert each fraction so they all have a common denominator. Here, we need to find the lowest common multiple of x, 2x, and 3x . As x is the highest common factor, x \times 1 \times 2 \times 3 is the lowest common multiple, which is equal to 6x. . So by multiplying the numerator and denominator of each fraction by a constant, we can convert each fraction to have the common denominator of 6x:. We now have an equation which we can immediately simplify. Multiply the equation throughout by the common denominator. Multiplying the equation throughout by 6x (the denominator of the fractional terms), we get Solve the equation (linear or quadratic). You can check your solution by substituting the value for x into the original equation and evaluating it. Here, Example 5: Denominators are expressions in terms of x Solve the equation \frac{x+1}{x+2}+\frac{3}{x-4}=1 Convert each fraction so they all have a common denominator. Here, we need to find a common denominator for (x + 2) and (x − 4) . The easiest way to do this is to multiply the two expressions together. Top tip: do not expand the brackets too soon as you may be able to simplify the fraction before solving the equation. By multiplying each fraction by the denominator of the other fraction, we get We now have an equation which we can immediately simplify. Multiply the equation throughout by the common denominator. Multiplying the equation throughout by (x+2)(x-4) (the denominator of the fractional term), we get Solve the equation (linear or quadratic). You can check your solution by substituting the value for x into the original equation and evaluating it. Here, Example 6: Equation including a quadratic Solve the equation \frac{9x+4}{x}=-2x Convert each fraction so they all have a common denominator. Here, we have a single fraction and so we do not need to find a common denominator. Multiply the equation throughout by the common denominator. Multiplying the equation throughout by x (the denominator of the fractional terms), we get Solve the equation (linear or quadratic). You can check your solution by substituting the value for x into the original equation and evaluating it. Here, we have two possible solutions for x so we can check both: Common misconceptions Multiplying the numerator by the denominator Let us look at example 2 . When multiplying throughout by 10 to remove the denominator from each fraction, the numerator has also been multiplied by 10 .This means that the fractions have been multiplied by 100 , instead of 10 , leaving the next line of work to be incorrect. Ignoring the denominators When given an equation including an algebraic fraction, if the denominators are ignored the question will be answered incorrectly. Not multiplying all terms by the denominator When rearranging an equation, the denominator is moved to the other side of the equals sign, instead of each term being multiplied by it. You must remember to multiply throughout by any value, not just the opposite side of the equals sign. Simplifying fractions incorrectly (1) When adding two fractions, the denominator must be the same. A common misconception for adding two fractions is to add the numerators and the denominators together because this method is emphasised when looking at multiplying fractions. Simplifying fractions incorrectly (2) Seeing the same term on the numerator and denominator allow the misconception that they can both be cancelled. Practice algebraic fractions questions Solve the equation \frac{x+5}{3}+x=7 x=4 x=1 x=8 x=3 Solve the equation \frac{x+5}{2}+\frac{5+x}{2}=50 x=20 x=7.5 x=45 x=22.5 Solve the equation 7+\frac{6x+4}{8}=2x x=6 x=1.1 x=-\frac{39}{46} x=0 Solve the equation \frac{5}{x}+\frac{2x}{5}=3 x=-1 x=2.5 x=\sqrt{11} x=0 Solve the equation \frac{6-x}{4}+\frac{12}{4-x}=4 x=14 x=\frac{14}{3} x=-5\pm\sqrt{31} x=-2 Solve the equation \frac{5}{8+x}+\frac{6-x}{9}=2 x=-3 x=\frac{23}{3} x=-1\pm2\sqrt{23} x=-\frac{23}{3} Algebraic fractions GCSE questions Arron earns £40 per hour. One day, he receives a bonus of £5 . He shares this day’s earnings equally with his brother and sister. If he gives away £190 , how many hours did Arron work that day? (2 marks) Show answer 2(\frac{40x+5}{3})=190 (1) x=7 (1) Use the quadratic formula to solve the equation \frac{2x}{x+3} + \frac{5x}{x+2} = 4 (6 marks) Show answer 2x(x+2)+5x(x+3)=4(x+3)(x+2) or equivalent (1) 7x^{2}+19x=4x^{2}+20x+24 (1) 3x^{2}-x-24=0 (1) x=\frac{-1\pm\sqrt{1^{2}-4\times1\times{-24}}}{2\times{3}} (1) x=\frac{1\pm{17}}{6} (1) x=3 or x=-\frac{8}{3} (1) Two shapes given below have the same area. Calculate the value for x . (7 marks) Show answer Area of Triangle = \frac{2(x+8)}{2}=x+8 (1) Area of Square = \left(\frac{3}{\sqrt{x}}\right)^{2}=\frac{9}{x} (1) x+8=\frac{9}{x} (1) x^2+8x-9=0 (1) (x+9)(x-1)=0 (1) x=1 or x=-9 (1) Conclusion: x=1 only (1) Learning checklist You have now learned how to: ");--ub-list-item-fa-li-top:3px;--ub-list-item-spacing:0px;"> ");"> use algebraic methods to solve linear equations in 1 variable (including all forms that require rearrangement) ");"> simplify and manipulate algebraic fractions The next lessons are Expanding brackets Factorising Solving equations Still stuck? Prepare your KS4 students for maths GCSEs success with Third Space Learning. Weekly online one to one GCSE maths revision lessons delivered by expert maths tutors. Find out more about our GCSE maths tuition programme. Introduction What are algebraic fractions? How to solve equations including algebraic fractions Algebraic fractions worksheet Algebraic fractions examples ↓ Example 1: Equation with one fraction Example 2: Equation with two fractions Example 3: Equation with x in the denominator Example 4: Equation with three fractions Example 5: Denominators are expressions in terms of x Example 6: Equation including a quadratic Common misconceptions Practice algebraic fractions questions Algebraic fractions GCSE questions Learning checklist Next lessons Still stuck? We use essential and non-essential cookies to improve the experience on our website. Please read our Cookies Policy for information on how we use cookies and how to manage or change your cookie settings.Accept Privacy & Cookies Policy Privacy Overview This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience. Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Non-necessary Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website. SAVE & ACCEPT
4130
https://math.stackexchange.com/questions/2173721/solutions-to-sin-x-sin-y-in-0-leq-x-leq-2-pi
trigonometry - Solutions to $\sin x = \sin y$ in $0 \leq x \leq 2\pi$ - Mathematics Stack Exchange Join Mathematics By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy. Sign up with Google OR Email Password Sign up Already have an account? Log in Skip to main content Stack Exchange Network Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. Visit Stack Exchange Loading… Tour Start here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the workings and policies of this site About Us Learn more about Stack Overflow the company, and our products current community Mathematics helpchat Mathematics Meta your communities Sign up or log in to customize your list. more stack exchange communities company blog Log in Sign up Home Questions Unanswered AI Assist Labs Tags Chat Users Teams Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Try Teams for freeExplore Teams 3. Teams 4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams Teams Q&A for work Connect and share knowledge within a single location that is structured and easy to search. Learn more about Teams Hang on, you can't upvote just yet. You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it? Instead, you can save this post to reference later. Save this post for later Not now Thanks for your vote! You now have 5 free votes weekly. Free votes count toward the total vote score does not give reputation to the author Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation. Got it!Go to help center to learn more Solutions to sin x=sin y sin⁡x=sin⁡y in 0≤x≤2 π 0≤x≤2 π Ask Question Asked 8 years, 6 months ago Modified8 years, 6 months ago Viewed 332 times This question shows research effort; it is useful and clear 0 Save this question. Show activity on this post. How can I find the solutions to solutions to sin x=sin y sin⁡x=sin⁡y in 0≤x≤2 π 0≤x≤2 π. If (for instance) 0≤x≤π/2 0≤x≤π/2 then sin x=sin(x+π/2)sin⁡x=sin⁡(x+π/2) but thos doesnt work when π/2≤x≤π π/2≤x≤π in this case sin x=−sin(x+π/2)sin⁡x=−sin⁡(x+π/2) trigonometry Share Share a link to this question Copy linkCC BY-SA 3.0 Cite Follow Follow this question to receive notifications edited Mar 6, 2017 at 6:15 gymbvghjkgkjkhgfkl 8,574 6 6 gold badges 18 18 silver badges 67 67 bronze badges asked Mar 6, 2017 at 0:14 SonnySonny 109 1 1 silver badge 7 7 bronze badges 1 Hint. Draw the graph of the sin sin function. Find out where horizontal lines cross that graph.Ethan Bolker –Ethan Bolker 2017-03-06 00:19:24 +00:00 Commented Mar 6, 2017 at 0:19 Add a comment| 1 Answer 1 Sorted by: Reset to default This answer is useful 4 Save this answer. Show activity on this post. Consider the diagram below. Two angles have the same sine if the y y-coordinates of the points where their terminal sides intersect the unit circle are equal. By symmetry, sin θ=sin φ sin⁡θ=sin⁡φ if φ=θ φ=θ or φ=π−θ φ=π−θ. Any angle coterminal with these angles will also have the same sine. In general, sin θ=sin φ sin⁡θ=sin⁡φ if φ=θ+2 k π,k∈Z φ=θ+2 k π,k∈Z or φ=π−θ+2 m π,m∈Z φ=π−θ+2 m π,m∈Z Observe that if 0≤θ≤π 0≤θ≤π, then 0≤π−θ≤π 0≤π−θ≤π. Thus, for 0≤θ≤π 0≤θ≤π, sin θ=sin φ⟹φ=θ sin⁡θ=sin⁡φ⟹φ=θ or φ=π−θ φ=π−θ. If π<θ≤2 π π<θ≤2 π, 0>π−θ≥−π 0>π−θ≥−π, so we must add 2 π 2 π to π−θ π−θ to find an angle in [0,2 π][0,2 π] that has the same sine as θ θ. Hence, if π<θ<2 π π<θ<2 π, sin θ=sin φ⟹φ=θ sin⁡θ=sin⁡φ⟹φ=θ or φ=3 π−θ φ=3 π−θ. Share Share a link to this answer Copy linkCC BY-SA 3.0 Cite Follow Follow this answer to receive notifications answered Mar 6, 2017 at 0:36 N. F. TaussigN. F. Taussig 79.3k 14 14 gold badges 62 62 silver badges 77 77 bronze badges Add a comment| You must log in to answer this question. Start asking to get answers Find the answer to your question by asking. Ask question Explore related questions trigonometry See similar questions with these tags. Featured on Meta Introducing a new proactive anti-spam measure Spevacus has joined us as a Community Manager stackoverflow.ai - rebuilt for attribution Community Asks Sprint Announcement - September 2025 Report this ad Linked 1Why does this way of solving sin(x)+cos(x)=0 sin⁡(x)+cos⁡(x)=0 give no solutions? Related 3Find all solutions for cos(2 x)cos x−sin(2 x)sin x=1 2√cos⁡(2 x)cos⁡x−sin⁡(2 x)sin⁡x=1 2 if 0≤x<π 0≤x<π 0Find all degree solutions in the interval 0∘≤θ<360∘0∘≤θ<360∘. 1find the solutions to the equation 4 sin 2 θ+1=6 sin θ 4 sin 2⁡θ+1=6 sin⁡θ in the interval 0∘≤θ<360∘0∘≤θ<360∘ 0Solutions of the equation of the form sin(x)=sin(y)sin⁡(x)=sin⁡(y) 1Find m≥0 m≥0 such that sin 4 x+cos 4 x=m sin 4⁡x+cos 4⁡x=m and sin 6 x+cos 6 x=m sin 6⁡x+cos 6⁡x=m have the same solutions 0Do we lose solutions dividing trig expressions? For instance, when going from sin 3 x=3–√cos 3 x sin⁡3 x=3 cos⁡3 x to tan 3 x=3–√tan⁡3 x=3 1Finding All Solutions For sin(x)=x 2 sin⁡(x)=x 2 1How to evaluate from the number of solutions for sin 2 x+cos 3 x−sin 4 x=0 sin⁡2 x+cos⁡3 x−sin⁡4 x=0? 2Prove that sin n(2 x)+(sin n x−cos n x)2≤1 sin n⁡(2 x)+(sin n⁡x−cos n⁡x)2≤1 0Find the number of solutions of 12−16 sin 2 x−−−−−−−−−−−√+16 sin 2 x−4−−−−−−−−−−√=4 12−16 sin 2⁡x+16 sin 2⁡x−4=4 in [0,2 π][0,2 π] Hot Network Questions Matthew 24:5 Many will come in my name! What happens if you miss cruise ship deadline at private island? Another way to draw RegionDifference of a cylinder and Cuboid Checking model assumptions at cluster level vs global level? Identifying a movie where a man relives the same day Bypassing C64's PETSCII to screen code mapping Do sum of natural numbers and sum of their squares represent uniquely the summands? Determine which are P-cores/E-cores (Intel CPU) What is the feature between the Attendant Call and Ground Call push buttons on a B737 overhead panel? Storing a session token in localstorage Find non-trivial improvement after submitting What can be said? Why do universities push for high impact journal publications? What is a "non-reversible filter"? Spectral Leakage & Phase Discontinuites Overfilled my oil What NBA rule caused officials to reset the game clock to 0.3 seconds when a spectator caught the ball with 0.1 seconds left? Passengers on a flight vote on the destination, "It's democracy!" Can induction and coinduction be generalized into a single principle? Analog story - nuclear bombs used to neutralize global warming Implications of using a stream cipher as KDF Any knowledge on biodegradable lubes, greases and degreasers and how they perform long term? alignment in a table with custom separator Suggestions for plotting function of two variables and a parameter with a constraint in the form of an equation more hot questions Question feed Subscribe to RSS Question feed To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Why are you flagging this comment? It contains harassment, bigotry or abuse. This comment attacks a person or group. Learn more in our Code of Conduct. It's unfriendly or unkind. This comment is rude or condescending. Learn more in our Code of Conduct. Not needed. This comment is not relevant to the post. Enter at least 6 characters Something else. A problem not listed above. Try to be as specific as possible. Enter at least 6 characters Flag comment Cancel You have 0 flags left today Mathematics Tour Help Chat Contact Feedback Company Stack Overflow Teams Advertising Talent About Press Legal Privacy Policy Terms of Service Your Privacy Choices Cookie Policy Stack Exchange Network Technology Culture & recreation Life & arts Science Professional Business API Data Blog Facebook Twitter LinkedIn Instagram Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547 By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. Accept all cookies Necessary cookies only Customize settings Cookie Consent Preference Center When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy Accept all cookies Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details‎ Performance Cookies [x] Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details‎ Functional Cookies [x] Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details‎ Targeting Cookies [x] Targeting Cookies These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. Cookies Details‎ Cookie List Clear [x] checkbox label label Apply Cancel Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Necessary cookies only Confirm my choices
4131
https://math.stackexchange.com/questions/1237256/find-n-such-that-x2-x-1-is-a-factor-of-x1n-xn-1
polynomials - Find $n$ such that $x^2 + x + 1$ is a factor of $(x+1)^n - x^n - 1$. - Mathematics Stack Exchange Join Mathematics By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy. Sign up with Google OR Email Password Sign up Already have an account? Log in Skip to main content Stack Exchange Network Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. Visit Stack Exchange Loading… Tour Start here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the workings and policies of this site About Us Learn more about Stack Overflow the company, and our products current community Mathematics helpchat Mathematics Meta your communities Sign up or log in to customize your list. more stack exchange communities company blog Log in Sign up Home Questions Unanswered AI Assist Labs Tags Chat Users Teams Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Try Teams for freeExplore Teams 3. Teams 4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams Teams Q&A for work Connect and share knowledge within a single location that is structured and easy to search. Learn more about Teams Hang on, you can't upvote just yet. You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it? Instead, you can save this post to reference later. Save this post for later Not now Thanks for your vote! You now have 5 free votes weekly. Free votes count toward the total vote score does not give reputation to the author Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation. Got it!Go to help center to learn more Find n n such that x 2+x+1 x 2+x+1 is a factor of (x+1)n−x n−1(x+1)n−x n−1. Ask Question Asked 10 years, 5 months ago Modified10 years, 5 months ago Viewed 1k times This question shows research effort; it is useful and clear 6 Save this question. Show activity on this post. I have to find the form of n i.e. whether n is even or odd and whether it is multiple of 2 or 3 such that: x 2+x+1 x 2+x+1 is a factor of (x+1)n−x n−1(x+1)n−x n−1 What I tried: x 2+x+1=(x+1)2−x x 2+x+1=(x+1)2−x also, (x+1)n−x n−1=(n o)x n+(n 1)x n−1+...+(n n−1)x+(n n).1−x n−1(x+1)n−x n−1=(n o)x n+(n 1)x n−1+...+(n n−1)x+(n n).1−x n−1 =(n 1)x n−1+...+(n n−1)x=(n 1)x n−1+...+(n n−1)x after getting this far I tried with taking x and n common but still couldn't able to find the right direction. I need extra hints to solve this. polynomials factoring Share Share a link to this question Copy linkCC BY-SA 3.0 Cite Follow Follow this question to receive notifications edited May 3, 2015 at 4:51 skdhfgeq2134skdhfgeq2134 asked Apr 16, 2015 at 10:30 skdhfgeq2134skdhfgeq2134 232 1 1 silver badge 8 8 bronze badges Add a comment| 1 Answer 1 Sorted by: Reset to default This answer is useful 7 Save this answer. Show activity on this post. The roots of x 2+x+1=0 x 2+x+1=0 are the cube roots of unity. Call them w,w 2 w,w 2. As x 2+x+1=0 x 2+x+1=0, we get w+1=−w 2 w+1=−w 2 and w 2+1=−w w 2+1=−w. Thus, the problem reduces to finding n n, such that (−1)n+1∗w 2 n+w n+1=0(−1)n+1∗w 2 n+w n+1=0. Thus the answer is, whenever n is not divisible by 3 and n is not divisible by 2, i.e., n≡1,5 mod 6 n≡1,5 mod 6. Share Share a link to this answer Copy linkCC BY-SA 3.0 Cite Follow Follow this answer to receive notifications edited Apr 16, 2015 at 19:30 answered Apr 16, 2015 at 10:41 OjasOjas 2,206 1 1 gold badge 18 18 silver badges 26 26 bronze badges 5 1 I think it should be n≡1,5 mod 6 n≡1,5 mod 6.Ojas –Ojas 2015-04-16 10:55:58 +00:00 Commented Apr 16, 2015 at 10:55 Woah, thanks. The answer that I got was is n is even and it is a multiple of three. The final equation that I got is [(−1)n+1]∗[w 2 n−w n]=0[(−1)n+1]∗[w 2 n−w n]=0 which gives the required solution.skdhfgeq2134 –skdhfgeq2134 2015-04-16 11:37:46 +00:00 Commented Apr 16, 2015 at 11:37 @Bernard I still think, it shouldn't be 4 mod 6 4 mod 6. If n=6 k+4 n=6 k+4, then it becomes (1+w)4−w 4−1=w 8−w 4−1=2∗w 8(1+w)4−w 4−1=w 8−w 4−1=2∗w 8 which does not equal 0.Ojas –Ojas 2015-04-16 11:45:25 +00:00 Commented Apr 16, 2015 at 11:45 You're right. I'm sorry for such an error, I computed too hastily soon this morning and didn't take time to check I'll withdraw my comment. I think you should add the final form of the solutuion in terms of congruence mod 6 to you answer Bernard –Bernard 2015-04-16 18:23:23 +00:00 Commented Apr 16, 2015 at 18:23 @Bernard, done.Ojas –Ojas 2015-04-16 19:30:52 +00:00 Commented Apr 16, 2015 at 19:30 Add a comment| You must log in to answer this question. Start asking to get answers Find the answer to your question by asking. Ask question Explore related questions polynomials factoring See similar questions with these tags. Featured on Meta Introducing a new proactive anti-spam measure Spevacus has joined us as a Community Manager stackoverflow.ai - rebuilt for attribution Community Asks Sprint Announcement - September 2025 Report this ad Linked 0A divisibility question concerning polynomials. 2x 2+x+1 x 2+x+1 is a factor of (x+1)n−x n−1(x+1)n−x n−1, whenever 0How to find m m if (x 2+x+1)|((x+1)m−x m−1)(x 2+x+1)|((x+1)m−x m−1) Related 0Factoring polynomial x 3−2 x 2−4 x−8 x 3−2 x 2−4 x−8 that fails Bezout's identity test 2Generalizing the Remainder Factor Theorem 2Factor a 4−3 a 2−2 a b+1−b 2 a 4−3 a 2−2 a b+1−b 2 1Is it possible to factor a anything that has root x in it? 2Factor polynomials 3How to factor x 6−4 x 4+2 x 3+1 x 6−4 x 4+2 x 3+1 by hand? 3Find a a, b b such that x 2−x−1 x 2−x−1 is a factor of a x 9+b x 8+1 a x 9+b x 8+1 2Attempting to factor (x 2)+5 x=0(x 2)+5 x=0 via the grouping method. 3Find the term that will have the larger coefficient Hot Network Questions Is direct sum of finite spectra cancellative? Passengers on a flight vote on the destination, "It's democracy!" Implications of using a stream cipher as KDF в ответе meaning in context Suspicious of theorem 36.2 in Munkres “Analysis on Manifolds” Identifying a movie where a man relives the same day Is existence always locational? How to use \zcref to get black text Equation? Is it safe to route top layer traces under header pins, SMD IC? Spectral Leakage & Phase Discontinuites Is encrypting the login keyring necessary if you have full disk encryption? What happens if you miss cruise ship deadline at private island? Do we need the author's permission for reference Who is the target audience of Netanyahu's speech at the United Nations? If Israel is explicitly called God’s firstborn, how should Christians understand the place of the Church? What is the meaning of 率 in this report? Numbers Interpreted in Smallest Valid Base Can peaty/boggy/wet/soggy/marshy ground be solid enough to support several tonnes of foot traffic per minute but NOT support a road? How exactly are random assignments of cases to US Federal Judges implemented? Who ensures randomness? Are there laws regulating how it should be done? Analog story - nuclear bombs used to neutralize global warming alignment in a table with custom separator Bypassing C64's PETSCII to screen code mapping Riffle a list of binary functions into list of arguments to produce a result Lingering odor presumably from bad chicken more hot questions Question feed Subscribe to RSS Question feed To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Why are you flagging this comment? It contains harassment, bigotry or abuse. This comment attacks a person or group. Learn more in our Code of Conduct. It's unfriendly or unkind. This comment is rude or condescending. Learn more in our Code of Conduct. Not needed. This comment is not relevant to the post. Enter at least 6 characters Something else. A problem not listed above. Try to be as specific as possible. Enter at least 6 characters Flag comment Cancel You have 0 flags left today Mathematics Tour Help Chat Contact Feedback Company Stack Overflow Teams Advertising Talent About Press Legal Privacy Policy Terms of Service Your Privacy Choices Cookie Policy Stack Exchange Network Technology Culture & recreation Life & arts Science Professional Business API Data Blog Facebook Twitter LinkedIn Instagram Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547 By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. Accept all cookies Necessary cookies only Customize settings Cookie Consent Preference Center When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy Accept all cookies Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details‎ Performance Cookies [x] Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details‎ Functional Cookies [x] Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details‎ Targeting Cookies [x] Targeting Cookies These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. Cookies Details‎ Cookie List Clear [x] checkbox label label Apply Cancel Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Necessary cookies only Confirm my choices
4132
https://math.stackexchange.com/questions/4934565/integrating-a-large-product-of-sines
integration - Integrating a large product of sines - Mathematics Stack Exchange Join Mathematics By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy. Sign up with Google OR Email Password Sign up Already have an account? Log in Skip to main content Stack Exchange Network Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. Visit Stack Exchange Loading… Tour Start here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the workings and policies of this site About Us Learn more about Stack Overflow the company, and our products current community Mathematics helpchat Mathematics Meta your communities Sign up or log in to customize your list. more stack exchange communities company blog Log in Sign up Home Questions Unanswered AI Assist Labs Tags Chat Users Teams Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Try Teams for freeExplore Teams 3. Teams 4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams Teams Q&A for work Connect and share knowledge within a single location that is structured and easy to search. Learn more about Teams Hang on, you can't upvote just yet. You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it? Instead, you can save this post to reference later. Save this post for later Not now Thanks for your vote! You now have 5 free votes weekly. Free votes count toward the total vote score does not give reputation to the author Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation. Got it!Go to help center to learn more Integrating a large product of sines Ask Question Asked 1 year, 3 months ago Modified1 year, 2 months ago Viewed 2k times This question shows research effort; it is useful and clear 24 Save this question. Show activity on this post. Recently, I came across the following integral: ∫2 π 0 sin(x)sin(2 x)sin(3 x)sin(4 x)d x=π 4∫2 π 0 sin(x)sin(2 x)sin(3 x)sin(4 x)d x=π 4, which can be easily solved by some trigonometry. But when trying to find a more general result: I n=∫0 2 π∏n k=1 sin(k x)d x I n=∫0 2 π∏n k=1 sin(k x)d x, I wasn't able to find a very general result for the problem. Is there any way to find I n I n as a "simple" formula? My attempt: It's easy to see that I n=0 I n=0 for odd n. Using the sine product to sum formula for I 2 n I 2 n: I 2 n=(−1)n 4 n∫2 π 0∑e k∈{−1,1}(cos(e 1 x+2 e 2 x+3 e 3 x+⋯+2 n e 2 n x)e 1 e 2⋯e 2 n)d x I 2 n=(−1)n 4 n∫2 π 0∑e k∈{−1,1}(cos(e 1 x+2 e 2 x+3 e 3 x+⋯+2 n e 2 n x)e 1 e 2⋯e 2 n)d x. Notice that every integral in the sum goes to zero, except when the expression inside the cosine is zero. We can rewrite I 2 n I 2 n as: I 2 n=2 π(−1)n(A 2 n−B 2 n)4 n I 2 n=2 π(−1)n(A 2 n−B 2 n)4 n, where A 2 n A 2 n and B 2 n B 2 n are related to the number of ways to zero this expression with an even and odd number of negative signs for e k e k. After that, I was not able to simplify the problem. integration trigonometry definite-integrals trigonometric-integrals Share Share a link to this question Copy linkCC BY-SA 4.0 Cite Follow Follow this question to receive notifications edited Jul 10, 2024 at 19:07 amWhy 211k 198 198 gold badges 283 283 silver badges 505 505 bronze badges asked Jun 19, 2024 at 2:12 pvr95pvr95 579 2 2 silver badges 12 12 bronze badges 4 4 Playing around in Desmos, it seems that (for n n up to 100 100), I n≠0 I n≠0 only for the indices n∈{4,8,12,14,16,20,24,28,32,36,40,44,48,51,52,56,60,64,68,72,76,80,84,86,88,89,90,92,94,96,98,100}n∈{4,8,12,14,16,20,24,28,32,36,40,44,48,51,52,56,60,64,68,72,76,80,84,86,88,89,90,92,94,96,98,100} No clue what to make of this.PrincessEev –PrincessEev 2024-06-19 03:27:07 +00:00 Commented Jun 19, 2024 at 3:27 Playing around with Mathematica, I instead find that I n=0 I n=0 unless n n is a multiple of 4 4. In particular, I 14=0 I 14=0.Semiclassical –Semiclassical 2024-06-19 04:23:11 +00:00 Commented Jun 19, 2024 at 4:23 2 Related: math.stackexchange.com/q/3786668/42969Martin R –Martin R 2024-06-19 09:18:48 +00:00 Commented Jun 19, 2024 at 9:18 See also (2.10) in jstor.org/stable/26603380Travis Willse –Travis Willse 2024-07-10 19:46:29 +00:00 Commented Jul 10, 2024 at 19:46 Add a comment| 1 Answer 1 Sorted by: Reset to default This answer is useful 25 Save this answer. Show activity on this post. It can be expressed in the form π A n 2 n−1 π A n 2 n−1 as follows. ∫2 π 0 n∏k=1 sin(k x)d x=2 π∫0 n∏k=1 e i k x−e−i k x 2 i d x=1(2 i)n∫2 π 0 n∏k=1 1 e i k x⋅n∏k=1(e 2 i k x−1)d x=1(2 i)n∫2 π 0 1 e i N x⋅n∏k=1(e 2 i k x−1)d x where N=n∑k=1 k=n(n+1)2=1 i(2 i)n∫2 π 0 1 e i N x+i x⋅(n∏k=1(e 2 i k x−1))⋅i e i x d x Let z=e i x=1 i(2 i)n∫|z|=1 1 z N+1 n∏k=1(z 2 k−1)d z Contour integral=1 i(2 i)n∫|z|=1 f n(z)(z−0)N+1 d z where f n(z)=n∏k=1(z 2 k−1)=1 i(2 i)n⋅2 π i N!⋅f(N)n(0)Cauchy's integral formula∫2 π 0 n∏k=1 sin(k x)d x=π 2 n−1⋅f(N)n(0)i n N! where, N=n(n+1)2 f(N)n(0) is the N th derivative of f n(z)=n∏k=1(z 2 k−1) at z=0. i=√−1 is the imaginary unit, and i n=e i π n/2. Intuition and Observation: Since i n is imaginary for n≡1,3(mod 4), f(N)n(0) and A n=f(N)n(0)i n N! must vanish as f(N)n(0) is real. Based on Mathematica, f(N)n(0)=0 and A n=0 for n≡2(mod 4). f(N)n(0) and A n are non-zero only if n is a multiple of 4. So, the integral I n=0 unless 4∣n. Share Share a link to this answer Copy linkCC BY-SA 4.0 Cite Follow Follow this answer to receive notifications edited Jun 20, 2024 at 12:03 answered Jun 19, 2024 at 4:01 Pustam RautPustam Raut 2,500 1 1 gold badge 14 14 silver badges 22 22 bronze badges 1 9 Based on Mathematica it seems that A 4 n=2,2,4,6,8,16,28,50,100,196,… for n≥1, with A n=0 otherwise. This matches OEIS sequence A269298 as far as I've been able to verify, and is moreover consistent with its link to sequence A231599.Semiclassical –Semiclassical 2024-06-19 04:34:31 +00:00 Commented Jun 19, 2024 at 4:34 Add a comment| You must log in to answer this question. Start asking to get answers Find the answer to your question by asking. Ask question Explore related questions integration trigonometry definite-integrals trigonometric-integrals See similar questions with these tags. Featured on Meta Introducing a new proactive anti-spam measure Spevacus has joined us as a Community Manager stackoverflow.ai - rebuilt for attribution Community Asks Sprint Announcement - September 2025 Report this ad Linked 9Closed form of 2 π∫0 n∏j=1 cos(j x)d x and combinatorial link 5Evaluating I=∫π 2 0∏7 k=1 cos k x d x 2I am facing problem in ∫(sin(x)×sin(2 x)×sin(3 x)×...×sin(n x))d x for n≥4 . Related 10Calculation of ∫π 0 sin 2 x a 2+b 2−2 a b cos x d x 2Integrating integer powers of cos(θ) 5Definite integral ∫π/2 0 d x 1+sin 4 x and series of double factorial ∑∞n=0(−1)n(4 n−1)!!(4 n)!!. 6How can I evaluate ∫1 0 sin x cos(x−1 2)d x? Hot Network Questions Lingering odor presumably from bad chicken "Unexpected"-type comic story. Aboard a space ark/colony ship. Everyone's a vampire/werewolf alignment in a table with custom separator Does the Mishna or Gemara ever explicitly mention the second day of Shavuot? Why multiply energies when calculating the formation energy of butadiene's π-electron system? Numbers Interpreted in Smallest Valid Base Fundamentally Speaking, is Western Mindfulness a Zazen or Insight Meditation Based Practice? Weird utility function Can peaty/boggy/wet/soggy/marshy ground be solid enough to support several tonnes of foot traffic per minute but NOT support a road? Is it safe to route top layer traces under header pins, SMD IC? Where is the first repetition in the cumulative hierarchy up to elementary equivalence? ICC in Hague not prosecuting an individual brought before them in a questionable manner? Can a cleric gain the intended benefit from the Extra Spell feat? Why do universities push for high impact journal publications? How to rsync a large file by comparing earlier versions on the sending end? How do you create a no-attack area? Repetition is the mother of learning How to fix my object in animation What were "milk bars" in 1920s Japan? Do we need the author's permission for reference Bypassing C64's PETSCII to screen code mapping How to home-make rubber feet stoppers for table legs? Storing a session token in localstorage Do we declare the codomain of a function from the beginning, or do we determine it after defining the domain and operations? Question feed Subscribe to RSS Question feed To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Why are you flagging this comment? It contains harassment, bigotry or abuse. This comment attacks a person or group. Learn more in our Code of Conduct. It's unfriendly or unkind. This comment is rude or condescending. Learn more in our Code of Conduct. Not needed. This comment is not relevant to the post. Enter at least 6 characters Something else. A problem not listed above. Try to be as specific as possible. Enter at least 6 characters Flag comment Cancel You have 0 flags left today Mathematics Tour Help Chat Contact Feedback Company Stack Overflow Teams Advertising Talent About Press Legal Privacy Policy Terms of Service Your Privacy Choices Cookie Policy Stack Exchange Network Technology Culture & recreation Life & arts Science Professional Business API Data Blog Facebook Twitter LinkedIn Instagram Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547 By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. Accept all cookies Necessary cookies only Customize settings Cookie Consent Preference Center When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy Accept all cookies Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details‎ Performance Cookies [x] Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details‎ Functional Cookies [x] Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details‎ Targeting Cookies [x] Targeting Cookies These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. Cookies Details‎ Cookie List Clear [x] checkbox label label Apply Cancel Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Necessary cookies only Confirm my choices
4133
https://www.marchofdimes.org/find-support/topics/pregnancy/rubella-and-pregnancy
Find support Many parents and parents-to-be face a world of unknowns, but they all want a healthy and strong start. That's where we come in. Explore a variety of topics and resources here. Ways to give There are so many ways to support our research, education, advocacy and programs. Give today to ensure that every family is healthy and strong now and tomorrow. Our work Addressing the maternal and infant health crisis is not straightforward with one solution. It takes strategic and collaborative efforts in different areas to ultimately benefit thousands of moms, babies and families every day. Discover more here. About us We're committed to ending preventable maternal health risks and death, ending preventable preterm birth and infant death and closing the health equity gap for all families. Learn more about our legacy and impact here. Breadcrumb Rubella and pregnancy Key Points Rubella is an infection that causes mild flu-like symptoms and a rash. Vaccines usually given in childhood prevent you from getting the infection Up to half of people infected with rubella don’t have any symptoms but still can spread it to others. You can get rubella from an infected person who coughs or sneezes, or by sharing food or drinks with someone who is infected. Rubella can cause serious problems for your baby if you get infected while pregnant, especially during the first three months of pregnancy. Rubella, also called German measles, is an infection that causes mild flu-like symptoms and a rash. Up to half of people infected with rubella don’t have any symptoms and may not even know they’re infected but still spread it to other people. If you get infected during pregnancy, rubella can cause serious problems for your baby. Infection causes the most severe damage when the pregnant person is infected early in their pregnancy, especially in the first 12 weeks (3 months). Rubella has been nearly eliminated in the United States because of the routine vaccination of children. Vaccination protects a person against rubella for life. But people who were never vaccinated as children can get infected. You can be vaccinated as an adult when you are not pregnant. Between 2005 and 2011, 67 cases of rubella were reported in this country. This is up from the previous period—2001 to 2004—when only 5 cases were reported. Vaccination is the best way to prevent infection. Today, less than 10 people in the United States are reported to have rubella and it is usually associated with travel and not being vaccinated. Rubella is common in many other countries. Travelers can bring it into the United States, or you can get it when traveling outside the country. It’s important to get vaccinated for rubella. Talk to your health care provider to make sure you’re protected against it. A blood test can provide you with information about your immunity to rubella What are the signs and symptoms of rubella? Rubella is usually mild, with flu-like symptoms followed by a pink or light red rash. The rash usually starts on the face, then spreads to the rest of the body. The rash lasts about 3 days. Other symptoms include: Up to 7 in 10 (70 percent) teenage and adult women who get rubella develop arthritis. Arthritis is swelling and pain in your joints. Women who are infected with rubella may feel arthritis in their fingers, wrists and knees. This complication is rare in men or children who get rubella. In rare cases, rubella can cause serious problems, including brain infections and bleeding problems. Some people have no symptoms so you may not know that you or they have rubella. What causes rubella? Rubella is caused by a virus (a tiny organism that can make you sick). It is not caused by the same virus that causes measles. It’s very contagious. It spreads through the air when an infected person coughs or sneezes, or by sharing food or drinks with someone who is infected. It also can be passed to a baby from a pregnant person who is infected. A person with rubella may spread the disease to other people up to 1 week before they notice a rash. Infected people can continue to spread the disease up to 7 days after getting a rash. People infected with rubella should tell their friends, family, and the people they work with if they have rubella. If your child has rubella, it’s important to tell their school or daycare provider. Telling others helps prevent the spread of rubella to even more people. What problems can rubella cause during pregnancy? Rubella can be serious for the baby, especially during the first 3 months. Having rubella during pregnancy increases the risk of: Can you pass rubella to your baby during pregnancy? Yes. The best way to protect your baby is to make sure you’re immune to rubella. Immune means being protected from an infection. If you’re immune to an infection, it means you can’t get the infection. You are probably immune to rubella because you were vaccinated as a child or you had the illness during childhood. A blood test can tell if you’re immune to rubella. If you’re thinking about getting pregnant and aren’t sure if you’re immune, talk to your health care provider about getting a blood test. If you were not born in the United States or came as an adult you may not be vaccinated against rubella. Ask your health care provider to do a blood test to see if you are immune to rubella. If you’re not immune to rubella, here’s what you can do to help protect your baby: Before pregnancy. Get the measles, mumps and rubella (MMR) vaccine. Wait 1 month before trying to get pregnant after getting the shot. During pregnancy. You can be tested at a prenatal visit to make sure you’re immune to rubella. If you’re not immune, the MMR vaccine isn’t recommended during pregnancy. But there are things you can do to help prevent getting infected with rubella: After pregnancy. Get the MMR vaccination after you give birth. It is safe to get the MMR vaccine while nursing. Being protected from the infection means you can’t pass it to your baby before they get their own MMR vaccination at about 12 months. It also prevents you from passing rubella to your baby during a future pregnancy. What are the chances of passing rubella to your baby during pregnancy? You’re more likely to pass rubella to your baby the earlier you become infected during pregnancy. For example: If you have rubella during pregnancy, your baby’s provider will carefully monitor your baby after birth to find any problems early. How is rubella treated? There is no specific medicine to treat rubella. In many cases, the symptoms of the disease are mild. Staying in bed (bed rest), drinking fluids and taking medicines to reduce fever can help. Pregnant people with rubella may be treated with acetaminophen to relieve their symptoms. In more serious cases, treatment may include blood transfusion or steroids. A blood transfusion is when you have new blood put into your body. Steroids are synthetic hormones that treat inflammation. Contact your health care provider if you are pregnant and think you have rubella or have been exposed to the disease. Last reviewed: August 2021 See also: Your baby’s vaccinations, Vaccinations and pregnancy March of Dimes leads the fight for the health of all moms and babies. We support research, education, and advocacy, and provide programs and services so that every family can get the best possible start. Since 1938, we’ve built a successful legacy to support every pregnant person and every family. 2025 March of Dimes, a not-for-profit, section 501c(3).
4134
http://www.adichemistry.com/general/chemicalbond/vbt/valence-bond-theory-hybridization.html
VALENCE BOND THEORY (VBT) | HYBRIDIZATION | SP | SP2 | SP3 | SP3D | SP3D2 | SP3D3 Valence bond theory: Introduction Hybridization Types of hybridization sp, sp 2, sp 3, sp 3 d, sp 3 d 2, sp 3 d 3 VALENCE BOND THEORY (VBT) & HYBRIDIZATION The valence bond theory was proposed by Heitler and London to explain the formation of covalent bond quantitatively using quantum mechanics. Later on, Linus Pauling improved this theory by introducing the concept of hybridization. The main postulates of this theory are as follows: A covalent bond is formed by the overlapping of two half filled valence atomic orbitals of two different atoms. The electrons in the overlapping orbitals get paired and confined between the nuclei of two atoms. The electron density between two bonded atoms increases due to overlapping. This confers stability to the molecule. Greater the extent of overlapping, stronger is the bond formed. The direction of the covalent bond is along the region of overlapping of the atomic orbitals i.e., covalent bond is directional. There are two types of covalent bonds based on the pattern of overlapping as follows: (i) σ-bond: The covalent bond formed due to overlapping of atomic orbital along the inter nucleus axis is called σ-bond. It is a stronger bond and cylindrically symmetrical. Depending on the types of orbitals overlapping, the σ-bond is divided into following types: σ s-s bond: σ p-p bond: σ s-p bond: (ii) π-bond: The covalent bond formed by sidewise overlapping of atomic orbitals is called π- bond. In this bond, the electron density is present above and below the inter nuclear axis. It is relatively a weaker bond since the electrons are not strongly attracted by the nuclei of bonding atoms. Note: The 's' orbitals can only form σ-bonds, whereas the p, d & f orbitals can form both σ and π-bonds. BONDING IN MOLECULES EXPLAINED BY VALENCE BOND THEORY 1) H 2 molecule: The electronic configuration of hydrogen atom in the ground state is 1s 1. In the formation of hydrogen molecule, two half filled 1s orbitals of hydrogen atoms overlap along the inter-nuclear axis and thus by forming a σ s-s bond. 2) Cl 2 molecule: The electronic configuration of Cl atom in the ground state is [Ne]3s 2 3p x 2 3p y 2 3p z 1. The two half filled 3p z atomic orbitals of two chlorine atoms overlap along the inter-nuclear axis and thus by forming a σ p-p bond. 3) HCl molecule: In the ground state, the electronic configuration of hydrogen atom is 1s 1. And the ground state electronic configuration of Cl atom is [Ne]3s 2 3p x 2 3p y 2 3p z 1. The half filled 1s orbital of hydrogen overlap with the half filled 3p z atomic orbital of chlorine atom along the inter-nuclear axis to form a σ s-p bond. 4) O 2 molecule: The electronic configuration of O in the ground state is [He] 2s 2 2p x 2 2p y 1 2p z 1. The half filled 2p y orbitals of two oxygen atoms overlap along the inter-nuclear axis and form σ p-p bond. The remaining half filled 2p z orbitals overlap laterally to form a π p-p bond. Thus a double bond (one σ p-p and one π p-p) is formed between two oxygen atoms. 5) N 2 molecule: The ground state electronic configuration of N is [He] 2s 2 2p x 1 2p y 1 2p z 1. A σ p-p bond is formed between two nitrogen atoms due to overlapping of half filled 2p x atomic orbitals along the inter-nuclear axis. The remaining half filled 2p y and 2p z orbitals form two π p-p bonds due to lateral overlapping. Thus a triple bond (one and two) is formed between two nitrogen atoms. NEED FOR MODIFICATION OF VBT However the old version of valence bond theory is limited to diatomic molecules only. It could not explain the structures and bond angles of molecules with more than three atoms. E.g. It could not explain the structures and bond angles of H 2 O, NH 3 etc., However, in order to explain the structures and bond angles of molecules, Linus Pauling modified the valence bond theory using hybridization concept. HYBRIDIZATION What is hybridization? The intermixing of two or more pure atomic orbitals of an atom with almost same energy to give same number of identical and degenerate new type of orbitals is known as hybridization. The new orbitals formed are also known as hybrid orbitals. What is intermixing? The intermixing or hybridization of atomic orbitals is a mathematical concept based on quantum mechanics. During this process, the wavefunctions, Ψ of atomic orbitals of same atom are combined to give new wavefunctions corresponding to hybrid orbitals. What are the requirements for atomic orbitals to undergo hybridization? The atomic orbitals of same atom with almost same energy can only participate in the hybridization. The full filled or half filled or even empty orbitals can undergo hybridization provided they have almost equal energy. Do the orbitals of different atoms undergo hybridization? No! The hybridization is the mixing of orbitals of same atom only. The combination of orbitals belonging to different atoms is called bonding. What are hybrid orbitals? And what are its characteristics? The new orbitals that are formed due to intermixing of atomic orbitals are also known as hybrid orbitals, which have mixed characteristics of atomic orbitals. The shapes of hybrid orbitals are identical. Usually they have one big lobe associated with a small lobe on the other side. The hybrid orbitals are degenerate i.e., they are associated with same energy. How many hybrid orbitals are formed? The number of hybrid orbitals formed is equal to the number of pure atomic orbitals undergoing hybridization. E.g. If three atomic orbitals intermix with each other, the number of hybrid orbitals formed will be equal to 3. How do the electrons are going to be filled in the hybrid orbitals? The hybrid orbitals are filled with those electrons which were present in the pure atomic orbitals forming them. The filling up of electrons in them follows Pauli's exclusion principle and Hund's rule. What is the use of hybrid orbitals? The hybrid orbitals participate in the σ bond formation with other atoms. Why atomic orbitals in a given atom undergo hybridization? The hybrid orbitals are oriented in space so as to minimize repulsions between them. This explains why the atomic orbitals undergo hybridization before bond formation. The reason for hybridization is to minimize the repulsions between the bonds that are going to be formed by the atoms by using hybrid orbitals. Remember that the hybridization is the process that occurs before bond formation. And finally: The bond angles in the molecule are equal to or almost equal to the angles between the hybrid orbitals forming the σ bonds. The shape of the molecule is determined by the type of hybridization, number of bonds formed by them and the number of lone pairs. TYPES OF HYBRIDIZATION During hybridization, the atomic orbitals with different characteristics are mixed with each other. Hence there is no meaning of hybridization between same type of orbitals i.e., mixing of two 's' orbitals or two 'p' orbitals is not called hybridization. However orbital of 's' type can can mix with the orbitals of 'p' type or of 'd' type. Based on the type and number of orbitals, the hybridization can be subdivided into following types. Note: Keep in mind that - only the orbitals of nearer energy values can participate in the hybridization. sp HYBRIDIZATION What is sp hybridization? Intermixing of one 's' and one 'p' orbitals of almost equal energy to give two identical and degenerate hybrid orbitals is called 'sp' hybridization. These sp-hybrid orbitals are arranged linearly at by making 180 o of angle. They possess 50% 's' and 50% 'p' character. JUMP TO EXAMPLES OF SP HYBRIDIZATION sp 2 HYBRIDIZATION What is sp 2 hybridization? Intermixing of one 's' and two 'p' orbitals of almost equal energy to give three identical and degenerate hybrid orbitals is known as sp 2 hybridization. The three sp 2 hybrid orbitals are oriented in trigonal planar symmetry at angles of 120 o to each other. The sp 2 hybrid orbitals have 33.3% 's' character and 66.6% 'p' character. JUMP TO EXAMPLES OF SP 2 HYBRIDIZATION sp 3 HYBRIDIZATION What is sp 3 hybridization? In sp 3 hybridization, one 's' and three 'p' orbitals of almost equal energy intermix to give four identical and degenerate hybrid orbitals. These four sp 3 hybrid orbitals are oriented in tetrahedral symmetry with 109 o 28' angle with each other. The sp 3 hybrid orbitals have 25% ‘s’ character and 75% 'p' character. JUMP TO EXAMPLES OF SP 3 HYBRIDIZATION sp 3 d HYBRIDIZATION What is sp 3 d hybridization? In sp 3 d hybridization, one 's', three 'p' and one 'd' orbitals of almost equal energy intermix to give five identical and degenerate hybrid orbitals, which are arranged in trigonal bipyramidal symmetry. Among them, three are arranged in trigonal plane and the remaining two orbitals are present above and below the trigonal plane at right angles. The sp 3 d hybrid orbitals have 20% 's', 60% 'p' and 20% 'd' characters. JUMP TO EXAMPLES OF SP 3 D HYBRIDIZATION sp 3 d 2 HYBRIDIZATION What is sp 3 d 2 hybridization? Intermixing of one 's', three 'p' and two 'd' orbitals of almost same energy by giving six identical and degenerate hybrid orbitals is called sp 3 d 2 hybridization. These six sp 3 d 2 orbitals are arranged in octahedral symmetry by making 90 o angles to each other. This arrangement can be visualized as four orbitals arranged in a square plane and the remaining two are oriented above and below this plane perpendicularly. JUMP TO EXAMPLES OF SP 3 D 2 HYBRIDIZATION sp 3 d 3 HYBRIDIZATION What is sp 3 d 3 hybridization? In sp 3 d 3 hybridization, one 's', three 'p' and three 'd' orbitals of almost same energy intermix to give seven sp 3 d 3 hybrid orbitals, which are oriented in pentagonal bipyramidal symmetry. Five among the sp 3 d 3 orbitals are arranged in a pentagonal plane by making 72 o of angles. The remaining are arranged perpendicularly above and below this pentagonal plane. JUMP TO EXAMPLES OF SP 3 D 3 HYBRIDIZATION < VSEPR TheoryChemical bonding: TOCIllustrations of Hybridization > By Aditya vardhan Vutturi
4135
https://delcode.delaware.gov/title8/c001/sc02/index.html
Delaware Code Online The Delaware Code Online Toggle searchToggle navigation Laws of Delaware Laws of Delaware Regulations Regulations Administrative Code Administrative Code Municipal Charters Municipal Charters FAQ Title 8 > Chapter 1 Authenticated PDF § 121 § 122 § 123 § 124 § 125 § 126 § 127 TITLE 8 Corporations CHAPTER 1. General Corporation Law Subchapter II. Powers § 121. General powers. (a) In addition to the powers enumerated in § 122 of this title, every corporation, its officers, directors and stockholders shall possess and may exercise all the powers and privileges granted by this chapter or by any other law or by its certificate of incorporation, together with any powers incidental thereto, so far as such powers and privileges are necessary or convenient to the conduct, promotion or attainment of the business or purposes set forth in its certificate of incorporation. (b) Every corporation shall be governed by the provisions and be subject to the restrictions and liabilities contained in this chapter. 8 Del. C. 1953, §  121; 56 Del. Laws, c. 50.; § 122. Specific powers [For application of this section, see 84 Del. Laws, c. 309, § 6]. Every corporation created under this chapter shall have power, whether or not so provided in the certificate of incorporation, to: (1) Have perpetual succession by its corporate name, unless a limited period of duration is stated in its certificate of incorporation; (2) Sue and be sued in all courts and participate, as a party or otherwise, in any judicial, administrative, arbitrative or other proceeding, in its corporate name; (3) Have a corporate seal, which may be altered at pleasure, and use the same by causing it or a facsimile thereof, to be impressed or affixed or in any other manner reproduced; (4) Purchase, receive, take by grant, gift, devise, bequest or otherwise, lease, or otherwise acquire, own, hold, improve, employ, use and otherwise deal in and with real or personal property, or any interest therein, wherever situated, and to sell, convey, lease, exchange, transfer or otherwise dispose of, or mortgage or pledge, all or any of its property and assets, or any interest therein, wherever situated; (5) Appoint such officers and agents as the business of the corporation requires and to pay or otherwise provide for them suitable compensation; provided that any contract or other appointment or delegation of authority that empowers an officer or agent to act on behalf of the corporation shall be subject to § 141(a) of this title, to the extent it is applicable; (6) Adopt, amend and repeal bylaws in accordance with § 109 of this title; (7) Wind up and dissolve itself in the manner provided in this chapter; (8) Conduct its business, carry on its operations and have offices and exercise its powers within or without this State; (9) Make donations for the public welfare or for charitable, scientific or educational purposes, and in time of war or other national emergency in aid thereof; (10) Be an incorporator, promoter or manager of other corporations of any type or kind; (11) Participate with others in any corporation, partnership, limited partnership, joint venture or other association of any kind, or in any transaction, undertaking or arrangement which the participating corporation would have power to conduct by itself, whether or not such participation involves sharing or delegation of control with or to others; (12) Transact any lawful business which the corporation’s board of directors shall find to be in aid of governmental authority; (13) Make contracts, including contracts of guaranty and suretyship, incur liabilities, borrow money at such rates of interest as the corporation may determine, issue its notes, bonds and other obligations, and secure any of its obligations by mortgage, pledge or other encumbrance of all or any of its property, franchises and income, and make contracts of guaranty and suretyship which are necessary or convenient to the conduct, promotion or attainment of the business of (a) a corporation all of the outstanding stock of which is owned, directly or indirectly, by the contracting corporation, or (b) a corporation which owns, directly or indirectly, all of the outstanding stock of the contracting corporation, or (c) a corporation all of the outstanding stock of which is owned, directly or indirectly, by a corporation which owns, directly or indirectly, all of the outstanding stock of the contracting corporation, which contracts of guaranty and suretyship shall be deemed to be necessary or convenient to the conduct, promotion or attainment of the business of the contracting corporation, and make other contracts of guaranty and suretyship which are necessary or convenient to the conduct, promotion or attainment of the business of the contracting corporation; (14) Lend money for its corporate purposes, invest and reinvest its funds, and take, hold and deal with real and personal property as security for the payment of funds so loaned or invested; (15) Pay pensions and establish and carry out pension, profit sharing, stock option, stock purchase, stock bonus, retirement, benefit, incentive and compensation plans, trusts and provisions for any or all of its directors, officers and employees, and for any or all of the directors, officers and employees of its subsidiaries; (16) Provide insurance for its benefit on the life of any of its directors, officers or employees, or on the life of any stockholder for the purpose of acquiring at such stockholder’s death shares of its stock owned by such stockholder; (17) Renounce, in its certificate of incorporation or by action of its board of directors, any interest or expectancy of the corporation in, or in being offered an opportunity to participate in, specified business opportunities or specified classes or categories of business opportunities that are presented to the corporation or 1 or more of its officers, directors or stockholders; and (18) Notwithstanding § 141(a) of this title, make contracts with 1 or more current or prospective stockholders (or 1 or more beneficial owners of stock), in its or their capacity as such, in exchange for such minimum consideration as determined by the board of directors (which may include inducing stockholders or beneficial owners of stock to take, or refrain from taking, 1 or more actions); provided that no provision of such contract shall be enforceable against the corporation to the extent such contract provision is contrary to the certificate of incorporation or would be contrary to the laws of this State (other than § 115 of this title) if included in the certificate of incorporation. Without limiting the provisions that may be included in any such contracts, the corporation may agree to: (a) restrict or prohibit itself from taking actions specified in the contract, (b) require the approval or consent of 1 or more persons or bodies before the corporation may take actions specified in the contract (which persons or bodies may include the board of directors or 1 or more current or future directors, stockholders or beneficial owners of stock of the corporation), and (c) covenant that the corporation or 1 or more persons or bodies will take, or refrain from taking, actions specified in the contract (which persons or bodies may include the board of directors or 1 or more current or future directors, stockholders or beneficial owners of stock of the corporation). Solely for purposes of applying the proviso in the first sentence of this subsection, a restriction, prohibition or covenant in any such contract that relates to any specified action shall not be deemed contrary to the laws of this State or the certificate of incorporation by reason of a provision of this title or the certificate of incorporation that authorizes or empowers the board of directors (or any 1 or more directors) to take such action. With respect to all contracts made under this paragraph (18), the corporation shall be subject to the remedies available under the law governing the contract, including for any failure to perform or comply with its agreements under such contract. 8 Del. C. 1953, §  122; 56 Del. Laws, c. 50; 57 Del. Laws, c. 148, § 3; 64 Del. Laws, c. 112, § 3; 65 Del. Laws, c. 127, § 2; 71 Del. Laws, c. 339, § 7; 72 Del. Laws, c. 343, § 3; 84 Del. Laws, c. 309, § 1; § 123. Powers respecting securities of other corporations or entities. Any corporation organized under the laws of this State may guarantee, purchase, take, receive, subscribe for or otherwise acquire; own, hold, use or otherwise employ; sell, lease, exchange, transfer or otherwise dispose of; mortgage, lend, pledge or otherwise deal in and with, bonds and other obligations of, or shares or other securities or interests in, or issued by, any other domestic or foreign corporation, partnership, association or individual, or by any government or agency or instrumentality thereof. A corporation while owner of any such securities may exercise all the rights, powers and privileges of ownership, including the right to vote. 8 Del. C. 1953, §  123; 56 Del. Laws, c. 50.; § 124. Effect of lack of corporate capacity or power; ultra vires. No act of a corporation and no conveyance or transfer of real or personal property to or by a corporation shall be invalid by reason of the fact that the corporation was without capacity or power to do such act or to make or receive such conveyance or transfer, but such lack of capacity or power may be asserted: (1) In a proceeding by a stockholder against the corporation to enjoin the doing of any act or acts or the transfer of real or personal property by or to the corporation. If the unauthorized acts or transfer sought to be enjoined are being, or are to be, performed or made pursuant to any contract to which the corporation is a party, the court may, if all of the parties to the contract are parties to the proceeding and if it deems the same to be equitable, set aside and enjoin the performance of such contract, and in so doing may allow to the corporation or to the other parties to the contract, as the case may be, such compensation as may be equitable for the loss or damage sustained by any of them which may result from the action of the court in setting aside and enjoining the performance of such contract, but anticipated profits to be derived from the performance of the contract shall not be awarded by the court as a loss or damage sustained; (2) In a proceeding by the corporation, whether acting directly or through a receiver, trustee or other legal representative, or through stockholders in a representative suit, against an incumbent or former officer or director of the corporation, for loss or damage due to such incumbent or former officer’s or director’s unauthorized act; (3) In a proceeding by the Attorney General to dissolve the corporation, or to enjoin the corporation from the transaction of unauthorized business. 8 Del. C. 1953, §  124; 56 Del. Laws, c. 50; 71 Del. Laws, c. 339, § 8; § 125. Conferring academic or honorary degrees. No corporation organized after April 18, 1945, shall have power to confer academic or honorary degrees unless the certificate of incorporation or an amendment thereof shall so provide and unless the certificate of incorporation or an amendment thereof prior to its being filed in the office of the Secretary of State shall have endorsed thereon the approval of the Department of Education of this State. No corporation organized before April 18, 1945, any provision in its certificate of incorporation to the contrary notwithstanding, shall possess the power aforesaid without first filing in the office of the Secretary of State a certificate of amendment so providing, the filing of which certificate of amendment in the office of the Secretary of State shall be subject to prior approval of the Department of Education, evidenced as hereinabove provided. Approval shall be granted only when it appears to the reasonable satisfaction of the Department of Education that the corporation is engaged in conducting a bona fide institution of higher learning, giving instructions in arts and letters, science or the professions, or that the corporation proposes, in good faith, to engage in that field and has or will have the resources, including personnel, requisite for the conduct of an institution of higher learning. Upon dissolution, all such corporations shall comply with § 8530 of Title 14. Notwithstanding any provision herein to the contrary, no corporation shall have the power to conduct a private business or trade school unless the certificate of incorporation or an amendment thereof, prior to its being filed in the office of the Secretary of State, shall have endorsed thereon the approval of the Department of Education pursuant to Chapter 85 of Title 14. Notwithstanding the foregoing provisions, any corporation conducting a law school, which has its principal place of operation in Delaware, and which intends to meet the standards of approval of the American Bar Association, may, after it has been in actual operation for not less than 1 year, retain at its own expense a dean or dean emeritus of a law school fully approved by the American Bar Association to make an on-site inspection and report concerning the progress of the corporation toward meeting the standards for approval by the American Bar Association. Such dean or dean emeritus shall be chosen by the Attorney General from a panel of 3 deans whose names are presented to the Attorney General as being willing to serve. One such dean on this panel shall be nominated by the trustees of said law school corporation; another dean shall be nominated by a committee of the Student Bar Association of said law school; and the other dean shall be nominated by a committee of lawyers who are parents of students attending such law school. If any of the above-named groups cannot find a dean, it may substitute 2 full professors of accredited law schools for the dean it is entitled to nominate, and in such a case if the Attorney General chooses 1 of such professors, such professor shall serve the function of a dean as herein prescribed. If the dean so retained shall report in writing that, in such dean’s professional judgment, the corporation is attempting, in good faith, to comply with the standards for approval of the American Bar Association and is making reasonable progress toward meeting such standards, the corporation may file a copy of the report with the Secretary of Education and with the Attorney General. Any corporation which complies with these provisions by filing such report shall be deemed to have temporary approval from the State and shall be entitled to amend its certificate of incorporation to authorize the granting of standard academic law degrees. Thereafter, until the law school operated by the corporation is approved by the American Bar Association, the corporation shall file once during each academic year a new report, in the same manner as the first report. If, at any time, the corporation fails to file such a report, or if the dean retained to render such report states that, in such dean’s opinion, the corporation is not continuing to make reasonable progress toward accreditation, the Attorney General, at the request of the Secretary of Education, may file a complaint in the Court of Chancery to suspend said temporary approval and degree-granting power until a further report is filed by a dean or dean emeritus of an accredited law school that the school has resumed its progress towards meeting the standards for approval. Upon approval of the law school by the American Bar Association, temporary approval shall become final, and shall no longer be subject to suspension or vacation under this section. 8 Del. C. 1953, §  125; 56 Del. Laws, c. 50; 59 Del. Laws, c. 207, § 1; 59 Del. Laws, c. 377, § 1; 65 Del. Laws, c. 103, § 2; 71 Del. Laws, c. 339, § 9; 72 Del. Laws, c. 433, § 1; 73 Del. Laws, c. 65, § 7; 74 Del. Laws, c. 249, § 1; § 126. Banking power denied. (a) No corporation organized under this chapter shall possess the power of issuing bills, notes, or other evidences of debt for circulation as money, or the power of carrying on the business of receiving deposits of money. (b) Corporations organized under this chapter to buy, sell and otherwise deal in notes, open accounts and other similar evidences of debt, or to loan money and to take notes, open accounts and other similar evidences of debt as collateral security therefor, shall not be deemed to be engaging in the business of banking. 8 Del. C. 1953, §  126; 56 Del. Laws, c. 50; 57 Del. Laws, c. 148, § 4; § 127. Private foundation; powers and duties. A corporation of this State which is a private foundation under the United States internal revenue laws and whose certificate of incorporation does not expressly provide that this section shall not apply to it is required to act or to refrain from acting so as not to subject itself to the taxes imposed by 26 U.S.C. § 4941 (relating to taxes on self-dealing), § 4942 (relating to taxes on failure to distribute income), § 4943 (relating to taxes on excess business holdings), § 4944 (relating to taxes on investments which jeopardize charitable purpose), or § 4945 (relating to taxable expenditures), or corresponding provisions of any subsequent United States internal revenue law. 8 Del. C. 1953, §  127; 58 Del. Laws, c. 87.; Delaware General Assembly Judicial Executive Contact Twitter Help
4136
https://math.stackexchange.com/questions/4037046/an-elegant-new-proof-of-herons-formula
geometry - An Elegant New Proof of Herons Formula? - Mathematics Stack Exchange Join Mathematics By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy. Sign up with Google OR Email Password Sign up Already have an account? Log in Skip to main content Stack Exchange Network Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. Visit Stack Exchange Loading… Tour Start here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the workings and policies of this site About Us Learn more about Stack Overflow the company, and our products current community Mathematics helpchat Mathematics Meta your communities Sign up or log in to customize your list. more stack exchange communities company blog Log in Sign up Home Questions Unanswered AI Assist Labs Tags Chat Users Teams Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Try Teams for freeExplore Teams 3. Teams 4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams Teams Q&A for work Connect and share knowledge within a single location that is structured and easy to search. Learn more about Teams Hang on, you can't upvote just yet. You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it? Instead, you can save this post to reference later. Save this post for later Not now Thanks for your vote! You now have 5 free votes weekly. Free votes count toward the total vote score does not give reputation to the author Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation. Got it!Go to help center to learn more An Elegant New Proof of Herons Formula? Ask Question Asked 4 years, 7 months ago Modified2 years, 8 months ago Viewed 1k times This question shows research effort; it is useful and clear 1 Save this question. Show activity on this post. A triangle with side lengths a,b,c a,b,c an altitude(h h), where the height(h a h a) intercepts the hypotenuse(a a) such that it is the sum of two side lengths, a=u+v a=u+v and height(h b h b) intercepts hypotenuse(b b) such that it is also the sum of two side lengths b=x+y b=x+y, we can find a simple proof of herons formula. Image here: (Note that h=a u−−√h=a u and h=b x−−√h=b x, giving a u=b x a u=b x) First the equations we have are: u+v=a u+v=a x+y=b x+y=b a u=b x a u=b x a v−−√+b y−−√=c a v+b y=c Substituting v v and y y with u u and x x for the 4 4 th equation: a 2−a u−−−−−−√+b 2−b x−−−−−−√=c a 2−a u+b 2−b x=c Then using a u=b x a u=b x we eliminate x x to find u u: a 2−a u−−−−−−√+b 2−b(a u b)−−−−−−−−−−√=c a 2−a u+b 2−b(a u b)=c u=1 4 a c 2(2 a 2 b 2+2 a 2 c 2−a 4−b 4+2 b 2 c 2−c 4)u=1 4 a c 2(2 a 2 b 2+2 a 2 c 2−a 4−b 4+2 b 2 c 2−c 4) Finally, substituting this into h=a u−−√h=a u: h=1 4 c 2(2 a 2 b 2+2 a 2 c 2−a 4−b 4+2 b 2 c 2−c 4)−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−√h=1 4 c 2(2 a 2 b 2+2 a 2 c 2−a 4−b 4+2 b 2 c 2−c 4) Plugging this into the area formula (A=1 2 c h A=1 2 c h) gives: A=1 2 c 1 4 c 2(2 a 2 b 2+2 a 2 c 2−a 4−b 4+2 b 2 c 2−c 4)−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−√A=1 2 c 1 4 c 2(2 a 2 b 2+2 a 2 c 2−a 4−b 4+2 b 2 c 2−c 4) A=1 16(c 2−(a−b)2)((a+b)2−c 2)−−−−−−−−−−−−−−−−−−−−−−−−−√A=1 16(c 2−(a−b)2)((a+b)2−c 2) A=1 16(a+b−c)(a+b+c)(b+c−a)(a+c−b)−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−√A=1 16(a+b−c)(a+b+c)(b+c−a)(a+c−b) A=s(s−a)(s−b)(s−c)−−−−−−−−−−−−−−−−−√A=s(s−a)(s−b)(s−c) Q.E.D. Thoughts? geometry proof-writing solution-verification Share Share a link to this question Copy linkCC BY-SA 4.0 Cite Follow Follow this question to receive notifications asked Feb 23, 2021 at 17:07 SpoonedBreadSpoonedBread 335 3 3 silver badges 14 14 bronze badges 6 This looks similar to this answer.robjohn –robjohn♦ 2021-02-23 17:12:30 +00:00 Commented Feb 23, 2021 at 17:12 1 That's a proof that uses Pythagorean theorem directly, mine avoids direct use.SpoonedBread –SpoonedBread 2021-02-23 17:14:17 +00:00 Commented Feb 23, 2021 at 17:14 1 What is the exact question please..?lone student –lone student 2021-02-23 17:16:02 +00:00 Commented Feb 23, 2021 at 17:16 2 @SpoonedBread: You want to make sure that the foot of altitude h h lies within side c c. (Otherwise, you need to accommodate the possibility that c c is not necessarily the sum of a v−−√a v and b y−−√b y.) Assuming that c c is the longest side will guarantee this. (I feel like I've offered this advice before. :)Blue –Blue 2021-02-23 17:38:54 +00:00 Commented Feb 23, 2021 at 17:38 3 It looks valid, however, it essentially proves, along the way, the part of the Pythagorean Theorem used. That seems to encumber the proof rather than making it elegant, but that is a matter of opinion.robjohn –robjohn♦ 2021-02-23 17:43:13 +00:00 Commented Feb 23, 2021 at 17:43 |Show 1 more comment 2 Answers 2 Sorted by: Reset to default This answer is useful 1 Save this answer. Show activity on this post. It is certainly a correct proof of Heron's formula that I have not seen before. I don't believe that it is any simpler than the other proofs that I have seen, but I am still entertained by it. However, I do not know if this is an appropriate posting since you do not really have a question other than possibly 'is my proof correct?'. I believe that the stack exchange guidelines suggest we only post questions and answers, not discussions. Share Share a link to this answer Copy linkCC BY-SA 4.0 Cite Follow Follow this answer to receive notifications answered Feb 23, 2021 at 17:17 Sohail FarhangiSohail Farhangi 67 8 8 bronze badges Add a comment| This answer is useful 1 Save this answer. Show activity on this post. In my post, I had shown that r 2(x+y+z)=x y z(result 1)(result 1)r 2(x+y+z)=x y z and K=r s(result 3)(result 3)K=r s where s=x+y+z s=x+y+z is the semi-perimeter of the triangle ABC whose area is K K and sides a=y+z,b=z+x a=y+z,b=z+x and c=x+y c=x+y. From (1), r 2 s=x y z r 2 s=x y z implies that K 2=r 2 s 2=s x y z=s(s−a)(s−b)(s−c)K 2=r 2 s 2=s x y z=s(s−a)(s−b)(s−c) Taking square root on both sides yields the Heron’s Formula K=s(s−a)(s−b)(s−c)−−−−−−−−−−−−−−−−−√K=s(s−a)(s−b)(s−c) Share Share a link to this answer Copy linkCC BY-SA 4.0 Cite Follow Follow this answer to receive notifications answered Jul 16, 2022 at 3:45 LaiLai 32.1k 4 4 gold badges 21 21 silver badges 77 77 bronze badges 2 That sure is a powerful formula!insipidintegrator –insipidintegrator 2022-07-16 03:48:38 +00:00 Commented Jul 16, 2022 at 3:48 See also Cut-the-Knot.com's page on this proof.Blue –Blue 2022-07-16 03:50:11 +00:00 Commented Jul 16, 2022 at 3:50 Add a comment| You must log in to answer this question. Start asking to get answers Find the answer to your question by asking. Ask question Explore related questions geometry proof-writing solution-verification See similar questions with these tags. Featured on Meta Introducing a new proactive anti-spam measure Spevacus has joined us as a Community Manager stackoverflow.ai - rebuilt for attribution Community Asks Sprint Announcement - September 2025 Report this ad Linked 7Euler triangle inequality proof without words 2How do I prove that the area of any triangle can be obtained using "Heron’s Formula" ⟶A t=s(s−a)(s−b)(s−c)−−−−−−−−−−−−−−−−−√⟶A t=s(s−a)(s−b)(s−c)? Related 1A triangle inscribed in a circle of radius 2 2 has angles 45∘45∘ and 60∘60∘. What's its area? 1Sum of the diameters of the incircle and excircle is congruent to the sum of the segments of the altitudes from the orthocenter to the vertices. 1Is this a Viable/New Proof for Pythagoras Theorem? 0Is this a New Proof for Pythagorean Theorem? 6A New Proof of Pythagorean theorem? 1Proving geometrical inequalities 2What is wrong with my proof on the surface area of a square pyramid? Hot Network Questions In Dwarf Fortress, why can't I farm any crops? How to locate a leak in an irrigation system? Childhood book with a girl obsessed with homonyms who adopts a stray dog but gives it back to its owners Overfilled my oil A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man Cannot build the font table of Miama via nfssfont.tex Repetition is the mother of learning Making sense of perturbation theory in many-body physics Bypassing C64's PETSCII to screen code mapping Drawing the structure of a matrix Is it safe to route top layer traces under header pins, SMD IC? RTC battery and VCC switching circuit What is the feature between the Attendant Call and Ground Call push buttons on a B737 overhead panel? My dissertation is wrong, but I already defended. How to remedy? Does the Mishna or Gemara ever explicitly mention the second day of Shavuot? Why do universities push for high impact journal publications? With with auto-generated local variables Storing a session token in localstorage Is it ok to place components "inside" the PCB Can you formalize the definition of infinitely divisible in FOL? Do we need the author's permission for reference What's the expectation around asking to be invited to invitation-only workshops? Does the mind blank spell prevent someone from creating a simulacrum of a creature using wish? What meal can come next? Question feed Subscribe to RSS Question feed To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Why are you flagging this comment? It contains harassment, bigotry or abuse. This comment attacks a person or group. Learn more in our Code of Conduct. It's unfriendly or unkind. This comment is rude or condescending. Learn more in our Code of Conduct. Not needed. This comment is not relevant to the post. Enter at least 6 characters Something else. A problem not listed above. Try to be as specific as possible. Enter at least 6 characters Flag comment Cancel You have 0 flags left today Mathematics Tour Help Chat Contact Feedback Company Stack Overflow Teams Advertising Talent About Press Legal Privacy Policy Terms of Service Your Privacy Choices Cookie Policy Stack Exchange Network Technology Culture & recreation Life & arts Science Professional Business API Data Blog Facebook Twitter LinkedIn Instagram Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547 By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. Accept all cookies Necessary cookies only Customize settings Cookie Consent Preference Center When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy Accept all cookies Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details‎ Performance Cookies [x] Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details‎ Functional Cookies [x] Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details‎ Targeting Cookies [x] Targeting Cookies These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. Cookies Details‎ Cookie List Clear [x] checkbox label label Apply Cancel Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Necessary cookies only Confirm my choices
4137
https://projecteuclid.org/ebooks/books-by-independent-authors/Experiencing-Geometry/chapter/Chapter-4-Straightness-on-Cylinders-and-Cones/10.3792/euclid/9781429799850-8.pdf
Chapter 4 STRAIGHTNESS ON CYLINDERS AND CONES If a cut were made through a cone parallel to its base, how should we conceive of the two opposing surfaces which the cut has produced — as equal or as unequal? If they are unequal, that would imply that a cone is composed of many breaks and protrusions like steps. On the other hand, if they are equal, that would imply that two adjacent intersection planes are equal, which would mean that the cone, being made up of equal rather than unequal circles, must have the same appearance as a cylinder; which is utterly absurd. — Democritus of Abdera (~460 – ~380 B.C.) This quote shows that cylinders and cones were the subject of mathematical inquiry before Euclid (~365 – ~300 B.C.). In this chapter we investigate straightness on cones and cylinders. You should be comfortable with straightness as a local intrinsic notion — this is the bug’s view. This notion of straightness is also the basis for the notion of geodesics in differential geometry. Chapters 4 and 5 can be covered in either order, but we think that the experience with cylinders and cones in Problem 4.1 will help the reader to understand the hyperbolic plane in Problem 5.1. If the reader is comfortable with straightness as a local intrinsic notion, then it is also possible to skip Chapter 4 if Chapters 18 and 24 on geometric manifolds are not going to be covered. However, we suggest that you read the sections at the end of this chapter — Is “Shortest” Always “Straight”? and Relations to Differential Geometry — at least enough to find out what Euclid’s Fourth Postulate has to do with cones and cylinders. Chapter 4 Straightness on Cylinders and Cones 52 When looking at great circles on the surface of a sphere, we were able (except in the case of central symmetry) to see all the symmetries of straight lines from global extrinsic points of view. For example, a great circle extrinsically divides a sphere into two hemispheres that are mirror images of each other. Thus, on a sphere, it is a natural tendency to use the more familiar and comfortable extrinsic lens instead of taking the bug’s local and intrinsic point of view. However, on a cone and cylinder you must use the local, intrinsic point of view because there is no extrinsic view that will work except in special cases. PROBLEM 4.1 STRAIGHTNESS ON CYLINDERS AND CONES a. What lines are straight with respect to the surface of a cylinder or a cone? Why? Why not? b. Examine:  Can geodesics intersect themselves on cylinders and cones?  Can there be more than one geodesic joining two points on cylinders and cones?  What happens on cones with varying cone angles, including cone angles greater than 360°? These are discussed starting in the next section. SUGGESTIONS Problem 4.1 is similar to Problem 2.1, but this time the surfaces are cylinders and cones. Make paper models but consider the cone or cylinder as continuing indefinitely with no top or bottom (except, of course, at the cone point). Again, imagine yourself as a bug whose whole universe is a cone or cylinder. As the bug crawls around on one of these surfaces, what will the bug experience as straight? As before, paths that are straight with respect to a surface are often called the “geodesics” for the surface. As you begin to explore these questions, it is likely that many other related geometric ideas will arise. Do not let seemingly irrelevant excess geometric baggage worry you. Often, you will find yourself getting lost in a tangential idea, and that’s understandable. Ultimately, however, the exploration of related ideas will give you a richer understanding of the scope and depth of the problem. In order to work through possible confusion on this problem, try some of the following suggestions others have found helpful. Each suggestion involves constructing or using models of cones and cylinders.  You may find it helpful to explore cylinders first before beginning to explore cones. This problem has many aspects but focusing at first on the cylinder will simplify some things.  If we make a cone or cylinder by rolling up a sheet of paper, will “straight” stay the same for the bug when we unroll it? Conversely, if we have a straight Chapter 4 Straightness on Cylinders and Cones 53 line drawn on a sheet of paper and roll it up, will it continue to be experienced as straight for the bug crawling on the paper? We are assuming here that the paper will not stretch, and its thickness is negligible.  Lay a stiff ribbon or straight strip of paper on a cylinder or cone. Convince yourself that it will follow a straight line with respect to the surface. Also, convince yourself that straight lines on the cylinder or cone, when looked at locally and intrinsically, have the same symmetries as on the plane.  If you intersect a cylinder by a flat plane and unroll it, what kind of curve do you get? Is it ever straight? (One way to see this curve is to dip a paper cylinder into water.)  On a cylinder or cone, can a geodesic ever intersect itself? How many times? This question is explored in more detail in Problem 4.2, which the interested reader may turn to now.  Can there be more than one geodesic joining two points on a cylinder or cone? How many? Is there always at least one? Again, this question is explored in more detail in Problem 4.2. There are several important things to keep in mind while working on this problem. First, you absolutely must make models. If you attempt to visualize lines on a cone or cylinder, you are bound to make claims that you would easily see are mistaken if you investigated them on an actual cone or cylinder. Many students find it helpful to make models using transparent material. Second, as with the sphere, you must think about lines and triangles on the cone and cylinder in an intrinsic way — always looking at things from a bug’s point of view. We are not interested in what’s happening in 3-space, only what you would see and experience if you were restricted to the surface of a cone or cylinder. And last, but certainly not least, you must look at cones of different shapes, that is, cones with varying cone angles. CONES WITH VARYING CONE ANGLES Geodesics behave differently on differently shaped cones. So an important variable is the cone angle. The cone angle is generally defined as the angle measured around the point of the cone on the surface. Notice that this is an intrinsic description of angle. The bug could measure a cone angle (in radians) by determining the circumference of an intrinsic circle with center at the cone point and then dividing that circumference by the radius of the circle. We can determine the cone angle extrinsically in the following way: Cut the cone along a generator (a line on the cone through the cone point) and flatten the cone. The measure of the cone angle is then the angle measure of the flattened planar sector. Chapter 4 Straightness on Cylinders and Cones 54 Figure 4.1 Making a 180° cone For example, if we take a piece of paper and bend it so that half of one side meets up with the other half of the same side, we will have a 180-degree cone (Figure 4.1). A 90º cone is also easy to make — just use the corner of a paper sheet and bring one side around to meet the adjacent side. Also be sure to look at larger cones. One convenient way to do this is to make a cone with a variable cone angle. This can be accomplished by taking a sheet of paper and cutting (or tearing) a slit from one edge to the center. (See Figure 4.2.) A rectangular sheet will work but a circular sheet is easier to picture. Note that it is not necessary that the slit be straight! Figure 4.2 A cone with variable cone angle (0 –360°) You are already familiar with a 360º cone — it’s just a plane. The cone angle can also be larger than 360º. A common larger cone is the 450º cone. You probably have a cone like this somewhere on the walls, floor, and ceiling of your room. You can easily make one by cutting a slit in a piece of paper and inserting a 90º slice (360º + 90º = 450º) as in Figure 4.3. Figure 4.3 How to make a 450º cone Chapter 4 Straightness on Cylinders and Cones 55 Two cone angles on a ceiling You may have trouble believing that this is a cone but remember that just because it cannot hold ice cream does not mean it is not a cone. If you will look around in the room you are, perhaps you can locate a corner where five right angles meet – that is 450º cone. It is important to realize that when you change the shape of the cone like this (that is, either it is with ruffles or straight lines), you are only changing its extrinsic appearance. Intrinsically (from the bug’s point of view) there is no difference. It may be helpful for you to discuss some definitions of a cone, such as the following: Take any simple (non-intersecting) closed curve a on a sphere and the center P of the sphere. A cone is the union of the rays that start at P and go through each point on a. The cone angle is then equal to (length of a)/ (radius of sphere), in radians. Do you see why? You can also make a cone with variable angle of more than 180°: Take two sheets of paper and slit them together to their centers as in Figure 4.4. Tape the right side of the top slit to the left side of the bottom slit as pictured. Now slide the other sides of the slits. Try it! Figure 4.4 Variable cone angle larger than 360° Chapter 4 Straightness on Cylinders and Cones 56 Experiment by making paper examples of cones like those shown in Figure 4.4. What happens to the triangles and lines on a 450º cone? Is the shortest path always straight? Does every pair of points determine a straight line? Finally, also consider line symmetries on the cone and cylinder. Check to see if the symmetries you found on the plane will work on these surfaces and remember to think intrinsically and locally. A special class of geodesics on the cone and cylinder is the generators. These are the straight lines that go through the cone point on the cone or go parallel to the axis of the cylinder. These lines have some extrinsic symmetries (can you see which ones?), but in general, geodesics have only local, intrinsic symmetries. Also, on the cone, think about the region near the cone point — what is happening there that makes it different from the rest of the cone? Few more explorations of geodesics on the cone can be found It is best if you experiment with paper models to find out what geodesics look like on the cone and cylinder before reading further. GEODESICS ON CYLINDERS Let us first look at the three classes of straight lines on a cylinder. When walking on the surface of a cylinder, a bug might walk along a vertical generator. See Figure 4.5. Figure 4.5 Vertical generators are straight It might walk along an intersection of a horizontal plane with the cylinder, what we will call a great circle. See Figure 4.6 Figure 4.6 Great circles are intrinsically straight Chapter 4 Straightness on Cylinders and Cones 57 Or, the bug might walk along a spiral or helix of constant slope around the cylinder. See Figure 4.7 and the photo at the beginning of this chapter depicting lightening damage to the tree. Watch a squirrel running up the tree! Figure 4.7 Helixes are intrinsically straight Helixes can be seen on outside parking garages and in sculptures Why are these geodesics? How can you convince yourself? And why are these the only geodesics? GEODESICS ON CONES Now let us look at the classes of straight lines on a cone. Walking along a generator: When looking at straight paths on a cone, you will be forced to consider straightness at the cone point. You might decide that there is no way the bug can go straight once it reaches the cone point, and thus a straight path leading up to the cone point ends there. Or you might decide that the bug can find a continuing path that has at least some of the symmetries of a straight line. Do you see which path this is? Or you might decide that the straight continuing path(s?) is the limit of geodesics that just miss the cone point. See Figure 4.8. Figure 4.8 Bug walking straight over the cone point Help! Chapter 4 Straightness on Cylinders and Cones 58 Walking straight and around: If you use a ribbon on a 90º cone, then you can see that this cone has a geodesic like the one depicted in Figure 4.9. This particular geodesic intersects itself. However, check to see that this property depends on the cone angle. In particular, if the cone angle is more than 180°, then geodesics do not intersect themselves. And if the cone angle is less than 90°, then geodesics (except for generators) intersect at least two times. Try it out! Later, in Problem 4.2, we will describe a tool that will help you determine how the number of self- intersections depends on the cone angle. Figure 4.9 A geodesic intersecting itself on a 90° cone PROBLEM 4.2 GLOBAL PROPERTIES OF GEODESICS Now we will look more closely at long geodesics that wrap around on a cylinder or cone. Several questions have arisen. a. How do we determine the different geodesics connecting two points? How many are there? How does it depend on the cone angle? Is there always at least one geodesic joining each pair of points? How can we justify our conjectures? b. How many times can a geodesic on a cylinder or cone intersect itself? How are the self-intersections related to the cone angle? At what angle does the geodesic intersect itself? How can we justify these relationships? SUGGESTIONS Here we offer the tool of covering spaces, which may help you explore these questions. The method of coverings is so named because it utilizes layers (or sheets) that each cover the surface. We will first start with a cylinder because it is easier and then move on to a cone. n -SHEETED COVERINGS OF A CYLINDER To understand how the method of coverings works, imagine taking a paper cylinder and cutting it axially (along a vertical generator) so that it unrolls into a plane. This is probably the way you constructed cylinders to study this problem before. The unrolled sheet (a portion of the plane) is said to be a 1-sheeted covering of the cylinder. See Figure Chapter 4 Straightness on Cylinders and Cones 59 4.10. If you marked two points on the cylinder, A and B, as indicated in the figure, when the cylinder is cut and unrolled into the covering, these two points become two points on the covering (which are labeled by the same letters in the figure). The two points on the covering are said to be lifts of the points on the cylinder. Figure 4.10 A 1-sheeted covering of a cylinder Now imagine attaching several of these “sheets” together, end to end. When rolled up, each sheet will go around the cylinder exactly once — they will each cover the cylinder. (Rolls of toilet paper or paper towels give a rough idea of coverings of a cylinder.) Also, each sheet of the covering will have the points A and B in identical locations. You can see this (assuming the paper thickness is negligible) by rolling up the coverings and making points by sticking a sharp object through the cylinder. This means that all the A’s are coverings of the same point on the cylinder and all the B’s are coverings of the same point on the cylinder. We just have on the covering several representations, or lifts, of each point on the cylinder. Figure 4.11 depicts a 3-sheeted covering space for a cylinder and six geodesics joining A to B. (One of them is the most direct path from A to B and the others spiral once, twice, or three times around the cylinder in one of two directions.) cut Figure 4.11 A 3-sheeted covering space for a cylinder cut A B  A B Chapter 4 Straightness on Cylinders and Cones 60 We could also have added more sheets to the covering on either the right or left side. You can now roll these sheets back into a cylinder and see what the geodesics look like. Remember to roll sheets up so that each sheet of the covering covers the cylinder exactly once — all of the vertical lines between the coverings should lie on the same generator of the cylinder. Note that if you do this with ordinary paper, part or all of some geodesics will be hidden, even though they are all there. It may be easier to see what’s happening if you use transparencies. This method works because straightness is a local intrinsic property. Thus, lines that are straight when the coverings are laid out in a plane will still be straight when rolled into a cylinder. Remember that bending the paper does not change the intrinsic nature of the surface. Bending only changes the curvature that we see extrinsically. It is important always to look at the geodesics from the bug’s point of view. The cylinder and its covering are locally isometric. Use coverings to investigate Problem 4.2 on the cylinder. The global behavior of straight lines may be easier to see on the covering. n-SHEETED (BRANCHED) COVERINGS OF A CONE Figure 4.12 1-sheeted covering of a 270° cone Figure 4.12 shows a 1-sheeted covering of a cone. The sheet of paper and the cone are locally isometric except at the cone point. The cone point is called a branch point of the covering. We talk about lifts of points on the cone in the same way as on the cylinder. In Figure 4.12 we depict a 1-sheeted covering of a 270° cone and label two points and their lifts. A 4-sheeted covering space for a cone is depicted in Figure 4.13. Each of the rays drawn from the center of the covering is a lift of a single ray on the cone. Similarly, the points marked on the covering are the lifts of the points A and B on the cone. In the covering there are four segments joining a lift of A to different lifts of B. Each of these segments is the lift of a different geodesic segment joining A to B. Chapter 4 Straightness on Cylinders and Cones 61 Figure 4.13 4-sheeted covering space for a 89° cone Think about ways that the bug can use coverings as a tool to expand its exploration of surface geodesics. Also, think about ways you can use coverings to justify your observations in an intrinsic way. It is important to be precise; you don’t want the bug to get lost! Count the number of ways in which you can connect two points with a straight line and relate those countings with the cone angle. Does the number of straight paths only depend on the cone angle? Look at the 450° cone and see if it is always possible to connect any two points with a straight line. Make paper models! It is not possible to get an equation that relates the cone angle to the number of geodesics joining every pair of points. However, it is possible to find a formula that works for most pairs. Make covering spaces for cones of different size angles and refine the guesses you have already made about the numbers of self-intersections. In studying the self-intersections of a geodesic l on a cone, it may be helpful for you to consider the ray R that is perpendicular to the line l. (See Figure 4.14.) Now study one lift of the geodesic l and its relationship to the lifts of the ray R. Note that the seams between individual wedges are lifts of R. Figure 4.14 Self-intersections on a cone with angle  A recent tidbit about coverings: In 1914 Henri Lebesgue (French, 1875-1941) posed a question: What is the shape with the smallest area that can completely cover a host of other shapes (which all share a certain trait in common)? The shapes should be such that no two points are further than one unit apart. In 2014 retired software engineer Philip Gibbs ran computer simulations on 200 randomly generated shapes with diameter 1. He kept “trimming corners” of hexagon and found that to be smallest known covering. ( Chapter 4 Straightness on Cylinders and Cones 62 LOCALLY ISOMETRIC By now you should realize that when a piece of paper is rolled or bent into a cylinder or cone, the bug’s local and intrinsic experience of the surface does not change except at the cone point. Extrinsically, the piece of paper and the cone are different, but in terms of the local geometry intrinsic to the surface they differ only at the cone point. Two geometric spaces, G and H, are said to be locally isometric at the points G in G and H in H if the local intrinsic experience at G is the same as the experience at H. That is, there are neighborhoods of G and H that are identical in terms of their intrinsic geometric properties. A cylinder and the plane are locally isometric (at each point) and the plane and a cone are locally isometric except at the cone point. Two cones are locally isometric at the cone points only if their cone angles are the same. Because cones and cylinders are locally isometric with the plane, locally they have the same geometric properties. Later, we will show that a sphere is not locally isometric with the plane — be on the lookout for a result that will imply this. IS “SHORTEST” ALWAYS “STRAIGHT”? We are often told that “a straight line is the shortest distance between two points,” but is this really true? As we have already seen on a sphere, two points not opposite each other are connected by two straight paths (one going one way around a great circle and one going the other way). Only one of these paths is shortest. The other is also straight, but not the shortest straight path. Consider a model of a cone with angle 450°. Notice that such cones appear commonly in buildings as so-called “outside corners” (see Figure 4.3). It is best, however, to have a paper model that can be flattened. Figure 4.15 There is no straight (symmetric) path from A to B Use your model to investigate which points on the cone can be joined by straight lines (in the sense of having reflection-in-the-line symmetry). In particular, look at points such as those labeled A and B in Figure 4.15. Convince yourself that there is no path from A to B that is straight (in the sense of having reflection-in-the-line symmetry), and for these points the shortest path goes through the cone point and thus is not straight (in the sense of having symmetry). Chapter 4 Straightness on Cylinders and Cones 63 Figure 4.16 The shortest path is not straight (in the sense of symmetry) Here is another example: Think of a bug crawling on a plane with a tall box sitting on that plane (refer to Figure 4.16). This combination surface — the plane with the box sticking out of it — has eight cone points. The four at the top of the box have 270° cone angles, and the four at the bottom of the box have 450° cone angles (180° on the box and 270° on the plane). What is the shortest path between points X and Y, points on opposite sides of the box? Is the straight path the shortest? Is the shortest path straight? To check that the shortest path is not straight, try to see that at the bottom corners of the box the two sides of the path have different angular measures. (If X and Y are close to the box, then the angle on the box side of the path measures a little more than 180° and the angle on the other side measures almost 270°.) RELATIONS TO DIFFERENTIAL GEOMETRY We see that sometimes a straight path is not shortest, and the shortest path is not straight. Does it then make sense to say (as most books do) that in Euclidean geometry a straight line is the shortest distance between two points? In differential geometry, on “smooth” surfaces, “straight” and “shortest” are more nearly the same. A smooth surface is essentially what it sounds like. More precisely, a surface is smooth at a point if, when you zoom in on the point, the surface becomes indistinguishable from a flat plane. (For details of this definition, see Problem 4.1 in [DG: Henderson, See also the last section and especially the endnote in Chapter 1.) Note that a cone is not smooth at the cone point, but a sphere and a cylinder are both smooth at every point. The following is a theorem from differential geometry: THEOREM 4.1: If a surface is smooth, then an intrinsically straight line (geodesic) on the surface is always the shortest path between “nearby” points. If the surface is also complete (every geodesic on it can be extended indefinitely), then any two points can be joined by a geodesic that is the shortest path between them. See [DG: Henderson], Problems 7.4b and 7.4d. Consider a planar surface with a hole removed. Check that for points near opposite sides of the hole, the shortest path (on the planar surface with hole removed) is not straight Chapter 4 Straightness on Cylinders and Cones 64 because the shortest path must go around the hole. We encourage the reader to discuss how each of the previous examples and problems is in harmony with this theorem. Note that the statement “every geodesic on the surface can be extended indefinitely” is a reasonable interpretation of Euclid’s Second Postulate: Every limited straight line can be extended indefinitely to a (unique) straight line. Note that the Second Postulate does not hold on a cone unless you consider geodesics to continue through the cone point. Also, Euclid defines a right angle as follows: When a straight line intersects another straight line such that the adjacent angles are equal to one another, then the equal angles are called right angles. Note that if you consider geodesics to continue through the cone point, then right angles at a cone point are not equal to right angles at points where the cone is locally isometric to the plane. And Euclid goes on to state as his Fourth Postulate: All right angles are equal. Thus, Euclid’s Second Postulate or Fourth Postulate rules out cones and any surface with isolated cone points. What is further ruled out by Euclid’s Fourth Postulate would depend on formulating more precisely just what it says. It is not clear (at least to the authors!) whether there is something we would want to call a surface that could be said to satisfy Euclid’s Fourth Postulate and not be a smooth surface. However, we can see that Euclid’s postulate at least gives part of the meaning of “smooth surface,” because it rules out isolated cone points. When we were in high school geometry class, we were confused why Euclid would have made such a postulate as his Postulate 4 — how could they possibly not be equal? In this chapter we have discovered that on cones right angles are not all equal.
4138
https://en.wikipedia.org/wiki/Phasor
Jump to content Search Contents (Top) 1 Notation 2 Definition 3 Arithmetic 3.1 Multiplication by a constant (scalar) 3.2 Addition 3.3 Differentiation and integration 3.4 Ratio of phasors 4 Applications 4.1 Circuit laws 4.2 Power engineering 4.3 Telecommunications: analog modulations 5 See also 6 Footnotes 7 References 8 Further reading 9 External links Phasor Afrikaans العربية Български Català Čeština Deutsch Español Esperanto Euskara فارسی Français Galego 한국어 हिन्दी Italiano עברית Magyar मराठी Nederlands 日本語 Norsk bokmål پنجابی Polski Português Русский Shqip Simple English Slovenčina Svenska Türkçe Українська اردو 中文 Edit links Article Talk Read Edit View history Tools Actions Read Edit View history General What links here Related changes Upload file Permanent link Page information Cite this page Get shortened URL Download QR code Print/export Download as PDF Printable version In other projects Wikimedia Commons Wikidata item Appearance From Wikipedia, the free encyclopedia Complex number representing a particular sine wave For other uses, see Phasor (disambiguation). Not to be confused with phaser. "Complex amplitude" redirects here. For the quantum-mechanical concept, see Complex probability amplitude. In physics and engineering, a phasor (a portmanteau of phase vector) is a complex number representing a sinusoidal function whose amplitude A and initial phase θ are time-invariant and whose angular frequency ω is fixed. It is related to a more general concept called analytic representation, which decomposes a sinusoid into the product of a complex constant and a factor depending on time and frequency. The complex constant, which depends on amplitude and phase, is known as a phasor, or complex amplitude, and (in older texts) sinor or even complexor. A common application is in the steady-state analysis of an electrical network powered by time varying current where all signals are assumed to be sinusoidal with a common frequency. Phasor representation allows the analyst to represent the amplitude and phase of the signal using a single complex number. The only difference in their analytic representations is the complex amplitude (phasor). A linear combination of such functions can be represented as a linear combination of phasors (known as phasor arithmetic or phasor algebra: 53) and the time/frequency dependent factor that they all have in common. The origin of the term phasor rightfully suggests that a (diagrammatic) calculus somewhat similar to that possible for vectors is possible for phasors as well. An important additional feature of the phasor transform is that differentiation and integration of sinusoidal signals (having constant amplitude, period and phase) corresponds to simple algebraic operations on the phasors; the phasor transform thus allows the analysis (calculation) of the AC steady state of RLC circuits by solving simple algebraic equations (albeit with complex coefficients) in the phasor domain instead of solving differential equations (with real coefficients) in the time domain.[a] The originator of the phasor transform was Charles Proteus Steinmetz working at General Electric in the late 19th century. He got his inspiration from Oliver Heaviside. Heaviside's operational calculus was modified so that the variable p becomes jω. The complex number j has simple meaning: phase shift. Glossing over some mathematical details, the phasor transform can also be seen as a particular case of the Laplace transform (limited to a single frequency), which, in contrast to phasor representation, can be used to (simultaneously) derive the transient response of an RLC circuit. However, the Laplace transform is mathematically more difficult to apply and the effort may be unjustified if only steady state analysis is required. Notation [edit] See also: Vector notation Phasor notation (also known as angle notation) is a mathematical notation used in electronics engineering and electrical engineering. A vector whose polar coordinates are magnitude and angle is written can represent either the vector or the complex number , according to Euler's formula with , both of which have magnitudes of 1. The angle may be stated in degrees with an implied conversion from degrees to radians. For example would be assumed to be which is the vector or the number Multiplication and division of complex numbers become straight forward through the phasor notation. Given the vectors and , the following is true: : , : . Definition [edit] A real-valued sinusoid with constant amplitude, frequency, and phase has the form: where only parameter is time-variant. The inclusion of an imaginary component: gives it, in accordance with Euler's formula, the factoring property described in the lead paragraph: whose real part is the original sinusoid. The benefit of the complex representation is that linear operations with other complex representations produces a complex result whose real part reflects the same linear operations with the real parts of the other complex sinusoids. Furthermore, all the mathematics can be done with just the phasors and the common factor is reinserted prior to the real part of the result. The function is an analytic representation of Figure 2 depicts it as a rotating vector in the complex plane. It is sometimes convenient to refer to the entire function as a phasor, as we do in the next section. Arithmetic [edit] See also: Complex number § Relations and operations Multiplication by a constant (scalar) [edit] Multiplication of the phasor by a complex constant, , produces another phasor. That means its only effect is to change the amplitude and phase of the underlying sinusoid: In electronics, would represent an impedance, which is independent of time. In particular it is not the shorthand notation for another phasor. Multiplying a phasor current by an impedance produces a phasor voltage. But the product of two phasors (or squaring a phasor) would represent the product of two sinusoids, which is a non-linear operation that produces new frequency components. Phasor notation can only represent systems with one frequency, such as a linear system stimulated by a sinusoid. Addition [edit] The sum of multiple phasors produces another phasor. That is because the sum of sinusoids with the same frequency is also a sinusoid with that frequency: where: and, if we take , then is: if with the signum function; if ; if . or, via the law of cosines on the complex plane (or the trigonometric identity for angle differences): where A key point is that A3 and θ3 do not depend on ω or t, which is what makes phasor notation possible. The time and frequency dependence can be suppressed and re-inserted into the outcome as long as the only operations used in between are ones that produce another phasor. In angle notation, the operation shown above is written: Another way to view addition is that two vectors with coordinates [A1 cos(ωt + θ1), A1 sin(ωt + θ1)] and [A2 cos(ωt + θ2), A2 sin(ωt + θ2)] are added vectorially to produce a resultant vector with coordinates [A3 cos(ωt + θ3), A3 sin(ωt + θ3)] (see animation). In physics, this sort of addition occurs when sinusoids interfere with each other, constructively or destructively. The static vector concept provides useful insight into questions like this: "What phase difference would be required between three identical sinusoids for perfect cancellation?" In this case, simply imagine taking three vectors of equal length and placing them head to tail such that the last head matches up with the first tail. Clearly, the shape which satisfies these conditions is an equilateral triangle, so the angle between each phasor to the next is 120° (2π⁄3 radians), or one third of a wavelength λ⁄3. So the phase difference between each wave must also be 120°, as is the case in three-phase power. In other words, what this shows is that: In the example of three waves, the phase difference between the first and the last wave was 240°, while for two waves destructive interference happens at 180°. In the limit of many waves, the phasors must form a circle for destructive interference, so that the first phasor is nearly parallel with the last. This means that for many sources, destructive interference happens when the first and last wave differ by 360 degrees, a full wavelength . This is why in single slit diffraction, the minima occur when light from the far edge travels a full wavelength further than the light from the near edge. As the single vector rotates in an anti-clockwise direction, its tip at point A will rotate one complete revolution of 360° or 2π radians representing one complete cycle. If the length of its moving tip is transferred at different angular intervals in time to a graph as shown above, a sinusoidal waveform would be drawn starting at the left with zero time. Each position along the horizontal axis indicates the time that has elapsed since zero time, t = 0. When the vector is horizontal the tip of the vector represents the angles at 0°, 180°, and at 360°. Likewise, when the tip of the vector is vertical it represents the positive peak value, (+Amax) at 90° or π⁄2 and the negative peak value, (−Amax) at 270° or 3π⁄2. Then the time axis of the waveform represents the angle either in degrees or radians through which the phasor has moved. So we can say that a phasor represents a scaled voltage or current value of a rotating vector which is "frozen" at some point in time, (t) and in our example above, this is at an angle of 30°. Sometimes when we are analysing alternating waveforms we may need to know the position of the phasor, representing the alternating quantity at some particular instant in time especially when we want to compare two different waveforms on the same axis. For example, voltage and current. We have assumed in the waveform above that the waveform starts at time t = 0 with a corresponding phase angle in either degrees or radians. But if a second waveform starts to the left or to the right of this zero point, or if we want to represent in phasor notation the relationship between the two waveforms, then we will need to take into account this phase difference, Φ of the waveform. Consider the diagram below from the previous Phase Difference tutorial. Differentiation and integration [edit] The time derivative or integral of a phasor produces another phasor.[b] For example: Therefore, in phasor representation, the time derivative of a sinusoid becomes just multiplication by the constant . Similarly, integrating a phasor corresponds to multiplication by The time-dependent factor, is unaffected. When we solve a linear differential equation with phasor arithmetic, we are merely factoring out of all terms of the equation, and reinserting it into the answer. For example, consider the following differential equation for the voltage across the capacitor in an RC circuit: When the voltage source in this circuit is sinusoidal: we may substitute where phasor and phasor is the unknown quantity to be determined. In the phasor shorthand notation, the differential equation reduces to: Derivation | | | --- | | | Eq.1 | Since this must hold for all , specifically: it follows that: | | | --- | | | Eq.2 | It is also readily seen that: Substituting these into Eq.1 and Eq.2, multiplying Eq.2 by and adding both equations gives: Solving for the phasor capacitor voltage gives: As we have seen, the factor multiplying represents differences of the amplitude and phase of relative to and In polar coordinate form, the first term of the last expression is: where . Therefore: Ratio of phasors [edit] A quantity called complex impedance is the ratio of two phasors, which is not a phasor, because it does not correspond to a sinusoidally varying function. Applications [edit] Circuit laws [edit] With phasors, the techniques for solving DC circuits can be applied to solve linear AC circuits.[a] Ohm's law for resistors : A resistor has no time delays and therefore doesn't change the phase of a signal therefore V = IR remains valid. Ohm's law for resistors, inductors, and capacitors : V = IZ where Z is the complex impedance. Kirchhoff's circuit laws : Work with voltages and current as complex phasors. In an AC circuit we have real power (P) which is a representation of the average power into the circuit and reactive power (Q) which indicates power flowing back and forth. We can also define the complex power S = P + jQ and the apparent power which is the magnitude of S. The power law for an AC circuit expressed in phasors is then S = VI (where I is the complex conjugate of I, and the magnitudes of the voltage and current phasors V and of I are the RMS values of the voltage and current, respectively). Given this we can apply the techniques of analysis of resistive circuits with phasors to analyze single frequency linear AC circuits containing resistors, capacitors, and inductors. Multiple frequency linear AC circuits and AC circuits with different waveforms can be analyzed to find voltages and currents by transforming all waveforms to sine wave components (using Fourier series) with magnitude and phase then analyzing each frequency separately, as allowed by the superposition theorem. This solution method applies only to inputs that are sinusoidal and for solutions that are in steady state, i.e., after all transients have died out. The concept is frequently involved in representing an electrical impedance. In this case, the phase angle is the phase difference between the voltage applied to the impedance and the current driven through it. Power engineering [edit] Main article: Phasor measurement unit In analysis of three-phase AC power systems, usually a set of phasors is defined as the three complex cube roots of unity, graphically represented as unit magnitudes at angles of 0, 120 and 240 degrees. By treating polyphase AC circuit quantities as phasors, balanced circuits can be simplified and unbalanced circuits can be treated as an algebraic combination of symmetrical components. This approach greatly simplifies the work required in electrical calculations of voltage drop, power flow, and short-circuit currents. In the context of power systems analysis, the phase angle is often given in degrees, and the magnitude in RMS value rather than the peak amplitude of the sinusoid. The technique of synchrophasors uses digital instruments to measure the phasors representing transmission system voltages at widespread points in a transmission network. Differences among the phasors indicate power flow and system stability. Telecommunications: analog modulations [edit] The rotating frame picture using phasor can be a powerful tool to understand analog modulations such as amplitude modulation (and its variants) and frequency modulation. where the term in brackets is viewed as a rotating vector in the complex plane. The phasor has length , rotates anti-clockwise at a rate of revolutions per second, and at time makes an angle of with respect to the positive real axis. The waveform can then be viewed as a projection of this vector onto the real axis. A modulated waveform is represented by this phasor (the carrier) and two additional phasors (the modulation phasors). If the modulating signal is a single tone of the form , where is the modulation depth and is the frequency of the modulating signal, then for amplitude modulation the two modulation phasors are given by, The two modulation phasors are phased such that their vector sum is always in phase with the carrier phasor. An alternative representation is two phasors counter rotating around the end of the carrier phasor at a rate relative to the carrier phasor. That is, Frequency modulation is a similar representation except that the modulating phasors are not in phase with the carrier. In this case the vector sum of the modulating phasors is shifted 90° from the carrier phase. Strictly, frequency modulation representation requires additional small modulation phasors at etc, but for most practical purposes these are ignored because their effect is very small. See also [edit] In-phase and quadrature components Constellation diagram Analytic signal, a generalization of phasors for time-variant amplitude, phase, and frequency. Complex envelope Phase factor, a phasor of unit magnitude Footnotes [edit] ^ a b Including analysis of the AC circuits.: 53 ^ This results from which means that the complex exponential is the eigenfunction of the derivative operator. References [edit] ^ Huw Fox; William Bolton (2002). Mathematics for Engineers and Technologists. Butterworth-Heinemann. p. 30. ISBN 978-0-08-051119-1. ^ Clay Rawlins (2000). Basic AC Circuits (2nd ed.). Newnes. p. 124. ISBN 978-0-08-049398-5. ^ Bracewell, Ron. The Fourier Transform and Its Applications. McGraw-Hill, 1965. p269 ^ K. S. Suresh Kumar (2008). Electric Circuits and Networks. Pearson Education India. p. 272. ISBN 978-81-317-1390-7. ^ Kequian Zhang; Dejie Li (2007). Electromagnetic Theory for Microwaves and Optoelectronics (2nd ed.). Springer Science & Business Media. p. 13. ISBN 978-3-540-74296-8. ^ a b c J. Hindmarsh (1984). Electrical Machines & their Applications (4th ed.). Elsevier. p. 58. ISBN 978-1-4832-9492-6. ^ a b Gross, Charles A. (2012). Fundamentals of electrical engineering. Thaddeus Adam Roppel. Boca Raton, FL: CRC Press. ISBN 978-1-4398-9807-9. OCLC 863646311. ^ William J. Eccles (2011). Pragmatic Electrical Engineering: Fundamentals. Morgan & Claypool Publishers. p. 51. ISBN 978-1-60845-668-0. ^ a b Richard C. Dorf; James A. Svoboda (2010). Introduction to Electric Circuits (8th ed.). John Wiley & Sons. p. 661. ISBN 978-0-470-52157-1. ^ Allan H. Robbins; Wilhelm Miller (2012). Circuit Analysis: Theory and Practice (5th ed.). Cengage Learning. p. 536. ISBN 978-1-285-40192-8. ^ a b c Won Y. Yang; Seung C. Lee (2008). Circuit Systems with MATLAB and PSpice. John Wiley & Sons. pp. 256–261. ISBN 978-0-470-82240-1. ^ Basil Mahon (2017). The Forgotten Genius of Oliver Heaviside (1st ed.). Prometheus Books Learning. p. 230. ISBN 978-1-63388-331-4. ^ Nilsson, James William; Riedel, Susan A. (2008). Electric circuits (8th ed.). Prentice Hall. p. 338. ISBN 978-0-13-198925-2., Chapter 9, page 338 ^ Rawlins, John C. (2000). Basic AC Circuits (Second ed.). Newnes. pp. 427–452. ISBN 9780750671736. ^ Singh, Ravish R (2009). "Section 4.5: Phasor Representation of Alternating Quantities". Electrical Networks. Mcgraw Hill Higher Education. p. 4.13. ISBN 978-0070260962. ^ Clayton, Paul (2008). Introduction to electromagnetic compatibility. Wiley. p. 861. ISBN 978-81-265-2875-2. ^ de Oliveira, H.M. and Nunes, F.D. About the Phasor Pathways in Analogical Amplitude Modulations. International Journal of Research in Engineering and Science (IJRES) Vol.2, N.1, Jan., pp.11-18, 2014. ISSN 2320-9364 Further reading [edit] Douglas C. Giancoli (1989). Physics for Scientists and Engineers. Prentice Hall. ISBN 0-13-666322-2. Dorf, Richard C.; Tallarida, Ronald J. (1993-07-15). Pocket Book of Electrical Engineering Formulas (1 ed.). Boca Raton, FL: CRC Press. pp. 152–155. ISBN 0849344735. External links [edit] Wikimedia Commons has media related to Phasors. Wikiversity has a lesson on Phasor algebra Phasor Phactory Visual Representation of Phasors Polar and Rectangular Notation Phasor in Telecommunication Retrieved from " Categories: Electrical circuits AC power Interference Trigonometry Hidden categories: Articles with short description Short description is different from Wikidata Commons category link is on Wikidata Add topic
4139
https://www.geogebra.org/m/vedpwzb4
Shortest Distance, Perp Bis, and Angle Bis Conjectures – GeoGebra Google Classroom GeoGebra Classroom Sign in Search Google Classroom GeoGebra Classroom Home Resources Profile Classroom App Downloads Shortest Distance, Perp Bis, and Angle Bis Conjectures Author:gmitesser, canhalt_1 Topic:Geometry Shortest Distance Conjecture Investigation Shortest Distance Conjecture Move point C above until the length of CD is the shortest. Notice the angle measure that results. Then, complete the conjecture and add to your vocabulary list. Shortest Distance Conjecture: The shortest distance from a point to a line is measured along the _________ segment from the point to the line. 𝜋 Check my answer Perpendicular and Angle Bisectors Investigations Perpendicular Bisector Conjecture Line CM the perpendicular bisector of segment AB. Move point C along the perpendicular bisector. Then, complete the following conjecture and add to your vocabulary list. Perpendicular Bisector Conjecture: If a point is on the perpendicular bisector of a segment, then it is _________ to the endpoints of the line segment. 𝜋 Check my answer Angle Bisector Conjecture Ray FK is the angle bisector of angle LFN. Segments KL and KN are the shortest distances from point K to the sides of the angle. Move point K around. Then, complete the following conjecture and put in your vocabulary. Angle Bisector Conjecture: If a point is on the angle bisector of a segment, then it is ____ to the sides of the angle. 𝜋 Check my answer Driveway Problem Driveway Problem Point C represents your house on the road (line AB). Construct (with compass and straightedge) the shortest possible driveway from your house to the road. What conjecture applies to this problem? 𝜋 Check my answer Roommates Problem Roommates Problem Cassidy and Chelsey are roommates and want to find a place to live that is equidistant to their respective jobs. Construct (with compass and straightedge) a line that shows all possible places they can live that would be the same distance to their workplaces. What conjecture applies here? 𝜋 Check my answer Soccer Goalie Problem Soccer Goalie Problem Construct a ray that shows places the goalie should stand. What conjecture applies to this scenario? 𝜋 Check my answer New Resources Nikmati Keunggulan Di Bandar Judi Terpercaya גיליון אלקטרוני להעלאת נתוני בעיה ויצירת גרף בהתאם Linear Approximations Colors for GeoGebra Question 6c Discover Resources Rotation around Y-axis Solids of Revolution (Discs) Translation Exploration Max Volume Functions waves Discover Topics Translation Subtraction Vectors 2D (Two-Dimensional) Circumcircle or Circumscribed Circle Quadrilaterals AboutPartnersHelp Center Terms of ServicePrivacyLicense Graphing CalculatorCalculator SuiteMath Resources Download our apps here: English / English (United States) © 2025 GeoGebra®
4140
https://www.wiley.com/en-us/The+Organic+Chem+Lab+Survival+Manual%3A+A+Student's+Guide+to+Techniques%2C+11th+Edition-p-9781119608554
The Organic Chem Lab Survival Manual: A Student's Guide to Techniques, 11th Edition | Wiley Opens in a new window Opens an external website Opens an external website in a new window This website uses various technologies, including third-party cookies and codes, to personalize our website functionalities, measure website usage and performance and provide targeting advertising, information about your website visit may be stored or shared with third parties as identified in our Privacy Policy. To learn more and manage cookies, please refer to our Cookie Statement. By continuing to use the website, you consent to Terms of Use and Privacy Policy Opens in a new window Opens an external website Opens an external website in a new window This website uses various technologies, including third-party cookies and codes, to personalize our website functionalities, measure website usage and performance and provide targeting advertising, information about your website visit may be stored or shared with third parties as identified in our Privacy Policy. To learn more and manage cookies, please refer to our Cookie Statement. By continuing to use the website, you consent to Terms of Use and Privacy Policy Skip to Main Content Cart Wiley: Individuals IndividualsInstitutions & Businesses Shop Shop Wiley: Individuals IndividualsInstitutions & Businesses Books Search By Subject Browse Textbooks Show more Show less Courseware WileyPLUS Knewton Alta zyBooks Show more Show less Admission Tests ACT® Exam Guide GMAT™ Official Guides Show more Show less BRANDS AND IMPRINTS(View All) Dummies JK Lasser Jossey-Bass The Leadership Challenge Show more Show less Research Libraries Research Libraries Wiley: Individuals IndividualsInstitutions & Businesses Research Libraries(View All) Wiley Online Library Cochrane Library Wiley Digital Archives Transformational Agreements Authorea Show more Show less Journal Collections(View All) Current Protocols Wiley VCH Ernst and Sohn Open Access Journal Series Show more Show less Special Collections Wiley Science Solutions Wiley Digital Archives Wiley Analytical Sciences Show more Show less Trending on Wiley Customer Success Hub Listen: This Study Shows Podcast An Article Free Future Research Supercharged by AI Show more Show less Publishing Services Publishing Services Wiley: Individuals IndividualsInstitutions & Businesses Publish My Research Book Authors Find A Journal Open Access Special Issues and Collections Show more Show less Publish My Book Book Authors Publish Your Book Book Idea Show more Show less Resources Open Access Wiley Editing Services Show more Show less Trending on Wiley Customer Success Hub Diversity is Not Enough What's Transparent Peer Review and How Can it Benefit You? A New Ecosystem of Scientific Sharing and What it Would Mean Show more Show less Education Resources Education Resources Wiley: Individuals IndividualsInstitutions & Businesses Classroom Resources Course Materials Knewton Alta WileyPLUS zyBooks Show more Show less Learning Resources Search By Subject Browse Textbooks Show more Show less Trending on Wiley Re-Entering the Classroom in a Time of Trauma and Stress Cultivating an Inclusive Learning Experience Wiley "Stay the Course Grant" Winners Tell Their Stories 4 Things to Consider When Choosing an Online Platform That's Right for You Show more Show less Professional Development Professional Development Wiley: Individuals IndividualsInstitutions & Businesses Courses Sybex Show more Show less Career Solutions Wiley Researcher Academy Diversity in Research Jobs Show more Show less Books Search by Subject Personal Career Development Books The Leadership Challenge Teach Yourself Visually Show more Show less Trending on Wiley Determine Your Organization’s Digital Skills Level Limitless? What Can We Really Expect from 5G? The Need for Entrepreneurship in Sustainable Chemistry Art in the Anthropocene: What Do Art and Sustainability Have in Common? Show more Show less for individuals for institutions & businesses wiley network newsroom about wiley corporate responsibility corporate governance leadership team investors careers my account help contact us cookie preferences Shop Books Search By Subject Browse our catalog of books by subject Browse Textbooks Browse our catalog of textbooks and eBooks Courseware WileyPLUS Ignite student potential Knewton Alta Put achievement within reach zyBooks Build confidence through interactive STEM learning solutions Admission Tests ACT® Exam Guide Pass the first time with personalized exam prep GMAT™ Official Guides Study on your time and propel your career BRANDS AND IMPRINTS ( View All ) Dummies Build your skills with trusted guides and expert how to's JK Lasser Easy-to-use tax guide Jossey-Bass Improve student outcomes through meaningful teacher development The Leadership Challenge Leadership practices that lead to a more effective and engaged organization Research Libraries Research Libraries ( View All ) Wiley Online Library Access to journals, books, major reference works, and databases Cochrane Library Access our collection of high-quality, independent evidence to inform Wiley Digital Archives Access centuries-old,unique primary source content on an advance platform Transformational Agreements Unlock your institution’s open access publishing potential Authorea Discover and publish cutting edge, open research Journal Collections ( View All ) Current Protocols Advance your research with step-by-step techniques Wiley VCH Print and digital publications for the scientific community Ernst and Sohn Publications for civil engineers in German-speaking countries Open Access Journal Series Open access publishing for the research community Special Collections Wiley Science Solutions Explore the world's largest spectroscopy collection Wiley Digital Archives Rare source materials are given a new digital life Wiley Analytical Sciences Find professional and peer-reviewed content in analytical science Trending on Wiley Customer Success Hub Access support, guides, how-to videos, live training and more Listen: This Study Shows Podcast An Article Free Future Research Supercharged by AI Publishing Services Publish My Research Book Authors Easily navigate the publishing journey Find A Journal Find the perfect journal for your research Open Access Find out how to share your work with the world Special Issues and Collections Special Issues and Collections Publish My Book Book Authors Easily navigate the publishing journey Publish Your Book Seamless, step-by-step process for publishing your book Book Idea Submit your idea and get started on your publishing journey today Resources Open Access Find out how to share your work with the world Wiley Editing Services Get help with manuscript preparation and article promotion Trending on Wiley Customer Success Hub Access support, guides, how-to videos, live training and more Diversity is Not Enough What's Transparent Peer Review and How Can it Benefit You? A New Ecosystem of Scientific Sharing and What it Would Mean Education Resources Classroom Resources Course Materials Course books for your next semester Knewton Alta Put achievement within reach WileyPLUS Ignite student potential zyBooks Build confidence through interactive STEM learning solutions Learning Resources Search By Subject Browse our catalog of books by subject Browse Textbooks Browse our catalog for academic textbooks and ebooks Trending on Wiley Re-Entering the Classroom in a Time of Trauma and Stress Cultivating an Inclusive Learning Experience Wiley "Stay the Course Grant" Winners Tell Their Stories 4 Things to Consider When Choosing an Online Platform That's Right for You Professional Development Courses Sybex Exam training material to get you ready for your IT certification Career Solutions Wiley Researcher Academy Find key skills to write and publish your research Diversity in Research Jobs Find your next job in healthcare, the sciences and academia Books Search by Subject Browse our catalog of books Personal Career Development Books Browse our career development books The Leadership Challenge Empower each individual with leadership skills Teach Yourself Visually Beginner to intermediate training in a range of topics Trending on Wiley Determine Your Organization’s Digital Skills Level Limitless? What Can We Really Expect from 5G? The Need for Entrepreneurship in Sustainable Chemistry Art in the Anthropocene: What Do Art and Sustainability Have in Common? Institutions & Businesses Loading... Subjects General Chemistry Organic Chemistry The Organic Chem Lab Survival Manual: A Student's Guide to Techniques, 11th Edition James W. Zubrick ISBN: 978-1-119-60855-4 February 2020 288 pages Product Overview Download Product Flyer Description Related Products Digital Evaluation Copy Related Resources Permissions Table of Contents The Organic Chem Lab Survival Manual: A Student's Guide to Techniques, 11th Edition James W. Zubrick ISBN: 978-1-119-60855-4 February 2020 288 pages E-Book Starting at $30.00 Print Starting at $83.95 E-Book Rental (150 Days) Available through Wiley Reader or Vital Source $30.00 E-Book Available through Wiley Reader or Vital Source $71.95 Paperback $83.95 Selected type: Paperback Quantity 1 Your Price: $83.95 Request Digital Evaluation Copy Request Digital Evaluation Copy Description Teaches students the basic techniques and equipment of the organic chemistry lab — the updated new edition of the popular hands-on guide. The Organic Chem Lab Survival Manual helps students understand the basic techniques, essential safety protocols, and the standard instrumentation necessary for success in the laboratory. Author James W. Zubrick has been assisting students navigate organic chemistry labs for more than three decades, explaining how to set up the laboratory, make accurate measurements, and perform safe and meaningful experiments. This practical guide covers every essential area of lab knowledge, from keeping detailed notes and interpreting handbooks to using equipment for chromatography and infrared spectroscopy. Now in its eleventh edition, this guide has been thoroughly updated to cover current laboratory practices, instruments, and techniques. Focusing primarily on macroscale equipment and experiments, chapters cover microscale jointware, drying agents, recrystallization, distillation, nuclear magnetic resonance, and much more. This popular textbook: Familiarizes students with common lab instruments Provides guidance on basic lab skills and procedures Includes easy-to-follow diagrams and illustrations of lab experiments Features practical exercises and activities at the end of each chapter Provides real-world examples of lab notes and instrument manuals The Organic Chem Lab Survival Manual: A Student’s Guide to Techniques, 11th Edition is an essential resource for students new to the laboratory environment, as well as those more experienced seeking to refresh their knowledge. Show more + Download Product Flyer Related Resources Instructor View Instructor Companion Site Contact your Rep for all inquiries Student View Book Resources Related Products Permissions Request permission to reuse content from this site Table of Contents Chapter 1 Safety First, Last, and Always 1 Chapter 2 Keeping a Notebook 11 Chapter 3 Mining Your Own Data 25 Chapter 4 Jointware 30 Chapter 5 Microscale Jointware 41 Chapter 6 Other Interesting Equipment 52 Chapter 7 Pipet Tips 56 Chapter 8 Syringes, Needles, and Septa 63 Chapter 9 Clean and Dry 66 Chapter 10 Drying Agents 68 Chapter 11 On Products 72 Chapter 12 The Melting-Point Experiment 74 Chapter 13 Recrystallization 92 Chapter 14 Recrystallization: Microscale 108 Chapter 15 Extraction and Washing 114 Chapter 16 Extraction and Washing: Microscale 128 Chapter 17 Sources of Heat 131 Chapter 18 Clamps and Clamping 140 Chapter 20 Microscale Distillation 175 Chapter 21 The Rotary Evaporator 179 Chapter 22 Reflux and Addition 183 Chapter 23 Reflux: Microscale 190 Chapter 24 Sublimation 192 Chapter 25 Microscale Boiling Point 195 Chapter 26 Chromatography: Some Generalities 199 Chapter 27 Thin-Layer Chromatography: TLC 202 Chapter 28 Wet-Column Chromatography 214 Chapter 29 Refractometry 222 Chapter 30 Gas Chromatography 227 Chapter 31 HP Liquid Chromatography 236 Chapter 32 Infrared Spectroscopy (and a bit of uv-vis, too) 245 Chapter 32 On The Dual -Beam Infra-Red Instrument (ONLINE)1 Chapter 33 Nuclear Magnetic Resonance 272 Chapter 34 Theory of Distillation (Online) 1 Index 291 To Purchase this product, please visit The Organic Chem Lab Survival Manual: A Student's Guide to Techniques, 11th Edition ----------------------------------------------------------------------------------- James W. Zubrick E-Book Rental (150 Days) 978-1-119-60786-1R150 December 2019 $30.00 E-Book 978-1-119-60786-1 December 2019 $71.95 Paperback 978-1-119-60855-4 February 2020 $83.95 Description Teaches students the basic techniques and equipment of the organic chemistry lab — the updated new edition of the popular hands-on guide. The Organic Chem Lab Survival Manual helps students understand the basic techniques, essential safety protocols, and the standard instrumentation necessary for success in the laboratory. Author James W. Zubrick has been assisting students navigate organic chemistry labs for more than three decades, explaining how to set up the laboratory, make accurate measurements, and perform safe and meaningful experiments. This practical guide covers every essential area of lab knowledge, from keeping detailed notes and interpreting handbooks to using equipment for chromatography and infrared spectroscopy. Now in its eleventh edition, this guide has been thoroughly updated to cover current laboratory practices, instruments, and techniques. Focusing primarily on macroscale equipment and experiments, chapters cover microscale jointware, drying agents, recrystallization, distillation, nuclear magnetic resonance, and much more. This popular textbook: Familiarizes students with common lab instruments Provides guidance on basic lab skills and procedures Includes easy-to-follow diagrams and illustrations of lab experiments Features practical exercises and activities at the end of each chapter Provides real-world examples of lab notes and instrument manuals The Organic Chem Lab Survival Manual: A Student’s Guide to Techniques, 11th Edition is an essential resource for students new to the laboratory environment, as well as those more experienced seeking to refresh their knowledge. Related Resources Instructor View Instructor Companion Site Contact your Repfor all inquiries Student View Book Resources To Purchase this product, please visit FOR INDIVIDUALS FOR INSTITUTIONS & BUSINESSES WILEY NETWORK NEWSROOM ABOUT WILEY Corporate Responsibility Corporate Governance Leadership Team Investors Careers MY ACCOUNT Help Contact Us Cookie Preferences Copyright @ 2000-2025by John Wiley & Sons, Inc., or related companies. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies. Language/Location Site Map Rights & Permissions Privacy Policy Terms of Use
4141
https://leannortiz.weebly.com/uploads/8/2/7/7/8277852/tempconvpptkfc.pdf
Temperature Notes • Kelvin, Celsius, Fahrenheit • Write notes, put in por7olio. • Everything Underlined – COPY IT! • Study. Read over notes daily. • Enjoy the learning process. • Temperature is how hot or cold something is. Temperature is really a measure of how fast the atoms and molecules that make up a substance are moving (this movement is sub-­‐microscopic; you cannot see it). • A thermometer measures the temperature of something, showing how hot or cold it is. • There are many different types of thermometers that measure the temperature of different things. We use thermometers to measure the temperature of the air, our bodies, food, and many other things. There are analog and digital thermometers. An analog thermometer shows the temperature on a scale or dial; a digital thermometer shows the temperature as a number. • The higher the number above zero, the higher the temperature. • Temperature is measured in many different scales, including Fahrenheit, Celsius (or CenDgrade), and Kelvin scales. Copy this table down in your notes. • The units of the Celsius and Fahrenheit scales are called degrees. The symbol for degree is °. • The units of the Kelvin scale are called Kelvins. • A change of one degree of temperature Celsius is the same as a change of one Kelvin. • A change of one degree Fahrenheit is a smaller change in temperature. • Each temperature scale is useful for different things. • Fahrenheit is a measure of temperature that is abbreviated F. • Water freezes at 32°F and boils at 212°F. • This scale was developed by Gabriel Daniel Fahrenheit in 1714. • The Fahrenheit scale is used in the USA but not in many other countries. • The degrees in Fahrenheit are smaller than those in Celsius, making weather-­‐related temperatures more easily wriSen (without having to use a decimal point). • Celsius (also called CenTgrade) is a measure of temperature that is abbreviated C. • Water freezes at 0°C and boils at 100°C. • This scale was developed by Anders Celsius in 1742. • Kelvin is a measure of temperature that is abbreviated K. • Kelvin is a temperature scale designed so that 0 (zero) K is defined as absolute zero, and the size of one unit is the same as the size of one degree Celsius. • (Absolute zero is a hypotheTcal temperature at which all molecular movement stops). • All actual temperatures are above absolute zero. • Absolute zero would occur at -­‐273.16°C, -­‐459.69°F, or 0 (zero) K.] • Water freezes at 273.16K; water boils at 373.16K. • Many scienTsts use this scale (because all the temperatures are posiTve, making calculaTons simpler) or the Celsius scale. • This temperature scale was designed by Lord Kelvin (William Thomson). Conversion Formulas If you know the temperature in one temperature scale you can use a formula to figure out what it is equivalent to in other scales. The conversion formulas are in the table that follows. COPY THIS CONVERSION FORMULA CHART IN YOUR NOTES Temperature Conversion Formulas: COPY THIS CONVERSION FORMULA CHART IN YOUR NOTES Examples: • This example problem illustrates the method to convert temperatures from Celsius to Fahrenheit. • Problem: What is the temperature in Fahrenheit of 20 °C? • SoluTon: • The conversion formula for °C to °F is • TF = 9/5(TC) + 32 • TF = 9/5(20) + 32 • TF = 36 + 32 • TF = 68 °F • Answer: The temperature in Fahrenheit of 20 °C is 68 °F. COPY THIS INFORMATION IN YOUR NOTES Examples: • Here is an example problem that explains how to convert a temperature from degrees on the Celsius scale to Kelvin. • Celsius to Kelvin Problem #1 • Convert 27° C to Kelvin. • Celsius to Kelvin SoluTon #1 • K = °C + 273 • K = 27 + 273 • K = 300 • 300 K • Note that the answer is 300 K. Kelvin is not expressed in degrees. COPY THIS INFORMATION IN YOUR NOTES Examples: • Celsius to Kelvin Problem #2 • Convert 77° C to Kelvin. • Celsius to Kelvin • SoluTon #2 • K = °C + 273 • K = 77 + 273 • K = 350 • 350 K COPY THIS INFORMATION IN YOUR NOTES Temperature Unit Conversion Problem Worked Problem ConverTng from Fahrenheit to Celsius and Kelvin • Problem: Express normal body temperature, 98.6°F, in °C and K. • SoluTon: The Fahrenheit to Celsius conversion equaTon may be expressed in this form: • F° = = 1.8(°C) + 32 • Enter 98.6 for the F° • 98.6 = 1.8(°C) + 32 • 1.8(°C) = 98.6 – 32 • 1.8(°C) = 66.6 • °C = 66.6/1.8°C = 37.0 • To solve for Kelvin: • K = °C +273K = 37.0 + 273 • K = 310 • Answer: 98.6 °F is equal to 37.0°C and 310 K COPY THIS INFORMATION IN YOUR NOTES
4142
https://discrete.openmathbooks.org/dmoi2/section-27.html
(\def\d{\displaystyle} \def\course{Math 228} \newcommand{\f}{\mathfrak #1} \newcommand{\s}{\mathscr #1} \def\N{\mathbb N} \def\B{\mathbf{B}} \def\circleA{(-.5,0) circle (1)} \def\Z{\mathbb Z} \def\circleAlabel{(-1.5,.6) node[above]{$A$}} \def\Q{\mathbb Q} \def\circleB{(.5,0) circle (1)} \def\R{\mathbb R} \def\circleBlabel{(1.5,.6) node[above]{$B$}} \def\C{\mathbb C} \def\circleC{(0,-1) circle (1)} \def\F{\mathbb F} \def\circleClabel{(.5,-2) node[right]{$C$}} \def\A{\mathbb A} \def\twosetbox{(-2,-1.5) rectangle (2,1.5)} \def\X{\mathbb X} \def\threesetbox{(-2,-2.5) rectangle (2,1.5)} \def\E{\mathbb E} \def\O{\mathbb O} \def\U{\mathcal U} \def\pow{\mathcal P} \def\inv{^{-1}} \def\nrml{\triangleleft} \def\st{:} \def\~{\widetilde} \def\rem{\mathcal R} \def\sigalg{$\sigma$-algebra } \def\Gal{\mbox{Gal}} \def\iff{\leftrightarrow} \def\Iff{\Leftrightarrow} \def\land{\wedge} \def\And{\bigwedge} \def\entry{\entry} \def\AAnd{\d\bigwedge\mkern-18mu\bigwedge} \def\Vee{\bigvee} \def\VVee{\d\Vee\mkern-18mu\Vee} \def\imp{\rightarrow} \def\Imp{\Rightarrow} \def\Fi{\Leftarrow} \def\var{\mbox{var}} \def\Th{\mbox{Th}} \def\entry{\entry} \def\sat{\mbox{Sat}} \def\con{\mbox{Con}} \def\iffmodels{\bmodels\models} \def\dbland{\bigwedge !!\bigwedge} \def\dom{\mbox{dom}} \def\rng{\mbox{range}} \def\isom{\cong} \DeclareMathOperator{\wgt}{wgt} \newcommand{\vtx}{node[fill,circle,inner sep=0pt, minimum size=4pt,label=#1:#2]{}} \newcommand{\va}{\vtx{above}{#1}} \newcommand{\vb}{\vtx{below}{#1}} \newcommand{\vr}{\vtx{right}{#1}} \newcommand{\vl}{\vtx{left}{#1}} \renewcommand{\v}{\vtx{above}{}} \def\circleA{(-.5,0) circle (1)} \def\circleAlabel{(-1.5,.6) node[above]{$A$}} \def\circleB{(.5,0) circle (1)} \def\circleBlabel{(1.5,.6) node[above]{$B$}} \def\circleC{(0,-1) circle (1)} \def\circleClabel{(.5,-2) node[right]{$C$}} \def\twosetbox{(-2,-1.4) rectangle (2,1.4)} \def\threesetbox{(-2.5,-2.4) rectangle (2.5,1.4)} \def\ansfilename{practice-answers} \def\shadowprops{{fill=black!50,shadow xshift=0.5ex,shadow yshift=0.5ex,path fading={circle with fuzzy edge 10 percent}}} \newcommand{\hexbox}{ \def\x{-cos{30}\r#1+cos{30}#2\r2} \def\y{-\r#1-sin{30}\r#1} \draw (\x,\y) +(90:\r) -- +(30:\r) -- +(-30:\r) -- +(-90:\r) -- +(-150:\r) -- +(150:\r) -- cycle; \draw (\x,\y) node{#3}; } \renewcommand{\bar}{\overline} \newcommand{\card}{\left| #1 \right|} \newcommand{\twoline}{\begin{pmatrix}#1 \ #2 \end{pmatrix}} \newcommand{\lt}{<} \newcommand{\gt}{>} \newcommand{\amp}{&} ) Discrete MathematicsAn Open Introduction Oscar Levin Section5.1Generating Functions ¶ There is an extremely powerful tool in discrete mathematics used to manipulate sequences called the generating function. The idea is this: instead of an infinite sequence (for example: (2, 3, 5, 8, 12, \ldots)) we look at a single function which encodes the sequence. But not a function which gives the (n)th term as output. Instead, a function whose power series (like from calculus) “displays” the terms of the sequence. So for example, we would look at the power series (2 + 3x + 5x^2 + 8x^3 + 12x^4 + \cdots) which displays the sequence (2, 3, 5, 8, 12, \ldots) as coefficients. An infinite power series is simply an infinite sum of terms of the form (c_nx^n) were (c_n) is some constant. So we might write a power series like this: \begin{equation} \sum_{k=0}^\infty c_k x^k. \end{equation} or expanded like this \begin{equation} c_0 + c_1x + c_2x^2 + c_3x^3 + c_4x^4 + c_5x^5 + \cdots. \end{equation} When viewed in the context of generating functions, we call such a power series a generating series. The generating series generates the sequence \begin{equation} c_0, c_1, c_2, c_3, c_4, c_5, \ldots. \end{equation} In other words, the sequence generated by a generating series is simply the sequence of coefficients of the infinite polynomial. Example5.1.1 What sequence is represented by the generating series (3 + 8x^2 + x^3 + \frac{x^5}{7} + 100x^6 + \cdots\text{?}) Solution We just read off the coefficients of each (x^n) term. So (a_0 = 3) since the coefficient of (x^0) is 3 ((x^0 = 1) so this is the constant term). What is (a_1\text{?}) It is NOT 8, since 8 is the coefficient of (x^2\text{,}) so 8 is the term (a_2) of the sequence. To find (a_1) we need to look for the coefficient of (x^1) which in this case is 0. So (a_1 = 0\text{.}) Continuing, we have (a_2 = 8\text{,}) (a_3 = 1\text{,}) (a_4 = 0\text{,}) and (a_5 = \frac{1}{7}\text{.}) So we have the sequence \begin{equation} 3, 0, 8, 1, \frac{1}{7}, 100, \ldots \end{equation} Note that when discussing generating functions, we always start our sequence with (a_0\text{.}) Now you might very naturally ask why we would do such a thing. One reason is that encoding a sequence with a power series helps us keep track of which term is which in the sequence. For example, if we write the sequence (1, 3, 4, 6, 9, \ldots, 24, 41,\ldots) it is impossible to determine which term (24) is (even if we agreed that the first term was supposed to be (a_0)). However, if we wrote the generating series instead, we would have (1 + 3x + 4x^2 + 6x^3 + 9x^4 + \cdots + 24 x^{17} + 41 x^{18} + \cdots\text{.}) Now it is clear that 24 is the 17th term of the sequence (that is, (a_{17} = 24)). Of course to get this benefit we could have displayed our sequence in any number of ways, perhaps (\fbox{1}_0 \fbox{3}_1 \fbox{4}_2 \fbox{6}_3 \fbox{9}_4 \cdots \fbox{24}_{17}\fbox{41}_{18}\cdots\text{,}) but we do not do this. The reason is that the generating series looks like an ordinary power series (although we are interpreting it differently) so we can do things with it that we ordinarily do with power series such as write down what it converges to. For example, from calculus we know that the power series (1 + x + \frac{x^2}{2} + \frac{x^3}{6} + \frac{x^4}{24} + \cdots + \frac{x^n}{n!} + \cdots) converges to the function (e^x\text{.}) So we can use (e^x) as a way of talking about the sequence of coefficients of the power series for (e^x\text{.}) When we write down a nice compact function which has an infinite power series that we view as a generating series, then we call that function a generating function. In this example, we would say \begin{equation} 1, 1, \frac{1}{2}, \frac{1}{6}, \frac{1}{24}, \ldots, \frac{1}{n!}, \ldots \mbox{ has generating function } e^x \end{equation} SubsectionBuilding Generating Functions ¶ The (e^x) example is very specific. We have a rather odd sequence, and the only reason we know its generating function is because we happen to know the Taylor series for (e^x\text{.}) Our goal now is to gather some tools to build the generating function of a particular given sequence. Let's see what the generating functions are for some very simple sequences. The simplest of all: 1, 1, 1, 1, 1, …. What does the generating series look like? It is simply (1 + x + x^2 + x^3 + x^4 + \cdots\text{.}) Now, can we find a closed formula for this power series? Yes! This particular series is really just a geometric series with common ratio (x\text{.}) So if we use our “multiply, shift and subtract” technique from Section 2.2, we have \begin{align} S \amp = 1 + x + x^2 + x^3 + \cdots\ \underline{- xS} \amp \underline{\,\, = ~~~~~~ x + x^2 + x^3 + x^4 + \cdots}\ (1-x)S \amp = 1 \end{align} Therefore we see that \begin{equation} 1 + x + x^2 + x^3 \cdots = \dfrac{1}{1-x} \end{equation} You might remember from calculus that this is only true on the interval of convergence for the power series, in this case when (|x| \lt 1\text{.}) That is true for us, but we don't care. We are never going to plug anything in for (x\text{,}) so as long as there is some value of (x) for which the generating function and generating series agree, we are happy. And in this case we are happy. (1,1,1,\ldots) The generating function for (1,1,1,1,1,1,\ldots) is (\dfrac{1}{1-x}) Let's use this basic generating function to find generating functions for more sequences. What if we replace (x) by (-x\text{.}) We get \begin{equation} \frac{1}{1+x} = 1 - x + x^2 - x^3 + \cdots \mbox{ which generates } 1, -1, 1, -1, \ldots \end{equation} If we replace (x) by (3x) we get \begin{equation} \frac{1}{1-3x} = 1 + 3x + 9x^2 + 27x^3 + \cdots \mbox{ which generates } 1, 3, 9, 27, \ldots \end{equation} By replacing the (x) in (\frac{1}{1-x}) we can get generating functions for a variety of sequences, but not all. For example, you cannot plug in anything for (x) to get the generating function for (2,2,2,2, \ldots\text{.}) However, we are not lost yet. Notice that each term of (2, 2, 2, 2, \ldots) is the result of multiplying the terms of (1, 1, 1, 1, \ldots) by the constant 2. So multiply the generating function by 2 as well. \begin{equation} \frac{2}{1-x} = 2 + 2x + 2x^2 + 2x^3 + \cdots \mbox{ which generates } 2, 2, 2, 2, \ldots \end{equation} Similarly, to find the generating function for the sequence (3, 9, 27, 81, \ldots\text{,}) we note that this sequence is the result of multiplying each term of (1, 3, 9, 27, \ldots) by 3. Since we have the generating function for (1, 3, 9, 27, \ldots) we can say \begin{equation} \frac{3}{1-3x} = 3\cdot 1 + 3\cdot 3x + 3\cdot 9x^2 + 3\cdot 27x^3 + \cdots \mbox{ which generates } 3, 9, 27, 81, \ldots \end{equation} What about the sequence (2, 4, 10, 28, 82, \ldots\text{?}) Here the terms are always 1 more than powers of 3. That is, we have added the sequences (1,1,1,1,\ldots) and (1,3,9, 27,\ldots) term by term. Therefore we can get a generating function by adding the respective generating functions: \begin{align} 2 + 4x + 10x^2 + 28x^3 + \cdots \amp = (1 + 1) + (1 + 3)x + (1 + 9)x^2 + (1 + 27)x^3 + \cdots\ \amp = 1 + x + x^2 + x^3 + \cdots + 1 + 3x + 9x^2 + 27x^3 + \cdots\ \amp = \frac{1}{1-x} + \frac{1}{1-3x} \end{align} The fun does not stop there: if we replace (x) in our original generating function by (x^2) we get \begin{equation} \frac{1}{1-x^2} = 1 + x^2 + x^4 + x^6\cdots \mbox{ which generates } 1, 0, 1, 0, 1, 0, \ldots. \end{equation} How could we get (0,1,0,1,0,1,\ldots\text{?}) Start with the previous sequence and shift it over by 1. But how do you do this? To see how shifting works, let's first try to get the generating function for the sequence (0, 1, 3, 9, 27, \ldots\text{.}) We know that (\frac{1}{1-3x} = 1 + 3x + 9x^2 + 27x^3 + \cdots\text{.}) To get the zero out front, we need the generating series to look like (x + 3x^2 + 9x^3 + 27x^4+ \cdots) (so there is no constant term). Multiplying by (x) has this effect. So the generating function for (0, 1, 3, 9, 27, \ldots) is (\frac{x}{1-3x}\text{.}) This will also work to get the generating function for (0,1,0,1,0,1,\ldots\text{:}) \begin{equation} \frac{x}{1-x^2} = x + x^3 + x^5 + \cdots \mbox{ which generates } 0, 1, 0, 1, 0 , 1 \ldots \end{equation} What if we add the sequences (1,0,1,0,1,0,\ldots) and (0,1,0,1,0,1,\ldots) term by term? We should get (1,1,1,1,1,1\ldots\text{.}) What happens when we add the generating functions? It works (try it)! \begin{equation} \frac{1}{1-x^2} + \frac{x}{1-x^2} = \frac{1}{1-x}. \end{equation} Here's a sneaky one: what happens if you take the derivative of (\frac{1}{1-x}\text{?}) We get (\frac{1}{(1-x)^2}\text{.}) On the other hand, if we differentiate term by term in the power series, we get ((1 + x + x^2 + x^3 + \cdots)' = 1 + 2x + 3x^2 + 4x^3 + \cdots) which is the generating series for (1, 2, 3, 4, \ldots\text{.}) This says (1,2,3,\ldots) The generating function for (1, 2, 3, 4, 5, \ldots) is (\d\frac{1}{(1-x)^2}.) Take a second derivative: (\frac{2}{(1-x)^3} = 2 + 6x + 12x^2 + 20x^3 + \cdots\text{.}) So (\frac{1}{(1-x)^3} = 1 + 3x + 6x^2 + 10x^3 + \cdots) is a generating function for the triangular numbers, (1,3,6,10\ldots) (although here we have (a_0 = 1) while (T_0 = 0) usually). SubsectionDifferencing ¶ We have seen how to find generating functions from (\frac{1}{1-x}) using multiplication (by a constant or by (x)), substitution, addition, and differentiation. To use each of these, you must notice a way to transform the sequence (1,1,1,1,1\ldots) into your desired sequence. This is not always easy. It is also not really the way we have analyzed sequences. One thing we have considered often is the sequence of differences between terms of a sequence. This will turn out to be helpful in finding generating functions as well. The sequence of differences is often simpler than the original sequence. So if we know a generating function for the differences, we would like to use this to find a generating function for the original sequence. For example, consider the sequence (2, 4, 10, 28, 82, \ldots\text{.}) How could we move to the sequence of first differences: (2, 6, 18, 54,\ldots\text{?}) We want to subtract 2 from the 4, 4 from the 10, 10 from the 28, and so on. So if we subtract (term by term) the sequence (0, 2, 4, 10, 28,\ldots) from (2, 4, 10, 28\ldots\text{,}) we will be set. We can get the generating function for (0,2,4,10,28,\ldots) from the generating function for (2,4,10,28\ldots) by multiplying by (x\text{.}) Use (A) to represent the generating function for (2, 4, 10, 28, 82, \ldots) Then: \begin{align} A \amp = 2 + 4x + 10x^2 +28x^3 + 82x^4 + \cdots\ \underline{-xA} \amp \underline{\,\,= 0 + 2x + 4x^2 + 10x^3 + 28 x^4 + 82x^5 + \cdots}\ (1-x)A \amp = 2 + 2x + 6x^2 + 18x^3 + 54x^4 + \cdots \end{align} While we don't get exactly the sequence of differences, we do get something close. In this particular case, we already know the generating function (A) (we found it in the previous section) but most of the time we will use this differencing technique to find (A\text{:}) if we have the generating function for the sequence of differences, we can then solve for (A\text{.}) Example5.1.2 Find a generating function for (1, 3, 5, 7, 9,\ldots\text{.}) Solution Notice that the sequence of differences is constant. We know how to find the generating function for any constant sequence. So denote the generating function for (1, 3, 5, 7, 9, \ldots) by (A\text{.}) We have \begin{align} A \amp = 1 + 3x + 5x^2 + 7x^3 + 9x^4 + \cdots\ \underline{-xA} \amp \underline{\,\,= 0 + x + 3x^2 + 5x^3 + 7x^4 + 9x^5 + \cdots}\ (1-x)A \amp = 1 + 2x + 2x^2 + 2x^3 + 2x^4 + \cdots \end{align} We know that (2x + 2x^2 + 2x^3 + 2x^4 + \cdots = \dfrac{2x}{1-x}\text{.}) Thus \begin{equation} (1-x)A = 1 + \frac{2x}{1-x}. \end{equation} Now solve for (A\text{:}) \begin{equation} A = \frac{1}{1-x} + \frac{2x}{(1-x)^2} = \frac{1+x}{(1-x)^2}. \end{equation} Does this makes sense? Before we simplified the two fractions into one, we were adding the generating function for the sequence (1,1,1,1,\ldots) to the generating function for the sequence (0, 2, 4, 6, 8, 10, \ldots) (remember (\frac{1}{(1-x)^2}) generates (1,2,3,4,5, \ldots\text{,}) multiplying by (2x) shifts it over, putting the zero out front, and doubles each term). If we add these term by term, we get the correct sequence (1,3,5,7, 9, \ldots\text{.}) Now that we have a generating function for the odd numbers, we can use that to find the generating function for the squares: Example5.1.3 Find the generating function for (1, 4, 9, 16, \ldots\text{.}) Note we take (1 = a_0\text{.}) Solution Again we call the generating function for the sequence (A\text{.}) Using differencing: \begin{align} A \amp = 1 + 4x + 9x^2 + 16x^3 + \cdots\ \underline{- xA} \amp \underline{\,\, = 0 + x + 4x^2 + 9x^3 + 16x^4 + \cdots}\ (1-x)A \amp = 1 + 3x + 5x^2 + 7x^3 + \cdots \end{align} Since (1 + 3x + 5x^2 + 7x^3 + \cdots = \d\frac{1+x}{(1-x)^2}) we have (A = \d\frac{1+x}{(1-x)^3}\text{.}) In each of the examples above, we found the difference between consecutive terms which gave us a sequence of differences for which we knew a generating function. We can generalize this to more complicated relationships between terms of the sequence. For example, if we know that the sequence satisfies the recurrence relation (a_n = 3a_{n-1} - 2a_{n-2}\text{?}) In other words, if we take a term of the sequence and subtract 3 times the previous term and then add 2 times the term before that, we get 0 (since (a_n - 3a_{n-1} + 2a_{n-2} = 0)). That will hold for all but the first two terms of the sequence. So after the first two terms, the sequence of results of these calculations would be a sequence of 0's, for which we definitely know a generating function. Example5.1.4 The sequence (1, 3, 7, 15, 31, 63, \ldots) satisfies the recurrence relation (a_n = 3a_{n-1} - 2a_{n-2}\text{.}) Find the generating function for the sequence. Solution Call the generating function for the sequence (A\text{.}) We have \begin{align} A \amp = 1 + 3x + 7x^2 + 15x^3 + 31x^4 + \cdots + a_nx^n + \cdots\ -3xA \amp = 0 - 3x - 9x^2 - 21x^3 - 45x^4 - \cdots - 3a_{n-1}x^n - \cdots\ \underline{+~~~2x^2A_{~}^{~^{~}}} \amp \underline{\,\, = 0 + 0x + 2x^2 + 6x^3 + 14x^4 + \cdots + 2a_{n-2}x^n + \cdots}\ (1-3x+2x^2)A \amp = 1 \end{align} We multiplied (A) by (-3x) which shifts every term over one spot and multiplies them by (-3\text{.}) On the third line, we multiplied (A) by (2x^2\text{,}) which shifted every term over two spots and multiplied them by 2. When we add up the corresponding terms, we are taking each term, subtracting 3 times the previous term, and adding 2 times the term before that. This will happen for each term after (a_1) because (a_n - 3a_{n-1} + 2a_{n-2} = 0\text{.}) In general, we might have two terms from the beginning of the generating series, although in this case the second term happens to be 0 as well. Now we just need to solve for (A\text{:}) \begin{equation} A = \frac{1}{1 - 3x + 2x^2}. \end{equation} SubsectionMultiplication and Partial Sums ¶ What happens to the sequences when you multiply two generating functions? Let's see: (A = a_0 + a_1x + a_2x^2 + \cdots) and (B = b_0 + b_1x + b_2x^2 + \cdots\text{.}) To multiply (A) and (B\text{,}) we need to do a lot of distributing (infinite FOIL?) but keep in mind we will group like terms and only need to write down the first few terms to see the pattern. The constant term is (a_0b_0\text{.}) The coefficient of (x) is (a_0b_1 + a_1b_0\text{.}) And so on. We get: \begin{equation} AB = a_0b_0 + (a_0b_1 + a_1b_0)x + (a_0b_2 + a_1b_1 + a_2b_0)x^2 + (a_0b_3 + a_1b_2 + a_2b_1 + a_3b_0)x^3 + \cdots \end{equation} Example5.1.5 “Multiply” the sequence (1, 2, 3, 4, \ldots) by the sequence (1, 2, 4, 8, 16, \ldots\text{.}) Solution The new constant term is just (1 \cdot 1\text{.}) The next term will be (1\cdot 2 + 2 \cdot 1 = 4\text{.}) The next term: (1 \cdot 4 + 2 \cdot 2 + 3 \cdot 1 = 11\text{.}) One more: (1 \cdot 8 + 2 \cdot 4 + 3 \cdot 2 + 4 \cdot 1 = 28\text{.}) The resulting sequence is \begin{equation} 1, 4, 11, 28, 57, \ldots \end{equation} Since the generating function for (1,2,3,4, \ldots) is (\frac{1}{(1-x)^2}) and the generating function for (1,2,4,8, 16, \ldots) is (\frac{1}{1-2x}\text{,}) we have that the generating function for (1,4, 11, 28, 57, \ldots) is (\frac{1}{(1-x)^2(1-2x)}) Consider the special case when you multiply a sequence by (1, 1, 1, \ldots\text{.}) For example, multiply (1,1,1,\ldots) by (1, 2, 3, 4, 5\ldots\text{.}) The first term is (1\cdot 1 = 1\text{.}) Then (1\cdot 2 + 1 \cdot 1 = 3\text{.}) Then (1\cdot 3 + 1\cdot 2 + 1 \cdot 1 = 6\text{.}) The next term will be 10. We are getting the triangular numbers. More precisely, we get the sequence of partial sums of (1,2,3,4,5, \ldots\text{.}) In terms of generating functions, we take (\frac{1}{1-x}) (generating (1,1,1,1,1\ldots)) and multiply it by (\frac{1}{(1-x)^2}) (generating (1,2,3,4,5,\ldots)) and this give (\frac{1}{(1-x)^3}\text{.}) This should not be a surprise as we found the same generating function for the triangular numbers earlier. The point is, if you need to find a generating function for the sum of the first (n) terms of a particular sequence, and you know the generating function for that sequence, you can multiply it by (\frac{1}{1-x}\text{.}) To go back from the sequence of partial sums to the original sequence, you look at the sequence of differences. When you get the sequence of differences you end up multiplying by (1-x\text{,}) or equivalently, dividing by (\frac{1}{1-x}\text{.}) Multiplying by (\frac{1}{1-x}) gives partial sums, dividing by (\frac{1}{1-x}) gives differences. SubsectionSolving Recurrence Relations with Generating Functions ¶ We conclude with an example of one of the many reasons studying generating functions is helpful. We can use generating functions to solve recurrence relations. Example5.1.6 Solve the recurrence relation (a_n = 3a_{n-1} - 2a_{n-2}) with initial conditions (a_0 = 1) and (a_1 = 3\text{.}) Solution We saw in an example above that this recurrence relation gives the sequence (1, 3, 7, 15, 31, 63, \ldots) which has generating function (\dfrac{1}{1 - 3x + 2x^2}\text{.}) We did this by calling the generating function (A) and then computing (A - 3xA + 2x^2A) which was just 1, since every other term canceled out. But how does knowing the generating function help us? First, break up the generating function into two simpler ones. For this, we can use partial fraction decomposition. Start by factoring the denominator: \begin{equation} \frac{1}{1-3x + 2x^2} = \frac{1}{(1-x)(1-2x)}. \end{equation} Partial fraction decomposition tells us that we can write this faction as the sum of two fractions (we decompose the given fraction): \begin{equation} \frac{1}{(1-x)(1-2x)} = \frac{a}{1-x} + \frac{b}{1-2x} \text{ ~~ for some constants } a \text{ and } b. \end{equation} To find (a) and (b) we add the two decomposed fractions using a common denominator. This gives \begin{equation} \frac{1}{(1-x)(1-2x)} = \frac{a(1-2x) + b(1-x)}{(1-x)(1-2x)}. \end{equation} so \begin{equation} 1 = a(1-2x) + b(1-x). \end{equation} This must be true for all values of (x\text{.}) If (x = 1\text{,}) then the equation becomes (1 = -a) so (a = -1\text{.}) When (x = \frac{1}{2}) we get (1 = b/2) so (b = 2\text{.}) This tells us that we can decompose the fraction like this: \begin{equation} \frac{1}{(1-x)(1-2x)} = \frac{-1}{1-x} + \frac{2}{1-2x}. \end{equation} This completes the partial fraction decomposition. Notice that these two fractions are generating functions we know. In fact, we should be able to expand each of them. \begin{equation} \frac{-1}{1-x} = -1 - x - x^2 -x^3 - x^4 - \cdots \mbox{ which generates } -1, -1, -1, -1, -1, \ldots. \end{equation} \begin{equation} \frac{2}{1-2x} = 2 + 4x + 8x^2 + 16x^3 + 32x^4 + \cdots \mbox{ which generates } 2, 4, 8, 16, 32, \ldots. \end{equation} We can give a closed formula for the (n)th term of each of these sequences. The first is just (a_n = -1\text{.}) The second is (a_n = 2^{n+1}\text{.}) The sequence we are interested in is just the sum of these, so the solution to the recurrence relation is \begin{equation} a_n = 2^{n+1} - 1 \end{equation} We can now add generating functions to our list of methods for solving recurrence relations. SubsectionExercises ¶ 1 Find the generating function for each of the following sequences by relating them back to a sequence with known generating function. (4,4,4,4,4,\ldots\text{.}) (2, 4, 6, 8, 10, \ldots\text{.}) (0,0,0,2,4,6,8,10,\ldots\text{.}) (1, 5, 25, 125, \ldots\text{.}) (1, -3, 9, -27, 81, \ldots\text{.}) (1, 0, 5, 0, 25, 0, 125, 0, \ldots\text{.}) (0, 1, 0, 0, 2, 0, 0, 3, 0, 0, 4, 0, 0, 5, \ldots\text{.}) Solution (\dfrac{4}{1-x}\text{.}) (\dfrac{2}{(1-x)^2}\text{.}) (\dfrac{2x^3}{(1-x}^2\text{.}) (\dfrac{1}{1-5x}\text{.}) (\dfrac{1}{1+3x}\text{.}) (\dfrac{1}{1-5x^2}\text{.}) (\dfrac{x}{(1-x^3)^2}\text{.}) 2 Find the sequence generated by the following generating functions: (\dfrac{4x}{1-x}\text{.}) (\dfrac{1}{1-4x}\text{.}) (\dfrac{x}{1+x}\text{.}) (\dfrac{3x}{(1+x)^2}\text{.}) (\dfrac{1+x+x^2}{(1-x)^2}) (Hint: multiplication). Solution (0, 4, 4, 4, 4, 4, \ldots\text{.}) (1, 4, 16, 64, 256, \ldots\text{.}) (0, 1, -1, 1, -1, 1, -1, \ldots\text{.}) (0, 3, -6, 9, -12, 15, -18, \ldots\text{.}) (1, 3, 6, 9, 12, 15, \ldots\text{.}) 3 Show how you can get the generating function for the triangular numbers in three different ways: Take two derivatives of the generating function for (1,1,1,1,1, \ldots) Use differencing. Multiply two known generating functions. Solution The second derivative of (\dfrac{1}{1-x}) is (\dfrac{2}{(1-x)^3}) which expands to (2 + 6x + 12x^2 + 20x^3 + 30x^4 + \cdots\text{.}) Dividing by 2 gives the generating function for the triangular numbers. Compute (A - xA) and you get (1 + 2x + 3x^2 + 4x^3 + \cdots) which can be written as (\dfrac{1}{(1-x)^2}\text{.}) Solving for (A) gives the correct generating function. The triangular numbers are the sum of the first (n) numbers (1,2,3,4, \ldots\text{.}) To get the sequence of partial sums, we multiply by (\frac{1}{1-x}\text{.}) So this gives the correct generating function again. 4 Use differencing to find the generating function for (4, 5, 7, 10, 14, 19, 25, \ldots\text{.}) Solution Call the generating function (A\text{.}) Compute (A - xA = 4 + x + 2x^2 + 3x^3 + 4x^4 + \cdots\text{.}) Thus (A - xA = 4 + \dfrac{x}{(1-x)^2}\text{.}) Solving for (A) gives (\d\frac{4}{1-x} + \frac{x}{(1-x)^3}\text{.}) 5 Find a generating function for the sequence with recurrence relation (a_n = 3a_{n-1} - a_{n-2}) with initial terms (a_0 = 1) and (a_1 = 5\text{.}) Solution (\dfrac{1+2x}{1-3x + x^2}\text{.}) 6 Use the recurrence relation for the Fibonacci numbers to find the generating function for the Fibonacci sequence. Solution Compute (A - xA - x^2A) and the solve for (A\text{.}) The generating function will be (\dfrac{x}{1-x-x^2}\text{.}) 7 Use multiplication to find the generating function for the sequence of partial sums of Fibonacci numbers, (S_0, S_1, S_2, \ldots) where (S_0 = F_0\text{,}) (S_1 = F_0 + F_1\text{,}) (S_2 = F_0 + F_1 + F_2\text{,}) (S_3 = F_0 + F_1 + F_2 + F_3) and so on. Solution (\dfrac{x}{(1-x)(1-x-x^2)}\text{.}) 8 Find the generating function for the sequence with closed formula (a_n = 2(5^n) + 7(-3)^n\text{.}) Solution (\dfrac{2}{1-5x} + \dfrac{7}{1+3x}\text{.}) 9 Find a closed formula for the (n)th term of the sequence with generating function (\dfrac{3x}{1-4x} + \dfrac{1}{1-x}\text{.}) Solution (a_n = 3\cdot 4^{n-1} + 1\text{.}) 10 Find (a_7) for the sequence with generating function (\dfrac{2}{(1-x)^2}\cdot\dfrac{x}{1-x-x^2}\text{.}) Solution Hint: you should “multiply” the two sequences. Answer: 158. 11 Explain how we know that (\dfrac{1}{(1-x)^2}) is the generating function for (1, 2, 3, 4, \ldots\text{.}) Solution Starting with (\frac{1}{1-x} = 1 + x + x^2 + x^3 +\cdots\text{,}) we can take derivatives of both sides, given (\frac{1}{(1-x)^2} = 1 + 2x + 3x^2 + \cdots\text{.}) By the definition of generating functions, this says that (\frac{1}{(1-x)^2}) generates the sequence 1, 2, 3…. You can also find this using differencing or by multiplying. 12 Starting with the generating function for (1,2,3,4, \ldots\text{,}) find a generating function for each of the following sequences. (1, 0, 2, 0, 3, 0, 4,\ldots\text{.}) (1, -2, 3, -4, 5, -6, \ldots\text{.}) (0, 3, 6, 9, 12, 15, 18, \ldots\text{.}) (0, 3, 9, 18, 30, 45, 63,\ldots\text{.}) (Hint: relate this sequence to the previous one.) Solution (\frac{1}{(1-x^2)^2}\text{.}) (\frac{1}{(1+x)^2}\text{.}) (\frac{3x}{(1-x)^2}\text{.}) (\frac{3x}{(1-x)^3}\text{.}) (partial sums). 13 You may assume that (1, 1, 2, 3, 5, 8,\ldots) has generating function (\dfrac{1}{1-x-x^2}) (because it does). Use this fact to find the sequence generated by each of the following generating functions. (\frac{x^2}{1-x-x^2}\text{.}) (\frac{1}{1-x^2-x^4}\text{.}) (\frac{1}{1-3x-9x^2}\text{.}) (\frac{1}{(1-x-x^2)(1-x)}\text{.}) Solution (0,0,1,1,2,3,5,8, \ldots\text{.}) (1, 0, 1, 0, 2, 0, 3, 0, 5, 0, 8, 0, \ldots\text{.}) (1, 3, 18, 81, 405, \ldots\text{.}) (1, 2, 4, 7, 12, 20, \ldots\text{.}) 14 Find the generating function for the sequence (1, -2, 4, -8, 16, \ldots\text{.}) Solution 15 Find the generating function for the sequence (1, 1, 1, 2, 3, 4, 5, 6, \ldots\text{.}) Solution (\frac{x^3}{(1-x)^2} + \frac{1}{1-x}\text{.}) 16 Suppose (A) is the generating function for the sequence (3, 5, 9, 15, 23, 33, \ldots\text{.}) Find a generating function (in terms of (A)) for the sequence of differences between terms. Write the sequence of differences between terms and find a generating function for it (without referencing (A)). Use your answers to parts (a) and (b) to find the generating function for the original sequence. Solution ((1-x)A = 3 + 2x + 4x^2 + 6x^3 + \cdots) which is almost right. We can fix it like this: (2 + 4x + 6x^2 + \cdots = \frac{(1-x)A - 3}{x}\text{.}) We know (2 + 4x + 6x^3 + \cdots = \frac{2}{(1-x)^2}\text{.}) (A = \frac{2x}{(1-x)^3} + \frac{3}{1-x} = \frac{3 -4x + 3x^2}{(1-x)^3}\text{.})
4143
https://chemistry.stackexchange.com/questions/115016/how-to-calculate-the-equivalent-weight-of-kmno4
equilibrium - How to calculate the equivalent weight of KMnO4? - Chemistry Stack Exchange Join Chemistry By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy. Sign up with Google OR Email Password Sign up Already have an account? Log in Skip to main content Stack Exchange Network Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. Visit Stack Exchange Loading… Tour Start here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the workings and policies of this site About Us Learn more about Stack Overflow the company, and our products current community Chemistry helpchat Chemistry Meta your communities Sign up or log in to customize your list. more stack exchange communities company blog Log in Sign up Home Questions Unanswered AI Assist Labs Tags Chat Users Teams Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Try Teams for freeExplore Teams 3. Teams 4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams Teams Q&A for work Connect and share knowledge within a single location that is structured and easy to search. Learn more about Teams Hang on, you can't upvote just yet. You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it? Instead, you can save this post to reference later. Save this post for later Not now Thanks for your vote! You now have 5 free votes weekly. Free votes count toward the total vote score does not give reputation to the author Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation. Got it!Go to help center to learn more How to calculate the equivalent weight of KMnO4? Ask Question Asked 6 years, 4 months ago Modified6 years, 4 months ago Viewed 5k times This question shows research effort; it is useful and clear 0 Save this question. Show activity on this post. Let us consider the following reaction 2 K M n O X 4+16 H C l⟶2 K C l+2 M n C l X 2+8 H X 2 O+5 C l X 2 2 K M n O X 4+16 H C l⟶2 K C l+2 M n C l X 2+8 H X 2 O+5 C l X 2 Now, in order to calculate the equivalent mass of K M n O X 4 K M n O X 4, first I need to calculate it's n n-factor which turns out to be 5 5 because the oxidation state of M n M n in K M n O X 4 K M n O X 4 is +7+7 whereas in M n C l X 2 M n C l X 2 it is +2+2. And the n n-factor of H C l H C l is 1 1. So, the equivalent weight of K M n O X 4 K M n O X 4 is molecular weight 5 molecular weight 5 So, ratio of moles of K M n O X 4 K M n O X 4 reacting with H C l H C l should be 1:5 1:5. But from the balanced reaction we can see that this ratio is 1:8 1:8. Where am I wrong? Is my understanding and hence calculation of n n-factor and equivalent weight is wrong? (Please pardon this childish fashion of writing the question. If there is a problem anywhere, please do comment before flagging or downvoting.) equilibrium stoichiometry titration Share Share a link to this question Copy linkCC BY-SA 4.0 Cite Follow Follow this question to receive notifications edited May 9, 2019 at 7:29 andselisk♦ 38.7k 14 14 gold badges 134 134 silver badges 225 225 bronze badges asked May 8, 2019 at 17:20 ami_baami_ba 133 2 2 silver badges 8 8 bronze badges 10 Hint - What are the two redox half-cell reactions?MaxW –MaxW 2019-05-08 17:29:14 +00:00 Commented May 8, 2019 at 17:29 @MaxW Ummm...I think 2 H X++2 C l X−⟶C l X 2+2 e X−+2 H X+2 H X++2 C l X−⟶C l X 2+2 e X−+2 H X+ and K X++M n O X 4 X−+5 e X−⟶M n X 2++K X++4 O X 2−K X++M n O X 4 X−+5 e X−⟶M n X 2++K X++4 O X 2− ami_ba –ami_ba 2019-05-08 17:31:13 +00:00 Commented May 8, 2019 at 17:31 You can leave off the 2 H X+2 H X+ and K=K= since they are on both sides of the equation.MaxW –MaxW 2019-05-08 17:33:26 +00:00 Commented May 8, 2019 at 17:33 @MaxW Are not these two the Oxidation and Reduction halves?ami_ba –ami_ba 2019-05-08 17:34:46 +00:00 Commented May 8, 2019 at 17:34 Yes, that is right. So per C l X−C l X− atom how many electrons are exchanged? Per M n M n atom how many electrons are exchanged?MaxW –MaxW 2019-05-08 17:36:04 +00:00 Commented May 8, 2019 at 17:36 |Show 5 more comments 1 Answer 1 Sorted by: Reset to default This answer is useful 1 Save this answer. Show activity on this post. Refer to the definition of equivalent (IUPAC Gold Book): equivalent entity Entity corresponding to the transfer of a H X+H X+ ion in a neutralization reaction, of an electron in a redox reaction, or to a magnitude of charge number equal to 1 in ions. In other words, 1 e q u i v 1 e q u i v is the amount of substance reacting with 1 m o l 1 m o l of hydrogen atom. If hydrogen acts as a reducing or oxidizing agent, then either way 1 m o l 1 m o l of hydrogen atoms liberates or accepts 1 m o l 1 m o l of electrons: 0.5 H X 2 0.5 H X 2+e X−⟶H X++e X−⟶H X−0.5 H X 2⟶H X++e X−0.5 H X 2+e X−⟶H X− That's why an equivalent of a redox agent is its amount which liberates or accepts 1 m o l 1 m o l of electrons upon being oxidized or reduced, respectively, assuming electrons don't exist in solution on its own for a significant period of time. Note that K M n O X 4 K M n O X 4 participates in redox reaction 2 K M n+7 O X 4+16 H C l−1=2 K C l+2 M n+2 C l X 2+8 H X 2 O+5 C l 0 X 2 2 K M n+7 O X 4+16 H C l−1=2 K C l+2 M n+2 C l X 2+8 H X 2 O+5 C l 0 X 2 and the half-reaction for the reduction of manganese is M n+7 O X 4 X−+8 H X++5 e X−⟶M n+2 X 2++4 H X 2 O M n+7 O X 4 X−+8 H X++5 e X−⟶M n+2 X 2++4 H X 2 O Also note that n n-factor of permangante here is not the number of protons H X+H X+, which are also used up in water formation; rather it's the number of transferred electrons, e.g. n=5 n=5 and M e q u i v(K M n O X 4)=M(K M n O X 4)n=158.03 g m o l−1 5=31.61 g m o l−1 M e q u i v(K M n O X 4)=M(K M n O X 4)n=158.03 g m o l−1 5=31.61 g m o l−1 Obviously, the equivalent mass of permanganate isn't a constant and depends on the p H p H of the reaction. For example, in neutral medium half-reaction appears as M n+7 O X 4 X−+2 H X 2 O+3 e X−⟶M n+4 O X 2+4 O H X−M n+7 O X 4 X−+2 H X 2 O+3 e X−⟶M n+4 O X 2+4 O H X− and there is no explicitly shown protons to count at all! However, the n n-factor is 3 3, and the equivalent mass of permanganate would be a different value: M e q u i v(K M n O X 4)=M(K M n O X 4)n=158.03 g m o l−1 3=52.68 g m o l−1 M e q u i v(K M n O X 4)=M(K M n O X 4)n=158.03 g m o l−1 3=52.68 g m o l−1 Share Share a link to this answer Copy linkCC BY-SA 4.0 Cite Follow Follow this answer to receive notifications edited Jun 10, 2020 at 14:04 CommunityBot 1 answered May 9, 2019 at 7:27 andselisk♦andselisk 38.7k 14 14 gold badges 134 134 silver badges 225 225 bronze badges Add a comment| Your Answer Reminder: Answers generated by AI tools are not allowed due to Chemistry Stack Exchange's artificial intelligence policy Thanks for contributing an answer to Chemistry Stack Exchange! Please be sure to answer the question. Provide details and share your research! But avoid … Asking for help, clarification, or responding to other answers. Making statements based on opinion; back them up with references or personal experience. Use MathJax to format equations. MathJax reference. To learn more, see our tips on writing great answers. Draft saved Draft discarded Sign up or log in Sign up using Google Sign up using Email and Password Submit Post as a guest Name Email Required, but never shown Post Your Answer Discard By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy. Start asking to get answers Find the answer to your question by asking. Ask question Explore related questions equilibrium stoichiometry titration See similar questions with these tags. Featured on Meta Spevacus has joined us as a Community Manager Introducing a new proactive anti-spam measure Related 1Different Equivalent Weight for the same compound 1How to calculate the equivalent weight of a metal in a metal sulphate? 3How to find the concentration of an of ammonia solution by titration with nitric acid? 2How to determine the equivalent weight of CO2 1Finding mass percentage of components of a solid mixture 0Proper conversion factor when titrating KMnO4 to determine amount of oxalate in the biomass extract Hot Network Questions Determine which are P-cores/E-cores (Intel CPU) Should I let a player go because of their inability to handle setbacks? What happens if you miss cruise ship deadline at private island? Implications of using a stream cipher as KDF If Israel is explicitly called God’s firstborn, how should Christians understand the place of the Church? Does the Mishna or Gemara ever explicitly mention the second day of Shavuot? A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man how do I remove a item from the applications menu Direct train from Rotterdam to Lille Europe Can peaty/boggy/wet/soggy/marshy ground be solid enough to support several tonnes of foot traffic per minute but NOT support a road? Storing a session token in localstorage How to home-make rubber feet stoppers for table legs? How long would it take for me to get all the items in Bongo Cat? Non-degeneracy of wedge product in cohomology Discussing strategy reduces winning chances of everyone! Why are LDS temple garments secret? Are there any world leaders who are/were good at chess? Numbers Interpreted in Smallest Valid Base Can a cleric gain the intended benefit from the Extra Spell feat? What is the feature between the Attendant Call and Ground Call push buttons on a B737 overhead panel? Checking model assumptions at cluster level vs global level? Explain answers to Scientific American crossword clues "Éclair filling" and "Sneaky Coward" What is a "non-reversible filter"? Matthew 24:5 Many will come in my name! Question feed Subscribe to RSS Question feed To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Why are you flagging this comment? It contains harassment, bigotry or abuse. This comment attacks a person or group. Learn more in our Code of Conduct. It's unfriendly or unkind. This comment is rude or condescending. Learn more in our Code of Conduct. Not needed. This comment is not relevant to the post. Enter at least 6 characters Something else. A problem not listed above. Try to be as specific as possible. Enter at least 6 characters Flag comment Cancel You have 0 flags left today Chemistry Tour Help Chat Contact Feedback Company Stack Overflow Teams Advertising Talent About Press Legal Privacy Policy Terms of Service Your Privacy Choices Cookie Policy Stack Exchange Network Technology Culture & recreation Life & arts Science Professional Business API Data Blog Facebook Twitter LinkedIn Instagram Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547 By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. Accept all cookies Necessary cookies only Customize settings Cookie Consent Preference Center When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy Accept all cookies Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details‎ Performance Cookies [x] Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details‎ Functional Cookies [x] Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details‎ Targeting Cookies [x] Targeting Cookies These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. Cookies Details‎ Cookie List Clear [x] checkbox label label Apply Cancel Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Necessary cookies only Confirm my choices
4144
https://reference.wolfram.com/language/ref/Series.html
Wolfram Language & System Documentation Center Series See Also SeriesCoefficient InverseSeries ComposeSeries Limit FunctionAnalytic Normal InverseZTransform RSolve O SeriesData PadeApproximant FourierSeries AroundReplace Asymptotic AsymptoticDSolveValue AsymptoticIntegrate AsymptoticSum AsymptoticRSolveValue AsymptoticSolve ResidueSum Related Guides Series Expansions Calculus Manipulating Equations Scientific Models Asymptotics Analytic Number Theory Multiplicative Number Theory Tech Notes Symbolic Mathematics: Basic Operations Power Series Making Power Series Expansions Operations on Power Series The Representation of Power Series Converting Power Series to Normal Expressions Implementation notes: Algebra and Calculus See Also SeriesCoefficient InverseSeries ComposeSeries Limit FunctionAnalytic Normal InverseZTransform RSolve O SeriesData PadeApproximant FourierSeries AroundReplace Asymptotic AsymptoticDSolveValue AsymptoticIntegrate AsymptoticSum AsymptoticRSolveValue AsymptoticSolve ResidueSum Related Guides Series Expansions Calculus Manipulating Equations Scientific Models Asymptotics Analytic Number Theory Multiplicative Number Theory Tech Notes Symbolic Mathematics: Basic Operations Power Series Making Power Series Expansions Operations on Power Series The Representation of Power Series Converting Power Series to Normal Expressions Implementation notes: Algebra and Calculus Series[f,{x,x0,n}] generates a power series expansion for f about the point x=x0 to order (x-x0)n, where n is an explicit integer. Series[f,xx0] generates the leading term of a power series expansion for f about the point x=x0. Series[f,{x,x0,nx},{y,y0,ny},…] successively finds series expansions with respect to x, then y, etc. Details and Options Examples Basic Examples Scope Univariate Series Generalizations & Extensions Options Analytic Assumptions Applications Properties & Relations Possible Issues See Also Tech Notes Related Guides Related Links History Cite this Page Series Copy to clipboard. ✖ Series Series[f,{x,x0,n}] Copy to clipboard. ✖ Series[f,{x,x0,n}] generates a power series expansion for f about the point x=x0 to order (x-x0)n, where n is an explicit integer. Series[f,xx0] Copy to clipboard. ✖ Series[f,xx0] generates the leading term of a power series expansion for f about the point x=x0. Series[f,{x,x0,nx},{y,y0,ny},…] Copy to clipboard. ✖ Series[f,{x,x0,nx},{y,y0,ny},…] successively finds series expansions with respect to x, then y, etc. Details and Options Series can construct standard Taylor series, as well as certain expansions involving negative powers, fractional powers, and logarithms. Series detects certain essential singularities. On[Series::esss] makes Series generate a message in this case. Series can expand about the point x=∞. Series[f,{x,0,n}] constructs Taylor series for any function f according to the formula . Series effectively evaluates partial derivatives using D. It assumes that different variables are independent. The result of Series is usually a SeriesData object, which you can manipulate with other functions. Normal[series] truncates a power series and converts it to a normal expression. SeriesCoefficient[series,n] finds the coefficient of the n-order term. The following options can be given: | | Analytic | True | whether to treat unrecognized functions as analytic | | | Assumptions | $Assumptions | assumptions to make about parameters | | | SeriesTermGoal | Automatic | number of terms in the approximation | Examples open all close all Basic Examples (4)Summary of the most common use cases Power series for the exponential function around : Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Convert to a normal expression: Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Power series of an arbitrary function around : Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=1 ✖ Direct link to example Out=1 In any operation on series, only appropriate terms are kept: Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Find the leading term of a power series: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Scope (10)Survey of the scope of standard use cases Univariate Series (10) Series can handle fractional powers and logarithms: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Symbolic parameters can often be used: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Laurent series with negative powers can be generated: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Truncate the series to the specified negative power: Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Find power series for special functions: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Copy to clipboard. In:=3 ✖ Direct link to example Out=3 Copy to clipboard. In:=4 ✖ Direct link to example Out=4 Copy to clipboard. In:=5 ✖ Direct link to example Out=5 Copy to clipboard. In:=6 ✖ Direct link to example Out=6 Find the series for a function at a branch point: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 With x assumed to be to the left of the branch point, a simpler result is given: Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Piecewise functions: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Power series at infinity: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Series can give asymptotic series: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Copy to clipboard. In:=3 ✖ Direct link to example Out=3 Series expansions of implicit solutions to equations: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Series expansions of unevaluated integrals: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Generalizations & Extensions (4)Generalized and extended use cases Power series in two variables: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Series is threaded element-wise over lists: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Series generates SeriesData expressions: Copy to clipboard. In:=1 ✖ Direct link to example Series can work with approximate numbers: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Options (4)Common values & functionality for each option Analytic (1) Series by default assumes symbolic functions to be analytic: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Assumptions (3) Use Assumptions to specify regions in the complex plane where expansions should apply: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Without assumptions, piecewise functions appear: Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Get expansions in Stokes regions: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Applications (8)Sample problems that can be solved with this function Plot successive series approximations to : Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Find a series expansion for a standard combinatorial problem: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Find Fibonacci numbers from a generating function: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Find Legendre polynomials by expanding a generating function: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Set up a generating function to enumerate ways to make change using U.S. coins: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 The number of ways to make change for $1: Copy to clipboard. In:=3 ✖ Direct link to example Out=3 Find the lowest-order terms in a large polynomial: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Find higher-order terms in Newton's approximation for a root of f[x] near : Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Plot the complex zeros for a series approximation to Exp[x]: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Properties & Relations (10)Properties of the function, and connections to other functions Series always only keeps terms up to the specified order: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Operations on series keep only the appropriate terms: Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Normal converts to an ordinary polynomial: Copy to clipboard. In:=3 ✖ Direct link to example Out=3 Any mathematical function can be applied to a series: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Adding a series of lower order causes the higher-order terms to be dropped: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Differentiate a series: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Solve equations for series coefficients: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Find the list of coefficients in a series: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Use O[x] to force the construction of a series: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 ComposeSeries treats a series as a function to apply to another series: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 InverseSeries does series reversion to find the series for the inverse function of a series: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Copy to clipboard. In:=3 ✖ Direct link to example Out=3 Use FunctionAnalytic to test whether a function is analytic: Copy to clipboard. In:=1 ✖ Direct link to example Copy to clipboard. In:=2 ✖ Direct link to example Out=2 An analytic function can be expressed as a Taylor series at each point of its domain: Copy to clipboard. In:=3 ✖ Direct link to example Out=3 The resulting polynomial approximates near 0: Copy to clipboard. In:=4 ✖ Direct link to example Out=4 Possible Issues (7)Common pitfalls and unexpected behavior When there is an essential singularity, Series will attempt to factor it out: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Numeric values cannot be substituted directly for the expansion variable in a series: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Use Normal to get a normal expression in which the substitution can be done: Copy to clipboard. In:=3 ✖ Direct link to example Out=3 Series must be converted to normal expressions before being plotted: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Power series with different expansion points cannot be combined: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Not all series are represented by expressions with head SeriesData: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Some functions cannot be decomposed into series of power-like functions: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Series does not change expressions independent of the expansion variable: Copy to clipboard. In:=1 ✖ Direct link to example Out=1 Copy to clipboard. In:=2 ✖ Direct link to example Out=2 Wolfram Research (1988), Series, Wolfram Language function, (updated 2020). Copy to clipboard. ✖ Wolfram Research (1988), Series, Wolfram Language function, (updated 2020). Text Wolfram Research (1988), Series, Wolfram Language function, (updated 2020). Copy to clipboard. ✖ Wolfram Research (1988), Series, Wolfram Language function, (updated 2020). CMS Wolfram Language. 1988. "Series." Wolfram Language & System Documentation Center. Wolfram Research. Last Modified 2020. Copy to clipboard. ✖ Wolfram Language. 1988. "Series." Wolfram Language & System Documentation Center. Wolfram Research. Last Modified 2020. APA Wolfram Language. (1988). Series. Wolfram Language & System Documentation Center. Retrieved from Copy to clipboard. ✖ Wolfram Language. (1988). Series. Wolfram Language & System Documentation Center. Retrieved from BibTeX @misc{reference.wolfram_2025_series, author="Wolfram Research", title="{Series}", year="2020", howpublished="\url{ note=[Accessed: 24-September-2025]} Copy to clipboard. ✖ @misc{reference.wolfram_2025_series, author="Wolfram Research", title="{Series}", year="2020", howpublished="\url{ note=[Accessed: 24-September-2025]} BibLaTeX @online{reference.wolfram_2025_series, organization={Wolfram Research}, title={Series}, year={2020}, url={ note=[Accessed: 24-September-2025]} Copy to clipboard. ✖ @online{reference.wolfram_2025_series, organization={Wolfram Research}, title={Series}, year={2020}, url={ note=[Accessed: 24-September-2025]} Find out if you already have access to Wolfram tech through your organization
4145
https://languages.oup.com/google-dictionary-en/
Oxford University Press uses cookies to enhance your experience on our website. By selecting ‘accept all’ you are agreeing to our use of cookies. You can change your cookie settings at any time. More information can be found in ourCookie Policy. Privacy Preference Center When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookie List Consent Leg.Interest label label label
4146
https://math.stackexchange.com/questions/1467910/interpolating-polynomial-with-integer-coefficients
elementary number theory - Interpolating polynomial with integer coefficients - Mathematics Stack Exchange Join Mathematics By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy. Sign up with Google OR Email Password Sign up Already have an account? Log in Skip to main content Stack Exchange Network Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. Visit Stack Exchange Loading… Tour Start here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the workings and policies of this site About Us Learn more about Stack Overflow the company, and our products current community Mathematics helpchat Mathematics Meta your communities Sign up or log in to customize your list. more stack exchange communities company blog Log in Sign up Home Questions Unanswered AI Assist Labs Tags Chat Users Teams Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Try Teams for freeExplore Teams 3. Teams 4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams Teams Q&A for work Connect and share knowledge within a single location that is structured and easy to search. Learn more about Teams Hang on, you can't upvote just yet. You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it? Instead, you can save this post to reference later. Save this post for later Not now Thanks for your vote! You now have 5 free votes weekly. Free votes count toward the total vote score does not give reputation to the author Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation. Got it!Go to help center to learn more Interpolating polynomial with integer coefficients Ask Question Asked 9 years, 11 months ago Modified5 years, 8 months ago Viewed 999 times This question shows research effort; it is useful and clear 8 Save this question. Show activity on this post. Let n 1<⋯<n k n 1<⋯<n k and m 1,…,m k m 1,…,m k be integers. Can we find conditions for the existence polynomial p p with integer coefficients such that p(n i)=m i p(n i)=m i for every i i? This isn't always possible: for example, since p(i)≡p(0)mod i p(i)≡p(0)mod i, we cannot have p(0)=0 p(0)=0 and p(2)=1 p(2)=1. By this answer, if such a polynomial exists then the Lagrange interpolating polynomial has integer coefficients, so the question may be restated as when does the Lagrange interpolating polynomial have integer coefficients. elementary-number-theory lagrange-interpolation Share Share a link to this question Copy linkCC BY-SA 3.0 Cite Follow Follow this question to receive notifications edited Apr 13, 2017 at 12:58 CommunityBot 1 asked Oct 7, 2015 at 0:31 Oliver MillerOliver Miller 243 1 1 silver badge 4 4 bronze badges Add a comment| 2 Answers 2 Sorted by: Reset to default This answer is useful 2 Save this answer. Show activity on this post. The coefficients of the Lagrange polynomial that goes through (n 1,m 1),…,(n k,m k)(n 1,m 1),…,(n k,m k), can be found by solving ⎛⎝⎜⎜1⋮1 n 1 n k⋯⋯n k−1 1 n k−1 k⎞⎠⎟⎟⎛⎝⎜⎜a 0⋮a n−1⎞⎠⎟⎟=⎛⎝⎜⎜m 1⋮m k⎞⎠⎟⎟(1 n 1⋯n 1 k−1⋮1 n k⋯n k k−1)(a 0⋮a n−1)=(m 1⋮m k) Hence the coefficients a i a i are integers precisely when the determinant of the Vandermonde matrix above divides its adjugate matrix applied to (m 1,…,m k)(m 1,…,m k). For example, for n 1<n 2<n 3 n 1<n 2<n 3 and m 1,m 2,m 3 m 1,m 2,m 3, the condition becomes (n 1−n 2)(n 1−n 3)(n 2−n 3)|⎛⎝⎜n 2(n 2−n 3)n 3 m 1+n 1 n 3(n 3−n 1)m 2+n 1(n 1−n 2)n 2 m 3 n 2 3(m 1−m 2)+n 2 1(m 2−m 3)+n 2 2(m 3−m 1)n 3(m 2−m 1)+n 2(m 1−m 3)+n 1(m 3−m 2)⎞⎠⎟(n 1−n 2)(n 1−n 3)(n 2−n 3)|(n 2(n 2−n 3)n 3 m 1+n 1 n 3(n 3−n 1)m 2+n 1(n 1−n 2)n 2 m 3 n 3 2(m 1−m 2)+n 1 2(m 2−m 3)+n 2 2(m 3−m 1)n 3(m 2−m 1)+n 2(m 1−m 3)+n 1(m 3−m 2)) (by which is meant that the left side divides each of the terms on the right). Share Share a link to this answer Copy linkCC BY-SA 4.0 Cite Follow Follow this answer to receive notifications edited Jan 9, 2020 at 13:07 answered Jan 9, 2020 at 12:23 ChrystomathChrystomath 11.1k 1 1 gold badge 21 21 silver badges 36 36 bronze badges Add a comment| This answer is useful -1 Save this answer. Show activity on this post. I don’t have enough reputation to comment, this is not a complete answer. I have a necessary and sufficient condition for consecutive ni, which is that the terms of the nth level difference are divisible by n! (We define the kth level difference to be the differences between consecutive terms of the (k-1)th level difference, with the 0th level difference being the sequence itself Ex: 2nd level differences: 2 2 1st level differences: 2 4 6 The sequence itself: 0 2 6 12 This is proven by observing that any integer polynomial can be written as the sum of integer combinations of the polynomials x(x-1)(x-2)...(x-i) Share Share a link to this answer Copy linkCC BY-SA 4.0 Cite Follow Follow this answer to receive notifications answered Dec 11, 2019 at 2:56 user105362user105362 21 2 2 bronze badges 0 Add a comment| You must log in to answer this question. Start asking to get answers Find the answer to your question by asking. Ask question Explore related questions elementary-number-theory lagrange-interpolation See similar questions with these tags. Featured on Meta Introducing a new proactive anti-spam measure Spevacus has joined us as a Community Manager stackoverflow.ai - rebuilt for attribution Community Asks Sprint Announcement - September 2025 Report this ad Linked 3Can we always find some polynomial for which this holds? 3Polynomial interpolation yielding integer coefficients Related 2Comparing two statements of Chinese Remainder Theorem (Sun-Ze Theorem) 1Proof of Lucas' theorem without the polynomial hint 0Additional hypothesis for a 1|b,…,a n|b⟹a 1⋅⋯⋅a n|b a 1|b,…,a n|b⟹a 1⋅⋯⋅a n|b 1Writing down a general function for factorizing gcd's. 1Canonical Prime Factorisation 3Polynomial interpolation yielding integer coefficients 3Two pairs of coprime numbers 1Bezout identity with relatively prime coefficients Hot Network Questions Suspicious of theorem 36.2 in Munkres “Analysis on Manifolds” Proof of every Highly Abundant Number greater than 3 is Even The geologic realities of a massive well out at Sea how do I remove a item from the applications menu "Unexpected"-type comic story. Aboard a space ark/colony ship. Everyone's a vampire/werewolf Why are LDS temple garments secret? How many stars is possible to obtain in your savefile? I have a lot of PTO to take, which will make the deadline impossible Is direct sum of finite spectra cancellative? How different is Roman Latin? What NBA rule caused officials to reset the game clock to 0.3 seconds when a spectator caught the ball with 0.1 seconds left? в ответе meaning in context alignment in a table with custom separator Can you formalize the definition of infinitely divisible in FOL? How to home-make rubber feet stoppers for table legs? How to use \zcref to get black text Equation? What happens if you miss cruise ship deadline at private island? What's the expectation around asking to be invited to invitation-only workshops? For every second-order formula, is there a first-order formula equivalent to it by reification? Calculating the node voltage Is it possible that heinous sins result in a hellish life as a person, NOT always animal birth? What meal can come next? Cannot build the font table of Miama via nfssfont.tex Does the mind blank spell prevent someone from creating a simulacrum of a creature using wish? more hot questions Question feed Subscribe to RSS Question feed To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Why are you flagging this comment? It contains harassment, bigotry or abuse. This comment attacks a person or group. Learn more in our Code of Conduct. It's unfriendly or unkind. This comment is rude or condescending. Learn more in our Code of Conduct. Not needed. This comment is not relevant to the post. Enter at least 6 characters Something else. A problem not listed above. Try to be as specific as possible. Enter at least 6 characters Flag comment Cancel You have 0 flags left today Mathematics Tour Help Chat Contact Feedback Company Stack Overflow Teams Advertising Talent About Press Legal Privacy Policy Terms of Service Your Privacy Choices Cookie Policy Stack Exchange Network Technology Culture & recreation Life & arts Science Professional Business API Data Blog Facebook Twitter LinkedIn Instagram Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547 By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. Accept all cookies Necessary cookies only Customize settings Cookie Consent Preference Center When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy Accept all cookies Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details‎ Performance Cookies [x] Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details‎ Functional Cookies [x] Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details‎ Targeting Cookies [x] Targeting Cookies These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. Cookies Details‎ Cookie List Clear [x] checkbox label label Apply Cancel Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Necessary cookies only Confirm my choices
4147
https://www.quora.com/What-is-the-identity-of-sin-2x-2sin-x-cos-x
Something went wrong. Wait a moment and try again. Double Angle Formula Cos Function Mathematical Identities Trigonometric Equations Sin Function Trigonometry Maths Cos (mathematics) 5 What is the identity of sin(2x) = 2sin(x) cos(x)? Jonathan Lewis Masters in Mathematics & Theoretical Physics, University of Cambridge (Graduated 1988) · Author has 13.3K answers and 1.6M answer views · 1y Using polar coordinates, eix=cosx+isinx sinx=eix−e−ix2i cosx=eix+e−ix2 2sinxcosx=2(eix−e−ix2i)(eix+e−ix2)=e2ix−e−2ix2i =sin 2x Related questions Why is sin 2x ≠ 2sin x? What are the non-permissible values for this identity cos(2x) = 2sin(x) cos(x)? Can someone help verify the identity Sin x sin 2x + cos x cos 2x= cos x? How can I verify this identity: sin (2x) - tan (x) = tan(x) cos(2x)? How can I prove the identity, (sin x - cos x) ² = 1 - sin 2x? KK Works at Quora (product) · Upvoted by Shubhankar Datta , Master of Science Mathematics, Jadavpur University (2022) · Author has 145 answers and 516.5K answer views · 8y Originally Answered: Why is 2\sin(x)\cos(x)=\sin(2x) true? · You can prove it using Euler’s formula (eiθ=cosθ+isinθ) and the identity (a+b)(a−b)=a2−b2: 2sinθcosθ =2eiθ−e−iθ2ieiθ+e−iθ2 =ei2θ−e−i2θ2i =sin2θ You can also prove it in an elegant way using plane geometry (with a unit circle): we have use: base angles of an isosceles triangle exterior angle of a triangle equals the sum of two opposite angles definitions of sine and cosine You can prove it using Euler’s formula (eiθ=cosθ+isinθ) and the identity (a+b)(a−b)=a2−b2: 2sinθcosθ =2eiθ−e−iθ2ieiθ+e−iθ2 =ei2θ−e−i2θ2i =sin2θ You can also prove it in an elegant way using plane geometry (with a unit circle): we have use: base angles of an isosceles triangle exterior angle of a triangle equals the sum of two opposite angles definitions of sine and cosine Anushka Solanki Studied 10th Class in India at Delhi Public School, Nagpur · 2y The identity is: sin(2x) = 2sin(x)cos(x) This is known as the double angle identity for sine, because it expresses the sine of twice an angle (2x) in terms of the sine and cosine of the angle (x). Shivam Kadam Former Intern at Tata Motors (company) (2018–2018) · 8y Originally Answered: Why is 2\sin(x)\cos(x)=\sin(2x) true? · Consider an isosceles triangle with equal sides 1 and 2x the angle between them. Find the area in two ways and equate them. First way: drop a perpendicular from one of the equal angles to the opposite side of length 1. That perpendicular has length 1sin(2x) and is the altitude of the isosceles triangle. Its base is 1. Therefore its area is (1/2)sin(2x)1. Second way: bisect the angle between the two sides of length 1, extending the angle bisector to meet the opposite side. This splits the triangle into two right triangles, each with base half the opposite side, that is 1sin(x) and altitude th Consider an isosceles triangle with equal sides 1 and 2x the angle between them. Find the area in two ways and equate them. First way: drop a perpendicular from one of the equal angles to the opposite side of length 1. That perpendicular has length 1sin(2x) and is the altitude of the isosceles triangle. Its base is 1. Therefore its area is (1/2)sin(2x)1. Second way: bisect the angle between the two sides of length 1, extending the angle bisector to meet the opposite side. This splits the triangle into two right triangles, each with base half the opposite side, that is 1sin(x) and altitude the length of the angle bisector, 1cos(x). Those right triangles therefore each have area (1/2)sin(x)cos(x) so adding the areas together gives area of the isosceles triangle as sin(x)cos(x). Equate the areas: (1/2)sin(2x)1 = sin(x)cos(x), multiply by 2: sin(2x) = 2sin(x)cos(x). Alternative method, sin(A + B) = sin A cos B + cos A sin B sin(2x) = sin(x + x) = sin x cos x + cos x sin x = 2 sin x cos x Promoted by The Penny Hoarder Lisa Dawson Finance Writer at The Penny Hoarder · Updated Sep 16 What's some brutally honest advice that everyone should know? Here’s the thing: I wish I had known these money secrets sooner. They’ve helped so many people save hundreds, secure their family’s future, and grow their bank accounts—myself included. And honestly? Putting them to use was way easier than I expected. I bet you can knock out at least three or four of these right now—yes, even from your phone. Don’t wait like I did. Cancel Your Car Insurance You might not even realize it, but your car insurance company is probably overcharging you. In fact, they’re kind of counting on you not noticing. Luckily, this problem is easy to fix. Don’t waste your time Here’s the thing: I wish I had known these money secrets sooner. They’ve helped so many people save hundreds, secure their family’s future, and grow their bank accounts—myself included. And honestly? Putting them to use was way easier than I expected. I bet you can knock out at least three or four of these right now—yes, even from your phone. Don’t wait like I did. Cancel Your Car Insurance You might not even realize it, but your car insurance company is probably overcharging you. In fact, they’re kind of counting on you not noticing. Luckily, this problem is easy to fix. Don’t waste your time browsing insurance sites for a better deal. A company calledInsurify shows you all your options at once — people who do this save up to $996 per year. If you tell them a bit about yourself and your vehicle, they’ll send you personalized quotes so you can compare them and find the best one for you. Tired of overpaying for car insurance? It takes just five minutes to compare your options with Insurify andsee how much you could save on car insurance. Ask This Company to Get a Big Chunk of Your Debt Forgiven A company calledNational Debt Relief could convince your lenders to simply get rid of a big chunk of what you owe. No bankruptcy, no loans — you don’t even need to have good credit. If you owe at least $10,000 in unsecured debt (credit card debt, personal loans, medical bills, etc.), National Debt Relief’s experts will build you a monthly payment plan. As your payments add up, they negotiate with your creditors to reduce the amount you owe. You then pay off the rest in a lump sum. On average, you could become debt-free within 24 to 48 months. It takes less than a minute to sign up and see how much debt you could get rid of. Set Up Direct Deposit — Pocket $300 When you set up direct deposit withSoFi Checking and Savings (Member FDIC), they’ll put up to $300 straight into your account. No… really. Just a nice little bonus for making a smart switch. Why switch? With SoFi, you can earn up to 3.80% APY on savings and 0.50% on checking, plus a 0.20% APY boost for your first 6 months when you set up direct deposit or keep $5K in your account. That’s up to 4.00% APY total. Way better than letting your balance chill at 0.40% APY. There’s no fees. No gotchas.Make the move to SoFi and get paid to upgrade your finances. You Can Become a Real Estate Investor for as Little as $10 Take a look at some of the world’s wealthiest people. What do they have in common? Many invest in large private real estate deals. And here’s the thing: There’s no reason you can’t, too — for as little as $10. An investment called the Fundrise Flagship Fund lets you get started in the world of real estate by giving you access to a low-cost, diversified portfolio of private real estate. The best part? You don’t have to be the landlord. The Flagship Fund does all the heavy lifting. With an initial investment as low as $10, your money will be invested in the Fund, which already owns more than $1 billion worth of real estate around the country, from apartment complexes to the thriving housing rental market to larger last-mile e-commerce logistics centers. Want to invest more? Many investors choose to invest $1,000 or more. This is a Fund that can fit any type of investor’s needs. Once invested, you can track your performance from your phone and watch as properties are acquired, improved, and operated. As properties generate cash flow, you could earn money through quarterly dividend payments. And over time, you could earn money off the potential appreciation of the properties. So if you want to get started in the world of real-estate investing, it takes just a few minutes tosign up and create an account with the Fundrise Flagship Fund. This is a paid advertisement. Carefully consider the investment objectives, risks, charges and expenses of the Fundrise Real Estate Fund before investing. This and other information can be found in the Fund’s prospectus. Read them carefully before investing. Cut Your Phone Bill to $15/Month Want a full year of doomscrolling, streaming, and “you still there?” texts, without the bloated price tag? Right now, Mint Mobile is offering unlimited talk, text, and data for just $15/month when you sign up for a 12-month plan. Not ready for a whole year-long thing? Mint’s 3-month plans (including unlimited) are also just $15/month, so you can test the waters commitment-free. It’s BYOE (bring your own everything), which means you keep your phone, your number, and your dignity. Plus, you’ll get perks like free mobile hotspot, scam call screening, and coverage on the nation’s largest 5G network. Snag Mint Mobile’s $15 unlimited deal before it’s gone. Get Up to $50,000 From This Company Need a little extra cash to pay off credit card debt, remodel your house or to buy a big purchase? We found a company willing to help. Here’s how it works: If your credit score is at least 620, AmONE can help you borrow up to $50,000 (no collateral needed) with fixed rates starting at 6.40% and terms from 6 to 144 months. AmONE won’t make you stand in line or call a bank. And if you’re worried you won’t qualify, it’s free tocheck online. It takes just two minutes, and it could save you thousands of dollars. Totally worth it. Get Paid $225/Month While Watching Movie Previews If we told you that you could get paid while watching videos on your computer, you’d probably laugh. It’s too good to be true, right? But we’re serious. By signing up for a free account with InboxDollars, you could add up to $225 a month to your pocket. They’ll send you short surveys every day, which you can fill out while you watch someone bake brownies or catch up on the latest Kardashian drama. No, InboxDollars won’t replace your full-time job, but it’s something easy you can do while you’re already on the couch tonight, wasting time on your phone. Unlike other sites, InboxDollars pays you in cash — no points or gift cards. It’s already paid its users more than $56 million. Signing up takes about one minute, and you’ll immediately receive a $5 bonus to get you started. Earn $1000/Month by Reviewing Games and Products You Love Okay, real talk—everything is crazy expensive right now, and let’s be honest, we could all use a little extra cash. But who has time for a second job? Here’s the good news. You’re already playing games on your phone to kill time, relax, or just zone out. So why not make some extra cash while you’re at it? WithKashKick, you can actually get paid to play. No weird surveys, no endless ads, just real money for playing games you’d probably be playing anyway. Some people are even making over $1,000 a month just doing this! Oh, and here’s a little pro tip: If you wanna cash out even faster, spending $2 on an in-app purchase to skip levels can help you hit your first $50+ payout way quicker. Once you’ve got $10, you can cash out instantly through PayPal—no waiting around, just straight-up money in your account. Seriously, you’re already playing—might as well make some money while you’re at it.Sign up for KashKick and start earning now! Related questions Can you explain the difference between sin(2x) and 2sin(x) cos(x)? What is the answer for sin(2x)-cos(2x)-sin(x) +cos(x) =0? How do you prove 2sin(x) cos(x) =sin(2x)? Can someone prove the identity, (sin t - cos t) ² = 1 - sin 2t? How do I prove sin 2 x = 2 sin x cos x ? Kyle Weatherly Still in High school, so I have no credentials yet, but math is one hobby I have · Author has 110 answers and 166.9K answer views · 8y Originally Answered: Why is 2\sin(x)\cos(x)=\sin(2x) true? · Say that we have cos(a-b), c=a-b, and the distance between (cos(c),sin(c)) and (1,0) is the same as the distance between (cos(a),sin(a)) and (cos(b),sin(b)). Then, if we plug these both into the distance formula, we get sqrt((cos(c)-1)^2+(sin(c))^2)=sqrt((cos(a)-cos(b))^2+(sin(a)+sin(b))^2). We can then square both sides to simplify the expression (we can do this because we are adding two positive numbers together in both radicals because we have an real number squared plus a real number squared) and expand the squared expressions and rearrange the expressions to get: cos^2(c)+sin^2(c)-2cos(c) Say that we have cos(a-b), c=a-b, and the distance between (cos(c),sin(c)) and (1,0) is the same as the distance between (cos(a),sin(a)) and (cos(b),sin(b)). Then, if we plug these both into the distance formula, we get sqrt((cos(c)-1)^2+(sin(c))^2)=sqrt((cos(a)-cos(b))^2+(sin(a)+sin(b))^2). We can then square both sides to simplify the expression (we can do this because we are adding two positive numbers together in both radicals because we have an real number squared plus a real number squared) and expand the squared expressions and rearrange the expressions to get: cos^2(c)+sin^2(c)-2cos(c)+1= cos^2(a)+sin^2(a)+cos^2(b)+sin^2(b)-2cos(a)cos(b)-2sin(a)sin(b). Because sin^2(x)+cos^2(x)=1, we simplify this to: 1–2cos(c)+1=1+1-2cos(a)cos(b)-2sin(a)sin(b). Then, some easy algebra will tell us cos(c)=cos(a)cos(b)+sin(a)sin(b), but we defined c as a-b, so cos(a-b)=cos(a)cos(b)+sin(a)sin(b). Finally, because cos((pi/2)-x)=sin(x), we can write the equation sin(f+g)=cos((pi/2)-(f+g)), which can be rewritten as sin(f+g)=cos(((pi/2)-f)-g), and we already have a way to simplify cos(a-b), so we set a=(pi/2)-f and b=g to get sin(f+g)=cos(((pi/2)-f)-g)=cos((pi/2)-f)cos(g)+sin((pi/2)-f)sin(g) which again simplifies to sin(f+g)=cos(((pi/2)-f)-g)=sin(f)cos(g)+cos(f)sin(g), so sin(f+g)=sin(f)cos(g)+cos(f)sin(g). Given this, if we set both f and g equal to x, we get sin(x+x)=sin(x)cos(x)+cos(x)sin(x), which is the same as saying sin(2x)=2sin(x)cos(x). Varsha KV Student at RV College of Architecture (2018–present) · 8y Originally Answered: Why is 2\sin(x)\cos(x)=\sin(2x) true? · w.k.t.sin(x+y)=sin(x)cos(y)+cos(x)sin(y) Let y=x then, sin(x+x)=sin(x)cos(x)+cos(x)sin(x) sin(2x)=2sin(x)cos(x) Hence it is true Sponsored by CDW Corporation Want document workflows to be more productive? The new Acrobat Studio turns documents into dynamic workspaces. Adobe and CDW deliver AI for business. Akhil Dubey MBA from Indian Institute of Management Bangalore (Graduated 2024) · Author has 108 answers and 815.5K answer views · 8y Originally Answered: Why is 2\sin(x)\cos(x)=\sin(2x) true? · By starting from R . H . S . sin(2x) = sin( x + x ) now as we know sin( a + b ) = sin(a)cos(b) + cos(a)sin(b) => sin(2x) = sin(x)cos(x) + sin(x)cos(x) => sin(2x) = 2sin(x)cos(x) Siddharth Bhandarkar Former Junior Engineer · Author has 214 answers and 77.9K answer views · 6y Originally Answered: Why does 2sin(x) cos(x) = sin(2x)? · It is from the formula of sin(A+B)=sinA.cosB+cosA.sinB . In this case both angles being the same gives us that as a result Promoted by Almedia Charlee Anthony Go-to Resource for Realistic, Side Hustle Ideas · Sep 22 How can I make an extra $200 a week online? This one good method to make extra income brought me over $3,000, and I still make $150–$200 every single week from Freecash. As a gig hunter, this app came natural to me. I hacked this Freecash platform so you don't have to. These GPT platforms can be hell to learn, so learn my top methods, rent free.👇 How I consistently make $200 a week online Here’s exactly how I made $200 a week online with zero upfront investment. And yeah, it may have involved 10 hours a week 😂 signed up for free - got a $5 welcome bonus instantly just right after I started my first offer. played games and completed offers This one good method to make extra income brought me over $3,000, and I still make $150–$200 every single week from Freecash. As a gig hunter, this app came natural to me. I hacked this Freecash platform so you don't have to. These GPT platforms can be hell to learn, so learn my top methods, rent free.👇 How I consistently make $200 a week online Here’s exactly how I made $200 a week online with zero upfront investment. And yeah, it may have involved 10 hours a week 😂 signed up for free - got a $5 welcome bonus instantly just right after I started my first offer. played games and completed offers - chose the highest-paying tasks first like monopoly GO and raid shadow legends. made an in-app purchase - spent $3 on a power-up in one mobile game, which unlocked a $25 reward. cashed out fast - once I hit my goal, I withdrew directly to PayPal. The money was there in minutes. repeated daily - by consistently putting in 1–2 hours a day, I reached $200 each week. Use my referral code and test these hacks for yourself 👉 Freecash Referral Code Not sure yet? Keep reading - and you will catch on to what I am really doing to earn this $200 a week. My secrets to hit $200 a week Not your average tips - so consider this exclusive. If you follow this well, your chances of hitting your first $100 in a week on Freecash will feel like a piece of cake. sort tasks by highest payout; go for the ones that give the biggest returns first. check the “hot offers” tab daily; these change fast, and they often have short deadlines. don’t ignore games; some game offers can pay $20–$50 each, especially with in-app upgrades (if you are into that) check for giveaways; Freecash has social giveaways regularly. A friend of mine won $100 in the last event! use your referral code; it sounds dumb, but I’ve about $100 from inviting around 10 friends. To be honest, earning on Freecash is so easy it makes debt complainers look lazy. If I can sit on the couch and earn $200 a week and pay off debt, so can you. How to start right now sign up and grab your $5 welcome bonus instantly complete your first high-paying offer tonight and cash out within hours. reinvest small amounts into in-app purchases to unlock bigger rewards. withdraw your first payout to PayPal before the week’s over. Freecash has become my go-to extra income stream. If you want to start seeing $200 weeks, then stop your doom scroll session and try Freecash now. Ajesh K C Studied at Mar Athanasius College of Engineering, Kothamangalam · Author has 1.3K answers and 3.3M answer views · 6y Originally Answered: Why does 2sin(x) cos(x) = sin(2x)? · Sin (x + y) = Sin (x) cos(y) + cos(x) sin(y) Sin (2x) =Sin (x +x) = Sin (x) cos(x) + cos(x) sin(x) = 2 Sin (x) cos(x) Gregory Schoenmakers I won't crack any jokes about knowing the angles. · Author has 4.4K answers and 8.5M answer views · 8y Originally Answered: Why is 2\sin(x)\cos(x)=\sin(2x) true? · It is a simple matter to show on a unit circle that: cos2A+sin2A=1 cos(−A)=cosA sin(−A)=−sinA cos(A−B)=cosAcosB+sinAsinB From these 4 basic relationships, all other compound angle formulas can be derived. PD TechMath Studied Pure Mathematics & Applied Mathematics ( Major) (Graduated 2017) · Author has 140 answers and 24.6K answer views · 2y We know that sin(A+B)=sinAcosB+cosAsinB Here A=x and B=x MATHEMATICS BADSHAH Class 1, 2, 3, 4, 5, 6,7, 8, 9, 10, 11, 12, BSc. 1 · Author has 79 answers and 22.3K answer views · 2y Sin2x= sin(x+x) = Sinx.cosx + cosx. Sinx Philip Lloyd Specialist Calculus Teacher, Motivator and Baroque Trumpet Soloist. · Author has 6.8K answers and 52.8M answer views · 8y What is the proof that cos (x + y) = cos (x) cos (y) − sin (x) sin (y)? This proof is so lovely and simple that I thought I must share it. We need to prove sin(A... Related questions Why is sin 2x ≠ 2sin x? What are the non-permissible values for this identity cos(2x) = 2sin(x) cos(x)? Can someone help verify the identity Sin x sin 2x + cos x cos 2x= cos x? How can I verify this identity: sin (2x) - tan (x) = tan(x) cos(2x)? How can I prove the identity, (sin x - cos x) ² = 1 - sin 2x? Can you explain the difference between sin(2x) and 2sin(x) cos(x)? What is the answer for sin(2x)-cos(2x)-sin(x) +cos(x) =0? How do you prove 2sin(x) cos(x) =sin(2x)? Can someone prove the identity, (sin t - cos t) ² = 1 - sin 2t? How do I prove sin 2 x = 2 sin x cos x ? How can I verify the identity of sin (x-3pi/2) + sin (pi/2+x) =2 cos x? How does one prove sin ( 2 x ) sin ( x ) − cos ( 2 x ) cos ( x ) = sec ( x ) ? What is the identity sin^2(x) + cos^2 (x) = 1 for all values of x? How do I prove the identity sin x tan x = sec x - cos x? How do you prove that sin(x) +sin(2x) +sin(3x) = -4sin(x) cos(x/2) sin (3x/2)? About · Careers · Privacy · Terms · Contact · Languages · Your Ad Choices · Press · © Quora, Inc. 2025
4148
https://www.bbc.co.uk/learningenglish/features/prepositions_with_georgie/ep-240503
BBC Learning English - Prepositions with Georgie / Prepositions of time Homepage Accessibility links Skip to content Accessibility Help Sign in Notifications Home News Sport Weather iPlayer Sounds Bitesize CBeebies CBBC Food Home News Sport Business Innovation Culture Travel Earth Video Live More menu Search BBC Home News Sport Weather iPlayer Sounds Bitesize CBeebies CBBC Food Home News Sport Business Innovation Culture Travel Earth Video Live Close menu Learning English Inspiring language learning since 1943 English Change language Courses Courses home Courses Grammar Grammar home Grammar Pronunciation Pronunciation home Pronunciation Vocabulary Vocabulary home Vocabulary News News home News More... Quizzes More... Test Your Level More... Downloads More... Teachers More... For Children More... Podcasts More... Drama More... Business English More... English Change Language English فارسی 中文 ไทย ဗမာစာ 한국어 አማርኛ Afaan Oromoo ትግርኛ CoursesGrammarPronunciationVocabularyNewsMore... Search Courses home Courses Grammar home Grammar Pronunciation home Pronunciation Vocabulary home Vocabulary News home News Quizzes More... Test Your Level More... Downloads More... Teachers More... For Children More... Podcasts More... Drama More... Business English More... Prepositions with Georgie Intermediate level Prepositions of time Episode 240503 / 03 May 2024 Free worksheet Watch all episodes Prepositions of time To talk about times of the day, the most common prepositions are in, on and at. ‘At’ is for exact times, like: Clock times I'll see youat7pm. Exact times of the day (e.g. sunset, sunrise, dawn, dusk, bedtime, dinnertime, midnight) The birds singatsunrise. Exception: night (this is more of a duration than one exact time) The bats come out at night. ‘In’ is for longer periods, like: Months My birthday isinNovember. Years I graduatedin2017. Seasons It usually snows hereinwinter. Centuries My parents were borninthe 60s. ‘In’ is also for sections of the day (exclude night), like: The morning It's too earlyinthe morning for talking. The afternoon We can go shopping tomorrowinthe afternoon. The evening Mum's coming to visitinthe evening. ‘On’ is for shorter periods, like: Days The meeting is on Tuesday. Dates The concert isonthe 8th of September. Holidays We'll see each otheronChristmas Eve. TOP TIPS! Remember: in the morning(more than one syllable - use in!) at noon (one syllable - use at!) in the afternoon(more than one syllable - use in!) in the evening(more than one syllable - use in!) at night(one syllable - use at!) Memorise this sentence so you always remember the difference: My bus leftatmidnightona TuesdayinJune. To do Practise by using theworksheet. NEXT WatchTenses with Georgie WatchPhrasal verbs with Georgie Try some of our othergrammar programmes Latest Prepositions with Georgie ### Prepositions for transport Episode 240524 / 24 May 2024 In the train or on the train? ### Prepositions of movement Episode 240517 / 17 May 2024 Do you know how to use 'through' and 'across'? ### Prepositions of place Episode 240510 / 10 May 2024 Do you learn English in the school or at school? ### Prepositions of time Episode 240503 / 03 May 2024 Do you practise English in the morning or at night? ### What is a preposition? Episode 240426 / 26 Apr 2024 Georgie explains why prepositions are so tricky View all Prepositions with Georgie Takeaways Download PDF About About BBC Learning English Courses Course site maps Learning FAQ Contact BBC Learning English Social TikTok YouTube Instagram Facebook Social media house rules Back to top Explore the BBC Home News Sport Weather iPlayer Sounds Bitesize CBeebies CBBC Food Home News Sport Business Innovation Culture Travel Earth Video Live Terms of Use About the BBC Privacy Policy Privacy Policy Cookies Cookies Accessibility Help Parental Guidance Contact the BBC Make an editorial complaint BBC emails for you Advertise with us Copyright © 2025 BBC. The BBC is not responsible for the content of external sites. Read about our approach to external linking.
4149
https://aspe.org/pipeline/hazen-williams-and-darcy-weisbach-equations-similarities-and-differences/
Hazen-Williams and Darcy-Weisbach Equations: Similarities and Differences - ASPE Pipeline Skip to content About ASPE Contact Advertise Subscribe Submit an Article Search for: Search ASPE Updates Webinars/Workshops Member News Industry News Codes & Standards Industry Events Education Opportunities Affiliate Corner Pipeline Exclusives All News Hazen-Williams and Darcy-Weisbach Equations: Similarities and Differences September 5, 2023 Which equation is better? Here’s a brief comparison of their use in sprinkler piping sizing. by Yasser Amer Ahmed, CPD, LEED AP BD+C, CFPS, MIFireE, PMSFPE The Hazen-Williams and Darcy-Weisbach equations are both used to calculate head loss due to friction in fluid flow. The Hazen-Williams equation is commonly used for water flow through pipes, while the Darcy-Weisbach equation is a more versatile and accurate method for calculating head loss due to friction in fluid flow. The Hazen-Williams equation is easier to use than the Darcy-Weisbach equation, as it doesn’t require iterative calculations. It estimates friction loss in a pipeline with just a few parameters. However, this equation is only applicable to water flow and cannot be used for other fluids. It also is less accurate for larger pipes and higher flow velocities. On the other hand, the Darcy-Weisbach equation can be used for various fluids, not just water. It provides more accurate results for a wide range of pipe sizes and flow velocities. However, the equation is more complex, requiring iterative calculations and additional parameters. Values of the friction loss coefficient, C, used in the Hazen-Williams equation are accurate only if the flow velocity is close to that at which the value of C was measured. It is a matter of judgment as to what velocity is “too high” for the Hazen-Williams equation. American Water Works Association (AWWA) data list C factors measured at a velocity of 3 feet per second (fps) (0.9 m/s), yet it is standard practice in sprinkler calculations to accept velocities in sprinkler piping between 10 and 20 fps (3.05 and 6.1 m/s). Similarly, the tables of equivalent lengths for fittings and valves used by sprinkler system designers are based on fittings and valve types typical of sprinkler systems. Water mist systems may incorporate different types of fittings and valves for which the equivalent length values based on Hazen-Williams commonly accepted for sprinkler piping will be incorrect. The Hazen-Williams (H-W) equation contains no terms that allow you to change the temperature, density, or viscosity of the liquid. It assumes that the water contains no additives and is close to 60°F (15.6°C). The Darcy-Weisbach (D-W) equation does allow for variation in fluid properties, and for that reason, it is widely used by mechanical engineers designing fluid systems. NFPA 750: Standard on Water Mist Fire Protection Systems requires the use of the D-W equation if fluid velocity exceeds 25 fps (7.6 m/s). The limiting velocity was selected after a review of calculations comparing the agreement between H-W and DW calculations and measured head losses in 1- to 3-inch (25- to 80-mm) diameter black steel pipe over a range of velocities. Finally, the Hazen-Williams formula comes within 10 percent accuracy of the value obtained using the Darcy-Weisbach equation, with significantly less effort. This is considered to be within the range of acceptable values in an engineering exercise involving fire protection system piping. About the Author Yasser Amer Ahmed is an accomplished Egyptian Fire Protection and Plumbing Specialist with 30+ years of international experience at Dar Al-Handasah Consultants, an internationally ranked consulting firm providing planning, design, management, and consultancy. As a Fire Protection & Plumbing Specialist, he excels in managing diverse projects and teams, with expertise in strategic leadership, project management, and engineering, and has strong and diversified experience in the design and coordination of plumbing and fire protection systems for mixed-use complexes, airports, educational, healthcare, residential, commercial, high-rise, and governmental buildings. Yasser graduated from Ain Shams University with a bachelor’s degree in Civil Engineering, Public Works Dept., in 1991, and he received a post-graduate diploma in Sanitary Engineering from Ain Shams University in 1996 and an MBA from Brookline Business School (New York) in August 2020. Yasser is a Certified Fire Protection Specialist (CFPS) since December 2016, Certified in Plumbing Design (CPD) since April 2016, and a LEED AP BD+C since April 2014. He is a member of the National Fire Protection Association (NFPA), ASPE, the Society of Fire Protection Engineers (SFPE), the Institution of Fire Engineers (MIFireE), the Egyptian Engineers Syndicate, and the Egyptian Society of Civil Engineers, and he is authorized as a Fire Protection Consultant Engineer from Egyptian Engineers Syndicate. The opinions expressed in this article are those of the author and not the American Society of Plumbing Engineers. References: SFPE Handbook of Fire Protection, 5th edition, and Fire Protection Handbook, 20th edition plumbing design PIPELINE EXCLUSIVES Back to Basics: The Basics of Inert Gases Proper Sizing for Vacuum Systems Is Crucial in Healthcare Facilities August 2025 Lessons in Firestop: The Hidden Dangers of Dissimilar Materials July 2025 ASPE Legislative Update: Getting You Up to Speed on Current Activities ← September 2023 Professional Engineer’s Perspective: Why Has the Profession Allowed Various Interests to Produce Differing Model Codes? Watts to Host ASPE-Accredited Webinar on Commercial Leak Defense → Want news delivered right to your inbox? Sign up for our free newsletter, delivered every other Thursday. Subscribe Now 6400 Shafer Court, Ste. 350 Rosemont, IL 60018 847.296.0002 About ASPE Contact Advertise Subscribe ASPE Updates Industry News Education Opportunities Affiliate Corner 𝕏 © 2023 American Society of Plumbing Engineers. All Rights Reserved. Scroll to Top
4150
https://math.stackexchange.com/questions/2446475/splitting-a-summation-into-even-and-odd-components
Splitting a summation into even and odd components - Mathematics Stack Exchange Join Mathematics By clicking “Sign up”, you agree to our terms of service and acknowledge you have read our privacy policy. Sign up with Google OR Email Password Sign up Already have an account? Log in Skip to main content Stack Exchange Network Stack Exchange network consists of 183 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. Visit Stack Exchange Loading… Tour Start here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the workings and policies of this site About Us Learn more about Stack Overflow the company, and our products current community Mathematics helpchat Mathematics Meta your communities Sign up or log in to customize your list. more stack exchange communities company blog Log in Sign up Home Questions Unanswered AI Assist Labs Tags Chat Users Teams Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Try Teams for freeExplore Teams 3. Teams 4. Ask questions, find answers and collaborate at work with Stack Overflow for Teams. Explore Teams Teams Q&A for work Connect and share knowledge within a single location that is structured and easy to search. Learn more about Teams Hang on, you can't upvote just yet. You'll need to complete a few actions and gain 15 reputation points before being able to upvote. Upvoting indicates when questions and answers are useful. What's reputation and how do I get it? Instead, you can save this post to reference later. Save this post for later Not now Thanks for your vote! You now have 5 free votes weekly. Free votes count toward the total vote score does not give reputation to the author Continue to help good content that is interesting, well-researched, and useful, rise to the top! To gain full voting privileges, earn reputation. Got it!Go to help center to learn more Splitting a summation into even and odd components Ask Question Asked 8 years ago Modified8 years ago Viewed 1k times This question shows research effort; it is useful and clear 1 Save this question. Show activity on this post. I'm having trouble understanding how the the second line of the splitting of this summation works. I don't understand how the sums of each individual parts can still run from n = 0 to infinity without over-counting and making the sum larger. Definition of the matrix's properties Splitting of summation into even/odd parts (trouble understanding bridge from line 1 to 2) Thanks for any help. summation Share Share a link to this question Copy linkCC BY-SA 3.0 Cite Follow Follow this question to receive notifications asked Sep 26, 2017 at 19:35 falsovuotofalsovuoto 133 6 6 bronze badges 2 If I write 2 2 n+2 2 n+1 2 2 n+2 2 n+1 for n=0…4 n=0…4 you have 2 0+2 1+2 2+2 3+2 4+2 5+2 6+2 7+2 8+2 9 2 0+2 1+2 2+2 3+2 4+2 5+2 6+2 7+2 8+2 9 No overcounting as you can see Raffaele –Raffaele 2017-09-26 19:42:36 +00:00 Commented Sep 26, 2017 at 19:42 Ah, but of course – thank you!falsovuoto –falsovuoto 2017-09-26 19:52:05 +00:00 Commented Sep 26, 2017 at 19:52 Add a comment| 1 Answer 1 Sorted by: Reset to default This answer is useful 1 Save this answer. Show activity on this post. The reason you are not overcounting is that the exponents in each of the split sums are advancing by 2 2 for increase in n n or 1 1. So if you went up to any particular (even) upper limit of the exponent, you would have the same number of terms in the sum of the split sums and the original sum. Share Share a link to this answer Copy linkCC BY-SA 3.0 Cite Follow Follow this answer to receive notifications answered Sep 26, 2017 at 19:39 Mark FischlerMark Fischler 42.4k 3 3 gold badges 41 41 silver badges 78 78 bronze badges 0 Add a comment| You must log in to answer this question. Start asking to get answers Find the answer to your question by asking. Ask question Explore related questions summation See similar questions with these tags. Featured on Meta Introducing a new proactive anti-spam measure Spevacus has joined us as a Community Manager stackoverflow.ai - rebuilt for attribution Community Asks Sprint Announcement - September 2025 Report this ad Related 0Solving the Riemann Sum ∑n i=1(1+6 i n)3(2 n)∑i=1 n(1+6 i n)3(2 n)? 4How can I find a closed form for the summation (i^2)(-1^i+1) systematically? 2On an algebraic manipulation of a double summation used to obtain the kth ordinate of the periodogram. 1Changing summation in a power series 0Understanding simplification of summation 1Prove the theorem by binding the term and splitting the sum 1How is ∑∞i=0∑∞j=0 x i+j=∑∞n=0∑n i=0 x n∑i=0∞∑j=0∞x i+j=∑n=0∞∑i=0 n x n 0Expressing a double-sum of the form ∑n i=1∑h j=1 a i+j∑i=1 n∑j=1 h a i+j in terms of single-sums Hot Network Questions how do I remove a item from the applications menu ConTeXt: Unnecessary space in \setupheadertext Origin of Australian slang exclamation "struth" meaning greatly surprised Can a cleric gain the intended benefit from the Extra Spell feat? The geologic realities of a massive well out at Sea Matthew 24:5 Many will come in my name! Is there a specific term to describe someone who is religious but does not necessarily believe everything that their religion teaches, and uses logic? Is encrypting the login keyring necessary if you have full disk encryption? What is the meaning of 率 in this report? Does the Mishna or Gemara ever explicitly mention the second day of Shavuot? Identifying a movie where a man relives the same day Who is the target audience of Netanyahu's speech at the United Nations? The rule of necessitation seems utterly unreasonable Bypassing C64's PETSCII to screen code mapping What's the expectation around asking to be invited to invitation-only workshops? An odd question Numbers Interpreted in Smallest Valid Base Transforming wavefunction from energy basis to annihilation operator basis for quantum harmonic oscillator What is a "non-reversible filter"? A time-travel short fiction where a graphologist falls in love with a girl for having read letters she has not yet written… to another man What were "milk bars" in 1920s Japan? Suggestions for plotting function of two variables and a parameter with a constraint in the form of an equation Is existence always locational? Does the mind blank spell prevent someone from creating a simulacrum of a creature using wish? more hot questions Question feed Subscribe to RSS Question feed To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Why are you flagging this comment? It contains harassment, bigotry or abuse. This comment attacks a person or group. Learn more in our Code of Conduct. It's unfriendly or unkind. This comment is rude or condescending. Learn more in our Code of Conduct. Not needed. This comment is not relevant to the post. Enter at least 6 characters Something else. A problem not listed above. Try to be as specific as possible. Enter at least 6 characters Flag comment Cancel You have 0 flags left today Mathematics Tour Help Chat Contact Feedback Company Stack Overflow Teams Advertising Talent About Press Legal Privacy Policy Terms of Service Your Privacy Choices Cookie Policy Stack Exchange Network Technology Culture & recreation Life & arts Science Professional Business API Data Blog Facebook Twitter LinkedIn Instagram Site design / logo © 2025 Stack Exchange Inc; user contributions licensed under CC BY-SA. rev 2025.9.26.34547 By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. Accept all cookies Necessary cookies only Customize settings Cookie Consent Preference Center When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy Accept all cookies Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details‎ Performance Cookies [x] Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details‎ Functional Cookies [x] Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details‎ Targeting Cookies [x] Targeting Cookies These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. Cookies Details‎ Cookie List Clear [x] checkbox label label Apply Cancel Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Necessary cookies only Confirm my choices
4151
https://ocw.mit.edu/courses/6-451-principles-of-digital-communication-ii-spring-2005/resources/lecture-5-introduction-to-binary-block-codes/
Lecture 5: Introduction to Binary Block Codes | Principles of Digital Communication II | Electrical Engineering and Computer Science | MIT OpenCourseWare Browse Course Material Syllabus Calendar Readings and Lecture Notes Video Lectures Assignments Exams Course Info Instructor Prof. David Forney Departments Electrical Engineering and Computer Science As Taught In Spring 2005 Level Graduate Topics Engineering Electrical Engineering Digital Systems Telecommunications Learning Resource Types theaters Lecture Videos assignment_turned_in Problem Sets with Solutions grading Exams with Solutions notes Lecture Notes Download Course menu search Give Now About OCW Help & Faqs Contact Us searchGIVE NOWabout ocwhelp & faqscontact us 6.451 | Spring 2005 | Graduate Principles of Digital Communication II Menu More Info Syllabus Calendar Readings and Lecture Notes Video Lectures Assignments Exams Video Lectures Lecture 5: Introduction to Binary Block Codes Topics covered: Introduction to Binary Block Codes Instructor: Prof. David Forney Video Player is loading. Play Video Play Mute Current Time 0:00 / Duration 1:34:00 Loaded: 0.00% 0:00:00 Stream Type LIVE Seek to live, currently behind live LIVE Remaining Time-1:34:00 1x Playback Rate Chapters Chapters Descriptions descriptions off, selected Captions captions settings, opens captions settings dialog captions off, selected English Captions Audio Track Picture-in-Picture download button Download video Fullscreen playback speed Playback speed 0.25 0.5 0.75 1, selected 1.25 1.5 This is a modal window. Beginning of dialog window. Escape will cancel and close the window. Text Color Transparency Background Color Transparency Window Color Transparency Font Size Text Edge Style Font Family Reset restore all settings to the default values Done Close Modal Dialog End of dialog window. Transcript Download video Download transcript 0:00 PROFESSOR: Chapter six, problem set three, problem set 0:04 two solutions. 3:27 OK. 3:28 Good morning. 3:29 Nice to see you all again on this mild day. 3:32 I want to start off by thanking Ashish greatly for 3:37 giving the last three lectures. 3:39 I have very high confidence in Ashish, and I'm sure he give 3:42 you excellent lectures and was able to answer all your 3:45 questions, right? 3:48 But if you feel dissatisfied at any point, you'll have an 3:52 opportunity to ask the question again today. 3:57 We will continue now in chapter six. 3:59 I understand Ashish got up to section six point one already, 4:04 so that makes my life a little easier. 4:07 And we'll just continue to plow ahead through the notes. 4:09 You have as handouts today chapter six, the outgoing 4:16 problem set, the solutions to the incoming problem set. 4:21 So does anyone have any comments or questions or 4:26 suggestions as we go forward at this point? 4:30 Let's say I'll do a very quick review of everything so far, 4:34 at least what we need to proceed, so you'll have a 4:37 chance to ask questions along there if you like. 4:40 Anyone have anything to say? 4:43 Anyone want to say thanks to Ashish? 4:48 All right. 4:49 Great. 4:51 OK. 4:52 So a very quick review. 4:57 We first said we were going to work with a continuous time 5:02 Additive White Gaussian noise channel, but we quickly 5:05 reduced it to a discrete time additive white 5:08 Gaussian noise model. 5:10 Vector model, Y equals X plus N, where the vectors may go on 5:15 as long as you like. 5:16 And implicit in here is we have some kind of power 5:19 limitation expressed by various -- 5:21 I know I've probably introduced too many parameters 5:24 in the early part of the course. 5:27 But you'll see them all in the literature, and I thought you 5:31 might as well see the relation between them all at once. 5:36 The noise. 5:36 The main thing about this is it's an independent, 5:40 identically distributed noise, also independent of X, and 5:44 it's characterized simply by its variance per symbol, or 5:49 average power. 5:49 Again, there are various notations that we 5:54 can use for its power. 5:57 OK. 5:58 However you express the power of the signal of the noise, 6:03 you're going to get some signal-to-noise ratio out of 6:05 that, as long as you use consistent the same units for 6:09 signal and noise. 6:10 And so the key parameters of this channel turn 6:13 out to be just two. 6:16 One is the signal-to-noise ratio. 6:19 And the other is something which in the discrete time 6:23 domain we might think of as a data rate, rho, the number of 6:26 bits per two dimensions. 6:28 But we were at pains to show -- 6:32 and the reason we measure it in bits per two dimensions is 6:35 that it converts directly to the spectral efficiency, or we 6:40 sometimes say, the nominal spectral efficiency, or the 6:42 Nyquist spectral efficiency. 6:45 Basically, this is the spectral efficiency if you 6:48 assume that you only use the nominal Nyquist bandwidth. 6:52 And both in 450 and here it was shown that you can really 6:57 get as close to the nominal bandwidth as you like, its 7:03 sharp or roll off as you like, by using filters. 7:08 Very sharp filters or very sharp digital filters that 7:15 today we can really realistically get effectively 7:20 to the Nyquist bandwidth. 7:23 So this is a good measure of nominal spectral efficiency, 7:27 which is an extremely important parameter, the 7:29 spectral efficiency in continuous time. 7:33 And then the Shannon limit is expressed in this very simple 7:36 form that we can never do better in data rate or nominal 7:44 spectral efficiency than log of 1 plus SNR. 7:48 And the units are bits per two dimensions. 7:51 So there's an awful lot about parameters and units in the 7:55 first part of the course, and sometimes it's a little 7:57 overwhelming and confusing. 8:01 But in my experience in engineering is, it's extremely 8:05 important to get the units right. 8:08 It helps you in thinking clearly. 8:11 It helps you to focus on the right things. 8:14 And so in the first couple of chapters, there's a lot of 8:16 emphasis on getting the units right. 8:18 For instance, bits per two dimensions. 8:21 I could simply assert to you that things are always to come 8:25 out better if you do things per two dimensions. 8:28 This basically has to do with Gaussian distributions being 8:34 simpler in two dimensions than they are in one dimension. 8:37 So you know you can get closed form integrals in two and four 8:41 and so forth dimensions that you can't get in one and three 8:44 and so forth dimensions. 8:45 So you know, the geometrical formulas for the volume of the 8:50 sphere and so forth are much simpler in even dimensions 8:53 than they are in odd dimensions. 8:55 This all, I think, has to do with the fact that really a 9:00 one-dimensional complex Gaussian variable, or in 9:03 general, complex Gaussian variables, are in some sense 9:06 mathematically simpler than real Gaussian variables. 9:10 For instance, the Q function is a very ugly thing. 9:14 In two dimensions, you can closed-form integrals with 9:16 probability of error. 9:18 So there's a lot of clues that we really want to think in 9:22 terms of pairs of real dimensions. 9:29 All right. 9:29 And then we introduced a couple more parameters. 9:32 And I understand Ashish got the questions 9:35 that I get every year. 9:36 Why do we introduce both of these things? 9:39 SNR norm, which is SNR normalized by 2 to the rho 9:43 minus 1, that's motivated directly by the 9:45 Shannon limit formula. 9:47 Or Eb over N_0, which is SNR divided by rho. 9:52 You know, these are both more or less 9:54 equivalent to each other. 9:55 From this Eb over N_0 is just 2 to the rho minus 1 over rho 10:00 times SNR norm, so why do we introduce both of them? 10:05 And there's not an intellectually very strong 10:11 argument to introduce both of them. 10:15 Because one is easily translated into the other. 10:20 For fixed nominal spectral efficiency rho, there clearly 10:26 is just a one-to-one translation. 10:28 We could use either one. 10:29 If you graph something versus Eb over N_0 or versus SNR 10:33 norm, it's just a matter of shifting it by this factor. 10:38 They're going to be exactly the same graph with the 0 dB 10:42 point in a different place, according to where 0 dB is. 10:47 Philosophically, of course, SNR norm, which is sometimes 10:52 called the gap to capacity, is exactly a measure of how many 10:58 dBs away are we from the Shannon limit. 11:02 Measuring things on a log scale in dB. 11:06 And so 0 dB is always the Shannon limit point with SNR 11:10 norm, because this statement translates into SNR norm is 11:15 greater than 1, which is 0 dB. 11:18 So here the focus is always, how far are you from capacity? 11:23 How far are you from the Shannon limit? 11:25 And that really is the modern view. 11:29 In the early days of coding, the view was, well, how much 11:32 coding gain can we get over no coding? 11:35 And as we'll see, Eb over N_0 is often a very convenient 11:42 parameter to use when we're focusing on coding gain. 11:46 In fact, for binary linear block codes, which is what 11:49 we're talking about in chapter six, we get an extremely 11:51 simple expression that Eb over N_0 it's just kd over N, where 11:57 N, k, d are the basic parameters of a block code. 12:02 If you don't know those yet, you will by 12:04 the end of this lecture. 12:06 And Eb over N_0 is what was put forward in the early days, 12:14 when the principal coding application was coding for 12:17 deep space communications. 12:19 It makes sense in the power-limited regime. 12:22 In the power-limited regime, we showed that this 12:27 essentially goes -- this is rho log2 over rho, so up to a 12:31 factor of natural logarithm of two, these are the same, 12:36 almost independent of the spectral efficiency, as well. 12:39 And so this is a very natural thing to use, especially in 12:44 the power-limited regime. 12:46 In the bandwidth-limited regime, as rho gets large, 12:50 then these things become very different. 12:52 SNR norm always keeps us in the neighborhood of 0 dB. 12:56 This thing goes up to 10 dB, 20 dB, 30 dB, and so forth. 13:01 Nonetheless, you'll see in some literature, people 13:03 continue to measure against Eb over N_0 maybe I would say, 13:09 just because they don't know any better. 13:11 Anyway, since I started writing these notes about 13:16 eight or nine years ago, I've been advocating SNR norm. 13:19 It's more and more widely used in our business, 13:23 in the coding business. 13:24 Or equivalently, one always shows nowadays how far are you 13:30 from capacity, and that's what SNR norm is about. 13:35 And you can always translate this into this and this into 13:38 this by this simple formula. 13:40 So that's why we introduce them both. 13:42 Eb over N_0 is traditional. 13:44 SNR norm is more of the modern gap to capacity viewpoint. 13:49 Any questions about that? 13:51 Because I understood that Ashish got a number of 13:54 questions about that. 13:56 Yes? 13:56 AUDIENCE: And the probability of error you mentioned 13:59[UNINTELLIGIBLE] is natural with SNR model. 14:03 PROFESSOR: Well, this is a slightly 14:04 different point, actually. 14:08 So we go on from this to talk about the power-limited 14:11 regime, which we defined more or less arbitrarily as the 14:14 regime where rho is less than or equal to two bits per two 14:17 dimensions, and the bandwidth-limited regime, 14:20 which is where rho is larger. 14:23 And at this point, I simply assert that it's better to do 14:30 everything per two dimensions in the bandwidth-limited 14:32 regime and to do everything per bit in the 14:39 power-limited regime. 14:41 And the reason for this is basically long practice and 14:47 intuition and experience that things do work out better, and 14:51 this is the proper normalization. 14:53 But I think at this point in the course, with your 14:55 background, this is only an assertion, all right? 15:00 So I simply say, this is the way we're going to do things 15:05 in bandwidth-limited and power-limited. 15:08 For most of the rest of the course, we're going to be in 15:13 the power-limited regime. 15:14 Then we'll come back to the bandwidth-limited very late in 15:18 the course. 15:19 So you can now forget this assertion for a while. 15:26 Yes? 15:26 AUDIENCE: [INAUDIBLE] 15:31 PROFESSOR: Well, I'm trying to focus on that here. 15:33 That if two systems have different rhos, then you 15:38 should take that into account in their comparison. 15:42 And when you see charts of a rate 7/8 system, or a rho 7/4 15:59 system versus one that's rate 1/8, those are very different 16:03 regimes, and it probably isn't fair to compare two systems, 16:10 just in terms of their probability of error versus Eb 16:13 over N_0 at two different spectral efficiencies. 16:16 What is more fair is to compare them in terms of their 16:21 gap to capacity. 16:27 You can get more powerful codes with more 16:30 error-correcting capability the lower in rate that you go. 16:34 And so you should start from the point of view that two 16:39 systems with different rho are incomparable, and then using 16:45 this you can say, but, you know, if we can get within 1 16:48 dB of the Shannon limit with both of them, then they're 16:51 both approximately equally powerful. 16:53 That would be the modern point of view. 16:56 But it's really apples and oranges if they have different 17:00 rates, different rhos. 17:03 Yes? 17:03 AUDIENCE: [INAUDIBLE] 17:07 If [UNINTELLIGIBLE] 17:10 systems modulation [INAUDIBLE]. 17:13 Then is it fair -- 17:16 because if one of them has coding -- 17:21 PROFESSOR: If none of them have coding, well -- 17:24 AUDIENCE: No, just modulation. 17:28 PROFESSOR: So what shall I say to that. 17:31 In the power-limited regime, an uncoded system is simply 17:35 binary modulation or 4-QAM, and there aren't different 17:41 systems to compare, really. 17:43 There's only one baseline system. 17:46 As you go up into the bandwidth-limited regime, then 17:51 it is fair to compare systems of the same 17:55 class, like M by M QAM. 17:58 That's a simple uncoded system. 18:01 Now there, rho keeps changing. 18:04 rho equals 2, rho equals 4, rho equals 6, rho equals 8. 18:08 Or you can easily find intermediate 18:11 rates that are uncoded. 18:13 And there you find that this normalization makes all these 18:17 systems comparable. 18:19 In fact, we saw that we got a universal baseline curve for 18:24 the bandwidth-limited regime, which was independent of rho, 18:28 for, say, the class of 4 by 4, by the class of M by M 18:33 bandwidth-limited QAM systems. 18:37 I'm sorry. 18:38 I got off a plane at nine o'clock last night, so I may 18:41 not be totally coherent today. 18:45 But all of these systems have exactly the same baseline 18:49 curve up to the approximations we've made that their exactly 18:55 four nearest neighbors and so forth. 18:57 But on a curve of probability of error per two dimensions, 19:02 per QAM symbol, versus SNR norm, we 19:06 get a universal curve. 19:08 So that indicates they really are comparable. 19:11 They form a class where the performance of the class is 19:15 independent of rho. 19:16 And that's sort of typical of the bandwidth-limited regime. 19:20 Two systems that differ, that basically use the same code 19:24 with smaller constellation or a larger-based uncoded 19:28 constellation are going to be directly comparable, and are 19:30 probably going to have the same gap to capacity. 19:35 Going to be just as far away from the Shannon limit. 19:37 But we don't have that phenomenon in the 19:39 power-limited case. 19:45 Other questions, or shall I proceed? 19:49 OK. 19:52 Again continuing what I hope will be a quick review, but I 19:58 don't want to go any faster than you're comfortable with. 20:05 We get this baseline curve for 2-PAM or 2 20:12 by 2 QAM, same thing. 20:18 So this is the baseline of Pb of E on a log scale, where we 20:26 typically go down to ten to the minus six, ten to the 20:29 minus five. 20:31 Here's 0 dB. 20:33 This goes down through about 9.6 dB here or 20:37 about 10.5 dB here. 20:40 And the ultimate Shannon limit is over here. 20:47 The ultimate Shannon limit for very low rho, as rho goes to 20:52 0, is about minus 1.6 dB. 20:55 And we get expressions. 20:57 0 dB is the Shannon limit at rho equals 1. 21:00 At rho equals 2, it's up about 1.8 dB. 21:05 Shannon limit for rho equals 2, and so forth. 21:08 And anyway, so we see as a function of rho, we can 21:12 measure the gap to capacity at different probabilities of 21:16 error and see how much coding gain is, 21:19 in principle, possible. 21:20 And then for a coded system, we can put that on here. 21:26 The effective coding gain is the distance 21:29 between here and here. 21:32 At some target probability of error. 21:36 It's going to differ according to probably of error. 21:39 You found a way of getting a good, rough-cut estimate, at 21:46 least for not very complicated codes called the union bound 21:50 estimate for any signal constellation in any number of 21:57 dimensions. 21:58 So if we have a signal constellation A, which 22:04 consists of M points in N dimensions, so forth, 22:10 basically found that we could, in the power-limited regime, 22:16 get an approximate expression from considering pairwise 22:22 error probabilities that's very simple. 22:25 And I used this notation. 22:27 Q of the square root of some coding gain of the 22:34 constellation times 2 Eb over N_0. 22:40 If it's just 2-PAM then the coding gain becomes 1. 22:45 This is the average number of nearest neighbors per 22:52 transmitted bit. 22:55 And so the whole thing reduces to this expression in terms of 23:00 couple of parameters. 23:01 the principal parameter is the nominal coding gain, which is 23:06 the minimum squared distance of A over 4 times the energy 23:13 per bit of this constellation A. So we really only need to 23:19 know this kind of normalized measure of goodness of the 23:24 constellation. 23:27 And K_b of A Is the average number of nearest neighbors. 23:35 I forget what we call it. 23:38 What is the numerator here? 23:43 K_min of A, which itself is an average, over the number of 23:50 bits that we're actually sending, which is log2 of the 23:56 size of A. 23:59 So basically we only need to know a couple of parameters of 24:03 this signal constellation. 24:04 Its minimum square distance is very important. 24:08 Energy parameter, which we choose to make the energy per 24:11 bit, or so that we get this expression. 24:15 And the average number of nearest neighbors per bit that 24:19 we transmit. 24:19 OK. 24:23 And our best example so far is the tetrahedral constellation, 24:33 where we basically pick every other 24:37 point from the 4 simplex. 24:48 Maybe I should do that in a different color. 24:50 I don't think that's a different color. 24:52 Nope. 24:54 Anyway. 24:55 You know this quite well by now. 24:57 And if we do that, we find that normalizing everything, 25:01 this is 4/3 or 1.25 dB. 25:05 And every point has three nearest neighbors, and we're 25:10 sending 2 bits, so this is 3/2. 25:15 So then we get this handy dandy engineering rule to make 25:20 a quick plot of the union bound estimate. 25:25 Given that we decided to put this on a log-log scale to 25:27 start with, all we have to do to plot this expression -- 25:33 if we're given, as we always are, the baseline curve, which 25:42 is simply Q to the square root of 2 Eb over N_0. 25:49 How do you convert this curve to this curve 25:52 on a log-log plot? 25:53 Well, you simply move it to the left by the coding gain. 25:57 And you move it up by the log of whatever K_b is. 26:03 So if the dominant effect is moving it left, in this case, 26:08 by 1.25 dB -- 26:12 I'm going to wind up getting about this curve, so I won't 26:15 draw it again -- 26:15 then we move it up by a factor of 3/2, we developed a rule of 26:22 thumb that said a factor of two is basically going to cost 26:26 you about 0.2 dB. 26:30 Around ten to the minus five. 26:31 This is just based on the slope of this baseline curve, 26:35 as long as we're somewhat in that region. 26:38 So this will cost us about 1/10 of a dB, so we'll get an 26:43 effective coding gain of about 1.15 dB. 26:49 So graphically, we take this curve bodily. 26:52 We move it over 1.25 dB, and we move it up 26:58 by a factor of 3/2. 27:00 And what we'll find is the effective coding gain is 27:02 thereby reduced to, I estimate, about 1.15 dB. 27:07 And this is all just engineering rules of thumb. 27:11 Nice template. 27:12 I sometimes say you should fill out a copy of this 27:15 baseline curve, cut it out, put it in your wallet for the 27:18 duration of this course, because you'll have the 27:20 opportunity to make this kind of 27:22 calculation again and again. 27:25 All right. 27:25 So that's union bound SNR. 27:28 For simple constellations, the union bound 27:31 estimate is very accurate. 27:34 So this is a very good way to proceed, from an engineering 27:37 point of view. 27:38 We want to write a paper? 27:41 You know, it's a little late to write a paper on the 27:43 performance of the four simplex signal constellations, 27:46 but if you wanted to, and you wanted to have one graph in 27:49 that paper, you would have the graph of -- 27:51 well, you would actually probably compute the exact 27:57 error of probability, either by analysis or by Monte Carlo 28:01 simulation, you would put that in there. 28:03 But in your first draft of the paper, you would put in union 28:05 bound estimate and you would find that wasn't far off. 28:11 OK. 28:12 Any questions on that? 28:13 This has basically got us up to chapter six. 28:26 So in chapter six now, which Ashish got into last time. 28:35 This is basically about binary linear block codes. 28:44 And well, we first just start talking about 28:48 binary block codes. 28:51 That's what Ashish did last time. 28:58 We basically take 0 and 1 as our binary alphabet. 29:03 We take a blocks of length n. 29:08 Sorry. 29:08 Are we using little n or big N? 29:12 Little n, where n is called the block plank. 29:15 So we take the set of all binary symbols of length n, 29:23 and we're going to convert this to real n space. 29:31 How do we convert it? 29:33 Component-wise, by the standard 2-PAM map. 29:36 We map 0 into plus alpha, 1 into minus alpha. 29:41 So this maps into plus or minus alpha to the n. 29:46 So the entire universe of possible code words that we 29:50 have is this set of 2 to the n real n-tuples, which are 29:58 simply the vertices of an n cube of size 2 alpha, 30:01 obviously, right? 30:02 Just like this. 30:04 We have eight possible vertices in 3-space. 30:10 They obviously all have the same power. 30:12 They all lie on the surface of a sphere of squared radius n 30:17 alpha squared. 30:20 So they're not only the vertices of a cube, they're 30:22 vertices that are spread on an equal energy sphere. 30:26 And the whole idea is that our code is going to be some 30:32 subset of this, and the code will map under the same map, 30:36 which we call S, into some subset of the 30:43 vertices of the n-cube. 30:45 OK? 30:45 And again, our favorite example is the tetrahedron. 30:50 For instance, if we take the code as being 0, 0, 0, 0, 1, 30:57 1, 1, 0, 1 1, 1, 0, those for binary three-tuples, this maps 31:06 into T, the tetrahedron. 31:10 OK? 31:11 Well, we get this signal structure, which we've already 31:15 found the coding gain. 31:16 It has a little bit of coding gain. 31:18 We actually accomplished something. 31:22 All right. 31:24 So that's the basic idea that we go through in 6.1. 31:30 That's our favorite example. 31:33 And Ashish also shows you that, you know, you might 31:37 think this is an awfully restricted way of designing 31:41 constellations. 31:43 But when we're talking about low spectral efficiencies, by 31:47 going through the capacity calculation, we can assure 31:50 ourselves that in principle, this is not going to be very 31:55 sub-optimal for it. 31:57 Capacity is about the regime where n gets very large for 32:00 very long block codes. 32:02 We don't lose much in potential coding gain, or in 32:06 the Shannon limit, equivalently, by restricting 32:10 the input output input alphabet to be just these two 32:15 numbers, plus or minus alpha, I should say, rather than 32:18 using the whole real line as an input, as long as the 32:24 nominal spectral efficiency is less than or equal to one bit 32:35 per two dimensions. 32:37 And the exact numbers -- 32:41 at rho equals 1, you lose about 0.2 dB, in principle, 32:47 using the Shannon limit as your guide. 32:51 And for lower rho, it just goes to 0. 32:56 And you did this last time. 32:59 OK. 32:59 So it's a very reasonable, and obviously attractive from an 33:04 implementation point of view, way of designing signal 33:08 constellations. 33:09 And again, this is basically all we're going to be talking 33:12 about for the majority of the course, is signal 33:15 constellations like this. 33:16 But of course as we get to codes that are thousands of 33:19 bits long, or perhaps even infinitely long, as in the 33:22 case of convolutional codes and trellis codes, sometimes 33:28 you forget that we're really talking about just putting 33:31 points in Euclidian signal space. 33:35 Because we're going to be very abstracted back into the 33:39 binary domain. 33:42 But in this course, we're always thinking of codes as 33:46 means of designing signal constellations. 33:53 Of course, codes are used far more widely than just for 33:57 signaling over the additive white Gaussian noise channel. 34:01 I've sort of packaged this course as a search to get to 34:08 capacity, we have added the additive white 34:10 Gaussian noise channel. 34:11 First of all because this corresponds 34:13 very closely to history. 34:16 Within this package, we can talk about all of the 34:19 principal classes of codes that have been developed to 34:22 date, and we can compare them in some performance terms. 34:29 How close do they get to capacity on the additive white 34:31 Gaussian noise channel. 34:33 So you get most of what you would get if you took a 34:38 communications-free view of coding theory. 34:42 You know, people are interested in codes for 34:44 computer memories, for God knows what, 34:50 lots of other things. 34:51 And for many of these other applications, you are going to 34:57 be interested in the same class of codes. 34:59 Basically, you're going to want to maximize the distance 35:03 between code words for a given rate, which has to do with the 35:07 size of the code. 35:09 And so you're going to be interested in the same codes. 35:14 Putting it in the framework of getting to capacity on the 35:16 additive white Gaussian noise channel gives a motivation, 35:21 gives a very nice story, because over 50 years, we were 35:24 able to get to capacity, and gives it a real 35:28 communications flavor. 35:30 Some of you, I'm sure, are here without any interest in 35:33 communications whatsoever. 35:34 You simply want to know about coding. 35:36 You will still get that story, but you'll get it 35:38 in this nice package. 35:41 That's why I do it this way. 35:44 OK. 35:45 I'm about to get into new stuff. 35:47 End of review. 35:49 Any questions? 35:52 So you must have done a great job. 35:56 Everyone understands perfectly. 35:59 All right. 35:59 So now let's talk about, as I said, binary 36:03 linear block codes. 36:06 When you see the word "linear," that's a signal that 36:11 there's some algebra ahead. 36:12 And so this is the very first point at which we get into 36:18 what's called algebraic coding theory. 36:22 The algebra will be extremely simple at this 36:24 point, not to worry. 36:28 And what are we doing here? 36:36 First thing we do is to identify 0 and 1 with the 36:40 binary field, which I'm always going to write as F2. 36:45 The older way of writing this is GF(2), for Galois field 36:51 with two elements. 36:52 They mean exactly the same thing. 36:54 Nowadays most people write just F2. 36:59 Now we have [UNINTELLIGIBLE], we can write this blackboard 37:03 F. 37:06 And OK. 37:09 Step one. 37:09 We've identified our alphabet with a field. 37:16 So algebraically, this is a field. 37:20 Some of you know exactly what I mean by that. 37:23 Others don't. 37:24 We'll come back to this again. 37:26 Informally, I would say a field is simply something 37:29 where you can add, subtract, multiply, or divide. 37:32 Our best examples of that before now have been the real 37:36 and complex fields. 37:39 There is a more formal definition of that. 37:42 In this case, we have only two elements. 37:45 So let me just write down the tables, which you all know, 37:52 regardless of your background. 37:55 What's the addition table for this field? 37:57 Well, 0 is the additive identity. 38:01 So we know that 0 added to anything gives itself, so that 38:09 gives us three of the entries of this table. 38:14 What do we put down here? 38:16 There's really only one choice to satisfy one of the axioms 38:20 of the field, which is that under addition, the field must 38:27 form a group. 38:29 In particular, that means that all elements are invertible. 38:32 That means that each row or column has to be a permutation 38:36 of the group elements. 38:37 And so the only possibility here is to put in a 0. 38:40 And well, we are forced, if we're going to make 0 and 1 38:46 into a field to find an addition table which is the 38:50 table of mod2 addition. 38:52 You've had this stated as an axiom before. 38:55 You can derive it just from the fact that 0 needs to be 39:00 the additive identity, and then we need to put a 0 in 39:05 here in order to get invertibility. 39:12 Under multiplication. 39:14 What is the multiplication table? 39:16 Well, the additive identity is also a nullifier under 39:21 multiplication in any field. 39:22 So 0 times anything is equal to 0. 39:26 1 times anything is equal to itself. 39:29 So that completely determines the multiplication table. 39:34 Again, just the table of mod2 multiplication. 39:37 So if I'd done this axiomatically, I would have 39:41 given you the axioms of field. 39:43 Then I would show that under this binary addition 39:47 operation, this multiplication operation, 39:50 we satisfy the axioms. 39:52 I'll do that as we get into chapter seven. 39:57 OK. 40:00 So now we have 0 1 to the n, n-tuples, binary n-tuples, we 40:12 will now regard as n-tuples of field elements, F2. 40:20 And these will be regarded as vectors in a vector space. 40:29 Well, I'll just say that F2 to the n is a vector space, which 40:35 clearly has 2 to the n elements. 40:37 Now again, informally. 40:39 What's a vector space? 40:41 A vector space is always over a given field. 40:46 In this case, it's going to be over the 40:47 binary field, of course. 40:49 F2. 40:51 The given field is called a scalar. 40:54 Just like vector space over the reals, the scalars are 40:57 real numbers. 40:58 Here the scalars are elements of F2. 41:02 And what do we have to have to make something algebraically a 41:07 vector space? 41:08 We have to have that the addition of two vectors is 41:12 well-defined and gives another vector, and that the 41:19 multiplication of a vector by a scalar is well-defined and 41:23 gives another vector in our vector space. 41:27 All right? 41:30 OK. 41:31 So how are we going to define that to addition? 41:35 If we want to add two n-tuples -- 41:38 again, you aren't going to see anything here that you haven't 41:40 already seen in some other context. 41:43 What do we do? 41:43 We add them component-wise, using the component-wise rules 41:49 of field addition. 41:51 OK. 41:51 So we just add two vector n-tuples, 41:55 component by component. 41:56 We obviously get some result, which is itself a binary 42:00 vector or an F2 vector. 42:03 No problem there. 42:05 Except that -- 42:08 well, all right. 42:09 As long as we're talking about all possible n-tuples, the 42:11 result is certainly in the vector space, right? 42:14 We add two binary n-tuples, we get a binary n-tuple. 42:17 So the result is in F2 to the n. 42:20 This is going to be the key test when we get to subspaces 42:24 of F2 to the n. 42:27 OK. 42:28 And multiplication is even easier. 42:31 How do we define multiplication by scalars? 42:34 Well, we only have two scalars -- 42:35 0 and 1. 42:37 So 0 times any vector is going to equal the all 0 vector. 42:45 Again, you can view that as just component-wise 42:47 multiplication of everything by 0, and since 0 times 42:51 anything equals 0, we're always going 42:53 to get the 0 vector. 42:55 All right? 42:57 So is the 0 vector in the vector space? 43:02 Well, yes. 43:02 If we're talking about several n-tuples, it of 43:05 course always is. 43:06 And one times anything, again, we can just do this 43:12 component-wise, and it just gives itself. 43:17 Trivially. 43:18 So since this was a vector in the vector space, this is 43:21 certainly a vector in the vector space. 43:25 OK. 43:26 This seems pretty trivial so far. 43:29 But what's a binary linear block code? 43:35 Again, focusing on the linear, is a -- 43:40 now I'll give a formal definition. 43:43 it's a subspace of F2 to the n for some n 43:51 called the block length. 43:55 All right. 43:56 What do I mean when I say a subspace? 43:58 I mean subsets of the elements of a vector space that itself 44:03 forms a vector space. 44:05 So in this case when I say subset, I mean a 44:11 set of binary n-tuples. 44:14 OK? 44:16 That itself forms a vector space. 44:18 OK. 44:18 What are the components of that? 44:20 To check that it forms a vector space, let's see. 44:24 Multiplication by scalars is, again, easy to check. 44:30 If it's going to be a subspace, then the all 0 -- 44:34 so it has to contain the all 0 vector in order that when I 44:48 multiply by the scalar 0, I get another 44:50 element of this subspace. 44:55 Multiplication by 1 is always trivially satisfied. 44:59 If I start off with a set, I multiply by 1, I'm going to 45:01 get the same set. 45:04 So let's check whether the elements of a subspace are 45:14 closed under vector addition. 45:17 What do I mean by that? 45:19 I mean if you add two elements of the of the subspace 45:24 together, you get another element of the subspace. 45:28 That's the key property to check. 45:36 Key property -- we can write that as closure 45:40 under vector addition. 45:47 Which is also called the group property. 45:52 It means that just under addition, under vector 45:56 addition, the set of elements that you have forms a group. 46:00 You add any two elements, you get another 46:01 element of the subset. 46:06 The example is our favorite example so far. 46:12 Let's take this little code, and I'm going to ask. 46:18 Is that a subspace of F2 to the three? 46:24 So does this equal subspace of the set of all binary 46:35 three-tuples? 46:40 Anyone care to hazard a guess whether it is or isn't? 46:46 AUDIENCE: It is. 46:47 PROFESSOR: It is? 46:48 Why? 46:53 AUDIENCE: It has the all 0 vector. 46:54 PROFESSOR: It has the all 0 vector, first of all. 46:58 Good. 47:00 AUDIENCE: [INAUDIBLE] 47:04 PROFESSOR: And it's closed under addition. 47:07 Now how might we see that? 47:11 You could, of course, just take all pair-wise -- 47:14 you could form the addition table of these four elements, 47:17 and you would find that you always get another one of 47:20 these elements. 47:20 For instance, 0, 1, 1 plus 1, 0, 1, is equal to 1, 1, 0. 47:26 In fact, you easily see that you take any two of these, add 47:31 them together, you get the third one. 47:33 If you call this a, b, and c, a plus b plus c equals 0, 47:37 addition is the same as subtraction, because we're in 47:40 a binary field. 47:42 So that means that a plus b equals c, a equals b plus c, c 47:46 equals b plus a, whatever you like. 47:50 And of course, if you add 0 to anything, it's trivially 47:55 closed under that. 47:59 All right. 47:59 So it is. 48:01 It satisfies -- 48:02 it's all you've got to check. 48:09 A more abstract proof of this would be, this is the set of 48:13 all even-weight three-tuples. 48:16 If I add even to even, I'm going to get even. 48:19 So of course my result is going to be another 48:21 even-weight three-tuple, therefore in the set. 48:24 That's the more algebraic proof. 48:29 All right. 48:31 Suppose I just add 0, 0, 1 to all of these things. 48:36 I'll get the set of all odd-weight n-tuples. 48:41 Add any odd-weight n-tuple to this. 48:43 Let me take the C prime, which is the set of 48:46 all odd-weight n-tuples. 48:50 Is that a vector space? 48:54 It doesn't have 0, and in fact, it's not even closed 48:57 under vector addition. 48:59 All right. 49:00 If I take in C double prime is equal to 0, 0, 0 0, 1, 1, 1, 49:06 0, 1 and I stop there, is that a subspace? 49:13 No. 49:13 Because? 49:15 Not closed. 49:17 For instance, if I add these two together, I would get 49:21 that, and that's missing. 49:23 OK. 49:24 So actually, everything is much simpler when we're 49:31 talking about finite fields. 49:32 All the finite dimensional vector spaces consist of a 49:35 finite number of elements. 49:38 It's easier than real and complex vector spaces. 49:42 There's no analysis involved. 49:46 So forth. 49:47 All right. 49:47 So a binary linear block code is in a subspace 49:52 of F2 to the n. 49:55 What are some of the key algebraic facts we know about 49:59 vector spaces from our study of linear algebra, which I 50:06 assume all of you have had in some form or another? 50:11 What's a key algebraic property of a vector space? 50:14 What's the very first property? 50:18 All vector spaces have a -- 50:20 AUDIENCE: [INAUDIBLE] 50:23 PROFESSOR: Norm? 50:25 No. 50:26 Dimension. 50:27 Dimension, that's where I'm going. 50:30 What's the significance of dimension? 50:33 AUDIENCE: [INAUDIBLE] 50:36 PROFESSOR: The definition of dimension is the number of 50:40 generators in any basis. 50:42 So we're talking about generators of the vector 50:45 space, or a set of generators which form a basis. 50:49 If you think we have the same properties here in the case of 50:53 vector spaces over finite fields, well, we probably do. 51:01 But let's see how it works out. 51:02 So we're talking about things like 51:05 generators, basis, dimension. 51:10 These are all closely interlinked properties. 51:16 Again, the fact that everything is finite here 51:20 gives us very elementary ways of addressing 51:24 all of these concepts. 51:27 We don't have any geometry yet. 51:29 We don't have norms. 51:30 We don't have distances. 51:31 We don't have angles. 51:32 We'll talk about that in a minute. 51:34 Here we just have a set that basically has these two 51:38 properties. 51:39 It contains the all-0 vector, and it's closed 51:41 as the group property. 51:42 It's closed under vector addition. 51:46 All right. 51:46 So the first property is that the all-0 vector is always in 51:56 the subspace, which I'll represent by C, meaning code. 52:02 So when I talk about a code now, I'm talking about a 52:06 binary linear block code, which by definition is a 52:09 vector space, a subspace of F2 to the n, where 52:13 n is the code length. 52:16 All right. 52:16 Let me try to find a set of generators for the code. 52:22 All right? 52:22 If somebody gives me a code, they say, this is a binary 52:28 linear block code. 52:29 Let me see if I can find a set of generators for it. 52:33 If I find three generators, then I'll know the 52:37 dimension is three. 52:39 That's basically where I'm going. 52:40 I'll state this a little bit more formally as we go ahead. 52:44 So suppose I'm given a code. 52:46 I know it's a binary linear block code, so I know it has 52:49 the all-0 element. 52:52 So how might I go about finding a set of generators? 52:59 Let's just take a greedy algorithm. 53:01 All right? 53:05 Suppose the code contains only the all-0 vector. 53:08 Is that a subspace? 53:12 What's its dimension? 53:15 0. 53:15 All right? 53:18 So that's a very trivial vector space, but it's a 53:22 vector space. 53:23 Satisfies the axioms. 53:27 Suppose it is not the trivial code. 53:29 That means it has more than the all-0 vector. 53:32 So I take as my first generator any non-zero vector. 53:42 OK? 53:43 I can always do that. 53:46 Don't have the axiom of choice involved here, because 53:49 everything is finite. 53:51 So I'm going to take g1 to be any non-zero vector. 53:54 Now I've got a generator. 53:57 And how many code words does it generate? 54:10 I want to take the set of all binary linear combinations of 54:14 all the generators that I have so far. 54:16 At this point, the binary linear combinations are 0 54:19 times g1 and 1 times g1 And that just gives me this word 54:25 and this word. 54:26 So now I have counted for two words with one generator. 54:32 Could it be that that's the whole code? 54:36 Sure. 54:39 The all-0 vector and any non-zero vector together form 54:43 a one-dimensional subspace. 54:49 That's all you can get from one dimension. 54:51 So I could be finished here now. 54:53 But if I'm not finished, there's still more code words 54:55 that I haven't accounted for. 54:57 Then I greedily pick a second generator. 55:01 So this is now, let's say, any vector not generated by g1. 55:20 So I have a branch here. 55:22 Either I've finished or I can pick another generator g2. 55:27 Now with g1 and g-two, how many vectors can I generate? 55:33 Let me take all binary linear combinations. 55:41 So a binary linear combination is any vector of the form 55:47 alpha1 g1 plus alpha2 g2 where these are both scalars. 55:57 And therefore this can be 0 or 1, this could be 0 or 1. 56:02 So what have I got now? 56:03 I've got 0, g1 g2 and g1 plus g2 I've got four binary linear 56:09 combinations of two generators. 56:15 Could that be the whole code? 56:17 Certainly. 56:19 At this point, again, consider our standing example. 56:26 I start out what I take as my first generator. 56:29 Let me take g1 equal 1 0, 1, g2 equals whatever, 0, 1, 1. 56:38 Then if I take all binary linear combinations of these 56:42 two generators, I'm going to get the whole code, right? 56:45 These four code words. 56:46 They can all be expressed in this form. 56:51 Or I'm not done, and then I have to pick g3. 56:56 And how many binary linear combinations are there of g1, 56:59 g2, and g3? 57:03 Eight. 57:04 Are they all necessarily in my subspace? 57:09 Yes, by the fact that the subspace is closed under 57:14 scalar multiplication. 57:16 Alpha g1. 57:17 Alpha1 g1, alpha2 g2 alpha3 g3 are all in the subspace. 57:22 Any vector addition of any of these scalar multiples is in 57:29 the subspace. 57:30 So I get now eight possible elements of the subspace, and 57:36 I either may be done or not. 57:40 Continuing in this way, I get some number gk of generators, 57:48 just by picking greedily the next one until I'm done. 57:53 All right? 57:55 When I'm done -- 57:57 so I have to stop. 57:58 Why do I have to stop? 58:02 All right. 58:03 Let's look at the size. 58:04 At each point here, this accounts for two code words, 58:07 this for four, this for eight, this for 2 to the k. 58:11 How many binary n-tuples are there? 58:15 2 to the n. 58:16 All right? 58:17 So I clearly can't find more than n generators. 58:21 More more than n independent generators, in the sense that 58:25 the set of all the binary linear 58:28 combinations are distinct. 58:32 All right. 58:32 So k is, at most, going to be n. 58:36 So I will stop in a finite number of steps. 58:39 I'll stop at some number k. 58:42 When I've stopped, that's because the code consists of 58:46 all binary linear combinations of these k generators, and 58:50 therefore has size 2 to the k. 58:54 So the only possible size of a subspace is 2 to the k for k 59:02 less than n. 59:04 A power of 2 where the power is, at most, n. 59:10 So any subspace besides the subspace -- 59:13 I'm repeating myself. 59:17 OK. 59:18 So this means I found a basis. 59:25 Does this mean that all possible bases of any subspace 59:28 have the same size? 59:33 Well yeah, it must. 59:34 I mean, I've proved now that any subspace has to have this 59:40 size 2 to the k for some k. 59:45 So obviously, if I go through this process, no matter how I 59:47 choose my generators, I could choose any pair of these 59:54 non-zero n-tuples as my generators. 59:57 So that would be a legitimate basis. 59:59 Take any two out of these three. 1:00:01 But it's always going to take exactly two of them, right? 1:00:04 Why? 1:00:05 Because the size of this subspace is four. 1:00:08 Two to the two. 1:00:10 So if I go through this process, I'm always going to 1:00:13 come up with k generators, where k is the log to the base 1:00:17 2 of the size of this code that I was given, which I was 1:00:21 told was a linear code, meaning it's a subspace. 1:00:27 So I'm somewhat free to choose the generators, but I'm always 1:00:33 going to come up with k of them if the code has 1:00:35 size 2 to the k. 1:00:39 So a basis is a set of k linearly independent k-tuples, 1:00:50 where linear independence has the same meaning here as 1:00:52 you're accustomed to, meaning that all linear combinations 1:00:56 of the k generators are distinct. 1:01:00 So I get 2 to the k distinct elements of the code. 1:01:05 And I say the dimension of the code is k. 1:01:10 In this case, basically it's the size of the code is 2 to 1:01:13 the k, then its dimension is k. 1:01:16 Has to be. 1:01:18 And all basis have k generators in them. 1:01:24 And there are, in general, many ways to pick them. 1:01:27 All right? 1:01:29 So just by considering this greedy basis construction 1:01:33 algorithm, I basically find the size of any subspace is a 1:01:43 power of two, and the power is equal to the dimension. 1:01:46 And any basis is going to have that cardinality. 1:01:52 Are you with me? 1:01:53 This is a pretty simple proof. 1:01:57 And I call this an n, k binary linear block code. 1:02:02 n being the length. 1:02:04 That just means that every code word is an n-tuple over 1:02:09 the binary field. 1:02:11 And k is the dimension. 1:02:13 So an n, k binary linear block code has size 2 to the k. 1:02:24 That's 2 to the k distinct code words. 1:02:29 Main example is this guy. 1:02:35 Easy? 1:02:35 Any questions? 1:02:36 I think this is clear. 1:02:37 AUDIENCE: Can n use the number of code word, I take 1:02:41 like 2 to the k? 1:02:44 PROFESSOR: n is something I specify a priori as the length 1:02:48 of every vector in the code. 1:02:50 In other words, it has size 2 to the k, and it's a subset of 1:02:56 the set of all binary n-tuples, which 1:02:58 I write like that. 1:02:59 In other words, the elements of the 1:03:01 code are binary n-tuples. 1:03:03 If I write them out, each one has length n. 1:03:09 OK? 1:03:10 We're good? 1:03:12 What are some other examples? 1:03:18 The simplest codes you can think of is, first of 1:03:23 all, an n, 0 code. 1:03:26 That means a code with dimension zero, has size what? 1:03:32 1. 1:03:33 And what does it consist of? 1:03:35 AUDIENCE: [INAUDIBLE] 1:03:37 PROFESSOR: Yeah. 1:03:37 So this is the so-called trivial code, just containing 1:03:41 the all-0 word. 1:03:45 Has to mention 0. 1:03:46 It is a binary linear block code, but it's not much use 1:03:49 for communication. 1:03:52 So but nonetheless, we include that in this family. 1:03:58 Another trivial one is n, n. 1:04:01 What's that? 1:04:03 AUDIENCE: [INAUDIBLE] 1:04:06 PROFESSOR: F2 to the n, right. 1:04:07 What's its size? 1:04:08 2 to the n. 1:04:09 That means it has to contain all distinct binary n-tuples. 1:04:15 So this is called the trivial code. 1:04:18 This is called the universe code. 1:04:21 Contains the entire universe of binary n-tuples. 1:04:27 Let's get some slightly less trivial ones. 1:04:29 n, 1. 1:04:32 What would that be? 1:04:36 An n, 1 code. 1:04:38 What's its size? 1:04:40 2. 1:04:41 What does it consist of? 1:04:44 The 0 word, and? 1:04:48 Any other non-zero generator. 1:04:50 And that's correct. 1:04:52 This can be 0 and any generator, two words. 1:04:59 In communications, where we want to maximize the distance, 1:05:03 in some sense, between the two code words, what is g 1:05:10 always taken as? 1:05:12 0,1's, right. 1:05:14 So if it's in particular the all-0 and the all-1 word, 1:05:20 which I might write as a vector of 0's and a vector of 1:05:23 1's, this is called the repetition code. 1:05:28 The binary repetition code of length n. 1:05:32 It either gives me a 0 and I repeat it n times, or gives me 1:05:36 a 1 and I repeat it n times. 1:05:39 So whenever you see n,1, you can pretty well assume it's 1:05:41 the repetition code, though it might be any pair 0, g. 1:05:48 And n, minus 1. 1:05:49 This is an interesting one. 1:05:58 Again, while this could be a lot of things, in 1:06:07 communications, whenever you see this, this will always be 1:06:12 the set of all even-weight n-tuples. 1:06:22 In other words, the set of all n-tuples with even parity such 1:06:28 that if you sum up all of the components of any 1:06:31 vector, mod2 equals 0. 1:06:35 OK? 1:06:36 So this I will call the single parity check, or more briefly, 1:06:47 the SPC code, or the even-weight code. 1:06:51 That's equally good. 1:06:55 And here we maybe should do a little bit more work. 1:07:01 Say, is this in fact a subspace? 1:07:03 Does it include the all-zero code word? 1:07:06 Yes, all-zero has even weight. 1:07:08 The sum of any two even-weight code words, an even-weight 1:07:12 code word, an even-weight n-tuple. 1:07:15 Yes. 1:07:17 As here. 1:07:18 This is an example. 1:07:19 This is the three, two SPC code. 1:07:27 OK. 1:07:28 Why is this dimension n minus one? 1:07:32 AUDIENCE: [INAUDIBLE] 1:07:34 Is every code word orthogonal to the one-vector? 1:07:37 PROFESSOR: OK. 1:07:38 That's an excellent answer. 1:07:41 It's a little advanced for us right now. 1:07:43 I'm looking for an elementary argument. 1:07:45 AUDIENCE: [INAUDIBLE] 1:07:57 PROFESSOR: OK. 1:07:57 So you're saying we have a set of generators 1:08:00 that looks like this. 1:08:03 Is that what you're saying? 1:08:05 You are correct. 1:08:07 And how many such generators are there? 1:08:12 There are n minus 1 of them. 1:08:16 I always like to find the most elementary argument possible. 1:08:19 I think the most elementary argument here is that the 1:08:23 number of even-weight n-tuples is equal to the number of 1:08:26 odd-weight n-tuples, and together they form the set of 1:08:29 all n-tuples. 1:08:30 So exactly half of the n-tuples are even weight. 1:08:34 That means there are 2 to the n minus 1 of them, 2 to the n 1:08:38 over 2, and therefore, the dimension must be n minus 1. 1:08:42 But perhaps this is just as elementary a proof. 1:08:48 Well, however you do it, you'll find that there are 2 1:08:51 to the n minus 1 of them, or that here is clearly a set of 1:08:56 generators. 1:08:57 It might take a few more lines to show that every even-weight 1:09:00 code word is a linear combination of this particular 1:09:05 set of generators, but it's certainly true. 1:09:08 All right. 1:09:09 So these four classes of codes, these two entirely 1:09:13 trivial ones, these two which are actually somewhat more 1:09:17 interesting for coding purposes -- 1:09:19 we've already seen, we can get a coding game with this length 1:09:23 three, dimension two code -- 1:09:28 are basically the simplest codes we can think of. 1:09:33 The simplest binary linear block codes. 1:09:36 Now we'll see them again and again. 1:09:38 They turn up. 1:09:41 All right? 1:09:41 So the whole course is going to be about 1:09:43 finding 1's in between. 1:09:45 More complicated ones. 1:09:47 There's clearly more room to play. 1:09:49 For instance, if k is equal to half of n, which means that 1:09:55 rho is equal to one bit per two dimensions, there's a lot 1:09:59 of possibilities. 1:10:03 And so we're going to explore those possibilities. 1:10:12 AUDIENCE: [INAUDIBLE] 1:10:16[UNINTELLIGIBLE] 1:10:27 PROFESSOR: Sure. 1:10:31 Let's take the 6,5 code generated by these five 1:10:37 generators. 1:10:40 Well, it contains some 1:10:42 odd-weight code words, obviously. 1:10:46 But it's not as interesting from a coding point of view. 1:10:54 It's not the only one, but it's the only one 1:10:56 you'll ever see here. 1:11:01 All right. 1:11:01 Let's see. 1:11:07 One thing I didn't point out in the notes but probably 1:11:11 should have here is, what is rho for an n, k binary linear 1:11:15 block code? 1:11:19 How many bits can we send? 1:11:21 Suppose we take the Euclidean image of this. 1:11:24 It is going to have 2 to the k points, 2 to the k vertices of 1:11:29 the n-cube, and so what is rho? 1:11:35 What is the rate in bits per two dimensions? 1:11:37 AUDIENCE: [INAUDIBLE] 1:11:40 PROFESSOR: Right. 1:11:43 The rate is basically k over n over 2, if you like, or 2 k 1:11:49 over n bits per two dimensions. 1:11:54 You can send k bits in n dimensions, or 2 k over n bits 1:12:00 per two dimensions. 1:12:01 And since k can't be larger than n, this is going to be 1:12:08 less than or equal to two bits per two dimensions. 1:12:10 So again, we see we're definitely in the 1:12:14 power-limited regime, and that we can really get any nominal 1:12:20 spectral efficiency between 0 and 2 by choosing k and n 1:12:27 appropriately. 1:12:30 All right. 1:12:31 So n and k determine the rate, determine the nominal spectral 1:12:34 efficiency. 1:12:37 All right. 1:12:38 Let's now talk about things that I think are also very old 1:12:42 hat to you. 1:12:44 I mean weight and distance. 1:12:49 But we begin to get into areas that show us that these vector 1:12:57 spaces are very different from the real and complex vector 1:13:00 spaces that we're accustomed to. 1:13:03 So what are we doing now? 1:13:04 We're starting to get into the geometry of this vector space. 1:13:08 The geometry is not Euclidean geometry, but 1:13:11 it's Hamming geometry. 1:13:15 We define the Hamming weight of a vector as simply the 1:13:20 number of 1's in v. So the Hamming weight of the all-0 1:13:29 vector is 0, the Hamming weight of the all-1 vector is 1:13:31 n, and in general, the Hamming weight is somewhere 1:13:34 between 0 and n. 1:13:36 Just the number of 1's. 1:13:37 Pretty simple. 1:13:39 And given two vectors x and y, what is their distance? 1:13:53 The Hamming distance between x and y is equal to the Hamming 1:13:58 weight of x minus y. 1:14:00 This is the standard way of converting a weight metric 1:14:04 into a distance metric. 1:14:06 Or because addition is the same as subtraction in a 1:14:11 binary vector space, we might equally well write this is as 1:14:15 the Hamming weight of x plus y. 1:14:20 And more informally, this is simply the number of places in 1:14:28 which they differ. 1:14:37 OK. 1:14:37 So if x and y are identical, then x plus y is equal to 0 1:14:42 and the distance is 0. 1:14:44 If they are complementary, y is the complement of x, then 1:14:49 they differ in every place. 1:14:51 The sum will then be the all-1 vector, and the weight, the 1:14:57 Hamming distance, will be n. 1:14:59 And so again, the Hamming distance is somewhere between 1:15:02 0 and n, measures how different they are. 1:15:05 Clearly going to be important for coding. 1:15:07 It's going to translate directly into Euclidean 1:15:10 distance under this standard 2-PAM map. 1:15:13 OK. 1:15:17 Again, let's check that it satisfies the distance axioms. 1:15:24 I don't know how many of you have seen this, but let's see. 1:15:31 What are the distance axioms? 1:15:34 Strict non-negativity. 1:15:40 In other words, the Hamming distance between x and y -- 1:15:46 that's a single comma -- 1:15:48 is greater than or equal to 0, and equality if and 1:15:53 only if x equals y. 1:15:55 That's what strict means. 1:15:58 So if we find the Hamming distance is 0, we can assert 1:16:00 that x equals y. 1:16:04 We have, of course, symmetry. 1:16:09 The Hamming distance between x and y is the same as the 1:16:14 Hamming distance between y and x. 1:16:17 Order doesn't matter. 1:16:18 And finally we have the triangle inequality, that the 1:16:26 Hamming distance between x and z certainly can't be more than 1:16:31 the Hamming distance between x and y plus the Hamming 1:16:36 distance between y and z. 1:16:41 If x differs from y in only n1 places, and y differs from z 1:16:48 in only n2 places, then clearly z can't differ from x 1:16:52 in more than n1 plus n2 places. 1:16:57 So check, check, check. 1:16:59 This is a legitimate metric for defining a geometry on the 1:17:04 space, and this is the one that we use on the space of 1:17:10 all n-tuples. 1:17:12 But notice it's not all like the Euclidean Distance. 1:17:18 Now when we have a linear code -- 1:17:22 let's combine these things. 1:17:23 When we have a linear code, we have a group property which 1:17:39 is, let me write it this way. 1:17:40 If we take any code word and add it to any other code word, 1:17:47 that's in the code. 1:17:50 And furthermore, c plus c prime is not equal to c prime 1:17:58 plus c single prime, c plus c single prime, 1:18:03 because we can -- 1:18:04 well, I'll finish it. 1:18:06 Unless c prime equals c double prime. 1:18:13 Why is that? 1:18:14 We can do subtraction, cancellation. 1:18:17 Cancel c out from each side. 1:18:19 So if we add c to c double prime, we're going to get a 1:18:25 different result from adding c to c prime, if c prime and c 1:18:30 double prime are different. 1:18:33 So this implies that c plus C -- 1:18:39 I write that as an abbreviation for the set of 1:18:43 all c plus c prime, as a c prime runs through the code C. 1:18:50 So this is the 2 to the k sums of the code plus any code word 1:18:59 in the code. 1:19:03 Sorry if I don't write down all steps. 1:19:05 What is that going to be? 1:19:08 C. How did we conclude that? 1:19:16 AUDIENCE: [INAUDIBLE] 1:19:19[UNINTELLIGIBLE] 1:19:24 PROFESSOR: Perfect. 1:19:25 Did you all hear that? 1:19:28 By the group property, each one of these 1:19:30 things is in the code. 1:19:32 By this argument, no two of them are the same. 1:19:36 That means I get 2 to the k distinct elements all in the 1:19:39 code, that's got to be the code, because the code only 1:19:42 has 2 to the k elements. 1:19:46 All right. 1:19:48 So if I add a code word -- 1:19:51 in other words, if I write down the code -- 1:19:54 0, 0, 0, 0, 1, 1, 1 0 1, 1 1 0- and I add any code word to 1:20:00 it -- say I add 0 1 1 to the code. 1:20:04 So let me just do one column of the addition table. 1:20:08 I get 0, 1, 1, 0, 0, 0, 1, 1, 0, 1, 0, 1. 1:20:14 I'll get the code itself again. 1:20:21 This has a very important property. 1:20:26 The set of Hamming distances C and c prime, as c prime runs 1:20:38 through c, from any given code word C, it is independent of 1:20:51 C. So I can start from any code word, measure the Hamming 1:20:59 distances, the 2 to the k Hamming distances to all other 1:21:02 code words, including C itself -- 1:21:05 let c prime run through the entire code, I'm going to get 1:21:08 a set of 2 to the k distances called the distance 1:21:11 profile of the code. 1:21:16 And I claim that it doesn't matter which code 1:21:19 word I start from. 1:21:21 I'm going to get the same distance profile regardless of 1:21:24 where I start. 1:21:26 In other words, the set of all distances from the all-0 word 1:21:29 here, which is 0, 2, 2, 2, is the same as the set of all 1:21:35 distances from the 0, 1, 1, code word, 1:21:38 which is 2, 0, 2, 2. 1:21:43 And the proof is basically that this is simply the 1:21:47 Hamming weight of C plus c prime as c prime runs through 1:21:51 C. What is this equal to? 1:21:55 So the proof is that this is equal to the Hamming weight of 1:22:01 c prime as c prime runs through C. 1:22:07 So the distance profile from any code word is simply equal 1:22:10 to the weight profile of the code itself. 1:22:14 The weight profile of this code is 0, 2, 2, 2, Start from 1:22:18 any code word, measure the distances to other code words, 1:22:22 I'm always going to get 0, 2, 2, 2, 0, to 1:22:25 itself, and the others. 1:22:29 Sounds sort of like the tetrahedron, doesn't it? 1:22:32 It's zero distance from a code word to itself and equal 1:22:36 distance to all the other code words, in 1:22:39 that particular case. 1:22:41 OK. 1:22:41 So again, everything is very elementary here. 1:22:44 The distance profile is independent of C and equal to 1:22:50 the weight profile. 1:23:06 So this has an extremely important corollary. 1:23:10 What's the minimum Hamming distance of the code? 1:23:14 You might expect this is going to be an 1:23:16 important code parameter. 1:23:17 AUDIENCE: [INAUDIBLE] 1:23:23 PROFESSOR: The minimum Hamming distance between any two code 1:23:25 words is going to be equal to -- 1:23:28 I think you said it. 1:23:29 AUDIENCE: The 0 [UNINTELLIGIBLE]. 1:23:31 PROFESSOR: Non-zero is important here. 1:23:35 If the distance profile is equal to the weight profile, 1:23:37 one of the weights is always going to be zero. 1:23:40 And that corresponds to the distance between a code word 1:23:43 and itself. 1:23:45 All right. 1:23:46 If I go through all the other 2 to the k minus 1 distances, 1:23:50 they're going to be weights. 1:23:52 They're going to be the distances from a code to all 1:23:54 other code words. 1:23:56 And the minimum distance is simply going to be the minimum 1:24:01 non-zero weight of the code. 1:24:04 For example, in this code, the minimum Hamming distance 1:24:08 between any two distinct code words is going to be equal to 1:24:12 the minimum distance from the 0 code word -- 1:24:16 that's another way of doing it. 1:24:17 Since it's independent of C, we may as well take the base 1:24:20 code word C to be zero. 1:24:23 And then what's the minimum distance to 0? 1:24:26 To the 0-code word? 1:24:27 It's the minimum weight. 1:24:29 From the 0 code word, distance equals weight. 1:24:33 So the minimum distance is the minimum weight of any non-zero 1:24:36 code word, which for this code is two. 1:24:43 Now here the weight profile is 0, 2, 2, 2, 0. 1:24:48 The distance profile from any code word to all the others is 1:24:52 0, 2, 2,2 2. 1:24:54 This is always the distance to itself. 1:24:56 So minimum distance to other code words is 1:24:59 always going to be two. 1:25:03 Furthermore, the number of nearest neighbors -- 1:25:08 to go back and use chapter five terminology -- 1:25:12 the number of nearest neighbors is going to be the 1:25:16 number of code words that have that minimum weight -- 1:25:20 in this case, three. 1:25:22 Still sounding a lot like a tetrahedron, isn't it? 1:25:26 This easy map between Hamming distance and Euclidean 1:25:30 distance for this case and in general for all of our cases. 1:25:37 So corollary. 1:25:43 The minimum Hamming distance, which implicitly means between 1:25:48 two distinct code words of C, is equal to the minimum 1:25:55 non-zero weight of C, and the number of minimum weight code 1:26:06 words is independent -- 1:26:11 I'm doing this backwards. 1:26:13 From any code word, the number of code words that distance, 1:26:18 let's call this d, is equal to the number of 1:26:25 weight d code words. 1:26:28 Sorry, you probably can't see that. 1:26:36 All right. 1:26:36 So we get this symmetry property for codes that 1:26:39 follows from the group property of the code that if 1:26:45 we stand on any code word and look out, we're always going 1:26:48 to see the same thing. 1:26:51 We have this constant. 1:26:53 It's actually easiest to see this when we make the map from 1:26:57 the code to the Euclidean image of the code. 1:27:08 So the Euclidean image S of C of the code word is going to 1:27:16 be some set of 2 to the k vertices of an 1:27:24 n-cube of side alpha. 1:27:35 Let's talk about the Euclidean image of these properties. 1:27:41 If the minimum Hamming distance of the code is d, 1:27:48 what's the minimum squared Euclidean distance between 1:27:52 elements of S of C going to be? 1:27:58 Well, let's do it coordinate by coordinates. 1:28:03 Let's take two code words, C and c prime, let's say. 1:28:11 And let's suppose we have some Hamming distance 1:28:14 between C and c prime. 1:28:18 That means that c and c prime differ in the Hamming 1:28:23 distance, number of places. 1:28:26 So if we map this into the corresponding pair of vertices 1:28:35 of the n-cube in Euclidean space, S of C and S of c 1:28:38 prime, how many coordinates are these going to differ in? 1:28:46 It's going to differ in same number of coordinates, D_h. 1:28:51 If they don't differ, what's Euclidean squared distance in 1:28:55 those coordinates? 1:28:56 0. 1:28:57 If they do differ, the Euclidean squared distance is 1:29:01 4 alpha squared. 1:29:03 So the Euclidean distance D_e between S of C and S of c 1:29:11 prime is simply going to be 4 alpha squared times the 1:29:15 Hamming distance between C and c prime, yes? 1:29:21 So I should say this is the squared Euclidean distance. 1:29:25 Why do we always talk about the 1:29:26 squared Euclidean distance? 1:29:27 Because it's additive, coordinate-wise. 1:29:30 And the Hamming distance is additive, coordinate-wise. 1:29:33 So there's a nice easy map here. 1:29:38 So what does this mean d_min squared is going to be? 1:29:44 d_min squared of, let's say, S of C. This constellation that 1:29:50 we've formed by taking the Euclidean image of c. 1:29:54 The minimum square distance between points in S of C is 1:30:00 just going to be 4 alpha squared times d, where I don't 1:30:05 think I ever -- 1:30:06 d equals min Hamming distance. 1:30:13 And we're always going to talk about n, k, d as the three key 1:30:18 parameters of a binary linear block code. 1:30:22 n is the code length, F2 to the n, k is the dimension, d 1:30:26 is the minimum Hamming distance. 1:30:29 So by going into this Hamming geometry, we've got a third 1:30:32 key property of the code. 1:30:34 And we see it's key, because we can get the minimum squared 1:30:37 distance between this Euclidean image constellation, 1:30:40 just 4 alpha squared d. 1:30:43 AUDIENCE: nd makes a probability of 1:30:45[UNINTELLIGIBLE] that is dependent on [UNINTELLIGIBLE] 1:30:48 then. 1:30:49 PROFESSOR: Correct. 1:30:49 This is all we need to know to get the union bound estimate. 1:30:53 Well, a few more things. 1:30:55 We need to know what K_min average of S of C. And what is 1:31:05 that going to be? 1:31:08 This is simply going to be the number of words in the code. 1:31:13 To get this minimum squared distance, we need a Hamming 1:31:17 distance of d. 1:31:20 So the number of words in the code of distance d, which is 1:31:24 given by the parameter n sub d, is simply going to be the 1:31:29 number of nearest neighbors. 1:31:31 Not just the average distance, but I want to emphasize this 1:31:35 symmetry property. 1:31:36 If we stand on any point, on any vertex of this cube in 1:31:41 n-space, which is the code vertex, and we look at all the 1:31:44 other points in the constellation, no matter which 1:31:48 point we stand on, we will always see the 1:31:50 same profile of distances. 1:31:53 We'll see precisely nd code words at Euclidean distance 4 1:31:57 alpha squared d. 1:31:58 We'll see nd plus 1 at Euclidean squared distance 4 1:32:03 alpha squared d plus 1, and so forth, right up the profile. 1:32:08 So there's complete symmetry in the constellation. 1:32:12 In that universe, you don't know which code point you're 1:32:15 standing on just by looking out, because the world looks 1:32:17 the same to you. 1:32:20 Is that clear? 1:32:23 OK. 1:32:23 So from a communications point of view, this is important, 1:32:27 because it means it doesn't matter what code word we send. 1:32:30 The probability of error from any code word is going to be 1:32:34 the same as the probability of error from any other code 1:32:36 word, because the geometry is exactly the same. 1:32:40 The Voronoi regions are all the same shape. 1:32:43 So given the exact probability of error, not just the 1:32:46 union-bound estimate, is going to be independent of which 1:32:48 code word was sent. 1:32:50 This all follows from the fact that it's a linear code and 1:32:54 therefore has the group property, which translates 1:32:58 into this very strong geometrical uniformity 1:33:01 property in Euclidean space. 1:33:04 Or actually in Hamming space too, but it's more striking in 1:33:08 Euclidean space. 1:33:11 OK? 1:33:13 So we have everything we need to write down 1:33:17 the union bound estimate. 1:33:22 Union bound estimate was just the probably of error per bit 1:33:30 is well approximated by K_b of constellation, in this case, S 1:33:38 of C, times Q of the square root of the coding gain of the 1:33:48 constellation times 2 Eb over N_0. Related Resources Introduction to Binary Block Codes (PDF) Course Info Instructor Prof. David Forney Departments Electrical Engineering and Computer Science As Taught In Spring 2005 Level Graduate Topics Engineering Electrical Engineering Digital Systems Telecommunications Learning Resource Types theaters Lecture Videos assignment_turned_in Problem Sets with Solutions grading Exams with Solutions notes Lecture Notes Download Course Over 2,500 courses & materials Freely sharing knowledge with learners and educators around the world. Learn more © 2001–2025 Massachusetts Institute of Technology Accessibility Creative Commons License Terms and Conditions Proud member of: © 2001–2025 Massachusetts Institute of Technology You are leaving MIT OpenCourseWare close Please be advised that external sites may have terms and conditions, including license rights, that differ from ours. MIT OCW is not responsible for any content on third party sites, nor does a link suggest an endorsement of those sites and/or their content. Stay Here Continue
4152
https://www.ias.ac.in/article/fulltext/seca/046/03/0203-0217
%PDF-1.3 %ãÏÓ 158 0 obj << /Linearized 1 /O 161 /H [ 1279 700 ] /L 1727396 /E 614358 /N 15 /T 1724117 >> endobj xref 158 36 0000000016 00000 n 0000001071 00000 n 0000001215 00000 n 0000001979 00000 n 0000002368 00000 n 0000002523 00000 n 0000002668 00000 n 0000002877 00000 n 0000003074 00000 n 0000003219 00000 n 0000003367 00000 n 0000003515 00000 n 0000003716 00000 n 0000003738 00000 n 0000004478 00000 n 0000004500 00000 n 0000005124 00000 n 0000005146 00000 n 0000005765 00000 n 0000005787 00000 n 0000006406 00000 n 0000006428 00000 n 0000007044 00000 n 0000007066 00000 n 0000007710 00000 n 0000007865 00000 n 0000007887 00000 n 0000008576 00000 n 0000008598 00000 n 0000009248 00000 n 0000009306 00000 n 0000161384 00000 n 0000339048 00000 n 0000570483 00000 n 0000001279 00000 n 0000001957 00000 n trailer << /Size 194 /Info 157 0 R /Root 159 0 R /Prev 1724106 /ID[<794ae08cfde4fb2a48d8741841357c16><794ae08cfde4fb2a48d8741841357c16>] >> startxref 0 %%EOF 159 0 obj << /PageMode /UseThumbs /Metadata 156 0 R /Pages 153 0 R /OpenAction 160 0 R /Type /Catalog /PageLayout /SinglePage >> endobj 160 0 obj << /S /GoTo /D [ 161 0 R /FitH -32768 ] >> endobj 192 0 obj << /S 415 /T 677 /Filter /FlateDecode /Length 193 0 R >> stream H‰b`fùÏÀÊÀ ™Ì €�"@1vŽ ˆ˜t!P†eÙ«|Ö¼»X{?Ô12thö3,zñ”ùì„ì@UÙoÙ6åy'¬Ðx€d—cGÀʨ#/.©Z͸¸u 3ÇÁ¢/kbÌSήvN63)q0¯èØ0õõs¿s³Mfi «ö+In9Öwr¶†S@Ñ3YŸŒ» IêçM]«õ5;xEÆ«äܵ;xµ£Ãr¤­n\Jw¼¿·áåÄÆ©µÃ|{皱q’‹ ›òÊÞ9ö-M .-±n¹•´à°Š—䐈˲f7ùq5{Mx'œ Ô'qóŽÈ± ®i ppq ë�1…”]Á´H£ H™’’RhPTÉØØH ™T@L—´4>°9¡¡ Ž ˜ÓÑ@\P1¿ÞI -Ä)1!†èŒov3hßÀøƒ¡ŽAç�·PzÐQœ!@ÆT ÃȘÝÀ�ŒÁÙ@¦ºÃ¤Àk«vÔ-¿vAgñ^¦ - ܹG€ yö L µ@‡ã†F¹& ˆB÷ÛoÚ!jX j€jZØ/€Ã 5pˆ L" ­ÐÍ FÐñŠì RLŒ€ºÐ@ƒÿ Í0neà„%I†i RVæ àdÌÔèÊrÿß{öÝ=ÅéWƹo@€�jPÑÿ endstream endobj 193 0 obj 584 endobj 161 0 obj << /CropBox [ 0 0 500.39999 680.39999 ] /Parent 154 0 R /Contents [ 171 0 R 173 0 R 175 0 R 177 0 R 179 0 R 181 0 R 184 0 R 186 0 R ] /Rotate 0 /MediaBox [ 0 0 500.39999 680.39999 ] /Resources << /XObject << /Im1 191 0 R >> /Font << /F12 182 0 R /F7 163 0 R /F8 166 0 R /F9 162 0 R /F10 167 0 R /F11 168 0 R >> /ProcSet 187 0 R >> /Type /Page /Thumb 120 0 R >> endobj 162 0 obj << /Subtype /TrueType /FontDescriptor 164 0 R /Name /F2 /BaseFont /TimesNewRoman,Italic /Encoding /WinAnsiEncoding /Type /Font >> endobj 163 0 obj << /Subtype /TrueType /FontDescriptor 165 0 R /Name /F0 /BaseFont /CourierNew /Encoding /WinAnsiEncoding /Type /Font >> endobj 164 0 obj << /StemV 0 /FontName /TimesNewRoman,Italic /FontFile2 188 0 R /Flags 34 /Descent 0 /FontBBox [ -175 -216 1042 880 ] /Ascent 0 /CapHeight 0 /Type /FontDescriptor /ItalicAngle 0 >> endobj 165 0 obj << /StemV 0 /FontName /CourierNew /FontFile2 189 0 R /Flags 34 /Descent 0 /FontBBox [ -14 -274 614 784 ] /Ascent 0 /CapHeight 0 /Type /FontDescriptor /ItalicAngle 0 >> endobj 166 0 obj << /Subtype /TrueType /FontDescriptor 165 0 R /Name /F1 /BaseFont /CourierNew /Encoding /WinAnsiEncoding /Type /Font >> endobj 167 0 obj << /Subtype /TrueType /FontDescriptor 169 0 R /Name /F3 /BaseFont /TimesNewRoman /Encoding /WinAnsiEncoding /Type /Font >> endobj 168 0 obj << /Subtype /TrueType /FontDescriptor 169 0 R /Name /F4 /BaseFont /TimesNewRoman /Encoding /WinAnsiEncoding /Type /Font >> endobj 169 0 obj << /StemV 0 /FontName /TimesNewRoman /FontFile2 190 0 R /Flags 34 /Descent 0 /FontBBox [ -77 -216 1009 878 ] /Ascent 0 /CapHeight 0 /Type /FontDescriptor /ItalicAngle 0 >> endobj 170 0 obj 660 endobj 171 0 obj << /Filter /FlateDecode /Length 170 0 R >> stream H‰Œ•MOÛ@†ïþ>‚ÓýÞõѤ ܂#%n+Tzp]ÓXJbd»Hô׳ë@2k»¡äfÍ3óμ;³& M˜‰ìop‘®tH)0ûõ! !±?j?00¡ „ý¾ ¾Ÿdחáé0û\fÛGJ j:_ÜMF3Æ\Žž_MGJœý—f DÊ Óëxq;O“Ù4A(pKpæjìd,gÉÍMœÍ‚€TnV¸]µ«E9¨x:='@̐°ê>vƒ/|q ŒÁÄÄEk½7τ”aç³3LM–ß4ήãô̓ªÞ,Òý Ù® †eÓ.QÄ÷‰¢0_µ“ÖV!@_ݟܖ›ºjp&>·vŠ0—Öàuá ,JȾ<%¶¾òÊáŒÁi" ›÷;ˆ$ᥨp :å£ ÅD·½Á‰!B£a‘E¾É·û1!4Dþe[æM±úÇ®pðÓmÛUݟ®<›89p‘oçëº)ÏÕý©çåï{Áˆ…õü©-Êê©üåça£6ûi!î6žnPõBQ$cþ³ç#£´í!Öl}ô ¼z+”|ۋµÿ\)Œƒ˜HÒl1ÿøe–%óÔceÏF0Dûüv"cÔÜ E+7/Éî°úh´U’õêì¿e=±†ö¨à©úÙä]UoÏ‰Ê¡ÌÇuþÜzÅÆf;#0ãm�˜QEÝÚ`¢Ú<ÖM—o;OÞÐyîîš_ª©×åі8Wn¢^1OžöÃeÿomùT6ùcjx ¸‰Üæa̎|[¬Êö¨»º?‚÷­M˜+ä�0²WÏmU´Þ•—C}”Ó~m—tž4ãrhÿ,ö"À�Ä­ÒÆ endstream endobj 172 0 obj 544 endobj 173 0 obj << /Filter /FlateDecode /Length 172 0 R >> stream H‰„•M! †ïùsl/ˆ¯F½Uê¥Ro¹U= lF@4®öߗIª-6+®<òkûµ=Ø@Ëc“†ŒjBe†ãåðóÓr¹Æ-Ûàüðù×pü~øv }9ÍÀš 7ҔBàºdwãÖ¸™ åuɀiì,ô½fµ°}HK~ûÏՀ¡÷‰©�w¶ášllÉ®–æ7¸}%fÊ¨í §bÒÍ9ŸÒ|[×7à…ÆpUϺ²æJfYˆÁT j¼m Ót ٔãt$eD+€øyöZèÙ-”˜$O]ÚH3z?h5€”iœ>{HªÎv»Ä°8à¡'ú˜ž0üÑöLO¾v¼\» HnYW›ãFº[›ëý°Ö䏈üÚÞûçwæ¯��CÁá$ endstream endobj 174 0 obj 539 endobj 175 0 obj << /Filter /FlateDecode /Length 174 0 R >> stream H‰„”1oÛ0…wý mM–БE®:´³¶¢ƒ¢01 Yr(º­—þöR²ðNmæç»{ïݕeü?¼íí†Ë§òãϲý^|m‹Š5¼lûK[@YÅ/”¢¦Ja$ñ§cäÁ¦D ”h$“ˆ˜Ï¿lRJHB„4¢ÝŒˆ† 0 L¨+Ñõ¯gçíS‚neR Cû.p{;d($5ÃEÜlÄB¾–VÊW1šÎíÐ7YG¹PLc.LoDúR¦%~yÇ|®Š¼ã¾¡£‹j#óôœu95@Ͱ\Çi°ýyè stream H‰„•?Ü Åûý.)Bü·¥I•]”‚c¹ÉƖÍÝ&ß>Ø×0ãˆÛmùyfo]W~·ŸŸ–—îó¯nø~û6Ü(1¶üíi¸±Ž–?ë˜Õ–0Ý s9žÇPŸ×çTi²na)ƒ2cR+¥%ƒR¸3®-FòRRrÜÛïøŠŽAáq TÁ�/ªH�„?ηǨ­¼—g$šÅ ˆ¾'P�t™xɑ²uŸ’!¤|Cpy~ê8î'·ïÑ»©m&•�\·åy ss¦Q°Þ±Ô!Èb0k$\Ý6/)úTêbQEŒ†Ýí>N“ËË֔ƒ÷œP‹jޛVEAÔå´wë‹ñ„¢Ã}¸z[^Ô»oîŒE .çÓ¸¤¶óÊVðVs+ØéÆÑß½¶ìbj[ˆšó’ ZHàÀbœX'æ¡Ç„ÐD@䥬ëk‰90ƌ>ú­±Çýj]ãô=äèùoÓ¼H,�óJ_}Máñu h¿ñmr#±õm‚ȵgäÖ'á‚^FÏpª‰¯ËV´]—tÉ‡æ’ ÛcÛüØbòqà»…GÒýa ޟrŸÜܽ©t/0òÁ¾æ,o Ç/ãgèÔH‘u‚ýO’/CMÁ-PÀˆC·šx¸·¶Öœ2Td~t%G÷/5Ø_L­þ 0�>ãß endstream endobj 178 0 obj 536 endobj 179 0 obj << /Filter /FlateDecode /Length 178 0 R >> stream H‰Œ•Oϛ0 Æï| Ž›ô"ÿÃuÒ.»ŽÛ´/„6RŽÐjûö ´±³¥ƒ'ۏÛežÛ7•¿—Í—sSTDê²éŠOMA˼´dšÊJV"Uٌøj»ÕÍ�caœV¤2�co1!‚q a¶Ý ²c’1º.Öû Q…QQ©‰Ñs{·€Áb¨šHŸÄ»µ@aQ‹=H„œÜ2 !”Q¢ †y‰ k¡Ülcd=Û¬ÜT\Œø³€Ü\tM4,Ú'ͬf›(™Ì F­Àÿ£ma ‰®Q[®³wØ¢5֙i³Usó�ÊOˆšn¿fŠ‘87^™Ý q߹˥]aO¸ÛX,ó˜U››ŠÐl‚‰Ayð?BæÅÜ¦Ub'¨GY:t÷郎<ª9€a±?nvê~½p6ß¼qíÔg›Dƒn 3¤@"l¸°XãõÖ[o}Þ@ ÄyeÁ‰™Äï0õ؈ѻa°‹Ö¬Ô›ç@ s»Œóä:ÿ–­‡«Ç@DM…·&vÃÊùô4ðdñҚT Œ�yilѧ×dMØÿyÚèýd€u';ÝÛËíEG©ûÕ:ÈM¥Rîµü3·¤©›Û ñ÷}L£X†vÆN®ö~DoW»Œn²}vÍo{ ø¦41N8¥ ºy7ò« ¶úƒü�ßà± endstream endobj 180 0 obj 564 endobj 181 0 obj << /Filter /FlateDecode /Length 180 0 R >> stream H‰|•½®Û0 …w?…Çv¬Ëòz;´]t(:¨Žr-À‘Z[ÉEÞ¾²S´$U(2„ŸDRm›?Í·ivíÇïíésózj:¦E{šš—SÃÛ.y+{ΤnE?²ü×5_Ùö 4 SBW—æxƽJÇMJ?‘O FKmòÿ‚ý†ª œ)½Íñ=TsáB2Kš-ʦ×4^)6"ÀmXX UkWWOȌŒ tAíxÑif ¨8.·äc@2“È̀ŠNc5ÔVsƒ0:­6l“ g’]ÚS')±Ÿ÷u¿nv¯5£°ŸéÙ îq¹ûð†(^Ú/÷CJÖ©?w-‹ÿ™ü„t¦ òNÖÜå¦BëbF¸2Ì Î†3êNam-�B}© ›åI4AƑ¥s ë0rñ떪ó%„9ì )®«›h¯² ¨7Ìá ˜a¬–$ò0E”{ Ö.œõX9Üúö¨\!óLã{wwKu‚¤.ÊACT‡4Ç1••匆$¶=¶ä®(3ZM¶÷®?~žm]#BMmï(ˆ÷ oj5Þ1Ž‰Ù®×ðõåú!¿‹Ûä—Ŧ¸Vw®È£·o+@ÞírCډo’{ÖµU7©»ß°/.?áÕ¥i]öÜ»OsÕÚ2ϑy† MCcÀOXøY“ ‘ÉúàÐÞh!2?=DgjÕŠ?ßÃÿUò[€�ü¢ß\_ endstream endobj 182 0 obj << /Subtype /TrueType /FontDescriptor 164 0 R /Name /F5 /BaseFont /TimesNewRoman,Italic /Encoding /WinAnsiEncoding /Type /Font >> endobj 183 0 obj 609 endobj 184 0 obj << /Filter /FlateDecode /Length 183 0 R >> stream H‰„•ÏoÓ0Çïý+,N›ÆvlÇ9pئ"@E ÁrÈZE4I•ÑqØßÎKªQ¿ç®k•ª÷y?¾ï‡ƒÏl^ÎÏ-+W³Ër&™€¯d¶à–)a¹Õ¬lfß϶¾¿û›\Ô]ËΰòÞ´””YÆ­Cl¸ó]ÏcL”‚•Gøõ[)ز¼=8ræàÇqi÷Žò! ]cè˜(ßÍÈ+r(¥!™¹Z\\\_¿¿ºX 0£\žs…¸Ï\_>].æSq }¨’Ü : 9:ÁÕÞχÈ-p™7qÀ¼ öJûµo»à¤(dìøgAAU”¹&DS CŒtN”ÜéénOf¥¤áBŸÈÊJJÀ(b¢VõfS…®A§“æ$·ª]?ݔLLõEæ»Ø½¡¥gR’¼nP!Y(Ã5ê€ÔµT¬,£¬ëa»©V¾ñmà'…Ö’v¦$í'@)«ijÔ㵀kC]m&f; gúÖ÷?ïQs’-7ÓDÐ3ƒ#­á8 “„p†+‡á~¾9=5 þDPS¡R4£tOB"™²“"H²Ý¶÷Ãà×É}E#Z ª ´‹Ž1è+§G!:Çc‹3ýÿÜ}=à±r:ã¾9n[[-…®8n §?·sš¯/†ÓÊÑ÷"Ÿä�ɟ^sæØÿ¯‡{‘¾IÏ\| —̸Ë3¹> stream H‰|•Ë®Ó0†÷y /Aã[|Y‚� vHÝ!©ëÒè4qIÒx{ìôHñLNÓnº˜¯3óÏ?cBÒ§úùÆ\_÷­'o‘Ý÷êË®bÔ ²óÕ§]Å K\_N¸1” ™¡F“]— ),bãT$KÀà$‚+Ê,Lr %¢ F$Îþ^š~lc_rJaÎ2a?cÛ{Lá†$«iD8µcÉHܓšrX!"pKRZLŒ×ã±õmè§Mý¤•”)X_,‰šc°|ç¦9L–Çäµw¦‹cQÏ5@Àé,æ@hÍÆ\žØ]€ @ îÇ0ÜPnåéÙ´ u ÍtÃŠΓdzY{Z¨<͇½Ô+G+ñü44›‹´žú±¦ÆñŽçu^m3Å I©h­ÁÜÏÁ_Ïa¤›É¤C}½I…áÝæ²ÝMfózÏÐ3ÍÙ¬¡RáSó¶MÆL€³ÊÀå,üøØSvrå°:ye!žÄ¦W¸uԖÐö®¬ÈTÖm‰ßCkɕ‘¦}øÝLí-lgÑ"Ÿµ…‚×aå\_£aQ÷q84è¸êÕñ’‚–½?·ÓiûÚÕó“ôx€8>úH󻥓šžŠí×.z>ʯí6¢¤–á/[Ò ›íóÔ¾iî{G/ÿŠ{ÿÊ#ãŠ(G¸³Ñ>ŠË|ð @0¹ªš¥œƒµ}ù•ÿÅwՇo'Ÿcõ£"ÿ�YÐ endstream endobj 187 0 obj [ /PDF /Text /ImageB /ImageC /ImageI ] endobj 188 0 obj << /Length 151983 /Filter /FlateDecode /Length1 248368 >> stream xœì½|TÅ÷7|æ–Ý»}S€$”lJ @‚4)¡Az!!ِ@š)4APQ1bîØTB°+6¬Ø+CìèÏJÉ}¿gîn àO}žÿûy?Ïû¸×sfîÜ3gNŸ¹«YIQ4F™Ã&ú>¸ï5uؘicÛ\B”՝(šÜœ2­÷йD‰xî¿wAeÀvÇuDs§Ùå—Í-3¿Š(g‘¾knNEµ&‘�?ÿÜ¢Åùys&ÞCô¾Aʦ' òŠmþlûÃDË Ï´UÁœ¼¢¯1 Ïh^¿�îeörܯÄ}û‚ÊE×eW•¼I䭙,/Y¶cÕHR7ÔE­(ÍÍѳ[}J”þž?Tœ³¨ÌøÈ=ó7b~ $§8XûKݯúô²ÒŠÊ‘Û?ûšÔÏÅÿ§¬DÁ:´“wÜWÈ­¡¾JeýP_ƒ\‡B}b”–¡¾º+ÃC};}ØÀÇ U õt‰£s¨ïÔ§:jB}•ûl¡¾›ò}‹B}í!eA¨ï¥™¾}![-÷÷k°»Ï¿=ÔWÈ10ÔW©ODr¨¯Qˈ´P_'wDV¨o£˜ˆsB};5ð1(ñPßAC£ßõÊ摡¾‹ú¶z2ÔwSF«_C}:#¢Ô÷RZL'H"4ö®7fa¨¯aü,Ù×åøÝ¡>_,û6¶Ì;¡>l³MöírÜ õy|¿ì³wݱ¡>Æc£dßò¯Õ·ükõ-ÿZ}Ë¿Vßò¯Õ·ükõ-ÿZ}Ë¿Vßò¯Õ·ükõ-ÿZ}Ë¿Vßò¯Õ·ükõ-ÿrßÉ6‰êÃ&±ƒdßÅÒ݅ñž!ÝݜI±kB}ºÇ˾ãF쓡¾Fco‘}¿äÿE¨Ïü_ý(‹ õyü?²ÝÄæÑMlÞBÒõA— û-åxi¨Ïããd?–ùÄÝêƒOÜ2Ùo-é_õ™þ>ÙoÛdݶM֍—|~ õ™Ï²ßžù´N õÁ§µûåø„PŸÇ{È~WæÓzy¨>­¥Í&ö7šØßh¢—ÑD/wzwzw¿¸Ã~™L‹©Œ‚”O9”‹6@÷&£r •R 2D ¡¸+GŸqÆ %E�#E˜Ÿ†Þ09žó¿É©[ƒdš„'ETÕ@S±‘h­õzP_\Ý©k¨—.GcFډ˜32TÊYÁ¯PN €ó°F!˱�E»PҔb,ü”ò³tyxÆcå4c¥°ÖÿºfŒ!S!V­”²°$Ü3Meˆëh ñr~€Räzc€Çaí|©!KÈó‚àZ!e/qK;I¦~¡)ۓ}Vª\PO•œ$g›²Ô¼™¦O¤%©SîïFÎã¡G×fÜǀz,ô˜ŒÑအð÷Ça”õéN¡Q!ÊîxÚOz†ú½)À³zÑiØÇ˜;{«’õÃi£ìÅWô81ãseåû³}‚{Ãdv.lˆ k—. U[–i’ÔÓª‹CÖ/—qÊ\9C§JúʐFKïå5D�Ÿm2°7V¶ò&g’Æ vr­Ï—µ¼Brá݌Ÿæœpês߇Ï6MO VŒ–ò慲¢DÆ2W´œÐÎÚ¥I-”²æÊè,”ë/”6 õªcíVœõÖÄÊF+{¹Jp”YÙXҰ͑YP%;q¯Ç©U•8ïd%) Y€¹æJËpõΗ¹h¡åÒ>gMK¶°EJC™^ØPióšù¾B® e^qèìØüðßc¡CÈB;p¸Y{ãë¼x²ÿšZزQIHҒ†±rYeæJYy¤E23K¤·„vko³l´ ÉÙlU+ŠÈSû‚†œÈ—•²éé 4tž¶bîÔ»üßË1K»!2r¬¸.mßŠË†úTq’Å­˜Ëk¨Hy2F©Jên­9^ò“'„Y'çñеqîÒñáh.nØ[JC»A…Ô´(uҏáJXÚÙX» éùªfùÃÒrÆ5ߓç6øƒõf»Iþ–‡¹7W²Š[gà\éó2ù´ù~2OJCo¹!ßcŽeë³@—'WXLá½»±žÌ‘sç‡dµ,T,÷ŠZ:£V4«ëÖSøÄRÚ¬†æÉøªjæÅ0çùTڄ›u2(“>Y܌2/t.¯”–_ÓþáNÐM҃{7àJY X®nò4?[ò¶²Îªå oCi 3ÿgW(=®‰ÿ«„Ÿu;aÇoà=yqY0?'7¸/0¹ à/<+1ZZ^VZžSYXZ(+ÊM Ë©Ìù ¢nÌ,0©´¨ŠG#K0¯G߾ݻ¥§&Î-¨¬L VËó&+cƒ K‹sJ6&—çä‹sÊçJóÿëbòà܊Êy0/PX¨é”Iñ9•”Àä1qùùiœ’¼@°¨"¸°�diaNýNX40²2§¨0·ßÔy3OOëÛ=ÐqLanyiEi~e'IjI<~RW‹|Ìä±ã&>rèàÉ#Ǎ Œ=rhÖØIYÁgLÌʓ5v²ÇéqN.(¬T†Ì}ZV^Z,¯\Ì:6èã•Î-Ï)+X,å.„•ª‚9‹‹K«xfné©mUI^°\òöÅÌ$'�‰‚% ϙ[ KÓÓ1­ gA0P:§2§°3+› ÃÊ-Ì)‚…VÈ+,æV-䗗7ÊUеJç%ÉBP6Î˃ýË çTU‚5Ä,- 6U¨CEX¨EZƒ)&£ŸXST•3§bWT+›ÎN L)) VTHå¥Ð)äìÊRL­( æææž¬y�V,©,,™+çæäårÌäÊeìuáári[¬Wy¢PE…Å…¬‘t KËçWTZa—[ÈÁ҅ˆÁª9E…¼xYæ.ÎY€üpUÙb6\£…š/$í12¿Q¹œ’Łs«‚r™ÜҒÜyIHƒòÜ’¸¢ ´ª(±¿ áË1p²úLO ‘\_–ǘ®AGˆ…\sr+}̊儤Î?5[)rÄ\¤Íœ˜ÖÉ©ìÇS& t tìÓ³w§@ï}ºvïÙ½»Ã1e»÷èѳ'pïŒÞÞ½Në{Z_³ ²²¬_·n .L+;>·´¸iNÃÊs²-Ò œ&Uæ 6CüòŠÒ’.©…¹•ÐtNy Gߌtl岒È�kˆúüòŠÊ@NYY0'T:˜œ[®6Vi€ F—–äÁ%Á…e9HÖ.ÒF s š…9¼Eá\¤UZ�n„{«æTáÆÎ¢9Ah gÛ¡T”W(.…�U¹¹ïüª¢€eÐò Œ± pcA ÚÜBÚZúßôäߌѽÁÒóÿ’óx9Ä_ݕü ë•ÈèBúZöþŠ: r,‘ýœðAëßXÛßå[Gdì&Í^'ÿÝñ ²Ñùt¾X.®W‰ÛEØ+Leºò¢ò²ò±\TUu¨IêùjµºZ½]}]sk㴙Úlíjí:ííNm›ö¸ö‘ö•¾]NÿZÿ¹ÝÅíþø-í‰8wdúú†–î ܸ?AOˆJh™˜’–09aVµ •D[¢/12±Eb\b|b§ÄÔĉ9‰Á$%ɟ”LÉJ²;ٟ“Ü&¹}r—äžÉý“‹’W$¯L^•¼:ùêäۓïO®M~,ù‰äç“\_M~#ù£äƒ)ýS2S†¤d§ä¦ä§Ì?¤V;÷8ª íu´ÿсGvtœyÌ4ù¿#¡ Rÿ b‹Ø%Ž@ÿÐÿC•ô\_ ýתwjBój´YÚ:m½v£v‡ö V§}¨ÒkôÇõ7õÃíV´Ûp¢­©z oƒþwBÿMÍôŸ”pvºý# lb»þىyRÿÀŸè?¾Aÿuɒ75èÿ ôÿú÷kÐ?˜2ï8,k‡}Gôï|´ôÏ<:ôèpÖßüŒH‰5£ÅX1Xl3÷Šñ ¬ÒÒ©Ú?oÿ}Rsíþû×ï[¿ïŽ}—í»‡çíoµïÜ}³q×}_澌}í÷ߛµ·ÿÞ¾{{íÍØÛ}o§½‰{[ïÞ+ö|¿ç›=‡ö|±çSžµg瞧÷<µ«ìyaÏÝ{¶ìÉÚ3dÏà=í÷$îIØÓ.n‡ÿ)ù‡º{äÏ)Oš¹V]×Ð_ý§T Ô§~@wÒJºXù–ÖÓAº„ÖÒåt ÝGw‘Ÿªaœ‹èj:L?ÒºŽVѳ´—~ [iý‡~¢ŸéºŸ^¢ô�ÍA ^Gyô Êҋô2½N¯Òk´‹¾DÑ‹Þ 7éA°ïéJz—Þ¦wPÔ¾¢oè2š'‹&KPBPÊΕßþUÈo¨ À¢E(i‹éj_µŸzºÚ_ T©™êuˆ:T¦f©ÃÕ3ÔêHõLu”:Z£ŽUÇ©ãÕ êDu’:Y¢NUÏR§©ÓÕêÙêLõu–:[ÍVsÔ9j®š§Õ|u®Z ªóÔùj‘Z¬–¨¥j™z®Z®V¨•j2c¡ºH],>Ÿ«KÔóÔ¥ê2Ôû崕j•jѓ¦Gè9ñm£‡èyºž¡Kéñ¥²CUè ºG„génºJ ¢+P?ˆ+±\-RX\¾ß+¿(¿ªºò›j((GU‡rDu\ÇU—êV=ªWõ©~嘣F¨‘j”­¶PãÔvj¼PÔDµµÚFm‹]8Im¯&«)j"a£†ÿLNðy§œÑx¨jºÍn8œ.·ÇëóGDFE·hÙ\&6®u›¶í ‰Ií“S:tìÔ9µK×´nÝ{¤gô<­Wï>}ûÞÀÀA™ƒ‡ –5üŒ#Ï5zÌØqã'Lœ4yÊÔ³¦MŸqöÌsfÍÎΡ9¹yÁü¹…ó旔–‹WÙª -^rÞÒeç/\_qÁ…­¼ø’KW]V}ùê5k¯XwåUW\_síúë®¿áÆ›n¾åÖÛ6Ü~ǝwÝ}ϽïÛ´Y½ÿ·Ôl­ÝöÐÏc°'Œ{›hè'A¶ÉŸ| є‡ˆ¦¶@‡©ÏMH4Õs&ÚYX35zdÊëO”õæ¾OTˆ}mþ&¢žDe%D含òTaí…ÐqÖX҇è<è°ì{¢åyD�.ϕ°í%¨ê—VÁ–—µ¼FT óWCÿjð«ÆºÕ˜wy��.\_€}/‡ž«¡Ëê±�LX±Õ°ãŒ­9°�¹Ö€÷Zð^;€j½¶p€è ?�tW/ºtëàçuëÊ2ÀïDW/"º»ÏúK�Ðã:ð»zÝ´èøñ6Œm€­6@–Û±Ýõ Ñ=ðѽ;‰6æÝù7¡½¶~:oAœÔÀÎ[±æ¶H¢‡Rˆ†ì FÅ.³½’èqÄÃ8 <ÞOB–'?'zúz¢°Ë3ðÕ³ýˆžC=÷�vy¾�6Ø ™^‚o^¿—à»—§¯”°Ã¾Šç¯Ö¯ÁF¯a\_ޅ5vÁޝCî7«7oށüï-þû ùÀIôÖûh�±ötÜ YwC®Ý°Ñn¬¹{NÐeÏ�æî-÷&ڋy{Aó1ôþø]œ<‹}x¶ºí‡žûq8�>Ï?A¬~šFôÙ¢/f�‹/ ßÐï ü~p%Ñ!ÄôWàÿòã+øùô¿Cì‡XüöøëF^ý{ü§;Ñ/ˆ½ßÀã¬ñôþsހרì¾<ŸÅÜ£;Žø=#ŽÃæõЩãõX§žÿ†j%àÀÀ÷$D"àFÀk$ÔÑ$´Õ€gIè �Ïu<×wãõ¨# p»0p>àŽ$œo“pŐp¯�<ø‰„g ðàgÞ.€Y$|E$":“ˆDO$Ñb-ÊÕA­^!ó:‰¸3෗D¬ßPK"€> K�]"ÖOšxD{ðmˆD2x%CæÜ§|J¢dêÐ0�:ÀÀ»hàNÑ1�ý;.@¿Ž°GÇ\_It �0§Öè´ p€Dg�^ �Wž�&‘Ú�=RÁ;õyÀï$º@æ.%€ �Èѵ%8�k¤Eð< öI»�ߤA¦4Ø©ûn§A¦ÓÖj�°Íi°Q/€õz-@Þm�˜Óçz}Ë�§ß"�hOÇüÓß%Ñ?P@�ä�žÛߎ‘TG"<ƒïÈ=8p+àkCÒ�gôò�º …͆b­¡w�à÷a6@�ì;l#àCY°U( ¶ÊBeAþáÐiÄgb­Q™€�è0 ö ŸŽ†ÏF\_@LÆÚc!ËXÄáØu$ÆÃnãa‡ñ°ÑØbg"øLFAíû ±ò9rë è!îe3‡‡ Û!Øíðë÷ÈÕï ß÷¨“‡‘¿ÿAÿŒüüýß!ÇXûèaüìP_˜+HÁ;™‚3¨‚S¨‚w/Eh¤(å¤h³�%€[I±M%ÅÈ#Åñ+).7 “ύ¤ø†6’_KJ^g#Vž %²à~ÀNR¢À/j à5R¢m�<‹î˜(ýèIi‘ø””–=˜ÛÊ ¸ð-)1#�¯“; ° °—”¸ö�¬Õ:�­ëIi3°ƒ”¶KµÝRÁ'þARàXDJdN�Md�ø ö+I^"¥}:�´ÉKÞG ΝJ‡õ¤tOJ'@çѤ¤‚ê±Òu)i«[G�lÐϺƒ\_kHI@ö èQCJOðíy)§Í#¥W �|{÷€¾ôé ûöƒúAîÓ!sÿ6€ë¿“2�ò€®€Ç@ØhøBJ&æ…]²à«áXoD)gbýQ-E�øtô À÷¤ŒÞc RƁß8øb<øO€üa—‰¯2 >œ ž“a‹©g’2 zM“”°ó è<sÎ�Àsf6)ç Ω#ebäœ ù²ñ<ºfÃOÙÐ)òd/€OøåÀ\_97ç�à'Ræà•qN4 €˜˜ƒuçÀ‡sw¹ðŽNJÞAR‚W‘’Ï€ùùˆ‡¹i.ü1:Ì=FJüUp�ñ[¿"žçÁžó ó<Ð̏ùXc>ô˜?Á~EX§6+‚,ÅxVŒ5‹áûwI)JúŸ%ϒRڀØ.ýš”2ôË.Ýs±î¹ðM9ևíÊa»òÇ�xV}à—Šu�¬Y ž•X£¶®‚-ª Uà½�¹´�4 a¿…ðÛBÄÓBøyQ�6Y¾‹Àcì¼ö]ŒuÃދ‘_‹a%ȁ%Ðg ôYùσoÎÃÚçA÷óà·¥~�|½|–‚÷ÒÏIYæ —fÙnRÎßóaŸó!ßrè³ñ¼z.Gn®@<­€W //�ß ï…°Ù…ãBØü"ô/•Xûäø¥ˆU˜{|Rø_ƒµ¯À¼+»“rlx à:øþzäáÐùFŒßß ÿÞ oƒnGîÜ ÿ߅5ï†-îE#xo„î;È¿iÀÕoBÿ"×¹óù_ýiÃÙøq8 ÃpfÄFÎӝqŽö†Óˆ8="i8O_ãÜfwšNçuÎøö)2œÎ6[¶ö;£ÎXgœd§Sr3œF#G|š¬àô„ƝÎàœGŽ9ugPÞ+B8MÃ)Œèç~2DîىG’—!Îç†�7PAä_x7,µ„ìv:…Àú†Ãùs ÃiB§HqxÒ¤mpŸÖ¦C›¢5F{ðÔ´è6±mb…üà¡lÛ¥umáŠßÉß«XDìú¢Eìo™}bcE:>±hEªÁ¢Q^Ü|›Š¡XHıHm:¤‰ðg]· oû–‚emÛ6-š%ƒÖa¢5§o­ÚHÐçk/à¶V>"ä£Q©¢M›è×¾mK—–vºÛð$nU ‹aùEZ´3"Z$ƊèèèµmD;Ä Œ=Ø­hcWҝ–i’Eë˜6i<ÚE®ÝÁ+:øxáîn?¦´O‘¢U{kw\dGw‡XgwHÓѝ(©}b+x²s2ڀhË·I¡a6˜ì$Ÿ‚X҆)E²£­Å=7äÈÿ…O›Xç©/g‡æW\›¸6ÑM¯Fÿqd6²ÜæàK¦Jtc>ð“v.)ÒvÜÒJÞ ù½°\éª\"£ëÚA¿&d7ëÉA°“œÀ.r™ÇÉMnÄ^ò�û€‘Ÿ|ÀG’8 ø(ESp ŠnIÑÀ­€P µ�Ž¥VÀq·¦ójCqÀm©5p;jOmÀ¿SµN¤�p%�·þ’)8…’€;Hܑ’Í_©¥�w–8•:�w¡Žæ/ԕ:§Qgànw§Tógê!q:uÎ 4àžÔÍüF݁{Iܛz�÷¡tó'þû-à~Ôøt:Íäß4é<�øGH½QàLê<ø0 ¡Ó‡Ràa4�8 øNƒ€Ï Là¤Áæ÷t& ECGÓ0à1”e~Gci8ð8:x¼Äh„ù-M¤3'I<™FO¡Ñæ74•Æ�Ÿ%ñ4<ÆÏ æ×t¶Ä3i"ð94 xM6¿¢Ù48›¦çÐYÀs€Q.MΣÀA:8øKšK3 èàB‰çÑló ͧlà"Ê.–¸„æ˜_ð_˜�—Qð¹.§|ósª ¹À•WQð^HóÍÏh‘Ä‹©x ŸG%æ§´TeT|> ¼øZAåÀPð…T |U™h%-�¾˜_B‹€/ÞO«h1ðetpµÄ—ÓRs­¦eÀkè|àµ_A+̏i]�|%]|•ÄWÓEÀ×ÐJs/]K¯§K€¯£K1ëzZ…§7H|#]|]|3­Í-ßJk€o£µÀ€÷Ðí´øºøNº ø.àÝt7] |]|/­ÞüÝG×o¢ë7Ó ¿_è&Œ (ñ—ôº¹‹ÑÀ_ћÀ_Ó[ækô ½m¾JßÒ;ÀßÑ»ÀßKü½|˜>�þQŸèCÐÿ‡>BÿgÚ ü‹Ä¿Ò^àßècóúöÿü2¡ýè¥è£O€Ó§Àõô°IŸ›/ý[Óÿ/¯éßȚþ¬é_˚þµ¬é_˚þµ¬é_ɚþ•¬é_ɚþ•¬é_ɚþ•¬é_ɚþ•¬é‡dM?$kú!YÓɚþ¥¬é_ʚþ¥¬é_ʚ~PÖôƒ²¦”5ý ¬éeMÿBÖô/dMÿBÖô/dMÿ\ÖôÏeMÿ\ÖôÏeMÿLÖôÏdMÿLÖôÏdMÿTÖôOeMÿTÖôOeMÿDÖôOdMÿDÖôOdM? kúYÓȚ~@Öôý²¦ï—5}¿¬éûeMß/kú>YÓ÷ɚ¾ïÿÚ~}¨¦ôoMÿ·¦ÿÿ¶¦§þ[Óÿ­éÿ×Ôôþ·júÿÖôÿskúcHåêãÛ²²Ò3ëЦ¦É¶¶c§ôíòA\JúŠÁQêãtà €FPÔǕ-(­ñ Þ^Û²µœUW;dH¨Ó«ÕÙÖ¹kúþÁNµŽ~�(jº¥XÎÚÖ1-ýð—T}”@5ìQ/¨íïÜJÝF~µ–€ñ€2À€ l£ý€�&@£Hucí§—Å?¥Þ&æ‹ÁäzºÚ™îøåÚr]Y®,W•ُ+5$Ì¢Uml~z¹c[0.b®<ð¤ºR´õÍʖڙuhÒd³ f‘mJ«MH¶Ú6ÙÖ&YÔ±ž€Yj�”-«™jB',ôÓ¶~)ҟP/ä‹úôp|fò̌vuÐsf¾ß–œ–[öCáSê0IµÄ^ë–îçgÎNws;vBz"·gŒI÷2‹áN4™Ž”3Ò#“‡N“Dµé<§¶sF$“öù8Àþôsf‹ä1ɧîONé™nKîœáÆúuf}fûä®î~Ý2ÒoHޔüXòËɚžÜ OÓû¤ÇöëÔ¯O?5&¹>Ô1¹O²ö„z_”lP¦?ÞÏÇ/ŠW\ñÝ3 ՏۥÚ+ø¢xµˆï=۾Ů̶m±)‰÷ƒÞq7,¼7Óy|bzbRêDViym§ Ù$²Q–×¶ €Û—¶KÍHocp-dô¸ôô”.ƒæ÷êr¹ñþŽ6íטÒ/#€™Û OoÇm·~é‘Ì)-CÞ"(%ÿ” oGžÙ“[R6 1h2Ým3Sº§§'¦dôÁú¿g:S°¸#¥uBzõSXJ¨Ëù¢(–ß;ÞÖÍ6ȦަlQžVÞP´ÛÔ-êÓêªV ª+T5^í¦RÇ©³UÝ7ø4å;8w6ðm€ý�•º”Ê»-ˆ!Aã€Á‘<݂§ÜÄQ,ŸÌ>á ç‡PkÕZå;\5¸À%3®· î"S~ïê Nr­ZQd„‘9Ø¥œ§$áLã$î-që̸žž+zzVöôôôLïé™ÜÓ3¢§§KOOǞžÁ~å4œ¾N²/³/“KgX7Y7áqêÿÐ'8ä¯(² ' £ÆOÛjАéCgZmKÙ@XÑú1ÑFýˆ\©ÓkœICj\IChÐ ˜TÑ훻Ɔ1;€ÉOOˆ9¿õcÿX>“»1ì =ê:¸ë~„pæG^ ûBbÎ?=‹l =òc8‹ ŽÓ&!.çgÕtÎF“4l:ÅdÃ?¡¦ŸªªªŠŠÊþBʤQ5&̘¶5%%«&6{ØôÔ¬˜a•ÿEUӓñ$»=«&“\\Rå¼ÔÔ\«ÞÜ=ñSiIRJ­hÌ·‚¹¤ ˜´ÎÜ·­]¹ë>œš“’š±Ý<¬^°52ƒ‰§‹ŠJž ^‡ ‹+ežœ9hà€þ§÷ëÛ§÷i=3Ò{tï–ÖµKjçN;¤$·OJLÄ·kÛ¦u\lL«–-¢£"#ü>¯Çír: »M×TTß.YIó5)Ù5ZJ҈]ù>)9M²kޜ¦&-ÉÍ)3A™e¦E™Ù@)üþÔ¿k—@VR f×°¤@˜1aúk†%MÔ|'ûcdì{ÐOHÀ„@VLÁ°@ÈdÕ \_PP•= 춺œC“†]»ÐV§ ]z5­’ʶŠV…ì(­²úmÅÞïP5qIÃàü¤a,Ašœ•“W3~´¬a­¦wíR#†æ&Í©!ÀTIBCå25¶¡5v¹L µ¡Ë[»ì¨^]ç§9٩¼œ™ÓjԜé¼FD\ÖVÓjÉç1·Žx¾´éÓÖj5#À·Õ՗j6L˜ÖôiãéÓÁs•äáÙÕñôj6bL7³–RÁ¤,ɞ¨q$ I¨ž— ÄU×ÐÄÅ µqq™Ûñ~—¨ž<-)¡fPë¤é9ÃÚl¦ê‰‹·Åfb›?éÚe«?²æV¯/Ôq{šv‚ ÏdO’soÔÄs –(i$¢ &€$Ӓ HFÁ>TÛdøL˜U“7Ö8†fWûûñ8ϯѓýIê_nOúîÛæ#9¡[²ÿ.GC|áy¸_“šZÓ¹3Dž}( ÊûÓºvYP§|ŸTæ ùhü4L›Þ¯lžÀ^½¼.“æà¦fńiÖ}€æ´®¥Ìn(FJ6?Ù~Òb ?Y~Ò0=; áûüû¸5FJÃ?>˨¬‚~5¢åy´žš”4 U(U²í¨ÉÍî¬ç}ž…z5QC§©­•POi­Ê§ˆÄ™ Ä|3Í]£%㛌ä¼:»P”#"0¼ÆŸ=ӝ sRy˜gɦqZH̚~©ÍïOovßLÉ´‘Ö -£ )‹Òé.z…æSM -ԟ‹è l¬É´:Q&§–"‡† þµáµÔÊ|OÎ6¿Rèx]@?Q½O¹´“lt£È öԇ^£æ\ŠÒ?¤^t ]kî!»Ö“î¦Í½f= ;èCÑ_LRWèé,ZBKiµh%:‹>b)¥@†Eô$íPüŽ‡É×þûi4—Òø¸ªÓxÚ"ÞS‡b¥it¹8Mì0ïÇ»T2fv¥Á¢—’j>Fí¨3ÞÎN§At1]C×Ó"M P{hÛ©tÊ¡í+ZŠDñ´y3ÅãC3!éjZO›èUzUċÉJ75[¿¯þy©.£Ëé=úQ8ÅYb‘R§>P?Ȝgn3ŸÇìÞXgŽÏ‹@u´»—¡ô lò¡h+ƋëÄ÷Z¥ž~ü‚ú·ê˜-ÍÉY§P•Ðrº ¾¹•ž¥Ýô9ý.4aˆñ¬Ò]Ù­zµ[õV&™üÿÓ P7 k-¢Ki®í˜ñ‚ˆŽ"CTŠ÷å_)ç+›•oÕËðBø™ö¥9ÔÜh>›EvJ•BáÕeðÚðÝýô =Luô}M‡égXrž¸\l‹ß”håå=í˜þ¡~ؼÅMÌQ –‰;Åf±[|ŒŒQ•+”k”;•·•/Õsի՛Ômê;j½fê.=×(}:ôݬÿd›b»Ì>Ä>Ç~¯ñÚñÎÇ_:¾¯Þ]ߢ¾Cý¤ú•õ›ÓÌæBóvó^ós‹¹#ô×P[ÄÿÊlJC挢Ñ4 òϧs“Õ´Ž®Äu/t°þFr'½EoÓ>Úë ‚g¿‘:ýBÇ SŒH=/½ÅL1Gä‹2±D^ʿݽIÔÈ¿}E¼#>Џä_±Ê¿Fí¦ôV†)g(㔉J®TʔåÊõÊMÊ=Ê£ÊcÊ ðòûÊÊJ½ü»É,u„ü{ÐsÕÅêêíê£ê»ê{ê‡ê'êﰍ%hIZ²ÖO›«]¤Ð;Nyú<ý6\ÏÚ\¶y¶-¶m¶Wm‡ì6{Gûûxû=öZ»‰LÙBW!K›|qE'ålH©Šç”‡ÄÕb—R«}§xÅt±D%¥«Ö1>†—©Éb ºH´F¯¡‘Š z•[”3Ýü™ˆ,Î@NÖßÑZþi/¨7o ~Ff=FÉæ‡AWšóéaÑ 4o@.¬£ÄäÐ\å\åkí˜êG„~¢~„¸9ˆÜï)ÖÛ^¥™J¢m�ÝF-©/ü¹‹€’F3èu<@±ÔY+ÒQÃÅOj-mRÖ+—)™/ãý[Ô½Úxw?€ºßoŸßЃíåå2ñ°f·‹q¡j >^¤öÊ-T«„¦¬Pþ£}H)}•jñ“ÖCUi<ütM߃îë•ßE]+V@û/Ä7ÊTIÿ¦r\½B)/‰EK%U Q»S½ò‰˜iÚÓ÷z+a(½‘G6ÄÕAe“š/n¢wôgÕ½ÚõÒÄS¢·rL (Ãĵù%Û~W=õï™Ci˜bšWi®ã?À:çÒGæójW-G;óèÃGßPZ‰«Ôb}šùSý2ý"e åë_ÙÐbe(ÄØ‹¶Pgñƒ»Çc¤,ÕJ[wô¨2Ú‡Å/´H\ìhM&£rl¡¹üµlgC…¾žŽ(›Q5ǨU¨3Ðóˆö¥¨íQJ.ö™1‘ìšÜnD4ü¨ÒbZÿ?‰Ýt3zíô»m}E•ð—(›èFu¦HÁëæÕ€©¶M´Î֗æˆG„ÏV+›Ì¼&êùô”Bæ7ë…yYJ_óqÐ/,�Ã�™€‘€ �‡�c§cÎ@{ðXx‰[Œï´Ï¤í3ófÀ[úTªÖ_4ŸCÿmÀëú‹´÷¯ýêó1}ªù²Va>eÛd>‰þ‹x¾to eoŸW« +p¿[ûLôøã 1V‡yÇÔ¶äQúÒnµ­™¡fSÌ”M¢�óºz©kxŒ: ÍTúÖ߄ç/ã¾æLÃýŒG£?ü“˜Ð4íÐvïÎàûžOæqÐv>I»0Ï^T3h’Aß©æ\m2E‡ô¾•õfÃ:Iù-™NðeޙMÁ’¯eûKø2½‹¶ÐºSvÑZ7\Ò¨þQÎÿ�~ß$n�¸µ<е·5¯Œ#ô‡è4Ü3ÌÌÀüŸ´›Í·ÕŸ)ÏRmë錏Pz ÆN£Zå<ú܆“ôíŠõtŽØmŒ…ÙÞV8Cvº™mc_C]1¿Öúr|§Uˆj@d«\Éòýn°y6üþ¨˜Z¿|"{•€4èµÌó3Ä𕠺vÑòÐ:o7ißæØk !ÿ„aw¤í7¡ºl¢€\_!K àÀ2Ìۃ¶ÆÇ¢ˆXÜ ú ŽWÄÅa+6Í86ïob¼7Ë.u@|sŒYy#–(ùt' °ÒFt{.ÌŽY–3Äû;Ž-Ž™pŠ”ͨé¬'ÇU¨•¹·:H ;ÇVC‹¼ãؗíWÈin¯¥‘³Ì³¡}QփþœðmJC’‡óuãcÙ~ESC±Þ?܆lñ\C»Æ|ϖÙZÑ-Zb¿9ЁZª?¡} әœÇÚµt£r1EÛ¿¡nðå8ðºá„özû{bøí€=wj»è´×kï)‰Ú{B×7›\_i߉úfå|îŸÜžaZnš>û§ãÿ+ ¼¯oÆþ²ÙüZÏ4µ÷è\þ\_Jڿ݁p‹ñZÀ @g#U\oÌuö)äGÜü (Õ2©Ÿž‰˜ÛAƒ´²~'c|ŠA£´[©g:E¤Ø6S‘:9е”÷é"揶¬!ެXënOŠ¥PŽ×ڗ¸æsÝ ·2÷PWCí´f÷ý¨'ï \ŸyàÍÅ«yGC\^…=dOc|6Só&ñy5xö81.›´û¸å½…ë;ï-XÖ¿¼îfýe}DãÉu9?&LbÛ0“xõáQY‡wьp^8ÏáÙèPAÆ{$×ÃR:Ç6•¦«½iŒ¬G#h–þäÚSµZó^YːOá½Tî£ï™W4ì£m͟¬zf¾ ëÍ3ævÎO¹obÿÔ7ˆ(ýej-ëJ=!ósðwꇵ¦¨÷£æ3b¬‡:�µãê÷4C>û€Õ…˜§™×ðž¨S²Ü?0KÕA4HνØÌÔ~Ǿ}öŠ?IƒV¿1‰³€-›ž‘µÇN¼¡z̾·Ï7·Ï2ŸµåÑN}<ô™CŸ@—]ÒuæNižÛÊìʶ°O6ש¿šõ yMϙon—ö€šÚBîÍ|¦�O[)]+íÁs.¢/iæç z-°Á:XK€½dˆù”>ļRÖVö¸ÅÐ3{››pÜÛÏ5M5Þ|=¼«OQ²ºÌ¼[omÞÛu wàºÏg>oðB÷~³NÎy ç4'e2h—ó)_½ p)ùô»p©3Wʳ{ÔQÕÌMê2œo¬ó Ÿ¦È|)5ïÑkq^GŽI°ç>üñjéTԒÁöË͍šB鈹Óïq€ +tÿlž³@¼aÑÏ'+¿ÑwèÏD¶ò”ºTyŠzó9P}Ç|O]n¾ \iž¯žEOª¯›o)mèiŀϛGÔwp®ÿvª+èu$ÎMeô¢ú’ù¹úœ¹OqљJóu+ÍW/2w©å4N-¿uô‚zyX]k^¡^‹ý…žU\_5/ÖúÐӚ ¼öÑNq ݤüH7ÙF“ë –üWÐàßREˆÌk RÖ0œ,ó%™Ü!yg4“—e ˖1,ßZìe!ùXoæ+çFs=™{ÉV[?>™Áu]Ö¬,ÔµèêçqDDz~Ëü´¿>G ýU€£€;�ü›?ƒÍi€xܟ¡ÅÑ¢P)}\Ɗ�˜wümÜ·C¿ú»�±DǾD{.ú�0~LÁ€s@gòZ=Bc?€þfÀnôoG;É;¶ }O¨} p à|@wy~=á\òÿB{Êýèï¶'ìC=NÜSþQ›õ·Úf{PØÿՆö–™'µ!;„õh"ϟíyÍZÄÏSMk+×7®«\Û¸žr=ihQSe]ãý„S¶æ~®¥\ϸ–r=Ó/’û}ý Ԉ5Ô:,Öà_Æ«q¹¤ªšf³9 »ª©ª­á£iv»Ýæ2ð¡év›]Ãn³6ƪªë6ÌÖmºïT‡5Oµév]G žü1 ‹£ÎUmºÏgpnHà Qê†üT^«Úl�Èa8!ó#›-VÕln¹††!?ªúà™ Þšj0Ýng–ü_Bð îuð²ƒ7ëÄw’XØìš}ar·±hƚ.—/›Ë°´³ÿècwñ3]nVØÎsEwëPÃÎ"è዗·.¨#/]…mmª=4lÉÙ@f‡/Øi 7,gél'^–Mb·;ØJª]ªÉ·R~HÀfEUv˜èì.LÖu»Ý°;0EÓt‡“çð|»ÿ(< ɂ—3œN»ÓfwÙ­ÙNÉÅ£énu‡Ãf1£éšô‡µŒËiÓNþè¼>‡™ =ôaß銿°Ø ÜZÄrL Óq‡ÿ_í¤»Ø@'þà",sÊblöQ¥¶§ºôæû§Ñcÿí¤áØnN/%ÒCö<[ÍÆ-žèüÌí‘ùŠQ—ƒÓÖ81\_9¸Wäphp™]Ätؑ:ví„|µYùªóaM&»ápüy¾êV¾œ¯v—Ãa—¡äp"¹4ëÅI‹ ‡Ã%Å]Ó|µ7æ«üU�‡Úèo»¬,Lë¹ÍÙ á|eØÜ\g)›Í!a“#ŽÐÝa™õv»m|Ùܙ˜ÿ>v7 ³Ûãø…vhìjc¾²pVðòÖ՘¯KfÉɲñ]˜ÈiÈ|u¡Þiò÷ ™¯R@ié; ‡\M†ÔµóO5X67ҕªÌ44ºÍú‡ó†)Mw¹xŽ,Tv—ځ1íà„Ün4†Û°&»d¦ÊŒ|uèRÑP¾Z¡8äšÛuª|åzÁe“Yǽp¾2ËfùÊKXĒ6Di·5ä+¼OŸ”¯Çÿp¾6zì—=|5ækÓ缘¶œk“+ÈLÖù™Çë”ùŠBï‚Zvǃ½á#ãßîf‡2hX áe8dEuë°'¢‹G�hÜV¥Cı?;ÿr‡CF„eS›Í\ó ݗÃa·Ãi:\Øì5'ë吕[Êávpr‚š(vɆóÕïV:4ñ·]n£,�OT'Š—ƒ‡e¬Ûå&Ä:Y{ªÎ\ðJ¦ã-Hæ«S™ ãñØù²{¤9, ÿÁÇðð2{¼nÚ9Æ\›cYneŽPÅmôpC «l-X³A¬ôDXs‚ðÙW· gå+0¹,wnV cÈW¿ßàËð»¡œÖøGéêFPã™ý>(ÌçKH…í͋w?¼¡C"gÕa^Þ͉Ø$\_]¼5†],åÔ-27 |" ‹ë\_2\_|�—/”. YŒ½ÙæÒ]È5'BÉ@ÊWƒ\_fyK‘ÿ ݬ|uòÎ)óÕÃ:È óAp—KÞ#Y=ˆ„ËëpF¸¬|õ5ÉW·k1uÉ|5¬|å\Èñã÷\\_ù{ƒÃE“ß4Ì$KÕæ±äœabI«…é¸#¼ðJÎIùêvÿ|µ^-Nqٛ\_'ç+¯ºØA wV¾:e¾º.+\_}>ö¿[îSVQæ;¢ˆHòJ:¼ä+ê(NÇ6¼3ò^à”…»±!œì\·Ó ÌçXì.œF(éV¥CB±Ãä!’óUf¡|ɑe@o²ˆ|÷éÊãöãÜê³(†Û˦|½ãú€Å ‡ÛqX.Þø¥Ô!Oéù\ß Ýzã7Yyœe±ŒP¾ ka˜M^¼AÊmõG—ùê;‰µÁa„+2xÛç¤Ó#"|9"d¾ò6ö>Îþ@æˆH?ŸòéÔìþP¾:d¾Êˆhôp8’yË7XNËý–œa"/¬…]Óç‘Êë‹\_»N>€ó‹"´°»‘™òÇùÜÈW/—8þ¡>ö0+ú‰åòd\\S¸ÜÅNöó¡ÀÍ °›r¾º½¬“‹?nwd¤ËçtEÊ/"†&Ãz±Bk°ù‘µ†üžMºŒi×#üÛɟóU7dËÛ7ä+WÁp¾ê­.¿#]c¾F¸qN?1aù¿ÎWÝzµ8ÅuBþÊ tüùåi¸¬ýÙéhNϋ9í~¿Ìt#” †Ìu<‹ŠöBåÉçÃ+ŠÓÃU­ñ'ëlÜ(•n¼f¹½8Úx\~tqryÝ~¶ÿz# Ê cè^þÁG;WxWgvT_Ì÷Zp¾6ù½H~µb l H¡ÈHë áÀnëñƒ¹–𹽞èh"&ÚÍCä4"í¼u»ÙՆ— zȍ—ƒ¿¡’ìá½Ý°EE:›eª<ÎÚø{>Oq1¬“•Üu¸N9q ñé2¤¸ò¹Ì"–´ºü^Kó|EuD±NLEXþoä+GÉ©.·ÑübÿxÍ.ç©/+¿]NIß0ʋ¹ìØGì\§}Ä?kÑÒOü5“ËáGÚº¼ü¥hã¹ÍŽ£b‹ÿjÏgÇi5]"Ôç‰�æÍÑÅ;’M¦‘ÍgU:ì‰^~'²ð)Ãç ½¸YÛ¶­É"¨$.æá÷·°ÙÝQ>ì°§/Û¤•~Æö…W”Ûí‹fqÜv;¢Á¥¹d]Õí”×Yù^賅M8ƒÙ¸N±XPkGíò»ø¸a°1±2Ç-ë¹ùìkç= ‘‰àTŒøp'áó»ä†çrÛ[´pñåjáƒr°Ç÷>žüAæ¶hq8]Ð{‹tð—X‰…³ê0/o]áï$±qbk´yC֜a¢l¨˜å}„—/ÜÛ]>€ó+£Çaø¼>›Ìí³{=‘^ïÍÙÃì .†Øòy“w8äû¹Ç‡„GAp{ùKú¨(¸‰…JïõF²N(zŸ·eKo¤ÛÛÒËß"»Ñ;åqʃ.~¿Å6ŒÃ9Åßyù;�ÈØ"Úeoú±Þ¸B"¤Q–eyGEÊ˜¥S3"lÖo,N‹Øfц(Qaø 1™™-|(í'¦",ÿ×ùjs»N}yÍ/öO£ÇN¾ü ' ŽH®æô¼˜ÛˆŠæÜõñ{$V@ßÛáYLl¡Œá‰2äöó×nÇ6¼Ÿùýî–ü?<ôù"" ÔhtñÎå‰ðE#‡y\_ÄFÜFyÜãˆáÁsl­~̏°8†Ê€ÝÞôpÈ+yÜQ‘1Õ(-T|wD´ÉéGÝä�áÑëhåw·à/V=Ѓ\_J1»~´èã:+ϙáбÏVŒ@ûܱöÈÈHw/ØhX™÷V։#ߓã-Ç̅©‰À,wOʐƈ‰qóåŽÁÙÐïóbþ?ùDúbøƒ m‰í‰‘n¯Ž-Ç}ê" J@wø 'é²ÃÛ»?4lÉ&‚[p$p·ðƒ>ÚÇÞñvµ#Ù">”3ag“y" ¿/Úá}\tàa>¬øËgcÔDìû|Îuùüsù}Q^?lîjÉE†SFo鎈ðû£¡”{yxÄÆú[xý±~·«¥Nwú¤ï#p¹]Pã”ä–ÿ×A9,˜VîfÿŽZn¤WHþ÷Ü.œ ‰M~½ÅAoñù=Ê&¸º\abIk·}\œòÈûÿPö%�rÔe¾uô1}VuÝ÷Õ÷UÝÓÝ3ݓé™éÌd’É I8 „KäˆÜ @XÅҍhÎIÇ®‹»ëseWß j@\‰èóT˜ÎûþÕ3I²G}™®®êï_ÿ¯¾ó÷ý«3‘1æmà4ÿÎñD^rtäAÞ¸ ¢ÞŠ ùwŽ×Pª‡ÆfÙç¨ÅŽCÔÓM5xUP É¡GGa[8 v T†ay&ÁóáCK,¸�CA´JðŠªTj@T1Ö-!ßËt}ЍƎÒ0Æós@pî¹ã1“€Ô0dj^‡z®ð<¸1„'/ÑÐE , sPÃ�q) ë,¥ …U¦ôS¨í¦‚aZGŃA}¯‡3ùù?ªÐ Ó}ƒ ±�ø!…Ü%PÌ0 ց襎}F ˌƒƒÇûU£jÍ!¼á=Lj tSU‘åÀ#€5Îó,'Á=%Xšž3LNN°46�ib\”¾8ø›×�!¼Lq1ðE˜Uþ Ç{þÒUêØ?–ñ‹CÁ÷A_Œ¡%” €¨·X�DÄÞ dH s_·¯ÇÈxo<ÈKé<%¼ ü‚æß9^û——b Ùç¨ÅÞN=O¨§¤ò£ÉU…óp‹–˜å1ô™åÈ4ãñ­ŠÁp„в}d‹�ôhãx‘cE1ç•Yr©Èʜ×Çé0„q‚–PDㆅ\G0’7ãÅÞçÊvè˜IhÔZAÿ,‹V(Ìh¢ª‡š%\P Ã2XQ€c¨�¢ÁÓÃD"P‘~u}t\_„±¼ªŠP’èmóOCᖘ • Ă"J! ¥Eˆ?À׀ÛèÔVÝ̄ ¬…yšÊ …3"¡rLjR‚ŠÑ07¶,m6X-¾«µÐ•ÖvtIJð€/A\&Ób,4ê ®—qÑô=êu§5øet°šE�õLœ ÇD^˜ÁB�F8VåAx–…\ †\E‡�قM Ó¨—ãD8G‰œð ó¸¡+¼ ¢ñ§Ó¢È \º'žNl[ÐXކ´ ¨>n@ðl/ÑÐ @Ž‹P:PU õ "f [½ð¡—÷JÅÃ1ôœÛ[$ƒWª·q¤˜@Tî!5d„Ës¨Ç;ÇÉyG ´%&¤Ä[C4ÿÿQ\_‘——ÞR?‘}ŽẒĂ#)1O½úÌÑ ùÑdLT7Pì‚ÓB pqEy}f'•^¼&4¯ /^öY^¼& Ž$ :¤ ²!R%V×(�ÒD8Ú?ê£BR™„\i¯SÆK½+ÎOà˜I�×Cw›H(ŠWp_ˆWÈՒÊ�&’…Ý‹×Dò†d ½¯P@¾êªûH¼z}¡´ ^QςÄïÅ«,Ë ­H"j�@AêE$Q¼x 8(0Î å¢ÔÉJ2Š×(H¶í¢„%́nÞ]¼Jœ÷ o@f'i�ö8Ôö%ØÜˆsQH\ ×ÃMG-<¯Tt˄„DÏü=9ç™�À!.¡ À¯ðˆ 5@'[/^•˜$H½x•"<§ ¼$Á{ˆWiA¼BJ4Fð C¼²èœ2 E@Á±PMÁÝA¥³#¨œ$:Ž ³‚#€CƔCÍ1tÓ°“(‚ nT àE8Fñ\¡Å\l›‰ãÄ+ íHË{ðêE!r".I ‰W”s¨Ç‹8=>Äᵨ [bä·5« ùÿŸxMüD-$dŸ£óˆ9Bp$3󄂜2±MÆÆ Ù\_¢Q/ÉQ^ÌSè³tVÇB!Ⱦ¬¡´ee´L~´ÏŠB«"³Ž(ʪ(¨j”–ySV!›²¼\"Ï8¤Ù Hˆ†aáVѸx< êØ ž,ÃxµwÅùï 3 ÀOЫ«™H„³UT¹Z18ÀDš W“Á5 Ø¢¨&eÖæypiÀr††¢|ʋԭx}¡>º’Ň®�± f2ÈcÚ¦±\…ËÒ2Üxj+«Š\Jn| [Tfe@Å�†ŽP¹ãU €+À–¦Ó,"6¥È‚ þïfS…4Ú f²Ž¦q”hŠï£LJˆÅ„ ®—qÑô=ê}]) ý­Lƒ¬2«0ª')’sžÉx:,²¶ ü†„ˆ¼Ã pÛZeR%5,Š‚È«QY0eIPÎó¢¢R¦˜pšh/ÌÅ2b¢†]u^ÓŽIFEã!:U•e”.ȼlˆªœÍʖ e�fÓq–v,› %Ù^¥¸Ü¨œ (¨ª†C² ,M'ÙϨãÎF: A×òV-Cáò èE†c™\ï}õÙá2Äîñ"Nø'2ÐÀÐ^‹Ê¤UN{[³ šçx #/9.-¬¥4²ÏQ‹yÄ!8Ò¸yB0œ’]ȏ&ããŽ#'ä„Ê@ã3@t³ >+”l �ô¦–ŠÅx-­ËÑ6+#óYEÑ E6Œ8«‰I͐ … ÙQD1…Þ Àe£(ŒÀEÐ8@Ä<«€… n‚'k0Þè]q. D™úaènÞ6²±ˆ˜6LP=/ñFRŒDc–Æ ´ø úÚ´¢9O‹b<.}A>‰‹i/ Pž5¼-zt% š5¤E¼k´2�Dy¢ÖX>ŽJ¡ ,FEJŒk¼ 8 …3yPư Lá¥X¡À#ó:úk~0Úx7›)ÐɰXÊZ– É�‹—BŒÃÈ%S \§x„¦ïÑüš$Õ�‚G5^ç OR$ç<˜…\|Z~GA$BþäeÀ¡Á‹+º0t3ª(²"qMNjªñ'ŠpqQHðQÚY°&îýh‚…Ü çXC±% tÎfQ’P$UÉð†¡iI¸)Y5G1ôRIKËZQƒ.æÙ,Íó¨‹B¶7€xÝ/ÔÈÁ(J£û¡ü+äøø±[¯w�Ù�r¸°·j‰²–ȉNà¹>ʎxkÈþçç˜=^ÄéñEàÈkQù‚!X[CQ°¬wŽ×hª‡Ø…„ìsÔb GŽ,qžzñ®ð ùÑdÉ¢ˆ·RXÓyEŸ¹Õ™ PLÆS´hF©hì(n£(Ó4ł¦™¶¦Ú6řJÆ´UA[$‹äž^ØÓ;Ø;ÒËôŽÁ¢ìîóqo ‡—yt„GA>Ã_Á3ü³è-0ÓVpjÅèp5†¢î”§ÄL|QÔÏÎ\0:úE/Uˆnt ÕÁOS]Õ;"Ò¸z¡,W†¦´˜Õuúc𯵮\~§TŠDJ¥wÊåu(=Zý«TTã%F§«J\„c\9î¬ù+ÞÆ½˜=”c¯,Mü‘5h‘ÐY@ñô6DŠæH$fö‡Èz&n×¹í.‚&‰Î\_'º Ã÷ùRÒ€ÚõŸ“ Ùt:“õ§²æ$ee榦T¬©IŠù“±( 6|@¶ˆ=XíJÑXC ­Æ,P+%\ÁΓ3V|¦T%ÓXÖlDcöh4FPV4‚"^s”ñ QΓJ&?ēðÿc µG6˜ÍœäòY.çk~a©tkˆSùËÖÊ,ŠžE-‹0ƒ‰Ã×é\A/ã‘ÞŽçJ ”ad7ðÊæÃ åó>Ñ̋dã!“梑=n¿¸Ãȓö‹òñø 5/±ÅL¦ˆÒRkk^Ú[ڏç]IÅA,F|BLdl"\�#”˜í<ÇaýM’Ng,&i1-ÙÎ×.äC¿“ o àAÃû$Å. IJÑuѽQ&J.qªR —¤PL% bžSUHÕwA4)ÜÕT¶ÎPŽ\_oRωÚ7ù©táóĖIœ¸Hv›á©S²6#ÛC )ë%‚i„PÕ½«@Rˆ)“Óᬞe¦ ìvèÞõœý‡?Àُïn< =;ÇþüÇCGžÚUéN&×uÑ ­Ýþ'’8ôO[\ÿȟ —J·öÿþ;Û »òÎöÞcÈìiœ³à¯˜Ç±V(!õÑ|ÿ=�ü;ÝüØÄ/žš“‚ˆab ‹”…új:{3Ö%£t¥w n/¥í œàTÜ^ƒ9ɾðu¹ã4x::9]uºzæBÕj­Še€±c5T­Ñ ²“rïj‰AˆÕH�jY¬Wôˆpí.Fƒî%:;q‘4©ÔÌ»ƒhV‘û.&Ãu¨-÷AfØRÆS2c-Sµ…üM¥1a ÏÈ®ù¸·m‚}•«‚•Ø›?~ŽyïG-Ɲ~‡&ú^Á]…¶gÐv5\·S £EÛÍ´½~;m·€É|Ñ7Ë@îDzh@f£ÝlÐfvÛ=‚G<œO1Ÿa· çåü\·½A0¸Ò¢³q”Z,‹ñ/göÛÌ&%Ö±Á÷»Þ')ՀXÁ®„Ýšýþ¶jÈ­T³JÕVõ?E˜!“Só7éá>ý=Òë&½ÞhòkMf€ Án0CA(2ÛM&³Çë%ÅU9³™L;›™!°³&Q@ƒ¦ÓZczî"2m™6šb¤ª8NjŒ“ã0EU̼ÿ¨†G¹|˜¦X‹ÀÏ×Ñh°r#Ñÿ~Tõs1t‡;z‰BX.ßKRAMU÷ðXºðØí¥c™¥c‹G”Æ:8H¬¦ê[H”KYµÁÎ]œÇmöút& ‘ 0˜€\_GÖq›-ÐEE¿Z‰›3$ Ր¹Lm·0çk“ük„0мNŸ'j<ŠDœ72ž� 8³„‡b®•nÑ(i5ˆwì¡G@l–q255Åi­N×Ü<˜I£t̉bVD"¹Äáqmk“-µ:“iyŽ µFŽö‘ö>}®>µ,{“˜™®ÙÀÏÔÙ>»Qó6¦u@܌UŠYõÊkʜÒúÃ8ö ÖÏ~�¿B±ïd»U’©O–’8ö—ÊeªÀ:þ<ÎåòÅø ĀðZüQå� •Ë5oxö1<®9:gO!Þx\c0-ÛÜ�š9‘ sÑ £j»KqÑt@GÊíp¸Ü~{PQæúSUŸoê6.©ª»¸2… –Tu+3Ò JU'¤2gèSÕYE2ß\n7É[HˆÝ†@,àñ¬õlò0ƒÈy12ÁBÍ,› ɟ·›ÆcA4ª­ú€Õr ×ÄÖÿ)ÑÛôVJEÅ䏹Ôxž¹t2Ü+4̭ʞ‚7NúƒGh‘etæµÑzO¿÷ð à]ÙÙ¯°/Ö-±éÆì?ÑýÄþ/Ý¿ìz¤VfÝb ˪5~ÄÓþ]±Ò¼ÎŒÌE íŒ?gHÀŽ9NotzV°ÙI=[›]'°Zƒ^²Xµ­ÒkíŒNgÅóÅh4,xþðÀÈ·%à'ÎÈþÍ:¸U÷¾ éî%‹q²éRÔ¿¯¡VPÙö„9)(!)Uµ€Êä¼´óíb{¶m'i�´Ãöö2ðòYú91ÿ 6G?Ïp9Hhýy§­–cQgÅCaõ;]4 كÏôù=Ÿßï 'U&6[b–@ ïÃX(äó‰Drº´j•Q8ˆ§ÉšHF’pXšµbžÑxT©K§S$XOɇW›Rµ4ÜthÿÝ4ž:†2­¦7©U¬$@”;K7T­ ‚]=-ô¨U£ˆK­ÃÙ0ÑMç^×½¥\^2ðÜÆ‹1eì•.¹þ¹>Ìí¹íK—¡8·\f»Ço@'Ý·�Í^xþB¤0ÚðÓ±0Ÿýã“,Dè\Å� í°›‰�²XRõsÔú¥êÅú+˜u¦ÕëÒ?ìÛÿ^ðA‘ÃÐÿÕª–ðjUKp-ÁQÓìU-ÁNÚw9Ò>(·áƒIm€!ºÀç\WÐd ¿“=u5€¸ßî­ªë°A>vÔU€}\8¨Q­¥É”Ÿ†RÕ´9ú\u= q™mø?Aþ›«XÿM8ÿ©]U¬¿ûÆúcO¬?‰ð\_û{å“Öiÿ;¿÷„_ÏSðJ={€©x A¢?[Æ&¶¿Õ Cá€a q®N‘,_ ö@›‡±Së9·Go2ŠN›Ñj×j÷ißתµÀ.Šb0ܼ7È?¨Ï°Ä&drø 'T®E%›9•šS™‚ЬæëQɄô&Ó ÐHrüýn·xHú€¥UO¨Ä Õ)ûÑÇp= .N&¯;õÄ˾Ôt̬&AÅg|r>¼oÕ¹ó.ÿK-bëµ;0çóbš3�+pƒgäx•ز¶¨/™ |Q(;g£yì1ÚYúyæÙ|Ÿ0ßɛE1’ç©· >0‹nOµ…œ¤%ÔZfÑ.T?ÃNËyúY¼l’½hYo_ïbVÑm³9¸! Ý¡=j¨¶ÚB÷øÿ(éÒýŠ>¬h£´|D½0é&O¬ÝžˆX(‘­FpSí;þúÜÿòÁÞ½06öéûî~çî¾û ½ðôÊm•?VÞ©Ü ¿ûXå·O8Pù Œ$y~9"K0=b("»¬† ™ z=žX%ÈrCÜfŽå(a"xõ8Z{=S­ºªÎ¢“‡º²>“ÉsÎoag¼g¡›sٙ›Ñ«eü%¿Mä0æŽiø¨ÜíÃѼKô’ î7•ÙiŽB¬Î›m#èëæÛ¡“¥¨jXNÅ©9Í1ð ILx¼Dµ|ü)ý=ú=z¤c ´3¬5™‰úøSªŒªG…Tô#ªŽ†53ž2É 5S„›•È6;fÀ’;ž­‡¸‘%£ÇåáH†æ ‡ã&¶<3‰‘¾'Òj4ét³Ú‹ÄsZ éy›™ÒÐmfÞ )kZkº×´Õ´ß¤6™l/¼uë´WŒó’(½/a g7Æ!õ)G½ôg&‹µ–¦£æœPEáuý™ö÷O­~Ž5žšß»ºjÓa¶ÃU§%­NKš€][£¹:lʁ$MK“VM€uçj8+S½TE+lÛr^¹¼eð7ô¬ÃsõçX.àý ðŒÓl?î¨<Lîx«òÃúdÅtBÖ÷dzU„C²ÃS°–´%A…Q±vdÖãÚi”ÐH‡Xg4êua³NËÙh3‹e¹Ýb±ÙƦ =¥Rej„Wò:˜Ýõā¦~؉é�ȇ@ ‚°O»]Ôií:VÀ”î•r5PÐú´Lœ×ëÓÛuP‹B‚W—Õ-Óa½Z�€¬q­,‹Ï?†Gºš‚Ž8ykÌÆBøc]wVÅ¢øûš46‰ãŠFËwii!¥vÈT‡©a=64ž‚Wüh´TzÝ2£Tú¨TZX¹µ²uq¹üA©´½W'SŸMÇêÊñKkÚÒ"ŒzÎÃóZÚñόîçijÛJ–Íd#Å̦ hµ)±z&S ÓSòh¼™jM’%ñq¹ôPŸ¡9ÃF«9 V©2šô ñÕ¤pÅ fŸæ�C›èڃaäÀnF�SåØá:Üùœ´rGf4Œ]™²Þ,c.eåX Q‘ ûŒ+²kRO%¨¹„wbªþÜ'n?+™"ôŸ¾vñ91&%šóK×\RYNàe2U‰]péªo?Eút±Òcžì÷íc4í11&SֺNJ¬V°bƒB¥9$¼XV€€U±íl¼lš¡›ZqF‡S±bÕ[OH©ÁÃ˾tÀ³ÄVݳ÷ÄÊ7ñ·¼mÑÏþ°ü¬“Ý&‹÷Ù5gWþøé2¡fcLôg<çÛ 'G´@Ô·h3®ÌuõӁ=Á=-Og~øEð-?Ëü¼aÑ TÙðæ-µ8…”èpæ[ÈÆO1”\_Q¶ía"Œ\_•/Ä ˆZTG‘-ìÕ3ì3\Í\öNöNӔdUƒü|Ëï±mKÙÓU§[.Q]b¹Fuå!ôQ„Î@&éìt¹bœJ¥ z˜ Å8àRÅm›ˆ‰%ìؘ̐æq¼Öjm!™YG2ŠúBĞ3Æë賎@•µ5íËõ ek­•W­i1ďZšÌ܆IMcFš ´¨¡ªŽPi&sZІGçŸ|œ—aŒúÝræ†{֜võ•·mÙ�ËëÎìݲ¾àIìYrÑk£ë|ßÞ2sá8£i9oà¤î„öo­~3lŒ,–W\²ñ÷ù]-Fû/Ç|·–I…Ù€$“ @àgxÖ/ÁÊX³ØÈ@X£yA6Fóno¼ÄæðÁ¯}ï™Þs¼ãcÝÒiì!ëyÎPÖ8DjË-!5ÁòkU›±È^qcuóŠC€‚…HŸî¨t|šŒœ±×}ÊÕ0LB~Ï«ïT>ÜöÛûÿ¼éë¿ûÉ}÷þVÉö,tXùýc?ª¼_}ð·¿~äž×^$³lþsñw(‚2§Ëº²;°6Ñ©$;ځ÷ Ba²#šw’/ô½8ä;Ôòό œúZ¸x(qœb VGT–UÖE&“‹%C¢+”[ñõoPT·IÅÆ2™YHõcØZ÷r …èòh­0f-HñAþ”6BÕbaÞtqÞ¤ «Í£»pãÊG nüê†5ýߺ²³ü¥Umýë¯ÜrDo—ICYw¶p"†æ¦%ó;_Û}æÃƒkh¤sÑÕÉÔ¢X´š¹Õÿ}é/ôµÎïÉíæÛ­HmÖYf·õÜ·,¯4ǵCŒæÕ=mcµ?PÝÓ6o¡íx¯Ö+IFµP›™¿=)È:àãrڕ¡Ëaæþ^¯G-Æ œ1c40²F¯O²ö=vd?ãÿ+à ñ“Ñ“õl čWšÆÕ1[¿x]¹ óÐÌ~äÒ¯|G&l=»qي¯æ GÃÐæ¿žÞ{Î%ß‹Ùúé·ÞsêÊoßAzôvLq§aŠ vy¡ø´>ÞçJkÓ|څÿjmßãÔòƒ®%€{@€.]“®C7W;OwX¢]æ:Ýõ€†¸2Û,NÞÍY4Ú Î¢AºÜœš•î5—× Q0@ë°,÷ù–»}>;psnŽuAŒi‚,&œ«wiàM0 Æ°ÆÆi9ÔXœ® ~öhF4k5ŒFÃët¼ÛÍ;€ãa–\_Ë#þü–íªHYhÆ9\Bȏ‚u°,¡Þ$5Ÿþ£AOc<·8׳Ì)3¤†Zê$5¡s2Ty] {å÷°q©ôµÊXåu¯;!@¹ò—E¥ÒWàEðÕÖ¸5ZãO34þ»Ö¸%†æÀ÷ô‰%{5–DIð_ 0¶Dóº2@r?ð–˜CP¨˜Ç©Õé˜,™=.÷’ü§ºdºC¬‘A,Ä; ˜Œ±¾­¶qMPÅ2†F£E ‰à†nwÒ"J@€ù«ªdÜF·–¶L-=n,N3ÇjíªÁ¤›4¨[¨AòΩ´ì¤ë.è¦3OM¾€iù¸¯\–Lm½‡säÔsRÉ6U÷Ú ‘ “óÐÝߘ­®¼†…J‚ÙþS¸5™ÿøUǰì%xtq¯9ʼn˜®³»Ì4ˆl$LÅL6¡fqÛ ±†óQ"»÷Ê­ø–v7«™ù¹¯�¯Ã£r¹t~[¨…1„ãæ¸NƒÏÇb^1”Jy 4FÊíÏ R«=^ф÷$º±Þwã$Ì×¢Ø  ã´ê"¯R±®©Õ±j‚:+ ƒÐ¨iڋbÑæ ³åi¡¸¶zåtšxYùìÇõ7[“?Yü–dj˒u?Nؚ-{üìòe-xñ—ÿ‚º$o¾Tyá¡ûáɳÊåY•»·Üg®,|òÚC7½ü"Éà�›°ö}!{\_͒ n|÷e¬‡óî³°£uö öÍvÆN¼V µsŠY¶n×¥Oˆ(O�Õ'ìMíO!9µ2µ!Ť°8þå M“OUž dIk­eIS¬É²Ý¬oC·÷ßX“LP»8Ly©‘»ij^5Jôj©þ†0Và2í=íƒí#íl;ÆiwՒ™6f?Pj4üº^£Xï {Ü?çàtp”ç ͹wæðsÄ9̜èü¦òMg7”P ßSªÿ%7°7ƒðޟ—0 çQᙉ÷ ôÀ“J’EZ6­êÝ 1¥7)xV]ö‹ã¯ ) o-Œ… Ù0›H2Hš6)“Êe;£Óh%³äF­­°•‚c譝”LF‚n±¥Áæ‘fÔìé$›»s¶Y«½=<ÿ0­~ûͧzÆ1§Az´ø êVN|žT+Ag‰VëkÌmVY¡µÆœUœY&Í94þŸ \ø§Uýý•gVòl<‰,Œ#ƒhv³JÄÕ¶ÊÛ¯Þ³éÛ»Övȧœzþªûáã•ï)Ë݇úÒjÇ\_Z¡å/Nm²ïÐøkßþÑO¼ÐܤÖÝwáE×Ð\¤É fTóZT3f%Ýcp¥C6+1ßn„×6C—häòÚ±‰\_ïÄ{Á>6qx;Òáö!ù4dš¥”Ç"™}R<žÈD{¢(еU5T«mf³Ç ¢„äaô’MÇ0 ì—B’ ÷fxÈñ›°„“Wž÷d€ZÊ8 ç:2ŽÇZÇ&‡ÚA>r¸[6^D‡O¨ù4¥9ø VžŽôz2µð¶Ã–ae [³%Rœÿn=Šî¨­–ÍZËÄwWŠòœ ?¢¹bÜU ¿Bæryü¯ã?þÉ=¡©òі7ÏCëïö@œQ¿ùՓž¼ ]O·>TyíûB¼õð¤=[~�çÞØY½[n[yã¢÷Ï©ç¤Þ"Å£z€)ënx¢Ö†Ø$»Ìɞ@~]йlåÀ)tÖe2�¥ µz7OÐ'¦©îÁíðLƒK¦dˆÆÃhzšáÌI³Á2ûuMQrF"gªKî‰49“gqg¦?<¼y<‰ d˘$-”ZZ´|4š–M(l:­6"Y,N‘ÌfgNÚÄBV6qyÖSôK›œÐINwar^¦†éÌ$;b¥e1{h)ZE£!dˆ¿p©8'Í FòãYèÔS×]ì-|ˆàNeЧg c,T¬¯ï^ÿàÏèï?åÊG=§XS‰öøÐéçõ÷£³úûÏ{ú’[Øîʂ§o8ÿþ2%ÇV¸=‰ËåŽK-ßy=F“ƒ}T¯YsÉùdTHm¸—ð¨@7|}[¹„çAél0çýd$›,ÙäÉ&G6Аû€åˆed,=–}˜+&ª^AŠo‘Á‘¨:)ñö}ÁÁ#Á‰ LTC6¦z(ñ!ö}¹¹#¹‰[©ù%¦øm8 ?¢ŸÐ3}~Ÿž©ûþ‘äq˜¿nO·ÔÔ2!T,HÙp(d·¡L6«ÑjãE_Qȱd¾ góxñÆíÍßSx¢€Ö®(l(°…‚ɍ:¤}ÍGϖ‘d>b‚¢)kB&wÏÆ³”œQ£]”DF1ó¦faTý(|«&^VÈ¥Þøbÿˏˆçsˆ<Àà߯rÔ=œµl0Œ¢dGP¤²µ·Tz£T(”J?#އC2V„T<^õÆ/^[9«\–Oøçú›}å T¨?ÇQ9ö‘;oܕLnZ¹ì›TcªÛ‰©®Ê²?ʾnû§yÈm"/ëÍy3ÙÉÆ Áã¼ b•ÎjN£öˆzƒÏÒH@|–ê8þ€‘cøÉÀKÎZÌfÞ7#„G„ð9 E¢þ \® PóÀè µ3H‰£LÓÑ1©-7–ÛH„VcP;#&µ¢.©—R%,wt»¥(åö”Õ¢²Hœú 5R{䔻göÚZÝùt?ïz›§¡>Ĩ_åUÓþpªkØM\Ÿ#É?×[­:²¤lEC½ŠÈgÖ«øLùÿtßçÝUêïïï=çø™ÏXeÿ[²_È¢G[œŒ%›X¾ò¾ýÈÕ¨/ Ú¸á˜ÓHÔIéŸvØ34é¾CX\@|ë©´ŸU•ö)Z»‰ƒàÖÁ÷™AE0Ø2RÑ?³.EØ<ñûŒÚ‹ïŸOïD¡1†¼·{7ìéFÝDµpyH®œ½;ýb¾Û46ñ5ú´ÞɧÑùœRù=õ‰l†ý۔ê<}ªZ˜G)þcæ9X/ý£¸'êezŸdƒ?UuI–UþŠFÃ!¿i’Ë>&¥f•Úƒ‡Å¢•Œa§’C‚w¼Éˆš0¤T[mÄì#b I÷؟°£MD°“=޵”µÉ¶Í6†³ ÚFlkmûm\©Î“ž¬Î3J+óŒ×ü·¨€šŒ.ËÔ¼zÆ¿°m䋳œÖlè(^’Ó9Š‚nð9ÔUY©¸I()¢Ó2ªQÇɕ‰Ô¤Çä¤çäoûäé>úXjU}ô·Ÿ– · ŽÀÜ� >=q&íyȊwŠ.øø½¼´Ö”µÚ?Ï0^­ògÀ‹|ö�¯Å#D"EQ±¦î‘4>‡ÈúdßfÃù}#¾µ¾ý>•Ύؼ‹”î'ýª°ÿ”¹NAAŸ‡0 � Ã9Évk‰a!e¿!«ãÀo?|ñÚñë•üø/À‡Ï¿ùÑW+¿doVB6}ø._ÇïÍ#˜Ë~’Ø÷šü|›Méá·´2ßfQü½¹‚‘ãLF¿…Xèp›)P _EÌȽڵ|øÕP/©M’ÅåX-H¥ÖÚ¬n�Vъ€uÈz¯u¿õ õ}«Úz¼Q4Àµ†ý†÷ ŒÁíùh7žÿJv×a¥ó”°:švø ’çTŸÒOçX¬¥y†/ÿ–·Tú Þ3÷&Sã¿\T“M•xZš‡yWq¯DAü›'òJ$Èdp ÃËqgª—eð6IÐã%ÁŽ,žÍ†@S2Çæ•˜uŒ¡óåfO"°Ò»Î‹6{¡×«¡DÃ#Áµýxš©em“†Õ¸SÄIO«Tæ Ï'2ƒˆÃ$çpULàNÊÐn"9÷9”ªæ¿Èۉ)hºl§B ¯ YؖOÖ¥6߬[fœÛßτ–,I{©ñ[ÐÒ7{g½›ô"öòÛPæ¢-÷î¬^•··^μ¦G™�8ñ1nÿ ÷äɌEîå4z—>¢ªzÁñA×å4©šl%UÉvLŸ<{Ö"ù„v©j©m¹}D8ÉyRôöá×5‘'ûüv­ÅFs÷n·š”]Rٝ¬ìF”ÝbJÙ iÙVhÅ¿ü{þ]—Ë6{>MÊM†lÈ#wà}SuŸ¤{3ÉúCÛ'W÷ô¹vüÁ r×Id³œlVœD(Á°<µtùò“–úWŒœLÛ«RÕª“¤¹‰¶“©jLDº•´·fR¹L¦5çOcôgÚey&†"·ÓŽÓNÌê·ÏšÕ¯fـ³ ‚ÍÑgJrÈujÓmj+,ì?a–αHړO’Vx¤@ÔyÌisyÄÌpx7hfÌðDIÛ[ۊ@ggsZ«Y±8T(͔Ù'ÌZØÏÎͱ‚MÍòQgÈÍú}r8–ï#ø§O¶;ó}¢Î˜ï›‘s^ÀŸÐ=þîí²?(çð5ޏq®tp>œÏKã=FtÄ8aDÆ^ßüÞ"f•hoƒï}|¼oÈÇøÆN6Æ÷̀܌ÁWÌf–ˆ/FH~R9·5ÇäUiîÃáaò;JËvc!7LÔj‚hë;g™ºOÐ56+XÛZ®® Sü¥î[ªW–ËŸJ/óéƒÏ‹vüÌFƒÇÎÔÄ.«˜cŠíŠ»“2CÕ¤(±ÃYõ¬Kq¦î\Q‡é¦®ÚŠí´tmzã9Ž)mv4ÏXpìӚ„xº0/¾<û¥ã/ìèM8¸õ«/ô ¼Òß/Î_½ž’3ûû{.<~MËðÌÎDs>mÙü½’Cîïe�됫æoy‰7unoç—áE'ü4ÝùãÊo’I³Ã«(úûðo•·b>~ZÎþèºY_îÏMyOüÎw{j~ç­¿Ÿ} ô€ßÈÑb�^ÍÜnÿ.d€h²æŸ =Ӆœ×±×YîfﶨDQàÿ5ñ>0OìÄßÈ^îxìV~gTjo·1ñx§J# \¿ätªR'ÃK\]X„™yÐ#¹¼Çƒ©õ´˜”ƒ×ÈNmPêîµIÈÓk’´DÇ׺循õ†\oDxóV o)ky”šo¬µÞdÓS=hÍB¢À—ˆ/Ááaº\ËR Z´Z<)UGNT–\«¼ºl®d¼©:S1ÐøöÇ?­¼0qŽ+ºæ™g/ÚýXÇÀ@Üþì ß}Æ£ Æu,ÃJ!Þ§·Þðè^C+{Ýø‹+Siná›ç.¼(’Lýõ싿\÷̌»5˗ÀxÇ îüíW=OFógö»˜3Çáܧ’¡‡BHA¶fà‚Ÿ n‰\_ ¹Ä-)êYãç”胮­j­…¥ªfÓHœ´—ÇR ‹$d6™á=Œuo“9ìãRÄf0 Iíñzq÷H<üs8d ‰;' #Za“p@P ž„Ñ€¤”Í&ð>»i2‰»’ÝìɊS#àåkÙ:›ª Ãÿê~ÊÊ:Ü>E¸£ÔT§þ› ܕåòè¬7ôF«ßöf©´¨ t;Yw-PˆùáÇïÒ¸=:fT÷™Ù û4Ëv8T¾·¼·Ì¬,ÞòHù‰2S¶MÜWËìßXý{ Ö´¯”“zFßæÊg˜L[»º”Ÿ­ž“_¢Ö˶K ê~õ êjémLNT}Ãè&ý”Á¨ØäéTÅ®¦ò¹èYš­Ÿ­&ô÷‡ 3#Õ�ù.À";&Ï´j»V«VÛxƜas(ÏUIt@‡£¨ÕI&“ÙìëêòÓQ© HE”hB®äókmj^Ërl±Ýƒ³[ê ˜_g€Ü D²av÷ŒÁò¶³¦RË|:½ëò‚¨å=D<Ù]¥«[®‹OIŠ/è…÷i-‰² '†aøÓ\ÿ¨>uuÌ6Eh°–Á%_É\vÆm—ö÷_Ôd·}cþ¦ó峿êï?óÌþ~˜8[^6|ÊðéëË®dŠíí¼í-!÷KºQ(}s¹»«æ™UÇ=r÷rOzíì^%ˆ…ök¤ª øÛŽŸái?6ñ·A&%C[Usã)‚kÌ )À¿þ8æô ëÌ�3 |jV=pe6ã¯+!w@²"ƒ¤Öh­:3­$éçœ&c�ppŽÀµ…ž´WtŽ8×:§»y¶‘F´®Íûª˜'¾íÔq¤!ø¿ 8:mÁÄbWœ�êÆXK£-ö'ö÷WþÕß¿´rü=çäרR‰TøgçaéïŸ ÿ_xä‡.o²™_1Åøz”ˆÜéÑØŸÉ¹mzDæQ‚6§i%Ôóèq›¹zܦ7eŒ ßÔj]°¶éöî‰=C›bb(FŠ Lj7› )E2ڌîÿ3÷&ðmT×þø½wF£e´ŒöÅZF²6K²%[ò9ñ$!vHI bö ‰¡leIØi¡MJÒRš”­ì!» ²”ö•G^ …פmÚŐÒ�e±ü;÷ÎH–Ú÷ÞÿóH£F÷ÞsîÙî÷žCÈR²œì":BCÉúP Œek~ßhO}xô.–'Wnüÿf'']ÕRרà<ÉÎ'ìP ²8‹;¤$Ž'¡‹ñ%äËE1áz|“õ»Ö;¢÷g°€1ŠÊјLhÕ1 Y"ÑÄʎ…R±h:Ç.e2YðÇr(”F¸¶¾JF"«„¼À4ß´Ì´Ä-3=FKO×öÄ˵ða‚ªºËV>e÷…’v£™ãr¹ÆdÊ ×§S•­‚%�ÃÐ3ßC<±•–bYek·Zv‚¨¥eNcþæ;Õðg|XxõP?VÝzÒ3|êÉÛމ¸WëÀ×ÉY×>ó´ŠtEçáA#©‡- “¦pGgg¬[ñYø¬yýý{úúÚbñÛNr4e‹]G¦WNëèë{“NæÑÓɌúg-=ÛN_2K¹Ä:sñÅäC5×ÛivhØ[ÙjRfóþü±éãsÇçuBZh2æ'qþ¥ö9o„AM˜±L³ÓSÊÒi>Íf{u&ÄkÀ›cë^ô?Ì2Å a·ôr×\žÎb»š=‘mûdiêSôÑ[dKÓ)²æíwÞxoÁœ9 óöÈÈÛs]ú×¹sï»cíÜ­/-ÚµeóñӖ¼óЏÞ[’Î5¥9øøÐ;KrM8“ÅŒËnXù¸ÉôøÊ+²KxqåüÅ0G3X¿V«eR–Õ¨ Ŭ>»˜ÊfR©¦L(¡æ½kIï<vîÊÚ].‡=䙎[²’Åb“Bb“,78’žD<îõ€n´%E½I4Dá ¢Äq“:ê·è»§¤ 䂡°]bûG=t—ÉS[}¡’äÏÎÙ®EŠöÃkkÎà¿ìWwïÐHï¿N¿R™wV?+ÌË=6}zÎñÝÆîî“ùZޜ©ü~r|—ŽzPádõž¹EHŠ6føçf¯äsíÛH€ñiLEÌ2ÆY¬jHÔaÑBVЀôŽúœô¼¦!svÞrji) P.›¢çG5eYeP'ý~ Ÿ´y#^õæ °?åHÄj!©B2›3P8¹<tå3hs9Ãúå<XjXkà þÖ)ÛñoPm1P¥ û Y™õ €ƒ#þíûü»¤‚É…³(›ìRoªóڏ;kÎMëÏ{ð°å¾¾óŸ¿þ—§Àgg_ߒ%á,íë[„Õqæe/ãS˜Áxÿš‹6Gê”!¦»hlɶƒÇNs5>GYW‘í^ÅÙ^axà„WNÍ¥f–¶>¤éYkõ,CÏòÕ³0=ÓWÏôL¬ž Š(1|œI%BÏ«g<=‹Ò™T=ºê1Ö¨ivTL…¶ÒKüKÍ"²„÷Ix¾ô˜´G¢Å $E¤¬E’¬–#¬&X¥Xଶú¨æC±îÎàL“þS½c‡_Íïï½I³‹ÕÈ»ÕæÆî¬|4ªI.£«¢$Ú¤­S6·ÒUN[çiJ1£Cd.ø6ɨç9#ýK›f_‹„´¶¦ÓdX/Í͹\$L¬Åb"á ;œ†x"ìïõ­öíöq>–}(‰QØ\°¬²ì²pz%ÔV §lÉåÉõÉw“|$¹4¹:É!øL’,· ˆ NҒ†ÕgåPY|\òL\ÞþW6ÿ½3–X�§…á‡ÊZx˜Ü†ÜžÞn𵻛vu}òtW×Bnïuw÷£{»ºà¼yQ½i8yùŠÎЯÐÚzäb%,ÓÛàe—^x¹à§ ¨2´LϚªg1z–ªžyèY±zæ gÕ³6ÊìÞë·Ð³†êYžùµ‰à×&‚_›~m"øk!öR¨:ÌjÛ¾ªÆT5gµ¹pMÓ©šPBþU~oÒÔa[ »¸º°»@ MͅBK30W'ãÜv¥}~;×Îxº«½½³+TTµ-­ûkª)\ ÀKÁM³4•«ÇÙlȵÙÙÒ¢éÓb[›ªRÉ=ü>ž¬á×ññ¬h²Ïçy™_~ ÏóTËZÕ«½Òji7ÌeÊñÖps®+. UhXrôR8“döðòðúð»a>^^æ|&áê, nÌþAՙQgÝ5§-»ÖfÝU×ÿEþpÖ?¤?(¿O8ãK'µøš²Ÿ<{¾‡êÄXä)L·ëxBQFü#ÚjíNE|Ðù@˜x$쐥c{sldK¬Ù–Ô2 R¾ÐVÚÔpãxÁ’ŒÇ7'&õz”Bþ¤Ëmˆ9n, ¬p€NNÚIœ\­[¯›Ö6•?1ëËõX.†äªÐèÁáP•µN×tjk‹ÀeX«K¶Çe2äx¸ýýwþðì·æ®®ÖEøKÜüÈoÞá§U6‚Qt…Ä ãÆtØ>õ°[ŽÓOÙúl MÁnGú±}ŠóGüý6~»À_(\ºžÿåæ±}["‚DªIº²D®)¡NÆÔºIeã©T"jʰÉ(æ²ù\®%ÊtLQoêZ×Eº²]]SCí­ì¦b¶P,¶BíjFT+-E›E@ DóQÒK%GV[ÅÉXÌmœ’ìhM¶û“n)éJ$›Z’™€%ilÊd FCG{»ÛEI“;Ö=-Ng-äͶøÒ8¡oËã+ã|\±;Kñ@ „mK­x½[ýe-mÍÓJýDõّ‰+¶Þ£ý÷8Ùÿ•�…ò á.ç$F¨ i;•ñ!Bc×ÑuýJ¹®îýÇÜüܓ+¹ÈŠîîÊtw¯ ›NÚi>›úU~:ÃV/ûòuÄ8!õk6‚rыŠýöÈ¡"áሎ2Ñïۇx˜sÁy�Uãf'$Æ Õx€ÒÜègKß@f ±J\EôÀo‰SÒ©e|’Õß8G[c©RnÞH-wÔaçÛA†Ó>NBæX/š”ZK0‚U¤Ä•c»ù£ùGðB’ç\_Dè)š€?° ymÞp G[@]z/É3ö³·Ã({àOó€ÿҎÅ~)¹”»Ä|‰åFrƒù³^g¢…TI®Y õ…Ì\¹.GÚFIÍ~îˆÈy¹Wæä&-빺p"&²éD"•5ªZÕñçý½~®¦WUýÛ]S¾MIIò¤@”FhHz¼CKR,&yÑÈs™$ZmÅÖ¥ÖUVÎjµ·&õjNÓPé)=Ö:Óöp(Ȋ«‚%°Ç}¥ÕÐú;ªÀƚ“9˜UeæM¡ÑK'W¯¶Uý°tê! 3ä¥õAÜ.Ñ·Ý-÷Bì퓗AÇõS‚æííR4&àMïܹþ×/?¼áµ×wuý± ¬ vXŒ ÷­ÁùÊ/o|˜|=„Ýÿ¤òþӕ|Œ1æOÌ2zú—À›žÆG¹€f¹¼€¿/Dí5.H)Œð�^‹×cáÕø)Ìa×ì®Æ5?²«;\XM¶[ò†RZE÷?ðÿ‰"(‹îQ‚ÍcKڎ‹~%zc³CwIøëáï…ÿ#üóÈß"úxZ"± óyQý™IRlò´™êC“ç)ÙÜ rÁ¦$Ñ7& "’eß3Éò Ýݧ 4Ëååææ=fÎìÏe¾Y3§Kœ¬þOïH~pt/Õ ù(ÑÀK×'hšVÄöXÒ-¥, [} sŽ¢Ïëw^¾v[åX\_yϺ?Õwß;ou™%W~Å7vڕݖ\_<·åµ×¶l}<ùLåÏ>[Ùÿµ\_=‹¿úêԘÔÚu¬Ë\g~ë­ÿþÁ^´Þ¥0êMÜ)ȅ‚¼®8œ0d­í†.ëñFñ³ÞLg‘•¼S"b@æX};EäóÌ£Š Ùõ¨rœ#ŠI¢;ë¥Z]r•%½ ™Ä¯ÜkÄÆïÉåe––ðs¥eee§E°’ÁŒ—¡ˆäÑ´í¤ Ž‰ýOÔ=ƒæ58J·ðöVÕ2J‡_^mùiHTv»ô¼Û¥‚çœê1©š"NåÖ øØÇ°±²uô×]]Ïý7žòƒÊ§xÙ§«>øË"š2á•듍Ï|˜Éàõ7•gŽöß5pø·ÃH0’~ô܊ç‚1²½Àð\1»º}MœTA·©V<×m ¸¬Ó &¿E¶ ޲ӹ΁mާދw°X’³ä4ø‘l^'bEœ/ҌÄ<õÄ·ÀŸD€î|~¤º+¢^_Wq°TxwüéPÈ®‘zd׊l¦BjÅr+ƒUd× cÍüù0 ¥¿¥Æö(&°t¦ùŒ$¡‹$0ö<[$‰±E’G•¬g [!‰¹Ä”/·•]NÁ´(ՐN§Ê›¢¼(§Rú¸\ (cو¦4M ¢o,‡é9"%[X÷†×„ùp Kʪ̥—õ²~žÓû3َh6Š>Ð䫚‘m”!8U° œªG{ñ0ãæ쫣㐰/…}E>]mò7Ìþñ¹ýýœ¾¯oáfSvôgß$Ù[zg®-ىîêŸãÓé†ÖÑ~oËڙ½Ü+w|8H¶SGeZžÉ¸Ù,jꞆ1>•¬ÜhÄÇљj EJqIŽ•Ú©„£‡^í´»J‚Gè0Î òA]Ðlt›á3®ø¬ø±EOy¦9?ÁµØ»8þ|Ç\_ÛÿÚñA»×Ù'‘œÒJkÇ\hëÔ à-« ÚÊÁ‡£™"·Ì´e¦03ŀ™)Ì\\dzó½K 'ó'À¶Í¾´/écx®ÅsÁ%ûS'ãU'ã“ûª+¶´šB¦OK!Cã2\æûXD&FQ]r Õ%×P]r Õ%ª«l8õ„òIr¸·\žkÅÒñøøh²TÅq™ŽK8 Žkj…d•çIåwÍØ¼8¸gÞ¾ydÞ©«‚X \\‹\·956O…Š™¯dÔ¶¯´©9 )øPE\I¬vŽºûöp«žžÑózò=ÿ§«Á¡ÉVÃDOW{ªIDXikíÞÚZ{ê +} aÕù9Vßr¥§Í™û…EàçrS{æg–,8·»¯¯£Éå<÷ÔsƒSúûÞß\_Ág§3è^>÷”Ìü©åæLÖÓxüéýsúÃî2»‰³TޙvþӃÙ>¥»·yÙÕáÍÏg2bãó›\,ÀŠnz>fÎdž¿®7¶riKo·Ò— N¿àÒì sæµ7ú¸U¨„žÝÖцew€„wŒýŽ¥ehýz ƒ1@ŒQK<Ú¢LiouPjiIÆP(úÍÀWÐے½I’¤×“–aÜ¢LÕgõ±hAoêÅݤ#å]E\\ì\/ãWðd¿†Šçø@Gs9^N/^n&Åå)™ü홪ܟ·d¤¦\Y¶>u/þ,Û½84ÒmW½7ºŽÚ R+°Zí²Š£RmhŠJf u=OƒN-›:óŒWÿ±®²5hµxžùãæ-ÿ5†:ûú:ñ}?º³òbÁI4e¯üÇ£¯ãŸ[mçÏ»è;ƒ%gƒ¸ìKÇ,™—jùQßç;rÿ={vïõ—¯ø&Œèfßi–Ë7_œjR(±–JÍeEa\Ëåö«—<ó,lsÓ]�4¹Á¶ †éƪŠólWAÌ¢&¼‘MK´l7)—Ó)£HÒTÊéB N솲90L¦+3’ÉDBte,G£ ‚€,fÁ…RÎTRؖ6¬oØÙ°»Ah49œ²~@Xìv ¼àOŸtò!S½=õK³ðß;µý)ÿ[¨©É³š[gKŠnw²lpÕ´Sh0Úxà ÓA1US@ãŸ~:¨ø ]büU¤JÕÿ ¶¾LޤʋYߦZ‹Ñ•‹tSXEñW¥WPF±ã§ºñ®n,wãnÅêu†Ç¶lž˜­³Š£ºžp p†‚OUÒÛ Û]d19Nÿ%r†þr /œÙ~«þ~î^ý0÷8 vð´öÐ=g¥?bZ$Λó¬:H,K£þpͳ€LËÚpa0¯%m ¥’¬¦Üz£Qv¸]‡›/‘¾Ëç0ºõ¼mš®5êóe"¨Ü%ä“ålF4–#FSÙjµÙS‰‡›{Üz‡‘×™ýJ¹ç{ËÌØÆÊÄfürBŽ$;Ž¢‰¼2¤¥ª¢¿§Z‹yðjx¥;¯ }–Èz¹ßé‡ Bk/R¬lLj\v§¨ðþ€RÜsûÕQXxüMöõ]X´súoÎ^sδ3èÆæ¾¾3àˆ£pœvÌqý—~ùËÅH¶‰³dϼj.]þÓL& ˜~y¶¢Êa•§ï¾pÛ_þüÊ E¼Ô²Ì¢·Ÿ@ö±¿ Ê21Є›–0H´8ÆÈÏ3ÔT,Éêtƒ)>ÈЌ©…º•Ù5µDóeüw…£"–½è)dªœJ V›•eÅ,k©õx'ÖQ”TyÀ³Ô³Ü³ÆÃ{ü¹aœØp2óHëQRã 5Z¼säóÎ×ɘÇ.¯Ëçóz½>LˆìñҌ^„©’ÅØcÌe³¡²Ÿpœ½ìöSä­ 75étÖ²)žHÐl°(ãÁ¼7'‡³Y ¯‹<!s#‹"§EnŒìŠè"ÃøGŠ}÷1/™ë]ä=Í{£w—Wç¥W#2‘m/K{lûlÙ$Ûrg£êÙæoÎ<¬©gÆÒހ”îê øè©¥¡š×ÿ¬ÁióÙ¦ 0Óy:Ó gúä„߇3æ>‹‡ø ù¦Éw—UžäïP•ݪú< wÿ¤»»Ô§FR¿§ß¹Êy™ìè1d}MMl®£8¼S€ëŠøëèžåG#Š(‰àã)¶m9ƶ-?ºÉF“oÓ«lór,Æ<ÊM.Í®Nð+6π‡HìaÓ|ÌfƉbvI:›mJǚ[ژ„°paI±Ph+ÆZÔL†ÒI:¢[¢e3d©0•#MK´ ˜cgS[g.«{ŸËN¶ÙYhniÑLÁ¢œH/M¯OïLïNëҁv?‘­4òA,þRÿAL„v.ï\_þ·ÿçå‚æà ¾Ï\CÇ]4º»š'vzW×Ë]]ÓITéîþ |¨^ÇwV¶Õ‰÷?ãÕãÕ0š3ŸóFG7†Ò›l“h¬fCK´ô@¿ ç±% “UZŠ5Zªï«Ñš"1)] z}$"û°Mv9e“S@ ÙOW½–ÖÖvvô@ 6yp²ÈíøjýÿA%Ï»œH$nnqÆÄ8Q¨×¬æŸª,d8Kšcb.;ïcTº¨”\5 «7¨úV4¾0Aنø4M JVï³7Xˬò€©!Pvå\[°•†}à“b²G­&êía@+i­ õ~³e‘æË„(/c'kjuË~œÉpWf²uJñ¿Á¼½¸rEO±Ê•ÿädÚð JèZ §­i¹ w[»#\_D\_ŒéëP£ƒ®K ͏ʀ£1 8ú(Ž.aÀјeùQ«\F£ô»&d‚ï.¯e֕AƒÕáEåð¢\\´¬E…q¸hÙ㉠X°Í±,·¬¶¬±è,TY-1¼:¶&Fbô<æo~öa 8:D‘£CRÏÁ£ùσýwq£ gþ%ب ŸŠ—Íéëûm\_\_¾˜º¢¿ãØ&“{Ž,•åm}}»™…s¹†2ï§×/ÿ‚;œûʽ—§œtù½jãpè¢ÊSüqüK¨u£#Ð?×¾¿\¬¿8pCàöÀo…¿B˜£é8,¤ÁÙÆmN¢Ÿ1&¹á$UjX_%b’e/9_ð8nOÌKöæp.Š’åîÅS;“¢÷š’Så%¨”_ÜÚ:3ið‹fwY²§†ñ©›˜ j F¬bÔ@|¬Z¬FõÉÒ¯ê–WÝö%šÛ^uëoEàÖ£XVuû§—hn£ÏÁIŸÏìI‚2OæË™¬)ýHŽK‰e қH,M¬H¬IìLìIìKVJ»e^!¬v {„}‚Nð.Pó^N\•ª7ÚjùFþMðám9Z(eng³´½N¹» 4=羗VüèXp»]ýýg/zä…ÅýýX××÷…/€K>Ôß¿OùÊ)÷¾M©ùöÒc¯Ä‘:Ít]f¶ùží¨qì©Mf»šTŽ À邂o„¾ñôB9ÝB+f‰ÍCߌ1ø&xŠ4 ³ÔTº²8ÿ¶H&ŸéÍpÕ²W#þÌrØáó4K½®YÉ Ïqc7»ÊÀœ1æ|t‹™DÙuOغÁ6)/ç y.Ïþ¢­ 0Ke Et#½žÕ,–¢³<ŽèTD§ìp‚¿(û}ÔbIb$›-Ôb‰´i¾ùUÉ5IN†·uÀIÏ÷%ùdæáqg%óÿg]¢ §¹;ßÕµ¡»»¤Ä'1¡£[àCWWË¢zSr²ð üÒüEà¯.ü‹íÈ«òUƒÆ_þµP®j£oú&2? bÁ5@A’1’„«.ìbWT#Æp’À~ÙOüª/I!1•Þä ¤À®3´dŒ¡%'Ú緓vva%c + \ËÇzc\ŒýE V°¸Æ6)%§ ).EÿÒ®7Tè¤lMUèd¹ŒeÄÀ’ÿ †d;Ì×V†‹”e©DÊRxUxM˜“ám]xW˜§I"W…÷…ùp•«(RÅDª�áυ‡ü?ç¥ûX\˜÷e²Ÿüá ¼„Ö®,ò@ëÜ| C©Gº=äÖMÀWԈ~¶ÅžöJ6–X>l ãçÃØå£6€§ÎgT=—yƼ&,åÆF!è+;]ø,zT\&A�; A^í_ë'Š>p•_)H+¤Òn‰— \ЭÐíÔíÖñ:|nªEx«€G·–l¡z( Rú,d––BÕ鞀‚”Á…ªjvgñ¶†åÈ®®¡?ãk®ªT·Qä~ü•ü=gy\›õºß9óN:z£ý',8a&µŠéÞȟxyQuão+VG‡e¬}ƒù ¿än¸8|˜+ÑÍ"w)WPÃ$-R iÉûZZ ¾X.›¢ÛD–mõˆeå8½£W4÷».(›Ÿà'²­¬U€ S$p—„¥¼¦C˜ìWާù{ó?Š9©CÙ/Ëþhw·ìµZ …T9ët8rYzﲩ½Œ‚r°\|,¨ jáÿ‚´þ¬€\vHÍV~ç>:‘ÆçR ɇ¤Q-B!Ÿö?§2ÇVŽæîî÷€]ž~ôšüñÄ�@OÔÙuôI”Wõö¹?¯øÀ:xe‹ŽÎ-Ž2ˆ>Ü Ü.ÜÜä6Jsû!9ѓG0ÝPÌe0Ó;¨ã;[s|q95øú#Àb/¦PÙÆ¿Ë“~)¿œ\_˯çwò»y=hD~ÙJ½Ü.®.±øcÕÀK=hh|«Ü¿|¢5?kXñ©Ÿàk®®ŒUV‡O~åö;ÿÁY&Ü –N£¾ÌUc»ù· /$—אnAEF¦¾Ã jÑà?oÊRF¤ð†xŒÃwîçV¡$jÃÇ+}úH{°]îŠ]˜¾0÷Ֆ¯¶]“»©å¦¶[Ò·ä¾×ò#y›,]$I^DÞyL+c6ÄKŽ›á¨F&DgŸ™©5Í"y–" 2b·úXڈXPľh9ÔXÆI!£¡Ìñ¦ÈäN”í’€E#ˆòŒÀi à˜.•¥w·ˆã¸aΧòç· &" æ9ñàôÆc²Gò®òîór²—fØuÞ@.Su©>¨ÎÙýtõspd0K·­Ø‹Åj¾ˆï×ÃòF“59¾5+6@ ÌëUªvt²½®FíöhŒúRÜÉïUv§¿’ϧ¿òÆ·¾‹wåó'œÏW^Îç/­üý¯—=ŒO¼ðϙ̎¥­/}ùkUӟˆOºû¤ÁR‹ÿIR¤ÍΏ¡€b&)zoŸ‚#hÛPÎ]KºÁþfå >Åÿ•úžŠ;Š'ÉTòÎíÏ'›ÔK4å"’[1:K~úæeŸ´Êty­2]5ö:q¡³±¶Êt”­V™¦ž’e¼ÌYc,¿v2NMmŸh)ÅõwُØJ¨!Æ-¸]f° «:ù”q8K¶ôŠô¾4·+Ó©ŠaiŸª˜\N'èÖ]cí¬¶žH¿÷ºõ÷P ÃU˜3Íß ºt/³Qi.¿Aº­–åRTé>ÒӛñéoD]ùÎ6ò;Ñ_®%a<¨î,j5nÝZh­ žrÒºjBO|÷I =ßíê:éúîîëA“>‡§…g¾±ñ{=q]åP©¦®³Žº«G]D¾8ú6ƒ9_Ÿm:5“Îd>úÁ†óF¿xۆL&Ùlróq+§‡0¼¨®•tA†ŠøF‰û¦ºLÜZ´®<¤ó>–&©�6 Fџ&©‰nKIJM½²É<"E-h"‘Š…Ë]x,$†¢»…w"ŽTÔ§7F¢X¶qœ;/GäÅ+lklÄÈ"¡lsGÜËÝkܼ۟y¶Šd®&rQõ(•ªišGòƒÒH5Yº ¹Å]]ˆfØÆêÀz<Òk,»6ðËã0¢³œ¿¹íOßwKéʞÇþ³RÁƟ¾¤f’×ï¼ú{/_g2w>v»+Ý~7ž}ÛÎvwÿ¸»í˜ 7SÍúÒØnZÉxÐql…IcÎçG±ópîe³ò7ê¬|x E7œ¥jvúKYÔÃjÇ!(º|så ®‹=iC—S E¤4£v4ª¸‹ÎÖ¤œÌò¦¼¹×Ðkê5 Õµ¥>M1¦Õµ§dž¥ó‰Ñt>p~Bv ˞k0ė'ŸjÁª)Ýbh¶ÙrSZˆ$b)ÔÆ˜,I^„q^V,óÁ±xÛÀ:RM£¼ŽtË´4—¿cNÔéÐrgW7HWCw„åÇýœSknÌB]š‰4žF{2.aRí"Zs–™øˆë~ýd__Ïݱ¢ë$W&Óëýʹ}}¤Üß¿ðÈ?-ù&ØO¿ßÒwU †ïy2 ¨púj©PùzåÉ{æ‹ÈØ;@Õ=@‹šŠ¾­É§Ø,¤‹¢øeBþúÆÓ7}óÑ7}cËÌÛ¤­ÊÉMXdnn¢Vi–^і‡™Ý¿¤>¥ŠZ %#©ù0l%y›T …§Æ´e¶v­¸wÇߥ[¯^Š“ømýZ]¿Œhë—'jvWɒlhxjž:µ¹ÝWv%Ceº´l ikk7ë¡¥YÀ~Ùlk´÷¶´/eɳw¶ÚÛSÝ傴G"R ·”Ó(µ'ERþi™íøÚIX£º=y�ÃDSÎ:¬ó¿òLNš†ðD¬Þ?tBm\µËɌf¶irÅsªy¾µ»»PùÎô®®ýãamü㧞¸ð;?x¿§®?kö:>r¢¹V9eñB°ÜAÃ.èèn<¨Xt¢[L‰w‹›DrøcPÍgUÈ%úÖAߺJlÒwäÁ~,c]š/‹À—]2Á—ÝK´¦ZwVBR#i\¢ŸMfèÅXzI6ÎdcIÜ77ë¨ ×錥rÒG#‘d0j¬jp£ÞêõF£™rÒát&’&ŽóÉyªž­Y}·\”å¬EÞÍê›ß½µ¼3ûR–d‡ñß6MQݧ½ƒóT$2‹íUKÔóFv´ª?Cÿ ;úêuõu\¯µU¦¶ªÈñq½]ϦJù‚Éê›Ïkz™e’!(åë«z;“½M¥>Ã2}ZMGÇ?v >F‰6–Ž) ã_0e}Df‘æÎf«Æ óxN ó˜T¬xþ4¼kÚ¾i¤w¦©²—WSeß4!oÜٕ?2¼C7m0ØM¶FÜÈ$I KT˜^Ѱ°Œµ6Qڏ¶«QriR”¼Šª\_¢ÅØU16£f1úÓbYÏåô¦D0èõZˎ¨,;.³À—œH-MíLq©@‹Ï/[֘י‰Ùß|0̃£–»&VXª”ÿùRÈdÿ-ú9”¼)W9ØðÌklCõä "˶Ár8ëÖ"?úájußVw;³ºC~š$ˆîæl¯åJ¡ç&©]˔ ã%íÜa?1:’«%màPÀÄvÑ ãÄæŒ8‰Ó¸÷’I1ŒêÖM·?·Ûðý hž@‡.¯ÛÃÃß ]¯üv|/+ªîg—C\_×n¨z/h†šI\_Ð"Ѿ> }}õ5FûúEE†¾ËX¶ÐÔG&TX\_e×ç:ÖÍñýJU–éa¥[),îÞSîo™ìè#õ»•N¡=}y<¼E{š%27¹�‘e³îDlàòy”§àøhÕláÏú\{^ßMdZæQ+• 4\_êDÓÑ\¼EñJ¦H˜°·m¦ŸšØ§æ0G÷¢\Q\5ÓåCKfš°1R­”À0!Š! yrœMÌSgÀé9פe�Ëô[R ÇØ·Æ3#ÑìØ©&-Mƒ)‡&—Ñh ›Œ!> Á§ÉþþĔdË0éSzzÁ2Kè†&9' n³'uvIґY³rsæ´åDSؓ÷öz—y9¯wÞQ¶¶H[¾­·oKvQå’öGK]ŠÙZêz©'™Ë½”Ý ªC±8KYª²yáHeüGÝY«R[á¦;ÑFá82h× ­@Z˜wT5:F{TOb”e€Å 0Ïà'‡‡ÅÿkÑÔ¡,­O5èԃÇ;ÑØ&ljàSñ’ÔJ®r.°bÛK1·úº¡R_ß9M>ÿ̾¾}}}íÁx0è¬Ü|Fÿ»}}%îÍ+ GšŽn랻¾¹¥¹eá¼ÙíW%ùi™Œ5õétnÛÝ<µ%\ä6~z ›‡¥¿®é<ݙ çWöL™ò×bqô‡Ù¬98ö‹À}§3<܉Êìý€qÀ4 òŠ¤Ø‡{õ½FðAD¾ ìGÁÅçõy#ø&"oÓی61¢#¢,ÉvÙ!»LÈbmPw[Xè™<ƒbуÄ5{·TÀÞ­j uc†XەA÷±ÃM½Žq,a›Ùc.u«FkmŸF"(GeAÐë].·©Š­^‰wÝX‡­6¹¡X ƒšì©ÖåûŸšœ¾þÑiðï@ÙÁ#ïܓ´ÐöººN] FÆÕ;÷ xÕèõñtDHbôMòÀØb¤G6Ô²nÁ6AñË%A0 s 6ZÍàd,ØjÐ�¸šj·ó£mù,%]‰5#æÖŽ$1Cû÷&¼„Òá9£orWiÏ÷¢J¡·#[°‰Ð Kð &ø £ƒþªÃ‘ Ӌ@rº‰[€bH†÷8‘ ŽÒØS[aÎK'šƒô&ŸÁa¯À5þD{Šd^ €¹)Íæõh%˒AT²#ï ZtgÄ^ÌÓ¢<#@9ÚAÏ&ÞÕX=&SmX+µªÓ®sWeæÌi/Óν:s:ØI3ñ&~\ªü˜uX!Õ¾óÓ¦ãÊ/µ„8|$ŒÀùlì Áæo¶– %6œÐƒÏ›]äA; <^¢8Ej;IH”Å‚¸ZäE±!ÀúS¸ê F÷Ó.hMÔÕ$®6ú|ڄŠðv¡ðvdª„áZ ­…ÊohÉèÄmÔ$kു;Èfánð£Ç¡!ÖD¯$>mOHK¥Õ·GÚ²fîÝ+UTVù�Z9ÚӖ¯khxc†’nb{ç΢í-ô×o©¶ù4ÚæË …y¬Õ˜Ä+¿®ý´:ø$åYà¨è͂-?Àž-‘1òªO&p½3göþ}›àm•\_rž±ãOvn ¦'éU}D•ŸÌ\?VˆÁ—XÇFYÕüaœ“L•ŠzíÈyøi30°ˆzx[å‘#Ԍó¶Ñ·à7¿ ̓…ÊüŠÉdÒ¸ÀCÇց$˜.—¹ž±'4Äï«5DÝLù€jªZ‹úàØ÷5ôç/!èÍhUfŒ€è¸Õó�SXHÁœöz(ôèõ=½ü31×;G)ÿÏþ¿Rã/:’ɦ„TESUN4PQ¸M”4U‚|0"}@EL‘ý?Îí^zìЎpŽ\_b2dÆ }yÚӏoÁkÛ̙3†)sBÏðóä²�Ú#³žmhn/aRǘüeó¼Ã Ü=c&ž1ƒf̘£§£Ó1úùô (¨H‡9,á˜,šÔæ˜ç©Zaæ•ÝL°èøc´…[Éû¸_ÁS<ŠÈë)ɤø¾k-8kÔús¡ÀqðZ©¡´ðíü¥\‰¾›VyèžڡX¬¥É¼”d܄ä&þuÆNУž±÷Én7³rHÀ+¹VMkqÌÕ_Èd®f˜{ì}î[ð»at¹0án4öàvãLãMx5g°?1öðBco)— / 2.Ê#CÀV։&O9@Ûl'÷õe>ìóQ(³6À„òƒSäëé-R'¨X¥Ã V»ŠnÖfc™T„vÜNûRufÜdÏ:{“םòÛ%™,>}äêBᦓÏÄÊGg"ñ³Ó¾–މ8Šûð?޹¶ìî±÷ù虄:£Õ$"“ —uÐÈ­HEƒc‰¥\ñVq„Ëf‹õ#[ï,Sÿ‰nuŒ> Ò)[(ÜÎ RŸÞŠ„ u0Š£ð[vԀZ¶ºÍí§6Ze0Ü¢ÁJÇvn6 ‚x/橌§Ëùñ_ñ¸Õ¥d4}sô¯@¶Oº>“é]Î|(øÙk½¨ºêœs>½ä …Ñ_S]yȶ-Ð%7µßWlH¶Ñµˆëå8ŽcÔ¿]S“ìgÉÉ;à‡¬êó?]À´#>zµžèBÝ §êFPqèåœ2ME¬VƒÄ­#˜§W÷ƒlcÕ.’Û+€Ÿƒ¾¿_ÉGa֐•÷ånʕáw½hz· t¼ÈW{3å0š"f“ÉR‡¹¹[üçAŒÎA>up÷gGЬܱÝÛÝÛ3Ѩß4ƒçÜ�ä<²PøÌÆõ$åN„¥~)£ìƒM{Ŗ­ÞÇý„ ƒXãC^8(6ˆ;Ñg²ÐD CÙ9Œ¯Ù,Ët„¼6©LÙM h“"ÙK&“ »ÝÀ Š9¶<ŒÃa$ïkÀ Û¹£P”n±¥FùÌˎPU¶$Ÿe:A- ƒí®¨ c£8žPm—¢²VH�¯Á"¶ž~Z&sê1OVÖUÖÞýøÕèßÅ¿¸ð‚r¡P^rîO\ÖÊ/p‰Gcø|Ò@v2Ž‘·JFlTx›�,Æ+”Uòƒ“xåì€xAu¼\«ãtëX”OÁ³èˆæ²c˜Ëo­ã“Íf¨›u"›uËÞqµyg×H¦ µ sOä£Ñ_@Ú …¿S(üM%Ö'°(æfhð‡ðëN´@‰yq ߂ïÅüµÜ«Ü+›Ü¢îxË-×Îbm@'ÊÆ²Îd–ó»]- Æé™xUç‡:òTFYmOíé;+3Á@œ€O­l«ÜD»ÒAcïx¾˜µê)h՝\Û”þWp–\Ç:øˆóËΘ»»]Ÿ¸…¾Áãò®¼[ww ·Þ¹Þ×Å 89§Ûçt.^¼“ó•‘Él,ÛhÓe$û|¶†ÞÒА à:É&w¾d¤2Œ”…˜6¬R¡ jʏF‹†ñTËïÓUEN”U®ÜêîZ|é1éÑ¥ /~xÌ¢Sú ‹?XuÝ´¦SÏ|Ÿ�†ÕǕ{Îο|NYÍxôv/ÐÀèя#óØ>°ÞRl¼ÄIž269y‡CW6B¶8y½•¢gmñéõoçú·íã£ÊýQh_gcM¯©šÁmçöަ—½R#ù£¯.:ó̧Hîùá”LfÍ-£÷’«ç|0ú”3¯…<ý¨pçãˆWõ™Ò| ¿Ö~¿Þ¾ ÿØ.ðü |©å;oëñjû떿Yöó­øVûsøy;OhŠCLsgZ$Fz·I,ëM¶2÷¤¿¢3ƓÇh–ÁÙ=Z# >v:HÛ¹y(,}À:c§ƒÙ­Ní^.Pm–½XÍÝQ”)VG]¢û‘Ta¥Îî‹Ïû n©ì)~±çºÇ3™å”ß~ü³ÊG Ï¢=\R1S¹¥Ú͎E¹+-:7ê˘a&îàrÈD¶mÖëaŠ“mŠÓqóa&Òy8´Ÿ†¨«¼¯Mx¯:÷Î~8Ýs¡ð:ï>¹‡¨¿²ßiÞªÊfÊ ’E¶éñj=ÖëéÎ#—g¬¦™ötm:i1'2Z€Ç²ß�±’…‡4�t£üdC~t†’ÝaÅ}æyVÒažj%·‰wXï²þÌúªU=fÕã+[LnäriŠ×.§ÍRÄN±9ÁWpS яŒË²LÿÖxŒÉס!4ˆÇu±Ð(Û̞¢‚Gï>›ñȅ?ÿVåv²|î5•Í،mt0nYS9ÿûßm"¾ø¬³G7½‰´™ÿ ´=€¾¢x¾MnuÞEîròdYDN'¼ „ ¢Û’,&G™£öS@dÓ{›šNn:?æ+– X,’¼Ö´ÞDLÛ¹Ô êŠ:nêa‹ vÊM˜•]!MÄwڋU-Á½R™]ùm¡ðÕ+ …ß SV1¹5mô]uÜ?½oÇç1éõHôcXNގlcomó{~cÃö²—r“©Ìãó7¢²…2• ¯VÀ÷É4Œ³æû ý=a©ÊDÐÒÀò.f Rí6È2DíÕ¦Ý. ¦I嫁';UiUû÷M=û²B኏ñí8q^¡ðükÜÊÊ+ýGf2/ã¯Wvú 4üÚW¡½Ã˜ïd–ìيm?y_G‚%Ù Iîc ÝØŠ9Xöx½Ž2¢-÷«ýÃ今ÓétØän-Ø2F£C£ i> óíÍ֊¸ib‰•\¥­ª‡6ªŸ£îº¾€¯ Í®¼VY¼}Æk¯UžŸzö……Åà ï®,¯ìÎd^ŗ¼ú6ëåœßÃÌý9ô"ˆÎ{YXíº·gúyÅB l+ì“ʪM&ÍAJØÀ9X§“ó€HDç:IBrUoÁ;߻̻ʻ˫÷Ò0 t„æk¬2Nµ?àòP2Pe áÇ\ÕEéF•sˆnێ ïýý×T Ü͌‹f^ºª;“ùæú’£•L†?‰qÎ]@‰Ð‡8Z¯Ä3¡’4‹ë“ÎàÎ 6äéà¦Ùú¹‹ø•¶Ø'!õÃX_݈ ‡‚º¸¯ì2éË¢(—㴏%¿œwbº¢¸Ô¹ÒÉ;›1b\n\iäë9o^iÞiæÌO ,«Ž¬£©7òƒ p™g}¶WeÚso7¶ÓôÄTŸ7Äj6¹]ÞxýxÜn•´´ZHRý~h&k …÷o¾n]å( ëÒ£n¾šŽGÏÞûz—ŽÇ#w´ÝµéL¦ñÄËn¿Uýø\e)÷ŒJJ ·¤H'GœT88I'’Ôév'-ŒÞ¶ÊV“·Ü@™TÄ'+aƒœ·b«5æ‘óh€Õ°ãQLýTãûóDQ•O{8ªÊðÞ|¾×lÈ ú½±¦ýi¯œ5¯ƒûHÓö{\_º 5:zÈ<\_ë{fœqڃ™ÌÇOp?/s,ƒÄf^P|³¹æØdÉX0Î7.3®2êŒ\~Üÿ8Àó!÷Tºà×|ø:ðw¨l½æÑª§CçÆ/ÀGF ÉãèšIãð‰’)F}!P61Ÿ9—×Òú\_¢Ë�N\_Éð†N¶‰‘,W‰dˆE–Ï>ò¾%—zʵËÅ#—äp-u-s­p­s=æs]À\£{ÙV$8¨yÆÔ%몰MŒÁŠvK¶Wg l@ɚ«çœ[(üäkß}ÿá!ªs—ž3?“YôåsȂLftÁ½«¾ûMò0|zôêã¸T[šz“b’·O±8MT±ô~¿ª\·xäÝ Ê-ª•Cònðð¶sÇÔ«†Áqý#=)Öø€7Fñ½¿)®e€ßyì‚LæÌs\o©šàû׎žO‡þú…À»\_…ýšy ^t”b2º)uu–²Å)l6³¼Ô±ÜA$„ ´ÈL8^zеlòSÔ?UWE¦´Ø3ѯ¨ÿÌ­ÒüÑѽ“Sj0•0ˮڪ9Ð\“»®UvÚªåü¯µ)ßûyÚôæfø˜Ø&æA›HC­Ms£±¾INڌ¥r WµÙ0m £Ú(hè¡u˜_ÒÚB¼u¢Á¥šw†w9+Ì ò)æ˜dœîi¼Îð´9?òéÊ3ÏÉÀ¬zŽÅ_ðOw9Šá¿ìÉ^rþRD±[+߁wèá‡ð¬—Ù³P‡õÑÇÙµç!³d&æGOÛÖyžFL‹8R‘ûéheý]ñœü[‰ gduí—+¼ÖúA‹N{Ÿ?ûx)t…"4±‚u†És[¸Np͓k aeY ^7üa³Û+3¡‘ÖÉ+Áð'7†)„lÀ·Ô·Ü·ÛÇû|¢,¡brÁµÛE\ L©3Ä­¦IhšKø0BXuš#E%ƒO…FI’­ôäcWø;iDÆç/±£ädǍFsixìûŠÑá &ĽëÑ eUòä'Þ:v1þuƒ)ßõŒyˆÍ“÷ôzóðj¶ÙKÈÓÀq ÆàaM­bÔÛó §†4¯;IfO¼môu¸”UÈ®Ìj·+SJv°±c‹Ñ²g8¾›¦ÁÒó´ahü)„=¥Ô§Ü¾ó°/ƒ{VK‹Bve0M(«Ä,R e’FƒBvçpNIeKT9Á›?PZŸÛcyh·Ò"ã¿¶1üüyí qWmËoˇó&¬Nép®„Xs%ða‰ÿE/Ƒêl½N€qÜ®RŸãéQL%¢£ŸÝÎ)ÚèÃýÛ©Ž¯¿¿rkõþ¦&—ë€ûǟÿ‡‰Ï'¨¹žOpñÏÿÃÄçÔÚ ÏŸ|ÿ®Êût î_Çè Ü-nŨ5'¬òÊ®Êì ÷ܪݓkÕî;¾–RÀi¥å«)¾˜/]]Q¹¢²cì·( s|æüü²<Éçƒ]]‰îՕ†Ã¬®P.5K%A06ÑåJ;j–š÷4sÍÍã«.”{ß_{ñ±ÅÄÿÁ LuUô°+1•ï̘9sÆçXÁÁ3fRÊj«2@Ùª³„”K±ðH¡µ!…ü’ (LåNu%î½K½w BÞ ¸‘ BÇ67F@³Ç\Ëxa•{k,æuª,6¨îR£èð‡Ôoü!‰J^üﲛ5N¯ÆµUݨéę›ñ. 夺rY, ºïŽã8Õ}qªûL÷ÅwÇI|X »ÄѕGÛ EkáُªÏnSei,ì°Tù\‹:=©÷ÜÀfŽC햹„VN¯ÎÄMˆ#FÑ­Jð»Zëý#ÖVÝxDQ "R<˜b•e]]4ñ Q�89 OL)—PxU˜hù+hÊ {ªÑÆÆ‰ÑƘ´_‹6Ò´ÕCçeǽ25ìbH‡ .ø„d‚ÇšH$:¸%ÓYòÏk¤°™ËÝ9Œ%ðx)üpôñañ_‰VÁW‹– …ŽI„(S…™Ó?|hªŽëIë~Gàrè¥U¾qj(ŽËr]ÜÑܑґ!…ãԐǂq4D'ýx< ‡R06 Y­³ ÍсJÀð,kZ×Dš˜PË N3ZKMM±Ï Û °À?!p7# ÝQ+#;89‚§Á˜Ôšjè<°X9àÏÊ«÷!Bz8ËOƒÑ.&´7zþ4žŸ6“€¤ð5¢fôÜxŒo« S…£e=@öÆbֆñ˜_n˜+lKÖÅü‚0¢+åµ2‘鈦Ò%vô7¨G›ÄŽ[á9²Ü$ã“Y 6՛äDbÀ¿Ô¿ÜÏùÙb-DÈF2›ÕVdò½Uã 1ZV³Å2ÔF¯ .tø ž#ØSp?=¹ÿÖèX.ƒ±|ÆÒ„nÞH´Rv£‘žÙLÈe2!¤'˜‡AÀ?満h<׎dº‹^gÐ#g0™0FOr¬ëà¯0&›¬¶’ÀŒ3sI�á?ø ˜ïî êË÷䥽Ñž½j¥GO¯×ºÝÎDúÑT'÷à«­_«\яöµVþї[¯úøÝŸ¯j…Ä¡ç²\³Ñh0°è ®Àñ<=¾pét2Æ 7éÔÖ=tÀl4aÞÀõz¸éqÖ~ĵo‘°&Ðlb£ó=Õ6C«Ç›LI¢SÛ Í…¡D¹sû+W|­õUh9þ þ®j}ù·­WA›:¶ŸÓá¿#:V‰¼iù§…¤\íæv'¸’æ>sŸ‹ÿЅ P®ˆ sÑPû\è^Çanãæ /tÃxѵ߀vÓZ~¤›îUÀç%2”èÐÊyÆÔÍVnhT’ D¦žpÄÒ9ý?;ª©8ý´÷,³Š»¨x÷¯"noäKtÁO¡ë:Þ튡‹Ñ²÷'´ÌX0(Þïq?Îm@A0÷OPL»EmàÖ?ÎmÇ]ÇÚcô§ó»ºçÏïîšOmóOÆ^ã~É?íÌ ï(st‹u¤›Ÿ¢ëvp_w>ìüØÉ¡€×0Ú¬&Þþ±Dò%”° 9€WVH k ôx\e|ÃÜæ­RƒÌ÷Í[z)üÄõ8·˜Lë- ܳéO…�… ÷éÿÐW5”å¥P ¦ö†°¶AŽî¥A-O°z歅"YøšºòþrSvÍeWýpíölÓ¢\OOnQvÚ´,þô؛ιù?ç¾ÙÙyܬï/¸êˆotv~<5—뙚ÍNŒÑõÜOÈ}ȇ¾­Df1’̶ҫžéês\_ãæúùY:ññˆm¢ÓØë/™†¹·¼dÇà s×)1¤Xì%Ê9‚# v0 ‚ÃÁ•ts)¨#¥1ª]\_à \_Uúÿ¶ï�Œ£:óoÞlÓöÞ´½Iڕv¥ÝUרٖ-,¹In²e¶Á¸È¦°)¦È$tHìÐ[°q0!bØwIäL'!¹P´ú¿ïͨ˜�IîÝÕî̛™÷•÷ûê˂pS6gb�åß.Èx„ )“ƒ €—ìjweÎ,XGí6©‡”s¢—ìW¼&‘íðé1çMZ #χ\u‰\_{Kû–Î7)tzei{[4Ö\®ËÎMù¶ËýDٌ´)|Mt;pç0Q»tnÁr‡„7¹ßqŸpD3B® V1žX[deQ[Q ŠÐºÑ°ÍÀž%ہө°›è/F›‹2LEJØf! › àÿþý:Ÿã3Àû†À§—’>SÓoÐ&< \›Ô,)ÌýdÌNk©múI\_׌hVñdÛüŽlûY jk¼ÖN êÏð•ÜG$†Th¡U¹èu«øòw\"(»¹våS˜¯Ã \!¯ÒC‡ @Ë÷ò<¢o•HÔ詓U{9NùYVÙô» á%ÔC'™#\_ppUØ/[æ¨]Åm¿ìªÖïYL¯ÆØ§Üñۑu‰šN5VˆF‡ |–¬¤8µŸ~‹(¶²è&%Üö�Î�ã'YL ³“Ô–FÈs¤ë€‚>;OJ~îqWï5‹Ò/ÞT´?û \úKîÿYñö\_çxú–±ÏÈ2þ:äAW>…Ð؛bÀì^Æ/j¹\µû]äjímڇ´d–ºK3MKxÅ3¶p“åꟇ6ZÍwÈ µ " éHÁs%%Û¸ýŸ´Ã¡áoîIÍKݬä"Ðea€m¦:SÅ£9ÃFœ¶‡ªƒ™\Ù\sQñ®+¾üÖCÉ[ۇ×G.º!1{Ëý5…X?¸pɯ;¯ë¼°¾2Ÿë˜}I×ÐwóÑdˆÌDfäC³DëO5ؗ19wÆb Æïk8ËsdR#}0„¼dÕ!£®Šl)"\s�‘ ¬X‰t)“Ôìø-ÕÌQ5EoÏ@ˆ¼#tßó.ìZÝ^ÛxasybùkͲζŷ\zÁê% ½³°z{o×wrõ®õ@ãÅó.ÊÎ~‘Ò®@i7DigC›D× N’rۅä!ÛA›bºmžítję)"½QÔ¦!,äŒFý¥ƒ¢ @ ³’õ ¢ã-t±áµz}2:h™Y©™–·.¬6-ôiè#±y@0á\ÎT/cL¥ÝD†]g:-X¹Ùºåö¶ÁÐþýœyógzÛjë·&nýZñ:à:õØ'äEþdD›Å(vÙ+¬7Q¶zX3¢áôZÅI¸=ôNÉɪR´èiÒÇ8È©P)}L¡pq—Ï®'%AS«Žì¢æ†‡¾"ºú蘭ƒðJΏ:ÁIõ®‰ýŸ¥ê¤Ó“±®E€ä¨­ÏÐ1ÉSŒæ‚FÁR!&åá(¸Æò$֔–$’Å“›’6û£Ûmå<1ñ!Aà8›‘B­ûDýõV5'™ºjÛÙ,jƒÆFbdëÅR'.e‘FÔû¡y‚ÕÃ! 7q<’—ÅE™ ’Ï˜Ž‚uø sUÄXòB˲Ó眸î¬íà ¹ˆfQüÈ%=Ôƒ× Ì^ñPížëVSúë!²Eñ Õ1­¢^á²ÚcJc§”’áQ£5fA¥ÒÚூàŽéºÅ0qšH1˜\ŠÞAxñ)ž Ùls-ÏM÷õÅ¢¡°‚_ÔèZ6Ðufg eï¶-óÓÿéêçøJ[K0pd‚ªÎ—ùu(ŒžGø×t?´ët‡ŒOYˆÙ‡za¿ØcanOøù0–òYôB8| v •|~r…Ç0hìEÀˆz«Õ ^Óë jºT,íSI2ûˆ^£V z¥Rz0f–PCÞY‹15àao.É=ÃK VŽ&713nS]M [;0l«Æ ®�+³ÃᄠÕTlF(£€¼œþÅìÞöT rm\_ãÆ2ÿ}çÌ,ÁÉrqi¢­)wú\rsñW ÷}ûò\_¼‡}¸ôŠ\_XéÁC&§kñãîÊ!úLf:;÷ÓÕÑD ñ»Äº#ª·TÜð«æWo›É3æï^Ғ;šEª…ë$AçÕ¤2k¨6Ô¸D£–GϳЋƒ SºX4Pu¹tj•™h4 ÅT‡R×JøKŸTð²WØÍÀ¿Yjàæj9ÁœøIɃUW+ ]1\e’!Gÿ P€ÙòZ両i ¯Á­Õ×ýbýYµñö{×´öVϬl{¤­mc?6ãoÍ~áÎbÛw¯y•d»‹»VèÈ-ŠŸÏ¡üAM\_r'Å0nômÑ>ý€Ê™—©Vq‡Q¦(ÊåWÐXýoäL\¦4n¯°•›E ì£S˜D—\_ø+ë³tBt«ñHA§E«B …TïRY¾x¯FÃ?CöL®dÀï05b™cT† }6™ëä^ô›°Š¢¡ˆ© a ‡S•˜@w&vþéÝòÉo–´\_àÓ.Í¥»ï¼ü|²ù»-Å >À›?¼~(Ÿ­ýëYæuq5ÿuþA.O.£ ˜“Œ¢eŸšàûÑ£üÃÜ£\žï¡‚äägCr‹&žÛq»h4 öžv®›’CRv9\.äïãÛÇÏ!£xê6íA‚Z[Ãa)7—®7Å\_ð¯‘÷Pµ£Åh%Wçšúq?Øû·waAר×Õ5£Ÿ¿¸kkß¿umÿõ}Çû‰¿·õÿ¤ÿþ“ýü™3Nï¿¢Ÿ¨|¨Ÿ[¶rùŠ¥K– ®X. µrÑᖏÇEíŠ%KŽ­Àh^Q;B¶‹öà¹XsKG'Å-\K†›3gæÓäJ´€’Óªv,ÀhÁá\f¸pY�>«w„#ê K–¬\º|þŠƒK è•Ø;½ØÒòÕ¹pñA¸ø ü]–Y‰W¶´46‹F·ÐÜÜØÙ¹(Ёwwïà:D‹[èèXÔ:BÖïÛֈY²‰O€wÑl´ ÁÆLcO#ilœ^ÞÓ³Ö0Ýôt&Y™øòL¦†ŠÔrіò~Z(\_^¾³œË‡Ë—“žr\^^”jTq°ÄópAjwPñ-ÙVr¬ÚJ>/–è!Íó “Ýî~†¬¥zɋ¡M,cÙ˜O‡²jˬKB4v§Ÿ|ÎЉŸrð%pš‹’½„® ì#=){‚ž”LB³¼ß²=\lõ²AC Öç-=´)›_^MºÉÌ.Í#u / àMÌG‚6á|Áá¤<ÏPÉw6ƒ<™¼lÍ̑ÎÝZu!½§“¯ÅwñÙ/ý«çdW¯ÊþôŒƒÇš/¹¤ùë‚÷¦%×Þp×ÜÇðׯ½¬øÉKŌ)­Ý¡×]ö¾ÇŠ/utµ¶OŸÁ²¦ÑØÃüÉ^ÁgȒڈ†:Eá¶æ±1Èsy¨Z̋f}‰—SèÎÕ1V3ۄÁ:|¬î:ÕՉ"Ñ¡pµ›ÙnLª%¯Ãå¹ÿ†ñ¹?Žý+Ð,§ÄÝBJ¬m¥/åi¨¹ˆÃKJXžNíLOñÆT •NµÀø†¤D·_€/†Sc)>%jlBŠÃU¬ët}½P%Κ%ì¨ÚUű&öÁª=U¤Šj9v[T×ÀgVÐ26ƑѣÄ>ÖAœD…j>ÆH»Ú>‘§ a!ŽÃ£ ¤r¬ƒ"Ò®˜ŠI-f»Åû˜tŤ!ˆk•R]øð¾€{Ÿ&¡RúKó4¡Tζ„w\Öy¡´Q뀄j§\.š "Å«‘bÕ吆�ÝXîØ!¹ÑÆñ­èd�7ƒ0€Ð€hõ@C™™Ünô…a™|²Àǀ„]©€ôf/¥"•eBÍ2Ó>’Ã"\_†j™Í®RNDM8》הؐ(£G?t‹ Ÿ[y–ÚàSÐŖ#ŸÝCEP ¯ýRÊ;,?IF;±Z¸Ï“& ¤‰£&Žã@š„¤;6Td„Dù%ôr1ºÿ‡ts0ºÔV�ـ,ҍþÿ'¤7ýJb2Z²OïNPuEÔÉM_b¬/ ºræSL˜Xö¯?9…ÎuC“t.ºÝ 9, Ÿ”¯ü‡÷R«ð—AÐ0Ê2ë€ÌÖR‡Ï"F ¶A&´N&´™¿ îNÒ95j3X þ 3C8$“'$›¡N+›Ú ³ÖN§›™VÜ"Gb\ rV0­�å­S†OCÀŽÑÒð¸|´Z) äL†Ó‰ì&;g·‡¼@ÓÒ4à=6¸›Þ5ÄBà?<•¨ëô9ª&Ùºˆ¾ÔÖdžðw?'ŸS(ö%è·%2½¢®òO1’S®'Íè_¦ j¤•Z¤ßOiõ®ê –Eg ¨ådÔJ8Ê<)j¹ej9¿œZúÉt/ÌÐj”Z­ß]žd¤Lá”LʔLÊTÊéIé˜ %G8e¤ôã?öˤô)ý@J¿äðs9Öñ ®žÓIí7¯;£ )ȃ©¸DLª3¼NGr7TRb¦à´TH¯ü‰9)£_EO9ïaª„þ]ÿ1‰÷œ’ñyJ« ŒÒ¦©ø…4ŒÒüWªo±xfŸ-–Ù㎄;I¦6gXY¸$ð‚xÁ Là’™@¥\ ‰!ò¹OwÑNÀoT†‹Z³@ˆÏUVÁˆžd;ç�ѓ2ѓI‡]&º}‚è”gì¡P„݇[cnHÕXóÑ}@tzZ £´¹…¿‹žŠÖ G»’¡ ˜\ ŒIԆ]söŠÝôV€ÚI v2¤—ü‡Ô–°…ýJáeGIñYFhJç!Jî/ŽÔZ¿˜ØÜk„ªÌôæñ�®áóÔ¶µÍïªêX3¿®Æk뽈ѹaC—Ó-љ¸u”ÎÇÕIŠUŸŽûËØ+ø.Ô¾—Ã.fF譂Ʌ]ޚÀ-‰å‰áI'Zœ1H¤$!jmBBš�b€ÁøƒÌ ‚ç©K!ûÍàLO!û$ߔ•V ž¸¥ÝÖá™I8JoLJ™¬•ÖÊkådÖÊ2�7Ὶ¡cßÁQçґ–HOdy„ä:§3ž›gÈ<ï‡(Ï͘Am™éj&˜®×Ô47‹ŒéêqK=®‡Ÿò rõÀtõÀtõ_š´ {ôx2hÓx2i"(øÏ%Áo&—«›Ñ܌M\cãŒ6‰y ¸PÈÖLßMŸ ˜w0ïŒAzëÿy¿ ­h¨Fjíú¹Ä¢Ï3·yœ»©Í7ðåYG2¯Ë©G§$å'ò_–xôeZo#ËG²ÙjÜYšŒÍêñ’ˆ;Kó¡Žè…•¶¿ZSѧ@ºê]¬ãÍñú˜Åª¶µ •³³MÙ͵ѦZ§g2CitÙßKÍxçàN¾]øþc’Rv#+ò¢ëD½R—xïô¾å%ÙÀ7¨+1Àfä(Hù6jc»!ÄÍ0’a ƒaBϸßɯDí ¿ �¶1!¥IÉ)á7§ÓJCtÒ¡„ïD´ Tº1o)µ„‡ð„wašw‚F‰„•\bÕ¬RW°zåƒAƒƒ7VÄWnèÎÛ;¯NÔŚgۃBº²ÁÄÅkÛÀÚ[‰¸?)=TKÜûΐҗ^G1QËaØÏ³s0ô!H|,Å¥ü²0H¶ Ì;û&éì_GT=Ó³ý(—s%CJ¥HϛrŠåw1_„ül:ӆCî ¼C55†Ãä£^ãvÒ£æ@ 9?û^tŠŸjî©~ªÇL¸Ç´ÁÄLAgG&û©ØHߢç̓FÀ·Ú±ù§Ðo糑NÃóqÕí%\ŽÕYZìBosÁœ˜#9¥œ G‚„´pL \bˆ=׀ÜoA9öþ5þ?é˜ ä1·£{(¦ ›ƒïa™òbžCðr,Q~Oþdžôæó»òåMùLžäÙÍÃÞ>Ò¤É|yH1HGî“Gž‡ý¨á�áŒ1ƒÑc½±á1ƱŒÄèM—.;ZF2eÇʸ2U¾ÝqÐOa £öË£.G?Dµb6ŽwÄ÷ğ“8በn0±-±+AP"“8o¦—7ÍÁÜ'6ѹ~†Žø–D´Dmb5xbå‚)Lq½)lLMO½“:™R¤(»$ÓIΘlIr™dOrwòx’O27€4ò&˜^‚¾IÇ~» Õ£64 ¯| U½¿ÏäGÆþ&,!4P¸´û=´lðZlݯøÞr¿åã;õ ôç¸/vóííÓ:;;FÈ3¢yÚ´¶†–ÆæÖÖ6±©©¹­­¾u5‹‡ÍxC3nÞ ª ÈæHu¦þ;äHKBÕä±$)P™L,!×ïKZ­Ærã~gÇ´ií#äiQßÙÙØ&Š-­ÍÍM­O“§QýÖÐÐ"–è„@Ëp ×b…˜ƒh‚¿sE5ʘ2\&S[z8‘Ð>C¶PÕÃOdW§Ù^|ÐÃÆ\W“M¦!ÅøÄ ð³I{º ‡¦©.풶€ÿ#èQ鬨H €·ís¾6ù$Ø£‹y%] …ÁQVPª˜ß 1‹T2'[íÃ(Å!‡Û‘U±�ŽÝ– )T•þõóƒ^ó»¾wëÅ»O¿Úqù¾›ûß¹ñî?ß}hÖ/³m] Ø<½ëÌ»¯»¡!_åqª·a÷è¥ úû{úúúøþþþLbÑ´îȖ»¿yܦ¸²|Ɯ–³Ï»çÈsç× g÷Ú¦Õæ ógnѐpá÷÷÷Í^зN”å~7wåÅû$¹wMjƒÛè·÷KÚg7Bzª}PUMmˆeIÞQ\JžãߣG}[’ ´=€<¢Ã"Å£ á–S ǔոŒžY\L¥ÿ=ç ùœsÐ5(,R-=!!FÏ cS8Þ&al–.È!2ögzî(…fn±ôªv,$ptznúiÖEê³­[Ô[ ¼(aéé‡ ‘ßÕò»J~W2e�¤.BC)þBruò¶$ÑÅ<2WV¦»k!]QklÆéæ–f®¹9=BKº(°ºTÄ~PC->g?C.¥Ó¢\o6××­<^É Wî¬ä+s#dÃÞêêV@'V”Ã'sx[îùܱ æ29¦H÷kŒBN1B.KvV쮀֖6 Å7î×é0Ãò�$¹}ϐÍÔ ™pH'!4"m/y"ÍÐçxJÔ@Mšå1¬-¥ÔÃo,³Ä,ç?³¼¨$@›†°J¡îõ»ÍÀE‚ñ)~c‡#ÛÌ儫BÀ ±$¦bÉÛì€U–-[,^¹øÅË\“ðދýw¯Œ¨B¡…ÏüúÎÿNµî{£ohW/ïšÙ‹:L.{°·g髸+.ºLlô:²0»rNw½ýÜ3潩T͘‘êïÁ%ÑäÀG+{ö޾nr9í6µ:•¿Ó]î5&,>­¶¶|¶‚;®BY4/˕3§umŸI¢³s³O#g“-ä©ÌÁš+~lÔÜo<ü¾‘H²ª!å„ïÓ: ^öžßã�ÎCôÃy¾÷ŸÆ?.ãÕ.Màj±W{£| B¾·½½Eb‘Nœîléä:;óÀ"ö^±Ä {‡{ö~ØKpÕóR/ʃ,Øk=G¹%ˆ©®¬BfÊ3&Tm¯ò¶¶ ¢Ù)Bc7°Lm팧ÉZÔNiS6L£ØØÛø|#ß^1¼Ç¡o ++«42£h4z~\£4š¥ ë5””ù$ɂuŒUƙe‚[þŽY úˆ†ÇRd!Á8$-Pfžpú¹lÖ;Á6ùI¶QM)¸éºußeœ²è©wï_ßünf½£0[S]üýÑþ#‚á¦ÓBFÃíçøî}±î‹Eì&—5„{{2e•Wé/”ÙeÎ<¾ZúJòô8uvËMýç\_sfYpÞá¹ö‘ª-ß»l.¾Øäv0\Ü ³1ê-¨á¯E~tD¬Ôøc¥¿³¿çç\_qýŒü§ým'„üÐþªƒœa?×ÎÝ¥¼SµÓNæ+ç«îV¦VÌ6©¸¾+ä÷Rà!·Ñ,8SÚ:àÅ/›‡çõx„\º™ŒFÃð€^¡T©y ïvщQØxJC&°Ä‘žb4Œ út㡧đhLjô ‰V҆ŸLCPËԀ¹V…r¡Ð©Ä\_ƒ9þÆ®öåÛ?{ ïĆ+özþì»ÊJ§ß\_ “½qxݺ;fá-z‡훞óÁʳZnš˜­kP íýšÿ­·JrDuÄö–ò-¿ßöþˆˆ’¿#ôˆë‘ÀÃ!þºÐ]ü]Š»TüE‹BWÙ¶»øE¡³BkIDQrvÞ®p(#<Õ. q·Ø±Z¯1q¡˜ñ9r=2 /•R#7ІB¥ËÁZ¤Ø�]KCÔ[‹Ô@‚˜t'† Ɔ\gK s› šJ Äj¾ŠeãP7Êq׻ڝYçœäÅät7T}ÓwþÍCåU/ŒþrK®|ɑäÊä^³<›ÞY<óå-T+•Œý•ÎÒO‘U£u;F¾!yÒËï:ù];¾,%2סí™G”Õ‡ª\_6üÔð¾FSP2œ]GÇ!Oڍ\_vq”Kž=lC»WëRnJ—ðJ»×SÁº¤„‰­v~˜àäyÉ µ¶¡“¸?VºÊ)‰6“I‰§ÑVt”"I•Òç "qMHAÊÊÈòR3”_j€ÁƒÊcT MJz«”ŠBT!M³ŸûU†1f\" ¿?øïů;ñ F¹ÿ(3í÷^ƒpGů–”Ýo>þaêÚí\žæº´ó{‹÷Ÿwù9}1½7qx[uïÌ&׊q}лÀ­‹¦ªîï¨óT­ºÑão”ïQzÔc•hèö\_›¾.óÅÁŠ—”5²ê7Èïzù]bœƒ5Á€µyu¾6_¿ ŸO.௩}Éð^õ¯j´µêÚú— dæ"ýE’0Vxº\ÄeR‰–�>Ž©Í¶s»ñKTs/ªB”jV÷8é”ápJEõ>¥í¨…/áyj!ØÅì"Q—ÏÛ¥ÒfFˀ8)Äi”u¸à+Åëøì“T<ŽÔ¼pÎúxs­_Ôßr[Eú×ŏß^ÏÈÕÿÈÏÏZÙvߝ³¼D‰oiû?}Öù׬,ÓùνéæLҲ垣žKeªõô¹JRñáÎP δ 'k›ã”n1ôs1¢‰%¢TD¢(¨Ÿ Œ½ø¦ä±ÐË.¯.D©œ£,S\_&k²½:A/!\J;ÉÏÁÁèá3GJx§,F.PÓN~P’¡“2‰(>¡³Y‰©ä¸œrY ä5}N^$qaúI)ΎP¦²%…=…2 £zûéx9ð£-.¼òƒ\ñ/ÿ‘iyL [¿yt>wå-‡\®½jmåSüq‹ç\_~΂¸Þ¾¶uuçàiÎ-†<ÿ{Á“9óv41«ïÒY­@סtÜAÛÁҗ¼äNݺû½ä<»´ä ïšØù:’³ä|«t¤$ó]c!%zMã$q6鶈Ž0v7a1–ÏïfÙüð¥‹2¹KÝI秛{˜Ëó ¥,4lcYh·ÓïóÜùôûErFYë'"ß^Œã#ä)Q\_Ž[ؘØÀ6“f4JŽ·¿NZÞÝx&&( 갘7ÕÉ2\ʱD'”aVÙh–:¢Á™ñŸMœy>=¬¢ŽÃà”ϤS| {.¿Y|…Oó5ôèÅÌß9º¡ ÑÇkqO-®åŽðpápáx ¦BºÐSà ’—9Èz½‰PF€û»÷ÓJÔ¾—àzxΊòñIƒhu ¢Î,4|ÅèfèÆW³q˜^c#—'ÍÒ,¢®O ÷‰M ™†Þ²¡aGÃÉÒ�QŽ­õ¸|Yõ0-ò}R–Ç@ôЍ»¢ü!ápDý¦ZQ¾¶¨…Ú&Ê¿Vm>;-K®¦³k²Y\µ:·ŽÓ A§Kސë÷VTP0{íA“‰÷#”ƒr 6•è…h8îòûƒ¥eqìm‡J!U¯´4Þ/³Ë¥3%M¸¢YL¦TýقJ(Óʚp€Ba)ü�KløSNF,ʑ–B°%Vr ÆL•¸'08¯‚ hPeŠÅCaµÝ ²ý–éerñ]eOx½¢üÆ¿¶¤øþ3¼!î¬GНY+ì áºN[i,î4F²æ„åÈaášÊ3}/üãYk?›‡uÅÇNën¿xfëi3𵠗qåÔÒ[› ߸7–:­0³<×rî9©¹¡+¹@Ù½fïõ}K}!튟m@ÍtåéiÀƆ@CKÃñ¾A NyœÁT·‡ë×S}°¾¥¾§ž¯g|±‰qetŒ[F’oñ£zç)¤¢jDçò ÛU·ª¸§l¹}_ÔX‚Ý¥Ñ ~ÐN›Cà2vÈ!³ÛQ†¹)'38“Aq¤«(‹2Ԓә#J44¶±ÔO-tÎb‡!zjfݙªP<-+‹B“³h´j„œ'jC!·1ÈR0Æ\@ô·[ñ¹Y]¥¢I铜ŽHÿA´IÊ •LzˆU'ÍuIf¡¤bs#å”K\‹½5sÐ\_Kàdb[±™ýHN?oΚ+\üY³Êm±7^©ŸÑli롅þÒÚÒFG¤ÉÊWô>VQZXԛ=«¯Ù¼òL±puÇY[t>—Ã\žR¹L9ŠÎ©ªyÕsˋµ½6י±ÒsL®ÓEØA5G„¯§êjŸ½†=¢Å)¼^ñ‹ îÌØù1nkÅpÅݏTð.ºX”C†šx™áü~-7B¶ïGÈ¥¥²C´» Z‹I¥äµZ^¯5&:ë&ªéEº.š ˜“R–·Ö{0}Šœ‡¼Ò\À\°²¬Do|zëX‡fRJ ƒNmrf”B ºŠÆ$!!’”¨,ò¬I „e|5e Dœ»Zo=‹«ð ÞºòtÅôì} Ù±¤ÌãÞÙ¸s$R‘×l³XðʗV¤ô§V ]+\}ÙÄû¹©k­šžž†\SUõà‡¥ò@çÊC«¤ÙÇ®¡š2DW„JДær\%êl‚±\Pu¼êÃ\¾ŠE¨&W…n~ë¸n§«Étt2‹%X,æ²)$2Ä4ûí”>äwòÊC5»õ\ÍØÇÁø†8Ç=‰a)à1¡Ëaümã«[uœŸCN\«e¢É"Ë2eËˎ—ñeÒ=ÉëÛ¢ÉõïF'éÓ$Æ×7{9N@€ ¡esù0Ù:—dτ¾RÁsRÝÃîsñw¿8îîšhz!ÇÛÿõxúÎ6¿@¤'B"¢¶BˆD:FäêÿŽŽîZ¨þ¯…êÿZVýOתÚîîrõÿ ¹ú†\ý?ªÿç ‘\%&„9s„ÿÏí4à·8ëÎ]S3»»{vmmGG~6ô˜Íz ÌÆ³g£|&Ïå¿´Ç@”îñOuȦ¿ TßñM:¾(PþÏtè°~U‹ýßû[xdu›OÏq¥I³Y¡UPP¬Ri8õ+>ùgš{Ïî[6× ÐéUÞ¶ÖH¬¥u]vpçOøßrSM‡\OTÀU¯EØm–²ï€o¬V¯ øF|£b|U^¯Sæ§Ì7N™oœÀ7Ad¤|c‚ANtvœ¨±@‘ 䘥PrÌ — rАƒ†´p¸~/ jø½€ ¬[Me$ý’ÙƒorðM¾)ۚƒ¦ßù¼^ŸJeµò>±¬Jð‰š 0æÃ>ß?èMAùfèïÞ$'3À¾W ” áÏ'µÿ]óŠ) ¹dJnîæŠš6s‰Èi1«4”Y€œÞúRÿ½‘¥ŒI™cÊëæÏ÷ÔzƒÒÛ֍¶ˆgWuWø]ʳT¯²øWÈÜ]«–ó8\_VpÜʛQ U<¿ú¢î+z$:órÐé§±Ï3‹™‚›¡…R,’i’i’iW 7¥±E¿PŸþsM…"§Õ&b±„Ùìó Ç &Ç Eƌ‘3~=%¾¸aÈԜ¼©sû•MDTaü¦žåଢ଼ì%bÁ§ô9©ð»gÃT‹r[•w¼­HÛÓúa:¿Uݍìȇšq³ÔuÆë eÖrÆf3©Õh9ãñXˆž8 ãŒÓ@Ù$Òy3‰¥ ô…ξɔ‘fß'd2µQ°(Ì~CQÖÖ òì òì òì 0ûM(Egßlj 굗…”~aCh[Ó¶.,ºz]œËU 5ô!…ﯯ­­F3™p=¨žˆÚõ™0ó_Až/ë‚óeZh?ß Gî3™\d'þ%•ùðp¾÷ŝáHµgöysMšËxRIZ8?UIŽê[gÇr•[ê£ÕmÎÒêØmï‚MÙÆ¦¾e2­ÛÚc±ñª9ü ÿî„òA¦ß~ Yÿ´¡•Û 1q¢ë«bYøËõÏOQ†ÏQt¼2-ɶ ýûž;StØW5ßù'·æ­U¢˜ÐZ¾›%­¥xÿ+ՕT¶€ÛDñÔá-ÿ#ÝAœõz!MMZÀi¾zþ52LZJmî«GOûԉÔÖ7æq£S W�þ£ç%Á‹ƒçÑóäÑú©ÙE~‡®( BK¾DƏGuT :ñÙRj³U°me¦³ª ¿~#Ì9]%FÈx<¹þªN2Y)ü€Ix‹Cà_M½ZùvêíJ~­a­é¶ÔÇ©+©J“WÇê›FÈ=‡JEQ(EϐhrÃAcö(µ¥bOÓ/”»lԞr<ÛÚÖÜÚÒÑÑÞ)Š-íí­Ûbhéìlélooëhim; /E„”n‡ B֊¶µkãښšŸ!w£zTNíñ0²à]–ç-Ç,'-¼héµl³ì°ðÈ2hÙhyÇSÕ§À¥M§]o„>Z‘’V˜á|9?…‰MÍ\a2ÿùÌS‘í¶J-“$;¯ÑÞ½¡©­H6ŽÙ%;oÜd— D‚RbŠ]˜È^¯¨”»ŒI¿³ª,§ªð¯]ÙQæªH·4ö,\_rk¤ÿ{w<\܌¥Œm«¶\tæ}ߥ‡/?¾;€¯x9=¶ì^þ6;§Ý‹:Ä ·§ð|áX°)Kÿe²½Y’ɾ“=™%YüN ®ázòËó‡óGóïäOæ•ùq~gyVŒ•Ç9Ÿ{kœó©òþØ|$>Iqe½C€w1-üaa¬À ƒ…=pÕ¼h² -ùžü1:<Ÿ—Ló�ô¥ÏË÷6R¡VԅŸ< €Œ”NÈH¿TñF�i’eÄ2Ñ½Ôø–îFˆþ¥REP¢Ra\b9Q( ßüUáÕÜÛÛ9~­c­ë6ácáãœBȹ¼©2 BUƒÐh „¦áh×P B㗅Æÿlç´¶Îö3¦wQÁ™>½“ M{WW»J¡à•˜Nù4 Nj–ß-:[ø üVþ¯à»¦OŸ6£½³³cW‡t\®CmhÚ±iÜ´ê&R¼Ëó¼ç˜ç¤‡‡ÖpÛ<;<<ò z6zÞñðÆÆDªPª5ã8/‘ ~¹H}^–þeᒤ\ýEÉaSEm\X¬ÿc‘\vÎúõg¬[¿þƒAìFçÈ"ǝ¾nÃú3×­ßP¼ô\_¾Ñ§ÈÝ縜Œ¢7Š#£¨ÁB/¸Y §hvʵ„iö 2Àµ® ®Má—oÄ9/pmÌµÚ Í®~©ö-õµü«™W«ßμ]ͯµ¬µÝ–ù8óqµ"Sm³ðºr(]6ցQƒ<0ªé€Q G \¡Õ#3ªç¡Ý‹A»#TÉXсw9 ó×I/:zÛ;])†y“|£¡¸æø¬s?‡Ü¢eB՟Ì+òPpŸ—bìžZùÇÉËôÜeÒ¹¸ÿӇ!S,~òû}lÊï€}®üôaV}\B¿wò¼ÏÇöJ‘šO÷!ŸhÄ=Õ¸š3 XÀ¦ ÎL./Còuóó‰HÏ\_.cªùŸT²›B8$ã.T ò÷Mö" ǜöÉ:¶•´tà@džŽáÒAP{+—á×ø3õñ+Žß‡6üL®¿õÉJ‰|¬‹Õ{ª¹@u°š«Æ38˜Éd–ggNf–ÍúŽg\OŒÆf•Žö¿Ež¯{&Fk˹c9,æöä¸@.˜ãr¸¦o¹pXà‚BFØ(œøSfR]M ÿÄø|ҕz —¡N1‹aúïX˜ ãåá­áá0ÃØ„ƒ|MV!´Í–3†p&´¨ÅõP¢ŒcÉdNΣû!ïFÍèWbòQõý¶$®X­x9u$ó~™òÎô#êèÈõiܝåx+¢Äqoªíôý }šÔ #äšýJee‰‚Þå忪„�À¢Y®¶ÎFKƒÙ,ž,“A²øPÔ/Ô© Å[ëDM.G7ñ”ŠçŒÇƒ.W° øPp‚R'Xgòô F…¥Ê ÈA„íöҐ˜h®«a™‰ã)/ulÄ6Çd}kpÃaž‡¸Ü Å!-T”’”r”’²cWj5Ét¢ß£JtóÁTÊi7›x›4X´8 ûµPæ·ÛµaÌ®ºþø£ÁTYœT”†ÃÑÅÓ� gJK£#d›hI—C•­9é‰Ô(×ò7Žg1Bøvàlã2‘µ ó Md$!5aҀYJ-l“Ce!%‘Û/ÜòWÖWTo\|ÍЎw•ÝÏý8÷ÍOC¥Þîºöšv“ÙÝ­±ÄX¼¶]À›<³[;·œ¾A¿Ó\5ïgŒó=íÍÑú† Ï®šºa¼Rfbæ@ÆLc¯²X+ܐôÛQÝÎ?ÆßHáú,ÑPæ®ç8­ÛKˆ™™î°)õZ;±šÍF«Õhô+ò«”05n†‰Æ;°8¥xe;'ë¥ ò¯”Ò¥ ñÄxÓaq°ÔHmY^soû…§~[Û¶Õà´- &˓•A·w–߯ž>Ð\_Vïù[MÛ¹AßiÜêtîµb\_·C(缾Nœ ÚþRþ”Aµ¨÷>…j QÜèÞȾ[ÍYLPÄVEªIM[u[˜½²úòš+²ÖΣÌ8+ªªó·N7Ü¡=hT•ùkÊëjˆ2ÆQÊ\]µ½šJàØûûK̂ºæBcÊ©FÏGœlfÒM-M\þR¾:‘F#C·)ŠÒ×å;}ПöXlu-¥ ž4չ﫮nHA-°À¶~Ò HÀۄ]‚>vÔ!ÔÒÛµ´4€Šv›]¾5T,çÊي+izŠ¡ÛEo[ø,=7“Ÿi {hØl¯¢oAO8l†¦Jš.訉u:õá&l³yž h± Á ‡É†]isútadt:}>d6YÊáDösVn&/£Ô/õbêJ´?ƒf†RÆ�k’ 9qa¥B’UG4z£ §~ò0ûAÐü¹Ñ«>,çÏǃ‹žü÷²5Å'ò¥¥¹?/Þêíõ¶ccR\_úzêoÆÖ™Ó[ªj•5çT´å×èÓ^}pñú\éê5ªeKÇ5ŹäÆÉyK-A ¾ZÊñÖòå\OùîòÃ夛Ê2e\Û/&9½iÜ#Íí 9ÅÑÑ5-¼Ö´Ö¿\Ì+Í3§×˜ÍŽÒR§a‰´jTjv[­n}€¡A˜guÌ­QәK³EKÚv²&NLh˜¬Ô¶”-N’r'º)6un&Ö0bš³¹04ûìÍáPÓÚ¦0^pkLLJ[<ùŸ•íçÚ¹™I¾sn)­M·cՙñDpɆœwͼ%éîL]˜&zï«£û':hSc5–5ÌKºw‡Kçü3ÇNP7 Q¼Ò…Ha¶ ¬”ñ€þxFŒ±Ž/N±P.D?/1Rf¥vJOˆ Égå ¿ÅF¯ñûèÚY@-h:ú›Ø8- w \Óú ï)©åÎõ]é#\³²¬Ðá•Wrú|®V™A‰€\ñAhãE×ÎÝ{ƒƒŸÁi™iÜ´ib›Ugƒ…×J v< Ç76G«j9>Ȇñl=3)Ë7‡ ÁFߒݐåŒT^¸l¶™¥Ü¤lVƒ»GÄ¢ØA™dZÕ¼Ô[²A¥8Œ¼w “2€«°-Ó�[˜)ú˜ö¸G!6^Çò°ä&gðª H#‘Ák3ÏpOužÌ;T6"H):NªòT »bÁò«.Z¹æ‹?Sv§­k@ZÜïsô¬HøBñûnªojò/°Ç#«?Ãï5Ïi­È;ô«>û6óœ»Óažå—Ðkk­Æwږp÷¼¥Dfe”Þ´}as\_ÿéûý8X3ìOêÕgum^äN¸cŒžÏ .ãÐøÃ“v1µwú>ûq(úT@«D3‡ }VgªÅ¨V¬åjañ+8=ª5Ñ¿0ª«¹ÁêÕǪ ¢Ü)V÷VóÕ8I Á E =ÌR=¾ÁDƒZ�Ü SLØ# TÀï8aŒÀúõNíž6ðØ“©ÿx}uÜ??j{ëûxe×#gç®ÿ|V¢çݱ\i}ÄB<®Ø×¸™Î3üýkU}óµk³«Ü[ruŠšÕ•µ—gk×m·77ÔO¯M¼ÝÀV·Ñ¾SE4-ÅËEaÖÌYÝ\}÷¬¦Y­¤¼»®©~&qÏ,o\ŸIJšJfºšÈuM˜Ú“Ùìf»µ¸Ýv9²l‡È²éé¢cæü~<+׺ U¶¤<K‘QßèK÷Ôgêãúú–@>byy$[÷ —£N C s»[òºÝ^¥Òlæ¡´�öŠ®€ô¼c^…RvžÏvϜÞÚÞÔÐ#FãB,O4]œÞ; éxúôvøº¾Ö44ä2} Êø,6¢¬!55 GȖ'SrkY÷»Nº8¹ “5,aIØNМ­‘V(JÈMŸ dS $YšR5(CíRf k×È{vH¥DX®˜ØXæK"ÛVHѪª(+»‹Á^V? �sX¬ Àç Vóãϸ[ʄŽ€s¥åf3gT(¤Dƒ|Ø‹«mÀ³:áÑ-.ۚ§cµÊÝgÑ©Mó3`òzKæÆôÛÎp¯ ¥ÏÓu-jÜ\¯.þbÄåú–ö™,zUi{{,&¶®ËÎü,\tx6ŸÛmvÙ2æTnº¯øÛoôØÛ†ï05ԗНtNkþ%¾¦cöhùi…ÅÓ Øzëô.½jñÝÓ8÷!ÍX‚È…Š»&º†hFQ=ãÀ.ю»pÀ…]x§k—k‹¸&=BT¿¿Ê:NÜ<Ñ1DóÜË ãÃqîh»Á!h,.ÛIõ}ã¶ÒOR󊡉u ßNuó#Êö‰;P½„Xæå6ÝQ݇:ÔíÔí֖}ÃôxXÚ'® Ç[)¦ûЋ—{·ywRÖ?½X\Eî硇І�U¨uô§àùå ‡ŒqœŽ÷Ðû‹óqn$ˆfã$>žôùŠ a”?|n”J6J%NWöTWŽUò•ÜžJ¬ÌTn¬$•§Œ‚¿Sôq¯Ce{N:ÊØ}܃2ñFÛ6g‘vÓ¢ïÛDsIΆ‘-mk±QíãK¤=|ÍI9Æý½Ÿ­ò Àý¤?ö¢Ø“8zÝÑQL‘].‚wÔìôrÞñ;‘¢ ¬¶‡ŒÑósòìýr‰œb £T0•I‘”|Ì�«‚áž gäå+ª?[‹”O2éwX#îãÏïåBTøœb9˺M;°ï±bd Z·Y‰uï=Þ³„?KêæFm+ÆQ™èŁ Žù4õ=>¼Ñ·ÍÇù&|òPÛ@Ás·‰¿iQÛ~4Èvnü–hcñ ‡µPš¤.¬Ô’rÉÁþ蔄¿Ig{¼‡õ�]báäfù&®Ìf[Cꆓ،×>x÷C7¼µ°ø6t&ÿ»ë­ÈƒZžt{žc™ÐLDG•î½b QuJ½Þ;O˜”Ï+9%ò€B²l“ôjYØ?6ò CÁR!Ÿ3Qc¶«TJ©”)Ä¿V\ß·:S£PTÍ­ ð€¾wtŽ‹NŸvŧaՅk/¤¨ ~³ÿœ•¹¾•¬OqÎd'æ´|ò û¾qJï°a¯øä7²ÿð¾ñî;,T'u.¶Oé°ã\þÉï)Ïý�:ÞóÊj9:¡CO"ALp?6úþÿ1?/}öó~îCF¾ oØ·Ûwا˜ …st´«Ø?} ¶²Õ\ ‚Ǥlå#$…E½C„[=aïsáITº‰õ¢#í"WOt ê¦w q_NHq¯±ãæHÇQìVú$ŽJ}EuŠ.GGOFQ–é óç“üô‰Eí¢ï2í(79#6A†óI>l:\÷)JžÊÛ8oóÝc?EO ¨è¢w$Ò#êœBÀÓãáç°‡óL<×ÄSñmOuNw€\ïŽLtUbWhœx¢Óžù„êM#‡·‚ª7D¦ŒŒw ’ïè…giNÃ[Л ­­œ•BpÐ:½6TOm—·M¶îÉM>Õϸ8{\½/‚nŸÚK%í?ü¹^\Ÿï#D9jõ§?G"µS8“êIqGY÷ ²!µ;uôÎp·${’ÜÖäprw’éçÃI’”­$½ÉXRÿ—{å‘ßބêÅ$66›š9csºùhó‡Í|€5Fò«fŒšpOÓÖ¦á&bl:ÜÄ5/FIyL‹ÉN30&'ËÅêÉ^3ãßSm ?\CÛö)ƒÀOï°nEG”?(ySùf ß]¬<3x^çaQÿ¹ñ²öl6ª vôd@}ÄÙþF¼Îá÷ùÔÈáSP´?vý¸²Ê2ïOÖR'7ßf̀˜JÚü ©&j¢¡Ïä €lø¬jJÔ3ݼ䃯Ýsÿõ{Ü¢ùV“½D³zɊR<ëÌÔϟýÕׯ½f ֟=¯qó–ݹ©Lésu¸\­uÛ¯<ý‚Ý·.o\_LoZž}T™ÿ Sä û7}yS&KFÔé… l˚Ɉ1|js¦½Îÿ£ŽK}• r²³ÒÿMã$ªÄŸ˜ô˜ïÜɚ%mwnÛûµ¾wn¼ûO÷ê~gj³¤ëò•§z+vi¤ìÙ=§ôG’í2Ê©Ôjƒ]†.ã´Ò—K\_ö)ž2òqÛ}ø¸Ã&|Žé2g4bð-a÷WXÔeÊæg©¥æA%EF—9To–h&¢;RÀLšÆjò¦Y’'ö”8ÎÔÝ>œ¿;{çå×ÌÛpýÅ+æüaë\_gBðR3´Úà™ëð×.3Š½u[Ö_b~ˆ+Û6“ãÝ:(O%Ñ3bͅÜeê2Oó_k9èWÜÈxÈHV™Wûo1’œ:kì÷“˜:b䦱2 šÍ!y{‚\ ¼ƒ>ˆ[9ÖÖr=EI™ÅtrèKg†¦4(¦D”]€y &°iÛ­MN s±°î� Rs„mß& 5:†¨«‘IÀÜ Pž‘YF¢§î†2Î#ÒJÿļFkË .ýÛïg]}´ ­lL”õЂîÃÏÝ\/†T©³0·hys·c׿m鿺ž²2“xáÚµiù¡}\ǒOeë £Ž°ìV”,wøDŠèp Ô1–ð“\rR֛ôèþçØÑÃÍdC"3‘ +ëüÝllY#b娑‰µ f¼ûøÕØÊۓ–Ô¸YÚuô›c‘¤¹Ðé¢ h)ê\×¹n#?V(Îãn爳á}T=ZŸ¡V‰ dhÓh0ލ#nºGkB޲þI^ªNB÷³(f¥p,€;4° ÃV#¦\îìôy§‘[ ‹Ooßx¾Ã¨ÃXYwf׊»Žr»n4ðÝѦ…áEÖh0dÎW?ŒÕôžç0´0ùP·¨»ÓÝÔF+5›5¸?-É û7òRSv\_i©:BÖí3ð Æ0l{”w³55,è7ZÃú‘°ÛÛ„Ç ÷S¶ wÈ»XȹžÕÎZw×¹Þe÷^=è4èçlžµ#;¯7\Þ²eùêoΚë 6V¶æ/\þ„RÍ,¿Rà9>ñt9rSԍ¼xлËû¼—˜¼Aÿ3¿ºôdüzΣÕÖ^&ÕÑqEÜ\p"öÉú¦qw 'Z):®R\¡•q«æÌYxƉëñýFñЭÅ?ì¶þqï'U‘íWݺ·s¸ÃLç8Ó=Ó3Ó=‰I†4 IA�#9̐ÔEWDwÅÅÕŮaˆŠ &WÞ{fwŸ¸»oƒoYú†]§ç_§îía®º¿÷ùüÑépûÞî[§N:§êœï×TT$šï{±ú-z¿ ³ÛJmÜ)r܆¶mw½l#7¹n·Ýã";…wmÜpáa  Òt†²1D3gŽøaÙ)@¦î4-ûȍ;UnÏ>Ú#)òÜh¬®…»‹D@¿…M¾´´j!èãR©~ó‚Fg5V\ ü…ã. Zò_¬:Õ®¿Þ¹°el0¶mYõ°?ç@Ó¼fóý/UÝö³mWþ}ow?’]HA²£}Wþ1rîÀ^VêòæZÀ›ô¼WÃ.¥ØÑ³‹¿†=?‘ºÒ̋†})Uþ¾›»Õ¡/¥¦ÇÖUa#RÕÔÔ ¯™\3»feÍãèѐvèµÐ»!«yDõÜÚz‘XŒóz9£1ëC< „!DZ–ŠqÃN®û ٌàѨéÀµÑ›‰ÈE­0-Wû<^‰JÞëå]màì0=¬Vëª ·­ª›­xŽ,GÕdu/ÌTˌæœÙlÝGØ¡cÃU&å¿(,ö1Γ“Y¹WdÐ)j‘é;‚´ƒNfä¥!ٔ[”‰ E+ʋ[Xù«Jƒ4#NÇYÉ ÿˆ 1ÓX–Ò<¹¥sýSՆÅe—Lý´:« 'b9»×î+Òé6•ŽœÞøÉ”‘#"ß¹ëŒG›Þ><|ù-ß×ýYæfú†NXÞQYfJ$ÓTVªyòÎΟªÖ/N_rág5¢­.²àõ‹•5LOãlw÷ø¦IÕç?÷î­X÷<ÒøîËׁøÇÝ_þǙÅCOé¨ôÕSùLJ.xmí¶üG—>ÈbjG2èy)¢ObR/«)^ö¸þqêJÖ§©k[\L½ªÄ»¸è³ ϚŸ,îÐÐ~0©yނ×a3ZA/ú®í~ì7î#+¥"‹ß¿Ñ²É‰–ÕÎbI«“ õÉdIIüªõi²¯§R£†Éätï訇uM¸ŒôÉØþN×qk¿ÄA½eíVyN“êéK %በaÃWÅ.˜‘ÿ’ƒƒe‘ˆÃW¼¼tPP ¹µÚkºGux"?Ĉ©S»¥±Ë§ù,“Î/Ÿvñc”yZZ‚«æmر¶äöüýžÜí¨='Yo îJÏv7Ïu•ë&áAWM‚¦²¤„špd#¦J£E¨MÕäh‡slbHô ‰€Ç—)K·2¡€‡¸t‹¯ÕégÉ2A&yö0™,ÑÔ§,Úɳ-j¬ªªg Bõ2…f#T2Ø«Û×h±€àÏ0"kC2�¸&Õ?¹hE飕\4óOj½¢}°¡nÿˇnüÏÃÓqëEð72…^üàü‡º6ukþÃå«~Ü»eõ’ëœ_^Å«ðWù{§®Ü½bòƒ¥ÃLr×ÐQµ•Ñû·’w¤y®ù€ðºð ì1¼›=)‡ û³G²DËZ/‰ØíŸ’̉9.—Óœ™rXµÔ Ž>€gÚmPeº|“h'“éx(Dt&Q(\±TŒ©HCqþ’4¿Z^¶É¤ŸN§þ>°I€¤N˜;z,acP‘6DJg ü®çYb‡\Ì =eÖ8³ āsëá”ôù»ÑñV÷½QJ»aJW™Ü Oɽ­Þ÷¡¼^é‚zóZU÷°H,ò‰Q·¿Á©GЎÈB;¢óZçÝjü÷ü½ã†\_A{a녾<7ùQ ºA\ŽV¸Õ‰¾„"gQÜĂ�°&\°¬£C11ÆÅbÈ�±û¨ ô™'Sw‹VDLLÀȎívYM&>L½'CÁg2dÉJB‡‹ÅŸ½²°¬…埘êl»ä²ÖœC1ñ%مW·ÞœlINjŠm:í½;ŸôÌ\_¿ñéûxèý‡F[GاÖFº£Cæt»ÊÊ]K—jÚþ;øµ¨˜Zò¥’ý™È®äk‘—“üUxޜ| É/;ttTŒrÑ(5ˬð‰L݃Íz­§ÞÐÒ݄T°ûÈê=øµ$=ítý²ŒD’ÁM5¿·QÎ]bWb;'\AumKb2tøª 8°¦aôŒ2Oî¿uĜeÏäûzO´ŽÄëñ'ӆ\_>~ЏÖ\_Ô=o/§½øªY'‡-é,\êõŽŽ×ÞswÅè!£§Þ8zË<@ådsÝZ¢ö÷É?J¸’éú‘äËeª­eû“{Êȕú›ô›¨%p@þKD¬÷"Hó„õÐz Š (Ô{¶0ïfQ¤ÓÓjI‹ÌO¿½.N¥°+¨StúlIÈ:]F¦ ÎýúLú[„#  ¿Ô3xbùÌü\_{\_\_žÄáէɨ×J8TgÎ<%¡ó:û%tÉôSòAŠ>xQ])9öď„ÇÉîÁøþ™ì¸ŠãÔv&¨=‹˜6 ª œ¨3ñ&Ï«Ôj ˆBTãTO«ˆJ…©…\Þãb”܍ߩ•Õߪu§ÎR‰ü»çR‡½çîîÓ[ ÚDi´E¢ð\a¿°'Mõ!ñrZ}¥n½n‚\à{ &ð9Ù"3\Àëi(D, sÛ­!˜ÝƒÉl٘€ÄmŒw@«é7qß¡-gë÷ åtuðJ²:ÄΔÎiÊPtÕwµ$Šu –äyyýáÒQ•áÌi|º¨)Is)€%kIh#©>y£§“í…¥äL7eÜÑoz¡ÿ›¯°’U¬( }xcÅÁŠcTðæŠ@Åö R!3‡ôïã£þ;z±ÿ{’—+eßSŠ¥¸”«(99Ñ% K©S%0ý¾.\ÿRÿõ%R1WÁ®¯À \ÁUdfNdHeÊÄÀi߀0ööã\_æ¢1ÌQɔ-öÜ{.r;œ \ ÇîPî?Iî꺜5IÃL}bNñå+Š—¶=aU»Øþþ…Ór.—I#FåP…VÌ!¾ßIMÍmÔÑóŠ^ÎëUÅ ó>rÝ.:ÿ‡ƒ¬Ô)Ž<6Î{ÈsÜÃy<Ép„Úç%;9€ºbGrpê![³(›MõZYுå»U uîTiw¤býešðÓNîÕ²-m1TE5vÖÖà¯÷N˜²@j¿L0ªæ„F,X¹pÊðÛ¢¿Xñ8¾óä^Óàü×Ëò–š–»êÖ.^¸Üª2Æ¥aƒë’!w8F.ےÏwÙ¦¯ÁÓfÌYŒ8\Ìö ®aUbÏï¦ßoƒ-¨R}±'©;ÿµê}Ý»áJݲô¶²ýº×UBmÙ(ÝÔÀ<Ý܀ JEÀÒÿà$ûú^•ŒôEÈi(3§Du±õYrª\ïžb„Jö‘{yC¨Ìɛ3ûÈՒÉn/N‰‹ÍkÌÜ83ƒò•´ZCÎlFEÅtÈ®Üi¹'épeR,aí¤ „Î <©o¢-±¢#ÈÓ7–Š'"¯²¢Ùþ]¨þ$Û£î^rpý+—?\´¼¶qՔÏgë¥K¶ìè7$»ivçæU›þ²løu7¶æwÍÕ4kñ;7ܲü‚r‰ÿq|óŠáɲîQMkÆMY¾òÚ ç‘GB—f²£åèlãž@at“ä{L|Vp„¼x9È/à–Žp/¹ßp Ä#­~›ZëøÕ¢(uüélÛm’IëIÐ#¸ü6«U†Ô—ËWØyk,ð‰3U9yJQ: ò„ý “:l¿É5D°Û[Ъ§tcÇ»s†™½|NþŸXœÒyMerú‚Æ3þöÊॳ6÷^Ó]uݍµX6}pwí% ÷<͏ã?é»x0¾Ej+¯Ý×'Û+þjñŽÈï­JꟚð‰òOÊ9±¼½ü Ìò+gf±ÑÈÎ~M>{u%JKAVëy¨æD _Ãr‘ûªI{õ¸êƒÕU‹P({Z†1h?~Ç/•=.ëB&QRãxc ÇàULMZ…¸”^õºüËÝUkÁJÚ©1çÄ$FI)IŸÇ%ÊI§ò³{ìˆÈìQ¤çÐ5Ô«¶qdp†[\±º‚kg3 ©˜½$3Dù Q€XÓ÷¿(´‡[œÅYNf££Ö\Õ¬ªƒU¤ª�ŸÑ?“ìåï-p@ÑkÏC !ó 8 ̱ 9)ŠGFE‰9ÚNýçÓÑgå/ð=ÑohFv–“fŽö(ŽrRdc䃩ˆŒ‹l1Œ¬ŽÈ€o¡±ÿÃùµüZ¾©QU ?J%õÑ\_Fßs¾ã·E÷G8ÉúìD¸5¶‚rýPÔM'€q bµº ¨ñtjójèl³q7ì5¦“Ï’›EÈ­’Þþí€:ÄÃÔÉóI$…×d°9³Ö{’ê/ë±Ã‚õ—‚{Ü[UÅ=a½ÿ,Py«Æ#M>øêè‚$Ð~䋊‚ÅÎ3 ÿ~üKeO.—M yB¸ð.Y8jÅèù?Ë÷™þÇ\_}çNƒ\× /¼tÁŽúLr..ë=ô\_'ŸÚ[Nñ¢‹êo¸þá{‹¶\5¨e]} dý¾•¿‹FZÛ¨˜R(‡RÙý‘w‹Éfý&ïzäñòë<ëŠÉlÏlß2á5‚šãV©fQ ž�‹U\žœµ¦hl¼qg&“’¡QÒdÃîp(¤ÓQGsÅn• F‚±†rjµŠƒÞPɽ¡‚Þ0òè ¦m·»Ÿ%‹©·%P‡¢ CðWòÒtZÛYZJ=òÅ{+tX§K1£%cRÑgY÷ôóÐÓ>úýiÄñ'[EúƒŸ‚^”qôÎÕS´«[°À籟‰÷d@¦€A»ÍêÊF”Îʒ{-ZtÉüEó/Ååòý%ßÑî1jª~q7ž¹(Íÿóš1mx“\MY²~;iZ¸pÑ¥óϻ웷ïÁm3Þ5ÎE¬¾y•Õî Ì]‚;òoݶä;†ÕõÛmýÜmcpGÑ ©”û8ÖG‡llcl«LÚFpT¢þ\T2ZrDñêèÇQ.@Ç¥ýpzÝÿQ~B?sÛ\^GµÔþ Êÿx˜›þ8ÜEöÆ È±Ýã}ÁË« ´na.fØÍa½S×G›kô¹æ#þ#aÍ£áýþýaÆ%êÿɤAÕ8SÝB­t5í¥­„m¶b:¯ï1VVF£éFØÜM&ëö‘ù=ãdÉEï1µ–Nó„ In\՚®­Ãáy\_�¿¬Ð¬§ÿ»+Qž«”$¹¼©ŸJÉyꄍãBL£R…NgëÈf©rÿV>(¶6ƋCB¢Øº-ÿaþW/ÙL„¼þÇaxSqôÞ«¿|Ö¨‘“‘=Ô>.“,\_LJ®,jjZ˜yÿý…+¶ŒZ¶ ;Ϫ2t͸eöà†pï‡fOþɛìgï뇾©ë;ÁøŸRh$úTªR 6dݲ·³ÃÌz º‹‹™«Í\lxn875Ú[È͏,Œ-Š«jå^iJm9핝#L:êaíҗºÝ¶‡¡t°Šï¬¨€Ò+"™¡ÎGÌqÔÖä±Ç'U&SDUZšDh&Ä£Ú;{ƒ•NïõÁèw(0r i‡.Ö)÷“»�ÕmðŽNï™ÝE Æ3˜‹Û‰.phÃñÄ�~µÝª /"CGŸ™Cf3žÒ3±Êqݾ§ò¿}´Èf$áHçý—ºŠü$ê)ñö^ÞÏeöØãƕ—dÖñe‹2GµpÒªî̊ñÓÝËTÍ·e¦Ìr$Séc+.+J–´û{/Àà•,6Çí>í¶ÿx½‘sÒïTTø#ú¾AŒ§é«åçñëéŒ:Or²ìñqÛ œÆ¸Ú°Ñ@½hȽ ÀмÝLûA­Õstj呤3Ò!aÜ.í€%È: Î"òvk«ifV­B%d³2j„pü B”¨ŒúLžö–GǔZü®ü›·nzd¢Sôûæ7íšf[µ‘Gµƒ›+¢íù7óoÖ²~—ß¶G©x{èlR©¢˜¹4WìBÔ 1²u:鍪°ÒBíAxPß±{¯S²{h|ª³ \Èàaˆõ©\5!“'ÓxµôVQ#V\_\_%w ¤ÔÆðè€CÔáˆËô{tó'ðW™­¾@õªØvY¯å×F>è»äºC×_knvßqmmhؕ“olùQÍÜÕ_÷¡7ïyéÀèÑ.5)í§öãC$ï­|ÉßÅ]KÍo�͕<öÈyúÝf.ªÏé/3Nç'NÓ>²i/[Ïùù½V8c€¬Àé$?ÞêÚÏùýnÈQUBAý!¢Ö »#Ê>· ÷e6XS˖-vX¹©-¬ :Éá3n½µ÷›{\;³¿q)Ä%!ý$¡´²Ji¥5+@ ÕqÚBþhdܲº’•!hhþÍú¾ã~hçƒêßä¯^Uæ½Üyyw÷¨ëÛ„[›WwGjþsnWï?4m+Æ.øààÚÒ|~5V2?zXJo4Üd|CKz´/ißãßø;TÛø‡TùT?ãoÈ$Ïeê×£õêÁ×™ie±èyZG:ôë!Uð[œÔÁ׊9Aðí#ìÒÐP êø³»é6› V›LJbd¶­·êjX­s˜RÖõdh¶/ÜJ …l2iG§3�È|:dxò‡A‹o…ì3ò•EõH‰‹]]®§|Ûýü+îáÃa²_¿Ï¿'Lî?fxÔOnÕ_X"< ð]1$ËcE­?àY8µ!>ó?ÀG�ÄP/ô½P…xJ"VY"V«$bÜìšÑëE†…Ó×G®á¶0 ”B¿“FpA³5×@F“IÞ×NC½C‹nJÜT+¦¡\¸$RZ]\QÊs%Ön”n”ï&9àÛHWZäM •åìכ÷‘ítD1Àœ€P3U0v„¢q³/ÉñEº°á §‡KÁë) »ŒC0ŽQ\Œsñx˜¾ß‹ >D¶ÓY…±àdŽm�†ˆ±Å;Ùýø �º”e‰�rRcŠYse¥´®˜dí1ym ,_,»ûú‹:ÿsQÏå¡DW³ÿ|g©¿aÍ#ùC.j(^‚§¨/v6L£mݧ·¶µ'l™õcS–›çL¬Ú ¯,µ¯œ¼lŠGÁ:Êý…Q)ʲžQQ¨H|CòÒ ø·ÑÏ¢[ï_Y]ÓøaZݹhÚËqi€¢Ö³Ò3Ró–\_HšêLÕnÁֈΒóÊ0CɒK&m dƖɴÀr—2øˆ+ Úmá_(IþvfÃ(š:ŽOUÊt‘±¬')+$LŠWÄgAñ'Š?zÙÀ]ۋÇUr••eã¬ÐÍҝФ êtD§³…‘ÝvŠà¹H§ …:΅(Ôrò,@¡T‘ í/Ü ž@(4�@ˆŽ‡3!„ø£ù÷í>f†±ªI÷£7±¸sзêÆN}nå-¸¨w՚—S҅w�x zx±'çëÇûºocçÊGžœ'ƒ-ÉOSA¹YÍ,—cþØÏ¥¦×|ïù¸Ç}{ÔÏø^Vów{îô= &7¨oòmV“;<;<Ï{þËÃÏ4Î7Ì7þ‡‡ceœixÀÃùQ”ÓÀr”ßÏü6ŽÍR×I:Sb<z’!u‹C«C'B$B@%ý±’b]XÉë�#­Ä'™LeRHf¥cªœEç/j©£…dëhM"׿)@.k¨Ü ];jäo“ÿP år‰ÙؾÐW[’l‰«ÑêGÕÌÃcòï½¶/ÿ^cD4®¸îØøcÛ VûK¥@iôà~$‹Õ™;lyٛő‹ÏBÒϱÊOM V¯é¹ŠÊ²Šòl¶—É”WUU0¬Þò\®æÅ¯äå%^Ü_ÛÝl:w ÍTÿÉ<.mßÔ¾eŒ+0@&\\_ŽŽùB½ü}OñG3=ûåì›û†¡°äí•i×öUòÊ–Êí´q&‹³éZöK}ý¿¤Îïè;À}%‹K6–l/á7–+é+!%ýØW÷±ß[ßÿ{êüñ¾á a1+ÀÃ1YÐÅݽÇÈN†- üJß|‘o'‡Kö‘ý»K8TŠK÷õ­éÑr¥òÆãÕz›íØ ø¥¾ÅìºS,€ÀÅb6^¸ŽŽÉ»¡UüzDIô¤4øe×Ëîÿ¶’Ÿ[Ÿ´´“uŒÈ¿æêÅ÷Ã.r]_~Ëüv˜˜"V1$ª<|Àh³ÚííΙNÎé DXé‚1$zT¼ÖÐ©àš½>ŸÍi·µP[µêóÀ¸ÒA˜HD",ìËflœ¼YZ%ãÀX¬E’Íû:†Ž4ãP ‡U(³—úPmM-u;aé_Dè ¢R³Í²³¨ˆ4ƒ¬åñüˁusõ7ÕF¯ê1Á-–A¶± }"÷°gòœË¯øÒð£ûǮŶ”;íiH– MÈo^û×݋goè½é‘WKæ§Gʕ#ŸÒ#ŸÊGÐE ͪ×úG3ŽÑ"ÉF¸@nqncn{Žß˜;FÉ±!ÇÆÜ¸J=¯ÿWþQz•O²óô²–Å-[¶·ð[޵ôµù2‹ŠO´p½ÇbåŽÞç'ro +è}EÔÑ#¯ñ9î¤0žùR9ÇÈ·“nþ+z•V>gs7«QÁ¤Û…X,Ìv§ñ´•Ÿ ‰‹û{áÓ 5ŸòÞ5þ)_DT‹ôÓÏØ§†Ýe"8RÈêïmëèo›;¿“¶-"9 m͋›76ooæ76kîk&Írú©R«�Wÿ±ÿjO¾‡^–üpõ™V'a«‡}<Œ ëǎ®f÷ °oy§ÿ[¼ì[Ηá[¦-ž¶qÚöiüÆiǦõM#Ó豙³VÏÚ>‹fµÏfÑSjðÁüAÍÇ5\d±æèƒƒ¡¦³J»ÿç \_^á+¸„ƒT#™³^PÍ G¬ýGl´\_Þ GF+GÞäíÜWªåôÈåÈ£ô{¾P¡GF)G®ã«¸Ï¨~¹Hk¡Çÿùw²w!ÓSݗ¥° øÍIîåÞ[@OûÞúŠcGÆq‡{7žö½õåeÌÊ7 °òNbߊPq¢ä{JWªì‚‰§JÁ5ßÜ}Ú5Ž{ ìOà¢]Tüg\%Ï ø#b¾á¯cwèÉKôÈ߉H4äi6’<ù˜rDˏc#‰AËÁ©&õÏ'ÎüÑ™Ëøl‹éTÉ-.̗•§ÆÑ|vÍçý׸ò¯ÐkJ¥"B/jÜØÈÁñƾF¾‘ þx07˜©Ê)]Á»‰Ÿ ã; Œ)z'LÛuX§hûçDþÊ_Ɨ|ç¿#)¢G°ñ%‰“áävò1_ìw ™Á=$T²ñ¥|ç€ñu€¶]Çïá|Éßð4±’�ÿ cJ–ÆjÖ²?ö·Ìƒ¶¬H²BË66pðp¬¡¯o0zÃUêÎþ«<¯:Çü/\_gW]Ü•—]Õ$%áª)§pðplJß~ =roÇö®½cf×ÁájÕ¬óÏ'H‚~QR–ˆt&Iá|6F ²ÕQÙþ’ùÈ_‰žX„lŒÈGž§ßj±1"¹›”½ð<#ò‘Wþ±‰{÷4°ï‹¿¿�õÎÿ¼žÛñMŒÀyዟA&’„q' A¡B B?�ßó?q;¿I²±óß{™§Ópš§cïk¡Î}´ssu¬%óuÆQáòq¾‘ýy½ýÍݧ]íèk¢W—ì! ß')\¿š~ƒ0ð\_ëEþü¦ÊMÀŸû¬ïM¤Úœ2zÒ¯ø‡ð‡0Yô“g董ìÈÿÀýç?í{<¡d=†´oŒ;$W0m+Êéƒz1g/r{‚Ä$YüÃx¨‡ÓóAÌ @%¦•Éþ´X TbN$yÒ@öW‘CÈjô‚zÅ\_+ÙÝR¦2ç–JR¹™nŒ€vê®íÙÄAøÆb?В’|Z1 šé“´ŽœNÅÕÀA¦250ý‰§3Ndí Ã.tuàlõº�PžIz}.çƒí:„d]Œz\ñx4N—–$š@7¥ö‘«wµÇpŒ? ¸É’…µíNàñìh„b¾Ž^¶SåÉ�§§Èx>;àœ.?w¥RWè¶då"ÊāAӏq˜q›mÀSނ–ÃfÉ%ú‘¢ðr½ñ+“é5M¹ÿ±Ùq†‘Áìܤ¶}­Ív94­Û£šëðªòÚT8ªš4hÉH·»:ìùÏö¾ÀdýÃwý|å3SóïSÛ² úX=Šö— •¢ü¤ä)…^v@/Ûbޏ#á)åÝÐÏ.¥ŸßÞÏFš842Ãç6d‚Ïm؟S©oÔ} #èÅpIN¡Ó»KJö°˜iD4"Ì4"ŒY¾½„i (˜F”4¢´"gл½"Uq†F9ÎG,pÄò y׎¶Ïð¸JƒAäaê4 ªR åO‡½x$AUdz»Ò ,¼¼cEEyYº&—­ªÔTƒšT35ÉàÌÙø^ Nú[•$uŠäó{¨JWçiL ç֚¤?«™þüƒ=¾ñ-Z´ ´ÈY¬ÊUP'Íw©µ"·ò=œ\_¥O³ß®¼‰\_¾‚™P9r€?„?~3¡rñïs‹„u0æÿGp#ÿ7|ê0=¢RÎÙLíÓïT£aöSެçÁ\_©Úaöƒ#T›W3mî@zd§°?%•;±=îLxS\U·Á“³º=¡Ü;ܟ¹p$ºî]÷€Š»w\\®…ý“MЧsf[ÀÆ!›LG«§za³-1­1q&@#wÉWšS�I}îdiÊé…|L›# ͦͦq”2mNᔢÍ)y/YÌ¥Rfv€6;•éJÈô°üg¶»s¢TZ–[#²• Æz®Ï‰¢ayP²U�§Ã …”}TLÖg/özŽÒíô§@ŸS Ï©TÒA\ÒéŠÊÊLyY-¬Úij@Ÿk˜>WàŠs™½¥Ï ïRÌN~/…†Ý8½ ÉÀ¼ íý%Nµ¼Þ Û¾[Ÿ¹+çäRÙá-µÍo^0rD4‹¿E¥™t^vèÜIõUE¶a½ ¾Û:Z˜>݁\(€jÐÜ#ó¬†|¡œÇf«tTÕðIû[F®ô(z=Š(zb™iT‘0r:E¦Y‹‹­vbäÝÀ‘á%\_U®›ô^ڟÉH¶º&L§“LwÊAwʙî”cTŽË˃ÕLwjp¢;ð,•PÝ©©1à Gu'l¬m4êÝ^;ñŸ“ŠÕ T¬^FÅêÅ@ Çy½~ b!©I§•2ɚ Y� +¬ÞNÔ¨Ô¨¦�̓ µµ ƒêë†H-ÍMšÁ Fƒ™5à†ªFßFæúÝ\Õy&««¢W] ¹ë)Bl+j8Eïú}ì¥åÖÚæ) W0Xi¦Õ+Û-ŸXJã©sk™ð•QjOT–­jˆd%wQÖlçnÿ\_°¹ª©÷îïÔ8ôW¦q?AITZÑDnx/†ûÎAӞ..Ë9@ÔNŠÎ joubÇÇPO+i}¬}¬}Ì)ú(gˆS}d”î‰Ä”îєîe‘¢¢²2 t/JwDªª¡fŒš93µa’±(‰ÔçÎÞZUÙÔTÏ´µ´µ…ik F-¸¥¥r8ÓÖVܪh+Hu£Øª•¼ #¯ÜÐ{ŒÛÒwÄY}»¿ÆH¿a¤l\AlؑßÎ-ékgQäÚ¯\_BވmÜõ¦E¾‚\_ó<’Q”èÙV®³oHrí× T¾#\:„Ea“°U ì½.WìX šêëÑ{=÷Q?؟…¼;9ÌeZafì€ï+\_ñ͸߸ñì(TÜC¾õ’j„ñî~2—Ü€Ôèêýˆïû¬gŪ‚óövö,ÙksN\‰³WMDÈ·ÖhPád¾Ï¶SebÚ­lqw(ĬE ÿŒû iå‡ B}ö#|—<ܝîŽÇ´¹J2T–<—æ°dÖ\-Ô>ètz-½s=ìß½W­Õªaa˜.pœZ¯Õjt‚Z­Ò±²zã¼†ÞøÀû†Seù ¡&f:ÜrkXrT¡Aÿ½hÑ"¾Ð¨7-Z˜ÿÅ©–}Ð{ŒÜÜ·ŠJ\_6H¦?œ&gz»;1@ßMm94H­Öh´´9ÐD£5­^¯aíÐéðQè€oiGGᆫ�ÿ\ÃÞ ,¢”»wÁBù~åîڒ¯-^xÉü…‹/¥ Q27à¶¡ ªE¾D²¬©XS¹¦ŠHR¥Tµ¡˜/…YŠähƒÛ­ÎU¼?’?Öò%†:Ã.RIOë1ÛrìÙåÉ16{“Ý“+:=¹fgM%ʸ[gÉE£±gÈíÈÍr:abµEs:[¹ÆFTgÐñŸÉjaÀåd\²Òg ät˜ > êšuƒ4>ätTT ò‚‡ž¥?è sF ‹ïÍYÙ%Œ.9›°p,¯£y\3×Ü<ò:\¢&¨©Ð|¢á5š„%‹J:½+ÈÅéIX-3’SB¯yçæŽ:G¦GK63 VVNùè”lÄ¹é¢ú‘Æìj�ÚT«ÎJþà¦@æG6¦ÎƒÔÔå;-x»nìäC×}Mq±«Ù°»œ2@öë¼¾ü'<ÇóÅ,åk# ™ ‘Žv(kÓËõÁàwx2¿‡äà± -e˜T–µ4—e#Ëjg7Úì'üÑÙS£Ömù?h¶ë‚ˇLpÅôîî©W ¿ùTã'Õ­[·éöãk[”|rÿFt©d¾N{»ö!-ùÐðÿ…ä}W[N0àíj¬~Žv§†v'ø ꯱I£QR݀/ÓÑ4 ´aàPWLlDn‘užL¡†�¢¡\_¿U²¼õ§Ta¯íè–dE¼ü-ԏ v÷æH–WìoÛ¹/ì¸Óþ;'0´ŒÍ»\N'Ñ ;5?K­ƒ†ÙŠ&Ñ"zŽEëB:­À²´@¨1Ô/FPH ½©F±‘ ºJ©¢Prڕ¤våYFû˜·]sÜ$õþŽ3I]ÒĖ›º÷¸çOqKwûyó·lzbÖê»_œÕ’’Š¢2tXªÙéÃñ´Å‘dmjí1 ‚1fLYkŒü£¡ý±Wcä§¾;Cøˆ‰NˆÌ怿ÔcNÒ\�бÛÓ3ÓO§I<át:1XOn¦p Ú"2#‘LC锬KÑ@Qb q1q»‹éØ[Žl(BG—žì¡Ö%–À؂=H™Nuœ”G–¼hÐu²³Þrjˆ1TéIVg)Ÿ3” ²:¹ô®ŠŸ;ºmø%WMžÿM«8XŠu\4³Íu÷\/ÕRI²êZîFÉ : %›4#Õ£5óÔ?Û\¦ k¨¯µÁ=ü°mãDƒÁ'”»\´�"$z2t°=C~ʐ(-‚d¶æwä¸TyyÌË N7¦î•a'hTB§£•(Èjø-4l—‹S–õh£ˆ0€MêÏÍô0|CVɑ:ÙB-=³Á„ai­]ÔއNaW ZÕiþ~–’²\5üÑë‡^üùŸ¶˜65¨/.êÆÖöTÝÐ3¸|ÈÈèE·—…¢#ǤΫk­Ž\<~Ìvµ$•^®íþÁœÚ.ãòDóÄhÉu©ñ…ªö½TÝÔª=&¹œì}Œ;Þó¼ç%ûùwøwÌÄs»ÁÊ ÅØ£E}Yƒ ÇÀ”Ûƒ3ƒO‰²X_Ä4P¤È!LÅíf7R ´ô£‘h ßïѤ»n£š9¥yP{µËöó+vUV+v¼\_õ¨”L\´ŒLY´¼Z=­©qáU“§^Ú¦‚ "U[2ÒYQ[‚ÉoïoŸ˜rߑG׌þÚ¢8©áƒ éòAøWÔWA£óçS;مÒèMéüt0U–KÚKÒ5BNUŸ~ßþE\}ê~á~®™þCœ¸#‹“¨}”û=tÜÎ?T´\_ØeÁÎߪºÍñ\b\_%\©ºUàÕv‡½^EŠ‘Ÿöà^Žó–„ÃÞ$T”©;Ùl{ãNµ‡Fqw¢(ñ»àfJŠ9õÒX–Ä ARA8B Ɇ&Þ¨„dy+˜¾ë:Y�äV¨/2BNï ÀRÔ¡qœ 5­©®Qйe"0±¿r´öÒÿѱ¸a_uØ:|ø+1º7Îl™2›7øy§¹îbŸë²Åxô2ÏÖüÉ=Ö:Ñã͏¼\~ñc³¶Íz…|‹åÿv p…}ùµT®s©?³W séxinYá]ç}¸loÙá2U‰iŽn~1Ñrx²ïpË(¥5»C¡ ‰A ¤Z]ˆó{ VkÉ3äg(EC ¤Q9Ï£ˆZk/¬KQû †BP]ѓLæüÀ‡¬Õš©Á¤^ϳuÀZeJF§ÆÀoS¿ùÉ¬è½ ‘³åd;-’‹è"N–m¼Œ”ÝæÊe˞ùYáí#«vv'ìɺëf]ýº4AÆí>=i^í-ï֜_^ñqþo;î܏‡8m—ÿdý¼6¬\µóÁQ£¹¯b±¯SÙ¥ OODYtx?õÑNHõ{îp¯´¾Æ¿ZùÿVFp¸îœ£BgÈyŒî73ªõF}HÝo„51j‡ô‰¥…'Œaµ Ö1'5ÃrÓyˎbT©w?ñ¨Á¢Q›®©”áYEK ò’Úê¥Èya»£?cP(øžŒœ‰Mý™džeéŸb–wù9VÎ ð®~:£2� “2T›ñG¯k–Ê›ÎØ8¾|iþ¯«ò«gÅt‘ÈÆç¯¦ÓϦAÙw®Iפ›Ê»»³ç[U¶x£ƒÓُ¦û¥\_a³þ© ‹–áŽ1’×gHoÀäÒ áBœõy…F,÷I®÷“ï—p/§ßt½•&ËӇ-Ü%XSLX©”ƒZe„ÏRKk£Êy“$b›M‡q‘ÎB¡Ä\º"òsnlØ­SȁM.ƒßp&Òëú×U <ÐXFßh‘˜Å“ïBy䀘É5p'VŸI „ÍœB¹ ƒºœƒ…uµøãgeo›´pþ¦¿îÀ—Œyùš¡ù_Í𻤵 ç^XR7Nc·ƒ>ꓦ-·Á·\iNŒjm랽ÌT6¶b0n¹¬kÖOdÒÎɍék"…ªïIDB~t-¬_—lt‚_Ám1pÓ= =Ü?Š±Û ¥cU2é$ø}V}Àcþ�¹ùÈ=ÔÞ°ÓêVCÁµCi³êtZ­•ã€Èf…R¶ØTŸQž:NÊ错 Ofå†Lqh™Oä”P˜Îð“„Òò‹&ݏcƒ.;véÐuwïÆÍ=5Òô+fsI¶6nsÏÜ¥{w0©›þӕXK;·2~½'Y¦Q-^$kcÞ70ÝÈQì=Gº‘¤5ÀŽ+¬œ;é(öҎvÏ n‚îiGÖiG&ݲ†¦^æTɘ.;#ãÄö¦9óYiH¡oICb9HéxYYêq´büPœ‹×†úÃ?…Áí_î+u±DFðöƒòŽä’ŽïL=!J֞Zd42xËyöŒM®.¿hõÜZAˆNj‡œÊXÈ ÎÚÓ±{»ç»îÚ¶÷g̟öލ;µ/냺MÉJŒŠf%9ãÞRRÝ~VbÛÝÔf<™måäßHP²ôg$%þŒ$뀌$k¥Á ,i:mRe©©UK¶³Ò“l…ô$–v®¼¤Ð¿ÊKª©¨­­—u§PW‘üƒtçT"Ò÷ӟ³2‘:R?<é_+Ô?¾¯Z=yV†Ò÷Õ¯)L¿f+yBCðAi®[ñX†@ºã{¤ e@ûþŸs†b3dø÷s†¬r†L9‡£nðз2”¦îmmÝÊòž•?úWùCµ•uuƒd½«éàîôˆÄۓ}I.™1˜[­œ¶WeÕE$£)æ³6‡y6ž|p6ž-6Î@ 1Ái œ˜ no«œP3Ðv‘T?®~Mý¦ú­õÓõ‡ê×“úÄäí‰Å ΜXØ˜ –Dô¥2̗ÙËreÄU†&ÙÇ'bú”ž˜²ž˜ŠÑT<²bžu™Bêmu„�QëCH™wr[޵|ÐBZ¼#‹FÍ˜ÛpÛØÊa㫆Í:ô›C‡Äßtß ¯2GÅãò±7”c[Gß8Ú5££óðGé㌎,}ß ðYGÇQ”9ÔØøúGO Íè8J/¤—?ÜÿÑo½5£>< ë«]Gëŗ‰G¡¤º Gª#ÕYþÑWY5q×3’%SŽUgcöHÄ"cSãˆC9<ÐG,\ώ,¦3‰ƒêŸücÖ�€¯>ÿÈóÏã ï] ¦Íîúá½yþy®çùëóë¼íÖÍÕ­½ó¯o„#Ïço¾xúô‹.š>ý|cc#þïçáÆë¹æ‹kš¦Yg=3ÿØ+W^Áí¼ž~Þû‡çŸØT”'ÈcßÜÒxý}«ðcKjƒÅøæëŸ§ïñª9K—Ι»té‘ç{ÿÐØøüõøýÆåWYwç}÷Ý»¬sú> väIdB)OH:ãþ:gmq­\_¸‚»BµR»ÒÈ«­j¿ËêöÎUÍѾ‘úCJÓ¬·­/~(°'ð®ê]íÛ¶?iµ%\ˆkK \µP­UÁƛËMlŒÍ‰¾0iì Ý×÷N}�²BK_pp”† Ç{‘´ôïÀaî¡Ï°æ¼§¥Ú斪CpBbäèœ9¶hºb1>æ#ú˜C{anà­�¹Þ¼&°9ð•ù«€€s­ÍÕ³%ær.™,C1 K̤QÙV ¶¬TÇðÀ> FåôNÒ´!¯Þ2GQn1ìÀšÍ$TùŸ$\_cuÔá2„,’ΐ³XPèi]®Y®C.Þµû‘dR…ûúŽùNø>ñ ¾ýø·(.~ÑAû à\_S¬› —XuÒÎBrÇ ¹O0„žò¿S‹­Ð0¡HU笄»jÈ?ܺõCø›äµ¤ˆéòpþä /æObëK/Ü-‰·ßóßüüîpQ/•üÒÆñ³å?Á¡CØrc,™FÔØªPúHrÝà¼Á»Ù¹Ù˯t®ôþÁû%÷…ó ¯ÊõLßWÈÛ÷ÕN¯è:@\_:é\_†ªi,F}í Éb1 ¦ÒÒ0òÛt¾°‰sÇxm¿ðÏsaÿ>îA)Ìúüf´mDÇÑ $,Ak'¢ z4?g¶ÁId-œ%k÷kM:8à5” ­¨Ýª}ZËKÚqÚZ¢•Œ¦œvPVü"ÕÕùyo£Øûy}ü¢«³£÷ó^Y÷aPW±Þ5Y ܛ€’ª««CuuTñ-v™n_6DÅK³ ¤“’WEHïÿ>úÛ+›ZëêpM]Ý]Ï]·íòì]uu\_µl üªTõ ¾¹wÈӟ¾ä î¥ô\_^¼«ýxãkcÐÙHì4L£2ßB®¡ÑL¯¤÷ht®Ý .™À4~ùK- ôoá9AŸ¥}!ŠF[\Uì÷'ìÁ˜!lÎàLFP—‡Ë‚\cئ‹…œzMãÄác0YV²{JÒÉéC…mñf³Sh?ÜõÄ«ÝÒÄκº—çŒ=ú8틏«¹¯@ÐAÿ¤L î}¾´´ûî¡S–sþTiï-æ€ë0øya™¤Aç©jÉF£'KN%54æV«p@•Qq\X‰Ò›s\•q9´“çõ4 €í@ˆªA° ƒ%dºNƒ#~½ÏTœÿu²Ø¤jZ,jí>½ \_löûuý½;éï¥ÿï~ŸøŽßÛ"˜¹¿ª†ÒßkލÝf LQ’´Z]»éƒŠé}~†Œä¤åy¤Çz¬gEÄ´³£„:Rÿ1þó\_œ$evýœ2«2¯{}ÊþºÓ–´ç—h'³6ÖíG&j,´™ÖL h2N£4S£ÁÐLBtg4±V \†­R#i“¯$ÿÚN½GU#ßo^LÛé³kÅÅ𛿤¿9ãÿö7³ßõ›‡3q2ÙVï6‚l…‚l ["[ ÈøÉ‚H³(r¼Ùq¿6§<q™SÄùÕДÍùº=¥<@ށŸ¼\¯ªyÑìý€pºGKç@×ü,†š,/~§]²3ònKÎîz†Û€¬ôÇ9öá÷{<:!í>&‡<˜ñ"Y9¬e3Ià‹o9šB^·ØÖûÖI9û"…«jûca…K¥†þ¯®æºÆpëÏ3êü:Ó²¡mÜ ¿\_¸ª´!®öôbtHv’Åäñ´}¿,láþH%äFs÷# ËüJÐç݇uŽìuK¢3çvóp™È!$]Kô”ÃI,½Iç’t’ÛŸÓé\�n„áFé]+/¨8!Ñ\_&Wï¼zÀ3»à¾ÜÿÇޛ€·U\ óI–,ْ,y·µ8¶¼ÛZ-)qb9Þ²;›I€˜ÄŽ•Ø‰cyMb({°JK”­,¥a')KҒmICÙZZ¶ÒҖ–@ØËù?3÷êJvJûõ}¿ÿ{”xæÜ¹çž}fνÒÌÝܲÐ;[¯Íזœ½ ççcÕ+¶Ù,#%ÅÖLÕåäðß©\!‡Aæ<Ô%l 2sc³¼ìl ˆó€?t‰ÿ€ ñ¿içÃügnǓUÿø=ƒ?@z%y+¶Z±ê»Þ„•;Mæ²²E\½å?ügV¶ü÷­¼ö+Y¹Rµ–Þ®®†;Õµ¤Ú ù>ñzÖbþ- „²òŒF}^•&¬ ×ûoÐൗtãúª,è½0£©%” ¾¯ˆ—wÆAèÇ"ŠË_’Ki.ŽOÛ¥H ‰¥D—î¨Hs†JË[fÚËfç›Ë½‹g7µÚK–ÔªR“¡ÊšÙ^Ì-Ë/5ß՜’«Æèíÿë’o¯H+ –•6öϲ•×d”{Õ6·Ú‹ÛÓÕù¥éÇJž’\_-$ߘ$yåW|iÖëYG²èô tþÇôs J˦jÀmŸ?­íOaûè骍(ø€­ƒü‰÷²Àl¾œkÿ½M~^=°t…«÷ã½aþÔó!mš šÎ›RS³öb#ß7K¤2AYê¼§AÚ!dÜró|ZÈë©ôþ1|ŽÙ¬q—/ V¥²K,Þ¾}É|ÕÆBcn~~¦¥° X^YY,�)›ÙOèU/2 •áLƒÝ6n9 0ä@7ļЈå] –f-¨0®Ò‰ß ð]XGiš]ƒrk÷ç<ˆr¸„ÆýàáPüî�Ç'bٞdé¹¥:ËOXÒJrU½§ëÓrS7lHÍMÓìsFì¶B¸»2ÝG/Ò¢½ØÔ|³ÌÃn—é‰[P_QY__YQÿjE½�ù.ÁO¡7éÇ쯐Ö£%hï^䇦<«/´Gªý¼ÎÈÇáT�¬>Ýì@ WÇ ifK‹E0™f,–\ÐÚÃ:þõL¥/ –K•êô¾‚‚Ê@-«®..®¨¤Ãê®°™.ä º¥@Î\w.wÏéE:Ÿí­­aÓ)¿Ÿ¿Ó’ –ö®<,-øwºX¼†»rÆäÜÒÇÝlü s^¯_Ê/iòó¼øIGœÝ¶8_«2¥dÍ[RVvцëî_]Ñqù²ïõþØ«²XTÞóÖú«ûú®æG_’ZɃY“I“ÉúÒ4³†=ÏZ8vñMKVt\Ûqñ!¬ÎÊVá&káÑýÑk¯{mìGRÑdXR¨ôÚ#pFP�½»!T‡žp6z÷ýºh/ZßE@Æ¡ Ca•Þë|Nþ„©ÜººñT¿¡aÇZÇ.Ç~‡ênÇ32î8 ñÅG:ÿÆnüÞ~QÙEβúá9ð7þNXå‹ê±~}Mæ/-êŒ?Dî¬D ÒM¬"« d=»S’՝õ¶û²Ëðæ=²¸:.n5ר•¿Ps¨:C ¿ÙÞ.€³- ú.þûƒ«Övíp±].<î|1Ý}™ùbQßÅåvú]’ø¼ ç[ý®ñ¿ †4¨á5\ ýðì¡CÒ£ñu@§¢ê„Þ|=J>R¹!ËóîEªi¼=øý°‡!š±œãñTDw’ã=œÈñTîÉ9Þ£ô(5ÿ·ø¼t|>·€>Ÿ >³ö"í´7œ!óI›r; ð›z;ðqv@U˜t;€ñã Wî›±—ßC ß§,ö•så‹ÿGsåcseÖ9m®üÿªÜÿïfr_Kþ¿/y}‹ÞÊB6´æ"y -IžS2¥TÁÆ%×µÚ×µD;žV•c 6ZKácBŸ^›óebgM•[~o–$øé¦Ü´²€³<.yF¶wÉL뜋íÎÅF¶næ ՅBöc^Ù¬Üu ü×Òÿߓ~bOÄ!OO\H²Ù鱳ѭE<¯2мÿgd$óøÏÈnSHì¿÷ìèÀñŸ}íõÿÕ°ø\¸ÏÞÿÿ‡'Wÿ»OþߝW¾¶ùÿ²ÍáÏ{„ícW'\†°O‘ãßð AþZRރ«ÎÅÒÛ.Ìè86˘ó�S˜³jGXÆ2!Äö©óezj68ΰçÙç-G]P Οw÷¼ýó^ŸwdžÍkª® ów8ðc/›xÀb25;®¶„Ó‰}©k麥-]XXȑý §y'ädßW @hރtÇüóÉ|žigX|ók÷Lï›WIêňÙù¾ñúËꉫ~iýýxýÝõ0n¿w½‘ôíªôWJ\„Dê&I"äD/ .ÃÀ¥>\J×®Œ®Ü±òÐJfX‰W¶Î—5bÔhot5®kd…¨·’àfžç—aþ5Yg§\_Öuzù·�<ÿÚÄïzS&j26‘¦Ú=˜ýÛ Èoy˜^ƒèɅútɺ%ƒKö/ah ^2kÏĞpö EÓ-F?F(ÖRt²ÚÚð¿'öñ­>–ŠPm¸€¢õ§á¯$dRLN•q;’d4,k¬÷ü×d<5.ãšEm3ÿy?TõN’1Þ¹%[ ;~©” ) žÉ¿;Rq•þ«²N’7ދ…ÄK@7þw­šˆßÓ¤þW†Pk8›¾¾ / ë ¾eî¹O»Zö·<ÓBù3Åûrò}¢†àϵ|€l™­˜?Ã9^ï{I/zŸ¡†°ƒž¶ùl'¿~2q¼îdròÌÕÀ A8¿»db [R¸'¶ç~hÁ 'Éï69¾[îB¨éúîB¼0¸gÙ°î?’¿sÚ¾'ÉØÎ¢—­ÁhMǒÆðWzºÞ&I< 1·àz —&³°È÷ú)rbËìð"÷´±-É=fEhå=t“x §7ø ›l›¢›vlÚ¹IeÜ4±‰ìÚt÷¦ý›è¦9{&Þ §U\_ W\_3ÞGÃ{ø8œ~üÿL£ãësª¡š°Æ“sæ|%'ø•žºq’¤ñžÚ6R´¸÷Ô/T¯JpcroM’Xô֌IÇ{«yÕ2Þ[¿¢Ì«Z­˜å˒¤µ<€Q½±žì™øõýõu©ñ™uœc‹™~^vú^D&ß\_ê0™ødÏ©‚ÏjÅ\\_¦ÌõÆp\6´cÔ¾À<ÐÄ1Ö¯³ú];':gǜCs˜ažãæ9Ae¶Fk’Ÿ?§—‡g¥÷J°À¸€,¨ƒ,Š@ò?½DÑ¥|œ9>¸.8Üd(ˆƒN>Ç뾒TMS¤³z&dc¨su]]8IŠ/‘ÏÙÑ+æ; ^§gšˆ€cxò€ó4¬ž×úŠè8Çh¼‰}Kô¦¥7éÄ(ä3¡x/ù Ø([ô¤’zFžêΛ±Gè[¢¯W%IÁ±œöÖ£ q–ÊX‹&a4£Ð¢Šc!ÀBì.ÀòÈXY2–=±8Öå€U/ƋåShYs(Uh¯ÐÏ#é÷} Ç[“šªPœz¡ßòI#…»J«LgžD‡ûìnÎspb”AæïÛé#>¹ûòä>LPi¡ÄFœåÇôáºÖõïðò3ƒûËxÆEZÔ[JpI²ãäÞ2DЇïæ}˜Ö(}¸ÆXCjòä>œ$Pg’îÇH¤ôáÚuµƒµûkªÅµ…¼ë¿’TMS¤o1†þDQc}^^8IŠ/‘÷ᒰ…š1jç䄏Ãw(É?Sùn¿[k¨¯-üŠ|ùüì›(š]]Vp<¦‰8ý89&¤hµq ® W™+PH꿉ýwù1ýWH஄@þ2 ÄoåÕõÄÉúÄüu ª:”}/ñ€³vˆ‰¹6Á5®óå7\±IÌ[—Ä筿ݼÊ&Í[Sé7A©Ca±]A‚‚n¸3&Ø;ynœÊ£ L•Ö“#€¿ƒ U¥péLÒ#\_æ…j ‹;ï„ä¼—JT•^Ú0ÇIöàó¹,/ÌÊ0Ÿ ýµBT ͇I•Y|f¹°Fídk€¿òqI¢.{\4[çôä©Ê̌gÜ·—óÑIPNªœÐdyW�ÖébÔ N5îÄHw2H»kõ¬š²ÄØÊƒ}ºé‚Š A6,fq´ %·(žiñ_Ÿ(ƻՊ%g„ÍØÈoŒp 6Ø8Þxwãë){&Þ¾¿±Þ˜-=‰s‘"b³qY3œš O±°ø•²ˆ…~)Þ°°0(v”¶o’…§RošøP¯gàñloo ö†u ƒ ´!gÏÄ"ˆoŒg&bohh:ŽMb.×bÉ.ŽL0Lè“/sL²Ÿ„Ñ¢6Ka²Õ®ñׯXÍ6ã¼nÁà‚ñw/x}Š[lA Wm’ÅDLnž“µÕqò¸þX‹‰˜ìOŽIŒZ|b3'[ŒÇ¤Ê§ž!¯¥09‚®¡gÊ4'ǙU­¬^õÇÐ28ÖU±3Æ5§K8…22J1ôŠX¬Ÿ”U,j›BGD¡Dçœ2‘í㉏ï\_Ôf2ËÙ¾ $2ôúc­Ç‰M±žDõ¡8UôÛzÇæ49v’õÏ ëÄsÃlôÚÄÇXco {q»÷—ؼµ^MFkãoww\3\˟f¡×þ†PQØBGÄX (cN 1Úu&ç\u"W®Pj$)ív¡“}’N"ÿœ^P8eߋsў‰‡ïΝÓñœ§Nä<\«ïJô ÊËSQÞ1£½ ¿\¢sr "8ç˜>zº œ½Û­áÒ»‰çõÕõ7š®®2.Ãü䮲ñ2vwÙëeGÊ躲A8¢¨ÌXFPYY íIsR'h8!Å\YŠ,U¿W|üÌb¼œ$½õP½KêÐ¥/s‰7ñ”ía 7¯k&ÑæCÍdW3n&xm ŽÖì¨9TCkkvAÞ 64b[cŒŠ´R)˂jù‹¥hð+1!IÕ¤H¥®©|¯ùå¸6I"uՉ.AËÐç(^F­ØÐŠk[Ç[Ië4òšìM;›ö7±ÝMû ¢;›v7½ÞDšÚ›v4Q[SmSC q€6M—†ƒôÓI¬©La-ˆl\Ѿ‚¬L‰É³§HþÚĘ¡Má…Ô֌¹9›é¡f\ÛÜÞ¼¶yW3›Î¨†p{xg˜î ï“ÚpÑÚ0¶ñÃð12+"‹É÷²Ì(K•†Ðq-Û41�–=5|]Êå™ £´5“Z€É´ÒµÙÛv¶íoc»ÛöAEw¶ín{½6´µ·íh£¶¶Ú¶†6ʗ¹Ö¶Ñ¶/71·1¢¸–Åè.õ\¤C™ÈsÐÑ|Ê7²ôA­.7?—äx¿–Ù°?¦Yš[è³åŸáy3։ÿ3NÕÌ;͛ÿ¦³Ì ͛Íß0³|ó,óÉæo™­êCfÌ·e©5¯53T æv3Óóú؃úwÕ|}$ìŠò5D3 #Òæ‚’ïë¸ ÝÔb3l†Á1˘Efdñ‹\ ¸AlÆj@K ÈcAê» \0 Œ¼^ ²¸ H­S:ù¿Ã§tÖמ"î<€ÖòCÑ2M¯T¾X9\¸Ó(v³NúQiÀ2Ã!-ªJþ©)½®f­¬°Ù\hÝÑÏü~‚1G¼IÕf­¬´Ú\+,)q~.Ã} XÿauX?9ñ7՞£%Z0ùC”ŽŸSLŠÃÅzb°Ú¬µVj…ƒ™7X±ÁÚn½ÁºÛºÏª’δsÐúZƻԕQ†1ÞAµ¹a«Ý—Î̃B›î[›‹ ¹0Oåb—!÷†\2ÓÀjsÛs׿îÎݗ«æ p¸3W¥Íý }Œ¿½í¾¼BŸØ¼ÆUçCzܰK7ˆ¤·é‰Vo gçùÖYðkl³ÜÙm¡K¾Am“ê1r§íBÏ jFa—×g@¸É€Ö"²’¼]‹ÚÑRiÊ7æ“ùü²Rƒ7ìtÜà FǸã2E£ÃîØåp9ö;žq¼îP;¸O%‡Êþ¬„êð߃a¨³òà)pŒÝpŠ{¾‘·ÅÃ<x¨Þxxh²£K-jù·þ…$o?ÌÝÊÿ.Öê3§[5§—ĶÅ[Um¢®¬Ü›bJÝe,6™v¿›Eß\_~ÏG¥¸,œ™®™QëËᅑ“ äœRã f¥ l<l6[­ BÁ†glí¶l»mûl\©¹ƒZ[¶?\_Í·ú òÏæD­ÕKõ '¯ö»}>Cž´oV-aS–oЂ –’k�oB|€GIo«µ4XÚ-̽öÞ G=¤Öï.ÚWDŠ�¾/\ÁÃä¾\„ Ý÷@F €î3س!°jóŒ‡+WæŸÏ;§DŸqûmf]I̬{Læ[n1›ŠÓÏ?ϐðϔ~yΣ\_¦¿›>‘N]é¥ÓíéT›žÉûe&ï—b©µ™Ø ý2úeæ ™wÞP›Ùž¹6swæ¾L5?h€Ã™m&¸ œoC·4‡¡K̸a·yß÷Êh&Z³è«ÙÐ-£züŒ_¦ß¥'zýÿY§ü }9€¬“ôÍZïtjï”ú%÷ËÊÿŽY’ø5’dMß/cGiæG-%P˜Xìc<¯+6î2™ °¤¸ãŽ“ì€|v»U£Åá²ÔT£Ê †Aµ9ùæ£ÕéÈ'¤Tãt¦æ«KUĘïÌÒ †£ûáF¨v¿(qíÓ�4ŠÍ›Ä/øPM“¼öBþÁ¾CZšø¡¾¼\—­ª¨<úìßǪõõŒåƒO­¯×W×h笇cº‹ ñ’Ø ‡†Äì|1.~h ÆTT€Ä׀aڍJщaOjjºÊÎõ(/Îʕ!§¤Û텹»CŸ/ÜKòI~®Úápðï°¤…jk; Œ¬Rçñt:F£Dåáʊy!|1®ËÁà\A¼Oèñ'@Ø+´h«¬À…•p«õyì v�<ÅÁðó¬•Õ–ÊÊêêJW<ÁiÎuY‘Ÿ¿R†úKmÖòRKyyiyEnqi®F§³öm¶ôõmîëݜ~ŠÖËÆÈŠ‘+i{·ÕÐië¬í¤›£V¶9ßRÛÑEíÜ:v5¥[ Y¶¬Ú,š•Ûí)u:,é¹NËf§Ê¢!¨¶á™ÃÆ£ûÏ–�&Ù!ø8C0hÜo …�×즆“è§ç«\Ï0À|õÇù9Fç\_>ÈãG€k„ë”&¾†ÿê™ï?K¥ñ5"²gÔ)”ï#\ŽÌu¾=ºs†ô3iùç3bÁPܕqóõCҎ1®xeMJV¶™7±åUÅåY†­ë·ZÛÚ^hm [G×o5d—Ímmmؾ|cõ)~­;PU®Ñ• ÍÎo©O­÷f…[[\_hkk̚,\jΩ,·”Vû=¦š5®¾eÛk«óþÐ~ÕP‚‹ŽÐ˜N„ÈGôHìÕ@Î\_„jŸJ[603GŠñ<•îÙîùR“½R;²ÛÏËoÈ©©÷÷;M'Ÿí0ûòO~R²ò6Èî…HnG‡{~¿u~›eþü¶ùmÞfkÃb•Fc]¸Ø²pá {S­µééf´v1^¼¬(ßZвpV¥Ù —d46V5;üª™%€šávÛªUÕgè3¬6G 1[9‹4Õ& KCÆÃòv¦÷~nynw±)•H¯’f¼„#Ü.¾ý”Ý¢¦ažÛžÌÑfƒŠCx^ýfˆ µì‹bÏ %khZEa\¶“{\+’|èCãᦲJO˸ «\­Øf·@v¨A´Í°çg[l´Úéqêrœª\f+„ٕv§“賝šä›bã~/¿-–]ºt†ØåÕd¯>sNÍãÜäx–ž$û¿ÄÅØP^{Oqô{eeØpw;¬ÖØMV«c’Ó>÷£ ÃKÝ5åUÕ5ÕU5²ÏÁ4v›Õb³Ù¬5ˆETÜ.ë u—•ZYÃ[Zes”ªu¹ŽjUü‘Wª>ÛáÊg þ‚Úý û½BñPØðèÁýÿ:$³d&™EêûŽ/ É0r€üF6Ì©Ç “BëÜX § Øf)Œï×A¤„Ðw«+Ëf85:cš>Í«Ë÷¥yýÎÒÜ2¿3/·L—Ϭ!ZYn™Õ›fñ¦¹¼N]¾ÎêwZüN¿ÞšŸ™ë+Íã x˜Վ|§ÓArӜ~S1yؗ-äõz\_9øAã+çWžXåŃ2|å°>ÜJ’¥’‡DŒSqð´±#ˆ1ñ:˜>ϋݻý<£ƒy©^|Qì·NèÜŒçž Í챋ðÎeRx,6 fÓPBñ_E,ub^±Ü£GÅ=Pf†^ˆ©™‡ï/²¬7”ÛÊ 6“R±¥Ÿ)vh¨FgÐÙtÆA#5¦¡4cѧùuùuiþ@iYny 4/·\—_ 6µJ-@iyš?͞[nÉÍ-gö™:C 6@j;ûï&ª€Þ]^ëoðïðOø™__jÌÇ®|œ¯ÏLË­+ËÓûË5Eeuyz–Vš9nš## s¨3R'ÏÁÙ!ÉܞƒÆ—;‡ d_îð•Î!Ï+‡¡OƒWxðBÅý‚;!€;;“þÉÿtÏ÷Žu~¾:oÕ»¡Ð·b{c_ z7˜«)ÅgÅîp§iBoƒ=8ö„�ÌI-ŽÝŽÏRæ°PìIð‡UKñžgÖë+&{›\+\ RYlOl§4›•ÃHØñ=Åw=PŠo.Åç–^UJ>,Å/”¾YJž(Å33dmfnfy&u¥Y«¤Ç„¦€× ²©ˆJk ×#ƒøFtmxwXnæO|‰£ØZSSSÞàs†l÷yñÍ^|µ¿éÅÏ{q‡×y[½Ä{«ûA79×}•›lu㈟àÆ~w‹›”ºñƒî'ÜÄ]Yî´dè?Õb­Å�ÿ4ŹN kœtҘkòB‡1öx:‡¤G|©94Ľ'=v=z°ò'È3ŽèÜ€¿œ iþN¡! ³DxS›L·O¢X;f¹¨©.0%Ge]­±µ­­G,\_SQQXpCÓ̓ õ´·¶×œ–—\_Q1öÍnh0·¶®Y#M¿ÏÕÕç~'¼€®iÿ!îè¶sB þ&Œ]WTDñ]R¶Å=Õ žZ =ª]^ýÛ¿“šm×Ôèìe¼çŒCÏ1: >ìsIn1h°¦Qzo‰Ãž›Yï¶×TVf¹jʜv³I§5‹/ÒÍéf#Ë^ ž­±ÓÉOwùÛa¹Q=ümLr†"¬x,Ø)›Ðxô0cg| ëÙMþ$É[­Æóø©¶[ÛjkûÓ¦3\\rŠbou€¡,mm›k«zs[N;±­ «Z[W­’,7sAþ Áà|‚SÞæÉÙÛʜì¹PèqÛl“²5‘ŸòwCt{Ðê°ÕZ \¬Ú vññ§Åf£• †4gV.«¬4”JX2]™aÉɸ·ó°‡§¥Äo;;>-îcdÅŎ²)ǽ‡‘ï&¹®7µÆ^‡¨˜Q}úîg!"b‡ED´ðà¹äÇ"p„–«Ï ο7¶")¯®Û±»žk×ڝ áF'…ý¨Æ.ù]ãåÊIìÙhç¦9 6þNл|£#³V㠙©“5ì<,鿉›¬Ÿÿ_è'ß,ƒzç¶ÆÞæ®«ì»ë)p[ìsá¶V¼ü{록s[;Z+¹Ï6–•œû#÷øcOŒÎj¸ämDÐ܉ר » Í@UèÒp÷_Êð“e¿-#?pàG‡ƒü͊Ÿ0½h"o¥á—toéÈyøjL4%%‡ø»3ÛÑZ±ÛãßcՖ˜KP¶1›d;K©ßUuµ³¤03/%3%³Pb£y¤¢„jù&Ÿ üUÜàÆÆW‡ÃMÖa¾Eö':ã,íCëwp{HëJÅ7Ár\ #¤ø™– ¯±Á؞gÅöÒß7·­;ù¤Ñþ3Sh)hzõ3Ï]qéÊ/N‹Ø‹uøŸÏÄóŸ¹þs 4#ßa:”‚£)ûR^K¡)ùŽCŠÁ¦sd§ØL'½±ž«Îý?t€+=tؓÐYäbE(àp&-£åጨClVÇj/¹àgÏÆ>#tu֛·¿r™9½Ì8ç‚m}Ïaç _Är·lºüŠð÷÷ŸÏýðñ!C…ÉØPV{'6qɪŽ;øÎ[ü7°½àq3@%èžð™¿(Æ{ŠñÌb\VŒnÇٱώKíx[væÕå‘íY8”…˲ð•&|Ž ‡LøZ=¾Hëôø{ü- ®Óà+)>›ÅVk4ugIuZ¬<8ˆ¦FäûZJ¬Ö¢œ’tZT¢ÖÊ6áï&ö_N6É1¬¬4N<×N‰Ç‡Ê!ï°ÆzšOßvÑ_¾}ÞyWþõ²S‡›W›Öo{ôž36™èÊ/ngãçÜüØiQÒºëkV,}¾wÞ¹ÿç',»àÒ 7_pÓµçܽòÕË®úáÕÜZ·obi3ÊG׆‡žÎà óNÎۜwgÞÃyªP¾9ûþìÙôüìïd“žlܒݑMÙø~ӹń™ŽïL8XôÆ·ÿïrF(6­DHz+_òGå„F‚)؊!R£þfx” Ó£4”ÎߙŽL(ìgA™( e£èYyÍTˆ¬È†ìÐϊ†xt¢RT¹Rª„©Õ Zˆ7Ì+^¸‡ô£:@A¸G˜‰f¡z4́Y:Œ!«jBͨæî64ÍG ÐB´-FKP;ZŠ–¡åhÈ߁N@«Ðjt": ŒÖ Nt ŒaëPܧ®G=(‚6 ¨õ¡M0£õ£-h�w ¡a4‚FÑڊ¶¡íèTtú:ÎD;Ð8: ¾‰ÎAç¢óÐùèt!º} ]Œ.A—BØ_†.GW +Ñ·ÑUèjÌÐ5è»è{X…¾®C×c5څ~€nD7¡›Ñ-èVôCtºÝîDw¡£ÝèntºÝ‡îG ÑChڋ~‚Fàô ;ûÑOÑÏÐãè�ú9z=‰žB¿@¿D¿BO£ƒè×èzý=‡žG/ ÑoÑïÐKè÷èèeô z†¬×ÑÑèOèÏèMôôWô7ôú;úzFï@Ï=‚ÞCï£Ð‡è#ô1úý}Š>CŸ£/ÐQCñ×qŒ­zœ†Ó±± g3¶àLœ…³qÎÅy<àBlÅ6lÇ\„gàb\‚¸—ár\+q®Æ5¸»°{°û°×Á½u‡ðL< ×ãÙxnÀa܈ç&¸cjÁ­¸ ÏÃóñ¼/‹ñ܎—ex9^W|܀®Æ'“ðÉx îħàµxîÝx=îÁ¼oĽ¸o›q?ނpB?ŒGð(Ã[ñ6¼ŸŠOÃßÀ§ã3ð™xÇgá³ñ7ñ9ø\|>\_€/Äáoá‹ñ%øR¼\_†/ÇWà+ñ·ñU0Y~\_ƒ¿‹¿‡¯ÅßÇ×áëñ xþ¾ß„oÆ·à[ññmøv|¾ÿ߅Œwã»ñ=ø^|¾?€Äá=x/þ ~?‚ŏá}x?þ)þ~À?ÇOà'ñSøø—øWøi|ÿÏàßàgñsøyü~ÿÿ¿„ÿ€\_ƯàWñkøuüGüþþ3~ÿÿÿ ¿…ÿŽÿßƇñ;ø]|¿‡ßÇàñGøcü þ'þ†?Ç\_à£8†'¯y$”0¢"j’B4DKR‰ŽèII'b$&’AÌÄB2Ñ $‹d“’KòH>) …ÄJlÄN¤ˆÌ Åè;¤„8I))#夂T’\RMjH-q7ñ/ñ?©#$!2“Ì"õd6™CH˜4’¹¤‰4“ÒJÚÈ<2Ÿ, É"²˜,!íd)YF–“d%é 'Ud59‘œDN&kH'9…¬%ëHé&ëI‰ d#é%}dÙLúÉ2@¢d ‘a2BFÉÙJ¶‘íäTrù9œAÎ$;È89‹œM¾IÎ!ç’óÈùär!¹ˆ|‹\L.!—’ä2r9¹]K®$ß&W‘«ÉwÈ5ä»ä{äZò}r¹žÜ@v‘ÉMäfr ¹•üÜFn'w;ɏÈ]äÇd7¹›ÜCî%÷‘ûÉäAòÙCö’Ÿ‡É#äQòÙGö“Ÿ’Ÿ‘ÇÉòsòy’&Ÿ’OÉgäsò9Jbd†{Ìß MUQ5M¡ª¥©TGõ4¦S5RÍ fj¡™4‹fӚKóh>- …ÔJmÔN´ˆÎ Å´„:i)-£å´‚VÒ\ZMkh-uQ7õP/õQ?­£¤!:“΢õt6Ch˜6Ò¹´‰6ÓÚJÛè<:Ÿ. é"º˜.¡ít)]F—Ót%í 'ÐUt5=‘žDO¦kh'=…®¥ëhí¦ëiÐ t#í¥}tÝLûé:@£tÑa:BGéÝJ·ÑíôTzý=žAϤ;è8=‹žM¿IÏ¡çÒóèùôz!½ˆ~‹^L/¡—ҝô2z9½‚^I¿M¯¢WÓïÐkèwé÷èµôûô:z=½î¢? 7қèÍôz+ý!½ÞNï wÒÑ»èénz7½‡ÞKï£÷Óèƒô!º‡î¥?¡ÓGè£ô1ºî§?¥?£Óôçô ú$}Šþ‚þ’þŠ>MÒ\_ÓCôúú,}Ž>O\_ /ÒßÒßїèïéèËôú\}¾NÿHß ¢¦oҿпҿѷèßé?èÛô0}‡¾KÐ÷èûôú!ýˆ~L?¡ÿ¤ŸÒÏèçô z”ÆèC 3(cLÅÔ,…i˜–¥2Ó³4–Î ÌÈL,ƒ™™…e²,–ÍrX.Ëcù¬€2+³1;s°"6ƒ³æd¥¬Œ•³ VɪX5«aµÌÅÜÌüÌÇü¬ŽX…ØL6‹Õ³ÙlkaÖÈæ²&ÖÌZX+kcóØ|¶€-d‹Øb¶„µ³¥l[ÎV°•¬ƒÀV±ÕìDv;™­aì¶–­c]¬›­g=,6°÷±Ml3ëG²-l€Eá®hHÊpØ0a£lŒmeÛØvv;¯È…öÓÙìL¶ƒ‹£³ØÙì›ìv.;Ï.²‹Ø·ØÅìv)ÛÉ.c—³+ؕìÛì\v5û»†}—}]˾Ϯc׳Ø.öv#ÜAßÌna·²²ÛØíìv'û»‹ý˜ífw³{ؽì>v?{€=Èb{Ø^öö0{„=ÊcûØ~öSö3ö8;À~ΞO²§Ø/Ø/Ù¯ØÓì û5;Ğa¿aϲçØóìö"û-û{‰ýžý½Ì^a¯²×Øëìì ö'ögö&û û+û{‹ýýƒ½Í³wØ»ì{½Ï>²ØÇìöOö)ûŒ}ξGYŒM¨ÜïU1•J¥V¥(Ù¡F¥U¥ªt½M•®2¨Œ“CeVYT™ª,U¶G•«ÊSå« T…+ÜU× Œõ÷¢[º†7÷ lŽŒŽ Ð-cn:Øç¦í½[XËØp4¥gK×úáè€6º52<²>:Qoéë鉎ª»‡#[#ê.Q¥4F7F"›Sº¤Zݼ¾ ®R÷HUóH×HoJ‹Œ‘‘Z¤³©ZÔµ~l4¢î—ªERc¿¨Ø"àÈú9Û%Òé©Z"a ˆJÛÞÓ-]­Æ!õr©–$üa©Z!5ŽˆJ³r}¤§¯¿¿K3ê•Ú¨¨TÃ&Õ/µ §1…ÓIRuš¨ØI\Ó PµumÙÒ¥ZÙí¢K{ûT]ýƒ½]ªžHÿhWJdp¤¯hômÜÒEG»Æèo_ÚØ@ll ®l_ßßµ…C#cƒ‘á¾è°z02ä´]ÃÃÑmý‘ £)Lõp߯ÞQédOtۀuGG{µ2Zπ^ºG"©ÑáÑ^~}ßÀ(ðެí‹è"Cc}»ú#ë#ªÞèØH$ œÝÝØ·¾« :šÊ‘7wõ÷¨fE«ÛÅ?pˀK¼qÀ|q Bq .€\_|q:žøåþ8 œ²7NÇoñÄqéíꉨD™Ò³YÔÚ à]Ñí©4 OîëÚ86(ÕÃòqπT÷oP¯ï^ßÑö lí†Á#2Ê!¹mdKÄa×úÐV倎Œ ¨7D¶@1^¨F9[ß?Ö­êt‹ž¾®-сݖ±9¨"éI0D=™¿€ômÒ t FGF‡£ƒ½|ý6².Õvmèë«s{|Á8 ©çÇ^õY–ù’,}҈<\_lû¤Z· ‰ú¦¬Y—c³ è7Ãdèïèé[¯Y?ݖā -idcJ»,PT¨WÔ)WÔ)WÔ)W©Š,E–€"K@¡P(ʅr@¡T(}ƒ  #¨ð<‚  #¨ðò+P(¨@ ·#!³?¡›tï�ñtÆë÷@îÙڕ ãS׆‘ÈÆh¿BÑ«àd0£#ªÞ¾á¾!ÕèŒ ¨8êøé( @ꡱî±ÑuOׯÈH¯jKòvՖ®¡® l¸kC®‰ ¥Œôö ðÛ­QiF¢ÀmdlˆÁ,´X§ÚØ·%Ò¯êãQÒ¡[»¶ªNë:µo€˜GGáïÔhfCÜRlîÚ@áO¼#rÓ–È ÒÁÀØ�…?¸ ÛÙÜË8‘qb0B#©P%J:IAtÆe„{¦­ÚžèXw?Xh«þ€¯Ü�z#&{µPÁ}jߖ´È6°æP¤†ÜTÀ—5M‹Ël?’,—dæ3&@ɂ) —YÇ ÉÄR,@“h˜òIcR‹hÐr£ G¥rHb)·t ö iÁܺN]†…é%Xӑ�-è#ŸÎ[GãˆZ0‰) Ê'H'ô“[ÁG2’ ½ä&é Mö“,FÐ GÉW‚»$(•{B&ЌÊ"k@vaÖЗGb ÈÄk¸Ùå•0ˆ.ã´Ü»öõŒöD6Eû"Ã¥I>æ7Å£Qq#Ìp4åÍüXô-À+4þ€OîÝ (P(É#:@òÌÉ!)×Ê3'‡ü T§@ eœ¯7äQ ¯ùȯ@u P ER—"©Ë­h©È,ÏÉu^w]B–øµ~_\¿WÑC–¥Î”Ïr(Ñ&ÉWçóÈPœGH±†Wž øYOüZE¿KÁ«‹Ë ¸HÑ# Ø Ø \HØJÑ7Ð\¦çñ(¶÷Ëcv'$·qH¶3@ϯÈR €%èÅÛBq;•ÒæRðnuqüu‰ke<^™/‡ê”kôWøHÁó+×ÊôêÀ@^J´…Pr6¤èŠû2˜YÎx MžË MñjHÎZøÙ8½ 'Åù½J["š‚‰ØPb-˜8›ðBrmŠë”gS)ÒË}•C~ªS4Wð‚ žGÁ & Eó7¤èJœËr¹Hé.yȧ@~ªS 8å[¡çV,î‰Kò)QçU$Pzm2¤Pö%z€"Ÿ/Ñù›&á)6MÆS(û™•‹÷�ÉT|ñ| ø¾øÝ@ñ+|®DRÆwPé)ññÏÿê<Ä¨ìv+mʸ¦Ø/©ã mʘíö)m! (2¸ãÑPú¹Ï]§´)”=Jß÷¹zu ù‚J[l‚GB>Eª€¢y]Ze^ð(gŠ,EedõymŠôÅÊëó(ö $$P$ (vñ(܂Š]< ½ÄÌäQt &dQ$¾ô(<‚‰³ z ù(cv ˜¸6!Ÿr6¤hRl•˜I¼‰6EҐ¢›2cû¼ŠýBŠ!EReîöy•±Î•¸B™]³¸W ]ÊHèJ\«ØÅ›8«ÌL‰yK™?|ʑ½c{0)ãQx(½"èN\«ø(‘¸1©Pv+þHŒòJĕ¸ºø™• ±ô(þPF.e¤ö(óŒ'>Ïp<…‡GáHÐSü¡ŒzAOФÞDþ§\›ðŒó« xù¼ŠÌ^E\¯×«pó)<À[ûOì…ÛP·N’�²´j../ vW{l¿ÕÅÏÜI¸Á$8€CÉôBI°? ö$ø€–qHáè•8й[¾Jd{Ip]ìM‚ýI°Gáùa÷º$؛!’,åM²”7ÉRÞ8¶\_±°ß“d)o’¥¼I–ò&Yʛd)o’¥¼I–RøÀ¬‡Žuž$Ky“,åM²”7ÉRÞ$Ky“,åM²”7ÉRÞ$K)’›¼I–ò%Yʗd)ÅÃ0ºÇ¡’¥|I–ò%Yʗd)_’¥|I–ò%YJáT<T8ƒI–ò%Yʗd)_’¥|I–ò%Yʗd)_’¥|I–R$<…dˆ?#ŠCnò(W| äW : (PPn…‡[ááVx¸n…‡[ááVx¸n…‡[ááQxx…‡GááQx(cŠÛS—26Ð×ÚÚÚ¤j¢¢ìå/ٗ«Ž^„2ÖG·t÷ ô lìF7wuG·F Ý텗n^¬ç…ߢàŠ/}¤ï%àŒg½¦‡CÓ·q@ˆŒöö ÷hG·E0Ùy±ñðÇ .„› áægÝ!^tñ¢›B ~…‡‹áRx< Äw1’�‰FñŽ"•»Ç¤œé‰ŽvGú£Û8®•‡sópnÎÍÃòøyÁ¥òp©<\O/¸,. Ì5qRÚ®8”Ú¨˜.µK‰/°„Æ®© IBŸd ÑIP[º¦iL¦%œ“LK4˜“0’›»ŽmÓI¿‘¾@ëJ‚¥v!—Ü.ƒÔ®Hbèš|,\_'d¯pºÔg›Þ5éPÛ¢@J[jKÎ úêé‹H‰ª±eª‘#SZ¦Z=2Õê-ÓY=2Õ[¦Z=2Õê-ÓX=rl[êü„n} ¨¯X¡OÚ(ª\ݞ¸:š®}ªêÑ© íSmj‹öélÎíSmj‹öilÆb䒾è&@Ñ\„’Z˜.Z!Ò£“¥ks馉Ö8·´hò‘¶CÆy:ÇGB´±Ø‘r,!eÇd)Ç&Kّr,!eÇ$)Ç&Iy¢ªHyb‚੉Þq¢Ô;N•¾¦‡¹Áånj–ë¹n•êf—\»åÚ#×^¹öɵ_®ëä: ×A¹Éu£\ϕë&QûB¹öÊu\äºK®»åz½\÷Hu—|}—|}WD®7Hu·K®Ýr-ãwËøÝA¹ÉµÌ¯[çJt<~ù|DƏ„äµ cJv1‚(Ù ÊmŒ½MM£aQwŽíWS¬bãûÃ)¼v=®IaHÅN:餥ŠÕÐ ×0¤æ ' -|.,šwEñüSû«÷¿Ø'/, ß!}v­zá£3Ö®zሎa­ú2ñÑ«‘V}-›¤ÿhÕG;¤ÿ+ÉmªpŸ¨PGÒ'ÜqtÕGk\_Ø!ªýi)H—²©–¢L„¡DÃIŸqÑT±êÓµoî¸\&ªqc Ökf/žë֐+£é5wLþ'5NLþgJÁiS..2iPÚ1WwH­S¯¿àò¢yf5'€ñŽc?¨ªo®ýtU¬cBÆ3´8-µ¨yÞåÅ͚’€pF\JK½ãª“nï8¦X\ÎuìøhÕÄ1ŋR§ €°%R;6ÝrÓÒÙi©BqÁ9­E¦œ 𻦩 qm㟥û¾¸cý;'~¹{b\xä‚ff\6ê¯k‹ÑôE–õ'Ýñåÿ%¬µ\_þÿðøì‚Ë3ŠŠ›wÿM’ºAÅí;b@óªUovL|:ýÁëòú¯ èù½PçÄ׀Q, N¬Ã#xŒ1 -t<Ÿýš:ÆáÉø•À¿&_E˜ô ‡'ã«Õÿîd|µŒ¯Žqx2~JŠÀ øªãk4ÿÏÉøZákrx2¾VËñÿœ¾ú¸ø©©?'™¾ŽJ?šÖåðd|Nàû’é똌ÿ‡'ãëõQ2¾žiÄyýžŒŸ–&ð{’ñÓdü´/8<?=]àŸž,¿žoRËëÏ9<ßø“ü›&¶ä‡úsOÆ7þ$ÿd|Ã瞌o2 üIþ5ˆÍõ§ÇÏÈø“ü›®–ðÓ?ãðd|³™ã "ŠCSè:”‹J§\swe:Ÿ'~:õšç¹Ú¨&·cnp3\C³§´ó·•YP Oæ/àí&-Òk¿ød |�à—>éœ G9=;jEý“¯¡üM(Îì4dJûìCÉãzÙÁU“¿‘#“÷È?!\_úÌ×L!J5T°–jN¥z€Ó¨j¤F€MÔp̓³ù4Z hÀ…Ô í6Z-Ú p]í‹è7�>žígÒ�ÃŒéYôb€/¡üýà£ô(À12Ê×ñ ¾’d©LpË8‹eœÃ€;_·p!›p1s\Êjv17À™(_§p€Íx ÜÈæ¼€-x[‹0[Ç6ˆˆàöIEN´ á®á®n°¢a&&D,aÀ«‰ûúF‘}K¤§9ùO:PU߯.äÙ2åï{‘W#cQcA9¾™Û] <ґ=…—bUžêVÍöÔ+R÷§¾£ §]ŸvoÚJ,|¸9©ƒ–ÐrZK½ôz2]G»•ua#t;ý½œ~‡^Ko 7ÑÒûèCôaº>NŸ¤¿¢‡èsô·ôô5ú'úWúúPu‚‡fÐRZMÝÔ~ë×kךh ½î¤WÑïÒëèè-ôú�ÝK¥?¥?§¿ éoè ô%ú ý#}“¾EßK’4Œ iuÒ ê¢>ú!½˜^A¯¡ß§»èÍô6z?ÝC¡ûéú}š>CŸ§¿£/Ó×éŸéßèÛ<àêd¹þS)z‘›Z©Ó2ZEk¨‡ÖÑ%t%=›žCϣЋè¥ô2úmz5ý½žÞHo¥wÐÑÓ»é½ôAúúý}‚þ’þš>K_¤¿§¯Ò7è_èßé;ô}Ÿ~LÿI?ƒHÅÀ%.o¥,q6CD“žKÏé/ù¯LÒàvz'½‹îþš¦ïÒ÷ /|B?¥ŸC¼h…V˜ì‡›�ŒÍèL´ =‹>ÄjlÄy¸×à ^€ß Œ8É:2LN'?†kM‡Þô¶€x_ý3J18 Fœ"×j õ „ò] å.z"”7ӓ ¼žÌ¯¡k Ñ®¥‹àøÇt1”¡KĕíP¾/Æ} Œrvè9U4$(w š§škÍu‚fךKÍe‚ærAs… É{‰žÎ´º…\—õ Ô£@Ú @§ H¢1KP­T3@ç€% ¥è´uCÌ Qt‡YäbtMƒ1ëÏ ý™¢¾F, ‘úw:h\Oç@y#m€òVò5 s9ºQèÝ+ôîzozoæzӏ <›~å9ôS(/�/zi’=>ÿŸ Œ/¦ô [‡Á!:­‡ ‚c“°YH8(®W‹+G’ì´Ràt;qŽŠs“}Û"¨µ Ì1Am« ¶MP۞Díá×Uܯ@-ưr±ò”¯8M«žk>ÿ$Vzþƒ¯ëMS¤¨P˜­æ€&K‘y¶Aù>åt>”ÒP~3!ÃH 9 dEVT s#?›-®ÊòŸ4Wæq ²¼~ÍäԀ3%ŸÐjY°Üoë:!bNƒ¹»q?ފÇñEø~ü>BY™Ì“ù9O>ó÷ØÎ“5pž|þžÉ˜ëf—Àì˜ëfOB:Æ5û˜ÏW Ô-D‹>näAÁ䨿RÐ,.ÍæRÐ.ÍåRЏz¾—ß?ï™À#Ÿï•ðUbÞM>àóùfH~O—1À#œ‚ x¾ ÝٙaLDx”9 Xd&´ÌyU=d@ìÁ3 ° ÀÍ"×àñÏïûx–Ø."©Èñ–C~AÁ>JüoÓf‘Õ Š eLô…sÅȟè<þ¯ø9þo¬å]ô^h A 6‚¬$"ÿ—p,å "òÁZ"þ߀°˜ÈÞ¹ÌûÐsrL\_àw™ÌÌImvh«e5¬:©MmóÙ<Ö&²‡ —0£¯¿—øú{‰¯¿—øú{‰¯¿—øú{‰¯¿—øú{‰¯¿—8Þ÷HΤ„ï3¯úˆOæ·\ggž¯ÖVœ7ï¼OÒp Ùuvævh%»Ó]zµF:CT\äZ§N­Tc†ÏÌv-w-uU%µÜh/@õ\_;êF#(ŠúQßþÏeŸLÿGëÎÏǖ>§ºµhûhxÆ »Î6rMþ¿f®ª‰k g D$€(^w¨,–J­1 f0$!“ Z©†0XH ™€Ö¶ÄWĊà JPAWԗZ7\ªV¬këZZ­E\_E¥úî‘E=mÏëó¼s’{ïÿùî¿Ïœœb¥VÑ\é ù£.ø^‰ÜÕoƒõq²+ÒûN\ –ˆšËF\ìè\†½›J¶ Òã×q'§XnÎq¸Q‡é’õþ�Õk¹!—\pt{«c ii¸Q£S§Ì %²ÔFÈ͉©:S n4ññèÁCBÛ�!ȏÞp@þd9$,",bʛ€)ézn“B·, –y4‹…RwZ‡+¨K”Õ¾õ‰ž[•ªƒ¹¢è1û?n:}îPv΂&§_9Ÿ{¿Ê¯&?ÓTpèbEä¦ùž%µo̙Eö{t&Km¢”ësªí°ÓO-úzã¶ ±?Ž'…Ѿý(™™õCþùØsO–{í{.ËR/¸ÔréʑÕsæåï{{°X\áEƒ‰–ÚC-tˆkûîÍæóVå|•4³nm°ÙÈ^7œæ1‘\‡zíPDÇzf?ÅfŸåæÄ‹øü –šn›ŠÜõøÁ|þɅ£O6†‡ Oš[›3X¼=¢7|sP-sïï§6=\ž´èŽòø‘Ó§ONû…Q|™f½”ë·¥NVޘ‘čŒD¬ôëðŠ)¥“=+ٔ¶5å%þ.{wÐ C¼g+•ºBf@K²¬äD´+óB7J£ÙD�)NdŒïwhÕñ%­ú#oµ/ éÜ©KÃF¨ÓÒuúd€áÆL ƒà†"ÁíÔ#¥2 AùãQ ªœ øH® ý¯Æ/bè~›F?¦în‡¼;´Ô¼ÞꞟÌñµ'‹B„íogeefB"òǴCZO7˜t„Á8+H!ç“ü Æô@8 (pm ?‰?P¢’˜Ã¹0@>t·a“¸ÐÉ÷4m+ՅçY4+LXg o'ìKco]׺öÄ¡·‚ë›[ŽùW|Ã,é÷Ò[{‚dÓ®žô®5zž¨¹ñö ªw´à&; YLòòMýí‚B˜gƕ_Ðïìæµô´³9OdßNsE/yÅ‘N¢!¬†g%~ì1–QQ'·Ç™®h|¸Õ¥æD&+=wˆzÇÜÆýkާo±»–Xóo6ë¶Øxxnͨ^õ˜?Óoiñ×ybÏæpæ¦õþ¡säÒèh$?±|%ÍýŸæ‘2Šîbý.÷Å6>.ÿåæÊ¶\_¶ž^\’õÒ²ã“ŹR4¢ùÖ6÷…ûóCnÎ[°dzÑäU´8öøÖa?ßb>µäæ»Û¼kµe.bù'%;à aÙ9ÀˆËdÚÓ9 b„Ô ãô15§UD…µ%†„tÐѨœ)‘nôúµ…²n Ö³ÏhT HN¸0tšÝÞNCúù‡Í+î/ù—õ îçܟϘ•ëù¸fbê;Çì½w®.ìèܱ‚;Uþe ÛéÜa?f?êþ©é‡ó’º OÌV'ʘ;?­]\›®Õ䈓.ûz7N‹\_Ⱦ¾—6\_§úÒË7´ÚsS°üÌ»‘¢#ó”QóŽª\S^îyÌ$Î$+«^í~îjnYØZù¤9­XÞwéD|jO73 !®„v:\ å¾HVjÿÄßæÐc‘Èv>aB]²Ž€7D…@ª6™@�1d§„Љ#NªKR“½ú@f0×éEî·s£©0®&n¬Ij²ÝB2aÐs]çvQØ+ð$²ñ×éo "}Ý;Ù FƒÑƶcÝñ5ëˆeÅKér> ðsÉtyýñÙ»¢áá‰ë«UKwíW¬êWö{µ0êZŸ‹!ÅêS5»“Ç9Eʳj·:ßݱÖÅ$Tm¿{hëփ¯·Æ/)IÆçãÁ÷MÙü¯ìzÜwï¢n>ûTå'q@BMÄXÞ¸Åò.žœ[•vÀ!–©¯JpÕ·îUùӘ9± Òj•¾ÚjÀ>Î&èj4¤«“1KËrDeXòŽÏv½ìú)Áï)…÷ÏéÇ´8ZË4oÀŠ­/—^ƒHTð)úÃ鋐…agáÇ¡Óì³)P쐄ŰCÈhK8¯ ‹Üje ÓKý²ÿTDȱ2+½Öb¥oS¦èL@ƒ V§Q8ÐÙ —T:n"­×ˆkq#ÙÒ¨õI@G˜€ÙÉLÀDu"uËdNœk@ü‘‚ƒNy¼àKڭܨÖd–‚i‹ÀÓp=|!?ÙüŒ$ óPgªu©êÄTIwn�jb4ëuC¢¤A6À;ñ 3n"LãºÓŒ,HÚAØ]½þ 8,"jT ó9?‡1³žPCTq:<˟̵0…°Tҥϲu!« nD¯;�ø©©@AR˜@0Á|'H¡ä£RÖ$¾BÁ—\Q„(&ðёð¥.…ŒAaÈ"©¥¨th ‹€ YüŠb6vh\à+E�1¥(%“¦-(RFnaʼn(†Nv¡GeR WðJT ‚û ƒ‘T a“·@1Lïø\¥X¦€XX ±Ž�4F.AŸcÅË" §‚B $\!É¥s–qLj1vœR¦�Q¨RJn‚ßù@·\ \_ä\…\†‰üm7™„J$@\S²Æ‹lB’ˆl2)&ŠUAð(\_·HQ%÷|OX<•ù1ü ","‹<'4¡RI0(i†=T™AÛӓu&²q_Ðô¤YiuxÖî|zF¢: Ÿ ÷ی;SjƁ)E í@o @"4¸”dc¢6µFc6¶{ ÖL³ù +³=ìC h©$”ÈZÍËý3nÞ1ŸjH6&ë´ðp Jè +}àå /V÷ÇJ}ıR×þ ‘ü—‘¡k4€.^{hHüWÜü nH·W©$ø†rÃü@‚tà/‡ðêp@ ùåpPêlçÔE{Ô²îcŸ¢8¾2+�„Ó%µx?¯Wáß+JTþwœ|¶÷œu ÙÇÃç€iH:­¾IwAÝ æ÷èçlÛgµ­7¸MŸê9ß7Tn˜Í²[93ß?ñꔽV+lÛ÷]BR|þ³³ ¤ûxïŒä\ 6äÌhнŸv?’³["óŒ6¯¸km;±›}í±‡ýöë㗠òÎͪ㗶^ñ^•Àµ2|aÒJƒ&k~¹ûUp·—.¥–/¯RêEçvÍä X\u޹=ò<2°s#ƒÛ‡áڄÝÒNWŸ(JmYûԋƒLéBîĕ Ñ¥ƒ³E@1PÌ#EGÁá@‘Ï,ø©…óz Q64{0©ùçŠOë¨ëlš'Œfœ˜•Žõ(ë–ìO݇9—|<¼zÑô›·ê}Ó²¿¨8¥¼N÷…÷–A-žnmXØøø«ùÓåז +rwb°—áÇî Li™"Y4³×#U vC>Æ7›†…8ïÜ5ùí\_/¸MA½'l[PùË2—'ýµ¿ù±óhybvÆÔ>Gyñxñ,ñüÛïħ¯îYf¥ÅÀ¸„v Ŏk¥†S­TÊ:Hñïö¼-Җ «GòÏ­Œó]÷qÑîyWùEkœ§>ÝØÌ”Éï]w0>-X?g˓MêÑÖĉ : -ûfp¶«û{®#ê3o¹½G?×Å ¾9…«æÔîöر¥›ý %å?äK9 endstream endobj 190 0 obj << /Length 231340 /Filter /FlateDecode /Length1 409280 >> stream xœì½ ˜-WY.¼v頻vÍãžç¡÷î1ûœî3uNN8™È Hs0Ô)J¼—«" ^DDD®¸ (èïÅBdSPAP¦ô}ßU»º÷Þ݇œ“«ÿÿ<¿®õ|kÕ°ªê[ëÞo­ªÝ-RBˆEFÜtÑU¾ô‹ŸzþÍ"×]¢üÒK/ºø’k;ÿa‘+ý)Z½îÒ«ñ ÿãÇß'rå…PßxùUW\_ò´ÑäÐÞÆùúW\_uÙ¯ÿµ¢ú!r?åUkcû™+\_"õ¯8ÍCO^qõ£?ø¼{p¿Ÿþæ5=äQß×yòO ÑQ„p~ù†§]wÓNüàQ!îø+0õƒ7<ëææ?/ôyB܇ûåÿú‰7=éiùº˜½üåÎ{ÒuϼI…Šû݌ûÙOzê>ñûåg\_-RͧŠÌ î|òO{ÎkÇOõ\_%į/>ùôu7ÞþØÚóÁÏsùü'ã€û÷Øö»O~ÚÍÏy˃÷ ±ðPôñ)§øé¯{öoß!²¯»HÿƧ>ã†ëœçýӛE\w痟vÝsn2Rö›qýݸ¾ùôëžvZlü~^dßñŒÁ{nzÆ3oþ…{îºBdïnßôçoúìá\_þ-!¾‚ñ³<Á±O Qyã7ßþkëëJ ÀôÚ{jÁú?üöÅoßüÝÛB1±«¢}J6@™oÝw±x¤-¾}ó}}[LŽï¤ÜÏòʯŠ-ñ,‘ k!²ïÅsÓØO¥7R/Yyeö�nЋëôkÄÜTva!—Îf² éŒÿåE?ßV²÷g<ý„hn'ûû.IÈ·RrB¤¶··å“¤ª¬z£ølú"ñܦzjÜq\õCa8w5hÇ\_–y¾è¡ýÓ±ê—-|ôå -ƒ®5A׃ºô\ÐÃÐö÷@?Ï{$”~‰x\þZq]öÝÎ^#Ú Ë±ÝÉÜ#F™gж/ã>žw ]#l·qn˜¯¡í»·?Çóhזí®ÁuÏ?óDZ\_�¹ù—ˆ j äáx÷yyF}\ýçìëöW°ý,ðñlõ%àõ"ÔWàø•Ø>dàš­…#Û7ÛÁöùÛ:èb\÷M^ƒöx¼ç}ì/°-žk ®°-î9Lߕª¤^)~3}—xKæjáã¼) ýfŸ“>‘òtº„üMS̟$òº°ËÛZ˜£ÓéRVϛôõU ·Š›Ò¯Ùþ\¶;9\_\LÊß%êèß߃Ždn¥|mû‹àñÁÙ·‰ ì+ ¢$ÞóU…鯉8·”{9ôæFq|á<œØØþÖµ\O\Šþb¼Å�¼?šº]è¢ÝUòúE=ó9QÆö Ôùó;ㄱìO¡>‰qÿ²"¶ÿ÷8I}þôç¸>ó×8”{êšûބ¶÷ܳAτŽ”@ÎÿœÔa\Ãëñœ ùŒX–:¢îÆ Mä“P!!9þo”‚"Ð!ŸûrП€¾ôËlƒû†h\_?F¡nR?¨Rÿ¡ORg)Çgbl¨c±Íüυ'ŠŸù åœ/œÐm¥½PŽä™¶À{S·¨3IóýXïS\_a?©SSu'»,Ÿ-mº5U©û¬Ó'd† ï›ÔÙx¬“Zòp1í‘6‘Ô ?´Oi#¨ÓOǎrOêd,vê׈Î]‘ýˆ¸4sžxdú]ÐÿÇaû¡¨a|^-mð+™ÿ.>»ð±§X†,i»¿:W¿‚”ÿpêq¿wb,û™[ůÊúà í̇SÙ웶ï;iáÇbJ¶§ëyJ½3>ǚ4}î\?Z¸3û&ñDl)ûáíí̇Å/Òýçÿ.µj&5Žÿ>è'@#e)õ å)©?Ê?BØÐ›¯ž‘9!ŽfOˆC™wŠ 2´»Ž?÷^Ë5mÀHjiSG¶?!íêÈö'¥MÙ¾/®Åbý³Ä!}³“èëŽ^þºè§¿>¥Ÿsz:¥ŸÇp=¯—SµÉz‚-Fb§¸&$Ö°ÿÒ?^#íIú9œûý¤ý|½sýÅ-¼qûo¥¾U<&±kÐy ÎÿåďÀCÞÄ̗l?.÷ìíÇ¥/ß~úù¹¡þêö[ÛoÙÁԞO|Y9ÁRŽSöVQÝÁў¸rÏzÄÓ̀á1Žz?¿ ŠÙ¯Jß6–üÒiƒkð{àø7¶¿•qÅÓÓ?ƒØvÉãБ‡ñ\FAúÓ𹗋›Ó¯ÞþúeÒ]œ¾O<:½Æµ³bvAT³‰S¸FÈû± j#ÿ¹ ô“¾à2ìCV‰_¦ìsßhý2üÑ5hóFÙמôã¯]Žƒ¼öG€+¸W~I¸™±4iӓ×< ñ‚øÀ©±˜óqÞ3÷p©³–¼æÀö·W!e\_'6ñüž|Öe¨rDô³×lYÆ®ø¾ô»Åzú2ÑÀvYêý‹€QCàåeÀGPúÐ}ÐM;ޗX-ëíoJ¼ÿq‰çzvMóÐÓúL󏳭'󌭤Þ3‡8—úØYÕ3sŽDþ÷W's‰}j9þsSüœiŽ3SCÔiB,ÝaLÉ8š±,ãgƏ;5çm—ÉڛÜ'©-b cgƯÙr½‘s ¥©ùàÅ nLûÖÔ×Ä«A6¨2©Ÿ‚6ßÄ\ç6“Ÿúuôï·HۈkoàjêöíòüÛÿ›mPߊýê¯'˜–øÖ=>ö~0íßzÿ\1òêxBO˜£3Oèð„LšÇs¥ûÃîŒågÀèiœþ¿ÝOp>¡û‹K÷Ä÷³÷;×ýù¸ãœ÷ç’džöœŸ×½$ž)cœÐœÝ+qn‘yûnìŸð0oÇ;ö–Ì~˜:Eð‹À¬!èµðë Èý"Žý˜ò1V~GŒ±ÿvÐàØ? ¾‘çPÿFê%pnߨþ.öûvæVÙöQºñþôy^oŸËøc&ýàKÉ¿X¹ ·€ž–ÈšsO<û \繙Çl=sh.¼ßzCüèw°oaßÛ©|\•zғ•uåéÛ¹Üã”èñÊùõté“Ey߁‹/3O¯¿ôøéÓ7œ.ž8ñèKG~ä‡Nž¸nûô7®TN¯½à²SŸ½ñêc¿ý¥ÿ|õµ×^»Ö>põu»áݧ¯å\NÉçr¹ünRfÒ ×]ýá¾îº óãÙ>ýúzŽ—R‡”Ô[oé®-}ëIJªœzÈ\_¼ËÄ]Ì@I}Å}ÓÝʂ’KÕs9°ô­Ü·Ü\÷Ïí¤cOȝNN=ùÛ©'T/U”ëNíb%§<ú¹)%Ÿ¿."o]zãé#móó]yéÅã‹Ç'F«ÕSÕS§/­†§íW#\_»´¶´v¤]M=<ÅýëN\_w:uM售¥¾™rRÏH=cñÏ(­¦®J•J©sIÛÛÛM‘Jߏ —R©û¾›:/•ÒË¥¿\_J•öï~~û1™#KÕS—ÞÈ|üêãWŸ>6Éo½áúúéKO\ŠN\KN´~@r|ýcO|ܸxüúµÕ¥Ôõe>ññTêúɳ¿“ºå‰TñËRÕ뎟¾!U<‘:qüÑ:$öOŸÀP/ú©B7UZ´ÍTØ¿Öw|Ão/ú×úŒ”uäôéÓËËuÓ8~±~Y\…CǏ›Vñ8na>Ü(<ÞX]M-ëxÈ8UuÌSaÊuÍv¯u¯½Àúxõ aJ©tùTà¸ícÇޚª^í¸..Ðçʈ+\_¥T”2S£‡¬œ2´T7>†Q”Ґv˶&Z.ÉvòŠ8) ?•j¦\™3Ч2»»¼¼»­¦RÒދ–\H{+g|Jr÷=OÚ-§ŸœJ ‘ä“–‡”O™Š«áXmþ9ËÓ۝Tœ')Λ–;QYJýû¤ôc´ÐýrñÔl¦mÐ ¦rj'Ã4¦xy7óÅcÙþê$ËSN\4Ó9îòª“74R«O\pÚÔ2†uY¦Å31šm?Ú? ÷¤ù‰¸gE>]mQöÓÒäØ4í߁éúŒiWIU¤äh6áoŠw֓'-/Êács?ՙÉl#¿nH‹t|«t:µJ‰böï ïÿªl E(Û÷ Uh(5YD˜¬ ¥!KS(-”ß¶°P:²t…ÒCùm̌”pQ†G¡ü–(Š�eID(˲¬ˆö7EU”QÖdY” QEÙDù¯¢%j(Û¢²#š(»(ÿEôD e\_´Qd¹(ºÛßCÑC9}”Kb€rY,n]¬ˆ!ÊU1B¹&Ëu±´ý5qžXF9+(Èò XÛþg±!ÖQnÊò8åa1Þþª8" <\6P“å–ØDy>ÊÇÅ!”ˆÃ(Oˆ£(/DùAʓb åE|”£üЏD\€òRqåe²|°¸pûËrñ ”§ÄI”Wˆ‹P>D\¼ýûÄ%(¯—¢|¨,&.Ûþ{ñpq9Ê«dyµ8…òŠí¿Ãìí!()ËG‰+Q>Z<åcÄö¿$+Ëlj‡£|¼¸ åµêí{ÅÄ#P~¿¸åu‘(¯GùEqƒxÊÅcPžEùD”\_OCùdñx”? ËOØþ¼xŠø~”Oס|š,Ÿ.®ßþœx†¸åMF”?$N£üañÄíϊgŠ'¡¼Y–?"žŒòYP>[Ê\_?µý1ñßÅ P¾\¼å¯ˆáªWˆŸÆÙ\_•å+ÅÏ ü5ñs(\_%^Œ6¿.ËW‹— ü ñó(\_ƒòoÅoŠ—¢|­xÊÿ!~åo¡ü¨øŸ—P¾Nü2Ê׋—£|ʏˆÿ%~åÅ+P¾Iü\Žÿ¶,Gü޼Y¼ åïÊò÷į£|‹xõöÝ÷Åo |«x Ê·‰ßDùvñÚí»ÄˆÿòeùG·Pþ±xÝö²üñz”\ހòÿÿkûÃÏdù¿Å›P¾Sü6Ê?¿³ý!ñ²üKñf”%~å»P~Püµx Êw‹·¢üñ6”ï‘å{ÅÛ·? n€ò}QÞ\þåm·ï·‹w |¿,ï‚òO·ß/>(þ å‡d .PÞ)Þ¹}»¸Kü9Ê»eùñ—(?\þjû6ñ·²ü˜xʏ‹¿Fù ñîí[Å'Åß ü”xÊO‹÷¢üŒ¸eû}Y~V¼åçÄm(?/Ë/ˆÛ·o\_ïGy¯¸å—dùwƒÛï/>„òćQ~Y–\_w¢üGqÊw£üªøÊÝ~øšø[”\_—å7ÄÇPþ‹øÄö߈ŸDùMY~K| å·Å§·ß-¾#ËïŠ{PÞ'>‹r[|nû¯ÿÓ§ÿ÷é'}úßIŸþ%éÓ¿$}ú—¤Oÿ’ôé÷JŸ~¯ôé÷JŸ~¯ôé÷JŸ~¯ôé÷JŸ~¯ôé\_”>ý‹Ò§Qúô/JŸþéÓ¿ }ú¤Oÿ‚ô韗>ýóÒ§^úôÏKŸþyéÓ?'}úç¤Oÿœô韓>ý³Ò§VúôÏJŸþYéÓï‘>ýéÓï‘>ýéÓ?#}úg¤OÿŒô韑>ýÓÒ§ZúôOKŸþiéÓ?%}ú§¤Oÿ”ô韒>ý“Ò§RúôOJŸþIéÓ?)}ú'¤Oÿ„ô韸ÿЧ¿bÓ?ò€|úÝÒ§ß-}úÝÒ§ß-}úÝÒ§ß-}úÝÒ§ß%}ú]Ò§ß%}ú]Ò§ß%}úÒ§ß)}úÒ§ß)}ú‡¥Oÿôé’>ýCÒ§HúôJŸþAéÓ?(}ú¥Oÿ€ôé>ýÒ§@úô;¤O¿Cúô;¤Oÿ€ôéwHŸ~‡ôéwHŸ~‡ôéï—>ýýÒ§¿\_úô÷KŸ~»ôé·KŸ~»ôé·KŸ~›ôé·IŸ~›ôé·IŸ~›ôé·JŸ~«ôé·JŸþ>éÓo‘>ýéÓo‘>ýéÓo‘>ýéÓo‘>ý}Ò§ß"}ú-Ò§ß"}ú-Ò§¿Wúô÷JŸþ^éÓß+}ú{¤Oôéï‘>ý=Ò§ÿÍ Ÿ¾ôŸ>ý?}úŸþ«ÿW>ý®'Ÿþ»ÿéÓÿ\_ðéWä^\U‘Ng²¹œª.d2¹\:“N﮸Ëí¬¦äóJ>—W2%¯) v²( ¯Íd™°æi•Wd2ØËc#»Í)Š|7ÝMétòøJ^‘Å-up€»Æ'•̏çe£MÉxÿ#Çh•-§<žš‰_>¤3,ÍýL>Íä³ JN™ô·Try<‡óYp¯d‘Ù'ät>“ϰ-š mÒò4ϱ'à OÎeӅBŽìʗʹ$]×ó¦|>_Ð5²“—¯SÀ«šE7ò“Ng²$;%3:Îr §ÙŒw¹WØ'ŽcºgV8N’Åx„TŒ­’Vä;› ‡4? ‡¹tNv3MÖë¼By¡.“Ñä%¸‡4)_MÙ¹…‚³:–ÏJéæ)Ýl>–)u"'‡Œò|FÊ#~ †43›(F´É@a 4YÉT:Q"y˅Œg¤.ÉÆòX:i'¯ä2$Õra!½ Ó®–ç2à‰C\ßQ) ‰œþH…™è¤ªer¤|n^¦ò–{EMu>s¢=eÁ\HƒOlñyéLüÔiKÌɱaT•ÆšË麪’v@•IªÊëÒiÚh×I½ÏÐÈ d4Ó|œÉ·|t܋e¿žœMÚ±¿½)U•œšs ã8hoJ'ª=Ÿçm$¶Œ3d´WsINŽÉö;÷“e¡¼{“ÆEas>+'\ÆIPt±ø8°‰Ðö£ÜRfOÊÎ¥DÜs"—‚†¤ç‰7ÝÑRº’ %Ǧ‰Ú1K £;õ~Å\$ JË7 Aéz\ó'jyþ¬r3¹¥©gäè©ZZàáù™Œ}½˜‘&±(?E4ñ‚ ÿ•Ï«j&«æqë¼ Ñ¨ CúPúç),Êóɺ‹Ž¢‚kÕ}±hbDo0ηîŸ'wªFfTbQ>~'G«5§‹hH»X¤ƒ§‹T™Ò»²ÍÃ¥dKúÞ|Ü$¯ÒÃRýÀ½ �PÑÁ‹à<'ê ÿ/œŽUXª%˜aOÁJF×sÌàIÞV=—,"‘”¼n Ã95/• X×)ƒ£][Sã &$ÊÊQfŸ&œ¢/™ÄÌ tX,/¨Ì ½’dQސ¢Á§ªY8[£¡£ó„ v±(—NdCc‘q-[(ðì (_E—»<¨¢kÀ"EWä¥rˆs±²¡cŠŒzÀwV•HGUˆÝi6£ïÁ"Q¢X1¢@Ø9YS Љô4É»dÙD¶ÍÈ^ì‹Eô 3X•!±ò$rR]¹¡²’”=­lO’:{Æaìb‘’'É;eϒO†n¶$ZL†¡i¤oA¨™ y]žÄîÓmÊq›€8E&­z¢¶ ô%W÷"|�iÇþö¦x¨ù,RÕ³À"5»ދvñfŸœO²"3¼ÀL{>,/£8ebòj6.q“ÿXD•Ø û r^¨³i­qω\ z¿!%ZJ H(96MߋÈ^:»OŠUˆ5p6ÏÏE,2ŒY,JxÎO΋´±(?“øQ“QֈExpA[ ‚¦%ºìQ†íºÓYMavC•‘r‰l¼˜X$=>÷¨+À¢<£hu\~“†‘žƒ£–a»],Qµ@àЭ‹�%º¦Á³ò“¬],’þ(kjym‹²;a†’f\³@õ›;¸ƒÄ—|FËi9b{ä#ÕX”'"I–“: ™ÐYÃÈ3ç ©×Ê9™,±ÈB¼h˜è„;¥³b‘BHšÄdœ{H»AžÆ"ŒöŽaI>“=ƒØ£å8ŽCe&åMFŽh!«´´6‹EàEEN6CÓ2�N8¯ò˜ŠénJ,ƒj¡çé´,Ò$Atx,ï"#m,hê䜇2h1ÐI.a%kèùÙqb›œygbhŒcý8Iy¼ãr’K˶™¤7ò1Åqô'S–OZ8Ç#3I2Ú7·cƒ)èÙ]ˆC´ WièÜóàîO.HíÜv‹ä‚G–í,@‡[W¯ˆtÀA¹ H0´p£ Xr‰ Ò¬á³9‹á¿œyɵ¯B:^4äPªiÆ8i]TäJ!Î#pGÀ#•’‹ZÈè ՑaR&^ÙÒ²ÚÀYç¸''\HÃ}²–•gO ]yá\°Hµ˜àÀ-›ºÅ)&F߀úgùH27mAd"›Ž3ßÐ8擜;\ò”=v ­ dÌsAŽŸÌA)h:|j!S £-d9¤dŠmT )Ov3/õ%/ç¤ye]P5®­òì ”¯fÄ»Ø,h–U0TÍÒ»h2J¢w†4røsé܉ET <(k™Ê\ùe¨Lñ:ƒ\ÇÌd­Q¥MäôŒDLb|¬yl¶ùlÒN.´VM/CeÁS†j+O"'M–™ ËX'u3§´=­lOR¬ï¥ÐE5—‘¦ÒÁñy™\üÔÙ¯dö‡@†SOŶ ƒ”D8\A%é:#2Rì.²dÐÈ0[ås¨³Ìä|, Hg’^¤ ûõälҎýíM V½€¹ò<ÌÄϋ՞ÏóXCۘk£ìdìéJ’“ó³íù05Ç@^›\‹-%¶=ÊEM&ëiÓÌU"Ú~t¦¥Ë½³Žy´JÄ=+òXАô<ÉXw¢¥3Ë{“cÓ´w11at§žÇ¡ÜŽ ±fËõ‹{"°ÿì×ìbžÉ-³èR73.]ÉØ·›,R$!NÎM\Z.hY±³‚®åtՄ#ÕéÅ 03b‘Ä9Ñ tA¶],’NïÁ¢8˜# rTà-t݆6ôBlXphL‡ûϪñ\’ 7n[®Ü+À"ù‹ì,È&X”a$Med07ÁN6Ƙ}°(§#Ø×b‘šÓ0ߨÁ"‰c‘gOôÈÚ9™,±ÈfBdc;ÙÁ$E'å …Ê“›¶µ][ÙÁ¢ „¬¦õ‰y‘Ï],²&XD,· ̋4MŒÖF^7ô‹t339ædL¾yËÄï~2ñlXÄˆa†o3M²Õ”ܺq=˜D,2ՂͱÍÅkxÀU9÷cˆEP]¢¡A×9çÎçlkÖ4åë&9QS¨eDC…[yS)”¦cQ>žÑPŸÆ²mÜíä^ŒE¹|‚Eé,BÏ1¤ñÊiZŸ$Mm“ +')6Áé$o:’µ÷ÛMÐE¹-MGb‘t\Ù,’6:!¹l &fÆîCSeæþD]3|„©JÌ'9%Ÿ‰™A,"×0µ¬k0óB­@¥áՆaÁ§šYF4mtφDÑÀ€¬INQ\60ýÈsyÇá C °ëH· ­€t”†îº†S0|ƒ“! cK)ëo ¼…öBŠÏÌûPcq2ï¹ÚŒUʚüŽHá²%¿/!Sü¾@Æ1:ÏLÞ¬Y‘óeãœl«æ†º&¯¤ää· ±EL¿É§,ÕΔ–eN’.Ël–eA«åæ5’^0çRle{’æí=¶› ®úäÛF¸,® fø¼l>~æ°´„ I£Atš¶MJfېCV œû’è…b,’1ß,böÍçh…8“oð‘F‘É&½È˜ûõälRlû¦¯5ßór#~ÿX”‘ºO.ÌeÚ b¿LÓ°´$OŒW˜Ú.BñatwrO“ê£cî;pI!Y;žÃ"ú4ªD,´ýhZóBMó/—qϊ<4$=OԄDK§_5%ǦI¾°œ¡l66Öd/»3}˜J± ±æ²ß5$Xa†Éµ×„gr,Ëd¹Y¾',Ìdì#[bQ¡àڜvéüÞw5)Çy†´'ËÐ-Lë,ݵ,ÝBÐmYžié˜öÃ1KdËËéÎæóÄ Æ«¥¥4—#I’«Ž»O·BŒƒÑsyݳccšb9z.›·ár܇· À†g®×ažfe¸Ô³Ë«I/ÈÛÊ÷0V.~ÕAT—ŽZMÛKe0&6„ii¹ØÉCN¬,t ¨˜ô¼Tׂ™7191rºÊu.ZY_}A…¼¨ÌjéDjë\úgLpAèAV˜šlÜ)£º&F~¦-h'vÊa¡çb>É)xÊÅëqV¨æL€¤UÈy³…ñÒ . rHLËQ-ǖ¨­[0'O–iÛòÍd÷G9êß b"nÐÒdãñ®kãøj€˜m4M—Ý2uËЁåêfˆ±MÖð÷I Çω|!QÁIÆ~qÝC´È— ¾—Qä-àÁN‚ç‚BǶËpEu¬�A±ŸdÛ¶ø-¦„J”Šœ´ ~_¥;\ÍËê¸Î¶@S¶O™Z°’–OóŠ:\ր_s|#·g뚧iÀ[ÑíÀы|mƒ¨Þá[4Í)8c9–ŁCh~.^{‹ï¸0C�; t!mtPTJ<Ù) £ƒT>úwÅљmÅF ’fëè/ƒ+Ç5¸Neê†uæBÑ!P[ι$t×,2J¥óS×]ǰ²š¯´ÁBl12;qKÉoÔîaåb>É)ù$—Ì‹žw ¡r˜¾ú4Ñm—ƒ8|ª›‡T,ÓQ8¤½p4p æ¹þfè¨8]’¬eS)lË5m¾© ×F?0»²­Pçˆñ®ãb§XtÓ.al ¸ÔQ9´¨ÀصuΛt» ¹\÷Õè>䀥é3ñ—\D°¡h2¶ËqIQÏË\_fÑN�݆‘U½„éᦚ«#~7OGvüØ«1»ª‹)‰£@…±'•Õó¡¯ÐÁrÅ6ʾe[¶íKœÚòïڎ]­–|ßòpKôÛÎ"ƒóñ‚§“¹Ø¼8›¾™|�©å=ôö)æ]Tb®=b1Ч¢‹ö%Ùã«OÝöù=¾ç…/ôóqÃS<¿ˆÁód|wÁ4Ë0õ‚‰Éj]®½9.Ž®ãÛ.FP+}ý°]ÛuЦï#ŠÀ®åÚ^�a—Ë^Ñv«[ÜE÷ \5%Öáf†k˜³‰€Å'þèü¾Î÷ð SW+es&þšžŠ C-ÈØŽh¦…È©¨œšå´ ¶^ÆÞ„‹¸1ÛqK´c ¹„{&?àÍM/C©èƒT\Ž‘Ÿó'ÉA—¨0¾Eoo„¥‚Irl.I+›?E«ì=¶›TÕw&\g­9>f†’ħ&¤NÞg…¡i’êõ("%3ÌK ¤ àì„Ä€¹èÚwå{A]8Geöýl|drì@ҋ\|ð$px¦SéʦgÖ<ÌÄï‹òž¾žÃ¶‘˜Á~9°’<Á$}¶=fж'Ç ×tMZŸÇI\_2\_—Ÿ¦åD²N!'#v"´ýhZóB›uÌ¥Dܳ" IÏ5!ÑRj@BɱiŠ#–iJÜ2k²§ì÷.übàT@G�h€y¾² .Žp\_W~™ “,S­Ö f£@2®œKŠ0s¨1!^¬7S+ l7§MGÓ¼‚/m-~ÝãÇ,%ïh tœŽB.}É)ù$—Ì?@D =ßR\>s@²•†ƒû‘îCÅgŒàk~P�B¶Ã>„Zé–"WdM…P°äz”—熎¨,2çðÕ@p·lA¾>‚߆˜£À÷ªU¿äxuŒ­‰ùS0MS(L'aá˜I…pzhéø­tÀµWÛÐjUk.ã˓a Յ?ÉSjRrY²xÇ?ÕbìM¸cU¶5ã–h'¯œ‘>y“˜ËN-šªàI ±JË 'ÉѾ¹m3@2‹•‚Eòœp.ɛÎDOk{í&被óó6D¢yÏá¢$Ÿ§v< žš6yŸ…é´Ej6K%R2Û¶ DI (ê� sB‹,kޕc0hÃ}8£³d:‹"ÇnÆïéýzr6)6®}S¦vÔ·¢= rñûÇ"…º_Žíc7Ó6|s&[I¦iDv’ƒÙ×Ù>ØÉ|˜£—}¢oKÔ2y›´¾�“tgòýUüi°hòÃ& çì û r^¨³iþE["îY‘Ç‚†¤ç‰šhéôò^rlš¨³”ÏÇÁšì)û½ Uˆ5pÖáúN‚E­F\ç GÔ Ïä–?Ή±¨XQÆ™ÎxœÓ¢Qȗ¹ò"¾ê<3 DÜN¼R0xØ)¸ªžš¡¡ƒÒ«û†WˆÀ:Ôµ YRhÁ{2HŠ".U¸ÖhÚÌv#r=Ì¢sJ˜W4™<ßkµk@¦È³í"î”7–žõЌ‘Y²#süg ª¡†˜Æ¨ÃذÀ§§’Kf ¥†f X®Ö"f\X°=\ % ËFT.ªªïEi€1gÐ äBLñPa:Ã×&¦P)L¡ÊY­qIè˜\_Õì( BhE„ݨ„f3ªºA ckáҐk´¶Oä–cÖBËä¥aò[òˆ\㘅fczW~4.õ¨pÙÒRM2£jª æhŽ“×KªŒg{ó(kq[-nèÛPDzA¸eC®ðÇwS‹¦tOå °\9Í'ÉѾ¹íÊÅßrݐä{Ź[ٞd7÷ÛMšVôx‘€ÓC~Èç©zYøÔ„ “÷Yå²ã:J…´3Ûf¼•TÅóHü1 ×4 .¯ã®DpÄ xŽãÅn$>²à<¯$½ÈÇ@‚+=Ó©LóD䔜y˜±‹ÅûÇ"•º_žÃ“¶±‹72;I¦i”œ$ÇöšlŸN(ãπ»³^Éë-l[QLÁNãÏò"yÇC „-í û r^¨³iþE["îY‘Ç‚†¤ç‰šh)5 ¡äØ4ųç]Š#&ÖdO~4Ž± ±VЖ‘’Ÿ0w;,Ò1ލžÉ­Á_¨Êá+×U¿íÍdì·T–Xä81yÄ¢]#å'yžU‡{/ú.<•ùpnn(ŠQÑ'9�9b¡ËQKÀ‚®:$gmX«ŽbÄÝÁ¢x¤e@§£mJ¥–¦9¼¿ë"þ.V\ı¥Ð± à‰E-xËZÑiÁã�‹ìb¢L‹Z‘ÅXT¤ûˆf±H÷ÍlÑ)Ú\\„¹@†Ø)¸:ÕO¦Vƒ¢Tg‘_(ÚÌa!D_E8U–HÔ°MLßWk¶ì±¨‰ù¦çEE¿Åä~»S;‘ï8¥ÈõófՖXD;Il-f‡y‹”Èq|:ás751:ˆ…A-,:j#b.³}t»ÄA‰¢ û’!Dð>Ò�cîŨXû/f~Ž ºˆ€EV0Á¢’‹jµb#/ô"¿†ZÑ ƒ¨ƒV+ªya;옎aʂK]�0÷sb,\aÖŕ9U…ÇƬÌÒ[YÓÔåÏÚlL›mª LiqHi[¾=Éëe.ÓÆXÄØ†µ}&-}‡\_¦H/Èß§M~À;ƒEð¤r‚Á1\åK“€ŠEEá¶'±¨Ò0Rà•æ’¼çüAô´µ÷Øn\J¾ÉUW‘‹>OÕY’¤N(qT•Šë’ºÝj•”‘k!J•Ë´Z®–ƒ¦±È©Çç¸~œÉ7øÈ¢È+I/ò¥ýzr6 žéT¦õ ¢SÞór#~X´Íæý°h×Zdv’LÓ(»IŽÏ2º+Ná•Ä"îÎmx9^eNiƒ †u‹&‹æôi—m?šä¼P¿7%žy,hHzž¨ ‰–N¿jJŽMµc–¦±È“X$—fS¬B¬(-ß5$XÔëîb×^žÉ-„£Ä#¤Ò�¹‰ ÆÐç÷.¯ ÎÜóÕ¬®{_pî¾ÙPµ ì6t©yeLëÊa«R %?ªTڕJ¨«ºãé|që. ÀUk|¹¤›šçV\8³<¾ñåÈôt ƒ&\_iʧX¨ Ç­V{…‚׬p½ñw¹îkš^-ñË9¸{ [l´\^3TÃwJÎã«=,ôJŒÈ)Jù¦¢ò•¦…]Tß í|Å«8hR­T½2f.êö¼ž×õ¼n%L5Î%Áo‡=&Ìàúƒ6t«z^µì‡ŠÕp#] òTšÄv±õ‰‹,µŒ‰©ZA7\.9%Ÿ’kdˆÅÑJv³Tñ´v…¹ð­{‰$–Êu«R¯’‹QX)”1¤EÈ4¤Œª…Šg{šëٖçB„Ôóɨ¨AXŨ ÈFÄÒlVJå |uPŠZÐFD¸;åZ¥RìõÊÍ ØÇØ:–gs Ïu#j §èr Ï+9v•Hg3,Á¨ºžï½Ž7³. †æ:U4è®,�S¾æBl‚¹$°T1kA!Æ3†‰³­‹–¶l'¯¤àž–\)àÁ§^àéàI£SçU•ê$A´onsÓuëË#Ãê\’V6=íí=¶›t½É/nl.+äÇé|žf&ž…OMˆCB“©×}Ÿ46¤dÌw<‹T«iWcÃÐ+^…y›4ÓAQ ù?ŒsµšÏƒ8WÔ¤J|ð$px¦SÙÞå¿¶çåFü,°(¶†½yn$cµŠ;“ý Ó¨ùI®8Ì%[¶÷’̇V«\rKn|EÅ-zE¯bWܲŠ!¼ÈŒÿ ‚"’ï èӊá~аŸ ç…:›æ?úHÄ=+òXАô¨×KfÁôÓóùº%õB ·B?,[ü|¶¯øQ½^-×ëµIôÆÄ1å+Mù<÷šÍ‘a}¾ìŠ‚(¨w"8£fÕwÍ"öËA0B·{õäz¦^= Ž‚‚éŽêåz¹ÌCÈHÎ+å[³¬GvÉSA¤XÎ7›Í ÎÅãª[:™u¹R§Ã/ée§dÖCd¿bU,�^vkA-à7�Åz#ôÝÈÁ<Ž|fXǕJõsIELKFL¥riiy�vj¥ hÖ£’êvü’e•Á™‹Q¨0×À”üŠÙ.ԃ ¤×ÃZP÷É)ù$—̃ZÝÓë^¿Z÷õA¹Žñ J\ä Ôkm§Þnê•J¹T39¤Œy2j4Ðw7,ç„>B€„x¼r;AµÜ,V#(g¯×¨²•b­Ü ßj¯†[@Ì­z½2Õ{ÅêRXø¯9°œ } z¹›Í°ê¹ ""½Ð¨£AèY£Å&þGã¦î{¦ë3æÀìØ |Ýð¡EœŠ–¹L¨Ú-J%— ð±!ÛúqK´Óuò—pˎ)àï¦^fa³©7±!WNÕæ$U@õº¦qs¿0Ú'$UJ͹$)7’í=¶› ‹e‡?ˆp]U«”ø6ÏÓm–$>5!’"u:aHZ]ívIɦ©©Õê�g( ‹_Q9±IGl€ðºÄçD¥87›Š>òà\e7cW|�)6®}Svtu=lEó0ƒ¿,Ò¥…î“wç9q¦mÐ ¦r˜dšF+Jrr¶O §&u¤èôkU¿êÃÞ¤Ý!òÑ2¨c’^Œ_éOÓT‘üR“>­RJ„¶M r^¨s³Ž¹”ˆ{Vä± !éy¢&$ZJ H(96MԎiŠ#&ÖdO~4Ž± ±Ö ´m¤ä'Ìk«q­ØBp¾›ðLnS×?ÎØ„&çû«ë"Z4Ý(êwË Êº¥»«I:'‚þ¨Yo´ªåVËr[Õa«Un5ʵfs©Õ¬ZºFVÙ�¿@½Û†¶kDa3‚RB(|£Új5ã¡õ½É'uq§å’•‹Êö£NgÅ0K£VKN¤¢V¯„ùa§ùfÜVÑ­f³5lE«oY%Ü_‰øJ¯¨[Áj³Ú¬V¹Aóuùª™¯ ìÀ¤ê+­¨–‹¯:íNÔ ­²Ûð~YÍ ´ê­ª‡¬ƒìVÈܰ˜’TšßŒšÕ³ÒjC!ST4WVCæp¥U®”«ÕÖ¹¤v§[]eªÖªkë£N§Ø¨DQ§Uªª^?IJê42'Yòbv˜1Ú2»@ü¨Š¢Åœ/ rɼ_oÀ Ö[‘±Ôdn".Šª$D'˜Ôô¼V¿­7‰!- ؝G/jÍV»m5êQä¸õ(D†&5µ:v¢zµÈ¶,wq±ÝÀ8—ë•FuµZˆÖЭr£Öê¶ZõÕÕæb¹¾Ö¢Ð‹¼¦[…Q­–"ÄBÀۈý üvà…ˆa ­51°W—£™Ÿañu“m„<~N„èƏBÃä{.NE«Q¹TҜ®}à$ႍMÙ6DK_¶3x%m÷ôø›'ùWG¦^fXÅNÇèƒcÔÑ:“TѾ¹-'³aoÉ-’j•Î\’V6°Ó‰V÷ÛM–Õ©z\JægAµ WPù<ÃI< ŸšüBŠ3é~±H:p0 U&©]R·«ë• g(ü1 ¿îq¹¼Ž»®ï×|N©çNGUÁ‡ÎµBÒ ->ø�„v¦S¹ÕǵŠÝ= rñ³À"Zè~9¶ÝLÛØµ™‹I¦itKIn†2–4¢$óaoØl„°U V õ_ ëdñXÓäW"ù¥&£êZe?hØOóBMó}$žy,hHzž¨ ‰–RJŽMµcš¨%±A°&{×Áç?‰ŒUˆuJËõä'ÌÇq­:Bp¾›ðLn=›Ÿ 3õ–ta—Œ3ùêøÆ¢EÛ/•F}Z5àÁN2 ˜x°‹ì6Ý®ãuêËÝnµÛª6€ÐÝnÝ1¨dCK¡UêzIïá"0'+»Å(,jE˜m ­»SãK,Êåù.¾;a¹ß?ϲ++Ý. «Vê+¦a÷[%ß®ŠÅ¸Óé.wKã ä§QWÞ£)ŒlÜit ®tveÒùêÍr,Ûq€—z¨A#ôxeöû}h£;ùRÉ°ÛìRëzï;]°Þ-·œÚ4ÌF@啡U·W.¿VªØëã"sñ¼nµŽ99™,°¨>>©Þ¨ØXí÷Ë­z¹ÔïTëZ0¢M·Ã¡ÌûSÎÎWÞLÅôn±Sê–É)ø´3cbv�’Ý’¹ÚeîFlÝî;”Ng1è{F§ÕlÔ»‡´ ™Ö £^Ï閃²ôÊE£T¬Da¹ä—FËÀ®Õè×ZUÇñ–—{­N·SkÕڍ•R·ÛjC+ºÕV£³ˆñ¸³\kÀ؃RØñ+•b©Y)Wü41% Êí(èA90ÿÒiBÐÄJäŽ×KÎtrå‘ù9¢ÜÑ´Ba1\FRµRѼÉ¯U¢'llɶ@˜(”íL^I[4Mþ ˆ‚2µhjC÷Ì>68FýB’š Ú7·«rmu¸æ—IÍZ.I+›?Eï=¶›l»ß4ù=‰VhÖøg”ø<ÓK< Ÿš3ù¶b8¬TH‡F¤Ú$U¢²O £V3 .�¬5ÇáRxWDŒa³ÆçTêqî÷5 |(à\ӓ^ƒ Á•žéTn|c·<¨Ìà Fü,°ˆº\_nÌeÚ bß ÓT’܍˜;¡l¿ƒP|XîØÕ­ÄV×\a›6¨cX'‹ÇÔi,¢OkÖöƒ†ý9/ÔÙ4ÿÑG"îY‘Ç‚†¤ç‰šhéÌòÞäØ4Q;¦‰Zk²'=4Ž± ±Öõfmˆ”Ñá͸Ö3cÜdõ‹ë]T̾úlRi\ J¿·–­~!Æ�¶ŽÎ0ó A5ªB6ŰZ†kE¾JªÛ]Ê«Û6º5Ç ÖÖ»ýA¿ÑmôZë•Á ۃÔõn«¿4t67ûkîaŒm9¬{A­V®´LáfT£Qµ[ŠKÅrÐð‡YYÑÛuPÕæa#~ÿXdÑB÷Ë­¹LÛØÅ™k;{£Z’ã³ýl{>¬®÷ˆ]ƒI›ò ˆ-ÃÔÌO§\ ”¿ñ—ãÀî û r^¨³iþår"îY‘Ç‚†¤ç‰šh)5 ¡äØ4Q;¦‰Zk²gñ%Êü§W± ±6Œvs)ùs监/Du3¹ ]~‚Ì´<6üvs:W«µæÑ›W<~T«­¯¨žWiYže×v’eÃÄKÃþÔiŒ†^4lš£A³„:žåUj^¹†Œ© .µ–Ð…šÙÕê¨Z-WµjÖ£©ñ%UåØñ:ž^Š//uÜæÑ°Ùl"ä®7Ç® j%§n»ÕêÑáptpT;ʯšµêH«yšš^åè°3ìtò=ÌÈw‡®ç¸žß±šQ§¬A«­šÄ«å¥eìx͈.¼ËÃò¨?ê”;å¶Õ)¶ýX‡ºz´é؝÷åÙѨ^)6¢V­î>Zc®P:s2YQçè$̑Ž¿±¼Ü´ëµåa³S(®W;AÐñ‡:2KvªCäøOúxVdkµ¶…ƒ±aI>ãf£\ÄRµ‡åƒQÍ>4bFg½Z‡JãyŽ7\\+ŽÖ–ìa¿¾=icކŒ––¼Q½X·kõr±^µkÕFÕÊÝ>•¢ßYn÷›ž8°4@?Zýöbçûà·t†«£aÿèÑáVkPÆÕˋ˜²Tk½F­Q+—ªýj£¶²R”KK•rµXŠ,˘••ý£‡j3? †û÷zíAkýP!݁•vÕï£û@¨“kkë[ë퓵zöZÍõBu¯í„µ“kõᐢ\—ÉãK« ô1’C·W^¬ëíõfÓ4Çíµ–ß+¯ÔWêàu­¾V\_\_Zֆµ‹)S„¶íõÖJ¸öÊCo±ÆýÅÚbm°~^§YíVíNpáÉsëAëýÅþÚ¹¤ÕÕõáÉ!-Ž/ºôüñ¸»²Øn×z‹FõpsEÃZÌ‘¥am­ÅL&ˆ°Ìeo­Ý¸ëèÆz‹œ¢‹žäùøÚzÓ[«[Yo{ÇטכaØ^D·Ç!emu³º~hì®­, ×ýµó¶ÐùõÞ�=oì¯wª·Õ®W;M·ÝìÖ1ç«´ê£eZŽË=ß/=:^Y[\_ë¯ V‡[íõõ•hÅzoeqmc}}ù¢‹ÖŽö—/ÆØ61Z-w»­Ö¨Ûêo›K¨ì¬4jãF­Y©•¡ ç­CeºõÉ홵€b/ê5ëaµÉ˜Ã…ê´[®ß„5ÍÆ°ÝëuÍÒA:U'Æ#†‘Ù¶Å–²W¯ÕÛ´‘ (VMÖ¿•-L-šñØcƒc46Ǔ´Z\_·mn÷;ìÆæñr›´4Ï%ùc…ùƒP´“{í¦ «|­Y«™ÖÒÀ¶M‹ÏóJ,I|jB Ii2‡u»¤Ë/?r„4˜¤n½S&ml¸î຋‹år»Í¯{Ê@jÞµŽÀbiÀçtã<ø(€s“ÝŒ¿‰>€„ úL§”“/\ïìÎÃL{<¾,òh¡ûåØ>v3mc½5“;;¦q°›äõ&óZ]¶o'™T¶VWZ+­õnì–ÛËíõ:¶l küJǍÿ ‚)L+ÎôiKƒDhûÑ´ ç…:›æ_.'žy,hHzž¨ ‰–RJŽMµcš¨%±A°&{^©Ìht6ÅÄÚ¶—›HÉß·=õà¸6JB𓺄gr[<;þ㌛Ç]uŒ3óÅS/?Šh±Xï÷¼wF^É vW“‚�“ŒÖÅãñæêhc³TÛ\9¹¹¹´9­lºäÐæjÙ/w0WæY±‡æ½à¯+Ղ~o£dt‡ãU0<5¾üˆajͪÖÃíÆ¹XZ¼psn¥¿ÔÛ8> ¼èè¸ß."Ø®v:§666OnöOñë†a¯»iôQû^©ujcucu• ½)S#x„@p5ÕV[Æ¡þfw©7ÁÇ>r¸¿Ñ+jãÖèTÚhm´6×7W[«­•µ¾RÞì3Kc´Y VšÜãÙ¥ÍCƒNs±¾Ô|ªËÜ}ðæhe´²²q. X´zêr¤•Õ•‡\yñáËVúýÃóqAw¥R^+o´ÈܪÌ=f2!¿¢F®›½þJ°Ù“OîÅù’Ín°Ñºp¼Ù.ÙÞì–Jý•ÃH¥R±´qðüÆæù‡ýñúêê&ì$:¿¹´ ‰:\Ú4~¯ßj º~¿»Ønõ{õ^kí<띷zxi<ìä 767–ÆKVOö77Ç ›K㕍c‡6Ï»Š —ÆÁØvýÖÁúb··Àî·ZÝóz‹˜7 ÆíæáN«ÛhÖ ‡6ûÝþb»|ê²þLüU)…årÐm—˜v»~»Ùìwƒ¨Ûn·º˜Y®öGÃE»z4@”ØlóSn7nɶ]´lÉvA»Ù’¯%ŠÅJö\ùû$}°›ŠƒÃ‡ƒÃØà¶OÒ:hsÓu¹=,.özç_RÖ—Ï%þD{þàáÃýS{í¦bñðjƒ?;o6mg}Ùum‡Ï ª,I|jB2$E:~|q‘ôð‡_p)™y ۃ:éØ1ß_^ö}L?ë|…Ï<‰MAµ]o6חùœáJœ¶,ð¡ƒs›ÝŒó|�©ˆ!©§^¾¹xtς\ÿðáûÇ¢€º_^Ë´Ä &yq'cïè0ɛ]æÖl{>l©qòà¸;îÆWê×?¯¿Ù¶‹a—Ñ|J$5€ ®/'Bۏ¦9/Ô¹YÇ\JÄ=+òXАôÚVW›‡z‡€NÕc½c½­Í­½½qt =®m ‘G‡ª‡Ðæ@t°ÃýqoÜ[ß:iÐAÈ4Z+?ôªEæÅ‡m­×Æãc璎Ý_õp¤ññ#yÅñã+‡ÎŽ[»‹Çµê¸~¬GæÈ,ّ¹Å¹U܎ÆÑ†ý‘σQÒèÊ£[‹Ñ±Þe‡¶FѕG™·«Õáø8WM=ÙÞºèxxìðƁñìò­ Èt=ÿxuk©³G½öÒb8Z\é÷FÃÖ°wðŽ 8¾~hµZm]vÙñCǶŽ­^?ràòÑÖÖ¡ÃЊ­µC=hkkó꫏]¶~èÛA{Ô;ÒZ^^n,–G½îæpytÄÒá~÷x¿·Øî6£¨¸µ5-÷jW]9šY¨ó>Ñb¿Úù?ì½gTÕÚ6|¯µöžôÞ'eZ&uf’L\!e2) „– %ôދ¢X ˆ€ ©2 ¡¨ˆ‚XÁzTQ± ¨ˆHÉ|מ$Ïû¼Ïûý={åZ½Ümµi‰ Oˆ‹MJ‹À†Ÿžd1›4¶0åqéxZ+«]uPÓèªkLRæˆZ£v}0÷–Ô¦‚‚°D´=™€2¿•xвÚ'wÕ%+ÈL+¸ãq}YáÎ̂‚¤žÿž÷÷£V¤ë•¯+ ÊLS~UI/LÓ¾²(£¶#ªíý¬’“IÁ]w••)Hm{ÌF“NAQQhhjjh¨ÕŠëhR@€ò!Oeo Óu±±™iÊ8fk«+(�¾ <@a³õ}ºÖÌÿ‡‡èÿTäÙscžÉf¾s›I.(øŸ÷¢0e†þ“K¿Ã)sC™·8ÓM‡©a3·»¼Åu4ºêߜ\_Ê©ú.²²ÐBiŸ˜•”•˜gÌKê ±¶¾Œª6Dí¿ |\3ퟶ†RäJ½ý¹óývuß®òVECÓwB±„v+U, íy·B±Ž[¡XIë„PB…¼0 öžØ;žVRààÌ´b<í?§1 _kè¯!Rî»í4+Ôꣂ[œ±¸k(E™ÚM°Õ™îß\Naa1qK×N~%#,:Lm¹ù¨Õ‰½ìùùöœt»=ÚXœSm·§ÛóÓ;؋ûÛ³5šdKL¢Nc¶¨#Íê2¥&Vm1Û-æS€Éj·ççØíö[䫼gô÷ )±ð´‰È9F—V…þÓÓ-™f{ezDxt§|KBLFº%½ƒÉÔ½TÛ-ý•¯O¥›Ív?‹Fcµ¦„iûÛsì99ÊÒîzԍV£ÑDFk49êôØì„@»ÅnN·ddDEE–––"›Ÿ˜ŸZí‰pí9‰pêcŽuáò5ùšôØu‡x%¥˜g¦½859ÞjÌ´dD×ö·ô·Üe±ô³gdgääýoìEÙýïƒóÀÁ½JK­…Ù)–Ò¢ôœà¸®¦$$ĹHJ´›]DD«[1²ØlÉQÛ-Em”¦ÇvP·Rm·ôµÛÍj{bU¾Ý¢îkWœÝ ÍfƒíR&Fc·u‰³W”DØóqİGWƒy{z4ZRmOO°¤$Æ¥š",æ´$(֒˜›åç”fæ§GG«ªJò‹ìöÌü̜j ô[�«°§çw(ê\lÏ0 ¨3P~bJr\J¢-6-ÍlÉM³¤áøÎCЩSjAR|iR¢).>V­Ž,.¶˜-i‰Úþ5Í­N©ÕªMIšødå-܈¤„„sD” 'ìlÉ9–tkZ¾“: IÊٓÇU9ÊU׌š‰®z꤄D×7¢£uqAA¡­\_°Nýû‰N--U—"¢È¨4¨´íéØí¡¡J<#l˜+úĦ(è˜UzÇ¢ôyg& ­ÿ¿çýýDG—vˆ IH 阢Œ§6(¾eÔv("1㩬LKS0|x·n ²Úkbj¬‚Ν#³²"•HRR‚‚4šØXeoRc:f)ãX³[˜Uˆöƒ¤°Ùú>]é?qòóþý§"ïþÍö´Nÿö‚\Jiéÿ¼©]3ô\ÎN™íÓ Í¥ÝtHu²¶»¶9•x{}e°Ì¸j[¾9ßÜڢؒ‡±,öPˆµõÅãE¨)ªkUŸ"Øv¥ýnUäJ½ý1ßñ´«ûv•·š¾Š%´[é­/ïµçÝ Å:n…b%­B òÔì= w<­&¤„¡¡³ðµ)jä°Ö0PO”°f…Ú8:´õÇ+úD&­Ý[]jª5{ØÑn¡K°Z{v Àš¡‹ˆúûUÞ¨(LqKÿr{qy~vy¹&¡¼cmyyNyqN~yù òò<½ZŸb՚¬pº4T·FuSÚéÑIyzŠ9505«¼¼µËo9‡ûÿ߃¤+oeÌÖÊÊ!ZCfŸòNÙÙÙÖÜ´NÕّQš®ÅV³.Ôæ[,ÃÐKm¹u˜É¤Óe§¥”¿‡Z"tæaåùåùùŠ\Ë]Ž‚z¸hN—•Ÿg,·–§ä¤åäÄÄÄ@xÖò4MN|±©ØZËMpEåù¦|SǨüĎzԅSÞʉϏÊOVRyæ¯}A»M'ë”/éuq:‹®—n n…n“žëUz?} >û¡FŸ¨O֗ë뇸Áß 3’‘½þÆc¸1Êk43ŒyÆqƹƇ Œ‹ŒOŸ5n36÷ß0¾c¦M:uúa.éhÿƒtªnJg©±Á¸å¦tކt>ƒtroJgxܘóÌ%vQºÆ®E_Kº–騮_+»öѵë×Þ(€tæÒq~ [á æoó—EŠó$—¨Å–µŒÝÍÆ²)א­Ø^KrKRKb‹ò¶ç,º—fÐ8E•T@týøõw®Ÿ¹þáõcí Ô׈ΞlŸ™¬øê®3Ÿùë«MgîFj°¨?sÿWÓO9=ó̾¯Mg;½éôÊS+O­?µèÔF¥íé°S“O Bõ”íTú©Ø“e'KOæìp2ëdúÉԓ‰'õ'#OŸd'~>ñã‰ó'¾9qViuȉWO¼r£œ8|bÉ'JOØOˆ=¡?¡;£>¨¾ªþÊÿ"p{ÆmÛÓnO¹­n¥Võ½ª@^,“ªÌ3¦¾}áåo·¶ôÇüj{Z”ß^_Øn‰÷‡…5KI?aì5rƒü"BÇ­õåmÀ®Vü§G^«@nhK­ùÏ5ÿ­å4yÆÍø”ÿc͚Û)“·©Tm¹­Š çèaš'ÒJú–¡Çh!=C›éyò§zˆî!z‚.Ò¯´˜ž¤tˆNÒ/´–¶Ðïô]¢õ´ŽÒÚNCh(-¥aô6 §7é-zŸÞ¡wé=úŽFÐtŒŽÓ‹4’~¦Çécú>‚Í}O?Ò£4†FÓX+œ@ 4‘&Ó$šBSi:MƒmÞMçéXéLºî‡½î¡giͦ¹ô�ý@?Ñ^¶’=É8Lb2]£ël[͞bOÓ jaæÆÜÉÉÖ°gØZ¶ëƳ̃y2/æÍÖ³çè2ýɞgØFöÛÄ6³-l+ÛÆ¶³±¾8X#kb;é }êÙB¶‹½Äv³=¬™ù0_¶—íc~̟°@:C_± Ìö³,„…²Eìeö {•d¯±C,Œ…Ór°¦f¯³7X$Öúhó#ô]¥³ô5Ó0-Ó1={“eo±·Ù;ì]¬oï3‹eFǎ±ãìö!ûˆ}LûXŸ‹/ÅWñ½¸ ~¿ò_ùoüw~‰ÿÁ/ó?ù9Gî çò¿øU~_ç7x wb߂cïøOB–d“ÜQΓ dêÚå¹L.—»ÈÝäj¹ÜOhäòy„vI/I»¥=Øg÷Jûp9 ½,½"½\”^“I¯KoH‡¥#қÒQé-éméé]é=é}é˜t\ú@úPúHúXúDúTúvéÏ¥/¤ÒIéKé”tZ:#}%•¾–ÎIßHßJßIç¥ï¥¤¥Ÿ¤ ÒÏÒ/ÒEéWé7éwé’ôûš“.KJW¤¿¤«Ò5j¤&^Ï2è%ÚM¯³oh'í¢7èAzæ‹n¢»¨U¢‡è-úˆ¾¢Fô½èö?(ͦ´š.µÛ@ËX!-aEl{{éìnjf³Øö³4Yš"= Mµ¢Ÿ¸ »�éaiºt·4Oš!="͔æK ¤G¥zi¡´HºGZ.-–“–àDò¸ëLò´´ç¶µ8½­’VK÷Kë¤éYœTžSMSMWݍ“Í)~šŸá_ñ³ük~ŽÿåßÁ:óa=å^ro¡Z¡zØäPy˜<vÚ]®’{ÀJÉuòXn…\)w…­½!–ÀÞޕߓ߇íNÅ2Vôð¼Gæ/x´~á¢Å-Yúø²'–¯XùäªÕO=½æ™µëž]ÿÜó6¾°ió–­bÛöw8›vîzi÷žæ½ûöxù•W¾vèõ7yóè[o¿óî{ï;N|øÑǟ|ú¯Ï>ÿÄÉ/OþïMá¿7…ÿÞþ{SøïMá¿7…ÿÞþ{SøïMá¿7…ÿÞî¼)Øì½{Ù òó:ævÈÉÎÊÌH·¦¥¦X̦ä¤Ä„ø8c¬A¯üäStT¤Zùyöà À�?\_åß¾{¸»©dIpF¦RCYÖWç ååf%mŒŒÁ·dÔ9´È\»½ŽC[窦½½¦ 5GÜQÓÖZÓv³&ó׿QžÙ¤-5hͬ\_Ä—jµŽ ®xWW|©+N‡ÚÒðQ%Z«Ó–:ÊfŒª/­+Aw^žÅ†ážf5zz!ꅘ#Ì0©‘…0W„‡•æ6rr÷Qµ¡¤Ôa(Q(pcéàaŽª5¥%‘:]­ÙäÅC Cd°;ü’]U¨Ø5ŒCUìps £­pC µ¦ƒõ‹šýiH]²÷0ðÁýkbp­2F@2Æ-q„Ý{.üï$:,®™ki¤¨/ ­U’õõ󵎆5·–ê¿¶}8¸±¬®¾ /‚+zj1ŸW[ãó0 VáCᩕ»á†R%§nŒÖáa°FՏ©ƒbÔõªž©kR«m{gH]ª­ïUcÐ9 # µƒK¢ƒ©¾zæÎ›6ö³©Ñ? U¬¾~moŸ[#Ão–¹b®êJ¬¢ú¦\™B‘¡3ÌÁ¡ª%5ð”£xÃs¨~hN¤ë-ãZ†VŽaÐÇh‡Gq]½.òý•öو+Dý88Ô.üt{ÎඕÑÿR¢Š•Ü44”·ÇÉɎ¤$Å@܊¡QÐXàJgšM3š¹Ã0É\_‹�£\Èvpmn „¯Ó)ê]Øl£!H8æö¨iMkiHdÙR’k¼N)9Ø^Ò[)™Û^r³yv¼ËuÅq¸ÇÝüóó \•ë¡ÿ‡á­å= =úÕhKëëÚd[Ñë¶TkyÎͲ¶k-€À’’êl€éU÷«Q2ð'Ë ¥£ëÊ1Õ@£#¨¸FDòÚ֏®®¿ýoö¬$j¼•¾$£ÊeÿÚÝÜaÀ®¦-sø×•·úµžÊ—Vÿ¯5;/\­\ÁßÍÚxrä&ߞîx[ú6ò¼ë–xE¯~õõž·••a±ª¯/3hËêëê7;ç1hý õ{±åÕÔO\­kW³sßHGÙ¢Z01Šå´9Ù lAF[г\_Í^\ÁôªiᱸÎ^ۋ²š½Z¬Ï®\®ä\™JB«$¨‚aV4áx©ÔÜk#šë\•\®ôÐfF®<÷öêå<(¾ÚYZjµ5#L¶¸¦„Dë^¥ Ie}Y|Å·QÙd:‡Ü'šL"XÖd‡I“Q!pLS^’¦(€¤X®ÔJF®PRÙ6b9z‡°SkãÒ&“ÒªD ™7ÒÄ+Tªr §i2¸˜Œ&ƒ«‹(2¸ˆŽ$£+ôe~.}Hï ݛ Õ.ã9͟yûÆéæ×´Vóõð×ɳ¬sÓVÍ{q5iŽ™š™q·æ}Ã~ÍáØfÖ§IsÐÔ쎂WM͜½¤i„¨ËÙnÍÓHÍvƒ«tƒ¥Põº<³æiC?Íj#ÒMšL2h<8îƒZS¦2o«¦ÌØÌPlËÃ6OM®aЦ²sšYç[5i±Í )©ècënMFŒ3¸H靽g’›n3¹MsÖÇ­‡[G·t7³›Ö-Ú-Ê-Ø=ÐÝßÝ×ÝÛõZUî’;w'÷àfç[²ò^]°Ê_ T’K®¸?W|åm=¬úœ¹sÌG¨à=íÌXA½ìŽìäŠf7gµ#'¹á^uWM#cÕ"åà p4ìUU²æEʽÄXʼőJ8kÞÚZVá88”†h—{‚OŒeƒ=œBg†t(+ù¯®Í¿ås‚á·}j0<Ú±²¢gcKt­ÃªDœÑµŽNÊUt/ŸÌ'––ì哔 ¶f/»—O.­VòÙ½%µ7«‘žOB5ÊS¥ÚNÒ+ÕHÏvºªUºªÁLõ¥%z}k¥C¬³R æsÈUidk_±}U)ªñŠuõËc”j°‡ÖÎüní̛˜Ÿ«3?oru¥Tj4QÅdTª4fQ¡Ñ˜íÞúw±ÁØJN-]ãY­kÆþ®“ÐZVÐV‡»£ÎŸ¿üÿõ ·ÿ/³ƒOª¼ Pg(Ô9Îî˜;D«mv²í•‚¸º!CG)áà᎓†á%Ža†mãà¡ÿP;rŸDض¼p÷6Ø>€Rd.2)E˜J‘¯ò’O[QøìŽºÈ}lS[‘?² vJ¦ðÒÑ%7ÿ¦N:MÁôéÉð§MwåMäÕõ¬p”)Խف¯êéù ýDýýý:ý½J)è_³Û–·Nÿ‹^L‡5±ixJK\cNGˆ?%9múTå! 0h.yzrqM‘ž†´Ëp27S�ҁž€L¯Ãÿøøè!øO�Ï;•aæÒðÑ%ʈµÉÊ¢.¬;S3­9͏h {ök K»µ†yEÖp„M…éžE~8x3Úÿmà àà\ «°º:ŸÞjµµSij2ù„Ä4śš<%#qO›šœL ‡P5™Ýn÷ĦN'ˆ A€J®Ü©J³éJøwEù1"¹’4@”ërFί€sÀù–.ÎëòX2´ŒqžÊ×u¶·ÈH+iÅÒE–F‡è ñ8åTÑrêDÇhùÒLöiÀáb– –ü2 c2­¦Ï©?M¡oè .ÌtŠ¢ŸRš„‹bç÷ð+hs/jyR1½HûØ8֓R/ç&ÁHKœ)Œœï9?Cêú†Å:©±o)�ó9ô8nÐcèmçuPKCè6‹}cU-”2¤zçXêH/Ñ'¬±®4SþÌã% §çX;è<íüŽ^Á6:==H @qäQ,7–(ŸºÑ”ÞGŸ³ –&lÎx§Ý¹¹/Ðo<™n #™:Ó ZLÏBŸÒ9œ¼X&7[á>?˟¶ šN÷Ò\P¾m·Ñ^–ÆÒxކ&Ro”-¡ 'g¬VyQlS[ ÁÎçwN'%Q (\G¯aŒK,u0‚ЋiRŒ4M¶Þx�£5tœ>�§ ÷?è K‚ûŠÏæsœ}›œß€wr¨õ£‰®wY×C«‡è ú•]ã¨yL:,ß+\_t.ƒlãÈÚ»£vOô½Zj¢f¸OÁe�ӂ‹ÖU³‘l [ɚÙçìs®:ì’?‡xGœ”²dٙ‹žB•K<¬¤/‚fCÚËÀï&:Lo±ÇÌàèS´¿Ì;ò¸çø1~JÌK¤ëò#-gZ~l¹æ¬'7XY'Èa:m~a¡ !‘aSÙ× |)ß%|…¿0ˆLQ$z‰Z±@,GÅûÒi«ô…ÜY,ouÜ2¡åg…óa×ÑDºÉD” ûk ú&¹Þ‰žEP=={YF 8ê6Ó«ô}B\_ÒOÐ�1hÑÇÃêæ±ÇàV³mì5v˜½Å¾b—Çõp <‹òb^ÆGòypËùqþ)?/¢ÄP\½ç­»ÅçX %É)[áÊå…ò ªwÜÜÊ݆¸¿{ý¤µ7NµP‹ºå®–•-¯µ|çì㜠úd& (\WÃ7Àm%î¦#ô®ò®0hýq&+ïF3¬Á­²N8etf]Y¸Þp}Y?¸Ál7‡Íe²‡ØÃl1[árÊ{ëØf¶ÛõNø>¸OØiö-ûýÆaÄ\Àš<ž§ðഘwÝy5ÜH>nŸg@C/ð|/ÿT #ÚÁb²X-^‡ÄÇ/‰K&)EʓúH#¥‡¤cÒÒgÒ5Y#—Ê£äµò!U¤\CÕ[5FµJµCu^uÝMåV…“ê,·ÝœîF¬Vo‚ï—nû|CŠê›\K÷ðӘáb’<Ÿõ†ÄT¼—'Ê#ØE¡e\_°z1ZŒu>'Êø1‘õá¯2½Ðȹb-"'ÛÊ¿—øwRëÅ¿g ÒãlŸ(Šq™S>Wñ‘"=$ŸÇ!÷\_”ËïgùañxÈù2åÊkÙiy-ÿ€´ÒD§1«çó'Ñè}>š/¤)C¾F£!÷Íò=w\_À’ÄÇÒZúFøï¸X­Äªñë"Åò¼ÛŠ÷‹¡ l2Mb+ÈÆö³/Y3ŽÃ›Ä ¬’{C[îòq~OèØÇ“jYaUü"ï-¨Ž‹LÜxŽÓ‡t/,¶Óþ´Ð̀å<kZ)V“˜•éI¬÷—Z(+¶ü™¼vö¬0Q5¥Ò�þåbn|WC•öÁP\\_E³œsÙ0¬û]±~r•R˜VË0Ð6ûE(×c-„Q¯ý«~û™îfZ̬ƒ” )%‹¤R¬LuX £H­¡eª—䏨; #’´-kaå'i öœ¯1¾šò@_?zV2j-VæÉh±¦¥œlpÐ;ŒÓý ¹�ó¼JÇÊ»Ò9ŽÆU‰=ñ-í|’Š¡»jçC΅4Èù¬³?.©=›°þÎp6Q͗ky9YÊÀû{ûÑ ¶ëv9}õÈÈé¸A¼Ÿê¥aí,t.r~B!‡‚]ô§Ÿ!·rqÒ[ºñFg™˜„ê4õp¾àÔ0O凕÷�mp“±öÌ¥yl·ý™q; G D2‘Ê‚E>—Èsðv(÷ºBäsœÈ·È¯�X\$òB°œ(ð¢àr¢Ð8¢°¢ð7ˆÔ¨™Aü˜÷‰4‰´&"]à'"C6ÝEDñ'ãšÕDô•Šy‘†]/}QæƒDوrNåZ‰ò7A,¯¡nq/¢’IDecˆ:Î.ˈº¢¿ng‰ª~ ê9ލ¯è.ð2�tDÞ Ô© ÐÇà�ê½#Ð÷(ð9æc¢ñȟüÑ4O¢{ÖÝ÷!ÑlÐ2÷m¢yàg>î§ ¿ Z‚¾‡ž–ßK´íVãüÌQ¢†¢õ‡ˆ6@>[ª‰^¯[ˆv¢ß]O½ä\%ÚÝL´ñ= oÆÛ>÷@Î͐3äٌ¾›&ڛ€¶½Ïwä³mö!oú؇:û¡»ý5ÀR�4�-ò�ÈöÀ6�ëËËÐÍËuÀJà$Ñ+Z¢W1{Bއ “7v½ ¼‰±BFo9ˆÞE_ïƒï@Ã8~Kôdñ hùôúÙ¢Ï×}ºN¢Î)Èü4èù�ÿg‘´œƒì¿Kôèù—úŸPïgô÷ ò/B'þŠñ~‡.AF ï?Î]}ÎöÍÈæúhA-A˜?A¯s-ö².ÀOX͎ãg‰a•ab °˜¬Îs/'æ9‰˜'ИEÌw)±€Q€ƒX .AvàA ø–XP.0@:éà @^ðà2±ÐaÀbaëSÄÑwø.bïS?O,}F¢nT±èMÄ4/ W› ¶áH€2ý b± 9öbFð‡º k�ð”Ú’Kþ‚˜ÓÖ҂©û1+xȰ÷»Ð˜‰¶™ /õ3¯ËÊÆëàt°òw�ݹÈπž\´Ë_N sŒü( ° 8 ~Q,1ûQ�}ƒÞb´-Åh[¢P¿ä)�z(U%À=�è(½B¬äÜtvƕÐAe%0�ݕç‰u @\_WðÕ²ë]UÆ‰U£Ï^Sˆõþ”X¤û¾K¬÷¥ZŒ\_û±»@ÛÀ2à7bƒÐ\_t24 ) 6´±aÐßp\_b#+#Aû(ÄGA&£. ¹†LF_"64ÆÀ^Æf+ð>®�ÝãaCãa+BEÄ&r�64 üNo“N†N&£ÍØÝÈj螝MCzº;�[˜>gÀVî^Eìž8�}Μ�@¯÷Ö»ãÌý÷£ÿÙàm6d7¼Î†-ÌAý9cˆ=Ý,D|ä¾ 4,ƒÌžú°Å' ÓåÛ оõžüØê bOƒï5°Ñg@ÏZÈxl@~dð,tºñõÐÁsy�x~vú<æÓô÷lùØè&ð±i�;Þ þ6Æ6cl\¶€ž-èsËĶ¢ÞVÈq+t¹su+ô· ¶¼ shxßÝmGís;xÚûٚwÜ&ôÛ>š0ÆNÌ»ÐéNèf'øÜy•Ø®�ôîFûÝÐónȯrh†þ÷B{¡ç½uÄöm!v�ò>�~€ö?{¶ó2äò2xx|¿ ›¼½fÀëkík ÿ5Øí!Œsu=^‚m¼[}:zöýhxc#€ypü††MFÞaØ×¬AGÀïÌÉ#Ðó´íßMobü7¡ó£°ó·1?߆M¼ 9ƒ¾?�aî| ù} ™| ù~ýýý rù|þ6±/ Ï ãlüx;þN¾¿„οDÛ/Aϗ˜_‚Î/A×)ôs t†MžLÎ@¦_Aî_ANgÑÇYÌ÷³°•³°µs û[ÌÕo!ßo¡Ão�ÐòÚ~Y}|ø÷°÷¡óŸ@ïÐð3tv}þz’Øïë%Èê2ËÕÄþÄzwú»ª&v 6qöՂv-à͉¸k"n‘Ì :œ—‰³QÀüà}@y;=ЗW #îöqw¤=q¥ðª&÷^¬'îSBÜw ð ñ€$Gˆ!†~Ã끧€-À>àmà ààq5úxQè?ºñ˜Äµ×£áSÆnÄãʀ¹Äã %t$N žì \$nÌ žŠqÓÖOŸM<ócÙßïЅxGК²|ôUà�lj‚ŽBÐaGvÐPŒ¶¥¡ÄË®ïìOg^ ú»¾K¼›Šxw´ëq{ì"Þó �´ôÎ� ƒÞ½€¥@ñ¾¿v9ñ»NïïM|à=ÄëÝÄ#0Æ Ù ÏÃÑçÈ�|ŒÆ#H ¯qZã!ÏñÓ�Œ=z›» /HOʓAÛÐ2µšø4ô9üN?K|x¾ûC3àíÞ&÷Af³@Ãý³ˆÏÆs@ã\´{ÀNüAèåað?/‹ø#?\_ÐLüQ´«‡¾ÞÅèó±KAßãïãÏÇ:ɟXÀŽ–ƒþåèkùJ+ ·•såOúy�ø|ã?e0öS°›§Ñîé\�ô®­¬ÁØÏ@kÁËÚ!À&à'ëRðÒ�šÖCÞë¡g¬§ü9ÈgÃuQ¾åAÏFо:Þ =mFޖ{‰o5Ÿß֏øvèûE ñh¿v½²l퍰Ÿ&È|'ÆÞ‰ü]è{hy©€¼vC—{Í s/ô°ØÙÀ8/G({ò?¸ €¿†«Àk å5ÈîuÈí ̕ÃÐ÷aØåaÌÁðµÃ�ðò&tó&léMôýæ9G!3¬aü(dp<ÅØGÁÓ[hÿÚ¿…öo£ß·aïÞÞÅøïbμ ºßÅ {8‹~΢Ÿ³èç,tò5lùkä>¿†Ž¿†M| zΡÍ9Ðsôœ?çÀÏ9ðó lé»Jçÿôýx‰øÈûø¼�>/€ž àógðù3øü|þ º~Ÿ?Ãf~Á<ÿrý4þ‚5éÐ÷ æÖEØÖEèú7Ðñòþ@Þeä]FÞeèö2ìî2æÇeèúOÌñ?¡÷?±Æü‰µäOÈáOèøOðx:¾_|®ý¹‚µk(ÿ zú :ü öùlÿ/èô/ØÇUÌÇ«°û« ù\ê]C½Øn øwZHP ö ~œ„4x„„|”„[8 wž'Ix]"á-(ó &á« xø˜„ß$ HN�f“ªú“þ8K"ä2‰P‰°\á'b°†„ú)‘è;j.°”Dô>š2Z[�äé0®n% =ú×£Ò¤Ã8ŽD舉 !±‰är †„é�ÌÍSÆ�÷’H]l"‘v¸B >­à74¤7�à ‰LА5„Dv\‰ðÜa9‰Ž¨—ä›HL@{!è²aÌ¢s�ø)F»Ô)ó´�ڗÙHtªÀsy5€~;£}g´ïºÌ"Q² ð\‰¾\Aå(]ûèö6‰îaÕE=pEï~{ ßêWHôº‡DoȬ7êõÝM¢Ÿò%#ÈgàÏ$O#1ºŽD|äZ�ºù�ÞGÎQyÀ�º…v£Àû¨/�´u•Ähèy4d:ãŒ^�@v£!;œ“Åhô5}¾Æ ¯1z�ºƒ¾Æ@Žc@÷Ècl �žÆN ÷±G�ð2N ”�ß8ô;z÷‰ñ¡�ä5ú™ŸãAïŒ1ôN�½ « àkd>ÑÈ Ó‰°­‰ÃÄ3$&yÀ@�´OjÏ8›‹ÉÐÉä~ÀÃÀ‹�ø˜>¦@¯S Ë)ÐËèb ìjJ ‰©ÝTØò4èeڃÀ6àSÓ!ïéI@/�¶9²™[›~ÄŒ8�óklnÆóÀû�ìínÈénÈénÈénÈénÈénÈéÈéÈéØîðvï2³Ö“˜p.ê>À㰇!ƒ‡!|x‰y°«G0æ|Èo>Ú/�o¢ÏGß%QÙ×cž,؋w‹ ÓŨ·²\_ [ ²} ô-.EŸK!ÃÇAããû2ôóòžÀØO@\_O@>OÀ6Ÿ�\_O@>Ë!cÜ/ÄrÈg9øXµbæË вzYÑÀ\]±V@®+£�èIØÕ“àq5d¸uWc¼Õ s5ld5ôñìú)¬MØkÅÓ{­xö±2]}®AüèëèãØÎZ¬gka§kAË:ÌéuÐï:ÈmÝ·$@O֟ȩºl�¯ Ðë³ÐÛ³àu=lq=úY»ô>ž/σÆç7Ðõô±}l�¯ à #ìl#h݈~7bμ�^_€Mmò@÷&Øð&д2Ü Ú7ƒö͘?›AÿÈ} d´ò܂>· Ï-ès+lz+ÆÚZ€–­ÐáVØÔ6ð» ýo­ÛPwæùvð½v¹zÚ^¶Ãö_ÄØ/¢ý‹Ðõ‹ åEØËèiøß± @;æ€ý;ÐÆ6°éFðلµµ 6±ö¹6· m^Bÿ»±>ìA»½°©½às?—±V„,Áö߀~ŽÀö߂.ށŒÞÃü}6òþ)@·¢ìSÌýÏ1OÀξD›SÐÍ)Ðv<}çÇ߀Ïo÷ßbÜo¡§óèï<ôð=dø=ììÈäGØÅOý¬ØÅ/XGAÁÓ¯ �êý^~ûÄïÿwèáÚ\‚ ^œûñ? ë?cÜ˰ïː͟Y�ìèOèèOð{k ö\qí® ü æÄ_˜óa¼¿0ßÿ‚¾®BWAëUðuõ�€v×@ë5Øà5Œ{ r½Ž=á:Ò×AûuØÙ èýäsõo@·-XÛZ óȱi'Ö'dîûHò%�u}’ä—� hõMþ3�Ѐ>úè?Ðì&)åA£€�xÖu�èÃùB ½!S€WH]N lÀ_¸ è m8èÆK ^p‘Ôà9í"§È Q ! eQ_ñ¢Ñgô§$Ť %¦8C’zÐæ’¤ƒ|õ“H2 Ä]PŠ5à/¼1Ž}/’„û¡w€¤x+€ñÁ_ü’ÐG,�<$/õ’üU$%«ÈѝšÐ—é3’ÌàÅ ›0/ / lÄRNR ÆN…þÓ [+t—ŽþÒÁ{Úd‚ž,è&õs~")ד¤Žà)2ʯ!©�| ¿´bü«$Ù`W¶oI‚œìèכ²? ŸbÈ¿õ‹akÅÐGI,�½—@F%_)ڔžJ/C_eÐa'è¿äØé’Ê¡Î°Çΰ….uȱË6à~~~~
4153
https://ditki.com/course/usmle-comlex-step-2/glossary/pathophysiologic-disorder/hyperparathyroidism-for-usmle-step-2
USMLE / COMLEX - Step 2 Glossary: Hyperparathyroidism for USMLE Step 2 | ditki medical & biological sciences Back medical & biological sciences Hyperparathyroidism for USMLE Step 2 Start your One-Week Free Trial Already subscribed? Log in » Hyperparathyroidism for the USMLE Step 2 Exam Pathophysiology Parathyroid hormone (PTH) plays a key role in regulating serum calcium by increasing bone resorption, enhancing renal calcium reabsorption, and stimulating vitamin D activation to promote gastrointestinal calcium absorption. PTH also promotes renal phosphate excretion. Primary Hyperparathyroidism: Occurs when one or more of the parathyroid glands autonomously secrete excessive PTH, leading to hypercalcemia. Most cases are due to a parathyroid adenoma (85%), with fewer cases caused by parathyroid hyperplasia (10-15%) or, rarely, parathyroid carcinoma. Secondary Hyperparathyroidism: Develops as a compensatory response to chronic hypocalcemia, commonly seen in chronic kidney disease (CKD) or vitamin D deficiency. Tertiary Hyperparathyroidism: Occurs when prolonged secondary hyperparathyroidism leads to autonomous PTH secretion, often in patients with end-stage renal disease. Etiology Primary Hyperparathyroidism: Parathyroid Adenoma: The most common cause. Parathyroid Hyperplasia: Often associated with familial syndromes like MEN1 or MEN2A. Parathyroid Carcinoma: Rare, but presents with severe hypercalcemia. Secondary Hyperparathyroidism: Chronic Kidney Disease (CKD): Impaired renal function leads to reduced vitamin D activation, hypocalcemia, and compensatory PTH secretion. Vitamin D Deficiency: Causes hypocalcemia, prompting increased PTH secretion. Clinical Features Primary Hyperparathyroidism: Often asymptomatic, diagnosed during routine screening for hypercalcemia. Symptomatic Hypercalcemia: Bone pain and fractures: Due to increased bone resorption (osteoporosis, osteitis fibrosa cystica). Nephrolithiasis: Kidney stones due to hypercalciuria. Gastrointestinal symptoms: Nausea, constipation, and abdominal pain. Neuropsychiatric symptoms: Fatigue, depression, and cognitive impairment. Secondary Hyperparathyroidism: Bone pain and muscle weakness due to chronic hypocalcemia and high PTH levels. Underlying conditions like CKD or vitamin D deficiency are common. Diagnosis Serum Calcium: Elevated in primary hyperparathyroidism, but low or normal in secondary. Serum PTH: Elevated in both primary and secondary hyperparathyroidism. Serum Phosphate: Low in primary hyperparathyroidism, but elevated in CKD-related secondary hyperparathyroidism. Vitamin D Levels: Checked to rule out deficiency, especially in secondary hyperparathyroidism. Imaging: Sestamibi Scan: Localizes parathyroid adenomas for surgical planning. Neck Ultrasound: Can help identify enlarged parathyroid glands. Management Primary Hyperparathyroidism: Parathyroidectomy: The definitive treatment, especially indicated in symptomatic patients or those with complications (osteoporosis, nephrolithiasis, or significant hypercalcemia). It is also recommended for asymptomatic patients with calcium >1 mg/dL above the upper normal limit, osteoporosis, reduced kidney function, or age <50. Medical Management: Hydration: To prevent kidney stones. Cinacalcet: A calcimimetic that reduces PTH secretion, used in patients who are not surgical candidates. Bisphosphonates: Used to treat osteoporosis by reducing bone resorption. Secondary Hyperparathyroidism: Treat the underlying cause: Vitamin D supplementation and managing CKD. Phosphate Binders: Lower serum phosphate in CKD. Active Vitamin D Analogues (Calcitriol): Suppress PTH secretion in CKD. Cinacalcet: Useful in reducing PTH levels in CKD patients who cannot undergo surgery. Complications Osteoporosis and Fractures: Due to excessive bone resorption. Nephrolithiasis: Kidney stones from chronic hypercalcemia and hypercalciuria. Hypercalcemia Crisis: Severe hypercalcemia leading to dehydration, confusion, and cardiac arrhythmias. Requires aggressive treatment with IV fluids, bisphosphonates, and calcitonin. Renal Impairment: Hypercalcemia can cause nephrocalcinosis and renal insufficiency. Key Points Primary Hyperparathyroidism is most often caused by a parathyroid adenoma and leads to hypercalcemia. Common clinical features include bone pain, kidney stones, and gastrointestinal or neuropsychiatric symptoms. Secondary Hyperparathyroidism arises due to chronic hypocalcemia, commonly seen in CKD or vitamin D deficiency. Treatment focuses on correcting the underlying cause with phosphate binders and vitamin D supplementation. Parathyroidectomy is the definitive treatment for symptomatic primary hyperparathyroidism, while cinacalcet and bisphosphonates are used in patients who are not surgical candidates. Complications include osteoporosis, nephrolithiasis, and, in severe cases, hypercalcemic crisis. Related Tutorials Hyperparathyroidism
4154
https://planning.org/knowledgebase/resource/9182244
Urban Expansion, Sprawl and Inequality About APA Join Log In Cart Toggle navigation Menu Toggle Search Search by keyword Search Membership Knowledge Center Conferences and Learning AICP Policy and Advocacy Career Center In Your Community Connect with APA APA Foundation Membership Membership Overview Join APA Membership Renewal Frequently Asked Questions Special Offers APA Shop Knowledge Center Knowledge Center Overview Publications Planning JAPA PAS Reports PAS Memo PAS QuickNotes Zoning Practice Interact Applied Research APA Foresight Green Communities Hazards Planning Planning and Community Health Research KnowledgeBase Contributor's Dashboard Featured Collections Search All Collections Multimedia Blog Podcast Video Topic Based Resources Autonomous Vehicles (AV) Climate Change COVID-19 Disaster Recovery Infrastructure Planning Advisory Service Conferences and Learning Conferences and Learning Overview Passport National Planning Conference Planners' Day on Capitol Hill Upskilling Planners AICP AICP Overview Why AICP? One Path to AICP Certification Maintenance Maximize Your Credential AICP Fellows Ethics Policy and Advocacy Policy and Advocacy Overview Policy Issues Planners' Advocacy Network State Government Affairs Amicus Curiae Career Center Career Center Overview Job Seekers Employers Advance Your Career Choosing the Planning Profession Mentoring at APA In Your Community In Your Community Overview What Is Planning? Great Places in America National Community Planning Month National Planning Awards Planning Home Consultants Connect with APA Connect with APA Overview About APA Chapters Divisions Students and New Planners Officials Member Directory Awards and Honors Equity Diversity Inclusion Advertise with APA APA Foundation APA Foundation Overview Ways to Give APA Scholarships Foundation Donors Main Menu Membership Back to Main Menu Membership Membership Overview Join APA Membership Renewal Frequently Asked Questions Special Offers APA Shop Knowledge Center Back to Main Menu Knowledge Center Knowledge Center Overview Publications Back to Main Menu Back to Knowledge Center Publications Publications Overview Planning JAPA PAS Reports PAS Memo PAS QuickNotes Zoning Practice Interact Applied Research Back to Main Menu Back to Knowledge Center Applied Research Applied Research Overview APA Foresight Green Communities Hazards Planning Planning and Community Health Research KnowledgeBase Back to Main Menu Back to Knowledge Center Research KnowledgeBase Research KnowledgeBase Overview Contributor's DashboardFeatured CollectionsSearch All Collections Multimedia Back to Main Menu Back to Knowledge Center Multimedia Multimedia Overview Blog Podcast Video Topic Based Resources Back to Main Menu Back to Knowledge Center Topic Based Resources Topic Based Resources Overview Autonomous Vehicles (AV) Climate Change COVID-19 Disaster Recovery Infrastructure Planning Advisory Service Back to Main Menu Back to Knowledge Center Planning Advisory Service Planning Advisory Service Overview Conferences and Learning Back to Main Menu Conferences and Learning Conferences and Learning Overview Passport National Planning Conference Planners' Day on Capitol Hill Upskilling Planners AICP Back to Main Menu AICP AICP Overview Why AICP? Back to Main Menu Back to AICP Why AICP? Why AICP? Overview Value To Employers One Path to AICP Back to Main Menu Back to AICP One Path to AICP One Path to AICP Are You Eligible? Register, Schedule, or Transfer Exam Take the AICP Certification Exam Education, Work, and Experience Verification Certification FAQ Certification Maintenance Back to Main Menu Back to AICP Certification Maintenance Certification Maintenance Overview For AICP Members Program Details CM Search AICP Member FAQ Become a CM Provider CM Providers Resources CM Provider FAQ Maximize Your Credential AICP Fellows Back to Main Menu Back to AICP AICP Fellows AICP Fellows Overview Nominations Ethics Back to Main Menu Back to AICP Ethics Ethics Overview AICP Code of Ethics Ethical Principles in Planning Ethics Case of the Year Reports on Case Activities and Requests Policy and Advocacy Back to Main Menu Policy and Advocacy Policy and Advocacy Overview Policy Issues Planners' Advocacy Network State Government Affairs Policy Issues and Guides Amicus Curiae Career Center Back to Main Menu Career Center Career Center Overview Job Seekers Back to Main Menu Back to Career Center Job Seekers Job Seekers Overview View All Jobs Launching Your Career Employers Back to Main Menu Back to Career Center Employers Employers Overview Post a Job Posting Rates and Tips Employer Dashboard Advance Your Career Choosing the Planning Profession Mentoring at APA In Your Community Back to Main Menu In Your Community In Your Community Overview What Is Planning? Back to Main Menu Back to In Your Community What Is Planning? What Is Planning? Overview Planning History Timeline Teaching Young People About Planning Housing Supply Accelerator National Planning Awards Back to Main Menu Back to In Your Community National Planning Awards National Planning Awards Overview 2023 Award Recipients How to Nominate Previous Award Recipients Planning Home Consultants Back to Main Menu Back to In Your Community Consultants Consultants Overview Submit an RFP or RFQ Search RFPs and RFQs Find a Consultant Connect with APA Back to Main Menu Connect with APA Connect with APA Overview About APA Back to Main Menu Back to Connect with APA About APA About APA Overview Mission Ethical Principles in Planning APA Leadership Back to Main Menu Back to Connect with APA Back to About APA APA Leadership APA Leadership Overview APA Board of Directors AICP Commission Bylaws APA Senior Staff APA Dashboard Media Center Chapters Back to Main Menu Back to Connect with APA Chapters Chapters Overview Chapter Websites Divisions Back to Main Menu Back to Connect with APA Divisions Divisions Overview APA Interest Groups Students and New Planners Back to Main Menu Back to Connect with APA Students and New Planners Students and New Planners Overview Student Representatives Council Planning Student Organizations Young Planners Groups Scholarships and Fellowships Student Awards and Competition Officials Member Directory Awards and Honors Back to Main Menu Back to Connect with APA Awards and Honors Awards and Honors Overview National Planning Awards Great Places in America AICP College of Fellows Student Awards Student Scholarships Chapter Presidents Council Awards Divisions Council Awards APA Presidents Award AICP Presidents Award JAPA Awards Equity Diversity Inclusion Advertise with APA APA Foundation Back to Main Menu APA Foundation APA Foundation Overview Ways to Give APA Scholarships Foundation Donors Urban Expansion, Sprawl and Inequality Landscape and Urban Planning, 177: 259-265, 2018 By: , Reid Ewing Report a broken link Benefits of Compact, Mixed Use Development This article introduces a special issue of Landscape and Urban Planning on the topic of urban sprawl. It discusses the outcomes of sprawl in economic, social, and environmental dimensions and calls for more research on the relationships between sprawl, spatial inequality, and sustainable development. Ads powered by Follow Us Back to Top Membership Membership Overview Join APA Membership Renewal Frequently Asked Questions Special Offers APA Shop Knowledge Center Knowledge Center Overview Publications Applied Research Research KnowledgeBase Multimedia Topic Based Resources Planning Advisory Service Conferences & Learning Conferences & Learning Overview Passport National Planning Conference Planners' Day on Capitol Hill Upskilling Planners AICP AICP Overview Why AICP? Get Certified! Certification Maintenance Maximize Your Credential AICP Fellows Ethics Policy and Advocacy Policy and Advocacy Overview Policy Issues Planners' Advocacy Network State Government Affairs Amicus Curiae Career Center Career Center Overview Job Seekers Employers Advance Your Career Choosing the Planning Profession Mentoring at APA In Your Community In Your Community Overview What Is Planning? Great Places in America National Community Planning Month National Planning Awards Planning Home Consultants Connect with APA Connect with APA Overview About APA Chapters Divisions Students and New Planners Officials Member Directory Awards and Honors Equity Diversity Inclusion Advertise with APA APA Foundation APA Foundation Overview Ways to Give APA Scholarships Foundation Donors Log In Contact Us Privacy Policy Chicago American Planning Association 200 E Randolph St, Ste 6900 Chicago, IL 60601-6909 Phone: 312-431-9100 Fax: 312-786-6700 © 2025 APA. All Rights Reserved | Privacy Policy | Advertise
4155
https://www.doubtnut.com/qna/644633694
Let a line y=mx(m>0) intersect the parabola, y2=4x at a point P, other than the origin. Let the tangent to it at P meet the x-axis at the point Q. If area (ΔOPQ)=8 sq. units, then m is equal to _______ . The correct Answer is:1 To solve the problem, we need to find the value of m such that the area of triangle OPQ is 8 square units, where O is the origin, P is a point on the parabola y2=4x, and Q is the point where the tangent at P meets the x-axis. 1. Identify the point P on the parabola: The parabola is given by the equation y2=4x. A point P on this parabola can be represented as P(t)=(t2,2t), where t is a parameter. 2. Equation of the tangent at point P: The equation of the tangent to the parabola at point P(t) is given by: 2ty=x+t2 Rearranging this gives: x=2ty−t2 3. Find the point Q where the tangent meets the x-axis: The x-axis is defined by y=0. Substituting y=0 into the tangent equation: x=2t(0)−t2=−t2 Thus, the coordinates of point Q are Q(−t2,0). 4. Coordinates of points O, P, and Q: - O(0,0) - P(t)=(t2,2t) - Q(−t2,0) 5. Area of triangle OPQ: The area A of triangle OPQ can be calculated using the formula: A=12|x1(y2−y3)+x2(y3−y1)+x3(y1−y2)| Substituting the coordinates: A=12∣∣0(2t−0)+t2(0−0)+(−t2)(0−2t)∣∣ Simplifying this gives: A=12∣∣−t2(−2t)∣∣=12∣∣2t3∣∣=t3 We know from the problem statement that the area A=8: t3=8⟹t=2 6. Relate t to m: From the line equation y=mx, we also know that: 2t=m(t2) Substituting t=2: 2(2)=m(22)⟹4=4m⟹m=1 Final Answer: Thus, the value of m is: 1 To solve the problem, we need to find the value of m such that the area of triangle OPQ is 8 square units, where O is the origin, P is a point on the parabola y2=4x, and Q is the point where the tangent at P meets the x-axis. Identify the point P on the parabola: The parabola is given by the equation y2=4x. A point P on this parabola can be represented as P(t)=(t2,2t), where t is a parameter. Equation of the tangent at point P: The equation of the tangent to the parabola at point P(t) is given by: 2ty=x+t2 Rearranging this gives: x=2ty−t2 Find the point Q where the tangent meets the x-axis: The x-axis is defined by y=0. Substituting y=0 into the tangent equation: x=2t(0)−t2=−t2 Thus, the coordinates of point Q are Q(−t2,0). Coordinates of points O, P, and Q: O(0,0) P(t)=(t2,2t) Q(−t2,0) Area of triangle OPQ: The area A of triangle OPQ can be calculated using the formula: A=12|x1(y2−y3)+x2(y3−y1)+x3(y1−y2)| Substituting the coordinates: A=12∣∣0(2t−0)+t2(0−0)+(−t2)(0−2t)∣∣ Simplifying this gives: A=12∣∣−t2(−2t)∣∣=12∣∣2t3∣∣=t3 We know from the problem statement that the area A=8: t3=8⟹t=2 Relate t to m: From the line equation y=mx, we also know that: 2t=m(t2) Substituting t=2: 2(2)=m(22)⟹4=4m⟹m=1 Final Answer: Thus, the value of m is: 1 Topper's Solved these Questions Explore 5 Videos Explore 5 Videos Explore 5 Videos Similar Questions The line 4x−7y+10=0 intersects the parabola y2=4x at the points P and Q. The coordinates of the point of intersection of the tangents drawn at the points P and Q are if the line 4x+3y+1=0 meets the parabola y2=8x then the mid point of the chord is The circle x2+y2−2x−6y+2=0 intersects the parabola y2=8x orthogonally at the point P. The equation of the tangent to the parabola at P can be If line x-2y-1=0 intersects parabola y2=4x at P and Q, then find the point of intersection of normals at P and Q. Let the line y=mx intersects the curve y2=x at P and tangent to y2=x at P intersects x-axis at Q. If area (△OPQ) = 4, find m(m>0). Let the line y=mx intersects the curve y2=x at P and tangent to y2=x at P intersects x-axis at Q. If area (△OPQ) = 4, find m(m>0). Tangents are drawn to the parabola y2=4x at the point P which is the upper end of latusrectum . Area enclosed by the tangent line at, P,X axis and the parabola is Tangents are drawn to the hyperbola 4x2−y2=36 at the points P and Q. If these tangents intersect at the point T(0,3) then the area (in sq units) of △PTQ is Tangents are drawn to the hyperbola 4x2−y2=36 at the points P and Q. If these tangents intersect at the point T(0,3) then the area (in sq units) of △PTQ is The tangent at any point P on y2=4x meets x-axis at Q, then locus of mid point of PQ will be VMC MODULES ENGLISH-JEE MAIN REVISION TEST - 27 - JEE -2020-MATHEMATICS (SECTION 2) If (sqrt(2)cos alpha)/sqrt(1-cos2 alpha)=1/7and sqrt((1+cos 2 beta)/2)... Let f(x) be a polynomial of degree 3 such that f(-2)=5, f(2)=-3, f'(x)... Let a line y = mx ( m gt 0) intersect the parabola, y^2 = 4x at a po... The sum, underset(n-1)overset(10)(Sigma)(n(2n+1)(2n-1))/5 is equal to.... The number of 4 letter words (with or without meaning) that can be for... Exams Free Textbook Solutions Free Ncert Solutions English Medium Free Ncert Solutions Hindi Medium Boards Resources Doubtnut is No.1 Study App and Learning App with Instant Video Solutions for NCERT Class 6, Class 7, Class 8, Class 9, Class 10, Class 11 and Class 12, IIT JEE prep, NEET preparation and CBSE, UP Board, Bihar Board, Rajasthan Board, MP Board, Telangana Board etc NCERT solutions for CBSE and other state boards is a key requirement for students. Doubtnut helps with homework, doubts and solutions to all the questions. It has helped students get under AIR 100 in NEET & IIT JEE. Get PDF and video solutions of IIT-JEE Mains & Advanced previous year papers, NEET previous year papers, NCERT books for classes 6 to 12, CBSE, Pathfinder Publications, RD Sharma, RS Aggarwal, Manohar Ray, Cengage books for boards and competitive exams. Doubtnut is the perfect NEET and IIT JEE preparation App. Get solutions for NEET and IIT JEE previous years papers, along with chapter wise NEET MCQ solutions. Get all the study material in Hindi medium and English medium for IIT JEE and NEET preparation Contact Us
4156
https://openorthopaedicsjournal.com/VOLUME/6/PAGE/108/
Airway Compromise Due to Wound Hematoma Following Anterior Cervical Spine Surgery Home Editorial Board Quick Search anywhere Enter Search Term Quick Search in Journals Enter Search Term Quick Search in Journals Enter Search Term Quick Search in Journals Enter Search Term Quick Search in Journals Enter Search Term Quick Search in Journals Enter Search Term Quick Search in Journals Enter Search Term Search Home About Us About the Journal About The Publisher Editorial Board FAQs Open Access Policy Open Url Guidelines ETHICAL GUIDELINES Allegations From whistleblowers Conflict of Interest Fabricating and Stating False Information Plagiarism Prevention Post Publication Discussions and Corrections Publishing Ethics Research Misconduct FOR EDITORS & REVIEWERS Editorial Management Editorial Policies Ensuring Content Integrity Ethical Guidelines for New Editors Guest Editor Guidelines Virtual Special Issue Peer Review Workflow Publication Process Guidelines For Peer Reviewers FOR AUTHORS Archiving Policies Article Processing Charges Author Benefits Bentham Author Support Services Authorship Bentham Manuscript Processing System Institutional Membership Instructions for Authors Manuscript Transfer Facility Special Fee Waivers and Discounts Submit Manuscript Terms and Conditions Privacy Policy Home Home ABOUT USAbout the JournalAbout the PublisherEditorial BoardFAQsOpen Access PolicyOpen Url Guidelines ETHICAL GUIDELINESAllegations From whistleblowersConflict of InterestFabricating and Stating False InformationPlagiarism PreventionPost Publication Discussions and CorrectionsPublishing EthicsResearch Misconduct FOR EDITORS & REVIEWERSEditorial ManagementEditorial PoliciesEnsuring Content IntegrityEthical Guidelines for New EditorsGuest Editor GuidelinesVirtual Special IssuePeer Review WorkflowPublication ProcessGuidelines for Peer Reviewers FOR AUTHORSArchiving PoliciesArticle Processing ChargesAuthor BenefitsBentham Author Support ServicesAuthorshipBentham Manuscript Processing SystemInstitutional MembershipInstructions for AuthorsManuscript Transfer FacilitySpecial Fee Waivers and Discounts HomeVolume 6TOORTHJ-6-108 Back to Volume 6 All published articles of this journal are available on ScienceDirect. 84 CITATIONS 84 Total citations 17 Recent citations 16 Field Citation Ratio 3.27 Relative Citation Ratio RESEARCH ARTICLE Share on Airway Compromise Due to Wound Hematoma Following Anterior Cervical Spine Surgery Mark A Palumbo, , 1 E-Mail Address of Dr. Mark A Palumbo × mpalmd@aol.com Jessica Pelow Aidlen 1 ##### E-Mail Address of Dr. Jessica Pelow Aidlen × mpalmd@aol.comAlan H Daniels 1 ##### E-Mail Address of Dr. Alan H Daniels × mpalmd@aol.comNikhil A Thakur 1 ##### E-Mail Address of Dr. Nikhil A Thakur × mpalmd@aol.comandJoseph Caiati 2 ##### E-Mail Address of Dr. Joseph Caiati × mpalmd@aol.comAuthors Info & Affiliations The Open Orthopaedics Journal • 05 Mar 2012 • RESEARCH ARTICLE • DOI: 10.2174/1874325001206010108 ###### PREVIOUS ARTICLE|Next ###### NEXT ARTICLE Metrics downloads 11,803 Last 6 Months 11,803 Last 12 Months 11,803 View all metrics ABSTRACT INTRODUCTION CASE PRESENTATION CLINICAL ANATOMY ETIOLOGY DIAGNOSTIC CONSIDERATIONS PREVENTION MANAGEMENT OF POSTOPERATIVE AIRWAY COMPROMISE INITIAL ASSESSMENT GENERAL GUIDELINES CLINICAL SCENARIOS CONCLUSION CONFLICT OF INTEREST REFERENCES Abstract One of the most serious adverse events associated with anterior cervical spine surgery is wound hematoma resulting in airway compromise. The reported incidence of this postoperative complication has varied from 0.2% to 1.9%. Obstruction of the airway secondary to bleeding presents a challenging clinical scenario given the rapidity of onset, distorted anatomy of the upper respiratory tract, urgent need to act and potential for catastrophic consequences. This high-risk, life-threatening clinical scenario requires specialized knowledge and a well-designed treatment protocol to achieve a positive outcome. In this review, we report a case of airway compromise secondary to wound hematoma following anterior cervical discectomy and fusion, followed by a review of relevant literature, anatomy, etiologic factors and diagnostic considerations. We also propose guidelines for the prevention and management of postoperative airway obstruction due to wound hematoma. Keywords:Anterior cervical spine surgery, adverse event, airway obstruction, hematoma. INTRODUCTION Anterior cervical spine operations are commonly performed by orthopedic and neurological surgeons. These procedures generally involve decompression of the neural elements by discectomy or corpectomy in combination with reconstruction of the spinal column at one or more levels. Available reconstructive techniques include arthrodesis (with or without instrumentation) and disc arthroplasty. Reported rates of clinical success are high and complications are generally infrequent. One of the most serious adverse events associated with anterior cervical spine surgery is postoperative airway obstruction due to wound hematoma. The reported incidence of this complication has varied from 0.2% to 1.9% [1-4]. To date, there have not been any Level 1, 2, or 3 studies published examining the topic of airway compromise due to wound hematoma following anterior cervical surgery. Current treatment protocols are based on Level 4 and 5 data derived from case reports, retrospective series and expert opinion. Airway compromise caused by hemorrhage presents a challenging clinical scenario given the rapidity of onset, limited time to act, and potential for catastrophic consequences including cerebral ischemia and death. Further, standard airway control measures may prove difficult to employ due to anatomic distortion of the upper respiratory tract and ventral neck. Specialized knowledge and advance planning is necessary to respond efficiently and effectively in the setting of this life-threatening complication. Due to the low incidence of the problem, however, it is not universal policy for the medical team to formulate a specific protocol for the prevention and management of airway compromise. The primary objective of this review is to describe a systematic approach to the patient with airway obstruction due to wound hematoma after anterior cervical spine surgery. Guidelines for prevention and management will be preceded by a review of clinically relevant anatomy, etiologic factors and diagnostic considerations. CASE PRESENTATION A 52 year old female presented with a two year history of neck and right upper extremity pain along with paresthesias involving the thumb and index finger. The pain was progressive in nature and had become disabling despite comprehensive nonoperative management. Magnetic Resonance Imaging (MRI) showed a moderate paracentral disc herniation to the right of midline at the C5/6 level with compromise of the exiting C6 nerve root. Her past medical history was significant for emphysema, bipolar disorder and epilepsy. There was no history of prior neck surgery. Physical examination was significant for low grade weakness of the right wrist extensor muscles and a decreased right brachialradialis reflex. Anterior cervical discectomy and fusion (ACDF) was performed at the C5-6 level through a transverse, left-sided incision utilizing iliac crest autograft and anterior plate fixation (Fig. 1). There were no intraoperative complications. At the time of wound closure, hemostasis was adequate. The patient was extubated and transferred to the recovery room in stable condition. Six hours following completion of the operation, the patient began complaining of difficulty swallowing and breathing. She was agitated and tachypneic; oxygen saturation was >95% on room air. Her neurologic exam was unchanged from her preoperative exam. Examination of her anterior neck revealed fullness and submandibular edema. The suture line was intact with no incisional drainage. The hemovac drain reservoir showed minimal bloody drainage and the tubing appeared to be clotted. Fig. (1). Intraoperative lateral cervical spine xray showing anterior cervical discectomy and fusion of C5/6. OPEN IN VIEWER Immediate consultation with anesthesia and an otolaryngologist was obtained. The patient was taken emergently to the operating room. Bag-mask assisted ventilation was instituted. An attempt at awake intubation was compromised by poor visualization of the upper airway landmarks and edema of the pharyngeal wall, thus bag mask assisted ventilation was continued with the plan to attempt endotracheal intubation after hematoma evacuation. Next, the incision was opened under local anesthesia and a large hematoma was evacuated from the space between the carotid sheath and the midline viscera. After hematoma evacuation, standard endotracheal intubation was still unsuccessful due to upper airway edema. With the patient becoming more hypercarbic and tachycardic, emergent open tracheostomy was performed by the otolaryngologist through the prior left-sided incision, which was extended across the midline. After securing the airway, formal wound exploration revealed no clear source of arterial or venous bleeding. Postoperatively, she was transferred to the intensive care unit. Her tracheostomy was removed on postoperative day #4 and she was discharged home on the fifth postoperative day. The remainder of her postoperative course was unremarkable. She experienced major improvement in her preoperative pain symptoms and had normalization of strength in the right C6 innervated musculature. CLINICAL ANATOMY Effective management of airway compromise after cervical spine surgery requires an understanding of the surface anatomy of the anterior neck, the internal structure of the upper respiratory tract, and the surgical approach. The relevant external landmarks consist of the hyoid bone, the thyroid cartilage and the cricoid cartilage. Internally, the epiglottis separates the oropharynx from the laryngopharynx at approximately the level of the fourth cervical vertebra (Fig. 2). The larynx, extending from the lower pharynx to the trachea, is composed of a cartilaginous skeleton which includes the thyroid and cricoid cartilage along with the intervening cricothyroid membrane. Integration of ligaments and muscles with its cartilage components allows the larynx to serve as a soft tissue sphincter preventing passage of food and liquid into the tracheal lumen during swallowing. Fig. (2). Midsagittal section of the upper respiratory tract. OP: oropharnyx. LP: laryngopharnyx. TR: trachea. ES: esophagus. EP: epiglottis. TC: thyroid cartilage. CC: cricoid cartilage. Arrow A: path for direct laryngoscopic orotracheal intubation. Arrow B: path for surgical cricothyrotomy. Arrow C: path for high surgical traceostomy. OPEN IN VIEWER The surgical exposure for anterior cervical spine surgery can be performed from either side of the midline via a transverse or longitudinal incision. Access to the vertebral column is achieved by dissection in the plane between the carotid sheath and the midline viscera (Fig. 3) . During surgery, the upper airway structures and esophagus are retracted in a medial direction. The longus colli musculature is elevated off the ventral surface of the spine to expose the vertebral bodies and disc spaces. This exposure creates a potential space along one side and directly posterior to the larynx and trachea. Fig. (3). The anterior cervical approach to the spine (cross-sectional view): note the potential space created by dissection in the plane between the carotid sheath and the midline viscera. The carotid sheath structures are retracted laterally, and the esophagus and trachea are retracted medially to expose the ventral surface of the spine. Adapted with permission from: Albert T, Balderston R, Northrup B. Surgical Approaches to the Spine. Philadelphia: WB Saunders 1997; p. 10 . OPEN IN VIEWER ETIOLOGY Hematoma following anterior cervical spine surgery may be the result of inadequate control of arterial or venous bleeding during the operation, and has been reported due to superior thyroid artery dissection . In other instances, a hematoma can form after surgery irrespective of adequate intraoperative hemostasis. Postoperative hemorrhage may occur secondary to coagulopathy, increased blood pressure during emergence from anesthesia, or elevated venous pressure due to the Valsalva effect of coughing at the time of extubation . There are two potential pathophysiologic mechanisms by which hematoma can produce airway compromise. The first is direct mechanical compression leading to reduction in the cross-sectional area of the airway lumen. The second mechanism involves the development of intrinsic airway edema in response to the mass effect of collected blood within the surgical wound. In this situation, impaired venous drainage from the head leads to secondary swelling of the supraglottic structures, the epiglottis and the arytenoids. This mechanism of progressive airway obstruction has been promoted as more plausible than extrinsic compression given the low pressure required to occlude the venous and lymphatic systems in the neck and the relatively high pressure required to directly collapse the airway . Cephalad to and including the glottic opening (at the C4 level), the airway can be deformed and obscured by both external compression and internal edema of the layngopharyngeal soft tissue. Caudal to the glottic opening, the airway is more resistant to external compression due to support provided by the laryngeal and tracheal cartilage. The subglottic region, however, is vulnerable to luminal narrowing when mucosal edema develops within the confines of the cartilaginous skeleton. The individual or combined effects of edema and mechanical compression can compromise both spontaneous respiration and the execution of laryngoscopy. DIAGNOSTIC CONSIDERATIONS The underlying cause of airway compromise is suggested by the elapsed time to onset after the spine operation. Upper airway compromise that occurs during the immediate postoperative period (within 12 hours of completion of surgery) is most commonly the result of an expanding wound hematoma. It is noteworthy that obstruction evident within the first hour after extubation may be related to residual neuromuscular blockade or hypoventilation from narcotic medication. Although delayed hematoma is possible beyond the first twelve hours, alternative causes of airway obstruction (e.g. pharyngeal/prevertebral edema, spinal construct failure, cerebrospinal fluid collection or retropharyngeal abscess) become more probable. In general, airway compromise after spine surgery can produce a spectrum of clinical findings. The patient may progress at a variable rate from being asymptomatic to exhibiting symptoms and signs of partial occlusion and then complete obstruction (Table 1). In the early stages, complaints of difficulty talking and breathing predominate. Subtle changes in voice quality may be evident. Breathing problems may be exacerbated by the supine position. As the process evolves, the patient may become restless and agitated due to hypercarbia (with or without hypoxia). Dyspnea, inspiratory stridor and cyanosis develop during later stages of airway compromise with potential progression to respiratory failure/arrest. Table 1. Clinical Findings Associated with Postoperative Wound Hematoma Expand for more Collapse OPEN IN VIEWER Table 2. Additional Risk Factors For Postoperative Airway Compromise | Surgical | Patient | Anesthetic | Institutional | --- --- | | Exposure of > 3 vertebral bodies | Morbid Obesity | Suboptimal airway visualization | No 24 hour in-house anesthesia care | | Exposure of C2-C4 levels | Obstructive Sleep Apnea | Multiple intubation attempts | No 24 hour in-house surgical staff | | Blood loss > 300 ml | Pulmonary disease | Need for fiberoptic intubation | | Operative time > 5 hours | Cervical Myelopathy | | Dual approach operations | Prior anterior cervical surgery | Expand for more Collapse OPEN IN VIEWER Compared to other potential causative factors, wound hematoma tends to produce a more rapid rate of progression of respiratory compromise along with certain characteristic signs. Post-operative hemorrhage can be associated with significant drain output, suture line bleeding, progressive swelling of the anterior neck and submandibular region, facial edema/plethora and tracheal deviation [7,9-11]. Sudden hemodynamic instability has been observed in the setting of an expanding neck hematoma after anterior cervical surgery. In the report by Sethi et al., bradycardia and hypotension was attributed to mechanical distortion of the carotid sinus with activation of the baroreceptor reflex . PREVENTION Wound hematoma after anterior cervical spine surgery is difficult to predict and prevent. The complication often occurs in the absence of predisposing factors. Nonetheless, the probability of postoperative hemorrhage can theoretically be reduced by attention to certain basic surgical principles. Specifically, an effort should be made to control all soft tissue and osseous bleeding during the operation. Placement of a closed suction drain is also reasonable (though with recognition that the measure will not negate the potential for hematoma formation). Postoperative measures to protect the upper respiratory tract can be employed in the patient at elevated risk of hemorrhage into the wound. The presence of a bleeding diathesis (e.g. anticoagulant therapy, severe liver disease, hereditary bleeding disorder) and/or excessive intraoperative blood loss should raise concern for bleeding after surgery. Monitoring in an intensive care unit for 24-72 hours (with or without delayed removal of the endotracheal tube) should be considered. The threshold for delaying extubation should be even lower in the presence of additional risk factors for postoperative airway compromise [12-14] (Table 2). MANAGEMENT OF POSTOPERATIVE AIRWAY COMPROMISE Postoperative airway compromise due to hematoma poses a challenging clinical scenario. This situation typically involves a patient who is extubated immediately after surgery and then develops respiratory distress after transfer to the post-anesthesia care unit or the surgical ward. The time to onset of this complication (< 12 hours after surgery) is such that the on-site night staff will often have responsibility for acute management of the patient [7,9,11]. An efficient and systematic approach to treatment is necessary to achieve a positive outcome. Early detection and intervention before the onset of occlusive laryngopharyngeal edema generally portends a positive outcome. The initial assessment functions to characterize the severity of airway obstruction. Based on this clinical information, the appropriate location to render care and the specific treatment methodology is established. INITIAL ASSESSMENT Following anterior cervical spine surgery, a patient with symptoms attributable to the airway must be evaluated immediately. If available in the hospital, the responsible spine surgeon and anesthesiologist should assess the situation. At this point, preparation to secure the airway is a priority; multispecialty assistance should be mobilized as rapidly as possible. Upon reaching the bedside, the first responders must rapidly assess the clinical situation. A focused physical examination incorporates removal of the orthosis, visualization of the anterior neck tissues and identification of signs of airway obstruction. Identification of an expanding wound hematoma is based on exam findings and knowledge of the time elapsed since surgery. Any other immediately available data are taken into consideration (e.g. pulse oximetry, review of patient comorbidities, assessment of available hospital resources, etc). The severity of airway compromise is characterized in order to determine whether the patient can be safely transported to the operating room. Non-critical airway compromise is associated with minimal/partial loss of airway patency. Clinically, the patient is not in extremis. Complaints of difficulty breathing and talking may be accompanied by dyspnea and subtle changes in voice quality. Characterization of the airway compromise as non-critical reflects a clinical judgment that the situation is not immediately life-threatening and that transfer of the patient to the operating room is reasonable. Critical airway compromise is associated with near-total or completes loss of airway patency. Representative signs include a look of fear or panic associated with air hunger, excessive salivation, a rocking motion of the head and chest with the respiratory cycle, use of accessory muscles of respiration, inspiratory stridor and, eventually, central cyanosis. Characterization of the airway compromise as critical is indicative of a situation judged to be immediately life-threatening; management must be initiated at the bedside. GENERAL GUIDELINES The primary treatment objective is to establish and maintain patency of the airway by placement of an endotracheal tube. Intubation can be achieved by direct laryngoscopy, fiberoptic bronchoscopy, or by surgical means. In this regard, there are certain fundamental principles pertinent to the emergency management of airway compromise after anterior cervical spine surgery. The optimal setting to secure the airway is in the operating room suite. When supplemental oxygen is available, delivery of 100% oxygen via non-rebreather facemask should be the first step in treatment. The use of intravenous sedatives should be minimized. Sedation can reduce voluntary efforts to maintain airway patency and risks converting partial occlusion to complete obstruction. If direct laryngoscopy is the chosen method of intubation, it should be undertaken with full recognition that visualization of anatomic landmarks and endotracheal tube passage can be challenging due to edema of the pharyngeal wall, epiglottis and vocal cords. The first attempt provides the best opportunity for intubation and should be executed by the most qualified provider. It is mandatory to proceed through the airway management protocol with maximal efficiency. Repetition of failed intubation attempts is to be avoided. Delay in the establishment of a surgical airway prolongs the period of hypoxia and can lead to cerebral ischemia. If surgical airway access is deemed necessary, cricothyroidotomy provides a rapid means of securing the airway and is the procedure of choice. CLINICAL SCENARIOS Non-Critical Airway Compromise For the most common scenario of non-critical airway compromise, the patient is efficiently transported to the operative suite. The surgical team should be assembled and ready with a tracheostomy tray available. Standard monitoring is initiated and the patient is hyper-oxygenated by face mask ventilation. Awake intubation utilizing a fiberoptic (or direct laryngoscopic) technique is attempted if there is imminent danger of losing the airway. In the case of failed intubation and an obvious space-occupying hematoma, the incision is opened under local anesthetic while maintaining bag-mask ventilation. Separation of the subcutaneous tissue is followed by removal of all sutures reapproximating the platysma muscle. Blood clot is evacuated from alongside and posterior to the midline viscera. After decompression of the wound, a second trial of intubation is executed. If intubation is unsuccessful, a surgical airway will need to be established by cricothyroidotomy. The spine surgeon, anesthesiologist, intensivists, and house staff must be competent in the execution of this procedure. The technique of cricothyroidotomy following anterior spine surgery incorporates extension of the original incision across the midline. The cricothyroid membrane is sharply divided and the opening dilated using a curved hemostat. A small endotracheal or tracheostomy tube (6-7 mm diameter) is inserted, and the cuff inflated. In the presence of a space-occupying lesion, tracheal deviation and submandibular soft tissue swelling can substantially increase the technical difficulty of the surgical procedure. If time allows, recruitment of a specialist with expertise in surgical airway creation is beneficial. General anesthesia is instituted once the endotracheal tube is in place. The surgical team proceeds to formal wound exploration for complete evacuation of the hematoma and control of any ongoing hemorrhage. Critical Airway Compromise In the situation of critical airway compromise, the emergency response system is activated and treatment is initiated at the bedside. The first step is to administer 100% oxygen via non-rebreather facemask. If adequate bag-mask ventilation can be established, the patient is transported to the operative suite for definitive airway control. If ventilation is inadequate, awake intubation by fiberoptic airway management or direct laryngoscopy is attempted. In the case of successful endotracheal tube placement, transfer to the operating room is arranged for wound exploration. If the initial intubation attempt fails (or airway management equipment is not immediately available), the surgical wound is opened and blood clot removed. Following wound decompression, another trial of face mask ventilation is initiated. If adequate ventilation is not possible and the clinical status allows, an additional attempt at intubation is performed. If intubation is not rapidly achieved, a surgical airway is established by cricothyroidotomy. Once the endotracheal tube has been secured and ventilation restored, the patient is moved to the operative suite for formal wound exploration and control of any ongoing hemorrhage. Conversion to a tracheostomy can be performed during the same operation or at a later time. CONCLUSION Airway obstruction due to wound hematoma is a rare but potentially lethal complication of anterior cervical spine surgery. This clinical scenario is challenging given the often rapid onset of airway compromise, the limited time to act and the distortion of the upper respiratory tract and ventral neck anatomy. Furthermore, the clinicians of first response are often ill-prepared to deal with this unique type of airway emergency. We report a case of hematoma causing airway compromise following anterior cervical discectomy and fusion in which quick action to evacuate the hematoma and appropriate consultation with otolaryngology to secure the airway led to a successful outcome. There are no Level 1, 2 or 3 studies upon which to base guidelines for this challenging clinical scenario. To optimize outcome, specialized knowledge and a systematic approach to management is necessary. Progress through the airway management protocol must be maximally efficient. Delay in securing the airway prolongs the period of hypoxia and can lead to cerebral ischemia and death. As such, all medical personnel responsible for patient care after cervical spine surgery should be aware of this potential complication to respond effectively to this adverse event. CONFLICT OF INTEREST Declared none. ACKNOWLEDGEMENT We would like to acknowledge Michelle L. Daniels, DMD for assistance with illustrations. REFERENCES 1 Tew JM, Mayfield FH. Complications of surgery of the anterior cervical spine Clin Neurosurg 1976; 23: 424-34. Go to reference 2 Bertalanffy H, Eggert HR. Complications of anterior cervical discectomy without fusion in 450 consecutive patients Acta Neurochir (Wien) 1989; 99: 41-50. 3 Emery SE, Bohlman HH, Bolesta MJ, Jones PK. Anterior cervical decompression and arthrodesis for the treatment of cervical spondylotic myelopathy: Two to seventeen-year follow-up J Bone Joint Surg Am 1998; 80A: 941-51. 4 Marotta N, Landi A, Tarantino R, Mancarella C, Ruggeri A, Delfini R. Five-year outcome of stand-alone fusion using carbon cages in cervical disc arthrosis Eur Spine J 2011; 20(Suppl 1): S8-12. Go to reference 5 Albert T, Balderston R, Northrup B. Surgical approaches to the spine. Philadelphia: WB Saunders 1997; p. 10. a [...] sheath and the midline viscera (Fig. [b [...] Philadelphia: WB Saunders 1997; p. 10 6 Yu NH, Jahng TA, Kim CH, Chung CK. Life-threatening late hemorrhage due to superior thyroid artery dissection after anterior cervical discectomy and fusion Spine (Phila Pa 1976) 2010; 35(15): E739-42. Go to reference 7 Sethi R, Tandon M, Ganjoo P. Neck hematoma causing acute airway and hemodynamic compromise after anterior cervical spine surgery J Neurosurg Anesthesiol 2008; 20(1): 69-70. [a [...] of coughing at the time of extubation [b [...] edema/plethora and tracheal deviation [c [...] activation of the baroreceptor reflex [d [...] for acute management of the patient 8 Carr EM, Benjamin E. In vitro study investigating post neck surgery haematoma airway obstruction J Laryngol Otol 2009; 122: 662-5. Go to reference 9 Lee HS, Lee BJ, Kim SW, et al. Patterns of post-thyroidectomy hemorrhage Clin Exp Otorhinolaryngol 2009; 2(2): 72-. [a [...] edema/plethora and tracheal deviation [b [...] for acute management of the patient 10 Gwinnutt CL, Walsh GR, Kumar R. Airway obstruction after anterior cervical spine surgery J Neurosurg Anesthesiol 1992; 4(3): 99-202. 11 Shakespeare WA, Lanier WL, Perkins WJ, Pasternak JJ. Airway management in patients who develop neck hematomas after carotid endarterectomy Anesth Analg 2010; 110(2): 588-93. [a [...] edema/plethora and tracheal deviation [b [...] for acute management of the patient 12 Sagi HC, Beutler W, Carroll E, Connolly PJ. Airway complications associated with surgery on the anterior cervical spine Spine 2002; 27(9): 949-53. Go to reference 13 Kwon B, Yoo JU, Furey CG, Rowbottom J, Emery SE. Risk factors for delayed extubation after single-stage, multi-level anterior cervical decompression and posterior fusion J Spinal Disord Tech 2006; (19): 389-93. 14 Terao Y, Matsumoto S, Yamashita K, et al. Increased incidence of emergency airway management after combined anterior-posterior cervical spine surgery J Neurosurg Anesthesiol 2004; (16): 282-6. Go to reference CURRENT VOLUME 19 Submit Papers Submission for General Articles Submit Abstract Submit Manuscript Submit to Thematic Issues Submit Manuscript to Thematic Issues Submit Thematic Issue Proposal PUBLISHED CONTENTS Download Flyer SEARCH ARTICLES Search Term Search Criteria: Article Type: Clear Search TRACK YOUR MANUSCRIPT Enter Correct Manuscript Reference Number: Submit Reference Number JOIN OUR TEAM Join as an Editorial Board Member Join as a Reviewer Join as a Guest Topical Issue Editor MARKETING OPPORTUNITIES Advertising Policy Kudos Promotional Services Press Release News release date 26 January 2024 Bentham Is Proud To Announce Collaboration With Elsevier News release date 25 July 2023 Three Journals Receive Impact Factors News release date 17 February 2023 The Nursing Journal Directory Indexes Bentham Journal, The Open Public Health Journal ADVERTISEMENT back to top Follow Us About Us About the Journal About the Publisher Editorial Board FAQs Open Access Policy Open Url Guidelines For Authors Archiving Policies Article Processing Charges Author Benefits Bentham Author Support Services Authorship Bentham Manuscript Processing System Institutional Membership Instructions for Authors Manuscript Transfer Facility Special Fee Waivers and Discounts FOR EDITORS & REVIEWERS Editorial Management Editorial Policies Ensuring Content Integrity Ethical Guidelines for New Editors Guest Editor Guidelines Virtual Special Issue Peer Review Workflow Publication Process Guidelines for Peer Reviewers ETHICAL GUIDELINES Allegations from Whistleblowers Conflict of Interest Fabricating and Stating False Information Plagiarism Prevention Post Publication Discussions and Corrections Publishing Ethics Research Misconduct JOIN OUR TEAM Join as an Editorial Board Member Join as a Reviewer Join as a Guest Topical Issue Editor MARKETING OPPORTUNITIES Advertising Policy Kudos Promotional Services Terms and Conditions Privacy Policy Contact Us 1800 1801 1802 1803 1804 close Click to get updates and verify authenticity. Authors & Information Authors Information Authors Affiliations Expand All Mark A Palumbo, 1 Department of Orthopaedic Surgery, The Warren Alpert Medical School of Brown University, Providence, Rhode Island, USA Jessica Pelow Aidlen1 Department of Orthopaedic Surgery, The Warren Alpert Medical School of Brown University, Providence, Rhode Island, USA Alan H Daniels1 Department of Orthopaedic Surgery, The Warren Alpert Medical School of Brown University, Providence, Rhode Island, USA Nikhil A Thakur1 Department of Orthopaedic Surgery, The Warren Alpert Medical School of Brown University, Providence, Rhode Island, USA Joseph Caiati2 Department of Anesthesia, The Warren Alpert Medical School of Brown University, Providence, Rhode Island, USA Information Published In The Open Orthopaedics Journal RESEARCH ARTICLE Article Information Year: 2012 Volume: 6 E-location ID:TOORTHJ-6-108 DOI:10.2174/1874325001206010108 Cite As Palumbo M, Aidlen J, Daniels A, Thakur N, Caiati J. Airway Compromise Due to Wound Hematoma Following Anterior Cervical Spine Surgery . Open Orthop J, 2012; 6: . Article History Received Date: 23 Dec 2011 Revision Received Date: 11 Jan 2012 Electronic Publication Date:05 Mar 2012 Copyright © Palumbo et al.; Licensee Bentham Open. open-access license: This is an open access article licensed under the terms of the Creative Commons Attribution Non-Commercial License ( which permits unrestricted, non-commercial use, distribution and reproduction in any medium, provided the work is properly cited. ACKNOWLEDGEMENT We would like to acknowledge Michelle L. Daniels, DMD for assistance with illustrations. Download Download1 Download AbstractPDF Citations & Metrics Citations Metrics Citations Cite As Palumbo M, Aidlen J, Daniels A, Thakur N, Caiati J. Airway Compromise Due to Wound Hematoma Following Anterior Cervical Spine Surgery . Open Orthop J, 2012; 6: . Export Citation Select the format you want to export the citation of this publication. Dimensions Statistics 84 CITATIONS 84 Total citations 17 Recent citations 16 Field Citation Ratio 3.27 Relative Citation Ratio Metrics Article Usage (Last 30 Days) Article Metrics Article Usage (Demographic) | Country | Views | --- | | United States | 2,267 | | France | 434 | | China | 280 | | Canada | 210 | | Germany | 140 | | Belgium | 114 | | Brazil | 102 | | United Kingdom | 102 | | Singapore | 78 | | Japan | 55 | | Moldova | 39 | | Vietnam | 35 | | Korea | 27 | | Russian Federation | 22 | | Ireland | 19 | | India | 16 | | Australia | 14 | | Iran | 13 | | South Africa | 12 | | Netherlands | 11 | | Spain | 9 | | Thailand | 8 | | Malaysia | 7 | | Bangladesh | 7 | | Ukraine | 7 | | Turkey | 6 | | Taiwan | 5 | | Argentina | 5 | | Lithuania | 5 | | New Zealand | 4 | | Poland | 4 | | Pakistan | 4 | | Mexico | 4 | | Chile | 3 | | Ecuador | 3 | | Saudi Arabia | 3 | | Sweden | 3 | | Iraq | 3 | | Italy | 2 | | Latvia | 2 | | Costa Rica | 2 | | Greece | 2 | | Bulgaria | 2 | | Colombia | 2 | | Morocco | 1 | | Venezuela | 1 | | Paraguay | 1 | | Romania | 1 | | Kazakhstan | 1 | | United Arab Emirates | 1 | | Algeria | 1 | | Honduras | 1 | | Haiti | 1 | | Bolivia | 1 | | Angola | 1 | | Syrian Arab Republic | 1 | | Senegal | 1 | | Portugal | 1 | | Egypt | 1 | | Dominican Republic | 1 | | Uruguay | 1 | 0/0 Copyright & License Copyright And License © Palumbo .; Licensee .et al Open-Access License: This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International Public License (CC-BY 4.0), a copy of which is available at: This license permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Address correspondence to this author at the Division of Spine Surgery, Department of Orthopaedic Surgery, Alpert Medical School of Brown University, 2 Dudley Street, Suite 200, Providence, Rhode Island 02905, USA; Tel: 401-457-5195; Fax: 401-457-2141; E-mail: mpalmd@aol.com References References 1 Tew JM, Mayfield FH. Complications of surgery of the anterior cervical spine Clin Neurosurg 1976; 23: 424-34. Go to reference 2 Bertalanffy H, Eggert HR. Complications of anterior cervical discectomy without fusion in 450 consecutive patients Acta Neurochir (Wien) 1989; 99: 41-50. 3 Emery SE, Bohlman HH, Bolesta MJ, Jones PK. Anterior cervical decompression and arthrodesis for the treatment of cervical spondylotic myelopathy: Two to seventeen-year follow-up J Bone Joint Surg Am 1998; 80A: 941-51. 4 Marotta N, Landi A, Tarantino R, Mancarella C, Ruggeri A, Delfini R. Five-year outcome of stand-alone fusion using carbon cages in cervical disc arthrosis Eur Spine J 2011; 20(Suppl 1): S8-12. Go to reference 5 Albert T, Balderston R, Northrup B. Surgical approaches to the spine. Philadelphia: WB Saunders 1997; p. 10. a [...] sheath and the midline viscera (Fig. [b [...] Philadelphia: WB Saunders 1997; p. 10 6 Yu NH, Jahng TA, Kim CH, Chung CK. Life-threatening late hemorrhage due to superior thyroid artery dissection after anterior cervical discectomy and fusion Spine (Phila Pa 1976) 2010; 35(15): E739-42. Go to reference 7 Sethi R, Tandon M, Ganjoo P. Neck hematoma causing acute airway and hemodynamic compromise after anterior cervical spine surgery J Neurosurg Anesthesiol 2008; 20(1): 69-70. [a [...] of coughing at the time of extubation [b [...] edema/plethora and tracheal deviation [c [...] activation of the baroreceptor reflex [d [...] for acute management of the patient 8 Carr EM, Benjamin E. In vitro study investigating post neck surgery haematoma airway obstruction J Laryngol Otol 2009; 122: 662-5. Go to reference 9 Lee HS, Lee BJ, Kim SW, et al. Patterns of post-thyroidectomy hemorrhage Clin Exp Otorhinolaryngol 2009; 2(2): 72-. [a [...] edema/plethora and tracheal deviation [b [...] for acute management of the patient 10 Gwinnutt CL, Walsh GR, Kumar R. Airway obstruction after anterior cervical spine surgery J Neurosurg Anesthesiol 1992; 4(3): 99-202. 11 Shakespeare WA, Lanier WL, Perkins WJ, Pasternak JJ. Airway management in patients who develop neck hematomas after carotid endarterectomy Anesth Analg 2010; 110(2): 588-93. [a [...] edema/plethora and tracheal deviation [b [...] for acute management of the patient 12 Sagi HC, Beutler W, Carroll E, Connolly PJ. Airway complications associated with surgery on the anterior cervical spine Spine 2002; 27(9): 949-53. Go to reference 13 Kwon B, Yoo JU, Furey CG, Rowbottom J, Emery SE. Risk factors for delayed extubation after single-stage, multi-level anterior cervical decompression and posterior fusion J Spinal Disord Tech 2006; (19): 389-93. 14 Terao Y, Matsumoto S, Yamashita K, et al. Increased incidence of emergency airway management after combined anterior-posterior cervical spine surgery J Neurosurg Anesthesiol 2004; (16): 282-6. Go to reference Media Figures Figures Fig. (1). Intraoperative lateral cervical spine xray showing anterior cervical discectomy and fusion of C5/6. Go to FigureOpen in Viewer Fig. (2). Midsagittal section of the upper respiratory tract. OP: oropharnyx. LP: laryngopharnyx. TR: trachea. ES: esophagus. EP: epiglottis. TC: thyroid cartilage. CC: cricoid cartilage. Arrow A: path for direct laryngoscopic orotracheal intubation. Arrow B: path for surgical cricothyrotomy. Arrow C: path for high surgical traceostomy. Go to FigureOpen in Viewer Fig. (3). The anterior cervical approach to the spine (cross-sectional view): note the potential space created by dissection in the plane between the carotid sheath and the midline viscera. The carotid sheath structures are retracted laterally, and the esophagus and trachea are retracted medially to expose the ventral surface of the spine. Adapted with permission from: Albert T, Balderston R, Northrup B. Surgical Approaches to the Spine. Philadelphia: WB Saunders 1997; p. 10 . Go to FigureOpen in Viewer Tables Clinical Findings Associated with Postoperative Wound Hematoma Go to TableOpen in Viewer Additional Risk Factors For Postoperative Airway Compromise Go to TableOpen in Viewer Share Share Share article link Copy Link Copied! Copying failed. Share on social media figures tables Fig. (1). Fig. (1). Intraoperative lateral cervical spine xray showing anterior cervical discectomy and fusion of C5/6. Fig. (2). Fig. (2). Midsagittal section of the upper respiratory tract. OP: oropharnyx. LP: laryngopharnyx. TR: trachea. ES: esophagus. EP: epiglottis. TC: thyroid cartilage. CC: cricoid cartilage. Arrow A: path for direct laryngoscopic orotracheal intubation. Arrow B: path for surgical cricothyrotomy. Arrow C: path for high surgical traceostomy. Fig. (3). Fig. (3). The anterior cervical approach to the spine (cross-sectional view): note the potential space created by dissection in the plane between the carotid sheath and the midline viscera. The carotid sheath structures are retracted laterally, and the esophagus and trachea are retracted medially to expose the ventral surface of the spine. Adapted with permission from: Albert T, Balderston R, Northrup B. Surgical Approaches to the Spine. Philadelphia: WB Saunders 1997; p. 10 . Clinical Findings Associated with Postoperative Wound Hematoma Additional Risk Factors For Postoperative Airway Compromise HomeVolume 6TOORTHJ-6-108 Back to Volume 6 SHARE Share on ###### PREVIOUS ARTICLE|Next ###### NEXT ARTICLE Reference #1
4157
https://www.youtube.com/watch?v=r_h0414ABSM
Image Under a Linear Transformation Leah Howard 5230 subscribers Description 14458 views Posted: 10 Apr 2015 Transcript: in this video we'll discuss the image of a vector under a linear transformation we're looking at the linear transformation T from R 2 to R 2 and we know how it acts on two specific vectors the image of two seven under the transformation T is negative one negative one the image of three four is the vector eight nine and we're trying to find the image of the vector 17 one meaning we're trying to figure out how t acts on this vector 17 1 well first of all just to keep our notation a little bit simpler let's and let's give some names to these vectors let's say 2 7 let's call that u and three four let's call that V the idea here is to see if we can write the vector 17 1 as a linear combination of U and V so let's say we figure out what that linear combination looks like that'll be your first step and then from there we've reduced the problem of finding T of 17 1 2 really finding T of C 1 u plus C 2 V so we'll be able to use the properties of a linear transformation to then find our answer so let's start with this first step here let's set up an Augmented matrix corresponding to this system that we're trying to solve so we're going to take C 1 times the vector U which is 2 7 and we're gonna add on C 2 tons the vector B which is 3 4 and we're going to make the vector 17 1 so let's do a little bit of gauss-jordan or Gaussian elimination see if we can try to figure out C 1 and C 2 we'll take Row 1 and divide it by 2 that gives us a 1 in the upper left-hand corner and we can then take Row 2 minus 7 times Row 1 so that's going to give us 0 minus 13 halves and over on the right side minus 117 house and the top row is not changing at this point so I'll just recopy that all right now we'd like to move down into the right this guy here is going to be our new pivot so let's try to make that equal to 1 we'll take Row 2 and we want to basically divide through by this fraction so in other words multiply by the reciprocal so you could say Row 2 times 2 over negative 13 I think that sounds kind of weird I'm going to call it Row 2 times negative 2 over 13 just bringing the negative up to the top here so that's going to give us 0 1 and over on the right side if we're careful with our signs we're gonna have a positive number it's going to be positive 9 and top row will not be changing all right the last thing we can do here is try to eliminate this three-halves so let's take Row 1 minus 3 halves of Row 2 that will give us 1 0 and negative 5 and bottom row won't be changing so what we were solving for here where C 1 and C 2 we can now read off the solution top row tells us C 1 is equal to negative 5 bottom row says C 2 equals 9 so let's go back to the problem at hand which was to find the image of the vector 17 1 under T let's write T of 17 1 is equal to T of negative 5 u + 9 V so that is thanks to the linear combination that we just found now let's have a quick recap of the two properties of a linear transformation first of all if you ply I'll apply a linear transformation to a sum then you're gonna get the sum of the images meaning you're gonna get T of vector a plus T vector B and if you apply a linear transformation to a scalar multiple of a vector then that scalar multiple can come outside and basically we're going to get the scalar multiple of the image so C times T of a so I think I'll put these in a box here I'm gonna use these two properties now to solve the problem so first of all we can express this as the sum of T of negative 5 u and T of negative 9 V and next we can bring those scalar multiples outside so we can say this is negative 5 times T of U plus 9 times T of V and we can refer back to the problem where we were given T of U and T of these so remember right back up at the top are told T of U is negative 1 negative 1 and we're also told that T of V is 8 9 and very last thing we can do is just a little bit of algebra so we take negative 5 times negative 1 plus 9 times 8 that gives us 77 and in the second component negative 5 times negative 1 plus 9 times 9 and I guess is 86 so the image of the vector 17 1 under the transformation T is this vector 77 86
4158
https://www.onlinemath4all.com/simplifying-expressions-with-rational-exponents.html
Simplifying Expressions with Rational Exponents SIMPLIFYING EXPRESSIONS WITH RATIONAL EXPONENTS Discover more College algebra course price Math worksheets printable Educational games MATHEMATICS Hire math homework tutor Statistics textbook price comparison Find math tutoring near me Online math tutoring services Online math courses Social media boosting services cost The following properties of exponents can be used to simplify expressions with rational exponents. x m⋅ x n = x m+n x m÷x n = x m-n (x m)n = x mn (xy)m =x m⋅ y m (x / y)m =x m/y m x-m = 1 /x m x m/n = y -----> x = y n/m (x / y)-m = (y / x)m √x = x 1/2 n√x = x 1/n Example 1 : Simplify : y 2/3⋅y 7/3 Solution : = y 2/3⋅y 7/3 Product of powers property. = y 2/3 +7/3 Simplify exponents. = y(2 + 7) / 3 = y 9/3 = y 3 Example 2 : Simplify : a 3/5⋅ a 7/5 Solution : = a 3/5⋅ a 7/5 Product of powers property. = a 3/5 +7/5 Simplify exponents. = a(3 + 7) / 5 = a 10/5 = a 2 Example 3 : Simplify : (x 4 y 2)1/2 Solution : =(x 4 y 2)1/2 Power of a Product Property. =(x 4)1/2⋅(y 2)1/2 Power of a Power Property. =(x 4⋅1/2)⋅(y 2⋅1/2) Simplify exponents. = (x 2)⋅(y 1) = x 2 y Example 4 : Simplify : (a 1/2 a 1/3)6 Solution : =(a 1/2 a 1/3)6 Power of a Product Property. =(a 1/2)6⋅(a 1/3)6 Power of a Power Property. =(a 1/2⋅ 6)⋅(a 1/3⋅ 6) Simplify exponents. =a 3⋅a 2 Product of Powers Property. =a 3 +2 = a 5 Example 5 : Simplify : (2a 1/2)(3a) Solution : =(2a 1/2)(3a) =(3⋅ 2)⋅(a 1/2⋅ a) Product of Powers Property. = 6⋅a 1/2 + 1 Simplify exponents. = 6⋅a 1/2 + 2/2 = 6⋅a(1 + 2)/2 = 6 a 3/2 Example 6 : Simplify : √(x 4 y 2) Solution : =√(x 4 y 2) Write square root as exponent. = (x 4 y 2)1/2 Power of a Product Property. =(x 4)1/2⋅(y 2)1/2 Power of a Power Property. =(x 4⋅ 1/2)⋅(y 2⋅ 1/2) Simplify exponents. =(x 2)⋅(y 1) =x 2 y Example 7 : Simplify : 4√(x 4 y 12) Solution : =4√(x 4 y 12) Write 4 th root as exponent. = (x 4 y 12)1/4 Power of a Product Property. =(x 4)1/4⋅(y 12)1/4 Power of a Power Property. =(x 4⋅ 1/4)⋅(y 12⋅ 1/4) Simplify exponents. =(x 1)⋅(y 3) =x y 3 Example 8 : Simplify : (x 1/3)6⋅4√y 4 Solution : =(x 1/3)6⋅4√y 4 Write 4 th root as exponent. =(x 1/3)6⋅ (y 4)1/4 Power of a Power Property. =x 1/3⋅6⋅y 4⋅ 1/4 Simplify exponents. =x 2⋅y 1 =x 2 y × Custom Search Sort by: Relevance Relevance Date Kindly mail your feedback to v4formath@gmail.com We always appreciate your feedback. ©All rights reserved. onlinemath4all.com Home page Sat Math Practice SAT Math Worksheets PEMDAS Rule BODMAS rule GEMDAS Order of Operations Math Calculators Transformations of Functions Order of rotational symmetry Lines of symmetry Compound Angles Quantitative Aptitude Tricks SOHCAHTOA Trigonometric ratio table Word Problems Times Table Shortcuts 10th CBSE solution PSAT Math Preparation Privacy Policy About us Contact us Math Laws of Exponents Discover more Online math courses Scientific calculators Math workbooks worksheets Online tutoring platforms Personalized learning plans SAT preparation courses Printable math worksheets Algebra practice books SAT math prep GEMDAS order explanation Discover more Educational games Math textbooks SAT math course online Math calculator app purchase Math study guides Math Assignment help Online math calculators Math tutors online Order math homework help Recent Articles 10 Hard SAT Math Questions (Part - 21) Sep 27, 25 01:24 PM 10 Hard SAT Math Questions (Part - 21) Read More 10 Hard SAT Math Questions (Part - 20) Sep 26, 25 09:05 PM 10 Hard SAT Math Questions (Part - 20) Read More Digital SAT Math Problems and Solutions (Part - 248) Sep 26, 25 05:18 AM Digital SAT Math Problems and Solutions (Part - 248) Read More Discover more Education Graphing calculators Essay writing services Online tutoring platforms Logic games Math worksheet generator Effective learning methods Foundational math skills Math tutoring services MATHEMATICS Discover more Math summer camps Study skills guides Educational apps math Online math competitions Algebra basics guide Math worksheet generator Personalized learning plans Essay writing services Foundational math skills Mathematical concepts tutorials Cookies help us deliver our services. By using our services, you agree to our use of cookies. Learn more. Agree and Continue
4159
https://www.easycalculation.com/unit-conversion/curie-to-becquerel-conversion.php
Ci to Bq Calculator Becquerel and Curie are the units of radioactivity. Here is the calculator to convert the values of Curie (Ci) to Becquerel (Bq). A Ci is a deprecated non-SI unit of radioactivity defined as 1 Ci = 3.7 × 1010 decays per second. A becquerel (Bq) is the SI derived unit of radiation activity. Enter the value of Curie and click calculate to convert Ci into Bq. Curie to Becquerel Becquerel to Curie Curie to Becquerel Conversion Becquerel and Curie are the units of radioactivity. Here is the calculator to convert the values of Curie (Ci) to Becquerel (Bq). A Ci is a deprecated non-SI unit of radioactivity defined as 1 Ci = 3.7 × 1010 decays per second. A becquerel (Bq) is the SI derived unit of radiation activity. Enter the value of Curie and click calculate to convert Ci into Bq. One curie (Ci) is roughly the activity of 1 gram of the radium isotope 226Ra. The Becquerel (Bq) is defined as the activity of a quantity of radioactive material in which one nucleus decays per second, which is equivalent to inverse of a second, s-1. Example One Curie is equal to 370000000000 Bq and hence 0.0002 Ci is = 370000000000 x 0.0002 Bq = 74000000 Bq Related Calculators: Entropy Molar Concentration Moles And Grams Conversion Calculator Temperature Unit Conversion From Celsius Radioactivity Calculator Bq To Ci Conversion Calculators and Converters ↳ Calculators ↳ Unit Conversion ↳ Chemistry Conversions Top Calculators Age Calculator SD Calculator Logarithm LOVE Game Popular Calculators Derivative Calculator Inverse of Matrix Calculator Compound Interest Calculator Pregnancy Calculator Online Top Categories Algebra Analytical Date Day Finance Health Mortgage Numbers Physics Statistics More ||||Contact Contact||||||||
4160
https://thehacktivists.medium.com/off-by-one-error-cwe-193-the-hacktivists-7a62e9f0068f
Off-by-one Error [CWE-193] — The Hacktivists | by The Hacktivists | Medium Sitemap Open in app Sign up Sign in Write Search Sign up Sign in Off-by-one Error [CWE-193] — The Hacktivists The Hacktivists Follow 3 min read · May 24, 2022 Listen Share Off-by-one error occurs when a program uses an improper maximum or minimum value that is one more or one less than the proper value. Table of Content1.Description2.Potential impact3.Attack patterns4.Affected software5.Severity and CVSS Scoring Description ……………………………… An off-by-one condition is a logic error in size calculation when working with strings and arrays. It usually produces a boundary condition, which may lead to memory corruption. Off-by-one errors are often a result of incorrect null-termination of string sequence, which usually starts at zero rather than one. This scenario typically arises when software performs loop iteration a number of times that is greater or less than expected. When an off-by-one condition occurs, the program is able to read or write beyond the bounds of allocated memory, which can result in data corruption, application crash, or even lead to code execution. Get The Hacktivists’s stories in your inbox Join Medium for free to get updates from this writer. Subscribe Subscribe The following example in C language uses a loop to read characters from an array: include define MAX_CHARS 19 int main () { int x; int ite_loop = 0; char filename[MAX_CHARS] = "My mother loves me."; printf("Length of filename array: %d\n",strlen(filename)); for (x = 0; x <= MAX_CHARS; x++) { printf("%c",filename[x]); ite_loop += 1; } printf("\nIterations: %d\n",ite_loop); return 0; } However, the exit loop condition “x <= MAX_CHARS” is incorrectly defined; therefore, the loop reads one byte beyond the bounds of the array. Consider the following example: include define MAX_CHAR 19 define MAX_VALUE 30 int main () { int x; int ite_loop = 0; char filename[MAX_CHAR] = "My mother loves me."; printf("Length of filename array: %d\n",strlen(filename)); for (x = 0; x <= MAX_VALUE; x++) { printf("%c",filename[x]); ite_loop += 1; } printf("\nIterations: %d\n",ite_loop); return 0; } In the previous code, the programmer has specified the wrong define directive variable in order to read the filename array. This mistake forces the code to read a few bytes beyond the bounds of the filename array; consequently, it prints random data to memory: Press enter or click to view image in full size An off-by-one error can also be introduced by improper usage of certain library functions. The following example uses the strncat function that always null-terminated its output string: strcpy(buf, "buffer:"); strncat(buf, input, sizeof(buf)-strlen(buf)); The improper usage of the strncat function (third argument) produces an off-by-one condition, which depending on the application architecture, may lead to code execution. Potential impact ……………………………… Off-by-one error leads to unpredictable behaviour of the application, depending on the nature of the vulnerability, and in most cases results in application crash or infinite loop. This weakness can also lead to buffer overflow and memory corruption. In cases of a heap-based buffer overflow, the most obvious result is the application crash. If an off-by-one error leads to a stack-based buffer overflow, successful code execution is more likely. Attack patterns ……………………………… Software written in languages such as C and C++ that do not perform memory management is potentially vulnerable to this weakness. Affected software ……………………………… Developers should pay extra attention to correct size parameter accounting for null terminator when copying character arrays or performing manipulations on arrays. Severity and CVSS Scoring …………………………………….. Off-by-one errors can be used to cause an application crash, data tampering or execution of arbitrary code. Depending on the software and vulnerable code, these weaknesses could be locally or remotely exploitable. A common CVSSv3 score for locally exploitable vulnerability in the application would look like this: 3.3 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L] — Low severity. In cases of remote code execution, it is usually scored as: 10.0 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H] — High severity. Credits: Bug Bounty Bug Hunting Web Security Secure Coding The Hacktivists Follow Written by The Hacktivists -------------------------- 55 followers ·1 following Contact us for Information Security Services & Training Follow No responses yet Write a response What are your thoughts? Cancel Respond More from The Hacktivists The Hacktivists Cross-Site Scripting — XSS [CWE-79] — The Hacktivists ----------------------------------------------------- ### Cross-Site scripting or XSS is a weakness that is caused by improper neutralization of input during web page generation. May 11, 2022 The Hacktivists Improper Restriction of XML External Entity Reference (‘XXE’) [CWE-611] — The Hacktivists ----------------------------------------------------------------------------------------- ### Improper Restriction of XML External Entity Reference or XXE describes the case where XML parser is not correctly configured and allows… Mar 13, 2021 The Hacktivists Overly Permissive Cross-domain Whitelist [CWE-942] — The Hacktivists -------------------------------------------------------------------- ### Overly Permissive Cross-domain Whitelist weakness describes a case where the software uses cross-domain policy, which includes domains… Feb 28, 2021 The Hacktivists SQL Injection [CWE-89] — The Hacktivists ---------------------------------------- ### SQL Injection is a weakness that is caused by improper neutralization of special elements used in an SQL query. May 24, 2022 See all from The Hacktivists Recommended from Medium In InfoSec Write-ups by SIDDHANT SHUKLA 503 Page to Critical Bug ------------------------ ### Sensitive Data Through Archived Directories 4d ago 11 Ahmadzuriqi How I Earned $3,300 in Bug Bounties Using ASN Reconnaissance ------------------------------------------------------------ ### “سُبْحَانَكَ لا عِلْمَ لَنَا إِلَّا مَا عَلَّمْتَنَا إِنَّكَ أَنْتَ الْعَلِيمُ الْحَكِيمُ” 6d ago 9 Kalawy Cookie Shadowing and CSP bypass to read httpOnly cookie— Way too easy (CONCTF finals) ------------------------------------------------------------------------------------- ### بِسْمِ اللَّهِ الرَّحْمَنِ الرَّحِيمِ Sep 17 Medusa Bypassing 2FA in GraphQL APIs: A Step-by-Step Guide --------------------------------------------------- ### This blog explains how 2FA can be bypassed in GraphQL applications using different techniques. Jul 5 1 In Long. Sweet. Valuable. by Ossai Chinedum I’ll Instantly Know You Used Chat Gpt If I See This --------------------------------------------------- ### Trust me you’re not as slick as you think May 16 1441 In Flutter Minds by Sumit Kumar 🧬 Part 2: Biometric Authentication Bypass in Flutter — How Frida Can Fool Your Fingerprint Checks -------------------------------------------------------------------------------------------------- ### Biometric authentication feels bulletproof. Fingerprint scanned? ✅ Face detected? ✅ You’re in. Aug 3 See more recommendations Help Status About Careers Press Blog Privacy Rules Terms Text to speech
4161
https://foodtech.folio3.com/blog/how-to-prevent-food-inventory-shrinkage/
Food Inventory Shrinkage Causes, Impact, & How To Prevent It Skip to content Products Close Products Open Products Food Safety Suite Universal food safety solutions for producers, processors, distributors, and retailers. Food ERP Suite Unified ERP platform streamlining production, compliance, and food supply chain efficiency Technology Ecosystem Partners From award-winning to certified platforms, seamlessly integrated to power modern food businesses ### Food Safety Automate safety checks and traceability across any food operation. ### Food Compliance Stay compliant with FDA, FSMA, HACCP, and global food regulations. ### Facility Environment Monitoring Monitor environmental conditions for plants, warehouses, and distribution hubs. ### Food FSMA Compliance Streamline FSMA documentation and record‑keeping for all food categories. ### HACCP Plan Simplify hazard analysis and critical control points in any processing environment. ### Food Recall Execute fast, precise recalls across multi-location supply chains. ### Food Supplier Manage supplier approvals and performance for every type of food business. ### Food Traceability Achieve farm-to-fork traceability across ingredients, recipes, and finished goods. ### Food Quality Ensure product quality for all food segments—from raw to packaged goods. ### Food ERP Unified ERP system for producers, processors, packers, and distributors. ### Food Distribution Optimize logistics for fresh, frozen, or packaged food distribution. ### Food Inventory Real-time inventory control across warehouses, retail, and production sites. ### Food Manufacturing Standardize batch and recipe management for all food products. ### Food Procurement Automate purchasing and supplier compliance for multi-category sourcing. ### Food Supply Chain Gain full visibility and control across global and regional food supply chains. CRM & Data Analytics Advanced CRM and analytics tools for smarter sales and insights. eCommerce B2B and D2C Commerce Solutions for Food & Beverage ERP Partners Certified ERP expertise as a Microsoft Gold Partner and Netsuite Alliance Partner, delivering seamless operations for modern food enterprises ### Salesforce Leading CRM for food sales and customer engagement. ### eCommerce for Food & Beverage B2B and D2C Commerce Solutions for Food & Beverage ### Microsoft Dynamics 365 Enterprise management for connected food operations. ### Netsuite SuiteSuccess Cloud ERP integrating finance and operations seamlessly.. SolutionsClose Solutions Open Solutions Enterprise Asset Management Extend Equipment Life and Maximize Plant Uptime On Demand App Development Launch apps that drive orders and customer loyalty. Integration Solutions Seamlessly integrate systems to unify data and streamline food operations ### F&B Manufacturing Plant Maintenance Smart CMMS for Reliable Food Manufacturing Operations ### Food App Development Build food apps that boost sales and visibility. ### Diet & Nutrition App Help customers plan meals and track nutrition easily. ### Grocery Delivery App Deliver groceries faster with a seamless ordering experience. ### Meat Delivery App Offer fresh meat delivery with instant customer tracking. ### Milk Delivery App Simplify daily milk deliveries with smart scheduling. ### Pet Food Delivery App Grow pet food sales with easy online ordering. ### Food EDI Speed up B2B orders with instant digital exchange. ### Food Detection API Detect anomalies, verify authenticity, and ensure food safety in real time. ### Grocery EDI Integration That Keeps Your ERP Instantly in Sync ### Retail EDI Streamline retail partnerships and eliminate manual paperwork IndustriesClose Industries Open Industries ### Bakery Manage bakery production, recipes, and freshness with ease. ### Beverages Streamline beverage production and ensure consistent quality. ### Confectionery Control ingredients and scale confectionery output efficiently. ### Dairy Simplify dairy operations from farm to distribution. ### Edible & Fat Oil Manage Extraction-to-Delivery Operations Seamlessly ### Frozen Foods Optimize cold-chain logistics and manage frozen inventory. ### Meat Ensure safety and efficiency in meat processing workflows. ### FMCG & Processed Food Scale Consumer Goods Operations From Factory to Shelf ### Poultry Improve poultry production with real-time traceability. ### Snacks Boost snack production with smart inventory management. ### Seafood Track seafood freshness and manage supply chains easily. ### Sauces & Dressings Standardize recipes and packaging for smooth scaling. Success Stories CompanyClose Company Open Company About Us Launch apps that drive orders and customer loyalty. Resources Seamlessly integrate systems to unify data and streamline food operations. ### About Folio3 FoodTech Learn about our journey, mission, and impact on the food industry. ### Our Advisors Meet the experts and leaders shaping our vision and strategy. ### Blog Insights, trends, and expert opinions on food technology. ### Case Studies See how leading food businesses transformed with Folio3 FoodTech. ### Whitepapers In-depth resources on compliance, ERP, and digital food operations. Get Your Custom Demo Food ERP 8 minutes What Is Food Inventory Shrinkage & How Can You Prevent It? A Guide for Food Manufacturers Rob Terry Published On July 18, 2025 Table of Contents Food manufacturers lose approximately $1.4 trillion annually to inventory shrinkage, with the food industry experiencing some of the highest shrink rates across all sectors. According to the National Retail Federation’s Security Survey, food businesses face shrinkage rates averaging 1.6% of total sales, nearly double the retail average. This challenge extends far beyond simple accounting discrepancies. For food manufacturers, processors, and distributors, inventory shrinkage represents a complex operational issue that directly impacts profitability, regulatory compliance, and market competitiveness. Unlike other industries, where shrinkage primarily stems from theft, food businesses must contend with unique factors, including spoilage, contamination risks, and stringent safety requirements, that compound traditional loss factors. TheFood and Agriculture Organisation reports that post-harvest losses in food supply chains can reach 30% in developing markets, while even advanced economies see 10-15% losses from farm to consumer. Understanding and controlling these losses isn’t just about protecting margins, but it’s also about building sustainable, efficient operations that can adapt to market pressures while maintaining food safety standards. What is Inventory Shrinkage in the Food Industry? Inventory shrinkage refers to any unaccounted-for reduction in stock that cannot be attributed to documented sales, transfers, or approved waste disposal. In food businesses, this encompasses a wide range of losses, some of which are preventable, such as theft, administrative errors, and mishandling. In contrast, others are considered inevitable, like spoilage within accepted thresholds. Unlike industries where product degradation is minimal, food businesses must carefully distinguish between acceptable spoilage and excessive losses. For example, a 2–5% spoilage rate may be normal for many perishable items, but higher rates can signal underlying operational inefficiencies. Shrinkage challenges in the food sector are uniquely complex. Temperature fluctuations can spoil entire shipments, pest infestations can contaminate stock, and even if goods appear intact, they must be discarded if they have expired. These factors require dedicated processes for monitoring, identifying, and managing inventory loss. How to Calculate Inventory Shrinkage Inventory shrinkage is calculated by comparing recorded (book) inventory with actual physical stock. The basic formula is: Shrinkage Rate = (Book Inventory – Physical Inventory) / Book Inventory × 100 For instance, if your system records $100,000 in inventory, but the physical count reveals only $96,000, the shrinkage rate would be 4%. While this basic formula provides a general overview, food businesses often require more detailed calculations that break shrinkage down by product type, storage environment, period, and root cause. A dairy processor, for instance, may track separate shrinkage rates for refrigerated goods versus dry storage items, since spoilage and handling risks vary significantly. To stay proactive, many companies conduct shrinkage analysis on a monthly or even weekly basis, especially in fast-moving categories like fresh produce, where short shelf lives leave little room for delay. Delayed identification of issues in these segments can lead to rapid inventory losses. Modern inventory management systems can help automate this process by synchronising real-time inventory data with physical counts, identifying anomalies, and generating shrinkage reports across various locations, SKUs, or timeframes. These tools reduce manual errors and offer the visibility needed to identify loss patterns before they escalate. What Are the Common Causes of Food Inventory Shrinkage? Food inventory shrinkage stems from five primary sources, each requiring different food inventory management strategies and management approaches: 1. Theft:Internal and external theft are major contributors to shrinkage. Employees may manipulate inventory records or divert shipments, while external actors target easily resold food items. These actions often involve coordinated efforts and are challenging to detect without strong controls. 2. Spoilage:Improper temperature control, inadequate inventory rotation, and delays in usage lead to spoilage. Failures in cold storage systems and inadequate stock management lead to products expiring or degrading before they can be used. 3. Errors in Record-Keeping:Inventory discrepancies often result from administrative mistakes such as incorrect receiving, missed shipments, or inaccurate data entry. Scanning errors and mislabeling also contribute to inventory mismatches. 4. Damaged Goods:Products can become unsellable due to physical damage during handling, transport, or storage. Packaging failures, mishandling, and rough transportation conditions are common causes of such losses. 5. Administrative and Operational Inefficiencies:Lack of proper training, unclear procedures, and inefficient workflows increase the risk of shrinkage. These gaps in operations often lead to mistakes or create opportunities for inventory loss. How Does Inventory Shrinkage Impact Food Businesses? Food shrinkage has a significant impact on food businesses across financial, operational, and regulatory dimensions. While the immediate loss of products is apparent, the broader consequences can undermine profitability, disrupt operations, and jeopardise compliance. Financial Losses The most direct impact of shrinkage is financial. When inventory disappears due to theft, spoilage, damage, or errors, businesses lose not just the cost of the goods but also the potential revenue. Since many food businesses operate on narrow profit margins, even small percentages of shrinkage can erode a significant portion of net profits. Additionally, the need to replace lost inventory often results in increased procurement costs, mainly when products must be sourced urgently. Administrative overhead also rises as companies invest more time and resources in documenting, auditing, and managing inventory discrepancies. Operational Inefficiencies Shrinkage distorts inventory records, making it difficult to plan production and manage supply chains effectively. When actual stock levels do not align with system data, businesses may encounter stockouts or overstocking. Stockouts can lead to emergency purchasing, expedited shipping, and disrupted customer fulfilment, while excess inventory increases storage costs and poses a risk of spoilage. Furthermore, warehouse staff and managers spend additional time reconciling data, conducting audits, and investigating shrinkage-related issues, which reduces overall labour efficiency. Pricing Pressure and Margin Compression Persistent shrinkage puts pressure on pricing strategies. To maintain profitability, businesses may need to raise prices, which can reduce competitiveness in price-sensitive markets. Alternatively, they may absorb the losses, leading to margin compression. Both options can weaken market positioning and limit growth opportunities. Customer Satisfaction and Trust Inaccurate inventory records resulting from shrinkage can lead to fulfilment errors and missed deliveries, damaging customer trust. Repeated service failures can harm long-term relationships and lead to lost business, especially in industries where reliability and consistency are critical. Regulatory and Compliance Challenges Food shrinkage complicates compliance management with food safety regulations and traceability standards. Missing or undocumented inventory can hinder the ability to track product movement, which is essential for recalls and audits. Regulatory bodies may view significant discrepancies as red flags, which could trigger investigations. High or unexplained shrinkage rates can also raise tax-related concerns if they fall outside accepted norms for business losses. How Can Food Businesses Overcome Inventory Shrinkage? Successfully reducing food shrinkage requires a systematic approach that addresses each major cause while building operational excellence throughout the organisation. Implementing Accurate Inventory Tracking Systems Modern inventory tracking systems help reduce shrinkage by providing real-time visibility into stock levels, movements, and storage conditions. Technologies such as barcoding or RFID eliminate many manual errors by automating data capture during receiving, storage, picking, and shipping. When integrated with operational workflows, these systems ensure records are updated instantly, reducing lag time and minimising the risk of phantom inventory or unrecorded losses. Regular Audits and Stocktaking Frequent inventory audits help detect discrepancies before they escalate. Rather than relying solely on annual physical counts, many businesses adopt cycle counting, where a portion of inventory is checked on a rotating basis. This ensures ongoing accuracy without disrupting operations. Using blind counts, where employees verify stock without viewing expected quantities, further improves count reliability. Statistical sampling can also be used to target high-risk categories, making audits more efficient and focused. Improved Warehouse and Storage Management Proper storage practices are essential to preventing shrinkage due to spoilage and physical damage. Temperature-controlled environments should be continuously monitored with alert systems to detect any deviations from the set temperature. To minimise losses from expired goods, businesses should employ inventory rotation techniques, such as the First In, First Out (FIFO) method, which ensures that older stock is sold before newer stock. Investing in the proper handling equipment and maintaining orderly storage also reduces product damage and improves overall efficiency. Employee Training and Security Measures Educating employees on best practices for managing inventory, minimising waste, and understanding their role in preventing shrinkage is crucial. Well-trained staff are less likely to make procedural mistakes and more likely to identify and report potential issues. Security measures such as CCTV monitoring, provided by areliable CCTV installation company, restricted access areas, and clear accountability protocols help deter theft and provide oversight of inventory handling. Additionally, anonymous reporting channels can encourage employees to report suspicious behavior without fear of retaliation. Using Technology for Better Forecasting and Demand Planning Accurate demand forecasting helps prevent overstocking, which can lead to spoilage, and understocking, which can cause stockouts. Predictive analytics tools can identify trends and seasonal patterns, enabling more informed purchasing and production decisions. These tools also help flag products at risk of becoming obsolete or expiring, allowing timely interventions such as promotions or redistribution before losses occur. How Folio3 FoodTech Food Inventory Management Software Helps Combat Shrinkage? Reducing shrinkage in food businesses often comes down to having better visibility, traceability, and control over inventory. A specialised food inventory management system, like the one developed by Folio3 FoodTech, is designed to address these challenges through integrated tools that support accuracy and operational efficiency. Here’s how Folio3 FoodTech food inventory management software can help: Real-Time Inventory Tracking Continuous tracking of raw materials, in-process items, and finished goods ensures stock levels are always up to date. This helps prevent data mismatches and makes it easier to spot irregularities early. Multi-Location Inventory Management When inventory is distributed across production sites, warehouses, or cold storage facilities, centralised oversight helps maintain consistency. It reduces miscounts, duplication, and blind spots in the inventory process. Batch and Lot Tracking Maintaining batch and lot histories supports better traceability. In the event of a quality issue or audit, businesses can quickly identify where the affected inventory originated and where it’s located, thereby reducing unnecessary waste. Expiration and Shelf-Life Management By tracking expiry dates and applying the First Expired, First Out (FEFO) principle, the system helps prioritise stock movement. This reduces the chance of products expiring before they’re used or sold. Catch Weight Management In operations involving variable-weight items, such as dairy, meat, or seafood, catch weight-based tracking helps ensure that inventory counts are accurate and consistent with what’s actually handled and sold. Allergen Information Tracking As part of allergen management, Tagging and separating allergen-related items minimises cross-contact risk and supports compliance. It also helps prevent unusable inventory shrinkage due to mishandling or misclassification. Automated Replenishment When stock levels drop below predefined thresholds, the system can automatically trigger reorders or production tasks. This reduces last-minute procurement and helps maintain optimal stock levels without overbuying. Demand Forecasting Analysing historical data and production trends enables more informed planning and decision-making. This helps avoid overstocking—often a significant cause of spoilage and ensures that procurement aligns more closely with actual demand. Mobile & Barcode Scanning On-the-go scanning capabilities reduce manual errors during receiving, picking, and stocktaking. Staff can update records in real time, improving accuracy and reducing data entry delays. Conclusion Inventory shrinkage remains a critical challenge for food businesses, but with the right systems and processes in place, it can be significantly reduced. A combination of operational discipline, employee training, and real-time inventory visibility is key to addressing both the causes and the costs of shrinkage. For companies looking to strengthen their inventory control, a purpose-built solution like Folio3 FoodTech Food Inventory Management Software offers the tools needed to improve accuracy, minimise waste, and support long-term efficiency, making it a valuable component of any shrinkage reduction strategy. FAQs What Is Food Inventory Shrinkage? Food inventory shrinkage refers to the discrepancy between recorded inventory levels and the actual physical stock on hand, encompassing losses due to theft, spoilage, damage, and administrative errors. It represents any unexplained reduction in inventory that can’t be attributed to legitimate sales or documented disposal. How Can Folio3 FoodTech Food Inventory Management Software Help Reduce Inventory Shrinkage? Folio3 FoodTech’s inventory software reduces shrinkage through real-time tracking, automated FIFO rotation, temperature monitoring, and comprehensive reporting capabilities. The system provides immediate visibility into discrepancies and helps identify root causes of losses, enabling proactive management rather than reactive responses. What Causes Food Inventory Shrinkage? The primary causes include spoilage (40-60% of losses), theft (30%), administrative errors, damaged goods, and operational inefficiencies. Food businesses face unique challenges, including temperature sensitivity, short shelf lives, and complex handling requirements, which differ from those in other industries. How Can I Prevent Food Shrinkage In My Warehouse? Prevention strategies include implementing automated tracking systems, conducting regular cycle counts, maintaining proper storage conditions, training employees on handling procedures, and using security measures to deter theft. Success requires addressing all significant causes of shrinkage simultaneously. What Are The Financial Implications Of Food Inventory Shrinkage? Financial impacts include direct product losses, increased procurement costs, administrative expenses, and margin compression. For food companies operating on 2-5% margins, shrinkage rates of 1-2% can eliminate 20-40% of potential profits, making effective shrinkage management critical for profitability. Contact Us Direct Call 408 365 4638 Email Us foodtech@folio3.com 5 Star Reviews Our Socials ERP By Industry Food ERP Bakery ERP Confectionery ERP Dairy ERP Frozen Foods ERP Meat ERP Poultry ERP Sauces & Dressing ERP Seafood ERP Snacks ERP ERP By Solution Distribution Management Inventory Management Manufacturing Management Procurement Management Supply Chain Management F&B Plant Maintenance Food Safety Food Safety Management Compliance Management Environmental Monitoring FSMA Compliance Management HACCP Management Recall Management Supplier Management Traceability Management Meat Traceability Quality Management Technology Partners Microsoft Dynamics 365 Netsuite SuiteSuccess Salesforce App Development Food App Development Diet & Nutrition Grocery Delivery Meat Delivery Milk Delivery Pet Food Delivery Integration Solutions Food EDI Grocery EDI Retail EDI Resources About Us Our Advisors Blog Case Studies Whitepapers 160 Bovet Road, Suite # 101 San Mateo, CA 94402 USA 6701 Koll Center Parkway, #250 Pleasanton, CA 94566 2 – 105 CONSUMERS DRM WHITBY ON L1N 1C4. C/- Prime Partners Level 4 1 James Place NORTH SYDNEY New South Wales 2060. Export House, Cawsey Way, Woking Surrey, GU21 6QX. 49 Bacho Kiro Street, Sofia, 1000, Bulgaria Amado Nervo #2200 Edificio Esfera 1 piso 4 Col. Jardines del Sol CP, 45050, Zapopan, Jalisco, Mexico Folio3 FZ LLC, UAE, Dubai Internet City, 1st Floor, Building Number 14, Premises 105, Dubai, UAE Folio3 Tower, Plot 26, Block B, SMCH Society, Main Shahrah-e-Faisal, Karachi. Copyright © 2025 Folio3 FoodTech Privacy Policy | Cookie Policy
4162
https://en.wikipedia.org/wiki/Factorization_of_polynomials
Jump to content Search Contents (Top) 1 Formulation of the question 2 Primitive part–content factorization 3 Square-free factorization 4 Classical methods 4.1 Obtaining linear factors 4.2 Kronecker's method 5 Modern methods 5.1 Factoring over finite fields 5.2 Factoring univariate polynomials over the integers 5.3 Factoring over algebraic extensions (Trager's method) 6 Numerical factorization 7 See also 8 Bibliography 9 Further reading Factorization of polynomials Català Чӑвашла Deutsch Español Français Galego Magyar 日本語 Português Русский Svenska Українська Tiếng Việt Edit links Article Talk Read Edit View history Tools Actions Read Edit View history General What links here Related changes Upload file Permanent link Page information Cite this page Get shortened URL Download QR code Print/export Download as PDF Printable version In other projects Wikidata item Appearance From Wikipedia, the free encyclopedia Computational method This article is about factorization algorithms. For paper-and-pencil methods, see Factorization § Polynomials. In mathematics and computer algebra, factorization of polynomials or polynomial factorization expresses a polynomial with coefficients in a given field or in the integers as the product of irreducible factors with coefficients in the same domain. Polynomial factorization is one of the fundamental components of computer algebra systems. The first polynomial factorization algorithm was published by Theodor von Schubert in 1793. Leopold Kronecker rediscovered Schubert's algorithm in 1882 and extended it to multivariate polynomials and coefficients in an algebraic extension. But most of the knowledge on this topic is not older than circa 1965 and the first computer algebra systems: When the long-known finite step algorithms were first put on computers, they turned out to be highly inefficient. The fact that almost any uni- or multivariate polynomial of degree up to 100 and with coefficients of a moderate size (up to 100 bits) can be factored by modern algorithms in a few minutes of computer time indicates how successfully this problem has been attacked during the past fifteen years. (Erich Kaltofen, 1982) Modern algorithms and computers can quickly factor univariate polynomials of degree more than 1000 having coefficients with thousands of digits. For this purpose, even for factoring over the rational numbers and number fields, a fundamental step is a factorization of a polynomial over a finite field. Formulation of the question [edit] Polynomial rings over the integers or over a field are unique factorization domains. This means that every element of these rings is a product of a constant and a product of irreducible polynomials (those that are not the product of two non-constant polynomials). Moreover, this decomposition is unique up to multiplication of the factors by invertible constants. Factorization depends on the base field. For example, the fundamental theorem of algebra, which states that every polynomial with complex coefficients has complex roots, implies that a polynomial with integer coefficients can be factored (with root-finding algorithms) into linear factors over the complex field C. Similarly, over the field of reals, the irreducible factors have degree at most two, while there are polynomials of any degree that are irreducible over the field of rationals Q. The question of polynomial factorization makes sense only for coefficients in a computable field whose every element may be represented in a computer and for which there are algorithms for the arithmetic operations. However, this is not a sufficient condition: Fröhlich and Shepherdson give examples of such fields for which no factorization algorithm can exist. The fields of coefficients for which factorization algorithms are known include prime fields (that is, the field of the rational numbers and the fields of the integers modulo a prime number) and their finitely generated field extensions. Integer coefficients are also tractable. Kronecker's classical method is interesting only from a historical point of view; modern algorithms proceed by a succession of: Square-free factorization Factorization over finite fields and reductions: From the multivariate case to the univariate case. From coefficients in a purely transcendental extension to the multivariate case over the ground field (see below). From coefficients in an algebraic extension to coefficients in the ground field (see below). From rational coefficients to integer coefficients (see below). From integer coefficients to coefficients in a prime field with p elements, for a well chosen p (see below). Primitive part–content factorization [edit] See also: Content (algebra) and Gauss's lemma (polynomial) In this section, we show that factoring over Q (the rational numbers) and over Z (the integers) is essentially the same problem. The content of a polynomial p ∈ Z[X], denoted "cont(p)", is, up to its sign, the greatest common divisor of its coefficients. The primitive part of p is primpart(p) = p/cont(p), which is a primitive polynomial with integer coefficients. This defines a factorization of p into the product of an integer and a primitive polynomial. This factorization is unique up to the sign of the content. It is a usual convention to choose the sign of the content such that the leading coefficient of the primitive part is positive. For example, is a factorization into content and primitive part. Every polynomial q with rational coefficients may be written where p ∈ Z[X] and c ∈ Z: it suffices to take for c a multiple of all denominators of the coefficients of q (for example their product) and p = cq. The content of q is defined as: and the primitive part of q is that of p. As for the polynomials with integer coefficients, this defines a factorization into a rational number and a primitive polynomial with integer coefficients. This factorization is also unique up to the choice of a sign. For example, is a factorization into content and primitive part. Gauss proved that the product of two primitive polynomials is also primitive (Gauss's lemma). This implies that a primitive polynomial is irreducible over the rationals if and only if it is irreducible over the integers. This implies also that the factorization over the rationals of a polynomial with rational coefficients is the same as the factorization over the integers of its primitive part. Similarly, the factorization over the integers of a polynomial with integer coefficients is the product of the factorization of its primitive part by the factorization of its content. In other words, an integer GCD computation reduces the factorization of a polynomial over the rationals to the factorization of a primitive polynomial with integer coefficients, and the factorization over the integers to the factorization of an integer and a primitive polynomial. Everything that precedes remains true if Z is replaced by a polynomial ring over a field F and Q is replaced by a field of rational functions over F in the same variables, with the only difference that "up to a sign" must be replaced by "up to the multiplication by an invertible constant in F". This reduces the factorization over a purely transcendental field extension of F to the factorization of multivariate polynomials over F. Square-free factorization [edit] Main article: Square-free polynomial If two or more factors of a polynomial are identical, then the polynomial is a multiple of the square of this factor. The multiple factor is also a factor of the polynomial's derivative (with respect to any of the variables, if several). For univariate polynomials, multiple factors are equivalent to multiple roots (over a suitable extension field). For univariate polynomials over the rationals (or more generally over a field of characteristic zero), Yun's algorithm exploits this to efficiently factorize the polynomial into square-free factors, that is, factors that are not a multiple of a square, performing a sequence of GCD computations starting with gcd(f(x), f '(x)). To factorize the initial polynomial, it suffices to factorize each square-free factor. Square-free factorization is therefore the first step in most polynomial factorization algorithms. Yun's algorithm extends this to the multivariate case by considering a multivariate polynomial as a univariate polynomial over a polynomial ring. In the case of a polynomial over a finite field, Yun's algorithm applies only if the degree is smaller than the characteristic, because, otherwise, the derivative of a non-zero polynomial may be zero (over the field with p elements, the derivative of a polynomial in xp is always zero). Nevertheless, a succession of GCD computations, starting from the polynomial and its derivative, allows one to compute the square-free decomposition; see Polynomial factorization over finite fields#Square-free factorization. Classical methods [edit] This section describes textbook methods that can be convenient when computing by hand. These methods are not used for machine computations because they use integer factorization, which is currently slower than polynomial factorization. The two methods that follow start from a univariate polynomial with integer coefficients for finding factors that are also polynomials with integer coefficients. Obtaining linear factors [edit] All linear factors with rational coefficients can be found using the rational root test. If the polynomial to be factored is , then all possible linear factors are of the form , where is an integer factor of and is an integer factor of . All possible combinations of integer factors can be tested for validity, and each valid one can be factored out using polynomial long division. If the original polynomial is the product of factors at least two of which are of degree 2 or higher, this technique only provides a partial factorization; otherwise the factorization is complete. In particular, if there is exactly one non-linear factor, it will be the polynomial left after all linear factors have been factorized out. In the case of a cubic polynomial, if the cubic is factorizable at all, the rational root test gives a complete factorization, either into a linear factor and an irreducible quadratic factor, or into three linear factors. Kronecker's method [edit] Kronecker's method is aimed to factor univariate polynomials with integer coefficients into polynomials with integer coefficients. The method uses the fact that evaluating integer polynomials at integer values must produce integers. That is, if is a polynomial with integer coefficients, then is an integer as soon as a is an integer. There are only a finite number of possible integer values for a factor of a. So, if is a factor of the value of must be one of the factors of If one searches for all factors of a given degree d, one can consider values, for a, which give a finite number of possibilities for the tuple Each has a finite number of divisors , and, each -tuple where the entry is a divisor of , that is, a tuple of the form , produces a unique polynomial of degree at most , which can be computed by polynomial interpolation. Each of these polynomials can be tested for being a factor by polynomial division. Since there were finitely many and each has finitely many divisors, there are finitely many such tuples. So, an exhaustive search allows finding all factors of degree at most d. For example, consider : . If this polynomial factors over Z, then at least one of its factors must be of degree two or less, so is uniquely determined by three values. Thus, we compute three values , and . If one of these values is 0, we have a linear factor. If the values are nonzero, we can list the possible factorizations for each. Now, 2 can only factor as : 1×2, 2×1, (−1)×(−2), or (−2)×(−1). Therefore, if a second degree integer polynomial factor exists, it must take one of the values : p(0) = 1, 2, −1, or −2 and likewise for p(−1). There are eight factorizations of 6 (four each for 1×6 and 2×3), making a total of 4×4×8 = 128 possible triples (p(0), p(1), p(−1)), of which half can be discarded as the negatives of the other half. Thus, we must check 64 explicit integer polynomials as possible factors of . Testing them exhaustively reveals that constructed from (g(0), g(1), g(−1)) = (1,3,1) factors . Dividing f(x) by p(x) gives the other factor , so that . Now one can test recursively to find factors of p(x) and q(x), in this case using the rational root test. It turns out they are both irreducible, so the irreducible factorization of f(x) is: Modern methods [edit] Factoring over finite fields [edit] Main articles: Factorization of polynomials over finite fields, Berlekamp's algorithm, and Cantor–Zassenhaus algorithm Factoring univariate polynomials over the integers [edit] If is a univariate polynomial over the integers, assumed to be content-free and square-free, one starts by computing a bound such that any factor has coefficients of absolute value bounded by . This way, if is an integer larger than , and if is known modulo , then can be reconstructed from its image mod . The Zassenhaus algorithm proceeds as follows. First, choose a prime number such that the image of remains square-free, and of the same degree as . A random choice will almost always satisfy these constraints, since only a finite number of prime numbers do not satify them, namely the prime divisors of the product of the discriminant and the leading coefficient of the polynomial. Then factor . This produces integer polynomials whose product matches . Next, apply Hensel lifting; this updates the in such a way that their product matches , where is large enough that exceeds : thus each corresponds to a well-defined integer polynomial. Modulo , the polynomial has factors (up to units): the products of all subsets of . These factors modulo need not correspond to "true" factors of in , but we can easily test them by division in . This way, all irreducible true factors can be found by checking at most cases, reduced to cases by skipping complements. If is reducible, the number of cases is reduced further by removing those that appear in an already found true factor. The Zassenhaus algorithm processes each case (each subset) quickly, however, in the worst case, it considers an exponential number of cases. The first polynomial time algorithm for factoring rational polynomials was discovered by Lenstra, Lenstra and Lovász and is an application of the Lenstra–Lenstra–Lovász lattice basis reduction (LLL) algorithm (Lenstra, Lenstra & Lovász 1982). A simplified version of the LLL factorization algorithm is as follows: calculate a complex (or p-adic) root α of the polynomial to high precision, then use the Lenstra–Lenstra–Lovász lattice basis reduction algorithm to find an approximate linear relation between 1, α, α2, α3, . . . with integer coefficients, which might be an exact linear relation and a polynomial factor of . One can determine a bound for the precision that guarantees that this method produces either a factor, or an irreducibility proof. Although this method finishes in polynomial time, it is not used in practice because the lattice has high dimension and huge entries, which makes the computation slow. The exponential complexity in the Zassenhaus algorithm comes from a combinatorial problem: how to select the right subsets of . State-of-the-art factoring implementations work in a manner similar to Zassenhaus, except that the combinatorial problem is translated to a lattice problem that is then solved by LLL. In this approach, LLL is not used to compute coefficients of factors, but rather to compute vectors with entries in {0,1} that encode the subsets of corresponding to the irreducible true factors. Factoring over algebraic extensions (Trager's method) [edit] We can factor a polynomial , where the field is a finite extension of . First, using square-free factorization, we may suppose that the polynomial is square-free. Next we define the quotient ring of degree ; this is not a field unless is irreducible, but it is a reduced ring since is square-free. Indeed, if is the desired factorization of p(x), the ring decomposes uniquely into fields as: We will find this decomposition without knowing the factorization. First, we write L explicitly as an algebra over : we pick a random element , which generates over with high probability by the primitive element theorem. If this is the case, we can compute the minimal polynomial of over , by finding a -linear relation among 1, α, . . . , αn. Using a factoring algorithm for rational polyomials, we factor into irreducibles in : Thus we have: where corresponds to . This must be isomorphic to the previous decomposition of . The generators of L are x along with the generators of over ; writing these as a polynomials in , we can determine the embeddings of and into each component . By finding the minimal polynomial of in , we compute , and thus factor over Numerical factorization [edit] | | | This section relies excessively on references to primary sources. Please improve this section by adding secondary or tertiary sources. Find sources: "Factorization of polynomials" – news · newspapers · books · scholar · JSTOR (January 2023) (Learn how and when to remove this message) | "Numerical factorization" refers commonly to the factorization of polynomials with real or complex coefficients, whose coefficients are only approximately known, generally because they are represented as floating point numbers. For univariate polynomials with complex coefficients, factorization can easily be reduced to numerical computation of polynomial roots and multiplicities. In the multivariate case, a random infinitesimal perturbation of the coefficients produces with probability one an irreducible polynomial, even when starting from a polynomial with many factors. So, the very meaning of numerical factorization needs to be clarified precisely. Let be a polynomial with complex coefficients with an irreducible factorization where and the factors are irreducible polynomials with complex coefficients. Assume that is approximated through a polynomial whose coefficients are close to those of . The exact factorization of is pointless, since it is generally irreducible. There are several possible definitions of what can be called a numerical factorization of If and 's are known, an approximate factorization consists of finding a polynomial close to that factors as above. If one does not know the factorization scheme, identifying becomes necessary. For example, the number of irreducible factors of a polynomial is the nullity of its Ruppert matrix. Thus the multiplicities can be identified by square-free factorization via numerical GCD computation and rank-revealing on Ruppert matrices. Several algorithms have been developed and implemented for numerical factorization as an on-going subject of research. See also [edit] Factorization § Polynomials, for elementary heuristic methods and explicit formulas Swinnerton-Dyer polynomials, a family of polynomials having worst-case runtime for the Zassenhaus method Bibliography [edit] ^ FT Schubert: De Inventione Divisorum Nova Acta Academiae Scientiarum Petropolitanae v.11, pp. 172–182(1793) ^ Kaltofen (1982) ^ An example of degree 2401, taking 7.35 seconds, is found in Section 4 in: Hart, van Hoeij, Novocin: Practical Polynomial Factoring in Polynomial Time ISSAC'2011 Proceedings, pp. 163–170 (2011). ^ Fröhlich, A.; Shepherdson, J. C. (1955). "On the factorisation of polynomials in a finite number of steps". Mathematische Zeitschrift. 62 (1): 331–334. doi:10.1007/bf01180640. ISSN 0025-5874. S2CID 119955899. ^ Van der Waerden, Sections 5.4 and 5.6 ^ M. van Hoeij: Factoring polynomials and the knapsack problem. Journal of Number Theory, 95, 167–189, (2002). ^ Ruppert, W. (1999). "Reducibility of polynomials f(x,y)". J. Number Theory. 77: 62–70. arXiv:math/9808021. doi:10.1006/jnth.1999.2381. S2CID 14316123. Shaker, H. (2009). "Topology and factorization of polynomials". Math. Scand. 104: 51–59. arXiv:0704.3363. doi:10.7146/math.scand.a-15084. S2CID 14121840. 8. ^ For example: W. Wu and Z. Zeng (2017). "The numerical factorization of polynomials". Foundations of Computational Mathematics. 17: 259–286. arXiv:2103.04888. doi:10.1007/s10208-015-9289-1. S2CID 254171366. 9. ^ E. Kaltofen, J.P. May, Z. Yang and L. Zhi (2008). "Approximate factorization of multivariate polynomials using singular value decomposition". J. Symbolic Comput. 43 (5): 359–376. doi:10.1016/j.jsc.2007.11.005.{{cite journal}}: CS1 maint: multiple names: authors list (link) Fröhlich, A.; Shepherson, J. C. (1955), "On the factorisation of polynomials in a finite number of steps", Mathematische Zeitschrift, 62 (1): 331–334, doi:10.1007/BF01180640, ISSN 0025-5874, S2CID 119955899 Trager, B.M. (1976). "Algebraic factoring and rational function integration". Proceedings of the third ACM symposium on Symbolic and algebraic computation - SYMSAC '76. pp. 219–226. doi:10.1145/800205.806338. ISBN 9781450377904. S2CID 16567619. Bernard Beauzamy, Per Enflo, Paul Wang (October 1994). "Quantitative Estimates for Polynomials in One or Several Variables: From Analysis and Number Theory to Symbolic and Massively Parallel Computation". Mathematics Magazine. 67 (4): 243–257. doi:10.2307/2690843. JSTOR 2690843.{{cite journal}}: CS1 maint: multiple names: authors list (link) (accessible to readers with undergraduate mathematics) Cohen, Henri (1993). A course in computational algebraic number theory. Graduate Texts in Mathematics. Vol. 138. Berlin, New York: Springer-Verlag. ISBN 978-3-540-55640-4. MR 1228206. Kaltofen, Erich (1982), "Factorization of polynomials", in B. Buchberger; R. Loos; G. Collins (eds.), Computer Algebra, Springer Verlag, pp. 95–113, CiteSeerX 10.1.1.39.7916 Knuth, Donald E (1997). "4.6.2 Factorization of Polynomials". Seminumerical Algorithms. The Art of Computer Programming. Vol. 2 (Third ed.). Reading, Massachusetts: Addison-Wesley. pp. 439–461, 678–691. ISBN 978-0-201-89684-8. Lenstra, A. K.; Lenstra, H. W.; Lovász, László (1982). "Factoring polynomials with rational coefficients". Mathematische Annalen. 261 (4): 515–534. CiteSeerX 10.1.1.310.318. doi:10.1007/BF01457454. ISSN 0025-5831. MR 0682664. S2CID 5701340. Van der Waerden, Algebra (1970), trans. Blum and Schulenberger, Frederick Ungar. Further reading [edit] Kaltofen, Erich (1990), "Polynomial Factorization 1982-1986", in D. V. Chudnovsky; R. D. Jenks (eds.), Computers in Mathematics, Lecture Notes in Pure and Applied Mathematics, vol. 125, Marcel Dekker, Inc., CiteSeerX 10.1.1.68.7461 Kaltofen, Erich (1992), "Polynomial Factorization 1987–1991" (PDF), Proceedings of Latin '92, Springer Lect. Notes Comput. Sci., vol. 583, Springer, retrieved October 14, 2012 Ivanyos, Gabor; Marek, Karpinski; Saxena, Nitin (2009). "Schemes for deterministic polynomial factoring". Proceedings of the 2009 international symposium on Symbolic and algebraic computation. pp. 191–198. arXiv:0804.1974. doi:10.1145/1576702.1576730. ISBN 9781605586090. S2CID 15895636. | v t e Polynomials and polynomial functions and polynomial equations | | By degree | Zero polynomial (degree undefined or −1 or −∞) Constant function (0) Linear function (1) + Linear equation Quadratic function (2) + Quadratic equation Cubic function (3) + Cubic equation Quartic function (4) + Quartic equation Quintic function (5) Sextic equation (6) Septic equation (7) | | By properties | Univariate Bivariate Multivariate Monomial Binomial Trinomial Irreducible Square-free Homogeneous Quasi-homogeneous | | Tools and algorithms | Factorization Greatest common divisor Division Horner's method of evaluation Polynomial identity testing Resultant Discriminant Gröbner basis | Retrieved from " Categories: Polynomials Computer algebra Factorization Polynomial factorization algorithms Hidden categories: CS1 maint: multiple names: authors list Articles with short description Short description matches Wikidata Articles lacking reliable references from January 2023 All articles lacking reliable references Factorization of polynomials Add topic
4163
https://www.arxiv.org/pdf/2505.17672
arXiv:2505.17672v1 [math.CO] 23 May 2025 Paired domination in trees: A linear algorithm and asymptotic normality 1,2 Michael A. Henning and 3Dimbinaina Ralaivaosaona 1 Department of Mathematics and Applied Mathematics University of Johannesburg Auckland Park, 2006, South Africa Email: mahenning@uj.ac.za 2 DSTI-NRF Centre of Excellence in Mathematical and Statistical Sciences (CoE-MaSS), South Africa 3 Department of Mathematical Sciences Stellenbosch University Matieland, 7602, South Africa Email: naina@sun.ac.za Abstract A set S of vertices in a graph G is a paired dominating set if every vertex of G is adjacent to a vertex in S and the subgraph induced by S contains a perfect matching (not necessarily as an induced subgraph). The paired domination number, γpr (G), of G is the minimum cardinality of a paired dominating set of G. We present a linear algorithm for computing the paired domination number of a tree. As an application of our algorithm, we prove that the paired domination number is asymptotically normal in a random rooted tree of order n generated by a conditioned Galton–Watson process as n → ∞ . In particular, we have found that the paired domination number of a random Cayley tree of order n, where each tree is equally likely, is asymptotically normal with expectation approaching (0 .5177 . . . )n. Keywords: Paired domination; Tree; Random trees; Linear algorithm, Conditioned Galton–Watson trees, Asymptotic normality AMS subject classification: 05C69, 60C05 1 Introduction A dominating set of a graph G is a set S ⊆ V (G) such that every vertex of V (G) \ S is adjacent to some vertex in S. A set S of vertices in G is a total dominating set , abbreviated TD-set, of G if every vertex in G is adjacent to some other vertex in S. The domination number , γ(G), of G is the minimum cardinality of a dominating set of G, and the total domination number , γt(G), of G is the minimum cardinality of a TD-set of G. If A and B are two subsets of vertices in a graph G, then the set A totally dominates the set B is every vertex in B has a neighbor in the set A,1where two vertices are neighbors if they are adjacent. For recent books on domination and total domination in graphs, we refer the reader to [6, 7, 8, 9]. A paired dominating set , abbreviated PD-set, of an isolate-free graph G is a dominating set S of G with the additional property that the subgraph G[S] induced by S contains a perfect matching M (not necessarily induced). With respect to the matching M , two vertices joined by an edge of M are paired and are called partners in S. The paired domination number , γpr (G), of G is the minimum cardinality of a PD-set of G. We call a PD-set of G of cardinality γpr (G) a γpr -set of G. We note that the paired domination number γpr (G) is an even integer. For a recent survey on paired domination in graphs, we refer the reader to the book chapter . We denote the degree of a vertex v in a graph G by deg G(v). A vertex of degree 0 is called an isolated vertex , and a graph is isolate -free if it contains no isolated vertex. The maximum (minimum) degree among the vertices of G is denoted by ∆( G) ( δ(G), respectively). A leaf of a tree T is a vertex of degree 1 in T , and a support vertex of T is a vertex with a leaf neighbor. The distance d(u, v ) between two vertices u and v in a connected graph G, equals the minimum length of a ( u, v )-path in G from u to v.A rooted tree T distinguishes one vertex r called the root . For each vertex v̸ = r of T , the parent of v is the neighbor of v on the unique ( r, v )-path, while a child of v is any other neighbor of v. A descendant of v is a vertex u̸ = v such that the unique ( r, u )-path contains v. We let D(v) denote the set of descendants of v, and we define D[v] = D(v) ∪ { v}. The maximal subtree at v is the subtree of T induced by D[v], and is denoted by Tv.The aim of this paper is twofold: First, we present a simple bottom-up linear-time algorithm that solves the minimum paired domination problem for trees and prove its correctness. Our algorithm has a similar flavour to that of Mitchell, Cockayne, and Hedetniemi for the dom-ination number problem. Second, we establish that the paired domination number in random trees of order n admits a nondegenerate Gaussian limit law as n → ∞ . The random trees con-sidered here are conditioned Galton–Watson trees, and our bottom-up algorithm plays a crucial role in proving the result on the limiting distribution. This paper is organised as follows: In Section 2, we focus on our new algorithm and prove its correctness. In Section 3, we analyse the limiting distribution of the paired domination number in conditioned Galton–Watson trees in general and provide explicit examples and simulations that are in support of our result. 2 A paired domination tree algorithm In 1979 Mitchell, Cockayne, and Hedetniemi and in 1984 Laskar, Pfaff, Hedetniemi, and Hedetniemi presented linear algorithms for computing the domination number and, respec-tively, the total domination number, of a tree. Their algorithms consider an arbitrary tree, which is rooted, and they systematically consider the vertices of the tree, starting from the vertices at furthest distance from the root, and carefully select a minimum (total) dominating set S in such a way that the sum of the distances from the root to the vertices in S is a minimum. In 2003 Qiao, Kang, Cardei, and Du presented a linear-time algorithm for computing the paired domination number of a tree. The linear-time algorithm we present in this section has a similar flavour to the linear algorithms presented in [16, 17]. In order to formally state our 2algorithm for computing the paired domination number of a tree, we first introduce the necessary notation. Let T be a rooted tree. We commonly draw the root r of T at the top with the remaining vertices at the appropriate level below r depending on their distance from r. We label the root with label 1. We label all children of the root (at level 1 from the root) next with labels 2, . . . , deg(1) + 1. Next we label all children of the vertex 2 with labels deg(1) + 2 , . . . , deg(1) + deg(2)+1, and thereafter we label all children of the vertex 3, etc. Given such a rooted tree T with root vertex labelled 1 and with V (T ) = {1, 2, . . . , n }, we represent T by a data structure called a Parent array in which the parent of a vertex labelled i is given by parent[ i] with parent = 0 (to indicate that the vertex labelled 1 has no parent). We assume that the vertices of T are labelled 1, 2, . . . , n so that for i < j , vertex i is at level less than or equal to that of vertex j (that is, d(1 , i ) ≤ d(1 , j )). Figure 1 shows an example of a rooted tree T with its parent array. 1 2 5 10 6 11 3 7 12 15 14 8 13 4 9 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Parent [ 0 1 1 1 2 3 3 3 4 5 6 7 8 12 12 ]Figure 1: A rooted tree T with its Parent array In Algorithm TREE PAIRED DOMINATION that follows, we will for each vertex, i, keep track of two boolean values, namely In PD Set[ i] and Dom by child[ i]. These values are initially set to false. As the algorithm progresses some of these values may change to true. Upon completion of the algorithm, all vertices, i, with In PD Set[ i] = true will be added to the PD-set. Further, all vertices with Dom by child[ i] = true will be dominated by one of their children. We define vertex 0 to be a dummy -vertex that does not exist and we define parent = parent = 0. We will never change In PD Set but may change Dom by child. Algorithm TREE PAIRED DOMINATION :Input: A rooted tree T with V (T ) = {1, 2, . . . , n } rooted at 1 where n ≥ 2 (and where larger values are further from the root) and represented by an array parent[1 . . . n ] Output: An array In PD Set[] that indicates which vertices belong to the PD-set Code: for i = 0 to n do { Dom by child[ i] = false 3. In PD Set[ i] = false } for i = n to 2 do if (Dom by child[ i] = false ) and (In PD Set[parent[ i]] = false ) and (parent[ i]̸ = 1) and (In PD Set[parent[parent[ i]]] = false )(we remark that in this case, no child of vertex i is in the PD-set, and neither is the parent of vertex i nor the parent of the parent of vertex i; further, the parent of vertex i is not the vertex 1) then { In PD Set[parent[ i]] = true 7. In PD Set[parent[parent[ i]]] = true 8. Dom by child[parent[parent[ i]]] = true 9. Dom by child[parent[parent[parent[ i]]]] = true (if the vertex exists) } (we remark that in this case, we add the parent of vertex i and the parent of the parent of vertex i to the PD-set, and these two added vertices are paired in the PD-set. Further, we note that the parent of the parent of vertex i now is dominated by one of its children, and so we update Dom by child[parent[ i]) if (Dom by child[ i] = false ) and (In PD Set[parent[ i]] = false ) and (parent[ i] = 1) or (In PD Set[parent[parent[ i]]] = true )(we remark that in this case, the PD-set contains no child of vertex i and does not contain the parent of vertex i, but either the parent of vertex i is the vertex 1 or the PD-set contains the parent of the parent of vertex i.) then { In PD Set[parent[ i]] = true 12. and if i1 is the child of parent[ i] of largest label such that In PD Set[ i1] = false then { In PD Set[ i1] = true 14. Dom by child[parent[ i]] = true } } (we remark that in this case, we add the parent of vertex i and a child of the parent of vertex i of the largest label to the PD-set, and these two added vertices are paired in the PD-set. Further, we note that the parent of vertex i now is dominated by one of its children, and so we update Dom by child[parent[ i]) 415. if (Dom by child = false ) then { In PD Set = true 17. In PD Set = true 18. Dom by child = true } (we remark that in this case, no child of the vertex 1 is in the PD-set, and so we add to the PD-set the vertices 1 and 2, and these two added vertices are paired in the PD-set )We prove next that algorithm TREE PAIRED DOMINATION produces a γpr -set of T . Theorem 1. If T is tree of order n ≥ 2, then the set S produced by algorithm TREE PAIRED DOMINATION defined by S = {i ∈ [n] : In PD Set[ i] = true } is a γpr -set of T .Proof. Let S be the set produced by algorithm TREE PAIRED DOMINATION , and so S = {i ∈ [n] : In PD Set[ i] = true }. By construction, S is a PD-set of T . Hence it remains to show that S is a γpr -set of T . Let S(i) denote all vertices, j, with In PD Set[ j] = true, immediately after performing line 14 in our tree algorithm with the value i. We show that property P (i)below holds for all i = n, n − 1, n − 2, . . . , 2, by induction. Property P (i): The following properties hold. 1. The set S(i) totally dominates the set {i, i + 1 , i + 2 , . . . , n }.2. The set S(i) ⊆ Qi for some γpr -set Qi of T .We first consider Property P (n) (and so here i = n). If parent[ n] = 1, then T is a star rooted at its central vertex and S(n) = {1, 2} and Dom by child = true. If parent[ n]̸ = 1, then S(n) = {parent[ n], parent[parent[ n]] } and Dom by child[parent[parent[ n]]] = true. In both cases, the set S(n) contains the parent of vertex n, and therefore S(n) totally dominates the set {n}. Let Qn be an arbitrary γpr -set of T . Moreover since the parent of vertex n is a support vertex (with leaf neighbor n), every γpr -set of T contains the parent of vertex n. In particular, parent[ n] ∈ Qn.Suppose that parent[ n] = 1. In this case, γpr (T ) = 2 and Qn contains a leaf neighbor of parent[ n]. If vertex 2 does not belong to Qn, then replacing the leaf neighbor of parent[ n] that belongs to Qn with the vertex 2 produces a γpr -set of T that is identically the set S(n). Suppose that parent[ n]̸ = 1. In this case, if parent[parent[ n]] does not belong to the set Qn, then replacing the leaf neighbor of parent[ n] that belongs to Qn with the vertex parent[parent[ n]] produces a new γpr -set of T that contains the set S(n). Furthermore, the array Dom by child is updated correctly noting that in both cases Dom by child[parent[ n]] = true upon completion of line 14 in our tree algorithm with the value n. Thus, property P (n) holds. This establishes the base case. For the inductive hypothesis, let 2 ≤ i < n and assume that property P (i + 1) holds. Thus, the set S(i + 1) totally dominates the set {i + 1 , i + 2 , . . . , n }. Moreover, S(i + 1) ⊆ Qi+1 for some 5γpr -set Qi+1 of T , and the array Dom by child is updated correctly. For notation convenience, let pi be the parent of vertex i and if pi̸ = 1, then let gi be the grandparent of vertex i. Thus, pi = parent[ i] and gi = parent[parent[ i]]. We now show that property P (i) holds. Consider when the vertex i is first considered in the algorithm. Thus at this stage, the vertex i + 1 has already been analyzed by the algorithm and the next vertex to be considered is vertex i. If Dom by child[ i] = true or In PD Set[ pi] = true, then the vertex i is totally dominated by S(i + 1) and therefore S(i + 1) totally dominates {i, i + 1 , i + 2 , . . . , n }. In this case, we let S(i) = S(i + 1) and Qi = Qi+1 and note that S(i) ⊆ Qi+1 = Qi, which implies that S(i) is a subset of a γpr -set of T , namely Qi. Hence we may assume that Dom by child[ i] = false and In PD Set[ pi] = false, for otherwise Property P (i)holds as desired. We now consider the γpr -set, Qi+1 , of T that contains the set S(i + 1). We note that the set Qi+1 exists by the inductive hypothesis. Some vertex, t, in Qi+1 must totally dominate vertex i.Thus either t is the parent of vertex i or a child of vertex i. Let t′ be the vertex paired with t in the set Qi+1 . We consider next the two possible outcomes of lines 5 and 10 when the vertex i is the current vertex considered. Case 1. The statements in line 5 hold; that is, • Dom by child[ i] = false, • In PD Set[ pi] = false, • pi̸ = 1, and In PD Set[ gi] = false. Thus the set S(i + 1) contains no child of vertex i, and neither pi nor gi belong to S(i + 1). According to lines 6 and 7, we have S(i) = S(i + 1) ∪ { pi, g i}.Suppose firstly that {pi, g i} ⊆ Qi+1 . In this case, we let Qi = Qi+1 and note that S(i) ⊆ Qi.Moreover since pi ∈ S(i), the set S(i) totally dominates the set {i, i + 1 , i + 2 , . . . , n }. Since Dom by child[ gi] = true in line 8, the array Dom by child is updated correctly. Hence, we may assume that pi /∈ Qi+1 or gi /∈ Qi+1 (or both pi /∈ Qi+1 and gi /∈ Qi+1 ). Suppose secondly that pi /∈ Qi+1 , implying that t is a child of i. Let Ti be the subtree of T rooted at the vertex i. By the inductive hypothesis, the set S(i + 1) totally dominates the set {i+1 , i +2 , . . . , n }. By supposition, Dom by child[ i] = false, and so no child of vertex i belongs to the set S(i+1). Thus the set S(i+1) totally dominates all vertices in the subtree Ti, except for the vertex i. By construction, the set S(i+1) is therefore a PD-set of Ti −i. Let S′ i = V (Ti)∩S(i+1), and let Q′ i = V (Ti) ∩ Qi+1 . Since S(i + 1) ⊂ Qi+1 and t ∈ Qi+1 \ S(i + 1), we note that S′ i ⊂ Q′ i ,implying that |S′ i | ≤ | Q′ i | − 2. If gi /∈ Qi+1 , then we let Qi = ( Qi+1 \ Q′ i ) ∪ (S′ i ∪ { pi, g i}). If gi ∈ Qi+1 , then we let Qi = ( Qi+1 \ Q′ i ) ∪ (S′ i ∪ { pi, i }). In both cases, S(i) ⊆ Qi. Further, the set Qi is a PD-set of cardinality |Qi| = |Qi+1 | − | Q′ i | + ( |S′ i | + 2) ≤ | Qi+1 | = γpr (T ), and is therefore a γpr -set of T . Hence if pi /∈ Qi+1 , then we have shown that the set S(i) totally dominates the set {i, i + 1 , i + 2 , . . . , n } and is contained in some γpr -set of T , namely the set Qi defined above. Suppose thirdly that pi ∈ Qi+1 and gi /∈ Qi+1 . In this case we can choose the vertex t to be the vertex pi, that is, t = pi. Let t′ be the vertex paired with t in the PD-set Qi+1 . Since gi /∈ Qi+1 ,the vertex t′ is a child of pi. Possibly, t′ = i. If t′ is a leaf, then we let Qi = ( Qi+1 { t′})∪{ gi} with pi and gi paired in Qi, and with all other pairings in Qi the same as the pairings in Qi+1 \ { t, t ′}.As before, S(i) ⊆ Qi and the set S(i) totally dominates the set {i, i + 1 , i + 2 , . . . , n }. Hence, we may assume that t′ is not a leaf. Let T ′ be the subtree of T rooted at the vertex t′, and let j be 6an arbitrary child of t′. We note that j ≥ i + 1, and so by the inductive hypothesis the set S(j)totally dominates all vertices in the subtree Tj rooted at vertex j. Since S(j) ⊆ S(i + 1), we infer that all vertices in T ′ are totally dominated by S(i + 1), except possibly for the vertex t′. Hence as before, we let Qi = ( Qi+1 \ { t′}) ∪ { gi} with pi and gi paired in Qi, to produce the desired result. Case 2. The statements in line 10 hold; that is, • Dom by child[ i] = false, • In PD Set[ pi] = false, • pi = 1 or pi̸ = 1 and In PD Set[ gi] = true. Thus, the set S(i + 1) does not contain the parent pi of vertex i and contains no child of vertex i. However, either pi = 1 or pi̸ = 1 and In PD Set[ gi] = true. By the inductive hypothesis, S(i + 1) ⊆ Qi+1 . In particular, if pi̸ = 1, then we infer that gi ∈ Qi+1 . According to lines 11–14, we have S(i) = S(i + 1) ∪ { pi, i 1} where i1 is the child of parent[ i] of largest label such that In PD Set[ i1] = false. Possibly, i1 = i.Suppose firstly that {pi, i 1} ⊆ Qi+1 . In this case, we let Qi = Qi+1 and note that S(i) ⊆ Qi.Moreover since pi ∈ S(i), the set S(i) totally dominates the set {i, i + 1 , i + 2 , . . . , n }. Since Dom by child[ pi] = true in line 14, the array Dom by child is updated correctly. Hence, we may assume that pi /∈ Qi+1 or i1 /∈ Qi+1 (or both pi /∈ Qi+1 and i1 /∈ Qi+1 ). Suppose secondly that pi /∈ Qi+1 , implying that t is a child of i. Let Ti be the subtree of T rooted at the vertex i. By the inductive hypothesis, the set S(i + 1) totally dominates the set {i + 1 , i + 2 , . . . , n }. By supposition, no child of vertex i belongs to the set S(i + 1). Thus the set S(i + 1) totally dominates all vertices in the subtree Ti, except for the vertex i. We proceed now analogously as in Case 1. Adopting our notation in Case 1, let S′ i = V (Ti) ∩ S(i + 1) and Q′ i = V (Ti)∩Qi+1 . In this case, |S′ i | ≤ | Q′ i |− 2. If i1 /∈ Qi+1 , then we let Qi = ( Qi+1 \Q′ i )∪(S′ i ∪{ pi, i 1}). If i1 ∈ Qi+1 , then we let Qi = ( Qi+1 \ Q′ i ) ∪ (S′ i ∪ { pi, i }). In both cases, S(i) ⊆ Qi, where Qi is a γpr -set of T .Suppose thirdly that pi ∈ Qi+1 and i1 /∈ Qi+1 . In this case we choose the vertex t to be the vertex pi, that is, t = pi. Let t′ be the vertex paired with t in the PD-set Qi+1 .Suppose that the vertex t′ is a child of pi. Possibly, t′ = i. If t′ is a leaf, then we let Qi = ( Qi+1 \ { t′}) ∪ { i1} with pi and i1 paired in Qi, and with all other pairings in Qi the same as the pairings in Qi+1 \ { t, t ′}. As before, S(i) ⊆ Qi and the set S(i) totally dominates the set {i, i + 1 , i + 2 , . . . , n }. Hence, we may assume that t′ is not a leaf. Let T ′ be the subtree of T rooted at the vertex t′, and let j be an arbitrary child of t′. We note that j ≥ i + 1, and so by the inductive hypothesis the set S(j) totally dominates all vertices in the subtree Tj rooted at j.Since S(j) ⊆ S(i + 1), we infer that all vertices in T ′ are totally dominated by S(i + 1), except possibly for the vertex t′. Hence as before, we let Qi = ( Qi+1 \ { t′}) ∪ { i1} with pi and i1 paired in Qi, to produce the desired result. Hence we may assume that the vertex t′ cannot be chosen to be a child of pi, implying that t′ = gi. According to our algorithm, since gi ∈ Qi+1 and pi /∈ S(i + 1), the vertex gi was added to the set S(i + 1) when a grandchild j of gi was considered in line 5 of the algorithm for some j ≥ i + 1. In this case, denoting the parent of vertex j by pj , and so pj = parent[ j], our tree algorithm added to the set S(j +1) the vertices pj and gi to produce the set S(j) upon completion 7of line 14 in our tree algorithm with the value j. By construction of the set S, we note that S(j) ⊆ S(i + 1), and so {pj , g i} ⊆ Qi+1 .By assumption, the vertices t = pi and t′ = gi are paired in Qi+1 . Let p′ j be the vertex paired with pj in the set Qi+1 . Since the parent, gi, of vertex pj is paired with vertex pi, the vertex p′ j is a child of pj . Let Tj be the subtree of T rooted at the vertex j. By the inductive hypothesis, the set S(j), which is contained in the set S(i + 1), totally dominates all descendants of the vertex j,implying that the vertex p′ j is not needed to totally dominate any descendant of the vertex j.Hence, the vertex p′ j is needed only to partner the vertex pj . We let Qi = ( Qi+1 \ { gj }) ∪ { i1},where the vertices i1 and pi are paired and the vertices pj and gi are paired and where all other pairing of vertices in Qi+1 remain unchanged. The resulting set Qi is a PD-set of T satisfying |Qi| = |Qi+1 |. Furthermore, S(i) ⊆ Qi. Thus, Qi is a γpr -set of T containing the set S(i). Thus, property P (i) also holds in Case 2. By Cases 1 and 2, property P (i) holds for all i = n, n − 1, n − 2, . . . , 2, by induction. In particular, property P (2) holds, and so the set S(2) totally dominates the set {2, 3, . . . , n }.Moreover, the set S(2) ⊆ Q2 for some γpr -set Q2 of T . Thus, S(2) is a subset of an optimal solution Q2, and S(2) totally dominates all vertices in G, except possibly for vertex 1. Therefore if vertex 1 is totally dominated by S(2), then S(2) = Q2 and S(2) is an optimal solution. In this case, we take Q1 = Q2 = S2, and the desired result follows. Hence we may assume that vertex 1 is not totally dominated by S(2). In this case, some vertex, z, in Q2 must totally dominate vertex 1. Thus, z is a child of vertex 1. Since z / ∈ S(2) and both |S(2) | and |Q2| are even, we infer that |S(2) | ≤ | Q2| − 2. We now let Q1 = S(2) ∪ { 1, 2} with the vertices 1 and 2 paired in Q1 and with all other pairing in S(2) unchanged. The resulting set Q1 is a PD-set of T . We infer that |Q2| = γpr (T ) ≤ | Q1| = |S(2) | + 2 ≤ | Q2| = γpr (T ), and so we must have equality throughout this inequality chain. In particular, |Q1| = γpr (T ), implying that Q1 is a γpr -set of T . Furthermore, S(1) ⊆ Q1. Thus, Q1 is a γpr -set of T containing the set S(1). Thus, property P (1) holds. Since S(1) is a PD-set of T and |S(1) | ≤ | Q1| = γpr (T ), the set S(1) is an optimal solution, that is, S(1) is a γpr -set of T . Since S = S(1), our algorithm TREE PAIRED DOMINATION does indeed find an optimal solution. This completes the proof of Theorem 1. We remark that the time complexity of the algorithm is O( n) for trees of order n. When we run our algorithm on the rooted tree T in Figure 1 the following steps will be performed, yielding the γpr -set {12 , 11 , 8, 7, 6, 5, 4, 3, 2, 1} as a minimum PD-set in T . In particular, we note that γpr (T ) = 10. 3 Paired domination in random trees In this section, we are interested in the limiting distribution of paired domination in random trees of order n as n → ∞ . The random tree model we have in mind is the so-called conditioned Galton–Watson tree , which forms a general model that includes many combinatorial models as special cases. We assume that all trees are rooted and ordered, i.e., the order of the root branches matters. Given a nonnegative integer-valued random variable ξ, the Galton–Watson tree T is a random 8i action i action 15 In PD Set = In PD Set = true 7 none 14 none 6 none 13 In PD Set = In PD Set = true 5 none 12 none 4 none 11 In PD Set = In PD Set = true 3 none 10 In PD Set = In PD Set = true 2 none 9 In PD Set = In PD Set = true 1 none 8 none Table 1: Algorithm TREE PAIRED DOMINATION implemented on the tree T in Figure 1 ordered rooted tree generated by the following process: Begin with a root vertex and create a certain number of children according to ξ. Each child then independently generates a number of children according to an independent copy of ξ. This process continues for each newly generated vertex until all vertices in the tree have been processed. Note that in general, such a process may not stop in finite time. Here, we consider only critical Galton–Watson trees where E(ξ) = 1. Furthermore, we assume throughout that • Pr( ξ = 0) > 0, and • gcd {i | Pr( ξ = i) > 0} = 1. Under these conditions, it is well known that T is finite almost surely and that Pr( |T | = n) > 0for sufficiently large n.The process above defines a probability distribution on the set of finite rooted ordered trees, where, for a given rooted tree T ,Pr( T = T ) = Y j≥0 Pr( ξ = j)Dj (T ), and Dj (T ) denotes the number of vertices in T with outdegree j. This induces a probability distribution on the set of rooted trees of order n by conditioning T to have exactly n vertices. The tree generated under this conditioning is called the conditioned Galton–Watson tree and is denoted by Tn. Many models of combinatorial trees can be obtained in this way. • Plane trees : Among all rooted, unlabelled, plane (ordered) trees of order n, pick a random tree where each tree is equally likely. This model is equivalent to the conditioned Galton– Watson tree with offspring distribution ξ ∼ Geo( 12 ). • Binary trees : A plane binary tree is a rooted, unlabelled plane tree where each vertex has outdegree at most two. The uniform binary tree model is equivalent to the conditioned Galton–Watson tree with offspring distribution ξ ∼ Bin(2 , 12 ). • Rooted labelled trees : Pick one tree uniformly at random among all rooted unordered la-belled trees of order n. This model also produces a random uniform Cayley tree of order n (by simply ignoring the root) and is equivalent to the conditioned Galton–Watson tree with offspring distribution ξ ∼ Pois(1). 9We are now ready to state the main result of this section. Theorem 2. Let T be the Galton–Watson tree with offspring distribution ξ such that E(ξ) = 1 and 0 < Var( ξ) < ∞. Let Tn denote the corresponding conditioned Galton–Watson tree of order n. Then, there exist constants μpr > 0 and σpr > 0 such that as n → ∞ , Eγpr (Tn) = μpr n + o(√n) and γpr (Tn) − μpr nσpr √n d → N (0 , 1) . Table 2 shows the numerical values of the constant μpr for the three combinatorial tree models mentioned above. ξ μpr Binary trees Bin(2 , 1/2) 0.5255 Plane trees Geo(1 /2) 0.4747 Labelled trees Pois(1) 0.5177 Table 2: Numerical values for μpr .The proof of Theorem 2 is carried out in several steps, which make use of the algorithm described in the previous section. When we run the algorithm with an input tree T , we label each vertex as B, F , R, or P according to the following rules: • A vertex i is labelled B if, when considering i (in the algorithm), both In PD Set[ i] and Dom by child[ i] are false. • A vertex i is labelled F if, when considering i, In PD Set[ i] = false and Dom by child[ i] = true. • A vertex i is labelled R if, when considering i, In PD Set[ i] = true and none of its children is labelled R. • A vertex i is labelled P if, when considering i, In PD Set[ i] = true and at least one of its children is labelled R.We can also incorporate this vertex-labelling into the algorithm by inserting the following lines between Lines 4 and 5, and also between Lines 14 and 15, of Algorithm TREE PAIRED DOMI-NATION: Additional Code: If ( In PD Set[ i] = false and Dom by child[ i] = false ) Then {ℓ[i] = B} If ( In PD Set[ i] = false and Dom by child[ i] = true ) Then {ℓ[i] = F } Elseif ( for every child j of i, ℓ(j)̸ = R )10 Then {ℓ[i] = R} Else Then {ℓ[i] = P } Since we have introduced new labels for the vertices, we shall refer to the numerical labels that we considered previously as ranks, e.g., the root has rank 1. At the end of the modified algorithm, each vertex of T is assigned a unique label: B, F , R, or P (see the example in Figure 2 for illustration). We also remark that no two vertices labelled R are adjacent to each other. The next lemma shows that the label of each vertex can be determined solely by the labels of its children. B F F P F P R P R P R B R B B B B R B Figure 2: A tree with labelled vertices Lemma 1. If the vertices of a tree T are labelled according to the rules above, then for every v in T we have • v is labelled B if and only if v is a leaf or every child of v is labelled F , • v is labelled F if and only if v has at least one child labelled P and all the other children of v are labelled F , • v is labelled R if and only if v has at least one child labelled B and all the other children of v are labelled P or F , • v is labelled P if and only if v has at least a child labelled R.Proof. For a given rooted tree T , we label the vertices of T in two ways: according to the original rules and according to the rules in the lemma. Assume, by contradiction, that these give two different labellings of T . Let v be the vertex with the highest rank (farthest from the root) such that the labelling given by the original definition differs from the labelling given in the statement of the lemma. Note that v cannot be a leaf, since leaves are labelled B in both labellings. Thus, we may assume from now on that v is an interior vertex. There are then different cases to consider: • Assume that the statement of the lemma gives v the label B. This means that all children of v are labelled F . Since both statements agree on the labelling of the children of v, the 11 algorithm would have passed through each of these children without changing any of the vertex states. Additionally, no grandchildren of v are labelled B, since this would change the In PD Set state of a child of v to true. Thus, by the time v is considered by the algorithm, both Dom by child[ v] and In PD Set[ v] remain false. Therefore, the definition would also give v the label B. • Assume that the statement of the lemma gives v the label F . This means that at least one of its children is labelled P , and the rest are labelled F (by both rules). This implies that when v is considered by the algorithm, Dom by child[ v] = true. It remains to show that In PD Set[ v] is false. Initially, In PD Set[ v] is set to false. If In PD Set[ v] has been changed to true before v has been considered by the algorithm, then v must have a grandchild labelled B. Let w be such a B-grandchild of v with the highest rank. Then, the parent of w will be labelled R (by both rules). This is a contradiction since no child of v is labelled R. • Assume that the statement of the lemma gives v the label R. Then, v has some children labelled B and the rest are labelled P or F (by both rules). It is clear that no child is labelled R. Let w be the B-child of v with the highest rank. By the time the algorithm considers w, both v and its parent have In PD Set and Dom by child set to false. So, after considering w, In PD Set[ v] = true. Hence, v will also be given the label R by the definition. • Finally, assume that the statement of the lemma gives v the label P . Then, v must have a child labelled R, which in turn must have a child labelled B. Let w1 be the R-child of v with the highest rank, and let w2 be the B-child of w1 with the highest rank. When w2 is considered by the algorithm, both In PD Set[ w1] and In PD Set[ v] are set to true. Therefore, v is also labelled P by the definition. Hence, both the original rules and the rules in the lemma give the same label to v, which is a contradiction. It is useful to partition the class of rooted plane trees T into four subclasses: TB , TF , TR, and TP , according to the label of the root. For instance, a tree in TB has its root vertex labelled B.Let Φ( T ) be the number of vertices labelled R in T after running the algorithm with the vertex labelling described above. By convention, we assume that a tree consisting of a single vertex belongs to TB ; hence, Φ( •) = 0. Lemma 2. For every tree T of order at least 2, we have Φ( T ) = d X k=1 Φ( Tk) + φ(T ) (1) where T1, T 2, . . . , T d are the root-branches of T , and φ(T ) = ( 1 if T ∈ TR 0 otherwise . Moreover, we have γpr (T ) = 2Φ( T ) + ( 2 if T ∈ TB 0 otherwise . 12 Proof. Since Φ( T ) counts the number of R-vertices in T after running the algorithm, the first part of the lemma is obvious, as we only need to sum the number of R-vertices from all the branches and add the root of T if it is labelled R.The second part of the lemma is proved in a few steps. Let us first prove the following lower bound: γpr (T ) ≥ 2Φ( T ). (2) To see this, notice that the γpr -set produced by the algorithm contains all the R-vertices. In addition, the R-set is independent by definition of the label R. Each of these R-vertices is paired with another vertex that is not labelled R in the γpr -set, so the claim is proved. Next, let us denote by S the set of vertices labelled R or P . We claim that S dominates T ,except possibly the root. To see this, assume that there is a vertex v different from the root that is not dominated by S. This implies that ℓ(v) /∈ { R, P } and no neighbor of v is labelled P or R. In particular, the labels of the children of v are either B or F . Thus, we have the following possible cases: • If v has a B-child, then In PD Set[ v] = true. So, by definition, ℓ(v) must either be R or P ,which is a contradiction. • If all children of v are labelled F , then ℓ(v) = B. By Lemma 1, the parent of v cannot be labelled B or F . Therefore, the parent of v has to be labelled P or R, which is again a contradiction. We can then conclude that the set S of R and P vertices dominates T , except possibly the root. Let us now construct a PD-set from S. Consider the set S∗ in the following way: we go from the top to the bottom of T , and at each P -vertex, we pair it with one of its R-children, which we know exists by Lemma 1. Then, for the remaining R-vertices which have not yet been paired, pair each with one of its B-children (which we also know exists), and add this selected B-child to S∗.We already know that S∗ dominates T , except possibly the root, which we will denote by r.So, we must separately consider the cases where the root is dominated or not. Observe first that the root is not dominated by S∗ if and only if the root is labelled B. To see this, if the root r is not dominated by S∗, then none of its children is labelled R or P . Moreover, the root cannot have a child labelled B either, since otherwise, it would be labelled R according to Lemma 1. This means that all the children are labelled F , which implies that ℓ(r) = B. Conversely, if ℓ(r) = B, then all its children are labelled F by Lemma 1, so they cannot be in S∗. Thus, r is not dominated by S∗. Now consider the following two cases: • If the root r is dominated by S∗ (equivalently, ℓ(r)̸ = B), then S∗ is a PD-set of T .Therefore, γpr (T ) ≤ | S∗| = 2Φ( T ). This is in fact an equality by Equation (2). This proves the case T / ∈ TB . • If the root is not dominated by S∗ (equivalently, ℓ(r) = B), then clearly none of the children of the root is in S∗. Therefore, we can add the root and one of its children to S∗ to obtain a PD-set of T . We obtain γpr (T ) ≤ 2Φ( T ) + 2 . 13 We claim that we also have γpr (T ) ≥ 2Φ( T ) + 2 . Indeed, suppose to the contrary that this is not the case, i.e., γpr (T ) = 2Φ( T ). Then, let us take the γpr -set from the algorithm, with an appropriate pairing of the elements. In this case, since the R-vertices are independent, each pair of this γpr -set must have one R-vertex. Now, since it is a dominating set, it must contain a child of the root, say w. This means that ℓ(w) = R or w has a child labelled R. In either case, ℓ(w) cannot be F , which is in contradiction with ℓ(r) = B (according to Lemma1). This completes the proof of the lemma. Tree parameters that satisfy a recursion like the one in Equation (1) are called additive. In our case, the function φ is referred to as the associated toll function of the additive parame-ter Φ. There are many results in the literature concerning the limiting distributions of additive parameters of random rooted trees; see, for example, [13, 21, 24] and the references therein. The result relevant to our case can be found in [21, Theorem 1]. For completeness, we will state this theorem in full. But before we do so, let us recall some background and notation. We consider F to be an additive tree functional with a toll function f , which means that for every rooted tree T , we have F (T ) = d X k=1 F (Tk) + f (T ). where T1, T 2, . . . , T d are the root-branches of T . We also assume that the toll function f is bounded. For a tree T and a positive integer M , let T (M ) denote the tree consisting of all vertices whose distance to the root is at most M . According to Kesten , we define the infinite size-biased Galton–Watson tree ˆT in the following way: Starting from an infinite path beginning at the root, we add to each vertex on the path and each side of the path a random number of additional branches, each of which is an independent copy of T . The random infinite tree ˆT plays an important role in the study of conditioned Galton–Watson trees because it is known that the truncated random tree T (M ) n converges in distribution to ˆT (M ) for every fixed M , more details on this can be found in . The distribution of ˆT (M ) is given by the following formula: Pr( ˆT (M ) = T ) = wM (T ) Pr( T (M ) = T ), where wM (T ) denotes the number of vertices at distance M from the root in T , see [12, Equa-tion (5.11)]. The above equation defines a probability distribution if E(ξ) = 1 since in this case we can show that E(wM (T )) = 1. Theorem 3 () . Let Tn be a conditioned Galton–Watson tree of order n with offspring distri-bution ξ, where ξ satisfies E(ξ) = 1 and 0 < σ 2 := Var( ξ) < ∞. Consider an additive parameter F with a bounded toll function f . Furthermore, assume that there exists a sequence (pM )M ≥1 of positive numbers with pM → 0 as M → ∞ such that • for every M, N ∈ { 1, 2, . . . }, such that N ≥ M E f ( ˆT (M )) − E  f ( ˆT (N )) | ˆT (M ) ≤ pM , (3) 14 and • there is a sequence of positive integers (Mn)n≥1 such that for large enough n, E f (Tn) − f  T (Mn) n  ≤ pMn . (4) If an := n−1/2(np Mn + M 2 n ) satisfies lim n→∞ an = 0 , and ∞ X n=1 an n < ∞, (5) then F (Tn) − μn √n d → N (0 , γ 2) (6) where μ = Ef (T ), for some 0 ≤ γ < ∞. Moreover, we have E(F (Tn)) = μn + o(√n ), and Var F (Tn) = γ2n + o(n). (7) In order to prove Theorem 2, we need to show that the toll function φ associated with the functional Φ defined in Lemma 2 satisfies the conditions of Theorem 3. This is our main goal in the proof. The conditions of Theorem 3 essentially say that there are not “too many” trees T such that f (T )̸ = f (T (M )). For our cases, this means that if we run our algorithm (twice), once with input T and once with T (M ), then most of the time the label of the root remains unchanged. To make this precise, we consider the following set of trees for M > 3: BM = n T possibly infinite : ∃N > M, ℓ  root(T (N) ) ̸ = ℓ  root(T (M) ) o , where ℓ(root(T)) indicates the label of the root of T , i.e., B, F , R or P , after running our algorithm with input T . Observe that there exists a tree τ0 of height 3 with the property that Pr( T = τ0) > 0 and that for every finite T such that T (3) = τ0, ℓ(root(T)) = ℓ  root(T (3) )  . The existence of a tree τ0 with the above property is crucial in the proof of Theorem 2, so let us explicitly construct an example of such a tree. We define d0 := min {d ≥ 2 : Pr( ξ = d)̸ = 0 }, (8) whose existence follows from our assumptions on ξ. Then, the tree τ0 described in Figure 3, where each of the four internal vertices has outdegree d0, satisfies the desired properties. It is easy to see that if we run the algorithm on any extension of τ0, then the root will always be labelled P since the root of the left-most branch will be labelled R. Lemma 3. There exists a constant c1 ∈ (0 , 1) such that Pr( T ∈ B M ) = O(cM 1 ) as M → ∞ . 15 d0 d0 − 2 · · · · · · · · · · · · Figure 3: Fixed tree τ0 of height 3. Proof. Observe, by definition of τ0, that for any tree T to be in BM , we must have T (3) ̸ = τ0.Hence, we can write Pr( T ∈ B M ) = X T̸=τ0 Pr( T (3) = T ) Pr( T ∈ B M |T (3) = T ). For any tree T , recall that w3(T ) denotes the number of vertices at distance 3 from the root. From the definition of T , given the event {T (3) = T }, the rest of T consists of w3(T ) independent copies of T . On the other hand, if we also have T ∈ B M , then at least one of those w3(T ) branches of T is an element of BM −3 (if M > 3). Thus, we have Pr( T ∈ B M |T (3) = T ) ≤ w3(T ) Pr( T ∈ B M −3). Therefore, Pr( T ∈ B M ) ≤ Pr( T ∈ B M −3) X T̸=τ0 Pr( T (3) = T )w3(T )= Pr( T ∈ B M −3)  E(w3(T )) − w3(τ0) Pr( T = τ0)  . It is clear that the term in brackets in the last expression is independent of M and is nonnegative. Moreover, since we know that E(w3(T )) = 1 and w3(τ0) Pr( T = τ0) > 0, this term is also strictly less than 1. Thus, the lemma is proved by iteration. Lemma 4. There exists a constant c2 ∈ (0 , 1) such that Pr( ˆT ∈ B M ) = O(cM 2 ) as M → ∞ .Proof. The proof follows the same lines as the proof of the previous lemma. We have Pr( ˆT ∈ B M ) = X T̸=τ0 Pr( ˆT (3) = T ) Pr( ˆT ∈ B M | ˆT (3) = T ). Given the event { ˆT (3) = T }, the rest of ˆT consists of w3(T ) independent random trees, where one is a copy of ˆT and the rest are copies of T . Note that these branches are ordered, and the position of the copy of ˆT in this order is uniform. Hence, we have Pr( ˆT ∈ B M | ˆT (3) = T ) ≤ Pr( ˆT ∈ B M −3) + ( w3(T ) − 1) Pr( T ∈ B M −3). 16 Thus, we deduce that Pr( ˆT ∈ B M ) ≤  X T̸=τ0 Pr( ˆT (3) = T )  Pr( ˆT ∈ B M −3) + E(w3( ˆT ) − 1) Pr( T ∈ B M −3). We know that E(w3( ˆT ) − 1) is finite (see for example [11, Lemma 2.3]); hence, by Lemma 3, the second term on the right-hand side is bounded by O(cM 1 ). On the other hand, 0 ≤ X T̸=τ0 Pr( ˆT (3) = T ) = 1 − Pr( ˆT (3) = τ0) < 1. Once again, the lemma is proved by iteration. We are now ready to prove our main theorem. Proof of Theorem 2. Observe that if T / ∈ B M , then for every N ≥ M , φ(T (N )) = φ(T (M )). So, since the value of φ can only be 0 or 1, we have φ( ˆT (M )) − E  φ( ˆT (N )) | ˆT (M ) ≤ 1{ ˆT ∈B M }. Using Lemma 4, we obtain E φ( ˆT (M )) − E  φ( ˆT (N )) | ˆT (M ) ≤ Pr( ˆT ∈ B M ) ≪ cM 2 . (9) By the same argument, we also have E φ(Tn) − φ(T (M ) n ) ≤ Pr( Tn ∈ B M ) ≤ Pr( T ∈ B M )Pr( |T | = n) . Based on our assumptions on ξ, it is well known that Pr( |T | = n) = Θ( n−3/2); see Janson [13, Equation (4.13)], which also refers to Kolchin . So, by Lemma 3, we have E φ(Tn) − φ(T (M ) n ) = O(n3/2cM 1 ). (10) If we choose Mn := (log n)2 and pM := cM 3 , where max {c1, c 2} < c 3 < 1, then it is not difficult to verify that all conditions of Theorem 3 are satisfied. Therefore, we obtain the asymptotic normality of Φ( Tn), with the estimates for its mean and variance exactly as stated in Theorem 3. Furthermore, the same result follows for γpr (Tn), since by Lemma 2, we have |2Φ( Tn) − γpr (Tn)| ≤ 2. Hence, the constant term μpr in Theorem 2 is equal to 2 E(φ(T )). On the other hand, we also have Var( γpr (Tn)) = σ2pr n + o(n). It remains to show that the constant σ2pr is nonzero, to guarantee a nondegenerate Gaussian limit law for γpr (Tn). This follows from an argument already used in the proof of [21, Theorem 10]. By the same reasoning, it is enough to show that there exist two finite trees, τ1 and τ2, of the same size which satisfy the following properties: 17 • Pr( T = τi) > 0 for i ∈ { 1, 2}, • γpr (τ1)̸ = γpr (τ2), and • ℓ(root( τ1)) = ℓ(root( τ2)) . To briefly explain the idea, if we condition on the structure obtained by deleting every occur-rence of τ1 or τ2 as a fringe subtree of Tn, then γpr (Tn) is equal to a fixed term plus a constant (equal to |γpr (τ1)−γpr (τ2)|) times a sum of independent, nondegenerate Bernoulli variables, where the number of these Bernoulli variables is exactly the number of occurrences of τ1 and τ2 in Tn.Since, on average, the number of such occurrences in Tn is ≫ n (see, for example, [13, Theorem 1.3] which refers to among others), the law of total variance implies that Var( γpr (Tn)) ≫ n.Now, to construct such trees τ1 and τ2, let d0 be as defined in Equation (8). Then the two full d0-ary trees shown in Figure 4 satisfy the second property. We denote these trees, from left to right in Figure 4, by t1 and t2, where the dots indicate leaves that need to be added to complete the trees as full d0-ary trees. It is clear that the paired domination numbers of t1 and t2 are 4 and 6, respectively, with the γpr -set consisting of the black-coloured vertices in the figure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 4: Two trees, t1 and t2, of the same size with different paired domination numbers. Finally, we obtain the trees τ1 and τ2 by attaching t1 and t2 (respectively) to the rightmost leaf at level 3 of the tree τ0 shown in Figure 3. It is straightforward to verify that the trees τ1 and τ2 constructed in this way satisfy all the desired properties. This completes the proof. We conclude this section with a method for computing the constant μpr and some further discussion. From the main theorem, we have μpr = 2 E(φ(T )), and since φ is an indicator function for TR, we have μpr = 2 Pr( T ∈ TR). (11) It is convenient to define xX := Pr( T ∈ TX ) for each X ∈ { B, F, R, P }. Then, for each X, we can write xX = ∞ X k=0 Pr( ξ = k) Pr( T ∈ TX | deg T = k). Applying the characterisations in Lemma 1 , we immediately deduce that Pr( T ∈ TB | deg T = k) = Pr( T ∈ TF )k, Pr( T ∈ TF | deg T = k) = (Pr( T ∈ TP ) + Pr( T ∈ TF )) k − Pr( T ∈ TF )k, Pr( T ∈ TR| deg T = k) = (Pr( T ∈ TB ) + Pr( T ∈ TP ) + Pr( T ∈ TF )) k − (Pr( T ∈ TP ) + Pr( T ∈ TF )) k , and Pr( T ∈ TP | deg T = k) = 1 − (Pr( T ∈ TB ) + Pr( T ∈ TP ) + Pr( T ∈ TF )) k . 18 Let us denote by g the probability generating function of ξ, i.e., g(x) := ∞ X k=0 Pr( ξ = k)xk, which converges for every x in the interval [0 , 1] with g(1) = 1. Then, from the above equations, the constants xB , xF , xR, and xP satisfy the following system of equations:  xB = g(xF ) xF = g(xF + xP ) − g(xF ) xR = g(xB + xF + xP ) − g(xF + xP ) xP = 1 − g(xB + xF + xP ). (12) Since Var( ξ) < ∞ implies that g(x) is at least twice differentiable on the interval (0 , 1), and also that g′(x) = E(ξ) = 1, we can use these facts to show that the above system of equations has a unique solution (e.g., by showing that the Jacobian determinant is nonzero). Then, such a solution can be numerically computed for specific examples, such as binary trees, plane trees, and labelled rooted trees, as shown in Table 3. g(x) xB xF xR xP Binary trees (1 + x)2/4 0.3347 0.1571 0.2627 0.2455 Plane trees (2 − x)−1 0.5145 0.0563 0.2374 0.1918 Labelled trees exp( x − 1) 0.4085 0.1046 0.2589 0.2281 Table 3: Numerical solutions of Equation (12). In the case of labelled trees, each Cayley tree on the vertex set {1, 2, . . . , n } corresponds to n distinct labelled rooted trees, determined by the choice of the root. Therefore, choosing a random Cayley tree on the vertex set {1, 2, . . . , n } uniformly is equivalent to selecting a labelled rooted tree and then forgetting the root. As a result, the distribution of the paired domination number of a random Cayley tree of n is also asymptotically normal, with mean and variance as stated in Theorem 2. Figure 5 shows a histogram of paired domination numbers of 20000 randomly (and indepen-dently) sampled Cayley trees of size 10000. The simulation was run using SageMath . The horizontal axis represents the actual value of the paired domination number. It is, in fact, quite common to obtain central limit theorems for various graph-theoretic pa-rameters in random trees. In Banderier et al. , it is shown that the independence number, the path covering number, and the size of the kernel all satisfy a central limit theorem for simply generated trees. In Fuchs et al. , the same results were obtained for the independence number, the domination number, and the clique cover number in random recursive trees and binary search trees, which are other known models of random trees. Similar work on the independence number, the domination number, and the total domination number in conditioned Galton–Watson trees was conducted in the Master’s thesis of Rakotoniaina , supervised by the second author. It is well known that simply generated trees and conditional Galton–Watson trees are essen-tially equivalent, see [4, Section 1.2.7]. Hence, it might be possible to use the generating function 19 Figure 5: Histogram from 20000 random samples of Cayley trees of order n = 10000 approach as in Banderier et al. to prove Theorem 2. This is based on a method given in Dr-mota . However, to use such an analytic-based method, one needs to assume that all moments of ξ are finite (as implied by [2, Assumption 1]), and not just the second moment that we assumed here. One advantage of the analytic approach is that it can provide an explicit expression for the constant in the variance. In general, there is no guarantee that such an expression will be useful. For the parameters considered in , it is not even known if these constants are nonzero, see the remark on [2, Page 49]. Here, we chose to use a probabilistic approach. While we cannot provide an explicit formula for the constant in the variance, we are at least able to prove that, for our parameter, this constant is never zero, using an argument already employed in . Hence, we guarantee a nondegenerate Gaussian limit law. The same argument can certainly be used to address the problem stated in the remark on [2, Page 49]. For future work, it would also be interesting to explore other models of random trees. The results in Fuchs et al. were based on a general result in Holmgren and Janson . Since the toll function φ for the paired domination number is bounded, the same theorem applies in our case as well for the binary search trees and the recursive trees. However, more work needs to be done for other models of random trees, such as d-ary increasing trees or even P´ olya trees. The general results in [22, 24] for these models do not apply to the paired domination number or most of the graph-theoretic parameters mentioned above. The SageMath code related to this project is available in the GitHub repository . 4 Acknowledgements The first author, Michael A. Henning, acknowledges support from the CoE-MaSS under graph number 2025-014-GRA-Structural Graph Theory. Opinions expressed and conclusions arrived at 20 by the first author are those of the author and not necessarily to be attributed to the CoE-MaSS. References David Aldous. Asymptotic Fringe Distributions for General Families of Random Trees. The Annals of Applied Probability , 1(2):228 – 266, 1991. Cyril Banderier, Markus Kuba, and Alois Panholzer. Analysis of three graph parameters for random trees. Random Structures Algorithms , 35(1):42–69, 2009. W. J. Desormeaux, T. W. Haynes, and M. A. Henning. Paired domination in graphs. In T. W. Haynes, S. T. Hedetniemi, and M. A. Henning, editors, Topics in Domination in Graphs , volume 64 of Developments in Mathematics , pages 31–77. Springer, Cham, 2020. Michael Drmota. Random trees . SpringerWienNewYork, Vienna, 2009. An interplay between combinatorics and probability. Michael Fuchs, Cecilia Holmgren, Dieter Mitsche, and Ralph Neininger. A note on the independence number, domination number and related parameters of random binary search trees and random recursive trees. Discrete Appl. Math. , 292:64–71, 2021. T. W. Haynes, S. T. Hedetniemi, and M. A. Henning, editors. Topics in Domination in Graphs , volume 64 of Developments in Mathematics . Springer, Cham, 2020. T. W. Haynes, S. T. Hedetniemi, and M. A. Henning, editors. Structures of Domination in Graphs , volume 66 of Developments in Mathematics . Springer, Cham, 2021. T. W. Haynes, S. T. Hedetniemi, and M. A. Henning, editors. Domination in Graphs: Core Concepts . Springer Monographs in Mathematics. Springer, Cham, 2023. M. A. Henning and A. Yeo. Total Domination in Graphs . Springer Monographs in Mathe-matics. Springer, Cham, New York, 2013. Cecilia Holmgren and Svante Janson. Limit laws for functions of fringe trees for binary search trees and random recursive trees. Electron. J. Probab. , 20:no. 4, 51, 2015. Svante Janson. Random cutting and records in deterministic and random trees. Random Structures Algorithms , 29(2):139–179, 2006. Svante Janson. Simply generated trees, conditioned Galton-Watson trees, random alloca-tions and condensation. Probab. Surv. , 9:103–252, 2012. Svante Janson. Asymptotic normality of fringe subtrees and additive functionals in condi-tioned Galton-Watson trees. Random Structures Algorithms , 48(1):57–101, 2016. Harry Kesten. Subdiffusive behavior of random walk on a random cluster. Ann. Inst. H. Poincar´ e Probab. Statist. , 22(4):425–487, 1986. Valentin F. Kolchin. Random Mappings . Nauka, Moscow, 1984. English translation: Opti-mization Software, New York, 1986. 21 R. C. Laskar, J. Pfaff, S. M. Hedetniemi, and S. T. Hedetniemi. On the algorithmic com-plexity of total domination. SIAM J. Algebraic Discrete Methods , 5:420–425, 1984. S. L. Mitchell, E. J. Cockayne, and S. T. Hedetniemi. Linear algorithms on recursive repre-sentations of trees. J. Comput. System Sci. , 18:76–85, 1979. H. Qiao, L. Kang, M. Cardei, and D. Z. Du. Paired-domination of trees. J. Global Optim. ,25:43–54, 2003. Fameno Rakotoniaina. Parameters of a random rooted tree. Master’s thesis, Stellenbosch University, 2024. Dimbinaina Ralaivaosaona. ,2025. Last accessed: 2025-04-03. Dimbinaina Ralaivaosaona, Matas ˇSileikis, and Stephan Wagner. A central limit theorem for almost local additive tree functionals. Algorithmica , 82(3):642–679, 2020. Dimbinaina Ralaivaosaona and Stephan Wagner. A central limit theorem for additive func-tionals of increasing trees. Combin. Probab. Comput. , 28(4):618–637, 2019. The Sage Developers. SageMath, the Sage Mathematics Software System (Version 9.8) ,2023. . Stephan Wagner. Central limit theorems for additive tree parameters with small toll func-tions. Combin. Probab. Comput. , 24(1):329–353, 2015. 22
4164
https://www.unipamplona.edu.co/unipamplona/portalIG/home_34/recursos/01general/21082014/unidad_2_termo_ii.pdf
TRANSIENT HEAT CONDUCTION Mehmet Kanoglu Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Fundamentals of Thermal-Fluid Sciences, 3rd Edition Yunus A. Cengel, Robert H. Turner, John M. Cimbala McGraw-Hill, 2008SECOND UNIT SECOND UNIT 2 Objectives • Assess when the spatial variation of temperature is negligible, and temperature varies nearly uniformly with time, making the simplified lumped system analysis applicable • Obtain analytical solutions for transient one-dimensional conduction problems in rectangular, cylindrical, and spherical geometries using the method of separation of variables, and understand why a one-term solution is usually a reasonable approximation • Solve the transient conduction problem in large mediums using the similarity variable, and predict the variation of temperature with time and distance from the exposed surface • Construct solutions for multi-dimensional transient conduction problems using the product solution approach. 3 LUMPED SYSTEM ANALYSIS Interior temperature of some bodies remains essentially uniform at all times during a heat transfer process. The temperature of such bodies can be taken to be a function of time only, T(t). Heat transfer analysis that utilizes this idealization is known as lumped system analysis. A small copper ball can be modeled as a lumped system, but a roast beef cannot. 4 Integrating with T = Ti at t = 0 T = T(t) at t = t The geometry and parameters involved in the lumped system analysis. time constant 5 The temperature of a lumped system approaches the environment temperature as time gets larger. • This equation enables us to determine the temperature T(t) of a body at time t, or alternatively, the time t required for the temperature to reach a specified value T(t). • The temperature of a body approaches the ambient temperature Texponentially. • The temperature of the body changes rapidly at the beginning, but rather slowly later on. A large value of b indicates that the body approaches the environment temperature in a short time 6 Heat transfer to or from a body reaches its maximum value when the body reaches the environment temperature. The rate of convection heat transfer between the body and its environment at time t The total amount of heat transfer between the body and the surrounding medium over the time interval t = 0 to t The maximum heat transfer between the body and its surroundings 7 Criteria for Lumped System Analysis Lumped system analysis is applicable if When Bi 0.1, the temperatures within the body relative to the surroundings (i.e., T −T) remain within 5 percent of each other. Characteristic length Biot number 8 Small bodies with high thermal conductivities and low convection coefficients are most likely to satisfy the criterion for lumped system analysis. Analogy between heat transfer to a solid and passenger traffic to an island. When the convection coefficient h is high and k is low, large temperature differences occur between the inner and outer regions of a large solid. 9 Example: 10 Example: 11 Quiz: 12 TRANSIENT HEAT CONDUCTION IN LARGE PLANE WALLS, LONG CYLINDERS, AND SPHERES WITH SPATIAL EFFECTS We will consider the variation of temperature with time and position in one-dimensional problems such as those associated with a large plane wall, a long cylinder, and a sphere. Schematic of the simple geometries in which heat transfer is one-dimensional. Transient temperature profiles in a plane wall exposed to convection from its surfaces for Ti >T. 13 Nondimensionalized One-Dimensional Transient Conduction Problem 14 Nondimensionalization reduces the number of independent variables in one-dimensional transient conduction problems from 8 to 3, offering great convenience in the presentation of results. 15 Exact Solution of One-Dimensional Transient Conduction Problem 16 The analytical solutions of transient conduction problems typically involve infinite series, and thus the evaluation of an infinite number of terms to determine the temperature at a specified location and time. 17 Approximate Analytical and Graphical Solutions Solution with one-term approximation The terms in the series solutions converge rapidly with increasing time, and for > 0.2, keeping the first term and neglecting all the remaining terms in the series results in an error under 2 percent. 18 19 20 (a) Midplane temperature Transient temperature and heat transfer charts (Heisler and Grober charts) for a plane wall of thickness 2L initially at a uniform temperature Ti subjected to convection from both sides to an environment at temperature Twith a convection coefficient of h. 21 (b) Temperature distribution 22 (c) Heat transfer 23 24 25 The dimensionless temperatures anywhere in a plane wall, cylinder, and sphere are related to the center temperature by The specified surface temperature corresponds to the case of convection to an environment at Twith with a convection coefficient h that is infinite. 26 The fraction of total heat transfer Q/Qmax up to a specified time t is determined using the Gröber charts. 27 • The Fourier number is a measure of heat conducted through a body relative to heat stored. • A large value of the Fourier number indicates faster propagation of heat through a body. Fourier number at time t can be viewed as the ratio of the rate of heat conducted to the rate of heat stored at that time. The physical significance of the Fourier number 28 Example: 29 Example: 30 Example: 31 TRANSIENT HEAT CONDUCTION IN SEMI-INFINITE SOLIDS Schematic of a semi-infinite body. Semi-infinite solid: An idealized body that has a single plane surface and extends to infinity in all directions. The earth can be considered to be a semi-infinite medium in determining the variation of temperature near its surface. A thick wall can be modeled as a semi-infinite medium if all we are interested in is the variation of temperature in the region near one of the surfaces, and the other surface is too far to have any impact on the region of interest during the time of observation. For short periods of time, most bodies can be modeled as semi-infinite solids since heat does not have sufficient time to penetrate deep into the body. 32 Transient temperature distributions in a semi-infinite solid for three surfac conditions: constant surface temperature, constant surface heat flux, and surface convection 33 Transformation of variables in the derivatives of the heat conduction equation by the use of chain rule. Analytical solution for the case of constant temperature Ts on the surface error function complementary error function 34 Analytical solutions for different boundary conditions on the surface 35 Error function is a standard mathematical function, just like the sine and cosine functions, whose value varies between 0 and 1. 36 37 38 39 Variation of temperature with position and time in a semi-infinite solid initially at temperature Ti subjected to convection to an environment at T∞with a convection heat transfer coefficient of h. 40 Contact of Two Semi-Infinite Solids When two large bodies A and B, initially at uniform temperatures TA,i and TB,i are brought into contact, they instantly achieve temperature equality at the contact surface. If the two bodies are of the same material, the contact surface temperature is the arithmetic average, Ts = (TA,i+TB,i)/2. If the bodies are of different materials, the surface temperature Ts will be different than the arithmetic average. Contact of two semi-infinite solids of different initial temperatures. The interface temperature of two bodies brought into contact is dominated by the body with the larger kcp. EXAMPLE: When a person with a skin temperature of 35C touches an aluminum block and then a wood block both at 15C, the contact surface temperature will be 15.9C in the case of aluminum and 30C in the case of wood. 41 Example: 42 Example: L=0.3 m Wood Slab Ti = 25C Hot gases T= 550C x 0 43 Example: Soil Ti =10C Winds T=-10C 44 TRANSIENT HEAT CONDUCTION IN MULTIDIMENSIONAL SYSTEMS • Using a superposition approach called the product solution, the transient temperature charts and solutions can be used to construct solutions for the two-dimensional and three-dimensional transient heat conduction problems encountered in geometries such as a short cylinder, a long rectangular bar, a rectangular prism or a semi-infinite rectangular bar, provided that all surfaces of the solid are subjected to convection to the same fluid at temperature T, with the same heat transfer coefficient h, and the body involves no heat generation. • The solution in such multidimensional geometries can be expressed as the product of the solutions for the one-dimensional geometries whose intersection is the multidimensional geometry. The temperature in a short cylinder exposed to convection from all surfaces varies in both the radial and axial directions, and thus heat is transferred in both directions. 45 A short cylinder of radius ro and height a is the intersection of a long cylinder of radius ro and a plane wall of thickness a. The solution for a multidimensional geometry is the product of the solutions of the one-dimensional geometries whose intersection is the multidimensional body. The solution for the two-dimensional short cylinder of height a and radius ro is equal to the product of the nondimensionalized solutions for the one-dimensional plane wall of thickness a and the long cylinder of radius ro. 46 A long solid bar of rectangular profile a b is the intersection of two plane walls of thicknesses a and b. 47 The transient heat transfer for a two-dimensional geometry formed by the intersection of two one-dimensional geometries 1 and 2 is Transient heat transfer for a three-dimensional body formed by the intersection of three one-dimensional bodies 1, 2, and 3 is 48 Multidimensional solutions expressed as products of one-dimensional solutions for bodies that are initially at a uniform temperature Ti and exposed to convection from all surfaces to a medium at T 49 Multidimensional solutions expressed as products of one-dimensional solutions for bodies that are initially at a uniform temperature Ti and exposed to convection from all surfaces to a medium at T 50 Summary • Lumped System Analysis Criteria for Lumped System Analysis • Transient Heat Conduction in Large Plane Walls, Long Cylinders, and Spheres with Spatial Effects Nondimensionalized One-Dimensional Transient Conduction Problem Exact Solution of One-Dimensional Transient Conduction Problem Approximate Analytical and Graphical Solutions • Transient Heat Conduction in Semi-Infinite Solids Contact of Two Semi-Infinite Solids • Transient Heat Conduction in Multidimensional Systems NUMERICAL METHOD IN TRANSIENT HEAT CONDUCTION Mehmet Kanoglu Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Fundamentals of Thermal-Fluid Sciences, 3rd Edition Yunus A. Cengel, Robert H. Turner, John M. Cimbala McGraw-Hill, 2008
4165
https://sites.lsa.umich.edu/idolga/wp-content/uploads/sites/1334/2024/08/autodelPezzoEven.pdf
AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 IGOR DOLGACHEV AND GEBHARD MARTIN ABSTRACT. We classify the automorphism groups of del Pezzo surfaces of degrees one and two over an algebraically closed field of characteristic two. This finishes the classification of automorphism groups of del Pezzo surfaces in all characteristics. CONTENTS Introduction 1 1. Notation 3 2. Del Pezzo surfaces of degree ≥3 4 3. Del Pezzo surfaces of degree 2 4 4. Automorphism groups of del Pezzo surfaces of degree 2 12 5. Del Pezzo surfaces of degree 1 20 6. Automorphism groups of del Pezzo surfaces of degree 1 28 Appendix 43 References 45 INTRODUCTION This paper is a continuation of our paper , where we finished the classification of the auto-morphism groups of del Pezzo surfaces over an algebraically closed field of positive characteristic p ̸= 2. In this paper, we treat the remaining case when the characteristic equals two. As we explained in the introduction to , the remaining part of the classification concerns del Pezzo surfaces of degrees one and two. The cases of odd and even positive characteristic are drastically different since, in the latter case, the anti-canonical map (resp. the anti-bicanonical map) is a separable Artin-Schreier cover of degree two but not a Kummer cover as in the cases of odd characteristic. So, no plane quartic curves (and no canonical genus four curves with vanishing theta characteristic) appear as branch curves. Instead, in characteristic two, the branch curve B of the anti-canonical (resp. anti-bicanonical) map is not necessarily smooth plane conic (resp. a cubic in P3). The ramification curve R is a purely inseparable cover of B. Theorems 3.4 and 5.6 give normal forms for del Pezzo surfaces of degree two and one depending on the singularities of R and B. Although plane quartics and canonical curves of genus four disappear in characteristic two, their familiar attributes, like 28 bitangent lines or 120 tritangent planes, persist. We call them fake bitagents and fake tritangent planes. They are defined to be lines in the plane (resp. planes in the three-dimensional space) that split under the anti-canonical (resp. anti-bicanonical) map. It is well-known that the blow-up of the anti-canonical base point on a del Pezzo surface of degree one yields a rational elliptic surface with only irreducible fibers and, conversely, the contraction 1 2 IGOR DOLGACHEV AND GEBHARD MARTIN of a section of a rational elliptic surface with only irreducible fibers yields a del Pezzo surface of degree 1. Thus, the normal forms of Theorem 5.6 also give normal forms for all rational elliptic surfaces with only irreducible fibers. Quite surprisingly, in characteristic 2, also every del Pezzo surface of degree 2 has a canonically associated rational elliptic surface. This surface is obtained by blowing up the base points of the preimage of the pencil of lines through the strange point of the branch locus B. We study the properties of this strange fibration in Section 5.4. Using these geometric observations, we classify the automorphism groups of all del Pezzo surfaces of degree 2 and 1 in characteristic 2. The following result is proved in Theorems 4.3 and 6.8. Theorem. A finite group G is realized as the automorphism group Aut(X) of a del Pezzo surface X of degree 2 (resp. 1) over an algebraically closed field k of characteristic char(k) = 2 if and only if G is listed in Table 3 (resp. Table 4) in the Appendix. Table 3 (resp. Table 4) also gives the conjugacy classes in W(E7) (resp. W(E8)) of all elements of Aut(X) for all del Pezzo surfaces X of degree 2 (resp. degree 1). We refer to for a general discussion of the history of the problem and its relationship to the classification of conjugacy classes of finite subgroups of the planar Cremona group. Also, the reader finds there some general facts about del Pezzo surfaces, e.g. the relationship with the Weyl groups of roots systems and some classification results from group theory. AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 3 1. NOTATION We recall the notations for some finite groups which we will encounter in this article. Throughout this article, p is a prime number, and q is a power of p. Unless stated otherwise, k denotes an algebraically closed field of characteristic 2. • Cn is the cyclic group of order n. • Sn and An are the symmetric and alternating groups on n letters. • Q8 is the quaternion group of order 8. • D2n is the dihedral group of order 2n. • nk = (Z/nZ)k. In particular, n = n1 = Z/nZ. • p1+2n ± , the extra special group. For odd p the sign + (−) defines a group of exponent p (p2). For p = 2, the sign distinguishes the type of the quadratic forms on 22n = F2n 2 defined by the extension. • GLn(q) = GL(n, Fq). • PGLn(q) = GLn(q)/F∗ q. Its order is N = q 1 2 n(n−1)(qn −1) · · · (q2 −1). • SLn(q) = {g ∈GLn(q) : det(g) = 1}. This is a subgroup of GLn(q) of index (q −1). • Ln(q) = PSLn(q) is the image of SLn(q) in PGLn(q). Its order is N/(q −1, n). • For odd n, On(q) is the subgroup of GLn(q) that preserves a non-degenerate quadratic form F. • For even n, O+ n (q) (resp. O− n (q)) is the subgroup of GLn(q) that preserves a non-degenerate quadratic form F of Witt defect 0 (resp. 1). • SO± n (q) is the subgroup of O± n (q) of elements with determinant 1. • PSO± n (q) is the quotient of SO± n (q) by its center. • Sp2n(q) is the subgroup of SLq(2n) preserving the standard symplectic form on F2n q . Its order is qn2(q2n−1 −1) · · · (q2 −1). • Sp2n(q) = Sp2n(q)/(±1). • SUn(q2) is the subgroup of SLn(q2) of matrices preserving the hermitian form Pn i=1 xq+1 i . Its order is q 1 2 n(n−1)(qn −(−1)n)(qn−1 −(−1)n−1) · · · (q3 + 1)(q2 −1). We have SU2(q2) = SL2(q). • PSUn(q2) = SUn(q2)/C, where C is a cyclic group of order (q + 1, n) of diagonal Hermitian matrices. The simple group PSUn(q2) is denoted by Un(q) in . • H3(3) is the Heisenberg group of 3 × 3 upper triangular matrices with entries in F3. • A.B is a group that contains a normal subgroup A with quotient group B. • A : B is the semi-direct product A ⋊B. 4 IGOR DOLGACHEV AND GEBHARD MARTIN 2. DEL PEZZO SURFACES OF DEGREE ≥3 For the convenience of the reader, we first recall the classification of automorphism groups of del Pezzo surfaces of degree at least 3. 2.1. Degree ≥5. For del Pezzo surfaces of degree at least 5, the description of Aut(X) is characteristic-free. We refer the reader to [12, Section 3] or for details. 2.2. Quartic del Pezzo surfaces. Starting from degree 4, the classification of automorphism groups depends on the characteristic. As in the other characteristics, a quartic del Pezzo surface X is a blow-up of five points in P2 no 3 of which are collinear. Moreover, the anti-canonical linear system | −KX| = |OP2(3) −p1 −p2 −p3 −p4 −p5| embeds X into P4 as a complete intersection of two quadrics. Since p = 2, these quadrics cannot be diagonalized. Instead, as shown in , one can choose the normal forms (ab + b + 1)t2 2 + at2 3 + t2t3 + t3t4 = bt2 1 + (ab + a + 1)t2 2 + t1t3 + t2t4 = 0, (1) where a, b are parameters such that the binary form ∆= uv(u + v)(u + av)(bu + v) has five distinct roots. As in the case p ̸= 2, the automorphism group Aut(X) contains a normal subgroup H isomor-phic to 24, and the quotient G = Aut(X)/H is isomorphic to a subgroup of S5. The classification is summarized in Table 1 in the Appendix. There, the first column refers to the values of the parameters a and b in Equation (1) above. The conjugacy classes of elements of Aut(X) can be obtained by combining [11, Table 2] and [6, Table 5]. 2.3. Cubic surfaces. The classification of automorphism groups of cubic surfaces in characteristic 2 was achieved in [11, Table 7]. For the convenience of the reader, we recall the classification in Table 2 in the Appendix. 3. DEL PEZZO SURFACES OF DEGREE 2 3.1. The anti-canonical map. We start by describing the geometry of del Pezzo surfaces of degree d = 2 over an algebraically closed field k of characteristic p = 2. We refer to for the basic facts from the theory of del Pezzo surfaces over fields of any characteristic. It is known that the anti-canonical linear system | −KX| has no base points and defines a finite morphism f : X →P2 of degree 2. If p ̸= 2, the map f is automatically separable and its branch curve is a smooth plane quartic. So any automorphism of X induces an automorphism of the quartic, and, conversely, any automorphism of the quartic can be lifted to two automorphisms of X that differ by the deck transformation, classically called the Geiser involution. If p = 2, the structure of f, being a morphism of degree 2, is more complicated. Nevertheless, as a first step, we observe that f is still always separable. Proposition 3.1. The anti-canonical linear system | −KX| defines a finite separable morphism f : X →P2 of degree 2. Proof. Assume that f is not separable. Then, since deg(f) = 2, f is purely inseparable. Hence, f is a homeomorphism in the étale topology, which is absurd since H2 ét(X, Zℓ) has rank 8 (because X is the blow-up of 7 points in the plane), while H2 ét(P2, Zℓ) has rank 1. □ AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 5 Let R(X, −KX) = ∞ M n=0 H0(X, OX(−nKX)) be the graded anti-canonical ring of X. By the Riemann-Roch Theorem, dimk R(X, −KX)1 = 3 and dimk R(X, −KX)2 = 7. One can show that R(X, −KX) is generated by R(X, −KX)1 and one element from R(X, −KX)2 that does not belong to the symmetric square of R(X, −KX)1. Let x, y, z be elements of R(X, −KX)1 and w ∈R(X, −KX)2 which together generate R(X, −KX). Then, the relation between the generators is of the form w2 + A(x, y, z)w + B(x, y, z) = 0, (2) where A and B are homogeneous forms of degree 2 and 4, respectively. In particular, via equation (7), we can view X as a surface of degree 4 in the weighted projective space P(1, 1, 1, 2), and the anti-canonical map is the projection of this surface onto the x, y, z-coordinates. If p ̸= 2, we can complete the square, get rid of A, and obtain the standard equation of a del Pezzo surface of degree 2. The curve V (B(x, y, z)) is the smooth plane quartic we mentioned in the introduction. The Geiser involution just negates w. In our case, when p = 2, we cannot get rid of A, for otherwise the map would become inseparable. Also, the coefficient B is not uniquely determined, since replacing w with w + Q for any quadratic form Q changes B to B +AQ+Q2, without changing the isomorphism class of the surface. Taking Q = A, we obtain the analog of the Geiser involution, so we keep the name for this involution. The non-uniqueness of B becomes more natural if we take the following different point of view: By [13, Proposition 1.11], the double cover f is a torsor under a group scheme αL,s of order 2 over P2, defined by the exact sequence of fppf-sheaves 0 →αL,s →L φ →L⊗2 →0 for some line bundle L and a global section s. The homomorphism of sheaves φ is locally given by a 7→a2 U + aUsU, so s cuts out the branch locus of f. By [13, Proposition 1.7], we have ωX ∼ = f∗(OP2(−3) ⊗L−1), hence L ∼ = OP2(2) and s = A. The αL,s-torsor corresponding to f is defined by a cohomology class in H1 fppf(P2, αL,s). Since H1 fppf(P2, L) = H1(P2, L) = 0, we have H1 fppf(P2, αL,s) ∼ = H0(P2, L⊗2)/℘(H0(P2, L)), where ℘= H0(φ). The ternary form B is a representative of this space, and hence it is defined only up to a transformation of the form B 7→B + Q2 + AQ, where Q is a quadratic form in x, y, z. By writing the equation of X locally as w2 U + aUwU + bU, and taking partial derivatives, we see that the differentials wUdaU + dbU restricted to V (A) glue together to define a global section α of Ω1 P2 ⊗L⊗2 ⊗OV (A). This section vanishes if and only if X is singular. So, in our case, when X is assumed to be smooth, we obtain the following. Proposition 3.2. In (7), the equations A = 0, wAx + Bx = 0, wAy + By = 0, wAz + Bz = 0 have no common solutions. 6 IGOR DOLGACHEV AND GEBHARD MARTIN 3.2. Normal forms. Recall that X is given by an equation of the form w2 + Aw + B = 0, where A is a quadratic ternary form and B is quartic ternary form. We say that V (A) is the branch curve of the cover, and its preimage R = f−1(V (A)) under the anti-canonical map f : X →P2 will be called the ramification curve. Remark 3.3. We use the notation A2n for singularities of curves whose formal completion is isomorphic to the unibranched singularity y2 + x2n+1 = 0. If n = 1, this is an ordinary cusp singularity. These are exactly the curve singularities that can occur on reduced purely inseparable double covers of smooth curves in characteristic 2. Indeed, after passing to formal completions, such a double cover is given by an equation of the form y2 + uxm, where u ∈k is a unit. Now, we can apply a substitution of the form y 7→y + f for a suitable power series f to assume that m is odd and then replace x by λx, where λ is an m-th root of u−1, which exists by Hensel’s lemma. In other words, the singularity defined by y2 + uxm is of type A2n, where 2n + 1 is the smallest odd power of x that occurs in uxm. The following theorem gives normal forms for the cover f : X →P2. In total, we obtain six normal forms, corresponding to the six possible combinations of singularities of V (A) and R. Theorem 3.4. Every del Pezzo surface of degree 2 in characteristic 2 is isomorphic to a quartic surface in P(1, 1, 1, 2) given by an equation of the form w2 + A(x, y, z)w + B(x, y, z), where (A, B) is one of the following: Name A B B1 B0 #Parameters (1)(a) x2 + yz xB1 + B0 λyz(y + z) ay4 + by3z + cy2z2 + dyz3 + ez4 6 (1)(b) x2 + yz xB1 + B0 y2z ay4 + by3z + cy2z2 + dyz3 + ez4 5 (1)(c) x2 + yz xB1 + B0 y3 by3z + cy2z2 + dyz3 + ez4 4 (2)(a) xy B1 + B2 0 xz3 + yz3 ax2 + by2 + cz2 + dxz + eyz 5 (2)(b) xy B1 + B2 0 xz3 + y3z ax2 + cz2 + dxz + eyz 4 (3) x2 xB1 + B0 z3 + ayz2 y3z + by2z2 + cz4 3 The parameters satisfy the following conditions: (1) (a) λ ̸= 0, λ2 + a + b + c + d + e ̸= 0, b2 + a ̸= 0, d2 + e ̸= 0. (1) (b) b2 + a ̸= 0, d2 + e ̸= 0. (1) (c) d2 + e ̸= 0. (2) (a) a ̸= 0, b ̸= 0. (2) (b) a ̸= 0. (3) None. In terms of these normal forms, the singularities of the irreducible components of Rred are as follows: (1) (a) Three A2-singularities, over [0 : 1 : 0], [0 : 0 : 1] and [1 : 1 : 1]. (1) (b) An A4-singularity over [0 : 0 : 1] and an A2-singularity over [0 : 1 : 0]. (1) (c) An A6-singularity over [0 : 0 : 1]. (2) (a) Two A2-singularities, over [1 : 0 : 0] and [0 : 1 : 0]. (2) (b) Two A2-singularities, over [1 : 0 : 0] and [0 : 0 : 1]. AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 7 (3) An A2-singularity over [0 : 0 : 1]. Proof. Since f : X →P2 is separable, A is non-zero. Hence, up to projective equivalence, there are three possibilities for A, corresponding to (1), (2), and (3). Now, we study those cases separately. The conditions on the parameters will follow from Proposition 3.2 by computing partial derivatives, a task which we will leave to the reader. (1) A = x2 + yz Applying a substitution of the form w 7→w + Q for a suitable quadratic form Q, allows us to assume that B = xB1 + B0 for homogeneous forms B0 and B1 in y and z. Let x = uv, y = u2, z = v2 define the Veronese isomorphism between V (A) and P1. Substitut-ing in B, we get that R is isomorphic to the double cover of P1 given by the equation w2 + uvB1(u2, v2) + B0(u2, v2) = 0. By taking the partials, we find that R is singular exactly over the roots of B1. After applying a suitable substitution that preserves A, we can move these roots to special positions. Note that the substitution w 7→w + Q of the first paragraph does not change the position of these singularities, so we can still assume that B = xB1 + B0. If the roots are distinct, we get Case (a), if there are two distinct roots, we get Case (b), and if there is only a single root, we get Case (c). Note that in Cases (b) and (c), the substitution y 7→λy, z 7→λ−1z preserves the location of the roots and scales B1, which is why we can assume that xB1 occurs with coefficient 1. Finally, in Case (c), we can apply a substitution of the form z 7→z + λ2y, x 7→x + λy for a suitable λ to assume that B0(1, 0) = 0. (2) A = xy After applying a substitution of the form w 7→w + Q for a suitable quadratic form Q, we may assume that B does not contain monomials divisible by xy. This allows us to write B = (a1x3 + a2y3)z + (a3x + a4y)z3 + B0(x, y, z)2. Note that the preimages R1 and R2 of V (x) and V (y) on X are members of | −KX|, hence they must be reduced. Restricted to V (x), the equation becomes w2 + a2y3z + a4yz3, so R1 is singular over [0 : √a4 : √a2]. Similarly, R2 is singular over [√a3 : 0 : √a1]. Note that these points must be distinct, for otherwise X is singular over [0 : 0 : 1] by Proposition 3.2. If these two points are distinct and different from [0 : 0 : 1], we can apply a suitable substitution that preserves A to move them to [0 : 1 : 0] and [1 : 0 : 0]. Then, we can repeat the substitution of the first paragraph and, after rescaling, arrive at Case (a). If the two points are distinct and one of them is [0 : 0 : 1], we can assume without loss of generality that the other one lies on V (y) and move it to [1 : 0 : 0]. After repeating the substitution of the first paragraph and rescaling, we may assume that B1 is as in Case (b). Finally, after applying a substitution of the form z 7→z + λy, w 7→w + λz2 + λ2yz + λ3y2 for a suitable λ, we may assume that B0(0, 1, 0) = 0. (3) A = x2 Applying a substitution of the form w 7→w + Q for a suitable quadratic form Q, allows us to assume that B = xB1 + B0 for homogeneous forms B0 and B1 in y and z. 8 IGOR DOLGACHEV AND GEBHARD MARTIN Let R′ be the preimage of V (x). As in Case (2), since R′ ∈| −KX|, R′ must be reduced. Restricted to V (x), the double cover becomes w2 + B0(y, z) = 0, hence R′ is singular over the common zero of B0,y and B0,z. We can assume that this zero lies at [0 : 0 : 1], that is, that yz3 does not occur in B0 and y3z occurs with non-zero coefficient. After rescaling, we may assume that y3z occurs with coefficient 1. Applying a substitution of the form z 7→z + λ1x + λ2y, y 7→y + λ3x for suitable λi and repeating the substitution of the first paragraph, we can eliminate the monomials y3 and y2z in B1 and the monomial y4 in B0. Computing partials, we see that X is singular if and only if B1(0, 1) = 0. Hence, after rescaling, we may assume that B is as claimed. □ 3.3. Fake bitangents and odd theta characteristics. It is known that a del Pezzo surface X of degree 2 contains 56 (−1)-curves (see [9, 8.7], where the proof is characteristic free). They come in pairs Ei + E′ i ∈| −KX| with Ei · E′ i = 2. The Geiser involution γ switches the two curves in a pair. The image of each pair under any birational morphism π : X →P2 given by the blow-up of seven points p1, . . . , p7 ∈P2 is either the union of a line through two points pi, pj and the conic through the remaining 5 points, or a cubic passing through p1, . . . , p7 with a double point at some pi (and one curve of the pair is contracted by π). The image of Ei + E′ i under the anti-canonical map f is a line ℓ. If p ̸= 2, each of the resulting 28 lines is a bitangent line to the branch quartic curve and, conversely, every bitangent to the branch quartic gives rise to a pair of (−1)-curves. A bitangent line intersects the branch curve at two points, not necessarily distinct, whose sum is an odd theta characteristic of the curve. It is known that the number of odd theta characteristics on a smooth curve of genus 3 is equal to 28. For arbitrary p, we still have the following. Lemma 3.5. The preimage f−1(ℓ) of a line ℓis a sum of two (−1)-curves if and only if f−1(ℓ) is reducible. Proof. Since f has degree 2 and ℓis integral, the curve f−1(ℓ) is reducible if and only if it has two irreducible components L1 and L2. These components satisfy L1 + L2 ∈| −KX|. Since Li maps birationally to ℓ, we have pa(Li) = 0, hence L1.L2 = 2 by adjunction. We have L2 1 = L2 2, because the two curves are interchanged by the covering involution, so the equality 2 = K2 X = (L1 + L2)2 = L2 1 + L2 2 + 2L1.L2 implies that Li is a (−1)-curve. The converse is clear. □ So, even if p = 2, we have 28 splitting lines, which we call fake bitangent lines in analogy with the situation in the other characteristics. For the rest of this section, we assume p = 2. Since the anti-canonical map is étale outside the branch curve V (A), the intersection Ei ∩E′ i lies on the ramification curve R. Let L = OR(Ei) ∼ = OR(E′ i). It is an invertible sheaf on R of degree 2. We have L⊗2 ∼ = OR(Ei + E′ i) ∼ = OR(−KX). Since B ∈|OP2(2)|, we have R ∈| −2KX|. By the adjunction formula ωR ∼ = OR(−2KX + KX) ∼ = L⊗2. Invertible sheaves L on R that satisfy this property are called invertible theta characteristics. They are called even, odd, or vanishing according to whether their space of global sections is AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 9 even-dimensional, odd-dimensional, or at least two-dimensional, respectively. We note that, on singular curves, there can be theta characteristics which are not invertible, see , . In the following, we will only discuss invertible theta characteristics, so we drop the “invertible” from the notation. Let Θ(R) be the set of isomorphism classes of theta characteristics on R and let J(R) be the identity component of the Picard scheme of R, also called the generalized Jacobian of R. Lemma 3.6. The generalized Jacobian J(R) of R is isomorphic to G3 a. Proof. Since R is of arithmetic genus 3, J(R) is a commutative group scheme of dimension 3. As Rred has only unibranched singularities, [5, Proposition 5, Proposition 9] shows that J(R) is unipotent. Finally, we have a factorization of the absolute Frobenius F : R →V (A) →R. Note that J(V (A)) is trivial, even if V (A) is non-reduced, since H1(V (A), OV (A)) = 0. Since F ∗is multiplication by p on J(R), we obtain that J(R) is p-torsion, hence isomorphic to G3 a. □ In particular, J(R)(k) is an infinite 2-torsion group and it acts on Θ(R) via tensor products. It is easy to check that Θ(R) is a torsor under J(R)(k) via this action. This already shows that the problem of finding (fake) bitangents using theta characteristics on R in characteristic 2 is much more subtle than it is in the other characteristics. Let us give an example that further illustrates this point. Example 3.7. Assume that V (A) is a smooth conic. Consider π : R →V (A) ∼ →P1. We have π∗OP1(2) = (f|R)∗OV (A)(1) = (ωX)|R, so L := π∗OP1(1) is a theta characteristic on R. Moreover, we have h0(R, π∗OP1(1)) = 2, so L is a vanishing theta characteristic. In fact, this is the unique vanishing theta characteristic on R: Indeed, let L′ be another vanishing theta characteristic. Then, the Riemann–Roch formula yields h0(R, L ⊗L′) −h0(R, ωR ⊗L−1 ⊗L′−1) = 2. Since h0(R, L) ≥2 and h0(R, L′) ≥2, we have h0(R, L⊗L′) ≥3, so h0(R, ωR⊗L−1⊗L′−1) ̸= 0. Since R is integral and ωR ⊗L−1 ⊗L′−1 has degree 0, this implies that L ∼ = L′. Next, let ℓbe any line in P2 such that f−1(ℓ) meets R in two distinct smooth points. Then, f−1(ℓ∩V (A))red defines an effective theta characteristic L on R. By the previous paragraph, we have h0(R, L) = 1, hence all the infinitely many theta characteristics arising in this way are odd. It would be interesting to find an abstract characterization of the fake bitangent lines among the odd theta characteristics of R. Nevertheless, we can find explicit equations of fake bitangent lines using the following result. Lemma 3.8. Let C →P1 be an Artin–Schreier double cover given by an equation of the form w2 + f(u, v)w + g(u, v) = 0, where f and g are homogeneous polynomials of degree n and 2n, respectively, and f ̸= 0. Then, C is reducible if and only if there exists a homogeneous polynomial h of degree n with g(u, v) = f(u, v)h(u, v) + h(u, v)2. Proof. If there exists an h as in the assertion, then w2 + fw + g = (w + f + h)(w + h), so C is obviously reducible. Conversely, assume that C is reducible. Then, C has exactly two irreducible components and these components are interchanged by the substitution w 7→w + f. In other words, we can write w2 + fw + g = h′(h′ + f), where h′ is a weighted homogeneous polynomial of degree n. This is 10 IGOR DOLGACHEV AND GEBHARD MARTIN only possible if h′ is of the form h′ = w + h for some h homogeneous of degree n in the variables u and v. Then, w2 + fw + g = (w + h)(w + h + f) = w2 + fw + h2 + fh, hence g = fh + h2, as claimed. □ Finally, for later use, we record some simple restrictions on the possible positions of fake bitangent lines with respect to the singularities of R. Proposition 3.9. Let ℓbe a fake bitangent line that passes through the image P of a singular point of an irreducible component of Rred. Then, V (A) is smooth and ℓis tangent to V (A) at P. Proof. Write f−1(ℓ) = L1 + L2. Since Rred is singular at f−1(P), Li and R have intersection multiplicity at least 2 in f−1(P). Since R ∈| −2KX| and L1 + L2 ∈| −KX|, we have (L1 + L2).R = 2K2 X = 4, hence L1 + L2 and R meet only in f−1(P). Therefore, their images in P2 meet only in P. If V (A) is smooth, this implies that ℓis tangent to V (A) in P. If V (A) is the union of two lines, this implies that ℓpasses through their intersection. However, in this case, Li and R have intersection multiplicity at least 3 in f−1(P), which is absurd. Finally, if V (A) is a double line, then Rred ∈| −KX| and 2 = K2 X = (L1 + L2).Rred ≥4, a contradiction. □ Remark 3.10. We note that there are del Pezzo surfaces for which fake bitangents satisfying the properties of Proposition 3.9 exist. See Proposition 5.10 for a classification in terms of the normal forms of Theorem 3.4. 3.4. Strange elliptic fibrations. To each del Pezzo surface X of degree 2 in characteristic 2 with branch locus V (A) of the anti-canonical map f : X →P2, there is a naturally associated point PX in P2: If V (A) is smooth, we let PX be the strange point of V (A), if V (A) is the union of two lines, we let PX be their intersection, and if V (A) is a double line, we let PX be the image of the singular point of f−1(V (A))red. We call PX the strange point of X and note that the action of Aut(X) fixes PX. The pencil P of lines through PX is Aut(X)-invariant as well. Its preimage C in X is an Aut(X)-invariant pencil of curves of arithmetic genus 1 with two base points if V (A) is smooth and with one base point of multiplicity 2 if V (A) is singular. We let π : Y →X be the blow-up of the two (possibly infinitely near) base points of C. Then, C defines a relatively minimal genus one fibration φ : Y →P1. Since the map X →P2 is separable and a general line in the pencil is not contained in V (A), its pre-image on Y is a smooth elliptic curve. Thus, the genus one fibration is an elliptic fibration. We call it the strange elliptic fibration associated to X. By construction, the group Aut(X) lifts to a subgroup of Aut(Y ) and we will use this in Proposition 4.2 to find restrictions on the possible structure of Aut(X). To make the most of this connection, we will now describe the singular fibers of the elliptic fibration φ : Y →P1. We employ Kodaira’s notation: we say that a fiber isomorphic to an irreducible cuspidal cubic curve is of type II, a fiber that consists of two smooth rational curves intersecting non-transversally at one point is of type III, and a fiber that consists of three smooth rational curves intersecting at one point is of type IV. We use the normal forms of Theorem 3.4, so that A = x2 + yz, xy, or x2 and PX = [1 : 0 : 0] in the first case and PX = [0 : 0 : 1] in the other two cases. In the first case, we let ℓ[t0:t1] be the line V (t0y + t1z) and in the other two cases, we let ℓ[t0:t1] be the line V (t0x + t1y). The fiber of φ corresponding to ℓ[t0:t1] is denoted by F[t0:t1]. Proposition 3.11. The generic fiber of the strange elliptic fibration associated to X is a super-singular elliptic curve. Its singular fibers are of type II, III, or IV and its Mordell-Weil group is torsion-free. More precisely: AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 11 (1) If A = x2 + yz, then the following hold: • The fiber F[t0:t1] is smooth if and only if t0y + t1z ∤B1. • The fiber F[t0:t1] is of type III if ℓ[t0:t1] is a fake bitangent and of type II otherwise. • The line ℓ[1:0] is a fake bitangent if and only if e = 0. • The line ℓ[0:1] is a fake bitangent if and only if a = 0. • The line ℓ[1:1] is a fake bitangent if and only if a + b + c + d + e = 0. (2) (a) If A = xy and B1 = xz3 + yz3, then the following hold: • The fiber F[t0:t1] is smooth if and only if [t0 : t1] ̸= [1 : 0], [0 : 1], [1 : 1]. • F[1:0] and F[0:1] are of type II. • F[1:1] is of type IV if ℓ[1:1] is a fake bitangent and of type III otherwise. • The curve ℓ[1:1] is a fake bitangent if and only if c = d2 + e2. (2) (b) If A = xy and B1 = xz3 + y3z, then the following hold: • The fiber F[t0:t1] is smooth if and only if [t0 : t1] ̸= [1 : 0], [0 : 1]. • The curve F[0:1] is of type II. • The curve F[1:0] is of type III. (3) If A = x2, then the following hold: • The fiber F[t0:t1] is smooth if and only if [t0 : t1] ̸= [1 : 0]. • The curve F[1:0] is of type III. Proof. We study each case separately. (1) In this case, A = x2 + yz. First, consider ℓ[1:t] = V (y + tz). Plugging y = tz into the equation of X, we obtain w2 + (x2 + tz2)w + xB1(tz, z) + (at4 + bt3 + ct2 + dt + e)z4 with B1(tz, z) ∈{λt(t + 1)z3, t2z3, t3z3}. If y + tz ∤B1, then B1(tz, z) ̸= 0, so taking partials with respect to x and w shows that a singular point must satisfy x = z = 0, which is absurd. If y + tz | B1, then B1(tz, z) = 0 and F[1:t] is singular over [t : t : 1]. Similarly, one checks that F[0:1] is singular. The equation w2 + (x2 + tz2)w + xB1(tz, z) + (at4 + bt3 + ct2 + d + e)z4 shows that F[1:t] is a double cover of P1 branched over a single point. Hence, if F[1:t] is smooth, then it is supersingular, and if it is singular and irreducible, it is a cuspidal cubic. Finally, consider the curve F[1:0] given by w2 + x2w + ez4. By Lemma 3.8, it is clear that F[1:0] is reducible if and only if e = 0. The calculation for F[1:1] and F[0:1] is similar. (2) (a) In this case, A = xy and B1 = xz3 + yz3. First, consider ℓ[1:t] = V (x + ty) with t ̸= 0, 1. Plugging x = ty into the equation of X, we obtain w2 + ty2w + (t + 1)yz3 + B0(ty, y, z)2. Then, taking partials shows that F[1:t] is smooth. Since it is a double cover of P1 branched over a single point, it is supersingular. Next, consider F[1:1], whose image in X is given by w2 + y2w + ((a + b)y2 + (d + e)yz + cz2)2. 12 IGOR DOLGACHEV AND GEBHARD MARTIN This curve is singular over [0 : 0 : 1], so F[1:1] has one irreducible component contracted by Y →X. By Lemma 3.8, the image of F[1:1] in X is reducible if and only if c = d2 + e2. Finally, the curves F[1:0] and F[0:1] are isomorphic to their images in X and these images are irreducible and cuspidal by Theorem 3.4. (2) (b) In this case, A = xy and B1 = xz3 + y3z. First, consider ℓ[1:t] = V (x + ty) with t ̸= 0. Plugging x = ty into the equation of X, we obtain w2 + ty2w + tyz3 + y3z + B0(ty, y, z)2. As in the previous cases, taking partials shows that F[1:t] is smooth and supersingular. The curve F[0:1] is isomorphic to its image in X, since f−1(ℓ[0:1]) is smooth over the point [0 : 0 : 1]. Hence, F[0:1] is of type II. On the other hand, the curve F[1:0] is of type III, since its image in X has multiplicity 2 over [0 : 0 : 1]. (3) In this case A = x2. First, consider ℓ[t:1] = V (tx + y). Plugging y = tx into the equation of X, we obtain w2 + x2w + xz3 + (bt2 + at)x2z2 + cz4. Then, taking partials shows that F[t:1] is smooth. Since it is a double cover of P1 branched over a single point, it is supersingular. The curve F[1:0] is of type III, by the same argument as in the previous case. The Mordell-Weil group of the fibration is torsion free by [17, Main Theorem], since the lattice spanned by fiber components is of rank at most 4 in each case. □ Remark 3.12. The classification of singular fibers of rational elliptic surfaces with a section in characteristic 2 can be found in . Lang shows that in the cases where the general fiber is a supersingular elliptic curve, the number of singular fibers is at most 3, which agrees with what we observed in the case of strange elliptic fibrations. Proposition 3.11 shows that the singular fibers that occur on strange genus one fibrations are of type 9A, 9B, 10A, 10B, 10C or 11 in Lang’s terminology. 4. AUTOMORPHISM GROUPS OF DEL PEZZO SURFACES OF DEGREE 2 4.1. Preliminaries. Recall once more from Section 3.1 that a del Pezzo surface X of degree 2 is a surface of degree 4 in P(1, 1, 1, 2) given by an equation of the form w2 + A(x, y, z)w + B(x, y, z) = 0. Since this is the anti-canonical model of X and ω−n X admits a natural Aut(X)-linearization for all n, we obtain that Aut(X) is isomorphic to the subgroup of Aut(P(1, 1, 1, 2)) of automorphisms that preserve X. The structure of the group Aut(P(1, 1, 1, 2)) is well-known. The vector space k[x, y, z]2 of quadratic forms is a normal subgroup of Aut(P(1, 1, 1, 2)) that acts via (x, y, z, w) 7→(x, y, z, w + Q). The quotient by this subgroup is the group of transformations that change (x, y, z) linearly and multiply w by a scalar. Since the transformation (x, y, z, w) 7→(λx, λy, λz, λ2w) is the identity, this quotient is isomorphic to GL3(k)/µ2(k). Since we are in characteristic 2, the subgroup µ2(k) is trivial. This gives an isomorphism Aut(P(1, 1, 1, 2)) ∼ = k[x, y, z]2 : GL3(k). AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 13 We denote elements of this group by (Q, g) ∈k[x, y, z]2 × GL3(k) where the semi-direct product structure is (Q, g) ◦(Q′, g′) = (g∗(Q′) + Q, gg′). Using this description of Aut(P(1, 1, 1, 2)), it is straightforward to calculate the subgroup of automorphisms preserving X. We obtain Aut(X) ∼ = {(Q, g) : g∗(A) = A, g∗(B) = B + AQ + Q2}. The kernel of the homomorphism Aut(X) →GL3(k), (Q, g) 7→g is generated by the Geiser involution γ. We let G(X) be the image of Aut(X) in GL3(k). Lemma 4.1. The homomorphism G(X) →GL3(k) →PGL3(k) is injective. Proof. Let g ∈G(X) be in the kernel of this homomorphism. Then, g = λI3 for some λ ∈k×. On the other hand, by definition of G(X), we have g∗(A) = A. Since A has degree 2, this implies λ2 = 1. Hence, λ = 1. □ We recall from [12, §1] that a choice of a blow-up X →P2 of seven points defines an injective homomorphism ρ : Aut(X) →W(E7). (3) The image of the Geiser involution is equal to −idE7. It is known that W(E7) = ⟨−idE7⟩×W(E7)+, where W(E7)+ ⊆W(E7) is the kernel of the determinant map. In particular, to determine Aut(X), it suffices to determine G(X) and both groups are isomor-phic to subgroups of W(E7) via ρ. This puts severe restrictions on the possible structure of G(X). Finally, we can use the strange genus one fibrations of the previous section to get information on G(X). Proposition 4.2. Let φ : Y →P1 be the strange elliptic fibration associated to X. Choose an exceptional curve E of Y →X as the zero section of φ and let C be the second exceptional curve. Then, there is a homomorphism ϕ : Aut(X) →Aut(Y ) that satisfies the following properties: (1) ϕ is injective. (2) ϕ(γ) preserves every fiber of φ. (3) If V (A) is smooth, then C is a section of φ. We have ϕ(γ) = tC ◦ι, where ι is the negation automorphism and tC is translation by C. (4) If V (A) is singular, then C is a component of a reducible fiber of φ. We have ϕ(γ) = ι and ϕ factors through the stabilizer of the pair (E, C). Proof. The surface Y is obtained by blowing up X at two points that are uniquely determined by V (A), hence stable under the action of Aut(X). This shows existence and injectivity of the homomorphism ϕ. The fibration φ is induced by the pencil of lines in P2 through the strange point of X. Since γ preserves these lines, it preserves the fibers of φ. If V (A) is smooth, then E and C are interchanged by ϕ(γ). The automorphism t−C ◦ϕ(γ) ◦ι maps E to E and −C to −C. It is well-known that every fixed point of a non-trivial automorphism of an elliptic curve is a torsion point. On the other hand, by Proposition 3.11, φ has no torsion sections, so t−C ◦ϕ(γ) ◦ι = id, which yields Claim (3). If V (A) is singular, then C is a (−2)-curve which meets E, hence it is the identity component of a reducible fiber of φ. Since ϕ(γ) is an involution that preserves E, we have ϕ(γ) = ι and we obtain Claim (4). □ 14 IGOR DOLGACHEV AND GEBHARD MARTIN 4.2. Classification. Theorem 4.3. Every del Pezzo surface of degree 2 in characteristic two such that, in the decompo-sition Aut(X) ∼ = 2 × G(X), the group G(X) is non-trivial is isomorphic to a surface of degree 4 in P(1, 1, 1, 2) given by an equation of the form w2 + Aw + B, where (A, B, G(X)) is one of the following: Name A B B1 B0 G(X) #Parameters (1)(a)(i) x2 + yz xB1 + B0 λyz(y + z) ay4 + by3z + cy2z2 + byz3 + az4 2 4 (1)(a)(ii) x2 + yz xB1 + B0 λyz(y + z) ay4 + λy3z + ay2z2 + λyz3 + az4 S3 2 (1)(c)(i) x2 + yz xB1 + B0 y3 by3z + cy2z2 + ez4 23 3 (2)(a)(i) xy B1 + B2 0 xz3 + yz3 ax2 + ay2 + cz2 + dxz + dyz 2 3 (2)(a)(ii) xy B1 + B2 0 xz3 + yz3 ax2 + by2 3 2 (2)(a)(iii) xy B1 + B2 0 xz3 + yz3 ax2 + ay2 6 1 (3)(i) x2 xB1 + B0 z3 y3z + cz4 3 1 (3)(ii) x2 xB1 + B0 z3 y3z 9 0 The parameters satisfy the following conditions: (1) (a) (i) λ ̸= 0, λ2 + c ̸= 0, b2 + a ̸= 0, (b, c) ̸= (λ, a). (1) (a) (ii) λ ̸= 0, λ2 + a ̸= 0. (1) (c) (i) e ̸= 0. (2) (a) (i) a ̸= 0, (c, d) ̸= (0, 0). (2) (a) (ii) a ̸= 0, b ̸= 0, a ̸= b. (2) (a) (iii) a ̸= 0. (3) (i) c ̸= 0. (3) (ii) None. Proof. We use the normal forms of Theorem 3.4 and the description of Aut(X) and G(X) given in the beginning of the current section. We go through the cases of Theorem 4.3. (1) (a) Here, X is given by an equation of the form w2 + (x2 + yz)w + λxyz(y + z) + B0 with B0 = ay4 + by3z + cy2z2 + dyz3 + ez4 and the cusps lie over [0 : 1 : 0], [0 : 0 : 1], and [1 : 1 : 1]. Let (Q, g) ∈Aut(X) be an automorphism of X. Then, g preserves the three points lying under the cusps. Moreover, if g fixes the three cusps, then it fixes V (A) pointwise, hence g is trivial in PGL3(k), so, by Lemma 4.1, g is the identity and (Q, g) coincides with the Geiser involution. Hence, G(X) acts faithfully on {[0 : 1 : 0], [0 : 0 : 1], [1 : 1 : 1]}. Note that G(X) contains an involution if and only if X admits an equation where this involution is given by y ↔z. This involution is in G(X) if and only if there exists a quadratic form Q such that Q2 + (x2 + yz)Q = g∗B0 + B0. (4) Since Q2 + (x2 + yz)Q contains a non-zero monomial divisible by x2 as soon as it is non-zero and g∗B0 + B0 does not contain such a monomial, we must have Q ∈{0, x2 + yz} and Equation (4) holds if and only if a = e and b = d, as claimed. AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 15 Next, note that G(X) contains an automorphism g of order 3 if and only if g is given by x 7→x + z, y 7→z, z 7→y + z and there exists a quadratic form Q such that Q2 + (x2 + yz)Q = λyz2(y + z) + g∗B0 + B0. (5) By the same argument as in the previous paragraph, we have Q ∈{0, x2 + yz} and Equation (5) holds if and only if a = c = e and b = d = λ. In particular, note that these conditions imply the conditions of the previous paragraph in this case, hence G(X) = S3. (1) (b) In this case, V (A) is smooth and R has two non-isomorphic singularities. Then, g ∈G(X) must fix the images of them on V (A). Since an automorphism of order 2 of P1 has only one fixed point, we may assume that the order of g is odd. By Proposition 3.9, the line ℓ through the images of the singularities is not a fake bitangent. Its preimage E in X is an integral curve of arithmetic genus one and the Geiser involution has two fixed points on E. Hence, either E is smooth and ordinary, or nodal. In both cases, there is no non-trivial automorphism of odd order that commutes with the involution, hence g fixes ℓpointwise. Since g also fixes the strange point P on V (A) and the projection from P is inseparable, g fixes V (A) pointwise, hence g is the identity. We conclude that G(X) = {1}. (1) (c) Here, X is given by an equation of the form w2 + (x2 + yz)w + xy3 + B0 with B0 = by3z + cy2z2 + dyz3 + ez4. The singularity of R lies over [0 : 0 : 1]. An element g ∈G(X) of odd order has at least two fixed points on V (A) and then the same argument as in the previous case shows that g is the identity. Therefore, G(X) is a 2-group that acts on V (A) ∼ = P1 with a fixed point. In particular, G(X) is isomorphic to a subgroup of Ga(k), hence isomorphic to 2n for some n ≥0. We may assume that g acts as x 7→x + αy, y 7→y, z 7→z + α2y. Then g lifts to Aut(X) if and only if there exists a quadratic form Q such that (x2 + yz)Q + Q2 = αy4 + g∗(B0) + B0. Since the right-hand side does not contain a monomial divisible by x2, we get, as in the previous cases, Q = x2 + yz or Q = 0. Comparing coefficients yields the system of equations dα2 = 0 dα4 = 0 eα8 + dα6 + cα4 + bα2 + α = 0 So, if d ̸= 0, then α = 0 and G(X) is trivial. If d = 0, there are 8 possibilities for α, one for each root of ex8 + cx4 + bx2 + x. All the roots are distinct since the derivative of this polynomial is 1. Here, we also use that e ̸= 0 by Theorem 3.4. Thus G(X) ∼ = 23. (2) (a) Here, X is given by an equation of the form w2 + xyw + xz3 + yz3 + B2 0 with B0 = ax2 + by2 + cz2 + dxz + eyz. 16 IGOR DOLGACHEV AND GEBHARD MARTIN The singularities of the irreducible components of R lie over [1 : 0 : 0] and [0 : 1 : 0]. Let (Q, g) ∈Aut(X). Then, g preserves these two points and the intersection of V (x) and V (y). Moreover, by Proposition 4.2 and Proposition 3.11, g preserves the line V (x + y). Assume that g has odd order. Then, g preserves the three lines V (x), V (y), and V (x+y), hence it is of the form (x, y, z) 7→(x, y, αz). The quadratic form Q satisfies Q2 + xyQ = g∗(B1 + B2 0) + B1 + B2 0. The right-hand side does not contain monomials divisible by xy, hence Q ∈{0, xy}. Now, g∗B1 + B1 = 0 implies that α3 = 1, and if α ̸= 1, then g∗B2 0 + B2 0 = 0 holds if and only if c = d = e = 0. Assume that g has order a power of 2. If g does not swap the points [1 : 0 : 0] and [0 : 1 : 0], then it acts diagonally, hence it is the identity. Therefore, we may assume that g swaps these two points and g2 = id. Hence, g acts as x ↔y. The quadratic form Q satisfies Q2 + xyQ = g∗(B1 + B2 0) + B1 + B2 0, hence a = b and d = e. (2) (b) Here, X is given by an equation of the form w2 + xyw + xz3 + y3z + B2 0 with B0 = ax2 + cz2 + dxz + eyz and the singularities of the irreducible components of R map to [1 : 0 : 0] and [0 : 0 : 1]. Let (Q, g) ∈Aut(X). If g has odd order, then there is a g-invariant line ℓthrough [1 : 0 : 0] and we may assume that ℓ̸⊆V (A). By the same argument as in Case (1) (b), ℓis fixed pointwise. Then, every line through [0 : 0 : 1] is g-invariant. Since g∗A = A, this means that g acts as (x, y, z) 7→(x, y, αz). An automorphism of this form satisfies g∗B1 = B1 if and only if α = 1, so g is trivial. If g has order a power of 2, then by Proposition 3.11, ϕ((Q, g)) ∈Aut(Y ) preserves the two singular fibers of φ : Y →P1, hence ϕ((Q, g)) acts trivially on the base of φ. The 2-Sylow subgroup of automorphisms of the geometric generic fiber of φ is the quaternion group Q8 and ϕ((Q, g)) commutes with the unique involution ϕ(γ) in Q8. This implies that (Q, g) ∈⟨γ⟩, so g is trivial. (3) If V (A) is a double line, then X is given by an equation of the form w2 + x2w + xB1 + B0 with B1 = z3 + ayz2 and B0 = y3z + by2z2 + cz4. The singularity of Rred lies over [0 : 0 : 1]. Let (Q, g) ∈Aut(X). Then, g is of the form (x, y, z) 7→(x, αx + βy, γx + δy + ϵz) with β, ϵ ̸= 0 and Q satisfies the equation Q2 + x2Q = x(g∗B1 + B1) + g∗B0 + B0. (6) The monomials y3z, xz3, xyz2, xy2z and xy3 do not appear on the left-hand side, hence their coefficients on the right-hand side must be zero. This yields the following conditions: ϵ = β−3 AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 17 β9 = 1 δ = a(β + β6) α = a2(1 + β) γ = a3(1 + β2) So, the order of g is equal to the order of β in k×, hence it is equal to 1, 3 or 9. Now, we calculate that if β3 = 1, then g3 acts as (x, y, z) 7→(x, y, a3(β + β2)x + z). Hence, if a ̸= 0, then g is the identity. So, assume that a = 0, so that, in particular, α = δ = γ = 0. Equation (6) becomes Q2 + x2Q = (ϵ3 + 1)xz3 + (β3ϵ + 1)y3z + b(β2ϵ2 + 1)y2z2 + c(ϵ4 + 1)z4. On the left-hand side, the coefficients of z4 and y2z2 are the squares of the coefficients of x2z2 and x2yz, respectively. Since the latter monomials do not appear on the right-hand side, the coefficients of the former monomials must vanish. Therefore, we get the four conditions: ϵ3 + 1 = 0 β3ϵ + 1 = 0 b(β2ϵ2 + 1) = 0 c(ϵ4 + 1) = 0 Hence, if b ̸= 0, then β = ϵ = 1, so G(X) is trivial. If b = 0 and c ̸= 0, then ϵ = 1 and β3 = 1, and so G(X) ∼ = C3. If b = c = 0, then ϵ = β−3 and β9 = 1, hence G(X) ∼ = C9. □ Remark 4.4. With our choice of normal form in Theorem 4.3, the map g 7→(0, g) defines an explicit section of the surjection Aut(X) →G(X) in every case. Remark 4.5. The group 24 that appears in Theorem 4.3 occurs as a group of automorphisms of a del Pezzo surface of degree 4 in all characteristics . In characteristic 0, there is a unique conjugacy class of subgroups isomorphic to 24 in the Cremona group. One can prove, using the theory of birational links, that in characteristic 2, the two subgroups of Crk(2) are not conjugate. Remark 4.6. The fact that 2 and 3 are the only primes that divide the order of Aut(X) can be proven without the classification. It is known that 2, 3, 5, and 7 are the only primes that divide the order of W(E7). To exclude the primes 5 and 7, one can use the Lefschetz fixed-point formula and the known traces of elements of W(E7) acting on the the root lattice of type E7 to get a contradiction with the possible structure of the set of fixed points of an element of the group G(X). 4.3. Conjugacy classes and comparison with the classification in characteristic 0. In this section, we determine the conjugacy classes in W(E7) of the elements of the groups that occur in Theorem 4.3 and, whenever possible, compare the surfaces in Theorem 4.3 with their counterparts in characteristic 0 (see [9, Table 8.9]). To do this, we use the following result. Lemma 4.7. Let X be a del Pezzo surface of degree 2 in characteristic 2. Let X′ be a geometric generic fiber of a lift of X to characteristic 0 and let sp : Aut(X′) →Aut(X) be the specialization map. Then, sp is injective and preserves conjugacy classes. 18 IGOR DOLGACHEV AND GEBHARD MARTIN Proof. Let X →S be a lift of X with geometric generic fiber X′. The map sp sends an automor-phism g ∈Aut(X′) to the special fiber of the closure of g considered as a point of the relative automorphism scheme AutX/S. To see that this is well-defined, we have to explain why AutX/S is proper over S. By passing to the anti-canonical model of X in PS(1, 1, 1, 2), the scheme AutX/S is identified with the stabilizer of X under the action of AutPS(1,1,1,2) on the space HdP2,S of smooth quartic hypersurfaces in PS(1, 1, 1, 2). To check that this stabilizer is proper, it suffices to show that the shear map (G3 a : GL3) × HdP2 → HdP2 × HdP2 (Q, g, w2 + Aw + B) 7→ (w2 + Aw + B, w2 + (g∗A + 2Q)w + g∗B + g∗AQ + Q2) is a proper morphism of schemes over Spec Z. For this, it suffices to check that the individual shear maps for the G3 a-action and the GL3-action are proper. We check this using the valuative criterion. So, let R be an arbitrary discrete valuation ring with field of fractions K and let F = w2 +Aw +B and F ′ = w2 +A′w+B′ be equations of smooth quartics in PR(1, 1, 1, 2) with A, A′ ∈R[x, y, z]2 and B, B′ ∈R[x, y, z]4. Given Q ∈K[x, y, z]2 sending F to F ′, we have the two conditions A + 2Q −A′ = 0 B + AQ + Q2 −B′ = 0. Comparing the valuations of the coefficients of Q2 and AQ + B −B′ in the second equation shows that Q ∈R[x, y, z]2. This proves the valuative criterion of properness for the shear map of the G3 a-action on HdP2. Given g ∈GL3(K) sending F to F ′, we have the two conditions g∗A = A′ g∗B = B′. Replacing g by its Smith normal form, we may assume that g acts as x 7→πexx y 7→πeyy z 7→πezz, where π is a uniformizer of R. Thus, if a monomial xiyjzk appears in A or B with unit coefficient, then iex + jey + kez = 0. We leave it to the reader to check that, because of the smoothness of F and F ′ modulo π, there are enough such monomials to check that ex = ey = ez, that is, that g ∈GL3(R). This is the valuative criterion of properness for the shear map of the GL3-action on HdP2. Since H0(X, TX) = 0, the scheme AutX/S is discrete, hence the specialization map is injective. As H1(X, OX) = H2(X, OX), the relative Picard scheme PicX/S is constant over S. Now, specialization of line bundles is sp-equivariant and compatible with the intersection pairing, hence sp preserves conjugacy classes. □ Remark 4.8. It would be interesting to determine all integers a1, . . . , an and d such that the action of AutP(a1,...,an) on the space Hd of smooth hypersurfaces of degree d in P(a1, . . . , an) is proper. This would be a generalization of [14, Proposition 11.8.2] to the weighted case. AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 19 By Theorem 4.3, we have | Aut(X)| ≤18, so Types I,. . .,V and of [9, Table 8.9] do not have a reduction modulo 2 which is a del Pezzo surface. Similarly, Type VII of [9, Table 8.9] has no analogue in characteristic 2. The surface of Type (3)(ii) of Theorem 4.3 is a reduction modulo 2 of the surface of Type VI in [9, Table 8.9]. Hence, we call this surface Type VI. Since the conjugacy classes of elements of Aut(X) are the same as the ones of the lift, the entry for Type VI in Table 3 is the same as the one in [12, Table 7]. The equations of the surfaces of Type (2)(a)(iii) of Theorem 4.3 define smooth surfaces in characteristic 0 and the automorphisms x ↔y and z 7→ζ3z make sense in characteristic 0. Hence, these surfaces lift to characteristic 0 as del Pezzo surfaces with an action of 2 × 6. As explained above, del Pezzo surfaces of degree 2 with an automorphism group of order bigger than 18 do not have a smooth reduction modulo 2, hence these lifts are of Type VIII [9, Table 8.9], so we also call the surfaces of Type (2)(a)(iii) Type VIII. As in the previous case, the conjugacy classes are the same as in [12, Table 7]. As for the surfaces of Type (1)(a)(ii), we rewrite their equations using the substitution x 7→ x + y + z as w2 + (x2 + y2 + z2 −yz)w + λxyz(z −y) + a(y2 + z2 −yz)2. This equation defines a lift of X to characteristic 0 and the Aut(X)-action lifts as well, since it is generated by the Geiser involution γ : w 7→−w, the involution y ↔z and the automorphism g of order 3 given by x 7→ −x y 7→ z z 7→ z −y. Hence, all surfaces of Type (1)(a)(ii) are reductions modulo 2 of surfaces of Type IX in [9, Table 8.9]. In particular, we can read off the conjugacy classes of elements of Aut(X) from [12, Table 7]. The surfaces of Type (1)(c)(i) are the characteristic two analogs of Type X from [9, Table 8.9]. We claim that every involution on a surface X of type (1)(c)(i) which is different from the Geiser involution is of conjugacy class 3A1/4A1. It suffices to check this for the surface given by w2 + (x2 + yz)w + xy3 + z4, where G(X) acts as gα : x 7→x + αy, z 7→α2x + z with α8 = α. After using the substitution z 7→αx + y + z, y 7→α6x + α6y, the equation of X becomes w2 + (x2 + xy + y2 + α6(y + x)z + α4(x2 + y2))w + α4(x3y + x2y2 + xy3) + α3(x4 + y4 + z4) and the involution gα acts as x ↔y. Then, the above equation makes sense in characteristic 0 and defines a lift of X together with the involution gα. In particular, by [12, Table 7], the conjugacy class of gα is 3A1 or 4A1. The equations of Types (2)(a)(ii) and (3)(i) make sense in characteristic 0, where they define a lift of the surface together with the C3-action. These lifts must be of Type XI from [9, Table 8.9]. Similarly, the equations of Types (1)(a)(i) and (2)(a)(i) define lifts to characteristic 0 together with the C2-action. Hence, these lifts are of Type XII from [9, Table 8.9]. We summarize the classification of automorphism groups of del Pezzo surfaces of degree 2 in Table 3 in the Appendix. There, in the first column, we give the name of the corresponding family, 20 IGOR DOLGACHEV AND GEBHARD MARTIN both in the notation of Theorem 4.3 and in the notation of [9, Table 8.9]. The second and third columns give the group Aut(X) and its size. In the remaining columns, we list the number of elements of a given Carter conjugacy class in Aut(X). 5. DEL PEZZO SURFACES OF DEGREE 1 5.1. The anti-bicanonical map. As in the case of degree 2, we start by describing the geometry of del Pezzo surfaces of degree d = 1 and we refer to for characteristic-free facts on del Pezzo surfaces. Recall that the anti-bicanonical system | −2KX| defines a finite morphism f : X →Q onto a quadratic cone Q ⊆P3. As in degree 2, it turns out that this map is always separable, even in characteristic 2. Proposition 5.1. The anti-bicanonical linear system | −2KX| defines a finite separable morphism f : X →Q of degree 2. Proof. If f is not separable, then p = 2 and f is purely inseparable. But then f is a homeomorphism in the étale topology. This is impossible, since H2 ét(X, Zℓ) has rank 9 (because X is the blow-up of 8 points in the plane), while H2 ét(Q, Zℓ) has rank 1. □ Let R(X, −KX) = ∞ M n=0 H0(X, OX(−nKX)) be the graded anti-canonical ring of X. By the Riemann–Roch-Theorem, we have dimk R(X, −KX)1 = 2 dimk R(X, −KX)2 = 4 dimk R(X, −KX)3 = 7. Thus, we can choose u, v from R(X, −KX)1, x ∈R(X, −KX)2 \ S2(R(X, −KX)1), and y ∈ R(X, −KX)3 \ S3(R(X, −KX)1) + R(X, −KX)1 ⊗R(X, −KX)2 and obtain the following relation between the generators y2 + y(a1x + a3) + x3 + a2x2 + a4x + a6 = 0, (7) where ak denotes a binary form of degree k in u and v. In particular, via Equation (7), we can view X as a surface of degree 6 in the weighted projective space P(1, 1, 2, 3), the anti-canonical map is the projection of this surface onto the u, v-coordinates, and the anti-bicanonical map is the projection onto the u2, uv, v2, x-coordinates. If p ̸= 2, we can replace y with y + 1 2(a1x+a3) to assume that a1 = a3 = 0. The surface X is a double cover of a quadratic cone Q ∼ = P(1, 1, 2). The branch curve B = V (x3 + a2x2 + a4x + a6) is a curve of degree 6 not passing through the vertex of Q. It is a smooth curve of genus 4 with a vanishing theta characteristic g1 3 defined by the ruling of Q. If we blow up the vertex of Q, we obtain a surface isomorphic to the rational minimal ruled surface F2. The preimage of the curve B is a curve in the linear system |6f + 3e|, where f and e are the standard generators of Pic(F2) with f2 = 0 and e2 = −2. The curve B is its canonical model in P3. In our case, when the characteristic p = 2, the analog of B is the curve V (a1x + a3) in Q. In particular, Proposition 5.1 tells us that a1x + a3 ̸= 0 and there is no way of removing these terms. Moreover, the curve B always passes through the vertex of Q and its strict transform on F2 is in |3f| if a1 = 0 and in |3f + e| if a1 ̸= 0. The analog of the involution y 7→−y, classically called the AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 21 Bertini involution, is the involution β defined by replacing y with y + a1x + a3. As in the classical case, we call this β Bertini involution. By calculating the partial derivatives in Equation (7), the smoothness of X yields the following restrictions on the ai: Proposition 5.2. In (7), the smoothness of X is equivalent to the condition that the equations a1x + a3 = 0 x2 + a1y + a4 = 0 a1,uxy + a3,uy + a2,ux2 + a4,ux + a6,u = 0 a1,vxy + a3,vy + a2,vx2 + a4,vx + a6,v = 0 with ai,u := ∂ai ∂u and ai,v := ∂ai ∂v have no common solutions on X. 5.2. Normal forms. In this section, we find normal forms for del Pezzo surfaces of degree 1 in characteristic 2. In total, we will have 14 different normal forms, corresponding to the 14 possible combinations of singularities of the ramification curve R and the branch curve B. First, we simplify the equations of the branch curve. Lemma 5.3. Let X be a del Pezzo surface of degree 1 given by Equation (7). Then, after a suitable change of coordinates, we may assume that the equation a1x + a3 of B is one of the following: (1) ux + v3 (2) ux (3) uv(u + v) (4) u2v (5) u3 Proof. If a1 ̸= 0, we may assume that a1 = u after applying a linear substitution in u and v. Then, a substitution of the form x 7→x + b2 for a suitable binary form b2 of degree 2 in u and v allows us to set a3 = λv3. Then, rescaling v, we can assume λ ∈{0, 1}. If a1 = 0, we get three cases according to the number of distinct roots of a3. The equation can be normalized by applying a linear substitution in u and v to get Cases (3), (4), and (5). □ If we consider P(1, 1, 2) as a quadratic cone Q in P3, these 5 normal forms for a1x + a3 correspond to the cases where B is a twisted cubic, a union of a line and a conic, a union of three lines, a union of a double line and a simple line, or a triple line, respectively. Later, we will use automorphisms of P(1, 1, 2) that preserve the equation of B and the form of Equation (7) in order to move the images of the singular points of R to special positions. In the following lemma, we describe this group of automorphisms. Lemma 5.4. Let H ⊆Aut(k[u, v, x]) ⊆Aut(k[u, v, x, y]) be the subgroup of automorphisms that preserve a1x + a3, act on x as x 7→x + b2 for some binary quadratic form b2 in u and v, and that map Equation (7) to one of the same form, with possibly different a2, a4, and a6. Then, H consists of substitutions of the form u 7→ αu + βv v 7→ γu + δv x 7→ x + b2 where α, β, γ, δ ∈k such that αδ + βγ ̸= 0, and 22 IGOR DOLGACHEV AND GEBHARD MARTIN (1) if a1x + a3 = ux + v3, then α = 1, β = 0, δ3 = 1, b2 = γ3u2 + γ2δuv + γδ2v2. In particular, H ∼ = k+ : 3. (2) if a1x + a3 = ux, then α = 1, β = b2 = 0. In particular, H ∼ = k+ : k×. (3) if a1x+a3 = uv(u+v), then αγ(α+γ) = βδ(β +δ) = 0, α2δ +βγ2 = αδ2 +β2γ = 1. In particular, H ∼ = k[u, v]2 : (3 × S3) (4) if a1x + a3 = u2v, then β = γ = 0, δ = α−2. In particular, H ∼ = k[u, v]2 : k×. (5) if a1x + a3 = u3, then β = 0, α3 = 1. In particular, H ∼ = k[u, v]2 : (k : k× × 3). For the convenience of the reader, we record the effect of a general substitution on the remaining ai in Equation (7). The proof is a straightforward calculation. Lemma 5.5. A substitution of the form u 7→ αu + βv v 7→ γu + δv x 7→ x + b2 y 7→ y + b1x + b3 where α, β, γ, δ ∈k and bi ∈k[u, v]i such that αδ + βγ ̸= 0, changes the coefficients (a2, a4, a6) in Equation (7) as follows a2 7→ σ∗a2 + σ∗a1b1 + b2 1 + b2 a4 7→ σ∗a4 + σ∗a3b1 + σ∗a1b1b2 + σ∗a1b3 + b2 2 a6 7→ σ∗a6 + σ∗a4b2 + σ∗a3b3 + σ∗a2b2 2 + σ∗a1b2b3 + b2 3 + b3 2, where σ∗ai := ai(αu + βv, γu + δv). Now, we are ready to describe the normal forms for del Pezzo surfaces of degree 1. Theorem 5.6. Every del Pezzo surface of degree 1 in characteristic 2 is isomorphic to a surface of degree 6 in P(1, 1, 2, 3) given by an equation of the form y2 + y(a1(u, v)x + a3(u, v)) + x3 + a2(u, v)x2 + a4(u, v)x + a6(u, v) = 0, (8) where (a1, a2, a3, a4, a6) is one of the following: AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 23 Name a1x + a3 a2 a4 a6 #Parameters (1)(a) ux + v3 av2 bu4 + cu2v2 + dv4 eu6 + fu4v2 + gu2v4 + hv6 8 (1)(b) ux + v3 av2 cu2v2 + dv4 eu6 + fu4v2 + gu2v4 + hv6 7 (1)(c) ux + v3 av2 dv4 eu6 + fu4v2 + gu2v4 + hv6 6 (1)(d) ux + v3 av2 cu2v2 eu6 + fu4v2 + gu2v4 + hv6 6 (1)(e) ux + v3 av2 0 eu6 + fu4v2 + gu2v4 + hv6 5 (2)(a) ux av2 v4 bu6 + du4v2 + eu3v3 + fu2v4 + guv5 + hv6 7 (2)(b) ux av2 v4 bu6 + du4v2 + fu2v4 + guv5 + hv6 6 (2)(c) ux av2 v4 bu6 + du4v2 + eu3v3 + fu2v4 + hv6 6 (2)(d) ux av2 v4 cu5v + du4v2 + fu2v4 + hv6 5 (2)(e) ux av2 0 bu6 + du4v2 + eu3v3 + fu2v4 + euv5 + hv6 6 (2)(f) ux av2 0 bu6 + du4v2 + fu2v4 + uv5 + hv6 5 (3) uv(u + v) auv bu3v + (b + c)u2v2 + cuv3 du5v + eu3v3 + fuv5 6 (4) u2v 0 au3v + bu2v2 + cuv3 du5v + eu3v3 + uv5 5 (5) u3 0 au3v + bu2v2 + cuv3 uv5 + dv6 4 Moreover, the parameters satisfy the conditions summarized in the following table, where ∆:= a4 3 + a3 1a3 3 + a4 1(a2 4 + a1a3a4 + a2a2 3 + a2 1a6). In this table, we also describe the singularities of the irreducible components of the reduction Rred of the ramification curve R. Name Conditions on the parameters Singularities of the irreducible components of Rred (1)(a) ∆has only simple roots A2 over [1 : v : v3] with v8 + dv6 + cv4 + bv2 = 0 v8 + dv6 + cv4 + bv2 has four distinct roots (1)(b) ∆has only simple roots, c, d ̸= 0 A4 over [1 : 0 : 0] 2A2 over [1 : v : v3] with v4 + dv2 + c = 0 (1)(c) ∆has only simple roots, d ̸= 0 A6 over [1 : 0 : 0] A2 over [1 : d 1 2 : d 3 2 ] (1)(d) ∆has only simple roots, c ̸= 0 2A4 over [1 : 0 : 0] and [1 : c 1 4 : c 3 4 ] (1)(e) e ̸= 0 A8 over [1 : 0 : 0] (2)(a) u−4∆has only simple roots, e, g, (g2 + a + h) ̸= 0 3A2 over [0 : 1 : 1], [1 : 0 : 0] and [g 1 2 : e 1 2 : 0] (2)(b) b, g, (g2 + a + h) ̸= 0 A4 over [1 : 0 : 0] A2 over [0 : 1 : 1] (2)(c) b, e, (a + h) ̸= 0 3A2 over [0 : 1 : 1], [1 : 0 : 0] and [0 : 1 : 0] (2)(d) c, (a + h) ̸= 0 A4 over [0 : 1 : 0] A2 over [0 : 1 : 1] (2)(e) u−6∆has only simple roots, e ̸= 0 3A2 over [0 : 1 : 0], [1 : 0 : 0] and [1 : 1 : 0] (2)(f) u−6∆has only simple roots A4 over [1 : 0 : 0] A2 over [0 : 1 : 0] (3) d, f ̸= 0, (d + e + f) ̸∈{0, 1} 3A2 over [1 : 0 : 0], [0 : 1 : 0] and [1 : 1 : 0] (4) d ̸= 0 2A2 over [1.0 : 0] and [0 : 1 : 0] (5) − A2 over [0 : 1 : 0] Remark 5.7. The conditions on the parameters that guarantee the smoothness of X are equivalent to the conditions that Equation (8) is the Weierstrass equation of an elliptic fibration with only irreducible fibers. We will study this fibration later in Section 5.4. The homogeneous polynomial ∆ appearing in Theorem 5.6 is the discriminant of this fibration. 24 IGOR DOLGACHEV AND GEBHARD MARTIN Proof of Theorem 5.6. By Lemma 5.3, there are, up to choice of coordinates, 5 possible equations for B. We will now give normal forms in each case. (1) a1x + a3 = ux + v3 Here, the ramification curve R is given by the two equations ux + v3 = 0 y2 + x3 + a2x2 + a4x + a6 = 0. One checks that the curve R is smooth at the points with u = 0. On the affine chart u = 1, it is given in A2 by the single equation y2 + v9 + a2(1, v)v6 + a4(1, v)v3 + a6(1, v), so it has singularities over the roots of the derivative F ′ of F := v9 + a2(1, v)v6 + a4(1, v)v3 + a6(1, v). After applying an element of H in Lemma 5.4, we may assume that 0 is the root of highest multiplicity of F ′. Now, substitutions as in Lemma 5.5 that fix u, v, and x do not change the location of the points that lie under singularities of R and thus, by Lemma 5.5, we can assume that a2 = av2, a4 = bu4 +cu2v2 +dv4, a6 = eu6 +fu4v2 +gu2v4 +hv6. With this notation, the polynomial F ′ becomes v8+dv6+cv4+bv2 and the conditions of Proposition 5.2 boil down to v8+dv6+cv4+bv2 and ∆(1, v) = v12 + v9 + (d2 + a)v8 + dv7 + hv6 + cv5 + (c2 + g)v4 + bv3 + fv2 + b2 + e not having a common solution. The former is the derivative of the latter, hence we want that the latter has only simple zeroes. Now, if F ′ has four distinct roots, we are in Case (a). If F ′ has less than four distinct roots, we may assume b = 0. If F ′ has exactly three roots, then we are in Case (b). If b = 0, the polynomial F ′ has exactly two roots if and only if either c = 0 and d ̸= 0, which is Case (c), or d = 0 and c ̸= 0, which is Case (d). Finally, F ′ has a single root if and only if b = c = d = 0, which is Case (e). (2) a1x + a3 = ux Here, the ramification curve has two components R1 and R2. The curve R1 is given by u = 0 y2 + x3 + a2x2 + a4x + a6 = 0. This curve has a unique singularity, which is of type A2 and located over [0 : 1 : a4(0, 1) 1 2 ]. Rescaling v, we may assume that a4(0, 1) ∈{0, 1}. The curve R2 is given by x = 0 y2 + a6 = 0. This curve has singularities over the points [u : v : 0] where the derivatives of a6 by u and v both vanish. First, assume that a4(0, 1) = 1 and one of the singularities of R2 does not lie over [0 : 1 : 0]. Then, using a substitution in v as in Lemma 5.4, we can assume that one of them lies over [1 : 0 : 0]. Substitutions as in Lemma 5.5 which fix u, v, and x do not change the location of these points and, after applying one of them, we may assume that a2 = av2, a4 = v4, and a6 = bu6 + du4v2 + eu3v3 + fu2v4 + guv5 + hv6. If e, g ̸= 0, this is Case (a), if e = 0 and g ̸= 0, this is Case (b), and if e ̸= 0 and g = 0, this is Case (c). The conditions of Proposition AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 25 5.2 boil down to ∆(1, v) = v8 + hv6 + gv5 + fv4 + ev3 + dv2 + b having only simple roots and g2 ̸= a + h. In particular, (e, g) ̸= (0, 0). If a4(0, 1) = 1, R2 has a unique singularity, and this singularity lies over [0 : 1 : 0], then the only odd monomial in a6 is u5v. A substitution of the form v 7→v + µu and substitutions as in the previous paragraph allow us to assume that a2 = av2, a4 = v4, and a6 = cu5v + du4v2 + fu2v4 + hv6. The conditions of Proposition 5.2 become a + h ̸= 0 and c ̸= 0. This is Case (d). If a4(0, 1) = 0, then Proposition 5.2 implies that R2 is smooth over [0 : 1 : 0]. Hence, we can assume that one of the singularities of R2 lies over [1 : 0 : 0]. Using a substitution as in Lemma 5.5 which fixes u, v and x, we may assume that a2 = av2, a4 = 0, and a6 = bu6 + du4v2 + eu3v3 + fu2v4 + guv5 + hv6. Since R2 is smooth over [0 : 1 : 0], we have g ̸= 0. If e ̸= 0, we can scale v so that g = e. This is Case (e). If e = 0, we scale v so that g = 1. This is Case (f). (3) a1x + a3 = uv(u + v) The curve B has the three irreducible components B1, B2, and B3, given by V (u), V (v), and V (u + v), respectively. The corresponding components R1, R2, and R3 of R are given by y2 + x3 + a2(0, v)x2 + a4(0, v)x + a6(0, v), y2 + x3 + a2(u, 0)x2 + a4(u, 0)x + a6(u, 0), and y2 + x3 + a2(u, u)x2 + a4(u, u)x + a6(u, u), respectively. The singular points of R1, R2, and R3 lie over [0 : 1 : a4(0, 1) 1 2 ], [1 : 0 : a4(1, 0) 1 2 ], and [1 : 1 : a4(1, 1) 1 2 ], respectively. A substitution as in Lemma 5.4 which fixes u and v allows us to set a4(0, 1) = a4(1, 0) = a4(1, 1) = 0, that is, that a4 = bu3v + (b + c)u2v2 + cuv3 for some b, c ∈k. Then, a substitution as in Lemma 5.5 which fixes u, v, and x allows us to set a2 = auv and a6 = du5v +eu3v3 +fuv5. The conditions of Proposition 5.2 become d ̸= 0, f ̸= 0 and d + e + f ̸∈{0, 1}. (4) a1x + a3 = u2v The curve B has two irreducible components B1 and B2, given by V (u) and V (v), respectively. The corresponding components R1 and R2 of R are given by y2 + x3 + a2(0, v)x2 + a4(0, v)x + a6(0, v), and y2 + x3 + a2(u, 0)x2 + a4(u, 0)x + a6(u, 0), respectively. The singular points of R1 and R2 lie over [0 : 1 : a4(0, 1) 1 2 ] and [1 : 0 : a4(1, 0) 1 2 ], respectively. A substitution as in Lemma 5.5, which fixes u and v allows us to set a4(0, 1) = a4(1, 0) and that a2 is a square. Then, a substitution with b2 = b3 = 0 allows us to eliminate a2. Finally, a substitution with b1 = b2 = 0 allows us to assume that a6 contains no squares. If we write a6 = du5v + eu3v3 + fuv5, then the conditions of Proposition 5.2 becomes d ̸= 0 and f ̸= 0, and we can rescale f to 1. (5) a1x + a3 = u3 The curve R is given by y2 + x3 + a2(0, v)x2 + a4(0, v)x + a6(0, v) and it is singular over [0 : 1 : a4(0, 1) 1 2 ]. 26 IGOR DOLGACHEV AND GEBHARD MARTIN We apply the same substitutions as in the previous case to remove a2. Then, we apply a substitution as in Lemma 5.5 with b2 = b2 1 to remove the v4-term in a4. Next, using a substitution that fixes u, v, and x with b1 = 0, we eliminate the squares in a6, write a6 = du5v +eu3v3 +fuv5, and rescale f to 1. After that, a substitution of the form v 7→v + λu, and eliminating the square again, allows us to set d = 0. Next, a substitution as in Lemma 5.5 which fixes u and v, with b1 = λu, b2 = λ2u2, and b3 = µu3 for suitable λ and µ allows us to eliminate the u4-term in a4 without changing a6. Finally, we apply a substitution with b3 = ev3 and rename the parameters to assume that a6 = uv5 + dv6. The conditions of Proposition 5.2 are fulfilled for every choice of parameters. □ 5.3. Fake tritangent planes and odd theta characteristics. It is known that a del Pezzo surface X of degree 1 contains 240 (−1)-curves (see [9, 8.7], where the proof is characteristic free). They come in pairs Ei + E′ i ∈| −2KX| with Ei · E′ i = 3. The Bertini involution β swaps the two curves in a pair. The image of Ei + E′ i under the anti-bicanonical map f is a plane section of Q not passing through the vertex. If p ̸= 2, each of the resulting 120 planes is a tritangent plane to the branch sextic curve and, conversely, every tritangent plane to the branch sextic gives rise to a pair of (−1)-curves Ei + E′ i with Ei + E′ i ∈| −2KX|. A tritangent plane intersects the branch curve in twice a positive divisor of degree 3. This divisor is an odd theta characteristic of the curve. It is known that the number of odd theta characteristics on a smooth curve of genus 4 is equal to 120. For arbitrary p, we still have the following. Lemma 5.8. The preimage f−1(C) of an integral conic C = V (x+b2) is a sum of two (−1)-curves if and only if it is reducible. Proof. Since f has degree 2 and C is integral, the curve f−1(C) is reducible if and only if it has two irreducible components L1 and L2. These components satisfy L1 + L2 ∈| −2KX|, L1 · L2 = 3, and L2 1 = L2 2. Via adjunction, this easily implies that L1 and L2 are (−1)-curves. The converse is clear. □ So, even if p = 2, we have 120 splitting conics and we call the corresponding planes in P3 fake tritangent planes in analogy with the situation in the other characteristics. For the rest of this section, we assume p = 2. Since the anti-bicanonical map is étale outside the branch curve V (A), the intersection Ei ∩E′ i lies on the ramification curve R. Let L = OR(Ei) ∼ = OR(E′ i). It is an invertible sheaf on C of degree 2. We have L⊗2 ∼ = OR(Ei + E′ i) ∼ = OR(−2KX). Since B ∈|OP(1,1,2)(3)|, we have R ∈| −3KX|. By the adjunction formula, we have ωR ∼ = OR(−3KX + KX) ∼ = L⊗2. As in the case of degree 2, invertible sheaves on R that satisfy this property are called invertible theta characteristics. Let Θ(R) be the set of isomorphism classes of such invertible theta characteristics on R and let J(R) be the generalized Jacobian of R. As in Lemma 3.6, one can prove that J(R) is a product of additive groups. Lemma 5.9. The generalized Jacobian J(R) of R is isomorphic to G4 a. Thus, as in degree two, finding fake tritangent planes using theta characteristics on R is subtle in characteristic two. We refer to Example 3.7 for an example in degree two that further illustrates this point and leave it to the reader to find a similar example in degree one. AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 27 5.4. Rational elliptic surfaces. Equation (7) can also serve as the Weierstrass equation of the rational surface with a genus 1 fibration φ : Y →P1 obtained by blowing up the base point p0 of | −KX|. Since X is a del Pezzo surface, all members of | −KX| are irreducible, hence so are all fibers of φ. The discriminant of φ is ∆= a4 3 + a3 1a3 3 + a4 1(a2 4 + a1a3a4 + a2a2 3 + a2 1a6). The singular fibers of φ lie over the zeroes of ∆. Moreover, the Bertini involution, which is given by β : y 7→y + (a1x + a3), induces the inversion on the group structure of each fiber. In particular, for [u0 : v0] ∈P1, if a1(u0, v0)x + a3(u0, v0) = 0, the corresponding fiber F of φ is cuspidal, if a1(u0, v0) = 0 and a3(u0, v0) ̸= 0, then F is smooth and supersingular, and in the other cases, F is either nodal, or smooth and ordinary, according to whether ∆(u0, v0) is zero or not. Applying these observations to the normal forms of Theorem 5.6, we obtain the following information on φ. Proposition 5.10. Let X be a del Pezzo surface of degree 1 given by one of the normal forms in Theorem 5.6. Then, the associated genus 1 fibration φ is elliptic and all its fibers are irreducible. The discriminant ∆and the singular fibers of φ are given in the following table. Name ∆ Nodal fibers over the Cuspidal fibers over (1)(a) v12 + u3v9 + (d2 + a)u4v8 + du5v7 + hu6v6 + cu7v5 12 roots of ∆ – +(c2 + g)u8v4 + bu9v3 + fu10v2 + (b2 + e)u12 (1)(b) v12 + u3v9 + (d2 + a)u4v8 + du5v7 + hu6v6 + cu7v5 12 roots of ∆ – +(c2 + g)u8v4 + fu10v2 + eu12 (1)(c) v12 + u3v9 + (d2 + a)u4v8 + du5v7 + hu6v6 12 roots of ∆ – +gu8v4 + fu10v2 + eu12 (1)(d) v12 + u3v9 + au4v8 + hu6v6 + cu7v5 12 roots of ∆ – +(c2 + g)u8v4 + fu10v2 + eu12 (1)(e) v12 + u3v9 + au4v8 + hu6v6 12 roots of ∆ – +gu8v4 + fu10v2 + eu12 (2)(a) u4(v8 + u2(bu6 + du4v2 + eu3v3 + fu2v4 + gsv5 + hv6)) 8 roots of u−4∆ [0 : 1] (2)(b) u4(v8 + u2(bu6 + du4v2 + fu2v4 + gsv5 + hv6)) 8 roots of u−4∆ [0 : 1] (2)(c) u4(v8 + u2(bu6 + du4v2 + eu3v3 + fu2v4 + hv6)) 8 roots of u−4∆ [0 : 1] (2)(d) u4(v8 + u2(cu5v + du4v2 + fu2v4 + hv6)) 8 roots of u−4∆ [0 : 1] (2)(e) u6(bu6 + du4v2 + eu3v3 + fu2v4 + euv5 + hv6) If h ̸= 0 : 6 roots of u−6∆ [0 : 1] If h = 0 : 5 roots of u−7∆ (2)(f) u6(bu6 + du4v2 + fu2v4 + uv5 + hv6) If h ̸= 0 : 6 roots of u−6∆ [0 : 1] If h = 0 : 5 roots of u−7∆ (3) u4v4(u + v)4 – [1 : 0], [0 : 1], [1 : 1] (4) u8v4 – [1 : 0], [0 : 1] (5) u12 – [0 : 1] Remark 5.11. As in Remark 3.12, we point out the connection to Lang’s classification of singular fibers on rational elliptic surfaces: Our normal forms for del Pezzo surfaces of degree 1 yield normal forms for all rational elliptic surfaces with a section in characteristic 2 all of whose fibers are irreducible. 28 IGOR DOLGACHEV AND GEBHARD MARTIN 6. AUTOMORPHISM GROUPS OF DEL PEZZO SURFACES OF DEGREE 1 This section consists of three parts. In the first part, we collect various restrictions on the group G(X) = Aut(X)/⟨β⟩arising from the geometry of X. In the second part, we give an explicit description of Aut(X) in terms of Equation (7) and use it to classify all surfaces where G(X) is non-trivial and to determine the group Aut(X) in every case. In the third part, we compare our classification with the classification in characteristic 0 from [9, Table 8.14] and use this to determine the conjugacy classes of all elements in Aut(X) (see Table 4 in the Appendix). Throughout, we assume p = 2. 6.1. Restrictions on G(X). Since the elliptic fibration φ : Y →P1 associated to X is obtained by blowing up the base point of | −KX|, we can identify Aut(X) with the subgroup of Aut(Y ) preserving a chosen section. Let r : Aut(X) →Aut(P1) be the natural homomorphism defined by the action of Aut(X) on the coordinates [u : v] of the base of φ. Since φ is the unique relatively minimal smooth proper model of its generic fiber Fη, the kernel K = Ker(r) is isomorphic to the group of automorphisms of the elliptic curve Fη. In particular, K contains the Bertini involution β and it can contain more automorphisms only if the j-invariant of Fη is equal to 0 = 1728, in which case K is a subgroup of Q8 : 3 ∼ = SL2(F3). Let P be the image of r. Evidently, P is a finite subgroup of Aut(P1) that leaves invariant the set S1 of points p = [ui : vi] corresponding to the singular fibers. It also leaves invariant the set S2 of the projections of singular points of the irreducible components of the ramification curve R. The following proposition shows what kind of groups can be expected to occur for P. We use the known classification of finite subgroups of Aut(P1) ∼ = PGL2(k) ∼ = SL2(k) [12, Theorem 2.5]. Proposition 6.1. The group P is isomorphic to Gξ,A or D2n. Proof. Since SL2(2) ∼ = S3 ∼ = D6, it suffices to show that SL2(Fq) ̸⊆P for q = 2m and m ≥2. Since the set S2 has cardinality at most 4 and P preserves S2, every homogeneous polynomial F with simple roots along S2 is P-semi-invariant of degree at most 4. On the other hand, by [16, Theorem 6.1.8], the ring k[u, v]SL2(Fq) is generated over Fq by the Dickson polynomials L and d2,1 of degrees q + 1 and q2 −q, respectively. If SL2(q) ⊆P, then F is also a semi-invariant polynomial for SL2(q) and if q ̸= 2, then SL2(Fq) is simple, so F ∈k[u, v]SL2(q) = k[L, d2,1]. Hence, q = 2, as claimed. □ We recall from [12, §1.3] that the image of the Bertini involution β under the injective homo-morphism ρ : Aut(X) →W(E8) is equal to −idE8. However, in contrast to the situation in degree 2, the extension W(E8) →W(E8)/(−idE8) ∼ = O+ 8 (2) does not split. The semi-direct product W(E8) = 2.GO+ 8 (2) corresponds to a non-trivial homomorphism O+ 8 (2) →C2, whose kernel is a simple group O8(2), where we use the ATLAS notation. Therefore, in order to determine Aut(X), it is not enough to determine the image G(X) of the homomorphism Aut(X) →Aut(X)/⟨β⟩, and thus the calculation of Aut(X) is more complicated than in the case of del Pezzo surfaces of degree 2. Let us summarize the restrictions on Aut(X) and G(X) that we have collected by now. Theorem 6.2. Let X be a del Pezzo surface of degree 1 in characteristic 2. Let G(X) be the image of the homomorphism Aut(X) →Aut(P(1, 1, 2)), let K be the kernel of the homomorphism r : Aut(X) →Aut(P1), let P be the image of r, and let φ : Y →P1 be the elliptic fibration associated to X. Then, the following hold: AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 29 (i) Aut(X) is a central extension of G(X) by ⟨β⟩∼ = C2. (ii) Aut(X) is an extension of P by K. (iii) Aut(X) is a subgroup of W(E8). (iv) G(X) is a subgroup of O+ 8 (2). (v) K is the automorphism group of the generic fiber of φ. (vi) P is isomorphic to Gξ,A or D2n. (vii) P preserves the set S1 of points lying under singular fibers of φ. Moreover, it preserves the decomposition of S1 into subsets corresponding to isomorphic fibers. (viii) P preserves the set S2 of points lying under the singularities of R. Moreover, it preserves the decomposition of S2 into subsets of isomorphic singularities. (ix) The j-function of φ is P-invariant. This yields the following preliminary restrictions on Aut(X) and G(X). Corollary 6.3. Let X be a del Pezzo surface of degree 1 in characteristic 2 given by one of the normal forms in Theorem 5.6. (i) In Case (1), G(X) is a subgroup of A4. (ii) In Cases (2) (a), (2) (b), (2) (c), and (2) (d), G(X) is a subgroup of 23. (iii) In Cases (2) (e) and (2) (f), G(X) is a subgroup of C5 or C2. (iv) In Case (3), K is a subgroup of SL2(3) and P is a subgroup of S3. (v) In Case (4), K is a subgroup of SL2(3) and P is cyclic of order 1, 3, 5, 7, 9, or 15. (vi) In Case (5) K is a subgroup of SL2(3) and P ∼ = Gξ,A, where ξ is a primitive n-th root of unity with n ∈{1, 3, 5, 7, 9, 15}. Proof. In Case (1), the generic fiber of φ is ordinary, hence K = ⟨β⟩and G(X) ∼ = P. The fibration φ has 12 nodal fibers, hence the j-function has 12 poles, so |P| | 12. Since P is isomorphic to Gξ,A or D2n with n odd, this implies that P is isomorphic to a subgroup of A4. In Cases (2), we also have K = ⟨β⟩and G(X) ∼ = P. In Cases (2) (a), (2) (b), (2) (c), and (2) (d), the fibration φ has 8 nodal fibers, hence |P| | 8. This implies that P is elementary abelian of order 1, 2, 4 or 8. In Cases (2) (e) and (2) (f), the fibration φ has 5 or 6 nodal fibers. If it has 5 nodal fibers, then |P| | 5, hence P is a subgroup of C5. If it has 6 nodal fibers, then P is either a subgroup of C2 or isomorphic to the dihedral group D6. In the latter case, P acts without fixed point on P1, which is impossible, since φ admits a unique cuspidal fiber. In Case (3), we have K ⊆SL2(3), since the generic fiber of φ is supersingular. Since φ has three singular fibers, P is isomorphic to a subgroup of S3. In Case (4), we also have K ⊆SL2(3). Since one of the components of R is reduced and the other is not, P acts trivially on S2, hence with two fixed points on P1. So, P is cyclic of odd order. Moreover, P is a subgroup of O+ 8 (2). In particular, P admits a faithful representation of dimension at most 8. Hence, if we denote Euler’s totient function by ϕ, then ϕ(|P|) ≤8. Thus, P is of order 1, 3, 5, 7, 9 or 15. In Case (5), we have K ⊆SL2(3) and the action of P on P1 fixes the point lying under the unique singular fiber of φ, hence P ∼ = Gξ,A. The order of ξ can be bounded by the same argument as in the previous paragraph. □ In particular, we get upper bounds on the size of Aut(X) in every case. Further information on the 2-groups that can occur in Case (5) can be obtained using the following remark. Remark 6.4. Since the maximal powers of 2 that divide |W(E8)| and |W(D8)| are both 214, and since W(D8) is a subgroup of W(E8), the 2-Sylow subgroups P in W(E8) are isomorphic to 30 IGOR DOLGACHEV AND GEBHARD MARTIN the 2-Sylow subgroups in W(D8) = 27 : S8. Hence, P is isomorphic to 27 : (S8)2, where 27 acts on Z8 by an even number of sign changes and (S8)2 is a 2-Sylow subgroup of S8 acting as permutations on Z8. The group (S8)2 is isomorphic to the symmetry group of a binary tree of depth 3, considered as a subgroup of S8 via the permutation it induces on the leaves of the tree. An equivalent description is as the wreath product D8 ≀C2, where D8 × D8 is a subgroup of S4 × S4 ⊂S8. The Bertini involution β corresponds to the element (−1, id) that changes all signs. The 2-groups that can occur in Corollary 6.3 are isomorphic to subgroups of P. In the following example, we apply this remark to give an explicit description of the group 21+6 + , which will occur in our classification. Example 6.5. With notation as in the previous remark, let G ⊆P be a subgroup containing β such that G/⟨β⟩is an elementary abelian 2-group and such that β ∈Q8 ⊆G. Then, each element of G is of the form (σ, τ), where ord(τ) ≤2 and either τ preserves the set of coordinates whose sign is changed by σ and then (σ, τ) has order 1 or 2, or τ swaps this set with the set of coordinates whose sign is not changed and then (σ, τ) has order 4. In particular, in the latter case, τ has cycle type (2, 2, 2, 2). Since Q8 ⊆G, the image of G →(S8)2 contains a subgroup H of order 4 generated by involutions of cycle type (2, 2, 2, 2). The centralizer C of H is of order 8 and its non-trivial elements are involutions of cycle type (2, 2, 2, 2). The kernel of G →(S8)2 consists of sign changes σ that are compatible with all τ ∈H in the sense that (σ, τ)2 ∈⟨β⟩. One checks that the group N of all such compatible sign changes has order 16 and that all elements of N are also compatible with C. Then, G is a subgroup of the resulting extension M of C by N. We have M/⟨β⟩= 26. This is a quadratic space over F2 with the quadratic form q : M/⟨β⟩→ ⟨β⟩defined as q(x) = ˜ x2, where ˜ x is a lift of x to M. The subspace N/⟨β⟩is totally isotropic of dimension 3 and the description of M in the previous paragraph shows that q is non-degenerate. Hence, by [1, (23.10)], M is isomorphic to the extra-special 2-group of 21+6 + . 6.2. Classification. Recall that X is a hypersurface of degree 6 in P(1, 1, 2, 3) given by Equation (7). An automorphism of P(1, 1, 2, 3) is induced by a substitution of the form u 7→ αu + βv v 7→ γu + δv x 7→ εx + b2 y 7→ ζy + b1x + b3 where α, β, γ, δ, ε, ζ ∈k, bi ∈k[u, v]i, and αδ + βγ, ε, ζ ̸= 0. The substitutions that induce the identity on P(1, 1, 2, 3) are the ones with β, γ, b1, b2, b3 = 0 and γ = α, ε = α2, ζ = α3. Since X is anti-canonically embedded into P(1, 1, 2, 3), all automorphisms of X are induced by the substitutions as above that map Equation (7) to a multiple of itself. Clearly, we can represent every such automorphism by a substitution with ζ = 1. Then, the substitution does not change the coefficient of y2 in Equation (7), hence ε3 = 1. Therefore, we may assume ε = 1 as well. In particular, using Lemma 5.5, we obtain the following description of Aut(X), where we write σ for the substitution u 7→ αu + βv v 7→ γu + δv and σ∗ai := ai(αu + βv, γu + δv). AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 31 Lemma 6.6. Let X be a del Pezzo surface of degree 1 given by Equation (7). Then, Aut(X) can be identified with the group of 4-tuples (b1, b2, b3, σ), where bi ∈k[u, v]i and σ ∈GL2(k) such that σ∗a1 + a1 = 0, σ∗a2 + a2 = a1b1 + b2 1 + b2, σ∗a3 + a3 = a1b2, σ∗a4 + a4 = a3b1 + a1b3 + b2 2, σ∗a6 + a6 = a4b2 + +a3(b3 + b1b2) + a2b2 2 + a1(b2b3 + b1b2 2) + b2 3 + b3 2 + b2 1b2 2 and where the composition is given by (b1, b2, b3, σ) ◦(b′ 1, b′ 2, b′ 3, σ′) = (σ′∗b1 + b′ 1, σ′∗b2 + b′ 2, σ′∗b3 + b′ 3 + σ′∗b1b′ 2, σ ◦σ′) In particular, there is a homomorphism Aut(X) →H ⊆Aut(P(1, 1, 2)), where H is the group from Lemma 5.4. Lemma 6.7. The kernel of the homomorphism Aut(X) →H is generated by the Bertini involution. Proof. Let (b1, b2, b3, σ) be in the kernel. Then, σ = id and b2 = 0. The conditions σ∗a2 = a2 + a1b1 + b2 1, σ∗a4 = a4 + a3b1 + a1b3, and σ∗a6 = a6 + a3b3 + b2 3 show that (b1, b3) ∈ {(0, 0), (a1, a3)}, so we recover our explicit description of the Bertini involution. □ Now, we use the normal forms of Theorem 5.6 to classify all del Pezzo surfaces X of degree one with non-trivial G(X). 32 IGOR DOLGACHEV AND GEBHARD MARTIN Theorem 6.8. Every del Pezzo surface of degree one in characteristic two such that G(X) is non-trivial is isomorphic to a surface of degree 6 in P(1, 1, 2, 3) given by an equation of the form y2 + (a1x + a3)y + x3 + a2x2 + a4x + a6 where (a1, a2, a3, a4, a6, G(X), Aut(X)) is one of the following: Name a1x + a3 a2 a4 a6 G(X) Aut(X) #Parameters (1)(a)(i) ux + v3 av2 bu4 + (b + 1)u2v2 eu6 + fu4v2 + (a + b + b2 + f)u2v4 + bv6 2 4 4 (1)(a)(ii) ux + v3 0 bu4 eu6 + hv6 3 6 3 (1)(a)(iii) ux + v3 av2 u4 eu6 + au4v2 + v6 22 Q8 2 (1)(a)(iv) ux + v3 0 u4 eu6 + v6 A4 SL2(3) 1 (1)(d)(i) ux + v3 av2 u2v2 eu6 + fu4v2 + (a + f)u2v4 2 4 3 (1)(e)(i) ux + v3 0 0 eu6 + hv6 3 6 2 (2)(a)(i) ux av2 v4 bu6 + (efg−1 + e 3 2 g−1 2 + e3g−3)u4v2 + eu3v3 + fu2v4 + guv5 + e−1 2 g 3 2 v6 2 22 5 (2)(d)(i) ux av2 v4 cu5v + du4v2 + fu2v4 23 24 4 (2)(e)(i) ux av2 0 bu6 + (e + f)u4v2 + eu3v3 + fu2v4 + euv5 + ev6 2 22 4 (2)(f)(i) ux 0 0 bu6 + uv5 5 10 1 (3)(i) uv(u + v) auv bu3v + buv3 du5v + eu3v3 + duv5 2 22 4 (3)(ii) uv(u + v) auv a 1 2 u3v + a 1 2 uv3 (e + e 1 2 )u5v + eu3v3 + (e + e 1 2 )uv5 S3 2 × S3 2 (3)(iii) uv(u + v) 0 0 du5v + eu3v3 + duv5 6 2 × 6 2 (3)(iv) uv(u + v) 0 bu3v + ζ3bu2v2 + ζ2 3buv3 (e + e 1 2 )u5v + eu3v3 + (e + e 1 2 )uv5 3 6 2 (3)(v) uv(u + v) 0 0 (e + e 1 2 )u5v + eu3v3 + (e + e 1 2 )uv5 3 × S3 6 × S3 1 (4)(i) u2v 0 0 du5v + eu3v3 + uv5 3 6 2 (5)(i) u3 0 au3v + bu2v2 uv5 + dv6 26 21+6 + 3 (5)(ii) u3 0 0 uv5 + dv6 26 : 3 21+6 + : 3 1 (5)(iii) u3 0 0 uv5 26 : 15 21+6 + : 15 0 Here, S3, D8, Q8, and 21+6 + , denote the symmetric group on 3 letters, the dihedral group of order 8, the quaternion group, and the even extra-special group of order 128, respectively. In each case, the parameters have to satisfy the conditions of Theorem 5.6 and the obvious genericity conditions that keep them from specializing to other subcases. AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 33 Proof. We use the normal forms of Theorem 5.6 and let H be the group of Lemma 5.4. By Lemma 6.6, we have G(X) ⊆H. We apply Lemma 6.6 to calculate Aut(X). Case (1) (a) Let (b2, σ) ∈H. If (b2, σ) ∈G(X), then σ permutes the roots of the polynomial F ′ := v8 + dv6 + cv4 + bv2, since these are determined by the singularities of R. We have σ∗F ′ = δ2v8 + dv6 + δ(γ2d + c)v4 + δ2(γ4d + b)v2 + γ8 + γ6d + γ4c + γ2b. If d ̸= 0, this is a multiple of F ′ if and only if δ = 1 and γ = 0, hence σ is the identity and G(X) is trivial. If d = 0, it is a multiple of F ′ if and only if γ8 + γ4c + γ2b = 0 (9) and δ = 1 or c = 0. So, assume first that c ̸= 0 and δ = 1. If (b2, σ) ∈G(X), then there exist polynomials b1 and b3 such that σ∗a2 = a2 + a1b1 + b2 1 + b2 and σ∗a4 = a4 + a3b1 + a1b3 + b2 2. In our case, this means 0 = γ2au2 + ub1 + b2 1 + γ3u2 + γ2uv + γv2 0 = γ2cu4 + v3b1 + ub3 + γ6u4 + γ4u2v2 + γ2v4, hence b1 = λu + γ2t with λ2 + λ = γ2a + γ3 and γ4 = γ, and b3 = (γ2c + γ3)u3 + γuv2 + λv3. If γ ̸= 0, then γ4 = γ implies γ3 = 1. Modifying the equation of X by an element of H, we may assume that γ = 1. Plugging this into Equation (9), we obtain c = b + 1. Hence, b1 = λu + v with λ2 + λ = a and b3 = bu3 + uv2 + v3. Plugging this into the equation for σ∗a6 and comparing coefficients in Lemma 6.6, we obtain the conditions h = b and g = a + b + b2 + f. Since γ is uniquely determined by Equation (9), we have G(X) ∼ = C2. The square of any lift of a non-trivial element of G(X) to Aut(X) is the Bertini involution, hence Aut(X) ∼ = C4. Next, assume that c = 0. If (b2, σ) ∈G(X), then there exist polynomials b1 and b3 such that σ∗a2 = a2 + a1b1 + b2 1 + b2 and σ∗a4 = a4 + a3b1 + a1b3 + b2 2. In our case, this means 0 = γ2au2 + (1 + δ2)av2 + ub1 + b2 1 + γ3u2 + γ2δuv + γδ2v2 0 = v3b1 + ub3 + γ6u4 + γ4δ2u2v2 + γ2δ4v4, hence b1 = λu + γ2δv with λ2 + λ = γ2a + γ3 and γ4 + γ = (1 + δ)a, as well as b3 = γ6u3 + γ4δ2uv2 + λv3. First, assume that δ ̸= 1. Then, σ has order 3, hence if (b2, σ) ∈G(X), then it fixes one of the four roots of F ′. After conjugating by a suitable element of H and repeating the substitutions we used in Theorem 5.6, we may assume that (b2, σ) fixes [1 : 0 : 0]. This implies that γ = 0, hence (1 + δ)a = 0 implies a = 0. Now, we plug everything into the equation for σ∗a6 and compare coefficients to obtain the conditions f = g = 0. If δ = 1, then γ4 + γ = 0. Hence, if (b2, σ) is non-trivial, then γ3 = 1. Modifying the equation of X by an element of H, we may assume γ = 1, that is, that (b2, σ) maps [1 : 0 : 0] to [1 : 1 : 1]. Then, Equation (9) implies b = 1. Plugging into the equation for σ∗a6 and comparing coefficients yields g = f + a and h = 1. The square of both lifts of (b2, σ) to Aut(X) is the Bertini involution, hence the subgroup generated by these lifts is isomorphic to C4. Suppose next that G(X) contains two distinct non-trivial automorphisms with δ = 1. Then, we can assume that one of them acts as in the previous paragraph, so b = h = 1 and g = f + a. The other one satisfies γ ̸= 1. Plugging this into the equation for σ∗a6 and comparing coefficents yields f = a. As in the previous paragraph, the square of all lifts of these automorphisms is the Bertini involution, hence they generate a subgroup isomorphic to the quaternion group Q8. 34 IGOR DOLGACHEV AND GEBHARD MARTIN Finally, Corollary 6.3 shows that G(X) acts on the four singular points of R through A4, so if G(X) contains a non-trivial automorphism with δ = 1 and a non-trivial automorphism with δ ̸= 1, then G(X) ∼ = A4. In particular, the previous two paragraphs show that b = h = 1 and g = 0 and f = a, while the above paragraph for δ ̸= 1 shows a = f = g = 0. In this case, Aut(X) ∼ = SL2(3). Cases (1) (b) and (1) (c) In these cases, the singularity of R over [1 : 0 : 0] is not isomorphic to the other singularities of R, hence G(X) is a subgroup of C3 acting through the subgroup of H with γ = 0. In particular, G(X) fixes the points [1 : 0 : 0] and [0 : 1 : 0]. Since the number of singular points of R that lie over points different from [1 : 0 : 0] and [0 : 1 : 0] is not divisible by 3, G(X) fixes all of them, hence G(X) is trivial. Case (1) (d) In this case, R has singularities over [1 : 0 : 0] and [1 : c 1 4 : c 3 4 ]. An element of H that fixes both of these points is trivial, and the unique one that swaps the two points is of the form (b2, σ) where σ acts as v 7→v + c 1 4 u and b2 = c 3 4 u2 + c 1 2 uv + c 1 4 v2. If such an element lies in G(X), then there exist polynomials b1 and b3 such that 0 = (ac 1 2 + c 3 4 )u2 + ub1 + b2 1 + c 1 2 uv + c 1 4 v2 0 = v3b1 + ub3 + cu2v2 + c 1 2 v4, hence b1 = λu + c 1 2 v with λ2 + λ = ac 1 2 + c 3 4 and c4 = c, and b3 = λv3 + cuv2. By Theorem 5.6 we have c ̸= 0, hence we can apply an element of H to assume that c = 1. Plugging this into the equation for σ∗a6 and comparing coefficients in Lemma 6.6, we obtain the conditions h = 0 and g = a + f. The square of this automorphism (b1, b2, b3, σ) is the Bertini involution, hence Aut(X) ∼ = C4 in this case. Case (1) (e) In this case, we have G(X) ⊆C3, since G(X) fixes [1 : 0 : 0]. Non-trivial elements of H that fix [1 : 0 : 0] are of the form (0, σ), where σ acts as v 7→δv with δ3 = 1 and δ ̸= 1. Such an automorphism lifts to X if and only if there exist polynomials b1 and b3 such that (1 + δ2)av2 = ub1 + b2 1 0 = v3b1 + ub3 (1 + δ2)fu4v2 + (1 + δ)gu2v4 = v3b3 + b2 3. The first equation implies a = 0 and b1 = λu with λ2 + λ = 0 and then the second equation implies that also b3 = λv3. Finally, the third equation shows f = g = 0. Case (2) (a) Here, G(X) ⊆H fixes the point [0 : 1 : 1]. Moreover, if G(X) fixes the images of the other two singularities, then, by our description of H, G(X) is trivial. Hence, G(X) ⊆C2 with equality if and only if G(X) contains the involution (0, σ), where σ acts as v 7→v + e 1 2 g−1 2 u. If this involution is in G(X), then there exist polynomials b1 and b3 such that aeg−1u2 = ub1 + b2 1 e2g−2u4 = ub3, AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 35 hence b1 = λu with λ2 + λ = aeg−1, and b3 = e2g−2u3. Plugging this into the equation for σ∗a6 and comparing coefficients in Lemma 6.6, we obtain the conditions 0 = e4 + he3g + fe2g2 + deg3 0 = e 1 2 (g 3 2 + he 1 2 ). Since e ̸= 0 by Theorem 5.6, we have h = e−1 2 g 3 2 and d = efg−1 + e 3 2 g−1 2 + e3g−3. Note that both lifts of (0, σ) have order 2, hence Aut(X) ∼ = 22. Case (2) (b) and (2) (c) Here, G(X) ⊆H fixes [0 : 1 : 1] and [1 : 0 : 0], since these are the points that lie under the singularities of the irreducible components of R, but not under the intersection of the two components R1 and R2. By our description of H in Lemma 5.4, this implies that G(X) is trivial. Case (2) (d) In this case, G(X) fixes [0 : 1 : 1], but we get no other restrictions from the position of the singularities of R. Therefore, an element of G(X) ⊆H is of the form (0, σ) where σ acts as v 7→v + γu for some γ ∈k. Such an element is in G(X), if and only if there exist polynomials b1 and b3 such that aγ2u2 = ub1 + b2 1 γ4u4 = ub3 (cγ + dγ2 + fγ4 + hγ6)u6 + hγ4u4v2 + hγ2u2v4 = b2 3. Such b1 and b3 exist if and only if h = 0 and γ8 + hγ6 + fγ4 + dγ2 + cγ = 0, and then b1 = λu with λ2 + λ = aγ2, and b3 = γ4u3. By Theorem 5.6, we have c ̸= 0, hence, as soon as h = 0, there are exactly 8 choices for γ. This shows G(X) ∼ = 23. Every lift of every non-trivial element in G(X) has order 2, hence Aut(X) ∼ = 24. Case (2) (e) Here, the elements of G(X) ⊆H fix [0 : 1 : 0] and preserve the pair {[1 : 0 : 0], [1 : 1 : 0]}. Using our description of γ, it is clear that an element of H that fixes all of these three points is the identity. An element that swaps [1 : 0 : 0] and [1 : 1 : 0] is of the form (0, σ), where σ acts as v 7→v + u. Such an element is in G(X), if and only if there exist polynomials b1 and b3 such that au2 = ub1 + b2 1 0 = ub3 (d + f + h)u6 + (e + h)u4v2 + (e + h)u2v4 = b2 3, hence if and only if h = e and d = e + f, and then b1 = λu with λ2 + λ = a and b3 = 0. The square of the lift of this automorphism to Aut(X) is the identity, hence Aut(X) ∼ = 22. Case (2) (f) In this case, G(X) ⊆H fixes [1 : 0 : 0] and [0 : 1 : 0]. Hence, by our description of H in Lemma 5.4, every element in G(X) is of the form (0, σ), where σ acts as v 7→δv for some δ ∈k×. A non-trivial element of this form is in G(X) if and only if there exist b1 and b3 such that a(1 + δ2)v2 = ub1 + b2 1 0 = ub3 d(1 + δ2)u4v2 + f(1 + δ4)u2v4 + (1 + δ5)uv5 + h(1 + δ6) = b2 3. 36 IGOR DOLGACHEV AND GEBHARD MARTIN Hence, we always have b1 = b3 = 0 and δ5 = 1. Since δ ̸= 1 by assumption, we deduce that (0, σ) lifts if and only if a = d = f = h = 0. Case (3) Here, the group G(X) ⊆H fixes [1 : 0 : 0], [0 : 1 : 0], and [1 : 1 : 0]. Hence, every element of G(X) is of the form (0, σ) and σ satisfies the conditions of Lemma 5.4 (3). First, assume that σ has even order and interchanges two components of B. Without loss of generality, we may assume that σ swaps u and v. Then, (0, σ) lifts to X if and only if there exist b1 and b3 such that 0 = b2 1 (b + c)(u3v + uv3) = uv(u + v)b1 (d + f)(u5v + uv5) = uv(u + v)b3 + b2 3. This holds if and only if b = c, and then b1 = 0 as well as b3 = λuv(u + v) with λ2 + λ = 0 and d = f. The square of both lifts of (0, σ) is the identity, hence they generate a group isomorphic to 22. Next, assume that σ is non-trivial and preserves the three components of B. Then, it acts as u 7→αu, v 7→αv, where α3 = 1, α ̸= 1. This automorphism lifts to X if and only if there exist polynomials b1 and b3 such that a(1 + α−1)uv = b2 1 (1 + α)(bu3v + (b + c)u2v2 + cuv3) = uv(u + v)b1 0 = uv(u + v)b3 + b2 3, hence if and only if a = b = c = 0. Finally, assume that σ has odd order and interchanges components of B. Without loss of generality, we may assume that σ acts as u 7→βv, v 7→β(u + v) with β3 = 1. This lifts to X if and only if there exist b1 and b3 such that a(1 + β2)uv + aβ2v2 = b2 1 (b + βc)u3v + (b + c + βb)u2v2 + (c + β(b + c))uv3 = uv(u + v)b1 (d + f)u5v + fu4v2 + eu2v4 + (d + e)uv5 + (d + e + f)v6 = uv(u + v)b3 + b2 3. The third equation implies f = d and d = e + e 1 2 and then b3 = λu2v + λuv2 + e 1 2 v3, where λ2 + λ = e + e 1 2 . If β = 1, the first equation implies b1 = a 1 2 v and the second equation implies b = c = a 1 2 . If β ̸= 1, the first equation implies b1 = a = 0 and the second equation implies b = βc. Case (4) In this case, the group G(X) ⊆H fixes [1 : 0 : 0] and [0 : 1 : 0], hence every element of G(X) is of the form (b2, σ) with b2 = λuv for some λ ∈k and where σ acts as u 7→αu, v 7→α−2v with α ∈k×. If such an automorphism lifts to X, then the condition σ∗a2 = a2 + b2 1 + b2 forces b2 = b2 1, hence b1 = b2 = 0. The other conditions of Lemma 6.6 become a(1 + α)u3v + b(1 + α−2)u2v2 + c(1 + α−5)uv3 = 0 d(1 + α3)u5v + e(1 + α−3)u3v3 + f(1 + α−9)uv5 = u2vb3 + b2 3. AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 37 Since d ̸= 0, the second equation implies α3 = 1. Hence, if σ is non-trivial, then (0, σ) lifts to X if and only if a = b = c = 0. Case (5) Here, G(X) ⊆H fixes [0 : 1 : 0], hence every element of G(X) is of the form (b2, σ) with b2 = λu2 + µuv for some λ, µ ∈k and where σ acts as u 7→αu, v 7→γu + δv with α3 = 1, γ ∈ k, δ ∈k×. If such an automorphism lifts to X, then there exists b1 with b2 1 + b2 = 0, hence µ = 0 and b1 = λ 1 2 u. Comparing coefficients in the equation for σ∗a4, we obtain λ2 + λ 1 2 + aγ + bα2γ2 + cαγ3 = 0 (10) a + aδ + cαδγ2 = 0 (11) b + bα2δ2 + cαδ2γ = 0 (12) c + cαδ3 = 0 (13) The automorphism lifts to X if and only if, additionally, there exists a b3 = λ0u3 + λ1u2v + λ2uv2 + λ3v3 satisfying the following conditions: λ2 0 + λ0 = λ3 + (aγ + bα2γ2 + cαγ3)λ + αγ5 + dγ6 λ1 = (aδ + cαδγ2)λ + αδγ4 λ2 1 + λ2 = (bα2δ2 + cαδ2γ)λ + dδ2γ4 λ3 = cαδ3λ (14) λ2 2 = αδ4γ + dδ4γ2 0 = 1 + αδ5 (15) λ2 3 = d + dδ6 (16) Equation (15) shows that α = δ−5. In particular, as α3 = 1, we have δ15 = 1. First, assume that δ = 1, hence α = 1. Then, Equation (16) shows that λ3 = 0. Equation (14) shows cλ = 0 and Equation (11) shows cγ = 0. Hence, if c ̸= 0, then (b2, σ) is the identity, so we assume c = 0 in the following. Let Ga,b,d be the group of lifts of such automorphisms to X. By the description above, these Ga,b,d form a family Ga,b,d of finite group schemes over Spec k[a, b, d] cut out in Spec k[a, b, d, λ, λ0, γ] by the equations F1 := λ4 + λ + a2γ2 + b2γ4 = 0 (17) F2 := a4λ4 + b2λ2 + γ + dγ2 + d2γ8 + γ16 = 0 (18) F3 := λ2 0 + λ0 + λ3 + (aγ + bγ2)λ + γ5 + dγ6 = 0. In the following, we show that all geometric fibers of Ga,b,d →Spec k[a, b, d] are reduced of length 128. In particular, Ga,b,d is étale over Spec k[a, b, d], hence all the Ga,b,d are isomorphic and we will show afterwards that Ga,b,d ∼ = 21+6 + . • If a ̸= 0 and b ̸= a2, we argue as follows: The condition a8F 2 1 + F 2 2 + b4 a4 F2 = 0 yields the following expression for λ: (a12 + b6)λ2 = b4γ + (a4 + b4d)γ2 + (a4d2 + b4d2 + a16)γ4 +(a12b4 + b4d2)γ8 + (a4d4 + b4)γ16 + a4γ32 By our assumptions, we can divide by (a12 + b6) and we obtain an expression of λ2 in terms of γ. Plugging this back into Equation (18), we obtain a polynomial F in γ of the 38 IGOR DOLGACHEV AND GEBHARD MARTIN form F = P5 i=0 ciγ2i of degree 64 with c0 = 0 c1 = a12 a12 + b6 c5 = a8 (a12 + b6)2 . Since a ̸= 0, both c1 and c5 are non-zero, so ∂γF = 1 and F has only simple roots. Hence, there are exactly 64 choices for γ such that (b2, σ) lifts and λ is uniquely determined by γ. In particular, Ga,b,d has order 128 and it acts on the base of the associated elliptic fibration through 26. • If a ̸= 0 and b = a2, we argue as follows: The condition a8F 2 1 + F 2 2 + a4F2 = 0 becomes 0 = a8γ + (a4 + a8d)γ2 + (a4d2 + a8d2 + a16)γ4 +(a20 + a8d2)γ8 + (a4d4 + a8)γ16 + a4γ32 =: F. Note that, since a ̸= 0, F1 = F2 = 0 holds if and only if F2 = F = 0. There are 32 choices for γ with F(γ) = 0 and for each choice of γ, there are exactly 2 choices for λ such that F2(γ, λ) = 0. As in the previous case, Ga,b,d has order 128, but in this case, it acts on the base of the associated elliptic fibration through 25. • Next, assume that a = 0 and b ̸= 0. We can immediately solve Equation (18) for λ and obtain b2λ2 = γ + dγ2 + d2γ8 + γ16. Plugging this into the square of Equation (17), we obtain a polynomial F in γ of the form F = P5 i=0 ciγ2i of degree 64 with c0 = 0 c1 = b−2 c5 = b−8. Hence, there are 64 choices for γ such that (b2, σ) lifts and λ is uniquely determined by γ. Therefore, Ga,b,d has order 128 and acts on the base of the associated elliptic fibration through 26. • Now, assume that a = b = 0. The equations simplify to λ4 + λ = 0 λ2 0 + λ0 = λ3 + γ5 + dγ6 λ1 = γ4 λ2 = dγ4 + γ8 λ3 = 0 γ + dγ2 + d2γ8 + γ16 = 0. Hence, there are 16 choices for γ and 4 choices for λ. Hence, Ga,b,d has order 128 and it acts on the base of the associated elliptic fibration through 24. It remains to determine the group Ga,b,d. By the last bullet point, the subgroup of G0,0,0 of automorphisms that act trivially on the base of the associated elliptic fibration has order 8. Thus, by Corollary 6.3, it is isomorphic to Q8. Hence, every Ga,b,d contains a quaternion group Q8 with AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 39 β ∈Q8. On the other hand, in the cases where a ̸= 0, b ̸= a2, we have seen that Ga,b,d/⟨β⟩∼ = 26. Hence, by Example 6.5, we have Ga,b,d ∼ = 21+6 + . Next, assume that δ ̸= 1, δ3 = 1. Then, Equations (11), (12), and (13) show that a = b = c = 0. The remaining equations become λ4 + λ = 0 λ2 0 + λ0 = λ3 + δγ5 + dγ6 λ1 = δ2γ4 λ2 = dδ2γ4 + δγ8 λ3 = 0 δ2γ16 + d2δγ8 + dδγ2 + δ2γ = 0. We see that if γ = λ = 0, then (b2, σ) admits a lift to X as an automorphism g of order 3. For a fixed γ, there are at most 128 possible choices of (γ, λ). All of them are obtained by composing g with an element of G0,0,d, hence all choices are realized. Finally, assume that δ ̸= 1, δ5 = α = 1. As in the previous paragraph, we have a = b = c = 0. But in this case, Equation (16) yields the condition d = 0. So, in summary, if c ̸= 0, then G(X) is trivial and if c = 0, then Aut(X) admits a unique 2-Sylow subgroup isomorphic to 21+6 + . If a, b, or c is non-zero, this is the full automorphism group. If a = b = c = 0 and d ̸= 0, then Aut(X)/21+6 + ∼ = C3 and if a = b = c = d = 0, then Aut(X)/21+6 + ∼ = C15. □ Remark 6.9. The largest order of an automorphism group of a del Pezzo surface of degree one over the complex numbers is equal to 144 and the surface with such a group of automorphisms is unique . In our case, the maximal order is equal to 1920 = 27 · 15 and the surface with such an automorphism group is also unique. We also see the occurrence of the group G = 24 in Case (5). It is obtained as the pre-image in 21+6 + of a maximal isotropic subspace of F6 2. Since del Pezzo surfaces of degree one are superrigid (see [8, Definition 7.10, Corollary 7.11]) and the corresponding G-surface is minimal, this group is not conjugate in the Cremona group of P2 to the isomorphic subgroup of the group of automorphisms of del Pezzo surfaces of degree 4 or 2 that appeared in and . 6.3. Conjugacy classes and comparison with the classification in characteristic 0. In this section, we determine the conjugacy classes in W(E8) of the elements of the groups that occur in Theorem 6.8 and, whenever possible, compare the surfaces in Theorem 6.8 with their counterparts in characteristic 0 (see [9, Table 8.14]). For a del Pezzo surface X of degree 1, we denoted by NX and PX the kernel and image of the morphism Aut(X) →Aut(P1) induced by the action of Aut(X) on the base of the associated elliptic pencil. First, we note the following: Lemma 6.10. Let g be a non-trivial element of NX. Then, the conjugacy class of g is either 8A1, 4A2, 2D4(a1), or E8(a8). Proof. Since g acts trivially on the base of the pencil, it cannot preserve any (−1)-curve on X. Then, the lemma follows from the classification of conjugacy classes in W(E8) (see e.g. [12, Table 3]), by checking which of them fix no (−1)-class in E8. □ 40 IGOR DOLGACHEV AND GEBHARD MARTIN Corollary 6.11. Let X be a del Pezzo surface of degree 1 in characteristic 2. Let X′ be a geometric generic fiber of a lift of X to characteristic 0 and let sp : Aut(X′) →Aut(X) be the specialization map. Then, the following hold: (1) sp is injective and preserves conjugacy classes. (2) sp induces morphisms NX′ →NX and PX′ →PX. (3) The kernel H of PX′ →PX is an elementary 2-group and if g is an element of Aut(X′) that maps to a non-trivial element of H, then the conjugacy class of g is 2D4(a1). Proof. The proof of Claim (1), including the existence of sp, is analogous to Lemma 4.7. The existence of the morphisms in Claim (2) is clear, as, for a given lift X →S, the groups that appear can be defined as fibers of kernel and image of the homomorphism of S-group schemes AutX/S →AutP1 S/S that describes the action of AutX/S on the anti-canonical system. For Claim (3), recall that sp preserves conjugacy classes by Claim (1). Therefore, by Lemma 6.10, all non-trivial elements of H are represented by elements g of Aut(X′) of conjugacy class 8A1, 4A2, 2D4(a1), or E8(a8). If g is of class 8A1, then it is the Bertini involution, hence g ∈NX′. If g is of class 4A2, then it has negative trace on E8, so, by the Lefschetz fixed point formula, it must act trivially on the base of the elliptic pencil. Hence, g ∈NX′. If g is of class E8(a8), then, by what we just proved, g2 and g3 are in NX′, hence g ∈NX′. Thus, g must be of conjugacy class 2D4(a1). Then, g2 is the Bertini involution, so H is 2-elementary. □ By Theorem 6.8, | Aut(X)| ≤36 or | Aut(X)| ∈{128, 384, 1920}, so Types I and II [9, Table 8.14] do not have a reduction modulo 2 which is a del Pezzo surface. The surfaces of Type VI, VII, IX, XII, and XV from [9, Table 8.14] admit an automorphism of order 2n with n > 1 acting faithfully on P1, which is impossible in characteristic 2, so by Corollary 6.11 they do not have good reduction mod 2. The equation of the surfaces of Type (3) (v) in Theorem 6.8 can be rewritten as y2 + uv(u −v)y + x3 + a(u2 −uv + v2)3 + bu2v2(u −v)2 for certain a, b ∈k. This equation makes sense in characteristic 0, and it is stable under S3-action generated by (u, v, x, y) 7→(v, u, x, −y) and (u, v, x, y) 7→(u −v, −u, x, −y) as well as the C3-action (u, v, x, y) 7→(u, v, ζ3x, y), where ζ3 is a primitive 3-rd root of unity. Hence, the automorphism group of has order at least 36, hence it is isomorphic to 6 × S3. Thus, surfaces of Type (3) (v) are reductions mod 2 of the surfaces of Type III from [9, Table 8.14]. In particular, we can read off the conjugacy classes from [12, Table 8]. The equation of Type (5) (iii) makes sense in characteristic 0, where it is isomorphic to y2 + x3 + u(u5 + v5), which is the equation of Type IV in [9, Table 8.14]. The equation of the surfaces of Type (3) (ii) in Theorem 6.8 can be rewritten as y2 + uv(u −v)y + x3 + c(u2 −uv + v2)x2 + a(u2 −uv + v2)3 + bu2v2(u −v)2 for certain a, b, c ∈k. Similar to the case of Type (3) (v) above, these equations are stable under a S3-action, both in characteristic 0 and in characteristic 2. In characteristic 0, these equations can be simplified to the normal forms of Type X from [9, Table 8.14]. The equation of the surfaces of Type (3) (iii) makes sense in characteristic 0, where it defines a lift of X together with the action of Aut(X). Both X and the lift admit an automorphism of order 6 that acts trivially on the base of the elliptic pencil. Hence, these surfaces are reductions mod 2 of the surfaces of Type XI from [9, Table 8.14]. AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 41 The equations of the surfaces of Type (2) (f) (i) in Theorem 6.8 define a 1-dimensional family of surfaces in characteristic 0 with an action of C10. These lifts must be of Type XIII [9, Table 8.14]. The equations of the surfaces of Type (4) (i) in Theorem 6.8 define a 2-dimensional family of surfaces in characteristic 0 with an action of C6 that is trivial on the base of the elliptic pencil. Hence, these lifts are of Type XVII [9, Table 8.14]. Next, consider the equations y2 + (aux + bu3 + cv3)y + x3 + (du4 + euv3)x + fu6 + gu3v3 + hv6, where a, b, c, d, e, f, g, h are parameters. In characteristic 0, we can simplify this equation to the normal form of Type XVIII from [9, Table 8.14]. In characteristic 2, these equations cover three of the families of Theorem 6.8: If a, c ̸= 0, we can simplify the equation to the normal form for Type (1) (a) (ii) which, in turn, specializes to Type (1) (e) (i) for special values of the parameters. If a = 0 but b, c ̸= 0, we can simplify the equation to y2 + (u3 + v3)y + x3 + euv3x + fu6. This is an alternative normal form for our surfaces of Type (3) (iv). Finally, consider the equations y2 + (a(u + v)x + b(u + v)3 + cuv(u + v))y + x3 + (d(u + v)4 + euv(u + v)2 + fu2v2)x + (g(u + v)6 + huv(u + v)4 + iu2v2(u + v)2 + ju3v3). In characteristic 0, we can simplify this equation to the normal form of Type XX from [9, Table 8.14]. In characteristic 2, these equations cover four of the families of Theorem 6.8: If a ̸= 0, we can simplify the equation to y2 + (u + v)xy + x3 + cuvx2 + du2v2x + g(u + v)6 + huv(u + v)4 + iu2v2(u + v)2 + ju3v3. If d, j ̸= 0, we can rescale one of them to 1 and obtain an alternative normal form for Type (2) (a) (i). If d ̸= 0 and j = 0, we obtain a normal form for Type (2) (e) (i). If j ̸= 0 and d = 0, we obtain an alternative normal form for Type (2) (d) (i). Note that d = j = 0 would lead to a singular surface. Since the family of Type (2) (d) (i) occurs as a reduction mod 2 of certain surfaces of Type XX from [9, Table 8.14], we call them Type XX’. If a = 0 and c ̸= 0, we can simplify the equation to y2 + (b(u + v)3 + uv(u + v))y + x3 + (euv(u + v)2 + fu2v2)x + (g(u + v)6 + ju3v3). This defines a 4-dimensional family of surfaces with 22-action (one parameter is redundant). By Theorem 6.8, the corresponding surfaces must be of Type (3) (i). The surfaces in the families (1)(a)(i), (1)(a)(iii), (1)(a)(iv), (1)(d)(i), (5)(i), (5)(ii), and (5)(iii) admit an automorphism of order 4 and it turns out that writing down integral equations for such automorphisms similar to the ones above is hard. So, instead, to determine the conjugacy classes of the automorphisms of this family and to compare with the classification in characteristic 0, we will use the following observation. Lemma 6.12. Let g be an automorphism of a del Pezzo surface of degree one. Let m := ord(g) and let n be the order of the induced automorphism of P1. Assume that m is even. Then, the conjugacy class Γ of g in W(E8) is one of the following: (1) If (m, n) = (2, 1), then Γ = 8A1. (2) If (m, n) = (2, 2), then Γ = 4A1. (3) If m = 4, then Γ = 2D4(a1). (4) If (m, n) = (6, 1), then Γ = E8(a8). 42 IGOR DOLGACHEV AND GEBHARD MARTIN (5) If (m, n) = (6, 2), then Γ = E6(a2) + A2. (6) If (m, n) = (6, 3) and g2 is of class 3A2, then Γ = E7(a4) + A1. (7) If (m, n) = (6, 3) and g2 is of class 2A2, then Γ = 2D4. (8) If m = 10, then Γ = E8(a6). (9) If m = 12, then Γ = E8(a3). (10) If m = 20, then Γ = E8(a2). (11) If m = 30, then Γ = E8. Proof. By Theorem 6.8, we know that the only possible values for m and n are the ones in the statement. In Case (1), g is the Bertini involution, hence Γ = 8A1. In Case (2), we may assume that g acts as u ↔v. Then, we proved in this section that g lifts to characteristic 0, so by [12, Table 8], Γ = 4A1. In Case (3), g2 is the Bertini involution, because PGL2(k) does not contain elements of order 4, and it is known (see [12, Table 3]) that the only conjugacy class of automorphisms of order 4 whose square is the Bertini involution is 2D4(a1). In Cases (8) and (11), g m 2 is the Bertini involution and g2 lifts to characteristic 0, hence g lifts to characteristic 0 and we can read off the conjugacy class Γ from [12, Table 8]. Then, we deduce Case (10) from Case (8). In Case (9), g2 must be of type E8(a8), since PGL2(k) does not contain any elements of order 4 or 6. Then, from [12, Table 3], we see that Γ = E8(a3). Finally, Cases (4), (5), (6), and (7) follow from [12, Table 3] by comparing the conjugacy classes of g2 and g3. □ Now, we can complete Table 4 by using the description of Aut(X) in Theorem 6.8. We observe that the conjugacy classes for Types (1)(a)(i) and (1)(d)(i) are the same as for Type XIX from [9, Table 8.14], the conjugacy classes for Type (1)(a)(iii) are the same as for Type XIV from [9, Table 8.14], and the conjugacy classes for Type (1)(a)(iv) are the same as for Type V from [9, Table 8.14]. The only groups in Theorem 6.8 that contain D8 are 21+6 + , 21+6 + : 3, and 21+6 + : 15, and the only group that contains an automorphism of order 20 is 21+6 + : 15. Hence, if the Types XVI, M, and VIII from [9, Table 8.14] and [12, Table 8] have good reduction modulo 2, then they must reduce to our Types (5)(i) and (5)(ii), respectively. In each of these cases, we determine the conjugacy classes using Lemma 6.12. We summarize the classification of automorphism groups of del Pezzo surfaces of degree one in Table 3 in the Appendix. There, in the first column, we give the name of the corresponding family, both in the notation of Theorem 4.3 and in the notation of [9, Table 8.14]. The second and third columns give the group Aut(X) and its size. In the remaining columns, we list the number of elements of a given Carter conjugacy class in Aut(X). AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 43 APPENDIX Name Aut(X) Order id 2A1 4A1 A2 A2 + 2A1 A3 A3 + A1 A4 D4 D4(a1) D5 (φ, φ) 24 : A5 960 1 70 5 80 80 120 384 160 60 (ζ3, ζ3) (same as (φ, φ)) (i, i) (does not exist) (a, a) 24 : 22 64 1 22 5 24 12 general 24 16 1 10 5 TABLE 1. Automorphism groups of quartic del Pezzo surfaces, cf. Section 2.2 Name Aut(X) Order id 2A1 4A1 A2 A2 + 2A1 2A2 3A2 A3 + A1 A4 A5 + A1 D4 D4(a1) D5 E6 E6(a1) E6(a2) I / 3C PSU4(2) 25920 1 270 45 240 2160 480 80 3240 5184 1440 1440 540 4320 5760 720 II / 5A (same as V) III / 12A (same as I) IV / 3A H3(3) : 2 54 1 9 24 2 18 V / 4B 23 : S4 192 1 30 13 32 72 32 12 VI / 6E (same as V) VII / 8A (does not exist) VIII / 3D S3 6 1 3 2 IX / 4A (same as V) X / 2B 24 16 1 10 5 XI / 2A 2 2 1 1 XII / 1A 1 1 1 TABLE 2. Automorphism groups of cubic del Pezzo surfaces, cf. Section 2.3 44 IGOR DOLGACHEV AND GEBHARD MARTIN Name Aut(X) Order id 3A1 4A1 7A1 2A2 3A2 2A3 2A3 + A1 A5 + A2 A6 D4(a1) D4(a1) + A1 D5 D5 + A1 D6(a2) + A1 E6 E6(a1) E6(a2) E7 E7(a1) E7(a2) E7(a4) I - V (do not exist) VI / (3)(ii) 18 18 1 1 2 6 6 2 VII (does not exist) VIII / (2)(a)(iii) 2 × 6 12 1 1 1 1 2 2 2 2 IX / (1)(a)(ii) 2 × S3 12 1 3 3 1 2 2 X / (1)(c)(i) 24 16 1 7 7 1 XI / (2)(a)(ii), (3)(i) 6 6 1 1 2 2 XII / (1)(a)(i), (2)(a)(i) 22 4 1 1 1 1 XIII 2 2 1 1 TABLE 3. Automorphism groups of del Pezzo surfaces of degree 2, cf. Section 4.3 Name Aut(X) Order id 4A1 8A1 2A2 3A2 4A2 2A3 + A1 2A4 A5 + A2 + A1 D4 + A2 2D4 D4(a1) + A1 2D4(a1) D8(a3) E6 + A1 E6(a2) E6(a2) + A2 E7(a2) E7(a4) + A1 E8 E8(a1) E8(a2) E8(a3) E8(a5) E8(a6) E8(a8) I - II (do not exist) III / (3)(v) 6 × D6 36 1 6 1 2 4 2 2 12 4 2 IV / (5)(iii) 21+6 + : 15 1920 1 70 1 8 64 56 80 512 384 160 512 64 8 M / (5)(ii) 21+6 + : 3 384 1 70 1 8 56 80 160 8 V / (1)(a)(iv) SL2(3) 24 1 1 8 6 8 VI - VII (do not exist) VIII (same as IV) IX (does not exist) X / (3)(ii) D12 12 1 6 1 2 2 XI / (3)(iii) 2 × 6 12 1 2 1 2 4 2 XII (does not exist) XIII / (2)(f)(i) 10 10 1 1 4 4 XIV / (1)(a)(iii) Q8 8 1 1 6 XV (does not exist) XVI / (5)(i) 21+6 + 128 1 70 1 56 XVII / (4)(i) 6 6 1 1 2 2 XVIII / (1)(a)(ii), (1)(e)(i), (3)(iv) 6 6 1 1 2 2 XIX / (1)(a)(i), (1)(d)(i) 4 4 1 1 2 XX / (2)(a)(i), (2)(e)(i), (3)(i) 22 4 1 2 1 XX’ / (2)(d)(i) 24 16 1 14 1 XXI 2 2 1 1 TABLE 4. Automorphism groups of del Pezzo surfaces of degree 1, cf. Section 6.3 AUTOMORPHISMS OF DEL PEZZO SURFACES IN CHARACTERISTIC 2 45 REFERENCES M. Aschbacher, Finite group theory, Second edition. Cambridge studies in Advanced Mathematics, 10. Cambridge University Press, Cambridge, 2000. xii+304 pp. J. Conway, R. Curtis, S. Norton, R. Parker, R. Wilson, Atlas of finite groups, Oxford Univ. Press. 1985. W. Barth, Moduli of vector bundles on the projective plane. Inventiones Mathematicae 42 (1977), 63–91. A. Beauville, Prym Varieties and the Schottky Problem. Inventiones Mathematicae 41 (1977), 149–196. S. Bosch, W. Lütkebohmert, M. Raynaud, Néron models. Ergebnisse der Mathematik und ihrer Grenzgebiete (3), 21. Springer-Verlag, Berlin, 1990. R. Carter, Conjugacy classes in the Weyl group. Compositio Mathematica, Volume 25 (1972) no. 1, pp. 1-59 M. Demazure, Surfaces de del Pezzo, I-V, in “Séminaire sur les Singularités des Surfaces”, ed. by M. Demazure, H. Pinkham and B. Teissier. Lecture Notes in Mathematics, 777. Springer, Berlin, 1980, pp. 21–69. I. Dolgachev, V. Iskovskikh, Finite subgroups of the plane Cremona group, Algebra, arithmetic, and geometry: in honor of Yu. I. Manin. Vol. I, 443–548, Progr. Math., 269, Birkhäuser Boston, Inc., Boston, MA, 2009. I. Dolgachev, Classical algebraic geometry:a modern view, Cambridge Univ. Press, 2012. I. Dolgachev, Finite subgroups of the plane Cremona group, Algebraic geometry in East Asia—Seoul 2008, 1-–49, Adv. Stud. Pure Math., 60, Math. Soc. Japan, Tokyo, 2010. I. Dolgachev, A. Duncan, Automorphisms of cubic surfaces in positive characteristic. Izv. Ross. Akad. Nauk Ser. Mat. 83 (2019), no. 3, 15–92. I. Dolgachev, G. Martin, Automorphisms of del Pezzo surfaces in odd characteristic, arXiv:2303.16170. T. Ekedahl, Canonical models of surfaces of general type in positive characteristic. Publications Mathématiques de l’IHÉS, Tome 67 (1988), 97–144. N. Katz, P. Sarnak Random matrices, Frobenius eigenvalues, and monodromy, American Mathematical Society Colloquium Publications, Volume 45, 1999, xii+419 pp. W. Lang, Configurations of singular fibres on rational elliptic surfaces in characteristic two. Special issue in honor of Robin Hartshorne. Comm. Algebra 28 (2000), no. 12, 5813-–5836. M. Neusel, L. Smith, Invariant theory of finite groups. Mathematical Surveys and Monographs, 94. American Mathematical Society, Providence, RI, 2002. K. Oguiso, T. Shioda, The Mordell-Weil lattice of a rational elliptic surface. Comment. Math. Univ. St. Paul. 40 (1991), no. 1, 83–99. R. Richardson, Conjugacy classes of involutions in Coxeter groups. Bull. Austral. Math. Soc. 26 (1982), 1–15. DEPARTMENT OF MATHEMATICS UNIVERSITY OF MICHIGAN EAST HALL, 530 CHURCH STREET, ANN ARBOR, MI 48109-1043 USA Email address: idolga@umich.edu MATHEMATISCHES INSTITUT UNIVERSITÄT BONN ENDENICHER ALLEE 60 53115 BONN GERMANY Email address: gmartin@math.uni-bonn.de
4166
https://pmc.ncbi.nlm.nih.gov/articles/PMC10864763/
Imaging of pancreatic ductal adenocarcinoma – An update for all stages of patient management - PMC Skip to main content An official website of the United States government Here's how you know Here's how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock ( ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. PMC Search Update PMC Beta search will replace the current PMC search the week of September 7, 2025. Try out PMC Beta search now and give us your feedback. Learn more Search Log in Dashboard Publications Account settings Log out Search… Search NCBI Primary site navigation Search Logged in as: Dashboard Publications Account settings Log in Search PMC Full-Text Archive Search in PMC Journal List User Guide New Try this search in PMC Beta Search View on publisher site Download PDF Add to Collections Cite Permalink PERMALINK Copy As a library, NLM provides access to scientific literature. Inclusion in an NLM database does not imply endorsement of, or agreement with, the contents by NLM or the National Institutes of Health. Learn more: PMC Disclaimer | PMC Copyright Notice Eur J Radiol Open . 2024 Feb 8;12:100553. doi: 10.1016/j.ejro.2024.100553 Search in PMC Search in PubMed View in NLM Catalog Add to search Imaging of pancreatic ductal adenocarcinoma – An update for all stages of patient management Carlos Bilreiro Carlos Bilreiro a Radiology Department, Champalimaud Foundation, Lisbon, Portugal b Champalimaud Research, Champalimaud Foundation, Lisbon, Portugal c Nova Medical School, Lisbon, Portugal Find articles by Carlos Bilreiro a,b,c,⁎, Luísa Andrade Luísa Andrade a Radiology Department, Champalimaud Foundation, Lisbon, Portugal Find articles by Luísa Andrade a, Inês Santiago Inês Santiago a Radiology Department, Champalimaud Foundation, Lisbon, Portugal Find articles by Inês Santiago a, Rui Mateus Marques Rui Mateus Marques c Nova Medical School, Lisbon, Portugal d Radiology Department, Hospital de S. José, Lisbon, Portugal Find articles by Rui Mateus Marques c,d, Celso Matos Celso Matos a Radiology Department, Champalimaud Foundation, Lisbon, Portugal b Champalimaud Research, Champalimaud Foundation, Lisbon, Portugal Find articles by Celso Matos a,b Author information Article notes Copyright and License information a Radiology Department, Champalimaud Foundation, Lisbon, Portugal b Champalimaud Research, Champalimaud Foundation, Lisbon, Portugal c Nova Medical School, Lisbon, Portugal d Radiology Department, Hospital de S. José, Lisbon, Portugal ⁎ Corresponding author at: Radiology Department, Champalimaud Foundation, Lisbon, Portugal. carlos.bilreiro@fundacaochampalimaud.pt Received 2023 Oct 15; Revised 2024 Feb 2; Accepted 2024 Feb 3; Collection date 2024 Jun. © 2024 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license ( PMC Copyright notice PMCID: PMC10864763 PMID: 38357385 Abstract Background Pancreatic ductal adenocarcinoma (PDAC) is a common and lethal cancer. From diagnosis to disease staging, response to neoadjuvant therapy assessment and patient surveillance after resection, imaging plays a central role, guiding the multidisciplinary team in decision-planning. Review aims and findings This review discusses the most up-to-date imaging recommendations, typical and atypical findings, and issues related to each step of patient management. Example cases for each relevant condition are presented, and a structured report for disease staging is suggested. Conclusion Despite current issues in PDAC imaging at different stages of patient management, the radiologist is essential in the multidisciplinary team, as the conveyor of relevant imaging findings crucial for patient care. Keywords: Pancreatic carcinoma; Neoplasm staging; Neoadjuvant therapy; Patient care team; Neoplasm recurrence, Local Highlights • Imaging is crucial for patient management in pancreatic ductal adenocarcinoma. • Contrast-enhanced CT is preferred for diagnosis and staging; MRI for hepatic staging. • Imaging performs poorly for lymph node staging and response to neoadjuvant therapy. • Anatomic findings and disease biology should both be considered for patient staging. • A multidisciplinary team is essential for obtaining the best patient outcomes. 1. Introduction Pancreatic ductal adenocarcinoma (PDAC) is one of the leading causes of cancer-related death in the modern world, with dismal survival rates . Resection remains the only potentially curative option and, combined with systemic chemotherapy, provides the best therapeutic intervention for improving survival , , . However, tumor resectability relies on an early diagnosis, which is often not possible, due to patients presenting with advanced disease and also diagnostic imaging challenges to detect subclinical disease . Furthermore, defining which patients are best suited for surgery, and which patients should be offered neoadjuvant or palliative therapy is not a simple task. Several staging systems have been developed, with different resectability criteria, and are used in different institutions; the National Cancer Comprehensive Network (NCCN) is the most widely used classification , , . Lastly, there are unresolved issues and difficulties when evaluating patients in the post-neoadjuvant therapy, and post-surgical follow-up periods , , , . Imaging plays a central role in all stages of patient management, and the radiologist’s assessment is the cornerstone of surgical and medical decision-planning. This review aims to present and discuss the most up-to-date imaging issues on pancreatic cancer diagnosis, staging, response to neoadjuvant therapy and patient follow-up. 2. Diagnosis of pancreatic ductal adenocarcinoma 2.1. Imaging technique and typical findings CT is the preferred technique for PDAC diagnosis, due to its wide availability and high diagnostic accuracy, with a reported 89–97% sensitivity , . CT equipments with dual-energy / spectral technology further improve lesion conspicuity and detection, and the newer photon-counting CT equipments have also been reported to do so , , . Lower energy-level (usually 40–50 keV) monoenergetic images provide greater attenuation by iodine contrast material, leading to improved image contrast between the hypovascular PDAC and highly vascularized pancreatic parenchyma. Transabdominal ultrasound maintains some relevancy, as it is the most accessible and least expensive imaging technique, and many pancreatic tumors are first identified on abdominal ultrasound scans . However, due to its low sensitivity and operator dependence, CT should still be performed as a first-line imaging test when PDAC is suspected, or for diagnostic confirmation and tumor staging when a tumor has been identified in ultrasound. MRI is currently a second-line diagnostic technique due to its higher cost and lower availability, with a similar sensitivity to CT for diagnosing PDAC: 83–93.5% . Its use is mainly reserved for diagnostic problem-solving. PET-CT has an estimated 90% sensitivity in detecting pancreatic cancer, but it does not offer clear benefits over CT or MRI for this purpose . Finally, endoscopic ultrasound (EUS) has a reported 91–100% sensitivity for PDAC detection, while also allowing the collection of pancreatic tissue with fine-needle biopsy for histological diagnosis , . Due to its lower accessibility when compared with other imaging alternatives, EUS is usually reserved for tissue collection for histological analysis. For PDAC diagnosis, an adequate CT protocol is of paramount importance, including pancreatic, portal venous and delayed phases (Table 1, Fig. 1). Sufficient iodine contrast dose and rate of injection, as well as a saline flush, are necessary to provide adequate lesion conspicuity in dedicated pancreatic multi-phase acquisitions , . The use of bolus-tracking technique allows acquisition timing to be individualised to each patient circulatory dynamics, ensuring optimal post-contrast phases, and is therefore recommended . When using MRI, an adequate protocol is equally important (Table 2). Typical PDAC diagnostic findings include: (1) pancreatic hypovascular mass with dilation of the upstream main pancreatic duct; (2) simultaneous dilation of the common bile duct and main pancreatic duct if the tumor is located in the head – also known as “double duct sign”; (3) main pancreatic duct stenosis with signs of chronic pancreatitis in the upstream pancreas (Fig. 2). Imaging staging should be performed before a biliary stent is placed, so ductal anatomy is clearly defined and inflammatory changes do not overlap with tumoral tissue. Table 1. CT protocol used in our Institution for pancreatic ductal adenocarcinoma diagnosis and staging. | Oral contrast | Neutral (water, 500 mL ingested over 10 min) | --- | | Intravenous contrast | 300 mg/mL; 1.5 mL/kg @3-5 mL/s; followed by 20 mL saline flush | | Acquisition phases | Without contrast | Useful for detection of calcifications | | Pancreatic | 35-50 s Pancreatic tumor detection; Arterial staging | | Portal venous | 70-80 s Metastases detection; Venous staging | | Delayed | 3-5 min Isoattenuating tumor detection | | Acquisition | Volumetric (isotropic) | Thin slices (≤ 1 mm) | | Monoenergetic (40 keV) | | MPR (tumor-organ relations) | | MIP (tumor-vascular relations) | Open in a new tab CT equipment with new-generation spectral / dual-energy / photon-counting technology for improved image contrast is recommended. MPR: multiplanar reformation; MIP: maximum intensity projection. Fig. 1. Open in a new tab Importance of the pancreatic and delayed phases for tumor detection. In the pancreatic phase (A), there is a clear distinction (dashed line) between tumoral tissue (yellow arrow) and pancreatic parenchyma (white arrow). In the portal venous phase (B), the distinction between tumor and normal pancreas is not clear. (C - E) depicts another case, where a pancreatic tumor is ill-defined on the pancreatic (C) and portal venous (D) phases, but well-defined on the delayed phase (E, arrows). Table 2. MRI protocol used in our Institution for pancreatic ductal adenocarcinoma diagnosis and staging. | Acquisitions | T2 TSE | Axial and coronal | --- | T1 GRE | In- and opposed-phase | | DWI | b =10 s/mm 2 | | DWI | b ≥800 s/mm 2; ADC map | | MRCP | 3D or 2D thick slab | | Intravenous contrast | THRIVE (fat-saturated T1 GRE) | Without contrast | Pancreatic | 35-50 s | | Portal venous | 70-80 s | | Delayed | 3-5 min | Open in a new tab Fat-suppressed T2 TSE can be acquired as an alternative depending on local preference and MR equipment perfomance. ADC: apparent diffusion coefficient; DWI: diffusion-weighted imaging; GRE: gradient recalled echo; MRCP: magnetic resonance cholangiopancreatography; THRIVE: T1-weighted High Resolution Isotropic Volume Examination; TSE: turbo spin-echo. Fig. 2. Open in a new tab Typical findings of PDAC. (A) depicts a double duct sign, where both the main pancreatic duct and the biliary tree are dilated (arrows) due to an obstructing tumor in the pancreatic head (dashed line). In (B) there is parenchymal atrophy of the pancreatic tail (arrow), due to an obstructing tumor in the pancreatic body (dashed line). (C) shows a double duct sign in MRCP (white arrows), caused by a presumed obstructing lesion (yellow arrow). (D) reveals an obstructing (white arrow) pancreatic head tumor in a T2-weighted image (yellow arrow). Notably, new developments in artificial intelligence applications may provide new opportunities for PDAC diagnosis, such as risk assessment using clinical records and accurate detection using only non-contrast-enhanced CT, as demonstrated in a large multicentric study , . 2.2. Small and isoattenuating tumors In 5.4–11% of cases, and most commonly with < 20 mm tumors, PDAC is isoattenuating: it does not stand out from the pancreatic parenchyma in the pancreatic or portal venous phases , , , . These tumors have been reported as a frequent cause of missed diagnosis for early PDAC, especially when found incidentally in imaging studies . Indirect signs such as main pancreatic duct dilation upstream of an abrupt stenosis, a double duct sign, segmental pancreatic atrophy or faint enhancement are key to the diagnosis and should prompt further investigation , . This is also where a delayed acquisition can be very useful, as it has been shown to improve sensitivity for these lesions, which often enhance in delayed scans . MRI is also helpful for detecting small and isoattenuating tumors (Fig. 3), with a reported sensitivity of 79.2% . A reduced field-of-view DWI acquisition and MR perfusion techniques have been reported to improve image quality and pancreatic focal lesion characterization, and could therefore be useful in this context , . Another useful imaging technique for characterizing small and indeterminate tumors on CT is EUS, with a reported sensitivity of 87.3%, which can be improved with the use of contrast enhancement , , . Fig. 3. Open in a new tab Isodense PDAC. This patient presented with dilated main pancreatic duct (A and B, white arrows) and slightly dilated biliary tree, but a pancreatic tumor was not clearly seen on CT on both pancreatic (A) and portal venous (B) phases. MRI clearly identifies the obstructing tumor in the pancreatic head, as observed on DWI (C, yellow arrow) and a double duct sign on MRCP (D, white arrows). 2.3. Diffuse tumoral infiltration and mass-forming pancreatitis An uncommon diagnostic challenge is the diffuse neoplastic infiltration, mainly in the tail of the pancreas, without dilation of the main pancreatic duct . The main differential diagnosis is autoimmune pancreatitis, which presents similar imaging findings. Likewise, mass-forming pancreatitis can mimic a neoplastic lesion and be impossible to differentiate from PDAC on CT. In both cases, magnetic resonance cholangiopancreatography (MRCP) may be useful, showing the “duct penetrating sign” - characteristic of benign lesions and enhanced with secretin administration , . Also, MRI can show multi-organ involvement in cases of autoimmune pancreatitis, often in the kidneys in the context of IgG4-related disease, facilitating this diagnosis (Fig. 4) , . Additional useful findings favoring auto-immune pancreatitis instead of PDAC include the typical diffuse enlargement with loss of lobulation of pancreatic parenchyma (sausage-shape), homogeneous enhancement, absence of upstream main pancreatic duct dilatation, capsulelike rim and absence of vascular invasion, . Fig. 4. Open in a new tab Diagnostic problem-solving with MRI. This patient presented with dilated main pancreatic duct and biliary tree (A, white arrows), highly suspicious for a pancreatic head tumor (yellow arrow). However, DWI revealed not only a restricting pancreatic head (B, yellow arrow), but also areas of restriction in both kidneys (B, white arrows). These findings prompted the diagnosis of auto-immune pancreatitis, which was confirmed after a 2-week steroid trial. 3. Staging of PDAC When deciding what treatment to offer a patient with PDAC, either resection, neoadjuvant therapy or palliative care, imaging plays the most central role. Patients’ disease is initially staged as resectable, borderline resectable, locally advanced, or metastatic. This review will focus on the latest NCCN PDAC staging criteria, as it is the most widely used classification . The goal is to obtain an R0 resection, which provides the best chance for patient survival, and the surgical procedure is dependent on tumor location, vascular and adjacent organ involvement. 3.1. Local and vascular staging Vascular involvement is the major resectability determinant in PDAC and is best assessed with contrast-enhanced CT (Fig. 5). Multiplanar reformations (MPR) and maximum intensity projections (MIP) are extremely useful, both for diagnosis and for showcasing findings to the surgeon. The terms “abutment” and “encasement” refer to ≤ 180º and > 180º tumoral contact with a blood vessel, respectively, the latter predicting the presence of vascular invasion , , . Blood vessel deformity and the “teardrop sign”, as well as occlusion, are also highly predictive of vascular invasion (Fig. 6, Fig. 7) . Fig. 5. Open in a new tab (A) is a schematic representation of relevant anatomical structures for PDAC staging. If a tumor is located on the pancreatic head (1), a cephalic duodenopancreatectomy is performed, and if the tumor is located on the pancreatic body and/or tail (2), then a distal pancreatectomy is performed. More extensive tumors might require a total pancreatectomy. (B) is a coronal MIP displaying the relevant blood vessels for PDAC staging, an extremely useful tool for showcasing findings in multidisciplinary team meetings. CT: celiac trunk; HA: hepatic artery (comprises both common hepatic and hepatic proper); LGA: left gastric artery; PV: portal vein; SA: splenic artery; SMA: superior mesenteric artery; SMV: superior mesenteric vein; SV: splenic vein. Fig. 6. Open in a new tab Schematic representation of blood vessel involvement in PDAC staging. (A) tumor-vein contact ≤ 180º (abutment); (B) tumor-vein contact > 180º (encasement); (C) teardrop sign; (D) vessel contour deformity; (E) and (F) arterial abutment and encasement (≤ and > 180º), respectively. Fig. 7. Open in a new tab Venous involvement in PDAC. (A) Tumor-superior mesenteric vein contact < 180º (abutment). (B) Teardrop sign of the superior mesenteric vein (arrow). (D) Portal vein stenosis and deformity (arrows). (D) Superior mesenteric vein occlusion (arrows). As summarized in Table 3, resectable tumors have no arterial contact, and no / limited venous contact (abutment). Patients in this category can be proposed for upfront surgery. Borderline resectable tumors include tumors with limited vascular involvement, or vascular involvement that can be surgically repaired. Patients with borderline resectable disease are offered neoadjuvant therapy; surgical resection can be later performed, depending on response to neoadjuvant therapy and local surgical expertise. Patients with locally advanced disease have extensive vascular involvement. These patients are offered systemic chemotherapy, chemoradiation, or inclusion in clinical trials. Depending on response assessment and performance status, resection surgery can still be performed after neoadjuvant therapy , . If disease progression is evident with vascular involvement precluding surgery or metastatic disease, then the best palliative care or inclusion in clinical trials are the remaining options. Table 3. NCCN V2.2023 resectability criteria adapted from . | Resectable | Arteries | No tumoral contact | --- | Veins | No tumoral contact / ≤ 180º PV or SMV contact without deformity | | Borderline | Arteries | ≤ 180º SMA or CT contact | | Limited CHA contact (not extending to its bifurcation nor the CT) | | Anatomical variant with arterial involvement allowing for surgical management | | Veins | ≤ 180º PV or SMV contact with deformity | | > 180º PV or SMV contact but surgically repairable | | Tumoral contact with IVC | | Unresectable | Arteries | > 180º SMA or CT contact; extensive HA involvement | | Veins | > 180º PV or SMV contact non-surgically repairable | Open in a new tab CHA: common hepatic artery; CT: celiac trunk; IVC: inferior vena cava; HA: hepatic artery; NCCN: National Comprehensive Cancer Network; PV: portal vein; SMA: superior mesenteric artery; SMV: superior mesenteric vein. Abutment and encasement are considered synonyms with < 180º and > 180º tumoral contact, respectively. Since being first introduced in 1997, the criteria for borderline resectable staging category have been updated over the years, reflecting accumulating evidence and international consensus , . These patients have limited vascular involvement and surgical resection is possible, but a margin-free resection is unlikely, therefore benefiting clearly from neoadjuvant therapy. The definition of vascular involvement with objective criteria (vessel circumference involvement and contour irregularity) has contributed to a more standardized classification. More recently, the involvement of proximal jejunal branches was categorized as unresectable disease in 2017, but this involvement is not included in the latest versions , . This led to a reported improved accuracy in disease staging and better patient stratification . It is important to be aware of the evolving nature of these staging criteria, with consequences both for clinical practice over time and for the validity of reported data, when comparing with current guidelines. Vascular anatomical variants are common and can have surgical implications for PDAC , , , . Not only should replaced or accessory hepatic arteries be identified to avoid surgical complications, these variants can also provide surgical opportunities, when providing an alternative hepatic arterial supply without tumoral involvement (Fig. 8). Anatomical variants can also preclude surgery or determine a hepatic resection, especially if a replaced hepatic artery is involved by tumor and there is no collateral arterial inflow. Fig. 8. Open in a new tab Arterial variants with surgical implications. (A) depicts the anatomy of a patient with a replaced right hepatic artery (RRHA) originating from the superior mesenteric artery (SMA) and a replaced left hepatic artery (RLHA) originating from the left gastric artery (LGA). The celiac trunk (CT) was encased by the tumor, as represented in (B, dashed line). As arterial collaterals were present between both replaced hepatic arteries, a celiac trunk resection along with tumor resection were performed, and the patient maintained a preserved liver vascularization. (C) represents another patient with the following anatomy: RLHA from LGA, middle hepatic artery (MHA) from CT, and RRHA from SMA. The RRHA was encased by tumor, as shown in (D, dashed line). This allowed tumor resection along with the RRHA, after an embolization procedure for facilitating the development of collaterals. Celiac trunk stenosis, either due to atherosclerosis or arcuate ligament syndrome, can predispose patients to hepatic ischemia, as the collateral arterial flow to the liver is disrupted during surgery (Fig. 9) , , . CT is the preferred method for diagnosing this condition, allowing preventive surgical procedures, such as arcuate ligament release and celiac artery stenting , . Fig. 9. Open in a new tab Arcuate ligament syndrome. Proximal celiac trunk (CT) stenosis with a hooked appearance (arrow), with pos-stenotic dilatation. Besides the vascular staging, involvement of adjacent organs should be identified, most often the duodenum, stomach, left adrenal, left kidney, spleen and colon, as these will have to be resected during surgery if involved by the tumor . Also, tumoral extension to the mesocolon, most often the transverse mesocolon, should be identified at this stage for surgical planning, possibly determining a colon resection. Of mention, EUS has been reported to improve staging accuracy, especially when compared with older CT technology, identifying 14% unresectable patients previously staged as resectable on CT , , . However, newer CT technology has improved diagnostic and staging accuracy, and comparative studies with EUS are not yet available. 3.2. Hepatic, peritoneal, and pulmonary staging Liver metastases can be detected by CT, however with a relatively low sensitivity: 69% , . MRI is superior for this purpose, especially when performed with gadoxetic acid, with a reported sensitivity of 85% . Furthermore, DWI has been reported to detect undiagnosed liver metastases on CT in 10–12.9% of patients and prevent futile surgeries in metastatic patients , , . As such, it is recommended that liver staging is performed using MRI (Fig. 10). PET-CT has a reported 93% sensitivity in the detection of liver metastases for lesions > 1 cm, which is reduced to 70% when considering all lesion sizes . Fig. 10. Open in a new tab Importance of MRI for hepatic staging. In a contrast-enhanced CT for PDAC staging (A), no liver lesions were found. The staging MRI clearly revealed hepatic metastases (arrows) with restricted diffusion on DWI (B). There is no evidence determining the best timing for liver staging MRI (with or without gadoxetic acid) in the case of biliary obstruction, if before or after stent placement. Performing MRI before stent placement, will avoid artifacts in the case of metallic stents and allow better biliary anatomy depiction. Also, biliary stent placement may be associated with cholangitis, which may cause liver perfusion changes and course with small hepatic abscesses , . For these reasons, we perform hepatic staging MRI as soon as possible. Finally, differentiating small hepatic abscesses from metastases can be a difficult task. Contrast-enhanced CT findings have been reported to help in this regard, favoring the diagnosis of abscesses: patchy parenchymal enhancement, perilesional hyperemia and, especially, arterial rim enhancement persistent through portal venous phase . Dual-energy CT may improve on the technique’s ability to distinguish both lesions . DWI may also be helpful, as hepatic metastases tend to present lower ADC values at their periphery, when compared with abscesses . Peritoneal metastases usually manifest as nodular lesions, detectable by both CT and MRI (Fig. 11). However, early peritoneal disease can be hard to identify, and evidence is lacking into imaging effectiveness for its diagnosis , . Staging laparoscopy can be performed for this purpose, and has been shown to be more sensitive than CT, but its usefulness has been debated due to poor cost-effectiveness when staging MRI is performed , . Nevertheless, recent data reporting high rates of positive staging laparoscopies has prompted some authors to advocate its use in the majority of patients prior to resection . Fig. 11. Open in a new tab Metastatic PDAC with peritoneal metastases. (A) reveals a bulky PDAC of the body and tail (dashed line), with hepatic metastases (arrows). There are also peritoneal metastases, as observed with an “omental cake” appearance in the pelvis (B, arrows). PDAC can also metastasize to the lung, but the usefulness of including chest CT in tumoral staging and follow-up has been debated , . Nevertheless, we include a chest CT in our staging protocol, which may serve as a baseline for comparison in future studies, should indeterminate or suspicious lung nodules be identified. 3.3. Lymph node staging Lymph node staging is still poorly performed by imaging. CT has a reported sensitivity of only 14–44% for diagnosing nodal tumor infiltration when 10 mm short-axis is used as diagnostic criterion , . Combining size criteria with contour irregularity, heterogeneous signal intensity and/or density and increased number of visible nodes has been reported to improve sensitivity . EUS has been reported to be superior in identifying suspicious lymph nodes in loco-regional and para-aortic locations, and is currently regarded as the most sensitive imaging technique for this purpose , . Nevertheless, it is not routinely included in lymph node staging recommendations . Gallium-68-labeled fibroblast activation protein inhibitor PET-CT was reported to improve detection of pathologic lymph nodes in a preliminary study, but more data is needed before recommending its use . A promising artificial intelligence model outperformed radiologists in lymph node staging using CT, while also providing prognostic information for patients . Enlarged lymph nodes should be mentioned in the radiological CT or MRI report, especially when outside of loco-regional location, but this low diagnostic performance with current imaging methods must be kept in mind . 3.4. Radiological structured report The use of a radiological structured report is recommended, to provide a clear and standardized communication of imaging findings to surgeons and oncologists , . This also ensures that no relevant structures for tumor staging are forgotten or overlooked in the report. An example structured reporting template is suggested in Table 4, adapted from . The reporting template should be tailored in each center to provide the multidisciplinary team with the information needed in an easily accessible way. Note that extensive descriptions of vascular involvement in patients with metastatic disease are usually not necessary, unless there is a specific motive for it, such as inclusion in a clinical trial. Table 4. Structured reporting template. | Pancreatic tumor | Location | Head / Neck / Body / Tail | --- | Size | Largest axis; approximate measurement if ill-defined | | MPD and biliary tree | Dilated / Not dilated | | Adjacent organ involvement | NA / Describe involvement (stomach, adrenal, colon, etc.) | | Arteries | CT | Free ≤ 180º / > 180º / Deformity / Occlusion (extension in mm) Mention stenosis or atherosclerosis | | CHA | Free ≤ 180º / > 180º / Deformity / Occlusion (extension in mm) Extension to CT or bifurcation | | SA | Free ≤ 180º / > 180º / Deformity / Occlusion (extension in mm) | | SMA | Free ≤ 180º / > 180º / Deformity / Occlusion (extension in mm) | | SMA branches | Free Mention involved branches (extension in mm) | | Variant anatomy | NA / Replaced CHA / Accessory RHA / Replaced RHA / Accessory LHA / Replaced LHA / Other_ | | Variant involvement | _NA / Free / ≤ 180º / > 180º / Deformity / Occlusion | | Veins | PV | Free ≤ 180º / > 180º / Deformity / Occlusion (extension in mm) | | SMV | Free ≤ 180º / > 180º / Deformity / Occlusion (extension in mm) | | Collaterals | NA / pancreatic head / hepatic hilum / mesenteric / LUQ | | Metastases | Liver | Absent / Present / Indeterminate | | Peritoneum | Absent / Present / Indeterminate Ascites Absent / Present | | Lung | Absent / Present / Indeterminate | | Lymph nodes | If suspicious, mention location(s) | NA / Peri-pancreatic / Hepatic hilum / Celiac / Aortocaval / Para-aortic / Splenic | | Other findings | Free writing | Open in a new tab One or more options presented in italics should be chosen in each field according to imaging findings, and longitudinal extension of vessel involvement provided in millimeters. Further description can be added at the end of the report, when variant anatomy or involvement cannot be adequately described in the template. CHA: common hepatic artery; CT: celiac trunk; LHA: left hepatic artery; LUQ: left upper quadrant; MPD: main pancreatic duct; NA: non-applicable; PV: portal vein; RHA: right hepatic artery; SA: splenic artery; SMA: superior mesenteric artery; SMV: superior mesenteric vein. 3.5. Current issues with PDAC staging Some aspects of the current widely used NCCN staging classification for PDAC have been debated . Mainly, the dependence on strict anatomic criteria for defining treatment strategies for patients with PDAC, directed at surgical feasibility, often fails to consider disease biology. Starting with anatomic staging issues, the 180º threshold can be insufficient for vascular staging, as the longitudinal extension of vessel involvement also determines surgical technique and has been shown to predict survival: patients with more than 20 mm of vascular involvement have a worse prognosis and may be candidates for neoadjuvant therapy . Another issue is the involvement of the splenic artery which may fit in the resectable category, while the involvement of the celiac trunk, hepatic artery or superior mesenteric artery determine borderline resectable or locally advanced disease . Patients may therefore be proposed for upfront surgery with a resectable although aggressive disease, missing potential survival benefits from neoadjuvant therapy. Finally, large tumor size, which is not category-defining for resectability, has also been associated with poor prognosis, and should be considered when deciding which treatment to offer a patient , . The presence of para-aortic lymph node metastases, which may easily be missed on imaging as previously discussed, is another predictor of poor prognosis , , , . Despite these diagnostic difficulties and the fact that they are not routinely removed on surgery, these nodes are considered metastatic disease, and adjuvant chemotherapy has been recommended for improving outcomes in these patients , . Surgical resection is not recommended for metastatic patients according to current guidelines; however, it is performed after neoadjuvant therapy in some institutions, for selected patients with oligometastatic disease. This has been reported to improve survival, but more evidence is needed before widespread acceptance , , . Recurrence risk is also not sufficiently addressed in the anatomic classification. In a large series evaluating early recurrence, pre-operative risk factors were identified, including: CA 19–9 > 210 U/mL, Charlson age-comorbidity index ≥ 4, tumor size > 3 cm; post-operative risk factors were also identified, including: poor tumor differentiation, microscopic lymphovascular invasion, lymph node ratio > 0.2, and CA 19–9 > 37 U/mL . None of these are considered in the anatomic resection criteria. Furthermore, the inclusion of neoadjuvant therapy based on risk factors for early recurrence was shown to improve survival . Local recurrence has additionally been associated with high rates of post-venous reconstruction thrombosis, rather than anatomic or technical factors, further demonstrating the relevance of disease biology in determining patient outcomes . Management of patients with PDAC with resectable disease is also currently being discussed. Neoadjuvant therapy has been proposed in purely resectable patients, showing some improvement in disease-free survival in a small number of trials . However, conflicting evidence showed no clear improvement in survival, and more data on this issue is needed before issuing favorable recommendations for clinical practice , . More recently, a randomised clinical trial found no survival benefit from the use of neoadjuvant therapy in resectable patients with PDAC, when compared to upfront resection, further disfavoring its use . In summary, accumulating data tend to consider PDAC as a systemic disease and favor the use of neoadjuvant therapy even in selected high-risk resectable patients, while also selecting patients previously categorized as unresectable or even oligometastatic, as candidates for surgical resection with favorable outcomes. Patient management decisions should therefore be made in a multidisciplinary team setting, considering both the anatomic staging and additional prognostic factors. 3.6. Alternative staging classifications Other staging classifications have been developed, including additional prognostic factors in the decision-making process. The MD Anderson Cancer Center developed a well-known classification incorporating anatomic criteria, tumor biology and patient performance status for patient categorization , . This type of classification has been used later in a consensus meeting to categorize borderline resectable and locally advanced patients in different types, according to anatomic, biological, and conditional factors . Here, in addition to the anatomic classification (resectable, borderline resectable and locally advanced), biological factors (serum CA 19–9 >500 IU/mL and/or positive regional lymph node metastases) and conditional factors (performance status) were added for an integrative patient stratification. Additionally, other classifications were developed based on anatomic criteria, but without such widespread use as the NCCN classification. These include the American Society of Clinical Oncology, Intergroup Alliance, and Americas Hepato-Pancreato-Biliary Association / Society of Surgical Oncology / Society for Surgery of the Alimentary Tract , , . These classifications also use the resectable, borderline resectable and unresectable / locally advanced categories, but with different criteria, which were highlighted in a consensus meeting . 4. Response to neoadjuvant therapy Assessing response to neoadjuvant therapy for PDAC is a difficult task in clinical practice. Tumor size criteria are not useful for this purpose, as the fibrotic tumoral stroma remains, even when a response has occurred in cancer cells , , . The current methods for evaluating response to neoadjuvant therapy reside on tumoral markers evolution (serum CA19–9 concentration) and the absence of disease progression as evidenced by imaging studies , , . If progression is not apparent – the pancreatic tumor is stable or has reduced in size, and tumor markers have not increased – then a response is presumed and the patient can be proposed for surgery, in the case of initial borderline or even locally advanced disease (Fig. 12). Also, standard criteria for vascular resectability based on the amount of tumor-vessel contact are not useful post-neoadjuvant therapy, and an improvement of tumor-vascular involvement is highly predictive of an R0 resection, even if partial . Furthermore, the presence of tumor regression after neoadjuvant therapy was not correlated with survival, in a cohort of patients with R0 resections . Disease extension as observed on CT should not just be disregarded, however. Smaller tumor size and reduction of arterial contact, as well as imaging scores based on arterial involvement and resectability status, performed both before and after neoadjuvant therapy, were correlated with probability of R0 resection , . Fig. 12. Open in a new tab Response to neoadjuvant therapy. (A) reveals a locally advanced PDAC (dashed line) with common hepatic artery (CHA) encasement up to the celiac trunk bifurcation (CT). After the completion of neoadjuvant chemotherapy, the tumor had reduced in size (B, dashed line), but maintained a long encasement of the CHA. The patient underwent surgery, with an R0 resection. Some studies have evaluated the role of DWI for response assessment, reporting a correlation of apparent diffusion coefficient (ADC) with histopathological response, but others have not found it useful , , , , . The value of DWI in this context remains undetermined, and further studies are needed to provide recommendations for clinical practice . The role of FDG-PET for neoadjuvant therapy response assessment has also been evaluated. Both CT and MRI FDG-PET’s metabolic response has been reported to be associated with pathologic response, being superior than CA19–9 for this purpose , . FDG-PET MRI added to contrast-enhanced CT showed improved accuracy for determining resectability status when compared with contras-enhanced CT alone, in a retrospective study . A recent systematic review reported FDG-PET’s potential for predicting and assessing response to neoadjuvant therapy; however, the small numbers of patients enrolled in each study and methodological heterogeneity prompt the need for well-designed prospective trials . Recent developments in molecular imaging provided potential biomarkers for response to neoadjuvant therapy evaluation, as well as improving diagnostic and staging accuracy, with encouraging results . However, these require validation and thus cannot yet be recommended for clinical practice. Considering current limited tools for response assessment, the therapeutic decision after neoadjuvant therapy should always be made by a multidisciplinary team, taking into account imaging, biochemical and patient fitness data. The surgical decision is heavily dependent on the surgical team expertise, especially in cases of initially advanced disease or extensive vascular involvement , . 5. Patient surveillance after resection First, some important issues regarding pathologic assessment of PDAC resection margin should be discussed. The R0 definition for PDAC resection has been debated, and controversy regarding microscopic margin involvement has contributed to variability in reported R1 rates , , . Although UICC’s classification considers R0 as absence of tumor cells at the resection margin, a free resection margin of ≥ 1 mm defining R0 is also frequently used, and was associated with better survival when compared with < 1 mm , . Despite this, in the presence of lymph node positive disease, recurrence patterns were reportedly similar for both R0 and R1 patients . Also, free margins larger than 1.5 mm have been reported to correlate with survival, as explained by the dispersed growth pattern of PDAC , . Other issues including challenges in specimen grossing and sampling, and the variable R0 definitions used in published literature, have been considered as important factors undermining the data quality of reported clinical outcomes of PDAC resection . Evidence for recommending specific surveillance methods after PDAC resection is lacking, and the value of surveillance has been debated , . Nevertheless, patients undergoing post-resection surveillance have been reported to have improved detection of disease recurrence at asymptomatic stages, were more likely to receive treatment for the recurrence and presented longer overall survival , . A tumoral recurrence is usually found in the surgical bed, in the mesenteric root or the pancreatic remnant (Fig. 13). Local perivascular densification is common post-resection; however, a perivascular densification increasing in size in serial imaging or leading to a de novo change in the caliber or regularity of the vessel should be considered suspicious for local recurrence . Distant recurrence is most commonly found in the liver or lungs . A surveillance scheme including serum CA19–9 and CT (chest, abdomen and pelvis) every 3–6 months for 2 years after surgical resection has been recommended, and is followed in our institution . MRI is usually not included in a surveillance setting but can be used for disease staging if a recurrence is suspected. Fig. 13. Open in a new tab Recurrence of PDAC. Two cases of local recurrence of PDAC (dashed lines), in (A) encasing the celiac trunk (CT) and common hepatic artery (CHA), and in (B) encasing the superior mesenteric artery (SMA) and invading the superior mesenteric vein (SMV) with a teardrop sign. 6. Conclusion Imaging plays a central role in all stages of patient management for PDAC: diagnosis, staging, response to neoadjuvant therapy and post-surgical surveillance. Diagnostic and staging performance of current imaging modalities is high; however, there are unresolved issues when staging patients and assessing response to neoadjuvant therapy, and evidence is lacking for dedicated patient surveillance protocols. Nevertheless, an experienced radiologist remains essential in the multidisciplinary team caring for patients with PDAC. CRediT authorship contribution statement Matos Celso: Writing – review & editing, Methodology, Conceptualization. Marques Rui Mateus: Writing – review & editing, Methodology. Santiago Inês: Writing – review & editing. Andrade Luísa: Writing – review & editing, Methodology, Investigation, Data curation, Conceptualization. Bilreiro Carlos: Writing – review & editing, Writing – original draft, Visualization, Resources, Methodology, Formal analysis, Data curation, Conceptualization. Declaration of Competing Interest The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. Acknowledgements This work did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors. References 1.Siegel R.L., Miller K.D., Fuchs H.E., Jemal A. Cancer statistics, 2022. Ca. Cancer J. Clin. 2022;72:7–33. doi: 10.3322/CAAC.21708. [DOI] [PubMed] [Google Scholar] 2.Ducreux M., Cuhna A.S., Caramella C., Hollebecque A., Burtin P., Goéré D., Seufferlein T., Haustermans K., Van Laethem J.L., Conroy T., Arnold D. Cancer of the pancreas: ESMO clinical practice guidelines for diagnosis, treatment and follow-up. Ann. Oncol. . J. Eur. Soc. Med. Oncol. 2015;26(Suppl 5):v56–v68. doi: 10.1093/ANNONC/MDV295. [DOI] [PubMed] [Google Scholar] 3.Strobel O., Neoptolemos J., Jäger D., Büchler M.W. Optimizing the outcomes of pancreatic cancer surgery. Nat. Rev. Clin. Oncol. 2019;16:11–26. doi: 10.1038/S41571-018-0112-1. [DOI] [PubMed] [Google Scholar] 4.Sohn T.A., Yeo C.J., Cameron J.L., Koniaris L., Kaushal S., Abrams R.A., Sauter P.K., Coleman J., Hruban R.H., Lillemoe K.D. Resected adenocarcinoma of the pancreas-616 patients: results, outcomes, and prognostic indicators. J. Gastrointest. Surg. 2000;4:567–579. doi: 10.1016/S1091-255X(00)80105-5. [DOI] [PubMed] [Google Scholar] 5.Kang J.D., Clarke S.E., Costa A.F. Factors associated with missed and misinterpreted cases of pancreatic ductal adenocarcinoma. Eur. Radiol. 2021;31:2422–2432. doi: 10.1007/S00330-020-07307-5. [DOI] [PubMed] [Google Scholar] 6.M.A. Tempero, M.P. Mokenge, A.B. Benson III, R.H. Lurie, D.B. Cardin, E. Gabriela Chiorean, F.A. Hutchinson Cancer Center Jared Christensen, V. Chung, B. Czito, M. Del Chiaro, T.R. Donahue, E. Dotan, C. Fountzilas, E.S. Glazer, J. Hardacre, W.G. Hawkins, K. Klute, A.H. Ko, J.W. Kunstman, N. LoConte, A.M. Lowy, A. Masood, L. Nardo, ɸ Ф, J. Obando, P.M. Polanco, S. Reddy, M. Reyngold, C. Scaife, J. Shen, M.J. Truty, C. Vollmer Jr, R.A. Wolff, B.M. Wolpin, N. Susan Darlow, S. Kurtoglu Lubin, M.R. Beth McCullough, NCCN Guidelines Version 2.2023 Pancreatic Adenocarcinoma, (2023). (Accessed 19 September 2023). 7.Khorana A.A., Shapiro M., Mangu P.B., Berlin J., Engebretson A., Hong T.S., Maitra A., Katz M.H.G., Mohile S.G., Mumber M., Schulick R., Urba S., Zeh H.J. Potentially curable pancreatic cancer: American society of clinical oncology clinical practice guideline update. J. Clin. Oncol. 2017;35:2324–2328. doi: 10.1200/JCO.2017.72.4948. [DOI] [PubMed] [Google Scholar] 8.Varadhachary G.R., Tamm E.P., Abbruzzese J.L., Xiong H.Q., Crane C.H., Wang H., Lee J.E., Pisters P.W.T., Evans D.B., Wolff R.A. Borderline resectable pancreatic cancer: definitions, management, and role of preoperative therapy. Ann. Surg. Oncol. 2006;13:1035–1046. doi: 10.1245/ASO.2006.08.011. [DOI] [PubMed] [Google Scholar] 9.Zins M., Matos C., Cassinotto C. Pancreatic adenocarcinoma staging in the era of preoperative chemotherapy and radiation therapy. Radiology. 2018;287:374–390. doi: 10.1148/RADIOL.2018171670. [DOI] [PubMed] [Google Scholar] 10.Zaharia C., Søreide K. Call for better response evaluation after neoadjuvant therapy in pancreatic cancer. Br. J. Surg. 2023;110:294–296. doi: 10.1093/BJS/ZNAC452. [DOI] [PMC free article] [PubMed] [Google Scholar] 11.Xu J., Zhan H., Li F., Hu S., Wang L. Neoadjuvant therapy for pancreatic cancer: limitations and advances of response assessment (Review) Oncol. Rep. 2021;45 doi: 10.3892/OR.2021.7977. [DOI] [PubMed] [Google Scholar] 12.Soloff E.V., Al-Hawary M.M., Desser T.S., Fishman E.K., Minter R.M., Zins M. Imaging assessment of pancreatic cancer resectability after neoadjuvant therapy: AJR expert panel narrative review. Ajr. Am. J. Roentgenol. 2022;218:570–581. doi: 10.2214/AJR.21.26931. [DOI] [PubMed] [Google Scholar] 13.Dallongeville A., Corno L., Silvera S., Boulay-Coletta I., Zins M. Initial diagnosis and staging of pancreatic cancer including main differentials. Semin. Ultrasound, CT Mri. 2019;40:436–468. doi: 10.1053/J.SULT.2019.08.001. [DOI] [PubMed] [Google Scholar] 14.El Kayal N., Lennartz S., Ekdawi S., Holz J., Slebocki K., Haneder S., Wybranski C., Mohallel A., Eid M., Grüll H., Persigehl T., Borggrefe J., Maintz D., Heneweer C. Value of spectral detector computed tomography for assessment of pancreatic lesions. Eur. J. Radiol. 2019;118:215–222. doi: 10.1016/J.EJRAD.2019.07.016. [DOI] [PubMed] [Google Scholar] 15.Beer L., Toepker M., Ba-Ssalamah A., Schestak C., Dutschke A., Schindl M., Wressnegger A., Ringl H., Apfaltrer P. Objective and subjective comparison of virtual monoenergetic vs. polychromatic images in patients with pancreatic ductal adenocarcinoma. Eur. Radiol. 2019;29 doi: 10.1007/S00330-019-06116-9. [DOI] [PMC free article] [PubMed] [Google Scholar] 16.Decker J.A., Becker J., Härting M., Jehs B., Risch F., Canalini L., Wollny C., Scheurig-Muenkler C., Kroencke T., Schwarz F., Bette S. Optimal conspicuity of pancreatic ductal adenocarcinoma in virtual monochromatic imaging reconstructions on a photon-counting detector CT: comparison to conventional MDCT. Abdom. Radiol. 2023;49:103–116. doi: 10.1007/S00261-023-04042-5/FIGURES/6. [DOI] [PMC free article] [PubMed] [Google Scholar] 17.Karlson B.M., Ekbom A., Lindgren P.G., Källskog V., Rastad J. Abdominal US for diagnosis of pancreatic tumor: prospective cohort analysis. Radiology. 1999;213:107–111. doi: 10.1148/RADIOLOGY.213.1.R99OC25107. [DOI] [PubMed] [Google Scholar] 18.Chu L.C., Goggins M.G., Fishman E.K. Diagnosis and detection of pancreatic cancer. Cancer J. (U. S. ) 2017;23:333–342. doi: 10.1097/PPO.0000000000000290. [DOI] [PubMed] [Google Scholar] 19.Rijkers A.P., Valkema R., Duivenvoorden H.J., Van Eijck C.H.J. Usefulness of F-18-fluorodeoxyglucose positron emission tomography to confirm suspected pancreatic cancer: a meta-analysis. Eur. J. Surg. Oncol. 2014;40:794–804. doi: 10.1016/J.EJSO.2014.03.016. [DOI] [PubMed] [Google Scholar] 20.Zakaria A., Al-Share B., Klapman J.B., Dam A. The role of endoscopic ultrasonography in the diagnosis and staging of pancreatic cancer. Cancers. 2022;14 doi: 10.3390/CANCERS14061373. [DOI] [PMC free article] [PubMed] [Google Scholar] 21.DeWitt J., Devereaux B.M., Lehman G.A., Sherman S., Imperiale T.F. Comparison of endoscopic ultrasound and computed tomography for the preoperative evaluation of pancreatic cancer: a systematic review. Clin. Gastroenterol. Hepatol. 2006;4:717–725. doi: 10.1016/J.CGH.2006.02.020. [DOI] [PubMed] [Google Scholar] 22.Bae K.T. Intravenous contrast medium administration and scan timing at CT: considerations and approaches. Radiology. 2010;256:32–61. doi: 10.1148/RADIOL.10090908. [DOI] [PubMed] [Google Scholar] 23.Loizou L., Albiin N., Leidner B., Axelsson E., Fischer M.A., Grigoriadis A., Del Chiaro M., Segersvärd R., Verbeke C., Sundin A., Kartalis N. Multidetector CT of pancreatic ductal adenocarcinoma: Effect of tube voltage and iodine load on tumour conspicuity and image quality. Eur. Radiol. 2016;26:4021–4029. doi: 10.1007/S00330-016-4273-Y. [DOI] [PubMed] [Google Scholar] 24.Placido D., Yuan B., Hjaltelin J.X., Zheng C., Haue A.D., Chmura P.J., Yuan C., Kim J., Umeton R., Antell G., Chowdhury A., Franz A., Brais L., Andrews E., Marks D.S., Regev A., Ayandeh S., Brophy M.T., Do N.V., Kraft P., Wolpin B.M., Rosenthal M.H., Fillmore N.R., Brunak S., Sander C. A deep learning algorithm to predict risk of pancreatic cancer from disease trajectories. Nat. Med. 2023;29:1113–1122. doi: 10.1038/s41591-023-02332-5. 2023 295. [DOI] [PMC free article] [PubMed] [Google Scholar] 25.Cao K., Xia Y., Yao J., Han X., Lambert L., Zhang T., Tang W., Jin G., Jiang H., Fang X., Nogues I., Li X., Guo W., Wang Y., Fang W., Qiu M., Hou Y., Kovarnik T., Vocka M., Lu Y., Chen Y., Chen X., Liu Z., Zhou J., Xie C., Zhang R., Lu H., Hager G.D., Yuille A.L., Lu L., Shao C., Shi Y., Zhang Q., Liang T., Zhang L., Lu J. Large-scale pancreatic cancer detection via non-contrast CT and deep learning. Nat. Med. 2023;29:3033–3043. doi: 10.1038/s41591-023-02640-w. 2023 2912. [DOI] [PMC free article] [PubMed] [Google Scholar] 26.Prokesch R.W., Chow L.C., Beaulieu C.F., Bammer R., Jeffrey R.B. Isoattenuating pancreatic adenocarcinoma at multi-detector row CT: secondary signs. Radiology. 2002;224:764–768. doi: 10.1148/RADIOL.2243011284. [DOI] [PubMed] [Google Scholar] 27.Gangi S., Fletcher J.G., Nathan M.A., Christensen J.A., Harmsen W.S., Crownhart B.S., Chari S.T. Time interval between abnormalities seen on CT and the clinical diagnosis of pancreatic cancer: retrospective review of CT scans obtained before diagnosis. Ajr. Am. J. Roentgenol. 2004;182:897–903. doi: 10.2214/AJR.182.4.1820897. [DOI] [PubMed] [Google Scholar] 28.Kim J.H., Park S.H., Yu E.S., Kim M.H., Kim J., Byun J.H., Lee S.S., Hwang H.J., Hwang J.Y., Lee S.S., Lee M.G. Visually isoattenuating pancreatic adenocarcinoma at dynamic-enhanced CT: frequency, clinical and pathologic characteristics, and diagnosis at imaging examinations. Radiology. 2010;257:87–96. doi: 10.1148/RADIOL.10100015/-/DC1. [DOI] [PubMed] [Google Scholar] 29.Fukukura Y., Kumagae Y., Fujisaki Y., Yamagishi R., Nakamura S., Kamizono J., Nakajo M., Kamimura K., Nagano H., Takumi K., Yoshiura T. Adding delayed phase images to dual-phase contrast-enhanced CT increases sensitivity for small pancreatic ductal adenocarcinoma. Ajr. Am. J. Roentgenol. 2021;217:888–897. doi: 10.2214/AJR.20.25430. [DOI] [PubMed] [Google Scholar] 30.Toshima F., Watanabe R., Inoue D., Yoneda N., Yamamoto T., Sasahira N., Sasaki T., Matsuyama M., Minehiro K., Tateishi U., Gabata T. Ct abnormalities of the pancreas associated with the subsequent diagnosis of clinical stage i pancreatic ductal adenocarcinoma more than 1 year later: a case-control study. Am. J. Roentgenol. 2021;217:1353–1364. doi: 10.2214/AJR.21.26014/SUPPL_FILE/12_21_26014_SUPPL.PDF. [DOI] [PubMed] [Google Scholar] 31.Donati F., Casini C., Cervelli R., Morganti R., Boraschi P. Diffusion-weighted MRI of solid pancreatic lesions: comparison between reduced field-of-view and large field-of-view sequences. Eur. J. Radiol. 2021;143 doi: 10.1016/J.EJRAD.2021.109936. [DOI] [PubMed] [Google Scholar] 32.Donati F., Boraschi P., Cervelli R., Pacciardi F., Lombardo C., Boggi U., Falaschi F., Caramella D. 3 T MR perfusion of solid pancreatic lesions using dynamic contrast-enhanced DISCO sequence: usefulness of qualitative and quantitative analyses in a pilot study. Magn. Reson. Imaging. 2019;59:105–113. doi: 10.1016/J.MRI.2019.03.001. [DOI] [PubMed] [Google Scholar] 33.Wang W., Shpaner A., Krishna S.G., Ross W.A., Bhutani M.S., Tamm E.P., Raju G.S., Xiao L., Wolff R.A., Fleming J.B., Lee J.H. Use of EUS-FNA in diagnosing pancreatic neoplasm without a definitive mass on CT. Gastrointest. Endosc. 2013;78:73–80. doi: 10.1016/J.GIE.2013.01.040. [DOI] [PubMed] [Google Scholar] 34.Kitano M., Kudo M., Yamao K., Takagi T., Sakamoto H., Komaki T., Kamata K., Imai H., Chiba Y., Okada M., Murakami T., Takeyama Y. Characterization of small solid tumors in the pancreas: the value of contrast-enhanced harmonic endoscopic ultrasonography. Am. J. Gastroenterol. 2012;107:303–310. doi: 10.1038/AJG.2011.354. [DOI] [PubMed] [Google Scholar] 35.Choi Y.J., Byun J.H., Kim J.Y., Kim M.H., Jang S.J., Ha H.K., Lee M.G. Diffuse pancreatic ductal adenocarcinoma: characteristic imaging features. Eur. J. Radiol. 2008;67:321–328. doi: 10.1016/j.ejrad.2007.07.010. [DOI] [PubMed] [Google Scholar] 36.Ichikawa T., Sou H., Araki T., Arbab A.S., Yoshikawa T., Ishigame K., Haradome H., Hachiya J. Duct-penetrating sign at MRCP: usefulness for differentiating inflammatory pancreatic mass from pancreatic carcinomas. Radiology. 2001;221:107–116. doi: 10.1148/RADIOL.2211001157. [DOI] [PubMed] [Google Scholar] 37.Carbognin G., Girardi V., Biasiutti C., Camera L., Manfredi R., Frulloni L., Hermans J.J., Pozzi Mucelli R. Autoimmune pancreatitis: imaging findings on contrast-enhanced MR, MRCP and dynamic secretin-enhanced MRCP. Radiol. Med. 2009;114:1214–1231. doi: 10.1007/S11547-009-0452-0. [DOI] [PubMed] [Google Scholar] 38.Pozdzik A.A., Matos C., Rorive S., Brocheriou I., Delhaye M., Nortier J.L. Diffusion-weighted magnetic resonance imaging: a non-nephrotoxic prompt assessment of kidney involvement in IgG4-related disease. Kidney Int. 2014;85:981. doi: 10.1038/KI.2013.540. [DOI] [PubMed] [Google Scholar] 39.Hafezi-Nejad N., Singh V.K., Fung C., Takahashi N., Zaheer A. MR imaging of autoimmune pancreatitis. Magn. Reson. Imaging Clin. N. Am. 2018;26:463–478. doi: 10.1016/j.mric.2018.03.008. [DOI] [PubMed] [Google Scholar] 40.Choi S.Y., Kim S.H., Kang T.W., Song K.D., Park H.J., Choi Y.H. Differentiating mass-forming autoimmune pancreatitis from pancreatic ductal adenocarcinoma on the basis of contrast-enhanced MRI and DWI findings. Am. J. Roentgenol. 2016;206:291–300. doi: 10.2214/AJR.15.14974/ASSET/IMAGES/LARGE/02_15_14974_05.JPEG. [DOI] [PubMed] [Google Scholar] 41.Tran Cao H.S., Balachandran A., Wang H., Nogueras-González G.M., Bailey C.E., Lee J.E., Pisters P.W.T., Evans D.B., Varadhachary G., Crane C.H., Aloia T.A., Vauthey J.N., Fleming J.B., Katz M.H.G. Radiographic tumor-vein interface as a predictor of intraoperative, pathologic, and oncologic outcomes in resectable and borderline resectable pancreatic cancer. J. Gastrointest. Surg. 2014;18:269–278. doi: 10.1007/S11605-013-2374-3. [DOI] [PMC free article] [PubMed] [Google Scholar] 42.Lu D.S.K., Reber H.A., Krasny R.M., Kadell B.M., Sayre J. Local staging of pancreatic cancer: criteria for unresectability of major vessels as revealed by pancreatic-phase, thin-section helical CT. Ajr. Am. J. Roentgenol. 1997;168:1439–1443. doi: 10.2214/AJR.168.6.9168704. [DOI] [PubMed] [Google Scholar] 43.Zaky A.M., Wolfgang C.L., Weiss M.J., Javed A.A., Fishman E.K., Zaheer A. Tumor-vessel relationships in pancreatic ductal adenocarcinoma at multidetector CT: different classification systems and their influence on treatment planning. Radiographics. 2017;37:93–112. doi: 10.1148/RG.2017160054. [DOI] [PubMed] [Google Scholar] 44.Hough T.J., Raptopoulos V., Siewert B., Matthews J.B. Teardrop superior mesenteric vein: CT sign for unresectable carcinoma of the pancreas. Ajr. Am. J. Roentgenol. 1999;173:1509–1512. doi: 10.2214/AJR.173.6.10584793. [DOI] [PubMed] [Google Scholar] 45.Malafa M.P. Defining borderline resectable pancreatic cancer: emerging consensus for an old challenge. J. Natl. Compr. Canc. Netw. 2015;13:501–504. doi: 10.6004/JNCCN.2015.0068. [DOI] [PubMed] [Google Scholar] 46.Tempero M.A., Malafa M.P., Al-Hawary M., Asbun H., Bain A., Behrman S.W., Benson B.Al, Binder E., Cardin D.B., Cha C., Chiorean E.G., Chung V., Czito B., Dillhoff M., Dotan E., Ferrone C.R., Hardacre J., Hawkins W.G., Herman J., Ko A.H., Komanduri S., Koong A., LoConte N., Lowy A.M., Moravek C., Nakakura E.K., O’Reilly E.M., Obando J., Reddy S., Scaife C., Thayer S., Weekes C.D., Wolff R.A., Wolpin B.M., Burns J., Darlow S. Pancreatic adenocarcinoma, version 2.2017, NCCN clinical practice guidelines in oncology. J. Natl. Compr. Canc. Netw. 2017;15:1028–1061. doi: 10.6004/JNCCN.2017.0131. [DOI] [PubMed] [Google Scholar] 47.Park S.J., Jang S., Han J.K., Kim H., Kwon W., Jang J.Y., Lee K.B., Kim H., Lee D.H. Preoperative assessment of the resectability of pancreatic ductal adenocarcinoma on CT according to the NCCN guidelines focusing on SMA/SMV branch invasion. Eur. Radiol. 2021;31:6889–6897. doi: 10.1007/S00330-021-07847-4/FIGURES/3. [DOI] [PubMed] [Google Scholar] 48.Shukla P.J., Barreto S.G., Kulkarni A., Nagarajan G., Fingerhut A. Vascular anomalies encountered during pancreatoduodenectomy: do they influence outcomes? Ann. Surg. Oncol. 2010;17:186–193. doi: 10.1245/S10434-009-0757-1. [DOI] [PubMed] [Google Scholar] 49.Yang F., Long J., Fu D.L., Jin C., Yu X.J., Xu J., Ni Q.X. Aberrant hepatic artery in patients undergoing pancreaticoduodenectomy. Pancreatology. 2008;8:50–54. doi: 10.1159/000114867. [DOI] [PubMed] [Google Scholar] 50.Appanraj P., Mathew A.P., Kandasamy D., Venugopal M. CT reporting of relevant vascular variations and its implication in pancreatoduodenectomy. Abdom. Radiol. 2021;46:3935–3945. doi: 10.1007/s00261-021-02983-3. [DOI] [PubMed] [Google Scholar] 51.Gaujoux S., Sauvanet A., Vullierme M.P., Cortes A., Dokmak S., Sibert A., Vilgrain V., Belghiti J. Ischemic complications after pancreaticoduodenectomy: incidence, prevention, and management. Ann. Surg. 2009;249:111–117. doi: 10.1097/SLA.0B013E3181930249. [DOI] [PubMed] [Google Scholar] 52.Kurosaki I., Hatakeyama K., Nihei K.E., Oyamatsu M. Celiac axis stenosis in pancreaticoduodenectomy. J. Hepatobiliary. Pancreat. Surg. 2004;11:119–124. doi: 10.1007/S00534-003-0871-6. [DOI] [PubMed] [Google Scholar] 53.Farma J.M., Hoffman J.P. Nonneoplastic celiac axis occlusion in patients undergoing pancreaticoduodenectomy. Am. J. Surg. 2007;193:341–344. doi: 10.1016/J.AMJSURG.2006.09.027. [DOI] [PubMed] [Google Scholar] 54.Horton K.M., Talamini M.A., Fishman E.K. Median arcuate ligament syndrome: evaluation with CT angiography. Radiographics. 2005;25:1177–1182. doi: 10.1148/RG.255055001. [DOI] [PubMed] [Google Scholar] 55.Al-Hawary M.M., Francis I.R., Chari S.T., Fishman E.K., Hough D.M., Lu D.S., Macari M., Megibow A.J., Miller F.H., Mortele K.J., Merchant N.B., Minter R.M., Tamm E.P., Sahani D.V., Simeone D.M. Pancreatic ductal adenocarcinoma radiology reporting template: consensus statement of the Society of Abdominal Radiology and the American Pancreatic Association. Radiology. 2014;270:248–260. doi: 10.1148/RADIOL.13131184. [DOI] [PubMed] [Google Scholar] 56.James P.D., Meng Z.W., Zhang M., Belletrutti P.J., Mohamed R., Ghali W., Roberts D.J., Martel G., Heitman S.J. The incremental benefit of EUS for identifying unresectable disease among adults with pancreatic adenocarcinoma: a meta-analysis. PLoS One. 2017;12 doi: 10.1371/JOURNAL.PONE.0173687. [DOI] [PMC free article] [PubMed] [Google Scholar] 57.Kala Z., Válek V., Hlavsa J., Hana K., Váňová A. The role of CT and endoscopic ultrasound in pre-operative staging of pancreatic cancer. Eur. J. Radiol. 2007;62:166–169. doi: 10.1016/J.EJRAD.2007.01.039. [DOI] [PubMed] [Google Scholar] 58.Nawaz H., Yi-Fan C., Kloke J., Khalid A., McGrath K., Landsittel D., Papachristou G.I. Performance characteristics of endoscopic ultrasound in the staging of pancreatic cancer: a meta-analysis. JOP. 2013;14:484–497. doi: 10.6092/1590-8577/1512. [DOI] [PMC free article] [PubMed] [Google Scholar] 59.Somers I., Bipat S. Contrast-enhanced CT in determining resectability in patients with pancreatic carcinoma: a meta-analysis of the positive predictive values of CT. Eur. Radiol. 2017;27:3408–3435. doi: 10.1007/S00330-016-4708-5. [DOI] [PMC free article] [PubMed] [Google Scholar] 60.Motosugi U., Ichikawa T., Morisaka H., Sou H., Muhi A., Kimura K., Sano K., Araki T. Detection of pancreatic carcinoma and liver metastases with gadoxetic acid-enhanced MR imaging: comparison with contrast-enhanced multi-detector row CT. Radiology. 2011;260:446–453. doi: 10.1148/RADIOL.11103548. [DOI] [PubMed] [Google Scholar] 61.Marion-Audibert A.M., Vullierme M.P., Ronot M., Mabrut J.Y., Sauvanet A., Zins M., Cuilleron M., Sa-Cunha A., Lévy P., Rode A. Routine MRI with DWI sequences to detect liver metastases in patients with potentially resectable pancreatic ductal carcinoma and normal liver CT: a prospective multicenter study. Ajr. Am. J. Roentgenol. 2018;211:W217–W225. doi: 10.2214/AJR.18.19640. [DOI] [PubMed] [Google Scholar] 62.Holzapfel K., Reiser-Erkan C., Fingerle A.A., Erkan M., Eiber M.J., Rummeny E.J., Friess H., Kleeff J., Gaa J. Comparison of diffusion-weighted MR imaging and multidetector-row CT in the detection of liver metastases in patients operated for pancreatic cancer. Abdom. Imaging. 2011;36:179–184. doi: 10.1007/S00261-010-9633-5. [DOI] [PubMed] [Google Scholar] 63.Altmayer S., Armelin L.M., Pereira J.S., Carvalho L.V., Tse J., Balthazar P., Francisco M.Z., Watte G., Hochhegger B. MRI with DWI improves detection of liver metastasis and selection of surgical candidates with pancreatic cancer: a systematic review and meta-analysis. Eur. Radiol. 2024;34 doi: 10.1007/S00330-023-10069-5. [DOI] [PubMed] [Google Scholar] 64.Duan H., Baratto L., Iagaru A. The role of PET/CT in the imaging of pancreatic neoplasms. Semin. Ultrasound Ct. Mr. 2019;40:500–508. doi: 10.1053/J.SULT.2019.04.006. [DOI] [PubMed] [Google Scholar] 65.Arai K., Kawai K., Kohda W., Tatsu H., Matsui O., Nakahama T. Dynamic CT of acute cholangitis: early inhomogeneous enhancement of the liver. Am. J. Roentgenol. 2003;181:115–118. doi: 10.2214/AJR.181.1.1810115/ASSET/IMAGES/07_AC1349_03C_NEW_1.JPEG. [DOI] [PubMed] [Google Scholar] 66.Everett B.T., Naud S., Zubarik R.S. Risk factors for the development of stent-associated cholangitis following endoscopic biliary stent placement. Dig. Dis. Sci. 2019;64:2300–2307. doi: 10.1007/S10620-019-05533-6. [DOI] [PubMed] [Google Scholar] 67.Oh J.G., Choi S.Y., Lee M.H., Lee J.E., Yi B.H., Kim S.S., Min J.H., Lee B. Differentiation of hepatic abscess from metastasis on contrast-enhanced dynamic computed tomography in patients with a history of extrahepatic malignancy: emphasis on dynamic change of arterial rim enhancement. Abdom. Radiol. (N. Y. ) 2019;44:529–538. doi: 10.1007/S00261-018-1766-Y. [DOI] [PubMed] [Google Scholar] 68.Wang N., Ju Y., Wu J., Liu A., Chen A., Liu J., Liu Y., Li J. Differentiation of liver abscess from liver metastasis using dual-energy spectral CT quantitative parameters. Eur. J. Radiol. 2019;113:204–208. doi: 10.1016/j.ejrad.2019.02.024. [DOI] [PubMed] [Google Scholar] 69.Park H.J., Kim S.H., Jang K.M., Lee S.J., Park M.J., Choi D. Differentiating hepatic abscess from malignant mimickers: Value of diffusion-weighted imaging with an emphasis on the periphery of the lesion. J. Magn. Reson. Imaging. 2013;38:1333–1341. doi: 10.1002/JMRI.24112. [DOI] [PubMed] [Google Scholar] 70.Pietryga J.A., Morgan D.E. Imaging preoperatively for pancreatic adenocarcinoma. J. Gastrointest. Oncol. 2015;6:343. doi: 10.3978/J.ISSN.2078-6891.2015.024. [DOI] [PMC free article] [PubMed] [Google Scholar] 71.Qayyum A., Tamm E.P., Kamel I.R., Allen P.J., Arif-Tiwari H., Chernyak V., Gonda T.A., Grajo J.R., Hindman N.M., Horowitz J.M., Kaur H., McNamara M.M., Noto R.B., Srivastava P.K., Lalani T. ACR Appropriateness Criteria® Staging of Pancreatic Ductal Adenocarcinoma. J. Am. Coll. Radiol. 2017;14:S560–S569. doi: 10.1016/J.JACR.2017.08.050. [DOI] [PubMed] [Google Scholar] 72.Tapper E., Kalb B., Martin D.R., Kooby D., Adsay N.V., Sarmiento J.M. Staging laparoscopy for proximal pancreatic cancer in a magnetic resonance imaging-driven practice: what’s it worth? HPB (Oxf. ) 2011;13:732–737. doi: 10.1111/J.1477-2574.2011.00366.X. [DOI] [PMC free article] [PubMed] [Google Scholar] 73.Allen V.B., Gurusamy K.S., Takwoingi Y., Kalia A., Davidson B.R. Diagnostic accuracy of laparoscopy following computed tomography (CT) scanning for assessing the resectability with curative intent in pancreatic and periampullary cancer. Cochrane Database Syst. Rev. 2016;(7) doi: 10.1002/14651858.CD009323.PUB3. [DOI] [PMC free article] [PubMed] [Google Scholar] 74.Gudmundsdottir H., Yonkus J.A., Alva-Ruiz R., Kendrick M.L., Smoot R.L., Warner S.G., Starlinger P., Thiels C.A., Nagorney D.M., Cleary S.P., Grotz T.E., Truty M.J. Yield of staging laparoscopy for pancreatic cancer in the modern era: analysis of more than 1,000 consecutive patients. J. Am. Coll. Surg. 2023;237:49–57. doi: 10.1097/XCS.0000000000000704. [DOI] [PMC free article] [PubMed] [Google Scholar] 75.Mehtsun W.T., Chipidza F.E., Fernández-del Castillo C., Hemingway K., Fong Z.V., Chang D.C., Pandharipande P., Clark J.W., Allen J., Hong T.S., Wo J.Y., Warshaw A.L., Lillemoe K.D., Ferrone C.R. Are staging computed tomography (CT) scans of the chest necessary in pancreatic adenocarcinoma? Ann. Surg. Oncol. 2018;25:3936–3942. doi: 10.1245/S10434-018-6764-3. [DOI] [PubMed] [Google Scholar] 76.Downs-Canner S., Zenati M., Boone B.A., Varley P.R., Steve J., Hogg M.E., Zureikat A., Zeh H.J., Lee K.K.W. The indolent nature of pulmonary metastases from ductal adenocarcinoma of the pancreas. J. Surg. Oncol. 2015;112:80–85. doi: 10.1002/JSO.23943. [DOI] [PMC free article] [PubMed] [Google Scholar] 77.Roche C.J., Hughes M.L., Garvey C.J., Campbell F., White D.A., Jones L., Neoptolemos J.P. CT and pathologic assessment of prospective nodal staging in patients with ductal adenocarcinoma of the head of the pancreas. Ajr. Am. J. Roentgenol. 2003;180:475–480. doi: 10.2214/AJR.180.2.1800475. [DOI] [PubMed] [Google Scholar] 78.Loch F.N., Asbach P., Haas M., Seeliger H., Beyer K., Schineis C., Degro C.E., Margonis G.A., Kreis M.E., Kamphues C. Accuracy of various criteria for lymph node staging in ductal adenocarcinoma of the pancreatic head by computed tomography and magnetic resonance imaging. World J. Surg. Oncol. 2020;18:1–10. doi: 10.1186/S12957-020-01951-3/FIGURES/4. [DOI] [PMC free article] [PubMed] [Google Scholar] 79.Röhrich M., Naumann P., Giesel F.L., Choyke P.L., Staudinger F., Wefers A., Liew D.P., Kratochwil C., Rathke H., Liermann J., Herfarth K., Jäger D., Debus J., Haberkorn U., Lang M., Koerber S.A. Impact of 68Ga-FAPI PET/CT imaging on the therapeutic management of primary and recurrent pancreatic ductal adenocarcinomas. J. Nucl. Med. 2021;62:779. doi: 10.2967/JNUMED.120.253062. [DOI] [PMC free article] [PubMed] [Google Scholar] 80.Bian Y., Zheng Z., Fang X., Jiang H., Zhu M., Yu J., Zhao H., Zhang L., Yao J., Lu L., Lu J., Shao C. Artificial intelligence to predict lymph node metastasis at CT in pancreatic ductal adenocarcinoma. Radiology. 2023;306:160–169. doi: 10.1148/RADIOL.220329/ASSET/IMAGES/LARGE/RADIOL.220329.TBL3.JPEG. [DOI] [PubMed] [Google Scholar] 81.Adham S., Ferri M., Lee S.Y., Larocque N., Alwahbi O.A., Ruo L., van der Pol C.B. Pancreatic ductal adenocarcinoma (PDAC) regional nodal disease at standard lymphadenectomy: is MRI accurate for identifying node-positive patients? Eur. Radiol. 2023;33:5976–5983. doi: 10.1007/S00330-023-09597-X/FIGURES/3. [DOI] [PubMed] [Google Scholar] 82.Bratlie S.O., Wennerblom J., Vilhav C., Persson J., Rangelova E. Resectable, borderline, and locally advanced pancreatic cancer-"the good, the bad, and the ugly" candidates for surgery? J. Gastrointest. Oncol. 2021;12:2450–2460. doi: 10.21037/JGO-2020-SLAPC-04. [DOI] [PMC free article] [PubMed] [Google Scholar] 83.Imamura T., Yamamoto Y., Sugiura T., Okamura Y., Ito T., Ashida R., Ohgi K., Todaka A., Fukutomi A., Aramaki T., Uesaka K. Prognostic role of the length of tumour-vein contact at the portal-superior mesenteric vein in patients having surgery for pancreatic cancer. Br. J. Surg. 2019;106:1649–1656. doi: 10.1002/BJS.11328. [DOI] [PubMed] [Google Scholar] 84.Saka B., Balci S., Basturk O., Bagci P., Postlewait L.M., Maithel S., Knight J., El-Rayes B., Kooby D., Sarmiento J., Muraki T., Oliva I., Bandyopadhyay S., Akkas G., Goodman M., Reid M.D., Krasinskas A., Everett R., Adsay V. Pancreatic ductal adenocarcinoma is spread to the peripancreatic soft tissue in the majority of resected cases, rendering the AJCC T-stage protocol (7th edition) inapplicable and insignificant: a size-based staging system (pT1: ≤2, pT2: >2-≤4, pT3: >4 cm) is more valid and clinically relevant, Ann. Surg. Oncol. 2016;23:2010–2018. doi: 10.1245/S10434-016-5093-7. [DOI] [PMC free article] [PubMed] [Google Scholar] 85.Marchegiani G., Andrianello S., Malleo G., De Gregorio L., Scarpa A., Mino-Kenudson M., Maggino L., Ferrone C.R., Lillemoe K.D., Bassi C., Del Castillo C.F., Salvia R. Does size matter in pancreatic cancer?: reappraisal of tumour dimension as a predictor of outcome beyond the TNM. Ann. Surg. 2017;266:142–148. doi: 10.1097/SLA.0000000000001837. [DOI] [PubMed] [Google Scholar] 86.Liu C., Lu Y., Luo G., Cheng H., Guo M., Liu Z., Xu J., Long J., Liu L., Fu D., Ni Q., Li M., Yu X. Which patients with para-aortic lymph node (LN16) metastasis will truly benefit from curative pancreaticoduodenectomy for pancreatic head cancer? Oncotarget. 2016;7:29177–29186. doi: 10.18632/ONCOTARGET.8690. [DOI] [PMC free article] [PubMed] [Google Scholar] 87.Hempel S., Plodeck V., Mierke F., Distler M., Aust D.E., Saeger H.D., Weitz J., Welsch T. Para-aortic lymph node metastases in pancreatic cancer should not be considered a watershed for curative resection. Sci. Rep. 2017;7 doi: 10.1038/S41598-017-08165-W. [DOI] [PMC free article] [PubMed] [Google Scholar] 88.Komo T., Murakami Y., Kondo N., Uemura K., Hashimoto Y., Nakagawa N., Urabe K., Takahashi S., Sueda T. Prognostic impact of para-aortic lymph node micrometastasis in pancreatic ductal adenocarcinoma. Ann. Surg. Oncol. 2016;23:2019–2027. doi: 10.1245/S10434-016-5120-8. [DOI] [PubMed] [Google Scholar] 89.Sho M., Murakami Y., Motoi F., Satoi S., Matsumoto I., Kawai M., Honda G., Uemura K., Yanagimoto H., Kurata M., Fukumoto T., Akahori T., Kinoshita S., Nagai M., Nishiwada S., Unno M., Yamaue H., Nakajima Y. Postoperative prognosis of pancreatic cancer with para-aortic lymph node metastasis: a multicenter study on 822 patients. J. Gastroenterol. 2015;50:694–702. doi: 10.1007/S00535-014-1005-4. [DOI] [PubMed] [Google Scholar] 90.Tol J.A.M.G., Gouma D.J., Bassi C., Dervenis C., Montorsi M., Adham M., Andrén-Sandberg A., Asbun H.J., Bockhorn M., Büchler M.W., Conlon K.C., Fernández-Cruz L., Fingerhut A., Friess H., Hartwig W., Izbicki J.R., Lillemoe K.D., Milicevic M.N., Neoptolemos J.P., Shrikhande S.V., Vollmer C.M., Yeo C.J., Charnley R.M. Definition of a standard lymphadenectomy in surgery for pancreatic ductal adenocarcinoma: a consensus statement by the International Study Group on Pancreatic Surgery (ISGPS) Surgery. 2014;156:591–600. doi: 10.1016/J.SURG.2014.06.016. [DOI] [PMC free article] [PubMed] [Google Scholar] 91.Hackert T., Niesen W., Hinz U., Tjaden C., Strobel O., Ulrich A., Michalski C.W., Büchler M.W. Radical surgery of oligometastatic pancreatic cancer. Eur. J. Surg. Oncol. 2017;43:358–363. doi: 10.1016/J.EJSO.2016.10.023. [DOI] [PubMed] [Google Scholar] 92.Crippa S., Bittoni A., Sebastiani E., Partelli S., Zanon S., Lanese A., Andrikou K., Muffatti F., Balzano G., Reni M., Cascinu S., Falconi M. Is there a role for surgical resection in patients with pancreatic cancer with liver metastases responding to chemotherapy? Eur. J. Surg. Oncol. 2016;42:1533–1539. doi: 10.1016/J.EJSO.2016.06.398. [DOI] [PubMed] [Google Scholar] 93.De Simoni O., Scarpa M., Tonello M., Pilati P., Tolin F., Spolverato Y., Gruppo M. Oligometastatic pancreatic cancer to the liver in the era of neoadjuvant chemotherapy: which role for conversion surgery? a systematic review and meta-analysis. Cancers (Basel) 2020;12:1–14. doi: 10.3390/CANCERS12113402. [DOI] [PMC free article] [PubMed] [Google Scholar] 94.Groot V.P., Gemenetzis G., Blair A.B., Rivero-Soto R.J., Yu J., Javed A.A., Burkhart R.A., Rinkes I.H.M.B., Molenaar I.Q., Cameron J.L., Weiss M.J., Wolfgang C.L., He J. Defining and predicting early recurrence in 957 patients with resected pancreatic ductal adenocarcinoma. Ann. Surg. 2019;269:1154–1162. doi: 10.1097/SLA.0000000000002734. [DOI] [PMC free article] [PubMed] [Google Scholar] 95.Kurahara H., Maemura K., Mataki Y., Sakoda M., Iino S., Kawasaki Y., Arigami T., Mori S., Kijima Y., Ueno S., Shinchi H., Natsugoe S. A therapeutic strategy for resectable pancreatic cancer based on risk factors of early recurrence. Pancreas. 2018;47:753–758. doi: 10.1097/MPA.0000000000001066. [DOI] [PubMed] [Google Scholar] 96.Snyder R.A., Prakash L.R., Nogueras-Gonzalez G.M., Kim M.P., Aloia T.A., Vauthey J.N., Lee J.E., Fleming J.B., Katz M.H.G., Tzeng C.W.D. Vein resection during pancreaticoduodenectomy for pancreatic adenocarcinoma: patency rates and outcomes associated with thrombosis. J. Surg. Oncol. 2018;117:1648–1654. doi: 10.1002/JSO.25067. [DOI] [PubMed] [Google Scholar] 97.Birrer D.L., Golcher H., Casadei R., Haile S.R., Fritsch R., Hussung S., Brunner T.B., Fietkau R., Meyer T., Grützmann R., Merkel S., Ricci C., Ingaldi C., Di Marco M., Guido A., Serra C., Minni F., Pestalozzi B., Petrowsky H., Deoliveira M., Bechstein W.O., Bruns C.J., Oberkofler C.E., Puhan M., Lesurtel M., Heinrich S., Clavien P.A. Neoadjuvant therapy for resectable pancreatic cancer: a new standard of care. pooled data from 3 randomized controlled trials. Ann. Surg. 2021;274:713–720. doi: 10.1097/SLA.0000000000005126. [DOI] [PubMed] [Google Scholar] 98.Vivarelli M., Mocchegiani F., Nicolini D., Vecchi A., Conte G., Dalla Bona E., Rossi R., Benedetti Cacciaguerra A. Neoadjuvant treatment in resectable pancreatic cancer. is it time for pushing on it? Front. Oncol. 2022;12 doi: 10.3389/FONC.2022.914203/BIBTEX. [DOI] [PMC free article] [PubMed] [Google Scholar] 99.van Dam J.L., Janssen Q.P., Besselink M.G., Homs M.Y.V., van Santvoort H.C., van Tienhoven G., de Wilde R.F., Wilmink J.W., van Eijck C.H.J., Groot Koerkamp B. Neoadjuvant therapy or upfront surgery for resectable and borderline resectable pancreatic cancer: A meta-analysis of randomised controlled trials. Eur. J. Cancer. 2022;160:140–149. doi: 10.1016/j.ejca.2021.10.023. [DOI] [PubMed] [Google Scholar] 100.Labori K.J., Bratlie S.O., Andersson B., Angelsen J.-H., Biörserud C., Björnsson B., Bringeland E.A., Elander N., Garresori H., Grønbech J.E., Haux J., Hemmingsson O., Liljefors M.G., Myklebust T.Å., Nymo L.S., Peltola K., Pfeiffer P., Sallinen V., Sandström P., Sparrelid E., Stenvold H., Søreide K., Tingstedt B., Verbeke C., Öhlund D., Klint L., Dueland S., Lassen K., Aahlin E.K., Bratthäll C., Halimi A., Hatlevoll I., Heby M., Kokkola A., Kordes M., Lindblad S., Lundgren L., Mortensen M.B., Mortensen K.E., Persson J., Rangelova E., Rønne E., Sandvik O.M., Søreide J.A., Vilhav C., Waardal K., Wennerblom J., Williamsson C., Yaqub S. Neoadjuvant FOLFIRINOX versus upfront surgery for resectable pancreatic head cancer (NORPACT-1): a multicentre, randomised, phase 2 trial. Lancet Gastroenterol. Hepatol. 2024 doi: 10.1016/S2468-1253(23)00405-3. [DOI] [PubMed] [Google Scholar] 101.Seo Y.D., Katz M.H.G. Preoperative therapy for pancreatic adenocarcinoma—precision beyond anatomy. Cancer. 2022;128:3041–3056. doi: 10.1002/CNCR.34273. [DOI] [PubMed] [Google Scholar] 102.Jain A.J., Maxwell J.E., Katz M.H.G., Snyder R.A. Surgical considerations for neoadjuvant therapy for pancreatic adenocarcinoma. Cancers. 2023;15 doi: 10.3390/CANCERS15164174. [DOI] [PMC free article] [PubMed] [Google Scholar] 103.Isaji S., Mizuno S., Windsor J.A., Bassi C., Fernández-del Castillo C., Hackert T., Hayasaki A., Katz M.H.G., Kim S.W., Kishiwada M., Kitagawa H., Michalski C.W., Wolfgang C.L. International consensus on definition and criteria of borderline resectable pancreatic ductal adenocarcinoma 2017. Pancreatology. 2018;18:2–11. doi: 10.1016/J.PAN.2017.11.011. [DOI] [PubMed] [Google Scholar] 104.Vauthey J.N., Dixon E. AHPBA/SSO/SSAT consensus conference on resectable and borderline resectable pancreatic cancer: rationale and overview of the conference. Ann. Surg. Oncol. 2009;16:1725–1726. doi: 10.1245/S10434-009-0409-5. [DOI] [PubMed] [Google Scholar] 105.Katz M.H.G., Marsh R., Herman J.M., Shi Q., Collison E., Venook A.P., Kindler H.L., Alberts S.R., Philip P., Lowy A.M., Pisters P.W.T., Posner M.C., Berlin J.D., Ahmad S.A. Borderline resectable pancreatic cancer: need for standardization and methods for optimal clinical trial design. Ann. Surg. Oncol. 2013;20:2787–2795. doi: 10.1245/S10434-013-2886-9. [DOI] [PMC free article] [PubMed] [Google Scholar] 106.Wagner M., Antunes C., Pietrasz D., Cassinotto C., Zappa M., Sa Cunha A., Lucidarme O., Bachet J.B. CT evaluation after neoadjuvant FOLFIRINOX chemotherapy for borderline and locally advanced pancreatic adenocarcinoma. Eur. Radiol. 2017;27:3104–3116. doi: 10.1007/S00330-016-4632-8. [DOI] [PubMed] [Google Scholar] 107.Cassinotto C., Cortade J., Belleannée G., Lapuyade B., Terrebonne E., Vendrely V., Laurent C., Sa-Cunha A. An evaluation of the accuracy of CT when determining resectability of pancreatic head adenocarcinoma after neoadjuvant treatment. Eur. J. Radiol. 2013;82:589–593. doi: 10.1016/J.EJRAD.2012.12.002. [DOI] [PubMed] [Google Scholar] 108.Matsuda Y., Inoue Y., Hiratsuka M., Kawakatsu S., Arai T., Matsueda K., Saiura A., Takazawa Y. Encapsulating fibrosis following neoadjuvant chemotherapy is correlated with outcomes in patients with pancreatic cancer. PLoS One. 2019;14 doi: 10.1371/JOURNAL.PONE.0222155. [DOI] [PMC free article] [PubMed] [Google Scholar] 109.Cassinotto C., Mouries A., Lafourcade J.P., Terrebonne E., Belleannée G., Blanc J.F., Lapuyade B., Vendrely V., Laurent C., Chiche L., Wagner T., Sa-Cunha A., Gaye D., Trillaud H., Laurent F., Montaudon M. Locally advanced pancreatic adenocarcinoma: reassessment of response with CT after neoadjuvant chemotherapy and radiation therapy. Radiology. 2014;273:108–116. doi: 10.1148/RADIOL.14132914. [DOI] [PubMed] [Google Scholar] 110.Guo Y., Czeyda-Pommersheim F., Miccio J.A., Mahalingam S., Cecchini M., Pahade J. Can a simplified CT response criteria for vascular involvement in pancreatic adenocarcinoma after neoadjuvant therapy predict survival in patients who achieved subsequent R0 resection? Abdom. Radiol. 2021;46:5609–5617. doi: 10.1007/S00261-021-03284-5. [DOI] [PubMed] [Google Scholar] 111.Noda Y., Pisuchpen N., Mercaldo N.D., Sekigami Y., Michelakos T., Parakh A., Wo J.Y., Qadan M., Ferrone C., Lillemoe K.D., Ryan D.P., Clark J.W., Fernandez-Del Castillo C., Hong T.S., Kambadakone A.R. Arterial involvement and resectability scoring system to predict R0 resection in patients with pancreatic ductal adenocarcinoma treated with neoadjuvant chemoradiation therapy. Eur. Radiol. 2022;32:2470–2480. doi: 10.1007/S00330-021-08304-Y. [DOI] [PubMed] [Google Scholar] 112.Jeon S.K., Lee J.M., Lee E.S., Yu M.H., Joo I., Yoon J.H., Jang J.Y., Lee K.B., Lee S.H. How to approach pancreatic cancer after neoadjuvant treatment: assessment of resectability using multidetector CT and tumor markers. Eur. Radiol. 2022;32:56–66. doi: 10.1007/S00330-021-08108-0. [DOI] [PubMed] [Google Scholar] 113.Hussien N., Hussien R.S., Saad D.H.A., El Kassas M., Elkhatib W.F., Ezz El Din M. The role of MRI pancreatic protocol in assessing response to neoadjuvant therapy for patients with borderline resectable pancreatic cancer. Front. Oncol. 2022;11 doi: 10.3389/FONC.2021.796317. [DOI] [PMC free article] [PubMed] [Google Scholar] 114.ichi Okada K., Kawai M., Hirono S., Kojima F., Tanioka K., Terada M., Miyazawa M., Kitahata Y., Iwahashi Y., Ueno M., Hayami S., ichi Murata S., Shimokawa T., Yamaue H. Diffusion-weighted MRI predicts the histologic response for neoadjuvant therapy in patients with pancreatic cancer: a prospective study (DIFFERENT trial) Langenbeck’s Arch. Surg. 2020;405:23–33. doi: 10.1007/S00423-020-01857-4. [DOI] [PubMed] [Google Scholar] 115.Harder F.N., Jungmann F., Kaissis G.A., Lohöfer F.K., Ziegelmayer S., Havel D., Quante M., Reichert M., Schmid R.M., Demir I.E., Friess H., Wildgruber M., Siveke J., Muckenhuber A., Steiger K., Weichert W., Rauscher I., Eiber M., Makowski M.R., Braren R.F. 18F]FDG PET/MRI enables early chemotherapy response prediction in pancreatic ductal adenocarcinoma. EJNMMI Res. 2021;11 doi: 10.1186/S13550-021-00808-4. [DOI] [PMC free article] [PubMed] [Google Scholar] 116.Kang J.H., Lee S.S., Kim J.H., Byun J.H., Kim H.J., Yoo C., pyo Kim K., Ryoo B.Y., Kim S.C. Multiparametric MRI for prediction of treatment response to neoadjuvant FOLFIRINOX therapy in borderline resectable or locally advanced pancreatic cancer. Eur. Radiol. 2021;31:864–874. doi: 10.1007/S00330-020-07134-8. [DOI] [PubMed] [Google Scholar] 117.Bali M.A., Pullini S., Metens T., Absil J., Chao S.L., Marechal R., Matos C., Peerboccus B.M., Van Laethem J.L. Assessment of response to chemotherapy in pancreatic ductal adenocarcinoma: comparison between diffusion-weighted MR quantitative parameters and RECIST. Eur. J. Radiol. 2018;104:49–57. doi: 10.1016/J.EJRAD.2018.04.024. [DOI] [PubMed] [Google Scholar] 118.Bilreiro C., Andrade L., Marques R.M., Matos C. Diffusion-weighted imaging for determining response to neoadjuvant therapy in pancreatic cancer: a systematic review and meta-analysis. Eur. Radiol. 2023 doi: 10.1007/s00330-023-10381-0. [DOI] [PMC free article] [PubMed] [Google Scholar] 119.Abdelrahman A.M., Goenka A.H., Alva-Ruiz R., Yonkus J.A., Leiting J.L., Graham R.P., Merrell K.W., Thiels C.A., Hallemeier C.L., Warner S.G., Haddock M.G., Grotz T.E., Tran N.H., Smoot R.L., Ma W.W., Cleary S.P., McWilliams R.R., Nagorney D.M., Halfdanarson T.R., Kendrick M.L., Truty M.J. FDG-PET predicts neoadjuvant therapy response and survival in borderline resectable/locally advanced pancreatic adenocarcinoma. J. Natl. Compr. Canc. Netw. 2022;20:1023–1032. doi: 10.6004/JNCCN.2022.7041. [DOI] [PMC free article] [PubMed] [Google Scholar] 120.Panda A., Garg I., Truty M.J., Kline T.L., Johnson M.P., Ehman E.C., Suman G., Anaam D.A., Kemp B.J., Johnson G.B., Halfdanarson T.R., Venkatesh S.K., Fidler J.L., Goenka A.H. Borderline resectable and locally advanced pancreatic cancer: FDG PET/MRI and CT tumor metrics for assessment of pathologic response to neoadjuvant therapy and prediction of survival. Ajr. Am. J. Roentgenol. 2021;217:730–740. doi: 10.2214/AJR.20.24567. [DOI] [PubMed] [Google Scholar] 121.Yoo J., Lee J.M., Joo I., Lee D.H., Yoon J.H., Yu M.H., Jang J.Y., Lee S.H. Post-neoadjuvant treatment pancreatic cancer resectability and outcome prediction using CT, 18F-FDG PET/MRI and CA 19–9. Cancer Imaging. 2023;23:1–13. doi: 10.1186/S40644-023-00565-8/TABLES/4. [DOI] [PMC free article] [PubMed] [Google Scholar] 122.Evangelista L., Zucchetta P., Moletta L., Serafini S., Cassarino G., Pegoraro N., Bergamo F., Sperti C., Cecchin D. The role of FDG PET/CT or PET/MRI in assessing response to neoadjuvant therapy for patients with borderline or resectable pancreatic cancer: a systematic literature review. Ann. Nucl. Med. 2021;35:767–776. doi: 10.1007/S12149-021-01629-0. [DOI] [PMC free article] [PubMed] [Google Scholar] 123.Van Dam M.A., Vuijk F.A., Stibbe J.A., Houvast R.D., Luelmo S.A.C., Crobach S., Feshtali S.S., De Geus-Oei L.F., Bonsing B.A., Sier C.F.M., Kuppen P.J.K., Swijnenburg R.J., Windhorst A.D., Burggraaf J., Vahrmeijer A.L., Mieog J.S.D. Overview and future perspectives on tumor-targeted positron emission tomography and fluorescence imaging of pancreatic cancer in the era of neoadjuvant therapy. Cancers. 2021;13 doi: 10.3390/CANCERS13236088. [DOI] [PMC free article] [PubMed] [Google Scholar] 124.Esposito I., Kleeff J., Bergmann F., Reiser C., Herpel E., Friess H., Schirmacher P., Büchler M.W. Most pancreatic cancer resections are R1 resections. Ann. Surg. Oncol. 2008;15:1651–1660. doi: 10.1245/S10434-008-9839-8. [DOI] [PubMed] [Google Scholar] 125.Soer E.C., Verbeke C.S. Pathology reporting of margin status in locally advanced pancreatic cancer: challenges and uncertainties. J. Gastrointest. Oncol. 2021;12:2512–2520. doi: 10.21037/JGO-20-391. [DOI] [PMC free article] [PubMed] [Google Scholar] 126.Verbeke C.S., Menon K.V. Redefining resection margin status in pancreatic cancer. HPB (Oxf. ) 2009;11:282. doi: 10.1111/J.1477-2574.2009.00055.X. [DOI] [PMC free article] [PubMed] [Google Scholar] 127.Strobel O., Hank T., Hinz U., Bergmann F., Schneider L., Springfeld C., Jäger D., Schirmacher P., Hackert T., Büchler M.W. Pancreatic cancer surgery: the new R-status counts. Ann. Surg. 2017;265:565–573. doi: 10.1097/SLA.0000000000001731. [DOI] [PubMed] [Google Scholar] 128.Campbell F., Smith R.A., Whelan P., Sutton R., Raraty M., Neoptolemos J.P., Ghaneh P. Classification of R1 resections for pancreatic cancer: the prognostic relevance of tumour involvement within 1 mm of a resection margin. Histopathology. 2009;55:277–283. doi: 10.1111/J.1365-2559.2009.03376.X. [DOI] [PubMed] [Google Scholar] 129.Tummers W.S., Groen J.V., Sibinga Mulder B.G., Farina-Sarasqueta A., Morreau J., Putter H., van de Velde C.J., Vahrmeijer A.L., Bonsing B.A., Mieog J.S., Swijnenburg R.J. Impact of resection margin status on recurrence and survival in pancreatic cancer surgery. Br. J. Surg. 2019;106:1055–1065. doi: 10.1002/BJS.11115. [DOI] [PMC free article] [PubMed] [Google Scholar] 130.Delpero J.R., Jeune F., Bachellier P., Regenet N., Le Treut Y.P., Paye F., Carrere N., Sauvanet A., Adham M., Autret A., Poizat F., Turrini O., Boher J.M. Prognostic value of resection margin involvement after pancreaticoduodenectomy for ductal adenocarcinoma: updates from a french prospective multicenter study. Ann. Surg. 2017;266:787–796. doi: 10.1097/SLA.0000000000002432. [DOI] [PubMed] [Google Scholar] 131.Daamen L.A., Groot V.P., Intven M.P.W., Besselink M.G., Busch O.R., Koerkamp B.G., Mohammad N.H., Hermans J.J., van Laarhoven H.W.M., Nuyttens J.J., Wilmink J.W., van Santvoort H.C., Molenaar I.Q., Stommel M.W.J. Postoperative surveillance of pancreatic cancer patients. Eur. J. Surg. Oncol. 2019;45:1770–1777. doi: 10.1016/J.EJSO.2019.05.031. [DOI] [PubMed] [Google Scholar] 132.Witkowski E.R., Smith J.K., Ragulin-Coyne E., Ng S.C., Shah S.A., Tseng J.F. Is it worth looking? abdominal imaging after pancreatic cancer resection: a national study. J. Gastrointest. Surg. 2012;16:121–128. doi: 10.1007/S11605-011-1699-Z. [DOI] [PubMed] [Google Scholar] 133.Halle-Smith J.M., Hall L., Daamen L.A., Hodson J., Pande R., Young A., Jamieson N.B., Lamarca A., van Santvoort H.C., Molenaar I.Q., Valle J.W., Roberts K.J. Clinical benefit of surveillance after resection of pancreatic ductal adenocarcinoma: a systematic review and meta-analysis. Eur. J. Surg. Oncol. 2021;47:2248–2255. doi: 10.1016/J.EJSO.2021.04.031. [DOI] [PubMed] [Google Scholar] 134.Tzeng C.W.D., Fleming J.B., Lee J.E., Wang X., Pisters P.W.T., Vauthey J.N., Varadhachary G., Wolff R.A., Katz M.H.G. Yield of clinical and radiographic surveillance in patients with resected pancreatic adenocarcinoma following multimodal therapy. HPB. 2012;14:365–372. doi: 10.1111/J.1477-2574.2012.00445.X. [DOI] [PMC free article] [PubMed] [Google Scholar] 135.Ishigami K., Yoshimitsu K., Irie H., Tajima T., Asayama Y., Hirakawa M., Kakihara D., Shioyama Y., Nishihara Y., Yamaguchi K., Honda H. Significance of perivascular soft tissue around the common hepatic and proximal superior mesenteric arteries arising after pancreaticoduodenectomy: evaluation with serial MDCT studies. Abdom. Imaging. 2008;33:654–661. doi: 10.1007/S00261-008-9359-9. [DOI] [PubMed] [Google Scholar] 136.Groot V.P., Rezaee N., Wu W., Cameron J.L., Fishman E.K., Hruban R.H., Weiss M.J., Zheng L., Wolfgang C.L., He J. Patterns, timing, and predictors of recurrence following pancreatectomy for pancreatic ductal adenocarcinoma. Ann. Surg. 2018;267:936–945. doi: 10.1097/SLA.0000000000002234. [DOI] [PubMed] [Google Scholar] Articles from European Journal of Radiology Open are provided here courtesy of Elsevier ACTIONS View on publisher site PDF (9.7 MB) Cite Collections Permalink PERMALINK Copy RESOURCES Similar articles Cited by other articles Links to NCBI Databases On this page Abstract Highlights 1. Introduction 2. Diagnosis of pancreatic ductal adenocarcinoma 3. Staging of PDAC 4. Response to neoadjuvant therapy 5. Patient surveillance after resection 6. Conclusion CRediT authorship contribution statement Declaration of Competing Interest Acknowledgements References Cite Copy Download .nbib.nbib Format: Add to Collections Create a new collection Add to an existing collection Name your collection Choose a collection Unable to load your collection due to an error Please try again Add Cancel Follow NCBI NCBI on X (formerly known as Twitter)NCBI on FacebookNCBI on LinkedInNCBI on GitHubNCBI RSS feed Connect with NLM NLM on X (formerly known as Twitter)NLM on FacebookNLM on YouTube National Library of Medicine 8600 Rockville Pike Bethesda, MD 20894 Web Policies FOIA HHS Vulnerability Disclosure Help Accessibility Careers NLM NIH HHS USA.gov Back to Top
4167
https://ceur-ws.org/Vol-1949/ICTCSpaper05.pdf
Distributed approximation algorithms for k-dominating set in graphs of bounded genus and linklessly embeddable graphs Regular Submission Andrzej Czygrinow1⋆, Micha l Han´ ckowiak2, Wojciech Wawrzyniak2, and Marcin Witkowski2 1 Faculty of Mathematics and Computer Science Adam Mickiewicz University, Pozna´ n, Poland mhanckow,wwawrzy, mw@amu.edu.pl 2 School of Mathematical and Statistical Sciences Arizona State University, Tempe, AZ,85287-1804, USA. aczygri@asu.edu Abstract. A k-dominating set in a graph G = (V, E) is a set U ⊆V such that ever vertex of G is either in U or has at least k neighbors in U. In this paper we give simple distributed approximation algorithms in the local model for the minimum k-dominating set problem for k ≥2 in graphs with no K3,h-minor and graphs with no K4,4-minor. In par-ticular, this gives fast distributed approximations for graphs of bounded genus and linklessly embeddable graphs. The algorithms give a constant approximation ratio and run in a constant number of rounds. In addi-tion, we will give a (1 + ϵ)-approximation for an arbitrary fixed ϵ > 0 which runs in O(log∗n) rounds where n is the order of a graph. 1 Introduction The minimum dominating set (MDS) problem is one of the most extensively studied graph-theoretic questions. On one hand, it plays an important role in graph theory, on the other, it admits many important applications. Its complex-ity has been studied in many different computational models and for various classes of graphs. In general, the problem is NP-hard , and it is even NP-hard to find a (C log ∆(G))-approximation for some constant C . In addition to the above hardness results for the sequential model, similar restrictions apply to the distributed complexity of the problem in general graphs. At the same time, there has been much more success in devising efficient approximations for spe-cific classes of graphs. In particular, the problem is much more tractable when restricted to the family of planar graphs and an efficient deterministic approx-imation algorithm for the minimum dominating set problem in planar graphs was given in . The algorithm from gives a constant approximation of a ⋆Research supported in part by Simons Foundation Grant # 521777. minimum dominating set, runs in a constant number of rounds but uses long messages (more than O(log n) bits).In , Wawrzyniak improved the analysis from and showed that the algorithm from gives a 52-approximation. In addition, in , Wawrzyniak proposed a local (constant-time) algorithm which gives a 694-approximation of the minimum dominating set problem in planar graphs which uses messages of length at most O(log n) and works in the port numbering model. (In this model, which is similar to the Local model, no unique identifiers are required but edges which are incident to a vertex are numbered, see .) In , the authors showed that essentially the same algorithm gives a constant approximation of a minimum dominating set in graphs of bounded genus. In fact, as proved in , no geometrical considerations are needed when analyzing the procedure from as the only requirement is that the underlying graph has no K3,h as a minor. Often a stronger notion of a domination is needed. For example, in some ap-plications it can be desirable to require that every vertex in a graph is dominated not by one vertex from a set but by k vertices for some k ∈Z+. This can be interpreted as a fault tolerance requirement; Servers are placed in a network so that each vertex/client has direct access to k servers. To define the problem formally we need some notation and terminology. Let G = (V, E) be a graph with |V | = n. By NG(v) = {u ∈V : uv ∈E} we denote the neighborhood of a vertex v ∈V and by NG[v] = NG(v) ∪{v} the closed neighborhood of v. We use dG(v) (or d(v) if G is clear from the context) to denote |NG(v)|. Set D ⊆V is called a dominating set in G if every vertex in V \D is adjacent to a vertex in D. A minimum dominating set in a graph G is a dominating set in G of the smallest size. For a positive integer k, a k-dominating set in G is a subset D ⊆V such that for every v ∈V \ D, |N(v) ∩D| ≥k, that is, for every vertex v ∈V , v is in D or v has at least k neighbors in D. In particular, a 1-dominating set is simply a dominating set. In addition, we will say that a set W k-dominates set U in G, if every vertex from U \ W has at least k neighbors in W. Note that other notions of k-domination have been considered and many variants of the problem have been studied (see ). The k-domination problem was proposed in as a natural generalization of the minimum dominating set problem. It has been studied extensively in graph theory, where the main line of research is to establish upper bounds for γk(G), the minimum size of a k-dominating set. It is known that the problem is NP-complete in general graphs but can be solved in linear time in trees and series-parallel graphs (). Further generalizations of the k-dominating set were considered and many slightly different variants have been proposed. The distributed complexity of finding γk(G) (the k-MDS problem) were studied in and . In addition, in distributed approximation algorithms for the minimum k-dominating set problem in planar graphs are proposed. In this paper, we will study distributed complexity of the problem in two classes of graphs, graphs of bounded genus and linklessly embeddable graphs. Both of these classes are proper minor-closed families of graphs and in our algorithms and analysis we will not need any geometric properties of the graphs as we will work in a slightly more general setting by forbidding some graphs as minors. Let G be a graph, we say that H is a minor of G (or that G has an H-minor) if H can be obtained from a subgraph of G by sequence of edge deletions and contractions. We say that G contains a subdivision of H (or that TH is a subgraph of G) if G contains a graph obtained from H by replacing edges of H by independent paths of length at least one. Let Sh denote the surface obtained from the sphere by adding h handles (see for a formal definition of this process). The genus of a graph G, g(G), is the least integer h such that there is an embedding of a graph G into Sh. In what follows we will not make any geometric arguments as our argument applies to a bigger class of graphs than the class of graphs of genus at most g. Note that if G is embeddable in a surface S, then the graphs obtained from G by deleting an edge or contracting an edge are embeddable as well. Consequently the class of graphs of genus at most g is a proper minor-closed family of graphs and can be characterized by a finite set of forbidden minors. In addition, since g(Km,n) = ⌈(m −2)(n −2)/4⌉(see ), we have that if g(G) ≤g, then G has no K3,4g+3-minor. As in , we will work with the family of graphs Bh which have no K3,h-minor. In addition to the graphs with no K3,h-minor we will give a distributed approximation algorithm for graphs with no K4,4-minor. This, in particular, yields an algorithms for linklessly embeddable graphs which are sometimes viewed as 3-dimensional analogs of planar graphs. An embedding of a graph in R3 is called linkless if every pair of (vertex) disjoint cycles are unlinked closed curves. It is not difficult to see that K4,4 is not linklessly embeddable (the only fact that will be needed). We will consider the Local model (), which is a synchronous message-passing model in which vertices have unique identifiers from {1, . . . , n} where n is the order of the graph. Computations proceed in rounds and in each round a vertex can send messages to all its neighbors, can receive messages from its neighbors and can perform some local computations. Neither the size of the messages nor the amount of local computations is restricted in any way. An algorithm is executed by the vertices of a network and its objective is to find a solution to a problem (in our case the k-MDS problem) in this underlying network. Our contribution is twofold. First, we show that for graphs of bounded genus there is an easy distributed algorithm which gives a constant approximation of the minimum k-dominating set for k ≥2. This mirrors the corresponding result for planar graphs. In addition, the same approach gives a constant approximation for k ≥3 in linklessly embeddable graphs. The case k = 2 is different, and to address it we use a modification of the algorithm from and some ideas from and . The above approximation algorithms run in a constant number of rounds and give a constant approximation ratio. Further improvement of the approximation ratio are left for future work. Second, we propose a distributed approximation algorithm with approximation ratio of (1+ϵ) for every fixed ϵ > 0. This algorithm runs in O(log∗n) rounds where n is the order of the graph. This algorithm combines the main procedure from with some additional ideas. The paper is structured as follows. In the next section, we state some pre-liminary facts. In the following section we give the first (simple) approximation algorithm for the minimum k-dominating set in graphs with no TKh,k+1. This yields an algorithm for graphs of bounded genus for k ≥2 and for linklessly embeddable graphs when k ≥3. In Section 4 we address the 2MDS problem for graphs with no TK4,4 which gives, in particular, an algorithm for linklessly embeddable graphs when k = 2. Finally, in Section 5, we discuss the (1 + ϵ)-approximation. 2 Preliminaries We will start our technical discussion with a few facts which will be used later. We have the following bound for the number of edges in a graph with TKh (see ). Lemma 1. If G is a graph such that |E(G)| ≥5h2n, then G has TKh. We will also need a more general bound for E(G) in the case G has no Kp-minor. The following was proved by Kostochka in . Lemma 2 (Kostochka). There exists c ∈R such that for every r ∈Z+ if G is a graph on n vertices with no Kr-minor, then |E(G)| ≤cr√log rn. One of the main tools used in the proofs will be lemmas from . Let v be a vertex in G and let S ⊆V (G) \ {v}. Then a set of paths is called a v, S-fan if every path starts at v, ends in a vertex from S which is the only vertex from S on the path, and any two distinct paths have only v in common. For a dominating set D in a graph G let Dk,l be the set of vertices v ∈V (G) \ D such that there is a v, D-fan subgraph in G consisting of k paths, each of length at most l. The following two facts are proved in . Lemma 3. For h, l ∈Z+ there is c such that the following holds. Let G be a graph with no TKh and let D be a dominating set in G. Then |Dh−1,l| ≤c|D|. In addition, we have the following fact. Lemma 4. Let h ∈Z+. For l, m ∈Z+ there is c = c(m, l) such that if G is graph with no TKm,h and D is a dominating set in G then |Dm,l| ≤c|D|. 3 First algorithm for graphs with bounded genus and linklessly embeddable graphs In our first algorithm (Procedure 1) we simply add to the solution all vertices of sufficiently large degree and claim that this gives a constant approximation of a k-dominating set. Specifically, we will show that in the case when k ≥2 and G has bounded genus or k ≥3 and G is linklessly embeddable, this gives a constant approximation of a minimum k-dominating set. We will need the following lemma in the analysis. Lemma 5. Let k, h, q ∈Z+ be such that k ≤q. If H = H[U, X] is a bipartite graph such that |U| ≥ q k  (h −1) + 1, |X| ≤q and for every vertex u ∈U, dH(u) ≥k, then H contains Kh,k. Proof. The proof is similar to a proof of an upper bound for the extremal number of a complete bipartite graph. Suppose H has no Kh,k. We will count the number of k-stars (stars of degree k) with centers in U. On one hand, the number of such k-stars is at least P u∈U d(u) k  ≥|U|. On the other hand, since H has no Kh,k, the number of k-stars is at most |X| k  (h −1). Consequently, if |U| ≥ |X| k  (h −1) + 1, then H contains Kh,k. □ Let h, k ∈Z+, set L := k+h k  (h−1)+2(k +h)+1 and consider the following procedure. Procedure 1 1. For every v ∈V (G), if d(v) ≥L, then add v to D. 2. For every v ∈V (G) \ D, if |N(v) ∩D| < k, then add v to D. 3. Return D. In fact we will proves something slightly more general. Fact 1 For h, k ∈Z+ let L := k+h k  (h −1) + 2(k + h) + 1. If G is a graph with no TKh+k+1 and no Kh,k+1, then Procedure 1 applied to G with L returns a k-dominating set of size O(γk(G)). Proof. Let W := {v ∈V (G) : d(v) ≥L} and let D∗be an optimal k-dominating set. Then the number of vertices in G which have a neighbor in D∗\ W is at most (L −1)|D∗|. Suppose that v ∈V (G) \ W has |N(v) ∩W| < k and so it is added to D in the second step of the algorithm. Then v is either in D∗ or has at least one neighbor in D∗\ W and so the number of vertices added in step 2 is at most L|D∗|. Thus to show that |D| = O(γk(G)) it is enough to show that |W| = O(|D∗|). To that end, note that for every v ∈W \ D∗, N(v) \ D∗is k-dominated by D∗. If |N(v) ∩D∗| ≥h + k, then v ∈D∗ h+k,1. Since G has no TKh+k+1, D∗is a k-dominating set and so a 1-dominating set, by Lemma 3, the number of such vertices is O(|D∗|). Thus we may assume that |N(v) \ D∗| > L −(h + k) and recall that N(v) \ D∗is k-dominated by D∗. Consider a maximum matching M in G[N(v) \ D∗, D∗] and note that if |M| ≥h + k, then v ∈D∗ h+k,2. Thus we may assume that |M| < h + k. Since M is a maximum matching in G[N(v)\D∗, D∗], if w ∈N(v)(D∗∪V (M), then all neighbors of w which are in D∗are in V (M) as otherwise we could increase M. Consequently, |N(N(v)(D∗∪V (M)))∩D∗| ≤|V (M)∩D∗| < h+k. In addition, |E(N(v)(D∗∪V (M)), V (M)∩D∗)| ≥k|N(v)(D∗∪V (M))| because D∗is a k-dominating set,and , by definition of L, |N(v)(D∗∪V (M))| ≥ k+h k  (h−1)+1. Thus, by Lemma 5, G[N(v) \ (D∗∪V (M)), V (M) ∩D∗] contains Kh,k, which in connection with v gives Kh,k+1 contradicting the fact that G has no TKh,k+1. The contradiction shows that |M| ≥h + k and so v ∈D∗ h+k,2. By Lemma 3, |D∗ h+k,2| = O(γk(G)). □ We immediately get constant approximations for γk(G) in linklessly embed-dable graphs for k ≥3. Corollary 2 Let G be a linklessy embeddable graph and let k ≥3. Then Proce-dure 1 applied to G returns a k-dominating set of size O(γk(G)) when applied with h = 4. Proof. Since G is linklessly embeddable, G has no K4,4-minor and therefore no K4,4 and no TK8. We can apply Procedure 1 with h = 4. □ If G is a graph with g(G) ≤g, then G has no K4g+3,3-minor. Consequently Procedure 1 can be applied to G for every k ≥2 gives a constant approximation. Corollary 3 Let g ∈Z+ and k ≥2. For every graph G with g(G) ≤g, Proce-dure 1 returns a k-dominating set of size O(γk(G)) when applied with h = 4g+3. Proof. Since G has genus bounded by g, G ∈B4g+3, and so G has no TK4g+3,3. □ 4 Graphs with no T K4,4 for k = 2 In the case G has no K4,4-minor and k = 2 it is no longer possible to claim that Procedure 1 gives a constant approximation of γk(G) and a slightly more involved algorithm is needed. We will show that a modification of the algorithm for the minimum dominating set in planar graphs from gives a constant approximation in this case. Recall that we say that a vertex v is 2-dominated by a set S if either v ∈S or v has at least two neighbors in S. We will start with the following observation. Lemma 6. Let K ∈Z+. If U is a subset of V (G) such that |U| ≥4K2 and there is a set S ⊆V (G) \ U of size |S| ≤K which 2-dominates U, then there exist s1, s2 ∈S such that s1 ̸= s2 and |N(s1) ∩N(s2) ∩U| ≥4. Proof. Clearly there exists s1 ∈S such that |N(s1) ∩U| ≥4K2/K = 4K and there exists s2 ∈S \ {s1} such that |N(s2) ∩(N(s1) ∩U)| ≥4K/K ≥4. □ In what follows, let K := 642, C := 4K2 + K and L := 4C + 3. We will assume that G has no TK4,4. Procedure 2 1. For every v ∈V (G): If there is no set S ⊆V \ {v} such that |S| ≤K and S 2-dominates N(v), then add v to D1. In addition if d(v) < 2, then add v to D1. 2. Let Z be the set of vertices which are 2-dominated by D1 and let d′(v) := |N(v) \ Z| for v ∈V . 3. For every u ∈V \ Z: – If |N(u)∩D1| = 1, then choose v ∈N(u)\D1 such that d′(v) is maximum and add it to D2. – If |N(u)∩D1| = 0, then choose two distinct v, v′ ∈N(u) with the largest degrees d′ and add them to D2. 4. Return D1 ∪D2. Note that Procedure 2 works in the Local model as in the second step a vertex v can obtain locally information about the ball of radius two centered at v to determine if it should be added to D1. We first note that D1 ∪D2 is a 2-dominating set. Fact 4 The set D1 ∪D2 is a 2-dominating set in G. Proof. Suppose u / ∈D1 and |N(u) ∩D1| = i for i = 0, 1. Then d(u) ≥2, and so u has at least 2 −i neighbors in V \ D1. In the second step of the procedure 2 −i of them will be added to D2. □ Let D∗be an optimal 2-dominating set in G. We will now show that |D1 ∪ D2| ≤C|D∗| for some constant C. Fact 5 |D1| = O(|D∗|). Proof. First note that if d(v) < 2, then v ∈D∗. In addition, for v ∈D1 \D∗, we certainly have |N(v)| > K because N(v) is an option for S. Let V1 := {v ∈D1 \ D∗: |N(v) ∩D∗| ≥K/2}. We have K|V1|/2 ≤|EG(V1, D∗)| < 5 · 64(|V1| + |D∗|) by Lemma 1, and so |V1| < 320|D∗|. Let V2 := {v ∈D1 \ D∗: |N(v) ∩D∗| < K/2}. Take v ∈V2 and let W ⊆D∗be a minimum set which 2-dominates N(v)\D∗. We have |W| ≥K/2 because W ∪(N(v)∩D∗) 2-dominates N(v). In addition, |N(v) \ D∗| = |N(v)| −|N(v) ∩D∗| > K/2. Therefore, by minimality of W, there is a matching of size at least |W|/2 ≥K/4 ≥4 between W and N(v) \ D∗, and consequently there is a v, W2-fan of size four. Therefore, v ∈D∗ 4,2 and, by Lemma 4, |V2| = O(|D∗|). □ To show that |D1 ∪D2| = O(|D∗|) we will now prove that |D2| = O(|D∗|). Fact 6 |D2| = O(|D∗|). Proof. If D∗\D1 = ∅, then every vertex in V \D1 has two neighbors in D1 and D2 = ∅. For a vertex u ∈V \ (Z ∪D∗) which has one neighbor in D1, there is at least one v ∈D∗\ D1 such that u ∈N(v). We fix one such v and say that u belongs to v. If u has no neighbors in D1, then there exist at least two vertices v, v′ ∈D∗\ D1 such that u ∈N(v) ∩N(v′). We fix such a pair (v, v′) and say that u belongs to v if d′(v) < d′(v′) (if the degrees are equal then we select one of v, v′ arbitrarily.) Note that every vertex u ∈V \ Z is either in D∗\ D1 or belongs to exactly one vertex from D∗\ D1. In order to show that |D2| = O(|D∗|) we will argue that for every vertex v ∈D∗\ D1 there can be at most a constant number of vertices added to D2 by v and by vertices which belong to v. Let v ∈D∗\ D1. Note that v can select at most two vertices to be added to D2. In addition, there exists a set S ⊆V \ {v} such that |S| ≤K and S 2-dominates N(v). Fix such a set S and call it Sv. Let ˜ N(v) be the set of u ∈N(v) such that u belongs v. First suppose | ˜ N(v)| ≤L. Since each u ∈˜ N(v) selects at most two vertices in step 3, the number of vertices added to D2 by vertices from ˜ N(v) is at most 2L. Now assume | ˜ N(v)| > L. Let w ∈V (D1 ∪D∗∪Sv) and suppose w has a neighbor in ˜ N(v). If |N(w) ∩˜ N(v)| > C, then Sv 2-dominates (N(w) ∩˜ N(v)) \ Sv which has size at least 4K2, and so by Lemma 6, G contains K4,4 which is not possible. Thus 0 < |N(w) ∩˜ N(v)| ≤C for every vertex v. For a vertex x, if u ∈N(w) ∩˜ N(x), u belongs to x and d′(x) > L. Thus if u selects w in step 3, then d′(w) > L. All neighbors of w in G[V \ Z] are either in D∗\ D1 or in one of the sets ˜ N(x). If w has four neighbors in D∗, then w ∈D∗ 4,1. Otherwise, w has at least one neighbor in ˜ N(x) for at least (L −3)/C ≥4 vertices x ∈D∗\ D1. Consequently, by Lemma 4, the number of such vertices is O(|D∗|). Finally, since |Sv| ≤K, there are at most K vertices in Sv which can be added to D2 by vertices in ˜ N(v) in step 3. □ Thus we have the following theorem. Theorem 7. There exists C ∈Z+ such that the following holds. Let G be a graph with no TK4,4. Then Procedure 2 finds a 2-dominating set D such that |D| ≤Cγ2(G). From Theorem 7, we get a constant approximation for the 2-minimum dominat-ing set problem in linklessly embeddable graphs. Corollary 8 Let G be a linklessy embeddable graph. Then Procedure 2 applied to G returns a 2-dominating set of size O(γ2(G)). 5 (1 + ϵ)-approximation In this section we will show that a modification of the approach from gives a (1 + ϵ)-approximation of the k-dominating set for k ≥2 in the class of graphs of bounded genus as well as in the class of linklessly embeddable graphs. In fact, our main algorithm is much more general and applies to the class of graphs with no Kp-minor for some fixed positive integer p. Let G be a graph on n vertices with no Kp as a minor and suppose ω : E(G) →Z+ is a weight function. For a partition (V1, . . . , Vl) of V (G), we will denote by ˜ G = ˜ G(V1, . . . , Vl) the graph obtained from G by contracting each of the sets Vi to a vertex vi and setting the weight ω(vivj) = P e∈E(Vi,Vj) ω(e) when E(Vi, Vj), the set of edges with one endpoint in Vi and another in Vj, is non-empty. A straightforward generalization of the main clustering procedure from gives the following theorem. Theorem 9. Let p ∈Z+ and let ϵ > 0. There exists C such that the following holds. Suppose G is a graph on n vertices with no Kp-minor and let ω : E(G) → Z+. There is a distributed algorithm which finds a partition (V1, . . . , Vl) such that G[Vi] has diameter O(C) and X e∈˜ G ω(e) ≤ϵ X e∈G ω(e). The algorithm runs in C log∗n rounds. By combining Theorem 9 with some additional analysis we obtain the following fact. Theorem 10. Let p, k ∈Z+ and let δ > 0. Let G be a graph on n vertices with no Kp-minor and suppose Q is a k-dominating set for G. There is a distributed algorithm which finds a k-dominating set D in G such that |D| ≤γk(G) + δ|Q|. The algorithm runs in C log∗n rounds where C depends on p, k and δ only. Note that the case k = 1 is proved in but the algorithm from doesn’t address the situation k > 1 and a slightly different approach is needed. Before proving Theorem 10 let us note that in view of the results from the previous section we have the following corollaries. Corollary 11 Let g, k ∈Z+ such that k ≥2 and let ϵ > 0. Let G be a graph on n vertices with genus g. There is a distributed algorithm which finds a k-dominating set D in G such that |D| ≤(1 + ϵ)γk(G). The algorithm runs in C log∗n rounds where C depends only on g, k and ϵ. Proof. In view of Corollary 3, there is a distributed algorithm which in a con-stant number of rounds finds a k-dominating set Q in G such that |Q| ≤LγK(G) for some constant L. Let δ := ϵ/L. The by Theorem 10 finds a dominating set D such that |D| ≤(1 + ϵ)γk(G). □ In addition, using the algorithms for linklessly embeddable graphs from pre-vious sections we obtain the following fact. Corollary 12 Let k ≥2 and let ϵ > 0. Let G be a linklessly embeddable graph on n vertices. There is a distributed algorithm which finds a k-dominating set D in G such that |D| ≤(1 + ϵ)γk(G). The algorithm runs in C log∗n rounds where C depends only on k and ϵ. Proof of Theorem 10. Let Q be a k-dominating set in G. Let G′ be the following oriented graph obtained form the bipartite graph G[Q, V (G) \ Q]. We put the arc from v to w for every edge vw with v ∈V (G) \ Q and w ∈Q. Since Q is k-dominating, every vertex v ∈V (G)\Q has at least k out-neighbors in G′. By choosing one such out-neighbor arbitrarily, we obtain a set of stars S1, . . . , Sl with centers in vertices from Q. Let Uj := V (Sj) and let cUj denote the center of Sj, that is {cUj} = Uj ∩Q. We will refer to sets Uj as small clusters. Let H0 be the digraph obtained from G′ by contracting each Sj to a vertex. (Note that it is possible to have both arcs UjUi and UiUj in H0.) Let D := ∅and let K := 2c · p√log pk/δ where c is the constant in Lemma 2. We will modify the original small clusters and construct a sequence of di-graphs H1, . . . , Hk−1 by increasing D in each step so that |D| is small with respect to |Q| and clusters in Hk−1 obtained by deleting vertices which are k-dominated by D have out-neighbors in at most K other vertices from Q. Some of the centers of small clusters will be added to D, some vertices will be reas-signed from one cluster to another, and, in addition, some vertices will become k-dominated by D and will become inactive. Although we no longer need to k-dominate inactive vertices (as they are k-dominated by D), they can still play an important role because they themselves can be inside an optimal k-dominating set. Although the sets Uj will change as we modify them, we will use Uj to re-fer to the cluster determined by cUj during the execution of the algorithm. For cluster U we use U ′′ to denote the set of inactive vertices in U \ {cU} and we set U ′ := U \ U ′′. Initially, U ′′ := ∅for every cluster U and we set B0 := V (G) \ Q. We will now describe our procedure which modifies the small clusters. We will use d+ F (X) to denote the number of out-neighbors of a cluster X in F. Recall that clusters are associated with their centers and so cluster X at step i can be different than X at step j for i ̸= j. For the general step, assume i ≥1 and let Xi−1 := {U|d+ Hi−1(U ′) > K}. If U ∈Xi−1, then add cU to D. Consider v ∈Bi−1 ∩U ′. If v becomes k-dominated by D, then move v to U ′′ and otherwise, add v to Bi. Every vertex v ∈Bi has at most k −1 neighbors in D and so there exists a small cluster W such that cW / ∈D and vcW ∈G′. Let v join one such cluster W. Let Hi be obtained by contracting each small cluster U to a vertex and by adding the arc UW if the set of arcs from U ′ to W ′ in G′ is non-empty. We will prove the following lemma. Lemma 7. The following holds: (a) Pk i=1 |Xi−1| < δ|Q|/2. (b) For every v ∈Bk, |NG(v) ∩D| ≥k. (c) For every small cluster U there exists a set of small clusters Q′ ⊆Q such that |Q′| ≤K and every vertex v ∈U (Bk ∪{cU}) has NG(v)∩Q ⊆Q′ ∪D. To prove the lemma we will show a sequence of claims. Part (a) follows from the following observation. Claim. |Xi−1| < δ|Q|/(2k). Proof. From Lemma 2, P U∈Hi−1 d+ Hi−1(U) = |E(Hi−1)| ≤cp√log p|Q|. Thus |Xi−1| < cp√log p|Q|/K = δ|Q|/(2k). □ We will now verify part (b). Claim. If v ∈Bi, then |NG(v) ∩D| ≥i. Proof. This is certainly true when i = 0. Suppose i ≥1. If v ∈Bi, then v ∈Bi−1 and in the ith step of the procedure v ∈U ′ for some U ∈Xi−1. Since cU is added to D, |NG(v) ∩D| increases by at least one. □ Part (c) is slightly more involved and we split the argument into two claims. First note the following. Claim. If U ∈Xi, then U / ∈Xi+1. Proof. We proceed by induction on i. If U ∈X0, then after adding cu to D and partitioning U into U ′ and U ′′, every vertex from U ′ is reassigned and so in the next step U ′ is empty. Suppose U ∈Xi. Then, by induction, U / ∈Xi−1. Thus some vertices from Bi−1 joined U, as this is the only way for the out-degree of a cluster to increases. Each such vertex is either inactive or is in Bi after cU is added to D in the ith step, and every vertex from Bi ∩U joins a cluster different than U with center which is not in D. Consequently, none of these added vertices is in U ′ in the iteration i + 1, and we have d+ Hi+1(U ′) ≤d+ Hi−1(U ′). □ Claim. Let i ≥1. For every U there exists a set Q′ ⊆Q such that |Q′| ≤K and for every vertex v ∈U \ (Bi ∪{cU}), NG(v) ∩Q ⊆Q′ ∪D. Proof. If U / ∈Xi then d+ Hi(U ′) ≤K and so NG(U ′ \ (Bi ∪{cU})) ∩Q ⊆ Q′ for some set Q′ of size at most K. Suppose U ∈Xi. Then U / ∈Xi−1 by Claim 5. Therefore some vertices from Bi−1 joined U and each of them is either inactive (and dominated by D) or is in Bi. Consider U ′ in the ith iteration of the procedure. The set U ′ is a subset of the union of X and Y , where X is the set U ′ \ Bi−1 from the iteration i −1 and Y is the set of vertices added to the small cluster U in the ith iteration. The number of distinct out-neighbors of X in Q is therefore at most K, and the vertices from Y are either dominated by D or are in Bi. □ This proves part (c) of the lemma. We will now continue with the proof of Theorem 10. Let U1, . . . , Ul denote the clusters in Hk and recall that l = |Q|. Let G∗ be obtained from G by contracting each Ui to a vertex ui. In addition, set ω(uiuj) = 1 for every edge uiuj ∈G∗. Let ϵ := δ/(6c · p√log pK) and use the clustering procedure from Theorem 9 to find a partition P of {u1, . . . , ul} into V1, . . . , Vs. Then ω( ˜ G) ≤ϵ|E(G)| ≤ϵ · cp p log pl < δl/(6K). Let ∂P be the set of u ∈{u1, . . . , ul} such that for some i ̸= j, u ∈Vi and NG∗(u) ∩Vj ̸= ∅. We have |∂P| ≤2ω( ˜ G) ≤δl/(3K). Let u ∈∂P and consider the small cluster U which was contracted to u. Add cU to D and note that by Lemma 7 (b) every vertex v ∈Bk ∩U has k-neighbors in D. In addition, by Lemma 7 (c), there is a set Q′ of at most K vertices in Q such that every vertex v ∈U \ (Bk ∪{cU}) has NG(v) ∩Q ⊆Q′ ∪D. Since every vertex v ∈V (G) \ Q has at least k neighbors in Q, by adding Q′ ∪{cU} to D we k-dominate all vertices from U. Add Q′ ∪{cU} to D for every U ∈∂P. By Lemma 7 (a), we have |D| ≤δ|Q|/2 + δl(K + 1)/(3K) < δ|Q|. Let Wi := S U∈Vi\∂P U. Since the diameter of G[Vi] is O(1), it is possible to find in O(1) rounds an optimal set Di ⊆Vi such that Di ∪D k-dominates Wi. Let D′ := Sl i=1 Di ∪D and let D∗denote an optimal k-dominating set in G. Then |D′| ≤ X |Di| + |D| ≤ X |D∗∩Vi| + |D| ≤|D∗| + |D| < γk(G) + δ|Q| where the second inequality follows from the fact that every vertex in Wi can be k-dominated only by vertices in Vi ∪D and every vertex in S U∈∂P U is k-dominated by D. □ References 1. N. Alon, S. Gutner: Kernels for the Dominating Set Problem on Graphs with an Excluded Minor, Electronic Cooloquium on Computational Complexity, Report No. 66, (2008). 2. S. A. Amiri, S. Schmid, S. Siebertz: A Local Constant Factor MDS Approximation for Bounded Genus Graphs, PODC 2016, Proceedings of the 2016 ACM Symp. on Principles of Distributed Computing, (2016), 227–233. 3. A. Czygrinow, M. Han´ ckowiak, E. Szyma´ nska, W. Wawrzyniak, and M. Witkowski: Improved distributed local approximation algorithm for minimum 2-dominating set in planar graphs, Theoretical Computer Science, Vol 662, (2017), pages 1–8 . 4. A. Czygrinow, M. Han´ ckowiak, and W. Wawrzyniak: Fast distributed approxima-tions in planar graphs, International Symposium on Distributed Computing, DISC, Arcachon, France, September 2008, LNCS 5218, pages 78–92. 5. R. Diestel: Graph Theory 4th Ed., Springer, 2010. 6. J.F. Fink, M.S. Jacobson: n-domination in graphs, Graph Theory with Applications to Algorithms and Computer Science,1985, pages 282–300. 7. M. R. Garey and D. S. Johnson: Computers and Intractability, Freeman, 1979. Lower bounds for local approximation, J. ACM 60(5): 39, 2013, pages 1–23. 8. T. Haynes, S. Hedetniemi, P. Slater: Domination in Graphs: Advanced Topics, Monographs and Textbooks in Pure and Applied Mathematics, Marcel Dekker, 1998. 9. M.S. Jacobson, K. Peters: Complexity questions for n-domination and related pa-rameters, Congr. Numer. (68), 1989, pages 7–22. 10. L. Jia, R. Rajaraman, R. Suel: An efficient distributed algorithm for constructing small dominating sets, Distributed Computing, 15(4), 2002, pages 193–2005. 11. A. V. Kostochka: The minimum Hadwiger number for graphs with a given mean degree of vertices, Metody Diskret. Analiz. (in Russian), 38, (1982), pages 37-58. 12. F. Kuhn, T. Moscibroda, R. Wattenhofer: Fault-Tolerant Clustering in Ad Hoc and Sensor Networks, ICDCS 2006, pages 68–78. 13. C. Lenzen, Y. A. Oswald, R. Wattenhofer: Distributed minimum dominating set approximations in restricted families of graphs, Distrib. Comput., 26 (2), 2013, pages 119–137. 14. B. Mohar, C. Thomassen: Graphs on Surfaces, Johns Hopkins University Press, (2001). 15. D. Peleg: Distributed Computing: A Locality-Sensitive Approach, Society for Indus-trial and Applied Mathematics, Philadelphia, PA, USA, 2000. 16. R. Raz, S. Safra: A Sub-Constant Error-Probability 17. N. Robertson, P. Seymour, R. Thomas: Sachs’ linkless embedding conjecture, Jour-nal of Combinatorial Theory, Series B, 64, (1995), 185–227. 18. J. Suomela: Survey of local algorithms, ACM Comput. Surv. 45(2): 24, 2013, pages 1–40. 19. W. Wawrzyniak: A local approximation algorithm for minimum dominating set problem in anonymous planar networks. Distributed Computing 28(5), 2015, pages 321–331. 20. W. Wawrzyniak: A strengthened analysis of a local algorithm for the minimum dominating set problem in planar graphs, Inf. Process. Lett. 114(3), 2014, pages 94–98.
4168
https://archive.org/details/vogelsqualitativ0000voge
Vogel's qualitative inorganic analysis : Vogel, Arthur Israel : Free Download, Borrow, and Streaming : Internet Archive Skip to main content Ask the publishers to restore access to 500,000+ books. Wayback MachineTextsVideoAudioSoftwareImagesDonateMore "Donate to the archive" Sign up | Log in Upload Internet Archive Audio Live Music ArchiveLibrivox Free Audio Featured All Audio Grateful Dead Netlabels Old Time Radio 78 RPMs and Cylinder Recordings Top Audio Books & Poetry Computers, Technology and Science Music, Arts & Culture News & Public Affairs Spirituality & Religion Podcasts Radio News Archive Images Metropolitan MuseumCleveland Museum of Art Featured All Images Flickr Commons Occupy Wall Street Flickr Cover Art USGS Maps Top NASA Images Solar System Collection Ames Research Center Software Internet ArcadeConsole Living Room Featured All Software Old School Emulation MS-DOS Games Historical Software Classic PC Games Software Library Top Kodi Archive and Support File Vintage Software APK MS-DOS CD-ROM Software CD-ROM Software Library Software Sites Tucows Software Library Shareware CD-ROMs Software Capsules Compilation CD-ROM Images ZX Spectrum DOOM Level CD Texts Open LibraryAmerican Libraries Featured All Texts Smithsonian Libraries FEDLINK (US) Genealogy Lincoln Collection Top American Libraries Canadian Libraries Universal Library Project Gutenberg Children's Library Biodiversity Heritage Library Books by Language Additional Collections Video TV NewsUnderstanding 9/11 Featured All Video Prelinger Archives Democracy Now! Occupy Wall Street TV NSA Clip Library Top Animation & Cartoons Arts & Music Computers & Technology Cultural & Academic Films Ephemeral Films Movies News & Public Affairs Spirituality & Religion Sports Videos Television Videogame Videos Vlogs Youth Media Search the history of over WB_PAGES_ARCHIVED web pages on the Internet. Search the Wayback Machine Mobile Apps Wayback Machine (iOS) Wayback Machine (Android) Browser Extensions Chrome Firefox Safari Edge Archive-It Subscription Explore the Collections Learn More Build Collections Save Page Now Capture a web page as it appears now for use as a trusted citation in the future. Please enter a valid web address About Blog Projects Help Donate Contact Jobs Volunteer People Sign up for free Log in Search metadata Search text contents Search TV news captions Search radio transcripts Search archived web sites Advanced Search About Blog Projects Help Donate Contact Jobs Volunteer People Vogel's qualitative inorganic analysis Bookreader Item Preview Page Page — (1/328)(1 of 328) Flip left Flip right One-page view Two-page view Thumbnail view Thumbnail view Zoom out Zoom in Toggle fullscreen remove-circle Share or Embed This Item Share to TwitterShare to FacebookShare to RedditShare to TumblrShare to PinterestShare via email Copy Link EMBED EMBED (for Archive.org item Description fields) Want more? Advanced embedding details, examples, and help! Favorite Share Flag Flag this item for Graphic Violence Explicit Sexual Content Hate Speech Misinformation/Disinformation Marketing/Phishing/Advertising Misleading/Inaccurate/Missing Metadata texts Vogel's qualitative inorganic analysis byVogel, Arthur Israel Publication date1987TopicsChemistry, Analytic -- Qualitative, Chemistry, Inorganic, 11030 inorganic 21030 qualitative analysis, Chemistry, QualitativePublisher Harlow, Essex, England : Longman Scientific & Technical ; New York : Wiley Collectioninternetarchivebooks; inlibrary; printdisabledContributorInternet ArchiveLanguageEnglishItem Size 740.5M ix, 310 pages : 24 cm Previous ed. as: Vogel's textbook of macro and semimicro qualitative inorganic analysis. 1979 Includes bibliographical references and index Notes cut text due to tight binding page 56 cut text Access-restricted-item true Addeddate 2020-09-16 14:03:33 Associated-names Svehla, G; Vogel, Arthur Israel. Textbook of macro and semimicro qualitative inorganic analysis Boxid IA1933109 Camera USB PTP Class Camera Collection_set printdisabled External-identifierurn:oclc:record:1200622187 urn:lcp:vogelsqualitativ0000voge:lcpdf:b48c412b-4011-4caf-a326-74153fe68373 urn:lcp:vogelsqualitativ0000voge:epub:f88d1363-e7c0-4840-9607-efbc1bfc69bbFoldoutcount 0 Identifier vogelsqualitativ0000voge Identifier-ark ark:/13960/t8pd2917n Invoice 1652 Isbn 0470207108 9780470207109 9780582450905 058245090X Lccn 86010453 Ocr_converted abbyy-to-hocr 1.1.20 Ocr_module_version 0.0.17 Old_pallet IA19223 Openlibrary_editionOL2717279MOpenlibrary_workOL4647412WPage_number_confidence 100 Page_number_module_version 1.0.5 Pages 330 Ppi 300 Rcs_key 24143 Republisher_date 20200916172829 Republisher_operator associate-shielamae-olmilla@archive.org Republisher_time 487 Scandate 20200911093458 Scanner station31.cebu.archive.org Scanningcenter cebu Scribe3_search_catalog isbn Scribe3_search_id 9780582450905 Tts_version 4.0-initial-155-gbba175a5 Show More Show Less Full catalog recordMARCXML plus-circle Add Review comment Reviews 1,318 Previews 14 Favorites DOWNLOAD OPTIONS No suitable files to display here. IN COLLECTIONS Internet Archive Books Uploaded by station31.cebu on September 11, 2020 SIMILAR ITEMS (based on metadata) Terms of Service (last updated 12/31/2014)
4169
https://www.geeksforgeeks.org/dsa/find-last-2-survivors-in-n-persons-standing-in-a-circle-after-killing-next-to-immediate-neighbour/
Find last 2 survivors in N persons standing in a circle after killing next to immediate neighbour - GeeksforGeeks Skip to content Tutorials Python Java DSA ML & Data Science Interview Corner Programming Languages Web Development CS Subjects DevOps Software and Tools School Learning Practice Coding Problems Courses DSA / Placements ML & Data Science Development Cloud / DevOps Programming Languages All Courses Tracks Languages Python C C++ Java Advanced Java SQL JavaScript Interview Preparation GfG 160 GfG 360 System Design Core Subjects Interview Questions Interview Puzzles Aptitude and Reasoning Data Science Python Data Analytics Complete Data Science Dev Skills Full-Stack Web Dev DevOps Software Testing CyberSecurity Tools Computer Fundamentals AI Tools MS Excel & Google Sheets MS Word & Google Docs Maths Maths For Computer Science Engineering Mathematics Switch to Dark Mode Sign In DSA Tutorial Array Strings Linked List Stack Queue Tree Graph Searching Sorting Recursion Dynamic Programming Binary Tree Binary Search Tree Heap Hashing Sign In ▲ Open In App Find last 2 survivors in N persons standing in a circle after killing next to immediate neighbour Last Updated : 12 Jul, 2025 Comments Improve Suggest changes Like Article Like Report Given an integer N representing N persons standing in a circle, the task is to find the last 2 persons remaining when a person kills their next to the immediate neighbor in a clockwise direction. Examples: Input: N = 5 Output: 1 4 Explanation: Initially: 1 2 3 4 5 => 1 kills 3 Standing: 1 2 4 5 => 2 kills 5 Standing: 1 2 4 => 4 kills 2 Final Standing: 1 4 Input: N = 2 Output: 1 2 Naive Approach: A simple approach is to keep a bool array of size N to keep track of whether a person is alive or not. Initially, the boolean array will be true for all persons. Keep two pointers, one at the current alive person and second to store previous current person. Once found a second alive neighbour from the current person, change its boolean value to false. Then again current is updated to next alive from previous. This process will continue till last two persons survive. Time Complexity: O(N 2) Auxiliary Space: O(N) Efficient Approach: An efficient approach is to remove the person, if dead, from the data structure so that it is not traversed again. After one complete round only, there will be only N/2 person, at max. Then in the next round it will be left with N/4 person and so on until a number of alive people become 2. Below is the implementation of the above approach: C++ ```CPP // C++ implementation of the approach include using namespace std; // Node for a Linked List struct Node { int val; struct Node next; Node(int _val) { val = _val; next = NULL; } }; // Function to find the last 2 survivors void getLastTwoPerson(int n) { // Total is the count // of alive people int total = n; struct Node head = new Node(1); struct Node temp = head; // Initiating the list of n people for (int i = 2; i <= n; i++) { temp->next = new Node(i); temp = temp->next; } temp->next = head; temp = head; struct Node del; // Total != 2 is terminating // condition because // at last only two-person // will remain alive while (total != 2) { // Del represent next person // to be deleted or killed del = temp->next->next; temp->next->next = temp->next->next->next; temp = temp->next; free(del); total -= 1; } // Last two person to // survive (in any order) cout << temp->val << " " << temp->next->val; } // Driver code int main() { int n = 2; getLastTwoPerson(n); return 0; } ``` // C++ implementation of the approach ​#include using namespace std;​// Node for a Linked List struct Node { int val; struct Node next;​ Node(int _val) { val = _val; next = NULL; }};​// Function to find the last 2 survivors void getLastTwoPerson(int n){ // Total is the count // of alive people int total = n; struct Node head = new Node(1); struct Node temp = head;​ // Initiating the list of n people for (int i = 2; i <= n; i++) { temp->next = new Node(i); temp = temp->next; }​ temp->next = head; temp = head;​ struct Node del;​ // Total != 2 is terminating // condition because // at last only two-person // will remain alive while (total != 2) {​ // Del represent next person // to be deleted or killed del = temp->next->next; temp->next->next = temp->next->next->next; temp = temp->next; free(del); total -= 1; }​ // Last two person to // survive (in any order) cout << temp->val << " " << temp->next->val;}​// Driver code int main(){ int n = 2;​ getLastTwoPerson(n);​ return 0;} Java ```java // Java implementation of the approach class GFG{ // Node for a Linked List static class Node { int val; Node next; Node(int _val) { val = _val; next = null; } }; // Function to find the last 2 survivors static void getLastTwoPerson(int n) { // Total is the count // of alive people int total = n; Node head = new Node(1); Node temp = head; // Initiating the list of n people for(int i = 2; i <= n; i++) { temp.next = new Node(i); temp = temp.next; } temp.next = head; temp = head; Node del; // Total != 2 is terminating // condition because // at last only two-person // will remain alive while (total != 2) { // Del represent next person // to be deleted or killed del = temp.next.next; temp.next.next = temp.next.next.next; temp = temp.next; del = null; System.gc(); total -= 1; } // Last two person to // survive (in any order) System.out.print(temp.val + " " + temp.next.val); } // Driver code public static void main(String[] args) { int n = 2; getLastTwoPerson(n); } } // This code is contributed by Rajput-Ji Python3python3 Python3 implementation of the approach Node for a Linked List class newNode: def __init__(self, val): self.val = val self.next = None Function to find the last 2 survivors def getLastTwoPerson(n): # Total is the count # of alive people total = n head = newNode(1) temp = head # Initiating the list of n people for i in range(2, n + 1, 1): temp.next = newNode(i) temp = temp.next temp.next = head temp = head de = None # Total != 2 is terminating # condition because # at last only two-person # will remain alive while (total != 2): # de represent next person # to be deleted or killed de = temp.next.next temp.next.next = temp.next.next.next temp = temp.next del de total -= 1 # Last two person to # survive (in any order) print(temp.val, temp.next.val) Driver code if name == 'main': n = 2 getLastTwoPerson(n) This code is contributed by SURENDRA_GANGWAR C#csharp // C# implementation of the approach using System; class GFG{ // Node for a Linked List class Node { public int val; public Node next; public Node(int _val) { val = _val; next = null; } }; // Function to find the last 2 survivors static void getLastTwoPerson(int n) { // Total is the count // of alive people int total = n; Node head = new Node(1); Node temp = head; // Initiating the list of n people for(int i = 2; i <= n; i++) { temp.next = new Node(i); temp = temp.next; } temp.next = head; temp = head; Node del; // Total != 2 is terminating // condition because // at last only two-person // will remain alive while (total != 2) { // Del represent next person // to be deleted or killed del = temp.next.next; temp.next.next = temp.next.next.next; temp = temp.next; del = null; total -= 1; } // Last two person to // survive (in any order) Console.Write(temp.val + " " + temp.next.val); } // Driver code public static void Main(String[] args) { int n = 2; getLastTwoPerson(n); } } // This code is contributed by Amit Katiyar JavaScriptjavascript // Javascript implementation of the approach // Node for a Linked List class Node { constructor(val) { this.val = val; this.next = null; } }; // Function to find the last 2 survivors function getLastTwoPerson(n) { // Total is the count // of alive people var total = n; var head = new Node(1); var temp = head; // Initiating the list of n people for (var i = 2; i <= n; i++) { temp.next = new Node(i); temp = temp.next; } temp.next = head; temp = head; var del; // Total != 2 is terminating // condition because // at last only two-person // will remain alive while (total != 2) { // Del represent next person // to be deleted or killed del = temp.next.next; temp.next.next = temp.next.next.next; temp = temp.next; total -= 1; } // Last two person to // survive (in any order) document.write( temp.val + " " + temp.next.val); } // Driver code var n = 2; getLastTwoPerson(n); // This code is contributed by noob2000. ``` Output: 1 2 Time Complexity: O(Nlog N) Auxiliary Space: O(N) Comment More info S souravrawat191 Follow Improve Article Tags : Linked List Mathematical DSA Explore DSA Fundamentals Logic Building Problems 2 min readAnalysis of Algorithms 1 min read Data Structures Array Data Structure 3 min readString in Data Structure 2 min readHashing in Data Structure 2 min readLinked List Data Structure 2 min readStack Data Structure 2 min readQueue Data Structure 2 min readTree Data Structure 2 min readGraph Data Structure 3 min readTrie Data Structure 15+ min read Algorithms Searching Algorithms 2 min readSorting Algorithms 3 min readIntroduction to Recursion 14 min readGreedy Algorithms 3 min readGraph Algorithms 3 min readDynamic Programming or DP 3 min readBitwise Algorithms 4 min read Advanced Segment Tree 2 min readBinary Indexed Tree or Fenwick Tree 15 min readSquare Root (Sqrt) Decomposition Algorithm 15+ min readBinary Lifting 15+ min readGeometry 2 min read Interview Preparation Interview Corner 3 min readGfG160 3 min read Practice Problem GeeksforGeeks Practice - Leading Online Coding Platform 6 min readProblem of The Day - Develop the Habit of Coding 5 min read Like Corporate & Communications Address: A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305) Registered Address: K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305 Company About Us Legal Privacy Policy Contact Us Advertise with us GFG Corporate Solution Campus Training Program Explore POTD Job-A-Thon Community Blogs Nation Skill Up Tutorials Programming Languages DSA Web Technology AI, ML & Data Science DevOps CS Core Subjects Interview Preparation GATE Software and Tools Courses IBM Certification DSA and Placements Web Development Programming Languages DevOps & Cloud GATE Trending Technologies Videos DSA Python Java C++ Web Development Data Science CS Subjects Preparation Corner Aptitude Puzzles GfG 160 DSA 360 System Design @GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved Improvement Suggest changes Suggest Changes Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal. Create Improvement Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all. Suggest Changes min 4 words, max Words Limit:1000 Thank You! Your suggestions are valuable to us. What kind of Experience do you want to share? Interview ExperiencesAdmission ExperiencesCareer JourneysWork ExperiencesCampus ExperiencesCompetitive Exam Experiences Login Modal | GeeksforGeeks Log in New user ?Register Now Continue with Google or Username or Email Password [x] Remember me Forgot Password Sign In By creating this account, you agree to ourPrivacy Policy&Cookie Policy. Create Account Already have an account ?Log in Continue with Google or Username or Email Password Institution / Organization Sign Up Please enter your email address or userHandle. Back to Login Reset Password
4170
https://akuli.github.io/math-derivations/plane-geometry/inscribed-circle.html
Inscribed Circle - Math Derivations Front page- [x] Equations and functions Inverse functionsHow solving equations worksStrictly increasing/decreasing functionsHow solving inequalities works [x] Vectors [x] Dot product ProjectionAngle between vectorsi→'s with i→'s, j→'s with j→'s [x] Cross product Definition [x] Discrete math Sum formulasBinomial coefficients [x] Plane geometry [x] Circle Inscribed angle theorem [x] Triangle Law of sinesLaw of cosinesInscribed circle [x] Analytic plane geometry [x] Transforming curves ReflectingShiftingStretching [x] Line Equation in normal formDistance between line and pointEquation with slopeEquation from known slope and pointAngle between linesSlope and tanEquation with determinant [x] Parabola Equation of parabola [x] Hyperbola Why is y=1 x a hyperbola? [x] Calculus [x] Limits "Definition" by plugging in numbersDefinition of limitUniquenessLimit of sumLimit of productLimit of differenceLimit of divisionOne-sided limitsInequality and limitLimit of vector [x] Continuity Definitions of continuityContinuity properties [x] Derivative Definition of derivativeNotation for derivativesPower rule, part 1Basic derivative rulesChain rulePower rule, part 2Product rule and quotient ruleDerivative of vectorDerivatives of sin, cos and tan [x] Integral Introduction to integralsRefinement of partitionDefining the integralAverageFundamental theorem of calculus, part 1Fundamental theorem of calculus, part 2More notation for integralsIntegral rulesU substitutionVolume of solid of revolutionArea of surface of revolution [x] Complex numbers IntroductionAngle and lengthMultiplicationDivisionSquare rootDerivativeExponent function [x] Linear algebra [x] Vectors and matrices Introduction (rotating a vector)Matrix times vectorMatrix times matrixMatrix plus matrixMatrix times numberDefining span and linear (in)dependenceFinding span and checking linear (in)dependenceInverse matricesTransposeFinding inverse matrices2×2 inverse formula [x] Determinants Defining determinantsPermutations and transpositionsCalculating determinants with row operationsDeterminant of transposeDeterminant and matrix multiplication [x] Subspace and basis Defining subspaces and comparing to spansBasis Inscribed Circle¶ As a part of this derivation, we got a formula for the radius of a circle drawn around a triangle. In this derivation, we will find a formula for a circle drawn inside a triangle. Consider any triangle with any side lengths a, b and c, and draw a circle inside it so that it touches each side as in the picture below. A circle like this is called the inscribed circle of the triangle. Our goal is to find its radius r. Let's split the triangle into 3 smaller triangles by connecting the corners to the center of the circle: Because the radius r is perpendicular to the side with length a, the area of the green part is a r/2. Areas of the other parts are similarly b r/2 and c r/2. Letting A denote the area of the whole triangle, we get A=a r 2+b r 2+c r 2=(a+b+c)r 2. Multiplying both sides by 2 and dividing by a+b+c gives the following result. Consider any triangle. Let a, b and c denote its side lengths, let A denote its area, and let r denote the radius of the inscribed circle. Then r=2 A a+b+c.
4171
http://www.stat.ucla.edu/~vlew/stat11/FA01/lectures/fa011118.pdf
Statistics M11/Economics 40 Lew Chapter 9.1 Chapter 9.1 – Inference for Two-Way Tables Introduction • The methods introduced in this chapter allow us to compare scenarios when the categorical data implies more than two proportions – more than two “p”s. • A single statistical test will handle two different scenarios: • Comparing two or more populations when the response variable has two or more possible values. • Testing to see if two categorical variables are independent. (9.2 optional) • Will use the methods for summarizing categorical data (two-way tables, marginal distributions, conditional distributions) Inference for Two-Way Tables • Categorical Variables (optional 2.6) These are inherently qualitative variables OR quantitative variables that have been grouped into categories. The analysis of categorical variables uses counts (frequencies) or percentages. • The two-way table To summarize the relationship between two categorical variables, we construct a two-way table. The size of the table is given by the notation r x c where r is the number of rows and c is the number of columns. Each row defines a possible value for the first categorical variable, and each column defines a possible value for the second categorical value. A two-way table with r rows and c columns has r x c cells. See Example 9.3, a 4 x 2 table for gender and athletic goals. • Describing relations in two-way tables Use the table to calculate marginal distributions, joint distributions and conditional distributions. See Example 9.4. A marginal distribution is the distribution of the row variable alone or of the column variable alone. Sometimes referred to as the "marginals" because they are the information at the margins of a table. The conditional distribution is the distribution of one row against all the columns or one column against all of the rows. It is conditional because one is looking at a single "condition". The joint distribution involves examining a specific row value with a specific column value simultaneously, it just the pairing of values. • The (null) hypothesis: no association The null hypothesis – a statement conveying that there is “nothing going on” – for two-way table inference is that there is no association between the row and column variables. The alternative hypothesis – a statement conveying what must be true if Statistics M11/Economics 40 Lew Chapter 9.1 the null is not true – for two-way table inference is that there is an association between the two variables. Note that this form of the alternative hypothesis does not imply any particular direction for the association, just that the association exists. As it states in the text, “[w]e cannot describe Ha [the alternative hypothesis] as either one-sided or two-sided, because it includes all of the many kinds of association that are possible.” (IPS, p. 628) • Expected cell counts In order to see if there is an association between the two variables, we will first re-calculate the table reflecting what we would expect to be true assuming no association exists. This means calculating the expected cell counts. We will then use these expected cells counts to calculate a test statistic, which will compare these expected cell counts against the actual cell counts. We will use this test statistic answer to judge how different these two sets of counts are. If there is a “big” difference [as with the other significance tests, we’ll be using what we know about the probability distribution for the test statistic to define how big “big” is], then we can say that there is evidence that an association exists. If there is not a “big” difference, then we will conclude that there is not sufficient evidence to say that an association exists. How do we calculate these expected cell counts? We will use the marginal distributions for one of the variables and apply them to the row (or column) totals of the other variable, using this formula: expected cell count = n total column total row × where n is the total number of observations for the table. • The chi-square test The test statistic we will use for this inference exercise is the chi-square statistic, X 2, where ∑ − = count expected ) count expected count observed ( 2 2 X Statistics M11/Economics 40 Lew Chapter 9.1 As we stated above, in order to use this test statistic, we need to know its probability distribution. This test statistic is related to the binomial approximation we used in Chapter 8, but if the null hypothesis is true, it has its own approximate distribution, called the chi-square distribution, which we denote using the Greek symbol for chi: χ2. As was the case the with Student’s t distribution, the chi-square distribution is actually a family of distributions, each completely specified by its degrees of freedom, which is equal to (r – 1)(c – 1). Note that chi-square distributions are different from the distributions we have used thus far in that all chi-square values are always positive (the square of any real number is always positive) and the distributions are always skewed to the right. See Figure 9.3 (below): Chi-Square Test for Two-Way Tables Chi-Square tests for two-way tables always have the following null and alternative hypotheses (or some version thereof): H0: There is no relationship between the two variables being examined. (This is often shorten to the statement, “The variables are not related.”) Ha: There is a relationship between the two variables being examined. (This is often shorten to the statement, “The variables are related.”) If H0 is true, the chi-square test statistic X 2 has approximately a χ 2 distribution with (r – 1)(c – 1) degrees of freedom. The P-value for the chi-square test is P(χ 2 ≥ X 2) where X 2 is a random variable having the χ2(df) distribution with df = (r – 1)(c – 1). You can safely use the chi-square test with critical values from the chi-square distribution when all expected cell counts are ≥ 1, and no more than 20% of the expected cell counts are < 5. For a 2 x 2 table, all four expected cell counts should be ≥ 5. Statistics M11/Economics 40 Lew Chapter 9.1 • The chi-square test and the z test for two proportions Note that the data used for a z test for two proportions can be summarized as a 2 x 2 table. Thus we can compare these two population proportions either using the z test (from Section 8.2) or using the chi-square test above. As the test states, “…these tests always give the same result, because the chi-square statistic is equal to the square of the z statistic, and the χ 2(1) critical values are equal to the squares of the corresponding N(0,1) critical values. … The advantage of the z test is that we can test either one-sided or two-sided alternatives. The chi-square test always tests the two-sided alternative.” (IPS, p. 632; italics used in the original) Æ You can only use the z test when you have a 2 x 2 table – if the table is larger, e.g. 2 x 3, 3 x 4, you must use a chi-square test.
4172
https://www.reddit.com/r/puzzles/comments/1gypkjg/you_have_a_cube_a_beautiful_logic_puzzle/
You have a cube. A beautiful logic puzzle. : r/puzzles Skip to main contentYou have a cube. A beautiful logic puzzle. : r/puzzles Open menu Open navigationGo to Reddit Home r/puzzles A chip A close button Log InLog in to Reddit Expand user menu Open settings menu Go to puzzles r/puzzles r/puzzles The place for all kinds of puzzles including puzzle games. Self-promotion is allowed in the stickied "Promo Weekly" post. 427K Members Online •10 mo. ago scischt You have a cube. A beautiful logic puzzle. [SOLVED] You have a universally white cube. You paint the outside of the cube black. You cut the cube into 3x3x3 so that there are 27 cubes. You disassemble the cube and put all 27 cubes into a bag. At random, a cube is selected from the bag and randomly placed on the table in front of you. You can only see five sides of this small cube and cannot see the underside. The five sides that you see are all white. What is the chance that the underside is black? Read more Share Related Answers Section Related Answers Challenging logic puzzles for beginners Math-based puzzles with elegant solutions Creative mechanical puzzle designs Strategies for solving complex mazes History of famous puzzle inventors New to Reddit? Create your account and connect with a world of communities. Continue with Google Continue with Google. Opens in new tab Continue with Email Continue With Phone Number By continuing, you agree to ourUser Agreementand acknowledge that you understand thePrivacy Policy. Public Anyone can view, post, and comment to this community 0 0 Top Posts Reddit reReddit: Top posts of November 24, 2024 Reddit reReddit: Top posts of November 2024 Reddit reReddit: Top posts of 2024 Reddit RulesPrivacy PolicyUser AgreementAccessibilityReddit, Inc. © 2025. All rights reserved. Expand Navigation Collapse Navigation
4173
https://www.quora.com/How-do-you-create-a-probability-distribution-of-rolling-two-dice-where-the-random-variable-x-is-the-sum-of-the-dice
Something went wrong. Wait a moment and try again. Discrete Probability Dist... Game of Dice Random Numbers Probability Concept Mathematics Probability Random Variable Probability (statistics) 5 How do you create a probability distribution of rolling two dice, where the random variable x is the sum of the dice? Sushant Kala M.Sc in Mathematics, Indian Institute of Technology Ropar (IITRPR) (Graduated 2020) · 4y The sample space for your experiment is S={(m,n):m,n∈Zand1≤m,n≤6}. A random variable associated with an experiment is a real-valued function X on the sample space S. Here, X(m,n)=m+n taking values from 2 to 12. We then say X is a random variable on S, taking values 2,3,4,….,12 and by P(X=k) we mean P(X^{-1}(k)), where X^{-1}(k) contain those (m,n) whose sum is k. (It is generally probability of getting sum k.) Now we know for a finite sample space P(X=k)=#X^{-1}(k)/#S, from this you will get all the probabilities by counting cardinality of these sets. (See the picture: from Wikipedia) The probabili The sample space for your experiment is S={(m,n):m,n∈Zand1≤m,n≤6}. A random variable associated with an experiment is a real-valued function X on the sample space S. Here, X(m,n)=m+n taking values from 2 to 12. We then say X is a random variable on S, taking values 2,3,4,….,12 and by P(X=k) we mean P(X^{-1}(k)), where X^{-1}(k) contain those (m,n) whose sum is k. (It is generally probability of getting sum k.) Now we know for a finite sample space P(X=k)=#X^{-1}(k)/#S, from this you will get all the probabilities by counting cardinality of these sets. (See the picture: from Wikipedia) The probability distribution of a discrete random variable is generally a function, mapping values of a random variable to their respective probabilities. Defining, f: X → [0,1] such that f(k) = P(X=k). Note: here domain of f is values taken by random variable X. The formula for expectation is given by, E(X)=∑k∈X k.P(X=k) Related questions Two dice are rolled. Let X be a random variable denoting the sum of the numbers on the two dice. What is the probability distribution of X? What is its expected value? What is the probability distribution of X if you roll two fair dice and let X denote the sum if the score obtained on the two dice? What is the probability of rolling two dice? In a single throw of two dice, what is the probability of getting a sum of 9? What is the probability of rolling a sum of 8 with two fair dice? Steven Smith Earned 98% or higher in all my math classes at UCMO. · Author has 3.4K answers and 9.1M answer views · 8y Originally Answered: What is the formula for the probability of rolling two dice with a sum of x? · If x≤6, this can be done simply using stars and bars. Stars and bars (combinatorics) - Wikipedia You have x pips to place onto 2 dice, where each die must have from 1 to 6 pips. First, you can place the minimum required pips, 1 on each die, which would be 2. That leaves you with x−2 pips that can be placed randomly. There are 2 dice the pips can be placed on, to separate those we need 1 bar. The pips will be the stars. Using the stars and bars algorithm, that means there are ((x−2)+11)=x−1 ways to place the remaining pips. There are 6⋅6=36 possible results of rolling 2 dice, so If x≤6, this can be done simply using stars and bars. Stars and bars (combinatorics) - Wikipedia You have x pips to place onto 2 dice, where each die must have from 1 to 6 pips. First, you can place the minimum required pips, 1 on each die, which would be 2. That leaves you with x−2 pips that can be placed randomly. There are 2 dice the pips can be placed on, to separate those we need 1 bar. The pips will be the stars. Using the stars and bars algorithm, that means there are ((x−2)+11)=x−1 ways to place the remaining pips. There are 6⋅6=36 possible results of rolling 2 dice, so that gives us a probability of: x−136 Next we need to determine the probability for 7–12. There are 2 ways of doing this, subtracting the counts that are 7 or above, or taking advantage of symmetry. I like symmetry, so I will use that method. There is only 1 way to roll 2, double 1s. There is only 1 way to roll 12, double 6s. There are 2 ways to roll 3, 1 and 2, 2 and 1. There are 2 ways to roll 11, 5 and 6, 6 and 5. This symmetry continues. Therefore, P(X=x)=P(X=(14−x)) Plugging this into the earlier solution: (14−x)−136=13−x36 That gives this solution: pX(x)=⎧⎪ ⎪ ⎪ ⎪⎨⎪ ⎪ ⎪ ⎪⎩x−136for x=1,2,3,4,5,613−x36for x=7,8,9,10,11,120otherwise The other way is this: That method can be expanded for larger numbers of dice as well. Assistant Bot · 1y To create a probability distribution for the random variable , which represents the sum of the values when rolling two six-sided dice, follow these steps: Step 1: Identify the Possible Outcomes When rolling two dice, each die has 6 faces, leading to a total of possible outcomes. Each outcome can be represented as an ordered pair , where is the result of the first die and is the result of the second die. Step 2: Determine the Sums The possible sums can range from 2 (when both dice show 1) to 12 (when both dice show 6). Here are the possible sums and how they can To create a probability distribution for the random variable , which represents the sum of the values when rolling two six-sided dice, follow these steps: Step 1: Identify the Possible Outcomes When rolling two dice, each die has 6 faces, leading to a total of possible outcomes. Each outcome can be represented as an ordered pair , where is the result of the first die and is the result of the second die. Step 2: Determine the Sums The possible sums can range from 2 (when both dice show 1) to 12 (when both dice show 6). Here are the possible sums and how they can be obtained: Sum = 2: (1, 1) → 1 way Sum = 3: (1, 2), (2, 1) → 2 ways Sum = 4: (1, 3), (2, 2), (3, 1) → 3 ways Sum = 5: (1, 4), (2, 3), (3, 2), (4, 1) → 4 ways Sum = 6: (1, 5), (2, 4), (3, 3), (4, 2), (5, 1) → 5 ways Sum = 7: (1, 6), (2, 5), (3, 4), (4, 3), (5, 2), (6, 1) → 6 ways Sum = 8: (2, 6), (3, 5), (4, 4), (5, 3), (6, 2) → 5 ways Sum = 9: (3, 6), (4, 5), (5, 4), (6, 3) → 4 ways Sum = 10: (4, 6), (5, 5), (6, 4) → 3 ways Sum = 11: (5, 6), (6, 5) → 2 ways Sum = 12: (6, 6) → 1 way Step 3: Count the Ways for Each Sum Summarizing the counts of ways to achieve each sum: | Sum (x) | Number of Ways | ----------------| | 2 | 1 | | 3 | 2 | | 4 | 3 | | 5 | 4 | | 6 | 5 | | 7 | 6 | | 8 | 5 | | 9 | 4 | | 10 | 3 | | 11 | 2 | | 12 | 1 | Step 4: Calculate the Probability for Each Sum To find the probability of each sum, divide the number of ways to achieve that sum by the total number of outcomes (36): Step 5: Create the Probability Distribution Table Now, we can construct the probability distribution: | Sum (x) | Number of Ways | Probability | ---------------- | 2 | 1 | | | 3 | 2 | | | 4 | 3 | | | 5 | 4 | | | 6 | 5 | | | 7 | 6 | | | 8 | 5 | | | 9 | 4 | | | 10 | 3 | | | 11 | 2 | | | 12 | 1 | | Conclusion This table represents the probability distribution of the sum of two dice rolls, showing the likelihood of each possible sum occurring. Traruh Synred Ph.D. in Particle Physics, University of Illinois at Urbana-Champaign (Graduated 1974) · Author has 16.2K answers and 3M answer views · 3y It simple. Just count the number combinations that give a given su... Related questions What is the probability of rolling a multiple of two with two dice? Using the sample space for rolling two dice, what is a probability distribution for the random variable X representing the sum of the numbers that appear? What is the formula for the probability of rolling two dice with a sum of x? What is the probability of having a sum to be at most 7 after rolling 3 dice? What is the probability of rolling a double (both dice have the same number) given the sum of the 2 dice is 4? Fred Oberlander Graduate Degrees Compsci, Math, Stat, Finance, Law · Author has 1.9K answers and 483.4K answer views · Updated 3y Originally Answered: Using the sample space for rolling two dice, what is a probability distribution for the random variable X representing the sum of the numbers that appear? · it is the discrete distribution you know perfectly well which has values from 1 to 12 with the most likely result a 7 which can occur any of 6 ways so is 6/12 and the others symmetric about that mean and median. EDIT: my bad. the SPACE is 1 to 12 however it contains “duplicates” meaning there are 36 actual outcomes tho there are only 12 distinct values. You asked for the SPACE in terms of the totals not the results, big difference. Think of it this way. The domain of possible results is 1,…,12. The number of EVENTS that can occur that are not identical is 36. Thus the chance of getting a 7 is 6/ it is the discrete distribution you know perfectly well which has values from 1 to 12 with the most likely result a 7 which can occur any of 6 ways so is 6/12 and the others symmetric about that mean and median. EDIT: my bad. the SPACE is 1 to 12 however it contains “duplicates” meaning there are 36 actual outcomes tho there are only 12 distinct values. You asked for the SPACE in terms of the totals not the results, big difference. Think of it this way. The domain of possible results is 1,…,12. The number of EVENTS that can occur that are not identical is 36. Thus the chance of getting a 7 is 6/36 not 6/12. Obviously I knew that I mean I have played dice and have known it since I was 8. My apologies. Promoted by The Penny Hoarder Lisa Dawson Finance Writer at The Penny Hoarder · Updated Sep 16 What's some brutally honest advice that everyone should know? Here’s the thing: I wish I had known these money secrets sooner. They’ve helped so many people save hundreds, secure their family’s future, and grow their bank accounts—myself included. And honestly? Putting them to use was way easier than I expected. I bet you can knock out at least three or four of these right now—yes, even from your phone. Don’t wait like I did. Cancel Your Car Insurance You might not even realize it, but your car insurance company is probably overcharging you. In fact, they’re kind of counting on you not noticing. Luckily, this problem is easy to fix. Don’t waste your time Here’s the thing: I wish I had known these money secrets sooner. They’ve helped so many people save hundreds, secure their family’s future, and grow their bank accounts—myself included. And honestly? Putting them to use was way easier than I expected. I bet you can knock out at least three or four of these right now—yes, even from your phone. Don’t wait like I did. Cancel Your Car Insurance You might not even realize it, but your car insurance company is probably overcharging you. In fact, they’re kind of counting on you not noticing. Luckily, this problem is easy to fix. Don’t waste your time browsing insurance sites for a better deal. A company calledInsurify shows you all your options at once — people who do this save up to $996 per year. If you tell them a bit about yourself and your vehicle, they’ll send you personalized quotes so you can compare them and find the best one for you. Tired of overpaying for car insurance? It takes just five minutes to compare your options with Insurify andsee how much you could save on car insurance. Ask This Company to Get a Big Chunk of Your Debt Forgiven A company calledNational Debt Relief could convince your lenders to simply get rid of a big chunk of what you owe. No bankruptcy, no loans — you don’t even need to have good credit. If you owe at least $10,000 in unsecured debt (credit card debt, personal loans, medical bills, etc.), National Debt Relief’s experts will build you a monthly payment plan. As your payments add up, they negotiate with your creditors to reduce the amount you owe. You then pay off the rest in a lump sum. On average, you could become debt-free within 24 to 48 months. It takes less than a minute to sign up and see how much debt you could get rid of. Set Up Direct Deposit — Pocket $300 When you set up direct deposit withSoFi Checking and Savings (Member FDIC), they’ll put up to $300 straight into your account. No… really. Just a nice little bonus for making a smart switch. Why switch? With SoFi, you can earn up to 3.80% APY on savings and 0.50% on checking, plus a 0.20% APY boost for your first 6 months when you set up direct deposit or keep $5K in your account. That’s up to 4.00% APY total. Way better than letting your balance chill at 0.40% APY. There’s no fees. No gotchas.Make the move to SoFi and get paid to upgrade your finances. You Can Become a Real Estate Investor for as Little as $10 Take a look at some of the world’s wealthiest people. What do they have in common? Many invest in large private real estate deals. And here’s the thing: There’s no reason you can’t, too — for as little as $10. An investment called the Fundrise Flagship Fund lets you get started in the world of real estate by giving you access to a low-cost, diversified portfolio of private real estate. The best part? You don’t have to be the landlord. The Flagship Fund does all the heavy lifting. With an initial investment as low as $10, your money will be invested in the Fund, which already owns more than $1 billion worth of real estate around the country, from apartment complexes to the thriving housing rental market to larger last-mile e-commerce logistics centers. Want to invest more? Many investors choose to invest $1,000 or more. This is a Fund that can fit any type of investor’s needs. Once invested, you can track your performance from your phone and watch as properties are acquired, improved, and operated. As properties generate cash flow, you could earn money through quarterly dividend payments. And over time, you could earn money off the potential appreciation of the properties. So if you want to get started in the world of real-estate investing, it takes just a few minutes tosign up and create an account with the Fundrise Flagship Fund. This is a paid advertisement. Carefully consider the investment objectives, risks, charges and expenses of the Fundrise Real Estate Fund before investing. This and other information can be found in the Fund’s prospectus. Read them carefully before investing. Cut Your Phone Bill to $15/Month Want a full year of doomscrolling, streaming, and “you still there?” texts, without the bloated price tag? Right now, Mint Mobile is offering unlimited talk, text, and data for just $15/month when you sign up for a 12-month plan. Not ready for a whole year-long thing? Mint’s 3-month plans (including unlimited) are also just $15/month, so you can test the waters commitment-free. It’s BYOE (bring your own everything), which means you keep your phone, your number, and your dignity. Plus, you’ll get perks like free mobile hotspot, scam call screening, and coverage on the nation’s largest 5G network. Snag Mint Mobile’s $15 unlimited deal before it’s gone. Get Up to $50,000 From This Company Need a little extra cash to pay off credit card debt, remodel your house or to buy a big purchase? We found a company willing to help. Here’s how it works: If your credit score is at least 620, AmONE can help you borrow up to $50,000 (no collateral needed) with fixed rates starting at 6.40% and terms from 6 to 144 months. AmONE won’t make you stand in line or call a bank. And if you’re worried you won’t qualify, it’s free tocheck online. It takes just two minutes, and it could save you thousands of dollars. Totally worth it. Get Paid $225/Month While Watching Movie Previews If we told you that you could get paid while watching videos on your computer, you’d probably laugh. It’s too good to be true, right? But we’re serious. By signing up for a free account with InboxDollars, you could add up to $225 a month to your pocket. They’ll send you short surveys every day, which you can fill out while you watch someone bake brownies or catch up on the latest Kardashian drama. No, InboxDollars won’t replace your full-time job, but it’s something easy you can do while you’re already on the couch tonight, wasting time on your phone. Unlike other sites, InboxDollars pays you in cash — no points or gift cards. It’s already paid its users more than $56 million. Signing up takes about one minute, and you’ll immediately receive a $5 bonus to get you started. Earn $1000/Month by Reviewing Games and Products You Love Okay, real talk—everything is crazy expensive right now, and let’s be honest, we could all use a little extra cash. But who has time for a second job? Here’s the good news. You’re already playing games on your phone to kill time, relax, or just zone out. So why not make some extra cash while you’re at it? WithKashKick, you can actually get paid to play. No weird surveys, no endless ads, just real money for playing games you’d probably be playing anyway. Some people are even making over $1,000 a month just doing this! Oh, and here’s a little pro tip: If you wanna cash out even faster, spending $2 on an in-app purchase to skip levels can help you hit your first $50+ payout way quicker. Once you’ve got $10, you can cash out instantly through PayPal—no waiting around, just straight-up money in your account. Seriously, you’re already playing—might as well make some money while you’re at it.Sign up for KashKick and start earning now! Bill Bell Former Software Developer (1972–2010) · Author has 2.1K answers and 1.2M answer views · 4y Originally Answered: Using the sample space for rolling two dice, what is a probability distribution for the random variable X representing the sum of the numbers that appear? · Draw a six by six table for yourself where the columns represent the possible outcomes for one die and the rows represent the outcomes for the other die. There will be thirty-six cells in the table, all equally likely. You can calculate the probability of each. In each cell put the sum of the value for row die and the column die. You can now look through the table and see that some of the sums occur once, some twice, some three times, and so on. You can now summarise this information in the form of a distribution: a sum of one has a probability equal to the number of cells in which this sum appear Draw a six by six table for yourself where the columns represent the possible outcomes for one die and the rows represent the outcomes for the other die. There will be thirty-six cells in the table, all equally likely. You can calculate the probability of each. In each cell put the sum of the value for row die and the column die. You can now look through the table and see that some of the sums occur once, some twice, some three times, and so on. You can now summarise this information in the form of a distribution: a sum of one has a probability equal to the number of cells in which this sum appears multiplied by the probability represented by one cell. Just keep going. Mario Luis Iovaldi MD, Surgeon, not Statistician. Argentina · Author has 2.9K answers and 965.3K answer views · 3y In R: the tab and the plot tab x frequency prob.x [1,] 2 1 0.02777778 [2,] 3 2 0.05555556 [3,] 4 3 0.08333333 [4,] 5 4 0.11111111 [5,] 6 5 0.13888889 [6,] 7 6 0.16666667 [7,] 8 5 0.13888889 [8,] 9 4 0.11111111 [9,] 10 3 0.08333333 [10,] 11 2 0.05555556 [11,] 12 1 0.02777778 plot(tab, type ="h", col= "red", lwd = 4) In R: the tab and the plot tab x frequency prob.x [1,] 2 1 0.02777778 [2,] 3 2 0.05555556 [3,] 4 3 0.08333333 [4,] 5 4 0.11111111 [5,] 6 5 0.13888889 [6,] 7 6 0.16666667 [7,] 8 5 0.13888889 [8,] 9 4 0.11111111 [9,] 10 3 0.08333333 [10,] 11 2 0.05555556 [11,] 12 1 0.02777778 plot(tab, type ="h", col= "red", lwd = 4) Promoted by US Auto Insurance Now US Auto Insurance Now Helping Drivers Find Great Car Insurance Deals · Tue How do I find a cheap car insurance if I am a new young driver? Do I need to call each insurance and ask? When you're a new driver, that first insurance quote can feel like a punch to the gut. The rates often seem astronomical, and it's easy to feel like you're being priced out of something that's a necessity. This happens because insurance companies view new drivers as high-risk, given their lack of an established driving history. It's frustrating, but with the right strategy, you can find a policy that's both fair and affordable. The biggest mistake new drivers make is accepting the first quote they get. Not all insurance companies calculate risk the same way. What one company considers a high-ri When you're a new driver, that first insurance quote can feel like a punch to the gut. The rates often seem astronomical, and it's easy to feel like you're being priced out of something that's a necessity. This happens because insurance companies view new drivers as high-risk, given their lack of an established driving history. It's frustrating, but with the right strategy, you can find a policy that's both fair and affordable. The biggest mistake new drivers make is accepting the first quote they get. Not all insurance companies calculate risk the same way. What one company considers a high-risk factor, another might offer a discount for. Some insurers have specific programs tailored to young drivers, rewarding them for things like good grades, taking a defensive driving course, or even using a telematics device to track safe driving habits. The challenge is finding which companies offer these savings. That's where an online tool like this one becomes your best friend. This platform is specifically designed to help you navigate this complex landscape. Instead of spending hours on the phone or a dozen different websites, you simply enter your information once. From there, it shows you competitive quotes from a wide network of insurers, including those that might be more favorable to new or young drivers. This allows you to easily compare options and find hidden discounts you might have otherwise missed. Using a platform that compares insurance quotes for you is an essential first step in your search for a budget-friendly policy. It empowers you to see all your options in one place, ensuring you don't pay more than you have to for the coverage you need. Rachel Townsend ssa in Business Management, Northeast State Technical Community College (Graduated 2023) · 3y Originally Answered: What is the formula for the probability of rolling two dice with a sum of x? · This means the smallest # is 1, the largest # is 6, and there are 2 dice. When you press Enter, you will get the two numbers rolled on the dice. Keep pressing enter to get additional rolls) 1) Roll 2 dice 50 times each, and record the #’s on each die in a chart. It will look like this: 3, 5 4,1 2,3 You will have 50 blocks where you record your numbers that are rolled (this is just an example) 2) Make a Probability distribution for the SUM of the numbers in each block that you recorded from your rolls of the dice (It will look like: X = sum P(x) = # of times that # occurred/50 (Note: The sum co This means the smallest # is 1, the largest # is 6, and there are 2 dice. When you press Enter, you will get the two numbers rolled on the dice. Keep pressing enter to get additional rolls) 1) Roll 2 dice 50 times each, and record the #’s on each die in a chart. It will look like this: 3, 5 4,1 2,3 You will have 50 blocks where you record your numbers that are rolled (this is just an example) 2) Make a Probability distribution for the SUM of the numbers in each block that you recorded from your rolls of the dice (It will look like: X = sum P(x) = # of times that # occurred/50 (Note: The sum comes from each block or rolls. For instance, my sums above are: 3+5=8; 4+1=5; 2+3=5 Yours will be different. I will only list the 5 one time, even though it occurred more than once) 3) Make another Probability Distribution for SUM of the numbers in each block that you would EXPECT to occur using Classical Probability. (this is not based on your rolls, but what should happen) (It will look like: X=sum P(x) = the probability of that sum occurring 4) From #2, find: a. Mean = _________________ b. Standard Deviation = ________________ c. Variance = ___________________ 5) From #3, find: a. Mean = _________________ b. Standard Deviation = ________________ c. Variance = ___________________ 6) Describe how close your probability calculations from #2 are to the expected probability calculations in #3: 7) Why would we expect the probabilities to be different in #2 and #3, and what could we do to make the probabilities equal in #2 and #3? Bernard Montaron Studied Mathematics & Counting (Combinatorics) at Pierre and Marie Curie University (Graduated 1980) · Author has 3.2K answers and 2.1M answer views · 4y Originally Answered: Two dice are rolled. Let X be a random variable denoting the sum of the numbers totaling on the two dice. What is the probability distribution of X? What are the expected value of X and its variance? · The range for [math]X[/math] is 2 to 12. [math]X=2[/math] only if the two dices are (1,1) and the probability for this is math^2=1/36[/math]. In a similar way [math]X=12[/math] only if the two dices are (6,6) and the probability for this is also [math]1/36[/math]. If [math]X=(2+12)/2=7[/math] there are 6 possible dice combinations: (1,6),(6,1),(2,5)(5,2),(3,4),(4,3) giving a probability [math]6/36=1/6[/math] for [math]X=7[/math]. You can do this for all possible values of [math]X[/math], this is summarized in the table below. As you can observe, the distribution has the shape of a triangle, and it is symmetrical. The range for [math]X[/math] is 2 to 12. [math]X=2[/math] only if the two dices are (1,1) and the probability for this is math^2=1/36[/math]. In a similar way [math]X=12[/math] only if the two dices are (6,6) and the probability for this is also [math]1/36[/math]. If [math]X=(2+12)/2=7[/math] there are 6 possible dice combinations: (1,6),(6,1),(2,5)(5,2),(3,4),(4,3) giving a probability [math]6/36=1/6[/math] for [math]X=7[/math]. You can do this for all possible values of [math]X[/math], this is summarized in the table below. As you can observe, the distribution has the shape of a triangle, and it is symmetrical. Sponsored by Grammarly Is your writing working as hard as your ideas? Grammarly’s AI brings research, clarity, and structure—so your writing gets sharper with every step. Harry Kanigel Former Software Engineer & IT Officer (Ret) at UBS, Schwab, Metallgesellschaft · Author has 126 answers and 105.3K answer views · 3y First construct a 6 x 6 grid showing all 36 ways that two dice can express a sum. The diagonals of this grid show the incidences of each total. So, e.g., the longest diagonal shows six occurrences of the value 7. The second-to-longest diagonal shows five occurrences of the value 6. And so on (the values 12 and 2 each have only one occurrence). The values could be rearranged into a normal curve where 7 has the tallest bar (centered) and 2 has a short bar on the left hand side and 12 has a short bar on the right hand side. Manie, Ph.D. Applied Scientist at Amazon · Author has 550 answers and 651.6K answer views · 4y First, let [math]X_1[/math] be the outcome for the first dice, [math]X_2[/math] be the outcome for the second dice. Then we are looking for the distribution of [math]X_1 + X_2[/math]. For example: [math]P(X_1 + X_2 = 1) = 0[/math] [math]P(X_1 + X_2 = 2) = \dfrac{1}{36}[/math] The table simulated in R will be like this: [code]Prob<- matrix(c(0,1/36,2/36,3/36,4/36,5/36,6/36,5/36,4/36,3/36,2/36,1/36),nrow=12,byrow = FALSE) colnames(Prob)<- c("P... Ian Rayner I use statistics daily to build hedge fund portfolios. · Author has 390 answers and 442.1K answer views · 4y Originally Answered: Construct the discrete probability distribution table for random variable X, which would be the sum of 2 rolled dice? · This is straightforward if you understand the connection between a frequency table and a probability table. Your question asks for a probability table. This means a list of the probabilities of getting each of the (discrete) possible outcomes from rolling 2 dice and summing their result. A frequency table is a list of the counts of the ways of getting each of the outcomes. To translate from frequency to probability, we simply divide each frequency by the total count of all the frequencies. At first glance, it might seem silly to think about the frequencies. After all, the only possibilities from This is straightforward if you understand the connection between a frequency table and a probability table. Your question asks for a probability table. This means a list of the probabilities of getting each of the (discrete) possible outcomes from rolling 2 dice and summing their result. A frequency table is a list of the counts of the ways of getting each of the outcomes. To translate from frequency to probability, we simply divide each frequency by the total count of all the frequencies. At first glance, it might seem silly to think about the frequencies. After all, the only possibilities from 2 dice are 2, 3, 4, …, 12. But then you notice you can only get 2 one way: 1 + 1, but you can get 5 several different ways: 1 + 4, 2 + 3, 3 + 2, 4 + 1. So, make a list of the numbers from 2 to 12, and for each count the different ways you can get each number from 2 dice. Remember to count both 2+3 and 3+2. I think I have given you enough to answer the question! Remember to do a reality check once you have constructed your frequency table: how many different possible outcomes are there from rolling 2 six-sided dice? The total of all the frequencies in your table should equal this number. Partha Chattopadhyay Taught while teaching and still practicing · Upvoted by Maria Soosai David , B Sc M Ed from Mathematics (1973) · Author has 4.7K answers and 7.5M answer views · 3y Let [math]x=y+z, y=1,2,3,4,5,6, z=1,2,...6,. x=2,3,...12[/math] & [math]\sum_{i=2}^{12}P(x=i)=1[/math] Related questions Two dice are rolled. Let X be a random variable denoting the sum of the numbers on the two dice. What is the probability distribution of X? What is its expected value? What is the probability distribution of X if you roll two fair dice and let X denote the sum if the score obtained on the two dice? What is the probability of rolling two dice? In a single throw of two dice, what is the probability of getting a sum of 9? What is the probability of rolling a sum of 8 with two fair dice? What is the probability of rolling a multiple of two with two dice? Using the sample space for rolling two dice, what is a probability distribution for the random variable X representing the sum of the numbers that appear? What is the formula for the probability of rolling two dice with a sum of x? What is the probability of having a sum to be at most 7 after rolling 3 dice? What is the probability of rolling a double (both dice have the same number) given the sum of the 2 dice is 4? Two fair six-sided dice are rolled. What is the probability that the sum of the two dice is seven? What is the probability distribution of rolling two dice until a 6 turns up? Two dice are thrown simultaneously. what is the probability for sum of the numbers showing up to be at least 6? What is the probability that the sum of two rolled dice is 13? What is the probability of rolling two dice and getting a sum greater than ten? About · Careers · Privacy · Terms · Contact · Languages · Your Ad Choices · Press · © Quora, Inc. 2025
4174
https://pmc.ncbi.nlm.nih.gov/articles/PMC3958523/
An official website of the United States government Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock ( Lock Locked padlock icon ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. Primary site navigation Logged in as: PERMALINK Reviewing the options for local estrogen treatment of vaginal atrophy Sarah H Lindahl Correspondence: Sarah H Lindahl, Sutter East Bay Medical Foundation, 20101 Lake Chabot Blvd, Castro Valley, CA 94546, USA, Tel +1 510 886 3400, Fax +1 510 581 6517, Email shlindobgyn@yahoo.com Collection date 2014. The full terms of the License are available at Non-commercial uses of the work are permitted without any further permission from Dove Medical Press Limited, provided the work is properly attributed. Abstract Background Vaginal atrophy is a chronic condition with symptoms that include vaginal dryness, pain during sex, itching, irritation, burning, and discharge, as well as various urinary problems. Up to 45% of postmenopausal women may be affected, but it often remains underreported and undertreated. This article aims to review the current recommendations for treatment of vaginal atrophy, and current data on the effectiveness and safety of local vaginal estrogen therapies. Methods Literature regarding vaginal atrophy (2007–2012) was retrieved from PubMed and summarized, with emphasis on data related to the treatment of vaginal atrophy with local vaginal estrogen therapy. Results Published data support the effectiveness and endometrial safety of low-dose local estrogen therapies. These results further support the general recommendation by the North American Menopause Society that a progestogen is not needed for endometrial protection in patients using low-dose local vaginal estrogen. Benefits of long-term therapy for vaginal atrophy include sustained relief of symptoms as well as physiological improvements (eg, decreased vaginal pH and increased blood flow, epithelial thickness, secretions). Conclusion Currently available local vaginal estrogen therapies are well tolerated and effective in relieving symptoms of vaginal atrophy. Recent data support the endometrial safety of low-dose regimens for up to 1 year. Keywords: menopause, estrogen, local estrogen therapy, vaginal atrophy Introduction Before menopause, estrogen stimulates the exfoliation of vaginal cells. As these cells exfoliate and die, they release large amounts of glycogen. This glycogen is hydrolyzed to glucose and lactobacillus converts the glucose to lactic acid, which helps maintain vaginal pH between 3.5 and 4.5.1 After menopause, with declining levels of estrogen, this pathway is less active, which may allow postmenopausal pH to increase to the range of 5.0–7.5.1 At these higher pH levels, lactobacillus survival is hindered, and vaginal colonization by other bacterial species predisposes women to symptomatic vaginal infection or urinary tract infection.2 Vaginal atrophy is a chronic condition resulting from a decline in estrogen in the urogenital tissues that affects up to 45% of postmenopausal women.3,4 Vaginal atrophy presents as thin, pale, and dry vaginal walls; reduced elasticity of vaginal tissue; loss of rugae; and a shortened and narrowed vagina. Symptoms include vaginal dryness, pain during sex, bleeding during intercourse/touching, itching, irritation, burning, and discharge, as well as various urinary problems, including increased frequency, urgency, incontinence, dysuria, and infection.2,5 These signs and symptoms can have an enormous impact on a patient’s well-being, especially in the context of sexual function.6 Lack of lubrication with sexual intercourse causes dyspareunia, which can lead to avoidance of healthy sexual activity and to further atrophy. A woman with vaginal atrophy may also experience bleeding with minimal trauma, such as during a medical examination or exercise. The lower urinary tract is also directly affected by decreased estrogen, as estrogen receptors are found throughout the epithelial tissues of the urethra, trigone, and bladder, and in some of the surrounding muscles and ligaments.7,8 Thinning of the urinary epithelium and weakening of the surrounding tissue may promote reduced urethral closure pressure, reduced sensory threshold in the bladder, and, in some cases, recurrent urinary tract infection.8 Typically, a diagnosis of vaginal atrophy can be made from clinical examination, with many women presenting with dry, glazed-looking vaginal epithelium; a thinning cervix; a loss of labial fat pad; or a vagina that has lost elasticity, has shortened, has narrowed, has become less distensible, and can be easily traumatized and irritated.5,9 Diagnosis may be further supported by pH or the vaginal maturation index (VMI), which indicates the relative proportion of parabasal cells, intermediate cells, and mature superficial cells of the vaginal squamous epithelium, and is calculated based the following formula: VMI =0.5(X2) + 1(X3), where X2=% intermediate cells and X3=% superficial cells.10 The VMI is 0%–49% in patients with an absent or low estrogenic effect, 50%–64% in patients with a moderate estrogenic effect, and 65%–100% in patients with a high estrogenic effect.10 While the vasomotor symptoms of menopause generally improve over time, vaginal symptoms usually worsen and do not improve without treatment.5 Women may attribute these changes to be a part of “normal aging” and may not be aware of safe and simple treatments. Only about 25% of women who experience symptoms of vaginal atrophy seek medical help.9 As vaginal infections should be part of the differential diagnosis,1 vaginal atrophy may be misdiagnosed by patients and providers as a vaginal infection caused by yeast or bacteria. Obtaining a thorough history and performing an examination should help to avoid misdiagnosis and delaying treatment in postmenopausal patients experiencing some or all of these symptoms. The goal of this article is to provide an overview of the current recommendations for treatment of vaginal atrophy, followed by a succinct review of the effectiveness and safety of local vaginal estrogen therapies. Methods PubMed was initially searched using the terms “vaginal” and “atrophy.” To find recent publications focused on the influence of estrogen in the lower urinary tract that may not have been located in the main search, the terms “urogenital,” “atrophy,” and “estrogen” were used. Relevant literature (restricted to works in English and published after January 1, 2007) was reviewed and summarized, with emphasis on data related to treatment with local vaginal estrogen therapy. In addition, references cited within the relevant literature sources identified in the literature search were reviewed for content related to estrogen therapy and considered for use as original data sources. Recommendations from the American Congress of Obstetricians and Gynecologists (ACOG) and the North American Menopause Society (NAMS) were also consulted. Recommendations for the treatment of vaginal atrophy According to NAMS, first-line treatment for vaginal atrophy should include nonhormonal vaginal lubricants and moisturizers, as well as continued sexual activity.5 Regular sexual activity helps maintain active blood flow to the vagina and helps produce vaginal lubrication. Moisturizers, such as Replens (Lil’ Drug Store Products, Inc., Cedar Rapids, IA, USA), are intended for regular use, while lubricants, such as K-Y (McNeil-PPC, Inc., Fort Washington, PA, USA) or Astroglide (BioFilm, Inc., Vista, CA, USA), are intended for use during sexual activity. Replens has been shown to increase vaginal moisture, fluid volume, and elasticity, while decreasing pH.11 In addition, Osphena (Shionogi Inc., Florham Park, NJ, USA), an estrogen agonist/antagonist, is an oral treatment for moderate to severe dyspareunia that was approved by the US Food and Drug Administration in February 2013.12 The Vaginal Health: Insights, Views and Attitudes (VIVA) survey was designed to assess the knowledge of vaginal atrophy in postmenopausal women with the goal of increasing awareness of vaginal atrophy, aiding in increasing physician-patient dialogue, and therefore allowing women to make better-informed treatment decisions.13 Among the 1,578 respondents who reported experiencing vaginal discomfort, 49% reported trying lubricating gels and creams; 22% reported not using any treatment.13 Although over-the-counter treatments may work for women with mild symptoms, they are often inadequate for women with moderate to severe symptoms. If nonhormonal options are not sufficient, ACOG has also noted that estrogen therapy, whether topical (local) or systemic, is an effective treatment for vaginal dryness or atrophic changes that impede sexual function.14 Although many systemic estrogen hormone products are approved for the prevention of osteoporosis and the treatment of moderate to severe vasomotor symptoms associated with menopause, there is a risk for deep vein thrombosis, pulmonary embolism, coronary heart disease, and endometrial and breast cancer.15–18 Long-term systemic hormone therapy is no longer recommended if considered solely for the treatment of vaginal atrophy, and therefore local vaginal estrogen therapy is advised.5 Low-dose, local vaginal estrogen therapy reduces the risk associated with long-term systemic estrogen exposure, and is effective and well tolerated in most women.5 Efficacy and safety of local vaginal estrogen treatment Four local vaginal estrogen treatments are available in the United States for the treatment of vaginal atrophy (two vaginal creams, one vaginal ring, and one vaginal tablet). They are well tolerated and considered equally effective by NAMS.5 In the VIVA survey, 13% of respondents who reported experiencing vaginal discomfort reported they had used vaginal hormone creams, 12% reported they had used vaginal hormone tablets, and 1% reported having used a vaginal hormone ring.13 Because vaginal estrogens fall into the general category of estrogen therapies, package inserts on local vaginal estrogen treatments carry the same warnings as systemic estrogens. The following sections aim to provide a concise review of the most recent and relevant data concerning the efficacy and safety of local vaginal estrogen treatments. Vaginal creams Two vaginal creams are available: Premarin19 (Wyeth Pharmaceuticals Inc., part of Pfizer, Inc., New York, NY, USA) and Estrace20 (Warner Chilcott [US], LLC, Rockaway, NJ, USA). Premarin vaginal cream contains 0.625 mg conjugated equine estrogens (CEE) per gram of cream. Its composition is unique in that it does not solely contain estradiol as the active ingredient. CEE cream contains a mixture of estrogenic compounds, predominantly estrone, equilin, 17 α-dihydroequilin, 17 α-estradiol, and 17 β-dihydroequilin.19 Recommended dosing is 0.5–2.0 g once daily for 21 days, followed by 7 days without treatment (repeated in a 28-day cycle) or 0.5 g twice weekly. In a randomized, placebo-controlled study, postmenopausal women with moderate to severe vaginal atrophy who received low-dose CEE cream (0.3 mg CEE, equivalent to 0.5 g Premarin vaginal cream) according to either the cyclic or the twice-weekly regimen exhibited improved VMI, improved vaginal pH, and improved most bothersome symptom scores, including those for dyspareunia, at week 12 of treatment.21 After the initial 12 weeks, open-label treatment was continued for 40 weeks, consistent with the patient’s prior regimen. Endometrial hyperplasia or carcinoma did not develop in any patients, based on 155 biopsy samples, and the CEE and placebo groups reported adverse events (AEs) of similar type and frequency. None of the serious AEs were considered related to the study drug. Estrace20 contains 0.1 mg estradiol per gram of cream and recommended dosing is 2–4 g daily for 1–2 weeks, a gradual reduction to half the initial dose over 1–2 weeks, and then 1 g 1–3 times weekly for maintenance. For the initial period of treatment, it is important to adhere to the medication schedule while waiting for a response. No randomized controlled trials have been performed, and no results of observational studies have been published in the past 10 years. Vaginal ring The Estring22 vaginal ring (Pharmacia and Upjohn Company, Division of Pfizer, Inc., New York, NY, USA) contains a 2 mg estradiol reservoir. When inserted into the upper third of the vagina, the ring releases approximately 7.5 μg per day for 90 days. In an open-label study, women using Estring for 12 months experienced an improvement in qualitative cytological evaluations (generally atrophic at baseline to proliferative [moderate estrogen effect] or highly proliferative [high estrogen effect] at week 48).23 Patient-reported symptoms and clinical signs on inspection improved greatly. The primary endpoint—endometrial safety—was assessed at baseline and at week 48 by ultrasound measurement of endometrial thickness and a progestogen challenge test.23 In women using Estring, the mean endometrial thickness remained constant, and no women experienced withdrawal bleeding or spotting during the progestogen challenge test. Only two of 126 women had significant endometrial thickening (13.0 and 19.0 mm).23 One of these women had a uterine myoma, while the other experienced a rapid reduction in endometrial thickness to 4 mm without bleeding; neither had evidence of proliferation on endometrial biopsy. The low-dose Estring should not be confused with Femring24 (Warner Chilcott [US]), a vaginal ring that delivers systemic levels of estrogen replacement. Less than 2% of women experience ulcers with vaginal rings (2 of 136 women in a 1-year study).25 Vaginal tablet The Vagifem26 vaginal tablet (Novo Nordisk A/S, Bagsvaerd, Denmark) contains 10 μg estradiol. This ultra-low-dose vaginal tablet, introduced in 2010, replaced a 25 μg vaginal tablet that was previously available. As both regulatory authorities and therapeutic experts from menopause societies agree that the minimum effective dose of estrogen should be used for the treatment of vaginal atrophy,5,27,28 the ultra-low-dose (10 μg) vaginal tablets were developed to provide symptom relief while reducing systemic exposure to estrogen. The recommended dosing schedule of Vagifem 10 μg is one tablet daily for 2 weeks, followed by one tablet twice weekly for maintenance, with an annual estrogen exposure of 1.14 mg.26 The efficacy and safety of this ultra-low-dose regimen for the treatment of vaginal atrophy in postmenopausal women has been established in recent studies.29–31 At 12 weeks of treatment, significant improvement in VMI, maturation value, grading of vaginal health, vaginal pH, and most bothersome symptom score was seen.29 Improvement over baseline was maintained through 52 weeks. One participant (from 164 treated participants completing the study) lacked an evaluable biopsy at baseline and was found to have endometrial adenocarcinoma stage II, grade 2 after approximately 10 months of treatment; de novo development was considered unlikely because of the clinical time frame.29 To further assess safety, endometrial biopsy was performed at the beginning and end of a 52-week study.30 No endometrial hyperplasia or endometrial cancer was found. Over the course of the study, endometrial thickness measured by transvaginal ultrasound decreased from 2.04 mm (n=334) to 1.94 mm (n=293), which may reflect the expected decrease in thickness with age, with no interfering endometrial stimulation.30 None of the serious AEs were considered related to the study drug. A larger pooled analysis (based on 386 evaluable biopsy samples) determined that ultra-low-dose estradiol vaginal tablets did not increase the risk for endometrial hyperplasia or carcinoma in postmenopausal women for 1 year under study conditions.31 Lack of need for progesterone In its 2013 position statement, NAMS stated that the primary indication for progesterone is to reduce the risk of endometrial cancer and should be used in patients who are on systemic estrogen therapy and have an intact uterus.5 However, progesterone is “generally not indicated when low-dose vaginal estrogen is administered.”5 Because low doses of vaginally administered estrogen, such as those delivered by a low-dose CEE regimen,21 the vaginal ring,23 and the vaginal tablet,31 have not been associated with increased risk for endometrial hyperplasia, progestogen is not generally indicated when local estrogen products are administered.5 However, no recommendations have been made regarding the need for progesterone with creams that deliver higher doses of estrogen. Key safety information from recent clinical trials is summarized in Table 1. Table 1. Recent clinical trials assessing the safety of local vaginal estrogen therapies Product | N | Duration and design | Treatment groups | Safety assessment | Reference Premarin vaginal cream | 423 | 12-week double-blind phase, followed by40-week open-label phase consistent with previous regimen | Premarin cream (0.3 mg CE) or placebo cream once daily (21 days on/7 days off) or twice weekly (first 12 weeks), then all women taking Premarin cream according to prior regimen | No hyperplasia or carcinoma, as assessed by transvaginal ultrasound and endometrial biopsyAdverse event frequency similar to that of placebo during double-blind phase | 21 Estrace vaginal cream | No recent trials Estring vaginal ring | 126 | 12-month open-label | Estring vaginal ring (7.5 μg estradiol released daily) compared with Vagifem vaginal tablet (25 μg estradiol, which has since been discontinued and replaced by a 10-μg estradiol version) daily for 2 weeks, then twice weekly | No increase in average endometrial thickness No bleeding/spotting in Estring group with PCT | 23 Vagifem vaginal tablet | 309 | 52-week double-blind | Vagifem vaginal tablet (10 μg estradiol) or placebo tablet assigned in 2:1 ratio daily for 2 weeks, then twice weekly | No major safety findings regarding physical, gynecologic, or laboratory assessments | 29 336 | 52-week open-label | Vagifem vaginal tablet (10 μg estradiol) daily for 2 weeks, then twice weekly | No cases of endometrial hyperplasia or endometrial cancerDecrease in mean endometrial thickness | 30 Benefits of long-term therapy for vaginal atrophy All of the aforementioned treatments, when used as directed, are well tolerated and effective for relieving symptoms of vaginal atrophy.5 They provide vaginal estrogen, while minimizing systemic exposure,32–34 and result in increased blood flow, increased epithelial thickness, and increased secretions, as well as reduced pH.5 These physiological improvements represent a reversal of atrophy and lead to a positive clinical outcome for most women. The urogenital symptoms of estrogen deficiency that present in the postmenopausal years may require long-term therapy, since women have reported the return of symptoms during washout periods between different treatments, even after just a few weeks.32 Given the comparable efficiency of the low-dose, locally administered estrogen products, NAMS recommends that severity of symptoms, effectiveness and safety of therapy for the individual patient, and patient preference guide the choice of treatment.5 It is important that patients accept and adhere to their treatment in order to fully realize the benefits. Clinicians can be instrumental in educating patients about vaginal atrophy as a chronic condition; the advantages of low-dose, local vaginal estrogen therapy; and the importance of long-term management. Conclusion Vaginal atrophy is a common, underreported, and under-treated chronic condition that results from a decrease in estrogen levels during menopause.1 When over-the-counter treatments fail to relieve symptoms, NAMS recommends low-dose, local vaginal estrogen therapy. A variety of formulations (ie, creams, ring, and tablet) are available, and based on the collective results of many studies conducted over the past two decades, NAMS considers all of these effective and well tolerated.5 Because vaginal atrophy is a chronic condition, treatment should be continued for as long as symptoms persist and may need to be continued indefinitely. Long-term studies (up to 1 year) have shown that low-dose, local vaginal estrogen therapy has an excellent safety profile marked by no increased risk for endometrial hyperplasia, which is a common concern with estrogen-alone therapies. Such data should provide reassurance to women with vaginal atrophy who may otherwise hesitate to accept a hormonal form of treatment. Finally, many women remain untreated because they avoid reporting symptoms of vaginal atrophy to their health care provider. Clinicians may take an active role in encouraging such discussions by asking their postmenopausal patients whether they have experienced any vaginal dryness or discomfort, with or without sexual activity. By initiating the conversation and then following up on any complaints with an examination or a referral, it may become easier to diagnose and appropriately treat postmenopausal women with vaginal atrophy. Acknowledgments Medical writing assistance was provided by Pamela Barendt, PhD, of ETHOS Health Communications, Newtown, Pennsylvania, with financial assistance from Novo Nordisk, Inc., in compliance with international guidelines for Good Publication Practice. The author received no remuneration of any kind for the development of this manuscript. Footnotes Disclosure The author has no conflict of interest to report. References Articles from International Journal of Women's Health are provided here courtesy of Dove Press ACTIONS PERMALINK RESOURCES Similar articles Cited by other articles Links to NCBI Databases Cite Add to Collections Connect with NLM National Library of Medicine 8600 Rockville Pike Bethesda, MD 20894
4175
https://cognitivecardiomath.com/cognitive-cardio-blog/using-number-lines-in-math-class/
Published Time: 2024-08-02T09:06:00+00:00 Using Number Lines in Math Class with Middle Schoolers - Cognitive Cardio Math Skip to content Home Blog Shop Shop My account Cart Checkout TpT Store Online P.D. Fractions: from Foundations to Operations 3 Fraction Shortcuts to Avoid Podcast Free Math Resource Center Contact Home Blog Shop Shop My account Cart Checkout TpT Store Online P.D. Fractions: from Foundations to Operations 3 Fraction Shortcuts to Avoid Podcast Free Math Resource Center Contact Math Wheels for Note-taking? get math wheel details here Home Blog Shop Shop My account Cart Checkout TpT Store Online P.D. Fractions: from Foundations to Operations 3 Fraction Shortcuts to Avoid Podcast Free Contact Home Blog Shop Shop My account Cart Checkout TpT Store Online P.D. Fractions: from Foundations to Operations 3 Fraction Shortcuts to Avoid Podcast Free Contact Home Blog Shop Shop My account Cart Checkout TpT Store Online P.D. Fractions: from Foundations to Operations 3 Fraction Shortcuts to Avoid Podcast Free Math Resource Center Contact Home Blog Shop Shop My account Cart Checkout TpT Store Online P.D. Fractions: from Foundations to Operations 3 Fraction Shortcuts to Avoid Podcast Free Math Resource Center Contact Using Number Lines in Math Class with Middle Schoolers Facebook Twitter Pinterest I’m a huge fan of giving our students the right tools they need to succeed. I believe they’re never too old to use them! When I discover tools that help my students with math, I feel like I’m setting them up for success, both mentally and academically. It’s amazing to see how much more confident they become when they have resources to guide them. One tool that’s always available in my classroom is number lines. Yes, even in middle school! Today, I’m excited to show you just how beneficial using number lines can be for our middle schoolers! How Number Lines Help Middle Schoolers Using number lines in middle school math is a game-changer! When we first think about number lines, we automatically think about our younger learners. While we traditionally think of number lines as a tool for elementary students, I want to challenge you to get the idea of a 0 to 10 number line out of your head and instead think of number lines in relation to the skills and concepts you teach. They’re incredibly valuable for our older students, too. When we introduce them to middle schoolers, we give them a visual tool that helps make abstract concepts more concrete. They are fantastic for introducing new concepts, reviewing previously taught ones, or as part of intervention. Number lines boost confidence and comprehension in middle school math. When our students see math problems visually laid out, it reduces anxiety and makes learning more interactive and engaging. I’ve seen firsthand how my students light up when they “get it” after using a number line. It’s a tool that truly supports their mathematical journey and helps them thrive! Middle School Concepts & Number Lines Number lines are fantastic for helping our students understand positive and negative numbers. They can see the relationship between these numbers and grasp the idea of moving left or right on the line to add or subtract. This visual representation makes a world of difference, especially for our students who struggle with traditional methods. It’s a great way to differentiate learning for your students as well. These tools also simplify the process of finding common denominators and understanding fractions. By seeing fractions on a number line, our students can easily compare sizes and understand equivalences. This visual approach takes the mystery out of fractions and makes them much more approachable. Number lines are also great for reinforcing the concept of absolute value. Students can quickly see the distance between numbers and zero, which solidifies their understanding. It’s one thing to memorize a rule, but it’s entirely different (and more effective) to visualize it on a number line. Three Ways to Use Number Lines in Your Classroom I want to share three specific ways you can use number lines in the classroom to help students excel in math. These methods have been impactful for my students, making math more interactive and easier to understand and I know they can help your students too. Let’s check out these three strategies and see how we can bring number lines to life in our lessons! 1. Classroom Decor One of my favorite ways to use number lines in the classroom is by making them an integral part of classroom decor that stays up all year round. This is a perfect way to make decorating functional and useful! I like to refer to them as tools that my students can reference all year long. In my classroom, I have a fraction, decimal, and percent number line displayed above the whiteboard at the front. It shows the most common fractions and their decimal and percent equivalents. This visual aid is incredibly helpful for my students, as they frequently refer to it to learn and remember these common equivalences. It’s like having a cheat sheet right there in front of them every day! I also have a positive and negative integers number line displayed at the top of another wall. When we start exploring negative numbers, this huge visual helps us discuss moving in the positive or negative direction when combining numbers. It’s also super handy when we dive into absolute value. Seeing that both -5 and 5 are the same distance from zero makes it clear why they have the same absolute value. 2. Double Number Lines I love finding different ways to use this tool in my classroom. One of my favorite methods is using double number lines (or two number lines side by side) to explore the relationship between different amounts. It’s an easy way for students to see how numbers in different formats relate to each other. This is especially useful when we’re working with percentages or ratios. For instance, when finding the percent of a number, I place the number we’re working with on one number line and the percentages from 1% to 100% on another. This makes it easy for my students to visually grasp how percentages relate to the original number. It’s a great way to make abstract concepts more tangible! Teaching ratios are made easy with these tools. My students can see the relationship between two quantities side by side. This visual representation helps them understand how ratios work and how to find equivalent ratios. It’s a powerful way to make the concept of ratios more concrete and less intimidating. 3. Vertical Number Lines I also like to use vertical number lines, similar to thermometers, to visualize patterns in numbers. These are particularly helpful when we’re looking at the increasing tens and ones in two-digit numbers. My students can clearly see the sequence and repetition of digits. This makes it easier for them to understand the value of numbers. They quickly get the hang of counting up and counting down when adding or subtracting, seeing how sums increase and differences decrease in value. A key benefit of number lines is how they help students connect the concepts of rounding up and rounding down. When they see numbers on the line, it becomes much clearer why we round up or down to the nearest five or ten. The visual representation really solidifies their understanding. Helpful Resources for Middle School Math I love using the Fraction, Decimal, and Percent Number Line to help my students keep their conversions straight! This resource is a one-page number line that’s packed with useful information. It includes common decimals placed right on the number line, along with their equivalent fractions in their lowest terms and the corresponding percentages. I have my students place this number line in their math notebooks. It becomes their go-to reference for quick conversions. Having this tool in their toolbox helps make math problems a lot less daunting. I also post a larger version of this number line as part of my classroom decor. This way, my students can easily glance up and find the information they need. It’s amazing how much this visual tool can boost their confidence and understanding of fractions, decimals, and percentages! If you want to ensure that your students have this resource at their fingertips, I also have a Fraction, Decimal, Percent Number Line Bookmark. Have your students place them in their book they are reading or even their math textbook! To read more about number lines, check out my post on Fraction, Decimal, and Percent Conversions. You can also check out the Using Number Lines in the Math Classroom episode on The Teaching Toolbox podcast. It is filled with examples and ideas on how you can use number lines in your math classroom. Embrace Number Lines in the Middle School Math Classroom Bringing number lines into our middle school math classroom will change how your students approach math. From helping them understand complex concepts to serving as a constant visual aid, number lines are invaluable tools. Whether we’re using them for fractions, decimals, percents, or even decorating the classroom with them, they make math more accessible and less intimidating for our students. By providing these resources, we’re not only boosting their confidence but also paving the way for their academic success. Save for Later Remember to save this post to your favorite math Pinterest board for ideas on how to use number lines! Ellie read next... Teaching the Properties of Addition and Multiplication in 3rd Grade Tips and Activities for Introducing Division Concepts in 3rd Grade The Keys to Teaching Integer Operations Teaching Customary Units of Measurement and Making it Stick Facebook Twitter Pinterest Prev Previous Doodle Wheel Organizers: Everything You Need to Know Next Effective Note-Taking Strategies to Use in the Math Classroom Next Welcome to Cognitive Cardio Math! I’m Ellie, a wife, mom, grandma, and dog ‘mom,’ and I’ve spent just about my whole life in school! With nearly 30 years in education, I’ve taught: All subject areas in 4 th and 5 th grades Math, ELA, and science in 6th grade (middle school) I’ve been creating resources for teachers since 2012 and have worked in the elearning industry for about five years as well! If you’re looking for ideas and resources to help you teach math (and a little ELA), I can help you out! FIND IT FAST Search LET'S CONNECT Facebook-fPinterest-pInstagramApple-altEnvelope Archives Archives Select to see on TPT Select to see on TPT Select to see on TPT Select to see on TPT Select to see on TPT Select to see on TPT Select to see on TPT Select to see on TPT Select to see on TPT Select to see on TPT Select to see on TPT Select to see on TPT Get FIVE days of free math lessons! send me the notes! Math wheels can be used in so many ways…. to tak Do you review the eight parts of speech, or would Math wheel notes for 4th grade. These one-pagers h It’s been a long week…and the garden was an ab Have you downloaded the Math Anxiety ebook? You c Carefully designed over years in a real 6th grade First Saturday morning in a while that I’ve take If your students aren’t excited about taking mat Great first days of math activity: Meet the Mathem FOLLOW ON INSTAGRAM Terms of UsePrivacy Policy COPYRIGHT © 2022 COGNITIVE CARDIO MATH • ALL RIGHTS RESERVED. SITE DESIGN BY LAINE SUTHERLAND DESIGNS
4176
https://www.idc-online.com/technical_references/pdfs/electrical_engineering/Wye_Delta_OR_Delta_Wye_Transformations.pdf
Module 2 DC Circuit Version 2 EE IIT, Kharagpur Lesson 6 Wye (Y) - Delta (∆) OR Delta (∆)-Wye (Y) Transformations Version 2 EE IIT, Kharagpur Objectives • A part of a larger circuit that is configured with three terminal network Y (orΔ ) to convert into an equivalent Δ (or Y ) through transformations. • Application of these transformations will be studied by solving resistive circuits. L.6.1 Introduction There are certain circuit configurations that cannot be simplified by series-parallel combination alone. A simple transformation based on mathematical technique is readily simplifies the electrical circuit configuration. A circuit configuration shown below is a general one-port circuit. When any voltage source is connected across the terminals, the current entering through any one of the two terminals, equals the current leaving the other terminal. For example, resistance, inductance and capacitance acts as a one-port. On the other hand, a two-port is a circuit having two pairs of terminals. Each pair behaves as a one-port; current entering in one terminal must be equal to the current living the other terminal. Fig.6.1.(b) can be described as a four terminal network, for convenience subscript 1 to refer to the variables at the input port (at the left) and the subscript 2 to refer to the variables at the output port (at the right). The most important subclass of two-port networks is the one in which the minus reference terminals of the input and output ports are at the same. This circuit configuration is readially possible to consider the ‘ or π Δ ’ – network also as a three-terminal network in fig.6.1(c). Another frequently encountered circuit configuration that shown in fig.6.1(d) is approximately refered to as a three-terminal Y connected circuit as well as two-port circuit. Version 2 EE IIT, Kharagpur The name derives from the shape or configuration of the circuit diagrams, which look respectively like the letter Y and the Greek capital letter Δ. L.6.1.1 Delta (Δ) – Wye (Y) conversion These configurations may often be handled by the use of a Δ −Y or −Δ Y transformation. One of the most basic three-terminal network equivalent is that of three resistors connected in “Delta ” and in “Wye( ”. These two circuits identified in fig.L6.1(e) and Fig.L.6.1(f) are sometimes part of a larger circuit and obtained their names from their configurations. These three terminal networks can be redrawn as four-terminal networks as shown in fig.L.6.1(c) and fig.L.6.1(d). We can obtain useful expression for direct ( ) Δ ) Y Version 2 EE IIT, Kharagpur transformation or conversion from Δ to Y or Y to Δ by considering that for equivalence the two networks have the same resistance when looked at the similar pairs of terminals. L.6.2 Conversion from Delta (Δ) to Star or Wye (Y) Let us consider the network shown in fig.6.1(e) (or fig. ) and assumed the resistances ( ) in 6.1( ) c → , , AB BC CA R R and R Δ network are known. Our problem is to find the values of in Wye (Y ) network (see fig.6.1(e)) that will produce the same resistance when measured between similar pairs of terminals. We can write the equivalence resistance between any two terminals in the following form. , , A B C R R and R Between & A C terminals: ( ) CA AB BC A C AB BC C R R R R R A R R R + + = + + (6.1) Between terminals: & C B ( ) BA AB CA C B AB BC C R R R R R A R R R + + = + + (6.2) Between & B A terminals: ( ) AB CA BC B A AB BC C R R R R R A R R R + + = + + (6.3) By combining above three equations, one can write an expression as given below. AB BC BC CA CA AB A B C AB BC CA R R R R R R R R R R R R + + + + = + + (6.4) Subtracting equations (6.2), (6.1), and (6.3) from (6.4) equations, we can write the express for unknown resistances of Wye (Y ) network as AB CA A AB BC CA R R R R R R = + + (6.5) AB BC B AB BC CA R R R R R R = + + (6.6) BC CA C AB BC CA R R R R R R = + + (6.7) Version 2 EE IIT, Kharagpur L.6.2.1 Conversion from Star or Wye (Y) to Delta (Δ) To convert a Wye (Y ) to a Delta (Δ ), the relationships must be obtained in terms of the Wye (Y 3 , , AB BC R R and R ) resistances (referring to fig.6.1 (f)). Considering the Y connected network, we can write the current expression through , , A B C R R and R A R resistor as ( ) A N A A V V I R − = (for Y network) (6.8) Appling KCL at ‘ ’ for Y connected network (assume N , , A B C terminals having higher potential than the terminal ) we have, N ( ) ( ) ( ) 0 A N B N C N A B C V V V V V V R R R − − − + + = 1 1 1 C A B N A B C A B C V V V V R R R R R R ⎛ ⎞⎛ ⇒ + + = + + ⎜ ⎟⎜ ⎝ ⎠⎝ ⎞ ⎟ ⎠ or, 1 1 1 C A B A B C N A B C V V V R R R V R R R ⎛ ⎞ + + ⎜ ⎟ ⎝ ⇒ = ⎛ ⎞ + + ⎜ ⎟ ⎝ ⎠ ⎠ (6.9) For -network (see fig.6.1.(f)), Δ Current entering at terminal A = Current leaving the terminal ‘ A’ AC AB A AB A V V I C R R = + (for network) (6.10) Δ From equations (6.8) and (6.10), ( ) A N AC AB A AB AC V V V V R R R − = + Using the expression in the above equation, we get N V 1 1 1 C A B A B C A A B C AC AB A AB AC V V V R R R V R R R V V R R R ⎛ ⎞ ⎛ ⎞ + + ⎜ ⎟ ⎜ ⎟ ⎝ ⎠ ⎜ ⎟ − ⎜ ⎟ ⎛ ⎞ + + ⎜ ⎟ ⎜ ⎟ ⎜ ⎟ ⎝ ⎠ ⎝ ⎠= + ⇒ 1 1 1 A B A C B C A B C AC AB A AB AC V V V V R R R R R V V R R R ⎛ ⎞ − ⎛ ⎞ − + ⎜ ⎟ ⎜ ⎟ ⎝ ⎠ ⎜ ⎟ ⎜ ⎟ ⎛ ⎞ + + ⎜ ⎟ ⎜ ⎟ ⎜ ⎟ ⎝ ⎠ ⎝ ⎠= + or 1 1 1 AB AC B C A B C AC AB A AB AC V V R R R R R V V R R R ⎛ ⎞ ⎛ ⎞ + ⎜ ⎟ ⎜ ⎟ ⎝ ⎠ ⎜ ⎟ ⎜ ⎟ ⎛ ⎞ + + ⎜ ⎟ ⎜ ⎟ ⎜ ⎟ ⎝ ⎠ ⎝ ⎠= + (6.11) Equating the coefficients of and in both sides of eq.(6.11), we obtained the following relationship. AB V AC V Version 2 EE IIT, Kharagpur 1 1 1 1 1 A B AB A B AB C A B A B C R R R R R R R R R R R R = ⇒ = + ⎛ ⎞ + + ⎜ ⎟ ⎝ ⎠ + (6.12) 1 1 1 1 1 A C AC A C AC B A C A B C R R R R R R R R R R R R = ⇒ = + ⎛ ⎞ + + ⎜ ⎟ ⎝ ⎠ + (6.13) Similarly, B I for both the networks (see fig.61(f)) are given by ( ) B N B B V V I R − = (for Y network) BC BA B BC BA V V I R R = + (for network) Δ Equating the above two equations and using the value of (see eq.(6.9), we get the final expression as N V 1 1 1 BC BA C A A B C BC BA B BC V V R R R R R V V BA R R R ⎛ ⎞ ⎛ ⎞ + ⎜ ⎟ ⎜ ⎟ ⎝ ⎠ ⎜ ⎟ ⎜ ⎟ ⎛ ⎞ + + ⎜ ⎟ ⎜ ⎟ ⎜ ⎟ ⎝ ⎠ ⎝ ⎠= + Equating the coefficient of in both sides of the above equations we obtain the following relation BC V 1 1 1 1 1 B C BC B C BC A B C A B C R R R R R R R R R R R R = ⇒ = + ⎛ ⎞ + + ⎜ ⎟ ⎝ ⎠ + (6.14) When we need to transform a Delta (Δ ) network to an equivalent Wye (Y ) network, the equations (6.5) to (6.7) are the useful expressions. On the other hand, the equations (6.12) – (6.14) are used for Wye (Y ) to Delta (Δ ) conversion. Observations In order to note the symmetry of the transformation equations, the Wye (Y ) and Delta (Δ ) networks have been superimposed on each other as shown in fig. 6.2. Version 2 EE IIT, Kharagpur • The equivalent star (Wye) resistance connected to a given terminal is equal to the product of the two Delta (Δ) resistances connected to the same terminal divided by the sum of the Delta (Δ) resistances (see fig. 6.2). • The equivalent Delta ( ) resistance between two-terminals is the sum of the two star (Wye) resistances connected to those terminals plus the product of the same two star (Wye) resistances divided by the third star (Wye (Y )) resistance (see fig.6.2). Δ L.6.3 Application of Star ( ) Y to Delta Δ ( ) or Delta Δ ( ) to Star ( ) Y Transformation Example: L.6.1 Find the value of the voltage source ( ) that delivers 2 Amps current through the circuit as shown in fig.6.3. S V Version 2 EE IIT, Kharagpur Solution: Convert the three terminals Δ-network (a-c-d & e-f-g) into an equivalent Y -connected network. Consider the Δ-connected network ‘a-c-d’ and the corresponding equivalent Y -connected resistor values are given as Version 2 EE IIT, Kharagpur 3 1 1 1 3 1 0.6 ; 0.2 ; 0.6 5 5 5 ao co do R R R × × × = = Ω = = Ω = = Ω Similarly, for the -connected network ‘e-f-g’ the equivalent the resistances of Y -connected network are calculated as Δ 3 1 3 1 1 1 0.6 ; 0.6 ; 0.2 5 5 5 eo go fo R R R ′ ′ ′ × × × = = Ω = = Ω = = Ω Now the original circuit is redrawn after transformation and it is further simplified by applying series-parallel combination formula. Version 2 EE IIT, Kharagpur The source s V that delivers 2A current through the circuit can be obtained as . 3.2 2 3.1 6.2 s V I Volts = × = × = Example: L.6.2 Determine the equivalent resistance between the terminals A and B of network shown in fig.6.4 (a). Version 2 EE IIT, Kharagpur Solution: A ‘ ’ is substituted for the ‘Y ’ between points c, d, and e as shown in fig.6.4(b); then unknown resistances value for Y t Δ o Δ transformation are computed below. 2 4 2 4 8.66 3 cB R × = + + = Ω ; 4 3 3 4 13 2 eB R × = + + = Ω ; 2 3 2 3 6.5 4 ce R × = + + = Ω Next we transform ‘Δ’connected 3-terminal resistor to an equivalent ‘Y ’ connected network between points ‘A’; ‘c’ and ‘e’ (see fig.6.4(b)) and the corresponding Y connected resistances value are obtained using the following expression. Simplified circuit after conversion is shown in fig. 6.4(c). Version 2 EE IIT, Kharagpur 4 2 0.64 ; 4 2 6.5 Ao R × = = Ω + + 4 6.5 2.08 ; 4 2 6.5 co R × = = Ω + + 6.5 2 1.04 ; 4 2 6.5 eo R × = = Ω + + & The circuit shown in fig.6.5(c) can further be reduced by considering two pairs of parallel branches and the corresponding simplified circuit is shown in fig.6.4(d). 3 8.66 13 1 and & Now one can find the equivalent resistance between the terminals ‘ A ’ and ‘ B ’ as ( ) ( ) 2.23 2.08 1.04 0.93 0.64 2.21 AB R = + + + = & Ω . Example: L.6.3 Find the value of the input resistance of the circuit. in R Version 2 EE IIT, Kharagpur Solution: Y connected network formed with the terminals a-b-o is transformed into Δ connected one and its resistance values are given below. Ω = × + + = 61 . 64 26 12 36 12 36 ab R ; Ω = × + + = 66 . 46 36 12 26 26 12 bo R Ω = × + + = 140 12 36 26 36 26 ao R Similarly, connected networks formed with the terminals ‘b-c-o’ and ‘c-a-o’ are transformed to connected networks. Y Δ Ω = × + + = 738 . 6 26 6 . 0 6 6 . 0 6 bc R ; Ω = × + + = 2 . 29 6 26 6 . 0 26 6 . 0 co R Ω = × + + = 60 . 34 6 . 0 26 6 26 6 0 b R and, Ω = × + + = 00 . 54 30 26 15 26 15 co R ; Ω = × + + = 108 15 26 30 26 30 ao R Version 2 EE IIT, Kharagpur Ω = × + + = 31 . 62 26 15 30 15 30 ac R Note that the two resistances are connected in parallel (140 108 ) between the points ‘a’ and ‘o’. Similarly, between the points ‘b’ and ‘o’ two resistances are connected in parallel ( 46.66 34.6) and resistances 54.0Ω and 29.2Ω are connected in parallel between the points ‘c’ and ‘o’. Now Y connected network formed with the terminal ‘a-b-c’ is converted to equivalent connected network. Δ Version 2 EE IIT, Kharagpur Now, Ω = + + + = 37 . 19 ) ( ca bc ab ab bc ac in R R R R R R R Remarks: • If the connected network consists of inductances (assumed no mutual coupling forms between the inductors) then the same formula can be used for conversion (see in detail 3-phase ac circuit analysis in Lesson-19). or Y Δ Y to or to Y Δ Δ • On the other hand, the connected network consists of capacitances can be converted to an equivalent or Y Δ Δ Y or network provided the capacitance value is replaced by its reciprocal in the conversion formula (see in detail 3-phase ac circuit analysis in Lesson-19). Example: L.6.4 Find the equivalent inductance of the network (see fig.6.5(a)) at the terminals ‘a’ & ‘b’ using transformations. eq R & Y −Δ Δ −Y Version 2 EE IIT, Kharagpur Solution: Convert the three terminals (c-d-e) Δ network (see fig.6.5(a)) comprising with the resistors to an equivalent Y -connected network using the following Y Δ − conversion formula. 6 4 6 2 2 4 2 ; 1 ; 0.666 12 12 12 co do eo R R and R × × × = = Ω = = Ω = = Ω Version 2 EE IIT, Kharagpur Similarly, the -connected network ( f-e-b) is converted to an equivalent Y -connected Network. Δ 1 9 5 9 1 5 0.6 ; 3 ; 0.333 15 15 15 fo eo bo R R and R ′ ′ ′ × × × = = Ω = = Ω = = Ω After the conversions, the circuit is redrawn and shown in fig.6.5(b). Next the series-parallel combinations of resistances reduces the network configuration in more simplified form and it is shown in fig.6.5(c). This circuit (see fig.6.5(c)) can further be simplified by transforming Y connected network comprising with the three resistors (2 Y Δ − Ω , 4Ω , and 3.666 ) to a -connected network and the corresponding network parameters are given below: Ω Δ 2 3.666 2 4 2 3.666 7.5 ; 2 4 8.18 ; 4 3.666 4 3.666 4 3.666 15 2 co cb bo R R and R ′ ′ × × = + + = Ω = + + = Ω × = + + = Ω Version 2 EE IIT, Kharagpur Simplified form of the circuit is drawn and shown in fig.6.5(d) and one can easily find out the equivalent resistance between the terminals ‘a’ and ‘b’ using the series- parallel formula. From fig.6.5(d), one can write the expression for the total equivalent resistance at the terminals ‘a’ and ‘b’ as eq R eq R ( ) ( ) [ ] ( ) 5 4.6 || 7.5 0.333||15 ||8.18 5 2.85 0.272 ||8.18 5 3.122 ||8.18 7.26 eq R ⎡ ⎤ = + + ⎣ ⎦ = + + = + = Ω L.6.3 Test Your Understanding [Marks: 40] T.1 Apply transformations only to find the value of the Current that drives the circuit as shown in fig.6.6. Y or Y −Δ Δ − I Version 2 EE IIT, Kharagpur (ans: 10.13 ) Ω T.2 Find the current through I 4Ω resistor using Y −Δ or Y Δ − transformation technique only for the circuit shown in fig.6.7. (ans: 7.06 A ) T.3 For the circuit shown in fig.6.8, find without performing any conversion. eq R (Ans.6 ) Ω Version 2 EE IIT, Kharagpur T.4 For the circuit shown in fig.6.9, calculate the equivalent inductance for each circuit and justify your answer conceptually. eq R (ans. ) 1 2 eq eq R R = T.5 Find the value of for the circuit of fig.6.10 when the switch is open and when the switch is closed. eq R (Ans. ; ) 8.75 eq R = Ω 7.5 eq R = Ω T.6 For the circuit shown in fig.6.11, find the value of the resistance ‘ ’ so that the equivalent capacitance between the terminals ‘a’ and b’ is 20. R 57Ω . (Ans.30 ) Ω Version 2 EE IIT, Kharagpur T.7 conversion is often useful in reducing the ------------ of a resistor network ---------- to the beginning nodal or mesh analysis. Y or Y −Δ Δ − T.8 Is it possible to find the current through a branch or to find a voltage across the branch using conversions only? If so, justify your answer. / Y −Δ Δ −Y ___________ Version 2 EE IIT, Kharagpur Source: Basic%20Electrical%20Technology/pdf/L-06(GDR)(ET)%20((EE)NPTEL).pdf
4177
https://www.reddit.com/r/Mcat/comments/tedq3r/electron_pair_geometry_vs_molecular_geometry/
Electron pair geometry vs Molecular geometry? : r/Mcat Skip to main contentElectron pair geometry vs Molecular geometry? : r/Mcat Open menu Open navigationGo to Reddit Home r/Mcat A chip A close button Log InLog in to Reddit Expand user menu Open settings menu Go to Mcat r/Mcat r/Mcat The #1 social media platform for MCAT advice. The MCAT (Medical College Admission Test) is offered by the AAMC and is a required exam for admission to medical schools in the USA and Canada. /r/MCAT is a place for MCAT practice, questions, discussion, advice, social networking, news, study tips and more. Check out the sidebar for useful resources & intro guides. Post questions, jokes, memes, and discussions. 311K Members Online •4 yr. ago jfql88 Electron pair geometry vs Molecular geometry? Question 🤔🤔 Can someone please confirm, electron pair geometry does not account for lone pairs while molecular geometry does take lone pairs into account? I always thought the opposite since it was more intuitive to me that way, but I guess not? Thanks. Read more Share Related Answers Section Related Answers How to determine electron geometry Electron domain geometry explained How to find molecular shape Does molecular geometry include lone pairs Top MCAT study schedules for busy students New to Reddit? Create your account and connect with a world of communities. Continue with Email Continue With Phone Number By continuing, you agree to ourUser Agreementand acknowledge that you understand thePrivacy Policy. Public Anyone can view, post, and comment to this community 0 0 Top Posts Reddit reReddit: Top posts of March 15, 2022 Reddit reReddit: Top posts of March 2022 Reddit reReddit: Top posts of 2022 Reddit RulesPrivacy PolicyUser AgreementAccessibilityReddit, Inc. © 2025. All rights reserved. Expand Navigation Collapse Navigation
4178
http://kirkmcd.princeton.edu/examples/ellipsoid.pdf
Conducting Ellipsoid and Circular Disk Kirk T. McDonald Joseph Henry Laboratories, Princeton University, Princeton, NJ 08544 (September 21, 2002; updated December 27, 2019) 1 Problem Show that the surface charge density σ on a conducting ellipsoid, x2 a2 + y2 b2 + z2 c2 = 1, (1) can be written, σellipsoid = Q 4πabc x2 a4 + y2 b4 + z2 c4 , (2) where Q is the total charge. Show that if the charge distribution of the ellipsoid is projected onto any of its symmetry planes, the result is independent of the extent of the ellipse perpendicular to the plane of projection (i.e., σxy, the projection of σellipsoid on the x-y plane, is independent of parameter c). Thus, the projection of the charge distribution of a conducting oblate or prolate spheroid onto its equatorial plane is the same as the projected charge distribution of a conducting sphere. By considering a thin conducting circular disk of radius a as a special case of an ellipsoid, show that its surface charge density (summed over both sides) can be written as, σcircular disk = V0 2π2√ a2 −r2, (3) where the electric potential V0 of the disk is related by V0 = πQ/2a. Show also that if the charge distribution on the conducting ellipsoid is projected onto any of the coordinate axes, the result is uniform (i.e., the charge distribution projected onto the x-axis is σx = Q/2a). In particular, we expect that the charge distribution along a conducting needle will be uniform, since the needle can be considered as the limit of a conducting ellipsoid, two of whose three axes have shrunk to zero. 2 Solution The charge distribution (3) on a conducting ellipsoid can be deduced in a variety of ways -. We record here a highly geometric derivation following Thomson (1869) .1,2 1The charge distribution on the surface of a conducting, prolate spheroid was deduced by Green (1828), pp. 68-69 of , by noting that the equipotentials of a uniformly charged needle are spheroids. He stated that his results “agree with what has been long known”. 2Thomson’s method was stated in a textbook by Murphy in 1833 (with no equations), which suggests that it was already well known. 1 The starting point is the “elementary” result that the electric field is zero in the interior of a spherical shell of any thickness that has a uniform volume charge density between the inner and outer surfaces of the shell. A well-known geometric argument (due to Newton, book 1, prop. 70, p. 218 of ) for this is illustrated in Fig. 1. Figure 1: For any point r0 in the interior of a uniformly charged shell of charge, the axis of a narrow bicone intercepts the inner surface of the shell at points r1 and r2. The corresponding areas on the inner surface of the shell intercepted by the bicone are A1 and A2. In the limit of small areas, A1/R2 01 = A2/R2 02. The electric field at point r0 in the interior of the shell due to a lamina of thickness δ and area A1 centered on point r1 that lies within a narrow cone whose vertex is point 0 is given by, E1 = ρ dVol1 R2 01 ˆ R01, (4) where ρ is the volume charge density, dVol1 = A1δ, R01 = r0−r1, and the center of the sphere is taken to be at the origin. Likewise, the electric field from a lamina of area A2 centered on point r2 defined by the intercept with the shell of the same narrow cone extended in the opposite direction (forming a bicone) is given by, E2 = ρ dVol2 R2 02 ˆ R02, (5) In the limit of bicones of small half angle, the two parts of the bicone as truncated by the shell are similar, so that, A1 R2 01 = A2 R2 02 , dVol1 R2 01 = dVol2 R2 02 , (6) and, of course, ˆ R02 = −ˆ R01. Hence E1 + E2 = 0. Since this construction can be applied to all points in the material of the spherical shell, and for all pairs of surface elements subtended by (narrow) bicones, the total electric field in the interior of the shell is zero. 2 We now reconsider the above argument after arbitrary scale transformations have been applied to the rectangular coordinate axes, x →k1x, y →k2y, z →k3z. (7) A spherical shell of radius s is thereby transformed into an ellipsoid, x2 s2 + y2 s2 + z2 s2 = 1 → x2 s2/k2 1 + y2 s2/k2 2 + z2 s2/k2 3 = 1. (8) As parameter s is varied, one obtains a set of similar ellipsoids, centered on the origin. A small volume element obeys the transformation, dVol = dxdydz →k1k2k3 dxdydz = k1k2k3 dVol. (9) The three points 0, 1, and 2 in Fig. 1 lie along a line, so that, R01 = r0 −r1 = CR02 = C(r0 −r2), (10) where C is a (negative) constant. This relation is invariant under the scale transformation (7), so that together with eq. (9) the relation, dVol1 R2 01 = dVol2 R2 02 , (11) is also invariant. Hence, if the ellipsoidal shell, which is the transform of the spherical shell of Fig. 1, contains a uniform volume charge density, the relation E1 + E2 = 0 remains true at the vertex of any bicone in the interior of the shell, which implies that the total electric field is zero there.3 This proof is based on the premise that the ellipsoidal shell is bounded by two similar ellipsoids, and that the volume charge density in the shell is uniform. If we let the outer ellipsoid of the shell approach the inner one, always remaining similar to the latter, we reach a configuration that is equivalent to a thin, conducting ellipsoid, since in both cases the electric field is zero in the interior. Hence, the surface charge distribution on a thin, conducting ellipsoid must the same as the projection onto its surface of a uniform charge distribution between that surface and a similar, but slightly larger ellipsoidal surface. The charge σ per unit area on the surface of a thin, conducting ellipsoid is therefore proportional to the thickness, which we write as δd, of the ellipsoidal shell formed by that surface and a similar, but slightly larger ellipsoid, σ = ρ δd, (12) where constant ρ is to be determined from a knowledge of the total charge Q on the con-ducting ellipsoid. 3This result was obtained by Newton (for the gravtitational attraction) at points within spheroids shells, book 1, prop. 91, cor. 3, p. 239 of . The results for ellipsoidal shells may have first been given by Ivory, p. 364 of (1809). 3 The thickness δd of a thin ellipsoidal shell at some point on its inner surface is the distance between the plane that is tangent to the inner surface at the specified point, and the plane that is tangent to the outer surface at the point similar to the specified point. These planes are parallel since the ellipsoids are parallel. In particular, if the semimajor axes of the inner ellipsoid are called a, b, and c, then those of the outer ellipsoid can be written a + δa, b + δb and c+δc. Let the (perpendicular) distance from the plane tangent to the specified point on the inner ellipsoid to its center be called d, and the corresponding distance from the outer tangent plane be d+δd, so that δd is the desired thickness of the shell at the specified point. Then, the condition of similarity is that, δa a = δb b = δc c = δd d . (13) Since the volume of an ellipsoid with semimajor axes a, b, and c is 4πabc/3, the volume of the ellipsoidal shell is 4π(a+δa)(b+δb)(c+δc)/3−4πabc/3 = 4πabc(δd/d), using eq. (13). As the constant ρ has an interpretation as the uniform charge density within the material of the ellipsoidal shell, we find that the total charge Q on the conducting ellipsoid is related by, Q = ρ Volshell = 4πabc d ρ δd, (14) and hence, σ = ρ δd = Qd 4πabc . (15) It remains to find an expression for the distance d to the tangent plane. If we write the equation for the ellipsoid in the form, f(x, y, z) = x2 a2 + y2 b2 + z2 c2 −1 = 0, (16) then the gradient of f is perpendicular to the tangent plane. Thus, the vector d from the center of the ellipsoid to the tangent plane is proportional to ∇f. That is, d ∝∇f =  x a2 , y b2 , z c2  , (17) noting that  x2/a2 + y2/b2 + z2/c2 = 1 on the ellipsoid. The unit vector ˆ d is therefore, ˆ d =  x a2 , y b2 , z c2  x2 a4 + y2 b4 + z2 c4 . (18) The magnitude d of the vector d is related to the vector r = (x, y, z) of the specified point on the ellipse by,4 d = r · ˆ d = x2 a2 + y2 b2 + z2 c2 x2 a4 + y2 b4 + z2 c4 = 1 x2 a4 + y2 b4 + z2 c4 . (19) 4Nov. 15, 2019. It was pointed out in that d = 1/(ˆ d·∇f) = 1/d f/du = d f δ(f)/d f/du = du δ(f), where u is a coordinate perpendicular to surface of the ellipsoid, with u = 0 on the surface, and δ(f) is the Dirac delta function. 4 At length, we have found the charge density on the surface of a conducting ellipsoid to be, σellipsoid = Q 4πabc x2 a4 + y2 b4 + z2 c4 , (20) where Q is the total charge. To deduce the projection of the charge distribution of the conducting ellipse onto one of its symmetry planes, say the x-y plane, note that a projected area element dx dy corresponds to area dA on the surface of the ellipsoid that is related by, dx dy = dA · ˆ z = dA dz, (21) where the unit vector ˆ d that is normal to the surface of the ellipsoid at the point (x, y) is given by eq. (19). Thus, dA = dx dy ˆ dz = c2 dx dy z x2 a4 + y2 b4 + z2 c4 . (22) The charge projected onto the x-y plane from both z > 0 and z < 0 is, dQxy = 2σellipsoiddA = Qc dx dy 2πabz = Q dx dy 2πab 1 −x2 a2 −y2 b2 , (23) combining eqs. (1), (20) and (22). The projected charge density (due to both halves of the ellipsoid), σxy = dQxy/dx dy, is independent of the parameter c that specifies the size of the ellipsoid in z. For example, the charge distributions of a sphere, a disk, and both an oblate and prolate spheroid, all of the same equatorial diameter, are the same when projected onto the equatorial plane. If the project the charge dQxy of eq. (23) onto the x axis, the result is, dQx = Q dx 2πa b2−b2x2 a2 − b2−b2x2 a2 dy b2 −b2x2 a2 −y2 = Q 2adx, (24) which is uniform in x! In particular, the uniform charge distribution on a conducting sphere projects to a uniform charge distribution on any diameter; and the charge distribution is uniform along a conducting needle that is the limit of conducting ellipsoid. The case of a thin, conducting elliptical disk in the x-y plane can be obtained from eq. (20) by letting c go to zero.5 For this we note that eq. (16) for a general ellipsoid permits us to write, c x2 a4 + y2 b4 + z2 c4 = c2 x2 a4 + y2 b4 + 1 −x2 a2 −y2 b2 → 1 −x2 a2 −y2 b2 . (25) 5For a rather different method of solution, see . 5 The charge density on each side of a conducting elliptical disk is therefore, σelliptical disk = Q 4πab 1 −x2 a2 + y2 b2 . (26) The charge density on each side of a conducting circular disk of radius a follows imme-diately as, σcircular disk = Q 4πa √ a2 −r2 , (27) where r2 = x2 + y2. Such a disk has potential V0, which can be found by calculating the potential at the center of the disk according to, V0 = V (r = 0, z = 0) = a 0 2σ(r) r 2πr dr = Q a a 0 dr √ a2 −r2 = πQ 2a . (28) Hence, a conducting disk of radius a at potential V0 has charge density, σcircular disk = V0 2π2√ a2 −r2. (29) References R. Murphy, Elementary Principles of the Theories of Electiricity, Heat and Molecular Actions, Part 1 (Pitt Press, 1833), pp. 68-70, W. Thomson (Lord Kelvin), Papers on Electricity and Magnetism, 2nd ed. (Macmillan, 1884), pp. 7 and 178-179, Lord Kelvin and P.G. Tait, Treatise on Natural Philosophy, Vol. 2 (Cambridge U. Press, 1903), secs. 519-520, O.D. Kellogg, Foundations of Potential Theory (Springer, 1929), pp. 188-191, E.J. Routh, A Treatise on Analytical Statics with Illustrations Taken from the Theories of Electricity and Magnetism, Vol. 2 (Cambridge U. Press, 1922), Arts. 71 and 376, E. Durand, ´ Electrostatique, Vol. 2 (Masson, 1966), pp. 415-417, W.R. Smythe, Static and Dynamic Electricity, 3rd ed. (McGraw-Hill, 1968), sec. 5.02, G. Green, Mathematical Papers (Macmillan, 1871), 6 I. Newton, Philosophiæ Naturalis Principia Mathematica (London, 1726), J. Ivory, On the Attractions of homogeneous Ellipsoids, Phil. Trans. Roy. Soc. London 99, 345 (1809), T.L. Curtright et al., Charge Densities for Conducting Ellipsoids, Eur. J. Phys. 41 035204 (2020), 20.pdf E.T. Copson, On the problem of the electrified disc, Proc. Edin. Math. Soc. 8, 14 (1947), 7
4179
http://www.few.vu.nl/~sdn249/BeChDaYa-misc.pdf
GENERALIZED FERMAT EQUATIONS: A MISCELLANY MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI Abstract. This paper is devoted to the generalized Fermat equation xp + yq = zr, where p, q and r are positive integers, and x, y and z are nonzero coprime integers. We begin by surveying the exponent triples (p, q, r), including a number of infinite families, for which the equation has been solved to date, detailing the techniques involved. In the remainder of the paper, we attempt to solve the remaining infinite families of generalized Fermat equations that appear amenable to current techniques. The main tools we employ are based upon the modularity of Galois representations (as is indeed true with all previously solved infinite families). Contents 1. Introduction 2 2. The Euclidean case 5 3. Multi-Frey techniques 6 3.1. The equation a3 + b6 = cn 6 3.2. The equations a2 ± cn = b6 8 4. Covers of spherical equations 11 4.1. The equation x2 + y2 = z3 11 4.2. Quadratic reciprocity 12 4.3. The equation x2 + y2 = z5 16 4.4. The equation x2 + y4 = z3 17 4.5. The equation x3 + y3 = z2 22 4.6. Other spherical equations 23 5. Historical notes on the equations a4 ± b4 = c3 23 5.1. Reduction to elliptic generalized Fermat equations 24 5.2. Relation to work of Lucas 25 Date: July 2013. 2000 Mathematics Subject Classification. Primary: 11D41, Secondary: 11D61, 11G05, 14G05. Key words and phrases. Generalized Fermat equations, Galois representations, multi-Frey techniques. Research supported by NSERC, the third-named author is supported by an NWO-Veni grant. 1 2 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI 6. Future work 25 References 26 1. Introduction Since Wiles’ remarkable proof of Fermat’s Last Theorem, a number of techniques have been developed for solving various generalized Fermat equations of the shape (1) ap + bq = cr, with 1 p + 1 q + 1 r ≤1, where p, q and r are positive integers, and a, b and c are coprime integers. The Euclidean case, when 1/p + 1/q + 1/r = 1, is well understood (see e.g. Proposition 4) and hence the main topic of interest is when 1/p + 1/q + 1/r < 1, the hyperbolic case. The number of solutions (a, b, c) to such an equation is known to be finite, via work of Darmon and Granville , provided we fix the triple (p, q, r). It has, in fact, been conjectured that there are only finitely many nonzero coprime solutions to equation (1), even allowing the triples (p, q, r) to be variable (counting solutions corresponding to 1p + 23 = 32 just once). Perhaps the only solutions are those currently known; i.e. (a, b, c, p, q, r) coming from the solution to Catalan’s equation 1p + 23 = 32, for p ≥6, and from the following nine identities: 25 + 72 = 34, 73 + 132 = 29, 27 + 173 = 712, 35 + 114 = 1222, 177 + 762713 = 210639282, 14143 + 22134592 = 657, 92623 + 153122832 = 1137, 438 + 962223 = 300429072, and 338 + 15490342 = 156133. Since all known solutions have min{p, q, r} ≤2, a similar formulation of the aforementioned conjecture is that there are no nontrivial solutions in coprime integers to (1), once min{p, q, r} ≥3. For references on the history of this problem, the reader is directed to the papers of Beukers , , Darmon and Granville , Mauldin and Tijdeman , and, for more classical results along these lines, to the book of Dickson . Our goals in this paper are two-fold. Firstly, we wish to treat the remaining cases of equation (1) which appear within reach of current technology (though, as a caveat, we will avoid discussion of exciting recent developments involving Hilbert modular forms , , in the interest of keeping our paper reasonably self-contained). Secondly, we wish to take this opportunity to document what, to the best of our knowledge, is the state-of-the-art for these problems. Regarding the former objective, we will prove the following two theorems. GENERALIZED FERMAT EQUATIONS: A MISCELLANY 3 Theorem 1. Suppose that (p, q, r) are positive integers with 1 p + 1 q + 1 r < 1 and (p, q, r) ∈{(2, n, 6), (2, 2n, 9), (2, 2n, 10), (2, 2n, 15), (3, 3, 2n), (3, 6, n), (4, 2n, 3)} for some integer n. Then equation (1) has no solutions in coprime nonzero integers a, b and c. Proof. These seven cases will be dealt with in Propositions 11, 17, 19, 20, 25, 7 and 21 respectively. □ Theorem 2. Suppose that (p, q, r) are positive integers with 1 p + 1 q + 1 r < 1 and (p, q, r) =    (2m, 2n, 3), n ≡3 (mod 4), m ≥2, or (2, 4n, 3), n ≡±2 (mod 5) or n ≡±2, ±4 (mod 13) for some integers n and m. Then the only solution to equation (1) in coprime nonzero integers a, b and c is with (p, q, r, |a|, |b|, c) = (2, 8, 3, 1549034, 33, 15613). Proof. The first case will be dealt with in Proposition 16, the second case in Proposition 22. □ Taking these results together with work of many other authors over the past twenty years or so, we currently know that equation (1) has only the known solutions for the following triples (p, q, r); in the first table, we list infinite families for which the desired results are known without additional conditions. (p, q, r) reference(s) (n, n, n), n ≥3 Wiles , Taylor-Wiles (n, n, 2), n ≥4 Darmon-Merel , Poonen (n, n, 3), n ≥3 Darmon-Merel , Poonen (2n, 2n, 5), n ≥2 Bennett (2, 4, n), n ≥4 Ellenberg , Bennett-Ellenberg-Ng , Bruin (2, 6, n), n ≥3 Bennett-Chen , Bruin (2, n, 4), n ≥4 immediate from Bennett-Skinner , Bruin (2, n, 6), n ≥3 Theorem 1, Bruin (3j, 3k, n), j, k ≥2, n ≥3 immediate from Kraus (see Remark 6) (3, 3, 2n), n ≥2 Theorem 1 (3, 6, n), n ≥2 Theorem 1 (2, 2n, k), n ≥2, k ∈{9, 10, 15} Theorem 1 (4, 2n, 3), n ≥2 Theorem 1 4 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI (p, q, r) reference(s) (3, 3, n)∗ Chen-Siksek , Kraus , Bruin , Dahmen (2, 2n, 3)∗ Chen , Dahmen , , Siksek , (2, 2n, 5)∗ Chen (2m, 2n, 3)∗ Theorem 2 (2, 4n, 3)∗ Theorem 2 (3, 3n, 2)∗ Bennett-Chen-Dahmen-Yazdani (2, 3, n), 6 ≤n ≤10 or n = 15 Poonen-Schaefer-Stoll , Bruin , , , Brown , Siksek , Siksek-Stoll (3, 4, 5) Siksek-Stoll (5, 5, 7), (5, 5, 19), (7, 7, 5) Dahmen-Siksek The (∗) in the second table indicates that the result has been proven for a family of exponents of natural density one (but that there remain infinitely many prime exponents of positive Dirichlet density untreated). The following table provides the exact conditions that the exponents must satisfy. (p, q, r) n (3, 3, n) 3 ≤n ≤104, or n ≡2, 3 (mod 5), n ≡17, 61 (mod 78), n ≡51, 103, 105 (mod 106), or n ≡43, 49, 61, 79, 97, 151, 157, 169, 187, 205, 259, 265, 277, 295, 313 367, 373, 385, 403, 421, 475, 481, 493, 511, 529, 583, 601, 619, 637, 691, 697, 709, 727, 745, 799, 805, 817, 835, 853, 907, 913, 925, 943, 961, 1015, 1021, 1033, 1051, 1069, 1123, 1129, 1141, 1159, 1177, 1231, 1237, 1249, 1267, 1285 (mod 1296) (2, 2n, 3) 3 ≤n ≤107 or n ≡−1 (mod 6) (2m, 2n, 3) m ≥2 and n ≡−1 (mod 4) (2, 4n, 3) n ≥2 and either n ≡±2 (mod 5) or n ≡±2, ±4 (mod 13) (2, 2n, 5) n ≥17 and n ≡1 (mod 4) prime (3, 3n, 2) n ≡1 (mod 8) prime GENERALIZED FERMAT EQUATIONS: A MISCELLANY 5 Remark 3. We do not list in the above tables examples of equation (1) which can be solved under additional local conditions (such as, for example, the case (p, q, r) = (5, 5, n) with c even, treated in an unpublished note of Darmon and Kraus). We will also not provide information on generalized versions of (1) such as equations of the shape Aap +Bbq = Ccr, where A, B and C are integers whose prime factors lie in a fixed finite set. Regarding the latter, the reader is directed to , , , , , , (for general signatures), , (for signature (p, p, p)), , , , , , (for signature (p, p, 2)), , (for signature (p, p, 3)), and to , , , , and (for various signatures of the shape (n, n, p) with n fixed). In each of these cases, where equation (1) has been treated for an infinite family of exponents, the underlying techniques have been based upon the modularity of Galois representations. The limitations of this approach are unclear at this time, though work of Darmon and Granville (e.g. Proposition 4.2 of ; see also the discussion in ) suggests that restricting attention to Frey-Hellegouarch curves over Q (or, for that matter, to Q-curves) might enable us to treat only signatures which can be related via descent to one of (2) (p, q, r) ∈{(n, n, n), (n, n, 2), (n, n, 3), (2, 3, n), (3, 3, n)} . Of course, as demonstrated by the striking work of Ellenberg (and, to a lesser degree, by Theorems 1 and 2), there are some quite nontrivial examples of equations of the shape (1) which may be reduced to the study of the form Aap + Bbq = Ccr for signatures (p, q, r) in (2). For more general signatures, an ambitious program of Darmon , based upon the arithmetic of Frey-Hellegouarch abelian varieties, holds great promise for the future, though, in its full generality, perhaps not the near future. As for notation, by a newform f, we will always mean a cuspidal newform of weight 2 with respect to Γ0(N) for some positive integer N. This integer N will be called the level of f. 2. The Euclidean case For convenience in the sequel, we will collect together a number of old results on the equation ap + bq = cr in the Euclidean case when 1 p + 1 q + 1 r = 1. Proposition 4. The equations a2 + b6 = c3, a2 + b4 = c4, a4 + b4 = c2 and a3 + b3 = c3 have no solutions in coprime nonzero integers a, b and c. The only solutions to the equation a2+b3 = c6 in coprime nonzero integers a, b and c are with (|a|, b, |c|) = (3, −2, 1). 6 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI Proof. This is standard (and very classical). The equations correspond to the elliptic curves E/Q denoted by 144A1, 32A1, 64A1, 27A1 and 36A1 in Cremona’s notation, respectively. Each of these curves is of rank 0 over Q; checking the rational torsion points yields the desired result. □ 3. Multi-Frey techniques In , the first two authors applied multi-Frey techniques pioneered by Bugeaud, Mignotte and Siksek to the generalized Fermat equation a2 + b6 = cn. In this approach, information derived from one Frey-Hellegouarch curve (in this case, a Q-curve specific to this equation) is combined with that coming from a second such curve (corresponding, in this situation, to the generalized Fermat equation x2 + y3 = zn, with the additional constraint that y is square). In this section, we will employ a similar strategy to treat two new families of generalized Fer-mat equations, the second of which is, in some sense, a “twisted” version of that considered in (though with its own subtleties). A rather more substantial application of such techniques is published separately in , where we discuss the equation a3 + b3n = c2. 3.1. The equation a3 + b6 = cn. Here, we will combine information from Frey-Hellegouarch curves over Q, corresponding to equation (1) for signatures (2, 3, n) and (3, 3, n). We begin by noting a result of Kraus on (1) with (p, q, r) = (3, 3, n). Proposition 5 (Kraus). If a, b and c are nonzero, coprime integers for which a3 + b3 = cn, where n ≥3 is an integer, then c ≡3 (mod 6) and v2(ab) = 1. Actually, Kraus proves this only for n ≥17 a prime. The remaining cases of the above proposition follow from Proposition 4 and the results of and , which yield that there are no nontrivial solutions to the equation above when n ∈{3, 4, 5, 7, 11, 13}. Remark 6. Proposition 5 trivially implies that the equation a3j + b3k = cn has no solutions in coprime nonzero integers a, b and c, provided n ≥3 and the integers j and k each exceed unity. The case with n = 2 remains, apparently, open. Returning to the equation a3 + b6 = cn, we may assume that n > 163 is prime, by appealing to work of Dahmen (for n ∈{5, 7, 11, 13}) and Kraus (for primes n with 17 ≤n ≤163). The GENERALIZED FERMAT EQUATIONS: A MISCELLANY 7 cases n ∈{3, 4} follow from Proposition 4 (alternatively, if n ∈{4, 5}, one can also appeal to work of Bruin ). Applying Proposition 5, we may suppose further that c ≡3 (mod 6) and v2(a) = 1. We begin by considering the Frey-Hellegouarch curve E1 : Y 2 = X3 + bX2 + b2 + a 3 X + b(b2 + a) 9 , essentially a twist of the standard curve for signature (2, 3, n) (see page 530 of Darmon and Granville ). Since 3 | c, noting that v3(a2 −ab2 + b4) ≤1, we thus have v3(a + b2) ≥n −1. It follows, from a routine application of Tate’s algorithm, that E1 has conductor 26 · 3 · Q p, where the product runs through primes p > 3 dividing c (the fact that 3 divides c ensures multiplicative reduction at 3). Here and henceforth, for an elliptic curve E/Q and prime l, we denote by ρE l : Gal(Q/Q) →GL2(Fl) the Galois representation induced from the natural action of Gal(Q/Q) on the l-torsion points of E. Since n > 163, by work of Mazur [54, Theorem 7.1], the representation ρE1 n is irreducible. Appealing to modularity and Ribet’s level lowering , , it follows that the newform attached to E1 is congruent to a newform g of level 26 · 3 = 192. All such newforms are integral and, in particular, have Fourier coefficients satisfying a7(g) ∈{0, ±4}. Considering the curve E1 modulo 7, we find that either 7 | c or that a7(E1) ≡−b3 (mod 7). In the first case, a7(g) ≡±8 (mod n), contradicting the fact that n > 163. If 7 ∤bc, then a7(E1) ≡ ±1 (mod 7) and hence, by the Weil bounds, a7(E1) = ±1, which is incongruent modulo n to any of the choices for a7(g). We therefore conclude that 7 | b. We turn now to our second Frey-Hellegouarch curve, that corresponding to signature (3, 3, n). Following Kraus , we consider E2 : Y 2 = X3 + 3ab1X + a3 −b3 1, b1 = b2. Arguing as in , the newform attached to E2 is congruent modulo n to the unique newform g′ of level 72. Since 7 | b, we find that a7(E2) = ±4, while a7(g′) = 0, an immediate contradiction. We thus may conclude as follows. Proposition 7. If n ≥2 is an integer, then the only solutions to the equation a3 +b6 = cn in nonzero coprime integers a, b and c are given by (n, a, |b|, |c|) = (2, 2, 1, 3). 8 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI 3.2. The equations a2 ± cn = b6. We begin by noting that the cases with n = 3 follow from Proposition 4, while those with n = 4 were treated by Bruin (Theorems 2 and 3). The desired result with n = 7 is immediate from . We will thus suppose, without loss of generality, that there exist coprime nonzero integers a, b and c, with (3) a2 + cn = b6, for n = 5 or n ≥11 prime. We distinguish two cases depending upon the parity of c. Assume first that c is odd. In the factorization b6 −a2 = (b3 −a)(b3 + a), the factors on the right hand side must be odd and hence coprime. We deduce, therefore, the existence of nonzero integers A and B for which b3 −a = An and b3 + a = Bn, where gcd(b, A, B) = 1. This leads immediately to the Diophantine equation An + Bn = 2b3, which, by Theorem 1.5 of , has no coprime solutions for primes n ≥5 and |AB| > 1. It follows that there are no nonzero coprime solutions to equation (3) with c odd. Remark 8. If we write the Frey-Hellegouarch curve used to prove Theorem 1.5 of in terms of a and b, i.e. substitute An = b3 + a, we are led to consider E : Y 2 + 6 b XY + 4(b3 + a)Y = X3. This model has the same c-invariants as, and hence is isomorphic to, the curve given by (4) Y 2 = X3 −3(5b3 −4a)bX + 2(11b6 −14b3a + 2a2). On replacing a by −ia in (4), one obtains the Frey-Hellegouarch Q-curve used for the equation a2+b6 = cn in . Next, assume that c is even. In this case, we can of course proceed as previously, i.e. by factoring b6 −a2, reducing to a generalized Fermat equation (5) An + 2n−2Bn = b3, and considering the Frey-Hellegouarch elliptic curve E1 : Y 2 + 3bXY + AnY = X3. GENERALIZED FERMAT EQUATIONS: A MISCELLANY 9 This approach, as it transpires, again yields a curve isomorphic to (4). By Lemma 3.1 of , the Galois representation on the n-torsion points of E1 is absolutely irreducible for n ≥5, whereby we can apply the standard machinery based on modularity of Galois representations. If one proceeds in this direction, however, it turns out that one ends up dealing with (after level lowering, etc.) newforms of level 54; at this level, we are apparently unable to obtain the desired contradiction, at least for certain n. One fundamental reason why this level causes such problems is the fact that the curve (4), evaluated at (a, b) = (3, 1) or (a, b) = (17, 1), is itself, in each case, a curve of conductor 54. It is, however, still possible to use this approach to rule out particular values of n, appealing to the method of Kraus – we will do so for n = 5 and n = 13. In case n = 5, considering solutions modulo 31 to (5), we find that if 31 ∤AB, then necessarily a31(E1) ∈{−7, −4, 2, 8}, whereby we have, for F1 a newform of level 54, that a31(F1) ≡−7, −4, 2, 8 (mod 5) or a31(F1) ≡±32 (mod 5). Since each such newform is one-dimensional with a31(F1) = 5, we arrive at a contradiction, from which we conclude that equation (3) has no nonzero coprime solutions with n = 5. Similarly, if n = 13 and we consider solutions modulo 53 to (5), we find that a53(E1) ∈{−6, 3, 12} or E1 has multiplicative reduction at 53. This implies that for F1 a newform of level 54, we have a53(F1) ≡−6, 3, 12 (mod 13) or a53(F1) ≡±54 (mod 13). On the other hand, for every such newform F1, a53(F1) = ±9, a contradiction. Equation (3) thus has no nonzero coprime solutions with n = 13. To treat the remaining values of n, we will employ a second Frey-Hellegouarch curve (that for the signature (2, 3, n)). Specifically, to a potential solution (a, b, c) to (3) with n ≥11 and n ̸= 13 prime, we associate the curve given by the Weierstrass equation (6) E2 : Y 2 = X3 −3b2X −2a. This model has discriminant ∆= 2633cn. Note that since c is even, both a and b are odd, whereby it is easy to show that v2(c4) = 4, v2(c6) = 6 and v2(∆) > 12 (since n > 6). These conditions alone are not sufficient to ensure non-minimality of the model at 2 (in contrast to like conditions at an odd prime p). A standard application of Tate’s algorithm, however, shows that for a short Weierstrass model satisfying these conditions either the given model or that obtained by replacing a6 by −a6 (i.e. twisting over Q(√−1)) is necessarily non-minimal. Without loss of generality, replacing a by −a if necessary, we may thus assume that E2 is not minimal at 2. It follows that a minimal model for this curve has v2(c4) = v2(c6) = 0 and v2(∆) > 0, whereby the conductor N(E2) of E2 satisfies v2(N(E2)) = 1. If 3 ∤c, then v3(∆) ≤3 and so v3(N(E2)) ≤3. If 3 | c, then v3(c4) = 2, v3(c6) = 3 and v3(∆) > 6 (since n > 3), which implies that the twist of E2 over either of Q(√±3) has multiplicative reduction at 3, whereby v3(N(E2)) = 2. For any prime p > 3, we see that the model for E2 is minimal 10 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI at p. In particular n | vp(∆min(E2)) for primes p > 3. In conclusion, N(E2) = 2 · 3α Y p|c, p>3 p, α ≤3. In order to apply level lowering, it remains to establish the irreducibility of the representation ρE2 n . Lemma 9. If n ≥11, n ̸= 13 is prime, then ρE2 n is irreducible. Proof. As is well-known (see e.g. [27, Theorem 22]) by the work of Mazur et al, ρE2 n is irreducible if n = 11 or n ≥17, and j(E2) is not one of −215, −112, −11 · 1313, −17 · 3733 217 , −172 · 1013 2 , −215 · 33, −7 · 1373 · 20833, −7 · 113, −218 · 33 · 53, −215 · 33 · 53 · 113, −218 · 33 · 53 · 233 · 293. Since j(E2) = 26 ·33b6/cn, one quickly checks that none of these j-values leads to a solution of (3). □ Remark 10. We note that proving irreducibility of ρE2 n for n = 5, 7, 13 is reduced to studying the Diophantine equation j(E2) = jn(x), where jn(x) is the j-map from X0(n) to X(1). For example, when n = 13, this amounts (after introducing y = a/b3) to finding rational points on a hyperelliptic curve of genus 3 that we can solve (with some work) using standard Chabauty-type techniques. The previous argument then shows that the Frey-Hellegouarch curve E2 can be used as well to solve (5) for n = 13. We leave the details to the interested reader. Using Lemma 9, modularity and level lowering , , we thus arrive at the fact that ρE2 n is modular of level 2 · 3α with α ≤3 (and, as usual, with weight 2 and trivial character). At levels 2, 6 and 18, there are no newforms whatsoever, while at level 54 there are only rational newforms. It follows that there exists a newform f of level 54, with ρE2 n ≃ρf n (equivalently, an elliptic curve F2 of conductor 54 with ρE2 n ≃ρF2 n ). If 5 | c, then E2 has multiplicative reduction at 5 and hence a5(f) ≡±6 (mod n). Since we are assuming that n ≥11, and since a5(f) = ±3, this leads to a contradiction. If 5 ∤c, then E2 has good reduction at 5 and, considering all possible solutions of equation (3) modulo 5, we find that a5(E2) ∈{±4, ±1, 0}. Since a5(f) ≡a5(E2) (mod n) and n ≥11, the resulting contradiction finishes our proof. We have shown Proposition 11. The only solutions to the generalized Fermat equation a2 + δ cn = b6, in coprime nonzero integers a, b and c, with n ≥3 an integer and δ ∈{−1, 1}, are given by (n, |a|, |b|, δc) = (3, 3, 1, −2) (i.e. the Catalan solutions). GENERALIZED FERMAT EQUATIONS: A MISCELLANY 11 Remark 12. In the preceding proof, we saw that the possibilities for ap(f) and ap(E2) are disjoint for p = 5. This does not appear to be the case for any prime p > 5 (and we cannot use p = 2, 3 in this fashion), so, insofar as there is ever luck involved in such a business, it appears that we have been rather lucky here. 4. Covers of spherical equations The spherical cases of the generalized Fermat equation xp+yq = zr are those with signature (p, q, r) satisfying 1 p + 1 q + 1 r > 1 (for integers p, q and r, each exceeding unity). To be precise, they are, up to reordering (i.e. permuting x, y and z and changing their signs), (p, q, r) ∈{(2, 3, 3), (2, 3, 4), (2, 4, 3), (2, 3, 5)} and (p, q, r) = (2, 2, n) or (2, n, 2), for some n ≥2. In each case, the corresponding equations possess infinitely many coprime nonzero integer solutions, given by a finite set of 2-parameter families (see e.g. and ). The explicit parameterizations (with proofs) can be found in Chapter 14 of Cohen . We will have need of those for (p, q, r) = (2, 2, 3), (2, 2, 5), (2, 4, 3) and (3, 3, 2). 4.1. The equation x2 + y2 = z3. If x, y and z are coprime integer solutions to this equation, then we have (see page 466 of ) (7) (x, y, z) = (s(s2 −3t2), t(3s2 −t2), s2 + t2), for coprime integers s and t, of opposite parity. We begin this subsection with some remarks on the Diophantine equation a2 + b2n = c3. This particular family is treated in and in , where, using techniques of Kraus and Chen-Siksek , the following is proved. Theorem 13 (Dahmen ). If n is a positive integer satisfying 3 ≤n ≤107 or n ≡−1 (mod 6), then the Diophantine equation a2 + b2n = c3 has no solutions in nonzero coprime integers a, b and c. Here we recall part of the proof of this theorem for completeness (and future use). Proposition 14. If a, b and c are nonzero coprime integers for which a2 + b2n = c3, where n ≥3 is an integer, then b ≡3 (mod 6). Proof. We may suppose that n ≥7 is prime, since for n = 3, 4 and 5 there are no solutions (see Proposition 4, and ). From (7), if we have coprime integers a, b and c with a2 + b2n = c3, 12 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI there exist coprime integers s and t, of opposite parity, for which bn = t (3s2 −t2), and hence coprime integers B and C, and δ ∈{0, 1}, with t = 3−δBn and 3s2 −t2 = 3δ Cn. If δ = 0 (this is the case when 3 ∤b), it follows that Cn + B2n = 3s2 which, via Theorem 1.1 of , implies a = 0 (and so s = 0). If, on the other hand, we have δ = 1 (so that 3 | b) and b (and hence t) even, then, writing B = 3B1, we have that Cn + 32n−3B2n 1 = s2, with B1 even. Arguing as in , there thus exists a newform of level 6, an immediate contradiction. □ Note that when b ≡3 (mod 6) we are led to the Diophantine equation (8) Cn + 1 27B2n = A2, with A even and BC odd, and hence, via (say) the Frey-Hellegouarch curve (see e.g. ) (9) E : Y 2 = X3 + 2AX2 + B2n 27 X, to a newform of level 96, which we are (presently) unable to rule out for certain n. However, arguing as in and , we can resolve this case for a family of exponents n of natural density 1. We recall these techniques here. 4.2. Quadratic reciprocity. In what follows, we will employ the Hilbert symbol instead of the Legendre symbol, to enable us to treat the prime 2 without modification of our arguments. Recall the (symmetric, multiplicative) Hilbert symbol (, )K : K∗× K∗→{±1} defined by (A, B)K =      1 if z2 = Ax2 + By2 has a nonzero solution in K, −1 otherwise. For concision, we let (, )p, (, ) and (, )∞denote (, )Qp, (, )Q and (, )R, respectively. Note that we have the reciprocity law (10) Y p≤∞ (a, b)p = 1, valid for all nonzero rationals a and b. For an odd prime p, if A = pαu and B = pβv with u and v p-adic units, we further have (11) (A, B)p = (−1)αβ (p−1) 2 u p β v p α . GENERALIZED FERMAT EQUATIONS: A MISCELLANY 13 In particular, for an odd prime p where vp(A) and vp(B) are even, it follows that (A, B)p = 1. When p = 2, we have the following analogous formula: if we write A = 2αu and B = 2βv with u and v 2-adic units, then (A, B)2 = (−1) u−1 2 v−1 2 +α v2−1 8 +β u2−1 8 . Proposition 15. Let r and s be nonzero rational numbers. Assume that vl(r) = 0 for all l | n and that the Diophantine equation A2 −rB2n = s(Cn −B2n) has a solution in coprime nonzero integers A, B and C, with BC odd. Then (r, s(C −B2))2 Y vp(r) odd vp(s) odd 2<p<∞ (r, s(C −B2))p = 1. Proof. Let us begin by noting that, by the reciprocity law (10), we have (12) (r, s(C −B2))2 Y vp(r) odd, vp(s) odd, 2<p<∞ (r, s(C −B2))p = (r, s(C −B2))∞ Y vp(r) even, vp(s) odd, 2<p<∞ (r, s(C −B2))p. Since we suppose A2 = rB2n + s(Cn −B2n) · 12, it follows that (r, s(Cn −B2n))p = 1, for all primes p ≤∞. Therefore (r, s(C −B2))p = (r, Cn−1 + · · · + B2n−2)p. Since Cn−1 + · · · + B2n−2 > 0, we also have (r, s(C −B2))∞= 1. Now, assume that vp(r) is even for an odd prime p. If vp(s(C −B2)) is also even then, by equation (11), we have that (r, s(C −B2))p = 1. If vp(s(C −B2)) is odd, but p ∤n then vp(Cn−1 + · · · + B2n−2) = 0, which implies that (r, s(C −B2))p = (r, Cn−1 + · · · + B2n−2)p = 1. When p | n and vp(s(C −B2)) is odd, since we are assuming that r is a p-unit and since A, B and C are coprime, it follows that A2 ≡rB2n (mod p), and hence  r p  = 1. Appealing again to equation (11), we conclude that (r, s(C −B2))p = 1, as desired. □ 14 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI This proposition provides us with an extra constraint upon C/B2 (mod r) to which we can appeal, at least on occasion, to rule out exponents n in certain residue classes. If we suppose that we have a solution to equation (8) in integers A, B, C and n with A even and BC odd, we can either add or subtract B2n from both sides of the equation in order to apply the above proposition. Subtracting B2n (this is the case treated in ), we obtain A2 −28 27B2n = Cn −B2n. Here we have r = 28 27 and s = 1, and, via Proposition 15 (supposing that n ≡−1 (mod 6) and appealing to to treat the cases with 7 | n), may conclude that (28/27, C −B2)2(28/27, C −B2)3(28/27, C −B2)7 = 1. Since 3 | B, the quantity Cn is a perfect square modulo 3 and so (28/27, C −B2)3 = 1. Also, since Cn−1 + · · · + B2n−2 is odd, we may compute that (28/27, C −B2)2 = (28/27, Cn −B2n)2 = 1. If 7 | C −B2 then necessarily 7 | A, whereby 0 = a7(E) ̸≡−4 (mod n), an immediate contradiction. Therefore 7 ∤C −B2, and so (13) 1 = (28/27, C −B2)7 = C −B2 7  . On the other hand, since each elliptic curve E/Q of conductor 96 has a7(E) = ±4, computing the corresponding Fourier coefficient for our Frey-Hellegouarch curve (9), we find that A2 ≡B2n (mod 7) (where A ̸≡0 (mod 7)). It follows from (8) that (C/B2)n ≡2 (mod 7). Since n ≡−1 (mod 6), we therefore have C/B2 −1 ≡ 3 (mod 7), contradicting (13). This proves the second part of Theorem 13. Similarly, adding B2n to both sides of equation (8), we have A2 + 26 27B2n = Cn + B2n = −((−C)n −B2n), where we suppose that n ≡3 (mod 4) is prime (so that, via Theorem 13, n ≡7 (mod 12)). We may thus apply Proposition 15 with r = −26/27 and s = −1 to conclude that Y p|78 (−26/27, s((−C) −B2))p = Y p|78 (−78, C + B2)p = 1. GENERALIZED FERMAT EQUATIONS: A MISCELLANY 15 As before, we find that (−78, C + B2)3 = 1. Since each elliptic curve E/Q of conductor 96 has a13(E) = ±2, we thus have, via (9),                            A ≡±1 (mod 13), B2n ≡4, 9, 10 or 12 (mod 13), or A ≡±2 (mod 13), B2n ≡1, 3, 9 or 10 (mod 13), or A ≡±3 (mod 13), B2n ≡3, 4, 10 or 12 (mod 13), or A ≡±4 (mod 13), B2n ≡1, 4, 10 or 12 (mod 13), or A ≡±5 (mod 13), B2n ≡1, 3, 4 or 9 (mod 13), or A ≡±6 (mod 13), B2n ≡1, 3, 9 or 12 (mod 13), whereby (C/B2)n ≡2, 3, 9 or 11 (mod 13) and hence from n ≡7 (mod 12), C/B2 ≡2, 3, 9 or 11 (mod 13). It follows that (−78, C + B2)13 = 1, whereby (−78, C + B2)2 = 1. We also know that A is even, while BC is odd, whence C + B2 ≡2 (mod 4). It follows from (−78, C + B2)2 = 1 that C/B2 + 1 ≡±2 (mod 16), and so C/B2 ≡1 or 13 (mod 16). If we now assume that v2(A) > 1, then equation (8) implies that Cn ≡−3B2n (mod 16) (and so necessarily C/B2 ≡13 (mod 16)). Our assumption that n ≡3 (mod 4) thus implies (C/B2)n ≡5 (mod 16), a contradiction. In conclusion, appealing to Proposition 4 in case 3 | n, we have Proposition 16. If n ≡3 (mod 4) and there exist nonzero coprime integers a, b and c for which a2 + b2n = c3, then v2(a) = 1. In particular, if m ≥2 is an integer and n ≡3 (mod 4), then the equation a2m + b2n = c3 has no solution in nonzero coprime integers a, b and c. 4.2.1. The equation a2 + b2n = c9. The case n = 2 was handled previously by Bennett, Ellenberg and Ng , while the case n = 3 is well known (see Proposition 4). We may thereby suppose that n ≥5 is prime. Applying Proposition 14 and (7), there thus exist coprime integers s and t, with s even and t ≡3 (mod 6), for which bn = t (3s2 −t2) and c3 = s2 + t2. We can therefore find coprime A, B ∈Z with t = 3n−1 An and 3s2 −t2 = 3 Bn, whence Bn + 4 · 32n−3A2n = c3. Via Lemma 3.4 of , for prime n ≥5 this leads to a newform of level 6, a contradiction. We thus have Proposition 17. If n is an integer with n ≥2, then the equation a2 + b2n = c9 has no solutions in nonzero coprime integers a, b and c. 16 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI 4.3. The equation x2 + y2 = z5. If x, y and z are coprime integers satisfying x2 + y2 = z5, then (see page 466 of ) there exist coprime integers s and t, of opposite parity, with (14) (x, y, z) = (s(s4 −10s2t2 + 5t4), t(5s4 −10s2t2 + t4), s2 + t2). The following result is implicit in ; we include a short proof for completeness. Proposition 18. If a, b and c are nonzero coprime integers for which a2 + b2n = c5, where n ≥2 is an integer, then b ≡1 (mod 2). Proof. The cases n = 2, 3 and 5 are treated in , and , respectively. We may thus suppose that n ≥7 is prime. From (14), there are coprime integers s and t, of opposite parity, for which bn = t (5s4 −10s2t2 + t2). There thus exist integers A and B, and δ ∈{0, 1}, with t = 5−δAn and 5s4 −10s2t2 + t4 = 5δ Bn. It follows that (15) 5δ Bn + 4 · 5−4δA4n = 5(s2 −t2)2. If b is even (whereby the same is true of t and A) and δ = 1, then again arguing as in , we deduce the existence of a newform of level 10, a contradiction. If, however, b is even and δ = 0, the desired result is an immediate consequence of Theorem 1.2 of . □ 4.3.1. The equation a2 + b2n = c10. As noted earlier, we may suppose that n ≥7 is prime and, from Proposition 18, that b is odd. Associated to such a solution, via the theory of Pythagorean triples, there thus exist coprime integers u and v, of opposite parity, with (16) bn = u2 −v2 and c5 = u2 + v2. Hence, we may find integers A and B with u −v = An and u + v = Bn. From the second equation in (16) and from (14), there exist coprime integers s and t, of opposite parity, with u −v = (s −t) s4 −4s3t −14s2t2 −4st3 + t4 . Since (s −t)4 − s4 −4s3t −14s2t2 −4st3 + t4 = 20s2t2, GENERALIZED FERMAT EQUATIONS: A MISCELLANY 17 it follows that gcd(s −t, s4 −4s3t −14s2t2 −4st3 + t4) | 5. Similarly, we have u + v = (s + t) s4 + 4s3t −14s2t2 + 4st3 + t4 where gcd(s+t, s4 +4s3t−14s2t2 +4st3 +t4) also divides 5. Since s and t are coprime, we cannot have s−t ≡s+t ≡0 (mod 5) and so may conclude that at least one of gcd(s−t, s4−4s3t−14s2t2−4st3+t4) or gcd(s + t, s4 + 4s3t −14s2t2 + 4st3 + t4) is equal to 1. There thus exist integers X and Y such that either (Xn, Y n) = (s −t, s4 −4s3t −14s2t2 −4st3 + t4) or (s + t, s4 + 4s3t −14s2t2 + 4st3 + t4). In either case, X4n −Y n = 5(2st)2 which, with Theorem 1.1 of , contradicts st ̸= 0. In conclusion, Proposition 19. If n is an integer with n ≥2, then the equation a2 + b2n = c10 has no solutions in nonzero coprime integers a, b and c. 4.3.2. The equation a2+b2n = c15. As before, we may suppose that n ≥7 is prime. Using Proposition 14, we may also assume that b ≡3 (mod 6). Appealing to our parametrizations for x2 + y2 = z5 (i.e. equation (14)), we deduce the existence of a coprime pair of integers (s, t) for which bn = t (5s4 −10s2t2 + t4) and c3 = s2 + t2. Since s and t are coprime, it follows that 5s4−10s2t2+t4 ≡±1 (mod 3), whereby 3 | t. There thus exist integers A and B, and δ ∈{0, 1} satisfying equation (15), with the additional constraint that 3 | A. It follows that the corresponding Frey-Hellegouarch curve has multiplicative reduction at the prime 3, but level lowers to a newform of level N = 40 or 200 (depending on whether δ = 1 or 0, respectively). This implies the existence of a form f at one of these levels with a3(f) ≡±4 (mod n). Since all such forms are one dimensional and have a3(f) ∈{0, ±2, ±3}, it follows that n = 7, contradicting the main result of . We thus have Proposition 20. If n is an integer with n ≥2, then the equation a2 + b2n = c15 has no solutions in nonzero coprime integers a, b and c. 4.4. The equation x2 +y4 = z3. Coprime integer solutions to this equation satisfy one of (see pages 475–477 of ) (17)          x = 4ts s2 −3t2 s4 + 6s2t2 + 81t4 3s4 + 2s2t2 + 3t4 y = ±(s2 + 3t2) s4 −18s2t2 + 9t4 z = (s4 −2t2s2 + 9t4)(s4 + 30t2s2 + 9t4), 18 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI (18)          x = ±(4s4 + 3t4)(16s8 −408t4s4 + 9t8) y = 6ts(4s4 −3t4) z = 16s8 + 168t4s4 + 9t8, (19)          x = ±(s4 + 12t4)(s8 −408t4s4 + 144t8) y = 6ts(s4 −12t4) z = s8 + 168t4s4 + 144t8, or (20)                      x = ±2(s4 + 2ts3 + 6t2s2 + 2t3s + t4) 23s8 −16ts7 −172t2s6 −112t3s5 −22t4s4 −112t5s3 −172t6s2 −16t7s + 23t8 y = 3(s −t)(s + t)(s4 + 8ts3 + 6t2s2 + 8t3s + t4) z = 13s8 + 16ts7 + 28t2s6 + 112t3s5 + 238t4s4 +112t5s3 + 28t6s2 + 16t7s + 13t8. Here, s and t are coprime integers satisfying                s ̸≡t (mod 2) and s ≡±1 (mod 3), in case (17), t ≡1 (mod 2) and s ≡±1 (mod 3), in case (18), s ≡1 (mod 2) and s ≡±1 (mod 3), in case (19), s ̸≡t (mod 2) and s ̸≡t (mod 3), in case (20). Since work of Ellenberg (see also ) treats the case where z is an nth power (and more), we are interested in considering equations corresponding to x = an or y = bn. We begin with the former. 4.4.1. The equation a2n+b4 = c3. The case n = 2 follows (essentially) from work of Lucas; see Section 5. We may thus suppose that n ≥3. We appeal to the parametrizations (17) – (20), with x = an. In (17) and (20), we have a even, while, in (18) and (19), a is coprime to 3. Applying Proposition 14 leads to the following desired conclusion. Proposition 21. If n is an integer with n ≥2, then the equation a2n + b4 = c3 has no solutions in nonzero coprime integers a, b and c. 4.4.2. The equation a2 + b4n = c3. For this equation, with n ≥2 an integer, Proposition 14 implies that we are in case (20), i.e. that there exist integers s and t for which (21) bn = 3(s −t)(s + t)(s4 + 8s3t + 6s2t2 + 8st3 + t4), s ̸≡t (mod 2), s ̸≡t (mod 3). GENERALIZED FERMAT EQUATIONS: A MISCELLANY 19 Assuming n is odd, we thus can find integers A, B and C with s −t = An, s + t = 1 3Bn and s4 + 8s3t + 6s2t2 + 8st3 + t4 = Cn. It follows that (22) A4n −1 27B4n = −2Cn, with ABC odd and 3 | B. There are (at least) three Frey-Hellegouarch curves we can attach to this Diophantine equation : E1 : Y 2 = X(X −A4n)  X −B4n 27  , E2 : Y 2 = X3 + 2A2nX2 −2CnX, E3 : Y 2 = X3 −2B2n 27 X2 + 2Cn 27 X. Although the solution (A4n, B4n, Cn) = (1, 81, 1) does not persist for large n, it still appears to cause an obstruction to resolving this equation fully using current techniques: none of the Ei have complex multiplication, nor can we separate out this solution using images of inertia at 3 or other primes dividing the conductor. In terms of the original equation, the obstructive solution is (±46)2 +(±3)4 = 133. Incidentally, this is the same obstructive solution which prevents a full resolution of a2+b2n = c3. By Theorem 13, we may assume that every prime divisor l of n exceeds 106, which implies that ρEi l is, in each case, irreducible. Applying level lowering results, we find that the newform attached to Ei is congruent to a newform fi of level Ni, where Ni =            96 i = 1, 384 i = 2, 1152 i = 3. The latter two conductor calculations can be found in and the former in . Since l > 106, all the fi’s with noninteger coefficients can be ruled out, after a short computation. This implies that there is an elliptic curve Fi with conductor Ni such that ρFi l ≃ρEi l . Furthermore, Ei must have good reduction at primes 5 ≤p ≤53 (again after a short calculation using the fact that l > 106). Adding 2B4n to both sides of equation (22), we have A4n + 53 27B4n = 2(−Cn + B4n) and hence, via Proposition 15, (−53/27, 2(−C + B4))2(−53/27, 2(−C + B4))3(−53/27, 2(−C + B4))53 = 1. 20 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI Since −2Cn ≡A4n (mod 3), we have (−53/27, 2(−C + B4))3 = 1. Also, since −53/27 ≡1 (mod 8), it is a perfect square in Q2, which implies that (−53/27, 2(−C + B4))2 = 1. Therefore (−53/27, 2(−C + B4))53 = 1, i.e. −C/B4 + 1 is a quadratic nonresidue modulo 53. Since all the elliptic curves F1 of conductor 96 have a53(F1) = 10 (whereby, from l > 106, a53(E1) = 10), if follows that (A4/B4)n ≡36 (mod 53). Therefore (−C/B4)n ≡17 (mod 53). If n ≡±9, ±11, ±15, ±17 (mod 52) then (−C/B4)n = (α −1)n ̸≡17 (mod 53) for any choice of quadratic nonresidue α. It follows that if n ≡±2, ±4 (mod 13), equation (22) has no solution with ABC odd and 3 | B. Similarly, if we subtract 2B2n from both sides of equation (22), we obtain A4n −55 27B4n = 2(−Cn −B4n). Proposition 15 thus implies (55/27, 2(−C −B4))2 (55/27, 2(−C −B4))3 (55/27, 2(−C −B4))5 (55/27, 2(−C −B4))11 = 1. As before we have (55/27, 2(−C −B4))3 = 1 and since 55/27 ≡1 (mod 4) and Cn−1 + · · · + B4n−4 is odd, also (55/27, Cn−1 + · · · + B4n−4)2 = (55/27, 2(−C −B4))2 = 1. Similarly, since (A4/B4)n ≡ 1 (mod 5), it follows that (−C/B4)n ≡−1 (mod 5), whereby, since n is odd, −C/B4 ≡−1 (mod 5). Therefore (55/27, 2(−C−B4))5 = 1, which implies (55/27, 2(−C−B4))11 = 1. In particular −C/B4 ≡ λ (mod 11) where (23) λ ∈{0, 1, 3, 7, 8, 9}. We can rule out λ = 0 and 1 since we are assuming that 11 ∤ABC. To treat the other cases, we will apply the Chen-Siksek method to the curves E2 and E3. We first show that a11(E2) = −4. Notice that considering all possible solutions to equation (22) modulo 13, necessarily a13(E2) = −6 (since we assume that 13 ∤ABC). Observe also that E2 has nonsplit multiplicative reduction at 3. Therefore ρE2 n |G3 ≃ρF2 n |G3 ≃  χϵ ∗ 0 ϵ   where χ is the cyclotomic character and ϵ : G3 →F∗ n is the unique unramified quadratic character (see, for example, ). It follows that F2 must have nonsplit multiplicative reduction at 3 and hence GENERALIZED FERMAT EQUATIONS: A MISCELLANY 21 F2 must be isogenous to the elliptic curve 384D in the Cremona’s database. In particular,we have a11(E2) = −4 and so A2n B2n ≡1, 5 (mod 11). When A2n/B2n ≡1 (mod 11), we find, by direct computation, that a11(E3) = 0, contradicting the fact that a11(E) ∈{±2, ±4} for every elliptic curve E/Q of conductor 1152. Therefore, we necessarily have A2n B2n ≡5 (mod 11) = ⇒ −C B4 n ≡8 (mod 11), whereby λn ≡8 (mod 11). A quick calculation shows, however, that for n ≡±3 (mod 10), this contradicts (23). Collecting all this together, we conclude as follows (noting the solution coming from (p, q, r) = (2, 8, 3); see Bruin ). Proposition 22. If n is a positive integer with either n ≡±2 (mod 5) or n ≡±2, ±4 (mod 13), then the equation a2 +b4n = c3 has only the solution (a, b, c, n) = (1549034, 33, 15613, 2) in positive coprime integers a, b and c. Remark 23. The table of results regarding equation (1) given on page 490 of Cohen lists the case of signature (2, 4n, 3) as solved, citing work of the first two authors. This is due to an over-optimistic communication of the first author to Professor Cohen. We regret any inconvenience or confusion caused by this mistake. Remark 24. Regarding the Diophantine equation (22) as an equation of signature (2, 4, n), we can attach the Frey-Hellegouarch Q-curves E4 : Y 2 = X3 + 4BnX2 + 2(B2n + 3 √ 3A2n)X and E5 : Y 2 = X3 + 4AnX2 + 2  A2n + 1 3 √ 3B2n  X. One further Frey-Hellegouarch Q-curve can be derived as follows. Defining U = (A4n + B4n/27)/2 = 2(s4 + 2s3t + 6s2t2 + 2st3 + t4) we have U 2 −1 27A4nB4n = C2n. 22 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI Considering this as an equation of signature (n, n, 2) turns out to give us the Frey-Hellegouarch curve E1 again. Writing V = AnBn/3 and W = C2, we arrive at the generalized Fermat equation of signature (2, 4, n) U 2 −3V 4 = W n in nonzero coprime integers U, V and W, with 3 | V and v2(U) = 1. As before, we can associate a Q-curve to this equation. Note that the solution (A4n, B4n, Cn) = (1, 81, 1) does not satisfy our desired 3-adic properties. However, it still apparently forms an obstruction using current techniques to solving this equation in full generality for all Frey-Hellegouarch (Q-)curves we have considered. 4.5. The equation x3 + y3 = z2. From (pages 467 – 470), the coprime integer solutions to this equation satisfy one of (24)          x = s(s + 2t)(s2 −2ts + 4t2) y = −4t(s −t)(s2 + ts + t2) z = ±(s2 −2ts −2t2)(s4 + 2ts3 + 6t2s2 −4t3s + 4t4), (25)          x = s4 −4ts3 −6t2s2 −4t3s + t4 y = 2(s4 + 2ts3 + 2t3s + t4) z = 3(s −t)(s + t)(s4 + 2s3t + 6s2t2 + 2st3 + t4), or (26)          x = −3s4 + 6t2s2 + t4 y = 3s4 + 6t2s2 −t4 z = 6st(3s4 + t4). Here, the parametrizations are up to exchange of x and y, and s and t are coprime integers with          s ≡1 (mod 2) and s ̸≡t (mod 3), in case (24), s ̸≡t (mod 2) and s ̸≡t (mod 3), in case (25), s ̸≡t (mod 2) and t ̸≡0 (mod 3), in case (26). 4.5.1. The equation a3 +b3 = c2n. The cases n ∈{2, 3, 5} follow from and Proposition 4. We may thus suppose that n ≥7 is prime. Since Proposition 5 implies c ≡3 (mod 6), it follows that cn = 3(s −t)(s + t)(s4 + 2s3t + 6s2t2 + 2st3 + t4), GENERALIZED FERMAT EQUATIONS: A MISCELLANY 23 for s and t coprime integers with s ̸≡t (mod 2) and s ̸≡t (mod 3). There thus exist integers A, B and C with s −t = An, s + t = 3n−1 Bn and s4 + 2s3t + 6s2t2 + 2st3 + t4 = Cn, whereby A4n + 34n−3B4n = 4 Cn, which we rewrite as 4 Cn −A4n = 3 32n−2 B2n2 . Applying Theorem 1.2 of to this last equation, we may conclude, for n ≥7 prime, that either ABC = 0 or 32n−2 B2n = ±1, in either case a contradiction. We thus have Proposition 25. If n is an integer with n ≥2, then the equation a3 + b3 = c2n has no solutions in nonzero coprime integers a, b and c. 4.5.2. The equation a3 + b3n = c2. The techniques involved in this case require some of the most elaborate combination of ingredients to date, including Q-curves and delicate multi-Frey and image of inertia arguments. For this reason, we have chosen to publish this separately in . Our main result there is as follows. Theorem 26 (). If n is prime with n ≡1 (mod 8), then the equation a3+b3n = c2 has no solutions in coprime nonzero integers a, b and c, apart from those given by (a, b, c) = (2, 1, ±3). 4.6. Other spherical equations. Solutions to the generalized Fermat equation with icosahedral signature (2, 3, 5) correspond to 27 parametrized families, in each case with parametrizing forms of degrees 30, 20 and 12 (see e.g. ). We are unable to apply the techniques of this paper to derive much information of value in this situation (but see ). 5. Historical notes on the equations a4 ± b4 = c3 In , it is proved that the generalized Fermat equation (1) with (p, q, r) = (n, n, 3), has no coprime, nonzero integer solutions a, b and c, provided n ≥7 is prime (and assuming the modularity of elliptic curves over Q with conductor divisible by 27, now a well known theorem ). To show the nonexistence of solutions for all integers n ≥3, it suffices, in addition, to treat the cases n = 3, 4 and 5; the first of these is classical and was (essentially) solved by Euler (see Proposition 4), while the last was handled by Poonen in . The case n = 4 is attributed in and , citing [34, p. 630], to the French mathematician ´ Edouard Lucas (1842–1891), in particular to and [53, Chapitre III]. 24 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI In these two papers, as well as in other work of Lucas [42, pp. 282–288], there does not appear to be, however, any explicit mention of the equation (27) a4 + b4 = c3, a, b, c ∈Z, abc ̸= 0, gcd(a, b, c) = 1. In this section, we will attempt to indicate why, despite this, the aforementioned attributions are in fact correct. It is worth mentioning that the equations a4 ±b4 = c3 are also explicitly solved in Cohen (as Proposition 14.6.6). 5.1. Reduction to elliptic generalized Fermat equations. First of all, it is quite elementary to reduce the nonexistence of solutions to (27) (or, analogously, the equation a4 −b4 = c3; in the sequel, we will not discuss this latter equation further) to the nonexistence of solutions to certain elliptic generalized Fermat equations of signature (4, 4, 2). To carry this out, we note that a solution in integers a, b and c to (27) implies, via (7) (and changing the sign of t), the existence of nonzero coprime integers s and t for which a2 = s(s2 −3t2) (28) b2 = t(t2 −3s2) (29) (and c = s2 + t2). Without loss of generality, we assume that 3 ∤s. Then gcd(s, s2 −3t2) = 1 and, from (28), we have s = ϵ1α2 (30) s2 −3t2 = ϵ1β2 (31) for some nonzero integers α, β and ϵ1 ∈{±1}. Using gcd(t, t2 −3s2) ∈{1, 3} and (29), we have t = ϵ2γ2 (32) t2 −3s2 = ϵ2δ2 (33) for nonzero integers γ, δ and ϵ2 ∈{±1, ±3}. Examining (31) or (33) modulo 4, shows that ϵ1, ϵ2 ̸≡ −1 (mod 4). Considering these equations simultaneously modulo 8, now shows that ϵ2 ̸= 1. It follows that we have ϵ1 = 1 and ϵ2 = −3. Substituting (30) and (32) in (31) now yields (34) α4 −27γ4 = β2, GENERALIZED FERMAT EQUATIONS: A MISCELLANY 25 while substituting (30) and (32) in (33) yields (35) α4 −3γ4 = δ2. 5.2. Relation to work of Lucas. In the the preceding subsection, we showed that in order to prove that there are no solutions to (27), it suffices to demonstrate that one of the Diophantine equations (34) or (35) does not have solutions in nonzero integers. In [52, Chapitre I] and [53, Chapitre III], Lucas studied the Diophantine equation Ax4 +By4 = Cz2 in unknown integers x, y, z, using Fermat’s method of descent. Here, A, B and C are integers whose prime divisors are contained in {2, 3}. His chief concern, however, was not with explicitly showing that a given equation of this shape has no nontrivial solutions, but rather in describing nontrivial solutions in the cases where they exist. In [52, Chapitre I, §X] a description of all the equations Ax4 + By4 = Cz2 as above that do have nontrivial solutions is recorded, together with a reference to the explicit solutions. For the other equations Ax4 + By4 = Cz2, including (34) and (35), it is simply stated that there are no nontrivial solutions, without explicit proof of this fact. In these references, however, Lucas clearly demonstrates his mastery of Fermat’s method of descent and one can check that this method indeed applies immediately to prove the nonexistence of nontrivial solutions in these cases. This provides convincing evidence that Lucas had proofs for his claims that there are no nontrivial solutions to (34) and (35), amongst others (which he failed to record, apparently as he considered these cases to be lacking in interest!). 6. Future work A problem of serious difficulty that likely awaits fundamentally new techniques is that of solving equation (1) for, say, fixed r and infinite, unbounded families p and q, with gcd(p, q) = 1. A truly spectacular result at this stage would be to solve an infinite family where p, q and r are pairwise coprime. Indeed, solving a single new equation of this form will likely cost considerable effort using current techniques. A limitation of the modular method at present is that the possible exponents (p, q, r) must relate to a moduli space of elliptic curves. When this precondition holds, the modular method can be viewed as a method which reduces the problem of resolving (1) to that of certain rational points on these moduli spaces through Galois representations. The inability to carry out the modular method in such a situation relates to a lack of sufficiently strong methods for effectively bounding these rational points (i.e. Mazur’s method fails or has not been developed). We note however that irreducibility is easier because the Frey-Hellegouarch curves will have semi-stable reduction away from small primes - this allows and for instance to prove irreducibility without resort to a Mazur type result 26 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI (essentially, a method of Serre [61, p. 314, Corollaire 2] which predates and is used in suffices with some extra effort). For general (p, q, r), constructs Frey-Hellegouarch abelian varieties of GL2-type over a totally real field and establishes modularity in some cases; the analogous modular curves are in general quotients of the complex upper half plane by non-arithmetic Fuchsian groups. The ABC conjecture implies that there are only finitely many solutions to (1) in coprime integers once min {p, q, r} ≥3. In addition, an effective version of the ABC conjecture would imply an effective bound on the size of the solutions, though this effectivity needs to be within computational range to allow a complete quantitative resolution of (1). References M. Bennett. The equation x2n + y2n = z5, J. Th´ eor. Nombres Bordeaux 18 (2006), no. 2, 315–321. M. Bennett and I. Chen. Multi-Frey Q-curves and the Diophantine equation a2 + b6 = cn, Algebra and Number Theory 6 (2012), no. 4, 707–730. M. Bennett, I. Chen, S. Dahmen and S. Yazdani. On the equation a3 + b3n = c2, preprint. M. Bennett and S. Dahmen. Klein forms and the generalized superelliptic equation, Ann. of Math. 177 (2013), no. 1, 171–239. M. Bennett, J. Ellenberg and N. Ng. The Diophantine equation A4 + 2δB2 = Cn, Int. J. Number Theory 6 (2010), 311–338. M. Bennett, F. Luca and J. Mulholland. Twisted extensions of the cubic case of Fermat’s last theorem, Ann. Sci. Math. Qu´ ebec 35 (2011), 1–15. M. Bennett and J. Mulholland. On the Diophantine equation xn + yn = 2αpz2, C. R. Math. Acad. Sci. Soc. R. Can. 28 (2006), 6–11. M. Bennett and C. Skinner. Ternary Diophantine equations via Galois representations and modular forms, Canad. J. Math. 56 (2004), 23–54. M. Bennett, V. Vatsal and S. Yazdani. Ternary Diophantine equations of signature (p, p, 3), Compos. Math. 140 (2004), 1399–1416. F. Beukers. The Diophantine equation Axp + Byq = Czr, Duke Math. J. 91 (1998), 61–88. F. Beukers. The generalized Fermat equation, see : N. Billerey and L.V. Dieulefait. Solving Fermat-type equations x5 + y5 = dzp, Math. Comp. 79 (2010),535–544. C. Breuil, B. Conrad, F. Diamond and R. Taylor. On the modularity of elliptic curves over Q: wild 3-adic exercises, J. Amer. Math. Soc.14 No. 4 (2001), 843–939. D. Brown. Primitive Integral Solutions to x2 + y3 = z10, Int. Math. Res. Not. IMRN 2012, no. 2, 423–436. N. Bruin. The Diophantine equations x2 ± y4 = ±z6 and x2 + y8 = z3, Compos. Math. 118 (1999), 305–321. N. Bruin. On powers as sums of two cubes, In Algorithmic Number Theory (Leiden, 2000), Lecture Notes in Comput. Sci., vol 1838, Springer, Berlin, 2000, pp. 169–184. N. Bruin. Chabauty methods using elliptic curves, J. Reine Angew. Math. 562 (2003), 27–49. GENERALIZED FERMAT EQUATIONS: A MISCELLANY 27 N. Bruin. The primitive solutions to x3 + y9 = z2, J. Number Theory 111 (2005), no. 1, 179–189. Y. Bugeaud, M. Mignotte and S. Siksek. A multi-Frey approach to some multi-parameter families of Diophantine equations, Canad. J. Math. 60 (2008), 491–519. I. Chen. On the equation s2 + y2p = α3, Math. Comp. 77 (2008), 1223–1227. I. Chen. On the equation a2 + b2p = c5, Acta Arith. 143 (2010), 345–375. I. Chen. On the equation a2 −2b6 = cp, LMS J. Comput. Math. 15 (2012), no. 1, 158–171. I. Chen and S. Siksek. Perfect powers expressible as sums of two cubes, J. Algebra 322 (2009), no. 3, 638–656. H. Cohen. Number Theory, Vol. II : Analytic and Modern Tools, Springer-Verlag, GTM 240, 2007. A. Dabrowski. On integers represented by x4 −y4, Bull. Austral. Math. Soc. 76 (2007), 133–136. A. Dabrowski. On a class of generalized Fermat equations, Bull. Austral. Math. Soc. 82 (2010), 505–510. S. Dahmen. Classical and modular methods applied to Diophantine equations, PhD thesis, University of Utrecht, 2008. Permanently available at S. Dahmen. A refined modular approach to the Diophantine equation x2 + y2n = z3, Int. J. Number Theory 7 (2011), no. 5, 1303–1316. S. Dahmen and S. Siksek. Perfect powers expressible as sums of two fifth or seventh powers, preprint. H. Darmon. Rigid local systems, Hilbert modular forms, and Fermat’s Last Theorem, Duke. Math. J. 102 (2000), 413–449. H. Darmon, F. Diamond and R. Taylor. Fermat’s Last Theorem, In Elliptic curves, modular forms & Fermat’s Last Theorem (Hong Kong, 1993), pages 2–140. International Press, 1997. H. Darmon and A. Granville. On the equations zm = F(x, y) and Axp + Byq = Czr, Bull. London Math. Soc. 27 (1995), 513–543. H. Darmon and L. Merel. Winding quotients and some variants of Fermat’s Last Theorem, J. Reine Angew. Math. 490 (1997), 81–100. L.E. Dickson. History of the theory of numbers, Vol. II: Diophantine analysis, Chelsea Publishing Co., New York, 1971. L.V. Dieulefait and N. Freitas. The Fermat-type equations x5 + y5 = 2zp and x5 + y5 = 3zp solved via Q-curves, Math. Comp., to appear. L.V. Dieulefait and N. Freitas. Fermat-type equations of signature (13, 13, p) via Hilbert cuspforms, Math. Ann., to appear. L.V. Dieulefait and J.J. Urroz. Solving Fermat-type equations x4 + dy2 = zp via modular Q-curves over polyquadratic fields, J. Reine Angew. Math, 633 (2009),183-195. J. Edwards. A complete solution to X2 + Y 3 + Z5 = 0, J. Reine Angew. Math. 571 (2004), 213–236. J. Ellenberg. Galois representations attached to Q-curves and the generalized Fermat equation A4 + B2 = Cp, Amer. J. Math. 126 (2004), 763–787. N. Freitas. Recipes to Fermat-type equations of the form xr + yr = Czp, preprint. E. Halberstadt and A. Kraus. Courbes de Fermat : r´ esultats and problemes, J. Reine Angew. Math. 548 (2002), 167–234. 28 MICHAEL A. BENNETT, IMIN CHEN, SANDER R. DAHMEN AND SOROOSH YAZDANI D. Harkin. On the mathematical work of Francois-´ Edouard-Anatole Lucas, Enseignement Math. (2) 3 1957, 276– 288. W. Ivorra. Sur les ´ equations xp + 2βyp = z2 et xp + 2βyp = 2z2, Acta Arith. 108 (2003), 327–338. W. Ivorra. Sur les courbes hyperelliptiques cyclotomiques et les ´ equations xp −yp = cz2, Dissertationes Math. 444 (2007), 46pp. W. Ivorra and A. Kraus. Quelques r´ esultats sur les ´ equations axp +byp = cz2, Canad. J. Math. 58 (2006), 115–153. A. Kraus. Sur les ´ equations ap + bp + 15cp = 0 et ap + 3bp + 5cp = 0, C. R. Acad. Sci. Par. S´ er. I Math. 322 (1996), 809–812. A. Kraus. Majorations effectives pour l’´ equation de Fermat g´ en´ eralis´ ee, Canad. J. Math. 49 (1997), no. 6, 1139– 1161. A. Kraus. Sur l’´ equation a3 + b3 = cp, Experiment. Math. 7 (1998), 1–13. A. Kraus. On the equation xp + yq = zr : a survey, Ramanujan J. 3 (1999), 315–333. A. Kraus. Une question sur les ´ equations xm −ym = Rzn, Compos. Math. 132 (2002), 1–26. K. Krawciow. On generalized Fermat equations of signature (p, p, 3), Colloq. Math. 123 (2011), 49–52. ´ E. Lucas. Recherches sur l’analyse ind´ etermin´ ee et l’arithm etique de Diophante, extrait du Bulletin de la Soci´ et´ e d’´ emulation du D´ epartement de l’Allier, 12, 1873, 441–532; Moulins, 1873, imprimerie de C. Desrosiers. Online at ´ E. Lucas. Recherches sur plusieurs ouvrages de L´ eonard de Pise et sur diverses questions d’arithmtique suprieure, extrait du Bullettino di Bibliografia e di Sioria delle Scienze matematiche e fisiche, 10, 1877, 129–193 and 239–293; Rome, 1877, imprimerie des sciences math´ ematiques et physiques. Online at B. Mazur. Rational isogenies of prime degree, Invent. Math. 44 (1978), no. 2, 129–162. R. Mauldin. A generalization of Fermat’s Last Theorem: the Beal conjecture and prize problem, Notices Amer. Math. Soc. 44 (1997), 1436–1437. L. Merel. Arithmetic of elliptic curves and diophantine equations, J. Th´ eor. Nombres Bordeaux 11 (1999), 173–200. B. Poonen. Some Diophantine equations of the form xn + yn = zm, Acta Arith. 86 (1998), 193–205. B. Poonen, E. Schaefer and M. Stoll. Twists of X(7) and primitive solutions to x2 + y3 = z7, Duke Math. J. 137 (2007), 103–158. K. Ribet. On modular representations of Gal(Q/Q) arising from modular forms, Invent. Math. 100 (1990), 431–476. K. Ribet. Report on mod l representations of Gal(Q/Q), in Motives, Proc. Symp. Pure Math. 55:2 (1994), 639–676. J.-P. Serre. Propri´ et´ es galoisiennes des points d’order fini des courbes elliptiques, Invent. Math. 15 (1972), 259-331. S. Siksek. Correspondence with second author, 2008. S. Siksek. Explicit Chabauty over number fields, Algebra Number Theory, to appear. S. Siksek and M. Stoll. Partial descent on hyperelliptic curves and the generalized Fermat equation x3 +y4 +z5 = 0, Bull. Lond. Math. Soc. 44 (2012), no. 1, 151–166. S. Siksek and M. Stoll. The generalized Fermat equation x2 + y3 = z15, preprint. R. Taylor and A. Wiles. Ring-theoretic properties of certain Hecke algebras, Ann. of Math. 141 (1995), no. 3, 553–572. GENERALIZED FERMAT EQUATIONS: A MISCELLANY 29 R. Tijdeman. Diophantine equations and diophantine approximations, Number theory and applications (Banff, AB, 1988), Kluwer Acad. Publ., Dordrecht, 1989, 215–243. A. Wiles. Modular elliptic curves and Fermat’s Last Theorem, Ann. of Math. 141 (1995), no. 3, 443–551. Michael A. Bennett, Department of Mathematics, University of British Columbia, Vancouver, British Columbia, V6T 1Z2, CANADA E-mail address: bennett@math.ubc.ca Imin Chen, Department of Mathematics, Simon Fraser University, Burnaby, British Columbia, CANADA E-mail address: ichen@math.sfu.ca Sander R. Dahmen, Mathematisch Instituut, Universiteit Utrecht, P.O. Box 80 010, 3508 TA Utrecht, The Netherlands, E-mail address: s.r.dahmen@uu.nl Soroosh Yazdani, Department of Mathematics and Computer Science, University of Lethbridge, Leth-bridge, Alberta, T1K 3M4, CANADA E-mail address: soroosh.yazdani@uleth.ca
4180
https://www.neetprep.com/ncert/1483-Wave-Optics-Wave-Optics--NCERT-Chapter-PDF
NCERT Ebook for Wave Optics - Wave Optics - Chapter 10 - NCERT Physics - XII NEET Classroom Test Series × Join the biggest Classroom Test Series for NEET. Available across 250+ centres across India. Know More!! 8527521718 Online Support NEETprep Helpline Download App Menu Courses Full Course Full Course (English) Target 2026 Score Booster Bio Masterclass All Courses Course Content Videos NCERT Ebooks Questions Score Booster Flashcards Tests Chapter DPPs Custom Test Chapter Journey Mindmap PYQ Marked NCERT Bridge (X->XI) Schedule Leaderboard NEET Syllabus Chemistry Syllabus Botany Syllabus Zoology Syllabus Physics Syllabus NEET Information NEET 2026 NEET Results NEET Cutoff NEET Application Process NEET Seat Intake Signup | Login Courses Full Course Full Course (English) Target 2026 Score Booster Bio Masterclass All Courses Course Content Videos NCERT Ebooks Questions Score Booster Flashcards Tests Chapter DPPs Custom Test Chapter Journey Mindmap PYQ Marked NCERT Bridge (X->XI) Schedule Leaderboard Signup | Login Courses Full Course Full Course (English) Score Booster Bio Masterclass All Courses Course Content Videos NCERT Ebooks Questions Flashcards Tests Chapter DPPs Custom Test Chapter Journey Mindmap PYQ Marked NCERT Bridge (X->XI) Schedule Leaderboard Download App Signup | Login NCERT Ebook - Wave Optics Introduction Huygens Principle Refraction and Reflection of Plane Waves using Huygens Principle Coherent and Incoherent Addition of Waves Interference of Light Waves and Young’s Experiment Diffraction Polarisation Mindmap Basic understanding of waves is important before starting this chapter 10.1 Introduction In 1637 Descartes gave the corpuscular model of light and derived Snell’s law. It explained the laws of reflection and refraction of light at an interface. The corpuscular model predicted that if the ray of light (on refraction) bends towards the normal then the speed of light would be greater in the second medium. This corpuscular model of light was further developed by Isaac Newton in his famous book entitled OPTICKS and because of the tremendous popularity of this book, the corpuscular model is very often attributed to Newton. In 1678, the Dutch physicist Christiaan Huygens put forward the wave theory of light – it is this wave model of light that we will discuss in this chapter. As we will see, the wave model could satisfactorily explain the phenomena of reflection and refraction; however, it predicted that on refraction if the wave bends towards the normal then the speed of light would be less in the second medium. This is in contradiction to the prediction made by using the corpuscular model of light. It was much later confirmed by experiments where it was shown that the speed of light in water is less than the speed in air confirming the prediction of the wave model; Foucault carried out this experiment in 1850. The wave theory was not readily accepted primarily because of Newton’s authority and also because light could travel through vacuum and it was felt that a wave would always require a medium to propagate from one point to the other. However, when Thomas Young performed his famous interference experiment in 1801, it was firmly established that light is indeed a wave phenomenon. The wavelength of visible light was measured and found to be extremely small; for example, the wavelength of yellow light is about 0.6 µ m. Because of the smallness of the wavelength of visible light (in comparison to the dimensions of typical mirrors and lenses), light can be assumed to approximately travel in straight lines. This is the field of geometrical optics, which we had discussed in the previous chapter. Indeed, the branch of optics in which one completely neglects the finiteness of the wavelength is called geometrical optics and a ray is defined as the path of energy propagation in the limit of wavelength tending to zero. After the interference experiment of Young in 1801, for the next 40 years or so, many experiments were carried out involving the interference and diffraction of lightwaves; these experiments could only be satisfactorily explained by assuming a wave model of light. Thus, around the middle of the nineteenth century, the wave theory seemed to be very well established. The only major difficulty was that since it was thought that a wave required a medium for its propagation, how could light waves propagate through vacuum. This was explained when Maxwell put forward his famous electromagnetic theory of light. Maxwell had developed a set of equations describing the laws of electricity and magnetism and using these equations he derived what is known as the wave equation from which he predicted the existence of electromagnetic waves. From the wave equation, Maxwell could calculate the speed of electromagnetic waves in free space and he found that the theoretical value was very close to the measured value of speed of light. From this, he propounded that light must be an electromagnetic wave. Thus, according to Maxwell, light waves are associated with changing electric and magnetic fields; changing electric field produces a time and space varying magnetic field and a changing magnetic field produces a time and space varying electric field. The changing electric and magnetic fields result in the propagation of electromagnetic waves (or light waves) even in vacuum. In this chapter we will first discuss the original formulation of the Huygens principle and derive the laws of reflection and refraction. In Sections 10.4 and 10.5, we will discuss the phenomenon of interference which is based on the principle of superposition. In Section 10.6 we will discuss the phenomenon of diffraction which is based on Huygens-Fresnel principle. Finally in Section 10.7 we will discuss the phenomenon of polarisation which is based on the fact that the light waves are transverse electromagnetic waves. Maxwell had predicted the existence of electromagnetic waves around 1855; it was much later (around 1890) that Heinrich Hertz produced radiowaves in the laboratory. J.C. Bose and G. Marconi made practical applications of the Hertzian waves Does light travel in a straight line? Light travels in a straight line in Class VI; it does not do so in Class XII and beyond! Surprised, aren’t you? In school, you are shown an experiment in which you take three cardboards with pinholes in them, place a candle on one side and look from the other side. If the flame of the candle and the three pinholes are in a straight line, you can see the candle. Even if one of them is displaced a little, you cannot see the candle.This proves, so your teacher says,that light travels in a straight line. In the present book, there are two consecutive chapters, one on ray optics and the other on wave optics. Ray optics is based on rectilinear propagation of light, and deals with mirrors, lenses, reflection, refraction, etc. Then you come to the chapter on wave optics, and you are told that light travels as a wave, that it can bend around objects, it can diffract and interfere, etc. In optical region, light has a wavelength of about half a micrometre. If it encounters an obstacle of about this size, it can bend around it and can be seen on the other side. Thus a micrometre size obstacle will not be able to stop a light ray. If the obstacle is much larger, however, light will not be able to bend to that extent, and will not be seen on the other side. This is a property of a wave in general, and can be seen in sound waves too. The sound wave of our speech has a wavelength of about 5 0 cm to 1 m. If it meets an obstacle of the size of a few metres, it bends around it and reaches points behind the obstacle. But when it comes across a larger obstacle of a few hundred metres, such as a hillock, most of it is reflected and is heard as an echo. Then what about the primary school experiment? What happens there is that when we move any cardboard, the displacement is of the order of a few millimetres, which is much larger than the wavelength of light. Hence the candle cannot be seen. If we are able to move one of the cardboards by a micrometer or less, light will be able to diffract, and the candle will still be seen. One could add to the first sentence in this bo x: It learns how to bend as it grows u p! 10.2 Huygens Principle We would first define a wavefront: when we drop a small stone on a calm pool of water, waves spread out from the point of impact. Every point on the surface starts oscillating with time. At any instant, a photograph of the surface would show circular rings on which the disturbance is maximum. Clearly, all points on such a circle are oscillating in phase because they are at the same distance from the source. Such a locus of points, which oscillate in phase is called a wavefron t;thus a wavefront is defined as a surface of constant phase. The speed with which the wavefront moves outwards from the source is called the speed of the wave. The energy of the wave travels in a direction perpendicular to the wavefront. Figure 10.1(a) A diverging spherical wave emanating from a point source. The wavefronts are spherical. If we have a point source emitting waves uniformly in all directions, then the locus of points which have the same amplitude and vibrate in the same phase are spheres and we have what is known as a spherical wave as shown in Fig. 10.1(a). At a large distance from the source, a small portion of the sphere can be considered as a plane and we have what is known as a plane wave [Fig. 10.1(b)]. Figure 10.1 (b) At a large distance from the source, a small portion of the spherical wave can be approximated by a plane wave. Now, if we know the shape of the wavefront at t = 0, then Huygens principle allows us to determine the shape of the wavefront at a later time τ. Thus, Huygens principle is essentially a geometrical construction, which given the shape of the wafefront at any time allows us to determine the shape of the wavefront at a later time. Let us consider a diverging wave and let F 1 F 2 represent a portion of the spherical wavefront at t = 0 (Fig. 10.2). Now, according to Huygens principle,each point of the wavefront is the source of a secondary disturbance and the wavelets emanating from these points spread out in all directions with the speed of the wave. These wavelets emanating from the wavefront are usually referred to as secondary wavelets and if we draw a common tangent to all these spheres, we obtain the new position of the wavefront at a later time. Thus, if we wish to determine the shape of the wavefront at t = τ, we draw spheres of radius v τ from each point on the spherical wavefront where v represents the speed of the waves in the medium. If we now draw a common tangent to all these spheres, we obtain the new position of the wavefront at t = τ. The new wavefront shown as G 1 G 2 in Fig. 10.2 is again spherical with point O as the centre. Figure 10.2 F 1 F 2 represents the spherical wavefront (with O as centre) at t= 0. The envelope of the secondary wavelets emanating from F 1 F 2 produces the forward moving wavefront G 1 G 2. The backwave D 1 D 2 does not exist. Figure 10.3 Huygens geometrical construction for a plane wave propagating to the right. F 1 F 2 is the plane wavefront at t = 0 and G 1 G 2 is the wavefront at a later time τ. The lines A 1 A 2, B 1 B 2 … etc., are normal to both F 1 F 2 and G 1 G 2 and represent rays. The above model has one shortcoming: we also have a backwave which is shown as D 1 D 2 in Fig. 10.2. Huygens argued that the amplitude of the secondary wavelets is maximum in the forward direction and zero in the backward direction; by making this adhoc assumption, Huygens could explain the absence of the backwave. However, this adhoc assumption is not satisfactory and the absence of the backwave is really justified from more rigorous wave theory. In a similar manner, we can use Huygens principle to determine the shape of the wavefront for a plane wave propagating through a medium (Fig. 10.3). 10.3 Refraction and Reflection of Plane Waves using Huygens Principle 10.3.1 Refraction of a plane wave We will now use Huygens principle to derive the laws of refraction. Let PP′ represent the surface separating medium 1 and medium 2, as shown in Fig. 10.4. Let v 1 and v 2 represent the speed of light in medium 1 and medium 2, respectively. We assume a plane wavefront AB propagating in the direction A′A incident on the interface at an angle i as shown in the figure. Let τ be the time taken by the wavefront to travel the distance BC. Thus, BC =v 1 τ FIGURE 10.4 A plane wave AB is incident at an angle i on the surface PP¢ separating medium 1 and medium 2. The plane wave undergoes refraction and CE represents the refracted wavefront. The figure corresponds to v2< v1 so that the refracted waves bends towards the normal. Christiaan Huygens (1629 – 1695) Dutch physicist, astronomer, mathematician and the founder of the wave theory of light. His book, Treatise on light, makes fascinating reading even today. He brilliantly explained the double refraction shown by the mineral calcite in this work in addition to reflection and refraction. He was the first to analyse circular and simple harmonic motion and designed and built improved clocks and telescopes. He discovered the true geometry of Saturn’s rings. In order to determine the shape of the refracted wavefront, we draw a sphere of radius v 2 τ from the point A in the second medium (the speed of the wave in the second medium is v 2). Let CE represent a tangent plane drawn from the point C on to the sphere. Then, AE =v 2 τ and CE would represent the refracted wavefront. If we now consider the triangles ABC and AEC, we readily obtain Figure 10.4.A plane wave AB is incident at an angle i on the surface PP′ s eparating medium 1 and medium 2. The plane wave undergoes refraction and CE represents the refracted wavefront. The figure corresponds to v 2< v 1 so that the refracted waves bends towards the normal. sin i = (10.1) and sin r = (10.2) where i and r are the angles of incidence and refraction, respectively. Thus we obtain (10.3) From the above equation, we get the important result that if r<i (i.e., if the ray bends toward the normal), the speed of the light wave in the second medium (v 2) will be less then the speed of the light wave in the first medium (v 1). This prediction is opposite to the prediction from the corpuscular model of light and as later experiments showed, the prediction of the wave theory is correct. Now, if c represents the speed of light in vacuum, then, (10.4) and n 2 = (10.5) are known as the refractive indices of medium 1 and medium 2, respectively. In terms of the refractive indices, Eq. (10.3) can be written as n 1 sin i =n 2 sin r (10.6) This is the Snell’s law of refraction. Further, if λ 1 and λ 2 denote the wavelengths of light in medium 1 and medium 2, respectively and if the distance BC is equal to λ 1 then the distance AE will be equal to λ 2(because if the crest from B has reached C in time τ, then the crest from A should have also reached E in time τ); thus, or (10.7) The above equation implies that when a wave gets refracted into a denser medium (v 1>v 2) the wavelength and the speed of propagation decrease but the frequency ν (= v/λ) remains the same. 10.3.2 Refraction at a rarer medium We now consider refraction of a plane wave at a rarer medium, i.e.,v 2>v 1. Proceeding in an exactly similar manner we can construct a refracted wavefront as shown in Fig. 10.5. The angle of refraction will now be greater than angle of incidence; however, we will still have n 1 sin i =n 2 sin r . We define an angle i c by the following equation (10.8) Thus, if i =i c then sin r = 1 and r = 90°. Obviously, for i>i c, there can not be any refracted wave. The angle i c is known as the critical angle and for all angles of incidence greater than the critical angle, we will not have any refracted wave and the wave will undergo what is known as total internal reflection. The phenomenon of total internal reflection and its applications was discussed in Section 9.4. FIGURE 10.5 Refraction of a plane wave incident on a rarer medium for which v2> v1. The plane wave bends away from the normal. 10.3.3 Reflection of a plane wave by a plane surface We next consider a plane wave AB incident at an angle i on a reflecting surface MN. If v represents the speed of the wave in the medium and if τ represents the time taken by the wavefront to advance from the point B to C then the distance Figure 10.5 Refraction of a plane wave incident on a rarer medium for which v 2> v 1. The plane wave bends away from the normal. BC = v τ In order to construct the reflected wavefront we draw a sphere of radius v τ from the point A as shown in Fig. 10.6. Let CE represent the tangent plane drawn from the point C to this sphere. Obviously AE = BC = v τ FIGURE 10.6 Reflection of a plane wave AB by the reflecting surface MN. AB and CE represent incident and reflected wavefronts. If we now consider the triangles EAC and BAC we will find that they are congruent and therefore, the angles i and r (as shown in Fig. 10.6) would be equal. This is the law of reflection. Once we have the laws of reflection and refraction, the behaviour of prisms, lenses, and mirrors can be understood. These phenomena were discussed in detail in Chapter 9 on the basis of rectilinear propagation of light. Here we just describe the behaviour of the wavefronts as they undergo reflection or refraction. In Fig. 10.7(a) we consider a plane wave passing through a thin prism. Clearly, since the speed of light waves is less in glass, the lower portion of the incoming wavefront (which travels through the greatest thickness of glass) will get delayed resulting in a tilt in the emerging wavefront as shown in the figure. In Fig. 10.7(b) we consider a plane wave incident on a thin convex lens; the central part of the incident plane wave traverses the thickest portion of the lens and is delayed the most. The emerging wavefront has a depression at the centre and therefore the wavefront becomes spherical and converges to the point F which is known as the focus. In Fig. 10.7(c) a plane wave is incident on a concave mirror and on reflection we have a spherical wave converging to the focal point F. In a similar manner, we can understand refraction and reflection by concave lenses and convex mirrors. Figure 10.7 Refraction of a plane wave by (a) a thin prism, (b) a convex lens. (c) Reflection of a plane wave by a concave mirror. From the above discussion it follows that the total time taken from a point on the object to the corresponding point on the image is the same measured along any ray. For example, when a convex lens focusses light to form a real image, although the ray going through the centre traverses a shorter path, but because of the slower speed in glass, the time taken is the same as for rays travelling near the edge of the lens. 10.3.4 The doppler effect We should mention here that one should be careful in constructing the wavefronts if the source (or the observer) is moving. For example, if there is no medium and the source moves away from the observer, then later wavefronts have to travel a greater distance to reach the observer and hence take a longer time. The time taken between the arrival of two successive wavefronts is hence longer at the observer than it is at the source. Thus, when the source moves away from the observer the frequency as measured by the source will be smaller. This is known as the Doppler effect. Astronomers call the increase in wavelength due to doppler effect as red shift since a wavelength in the middle of the visible region of the spectrum moves towards the red end of the spectrum. When waves are received from a source moving towards the observer, there is an apparent decrease in wavelength, this is referred to as blue shift. You have already encountered Doppler effect for sound waves in Chapter 15 of Class XI textbook. For velocities small compared to the speed of light, we can use the same formulae which we use for sound waves. The fractional change in frequency∆ν/ν is given by –v radial/c, where v radial is the component of the source velocity along the line joining the observer to the source relative to the observer;v radial is considered positive when the source moves away from the observer. Thus, the Doppler shift can be expressed as: (10.9) The formula given above is valid only when the speed of the source is small compared to that of light. A more accurate formula for the Doppler effect which is valid even when the speeds are close to that of light, requires the use of Einstein’s special theory of relativity. The Doppler effect for light is very important in astronomy. It is the basis for the measurements of the radial velocities of distant galaxies. Example 10.1 What speed should a galaxy move with respect to us so that the sodium line at 589.0 nm is observed at 589.6 nm? Solution Since νλ =c, (for small changes in ν and λ). For ∆λ = 589.6 – 589.0 = + 0.6 nm we get [using Eq. (10.9)] or,v radial = 306 km/s Therefore, the galaxy is moving away from us. Example 10.2 (a) When monochromatic light is incident on a surface separating two media, the reflected and refracted light both have the same frequency as the incident frequency. Explain why? (b) When light travels from a rarer to a denser medium, the speed decreases. Does the reduction in speed imply a reduction in the energy carried by the light wave? (c) In the wave picture of light, intensity of light is determined by the square of the amplitude of the wave. What determines the intensity of light in the photon picture of light. Solution (a) Reflection and refraction arise through interaction of incident light with the atomic constituents of matter. Atoms may be viewed as oscillators, which take up the frequency of the external agency (light) causing forced oscillations. The frequency of light emitted by a charged oscillator equals its frequency of oscillation. Thus, the frequency of scattered light equals the frequency of incident light. (b) No. Energy carried by a wave depends on the amplitude of the wave, not on the speed of wave propagation. (c) For a given frequency, intensity of light in the photon picture is determined by the number of photons crossing an unit area per unit time. 10.4 Coherent and Incoherent Addition of Waves In this section we will discuss the interference pattern produced by the superposition of two waves. You may recall that we had discussed the superposition principle in Chapter 15 of your Class XI textbook. Indeed the entire field of interference is based on the superposition principle according to which at a particular point in the medium, the resultant displacement produced by a number of waves is the vector sum of the displacements produced by each of the waves. (a) (b) Figure 10.8(a) Two needles oscillating in phase in water represent two coherent sources. (b) The pattern of displacement of water molecules at an instant on the surface of water showing nodal N (no displacement) and antinodal A (maximum displacement) lines. Consider two needles S 1 and S 2 moving periodically up and down in an identical fashion in a trough of water [Fig. 10.8(a)]. They produce two water waves, and at a particular point, the phase difference between the displacements produced by each of the waves does not change with time; when this happens the two sources are said to be coherent. Figure 10.8(b) shows the position of crests (solid circles) and troughs (dashed circles) at a given instant of time. Consider a point P for which S 1 P = S 2 P Since the distances S 1 P and S 2 P are equal, waves from S 1 and S 2 will take the same time to travel to the point P and waves that emanate from S 1 and S 2 in phase will also arrive, at the point P, in phase. Thus, if the displacement produced by the source S 1 at the point P is given by y 1 =a cos ω t then, the displacement produced by the source S 2 (at the point P) will also be given by y 2 =a cos ω t Thus, the resultant of displacement at P would be given by y = y 1 +y 2 = 2 a cos ω t Since the intensity is proportional to the square of the amplitude, the resultant intensity will be given by I = 4 I 0 where I 0 represents the intensity produced by each one of the individual sources;I 0 is proportional to a 2. In fact at any point on the perpendicular bisector of S 1 S 2, the intensity will be 4 I 0. The two sources are said to interfere constructively and we have what is referred to as constructive interference. We next consider a point Q [Fig. 10.9(a)] for which S 2 Q –S 1 Q = 2 λ The waves emanating from S 1 will arrive exactly two cycles earlier than the waves from S 2 and will again be in phase [Fig. 10.9(a)]. Thus, if the displacement produced by S 1 is given by y 1 =a cos ω t then the displacement produced by S 2 will be given by y 2 =a cos (ω t – 4 π) =a cos ω t where we have used the fact that a path difference of 2 λ corresponds to a phase difference of 4 π. The two displacements are once again in phase and the intensity will again be 4 I 0 giving rise to constructive interference. In the above analysis we have assumed that the distances S 1 Q and S 2 Q are much greater than d (which represents the distance between S 1 and S 2) so that although S 1 Q and S 2 Q are not equal, the amplitudes of the displacement produced by each wave are very nearly the same. Figure 10.9 (a) Constructive interference at a point Q for which the path difference is 2 λ. (b) Destructive interference at a point R for which the path difference is We next consider a point R [Fig. 10.9(b)] for which S 2 R – S 1 R = –2.5 λ The waves emanating from S 1 will arrive exactly two and a half cycles later than the waves from S 2 [Fig. 10.10(b)]. Thus if the displacement produced by S 1 is given by y 1 =a cos ω t then the displacement produced by S 2 will be given by y 2 =a cos (ω t + 5 π) = –a cos ω t where we have used the fact that a path difference of 2.5 λ corresponds to a phase difference of 5 π. The two displacements are now out of phase and the two displacements will cancel out to give zero intensity. This is referred to as destructive interference. To summarise: If we have two coherent sources S 1 and S 2 vibrating in phase, then for an arbitrary point P whenever the path difference, S 1 P ~S 2 P =n λ (n = 0, 1, 2, 3,...) (10.10) we will have constructive interference and the resultant intensity will be 4 I 0; the sign~between S 1 P and S 2 P represents the difference between S 1 P and S 2 P. On the other hand, if the point P is such that the path difference, S 1 P ~S 2 P = (n+) λ (n = 0, 1, 2, 3, ...) (10.11) we will have destructive interference and the resultant intensity will be zero.Now, for any other arbitrary point G (Fig. 10.10) let the phase difference between the two displacements be φ. Thus, if the displacement produced by S 1 is given by Figure 10.10 Locus of points for which S 1 P – S 2 P is equal to zero,±λ, ± 2 λ, ± 3 λ. y 1 =a cos ω t then, the displacement produced by S 2 would be y 2 =a cos (ω t +φ) and the resultant displacement will be given by y = y 1 + y 2 = a [cos ω t + cos (ω t +φ)] = 2 a cos (φ/2) cos (ω t +φ/2) The amplitude of the resultant displacement is 2 a cos (φ/2) and therefore the intensity at that point will be I = 4 I 0 cos 2 (φ/2) (10.12) If φ = 0,± 2 π, ± 4 π,… which corresponds to the condition given by Eq. (10.10) we will have constructive interference leading to maximum intensity. On the other hand, if φ =±π, ± 3 π, ± 5 π … [which corresponds to the condition given by Eq. (10.11)] we will have destructive interference leading to zero intensity. Now if the two sources are coherent (i.e., if the two needles are going up and down regularly) then the phase difference φ at any point will not change with time and we will have a stable interference pattern; i.e., the positions of maxima and minima will not change with time. However, if the two needles do not maintain a constant phase difference, then the interference pattern will also change with time and, if the phase difference changes very rapidly with time, the positions of maxima and minima will also vary rapidly with time and we will see a “time-averaged” intensity distribution. When this happens, we will observe an average intensity that will be given by (10.13) where angular brackets represent time averaging. Indeed it is shown in Section 7.2 that if φ(t) varies randomly with time, the time-averaged quantity< cos 2 (φ/2)> will be 1/2. This is also intuitively obvious because the function cos 2 (φ/2) will randomly vary between 0 and 1 and the average value will be 1/2. The resultant intensity will be given by I = 2 I 0 (10.14) at all points. When the phase difference between the two vibrating sources changes rapidly with time, we say that the two sources are incoherent and when this happens the intensities just add up. This is indeed what happens when two separate light sources illuminate a wall. 10.5 Interference of Light Waves and Young’s Experiment We will now discuss interference using light waves. If we use two sodium lamps illuminating two pinholes (Fig. 10.11) we will not observe any interference fringes. This is because of the fact that the light wave emitted from an ordinary source (like a sodium lamp) undergoes abrupt phase changes in times of the order of 10–10 seconds. Thus the light waves coming out from two independent sources of light will not have any fixed phase relationship and would be incoherent, when this happens, as discussed in the previous section, the intensities on the screen will add up. The British physicist Thomas Young used an ingenious technique to “lock” the phases of the waves emanating from S 1 and S 2. He made two pinholes S 1 and S 2 (very close to each other) on an opaque screen [Fig. 10.12(a)]. These were illuminated by another pinholes that was in turn, lit by a bright source. Light waves spread out from S and fall on both S 1 and S 2. S 1 and S 2 then behave like two coherent sources because light waves coming out from S 1 and S 2 are derived from the same original source and any abrupt phase change in S will manifest in exactly similar phase changes in the light coming out from S 1 and S 2. Thus, the two sources S 1 and S 2 will be locked in phase; i.e., they will be coherent like the two vibrating needle in our water wave example [Fig. 10.8(a)]. FIGURE 10.11 If two sodium lamps illuminate two pinholes S1 and S2, the intensities will add up and no interference fringes will be observed on the screen. FIGURE 10.12 Young’s arrangement to produce interference pattern. Thus spherical waves emanating from S 1 and S 2 will produce interference fringes on the screen GG′, as shown in Fig. 10.12(b). The positions of maximum and minimum intensities can be calculated by using the analysis given in Section 10.4 where we had shown that for an arbitrary point P on the line GG′ [Fig. 10.12(b)] to correspond to a maximum, we must have S 2 P – S 1 P =n λ; n = 0, 1, 2 ... (10.15) Now, (a) (b) Figure 10.12 Young’s arrangement to produce interference pattern. (S 2 P)2 – (S 1 P)2 == 2 x d where S 1 S 2 =d and OP =x. Thus S 2 P – S 1 P = (10.16) If x, d<<D then negligible error will be introduced if S 2 P +S 1 P (in the denominator) is replaced by 2 D. For example, for d = 0.1 cm,D = 100 cm, OP = 1 cm (which correspond to typical values for an interference experiment using light waves), we have S 2 P + S 1 P = [(100)2 + (1.05)2]½ + [(100)2 + (0.95)2]½ 200.01 cm Thus if we replace S 2 P + S 1 P by 2 D, the error involved is about 0.005%. In this approximation, Eq. (10.16) becomes Thomas Young (1773 – 1829) Thomas Young (1773 – 1829)English physicist, physician and Egyptologist. Young worked on a wide variety of scientific problems, ranging from the structure of the eye and the mechanism of vision to the decipherment of the Rosetta stone. He revived the wave theory of light and recognised that interference phenomena provide proof of the wave properties of light. S 2 P – S 1 P ≈ (10.17) Hence we will have constructive interference resulting in a bright region when = n λ [Eq. (10.15)]. That is, x =x n =; n = 0,± 1,± 2, ... (10.18) On the other hand, we will have destructive interference resulting in a dark region when= (n+)λ that is x =x n = (n+) (10.19) Thus dark and bright bands appear on the screen, as shown in Fig. 10.13. Such bands are called fringes. Equations (10.18) and (10.19) show that dark and bright fringes are equally spaced and the distance between two consecutive bright and dark fringes is given by β =x n+1 –x n or β =(10.20) which is the expression for the fringe width. Obviously, the central point O (in Fig. 10.12) will be bright because S 1 O = S 2 O and it will correspond to n = 0 [Eq. (10.18)]. If we consider the line perpendicular to the plane of the paper and passing through O [i.e., along the y-axis] then all points on this line will be equidistant from S 1 and S 2 and we will have a bright central fringe which is a straight line as shown in Fig. 10.13. In order to determine the shape of the interference pattern on the screen we note that a particular fringe would correspond to the locus of points with a constant value of S 2 P – S 1 P. Whenever this constant is an integral multiple of λ, the fringe will be bright and whenever it is an odd integral multiple of λ/2 it will be a dark fringe. Now, the locus of the point P lying in the x-y plane such that S 2 P – S 1 P (=∆) is a constant, is a hyperbola. Thus the fringe pattern will strictly be a hyperbola; however, if the distance D is very large compared to the fringe width, the fringes will be very nearly straight lines as shown in Fig. 10.13. Figure 10.13 Computer generated fringe pattern produced by two point source S 1 and S 2 on the screen GG′(Fig. 10.12); (a) and (b) correspond to d= 0.005 mm and 0.025 mm, respectively (both figures correspond to D= 5 cm and λ= 5 × 10–5 cm.) (Adopted from OPTICS by A. Ghatak, Tata McGraw Hill Publishing Co. Ltd., New Delhi, 2000.) In the double-slit experiment shown in Fig. 10.12(b), we have taken the source hole S on the perpendicular bisector of the two slits, which is shown as the line SO. What happens if the source S is slightly away from the perpendicular bisector. Consider that the source is moved to some new point S′ and suppose that Q is the mid-point of S 1 and S 2. If the angle S′QS is φ, then the central bright fringe occurs at an angle –φ, on the other side. Thus, if the source S is on the perpendicular bisector, then the central fringe occurs at O, also on the perpendicular bisector. If S is shifted by an angle φ to point S′, then the central fringe appears at a point O′ at an angle –φ, which means that it is shifted by the same angle on the other side of the bisector. This also means that the source S′, the mid-point Q and the point O′ of the central fringe are in a straight line. We end this section by quoting from the Nobel lecture of Dennis Gabor The wave nature of light was demonstrated convincingly for the first time in 1801 by Thomas Young by a wonderfully simple experiment. He let a ray of sunlight into a dark room, placed a dark screen in front of it, pierced with two small pinholes, and beyond this, at some distance, a white screen. He then saw two darkish lines at both sides of a bright line, which gave him sufficient encouragement to repeat the experiment, this time with spirit flame as light source, with a little salt in it to produce the bright yellow sodium light. This time he saw a number of dark lines, regularly spaced; the first clear proof that light added to light can produce darkness. This phenomenon is called interference. Thomas Young had expected it because he believed in the wave theory of light. Dennis Gabor received the 1971 Nobel Prize in Physics for discovering theprinciples of holography We should mention here that the fringes are straight lines although S 1 and S 2 are point sources. If we had slits instead of the point sources (Fig. 10.14), each pair of points would have produced straight line fringes resulting in straight line fringes with increased intensities. Figure 10.14 Photograph and the graph of the intensity distribution in Young’s double-slit experiment. Example 10.3 Two slits are made one millimetre apart and the screen is placed one metre away. What is the fringe separation when blue-green light of wavelength 500 nm is used? Solution Fringe spacing = 5 × 10–4 m = 0.5 mm Example 10.4 What is the eff ect on the interference fringes in a Young’s double-slit experiment due to each of the following operations: (a) the screen is moved away from the plane of the slits; (b) the (monochromatic) source is replaced by another (monochromatic) source of shorter wavelength; (c) the separation between the two slits is increased; (d) the source slit is moved closer to the double-slit plane; (e) the width of the source slit is increased; (f) the monochromatic source is replaced by a source of white light? (In each operation, take all parameters, other than the one specified, to remain unchanged.) Solution (a) Angular separation of the fringes remains constant (=λ/d). The actual separation of the fringes increases in proportion to the distance of the screen from the plane of the two slits. (b) The separation of the fringes (and also angular separation) decreases. See, however, the condition mentioned in (d) below. (c) The separation of the fringes (and also angular separation) decreases. See, however, the condition mentioned in (d) below. (d) Let s be the size of the source and S its distance from the plane of the two slits. For interference fringes to be seen, the condition s/S<λ/d should be satisfied; otherwise, interference patterns produced by different parts of the source overlap and no fringes are seen. Thus, as S decreases (i.e., the source slit is brought closer), the interference pattern gets less and less sharp, and when the source is brought too close for this condition to be valid, the fringes disappear. Till this happens, the fringe separation remains fixed. (e) Same as in (d). As the source slit width increases, fringe pattern gets less and less sharp. When the source slit is so wide that the condition s/S≤ λ/d is not satisfied, the interference pattern disappears. (f) The interference patterns due to different component colours of white light overlap (incoherently). The central bright fringes for different colours are at the same position. Therefore, the central fringe is white. For a point P for which S 2 P –S 1 P =λ b/2, where λ b (≈4000 Å) represents the wavelength for the blue colour, the blue component will be absent and the fringe will appear red in colour.Slightly farther away where S 2 Q–S 1 Q =λ b=λ r/2 where λ r(≈8000 Å) is the wavelength for the red colour, the fringe will be predominantly blue. Thus, the fringe closest on either side of the central white fringe is red and the farthest will appear blue. After a few fringes, no clear fringe pattern is seen. 10.6 Diffraction If we look clearly at the shadow cast by an opaque object, close to the region of geometrical shadow, there are alternate dark and bright regions just like in interference. This happens due to the phenomenon of diffraction. Diffraction is a general characteristic exhibited by all types of waves, be it sound waves, light waves, water waves or matter waves. Since the wavelength of light is much smaller than the dimensions of most obstacles; we do not encounter diffraction effects of light in everyday observations. However, the finite resolution of our eye or of optical instruments such as telescopes or microscopes is limited due to the phenomenon of diffraction. Indeed the colours that you see when a CD is viewed is due to diffraction effects. We will now discuss the phenomenon of diffraction. 10.6.1 The single slit In the discussion of Young’s experiment, we stated that a single narrow slit acts as a new source from which light spreads out. Even before Young, early experimenters – including Newton – had noticed that light spreads out from narrow holes and slits. It seems to turn around corners and enter regions where we would expect a shadow. These effects, known as diffraction, can only be properly understood using wave ideas. After all, you are hardly surprised to hear sound waves from someone talking around a corne r! When the double slit in Young’s experiment is replaced by a single narrow slit (illuminated by a monochromatic source), a broad pattern with a central bright region is seen. On both sides, there are alternate dark and bright regions, the intensity becoming weaker away from the centre (Fig. 10.16). To understand this, go to Fig. 10.15, which shows a parallel beam of light falling normally on a single slit LN of width a. The diffracted light goes on to meet a screen. The midpoint of the slit is M. A straight line through M perpendicular to the slit plane meets the screen at C. We want the intensity at any point P on the screen. As before, straight lines joining P to the different points L,M,N, etc., can be treated as parallel, making an angle θ with the normal MC. The basic idea is to divide the slit into much smaller parts, and add their contributions at P with the proper phase differences. We are treating different parts of the wavefront at the slit as secondary sources. Because the incoming wavefront is parallel to the plane of the slit, these sources are in phase. The path difference NP – LP between the two edges of the slit can be calculated exactly as for Young’s experiment. From Fig. 10.15, NP – LP = NQ =a sin θ ≈ a θ (for smaller angles)(10.21) Similarly, if two points M 1 and M 2 in the slit plane are separated by y, the path difference M 2 P – M 1 P ≈y θ. We now have to sum up equal, coherent contributions from a large number of sources, each with a different phase. This calculation was made by Fresnel using integral calculus, so we omit it here. The main features of the diffraction pattern can be understood by simple arguments. At the central point C on the screen, the angle θ is zero. All path differences are zero and hence all the parts of the slit contribute in phase. This gives maximum intensity at C. Experimental observation shown in Fig. 10.15 indicates that the intensity has a central maximum at θ = 0 and other secondary maxima at θ ≈(n+1/2) λ/a, and has minima (zero intensity) at θ≈n λ/a, n = ±1, ±2, ±3, .... It is easy to see why it has minima at these values of angle. Consider first the angle θ where the path difference a θ is λ. Then, . (10.22) Now, divide the slit into two equal halves LM and MN each of size a/2. For every point M 1 in LM, there is a point M 2 in MN such that M 1 M 2 = a/2. The path difference between M 1 and M 2 at P = M 2 P – M 1 P=θ a/2 = λ/2 for the angle chosen. This means that the contributions from M 1 and M 2 are 180° out of phase and cancel in the direction θ =λ/a. Contributions from the two halves of the slit LM and MN, therefore, cancel each other. Equation (10.22) gives the angle at which the intensity falls to zero. One can similarly show that the intensity is zero for θ =n λ/a, with n being any integer (except zero!). Notice that the angular size of the central maximum increases when the slit width a decreases. Figure 10.15 The geometry of path differences for diffraction by a single slit. It is also easy to see why there are maxima at θ = (n + 1/2)λ/a and why they go on becoming weaker and weaker with increasing n. Consider an angle θ = 3 λ/2 a which is midway between two of the dark fringes. Divide the slit into three equal parts. If we take the first two thirds of the slit, the path difference between the two ends would be (10.23) The first two-thirds of the slit can therefore be divided into two halves which have a λ/2 path difference. The contributions of these two halves cancel in the same manner as described earlier. Only the remaining one-third of the slit contributes to the intensity at a point between the two minima. Clearly, this will be much weaker than the central maximum (where the entire slit contributes in phase). One can similarly show that there are maxima at (n + 1/2) λ/a with n = 2, 3, etc. These become weaker with increasing n, since only one-fifth, one-seventh, etc., of the slit contributes in these cases. The photograph and intensity pattern corresponding to it is shown in Fig. 10.16. Figure 10.16 Intensity distribution and photograph of fringes due to diffraction at single slit. There has been prolonged discussion about difference between intereference and diffraction among scientists since the discovery of these phenomena. In this context, it is interesting to note what Richard Feynman has said in his famous Feynman Lectures on Physics: No one has ever been able to define the difference between interference and diffraction satisfactorily. It is just a question of usage, and there is no specific, important physical difference between the m. The best we can do is, roughly speaking, is to say that when there are only a few sources, say two interfering sources, then the result is usually called interference, but if there is a large number of them, it seems that the word diffraction is more often used. In the double-slit experiment, we must note that the pattern on the screen is actually a superposition of single-slit diffraction from each slit or hole, and the double-slit interference pattern. This is shown in Fig. 10.17. It shows a broader diffraction peak in which there appear several fringes of smaller width due to double-slit interference. The number of interference fringes occuring in the broad diffraction peak depends on the ratio d/a, that is the ratio of the distance between the two slits to the width of a slit. In the limit of a becoming very small, the diffraction pattern will become very flat and we will obsrve the two-slit interference pattern [see Fig. 10.13(b)]. FIGURE 10.17 The actual double-slit interference pattern The envelope shows the single slit diffraction.. Example 10.5 In Example 10.3, what should the width of each slit be to obtain 10 maxima of the double slit pattern within the central maximum of the single slit pattern? Solution We want Notice that the wavelength of light and distance of the screen do not enter in the calculation of a. In the double-slit interference experiment of Fig. 10.12, what happens if we close one slit? You will see that it now amounts to a single slit. But you will have to take care of some shift in the pattern. We now have a source at S, and only one hole (or slit) S 1 or S 2. This will produce a single-slit diffraction pattern on the screen. The centre of the central bright fringe will appear at a point which lies on the straight line SS 1 or SS 2, as the case may be. We now compare and contrast the interference pattern with that seen for a coherently illuminated single slit (usually called the single slit diffraction pattern). (i) The interference pattern has a number of equally spaced bright and dark bands. The diffraction pattern has a central bright maximum which is twice as wide as the other maxima. The intensity falls as we go to successive maxima away from the centre, on either side. (ii) We calculate the interference pattern by superposing two waves originating from the two narrow slits. The diffraction pattern is a superposition of a continuous family of waves originating from each point on a single slit. Richand Feynman was one of the recipients of the 1965 Nobel Prize in Physics for his fundamental work in quantum electrodynamics. (iii) For a single slit of width a, the first null of the interference pattern occurs at an angle of λ/a. At the same angle of λ/a, we get a maximum (not a null) for two narrow slits separated by a distance a. One must understand that both d and a have to be quite small, to be able to observe good interference and diffraction patterns. For example, the separation d between the two slits must be of the order of a milimetre or so. The width a of each slit must be even smaller, of the order of 0.1 or 0.2 mm. In our discussion of Young’s experiment and the single-slit diffraction, we have assumed that the screen on which the fringes are formed is at a large distance. The two or more paths from the slits to the screen were treated as parallel. This situation also occurs when we place a converging lens after the slits and place the screen at the focus. Parallel paths from the slit are combined at a single point on the screen.Note that the lens does not introduce any extra path differences in a parallel beam. This arrangement is often used since it gives more intensity than placing the screen far away. If f is the focal length of the lens, then we can easily work out the size of the central bright maximum. In terms of angles, the separation of the central maximum from the first null of the diffraction pattern is λ/a. Hence, the size on the screen will be f λ/a. 10.6.2 Seeing the single slit diffraction pattern It is surprisingly easy to see the single-slit diffraction pattern for oneself. The equipment needed can be found in most homes –– two razor blades and one clear glass electric bulb preferably with a straight filament. One has to hold the two blades so that the edges are parallel and have a narrow slit in between. This is easily done with the thumb and forefingers (Fig. 10.18). Keep the slit parallel to the filament, right in front of the eye. Use spectacles if you normally do. With slight adjustment of the width of the slit and the parallelism of the edges, the pattern should be seen with its bright and dark bands. Since the position of all the bands (except the central one) depends on wavelength, they will show some colours. Using a filter for red or blue will make the fringes clearer. With both filters available, the wider fringes for red compared to blue can be seen. In this experiment, the filament plays the role of the first slit S in Fig. 10.16. The lens of the eye focuses the pattern on the screen (the retina of the eye). Figure 10.18 Holding two blades to form a single slit. A bulb filament viewed through this shows clear diffraction bands. With some effort, one can cut a double slit in an aluminium foil with a blade. The bulb filament can be viewed as before to repeat Young’s experiment. In daytime, there is another suitable bright source subtending a small angle at the eye. This is the reflection of the Sun in any shiny convex surface (e.g., a cycle bell). Do not try direct sunlight – it can damage the eye and will not give fringes anyway as the Sun subtends an angle of (1/2)°. In interference and diffraction, light energy is redistributed. If it reduces in one region, producing a dark fringe, it increases in another region, producing a bright fringe. There is no gain or loss of energy, which is consistent with the principle of conservation of energy. 10.6.3 Resolving power of optical instruments In Chapter 9 we had discussed about telescopes. The angular resolution of the telescope is determined by the objective of the telescope. The stars which are not resolved in the image produced by the objective cannot be resolved by any further magnification produced by the eyepiece. The primary purpose of the eyepiece is to provide magnification of the image produced by the objective. Consider a parallel beam of light falling on a convex lens. If the lens is well corrected for aberrations, then geometrical optics tells us that the beam will get focused to a point. However, because of diffraction, the beam instead of getting focused to a point gets focused to a spot of finite area. In this case the effects due to diffraction can be taken into account by considering a plane wave incident on a circular aperture followed by a convex lens (Fig. 10.19). The analysis of the corresponding diffraction pattern is quite involved; however, in principle, it is similar to the analysis carried out to obtain the single-slit diffraction pattern. Taking into account the effects due to diffraction, the pattern on the focal plane would consist of a central bright region surrounded by concentric dark and bright rings (Fig. 10.19). A detailed analysis shows that the radius of the central bright region is approximately given by (10.24) where f is the focal length of the lens and 2 a is the diameter of the circular aperture or the diameter of the lens, whichever is smaller. Typically if λ≈ 0.5 µ m, f≈ 20 cm and a≈ 5 cm we have r 0≈ 1.2 µ m Although the size of the spot is very small, it plays an important role in determining the limit of resolution of optical instruments like a telescope or a microscope. For the two stars to be just resolved Figure 10.19 A parallel beam of light is incident on a convex lens.Because of diffraction effects, the beam gets focused to a spot of radius≈0.61 λ f/a. implying (10.25) Thus ∆θ will be small if the diameter of the objective is large. This implies that the telescope will have better resolving power if a is large. It is for this reason that for better resolution, a telescope must have a large diameter objective. Example 10.6 Assume that light of wavelength 6000Å is coming from a star. What is the limit of resolution of a telescope whose objective has a diameter of 100 inch? Solution A 100 inch telescope implies that 2 a = 100 inch= 254 cm. Thus if, λ ≈6000Å = 6×10–5 cm then radians We can apply a similar argument to the objective lens of a microscope. In this case, the object is placed slightly beyond f, so that a real image is formed at a distance v [Fig. 10.20]. The magnification (ratio of image size to object size) is given by m ≈ v/f. It can be seen from Fig. 10.20 that D/f ≈ 2 tan β (10.26) where 2 β is the angle subtended by the diameter of the objective lens at the focus of the microscope. FIGURE 10.20 Real image formed by the objective lens of the microscope. Determine the resolving power of your eye You can estimate the resolving power of your eye with a simple experiment. Make black stripes of equal width separated by white stripes; see figure here. All the black stripes should be of equal width, while the width of the intermediate white stripes should increase as you go from the left to the right. For example, let all black stripes have a width of 5 mm. Let the width of the first two white stripes be 0.5 mm each, the next two white stripes be 1 mm each, the next two 1.5 mm each, etc. Paste this pattern on a wall in a room or laboratory, at the height of your eye. Now watch the pattern, preferably with one eye. By moving away or closer to the wall, find the position where you can just see some two black stripes as separate stripes. All the black stripes to the left of this stripe would merge into one another and would not be distinguishable. On the other hand, the black stripes to the right of this would be more and more clearly visible. Note the width d of the white stripe which separates the two regions, and measure the distance D of the wall from your eye. Then d/D is the resolution of your eye. You have watched specks of dust floating in air in a sunbeam entering through your window. Find the distance (of a speck) which you can clearly see and distinguish from a neighbouring speck. Knowing the resolution of your eye and the distance of the speck, estimate the size of the speck of dust. When the separation between two points in a microscopic specimen is comparable to the wavelength λ of the light, the diffraction effects become important. The image of a point object will again be a diffraction pattern whose size in the image plane will be (10.27) Two objects whose images are closer than this distance will not be resolved, they will be seen as one. The corresponding minimum separation,d min, in the object plane is given by d min= = or, since =(10.28) Now, combining Eqs. (10.26) and (10.28), we get ≈(10.29) If the medium between the object and the objective lens is not air but a medium of refractive index n, Eq. (10.29) gets modified to (10.30) The product n sin β is called the numerical aperture and is sometimes marked on the objective. The resolving power of the microscope is given by the reciprocal of the minimum separation of two points seen as distinct. It can be seen from Eq. (10.30) that the resolving power can be increased by choosing a medium of higher refractive index. Usually an oil having a refractive index close to that of the objective glass is used. Such an arrangement is called an‘oil immersion objective’. Notice that it is not possible to make sin β larger than unity. Thus, we see that the resolving power of a microscope is basically determined by the wavelength of the light used. There is a likelihood of confusion between resolution and magnification, and similarly between the role of a telescope and a microscope to deal with these parameters. A telescope produces images of far objects nearer to our eye. Therefore objects which are not resolved at far distance, can be resolved by looking at them through a telescope. A microscope, on the other hand, magnifies objects (which are near to us) and produces their larger image. We may be looking at two stars or two satellites of a far-away planet, or we may be looking at different regions of a living cell. In this context, it is good to remember that a telescope resolves whereas a microscope magnifies. 10.6.4 The validity of ray optics An aperture (i.e., slit or hole) of size a illuminated by a parallel beam sends diffracted light into an angle of approximately≈ λ/a. This is the angular size of the bright central maximum. In travelling a distance z, the diffracted beam therefore acquires a width z λ/a due to diffraction. It is interesting to ask at what value of z the spreading due to diffraction becomes comparable to the size a of the aperture. We thus approximately equate z λ/a with a. This gives the distance beyond which divergence of the beam of width a becomes significant. Therefore, (10.31) We define a quantity z F called the Fresnel distance by the following equation Equation (10.31) shows that for distances much smaller than z F, the spreading due to diffraction is smaller compared to the size of the beam. It becomes comparable when the distance is approximately z F. For distances much greater than z F, the spreading due to diffraction dominates over that due to ray optics (i.e., the size a of the aperture). Equation (10.31) also shows that ray optics is valid in the limit of wavelength tending to zero. Example 10.7 For what distance is ray optics a good approximation when the aperture is 3 mm wide and the wavelength is 500 nm? Solution This example shows that even with a small aperture, diffraction spreading can be neglected for rays many metres in length. Thus, ray optics is valid in many common situations. 10.7 Polarisation Consider holding a long string that is held horizontally, the other end of which is assumed to be fixed. If we move the end of the string up and down in a periodic manner, we will generate a wave propagating in the +x direction (Fig. 10.21). Such a wave could be described by the following equation Figure 10.21(a) The curves represent the displacement of a string at t= 0 and at t=∆t, respectively when a sinusoidal wave is propagating in the +x-direction. (b) The curve represents the time variation of the displacement at x= 0 when a sinusoidal wave is propagating in the +x-direction. At x=∆x, the time variation of the displacement will be slightly displaced to the right. y (x,t) =a sin (kx –ω t)(10.32) where a and ω (= 2 π ν) represent the amplitude and the angular frequency of the wave, respectively; further, (10.33) represents the wavelength associated with the wave. We had discussed propagation of such waves in Chapter 15 of Class XI textbook. Since the displacement (which is along the y direction) is at right angles to the direction of propagation of the wave, we have what is known as a transverse wave. Also, since the displacement is in the y direction, it is often referred to as a y-polarised wave. Since each point on the string moves on a straight line, the wave is also referred to as a linearly polarised wave. Further, the string always remains confined to the x-y plane and therefore it is also referred to as a plane polarised wave. In a similar manner we can consider the vibration of the string in the x-z plane generating a z-polarised wave whose displacement will be given by z (x,t) =a sin (kx –ω t) (10.34) It should be mentioned that the linearly polarised waves [described by Eqs. (10.33) and (10.34)] are all transverse waves; i.e., the displacement of each point of the string is always at right angles to the direction of propagation of the wave. Finally, if the plane of vibration of the string is changed randomly in very short intervals of time, then we have what is known as an unpolarised wave. Thus, for an unpolarised wave the displacement will be randomly changing with time though it will always be perpendicular to the direction of propagation. Light waves are transverse in nature; i.e., the electric field associated with a propagating light wave is always at right angles to the direction of propagation of the wave. This can be easily demonstrated using a simple polaroid. You must have seen thin plastic like sheets, which are called polaroids. A polaroid consists of long chain molecules aligned in a particular direction. The electric vectors (associated with the propagating light wave) along the direction of the aligned molecules get absorbed. Thus, if an unpolarised light wave is incident on such a polaroid then the light wave will get linearly polarised with the electric vector oscillating along a direction perpendicular to the aligned molecules; this direction is known as the pass-axis of the polaroid. Thus, if the light from an ordinary source (like a sodium lamp) passes through a polaroid sheet P 1, it is observed that its intensity is reduced by half. Rotating P 1 has no effect on the transmitted beam and transmitted intensity remains constant. Now, let an identical piece of polaroid P 2 be placed before P 1. As expected, the light from the lamp is reduced in intensity on passing through P 2 alone. But now rotating P 1 has a dramatic effect on the light coming from P 2. In one position, the intensity transmitted by P 2 followed by P 1 is nearly zero. When turned by 90° from this position,P 1 transmits nearly the full intensity emerging from P 2 (Fig. 10.22). The above experiment can be easily understood by assuming that light passing through the polaroid P 2 gets polarised along the pass-axis of P 2. If the pass-axis of P 2 makes an angle θ with the pass-axis of P 1, then when the polarised beam passes through the polaroid P 2, the component E cos θ (along the pass-axis of P 2) will pass through P 2. Thus, as we rotate the polaroid P 1 (or P 2), the intensity will vary as: I =I 0 cos 2 θ (10.35) where I 0 is the intensity of the polarized light after passing through P 1.This is known as Malus’ law. The above discussion shows that the intensity coming out of a single polaroid is half of the incident intensity. By putting a second polaroid, the intensity can be further controlled from 50% to zero of the incident intensity by adjusting the angle between the pass-axes of two polaroids. Figure 10.22(a) Passage of light through two polaroids P 2 and P 1. The transmitted fraction falls from 1 to 0 as the angle between them varies from 0° to 90°. Notice that the light seen through a single polaroid P 1 does not vary with angle. (b) Behaviour of the electric vector when light passes through two polaroids. The transmitted polarisation is the component parallel to the polaroid axis.The double arrows show the oscillations of the electric vector. Polaroids can be used to control the intensity, in sunglasses, windowpanes, etc. Polaroids are also used in photographic cameras and 3D movie cameras. Example 10.8 Discuss the intensity of transmitted light when a polaroid sheet is rotated between two crossed polaroids? Solution Let I 0 be the intensity of polarised light after passing through the first polariser P 1. Then the intensity of light after passing through second polariser P 2 will be where θ is the angle between pass axes of P 1 and P 2. Since P 1 and P 3 are crossed the angle between the pass axes of P 2 and P 3 will be (π/2–θ). Hence the intensity of light emerging from P 3 will be =I 0 cos 2 θ sin 2 θ=(I 0/4) sin 2 2 θ Therefore, the transmitted intensity will be maximum when θ=π/4. 10.7.1 Polarisation by scattering The light from a clear blue portion of the sky shows a rise and fall of intensity when viewed through a polaroid which is rotated. This is nothing but sunlight, which has changed its direction (having been scattered) on encountering the molecules of the earth’s atmosphere. As Fig. 10.23(a) shows, the incident sunlight is unpolarised. The dots stand for polarisation perpendicular to the plane of the figure. The double arrows show polarisation in the plane of the figure. (There is no phase relation between these two in unpolarised light). Under the influence of the electric field of the incident wave the electrons in the molecules acquire components of motion in both these directions. We have drawn an observer looking at 90° to the direction of the sun. Clearly, charges accelerating parallel to the double arrows do not radiate energy towards this observer since their acceleration has no transverse component. The radiation scattered by the molecule is therefore represented by dots. It is polarised perpendicular to the plane of the figure. This explains the polarisation of scattered light from the sky. FIGURE 10.23 (a) Polarisation of the blue scattered light from the sky. The incident sunlight is unpolarised (dots and arrows). A typical molecule is shown. It scatters light by 90° polarised normal to the plane of the paper (dots only). (b) Polarisation of light reflected from a transparent medium at the Brewster angle (reflected ray perpendicular to refracted ray). The scattering of light by molecules was intensively investigated by C.V. Raman and his collaborators in Kolkata in the 1920s. Raman was awarded the Nobel Prize for Physics in 1930 for this work. A SPECIAL CASE OF TOTAL TRANSMISSION When light is incident on an interface of two media, it is observed that some part of it gets reflected and some part gets transmitted. Consider a related question: Is it possible that under some conditions a monochromatic beam of light incident on a surface (which is normally reflective) gets completely transmitted with no reflection? To your surprise, the answer is yes. Let us try a simple experiment and check what happens. Arrange a laser, a good polariser, a prism and screen as shown in the figure here. Let the light emitted by the laser source pass through the polariser and be incident on the surface of the prism at the Brewster’s angle of incidence i B. Now rotate the polariser carefully and you will observe that for a specific alignment of the polariser, the light incident on the prism is completely transmitted and no light is reflected from the surface of the prism. The reflected spot will completely vanish. 10.7.2 Polarisation by reflection Figure 10.23(b) shows light reflected from a transparent medium, say, water. As before, the dots and arrows indicate that both polarisations are present in the incident and refracted waves. We have drawn a situation in which the reflected wave travels at right angles to the refracted wave. The oscillating electrons in the water produce the reflected wave. These move in the two directions transverse to the radiation from wave in the medium, i.e., the refracted wave. The arrows are parallel to the direction of the reflected wave. Motion in this direction does not contribute to the reflected wave. As the figure shows, the reflected light is therefore linearly polarised perpendicular to the plane of the figure (represented by dots). This can be checked by looking at the reflected light through an analyser. The transmitted intensity will be zero when the axis of the analyser is in the plane of the figure, i.e., the plane of incidence. When unpolarised light is incident on the boundary between two transparent media, the reflected light is polarised with its electric vector perpendicular to the plane of incidence when the refracted and reflected rays make a right angle with each other. Thus we have seen that when reflected wave is perpendicular to the refracted wave, the reflected wave is a totally polarised wave. The angle of incidence in this case is called Brewster’s angle and is denoted by i B. We can see that i B is related to the refractive index of the denser medium. Since we have i B+r =π/2, we get from Snell’s law (10.36) This is known as Brewster’s law. Example 10.9 Unpolarised light is incident on a plane glass surface. What should be the angle of incidence so that the reflected and refracted rays are perpendicular to each other? Solution For i +r to be equal to π/2, we should have tan i B =µ = 1.5. This gives i B = 57°. This is the Brewster’s angle for air to glass interface. For simplicity, we have discussed scattering of light by 90°, and reflection at the Brewster angle. In this special situation, one of the two perpendicular components of the electric field is zero. At other angles, both components are present but one is stronger than the other. There is no stable phase relationship between the two perpendicular components since these are derived from two perpendicular components of an unpolarised beam. When such light is viewed through a rotating analyser, one sees a maximum and a minimum of intensity but not complete darkness. This kind of light is called partially polarised. Let us try to understand the situation. When an unpolarised beam of light is incident at the Brewster’s angle on an interface of two media, only part of light with electric field vector perpendicular to the plane of incidence will be reflected. Now by using a good polariser, if we completely remove all the light with its electric vector perpendicular to the plane of incidence and let this light be incident on the surface of the prism at Brewster’s angle, you will then observe no reflection and there will be total transmission of light. We began this chapter by pointing out that there are some phenomena which can be explained only by the wave theory. In order to develop a proper understanding, we first described how some phenomena like reflection and refraction, which were studied on this basis of Ray Optics in Chapter 9, can also be understood on the basis of Wave Optics. Then we described Young’s double slit experiment which was a turning point in the study of optics. Finally, we described some associated points such as diffraction, resolution, polarisation, and validity of ray optics. In the next chapter, you will see how new experiments led to new theories at the turn of the century around 1900 A.D. Summary Huygens’ principle tells us that each point on a wavefront is a source of secondary waves, which add up to give the wavefront at a later time. Huygens’ construction tells us that the new wavefront is the forward envelope of the secondary waves. When the speed of light is independent of direction, the secondary waves are spherical. The rays are then perpendicular to both the wavefronts and the time of travel is the same measured along any ray. This principle leads to the well known laws of reflection and refraction. The principle of superposition of waves applies whenever two or more sources of light illuminate the same point. When we consider the intensity of light due to these sources at the given point, there is an interference term in addition to the sum of the individual intensities. But this term is important only if it has a non-zero average, which occurs only if the sources have the same frequency and a stable phase difference. Young’s double slit of separation d gives equally spaced fringes of angular separation λ/d. The source, mid-point of the slits, and central bright fringe lie in a straight line. An extended source will destroy the fringes if it subtends angle more than λ/d at the slits. A single slit of width a gives a diffraction pattern with a central maximum. The intensity falls to zero at angles ofetc., with successively weaker secondary maxima in between. Diffraction limits the angular resolution of a telescope to λ/D where D is the diameter. Two stars closer than this give strongly overlapping images. Similarly, a microscope objective subtending angle 2 β at the focus, in a medium of refractive index n, will just separate two objects spaced at a distance λ/(2 n sin β), which is the resolution limit of a microscope. Diffraction determines the limitations of the concept of light rays. A beam of width a travels a distance a 2/λ, called the Fresnel distance, before it starts to spread out due to diffraction. Natural light, e.g., from the sun is unpolarised. This means the electric vector takes all possible directions in the transverse plane, rapidly and randomly, during a measurement. A polaroid transmits only one component (parallel to a special axis). The resulting light is called linearly polarised or plane polarised. When this kind of light is viewed through a second polaroid whose axis turns through 2 π, two maxima and minima of intensity are seen. Polarised light can also be produced by reflection at a special angle (called the Brewster angle) and by scattering through π/2 in the earth’s atmosphere. Points to Ponder Waves from a point source spread out in all directions, while light was seen to travel along narrow rays. It required the insight and experiment of Huygens, Young and Fresnel to understand how a wave theory could explain all aspects of the behaviour of light. The crucial new feature of waves is interference of amplitudes from different sources which can be both constructive and destructive, as shown in Young’s experiment. Diffraction phenomena define the limits of ray optics. The limit of the ability of microscopes and telescopes to distinguish very close objects is set by the wavelength of light. Most interference and diffraction effects exist even for longitudinal waves like sound in air. But polarisation phenomena are special to transverse waves like light waves. Exercises 10.1 Monochromatic light of wavelength 589 nm is incident from the air on a water surface. What are the wavelength, frequency, and speed of(a) reflected, and (b) refracted light? The Refractive index of water is 1.33. NEETprep Answer 10.2 What is the shape of the wavefront in each of the following cases: (a) Light diverging from a point source. (b) Light emerging out of a convex lens when a point source is placed at its focus. (c) The portion of the wavefront of the light from a distant star intercepted by the Earth. NEETprep Answer 10.3(a) The refractive index of glass is 1.5. What is the speed of light in glass? (Speed of light in a vacuum is 3.0 × 10 8 m s–1) (b) Is the speed of light in glass independent of the color of light? If not, which of the two colors red and violet travels slower in a glass prism? NEETprep Answer 10.4 In Young’s double-slit experiment, the slits are separated by 0.28 mm and the screen is placed 1.4 m away. The distance between the central bright fringe and the fourth bright fringe is measured to be 1.2 cm. Determine the wavelength of light used in the experiment. NEETprep Answer 10.5 In Young’s double-slit experiment using monochromatic light of wavelength λ, the intensity of light at a point on the screen where path difference is λ, is K units. What is the intensity of light at a point where path difference is λ/3? NEETprep Answer 10.6 A beam of light consisting of two wavelengths, 650 nm, and 520 nm, is used to obtain interference fringes in Young’s double-slit experiment. (a) Find the distance of the third bright fringe on the screen from the central maximum for wavelength 650 nm. (b) What is the least distance from the central maximum where the bright fringes due to both the wavelengths coincide? NEETprep Answer 10.7 In a double-slit experiment the angular width of a fringe is found to be 0.2° on a screen placed 1 m away. The wavelength of light used is 600 nm. What will be the angular width of the fringe if the entire experimental apparatus is immersed in water? Take the refractive index of water to be 4/3. NEETprep Answer 10.8 What is the Brewster angle for air to glass transition? (Refractive index of glass = 1.5.) NEETprep Answer 10.9 Light of wavelength 5000 Å falls on a plane reflecting surface. What are the wavelength and frequency of the reflected light? For what angle of incidence is the reflected ray normal to the incident ra y? NEETprep Answer 10.10 Estimate the distance for which ray optics is a good approximation for an aperture of 4 mm and wavelength 400 nm. NEETprep Answer Additional Exercises 10.11 The 6563 Å H α line emitted by hydrogen in a star is found to be red-shifted by 15 Å. Estimate the speed with which the star is receding from the Earth. NEETprep Answer 10.12 Explain how Corpuscular theory predicts the speed of light in a medium, say, water, to be greater than the speed of light in a vacuum. Is the prediction confirmed by experimental determination of the speed of light in wate r? If not, which alternative picture of light is consistent with the experiment? NEETprep Answer 10.13 You have learned in the text how Huygens’ principle leads to the laws of reflection and refraction. Use the same principle to deduce directly that a point object placed in front of a plane mirror produces a virtual image whose distance from the mirror is equal to the object distance from the mirror. NEETprep Answer 10.14 Let us list some of the factors, which could possibly influence the speed of wave propagation: (i) nature of the source. (ii) the direction of propagation. (iii) the motion of the source and/or observer. (iv) wavelength. (v) the intensity of the wave. On which of these factors, if any, does (a) the speed of light in vacuum, (b) the speed of light in a medium (say, glass or water), depends? NEETprep Answer 10.15 For sound waves, the Doppler formula for frequency shift differs slightly between the two situations: (i) source at rest; observer moving, and (ii) source moving; observer at rest. The exact Doppler formulas for the case of light waves in vacuum are, however, strictly identical for these situations. Explain why this should be so. Would you expect the formulas to be strictly identical to the two situations in case of light traveling in a mediu m? NEETprep Answer 10.16 In a double-slit experiment using the light of wavelength 600 nm, the angular width of a fringe formed on a distant screen is 0.1°. What is the spacing between the two slit s? NEETprep Answer 10.17 Answer the following questions: (a) In a single slit diffraction experiment, the width of the slit is made double the original width. How does this affect the size and intensity of the central diffraction ban d? (b) In what way is diffraction from each slit related to the interference pattern in a double-slit experiment? (c) When a tiny circular obstacle is placed in the path of light from a distant source, a bright spot is seen at the center of the shadow of the obstacle. Explain why? (d) Two students are separated by a 7 m partition wall in a room 10 m high. If both light and sound waves can bend around obstacles, how is it that the students are unable to see each other even though they can converse easily. (e) Ray optics is based on the assumption that light travels in a straight line. Diffraction effects (observed when light propagates through small apertures/slits or around small obstacles) disprove this assumption. Yet the ray optics assumption is so commonly used in an understanding location and several other properties of images in optical instruments. What is the justification? NEETprep Answer 10.18 Two towers on top of two hills are 40 km apart. The line joining them passes 50 m above a hill halfway between the towers. What is the longest wavelength of radio waves, which can be sent between the towers without appreciable diffraction effects? NEETprep Answer 10.19 A parallel beam of light of wavelength 500 nm falls on a narrow slit and the resulting diffraction pattern is observed on a screen 1 m away. It is observed that the first minimum is at a distance of 2.5 mm from the center of the screen. Find the width of the slit. NEETprep Answer 10.20 Answer the following questions: (a) When a low flying aircraft passes overhead, we sometimes notice a slight shaking of the picture on our TV screen. Suggest a possible explanation. (b) As you have learned in the text, the principle of linear superposition of wave displacement is basic to understanding intensity distributions in diffraction and interference patterns. What is the justification of this principle? NEETprep Answer 10.21 In deriving the single slit diffraction pattern, it was stated that the intensity is zero at angles of n λ/a. Justify this by suitably dividing the slit to bring out the cancellation. NEETprep Answer Exemplar Q. 1 Consider a tight beam incident from air to a glass slab at Brewster's angle as shown in figure. A polaroid is placed in the path of the emergent ray at point P and rotated about an axis passing through the centre and perpendicular to the plane of the polaroid, (a) For a particular orientation, there shall be darkness as observed through the polaroid (b) The intensity of tight as seen through the polaroid shall be independent of the rotation (c) The intensity of light as seen through the polaroid shall go through a minimum but not zero for two orientations of the polaroid (d) The intensity of light as seen through the polaroid shall go through a minimum for four orientations of the polaroid NEETprep Answer Q. 2 Consider sunlight incident on a slit of width 10 4 4∘A A∘, The image seen through the slit shall (a) be a fine sharp slit white in colour at the centre (b) a bright slit white at the centre diffusing to zero intensities at the edges (c) a bright slit white at the centre diffusing to regions of different colours (d) only be a diffused slit white in colour NEETprep Answer Q.3 Consider a ray of light incident from air onto a slab of glass (refractive index n) of width d, at an angle θ θ. The phase difference between the ray reflected by the top surface of the glass and the bottom surface is. (1)4 π d λ(1−1 n 2 sin 2 θ)1/2+π(2)4 π d λ(1−1 n 2 sin 2 θ)1/2(3)4 π d λ(1−1 n 2 sin 2 θ)1/2+π 2(4)4 π d λ(1−1 n 2 sin 2 θ)1/2+2 π(1)4 π d λ 1-1 n 2 sin 2 θ 1/2+π(2)4 π d λ 1-1 n 2 sin 2 θ 1/2(3)4 π d λ 1-1 n 2 sin 2 θ 1/2+π 2(4)4 π d λ 1-1 n 2 sin 2 θ 1/2+2 π NEETprep Answer Q. 4 Ina Young's double-slit experiment, the source is white light. One of the holes is covered by a red filter and another by a blue filter. In this case, (1) there shall be alternate interference patterns of red and blue (2) there shall be an interference pattern for red distinct from that for blue (3) there shall be no interference fringes (4) there shall be an interference pattern for red mixing with one for blue NEETprep Answer Q. 5 Figure shows a standard two-slit arrangement with slits S 1,S 2,P 1,P 2 S 1,S 2,P 1,P 2 5 are the two minima points on either side of P (figure). At P 2 P 2 on the screen, there is hole and behind is a second 2-slit arrangement with slits S 3,S 4 S 3,S 4 and a second screen behind them. (1) There would be no interference pattern on the second screen but it would be lighted (2) The second screen would be totally dark (3) There would be a single bright point on the second screen (4) There would be a regular two slit pattern on the second screen NEETprep Answer Q.6 Two Sources S 1 a n d S 2 S 1 a n d S 2 of intensity I 1 a n d l 2 I 1 a n d l 2 are front of a screen [Fig.(a)]. The pattern of intensity distribution seen in the central potion i given by Fig.(b). In this case, which of the following statements are true? (1)S 1 a n d S 2 S 1 a n d S 2 have the same intensities (2)S 1 a n d S 2 S 1 a n d S 2 have a constant phase difference (3)S 1 a n d S 2 S 1 a n d S 2 have the same phase (4)S 1 a n d S 2 S 1 a n d S 2 have the same wavelength NEETprep Answer Q. 7 Consider sunlight incident on a pinhole of width 10 3 3∘A A∘. The image of the pinhole seen on a screen shall be (1) a sharp white ring (2) different from a geometrical image (3) a diffused central spot, white in colour (4) diffused coloured region around a sharp central white spot NEETprep Answer Q. 8 Consider the diffraction pattern for a small pinhole. As the size of the hole is increased (1) the size decreases (2) the intensity increases (3) the size increases (4) the intensity decreases NEETprep Answer Q. 9 for light diverging from a point source, (a) the wavefront is spherical (b) the intensity decreases in proportion to the distance squared (c) the wavefront is parabolic (d) the intensity at the wavefront does not depend on the distance NEETprep Answer Q.18 Consider a two-slit interference arrangement (figure) such that the distance of the screen from the slits is half the distance between the slits. Obtanin the value of D in terms of λ λ such that the first minima on the screen falls at a distance D from the centre0. NEETprep Answer Q 19. Figure shown a two-slit arrangement with a source which emits unpolarised Ligt. P is a polariser with axis whose direction is not given. lf l 0 0 is the intensity of the principal maxima when no polariser is present, calculate in the case, the intensity of the principal maxima as well as of the first minima. NEETprep Answer Q.20 A C=C 0=D,S 1 C=S 2 C=d<<D A C=C 0=D,S 1 C=S 2 C=d<<D A small transparent slab containing material of u=1.5 is placed along AS (figure) . What will be the distance from 0 of the principal maxma and of the first minima on either side of the principal maxima obtained in the absence of the glass slab? NEETprep Answer Q. 21 Four identical monochromatic sources A, B, C, D as shown in the (figure) produce waves of the same wavelength λ λ, and are coherent. Two receiver, and R, are at great but equal distances from B. (i) Which of the two receivers picks up the larger signal? (ii) Which of the two receivers picks up the larger signal when 8 is turned off? (iii) Which of the two receivers picks up the larger signal when D is turned off? (iv) Which of the two receivers can distinguish which of the sources B or D has been turned off? R 1 B=d−R 2 B A B=B C=B D=λ/2 R 1 B=d-R 2 B A B=B C=B D=λ/2 NEETprep Answer Q. 22 The optical properties of a medium are governed by the relative permittivity (ε r ε r) and relative permeability (u r u r) . The refractive index is defined as√u r ε r=n u r ε r=n. For ordinary material,ε r>0 a n d u r>0 ε r>0 a n d u r>0 and 4,> 0 and the positive sign is taken for the square root. In 1964, a Russian scientist V. Veselago postulated the existence of material with ε r ε r<0 and u r u r<0. Since, then such metamaterials have been produced in the laboratories and their optical properties studied, For such materials√u r ε r.u r ε r.As light enters a medium of such refractive index the phases travel away from the direction of propagation. (i) According to the description above show that if rays of light enter such a medium from air (refractive index = 1) at an angle 8 in 2nd quadrant, then the refracted beam is in the 3rd quadrant. (ii) Prove that Snell's law holds for such a medium. NEETprep Answer Q. 23 To ensure almost 100% transmissivity, photographic lenses are often coated with a thin layer of dielectric material. The refractive index of this material is intermediated between that of air and glass (which makes the optical element of the lens). A typically used dielectric film is MgF 2 2 (n = 1.38). What should the thickness of the film be so that at the centre of the visible spectrum (5500∘A A∘) there is maximum transmission. NEETprep Answer Q. 10 Is Huygen’s principle valid for longitudinal sound waves? NEETprep Answer Q. 11 Consider a point at the focal point of a convergent lens. Another convergent lens of short focal length is placed on the other side. What is the nature of the wavefronts emerging from the final image? NEETprep Answer Q.12 What is the shape of the wavefront on earth for sunlight? NEETprep Answer Q. 13 Why is the diffraction of sound waves more evident in daily experience than that of light wave? NEETprep Answer Q. 14 The human eye has an approximate angular resolution of ϕ=5.8×10−4 ϕ=5.8×10-4 rad and a typical photoprinter prints a minimum of 300 dpi (dots per inch, 1 inch = 2.54 cm). At what minimal distance z should a printed page be held so that one does not see the individual dots. NEETprep Answer Q.15 A polaroid (1) is placed infront of a monochromatic source. Another polaroid (II) is placed in front of this polaroid (I) and rotated till no light passes. A third polaroid (III) is now placed in between (II) and (II). In this case, wil light emerge from (II). Explain. NEETprep Answer Q. 16 Can reflection result in plane polarised tight if the light is incident on the interface from the side with higher refractive index? NEETprep Answer Q. 17 For the same objective, find the ratio of the least separation between two points to be distinguished by a microscope for light of 5000 A and electrons accelerated through 100V used as the illuminating substance. NEETprep Answer 8527521718 support@neetprep.com S-15, 2nd floor Uphar Cinema Market, above Red Chilli Restaurant, Green Park Extension, New Delhi, 110016 NEET Information NEET 2026 NEET Syllabus NEET Application Process NEET Seat Intake NEET Previous Year Papers AIIMS Previous Year Papers courses NEET Course NEET Course (English) Bio Masterclass Score Booster NEET Test Series All Courses Company About Us Terms of Use Privacy Policy Refund Policy Botany Questions Living World Biological Classification Plant Kingdom Morphology of Flowering Plants Anatomy of Flowering Plants Cell-unit of Life Cell Cycle and Cell Division Transport in Plants Mineral Nutrition Photosynthesis in Higher Plants Respiration in Plants Plant Growth and Development Reproduction in Organisms Sexual Reproduction in Flowering Plants Principles of Inheritance and Variation Molecular Basis of Inheritance Strategies for Enhancement in Food Production Microbes in Human Welfare Organisms and Populations Ecosystem Biodiversity and Conservation Environmental Issues Chemistry Questions Some Basic Concepts of Chemistry Structure of Atom Classification of Elements and Periodicity in Properties Chemical Bonding and Molecular Structure States of Matter Thermodynamics Equilibrium Redox Reactions Hydrogen The s-Block Elements The p-Block Elements-XI Organic Chemistry - Some Basic Principles and Techniques Hydrocarbons Environmental Chemistry The Solid State Solutions Electrochemistry Chemical Kinetics Surface Chemistry General Principles and Processes of Isolation of Elements The p-Block Elements-XII The d and f Block Elements Coordination Compounds Haloalkanes and Haloarenes Alcohols, Phenols and Ethers Aldehydes, Ketones and Carboxylic Acids Amines Biomolecules Polymers Chemistry in Everyday Life Physics Questions Units and Measurement Mathematical Tools Motion in A Straight Line Motion in A Plane Laws of Motion Work, Energy and Power Systems of Particles and Rotational Motion Gravitation Mechanical Properties of Solids Mechanical Properties of Fluids Thermal Properties of Matter Thermodynamics Kinetic Theory of Gases Oscillations Waves Electric Charges and Fields Electrostatic Potential and Capacitance Current Electricity Moving Charges and Magnetism Magnetism and Matter Electromagnetic Induction Alternating Current Electromagnetic Waves Ray Optics and Optical Instruments Wave Optics Dual Nature of Radiation and Matter Atoms Nuclei Semiconductor Electronics Zoology Questions Animal Kingdom Structural Organisation in Animals Biomolecules Digestion and Absorption Breathing and Exchange of Gases Body Fluids and Circulation Excretory Products and their Elimination Locomotion and Movement Neural Control and Coordination Chemical Coordination and Integration Human Reproduction Reproductive Health Evolution Human Health and Disease Biotechnology Principles and Processes Biotechnology and its Application © 2025 GoodEd Technologies Pvt. Ltd.
4181
https://www.freemathhelp.com/forum/threads/similar-pyramids-find-ratios-of-volumes-bases-areas.50986/
similar pyramids: find ratios of volumes, bases, areas | Free Math Help Forum Home ForumsNew postsSearch forums What's newNew postsLatest activity Log inRegister What's newSearch Search [x] Search titles only By: SearchAdvanced search… New posts Search forums Menu Log in Register Install the app Install Forums Free Math Help Geometry and Trig You are using an out of date browser. It may not display this or other websites correctly. You should upgrade or use an alternative browser. similar pyramids: find ratios of volumes, bases, areas Thread starterducksmeowtoo Start dateApr 18, 2007 D ducksmeowtoo New member Joined Apr 18, 2007 Messages 3 Apr 18, 2007 #1 two similar pyramids have heights 12 and 18. Find the ratios of the following: a. base area b. lateral area c. total area d. volumes J jonboy Full Member Joined Jun 8, 2006 Messages 547 Apr 18, 2007 #2 Is this a regular pyramid? skeeter Elite Member Joined Dec 15, 2005 Messages 3,216 Apr 18, 2007 #3 linear dimensions will be in the ratio 12/18 = 2/3 areas (all of them) will have the ratio 4/9 volumes will have the ratio 8/27 D ducksmeowtoo New member Joined Apr 18, 2007 Messages 3 Apr 18, 2007 #4 volumes will have the ratio 8/27 ^ how does it get to that? :?: M Mrspi Senior Member Joined Dec 17, 2005 Messages 2,128 Apr 18, 2007 #5 ducksmeowtoo said: volumes will have the ratio 8/27 ^ how does it get to that? :?: Click to expand... If two figures are similar, then the ratio of related AREAS is the square of the ratio of any pair of corresponding lengths. If the ratio of the lengths is 2 / 3, then the ratio of areas would be (2 / 3)2. If two figures are similar, then the ratio of their VOLUMES is the cube of the ratio of any pair of corresponding lengths. If the ratio the lengths is 2 / 3, then the ratio of the volumes would be (2 / 3)3. (2 / 3)3 = (2/3)(2/3)(2/3), or 8/27 You must log in or register to reply here. Share: FacebookTwitterRedditPinterestTumblrWhatsAppEmailShareLink Forums Free Math Help Geometry and Trig Contact us Terms and rules Privacy policy Help Home RSS Community platform by XenForo®© 2010-2023 XenForo Ltd. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register. By continuing to use this site, you are consenting to our use of cookies. AcceptLearn more… Top
4182
https://www.bbc.co.uk/bitesize/articles/zsmnsk7
KS3 How to convert decimals to percentages Part of MathsFractions Save to My Bitesize Key points Calculations often give a decimal answer. It can be useful to convert a decimal to a percentageA fraction expressed as the number of parts per hundred and recorded using the notation % as a percentage is often easier to understand. To do these conversions, you need to be able to multiply by 100 Back to top How to convert a decimal to a percentage Multiply the decimal by 100 to get the percentage value. Write the percentage value and add the percentage symbol % When the decimal has a value greater than one whole, the percentage will be greater than 100%. Eg the decimal 1∙2 converts to 120% Examples Image gallery Skip image gallery 1 of 6 Slide 1 of 6, Example 1: Zero point four five., Convert 0∙45 to a percentage. End of image gallery Questions What is 0∙8 as a percentage? Multiply 0∙8 by 100 to find the percentage value. 0∙8 x 100 = 80 0∙8 is 80% What is 1∙6 as a percentage? Multiply 1∙6 by 100 to find the percentage value. 1∙6 x 100 = 160 1∙6 is 160% Back to top Practise converting decimals to percentages Try this quiz to practise converting decimals to percentages. Quiz Back to top Real-world maths Converting decimals to percentages can be a valuable skill for anyone who publishes or presents data. This could include scientists, journalists, retailers and engineers. A journalist may investigate employment statistics and find that a company has given a pay rise to 0∙8 of its staff. The figure is expressed as a decimal (0∙8) and so the journalist needs to converts this to a percentage (80%) to make the information easier for their readers to understand. The published article states that: “80% of staff received a pay rise.” Back to top Play Sudoku with BBC Bitesize! Every weekday we release brand new easy, medium and hard Sudoku puzzles. Perfect for testing your skill with numbers and logic. Back to top More on Fractions Find out more by working through a topic How to convert percentages to fractions and decimals count 14 of 14 What are fractions? count 1 of 14
4183
https://bbs.pinggu.org/thread-417270-1-1.html
多元线性回归在什么情况下可以不用截距项 - 经管之家 签到 苹果/安卓/wp 苹果/安卓/wp 客户端 0.0 0.00 推广加币 升级SVIP SVIP(AI增强版) 注册 | 登录 经管百科 学术博客 高端会员俱乐部 项目交易 CDA数据分析师 CDA认证考试 CDA资讯 CDA网校 CDA社区 CDA俱乐部 在线教育 JG学术培训 CAIE人工智能研究院 经管云课堂 CDA网校 CDA数据分析研究院 统计软件培训 金融科技 就学培训网 经管题库 培训证书查询 成为签约讲师 经管文库 专家入驻 美国在职研 就学平台 论坛BBS 提问 悬赏 求职 新闻 读书 功能一区 悬赏大厅文献求助专区求助成功区藏经阁CAIE文档助手 其他版块经管读书学道会经管类求职与招聘真实世界经济学(含财经时事)经管文库(原现金交易版) 经济学人 二区 学术资源/课程/会议/讲座论文版国内外文献账号区活动版题库分享版高级会员区学术之星专栏经管好书专栏学者专栏VIP会员专属下载区 其他版块外文文献专区学术道德监督基金与课题申请教师之家与经管教育 经济学论坛 三区 微观经济学经济金融数学专区宏观经济学 其他版块马克思主义经济学博弈论制度经济学国民经济管理行为经济学与实验经济学发展经济学区域经济学产业经济学公共经济学劳动经济学环境经济学农林经济学能源经济学卫生经济学经济史与经济思想史国防经济学流通经济学教育经济学经济社会统计专版 新商科论坛 四区(原工商管理论坛) 商学院人力资源管理管理信息系统运营管理(物流与供应链管理)企业文化创新与战略管理创业论坛组织管理与领导力市场营销案例库商务谈判系统动力学管理科学与工程数字化企业管理 其他版块新商科教改区行业分析报告MBA专版经管相关法律法规 计量经济学与统计论坛 五区 数据交流中心经管数据资料与实证分析调查问卷专版数据求助计量经济学与统计软件python论坛SPSS论坛Stata专版EViews专版R语言论坛Gauss专版LISREL、AMOS等结构方程模型分析软件IRT理论相关软件winbugs及其他软件专版ExcelSQL及关系型数据库数据分析HLM专版LATEX论坛经管代码库统计软件培训班VIP答疑区 数据科学与人工智能 数据分析与数据科学数据分析与数据挖掘SPSS论坛python论坛SAS专版数据可视化SQL及关系型数据库数据分析R语言论坛ExcelMATLAB等数学软件专版JMP论坛京东电商数据分析师数据分析师(CDA)专版 大数据分析Hadoop论坛Oracle数据库及大数据解决方案mahout论坛数据仓库技术spark高速集群计算平台nosql论坛openstack云平台storm实时数据分析平台行业应用案例比特币与区块链人工智能自然语言处理机器学习语音识别深度学习智能设备与机器人人工智能论文版CAIE人工智能工程师认证 IT基础Scala及其他JVM语言Linux操作系统C与C++编程JAVA语言开发 金融投资论坛 六区 金融学(理论版)量化投资金融工程(数量金融)与金融衍生品经济金融数学专区金融实务版房地产专版互联网金融与Fintech版资管君投行专版比特币、区块链与元宇宙市场行情分析不动产与金融市场保险精算与风险管理CAA、SOA精算师等考证版风险管理CFA、CVA、FRM等金融考证论坛投行估值、金融建模&VBA学习群组CFA学习群组PRM学习群组 会计与财务管理论坛 七区 会计与财务管理企业分析报告CMA管理会计 其他版块财务数据分析税收筹划CPA注册会计师及其他财会考证 世界经济与国际贸易 八区 其他版块世界经济与国际贸易国际商务外贸相关考试论坛 经管考试 九区 经管在职研考研专业课考研公开课保研/调剂(考研)经管在职博考博英语考博专业课保博/调剂(考博)经管考证经济类金融类财会类管理类外语类经管留学外语学习海外生活院校申请 其他版块经管高考经管大学堂 网络课堂 十区 华东地区浙江上海安徽福建山东江苏华南地区广东广西海南华中地区江西河南湖北湖南华北地区河北天津北京内蒙古山西西北地区甘肃新疆陕西西南地区四川云南重庆贵州西藏东北地区辽宁吉林黑龙江港澳台其他台湾国外其他课堂论坛培训 站务区 十一区 站务与外事网络防诈骗专版校园活动区 其他版块新手入门区高校院系合作版 休闲区 十二区 跨学科讨论区哲学与心理学版休闲灌水人大经济论坛怀旧版IDEAS/RePEc 排名互联网运营自媒体运营新媒体运营 其他版块20周年活动专区情感交友跳蚤市场 文库首页 文库分类官方文库考试考证经济与金融管理与财务计量经济与统计行研报告与统计年鉴学术科研综合热门文库郭莎-厦门工学院-数据科学与人工智能中国经济书籍资料统计软件和图书资源全球著名CRC出版社文库 服务一览 VIP服务 SVIP(AI增强版) 数据库 兑换商城 广告服务 案例库 软件销售 校园代理 会员课服务 我的 帖子 收藏 好友 我的空间 关注的人 关注的贴 找人 文库 任务 道具 勋章 网站地图 人大经济论坛›论坛›计量经济学与统计论坛 五区›计量经济学与统计软件›多元线性回归在什么情况下可以不用截距项 CDA数据分析研究院 商业数据分析与大数据领航教育品牌经管云课堂 经管/金融/财会/社科/名师公开课学术培训 Stata 空间计量 SSCI Python贵宾:通行论坛特权+数据库权限 +案例库+下载特权VIP:论坛特权+更多下载次数 +ccerdata数据库+更高阅读权限+…… 返回列表 12下一页 发帖回复 提升主题|本版置顶|关闭主题|变更主题颜色|抢沙发|顶贴|显身卡|道具中心 楼主: zhudic25581 13 多元线性回归在什么情况下可以不用截距项[推广有奖] 加关注 串个门 加好友 发消息 0关注 0粉丝 高中生 zhudic当前离线 阅读权限 255 威望 0 级 论坛币 581 个 通用积分 0.1500 学术水平 0 点 热心指数 0 点 信用等级 0 点 经验 410 点 帖子 27 精华 0 在线时间 23 小时 注册时间 2005-10-13 最后登录 2023-7-26 雷达卡 0% 加关注 串个门 加好友 发消息 0关注 0粉丝 已卖:18份资源 高中生 80% 高中生 积分 77, 距离下一级还需 8 积分 权限: - 道具: 涂鸦板, 彩虹炫, 雷达卡, 热点灯, 显身卡, 匿名卡, 金钱卡 下一级可获得 权限: 自定义头衔 还不是VIP/贵宾 - 还不是VIP/贵宾 购买后可立即获得 权限: 隐身 道具: 金钱卡, 涂鸦板, 变色卡, 彩虹炫, 雷达卡, 热点灯 0% 威望 0 级 论坛币581 个 通用积分 0.1500 学术水平 0 点 热心指数 0 点 信用等级 0 点 经验 410 点 帖子 27 精华 0 在线时间 23 小时 注册时间 2005-10-13 最后登录 2023-7-26 去签到TA的每日心情 | | 开心 2017-6-20 21:55:40 | --- | 签到天数: 1 天 连续签到: 1 天 [LV.1]初来乍到楼主 zhudic发表于 2009-2-14 22:30:00|AI写论文 是 否+2 论坛币 k人 参与回答 ### 经管之家送您一份 应届毕业生专属福利! 求职就业群 赵安豆老师微信:zhaoandou666 ### 经管之家联合CDA 送您一个全额奖学金名额~ ! 立即领取 ### 感谢您参与论坛问题回答 经管之家送您两个论坛币! +2 论坛币 rt 用截距项和不用截距项具体有什么样的区别? 万分感谢! ### 扫码加我 拉你入群 请注明:姓名-公司-职位 以便审核进群资格,未注明则拒绝 分享 0收藏 2回帖 点赞 00 关键词:多元线性回归线性回归截距项万分感谢线性回归 ### 相关帖子 • 不含截距项多元线性回归 • 多元线性回归中常数的经济意义 • 多元线性回归,时间序列需要标准化处理么? • 求救 • 【连载4】 如何用spss做一般(含虚拟变量)多元线性回归 • 求助:多元线性回归 • [求助]多元线性回归拟合优度是不是很重要? • 用proc reg做出多元线性回归,想要得到回归系数的标准差要用什么命令啊 • 贴内的数据能做多元线性回归吗?自变量是二分变量,因变量是连续变量。 • 多元线性回归结果已做出来了,请大家帮忙评价一下! ### 回帖推荐 swjswj11 发表于3楼 查看完整内容 一般情况下,截距项是必须包括的,不管截距项是不是预期为零。因为如果不包括截距项则意味着你默认估计出来的等式是通过原点的,这会导致用最小二乘的估计值不是无偏的。 ### 本帖被以下文库推荐 · 计量.统计精彩问答|主题: 12506, 订阅: 52 回复 举报 Stata初高级2025暑期特训,全面引入AI 辅助,通过覆盖全课程的完整代码、配套数据, 模型配之以示例论文,完整再现论文.课程分为初级和高级两个模块,咨询报名:13321178792 DeepSeek助力Python师资培训-爬虫 ... DeepSeek助力DID-4天_第16期 加关注 串个门 加好友 发消息 0关注 0粉丝 博士生 观光居士 lirry123当前离线 阅读权限 255 威望 0 级 论坛币 4796 个 通用积分 25.0880 学术水平 1 点 热心指数 1 点 信用等级 1 点 经验 7864 点 帖子 255 精华 0 在线时间 244 小时 注册时间 2007-5-30 最后登录 2024-7-6 雷达卡 沙发 lirry123发表于 2009-2-14 22:46:00 if the expected value of dependent variable Y has a zero mean, then an intercept is not necessary included. otherwise, you must include an intercept in this linear regression. 如果你不知道,你就要说! 回复 举报 点赞 10.0005 加关注 串个门 加好友 发消息 0关注 25粉丝 硕士生 swjswj11当前离线 阅读权限 255 威望 0 级 论坛币 23463 个 通用积分 25.8852 学术水平 79 点 热心指数 103 点 信用等级 58 点 经验 4920 点 帖子 77 精华1在线时间 101 小时 注册时间 2007-11-3 最后登录 2024-11-21 雷达卡 藤椅 swjswj11发表于 2009-2-15 14:11:00 一般情况下,截距项是必须包括的,不管截距项是不是预期为零。因为如果不包括截距项则意味着你默认估计出来的等式是通过原点的,这会导致用最小二乘的估计值不是无偏的。 | 已有 2 人评分 | 经验 | 论坛币 | 学术水平 | 收起理由 | --- --- | qdqhb | | | + 1 | 精彩帖子 | | 胖胖小龟宝 | + 10 | + 10 | | 热心帮助其他会员 | 总评分:经验 + 10 论坛币 + 10 学术水平 + 1查看全部评分 回复 举报 点赞 325.9588 加关注 串个门 加好友 发消息 0关注 0粉丝 高中生 zhudic当前离线 阅读权限 255 威望 0 级 论坛币 581 个 通用积分 0.1500 学术水平 0 点 热心指数 0 点 信用等级 0 点 经验 410 点 帖子 27 精华 0 在线时间 23 小时 注册时间 2005-10-13 最后登录 2023-7-26 雷达卡 板凳 zhudic发表于 2009-2-15 14:17:00 谢谢! 回复 举报 点赞 00 加关注 串个门 加好友 发消息 8关注 17粉丝 博士生 QueenCi.Shine当前离线 阅读权限 255 威望 0 级 论坛币 7753 个 通用积分 5.1981 学术水平 100 点 热心指数 138 点 信用等级 107 点 经验 6077 点 帖子 323 精华 0 在线时间 164 小时 注册时间 2013-7-4 最后登录 2025-5-15 雷达卡 报纸 QueenCi.Shine发表于 2014-2-9 18:13:39 > swjswj11 发表于 2009-2-15 14:11 > > 一般情况下,截距项是必须包括的,不管截距项是不是预期为零。因为如果不包括截距项则意味着你默认估计出来 ... 什么样的实证研究适合用多远回归,也就是利用多元回归的依据和理由一般是什么?谢谢 | 已有 1 人评分 | 学术水平 | 收起理由 | --- | Alfred_G | + 1 | 问题很有启发意义 | 总评分:学术水平 + 1查看全部评分 我想有一天,我是那个我喜欢的自己 回复 举报 点赞 00 加关注 串个门 加好友 发消息 2关注 4粉丝 贵宾 dps2000当前离线 阅读权限 255 威望 0 级 论坛币 8752 个 通用积分 65.3651 学术水平 16 点 热心指数 16 点 信用等级 11 点 经验 12584 点 帖子 434 精华 0 在线时间 3212 小时 注册时间 2005-10-27 最后登录 2025-9-27 雷达卡 地板 dps2000发表于 2014-2-10 11:07:03 配方设计时。 回复 举报 点赞 00 加关注 串个门 加好友 发消息 12关注 69粉丝 教授 Alfred_G当前离线 阅读权限 255 威望 0 级 论坛币 21221 个 通用积分 362.8926 学术水平 256 点 热心指数 263 点 信用等级 167 点 经验 92710 点 帖子 905 精华2在线时间 1402 小时 注册时间 2013-12-19 最后登录 2025-8-15 雷达卡 7 楼 Alfred_G发表于 2014-2-10 11:17:29 二三楼的解释已经很清晰了,稍微做个补充吧:多元线性回归在标准化之后也是没有截距的。道理比较简单,就是把变量都进行“趋中化”处理,得到一个个标准正态分布,都是经过零点的,这样会消除截距项。 不过,我们一般都是看非标准化的统计结果,解释不同变量的偏作用 知识和能力是在交流中增加的,平淡做人,认真做事,不功利,不急躁~ 回复 举报 点赞 10 加关注 串个门 加好友 发消息 12关注 69粉丝 教授 Alfred_G当前离线 阅读权限 255 威望 0 级 论坛币 21221 个 通用积分 362.8926 学术水平 256 点 热心指数 263 点 信用等级 167 点 经验 92710 点 帖子 905 精华2在线时间 1402 小时 注册时间 2013-12-19 最后登录 2025-8-15 雷达卡 8 楼 Alfred_G发表于 2014-2-10 11:37:24 > QueenCi.Shine 发表于 2014-2-9 18:13 > > 什么样的实证研究适合用多远回归,也就是利用多元回归的依据和理由一般是什么?谢谢 朋友,这是一个好问题。 回归并不单单是一种方法,更是一种思想,关于因果关系的一种解释。无论是计量经济学,还是社会学等其他学科里面的因果解释,本质上的方法都是回归。因为,影响某一个事件的原因可能有许许多多,而并非单一原因,所以,在具体分析中,肯定不会使用一元。 举个例子吧,面板数据,时间序列,逻辑模型,概率模型,无一例外都是用的GLS或者OLS,或者就是OLS衍生出来的其他模型,都是建立在最小二乘法基础上的。 建议可以去读一些专门讲回归分析或者模型的书籍,可以加深理解~ 知识和能力是在交流中增加的,平淡做人,认真做事,不功利,不急躁~ 回复 举报 点赞 10 加关注 串个门 加好友 发消息 8关注 17粉丝 博士生 QueenCi.Shine当前离线 阅读权限 255 威望 0 级 论坛币 7753 个 通用积分 5.1981 学术水平 100 点 热心指数 138 点 信用等级 107 点 经验 6077 点 帖子 323 精华 0 在线时间 164 小时 注册时间 2013-7-4 最后登录 2025-5-15 雷达卡 9 楼 QueenCi.Shine发表于 2014-2-21 13:36:06 > Alfred_G 发表于 2014-2-10 11:37 > > 朋友,这是一个好问题。 > > 回归并不单单是一种方法,更是一种思想,关于因果关系的一种解释。无论是计量经 ... 谢谢你,这个问题是好,,主要是是我导师问我的,瞬间我就不会了。恩恩,我懂了,大概就是当英雄被解释变量的因素很多,我们只是想具体研究其中一个解释变量与被解释变量之间关系的时候,会采用多元回归,因为这样可以控制其他变量的影响。。谢谢哦 我想有一天,我是那个我喜欢的自己 回复 举报 点赞 00 加关注 串个门 加好友 发消息 15关注 26粉丝 学科带头人 runman当前离线 阅读权限 255 威望 0 级 论坛币 2292 个 通用积分 28.3474 学术水平 8 点 热心指数 9 点 信用等级 8 点 经验 51532 点 帖子 979 精华 0 在线时间 3793 小时 注册时间 2010-4-3 最后登录 2024-10-1 雷达卡 10 楼 runman发表于 2015-12-16 15:41:47 > Alfred_G 发表于 2014-2-10 11:17 > > 二三楼的解释已经很清晰了,稍微做个补充吧:多元线性回归在标准化之后也是没有截距的。道理比较简单,就是 ... “多元线性回归在标准化之后也是没有截距的。”请教一下,这句话如果落实到具体的模型中,如何理解呢?可以理解为多元线性回归不需要截距项吗? 回复 举报 点赞 00 返回列表 12下一页 发帖回复 高级模式 BColorImageLinkQuoteCodeSmilies 您需要登录后才可以回帖 登录 | 我要注册 发表回复- [x] 回帖后跳转到最后一页 初级学术勋章 初级学术勋章 初级热心勋章 初级热心勋章 中级学术勋章 中级学术勋章 中级热心勋章 中级热心勋章 本版微信群 加好友,备注jltj 拉您入交流群 文房思宝 推广员渠道开启 次卡算粒免费用 代理分成可提现 手机版| 意见反馈| 帮助| 新手入门| 用户手册| 友情链接| 如有投资本站、合作意向或投放广告,请联系:13661292478(刘老师) 联系客服 邮箱:service@pinggu.org 投诉或不良信息处理:(010-68466864) 010-68466864 联系我们 招聘英才 合作加盟 广告服务 京ICP备16021002-2号 京B2-20170662号 京公网安备 11010802022788号 论坛法律顾问:王进律师 知识产权保护声明免责及隐私声明 GMT+8, 2025-9-29 14:46 积分 0, 距离下一级还需 积分
4184
https://chemistry.stackexchange.com/questions/72284/why-is-the-ortho-isomer-a-major-product-in-the-nitration-of-toluene
Skip to main content Why is the ortho isomer a major product in the nitration of toluene? Ask Question Asked Modified 7 months ago Viewed 20k times This question shows research effort; it is useful and clear 12 Save this question. Show activity on this post. Usually when an ortho-para directing substituent is present on the benzene ring for an electrophilic aromatic substitution reaction, the para product is the major product (exceptions can be there when hydrogen bonding or ortho effect of COOH group makes the ortho product a major one.) But I don't understand why the ortho product in nitration of toluene is the major product (and the para product isn't). The ortho position is supposed to have more steric crowding, right? organic-chemistry aromatic-compounds Share CC BY-SA 3.0 Follow this question to receive notifications edited Mar 3, 2018 at 14:38 user9974 asked Apr 9, 2017 at 18:14 UtkarshUtkarsh 13711 gold badge11 silver badge33 bronze badges 4 Now I know nothing about this particular nitration but one thing that tends to make ortho products favorable is the inductive effect, due to which ortho position of toulene is slightly more activated than para. – Sawarnik Commented Apr 9, 2017 at 18:49 i read the answers and now I'm confused . If this is the reason then what if there is an ethyl group instead of methyl . Ortho position should be major because of +I effect but this is not the case as para is major .why is that – utkarsh Commented Apr 10, 2017 at 12:19 @utkarsh Then steric hindrance increases and the nitro group will go to the para position. – dr.drizzy Commented Mar 2, 2018 at 20:29 Related: chemistry.stackexchange.com/questions/88752/… – Avyansh Katiyar Commented Mar 3, 2018 at 3:43 Add a comment | 4 Answers 4 Reset to default This answer is useful 18 Save this answer. Show activity on this post. A methyl-group is not t-butyl, so it isn't all that crowded. There are two ortho-positions. There is also the possibility of an ipso-attack with the nitronium donor attacking the position of the methyl group, then shifting to the ortho-position. Given all that without any orientation effect, the ratio between ortho and para should be around 3/1 - 2/1. It is commonly observed around 3/2, so the crowding does have an effect. Share CC BY-SA 3.0 Follow this answer to receive notifications edited Apr 10, 2017 at 12:26 Martin - マーチン♦ 45k1313 gold badges163163 silver badges330330 bronze badges answered Apr 9, 2017 at 19:29 permeakrapermeakra 22.6k11 gold badge5858 silver badges109109 bronze badges Add a comment | This answer is useful 9 Save this answer. Show activity on this post. There are three effects: sterics, electronics and statistics. Yes, there is more steric crowding in the ortho position, but a methyl group isn't that big. In addition, electronic effects are stronger in ortho position than in para, since it is much closer to the +I substituent. And last but not least: there are two ortho positions which can react, but only one para-position, which can have a rather big influence if reactivity towards ortho and para position is similar. Share CC BY-SA 3.0 Follow this answer to receive notifications answered Apr 9, 2017 at 19:29 DSVADSVA 5,84222 gold badges2828 silver badges4242 bronze badges Add a comment | This answer is useful 2 Save this answer. Show activity on this post. One other factor favoring the ortho isomer: hydrogen bonding. Yes, hydrogen bonding to the methyl group. Following the molecular orbital description of hydrogen bonding, an electron pair from the nitro group oxygen atoms can overlap the antibonding orbitals in the methyl groups, delocalizing what are formally the carbon-hydrogen bonds in the methyl group. We can represent this interaction with an additional contributing structure that has no octet-deficient atoms: A para, or for that matter meta attack would not allow this delocalization to take place due to the remoteness of the nitro and methyl functions. Share CC BY-SA 4.0 Follow this answer to receive notifications edited Jan 5 at 18:20 answered Oct 10, 2023 at 12:38 Oscar LanziOscar Lanzi 66.9k44 gold badges102102 silver badges206206 bronze badges 3 Could you mention the source? Wasnt H bonding only when atoms had sufficient EN diff – Piyush Commented Jan 4 at 14:36 1 @Plyush This is far from true. Several examples in this site point to hydrogen bonding even with relatively low electronegativity nonmetals, including another hydrogen atom as in this answer. – Oscar Lanzi Commented Jan 4 at 14:40 1 This is so different from what we're being taught thanks tho – Piyush Commented Jan 4 at 14:47 Add a comment | This answer is useful 0 Save this answer. Show activity on this post. Ortho nitrotoluene is a major product while para nitrotoluene is a minor product . Reasons: In case of reactivity: Ortho product is more reactive comparing with para product because electron density is more enriched at ortho position compared to the para position. In case of stability: Para product is more stable because is away from substituent group so it does not affected by steric hinderence as the ortho position I'd more steric hindered. Share CC BY-SA 4.0 Follow this answer to receive notifications answered Jun 21, 2020 at 14:29 Saleh NassorSaleh Nassor 1 Add a comment | Start asking to get answers Find the answer to your question by asking. Ask question Explore related questions organic-chemistry aromatic-compounds See similar questions with these tags. Featured on Meta Will you help build our new visual identity? Upcoming initiatives on Stack Overflow and across the Stack Exchange network... A list of some basic common misconceptions and teaching errors in chemistry Linked 20 Why is the rate of reaction of polar EAS favored by inductive effects and the rate of less polar EAS reactions through hyperconjugation? 3 Does NH4 anion exist? Related 40 Is the ammonium substituent (-NH3+) really meta-directing in electrophilic substitution? 8 Which is the major product formed on nitration of benzyl methyl ether? 7 Predicting the product of bromination of acetanilide 3 Reactivity comparison of phenol and toluene towards electrophilic substitution 4 Effect of chloromethyl substituent vs methyl substituent on yields of nitration 0 Directing effect in Intramolecular Friedel Crafts Alkylation 5 Major product of the nitration of benz[cd]indol-2(1H)-one Hot Network Questions Why isn't gauge symmetry a symmetry while global symmetry is? In Black Mirror S07E01 “Common People”, why did the characters choose to do that at the end? What does my 3D Printing Life-Seeder Probe need to print to populate the Universe for humans? Help me find out the information about this Russian Pokemon card Were Armenia and/or Azerbaijan subject to US sanctions? What tool can I use to remove a 4 inch cleanout cap with a recessed cross slot? Can I eliminate the input buffer of this circuit? What goes wrong when one goes from elliptic PDEs of second order to higher-order ones? How to have a matplotlib legend span the plot areas of the subplots? Is 人形机器人 a redundant expression? Can I use old QR-skewer on new wheel supplied with a too short skewer? Difference in attitudes towards bitochen and hishtadlus when it comes to Ruchnius convention for natural deduction proofs when lines are not used A selfish behavior - What makes it possible? Reskinning creatures without accidentally hiding how dangerous/safe they are Single OpAmp Impedance Transformation: 75Ω to 5Ω/150Ω VLOOKUP with wildcards Are there other LEGO Duplo track layouts with two trains that trigger all the switches indefinitely? How much am I? - Four-digit number riddle Why did the Yemenites curse Ezra haSofer? A film about a boy with werewolf powers who fights the devil at the end Did recently killed Al Jazeera journalist Anas al-Sharif call the Oct 7 attackers "heroes"? Illustrative GenAI images of real world objects in publications Grothendieck duality (or six functors) for coherent complex-analytic sheaves Question feed By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.
4185
https://www.youtube.com/watch?v=17CBLBJNgGo
Combining radical expressions Brian McLogan 1600000 subscribers 90 likes Description 12814 views Posted: 18 Apr 2013 👉 Learn how to add or subtract radicals. A radical is a number or an expression under the root symbol. Radicals can only be added or subtracted if the numbers or expressions under the roots are the same for all terms. To add or subtract radicals, we reduce/simplify the radicals and then add/subtract the coefficients and retain the root part. 👏SUBSCRIBE to my channel here: ❤️Support my channel by becoming a member: 🙋‍♂️Have questions? Ask here: 🎉Follow the Community: Organized Videos: ✅Add and subtract radical expressions ✅Add and subtract cube roots of numbers ✅Add and subtract 4th roots of numbers ✅Add and subtract 4th roots with variables ✅Add and subtract cube roots with variables ✅Add and subtract square roots with variables ✅Add and sbtract square roots with multiple variables ✅Add and subtract the square roots of numbers 🗂️ Organized playlists by classes here: 🌐 My Website - 🎯Survive Math Class Checklist: Ten Steps to a Better Year: Connect with me: ⚡️Facebook - ⚡️Instagram - ⚡️Twitter - ⚡️Linkedin - 👨‍🏫 Current Courses on Udemy: 👨‍👩‍👧‍👧 About Me: I make short, to-the-point online math tutorials. I struggled with math growing up and have been able to use those experiences to help students improve in math through practical applications and tips. Find more here: radicals #brianmclogan 6 comments Transcript: um so on this problem here what I have is a sare < TK of two plus a of8 plus of 50 now remember ladies and gentlemen we could only add or subtract our square roots or either any of our radicals any of our Roots as long as they were the same term so right now I have square of 2qu of 8 50 I cannot add these this is not equal to square otk of 60 okay they have to be like terms just like we add x's and y's you had you could only add X's with x's right and y's with y's x squ with X squ so we can't combine these the only thing we can do is say if we can simplify this so I look at the of two can I do I know the value of of two no can I simplify the square root of two no then I look at the square root of eight sorry then I look at the square Ro of eight and I say all right can I Square take the square Ro of eight no because I know the square Ro of n is or Square of three is nine so I don't don't have an immediate value for the square of 8 even though approximate value would be 2.8 28 4271 but we we don't want an approximate value we want the exact value but I want to see what square number can I divide what square number can I rewrite with eight and then so code you'd say the largest square number that divides into eight is four four so I rewrite this as the square root of four 2 it is the largest square number and four is my largest square number now I look at 50 and say what's the largest square number that divides into 50 25 now square of two is still square of two then I say all right do I know the square of four now that's two s of two do I know the square of 25 yes five sare of two and now you guys notice I'm taking the square root of the same number correct so now I can combine them up so I have 1 of two plus 2 2s plus 5 2 equals 11 how you square of 25 is five 5 + 7 5 + 2 is 7 + 1 is 8 remember there's a one this right so we got to remember that
4186
https://www.youtube.com/watch?v=bYTs5kWQVbY
Find the fourth proportional to 72, 168, and 150. | CLASS 8 | RATIO, PROPORTION AND VARIATION | ... Doubtnut 3940000 subscribers 9 likes Description 355 views Posted: 24 Jul 2023 Find the fourth proportional to 72, 168, and 150. Class: 8 Subject: MATHS Chapter: RATIO, PROPORTION AND VARIATION Board:FOUNDATION You can ask any doubt from class 6-12, JEE, NEET, Teaching, SSC, Defense and Banking exam on Doubtnut App or You can Whatsapp us at - 8400400400 Link - Join our courses to improve your performance and Clear your concepts from basic for Class 6-12 School and Competitive exams (JEE/NEET) - Contact Us: 👉 Have Any Query? Ask Us. 🤙 Call: 01247158250 💬 WhatsApp: 8400400400 📧 Email: info@doubtnut.com 🌐 Website: Welcome to Doubtnut. Doubtnut is World’s Biggest Platform for Video Solutions of Physics, Chemistry, Maths and Biology Doubts with over 5 million+ Video Solutions. Doubtnut is a Q&A App for Maths, Physics, Chemistry and Biology (up to JEE Advanced and NEET Level), Where You Can Ask Unlimited Questions by Clicking a Picture of Doubt on the Doubtnut App and Get Instant Video Solution. Subscribe Our YouTube Channels: ✿ Doubtnut: ✿ Class 11-12, JEE & NEET (Hindi): ✿ Class 11-12, JEE & NEET (English):: ✿ Class 6-10 (Hindi): ✿ Class 6-10 (English): ✿ Doubtnut Govt. Exams: Follow Us: 🔔 Facebook: 🔔 Instagram: 🔔 Telegram: 🔔 Twitter: 🔔 LinkedIn: Our Telegram Pages: 🔔 Doubtnut Official: 🔔 Doubtnut IIT JEE: 🔔 Doubtnut NEET: 🔔 Doubtnut CBSE Boards: 🔔 Doubtnut UP Boards: 🔔 Doubtnut Bihar Boards: 🔔 Doubtnut Government Exams: class 8 maths class 8 class 8 science class 8 ncert science class 8 english class 8 ncert class 8 ncert history class 8 history sst class 8 class 8 ncert geography class 8 geography cbse class 8 maths cbse class 8 cbse class 8 science class 8 biology class 8 physics class 8 syllabus cbse class 8 books cbse class 8 english class 8 syllabus ncert class 8 syllabus cbse class 8 syllabus cbse maths cbse class 8 ncert cbse class 8 geography cbse class 8 chemistry class 8 syllabus math cbse class 8 physics class 8 syllabus science class 8 syllabus 2021 cbse class 8 ncert solutions class 8 physics syllabus cbse class 8 biology class 8 geography syllabus cbse class 8 grammar class 8 syllabus english class 8 full syllabus class 8 syllabus of science class 8 cbse physics syllabus class 8 syllabus of english class 8 syllabus of maths class 8 syllabus book class 8 syllabus of 2021 class 8 syllabus of sst class 8 syllabus science ncert class 8 syllabus ncert english class 8 syllabus social science class 8 syllabus cbse science class 8 syllabus cbse board Transcript: आज राउत नात आप डाउनलोड करें डाउनलोड पर होगा अब आपके सभी मैथ्स केमिस्ट्री फिजिक्स और बायोलॉजी डाउट का सफाया बस अपने क्वेश्चन की फोटो खींचे उसे क्रॉप करो और तुरंत वीडियो सॉल्यूशन पाओ| डाउनलोड नौ प्रोपोर्शनल तू 72168 एंड 150 ओके तो प्रोपोर्शनल का मतलब क्या होता है देखो हम इसे लिख सकते हैं 72 रेश्यो 168 फिर प्रोपोर्शनल का साइन ए गया ये वाला डबल रेश्यो होता है जो फिर 150 एंड फोर्थ हमें फाइंड आउट करना है तो हमने उसे ले लिया एक्स ओके ये हमें फाइंड आउट करना है ओके एक्स ये है क्या है सी हैव तू फाइंड दिस ओके शिवलाल जी जो प्रोपोर्शन का साइन है यह इक्वल तू में चेंज होता है अगेन यह 150 पीछे वाली वैल्यू डिनॉमिनेटर में अब तो हो जाएगा ये क्वेश्चन एक्स की वैल्यू फाइंड आउट करनी है क्रॉस मल्टीप्लाई कर लो 72 एक्स की वैल्यू क्या हो जाएगी 150 168 एक्स की वैल्यू 6 है तो एक्स को उधर छोड़ दो बस 150 168 और डिनॉमिनेटर में ए जाएगा 72 जो उधर से आया ओके नौ कैंसिल दिस देखो 4 से कैंसिल हो सकता है फॉर मल्टीप्लाई वैन फोर एंड 32 4 8 इस 32 ये हो जाएगा 4 एंड 2 ओके सो 18 देखो ये सिक्स हो जाएगा 63 एंड ये हो जाएगा 6 7 42 अब देखो 3 5.0 तो बचा क्या एक्स = 15 7 5.0 एक और है तो लगा दो व्हाट्सएप कीजिए
4187
https://askfilo.com/user-question-answers-smart-solutions/in-how-many-ways-can-three-persons-stay-in-5-hotel-in-how-3133373133393736
Question asked by Filo student In how many ways can three persons stay in 5 hotel ? In how many of these cases each person stays in a different hotel? Views: 5,372 students Updated on: Nov 14, 2024 Text SolutionText solutionverified iconVerified Concepts: Combinations, Permutations Explanation: To solve the problem, we will break it down into two parts: 1. The total number of ways three persons can stay in 5 hotels. 2. The number of ways in which each person stays in a different hotel. Part 1: Total Ways Each of the 3 persons can choose any of the 5 hotels. Therefore, the total number of ways is: 53=125 Part 2: Each Person in Different Hotels To find the number of ways in which each person stays in a different hotel, we first choose 3 hotels out of the 5, and then assign each person to one of these hotels. The number of ways to choose 3 hotels from 5 is given by the combination formula: C(5,3)=3!(5−3)!5!​=10 After choosing the hotels, we can assign the 3 persons to these hotels in 3! ways. Thus, the total number of ways is: C(5,3)×3!=10×6=60 So, the answers are: Step by Step Solution: Step 1 Calculate the total number of ways three persons can stay in 5 hotels: 53=125. Step 2 Calculate the number of ways each person can stay in a different hotel: C(5,3)×3!=10×6=60. Final Answer: Total ways: 125; Ways with each in different hotels: 60 Students who ask this question also asked Views: 5,381 Topic: Smart Solutions View solution Views: 5,509 Topic: Smart Solutions View solution Views: 5,501 Topic: Smart Solutions View solution Views: 5,165 Topic: Smart Solutions View solution Stuck on the question or explanation? Connect with our tutors online and get step by step solution of this question. | | | --- | | Question Text | In how many ways can three persons stay in 5 hotel ? In how many of these cases each person stays in a different hotel? | | Updated On | Nov 14, 2024 | | Topic | All topics | | Subject | Smart Solutions | | Class | Class 11 | | Answer Type | Text solution:1 | Are you ready to take control of your learning? Download Filo and start learning with your favorite tutors right away! Questions from top courses Explore Tutors by Cities Blog Knowledge © Copyright Filo EdTech INC. 2025
4188
https://www.expii.com/t/isosceles-triangle-properties-983
Expii Isosceles Triangle Properties - Expii In an isosceles triangle, the base angles are congruent. In other words, iso-lateral (isosceles) triangles are iso-angular. This is sometimes called the isosceles triangle theorem, or pons asinorum. Explanations (4) Aryaman Khandelwal Text 5 The isosceles triangle theorem simply states that "If two sides of a triangle are congruent, the angles opposite them are congruent." This is quite obvious to most, as many people take it for granted that the two base angles of an isosceles triangle are congruent. The proof for this theorem is also quite straightforward. The first step requires you to draw the angle bisector AD. Now, because of the triangle congruency postulate SAS, we can say that triangle CAD is congruent to triangle BAD. Because Congruent Parts of Congruent Triangles are Congruent(CPCTC), we can say that angle ACD is congruent to angle ABD. Report Share 5 Like Related Lessons Proving a Triangle Is Isosceles Acute, Right, and Obtuse Triangles Isosceles and Equilateral Symmetry and Special Lines Side-Angle Inequalities in a Triangle View All Related Lessons Emma Wong Text 4 Isosceles triangle theorem The isosceles triangle theorem is a very important theorem. It states that the angles opposite the two equal sides of an isosceles triangle are equal. Aryaman Khandelwal proved it by defining an angle bisector. I will show you a different proof which doesn't require you to draw any new points. Let △ABC be a triangle such that |AB|=|AC|. △BAC≅△CAB, because |BA|=|CA|, |AC|=|AB| and ∠BAC=∠CAB. So, ∠ACB=∠ABC. We can prove the converse of this theorem similarly. Let △ABC be a triangle such that ∠ACB=∠ABC. △BAC≅△CAB, because |BC|=|CB|, ∠ACB=∠ABC and ∠BAC=∠CAB. So, |BA|=|CA|. Report Share 4 Like Ethan Tan Text 1 The Isosceles Triangle Theorem States that if a triangle contains 2 congruent sides, then the angles opposite those sides are congruent. This theorem can be proved using the Law of Sines: The Law of Sines states that: asinA=bsinB=csinC If a=c, making △ABC an isosceles triangle, then asinA=asinC! By simply dividing both sides of the equation by a and raising to the power of negative 1, we are left with sinA=sinC And therefore m∠A=m∠C. The converse of the Isosceles Triangle Theorem can be proved in a similar manner. Report Share 1 Like Freya Edholm Text 1 On each of the worksheets just linked to, please try problems 4-10. Have fun! Report Share 1 Like You've reached the end How can we improve? General Bug Feature Send Feedback
4189
https://phys.libretexts.org/Bookshelves/College_Physics/College_Physics_1e_(OpenStax)/17%3A_Physics_of_Hearing/17.05%3A_Sound_Interference_and_Resonance-_Standing_Waves_in_Air_Columns
Skip to main content 17.5: Sound Interference and Resonance- Standing Waves in Air Columns Last updated : Feb 20, 2022 Save as PDF 17.4: Doppler Effect and Sonic Booms 17.6: Hearing Page ID : 1618 OpenStax OpenStax ( \newcommand{\kernel}{\mathrm{null}\,}) Learning Objectives By the end of this section, you will be able to: Define antinode, node, fundamental, overtones, and harmonics. Identify instances of sound interference in everyday situations. Describe how sound interference occurring inside open and closed tubes changes the characteristics of the sound, and how this applies to sounds produced by musical instruments. Calculate the length of a tube using sound wave measurements. Interference is the hallmark of waves, all of which exhibit constructive and destructive interference exactly analogous to that seen for water waves. In fact, one way to prove something “is a wave” is to observe interference effects. So, sound being a wave, we expect it to exhibit interference; we have already mentioned a few such effects, such as the beats from two similar notes played simultaneously. Figure 17.5.2 shows a clever use of sound interference to cancel noise. Larger-scale applications of active noise reduction by destructive interference are contemplated for entire passenger compartments in commercial aircraft. To obtain destructive interference, a fast electronic analysis is performed, and a second sound is introduced with its maxima and minima exactly reversed from the incoming noise. Sound waves in fluids are pressure waves and consistent with Pascal’s principle; pressures from two different sources add and subtract like simple numbers; that is, positive and negative gauge pressures add to a much smaller pressure, producing a lower-intensity sound. Although completely destructive interference is possible only under the simplest conditions, it is possible to reduce noise levels by 30 dB or more using this technique. Where else can we observe sound interference? All sound resonances, such as in musical instruments, are due to constructive and destructive interference. Only the resonant frequencies interfere constructively to form standing waves, while others interfere destructively and are absent. From the toot made by blowing over a bottle, to the characteristic flavor of a violin’s sounding box, to the recognizability of a great singer’s voice, resonance and standing waves play a vital role. Interference Interference is such a fundamental aspect of waves that observing interference is proof that something is a wave. The wave nature of light was established by experiments showing interference. Similarly, when electrons scattered from crystals exhibited interference, their wave nature was confirmed to be exactly as predicted by symmetry with certain wave characteristics of light. Suppose we hold a tuning fork near the end of a tube that is closed at the other end, as shown in Figure 17.5.3, Figure 17.5.4, Figure 17.5.5, and Figure 17.5.6. If the tuning fork has just the right frequency, the air column in the tube resonates loudly, but at most frequencies it vibrates very little. This observation just means that the air column has only certain natural frequencies. The figures show how a resonance at the lowest of these natural frequencies is formed. A disturbance travels down the tube at the speed of sound and bounces off the closed end. If the tube is just the right length, the reflected sound arrives back at the tuning fork exactly half a cycle later, and it interferes constructively with the continuing sound produced by the tuning fork. The incoming and reflected sounds form a standing wave in the tube as shown. The standing wave formed in the tube has its maximum air displacement (an antinode) at the open end, where motion is unconstrained, and no displacement (a node) at the closed end, where air movement is halted. The distance from a node to an antinode is one-fourth of a wavelength, and this equals the length of the tube; thus, λ=4L. This same resonance can be produced by a vibration introduced at or near the closed end of the tube, as shown in Figure 17.5.7. It is best to consider this a natural vibration of the air column independently of how it is induced. Given that maximum air displacements are possible at the open end and none at the closed end, there are other, shorter wavelengths that can resonate in the tube, such as the one shown in Figure 17.5.8. Here the standing wave has three-fourths of its wavelength in the tube, or L=(3/4)λ′, so that λ′=4L/3. Continuing this process reveals a whole series of shorter-wavelength and higher-frequency sounds that resonate in the tube. We use specific terms for the resonances in any system. The lowest resonant frequency is called the fundamental, while all higher resonant frequencies are called overtones. All resonant frequencies are integral multiples of the fundamental, and they are collectively called harmonics. The fundamental is the first harmonic, the first overtone is the second harmonic, and so on. Figure 17.5.9shows the fundamental and the first three overtones (the first four harmonics) in a tube closed at one end. The fundamental and overtones can be present simultaneously in a variety of combinations. For example, middle C on a trumpet has a sound distinctively different from middle C on a clarinet, both instruments being modified versions of a tube closed at one end. The fundamental frequency is the same (and usually the most intense), but the overtones and their mix of intensities are different and subject to shading by the musician. This mix is what gives various musical instruments (and human voices) their distinctive characteristics, whether they have air columns, strings, sounding boxes, or drumheads. In fact, much of our speech is determined by shaping the cavity formed by the throat and mouth and positioning the tongue to adjust the fundamental and combination of overtones. Simple resonant cavities can be made to resonate with the sound of the vowels, for example. (See Figure 17.5.10.) In boys, at puberty, the larynx grows and the shape of the resonant cavity changes giving rise to the difference in predominant frequencies in speech between men and women. Now let us look for a pattern in the resonant frequencies for a simple tube that is closed at one end. The fundamental has λ=4L, and frequency is related to wavelength and the speed of sound as given by: vw=fλ.(17.5.1) Solving for f in this equation gives f=vwλ=vw4L,(17.5.2) where vw is the speed of sound in air. Similarly, the first overtone has λ′=4L/3 (see Figure 17.5.9), so that f′=3vw4L=3f.(17.5.3) Because f′=3f we call the first overtone the third harmonic. Continuing this process, we see a pattern that can be generalized in a single expression. The resonant frequencies of a tube closed at one end are fn=nvw4L,n=1,3, 5,(17.5.4) where f1 is the fundamental, f3 is the first overtone, and so on. It is interesting that the resonant frequencies depend on the speed of sound and, hence, on temperature. This dependence poses a noticeable problem for organs in old unheated cathedrals, and it is also the reason why musicians commonly bring their wind instruments to room temperature before playing them. Example17.5.1: Find the Length of a Tube with a 128 Hz Fundamental What length should a tube closed at one end have on a day when the air temperature, is 22oC, if its fundamental frequency is to be 128 Hz (C below middle C)? What is the frequency of its fourth overtone? Strategy The length L can be found from the relationship in fn=nvw4L, but we will first need to find the speed of sound vw. Solution for (a) (1) Identify knowns: the fundamental frequency is 128 Hz the air temperature is 22oC (2) Use fn=nvw4L to find the fundamental frequency (n = 1). f1=vw4L(17.5.5) (3) Solve this equation for length. L=vw4f1(17.5.6) (4) Find the speed of sound using vw=(331m/s)T273K−−−−√. vw=(331m/s)295K273K−−−−−−√=344m/s(17.5.7) (5) Enter the values of the speed of sound and frequency into the expression for L. L=vw4f1=344m/s4(128Hz)=0.672m(17.5.8) Discussion on (a) Many wind instruments are modified tubes that have finger holes, valves, and other devices for changing the length of the resonating air column and hence, the frequency of the note played. Horns producing very low frequencies, such as tubas, require tubes so long that they are coiled into loops. Solution for (b) (1) Identify knowns: the first overtone has n=3 the second overtone has n=5 the third overtone has n=7 the fourth overtone has n=9 (2) Enter the value for the fourth overtone into fn=nvw4L. f9=9vw4L=9f1=1.15kHz(17.5.9) Discussion on (b) Whether this overtone occurs in a simple tube or a musical instrument depends on how it is stimulated to vibrate and the details of its shape. The trombone, for example, does not produce its fundamental frequency and only makes overtones. Another type of tube is one that is open at both ends. Examples are some organ pipes, flutes, and oboes. The resonances of tubes open at both ends can be analyzed in a very similar fashion to those for tubes closed at one end. The air columns in tubes open at both ends have maximum air displacements at both ends, as illustrated in Figure 17.5.11. Standing waves form as shown. Based on the fact that a tube open at both ends has maximum air displacements at both ends, and using Figure 17.5.11 as a guide, we can see that the resonant frequencies of a tube open at both ends are: fn=nvw2L,n=1,2,3...,(17.5.10) where f1 is fundamental, f2 is the overtone, f3 is the second overtone, and so on. Note that a tube open at both ends has a fundamental frequency twice what it would have if closed at one end. It also has a different spectrum of overtones than a tube closed at one end. So if you had two tubes with the same fundamental frequency but one was open at both ends and the other was closed at one end, they would sound different when played because they have different overtones. Middle C, for example, would sound richer played on an open tube, because it has even multiples of the fundamental as well as odd. A closed tube has only odd multiples. REAL WORLD APPLICATIONS: RESONANCE IN EVERYDAY Resonance occurs in many different systems, including strings, air columns, and atoms. Resonance is the driven or forced oscillation of a system at its natural frequency. At resonance, energy is transferred rapidly to the oscillating system, and the amplitude of its oscillations grows until the system can no longer be described by Hooke’s law. An example of this is the distorted sound intentionally produced in certain types of rock music. Wind instruments use resonance in air columns to amplify tones made by lips or vibrating reeds. Other instruments also use air resonance in clever ways to amplify sound. Figure 17.5.12shows a violin and a guitar, both of which have sounding boxes but with different shapes, resulting in different overtone structures. The vibrating string creates a sound that resonates in the sounding box, greatly amplifying the sound and creating overtones that give the instrument its characteristic flavor. The more complex the shape of the sounding box, the greater its ability to resonate over a wide range of frequencies. The marimba, like the one shown in Figure 17.5.13uses pots or gourds below the wooden slats to amplify their tones. The resonance of the pot can be adjusted by adding water. We have emphasized sound applications in our discussions of resonance and standing waves, but these ideas apply to any system that has wave characteristics. Vibrating strings, for example, are actually resonating and have fundamentals and overtones similar to those for air columns. More subtle are the resonances in atoms due to the wave character of their electrons. Their orbitals can be viewed as standing waves, which have a fundamental (ground state) and overtones (excited states). It is fascinating that wave characteristics apply to such a wide range of physical systems. Exercise 17.5.1 Describe how noise-canceling headphones differ from standard headphones used to block outside sounds. Answer : Regular headphones only block sound waves with a physical barrier. Noise-canceling headphones use destructive interference to reduce the loudness of outside sounds. Exercise 17.5.2 How is it possible to use a standing wave's node and antinode to determine the length of a closed-end tube? Answer : When the tube resonates at its natural frequency, the wave's node is located at the closed end of the tube, and the antinode is located at the open end. The length of the tube is equal to one-fourth of the wavelength of this wave. Thus, if we know the wavelength of the wave, we can determine the length of the tube. PHET EXPLORATIONS: SOUND This simulation lets you see sound waves. Adjust the frequency or volume and you can see and hear how the wave changes. Move the listener around and hear what she hears. Summary Sound interference and resonance have the same properties as defined for all waves. In air columns, the lowest-frequency resonance is called the fundamental, whereas all higher resonant frequencies are called overtones. Collectively, they are called harmonics. The resonant frequencies of a tube closed at one end are: fn=nvw4L,n=1,3,5..., f1 is fundamental and L is the length of the tube. The resonant frequencies of a tube open at both ends are: fn=nvw2L,n=1,2,3... Glossary antinode : point of maximum displacement node : point of zero displacement fundamental : the lowest-frequency resonance overtones : all resonant frequencies higher than the fundamental harmonics : the term used to refer collectively to the fundamental and its overtones 17.4: Doppler Effect and Sonic Booms 17.6: Hearing
4190
https://brilliant.org/wiki/spanning-trees/
Spanning Trees Sign up with Facebook or Sign up manually Already have an account? Log in here. Alex Chumbley, Karleigh Moore, Timmy Jose, and Jimin Khim contributed Spanning trees are special subgraphs of a graph that have several important properties. First, if T is a spanning tree of graph G, then T must span G, meaning T must contain every vertex in G. Second, T must be a subgraph of G. In other words, every edge that is in T must also appear in G. Third, if every edge in T also exists in G, then G is identical to T. Spanning trees are important in path-finding algorithms such as Dijkstra's shortest path algorithm and A search algorithm. Spanning trees are calculated as sub-parts in those algorithms. It is also used in network routing protocols. The spanning tree protocol is one example. Graph with a spanning tree highlighted in blue Contents Properties Spanning Trees and Graph Types Finding Spanning Trees Minimum Spanning Trees References Properties There are a few general properties of spanning trees. A connected graph can have more than one spanning tree. They can have as many as ∣v∣∣v∣−2, where ∣v∣ is the number of vertices in the graph. All possible spanning trees for a graph G have the same number of edges and vertices. Spanning trees do not have any cycles. Spanning trees are all minimally connected. That is, if any one edge is removed, the spanning tree will no longer be connected. Adding any edge to the spanning tree will create a cycle. So, a spanning tree is maximally acyclic. Spanning trees have ∣n∣−1 edges, where ∣n∣ is the number of vertices. Spanning Trees and Graph Types Different types of graphs have different numbers of spanning trees. Here are a few examples. 1) Complete Graphs A complete graph is a graph where every vertex is connected to every other vertex. The number of spanning trees for a graph G with ∣v∣ vertices is defined by the following equation: T(Gcomplete​)=∣v∣∣v∣−2. Complete Graph 2) Connected Graphs For connected graphs, spanning trees can be defined either as the minimal set of edges that connect all vertices or as the maximal set of edges that contains no cycle. A connected graph is simply a graph that necessarily has a number of edges that is less than or equal to the number of edges in a complete graph with the same number of vertices. Therefore, the number of spanning trees for a connected graph is T(Gconnected​)≤∣v∣∣v∣−2. Connected Graph 3) Trees If a graph G is itself a tree, the only spanning tree of G is itself. So a tree with ∣v∣ vertices is defined as T(Gtree​)=∣v∣∣v∣−2. Tree Graph 4) Complete Bipartite Graph A bipartite graph is a graph where every node can either be associated with one of two sets, m or n. Vertices within these sets only connect to vertices in the other. There are no intra-set edges. A complete bipartite graph then is a bipartite graph where every vertex in set m is connected to every vertex in set n, and vice versa. The number of spanning trees for a bipartite graph is defined by T(Gcomplete-bipartite​)=mn−1⋅nm−1. Complete Bipartite Graph 5) General Graph To calculate the number of spanning trees for a general graph, a popular theorem is Kirchhoff's theorem. To perform this theorem, a two-dimensional matrix must be constructed that can be indexed via both row and column by the graphs' vertices. The cell in the ith row and jth column has a value that is determined by three things. If i=j, then the value in the cell will be equal to the degree of i. If i and j are adjacent, then the value will be −1. Otherwise, the value will be 0. From here, an arbitrary vertex is chosen and its corresponding row and column is removed from the matrix. The determinant of this new matrix is a spanning tree T(G). Finding Spanning Trees Spanning trees can be found in linear O(V+E) time by simply performing breadth-first search or depth-first search. These graph search algorithms are only dependent on the number of vertices in the graph, so they are quite fast. Breadth-first search will use a queue to hold vertices to explore later, and depth-first search will use a stack. In either case, a spanning tree can be constructed by connecting each vertex v with the vertex that was used to discover it. Unfortunately, these search algorithms are not well suited for parallel or distributed computing, an area in which spanning trees are popular. There are, however, algorithms that are designed to find spanning trees in a parallel setting. For complete graphs, there is an exact number of edges that must be removed to create a spanning tree. For a complete graph G, a spanning tree can be calculated by removing ∣e∣−∣v∣+1 edges. In this equation, ∣e∣ is the number of edges, and ∣v∣ is the number of vertices. Minimum Spanning Trees Minimum spanning trees are a variant of the spanning tree. A minimum spanning tree for an unweighted graph G is a spanning tree that minimizes the number of edges or edge weights. A minimum spanning tree for a weighted graph G is a spanning tree that minimizes the weights of the edges in the tree. These two images show the difference between a spanning tree and minimum spanning tree. The edges that are grayed out are left out of their respective trees, but they're left in the images to show their weights. Weighted spanning tree Weighted minimum spanning tree Minimum spanning trees are very helpful in many applications and algorithms. They are often used in water networks, electrical grids, and computer networks. They are also used in graph problems like the traveling salesperson problem, and they are used in important algorithms such as the min-cut max-flow algorithm. There are many ways to find the minimum spanning trees, but Kruskal's algorithm is probably the fastest and easiest to do by hand. Find the minimum spanning tree for the graph below. What is its total weight? Example Graph The minimum spanning tree is shown below. Its total weight is 31. Minimum Spanning Tree Eppstein, D. Spanning Trees. Retrieved April 10, 2016, from Benbennick, D. Wikipedia Complete Graph. Retrieved May 21, 2016, from A, L. Wikipedia Connected Graph. Retrieved May 21, 2016, from A, L. Wikipedia Tree. Retrieved May 21, 2016, from A, K. Wikipedia Complete Bipartite Graph. Retrieved May 21, 2016, from Cite as: Spanning Trees. Brilliant.org. Retrieved 16:50, September 17, 2025, from
4191
https://www.youtube.com/watch?v=ZrEJKHlcm4w
Right Triangle Definitions of Trigonometric Functions SOH CAH TOA The Math Sorcerer 1220000 subscribers 16 likes Description 689 views Posted: 15 May 2018 Please Subscribe here, thank you!!! Right Triangle Definitions of Trigonometric Functions SOH CAH TOA Transcript: hey everyone in this video we're going to define the trigonometric functions in terms of a right triangle so here we'll draw one leg of the triangle here's the hypotenuse and then here is another leg so this will be a right triangle meaning that this is 90 degrees and then here we have our angle theta so according to theta this is called the adjacent side so this is the side adjacent to theta so a a for adjacent this is the side opposite of theta so this is called opposite and so we'll use oh for opposite and this is of course the hypotenuse so hypotenuse and we'll use H for hypotenuse and so using this triangle we can define the trig functions using an ancient method so so so call Toa sohcahtoa so sine of theta is so sine is so so so it's opposite over hypotenuse okay opposite over hypotenuse that means that the reciprocal function which is cosecant of theta it's hoe so H over Oh cosine of theta so it's sohcahtoa so it's a over H a over H and then secant is the reciprocal so it's ha and then tangent so it's so called Toa Oh wha so it's over a and so cotangent is aoao so a over o so pretty easy to memorize this extremely easy I think so it's so caught oh ah so really really simple very very very useful let's go ahead and do a really simple example so you see how this works so we'll be given a right triangle and we'll be asked we'll find the the trig function values of theta so here's theta here's the number 28 35 and save 45 and based off of this we can write down all of the trig functions so let's see sine of theta so let me label everything this is going to be the adjacent side this is the opposite side and this one here is the hypotenuse so sohcahtoa so over H so would be 35 over 45 and if you simplify this you just get 7 over 9 okay then the reciprocal of sine is cosecant it's the one that starts with the other letter so I'm just going to flip it and just do 9 over 7 ok so two down let's do cosine no so cosine so it's so cool so it's a over H so a is 28 and then H is 45 okay and the reciprocal of this would be the secant function so secant of theta would be 45 over 28 and finally we can do tangent so sohcahtoa so tangent is o over a so o is 35 and a is 28 and the reciprocal of tangent is simply cotangent so that would be you just flip it so you get 28 over 35 so just a quick video to show you probably one of the most useful things that you can learn in trig sohcahtoa so kah Toa super super powerful stuff hope that helped
4192
https://www.wyzant.com/resources/answers/29153/use_the_angle_sum_or_difference_identity_to_find_the_exact_value_of_sin_15_degrees
use the angle sum or difference identity to find the exact value of sin 15 degrees | Wyzant Ask An Expert Log inSign up Find A Tutor Search For Tutors Request A Tutor Online Tutoring How It Works For Students FAQ What Customers Say Resources Ask An Expert Search Questions Ask a Question Wyzant Blog Start Tutoring Apply Now About Tutors Jobs Find Tutoring Jobs How It Works For Tutors FAQ About Us About Us Careers Contact Us All Questions Search for a Question Find an Online Tutor Now Ask a Question for Free Login WYZANT TUTORING Log in Sign up Find A Tutor Search For Tutors Request A Tutor Online Tutoring How It Works For Students FAQ What Customers Say Resources Ask An Expert Search Questions Ask a Question Wyzant Blog Start Tutoring Apply Now About Tutors Jobs Find Tutoring Jobs How It Works For Tutors FAQ About Us About Us Careers Contact Us Subject ZIP Search SearchFind an Online Tutor NowAsk Ask a Question For Free Login Algebra 2Trigonometry Steven P. asked • 03/10/14 use the angle sum or difference identity to find the exact value of sin 15 degrees I don't understand what to do after i the two numbers like (45-30) Follow •3 Add comment More Report 3 Answers By Expert Tutors Best Newest Oldest By: Steve S.answered • 03/11/14 Tutor 5(3) Tutoring in Precalculus, Trig, and Differential Calculus See tutors like this See tutors like this Find the EXACT value of sin(15°) using a sum or difference formula. In this solution the following will be strictly adhered to: Trig Functions are FUNCTIONS and proper functional notation should always be used. Parentheses will be used to create non-ambiguous expressions. The value will be expressed as requested; i.e., in EXACT form (NO CALCULATORS WILL BE USED). sin(15°) = sin(45° – 30°) = sin(45°)cos(30°) – cos(45°)sin(30°) Recall the two Special Triangles: 45°-45°-90° and 30°-60°-90°. Their sides across from the angles are in the ratios: 1:1:√(2) & 1:√(3):2. Draw and label diagrams of the two Special Triangles to guide you. sin(15°) = sin(45°)cos(30°) – cos(45°)sin(30°) = (1/√(2))(√(3)/2) – (1/√(2))(1/2) = (1/√(2)) ( (√(3)/2) – (1/2) ) = (√(2)/2) ( (√(3) – 1)/2) ) = ( √(6) – √(2) )/4 Upvote • 0Downvote Add comment More Report Amarjeet K.answered • 03/10/14 Tutor 4.6(8) Professional Engineer for Math and Science Turoring See tutors like this See tutors like this sin(45-30) = sin45cos30 - cos45sin30 = (1/√2 x √3/2) - (1/2 x 1/2) = √3/2√2 - 1/4 :) Upvote • 0Downvote Add comment More Report Mozhgan Z.answered • 03/10/14 Tutor New to Wyzant Professional Math, Chemistry and Physics Tutor See tutors like this See tutors like this sin(15)=sin(45-30) knowing the following equation: sin(α – β) = sin(α)cos(β) – cos(α)sin(β) we can say: sin(45-30)=sin45cos30 - cos45sin30 sin45=cos45=2^0.5/2 sin30=1/2, cos30=3^0.5/2 plugging in these values: sin(45-30)=(2^0.5/23^0.5/2)-(2^0.5/21/2) doing the calculations: sin(15) = 0.259 Upvote • 0Downvote Comment •1 More Report Steve S. Problem asked for "exact value". A calculator only gives approximate values. Report 03/11/14 Still looking for help? Get the right answer, fast. Ask a question for free Get a free answer to a quick problem. Most questions answered within 4 hours. OR Find an Online Tutor Now Choose an expert and meet online. No packages or subscriptions, pay only for the time you need. ¢€£¥‰µ·•§¶ß‹›«»<>≤≥–—¯‾¤¦¨¡¿ˆ˜°−±÷⁄׃∫∑∞√∼≅≈≠≡∈∉∋∏∧∨¬∩∪∂∀∃∅∇∗∝∠´¸ª º†‡À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö Ø Œ Š Ù Ú Û Ü Ý Ÿ Þ à á â ã ä å æ ç è é ê ë ì í î ï ð ñ ò ó ô õ ö ø œ š ù ú û ü ý þ ÿ Α Β Γ Δ Ε Ζ Η Θ Ι Κ Λ Μ Ν Ξ Ο Π Ρ Σ Τ Υ Φ Χ Ψ Ω α β γ δ ε ζ η θ ι κ λ μ ν ξ ο π ρ ς σ τ υ φ χ ψ ω ℵ ϖ ℜ ϒ℘ℑ←↑→↓↔↵⇐⇑⇒⇓⇔∴⊂⊃⊄⊆⊇⊕⊗⊥⋅⌈⌉⌊⌋〈〉◊ RELATED TOPICS MathAlgebra 1CalculusGeometryPrecalculusProbabilityAlgebraWord ProblemFunctionsAlgebra Help...College AlgebraMath HelpPolynomialsTrigAlgebra Word ProblemMathematicsAlgebra 2 QuestionAlgebra 2 HelpTrigonometric IdentitiesTrigonometric Functions RELATED QUESTIONS ##### graph, find x and y intercepts and test for symmetry x=y^3 Answers · 3 ##### -2x/x+6+5=-x/x+6 Answers · 7 ##### Find the mean and standard deviation for the random variable x given the following distribution Answers · 4 ##### using interval notation to show intervals of increasing and decreasing and postive and negative Answers · 5 ##### trouble spots for the domain may occur where the denominator is ? or where the expression under a square root symbol is negative Answers · 4 RECOMMENDED TUTORS Grace O. 5.0(299) Ingrid M. 5.0(1,175) Joy H. 5.0(3,128) See more tutors find an online tutor Precalculus tutors Algebra 2 tutors College Algebra tutors Algebra tutors Algebra 1 tutors Calculus tutors Multivariable Calculus tutors Geometry tutors Download our free app A link to the app was sent to your phone. Please provide a valid phone number. App StoreGoogle Play ##### Get to know us About Us Contact Us FAQ Reviews Safety Security In the News ##### Learn with us Find a Tutor Request a Tutor Online Tutoring Learning Resources Blog Tell Us What You Think ##### Work with us Careers at Wyzant Apply to Tutor Tutor Job Board Affiliates Download our free app App StoreGoogle Play Let’s keep in touch Need more help? Learn more about how it works ##### Tutors by Subject Algebra Tutors Calculus Tutors Chemistry Tutors Computer Tutors Elementary Tutors English Tutors Geometry Tutors Language Tutors Math Tutors Music Lessons Physics Tutors Reading Tutors SAT Tutors Science Tutors Spanish Tutors Statistics Tutors Test Prep Tutors Writing Tutors ##### Tutors by Location Atlanta Tutors Boston Tutors Brooklyn Tutors Chicago Tutors Dallas Tutors Denver Tutors Detroit Tutors Houston Tutors Los Angeles Tutors Miami Tutors New York City Tutors Orange County Tutors Philadelphia Tutors Phoenix Tutors San Francisco Tutors Seattle Tutors San Diego Tutors Washington, DC Tutors Making educational experiences better for everyone. ##### IXL Comprehensive K-12 personalized learning ##### Rosetta Stone Immersive learning for 25 languages ##### Education.com 35,000 worksheets, games, and lesson plans ##### TPT Marketplace for millions of educator-created resources ##### Vocabulary.com Adaptive learning for English vocabulary ##### ABCya Fun educational games for kids ##### SpanishDictionary.com Spanish-English dictionary, translator, and learning ##### Inglés.com Diccionario inglés-español, traductor y sitio de aprendizaje ##### Emmersion Fast and accurate language certification SitemapTerms of UsePrivacy Policy © 2005 - 2025 Wyzant, Inc, a division of IXL Learning - All Rights Reserved Privacy Preference Center Your Privacy Strictly Necessary Cookies Performance Cookies Functional Cookies Targeting Cookies Your Privacy When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Performance Cookies [x] Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Functional Cookies [x] Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Targeting Cookies [x] Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookie List Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Clear [x] checkbox label label Apply Cancel Confirm My Choices Allow All
4193
https://scienceandculture.com/2024/05/astounding-the-role-of-motor-proteins-in-cell-division/
Astounding: Motor Proteins in Cell Division | Science and Culture Today Search Search About Donate Subscribe Follow September 29Science and Culture TodayDiscovering Design in Nature Science Intelligent Design Historical Sciences Archaeology Cosmology Evolution Geology Human Origins Origin of Life Paleontology Life Sciences Anatomy Biochemistry Biology Botany Ecology Genetics Neuroscience Zoology Physical Sciences Astronomy Chemistry Physics Fine-tuning Earth Sciences Environment Geophysics Planetology Rare Earth Applied Sciences Biomimetics Engineering Forensics Materials Science Medicine Technology Culture Faith & Science Ethics Bioethics Evolutionary Ethics Metaethics Human Exceptionalism Arts Human Rights Tools Social Sciences Archaeology Cultural Anthropology Linguistics Political Science Psychology Sociology Foundations Scientific Freedom Science Education History of Science Philosophy of Science Scientific Reasoning Science Reporting Philosophy Dualism Methodological Naturalism Materialism Scientism Theism Theistic Evolution Authors Douglas Axe Photo by Nathan Jacobson, © Discovery Institute (CC BY-SA 4.0) Günter Bechly Michael J. Behe Photo courtesy of Celeste Behe. David Berlinski Eric Cassell David Coppedge Photo provided by David Coppedge. William A. Dembski Image provided by Bill Dembski Michael Denton Michael Flannery Ann Gauger Howard Glicksman Guillermo Gonzalez Photo by Nathan Jacobson, © Discovery Institute (CC BY-SA 4.0) Eric Hedin Cornelius G. Hunter Stephen J. Iacoboni Photo courtesy of Stephen Iacoboni David Klinghoffer Photo by Casey Sernaqué Carl Linnaeus Photo licensed via Adobe Stock Wolf-Ekkehard Lönnig Photo provided by Katja Deborah Lönnig Casey Luskin Photo by Nathan Jacobson, © Discovery Institute (CC BY-SA 4.0) Andrew McDiarmid Photo by Casey Sernaqué Jonathan McLatchie Stephen C. Meyer Brian Miller Walter Myers III Paul Nelson Photo by Nathan Jacobson for Discovery Institute (CC BY) Denyse O’Leary Emily Reeves Emily Sandico Photo provided by Emily Sandico Granville Sewell Robert Shedinger Geoffrey Simmons Photo by Nathan Jacobson for Discovery Institute (CC-BY) Wesley J. Smith Photo by Gary Fong, Used by Permission, All Rights Reserved Rob Stadler Neil Thomas Jonathan Wells John G. West Photo by Chris Morgan, © Discovery Institute Daniel Witt Photo provided by Daniel Witt. Jonathan Witt Latest Index Mitosis-AscarisEggcs400x2Photo credit: John Alan Elson, CC BY-SA 4.0 via Wikimedia Commons.Latest Astounding: The Role of Motor Proteins in Cell Division Jonathan McLatchieMay 8, 2024Engineering, Intelligent Design, Life Sciences8 CategoriesEngineeringIntelligent DesignLife Sciences ShareFacebookTwitter/XLinkedInFlipboardPrintEmail One of the most astounding examples of molecular machinery in the cell is the mitotic spindle that governs the segregation of chromosomes during cell division. You can watch the astonishing process of mitotic cell division unfold in this animation: Display "The Stages of Mitosis" from YouTube Click here to display content from YouTube. Learn more in YouTube’s privacy policy. [x] Always display content from YouTube Open "The Stages of Mitosis" directly Privacy Note: On play, Google may track viewers. YouTube's Privacy Policy. A crucial aspect of mitosis is the movement of chromosomes — initially the alignment of as paired sister chromatids during prometaphase and metaphase, and then the separation of these sister chromatids during anaphase. But how does the spindle exert force on the chromosomes? And how do the chromosomes attach to the spindle such that they can be moved to the proper place at the proper time? Here, I will give an introduction to this astounding process. Microtubules Two structural components make up the mitotic spindle — two large structures, found at the poles, called centrosomes, and protein filaments known as microtubules. From each of the centrosomes radiate the spindle microtubules, which bind to a chromosome (kinetochore microtubules), or a microtubule emanating from the other centrosome (polar microtubules), or the cell’s plasma membrane (astral microtubules). The subunit of microtubules are heterodimers of tubulin, comprised of α-tubulin and β-tubulin. These heterodimers fit together to create linear protofilaments, 13 of which are aligned side-by-side to form a microtubule. Due to the asymmetry of tubulin heterodimers, the microtubule has intrinsic polarity. The plus end (which extends towards the chromosomes) is comprised of β-tubulin subunits, whereas the minus end (which is anchored at the centrosome) is comprised of α-tubulin subunits. In the early mitotic stages, microtubules assemble and disassemble rapidly (mediated by the addition and removal of tubulin heterodimers), a phenomenon known as dynamic instability (the processes of depolymerization and polymerization are referred to as catastrophe and rescue respectively). By this process, microtubules randomly probe the cell, until they by chance encounter their target. The regulation of microtubule catastrophe and rescue is linked to the hydrolysis of guanosine triphosphate (GTP), a nucleotide bound to tubulin within the microtubule lattice. Each tubulin subunit is able to bind to one molecule of GTP. During polymerization, tubulin subunits bound to GTP are added to the growing end of the microtubule, forming a GTP cap which stabilizes the microtubule and promotes growth. As the microtubule continues to polymerize, the GTP-bound tubulin subunits undergo hydrolysis, converting GTP to guanosine diphosphate (GDP). Once hydrolyzed, the tubulin subunits become less stable, and the microtubule is more prone to depolymerization. Upon reaching a critical concentration of GDP-bound tubulin at the microtubule end, catastrophe occurs, leading to rapid depolymerization. Microtubule rescue involves the exchange of GDP-bound tubulin for GTP-bound tubulin, thereby promoting microtubule growth. Certain cellular factors, such as microtubule-associated proteins (MAPs) and motor proteins, can facilitate this process by promoting the incorporation of GTP-bound tubulin or by protecting the GTP cap from hydrolysis. For example, kinesin-8 proteins are plus-end directed motor proteins that destabilize microtubules.1 1 Shrestha S, Hazelbaker M, Yount AL, Walczak CE. Emerging Insights into the Function of Kinesin-8 Proteins in Microtubule Length Regulation. Biomolecules. 2018 Dec 20;9(1):1.Another motor protein, kinesin-13, is bidirectional (being able to move in the direction of either the plus or minus ends of microtubules), in contrast to most motors that are unidirectional. They are thereby able to promote the depolymerization of a microtubule from both ends.2 2 Ems-McClung SC, Walczak CE. Kinesin-13s in mitosis: Key players in the spatial and temporal organization of spindle microtubules. Semin Cell Dev Biol. 2010 May;21(3):276-82.The activity of kinesin-13 proteins is “regulated by distinct targeting to regions of the spindle, by regulatory phosphorylation events, and by interactions with different binding partners.”3 3 Ibid.These remarkable kinesin-13 motors bind the end of the microtubule and trigger a conformational change that results in microtubule depolymerization.4 4 Desai A, Verma S, Mitchison TJ, Walczak CE. Kin I kinesins are microtubule-destabilizing enzymes.Cell. 1999 Jan 8;96(1):69-78. Motor Proteins In 2014, Discovery Institute published an animation of the molecular motor kinesin, which carries cellular cargo along microtubule tracks and is driven by ATP hydrolysis: Display "The Workhorse of the Cell: Kinesin" from YouTube Click here to display content from YouTube. Learn more in YouTube’s privacy policy. [x] Always display content from YouTube Open "The Workhorse of the Cell: Kinesin" directly Kinesin typically moves in the direction of the plus end of the microtubule, towards the periphery of the cell. Another form of motor protein, called dynein, generally moves towards the minus end of the microtubule, i.e., towards the cell center. Whereas kinesin motor proteins walk step-by-step by placing one foot in front of the other, dynein moves by a swinging crossbridge mechanism. One of the most incredible functions of motor proteins in the cell is their role in the assembly and function of the mitotic spindle during eukaryotic cell division.5 5 Goshima G, Vale RD. The roles of microtubule-based motor proteins in mitosis: comprehensive RNAi analysis in the Drosophila S2 cell line.J Cell Biol. 2003 Sep 15;162(6): 1003-16.Envision a robotic factory that assembles and organizes the cell in preparation for undergoing division, helping to facilitate the controlled segregation of the genetic material into the daughter cells. This is represented in the (highly simplified) figure below: As shown in the figure, the motor proteins involved in the organization of the mitotic spindle can be divided into four major classes: kinesin-5, kinesin-14, kinesins-4 and 10, and dynein. Kinesin-5 is directed towards the plus end and slides apart those microtubules that have their polarities oriented in opposite directions (i.e., antiparallel microtubules). Thus, kinesin-5 contributes to spindle elongation and bipolarity by pushing apart the spindle poles.6 6 Ferenz NP, Gable A, Wadsworth P. Mitotic functions of kinesin-5. Semin Cell Dev Biol. 2010 May;21(3): 255-9.On the other hand, kinesin-14 motors are directed towards the minus-end of microtubules. They each possess one motor domain in addition to other domains that associate with a different microtubule.7 7 Mitra A, Meißner L, Gandhimathi R, Renger R, Ruhnow F, Diez S. Kinesin-14 motors drive a right-handed helical motion of antiparallel microtubules around each other.Nat Commun. 2020 May 22;11(1): 2565.They cross-link antiparallel interpolar microtubules at the spindle midzone, and thereby pull the poles towards one another. Another group of kinesins, kinesin-4 and kinesin-10 (collectively known as chromokinesins), play a critical role in the positioning and segregation of chromosomes during mitosis.8 8 Mazumdar M and Misteli T. Chromokinesins: multitalented players in mitosis.Trends Cell Biol. 2005 Jul;15(7): 349-55.The job of chromokinesins is to move the chromosomes to their proper positions such that each daughter cell will receive the right number of chromosomes. The last group of motor proteins involved in mitosis are dyneins that have their motor domains associated with the microtubules, which emanate from the centrosomes, and their cargo-binding domains bound to proteins embedded in the cell cortex. The movement of dynein exerts a pulling force on the microtubule minus ends and pulls the centrosomes in the direction of the cell cortex.9 9 Raaijmakers JA and Medema RH (2014). Function and regulation of dynein in mitotic chromosome segregation.Chromosoma. 123(5): 407-22.This movement ensures that each daughter cell receives a complete set of chromosomes. Note that, although I have, for simplicity, only shown one microtubule emanating from each centrosome towards the cell cortex, in real life there would be many more than this. Incredible Engineering In any other realm of experience, we would, upon observing a robotic factory like this that operates at a nanoscale, immediately ascribe it to design. The engineering of the eukaryotic cell division cycle is astounding at every level. Moreover, these molecular motors are absolutely indispensable to successful cell division in eukaryotes and thus constitute an irreducibly complex system. It therefore points forcefully and unequivocally to conscious intent. Notes Shrestha S, Hazelbaker M, Yount AL, Walczak CE. Emerging Insights into the Function of Kinesin-8 Proteins in Microtubule Length Regulation. Biomolecules. 2018 Dec 20;9(1):1.↩︎ Ems-McClung SC, Walczak CE. Kinesin-13s in mitosis: Key players in the spatial and temporal organization of spindle microtubules. Semin Cell Dev Biol. 2010 May;21(3):276-82.↩︎ Ibid.↩︎ Desai A, Verma S, Mitchison TJ, Walczak CE. Kin I kinesins are microtubule-destabilizing enzymes.Cell. 1999 Jan 8;96(1):69-78.↩︎ Goshima G, Vale RD. The roles of microtubule-based motor proteins in mitosis: comprehensive RNAi analysis in the Drosophila S2 cell line.J Cell Biol. 2003 Sep 15;162(6): 1003-16.↩︎ Ferenz NP, Gable A, Wadsworth P. Mitotic functions of kinesin-5. Semin Cell Dev Biol. 2010 May;21(3): 255-9.↩︎ Mitra A, Meißner L, Gandhimathi R, Renger R, Ruhnow F, Diez S. Kinesin-14 motors drive a right-handed helical motion of antiparallel microtubules around each other.Nat Commun. 2020 May 22;11(1): 2565.↩︎ Mazumdar M and Misteli T. Chromokinesins: multitalented players in mitosis.Trends Cell Biol. 2005 Jul;15(7): 349-55.↩︎ Raaijmakers JA and Medema RH (2014). Function and regulation of dynein in mitotic chromosome segregation.Chromosoma. 123(5): 407-22.↩︎ Jonathan McLatchie Resident Biologist and Fellow, Center for Science and Culture Dr. Jonathan McLatchie holds a Bachelor's degree in Forensic Biology from the University of Strathclyde, a Masters (M.Res) degree in Evolutionary Biology from the University of Glasgow, a second Master's degree in Medical and Molecular Bioscience from Newcastle University, and a PhD in Evolutionary Biology from Newcastle University. Previously, Jonathan was an assistant professor of biology at Sattler College in Boston, Massachusetts. Jonathan has been interviewed on podcasts and radio shows including "Unbelievable?" on Premier Christian Radio, and many others. Jonathan has spoken internationally in Europe, North America, South Africa and Asia promoting the evidence of design in nature.Follow JonathanProfileWebsite ATP hydrolysis cell division centrosomes chromatids chromosomes Discovery Institute dynein irreducibly complex systems kinesin mitosis mitotic cell division mitotic spindle molecular machines molecular motor phosphorylation spindle tubulin Article Outline Microtubules Motor Proteins Incredible Engineering Notes Related irreducibly complex systemsmolecular machineschromosomes Communication Sets Us ApartAndrew McDiarmid August 21, 2025 2 Intelligent DesignPostcard from São PauloCasey Luskin July 23, 2025 4 Intelligent DesignA Cell Makes "Decisions" — How?David Coppedge April 15, 2025 9 Intelligent DesignRecurring Design Logic Challenges EvolutionJonathan McLatchie April 3, 2025 8 Intelligent DesignDesigned Evolution? Sorry, Wrong UniverseCasey Luskin February 15, 2024 12 Intelligent Design Trending Physicist Sabine Hossenfelder Gets Canceled When We Lose Religion, We Lose Science When Charlie Kirk Talked About Intelligent Design Is Geomimetics an Intelligent Design Science? Bombshell Overturns "1 Percent Difference" Claim Recommended Is Intelligent Design Gaining the Upper Hand? Scopes: Same Debate, Different World What’s Bothering Augustine? Geometric Design in the Solar System The Venn Diagram from My Conversation with Noble Archives 2025 Jan Feb Mar Apr May Jun Jul Aug 2024 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 2023 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 More Informationals Molecular MachinesScience and Culture September 23, 2021 31 Fine-Tuning ParametersJay W. Richards September 17, 2021 13 Fine-tuning Theistic EvolutionJohn G. West May 1, 2009 5 Charles DarwinBenjamin Wiker May 1, 2009 9 ATTN: UK Donors The Center for Science & Culture has been approved to receive funds throughStewardship UK (Stewardship Services UKET Limited). Previous Post Predictions for the Guppy from the Engineering/Design Model An engineering model would predict that guppies are designed with operational parameters for different traits, which are set by overarching design logic.Next Post Assuming Design, Researchers Achieve a Breakthrough in Understanding Circulatory System The authors also explain how the standard evolutionary framework misdirected earlier researchers. Home About Search Contact Donate Follow About Science & Culture Today features original reporting and analysis on the sciences with a particular interest in discovering design in nature and in the impotence of purely material theories like evolution. We also cover the impact of science on culture and promote scientific freedom and discernment. Editorial Standards Terms of Service Privacy Policy Subscribe Sign upand you will receive the latest articles, research findings, and thought-provoking analyses straight to your inbox. Next Donate Science & Culture Today is a publication of the non-profit Discovery Institute's Center for Science and Culture. We depend on readers like you. Donate now. Contact Subscribe Donate About Privacy Search © Discovery Institute
4194
https://www.busymac.com/docs/busycal/70594-tasks/
Tasks | Busy Apps by Beehive Skip to main content BusyCalBusyContacts Products HelpStore Help Guides BusyCal Mac Getting Started with BusyCal for Mac The BusyCal Window Day View Week View Month View Year View List View Calendar List (Left Panel) Event Types Tasks Info Panel Quick Entry (Natural Language) Suggestions as Templates Repeating Events Tags Graphics Birthdays and Anniversaries Holidays Subscribing to Public Calendars Weather Locations, Maps & Travel Time Mapping Event Locations Alarms Do Not Disturb Quick Edits BusyCal Menu App Settings Date and Time Format Time Zones Printing Searching, Finding, and Filtering Events Smart Filters (Calendar Sets) Time Tracking Contacts Meetings and Invitations Cross-calendar blocking events Free/Busy Availability Viewer Backing Up and Restoring Combine Identical Events Automatic Tagging Sharing Calendars Exporting, Importing, and Merging Calendars Resetting BusyCal Keyboard Shortcuts Paste as Task URL Handler Archiving Old Events Syncing BusyCal with an iOS Device Syncing Calendar Subscriptions with an iOS Device Using BusyCal with Reminders Using BusyCal with Apple Calendar Using BusyCal with iCloud Using BusyCal with Google Using BusyCal with Office 365 (Microsoft Graph) Using BusyCal with Exchange / Office 365 Using BusyCal with CalDAV Using BusyCal with Todoist Using BusyCal with Fruux Using BusyCal with Zoom Using BusyCal on a LAN - Deprecated Syncing Extended Task Properties BusyCal iOS BusyContacts FAQs Licenses Licensing Explained Renew your license Look up registration code Change email address Subscribe to mailing list Guides BusyCal Mac Tasks On this page Tasks BusyCal can manage all your tasks (also known as to dos or reminders). Tasks can be displayed in a Task List in the right sidebar and/or in the calendar on the date they are due. Tasks come in three flavors: Undated Tasks — Tasks without a due date are displayed in the Task List only. Dated Tasks — Tasks with a due date can be displayed in the calendar, in the Task List, or both. Timed Tasks — Tasks with a due date and time can be displayed in the calendar, in the Task List, or both. Task List​ task list, sidebar, show tasks, task panel, right panel, view tasks, task display, to-do list To show the Task List, choose View > Show Task List, press ⌘-Option-T, or click the Hide/Show Task List button on the right side of the toolbar and choose either Show Task List or Show Both from the pop-up menu. The Task List appears in the right sidebar. The Task List can be sorted by Due Date, Priority, Title, Calendar, Tag, or Manually. To change the current sort order and other Task List settings, use the pop-up menu at the top of the Task List, or go to BusyCal > Settings > Tasks. The following video demonstrates how to: Mark a task as starred Change a task's priority Change task sorting Show Tasks in the Calendar​ show tasks in calendar, display tasks, calendar view, tasks on calendar, task visibility, calendar integration You can show dated tasks, timed tasks, and completed tasks in the calendar on the date they are due or completed. If a task is not completed on its due date, it carries forward each day until completed (this behaviour can be changed from Settings > Tasks uncheck Carry forward uncompleted Tasks). (If dated and completed tasks don’t appear in your calendar, see Task Settings, just ahead.) Task Sorting​ task sorting, sort tasks, task order, manual sorting, sort by priority, sort by due date, task arrangement, tasks wrong order, tasks not sorted correctly, task sorting broken, tasks out of order, weird task order, incorrect task sorting, tasks not by priority, tasks random order, fix task sorting, task order messed up, tasks not sorting properly, all day tasks wrong order, banner tasks wrong order, task order issue, task sorting problem, reset task order, why tasks not in priority order, tasks not sorted by due date, manual task order, custom task sorting, task order weird, tasks appear wrong order, task sequence wrong, task arrangement incorrect, sorting not working, task display order wrong Timed tasks are sorted inline with calendar events (e.g. a timed task with a due time of 9:00 AM will appear sandwiched in between events at 8:00 AM and 10:00 AM). Dated tasks are grouped together below events. Tasks that occur at the same date or time are sorted by priority and title. Completed tasks are sorted by completion time. Sorting Manually​ manual sorting, custom task order, reorder tasks, reset manual ordering, arrange tasks manually, task order, task priority order, task sorting priority The Task List supports manual sorting within each sorted section, giving you the flexibility to arrange tasks in your preferred order. If your tasks aren’t appearing in the expected sort order, it’s possible they were manually reordered at some point. To reset the manual order: Select all tasks (click one task, then press CMD+A). Control-click (right-click) any selected task and choose Reset Manual Task Ordering… from the context menu. Creating Tasks​ create tasks, new task, add task, make to-do, task creation, dated task, timed task, undated task, quick entry Dated Tasks — To create a new dated task, choose File > New Task, press ⌘-K, or Control-click on a day and choose New Task from the contextual menu. A dated task appears in your calendar on the due date, with a checkbox in front of it. Timed Tasks — To create a new timed task, choose File > New Timed Task, press ⌘-Option-K, or Control-click on a day and choose New Timed Task from the contextual menu. A timed task appears in your calendar on the due date and time, with a checkbox in front of it. tip To create a timed task in Week view, hold down ⌘ while double-clicking in the calendar. Undated Tasks — To create a new undated task, choose File > New Undated Task, press ⌘-U, or Control-click in the Task List sidebar and choose New Undated Task from the contextual menu. You can also create tasks using Quick Entry in the app or from the BusyCal Menu by preceding the text with a dash -, or the words todo, remember to, or remind me to. If a date or time is included, BusyCal creates a dated or timed task. Otherwise, an undated task is created. For example: -Call Bobtodo Call Bob tomorrow-Call Bob tomorrow at 10amremember to Call Bob next Tuesday-Call Bob Nov 7remind me to pick up dry cleaning at 5pm If you mark a task as completed by checking the “done” checkbox in the calendar or Info Panel (or pressing ⌘-/), the completed task appears with a checkmark in front of it on the date that it was completed. Task Settings​ task settings, task preferences, configure tasks, task options, default settings, task customization To customize how tasks are created and displayed, choose BusyCal > Settings > Tasks. The following options are available for customizing tasks: Default list for new Tasks — The default calendar / task-list new tasks are created in. Default priority — The default priority assigned to newly created tasks. Sort Task List by — The sort order for the Task List. Sorting can also be changed directly from the Task Panel, by clicking on the sorting drop-down button. Show dated Tasks — The date range for tasks displayed in the Task List. The default displays tasks due by next month. You can select a different range if you want to view fewer or more tasks. Show undated Tasks — Whether to display undated tasks in Task List. Show completed Tasks — Whether to display completed tasks in Task List. Duration in day & week view — Default duration to use for tasks when a custom duration is not assigned. Show dated Tasks in calendar — Whether to display dated tasks in the calendar on their due dates. Show completed Tasks in calendar — Whether to display completed tasks in the calendar on the dates they are completed. Carry forward uncompleted Tasks — Whether to carry forward past due tasks and display them on the current date. Such Tasks appear with a small > arrow displayed in the middle of the checkbox in Month / Week / Day view. Repeating Tasks​ repeating tasks, recurring tasks, repeat task, task recurrence, recurring to-do, regeneration, due date repeat You can create tasks that repeat based on either the due date (e.g., Pay Rent on the 1st of every month) or on the completion date of the previous task (e.g., Oil Change 3 months after completion of the last Oil Change). Please note - unlike a repeating event, repeating Tasks do not display future occurrences on the calendar. A new occurrence is created only after you mark a Task complete. To create a repeating task that repeats based on the due date (e.g., Pay Rent on the 1st of every month), select a repeat interval from the “repeat” pop-up menu on the Info Panel. You can change the default regeneration / repeating style from under Settings > Tasks > Default Regeneration Style. See Tasks Settings for more information. Also see Repeating Events for additional information on creating custom repeat intervals. Completed occurrences of a repeating task appear in the calendar, but only the next uncompleted occurrence of a repeating task appears. When you complete an occurrence of a repeating task, the next occurrence of the repeating task is created automatically. For example, you could create a task on Thursday to Take out trash that repeats weekly. Only the next uncompleted occurrence of the task appears in the calendar. When you complete it (or delete it), the next occurrence of the task is created on the following Thursday. note When you mark a recurring task as completed, BusyCal sets the completed date as today (even if the event appears on an earlier date on your calendar) and then creates the next occurrence. Depending on your settings in BusyCal > Settings > Tasks, this may cause the task to disappear from your calendar on its earlier date, even if your intention was to indicate that you completed it on a date in the past. BusyCal’s default logic is based on the Change Oil model: if you plan to change your oil every month, and you skip a month or two, BusyCal ignores the repeats that would have occurred in the past and schedules the next occurrence forward from the date on which you mark the task as completed. You can change this behavior from Settings > Tasks > Default regeneration style. Converting Tasks to Events​ convert tasks to events, task conversion, change task to event, drag task to calendar, transform task You can convert tasks to events by ⌘-dragging them from the Task List to the calendar: Hold down ⌘ while dragging a task from the Task List to the calendar in Month view to convert it to an event on that date, at the current time. Hold down ⌘ while dragging a task from the Task List to the all-day portion of a day in Day or Week view to convert it to an all-day event. tip You can also drag an undated task to the calendar to set the due date, or drag it to a different date to change the due date. Converting Events to Tasks​ convert events to tasks, event conversion, change event to task, drag event to task list, transform event You can convert events to tasks by simply dragging them from the calendar and dropping them into the Task List while at least one Task list calendar has been checked in the left panel (note: you should not hold down the ⌘ key when doing this). iCloud and Reminders​ iCloud sync, reminders app, task sync, iCloud calendars, sync with reminders, task calendar sync, reminders integration Tasks in BusyCal sync with the Reminders app in macOS and iOS through iCloud. iCloud calendars are type-specific. Each iCloud calendar can contain either events or tasks, but not both. BusyCal indicates a task calendar by displaying a checkmark next to its name. The task calendars in BusyCal sync with the Reminder Lists in the Reminders app on macOS and iOS through iCloud. Tasks with Location Alarms​ location alarms, location-based reminders, geofencing, location tasks, proximity alerts, arrival departure alerts The Reminders app on iOS can display location alarms when arriving at or leaving a specified location. For example, you could create a task to “Pick up dry cleaning” that triggers when you leave the office. BusyCal supports location alarms that sync with the Reminders app, and you can even create and edit location alarms in BusyCal. To create a location alarm in BusyCal, create a task with a custom Alarm Type of Location, click Location, and select a contact or search for a location using the embedded Google Maps interface. Location alarms trigger on your iOS device each time you arrive at or leave a location until you complete the task or delete it. In addition, you can set a specific date and time to be reminded on both your Mac and iOS device, regardless of whether you reach the location. note BusyCal supports location alarms only on iCloud task calendars. Last updated on May 22, 2025 Previous Event TypesNext Info Panel Task List Show Tasks in the Calendar Task Sorting Sorting Manually Creating Tasks Task Settings Repeating Tasks Converting Tasks to Events Converting Events to Tasks iCloud and Reminders Tasks with Location Alarms About·Interesting Calendars·Privacy Policy·EULA·Press·Help·Twitter © Beehive Innovations, 2007-2025
4195
https://testbook.com/question-answer/what-is-the-maximum-number-of-different-functions--68468efc5999e6a0b11f568e
[Solved] What is the maximum number of different functions involving Get Started ExamsSuperCoachingTest SeriesSkill Academy More Pass Skill Academy Free Live Classes Free Live Tests & Quizzes Previous Year Papers Doubts Practice Refer & Earn All Exams Our Selections Careers English Hindi Home Digital Electronics Logic Gates and Boolean Algebra Boolean Functions Question Download Solution PDF What is the maximum number of different functions involving n Boolean variables? This question was previously asked in UP LT Grade Teacher (Computer) 2018 Official Paper Download PDFAttempt Online View all UP LT Grade Teacher Papers > n 2 2 n 2 n 2 2 2 n Answer (Detailed Solution Below) Option 4 : 2 2 n Crack UP LT Grade 2025 with India's Super Teachers FREE Demo Classes Available Explore Supercoaching For FREE Free Tests View all Free tests > Free UP LT Grade Math Full Test 1 1.9 K Users 150 Questions 300 Marks 120 Mins Start Now Detailed Solution Download Solution PDF The correct answer is: Option 4) 22n Explanation: For n Boolean variables, each variable can be either 0 or 1. So, the total number of unique combinations of input values is: 2 n Each of these input combinations can be mapped to either output 0 or 1 in a Boolean function. So for each of the 2 n input combinations, we can choose the output in 2 ways (0 or 1). Therefore, the total number of possible functions is: 2(2 n) This is because we are choosing a value (0 or 1) for each of the 2 n input combinations, which gives us: 2 × 2 × 2 × ... (2 n times) = 2 2 n ✅ Hence, the correct answer is: Option 4 Download Solution PDFShare on Whatsapp Latest UP LT Grade Teacher Updates Last updated on Sep 20, 2025 ->UP LT Grade Teacher Exam Date 2025has been released. The exam will be held on 06, 07 and 21 December. -> TheUP LT Grade Teacher2025 Notification is available for 7466 vacancies. ->UP LT Grade Teacher Registration 2025was done from 28th July 2025 to 28th August 2025. -> Prepare for the exam withUP LT Grade Teacher Previous Year Papers. India’s #1 Learning Platform Start Complete Exam Preparation Daily Live MasterClasses Practice Question Bank Mock Tests & Quizzes Get Started for Free Trusted by 7.6 Crore+ Students ‹‹ Previous Ques Next Ques ›› More Boolean Functions Questions Q1.What is the maximum number of different functions involving n Boolean variables? Q2.Which combination of symbols represents an XOR (Exclusive-OR) gate? Q3.The XOR operator is NOT Q4.A = a1a0 and B = b1b0 are two 2-bit unsigned binary numbers. If F(a1, a0, b1, b0)is a Boolean function such that 𝐹 = 1 only when 𝐴 > 𝐵, and 𝐹 = 0 otherwise, then 𝐹 can be minimized to the form ______ Q5.Simplify the following Boolean function in sum of minterm: F(A, B, C, D) = Σ(0, 6, 8, 13, 14) d (A, B, C, D) = Σ(2, 4, 10) where, d stands for don't care condition Q6.Simplify the following Boolean function: f (A, B,C) =A―B C+A B―C+A B C―+ ABC Q7.In Boolean algebra A + (B.C) = ? Q8.How many Boolean function is one variable are NOT idempotent: i.e. they do not satisfy ∀a.f(f(a)) = f(a). Q9.How many different Boolean circuits of n variables are there? More Logic Gates and Boolean Algebra Questions Q1.Which of the following gate is known as building block in digital circuitry? I. NAND II. NOR Q2.According to Boolean Theorems which of the following is correct? I. X.(Y + Z) = (X.Y) + (X.Z) II. X + X = X Q3.A Karnaugh map (K-map) is an abstract form of a ___ organized as a matrix of squares. Q4.Which of the following represents the logic function F(x, y, z) in the figure? The min terms are derived using x as MSB and z as LSB. Q5.The expression (a.b)c' + (a.b')c + (a'.b)c was to be realised with 2-input AND gates and OR gates. However during realization all 2-input AND gates were mistakenly substituted by 2-input NAND gates. What is the function finally obtained ? Q6.How would you implement the Boolean expression A + B̅ using basic logic gates? Q7.What is the maximum number of different functions involving n Boolean variables? Q8.Which of the following is a universal gate? Q9.The resulting logic circuit obtained when both inputs of NOR and NAND gates are connected together is: Q10.The circuit behaves as a: Suggested Test Series View All > UP LT Grade 2025 Mock Test Series 590 Total Tests with 3 Free Tests Start Free Test UPTET 2025 (Paper 1 & 2) Mock Test 287 Total Tests with 1 Free Tests Start Free Test More Digital Electronics Questions Q1.A decoder is a combinational circuit that converts binary information from n input lines to a maximum of _ unique output lines. Q2.Which of the following statement is true regarding register? I. A register is a group of memory elements which stores a binary word and it may modify the stored word in a particular fashion as is desired by the application in which it is used. II. It is capable of shifting the stored binary word a step or more towards left or right. Q3.Which of the following gate is known as building block in digital circuitry? I. NAND II. NOR Q4.What is the octal equivalent of (15)10? Q5.A combinational circuit that performs the addition of _ bits is called as half-adder. Q6.What is the decimal equivalent of (1100)2? Q7.According to Boolean Theorems which of the following is correct? I. X.(Y + Z) = (X.Y) + (X.Z) II. X + X = X Q8.What is the binary equivalent of (15)10? Q9.Determine the decimal equivalent of (0.10101)2? Q10.Find the resolution of a 10 bit D/A converter, having a full-scale output voltage of 10 V. Important Exams SSC CGLSSC CHSLSSC JESSC CPO IBPS POIBPS ClerkIBPS RRB POIBPS RRB Clerk IBPS SOSBI POSBI ClerkCUET UGC NETRBI Grade BRBI AssistantUPSC IAS UPSC CAPF ACUPSC CDSUPSC IESUPSC NDA RRB NTPCRRB Group DRRB JERRB SSE LIC AAOLIC AssistantNABARD Development AssistantSEBI Grade A Super Coaching UPSC CSE CoachingBPSC CoachingAE JE electrical CoachingAE JE mechanical Coaching AE JE civil Coachingbihar govt job CoachingGATE mechanical CoachingSSC Coaching CUET CoachingGATE electrical CoachingRailway CoachingGATE civil Coaching Bank Exams CoachingCDS CAPF AFCAT CoachingGATE cse CoachingGATE ece Coaching CTET State TET CoachingCTET CoachingUPTET CoachingREET Coaching MPTET CoachingJTET Coaching Exams REETNCTEOAVSTN TRB SLETRajasthan PTETUP PGTUP TGT SSA Chandigarh TGTHKRN TGTKVS Non Teaching RecruitmentTelangana Sainik School Teacher Telangana LecturerESIC Assistant ProfessorPPSC Junior AuditorPPSC Lecturer AWES PRTDSSSB Physical Education TeacherDSSSB Domestic Science TeacherJamia Millia Islamia B.Ed AMU TGTAMU PGTOAVS TGTOAVS PGT LAHDC TeacherBihar Secondary TeacherBihar Senior Secondary TeacherBihar Computer Teacher Bihar Elementary TeacherBihar Special TeacherCG Vyapam LecturerCG Vyapam Assistant Teacher WBMSC Assistant TeacherBihar Primary TeacherEMRS Junior Secretariat AssistantEMRS Physical Education Teacher EMRS Hostel WardenEMRS AccountantEMRS LibrarianEMRS Electrician Cum Plumber EMRS DriverEMRS GardenerEMRS Mess HelperEMRS Senior Secretariat Assistant EMRS Lab AttendantEMRS CookEMRS ChowkidarEMRS Catering Assistant EMRS Music TeacherEMRS Art TeacherEMRS CounsellorEMRS Sweeper EMRS Vice PrincipalEMRS PrincipalWBSSC Assistant TeacherWBPDCL Assistant Teacher JNU Non-Teaching Post RecruitmentAWES TGT NotificationAWES PGT Recruitment Test Series REET Level 1 & 2 (Hindi-Sanskrit-English) Mock TestRajasthan PTET Mock TestUP TGT Commerce Mock TestRSMSSB Lab Assistant (Science) Mock Test DSSSB TGT Natural Science Mock TestDSSSB PRT Assistant Teacher Mock TestRajasthan Basic Computer Instructor Mock TestCBSE Junior Assistant Mock Test NVS Junior Secretariat Assistant (LDC) Mock TestAEES PRT (Atomic Energy Education Society) Mock TestNVS TGT Mock TestEMRS PGT Mock Test EMRS Junior Secretariat Assistant Mock Test SeriesEMRS TGT Mock Test 2EMRS Librarian Mock Test 2023Jharkhand (JSSC) PRT Mock Test Series 2023 JSSC TGT Mock Test 2023 Previous Year Papers REET Previous Year PapersOAVS Previous Year PapersTN TRB Previous Year PapersRajasthan PTET Previous Year Papers UP PGT Previous Year PapersUP TGT Previous Year PapersKEA Assistant Professor Previous Year PapersRSMSSB Lab Assistant Previous Year Papers UPPSC Lecturer Previous Year PapersSSA Chandigarh TGT Previous Year PapersHSSC PGT Previous Year PaperHSSC TGT Previous Year Papers AEES PGT Previous Year PaperArunachal Pradesh TGT Previous Year PaperBihar Special Teacher Recruitment Previous Year PapersTSPSC Secondary Grade Teacher Recruitment 2022 Previous Year Papers Objective Questions Excretory System MCQArtificial Neural Network MCQHashing MCQHTTP MCQ Human Resource Planning MCQHydrocarbons MCQHypothesis MCQLocal Government MCQ Logistics Management MCQMemory Management MCQCurrent Affairs MCQComputers MCQ Ms Word MCQConstitution Of India MCQReproductive Health MCQUPSC MCQ Biomolecules MCQMySQl MCQConsumer Behaviour MCQ Testbook USA SAT Exam SAT ExamAverage SAT ScoreSAT Scores For Ivy LeaguesSAT Superscore SAT TipsHow To Prepare For Both SAT And ACTPSAT Vs SATHighest SAT Score SAT ChangesSAT Percentiles And Score RankingsSAT Scores GuideHow Long Is The SAT When Should You Take SATDigital SAT FormatACT To SAT ConversionGood SAT Scores SAT PrepSAT Vs ACTSAT SyllabusSAT School Day SAT Test OptionalSAT Test DatesSAT Score CalculatorSAT Practice Test Free SAT Prep Resources Testbook USA ACT Exam ACT ExamACT Scores GuideHow Long Is The ActWhen Should You Take Act Good ACT ScoresACT PreparationACT Test DatesACT Tips ACT Practice TestACT Format SectionsACT SuperscorePreACT Information ACT SyllabusACT EligibilityACT Prep BooksACT Score Calculator US College Admissions Guide Harvard UniversityYale UniversityPrinceton UniversityColumbia University University of PennsylvaniaDartmouth CollegeBrown UniversityCornell University Stevenson UniversityPortland State UniversityClark UniversityThomas Jefferson University Mercer UniversityRadford UniversityRider UniversitySouthern University University Of PortlandXavier University Testbook Edu Solutions Pvt. Ltd. 1st & 2nd Floor, Zion Building, Plot No. 273, Sector 10, Kharghar, Navi Mumbai - 410210 support@testbook.com Toll Free:1800 833 0800 Office Hours: 10 AM to 7 PM (all 7 days) Company About usCareers We are hiringTeach Online on TestbookPartnersMediaSitemap Products Test SeriesTestbook PassOnline CoursesOnline VideosPracticeBlogRefer & EarnBooks Our Apps Testbook App Download now Current Affairs Download now Follow us on Copyright © 2014-2022 Testbook Edu Solutions Pvt. Ltd.: All rights reserved User PolicyTermsPrivacy Sign Up Now & Daily Live Classes 250+ Test series Study Material & PDF Quizzes With Detailed Analytics More Benefits Get Free Access Now
4196
https://www.khanacademy.org/math/integral-calculus/ic-integration/ic-improper-integrals/e/improper-integrals
Improper integrals (practice) | Integrals | Khan Academy Skip to main content If you're seeing this message, it means we're having trouble loading external resources on our website. If you're behind a web filter, please make sure that the domains .kastatic.org and .kasandbox.org are unblocked. Explore Browse By Standards Explore Khanmigo Math: Pre-K - 8th grade Math: High school & college Math: Multiple grades Math: Illustrative Math-aligned Math: Eureka Math-aligned Math: Get ready courses Test prep Science Economics Reading & language arts Computing Life skills Social studies Partner courses Khan for educators Select a category to view its courses Search AI for Teachers FreeDonateLog inSign up Search for courses, skills, and videos Help us do more We'll get right to the point: we're asking you to help support Khan Academy. We're a nonprofit that relies on support from people like you. If everyone reading this gives $10 monthly, Khan Academy can continue to thrive for years. Please help keep Khan Academy free, for anyone, anywhere forever. Select gift frequency One time Recurring Monthly Yearly Select amount $10 $20 $30 $40 Other Give now By donating, you agree to our terms of service and privacy policy. Skip to lesson content Integral Calculus Course: Integral Calculus>Unit 1 Lesson 19: Improper integrals Introduction to improper integrals Divergent improper integral Improper integrals Improper integrals review Improper integral with two infinite bounds Math> Integral Calculus> Integrals> Improper integrals © 2025 Khan Academy Terms of usePrivacy PolicyCookie NoticeAccessibility Statement Improper integrals AP.CALC: LIM‑6 (EU), LIM‑6.A (LO), LIM‑6.A.1 (EK), LIM‑6.A.2 (EK) Google Classroom Microsoft Teams Problem Evaluate the improper integral if it exists. ∫1∞1 x d x‍ Choose 1 answer: Choose 1 answer: (Choice A) 1‍ A 1‍ (Choice B) 2‍ B 2‍ (Choice C) e‍ C e‍ (Choice D) The improper integral diverges. D The improper integral diverges. Related content Video 3 minutes 52 seconds 3:52 Introduction to improper integrals Video 2 minutes 42 seconds 2:42 Divergent improper integral Report a problem Do 4 problems Skip Check Use of cookies Cookies are small files placed on your device that collect information when you use Khan Academy. Strictly necessary cookies are used to make our site work and are required. Other types of cookies are used to improve your experience, to analyze how Khan Academy is used, and to market our service. You can allow or disallow these other cookies by checking or unchecking the boxes below. You can learn more in our cookie policy Accept All Cookies Strictly Necessary Only Cookies Settings Privacy Preference Center When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All Manage Consent Preferences Strictly Necessary Cookies Always Active Certain cookies and other technologies are essential in order to enable our Service to provide the features you have requested, such as making it possible for you to access our product and information related to your account. For example, each time you log into our Service, a Strictly Necessary Cookie authenticates that it is you logging in and allows you to use the Service without having to re-enter your password when you visit a new page or new unit during your browsing session. Functional Cookies [x] Functional Cookies These cookies provide you with a more tailored experience and allow you to make certain selections on our Service. For example, these cookies store information such as your preferred language and website preferences. Targeting Cookies [x] Targeting Cookies These cookies are used on a limited basis, only on pages directed to adults (teachers, donors, or parents). We use these cookies to inform our own digital marketing and help us connect with people who are interested in our Service and our mission. We do not use cookies to serve third party ads on our Service. Performance Cookies [x] Performance Cookies These cookies and other technologies allow us to understand how you interact with our Service (e.g., how often you use our Service, where you are accessing the Service from and the content that you’re interacting with). Analytic cookies enable us to support and improve how our Service operates. For example, we use Google Analytics cookies to help us measure traffic and usage trends for the Service, and to understand more about the demographics of our users. We also may use web beacons to gauge the effectiveness of certain communications and the effectiveness of our marketing campaigns via HTML emails. Cookie List Clear [x] checkbox label label Apply Cancel Consent Leg.Interest [x] checkbox label label [x] checkbox label label [x] checkbox label label Reject All Confirm My Choices
4197
https://www.gradesaver.com/textbooks/science/chemistry/chemistry-the-central-science-13th-edition/chapter-20-electrochemistry-exercises-page-899/20-1
Chemistry: The Central Science (13th Edition) by Brown, Theodore E.; LeMay, H. Eugene; Bursten, Bruce E.; Murphy, Catherine; Woodward, Patrick; Stoltzfus, Matthew E. Chapter 20 - Electrochemistry - Exercises - Page 899: 20.1 Answer Work Step by Step Update this answer! You can help us out by revising, improving and updating this answer. After you claim an answer you’ll have 24 hours to send in a draft. An editor will review the submission and either publish your submission or provide feedback.
4198
https://en.wikipedia.org/wiki/Finger_binary
Published Time: 2005-07-19T16:49:51Z Finger binary - Wikipedia Jump to content [x] Main menu Main menu move to sidebar hide Navigation Main page Contents Current events Random article About Wikipedia Contact us Contribute Help Learn to edit Community portal Recent changes Upload file Special pages Search Search [x] Appearance Appearance move to sidebar hide Text Small Standard Large This page always uses small font size Width Standard Wide The content is as wide as possible for your browser window. Color (beta) Automatic Light Dark This page is always in light mode. Donate Create account Log in [x] Personal tools Donate Create account Log in Pages for logged out editors learn more Contributions Talk [x] Toggle the table of contents Contents move to sidebar hide (Top) 1 MechanicsToggle Mechanics subsection 1.1 Examples 1.1.1 Right hand 1.1.2 Left hand 2 Negative numbers and non-integersToggle Negative numbers and non-integers subsection 2.1 Negative numbers 2.2 Fractions 2.2.1 Dyadic fractions 2.2.2 Rational numbers 2.3 Decimal fractions and vulgar fractions 3 Finger ternary 4 See also 5 References 6 External links Finger binary [x] 9 languages العربية فارسی Français 한국어 മലയാളം 日本語 Українська اردو 中文 Edit links Article Talk [x] English Read Edit View history [x] Tools Tools move to sidebar hide Actions Read Edit View history General What links here Related changes Upload file Permanent link Page information Cite this page Get shortened URL Download QR code Expand all Edit interlanguage links Print/export Download as PDF Printable version In other projects Wikidata item From Wikipedia, the free encyclopedia Finger-counting system This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations.(January 2009) (Learn how and when to remove this message) 19 in finger binary: the pinkie finger is 16, added to the 2 of the index finger and the 1 of the thumb Finger binary is a system for counting and displaying binary numbers on the fingers of either or both hands. Each finger represents one binary digit or bit. This allows counting from zero to 31 using the fingers of one hand, or 1023 using both: that is, up to 2 5−1 or 2 10−1 respectively. Modern computers typically store values as some whole number of 8-bitbytes, making the fingers of both hands together equivalent to 1¼ bytes of storage—in contrast to less than half a byte when using ten fingers to count up to 10. Mechanics [edit] Further information: Binary numeral system In the binary number system, each numerical digit has two possible states (0 or 1) and each successive digit represents an increasing power of two. Note: What follows is but one of several possible schemes for assigning the values 1, 2, 4, 8, 16, etc. to fingers, not necessarily the best. (see below the illustrations.): The rightmost digit represents two to the zeroth power (i.e., it is the "ones digit"); the digit to its left represents two to the first power (the "twos digit"); the next digit to the left represents two to the second power (the "fours digit"); and so on. (The decimal number system is essentially the same, only that powers of ten are used: "ones digit", "tens digit" "hundreds digit", etc.) It is possible to use anatomical digits to represent numerical digits by using a raised finger to represent a binary digit in the "1" state and a lowered finger to represent it in the "0" state. Each successive finger represents a higher power of two. With palms oriented toward the counter's face, the values for when only the right hand is used are: | | Pinky | Ring | Middle | Index | Thumb | --- --- --- | | Power of two | 2 4 | 2 3 | 2 2 | 2 1 | 2 0 | | Value | 16 | 8 | 4 | 2 | 1 | When only the left hand is used: | | Thumb | Index | Middle | Ring | Pinky | --- --- --- | | Power of two | 2 4 | 2 3 | 2 2 | 2 1 | 2 0 | | Value | 16 | 8 | 4 | 2 | 1 | When both hands are used: | | Left hand | Right hand | --- | Thumb | Index | Middle | Ring | Pinky | Pinky | Ring | Middle | Index | Thumb | | Power of two | 2 9 | 2 8 | 2 7 | 2 6 | 2 5 | 2 4 | 2 3 | 2 2 | 2 1 | 2 0 | | Value | 512 | 256 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | And, alternately, with the palms oriented away from the counter: | | Left hand | Right hand | --- | Pinky | Ring | Middle | Index | Thumb | Thumb | Index | Middle | Ring | Pinky | | Power of two | 2 9 | 2 8 | 2 7 | 2 6 | 2 5 | 2 4 | 2 3 | 2 2 | 2 1 | 2 0 | | Value | 512 | 256 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | The values of each raised finger are added together to arrive at a total number. In the one-handed version, all fingers raised is thus 31 (16 + 8 + 4 + 2 + 1), and all fingers lowered (a fist) is 0. In the two-handed system, all fingers raised is 1,023 (512 + 256 + 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1) and two fists (no fingers raised) represents 0. It is also possible to have each hand represent an independent number between 0 and 31; this can be used to represent various types of paired numbers, such as month and day, X-Y coordinates, or sports scores (such as for table tennis or baseball). Showing the time as hours and minutes is possible using 10 fingers, with the hour using 4 fingers (0-23) and the minutes using 6 fingers (0-59). Examples [edit] Right hand [edit] 0 = empty sum 1 = 1 2 = 2 4 = 4 6 = 4 + 2 7 = 4 + 2 + 1 14 = 8 + 4 + 2 16 = 16 19 = 16 + 2 + 1 26 = 16 + 8 + 2 28 = 16 + 8 + 4 30 = 16 + 8 + 4 + 2 31 = 16 + 8 + 4 + 2 + 1 Left hand [edit] When used in addition to the right. 512 = 512 256 = 256 768 = 512 + 256 448 = 256 + 128 + 64 544 = 512 + 32 480 = 256 + 128 + 64 + 32 992 = 512 + 256 + 128 + 64 + 32 Negative numbers and non-integers [edit] Further information: Binary numeral system §Representing real numbers Just as fractional and negative numbers can be represented in binary, they can be represented in finger binary. Negative numbers [edit] Representing negative numbers is extremely simple, by using the leftmost finger as a sign bit: raised means the number is negative, in a sign-magnitude system. Anywhere between −511 and +511 can be represented this way, using two hands. Note that, in this system, both a positive and a negative zero may be represented. If a convention were reached on palm up/palm down or fingers pointing up/down representing positive/negative, you could maintain 2 10 −1 in both positive and negative numbers (−1,023 to +1023, with positive and negative zero still represented). Fractions [edit] Dyadic fractions [edit] Fractions can be stored natively in a binary format by having each finger represent a fractional power of two: 1 2 x{\displaystyle {\tfrac {1}{2^{x}}}}. (These are known as dyadic fractions.) Using the left hand only: | | Pinky | Ring | Middle | Index | Thumb | --- --- --- | | Value | 1/2 | 1/4 | 1/8 | 1/16 | 1/32 | Using two hands: | Left hand | Right hand | --- | | Pinky | Ring | Middle | Index | Thumb | Thumb | Index | Middle | Ring | Pinky | | 1/2 | 1/4 | 1/8 | 1/16 | 1/32 | 1/64 | 1/128 | 1/256 | 1/512 | 1/1024 | 3/4, in fractional finger binary The total is calculated by adding all the values in the same way as regular (non-fractional) finger binary, then dividing by the largest fractional power being used (32 for one-handed fractional binary, 1024 for two-handed), and simplifying the fraction as necessary. For example, with thumb and index finger raised on the left hand and no fingers raised on the right hand, this is (512 + 256)/1024 = 768/1024 = 3/4. If using only one hand (left or right), it would be (16 + 8)/32 = 24/32 = 3/4 also. The simplification process can itself be greatly simplified by performing a bit shift operation: all digits to the right of the rightmost raised finger (i.e., all trailing zeros) are discarded and the rightmost raised finger is treated as the ones digit. The digits are added together using their now-shifted values to determine the numerator and the rightmost finger's original value is used to determine the denominator. For instance, if the thumb and index finger on the left hand are the only raised digits, the rightmost raised finger (the index finger) becomes "1". The thumb, to its immediate left, is now the 2s digit; added together, they equal 3. The index finger's original value (1/4) determines the denominator: the result is 3/4. Rational numbers [edit] Combined integer and fractional values (i.e., rational numbers) can be represented by setting a radix point somewhere between two fingers (for instance, between the left and right pinkies). All digits to the left of the radix point are integers; those to the right are fractional. Decimal fractions and vulgar fractions [edit] Dyadic fractions, explained above, have limited use in a society based around decimal figures. A simple non-dyadic fraction such as 1/3 can be approximated as 341/1024 (0.3330078125), but the conversion between dyadic and decimal (0.333) or vulgar (1/3) forms is complicated. Instead, either decimal or vulgar fractions can be represented natively in finger binary. Decimal fractions can be represented by using regular integer binary methods and dividing the result by 10, 100, 1000, or some other power of ten. Numbers between 0 and 102.3, 10.23, 1.023, etc. can be represented this way, in increments of 0.1, 0.01, 0.001, etc. Vulgar fractions can be represented by using one hand to represent the numerator and one hand to represent the denominator; a spectrum of rational numbers can be represented this way, ranging from 1/31 to 31/1 (as well as 0). Finger ternary [edit] In theory, it is possible to use other positions of the fingers to represent more than two states (0 and 1); for instance, a ternary numeral system (base 3) could be used by having a fully raised finger represent 2, fully lowered represent 0, and "curled" (half-lowered) represent 1. This would make it possible to count up to 242 (3 5−1) on one hand or 59,048 (3 10−1) on two hands. In practice, however, many people will find it difficult to hold all fingers independently (especially the middle and ring fingers) in more than two distinct positions. See also [edit] Chisanbop Senary §Finger counting References [edit] ^Since computers typically store data in a minimum size of one whole byte, fractions of a byte are used here only for comparison. Pohl, Frederik (2003). Chasing Science (reprint, illustrated ed.). Macmillan. p.304. ISBN978-0-7653-0829-0. Pohl, Frederik (1976). The Best of Frederik Pohl. Sidgwick & Jackson. p.363. ISBN978-0-283-98341-2. Fahnestock, James D. (1959). Computers and how They Work. Ziff-Davis Pub. Co. p.228. External links [edit] Binary Counting | hide v t e Gestures | | Friendly gestures | Air kiss Applause Biker wave Cheek kiss Dap Elbow bump Eskimo kiss Finger heart Fist bump Forehead kiss Hand heart Handshake Hand wave High five Hongi ILY sign Kiss Liberian snap handshake Lip kiss Namaste OK Pinky swear Pound hug Shaka Thumb signal | | Gestures of respect | Adab Añjali Mudrā Bow Canonical digits Curtsy Fist-and-palm Gadaw Genuflection Hand-kiss Hat tip Kowtow Kuji-in Mano Mudra Namaste Ojigi Orans Pranāma Prostration Sampeah Sembah Schwurhand Wai Zolgokh | | Salutes | Bellamy salute Nazi salute Raised fist Roman salute Scout sign and salute Three-finger salute (Serbian) Three-finger salute (pro-democracy) Two-finger salute Vulcan salute Wolf salute Zogist salute | | Celebratory gestures | Applause Crossed hands Fist pump High five Low five Victory clasp V sign | | Finger-counting | Chinese number gestures Chisanbop Finger binary | | Obscene gestures | Anasyrma Bras d'honneur Fig sign Middle finger Mooning Mountza Nazi salute Reversed V sign Shocker Sign of the horns Thumb/index-finger ring Wanker | | Taunts | Akanbe Loser Talk to the hand | | Head motions | Head bobble Head shake Nod | | Other gestures | Air quotes Allergic salute Aussie salute Awkward turtle Che vuoi? Crossed fingers Distress signal Duterte fist Eyelid pull Facepalm Finger gun Gang signal Hand-in-waistcoat Hand rubbing Jazz hands Laban sign Merkel-Raute Pointing Pollice verso Shrug Sign of the cross Lesser sign of the cross | | Related | List of gestures Articulatory gestures Finger pinching conspiracy theory Hand signals Manual communication Mudra Nonverbal communication Sign language | Retrieved from " Categories: Finger-counting Elementary arithmetic Binary arithmetic Hidden categories: Articles with short description Short description matches Wikidata Articles lacking in-text citations from January 2009 All articles lacking in-text citations This page was last edited on 1 June 2025, at 01:05(UTC). Text is available under the Creative Commons Attribution-ShareAlike 4.0 License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization. Privacy policy About Wikipedia Disclaimers Contact Wikipedia Code of Conduct Developers Statistics Cookie statement Mobile view Edit preview settings Search Search [x] Toggle the table of contents Finger binary 9 languagesAdd topic
4199
https://www.teacherspayteachers.com/Product/Engage-NY-Grade-2-Module-5-Supplemental-Printable-and-Digital-Resource-4276531
Engage NY Grade 2 Module 5 Supplemental Printable and Digital Resource Log InSign Up Cart is empty Total: $0.00 View Wish ListView Cart Grade Elementary Preschool Kindergarten 1st grade 2nd grade 3rd grade 4th grade 5th grade Middle school 6th grade 7th grade 8th grade High school 9th grade 10th grade 11th grade 12th grade Adult education Resource type Student practice Independent work packet Worksheets Assessment Graphic organizers Task cards Flash cards Teacher tools Classroom management Teacher manuals Outlines Rubrics Syllabi Unit plans Lessons Activities Games Centers Projects Laboratory Songs Clip art Classroom decor Bulletin board ideas Posters Word walls Printables Seasonal Holiday Black History Month Christmas-Chanukah-Kwanzaa Earth Day Easter Halloween Hispanic Heritage Month Martin Luther King Day Presidents' Day St. Patrick's Day Thanksgiving New Year Valentine's Day Women's History Month Seasonal Autumn Winter Spring Summer Back to school End of year ELA ELA by grade PreK ELA Kindergarten ELA 1st grade ELA 2nd grade ELA 3rd grade ELA 4th grade ELA 5th grade ELA 6th grade ELA 7th grade ELA 8th grade ELA High school ELA Elementary ELA Reading Writing Phonics Vocabulary Grammar Spelling Poetry ELA test prep Middle school ELA Literature Informational text Writing Creative writing Writing-essays ELA test prep High school ELA Literature Informational text Writing Creative writing Writing-essays ELA test prep Math Math by grade PreK math Kindergarten math 1st grade math 2nd grade math 3rd grade math 4th grade math 5th grade math 6th grade math 7th grade math 8th grade math High school math Elementary math Basic operations Numbers Geometry Measurement Mental math Place value Arithmetic Fractions Decimals Math test prep Middle school math Algebra Basic operations Decimals Fractions Geometry Math test prep High school math Algebra Algebra 2 Geometry Math test prep Statistics Precalculus Calculus Science Science by grade PreK science Kindergarten science 1st grade science 2nd grade science 3rd grade science 4th grade science 5th grade science 6th grade science 7th grade science 8th grade science High school science By topic Astronomy Biology Chemistry Earth sciences Physics Physical science Social studies Social studies by grade PreK social studies Kindergarten social studies 1st grade social studies 2nd grade social studies 3rd grade social studies 4th grade social studies 5th grade social studies 6th grade social studies 7th grade social studies 8th grade social studies High school social studies Social studies by topic Ancient history Economics European history Government Geography Native Americans Middle ages Psychology U.S. History World history Languages Languages American sign language Arabic Chinese French German Italian Japanese Latin Portuguese Spanish Arts Arts Art history Graphic arts Visual arts Other (arts) Performing arts Dance Drama Instrumental music Music Music composition Vocal music Special education Speech therapy Social emotional Social emotional Character education Classroom community School counseling School psychology Social emotional learning Specialty Specialty Career and technical education Child care Coaching Cooking Health Life skills Occupational therapy Physical education Physical therapy Professional development Service learning Vocational education Other (specialty) Engage NY Grade 2 Module 5 Supplemental Printable and Digital Resource Rated 4.91 out of 5, based on 177 reviews 4.9(177 ratings) $11.00 Add to cart Wish List DescriptionReviews 177Q&AStandards 3 More from Lori Flaglor Thumbnail 1 Thumbnail 2 Thumbnail 3 Thumbnail 4 View Preview Share What others say "Your Eureka Math products are so helpful! After a math lesson, my students need some extra practice and support with several concepts. These work perfectly! Thank you. " Letitia E. "One of my favorite resources! I use this along Eureka. Perfect for extra practice. I love how it states what lessons it aligns with. Great resource." Diana D. See 175 more reviews Description This resource is a must have if you are using the Grade 2 Engage NY Module 5 program. Module 5 focuses on Addition and Subtraction within 1,000 with Word Problems to 100. There are 20 lessons covered in 90pages. This resource is ready to Print-N-Go or use Digitally and is perfect to review key concepts, for homework, or small group instruction all in a kid friendly format. This resource helps students learn the key concepts of addition and subtraction with regrouping using hands on elements. Children will learn how to use place value disks, and solve problems on a place value mat. Also contains Place Value Mat, Mid-Module Review and End of Module Assessment. Finally, a kid-friendly ready to print resource to use with Engage NY Math! Check out the preview to see a sample of what is included. This resource has 2 digital versions available. You can access the TPT Digital Overlay which is located underneath the printable download. This version contains answer boxes and you can assign it directly to your Google Classroom. This resource also contains a link in the printable version to download in Google Slides. You can add text boxes and directions to fit your specific needs. If you try one of these Supplemental Resources I guarantee you will want them all! TEACHERS LIKE YOU SAID... ⭐️⭐️⭐️⭐️⭐️Kimberly V. said, "Lori Flaglor provides the top notch product to correspond to Eureka Engage NY math program. Her pieces provide explanations that help out parents and kiddos to understand the strategies. The basic Eureka program is so dry and boring and provides NO SUPPORT but with these products allow us to support all our learners. AWESOME WORK LORI!!!" ⭐️⭐️⭐️⭐️⭐️Fairly Teach Mother said, "I love using these pages to work with my students on the Eureka lessons. They are also a great resource to use when giving homework! I used these pages in an interactive notebook. the students loved it and I loved that they could go back and review from previous lessons. ⭐️⭐️⭐️⭐️⭐️Marie I. said, "WOW. Thorough, aligned, and beautifully laid out. I love this math curriculum but the layout of the problem sets is sometimes busy and confusing. These worksheets are perfect to supplement the Eureka pages." ⭐️⭐️⭐️⭐️⭐️Chelsea D. said, "I LOVE this seller. She creates grate resources for Eureka math! I used her when I was teaching second grade last year and now have bought her resources for first grade as well! They are great! This was perfect for second grade to do as independent work during centers." ⭐️⭐️⭐️⭐️⭐️Elizabeth T. said, "I LOVE this seller. She creates grate resources for Eureka math! I used her when I was teaching second grade last year and now have bought her resources for first grade as well! They are great! This was perfect for second grade to do as independent work during centers." You may also like: Grade 2 Module 1 Resources Module 1 Interactive Math Game Module 1 Supplemental Printables Module 1 Supplemental Resources Module 1 Exit Tickets Grade 2 Module 2 Resources Module 2 Interactive Math Game Module 2 Supplemental Printables Module 2 Exit Tickets Grade 2 Module 3 Resources Module 3 Supplemental Printables Engage NY Grade 2 Module 3 Interactive Math Game Module 3 Exit Tickets Grade 2 Module 4 Resources Engage NY Grade 2 Module 4 Interactive Math Game Engage NY Grade 2 Module 4 Printables Module 4 Exit Tickets Grade 2 Module 5 Resources Engage NY Grade 2 Module 5 Interactive Math Game Module 5 Exit Tickets Grade 2 Module 6 Resources Engage NY Grade 2 Module 6 Interactive Math Game Engage NY Grade 2 Module 6 Printables Module 6 Exit Tickets Grade 2 Module 7 Resources Engage NY Grade 2 Module 7 Interactive Math Game Engage NY Grade 2 Module 7 Printables Module 7 Exit Tickets Grade 2 Module 8 Resources Engage NY Grade 2 Module 8 Interactive Math Game Engage NY Grade 2 Module 8 Printables Follow me. Just click star above. New products are 50% off for 48 hours. Terms of Use: The purchaser may use this resource for their personal classroom use only.This product is not to be shared with colleagueswithout purchasing the proper number of licenses. Posting, uploading, or sharingthis product on any shared server, district drop box, shared drive, or any digital site where others may download it is strictly prohibited. Report this resource to TPT Reported resources will be reviewed by our team. Report this resource to let us know if this resource violates TPT's content guidelines. Engage NY Grade 2 Module 5 Supplemental Printable and Digital Resource Rated 4.91 out of 5, based on 177 reviews 4.9(177 ratings) Lori Flaglor Follow 7.3k Followers $11.00 Add to cart Wish List Specs What's Included Grade 2 nd Mostly used with 2nd Subject Basic Operations, Math Standards CCSS 2.NBT.B.7 CCSS 2.NBT.B.8 CCSS 2.NBT.B.9 Tags Homeschool, Homework, Printables, Worksheets Save even more with bundles Engage NY Grade 2 BUNDLED Supplemental Printables & Digital Resource If you are currently using the Engage NY Math Modules then you must have this resource! These printable pages are a game changer for this program! Pages are ready to Print N Go or use Digitally with Google Slides all in a kid friendly format. This bundled product is aligned to the Common Core Standa $69.00 Price $69.00$84.50 Original Price $84.50 Save $15.50 9 Reviews 4.9 Rated 4.91 out of 5, based on 177 reviews 177 ratings 5 160 4 17 3 0 2 0 1 0 Mostly used with 2nd grade Reviews 1 1 111 5 1 K 1st 2nd 3rd 4th This product (177) All products (21,477) All verified TPT purchases All ratings 5 stars 4 stars All grades Kindergarten 1st grade 2nd grade 3rd grade 4th grade Population Learning difficulties Mild to severe disabilities Autism Emerging bilingual Sort by: Most recent Most relevant Most recent Highest rating Lowest rating Rated 5 out of 5 April 30, 2025 Your Eureka Math products are so helpful! After a math lesson, my students need some extra practice and support with several concepts. These work perfectly! Thank you. Letitia E. 564 reviews Grades taught:2nd Rated 5 out of 5 March 7, 2025 One of my favorite resources! I use this along Eureka. Perfect for extra practice. I love how it states what lessons it aligns with. Great resource. Diana D. 135 reviews Grades taught:2nd Student populations:Emerging bilinguals Rated 5 out of 5 January 17, 2025 This is a great supplemental resource for small group instruction. Tiffany Womack (TPT Seller) 92 reviews Grades taught:2nd Student populations:Learning difficulties Rated 5 out of 5 September 11, 2024 I've used this resource for many years as additional practice and assessment for the original Eureka Math curriculum. I still use it with Eureka Squared Module 4 as the lessons still align with the new curriculum. 2nd Grade on Parade (TPT Seller) 252 reviews Grades taught:2nd Rated 5 out of 5 August 8, 2024 This resource has several activities for each lesson, and I love that they are able to be used if students need extra practice. Great resource for supplemental work and center rotations! Educating with Em (TPT Seller) 641 reviews Grades taught:2nd Student populations:Autism Rated 5 out of 5 July 30, 2024 Great resource. Loved using this in my classroom! Thank you! Shannon Pilato (TPT Seller) 751 reviews Rated 5 out of 5 July 23, 2024 Love these worksheets. So much funner than what comes with the curriculum. Tabitha S. 312 reviews Grades taught:2nd Rated 5 out of 5 February 20, 2024 I love using your resources as a supplement to my math curriculum! I send the sheets home with the examples at the top for homework. Thank you for putting these together to close the gaps in our curriculum! Robin R. 127 reviews Grades taught:2nd Show more reviews Questions & Answers Please log into post a question. Be the first to ask Lori Flaglor a question about this product. Standards Log in to see state-specific standards (only available in the US). CCSS 2.NBT.B.7 Add and subtract within 1000, using concrete models or drawings and strategies based on place value, properties of operations, and/or the relationship between addition and subtraction; relate the strategy to a written method. Understand that in adding or subtracting three-digit numbers, one adds or subtracts hundreds and hundreds, tens and tens, ones and ones; and sometimes it is necessary to compose or decompose tens or hundreds. CCSS 2.NBT.B.8 Mentally add 10 or 100 to a given number 100–900, and mentally subtract 10 or 100 from a given number 100–900. CCSS 2.NBT.B.9 Explain why addition and subtraction strategies work, using place value and the properties of operations. Meet the Teacher-Author ### Lori Flaglor Follow I have 36 years of teaching experience and proud of it! The majority of my experience has been teaching 2nd grade. I taught my first four years in Inglewood, California and the rest in Akron, New York. New York, United States 4.94 Store rating after 21.5k reviews 7.3k Followers Outstanding Student Teacher Award Nominated Teacher of the Year Inglewood California You may also like previous Engage NY Grade 3 Module 5 Supplemental Printable & Digital Resource $14.00 Original Price $14.00 Rated 4.88 out of 5, based on 113 reviews 4.9 (113) Engage NY Grade 2 Module 8 Supplemental Printable & Digital Resource $8.50 Original Price $8.50 Rated 4.9 out of 5, based on 168 reviews 4.9 (168) Engage NY Grade 3 Module 1 Supplemental Printables and Digital Resource $12.00 Original Price $12.00 Rated 4.79 out of 5, based on 138 reviews 4.8 (138) FREE SAMPLE of Engage NY Grade 3 Module 1 Printable and Digital Resource FREE Rated 4.75 out of 5, based on 8 reviews 4.8 (8) next 0 1 More from this Teacher-Author Engage NY Math SupplementsKindergarten Math1st Grade Math2nd Grade Math TPT is the largest marketplace for PreK-12 resources, powered by a community of educators. Facebook Instagram Pinterest Twitter About Who we are We're hiring Press Blog Gift Cards Support Help & FAQ Security Privacy policy Student privacy Terms of service Tell us what you think Updates Get our weekly newsletter with free resources, updates, and special offers. Get newsletter IXL family of brands IXL Comprehensive K-12 personalized learning Rosetta Stone Immersive learning for 25 languages Wyzant Trusted tutors for 300 subjects Education.com 35,000 worksheets, games, and lesson plans Vocabulary.com Adaptive learning for English vocabulary Emmersion Fast and accurate language certification Thesaurus.com Essential reference for synonyms and antonyms Dictionary.com Comprehensive resource for word definitions and usage SpanishDictionary.com Spanish-English dictionary, translator, and learning FrenchDictionary.com French-English dictionary, translator, and learning Ingles.com Diccionario inglés-español, traductor y sitio de aprendizaje ABCya Fun educational games for kids © 2025 by IXL Learning |Protected by reCAPTCHAPrivacy•Terms