text stringlengths 16 3.88k | source stringlengths 60 201 |
|---|---|
6. The signature of Hq(p) is equal to the number of real roots xj of p for which q(xj) > 0,
minus the number of real roots for which q(xj) < 0.
Proof. For simplicity, we assume all roots are distinct (this is easy to change, at the expense of slightly
53
more complicated notation). We have then
f T Hq (p)f =
n
�... | https://ocw.mit.edu/courses/6-972-algebraic-techniques-and-semidefinite-optimization-spring-2006/260460cc36cd5c2c78b0b04f9b3fe7bd_lecture_05.pdf |
q (p), and we can obtain its sig
nature by adding the signatures of the scalar elements q(xj ) and the 2 × 2 blocks. The signature of the
2 × 2 blocks is always zero (they have zero trace), and thus the result follows.
In particular, notice that if we want to count the number of roots, we can just use q(x) = 1. The ... | https://ocw.mit.edu/courses/6-972-algebraic-techniques-and-semidefinite-optimization-spring-2006/260460cc36cd5c2c78b0b04f9b3fe7bd_lecture_05.pdf |
equal to the number of real roots. The rank of H1(p) is equal to
the number of distinct complex roots of p(x).
Corollary 9. If p(x) has odd degree, there is always at least one real root.
Example 10. Consider p(x) = x3 + 2x2 + 3x + 4. The corresponding Hermite matrix is:
⎡
⎤
3 −2 −2
⎦
−2
−2
−2 18
H(p) = ⎣−2
−2
T... | https://ocw.mit.edu/courses/6-972-algebraic-techniques-and-semidefinite-optimization-spring-2006/260460cc36cd5c2c78b0b04f9b3fe7bd_lecture_05.pdf |
n + 1 coefficients (pn, . . . , p0), the set Pn is a
proper cone (i.e., closed, convex, pointed, solid) in Rn+1 .
An equivalent condition for the (nonconstant) univariate polynomial (1) to be strictly positive, is
that p(x0) > 0 for some x0, and it that has no real roots. Thus, we can use Theorem 6 to write explicit
... | https://ocw.mit.edu/courses/6-972-algebraic-techniques-and-semidefinite-optimization-spring-2006/260460cc36cd5c2c78b0b04f9b3fe7bd_lecture_05.pdf |
are the real and complex roots, respectively. Because p(x) is nonnegative, then
pn > 0 and the multiplicies of the real roots are even, i.e., nj = 2sj .
Notice that (x − a + ib)(x − a − ib) = (x − a)2 + b2 . Then, we can write
�
�
�
(x − ak)2 + b2 �mk ,
(x − rj )2sj
p(x) = pn
k
j
k
Since products of sums of s... | https://ocw.mit.edu/courses/6-972-algebraic-techniques-and-semidefinite-optimization-spring-2006/260460cc36cd5c2c78b0b04f9b3fe7bd_lecture_05.pdf |
1,1) > 0, det X12,12 > 0,
. . . , det X > 0.
For positive semidefiniteness, it is not enough to replace strict positivity with the nonstrict inequality;
a simple counterexample is the matrix
�
�
0
0
,
0 −1
for which the leading minors vanish, but is not PSD. As mentioned, an alternative approach is given by
th... | https://ocw.mit.edu/courses/6-972-algebraic-techniques-and-semidefinite-optimization-spring-2006/260460cc36cd5c2c78b0b04f9b3fe7bd_lecture_05.pdf |
all coefficients are nonnegative (i.e., pk ≥ 0, k = 0, . . . , n−1).
�
Proof. Since all roots of p(t) are real, this can be obtained from a direct application of Descartes’ rules
of signs; see e.g. [BPR03]. For completeness, we present here a direct proof.
If all roots ti are nonpositive (ti ≤ 0), from the factorizati... | https://ocw.mit.edu/courses/6-972-algebraic-techniques-and-semidefinite-optimization-spring-2006/260460cc36cd5c2c78b0b04f9b3fe7bd_lecture_05.pdf |
homogeneous polynomials of degree n − k in the entries of X. For instance, we
have p0(X) = det X, and pn−1(X) = TrX.
Since X is symmetric, all its eigenvalues are real, and thus p(λ) has only real roots. Positive semidef
initeness of X is equivalent to p(λ) having no roots that are strictly positive. It then follows... | https://ocw.mit.edu/courses/6-972-algebraic-techniques-and-semidefinite-optimization-spring-2006/260460cc36cd5c2c78b0b04f9b3fe7bd_lecture_05.pdf |
6.087 Lecture 4 – January 14, 2010
Review
Control flow
I/O
Standard I/O
String I/O
File I/O
1
Blocks
• Blocks combine multiple statements into a single unit.
• Can be used when a single statement is expected.
• Creates a local scope (variables declared inside are local
to the block).
•
Blocks can be nested.
... | https://ocw.mit.edu/courses/6-087-practical-programming-in-c-january-iap-2010/262cf4e05f039e45c926109c8aa95024_MIT6_087IAP10_lec04.pdf |
function).
• the location is identified using a label.
•
a label is a named location in the code. It has the same
form as a variable followed by a ’:’
s t a r t :
{
i f ( cond )
goto o u t s i d e ;
/ ∗ some code ∗ /
goto s t a r t ;
}
o u t s i d e :
/ ∗ o u t s i d e b l o c k ∗ /
5
Spaghetti code
Dijk... | https://ocw.mit.edu/courses/6-087-practical-programming-in-c-january-iap-2010/262cf4e05f039e45c926109c8aa95024_MIT6_087IAP10_lec04.pdf |
/O
Standard I/O
String I/O
File I/O
8
Preliminaries
• Input and output facilities are provided by the standard
library <stdio.h> and not by the language itself.
• A text stream consists of a series of lines ending with ’\n’.
The standard library takes care of conversion from
’\r\n’−’\n’
• A binary stream con... | https://ocw.mit.edu/courses/6-087-practical-programming-in-c-january-iap-2010/262cf4e05f039e45c926109c8aa95024_MIT6_087IAP10_lec04.pdf |
( i n t e g e r ) , argument : 1 0 ∗ /
p r i n t f ( "Prices:%d and %d\n" , 1 0 , 2 0 ) ;
11
printf format specification
The format specification has the following components
%[flags ][ width ][. precision ][ length]<type>
type:
type
d,i
x,X
u
c
s
f
d
e,E
%
meaning
integer
integer (hex)
unsigned intege... | https://ocw.mit.edu/courses/6-087-practical-programming-in-c-january-iap-2010/262cf4e05f039e45c926109c8aa95024_MIT6_087IAP10_lec04.pdf |
printf ("%7s","hello")
printf ("%-7s","hello")
0010
bbhello
hellobb
14
printf format specification (cont.)
%[flags ][ width ][. precision ][ modifier]<type>
precision:
format
printf ("%.2f,%.0f,1.141,1.141)
printf ("%.2e,%.0e,1.141,100.00) 1.14e+00,1e+02
printf ("%.4s","hello")
printf ("%.1s","hello")
output... | https://ocw.mit.edu/courses/6-087-practical-programming-in-c-january-iap-2010/262cf4e05f039e45c926109c8aa95024_MIT6_087IAP10_lec04.pdf |
<0 if s comes before t
•
the function return a value 0 if s is the same as t
•
the function return a value >0 if s comes after t
• strcmp is case sensitive
Examples
• strcmp("A","a") /∗<0∗/
• strcmp("IRONMAN","BATMAN") /∗>0∗/
• strcmp("aA","aA") /∗==0∗/
• strcmp("aA","a") /∗>0∗/
18
Formatted input
int scan... | https://ocw.mit.edu/courses/6-087-practical-programming-in-c-january-iap-2010/262cf4e05f039e45c926109c8aa95024_MIT6_087IAP10_lec04.pdf |
size).
• Returns the number of character written or negative value
on error.
int sscanf(char str [], char format [], arg1,arg2)
• The format specification is the same as scanf;
• The input is read from str variable.
• Returns the number of items read or negative value on
error.
21
File I/O
So far, we have read... | https://ocw.mit.edu/courses/6-087-practical-programming-in-c-january-iap-2010/262cf4e05f039e45c926109c8aa95024_MIT6_087IAP10_lec04.pdf |
or EOF on error.
Note: putchar simply uses the standard output to write a
character. We can implement it as follows:
#define putchar(c) putc(c,stdout)
int fputs(char line [], FILE∗ fp)
• writes a single line to the output stream.
• returns zero on success, EOF otherwise.
int fscanf(FILE∗ fp,char format [], arg1,a... | https://ocw.mit.edu/courses/6-087-practical-programming-in-c-january-iap-2010/262cf4e05f039e45c926109c8aa95024_MIT6_087IAP10_lec04.pdf |
Engineering Systems
Doctoral Seminar
ESD.83-- Fall 2011
Class 5
Faculty: Chris Magee and Joe Sussman
TA: Rebecca Saari
Guest: Professor Mort Webster (ESD)
1
1Class 5-- Overview
Welcome, Overview and Introductions (5 min.)
Dialogue with Professor Webster (55min)--Redaction
provided by Xin Zhang
Break (10 minutes... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
ussman, Engineering Systems Division, Massachusetts Institute of Technology
6
6Scenarios
Introduction to concepts
The Shell approach
The RAND approach (already
introduced in the discussant
segment)
© 2008 Chris Magee and Joseph Sussman, Engineering Systems Division, Massachusetts Institute of Technology
7
7Sc... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
-- skip the brain.”
A mechanism for continuous
organizational learning
© 2008 Chris Magee and Joseph Sussman, Engineering Systems Division, Massachusetts Institute of Technology
12
12Organizational Learning
Understand the possible long-term
consequences of short-term decisions
Decisionmakers can begin to ident... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
Magee and Joseph Sussman, Engineering Systems Division, Massachusetts Institute of Technology
16
16
The Shell Approach
© 2008 Chris Magee and Joseph Sussman, Engineering Systems Division, Massachusetts Institute of Technology
17
17Perspective on Scenarios
Scenarios in a corporate environment
Assume that cor... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
clearly, the environment in which
your actions will take place?
How will those actions relate to prevailing forces, trends,
attitudes and influences?
HOW
Invent, and then consider, in-depth several stories of plausible
futures.
THE POINT
Make strategic decisions that will be sound for all plausible futures... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
ation of
the past-- may be OK for prehistoric
humans, but not now
We don‟t anticipate the timing of events
We overestimate our abilities to know
the future (especially experts!)
© 2008 Chris Magee and Joseph Sussman, Engineering Systems Division, Massachusetts Institute of Technology
27
27The RAND Approach
Ou... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
31
31The RAND Approach
Robust Adaptive Planning--Key Concepts
Multiple highly-differential views of the future
better than point estimates for understanding
the system of interest and its performance
Choose robust strategies that perform well over
a range of plausible futures. Robustness
dominates optimality... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
of new findings in related fields
© 2008 Chris Magee and Joseph Sussman, Engineering Systems Division, Massachusetts Institute of Technology
36
36Learning Objectives
Historical Roots: Understanding of
historical/intellectual roots of key concepts and
principles in engineering systems
ES and observations, data so... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
Massachusetts Institute of Technology
41
41Origins and Evolution of
Scenario Planning
• Corporate Roots
– Royal Dutch/Shell (30 years)
– Initially utilized in high-level corporate strategy
to improve business decisions in an uncertain
environment
– Needed to move away from forecasts
• Evolution within Shell
– 1970s... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
negotiation
© 2008 Chris Magee and Joseph Sussman, Engineering Systems Division, Massachusetts Institute of Technology
45
45Shell Scenarios: Energy Needs, Choices
and Possibilities I
Two Diverging Scenarios
The Spirit of the Coming Age
Energy choices
consumer perspective
revolutionary
Dynamics as Usual
... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
They
take it for granted that some things just can‟t and won‟t
happen; for example, „oil prices won‟t collapse,‟ or „the Cold
War can‟t ever end.‟ Not having tried to foresee surprising
events, they are at a loss for ways to act when upheaval
continues. They create blind spots for themselves.”
© 2008 Chris Magee a... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
Sussman, Engineering Systems Division, Massachusetts Institute of Technology
53
53Combining Driver States and
Selecting Scenario Plots
Choose some combinations of macro-
drivers to serve as the basis for the
scenario plots
Internally consistent
Connections between the states of the different
drivers
Range o... | https://ocw.mit.edu/courses/ids-900-doctoral-seminar-in-engineering-systems-fall-2011/263479e7a374b364f41d8f16533ff0e1_MITESD_83F11_lec05.pdf |
6.825 Techniques in Artificial Intelligence
Logic Miscellanea
• Completeness and Incompleteness
• Equality
• Paramodulation
Lecture 9 • 1
Logic is a huge subject. It includes esoteric mathematical and philosophical
arguments as well as hard-core engineering of knowledge representations and
efficient inference algorit... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/263ad85c152caf1ee707e7cb616f0c99_Lecture9Final.pdf |
teness Theorem: Resolution refutation is a
complete proof system for FOL
Then, Robinson came along and showed that resolution refutation is sound and
complete for FOL.
Lecture 9 • 4
4
Completeness and Decidability
Complete: If KB ² α then KB
`
α
• If it’s entailed, there is a proof
Semi-decidable:
• If there’s a ... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/263ad85c152caf1ee707e7cb616f0c99_Lecture9Final.pdf |
Adding Arithmetic
Gödel’s Incompleteness Theorem: There is no
consistent, complete proof system for FOL +
Arithmetic.
Either there are sentences that are true, but not
provable or there are sentences that are provable,
but not true.
Arithmetic gives you the ability to construct code-
names for sentences within the... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/263ad85c152caf1ee707e7cb616f0c99_Lecture9Final.pdf |
solution is to just treat equality like any other relation and give axioms that
specify how it has to work. So, for instance, equality is an equivalence relation,
which means it’s symmetric, reflexive, and transitive. We can say that in logic
like this.
11
Equality
x. x = x
xy. x=y
→
xyz. x=y Æ y = z
xy. x=y
(P(... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/263ad85c152caf1ee707e7cb616f0c99_Lecture9Final.pdf |
you can! You can conclude
Q(y) or W(y,B).
14
Paramodulation
Need one more rule to deal with resolution and equality.
is a literal containing term r
γ[r]
θ= unify(s,r)
α∨ (s = t)
β∨γ[r]
(α∨β∨γ[t])θ
F(x) = B
Q(y) ∨W (y,F(y))
Q(y) ∨W (y,B)
Lecture 9 • 15
Here’s the general paramodulation rule. Like resolution, it lets ... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/263ad85c152caf1ee707e7cb616f0c99_Lecture9Final.pdf |
is the
mapping from the abstract variables in the rule to the actual components of the
example.
16
Paramodulation
Need one more rule to deal with resolution and equality.
α∨ (s = t)
β∨γ[r]
(α∨β∨γ[t])θ
F(x) = B
Q(y) ∨W (y,F(y))
Q(y) ∨W (y,B)
P(x) ∨ F(x) = B
Q(y) ∨W (y,F(y))
P(y) ∨ Q(y) ∨W (y,B)
is a literal containin... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/263ad85c152caf1ee707e7cb616f0c99_Lecture9Final.pdf |
part x is stored in
the warehouse of company y; T(x) = part x is made of
titanium; F(x) part x is fragile; use a constant for “the part I
need”.)
Lecture 9 • 19
19 | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/263ad85c152caf1ee707e7cb616f0c99_Lecture9Final.pdf |
3.052 Nanomechanics of Materials and Biomaterials Thursday 02/15/07
I
Prof. C. Ortiz, MIT-DMSE
LECTURE 4: FORCE-DISTANCE CURVES
Outline :
LAST TIME : ADDITIONAL NANOMECHANICS INSTRUMENTATION COMPONENTS ......................... 2
PIEZOS TUBES : X/Y SCANNING .......................................................... | https://ocw.mit.edu/courses/3-052-nanomechanics-of-materials-and-biomaterials-spring-2007/264303e0db208ef97529629587899910_lec4.pdf |
strength (Volt/m)
i
i = direction of applied fie
ld, j = direction of strain
1,2,3 = normal axes ; 4, 5, 6 = shear
+ Poisson's ratio
Δ
L =
o
L d U
31
d
3
where d = wall thickness, U = operating voltage
VA+ B-VC+D
Normal Force
Microscopy
(NFM)
mirror
A
B
C D
4-quadrant
position sensitive
photodiode
laser beam
cantileve... | https://ocw.mit.edu/courses/3-052-nanomechanics-of-materials-and-biomaterials-spring-2007/264303e0db208ef97529629587899910_lec4.pdf |
in y and z, x is coupled to y and z
Figure by MIT OCW.
-Another approach : individual "piezo stacks" with flexures in a "nested design" (Introduction to AFM by
Asylum Research, Inc. (Quicktime Movie)- Pset 2
3
3.052 Nanomechanics of Materials and Biomaterials Thursday 02/15/07
Prof. C. Ortiz, MIT-DMSE
GE... | https://ocw.mit.edu/courses/3-052-nanomechanics-of-materials-and-biomaterials-spring-2007/264303e0db208ef97529629587899910_lec4.pdf |
iezo
displacement/deflection
- See animation on the MIT Server (Force curve animation
from NC State).
5
3.052 Nanomechanics of Materials and Biomaterials Thursday 02/15/07
Prof. C. Ortiz, MIT-DMSE
HIGH RESOLUTION FORCE SPECTROSCOPY EXPERIMENT: CONVERTED F-D DATA
x-axis conversion
Δδ
Δz... | https://ocw.mit.edu/courses/3-052-nanomechanics-of-materials-and-biomaterials-spring-2007/264303e0db208ef97529629587899910_lec4.pdf |
ASURING MACROMOLECULAR ADHESION : CARTILAGE AGGRECAN
Cartilage aggrecan is a very
unique "bottle-brush"
macromolecule that is largely
responsible for the mechanical
properties and health of
cartilage tissue in our joints.
(*podcasts later on in the
semester on this topic,
unpublished data by L. Han)
Image rem... | https://ocw.mit.edu/courses/3-052-nanomechanics-of-materials-and-biomaterials-spring-2007/264303e0db208ef97529629587899910_lec4.pdf |
MIT OpenCourseWare
http://ocw.mit.edu
2.161 Signal Processing: Continuous and Discrete
Fall 2008
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
Massachusetts Institute of Technology
Department of Mechanical Engineering
2.161 Signal Processing - Continuous and Di... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
cid:16)
(cid:17) (cid:15) (cid:2)
(cid:8) (cid:9) (cid:10)
(cid:2) (cid:6) (cid:3)
(cid:12) (cid:9) (cid:13) (cid:14) (cid:2)
(cid:8) (cid:9) (cid:10)
(cid:14) (cid:3)
(cid:2) (cid:6) (cid:3)
(cid:7) (cid:3)
(cid:11)
(cid:11)
(cid:11)
and that a high-order filter may be implemented by cascading second-order blocks, a... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
)
(cid:7)
(cid:5)
(cid:4)
(cid:5)
(cid:6)
(cid:2)
(cid:8)
(cid:9)
(cid:10)
(cid:10)
(cid:3)
The op-amp has the following characteristics:
• It is basically a “three terminal” amplifier, with two inputs and an output. It is a
differential amplifier, that is the output is proportional to the difference in the voltages
ap... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
cid:11)
(cid:25)
(cid:16) (cid:13)
(cid:13)
(cid:25)
(cid:26)
(cid:16) (cid:26)
(cid:16) (cid:16) (cid:13)
(cid:19)
(cid:20)
(cid:6) (cid:21) (cid:18)
In the configuration shown above we note
• Because the gain A is very large, the voltage at the node designated summing junc
is very small, and we approximat... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
6) (cid:13)
(cid:10) (cid:21) (cid:27)
(cid:4) (cid:20) (cid:16) (cid:30) (cid:18) (cid:21) (cid:9) (cid:5) (cid:3) (cid:17) (cid:6) (cid:21) (cid:13) (cid:14) (cid:11)
(cid:20)
(cid:31)
(cid:20)
(cid:31)
(cid:25)
(cid:25)
(cid:16)
(cid:31)
(cid:16)
(cid:2)
(cid:19)
(cid:25)
(cid:26)
(cid:16) (cid:26)
... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
(cid:14) (cid:11)
(cid:25)
(cid:16) (cid:13)
(cid:16) (cid:16) (cid:13)
(cid:13)
!
(cid:16) (cid:26)
(cid:2)
(cid:19)
(cid:20)
(cid:6) (cid:21) (cid:18)
At the summing junction we apply Kirchoff’s current law as before but the feedback current
is now defined by the elemental relationship for the capacitor:
ii... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
30)
(cid:25) (cid:26) (cid:27)
(cid:2)
(cid:19)
(cid:18)
(cid:16)
(cid:31) (cid:15)
(cid:28) (cid:15)
(cid:18)
(cid:3)
(cid:18)
(cid:29)
(cid:18)
(cid:15)
(cid:17)
(cid:3)
(cid:28)
(cid:3)
(cid:2)
(cid:19)
(cid:31) (cid:3)
(cid:8)
(cid:8)
(cid:8)
(cid:2)
(cid:19)
Amplifiers A1 and A2 are integr... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
However, because of the sign inversions in the op-amp circuits
we cannot use the elementary summer configuration described above. Applying Kirchoff’s
Current Law at the non-inverting and inverting inputs of A3 gives
Vin − v+
R5
+
v1 − v+
R6
= 0 and
v3 − v−
R4
+
v2 − v−
R1
= 0.
9–4
(cid:2)
(cid:7)
(cid:17)... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
where
A High-Pass Filter:
the transfer function
where
Klp =
1 + R3/R4
1 + R5/R6
Selection of the output as the output of integrator A1 generates
−Kbpa1s
Hbp(s) = −τ1sHlp(s) = s2 + a1s + a0
R6
Kbp = R5
Selection of the output as the output of the summer A3 generates
Hhp(s) = τ1τ2s 2Hlp(s) =
Khps2
s2 + a1s +... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
) (cid:24)
Consider the input stage:
(cid:26) $
(cid:17)
(cid:3)
(cid:25) (cid:26) (cid:27)
(cid:18)
(cid:3)
(cid:26) (cid:3)
(cid:18)
(cid:15)
(cid:9) (cid:11) (cid:31)
(cid:9)
(cid:26) (cid:15)
(cid:2)
(cid:19)
(cid:28) (cid:3)
(cid:25) (cid:3)
(cid:25) (cid:20) (cid:23) (cid:24)
With the infinite ga... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
τ2
Klp =
1
1 + R1/R3
9–6
(cid:28)
(cid:4)
1.4 First-Order Filter Sections:
Single pole low-pass filter sections with a transfer function of the form
KΩ0
H(s) = s + Ω0
may be implemented in either an inverting or non-inverting configuration as shown in Fig.
11.
(cid:18)
(cid:8)
(cid:25)
(cid:26) (cid:27)
(ci... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
/R1C
.
s + 1/R1C
9–7
(cid:4)
(cid:9)
(cid:4)
(cid:12)
Classroom Demonstration
Example 2 in the class handout “Op-Amp Implementation of Analog Filters” describes a
state-variable design for a 5th-order Chebyshev Type I low-pass filter with Ωc = 1000 rad/s
and 1dB ripple in the passband.
The transfer function is
H... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
:10) (cid:10) (cid:7)
(cid:2)
(cid:19)
& (cid:15) (cid:16) ’ (cid:7)
(cid:10) % (cid:16) &
(cid:10) % (cid:16) &
(cid:10) % (cid:16) &
(cid:2)
(cid:19)
(cid:2)
(cid:19)
(cid:25)
(cid:20) (cid:23) (cid:24)
This filter was constructed on a bread-board using 741 op-amps, and was demonstrated
to the class, driv... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
(cid:18) (cid:8) (cid:21) (cid:18)
(cid:10) & ( (cid:21) & (cid:13) (cid:29) & (cid:7) * (cid:7) (cid:7) %
(cid:27)
(cid:8) (cid:5) & (cid:10)
" (cid:4) (cid:24) (cid:11)
(i) The sampler (A/D converter) records the signal value at discrete times nΔT to produce
a sequence of samples {fn} where fn = f (nΔT ) (ΔT is ... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
11) (cid:7)
* (cid:4) (cid:24) (cid:11)
(cid:10) (cid:9) (cid:27)
(cid:8) (cid:5) & (cid:7) $ (cid:4) (cid:24) (cid:11)
(cid:24)
$
(cid:27)
(cid:29) (cid:6) (cid:27)
(cid:8) (cid:21) (cid:18) & (cid:3) * (cid:27)
(cid:10) (cid:18) (cid:9) (cid:16) (cid:30) (cid:29) (cid:9) (cid:10) & (cid:3)
* & (cid:30) (cid... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
s(t; ΔT ) =
δ(t − nΔT ).
We denote the sampled waveform f (cid:2)(t) as
n=−∞
f (cid:2)(t) = s(t; ΔT )f (t) =
�
∞
f (t)δ(t − nΔT )
n=−∞
(cid:26) (cid:4) (cid:18) (cid:11)
(cid:2) (cid:5) (cid:24) + (cid:3) (cid:4) (cid:6)
+
$ (cid:7) (cid:7) (cid:5) (cid:24) (cid:6) (cid:7) , (cid:7) $ (cid:5) - (cid:6) (cid... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
(t; ΔT ) =
�
∞
1
jnΩ0t
e
ΔT n=−∞
where all the Fourier coefficients are equal to (1/ΔT ), and where Ω0 = 2π/ΔT is the fun
damental angular frequency. Using this form, the spectrum of the sampled waveform f (cid:2)(t)
may be written
F (cid:2)(jΩ) =
�
∞
−∞
f (cid:2)(t) e−jΩt dt =
∞ �
� ∞
1
ΔT n=−∞
−∞
f (t) ... | https://ocw.mit.edu/courses/2-161-signal-processing-continuous-and-discrete-fall-2008/264d28b72e04d21740367f9c4cc485aa_lecture_09.pdf |
3.37 (Class 4)
Question: thermal diffusivity?
• Thermal Diffusivity (alpha) = Thermal Conductivity (k) / (density * heat
capacity)
• Combined, or derived parameter
• From Fourier’s 1st law and 2nd law (diffusion equation)
• deltaH = Cp*deltaT
Question: Cold welding of semiconductors, is it gold-to-gold? Typicall... | https://ocw.mit.edu/courses/3-37-welding-and-joining-processes-fall-2002/269cd56a8622f7fff119040dea55e1c9_33704.pdf |
of tornado where chickens had all
feathers taken off. They decided low pressure of tornado that did it and tried to
use a vacuum chamber to pluck a chicken ☺.
• Project to lay down weld metal to build up a part a little at a time.
o Can get significant improvement in properties.
o Can lay down say... | https://ocw.mit.edu/courses/3-37-welding-and-joining-processes-fall-2002/269cd56a8622f7fff119040dea55e1c9_33704.pdf |
Ultrasonic welding:
• Diagram on board
• 20-100kHz is typical bonding frequency
• have a small displacement oscillating back and forth
• microscopic shears
• contamination stays there
• may only have 50% bonded area since did not extrude contaminants, just buries it
• don’t deform the substrates
• most... | https://ocw.mit.edu/courses/3-37-welding-and-joining-processes-fall-2002/269cd56a8622f7fff119040dea55e1c9_33704.pdf |
6.852: Distributed Algorithms
Fall, 2009
Class 9
Today’s plan
(cid:122) Basic asynchronous network algorithms
− Constructing a spanning tree
− Breadth-first search
− Shortest paths
− Minimum spanning tree
(cid:122) Reading: Sections 15.3-15.5, [Gallager, Humblet,
Spira]
(cid:122) Next lecture:
(cid:122) Synchronizer... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
tree, but not necessarily breadth-first tree.
AsynchSpanningTree, Process i
(cid:122) Signature
− in receive(“search”)j,i, j ∈ nbrs
− out send(“search”)i,j, j ∈ nbrs
− out parent(j)i, j ∈ nbrs
(cid:122) State
− parent: nbrs U { null }, init null
− reported: Boolean, init false
− for each j ∈ nbrs:
(cid:122) send(j) ∈ ... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
) message complexity.
(cid:122) See book for details.
h = height of tree; may be n
More applications
• Asynchronous broadcast/convergecast:
– Can also construct spanning tree while using it to broadcast
message and also to collect responses.
– E.g., to tell the root when the bcast is done, or to collect aggregated
... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
−
(cid:122)
send(j): FIFO queue of N, init (0) if i =
i
0, else
∅
(cid:122) receive(m)j,i
eff: if m+1 < dist then
dist := m+1
parent := j
for k ∈ nbrs - { j } do
add dist to send(k)
Note: No parent actions---no one
knows when the algorithm is done
AsynchBFS
0
AsynchBFS
0
0
AsynchBFS
0
0
0
AsynchBFS
0
0
1
Asynch... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
: O(D |E|); Time: O(diam D (l+d))
• Termination:
– No one knows when this is done, so can’t produce parent outputs.
– Can augment with acks for search messages, convergecast back to i0.
– i0 learns when the tree has stabilized, tells everyone else.
– A bit tricky:
• Tree grows and shrinks.
• Some processes may partici... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
.
− Time:
− Use simplified analysis:
− Neglecting local computation time l
− Assuming that every message in a channel is delivered in time d
(ignoring congestion delays).
− O(diam2 d)
LayeredBFS vs AsynchBFS
(cid:122) Message complexity:
− AsynchBFS: O(diam |E|), assuming diam is known, O(n |E|) if not
− LayeredBF... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
dist := w + weight(j,i)
parent := j
for k ∈ nbrs - { j } do
add dist to send(k)
AsynchBellmanFord
(cid:122) Termination:
− Use convergecast (as for AsynchBFS).
(cid:122) Complexity:
− O(n!) simple paths from i0 to any other node, which is O(nn).
− So the number of messages sent on any channel is O(nn).
− So message co... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
: Unrestrained asynchrony can cause
problems.
• Return to this problem after we have better
synchronization methods.
• Now, another good illustration of the
problems introduced by asynchrony:
Minimum spanning tree
(cid:122) Assumptions:
− G = (V,E) connected, undirected.
− Weighted edges, weights known to endpoint ... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
.
(cid:122) Phase k+1 (produces level k+1 components):
(cid:122) Leader of each component initiates search for MWOE (broadcast initiate on
tree edges).
(cid:122) Each node finds its mwoe:
− Send test on potential edges, wait for accept (different component) or reject (same
component).
− Test edges one at a time in or... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
) Problems arise:
− Inaccurate information about outgoing edges.
− Less “balanced” combination of components:
− Concurrent overlapping searches/convergecasts:
− When nodes are out of synch, concurrent searches for MWOEs could
interfere with each other (we’ll see this).
− Time bound:
− These problems result from nodes ... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
component ≥ 2k.
• Merging and absorbing are both allowable operations in finding MST,
because they are allowed by the general theory for MSTs.
Liveness
• Q: Why are merging and absorbing sufficient to ensure that the
construction is eventually completed?
• Lemma: After any allowable finite sequence of merges and abs... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
than i does, since the
component is still searching for its MWOE.
– If j’s level is < i’s, then j doesn’t know if it is in the same or a different
component. So it doesn’t yet respond---waits to catch up to i’s level.
Liveness, again
• Q: Can the extra delays imposed here affect the
progress argument?
• No:
– We ca... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
urs.
So mwoe(j) is a different
edge, one whose weight <
weight(i,j).
C′
mwoe(C)
i
C
j
C′
•
•
Claim 2: MWOE for combined
component is not outgoing from a
node in C.
Proof:
–
–
–
(i,j) is the MWOE of C, so there
are no edges outgoing from C
with weight < weight(i,j).
So no edges outgoing from C
with weight < alrea... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
122) Messages: O(|E| + n log n)
(cid:122) 4|E| for test-reject msgs (one pair for each direction of
every edge)
(cid:122) n initiate messages per level (broadcast: only sent on tree
edges)
(cid:122) n report messages per level (convergecast)
(cid:122) 2n test-accept messages per level (one pair per node)
(cid:122) n ... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/269e879b44c60a699f32f129f2a67779_MIT6_852JF09_lec09.pdf |
Review: step response of 1st order systems we’ve seen
•
Inertia with bearings (viscous friction)
Step input Ts(t) = T0u(t) ⇒ Step response∗
ω(t) =
T0
b
1 − e−
t/τ
, where
τ =
J
b
.
• RC circuit (charging of a capacitor)
³
´
Step input vi(t) = V0u(t) ⇒ Step response
vC (t) = V0
1 − e−
t/τ
, where
τ = RC.
+
vi
−
R
C
+
vC... | https://ocw.mit.edu/courses/2-004-systems-modeling-and-control-ii-fall-2007/26a1e7459044ff2652c63c7c98138e4b_lecture06.pdf |
(s)
µ
¶
µ
KmKv
R
¶¸
Ω(s) =
Km
R
Vs(s)
Neglecting the DC motor’s inductance (i.e., assuming L/R ≈ 0), we find
⎪⎩
Km
RJ
s +
1
J
b +
µ
KmKv
R
¶
1
R
µ
s +
b
J
s +
1
J
b +
µ
¶
KmKv
R
Ω(s)
Vs(s)
=
I(s)
Vs(s)
=
⎧
⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎨
⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎩
Transfer function for the angular velocity
is of the form
A
s + p
,
p =
1
J
b +
µ
K... | https://ocw.mit.edu/courses/2-004-systems-modeling-and-control-ii-fall-2007/26a1e7459044ff2652c63c7c98138e4b_lecture06.pdf |
b = 4kg · m2 · Hz.
We will compute the system’s response
(both angular velocity and current)
to the step input vs(t) = 30u(t) V.
Substituting the numerical values into the system TF,
whereas the Laplace transform of the input is
we find
Vs(s) ≡ L
vs(t)
h
= L
30u(t)
=
h
i
30
s
.
i
I. Angular velocity
Ω(s) =
15
s (s + 5)
... | https://ocw.mit.edu/courses/2-004-systems-modeling-and-control-ii-fall-2007/26a1e7459044ff2652c63c7c98138e4b_lecture06.pdf |
input is
we find
Vs(s) ≡ L
II. Current
vs(t)
h
i
= L
30u(t)
=
h
i
30
s
.
Ω(s)
Vs(s)
I(s)
Vs(s)
=
=
1
1
2
s + 5 [Hz]
1
6
(s + 2 [Hz])
s + 5 [Hz]
⎧
⎪⎪⎪⎪⎨
⎪⎪⎪⎪⎩
I(s) =
5 (s + 2)
s (s + 5)
= 5
K10
s
+
K20
s + 5
µ
I(s) =
2
s
+
3
s + 5
µ
¶
where
K10 =
s + 2
s + 5
i(t) =
2 + 3e−
5t
¶
⇒
s=0
¯
¯
¯
¯
u(t) A.
=
2
5
, K20 =
s + 2
s... | https://ocw.mit.edu/courses/2-004-systems-modeling-and-control-ii-fall-2007/26a1e7459044ff2652c63c7c98138e4b_lecture06.pdf |
ecture 06 – Monday, Sept. 17
DC motor step response (current)
Image removed due to copyright restrictions.
Please see: Fig. 4.1 in Nise, Norman S. Control Systems Engineering. 4th ed. Hoboken, NJ: John Wiley, 2004.
2.004 Fall ’07
Lecture 06 – Monday, Sept. 17
1st order system response from s-plane representation
• P... | https://ocw.mit.edu/courses/2-004-systems-modeling-and-control-ii-fall-2007/26a1e7459044ff2652c63c7c98138e4b_lecture06.pdf |
= 3
1 − e−
5t
u(t)
rad/sec
i(t) =
2 + 3e−
5t
u(t) A
ω(∞) = 3 rad/sec
¢
¡
dω
dt
(0+) = 3 × 5 = 15
rad/sec2
2.004 Fall ’07
Lecture 06 – Monday, Sept. 17
¢
i(∞) = 2 A
¡
di
dt
(0+) = ∞
The Final Value theorem: steady-state
We will now learn two additional properties of the Laplace transform, which we
will quote without p... | https://ocw.mit.edu/courses/2-004-systems-modeling-and-control-ii-fall-2007/26a1e7459044ff2652c63c7c98138e4b_lecture06.pdf |
initial slope of the step response, i.e.
the value of the derivative of the step response at t = 0+ for the same general
1st—order system with steady state equal to unity, a pole at −a and without a
zero. Since we are interested in the derivative of f (t), the Laplace transform of
interest is
H1(s) = L
df1(t)
dt
·
¸
= ... | https://ocw.mit.edu/courses/2-004-systems-modeling-and-control-ii-fall-2007/26a1e7459044ff2652c63c7c98138e4b_lecture06.pdf |
can see that the effects of the zero −z on the 1st—order system are (in
comparison to a system with the same pole at −a but without the zero)
• amplify the steady—state response by z;
• raise the initial value from zero to A;
• raise the initial slope to infinity.
The infinite initial slope is non—physical; in the case of... | https://ocw.mit.edu/courses/2-004-systems-modeling-and-control-ii-fall-2007/26a1e7459044ff2652c63c7c98138e4b_lecture06.pdf |
MIT 6.581/20.482J
FOUNDATIONS OF ALGORITHMS AND COMPUTATIONAL
TECHNIQUES IN SYSTEMS BIOLOGY
Spring 2006
7 February 2006
Tuesday
MOTIVATION/OVERVIEW
There is a disconnect between biology and
computer science.
The biologist will pose the problem statement,
but it may not be amenable for the computer
scientist ... | https://ocw.mit.edu/courses/20-482j-foundations-of-algorithms-and-computational-techniques-in-systems-biology-spring-2006/26a5783a728a1db3e302718e6dc51544_l01.pdf |
→
(3D) ——→ functions ——→ functions ——→ functions
network Á
protein
↑
mRNA
↑
genome (DNA)
x-ray
crystallography
NMR
binding
catalysis
synthesis/
degradation
energy storage/
utilization
gene expression
development
immune
surveillance
control points –
decision
“robustness”
time keepers
oscillators ... | https://ocw.mit.edu/courses/20-482j-foundations-of-algorithms-and-computational-techniques-in-systems-biology-spring-2006/26a5783a728a1db3e302718e6dc51544_l01.pdf |
Convex Optimization — Boyd & Vandenberghe
2. Convex sets
• affine and convex sets
• some important examples
• operations that preserve convexity
• generalized inequalities
• separating and supporting hyperplanes
• dual cones and generalized inequalities
2–1
Affine set
line through x1, x2: all points
x = θx1 + (1 − ... | https://ocw.mit.edu/courses/6-079-introduction-to-convex-optimization-fall-2009/26c4c530c9db63a12b898d720dd89a44_MIT6_079F09_lec02.pdf |
2x2 + · · · + θkxk
with θ1 + · · · + θk = 1, θi ≥ 0
convex hull conv S: set of all convex combinations of points in S
Convex sets
2–4
Convex cone
conic (nonnegative) combination of x1 and x2: any point of the form
x = θ1x1 + θ2x2
with θ1 ≥ 0, θ2 ≥ 0
x1
x2
0
convex cone: set that contains all conic combinati... | https://ocw.mit.edu/courses/6-079-introduction-to-convex-optimization-fall-2009/26c4c530c9db63a12b898d720dd89a44_MIT6_079F09_lec02.pdf |
., P symmetric positive definite)
xc
other representation: {xc + Au | �u�2 ≤ 1} with A square and nonsingular
Convex sets
2–7
Norm balls and norm cones
norm: a function � · � that satisfies
• �x� ≥ 0; �x� = 0 if and only if x = 0
• �tx� = |t| �x� for t ∈ R
• �x + y� ≤ �x� + �y�
notation: � · � is general (unsp... | https://ocw.mit.edu/courses/6-079-introduction-to-convex-optimization-fall-2009/26c4c530c9db63a12b898d720dd89a44_MIT6_079F09_lec02.pdf |
}: positive semidefinite n × n matrices
X ∈ Sn ⇐⇒
+
z T Xz ≥ 0 for all z
Sn is a convex cone
+
n = {X ∈ Sn | X ≻ 0}: positive definite n × n matrices
• S++
example:
x y
z
y
�
�
∈ S2
+
1
0.5
z
0
1
0
y −1 0
0.5
x
1
Convex sets
2–10
Operations that preserve convexity
practical methods for establis... | https://ocw.mit.edu/courses/6-079-introduction-to-convex-optimization-fall-2009/26c4c530c9db63a12b898d720dd89a44_MIT6_079F09_lec02.pdf |
2–12
Affine function
suppose f : Rn → Rm is affine (f (x) = Ax + b with A ∈ Rm×n , b ∈ Rm)
• the image of a convex set under f is convex
S ⊆ Rn convex =⇒
f (S) = {f (x) | x ∈ S} convex
• the inverse image f −1(C) of a convex set under f is convex
C ⊆ Rm convex =⇒
f −1(C) = {x ∈ Rn | f (x) ∈ C} convex
examples
• s... | https://ocw.mit.edu/courses/6-079-introduction-to-convex-optimization-fall-2009/26c4c530c9db63a12b898d720dd89a44_MIT6_079F09_lec02.pdf |
linear-fractional function
f (x) =
1
x
x1 + x2 + 1
1
1
2
x
0
C
2
x
0
f (C)
−1
−1
0
x1
1
−1
−1
0
x1
1
Convex sets
2–15
Generalized inequalities
a convex cone K ⊆ Rn is a proper cone if
• K is closed (contains its boundary)
• K is solid (has nonempty interior)
• K is pointed (contains no line)
examp... | https://ocw.mit.edu/courses/6-079-introduction-to-convex-optimization-fall-2009/26c4c530c9db63a12b898d720dd89a44_MIT6_079F09_lec02.pdf |
K
properties: many properties of �K are similar to ≤ on R, e.g.,
x �K y,
u �K v =⇒
x + u �K y + v
Convex sets
2–17
Minimum and minimal elements
�K is not in general a linear ordering : we can have x
��K y and y
��K x
x ∈ S is the minimum element of S with respect to �K if
y ∈ S =⇒
x �K y
x ∈ S is a minima... | https://ocw.mit.edu/courses/6-079-introduction-to-convex-optimization-fall-2009/26c4c530c9db63a12b898d720dd89a44_MIT6_079F09_lec02.pdf |
x = a T x0}
where a
= 0 and a
T x ≤ T x0 for all x ∈ C
a
a
x0
C
supporting hyperplane theorem: if C is convex, then there exists a
supporting hyperplane at every boundary point of C
Convex sets
2–20
�
Dual cones and generalized inequalities
dual cone of a cone K:
K ∗ = {y | y T x ≥ 0 for all x ∈ K}
example... | https://ocw.mit.edu/courses/6-079-introduction-to-convex-optimization-fall-2009/26c4c530c9db63a12b898d720dd89a44_MIT6_079F09_lec02.pdf |
over S for some λ ≻K∗ 0, then x is minimal
λ1
x1
S
x2
λ2
•
if x is a minimal element of a convex set S, then there exists a nonzero
λ �K∗ 0 such that x minimizes λT z over S
Convex sets
2–22
optimal production frontier
• different production methods use different amounts of resources x ∈ Rn
• production set ... | https://ocw.mit.edu/courses/6-079-introduction-to-convex-optimization-fall-2009/26c4c530c9db63a12b898d720dd89a44_MIT6_079F09_lec02.pdf |
MIT OpenCourseWare
http://ocw.mit.edu
6.006 Introduction to Algorithms
Spring 2008
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
Lecture 3 Ver 2.0
Scheduling and Binary Search Trees
6.006 Spring 2008
Lecture 3: Scheduling and Binary Search Trees
Lecture Overvie... | https://ocw.mit.edu/courses/6-006-introduction-to-algorithms-spring-2008/26f81dc853b4980d8c0873c0f8875268_lec3.pdf |
= R[1: ] (drop R[0] from R)
Can we do better?
• Sorted list: A 3 minute check can be done in O(1). It is possible to insert new
time/plane rather than append and sort but insertion takes Θ(n) time.
• Sorted array: It is possible to do binary search to find place to insert in O(lg n)
time. Actual insertion however re... | https://ocw.mit.edu/courses/6-006-introduction-to-algorithms-spring-2008/26f81dc853b4980d8c0873c0f8875268_lec3.pdf |
cheduling and Binary Search Trees
6.006 Spring 2008
Finding the next larger element
next-larger(x)
if right child not NIL, return minimum(right)
else y = parent(x)
while y not NIL and x = right(y)
x = y; y = parent(y)
return(y);
See Fig. 4 for an example. What would next-larger(46) return?
Figure 4: next-larger(x) ... | https://ocw.mit.edu/courses/6-006-introduction-to-algorithms-spring-2008/26f81dc853b4980d8c0873c0f8875268_lec3.pdf |
§ 10. Binary hypothesis testing
10.1 Binary Hypothesis Testing
Two possible distributions on a space X
H0 ∶ X ∼ P
H1 X Q
∼
∶
Where under hypothesis H0 (the null hypothesis)
is distributed according to P , and under H1
(the alternative hypothesis) X is distributed according to Q. A test between two distributions
chooses... | https://ocw.mit.edu/courses/6-441-information-theory-spring-2016/26fd180f40b6773bf19b659a4c5e8656_MIT6_441S16_chapter_10.pdf |
π , π , π
}
∼
.
0∣0
0∣1
1∣0
1 1
∣
So for any test P
test”
Z∣X there is an associated
(α, β). There are a few ways to determine the “best
• Bayesian: Assume prior distributions P[H0
] = π0 and P[H1
] = π1, minimize the expected error
∗ =
Pb min
tests
+
π0π1 0 π1π0 1
∣
∣
112
• Minimax: Assume there is a prior distributi... | https://ocw.mit.edu/courses/6-441-information-theory-spring-2016/26fd180f40b6773bf19b659a4c5e8656_MIT6_441S16_chapter_10.pdf |
(
P, Q (HW).
)
1. R(P, Q) is a closed, convex
subset
of [0, 1]2.
2. R(P, Q) contains the diagonal.
1Recall that P is mutually singular w.r.t. Q, denoted by P ⊥ Q, if P [E] = 0 and Q[E] = 1 for some E.
113
R(P,Q)ββα(P,Q)α3. Symmetry: (α, β
(
) ∈ R P, Q
) ⇔
(
1 α, 1 β
−
−
)
∈ R(
)
P, Q .
Pr
oof.
)
1. For convexity, supp... | https://ocw.mit.edu/courses/6-441-information-theory-spring-2016/26fd180f40b6773bf19b659a4c5e8656_MIT6_441S16_chapter_10.pdf |
If (α, β
) ∈ R(P, Q), then form the test that
P
whenev
er PZ∣X choses Q, and chooses
Q whenever PZ∣X choses P , which gives 1 α, 1 β) ∈ R(
(
P, Q).
c
ho
−
oses
−
The region R(P, Q) consists of the operating points of all randomized tests, which include
deterministic tests as special cases. The achievable region of dete... | https://ocw.mit.edu/courses/6-441-information-theory-spring-2016/26fd180f40b6773bf19b659a4c5e8656_MIT6_441S16_chapter_10.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.