text
stringlengths
30
4k
source
stringlengths
60
201
� : P1 → X defined by (cid:18) s2 − t2 s2 + t2 (cid:19) (cid:18) : 1 = 1 : 2st s2 + t2 ϕ−1(s : t) = : 2st s2 − t2 : s2 + t2 s2 − t2 (cid:19) which can also be written as ϕ−1(s : t) = (s2 − t2 : 2st : s2 + t2). 1 ◦ ϕ−1 and The map ϕ−1 is regular everywhere, hence a morphism, and the compositions ϕ ϕ− ◦ ϕ are both the ide...
https://ocw.mit.edu/courses/18-782-introduction-to-arithmetic-geometry-fall-2013/194e47df6e1f016ee3fb2719abe7e8d3_MIT18_782F13_lec15.pdf
Topic 3 Notes Jeremy Orloff 3 Line integrals and Cauchy’s theorem 3.1 Introduction The basic theme here is that complex line integrals will mirror much of what we’ve seen for multi- variable calculus line integrals. But, just like working with is easier than working with sine and cosine, complex line integrals are ea...
https://ocw.mit.edu/courses/18-04-complex-variables-with-applications-spring-2018/1968cab6de7c96ead1c83001459a007b_MIT18_04S18_topic3.pdf
TEGRALS AND CAUCHY’S THEOREM 2 so the right hand side of this equation is That is, it is exactly the same as the expression in Equation 1a. (()) ′() . ∫ 2 along the straight line from 0 to 1 + . Example 3.1. Compute ∫ Solution: We parametrize the curve as () = (1 + ) with 0 ≤ ≤ 1. So ′() = 1 + . The line inte...
https://ocw.mit.edu/courses/18-04-complex-variables-with-applications-spring-2018/1968cab6de7c96ead1c83001459a007b_MIT18_04S18_topic3.pdf
Theorem 3.5. (Fundamental theorem of complex line integrals) If () is a complex analytic func- tion on an open region and is a curve in from 0 to 1 then ′() = ( 1) − ( 0). ∫ 3 LINE INTEGRALS AND CAUCHY’S THEOREM 3 Proof. This is an application of the chain rule. We have (()) = ′(()) ′(). So ′() = ∫ ′...
https://ocw.mit.edu/courses/18-04-complex-variables-with-applications-spring-2018/1968cab6de7c96ead1c83001459a007b_MIT18_04S18_topic3.pdf
. More precisely, if () is defined on a region then ∫ in , if it has the same value for any two paths in with the same endpoints. () is path independent The following theorem follows directly from the fundamental theorem. The proof uses the same argument as Example 3.7. Theorem 3.8. If () has an antiderivative in ...
https://ocw.mit.edu/courses/18-04-complex-variables-with-applications-spring-2018/1968cab6de7c96ead1c83001459a007b_MIT18_04S18_topic3.pdf
= 0. So, () = 0 for any closed curve. Consider the two curves 2 shown 1. By the assumption that integrals over closed paths are 0 and end at 1 and () = ∫ 2 ∫ 1 () . That is, any two paths from are path independent. 0 to 1 have the same line integral. This shows that the line integrals Figure (i) Figure...
https://ocw.mit.edu/courses/18-04-complex-variables-with-applications-spring-2018/1968cab6de7c96ead1c83001459a007b_MIT18_04S18_topic3.pdf
we could use log() if we were careful to let the argument increase by 2 as it went around the origin once. Example 3.12. Compute ∫ (i) Using the fundamental theorem. 1 2 , where is the unit circle in two ways. (ii) Directly from the definition. Solution: (i) Let () = −1∕. Since ′() = 1∕2, the fundamental theorem...
https://ocw.mit.edu/courses/18-04-complex-variables-with-applications-spring-2018/1968cab6de7c96ead1c83001459a007b_MIT18_04S18_topic3.pdf
flavor to the proof of Green’s theorem. Let be the region inside the curve. And write = + . Now we write out the integral as follows () = ∫ ( + ) ( + ) = ∫ ( − ) + ( + ). ∫ Let’s apply Green’s theorem to the real and imaginary pieces separately. First the real piece: − = ∫ We get 0 because the Cauchy-Riemann e...
https://ocw.mit.edu/courses/18-04-complex-variables-with-applications-spring-2018/1968cab6de7c96ead1c83001459a007b_MIT18_04S18_topic3.pdf
i′) we would need a more technically precise definition of simply connected so we could say that all closed curves within can be continuously deformed to each other. 3 LINE INTEGRALS AND CAUCHY’S THEOREM 7 For reference, we note that using the path () = () + (), with (0) = 0 and () = we have () = ∫...
https://ocw.mit.edu/courses/18-04-complex-variables-with-applications-spring-2018/1968cab6de7c96ead1c83001459a007b_MIT18_04S18_topic3.pdf
Az0zz+hz+ihCCxCy 3 LINE INTEGRALS AND CAUCHY’S THEOREM Similarly, we get (remember: = + , so = ) ∫ 1 = lim ℎ→0 ( + ℎ) − () ℎ = lim ℎ→0 () ℎ ∫ 0 ℎ (, + ) + (, + ) ℎ = lim ℎ→0 = (, ) + (, ) = (). Together Equations 5 and 6 show () = 1 = By Equation 2a we have shown that is analyti...
https://ocw.mit.edu/courses/18-04-complex-variables-with-applications-spring-2018/1968cab6de7c96ead1c83001459a007b_MIT18_04S18_topic3.pdf
and − 3 cancel, which leaves ∫ () = 0. QED 1− 2 Note. This clearly implies ∫ Example 3.15. Let () = 1∕. () is defined and analytic on the punctured plane. () = ∫ () . 1 2 Punctured plane: − {0} Question: What values can ∫ the plane? Solution: We have two cases (i) 1 not around 0, and (ii) 2 around 0 () t...
https://ocw.mit.edu/courses/18-04-complex-variables-with-applications-spring-2018/1968cab6de7c96ead1c83001459a007b_MIT18_04S18_topic3.pdf
3.16. A further extension: using the same trick of cutting the region by curves to make it simply connected we can show that if is analytic in the region shown below then ∫ 1− 2− 3− 4 () = 0. That is, 1 − 2 − 3 − 4 is the boundary of the region . Orientation. It is important to get the orientation of the curve...
https://ocw.mit.edu/courses/18-04-complex-variables-with-applications-spring-2018/1968cab6de7c96ead1c83001459a007b_MIT18_04S18_topic3.pdf
18.782 Introduction to Arithmetic Geometry Lecture #10 Fall 2013 10/8/2013 In this lecture we lay the groundwork needed to prove the Hasse-Minkowski theorem for Q, which states that a quadratic form over Q represents 0 if and only if it represents 0 over every completion of Q (as proved by Minkowski). The statement sti...
https://ocw.mit.edu/courses/18-782-introduction-to-arithmetic-geometry-fall-2013/196f7a627ae6d75ab009bbef96e7c8c9_MIT18_782F13_lec10.pdf
We say that a solution (x0, . . . , xn) to a homogeneous polynomial equation over Qp is p . The following lemma primitive if all of its elements lie in Zp and at least one lies in Z× gives several equivalent definitions of the Hilbert symbol. Lemma 10.2. For any a, b ∈ Q× p , the following are equivalent: (i) (a, b)p = ...
https://ocw.mit.edu/courses/18-782-introduction-to-arithmetic-geometry-fall-2013/196f7a627ae6d75ab009bbef96e7c8c9_MIT18_782F13_lec10.pdf
10.3. For all a, b, c ∈ Q× p , the following hold: (i) (1, c)p = 1. (ii) (−c, c)p = 1. (iii) (a, c)p = 1 =⇒ (a, c)p(b, c)p = (ab, c)p. (iv) (c, c)p = (−1, c)p. c) to Qp. For (i) we have N (1) = 1. For (ii), Proof. Let N denote the norm map from Qp( −c = N (−c) for c ∈ Q×2 and −c = N ( c) otherwise. For (iii), If a and ...
https://ocw.mit.edu/courses/18-782-introduction-to-arithmetic-geometry-fall-2013/196f7a627ae6d75ab009bbef96e7c8c9_MIT18_782F13_lec10.pdf
(u, v)p = 1 for all u, v ∈ Z× p . Proof. Recall from Lecture 3 (or the Chevalley-Warning theorem on problem set 2) that every plane projective conic over Fp has a rational point, so we can find a non-trivial solution to z2 − ux2 − vy2 = 0 modulo p. If we then fix two of x, y, z so that the third is nonzero, Hensel’s lemm...
https://ocw.mit.edu/courses/18-782-introduction-to-arithmetic-geometry-fall-2013/196f7a627ae6d75ab009bbef96e7c8c9_MIT18_782F13_lec10.pdf
If v is not a square then z2 − px2 − vy2 = 0 has no non- trivial solutions modulo p, hence no primitive solutions. This implies (cid:17) (cid:16) = −1 = ( ).p p−1 p p v Case α = 1, β = 1: We must show (pu, pv) p = (−1) 2 . Applying Corol- (p, v)p (cid:17) v p (cid:16) u p lary 10.3 we have (pu, pv)p = (pu, pv)p(−pv, pv...
https://ocw.mit.edu/courses/18-782-introduction-to-arithmetic-geometry-fall-2013/196f7a627ae6d75ab009bbef96e7c8c9_MIT18_782F13_lec10.pdf
strong form of Hensel’s lemma proved in Problem Set 4. In both cases, if we have a non-trivial solution (x0, y0, z0) modulo 8 we can fix two of x0, y0, z0 to obtain a quadratic polynomial f (w) over Z2 and w0 ∈ Z× 2 that satisfies v2(f (w0)) = 3 > 2 = 2v2(f (cid:48)(w0)). In the case of the second equation, note that a p...
https://ocw.mit.edu/courses/18-782-introduction-to-arithmetic-geometry-fall-2013/196f7a627ae6d75ab009bbef96e7c8c9_MIT18_782F13_lec10.pdf
where one of a, b lies in Z× p . By Lemma 10.8, to compute (a, b)2 with one of a, b in Z×, it suffices to check for primitive solutions to z2 − ax2 − by = 0 modulo 8, which reduces the problem to a finite verification which performed by (cid:58)(cid:82)(cid:85)(cid:78)(cid:86)(cid:75)(cid:72)(cid:72)(cid:87)(cid:17) (cid:2...
https://ocw.mit.edu/courses/18-782-introduction-to-arithmetic-geometry-fall-2013/196f7a627ae6d75ab009bbef96e7c8c9_MIT18_782F13_lec10.pdf
c) p(b, c)p = ε w p γ (cid:19) (cid:18) γ (cid:18) α u p (cid:18) uv p (cid:19) (cid:19) (cid:18) γ (cid:19) β w p (cid:18) v p α+β (cid:19) α ε β (cid:19) (cid:18) w p = εα+β = (ab, c) . p To verify non-degeneracy, we note that if c is not square than either γ = 1 or ( w ) =p −1. If γ = 1 we can choose b = v with ( v ...
https://ocw.mit.edu/courses/18-782-introduction-to-arithmetic-geometry-fall-2013/196f7a627ae6d75ab009bbef96e7c8c9_MIT18_782F13_lec10.pdf
1(0) in (Z/4Z)× is {1}, a subgroup of index 2, and the image of ω−1(0) in (Z/8Z)× is {±1}, which is again a subgroup of index 2. We now verify non-degeneracy for p = 2. If c is not square then either γ = 1, or one of (cid:15)(w) and ω(w) is nonzero. If γ = 1, then (5, c)2 = −1. If γ = 0 and ω(w) = 1, then (2, c)2 = −1....
https://ocw.mit.edu/courses/18-782-introduction-to-arithmetic-geometry-fall-2013/196f7a627ae6d75ab009bbef96e7c8c9_MIT18_782F13_lec10.pdf
= (−1, 1) − 2 = −1 and (−1, −1)p = 1 for p odd. Case 2: a = −1 and b is prime. If b = 2 then (1, 1) is a solution to −x2 + 2y2 = 1 (cid:54)∈ {2, b}, while p(−1, 2) = 1. If b is odd, then ( −1, b)p = 1 for p (cid:81) ∞ and (−1, b)b = ( − ), both of which are equal to ( −1) − /2. (b 1) 1 b Case 3: a and b are the same pr...
https://ocw.mit.edu/courses/18-782-introduction-to-arithmetic-geometry-fall-2013/196f7a627ae6d75ab009bbef96e7c8c9_MIT18_782F13_lec10.pdf
MIT OpenCourseWare http://ocw.mit.edu 18.727 Topics in Algebraic Geometry: Algebraic Surfaces Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. ALGEBRAIC SURFACES, LECTURE 2 LECTURES: ABHINAV KUMAR Remark. In the definition of (L, M ) we wrote M = OX (...
https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/198274c0c471d31fc05d600e28e403db_lect2.pdf
.t. E| = C and E| = D. We say C ∼alg D. · We say C is numerically equivalent to D, C ≡ D, if C E = D E for every t1 t2 · divisor E on X. We have an intersection pairing Div X × Div X → Z which factors through Pic X × Pic X → Z, which shows that linear equivalence = ⇒ num equivalence. alg equivalence (map to P1 d...
https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/198274c0c471d31fc05d600e28e403db_lect2.pdf
⊗ OC = OX (−C)|C ⊗ ΩC or KC = (KX + C)|C so deg KC = 2g(C) − 2 = C.(C + K) (genus formula). Note: C 2 = deg (OX (C) ⊗ OC ) by definition. I/I 2 is the conormal bundle, and is ∼ O(−C) ⊗ OC , while NC/X is the normal bundle ∼= O(C) ⊗ OC . Theorem 1 (Riemann-Roch). χ(L) = χ(OX ) + 1 2 (L2 − L ωX ). = · Proof. L−1 · L ...
https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/198274c0c471d31fc05d600e28e403db_lect2.pdf
]. 12 12 1 Remark. If H is ample on X, then for any curve C on X, we have C H > 0 (equals n (degree of C in embedding by nH) for larger n). 1.2. Hodge Index Theorem. · · Lemma 1. Let D1, D2 be two divisors on X s.t. h0(X, D2) = 0 h0(X, D1 + D2). . Then h0(X, D1) ≤ Proof. Let a = 0 H0(X, D1 + D2) is injective....
https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/198274c0c471d31fc05d600e28e403db_lect2.pdf
). Similarly, (otherwise h0(nD) = 0 gives h0(nD) can’t go to ∞ both as n → ∞ and as n → −∞. Similarly for h0(K −nD). � Finally, note that h0(nD) �= 0 implies (nD · H) > 0 and so D · H > 0. Corollary 1. If D is a divisor on X and H is a hyperplane section on X s.t. (D · H) = 0 then D2 ≤ 0 and D2 = 0 ⇔ D ≡ 0. Proo...
https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/198274c0c471d31fc05d600e28e403db_lect2.pdf
M = NumX ⊗Z R. This is a finite dimensional vector space over R of dimension ρ (the Picard number) and signature (1, ρ − 1). Proof. Embed this in �-adic cohomology H 2(X, Q�(1)) which is finite dimen­ sional, and C.D equals C ∪ D under (4) H 2(X, Q�(1)) × H 2(X, Q�(1)) → H 4(X, Q�(2)) ∼= Q� The map NumX � C → [C] ∈ ...
https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/198274c0c471d31fc05d600e28e403db_lect2.pdf
number of L · M to be the coefficient of n1 · n2 in χ(Ln1 ⊗ Mn2 ) (check that this is bilinear, etc., and that it coincides with the previous definition). is easy. For the converse, χ(Ln) → ∞ ⇒ Proof. Sketch when X is projective. = as n → ∞ (Riemann-Roch, or by defn). Replace L by Ln to assume L = OX (D), D effectiv...
https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/198274c0c471d31fc05d600e28e403db_lect2.pdf
else ∃C ⊂ X with f (C) = � = ⇒ C · L = 0, a contradiction). � OPk (1) is ample =⇒ Ln is ample =⇒ L is ample. = 4 LECTURES: ABHINAV KUMAR → = 1.4. Blowups. Let X be a smooth surface, p a point on X. The blowup X˜ π X→ at p is a smooth surface s.t. X˜ � π−1(p) X � {p} is an isomorphism and π−1(p) is a curve ∼ ...
https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/198274c0c471d31fc05d600e28e403db_lect2.pdf
The normal bundle NE/ X˜ is OE (−1). Note: this is a specific case of a more general fact (Hartshorne 8.24). For Y ⊂ X a closed subscheme with corresponding ideal sheaf I, blow up X along Y to get the projective bundle Y � � Y given by P(I/I 2), and overall blowup → I d , OX˜ (1) = I˜ = π−1IO X˜ X˜ = Proj (7) I...
https://ocw.mit.edu/courses/18-727-topics-in-algebraic-geometry-algebraic-surfaces-spring-2008/198274c0c471d31fc05d600e28e403db_lect2.pdf
8.04: Quantum Mechanics Massachusetts Institute of Technology Professor Allan Adams 2013 February 12 Lecture 3 The Wavefunction Assigned Reading: E&R 16,7, 21,2,3,4,5, 3all NOT 4all!!! 1all, 23,5,6 NOT 2-4!!! Li. 12,3,4 NOT 1-5!!! Ga. 3 Sh. In classical mechanics, the configuration or state of a system i...
https://ocw.mit.edu/courses/8-04-quantum-physics-i-spring-2013/19862abcdf8e4f7cf1321d060cd6dd7c_MIT8_04S13_Lec03.pdf
drawn for simplicity, as complex-plane paper is hard to find. Furthermore, ψ must be singly-valued and not “stupid”; the latter point will be elaborated later. Let us examine this set of examples in further detail. The first wavefunction ψ1 is sharply peaked at a particular value of x, and the probability density, be...
https://ocw.mit.edu/courses/8-04-quantum-physics-i-spring-2013/19862abcdf8e4f7cf1321d060cd6dd7c_MIT8_04S13_Lec03.pdf
lot of sense to think of a sinusoidal wave as being localized in some place. Indeed, the positions for these two wave- functions are ill-defined, so they are not well-localized, and the uncertainty in the position is large in each case. 8.04: Lecture 3 3 The fifth wavefunction is multiply-valued, so it is considere...
https://ocw.mit.edu/courses/8-04-quantum-physics-i-spring-2013/19862abcdf8e4f7cf1321d060cd6dd7c_MIT8_04S13_Lec03.pdf
with small uncertainties in their respective momenta, with ψ4 having a smaller wavelength and therefore a larger momentum than ψ3. On the other hand, ψ1 and ψ2 do not look like sinusoidal waves, so it is difficult to define a wavelength and therefore a momentum for each, and the respective momentum uncertainties are l...
https://ocw.mit.edu/courses/8-04-quantum-physics-i-spring-2013/19862abcdf8e4f7cf1321d060cd6dd7c_MIT8_04S13_Lec03.pdf
and ψb, the system could also be in a superposition ψ = αψa + βψb with α and β as arbitrary complex coefficients satisfying normalization. This forms the soul of quantum mechanics! Note that for a superposition state the probability density ψ(x) = αψa(x) + βψb(x), p(x) = |αψa(x) + βψb(x)|2 = |αψa(x)|2 + |βψb(x)|2 ...
https://ocw.mit.edu/courses/8-04-quantum-physics-i-spring-2013/19862abcdf8e4f7cf1321d060cd6dd7c_MIT8_04S13_Lec03.pdf
though, the probability density will exhibit interference because the product of the two wavefunctions is not always zero as they are both sinusoidal waves. Note for the example of ψ5 that this superposition state has more spatial localization than each of the component sinusoidal wavefunctions. This spatial locali...
https://ocw.mit.edu/courses/8-04-quantum-physics-i-spring-2013/19862abcdf8e4f7cf1321d060cd6dd7c_MIT8_04S13_Lec03.pdf
of the Fourier expansion coefficients αj = (cid:90) π 1 2π −π f (x)e −ikj x dx. (0.7) The physical interpretation of this is that any wavefunction ψ(x) can be expressed as a superposition of states eikx with definite momenta p = k as ψ(x) = √1 ∞ 2π −∞ ˜ ψ(k)e ikx dk. (0.8) Furthermore, ψ˜(k) gives the exact ...
https://ocw.mit.edu/courses/8-04-quantum-physics-i-spring-2013/19862abcdf8e4f7cf1321d060cd6dd7c_MIT8_04S13_Lec03.pdf
vein, aside from normalization, ψ5 and ψ6 are Fourier transforms of each other. This means that a wavefunction that is well-localized around a given position has a Fourier transform that looks like a sinusoidal function of k, and the frequency of oscillation as a function of k is given by that position. Similarly, a...
https://ocw.mit.edu/courses/8-04-quantum-physics-i-spring-2013/19862abcdf8e4f7cf1321d060cd6dd7c_MIT8_04S13_Lec03.pdf
3.15: Transistors in ‘forward active’ mode Common base circuit E B C Input IE,VEB Output IE,VCB IC,mA 5 0 _ IE = 5mA 3mA 1 mA IE = 0 0 + _VcB Figure by MIT OCW. This is the easiest to visualize, though of limited usefulness. We use one power supply to put EB into forward bias (p side positive) and another one to put...
https://ocw.mit.edu/courses/3-15-electrical-optical-magnetic-materials-and-devices-fall-2006/1996e5617f952ee322c739d9e24f4ff9_lecture7b.pdf
IB between the base and the emitter. The polarity is chosen so that EB is in forward bias. We connect another power supply between E and C (this is chosen to make sure BC is in reverse bias). The base current IB is primarily composed of electrons that contribute to the forward current through EB. In the EB junction, ...
https://ocw.mit.edu/courses/3-15-electrical-optical-magnetic-materials-and-devices-fall-2006/1996e5617f952ee322c739d9e24f4ff9_lecture7b.pdf
LECTURE 11 LECTURE OUTLINE Review of convex progr. duality/counterexamples Fenchel Duality • • Conic Duality • Reading: Sections 5.3.1-5.3.6 Line of analysis so far: Convex analysis (rel. int., dir. of recession, hy- • perplanes, conjugacy) MC/MC - Three general theorems: Strong dual- • ity, existence of dual optimal s...
https://ocw.mit.edu/courses/6-253-convex-analysis-and-optimization-spring-2012/19c72f4d87303765c3925112f5926282_MIT6_253S12_lec11.pdf
there exists a dual optimal solution. ⌘ ⌘ (b) f ⇤ = q⇤, and (x⇤, µ⇤, ⌃⇤) are a primal and dual optimal solution pair if and only if x⇤ is feasible, µ⇤ ≥ x⇤ arg min L(x, µ⇤, ⌃⇤), µ⇤j gj(x⇤) = 0, 0, and ⌘ x X ⌦ j  2 COUNTEREXAMPLE I Strong Duality Counterexample: Consider • minimize f (x) = e− subject to x1 = 0,  x1x2 ...
https://ocw.mit.edu/courses/6-253-convex-analysis-and-optimization-spring-2012/19c72f4d87303765c3925112f5926282_MIT6_253S12_lec11.pdf
1 0.8 0.6 0.4 0.2 0 0 √x1x2 e− 5 10 15 x1 = u 5 10 x2 20 0 20 15 Connection with counterexample for preserva- • tion of closedness under partial minimization. 4 COUNTEREXAMPLE II Existence of Solutions Counterexample: , f (x) = x, g(x) = x2. Then x⇤ = 0 is • Let X = the only feasible/optimal solution, and we have � q(µ...
https://ocw.mit.edu/courses/6-253-convex-analysis-and-optimization-spring-2012/19c72f4d87303765c3925112f5926282_MIT6_253S12_lec11.pdf
+ f2(x2) + ⌥⇧(x2 x1) − ⌥⇧x1 ⇤ + inf x2⌥ n 2(x2) + ⌥⇧x2 f − ⇤ ⌅ Dual problem: max ⌅ {− min⌅{− q(⌃) or } • − f (⌃) 1 ⇤ − f 2 ( ⌃) } − ⌅ = 1 (⌃) +f f 2 ( minimize n, subject to ⌃ ⌘ � ⌃) − where f 1 and f 2 are the conjugates. 6◆ ◆ • FENCHEL DUALITY THEOREM Consider the Fenchel framework: (a) If f ⇤ is finite and ri ...
https://ocw.mit.edu/courses/6-253-convex-analysis-and-optimization-spring-2012/19c72f4d87303765c3925112f5926282_MIT6_253S12_lec11.pdf
✓ GEOMETRIC INTERPRETATION f 1 () q() f 2 ( ) f = q f1(x) Slope Slope f2(x) x x When dom(f1) = dom(f2) = n, and f1 and • f2 are differentiable, the optimality condition is equivalent to � ⌃⇤ = ∇ f1(x⇤) = −∇ f2(x⇤) By reversing the roles of the (symmetric) primal • and dual problems, we obtain alternative criteria f...
https://ocw.mit.edu/courses/6-253-convex-analysis-and-optimization-spring-2012/19c72f4d87303765c3925112f5926282_MIT6_253S12_lec11.pdf
x ⌥ ⇤ where C ⇤ = ⇤⇧x − f (x) ⌅ , f ⌥ 2 (⇤) = sup ⇤⇧x = x C ⌥ 0 ⇧ if ⇤ if ⇤ C⇥, ⌃ / C , ⇥ ⌃ � ⌃ ⌃�x ⌥ { The dual problem is | 0, x C . } ⌘  • • minimize subject to ⌃ f (⌃) ˆ C, ⌘ where f is the conjugate of f and Cˆ = ⌃ { | ⌃�x 0, x C . } ⌘  ≥ Cˆ and − ˆ C are called the dual and polar cones. 10◆ CONIC DUALITY THEO...
https://ocw.mit.edu/courses/6-253-convex-analysis-and-optimization-spring-2012/19c72f4d87303765c3925112f5926282_MIT6_253S12_lec11.pdf
b c)�x = sup(⌃ c)�(y + b) = ⌦ − (⌃ � ⇣ c)�b − if ⌃ if ⌃ y S − ⌦ c ⌘ c / ⌘ S⊥, S. − − Dual problem is equivalent to minimize b�⌃ subject to ⌃ c S , − ⌘ ⊥ ⌃ C.ˆ ⌘ If X ri(C) =Ø, there is no duality gap an d • there exists a dual optimal solution. ⌫ 12 ANOTHER APPROACH TO DUALITY Consider the problem • minimize f (x) subj...
https://ocw.mit.edu/courses/6-253-convex-analysis-and-optimization-spring-2012/19c72f4d87303765c3925112f5926282_MIT6_253S12_lec11.pdf
Lecture 8 Symmetries, conserved quantities, and the labeling of states Angular Momentum Today’s Program: 1. Symmetries and conserved quantities – labeling of states 2. Ehrenfest Theorem – the greatest theorem of all times (in Prof. Anikeeva’s opinion) 3. Angular momentum in QM 4. Finding the eigenfunctions of Lˆ...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
operation on it and then compare the result to the initial situation they are indistinguishable.�When one speaks of a symmetry it is critical to state symmetric with respect to which operation. How do symmetries manifest themselves in equations?�Let us suppose that your system is symmetric with respect to translati...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
�t   Aˆ, Hˆ       0  d dt ˆ A  0 States are labeled by specific values of their properties, which do not change with time – these properties are called constants of motion. We learned that in QM physical properties are represented by operators and that the values of properties obtained in measuremen...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
    t This type of differential equation is separable, i.e. we can look for a solution in the following   r, t form:    V    t . Let’s substitute it into the Schrodinger’s equation above: r r   t  i   r  t t   r     2     2m 1 r   2      ...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
�� t    E t  t  e i E  d dt II  2      2m  2 V   r     r  E r   uE    x , E Then the solutions to time-dependent Schrodinger’s equation will have a form: E   r, t   uE  r E  t  uE t E  i  r  e In general, since the Hamiltonian may have many e...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
� at any time!  r, t 3 Conserved Quantities Example I: Particle in free space Labeling of states is particularly important when the energy eigenvalues are degenerate such as in the case of the particle in free space: Hˆ x  E x      2 2 2m x2      E   uE     x  ...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
uE,k    eikx x 2mE 2  In fact we represent all the eigenfunctions (eigenstates) of the free space Hamiltonian and the momentum on the E vs k plot. Every point on this plot uniquely and completely specifies the state. 4 Conserved Quantities Example II: Parity operator and symmetric potentials ...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
�2 2  x  x  0  This means that one can always find a set of eigenfunctions common to Hˆ and ˆ . In fact, last lecture we have shown that SHO eigenfunctions are always even or odd. 1 2 1 2  m2 x  x    2   5 Conserved Quantities Example II: Angular momentum...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
r   p   iˆ x x p x iˆ y y p y z iˆ z  iˆ yp  zp   iˆ zp  xp   iˆ xp  yp   iˆ L  iˆ L  iˆ L p y x x z y y y x x y x z z z z z In quantum mechanics we can define a corresponding observable (Hermitian operator):    ˆ  rˆ  pˆ  L iˆ x x iˆ y y iˆ z z i  x i  y i  ...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
y    x  While Descartes’s coordinate system allows us to intuitively derive the components of the angular momentum operator, the spherical symmetry of the problem makes it more logical to move to the spherical coordinate system: x  r sin cos y  r sin sin z  r cos 6 In spherical co...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
since it has a classical equivalent. If one looks at the commutation relations of this operator one finds: Lˆ Lˆ   x, y   iLˆ Lˆ Lˆ   y, z   iLˆ Lˆ , Lˆ   iLˆ   z x x y z Note: In QM there is another very important quantity, which is called spin. It turns out that this quantity also obeys th...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
��! Pl cos e im , m  0 2l 1 l  m! m 4 l  m! Pl cos e im , m  0 Since the wave function needs to be continuous at 2 , m is an integer. One can show that l also needs to be an integer and that −l≤m≤l. l ≥ 0. Pl cos are Legendre polynomials and the m eigenfunctions Yl , are called spherica...
https://ocw.mit.edu/courses/3-024-electronic-optical-and-magnetic-properties-of-materials-spring-2013/19da8ffb4044af736d595f30eebe310d_MIT3_024S13_2012lec8.pdf
Representation Invariants 6.170, Lecture 8 Fall 2005 8.1 Context What you’ll learn: How to find representation invariants and avoid representation exposure. Why you should learn this: An understanding of the theory of abstract types helps you avoid whole classes of nasty, subtle bugs – or at minimum alerts you to thei...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
will suffice to view it simply as a mathematical value. The space of abstract values consists of the values that the type is designed to support. These are a figment of our imagination. They’re platonic entities that don’t exist as described, but they are the way we want to view the elements of the abstract type, as cl...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
(!member(ch)) s.append(ch); } public void remove(char ch) { int index = s.indexOf(String.valueOf(ch)); if (index>=0) { s.deleteCharAt(index); } } public boolean member(char ch) { return s.indexOf(String.valueOf(ch))!=-1; } } This works just fine. What are the rep values and the abstract values of this type? The abstr...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
’t check for duplicates, so there is no constraint on s. The remove method needs to be changed to dovetail with the new add behavior. We can look at the rep (R) and abstract (A) value spaces for the two implementations graphi­ cally, drawing arcs from each rep value to the abstract value it represents: First impleme...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
3 an interpretation for all rep values. A doubly-linked list representation, for example, can be twisted into all kinds of pretzel configurations that won’t correspond to simple sequences, and for which we won’t want to write special cases in the code. Or sometimes we will want to impose certain properties on the re...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
us whether a given rep value is well-formed. Alternatively, you can think of RI as a set: it’s the subset of rep values on which AF is defined. We will look at abstraction functions next day. Today, let’s look at the rep invariant, RI. For our first implementation of CharSet, it was: RI(r) = r.s != null && r.s cont...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
). We would like to write a rep invariante RI that is always true for our chosen representation: all tree: BTree | RI(tree) We can write RI recursively as: RI(tree) = (tree.root!=null) => (tree.root.parent = null && RI(tree,tree.root)) RI(tree,node) = ((node.left!=null) => (node.left!=node.right)) && ((node.left!=n...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
produces one that also satisfies it. Now we can argue that every object of the type satisfies the rep invariant, since it must have been produced by a constructor and some sequence of mutator or producer applications. Rep invariants can often be translated to code, and used to periodically check whether an object is ...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
(3) the representation of the type is never exposed, then the invariant is true of all instances of the abstract data type. Notice the caveat about the representation being exposed (called rep exposure). How can this happen? 8.6 Rep Exposure The notion of rep invariants that we have espoused offers a systematic me...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
to a mutable object is passed in and made part of the rep, despite being accessible as an existing reference from the outside. • when a reference to a mutable object in the rep is returned as the result of an operation. Consider the following class representing an interval of time between two Dates: public class In...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
example of rep exposure can occur when a method returns a collection. When the representation already contains a collection object of the appropriate type, it is quite tempting to return it directly. For example, in Java Lists must have a method toArray() that returns an array of elements corresponding to the elemen...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
{ return list.iterator(); } Unfortunately, this too is a rep exposure! The Iterator interface in Java includes an optional remove operation that allows the client to remove elements from the underlying collection. ArrayList implements this operation, so the result of this method is an iterator object that can actual...
https://ocw.mit.edu/courses/6-170-laboratory-in-software-engineering-fall-2005/1a1f80fa85176ed3cae09ccd74f902d3_lec8.pdf
White blood cell (e.g., neutrophil) scavenging: rolling, adhesion, and extravasation © John Wiley & Sons, Inc. All rights reserved. This content is excluded from our Creative Commons license. For more information, see http://ocw.mit.edu/help/faq-fair-use/. Source: Man, Shumei, Eroboghene E. Ubogu, and Richard M. Ran...
https://ocw.mit.edu/courses/20-430j-fields-forces-and-flows-in-biological-systems-fall-2015/1a2b50cdc52990a6dac50a4591a53a61_MIT20_430JF15_Lecture19.pdf
Biophysical Journal 56, no. 1 (1989): 151. 4 Chondrocytes are more like elastic spheres Hochmuth 2000 Courtesy of Elsevier, Inc., http://www.sciencedirect.com. Used with permission. Source: Hochmuth, Robert M. "Micropipette aspiration of living cells." Journal of Biomechanics 33, no. 1 (2000): 15-22. 5 Com...
https://ocw.mit.edu/courses/20-430j-fields-forces-and-flows-in-biological-systems-fall-2015/1a2b50cdc52990a6dac50a4591a53a61_MIT20_430JF15_Lecture19.pdf
19:45 © Education Development Center, Inc. All rights reserved. This content is excluded from our Creative Commons license. For more information, see http://ocw.mit.edu/help/faq-fair-use/. 12 Drag on spherical versus slender bodies © source unknown. All rights reserved. This content is excluded from our Creative C...
https://ocw.mit.edu/courses/20-430j-fields-forces-and-flows-in-biological-systems-fall-2015/1a2b50cdc52990a6dac50a4591a53a61_MIT20_430JF15_Lecture19.pdf
6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 2014 Prof. Erik Demaine Lecture 5 Scribe Notes 1 Overview We’ll start this week with a few more examples of classic Nintendo games, most of which are hard via reductions from 3SAT or a variant. Then, we’ll look at a few more puzzles, including one who...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
It’s called Push-Once: not only can you only push one block at a time, but you can only push a block once. The lock mechanism from Push-1 can be modified for a Push-Once environment, so Push-Once is also hard.) Figure 1: The modification of the Push-1 lock to the Push-Once lock prevents Link from pushing a block mo...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
paper for more details! Figure 3: The clause gadget allows Samus to come through one of the tunnels below the monsters and shoot up to kill them. However, if she came from the top path, then there is nothing she could do because she can’t shoot down. The cross over gadget allows her to either come from the left or ...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
weak trainers and always loses against strong trainers. Trainers you’ve beaten (all weak trainers, of course) act as obstacles for strong trainers once they’re activated. Satisfying a clause corresponds to activating several barrier trainers, which allow the player to exit all clause gadgets if and only if they’re a...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
Gastly moves first and uses Self Destruct, causing the player to lose (even if it defeats the enemy Snorlax, the opponent holds another one). This implementation only works in Generations I and II since TM36 exists only in Generation I and the Time Capsule feature in Generation II allows a Gastly with Self Destruct...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
the top and bottom. The player makes a series of long horizontal jumps to choose which variables to set to true, and is able to traverse top to bottom if and only if none of the crucial squares have been cleared. Figure 6: Here clauses are traversed by going top to bottom or bottom to top. Variable values are set b...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
, with the rightmost three columns reading: 0 p 0 0 p 0 1 q 0 These three columns force the letter “0” to have the value 0 and the letter “1” to have the value 1. A variable va is considered true if va = 1 (mod 4) and false if va = 0 (mod 4)—the variable gadget 1For the puzzle in Table 1, S = 9, E = 5, N = 6, D ...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
0 hi ti ri 0 gi wi 0 fi 0 ri 0 gi wi 0 fi 0 0 gi 0 si 0 hi xi Table 3: The clause gadget. gi = 2fi hi = 2gi + {0, 1} = 4fi + {0, 1} ti = hi + 1 + {0, 1} = 4fi + 1 + {0, 1, 2} = 4fi + {1, 2, 3} va + vb + vc = ti = {1, 2, 3} (mod 4) This construction can be simplified considerably by instead reducing from 1...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
+ vk + vl − vm − vp, for j, k, l, m, p < i. Since there are only n 5 such quintuples, as long as we have more than n5 numbers it will always be possible to select a vi satisfying this condition. Since the parameters remain polynomial, this construction proves that cryptarithms are strongly NP-hard. 2.9 Star Tessell...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
are the same, we can produce a flat fold. However, if they are all the same, then we can’t produce a flat fold because each fold of the paper is on top of another. Remark: A nice reason to hope for a reduction from Not-All-Equal-3SAT is that “true” and “false” are totally symmetric in origami, and Not-All-Equal-3SA...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
clause pairs, each one corresponding to a “satisfying” path. 11 Figure 13: Clauses are vertical and variables horizontal. This construction can also be carried through even if we require that G be planar by designing crossover gadgets for edges. Crossover gadgets force you to either take one path or the other. ...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
may be absent. • Once the gadgets were constructed properly, there was the issue of fitting them together. But the sizes of the variable gadgets and crossover gadgets were inconsistent—another parity problem! Figure 17: Gadget size parity. 13 • Once the full crossover versions were completed, it was necessary ...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
51. Springer, 2014. [ADO+14] A Adcock, E D Demaine, M P O’Brien, F Reidl, F Sánchez Villaamil, and B D Sullivan. Zig-Zag Numberlink is NP-complete. Under review, 2014. [BH96] Marshall Bern and Barry Hayes. The complexity of flat origami. In Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
] 古妻浩一 and 武永康彦 . ナンバーリンクの NP 完全性と問題の列挙 . 電子情報通信学 会技術研究報告. COMP, コンピュテーション, 109(465):1–7, 2010. [Lyn75] James F Lynch. The equivalence of theorem proving and the interconnection problem. ACM SIGDA Newsletter, 5(3):31–36, 1975. 15 MIT OpenCourseWare http://ocw.mit.edu 6.890 Algorithmic Lower Bounds: Fun with Hard...
https://ocw.mit.edu/courses/6-890-algorithmic-lower-bounds-fun-with-hardness-proofs-fall-2014/1a2ff45b31e8e695010a55eb322a46f9_MIT6_890F14_Lec5.pdf
ESD.86 Random Incidence A Major Source of Selection Bias Richard C. Larson February 21, 2007 Examples (cid:139) Waiting for a bus at 77 Mass. Avenue. – “Clumping” (cid:139) Interview passengers disembarking from an airplane. Doctoral Exam Question (cid:139) You arrive at a bus stop where busses arrive according to ...
https://ocw.mit.edu/courses/esd-86-models-data-and-inference-for-socio-technical-systems-spring-2007/1a54fef489a72a6f19f64f10cabbff4a_lec5.pdf
(x) = fY2 fY(x) = fY1 (x) = ... •If the Yi’s are mutually independent then we have a renewal process. •But the Random Incidence results we are about to obtain do not require that we have a renewal process. The Gap We Fall Into by Random Incidence fW(w)dw=P{length of gap is between w and w+dw} fW(w)dw is proportiona...
https://ocw.mit.edu/courses/esd-86-models-data-and-inference-for-socio-technical-systems-spring-2007/1a54fef489a72a6f19f64f10cabbff4a_lec5.pdf
6 ... W=y4 Key result: E[V] = E[Y]2(1+η2)/(2E[Y]) where η = coefficient of variation of the R.V. Y Let’s Visit Several Examples, Including that Bus Stop Doctoral Exam Question!
https://ocw.mit.edu/courses/esd-86-models-data-and-inference-for-socio-technical-systems-spring-2007/1a54fef489a72a6f19f64f10cabbff4a_lec5.pdf
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Lecture 13 Fall 2018 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a random number of random variables 3. Transforms associated with joint distributions Moment generating functions, and their close relatives (probability gener...
https://ocw.mit.edu/courses/6-436j-fundamentals-of-probability-fall-2018/1a592ed184fb4c444547f67c9bcdd8ec_MIT6_436JF18_lec13.pdf
analysis methods can be brought to bear on probability problems. (h) They provide powerful tools for proving limit theorems, such as laws of large numbers and the central limit theorem. 1 1 MOMENT GENERATING FUNCTIONS 1.1 Definition Definition 1. The moment generating function associated with a random variable X ...
https://ocw.mit.edu/courses/6-436j-fundamentals-of-probability-fall-2018/1a592ed184fb4c444547f67c9bcdd8ec_MIT6_436JF18_lec13.pdf
the values 1, 2, and 3, with probabilities 1/2, 1/3, and 1/6, respectively, then 3s MX (s) = e + e + e , 2s s 1 2 1 3 1 6 (1) which is finite for every s fX (x) = 1/(ˇ(1 + x2)), for all x, it is easily seen that MX (s) = s R. On the other hand, for the Cauchy distribution, , for all = 0. ∞ ∈ In general...
https://ocw.mit.edu/courses/6-436j-fundamentals-of-probability-fall-2018/1a592ed184fb4c444547f67c9bcdd8ec_MIT6_436JF18_lec13.pdf
The various powers esx indicate the possible values of the random variable X, and the associated coefficients provide the corresponding probabilities. At the other extreme, if we are told that MX (s) = for every s is certainly not enough information to determine the distribution of X. ∞ = 0, this On this subject...
https://ocw.mit.edu/courses/6-436j-fundamentals-of-probability-fall-2018/1a592ed184fb4c444547f67c9bcdd8ec_MIT6_436JF18_lec13.pdf
Moment generating properties There is a reason why MX is called a moment generating function. Let us con- sider the derivatives of MX at zero. Assuming for a moment we can interchange the order of integration and differentiation, we obtain dMX (s) | ds dmMX (s) | dsm s=0 s=0 d = E[e ds dm dsm = | sX ] | sX...
https://ocw.mit.edu/courses/6-436j-fundamentals-of-probability-fall-2018/1a592ed184fb4c444547f67c9bcdd8ec_MIT6_436JF18_lec13.pdf
(d) Use the DCT to argue that − ∞ E[X] = E lim h#0 h e hX − h 1 i = lim h#0 E[e hX ] h − 1 . 1.5 The probability generating function For discrete random variables, the following probability generating function is sometimes useful. It is defined by gX (s) = E[s X ], with s usually restricted to positi...
https://ocw.mit.edu/courses/6-436j-fundamentals-of-probability-fall-2018/1a592ed184fb4c444547f67c9bcdd8ec_MIT6_436JF18_lec13.pdf
mpX (m) = E[X]. m1 X 4 1.6 Examples d Example : X = Exp(). Then, MX (s) = 1 0 Z sxe−x dx = e  −s , s < ; , ˆ ∞ otherwise. Example : X = Ge(p) d 1 MX (s) = sm e m=1 X p(1 p)m−1 − ( , ∞ In this case, we also find gX (s) = ps/(1 gX (s) = , otherwise. ∞ se p 1−(1−p)es s...
https://ocw.mit.edu/courses/6-436j-fundamentals-of-probability-fall-2018/1a592ed184fb4c444547f67c9bcdd8ec_MIT6_436JF18_lec13.pdf
(c) Let X and Y be independent random variables. Let Z be equal to X, with probability p, and equal to Y , with probability 1 − p. Then, MZ (s) = pMX (s) + (1 − p)MY (s). Proof: For part (a), we have MX (aX + b) = E[exp(saX + sb)] = exp(sb)E[exp(saX)] = exp(sb)MX (as). 5 For part (b), we have MX+Y (s) =...
https://ocw.mit.edu/courses/6-436j-fundamentals-of-probability-fall-2018/1a592ed184fb4c444547f67c9bcdd8ec_MIT6_436JF18_lec13.pdf