PeerJ Computer Science Preprints: Theory and Formal Methodshttps://peerj.com/preprints/index.atom?journal=cs&subject=11800Theory and Formal Methods articles published in PeerJ Computer Science PreprintsAn open source software package for primality testing of numbers of the form p2^n+1, with no constraints on the relative sizes of p and 2^nhttps://peerj.com/preprints/273962018-11-292018-11-29Tejas R. Rao
We develop an efficient software package to test for the primality of p2^n+1, p prime and p>2^n. This aids in the determination of large, non-Sierpinski numbers p, for prime p, and in cryptography. It furthermore uniquely allows for the computation of the smallest n such that p2^n+1 is prime when p is large. We compute primes of this form for the first one million primes p and find four primes of the form above 1000 digits. The software may also be used to test whether p2^n+1 divides a generalized fermat number base 3.
We develop an efficient software package to test for the primality of p2^n+1, p prime and p>2^n. This aids in the determination of large, non-Sierpinski numbers p, for prime p, and in cryptography. It furthermore uniquely allows for the computation of the smallest n such that p2^n+1 is prime when p is large. We compute primes of this form for the first one million primes p and find four primes of the form above 1000 digits. The software may also be used to test whether p2^n+1 divides a generalized fermat number base 3.Ecological theory provides insights about evolutionary computationhttps://peerj.com/preprints/273152018-11-022018-11-02Emily L DolsonWolfgang BanzhafCharles Ofria
Evolutionary algorithms often incorporate ecological concepts to help maintain diverse populations and drive continued innovation. However, while there is strong evidence for the value of ecological dynamics, a lack of overarching theoretical framework renders the precise mechanisms behind these results unclear. These gaps in our understanding make it challenging to predict which approaches will be most appropriate for a given problem. Biologists have been developing ecological theory for decades, but the resulting body of work has yet to be translated into an evolutionary computation context. This paper lays the groundwork for such a translation by applying ecological theory to three different selection mechanisms in evolutionary computation: fitness sharing, lexicase selection, and Eco-EA. First, we use ecological ideas to establish a framework that clarifies how these selection schemes are alike and how they differ. We then build upon this framework by using metrics from ecology to gather empirical data about the underlying differences in the population dynamics that these approaches produce. Specifically, we measure interaction networks and phylogenetic diversity within the population to explore long-term stable coexistence. Notably, we find that selection methods affect phylogenetic diversity differently than phenotypic diversity. These results can inform parameter selection, choice of selection scheme, and the development of new selection schemes.
Evolutionary algorithms often incorporate ecological concepts to help maintain diverse populations and drive continued innovation. However, while there is strong evidence for the value of ecological dynamics, a lack of overarching theoretical framework renders the precise mechanisms behind these results unclear. These gaps in our understanding make it challenging to predict which approaches will be most appropriate for a given problem. Biologists have been developing ecological theory for decades, but the resulting body of work has yet to be translated into an evolutionary computation context. This paper lays the groundwork for such a translation by applying ecological theory to three different selection mechanisms in evolutionary computation: fitness sharing, lexicase selection, and Eco-EA. First, we use ecological ideas to establish a framework that clarifies how these selection schemes are alike and how they differ. We then build upon this framework by using metrics from ecology to gather empirical data about the underlying differences in the population dynamics that these approaches produce. Specifically, we measure interaction networks and phylogenetic diversity within the population to explore long-term stable coexistence. Notably, we find that selection methods affect phylogenetic diversity differently than phenotypic diversity. These results can inform parameter selection, choice of selection scheme, and the development of new selection schemes.Novel approach for solving integer equal flow problemhttps://peerj.com/preprints/272642018-10-082018-10-08Swapnil KumarSasikanth Goteti
In this article we consider a certain sub class of Integer Equal Flow problem, which are known NP hard. Currently there exist no direct solutions for the same. It is a common problem in various inventory management systems. Here we discuss a local minima solution which uses projection of the convexspaces to resolve the equal flows and turn the problem into a known linear integer programming or constraint satisfaction problem which have reasonable known solutions and can be effectively solved using simplex or other standard optimization strategies
In this article we consider a certain sub class of Integer Equal Flow problem, which are known NP hard. Currently there exist no direct solutions for the same. It is a common problem in various inventory management systems. Here we discuss a local minima solution which uses projection of the convexspaces to resolve the equal flows and turn the problem into a known linear integer programming or constraint satisfaction problem which have reasonable known solutions and can be effectively solved using simplex or other standard optimization strategiesLinear time-varying Luenberger observer applied to diabeteshttps://peerj.com/preprints/33412017-10-122017-10-12Onofre Orozco LópezCarlos Eduardo Castañeda HernándezAgustín Rodríguez HerreroGema García SaézMaría Elena Hernando
We present a linear time-varying Luenberger observer (LTVLO) using compartmental models to estimate the unmeasurable states in patients with type 1 diabetes. The LTVLO proposed is based on the linearization in an operation point of the virtual patient (VP), where a linear time-varying system is obtained. LTVLO gains are obtained by selection of the asymptotic eigenvalues where the observability matrix is assured. The estimation of the unmeasurable variables is done using Ackermann's methodology. Additionally, it is shown the Lyapunov approach to prove the stability of the time-varying proposal. In order to evaluate the proposed methodology, we designed three experiments: A) VP obtained with the Bergman minimal model; B) VP obtained with the compartmental model presented by Hovorka in 2004; and C) real patients data set. For experiments A) and B), it is applied a meal plan to the VP, where the dynamic response of each state model is compared to the response of each variable of the time-varying observer. Once the observer is evaluated in experiment B), the proposal is applied to experiment C) with data extracted from real patients and the unmeasurable state space variables are obtained with the LTVLO. LTVLO methodology has the feature of being updated each instant of time to estimate the states under a known structure. The results are obtained using simulation with MatlabTM and SimulinkTM. The LTVLO estimates the unmeasurable states from in silico patients with high accuracy by means of the update of Luenberger gains at each iteration. The accuracy of the estimated state space variables is validated through fit parameter.
We present a linear time-varying Luenberger observer (LTVLO) using compartmental models to estimate the unmeasurable states in patients with type 1 diabetes. The LTVLO proposed is based on the linearization in an operation point of the virtual patient (VP), where a linear time-varying system is obtained. LTVLO gains are obtained by selection of the asymptotic eigenvalues where the observability matrix is assured. The estimation of the unmeasurable variables is done using Ackermann's methodology. Additionally, it is shown the Lyapunov approach to prove the stability of the time-varying proposal. In order to evaluate the proposed methodology, we designed three experiments: A) VP obtained with the Bergman minimal model; B) VP obtained with the compartmental model presented by Hovorka in 2004; and C) real patients data set. For experiments A) and B), it is applied a meal plan to the VP, where the dynamic response of each state model is compared to the response of each variable of the time-varying observer. Once the observer is evaluated in experiment B), the proposal is applied to experiment C) with data extracted from real patients and the unmeasurable state space variables are obtained with the LTVLO. LTVLO methodology has the feature of being updated each instant of time to estimate the states under a known structure. The results are obtained using simulation with MatlabTM and SimulinkTM. The LTVLO estimates the unmeasurable states from in silico patients with high accuracy by means of the update of Luenberger gains at each iteration. The accuracy of the estimated state space variables is validated through fit parameter.Weighted growth functions of automatic groupshttps://peerj.com/preprints/32562017-09-152017-09-15Mikael Vejdemo-Johansson
The growth function is the generating function for sizes of spheres around the identity in Cayley graphs of groups. We present a novel method to calculate growth functions for automatic groups with normal form recognizing automata that recognize a single normal form for each group element, and are at most context free in complexity: context free grammars can be translated into algebraic systems of equations, whose solutions represent generating functions of their corresponding non-terminal symbols.
This approach allows us to seamlessly introduce weightings on the growth function: assign different or even distinct weights to each of the generators in an underlying presentation, such that this weighting is reflected in the growth function. We recover known growth functions for small braid groups, and calculate growth functions that weight each generator in an automatic presentation of the braid groups according to their lengths in braid generators.
The growth function is the generating function for sizes of spheres around the identity in Cayley graphs of groups. We present a novel method to calculate growth functions for automatic groups with normal form recognizing automata that recognize a single normal form for each group element, and are at most context free in complexity: context free grammars can be translated into algebraic systems of equations, whose solutions represent generating functions of their corresponding non-terminal symbols.This approach allows us to seamlessly introduce weightings on the growth function: assign different or even distinct weights to each of the generators in an underlying presentation, such that this weighting is reflected in the growth function. We recover known growth functions for small braid groups, and calculate growth functions that weight each generator in an automatic presentation of the braid groups according to their lengths in braid generators.An artificial immune system approach to automated program verification: Towards a theory of undecidability in biological computinghttps://peerj.com/preprints/26902017-08-172017-08-17Soumya Banerjee
An immune system inspired Artificial Immune System (AIS) algorithm is presented, and is used for the purposes of automated program verification. Relevant immunological concepts are discussed and the field of AIS is briefly reviewed. It is proposed to use this AIS algorithm for a specific automated program verification task: that of predicting shape of program invariants. It is shown that the algorithm correctly predicts program invariant shape for a variety of benchmarked programs. Program invariants encapsulate the computability of a particular program, e.g. whether it performs a particular function correctly and whether it terminates or not. This work also lays the foundation for applying concepts of theoretical incomputability and undecidability to biological systems like the immune system that perform robust computation to eliminate pathogens.
An immune system inspired Artificial Immune System (AIS) algorithm is presented, and is used for the purposes of automated program verification. Relevant immunological concepts are discussed and the field of AIS is briefly reviewed. It is proposed to use this AIS algorithm for a specific automated program verification task: that of predicting shape of program invariants. It is shown that the algorithm correctly predicts program invariant shape for a variety of benchmarked programs. Program invariants encapsulate the computability of a particular program, e.g. whether it performs a particular function correctly and whether it terminates or not. This work also lays the foundation for applying concepts of theoretical incomputability and undecidability to biological systems like the immune system that perform robust computation to eliminate pathogens.Elementary cellular automata as conditional Boolean formulæhttps://peerj.com/preprints/25532016-10-242016-10-24Trace Fleeman y Garcia
I show that any elementary cellular automata -- a class of 1-dimensional, 2-state cellular automata originally formulated by Stephen Wolfram -- can be deconstructed into a set of two Boolean operators; I also present a conjecture concerning the relationship between the set of computationally complete elementary cellular automata rules (such as rule 110, shown in section 2 to be composed of a NAND gate) and the set of elementary cellular automata rules that contain universal Boolean operators (such as rule 52, shown in section 3.1 to contain a universal Boolean operator yet has not been shown as of 2016 to be computationally complete.)
I show that any elementary cellular automata -- a class of 1-dimensional, 2-state cellular automata originally formulated by Stephen Wolfram -- can be deconstructed into a set of two Boolean operators; I also present a conjecture concerning the relationship between the set of computationally complete elementary cellular automata rules (such as rule 110, shown in section 2 to be composed of a NAND gate) and the set of elementary cellular automata rules that contain universal Boolean operators (such as rule 52, shown in section 3.1 to contain a universal Boolean operator yet has not been shown as of 2016 to be computationally complete.)Matlab code for the Discrete Hankel Transformhttps://peerj.com/preprints/22162016-07-022016-07-02Ugo ChouinardNatalie Baddour
Previous definitions of a Discrete Hankel Transform (DHT) have focused on methods to approximate the continuous Hankel integral transform without regard for the properties of the DHT itself. Recently, the theory of a Discrete Hankel Transform was proposed that follows the same path as the Discrete Fourier/Continuous Fourier transform. This DHT possesses orthogonality properties which lead to invertibility and also possesses the standard set of discrete shift, modulation, multiplication and convolution rules. The proposed DHT can be used to approximate the continuous forward and inverse Hankel transform. This paper describes the Matlab code developed for the numerical calculation of this DHT.
Previous definitions of a Discrete Hankel Transform (DHT) have focused on methods to approximate the continuous Hankel integral transform without regard for the properties of the DHT itself. Recently, the theory of a Discrete Hankel Transform was proposed that follows the same path as the Discrete Fourier/Continuous Fourier transform. This DHT possesses orthogonality properties which lead to invertibility and also possesses the standard set of discrete shift, modulation, multiplication and convolution rules. The proposed DHT can be used to approximate the continuous forward and inverse Hankel transform. This paper describes the Matlab code developed for the numerical calculation of this DHT.Properties of distance spaces with power triangle inequalitieshttps://peerj.com/preprints/20552016-05-202016-05-20Daniel J Greenhoe
Metric spaces provide a framework for analysis and have several very useful properties. Many of these properties follow in part from the triangle inequality. However, there are several applications in which the triangle inequality does not hold but in which we may still like to perform analysis. This paper investigates what happens if the triangle inequality is removed all together, leaving what is called a distance space, and also what happens if the triangle inequality is replaced with a much more general two parameter relation, which is herein called the "power triangle inequality". The power triangle inequality represents an uncountably large class of inequalities, and includes the triangle inequality, relaxed triangle inequality, and inframetric inequality as special cases. The power triangle inequality is defined in terms of a function that is herein called the power triangle function. The power triangle function is itself a power mean, and as such is continuous and monotone with respect to its exponential parameter, and also includes the operations of maximum, minimum, mean square, arithmetic mean, geometric mean, and harmonic mean as special cases.
Metric spaces provide a framework for analysis and have several very useful properties. Many of these properties follow in part from the triangle inequality. However, there are several applications in which the triangle inequality does not hold but in which we may still like to perform analysis. This paper investigates what happens if the triangle inequality is removed all together, leaving what is called a distance space, and also what happens if the triangle inequality is replaced with a much more general two parameter relation, which is herein called the "power triangle inequality". The power triangle inequality represents an uncountably large class of inequalities, and includes the triangle inequality, relaxed triangle inequality, and inframetric inequality as special cases. The power triangle inequality is defined in terms of a function that is herein called the power triangle function. The power triangle function is itself a power mean, and as such is continuous and monotone with respect to its exponential parameter, and also includes the operations of maximum, minimum, mean square, arithmetic mean, geometric mean, and harmonic mean as special cases.Geometric model of image formation in Scheimpflug camerashttps://peerj.com/preprints/18872016-03-222016-03-22Indranil SinharoyPrasanna RangarajanMarc P. Christensen
We present a geometric model of image formation in Scheimpflug cameras that is most general. Scheimpflug imaging is commonly used is scientific and medical imaging either to increase the depth of field of the imager or to focus on tilted object surfaces. Existing Scheimpflug imaging models do not take into account the effect of pupil magnification (i.e. the ratio of the exit pupil diameter to the entrance pupil diameter), which we have found to affect the type of distortions experienced by the image-field upon lens rotations. In this work, we have also derived the relationship between the object, lens and sensor planes in Scheimpflug configuration, which is very similar in form with the standard Gaussian imaging equation, but applicable for imaging systems in which the lens plane and the sensor plane are arbitrarily oriented with respect to each other. Since the conventional rigid camera, in which the sensor and lens planes are constrained to be parallel to each other, is a special case of the Scheimpflug camera, our model also applies to imaging with conventional cameras.
We present a geometric model of image formation in Scheimpflug cameras that is most general. Scheimpflug imaging is commonly used is scientific and medical imaging either to increase the depth of field of the imager or to focus on tilted object surfaces. Existing Scheimpflug imaging models do not take into account the effect of pupil magnification (i.e. the ratio of the exit pupil diameter to the entrance pupil diameter), which we have found to affect the type of distortions experienced by the image-field upon lens rotations. In this work, we have also derived the relationship between the object, lens and sensor planes in Scheimpflug configuration, which is very similar in form with the standard Gaussian imaging equation, but applicable for imaging systems in which the lens plane and the sensor plane are arbitrarily oriented with respect to each other. Since the conventional rigid camera, in which the sensor and lens planes are constrained to be parallel to each other, is a special case of the Scheimpflug camera, our model also applies to imaging with conventional cameras.