Notes on Part 1, Functions

Total Page:16

File Type:pdf, Size:1020Kb

Notes on Part 1, Functions Elementary Functions Chapter 1, Functions c Ken W. Smith, 2013 Version 1.3, January 8, 2014 These notes were developed by professor Ken W. Smith for MATH 1410 sections at Sam Houston State University, Huntsville, TX. This material was covered in six 80-minute class lectures at Sam Houston in Summer 2013. (Sections 1.0 and 1.1 were combined in one lecture since 1.0 is a brief review.) In addition to these class notes, there is a slide presentation version of these notes and a set of Worksheets. All of these are available on Blackboard. Contents 1 Functions and Polynomials 3 1.0 Algebra excellence . .3 1.0.1 Exponential notation { merely an abbreviation! . .3 1.0.2 Kilobytes and powers of ten (an application to computer science) . .4 1.0.3 Polynomial arithmetic: a review of A2 − B2 and other basic factoring . .5 1.0.4 Simplifying complicated fractions . .6 1.0.5 Other resources for algebra review...........................7 1.1 An introduction to functions . .8 1.1.1 The function machine . .8 1.1.2 Functions as ordered pairs . 10 1.1.3 Functions defined by equations . 12 1.1.4 The domain of a function . 14 1.1.5 Other resources for functions and function notation................. 15 1.2 Graphs of functions . 17 1.2.1 Using ordered pairs to draw functions . 17 1.2.2 Intercepts of the graph of a function . 19 1.2.3 Intervals in which the function rises or falls . 21 1.2.4 The vertical line test definition of a function . 22 1.2.5 Piecewise functions . 22 1.2.6 Other resources for graphing functions......................... 26 1.3 Transformations of functions . 27 1.3.1 Vertical shifts . 27 1.3.2 Horizontal shifts . 28 1.3.3 Vertical expansions . 29 1.3.4 Horizontal expansions . 29 1.3.5 Combining these expansions . 30 1.3.6 Resources for function transformations......................... 33 1.4 Symmetries of functions . 34 1.4.1 Even and odd functions . 34 1.4.2 Periodic functions . 37 1.4.3 The greatest integer function and other interesting examples . 38 1.4.4 Resources for function symmetries........................... 39 1.5 Function composition . 41 1.5.1 The algebra of functions . 41 1.5.2 Composing two functions . 41 1.5.3 Order is important! (f ◦ g 6= g ◦ f!)........................... 43 1.5.4 Chaining functions together . 44 1.5.5 Resources for the composition of functions....................... 45 1 1.6 Inverse functions . 46 1.6.1 The concept of inverse function . 46 1.6.2 Changing the domain in order to create an inverse function. 47 1.6.3 Finding the inverse of a function . 48 1.6.4 The geometric meaning of inverse (and the horizontal line test) . 50 1.6.5 The mathematical meaning of \inverse" . 50 1.6.6 Requirements for the existence of an inverse function* . 51 1.6.7 Resources for inverse functions............................. 52 2 1 Functions and Polynomials 1.0 Algebra excellence Before we study the elementary functions of science and calculus, we need some comfort with algebra. In this brief lecture we review two important ideas: (1) computations using exponential notation and (2) operations of polynomial arithmetic. These are two major algebra computations we will do throughout this class (and scientists will use throughout their careers!) This review is brief and is not intended to be comprehensive. Our precalculus class will assume that students are comfortable with most of the major concepts of elementary and intermediate algebra and we will not, in general, review those concepts in this class. 1.0.1 Exponential notation { merely an abbreviation! We abbreviate x · x · x by x3. This notation (merely an abbreviation!) quickly leads to some rules on how one should treat exponents. For example, since x3 · x2 = (x · x · x) · (x · x) = x5 then when we multiply objects with the same base (x) we should add the exponents: xmxn = xm+n. (1) Similarly, x3 x · x · x x x x = = = x; x2 x · x 1 x x so when we divide objects with the same base (x) we should subtract the exponents: xm = xm−n. (2) xn What if we use exponents in sequence, that is, we raise x to a power and then raise that result to a second power? For example, (x3)2 = (x · x · x)2 = (x · x · x)(x · x · x) = x · x · x · x · x · x = x6: Here our \abbreviation" leads us to multiplying exponents. We may generalize from this that (xm)n = xmn. (3) Repeated exponentiation leads to multiplying exponents. Our understanding of the exponent \abbreviation" has quickly led us to three natural rules about manipulating exponents. These algebra \rules" are merely the effects of the algebraic symbolism. There are other effects of our algebraic symbolism. Once we get used to the impact of this notation, we see that since multiplying by 1 leaves a number unchanged and since multiplication by x0 also leaves a number unchanged (xnx0 = xn+0 = xn) then 1 and x0 must be the same: x0 = 1. (4) 3 We can extend our exponent notation to rational exponents. Since 1 2 1 ·2 1 (x 2 ) = x 2 = x = x and since p ( x)2 = x 1 p then x 2 must represent x: More generally, denominators in exponents represent roots: 1 p x q = q x. (5) Some examples. First we practice our understanding of exponentiation: 2 1. Simplify 8 3 : 2 1 We solve this by recognizing that the fractional exponent 3 represents ( 3 )(2), so we will take a 1 cube root (that is the meaning of the exponent 3 ) and then we will square the result. Solution. p 2 1=3 2 3 2 2 8 3 = (8 ) = ( 8) = 2 = 4: Here is another, similar example. 3 2. Simplify 4 2 : Solution. p 3 1=2 3 3 3 4 2 = (4 ) = ( 4) = 2 = 8 1.0.2 Kilobytes and powers of ten (an application to computer science) Here is an application appearing in a number of computer science computations. We note that 210 = 1024 while 1000 = 103: The computer scientist works with computer registers which use bits (zeroes and ones) and so storage and memory are measured in powers of two. (We say that computer science computations are done in base two.) Yet the language of computer science is often based on our traditional powers of ten, where Greek prefixes such as kilo- represent a thousand, mega- represents a million and giga- a billion. However, to a computer scientist, the prefix kilo- really represents 210, not 103: A kilobyte is 210 = 1024 bytes; a gigabyte is 230 bytes. Let us approximate 230 as a power of ten: Since 230 = (210)3 and since we approximate 210 or 103 then 230 = (210)3 ≈ (103)3 = 109: Exercise. How many digits are there in 2300? Solution. Write 2300 = (210)30 ≈ (103)30 = 1090: Now 1090 = 1 × 1090 is 1 followed by 90 zeroes so 1090 has 91 digits. Therefore 2300 should have 91 digits. (A detour to WolframAlpha and a quick computation indeed gives 2300 = 2037035976334486086268445688409378161051468393665936250636140449354381299763336706183397376 You can check that this has 91 digits! But since 210 > 103, it turns out that 2300 is more closely approximated by 2 × 1090 than 1 × 1090 .) 4 Practice. Here are some sample problems from an old precalculus quiz. Simplify the following expressions: p 3 x6 1. p x2 1 (x6) 3 x−2 2. x4 Solutions. p 1. We follow the meaning of the exponent, rewriting expressions such as 3 x6 as x2 since (x2)3 = x6: So p 3 x6 x2 p = = x: x2 x 2 6 1 2 2 −2 x 2. We first simplify the numerator, noting that (x ) 3 = x and x x = = 1: So x2 1 (x6) 3 x−2 x2x−2 1 = = or x−4 x4 x4 x4 1.0.3 Polynomial arithmetic: a review of A2 − B2 and other basic factoring There are some basic polynomial expansion concepts that will appear throughout precalculus, calculus, and computations in the sciences. For example, at one point we learned to use the distributive law to expand (\FOIL") expressions like: (x + 5)(x − 3) = x2 − 3x + 5x − 15 = x2 + 2x − 15 and then to factor expressions like x2 + 2x − 15 by reversing this process. If we expand the expression (A + B)2 = (A + B)(A + B) we discover, in addition to the obvious squares A2 and B2 the \cross term" 2AB: However, if instead we expand (A + B)(A − B) we obtain A2 − B2; the cross term involved both AB and −AB and these cancelled out. We will use these basic patterns repeatedly in this course: (A + B)2 = A2 + 2AB + B2 (6) and (A + B)(A − B) = A2 − B2 (7) In the first case (equation 6), notice the existence of a middle term caused by our polynomial expansion. Don't make the \freshman" mistake of thinking that (A + B)2 is just the sum of the squares of A and B! In the second case (equation 7), we see that the difference of two squares nicely factors into the product of the sum and difference of the elements. Examples. Here are some other simplification problems. Each involves factoring of some type. Notice that the expression we are factoring in problems 2 and 3 have the same pattern as problem 1; recognizing that pattern leads us to our solution. Simplify: 5 x2 − 9 1. x + 3 x4 − 9 2. x2 + 3 x − 9 3. p x + 3 Solutions. x2 − 9 (x − 3)(x + 3) 1. = = x − 3: x + 3 x + 3 x4 − 9 (x2 − 3)(x2 + 3) 2.
Recommended publications
  • The Matrix Calculus You Need for Deep Learning
    The Matrix Calculus You Need For Deep Learning Terence Parr and Jeremy Howard July 3, 2018 (We teach in University of San Francisco's MS in Data Science program and have other nefarious projects underway. You might know Terence as the creator of the ANTLR parser generator. For more material, see Jeremy's fast.ai courses and University of San Francisco's Data Institute in- person version of the deep learning course.) HTML version (The PDF and HTML were generated from markup using bookish) Abstract This paper is an attempt to explain all the matrix calculus you need in order to understand the training of deep neural networks. We assume no math knowledge beyond what you learned in calculus 1, and provide links to help you refresh the necessary math where needed. Note that you do not need to understand this material before you start learning to train and use deep learning in practice; rather, this material is for those who are already familiar with the basics of neural networks, and wish to deepen their understanding of the underlying math. Don't worry if you get stuck at some point along the way|just go back and reread the previous section, and try writing down and working through some examples. And if you're still stuck, we're happy to answer your questions in the Theory category at forums.fast.ai. Note: There is a reference section at the end of the paper summarizing all the key matrix calculus rules and terminology discussed here. arXiv:1802.01528v3 [cs.LG] 2 Jul 2018 1 Contents 1 Introduction 3 2 Review: Scalar derivative rules4 3 Introduction to vector calculus and partial derivatives5 4 Matrix calculus 6 4.1 Generalization of the Jacobian .
    [Show full text]
  • IVC Factsheet Functions Comp Inverse
    Imperial Valley College Math Lab Functions: Composition and Inverse Functions FUNCTION COMPOSITION In order to perform a composition of functions, it is essential to be familiar with function notation. If you see something of the form “푓(푥) = [expression in terms of x]”, this means that whatever you see in the parentheses following f should be substituted for x in the expression. This can include numbers, variables, other expressions, and even other functions. EXAMPLE: 푓(푥) = 4푥2 − 13푥 푓(2) = 4 ∙ 22 − 13(2) 푓(−9) = 4(−9)2 − 13(−9) 푓(푎) = 4푎2 − 13푎 푓(푐3) = 4(푐3)2 − 13푐3 푓(ℎ + 5) = 4(ℎ + 5)2 − 13(ℎ + 5) Etc. A composition of functions occurs when one function is “plugged into” another function. The notation (푓 ○푔)(푥) is pronounced “푓 of 푔 of 푥”, and it literally means 푓(푔(푥)). In other words, you “plug” the 푔(푥) function into the 푓(푥) function. Similarly, (푔 ○푓)(푥) is pronounced “푔 of 푓 of 푥”, and it literally means 푔(푓(푥)). In other words, you “plug” the 푓(푥) function into the 푔(푥) function. WARNING: Be careful not to confuse (푓 ○푔)(푥) with (푓 ∙ 푔)(푥), which means 푓(푥) ∙ 푔(푥) . EXAMPLES: 푓(푥) = 4푥2 − 13푥 푔(푥) = 2푥 + 1 a. (푓 ○푔)(푥) = 푓(푔(푥)) = 4[푔(푥)]2 − 13 ∙ 푔(푥) = 4(2푥 + 1)2 − 13(2푥 + 1) = [푠푚푝푙푓푦] … = 16푥2 − 10푥 − 9 b. (푔 ○푓)(푥) = 푔(푓(푥)) = 2 ∙ 푓(푥) + 1 = 2(4푥2 − 13푥) + 1 = 8푥2 − 26푥 + 1 A function can even be “composed” with itself: c.
    [Show full text]
  • The Logic of Recursive Equations Author(S): A
    The Logic of Recursive Equations Author(s): A. J. C. Hurkens, Monica McArthur, Yiannis N. Moschovakis, Lawrence S. Moss, Glen T. Whitney Source: The Journal of Symbolic Logic, Vol. 63, No. 2 (Jun., 1998), pp. 451-478 Published by: Association for Symbolic Logic Stable URL: http://www.jstor.org/stable/2586843 . Accessed: 19/09/2011 22:53 Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at . http://www.jstor.org/page/info/about/policies/terms.jsp JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]. Association for Symbolic Logic is collaborating with JSTOR to digitize, preserve and extend access to The Journal of Symbolic Logic. http://www.jstor.org THE JOURNAL OF SYMBOLIC LOGIC Volume 63, Number 2, June 1998 THE LOGIC OF RECURSIVE EQUATIONS A. J. C. HURKENS, MONICA McARTHUR, YIANNIS N. MOSCHOVAKIS, LAWRENCE S. MOSS, AND GLEN T. WHITNEY Abstract. We study logical systems for reasoning about equations involving recursive definitions. In particular, we are interested in "propositional" fragments of the functional language of recursion FLR [18, 17], i.e., without the value passing or abstraction allowed in FLR. The 'pure," propositional fragment FLRo turns out to coincide with the iteration theories of [1]. Our main focus here concerns the sharp contrast between the simple class of valid identities and the very complex consequence relation over several natural classes of models.
    [Show full text]
  • Monoids: Theme and Variations (Functional Pearl)
    University of Pennsylvania ScholarlyCommons Departmental Papers (CIS) Department of Computer & Information Science 7-2012 Monoids: Theme and Variations (Functional Pearl) Brent A. Yorgey University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/cis_papers Part of the Programming Languages and Compilers Commons, Software Engineering Commons, and the Theory and Algorithms Commons Recommended Citation Brent A. Yorgey, "Monoids: Theme and Variations (Functional Pearl)", . July 2012. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/cis_papers/762 For more information, please contact [email protected]. Monoids: Theme and Variations (Functional Pearl) Abstract The monoid is a humble algebraic structure, at first glance ve en downright boring. However, there’s much more to monoids than meets the eye. Using examples taken from the diagrams vector graphics framework as a case study, I demonstrate the power and beauty of monoids for library design. The paper begins with an extremely simple model of diagrams and proceeds through a series of incremental variations, all related somehow to the central theme of monoids. Along the way, I illustrate the power of compositional semantics; why you should also pay attention to the monoid’s even humbler cousin, the semigroup; monoid homomorphisms; and monoid actions. Keywords monoid, homomorphism, monoid action, EDSL Disciplines Programming Languages and Compilers | Software Engineering | Theory and Algorithms This conference paper is available at ScholarlyCommons: https://repository.upenn.edu/cis_papers/762 Monoids: Theme and Variations (Functional Pearl) Brent A. Yorgey University of Pennsylvania [email protected] Abstract The monoid is a humble algebraic structure, at first glance even downright boring.
    [Show full text]
  • Contents 3 Homomorphisms, Ideals, and Quotients
    Ring Theory (part 3): Homomorphisms, Ideals, and Quotients (by Evan Dummit, 2018, v. 1.01) Contents 3 Homomorphisms, Ideals, and Quotients 1 3.1 Ring Isomorphisms and Homomorphisms . 1 3.1.1 Ring Isomorphisms . 1 3.1.2 Ring Homomorphisms . 4 3.2 Ideals and Quotient Rings . 7 3.2.1 Ideals . 8 3.2.2 Quotient Rings . 9 3.2.3 Homomorphisms and Quotient Rings . 11 3.3 Properties of Ideals . 13 3.3.1 The Isomorphism Theorems . 13 3.3.2 Generation of Ideals . 14 3.3.3 Maximal and Prime Ideals . 17 3.3.4 The Chinese Remainder Theorem . 20 3.4 Rings of Fractions . 21 3 Homomorphisms, Ideals, and Quotients In this chapter, we will examine some more intricate properties of general rings. We begin with a discussion of isomorphisms, which provide a way of identifying two rings whose structures are identical, and then examine the broader class of ring homomorphisms, which are the structure-preserving functions from one ring to another. Next, we study ideals and quotient rings, which provide the most general version of modular arithmetic in a ring, and which are fundamentally connected with ring homomorphisms. We close with a detailed study of the structure of ideals and quotients in commutative rings with 1. 3.1 Ring Isomorphisms and Homomorphisms • We begin our study with a discussion of structure-preserving maps between rings. 3.1.1 Ring Isomorphisms • We have encountered several examples of rings with very similar structures. • For example, consider the two rings R = Z=6Z and S = (Z=2Z) × (Z=3Z).
    [Show full text]
  • Math 311 - Introduction to Proof and Abstract Mathematics Group Assignment # 15 Name: Due: at the End of Class on Tuesday, March 26Th
    Math 311 - Introduction to Proof and Abstract Mathematics Group Assignment # 15 Name: Due: At the end of class on Tuesday, March 26th More on Functions: Definition 5.1.7: Let A, B, C, and D be sets. Let f : A B and g : C D be functions. Then f = g if: → → A = C and B = D • For all x A, f(x)= g(x). • ∈ Intuitively speaking, this definition tells us that a function is determined by its underlying correspondence, not its specific formula or rule. Another way to think of this is that a function is determined by the set of points that occur on its graph. 1. Give a specific example of two functions that are defined by different rules (or formulas) but that are equal as functions. 2. Consider the functions f(x)= x and g(x)= √x2. Find: (a) A domain for which these functions are equal. (b) A domain for which these functions are not equal. Definition 5.1.9 Let X be a set. The identity function on X is the function IX : X X defined by, for all x X, → ∈ IX (x)= x. 3. Let f(x)= x cos(2πx). Prove that f(x) is the identity function when X = Z but not when X = R. Definition 5.1.10 Let n Z with n 0, and let a0,a1, ,an R such that an = 0. The function p : R R is a ∈ ≥ ··· ∈ 6 n n−1 → polynomial of degree n with real coefficients a0,a1, ,an if for all x R, p(x)= anx +an−1x + +a1x+a0.
    [Show full text]
  • List of Mathematical Symbols by Subject from Wikipedia, the Free Encyclopedia
    List of mathematical symbols by subject From Wikipedia, the free encyclopedia This list of mathematical symbols by subject shows a selection of the most common symbols that are used in modern mathematical notation within formulas, grouped by mathematical topic. As it is virtually impossible to list all the symbols ever used in mathematics, only those symbols which occur often in mathematics or mathematics education are included. Many of the characters are standardized, for example in DIN 1302 General mathematical symbols or DIN EN ISO 80000-2 Quantities and units – Part 2: Mathematical signs for science and technology. The following list is largely limited to non-alphanumeric characters. It is divided by areas of mathematics and grouped within sub-regions. Some symbols have a different meaning depending on the context and appear accordingly several times in the list. Further information on the symbols and their meaning can be found in the respective linked articles. Contents 1 Guide 2 Set theory 2.1 Definition symbols 2.2 Set construction 2.3 Set operations 2.4 Set relations 2.5 Number sets 2.6 Cardinality 3 Arithmetic 3.1 Arithmetic operators 3.2 Equality signs 3.3 Comparison 3.4 Divisibility 3.5 Intervals 3.6 Elementary functions 3.7 Complex numbers 3.8 Mathematical constants 4 Calculus 4.1 Sequences and series 4.2 Functions 4.3 Limits 4.4 Asymptotic behaviour 4.5 Differential calculus 4.6 Integral calculus 4.7 Vector calculus 4.8 Topology 4.9 Functional analysis 5 Linear algebra and geometry 5.1 Elementary geometry 5.2 Vectors and matrices 5.3 Vector calculus 5.4 Matrix calculus 5.5 Vector spaces 6 Algebra 6.1 Relations 6.2 Group theory 6.3 Field theory 6.4 Ring theory 7 Combinatorics 8 Stochastics 8.1 Probability theory 8.2 Statistics 9 Logic 9.1 Operators 9.2 Quantifiers 9.3 Deduction symbols 10 See also 11 References 12 External links Guide The following information is provided for each mathematical symbol: Symbol: The symbol as it is represented by LaTeX.
    [Show full text]
  • Written Homework # 5 Solution
    Math 516 Fall 2006 Radford Written Homework # 5 Solution 12/12/06 Throughout R is a ring with unity. Comment: It will become apparent that the module properties 0¢m = 0, ¡(r¢m) = (¡r)¢m, and (r ¡ r0)¢m = r¢m ¡ r0¢m are vital details in some problems. 1. (20 total) Let M be an (additive) abelian group and End(M) be the set of group homomorphisms f : M ¡! M. (a) (12) Show End(M) is a ring with unity, where (f+g)(m) = f(m)+g(m) and (fg)(m) = f(g(m)) for all f; g 2 End(M) and m 2 M. Solution: This is rather tedious, but not so unusual as a basic algebra exercise. The trick is to identify all of the things, large and small, which need to be veri¯ed. We know that the composition of group homomorphisms is a group homomorphism. Thus End (M) is closed under function composition. Moreover End (M) is a monoid since composition is an associative op- eration and the identity map IM of M is a group homomorphism. Let f; g; h 2 End (M). The sum f + g 2 End (M) since M is abelian as (f + g)(m + n) = f(m + n) + g(m + n) = f(m) + f(n) + g(m) + g(n) = f(m) + g(m) + f(n) + g(n) = (f + g)(m) + (f + g)(n) for all m; n 2 M. Thus End (M) is closed under function addition. 1 Addition is commutative since f + g = g + f as (f + g)(m) = f(m) + g(m) = g(m) + f(m) = (g + f)(m) for all m 2 M.
    [Show full text]
  • Injective, Surjective and Bijective Functions
    DCS Module 1 Part 3 FUNCTION Functions :- Injective, Surjective and Bijective functions - Inverse of a function- Composition ​ :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: A function is a special case of relation. ​ ​ Definition: Let X and Y be any two sets. A relation f from X to Y is called a function if for ​ ​ ​ every x∈ X, there is a unique element y ∈ Y such that (x, y) ∈ f. ​ ​ For every x there should be unique y .i.e. x has only one image. A relation must satisfy two additional conditions to become a function. These conditions are: ​ ​ 1. Every x∈ X must be related to y ∈ Y. ○ Domain of f must be X 2. Uniqueness . Every x has only one y image ○ (x,y)∈ f ∧ (x,z)∈ f ⇒ y=z Function f from set X to Y can be expressed as: f: X→Y or If (x,y) ∈ f then x is called an argument and Y is called image of x under f. ​ ​ ​ ​ (x,y) ∈ f is same as y=f(x) ​ f: x→y or Domain of function f from X to Y is denoted as D ​ ​f . Df=X ​ ​ Range of function f is denoted as Rf is defined as:- ​ ​ ​ Rf=f(X) ​ ​ Range of f, Rf is defined as:- ​ ​ Rf={y| ∃x∊X ∧ y=f(x) } ∃means “there exists” ​ ​ Rf ⊆Y ​ ​ Codomain f:X → Y. Here set Y is called codomain of function f ​ ​ E.g. Let X={1,3,4} Y={2,5,6} Check whether following are functions from X to Y or not ​ (1)R1={(1,2),(3,5),(4, 2)} (2)R2={(1,2)(1,5),(3,2)(4,6)} (3)R3={(1,2),(3,2)} R1 is a function because every x has unique image , Domain of R={1,3,4}=X R2 is not a function because one of the x value 1 has two images since (1,2) and (1,5) R3 is not a function because domain of R3={1,3}≠X E.g.
    [Show full text]
  • Remarks About the Square Equation. Functional Square Root of a Logarithm
    M A T H E M A T I C A L E C O N O M I C S No. 12(19) 2016 REMARKS ABOUT THE SQUARE EQUATION. FUNCTIONAL SQUARE ROOT OF A LOGARITHM Arkadiusz Maciuk, Antoni Smoluk Abstract: The study shows that the functional equation f (f (x)) = ln(1 + x) has a unique result in a semigroup of power series with the intercept equal to 0 and the function composition as an operation. This function is continuous, as per the work of Paulsen [2016]. This solution introduces into statistics the law of the one-and-a-half logarithm. Sometimes the natural growth processes do not yield to the law of the logarithm, and a double logarithm weakens the growth too much. The law of the one-and-a-half logarithm proposed in this study might be the solution. Keywords: functional square root, fractional iteration, power series, logarithm, semigroup. JEL Classification: C13, C65. DOI: 10.15611/me.2016.12.04. 1. Introduction If the natural logarithm of random variable has normal distribution, then one considers it a logarithmic law – with lognormal distribution. If the func- tion f being function composition to itself is a natural logarithm, that is f (f (x)) = ln(1 + x), then the function ( ) = (ln( )) applied to a random variable will give a new distribution law, which – similarly as the law of logarithm – is called the law of the one-and -a-half logarithm. A square root can be defined in any semigroup G. A semigroup is a non- empty set with one combined operation and a neutral element.
    [Show full text]
  • Video for H07.2
    Video for Homework H07.2 Injective, Surjective, Bijective, and Inverse Functions Reading: Section 7.2 One-to-One Functions, Onto Functions, Inverse Functions Homework: H07.2: 7.2#5,7,12,17,41,49 Topics: • Injective Functions • Surjective Functions • Bijective Functions • Inverse Functions Injective Functions Definition of Injective Function Words: 푓 is injective, or 푓 is an injection, or 푓 is one-to-one Usage: 푓 is a function, 푓: 푋 → 푌 Meaning: If two inputs cause outputs that are equal, then the inputs must be equal. Meaning Written Formally: ∀푥1, 푥2 ∈ 푋(퐼푓 푓(푥1) = 푓(푥2) 푡ℎ푒푛 푥1 = 푥2) Contrapositive Meaning: If two inputs are not equal, then the outputs will not be equal. Contrapositive Written Formally: ∀푥1, 푥2 ∈ 푋(퐼푓 푥1 ≠ 푥2 푡ℎ푒푛 푓(푥1) ≠ 푓(푥2)) Other Wording: For every element in the codomain, there exists at most one element of the domain that can be used as input to cause that element of the codomain to be output. Other Formal Presentation: ∀푦 ∈ 푌(∃ at most one 푥 ∈ 푋(푓(푥) = 푦)) Incorrect interpretation of the term one-to-one When students are asked what one-to-one means, the answer they always give is always this: For each 푥, there is one y. It is important to realize that the sentence above is not what it means to be one-to-one. In fact, the sentence above is what it means for 푓 to be a function. Every function has the property that for each 푥, there is one 푦. It has nothing to do with the property of being one-to-one.
    [Show full text]
  • Unit 5 Function Operations (Book Sections 7.6 and 7.7)
    Unit 5 Function Operations (Book sections 7.6 and 7.7) NAME ______________________ PERIOD ________ Teacher ____________________ 1 Learning Targets Function 1. I can perform operations with functions. Operations 2. I can evaluate composite functions Function 3. I can write function rules for composite functions Composition Inverse 4. I can graph and identify domain and range of a Functions function and its inverse. 5. I can write function rules for inverses of functions and verify using composite functions . 2 Function Operations Date: _____________ After this lesson and practice, I will be able to… • perform operations with functions. (LT1) • evaluate composite functions. (LT2) Having studied how to perform operations with one function, you will next learn how to perform operations with several functions. Function Operation Notation Addition: (f + g) = f(x) + g(x) Multiplication: (f • g) = f(x) • g(x) Subtraction: (f - g) = f(x) - g(x) € € " f % f (x) Division $ '( x) = ,g(x) ≠ 0 # g & g(x) The domain€ of the results of each of the above function operation are the _____-values that are in the domains of both _____ and _____ (except for _____________, where you must exclude any _____-values that cause ____________. (Remember you cannot divide by zero) Function Operations (LT 1) Example 1: Given � � = 3� + 8 and � � = 2� − 12, find h(x) and k(x) and their domains: a) ℎ � = � + � � and b) � � = 2� � − � � Example 2: Given � � = �! − 1 and � � = � + 5, find h(x) and k(x) and their domains: !(!) a) ℎ � = � ∙ � � b) � � = !(!) 3 Your Turn 1: Given � � = 3� − 1, � � = 2�! − 3, and ℎ � = 7�, find each of the following functions and their domains.
    [Show full text]