Junior Problems J493. in Triangle ABC, R = 4R. Prove That ∠A

Total Page:16

File Type:pdf, Size:1020Kb

Junior Problems J493. in Triangle ABC, R = 4R. Prove That ∠A Junior problems ○ J493. In triangle ABC, R = 4r. Prove that ∠A − ∠B = 90 if and only if ¾ ab a b c2 : − = − 2 Proposed by Adrian Andreescu, University of Texas at Austin, USA Solution by Daniel Lasaosa, Pamplona, Spain Note that the second condition is equivalent to 3ab 2 2 2 3 C 1 = a + b − c = 2ab cos C; cos C = ; sin = √ : 2 4 2 2 2 A B C Since it is well known that r = 4R sin 2 sin 2 sin 2 , the second condition in a triangle such that R = 4r also sin A sin B √1 gives 2 2 = 4 2 , hence A − B A + B A B C A B 1 ○ cos = cos + 2 sin sin = sin + 2 sin sin = √ = cos 45 ; 2 2 2 2 2 2 2 2 ○ ○ A B C which implies to ∠A − ∠B = 90 . Conversely, if ∠A − ∠B = 90 , then using R = 4r so 1 = 16 sin 2 sin 2 sin 2 we find 1 A B C A B C 1 cos − sin 2 sin sin sin : √ = 2 = 2 + 2 2 = 2 + C 2 8 sin 2 sin C sin C √1 This quadratic equation in 2 has a double root and hence implies 2 = 2 2 , which we saw above was equivalent to the second equation. The conclusion follows. Also solved by Ioannis D. Sfikas, Athens, Greece; Polyahedra, Polk State College, USA; Arkady Alt, San Jose, CA, USA; Nicusor Zlota, Traian Vuia Technical College, Focsani, Romania; Dumitru Barac, Sibiu, Romania; Marin Chirciu, Colegiul Nat,ional Zinca Golescu, Pites, ti, Romania; Nguyen Viet Hung, Hanoi University of Science, Vietnam; Titu Zvonaru, Comănes, ti, Romania; Taes Padhihary, Disha Delphi Public School, India; Vicente Vicario García, Sevilla. Spain. Mathematical Reflections 5 (2019) 1 J494. Let a; b; c be positive real numbers. Prove that ab + bc + ca + a + b + c 3 1 ≤ 1 + : (a + b)(b + c)(c + a) 8 abc Proposed by Florin Rotaru, Focşani, România Solution by Polyahedra, Polk State College, USA Let p = (a + b + c)~3, q = (ab + bc + ca)~3, and r = abc. Then pq ≥ r, so (a + b)(b + c)(c + a) = 9pq − r ≥ 8pq, and thus it suffices to prove pq(r + 1) ≥ (p + q)r. 2 Note that p ≥ q. If either p ≤ 1 or q ≥ 1, then (p−1)(q−1) ≥ 0 and pq(r+1)−(p+q)r = (p−1)(q−1)r+pq−r ≥ 3~2 0. It remains to consider p > 1 > q. Then r ≤ q < q, and therefore pq(r+1)−(p+q)r = (p−1)qr+p(q−r) > 0, completing the proof. Also solved by Daniel Lasaosa, Pamplona, Spain; Nicusor Zlota, Traian Vuia Technical College, Focsani, Romania; Ioannis D. Sfikas, Athens, Greece; Nguyen Viet Hung, Hanoi University of Science, Vietnam; Pooya Esmaeil Akhondy, Atomic Energy High School, Tehran, Iran; Titu Zvonaru, Comănes, ti, Romania. Mathematical Reflections 5 (2019) 2 J495. Let a; b; c be positive numbers such that abc = 1. Prove that 1 1 1 1 1 1 9 + + + + + ≥ : a b c a2 + b b2 + c c2 + a 2 Proposed by An Zhenping, Xianyang Normal University, China Solution by the author x y z Let a ; b ; c then the equation rewrites as = y = z = x y z x y2z z2x x2y 9 + + + + + ≥ : x y z x2z + y3 y2x + z3 z2y + x3 2 LHS = 2 2 2 2 2 2 2 2 2 2 2 2 y (y + z) z (z + x) x (x + y) y z z x x y + + + + + ≥ xy(y + z)2 zy(z + x)2 xz(x + y)2 x2z2 + y3z y2x2 + z3x z2y2 + x3y 2 [(xy + yz + zx) + x(x + y) + y(y + z) + z(z + x)] = xy(y + z)2 + zy(z + x)2 + xz(x + y)2 + x2y2 + y2z2 + z2x2 + x3y + y3z + z3x 4 4 (x + y + z) (x + y + z) = (xy + yz + zx)(x2 + y2 + z2 + xy + yz + zx) (xy + yz + zx)[(x + y + z)2 − (xy + yz + zx)] 2 With x + y + z = m; xy + yz + zx = k and m ≥ 3k get 4 m 9 4 2 2 2 2 ≥ ⇔ 2m − 9m k + 9k ≥ 0 ⇔ (2m − 3k)(m − 3k) ≥ 0 k(m2 − k) 2 and we are done. Also solved by Ioannis D. Sfikas, Athens, Greece; Michael - Athanasios Peppas, Evangeliki Model High School of Smyrna, Athens, Greece. Mathematical Reflections 5 (2019) 3 J496. Let a1; a2; a3; a4; a5 be positive real numbers. Prove that a1 a2 Q ⋅ Q ≤ 1: cyc 2 (a1 + a2) + a3 cyc 2 (a1 + a2) + a3 Proposed by Titu Andreescu, University of Texas at Dallas, USA Solution by Polyahedra, Polk State College, USA 2 Note that ∑cyc a3(2a1 + 2a2 + a3) = ∑cyc a3 . By the weighted AM-HM inequality, 2 a3 ⎛ ⎞ 1 Q ≥ Q a3 ⋅ = 1: cyc 2(a1 + a2) + a3 ⎝cyc ⎠ ∑cyc a3(2a1 + 2a2 + a3) Hence, by the AM-GM inequality, 2 a1 a2 1 ⎛ a1 + a2 ⎞ Q ⋅ Q ≤ Q cyc 2(a1 + a2) + a3 cyc 2(a1 + a2) + a3 4 ⎝cyc 2(a1 + a2) + a3 ⎠ 2 2 1 ⎛5 1 a3 ⎞ 1 5 1 = − Q ≤ − = 1: 4 ⎝2 2 cyc 2(a1 + a2) + a3 ⎠ 4 2 2 Also solved by Daniel Lasaosa, Pamplona, Spain; Nicusor Zlota, Traian Vuia Technical College, Focsani, Romania; Ioannis D. Sfikas, Athens, Greece; Titu Zvonaru, Comănes, ti, Romania. Mathematical Reflections 5 (2019) 4 J497. Prove that for any positive real numbers a; b; c a2 b2 c2 √ √ √ bc ca ab 2 a b c : b + c + a + + + ≥ ( + + ) Proposed by Nguyen Viet Hung, Hanoi University of Science, Vietnam Solution by Daniel Lasaosa, Pamplona, Spain 1 11 1 By the weighted AM-GM inequality, and since 14 + 14 + 7 + 1 = 2, we have 2 2 2 ¼ 1 a 11 b 1 c √ 1 − 1 − 1 + 11 + 1 − 11 + 2 + 1 bc 2 a 7 7 b 14 7 2 c 14 7 2 2b; 14 b + 14 c + 7 a + ≥ ⋅ ⋅ = a2 b2 c2 √ with equality iff b = c = a = bc, ie iff a = b = c. Adding the cyclic permutations of this inequality produces the proposed result, where equality holds iff a = b = c. Also solved by Albert Stadler, Herrliberg, Switzerland; Polyahedra, Polk State College, USA; Nicusor Zlota, Traian Vuia Technical College, Focsani, Romania; Dumitru Barac, Sibiu, Romania; Taes Padhihary, Disha Delphi Public School, India; Ioannis D. Sfikas, Athens, Greece; Pooya Esmaeil Akhondy, Atomic Energy High School, Tehran, Iran; Titu Zvonaru, Comănes, ti, Romania; Arkady Alt, San Jose, CA, USA. Mathematical Reflections 5 (2019) 5 ○ J498. Let ABC be a triangle with ∠A ≠ ∠B and ∠C = 30 . On the internal angle bisector of ∠BCA consider ○ the points D and E such that ∠CAD = ∠CBE = 30 and on the perpendicular bisector of AB, on the ○ same side as C related to AB, consider the point F such that ∠AF B = 90 . Prove that DEF is an equilateral triangle. Proposed by Titu Andreescu, USA, and Marius Stănean, România Solution by Polyahedra, Polk State College, USA By the property of an angle bisector, CD intersects the circumcircle of △ABC again at P , the midpoint of ○ ○ the arc of AB not containing C. Hence, ∠P BA = ∠P AB = 15 , and thus ∠P BF = ∠P AF = 60 . Since FP ○ ○ is the perpendicular bisector of AB, ∠BF P = 45 = ∠BEP and ∠AF P = 45 = ∠ADP . Therefore, P BEF ○ ○ and P AF D are cyclic quadrilaterals. Consequently, ∠P EF = ∠P BF = 60 and ∠CDF = ∠P AF = 60 , completing the proof. Also solved by Daniel Lasaosa, Pamplona, Spain; Taes Padhihary, Disha Delphi Public School, India; Titu Zvonaru, Comănes, ti, Romania. Mathematical Reflections 5 (2019) 6 Senior problems S493. In triangle ABC; R = 4r. Prove that 19 1 1 1 25 a b c 2 ≤ ( + + ) a + b + c ≤ 2 Proposed by Adrian Andreescu, University of Texas at Austin, USA Solution by Arkady Alt, San Jose, CA, USA 2 2 1 1 1 2s ab bc ca 2s s + 4Rr + r a b c ( + + ) ( + + ) a + b + c = abc = 4Rrs = 2 2 2 2 2 2 s + 4Rr + r s + 4 ⋅ 4r ⋅ r + r s + 17r = = 2Rr 2 ⋅ 4rr 8r2 Since 2 2 2 2 2 2 s ≤ 4R + 4Rr + 3r = 4 ⋅ (4r) + 4 ⋅ 4r ⋅ r + 3r = 83r and 2 2 2 2 s ≥ 16Rr − 5r = 16 ⋅ 4r ⋅ r − 5r = 59r (Gerretsen’s Inequalities) then 2 2 2 2 s + 17r 83r + 17r 25 8r2 ≤ 8r2 = 2 and s2 17r2 59r2 17r2 19 + + : 8r2 ≥ 8r2 = 2 Also solved by Titu Zvonaru, Comănes, ti, Romania; Nicusor Zlota, Traian Vuia Technical College, Foc- sani, Romania; Corneliu Mănescu-Avram, Ploies, ti, Romania; Ioannis D. Sfikas, Athens, Greece; Marin Chirciu, Colegiul Nat,ional Zinca Golescu, Pites, ti, Romania; Telemachus Baltsavias, Keramies Junior High School Kefalonia, Greece. Mathematical Reflections 5 (2019) 7 S494. Let n > 1 be an integer. Solve the equation n x − ⌊x⌋ = n: Proposed by Alessandro Ventullo, Milan, Italy Solution by Daniel Lasaosa, Pamplona, Spain n n If SxS < 1 we have Sx − ⌊x⌋S < S1S + S1S = 2, or no solution exists in this case. If x = 1 we have x − ⌊x⌋ = 0 for n n any n ≥ 2, whereas if x = −1, we have x − ⌊x⌋ = 0 when n is odd and x − ⌊x⌋ = 2 when n is even, or the only possible solution with SxS ≤ 1 is x = −1 and only for n = 2. n If x > 1, let m = ⌊x⌋, or m ≥ 1 and x = m+δ, where 0 ≤ δ < 1, or the equation rewrites as m+n = (m+δ) ≥ mn. Or, n n−1 n−2 n−3 n ≥ m − m = m m − 1 = m(m − 1) m + m + ⋯ + 1 ≥ m(n − 1)(m − 1): 6 If m ≥ 2, we have n ≥ 2(n − 1), or 2 ≥ n, whereas if m ≥ 3, we have n ≥ 6(n − 1), or n ≤ 5 < 2.
Recommended publications
  • Remarks About the Square Equation. Functional Square Root of a Logarithm
    M A T H E M A T I C A L E C O N O M I C S No. 12(19) 2016 REMARKS ABOUT THE SQUARE EQUATION. FUNCTIONAL SQUARE ROOT OF A LOGARITHM Arkadiusz Maciuk, Antoni Smoluk Abstract: The study shows that the functional equation f (f (x)) = ln(1 + x) has a unique result in a semigroup of power series with the intercept equal to 0 and the function composition as an operation. This function is continuous, as per the work of Paulsen [2016]. This solution introduces into statistics the law of the one-and-a-half logarithm. Sometimes the natural growth processes do not yield to the law of the logarithm, and a double logarithm weakens the growth too much. The law of the one-and-a-half logarithm proposed in this study might be the solution. Keywords: functional square root, fractional iteration, power series, logarithm, semigroup. JEL Classification: C13, C65. DOI: 10.15611/me.2016.12.04. 1. Introduction If the natural logarithm of random variable has normal distribution, then one considers it a logarithmic law – with lognormal distribution. If the func- tion f being function composition to itself is a natural logarithm, that is f (f (x)) = ln(1 + x), then the function ( ) = (ln( )) applied to a random variable will give a new distribution law, which – similarly as the law of logarithm – is called the law of the one-and -a-half logarithm. A square root can be defined in any semigroup G. A semigroup is a non- empty set with one combined operation and a neutral element.
    [Show full text]
  • Neural Network Architectures and Activation Functions: a Gaussian Process Approach
    Fakultät für Informatik Neural Network Architectures and Activation Functions: A Gaussian Process Approach Sebastian Urban Vollständiger Abdruck der von der Fakultät für Informatik der Technischen Universität München zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften (Dr. rer. nat.) genehmigten Dissertation. Vorsitzender: Prof. Dr. rer. nat. Stephan Günnemann Prüfende der Dissertation: 1. Prof. Dr. Patrick van der Smagt 2. Prof. Dr. rer. nat. Daniel Cremers 3. Prof. Dr. Bernd Bischl, Ludwig-Maximilians-Universität München Die Dissertation wurde am 22.11.2017 bei der Technischen Universtät München eingereicht und durch die Fakultät für Informatik am 14.05.2018 angenommen. Neural Network Architectures and Activation Functions: A Gaussian Process Approach Sebastian Urban Technical University Munich 2017 ii Abstract The success of applying neural networks crucially depends on the network architecture being appropriate for the task. Determining the right architecture is a computationally intensive process, requiring many trials with different candidate architectures. We show that the neural activation function, if allowed to individually change for each neuron, can implicitly control many aspects of the network architecture, such as effective number of layers, effective number of neurons in a layer, skip connections and whether a neuron is additive or multiplicative. Motivated by this observation we propose stochastic, non-parametric activation functions that are fully learnable and individual to each neuron. Complexity and the risk of overfitting are controlled by placing a Gaussian process prior over these functions. The result is the Gaussian process neuron, a probabilistic unit that can be used as the basic building block for probabilistic graphical models that resemble the structure of neural networks.
    [Show full text]
  • PDF Full Text
    Detection, Estimation, and Modulation Theory, Part III: Radar–Sonar Signal Processing and Gaussian Signals in Noise. Harry L. Van Trees Copyright 2001 John Wiley & Sons, Inc. ISBNs: 0-471-10793-X (Paperback); 0-471-22109-0 (Electronic) Glossary In this section we discuss the conventions, abbreviations, and symbols used in the book. CONVENTIONS The fol lowin g conventions have been used: 1. Boldface roman denotes a v fector or matrix. 2. The symbol ] 1 means the magnitude of the vector or scalar con- tained within. 3. The determinant of a square matrix A is denoted by IAl or det A. 4. The script letters P(e) and Y(e) denote the Fourier transform and Laplace transform respectively. 5. Multiple integrals are frequently written as, 1 drf(r)J dtg(t9 7) A [fW (s dlgo) d7, that is, an integral is inside all integrals to its left unlessa multiplication is specifically indicated by parentheses. 6. E[*] denotes the statistical expectation of the quantity in the bracket. The overbar x is also used infrequently to denote expectation. 7. The symbol @ denotes convolution. CD x(t) @ y(t) A x(t - 7)YW d7 s-a3 8. Random variables are lower case (e.g., x and x). Values of random variables and nonrandom parameters are capita1 (e.g., X and X). In some estimation theory problems much of the discussion is valid for both ran- dom and nonrandom parameters. Here we depart from the above con- ventions to avoid repeating each equation. 605 9. The probability density of x is denoted by p,() and the probability distribution by I?&).
    [Show full text]
  • Gaol 4.2.0 NOT Just Another Interval Arithmetic Library
    Gaol 4.2.0 NOT Just Another Interval Arithmetic Library Edition 4.4 Last updated 21 May 2015 Frédéric Goualard Laboratoire d’Informatique de Nantes-Atlantique, France Copyright © 2001 Swiss Federal Institute of Technology, Switzerland Copyright © 2002-2015 LINA UMR CNRS 6241, France gdtoa() and strtord() are Copyright © 1998 by Lucent Technologies All Trademarks, Copyrights and Trade Names are the property of their re- spective owners even if they are not specified below. Part of the work was done while Frédéric Goualard was a postdoctorate at the Swiss Federal Institute of Technology, Lausanne, Switzerland supported by the European Research Consortium for Informatics and Mathematics fellowship programme. This is edition 4.4 of the gaol documentation. It is consistent with version 4.2.0 of the gaol library. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. GAOL IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT- NESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS SOFTWARE IS WITH YOU. SHOULD THIS SOFTWARE PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. Recipriversexcluson. n. A number whose existence can only be defined as being anything other than itself. Douglas Adams, Life, the Universe and Everything Contents Copyright vii 1 Introduction1 2 Installation3 2.1 Getting the software........................3 2.2 Installing gaol from the source tarball on Unix and Linux...3 2.2.1 Prerequisites........................3 2.2.2 Configuration........................5 2.2.3 Building...........................7 2.2.4 Installation.........................7 3 An overview of gaol9 3.1 The trust rounding mode....................
    [Show full text]
  • Professor Higgins's Problem Collection
    PROFESSOR HIGGINS’S PROBLEM COLLECTION Professor Higgins’s Problem Collection PETER M. HIGGINS 3 3 Great Clarendon Street, Oxford, OX2 6DP, United Kingdom Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide. Oxford is a registered trade mark of Oxford University Press in the UK and in certain other countries © Peter M. Higgins 2017 The moral rights of the author have been asserted First Edition published in 2017 Impression: 1 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, by licence or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above You must not circulate this work in any other form and you must impose this same condition on any acquirer Published in the United States of America by Oxford University Press 198 Madison Avenue, New York, NY 10016, United States of America British Library Cataloguing in Publication Data Data available Library of Congress Control Number: 2016957995 ISBN 978–0–19–875547–0 Printed and bound by CPI Litho (UK) Ltd, Croydon, CR0 4YY Links to third party websites are provided by Oxford in good faith and for information only. Oxford disclaims any responsibility for the materials contained in any third party website referenced in this work.
    [Show full text]
  • Tennessee Curriculum Standards and EXPLORE, PLAN, and The
    STATE MATCH Tennessee Curriculum Standards English/Language Arts, Mathematics, and Science Grades 7–12 and EXPLORE, PLAN, and the ACT May 2006 ©2006 by ACT, Inc. All rights reserved. About This Report EXECUTIVE SUMMARY (pp. 1–2) This portion summarizes the findings of the alignment between ACT’s Educa- tional Planning and Assessment System (EPAS™) tests—EXPLORE® (8th, and 9th grades); PLAN® (10th grade); and the ACT® (11th and 12th grades)—and Tennessee’s Curriculum Standards. It also presents ACT's involvement in meeting NCLB requirements and describes additional critical information that ACT could provide to Tennessee. SECTION A (pp. 3–8) This section provides tables by content area (English/Language Arts, Mathe- matics, and Science) listing the precise number of Tennessee Curriculum Standards measured by ACT’s EPAS tests by grade level. SECTION B (pp. 9–97) All Tennessee Curriculum Standards are listed here; each one highlighted is measured by ACT’s EPAS tests. Tennessee standards listed here are from the Tennessee Curriculum Standards as presented on the Tennessee Department of Education’s website in April 2006. Underlined science content indicates that the content topics are included in, but not directly measured by, ACT’s EPAS Science Tests. SECTION C (pp. 99–108) ACT’s College Readiness Standards appear here. Highlighting indicates that a statement reflects one or more statements in the Tennessee Curriculum Standards. College Readiness Standards not highlighted are not addressed in the Tennessee Curriculum Standards. A supplement is available that identifies the specific ACT Col- lege Readiness Standard(s) corresponding to each Tennessee Curriculum Standard in a side-by-side format.
    [Show full text]
  • Remarks About the Square Equation. Functional Square Root of a Logarithm
    M A T H E M A T I C A L E C O N O M I C S No. 12(19) 2016 REMARKS ABOUT THE SQUARE EQUATION. FUNCTIONAL SQUARE ROOT OF A LOGARITHM Arkadiusz Maciuk, Antoni Smoluk Abstract: The study shows that the functional equation f (f (x)) = ln(1 + x) has a unique result in a semigroup of power series with the intercept equal to 0 and the function composition as an operation. This function is continuous, as per the work of Paulsen [2016]. This solution introduces into statistics the law of the one-and-a-half logarithm. Sometimes the natural growth processes do not yield to the law of the logarithm, and a double logarithm weakens the growth too much. The law of the one-and-a-half logarithm proposed in this study might be the solution. Keywords: functional square root, fractional iteration, power series, logarithm, semigroup. JEL Classification: C13, C65. DOI: 10.15611/me.2016.12.04. 1. Introduction If the natural logarithm of random variable has normal distribution, then one considers it a logarithmic law – with lognormal distribution. If the func- tion f being function composition to itself is a natural logarithm, that is f (f (x)) = ln(1 + x), then the function ( ) = (ln( )) applied to a random variable will give a new distribution law, which – similarly as the law of logarithm – is called the law of the one-and -a-half logarithm. A square root can be defined in any semigroup G. A semigroup is a non- empty set with one combined operation and a neutral element.
    [Show full text]
  • Nonlinear Feedback Control on Herd Behaviour Prey-Predator Model Affected by Toxic Substance
    INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 02, FEBRUARY 2020 ISSN 2277-8616 Nonlinear Feedback Control On Herd Behaviour Prey-Predator Model Affected By Toxic Substance Vijayalakshmi. G.M , Shiva Reddy. K, Ranjith Kumar.G Abstract: We have explored a mathematical predator-prey harvested model with a functional square root response in which both the species are infected by some environmental toxicants. The hypothesis of Catch-per-unit-effort was used on the both harvested species. In the predator system, prey species takes various survival mechanism to avoid predators. Because of this, the interaction concept is proportional to the square root of the prey population, which accurately models the process where the prey shows powerful herd structure showing that the predator commonly connects with the prey along the herd's outer corridor. The complex behaviour of the system is examined. We have considered the possible existence of equilibrium points. Several numerical examples have been discussed in order to reinforce the outcomes of the theoretical analysis. Index Terms: Predator, prey, Herd behaviour, Toxicity, Catch per unit effort, Stability, Harvesting. —————————— —————————— 1 INTRODUCTION The classical predator-prey model of interacting populations The functional response of Type II is hyperbolic and inversely has been investigated extensively in this paper. Due to density-dependent as consumption rates grow to a upper environmental toxicants such as electronic waste, industrial asymptote at a decelerating rate, indicating higher costs or waste, bio-medical waste etc..., the investigation on the constraints associated with higher ingestion rates (Hassell predator-prey interactions with harvesting becomes a 1978). Most multi-species models use functional responses of significant role in modelling mathematics.
    [Show full text]
  • (Rusin) HW11 – Comments
    M365C (Rusin) HW11 { comments 1. Let g(x) = log(f(x)). Then g is continuous and g(x + y) = g(x) + g(y) for any x and y, so this is essentially the same situation as the question on the last exam: g(x) = cx where c = g(1). Or you could recreate the spirit of that proof: let c = log(f(1)) and then prove f(x) = exp(cx) first for x 2 N, then for x 2 Z, then for x 2 Q, then (using continuity) for x 2 R. 2. I wanted you to use the fact that ab has been defined to mean exp(b log(a)), so we are computing the limit of exp(log(1 + x)=x). Since exp is continuous, this is the same as exp(limx!0 log(1 + x)=x). We may compute that inner limit using L'H^opital's Rule; it is 1. (You could also use the definition of the logarithm function to show that for R 1+x R 1+x R 1+x x ≥ 0, log(1 + x) = 1 (1=t) dt ≤ 1 1 dt = x and log(1 + x) = 1 (1=t) dt ≥ R 1+x 1 1=(1 + x) dt = x=(1 + x), so the inner limit is 1 by the squeeze theorem, at least as x ! 0+. Similar inequalities show the other one-sided limit is also 1. 3. Just as we defined the logarithm as a certain integral, let us define a function A : R ! R by ( R 1 [0;x] 1+t2 dt if x ≥ 0 A(x) = R 1 − [x;0] 1+t2 dt if x < 0 (a) Of course A(0) = 0 because the interval [0; 0] has a width of zero! The fact that A(−x) = −A(x) follows from the substitution u = −t.
    [Show full text]
  • 1. Super-Functions the Functional Equation F(Z+1)
    MATHEMATICS OF COMPUTATION Volume 79, Number 271, July 2010, Pages 1727–1756 S 0025-5718(10)02342-2 Article electronically published on February 12, 2010 PORTRAIT OF THE FOUR REGULAR SUPER-EXPONENTIALS TO BASE SQRT(2) DMITRII KOUZNETSOV AND HENRYK TRAPPMANN Abstract. We introduce the concept of regular super-functions at a fixed point. It is derived from the concept of regular iteration. A super-function F of h is a solution of F(z+1)=h(F(z)). We provide a condition for F being entire, we also give two uniqueness criteria for regular super-functions. In the particular case h(x)=bˆx we call F super-exponential. h has two real fixed points for b between 1 and eˆ(1/e). Exemplary we choose the base b=sqrt(2) and portray the four classes of real regular super-exponentials in the complex plane. There are two at fixed point 2 and two at fixed point 4. Each class is given by the translations along the x-axis of a suitable representative. Both super-exponentials at fixed point 4—one strictly increasing and one strictly decreasing—are entire. Both super-exponentials at fixed point 2— one strictly increasing and one strictly decreasing—are holomorphic on a right half-plane. All four super-exponentials are periodic along the imaginary axis. Only the strictly increasing super-exponential at 2 can satisfy F(0)=1 and can hence be called tetrational. We develop numerical algorithms for the precise evaluation of these func- tions and their inverses in the complex plane. We graph the two corresponding different half-iterates of h(z)=sqrt(2)ˆz.
    [Show full text]
  • Partial Iterates for Symmetrizing Non-Parametric Color Correction ⇑ Bruno Vallet ,1, Lâmân Lelégard 1
    ISPRS Journal of Photogrammetry and Remote Sensing 82 (2013) 93–101 Contents lists available at SciVerse ScienceDirect ISPRS Journal of Photogrammetry and Remote Sensing journal homepage: www.elsevier.com/locate/isprsjprs Partial iterates for symmetrizing non-parametric color correction ⇑ Bruno Vallet ,1, Lâmân Lelégard 1 Université Paris Est, IGN, MATIS, 73 avenue de Paris, 94165 Saint-Mandé Cedex, France article info abstract Article history: Mosaic generation is a central tool in various fields ranging way beyond the scope of photogrammetry Received 3 July 2012 and requires the radiometry and color of the images to be corrected. Correction can either be done by Received in revised form 13 May 2013 a global parametric approach (looking for an optimal gain or gamma for each image of the mosaic), or Accepted 15 May 2013 by iteratively correcting image pairs with a non-parametric approach. Such non-parametric approaches Available online 11 June 2013 allow for much finer correction but are asymmetric, i.e. they require the choice of a source image that will be corrected to match a target image. Thus the result on the whole mosaic will be very dependant on the Keywords: order in which images are corrected. In this paper, we propose to use partial iterates to symmetrize non- Mosaic parametric correction in order to solve this problem. Partial iterates formalize what partially applying a Color correction Radiometry bijective function means and we explain how this can be done in both the continuous and discrete Fusion domain. This mechanism is applied to a simple non-parametric approach (histogram transfer of the lumi- Image nance) to show its potential.
    [Show full text]
  • Perspectives and Problems in Nonlinear Science
    This is page i Printer: Opaque this Perspectives and Problems in Nonlinear Science A Celebratory Volume in Honour of Larry Sirovich This is page ii Printer: Opaque this This is page iii Printer: Opaque this Perspectives and Problems in Nonlinear Science A Celebratory Volume in Honour of Larry Sirovich Editors: Ehud Kaplan, Jerry Marsden, and Katepalli Sreenivasan This is page iv Printer: Opaque this Ehud Kaplan Jules and Doris Stein Research-to-Prevent-Blindness Professor Departments of Ophthalmology, Physiology & Medicine Ney York, NY 10029, USA [email protected] Jerrold Marsden Control and Dynamical Systems California Institute of Technology Pasadena, CA 91125–8100, USA [email protected] Katepalli R. Sreenivasan Distinguished University Professor Glenn L. Martin Professor of Engineeering Institute of Physical Sciences and Technology University of Maryland College Park, MD 20742, USA [email protected] Cover Illustration: Permission has been granted for use of . The photo is of . It was taken while . The photograph of . on page v was taken by photographer . Mathematics Subject Classification (2000), IP data to come ISBN Printed on acid-free paper. c 2002 by Springer-Verlag New York, Inc. All rights reserved. This work may not be translated or copied in whole or in part with- out the written permission of the publisher (Springer-Verlag New York, Inc., 175 Fifth Avenue, New York, NY 10010, USA), except for brief excerpts in connection with reviews or schol- arly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or here- after developed is forbidden.
    [Show full text]