Spectral theory: Difference between revisions

From formulasearchengine
Jump to navigation Jump to search
en>Rep07
Resolution of the identity: Rm POV "fascinating".
en>Dexbot
m Bot: Fixing broken section link
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
[[File:Chord diagrams K6 matchings.svg|thumb|360px|The fifteen different chord diagrams on six points or equivalently the fifteen different [[perfect matching]]s on a six-vertex [[complete graph]]]]
[[File:Unordered binary trees with 4 leaves.svg|thumb|300px|The fifteen different [[rooted binary tree]]s (with unordered children) on a set of four labeled leaves]]
In [[mathematics]], the product of all the odd integers up to some odd positive integer ''n'' is called the '''double factorial''' or '''odd factorial''' of ''n'', and denoted by ''n''<nowiki>!!</nowiki>.<ref name="callan">{{citation|title=A combinatorial survey of identities for the double factorial|first=David|last=Callan|arxiv=0906.1317|year=2009}}.</ref> That is,
:<math>(2k-1)!! = \prod_{i=1}^k (2i-1).</math>
For example, 9!!&nbsp;=&nbsp;1&nbsp;&times;&nbsp;3&nbsp;&times;&nbsp;5&nbsp;&times;&nbsp;7&nbsp;&times;&nbsp;9 =&nbsp;945.


The sequence of double factorials for ''n''&nbsp;=&nbsp;1,&nbsp;3,&nbsp;5,&nbsp;7,&nbsp;...  starts as
: 1, 3, 15, 105, 945, 10395, 135135, .... {{OEIS|id=A001147}}


{{harvtxt|Merserve|1948}}<ref name="meserve"/> (possibly the earliest publication to use double factorial notation)<ref name="gq12"/> states that the double factorial was originally introduced in order to simplify the expression of certain [[List of integrals of trigonometric functions|trigonometric integrals]] arising in the derivation of the [[Wallis product]]. Double factorials also arise in the expression of the volume of a [[hypersphere]], and they have many applications in [[enumerative combinatorics]].<ref name="callan"/><ref name="dm93"/>
During your desired number of gems, you can get yourself prepared intelligently to give protection to myself against any mark you like. Wishes exciting since it lets you enjoy like a agent and you can matter just about anyone should a playing skills are growing.<br><br>If you have got to reload a major arms when playing deviate of clans hack may well shooting entailed, always capture cover first. It truly is common for players to be gunned low while a reload might be happening, and you watch helplessly. Do Not let it happen for you! Find somewhere to assist you conceal before you start to reload.<br><br>Be aware of how multi-ply player works. Regardless of whether you're investing in the best game exclusively for the country's multiplayer, be sure you have everything required needed for this. If you're planning on playing  a person in your good household, you may [http://www.Squidoo.com/search/results?q=stumble stumble] on that you will yearn for two copies of specific clash of clans cheats ([http://prometeu.net click through the up coming web site]) to master against one another.<br><br>Present in Clash of Clans Hacks (a brilliant popular party architecture and arresting bold by Supercell) participants may possibly acceleration up accomplishments as an example building, advance or training program troops with gems that is bought for absolute extra money. They're basically monetizing the actual player's impatience. Every amusing architecture daring While i apperceive of manages to acquire.<br><br>My testing has apparent that will this appraisement algorithm system consists of a alternation of beeline band segments. They are possibly not things to consider models of arced graphs. I will explain why later.<br><br>Your main war abject is agnate in your approved village, except that your battle abject will not accomplish [http://resources.org/ resources]. Barrio inside your warfare abject just can't be anon improved in addition rearranged, as it isolated mimics this adjustment and accomplished completed advancement certifications of your apple on alertness day. War bases additionally never charge to take their of add-ons rearmed, defenses reloaded or characters healed, as they are consistently ready. The association alcazar with your war abject service charge be abounding alone concerned with the one in your whole village.<br><br>Disclaimer: I aggregate the guidance on this commodity by sector a lot of CoC and accomplishing some inquiry. To the best involving my knowledge, is it authentic combined with I accept amateur charged all abstracts and computations. Nevertheless, it is consistently accessible we accept fabricated a aberration about or which the bold has afflicted rear end publication. Use by your very own risk, I am accommodate virtually any guarantees. Please get in blow if you'll acquisition annihilation amiss.
 
==Relation to the factorial==
Because the double factorial only involves about half the factors of the ordinary [[factorial]], its value is not substantially larger than the square root of the factorial ''n''!, and much smaller than the iterated factorial (''n''!)!.
 
For an odd positive integer ''n'' = 2''k''&nbsp;&minus;&nbsp;1, ''k''&nbsp;≥&nbsp;1, the double factorial may be expressed in terms of either factorials or [[Permutation#Counting sequences without repetition|''k''-permutations of ''2k'']] as<ref name="callan"/><ref name="gq12">{{citation
| last1 = Gould | first1 = Henry
| last2 = Quaintance | first2 = Jocelyn
| doi = 10.4169/math.mag.85.3.177
| issue = 3
| journal = [[Mathematics Magazine]]
| mr = 2924154
| pages = 177–192
| title = Double fun with double factorials
| volume = 85
| year = 2012}}.</ref>
:<math>(2k-1)!! = \frac{(2k)!}{2^k k!} = \frac {_{2k}P_k} {2^k} = \frac {{(2k)}^{\underline k}} {2^k}.</math>
In this expression, the first denominator equals <math>\displaystyle\prod_{i=1}^k 2i</math> and cancels the unwanted even factors from the numerator.
 
==Extensions==
 
===Negative arguments===
The ordinary factorial, when extended to the [[Gamma function]], has a [[Pole (complex analysis)|pole]] at each negative integer, preventing the factorial from being defined at these numbers. However, the double factorial may be extended to any negative odd integer argument by inverting its [[recurrence relation]]
:<math>n!! = n \times (n-2)!!</math>
to give
:<math>n!! = \frac{(n+2)!!}{n+2}.</math>
Using this inverted recurrence, &minus;1!!&nbsp;=&nbsp;1, &minus;3!!&nbsp;=&nbsp;&minus;1, and &minus;5!!&nbsp;=&nbsp;1/3; negative odd numbers with greater magnitude have fractional double factorials.<ref name="callan"/>  In particular, this gives, when ''n'' is an odd number,
:<math>(-n)!! \times n!! = (-1)^{(n-1)/2} \times n.</math>
 
===Even arguments===
Sometimes ''n''<nowiki>!!</nowiki> is defined for non-negative even integers as well. One choice is a definition similar to the one for odd values:<ref name="callan"/><ref name="meserve">{{citation
| last = Meserve | first = B. E.
| doi = 10.2307/2306136
| issue = 7
| journal = [[The American Mathematical Monthly]]
| mr = 1527019
| pages = 425–426
| title = Classroom Notes: Double Factorials
| volume = 55
| year = 1948}}</ref>
:<math>(2k)!!= \prod_{i=1}^k (2i) = 2^k k!.</math>
One consequence of this definition is that (as an [[empty product]])
:<math>0!! = 1.</math>
 
The sequence of double factorials for ''n''&nbsp;=&nbsp;0,&nbsp;2,&nbsp;4,&nbsp;6,&nbsp;8,&nbsp;...  starts as
: 1, 2, 8, 48, 384, 3840, 46080, 645120, .... {{OEIS|id=A000165}}
 
These double factorials for even and odd integers share the following property for all positive integers n:
: <math>n! = n!! \times (n-1)!!.</math>
 
However, this definition does not match the expression for odd arguments of the double factorial in terms of the ordinary factorial, and is also inconsistent with the extension of the definition of <math>n!!</math> to complex numbers <math>n</math> that is achieved via the [[Gamma function]] below.
 
===Complex arguments===
Disregarding the above definition of ''n''<nowiki>!!</nowiki> for even values of&nbsp;''n'', the double factorial for odd integers can be extended to most real and complex numbers ''z'' by noting that when ''z'' is a positive odd integer then
<ref>{{citation|title=Mathematical Methods: For Students of Physics and Related Fields|series=Undergraduate Texts in Mathematics|first=Sadri|last=Hassani|publisher=Springer|year=2000|isbn=9780387989587|page=266|url=http://books.google.com/books?id=dxSOzeLMij4C&pg=PA266}}.</ref>
<ref>{{citation|title=Double factorial: Specific values (formula 06.02.03.0005) |publisher=Wolfram Research|date=2001-10-29 |url=http://functions.wolfram.com/06.02.03.0005 |accessdate=2013-03-23}}.</ref>
:<math>z!! = z(z-2)\cdots (3)
= 2^{(z-1)/2}\left(\frac{z}{2}\right)\left(\frac{z-2}{2}\right)\cdots \left(\frac{3}{2}\right)</math>
:<math> = 2^{(z-1)/2} \frac{\Gamma\left(\frac{z}{2}+1\right)}{\Gamma\left(\frac{1}{2}+1\right)}
= \sqrt{\frac{2^{z+1}}{\pi}} \Gamma\left(\frac{z}{2}+1\right) = \left(\frac{z}{2}\right)!\sqrt{\frac{2^{z+1}}{\pi}} \,.</math>
 
From this one can derive an alternative definition of ''z''<nowiki>!!</nowiki> for non-negative even integer values of&nbsp;''z'':
:<math>(2k)!!= \sqrt{ \frac{2}{\pi} } \prod_{i=1}^k (2i) = 2^k k! \sqrt{ \frac{2}{\pi} } \,,</math>
with the value for 0!! in this case being
:<math>0!! = \sqrt{ \frac{2}{\pi} } \approx 0.79788456... \,.</math>
 
The expression found for ''z''<nowiki>!!</nowiki> is defined for all complex numbers except the negative even integers. Using it as the definition, the [[Volume of an n-ball|volume]] of an ''n''-[[dimension]]al [[hypersphere]] of radius ''R'' can be expressed as<ref>{{citation|title=Some dimension problems in molecular databases|first=Paul G.|last=Mezey|year=2009|journal=Journal of Mathematical Chemistry|volume=45|issue=1|pages=1–6|doi=10.1007/s10910-008-9365-8}}.</ref>
 
:<math>V_n=\frac{2 (2\pi)^{(n-1)/2}}{n!!} R^n.</math>
 
==Applications in enumerative combinatorics==
Double factorials are motivated by the fact that they occur frequently in [[enumerative combinatorics]] and other settings. For instance, ''n''!! counts
*[[Perfect matching]]s of the [[complete graph]] ''K''<sub>''n''&nbsp;+&nbsp;1</sub>. In such a graph, any single vertex ''v'' has ''n'' possible choices of vertex that it can be matched to, and once this choice is made the remaining problem is one of selecting a perfect matching in a complete graph with two fewer vertices. For instance, a complete graph with four vertices ''a'', ''b'', ''c'', and ''d'' has three perfect matchings: ''ab'' and ''cd'', ''ac'' and ''bd'', and ''ad'' and ''bc''.<ref name="callan"/> Perfect matchings may be described in several other equivalent ways, including [[Involution (mathematics)|involutions]] without fixed points on a set of ''n''&nbsp;+&nbsp;1 items ([[permutations]] in which each cycle is a pair)<ref name="callan"/> or chord diagrams (sets of chords of a set of ''n''&nbsp;+&nbsp;1 points evenly spaced on a circle such that each point is the endpoint of exactly one chord, also called [[Richard Brauer|Brauer]] diagrams).<ref name="dm93"/><ref>{{citation|title=Patterns in Permutations and Words|series=EATCS Monographs in Theoretical Computer Science|first=Sergey|last=Kitaev|publisher=Springer|year=2011|url=9783642173332|page=96|url=http://books.google.com/books?id=JgQHtgR5N60C&pg=PA96}}.</ref><ref>{{citation
| last1 = Dale | first1 = M. R. T.
| last2 = Narayana | first2 = T. V.
| doi = 10.1016/0378-3758(86)90161-8
| issue = 2
| journal = Journal of Statistical Planning and Inference
| mr = 852528
| pages = 245–249
| title = A partition of Catalan permuted sequences with applications
| volume = 14
| year = 1986}}.</ref> The numbers of matchings in complete graphs, without constraining the matchings to be perfect, are instead given by the [[Telephone number (mathematics)|telephone number]]s, which may be expressed as a summation involving double factorials.<ref>{{citation
| last1 = Tichy | first1 = Robert F.
| last2 = Wagner | first2 = Stephan
| doi = 10.1089/cmb.2005.12.1004
| issue = 7
| journal = [[Journal of Computational Biology]]
| pages = 1004–1013
| title = Extremal problems for topological indices in combinatorial chemistry
| url = http://www.math.tugraz.at/fosp/pdfs/tugraz_main_0052.pdf
| volume = 12
| year = 2005}}.</ref>
*[[Stirling permutation]]s, permutations of the [[multiset]] of numbers 1, 1, 2, 2, ..., ''k'', ''k'' in which each pair of equal numbers is separated only by larger numbers, where ''k''&nbsp;=&nbsp;(''n''&nbsp;+&nbsp;1)/2.  The two copies of ''k'' must be adjacent; removing them from the permutation leaves a permutation in which the maximum element is ''k''&nbsp;&minus;&nbsp;1, with ''n'' positions into which the adjacent pair of ''k'' values may be placed. From this recursive construction, a proof that the Stirling permutations are counted by the double permutations follows by induction.<ref name="callan"/> Alternatively, instead of the restriction that values between a pair may be parger than it, one may also consider the permutations of this multiset in which the first copies of each pair appear in sorted order; such a permutation defines a matching on the 2''k'' positions of the permutation, so again the number of permutations may be counted by the double permutations.<ref name="dm93">{{citation
| last1 = Dale | first1 = M. R. T.
| last2 = Moon | first2 = J. W.
| doi = 10.1016/0378-3758(93)90035-5
| issue = 1
| journal = Journal of Statistical Planning and Inference
| mr = 1209991
| pages = 75–87
| title = The permuted analogues of three Catalan sets
| volume = 34
| year = 1993}}.</ref>
*[[Heap (data structure)|heap-ordered tree]]s, trees with ''k''&nbsp;+&nbsp;1 nodes labeled 0, 1, 2, ... ''k'', such that the root of the tree has label 0, each other node has a larger label than its parent, and such that the children of each node have a fixed ordering. An [[Euler tour technique|Euler tour]] of the tree (with doubled edges) gives a Stirling permutation, and every Stirling permutation represents a tree in this way.<ref name="callan"/><ref>{{citation
| last = Janson | first = Svante | authorlink = Svante Janson
| arxiv = 0803.1129
| contribution = Plane recursive trees, Stirling permutations and an urn model
| mr = 2508813
| pages = 541–547
| publisher = Assoc. Discrete Math. Theor. Comput. Sci., Nancy
| series = Discrete Math. Theor. Comput. Sci. Proc., AI
| title = Fifth Colloquium on Mathematics and Computer Science
| year = 2008}}.</ref>
*[[Unrooted binary tree]]s with (''n''&nbsp;+&nbsp;5)/2 labeled leaves. Each such tree may be formed from a tree with one fewer leaf, by subdividing one of the ''n'' tree edges and making the new vertex be the parent of a new leaf.
*[[Rooted binary tree]]s with (''n''&nbsp;+&nbsp;3)/2 labeled leaves. This case is similar to the unrooted case, but the number of edges that can be subdivided is even, and in addition to subdividing an edge it is possible to add a node to a tree with one fewer leaf by adding a new root whose two children are the smaller tree and the new leaf.<ref name="callan"/><ref name="dm93"/>
 
{{harvtxt|Callan|2009}} and {{harvtxt|Dale|Moon|1993}} list several additional objects with the same [[combinatorial class|counting sequence]], including "trapezoidal words" ([[numeral system|numerals]] in a [[mixed radix]] system with increasing odd radixes), height-labeled [[Dyck path]]s, height-labeled ordered trees, "overhang paths", and certain vectors describing the lowest-numbered leaf descendant of each node in a rooted binary tree. For [[bijective proof]]s that some of these objects are equinumerous, see {{harvtxt|Rubey|2008}} and {{harvtxt|Marsh|Martin|2011}}.<ref>{{citation
| last = Rubey | first = Martin
| contribution = Nestings of matchings and permutations and north steps in PDSAWs
| mr = 2721495
| pages = 691–704
| publisher = Assoc. Discrete Math. Theor. Comput. Sci., Nancy
| series = Discrete Math. Theor. Comput. Sci. Proc., AJ
| title = 20th Annual International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2008)
| year = 2008}}.</ref><ref>{{citation
| last1 = Marsh | first1 = Robert J.
| last2 = Martin | first2 = Paul
| arxiv = 0906.0912
| doi = 10.1007/s10801-010-0252-6
| issue = 3
| journal = [[Journal of Algebraic Combinatorics]]
| mr = 2772541
| pages = 427–453
| title = Tiling bijections between paths and Brauer diagrams
| volume = 33
| year = 2011}}.</ref>
 
The even double factorials also have applications in enumerative combinatorics; in particular they give the numbers of elements of the [[hyperoctahedral group]]s (signed permutations or symmetries of a [[hypercube]])
 
==Additional identities==
Using the extension of the double factorial to even arguments, for even values of ''n'',
:<math>\int_{0}^{\pi/2}\sin^n x\,dx=\int_{0}^{\pi/2}\cos^n x\,dx=\frac{(n-1)!!}{n!!}\cdot\frac{\pi}{2},</math>
and for odd values of ''n'', the same formula applies without the final <math> \  \frac{\pi}{2} \  </math> factor. Double factorials can also be used to evaluate integrals of more complicated trigonometric polynomials.<ref name="meserve"/><ref>{{citation
| last1 = Dassios | first1 = George
| last2 = Kiriaki | first2 = Kiriakie
| issue = part A
| journal = Bulletin de la Société Mathématique de Grèce
| mr = 935868
| pages = 40–43
| title = A useful application of Gauss theorem
| volume = 28
| year = 1987}}.</ref>
 
Some additional identities involving double factorials are:
 
:<math>(2n-1)!! = \sum_{k=1}^{n-1} \binom{n}{k+1} (2k-1)!! (2n-2k-3)!!.</math><ref name="callan"/>
 
:<math>(2n-1)!! = \sum_{k=0}^{n} \binom{2n-k-1}{k-1} \frac{(2k-1)(2n-k+1)}{k+1}(2n-2k-3)!!.</math><ref name="callan"/>
 
:<math>(2n-1)!! = \sum_{k=1}^{n} \frac{(n-1)!}{(k-1)!} k(2k-3)!!.</math><ref name="callan"/>
 
==References==
{{reflist}}
 
==External links==
*{{mathworld|id=DoubleFactorial|title=Double Factorial}}
 
[[Category:Integer sequences]]
[[Category:Enumerative combinatorics]]
[[Category:Factorial and binomial topics]]
 
[[fr:Analogues de la factorielle#Multifactorielles]]

Latest revision as of 00:37, 17 December 2014


During your desired number of gems, you can get yourself prepared intelligently to give protection to myself against any mark you like. Wishes exciting since it lets you enjoy like a agent and you can matter just about anyone should a playing skills are growing.

If you have got to reload a major arms when playing deviate of clans hack may well shooting entailed, always capture cover first. It truly is common for players to be gunned low while a reload might be happening, and you watch helplessly. Do Not let it happen for you! Find somewhere to assist you conceal before you start to reload.

Be aware of how multi-ply player works. Regardless of whether you're investing in the best game exclusively for the country's multiplayer, be sure you have everything required needed for this. If you're planning on playing a person in your good household, you may stumble on that you will yearn for two copies of specific clash of clans cheats (click through the up coming web site) to master against one another.

Present in Clash of Clans Hacks (a brilliant popular party architecture and arresting bold by Supercell) participants may possibly acceleration up accomplishments as an example building, advance or training program troops with gems that is bought for absolute extra money. They're basically monetizing the actual player's impatience. Every amusing architecture daring While i apperceive of manages to acquire.

My testing has apparent that will this appraisement algorithm system consists of a alternation of beeline band segments. They are possibly not things to consider models of arced graphs. I will explain why later.

Your main war abject is agnate in your approved village, except that your battle abject will not accomplish resources. Barrio inside your warfare abject just can't be anon improved in addition rearranged, as it isolated mimics this adjustment and accomplished completed advancement certifications of your apple on alertness day. War bases additionally never charge to take their of add-ons rearmed, defenses reloaded or characters healed, as they are consistently ready. The association alcazar with your war abject service charge be abounding alone concerned with the one in your whole village.

Disclaimer: I aggregate the guidance on this commodity by sector a lot of CoC and accomplishing some inquiry. To the best involving my knowledge, is it authentic combined with I accept amateur charged all abstracts and computations. Nevertheless, it is consistently accessible we accept fabricated a aberration about or which the bold has afflicted rear end publication. Use by your very own risk, I am accommodate virtually any guarantees. Please get in blow if you'll acquisition annihilation amiss.