Sample Paper for the amsmath Package
File name: testmath.tex
1 Introduction
This paper contains examples of various features from AmS-LaTeX.
2 Enumeration of Hamiltonian paths in a graph
Let be the adjacency matrix of graph . The corresponding Kirchhoff matrix is obtained from by replacing in each diagonal entry by the degree of its corresponding vertex; i.e., the th diagonal entry is identified with the degree of the th vertex. It is well known that
| (1) |
where is the th principal submatrix of .
\det\mathbf{K}(i|i)=\text{ the number of spanning trees of $G$},
Let be the set of graphs obtained from by attaching edge to each spanning tree of . Denote by . It is obvious that the collection of Hamiltonian cycles is a subset of . Note that the cardinality of is . Let .
$\wh X=\{\hat x_1,\dots,\hat x_n\}$
Define multiplication for the elements of by
| (2) |
Let and . Then the number of Hamiltonian cycles is given by the relation [8]
| (3) |
The task here is to express (3) in a form free of any , . The result also leads to the resolution of enumeration of Hamiltonian paths in a graph.
It is well known that the enumeration of Hamiltonian cycles and paths in a complete graph and in a complete bipartite graph can only be found from first combinatorial principles [4]. One wonders if there exists a formula which can be used very efficiently to produce and . Recently, using Lagrangian methods, Goulden and Jackson have shown that can be expressed in terms of the determinant and permanent of the adjacency matrix [3]. However, the formula of Goulden and Jackson determines neither nor effectively. In this paper, using an algebraic method, we parametrize the adjacency matrix. The resulting formula also involves the determinant and permanent, but it can easily be applied to and . In addition, we eliminate the permanent from and show that can be represented by a determinantal function of multivariables, each variable with domain . Furthermore, we show that can be written by number of spanning trees of subgraphs. Finally, we apply the formulas to a complete multigraph .
The conditions , , are not required in this paper. All formulas can be extended to a digraph simply by multiplying by 2.
3 Main Theorem
Notation.
For and we write if and .
\begin{notation} For $p,q\in P$ and $n\in\omega$
...
\end{notation}
Let be an matrix. Let . Using the properties of (2), it is readily seen that
Lemma 3.1.
| (4) |
where is the permanent of .
Let . Define multiplication for the elements of by
| (5) |
Then, it follows that
Lemma 3.2.
| (6) |
Note that all basic properties of determinants are direct consequences of Lemma 3.2. Write
| (7) |
where
| (8) |
Let . By (6) and (7), it is straightforward to show the following result:
Theorem 3.3.
| (9) |
where and is the principal submatrix obtained from by deleting its rows and columns.
Remark 3.1.
Let be an matrix. The convention has been used in (9) and hereafter.
Before proceeding with our discussion, we pause to note that Theorem 3.3 yields immediately a fundamental formula which can be used to compute the coefficients of a characteristic polynomial [9]:
Corollary 3.4.
Write . Then
| (10) |
Let
| (11) |
\begin{pmatrix} D_1t&-a_{12}t_2&\dots&-a_{1n}t_n\\
-a_{21}t_1&D_2t&\dots&-a_{2n}t_n\\
\hdotsfor[2]{4}\\
-a_{n1}t_1&-a_{n2}t_2&\dots&D_nt\end{pmatrix}
where
| (12) |
Set
Then
| (13) |
where is the th principal submatrix of .
Let . Lemma 3.1 yields
| (16) |
\begin{multline}
\biggl(\sum_{\,i\in\mathbf{n}}a_{l _i}x_i\biggr)
\det\mathbf{K}(t=1,x_1,\dots,x_n;l |l )\\
=\biggl(\prod_{\,i\in\mathbf{n}}\hat x_i\biggr)
\sum_{I\subseteq\mathbf{n}-\{l \}}
(-1)^{\envert{I}}\per\mathbf{A}^{(\lambda)}(I|I)
\det\mathbf{A}^{(\lambda)}
(\overline I\cup\{l \}|\overline I\cup\{l \}).
\label{sum-ali}
\end{multline}
Proposition 3.5.
| (17) |
where
| (18) |
4 Application
5 Secret Key Exchanges
Modern cryptography is fundamentally concerned with the problem of secure private communication. A Secret Key Exchange is a protocol where Alice and Bob, having no secret information in common to start, are able to agree on a common secret key, conversing over a public channel. The notion of a Secret Key Exchange protocol was first introduced in the seminal paper of Diffie and Hellman [1]. [1] presented a concrete implementation of a Secret Key Exchange protocol, dependent on a specific assumption (a variant on the discrete log), specially tailored to yield Secret Key Exchange. Secret Key Exchange is of course trivial if trapdoor permutations exist. However, there is no known implementation based on a weaker general assumption.
The concept of an informationally one-way function was introduced in [5]. We give only an informal definition here:
Definition 5.1.
A polynomial time computable function is informationally one-way if there is no probabilistic polynomial time algorithm which (with probability of the form for some ) returns on input a random element of .
In the non-uniform setting [5] show that these are not weaker than one-way functions:
Theorem 5.1 ([5] (non-uniform)).
The existence of informationally one-way functions implies the existence of one-way functions.
We will stick to the convention introduced above of saying “non-uniform” before the theorem statement when the theorem makes use of non-uniformity. It should be understood that if nothing is said then the result holds for both the uniform and the non-uniform models.
It now follows from Theorem 5.1 that
Theorem 5.2 (non-uniform).
Weak SKE implies the existence of a one-way function.
More recently, the polynomial-time, interior point algorithms for linear programming have been extended to the case of convex quadratic programs [11, 13], certain linear complementarity problems [7, 10], and the nonlinear complementarity problem [6]. The connection between these algorithms and the classical Newton method for nonlinear equations is well explained in [7].
6 Review
We begin our discussion with the following definition:
Definition 6.1.
A function is said to be B-differentiable at the point if (i) is Lipschitz continuous in a neighborhood of , and (ii) there exists a positive homogeneous function , called the B-derivative of at , such that
The function is B-differentiable in set if it is B-differentiable at every point in . The B-derivative is said to be strong if
Lemma 6.1.
There exists a smooth function defined for satisfying the following properties:
-
(i)
is bounded above and below by positive constants .
-
(ii)
If , then .
-
(iii)
For all in the domain of , .
-
(iv)
If , then .
Proof.
We choose to be a radial function depending only on . Let be a suitable smooth function satisfying for , and for . The radial Laplacian
has smooth coefficients for . Therefore, we may apply the existence and uniqueness theory for ordinary differential equations. Simply let be the solution of the differential equation
with initial conditions given by and .
Next, let be a finite collection of pairwise disjoint disks, all of which are contained in the unit disk centered at the origin in . We assume that . Suppose that denotes the smaller concentric disk . We define a smooth weight function for by setting when and when is an element of . It follows from Lemma 6.1 that satisfies the properties:
-
(i)
is bounded above and below by positive constants .
-
(ii)
for all , the domain where the function is defined.
-
(iii)
when .
Let denote the annulus , and set . The properties (2) and (3) of may be summarized as , where is the characteristic function of . End of proof
Suppose that is a nonnegative real constant. We apply Proposition 3.5 with . If , assume that is a bounded domain containing the support of and . A calculation gives
The boundedness, property (1) of , then yields
Let be the set of blocks of and let . If then is constant on the blocks of .
| (24) |
If then for some so that
Thus by Möbius inversion
Thus there is a bijection from to . In particular .
Next note that . We see this by choosing a basis for consisting of vectors defined by
\[v^{k}_{i}=
\begin{cases} 1 & \text{if $i \in \Lambda_{k}$},\\
0 &\text{otherwise.} \end{cases}
\]
Lemma 6.2.
Let be an arrangement. Then
In order to compute recall the definition of from Lemma 3.1. Since , . Thus if then . Let . Then
| (25) |
Corollary 6.3.
Let be a triple of arrangements. Then
Definition 6.2.
Let be a triple with respect to the hyperplane . Call a separator if .
Corollary 6.4.
Let be a triple with respect to .
-
(i)
If is a separator then
and hence
-
(ii)
If is not a separator then
and
Proof.
The Poincaré polynomial of an arrangement will appear repeatedly in these notes. It will be shown to equal the Poincaré polynomial of the graded algebras which we are going to associate with . It is also the Poincaré polynomial of the complement for a complex arrangement. Here we prove that the Poincaré polynomial is the chamber counting function for a real arrangement. The complement is a disjoint union of chambers
The number of chambers is determined by the Poincaré polynomial as follows.
Theorem 6.5.
Let be a real arrangement. Then
Proof.
Theorem 6.6.
Let be a protocol for a random pair . If one of and is a prefix of the other and , then
Proof.
We show by induction on that
The induction hypothesis holds vacuously for . Assume it holds for , in particular . Then one of and is a prefix of the other which implies that one of and is a prefix of the other. If the th message is transmitted by then, by the separate-transmissions property and the induction hypothesis, , hence one of and is a prefix of the other. By the implicit-termination property, neither nor can be a proper prefix of the other, hence they must be the same and . If the th message is transmitted by then, symmetrically, by the induction hypothesis and the separate-transmissions property, and, then, by the implicit-termination property, proving the induction step. End of proof
If is a protocol for , and , are distinct inputs in , then, by the correct-decision property, .
Equation (25) defined ’s ambiguity set to be the set of possible values when . The last corollary implies that for all , the multiset111A multiset allows multiplicity of elements. Hence, is prefix free as a set, but not as a multiset. of codewords is prefix free.
7 One-Way Complexity
, the one-way complexity of a random pair , is the number of bits must transmit in the worst case when is not permitted to transmit any feedback messages. Starting with , the support set of , we define , the characteristic hypergraph of , and show that
Let be a random pair. For each in , the support set of , Equation (25) defined to be the set of possible values when . The characteristic hypergraph of has as its vertex set and the hyperedge for each .
We can now prove a continuity theorem.
Theorem 7.1.
Let be an open set, let , and let
| (26) |
for every . Let be a Lipschitz continuous function such that , and let . Then and
| (27) |
In addition, for -almost every the restriction of the function to is differentiable at and
| (28) |
Before proving the theorem, we state without proof three elementary remarks which will be useful in the sequel.
Remark 7.1.
Let be a continuous function such that as . Then
for any function .
Remark 7.2.
Let be a Lipschitz continuous function and assume that
exists for every and that is a linear function of . Then is differentiable at 0.
Remark 7.3.
Let be a linear function, and let be a function. Then the restriction of to the range of is differentiable at 0 if and only if is differentiable at 0 and
Proof.
We begin by showing that and
| (29) |
where is the Lipschitz constant of . By (13) and by the approximation result quoted in §3, it is possible to find a sequence converging to in and such that
The functions are locally Lipschitz continuous in , and the definition of differential implies that almost everywhere in . The lower semicontinuity of the total variation and (13) yield
| (30) |
Since , we have also
therefore . Repeating the same argument for every open set , we get (29) for every , because , are Radon measures. To prove Lemma 6.1, first we observe that
| (31) |
In fact, for every we have
hence
whenever . By a similar argument, if is a point such that there exists a triplet satisfying (14), (15), then
and if . Hence, by (1.8) we get
and Lemma 6.1 is proved. End of proof
To prove (31), it is not restrictive to assume that . Moreover, to simplify our notation, from now on we shall assume that . The proof of (31) is divided into two steps. In the first step we prove the statement in the one-dimensional case , using Theorem 5.2. In the second step we achieve the general result using Theorem 7.1.
Step 1
Assume that . Since is at most countable, (7) yields that , so that (19) and (21) imply that is the Radon-Nikodým decomposition of in absolutely continuous and singular part with respect to . By Theorem 5.2, we have
-almost everywhere in . It is well known (see, for instance, [12, 2.5.16]) that every one-dimensional function of bounded variation has a unique left continuous representative, i.e., a function such that almost everywhere and for every . These conditions imply
| (32) |
and
| (33) |
Let be such that for every and assume that the limits in (22) exist. By (23) and (24) we get
for every . Using the Lipschitz condition on we find
By (29), the function is continuous and converges to 0 as . Therefore Remark 7.1 and the previous inequality imply
By (22), for every ; moreover, applying the same argument to the functions , , we get
and our statement is proved.
Step 2
Let us consider now the general case . Let be such that , and let . In the following, we shall identify with , and we shall denote by the variable ranging in and by the variable ranging in . By the just proven one-dimensional result, and by Theorem 3.3, we get
for -almost every . We claim that
| (34) |
for -almost every . In fact, by (16) and (18) we get
and (24) follows from (13). By the same argument it is possible to prove that
| (35) |
for -almost every . By (24) and (25) we get
for -almost every , and using again (14), (15) we get
-a.e. in .
Since the function is strictly positive -almost everywhere, we obtain also
-almost everywhere in .
Finally, since
and since both sides of (33) are zero -almost everywhere on -negligible sets, we conclude that
-a.e. in . Since is arbitrary, by Remarks 7.2 and 7.3 the restriction of to the affine space is differentiable at for -almost every and (26) holds. End of proof
Theorem 7.2.
| (38) |
where
| (39) |
It is worth noting that of (39) is similar to the coefficients of the characteristic polynomial of (10). It is well known in graph theory that the coefficients can be expressed as a sum over certain subgraphs. It is interesting to see whether , , structural properties of a graph.
We may call (38) a parametric representation of . In computation, the parameter plays very important roles. The choice of the parameter usually depends on the properties of the given graph. For a complete graph , let , . It follows from (39) that
| (40) |
By (38)
| (41) |
For a complete bipartite graph , let , . By (39),
| (42) |
Theorem 7.2 leads to
| (43) |
Now, we consider an asymmetrical approach. Theorem 3.3 leads to
| (44) |
Theorem 7.3.
| (45) |
which reduces to Goulden–Jackson’s formula when [9].
8 Various font features of the amsmath package
8.1 Bold versions of special symbols
In the amsmath package \boldsymbol is used for getting individual bold math symbols and bold Greek letters—everything in math except for letters of the Latin alphabet, where you’d use \mathbf. For example,
A_\infty + \pi A_0 \sim
\mathbf{A}_{\boldsymbol{\infty}} \boldsymbol{+}
\boldsymbol{\pi} \mathbf{A}_{\boldsymbol{0}}
looks like this:
8.2 “Poor man’s bold”
If a bold version of a particular symbol doesn’t exist in the available fonts, then \boldsymbol can’t be used to make that symbol bold. At the present time, this means that \boldsymbol can’t be used with symbols from the msam and msbm fonts, among others. In some cases, poor man’s bold (\pmb) can be used instead of \boldsymbol:
\[\frac{\partial x}{\partial y}
\pmb{\bigg\vert}
\frac{\partial y}{\partial z}\]
So-called “large operator” symbols such as and require an additional command, \mathop, to produce proper spacing and limits when \pmb is used. For further details see The TeXbook.
\[\sum_{\substack{i<B\\\text{$i$ odd}}}
\prod_\kappa \kappa F(r_i)\qquad
\mathop{\pmb{\sum}}_{\substack{i<B\\\text{$i$ odd}}}
\mathop{\pmb{\prod}}_\kappa \kappa(r_i)
\]
9 Compound symbols and other features
9.1 Multiple integral signs
\iint, \iiint, and \iiiint give multiple integral signs with the spacing between them nicely adjusted, in both text and display style. \idotsint gives two integral signs with dots between them.
| (46) | |||
| (47) |
9.2 Over and under arrows
Some extra over and under arrow operations are provided in the amsmath package. (Basic LaTeX provides \overrightarrow and \overleftarrow).
\begin{align*}
\overrightarrow{\psi_\delta(t) E_t h}&
=\underrightarrow{\psi_\delta(t) E_t h}\\
\overleftarrow{\psi_\delta(t) E_t h}&
=\underleftarrow{\psi_\delta(t) E_t h}\\
\overleftrightarrow{\psi_\delta(t) E_t h}&
=\underleftrightarrow{\psi_\delta(t) E_t h}
\end{align*}
These all scale properly in subscript sizes:
\[\int_{\overrightarrow{AB}} ax\,dx\]
9.3 Dots
Normally you need only type \dots for ellipsis dots in a math formula. The main exception is when the dots fall at the end of the formula; then you need to specify one of \dotsc (series dots, after a comma), \dotsb (binary dots, for binary relations or operators), \dotsm (multiplication dots), or \dotsi (dots after an integral). For example, the input
Then we have the series $A_1,A_2,\dotsc$,
the regional sum $A_1+A_2+\dotsb$,
the orthogonal product $A_1A_2\dotsm$,
and the infinite integral
\[\int_{A_1}\int_{A_2}\dotsi\].
produces
Then we have the series , the regional sum , the orthogonal product , and the infinite integral
9.4 Accents in math
Double accents:
\[\Hat{\Hat{H}}\quad\Check{\Check{C}}\quad
\Tilde{\Tilde{T}}\quad\Acute{\Acute{A}}\quad
\Grave{\Grave{G}}\quad\Dot{\Dot{D}}\quad
\Ddot{\Ddot{D}}\quad\Breve{\Breve{B}}\quad
\Bar{\Bar{B}}\quad\Vec{\Vec{V}}\]
This double accent operation is complicated and tends to slow down the processing of a LaTeX file.
9.5 Dot accents
\dddot and \ddddot are available to produce triple and quadruple dot accents in addition to the \dot and \ddot accents already available in LaTeX:
\[\dddot{Q}\qquad\ddddot{R}\]
9.6 Roots
In the amsmath package \leftroot and \uproot allow you to adjust the position of the root index of a radical:
\sqrt[\leftroot{-2}\uproot{2}\beta]{k}
gives good positioning of the :
9.7 Boxed formulas
The command \boxed puts a box around its argument, like \fbox except that the contents are in math mode:
\boxed{W_t-F\subseteq V(P_i)\subseteq W_t}
9.8 Extensible arrows
\xleftarrow and \xrightarrow produce arrows that extend automatically to accommodate unusually wide subscripts or superscripts. The text of the subscript or superscript are given as an optional resp. mandatory argument: Example:
\[0 \xleftarrow[\zeta]{\alpha} F\times\triangle[n-1]
\xrightarrow{\partial_0\alpha(b)} E^{\partial_0b}\]
9.9 \overset, \underset, and \sideset
Examples:
\[\overset{*}{X}\qquad\underset{*}{X}\qquad
\overset{a}{\underset{b}{X}}\]
The command \sideset is for a rather special purpose: putting symbols at the subscript and superscript corners of a large operator symbol such as or , without affecting the placement of limits. Examples:
\[\sideset{_*^*}{_*^*}\prod_k\qquad
\sideset{}{’}\sum_{0\le i\le m} E_i\beta x
\]
9.10 The \text command
The main use of the command \text is for words or phrases in a display:
\[\mathbf{y}=\mathbf{y}’\quad\text{if and only if}\quad
y’_k=\delta_k y_{\tau(k)}\]
9.11 Operator names
The more common math functions such as , , and
have predefined control sequences: \log, \sin,
\lim.
The amsmath package provides \DeclareMathOperator and
\DeclareMathOperator*
for producing new function names that will have the
same typographical treatment.
Examples:
\[\norm{f}_\infty=
\esssup_{x\in R^n}\abs{f(x)}\]
\[\meas_1\{u\in R_+^1\colon f^*(u)>\alpha\}
=\meas_n\{x\in R^n\colon \abs{f(x)}\geq\alpha\}
\quad \forall\alpha>0.\]
\esssup and \meas would be defined in the document preamble as
\DeclareMathOperator*{\esssup}{ess\,sup}
\DeclareMathOperator{\meas}{meas}
The following special operator names are predefined in the amsmath package: \varlimsup, \varliminf, \varinjlim, and \varprojlim. Here’s what they look like in use:
| (48) | |||
| (49) | |||
| (50) | |||
| (51) |
\begin{align}
&\varlimsup_{n\rightarrow\infty}
\mathcal{Q}(u_n,u_n-u^{\#})\le0\\
&\varliminf_{n\rightarrow\infty}
\left\lvert a_{n+1}\right\rvert/\left\lvert a_n\right\rvert=0\\
&\varinjlim (m_i^\lambda\cdot)^*\le0\\
&\varprojlim_{p\in S(A)}A_p\le0
\end{align}
9.12 \mod and its relatives
The commands \mod and \pod are variants of \pmod preferred by some authors; \mod omits the parentheses, whereas \pod omits the ‘mod’ and retains the parentheses. Examples:
| (52) | ||||
| (53) | ||||
| (54) |
\begin{align}
x&\equiv y+1\pmod{m^2}\\
x&\equiv y+1\mod{m^2}\\
x&\equiv y+1\pod{m^2}
\end{align}
9.13 Fractions and related constructions
The usual notation for binomials is similar to the fraction concept, so it has a similar command \binom with two arguments. Example:
| (55) |
\begin{equation}
\begin{split}
[\sum_{\gamma\in\Gamma_C} I_\gamma&
=2^k-\binom{k}{1}2^{k-1}+\binom{k}{2}2^{k-2}\\
&\quad+\dots+(-1)^l\binom{k}{l}2^{k-l}
+\dots+(-1)^k\\
&=(2-1)^k=1
\end{split}
\end{equation}
There are also abbreviations
\dfrac \dbinom \tfrac \tbinom
for the commonly needed constructions
{\displaystyle\frac ... } {\displaystyle\binom ... }
{\textstyle\frac ... } {\textstyle\binom ... }
The generalized fraction command \genfrac provides full access to the six TeX fraction primitives:
| \over: | \overwithdelims: | (56) | ||||
| \atop: | \atopwithdelims: | (57) | ||||
| \above: | \abovewithdelims: | (58) |
\text{\cn{over}: }&\genfrac{}{}{}{}{n+1}{2}&
\text{\cn{overwithdelims}: }&
\genfrac{\langle}{\rangle}{}{}{n+1}{2}\\
\text{\cn{atop}: }&\genfrac{}{}{0pt}{}{n+1}{2}&
\text{\cn{atopwithdelims}: }&
\genfrac{(}{)}{0pt}{}{n+1}{2}\\
\text{\cn{above}: }&\genfrac{}{}{1pt}{}{n+1}{2}&
\text{\cn{abovewithdelims}: }&
\genfrac{[}{]}{1pt}{}{n+1}{2}
9.14 Continued fractions
The continued fraction
| (59) |
can be obtained by typing
\cfrac{1}{\sqrt{2}+
\cfrac{1}{\sqrt{2}+
\cfrac{1}{\sqrt{2}+
\cfrac{1}{\sqrt{2}+
\cfrac{1}{\sqrt{2}+\dotsb
}}}}}
Left or right placement of any of the numerators is accomplished by using \cfrac[l] or \cfrac[r] instead of \cfrac.
9.15 Smash
In amsmath there are optional arguments t and b for
the plain TeX command \smash, because sometimes it is advantageous
to be able to ‘smash’ only the top or only the bottom of something while
retaining the natural depth or height. In the formula
\smash[b] has been
used to limit the size of the radical symbol.
$X_j=(1/\sqrt{\smash[b]{\lambda_j}})X_j’$
Without the use of \smash[b] the formula would have appeared
thus: , with the radical extending to
encompass the depth of the subscript .
9.16 The ‘cases’ environment
‘Cases’ constructions like the following can be produced using the cases environment.
| (60) |
\begin{equation} P_{r-j}=
\begin{cases}
0& \text{if $r-j$ is odd},\\
r!\,(-1)^{(r-j)/2}& \text{if $r-j$ is even}.
\end{cases}
\end{equation}
Notice the use of \text and the embedded math.
9.17 Matrix
Here are samples of the matrix environments, \matrix, \pmatrix, \bmatrix, \Bmatrix, \vmatrix and \Vmatrix:
| (61) |
\begin{matrix}
\vartheta& \varrho\\\varphi& \varpi
\end{matrix}\quad
\begin{pmatrix}
\vartheta& \varrho\\\varphi& \varpi
\end{pmatrix}\quad
\begin{bmatrix}
\vartheta& \varrho\\\varphi& \varpi
\end{bmatrix}\quad
\begin{Bmatrix}
\vartheta& \varrho\\\varphi& \varpi
\end{Bmatrix}\quad
\begin{vmatrix}
\vartheta& \varrho\\\varphi& \varpi
\end{vmatrix}\quad
\begin{Vmatrix}
\vartheta& \varrho\\\varphi& \varpi
\end{Vmatrix}
To produce a small matrix suitable for use in text, use the smallmatrix environment.
\begin{math}
\bigl( \begin{smallmatrix}
a&b\\ c&d
\end{smallmatrix} \bigr)
\end{math}
To show the effect of the matrix on the surrounding lines of a paragraph, we put it here: and follow it with enough text to ensure that there will be at least one full line below the matrix.
\hdotsfor{number} produces a row of dots in a matrix
spanning the given number of columns:
\[W(\Phi)= \begin{Vmatrix}
\dfrac\varphi{(\varphi_1,\varepsilon_1)}&0&\dots&0\\
\dfrac{\varphi k_{n2}}{(\varphi_2,\varepsilon_1)}&
\dfrac\varphi{(\varphi_2,\varepsilon_2)}&\dots&0\\
\hdotsfor{5}\\
\dfrac{\varphi k_{n1}}{(\varphi_n,\varepsilon_1)}&
\dfrac{\varphi k_{n2}}{(\varphi_n,\varepsilon_2)}&\dots&
\dfrac{\varphi k_{n\,n-1}}{(\varphi_n,\varepsilon_{n-1})}&
\dfrac{\varphi}{(\varphi_n,\varepsilon_n)}
\end{Vmatrix}\]
The spacing of the dots can be varied through use of a square-bracket
option, for example, \hdotsfor[1.5]{3}. The number in square brackets
will be used as a multiplier; the normal value is 1.
9.18 The \substack command
The \substack command can be used to produce a multiline subscript or superscript: for example
\sum_{\substack{0\le i\le m\\ 0<j<n}} P(i,j)
produces a two-line subscript underneath the sum:
| (62) |
A slightly more generalized form is the subarray environment which allows you to specify that each line should be left-aligned instead of centered, as here:
| (63) |
\sum_{\begin{subarray}{l}
0\le i\le m\\ 0<j<n
\end{subarray}}
P(i,j)
9.19 Big-g-g delimiters
Here are some big delimiters, first in \normalsize:
\[\biggl(\mathbf{E}_{y}
\int_0^{t_\varepsilon}L_{x,y^x(s)}\varphi(x)\,ds
\biggr)
\]
and now in \Large size:
{\Large
\[\biggl(\mathbf{E}_{y}
\int_0^{t_\varepsilon}L_{x,y^x(s)}\varphi(x)\,ds
\biggr)
\]}
Appendix A Examples of multiple-line equation structures
Note: Starting on this page, vertical rules are added at the margins so that the positioning of various display elements with respect to the margins can be seen more clearly.
A.1 Split
The split environment is not an independent environment but should be used inside something else such as equation or align.
If there is not enough room for it, the equation number for a split will be shifted to the previous line, when equation numbers are on the left; the number shifts down to the next line when numbers are on the right.
| (64) |
Some text after to test the below-display spacing.
\begin{equation}
\begin{split}
f_{h,\varepsilon}(x,y)
&=\varepsilon\mathbf{E}_{x,y}\int_0^{t_\varepsilon}
L_{x,y_\varepsilon(\varepsilon u)}\varphi(x)\,du\\
&= h\int L_{x,z}\varphi(x)\rho_x(dz)\\
&\quad+h\biggl[\frac{1}{t_\varepsilon}\biggl(\mathbf{E}_{y}
\int_0^{t_\varepsilon}L_{x,y^x(s)}\varphi(x)\,ds
-t_\varepsilon\int L_{x,z}\varphi(x)\rho_x(dz)\biggr)\\
&\phantom{{=}+h\biggl[}+\frac{1}{t_\varepsilon}
\biggl(\mathbf{E}_{y}\int_0^{t_\varepsilon}L_{x,y^x(s)}
\varphi(x)\,ds -\mathbf{E}_{x,y}\int_0^{t_\varepsilon}
L_{x,y_\varepsilon(\varepsilon s)}
\varphi(x)\,ds\biggr)\biggr]\\
&=h\wh{L}_x\varphi(x)+h\theta_\varepsilon(x,y),
\end{split}
\end{equation}
Unnumbered version:
Some text after to test the below-display spacing.
\begin{equation*}
\begin{split}
f_{h,\varepsilon}(x,y)
&=\varepsilon\mathbf{E}_{x,y}\int_0^{t_\varepsilon}
L_{x,y_\varepsilon(\varepsilon u)}\varphi(x)\,du\\
&= h\int L_{x,z}\varphi(x)\rho_x(dz)\\
&\quad+h\biggl[\frac{1}{t_\varepsilon}\biggl(\mathbf{E}_{y}
\int_0^{t_\varepsilon}L_{x,y^x(s)}\varphi(x)\,ds
-t_\varepsilon\int L_{x,z}\varphi(x)\rho_x(dz)\biggr)\\
&\phantom{{=}+h\biggl[}+\frac{1}{t_\varepsilon}
\biggl(\mathbf{E}_{y}\int_0^{t_\varepsilon}L_{x,y^x(s)}
\varphi(x)\,ds -\mathbf{E}_{x,y}\int_0^{t_\varepsilon}
L_{x,y_\varepsilon(\varepsilon s)}
\varphi(x)\,ds\biggr)\biggr]\\
&=h\wh{L}_x\varphi(x)+h\theta_\varepsilon(x,y),
\end{split}
\end{equation*}
If the option centertags is included in the options list of the amsmath package, the equation numbers for split environments will be centered vertically on the height of the split:
| (65) |
Some text after to test the below-display spacing.
Use of split within align:
| (66) | ||||
| (67) | ||||
Some text after to test the below-display spacing.
\begin{align}
\begin{split}\abs{I_1}
&=\left\lvert \int_\Omega gRu\,d\Omega\right\rvert\\
&\le C_3\left[\int_\Omega\left(\int_{a}^x
g(\xi,t)\,d\xi\right)^2d\Omega\right]^{1/2}\\
&\quad\times \left[\int_\Omega\left\{u^2_x+\frac{1}{k}
\left(\int_{a}^x cu_t\,d\xi\right)^2\right\}
c\Omega\right]^{1/2}\\
&\le C_4\left\lvert \left\lvert f\left\lvert \wt{S}^{-1,0}_{a,-}
W_2(\Omega,\Gamma_l)\right\rvert\right\rvert
\left\lvert \abs{u}\overset{\circ}\to W_2^{\wt{A}}
(\Omega;\Gamma_r,T)\right\rvert\right\rvert.
\end{split}\label{eq:A}\\
\begin{split}\abs{I_2}&=\left\lvert \int_{0}^T \psi(t)\left\{u(a,t)
-\int_{\gamma(t)}^a\frac{d\theta}{k(\theta,t)}
\int_{a}^\theta c(\xi)u_t(\xi,t)\,d\xi\right\}dt\right\rvert\\
&\le C_6\left\lvert \left\lvert f\int_\Omega
\left\lvert \wt{S}^{-1,0}_{a,-}
W_2(\Omega,\Gamma_l)\right\rvert\right\rvert
\left\lvert \abs{u}\overset{\circ}\to W_2^{\wt{A}}
(\Omega;\Gamma_r,T)\right\rvert\right\rvert.
\end{split}
\end{align}
Unnumbered align, with a number on the second split:
| (67′) | ||||
Some text after to test the below-display spacing.
\begin{align*}
\begin{split}\abs{I_1}&=\left\lvert \int_\Omega gRu\,d\Omega\right\rvert\\
&\le C_3\left[\int_\Omega\left(\int_{a}^x
g(\xi,t)\,d\xi\right)^2d\Omega\right]^{1/2}\\
&\phantom{=}\times \left[\int_\Omega\left\{u^2_x+\frac{1}{k}
\left(\int_{a}^x cu_t\,d\xi\right)^2\right\}
c\Omega\right]^{1/2}\\
&\le C_4\left\lvert \left\lvert f\left\lvert \wt{S}^{-1,0}_{a,-}
W_2(\Omega,\Gamma_l)\right\rvert\right\rvert
\left\lvert \abs{u}\overset{\circ}\to W_2^{\wt{A}}
(\Omega;\Gamma_r,T)\right\rvert\right\rvert.
\end{split}\\
\begin{split}\abs{I_2}&=\left\lvert \int_{0}^T \psi(t)\left\{u(a,t)
-\int_{\gamma(t)}^a\frac{d\theta}{k(\theta,t)}
\int_{a}^\theta c(\xi)u_t(\xi,t)\,d\xi\right\}dt\right\rvert\\
&\le C_6\left\lvert \left\lvert f\int_\Omega
\left\lvert \wt{S}^{-1,0}_{a,-}
W_2(\Omega,\Gamma_l)\right\rvert\right\rvert
\left\lvert \abs{u}\overset{\circ}\to W_2^{\wt{A}}
(\Omega;\Gamma_r,T)\right\rvert\right\rvert.
\end{split}\tag{\theequation$’$}
\end{align*}
A.2 Multline
Numbered version:
| (68) |
To test the use of \label and
\ref, we refer to the number of this
equation here: (68).
\begin{multline}\label{eq:E}
\int_a^b\biggl\{\int_a^b[f(x)^2g(y)^2+f(y)^2g(x)^2]
-2f(x)g(x)f(y)g(y)\,dx\biggr\}\,dy \\
=\int_a^b\biggl\{g(y)^2\int_a^bf^2+f(y)^2
\int_a^b g^2-2f(y)g(y)\int_a^b fg\biggr\}\,dy
\end{multline}
Unnumbered version:
Some text after to test the below-display spacing.
\begin{multline*}
\int_a^b\biggl\{\int_a^b[f(x)^2g(y)^2+f(y)^2g(x)^2]
-2f(x)g(x)f(y)g(y)\,dx\biggr\}\,dy \\
=\int_a^b\biggl\{g(y)^2\int_a^bf^2+f(y)^2
\int_a^b g^2-2f(y)g(y)\int_a^b fg\biggr\}\,dy
\end{multline*}
A.3 Gather
Numbered version with \notag on the second line:
| (69) | |||
| (70) | |||
| (71) |
\begin{gather}
D(a,r)\equiv\{z\in\mathbf{C}\colon \abs{z-a}<r\},\\
\seg(a,r)\equiv\{z\in\mathbf{C}\colon
\Im z= \Im a,\ \abs{z-a}<r\},\notag\\
c(e,\theta,r)\equiv\{(x,y)\in\mathbf{C}
\colon \abs{x-e}<y\tan\theta,\ 0<y<r\},\\
C(E,\theta,r)\equiv\bigcup_{e\in E}c(e,\theta,r).
\end{gather}
Unnumbered version.
Some text after to test the below-display spacing.
\begin{gather*}
D(a,r)\equiv\{z\in\mathbf{C}\colon \abs{z-a}<r\},\\
\seg (a,r)\equiv\{z\in\mathbf{C}\colon
\Im z= \Im a,\ \abs{z-a}<r\},\\
c(e,\theta,r)\equiv\{(x,y)\in\mathbf{C}
\colon \abs{x-e}<y\tan\theta,\ 0<y<r\},\\
C(E,\theta,r)\equiv\bigcup_{e\in E}c(e,\theta,r).
\end{gather*}
A.4 Align
Numbered version:
| (72) | ||||
| (73) | ||||
| (74) |
Some text after to test the below-display spacing.
\begin{align}
\gamma_x(t)&=(\cos tu+\sin tx,v),\\
\gamma_y(t)&=(u,\cos tv+\sin ty),\\
\gamma_z(t)&=\left(\cos tu+\frac\alpha\beta\sin tv,
-\frac\beta\alpha\sin tu+\cos tv\right).
\end{align}
Unnumbered version:
Some text after to test the below-display spacing.
\begin{align*}
\gamma_x(t)&=(\cos tu+\sin tx,v),\\
\gamma_y(t)&=(u,\cos tv+\sin ty),\\
\gamma_z(t)&=\left(\cos tu+\frac\alpha\beta\sin tv,
-\frac\beta\alpha\sin tu+\cos tv\right).
\end{align*}
A variation:
| by (82) | (75) | ||||
| by (83) | (76) | ||||
| by Axiom 1. | (77) |
Some text after to test the below-display spacing.
\begin{align}
x& =y && \text {by (\ref{eq:C})}\\
x’& = y’ && \text {by (\ref{eq:D})}\\
x+x’ & = y+y’ && \text {by Axiom 1.}
\end{align}
A.5 Align and split within gather
When using the align environment within the gather
environment, one or the other, or both, should be unnumbered (using the
* form); numbering both the outer and inner environment would
cause a conflict.
Automatically numbered gather with split and align*:
| (78) | |||
| (79) |
Here the split environment gets a number from the outer gather environment; numbers for individual lines of the align* are suppressed because of the star.
\begin{gather}
\begin{split} \varphi(x,z)
&=z-\gamma_{10}x-\gamma_{mn}x^mz^n\\
&=z-Mr^{-1}x-Mr^{-(m+n)}x^mz^n
\end{split}\\[6pt]
\begin{align*}
\zeta^0 &=(\xi^0)^2,\\
\zeta^1 &=\xi^0\xi^1,\\
\zeta^2 &=(\xi^1)^2,
\end{align*}
\end{gather}
The *-ed form of gather with the non-*-ed form of
align.
Some text after to test the below-display spacing.
\begin{gather*}
\begin{split} \varphi(x,z)
&=z-\gamma_{10}x-\gamma_{mn}x^mz^n\\
&=z-Mr^{-1}x-Mr^{-(m+n)}x^mz^n
\end{split}\\[6pt]
\begin{align} \zeta^0&=(\xi^0)^2,\\
\zeta^1 &=\xi^0\xi^1,\\
\zeta^2 &=(\xi^1)^2,
\end{align}
\end{gather*}
A.6 Alignat
Numbered version:
| (80) | ||||||||
| (81) |
Some text after to test the below-display spacing.
\begin{alignat}{3}
V_i & =v_i - q_i v_j, & \qquad X_i & = x_i - q_i x_j,
& \qquad U_i & = u_i,
\qquad \text{for $i\ne j$;}\label{eq:B}\\
V_j & = v_j, & \qquad X_j & = x_j,
& \qquad U_j & u_j + \sum_{i\ne j} q_i u_i.
\end{alignat}
Unnumbered version:
Some text after to test the below-display spacing.
\begin{alignat*}3
V_i & =v_i - q_i v_j, & \qquad X_i & = x_i - q_i x_j,
& \qquad U_i & = u_i,
\qquad \text{for $i\ne j$;} \\
V_j & = v_j, & \qquad X_j & = x_j,
& \qquad U_j & u_j + \sum_{i\ne j} q_i u_i.
\end{alignat*}
The most common use for alignat is for things like
| by (66) | (82) | ||||
| by (80) | (83) | ||||
| by Axiom 1. | (84) |
Some text after to test the below-display spacing.
\begin{alignat}{2}
x& =y && \qquad \text {by (\ref{eq:A})}\label{eq:C}\\
x’& = y’ && \qquad \text {by (\ref{eq:B})}\label{eq:D}\\
x+x’ & = y+y’ && \qquad \text {by Axiom 1.}
\end{alignat}
References
- [1] W. Diffie and E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory 22 (1976), no. 5, 644–654.
- [2] D. H. Fremlin, Cichon’s diagram, 1983/1984, presented at the Séminaire Initiation à l’Analyse, G. Choquet, M. Rogalski, J. Saint Raymond, at the Université Pierre et Marie Curie, Paris, 23e année.
- [3] I. P. Goulden and D. M. Jackson, The enumeration of directed closed Euler trails and directed Hamiltonian circuits by Langrangian methods, European J. Combin. 2 (1981), 131–212.
- [4] F. Harary and E. M. Palmer, Graphical enumeration, Academic Press, 1973.
- [5] R. Impagliazzo, L. Levin, and M. Luby, Pseudo-random generation from one-way functions, Proc. 21st STOC (1989), ACM, New York, pp. 12–24.
- [6] M. Kojima, S. Mizuno, and A. Yoshise, A new continuation method for complementarity problems with uniform p-functions, Tech. Report B-194, Tokyo Inst. of Technology, Tokyo, 1987, Dept. of Information Sciences.
- [7] , A polynomial-time algorithm for a class of linear complementarity problems, Tech. Report B-193, Tokyo Inst. of Technology, Tokyo, 1987, Dept. of Information Sciences.
- [8] C. J. Liu and Yutze Chow, On operator and formal sum methods for graph enumeration problems, SIAM J. Algorithms Discrete Methods 5 (1984), 384–438.
- [9] M. Marcus and H. Minc, A survey of matrix theory and matrix inequalities, Complementary Series in Math. 14 (1964), 21–48.
- [10] S. Mizuno, A. Yoshise, and T. Kikuchi, Practical polynomial time algorithms for linear complementarity problems, Tech. Report 13, Tokyo Inst. of Technology, Tokyo, April 1988, Dept. of Industrial Engineering and Management.
- [11] R. D. Monteiro and I. Adler, Interior path following primal-dual algorithms, part II: Quadratic programming, August 1987, Working paper, Dept. of Industrial Engineering and Operations Research.
- [12] E. M. Stein, Singular integrals and differentiability properties of functions, Princeton Univ. Press, Princeton, N.J., 1970.
- [13] Y. Ye, Interior algorithms for linear, quadratic and linearly constrained convex programming, Ph.D. thesis, Stanford Univ., Palo Alto, Calif., July 1987, Dept. of Engineering–Economic Systems, unpublished.