Thick separators. Luc Jaulin and Benoît Desrochers. Lab-STICC, ENSTA Bretagne, Brest, France
|
|
- Timothy Bradley
- 6 years ago
- Views:
Transcription
1 Thick separators Luc Jaul and Benoît Desrochers Lab-TICC, ENTA Bretagne, Brest, France Abstract. If an terval of R is an uncerta real number, a thick set is an uncerta subset of R n. More precisely, a thick set is an terval of the powerset of R n equipped with the clusion as an order relation. It can generally be defed by parameters or functions which are not known exactly, but are known to belong to some tervals. In this paper, we show how to use constrat propagation methods order to compute efficiently an ner and an er approximations of a thick set. The resultg ner/er contraction are made usg an operator which is called a thick separator. Then, we show how thick separators can be combed order to compute with thick sets. 1 Thick sets A th set is a subset of R n. It is qualified as th because its boundary is th. In this section, we present the defition of thick sets. Thick set. Denote by (P(R n ), ), the powerset of R n equipped with the clusion as an order relation. A thick set of R n is an terval of (P(R n ), ). If is a thick set of R n, there exist two subsets of R n, called the subset bound and the supset bound such that =, = P(R n ) }. (1) Another representation for the thickset is the partition,, }, where = = \ (2) = Z. 1
2 The subset is called the penumbra and plays an important role the characterization of thick sets [3]. Thick sets can be used to represent uncerta sets (such as an uncerta map [4]) or a soft constrats [1]. 2 Thick separators To characterize a th set usg a paver, we may use a separator (which is a pair of two contractors [8]) side a paver. eparators can be immediately generalized to thick sets. Now, the penumbra as a nonzero volume for thick sets. For efficiency reasons, it is important to avoid any accumulation of the pavg deep side the penumbra. This is the role of thick separators to avoid as much as possible bisections side the penumbra. Thick separators. A thick separator for the thick set is an extension of the concept of separator to thick sets. More precisely, a thick separator is a 3-uple of contractors,, } such that, for all [x] IR n ([x]) = [x] ([x]) = [x] ([x]) = [x] (3) In what follow, we defe an algebra for thick separator a similar manner than what as been done for contractors [2] or for separators [7]. 3 Algebra In this section, we show how we can defe operations for thick sets (as a union, tersection, difference, etc.). The ma motivation is to be able to compute with thick sets. Intersection. Consider two thick sets =, and Y = Y, Y with thick separators =,, } and Y = 2
3 Y, Y, } Y. A thick separator for the thick set Z = Z, Z = Y = Y, Y (4) is Z = Z, Z, } Z = Y, ( ) ( ) ( ) Y Y Y, Proof. We have Y Z = Z = Y = Y Z = Z \Z = Y \( Y ) = Y Y = Y ( Y ) = ( ) ( Y Y ) (( ) ( ( Y Y )) = Y ) ( Y ) ( Y ) Z = Z = Y = Y = Y. From the separator algebra, we get that a contractor for Z is Z = Y, a contractor for Z is Z = Y and a contractor for Z is Z = ( ) ( ( Y Y) Y). (6) 4 Usg Karnaugh map (5) This expression could have been obtaed usg Figure 1. Karnaugh map, as illustrated by Figure 2, can also can be used to get the expression for thick separators a more clear manner. For stance, if Z = Y, (7) we read from the Karnaugh map 3 }.
4 Figure 1: Intersection of two thick sets. Red means side, Blue means side and Orange means uncerta Z = Y Z = ( Y ) ( Y ) ( Y ) Z = Y. Therefore a thick separator for the thick set Z is Z = Z, Z, } Z = Y, ( ) ( ) ( Y Y Now, if we read ) Y, (8) Y (9) Z = \ Y Y \, (10) Z = ( Y ) ( Y ) Z = Y Z = ( Y ) ( Y ). Therefore a thick separator for the thick set Z is Z = Z, Z, } Z = Y, ( ) ( ) ( Y Y 4 ) Y, (11) Y (12) } }.
5 Figure 2: Karnaugh map Note that when we build such an expression from a Karnaugh map, fake boundaries may appear. They could be avoided usg the method proposed [5]. Example. Take one box [x] as Figure 3. We get ([x]) = },, ([x]) = [a], [x], } (13) where [a] the white box. Moreover, Y ([x]) = } Y, Y, Y ([x]) =, [x], }. (14) 5
6 Figure 3: Illustration of the tersection of two separators Thus Z = Z, Z, } Z ([x]) = ( ) ( Y ) ([x]), ( = Y Y Y) ([x]), = Y ([x]) } = [a], ([x] ) ([x] [x]) ([a] [x]), } =, [x], } We conclude that [x] Z. 5 Test case Interval lear system [10] [11] are lear systems of equations the coefficients of which are uncerta and belong to some tervals. Consider for stance the followg terval lear system [9]: [2, 4] x1 + [ 2, 0] x 2 [ 1, 1] (15) [ 1, 1] x 1 + [2, 4] x 2 [0, 2] For each constrat, a thick separator can be build and then combed usg Equation 5. A thick set version algorithm provides the pavg Figure 4. The solution set =, has for supset bound the 6
7 Figure 4: Thick set correspondg to the test-case. Red boxes are side the thick solution set and the blue boxes are side. The penumbra corresponds to the orange boxes. tolerable solution set (red+orange) and for subset bound the united solution set (red) [6]. Note that side the penumbra, no accumulation can be observed. References [1] Q. Brefort, L. Jaul, M. Ceberio, and V. Kreovich. If we take to account that constrats are soft,then processg constrats becomes algorithmically solvable. In Proceedgs of the IEEE eries of ymposia on Computational Intelligence CI Orlando, Florida, December 9-12,
8 [2] G. Chabert and L. Jaul. Contractor Programmg. Artificial Intelligence, 173: , [3] B. Desrochers and L. Jaul. Computg a guaranteed approximation the zone explored by a robot. IEEE Transaction on Automatic Control, [4] B. Desrochers,. Lacroix, and L. Jaul. et-membership approach to the kidnapped robot problem. In IRO 2015, [5] G. chvarcz Franco and L. Jaul. How to avoid fake boundaries contractor programmg. In WIM 16, [6] A. Goldsztejn and G. Chabert. On the approximation of lear ae-solution sets. In 12th International ymposium on cientific Computg, Computer Arithmetic and Validated Numerics, Duisburg, Germany, (CAN 2006), [7] L. Jaul and B. Desrochers. Introduction to the algebra of separators with application to path planng. Engeerg Applications of Artificial Intelligence, 33: , [8] L. Jaul and B. Desrochers. Robust localisation usg separators. In COPROD 2014, [9] V. Kreovich and. hary. Interval methods for data fittg under uncertaty: A probabilistic treatment. Reliable Computg, [10]. hary. On optimal solution of terval lear equations. IAM Journal on Numerical Analysis, 32(2): , [11]. hary. A new technique systems analysis under terval uncertaty and ambiguity. Reliable Computg, 8: ,
Thick sets Contractors and separators Thick separators Test-case. Thick separators. L. Jaulin, B. Desrochers CoProd 2016, Uppsala.
L. Jaulin, B. Desrochers CoProd 2016, Uppsala Thick sets A thin set is a subset of R n. A thick set X of R n is an interval of (P(R n ), ). X = X,X = {X P(R n ) X X X }. A thickset X is also the partition
More informationAvoiding Fake Boundaries in Set Interval Computing
Journal of Uncertain Systems Vol.11, No.2, pp.137-148, 2017 Online at: www.jus.org.uk Avoiding Fake Boundaries in Set Interval Computing Anthony Welte 1, Luc Jaulin 1, Martine Ceberio 2, Vladik Kreinovich
More informationDistributed localization and control of underwater robots
Distributed localization and control of underwater robots L. Jaulin ENSTA Bretagne, LabSTICC Methods and Tools for Distributed Hybrid Systems DHS 2018, June 4, Palaiseau Interval analysis Problem. Given
More informationGlobal Optimization based on Contractor Programming: an Overview of the IBEX library
Global Optimization based on Contractor Programming: an Overview of the IBEX library Jordan Ninin ENSTA-Bretagne, LabSTIC, IHSEV team, 2 rue Francois Verny, 29806 Brest, France, jordan.ninin@ensta-bretagne.fr
More informationComputing Discrete Hartley Transform Using Algebraic Integers
Computg Discrete Hartle Transform Usg Algebraic Integers Vassil Dimtrov and Ram Baghaie Helsi Universit of Technolog Department of Electrical and Communications Engeerg P.O. BOX, 215 HUT, Fland E-mail:
More informationFuzzy Systems. Fuzzy Systems in Knowledge Engineering. Chapter 4. Christian Jacob. 4. Fuzzy Systems. Fuzzy Systems in Knowledge Engineering
Chapter 4 Fuzzy Systems Knowledge Engeerg Fuzzy Systems Christian Jacob jacob@cpsc.ucalgary.ca Department of Computer Science University of Calgary [Kasabov, 1996] Fuzzy Systems Knowledge Engeerg [Kasabov,
More informationOn sufficient conditions of the injectivity : development of a numerical test algorithm via interval analysis
On sufficient conditions of the injectivity : development of a numerical test algorithm via interval analysis S. Lagrange (lagrange@istia.univ-angers.fr) LISA, UFR Angers, 62 avenue Notre Dame du Lac,
More informationA Genetic Algorithm for the Number Partitioning Problem
A Algorithm for the Number Partitiong Problem Jordan Junkermeier Department of Computer Science, St. Cloud State University, St. Cloud, MN 5631 USA Abstract The Number Partitiong Problem (NPP) is an NPhard
More information(1BCT) First University Examination in Computer Science and Information Technology EE130 Fundamentals of Electrical & Electronic Engineering I
Taught Additional Assessment details (CBE, C/A, Essay, Lectures Shared With: (BCT) First University Examation Computer Science and Information Technology EE30 Fundamentals of Electrical & Electronic Engeerg
More informationInterval based 3D-mapping of an island with a sector-scan sonar
Interval based 3D-mapping of an island with a sector-scan sonar Vincent Drevelle ENSTA Bretagne, Ocean Sensing and Lab-STICC, IHSEV SWIM 2014, June 11-12, Uppsala, Sweden V. Drevelle Interval based 3D-mapping
More informationLecture 15: The subspace topology, Closed sets
Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology
More informationOpen and Closed Sets
Open and Closed Sets Definition: A subset S of a metric space (X, d) is open if it contains an open ball about each of its points i.e., if x S : ɛ > 0 : B(x, ɛ) S. (1) Theorem: (O1) and X are open sets.
More informationVersion 4, 12 October 2004 Project handed out on 12 October. Complete Java implementation due on 2 November.
CS 351 Programmg Paradigms, Fall 2004 1 Project 2: gnuplot Version 4, 12 October 2004 Project handed out on 12 October. Compe Java implementation due on 2 November. 2.1 The task Implement a utility for
More informationConstant-Time Approximation Algorithms for the Optimum Branching Problem on Sparse Graphs
01 Third International Conference on Networkg and Computg Constant-Time Approximation Algorithms for the Optimum Branchg Problem on Sparse Graphs Mitsuru Kusumoto, Yuichi Yoshida, Hiro Ito School of Informatics,
More informationGilles Chabert Ecole des Mines de Nantes Dec 2014
www.ibex-lib.org Gilles Chabert Ecole des Mines de Nantes Dec 2014 Outline Introduction Contractors Forward-backward XTaylor Q-intersection Getting started Conclusion Introduction IBEX is an open-source
More informationGlobal Optimization based on Contractor Programming: an Overview of the IBEX library
Global Optimization based on Contractor Programming: an Overview of the IBEX library Jordan Ninin To cite this version: Jordan Ninin. Global Optimization based on Contractor Programming: an Overview of
More informationGuaranteed simulation of nonlinear continuous-time dynamical systems using interval methods
Guaranteed simulation of nonlinear continuous-time dynamical systems using interval methods L. Jaulin, A. Béthencourt, S. Rohou, F. Le Bars, B. Zerr, T. Le Mézo ENSTA Bretagne, LabSTICC 13 septembre 2017
More informationCSci 4223 Principles of Programming Languages
Review CSci 4223 Prciples of Programmg Languages Lecture 8 Features learned: functions, tuples, lists, let expressions, options, records, datatypes, case expressions, type synonyms, pattern matchg, exceptions
More informationChapter 4 Fuzzy Logic
4.1 Introduction Chapter 4 Fuzzy Logic The human brain interprets the sensory information provided by organs. Fuzzy set theory focus on processing the information. Numerical computation can be performed
More information2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to
2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to be connected if it is not disconnected. A subset of
More informationInner and outer approximation of capture basin using interval analysis
Inner and outer approximation of capture basin using interval analysis M. Lhommeau 1 L. Jaulin 2 L. Hardouin 1 1 Laboratoire d'ingénierie des Systèmes Automatisés ISTIA - Université d'angers 62, av. Notre
More informationAn XML Viewer for Tabular Forms for use with Mechanical Documentation
An XML Viewer for Tabular Forms for use with Mechanical Documentation Osamu Inoue and Kensei Tsuchida Dept. Information & Computer Sciences Toyo University 2100, Kujirai, Kawagoe Saitama, 350-8585, Japan
More informationREVIEW OF FUZZY SETS
REVIEW OF FUZZY SETS CONNER HANSEN 1. Introduction L. A. Zadeh s paper Fuzzy Sets* [1] introduces the concept of a fuzzy set, provides definitions for various fuzzy set operations, and proves several properties
More informationThe clique number of a random graph in (,1 2) Let ( ) # -subgraphs in = 2 =: ( ) We will be interested in s.t. ( )~1. To gain some intuition note ( )
The clique number of a random graph in (,1 2) Let () # -subgraphs in = 2 =:() We will be interested in s.t. ()~1. To gain some intuition note ()~ 2 =2 and so ~2log. Now let us work rigorously. () (+1)
More informationThe clique number of a random graph in (,1 2) Let ( ) # -subgraphs in = 2 =: ( ) 2 ( ) ( )
1 The clique number of a random graph in (,1 2) Let () # -subgraphs in = 2 =:() We will be interested in s.t. ()~1. To gain some intuition note ()~ 2 =2 and so ~2log. Now let us work rigorously. () (+1)
More informationMolecular Distance Geometry and Atomic Orderings
Molecular Distance Geometry and Atomic Orderings Antonio Mucherino IRISA, University of Rennes 1 Workshop Set Computation for Control ENSTA Bretagne, Brest, France December 5 th 2013 The Distance Geometry
More informationEnhancement in Weighted PageRank Algorithm Using VOL
IOSR Journal of Computer Engeerg (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 5 (Sep. - Oct. 2013), PP 135-141 Enhancement Weighted PageRank Algorithm Usg VOL Sonal Tuteja 1 1 (Software
More information[Ch 6] Set Theory. 1. Basic Concepts and Definitions. 400 lecture note #4. 1) Basics
400 lecture note #4 [Ch 6] Set Theory 1. Basic Concepts and Definitions 1) Basics Element: ; A is a set consisting of elements x which is in a/another set S such that P(x) is true. Empty set: notated {
More informationAbout coding style Spring February 9, 2004
About codg style 15-212 Sprg 2004 February 9, 2004 Contents 1 Correctness 2 2 Specification 2 3 Style 2 3.1 if-then- Expressions... 3 3.1.1 Boolean if-then- Expressions... 3 3.1.2 if-then- stead of Pattern
More information15-451/651: Design & Analysis of Algorithms November 20, 2018 Lecture #23: Closest Pairs last changed: November 13, 2018
15-451/651: Design & Analysis of Algorithms November 20, 2018 Lecture #23: Closest Pairs last changed: November 13, 2018 1 Prelimaries We ll give two algorithms for the followg closest pair problem: Given
More informationA Linear Logic Representation for BPEL Process Protocol *
Applied Mathematics & Information Sciences An International Journal 5 (2) (2011), 25S-31S A Lear Logic Representation for BPEL Process Protocol * Jian Wu 1 and Lu J 2 1 Department of Computer Science and
More informationScheduling complex streaming applications on the Cell processor. LIP Research Report RR-LIP
Schedulg complex streamg applications on the Cell processor Matthieu Gallet 1,3,4 Mathias Jacquel 1,3,4 Loris Marchal 2,4 1 ENS Lyon 2 CNRS 3 Université de Lyon 4 LIP laboratory, UMR 5668, ENS Lyon CNRS
More informationTHE preceding chapters were all devoted to the analysis of images and signals which
Chapter 5 Segmentation of Color, Texture, and Orientation Images THE preceding chapters were all devoted to the analysis of images and signals which take values in IR. It is often necessary, however, to
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationMatching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.
18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have
More informationA Consistent Design Methodology to Meet SDR Challenges
Published the proceedgs of Wireless World Research Forum, Zurich, 2003 A Consistent Design Methodology to Meet SDR Challenges M. Holzer, P. Belanović, and M. Rupp Vienna University of Technology Institute
More informationOn Unbounded Tolerable Solution Sets
Reliable Computing (2005) 11: 425 432 DOI: 10.1007/s11155-005-0049-9 c Springer 2005 On Unbounded Tolerable Solution Sets IRENE A. SHARAYA Institute of Computational Technologies, 6, Acad. Lavrentiev av.,
More informationAdvanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs
Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material
More informationSets. Sets. Subset, universe. Specifying sets, membership. Examples: Specifying a set using a predicate. Examples
Sets 2/36 We will not give a precise definition of what is a set, but we will say precisely what you can do with it. Sets Lectures 7 and 8 (hapter 16) (Think of a set as a collection of things of which
More information2 Review of Set Theory
2 Review of Set Theory Example 2.1. Let Ω = {1, 2, 3, 4, 5, 6} 2.2. Venn diagram is very useful in set theory. It is often used to portray relationships between sets. Many identities can be read out simply
More informationGenerell Topologi. Richard Williamson. May 27, 2013
Generell Topologi Richard Williamson May 27, 2013 1 1 Tuesday 15th January 1.1 Topological spaces definition, terminology, finite examples Definition 1.1. A topological space is a pair (X, O) of a set
More informationRelational Database: The Relational Data Model; Operations on Database Relations
Relational Database: The Relational Data Model; Operations on Database Relations Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Overview
More informationComputing the K-terminal Reliability of Circle Graphs
Computing the K-terminal Reliability of Circle Graphs Min-Sheng Lin *, Chien-Min Chen Department of Electrical Engineering National Taipei University of Technology Taipei, Taiwan Abstract Let G denote
More informationCSC Discrete Math I, Spring Sets
CSC 125 - Discrete Math I, Spring 2017 Sets Sets A set is well-defined, unordered collection of objects The objects in a set are called the elements, or members, of the set A set is said to contain its
More informationConvexity: an introduction
Convexity: an introduction Geir Dahl CMA, Dept. of Mathematics and Dept. of Informatics University of Oslo 1 / 74 1. Introduction 1. Introduction what is convexity where does it arise main concepts and
More informationOn Secure Distributed Data Storage Under Repair Dynamics
On Secure Distributed Data Storage Under Repair Dynamics Sameer Pawar, Salim El Rouayheb, Kannan Ramchandran University of California, Bereley Emails: {spawar,salim,annanr}@eecs.bereley.edu. Abstract We
More informationMathematical and Algorithmic Foundations Linear Programming and Matchings
Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis
More informationWalheer Barnabé. Topics in Mathematics Practical Session 2 - Topology & Convex
Topics in Mathematics Practical Session 2 - Topology & Convex Sets Outline (i) Set membership and set operations (ii) Closed and open balls/sets (iii) Points (iv) Sets (v) Convex Sets Set Membership and
More informationCIS 390 Fall 2015 Robotics: Planning and Perception Kostas Daniilidis Homework 6
CIS 390 Fall 2015 Robotics: Planning and Perception Kostas Daniilidis Homework 6 Lab session: Thursday October 27, 2016 10:30 AM, 2016 Code submission: Friday October 28, 2016 23:59 PM 1 Introduction In
More informationUnit V. Neural Fuzzy System
Unit V Neural Fuzzy System 1 Fuzzy Set In the classical set, its characteristic function assigns a value of either 1 or 0 to each individual in the universal set, There by discriminating between members
More informationAuthor's personal copy ARTICLE IN PRESS. Information Systems 35 (2010) Contents lists available at ScienceDirect. Information Systems
Information Systems 35 (2010) 111 138 Contents lists available at ScienceDirect Information Systems journal homepage: www.elsevier.com/locate/fosys VASA: An algebra for vague spatial data databases $ Alejandro
More informationGESMI, an interval-based software for submarine SLAM. Fabrice LE BARS
GESMI, an interval-based software for submarine SLAM Fabrice LE BARS > Plan 1. Introduction 2. GESMI 3. Set membership approach used for SLAM 4. Demo 5. Conclusion 17/06/2010 2 Introduction 17/06/2010
More information7.3.3 A Language With Nested Procedure Declarations
7.3. ACCESS TO NONLOCAL DATA ON THE STACK 443 7.3.3 A Language With Nested Procedure Declarations The C family of languages, and many other familiar languages do not support nested procedures, so we troduce
More informationRigidity, connectivity and graph decompositions
First Prev Next Last Rigidity, connectivity and graph decompositions Brigitte Servatius Herman Servatius Worcester Polytechnic Institute Page 1 of 100 First Prev Next Last Page 2 of 100 We say that a framework
More informationA Box-Consistency Contraction Operator Based on extremal Functions
A Box-Consistency Contraction Operator Based on extremal Functions Gilles Trombettoni, Yves Papegay, Gilles Chabert, Odile Pourtallier INRIA, Université de Nice-Sophia, France October 2008, El Paso, Texas
More informationFUNCTIONAL PEARLS Drawing Trees
J. unctional Programmg 6 (3): 527 534, May 1996 c 1996 Cambridge University Press 527 UNCTIONL PRLS Drawg Trees NDRW J. KNNDY University of Cambridge Computer Laboratory New Museums Site, Pembroke Street
More informationHomotopy type of the complement. complex lines arrangements
On the homotopy type of the complement of complex lines arrangements Department of Geometry-Topology Institute of Mathematics, VAST, Hanoi Singapore December 15, 2008 Introduction Let A be an l-arrangement,
More informationThe Language of Sets and Functions
MAT067 University of California, Davis Winter 2007 The Language of Sets and Functions Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (January 7, 2007) 1 The Language of Sets 1.1 Definition and Notation
More informationCHAPTER 8. Copyright Cengage Learning. All rights reserved.
CHAPTER 8 RELATIONS Copyright Cengage Learning. All rights reserved. SECTION 8.3 Equivalence Relations Copyright Cengage Learning. All rights reserved. The Relation Induced by a Partition 3 The Relation
More informationx 16 d( x) 16 n( x) 36 d( x) zeros: x 2 36 = 0 x 2 = 36 x = ±6 Section Yes. Since 1 is a polynomial (of degree 0), P(x) =
9 CHAPTER POLYNOMIAL AND RATIONAL FUNCTIONS Section -. Yes. Since is a polynomial (of degree 0), P() P( ) is a rational function if P() is a polynomial.. A vertical asymptote is a vertical line a that
More informationIntersection of sets *
OpenStax-CNX module: m15196 1 Intersection of sets * Sunil Kumar Singh This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 2.0 We have pointed out that a set
More informationA Combined Semi-Pipelined Query Processing Architecture For Distributed Full-Text Retrieval
A Combined Semi-Pipelined Query Processing Architecture For Distributed Full-Text Retrieval Simon Jonassen and Svein Erik Bratsberg Department of Computer and Information Science Norwegian University of
More information1.1 - Introduction to Sets
1.1 - Introduction to Sets Math 166-502 Blake Boudreaux Department of Mathematics Texas A&M University January 18, 2018 Blake Boudreaux (Texas A&M University) 1.1 - Introduction to Sets January 18, 2018
More informationMaximum number of edges in claw-free graphs whose maximum degree and matching number are bounded
Maximum number of edges in claw-free graphs whose maximum degree and matching number are bounded Cemil Dibek Tınaz Ekim Pinar Heggernes Abstract We determine the maximum number of edges that a claw-free
More informationSets and set operations. Lecture 5 ICOM 4075
Sets and set operations Lecture 5 ICOM 4075 Reviewing sets s defined in a previous lecture, a setis a collection of objects that constitute the elementsof the set We say that a set containsits elements,
More informationEvery DFS Tree of a 3-Connected Graph Contains a Contractible Edge
Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge Amr Elmasry Kurt Mehlhorn Jens M. Schmidt Abstract Let G be a 3-connected graph on more than 4 vertices. We show that every depth-first-search
More information9.5 Equivalence Relations
9.5 Equivalence Relations You know from your early study of fractions that each fraction has many equivalent forms. For example, 2, 2 4, 3 6, 2, 3 6, 5 30,... are all different ways to represent the same
More informationJournal of mathematics and computer science 13 (2014),
Journal of mathematics and computer science 13 (2014), 231-237 Interval Interpolation by Newton's Divided Differences Ali Salimi Shamloo Parisa Hajagharezalou Department of Mathematics, Shabestar Branch,
More informationVertex 3-colorability of claw-free graphs
Algorithmic Operations Research Vol.2 (27) 5 2 Vertex 3-colorability of claw-free graphs Marcin Kamiński a Vadim Lozin a a RUTCOR - Rutgers University Center for Operations Research, 64 Bartholomew Road,
More informationAn Improved Upper Bound for the Sum-free Subset Constant
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 13 (2010), Article 10.8.3 An Improved Upper Bound for the Sum-free Subset Constant Mark Lewko Department of Mathematics University of Texas at Austin
More informationComplexity Results on Graphs with Few Cliques
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School
More informationOptimization of the Simultaneous Localization and Map-Building Algorithm for Real-Time Implementation
242 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 17, NO. 3, JUNE 2001 Optimization of the Simultaneous Localization and Map-Building Algorithm for Real-Time Implementation José E. Guivant and Eduardo
More informationDesign Intent of Geometric Models
School of Computer Science Cardiff University Design Intent of Geometric Models Frank C. Langbein GR/M78267 GR/S69085/01 NUF-NAL 00638/G Massey University 22nd September 2004; Version 1.0 Design Intent
More informationA Bayes Learning-based Anomaly Detection Approach in Large-scale Networks. Wei-song HE a*
17 nd International Conference on Computer Science and Technology (CST 17) ISBN: 978-1-69-461- A Bayes Learng-based Anomaly Detection Approach Large-scale Networks Wei-song HE a* Department of Electronic
More informationModeling with Uncertainty Interval Computations Using Fuzzy Sets
Modeling with Uncertainty Interval Computations Using Fuzzy Sets J. Honda, R. Tankelevich Department of Mathematical and Computer Sciences, Colorado School of Mines, Golden, CO, U.S.A. Abstract A new method
More informationChapter 12 Solid Modeling. Disadvantages of wireframe representations
Chapter 12 Solid Modeling Wireframe, surface, solid modeling Solid modeling gives a complete and unambiguous definition of an object, describing not only the shape of the boundaries but also the object
More informationROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING WITH UNCERTAINTY
ALGEBRAIC METHODS IN LOGIC AND IN COMPUTER SCIENCE BANACH CENTER PUBLICATIONS, VOLUME 28 INSTITUTE OF MATHEMATICS POLISH ACADEMY OF SCIENCES WARSZAWA 1993 ROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING
More informationStrong Dominating Sets of Direct Product Graph of Cayley Graphs with Arithmetic Graphs
International Journal of Applied Information Systems (IJAIS) ISSN : 9-088 Volume No., June 01 www.ijais.org Strong Domatg Sets of Direct Product Graph of Cayley Graphs with Arithmetic Graphs M. Manjuri
More informationAPPLICATION OF FRACTIONAL WAVELET TRANSFORM FOR IMAGE AUTHENTICATION
APPLICATION OF FRACTIONAL WAVELET TRANSFORM FOR IMAGE AUTHENTICATION G. K. Raji 1, G. Ramachandra Reddy 2 1 School of Electrical Engeerg, VIT University,Vellore, Tamil Nadu, India 2 ECE Department, S.
More informationKeyword: Quadratic Bézier Curve, Bisection Algorithm, Biarc, Biarc Method, Hausdorff Distances, Tolerance Band.
Department of Computer Science Approximation Methods for Quadratic Bézier Curve, by Circular Arcs within a Tolerance Band Seminar aus Informatik Univ.-Prof. Dr. Wolfgang Pree Seyed Amir Hossein Siahposhha
More informationTask Allocation Negotiation and the Contract Net Protocol
Task Allocation Negotiation and the Contract Net Protocol March 25, 2003 Class Meeting 19 Outline Introduction to Task Allocation The Contract Net Protocol Multi-Robot Task Allocation What is task allocation?
More informationSection 16. The Subspace Topology
16. The Subspace Product Topology 1 Section 16. The Subspace Topology Note. Recall from Analysis 1 that a set of real numbers U is open relative to set X if there is an open set of real numbers O such
More informationIntegration of Fuzzy Shannon s Entropy with fuzzy TOPSIS for industrial robotic system selection
JIEM, 2012 5(1):102-114 Online ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.397 Integration of Fuzzy Shannon s Entropy with fuzzy TOPSIS for industrial robotic system selection
More informationParameterized Approximation Schemes Using Graph Widths. Michael Lampis Research Institute for Mathematical Sciences Kyoto University
Parameterized Approximation Schemes Using Graph Widths Michael Lampis Research Institute for Mathematical Sciences Kyoto University May 13, 2014 Overview Topic of this talk: Randomized Parameterized Approximation
More informationAn example DFA: reaching definitions
Dataflow analysis: what is it? Dataflow analysis A common framework for expressg algorithms that compute formation ab a program Why is such a framework useful? Dataflow analysis: what is it? A common framework
More informationFinal Test in MAT 410: Introduction to Topology Answers to the Test Questions
Final Test in MAT 410: Introduction to Topology Answers to the Test Questions Stefan Kohl Question 1: Give the definition of a topological space. (3 credits) A topological space (X, τ) is a pair consisting
More informationComplexity Theory. Compiled By : Hari Prasad Pokhrel Page 1 of 20. ioenotes.edu.np
Chapter 1: Introduction Introduction Purpose of the Theory of Computation: Develop formal mathematical models of computation that reflect real-world computers. Nowadays, the Theory of Computation can be
More informationThe kidnapping Problem of Mobile Robots: A Set Membership Approach.
The kidnapping Problem of Mobile Robots: A Set Membership Approach. Rémy GUYONNEAU, Sébastien LAGRANGE, Laurent HARDOUIN and Philippe LUCIDARME. Laboratoire d Ingénierie des Systèmes Automatisés (LISA),
More informationOn the Max Coloring Problem
On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive
More information2. Sets. 2.1&2.2: Sets and Subsets. Combining Sets. c Dr Oksana Shatalov, Fall
c Dr Oksana Shatalov, Fall 2014 1 2. Sets 2.1&2.2: Sets and Subsets. Combining Sets. Set Terminology and Notation DEFINITIONS: Set is well-defined collection of objects. Elements are objects or members
More informationStatic Analysis for Fast and Accurate Design Space Exploration of Caches
Static Analysis for Fast and Accurate Design Space Exploration of Caches Yun iang, Tulika Mitra Department of Computer Science National University of Sgapore {liangyun,tulika}@comp.nus.edu.sg ABSTRACT
More informationHW/SW Codesign. WCET Analysis
HW/SW Codesign WCET Analysis 29 November 2017 Andres Gomez gomeza@tik.ee.ethz.ch 1 Outline Today s exercise is one long question with several parts: Basic blocks of a program Static value analysis WCET
More informationSet-Membership Approach to the Kidnapped Robot Problem
Set-Membership Approach to the Kidnapped Robot Problem Benoît Desrochers 1,2, Simon Lacroix 1,3 and Luc Jaulin 2 Abstract This article depicts an algorithm which matches the output of a Lidar with an initial
More information9 Bounds for the Knapsack Problem (March 6)
9 Bounds for the Knapsack Problem (March 6) In this lecture, I ll develop both upper and lower bounds in the linear decision tree model for the following version of the (NP-complete) Knapsack 1 problem:
More informationOn the Relationships between Zero Forcing Numbers and Certain Graph Coverings
On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,
More informationGenerell Topologi. Richard Williamson. May 6, 2013
Generell Topologi Richard Williamson May 6, 2013 1 8 Thursday 7th February 8.1 Using connectedness to distinguish between topological spaces I Proposition 8.1. Let (, O ) and (Y, O Y ) be topological spaces.
More informationMASTER Mathématiques et Applications
MASTER Mathématiques et Applications SPECIALITE : SYSTEMES DYNAMIQUES ET SIGNAUX Année 13/14 Benoît DESRCHERS Soutenu le 27 aout 14 Au sein de l'institut des Sciences et Techniques de l'ingénieurs d'angers
More informationDesign Intent of Geometric Models
School of Computer Science Cardiff University Design Intent of Geometric Models Frank C. Langbein GR/M78267 GR/S69085/01 NUF-NAL 00638/G Auckland University 15th September 2004; Version 1.1 Design Intent
More informationMethod of Semantic Web Service Discovery and Automatic Composition
298 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 6, NO. 3, AUGUST 2014 Method of Semantic Web Service Discovery and Automatic Composition Yuem Wang Suqian College, 3 rd Department, Suqian,
More informationSection Rational Functions and Inequalities. A rational function is a quotient of two polynomials. That is, is a rational function if
Section 6.1 --- Rational Functions and Inequalities A rational function is a quotient of two polynomials. That is, is a rational function if =, where and are polynomials and is not the zero polynomial.
More information