Thick separators. Luc Jaulin and Benoît Desrochers. Lab-STICC, ENSTA Bretagne, Brest, France

Size: px
Start display at page:

Download "Thick separators. Luc Jaulin and Benoît Desrochers. Lab-STICC, ENSTA Bretagne, Brest, France"

Transcription

1 Thick separators Luc Jaul and Benoît Desrochers Lab-TICC, ENTA Bretagne, Brest, France Abstract. If an terval of R is an uncerta real number, a thick set is an uncerta subset of R n. More precisely, a thick set is an terval of the powerset of R n equipped with the clusion as an order relation. It can generally be defed by parameters or functions which are not known exactly, but are known to belong to some tervals. In this paper, we show how to use constrat propagation methods order to compute efficiently an ner and an er approximations of a thick set. The resultg ner/er contraction are made usg an operator which is called a thick separator. Then, we show how thick separators can be combed order to compute with thick sets. 1 Thick sets A th set is a subset of R n. It is qualified as th because its boundary is th. In this section, we present the defition of thick sets. Thick set. Denote by (P(R n ), ), the powerset of R n equipped with the clusion as an order relation. A thick set of R n is an terval of (P(R n ), ). If is a thick set of R n, there exist two subsets of R n, called the subset bound and the supset bound such that =, = P(R n ) }. (1) Another representation for the thickset is the partition,, }, where = = \ (2) = Z. 1

2 The subset is called the penumbra and plays an important role the characterization of thick sets [3]. Thick sets can be used to represent uncerta sets (such as an uncerta map [4]) or a soft constrats [1]. 2 Thick separators To characterize a th set usg a paver, we may use a separator (which is a pair of two contractors [8]) side a paver. eparators can be immediately generalized to thick sets. Now, the penumbra as a nonzero volume for thick sets. For efficiency reasons, it is important to avoid any accumulation of the pavg deep side the penumbra. This is the role of thick separators to avoid as much as possible bisections side the penumbra. Thick separators. A thick separator for the thick set is an extension of the concept of separator to thick sets. More precisely, a thick separator is a 3-uple of contractors,, } such that, for all [x] IR n ([x]) = [x] ([x]) = [x] ([x]) = [x] (3) In what follow, we defe an algebra for thick separator a similar manner than what as been done for contractors [2] or for separators [7]. 3 Algebra In this section, we show how we can defe operations for thick sets (as a union, tersection, difference, etc.). The ma motivation is to be able to compute with thick sets. Intersection. Consider two thick sets =, and Y = Y, Y with thick separators =,, } and Y = 2

3 Y, Y, } Y. A thick separator for the thick set Z = Z, Z = Y = Y, Y (4) is Z = Z, Z, } Z = Y, ( ) ( ) ( ) Y Y Y, Proof. We have Y Z = Z = Y = Y Z = Z \Z = Y \( Y ) = Y Y = Y ( Y ) = ( ) ( Y Y ) (( ) ( ( Y Y )) = Y ) ( Y ) ( Y ) Z = Z = Y = Y = Y. From the separator algebra, we get that a contractor for Z is Z = Y, a contractor for Z is Z = Y and a contractor for Z is Z = ( ) ( ( Y Y) Y). (6) 4 Usg Karnaugh map (5) This expression could have been obtaed usg Figure 1. Karnaugh map, as illustrated by Figure 2, can also can be used to get the expression for thick separators a more clear manner. For stance, if Z = Y, (7) we read from the Karnaugh map 3 }.

4 Figure 1: Intersection of two thick sets. Red means side, Blue means side and Orange means uncerta Z = Y Z = ( Y ) ( Y ) ( Y ) Z = Y. Therefore a thick separator for the thick set Z is Z = Z, Z, } Z = Y, ( ) ( ) ( Y Y Now, if we read ) Y, (8) Y (9) Z = \ Y Y \, (10) Z = ( Y ) ( Y ) Z = Y Z = ( Y ) ( Y ). Therefore a thick separator for the thick set Z is Z = Z, Z, } Z = Y, ( ) ( ) ( Y Y 4 ) Y, (11) Y (12) } }.

5 Figure 2: Karnaugh map Note that when we build such an expression from a Karnaugh map, fake boundaries may appear. They could be avoided usg the method proposed [5]. Example. Take one box [x] as Figure 3. We get ([x]) = },, ([x]) = [a], [x], } (13) where [a] the white box. Moreover, Y ([x]) = } Y, Y, Y ([x]) =, [x], }. (14) 5

6 Figure 3: Illustration of the tersection of two separators Thus Z = Z, Z, } Z ([x]) = ( ) ( Y ) ([x]), ( = Y Y Y) ([x]), = Y ([x]) } = [a], ([x] ) ([x] [x]) ([a] [x]), } =, [x], } We conclude that [x] Z. 5 Test case Interval lear system [10] [11] are lear systems of equations the coefficients of which are uncerta and belong to some tervals. Consider for stance the followg terval lear system [9]: [2, 4] x1 + [ 2, 0] x 2 [ 1, 1] (15) [ 1, 1] x 1 + [2, 4] x 2 [0, 2] For each constrat, a thick separator can be build and then combed usg Equation 5. A thick set version algorithm provides the pavg Figure 4. The solution set =, has for supset bound the 6

7 Figure 4: Thick set correspondg to the test-case. Red boxes are side the thick solution set and the blue boxes are side. The penumbra corresponds to the orange boxes. tolerable solution set (red+orange) and for subset bound the united solution set (red) [6]. Note that side the penumbra, no accumulation can be observed. References [1] Q. Brefort, L. Jaul, M. Ceberio, and V. Kreovich. If we take to account that constrats are soft,then processg constrats becomes algorithmically solvable. In Proceedgs of the IEEE eries of ymposia on Computational Intelligence CI Orlando, Florida, December 9-12,

8 [2] G. Chabert and L. Jaul. Contractor Programmg. Artificial Intelligence, 173: , [3] B. Desrochers and L. Jaul. Computg a guaranteed approximation the zone explored by a robot. IEEE Transaction on Automatic Control, [4] B. Desrochers,. Lacroix, and L. Jaul. et-membership approach to the kidnapped robot problem. In IRO 2015, [5] G. chvarcz Franco and L. Jaul. How to avoid fake boundaries contractor programmg. In WIM 16, [6] A. Goldsztejn and G. Chabert. On the approximation of lear ae-solution sets. In 12th International ymposium on cientific Computg, Computer Arithmetic and Validated Numerics, Duisburg, Germany, (CAN 2006), [7] L. Jaul and B. Desrochers. Introduction to the algebra of separators with application to path planng. Engeerg Applications of Artificial Intelligence, 33: , [8] L. Jaul and B. Desrochers. Robust localisation usg separators. In COPROD 2014, [9] V. Kreovich and. hary. Interval methods for data fittg under uncertaty: A probabilistic treatment. Reliable Computg, [10]. hary. On optimal solution of terval lear equations. IAM Journal on Numerical Analysis, 32(2): , [11]. hary. A new technique systems analysis under terval uncertaty and ambiguity. Reliable Computg, 8: ,

Thick sets Contractors and separators Thick separators Test-case. Thick separators. L. Jaulin, B. Desrochers CoProd 2016, Uppsala.

Thick sets Contractors and separators Thick separators Test-case. Thick separators. L. Jaulin, B. Desrochers CoProd 2016, Uppsala. L. Jaulin, B. Desrochers CoProd 2016, Uppsala Thick sets A thin set is a subset of R n. A thick set X of R n is an interval of (P(R n ), ). X = X,X = {X P(R n ) X X X }. A thickset X is also the partition

More information

Avoiding Fake Boundaries in Set Interval Computing

Avoiding Fake Boundaries in Set Interval Computing Journal of Uncertain Systems Vol.11, No.2, pp.137-148, 2017 Online at: www.jus.org.uk Avoiding Fake Boundaries in Set Interval Computing Anthony Welte 1, Luc Jaulin 1, Martine Ceberio 2, Vladik Kreinovich

More information

Distributed localization and control of underwater robots

Distributed localization and control of underwater robots Distributed localization and control of underwater robots L. Jaulin ENSTA Bretagne, LabSTICC Methods and Tools for Distributed Hybrid Systems DHS 2018, June 4, Palaiseau Interval analysis Problem. Given

More information

Global Optimization based on Contractor Programming: an Overview of the IBEX library

Global Optimization based on Contractor Programming: an Overview of the IBEX library Global Optimization based on Contractor Programming: an Overview of the IBEX library Jordan Ninin ENSTA-Bretagne, LabSTIC, IHSEV team, 2 rue Francois Verny, 29806 Brest, France, jordan.ninin@ensta-bretagne.fr

More information

Computing Discrete Hartley Transform Using Algebraic Integers

Computing Discrete Hartley Transform Using Algebraic Integers Computg Discrete Hartle Transform Usg Algebraic Integers Vassil Dimtrov and Ram Baghaie Helsi Universit of Technolog Department of Electrical and Communications Engeerg P.O. BOX, 215 HUT, Fland E-mail:

More information

Fuzzy Systems. Fuzzy Systems in Knowledge Engineering. Chapter 4. Christian Jacob. 4. Fuzzy Systems. Fuzzy Systems in Knowledge Engineering

Fuzzy Systems. Fuzzy Systems in Knowledge Engineering. Chapter 4. Christian Jacob. 4. Fuzzy Systems. Fuzzy Systems in Knowledge Engineering Chapter 4 Fuzzy Systems Knowledge Engeerg Fuzzy Systems Christian Jacob jacob@cpsc.ucalgary.ca Department of Computer Science University of Calgary [Kasabov, 1996] Fuzzy Systems Knowledge Engeerg [Kasabov,

More information

On sufficient conditions of the injectivity : development of a numerical test algorithm via interval analysis

On sufficient conditions of the injectivity : development of a numerical test algorithm via interval analysis On sufficient conditions of the injectivity : development of a numerical test algorithm via interval analysis S. Lagrange (lagrange@istia.univ-angers.fr) LISA, UFR Angers, 62 avenue Notre Dame du Lac,

More information

A Genetic Algorithm for the Number Partitioning Problem

A Genetic Algorithm for the Number Partitioning Problem A Algorithm for the Number Partitiong Problem Jordan Junkermeier Department of Computer Science, St. Cloud State University, St. Cloud, MN 5631 USA Abstract The Number Partitiong Problem (NPP) is an NPhard

More information

(1BCT) First University Examination in Computer Science and Information Technology EE130 Fundamentals of Electrical & Electronic Engineering I

(1BCT) First University Examination in Computer Science and Information Technology EE130 Fundamentals of Electrical & Electronic Engineering I Taught Additional Assessment details (CBE, C/A, Essay, Lectures Shared With: (BCT) First University Examation Computer Science and Information Technology EE30 Fundamentals of Electrical & Electronic Engeerg

More information

Interval based 3D-mapping of an island with a sector-scan sonar

Interval based 3D-mapping of an island with a sector-scan sonar Interval based 3D-mapping of an island with a sector-scan sonar Vincent Drevelle ENSTA Bretagne, Ocean Sensing and Lab-STICC, IHSEV SWIM 2014, June 11-12, Uppsala, Sweden V. Drevelle Interval based 3D-mapping

More information

Lecture 15: The subspace topology, Closed sets

Lecture 15: The subspace topology, Closed sets Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology

More information

Open and Closed Sets

Open and Closed Sets Open and Closed Sets Definition: A subset S of a metric space (X, d) is open if it contains an open ball about each of its points i.e., if x S : ɛ > 0 : B(x, ɛ) S. (1) Theorem: (O1) and X are open sets.

More information

Version 4, 12 October 2004 Project handed out on 12 October. Complete Java implementation due on 2 November.

Version 4, 12 October 2004 Project handed out on 12 October. Complete Java implementation due on 2 November. CS 351 Programmg Paradigms, Fall 2004 1 Project 2: gnuplot Version 4, 12 October 2004 Project handed out on 12 October. Compe Java implementation due on 2 November. 2.1 The task Implement a utility for

More information

Constant-Time Approximation Algorithms for the Optimum Branching Problem on Sparse Graphs

Constant-Time Approximation Algorithms for the Optimum Branching Problem on Sparse Graphs 01 Third International Conference on Networkg and Computg Constant-Time Approximation Algorithms for the Optimum Branchg Problem on Sparse Graphs Mitsuru Kusumoto, Yuichi Yoshida, Hiro Ito School of Informatics,

More information

Gilles Chabert Ecole des Mines de Nantes Dec 2014

Gilles Chabert Ecole des Mines de Nantes Dec 2014 www.ibex-lib.org Gilles Chabert Ecole des Mines de Nantes Dec 2014 Outline Introduction Contractors Forward-backward XTaylor Q-intersection Getting started Conclusion Introduction IBEX is an open-source

More information

Global Optimization based on Contractor Programming: an Overview of the IBEX library

Global Optimization based on Contractor Programming: an Overview of the IBEX library Global Optimization based on Contractor Programming: an Overview of the IBEX library Jordan Ninin To cite this version: Jordan Ninin. Global Optimization based on Contractor Programming: an Overview of

More information

Guaranteed simulation of nonlinear continuous-time dynamical systems using interval methods

Guaranteed simulation of nonlinear continuous-time dynamical systems using interval methods Guaranteed simulation of nonlinear continuous-time dynamical systems using interval methods L. Jaulin, A. Béthencourt, S. Rohou, F. Le Bars, B. Zerr, T. Le Mézo ENSTA Bretagne, LabSTICC 13 septembre 2017

More information

CSci 4223 Principles of Programming Languages

CSci 4223 Principles of Programming Languages Review CSci 4223 Prciples of Programmg Languages Lecture 8 Features learned: functions, tuples, lists, let expressions, options, records, datatypes, case expressions, type synonyms, pattern matchg, exceptions

More information

Chapter 4 Fuzzy Logic

Chapter 4 Fuzzy Logic 4.1 Introduction Chapter 4 Fuzzy Logic The human brain interprets the sensory information provided by organs. Fuzzy set theory focus on processing the information. Numerical computation can be performed

More information

2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to

2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to 2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to be connected if it is not disconnected. A subset of

More information

Inner and outer approximation of capture basin using interval analysis

Inner and outer approximation of capture basin using interval analysis Inner and outer approximation of capture basin using interval analysis M. Lhommeau 1 L. Jaulin 2 L. Hardouin 1 1 Laboratoire d'ingénierie des Systèmes Automatisés ISTIA - Université d'angers 62, av. Notre

More information

An XML Viewer for Tabular Forms for use with Mechanical Documentation

An XML Viewer for Tabular Forms for use with Mechanical Documentation An XML Viewer for Tabular Forms for use with Mechanical Documentation Osamu Inoue and Kensei Tsuchida Dept. Information & Computer Sciences Toyo University 2100, Kujirai, Kawagoe Saitama, 350-8585, Japan

More information

REVIEW OF FUZZY SETS

REVIEW OF FUZZY SETS REVIEW OF FUZZY SETS CONNER HANSEN 1. Introduction L. A. Zadeh s paper Fuzzy Sets* [1] introduces the concept of a fuzzy set, provides definitions for various fuzzy set operations, and proves several properties

More information

The clique number of a random graph in (,1 2) Let ( ) # -subgraphs in = 2 =: ( ) We will be interested in s.t. ( )~1. To gain some intuition note ( )

The clique number of a random graph in (,1 2) Let ( ) # -subgraphs in = 2 =: ( ) We will be interested in s.t. ( )~1. To gain some intuition note ( ) The clique number of a random graph in (,1 2) Let () # -subgraphs in = 2 =:() We will be interested in s.t. ()~1. To gain some intuition note ()~ 2 =2 and so ~2log. Now let us work rigorously. () (+1)

More information

The clique number of a random graph in (,1 2) Let ( ) # -subgraphs in = 2 =: ( ) 2 ( ) ( )

The clique number of a random graph in (,1 2) Let ( ) # -subgraphs in = 2 =: ( ) 2 ( ) ( ) 1 The clique number of a random graph in (,1 2) Let () # -subgraphs in = 2 =:() We will be interested in s.t. ()~1. To gain some intuition note ()~ 2 =2 and so ~2log. Now let us work rigorously. () (+1)

More information

Molecular Distance Geometry and Atomic Orderings

Molecular Distance Geometry and Atomic Orderings Molecular Distance Geometry and Atomic Orderings Antonio Mucherino IRISA, University of Rennes 1 Workshop Set Computation for Control ENSTA Bretagne, Brest, France December 5 th 2013 The Distance Geometry

More information

Enhancement in Weighted PageRank Algorithm Using VOL

Enhancement in Weighted PageRank Algorithm Using VOL IOSR Journal of Computer Engeerg (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 5 (Sep. - Oct. 2013), PP 135-141 Enhancement Weighted PageRank Algorithm Usg VOL Sonal Tuteja 1 1 (Software

More information

[Ch 6] Set Theory. 1. Basic Concepts and Definitions. 400 lecture note #4. 1) Basics

[Ch 6] Set Theory. 1. Basic Concepts and Definitions. 400 lecture note #4. 1) Basics 400 lecture note #4 [Ch 6] Set Theory 1. Basic Concepts and Definitions 1) Basics Element: ; A is a set consisting of elements x which is in a/another set S such that P(x) is true. Empty set: notated {

More information

About coding style Spring February 9, 2004

About coding style Spring February 9, 2004 About codg style 15-212 Sprg 2004 February 9, 2004 Contents 1 Correctness 2 2 Specification 2 3 Style 2 3.1 if-then- Expressions... 3 3.1.1 Boolean if-then- Expressions... 3 3.1.2 if-then- stead of Pattern

More information

15-451/651: Design & Analysis of Algorithms November 20, 2018 Lecture #23: Closest Pairs last changed: November 13, 2018

15-451/651: Design & Analysis of Algorithms November 20, 2018 Lecture #23: Closest Pairs last changed: November 13, 2018 15-451/651: Design & Analysis of Algorithms November 20, 2018 Lecture #23: Closest Pairs last changed: November 13, 2018 1 Prelimaries We ll give two algorithms for the followg closest pair problem: Given

More information

A Linear Logic Representation for BPEL Process Protocol *

A Linear Logic Representation for BPEL Process Protocol * Applied Mathematics & Information Sciences An International Journal 5 (2) (2011), 25S-31S A Lear Logic Representation for BPEL Process Protocol * Jian Wu 1 and Lu J 2 1 Department of Computer Science and

More information

Scheduling complex streaming applications on the Cell processor. LIP Research Report RR-LIP

Scheduling complex streaming applications on the Cell processor. LIP Research Report RR-LIP Schedulg complex streamg applications on the Cell processor Matthieu Gallet 1,3,4 Mathias Jacquel 1,3,4 Loris Marchal 2,4 1 ENS Lyon 2 CNRS 3 Université de Lyon 4 LIP laboratory, UMR 5668, ENS Lyon CNRS

More information

THE preceding chapters were all devoted to the analysis of images and signals which

THE preceding chapters were all devoted to the analysis of images and signals which Chapter 5 Segmentation of Color, Texture, and Orientation Images THE preceding chapters were all devoted to the analysis of images and signals which take values in IR. It is often necessary, however, to

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

A Consistent Design Methodology to Meet SDR Challenges

A Consistent Design Methodology to Meet SDR Challenges Published the proceedgs of Wireless World Research Forum, Zurich, 2003 A Consistent Design Methodology to Meet SDR Challenges M. Holzer, P. Belanović, and M. Rupp Vienna University of Technology Institute

More information

On Unbounded Tolerable Solution Sets

On Unbounded Tolerable Solution Sets Reliable Computing (2005) 11: 425 432 DOI: 10.1007/s11155-005-0049-9 c Springer 2005 On Unbounded Tolerable Solution Sets IRENE A. SHARAYA Institute of Computational Technologies, 6, Acad. Lavrentiev av.,

More information

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material

More information

Sets. Sets. Subset, universe. Specifying sets, membership. Examples: Specifying a set using a predicate. Examples

Sets. Sets. Subset, universe. Specifying sets, membership. Examples: Specifying a set using a predicate. Examples Sets 2/36 We will not give a precise definition of what is a set, but we will say precisely what you can do with it. Sets Lectures 7 and 8 (hapter 16) (Think of a set as a collection of things of which

More information

2 Review of Set Theory

2 Review of Set Theory 2 Review of Set Theory Example 2.1. Let Ω = {1, 2, 3, 4, 5, 6} 2.2. Venn diagram is very useful in set theory. It is often used to portray relationships between sets. Many identities can be read out simply

More information

Generell Topologi. Richard Williamson. May 27, 2013

Generell Topologi. Richard Williamson. May 27, 2013 Generell Topologi Richard Williamson May 27, 2013 1 1 Tuesday 15th January 1.1 Topological spaces definition, terminology, finite examples Definition 1.1. A topological space is a pair (X, O) of a set

More information

Relational Database: The Relational Data Model; Operations on Database Relations

Relational Database: The Relational Data Model; Operations on Database Relations Relational Database: The Relational Data Model; Operations on Database Relations Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Overview

More information

Computing the K-terminal Reliability of Circle Graphs

Computing the K-terminal Reliability of Circle Graphs Computing the K-terminal Reliability of Circle Graphs Min-Sheng Lin *, Chien-Min Chen Department of Electrical Engineering National Taipei University of Technology Taipei, Taiwan Abstract Let G denote

More information

CSC Discrete Math I, Spring Sets

CSC Discrete Math I, Spring Sets CSC 125 - Discrete Math I, Spring 2017 Sets Sets A set is well-defined, unordered collection of objects The objects in a set are called the elements, or members, of the set A set is said to contain its

More information

Convexity: an introduction

Convexity: an introduction Convexity: an introduction Geir Dahl CMA, Dept. of Mathematics and Dept. of Informatics University of Oslo 1 / 74 1. Introduction 1. Introduction what is convexity where does it arise main concepts and

More information

On Secure Distributed Data Storage Under Repair Dynamics

On Secure Distributed Data Storage Under Repair Dynamics On Secure Distributed Data Storage Under Repair Dynamics Sameer Pawar, Salim El Rouayheb, Kannan Ramchandran University of California, Bereley Emails: {spawar,salim,annanr}@eecs.bereley.edu. Abstract We

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Walheer Barnabé. Topics in Mathematics Practical Session 2 - Topology & Convex

Walheer Barnabé. Topics in Mathematics Practical Session 2 - Topology & Convex Topics in Mathematics Practical Session 2 - Topology & Convex Sets Outline (i) Set membership and set operations (ii) Closed and open balls/sets (iii) Points (iv) Sets (v) Convex Sets Set Membership and

More information

CIS 390 Fall 2015 Robotics: Planning and Perception Kostas Daniilidis Homework 6

CIS 390 Fall 2015 Robotics: Planning and Perception Kostas Daniilidis Homework 6 CIS 390 Fall 2015 Robotics: Planning and Perception Kostas Daniilidis Homework 6 Lab session: Thursday October 27, 2016 10:30 AM, 2016 Code submission: Friday October 28, 2016 23:59 PM 1 Introduction In

More information

Unit V. Neural Fuzzy System

Unit V. Neural Fuzzy System Unit V Neural Fuzzy System 1 Fuzzy Set In the classical set, its characteristic function assigns a value of either 1 or 0 to each individual in the universal set, There by discriminating between members

More information

Author's personal copy ARTICLE IN PRESS. Information Systems 35 (2010) Contents lists available at ScienceDirect. Information Systems

Author's personal copy ARTICLE IN PRESS. Information Systems 35 (2010) Contents lists available at ScienceDirect. Information Systems Information Systems 35 (2010) 111 138 Contents lists available at ScienceDirect Information Systems journal homepage: www.elsevier.com/locate/fosys VASA: An algebra for vague spatial data databases $ Alejandro

More information

GESMI, an interval-based software for submarine SLAM. Fabrice LE BARS

GESMI, an interval-based software for submarine SLAM. Fabrice LE BARS GESMI, an interval-based software for submarine SLAM Fabrice LE BARS > Plan 1. Introduction 2. GESMI 3. Set membership approach used for SLAM 4. Demo 5. Conclusion 17/06/2010 2 Introduction 17/06/2010

More information

7.3.3 A Language With Nested Procedure Declarations

7.3.3 A Language With Nested Procedure Declarations 7.3. ACCESS TO NONLOCAL DATA ON THE STACK 443 7.3.3 A Language With Nested Procedure Declarations The C family of languages, and many other familiar languages do not support nested procedures, so we troduce

More information

Rigidity, connectivity and graph decompositions

Rigidity, connectivity and graph decompositions First Prev Next Last Rigidity, connectivity and graph decompositions Brigitte Servatius Herman Servatius Worcester Polytechnic Institute Page 1 of 100 First Prev Next Last Page 2 of 100 We say that a framework

More information

A Box-Consistency Contraction Operator Based on extremal Functions

A Box-Consistency Contraction Operator Based on extremal Functions A Box-Consistency Contraction Operator Based on extremal Functions Gilles Trombettoni, Yves Papegay, Gilles Chabert, Odile Pourtallier INRIA, Université de Nice-Sophia, France October 2008, El Paso, Texas

More information

FUNCTIONAL PEARLS Drawing Trees

FUNCTIONAL PEARLS Drawing Trees J. unctional Programmg 6 (3): 527 534, May 1996 c 1996 Cambridge University Press 527 UNCTIONL PRLS Drawg Trees NDRW J. KNNDY University of Cambridge Computer Laboratory New Museums Site, Pembroke Street

More information

Homotopy type of the complement. complex lines arrangements

Homotopy type of the complement. complex lines arrangements On the homotopy type of the complement of complex lines arrangements Department of Geometry-Topology Institute of Mathematics, VAST, Hanoi Singapore December 15, 2008 Introduction Let A be an l-arrangement,

More information

The Language of Sets and Functions

The Language of Sets and Functions MAT067 University of California, Davis Winter 2007 The Language of Sets and Functions Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (January 7, 2007) 1 The Language of Sets 1.1 Definition and Notation

More information

CHAPTER 8. Copyright Cengage Learning. All rights reserved.

CHAPTER 8. Copyright Cengage Learning. All rights reserved. CHAPTER 8 RELATIONS Copyright Cengage Learning. All rights reserved. SECTION 8.3 Equivalence Relations Copyright Cengage Learning. All rights reserved. The Relation Induced by a Partition 3 The Relation

More information

x 16 d( x) 16 n( x) 36 d( x) zeros: x 2 36 = 0 x 2 = 36 x = ±6 Section Yes. Since 1 is a polynomial (of degree 0), P(x) =

x 16 d( x) 16 n( x) 36 d( x) zeros: x 2 36 = 0 x 2 = 36 x = ±6 Section Yes. Since 1 is a polynomial (of degree 0), P(x) = 9 CHAPTER POLYNOMIAL AND RATIONAL FUNCTIONS Section -. Yes. Since is a polynomial (of degree 0), P() P( ) is a rational function if P() is a polynomial.. A vertical asymptote is a vertical line a that

More information

Intersection of sets *

Intersection of sets * OpenStax-CNX module: m15196 1 Intersection of sets * Sunil Kumar Singh This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 2.0 We have pointed out that a set

More information

A Combined Semi-Pipelined Query Processing Architecture For Distributed Full-Text Retrieval

A Combined Semi-Pipelined Query Processing Architecture For Distributed Full-Text Retrieval A Combined Semi-Pipelined Query Processing Architecture For Distributed Full-Text Retrieval Simon Jonassen and Svein Erik Bratsberg Department of Computer and Information Science Norwegian University of

More information

1.1 - Introduction to Sets

1.1 - Introduction to Sets 1.1 - Introduction to Sets Math 166-502 Blake Boudreaux Department of Mathematics Texas A&M University January 18, 2018 Blake Boudreaux (Texas A&M University) 1.1 - Introduction to Sets January 18, 2018

More information

Maximum number of edges in claw-free graphs whose maximum degree and matching number are bounded

Maximum number of edges in claw-free graphs whose maximum degree and matching number are bounded Maximum number of edges in claw-free graphs whose maximum degree and matching number are bounded Cemil Dibek Tınaz Ekim Pinar Heggernes Abstract We determine the maximum number of edges that a claw-free

More information

Sets and set operations. Lecture 5 ICOM 4075

Sets and set operations. Lecture 5 ICOM 4075 Sets and set operations Lecture 5 ICOM 4075 Reviewing sets s defined in a previous lecture, a setis a collection of objects that constitute the elementsof the set We say that a set containsits elements,

More information

Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge

Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge Amr Elmasry Kurt Mehlhorn Jens M. Schmidt Abstract Let G be a 3-connected graph on more than 4 vertices. We show that every depth-first-search

More information

9.5 Equivalence Relations

9.5 Equivalence Relations 9.5 Equivalence Relations You know from your early study of fractions that each fraction has many equivalent forms. For example, 2, 2 4, 3 6, 2, 3 6, 5 30,... are all different ways to represent the same

More information

Journal of mathematics and computer science 13 (2014),

Journal of mathematics and computer science 13 (2014), Journal of mathematics and computer science 13 (2014), 231-237 Interval Interpolation by Newton's Divided Differences Ali Salimi Shamloo Parisa Hajagharezalou Department of Mathematics, Shabestar Branch,

More information

Vertex 3-colorability of claw-free graphs

Vertex 3-colorability of claw-free graphs Algorithmic Operations Research Vol.2 (27) 5 2 Vertex 3-colorability of claw-free graphs Marcin Kamiński a Vadim Lozin a a RUTCOR - Rutgers University Center for Operations Research, 64 Bartholomew Road,

More information

An Improved Upper Bound for the Sum-free Subset Constant

An Improved Upper Bound for the Sum-free Subset Constant 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 13 (2010), Article 10.8.3 An Improved Upper Bound for the Sum-free Subset Constant Mark Lewko Department of Mathematics University of Texas at Austin

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

Optimization of the Simultaneous Localization and Map-Building Algorithm for Real-Time Implementation

Optimization of the Simultaneous Localization and Map-Building Algorithm for Real-Time Implementation 242 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 17, NO. 3, JUNE 2001 Optimization of the Simultaneous Localization and Map-Building Algorithm for Real-Time Implementation José E. Guivant and Eduardo

More information

Design Intent of Geometric Models

Design Intent of Geometric Models School of Computer Science Cardiff University Design Intent of Geometric Models Frank C. Langbein GR/M78267 GR/S69085/01 NUF-NAL 00638/G Massey University 22nd September 2004; Version 1.0 Design Intent

More information

A Bayes Learning-based Anomaly Detection Approach in Large-scale Networks. Wei-song HE a*

A Bayes Learning-based Anomaly Detection Approach in Large-scale Networks. Wei-song HE a* 17 nd International Conference on Computer Science and Technology (CST 17) ISBN: 978-1-69-461- A Bayes Learng-based Anomaly Detection Approach Large-scale Networks Wei-song HE a* Department of Electronic

More information

Modeling with Uncertainty Interval Computations Using Fuzzy Sets

Modeling with Uncertainty Interval Computations Using Fuzzy Sets Modeling with Uncertainty Interval Computations Using Fuzzy Sets J. Honda, R. Tankelevich Department of Mathematical and Computer Sciences, Colorado School of Mines, Golden, CO, U.S.A. Abstract A new method

More information

Chapter 12 Solid Modeling. Disadvantages of wireframe representations

Chapter 12 Solid Modeling. Disadvantages of wireframe representations Chapter 12 Solid Modeling Wireframe, surface, solid modeling Solid modeling gives a complete and unambiguous definition of an object, describing not only the shape of the boundaries but also the object

More information

ROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING WITH UNCERTAINTY

ROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING WITH UNCERTAINTY ALGEBRAIC METHODS IN LOGIC AND IN COMPUTER SCIENCE BANACH CENTER PUBLICATIONS, VOLUME 28 INSTITUTE OF MATHEMATICS POLISH ACADEMY OF SCIENCES WARSZAWA 1993 ROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING

More information

Strong Dominating Sets of Direct Product Graph of Cayley Graphs with Arithmetic Graphs

Strong Dominating Sets of Direct Product Graph of Cayley Graphs with Arithmetic Graphs International Journal of Applied Information Systems (IJAIS) ISSN : 9-088 Volume No., June 01 www.ijais.org Strong Domatg Sets of Direct Product Graph of Cayley Graphs with Arithmetic Graphs M. Manjuri

More information

APPLICATION OF FRACTIONAL WAVELET TRANSFORM FOR IMAGE AUTHENTICATION

APPLICATION OF FRACTIONAL WAVELET TRANSFORM FOR IMAGE AUTHENTICATION APPLICATION OF FRACTIONAL WAVELET TRANSFORM FOR IMAGE AUTHENTICATION G. K. Raji 1, G. Ramachandra Reddy 2 1 School of Electrical Engeerg, VIT University,Vellore, Tamil Nadu, India 2 ECE Department, S.

More information

Keyword: Quadratic Bézier Curve, Bisection Algorithm, Biarc, Biarc Method, Hausdorff Distances, Tolerance Band.

Keyword: Quadratic Bézier Curve, Bisection Algorithm, Biarc, Biarc Method, Hausdorff Distances, Tolerance Band. Department of Computer Science Approximation Methods for Quadratic Bézier Curve, by Circular Arcs within a Tolerance Band Seminar aus Informatik Univ.-Prof. Dr. Wolfgang Pree Seyed Amir Hossein Siahposhha

More information

Task Allocation Negotiation and the Contract Net Protocol

Task Allocation Negotiation and the Contract Net Protocol Task Allocation Negotiation and the Contract Net Protocol March 25, 2003 Class Meeting 19 Outline Introduction to Task Allocation The Contract Net Protocol Multi-Robot Task Allocation What is task allocation?

More information

Section 16. The Subspace Topology

Section 16. The Subspace Topology 16. The Subspace Product Topology 1 Section 16. The Subspace Topology Note. Recall from Analysis 1 that a set of real numbers U is open relative to set X if there is an open set of real numbers O such

More information

Integration of Fuzzy Shannon s Entropy with fuzzy TOPSIS for industrial robotic system selection

Integration of Fuzzy Shannon s Entropy with fuzzy TOPSIS for industrial robotic system selection JIEM, 2012 5(1):102-114 Online ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.397 Integration of Fuzzy Shannon s Entropy with fuzzy TOPSIS for industrial robotic system selection

More information

Parameterized Approximation Schemes Using Graph Widths. Michael Lampis Research Institute for Mathematical Sciences Kyoto University

Parameterized Approximation Schemes Using Graph Widths. Michael Lampis Research Institute for Mathematical Sciences Kyoto University Parameterized Approximation Schemes Using Graph Widths Michael Lampis Research Institute for Mathematical Sciences Kyoto University May 13, 2014 Overview Topic of this talk: Randomized Parameterized Approximation

More information

An example DFA: reaching definitions

An example DFA: reaching definitions Dataflow analysis: what is it? Dataflow analysis A common framework for expressg algorithms that compute formation ab a program Why is such a framework useful? Dataflow analysis: what is it? A common framework

More information

Final Test in MAT 410: Introduction to Topology Answers to the Test Questions

Final Test in MAT 410: Introduction to Topology Answers to the Test Questions Final Test in MAT 410: Introduction to Topology Answers to the Test Questions Stefan Kohl Question 1: Give the definition of a topological space. (3 credits) A topological space (X, τ) is a pair consisting

More information

Complexity Theory. Compiled By : Hari Prasad Pokhrel Page 1 of 20. ioenotes.edu.np

Complexity Theory. Compiled By : Hari Prasad Pokhrel Page 1 of 20. ioenotes.edu.np Chapter 1: Introduction Introduction Purpose of the Theory of Computation: Develop formal mathematical models of computation that reflect real-world computers. Nowadays, the Theory of Computation can be

More information

The kidnapping Problem of Mobile Robots: A Set Membership Approach.

The kidnapping Problem of Mobile Robots: A Set Membership Approach. The kidnapping Problem of Mobile Robots: A Set Membership Approach. Rémy GUYONNEAU, Sébastien LAGRANGE, Laurent HARDOUIN and Philippe LUCIDARME. Laboratoire d Ingénierie des Systèmes Automatisés (LISA),

More information

On the Max Coloring Problem

On the Max Coloring Problem On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive

More information

2. Sets. 2.1&2.2: Sets and Subsets. Combining Sets. c Dr Oksana Shatalov, Fall

2. Sets. 2.1&2.2: Sets and Subsets. Combining Sets. c Dr Oksana Shatalov, Fall c Dr Oksana Shatalov, Fall 2014 1 2. Sets 2.1&2.2: Sets and Subsets. Combining Sets. Set Terminology and Notation DEFINITIONS: Set is well-defined collection of objects. Elements are objects or members

More information

Static Analysis for Fast and Accurate Design Space Exploration of Caches

Static Analysis for Fast and Accurate Design Space Exploration of Caches Static Analysis for Fast and Accurate Design Space Exploration of Caches Yun iang, Tulika Mitra Department of Computer Science National University of Sgapore {liangyun,tulika}@comp.nus.edu.sg ABSTRACT

More information

HW/SW Codesign. WCET Analysis

HW/SW Codesign. WCET Analysis HW/SW Codesign WCET Analysis 29 November 2017 Andres Gomez gomeza@tik.ee.ethz.ch 1 Outline Today s exercise is one long question with several parts: Basic blocks of a program Static value analysis WCET

More information

Set-Membership Approach to the Kidnapped Robot Problem

Set-Membership Approach to the Kidnapped Robot Problem Set-Membership Approach to the Kidnapped Robot Problem Benoît Desrochers 1,2, Simon Lacroix 1,3 and Luc Jaulin 2 Abstract This article depicts an algorithm which matches the output of a Lidar with an initial

More information

9 Bounds for the Knapsack Problem (March 6)

9 Bounds for the Knapsack Problem (March 6) 9 Bounds for the Knapsack Problem (March 6) In this lecture, I ll develop both upper and lower bounds in the linear decision tree model for the following version of the (NP-complete) Knapsack 1 problem:

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Generell Topologi. Richard Williamson. May 6, 2013

Generell Topologi. Richard Williamson. May 6, 2013 Generell Topologi Richard Williamson May 6, 2013 1 8 Thursday 7th February 8.1 Using connectedness to distinguish between topological spaces I Proposition 8.1. Let (, O ) and (Y, O Y ) be topological spaces.

More information

MASTER Mathématiques et Applications

MASTER Mathématiques et Applications MASTER Mathématiques et Applications SPECIALITE : SYSTEMES DYNAMIQUES ET SIGNAUX Année 13/14 Benoît DESRCHERS Soutenu le 27 aout 14 Au sein de l'institut des Sciences et Techniques de l'ingénieurs d'angers

More information

Design Intent of Geometric Models

Design Intent of Geometric Models School of Computer Science Cardiff University Design Intent of Geometric Models Frank C. Langbein GR/M78267 GR/S69085/01 NUF-NAL 00638/G Auckland University 15th September 2004; Version 1.1 Design Intent

More information

Method of Semantic Web Service Discovery and Automatic Composition

Method of Semantic Web Service Discovery and Automatic Composition 298 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 6, NO. 3, AUGUST 2014 Method of Semantic Web Service Discovery and Automatic Composition Yuem Wang Suqian College, 3 rd Department, Suqian,

More information

Section Rational Functions and Inequalities. A rational function is a quotient of two polynomials. That is, is a rational function if

Section Rational Functions and Inequalities. A rational function is a quotient of two polynomials. That is, is a rational function if Section 6.1 --- Rational Functions and Inequalities A rational function is a quotient of two polynomials. That is, is a rational function if =, where and are polynomials and is not the zero polynomial.

More information