William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract
|
|
- Esmond Richards
- 6 years ago
- Views:
Transcription
1 Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology Pasaena, California Abstract The preliminary esign process is characterize by imprecision: the vagueness of an incomplete esign escription. The Metho of Imprecision uses the mathematics of fuzzy sets to explicitly represent an manipulate imprecise preliminary esign information, enabling the esigner to explore the space of alternative esigns in the context of the esigner an customer's preferences among alternatives. This paper introuces new methos to perform Metho of Imprecision calculations for general non-monotonic esign evaluation functions that aress the practical necessity to minimize the number of function evaluations. These methos utilize optimization an experiment esign. Introuction Evaluation is a ey component of preliminary esign. Evaluating alternatives early in the esign process avois further investment in inferior alternatives, an can allow more alternatives to be consiere. Traitional evaluation tools are of limite value in preliminary esign because they require a precise esign escription. Preliminary esign information is characteristically imprecise: the esign escription is vague an inistinct. The esigner must consier a clou of alternative esigns. A computational tool that consiers iniviual esigns separately provies limite insight into the structure of the clou of alternatives. A more systematic methoology is require: one that explicitly moels imprecision. The Metho of Imprecision [1, 2, 3] uses the mathematics of fuzzy sets to represent an manipulate imprecise preliminary esign information. The Imprecise Design Tool [3], a computational implementation of this methoology, supports preliminary esign ecisions base on imprecise information, an accepts any esign evaluation function as require by the application. Manuscript prepare for submission to the 21st ASME Design Automation Conference, September y KEYWORDS: Design optimization; Inustrial examples, evelopments an perspectives. 1
2 Practical computational tools for esign must be resource ecient. They must not eman too much of a esigner's time an attention, an they must prouce satisfactory answers without excessive computation. Frequently the cost of evaluating a esign is substantial, an the critical measure of computational eciency is the number of esign evaluations require. This paper presents new methos to calculate imprecision for general non-monotonic evaluation functions that aress the practical necessity to minimize the number of function evaluations. Many of these methos evolve from iscussions with engineers from the Vehicle Structures Computer Aie Design group at the For Motor Company, Dearborn, MI, an in particular Thomas Mathai. The authors gratefully acnowlege their contribution. Denitions an Notation Design alternatives are escribe by a collection of esign variables 1 ; ::; n. These variables nee not be continuous or even orinal: the esign variable \styling" may have the unorere values \conservative", \sporty", an \futuristic". The set of vali values for i is enote X i. The whole set of esign variables forms an n vector,, ~ that uniquely ienties each esign alternative intheesign variable space (DVS). Performance variables p 1 ; :::; p q measure aspects of a esign's performance. Each performance variable p j is ene by a mapping f j such that p j = f j ( ). ~ The mappings f j can be any calculation or proceure to evaluate the performance of a esign, incluing close-form equations, computational algorithms, \blac box" functions, prototype testing, an maret research. The set of vali values for p j is enote Y j. The set of performance variables for each esign alternative forms a q vector, ~p = f( ~ ), ~ that species the performance of a esign. ~ The performance variable space (PVS) encompasses all performances ~p. Imprecise variables may potentially assume any value within a possible range because the esigner oes not now, a priori, the nal value that will emerge from the esign process. Yet even though the esigner is unsure about what value to specify, certain values will be preferre over others. This preference, which may arise objectively (e.g., cost or availability of components) or subjectively (e.g., from experience), is use to quantify the imprecision associate with a esign variable. The preference that the esigner has for values of the esign variable i is represente by a preference function on X i, terme the esign preference: i ( i ):X i![0; 1] R: i ( i ) quanties the esigner's preference for values of i, an is istinct from the customary membership function in a fuzzy set, which quanties the extent to which values belong to the set. The preference that a customer has for values of the performance variable p j is similarly represente by a preference function on Y j, terme the functional requirement: pj (p j ):Y j![0; 1] R: The combine preference of the esigner an customer for a particular esign ~ is represente by anoverall preference o ( ~ ), which is a function of the esign preferences i ( i ), an the functional requirements pj (p j )= pj (f j ( ~ )): o = P, 1 ; :::; n ; p1 ; :::; pq : The combination function P reects the esign or trae-o strategy, which inicates how competing attributes of the esign shoul be trae-o against each other [1]. 2
3 DVS yj µ D α µ α 2 f j α 1 p α jmin p j α max p j Figure 1. The Level Interval Algorithm. Imprecision Calculations After specifying esign preferences 1 ; :::; n an functional requirements p1 ; :::; p q, an ientifying the appropriate esign strategy, the iniviual i are combine to obtain, the combine esign preference on the DVS. is then inuce onto the PVS, using the extension principle [4]: (~p) = supf ( ) ~ j ~p = f ~ ( )g ~ where sup over the null set is ene to be zero. ( ) ~ is the combine esign preference on the DVS, as istinct from (~p), the combine esign preference inuce onto the PVS. (~p) is obtaine by mapping ( )onto ~ the PVS. Previously, (~p) has been calculate using the Level Interval Algorithm, orlia [2], rst propose by Dong an Wong [5] as the \Fuzzy Weighte Average" algorithm an also calle the \Vertex Metho". The LIA uses M esign preference -cuts D 1 ; :::; D M in the DVS to calculate iniviual inuce {cut intervals [p j min ;p j ] which together ene the max inuce {cuts P in the PVS: D = f ~ 2 DVS j ( ~ ) g = [ 1 min ; 1 max] :::[ n P = f~p 2 PVS j (~p) g = [p 1 min ;p 1 max] :::[p q min ; nmax] min ;p ] qmax where =1; :::; M. For each, the LIA evaluates p j = f j ( ) ~ for the 2 n permutations of -cut en points which correspon to the corners of an n-cube ene by D (there are n esign variables an M-cuts). Figure 1 illustrates how -cuts D in two esign variables 1 an 2 are inuce onto the interval [p j min ;p ]. jmax f j is evaluate at the 2 n = 4 corner points of each D rectangle. It is assume that p an j min p j will occur at these corner max points, an not insie D. This is not true in general: the mapping f j :DVS!Y j an the combination function P must satisfy certain conitions for the LIA to be exact [6]. In practice, these conitions require that f j be monotonic: a severe restriction. 3
4 i ( i ) iniviual esign preference on X i (esigner), i =1; :::; n ( ) ~ (~p) combine esign preference on the DVS combine esign preference inuce onto the PVS pj (p j ) iniviual functional requirement ony j (customer), j =1; :::; q p (~p) combine functional requirement on the PVS p ( ) ~ o ( ) ~ o (~p) P combine functional requirement mappe bac onto the DVS overall preference on the DVS overall preference on the PVS combination function D -cut in the DVS, within which ( ) ~ ( =1; :::; M ) P -cut in the PVS, within which (~p) ( =1; :::; M ) Optimization The limitations of the LIA stem from the assumption that the extreme values of f j will occur at the corner points of the D n-cube. The algorithm may thus be improve by relaxing this assumption. The problem restate is to n: p j min = minfp j = f j ( ~ ) j ~ 2 D g p j max = maxfp j = f j ( ~ ) j ~ 2 D g Fining extrema within a subspace is a constraine optimization problem. Optimization techniques are ivie into two categories: traitional an stochastic. Traitional methos converge in relatively few function evaluations but are less robust, tening to become stuc in local minima. Stochastic methos such as genetic algorithms are more robust, but require a large number of function evaluations. Where function evaluations are relatively expensive, as is common in esign, traitional optimization methos are preferre. The algorithm utilize here is Powell's metho, which begins as a one at a time search. After each iteration a heuristic etermines whether to replace the irection of maximum ecrease with the net irection move uring the last iteration. This allows minimization own valleys while avoiing linear epenence in the set of search irections [7]. An important feature for a practical computational tool is a means to trae-o the number of function evaluations against accuracy. Such an ajustment enables the esigner to use the same program to obtain quic estimates as well as precise evaluations. This is implemente as a user-specie fractional precision that enes termination criteria for the optimization algorithm. Suppose that it is necessary to incur the minimum number of function evaluations. A fractional precision of 1 woul be specie, creating automatically satise termination criteria, an the optimization woul procee through exactly one iteration of a one at a time search using the maximum step size. The algorithm begins at one corner of the search space D, an checs corners in each of the n irections given by 1 ; :::; n,moving to the minimum each time. It expens n + 1 function evaluations to n each en point, an therefore 2n +2per -cut, as compare to 2 n per -cut for the LIA. This is a substantial improvement, but the -cut interval obtaine by this metho is still only correct if f j is monotonic. If, however, f j is nown to be monotonic, 2n+2 is not the minimum number of function evaluations. The rst pass of the optimization algorithm ienties the irection for each 4
5 i in which f j increases. Subsequent extrema can then be irectly evaluate, without the nee for searching. Hence where f j is monotonic, n + 2 function evaluations are require for the rst -cut an 2 for each subsequent -cut. Design of Experiments Statistical esign of experiments sees to erive information about a process using as few observations as possible. It has two aims: to separate the eects to be measure from ranom noise, an to moel the process with regression equations. The function f j can be treate as an unnown process, which a shrew optimization metho shoul examine with a few function evaluations before searching for extrema. Statistical esign of experiments is an ecient metho to conuct this preliminary examination. Note that if the process is eterministic, e.g., a computer program, repeate function evaluations will always give the same answer: the output contains no noise. Therefore statistical signicance tests to istinguish the signal are unnecessary. This paper iscusses only the use of experiment esign to moel the function, though statistical signicance tests are a valuable technique for processes subject to noise. Because the proceure is to be encoe in a computer program, avance experiment esign techniques cannot be implemente. Hence only a linear regression moel will be tte to the function. Such a simple moel will aequately approximate the eect of few, if any, esign variables, but that is sucient. The purpose is not to replace the entire function with a sophisticate regression moel, but rather to ientify esign variables with near-linear eects. For each of these variables, the function can then be approximate by a linear equation, shrining the search space by one imension. The function shoul therefore be moele over the search space D. But which D? -cuts with higher are subsets of -cuts with lower. Thus D 1, the -cut with the lowest, contains all the other -cuts. Any regression equations foun to be acceptable over D 1 will be acceptable over all -cuts. Hence only one set of experiments over D 1 is require to explore the entire search space. The Imprecise Design Tool will use a2level experiment esign with a center point to serve as a curvature chec. A full factorial esign woul evaluate the same 2 n corner points of D as the LIA, but since there are n main eects an 1 average to be etermine, only n+1 evaluations are strictly necessary (excluing the center point). A fractional factorial esign, which only evaluates a balance subset of corner points, is more ecient. In reucing a full factorial esign own to a fractional factorial esign, some interactions are unavoiably confoune with other interactions, so that their eects cannot be istinguishe. It is assume that main interactions, ue to a single variable, are more liely than two-way interactions, which are in turn more liely than three-way an higher orer interactions. Since only main eects will be estimate, they must not be confoune with each other. This requires a resolution III (or higher) esign. But it is esirable for main eects also not to be confoune with two-way interactions, an this requires a resolution IV esign [8]. For n = 8, the smallest resolution IV esign is a 2 8,4 fractional factorial esign requiring 16 observations. A resolution III esign woul require 12 observations. Resolution III esigns approach the strictly necessary n + 1 function evaluations. Resolution IV esigns require between 2n an 4n, 4 function evaluations [9]. For n = 8, 16 function evaluations woul be use: 9 evaluations are strictly necessary to estimate the 8 main eects an 1 average, an so there are 7 \reunant" evaluations. But these evaluations are not waste: they allow main eects to be separate from two-way interactions, an they provie 7 extra 5
6 points to verify the accuracy of the linear regression moel. The number of function evaluations can also be trae-o against accuracy for the esign of experiments. The linear regression equations obtaine replace the function where the approximation is acceptable. The criteria for \acceptable", which etermine how accurately the function is moele, are irectly relate to the user-specie fractional precision use by the optimization algorithm. Thus a single parameter traes-o computational eort against accuracy for both optimization an experiment esign. Relaxing the criteria for moel acceptability minimizes the number of function evaluations. Yet there are essential conitions that still must be satise: if the sign of the graient for a esign variable i is in oubt or if the center point is an extremum, the linear regression equation for i must be rejecte. If the function is benign, a maximum of 4n, 3 evaluations (incluing the center point) will be incurre to obtain the regression equations an up to 2 evaluations will be require for the preicte -cut en points. 4n, 1evaluations excees the n +1evaluations require for a one at a time search, but the avantages are fourfol: 1. Monotonicity is not assume: up to 3n, 5 \reunant" points test for monotonicity an linearity. 2. The center point tests for curvature. 3. The entire ata set is use in estimating each eect, instea of two points. 4. An even istribution of corner points is sample, instea of n + 1 ajacent corners. Discussion Figure 2 shows the role of optimization an experiment esign in the Imprecise Design Tool. The information ow for one performance variable p j = f j ( ) ~ is shown. -cut intervals [p j min ;p j ] can be calculate separately for each Y max j, an then combine in the uppermost preference calculation moule. All Metho of Imprecision calculations that explicitly involve preference occur at this level. Mapping -cuts from the DVS to Y j requires optimization, which searches for the inuce -cut interval [p j min ;p ] that correspons to jmax D. To o so, the experiment esign moule is calle repeately to evaluate the function f j at ierent esigns. ~ The rst time the moule is calle, it conucts a fractional factorial experiment over D 1, the -cut with lowest, an constructs linear regression equations. For subsequent calls, regression equations replace the function f j for any esign variables that are aequately approximate. The fractional precision use by the optimization an experiment esign moules traes-o the number of function evaluations against accuracy. For the two esign alternatives in the turbofan engine esign example in [3], the Imprecise Design Tool using the LIA require 12 an 128 function evaluations. The alternatives ha 4 an 5 -cuts with some coincient en points, especially for the rst alternative. Although there were nominally 8 esign variables for both alternatives, the number of imensions in the search space was 3 an 6. Using only optimization, an without taing avantage of monotonicity, the current version of the Imprecise Design Tool require 12 an 38 function evaluations to obtain the same results. As expecte, optimization has a greater avantage for larger n. 6
7 DVS µ 1,...,µ n fractional precision δ µ p 1,...,µ p q PVS µ () Preference Calculations µ (p) D α δ Optimization p α jmin p α jmax D α1 δ Experiment Design fj () Imprecise Design Tool f j f () j Figure 2. The Imprecise Design Tool. Conclusion This paper has presente new methos to perform Metho of Imprecision calculations. These methos, which use optimization an experiment esign techniques, provie two important enhancements: 1. Evaluation functions are no longer assume to be monotonic. 2. The number of function evaluations require is substantially reuce. Preliminary esign necessarily eals with imprecise esign escriptions. Traitional evaluation tools lac a systematic methoology to accommoate imprecision an eliver only isconnecte information on iniviual esigns. The Metho of Imprecision uses the mathematics of fuzzy sets to represent an manipulate imprecise preliminary esign information, enabling the esigner to explore an unerstan the space of alternative esigns in the context of the esigner an customer's preferences among alternatives. This paper has presente continuing wor in implementing this methoology in a practical computational esign tool. 7
8 Acnowlegments This material is base upon wor supporte, in part, by: The National Science Founation uner a NSF Grant No. DDM Any opinions, nings, conclusions, or recommenations expresse in this publication are those of the authors an o not necessarily reect the views of the sponsors. References [1] Kevin N. Otto an Eri K. Antonsson. Trae-O Strategies in Engineering Design. Research in Engineering Design, 3(2):87{104, [2] Kristin L. Woo, Kevin N. Otto, an Eri K. Antonsson. Engineering Design Calculations with Fuzzy Parameters. Fuzzy Sets an Systems, 52(1):1{20, November [3] William S. Law an Eri K. Antonsson. Incluing Imprecision in Engineering Design Calculations. In Design Theory an Methology { DTM '94, volume DE-68, pages 109{ 114. ASME, September [4] L. A. Zaeh. Fuzzy sets. Information an Control, 8:338{353, [5] W. M. Dong an F. S. Wong. Fuzzy weighte averages an implementation of the extension principle. Fuzzy Sets an Systems, 21(2):183{199, February [6] Kevin N. Otto, Anrew D. Lewis, an Eri K. Antonsson. Approximating -cuts with the Vertex Metho. Fuzzy Sets an Systems, 55(1):43{50, April [7] P. Aby an M. Dempster. Introuction to Optimization Methos. Chapman an Hall, Lonon, [8] T. Barer. Quality by Experimental Design. Marcel Deer, Inc., New Yor, [9] M. Phae. Quality Engineering Using Robust Design. Prentice Hall, Englewoo Clis, NJ,
Coupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationAdvanced method of NC programming for 5-axis machining
Available online at www.scienceirect.com Proceia CIRP (0 ) 0 07 5 th CIRP Conference on High Performance Cutting 0 Avance metho of NC programming for 5-axis machining Sergej N. Grigoriev a, A.A. Kutin
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationSoftware Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency
Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationVerifying performance-based design objectives using assemblybased vulnerability
Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA
More informationIndexing the Edges A simple and yet efficient approach to high-dimensional indexing
Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationd 3 d 4 d d d d d d d d d d d 1 d d d d d d
Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching
More informationFault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs
Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurall Snthesize BDDs Sergei Devaze, Jaan Rai, Artur Jutman, Raimun Ubar Tallinn Universit of Technolog, Estonia
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationInuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem
Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art
More informationInverse Model to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach
Inverse Moel to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach 1 HAFEZ IBRAHIM, 2 JAMALLUDIN TALIB, 3 NORMAH MAAN Department of Mathematics Universiti Teknologi Malaysia 81310
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationImpact of cache interferences on usual numerical dense loop. nests. O. Temam C. Fricker W. Jalby. University of Leiden INRIA University of Versailles
Impact of cache interferences on usual numerical ense loop nests O. Temam C. Fricker W. Jalby University of Leien INRIA University of Versailles Niels Bohrweg 1 Domaine e Voluceau MASI 2333 CA Leien 78153
More informationP. Fua and Y. G. Leclerc. SRI International. 333 Ravenswood Avenue, Menlo Park, CA
Moel Driven Ege Detection P. Fua an Y. G. Leclerc SI International 333 avenswoo Avenue, Menlo Park, CA 9425 (fua@ai.sri.com leclerc@ai.sri.com) Machine Vision an Applications, 3, 199 Abstract Stanar ege
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationLearning Polynomial Functions. by Feature Construction
I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationBends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways
Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationCharacterizing Decoding Robustness under Parametric Channel Uncertainty
Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More information6 Gradient Descent. 6.1 Functions
6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output
More informationInvestigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal
991 Investigation into a new incremental forming process using an ajustable punch set for the manufacture of a oubly curve sheet metal S J Yoon an D Y Yang* Department of Mechanical Engineering, Korea
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationPERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING
PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationLocal Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction
Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationA Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization
272 INFORMS Journal on Computing 0899-1499 100 1204-0272 $05.00 Vol. 12, No. 4, Fall 2000 2000 INFORMS A Revise Simplex Search Proceure for Stochastic Simulation Response Surface Optimization DAVID G.
More informationHandling missing values in kernel methods with application to microbiology data
an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos
More informationProvisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks
Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationNAND flash memory is widely used as a storage
1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage
More informationPART 2. Organization Of An Operating System
PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationFrom an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller
From an Abstract Object-Oriente Moel to a Reay-to-Use Embee System Controller Stanislav Chachkov, Diier Buchs Software Engineering Laboratory, Swiss Feeral Institute for Technology 1015 Lausanne, Switzerlan
More informationComputer Graphics Chapter 7 Three-Dimensional Viewing Viewing
Computer Graphics Chapter 7 Three-Dimensional Viewing Outline Overview of Three-Dimensional Viewing Concepts The Three-Dimensional Viewing Pipeline Three-Dimensional Viewing-Coorinate Parameters Transformation
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationEvolutionary Optimisation Methods for Template Based Image Registration
Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,
More informationResearch Article Inviscid Uniform Shear Flow past a Smooth Concave Body
International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of
More informationDual Arm Robot Research Report
Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms
More informationMultilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis
Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationMANJUSHA K.*, ANAND KUMAR M., SOMAN K. P.
Journal of Engineering Science an echnology Vol. 13, No. 1 (2018) 141-157 School of Engineering, aylor s University IMPLEMENAION OF REJECION SRAEGIES INSIDE MALAYALAM CHARACER RECOGNIION SYSEM BASED ON
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationExploring Context with Deep Structured models for Semantic Segmentation
APPEARING IN IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, APRIL 2017. 1 Exploring Context with Deep Structure moels for Semantic Segmentation Guosheng Lin, Chunhua Shen, Anton van en
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informationUNIT 9 INTERFEROMETRY
UNIT 9 INTERFEROMETRY Structure 9.1 Introuction Objectives 9. Interference of Light 9.3 Light Sources for 9.4 Applie to Flatness Testing 9.5 in Testing of Surface Contour an Measurement of Height 9.6 Interferometers
More informationFast Window Based Stereo Matching for 3D Scene Reconstruction
The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department
More informationA Duality Based Approach for Realtime TV-L 1 Optical Flow
A Duality Base Approach for Realtime TV-L 1 Optical Flow C. Zach 1, T. Pock 2, an H. Bischof 2 1 VRVis Research Center 2 Institute for Computer Graphics an Vision, TU Graz Abstract. Variational methos
More informationGenetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target
.IJCSI.org 67 Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target Karim Benbouaballah an Zhu Qi-an College of Automation, Harbin Engineering University Harbin, 151, China
More informationTHE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM
International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao
More informationExploring Context with Deep Structured models for Semantic Segmentation
1 Exploring Context with Deep Structure moels for Semantic Segmentation Guosheng Lin, Chunhua Shen, Anton van en Hengel, Ian Rei between an image patch an a large backgroun image region. Explicitly moeling
More informationDisjoint Multipath Routing in Dual Homing Networks using Colored Trees
Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,
More informationWLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic
WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e
More informationShift-map Image Registration
Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy
More informationA Comparative Evaluation of Iris and Ocular Recognition Methods on Challenging Ocular Images
A Comparative Evaluation of Iris an Ocular Recognition Methos on Challenging Ocular Images Vishnu Naresh Boeti Carnegie Mellon University Pittsburgh, PA 523 naresh@cmu.eu Jonathon M Smereka Carnegie Mellon
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationNew Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance
New Version of Davies-Boulin Inex for lustering Valiation Base on ylinrical Distance Juan arlos Roas Thomas Faculta e Informática Universia omplutense e Mari Mari, España correoroas@gmail.com Abstract
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationRough Set Approach for Classification of Breast Cancer Mammogram Images
Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems
More information2-connected graphs with small 2-connected dominating sets
2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A
More informationA MIMO Fuzzy Controller for tracking: Robot control. Carl Crane Professor, Mechanical Engineering University of Florida Gainesville, FL 32611
A MIMO Fuzzy Controller for tracking: Robot control Paul A.C. Mason Assistant Professor, Kevin Walchko Research Assistant Carl Crane Professor, Mechanical Engineering University of Floria Gainesville,
More informationEstimating Velocity Fields on a Freeway from Low Resolution Video
Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department
More informationAn Anti-Aliasing Technique for Splatting
An Anti-Aliasing Technique for Splatting J. Ewar Swan II 1,2,3 Klaus Mueller 2 Torsten Möller 1,2 Naeem Shareef 1,2 Roger Crawfis 1,2 Roni Yagel 1,2 1 Avance Computing Center for the Arts an Design 2 Department
More informationAlgorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times
Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal
More informationShort-term prediction of photovoltaic power based on GWPA - BP neural network model
Short-term preiction of photovoltaic power base on GWPA - BP neural networ moel Jian Di an Shanshan Meng School of orth China Electric Power University, Baoing. China Abstract In recent years, ue to China's
More informationAll-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA
Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,
More informationX y. f(x,y,d) f(x,y,d) Peak. Motion stereo space. parameter space. (x,y,d) Motion stereo space. Parameter space. Motion stereo space.
3D Shape Measurement of Unerwater Objects Using Motion Stereo Hieo SAITO Hirofumi KAWAMURA Masato NAKAJIMA Department of Electrical Engineering, Keio Universit 3-14-1Hioshi Kouhoku-ku Yokohama 223, Japan
More informationBlind Data Classification using Hyper-Dimensional Convex Polytopes
Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way
More informationResearch Article Research on Law s Mask Texture Analysis System Reliability
Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November
More informationControlling formations of multiple mobile robots. Jaydev P. Desai Jim Ostrowski Vijay Kumar
Controlling formations of multiple mobile robots Jayev P. Desai Jim Ostrowski Vijay Kumar General Robotics an Active Sensory Perception (GRASP) Laboratory, University of Pennsylvania 340 Walnut Street,
More informationData Mining: Clustering
Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity
More informationFeature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative
More informationTCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model
TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp
More information