Heuristics for Thelen s Prime Implicant Method 1

Size: px
Start display at page:

Download "Heuristics for Thelen s Prime Implicant Method 1"

Transcription

1 S C H E D A E I N F O R M A T I C A E VOLUME Heuristics for Thelen s Prime Implicnt Method 1 Jcek Biegnowski, Andrei Krtkevich Institute of Computer Engineering nd Electronics, ul. Podgórn 50, Zielon Gór e-mil: J.Biegnowski@iie.u.gor.pl, A.Krtkevich@iie.u.gor.pl Astrct. Thelen s lgorithm is n efficient method for genertion of the prime implicnts of Boolen function represented in CNF. In the pper new heuristics re presented, llowing to ccelerte the lgorithm. Eperimentl nlsis of their effects is performed. Kewords: Boolen functions, CNF, prime implicnts, serch tree, Thelen s method. 1. Introduction A lot of tsks relted to computer-ided logicl design require clcultion of prime implicnts of logicl function, which is often represented in conjunctive norml form (CNF) i.e., s product of sums. The most known of such tsks is two-level minimition of Boolen functions. Most methods of minimition (especill of ect minimition), oth clssicl nd modern, require clcultion of ll the prime implicnts, from which suset representing miniml DNF is then selected. For emple, the most widel used minimition progrm ESPRESSO uses such pproch [8]. It is worth mentioning, however, tht some new efficient methods hve een developed voiding to generte ll the prime implicnts [3, 7, 8]. On 1 The reserch is prtill supported Polish Stte Committee for Scientific Reserch (KBN) grnt No. 4T11C

2 126 the other hnd, new vrints of minimition methods requiring ll the prime implicnts re still eing developed [8, 10, 11]. And there re lot of other pplictions of method of prime implicnts genertion. For emple, clcultion of the complement of Boolen function (in DNF), or trnsformtion of Boolen eqution from CNF to DNF. And vice vers s fr s due to the Morgn s lws trnsformtion from DNF to CNF cn e performed trnsformtion from CNF to DNF. One more ppliction is detecting dedlocks nd trps in Petri net, which cn e performed solving logicl equtions [13, 14]. Generll, solutions of logicl eqution cn e esil otined from prime implicnts of its left prt, if the right prt is 1. Also there re tsks, which cn e solved clculting the shortest prime implicnt or prime implicnts stisfing certin conditions. In [5] severl of such logicl design tsks re discussed. Covering prolems, oth unte nd inte covering, cn e esil represented s logicl epressions in CNF nd re usull solved one of two pproches: BDD-sed [1] or rnch nd ound, for which the shortest prime implicnt would correspond to n optiml solution [2]. The sme is true for some grph prolems, such s decclistion of grphs [4]. Tsk of detecting dedlocks in FSM networks cn e reduced to tsk of generting suset of prime implicnts. The pproch discussed in this pper cn e pplied (directl or with some modifictions) to the whole rnge of mentioned prolems. For genertion of prime implicnts severl lgorithms re known. The method of Nelson [9], prol historicll first such method for CNF, is sed on strightforwrd multipling the disjunctions nd deleting the products tht susume other products. Such trnsformtion is ver time- nd memor-consuming. More efficient methods re known: n lgorithm sed on serch tree, proposed B. Thelen [12], nd recursive method descried in [8]. Comprison of those two methods is eond the scope of our pper; the pper is dedicted to heuristics llowing to ccelerte Thelen s method. Eecution time of this lgorithm depends remrkl on the order of cluses nd literls in the epression. Hence we m suppose tht some reordering of the epression will increse efficienc of the lgorithm. As fr s the serch tree in Thelen s method is reduced mens of certin rules (descried elow), it is difficult to evlute priori effects of different vrints of reordering. So it is resonle to use heuristic pproch nd to verif the heuristics sttisticll. Some of such heuristics re descried in [5, 6]. The rticle descries some new heuristics, their nlsis nd comprison with known heuristics. Eperiments re performed using the rndoml generted smples; the optiml comintion of the heuristics is formulted on the sis of eperimentl results.

3 Thelen s lgorithm Thelen s prime implicnt lgorithm is sed on the method of Nelson [9], who hs shown, tht ll the prime implicnts of Boolen function in conjunctive form cn e otined its trnsformtion into disjunctive form. Nelson s trnsformtion is performed strightforwrd multipling the disjunctions nd deleting the products tht susume other products. Such trnsformtion is ver time- nd memor-consuming, ecuse ll the intermedite products should e kept in memor, nd their numer grows eponentill. Thelen s lgorithm trnsforms CNF into DNF in much more efficient w. It requires liner memor for trnsformtion nd dditionl memor for clculted prime implicnts. The susuming products re not kept in memor. A serch tree is uilt, such tht ever level of it corresponds to cluse of the CNF, nd the outgoing rcs of node correspond to the literls of the disjunction. Conjunction of ll the literls corresponding to the rcs t the pth from the root of the tree to node is ssocited with the node. Lef nodes of the tree re the elementr conjunctions eing the prime implicnts of the epression or the implicnts susuming the prime implicnts clculted efore. A smple tree is shown in Fig. 1. The tree is serched in DFS order, nd severl pruning rules re used to minimie it. The rules re listed elow. R 1 An rc is pruned, if its predecessor node-conjunction contins the complement of the rc-literl. An rc is pruned, if nother non-epnded rc on higher level still eists which hs the sme rc-literl. A disjunction is discrded, if it contins literl which ppers lso in the predecessor node-conjunction. The rules ove re sed on the following lws of Boolen lger: = = = 0 0 = 0 0 = = (1) ( ) = (2) = 1 (3) 1 = 1 (4) 1 = (5)

4 128 Rules R 1 nd follow immeditel from (2) nd (3). Rule provides tht the implicnts ssocited with the lef nodes, if the re not prime, susume the implicnts clculted efore. Tht mens tht the first clculted implicnt is lws simple. An rc t level k with rc-literl, such tht there is non-epnded rc with the sme rc-literl t level l higher thn k, is pruned it. An implicnt otined epnding the mentioned rc would e t lest one literl shorter thn the implicnt which would e otined without ppling rule. As fr s the pth two times comes through literl (t the levels k nd l), ccording to (1), (2) the longest of those two implicnts susumes the shortest one. Hence the first clculted implicnt cnnot susume the implicnts clculted lter, ut it cn e susumed them. So, ppling rule llows to check whether n implicnt is simple immeditel fter its clcultion. It is enough to compre it with ll the implicnts clculted efore. Due to this propert the lgorithm is less memor-consuming, ecuse onl prime implicnts re kept. --- c c R 1 c c R 1 c c c c c c d d d c c cd Fig. 1. An emple of the tree for Boolen formul: ( c)( )( c)( d) H.-J. Mthon [5] hs proposed the dditionl fourth reduction rule, which reduces the serch tree up to 25%.

5 129 R 4 An rc j is pruned, if nother lred epnded rc k with the sme rc-literl eists on higher level v nd if rule ws not pplied in the sutree of rc k with respect to rc p on level v which leds to rc j. But using this rule complictes the lgorithm remrkl, ecuse dditionl informtion on ppling rule hs to e kept. Additionl reduction reduces proilit of ppering the non-prime implicnts t the lef nodes. But there is no gurntee tht such implicnts will not pper, nd still it is necessr to perform checking, the sme s in the cse of tree uilt with using onl 3 pruning rules. The net epression is n emple for which non-prime implicnts still pper even if ll 4 rules re used: ( )( )( ) (Fig. 3). 3. Heuristics for Thelen s method One of the possiilities of reducing the serch tree is sorting the disjunctions their sie in scending order. Heuristic 1 (Sort Length [5]). Choose disjunction D j with the smllest numer of literls. Effect of this heuristics cn e illustrted with complete serch tree (without rc pruning). Its sie (numer of nodes) cn e clculted ccording to the formul: n i V = 1 + L j (6) i=1 j=1 where L j is the numer of literls in cluse numer j. Let formul consist of 5 cluses, ech hving different numer of literls, from 2 to 6. If the re sorted from miml to miniml length, the complete serch tree will contin 1237 nodes; if sorted from miniml to miml the tree will contin onl 873 nodes. In the second cse it is 30% smller. So sorting of cluses influences the tree sie remrkl. Of course for the reduced serch trees reltion m differ. Now let us turn to the pruning rules. Note tht ever rule cn e implemented onl if the disjunction under considertion contins the sme vriles s the disjunctions corresponding to the predecessor nodes. Tht mens tht if the net disjunction considers the vriles which pper in the previous disjunctions, there re possiilities of reduction t tht level; nd there is no possiilit of reduction for the new vriles. So we m suppose tht

6 130 sorting of the cluses ccording to the vriles lso m led to the tree reduction. Here the similr effect is used s in the cse of sorting length: disjunctions contining mn repeting vriles llow to reduce the tree remrkl, nd if such reduction cn e performed not fr from the root, the tree will e growing slower. So the following heuristics reorder the disjunctions in such w tht miniml numer of new vriles ppers t ever net level of the serch tree. Heuristic 2 (Sort Literls). Choose disjunction D j with the smllest numer of literls tht do not pper in the disjunctions chosen efore. Heuristic 2 (Sort Vriles). Choose disjunction D j with the smllest numer of vriles tht do not pper in the disjunctions chosen efore. The onl difference etween these two vrints is tht heuristic 2 compres cluses ccording to literls nd heuristic 2 ccording to vriles. This mens tht i nd i re two different items for heuristic 2 ut not for heuristic 2. Averge results of these heuristics re ver similr, ut there re emples where the tree reduction differs lot. So it is possile to otin etter results selecting the most effective heuristic for ever emple. It will e the suject of the forthcoming work. The effect of heuristics 2 nd 2 is comprle to the effect of heuristic 1, ut we m s, tht it is more inteligent, which is confirmed sttisticl nlsis. The results of computer eperiments re presented in the Tle 1, nd s fr s heuristics 2 nd 2 give similr verge results, onl one of them is presented. Reordering literls in cluses lso ffects the serch tree, ecuse it chnges the order of generted prime implicnts nd m mke rule pplicle or not t certin levels of the tree. Two following heuristics reorder literls in cluses. The first of them llows quick clcultion of the shortest prime implicnt, nd the net heuristic reduces the serch tree when it is necessr to clculte ll prime implicnts. Heuristic 3 (Sorting literls[5]). Choose literl v i with the mimum frequenc in the non-epnded prt of the epression. Sorting the literls ccording to heuristic 3 leds to the situtions such tht rule will e more often pplicle for the rcs t the left side thn t the right side. Hence prol the first clculted prime implicnts will e the shortest. Now using the rnch-nd-ound method most of other rcs will e cut in severl steps. If ll the prime implicnts hve to e generted, the ordering should e different: in such cse it is etter to generte shortest implicnts lter (reverse order of literls given heuristic 3). Tht reduces proilit of

7 131 ) --- ) --- R 4 c d c d c d c d c d c d Fig. 2. An emple of the tree, in which effects of heuristic 4 nd rule R 4 re the sme ppering non-prime implicnts t the lef nodes. As fr s due to rule n implicnt cn susume onl the implicnts clculted efore, if the implicnts clculted lter re in most cses shorter thn those clculted erlier, then chnce of susuming is smll. The net heuristic is reversion of heuristic 3. Heuristic 4 (Reordering Literls). Choose literl v i with the minimum frequenc in the non-epnded prt of the epression. In mn cses (ut not lws) effects of rule R 4 nd heuristic 4 re ver similr. Rule R 4 prunes n rc, if t higher level there is non-epnded rc with the sme rc-literl (let it e ). Tht mens tht t the level k literl is not the lst literl in the cluse. Let literl e fter in the cluse. From the rc corresponding to the literl there is pth to the node under considertion t level l. If literl would e the lst in the cluse, insted of R 4 the rule would e pplicle with the sme effect (Fig. 2). We m lso stte tht if literl ppers t level k nd lso t lower level l (tht mens in cluses D k or D l (k > l)), then if does not pper in the cluses with numers greter thn k, fter ppling heuristic 4 in the cluse D k literl will pper efore nd will e pplicle insted of R 4. But if ppers in the cluses with numers greter thn k, such n effect will not lws occur. Here is emple of heuristic 4: After ppling the heuristic: ( )( c d) ( )( c d)

8 132 Such ordering of literls cuses tht the rc leding to non-prime implicnt, which in the first cse could e pruned onl ppling rule R 4, now will e pruned rule. Another emple: ( c)( )( c d)( c) In this cse heuristic 4 does not chnge ordering of the literls. Literls nd, ppering in cluse 2, pper in the net cluses with the sme frequenc, nd without ppling rule R 4 the lgorithm will generte nonprime implicnt. T. 1. Results of computer eperiments Bool P STD H1 H2 H4 H2 + H4 R4 form. T N T N % T N % T N % T N % T N % Avg: On the other hnd, it m hppen tht reordering of literls heuristic 4 llows pruning the rcs which would not e pruned rule R 4. It is possile ecuse the rules nd R 4 re not completel smmetricl. Rule R 4 hs dditionl condition which is sent in rule. This condition m lock ppling rule R 4. But if the literls cn e reordered in such w tht rule will e pplicle, then such rc will e pruned. Fig. 3 illustrtes such sitution. In the tree for epression ( )( )( ) (Fig. 3) rule R 4 cnnot e pplied ecuse the condition is not stisfied (in the left sutree rule ws pplied). Tht is wh in the right su-tree non-prime implicnt ppers. But heuristic 4 chnges the epression into the form: ( )( )( ). Now the non-prime implicnt does not pper, ecuse the rc leding to it is pruned rule (Fig. 3). Eperiments demonstrte tht oth heuristic 4 nd rule R 4 efficientl nd lmost t the sme etent reduce the numer of generted non-prime

9 133 ) ) Fig. 3. An emple of the tree, in which there re differences etween heuristic 4 nd rule R 4 implicnts. But rule R 4 is more difficult for implementtion nd increses necessr memor mount. So it seems tht ppling heuristic 4 is more resonle ecuse llows otining similr effect with less effort. Results of computer eperiments re summried in T. 1. For the tests the rndoml generted Boolen epressions were used. In the first column numer of vriles nd the numer of cluses of n epression re given (e.g. 2018). T denotes the tree sie (numer of nodes); P denotes the numer of prime implicnts; N denotes the numer of non-prime implicnts, eing the leves of the serch tree. A column % shows for ever heuristic the percentge of the tree sie in respect of the sie in the cse when no heuristic is used. The eperiments show tht it is est to sort disjunctions ccording to heuristic 2, nd literls in the disjunctions ccording to heuristic 4.

10 Conclusion nd further work The presented heuristics, ccording to the eperimentl results, llow to generte ll the prime implicnts of logicl epression represented in the conjunctive norml form more quickl, thn it cn e done using Thelen s method with the heuristics known efore. Besides of tht, the presented heuristics reduce remrkl the numer of the lef nodes in the serch tree corresponding to non-prime implicnts. A prospective direction of future work is evlution of efficienc of the proposed heuristics for solving prolems mentioned in Introduction, for which Thelen s lgorithm cn e pplied. Tht m require tking into ccount dditionl optimition prmeters nd modifiction of heuristics. One more direction is comprison etween Thelen s pproch nd the BDD-sed pproch to solving prolems such s covering prolems. 5. References [1] Brton R.K. et l.; VIS: A Sstem for Verifiction nd Snthesis, in: The Proceedings of the Conf. on Computer-Aided Verifiction, August 1996, Springer Verlg, 1102, pp [2] Coudert O., Mdre J.K.; New Ides for Solving Covering Prolems, Design Automtion Conference, 1995, pp [3] Coudert O., Mdre J.K., Frisse H.; A New Viewpoint on Two-Level Logic Minimition, Design Automtion Conference, 1993, pp [4] Krtkevich A.; On Algorithms for Decclistion of Oriented Grphs, in: Proceedings of the Interntionl Workshop DESDes 01, Zielon Gór, Polnd, 2001, pp [5] Mthon H.J.; Universl logic design lgorithm nd its ppliction the snthesis of two-level switching circuits, IEE Proceedings, 136,3, 1989, pp [6] Mthon H.J.; Algorithmic Design of Two-Level nd Multi-Level Switching Circuits, (in Germn), PhD thesis, ITIV, Univ. of Krlsruhe, [7] McGeer P.C. et l.; Espresso-Signture: A New Ect Minimier for Logic Functions, Design Automtion Conference, 1993, pp [8] De Micheli D.; Snthesis nd Optimition of Digitl Circuits, Stnford Univ., McGrw-Hill, Inc., 1994.

11 135 [9] Nelson R.; Simplest Norml Truth Functions, Journl of Smolic Logic, 20,2, 1955, pp [10] Rudell R., Sngiovnni-Vincentelli A.; Multiple-vlued Minimition for PLA Optimition, IEEE Trnsctions on CAD/ICAS, Sept. 1987, CAD-6, 5, 1987, pp [11] Rtsr B., Miniuk V.; The Set-theoreticl Modifiction of Boolen Functions Minim Covering Method, in: Proceedings of the Interntionl Conference TCSET 2004, Lviv Slvsko, Ukrine, 2004, pp [12] Thelen B.; Investigtions of lgorithms for computer-ided logic design of digitl circuits, (in Germn), PhD thesis, ITIV, Univ. of Krlsruhe, [13] Wȩgrn A., Wȩgrn M.; Smolic Verifiction of Concurrent Logic Controllers Mens Petri Nets, in: Proceedings of the Third Interntionl Conference CAD DD 99, Minsk, Belrus, 1999, pp [14] Wȩgrn A., Krtkevich A., Biegnowski J.; Detection of dedlocks nd trps in Petri nets mens of Thelen s prime implicnt method, AMCS, 14,1, 2004, pp Received Mrch 8, 2004

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

EXPONENTIAL & POWER GRAPHS

EXPONENTIAL & POWER GRAPHS Eponentil & Power Grphs EXPONENTIAL & POWER GRAPHS www.mthletics.com.u Eponentil EXPONENTIAL & Power & Grphs POWER GRAPHS These re grphs which result from equtions tht re not liner or qudrtic. The eponentil

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997.

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997. Forced convex n-gons in the plne F. R. K. Chung y University ofpennsylvni Phildelphi, Pennsylvni 19104 R. L. Grhm AT&T Ls - Reserch Murry Hill, New Jersey 07974 Mrch 2,1997 Astrct In seminl pper from 1935,

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

8.2 Areas in the Plane

8.2 Areas in the Plane 39 Chpter 8 Applictions of Definite Integrls 8. Ares in the Plne Wht ou will lern out... Are Between Curves Are Enclosed Intersecting Curves Boundries with Chnging Functions Integrting with Respect to

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

OUTPUT DELIVERY SYSTEM

OUTPUT DELIVERY SYSTEM Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Lecture 7: Integration Techniques

Lecture 7: Integration Techniques Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

Loop Pipelining in Hardware-Software Partitioning

Loop Pipelining in Hardware-Software Partitioning Loop Pipelining in Hrdwre-Softwre Prtitioning Jinhwn Jeon nd Kioung Choi School of Electricl Engineering Seoul Ntionl Universit Seoul, Kore 151-742 Tel: +82-2-880-5457 F: +82-2-887-6575 e-mil: {jeonjinh,kchoi}@popp.snu.c.kr

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

Ranking of Hexagonal Fuzzy Numbers for Solving Multi Objective Fuzzy Linear Programming Problem

Ranking of Hexagonal Fuzzy Numbers for Solving Multi Objective Fuzzy Linear Programming Problem Interntionl Journl of Computer pplictions 097 8887 Volume 8 No 8 Decemer 0 nking of egonl Fuzzy Numers Solving ulti Ojective Fuzzy Liner Progrmming Prolem jrjeswri. P Deprtment of themtics Chikknn Government

More information

called the vertex. The line through the focus perpendicular to the directrix is called the axis of the parabola.

called the vertex. The line through the focus perpendicular to the directrix is called the axis of the parabola. Review of conic sections Conic sections re grphs of the form REVIEW OF CONIC SECTIONS prols ellipses hperols P(, ) F(, p) O p =_p REVIEW OF CONIC SECTIONS In this section we give geometric definitions

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

The notation y = f(x) gives a way to denote specific values of a function. The value of f at a can be written as f( a ), read f of a.

The notation y = f(x) gives a way to denote specific values of a function. The value of f at a can be written as f( a ), read f of a. Chpter Prerequisites for Clculus. Functions nd Grphs Wht ou will lern out... Functions Domins nd Rnges Viewing nd Interpreting Grphs Even Functions nd Odd Functions Smmetr Functions Defined in Pieces Asolute

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011 CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Video-rate Image Segmentation by means of Region Splitting and Merging

Video-rate Image Segmentation by means of Region Splitting and Merging Video-rte Imge Segmenttion y mens of Region Splitting nd Merging Knur Anej, Florence Lguzet, Lionel Lcssgne, Alin Merigot Institute for Fundmentl Electronics, University of Pris South Orsy, Frnce knur.nej@gmil.com,

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

6.3 Definite Integrals and Antiderivatives

6.3 Definite Integrals and Antiderivatives Section 6. Definite Integrls nd Antiderivtives 8 6. Definite Integrls nd Antiderivtives Wht ou will lern out... Properties of Definite Integrls Averge Vlue of Function Men Vlue Theorem for Definite Integrls

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

Digital Design. Chapter 6: Optimizations and Tradeoffs

Digital Design. Chapter 6: Optimizations and Tradeoffs Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Information Retrieval and Organisation

Information Retrieval and Organisation Informtion Retrievl nd Orgnistion Suffix Trees dpted from http://www.mth.tu.c.il/~himk/seminr02/suffixtrees.ppt Dell Zhng Birkeck, University of London Trie A tree representing set of strings { } eef d

More information

Meaningful Change Detection in Structured Data.

Meaningful Change Detection in Structured Data. Meningful Chnge Detection in Structured Dt Sudrshn S. Chwthe Hector Grci-Molin Computer Science Deprtment, Stnford University, Stnford, Cliforni 94305 fchw,hectorg@cs.stnford.edu Astrct Detecting chnges

More information

A TRIANGULAR FINITE ELEMENT FOR PLANE ELASTICITY WITH IN- PLANE ROTATION Dr. Attia Mousa 1 and Eng. Salah M. Tayeh 2

A TRIANGULAR FINITE ELEMENT FOR PLANE ELASTICITY WITH IN- PLANE ROTATION Dr. Attia Mousa 1 and Eng. Salah M. Tayeh 2 A TRIANGLAR FINITE ELEMENT FOR PLANE ELASTICITY WITH IN- PLANE ROTATION Dr. Atti Mous nd Eng. Slh M. Teh ABSTRACT In the present pper the strin-bsed pproch is pplied to develop new tringulr finite element

More information

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion

More information

An Algorithm for Enumerating All Maximal Tree Patterns Without Duplication Using Succinct Data Structure

An Algorithm for Enumerating All Maximal Tree Patterns Without Duplication Using Succinct Data Structure , Mrch 12-14, 2014, Hong Kong An Algorithm for Enumerting All Mximl Tree Ptterns Without Dupliction Using Succinct Dt Structure Yuko ITOKAWA, Tomoyuki UCHIDA nd Motoki SANO Astrct In order to extrct structured

More information

cisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example:

cisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example: cisc1110 fll 2010 lecture VI.2 cll y vlue function prmeters more on functions more on cll y vlue nd cll y reference pssing strings to functions returning strings from functions vrile scope glol vriles

More information

Suffix trees, suffix arrays, BWT

Suffix trees, suffix arrays, BWT ALGORITHMES POUR LA BIO-INFORMATIQUE ET LA VISUALISATION COURS 3 Rluc Uricru Suffix trees, suffix rrys, BWT Bsed on: Suffix trees nd suffix rrys presenttion y Him Kpln Suffix trees course y Pco Gomez Liner-Time

More information

documents 1. Introduction

documents 1. Introduction www.ijcsi.org 4 Efficient structurl similrity computtion etween XML documents Ali Aïtelhdj Computer Science Deprtment, Fculty of Electricl Engineering nd Computer Science Mouloud Mmmeri University of Tizi-Ouzou

More information

Introduction to Computer Engineering EECS 203 dickrp/eecs203/ CMOS transmission gate (TG) TG example

Introduction to Computer Engineering EECS 203  dickrp/eecs203/ CMOS transmission gate (TG) TG example Introduction to Computer Engineering EECS 23 http://ziyng.eecs.northwestern.edu/ dickrp/eecs23/ CMOS trnsmission gte TG Instructor: Robert Dick Office: L477 Tech Emil: dickrp@northwestern.edu Phone: 847

More information

Approximation of Two-Dimensional Rectangle Packing

Approximation of Two-Dimensional Rectangle Packing pproximtion of Two-imensionl Rectngle Pcking Pinhong hen, Yn hen, Mudit Goel, Freddy Mng S70 Project Report, Spring 1999. My 18, 1999 1 Introduction 1-d in pcking nd -d in pcking re clssic NP-complete

More information

Lexical Analysis. Amitabha Sanyal. (www.cse.iitb.ac.in/ as) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay

Lexical Analysis. Amitabha Sanyal. (www.cse.iitb.ac.in/ as) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay Lexicl Anlysis Amith Snyl (www.cse.iit.c.in/ s) Deprtment of Computer Science nd Engineering, Indin Institute of Technology, Bomy Septemer 27 College of Engineering, Pune Lexicl Anlysis: 2/6 Recp The input

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Performance enhancement of IEEE DCF using novel backoff algorithm

Performance enhancement of IEEE DCF using novel backoff algorithm Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 http://jis.eursipjournls.com/content/212/1/274 RESEARCH Open Access Performnce enhncement of IEEE 82.11 using novel ckoff lgorithm

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers? 1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection

More information

ZZ - Advanced Math Review 2017

ZZ - Advanced Math Review 2017 ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Approximation by NURBS with free knots

Approximation by NURBS with free knots pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde

More information

Agilent Mass Hunter Software

Agilent Mass Hunter Software Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss

More information

Intermediate Information Structures

Intermediate Information Structures CPSC 335 Intermedite Informtion Structures LECTURE 13 Suffix Trees Jon Rokne Computer Science University of Clgry Cnd Modified from CMSC 423 - Todd Trengen UMD upd Preprocessing Strings We will look t

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

arxiv: v1 [math.co] 18 Sep 2015

arxiv: v1 [math.co] 18 Sep 2015 Improvements on the density o miml -plnr grphs rxiv:509.05548v [mth.co] 8 Sep 05 János Brát MTA-ELTE Geometric nd Algeric Comintorics Reserch Group rt@cs.elte.hu nd Géz Tóth Alréd Rényi Institute o Mthemtics,

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

Section 9.2 Hyperbolas

Section 9.2 Hyperbolas Section 9. Hperols 597 Section 9. Hperols In the lst section, we lerned tht plnets hve pproimtel ellipticl orits round the sun. When n oject like comet is moving quickl, it is le to escpe the grvittionl

More information

Spectral Analysis of MCDF Operations in Image Processing

Spectral Analysis of MCDF Operations in Image Processing Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity

More information

ON THE DEHN COMPLEX OF VIRTUAL LINKS

ON THE DEHN COMPLEX OF VIRTUAL LINKS ON THE DEHN COMPLEX OF VIRTUAL LINKS RACHEL BYRD, JENS HARLANDER Astrct. A virtul link comes with vriety of link complements. This rticle is concerned with the Dehn spce, pseudo mnifold with oundry, nd

More information

Lily Yen and Mogens Hansen

Lily Yen and Mogens Hansen SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst

More information

An Efficient Algorithm for Discovering Frequent Subgraphs. Technical Report

An Efficient Algorithm for Discovering Frequent Subgraphs. Technical Report An Efficient Algorithm for Discovering Frequent Sugrphs Technicl Report Deprtment of Computer Science nd Engineering Universit of Minnesot 4-192 EECS Building 200 Union Street SE Minnepolis, MN 55455-0159

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

COMBINATORIAL PATTERN MATCHING

COMBINATORIAL PATTERN MATCHING COMBINATORIAL PATTERN MATCHING Genomic Repets Exmple of repets: ATGGTCTAGGTCCTAGTGGTC Motivtion to find them: Genomic rerrngements re often ssocited with repets Trce evolutionry secrets Mny tumors re chrcterized

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

I/O Efficient Dynamic Data Structures for Longest Prefix Queries

I/O Efficient Dynamic Data Structures for Longest Prefix Queries I/O Efficient Dynmic Dt Structures for Longest Prefix Queries Moshe Hershcovitch 1 nd Him Kpln 2 1 Fculty of Electricl Engineering, moshik1@gmil.com 2 School of Computer Science, himk@cs.tu.c.il, Tel Aviv

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

Introduction Transformation formulae Polar graphs Standard curves Polar equations Test GRAPHS INU0114/514 (MATHS 1)

Introduction Transformation formulae Polar graphs Standard curves Polar equations Test GRAPHS INU0114/514 (MATHS 1) POLAR EQUATIONS AND GRAPHS GEOMETRY INU4/54 (MATHS ) Dr Adrin Jnnett MIMA CMth FRAS Polr equtions nd grphs / 6 Adrin Jnnett Objectives The purpose of this presenttion is to cover the following topics:

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Philosophy Of Creating Macros In Accumark CAD System

Philosophy Of Creating Macros In Accumark CAD System Philosophy Of Creting Mcros In Accumrk CAD System Mrie Nejedl Astrct: - The rticle discusses promising method of creting documenttion in design preprtion of clothing production using the "Mcro" module.

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

The Reciprocal Function Family. Objectives To graph reciprocal functions To graph translations of reciprocal functions

The Reciprocal Function Family. Objectives To graph reciprocal functions To graph translations of reciprocal functions - The Reciprocl Function Fmil Objectives To grph reciprocl functions To grph trnsltions of reciprocl functions Content Stndrds F.BF.3 Identif the effect on the grph of replcing f () b f() k, kf(), f(k),

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST Suffi Trees Outline Introduction Suffi Trees (ST) Building STs in liner time: Ukkonen s lgorithm Applictions of ST 2 3 Introduction Sustrings String is ny sequence of chrcters. Sustring of string S is

More information

An Expressive Hybrid Model for the Composition of Cardinal Directions

An Expressive Hybrid Model for the Composition of Cardinal Directions An Expressive Hyrid Model for the Composition of Crdinl Directions Ah Lin Kor nd Brndon Bennett School of Computing, University of Leeds, Leeds LS2 9JT, UK e-mil:{lin,brndon}@comp.leeds.c.uk Astrct In

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism Efficient K-NN Serch in Polyphonic Music Dtses Using Lower Bounding Mechnism Ning-Hn Liu Deprtment of Computer Science Ntionl Tsing Hu University Hsinchu,Tiwn 300, R.O.C 886-3-575679 nhliou@yhoo.com.tw

More information

Solutions to Math 41 Final Exam December 12, 2011

Solutions to Math 41 Final Exam December 12, 2011 Solutions to Mth Finl Em December,. ( points) Find ech of the following its, with justifiction. If there is n infinite it, then eplin whether it is or. ( ) / ln() () (5 points) First we compute the it:

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

1.5 Extrema and the Mean Value Theorem

1.5 Extrema and the Mean Value Theorem .5 Extrem nd the Men Vlue Theorem.5. Mximum nd Minimum Vlues Definition.5. (Glol Mximum). Let f : D! R e function with domin D. Then f hs n glol mximum vlue t point c, iff(c) f(x) for ll x D. The vlue

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

The Fundamental Theorem of Calculus

The Fundamental Theorem of Calculus MATH 6 The Fundmentl Theorem of Clculus The Fundmentl Theorem of Clculus (FTC) gives method of finding the signed re etween the grph of f nd the x-xis on the intervl [, ]. The theorem is: FTC: If f is

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 80Q Multiply two frctions or frction nd whole numer. (QT N ) Excerpted from: The Mth Lerning Center PO Box 99, Slem, Oregon 9709 099 www.mthlerningcenter.org

More information

CS 241 Week 4 Tutorial Solutions

CS 241 Week 4 Tutorial Solutions CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it

More information

Introduction to Algebra

Introduction to Algebra INTRODUCTORY ALGEBRA Mini-Leture 1.1 Introdution to Alger Evlute lgeri expressions y sustitution. Trnslte phrses to lgeri expressions. 1. Evlute the expressions when =, =, nd = 6. ) d) 5 10. Trnslte eh

More information

Lesson 11 MA Nick Egbert

Lesson 11 MA Nick Egbert Lesson MA 62 Nick Eert Overview In this lesson we return to stndrd Clculus II mteril with res etween curves. Recll rom irst semester clculus tht the deinite interl hd eometric menin, nmel the re under

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information