Algorithms for Disk Covering Problems with the Most Points

Size: px
Start display at page:

Download "Algorithms for Disk Covering Problems with the Most Points"

Transcription

1 Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog Qigfeg Zhuge, Yi He, Zili Shao, Edwi H.-M. Sha Departmet of Computer Sciece Uiversity of Texas at Dallas Richardso, Texas 7, USA {qfzhuge, yxh, zxs, ABSTRACT Usually the coverig problem requires all elemets i a system to be covered. I some situatios, it is very difficult to figure out a solutio, or uable to cover all give elemets because of resource costraits. I this paper, we study the issue of the partial coverig problem. This problem is also referred to the robust k-ceter problem ad ca be applied to may fields. The partial coverig problem becomes eve more harder whe we eed to determie the subset of the group of all available elemets to share resources. Several approximatio algorithms are proposed to cover the most elemets i this paper. For some real time systems, such as the battlefield commuicatio system, the algorithm preseted with polyomial-time complexity ca be efficietly applied. The algorithm complexity aalysis illustrates the improvemet made by our algorithms, which are compared with other papers for the partial coverig problem i the literature. The experimetal results show that the performace of our algorithms is much better tha other existig -approximatio algorithm for the robust k-ceter problem. KEY WORDS Approximatio algorithms, partial coverig, k-ceter problem. Itroductio I the battlefield, there are a lot of commuicatio uits ad some commad ceters. The commad ceters are resposible for the successful iformatio exchage amog all mobile uits. Because of the mobility for both mobile uits ad ceters, we try to cover the most mobile uits by a limited umber of cotrol ceters with trasmissio rage costraits. This kid of problem is aalyzed as the clusterig problem, which is clusterig a set of poits ito a few groups. Clusterig algorithms have bee explored ad deployed i may fields [, ], such as data compressio, iformatio retrieval, databases applicatios, image processig, facility locatio, clusterig odes i ad hoc etworks etc. Give that the group umber is k, the clusterig problem is also referred to the k-ceter problem. We defie the k-ceter problem as follows: Let S be a set of objects, This work is partially supported by TI Uiversity Program, NSF EIA- 7 ad Texas ARP 7--, USA. geerally represeted as poits i a d-dimesioal metric space. Give a iteger k, compute a k-clusterig of S of the smallest possible size. I other words, the k- ceter problem is formulated by coverig S by k cogruet disks of the smallest possible size. We always assume that k disks have the same radius r. I this paper, we oly pay attetio to the metric space by a plae (d =. However, all algorithms ca be easily exteded to arbitrary metrics. May heuristic algorithms [,, ] have bee studied well for the k-ceter problem whe k. There are two major directios. Oe directio is for the umber of disks is fixed to k ad heuristic algorithms try to miimize the radius r of disks. The other focuses o the radius of each disk is fixed to r while heuristic algorithms explore miimum umber of disks to cover all poits. For the first approach, Gozalez [6] gave a -approximatio algorithm for the k- ceter problem i ay metric space with time complexity O(k ). I the same paper, Gozalez proved that there is o polyomial-time algorithm for a approximatio factor smaller tha uless P=NP. Feder ad Greee improved the -approximatio algorithm with complexity O( log k) [7]. Some (+ɛ) approximatio algorithms [7, ] are studied with o-polyomial ruig time. For the secod approach, a polyomial-time approximatio scheme ca be achieved withi approximatio factors arbitrarily close to [7]. Gozalez proposed a -approximatio algorithm for the fixed-size disks coverig problem i []. Huag devised a 7-approximatio algorithm for the -dimesio metric space, ad a -approximatio algorithm for the - dimesio metric space []. I [], Fraceschetti summarized the best kow results i a table. However, to achieve smaller approximatio factor (α < 7), the polyomial ruig time will be very huge. For example, the algorithm i [] for a approximatio factor α = 6 will require the ruig time to be O(k ) with k 6. A topic has bee studied durig these years for the k-ceter problem is to cover part poits [, ]. I some cases, there is o solutio for coverig poits i a plae by k disks with fixed radius. Examples are like buildig facilities to provide service withi a fixed radius to a certai fractio of populatio, or allocatig commad ceters i a battlefield to support commuicatios amog mobile uits. The problem defied i [] is called the robust k-ceter problem, which is to cover at least p poits (p ) by k disks with radius r. I this paper, we wat to cover the

2 most poits (at least p poits) for poits i a plae by k available disks. Those k disks are assumed with the same radius r. This kid of problem is NP-complete problem. The reasos is that to cover at least p poits, whe we set p =, it will be the same to the k-ceter problem. I order to cover as may poits as possible (at least p from ) with k disks, i this paper we have made the cotributios as follows: Come up with a ew -approximatio algorithm RKC to the robust k-ceter problem. I [], the authors oly preseted the best result with a - approximatio algorithm. Whe p is close to, this ew -approximatio algorithm becomes polyomialtime ruig. (Sectio Propose a greedy algorithm to cover part poits. (Sectio.) Modify the RKC algorithm to the RKCP algorithm for the purpose of coverig most poits. (Sectio. Trasfer the -approximatio algorithm for the robust k-ceter problem i [] to the RKCP algorithm, which is also applicable to the problem of coverig most poits. (Sectio.) The rest of this paper is orgaized as follows. I Sectio we itroduce the RKC algorithm for the robust k- ceter problem ad prove it to be -approximatio. Sectio shows differet heuristic algorithms to cover the most poits ad oe example is illustrated. Experimetal results are preseted i Sectio. Ad coclusios are draw i Sectio. New RKC Algorithm The robust k-ceter problem defied i this paper oly cosiders poits i a plae (the dimesio is. Let be the umber of all poits, p be a give positive iteger such that p. If we have k same disks with radius r, the robust k- ceter problem ca be defied as whether k disks ca cover at least p poits. This problem is a NP-complete problem. Suppose that poits i a plae area are the cliets we wat to serve, the ceter of k disks are the facility locatio to cover p poits amog poits, the the questio studied here is the same as the facility locatio problem with outlier defied i []. Figure illustrates how robust measures lead to better clusterig solutios. I the example, to cover all poits requires at least k = disks. However, if we eed to cover the most poits with oly disks, Figure (b) shows the result to cover p = poits. Followig the same defiitio of algorithm approximatio factor i [], we show our RKC algorithm below ad prove it to be -approximatio to the optimal cost. For some cases, we ca eve kow that it is impossible to cover p poits by k disks. Let V be the set of all poits i a plae (a) Figure. (a) To cover all poits with k=; (b) To cover p poits with k=, p=. ad V =. We suppose that the set of poits satisfies the triagular iequality. p is a give positive umber ad p. Let C be a set i our algorithm that icludes all poits to be the ceters of k disks. T i is a temporary poit set that icludes p poits from V. Each disk has the same radius r. We use Flag below to show whether there is a solutio for k disks to cover ay p poits withi the poit set V. The dist(a, b) is the Euclidea distace betwee the poit a ad b. The algorithm RKC is as follows: Flag = No For i =,..., (, do Select p differet poits from V, which geerates a ew poit set T i with T i T j (j =,..., i-) Arbitrarily select oe poit from T i, let this poit be c, C = {c } For j =,..., k, do For a poit t T i ad t / C, let d j (t) = mi[dist(t, c l ), for c l C] Let d j = max t Ti d j (t) Let c j be the poit t, which makes d j to have the maximum value C = C {c j } If d k r (b) If k disks with ceters i C by radius r ca cover at least p poits i V Retur Yes Else Flag = Yes If Flag = No It is impossible to cover p poits with k disks Retur No We explai how this algorithm works. First, Flag is reset to be No. Wheever it is possible to cover p poits with the give k disks for a particular T i by the above algorithm, Flag is set to Yes. I the outer loop, p differet poits from V are selected i every iteratio. Those p poits yield a ew poit set T i. Because there are ( ) p times of differet poit sets, this outer loop will ot ed util i = (, which meas we already check all possible

3 solutios. For every selected poit set T i, it oly icludes p poits. Subsequetly, oe ode is arbitrarily chose from T i ad this poit becomes the ceter of oe disk. We wat to fid the other k ceter positios for disks. Such k poits costruct the ceter set C. The ext ceter icluded to C is the poit i T i that has the maximum distace from all the poits already i C. Whe there are k poits i C, we already fid k ceters by the RKC algorithm for the p poits arbitrarily chose to T i. d k meas the maximum distace from c k (the kth ceter) to every other ceters (c,..., c k ). I other words, if k disks have the diameter by d k, it is eough for them to cover all poits i T i. If d > r, it is impossible for k disks with radius r to cover all poits i T i, which will be proved by Lemma.. Otherwise, Flag should be set to Yes to show the existece for all poits i T i covered oly by k disks. Furthermore, if k disks with ceters i C by radius r ca cover p poits i V, the RKC algorithm already reach a solutio to the robust k-ceter problem ad is eded by the retur of Yes. The Theorem. will prove it. After ( cases are tested ad Flag is still No, it guaratees that there is o way to cover p poits from V by k disks with radius r. Sice we still ca ot fid a method to cover p poits, the algorithm will retur No. I the RKC algorithm, the process to geerate a ceter set C with give p poits is similar to the greedy algorithm i [6], which has bee proved to be a - approximatio algorithm. The idea is to execute the mai loop aother iteratio, ad let d k+ be the resultig distace to the k + ceter to be added. Also the ew ceter poit set C becomes C {c k+ } that has k + poits i it. By the defiitio of d k+, we ca see that the distace betwee ay two poits i C is at least d k+. Furthermore, ay k-clusterig must have two poits of C i oe same cluster for C = k +. Thus, ay k-clusterig of T i must have radius o less tha d k+ /. However for the RKC algorithm, the radius of the k-clusterig with ceters at C is exactly d k+. The we have the lemma below: Lemma.. Give p poits i T i, the RKC algorithm provides a factor approximatio to the miimum k-clusterig of T i. I other words, the radius by disks with ceters at poits i C is o larger tha times the radius of ay k clusterig disks of T i. Theorem.. Give a set V of poits from a arbitrary metric, a iteger k, ad a iteger p, the RKC algorithm is a -approximatio algorithm for the robust k- ceter problem. Proof. From Lemma., it is obvious that the RKC algorithm geerates a -approximatio solutio whe d k r happeed durig the algorithm executio. This is because whe d k r, the k disks with radius r ca cover at least p poits. For the case that every time d k > r durig p poits selectio ( ( times) from V, it is impossible for k disks to cover the etire p poits with radius r. That meas o solutio exists. Thus the RKC algorithm ca ot fid a ceter set C with radius r to cover p poits. a O * O * *O b Figure. To cover poits with a disk by the greedy algorithm. Give p poits i T i, to geerate k ceters requires O(p k) time. A better way to reduce the time complexity to O(p log k) is show i [7]. Sice the RKC algorithm will execute ( times for the differet poit set Ti, the time complexity should be O( ( p log k). Whe we wat to cover the most poits, p should be the same as ad the time complexity for the robust k-ceter problem becomes O( log k). It is a polyomial-time algorithm. Furthermore, whe p is close to, the RKC algorithm ca still remai polyomial-time ruig. Differet Algorithms to Cover the Most Poits Give poits i a plae, sometimes it is impossible for all poits to be covered withi k disks by radius r. Eve if such cases exist, to fid a solutio util ow will require the computatio time to be expoetial, sice k-ceter problem is NP-complete. I the real-time system, such as coverig all commuicatio uites i a battlefield, this is too costly. To cover at least p poits withi k disks is also NPcomplete. The reaso is that whe we set p =, the robust k-ceter problem becomes the stadard k-ceter problem. I this sectio, we show some polyomial-time algorithms to cover poits as may as possible.. Greedy Algorithm For poits i a plae to be covered by disks with radius r, there are at most ( differet cases for disk coverig. This is because for ay two poit a, b, there are at most two ceter positios, from which the distace to both poits (a ad b) are exact r. I Figure, there are differet disk coverig for the poit a ad b, which ca be disk o ad o. Because disk o covers the same poits as o, it is ot ecessary for us to pay attetio to it ay more. I other words, we always ca move a disk to uiquely represet two poits with those poits o its circle edge. For the poit c ad d i Figure, there is oly oe case for disk coverig sice the distace betwee c ad d is r (the diameter). Oe disk coverig is said to be uique oly if there is at least oe poit differet from ay other disk coverig. Let D be the set with differet disks coverig ad G be the disk set retured by the greedy algorithm that oly has k uits. Below is the greedy algorithm to cover the most poits. O *

4 G = For ay two poits, we geerate two ew disk uits to cover them if possible. Suppose there are m such uique disk coverig with m (. These disks come up with a disk set D = {D, D,..., D m }. For i =,..., k, do Select the disk that covers the maximum umber of poits from D. Let this disk be D i, D = D {D i }, G = G {D i }. Remove the poits covered by D i from all disk i D. Retur G. There are at most ( differet disk coverig give ( poits. Costructig such disks will cosume time O( ) ). I oe iteratio, the time to select the disk that covers the maximum umber of poits eeds time O( ( ). After icludig D i to be i disk set G, the greedy algorithm will refresh the umber of poits covered by all other remaiig disks i D. Thus it requires a extra time O( ( ). I the greedy algorithm, we have k iteratios. The computatio complexity for the greedy algorithm should be O( ( )+ k O( ( + ( ) = O( ( ( )+O(k ) = O(k ).. RKCP Algorithm The algorithm for the robust k-ceter problem does t request to cover all poits with give k disks. With a little chage to the RKC algorithm to solve the robust k-ceter problem i Sectio, we ca apply it to the case of coverig the most poits. Here we assume p =, which meas the algorithm tries to cover all available poits. All poits are i the poit set V ad C is a poit set icludig k uits, which are the positios for the ceter of k disks. Below is the RKCP algorithm procedure to cover the most poits from the -approximatio algorithm RKC for the robust k-ceter problem. Arbitrarily select oe poit from V, let this poit be c, C = {c } For i =,..., k, do For a poit t V ad t / C, let d i (t) = mi[dist(t, c l ), for c l C] Let d i = max t V d i (t) Let c i be the poit t, which makes d i to have the maximum value C = C {c i } Retur C The time complexity for the above RKCP algorithm ca be O( log k) [7] (a) 6 (b) 7 6 Figure. (a) poits ca be covered by 6 disks with radius m; (b) The result by the greedy algorithm.. RKCP Algorithm I [], the authors illustrate a -approximatio algorithm for the robust k-ceter problem, which ca also be adopted to solve the problem of coverig the maximum umber of poits. That -approximatio algorithm has the iput with a radius r for k disks ad a set of poits V from a arbitrary metric space. It will figure out a solutio S such that cost(s) r. For the poits V, it assumes that there exists a optimal solutio O such that cost(o) = r. For each poit v i V, G i (E i, resp.) is deoted as the set of poits that are withi distace r (r, resp.) from v i. The set G i is referred as disks of radius r ad the set E i as the correspodig expaded disks of radius r. The RKCP algorithm procedure to cover the most poits ca be described as follows with a little modificatio to the origial -approximatio algorithm i []. Costruct all disks ad correspodig expaded disks. For i =,..., k, do Let G i be the heaviest disk, i.e. cotais the most ucovered poits. Mark as covered all poits i the correspodig expaded disk E i. Update all the disks ad expaded disks, i.e., remove from them all covered poits. Retur {G, G,..., G k }. The algorithm above has bee proved to be a - approximatio algorithm for the robust k-ceter problem 6

5 (a) 7 6 We evaluate the performace of differet algorithms through coverig differet umber of poits scattered i a area by disks. The performace of each algorithm is measured by the umber of poits covered by give disks ad how may disks are used for the system. I the simulatio, we compare the results for differet algorithms. The positio of all poits are radomly distributed i a area by, *, meters. The umber of poits is varied from to durig the simulatio. All disks have the same radius by meters. Durig the simulatio, the ceter positio of a disk ca be aywhere iside the square area. Differet umber of disks is assiged accordig to how may poits i all. The relatioship betwee the umber of poits ad disks follows the equatio below. D represets how may disks available i the system while P deotes the umber of poits iside the simulated square area. 6 6 (b) Figure. (a) The result by the RKCP -approximatio algorithm; (b) The result by the RKCP -approximatio algorithm. i []. The time complexity for the algorithm should be O(k ).. Example for the Above Algorithms To cover the most poits i a plae, we show a example here applied with differet algorithms metioed above. Give poits radomly scattered i a square by, meters *, meters, a optimal solutio for all poits covered by 6 disks is show i Figure (a). The results with the greedy algorithm are illustrated i Figure (b). With the RKCP ad RKCP algorithms to cover the most poits, we have the results show i Figure (a) ad Figure (b) respectively. I the greedy algorithms, the ceter positio of oe disk is determied by poits o its edge. For the RKCP algorithm to cover the most poits, we show a bigger circle with radius 7 meters for every coverig disk i Figure (b). The umber of poits covered is couted by those i the small disks (with radius meters). All poits that are betwee oe small disk ad its correspodig big circle are removed from the system by the -approximatio algorithm. Followig this property, poit 7 is ot covered by the algorithm because it is first removed from the system after the decisio made for the first disk. Simulatio Results 6 D = P + () I Table, the performace of the greedy, - approximatio (RKCP ad -approximatio (RKCP) algorithms are listed with the model defied above. Iside the square,,,, ad poits are radomly scattered for oe simulatio evet respectively. Uder Colum # p, the data shows the umber of poits covered by a special algorithm ad the followig Colum % represets the percetage of the coverig part based o all available poits. Durig the simulatio, the umber of available disks is chaged accordig to the umber of all poits i the system, which is defied i Equatio. To cover the poits as may as possible, differet algorithms will cosume differet umber of disks. The data i the Colum # d is the result of used disks by the executio of those three algorithms. For the system with poits, there are 6 disks available. However, the greedy algorithm ca cover all poits oly with disks for some cases. The RKCP algorithm from the -approximatio algorithm i [] is ot efficiet because it oly uses part of available disks. We ca see from Table that whe the system has poits, disks with radius 7 meters ( meters * ) is probably eough to cover them all. O the cotrary, the - approximatio algorithm always tries to cover poits by all disks. Uder a few circumstace, such as less umber of poits i the area ad fewer disks available, the RKCP algorithm yields a better performace tha the RKCP algorithm, which ca be see from Table for the system with poits. Most of the time, the greedy algorithm performs the best while the -approximatio algorithms geerate the worst results. We show the simulatio results for differet algorithms i Figure whe the umber of poits icreases from to. The curves i Figure represet the umber of covered poits by differet algorithms. That straight lie represets the total poits i the simulatio eviromet. Whe a algorithm has a better performace to cover more poits, the simulated curve will be closer to the straight lie. Thus, the greedy algorithm always yields a good performace, especially for a large umber

6 Algo. poits poits poits poits poits # p % # d # p % # d # p % # d # p % # d # p % # d Greedy Appr Appr Table. Covered poits ad used disks. Poits covered by differets algorithms All poits Greedy Appr Appr Number of poits Figure. The umber of covered poits. of poits scattered i the square area. The umber of covered poits goes up for all three algorithms whe there are more poits available. But the icreasig rate is slow for the -approximatio algorithm. Whe poits are scarcely scattered i the simulatio area, the -approximatio algorithm sometimes performs better tha the -approximatio algorithm. However i the log ru, the -approximatio algorithm geerates much better results. Coclusio I daily life or some special circumstaces (such as the battlefield), it is very hard or impossible to cover all users with limited servers. Thus to cover most users will be a satisfyig result. This problem belogs to the robust k-ceter problem. I this paper we preseted a ew - approximatio algorithm (RKC for the robust k-ceter problem, which is polyomial-time ruig whe p is close to. Based o it, a real polyomial-time algorithm (RKCP is proposed to cover the most poits. Amog those three proposed heuristic polyomial-time algorithms (greedy, RKCP, RKCP) for the robust k-ceter problem to cover the most poits, the greedy algorithm yields a good performace idicated by the simulatio. The outcome of the -approximatio (RKCP) algorithm origially from [] is poor because the covered poits is below % for most cases. Whe more disks are available, the polyomial -approximatio algorithm (RKCP yields close results as the greedy algorithm while the ruig time is O( log k). [] D. B. Shmoys, É. Tardos, ad K. Aardal, Approximatio algorithms for facility locatio problems (exteded abstract), i Proceedigs of the th Aual ACM Symposium o Theory of Computig, pp., 7. [] P. K. Agarwal ad C. M. Procopiuc, Approximatio algorithms for projective clusterig, i Proceedigs of th ACM-SIAM Sympos. Discrete Algorithms, pp. 7,. [] D. Johso, Approximatio algorithms for combiatorial problems, Joural of Computig ad Systems Scieces, vol., pp., 7. [] H. Broiamm ad M. Goodrich, Almost optimal set covers i fiite vcdimesio, Discrete Computatioal Geometry, vol., pp. 6 7,. [6] T. Gozalez., Clusterig to miimize the maximum itercluster distace, Theoretical Computer Sciece, vol., pp. 6,. [7] T. Feder ad D. Greee, Optimal algorithms for approximate clusterig, i Proceedigs of the th Aual ACM Symposium o the Theory of Computig (STOC), pp.,. [] P. K. Agarwal ad C. M. Procopiuc, Exact ad approximatio algorithms for clusterig (exteded abstract), i Proceedigs of th ACM-SIAM Sympos. Discrete Algorithms, pp ,. [] T. Gozalez., Coverig a set of poits i multidimesioal space, Iformatio Processig Letters, vol., pp.,. [] H. Huag, A. W. Richa, ad M. Segal, Approximatio algorithms for the mobile piercig set problem with applicatios to clusterig i ad-hoc etworks, ACM Joural o Mobile Networks (MONET), pp. 6,. [] M. Fraceschetti, M. Cook, ad J. Bruck, A geometric theorem for approximate disk coverig algorithms,. [] M. Charikar, S. Khuller, D. M. Mout, ad G. Narasimha, Algorithms for facility locatio problems with outliers, i Proceedigs of the Twelfth Aual ACM-SIAM Symposium o Discrete Algorithms, pp. 6 6,. [] R. Gadhi, S. Khuller, ad A. Sriivasa, Approximatio algorithms for partial coverig problems, i Proceedigs of the Twety-Eighth Iteratioal Colloquium o Automata, Laguages, ad Programmig (ICALP), LNCS 6, pp. 6, Jul.. Refereces [] D. Z. (Editor), Facility locatio: A survey of applicatios ad methods, Spriger Series i Operatios Research, Spriger Verlag, New York,.

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

The golden search method: Question 1

The golden search method: Question 1 1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Computational Geometry

Computational Geometry Computatioal Geometry Chapter 4 Liear programmig Duality Smallest eclosig disk O the Ageda Liear Programmig Slides courtesy of Craig Gotsma 4. 4. Liear Programmig - Example Defie: (amout amout cosumed

More information

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where ON MAXIMUM CHORDAL SUBGRAPH * Paul Erdos Mathematical Istitute of the Hugaria Academy of Scieces ad Reu Laskar Clemso Uiversity 1. Let G() deote a udirected graph, with vertices ad V(G) deote the vertex

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Improved Random Graph Isomorphism

Improved Random Graph Isomorphism Improved Radom Graph Isomorphism Tomek Czajka Gopal Paduraga Abstract Caoical labelig of a graph cosists of assigig a uique label to each vertex such that the labels are ivariat uder isomorphism. Such

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Ruig Time of a algorithm Ruig Time Upper Bouds Lower Bouds Examples Mathematical facts Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite

More information

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation Flexible Colorig Xiaozhou (Steve) Li, Atri Rudra, Ram Swamiatha HP Laboratories HPL-2010-177 Keyword(s): graph colorig; hardess of approximatio Abstract: Motivated b y reliability cosideratios i data deduplicatio

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Project 2.5 Improved Euler Implementation

Project 2.5 Improved Euler Implementation Project 2.5 Improved Euler Implemetatio Figure 2.5.10 i the text lists TI-85 ad BASIC programs implemetig the improved Euler method to approximate the solutio of the iitial value problem dy dx = x+ y,

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

New Results on Energy of Graphs of Small Order

New Results on Energy of Graphs of Small Order Global Joural of Pure ad Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2837-2848 Research Idia Publicatios http://www.ripublicatio.com New Results o Eergy of Graphs of Small Order

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

SECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME

SECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME SCURITY PROOF FOR SNGBAO WANG S IDNTITY-BASD NCRYPTION SCM Suder Lal ad Priyam Sharma Derpartmet of Mathematics, Dr. B.R.A.(Agra), Uiversity, Agra-800(UP), Idia. -mail- suder_lal@rediffmail.com, priyam_sharma.ibs@rediffmail.com

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Σ P(i) ( depth T (K i ) + 1),

Σ P(i) ( depth T (K i ) + 1), EECS 3101 York Uiversity Istructor: Ady Mirzaia DYNAMIC PROGRAMMING: OPIMAL SAIC BINARY SEARCH REES his lecture ote describes a applicatio of the dyamic programmig paradigm o computig the optimal static

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

Learning to Shoot a Goal Lecture 8: Learning Models and Skills

Learning to Shoot a Goal Lecture 8: Learning Models and Skills Learig to Shoot a Goal Lecture 8: Learig Models ad Skills How do we acquire skill at shootig goals? CS 344R/393R: Robotics Bejami Kuipers Learig to Shoot a Goal The robot eeds to shoot the ball i the goal.

More information

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU) Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

A Note on Chromatic Transversal Weak Domination in Graphs

A Note on Chromatic Transversal Weak Domination in Graphs Iteratioal Joural of Mathematics Treds ad Techology Volume 17 Number 2 Ja 2015 A Note o Chromatic Trasversal Weak Domiatio i Graphs S Balamuruga 1, P Selvalakshmi 2 ad A Arivalaga 1 Assistat Professor,

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Random Graphs and Complex Networks T

Random Graphs and Complex Networks T Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015 15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

EVALUATION OF TRIGONOMETRIC FUNCTIONS

EVALUATION OF TRIGONOMETRIC FUNCTIONS EVALUATION OF TRIGONOMETRIC FUNCTIONS Whe first exposed to trigoometric fuctios i high school studets are expected to memorize the values of the trigoometric fuctios of sie cosie taget for the special

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS) CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a

More information

Numerical Methods Lecture 6 - Curve Fitting Techniques

Numerical Methods Lecture 6 - Curve Fitting Techniques Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio

More information

Some non-existence results on Leech trees

Some non-existence results on Leech trees Some o-existece results o Leech trees László A.Székely Hua Wag Yog Zhag Uiversity of South Carolia This paper is dedicated to the memory of Domiique de Cae, who itroduced LAS to Leech trees.. Abstract

More information

Małgorzata Sterna. Mateusz Cicheński, Mateusz Jarus, Michał Miszkiewicz, Jarosław Szymczak

Małgorzata Sterna. Mateusz Cicheński, Mateusz Jarus, Michał Miszkiewicz, Jarosław Szymczak Małgorzata Stera Mateusz Cicheński, Mateusz Jarus, Michał Miszkiewicz, Jarosław Szymczak Istitute of Computig Sciece Pozań Uiversity of Techology Pozań - Polad Scope of the Talk Problem defiitio MP Formulatio

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Examples and Applications of Binary Search

Examples and Applications of Binary Search Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We

More information

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters. SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Visualization of Gauss-Bonnet Theorem

Visualization of Gauss-Bonnet Theorem Visualizatio of Gauss-Boet Theorem Yoichi Maeda maeda@keyaki.cc.u-tokai.ac.jp Departmet of Mathematics Tokai Uiversity Japa Abstract: The sum of exteral agles of a polygo is always costat, π. There are

More information

Parabolic Path to a Best Best-Fit Line:

Parabolic Path to a Best Best-Fit Line: Studet Activity : Fidig the Least Squares Regressio Lie By Explorig the Relatioship betwee Slope ad Residuals Objective: How does oe determie a best best-fit lie for a set of data? Eyeballig it may be

More information

INTERSECTION CORDIAL LABELING OF GRAPHS

INTERSECTION CORDIAL LABELING OF GRAPHS INTERSECTION CORDIAL LABELING OF GRAPHS G Meea, K Nagaraja Departmet of Mathematics, PSR Egieerig College, Sivakasi- 66 4, Virudhuagar(Dist) Tamil Nadu, INDIA meeag9@yahoocoi Departmet of Mathematics,

More information