An Efficient and Effective Case Classification Method Based On Slicing
|
|
- Luke Norris
- 5 years ago
- Views:
Transcription
1 An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing Omr A. A. Shib, Md. Nsir Sulimn, Ali Mmt nd Ftimh Ahmd Fculty of Computer Science nd Informtion Technology University Putr Mlysi, UPM Serdng, Selngor E-mil: Abstrct One of the most importnt tsks tht we hve to fce in rel world pplictions is the tsk of clssifying prticulr situtions nd /or events s belonging to certin clss. In order to solve the clssifiction problem, ccurte clssifier systems or models must be built. Severl computtionl intelligence methodologies hve been pplied to construct such clssifier from prticulr cses or dt. This pper introduces new clssifiction method bsed on slicing techniques tht ws proposed for procedurl progrmming lnguges. The pper lso discusses two of common clssifiction lgorithms tht re used either in dt mining or in generl AI. The lgorithms re: Induction of Decision Tree Algorithm (ID3) nd Bse Lerning Algorithm (C4.5). The pper lso studies the comprison between the proposed method nd the two selected clssifiction lgorithms using severl domins. Keywords: - dt mining, clssifiction problem, clssifiction lgorithms, slicing techniques, cse slicing, ID3, C Introduction Clssifiction is the most importnt tsk in mchine lerning. In clssifiction, clssifier is built from set of trining exmples with clss lbels. A key performnce mesure of the clssifier is its predictive ccurcy on the trining nd testing exmples [1]. The clssifiction problem hs been studied extensively by the dtbse nd Artificil Intelligence communities. The problem of clssifiction is defined s follows: The input dt re referred to s the trining set, which contins plurlity of records, ech of which contins multiple ttributes or fetures. Ech exmple in the trining set is tgged with clss lbel. The trining set is used in order to build model of the clssifiction ttribute bsed upon the other ttributes. This model is used in order to predict the vlue of the clss lbel for the test set. Some well-known techniques for clssifiction include the following: ID3 nd C4.5 Algorithm [2, 3]. This pper introduces new clssifiction method bsed on slicing technique. Slicing technique ws proposed for procedurl progrmming lnguges [4]. Slicing is method used by experienced computer progrmmers for restricting, the behviour of progrm to some specified subset of interest. The reminder of the pper is orgnized s follows: Section 2 presents brief description of some relted work; cse clssifiction bsed on slicing technique is described in section 3; the experimentl results nd the conclusion re presented in sections 4 nd 5 respectively. Interntionl Journl of The Computer, the Internet nd Mngement Vol. 14.No.2 (My - August, 2006) pp
2 Omr A. A. Shib, Md. Nsir Sulimn, Ali Mmt nd Ftimh Ahmd 2. Relted Work In this section brief description of two of the common clssifiction lgorithms tht re relted to our work will be presented. 2.1 C4.5 Algorithm C4.5 is n extension to the decision-tree lerning lgorithm ID3 [2, 3]. The lgorithm consists of the following steps: Build the decision tree form the trining set (conventionl ID3). Convert the resulting tree into n equivlent set of rules. The number of rules is equivlent to the number of possible pths from the root to lef node. Prune ech rule by removing ny preconditions tht result in improving its ccurcy, ccording to vlidtion set. Sort the pruned rules in descending order ccording to their ccurcy, nd consider them in this sequence when clssifying subsequent instnces. 2.2 Induction of Decision Tree Algorithm (ID3) ID3 is n lgorithm introduced by Quinln for inducing Clssifiction Model, lso clled Induction of Decision Tree, from dt. We re given set of records. Ech record hs the sme structure, consisting of number of ttribute / vlue pirs. One of these ttributes represents the ctegory of the record. The problem is to determine decision tree tht on the bsis of nswers to questions bout the non-ctegory ttributes predicts correctly the vlue of the ctegory ttribute. Usully the ctegory ttribute tkes only the vlues {true, flse}, or {success, filure}, or something equivlent. In ny cse, one of its vlues will men filure [2, 3]. The bsic ides behind ID3 re tht: In the decision tree ech node corresponds to non-ctegoricl ttribute nd ech rc to possible vlue of tht ttribute. A lef of the tree specifies the expected vlue of the ctegoricl ttribute for the records described by the pth from the root to tht lef. (This defines wht is Decision Tree.) In the decision tree t ech node should be ssocited the non-ctegoricl ttribute which is most informtive mong the ttributes not yet considered in the pth from the root. (This estblishes wht is Good decision tree.) Entropy is used to mesure how informtive is node. (This defines wht we men by Good. By the wy, this notion ws introduced by Clude Shnnon in Informtion Theory) [5]. 3. Cse Clssifiction Bsed On Slicing In this section the proposed clssifiction pproch nd some relted terms re discussed. 3.1 Progrm Slicing Technique Slicing is method used by experienced computer progrmmers for restricting, the behviour of progrm to some specified subset of interest [4, 6]. A slice is constructed by deleting those prts of the progrm tht re irrelevnt to the vlues stored in the chosen set of vribles t the chosen point. The point of interest is usully identified by nnotting the progrm with line numbers, which identify ech primitive sttement nd ech brnch node. Progrm slicing is useful for progrm understnding, mintennce, debugging, testing, differencing, speciliztion, reuse, optimiztion, prlleliztion, nd nomly detection [7]. Progrm slicing hs been widely studied in the context of impertive progrms. Severl slicing lgorithms for impertive lnguges hve been developed 16
3 An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing [8]. Slicing of progrms is performed with respect to some criterion. Weiser proposes s criterion the number i of commnd line nd subset V of progrm vribles [4]. According to this criterion, progrm is nlyzed nd its commnds re checked for their relevnce to commnd line i nd those vribles in V. However, other uthors hve defined different criterion [9]. Progrm slicing cn be summrized s following: Progrm Slice the sttements (nd predictes) tht might ffect the vlue of set of vribles t prticulr sttement. A slice is tken with respect to set of vribles t prticulr sttement, the slicing criterion. A slice nd the ctul progrm behvior re identicl. Not just the finl vlue, but ll intermedite steps Executble (Slice) slice tht cn be compiled nd executed. Closure (Slice) n informtionl presenttion of slice tht might lck semntics. Bsic Types: Sttic vs. Dynmic Type of feedbck: executble, closure Approch: grph rechbility, dtflow equtions using control flow. 3.2 Extending Progrm Slicing To Cse Slicing The cse slicing clssifier described in this pper ddress the problem of clssifiction. The cse slicing clssifier is extended of progrm slicing technique. When we slice cse we re interested in utomticlly obtining tht portion fetures of the cse responsible for specific prts of the solution of the cse t hnd. A cse slicing: is process for utomticlly obtining subprts (fetures) of cse with collective mening. A slicing criterion: denotes the conditions of the slice computtion, with respect to which nd for which cse slice is required. Sliced cse: contins ll fetures tht could hve direct reltions with the fetures of interest t new cse. 3.3 The Cse Slicing Technique Conceptully, the proposed method is vrition of the Nerest Neighbor Algorithms [10] nd is clled Cse Slicing Technique (CST). It compres new cses to the trining cses in the dt file. It computes the similrity between the new cses nd trining cses to clssify the new cses. The proposed method is clssifiction technique bsed on slicing. Slice cse mens we re interested in utomticlly obtining tht portion fetures of the cse responsible for specific prts of the solution of the cse t hnd. By slicing the cse with respect to importnt fetures we cn obtin new cse with smll number of fetures or with only importnt fetures. The proposed pproch consists of dtbse with three clcultion modules s follows: Fetures Weighting Module This module is used to mesure the importnce of ech ttribute in clssifiction. The weight of ech ttribute hs been clculted to clssify the new cse by using simple conditionl probbilities. High weight vlues were ssigning to fetures tht re highly correlted with the given clss using eqution (1). ( ) w(i ) = P C i = instnces instnces contining i contining clss = C (1) Where the weight for feture for clss c is the conditionl probbility tht cse is member of c given the vlue to. i Interntionl Journl of The Computer, the Internet nd Mngement Vol. 14.No.2 (My - August, 2006) pp
4 Omr A. A. Shib, Md. Nsir Sulimn, Ali Mmt nd Ftimh Ahmd Discretiztion Computing Module Discretiztion s used in this pper, nd in the mchine lerning literture in generl, is process of trnsforming continuous ttribute vlues into finite number of intervls nd ssociting with ech intervl discrete, numericl vlue. The usul pproch for lerning tsks tht use mixedmode (continuous nd discrete) dt is to perform discretiztion prior to the lerning process [11, 12, 13, 14]. The discretiztion process first finds the number of discrete intervls, nd then the width, or the boundries for the intervls, given the rnge of vlues of continuous ttribute. Most often the user must specify the number of intervls, or provide some heuristic rule to be used [15]. A vriety of discretiztion methods hve been developed in recent yers. Some models tht hve used the Vlue Difference Metrics (VDM) or vrints of it [16, 17, 18] hve discretized continuous ttributes into somewht rbitrry number of discrete rnges, nd then treted these vlues s nominl (discrete unordered) vlues. When using slicing pproch, continuous vlues re discretized into s equl-width intervls (though the continuous vlues re lso retined for lter use), where s is n integer supplied by the user. Unfortuntely, there is currently little guidnce on wht vlue of s to use. Current reserch is exmining more sophisticted techniques for determining good vlues of s, such s cross-vlidtion, or other sttisticl methods [19]. The width w of discretized intervl for ttribute is given by eqution (2). w mx min = s (2) where mx nd min re the mximum nd minimum vlue, respectively, occurring in the trining set for ttribute. The discretized vlue v of continuous vlue x for ttribute is n integer from 1 to s, nd is given by eqution (3). ( x min ) if ttribute v = disc( x) = w x if ttribute Distnce Computtion Module is is continuou discrete (3) There re mny lerning systems tht store some or ll vilble trining exmples during lerning. During generliztion, new input vector is presented to the system for clssifiction nd distnce function is used to determine how fr ech stored instnce is from the new input vector. The stored instnce or instnces which re closest to the new vector re used to clssify it. A vriety of distnce functions re vilble for such uses, including the Minkowsky [20], Mhlnobis [21], Cmberr, Chebychev, Qudrtic, Correltion, nd Chi-squre distnce metrics [22, 23], the Context- Similrity mesure [24], the Contrst Model [25], hyperrectngle distnce functions [26, 27] nd others. Although there hve been mny distnce functions proposed, by fr the most commonly used is the Eucliden distnce function, which is defined in eqution (4). E m ( x, y ) = ( x ) r, y = 1 (4) Where x nd y re two input vectors (one typiclly being from stored instnce, nd the other n input vector to be clssified) nd m is the number of input vribles 18
5 An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing (ttributes) in the ppliction. The squre root is often not computed in prctice, becuse the closest instnce(s) will still be the closest, regrdless of whether the squre root is tken. An lterntive function, the City-block or Mnhttn distnce function, requires less computtion nd is defined in eqution (5). M m ( x, y) = = 1 x y r (5) The Eucliden nd Mnhttn distnce functions re equivlent to the Minkowskin r-distnce function [20] with r = 2 nd 1, respectively Slicing Technique The objective of slicing technique is to optimize the similrity mtching to chieve best clssifiction results. The proposed pproch is dpting slicing techniques tht hve been used in progrmming lnguges, to slice the cses by removing subset of fetures which re irrelevnt to cse lbel with respect to the selected slicing criterion. Cse clssifiction lgorithm bsed slicing is shown in Figure A Forml Description Of Cse Slicing Technique In this section we will give forml description of Cse Slicing Techniques in bsic version llowing for detiled investigtion of the pproch. Let Ci = {f1, f2, f3 fn} where n is the number of fetures in Ci λ = [{Cs Cs is set of sliced cses}] OR λ = {ll cses tht contins one or more importnt feture(s)} I = {if1, if2,., ifn} where n is the number of importnt fetures in I I Ci S I Cs λ 4. Experimentl Results In this section the results of severl prcticl experiments re presented to exmine the performnce of the proposed pproch nd the performnce of the selected clssifiction lgorithms on rel world problems. 4.1 Selected Dtsets In this pper eight rel-world dtsets hve been used, which re widely used in the mchine-lerning field for evlution of cse slicing technique. The eight dtsets: Clevelnd Hert Disese (CLEV), Brest Cncer (BCO), Germn Credit Crd (GERM), Heptitis Domin (HEPA), Austrlin Credit Crd Approvl (AUS), Iris Plnts Dtbse (IRIS), United Sttes Congressionl Voting Records Dtbse (VOTING) nd Credit Crd Appliction (CRX) were chosen from the UCI: Mchine Lerning Repositories nd Domin Theories [28]. Tble 1 presents the min chrcteristics of these dtsets, where B, C nd D in the tble mens Boolen, continuous nd discrete ttributes respectively. S = {C1, C2, C3 Cn} set of cses in Cse Bse S Ci S φ Interntionl Journl of The Computer, the Internet nd Mngement Vol. 14.No.2 (My - August, 2006) pp
6 Omr A. A. Shib, Md. Nsir Sulimn, Ali Mmt nd Ftimh Ahmd Algorithm: Algorithm Figure for Cse Clssifiction 1. Cse Input: User s Input Problem Specifiction Output: Clssified Cse BEGIN clssifiction lgorithm bsed While True do Step 1 Discretize Continuous Vlues slicing Let x be the input vlue for ttribute of cse i v = disc ( x ) [Which is just x if is discrete] w = bs ( mx min )/ s {The width of discretized intervl for ttribute } {Where mx nd min re the mximum nd minimum vlue, respectively, which re occurring in the trining set for ttribute.}, {the discretized vlue v of continuous vlue x for ttribute is n integer from 1 to s nd s determine by the user.} If is continuous then v = disc ( x ) = Else v = disc ( x ) = x x min / w Endif Step 2 Assign Weights to fetures {using conditionl probbility} Let c be the output clss of cse i. N,v,c = N,v,c + 1 {# of vlue v of ttribute with output clss c} N,v = N,v + 1 {# of vlue v of ttribute } For ech vlue v (of ttribute ) For ech clss c If N,v = 0 P,v,c =0 Else p,v,c = N,v,c/ N,v ENDFOR ENDFOR Step 3 Cse Slicing For ech cse i in T {T- Trining set} Slice cse i w.r.t. selected criterion {removing irrelevnt ttributes depending on ttribute weights} Endfor Step 4 Distnce Clcultions For ech two cses x nd y {One typiclly being from stored cses, nd other the input cse to be clssified} Let m the number of ttributes in the cse For =1 to m do dis tn ce ( x, y) = bs( ) x y Distnce_ Summtion {the cumultive distnce of ll the m ttributes in the cse i} 0Endfor Step 5 Closer Cse Serching While.not. done do Find mtching between cses to get closer cse with less distnce Enddo Figure 1. Cse clssifiction lgorithm bsed slicing 20
7 Tble 1. Chrcteristics of the selected dtsets An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing Dtsets No. Of Type & No. Of No. Dt Attributes Clsses CLEV 303 6C, 9D (15) 2 BECO B, 6C (19) 2 GERM B (16) 2 HEPA B, 6C (19) 2 AUS 690 6C, 9D (15) 2 IRIS 150 4C (4) 3 VOTING B (16) 2 CRX 690 6C, 9D (15) 2 Of 4.2 Empiricl Results We evluted the performnce of the cse slicing technique by compring it ginst the ID3 nd C4.5 clssifiers on vriety of dtsets. The dtsets we hve selected re very good choice to test nd evlute the slicing technique becuse the dtsets re from different domins nd there is good mixture of continues, discrete nd Boolen fetures. In ll the experiments reported here we used the evlution technique 10-fold cross-vlidtion, which consists of rndomly dividing the dt into 10 eqully, sized subgroups nd performing ten different experiments. We seprted one group long with their originl lbels s the vlidtion set; nother group ws considered s the strting trining set; the reminder of the dt were considered the test set. Ech experiment consists of ten runs of the procedure described bove, nd the overll verge re the results reported here. The criterion of choosing the best clssifiction pproch is bsed on the highest percentge of clssifiction. The results, given in Tble 2, list the clssifiction ccurcies chieved by ech pproch for ech of the dtsets, nd Figure 2 shows the difference in clssifiction ccurcy. Tble 2. The clssifiction ccurcy chieved by the different clssifiction lgorithms. Methods C4.5 ID3 CST Dtsets CLEV BCO GERM HEPA AUS IRIS VOTING CRX Interntionl Journl of The Computer, the Internet nd Mngement Vol. 14.No.2 (My - August, 2006) pp
8 Omr A. A. Shib, Md. Nsir Sulimn, Ali Mmt nd Ftimh Ahmd Clssifiction Acurcy (%) CLEV GERMN AUS VOTING Dtsets C4.5 ID3 CST Figure 2. Difference in clssifiction ccurcy of the selected lgorithms 5. Conclusion This pper hs presented nd discussed the Cse Slicing Technique (CST) s new pproch bsed slicing to improve clssifiction tsk in dt mining. CST ws supported with experiments on eight dtsets. The experiments show tht using the CST indeed improves the ccurcy of clssifiction. The pper lso gve brief description of number of common clssifiction lgorithms tht re used either in dt mining or in generl AI. The pper hs presented comprison between proposed method nd other selected clssifiction lgorithms using severl domins. The proposed technique hs possessed competitive result. It gve very high percentge of clssifiction ccurcy. References Ling, C. X. nd Zhng, H. (2002) Towrd Byesin Clssifiers with Accurte Probbilities, Proceedings of the Sixth Pcific-Asi Conference on KDD, Springer. Quinln, J. R. (1986) Induction of Decision Tree, Mchine Lerning, Vol. 1, No. 1, pp Quinln, J. R. (1993) C4.5: Progrms for Mchine Lerning, CA: Morgn Kufmnn Publishers, Inc. Weiser, M. (1984) Progrm Slicing, IEEE Trnsction Softwre Engineering, Vol. 10, No. 4, pp Cover, T. M. nd Thoms, J. A. (1991) Elements of Informtion Theory, Wiley. Horwitz, S., Reps, T. nd Binkley, D.(1990) Interprocedurl Slicing Using Dependence Grphs, ACM Trnsctions on Progrmming Lnguges nd Systems, Vol.12, No.1, pp Gllgher, K. nd Lyle, J. (1991) Using Progrm Slicing in Softwre Mintennce, IEEE Trnsction on Softwre Engineering. Vol. 17, No.8, pp Tip, F. (1995) A Survey of Progrm Slicing Techniques, Journl of Progrmming Lnguges, 3, pp Vsconcelos, W. W. (2000) Slicing Knowledge- Bsed Systems Techniques nd Applictions, Knowledge bsed Systems Journl, Elsevier, Vol. 13, pp
9 An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing Wettschereck, D. nd Thoms, G. (1995) An Experimentl Comprison of Nerest Neighbor nd Nerest-Hyperrectngle Algorithms, Mchine Lerning, Vol. 19, No.1, pp Ctlett, J. (1991) On Chnging Continuous Attributes into ordered discrete Attributes, Proc. Europen Working Session on Lerning, pp Dougherty, J., Kohvi, R. nd Shmi, M. (1995) Supervised nd Unsupervised Discretiztion of Continuous Fetures, Proc. of the 12th Interntionl Conference on Mchine Lerning, pp Fyyd, U. nd Irni, K. (1992) On the Hndling of Continuous-Vlued Attributes in Decision Tree Genertion, Mchine Lerning, Vol. 8, pp Pfhringer, B. (1995) Compression-Bsed Discretiztion of Continuous Attributes, Proc. of the 12th Interntionl Conference on Mchine Lerning, pp Ching, J., Wong, A. nd Chn, K. (1995) Clss-Dependent Discretiztion for Inductive Lerning from Continuous nd Mixed Mode Dt, IEEE Trnsctions on Pttern Anlysis nd Mchine Intelligence, Vol.17, No.7, pp Cost, S. nd Slzberg, S. (1993) A Weighted Nerest Neighbor Algorithm for Lerning with Symbolic Fetures. Mchine Lerning, Vol. 10, pp Rchlin, J., Simon, K., Slzberg, S. nd Dvid, W. (1994) Towrds Better Understnding of Memory-Bsed nd Byesin Clssifiers, In Proceedings of the Eleventh Interntionl Mchine Lerning Conference. New Brunswick, NJ: Morgn Kufmnn, pp Mohri, T. nd Tnk, H. (1994) An Optiml- Weighting Criterion of Cse Indexing for both Numeric nd Symbolic Attributes, In W. Dvid (Ed.), Cse-Bsed Resoning: Ppers from the 1994 Workshop (Report No. WS-94-01). Menlo Prk, CA: AIII Press. pp Tpi, R. nd Thompson, J. (1978) Nonprmetric Probbility Density Estimtion, Bltimore, MD: The Johns Hopkins University Press. Btchelor, B. (199=78) Pttern Recognition: Ides in Prctice, New York: Plenum Press. pp Ndler, M. nd Eric, P. (1993) Pttern Recognition Engineering, New York: Wiley. pp Michlski, R. Robert, E. nd Edwin, D. (1981) A Recent Advnce in Dt Anlysis: Clustering Objects into Clsses Chrcterized by Conjunctive Concepts, Progress in Pttern Recognition, Vol. 1, Lveen N. Knl nd Azriel Rosenfeld (Eds.). (New York: North-Hollnd). pp Edwin, D. (1994) Recent Progress in Distnce nd Similrity Mesures in Pttern Recognition, Second Interntionl Joint Conference on Pttern Recognition. pp Bibermn, Y. (1994) A Context Similrity Mesure, In Proceedings of the Europen Conference on Mchine Lerning (ECML- 94). (Ctlin, Itly: Springer Verlg). pp Tversky, A. (1977) Fetures of Similrity, Psychologicl Review, Vol. 84, No. 4, pp Slzberg, S. (1991) A Nerest Hyperrectngle Lerning Method, Mchine Lerning, 6: pp Domingos, P. (1995) Rule Induction nd Instnce-Bsed Lerning A Unified Approch, To pper in The Interntionl Joint Conference on Artificil Intelligence (IJCAI-95). Murphy, P. (1996) UCI Repositories of Mchine Lerning nd Domin Theories, [online]. University of Cliforni, Irvine Avilble: tory.html, [2001, Nov Dte of brows]. Interntionl Journl of The Computer, the Internet nd Mngement Vol. 14.No.2 (My - August, 2006) pp
A Comparison of the Discretization Approach for CST and Discretization Approach for VDM
Interntionl Journl of Innovtive Reserch in Advnced Engineering (IJIRAE) Volume1 Issue1 (Mrch 2014) A Comprison of the Discretiztion Approch for CST nd Discretiztion Approch for VDM Omr A. A. Shib Fculty
More informationA New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method
A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,
More informationDYNAMIC DISCRETIZATION: A COMBINATION APPROACH
DYNAMIC DISCRETIZATION: A COMBINATION APPROACH FAN MIN, QIHE LIU, HONGBIN CAI, AND ZHONGJIAN BAI School of Computer Science nd Engineering, University of Electronic Science nd Technology of Chin, Chengdu
More informationComplete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li
2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min
More informationText mining: bag of words representation and beyond it
Text mining: bg of words representtion nd beyond it Jsmink Dobš Fculty of Orgniztion nd Informtics University of Zgreb 1 Outline Definition of text mining Vector spce model or Bg of words representtion
More informationOn the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis
On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationStatistical classification of spatial relationships among mathematical symbols
2009 10th Interntionl Conference on Document Anlysis nd Recognition Sttisticl clssifiction of sptil reltionships mong mthemticl symbols Wl Aly, Seiichi Uchid Deprtment of Intelligent Systems, Kyushu University
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More information1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)
Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric
More informationSlides for Data Mining by I. H. Witten and E. Frank
Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully
More informationElena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer.
DBMS Architecture SQL INSTRUCTION OPTIMIZER Dtbse Mngement Systems MANAGEMENT OF ACCESS METHODS BUFFER MANAGER CONCURRENCY CONTROL RELIABILITY MANAGEMENT Index Files Dt Files System Ctlog DATABASE 2 Query
More informationII. THE ALGORITHM. A. Depth Map Processing
Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A
More informationA Transportation Problem Analysed by a New Ranking Method
(IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr
More informationL. Yaroslavsky. Fundamentals of Digital Image Processing. Course
L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing
More informationDQL: A New Updating Strategy for Reinforcement Learning Based on Q-Learning
DQL: A New Updting Strtegy for Reinforcement Lerning Bsed on Q-Lerning Crlos E. Mrino 1 nd Edurdo F. Morles 2 1 Instituto Mexicno de Tecnologí del Agu, Pseo Cuhunáhuc 8532, Jiutepec, Morelos, 6255, MEXICO
More informationCPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls
Redings for Next Two Lectures Text CPSC 213 Switch Sttements, Understnding Pointers - 2nd ed: 3.6.7, 3.10-1st ed: 3.6.6, 3.11 Introduction to Computer Systems Unit 1f Dynmic Control Flow Polymorphism nd
More informationPreserving Constraints for Aggregation Relationship Type Update in XML Document
Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor
More informationCSEP 573 Artificial Intelligence Winter 2016
CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch
More informationA Scalable and Reliable Mobile Agent Computation Model
A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper
More informationMATH 25 CLASS 5 NOTES, SEP
MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid
More informationMidterm 2 Sample solution
Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the
More informationImproper Integrals. October 4, 2017
Improper Integrls October 4, 7 Introduction We hve seen how to clculte definite integrl when the it is rel number. However, there re times when we re interested to compute the integrl sy for emple 3. Here
More informationCone Cluster Labeling for Support Vector Clustering
Cone Cluster Lbeling for Support Vector Clustering Sei-Hyung Lee Deprtment of Computer Science University of Msschusetts Lowell MA 1854, U.S.A. slee@cs.uml.edu Kren M. Dniels Deprtment of Computer Science
More informationUNIT 11. Query Optimization
UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,
More informationSOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES
SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl
More informationLecture 10 Evolutionary Computation: Evolution strategies and genetic programming
Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting
More informationA Heuristic Approach for Discovering Reference Models by Mining Process Model Variants
A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl
More informationFig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.
Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution
More information2014 Haskell January Test Regular Expressions and Finite Automata
0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded
More informationSemistructured Data Management Part 2 - Graph Databases
Semistructured Dt Mngement Prt 2 - Grph Dtbses 2003/4, Krl Aberer, EPFL-SSC, Lbortoire de systèmes d'informtions réprtis Semi-structured Dt - 1 1 Tody's Questions 1. Schems for Semi-structured Dt 2. Grph
More informationApproximation by NURBS with free knots
pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde
More informationCOMMON HALF YEARLY EXAMINATION DECEMBER 2018
li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net.pds.pds COMMON HALF YEARLY EXAMINATION DECEMBER 2018 STD : XI SUBJECT: COMPUTER SCIENCE
More informationStep-Voltage Regulator Model Test System
IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node
More informationAn Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization
An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction
More informationIn the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More informationFig.25: the Role of LEX
The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing
More informationUSING HOUGH TRANSFORM IN LINE EXTRACTION
Stylinidis, Efstrtios USING HOUGH TRANSFORM IN LINE EXTRACTION Efstrtios STYLIANIDIS, Petros PATIAS The Aristotle University of Thessloniki, Deprtment of Cdstre Photogrmmetry nd Crtogrphy Univ. Box 473,
More informationDECISION LEVEL FUSION OF LIDAR DATA AND AERIAL COLOR IMAGERY BASED ON BAYESIAN THEORY FOR URBAN AREA CLASSIFICATION
DECISION LEVEL FUSION OF LIDAR DATA AND AERIAL COLOR IMAGERY BASED ON BAYESIAN THEORY FOR URBAN AREA CLASSIFICATION H. Rstiveis* School of Surveying nd Geosptil Engineering, Fculty of Engineering, University
More informationTree Structured Symmetrical Systems of Linear Equations and their Graphical Solution
Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime
More informationA Formalism for Functionality Preserving System Level Transformations
A Formlism for Functionlity Preserving System Level Trnsformtions Smr Abdi Dniel Gjski Center for Embedded Computer Systems UC Irvine Center for Embedded Computer Systems UC Irvine Irvine, CA 92697 Irvine,
More informationCOMP 423 lecture 11 Jan. 28, 2008
COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring
More informationNearest Keyword Set Search in Multi-dimensional Datasets
Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science
More informationTopic 2: Lexing and Flexing
Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of
More informationRevisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network
Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy
More informationECE 468/573 Midterm 1 September 28, 2012
ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other
More informationCS321 Languages and Compiler Design I. Winter 2012 Lecture 5
CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,
More informationComputing offsets of freeform curves using quadratic trigonometric splines
Computing offsets of freeform curves using qudrtic trigonometric splines JIULONG GU, JAE-DEUK YUN, YOONG-HO JUNG*, TAE-GYEONG KIM,JEONG-WOON LEE, BONG-JUN KIM School of Mechnicl Engineering Pusn Ntionl
More informationDynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012
Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.
More informationFunctor (1A) Young Won Lim 10/5/17
Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published
More informationParallel Square and Cube Computations
Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu
More informationSection 10.4 Hyperbolas
66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationCMSC 331 First Midterm Exam
0 00/ 1 20/ 2 05/ 3 15/ 4 15/ 5 15/ 6 20/ 7 30/ 8 30/ 150/ 331 First Midterm Exm 7 October 2003 CMC 331 First Midterm Exm Nme: mple Answers tudent ID#: You will hve seventy-five (75) minutes to complete
More informationa < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1
Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the
More informationMath 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012
Mth 464 Fll 2012 Notes on Mrginl nd Conditionl Densities klin@mth.rizon.edu October 18, 2012 Mrginl densities. Suppose you hve 3 continuous rndom vribles X, Y, nd Z, with joint density f(x,y,z. The mrginl
More informationStained Glass Design. Teaching Goals:
Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to
More informationx )Scales are the reciprocal of each other. e
9. Reciprocls A Complete Slide Rule Mnul - eville W Young Chpter 9 Further Applictions of the LL scles The LL (e x ) scles nd the corresponding LL 0 (e -x or Exmple : 0.244 4.. Set the hir line over 4.
More informationMisrepresentation of Preferences
Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from
More informationControl-Flow Analysis and Loop Detection
! Control-Flow Anlysis nd Loop Detection!Lst time! PRE!Tody! Control-flow nlysis! Loops! Identifying loops using domintors! Reducibility! Using loop identifiction to identify induction vribles CS553 Lecture
More informationOUTPUT DELIVERY SYSTEM
Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking
More informationFunctor (1A) Young Won Lim 8/2/17
Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published
More informationBefore We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):
Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters
More informationsuch that the S i cover S, or equivalently S
MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i
More information9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association
9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl
More informationMemory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples
EURSIP Journl on pplied Signl Processing 2003:6, 54 529 c 2003 Hindwi Publishing orportion Memory-Optimized Softwre Synthesis from tflow Progrm Grphs withlrgesizetsmples Hyunok Oh The School of Electricl
More informationComputer-Aided Multiscale Modelling for Chemical Process Engineering
17 th Europen Symposium on Computer Aided Process Engineesing ESCAPE17 V. Plesu nd P.S. Agchi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Computer-Aided Multiscle Modelling for Chemicl Process
More informationData sharing in OpenMP
Dt shring in OpenMP Polo Burgio polo.burgio@unimore.it Outline Expressing prllelism Understnding prllel threds Memory Dt mngement Dt cluses Synchroniztion Brriers, locks, criticl sections Work prtitioning
More informationA REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS
A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute
More information10/9/2012. Operator is an operation performed over data at runtime. Arithmetic, Logical, Comparison, Assignment, Etc. Operators have precedence
/9/22 P f Performing i Si Simple l Clcultions C l l ti with ith C#. Opertors in C# nd Opertor Precedence 2. Arithmetic Opertors 3. Logicl Opertors 4. Bitwise Opertors 5. Comprison Opertors 6. Assignment
More informationA Hybrid Wavelet Kernel Construction for Support Vector Machine Classification
A Hybrid Wvelet Kernel Construction for Support Vector Mchine Clssifiction Jose George nd Rjeev Kumrswmy Dept. of Electronics & Commn. Engg., College of Engg., Trivndrum University of Kerl, Thiruvnnthpurm,
More informationVulnerability Analysis of Electric Power Communication Network. Yucong Wu
2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,
More informationExplicit Decoupled Group Iterative Method for the Triangle Element Solution of 2D Helmholtz Equations
Interntionl Mthemticl Forum, Vol. 12, 2017, no. 16, 771-779 HIKARI Ltd, www.m-hikri.com https://doi.org/10.12988/imf.2017.7654 Explicit Decoupled Group Itertive Method for the Tringle Element Solution
More informationComparative Study of Universities Web Structure Mining
Comprtive Study of Universities Web Structure Mining Z. Abdullh, A. R. Hmdn Abstrct This pper is ment to nlyze the rnking of University of Mlysi Terenggnu, UMT s website in the World Wide Web. There re
More informationpdfapilot Server 2 Manual
pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:
More informationDr. D.M. Akbar Hussain
Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence
More informationCSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline
CSCI1950 Z Comput4onl Methods for Biology Lecture 2 Ben Rphel Jnury 26, 2009 hhp://cs.brown.edu/courses/csci1950 z/ Outline Review of trees. Coun4ng fetures. Chrcter bsed phylogeny Mximum prsimony Mximum
More informationThe Distributed Data Access Schemes in Lambda Grid Networks
The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn
More information4452 Mathematical Modeling Lecture 4: Lagrange Multipliers
Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl
More informationChapter 2 Sensitivity Analysis: Differential Calculus of Models
Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls
More informationAVolumePreservingMapfromCubetoOctahedron
Globl Journl of Science Frontier Reserch: F Mthemtics nd Decision Sciences Volume 18 Issue 1 Version 1.0 er 018 Type: Double Blind Peer Reviewed Interntionl Reserch Journl Publisher: Globl Journls Online
More informationCS 221: Artificial Intelligence Fall 2011
CS 221: Artificil Intelligence Fll 2011 Lecture 2: Serch (Slides from Dn Klein, with help from Sturt Russell, Andrew Moore, Teg Grenger, Peter Norvig) Problem types! Fully observble, deterministic! single-belief-stte
More informationTool Vendor Perspectives SysML Thus Far
Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com
More informationCS481: Bioinformatics Algorithms
CS481: Bioinformtics Algorithms Cn Alkn EA509 clkn@cs.ilkent.edu.tr http://www.cs.ilkent.edu.tr/~clkn/teching/cs481/ EXACT STRING MATCHING Fingerprint ide Assume: We cn compute fingerprint f(p) of P in
More informationSection 3.1: Sequences and Series
Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one
More informationToday. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search
Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods
More informationPresentation Martin Randers
Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes
More informationAI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley
AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility
More informationQubit allocation for quantum circuit compilers
Quit lloction for quntum circuit compilers Nov. 10, 2017 JIQ 2017 Mrcos Yukio Sirichi Sylvin Collnge Vinícius Fernndes dos Sntos Fernndo Mgno Quintão Pereir Compilers for quntum computing The first genertion
More informationOn Computation and Resource Management in Networked Embedded Systems
On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,
More informationIntegration. October 25, 2016
Integrtion October 5, 6 Introduction We hve lerned in previous chpter on how to do the differentition. It is conventionl in mthemtics tht we re supposed to lern bout the integrtion s well. As you my hve
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationParameterless Outlier Detection in Data Streams
Prmeterless Outlier Detection in Dt Strems Alice Mrscu nd Florent Mssegli INRIA AxIS Project-Tem 2004 route des lucioles - BP 93 {first.lst}@sophi.inri.fr ABSTRACT Outlyingness is subjective concept relying
More information12-B FRACTIONS AND DECIMALS
-B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn
More informationPointwise convergence need not behave well with respect to standard properties such as continuity.
Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples
More informationUnit 5 Vocabulary. A function is a special relationship where each input has a single output.
MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with
More informationMaking Tree Kernels practical for Natural Language Learning
Mking Tree Kernels prcticl for turl Lnguge Lerning Alessndro Moschitti eprtment of Computer Science University of Rome Tor ergt Rome, Itly moschitti@info.unirom2.it Abstrct In recent yers tree kernels
More informationMA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork
MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html
More informationFrom Dependencies to Evaluation Strategies
From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute
More informationIntroduction. Chapter 4: Complex Integration. Introduction (Cont d)
Introduction Chpter 4: Complex Integrtion Li, Yongzho Stte Key Lbortory of Integrted Services Networks, Xidin University October 10, 2010 The two-dimensionl nture of the complex plne required us to generlize
More information