An Efficient and Effective Case Classification Method Based On Slicing

Size: px
Start display at page:

Download "An Efficient and Effective Case Classification Method Based On Slicing"

Transcription

1 An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing Omr A. A. Shib, Md. Nsir Sulimn, Ali Mmt nd Ftimh Ahmd Fculty of Computer Science nd Informtion Technology University Putr Mlysi, UPM Serdng, Selngor E-mil: Abstrct One of the most importnt tsks tht we hve to fce in rel world pplictions is the tsk of clssifying prticulr situtions nd /or events s belonging to certin clss. In order to solve the clssifiction problem, ccurte clssifier systems or models must be built. Severl computtionl intelligence methodologies hve been pplied to construct such clssifier from prticulr cses or dt. This pper introduces new clssifiction method bsed on slicing techniques tht ws proposed for procedurl progrmming lnguges. The pper lso discusses two of common clssifiction lgorithms tht re used either in dt mining or in generl AI. The lgorithms re: Induction of Decision Tree Algorithm (ID3) nd Bse Lerning Algorithm (C4.5). The pper lso studies the comprison between the proposed method nd the two selected clssifiction lgorithms using severl domins. Keywords: - dt mining, clssifiction problem, clssifiction lgorithms, slicing techniques, cse slicing, ID3, C Introduction Clssifiction is the most importnt tsk in mchine lerning. In clssifiction, clssifier is built from set of trining exmples with clss lbels. A key performnce mesure of the clssifier is its predictive ccurcy on the trining nd testing exmples [1]. The clssifiction problem hs been studied extensively by the dtbse nd Artificil Intelligence communities. The problem of clssifiction is defined s follows: The input dt re referred to s the trining set, which contins plurlity of records, ech of which contins multiple ttributes or fetures. Ech exmple in the trining set is tgged with clss lbel. The trining set is used in order to build model of the clssifiction ttribute bsed upon the other ttributes. This model is used in order to predict the vlue of the clss lbel for the test set. Some well-known techniques for clssifiction include the following: ID3 nd C4.5 Algorithm [2, 3]. This pper introduces new clssifiction method bsed on slicing technique. Slicing technique ws proposed for procedurl progrmming lnguges [4]. Slicing is method used by experienced computer progrmmers for restricting, the behviour of progrm to some specified subset of interest. The reminder of the pper is orgnized s follows: Section 2 presents brief description of some relted work; cse clssifiction bsed on slicing technique is described in section 3; the experimentl results nd the conclusion re presented in sections 4 nd 5 respectively. Interntionl Journl of The Computer, the Internet nd Mngement Vol. 14.No.2 (My - August, 2006) pp

2 Omr A. A. Shib, Md. Nsir Sulimn, Ali Mmt nd Ftimh Ahmd 2. Relted Work In this section brief description of two of the common clssifiction lgorithms tht re relted to our work will be presented. 2.1 C4.5 Algorithm C4.5 is n extension to the decision-tree lerning lgorithm ID3 [2, 3]. The lgorithm consists of the following steps: Build the decision tree form the trining set (conventionl ID3). Convert the resulting tree into n equivlent set of rules. The number of rules is equivlent to the number of possible pths from the root to lef node. Prune ech rule by removing ny preconditions tht result in improving its ccurcy, ccording to vlidtion set. Sort the pruned rules in descending order ccording to their ccurcy, nd consider them in this sequence when clssifying subsequent instnces. 2.2 Induction of Decision Tree Algorithm (ID3) ID3 is n lgorithm introduced by Quinln for inducing Clssifiction Model, lso clled Induction of Decision Tree, from dt. We re given set of records. Ech record hs the sme structure, consisting of number of ttribute / vlue pirs. One of these ttributes represents the ctegory of the record. The problem is to determine decision tree tht on the bsis of nswers to questions bout the non-ctegory ttributes predicts correctly the vlue of the ctegory ttribute. Usully the ctegory ttribute tkes only the vlues {true, flse}, or {success, filure}, or something equivlent. In ny cse, one of its vlues will men filure [2, 3]. The bsic ides behind ID3 re tht: In the decision tree ech node corresponds to non-ctegoricl ttribute nd ech rc to possible vlue of tht ttribute. A lef of the tree specifies the expected vlue of the ctegoricl ttribute for the records described by the pth from the root to tht lef. (This defines wht is Decision Tree.) In the decision tree t ech node should be ssocited the non-ctegoricl ttribute which is most informtive mong the ttributes not yet considered in the pth from the root. (This estblishes wht is Good decision tree.) Entropy is used to mesure how informtive is node. (This defines wht we men by Good. By the wy, this notion ws introduced by Clude Shnnon in Informtion Theory) [5]. 3. Cse Clssifiction Bsed On Slicing In this section the proposed clssifiction pproch nd some relted terms re discussed. 3.1 Progrm Slicing Technique Slicing is method used by experienced computer progrmmers for restricting, the behviour of progrm to some specified subset of interest [4, 6]. A slice is constructed by deleting those prts of the progrm tht re irrelevnt to the vlues stored in the chosen set of vribles t the chosen point. The point of interest is usully identified by nnotting the progrm with line numbers, which identify ech primitive sttement nd ech brnch node. Progrm slicing is useful for progrm understnding, mintennce, debugging, testing, differencing, speciliztion, reuse, optimiztion, prlleliztion, nd nomly detection [7]. Progrm slicing hs been widely studied in the context of impertive progrms. Severl slicing lgorithms for impertive lnguges hve been developed 16

3 An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing [8]. Slicing of progrms is performed with respect to some criterion. Weiser proposes s criterion the number i of commnd line nd subset V of progrm vribles [4]. According to this criterion, progrm is nlyzed nd its commnds re checked for their relevnce to commnd line i nd those vribles in V. However, other uthors hve defined different criterion [9]. Progrm slicing cn be summrized s following: Progrm Slice the sttements (nd predictes) tht might ffect the vlue of set of vribles t prticulr sttement. A slice is tken with respect to set of vribles t prticulr sttement, the slicing criterion. A slice nd the ctul progrm behvior re identicl. Not just the finl vlue, but ll intermedite steps Executble (Slice) slice tht cn be compiled nd executed. Closure (Slice) n informtionl presenttion of slice tht might lck semntics. Bsic Types: Sttic vs. Dynmic Type of feedbck: executble, closure Approch: grph rechbility, dtflow equtions using control flow. 3.2 Extending Progrm Slicing To Cse Slicing The cse slicing clssifier described in this pper ddress the problem of clssifiction. The cse slicing clssifier is extended of progrm slicing technique. When we slice cse we re interested in utomticlly obtining tht portion fetures of the cse responsible for specific prts of the solution of the cse t hnd. A cse slicing: is process for utomticlly obtining subprts (fetures) of cse with collective mening. A slicing criterion: denotes the conditions of the slice computtion, with respect to which nd for which cse slice is required. Sliced cse: contins ll fetures tht could hve direct reltions with the fetures of interest t new cse. 3.3 The Cse Slicing Technique Conceptully, the proposed method is vrition of the Nerest Neighbor Algorithms [10] nd is clled Cse Slicing Technique (CST). It compres new cses to the trining cses in the dt file. It computes the similrity between the new cses nd trining cses to clssify the new cses. The proposed method is clssifiction technique bsed on slicing. Slice cse mens we re interested in utomticlly obtining tht portion fetures of the cse responsible for specific prts of the solution of the cse t hnd. By slicing the cse with respect to importnt fetures we cn obtin new cse with smll number of fetures or with only importnt fetures. The proposed pproch consists of dtbse with three clcultion modules s follows: Fetures Weighting Module This module is used to mesure the importnce of ech ttribute in clssifiction. The weight of ech ttribute hs been clculted to clssify the new cse by using simple conditionl probbilities. High weight vlues were ssigning to fetures tht re highly correlted with the given clss using eqution (1). ( ) w(i ) = P C i = instnces instnces contining i contining clss = C (1) Where the weight for feture for clss c is the conditionl probbility tht cse is member of c given the vlue to. i Interntionl Journl of The Computer, the Internet nd Mngement Vol. 14.No.2 (My - August, 2006) pp

4 Omr A. A. Shib, Md. Nsir Sulimn, Ali Mmt nd Ftimh Ahmd Discretiztion Computing Module Discretiztion s used in this pper, nd in the mchine lerning literture in generl, is process of trnsforming continuous ttribute vlues into finite number of intervls nd ssociting with ech intervl discrete, numericl vlue. The usul pproch for lerning tsks tht use mixedmode (continuous nd discrete) dt is to perform discretiztion prior to the lerning process [11, 12, 13, 14]. The discretiztion process first finds the number of discrete intervls, nd then the width, or the boundries for the intervls, given the rnge of vlues of continuous ttribute. Most often the user must specify the number of intervls, or provide some heuristic rule to be used [15]. A vriety of discretiztion methods hve been developed in recent yers. Some models tht hve used the Vlue Difference Metrics (VDM) or vrints of it [16, 17, 18] hve discretized continuous ttributes into somewht rbitrry number of discrete rnges, nd then treted these vlues s nominl (discrete unordered) vlues. When using slicing pproch, continuous vlues re discretized into s equl-width intervls (though the continuous vlues re lso retined for lter use), where s is n integer supplied by the user. Unfortuntely, there is currently little guidnce on wht vlue of s to use. Current reserch is exmining more sophisticted techniques for determining good vlues of s, such s cross-vlidtion, or other sttisticl methods [19]. The width w of discretized intervl for ttribute is given by eqution (2). w mx min = s (2) where mx nd min re the mximum nd minimum vlue, respectively, occurring in the trining set for ttribute. The discretized vlue v of continuous vlue x for ttribute is n integer from 1 to s, nd is given by eqution (3). ( x min ) if ttribute v = disc( x) = w x if ttribute Distnce Computtion Module is is continuou discrete (3) There re mny lerning systems tht store some or ll vilble trining exmples during lerning. During generliztion, new input vector is presented to the system for clssifiction nd distnce function is used to determine how fr ech stored instnce is from the new input vector. The stored instnce or instnces which re closest to the new vector re used to clssify it. A vriety of distnce functions re vilble for such uses, including the Minkowsky [20], Mhlnobis [21], Cmberr, Chebychev, Qudrtic, Correltion, nd Chi-squre distnce metrics [22, 23], the Context- Similrity mesure [24], the Contrst Model [25], hyperrectngle distnce functions [26, 27] nd others. Although there hve been mny distnce functions proposed, by fr the most commonly used is the Eucliden distnce function, which is defined in eqution (4). E m ( x, y ) = ( x ) r, y = 1 (4) Where x nd y re two input vectors (one typiclly being from stored instnce, nd the other n input vector to be clssified) nd m is the number of input vribles 18

5 An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing (ttributes) in the ppliction. The squre root is often not computed in prctice, becuse the closest instnce(s) will still be the closest, regrdless of whether the squre root is tken. An lterntive function, the City-block or Mnhttn distnce function, requires less computtion nd is defined in eqution (5). M m ( x, y) = = 1 x y r (5) The Eucliden nd Mnhttn distnce functions re equivlent to the Minkowskin r-distnce function [20] with r = 2 nd 1, respectively Slicing Technique The objective of slicing technique is to optimize the similrity mtching to chieve best clssifiction results. The proposed pproch is dpting slicing techniques tht hve been used in progrmming lnguges, to slice the cses by removing subset of fetures which re irrelevnt to cse lbel with respect to the selected slicing criterion. Cse clssifiction lgorithm bsed slicing is shown in Figure A Forml Description Of Cse Slicing Technique In this section we will give forml description of Cse Slicing Techniques in bsic version llowing for detiled investigtion of the pproch. Let Ci = {f1, f2, f3 fn} where n is the number of fetures in Ci λ = [{Cs Cs is set of sliced cses}] OR λ = {ll cses tht contins one or more importnt feture(s)} I = {if1, if2,., ifn} where n is the number of importnt fetures in I I Ci S I Cs λ 4. Experimentl Results In this section the results of severl prcticl experiments re presented to exmine the performnce of the proposed pproch nd the performnce of the selected clssifiction lgorithms on rel world problems. 4.1 Selected Dtsets In this pper eight rel-world dtsets hve been used, which re widely used in the mchine-lerning field for evlution of cse slicing technique. The eight dtsets: Clevelnd Hert Disese (CLEV), Brest Cncer (BCO), Germn Credit Crd (GERM), Heptitis Domin (HEPA), Austrlin Credit Crd Approvl (AUS), Iris Plnts Dtbse (IRIS), United Sttes Congressionl Voting Records Dtbse (VOTING) nd Credit Crd Appliction (CRX) were chosen from the UCI: Mchine Lerning Repositories nd Domin Theories [28]. Tble 1 presents the min chrcteristics of these dtsets, where B, C nd D in the tble mens Boolen, continuous nd discrete ttributes respectively. S = {C1, C2, C3 Cn} set of cses in Cse Bse S Ci S φ Interntionl Journl of The Computer, the Internet nd Mngement Vol. 14.No.2 (My - August, 2006) pp

6 Omr A. A. Shib, Md. Nsir Sulimn, Ali Mmt nd Ftimh Ahmd Algorithm: Algorithm Figure for Cse Clssifiction 1. Cse Input: User s Input Problem Specifiction Output: Clssified Cse BEGIN clssifiction lgorithm bsed While True do Step 1 Discretize Continuous Vlues slicing Let x be the input vlue for ttribute of cse i v = disc ( x ) [Which is just x if is discrete] w = bs ( mx min )/ s {The width of discretized intervl for ttribute } {Where mx nd min re the mximum nd minimum vlue, respectively, which re occurring in the trining set for ttribute.}, {the discretized vlue v of continuous vlue x for ttribute is n integer from 1 to s nd s determine by the user.} If is continuous then v = disc ( x ) = Else v = disc ( x ) = x x min / w Endif Step 2 Assign Weights to fetures {using conditionl probbility} Let c be the output clss of cse i. N,v,c = N,v,c + 1 {# of vlue v of ttribute with output clss c} N,v = N,v + 1 {# of vlue v of ttribute } For ech vlue v (of ttribute ) For ech clss c If N,v = 0 P,v,c =0 Else p,v,c = N,v,c/ N,v ENDFOR ENDFOR Step 3 Cse Slicing For ech cse i in T {T- Trining set} Slice cse i w.r.t. selected criterion {removing irrelevnt ttributes depending on ttribute weights} Endfor Step 4 Distnce Clcultions For ech two cses x nd y {One typiclly being from stored cses, nd other the input cse to be clssified} Let m the number of ttributes in the cse For =1 to m do dis tn ce ( x, y) = bs( ) x y Distnce_ Summtion {the cumultive distnce of ll the m ttributes in the cse i} 0Endfor Step 5 Closer Cse Serching While.not. done do Find mtching between cses to get closer cse with less distnce Enddo Figure 1. Cse clssifiction lgorithm bsed slicing 20

7 Tble 1. Chrcteristics of the selected dtsets An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing Dtsets No. Of Type & No. Of No. Dt Attributes Clsses CLEV 303 6C, 9D (15) 2 BECO B, 6C (19) 2 GERM B (16) 2 HEPA B, 6C (19) 2 AUS 690 6C, 9D (15) 2 IRIS 150 4C (4) 3 VOTING B (16) 2 CRX 690 6C, 9D (15) 2 Of 4.2 Empiricl Results We evluted the performnce of the cse slicing technique by compring it ginst the ID3 nd C4.5 clssifiers on vriety of dtsets. The dtsets we hve selected re very good choice to test nd evlute the slicing technique becuse the dtsets re from different domins nd there is good mixture of continues, discrete nd Boolen fetures. In ll the experiments reported here we used the evlution technique 10-fold cross-vlidtion, which consists of rndomly dividing the dt into 10 eqully, sized subgroups nd performing ten different experiments. We seprted one group long with their originl lbels s the vlidtion set; nother group ws considered s the strting trining set; the reminder of the dt were considered the test set. Ech experiment consists of ten runs of the procedure described bove, nd the overll verge re the results reported here. The criterion of choosing the best clssifiction pproch is bsed on the highest percentge of clssifiction. The results, given in Tble 2, list the clssifiction ccurcies chieved by ech pproch for ech of the dtsets, nd Figure 2 shows the difference in clssifiction ccurcy. Tble 2. The clssifiction ccurcy chieved by the different clssifiction lgorithms. Methods C4.5 ID3 CST Dtsets CLEV BCO GERM HEPA AUS IRIS VOTING CRX Interntionl Journl of The Computer, the Internet nd Mngement Vol. 14.No.2 (My - August, 2006) pp

8 Omr A. A. Shib, Md. Nsir Sulimn, Ali Mmt nd Ftimh Ahmd Clssifiction Acurcy (%) CLEV GERMN AUS VOTING Dtsets C4.5 ID3 CST Figure 2. Difference in clssifiction ccurcy of the selected lgorithms 5. Conclusion This pper hs presented nd discussed the Cse Slicing Technique (CST) s new pproch bsed slicing to improve clssifiction tsk in dt mining. CST ws supported with experiments on eight dtsets. The experiments show tht using the CST indeed improves the ccurcy of clssifiction. The pper lso gve brief description of number of common clssifiction lgorithms tht re used either in dt mining or in generl AI. The pper hs presented comprison between proposed method nd other selected clssifiction lgorithms using severl domins. The proposed technique hs possessed competitive result. It gve very high percentge of clssifiction ccurcy. References Ling, C. X. nd Zhng, H. (2002) Towrd Byesin Clssifiers with Accurte Probbilities, Proceedings of the Sixth Pcific-Asi Conference on KDD, Springer. Quinln, J. R. (1986) Induction of Decision Tree, Mchine Lerning, Vol. 1, No. 1, pp Quinln, J. R. (1993) C4.5: Progrms for Mchine Lerning, CA: Morgn Kufmnn Publishers, Inc. Weiser, M. (1984) Progrm Slicing, IEEE Trnsction Softwre Engineering, Vol. 10, No. 4, pp Cover, T. M. nd Thoms, J. A. (1991) Elements of Informtion Theory, Wiley. Horwitz, S., Reps, T. nd Binkley, D.(1990) Interprocedurl Slicing Using Dependence Grphs, ACM Trnsctions on Progrmming Lnguges nd Systems, Vol.12, No.1, pp Gllgher, K. nd Lyle, J. (1991) Using Progrm Slicing in Softwre Mintennce, IEEE Trnsction on Softwre Engineering. Vol. 17, No.8, pp Tip, F. (1995) A Survey of Progrm Slicing Techniques, Journl of Progrmming Lnguges, 3, pp Vsconcelos, W. W. (2000) Slicing Knowledge- Bsed Systems Techniques nd Applictions, Knowledge bsed Systems Journl, Elsevier, Vol. 13, pp

9 An Efficient nd Effective Cse Clssifiction Method Bsed On Slicing Wettschereck, D. nd Thoms, G. (1995) An Experimentl Comprison of Nerest Neighbor nd Nerest-Hyperrectngle Algorithms, Mchine Lerning, Vol. 19, No.1, pp Ctlett, J. (1991) On Chnging Continuous Attributes into ordered discrete Attributes, Proc. Europen Working Session on Lerning, pp Dougherty, J., Kohvi, R. nd Shmi, M. (1995) Supervised nd Unsupervised Discretiztion of Continuous Fetures, Proc. of the 12th Interntionl Conference on Mchine Lerning, pp Fyyd, U. nd Irni, K. (1992) On the Hndling of Continuous-Vlued Attributes in Decision Tree Genertion, Mchine Lerning, Vol. 8, pp Pfhringer, B. (1995) Compression-Bsed Discretiztion of Continuous Attributes, Proc. of the 12th Interntionl Conference on Mchine Lerning, pp Ching, J., Wong, A. nd Chn, K. (1995) Clss-Dependent Discretiztion for Inductive Lerning from Continuous nd Mixed Mode Dt, IEEE Trnsctions on Pttern Anlysis nd Mchine Intelligence, Vol.17, No.7, pp Cost, S. nd Slzberg, S. (1993) A Weighted Nerest Neighbor Algorithm for Lerning with Symbolic Fetures. Mchine Lerning, Vol. 10, pp Rchlin, J., Simon, K., Slzberg, S. nd Dvid, W. (1994) Towrds Better Understnding of Memory-Bsed nd Byesin Clssifiers, In Proceedings of the Eleventh Interntionl Mchine Lerning Conference. New Brunswick, NJ: Morgn Kufmnn, pp Mohri, T. nd Tnk, H. (1994) An Optiml- Weighting Criterion of Cse Indexing for both Numeric nd Symbolic Attributes, In W. Dvid (Ed.), Cse-Bsed Resoning: Ppers from the 1994 Workshop (Report No. WS-94-01). Menlo Prk, CA: AIII Press. pp Tpi, R. nd Thompson, J. (1978) Nonprmetric Probbility Density Estimtion, Bltimore, MD: The Johns Hopkins University Press. Btchelor, B. (199=78) Pttern Recognition: Ides in Prctice, New York: Plenum Press. pp Ndler, M. nd Eric, P. (1993) Pttern Recognition Engineering, New York: Wiley. pp Michlski, R. Robert, E. nd Edwin, D. (1981) A Recent Advnce in Dt Anlysis: Clustering Objects into Clsses Chrcterized by Conjunctive Concepts, Progress in Pttern Recognition, Vol. 1, Lveen N. Knl nd Azriel Rosenfeld (Eds.). (New York: North-Hollnd). pp Edwin, D. (1994) Recent Progress in Distnce nd Similrity Mesures in Pttern Recognition, Second Interntionl Joint Conference on Pttern Recognition. pp Bibermn, Y. (1994) A Context Similrity Mesure, In Proceedings of the Europen Conference on Mchine Lerning (ECML- 94). (Ctlin, Itly: Springer Verlg). pp Tversky, A. (1977) Fetures of Similrity, Psychologicl Review, Vol. 84, No. 4, pp Slzberg, S. (1991) A Nerest Hyperrectngle Lerning Method, Mchine Lerning, 6: pp Domingos, P. (1995) Rule Induction nd Instnce-Bsed Lerning A Unified Approch, To pper in The Interntionl Joint Conference on Artificil Intelligence (IJCAI-95). Murphy, P. (1996) UCI Repositories of Mchine Lerning nd Domin Theories, [online]. University of Cliforni, Irvine Avilble: tory.html, [2001, Nov Dte of brows]. Interntionl Journl of The Computer, the Internet nd Mngement Vol. 14.No.2 (My - August, 2006) pp

A Comparison of the Discretization Approach for CST and Discretization Approach for VDM

A Comparison of the Discretization Approach for CST and Discretization Approach for VDM Interntionl Journl of Innovtive Reserch in Advnced Engineering (IJIRAE) Volume1 Issue1 (Mrch 2014) A Comprison of the Discretiztion Approch for CST nd Discretiztion Approch for VDM Omr A. A. Shib Fculty

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

DYNAMIC DISCRETIZATION: A COMBINATION APPROACH

DYNAMIC DISCRETIZATION: A COMBINATION APPROACH DYNAMIC DISCRETIZATION: A COMBINATION APPROACH FAN MIN, QIHE LIU, HONGBIN CAI, AND ZHONGJIAN BAI School of Computer Science nd Engineering, University of Electronic Science nd Technology of Chin, Chengdu

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Text mining: bag of words representation and beyond it

Text mining: bag of words representation and beyond it Text mining: bg of words representtion nd beyond it Jsmink Dobš Fculty of Orgniztion nd Informtics University of Zgreb 1 Outline Definition of text mining Vector spce model or Bg of words representtion

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Statistical classification of spatial relationships among mathematical symbols

Statistical classification of spatial relationships among mathematical symbols 2009 10th Interntionl Conference on Document Anlysis nd Recognition Sttisticl clssifiction of sptil reltionships mong mthemticl symbols Wl Aly, Seiichi Uchid Deprtment of Intelligent Systems, Kyushu University

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer.

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer. DBMS Architecture SQL INSTRUCTION OPTIMIZER Dtbse Mngement Systems MANAGEMENT OF ACCESS METHODS BUFFER MANAGER CONCURRENCY CONTROL RELIABILITY MANAGEMENT Index Files Dt Files System Ctlog DATABASE 2 Query

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing

More information

DQL: A New Updating Strategy for Reinforcement Learning Based on Q-Learning

DQL: A New Updating Strategy for Reinforcement Learning Based on Q-Learning DQL: A New Updting Strtegy for Reinforcement Lerning Bsed on Q-Lerning Crlos E. Mrino 1 nd Edurdo F. Morles 2 1 Instituto Mexicno de Tecnologí del Agu, Pseo Cuhunáhuc 8532, Jiutepec, Morelos, 6255, MEXICO

More information

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls Redings for Next Two Lectures Text CPSC 213 Switch Sttements, Understnding Pointers - 2nd ed: 3.6.7, 3.10-1st ed: 3.6.6, 3.11 Introduction to Computer Systems Unit 1f Dynmic Control Flow Polymorphism nd

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

CSEP 573 Artificial Intelligence Winter 2016

CSEP 573 Artificial Intelligence Winter 2016 CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch

More information

A Scalable and Reliable Mobile Agent Computation Model

A Scalable and Reliable Mobile Agent Computation Model A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Improper Integrals. October 4, 2017

Improper Integrals. October 4, 2017 Improper Integrls October 4, 7 Introduction We hve seen how to clculte definite integrl when the it is rel number. However, there re times when we re interested to compute the integrl sy for emple 3. Here

More information

Cone Cluster Labeling for Support Vector Clustering

Cone Cluster Labeling for Support Vector Clustering Cone Cluster Lbeling for Support Vector Clustering Sei-Hyung Lee Deprtment of Computer Science University of Msschusetts Lowell MA 1854, U.S.A. slee@cs.uml.edu Kren M. Dniels Deprtment of Computer Science

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

2014 Haskell January Test Regular Expressions and Finite Automata

2014 Haskell January Test Regular Expressions and Finite Automata 0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded

More information

Semistructured Data Management Part 2 - Graph Databases

Semistructured Data Management Part 2 - Graph Databases Semistructured Dt Mngement Prt 2 - Grph Dtbses 2003/4, Krl Aberer, EPFL-SSC, Lbortoire de systèmes d'informtions réprtis Semi-structured Dt - 1 1 Tody's Questions 1. Schems for Semi-structured Dt 2. Grph

More information

Approximation by NURBS with free knots

Approximation by NURBS with free knots pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde

More information

COMMON HALF YEARLY EXAMINATION DECEMBER 2018

COMMON HALF YEARLY EXAMINATION DECEMBER 2018 li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net.pds.pds COMMON HALF YEARLY EXAMINATION DECEMBER 2018 STD : XI SUBJECT: COMPUTER SCIENCE

More information

Step-Voltage Regulator Model Test System

Step-Voltage Regulator Model Test System IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

USING HOUGH TRANSFORM IN LINE EXTRACTION

USING HOUGH TRANSFORM IN LINE EXTRACTION Stylinidis, Efstrtios USING HOUGH TRANSFORM IN LINE EXTRACTION Efstrtios STYLIANIDIS, Petros PATIAS The Aristotle University of Thessloniki, Deprtment of Cdstre Photogrmmetry nd Crtogrphy Univ. Box 473,

More information

DECISION LEVEL FUSION OF LIDAR DATA AND AERIAL COLOR IMAGERY BASED ON BAYESIAN THEORY FOR URBAN AREA CLASSIFICATION

DECISION LEVEL FUSION OF LIDAR DATA AND AERIAL COLOR IMAGERY BASED ON BAYESIAN THEORY FOR URBAN AREA CLASSIFICATION DECISION LEVEL FUSION OF LIDAR DATA AND AERIAL COLOR IMAGERY BASED ON BAYESIAN THEORY FOR URBAN AREA CLASSIFICATION H. Rstiveis* School of Surveying nd Geosptil Engineering, Fculty of Engineering, University

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

A Formalism for Functionality Preserving System Level Transformations

A Formalism for Functionality Preserving System Level Transformations A Formlism for Functionlity Preserving System Level Trnsformtions Smr Abdi Dniel Gjski Center for Embedded Computer Systems UC Irvine Center for Embedded Computer Systems UC Irvine Irvine, CA 92697 Irvine,

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

Nearest Keyword Set Search in Multi-dimensional Datasets

Nearest Keyword Set Search in Multi-dimensional Datasets Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science

More information

Topic 2: Lexing and Flexing

Topic 2: Lexing and Flexing Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

Computing offsets of freeform curves using quadratic trigonometric splines

Computing offsets of freeform curves using quadratic trigonometric splines Computing offsets of freeform curves using qudrtic trigonometric splines JIULONG GU, JAE-DEUK YUN, YOONG-HO JUNG*, TAE-GYEONG KIM,JEONG-WOON LEE, BONG-JUN KIM School of Mechnicl Engineering Pusn Ntionl

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

Functor (1A) Young Won Lim 10/5/17

Functor (1A) Young Won Lim 10/5/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

CMSC 331 First Midterm Exam

CMSC 331 First Midterm Exam 0 00/ 1 20/ 2 05/ 3 15/ 4 15/ 5 15/ 6 20/ 7 30/ 8 30/ 150/ 331 First Midterm Exm 7 October 2003 CMC 331 First Midterm Exm Nme: mple Answers tudent ID#: You will hve seventy-five (75) minutes to complete

More information

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1 Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the

More information

Math 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012

Math 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012 Mth 464 Fll 2012 Notes on Mrginl nd Conditionl Densities klin@mth.rizon.edu October 18, 2012 Mrginl densities. Suppose you hve 3 continuous rndom vribles X, Y, nd Z, with joint density f(x,y,z. The mrginl

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

x )Scales are the reciprocal of each other. e

x )Scales are the reciprocal of each other. e 9. Reciprocls A Complete Slide Rule Mnul - eville W Young Chpter 9 Further Applictions of the LL scles The LL (e x ) scles nd the corresponding LL 0 (e -x or Exmple : 0.244 4.. Set the hir line over 4.

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information

Control-Flow Analysis and Loop Detection

Control-Flow Analysis and Loop Detection ! Control-Flow Anlysis nd Loop Detection!Lst time! PRE!Tody! Control-flow nlysis! Loops! Identifying loops using domintors! Reducibility! Using loop identifiction to identify induction vribles CS553 Lecture

More information

OUTPUT DELIVERY SYSTEM

OUTPUT DELIVERY SYSTEM Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking

More information

Functor (1A) Young Won Lim 8/2/17

Functor (1A) Young Won Lim 8/2/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

such that the S i cover S, or equivalently S

such that the S i cover S, or equivalently S MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i

More information

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association 9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl

More information

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples EURSIP Journl on pplied Signl Processing 2003:6, 54 529 c 2003 Hindwi Publishing orportion Memory-Optimized Softwre Synthesis from tflow Progrm Grphs withlrgesizetsmples Hyunok Oh The School of Electricl

More information

Computer-Aided Multiscale Modelling for Chemical Process Engineering

Computer-Aided Multiscale Modelling for Chemical Process Engineering 17 th Europen Symposium on Computer Aided Process Engineesing ESCAPE17 V. Plesu nd P.S. Agchi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Computer-Aided Multiscle Modelling for Chemicl Process

More information

Data sharing in OpenMP

Data sharing in OpenMP Dt shring in OpenMP Polo Burgio polo.burgio@unimore.it Outline Expressing prllelism Understnding prllel threds Memory Dt mngement Dt cluses Synchroniztion Brriers, locks, criticl sections Work prtitioning

More information

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute

More information

10/9/2012. Operator is an operation performed over data at runtime. Arithmetic, Logical, Comparison, Assignment, Etc. Operators have precedence

10/9/2012. Operator is an operation performed over data at runtime. Arithmetic, Logical, Comparison, Assignment, Etc. Operators have precedence /9/22 P f Performing i Si Simple l Clcultions C l l ti with ith C#. Opertors in C# nd Opertor Precedence 2. Arithmetic Opertors 3. Logicl Opertors 4. Bitwise Opertors 5. Comprison Opertors 6. Assignment

More information

A Hybrid Wavelet Kernel Construction for Support Vector Machine Classification

A Hybrid Wavelet Kernel Construction for Support Vector Machine Classification A Hybrid Wvelet Kernel Construction for Support Vector Mchine Clssifiction Jose George nd Rjeev Kumrswmy Dept. of Electronics & Commn. Engg., College of Engg., Trivndrum University of Kerl, Thiruvnnthpurm,

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

Explicit Decoupled Group Iterative Method for the Triangle Element Solution of 2D Helmholtz Equations

Explicit Decoupled Group Iterative Method for the Triangle Element Solution of 2D Helmholtz Equations Interntionl Mthemticl Forum, Vol. 12, 2017, no. 16, 771-779 HIKARI Ltd, www.m-hikri.com https://doi.org/10.12988/imf.2017.7654 Explicit Decoupled Group Itertive Method for the Tringle Element Solution

More information

Comparative Study of Universities Web Structure Mining

Comparative Study of Universities Web Structure Mining Comprtive Study of Universities Web Structure Mining Z. Abdullh, A. R. Hmdn Abstrct This pper is ment to nlyze the rnking of University of Mlysi Terenggnu, UMT s website in the World Wide Web. There re

More information

pdfapilot Server 2 Manual

pdfapilot Server 2 Manual pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline CSCI1950 Z Comput4onl Methods for Biology Lecture 2 Ben Rphel Jnury 26, 2009 hhp://cs.brown.edu/courses/csci1950 z/ Outline Review of trees. Coun4ng fetures. Chrcter bsed phylogeny Mximum prsimony Mximum

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Chapter 2 Sensitivity Analysis: Differential Calculus of Models

Chapter 2 Sensitivity Analysis: Differential Calculus of Models Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls

More information

AVolumePreservingMapfromCubetoOctahedron

AVolumePreservingMapfromCubetoOctahedron Globl Journl of Science Frontier Reserch: F Mthemtics nd Decision Sciences Volume 18 Issue 1 Version 1.0 er 018 Type: Double Blind Peer Reviewed Interntionl Reserch Journl Publisher: Globl Journls Online

More information

CS 221: Artificial Intelligence Fall 2011

CS 221: Artificial Intelligence Fall 2011 CS 221: Artificil Intelligence Fll 2011 Lecture 2: Serch (Slides from Dn Klein, with help from Sturt Russell, Andrew Moore, Teg Grenger, Peter Norvig) Problem types! Fully observble, deterministic! single-belief-stte

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

CS481: Bioinformatics Algorithms

CS481: Bioinformatics Algorithms CS481: Bioinformtics Algorithms Cn Alkn EA509 clkn@cs.ilkent.edu.tr http://www.cs.ilkent.edu.tr/~clkn/teching/cs481/ EXACT STRING MATCHING Fingerprint ide Assume: We cn compute fingerprint f(p) of P in

More information

Section 3.1: Sequences and Series

Section 3.1: Sequences and Series Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility

More information

Qubit allocation for quantum circuit compilers

Qubit allocation for quantum circuit compilers Quit lloction for quntum circuit compilers Nov. 10, 2017 JIQ 2017 Mrcos Yukio Sirichi Sylvin Collnge Vinícius Fernndes dos Sntos Fernndo Mgno Quintão Pereir Compilers for quntum computing The first genertion

More information

On Computation and Resource Management in Networked Embedded Systems

On Computation and Resource Management in Networked Embedded Systems On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,

More information

Integration. October 25, 2016

Integration. October 25, 2016 Integrtion October 5, 6 Introduction We hve lerned in previous chpter on how to do the differentition. It is conventionl in mthemtics tht we re supposed to lern bout the integrtion s well. As you my hve

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Parameterless Outlier Detection in Data Streams

Parameterless Outlier Detection in Data Streams Prmeterless Outlier Detection in Dt Strems Alice Mrscu nd Florent Mssegli INRIA AxIS Project-Tem 2004 route des lucioles - BP 93 {first.lst}@sophi.inri.fr ABSTRACT Outlyingness is subjective concept relying

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

Making Tree Kernels practical for Natural Language Learning

Making Tree Kernels practical for Natural Language Learning Mking Tree Kernels prcticl for turl Lnguge Lerning Alessndro Moschitti eprtment of Computer Science University of Rome Tor ergt Rome, Itly moschitti@info.unirom2.it Abstrct In recent yers tree kernels

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Introduction. Chapter 4: Complex Integration. Introduction (Cont d)

Introduction. Chapter 4: Complex Integration. Introduction (Cont d) Introduction Chpter 4: Complex Integrtion Li, Yongzho Stte Key Lbortory of Integrted Services Networks, Xidin University October 10, 2010 The two-dimensionl nture of the complex plne required us to generlize

More information