Introduction. Introduction. Heuristic Algorithms. Giovanni Righini. Università degli Studi di Milano Department of Computer Science (Crema)
|
|
- Charleen Baldwin
- 5 years ago
- Views:
Transcription
1 Introduction Heuristic Algorithms Giovanni Righini Università degli Studi di Milano Department of Computer Science (Crema)
2 Objectives The course aims at illustrating the main algorithmic techniques for the analysis and the design of effective and efficient heuristic algorithms for complex decision problems, especially combinatorial optimization problems. The course contributes to the Analytics and Optimization curriculum within the M.Sc. in Informatics and in Mathematics. The aim of this (new and original) curriculum is to provide knowledge on decision-making and optimization based on the use of data, models and algorithms. This currently goes under the name (Business) Analytics and it is one of the most required professional/educational profiles worldwide.
3 Course programme Introduction Basic concepts Classification Constructive algorithms Local search algorithms Approximation algorithms with guaranteed error bounds Math-heuristics
4 Prerequisites The course has some prerequisites: Computer programming Algorithms and data structures (Operations research) Students will be required to implement some of the algorithms and to do computational tests with them. For this purpose some lectures will be organized as lab sessions.
5 References There are many excellent books on heuristic and meta-heuristic algorithms. A classical reference is the book: E. Aarts, J.K. Lenstra eds., Local search in combinatorial optimization, Wiley 1997 (which is available in our dept. library), but there are also more recent references. Papers on specific topics will be made available through the course web site.
6 Heuristic algorithms The word heuristic comes from the greek word eurisko, which means I find. It has been used in the last century or so, to indicate a practical decision rule or a practical way to find a solution to a problem, relying upon experience and common sense. These rules do not aim at satisfying any formal or theoretical property; sometimes heuristics have been defined just as practical alternatives in contrast to formal mathematical techniques (=algorithms!).
7 Why using heuristics? Heuristic algorithms are used to solve large instances of computationally difficult problems, because the computation of an exact solution would require an excessive amount of computing time. It is usually purposeless to use heuristics for polynomially solvable problems, for small scale instances.
8 Heuristic algorithms for combinatorial optimization Heuristics can be applied to many different types of problems: optimization problems classification/recognition problems (machine learning) control problems etc... This course deals with heuristics for combinatorial optimization problems only, because: a huge amount of problems, arising in any type of industry, can be represented as c.o. problems; c.o. problems are in general very difficult; their combinatorial structure is a useful source of inspiration for the design of heuristics. It is useful to complement this course with the Combinatorial Optimization course.
9 Heuristics and meta-heuristics These algorithms can be roughly classified into two types: specific algorithms for specific problems Heuristics general ideas for almost any problem Meta-heuristics In general, special-purpose heuristic algorithms are more effective than general-purpose meta-heuristics. On the other hand, meta-heuristics are more easily applicable to a wide variety of different problems.
10 Not only heuristics Sometimes it may happen that the best way to compute good solutions to a combinatorial optimization problem is an exact optimization algorithm after suitable modifications that make it faster at the expense of the optimality guarantee. Any optimization algorithm can be turned into a heuristic algorithm. Therefore this course can be complemented with the Complements of O.R. course.
11 Remarks Remark 1: Heuristic algorithms is a dangerous field of study, because: any idea (good or bad) can be turned into a (new!) heuristic algorithm and publicized as such; it is not needed to work with mathematical models of combinatorial optimization problems; nobody expects theorems or theoretical results on heuristic algorithms. These are ideal conditions for junk science. One of the main educational goals of this course will be to develop a scientific approach to the design and the analysis of heuristic algorithms.
12 Remarks Remark 2: I like this kind of heuristics, This heuristics is new/fashionable are not scientifically sound reasons for using it. The (comparative) analysis of heuristics is an experimental discipline, similar to natural science disciplines. Remark 3: Heuristic algorithms design and analysis is a borderline field between O.R. and Informatics. In can be correctly labeled in both ways (although this is not always recognized). A correct approach to heuristic algorithms requires knowledge from both domains (which is not so common). Hence is it advisable to complement this course with the Operations Research course.
13 Remarks Remark 4: heuristic is not magic and less predictable is not more powerful. The temptation is to think that if the problem is so complex that we do not know how to solve it, than the algorithm must be so complex that we do not know what it does. Remark 5: understanding why a heuristic algorithm works is more important than showing that it is the best known algorithm for a specific set of instances.
Branch-and-bound: an example
Branch-and-bound: an example Giovanni Righini Università degli Studi di Milano Operations Research Complements The Linear Ordering Problem The Linear Ordering Problem (LOP) is an N P-hard combinatorial
More informationRegistration Workshop. Nov. 1, 2017 CS/SE Freshman Seminar
Registration Workshop Nov. 1, 2017 CS/SE Freshman Seminar Computer Science Department Website: http://cs.mtech.edu Program descriptions under Degrees & Options Mission statements under Accreditation &
More informationA Randomized Algorithm for Minimizing User Disturbance Due to Changes in Cellular Technology
A Randomized Algorithm for Minimizing User Disturbance Due to Changes in Cellular Technology Carlos A. S. OLIVEIRA CAO Lab, Dept. of ISE, University of Florida Gainesville, FL 32611, USA David PAOLINI
More informationAlgorithms and Data Structures, or
Algorithms and Data Structures, or... Classical Algorithms of the 50s, 60s and 70s Mary Cryan A&DS Lecture 1 1 Mary Cryan Our focus Emphasis is Algorithms ( Data Structures less important). Most of the
More informationComputational complexity
Computational complexity Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Definitions: problems and instances A problem is a general question expressed in
More informationAlgorithms for Data Processing Lecture I: Introduction to Computational Efficiency
Algorithms for Data Processing Lecture I: Introduction to Computational Efficiency Alessandro Artale Free University of Bozen-Bolzano Faculty of Computer Science http://www.inf.unibz.it/ artale artale@inf.unibz.it
More informationCSE 417 Practical Algorithms. (a.k.a. Algorithms & Computational Complexity)
CSE 417 Practical Algorithms (a.k.a. Algorithms & Computational Complexity) Outline for Today > Course Goals & Overview > Administrivia > Greedy Algorithms Why study algorithms? > Learn the history of
More informationSize of a problem instance: Bigger instances take
2.1 Integer Programming and Combinatorial Optimization Slide set 2: Computational Complexity Katta G. Murty Lecture slides Aim: To study efficiency of various algo. for solving problems, and to classify
More informationAlgorithms and Data Structures
Algorithms and Data Structures or, Classical Algorithms of the 50s, 60s, 70s Richard Mayr Slides adapted from Mary Cryan (2015/16) with small changes. School of Informatics University of Edinburgh ADS
More informationSOFTWARE ENGINEERING
SOFTWARE ENGINEERING INTRODUCTION TO SOFTWARE ENGINEERING. COURSE STRUCTURE AND REQUIREMENTS Saulius Ragaišis saulius.ragaisis@mif.vu.lt WHAT IS SOFTWARE ENGINEERING? First definition Software engineering
More informationThe Bizarre Truth! Automating the Automation. Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER
The Bizarre Truth! Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER By Kimmo Nupponen 1 TABLE OF CONTENTS 1. The context Introduction 2. The approach Know the difference
More information6th Grade Advanced Math Algebra
6th Grade Advanced Math Algebra If your student is considering a jump from 6th Advanced Math to Algebra, please be advised of the following gaps in instruction. 19 of the 7th grade mathematics TEKS and
More informationCognitive Complexity of Boolean Problems
Cognitive Complexity of Boolean Problems Ilya Levin, Gabriel Shafat, Osnat Keren School of Education, Tel Aviv University, School of Engineering, Bar Ilan University, Israel 10th International Workshop
More informationFuzzy Inspired Hybrid Genetic Approach to Optimize Travelling Salesman Problem
Fuzzy Inspired Hybrid Genetic Approach to Optimize Travelling Salesman Problem Bindu Student, JMIT Radaur binduaahuja@gmail.com Mrs. Pinki Tanwar Asstt. Prof, CSE, JMIT Radaur pinki.tanwar@gmail.com Abstract
More informationModule 4. Computer-Aided Design (CAD) systems
Module 4. Computer-Aided Design (CAD) systems Nowadays the design of complex systems is unconceivable without computers. The fast computers, the sophisticated developing environments and the well elaborated
More informationACO and other (meta)heuristics for CO
ACO and other (meta)heuristics for CO 32 33 Outline Notes on combinatorial optimization and algorithmic complexity Construction and modification metaheuristics: two complementary ways of searching a solution
More informationCourse Introduction. Scheduling: Terminology and Classification
Outline DM87 SCHEDULING, TIMETABLING AND ROUTING Lecture 1 Course Introduction. Scheduling: Terminology and Classification 1. Course Introduction 2. Scheduling Problem Classification Marco Chiarandini
More informationDiploma Supplement. Anlage zum Antrag auf Akkreditierung Diploma Supplement zum Master- Teilzeitstudiengang Informatik. 1. Holder of the Qualification
Diploma Supplement This Diploma Supplement model was developed by the European Commission, Council of Europe and UNESCO/CEPES. The purpose of the supplement is to provide sufficient independent data to
More informationMercer County Schools
Mercer County Schools PRIORITIZED CURRICULUM Mathematics Content Maps Grade 8 Mercer County Schools PRIORITIZED CURRICULUM The Mercer County Schools Prioritized Curriculum is composed of West Virginia
More informationLinear Modeling Elementary Education 4
Linear Modeling Elementary Education 4 Mathematical modeling is simply the act of building a model (usually in the form of graphs) which provides a picture of a numerical situation. Linear Modeling is
More informationUsing Modified Euler Method (MEM) for the Solution of some First Order Differential Equations with Initial Value Problems (IVPs).
Using Modified Euler Method (MEM) for the Solution of some First Order Differential Equations with Initial Value Problems (IVPs). D.I. Lanlege, Ph.D. * ; U.M. Garba, B.Sc.; and A. Aluebho, B.Sc. Department
More informationCS6320: Intro to Intractability, Approximation and Heuristic Algorithms Spring Lecture 20: April 6
CS6320: Intro to Intractability, Approximation and Heuristic Algorithms Spring 2016 Lecture 20: April 6 Instructor: Prof. Ajay Gupta Scribe: Jason Pearson Many thanks to Teofilo Gonzalez for his lecture
More informationFall CS598CC: Approximation Algorithms. Chandra Chekuri
Fall 2006 CS598CC: Approximation Algorithms Chandra Chekuri Administrivia http://www.cs.uiuc.edu/homes/chekuri/teaching/fall2006/approx.htm Grading: 4 home works (60-70%), 1 take home final (30-40%) Mailing
More informationExercises: Instructions and Advice
Instructions Exercises: Instructions and Advice The exercises in this course are primarily practical programming tasks that are designed to help the student master the intellectual content of the subjects
More informationBEng (Hons) Mechanical Engineering (Minor: Energy Systems) E443
BEng (Hons) Mechanical (Minor: Energy Systems). Introduction E3 Mechanical is the historical root of engineering practice. It gave its name to the realm of technology-based problem-solving, but today the
More informationCopyright 2000, Kevin Wayne 1
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
More information5 Machine Learning Abstractions and Numerical Optimization
Machine Learning Abstractions and Numerical Optimization 25 5 Machine Learning Abstractions and Numerical Optimization ML ABSTRACTIONS [some meta comments on machine learning] [When you write a large computer
More informationSOFTWARE ENGINEERING
SOFTWARE ENGINEERING INTRODUCTION TO SOFTWARE ENGINEERING. COURSE STRUCTURE AND REQUIREMENTS Saulius Ragaišis saulius.ragaisis@mif.vu.lt WHAT IS SOFTWARE ENGINEERING? First definition Software engineering
More informationThe complement of PATH is in NL
340 The complement of PATH is in NL Let c be the number of nodes in graph G that are reachable from s We assume that c is provided as an input to M Given G, s, t, and c the machine M operates as follows:
More informationPart A: Course Outline
University of Macau Faculty of Science and Technology Course Title: Department of Electrical and Computer Engineering Part A: Course Outline Communication System and Data Network Course Code: ELEC460 Year
More informationCity University of Hong Kong Course Syllabus. offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018
City University of Hong Kong Course Syllabus offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018 Part I Course Overview Course Title: Cloud Computing
More informationUsing the Best of Both!
Using the Best of Both! A Guide to Using Connected Mathematics 2 with Prentice Hall Mathematics Courses 1, 2, 3 2012, and Algebra Readiness MatBro111707BestOfBothPH10&CMP2.indd 1 6/7/11 11:59 AM Using
More informationFoundations of Computing
Foundations of Computing Darmstadt University of Technology Dept. Computer Science Winter Term 2005 / 2006 Copyright c 2004 by Matthias Müller-Hannemann and Karsten Weihe All rights reserved http://www.algo.informatik.tu-darmstadt.de/
More informationStanford University CS261: Optimization Handout 1 Luca Trevisan January 4, 2011
Stanford University CS261: Optimization Handout 1 Luca Trevisan January 4, 2011 Lecture 1 In which we describe what this course is about and give two simple examples of approximation algorithms 1 Overview
More informationMultiple Choice Style Informatics
Multiple Choice Style Informatics Jordan Tabov, Emil Kelevedzhiev & Borislav Lazarov I. Introduction. Jordan Tabov was an IMO participant and has been a team leader of the Bulgarian IMO team. He graduated
More informationFor students entering Part 1 in September 2018 UFCSWIYB
Programme Specification BSc Computer Science For students entering Part 1 in September 2018 UCAS Code: G400 UFCOMPB UFCSWIYB This document sets out key information about your Programme and forms part of
More information6th Grade P-AP Math Algebra
6th Grade P-AP Math Algebra If your student is considering a jump from 6th grade P-AP to 7th Grade Advanced math, please be advised of the following gaps in instruction. None of the 7th or 8th grade mathematics
More informationOutline of the module
Evolutionary and Heuristic Optimisation (ITNPD8) Lecture 2: Heuristics and Metaheuristics Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ Computing Science and Mathematics, School of Natural Sciences University
More informationFor students entering Part 1 in September 2019 UFCSWIYB
Programme Specification BSc Computer Science For students entering Part 1 in September 2019 UCAS Code: G400 UFCOMPB UFCSWIYB This document sets out key information about your Programme and forms part of
More informationEASTERN ARIZONA COLLEGE Finite Mathematics
EASTERN ARIZONA COLLEGE Finite Mathematics Course Design 2015-2016 Course Information Division Mathematics Course Number MAT 171 Title Finite Mathematics Credits 4 Developed by Jay Clarke/Revised by Ray
More information8/19/13. Computational problems. Introduction to Algorithm
I519, Introduction to Introduction to Algorithm Yuzhen Ye (yye@indiana.edu) School of Informatics and Computing, IUB Computational problems A computational problem specifies an input-output relationship
More informationIntroduction to Computational Mathematics
Introduction to Computational Mathematics Introduction Computational Mathematics: Concerned with the design, analysis, and implementation of algorithms for the numerical solution of problems that have
More informationIncreasing and Decreasing Functions. MATH 1003 Calculus and Linear Algebra (Lecture 20) Increasing and Decreasing Functions
Increasing and Decreasing Functions MATH 1003 Calculus and Linear Algebra (Lecture 20) Maosheng Xiong Department of Mathematics, HKUST Suppose y = f (x). 1. f (x) is increasing on an interval a < x < b,
More informationResolutions of the pair design, or 1-factorisations of complete graphs. 1 Introduction. 2 Further constructions
Resolutions of the pair design, or 1-factorisations of complete graphs 1 Introduction A resolution of a block design is a partition of the blocks of the design into parallel classes, each of which forms
More informationGiapetto s Woodcarving Problem
MTE 503-1 Computer Technology in Mathematics Education TI Worksheet Ezgi ÇALLI Class level: 9-10 Objectives: IGCSE (0607-Extended, 2014): (Extension to) 7.7. Linear inequalities on the Cartesian plane
More informationInteger Programming ISE 418. Lecture 1. Dr. Ted Ralphs
Integer Programming ISE 418 Lecture 1 Dr. Ted Ralphs ISE 418 Lecture 1 1 Reading for This Lecture N&W Sections I.1.1-I.1.4 Wolsey Chapter 1 CCZ Chapter 2 ISE 418 Lecture 1 2 Mathematical Optimization Problems
More informationProgram Proposal for a Direct Converted Program. BS in COMPUTER SCIENCE
Program Proposal for a Direct Converted Program BS in COMPUTER SCIENCE Document Page number Curriculum Sheet p. 2 p. -year Roadmap p. p. 5 Two Year Course Schedule p. 6 (2018 2019 AY and 2019 2020 AY)
More informationSublinear Algorithms for Big Data Analysis
Sublinear Algorithms for Big Data Analysis Michael Kapralov Theory of Computation Lab 4 EPFL 7 September 2017 The age of big data: massive amounts of data collected in various areas of science and technology
More informationEvaluating Classifiers
Evaluating Classifiers Charles Elkan elkan@cs.ucsd.edu January 18, 2011 In a real-world application of supervised learning, we have a training set of examples with labels, and a test set of examples with
More informationINTERSECTION OF CURVES FACTS, COMPUTATIONS, APPLICATIONS IN BLOWUP*
South Bohemia Mathematical Letters Volume 24, (2016), No. 1, 10-16. INTERSECTION OF CURVES FACTS, COMPUTATIONS, APPLICATIONS IN BLOWUP* PAVEL CHALMOVIANSKÝ abstrakt. We deal with application of intersection
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationUNIVERSITY OF TEXAS AT DALLAS MIS 6302: Information Technology Strategy & Management SPRING 2014 Tuesday 7 to 9.45 pm
UNIVERSITY OF TEXAS AT DALLAS MIS 6302: Information Technology Strategy & Management SPRING Tuesday 7 to 9.45 pm Course Outline Instructor: Professor Sumit Majumdar, Office: SOM 3.433, Office Phone: 972-883-4786,
More information"Charting the Course... ITIL 2011 Service Offerings & Agreement (SOA) Certification Program. Course Summary
Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many public and private organizations. Since early 1990, ITIL
More informationIntegrated Math B. Syllabus. Course Overview. Course Goals. Math Skills
Syllabus Integrated Math B Course Overview Integrated Math is a comprehensive collection of mathematical concepts designed to give you a deeper understanding of the world around you. It includes ideas
More informationPrincess Sumaya University for Technology King Hussein School for Computing Sciences- Computer Graphics Department Curriculum 2017
University Requirements: (27 Credit Hours) a- Mandatory Courses (12 credit hours): 11000 Computer Skills Placement Test 0-11100 Computer Skills (Remedial) 0-31010 Arabic Placement Test 0-31019 Arabic (Remedial)
More informationConstructive and destructive algorithms
Constructive and destructive algorithms Heuristic algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Constructive algorithms In combinatorial optimization problems every
More informationTransductive Learning: Motivation, Model, Algorithms
Transductive Learning: Motivation, Model, Algorithms Olivier Bousquet Centre de Mathématiques Appliquées Ecole Polytechnique, FRANCE olivier.bousquet@m4x.org University of New Mexico, January 2002 Goal
More informationMinimum grade of C in MAC 1102 or Mac 1104 or 1105 or appropriate score on placement test.
Official Course Outline MAC 1114 College Trigonometry General Course Information Common Course Number: MAC1114 Course Title: College Trigonometry Prerequisite(s): Contact Hour Breakdown: CR 3 CLASS 3 LAB
More informationComputer Science Curriculum for International Students
Computer Science Curriculum for International Students 2011-2012 Language of instruction Although the lecturer is allowed to teach his course in Dutch, - the course notes, handbook and/or other information
More informationUnit 1 Lesson 4 Representing Data. Copyright Houghton Mifflin Harcourt Publishing Company
Florida Benchmarks SC.6.N.1.1 Define a problem from the sixth grade curriculum, use appropriate reference materials to support scientific understanding, plan and carry out scientific investigation of various
More informationGovernet 1000 River Walk Drive, Suite 350 Idaho Falls, ID Tel: Fax: CurricUNET User Manual
Governet 1000 River Walk Drive, Suite 350 Idaho Falls, ID 83402 Tel: 208.522.1225 Fax: 208.522.2896 CurricUNET User Manual 1 Table of Contents Log In... 4 Viewing Courses and Programs:... 5 Viewing Courses:...
More informationScope and Sequence for the New Jersey Core Curriculum Content Standards
Scope and Sequence for the New Jersey Core Curriculum Content Standards The following chart provides an overview of where within Prentice Hall Course 3 Mathematics each of the Cumulative Progress Indicators
More informationEngineering Design Notes I Introduction. EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering
Engineering Design Notes I Introduction EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering Topics Overview Analysis vs. Design Design Stages Systems Engineering Integration
More informationCOURSE SYLLABUS Math TRANSFORMATIONAL GEOMETRY Spring 2006
1 CRN: 7522 COURSE SYLLABUS Math 355.01 -- TRANSFORMATIONAL GEOMETRY Spring 2006 CREDIT HOURS: 3 HOUR/DAY: 7:30 8:45 a.m. T 8:00 9:15 a.m. R MEETING ROOM: Osburn Hall, Room 120 INSTRUCTOR: Ron Umble OFFICE:
More informationHybrid Constraint Programming and Metaheuristic methods for Large Scale Optimization Problems
Hybrid Constraint Programming and Metaheuristic methods for Large Scale Optimization Problems Fabio Parisini Tutor: Paola Mello Co-tutor: Michela Milano Final seminars of the XXIII cycle of the doctorate
More informationNP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.
CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT
More informationVirginia Geometry, Semester A
Syllabus Virginia Geometry, Semester A Course Overview Virginia Geometry, Semester A, provides an in-depth discussion of the basic concepts of geometry. In the first unit, you ll examine the transformation
More informationSoftware Reliability and Reusability CS614
Software Reliability and Reusability CS614 Assiut University Faculty of Computers & Information Quality Assurance Unit Software Reliability and Reusability Course Specifications2011-2012 Relevant program
More informationCity University of Hong Kong Course Syllabus. offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018
City University of Hong Kong Course Syllabus offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018 Part I Course Overview Course Title: Internet Technology
More informationCOMPUTER SCIENCE (CSCI)
Bucknell University 1 COMPUTER SCIENCE (CSCI) Faculty Professors: Xiannong Meng, Luiz Felipe Perrone Associate Professors: Stephen M. Guattery (Chair), Brian R. King, Lea D. Wittie Assistant Professors:
More informationUndergraduate Program for Specialty of Software Engineering
Undergraduate Program for Specialty of Software Engineering Ⅰ. Length of Schooling Standard: 4 years; Length of Schooling: 3-6 years Ⅱ. Degree Bachelor of Engineering Ⅲ. Specialty Orientation School of
More informationComputational Geometry. Definition, Application Areas, and Course Overview
Computational Geometry Definition, Application Areas, and Course Overview Computational Geometry is a subfield of the Design and Analysis of Algorithms Computational Geometry is a subfield of the Design
More informationUsing Python to Solve Computationally Hard Problems
Using Python to Solve Computationally Hard Problems Using Python to Solve Computationally Hard Problems Rachael Madsen Optimal Design Software LLC BS in Mathematics Software Engineer & Architect Python
More informationMachine Learning using Matlab. Lecture 3 Logistic regression and regularization
Machine Learning using Matlab Lecture 3 Logistic regression and regularization Presentation Date (correction) 10.07.2017 11.07.2017 17.07.2017 18.07.2017 24.07.2017 25.07.2017 Project proposals 13 submissions,
More informationMASTER OF SCIENCE IN COMPUTER AND INFORMATION SCIENCE
DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE Ping Zhang, Ph.D., Interim Department Chairperson Math and Science Building, 1 st Floor 1000 ASU Drive #30 Phone: 601-877-6430 FAX: 601-877-6631 Degrees Offered
More informationGraph Theory Problem Ideas
Graph Theory Problem Ideas April 15, 017 Note: Please let me know if you have a problem that you would like me to add to the list! 1 Classification Given a degree sequence d 1,...,d n, let N d1,...,d n
More informationPÓLYA S THEORY OF COUNTING
PÓLYA S THEORY OF COUNTING MANJIL P. SAIKIA Abstract. In this report, we shall study Pólya s Theory of Counting and apply it to solve some questions related to rotations of the platonic solids. Key Words:
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationCATALOG 2018/2019 BINUS UNIVERSITY. Computer Science. Introduction. Vision. Mission
Computer Science Introduction In the new millennium and the global era, the role of information and automation in the various domains and activities of the business industry are becoming more important.
More information10601 Machine Learning. Model and feature selection
10601 Machine Learning Model and feature selection Model selection issues We have seen some of this before Selecting features (or basis functions) Logistic regression SVMs Selecting parameter value Prior
More informationData Structures and Algorithms
Data Structures and Algorithms About the course (objectives, outline, recommended reading) Problem solving Notions of Algorithmics (growth of functions, efficiency, programming model, example analysis)
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 1 History of Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationSignificant Figure Rules
Significant Figure Rules There are three rules on determining how many significant figures are in a number: 1. Non-zero digits are always significant. 2. Any zeros between two significant digits are significant.
More informationAM 221: Advanced Optimization Spring 2016
AM 221: Advanced Optimization Spring 2016 Prof. Yaron Singer Lecture 2 Wednesday, January 27th 1 Overview In our previous lecture we discussed several applications of optimization, introduced basic terminology,
More informationAlgorithms for Decision Support. Integer linear programming models
Algorithms for Decision Support Integer linear programming models 1 People with reduced mobility (PRM) require assistance when travelling through the airport http://www.schiphol.nl/travellers/atschiphol/informationforpassengerswithreducedmobility.htm
More informationTeletraffic theory I: Queuing theory
Teletraffic theory I: Queuing theory Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2716/ 1. Place of the course TLT-2716 is a part of Teletraffic theory five
More informationPartha Sarathi Mandal
MA 515: Introduction to Algorithms & MA353 : Design and Analysis of Algorithms [3-0-0-6] Lecture 39 http://www.iitg.ernet.in/psm/indexing_ma353/y09/index.html Partha Sarathi Mandal psm@iitg.ernet.in Dept.
More informationSOFTWARE ENGINEERING. Curriculum in Software Engineering. Program Educational Objectives
Software Engineering 1 SOFTWARE ENGINEERING For the undergraduate curriculum in Software Engineering (http:// www.se.iastate.edu) leading to the degree Bachelor of Science. This curriculum is accredited
More informationWhere have all the cars gone? A model for determining traffic flow throughout a road network
A model for determining traffic flow throughout a road network Harvey Mudd College Presentation Days 7 May 2008 Traffic monitoring Important Equations Lots of Traffic + Small Roads = Congestion Congestion
More informationEE3315 Internet Technology EE3315 Internet Technology Overview Slide 1
EE3315 Internet Technology http://www.cityu.edu.hk/ug/current/course/ee3315.htm EE3315 Internet Technology Overview Slide 1 Course Aim This course aims to provide students with the knowledge of key protocols
More informationMetaheuristic Development Methodology. Fall 2009 Instructor: Dr. Masoud Yaghini
Metaheuristic Development Methodology Fall 2009 Instructor: Dr. Masoud Yaghini Phases and Steps Phases and Steps Phase 1: Understanding Problem Step 1: State the Problem Step 2: Review of Existing Solution
More informationDOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING FOR INFORMATION PROCESSING PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING FOR INFORMATION PROCESSING PDF EBOOK EPUB MOBI Page 1 Page 2 computing curricula guidelines for associate degree
More informationDOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING AND ENGINEERING TECHNOLOGY PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING AND ENGINEERING TECHNOLOGY PDF EBOOK EPUB MOBI Page 1 Page 2 computing curricula guidelines for associate degree
More informationCombinatorial optimization and its applications in image Processing. Filip Malmberg
Combinatorial optimization and its applications in image Processing Filip Malmberg Part 1: Optimization in image processing Optimization in image processing Many image processing problems can be formulated
More informationCSE 417 Branch & Bound (pt 4) Branch & Bound
CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity
More informationReasoning About Programs Panagiotis Manolios
Reasoning About Programs Panagiotis Manolios Northeastern University March 1, 2017 Version: 101 Copyright c 2017 by Panagiotis Manolios All rights reserved. We hereby grant permission for this publication
More informationBachelor of Engineering Technology (Electronics & Controls) Curriculum Document. Australian College of Kuwait. (September 2015) BEEF15 - Version 5.
Bachelor of Engineering Technology (Electronics & Controls) Curriculum Document Australian College of Kuwait (September 2015) BEEF15 - Version 5.1 FOREWORD In this document, a curriculum for Bachelor of
More informationThe Probabilistic Method
The Probabilistic Method Po-Shen Loh June 2010 1 Warm-up 1. (Russia 1996/4 In the Duma there are 1600 delegates, who have formed 16000 committees of 80 persons each. Prove that one can find two committees
More informationAssessing Continuous Demand Representation in Coverage Modeling
Assessing Continuous Demand Representation in Coverage Modeling Ran Wei 1, Alan T. Murray 1 1 GeoDa Center for Geospatial Analysis and Computation, School of Geographical Sciences and Urban Planning, Arizona
More informationSix Weeks:
HPISD Grade 7 7/8 Math The student uses mathematical processes to: acquire and demonstrate mathematical understanding Mathematical Process Standards Apply mathematics to problems arising in everyday life,
More information