LASH: Large-Scale Sequence Mining with Hierarchies

Size: px
Start display at page:

Download "LASH: Large-Scale Sequence Mining with Hierarchies"

Transcription

1 LASH: Large-Scale Sequence Mining with Hierarchies Kaustubh Beedkar and Rainer Gemulla Data and Web Science Group University of Mannheim June 2 nd, 2015 SIGMOD 2015 Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

2 Syntactic Explorer (Verb to Verb Noun) Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

3 Sequence Mining Goal: Discover subsequences as patterns in sequence data Input: Collection of sequences of items, e.g., Text collection (sequence of words) Customer transactions (sequence of products) Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

4 Sequence Mining Goal: Discover subsequences as patterns in sequence data Input: Collection of sequences of items, e.g., Text collection (sequence of words) Customer transactions (sequence of products) Output: subsequences that occur in σ input sequences (frequency threshold) have length at most λ (length threshold) have gap γ (contiguous subsequences or non-contiguous subsequences) Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

5 Sequence Mining Goal: Discover subsequences as patterns in sequence data Input: Collection of sequences of items, e.g., Text collection (sequence of words) Customer transactions (sequence of products) Output: subsequences that occur in σ input sequences (frequency threshold) have length at most λ (length threshold) have gap γ (contiguous subsequences or non-contiguous subsequences) Example: S 1 : Anna lives in Melbourne S 2 : Bob lives in the city of Berlin S 3 : Charlie likes London Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

6 Sequence Mining Goal: Discover subsequences as patterns in sequence data Input: Collection of sequences of items, e.g., Text collection (sequence of words) Customer transactions (sequence of products) Output: subsequences that occur in σ input sequences (frequency threshold) have length at most λ (length threshold) have gap γ (contiguous subsequences or non-contiguous subsequences) Example: S 1 : Anna lives in Melbourne S 2 : Bob lives in the city of Berlin S 3 : Charlie likes London Subsequence: lives in σ = 2, λ = 2, γ = 0 Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

7 Hierarchies Items can be naturally arranged in a hierarchy, e.g., Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

8 Hierarchies Items can be naturally arranged in a hierarchy, e.g., DET a an the Syntactic hierarchy Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

9 Hierarchies Items can be naturally arranged in a hierarchy, e.g., DET a an the PERSON CITY Syntactic hierarchy Scientist Politician Melbourne... Albert Einstein Barack Obama Semantic hierarchy Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

10 Hierarchies Items can be naturally arranged in a hierarchy, e.g., DET a an the PERSON CITY Syntactic hierarchy Scientist Politician Melbourne... Albert Einstein Barack Obama Photography Semantic hierarchy DSLR Camera Tripod Cannon5D Nikon5100 Product hierarchy... Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

11 Sequence Mining with Hierarchies Item hierarchies are specifically taken into account Discover non-trivial patterns Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

12 Sequence Mining with Hierarchies Item hierarchies are specifically taken into account Discover non-trivial patterns Example S 1 : Anna lives in Melbourne S 2 : Bob lives in the city of Berlin S 3 : Charlie likes London Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

13 Sequence Mining with Hierarchies Item hierarchies are specifically taken into account Discover non-trivial patterns Example S 1 : Anna lives in Melbourne S 2 : Bob lives in the city of Berlin S 3 : Charlie likes London PERSON CITY Anna Bob Charlie Melbourne Berlin Semantic hierarchy London Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

14 Sequence Mining with Hierarchies Item hierarchies are specifically taken into account Discover non-trivial patterns Example S 1 : Anna lives in Melbourne S 2 : Bob lives in the city of Berlin S 3 : Charlie likes London Generalized subsequence: PERSON lives in CITY σ = 2, λ = 4, γ = 3 PERSON CITY Anna Bob Charlie Melbourne Berlin Semantic hierarchy London Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

15 Sequence Mining with Hierarchies Applications Linguistic patterns, e.g., read DET book NNP lives in NNP Information extraction, e.g., PERSON lives in CITY Market-basket analysis, e.g, buy DSLR camera photography book flash Web-usage mining... Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

16 LASH Distributed framework for sequence mining with hierarchies D H Built over MapReduce for large-scale data processing Hierarchy-aware item-based partitioning Map (Partitioning) Divide data into potentially overlapping partitions D 1 H 1 D 2 H 2... D n H n Local mining Local mining Local mining F 1 F 2... F n Reduce (mining) Partitions are mined independently No global post-processing F Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

17 Outline 1 Introduction 2 Partitioning 3 Local Mining 4 Evaluation 5 Conclusion Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

18 Item-based Partitioning D H Hierarchy-aware item-based partitioning a b k D 1 H 1 D 2 H 2... D n H n Local mining Local mining Local mining F 1 F 2... F n F a: Filter a but not b,...,k F b : Filter b but not c,...,k F F k : Filter k Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

19 Item-based Partitioning Items are ordered by decreasing frequency, e.g., a < b < c < < k D H Hierarchy-aware item-based partitioning a b k D 1 H 1 D 2 H 2... D n H n Local mining Local mining Local mining F 1 F 2... F n F a: Filter a but not b,...,k F b : Filter b but not c,...,k F F k : Filter k Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

20 Item-based Partitioning Items are ordered by decreasing frequency, e.g., a < b < c < < k Create a partition for each frequent item called pivot item D H Hierarchy-aware item-based partitioning a b k D 1 H 1 D 2 H 2... D n H n Local mining Local mining Local mining F 1 F 2... F n F a: Filter a but not b,...,k F b : Filter b but not c,...,k F F k : Filter k Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

21 Item-based Partitioning Items are ordered by decreasing frequency, e.g., a < b < c < < k Create a partition for each frequent item called pivot item Key idea: partition the output space a }{{} F a }{{} F b < b < c < < k }{{} F c } {{ } F k D H Hierarchy-aware item-based partitioning a b k D 1 H 1 D 2 H 2... D n H n Local mining Local mining Local mining F 1 F 2... F n F a: Filter a but not b,...,k F b : Filter b but not c,...,k F F k : Filter k Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

22 Item-based Partitioning Items are ordered by decreasing frequency, e.g., a < b < c < < k Create a partition for each frequent item called pivot item Key idea: partition the output space a }{{} F a }{{} F b < b < c < < k }{{} F c } {{ } F k Rewrite D for each pivot item Reduces communication Reduces computation Reduces skew D H Hierarchy-aware item-based partitioning a b k D 1 H 1 D 2 H 2... D n H n Local mining Local mining Local mining F 1 F 2... F n F a: Filter a but not b,...,k F b : Filter b but not c,...,k F F k : Filter k Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

23 Item-based Partitioning Example (σ = 2, γ = 3, λ = 4) S 1 : Anna lives in Melbourne S 2 : Bob lives in the city of Berlin S 3 : Charlie likes London PERSON CITY Anna Bob Charlie Melbourne Berlin London Semantic hierarchy Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

24 Item-based Partitioning Example (σ = 2, γ = 3, λ = 4) S 1 : Anna lives in Melbourne S 2 : Bob lives in the city of Berlin S 3 : Charlie likes London PERSON CITY Anna Bob Charlie Melbourne Berlin London Semantic hierarchy PERSON < CITY < in < lives Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

25 Item-based Partitioning Example (σ = 2, γ = 3, λ = 4) S 1 : Anna lives in Melbourne S 2 : Bob lives in the city of Berlin S 3 : Charlie likes London PERSON : 3 PERSON PERSON CITY Anna Bob Charlie Melbourne Berlin London Semantic hierarchy PERSON < CITY < in < lives Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

26 Item-based Partitioning Example (σ = 2, γ = 3, λ = 4) S 1 : Anna lives in Melbourne S 2 : Bob lives in the city of Berlin S 3 : Charlie likes London PERSON CITY PERSON : 3 PERSON PERSON _ 2 CITY : 1 PERSON _ CITY : 1 CITY Anna Bob Charlie Melbourne Berlin London Semantic hierarchy PERSON < CITY < in < lives Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

27 Item-based Partitioning Example (σ = 2, γ = 3, λ = 4) S 1 : Anna lives in Melbourne S 2 : Bob lives in the city of Berlin S 3 : Charlie likes London PERSON CITY PERSON : 3 PERSON PERSON _ 2 CITY : 1 PERSON _ CITY : 1 CITY Anna Bob Charlie Melbourne Berlin Semantic hierarchy London PERSON _ in CITY : 1 PERSON _ in _ 3 CITY : 1 in PERSON < CITY < in < lives Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

28 Item-based Partitioning Example (σ = 2, γ = 3, λ = 4) S 1 : Anna lives in Melbourne S 2 : Bob lives in the city of Berlin S 3 : Charlie likes London PERSON CITY PERSON : 3 PERSON PERSON _ 2 CITY : 1 PERSON _ CITY : 1 CITY Anna Bob Charlie Melbourne Berlin Semantic hierarchy London PERSON _ in CITY : 1 PERSON _ in _ 3 CITY : 1 in PERSON < CITY < in < lives PERSON lives in CITY : 1 PERSON lives in _ 3 CITY : 1 lives Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

29 Outline 1 Introduction 2 Partitioning 3 Local Mining 4 Evaluation 5 Conclusion Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

30 Local Mining Goal: Compute pivot sequences a }{{} F a }{{} F b < b < c < < k }{{} F c } {{ } F k D H Hierarchy-aware item-based partitioning a b k D 1 H 1 D 2 H 2... D n H n Local mining Local mining Local mining F 1 F 2... F n F a: Filter a but not b,...,k F b : Filter b but not c,...,k F F k : Filter k Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

31 Local Mining Traditional approach Use any mining algorithm (based on depth-first or breadth-first search) Filter out non-pivot sequences Example: depth-first search Pivot item: e a b c d e aa ab ac ae bd ba be cd ce da db dc ea eb ec ed ee abd abe acd ace aee aea aeb aec aed dab dac dae ebd aecd daec Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

32 Local Mining Pivot sequence miner (PSM) Mines only pivot sequences Start with the pivot item Right expansions Left expansions Optimized search space exploration Example: PSM search space Pivot item: e e be ce ae ee ea ec eb ed bae dae aeb ebd Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

33 Outline 1 Introduction 2 Partitioning 3 Local Mining 4 Evaluation 5 Conclusion Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

34 Overall Runtime The New York Times Corpus 50M sequences, 1B items of which 2.7M distinct Syntactic hierarchy (word lowercase lemma POS tag) 10 node hadoop cluster Total time (in seconds) Naive Semi naive LASH P(1000,0,3) P(100,0,3) P(100,0,5) CLP(100,0,5) NYT Hierarchy (σ,γ,λ) > 12 hrs LASH is multiple orders of magnitude faster Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

35 Local Mining Mining time (in seconds) BFS DFS PSM PSM + Index LP(1000,0,5) LP(100,0,5) CLP(100,0,5) CLP(100,0,7) NYT Hierarchy (σ,γ,λ) Insufficient memory PSM is effective, more than 3 faster Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

36 Scalability Total time (seconds) Map Shuffle Reduce Total time (seconds) Map Shuffle Reduce (25%) 4(50%) 8(100%) Number of machines Number of machines (% of data) (a) Strong Scalability (b) Weak Scalability Good strong and weak scalability Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

37 Outline 1 Introduction 2 Partitioning 3 Local Mining 4 Evaluation 5 Conclusion Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

38 Summary and Contributions Sequence mining with hierarchies is an important problem Enables mining non-trivial patterns Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

39 Summary and Contributions Sequence mining with hierarchies is an important problem Enables mining non-trivial patterns LASH: LArge-scale Sequence mining with Hierarchies Novel hierarchy-aware form of item-based partitioning Efficient special-purpose algorithm for mining each partition Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

40 Summary and Contributions Sequence mining with hierarchies is an important problem Enables mining non-trivial patterns LASH: LArge-scale Sequence mining with Hierarchies Novel hierarchy-aware form of item-based partitioning Efficient special-purpose algorithm for mining each partition First distributed, scalable algorithm to mine such sequences Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

41 Summary and Contributions Sequence mining with hierarchies is an important problem Enables mining non-trivial patterns LASH: LArge-scale Sequence mining with Hierarchies Novel hierarchy-aware form of item-based partitioning Efficient special-purpose algorithm for mining each partition First distributed, scalable algorithm to mine such sequences Thank you! Questions? / Comments Kaustubh Beedkar and Rainer Gemulla LASH SIGMOD 2015 June 02,

Mind the Gap: Large-Scale Frequent Sequence Mining

Mind the Gap: Large-Scale Frequent Sequence Mining Mind the Gap: Large-Scale Frequent Sequence Mining Iris Miliaraki Klaus Berberich Rainer Gemulla Spyros Zoupanos Max Planck Institute for Informatics Saarbrücken, Germany SIGMOD 2013 27 th June 2013, New

More information

Distributed frequent sequence mining with declarative subsequence constraints. Alexander Renz-Wieland April 26, 2017

Distributed frequent sequence mining with declarative subsequence constraints. Alexander Renz-Wieland April 26, 2017 Distributed frequent sequence mining with declarative subsequence constraints Alexander Renz-Wieland April 26, 2017 Sequence: succession of items Words in text Products bought by a customer Nucleotides

More information

LASH: Large-Scale Sequence Mining with Hierarchies

LASH: Large-Scale Sequence Mining with Hierarchies LASH: Large-Scale Sequence Mining with Hierarchies Kaustubh Beedkar Data and Web Science Group University of Mannheim Germany kbeedkar@uni-mannheim.de Rainer Gemulla Data and Web Science Group University

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information

Distributed frequent sequence mining with declarative subsequence constraints

Distributed frequent sequence mining with declarative subsequence constraints Distributed frequent sequence mining with declarative subsequence constraints Master s thesis presented by Florian Alexander Renz-Wieland submitted to the Data and Web Science Group University of Mannheim

More information

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router

More information

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next

More information

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1 Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is

More information

4. Specifications and Additional Information

4. Specifications and Additional Information 4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control

More information

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1 Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,

More information

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010 ECHO Process Instrumentation, Inc. Modbus RS485 Module Operating Instructions Version 1.0 June 2010 ECHO Process Instrumentation, Inc. PO Box 800 Shalimar, FL 32579 PH: 850-609-1300 FX: 850-651-4777 EM:

More information

Chapter 4: Mining Frequent Patterns, Associations and Correlations

Chapter 4: Mining Frequent Patterns, Associations and Correlations Chapter 4: Mining Frequent Patterns, Associations and Correlations 4.1 Basic Concepts 4.2 Frequent Itemset Mining Methods 4.3 Which Patterns Are Interesting? Pattern Evaluation Methods 4.4 Summary Frequent

More information

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

CS145: INTRODUCTION TO DATA MINING

CS145: INTRODUCTION TO DATA MINING CS145: INTRODUCTION TO DATA MINING Sequence Data: Sequential Pattern Mining Instructor: Yizhou Sun yzsun@cs.ucla.edu November 27, 2017 Methods to Learn Vector Data Set Data Sequence Data Text Data Classification

More information

2-Type Series Pressurized Closures

2-Type Series Pressurized Closures 2-Type Series Pressurized Closures A complete pressure tight reenterable closure system for enclosing spliced connections of communications cables in a wide variety of applications. The 2-type Closure

More information

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines Sample Problem 1 Assume the following memory setup: Virtual addresses are 20 bits wide Physical addresses are 15 bits wide The page size if 1KB (2 10 bytes) The TLB is 2-way set associative, with 8 total

More information

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date

More information

Gateway Ascii Command Protocol

Gateway Ascii Command Protocol Gateway Ascii Command Protocol Table Of Contents Introduction....2 Ascii Commands.....3 Messages Received From The Gateway....3 Button Down Message.....3 Button Up Message....3 Button Maintain Message....4

More information

Transactions in Euclidean Geometry

Transactions in Euclidean Geometry Transactions in Euclidean Geometry Volume 207F Issue # 8 Table of Contents Title Author Regular Triangles Cameron Hertzler Regular Pentagon Cameron Hertzler Hemispheres and Right Angles Cameron Hertzler

More information

RS 232 PINOUTS. 1. We use RJ12 for all of our RS232 interfaces (Link-2-Modbus & Link-2-PC- Serial/RS232). The diagram below shows our pin out.

RS 232 PINOUTS. 1. We use RJ12 for all of our RS232 interfaces (Link-2-Modbus & Link-2-PC- Serial/RS232). The diagram below shows our pin out. RS 232 PINOUTS 1. We use RJ12 for all of our RS232 interfaces (Link-2-Modbus & Link-2-PC- Serial/RS232). The diagram below shows our pin out. 2. A DB9 Female to RJ12 Female Serial/Terminal Modular Adaptor

More information

CHAPTER 8. ITEMSET MINING 226

CHAPTER 8. ITEMSET MINING 226 CHAPTER 8. ITEMSET MINING 226 Chapter 8 Itemset Mining In many applications one is interested in how often two or more objectsofinterest co-occur. For example, consider a popular web site, which logs all

More information

First Data EMV Test Card Set. Version 1.30

First Data EMV Test Card Set. Version 1.30 First Data EMV Test Card Set.30 January, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

ZN-DN312XE-M Quick User Guide

ZN-DN312XE-M Quick User Guide ZN-DN312XE-M Quick User Guide This manual provides instructions for quick installation and basic configuration of your IP device. Step1. Connect cables to IP device Connect required cables to the device

More information

First Data EMV Test Card Set. Version 2.00

First Data EMV Test Card Set. Version 2.00 First Data EMV Test Card Set.00 February, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

Chapter 7: Frequent Itemsets and Association Rules

Chapter 7: Frequent Itemsets and Association Rules Chapter 7: Frequent Itemsets and Association Rules Information Retrieval & Data Mining Universität des Saarlandes, Saarbrücken Winter Semester 2013/14 VII.1&2 1 Motivational Example Assume you run an on-line

More information

Chapter 6: Basic Concepts: Association Rules. Basic Concepts: Frequent Patterns. (absolute) support, or, support. (relative) support, s, is the

Chapter 6: Basic Concepts: Association Rules. Basic Concepts: Frequent Patterns. (absolute) support, or, support. (relative) support, s, is the Chapter 6: What Is Frequent ent Pattern Analysis? Frequent pattern: a pattern (a set of items, subsequences, substructures, etc) that occurs frequently in a data set frequent itemsets and association rule

More information

Market baskets Frequent itemsets FP growth. Data mining. Frequent itemset Association&decision rule mining. University of Szeged.

Market baskets Frequent itemsets FP growth. Data mining. Frequent itemset Association&decision rule mining. University of Szeged. Frequent itemset Association&decision rule mining University of Szeged What frequent itemsets could be used for? Features/observations frequently co-occurring in some database can gain us useful insights

More information

Hartmann HONORS Geometry Chapter 3 Formative Assessment * Required

Hartmann HONORS Geometry Chapter 3 Formative Assessment * Required Hartmann HONORS Geometry Chapter 3 Formative Assessment * Required 1. First Name * 2. Last Name * Vocabulary Match the definition to the vocabulary word. 3. Non coplanar lines that do not intersect. *

More information

Effectiveness of Freq Pat Mining

Effectiveness of Freq Pat Mining Effectiveness of Freq Pat Mining Too many patterns! A pattern a 1 a 2 a n contains 2 n -1 subpatterns Understanding many patterns is difficult or even impossible for human users Non-focused mining A manager

More information

DBK24. Isolated Digital Output Chassis. Overview

DBK24. Isolated Digital Output Chassis. Overview DBK24 Isolated Digital Output Chassis Overview 1 Power Requirements 2 Hardware Setup 2 Card Connection 2 Card Configuration 3 DaqBook and DaqBoard Connection 4 DaqBoard/2000 Series Board Connection 5 DaqBook

More information

Chapter 13, Sequence Data Mining

Chapter 13, Sequence Data Mining CSI 4352, Introduction to Data Mining Chapter 13, Sequence Data Mining Young-Rae Cho Associate Professor Department of Computer Science Baylor University Topics Single Sequence Mining Frequent sequence

More information

Hash Constant C Determinants leading to collisionfree

Hash Constant C Determinants leading to collisionfree Hash Constant C Determinants leading to collisionfree (Ernst Erich Schnoor) eschnoor@multi-matrix.de Addendum to article: Core of the CypherMatrix Method http://www.telecypher.net/corecyph.htm#z6 Object

More information

VM7000A PAPERLESS RECORDER COMMUNICATION FUNCTION OPERATION MANUAL

VM7000A PAPERLESS RECORDER COMMUNICATION FUNCTION OPERATION MANUAL VM7000A PAPERLESS RECORDER COMMUNICATION FUNCTION OPERATION MANUAL WXPVM70mnA0002E October, 2009(Rev.1) All Rights Reserved, Copyright 2009, Ohkura Electric Co.,Ltd. To use this equipment safely Thank

More information

Frequent Pattern Mining

Frequent Pattern Mining Frequent Pattern Mining...3 Frequent Pattern Mining Frequent Patterns The Apriori Algorithm The FP-growth Algorithm Sequential Pattern Mining Summary 44 / 193 Netflix Prize Frequent Pattern Mining Frequent

More information

July Registration of a Cyrillic Character Set. Status of this Memo

July Registration of a Cyrillic Character Set. Status of this Memo Network Working Group Request for Comments: 1489 A. Chernov RELCOM Development Team July 1993 Status of this Memo Registration of a Cyrillic Character Set This memo provides information for the Internet

More information

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity. FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts

More information

Apriori Algorithm. 1 Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke

Apriori Algorithm. 1 Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke Apriori Algorithm For a given set of transactions, the main aim of Association Rule Mining is to find rules that will predict the occurrence of an item based on the occurrences of the other items in the

More information

Mining Association Rules in Large Databases

Mining Association Rules in Large Databases Mining Association Rules in Large Databases Association rules Given a set of transactions D, find rules that will predict the occurrence of an item (or a set of items) based on the occurrences of other

More information

Mining Frequent Patterns without Candidate Generation

Mining Frequent Patterns without Candidate Generation Mining Frequent Patterns without Candidate Generation Outline of the Presentation Outline Frequent Pattern Mining: Problem statement and an example Review of Apriori like Approaches FP Growth: Overview

More information

C1098 JPEG Module User Manual

C1098 JPEG Module User Manual C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command

More information

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel (a) Introduction - recall symmetric key cipher: III. BLOCK CIPHERS k Symmetric Key Cryptography k x e k y yʹ d k xʹ insecure channel Symmetric Key Ciphers same key used for encryption and decryption two

More information

Unit 5 Triangle Congruence

Unit 5 Triangle Congruence Unit 5 Triangle Congruence Day Classwork Homework Wednesday 10/25 Unit 4 Test D1 - Proving SAS through Rigid Motions Watch Video Thursday 10/26 Friday 10/27 Monday 10/30 Proving SAS through Rigid Motions

More information

Fundamentals of Cryptography

Fundamentals of Cryptography Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network

More information

Stream Ciphers and Block Ciphers

Stream Ciphers and Block Ciphers Stream Ciphers and Block Ciphers Ruben Niederhagen September 18th, 2013 Introduction 2/22 Recall from last lecture: Public-key crypto: Pair of keys: public key for encryption, private key for decryption.

More information

First Data Dual Interface EMV Test Card Set. Version 1.20

First Data Dual Interface EMV Test Card Set. Version 1.20 First Data Dual Interface EMV Test Card Set August, 2016 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available

More information

Triple DES and AES 192/256 Implementation Notes

Triple DES and AES 192/256 Implementation Notes Triple DES and AES 192/256 Implementation Notes Sample Password-to-Key and KeyChange results of Triple DES and AES 192/256 implementation For InterWorking Labs customers who require detailed information

More information

Building Roads. Page 2. I = {;, a, b, c, d, e, ab, ac, ad, ae, bc, bd, be, cd, ce, de, abd, abe, acd, ace, bcd, bce, bde}

Building Roads. Page 2. I = {;, a, b, c, d, e, ab, ac, ad, ae, bc, bd, be, cd, ce, de, abd, abe, acd, ace, bcd, bce, bde} Page Building Roads Page 2 2 3 4 I = {;, a, b, c, d, e, ab, ac, ad, ae, bc, bd, be, cd, ce, de, abd, abe, acd, ace, bcd, bce, bde} Building Roads Page 3 2 a d 3 c b e I = {;, a, b, c, d, e, ab, ac, ad,

More information

CSCI 454/554 Computer and Network Security. Topic 3.1 Secret Key Cryptography Algorithms

CSCI 454/554 Computer and Network Security. Topic 3.1 Secret Key Cryptography Algorithms CSCI 454/554 Computer and Network Security Topic 3.1 Secret Key Cryptography Algorithms Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms? Security by

More information

Digital Lighting Systems, Inc.

Digital Lighting Systems, Inc. Digital Lighting Systems, Inc. Four Channel Dry Contacts Relays Switch Pack DMX512 compatible USER'S MANUAL -UM User's Manual - Page 1 GENERAL DESCRIPTION The is a 4-channel DMX-512 compatible electro-mechanical

More information

Day 6: Triangle Congruence, Correspondence and Styles of Proof HOMEWORK

Day 6: Triangle Congruence, Correspondence and Styles of Proof HOMEWORK Day 6: Triangle Congruence, Correspondence and Styles of Proof HOMEWORK 1. If AB DE and ABC DEF as shown in the diagram, what additional information would make the triangles congruent using only SAS SAS

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 3.1 Secret Key Cryptography Algorithms Instructor: Dr. Kun Sun Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms?

More information

Acquirer JCB EMV Test Card Set

Acquirer JCB EMV Test Card Set Acquirer JCB EMV Test Card Set July, 2017 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available

More information

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN SPAREPARTSCATALOG: CONNECTORS ART.-NR.: 3CM3208201EN CONTENT SPARE CONNECTORS AA-AN SPARE CONNECTORS AO-BC SPARE CONNECTORS BD-BQ SPARE CONNECTORS BR-CD 3 4 5 6 SPARE CONNECTORS CE-CR SPARE CONNECTORS

More information

Enhanced Play Fair Cipher

Enhanced Play Fair Cipher P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and

More information

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

SPARE CONNECTORS KTM 2014

SPARE CONNECTORS KTM 2014 SPAREPARTSCATALOG: // ENGINE ART.-NR.: 3208201EN CONTENT CONNECTORS FOR WIRING HARNESS AA-AN CONNECTORS FOR WIRING HARNESS AO-BC CONNECTORS FOR WIRING HARNESS BD-BQ CONNECTORS FOR WIRING HARNESS BR-CD

More information

PFPM: Discovering Periodic Frequent Patterns with Novel Periodicity Measures

PFPM: Discovering Periodic Frequent Patterns with Novel Periodicity Measures PFPM: Discovering Periodic Frequent Patterns with Novel Periodicity Measures 1 Introduction Frequent itemset mining is a popular data mining task. It consists of discovering sets of items (itemsets) frequently

More information

Data Warehousing and Data Mining

Data Warehousing and Data Mining Data Warehousing and Data Mining Lecture 3 Efficient Cube Computation CITS3401 CITS5504 Wei Liu School of Computer Science and Software Engineering Faculty of Engineering, Computing and Mathematics Acknowledgement:

More information

CS 6093 Lecture 7 Spring 2011 Basic Data Mining. Cong Yu 03/21/2011

CS 6093 Lecture 7 Spring 2011 Basic Data Mining. Cong Yu 03/21/2011 CS 6093 Lecture 7 Spring 2011 Basic Data Mining Cong Yu 03/21/2011 Announcements No regular office hour next Monday (March 28 th ) Office hour next week will be on Tuesday through Thursday by appointment

More information

Digital Lighting Systems, Inc. CD400-DMX DMX512 Four Channel Dimmer and Switch module

Digital Lighting Systems, Inc. CD400-DMX DMX512 Four Channel Dimmer and Switch module , Inc. DMX512 Four Channel Dimmer and Switch module Input: 5 Amps @ 6-24 VDC Outputs: 5 Amps Maximum each, total 4 outputs 8 Amps Maximum. FRONT BACK USER'S MANUAL -UM User's Manual - Page 1 GENERAL DESCRIPTION

More information

Computing n-gram Statistics in MapReduce

Computing n-gram Statistics in MapReduce Computing n-gram Statistics in MapReduce Klaus Berberich (kberberi@mpi-inf.mpg.de) Srikanta Bedathur (bedathur@iiitd.ac.in) n-gram Statistics Statistics about variable-length word sequences (e.g., lord

More information

6. Specifications & Additional Information

6. Specifications & Additional Information 6. Specifications & Additional Information SIIGX52004-3.1 Transceier Blocks Table 6 1 shows the transceier blocks for Stratix II GX and Stratix GX deices and compares their features. Table 6 1. Stratix

More information

ETSI TS V ( )

ETSI TS V ( ) TS 135 233 V12.1.0 (2014-10) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication

More information

Performance and Scalability: Apriori Implementa6on

Performance and Scalability: Apriori Implementa6on Performance and Scalability: Apriori Implementa6on Apriori R. Agrawal and R. Srikant. Fast algorithms for mining associa6on rules. VLDB, 487 499, 1994 Reducing Number of Comparisons Candidate coun6ng:

More information

22ND CENTURY_J1.xls Government Site Hourly Rate

22ND CENTURY_J1.xls Government Site Hourly Rate Escalation rate 000 AA0 Administrative Assistant Level I 000 AA0 Administrative Assistant Level II 000 AB0 Application Engineer Level I 000 AB0 Application Engineer Level II 000 AC0 Application Programmer

More information

BBS654 Data Mining. Pinar Duygulu. Slides are adapted from Nazli Ikizler

BBS654 Data Mining. Pinar Duygulu. Slides are adapted from Nazli Ikizler BBS654 Data Mining Pinar Duygulu Slides are adapted from Nazli Ikizler 1 Sequence Data Sequence Database: Timeline 10 15 20 25 30 35 Object Timestamp Events A 10 2, 3, 5 A 20 6, 1 A 23 1 B 11 4, 5, 6 B

More information

Unsupervised learning: Data Mining. Associa6on rules and frequent itemsets mining

Unsupervised learning: Data Mining. Associa6on rules and frequent itemsets mining Unsupervised learning: Data Mining Associa6on rules and frequent itemsets mining Data Mining concepts Is the computa6onal process of discovering pa

More information

6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( )

6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( ) 6. Combinational Circuits George Boole (85 864) Claude Shannon (96 2) Signals and Wires Digital signals Binary (or logical ) values: or, on or off, high or low voltage Wires. Propagate digital signals

More information

EDR Report Information

EDR Report Information EDR Report File Information Value VIN 5YJXCDE20HF041782 Retrieval Date 2017/06/30 02:16:00 (UTC) Retrieval User Comments Retrieval Program Information EDR Report Information Tesla EDR Reporting Service

More information

Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design:

Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 64

More information

Maharashtra Board Class IX Mathematics (Geometry) Sample Paper 1 Solution

Maharashtra Board Class IX Mathematics (Geometry) Sample Paper 1 Solution Maharashtra Board Class IX Mathematics (Geometry) Sample Paper 1 Solution Time: hours Total Marks: 40 Note: (1) All questions are compulsory. () Use of a calculator is not allowed. 1. i. In the two triangles

More information

Frequent Pattern Mining. Based on: Introduction to Data Mining by Tan, Steinbach, Kumar

Frequent Pattern Mining. Based on: Introduction to Data Mining by Tan, Steinbach, Kumar Frequent Pattern Mining Based on: Introduction to Data Mining by Tan, Steinbach, Kumar Item sets A New Type of Data Some notation: All possible items: Database: T is a bag of transactions Transaction transaction

More information

ANU MLSS 2010: Data Mining. Part 2: Association rule mining

ANU MLSS 2010: Data Mining. Part 2: Association rule mining ANU MLSS 2010: Data Mining Part 2: Association rule mining Lecture outline What is association mining? Market basket analysis and association rule examples Basic concepts and formalism Basic rule measurements

More information

CS570 Introduction to Data Mining

CS570 Introduction to Data Mining CS570 Introduction to Data Mining Frequent Pattern Mining and Association Analysis Cengiz Gunay Partial slide credits: Li Xiong, Jiawei Han and Micheline Kamber George Kollios 1 Mining Frequent Patterns,

More information

VM7000A PAPERLESS RECORDER COMMUNICATION FUNCTION OPERATION MANUAL

VM7000A PAPERLESS RECORDER COMMUNICATION FUNCTION OPERATION MANUAL VM7000A PAPERLESS RECORDER COMMUNICATION FUNCTION OPERATION MANUAL WXPVM70mnA0002E March, 2014(Rev.5) Copyright 2009-2014, Ohkura Electric Co.,Ltd. All Rights Reserved. To use this equipment safely Thank

More information

UNH-IOL MIPI Alliance Test Program

UNH-IOL MIPI Alliance Test Program DSI Receiver Protocol Conformance Test Report UNH-IOL 121 Technology Drive, Suite 2 Durham, NH 03824 +1-603-862-0090 mipilab@iol.unh.edu +1-603-862-0701 Engineer Name engineer@company.com Panel Company

More information

PowerPrism16 Light Controllers Instruction Guide

PowerPrism16 Light Controllers Instruction Guide Part No. ELD16 (light controller in enclosure) and Part No. BLD16 (light controller only) PowerPrism16 Light Controllers Instruction Guide Animated Lighting, L.C. 7304 West 130th Street, Suite 100 Overland

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Spring 2013 " An second class in data mining http://www.it.uu.se/edu/course/homepage/infoutv2/vt13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Primavera Portfolio Management Configuring Web Portlets for Microsoft Project Server 2007 Copyright 1999-2014, Oracle and/or its affiliates. The Programs (which include both the software and documentation)

More information

Chapter 4: Association analysis:

Chapter 4: Association analysis: Chapter 4: Association analysis: 4.1 Introduction: Many business enterprises accumulate large quantities of data from their day-to-day operations, huge amounts of customer purchase data are collected daily

More information

Last name... You must show full analytical work to receive full credit, even on the multiple choice problems.

Last name... You must show full analytical work to receive full credit, even on the multiple choice problems. 2985F580-997C-41F9-BB84-A93984C5FD64 #1 1 of 24 Math 233, Final Exam, Spring 2018 May 3rd, 2018 Last name............................... First name.............................. UNC E-MAIL (ONYEN)................

More information

First Data DCC Test Card Set. Version 1.30

First Data DCC Test Card Set. Version 1.30 First Data DCC Test Card Set.30 April, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

2 a. 3 (60 cm) cm cm 4

2 a. 3 (60 cm) cm cm 4 Class IX - NCERT Maths Exercise (1.1) Question 1: A traffic signal board, indicating SCHOOL AHEAD, is an equilateral triangle with side a. Find the area of the signal board, using Heron s formula. If its

More information

6.1 Font Types. Font Types

6.1 Font Types. Font Types 6 Font This chapter explains basic features of GP-Pro EX's "Font" and basic ways of placing text with each font. Please start by reading "6.1 Font Types" (page 6-2) and then turn to the corresponding page.

More information

Medium Term Plan Year 4

Medium Term Plan Year 4 Wk Unit Strands Objectives 1 Block B2.c: Classify and sketch 2D shapes according to the concept of symmetry Rehearse the concept of line symmetry Classify polygons according to their lines of symmetry

More information

Association Rules. A. Bellaachia Page: 1

Association Rules. A. Bellaachia Page: 1 Association Rules 1. Objectives... 2 2. Definitions... 2 3. Type of Association Rules... 7 4. Frequent Itemset generation... 9 5. Apriori Algorithm: Mining Single-Dimension Boolean AR 13 5.1. Join Step:...

More information

Lecture 10 Sequential Pattern Mining

Lecture 10 Sequential Pattern Mining Lecture 10 Sequential Pattern Mining Zhou Shuigeng June 3, 2007 Outline Sequence data Sequential patterns Basic algorithm for sequential pattern mining Advanced algorithms for sequential pattern mining

More information

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3

More information

Acquirer JCB Dual Interface EMV Test Card Set

Acquirer JCB Dual Interface EMV Test Card Set Acquirer JCB Dual Interface EMV Test Card Set.00 July, 2018 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing and delivering this document

More information

14 Graph Theory. Exercise Set 14-1

14 Graph Theory. Exercise Set 14-1 14 Graph Theory Exercise Set 14-1 1. A graph in this chapter consists of vertices and edges. In previous chapters the term was used as a visual picture of a set of ordered pairs defined by a relation or

More information

For all questions, E. NOTA means none of the above answers is correct. Diagrams are NOT drawn to scale.

For all questions, E. NOTA means none of the above answers is correct. Diagrams are NOT drawn to scale. For all questions, means none of the above answers is correct. Diagrams are NOT drawn to scale.. In the diagram, given m = 57, m = (x+ ), m = (4x 5). Find the degree measure of the smallest angle. 5. The

More information

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter

More information

Communications guide. Line Distance Protection System * F1* GE Digital Energy. Title page

Communications guide. Line Distance Protection System * F1* GE Digital Energy. Title page Title page GE Digital Energy D90 Plus Line Distance Protection System Communications guide D90 Plus firmware revision:.9x GE publication code: 60-9070-F (GEK-3469) GE Digital Energy 650 Markland Street

More information

Interac USA Interoperability EMV Test Card Set

Interac USA Interoperability EMV Test Card Set Interac USA Interoperability EMV Test Card Set.00 April, 2018 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information

More information

Digital Lighting Systems, Inc.

Digital Lighting Systems, Inc. , Inc. PD402-DMX Four Channel Dimmer and Switch Packs 4 x 2.5 Amps @ 6VDC to 24 VDC DMX52 compatible DMX52 4 x 2.5 Amps Dimmer Pack C UL US LISTED Digital Lighting Systems, Inc. USER'S MANUAL User's Manual

More information

Downloaded from

Downloaded from Exercise 12.1 Question 1: A traffic signal board, indicating SCHOOL AHEAD, is an equilateral triangle with side a. Find the area of the signal board, using Heron s formula. If its perimeter is 180 cm,

More information

Digital Lighting Systems, Inc. PD405-DMX. Four Channel Dimmer and Switch Packs. DMX512 compatible. PD405-DMX-24DC DMX512 4 x 5 Amps Dimmer Pack

Digital Lighting Systems, Inc. PD405-DMX. Four Channel Dimmer and Switch Packs. DMX512 compatible. PD405-DMX-24DC DMX512 4 x 5 Amps Dimmer Pack Digital Lighting Systems, Inc. PD405DMX Four Channel Dimmer and Switch Packs DMX52 compatible PD405DMX24DC DMX52 4 x 5 Amps Dimmer Pack C UL US LISTED www.digitallighting.com Digital Lighting Systems,

More information