A Heuristic for Mining Association Rules In Polynomial Time*

Size: px
Start display at page:

Download "A Heuristic for Mining Association Rules In Polynomial Time*"

Transcription

1 Complete reference nformaton: Ylmaz, E., E. Trantaphyllou, J. Chen, and T.W. Lao, (3), A Heurstc for Mnng Assocaton Rules In Polynomal Tme, Computer and Mathematcal Modellng, No. 37, pp A Heurstc for Mnng Assocaton Rules In Polynomal Tme* E. YILMAZ General Electrc Card Servces, Inc. A unt of General Electrc Captal Corporaton 6 Summer Street, MS -39C, Stamford, CT, 697, U.S.A. egemen.ylmaz@gecaptal.com E. TRIANTAPHYLLOU Department of Industral and Manufacturng Systems Engneerng Lousana State Unversty, 38 CEBA Buldng, Baton Rouge, LA, 783, U.S.A. Emal: tranta@lsu.edu Web: J. CHEN Department of Computer Scence Lousana State Unversty, 98 Coates Hall, Baton Rouge, LA, 783, U.S.A. T. W. LIAO Department of Industral and Manufacturng Systems Engneerng Lousana State Unversty, 38 CEBA Buldng, Baton Rouge, LA, 783, U.S.A. (Last Revson: Aprl, ) Abstract: Mnng assocaton rules from databases has attracted great nterest because of ts potentally very practcal applcatons. Gven a database, the problem of nterest s how to mne assocaton rules (whch could descrbe patterns of consumers behavors) n an effcent and effectve way. The databases nvolved n today s busness envronment can be very large. Thus, fast and effectve algorthms are needed to mne assocaton rules out of large databases. Prevous approaches may cause an exponental computng resource consumpton. A combnatoral exploson occurs because exstng approaches exhaustvely mne all the rules. The proposed algorthm takes a prevously developed approach, called the Randomzed Algorthm (or RA), and adapts t to mne assocaton rules out of a database n an effcent way. The orgnal RA approach was prmarly developed for nferrng logcal clauses (.e., a Boolean functon) from examples. Numerous computatonal results suggest that the new approach s very promsng. Key words: Data mnng, assocaton rules, algorthm analyss, the One Clause At a Tme (OCAT) approach, randomzed algorthms, heurstcs, Boolean functons. *: Correspondng Author: Dr. Evangelos Trantaphyllou

2 . INTRODUCTION Mnng of assocaton rules from databases has attracted great nterest because of ts potentally very useful applcatons. Assocaton rules are derved from a type of analyss that extracts nformaton from concdence []. Sometmes called market basket analyss, ths methodology allows a data analyst to dscover correlatons, or co-occurrences of transactonal events. In the classc example, consder the tems contaned n a customer s shoppng cart on any one trp to the grocery store. Chances are that the customer s own shoppng patterns tend to be nternally consstent, and that he/she tends to buy certan tems on certan days, for example mlk on Mondays and beer on Frdays. There mght be many examples of pars of tems that are lkely to be purchased together. For nstance, one mght always buy champagne and strawberres together on Saturdays, although one only rarely purchases ether of these tems separately. Ths s the knd of nformaton the store manager could use to make decsons about where to place tems n the store so as to ncrease sales. Ths nformaton can be expressed n the form of assocaton rules. From the example gven above, the manager mght decde to place a specal champagne dsplay near the strawberres n the frut secton on the weekends n the hope of ncreasng sales. Purchase records can be captured by usng the bar codes on the products. The technology to read them has enabled busnesses to effcently collect vast amounts of data, commonly known as market basket data []. Typcally, a purchase record contans the tems bought n a sngle transacton, and a database may contan many such transactons. Analyzng such databases by extractng assocaton rules may offer some unque opportuntes for busnesses to ncrease ther sales, snce such assocaton rules can be used n desgnng effectve marketng strateges. The szes of the databases nvolved can be very large. Thus, fast and effectve algorthms are needed to mne assocaton rules out of them. For a more formal defnton of assocaton rules, some notaton and defntons are ntroduced as follows. Let I = {A, A, A 3,, A n } be the set wth the names of the tems (also called attrbutes, hence the notaton A ) among whch assocaton rules wll be searched [-3]. Ths set s often called the tem doman. Then, a transacton s a set of one or more tems obtaned from the set I. Ths means that for each transacton T, the relaton T I holds. Let D be the set of all transactons. Also, let X be defned as a set of some of the tems n I. The set X s contaned n a transacton T f the relaton X T holds. Usng these defntons, an assocaton rule s a relatonshp of the form X I, Y I, and X Y = X Y, where. The set X s the antecedent part, whle the set Y s the consequent part of the rule. Such an assocaton rule holds wth some confdence level denoted as CL. The confdence level s the condtonal probablty (as t can be nferred from the avalable

3 transactons n the target database) of havng the consequent part Y gven that we already have the antecedent part X. Moreover, an assocaton rule has support S, where S s the number of transactons n D that contan X and Y together. A frequent tem set s a set of tems that occur frequently n the database. That s, ther support s above a predetermned mnmum support level. A canddate tem set s a set of tems, possbly frequent, but not yet checked whether they meet the mnmum support crteron. The assocaton rule analyss n our approach wll be restrcted to those assocaton rules whch have only one tem n the consequent part of the rule. However, a generalzaton can be made easly. Example.: Consder the followng llustratve database: D = Ths database s defned on fve tems, so I = { A, A, A, A A } 3, 5. Each row represents a transacton. For nstance, the second row represents a transacton n whch only tems A 3 and A were bought. The support of the rule A A A5 s equal to 3. Ths s true because the tems A, A, and A 5 occur smultaneously n 3 transactons (.e., the ffth, eghth, and nneth transactons). The confdence level of the rule A A A5 s % because the number of transactons n whch A and A appear together s equal to the number of transactons that A, A, and A 5 appear (both are equal to three), gvng a confdence level of %. Gven the prevous defntons, then the problem of nterest s how to mne assocaton rules out of a database D, that meet some pre-establshed mnmum support and confdence level requrements. Mnng of assocaton rules was frst ntroduced by Agrawal, Imelnsk and Swam n []. Ther algorthm s called AIS (whch stands for Agrawal, Imelnsk, and Swam). Another study used a dfferent approach to solve the problem of mnng assocaton rules [5]. That study presented a new algorthm called SETM (for Set Orented Mnng). The new algorthm was proposed to mne 3

4 assocaton rules by usng relatonal operatons n a relatonal database envronment. Ths was motvated by the desre to use the SQL system to compute frequent tem sets. The next study [] receved a lot more recognton than the prevous ones. Three new algorthms were presented; the Apror, the AprorTd, and the AprorHybrd. The Apror and AprorTd approaches are fundamentally dfferent from the AIS and the SETM algorthms. As the name AprorHybrd suggests, ths approach s a hybrd between the Apror and the AprorTd algorthms. Another major study n the feld of mnng of assocaton rules s descrbed n [6]. These authors presented an algorthm called Partton. Ther approach reduces the search by frst computng all frequent tem sets n two passes over the database. Another major study on assocaton rules takes a samplng approach [7]. These algorthms make only one full pass over the database. The man dea s to select a random sample, and use t to determne representatve assocaton rules that are very lkely to also occur n the whole database. These assocaton rules are n turn valdated n the entre database. Ths paper s organzed as follows. The next secton presents a formal descrpton of the research problem under consderaton. The thrd secton starts wth a bref descrpton of the OCAT (one clause at a tme) approach that played a crtcal role n the development of the new approach. The new approach s descrbed n the second half of the thrd secton. The fourth secton presents an extensve computatonal study that compared the proposed approach for the mnng of assocaton rules wth some exstng ones. Fnally, the paper ends wth a conclusons secton.. PROBLEM DESCRIPTION Prevous work on mnng of assocaton rules focused on extractng all conjunctve rules, provded that these rules meet the crtera set by the user. Such crtera can be the mnmum support and confdence levels. Although prevous algorthms manly consdered databases from the doman of market basket analyss, they have been appled to the felds of telecommuncaton data analyss, census data analyss, and to classfcaton and predctve modelng tasks n general [3]. These applcatons dffer from market basket analyss n the sense that they contan dense data. That s, such data mght possess all or some of the followng propertes: () Have many frequently occurrng tems; () Have strong correlatons between several tems; () Have many tems n each record. When standard assocaton rule mnng technques are used (such as the Apror approach [] and ts varants), they may cause exponental resource consumpton n the worst case. Thus, t may take too much CPU tme for these algorthms to mne the assocaton rules. The combnatoral exploson s a natural result of these algorthms, because they mne exhaustvely all the rules that

5 satsfy the mnmum support constrant as specfed by the analyst. Furthermore, ths characterstc may lead to the generaton of an excessve number of rules. Then, the end user wll have to determne whch rules are worthwhle. Therefore, the hgher the number of the derved assocaton rules s, the more dffcult t s to revew them. In addton, f the target database contans dense data, then the prevous stuaton may become even worse. The sze of the database also plays a vtal role n data mnng algorthms [7]. Large databases are desred for obtanng accurate results, but unfortunately, the effcency of the algorthms depends heavly on the sze of the database. The core of today s algorthms s the Apror algorthm [] and ths algorthm wll be the one to be compared wth n ths paper. Therefore, t s hghly desrable to develop an algorthm that has polynomal complexty and stll beng able of fndng a few rules of good qualty. 3. METHODOLOGY 3. The One Clause At a Tme (OCAT) Approach The proposed approach s based on a heurstc, called the Randomzed Algorthm (or RA) that was developed n [8]. Ths heurstc nfers logcal clauses (Boolean functons) from two mutually exclusve collectons of bnary examples. The man deas of ths heurstc are brefly descrbed next. Let { A A,..., }, A n be a set of n bnary attrbutes. Also, let F be a Boolean functon over these bnary attrbutes. That s, F s a mappng from {, } n {, }. The nput of the RA heurstc s two sets of mutually exhaustve tranng examples. Each example s a vector of sze n defned n the space {, } n. The tranng examples somehow have been classfed as ether postve or negatve. Then, the Boolean functon to be nferred should evaluate to true () when t s fed wth a postve example and to false () when t s fed wth a negatve example. Hopefully, ths functon s an accurate estmaton of the hdden logc that has classfed the tranng examples. Another goal s for the nferred Boolean functon (when t s expressed n conjunctve normal form (CNF) or dsjunctve normal form (DNF)) to have a very small, deally mnmum, number of dsjunctons or conjunctons (also known as terms n the lterature). A Boolean functon s n CNF f t s of the form: a ρ j k j = Smlarly, a Boolean functon s n DNF f t s n the form: k a j = ρ j 5

6 where a s ether a bnary attrbute A or ts negaton, A and the varable ρ j s the set of the ndces of the attrbutes n the th j conjuncton or dsjuncton. As t s shown n [9] any Boolean functon can be transformed nto the CNF or DNF form. Also, n [] a smple transformaton scheme s presented for nferrng CNF functons wth algorthms that ntally nfer DNF functons and vce-versa. In order to help fx deas of how the RA algorthm operates, consder the followng postve and negatve example sets, denoted as E = E and E, respectvely., E Now consder the followng Boolean expresson (n CNF): = ( A A ) ( A A ) ( A A ). 3 3 A It can be easly verfed that ths Boolean expresson correctly classfes the prevous tranng examples. In [-] the authors present a strategy called the One Clause At a Tme (OCAT) approach (see also Fgure ) for nferrng a Boolean functon from two classes of bnary examples. =, C = ; {ntalzatons} DO WHILE E th Step : ; {where ndcates the clause} Step : Fnd a clause c whch accepts all members of E whle t rejects as many members of E as possble; Step 3: Let E ( c ) be the set of members of Step : Let C C c ; Step 5: REPEAT; Let E E - E ( c ); E whch are rejected by c ; Fgure : The One Clause At a Tme (OCAT) Approach, for the CNF Case []. As t s ndcated n Fgure, the OCAT approach attempts to mnmze the number of CNF clauses that wll fnally form the target functon F. A key task n the OCAT approach s Step (n Fgure ). At Step a sngle clause s constructed. In [] a branch-and-bound approach s developed that nfers a clause (for the CNF case) that accepts all the postve examples whle t rejects as many negatve examples as possble. Later, n [8] the RA 6

7 heurstc s proposed that returns a clause that now rejects many (as opposed to as many as possble) negatve examples (and stll accepts all the postve examples). Next, are some defntons that are used n these approaches and are gong to be used n the new approach as well. C s the set of attrbutes n the current clause (a dsjuncton for the CNF case); a k an attrbute such that a k A, where A s the set of the attrbutes A, A,, A n and ther negatons; POS (a k ) the number of all postve examples n E whch would be accepted f attrbute a k were ncluded n the current CNF clause; NEG (a k ) the number of all negatve examples n E whch would be accepted f attrbute a k were ncluded n the current clause; l the sze of the canddate lst; ITRS the number of tmes the clause formng procedure s repeated. The RA algorthm s descrbed next n Fgure. Its tme complexty s of O(D nlogn) order (where D s the number of transactons n the database and n s the number of tems or attrbutes). Ths follows by observng that the nner most loop requres nlogn operatons when a quck sort approach s appled for sortng the POS/NEG values. The nner most loop s repeated n order of O(E ) steps that s the same as order O(D). Smlarly, the outer loop s also of order O(D). Thus, the tme complexty of the RA algorthm s of order O(D nlogn). For llustratve purposes, ths algorthm s appled on the two sets of bnary vectors gven earler n ths secton. When the prevous defntons are used, then the followng can be easly derved: The set of the attrbutes (tems) for these postve and negatve examples s: { A, A, A, A, A, A, A A } A = }. 3 3, Therefore, the POS (a k ) and NEG (a k ) values are: POS ( A )= NEG ( A )= POS ( A )= NEG ( A )= POS ( A )= NEG ( A )= POS ( A )= NEG ( A )= POS ( A 3 )= NEG ( A 3 )=3 POS ( A 3 )=3 NEG ( A 3 )=3 POS ( A )= NEG ( A )= POS ( A )= NEG ( A )= 7

8 DO for ITRS number of teratons BEGIN DO WHILE ( E ) C = ; {ntalzatons} E DO WHILE ( ) Step : Rank n descendng order all attrbutes a A (where a s ether A or A ) accordng to ther POS( a ) value. If NEG( a ) =, then POS( a ) = (.e., an arbtrarly hgh value); Step : Form a canddate lst of the attrbutes whch have the l top hghest POS( a ) values; Step 3: Randomly choose an attrbute ak from the canddate lst; Step : Let the set of atoms n the current clause be C C a ; Step 5: Let E ( ) a k be the set of members of ncluded n the current CNF clause; E E E ; a k Step 6: Let ( ) Step 7: Let A A a } ; { k Step 8: Calculate the new POS( a k ) values for all REPEAT E C be the set of members of Step 9: Let ( ) Step : Let E E E ( C) ; E accepted when a k A ; k a k s E whch are rejected by C ; Step : Reset E to the orgnal value; REPEAT END CHOOSE the fnal Boolean system among the prevous ITRS systems that has the smallest number of clauses. Fgure : The RA Heurstc for the CNF Case [8]. By examnng the prevous defntons, some key observatons can be made at ths pont. When an attrbute of hgh POS functon value s chosen to be ncluded n the CNF clause currently beng formed, then t s very lkely that ths wll cause acceptng some addtonal postve examples. The reverse s true for atoms wth a small NEG functon value n terms of the negatve examples. Therefore, attrbutes that have hgh POS functon values and low NEG functon values are a good choce for ncluson n the current CNF clause. Ths key observaton leads to the followng alternatves for defnng an evaluatve crteron for Step n Fgure for ncludng a new atom n the CNF clause under consderaton: POS/NEG, or POS-NEG, or some type of a weghted verson of these 8

9 two expressons. In [8] t was shown through some emprcal experments that the POS/NEG rato s an effectve evaluatve crteron, snce t s very lkely to lead to Boolean functons wth few clauses. In terms of the prevous llustratve data, the POS/NEG ratos are as follows: POS NEG POS NEG POS NEG POS NEG ( A ) ( A ) = ( A ) ( A ) = ( A3 ) ( A ) = 3 ( A ) ( A ) = POS NEG POS NEG POS NEG POS NEG ( A ) ( A ) = ( A ) ( A ) = ( A3 ) ( A ) = 3 ( A ) ( A ) = Next suppose that l n Step, Fgure, was chosen to be equal to 3. Then, the 3 hghest POS/NEG values for ths case are: {.,.,.}. These values correspond to the attrbutes A, A, and A, respectvely. Let A be the one to be randomly selected out of ths canddate lst. The atom A accepts (please note that the current CNF clause s now nl) the frst and the second examples n the E set. Ths means that more attrbutes are requred n the current CNF clause beng bult for all postve examples to be accepted. Next, suppose (after the POS/NEG ratos have been recalculated) that A was the second attrbute to be ncluded n the clause. Note that A and A together can accept all the postve examples n the Boolean expresson s ready E set. Therefore, the frst CNF clause (.e., ( A A ) ) of the Next one can observe whch negatve examples are not rejected by ths clause: ths clause fals to reject the second, thrd and the sxth examples n the E set. Therefore, the updated E set should contan the second, thrd and the sxth examples from the orgnal E set. Ths process s repeated untl the E set s empty (Fgure ), meanng that all the negatve examples are rejected. By recallng that RA s a randomzed algorthm (t repeats the functon generaton task ITRS tmes) and thus t does not return a determnstc soluton, a Boolean expresson acceptng all the postve examples and rejectng all the negatve examples could be: ( A A ) ( A A ) ( A A ). 3 3 A 9

10 3. Proposed Alteratons to the RA Algorthm For a Boolean expresson to reveal nformaton about assocatons n a database, t s more convenent to be expressed n DNF. The frst step s to select an attrbute about whch assocatons wll be sought. Ths attrbute wll form the consequent part of the desred assocaton rules. By selectng an attrbute, the database can be parttoned nto two mutual sets of records (bnary vectors). Vectors that have value equal to n terms of the selected attrbute, can be seen as the postve examples. A smlar nterpretaton holds true for records that have a value of for that attrbute. These vectors wll be the set of the negatve examples. Gven the above way for parttonng (dchotomzng) a database of transactons, t follows that each conjuncton (logcal clause or term ) of the target functon wll reject all the negatve examples, whle on the other hand, t wll accept some of the postve examples. Of course, when all the conjunctons are consdered together, then they wll accept all the postve examples. In terms of assocaton rules, each clause n the Boolean expresson (whch now s expressed n DNF) can be thought as a set of frequent tem sets. That s, such a clause forms a frequent tem set. Thus, ths clause can be checked further whether t meets the preset mnmum support and confdence level crtera. The requrement of havng Boolean expressons n DNF does not mean that the RA algorthm has to be altered to produce Boolean expressons n DNF. However, t wll have to be altered n order to make t compatble wth mnng of assocaton rules, but ts orgnal CNF producng nature (as descrbed n Fgure ) wll be kept as t s. As t shown n [] f one forms the complements of the postve and negatve sets and then swaps ther roles, then a CNF producng algorthm, wll produce a DNF expresson (and vce-versa). The last alteraton s n the CNF (or DNF) expresson to swap the logcal operators ( ) AND and OR ( ). Another nterestng ssue s to observe that the confdence level of the assocaton rules produced by processng frequent tem sets (.e., clauses of a Boolean expresson n DNF when the OCAT / RA approach s used) wll always be equal to %. Ths happens because each DNF clause rejects all the negatve examples whle t accepts some of the postve examples when a database wth transactons s parttoned as descrbed above. A crtcal change n the RA heurstc s that for dervng assocaton rules, t should only consder the attrbutes themselves and not ther negatons. Ths s not always the case, snce some authors have also proposed to use assocaton rules wth negatons [3]. However, assocaton rules are usually defned on the attrbutes themselves and not on ther negatons. Some changes need also to be made to the selecton process of the sngle attrbute to be ncluded n the clause beng formed (Step n Fgure ). If NEG( a ) = at Step, then the value of

11 the rato POS( a ) for that partcular a s set to be equal to, (.e., an arbtrarly hgh postve number) multpled by the POS( a ) value. However, the number, may stll be small and thus t should be changed accordng to the sze of the database. There are four cases regardng the value of the POS/NEG rato that need to be consdered when selectng an attrbute. These cases are: Case #: Multple attrbutes (tems) wth NEG( a ) = and equal values of the POS( a ) rato. Case #: No attrbutes (tems) wth value NEG( a ) = exst, but when all the attrbutes are ranked accordng to ther POS( a ) values n descendng order, then the hghest POS( a ) value occurs multple tmes. Case #3: A sngle attrbute wth NEG( a ) = exsts. Case #: There are no attrbutes wth NEG( a ) =, but when all the attrbutes are ranked accordng to ther POS( a ) values n descendng order, then the hghest POS( a ) value occurs only once. For cases # and #, the attrbute to be ncluded n the clause beng formed s randomly selected among the canddates. The canddates for case # are those attrbutes wth NEG( a ) = and equal values of POS( a ). The canddates for case #, on the other hand, are those attrbutes that share the same POS( a ) value (and ths s the hghest value). For cases #3 and # there s no need for a random selecton process, snce there s a sngle attrbute wth the hghest POS( a ) value. Thus, that partcular attrbute s ncluded n the clause beng formed. Furthermore, f one consders only the attrbutes themselves and excludes ther negatons, ths requrement may cause certan problems due to certan degeneratve stuatons that could occur. These degeneratve stuatons occur as follows: Degeneratve Case #: If only one tem s bought n a transacton, and f that partcular tem s selected to be the consequent part of the assocaton rules sought, then the E set wll have an example (.e., the one that corresponds to that transacton) wth only zero elements. Thus, the RA heurstc (or any varant of t) wll never termnate. Hence, for smplcty t wll be assumed that such degeneratve transactons do not occur n our databases. Degeneratve Case #: After formng a clause, and after the E set s updated (Step n Fgure ), the new POS/NEG values may be such that the new clause may be one of those that have been already produced earler (.e., t s possble to have cyclng ). Degeneratve Case #3: A newly generated clause may not be able to reject any of the negatve examples.

12 The prevous s an exhaustve lst of all possble degeneratve stuatons when the orgnal RA algorthm s used. Thus, the orgnal RA algorthm needs to be altered n order to avod them. Degeneratve case # can be easly avoded by smply dscardng all one-tem transactons (whch are very rare to occur n realty any way). Degeneratve cases # and #3 can be avoded by establshng some upper lmts on the number a Boolean functon s generated wthout beng able to reject all the negatve examples (please recall the randomzed characterstc of the RA heurstc). In order to mne assocaton rules that have dfferent consequents, the altered RA should be run for each one of the attrbutes: A, A,, A n. After determnng the frequent tem sets for each one of these attrbutes, one needs to calculate the support level for each frequent tem set, and check whether the (preset) mnmum support crteron s met. If t s, then the current assocaton rule s reported. The proposed altered RA (to be denoted as ARA) heurstc s summarzed n Fgure 3. Fnally, t should be stated here that the new heurstc s also of tme complexty O(D nlogn) as s the case wth the orgnal RA algorthm. Ths follows easly from a computatonal analyss smlar to the one descrbed n the prevous sub-secton for the RA algorthm.

13 DO for each consequent A, A,, BEGIN Form the E and A n E sets accordng to the presence or absence of the current A attrbute. Calculate the ntal POS and NEG values. Let A = { A, A,, A n }. E C = ; {ntalzatons} E Step : Rank n descendng order all attrbutes a A (where a s the attrbute DO WHILE ( ) START: DO WHILE ( ) currently under consderaton) accordng to ther POS( a ) value. If NEG( a ) =, then POS( a ) =, xpos( a ); Step : Evaluate the current POS/NEG case; Step 3: Choose an attrbute a accordngly; k Step : Let the set of atoms n the current clause be C C a } ; Step 5: Let E ( ) a k be the set of members of n the current CNF clause; E E E ; a k Step 6: Let ( ) Step 7: Let A A a } ; { k Step 8: Calculate the new POS( a ) values for all Step 9: If REPEAT Step : Let E ( C) Step : If ( C) = k { k E accepted when a A; k a k s ncluded A = (.e., checkng for falure case #), then go to START; be the set of members of E whch are rejected by C ; E, determne the falure case (.e., case #, or #3). Check whether the correspondng counter has ht the preset lmt. If yes, then go to START; Step : Let E E E ( C) ; Step 3: Calculate the new NEG values; Step : Let C be the antecedent and A be the consequent of the rule. Check the canddate rule C A for mnmum support. If t meets the mnmum support level crteron, then output the rule; Step 5: Reset the E set (.e., select the examples whch have A equal to and store them n set E ); REPEAT END Fgure 3: The Proposed Altered Randomzed Algorthm (ARA) for Mnng Assocaton Rules (for the CNF Case). 3

14 . COMPUTATIONAL EXPERIMENTS In order to compare the altered RA (ARA) heurstc wth some of the exstng assocaton rule methods, we appled them on several synthetc databases that were generated by usng the data generaton programs descrbed n []. The web address (URL) of these codes s: These databases contan transactons that would reflect the real world, where people tend to buy sets of certan tems together. as follows: Several databases were used n makng these comparsons. The szes of the databases used are Database #:, tems wth, transactons (the mn support was set to 5). Database #:, tems wth, transactons (the mn support was set to 5). Database #3: 5 tems wth 5, transactons (the mn support was set to ). Database #: 5 tems wth,5 transactons (the mn support was set to ). Database #5: 5 tems wth, transactons (the mn support was set to ). The frst results are from the densest databases used n [], that s, database #. The Apror algorthm was stll n the process of generatng the frequent tem sets of length after 8 hours mnutes and 8 seconds when database # was used. Therefore, the experment wth the Apror algorthm was aborted. However, the ARA algorthm completed mnng the very same database n only hours mnutes and second. The ARA algorthm mned a sngle rule for each one of the followng support levels: 59, 63, 38,, 535, 63, 6, 756, 78, 98, and,93. All the experments were run on an IBM 967/R53 computer. Ths processor s a -engne box wth each engne beng rated at 6 MIPS (mllons of nstructons per second). For the experments wth database #, however, some parallel computng technques were utlzed for the Apror algorthm. The frequent tem sets were gathered nto smaller groups, makng t possble to buld the next frequent tem sets n shorter tme. As a result, each group was analyzed separately, and the CPU tmes for each one of these jobs were added together at the end. The Apror algorthm completed mnng ths database n 59 hours 5 mnutes and 3 seconds. Fgure llustrates the number of rules for ths case. On the other hand, the ARA algorthm mned database # n only hours 5 mnutes and 57 seconds. These results are depcted n Fgure 5.

15 5, Number of rules mned, 5,, 5, Support Level Fgure : Hstogram of the Results When the Apror Approach Was Used on Database #. Number of rules mned Support Level Fgure 5: Hstogram of Results When the ARA Approach Was Used on Database #. 5

16 It should be noted here that the CPU tmes recorded for the Apror experments for ths research were hgher than the smlar results reported n []. For nstance, t was reported n [] that the Apror algorthm took approxmately 5 seconds to mne database #. That result was obtaned on an IBM RS/6 53H workstaton wth a man memory of 6 MB, and runnng AIX 3.. On the other hand, for database #, the Apror program wrtten for ths research was n the process of generatng tem sets of length after 8 hours mnutes and 8 seconds. The only dfference between the approach taken n [] and the one n ths research s that the canddate tem sets n [] were stored n a hash tree. Hashng s a data storage technque that provdes fast drect access to a specfc stored record on the bass of a gven value for some feld []. In ths research, hash trees were not used n storng canddate tem sets; nstead they were kept n the man memory of the computer. Ths made t faster to access canddate tem sets because drect access s generally very expensve CPU-wse. It s beleved that the programmng technques and the type of the computers used n [] are causng the CPU tme dfference. Addtonally, the Apror code n ths research was run under a tme-sharng opton, whch agan could make a bg dfference. As t was mentoned earler, the computer codes for the Apror and the ARA algorthms were run on an IBM 967/R53 computer. The results obtaned by usng database # suggest that ARA produced a reasonable number of rules fast. Also, these rules were of hgh qualty, snce by constructon, all had a % confdence level. After obtanng these results, t was decded to mne the remanng databases by also usng a commercal software, namely MneSet by Slcon Graphcs. MneSet s one of the most commonly used data mnng computer packages. Unfortunately, MneSet works wth transactons of a fxed length. Therefore, the transactons were coded as zeros and ones, zeros representng that the correspondng tem was not bought, and ones representng that the correspondng tem was bought. However, ths causes Mneset to mne negatve assocaton rules, too. Negatve assocaton rules are rules based on the absence of tems n the transactons, rather than the presence of them and negatons of attrbutes may appear n the rule structure. Another drawback of MneSet s that only a sngle tem s supported n both the left and the rght hand sdes of the rules to be mned. Also, the current verson of MneSet allows for a maxmum of 5 tems n each transacton. The MneSet software used for ths study was nstalled on a Slcon Graphcs workstaton, whch had a CPU clock rate of 5 MHz and a RAM of 5MB. MneSet supports only a sngle tem n both the left and the rght hand sdes of the assocaton rules. Ths suggests that MneSet uses a search procedure of also polynomal tme complexty. Such an approach would have frst to count the support of each tem when t s compared wth every other 6

17 tem, and store these supports n a trangular matrx of dmenson n (.e., equal to the number of attrbutes). Durng the pass over the database, the supports of the ndvdual tems could be counted, and the rest wll only be a matter of checkng whether the result s above the preset mnmum confdence level. For nstance, when checkng the canddate assocaton rule A A 6, the confdence level would be the support of A dvded by the support of A A 6. On the other hand, when dong the same for rule A 6 A, then the confdence level would be the support of A 6 dvded by the support of A A 6. Therefore, such an approach requres n(n-)/ operatons (where n s the number of attrbutes or tems). If D s the number of transactons (records) n the database, then the tme complexty of ths approach s equal to O(Dn ). Ths s almost of the same tme complexty that the ARA approach has (whch recall s of order O(D nlogn)). However, for the ARA case, ths complexty s for the worst-case scenaro. The ARA algorthm wll stop as soon as t has produced a Boolean functon that accepts all the postve and rejects all the negatve examples. In addton, the ARA approach s able to mne rules wth multple tems n the antecedent part of an assocaton rule. The ARA approach can also be easly adapted to mne assocaton rules wth multple tems n the consequent part. The only change that has to be made s n the parttonng (dchotomzaton) of the orgnal database nto the sets of the postve and negatve examples. On the other hand, the Apror approach has an exponental tme complexty because t follows a combnatoral search approach. When database #3 was used, t took MneSet 3 mnutes and seconds to mne the assocaton rules. On the other hand, t took ARA just 6 mnutes and 5 seconds to mne the same database. Fgures 6 and 7 provde the number of the mned rules from database #3. When database # was used, t took MneSet 8 mnutes and 3 seconds to mne assocaton rules. For the ARA approach, the requred tme was 5 mnutes and 6 seconds only. These results are depcted n Fgures 8 and 9. For database #5, t took MneSet 5 mnutes and seconds to mne the rules. On the other hand, t took only mnutes and 3 seconds when the ARA approach was used on the same database. The correspondng results are depcted n Fgures and. Table presents a summary of all the above. From these results t becomes evdent that the ARA approach derves assocaton rules faster and also these rules have much hgher support levels. 7

18 Number of mned rules Support Level Fgure 6: Hstogram of the Results When the MneSet Software Was Used on Database #3. 5 Number of rules mned Support Level Fgure 7: Hstogram of the Results When the ARA Approach Was Used on Database #3. 8

19 Number of rules mned Support Level Fgure 8: Hstogram of the Results When the MneSet Software Was Used on Database #. 3 5 Number of rules mned Support Level Fgure 9: Hstogram of the Results When the ARA Approach Was Used on Database #. 9

20 8 6 Number of rules mned Support Level Fgure : Hstogram of the Results When the MneSet Software Was Used on Database # Number of rules mned Support Level Fgure : Hstogram of the Results When the ARA Approach Was Used on Database #5.

21 Table : Summary of the Requred CPU Tmes Under Each Method. Apror CPU (hh:mm:ss) ARA CPU (hh:mm:ss) MneSet CPU (hh:mm:ss) Database # Not completed :: N/A Database # 59:5:3 :5:57 N/A Database #3 N/A :6:5 :3: Database # N/A :5:6 :8:3 Database #5 N/A ::3 :5: 5. CONCLUSIONS Ths paper presented the developments of a new approach for dervng assocaton rules from databases. The new approach s called ARA and t s based on a prevous algorthm (.e., the RA approach) that was developed by one of the authors and hs assocates n [8]. Both the old and new approach are randomzed algorthms. The proposed ARA approach produces a small set of assocaton rules n polynomal tme. Furthermore, these rules are of hgh qualty wth % support levels. The % support level of the derved rules s a characterstc of the way the ARA approach constructs assocaton rules. The ARA approach can be further extended to handle cases wth less than % support levels. Ths can be done by ntroducng stoppng rules that termnate the approprate loops n Fgure 3. That s, to have a predetermned lower lmt (.e., a percentage less than %) of the postve examples to be accepted by each clause (n the CNF case) and also a predetermned percentage of the negatve examples s rejected nstead of seekng for all the postve examples to be accepted and all the negatve examples to be rejected as s the current case. An extensve emprcal study was also undertaken. The Apror approach and the MneSet software by Slcon Graphcs were compared wth the proposed ARA algorthm. The computatonal results demonstrated that the new approach can be both hghly effcent and effectve. The above observatons strongly suggest that the proposed ARA algorthm s very promsng for mnng assocaton rules n today s world wth the always-ncreasng and dverse databases.

22 REFERENCES. T. Blaxton and C. Westphal, Data Mnng Solutons: Methods and Tools for Solvng Real-World Problems, John Wley & Sons, Inc., 86-89, New York, NY, (998).. R. Agrawal and R. Srkant, Fast algorthms for mnng assocatons rules, Proceedngs of the th VLDB Conference, Santago, Chle, (99). 3. R.J. Bayardo Jr., R. Agrawal and D. Gunopulos, Constrant-based rule mnng n large, dense databases, Proceedngs of the 5 th Internatonal Conference on Data Engneerng, (999).. R. Agrawal, T. Imelnsk and A. Swam, Mnng assocaton rules between sets of tems n large databases, Proceedngs of the 993 ACM SIGMOD Conference, Washngton, DC, May, (993). 5. M. Houtsma and A. Swam, Set orented mnng of assocaton rules, Techncal Report RJ 9567, IBM, October, (993). 6. A. Savasere, E. Omecnsk and S. Navathe, An effcent algorthm for mnng assocaton rules n large databases, Data Mnng Group, Tandem Computers, Inc., Austn, TX, (995). 7. H. Tovonen, Samplng large databases for assocaton rules, Proceedngs of the nd VLDB Conference, Bombay, Inda, (996). 8. A.S. Deshpande and E. Trantaphyllou, A greedy randomzed adaptve search procedure(grasp) for nferrng logcal clauses from examples n polynomal tme and some extensons, Mathematcal and Computer Modellng 7, 75-99, (998). 9. J. Peysakh, A fast algorthm to convert Boolean expressons nto CNF, IBM Computer Scence RC 93(#5797), Watson, NY, (987).. E. Trantaphyllou and A.L. Soyster, A relatonshp between CNF and DNF systems dervable from examples, ORSA Journal on Computng 7, (995).. E. Trantaphyllou, Inference of a mnmum sze Boolean functon from examples by usng a new effcent branch and bound approach, Journal of Global Optmzaton 5, 69-9 (99).. E. Trantaphyllou, A.L. Soyster and S.R.T. Kumara, Generatng logcal expressons from postve and negatve examples va a branch and bound approach, Computers and Operatons Research, (99). 3. A. Savasere, E. Omecnsk and S. Navathe, Mnng for strong assocaton negatve assocatons n a large database of customer transactons, Proceedngs of the IEEE th Internatonal Conference on Data Engneerng, Orlando, FL, (998).. C.J. Date, An Introducton to Database Systems, Addson-Wesley Publshng Company, Readng, MA, (995).

A Heuristic for Mining Association Rules In Polynomial Time

A Heuristic for Mining Association Rules In Polynomial Time A Heurstc for Mnng Assocaton Rules In Polynomal Tme E. YILMAZ General Electrc Card Servces, Inc. A unt of General Electrc Captal Corporaton 6 Summer Street, MS -39C, Stamford, CT, 697, U.S.A. egemen.ylmaz@gecaptal.com

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

TF 2 P-growth: An Efficient Algorithm for Mining Frequent Patterns without any Thresholds

TF 2 P-growth: An Efficient Algorithm for Mining Frequent Patterns without any Thresholds TF 2 P-growth: An Effcent Algorthm for Mnng Frequent Patterns wthout any Thresholds Yu HIRATE, Ego IWAHASHI, and Hayato YAMANA Graduate School of Scence and Engneerng, Waseda Unversty {hrate, ego, yamana}@yama.nfo.waseda.ac.jp

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Steve Setz Wnter 2009 Qucksort Qucksort uses a dvde and conquer strategy, but does not requre the O(N) extra space that MergeSort does. Here s the

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Bran Curless Sprng 2008 Announcements (5/14/08) Homework due at begnnng of class on Frday. Secton tomorrow: Graded homeworks returned More dscusson

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007 Syntheszer 1.0 A Varyng Coeffcent Meta Meta-Analytc nalytc Tool Employng Mcrosoft Excel 007.38.17.5 User s Gude Z. Krzan 009 Table of Contents 1. Introducton and Acknowledgments 3. Operatonal Functons

More information

Determining Fuzzy Sets for Quantitative Attributes in Data Mining Problems

Determining Fuzzy Sets for Quantitative Attributes in Data Mining Problems Determnng Fuzzy Sets for Quanttatve Attrbutes n Data Mnng Problems ATTILA GYENESEI Turku Centre for Computer Scence (TUCS) Unversty of Turku, Department of Computer Scence Lemmnkäsenkatu 4A, FIN-5 Turku

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Today s Outline. Sorting: The Big Picture. Why Sort? Selection Sort: Idea. Insertion Sort: Idea. Sorting Chapter 7 in Weiss.

Today s Outline. Sorting: The Big Picture. Why Sort? Selection Sort: Idea. Insertion Sort: Idea. Sorting Chapter 7 in Weiss. Today s Outlne Sortng Chapter 7 n Wess CSE 26 Data Structures Ruth Anderson Announcements Wrtten Homework #6 due Frday 2/26 at the begnnng of lecture Proect Code due Mon March 1 by 11pm Today s Topcs:

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume

More information

Innovation Typology. Collaborative Authoritativeness. Focused Web Mining. Text and Data Mining In Innovation. Generational Models

Innovation Typology. Collaborative Authoritativeness. Focused Web Mining. Text and Data Mining In Innovation. Generational Models Text and Data Mnng In Innovaton Joseph Engler Innovaton Typology Generatonal Models 1. Lnear or Push (Baroque) 2. Pull (Romantc) 3. Cyclc (Classcal) 4. Strategc (New Age) 5. Collaboratve (Polyphonc) Collaboratve

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Imperialist Competitive Algorithm with Variable Parameters to Determine the Global Minimum of Functions with Several Arguments

Imperialist Competitive Algorithm with Variable Parameters to Determine the Global Minimum of Functions with Several Arguments Fourth Internatonal Conference Modellng and Development of Intellgent Systems October 8 - November, 05 Lucan Blaga Unversty Sbu - Romana Imperalst Compettve Algorthm wth Varable Parameters to Determne

More information

Brave New World Pseudocode Reference

Brave New World Pseudocode Reference Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be

More information

A Combined Approach for Mining Fuzzy Frequent Itemset

A Combined Approach for Mining Fuzzy Frequent Itemset A Combned Approach for Mnng Fuzzy Frequent Itemset R. Prabamaneswar Department of Computer Scence Govndammal Adtanar College for Women Truchendur 628 215 ABSTRACT Frequent Itemset Mnng s an mportant approach

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 48 CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 3.1 INTRODUCTION The raw mcroarray data s bascally an mage wth dfferent colors ndcatng hybrdzaton (Xue

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Facet Generation Procedure. for solving 0/1 integer programs

A Facet Generation Procedure. for solving 0/1 integer programs A Facet Generaton Procedure for solvng 0/ nteger programs by Gyana R. Parja IBM Corporaton, Poughkeepse, NY 260 Radu Gaddov Emery Worldwde Arlnes, Vandala, Oho 45377 and Wlbert E. Wlhelm Teas A&M Unversty,

More information

Parallel and Distributed Association Rule Mining - Dr. Giuseppe Di Fatta. San Vigilio,

Parallel and Distributed Association Rule Mining - Dr. Giuseppe Di Fatta. San Vigilio, Parallel and Dstrbuted Assocaton Rule Mnng - Dr. Guseppe D Fatta fatta@nf.un-konstanz.de San Vglo, 18-09-2004 1 Overvew Assocaton Rule Mnng (ARM) Apror algorthm Hgh Performance Parallel and Dstrbuted Computng

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Insertion Sort. Divide and Conquer Sorting. Divide and Conquer. Mergesort. Mergesort Example. Auxiliary Array

Insertion Sort. Divide and Conquer Sorting. Divide and Conquer. Mergesort. Mergesort Example. Auxiliary Array Inserton Sort Dvde and Conquer Sortng CSE 6 Data Structures Lecture 18 What f frst k elements of array are already sorted? 4, 7, 1, 5, 1, 16 We can shft the tal of the sorted elements lst down and then

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

News. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example

News. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example Unversty of Brtsh Columba CPSC, Intro to Computaton Jan-Apr Tamara Munzner News Assgnment correctons to ASCIIArtste.java posted defntely read WebCT bboards Arrays Lecture, Tue Feb based on sldes by Kurt

More information

11. HARMS How To: CSV Import

11. HARMS How To: CSV Import and Rsk System 11. How To: CSV Import Preparng the spreadsheet for CSV Import Refer to the spreadsheet template to ad algnng spreadsheet columns wth Data Felds. The spreadsheet s shown n the Appendx, an

More information

Sorting: The Big Picture. The steps of QuickSort. QuickSort Example. QuickSort Example. QuickSort Example. Recursive Quicksort

Sorting: The Big Picture. The steps of QuickSort. QuickSort Example. QuickSort Example. QuickSort Example. Recursive Quicksort Sortng: The Bg Pcture Gven n comparable elements n an array, sort them n an ncreasng (or decreasng) order. Smple algorthms: O(n ) Inserton sort Selecton sort Bubble sort Shell sort Fancer algorthms: O(n

More information