A Statistical Approach to Rule Selection in Semantic Query Optimisation

Size: px
Start display at page:

Download "A Statistical Approach to Rule Selection in Semantic Query Optimisation"

Transcription

1 A Statistical Approach to Rule Selection in Semantic Query Optimisation Barry G. T. Lowden and Jerome Robinson Department of Computer Science, The University of ssex, Wivenhoe Park, Colchester, CO4 3SQ, ssex, United Kingdom Abstract. Semantic Query Optimisation makes use of the semantic knowledge of a database (rules) to perform query transformation. Rules are normally learned from former queries fired by the user. Over time, however, this can result in the rule set becoming very large thereby degrading the efficiency of the system as a whole. Such a problem is known as the utility problem. This paper seeks to provide a solution to the utility problem through the use of statistical techniques in selecting and maintaining an optimal rule set. Statistical methods have, in fact, been used widely in the field of Knowledge Discovery to identify and measure relationships between attributes. Here we extend the approach to Semantic Query Optimisation using the Chi-square statistical method which is integrated into a prototype query optimiser developed by the authors. We also present a new technique for calculating Chi-square, which is faster and more efficient than the traditional method in this situation. 1 Introduction Semantic query optimization is the process of transforming a query into an alternative query that is semantically equivalent but executes in a shorter time. A semantically equivalent query returns the same result set as the original query and is generated from it by the application of rules. Rules can consist of integrity constraints that hold for all states of the database or dynamic rules that hold only for a given state. Generally, rules can be supplied by the database engineer or derived automatically. Automatic rule generation methods include heuristic based systems [13], logic based systems [1], graph based systems [1] and data driven systems [7, 11]. With the development of automatic rule derivation, it becomes increasingly important to filter out ineffective rules which can lead to a deterioration in optimisation performance. The overall size of the rule set (n) is also of crucial importance since some optimisation algorithms run in O(n ) time. The problem of a large rule set degrading the efficiency of the reformulation process is referred to as the utility problem [4, 8, 10, 14]. arlier work by the authors [6] partially addressed the utility problem by time stamping rules when created,

2 modified or used by the reformulation process. When the number of rules exceeds a specified limit, those which are recorded as unused for more than a given period of time or have a low usage count are removed from the rule set. To further explore this problem we have examined a range of statistical tests as applied in knowledge discovery research [5, 8, ]. In this paper we propose the use of Chi-square for the analysis and selection of effective rules for query optimisation. In section we briefly describe a prototype optimiser, developed by the authors, on which we base our experiments. We then discuss a method of calculating Chisquare which is particularly appropriate to the present application and in section 4 we present our computational results. The ARDOR prototype In most rule derivation systems, the characteristics of worthwhile rules are first identified and then a query issued to the database in an attempt to derive such rules. The ARDOR system [7] takes a different approach whereby actual queries to the system are used to learn new rules. For each query (q) an optimum alternative (q ) is constructed, using a simple inductive process. The equality q q is then used to deduce the minimum set of rules needed to perform the transformation algorithmically and these rules added to the rule base. The system is illustrated in Figure 1 and consists of (1) query reformulation, and () the rule derivation and learning modules. The query reformulation process takes the original query submitted by the user and attempts to reformulate it into a more cost effective query by matching the conditions of the query to the rule set using a best first search strategy. For issues relating to bounded optimality of search strategies see [9]. By this means, the original query is transformed into a semantically equivalent query known as a reformulated query using the standard transformation rules of constraint introduction and removal [3]. This query will give the same result as the original query but with normally a shorter execution time. O riginal Q uery Q uery Reformulation Reform ulated Q uery SQ L ngine Results Rules Rule A nalysis Rule D erivation and Learning Fig. 1. Overview of Query Optimiser

3 It is also possible for the reformulation process to return a query result without the need to access the database at all leading to very substantial time savings. Such a situation occurs when the result of the query can be deduced from the rules alone as illustrated in Figure by two simple examples. All rules in the ARDOR system consist of a single antecedent and consequent. Rules sharing both common antecedent and consequent attributes are said to belong to the same rule class. ach time a user query is entered to the system, the learning process will attempt to generate new rules by constructing matching conditions on all attributes other than those present in the original query. Matching conditions are those which evaluate true with respect to the answer set. Original Query(1) : select advisor from student where uccacode B7000 Rule : uccacode B7000 advisor 10 Result : advisor 10 Original Query() : select advisor from student where uccacode B7000 and advisor 300 Rule : uccacode B7000 advisor 10 Result : null result returned Fig.. Results returned without need for database lookup ach new rule generated is added to the current rule set which, over time, may become excessively large. Also many of the rules could eventually become obsolete with respect to the present database state and should be discarded. Having a rule set that contains entries that are not useful to the query optimizer is wasteful in storage space, and more importantly degrades the performance of the transformation algorithm. 3 Statistics and rule maintenance Chi-square is used in knowledge discovery to determine the correlation between the decision attribute and all the other attributes in a dataset. An attribute is considered to be strongly correlated to the decision attribute if the calculated Chi-square value is significantly greater than the tabled value. To illustrate the calculation of Chi-square, we make reference to the example relation shown in Figure 3.

4 dcode dname project manager ACCT Accounting 1 ACCT01 ACCT Accounting 1 ACCT0 ACCT Accounting 5 ACCT01 MKTG Marketing MKTG01 MKTG Marketing MKTG04 MKTG Marketing MKTG05 MKTG Marketing 3 MKTG0 MKTG Marketing 4 MKTG03 MKTG Marketing 5 MKTG01 MKTG Marketing 5 MKTG04 MKTG Marketing 5 MKTG05 MKTG Marketing 6 MKTG0 MKTG Marketing 6 MKTG03 PRSN Personnel 7 PRSN01 PRSN Personnel 8 PRSN0 Fig. 3. An example relation The first step in calculating the Chi-square correlation is to arrange the data in a frequency or contingency table. ach column represents a group and each row represents a category of the sample relation. Figure 4 depicts such a table. Group Category 1 3 Total 1 n 11 n 1 n 13 R 1 n 1 n n 3 R 3 n 31 n 3 n 33 R 3 Total C 1 C C 3 N Fig. 4. A (3x3) frequency or contingency table The Chi-square significance can be calculated by the following formula: or r c ( n ) X i 1 j 1 X n r c i1 j1 N where n observed number of cases of in ith row and jth column number of cases expected in the ith row and jth column.

5 Under the assumption of independence, the expected frequency of the observation in each cell should be proportional to the distribution of row and column totals. This expected frequency is the product of the row and column total divided by the total number of observations. Thus may be calculated from the following formula: The total frequency R i in the ith row is R i R c i j 1 C N Similarly, the total frequency in the jth column is C The statistical degree of freedom (df) for the Chi-square is calculated as: Given, for example, the rule: j r i 1 n n ( 1)( 1) df r c dname Accounting dcode ACCT we may construct the contingency table for the associated rule class, Figure 5. Category Group (dcode) (dname) ACCT MKTG PRSN Total Accounting Marketing Personnel 0 0 Total Fig. 5. Frequency table for dname and dcode Using the earlier expression, the Chi-square value calculated is 9.80 with degree of freedom ( df ) 4. Choosing a confidence interval equal to 97.5%, the tabled Chisquare value is Since the calculated value is greater than the value tabled, the rule is considered to be relevant and retained in the rule set. In certain circumstances it may be appropriate to construct a contingency table limited to a restricted subset of categories where knowledge of the data indicates that this subset shows a markedly different correlation between antecedent and consequent attributes compared with other subsets in the same rule class. For example in the case of shoe size and age, it would be known that the correlation would be much greater for small shoe sizes since, in general, these would relate to children and consequently be associated with a restricted age spectrum. j

6 3.1 Algorithm design and memory limitation The implementation of the Chi-square statistical test normally requires the construction of a contingency table to hold the sampled frequencies of each row and column, the size of the table being dependent on the number of categories. If the size of the table becomes excessive this may well degrade the performance and efficiency of the statistical algorithm. The extreme case is where the table grows to a size beyond the memory limits of the system i.e. page swapping would then occur. These problems would imply that, in some cases, it may not be feasible to employ this technique for rule analysis and an alternative method of calculation is now presented. Consider the contingency table shown in Figure 6: Antecedent Consequent Total value(1) n 11 n 1 n 13 T R1 value() n 1 n n 3 T R value(3) n 31 n 3 n 33 T R3 Total T C1 T C T C3 N Fig. 6. A ( 3 3) contingency table As before the Chi-square is given as follows: X r i 1 c j 1 ( n ) applying this formula to the above table, i.e. R3 and c3, we have: X where ( n ) ( n ) ( n ) ( n ) T ( n ) ( n ) ( n ) ( n ) ( n ) Ri T N 33 Cj If, for some cell n 0, then the contribution to X from that cell is just /. So the contribution from all the cells having zero observed frequency is simply the sum of the corresponding. 3

7 Furthermore, there is no need to calculate their individual values. We know that the sum of the complete set of expected frequencies is N. If we sum the expected frequency,, of all the non-zero cells and subtract this value from N we have the total χ contribution from the cells with zero observed frequencies. Therefore the only computation needed would be for cells with non-zero frequency count. We illustrate the method by means of the following example. Let us assume that n 11, n and n 33 have values 3, 4 and respectively and all other cells contain a zero. The traditional way of calculating Chi-square would be: X ( ) ( ) ( ) ( ) ( ) ( 0 8 ) ( ) ( ) ( ) Our proposed alternative is to compute those cells that have non-zero cells separately from those that have zero frequency counts as follows. Non-zero Chi-square ( ) ( ) ( ) Zero Chi-square 9 ( ) The sum of these two values gives the same result as before without the need to construct a contingency table. This method is not restricted to diagonal tables alone and so may be used to represent rule classes of the form A B OR C. 4 xperimental Results A series of experiments were carried out in order to measure any increase in optimiser performance achieved through the statistical analysis and subsequent elimination of ineffective rules.

8 In each case a specified query collection was executed against the database in order to generate a full associated rule set using the ARDOR rule derivation and learning modules. The rule set was then subjected to the Chi-square analysis, as described in the above section, to filter out those rules considered to be weak thus creating a restricted rule set. The initial query execution was then repeated first using the full rule set and then the restricted set to perform query transformation and optimisation. In one representative experiment the following results were obtained by running a collection of ten queries, shown below, against a 7184 instance database containing real data pertaining to student records at the University of ssex. Query Collection: Q1) select * from student where status 'A' and school 'CSG'; Q) select * from student where advisor 479 and uccacode 'B7000'; Q3) select * from student where entry < 91 and entry > 83 and examno 0 and school 'SG'; Q4) select * from student where advisor 59 and entry 90 and status A ; Q5) select scheme from student where entry 90 and study 'PHD CHM'; Q6) select name, regno, advisor from student where entry 85 and year 'G'; Q7) select * from student where uccacode 'Q10081' and entry 90; Q8) select advisor from student where uccacode 'B7000'; Q9) select name, regno, advisor from student where entry 85 and regno < and regno > ; Q10) select examno from student where school 'SG'; The queries include range, numeric and set membership conditions and make reference to both indexed attributes (name and regno) and also non-indexed attributes. The relational schema is shown in Fig. 7. STUDNT (name char(30), regno integer, logname char(8), advisor integer, entry integer, year char(), scheme char(6), uccacode char(6), status char(1), examno integer, study char(8), school char(4)) Fig. 7. Relational Scheme of STUDNT database Query execution resulted in the generation of 51 rules. The rule derivation module runs as a background task and so does not adversely affect the execution process.

9 Application of the Chi-square test to this rule set identified 16 rules which could be considered as weak, and therefore discarded, leaving 35 strong rules considered to be particularly effective for query optimisation. Finally the query optimiser was run using both the full and restricted rule sets and the results shown in Figure 8. These results were averaged over 50 runs and include query transformation costs. Queries Q, Q8 and Q10 show the greatest overall savings since they can be answered from the rule set alone without the need to access the database itself. Queries Q1, Q3 and Q4 are examples of where the transformation process cannot improve on the original query. In this case query costing routines incorporated within the optimiser would return the original query as optimal for execution. Full rule set 51, restricted set 35. Timings (secs) Unoptimised Full set Restr. set Tot. Savings QURY Q1) Q) Q3) Q4) Q5) Q6) Q7) Q8) Q9) Q10) Fig. 8. xperimental Results Overall an average time saving of 30.5% was achieved across all the queries executed using the full rule set with a further improvement to 38.8% using the restricted rule set. It should be emphasised, however that the performance increase shown is as a result of applying the Chi-square rule filter to a recently derived and therefore generally relevant rule set. ven greater savings, with respect to the use of the full rule set, may be achieved by the Chi-square analysis of rule sets which have become out of date with respect to the current database state. The use of Chi-square, therefore, ensures not only the quality of rules when they are first derived but also subsequently their relevance and effectiveness to the ongoing optimisation process. 5 Conclusions The efficiency of a semantic optimiser is largely dependent on the number and quality of the rules used in the query transformation process. In this paper we have described

10 how the Chi-square statistical test may be used to identify and eliminate rules which are considered to be weak and ineffective. xperimental results show significantly improved performance is achieved using this approach which can be run in conjunction with other rule selection techniques. A revised Chi-square calculation procedure has also been presented which does not require the construction of a contingency table. References 1. U. S. CHAKRAVARTHY, J. GRANT and J. MINKR. Logic-based approach to semantic query optimisation. ACM Transactions on Database Systems, Vol. 15, No., June 1990, K. C. CHAN and A. K. C. WONG. A statistical test for extracting classificatory knowledge form databases. Knowledge Discovery in Databases, d., The AAAI Press, 1991, G. GRAF and D. DWITT. The XODUS optimiser generator. Proceedings of the ACM-SIGMOD Conference on Management of Data, San Francisco, May 1987, J. HAN, Y. CAI and N. CRCON. Data-driven discovery of quantitative rules in relational databases. I Transactions on Knowledge and Data ngineering, Vol. 5, no. 1, February 1993, I. F. IMAM, R. S. MICHALSKI and L. KRSCHBRG. Discovering attribute dependence in database by integrating symbolic learning and statistical analysis tests. Knowledge Discovery in Databases Workshop, 1993, B. G. T. LOWDN and K. Y. LIM. A data driven semantic optimiser, CSM 11, Internal Publication, University of ssex. 7. B. G. T. LOWDN, J. ROBINSON and K. Y. LIM, A semantic optimiser using automatic rule derivation. Proceedings of Workshop on Information Technologies and Systems, 1995, G. PIATTSKY-SHAPIRO, and C. MATHUS. Measuring data dependencies in large databases. Knowledge Discovery in Databases Workshop,1993, S. RUSSLL. Rationality and Intelligence. Artificial Intelligence 94, 1997, I. SAVNIK and P. A.. FLACH. Bottom-up induction of functional dependencies from relations. Knowledge Discovery in Databases Workshop, 1993, S. SHKHAR, B. HAMIDZADH and A. KOHLI. Learning transformation rules for semantic query optimisation: a data-driven approach. I, 1993, S. T. SHNOY and Z. M. OZSOYOGLU. Design and implementation of semantic query optimiser. I Transactions on Knowledge and Data ngineering, Vol. 1, No. 3, Sept. 1989, M. D. SIGL,. SCIOR and S. SALVTR. A method for automatic rule derivation to support semantic query optimisation. ACM Transactions on Database Systems, Vol. 17, No. 4, Dec. 199, W. ZIARKO. The discovery, analysis, and representation of data dependencies in databases. In Knowledge Discovery in Databases, The AAAI Press, 1991,

The Use of Statistics in Semantic Query Optimisation

The Use of Statistics in Semantic Query Optimisation The Use of Statistics in Semantic Query Optimisation Ayla Sayli ( saylia@essex.ac.uk ) and Barry Lowden ( lowdb@essex.ac.uk ) University of Essex, Dept. of Computer Science Wivenhoe Park, Colchester, CO4

More information

A Fast Transformation Method to Semantic Query Optimisation

A Fast Transformation Method to Semantic Query Optimisation A Fast Transformation Method to Semantic Query Optimisation Ayla Sayli ( saylia@essex.ac.uk ) and Barry Lowden ( lowdb@essex.ac.uk ) University of Essex, Dept. of Computer Science, Wivenhoe Park, Colchester,

More information

Distributing the Derivation and Maintenance of Subset Descriptor Rules

Distributing the Derivation and Maintenance of Subset Descriptor Rules Distributing the Derivation and Maintenance of Subset Descriptor Rules Jerome Robinson, Barry G. T. Lowden, Mohammed Al Haddad Department of Computer Science, University of Essex Colchester, Essex, CO4

More information

Attribute-Pair Range Rules

Attribute-Pair Range Rules Lecture Notes in Computer Science 1 Attribute-Pair Range Rules Jerome Robinson Barry G. T. Lowden Department of Computer Science, University of Essex Colchester, Essex, CO4 3SQ, U.K. {robij, lowdb}@essex.ac.uk

More information

Utilizing Multiple Computers in Database Query Processing and Descriptor Rule Management

Utilizing Multiple Computers in Database Query Processing and Descriptor Rule Management Utilizing Multiple Computers in Database Query Processing and Descriptor Rule Management Jerome Robinson, Barry G. T. Lowden, Mohammed Al Haddad Department of Computer Science, University of Essex Colchester,

More information

Visualisation of Temporal Interval Association Rules

Visualisation of Temporal Interval Association Rules Visualisation of Temporal Interval Association Rules Chris P. Rainsford 1 and John F. Roddick 2 1 Defence Science and Technology Organisation, DSTO C3 Research Centre Fernhill Park, Canberra, 2600, Australia.

More information

A Fast Method for Ensuring the Consistency of Integrity Constraints

A Fast Method for Ensuring the Consistency of Integrity Constraints A Fast Method for Ensuring the Consistency of Integrity Constraints Barry G. T. Lowden and Jerome Robinson Department of Computer Science, The University of Essex, Wivenhoe Park, Colchester CO4 3SQ, Essex,

More information

Spatial Patterns Point Pattern Analysis Geographic Patterns in Areal Data

Spatial Patterns Point Pattern Analysis Geographic Patterns in Areal Data Spatial Patterns We will examine methods that are used to analyze patterns in two sorts of spatial data: Point Pattern Analysis - These methods concern themselves with the location information associated

More information

Discovery of Actionable Patterns in Databases: The Action Hierarchy Approach

Discovery of Actionable Patterns in Databases: The Action Hierarchy Approach Discovery of Actionable Patterns in Databases: The Action Hierarchy Approach Gediminas Adomavicius Computer Science Department Alexander Tuzhilin Leonard N. Stern School of Business Workinq Paper Series

More information

An Approach to Intensional Query Answering at Multiple Abstraction Levels Using Data Mining Approaches

An Approach to Intensional Query Answering at Multiple Abstraction Levels Using Data Mining Approaches An Approach to Intensional Query Answering at Multiple Abstraction Levels Using Data Mining Approaches Suk-Chung Yoon E. K. Park Dept. of Computer Science Dept. of Software Architecture Widener University

More information

Deep Web Content Mining

Deep Web Content Mining Deep Web Content Mining Shohreh Ajoudanian, and Mohammad Davarpanah Jazi Abstract The rapid expansion of the web is causing the constant growth of information, leading to several problems such as increased

More information

Integrating Logistic Regression with Knowledge Discovery Systems

Integrating Logistic Regression with Knowledge Discovery Systems Association for Information Systems AIS Electronic Library (AISeL) AMCIS 1997 Proceedings Americas Conference on Information Systems (AMCIS) 8-15-1997 Integrating Logistic Regression with Knowledge Discovery

More information

IMPROVING THE RELEVANCY OF DOCUMENT SEARCH USING THE MULTI-TERM ADJACENCY KEYWORD-ORDER MODEL

IMPROVING THE RELEVANCY OF DOCUMENT SEARCH USING THE MULTI-TERM ADJACENCY KEYWORD-ORDER MODEL IMPROVING THE RELEVANCY OF DOCUMENT SEARCH USING THE MULTI-TERM ADJACENCY KEYWORD-ORDER MODEL Lim Bee Huang 1, Vimala Balakrishnan 2, Ram Gopal Raj 3 1,2 Department of Information System, 3 Department

More information

A Framework for Securing Databases from Intrusion Threats

A Framework for Securing Databases from Intrusion Threats A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:

More information

FedX: A Federation Layer for Distributed Query Processing on Linked Open Data

FedX: A Federation Layer for Distributed Query Processing on Linked Open Data FedX: A Federation Layer for Distributed Query Processing on Linked Open Data Andreas Schwarte 1, Peter Haase 1,KatjaHose 2, Ralf Schenkel 2, and Michael Schmidt 1 1 fluid Operations AG, Walldorf, Germany

More information

Tadeusz Morzy, Maciej Zakrzewicz

Tadeusz Morzy, Maciej Zakrzewicz From: KDD-98 Proceedings. Copyright 998, AAAI (www.aaai.org). All rights reserved. Group Bitmap Index: A Structure for Association Rules Retrieval Tadeusz Morzy, Maciej Zakrzewicz Institute of Computing

More information

Efficiently Mining Positive Correlation Rules

Efficiently Mining Positive Correlation Rules Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 39S-44S Efficiently Mining Positive Correlation Rules Zhongmei Zhou Department of Computer Science & Engineering,

More information

CREATING CUSTOMIZED DATABASE VIEWS WITH USER-DEFINED NON- CONSISTENCY REQUIREMENTS

CREATING CUSTOMIZED DATABASE VIEWS WITH USER-DEFINED NON- CONSISTENCY REQUIREMENTS CREATING CUSTOMIZED DATABASE VIEWS WITH USER-DEFINED NON- CONSISTENCY REQUIREMENTS David Chao, San Francisco State University, dchao@sfsu.edu Robert C. Nickerson, San Francisco State University, RNick@sfsu.edu

More information

Multivariate Normal Random Numbers

Multivariate Normal Random Numbers Multivariate Normal Random Numbers Revised: 10/11/2017 Summary... 1 Data Input... 3 Analysis Options... 4 Analysis Summary... 5 Matrix Plot... 6 Save Results... 8 Calculations... 9 Summary This procedure

More information

Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing

Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing Jianting Zhang Le Gruenwald The University of Oklahoma, School of Computer Science, Norman, OK, 73019

More information

A New Online Clustering Approach for Data in Arbitrary Shaped Clusters

A New Online Clustering Approach for Data in Arbitrary Shaped Clusters A New Online Clustering Approach for Data in Arbitrary Shaped Clusters Richard Hyde, Plamen Angelov Data Science Group, School of Computing and Communications Lancaster University Lancaster, LA1 4WA, UK

More information

The Application of K-medoids and PAM to the Clustering of Rules

The Application of K-medoids and PAM to the Clustering of Rules The Application of K-medoids and PAM to the Clustering of Rules A. P. Reynolds, G. Richards, and V. J. Rayward-Smith School of Computing Sciences, University of East Anglia, Norwich Abstract. Earlier research

More information

second_language research_teaching sla vivian_cook language_department idl

second_language research_teaching sla vivian_cook language_department idl Using Implicit Relevance Feedback in a Web Search Assistant Maria Fasli and Udo Kruschwitz Department of Computer Science, University of Essex, Wivenhoe Park, Colchester, CO4 3SQ, United Kingdom fmfasli

More information

Discovering the Association Rules in OLAP Data Cube with Daily Downloads of Folklore Materials *

Discovering the Association Rules in OLAP Data Cube with Daily Downloads of Folklore Materials * Discovering the Association Rules in OLAP Data Cube with Daily Downloads of Folklore Materials * Galina Bogdanova, Tsvetanka Georgieva Abstract: Association rules mining is one kind of data mining techniques

More information

Efficient subset and superset queries

Efficient subset and superset queries Efficient subset and superset queries Iztok SAVNIK Faculty of Mathematics, Natural Sciences and Information Technologies, University of Primorska, Glagoljaška 8, 5000 Koper, Slovenia Abstract. The paper

More information

Mining High Order Decision Rules

Mining High Order Decision Rules Mining High Order Decision Rules Y.Y. Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 e-mail: yyao@cs.uregina.ca Abstract. We introduce the notion of high

More information

Identifying Layout Classes for Mathematical Symbols Using Layout Context

Identifying Layout Classes for Mathematical Symbols Using Layout Context Rochester Institute of Technology RIT Scholar Works Articles 2009 Identifying Layout Classes for Mathematical Symbols Using Layout Context Ling Ouyang Rochester Institute of Technology Richard Zanibbi

More information

On Multiple Query Optimization in Data Mining

On Multiple Query Optimization in Data Mining On Multiple Query Optimization in Data Mining Marek Wojciechowski, Maciej Zakrzewicz Poznan University of Technology Institute of Computing Science ul. Piotrowo 3a, 60-965 Poznan, Poland {marek,mzakrz}@cs.put.poznan.pl

More information

Hierarchical Online Mining for Associative Rules

Hierarchical Online Mining for Associative Rules Hierarchical Online Mining for Associative Rules Naresh Jotwani Dhirubhai Ambani Institute of Information & Communication Technology Gandhinagar 382009 INDIA naresh_jotwani@da-iict.org Abstract Mining

More information

Maintaining Mutual Consistency for Cached Web Objects

Maintaining Mutual Consistency for Cached Web Objects Maintaining Mutual Consistency for Cached Web Objects Bhuvan Urgaonkar, Anoop George Ninan, Mohammad Salimullah Raunak Prashant Shenoy and Krithi Ramamritham Department of Computer Science, University

More information

THE EFFECT OF JOIN SELECTIVITIES ON OPTIMAL NESTING ORDER

THE EFFECT OF JOIN SELECTIVITIES ON OPTIMAL NESTING ORDER THE EFFECT OF JOIN SELECTIVITIES ON OPTIMAL NESTING ORDER Akhil Kumar and Michael Stonebraker EECS Department University of California Berkeley, Ca., 94720 Abstract A heuristic query optimizer must choose

More information

SIMILARITY MEASURES FOR MULTI-VALUED ATTRIBUTES FOR DATABASE CLUSTERING

SIMILARITY MEASURES FOR MULTI-VALUED ATTRIBUTES FOR DATABASE CLUSTERING SIMILARITY MEASURES FOR MULTI-VALUED ATTRIBUTES FOR DATABASE CLUSTERING TAE-WAN RYU AND CHRISTOPH F. EICK Department of Computer Science, University of Houston, Houston, Texas 77204-3475 {twryu, ceick}@cs.uh.edu

More information

Analyzing Dshield Logs Using Fully Automatic Cross-Associations

Analyzing Dshield Logs Using Fully Automatic Cross-Associations Analyzing Dshield Logs Using Fully Automatic Cross-Associations Anh Le 1 1 Donald Bren School of Information and Computer Sciences University of California, Irvine Irvine, CA, 92697, USA anh.le@uci.edu

More information

Chapter 12: Indexing and Hashing. Basic Concepts

Chapter 12: Indexing and Hashing. Basic Concepts Chapter 12: Indexing and Hashing! Basic Concepts! Ordered Indices! B+-Tree Index Files! B-Tree Index Files! Static Hashing! Dynamic Hashing! Comparison of Ordered Indexing and Hashing! Index Definition

More information

On the Relationship of Server Disk Workloads and Client File Requests

On the Relationship of Server Disk Workloads and Client File Requests On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies

More information

Web Service Usage Mining: Mining For Executable Sequences

Web Service Usage Mining: Mining For Executable Sequences 7th WSEAS International Conference on APPLIED COMPUTER SCIENCE, Venice, Italy, November 21-23, 2007 266 Web Service Usage Mining: Mining For Executable Sequences MOHSEN JAFARI ASBAGH, HASSAN ABOLHASSANI

More information

Chapter 12: Indexing and Hashing

Chapter 12: Indexing and Hashing Chapter 12: Indexing and Hashing Basic Concepts Ordered Indices B+-Tree Index Files B-Tree Index Files Static Hashing Dynamic Hashing Comparison of Ordered Indexing and Hashing Index Definition in SQL

More information

Mining Quantitative Maximal Hyperclique Patterns: A Summary of Results

Mining Quantitative Maximal Hyperclique Patterns: A Summary of Results Mining Quantitative Maximal Hyperclique Patterns: A Summary of Results Yaochun Huang, Hui Xiong, Weili Wu, and Sam Y. Sung 3 Computer Science Department, University of Texas - Dallas, USA, {yxh03800,wxw0000}@utdallas.edu

More information

B553 Lecture 12: Global Optimization

B553 Lecture 12: Global Optimization B553 Lecture 12: Global Optimization Kris Hauser February 20, 2012 Most of the techniques we have examined in prior lectures only deal with local optimization, so that we can only guarantee convergence

More information

Research Methods for Business and Management. Session 8a- Analyzing Quantitative Data- using SPSS 16 Andre Samuel

Research Methods for Business and Management. Session 8a- Analyzing Quantitative Data- using SPSS 16 Andre Samuel Research Methods for Business and Management Session 8a- Analyzing Quantitative Data- using SPSS 16 Andre Samuel A Simple Example- Gym Purpose of Questionnaire- to determine the participants involvement

More information

Market basket analysis

Market basket analysis Market basket analysis Find joint values of the variables X = (X 1,..., X p ) that appear most frequently in the data base. It is most often applied to binary-valued data X j. In this context the observations

More information

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Ali Al-Dhaher, Tricha Anjali Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois

More information

Data Mining. 2.4 Data Integration. Fall Instructor: Dr. Masoud Yaghini. Data Integration

Data Mining. 2.4 Data Integration. Fall Instructor: Dr. Masoud Yaghini. Data Integration Data Mining 2.4 Fall 2008 Instructor: Dr. Masoud Yaghini Data integration: Combines data from multiple databases into a coherent store Denormalization tables (often done to improve performance by avoiding

More information

The Grid File: An Adaptable, Symmetric Multikey File Structure

The Grid File: An Adaptable, Symmetric Multikey File Structure The Grid File: An Adaptable, Symmetric Multikey File Structure Presentation: Saskia Nieckau Moderation: Hedi Buchner The Grid File: An Adaptable, Symmetric Multikey File Structure 1. Multikey Structures

More information

Quantitative - One Population

Quantitative - One Population Quantitative - One Population The Quantitative One Population VISA procedures allow the user to perform descriptive and inferential procedures for problems involving one population with quantitative (interval)

More information

Mining Generalised Emerging Patterns

Mining Generalised Emerging Patterns Mining Generalised Emerging Patterns Xiaoyuan Qian, James Bailey, Christopher Leckie Department of Computer Science and Software Engineering University of Melbourne, Australia {jbailey, caleckie}@csse.unimelb.edu.au

More information

High-Speed Cell-Level Path Allocation in a Three-Stage ATM Switch.

High-Speed Cell-Level Path Allocation in a Three-Stage ATM Switch. High-Speed Cell-Level Path Allocation in a Three-Stage ATM Switch. Martin Collier School of Electronic Engineering, Dublin City University, Glasnevin, Dublin 9, Ireland. email address: collierm@eeng.dcu.ie

More information

A recommendation engine by using association rules

A recommendation engine by using association rules Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 62 ( 2012 ) 452 456 WCBEM 2012 A recommendation engine by using association rules Ozgur Cakir a 1, Murat Efe Aras b a

More information

An Information-Theoretic Approach to the Prepruning of Classification Rules

An Information-Theoretic Approach to the Prepruning of Classification Rules An Information-Theoretic Approach to the Prepruning of Classification Rules Max Bramer University of Portsmouth, Portsmouth, UK Abstract: Keywords: The automatic induction of classification rules from

More information

Multiple Regression White paper

Multiple Regression White paper +44 (0) 333 666 7366 Multiple Regression White paper A tool to determine the impact in analysing the effectiveness of advertising spend. Multiple Regression In order to establish if the advertising mechanisms

More information

Using Association Rules for Better Treatment of Missing Values

Using Association Rules for Better Treatment of Missing Values Using Association Rules for Better Treatment of Missing Values SHARIQ BASHIR, SAAD RAZZAQ, UMER MAQBOOL, SONYA TAHIR, A. RAUF BAIG Department of Computer Science (Machine Intelligence Group) National University

More information

8 th Grade Pre Algebra Pacing Guide 1 st Nine Weeks

8 th Grade Pre Algebra Pacing Guide 1 st Nine Weeks 8 th Grade Pre Algebra Pacing Guide 1 st Nine Weeks MS Objective CCSS Standard I Can Statements Included in MS Framework + Included in Phase 1 infusion Included in Phase 2 infusion 1a. Define, classify,

More information

Dynamic Aggregation to Support Pattern Discovery: A case study with web logs

Dynamic Aggregation to Support Pattern Discovery: A case study with web logs Dynamic Aggregation to Support Pattern Discovery: A case study with web logs Lida Tang and Ben Shneiderman Department of Computer Science University of Maryland College Park, MD 20720 {ltang, ben}@cs.umd.edu

More information

Virtual Memory - Overview. Programmers View. Virtual Physical. Virtual Physical. Program has its own virtual memory space.

Virtual Memory - Overview. Programmers View. Virtual Physical. Virtual Physical. Program has its own virtual memory space. Virtual Memory - Overview Programmers View Process runs in virtual (logical) space may be larger than physical. Paging can implement virtual. Which pages to have in? How much to allow each process? Program

More information

Dynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering

Dynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering Dynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering Abstract Mrs. C. Poongodi 1, Ms. R. Kalaivani 2 1 PG Student, 2 Assistant Professor, Department of

More information

ISSN: (Online) Volume 3, Issue 9, September 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 9, September 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 9, September 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Placement Algorithm for FPGA Circuits

Placement Algorithm for FPGA Circuits Placement Algorithm for FPGA Circuits ZOLTAN BARUCH, OCTAVIAN CREŢ, KALMAN PUSZTAI Computer Science Department, Technical University of Cluj-Napoca, 26, Bariţiu St., 3400 Cluj-Napoca, Romania {Zoltan.Baruch,

More information

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards Al-Sakib Khan Pathan and Choong Seon Hong Department of Computer Engineering, Kyung Hee University, Korea spathan@networking.khu.ac.kr

More information

Purna Prasad Mutyala et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (5), 2011,

Purna Prasad Mutyala et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (5), 2011, Weighted Association Rule Mining Without Pre-assigned Weights PURNA PRASAD MUTYALA, KUMAR VASANTHA Department of CSE, Avanthi Institute of Engg & Tech, Tamaram, Visakhapatnam, A.P., India. Abstract Association

More information

SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases

SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases Jinlong Wang, Congfu Xu, Hongwei Dan, and Yunhe Pan Institute of Artificial Intelligence, Zhejiang University Hangzhou, 310027,

More information

c 2011 Yun Wei Chang

c 2011 Yun Wei Chang c 2011 Yun Wei Chang SINGLE-LAYER BUS ROUTING FOR HIGH-SPEED BOARDS BY YUN WEI CHANG THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Electrical and Computer

More information

D-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview

D-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview Chapter 888 Introduction This procedure generates D-optimal designs for multi-factor experiments with both quantitative and qualitative factors. The factors can have a mixed number of levels. For example,

More information

Transforming Quantitative Transactional Databases into Binary Tables for Association Rule Mining Using the Apriori Algorithm

Transforming Quantitative Transactional Databases into Binary Tables for Association Rule Mining Using the Apriori Algorithm Transforming Quantitative Transactional Databases into Binary Tables for Association Rule Mining Using the Apriori Algorithm Expert Systems: Final (Research Paper) Project Daniel Josiah-Akintonde December

More information

Improvement of Web Search Results using Genetic Algorithm on Word Sense Disambiguation

Improvement of Web Search Results using Genetic Algorithm on Word Sense Disambiguation Volume 3, No.5, May 24 International Journal of Advances in Computer Science and Technology Pooja Bassin et al., International Journal of Advances in Computer Science and Technology, 3(5), May 24, 33-336

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

DESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES

DESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall

More information

WEIGHTING QUERY TERMS USING WORDNET ONTOLOGY

WEIGHTING QUERY TERMS USING WORDNET ONTOLOGY IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 349 WEIGHTING QUERY TERMS USING WORDNET ONTOLOGY Mohammed M. Sakre Mohammed M. Kouta Ali M. N. Allam Al Shorouk

More information

Speeding up Queries in a Leaf Image Database

Speeding up Queries in a Leaf Image Database 1 Speeding up Queries in a Leaf Image Database Daozheng Chen May 10, 2007 Abstract We have an Electronic Field Guide which contains an image database with thousands of leaf images. We have a system which

More information

Chapter 9 Introduction to Arrays. Fundamentals of Java

Chapter 9 Introduction to Arrays. Fundamentals of Java Chapter 9 Introduction to Arrays Objectives Write programs that handle collections of similar items. Declare array variables and instantiate array objects. Manipulate arrays with loops, including the enhanced

More information

INDUCTIVE LEARNING WITH BCT

INDUCTIVE LEARNING WITH BCT INDUCTIVE LEARNING WITH BCT Philip K Chan CUCS-451-89 August, 1989 Department of Computer Science Columbia University New York, NY 10027 pkc@cscolumbiaedu Abstract BCT (Binary Classification Tree) is a

More information

An Algorithm for Mining Large Sequences in Databases

An Algorithm for Mining Large Sequences in Databases 149 An Algorithm for Mining Large Sequences in Databases Bharat Bhasker, Indian Institute of Management, Lucknow, India, bhasker@iiml.ac.in ABSTRACT Frequent sequence mining is a fundamental and essential

More information

Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES

Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall

More information

Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques

Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques 24 Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Ruxandra PETRE

More information

An Empirical Study of Software Metrics in Artificial Neural Networks

An Empirical Study of Software Metrics in Artificial Neural Networks An Empirical Study of Software Metrics in Artificial Neural Networks WING KAI, LEUNG School of Computing Faculty of Computing, Information and English University of Central England Birmingham B42 2SU UNITED

More information

Data Analysis and Solver Plugins for KSpread USER S MANUAL. Tomasz Maliszewski

Data Analysis and Solver Plugins for KSpread USER S MANUAL. Tomasz Maliszewski Data Analysis and Solver Plugins for KSpread USER S MANUAL Tomasz Maliszewski tmaliszewski@wp.pl Table of Content CHAPTER 1: INTRODUCTION... 3 1.1. ABOUT DATA ANALYSIS PLUGIN... 3 1.3. ABOUT SOLVER PLUGIN...

More information

E-R Model. Hi! Here in this lecture we are going to discuss about the E-R Model.

E-R Model. Hi! Here in this lecture we are going to discuss about the E-R Model. E-R Model Hi! Here in this lecture we are going to discuss about the E-R Model. What is Entity-Relationship Model? The entity-relationship model is useful because, as we will soon see, it facilitates communication

More information

Constructing Object Oriented Class for extracting and using data from data cube

Constructing Object Oriented Class for extracting and using data from data cube Constructing Object Oriented Class for extracting and using data from data cube Antoaneta Ivanova Abstract: The goal of this article is to depict Object Oriented Conceptual Model Data Cube using it as

More information

Development of CNC machine performance standards

Development of CNC machine performance standards Development of CNC machine performance standards D.M.S. Blackshaw, V. Chiles, D. Jenkinson School of Engineering, University of Northumbria, Newcastle upon Tyne, NE1 8ST vie. chiles@unn. ac. uk Abstract

More information

SPSS. (Statistical Packages for the Social Sciences)

SPSS. (Statistical Packages for the Social Sciences) Inger Persson SPSS (Statistical Packages for the Social Sciences) SHORT INSTRUCTIONS This presentation contains only relatively short instructions on how to perform basic statistical calculations in SPSS.

More information

Robustness of Non-Exact Multi-Channel Equalization in Reverberant Environments

Robustness of Non-Exact Multi-Channel Equalization in Reverberant Environments Robustness of Non-Exact Multi-Channel Equalization in Reverberant Environments Fotios Talantzis and Lazaros C. Polymenakos Athens Information Technology, 19.5 Km Markopoulo Ave., Peania/Athens 19002, Greece

More information

Flexible Cache Cache for afor Database Management Management Systems Systems Radim Bača and David Bednář

Flexible Cache Cache for afor Database Management Management Systems Systems Radim Bača and David Bednář Flexible Cache Cache for afor Database Management Management Systems Systems Radim Bača and David Bednář Department ofradim Computer Bača Science, and Technical David Bednář University of Ostrava Czech

More information

Designing Views to Answer Queries under Set, Bag,and BagSet Semantics

Designing Views to Answer Queries under Set, Bag,and BagSet Semantics Designing Views to Answer Queries under Set, Bag,and BagSet Semantics Rada Chirkova Department of Computer Science, North Carolina State University Raleigh, NC 27695-7535 chirkova@csc.ncsu.edu Foto Afrati

More information

Issues in Using Knowledge to Perform Similarity Searching in Multimedia Databases without Redundant Data Objects

Issues in Using Knowledge to Perform Similarity Searching in Multimedia Databases without Redundant Data Objects Issues in Using Knowledge to Perform Similarity Searching in Multimedia Databases without Redundant Data Objects Leonard Brown The University of Oklahoma School of Computer Science 200 Felgar St. EL #114

More information

A mining method for tracking changes in temporal association rules from an encoded database

A mining method for tracking changes in temporal association rules from an encoded database A mining method for tracking changes in temporal association rules from an encoded database Chelliah Balasubramanian *, Karuppaswamy Duraiswamy ** K.S.Rangasamy College of Technology, Tiruchengode, Tamil

More information

A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection (Kohavi, 1995)

A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection (Kohavi, 1995) A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection (Kohavi, 1995) Department of Information, Operations and Management Sciences Stern School of Business, NYU padamopo@stern.nyu.edu

More information

A Class of Weak Keys in the RC4 Stream Cipher Preliminary Draft

A Class of Weak Keys in the RC4 Stream Cipher Preliminary Draft A Class of Weak Keys in the RC4 Stream Cipher Preliminary Draft Andrew Roos Vironix Software Laboratories 22 September 1995 1 Introduction This paper discusses a class of weak keys in RSA s RC4 stream

More information

Value of YouTube to the music industry Paper V Direct value to the industry

Value of YouTube to the music industry Paper V Direct value to the industry Value of YouTube to the music industry Paper V Direct value to the industry June 2017 RBB Economics 1 1 Introduction The music industry has undergone significant change over the past few years, with declining

More information

An Approach for Accessing Linked Open Data for Data Mining Purposes

An Approach for Accessing Linked Open Data for Data Mining Purposes An Approach for Accessing Linked Open Data for Data Mining Purposes Andreas Nolle, German Nemirovski Albstadt-Sigmaringen University nolle, nemirovskij@hs-albsig.de Abstract In the recent time the amount

More information

Normalization in DBMS

Normalization in DBMS Unit 4: Normalization 4.1. Need of Normalization (Consequences of Bad Design-Insert, Update & Delete Anomalies) 4.2. Normalization 4.2.1. First Normal Form 4.2.2. Second Normal Form 4.2.3. Third Normal

More information

One Factor Experiments

One Factor Experiments One Factor Experiments 20-1 Overview Computation of Effects Estimating Experimental Errors Allocation of Variation ANOVA Table and F-Test Visual Diagnostic Tests Confidence Intervals For Effects Unequal

More information

Introduction. Linear because it requires linear functions. Programming as synonymous of planning.

Introduction. Linear because it requires linear functions. Programming as synonymous of planning. LINEAR PROGRAMMING Introduction Development of linear programming was among the most important scientific advances of mid-20th cent. Most common type of applications: allocate limited resources to competing

More information

Mathematics and Computer Science

Mathematics and Computer Science Technical Report TR-2006-010 Revisiting hypergraph models for sparse matrix decomposition by Cevdet Aykanat, Bora Ucar Mathematics and Computer Science EMORY UNIVERSITY REVISITING HYPERGRAPH MODELS FOR

More information

Enhancing Internet Search Engines to Achieve Concept-based Retrieval

Enhancing Internet Search Engines to Achieve Concept-based Retrieval Enhancing Internet Search Engines to Achieve Concept-based Retrieval Fenghua Lu 1, Thomas Johnsten 2, Vijay Raghavan 1 and Dennis Traylor 3 1 Center for Advanced Computer Studies University of Southwestern

More information

Object Geolocation from Crowdsourced Street Level Imagery

Object Geolocation from Crowdsourced Street Level Imagery Object Geolocation from Crowdsourced Street Level Imagery Vladimir A. Krylov and Rozenn Dahyot ADAPT Centre, School of Computer Science and Statistics, Trinity College Dublin, Dublin, Ireland {vladimir.krylov,rozenn.dahyot}@tcd.ie

More information

Selecting Topics for Web Resource Discovery: Efficiency Issues in a Database Approach +

Selecting Topics for Web Resource Discovery: Efficiency Issues in a Database Approach + Selecting Topics for Web Resource Discovery: Efficiency Issues in a Database Approach + Abdullah Al-Hamdani, Gultekin Ozsoyoglu Electrical Engineering and Computer Science Dept, Case Western Reserve University,

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Observational Learning with Modular Networks

Observational Learning with Modular Networks Observational Learning with Modular Networks Hyunjung Shin, Hyoungjoo Lee and Sungzoon Cho {hjshin72, impatton, zoon}@snu.ac.kr Department of Industrial Engineering, Seoul National University, San56-1,

More information

Descriptive Statistics, Standard Deviation and Standard Error

Descriptive Statistics, Standard Deviation and Standard Error AP Biology Calculations: Descriptive Statistics, Standard Deviation and Standard Error SBI4UP The Scientific Method & Experimental Design Scientific method is used to explore observations and answer questions.

More information

Multimodal Information Spaces for Content-based Image Retrieval

Multimodal Information Spaces for Content-based Image Retrieval Research Proposal Multimodal Information Spaces for Content-based Image Retrieval Abstract Currently, image retrieval by content is a research problem of great interest in academia and the industry, due

More information

Hash-Based Indexing 165

Hash-Based Indexing 165 Hash-Based Indexing 165 h 1 h 0 h 1 h 0 Next = 0 000 00 64 32 8 16 000 00 64 32 8 16 A 001 01 9 25 41 73 001 01 9 25 41 73 B 010 10 10 18 34 66 010 10 10 18 34 66 C Next = 3 011 11 11 19 D 011 11 11 19

More information