A Computational Model for Inference Chains in Expert Systems
|
|
- Joan Christiana Austin
- 5 years ago
- Views:
Transcription
1 A Comptational Moel for Inference Chains in Expert Systems József Sziray Department of Informatics Széchenyi University Egyetem tér, H-926 Győr Hngary Abstract: This paper eals with the calclations performe in the reasoning process of rle-base expert systems, where inference chains are applie. It presents a logic moel for representing the rles an the rle base of a given system. Also, the fact base of the same expert system is involve in the logic moel. The propose eqivalent representation manifests itself in a logic network. After that, a for-vale logic algebra is introce. This algebra is se for the calclations where forwar chaining is carrie ot. Next, the notion of line-vale jstification is escribe. This operation is applie in the backwar chaining process, also on the base of the previosly introce for-vale logic. The paper escribes two exact algorithms which serve for the forwar an backwar chaining processes. These algorithms make it possible to be implemente by a compter program, reslting in an efficient inference engine of an expert system. The achieve reslt enhances the reliability an sability of the intelligent software systems which is extremely important in embee environments. I. INTRODUCTION The application area of embee systems an the relate economical an reliability reqirements imply a specific harware-software strctre that is significantly ifferent from the resorces available in moern high-en systems. The relatively low processing performance, small memory space an the safety prescriptions have reslte in varios architectral properties an programming soltions. In case of real-time safety-critical systems the reaction time for the external events is a key isse. It means that the spee of the calclations is a critical factor. On the other han, the same applies to the memory consmption []. In many cases, artificial intelligence is realize within the frames of expert systems. This approach has gaine a wie-sprea se in controlling railway stations, angeros chemical processes, airplane flights, meical systems, etc. These applications are eqally relate to safety-oriente systems. As known, the most common form of storing knowlege in expert systems is the se of rles. It means that the knowlege base (long-term memory) consists of rles an facts. The other component of sch an expert system is the inference engine which is the most important factor for a sccessfl operation. An inference engine sally works in a fixe manner, for example, it col be esigne as either ata riven (i.e., forwar reasoning or forwar chaining) or goal riven (i.e., backwar reasoning or backwar chaining), however, most of the moern systems may well se both ways of reasoning [2]-[4]. The major concern relate to the inference processes is their excessive comptational amont. The algorithmic complexity erives from the fact that the task to be solve belongs to the so-calle NP-complete problems. As known, NP-complete problems have a comptational complexity for which there exists no pper bon by a finite-egree polynomial of the problem size. It means actally that the nmber of the comptational steps is finite, bt npreictable [5]-[7]. Here the problem size can be expresse by the nmber of rles in the knowlege base. De to the escribe featres of the comptations, the exection spee of the software is a crcial factor. This paper eals with the calclations performe in the reasoning process of rle-base expert systems, where inference chains are applie. It presents a logic moel for representing the rles an the rle base of a given system. Also, the fact base of the same expert system is involve in the logic moel. The propose eqivalent representation manifests itself in a logic network. After that, a for-vale logic algebra is introce. This algebra is se for the calclations where forwar chaining is carrie ot. Next, the notion of line-vale jstification is escribe. This operation is se in the backwar chaining process, also on the base of the previosly introce for-vale logic. The paper escribes two exact algorithms which serve for the forwar an backwar chaining processes. These algorithms make it possible to be implemente by a compter program, reslting in an efficient inference engine of an expert system.
2 II. FUNDAMENTAL CONCEPTS In a rle-base system, any rle consists of two parts: the IF part, calle the anteceent (premise or conition) an the THEN part, calle the conseqent (conclsion or action). The basic syntax of a rle is: IF <anteceent> THEN <conseqent>. In general, a rle can have mltiple anteceents joine by the keywors AND (conjnction), OR (isjnction), or a combination of both. Negation of an anteceent is also allowe. In this case the NOT operator is se. For example, IF the spill is liqi AND the spill ph < 6 AND the spill smell is vinegar THEN the spill material is acetic aci. Forwar chaining is an inference metho where rles are matche against facts to establish new facts, finally reaching a conclsion. In case of backwar chaining the system starts with what it wants to prove, an tries to establish the facts it nees to prove the initial fact. The necessarily applie components of the reasoning process constitte the so-calle inference chain. The knowlege base consists of the set of rles (rle base), an the set of facts (fact base), where the rle base is permanent, while the fact base contains an initial set of facts epening on the actal task to be solve, an it changes in accorance with the concrete reasoning process. The existent expert systems bil p the knowlege base in a sal ata-base strctre, an their inference engine applies an exhastive search throgh all the rles ring each cycle. The aim of the search is to fin the appropriate rles for which the anteceents or the conseqents satisfy the actal conitions. As a conseqence of this process, systems with a large set of rles (over rles) can be slow, an ths they may be nsitable for real-time applications, especially in the fiel of embee systems [3]. In the following a novel knowlege representation which is base on Boolean algebra an logic networks will be introce. On this base, a for-vale logic system is introce. This new moel reslts in a significantly more efficient inference processing than the classical one. The comptational improvement is estimate to be at least two orers of magnite, which is e to the reqire small memory space an fast operations in the logic omain. III. THE USE OF BOOLEAN ALGEBRA AND LOGIC NETWORKS The relationships of Boolean algebra can also be se for the rle-base systems. As it is well-known, Boolean logic involves two vales: (false) an (tre), where the following three basic operations are se: logic AND (enote by the mltiplication point ( ), logic OR (enote by the aition sign (+), an logic NOT (enote by an apostrophe scceeing the actal variable). For instance, A means the negation of A. It can be easily seen that the logic conitions within the rles can irectly be sbstitte by the corresponing Boolean operations an logic gates [7]. As an example let s consier the following set of rles, where the facts are enote by capital letters: IF C AND D THEN L, IF NOT E THEN K, IF L OR K THEN P, IF E AND M THEN Q. The Boolean escription of the above rles is the following: L = C D, K = E, P = L + K, Q = E M. These for rles can be represente by for logic gates: two AND gates, one NOT gate, an one OR gate. Now, if we connect the inpts an otpts of these gates in accorance with the ientical letters, the logic network of Figre will be obtaine. It shol be note here that in case of a simple irect rle, for example, IF U THEN V, its corresponing Boolean form will be V = U. This relation is represente by a YES gate which oes not moify its inpt vale.
3 C D L P K E M Q Fig.. The logic network for the rle base IV. THE USE OF A FOUR-VALUED LOGIC SYSTEM As known, the original Boolean algebra is base on a two-vale logic, i.e., on an. These are calle etermine vales as well. If a fact is tre in the inference process, then its logic variable will have the vale, if it is false then its vale is. However, as far as the general algebraic treatment of rle bases is concerne, it reqires more than these two vales. It can be prove that the nmber of necessary an sfficient vales is for. It means that in aition to an, two more vales are to be involve. These are as follows: ) The inifferent or on t care logic vale:. It is interprete in sch a way that the network line which carries this vale can take on either or freely, withot inflencing the comptational reslts. 2) The nknown logic vale:. In this case we have not any knowlege abot the concrete logic vale (, or ) of the network line carrying. The treatment of the for vales can be extene to the basic Boolean operations. This extension is smmarize in the trth tables of Table, below: TABLE. TRUTH TABLES OF THE FOUR-VALUED LOGIC SYSTEM AND OR NOT
4 Next we are going to show how these tables are se for forwar an backwar chaining. To reach this goal, consier the rle base above an the logic network belonging to it (see Figre ). Let the initial set of facts be as follows: T = {A, B, C, D, E, G, H}. A. The forwar chaining procere In or representation, the forwar chaining is performe in the following way: Step : C = an D =, since they both are in the fact base, which reslts in L =, so L is place in the fact base. Step 2: E =, becase E is in the fact base, from which it follows that K =, bt L = alone implies P =, so P is place in the fact base. Step 3: The fact base oes not contain M. In or logic system it can be interprete as M =. Thogh E =, e to the nknown vale of M, this is not sfficient to imply Q =. It means that Q =, ths Q cannot be place in the fact base. Here the final conclsion of the forwar chaining was that fact P is tre alone. The above comptational procere can also be calle forwar tracing of the logic vales. It means that we calclate the otpt vales of the logic gates with knowlege of the gate-inpt vales. B. The backwar chaining procere The same way as before, the backwar chaining procere involves backwar tracing of the logic vales throgh the network. Now the inpt vales of a gate have to be etermine with knowlege of the actal gateotpt vale. In this case the goal is to jstify that a primary otpt vale is, i.e., a selecte fact is tre. It reqires a sccessive ecision process which is also calle line-vale jstification [9] [2]. As known, line-vale jstification is a procere with the aim of sccessively assigning inpt vales to the logic elements in sch a way that they are consistent with each previosly assigne vale. (This concept is an axiliary calclation process for jstifying an initial set of logic vales in a network, first applie in the so-calle D-algorithm, for two-vale logic [9].) The backwar tracing of the logic vales can also be performe in accorance with the for-vale trth table. However, this principle iffers in some points from the forwar tracing. In case of forwar tracing, the otpt vale of a gate is to be calclate with knowlege of the inpt vales at the gate. If the inpts are given then they etermine the otpt nambigosly. On the other han, for a given otpt vale at a gate not only one inpt combination can be assigne, there may be more than one possible choices. If two-inpt gates are consiere, the possible choices are smmarize in Figre 2 an Figre 3. If the nmber of inpts at a gate were more than two, it wol increase the nmber of choices, bt wol not case any ifference in principle. No soltion exists Fig. 2. Backwar tracing choices for an AND gate
5 No soltion exists Fig. 3. Backwar tracing choices for an OR gate When performing this process the following viewpoints have to be taken into consieration: Only the etermine logic vales, an, have to be trace back, i.e., these vales are to be jstifie at the gate inpts. The vale of nees no jstification, so it is nnecessary to trace it back. The otpt vale of is jstifie only by the inpt vales of. Since oes not reqire jstification, it is worth assigning the minimm nmber of etermine vales to the gate inpts, while leaving the others at the vale of. In this logic system, the etermine vales an are consistent only with. This fact is to be taken into consieration when a network line has alreay a previosly assigne vale, an another vale is reqire at the same line. Whenever a contraiction, i.e., inconsistency occrs, we have to make a new choice or change the last possible ecision. In or example (Figre ), the comptations procee as follows: Step : The proof of P = : At first let K = an L =, which are the minimally necessary assignments. Now from K = it follows that E =, which is a contraiction, for E is in the fact base, so E = hols. Step 2: We have to moify or previos ecision: Now let L = an K =. In this way L = is jstifie by C = an D =, withot any contraiction. Step 3: It is nnecessary to trace back the vale K =, since the inifferent vale oes not reqire jstification. So the proof of P has been finishe. Step 4: The proof of Q = : This conition reqires that both inpts to the AND gate be, i.e., E = an M =. Since E is a member of the fact base, E = hols. However, M is missing from the fact base, which means that M =. In this case it is impossible to jstify (prove) that Q =. V. CONCLUDING REMARKS This paper has presente a logic moel which is irectly applicable for inference chains in expert systems. Both forwar an backwar reasoning can be performe on the base of the moel. In comparison with the conventionally organize knowlege bases, the calclations sing this for-vale logic can avantageosly be organize an carrie ot in embee compting systems e to the following reasons: The storage reqirement of the for logic vales at the network lines is negligible: only two bits are necessary an sfficient for coing them.
6 Comptations among logic vales are ab ovo fast an efficient. This fact manifests itself especially when bit-level implementation is applie. The ata-base strctre of a logic network is comparatively simple. Only the gate types an the inpt-otpt connections of the gates are to be encoe an store. The forwar an backwar tracing are carrie ot irectly on this network strctre. VI. REFERENCES [] Massa, A.J., Embee Software Development with ecos, Prentice-Hall, Inc., USA, 23. [2] Waterman, D.A., A Gie to Expert Systems, Aison-Wesley Pblishing Company, USA, 986. [3] Negnevitsky, M., Artificial Intelligence: A Gie to Intelligent Systems, Aison-Wesley Pblishing Company, Great Britain, 22. [4] Chen, Zh., Comptational Intelligence for Decision Spport, CRC Press LLC, USA, 2. [7] Cormen, T.H., Ch. E. Leiserson, R.L. Rivest, C. Stein: Introction to Algorithms, McGraw-Hill Pblishing Company, USA, 2. [8] Uyemra, J.P., A First Corse in Digital Systems Design: An Integrate Approach, Brooks-Cole Pblishing Company, USA, 2. [9] J.P. Roth, Diagnosis of Atomata Failres: a Calclation an a Metho, IBM Jornal of Research an Development, USA, Jly 966, Vol., pp , [] Abramovici, M., M.A. Breer, an A.D. Frieman, Digital Systems Testing an Testable Design, Compter Science Press, USA, 99. [] J. Sziray, Test Calclation for Logic Networks by Composite Jstification, Digital Processes, Great Britain, 979, Vol. 5, No. -2, pp [2] J. Sziray, Test Calclation for Logic an Timing Falts, IEEE International Workshop on RTL an High Level Testing, (WRTLT-24), Osaka, Japan, November -2, 24. Proceeings, pp [5] Lewis, H.R., Ch. H. Papaimitrio, Elements of the Theory of Comptation, Prentice-Hall, Inc., USA, 998. [6] Hopcroft, J.E., R. Motwani, J.D. Ullman, Introction to Atomata Theory, Langages, an Comptation, Secon Eition, Aison-Wesley Pblishing Company, USA, 2.
Cryptanalysis of Password Authentication Scheme Using Smart Cards
Jornal of Internet Technology an Secre Transactions (JITST, Volme 1, Isse 1, March 2012 Cryptanalysis of Passwor Athentication Scheme Using Smart Cars Sattar J Abo Department of Information Technology
More informationNetwork Coding-Based Protection
Network Coing-Base Protection Ahme E. Kamal Mirza Mohanespor epartment of Electrical an Compter Engineering Iowa State University Ames, IA 500 {kamal,mirzam}@iastate.e Abstract This paper serves as a ttorial
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationThe Volcano Optimizer Generator: Extensibility and Efficient Search
The Volcano Optimizer Generator: Extensibility and Efficient Search - Prithvi Lakshminarayanan - 301313262 Athors Goetz Graefe, Portland State University Won the Most Inflential Paper award in 1993 Worked
More informationMulti-lingual Multi-media Information Retrieval System
Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,
More informationThe Recommendation Mechanism in an Internet Information System with Time Impact Coefficient
International Jornal of Compter Science & Applications Vol. 3 Isse 3, pp 65-8 26 Technomathematics esearch Fonation The ecommenation Mechanism in an Internet Information System with Time Impact Coefficient
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationDYNAMIC ROAD STRUCTURE ESTIMATION
Blletin of the Transilania Uniersity of Braşo Vol. 8 (57) No. - 15 Series I: Engineering Sciences DYNAMIC ROAD STRUCTURE ESTIMATION S.M. GRIGORESCU 1 G. MĂCEŞANU 1 Abstract: The paper presents a roa strctre
More informationToday s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of
Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationPART I: Adding Instructions to the Datapath. (2 nd Edition):
EE57 Instrctor: G. Pvvada ===================================================================== Homework #5b De: check on the blackboard =====================================================================
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationDecoders. 3-Input Full Decoder
ecoders A fll decoder with n inpts has 2 n otpts. Let inpts be labeled In, In, In 2,..., In n, and let otpts be labeled Ot, Ot,..., Ot 2 n. A fll decoder fnctions as follows: Only one of otpts has vale
More informationMethod to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot
Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,
More informationBias of Higher Order Predictive Interpolation for Sub-pixel Registration
Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz
More informationNEW MULTI-BLOCK COMPUTATIONAL METHODOLOGY BY CHARACTERISTIC INTERFACE CONDITIONS WITH HIGH-ORDER INTERPOLATION
27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES NEW MULTI-BLOCK COMPUTATIONAL METHODOLOGY BY CHARACTERISTIC INTERFACE CONDITIONS WITH HIGH-ORDER INTERPOLATION Takahiro Smi* Takji Ktotaki ** an
More informationEEC 483 Computer Organization
EEC 483 Compter Organization Chapter 4.4 A Simple Implementation Scheme Chans Y The Big Pictre The Five Classic Components of a Compter Processor Control emory Inpt path Otpt path & Control 2 path and
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationMultiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET
Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search
More informationFig. 1 The principle of redundant actuation of parallel robots
Control an Calibration of Renantly Actate Parallel Robots Valasek, M., Bela, K., Florian, M. Czech echnical University in Prage Karlovo nam. 13, CZ-121 35 Praha 2 valasek@fsik.cvt.cz Abstract he principle
More informationReal-time mean-shift based tracker for thermal vision systems
9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University
More information6 Using Bookmarks Using Saved Pages Advanced Features
Overview... - Yahoo! Keitai... -3 Connecting to Yahoo! Keitai... -3 PC Site Browser... -5 PC Site Browser... -5 Connecting to PC Websites... -5 Page Operations... -8 Navigating Pages... -8 Jmping to Next
More informationPipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationDiscrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods
Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX
More informationIMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING
International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING
More informationMaster for Co-Simulation Using FMI
Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany
More informationPerformance of Multi-Channel IEEE WLANs with Bidirectional Flow Control - Extended Report
Performance of Mlti-Channel IEEE 82.11 WLANs with Biirectional Flow Control - Extene Report Song H. Ngyen, Lachlan L. H. Anrew, Hai L. V Centre for Avance Internet Architectres, Technical Report 1373B
More informationNonmonotonic and Paraconsistent Reasoning: From Basic Entailments to Plausible Relations. Ofer Arieli and Arnon Avron
Nonmonotonic and Paraconsistent Reasoning: From Basic Entailments to Plasible Relations Ofer Arieli and Arnon Avron Department of Compter Science, School of Mathematical Sciences, Tel-Aviv University,
More informationECE232: Hardware Organization and Design
ECE232: Harware Organization an Design ectre 11: Introction to IPs path apte from Compter Organization an Design, Patterson & Hennessy, CB IPS-lite processor Compter Want to bil a processor for a sbset
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationAugmenting the edge connectivity of planar straight line graphs to three
Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight
More informationCOMPOSITION OF STABLE SET POLYHEDRA
COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining
More informationHardware-Accelerated Free-Form Deformation
Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric
More informationDynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un
Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark
More informationPROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11
. Contents PROGRAM LICENSE AGREEMENT... LIMITED WARRANTY... 4 Trademarks... 6. Contents... 8 Preface... 2. Overview... 3 2. Jst one other important thing... 3 2.2 Abot the ser manal... 4 2.3 Manal System
More informationУДК OPTIMAL PARALLELING FOR SOLVING COMBINATORIAL MODELLING PROBLEMS USING GRAPHICS PROCESSING UNITS. S.M. Yefimenko
Yefienko S.M. УДК 519.254 OPTIMAL PARALLELING FOR SOLVING COMBINATORIAL MODELLING PROBLEMS USING GRAPHICS PROCESSING UNITS S.M. Yefienko International Research an Training Centre of Inforation Technologies
More informationMa Lesson 18 Section 1.7
Ma 15200 Lesson 18 Section 1.7 I Representing an Ineqality There are 3 ways to represent an ineqality. (1) Using the ineqality symbol (sometime within set-bilder notation), (2) sing interval notation,
More informationp-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram
p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram Istanbl Technical University, Department of Electronics and Telecommnications Engineering, Istanbl, Trkey ABSTRACT We consider the imization
More informationA choice relation framework for supporting category-partition test case generation
Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593
More informationLinear First-Order PDEs
MODULE 2: FIRST-ORDER PARTIAL DIFFERENTIAL EQUATIONS 9 Lecture 2 Linear First-Orer PDEs The most general first-orer linear PDE has the form a(x, y)z x + b(x, y)z y + c(x, y)z = (x, y), (1) where a, b,
More informationImage Denoising Algorithms
Image Denoising Algorithms Xiang Hao School of Compting, University of Utah, USA, hao@cs.tah.ed Abstract. This is a report of an assignment of the class Mathematics of Imaging. In this assignment, we first
More informationMinimal Edge Addition for Network Controllability
This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,
More informationCurves and Surfaces. CS 537 Interactive Computer Graphics Prof. David E. Breen Department of Computer Science
Crves and Srfaces CS 57 Interactive Compter Graphics Prof. David E. Breen Department of Compter Science E. Angel and D. Shreiner: Interactive Compter Graphics 6E Addison-Wesley 22 Objectives Introdce types
More informationAn Optimization of Granular Network by Evolutionary Methods
An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth
More informationSolutions to Tutorial 1 (Week 8)
The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two
More informationh-vectors of PS ear-decomposable graphs
h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,
More informationEarly Results of the CASCADE Technology Demonstration Payload on CASSIOPE
SSC14-XII-5 Early Reslts of the CSCDE Technology Demonstration Payloa on CSSIOPE Mark Senez, Jeff Hemingway, Brce Ents MD Systems Lt. 13800 Commerce Parkway, Richmon BC, Canaa, V6V 2J3; 604-231-2327 msenez@macorporation.com.w.
More informationNew-Sum: A Novel Online ABFT Scheme For General Iterative Methods
New-Sm: A Novel Online ABFT Scheme For General Iterative Methods Dingwen Tao (University of California, Riverside) Shaiwen Leon Song (Pacific Northwest National Laboratory) Sriram Krishnamoorthy (Pacific
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationStatistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem
Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationFast Ray Tetrahedron Intersection using Plücker Coordinates
Fast Ray Tetrahedron Intersection sing Plücker Coordinates Nikos Platis and Theoharis Theoharis Department of Informatics & Telecommnications University of Athens Panepistemiopolis, GR 157 84 Ilissia,
More informationAlliances and Bisection Width for Planar Graphs
Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.
More informationProf. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:
EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i
More informationReview Multicycle: What is Happening. Controlling The Multicycle Design
Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em
More informationTowards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions
Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School
More informationAdvances in Environmental Biology
AESI Jornals Advances in Environmental Biology ISS-1995-0756 EISS-1998-1066 Jornal home page: http://www.aensiweb.com/aeb/ The Generic Mathematical Model of Freency Sampling Digital Filters with Shiftable
More informationTDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction
Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard
More informationThis chapter is based on the following sources, which are all recommended reading:
Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter
More informationCongestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems
Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationSwitched state-feedback controllers with multi-estimators for MIMO systems
Proceedings of the th WEA Int Conf on COMPUTATIONAL INTELLIGENCE MAN-MACHINE YTEM AND CYBERNETIC Venice Ital November - 6 89 witched state-feedback controllers with mlti-estimators for MIMO sstems LIBOR
More informationVirtuOS: an operating system with kernel virtualization
VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design
More informationChapter 6 Enhancing Performance with. Pipelining. Pipelining. Pipelined vs. Single-Cycle Instruction Execution: the Plan. Pipelining: Keep in Mind
Pipelining hink of sing machines in landry services Chapter 6 nhancing Performance with Pipelining 6 P 7 8 9 A ime ask A B C ot pipelined Assme 3 min. each task wash, dry, fold, store and that separate
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationCS 4204 Computer Graphics
CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types
More informationEnergy Efficient Polynomial Based Group Key Management Protocol for Secure Group Communications in MANET
International Jornal of Applie Engineering Research ISSN 0973-4562 Volme 11, Nmber 9 (2016) pp 6701-6705 Research Inia Pblications. http://www.ripblication.com Energy Efficient Polynomial Base Grop Key
More informationInteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:
Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela
More informationCS 251, Winter 2019, Assignment % of course mark
CS 25, Winter 29, Assignment.. 3% of corse mark De Wednesday, arch 3th, 5:3P Lates accepted ntil Thrsday arch th, pm with a 5% penalty. (7 points) In the diagram below, the mlticycle compter from the corse
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationTriangle-Free Planar Graphs as Segments Intersection Graphs
Triangle-ree Planar Graphs as Segments Intersection Graphs N. de Castro 1,.J.Cobos 1, J.C. Dana 1,A.Márqez 1, and M. Noy 2 1 Departamento de Matemática Aplicada I Universidad de Sevilla, Spain {natalia,cobos,dana,almar}@cica.es
More informationPicking and Curves Week 6
CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking
More informationFunctions of Combinational Logic
CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationSemantic segmentation is the task of labeling every pixel in
Deep Learning for Visal Understanding: Part Anrag Arnab, Shai Zheng, Sadeep Jayasmana, Bernardino Romera-Paredes, Måns Larsson, Alexander Kirillov, Bogdan Savchynskyy, Carsten Rother, Fredrik Kahl, and
More informationNETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS
ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationA Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks
Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationFactors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms
Factors Inflencing Performance of Firefly and Particle Swarm Optimization Algorithms Damanjeet Kar, UIET, Panjab University, Chandigarh Abstract In this paper, two natre inspired meta heristic approaches
More informationThe Depth Discontinuity Occlusion Camera
The Depth Discontinity Occlsion Camera Voic Popesc * Daniel Aliaga Pre University Pre University Figre 1 Depth image, DDOC reerence image, an corresponing pair o rames. The DDOC reerence image alleviates
More informationResolving Linkage Anomalies in Extracted Software System Models
Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program
More informationContent Content Introduction
Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 15: Virtal Address Space Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian OS Abstractions Applications
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More informationEXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION
EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage
More informationDesigning and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming
Designing and Optimization of Heterogeneos OTN/DWDM Networks with Intermediate Grooming Afonso Oliveira IST (METI afonso.oliveira@ist.tl.pt ABSTRACT The coexistence of annels with different bitrates in
More informationRefinement calculus for reactive systems
Refinement calcls for reactive systems Stavros Tripakis UC Berkeley and Aalto University Joint work with Viorel Preoteasa (Aalto), Ben Lickly (Berkeley), Thomas Henzinger (IST Astria), and Edward Lee (Berkeley)
More information1048: Computer Organization
48: Compter Organization Lectre 5 Datapath and Control Lectre5B - mlticycle implementation (cwli@twins.ee.nct.ed.tw) 5B- Recap: A Single-Cycle Processor PCSrc 4 Add Shift left 2 Add ALU reslt PC address
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationThe effectiveness of PIES comparing to FEM and BEM for 3D elasticity problems
The effectiveness of PIES comparing to FEM and BEM for 3D elasticit problems A. Boltc, E. Zienik, K. Sersen Faclt of Mathematics and Compter Science, Universit of Bialstok, Sosnowa 64, 15-887 Bialstok,
More informationA Duality Based Approach for Realtime TV-L 1 Optical Flow
A Duality Base Approach for Realtime TV-L 1 Optical Flow C. Zach 1, T. Pock 2, an H. Bischof 2 1 VRVis Research Center 2 Institute for Computer Graphics an Vision, TU Graz Abstract. Variational methos
More informationA Highly-Digital Frequency Synthesizer Using Ring Oscillator Frequency-to-Digital Conversion and Noise Cancellation
A Highly- Freqency Synthesizer Using Ring Oscillator Freqency-to- Conversion and Noise Cancellation Colin Weltin-W,2, Gobi Zhao, Ian Galton University of California at San Diego, La Jolla, CA 2 Analog
More information