DM and Cluster Identification Algorithm
|
|
- Kelly Bond
- 6 years ago
- Views:
Transcription
1 DM and Cluster Identification Algorithm Andrew Kusiak, Professor oratory Seamans Center Iowa City, Iowa - Tel: 9-9 Fax: 9- andrew-kusiak@uiowa.edu Homepage: Cluster Analysis Decomposition Aggregation Grouping Models Cluster Representation Matrix formulation Mathematical programming formulation Graph formulation B A C E G D F H Mutually exclusive regions Cluster Representation Cluster Representation G B A C D H E F A B C E F D G H Overlapping regions Hierarchy Page
2 Cluster Representation Clusters A... B... C... D... Objects E... F... G... H... Two types of data Object with decisions Object without decisions Fuzzy clusters Clustering Data with Decisions Matrix Formulation Method Feature GF - GF- Ignore decisions Treat the objects as data without decisions Method Object Yes Red Yes Red GO- GF- Red Red Yes Yes Group objects according to the decisions Treat each group with decisions as a separate data set Matrix Formulation Solving the Clustering Problem: Binary Matrix Formulation GO- { GO- { Overlapping feature Similarity coefficient methods Sorting based algorithms Bond energy algorithm Cost-based method Cluster identification algorithm Extended cluster identification algorithm Page
3 Cluster Identification Algorithm Cluster Identification Algorithm Step 0. Set iteration number k =. Step. Select row i of incidence matrix [aij](k) and draw a horizontal line hi through it ([aij](k) is read: matrix [aij] at iteration k ). Step. For each entry of crossed by the horizontal line hi draw a vertical line vj. Step. For each entry of crossed-once by the vertical line vj draw a horizontal line hk. Step. Repeat steps and until there are no more crossed-once entries of in [aij](k). All crossed-twice entries in [aij](k) form row cluster RC-k and column cluster CC-k. Step. Transform the incidence matrix [aij](k) into [aij](k+) by removing rows and columns corresponding to the horizontal and vertical lines drawn in steps through. Step. If matrix [aij](k+) = 0 (where 0 denotes a matrix with all empty elements ), stop; otherwise set k = k + and go to step. Example Incidence matrix Object Feature 8 8 Next Step 8 Delete all double-crossed elements Page
4 Resultant Matrix Iteration Iteration v v v v h h h h RC- RC- RC- Final decomposition result CC- CC- CC- 8 (a) Three types of matrices (b) (c) a b c d e f g h a b c d e f g h a b c d e f (a) decomposable matrix (b) non-decomposable matrix with overlapping features (c) non-decomposable matrix with objects Other algorithms CI Clustering with DM Algorithms F F F F F F Transformed Data Set Dummy decision F F F F F F D One One One One One One One 8 Two F F F F F F Dummy object Page
5 Decision Rules F F F F F F D One One One One One One Rule. (F = 0) THEN (D = One); [, 8.%, 00.00%][,,,,, ] Rule. (F = 0) THEN (D = One); [,.%, 00.00%][,,, ] Rule. (F = ) AND (F = ) THEN (D = Two); [, 00.00%, 00.00%][8] One 8 Two Clustered Matrix F F F F F F Rule. (F = 0) THEN (D = One); [,.%, 00.00%][,,, ] CI Algorithm Reference F F F F F F F F F F F F A. Kusiak, Computational Intelligence in Design and Manufacturing, John Wiley, New York, 000. Page
Cluster Analysis in Data Mining
Cluster Analysis in Data Mining Part II Andrew Kusiak 9 Seamans Center Iowa City, IA - 7 andrew-kusiak@uiowa.edu http://www.icaen.uiowa.edu/~ankusiak Tel. 9-9 Cluster Analysis Decomposition Aggregation
More informationContents PROCESS DECOMPOSITION INTRODUCTION. Decomposition Approaches Desirable Properties
PRCESS DECMPSTN Contents Andrew Kusiak ntelligent Systems Laboratory Seamans Center The University of owa owa City, owa - Tel: - Fax: - andrew-kusiak@uiowa.edu http://www.icaen.uiowa.edu/~ankusiak NTRDUCTN
More informationEvolutionary Computation: Solution Representation. Set Covering Problem. Set Covering Problem. Set Covering Problem 2/28/2008.
Evolutionary Computation: Solution Representation Andrew Kusiak 9 Seamans Center Iowa City, Iowa - Tel: 9-9 Fax: 9-669 andrew-kusiak@uiowa.edu http://www.icaen.uiowa.edu/~ankusiak Set Covering Problem
More informationOutline. Graph Representation of Dependencies. Dependency (Design) Structure Matrix
Dependency (Design) Structure Matrix Outline Andrew Kusiak Seamans Center Iowa City, Iowa - Tel: - ax: - andrew-kusiak@uiowa.edu http://www.icaen.uiowa.edu/~ankusiak DSM definition DSM and innovation Topological
More informationBalancing the flow. Part 3. Two-Machine Flowshop SCHEDULING SCHEDULING MODELS. Two-Machine Flowshop Two-Machine Job Shop Extensions
PRODUCTION PLANNING AND SCHEDULING Part 3 Andrew Kusiak 3 Seamans Center Iowa City, Iowa 54-57 Tel: 3-335 534 Fax: 3-335 566 andrew-kusiak@uiowa.edu http://www.icaen.uiowa.edu/~ankusiak SCHEDULING Assignment
More informationData Set. What is Data Mining? Data Mining (Big Data Analytics) Illustrative Applications. What is Knowledge Discovery?
Data Mining (Big Data Analytics) Andrew Kusiak Intelligent Systems Laboratory 2139 Seamans Center The University of Iowa Iowa City, IA 52242-1527 andrew-kusiak@uiowa.edu http://user.engineering.uiowa.edu/~ankusiak/
More informationWhat is Data Mining? Data Mining. Data Mining Architecture. Illustrative Applications. Pharmaceutical Industry. Pharmaceutical Industry
Data Mining Andrew Kusiak Intelligent Systems Laboratory 2139 Seamans Center The University it of Iowa Iowa City, IA 52242-1527 andrew-kusiak@uiowa.edu http://www.icaen.uiowa.edu/~ankusiak Tel. 319-335
More informationWhat is Data Mining? Data Mining. Data Mining Architecture. Illustrative Applications. Pharmaceutical Industry. Pharmaceutical Industry
Data Mining Andrew Kusiak Intelligent Systems Laboratory 2139 Seamans Center The University of Iowa Iowa City, IA 52242-1527 andrew-kusiak@uiowa.edu http://www.icaen.uiowa.edu/~ankusiak Tel. 319-335 5934
More informationData Mining and Evolutionary Computation Algorithms for Process Modeling and Optimization
Data Mining and Evolutionary Computation Algorithms for Process Modeling and Optimization Zhe Song, Andrew Kusiak 2139 Seamans Center Iowa City, Iowa 52242-1527 andrew-kusiak@uiowa.edu Tel: 319-335-5934
More informationIterative Signature Algorithm for the Analysis of Large-Scale Gene Expression Data. By S. Bergmann, J. Ihmels, N. Barkai
Iterative Signature Algorithm for the Analysis of Large-Scale Gene Expression Data By S. Bergmann, J. Ihmels, N. Barkai Reasoning Both clustering and Singular Value Decomposition(SVD) are useful tools
More informationThe University of Iowa Intelligent Systems Laboratory The University of Iowa Intelligent Systems Laboratory
Warehousing Outline Andrew Kusiak 2139 Seamans Center Iowa City, IA 52242-1527 andrew-kusiak@uiowa.edu http://www.icaen.uiowa.edu/~ankusiak Tel. 319-335 5934 Introduction warehousing concepts Relationship
More informationSolving ONE S interval linear assignment problem
RESEARCH ARTICLE OPEN ACCESS Solving ONE S interval linear assignment problem Dr.A.Ramesh Kumar 1,S. Deepa 2, 1 Head, Department of Mathematics, Srimad Andavan Arts and Science College (Autonomous), T.V.Kovil,
More informationStructural Mechanics: Graph and Matrix Methods
Structural Mechanics: Graph and Matrix Methods A. Kaveh Department of Civil Engineering Technical University of Vienna Austria RESEARCH STUDIES PRESS LTD. Taunton, Somerset, England 0 JOHN WILEY & SONS
More informationChapter 3 Dynamic programming
Chapter 3 Dynamic programming 1 Dynamic programming also solve a problem by combining the solutions to subproblems. But dynamic programming considers the situation that some subproblems will be called
More informationParallelizing The Matrix Multiplication. 6/10/2013 LONI Parallel Programming Workshop
Parallelizing The Matrix Multiplication 6/10/2013 LONI Parallel Programming Workshop 2013 1 Serial version 6/10/2013 LONI Parallel Programming Workshop 2013 2 X = A md x B dn = C mn d c i,j = a i,k b k,j
More informationAn Introduction to Graph Theory
An Introduction to Graph Theory CIS008-2 Logic and Foundations of Mathematics David Goodwin david.goodwin@perisic.com 12:00, Friday 17 th February 2012 Outline 1 Graphs 2 Paths and cycles 3 Graphs and
More informationEXTENSION. a 1 b 1 c 1 d 1. Rows l a 2 b 2 c 2 d 2. a 3 x b 3 y c 3 z d 3. This system can be written in an abbreviated form as
EXTENSION Using Matrix Row Operations to Solve Systems The elimination method used to solve systems introduced in the previous section can be streamlined into a systematic method by using matrices (singular:
More informationOne-mode Additive Clustering of Multiway Data
One-mode Additive Clustering of Multiway Data Dirk Depril and Iven Van Mechelen KULeuven Tiensestraat 103 3000 Leuven, Belgium (e-mail: dirk.depril@psy.kuleuven.ac.be iven.vanmechelen@psy.kuleuven.ac.be)
More information(5.2) 151 Math Exercises. Graph Terminology and Special Types of Graphs. Malek Zein AL-Abidin
King Saud University College of Science Department of Mathematics 151 Math Exercises (5.2) Graph Terminology and Special Types of Graphs Malek Zein AL-Abidin ه Basic Terminology First, we give some terminology
More informationGraphs and Graph Algorithms. Slides by Larry Ruzzo
Graphs and Graph Algorithms Slides by Larry Ruzzo Goals Graphs: defns, examples, utility, terminology Representation: input, internal Traversal: Breadth- & Depth-first search Three Algorithms: Connected
More informationGraph Theory: Applications and Algorithms
Graph Theory: Applications and Algorithms CIS008-2 Logic and Foundations of Mathematics David Goodwin david.goodwin@perisic.com 11:00, Tuesday 21 st February 2012 Outline 1 n-cube 2 Gray Codes 3 Shortest-Path
More informationIntroduction to Engineering Systems, ESD.00. Networks. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow
Introduction to Engineering Systems, ESD.00 Lecture 7 Networks Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow The Bridges of Königsberg The town of Konigsberg in 18 th century
More informationIntroduction. Computer Vision & Digital Image Processing. Preview. Basic Concepts from Set Theory
Introduction Computer Vision & Digital Image Processing Morphological Image Processing I Morphology a branch of biology concerned with the form and structure of plants and animals Mathematical morphology
More informationGraph Theory. Part of Texas Counties.
Graph Theory Part of Texas Counties. We would like to visit each of the above counties, crossing each county only once, starting from Harris county. Is this possible? This problem can be modeled as a graph.
More information3/2/2010. SCADA Defined. What They re Generally Best At (Although All Systems Vary) Three Levels of SCADA Systems
SCADA Data Mining and IT Needs to Improve Plant Operation and Downtime AWEA Wind Power Asset Management Workshop Adopted for Wind Power Management class http://www.icaen.uiowa.edu/~ie_155/ by Andrew Kusiak
More informationJME Language Reference Manual
JME Language Reference Manual 1 Introduction JME (pronounced jay+me) is a lightweight language that allows programmers to easily perform statistic computations on tabular data as part of data analysis.
More informationData Mining. Dr. Raed Ibraheem Hamed. University of Human Development, College of Science and Technology Department of Computer Science
Data Mining Dr. Raed Ibraheem Hamed University of Human Development, College of Science and Technology Department of Computer Science 06 07 Department of CS - DM - UHD Road map Cluster Analysis: Basic
More informationAutomatic Drawing for Tokyo Metro Map
Automatic Drawing for Tokyo Metro Map Masahiro Onda 1, Masaki Moriguchi 2, and Keiko Imai 3 1 Graduate School of Science and Engineering, Chuo University monda@imai-lab.ise.chuo-u.ac.jp 2 Meiji Institute
More informationSolving Systems of Equations Using Matrices With the TI-83 or TI-84
Solving Systems of Equations Using Matrices With the TI-83 or TI-84 Dimensions of a matrix: The dimensions of a matrix are the number of rows by the number of columns in the matrix. rows x columns *rows
More informationGeneralized Network Flow Programming
Appendix C Page Generalized Network Flow Programming This chapter adapts the bounded variable primal simplex method to the generalized minimum cost flow problem. Generalized networks are far more useful
More information(Team Name) (Project Title) Software Design Document. Student Name (s):
(Team Name) (Project Title) Software Design Document Student Name (s): TABLE OF CONTENTS 1. INTRODUCTION 2 1.1Purpose 2 1.2Scope 2 1.3Overview 2 1.4Reference Material 2 1.5Definitions and Acronyms 2 2.
More informationNeural Networks. Neural Network. Neural Network. Neural Network 2/21/2008. Andrew Kusiak. Intelligent Systems Laboratory Seamans Center
Neural Networks Neural Network Input Andrew Kusiak Intelligent t Systems Laboratory 2139 Seamans Center Iowa City, IA 52242-1527 andrew-kusiak@uiowa.edu http://www.icaen.uiowa.edu/~ankusiak Tel. 319-335
More informationOrange3 Data Fusion Documentation. Biolab
Biolab Mar 07, 2018 Widgets 1 IMDb Actors 1 2 Chaining 5 3 Completion Scoring 9 4 Fusion Graph 13 5 Latent Factors 17 6 Matrix Sampler 21 7 Mean Fuser 25 8 Movie Genres 29 9 Movie Ratings 33 10 Table
More informationACTIVITY-BASED CLASS DESIGN: AN ANALYTICAL METHOD FOR DERIVING OBJECT-ORIENTED CLASSES
ACTIVITY-BASED CLASS DESIGN: AN ANALYTICAL METHOD FOR DERIVING OBJECT-ORIENTED CLASSES Dr. Yousif Mustafa, West Liberty State College, ymustafa@wlsc.edu Dr. Ayodele Awofala, DaimlerChrysler Corporation,
More informationExercise Set Decide whether each matrix below is an elementary matrix. (a) (b) (c) (d) Answer:
Understand the relationships between statements that are equivalent to the invertibility of a square matrix (Theorem 1.5.3). Use the inversion algorithm to find the inverse of an invertible matrix. Express
More informationSemi-Supervised Clustering with Partial Background Information
Semi-Supervised Clustering with Partial Background Information Jing Gao Pang-Ning Tan Haibin Cheng Abstract Incorporating background knowledge into unsupervised clustering algorithms has been the subject
More informationMorphological Image Processing
Morphological Image Processing Ranga Rodrigo October 9, 29 Outline Contents Preliminaries 2 Dilation and Erosion 3 2. Dilation.............................................. 3 2.2 Erosion..............................................
More informationInformation Retrieval and Web Search Engines
Information Retrieval and Web Search Engines Lecture 7: Document Clustering December 4th, 2014 Wolf-Tilo Balke and José Pinto Institut für Informationssysteme Technische Universität Braunschweig The Cluster
More informationCollaborative Rough Clustering
Collaborative Rough Clustering Sushmita Mitra, Haider Banka, and Witold Pedrycz Machine Intelligence Unit, Indian Statistical Institute, Kolkata, India {sushmita, hbanka r}@isical.ac.in Dept. of Electrical
More informationComputing Submesh Reliability in Two-Dimensional Meshes
Computing Submesh Reliability in Two-Dimensional Meshes Chung-yen Chang and Prasant Mohapatra Department of Electrical and Computer Engineering Iowa State University Ames, Iowa 511 E-mail: prasant@iastate.edu
More informationTAGUCHI TECHNIQUES FOR 2 k FRACTIONAL FACTORIAL EXPERIMENTS
Hacettepe Journal of Mathematics and Statistics Volume 4 (200), 8 9 TAGUCHI TECHNIQUES FOR 2 k FRACTIONAL FACTORIAL EXPERIMENTS Nazan Danacıoğlu and F.Zehra Muluk Received 0: 0: 200 : Accepted 14: 06:
More informationSAS Visual Analytics 8.2: Working with Report Content
SAS Visual Analytics 8.2: Working with Report Content About Objects After selecting your data source and data items, add one or more objects to display the results. SAS Visual Analytics provides objects
More informationMachine Problem 8 - Mean Field Inference on Boltzman Machine
CS498: Applied Machine Learning Spring 2018 Machine Problem 8 - Mean Field Inference on Boltzman Machine Professor David A. Forsyth Auto-graded assignment Introduction Mean-Field Approximation is a useful
More informationPackage sparsereg. R topics documented: March 10, Type Package
Type Package Package sparsereg March 10, 2016 Title Sparse Bayesian Models for Regression, Subgroup Analysis, and Panel Data Version 1.2 Date 2016-03-01 Author Marc Ratkovic and Dustin Tingley Maintainer
More informationASIAN JOURNAL OF MANAGEMENT RESEARCH Online Open Access publishing platform for Management Research
ASIAN JOURNAL OF MANAGEMENT RESEARCH Online Open Access publishing platform for Management Research Copyright 2010 All rights reserved Integrated Publishing association Review Article ISSN 2229 3795 The
More informationPolarization Handedness Convention
0 July 207 Polarization Handedness When light is elliptically polarized, the electric field (E field) vector rotates with respect to a Cartesian coordinate system as it propagates. The PAX000 and PAX Polarimeter
More informationMCL. (and other clustering algorithms) 858L
MCL (and other clustering algorithms) 858L Comparing Clustering Algorithms Brohee and van Helden (2006) compared 4 graph clustering algorithms for the task of finding protein complexes: MCODE RNSC Restricted
More informationFeature Extraction from Wavelet Coefficients for Pattern Recognition Tasks. Rajat Aggarwal Chandu Sharvani Koteru Gopinath
Feature Extraction from Wavelet Coefficients for Pattern Recognition Tasks Rajat Aggarwal Chandu Sharvani Koteru Gopinath Introduction A new efficient feature extraction method based on the fast wavelet
More informationCHAPTER IX MULTI STAGE DECISION MAKING APPROACH TO OPTIMIZE THE PRODUCT MIX IN ASSIGNMENT LEVEL UNDER FUZZY GROUP PARAMETERS
CHAPTER IX MULTI STAGE DECISION MAKING APPROACH TO OPTIMIZE THE PRODUCT MIX IN ASSIGNMENT LEVEL UNDER FUZZY GROUP PARAMETERS Introduction: Aryanezhad, M.B [2004] showed that one of the most important decisions
More informationCS 177. Lists and Matrices. Week 8
CS 177 Lists and Matrices Week 8 1 Announcements Project 2 due on 7 th March, 2015 at 11.59 pm Table of Contents Lists Matrices Traversing a Matrix Construction of Matrices 3 Just a list of numbers 1D
More informationDrawing Problem. Possible properties Minimum number of edge crossings Small area Straight or short edges Good representation of graph structure...
Graph Drawing Embedding Embedding For a given graph G = (V, E), an embedding (into R 2 ) assigns each vertex a coordinate and each edge a (not necessarily straight) line connecting the corresponding coordinates.
More informationInformation Retrieval and Web Search Engines
Information Retrieval and Web Search Engines Lecture 7: Document Clustering May 25, 2011 Wolf-Tilo Balke and Joachim Selke Institut für Informationssysteme Technische Universität Braunschweig Homework
More informationRuled Based Approach for Scheduling Flow-shop and Job-shop Problems
Ruled Based Approach for Scheduling Flow-shop and Job-shop Problems Mohammad Komaki, Shaya Sheikh, Behnam Malakooti Case Western Reserve University Systems Engineering Email: komakighorban@gmail.com Abstract
More information10 Introduction to Distributed Computing
CME 323: Distributed Algorithms and Optimization, Spring 2016 http://stanford.edu/~rezab/dao. Instructor: Reza Zadeh, Matroid and Stanford. Lecture 10, 4/27/2016. Scribed by Ting-Po Lee and Yu-Sheng Chen.
More informationRepresentation of Graphs
Acta Informatica 17, 215-219 (1982) 9 Springer-Verlag 1982 Representation of Graphs Alon Itail and Michael Rodeh 2 t Computer Science Department, Technion - Israel Institute of Technology, Haifa, Israel
More informationlpsymphony - Integer Linear Programming in R
lpsymphony - Integer Linear Programming in R Vladislav Kim October 30, 2017 Contents 1 Introduction 2 2 lpsymphony: Quick Start 2 3 Integer Linear Programming 5 31 Equivalent and Dual Formulations 5 32
More informationCS 533 Information Retrieval Systems
CS 533 Information Retrieval Systems Prepared by: Mehmet Ali Abbasoğlu Week No 1 Users query Information Retrieval Systems (IRS) to get their needed relevant documents Information Retrieval Systems are
More informationContents Systems of Linear Equations and Determinants
Contents 6. Systems of Linear Equations and Determinants 2 Example 6.9................................. 2 Example 6.10................................ 3 6.5 Determinants................................
More informationMathematics for Decision Making: An Introduction. Lecture 4
Mathematics for Decision Making: An Introduction Lecture 4 Matthias Köppe UC Davis, Mathematics January 15, 2009 4 1 Modeling the TSP as a standard optimization problem, I A key observation is that every
More informationAn Improved Decomposition Algorithm and Computer Technique for Solving LPs
International Journal of Basic & Applied Sciences IJBAS-IJENS Vol: 11 No: 0 12 An Improved Decomposition Algorithm and Computer Technique for Solving LPs Md. Istiaq Hossain and M Babul Hasan Abstract -
More informationOPERATIONS RESEARCH. Transportation and Assignment Problems
OPERATIONS RESEARCH Chapter 2 Transportation and Assignment Problems Prof Bibhas C Giri Professor of Mathematics Jadavpur University West Bengal, India E-mail : bcgirijumath@gmailcom MODULE-3: Assignment
More informationGraph Theory for Modelling a Survey Questionnaire Pierpaolo Massoli, ISTAT via Adolfo Ravà 150, Roma, Italy
Graph Theory for Modelling a Survey Questionnaire Pierpaolo Massoli, ISTAT via Adolfo Ravà 150, 00142 Roma, Italy e-mail: pimassol@istat.it 1. Introduction Questions can be usually asked following specific
More informationNormalization. Un Normalized Form (UNF) Share. Download the pdf version of these notes.
Normalization Share Download the pdf version of these notes. While designing a database out of an entity relationship model, the main problem existing in that raw database is redundancy. Redundancy is
More informationCounting Pigeonhole principle
CS 44 Discrete Mathematics for CS Lecture 23 Counting Pigeonhole principle Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Course administration Homework 7 is due today Homework 8 is out due on
More informationTransportation problem
Transportation problem It is a special kind of LPP in which goods are transported from a set of sources to a set of destinations subjects to the supply and demand of the source and destination, respectively,
More information1 Non greedy algorithms (which we should have covered
1 Non greedy algorithms (which we should have covered earlier) 1.1 Floyd Warshall algorithm This algorithm solves the all-pairs shortest paths problem, which is a problem where we want to find the shortest
More informationSUGGESTED SOLUTION CA FINAL MAY 2017 EXAM
SUGGESTED SOLUTION CA FINAL MAY 2017 EXAM ADVANCED MANAGEMENT ACCOUNTING Test Code - F M J 4 0 1 6 BRANCH - (MULTIPLE) (Date : 11.02.2017) Head Office : Shraddha, 3 rd Floor, Near Chinai College, Andheri
More informationTransportation Problems
Transportation Problems Transportation is considered as a special case of LP Reasons? it can be formulated using LP technique so is its solution 1 (to p2) Here, we attempt to firstly define what are them
More informationGraphBLAS Mathematics - Provisional Release 1.0 -
GraphBLAS Mathematics - Provisional Release 1.0 - Jeremy Kepner Generated on April 26, 2017 Contents 1 Introduction: Graphs as Matrices........................... 1 1.1 Adjacency Matrix: Undirected Graphs,
More informationTwo Dimensional Wavelet and its Application
RESEARCH CENTRE FOR INTEGRATED MICROSYSTEMS - UNIVERSITY OF WINDSOR Two Dimensional Wavelet and its Application Iman Makaremi 1 2 RESEARCH CENTRE FOR INTEGRATED MICROSYSTEMS - UNIVERSITY OF WINDSOR Outline
More informationBOOLEAN MATRIX FACTORIZATIONS. with applications in data mining Pauli Miettinen
BOOLEAN MATRIX FACTORIZATIONS with applications in data mining Pauli Miettinen MATRIX FACTORIZATIONS BOOLEAN MATRIX FACTORIZATIONS o THE BOOLEAN MATRIX PRODUCT As normal matrix product, but with addition
More informationCHAPTER 3 MAINTENANCE STRATEGY SELECTION USING AHP AND FAHP
31 CHAPTER 3 MAINTENANCE STRATEGY SELECTION USING AHP AND FAHP 3.1 INTRODUCTION Evaluation of maintenance strategies is a complex task. The typical factors that influence the selection of maintenance strategy
More informationALGORITHMIC APPROACH TO UNBALANCED FUZZY TRANSPORTATION PROBLEM. A. Samuel 1, P. Raja 2
International Journal of Pure and Applied Mathematics Volume 113 No. 5 2017, 553-561 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 10.12732/ijpam.v113i5.3
More informationEE/CSCI 451 Midterm 1
EE/CSCI 451 Midterm 1 Spring 2018 Instructor: Xuehai Qian Friday: 02/26/2018 Problem # Topic Points Score 1 Definitions 20 2 Memory System Performance 10 3 Cache Performance 10 4 Shared Memory Programming
More informationAnalyzing the Peeling Decoder
Analyzing the Peeling Decoder Supplemental Material for Advanced Channel Coding Henry D. Pfister January 5th, 01 1 Introduction The simplest example of iterative decoding is the peeling decoder introduced
More informationLecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University)
Transportation and Assignment Problems The transportation model is a special class of linear programs. It received this name because many of its applications involve determining how to optimally transport
More informationGraph drawing in spectral layout
Graph drawing in spectral layout Maureen Gallagher Colleen Tygh John Urschel Ludmil Zikatanov Beginning: July 8, 203; Today is: October 2, 203 Introduction Our research focuses on the use of spectral graph
More informationDynamic Programmming: Activity Selection
Dynamic Programmming: Activity Selection Select the maximum number of non-overlapping activities from a set of n activities A = {a 1,, a n } (sorted by finish times). Identify easier subproblems to solve.
More informationLinear Equation Systems Iterative Methods
Linear Equation Systems Iterative Methods Content Iterative Methods Jacobi Iterative Method Gauss Seidel Iterative Method Iterative Methods Iterative methods are those that produce a sequence of successive
More informationFingerprint Image Compression
Fingerprint Image Compression Ms.Mansi Kambli 1*,Ms.Shalini Bhatia 2 * Student 1*, Professor 2 * Thadomal Shahani Engineering College * 1,2 Abstract Modified Set Partitioning in Hierarchical Tree with
More informationOn Your Own. ). Another way is to multiply the. ), and the image. Applications. Unit 3 _ _
Applications 1 a 90 clockwise rotation matrix: - b As can be seen by the diagram, the image of P is Q and the image of R is P The coordinate of Q can be found by symmetry y R 1 P, Thus, the 45 clockwise
More informationPractical Session No. 12 Graphs, BFS, DFS, Topological sort
Practical Session No. 12 Graphs, BFS, DFS, Topological sort Graphs and BFS Graph G = (V, E) Graph Representations (V G ) v1 v n V(G) = V - Set of all vertices in G E(G) = E - Set of all edges (u,v) in
More informationA Spectral-based Clustering Algorithm for Categorical Data Using Data Summaries (SCCADDS)
A Spectral-based Clustering Algorithm for Categorical Data Using Data Summaries (SCCADDS) Eman Abdu eha90@aol.com Graduate Center The City University of New York Douglas Salane dsalane@jjay.cuny.edu Center
More informationMODERN OPERATING SYSTEMS. Third Edition ANDREW S. TANENBAUM. Chapter 6 Deadlocks
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 6 Deadlocks Preemptable and Nonpreemptable Resources Sequence of events required to use a resource: 1. Request the resource. 2. Use the
More information1.1 ELEMENTARY LINEAR GRAPH THEORY: IMPORTANT TERMS
NETWORK TOPOLOGY 2. INTRODUCTION The solution of a given linear network problem requires the formation of a set of equations describing the response of the network. The mathematical model so derived, must
More informationIV. Special Linear Programming Models
IV. Special Linear Programming Models Some types of LP problems have a special structure and occur so frequently that we consider them separately. A. The Transportation Problem - Transportation Model -
More informationSPARSE COMPONENT ANALYSIS FOR BLIND SOURCE SEPARATION WITH LESS SENSORS THAN SOURCES. Yuanqing Li, Andrzej Cichocki and Shun-ichi Amari
SPARSE COMPONENT ANALYSIS FOR BLIND SOURCE SEPARATION WITH LESS SENSORS THAN SOURCES Yuanqing Li, Andrzej Cichocki and Shun-ichi Amari Laboratory for Advanced Brain Signal Processing Laboratory for Mathematical
More informationXVIII Open Cup named after E.V. Pankratiev Stage 1: Grand Prix of Romania, Sunday, September 17, 2017
Problem A. Balance file: 1 second 512 mebibytes We say that a matrix A of size N N is balanced if A[i][j] + A[i + 1][j + 1] = A[i + 1][j] + A[i][j + 1] for all 1 i, j N 1. You are given a matrix A of size
More informationLinear Programming with Bounds
Chapter 481 Linear Programming with Bounds Introduction Linear programming maximizes (or minimizes) a linear objective function subject to one or more constraints. The technique finds broad use in operations
More informationDynamic Clustering in WSN
Dynamic Clustering in WSN Software Recommended: NetSim Standard v11.1 (32/64 bit), Visual Studio 2015/2017, MATLAB (32/64 bit) Project Download Link: https://github.com/netsim-tetcos/dynamic_clustering_project_v11.1/archive/master.zip
More informationON SOME METHODS OF CONSTRUCTION OF BLOCK DESIGNS
ON SOME METHODS OF CONSTRUCTION OF BLOCK DESIGNS NURNABI MEHERUL ALAM M.Sc. (Agricultural Statistics), Roll No. I.A.S.R.I, Library Avenue, New Delhi- Chairperson: Dr. P.K. Batra Abstract: Block designs
More informationGraphs, graph algorithms (for image segmentation),... in progress
Graphs, graph algorithms (for image segmentation),... in progress Václav Hlaváč Czech Technical University in Prague Czech Institute of Informatics, Robotics and Cybernetics 66 36 Prague 6, Jugoslávských
More informationMove-to-front algorithm
Up to now, we have looked at codes for a set of symbols in an alphabet. We have also looked at the specific case that the alphabet is a set of integers. We will now study a few compression techniques in
More informationCSC 8301 Design & Analysis of Algorithms: Warshall s, Floyd s, and Prim s algorithms
CSC 8301 Design & Analysis of Algorithms: Warshall s, Floyd s, and Prim s algorithms Professor Henry Carter Fall 2016 Recap Space-time tradeoffs allow for faster algorithms at the cost of space complexity
More informationCLUSTER ANALYSIS. V. K. Bhatia I.A.S.R.I., Library Avenue, New Delhi
CLUSTER ANALYSIS V. K. Bhatia I.A.S.R.I., Library Avenue, New Delhi-110 012 In multivariate situation, the primary interest of the experimenter is to examine and understand the relationship amongst the
More informationitxperts shivpuri Page No. 1 Normalization
www.itxperts.co.in itxperts shivpuri Page No. 1 Normalization While designing a database out of an entity relationship model, the main problem existing in that raw database is redundancy. Redundancy is
More informationWeek 7 Picturing Network. Vahe and Bethany
Week 7 Picturing Network Vahe and Bethany Freeman (2005) - Graphic Techniques for Exploring Social Network Data The two main goals of analyzing social network data are identification of cohesive groups
More informationRepresenting graphs. Share Tweet
Representing graphs Share Tweet Email There are several ways to represent graphs, each with its advantages and disadvantages. Some situations, or algorithms that we want to run with graphs as input, call
More informationImage Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi
Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi 1. Introduction The choice of a particular transform in a given application depends on the amount of
More informationHomework 3 Handout 19 February 18, 2016
CSEE E6861y Prof. Steven Nowick Homework 3 Handout 19 February 18, 2016 This homework is due at the beginning of class on Thursday, March 3. NOTE: A correct answer without adequate explanation or derivation
More information