Approximation of Two-Dimensional Rectangle Packing

Size: px
Start display at page:

Download "Approximation of Two-Dimensional Rectangle Packing"

Transcription

1 pproximtion of Two-imensionl Rectngle Pcking Pinhong hen, Yn hen, Mudit Goel, Freddy Mng S70 Project Report, Spring My 18, Introduction 1-d in pcking nd -d in pcking re clssic NP-complete prolems tht re motivted y industril pplictions of stock cutting, dt storge, etc. In this pper, we look t slightly more generl prolem tht is primrily motivted y VLSI design. In VLSI design, one wnts to pck given numer of rectngles (which might e RM chips, trnsistors, etc.) into wfer of minimum re to reduce the size of the chip. This is the -d rectngulr pcking prolem. The optimiztion prolem is Given set of N rectngles, minimize the re of ounding ox tht contins ll the N rectngles, without ny rottions nd such tht no two rectngles overlp. The corresponding decision prolem is Given set of N rectngles nd ox of length L nd height H, cn ll the N rectngles e pcked in the ox? y reduction from the -d in pcking, it cn e esily shown tht the prolem is NP-hrd. lso it cn e esily seen tht the prolem is in NP, nd hence it is NP-complete. Though lot of reserch hs gone into 1-d in pcking nd -d in pcking [GJ84],[GJ79],[LR90], the rectngle pcking prolem is reltively less reserched. offmn, et.l. [GJ84], in ddition to discussing the in-pcking prolems nd its vritions, present rief survey of vrition closer to the rectngle pcking prolem. In this vrition of the prolem, clled strip-pcking, they try to minimize the re fter fixing the width of the ounding ox. This prolem rises in vriety of industril settings where the rw mteril comes in the form of rolls nd from this we my wish to cut rectngulr ptterns for vrious purposes. ue to the economic importnce of efficient stock cutting, this vrint hs een extensively studied nd vrious heuristics nd pproximtion lgorithms exist for tht. References to ppers studying this prolem cn e found in [GJ84]. In ech of these lgorithms, the rectngles re first sorted ccording to sorting rule, like decresing width (W), incresing height (IH), etc. nd then pcked ccording to some pcking rule, like the OTTOM-LEFT (L) rule where the sorted rectngles re pcked in turn, ech item eing plced s close to the ottom of the strip s it will fit nd then s fr to the left s it cn e plced t tht ottom-most level. For this simple pproch, the LW lgorithm, where we use the OTTOM-LEFT lgorithm fter ordering the locks y decresing width gives us the est pproximtion rtio of 3. nother similr set of lgorithms re sed on different type of pcking rule clled level lgorithms. The rectngles re ll sorted y decresing heights. Two pcking rules clled NEXT FIT nd FIRST FIT give good results with the symptotic worst cse rtios for the two eing nd 1.7 respectively. These lgorithms require guillotine cuts, i.e. edge-to-edge cuts of the strip prllel to the ottom of the strip. Without this constrint, the est lgorithm sed on similr ides is n lgorithm y ker, et. l. [K81] which gives n symptotic worst cse rtio of 1.5. Klietmn nd Krieger [KK75] ddress the rectngle pcking prolem for the specil cse when ll rectngles re squres. They consider collection of squres whose totl re dd up to unity. They show tht ounding ox of = p 3y p is unique rectngle tht will suffice. Hochum nd Mss [HM85] propose shifting strtegy to ddress the specil cse of squre pcking. They consider nother vrition where they try to pck mximl numer of k k squres (for nturl numer k)into n re tht is given y n squres of unit size on rectiliner grid. For ny nturl numer l 1, the pproximtion rtio is (1+1=l) nd the run-time is O(k l n l ). They lso propose wys to otin pproximtions to pcking prolems in higher dimensions, with ritrry orienttions nd with ojects other thn squres. Hwng, Ko nd Horng [HKH94] present genetic lgorithm to solve the rectngle pcking prolem where 90 o rottion of locks is llowed nd squre pcking is preferred. They lso ddress the in pcking nd strip 1

2 () () (c) (d) Figure 1: Visuliztion of encoding of topologicl constrints sed on sequence pirs. () corresponds to the sequence pir h;i; (), (c) nd (d) re h;i; h;indh;i respectively. pcking prolems nd present heuristics for them in the form of genetic lgorithm. They use the slicing tree structure to represent solution. lthough this cnnot express ll the possile pckings, they clim tht it represents most good nd ner optiml pckings. The verge pcking density of their experiments using this lgorithm is 88%. With resonle increse in the running time of their heuristic, they were le to chieve n verge pcking density of 96:5%. Sequence-Pir sed lgorithms.1 Sequence pir Sequence pir is wy of encoding topologicl constrints of ojects (of ny shpe) on plne. It consists of pir of sequences of identicl lphets, one for ech of the oject to e plced. The motivtion is tht given two ojects nd, t lest one of the four reltion holds: ove, elow, to the left of, or to the right of. These topologicl reltions cn e esily encoded using two sequences. We use the following scheme: the reltion tht lies ove is encoded y h;i; tht lies elow y h;i; tht lies to the left y h;i;ndtht lies elow y h;i. In fct, this encoding scheme cn e esily visulized on the tilted grid. Figure 1 shows the four reltions nd their corresponding encoding. more sophiscted exmple is shown in Figure nd Figure. It is not hrd to see tht, for every plcement of ojects on plne, there exists sequence pir which represents ll the topologicl reltions mong the ojects. However, this encoding is not unique. Given lyout of the ojects, it is possile to hve more thn one sequence pir to represent the topologicl reltions. onversely, for every sequence pir, there exists plcement of the ojects which would stisfy the topologicl constrints imposed y

3 () () T S T (c) S (d) Figure : Visuliztion of sequence pirs on ojects ;; nd. () Topologicl constrints sed on the sequences h;i. () The corresponding lyout of the ojects. (c) Longest pth from s to t gives the width of the ounding ox. (d) Longest pth from s to t gives the height of the ounding ox. the pir. gin, this plcement is not unique: one cn dd ritrry mount of spce mong ll the ojects while respecting their reltive positions imposed y the sequence pir.. Properties of sequence pir We re concerned with finding the minimum re of the ounding ox where the given rectngles cn e pcked in. It is therefore importnt to find out from the sequence pir the minimum height nd width of the ounding ox efficiently. It turns out tht they cn e computed firly efficiently y finding the longest pth directed cyclic grph. To simplify discussion, we only consider the computtion of the width of the ounding ox. onsider Figure. For ech rectngle in Figure, there is corresponding vertex in the directed cyclic grph Figure c. Moreover, there re two extr vertices s;t which re the source nd sink. There is n edge from u to v if rectngle v lies on the right of u, s constrined y the sequence pir. The corresponding edge weight is the width of rectngle u. Moreover, there is n edge from the source s to every vertex, with edge weight 0. Finlly, there is n edge from every vertex to the sink t, with weight equl to the corresponding width of the rectngle. It is not hrd to see tht width of the ounding ox is given y the length of the longest pth from to source s to sink t. Using FS, for exmple, one cn compute the longest pth in time liner to the numer of edges, or in the worst cse, qudrtic in the numer of vertices in the grph. The height of the ounding ox cn e computed similrly, s shown in Figure d. The re of the ounding ox is simply the product of the computed width nd height...1 Greedy lgorithm Our first heuristics is greedy pproch. We mintin prtil sequence pir. t ech itertion, we consider new rectngle nd try to insert it into the sequence pir such tht the resulting ounding ox hs the minimum re. For instnce, suppose there re four rectngles ;; nd. First we fix n order of the rectngles to 3

4 consider. Strting with null sequence pir, we first try to insert lock during the first itertion, resulting in the sequence pir h;i. uring the second itertion, we consider ll the four possile plcement of : h;i, h;i, h;i nd h;i. We pick the one with the minimum re, sy h;i. Similrly during the third itertion, we consider ll the nine possile plce of nd pick out the one with smllest re. In generl, during the k itertion, there re k possile plcements of the kth rectngle to consider. Hence the running time for ech itertion is O(k k )=O(k 4 )=O(n 4 ),wheren is the totl numer rectngles to pck, nd therefore the totl running time would e O(n 4 n)=o(n 5 ). Here we ssume tht the running time for fixing the order of the rectngles is less thn O(n 5 ), which is resonle ssumption. We tested this greedy pproch y considering the rectngles in non-incresing order of re perimeter mximum spect rtio mximum of width nd height The experiment results re presented in the Experiment Result section... Genetic lgorithm Genetic lgorithm is comintoril serch technique mimicking the mechnism of nturl selection. We view the sequence pirs s the genes which encodes the plcement of the rectngles, nd define crossover nd muttion on the genes directly. rossover of two genes re done y exchnging their second sequences. Muttion of gene is done y rndomly swpping two djcent lphets in the sequence. The fitness function of gene is simply given y the re of the ounding ox given corresponding to the sequence pir...3 Simulted nneling Simulted nneling is nother widely used comintoril serch technique in the computer-ided-design industry. We serch through the the possile plcement configurtions y defining move on the sequence pirs. move is similr to muttion in genetic lgorithm: we choose rndom pir of djcent lphets nd swp them, producing new configurtion. 3 Experiments We rn intensive experiments on the lgorithms discussed ove. There re two kinds of input: rndom input generted y our enchmrk file genertor nd the rel-life exmples from the VLSI designs. There re two kinds of distriutions tht we use in generting enchmrk files: uniform distriution nd Gussin distriution. nd there re 5 criteri tht those dt re distriuted on: re, sides, integer sides, squre nd fixed height. For exmple, we hve enchmrk files with uniform distriution on the lock re or Gussin distriution on the lock sides nd so on. The integer sides criteri is used to simulte tht in VLSI design, the side of chips my ll e multiple of some unit length, i.e., they hve corse grnulity or discretized smple vlues. ll squre locks re of the similr concern. To Fixed Height option, it is just like pin-pcking. We know its optiml solution nd cn evlute the performnce esily. The test results for uniform distriution re in Fig. 1 nd those for Gussin distriution in Fig.. For every ctegory, we tested on 5 locks, 5 locks nd 50 locks. We iterted 10 instnces for every cse nd got the verge performnce nd worst performnce. The performnce is mesured y the ounding re divided y the totl re of the locks. Plese note tht the divisor my not e the optiml solution. It is less or equl to the optiml solution, to which is n unknown. So for ech lgorithm, there re two rows, the upper row contins the verge rtio nd the second row hs the worst rtio. We only use the re evlution function for greedy lgorithm. The numers in the columns of rndom re re usully igger thn those of other columns ecuse the enchmrk files my consist of some very thin nd long locks, either or oth in horizontl direction nd verticl direction. So even the optiml solution hs pretty ig rtios. 4

5 Rndom re Rndom Sides Rndom Int Sides Rndom Squre Rndom Fixed Height No. lks GSP vg. se Worst se GSP vg. se Worst se SSP vg. se Worst se Tle 1: Testing results on enchmrk files of uniform distriution. GSP stnds for Greedy lgorithm Sequencing Pir, GSP for Genetic lgorithm Sequencing Pir nd SSP for Simulted nneling Sequencing Pir. Rndom re Rndom Sides Rndom Int Sides Rndom Squre Rndom Fixed Height No. lks GSP vg. se Worst se GSP vg. se Worst se SSP vg. se Worst se Tle : Testing results on enchmrk files of Gussin distriution. GSP stnds for Greedy lgorithm Sequencing Pir, GSP for Genetic lgorithm Sequencing Pir nd SSP for Simulted nneling Sequencing Pir. To view the results more intuitively, we mde some r grphs of the testing results for uniform distriution. The Gussin distriution results re pretty similr. Fig. 3 illumintes the verge performnce of the the greedy lgorithm, genetic lgorithm nd simulted nneling on the five kinds of uniform distriution enchmrk files. In ddition, we lso tested our lgorithms on the rel-life exmples from VLSI design, s shown in Fig. 3. From the results, we cn tell tht ll the three lgorithm perform pretty well on verge nd none of them lwys perform etter thn the rest. From the r grph, it is ovious tht the genetic lgorithm gives the most stle performnce. Usully greedy lgorithm runs much fster thn the genetic lgorithm nd simulted nneling, especilly when the numer of locks is huge. For fixed height locks, greedy lgorithm lwys give the optiml solution, ut the genetic lgorithm nd simulted nneling my not. ircuit Xerox HP mi33 mi49 tpe No. lks GSP GSP SSP Tle 3: Testing results of rel-life exmples. GSP stnds for Greedy lgorithm Sequencing Pir, GSP for Genetic lgorithm Sequencing Pir nd SSP for Simulted nneling Sequencing Pir. We lso oserve tht for the greedy lgorithm optimizing for the perimeter sometimes gives etter minimum re thn optimizing for the re. Fig. 4 is the result optimized for the perimeter. Fig. 5 is the result optimized for the re. lso, optimizing for the re usully results in some extreme spect rtio, while optimizing for the perimeter usully gives some squre-like shpe, which is more cceptle in rel-life pplictions. 4 Liner Progrmming pproch 4.1 Introduction In this section, we use very different pproch, Liner Progrmming(LP), to solve this rectngle pcking prolem. First, we will introduce some Integer Liner Progrmming(ILP) methods, nd compre them with 5

6 () () (c) (d) (e) Figure 3: r grph of the testing results on uniformly distriuted enchmrk files. Ech group consists of the verge performnce on 5 locks, 5 locks nd 50 locks. The left group is the results of greedy lgorithm, the middle is tht of genetic lgorithm nd the right group, simulted nneling. ()Rndom re; () Rndom Sides; (c) Rndom Integer Sides; (d) Rndom Squres; (e)rndom Fixed Height 6

7 Figure 4: Optimizing for the perimeter gives smller re. Normlized re=1.068 Figure 5: Optimizing for the re gives very wide shpe. Normlized re=1.07 rnch-nd-method descried in the previous section. Second, we show rounding ILP pproch s n pproximtion lgorithm. Third, we modify the LP simplex lgorithm s nother pproximtion lgorithm. 4. Formultion in LP Liner progrmming in generl is very powerful method to solve pcking or covering prolem. For rectngle pcking, suppose there re locks,, we cn formulte it generlly y severl sets of constrints: oundry constrints for ech lock : x, w = 0 x + w = W y, h = 0 y + w = H Non-overlpping constrints for ny pir of locks,: or jx, x j w + w jy, y j h + h where (x ;y ) nd (x ;y ) re the center coordintes of lock nd, respectively, h is the height of lock, w is the width of lock, W is the ounding ox width, nd H is the ounding ox height. The ojective function is to minimize W H, ut LP does not llow qudrtic ojective function. Here, we use W + H insted. In generl, this is very good pproximtion s it is shown in the previous greedy lgorithm. It is lso possile to hve severl runs y using dynmic weighting fctors to W nd H nd mke it converge to the glol minimum of W H. 7

8 4.3 Four-it ILP Formultion The non-overlpping constrints incur the discrete nture of this prolem, so we hve to design some integer vriles in ILP to hndle it. The most strightforwrd method is y using integer vriles u ;u ;v ;v, such tht Mu + x, x w + w (1) Mu + x, x w + w () Mv + y, y h + h (3) Mv + y, y h + h (4) u + u + v + v 3 (5) where M is sufficient lrge numer(e.g. sum of height nd width of every lock). ctully, we require t lest one of the following inequlities holds to meet the non-overlpping constrints: x, x w + w x, x w + w y, y h + h y, y h + h (6) (7) (8) (9) 4.4 Two-it ILP Formultion Since tht t lest one of the four Eqs.?? holds stisfies the non-overlpping constrints, we cn thus encode this y 0-1 integer vriles u 0 nd v0, such tht: Mu 0 + Mv 0 + x, x w + w M(1, u 0 )+Mv 0 + x, x w + w Mu 0 + M(1, v 0 )++y, y h + h M(1, u 0 )+M(1, v 0 )+y, y h + h (10) (11) (1) (13) (14) The numer of integer vriles re hlf of the previous method. 4.5 Successive Rounding ILP pproch siclly, we use four-it ILP formultion without integer vrile constrints. t ech run of LP, we select nd round one integer vrile to zero y ssigning proility proportionl to the closeness (to zero) of its LP optiml solution. Tht is, suppose u i is n integer vrile, the proility we select u i s rounded integer vrile is 1, u i (1, u j) t most, O(n ) runs re needed, since it is possile for constrint grph to e complete iprtite grph. However, due to trnsitive reltions, if x x nd x x c,thenx x c is ctully implicitly implied in the LP solution. 8

9 4.6 Modified Simplex pproch From the previous formultion(e.g. -it ILP formultion), it is cler tht we hve to mintin the condition tht one of four inequlity holds; therefore, we cn design the formultion s: U + x, x w + w U + x, x w + w V + y, y h + h V + y, y h + h (15) (16) (17) (18) (19) with n extr constrint tht t lest one of U ;U ;V ;V must e in non-sic fesile solution in simplex lgorithm for LP, tht is, one of them must e zero to ctivte one inequlity. ctully, from our implementtion, it is shown very difficult to control simplex lgorithm fter considering these constrints. First, if we relx these constrints nd use regulr simplex lgorithm, we finlly fils to trnsform it ck to fesile solution suject to these extr constnts. The reson is some of the vriles U s ndv s cn not leve the sic fesile solution with one or two pivotings. This lmost cretes dedlock if we don t use cktrck. Second, s different pproch, we cn mintin these extr constrints ll the wy from the initil solution down to the optiml solution. However, this is clerly very limited locl serch. The qulity of the output is even 1.5 re of tht of the sequence-pir greedy lgorithm. Moreover, the runtime is much more thn tht of the sequence-pir greedy lgorithm. It is possile to introduce some rndomness into selection of pivots; however, this cretes nother prolem tht the initil fesile solution for LP my not e found. In our implementtion, we run this lgorithm 30 times to choose the optimum one nd discrd the run tht cn not find fesile solution. In Fig. 6, it cn e regrded s the serch from fesile solution down to the extr constrints oundry or climing from LP optiml solution up to the fesile solution set. Serch from Fesile Set Extr onstrints LP Fesile Solution onvex Set LP Optiml Solution Trnform Infesi to Fesile Soluti Figure 6: Serch for Optiml Solution in Modified Simplex lgorithm 4.7 Experimentl Results We use pulic domin code for solving mixed integer progrmming prolem here. The ILP sed (ctully mixed integer progrmming) lgorithm cn not hndle ig exmple s expected. ctully, the performnce is fr from the rnch-nd-ound method sed on sequence-pir. The runtime comprison is shown s 9

10 Exmple #Rentngles -it ILP 4-it ILP & t s 0.7s 0.0s t s 6.76s 0.06s t6 6 46s 994s 0.07s t7 7 >1hr >1hr 0.16s t8 8 N/ N/ 3.10s t9 9 N/ N/ 3.15s t10 10 N/ N/ 1.46s Here we compre the output qulity of pproximtion lgorithms: Sequence-Pir Successive Modified Exmple #Rectngles Optiml Greedy lg. Rounding Simplex t t t t t t t The re is in terms of normlized re. The totl of rectngles re is normlized to 1. The column in modified simplex lgorithm is the est solution tken from 30 runs with some rndomness in pivoting section descried previously. The greedy serch sed on sequence pir lwys outperforms the other pproches in these exmples. It my e ecuse the other pproches re somewht similr to rndom serch. 5 onclusion In this project, we study the sequence-pir sed pproch on the two-dimensionl rectngle pcking prolem s well s LP sed pproch. We use extensive exmples from rndom inputs nd rel-life exmples from VLSI designs. The results suggest tht the greedy lgorithm is very efficient nd outputs stisfying pcking res. lso, genetic lgorithm seems le to find sometimes etter result thn the greedy lgorithm. Simulted nneling is not so efficient compred with the genetic lgorithm. LP sed lgorithms need more tricks thn the other pproches. The serch spce (4 n(n,1) ) is much lrger thn the sequence pir pproch((n!) ). We need more sophiscted method to mnipulte the simplex lgorithm to mke it serch through the fesile solution spce. Its performnce is still inferior to the sequence-sed pproches. References [1] T. ORMEN,.LEISERSON nd R. RIVEST, Introduction to lgorithms, MIT Press, [] M.R. GREY nd.s. JOHNSON, omputers nd Intrctility: Guide to the Theory of NP- ompleteness, W. H. Freemn nd o., Sn Frncisco, [3] E.G. OFFMN, JR., M.R. GREY nd.s. JOHNSON, pproximtion lgorithms for in-pcking - n Updted Survey, lgorithm esign for omputer System esign, Springer-Verlg, [4].S. KER,.J.ROWN nd H.P. KTSEFF, 5/4 lgorithm for two-dimensionl pcking, J. of lgorithms,, [5].J. KLEITMN nd M.K. KRIEGER, n optiml ound for two dimensionl in pcking, Proc. 16th nn. Symp. on Foundtions of omputer Science, IEEE omputer Society, Long ech,,

11 [6].S. HOHUM nd W.MSS, pproximtion schemes for covering nd pcking prolems in Imge Processing nd VLSI, J. of M, 3(1), 1985 [7] S. HWNG,.KO nd J. HORNG, On Solving Rectngle in Pcking Prolems Using Genentic lgorithms, Proc. IEEE Interntionl onference on Systems, Mn, nd yernetics,

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it.

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it. 6.3 Volumes Just s re is lwys positive, so is volume nd our ttitudes towrds finding it. Let s review how to find the volume of regulr geometric prism, tht is, 3-dimensionl oject with two regulr fces seprted

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

PARALLEL AND DISTRIBUTED COMPUTING

PARALLEL AND DISTRIBUTED COMPUTING PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997.

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997. Forced convex n-gons in the plne F. R. K. Chung y University ofpennsylvni Phildelphi, Pennsylvni 19104 R. L. Grhm AT&T Ls - Reserch Murry Hill, New Jersey 07974 Mrch 2,1997 Astrct In seminl pper from 1935,

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

Efficient Rerouting Algorithms for Congestion Mitigation

Efficient Rerouting Algorithms for Congestion Mitigation 2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering

More information

Geometrical tile design for complex neighborhoods

Geometrical tile design for complex neighborhoods COMPUTATIONAL NEUROSCIENCE ORIGINAL RESEARCH ARTICLE pulished: 23 Novemer 2009 doi: 103389/neuro100202009 Geometricl tile design for complex neighorhoods Eugen Czeizler* nd Lil Kri Deprtment of Computer

More information

Video-rate Image Segmentation by means of Region Splitting and Merging

Video-rate Image Segmentation by means of Region Splitting and Merging Video-rte Imge Segmenttion y mens of Region Splitting nd Merging Knur Anej, Florence Lguzet, Lionel Lcssgne, Alin Merigot Institute for Fundmentl Electronics, University of Pris South Orsy, Frnce knur.nej@gmil.com,

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()

More information

8.2 Areas in the Plane

8.2 Areas in the Plane 39 Chpter 8 Applictions of Definite Integrls 8. Ares in the Plne Wht ou will lern out... Are Between Curves Are Enclosed Intersecting Curves Boundries with Chnging Functions Integrting with Respect to

More information

An Expressive Hybrid Model for the Composition of Cardinal Directions

An Expressive Hybrid Model for the Composition of Cardinal Directions An Expressive Hyrid Model for the Composition of Crdinl Directions Ah Lin Kor nd Brndon Bennett School of Computing, University of Leeds, Leeds LS2 9JT, UK e-mil:{lin,brndon}@comp.leeds.c.uk Astrct In

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Graphing Conic Sections

Graphing Conic Sections Grphing Conic Sections Definition of Circle Set of ll points in plne tht re n equl distnce, clled the rdius, from fixed point in tht plne, clled the center. Grphing Circle (x h) 2 + (y k) 2 = r 2 where

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility

More information

Position Heaps: A Simple and Dynamic Text Indexing Data Structure

Position Heaps: A Simple and Dynamic Text Indexing Data Structure Position Heps: A Simple nd Dynmic Text Indexing Dt Structure Andrzej Ehrenfeucht, Ross M. McConnell, Niss Osheim, Sung-Whn Woo Dept. of Computer Science, 40 UCB, University of Colordo t Boulder, Boulder,

More information

Lily Yen and Mogens Hansen

Lily Yen and Mogens Hansen SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst

More information

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1 Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the

More information

1 Quad-Edge Construction Operators

1 Quad-Edge Construction Operators CS48: Computer Grphics Hndout # Geometric Modeling Originl Hndout #5 Stnford University Tuesdy, 8 December 99 Originl Lecture #5: 9 November 99 Topics: Mnipultions with Qud-Edge Dt Structures Scribe: Mike

More information

On Achieving Optimal Throughput with Network Coding

On Achieving Optimal Throughput with Network Coding In IEEE INFOCOM On Achieving Optiml Throughput with Network Coding Zongpeng Li, Bochun Li, Dn Jing, Lp Chi Lu Astrct With the constrints of network topologies nd link cpcities, chieving the optiml end-to-end

More information

Area & Volume. Chapter 6.1 & 6.2 September 25, y = 1! x 2. Back to Area:

Area & Volume. Chapter 6.1 & 6.2 September 25, y = 1! x 2. Back to Area: Bck to Are: Are & Volume Chpter 6. & 6. Septemer 5, 6 We cn clculte the re etween the x-xis nd continuous function f on the intervl [,] using the definite integrl:! f x = lim$ f x * i )%x n i= Where fx

More information

Math 35 Review Sheet, Spring 2014

Math 35 Review Sheet, Spring 2014 Mth 35 Review heet, pring 2014 For the finl exm, do ny 12 of the 15 questions in 3 hours. They re worth 8 points ech, mking 96, with 4 more points for netness! Put ll your work nd nswers in the provided

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

cisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example:

cisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example: cisc1110 fll 2010 lecture VI.2 cll y vlue function prmeters more on functions more on cll y vlue nd cll y reference pssing strings to functions returning strings from functions vrile scope glol vriles

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

1.5 Extrema and the Mean Value Theorem

1.5 Extrema and the Mean Value Theorem .5 Extrem nd the Men Vlue Theorem.5. Mximum nd Minimum Vlues Definition.5. (Glol Mximum). Let f : D! R e function with domin D. Then f hs n glol mximum vlue t point c, iff(c) f(x) for ll x D. The vlue

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

COMBINATORIAL PATTERN MATCHING

COMBINATORIAL PATTERN MATCHING COMBINATORIAL PATTERN MATCHING Genomic Repets Exmple of repets: ATGGTCTAGGTCCTAGTGGTC Motivtion to find them: Genomic rerrngements re often ssocited with repets Trce evolutionry secrets Mny tumors re chrcterized

More information

such that the S i cover S, or equivalently S

such that the S i cover S, or equivalently S MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i

More information

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism Efficient K-NN Serch in Polyphonic Music Dtses Using Lower Bounding Mechnism Ning-Hn Liu Deprtment of Computer Science Ntionl Tsing Hu University Hsinchu,Tiwn 300, R.O.C 886-3-575679 nhliou@yhoo.com.tw

More information

Class-XI Mathematics Conic Sections Chapter-11 Chapter Notes Key Concepts

Class-XI Mathematics Conic Sections Chapter-11 Chapter Notes Key Concepts Clss-XI Mthemtics Conic Sections Chpter-11 Chpter Notes Key Concepts 1. Let be fixed verticl line nd m be nother line intersecting it t fixed point V nd inclined to it t nd ngle On rotting the line m round

More information

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds A Sprse Grid Representtion for Dynmic Three-Dimensionl Worlds Nthn R. Sturtevnt Deprtment of Computer Science University of Denver Denver, CO, 80208 sturtevnt@cs.du.edu Astrct Grid representtions offer

More information

Inference of node replacement graph grammars

Inference of node replacement graph grammars Glley Proof 22/6/27; :6 File: id293.tex; BOKCTP/Hin p. Intelligent Dt Anlysis (27) 24 IOS Press Inference of node replcement grph grmmrs Jcek P. Kukluk, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer

More information

Mathematics Background

Mathematics Background For more roust techer experience, plese visit Techer Plce t mthdshord.com/cmp3 Mthemtics Bckground Extending Understnding of Two-Dimensionl Geometry In Grde 6, re nd perimeter were introduced to develop

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers? 1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection

More information

EXPONENTIAL & POWER GRAPHS

EXPONENTIAL & POWER GRAPHS Eponentil & Power Grphs EXPONENTIAL & POWER GRAPHS www.mthletics.com.u Eponentil EXPONENTIAL & Power & Grphs POWER GRAPHS These re grphs which result from equtions tht re not liner or qudrtic. The eponentil

More information

Efficient Algorithms For Optimizing Policy-Constrained Routing

Efficient Algorithms For Optimizing Policy-Constrained Routing Efficient Algorithms For Optimizing Policy-Constrined Routing Andrew R. Curtis curtis@cs.colostte.edu Ross M. McConnell rmm@cs.colostte.edu Dn Mssey mssey@cs.colostte.edu Astrct Routing policies ply n

More information

Chapter44. Polygons and solids. Contents: A Polygons B Triangles C Quadrilaterals D Solids E Constructing solids

Chapter44. Polygons and solids. Contents: A Polygons B Triangles C Quadrilaterals D Solids E Constructing solids Chpter44 Polygons nd solids Contents: A Polygons B Tringles C Qudrilterls D Solids E Constructing solids 74 POLYGONS AND SOLIDS (Chpter 4) Opening prolem Things to think out: c Wht different shpes cn you

More information

Lecture 7: Integration Techniques

Lecture 7: Integration Techniques Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.

More information

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples EURSIP Journl on pplied Signl Processing 2003:6, 54 529 c 2003 Hindwi Publishing orportion Memory-Optimized Softwre Synthesis from tflow Progrm Grphs withlrgesizetsmples Hyunok Oh The School of Electricl

More information

Typing with Weird Keyboards Notes

Typing with Weird Keyboards Notes Typing with Weird Keyords Notes Ykov Berchenko-Kogn August 25, 2012 Astrct Consider lnguge with n lphet consisting of just four letters,,,, nd. There is spelling rule tht sys tht whenever you see n next

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

Approximation by NURBS with free knots

Approximation by NURBS with free knots pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde

More information

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE 3.1 Scheimpflug Configurtion nd Perspective Distortion Scheimpflug criterion were found out to be the best lyout configurtion for Stereoscopic PIV, becuse

More information

FastRoute: A Step to Integrate Global Routing into Placement

FastRoute: A Step to Integrate Global Routing into Placement FstRoute: A Step to Integrte Glol Routing into Plcement Min Pn nd Chris Chu Deprtment of Electricl nd Computer Engineering Iow Stte University, Ames, IA 00 Emil: {pnmin, cnchu}@istte.edu ABSTRACT Becuse

More information

Graphs with at most two trees in a forest building process

Graphs with at most two trees in a forest building process Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

If f(x, y) is a surface that lies above r(t), we can think about the area between the surface and the curve.

If f(x, y) is a surface that lies above r(t), we can think about the area between the surface and the curve. Line Integrls The ide of line integrl is very similr to tht of single integrls. If the function f(x) is bove the x-xis on the intervl [, b], then the integrl of f(x) over [, b] is the re under f over the

More information

COLOUR IMAGE MATCHING FOR DTM GENERATION AND HOUSE EXTRACTION

COLOUR IMAGE MATCHING FOR DTM GENERATION AND HOUSE EXTRACTION Hee Ju Prk OLOUR IMAGE MATHING FOR DTM GENERATION AND HOUSE EXTRATION Hee Ju PARK, Petr ZINMMERMANN * Swiss Federl Institute of Technology, Zuric Switzerlnd Institute for Geodesy nd Photogrmmetry heeju@ns.shingu-c.c.kr

More information

Approximate computations

Approximate computations Living with floting-point numers Stndrd normlized representtion (sign + frction + exponent): Approximte computtions Rnges of vlues: Representtions for:, +, +0, 0, NN (not numer) Jordi Cortdell Deprtment

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes by disks: volume prt ii 6 6 Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem 6) nd the ccumultion process is to determine so-clled volumes

More information

Premaster Course Algorithms 1 Chapter 6: Shortest Paths. Christian Scheideler SS 2018

Premaster Course Algorithms 1 Chapter 6: Shortest Paths. Christian Scheideler SS 2018 Premster Course Algorithms Chpter 6: Shortest Pths Christin Scheieler SS 8 Bsic Grph Algorithms Overview: Shortest pths in DAGs Dijkstr s lgorithm Bellmn-For lgorithm Johnson s metho SS 8 Chpter 6 Shortest

More information

Qubit allocation for quantum circuit compilers

Qubit allocation for quantum circuit compilers Quit lloction for quntum circuit compilers Nov. 10, 2017 JIQ 2017 Mrcos Yukio Sirichi Sylvin Collnge Vinícius Fernndes dos Sntos Fernndo Mgno Quintão Pereir Compilers for quntum computing The first genertion

More information

2-3 search trees red-black BSTs B-trees

2-3 search trees red-black BSTs B-trees 2-3 serch trees red-lck BTs B-trees 3 2-3 tree llow 1 or 2 keys per node. 2-node: one key, two children. 3-node: two keys, three children. ymmetric order. Inorder trversl yields keys in scending order.

More information

Answering Label-Constraint Reachability in Large Graphs

Answering Label-Constraint Reachability in Large Graphs Answering Lel-Constrint Rechility in Lrge Grphs Kun Xu Peking University Beijing, Chin xukun@icst.pku.edu.cn Lei Chen Hong Kong Univ. of Sci. & Tech. Hong Kong, Chin leichen@cse.ust.hk Lei Zou Peking University

More information

CS481: Bioinformatics Algorithms

CS481: Bioinformatics Algorithms CS481: Bioinformtics Algorithms Cn Alkn EA509 clkn@cs.ilkent.edu.tr http://www.cs.ilkent.edu.tr/~clkn/teching/cs481/ EXACT STRING MATCHING Fingerprint ide Assume: We cn compute fingerprint f(p) of P in

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Linear analysis of texture property relationships using process-based representations of Rodrigues space

Linear analysis of texture property relationships using process-based representations of Rodrigues space Act Mterili 55 (7) 573 587 www.ctmt-journls.com Liner nlysis of texture property reltionships using process-sed representtions of Rodrigues spce Veer Sundrrghvn, Nichols Zrs * Mterils Process Design nd

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

Nearest Keyword Set Search in Multi-dimensional Datasets

Nearest Keyword Set Search in Multi-dimensional Datasets Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science

More information

4/29/18 FIBONACCI NUMBERS GOLDEN RATIO, RECURRENCES. Fibonacci function. Fibonacci (Leonardo Pisano) ? Statue in Pisa Italy

4/29/18 FIBONACCI NUMBERS GOLDEN RATIO, RECURRENCES. Fibonacci function. Fibonacci (Leonardo Pisano) ? Statue in Pisa Italy /9/8 Fioncci (Leonrdo Pisno) -? Sttue in Pis Itly FIBONACCI NUERS GOLDEN RATIO, RECURRENCES Lecture CS Spring 8 Fioncci function fi() fi() fi(n) fi(n-) + fi(n-) for n,,,,,, 8,,, In his ook in titled Lier

More information

Allocator Basics. Dynamic Memory Allocation in the Heap (malloc and free) Allocator Goals: malloc/free. Internal Fragmentation

Allocator Basics. Dynamic Memory Allocation in the Heap (malloc and free) Allocator Goals: malloc/free. Internal Fragmentation Alloctor Bsics Dynmic Memory Alloction in the Hep (mlloc nd free) Pges too corse-grined for llocting individul objects. Insted: flexible-sized, word-ligned blocks. Allocted block (4 words) Free block (3

More information

Transparent neutral-element elimination in MPI reduction operations

Transparent neutral-element elimination in MPI reduction operations Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing

More information

An Algorithm for Enumerating All Maximal Tree Patterns Without Duplication Using Succinct Data Structure

An Algorithm for Enumerating All Maximal Tree Patterns Without Duplication Using Succinct Data Structure , Mrch 12-14, 2014, Hong Kong An Algorithm for Enumerting All Mximl Tree Ptterns Without Dupliction Using Succinct Dt Structure Yuko ITOKAWA, Tomoyuki UCHIDA nd Motoki SANO Astrct In order to extrct structured

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

50 AMC LECTURES Lecture 2 Analytic Geometry Distance and Lines. can be calculated by the following formula:

50 AMC LECTURES Lecture 2 Analytic Geometry Distance and Lines. can be calculated by the following formula: 5 AMC LECTURES Lecture Anlytic Geometry Distnce nd Lines BASIC KNOWLEDGE. Distnce formul The distnce (d) between two points P ( x, y) nd P ( x, y) cn be clculted by the following formul: d ( x y () x )

More information

ZZ - Advanced Math Review 2017

ZZ - Advanced Math Review 2017 ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is

More information

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011 CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the

More information