Assume we are given a tissue sample =, and a feature vector

Size: px
Start display at page:

Download "Assume we are given a tissue sample =, and a feature vector"

Transcription

1 MA 751 Part 6 Support Vector Machines 3. An example: Gene expression arrays Assume we are given a tissue sample =, and a feature vector x œ F Ð=Ñ $!ß!!! consisting of 30,000 gene expression levels as read by a gene expression array. We wish to determine whether the tissue is cancerous or not. For an x which in fact corresponds to cancerous tissue, we will set the corresponding output variable Cœ" ; otherwise Cœ ".

2 Consider a data set W œöðx 3 ßCÑ 3 3œ", consisting of pairs of feature vectors x 3 and corresponding (correct) diagnoses C3 Ö "ß " Þ Can we find the right function 0" À J Ä U which generalizes the above examples, so that 0Ð " xñœcfor all feature vectors? Easier (see below): Find a 0ÀJÄ, where 0ÐxÑ! if 0 ÐxÑ œ "à 0ÐxÑ! if 0 ÐxÑ œ "Þ " "

3 4. Support vector machine framework Recall the regularization setting: we have examples. x 3 3 with, C œ Ö ". HœÖÐx ßCÑßáßÐx ßC Ñ " ", As mentioned above, we want to find a function 0" À Ä which generalizes the above data so that 0ÐxÑ œ C generalizes the data H..

4 As mentioned there, we will actually want here something more general: a function 0ÐxÑ which will best help us decide the true value of C. It may not need to be that we want 0ÐxÑ œ C, but rather we want œ 0Ð x Ñ >> " if C œ " 0ÐxÑ << " if C œ " ß (2) i.e., 0ÐxÑ is large and positive if the correct answer is C œ " (e.g. a chair) and 0ÐxÑis large and negative if the correct answer is Cœ " (not a chair).

5 Then the decision rule will be to conclude the value of C based on the rule (2). This is made precise as follows. We have the following optimization criterion for the 'right' 0: " 0 œ arg min Z ÐC3ß0Ðx3ÑÑ -m0mo # ß 0 [ 3œ" where m0m œ norm in an RKHS, e.g., O [ m0mo œ me0m # œ ( ÐE0Ñ.BÞ P #

6 Above 'arg min' denotes the 0 which minimizes the above expression. Loss function: hinge loss Z Ð0ÐxÑß CÑ œ Ð" C0ÐxÑÑ, where Ð+Ñ max Ð+ß!ÑÞ 5. More about the hinge loss

7 Consider the error function Z Ð0ÐxÑß CÑ œ Ð" C0ÐxÑÑ max " C0ÐxÑß! Þ small if Cß 0ÐxÑ have same sign œ œ Þ large otherwise

8 This is called the hinge loss function.

9 [Notice margin built in: error! only if C0ÐxÑ " (more stringent requirement than just C0ÐxÑ!Ñ] Thus data error is " /. œ ZÐ0Ðx4ÑßC4Ñ 4œ" What is a priori information? Note surface LÀ0œ! will separate "positive" x with 0ÐxÑ!, and "negative" x with 0ÐxÑ! À

10

11 Fig. 1. Red points have Cœ+1 and blue have Cœ 1 in the space J. L À 0ÐxÑ œ! is the separating surface. Assume some a priori information defined in terms of an RKHS norm m mo so m0mo is small if a priori assumption is satisfied. Let [ be corresponding RHKS. Will specify desirable norm m m O later... Now solve regularization problem for the above norm and loss Z :

12 " # 0! œ arg min Ð" C40Ðx4ÑÑ - m0moþ (1) 0 [ 4œ" 6. Introduction of slack variables Define new variables 04, and note if we find the min over 0 [ and of 0 4 with the constraint " 0 [0 ß 4 4œ" arg min 04 - m0mo # (1a)

13 Slack variables and solution C0Ð 4 x4ñ " !ß we get the same solution 0. ` To see this, note the constraints are 0 4 Ð!ß " C 4 0Ðx 4 ÑÑ œ Ð" C 4 0Ðx 4 ÑÑ max, (1b) which yields the claim. (Clearly in fact in minimizing sum we will end up with œð" C0Ðx ÑÑ )

14 Slack variables and solution From form (1) above by representer theorem: 0ÐxÑ œ + OÐxßx ÑÞ 4œ" 4 4 Ô + " To find a œ ã (see above material): let Õ+ Ø OœÐO34ÑœOÐx3ßx4Ñ Then

15 Slack variables and solution # m0m œ O + 4OÐxx ß 4Ñß + 3OÐxx ß 3Ñ 4 3 œ + + ØOÐxx ß ÑßOÐxx ß ÑÙ 3ß œ + + OÐ ß Ñ œ X x x + + O œ a Oa ß4 3ß4

16 Thus: Slack variables and solution " X a œ arg min 04 - a Oa (2a) a 4œ" with constraint: C + OÐx ßx Ñ " 0 (2b) œ" 0 4!Þ (2c)

17 5. Bias Slack variables and solution Given choice of [, O we have concluded 0ÐxÑ œ + 4OÐxßx4 Ñ (3) 4œ" which optimizes (1), equivalently (2). Now can expand class (2) of allowable 0 ad hoc. We may feel larger class than [ is appropriate. Often adding a constant, is useful.

18 Slack variables and solution Thus change 0ÐxÑ by adding a bias term,: 0ÐxÑ œ + 4OÐxßx4 Ñ,. (4) 4œ" The effect: regularization term unchanged (i.e., we ignore, in the norm m0m O ; remember any a priori assumption is valid if it is useful Ñ. Note this is still a norm on the expanded space of functions of the form (4), but may not be positive definite, i.e., m0m œ! for some 0 of the form (4).

19 Slack variables and solution For example we may have m,m œ!. O But: minimization of (1) using (4) still makes sense and allows possibly richer set of functions than [, as long as the regularization term m0m O still makes sense for such a richer set. In terms of slack variables 0 3, new optimization problem: Ô + " Find a œ ã which minimizes: Õ+ Ø

20 Slack variables and solution " X 04 -a Oa 4œ" with constraints: C 4 + 3OÐx3ßx4Ñ, " 04 Ð4aÑ 3œ" 0 3! ( quadratic programming problem).

Computer Project. Purpose: To better understand the notion of rank and learn its connection with linear independence.

Computer Project. Purpose: To better understand the notion of rank and learn its connection with linear independence. MA 242 - M. Kon Extra Credit Assignment 3 Due Tuesday, 3/28/17 Computer Project Name Remember - it's never too late to start doing the extra credit computer algebra problem sets! 1. Rank and Linear Independence

More information

Schmidt Process can be applied, this means that every nonzero subspace of 8 has an orthonormal basis.

Schmidt Process can be applied, this means that every nonzero subspace of 8 has an orthonormal basis. 8The Gram-Schmidt Process The Gram-Schmidt Process is an algorithm used to convert any basis for a subspace [ of 8 into a new orthogonal basis for [. This orthogonal basis can then be normalized, if desired,

More information

MA M. Kon Extra Credit Assignment 2 Due Tuesday, 2/28/17. Name. Computer Project: 1. Reduced Echelon Form and rref

MA M. Kon Extra Credit Assignment 2 Due Tuesday, 2/28/17. Name. Computer Project: 1. Reduced Echelon Form and rref MA 242 - M. Kon Extra Credit Assignment 2 Due Tuesday, 2/28/17 Name Computer Project: 1. Reduced Echelon Form and rref Purpose: To calculate the reduced echelon form by hand and with effects of roundoff

More information

A SIMPLE METHOD FOR SEARCHING FOR PRIME PAIRS IN THE GOLDBACH CONJECTURE WEI SHENG ZENG AND ZIQI SUN

A SIMPLE METHOD FOR SEARCHING FOR PRIME PAIRS IN THE GOLDBACH CONJECTURE WEI SHENG ZENG AND ZIQI SUN A SIMPLE METHOD FOR SEARCHING FOR PRIME PAIRS IN THE GOLDBACH CONJECTURE WEI SHENG ZENG AND ZIQI SUN ABSTRACT. In this paper we introduce a simple method of searching for the prime pairs in the famous

More information

Constructing the Integers

Constructing the Integers Constructing the Integers We have seen how we can start with the (informal) system of integers, and use it to build new algebraic systems 7. The members of 7are equivalence classes formed from the integers.

More information

Exam MLC Flashcards. Samuel Broverman

Exam MLC Flashcards. Samuel Broverman Exam MLC Flashcards Samuel roverman 2brove@rogers.com, www.sambroverman.com S. roverman 2007 Samuel roverman 2brove@rogers.com, www.sambroverman.com Table of Contents Introductory Topics Life Contingencies

More information

Definition For a fixed 7, define a relation Von by

Definition For a fixed 7, define a relation Von by The following definition gives a very important equivalence relation on. We will use it to illustrate a number of the ideas that follow. Definition For a fixed 7, define a relation Von by V œ ÖÐBß CÑ À

More information

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0. Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts

More information

Chapter 3: Direct Proofs

Chapter 3: Direct Proofs 3.1: Getting Started on a Problem Chapter 3: Direct Proofs Let's review some steps for studying the truth of a statement. Step 1, Examples: If possible, look at some specific examples, including extreme

More information

A. Incorrect! This would be the negative of the range. B. Correct! The range is the maximum data value minus the minimum data value.

A. Incorrect! This would be the negative of the range. B. Correct! The range is the maximum data value minus the minimum data value. AP Statistics - Problem Drill 05: Measures of Variation No. 1 of 10 1. The range is calculated as. (A) The minimum data value minus the maximum data value. (B) The maximum data value minus the minimum

More information

Peano Systems and the Whole Number System

Peano Systems and the Whole Number System Peano Systems and the Whole Number System We have a good informal picture about how the system of whole numbers works. By the whole number system we mean to the set = œ Öß "ß #ß ÞÞÞ, together with its

More information

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Weizhen Mao Department of Computer Science The College of William and Mary Williamsburg, VA 23187-8795 USA wm@cs.wm.edu

More information

MATH 132 PRACTICE FINAL EXAM (solutions) FALL 2010

MATH 132 PRACTICE FINAL EXAM (solutions) FALL 2010 MATH 32 PRACTICE FINAL EXAM (solutions FALL 200 Evaluate / sin(x cos(x dx. / EÑ FÑ GÑ / HÑ / IÑ/ JÑ KÑ/ LÑ / MÑ/ solution: (? œ=3ðbñß.?œ-9=ðbññ œ /?.?œ/? l œ / ÐHÑ 2 Evaluate B=3ÐBÑ.B È È EÑ FÑ GÑ HÑ IÑ

More information

SFU CMPT Lecture: Week 8

SFU CMPT Lecture: Week 8 SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing

More information

An algorithmic method to extend TOPSIS for decision-making problems with interval data

An algorithmic method to extend TOPSIS for decision-making problems with interval data Applied Mathematics and Computation 175 (2006) 1375 1384 www.elsevier.com/locate/amc An algorithmic method to extend TOPSIS for decision-making problems with interval data G.R. Jahanshahloo, F. Hosseinzadeh

More information

Probabilistic analysis of algorithms: What s it good for?

Probabilistic analysis of algorithms: What s it good for? Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like

More information

Supervised vs unsupervised clustering

Supervised vs unsupervised clustering Classification Supervised vs unsupervised clustering Cluster analysis: Classes are not known a- priori. Classification: Classes are defined a-priori Sometimes called supervised clustering Extract useful

More information

CHAPTER 3 ADDING AND SUBTRACTING FRACTIONS

CHAPTER 3 ADDING AND SUBTRACTING FRACTIONS 3.1 Adding and Subtracting Like Fractions 83 CHAPTER 3 ADDING AND SUBTRACTING FRACTIONS 3.1 Adding and Subtracting Like Fractions 3.1 Margin Exercises 1. (a && The denominators are the same, so & and &

More information

Using SmartXplorer to achieve timing closure

Using SmartXplorer to achieve timing closure Using SmartXplorer to achieve timing closure The main purpose of Xilinx SmartXplorer is to achieve timing closure where the default place-and-route (PAR) strategy results in a near miss. It can be much

More information

MATH 1242 FALL 2008 COMMON FINAL EXAMINATION PART I. Instructor:

MATH 1242 FALL 2008 COMMON FINAL EXAMINATION PART I. Instructor: MATH 14 FALL 008 COMMON FINAL EXAMINATION PART I Name Student ID Instructor: Section/Time This exam is divided into three parts. Calculators are not allowed on Part I. You have three hours for the entire

More information

) $ G}] }O H~U. G yhpgxl. Cong

) $ G}] }O H~U. G yhpgxl. Cong » Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã

More information

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu

More information

ERNST. Environment for Redaction of News Sub-Titles

ERNST. Environment for Redaction of News Sub-Titles ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or

More information

FRACTIONAL FACTORIAL (

FRACTIONAL FACTORIAL ( FRACTIONAL FACTORIAL ( # : ; ) STUDIES Page 1 Motivation: For : factors, even # : gets big fast : for : œ"! # œ"!#% Example Hendrix 1979 Chemtech A Coating Roll Temp 115 vs 125 B Solvent Recycled vs Refined

More information

Extension of the TOPSIS method for decision-making problems with fuzzy data

Extension of the TOPSIS method for decision-making problems with fuzzy data Applied Mathematics and Computation 181 (2006) 1544 1551 www.elsevier.com/locate/amc Extension of the TOPSIS method for decision-making problems with fuzzy data G.R. Jahanshahloo a, F. Hosseinzadeh Lotfi

More information

1 Metric spaces. d(x, x) = 0 for all x M, d(x, y) = d(y, x) for all x, y M,

1 Metric spaces. d(x, x) = 0 for all x M, d(x, y) = d(y, x) for all x, y M, 1 Metric spaces For completeness, we recall the definition of metric spaces and the notions relating to measures on metric spaces. A metric space is a pair (M, d) where M is a set and d is a function from

More information

Machine Learning. Support Vector Machines. Fabio Vandin November 20, 2017

Machine Learning. Support Vector Machines. Fabio Vandin November 20, 2017 Machine Learning Support Vector Machines Fabio Vandin November 20, 2017 1 Classification and Margin Consider a classification problem with two classes: instance set X = R d label set Y = { 1, 1}. Training

More information

Lecture 5 C Programming Language

Lecture 5 C Programming Language Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the

More information

The linear transformation X À Ä given by XÐBÑ œ EB is invertible À that is, there

The linear transformation X À Ä given by XÐBÑ œ EB is invertible À that is, there What do we know about an invertible ( 8 8) matrix E? E is invertible Í E rref ÐEÑ œ M 8 X is invertible X À Ä (where XÐBÑ œ EB) is onto for every, in 8, EB œ, has at least " solution The columns of E span

More information

Pointers & Arrays. CS2023 Winter 2004

Pointers & Arrays. CS2023 Winter 2004 Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this

More information

Banner 8 Using International Characters

Banner 8 Using International Characters College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating

More information

THE AUSTRALIAN NATIONAL UNIVERSITY Practice Final Examination, October 2012

THE AUSTRALIAN NATIONAL UNIVERSITY Practice Final Examination, October 2012 THE AUSTRALIAN NATIONAL UNIVERSITY Practice Final Examination, October 2012 COMP2310 / COMP6310 (Concurrent and Distributed Systems ) Writing Period: 3 hours duration Study Period: 15 minutes duration

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

III. CLAIMS ADMINISTRATION

III. CLAIMS ADMINISTRATION III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800

More information

Personal Conference Manager (PCM)

Personal Conference Manager (PCM) Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her

More information

Chapter 6 The Standard Deviation as Ruler and the Normal Model

Chapter 6 The Standard Deviation as Ruler and the Normal Model ST 305 Chapter 6 Reiland The Standard Deviation as Ruler and the Normal Model Chapter Objectives: At the end of this chapter you should be able to: 1) describe how adding or subtracting the same value

More information

1 Sets, Fields, and Events

1 Sets, Fields, and Events CHAPTER 1 Sets, Fields, and Events B 1.1 SET DEFINITIONS The concept of sets play an important role in probability. We will define a set in the following paragraph. Definition of Set A set is a collection

More information

Pointers. CS2023 Winter 2004

Pointers. CS2023 Winter 2004 Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able

More information

Chapter 2 Intuitionistic Fuzzy Aggregation Operators and Multiattribute Decision-Making Methods with Intuitionistic Fuzzy Sets

Chapter 2 Intuitionistic Fuzzy Aggregation Operators and Multiattribute Decision-Making Methods with Intuitionistic Fuzzy Sets Chapter 2 Intuitionistic Fuzzy Aggregation Operators Multiattribute ecision-making Methods with Intuitionistic Fuzzy Sets 2.1 Introduction How to aggregate information preference is an important problem

More information

Modules. CS2023 Winter 2004

Modules. CS2023 Winter 2004 Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules

More information

y i = S i ΠS y i + S i ΠN\S

y i = S i ΠS y i + S i ΠN\S max flow problem additional source: R.T. Rockafellar, Network Flows and Monotropic Optimization, John Wiley & Sons 1984 some terminology If x is a flow in a network with node-arc incidence matrix A, then

More information

Introduction to Scientific Typesetting Lesson 11: Foreign Languages, Columns, and Section Titles

Introduction to Scientific Typesetting Lesson 11: Foreign Languages, Columns, and Section Titles Introduction to Scientific Typesetting Lesson 11: Foreign Languages,, and Ryan Higginbottom January 19, 2012 1 Ð The Package 2 Without Ð What s the Problem? With Ð Using Another Language Typing in Spanish

More information

Designing Networks Incrementally

Designing Networks Incrementally Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying

More information

Support vector machines

Support vector machines Support vector machines When the data is linearly separable, which of the many possible solutions should we prefer? SVM criterion: maximize the margin, or distance between the hyperplane and the closest

More information

Incremental Support Vector Machine Learning: a Local Approach

Incremental Support Vector Machine Learning: a Local Approach Incremental Support Vector Machine Learning: a Local Approach Liva Ralaivola and Florence d Alché Buc Laboratoire d Informatique de aris, Université ierre et Marie Curie,, rue du Capitaine Scott, F-7515

More information

points. If each point is identified with a treatment combination, then the design consisting of 8 : "

points. If each point is identified with a treatment combination, then the design consisting of 8 : Handout #14 - Regular fractional factorial designs An example of regular fractional factorial design was given in Section 13.3. This handout presents a general theory of the construction of regular fractional

More information

Data Analysis 3. Support Vector Machines. Jan Platoš October 30, 2017

Data Analysis 3. Support Vector Machines. Jan Platoš October 30, 2017 Data Analysis 3 Support Vector Machines Jan Platoš October 30, 2017 Department of Computer Science Faculty of Electrical Engineering and Computer Science VŠB - Technical University of Ostrava Table of

More information

BUCKLEY. User s Guide

BUCKLEY. User s Guide BUCKLEY User s Guide O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make

More information

A RADIO COLORING OF A HYPERCUBE

A RADIO COLORING OF A HYPERCUBE Intern. J. Computer Math., 2002, Vol. 79(6), pp. 665 670 A RADIO COLORING OF A HYPERCUBE OPHIR FRIEDER a, *, FRANK HARARY b and PENG-JUN WAN a a Illinois Institute of Technology, Chicago, IL 60616; b New

More information

Cartons (PCCs) Management

Cartons (PCCs) Management Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,

More information

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 Graphs (MTAT.05.080, 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 homepage: http://www.ut.ee/~peeter_l/teaching/graafid08s (contains slides) For grade:

More information

Intro to Linear Programming. The problem that we desire to address in this course is loosely stated below.

Intro to Linear Programming. The problem that we desire to address in this course is loosely stated below. . Introduction Intro to Linear Programming The problem that we desire to address in this course is loosely stated below. Given a number of generators make price-quantity offers to sell (each provides their

More information

End-to-end bandwidth guarantees through fair local spectrum share in wireless ad-hoc networks

End-to-end bandwidth guarantees through fair local spectrum share in wireless ad-hoc networks End-to-end bandwidth guarantees through fair local spectrum share in wireless ad-hoc networks Saswati Sarkar and Leandros Tassiulas 1 Abstract Sharing the locally common spectrum among the links of the

More information

Adorn. Slab Serif Smooth R E G U LAR. v22622x

Adorn. Slab Serif Smooth R E G U LAR. v22622x s u Adorn f Slab Serif Smooth R E G U LAR B OL D t 0 v22622x 9 user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates,

More information

How to Implement DOTGO Engines. CMRL Version 1.0

How to Implement DOTGO Engines. CMRL Version 1.0 How to Implement DOTGO Engines CMRL Version 1.0 Copyright c 2009 DOTGO. All rights reserved. Contents 1 Introduction 3 2 A Simple Example 3 2.1 The CMRL Document................................ 3 2.2 The

More information

NAG Library Function Document nag_1d_cheb_intg (e02ajc)

NAG Library Function Document nag_1d_cheb_intg (e02ajc) 1 Purpose NAG Library Function Document nag_1d_cheb_intg () nag_1d_cheb_intg () determines the coefficients in the Chebyshev series representation of the indefinite integral of a polynomial given in Chebyshev

More information

Optimal Time Bounds for Approximate Clustering

Optimal Time Bounds for Approximate Clustering Optimal Time Bounds for Approximate Clustering Ramgopal R. Mettu C. Greg Plaxton Department of Computer Science University of Texas at Austin Austin, TX 78712, U.S.A. ramgopal, plaxton@cs.utexas.edu Abstract

More information

268 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24, NO. 2, FEBRUARY FORMAL DESCRIPTION AND TERMINOLOGY

268 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24, NO. 2, FEBRUARY FORMAL DESCRIPTION AND TERMINOLOGY 268 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 24, NO. 2, FEBRUARY 2002 Short Papers Two Variations on Fisher s Linear Discriminant for Pattern Recognition Tristrom Cooke Abstract

More information

124 DISTO pro 4 / pro 4 a-1.0.0zh

124 DISTO pro 4 / pro 4 a-1.0.0zh 0 30 40 50 DISTO PD-Z01 14 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 15 16 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 17 1 PD-Z03 3 7 4 5 6 10 9 8 18 DISTO pro 4 / pro 4 a-1.0.0

More information

MODEL SELECTION AND REGULARIZATION PARAMETER CHOICE

MODEL SELECTION AND REGULARIZATION PARAMETER CHOICE MODEL SELECTION AND REGULARIZATION PARAMETER CHOICE REGULARIZATION METHODS FOR HIGH DIMENSIONAL LEARNING Francesca Odone and Lorenzo Rosasco odone@disi.unige.it - lrosasco@mit.edu June 3, 2013 ABOUT THIS

More information

Adorn. Serif. Smooth. v22622x

Adorn. Serif. Smooth. v22622x s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs

More information

1 Swing 2006A 5 B? 18. Swing Sun Microsystems AWT. 3.1 JFrame JFrame GHI

1 Swing 2006A 5 B? 18. Swing Sun Microsystems AWT. 3.1 JFrame JFrame GHI ' þ ³ š ³ œ ³ 2006 1 Swing! " # &%' ()+-,./0 1 2 45-6 &8% 9 : ; < = >@? 2006A 5 B? 18 C@D E F : G HJILK-M!NPO-Q R S-I!T R!U V-W X Y!Z[N GUI\ ] ^ O-Q R S _a` b-w!c dje!f g Swing Wh i Z j k l m n N VisualEditor

More information

Computation of the multivariate Oja median

Computation of the multivariate Oja median Metrika manuscript No. (will be inserted by the editor) Computation of the multivariate Oja median T. Ronkainen, H. Oja, P. Orponen University of Jyväskylä, Department of Mathematics and Statistics, Finland

More information

Module 7 VIDEO CODING AND MOTION ESTIMATION

Module 7 VIDEO CODING AND MOTION ESTIMATION Module 7 VIDEO CODING AND MOTION ESTIMATION Version ECE IIT, Kharagpur Lesson Block based motion estimation algorithms Version ECE IIT, Kharagpur Lesson Objectives At the end of this less, the students

More information

European Journal of Operational Research

European Journal of Operational Research European Journal of Operational Research 201 (2010) 89 98 Contents lists available at ScienceDirect European Journal of Operational Research journal homepage: www.elsevier.com/locate/ejor Discrete Optimization

More information

State of Connecticut Workers Compensation Commission

State of Connecticut Workers Compensation Commission State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,

More information

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date

More information

11.1 Facility Location

11.1 Facility Location CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local

More information

Lecture 10: SVM Lecture Overview Support Vector Machines The binary classification problem

Lecture 10: SVM Lecture Overview Support Vector Machines The binary classification problem Computational Learning Theory Fall Semester, 2012/13 Lecture 10: SVM Lecturer: Yishay Mansour Scribe: Gitit Kehat, Yogev Vaknin and Ezra Levin 1 10.1 Lecture Overview In this lecture we present in detail

More information

Appendix C. Numeric and Character Entity Reference

Appendix C. Numeric and Character Entity Reference Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your

More information

Mathematics (JUN11MPC201) General Certificate of Education Advanced Subsidiary Examination June Unit Pure Core TOTAL

Mathematics (JUN11MPC201) General Certificate of Education Advanced Subsidiary Examination June Unit Pure Core TOTAL Centre Number Candidate Number For Examiner s Use Surname Other Names Candidate Signature Examiner s Initials Mathematics Unit Pure Core 2 Wednesday 18 May 2011 General Certificate of Education Advanced

More information

Directed Single Source Shortest Paths in Linear Average Case Time

Directed Single Source Shortest Paths in Linear Average Case Time Directed Single Source Shortest Paths in inear Average Case Time Ulrich Meyer MPI I 2001 1-002 May 2001 Author s Address ÍÐÖ ÅÝÖ ÅܹÈÐÒ¹ÁÒ ØØÙØ ĐÙÖ ÁÒÓÖÑØ ËØÙÐ ØÞÒÙ Û ½¾ ËÖÖĐÙÒ umeyer@mpi-sb.mpg.de www.uli-meyer.de

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu /2/8 Jure Leskovec, Stanford CS246: Mining Massive Datasets 2 Task: Given a large number (N in the millions or

More information

Lecture 7: Support Vector Machine

Lecture 7: Support Vector Machine Lecture 7: Support Vector Machine Hien Van Nguyen University of Houston 9/28/2017 Separating hyperplane Red and green dots can be separated by a separating hyperplane Two classes are separable, i.e., each

More information

Database Languages and their Compilers

Database Languages and their Compilers Database Languages and their Compilers Prof. Dr. Torsten Grust Database Systems Research Group U Tübingen Winter 2010 2010 T. Grust Database Languages and their Compilers 4 Query Normalization Finally,

More information

Tolls for heterogeneous selfish users in multicommodity networks and generalized congestion games

Tolls for heterogeneous selfish users in multicommodity networks and generalized congestion games Tolls for heterogeneous selfish users in multicommodity networks and generalized congestion games Lisa Fleischer Kamal Jain Mohammad Mahdian Abstract We prove the existence of tolls to induce multicommodity,

More information

Lesson 4.2 The Vertex

Lesson 4.2 The Vertex Lesson. The Vertex Activity 1 The Vertex 1. a. How do you know that the graph of C œ ÐB Ñ ' is a parabola? b. Does the parabola open up or down? Why? c. What is the smallest C-value on the graph of C œ

More information

MODEL SELECTION AND REGULARIZATION PARAMETER CHOICE

MODEL SELECTION AND REGULARIZATION PARAMETER CHOICE MODEL SELECTION AND REGULARIZATION PARAMETER CHOICE REGULARIZATION METHODS FOR HIGH DIMENSIONAL LEARNING Francesca Odone and Lorenzo Rosasco odone@disi.unige.it - lrosasco@mit.edu June 6, 2011 ABOUT THIS

More information

Contrast. user s guide

Contrast. user s guide N Contrast chu U77777777V user s guide c P font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.

More information

NAG Library Function Document nag_1d_spline_fit (e02bec)

NAG Library Function Document nag_1d_spline_fit (e02bec) NAG Library Function Document nag_1d_spline_fit () 1 Purpose nag_1d_spline_fit () computes a cubic spline approximation to an arbitrary set of data points. The knots of the spline are located automatically,

More information

Increasing/Decreasing Behavior

Increasing/Decreasing Behavior Derivatives and the Shapes of Graphs In this section, we will specifically discuss the information that f (x) and f (x) give us about the graph of f(x); it turns out understanding the first and second

More information

Lesson 6.5A Working with Radicals

Lesson 6.5A Working with Radicals Lesson 6.5A Working with Radicals Activity 1 Equivalent Radicals We use the product and quotient rules for radicals to simplify radicals. To "simplify" a radical does not mean to find a decimal approximation

More information

Practice EXAM: SPRING 2012 CS 6375 INSTRUCTOR: VIBHAV GOGATE

Practice EXAM: SPRING 2012 CS 6375 INSTRUCTOR: VIBHAV GOGATE Practice EXAM: SPRING 0 CS 6375 INSTRUCTOR: VIBHAV GOGATE The exam is closed book. You are allowed four pages of double sided cheat sheets. Answer the questions in the spaces provided on the question sheets.

More information

6 Randomized rounding of semidefinite programs

6 Randomized rounding of semidefinite programs 6 Randomized rounding of semidefinite programs We now turn to a new tool which gives substantially improved performance guarantees for some problems We now show how nonlinear programming relaxations can

More information

Approximation Algorithms: The Primal-Dual Method. My T. Thai

Approximation Algorithms: The Primal-Dual Method. My T. Thai Approximation Algorithms: The Primal-Dual Method My T. Thai 1 Overview of the Primal-Dual Method Consider the following primal program, called P: min st n c j x j j=1 n a ij x j b i j=1 x j 0 Then the

More information

ECE608 - Chapter 16 answers

ECE608 - Chapter 16 answers ¼ À ÈÌ Ê ½ ÈÊÇ Ä ÅË ½µ ½ º½¹ ¾µ ½ º½¹ µ ½ º¾¹½ µ ½ º¾¹¾ µ ½ º¾¹ µ ½ º ¹ µ ½ º ¹ µ ½ ¹½ ½ ECE68 - Chapter 6 answers () CLR 6.-4 Let S be the set of n activities. The obvious solution of using Greedy-Activity-

More information

ADVANCED CLASSIFICATION TECHNIQUES

ADVANCED CLASSIFICATION TECHNIQUES Admin ML lab next Monday Project proposals: Sunday at 11:59pm ADVANCED CLASSIFICATION TECHNIQUES David Kauchak CS 159 Fall 2014 Project proposal presentations Machine Learning: A Geometric View 1 Apples

More information

CS101 Lecture 04: Binary Arithmetic

CS101 Lecture 04: Binary Arithmetic CS101 Lecture 04: Binary Arithmetic Binary Number Addition Two s complement encoding Briefly: real number representation Aaron Stevens (azs@bu.edu) 25 January 2013 What You ll Learn Today Counting in binary

More information

Seat Number PHYSICS SPRING EXAM 3. Name: Recitation Section Number:

Seat Number PHYSICS SPRING EXAM 3. Name: Recitation Section Number: Seat Number PHYSICS 112 - SPRING 2004 - EXAM 3 Name: Recitation Section Number: NO CALCULATORS ALLOWED - BUT, LUCKILY, NO CALCULATORS NEEDED. SHOW YOUR WORK! Full credit will be given only if you explain

More information

Christofides Algorithm

Christofides Algorithm 2. compute minimum perfect matching of odd nodes 2. compute minimum perfect matching of odd nodes 2. compute minimum perfect matching of odd nodes 3. find Eulerian walk node order 2. compute minimum perfect

More information

Properly Colored Paths and Cycles in Complete Graphs

Properly Colored Paths and Cycles in Complete Graphs 011 ¼ 9 È È 15 ± 3 ¾ Sept., 011 Operations Research Transactions Vol.15 No.3 Properly Colored Paths and Cycles in Complete Graphs Wang Guanghui 1 ZHOU Shan Abstract Let K c n denote a complete graph on

More information

Numerical Optimization

Numerical Optimization Convex Sets Computer Science and Automation Indian Institute of Science Bangalore 560 012, India. NPTEL Course on Let x 1, x 2 R n, x 1 x 2. Line and line segment Line passing through x 1 and x 2 : {y

More information

Math 214 Introductory Statistics Summer Class Notes Sections 3.2, : 1-21 odd 3.3: 7-13, Measures of Central Tendency

Math 214 Introductory Statistics Summer Class Notes Sections 3.2, : 1-21 odd 3.3: 7-13, Measures of Central Tendency Math 14 Introductory Statistics Summer 008 6-9-08 Class Notes Sections 3, 33 3: 1-1 odd 33: 7-13, 35-39 Measures of Central Tendency odd Notation: Let N be the size of the population, n the size of the

More information

LARGE MARGIN CLASSIFIERS

LARGE MARGIN CLASSIFIERS Admin Assignment 5 LARGE MARGIN CLASSIFIERS David Kauchak CS 451 Fall 2013 Midterm Download from course web page when you re ready to take it 2 hours to complete Must hand-in (or e-mail in) by 11:59pm

More information

7.4 Image, Tensor Representation, and Fourier Transform

7.4 Image, Tensor Representation, and Fourier Transform 190 Chapter 7 The rest of this chapter consists of the introduction and explanation of a newly defined image encryption algorithm known as the tensor transformbased method of image encryption that is based

More information

Civil Engineering Systems Analysis Lecture XIV. Instructor: Prof. Naveen Eluru Department of Civil Engineering and Applied Mechanics

Civil Engineering Systems Analysis Lecture XIV. Instructor: Prof. Naveen Eluru Department of Civil Engineering and Applied Mechanics Civil Engineering Systems Analysis Lecture XIV Instructor: Prof. Naveen Eluru Department of Civil Engineering and Applied Mechanics Today s Learning Objectives Dual 2 Linear Programming Dual Problem 3

More information

.. Spring 2017 CSC 566 Advanced Data Mining Alexander Dekhtyar..

.. Spring 2017 CSC 566 Advanced Data Mining Alexander Dekhtyar.. .. Spring 2017 CSC 566 Advanced Data Mining Alexander Dekhtyar.. Machine Learning: Support Vector Machines: Linear Kernel Support Vector Machines Extending Perceptron Classifiers. There are two ways to

More information

Math236 Discrete Maths with Applications

Math236 Discrete Maths with Applications Math236 Discrete Maths with Applications P. Ittmann UKZN, Pietermaritzburg Semester 1, 2012 Ittmann (UKZN PMB) Math236 2012 1 / 19 Degree Sequences Let G be a graph with vertex set V (G) = {v 1, v 2, v

More information

Chapter 2 Matrix Games with Payoffs of Triangular Fuzzy Numbers

Chapter 2 Matrix Games with Payoffs of Triangular Fuzzy Numbers Chapter 2 Matrix Games with Payoffs of Triangular Fuzzy Numbers 2.1 Introduction The matrix game theory gives a mathematical background for dealing with competitive or antagonistic situations arise in

More information

SECTION 3-4 Rational Functions

SECTION 3-4 Rational Functions 20 3 Polnomial and Rational Functions 0. Shipping. A shipping bo is reinforced with steel bands in all three directions (see the figure). A total of 20. feet of steel tape is to be used, with 6 inches

More information