Generalization of the No-Free-Lunch Theorem

Size: px
Start display at page:

Download "Generalization of the No-Free-Lunch Theorem"

Transcription

1 Proceeings of the 9 IEEE International Conference on Sstes Man an Cbernetics San Antonio TX USA - October 9 Generalization of the No-Free-Lunch Theore Albert Y.S. La an Victor O.K. Li Departent of Electrical an Electronic Engineering The Universit of Hong Kong Hong Kong China {asla vli}@eee.hku.hk Abstract The No-Free-Lunch (NFL) Theore provies a funaental liit governing all optiization/search algoriths an has successfull rawn attention to theoretical founation of optiization an search. However we fin several liitations in the original NFL paper. In this work using results fro the nature of search algoriths we enhance several aspects of the original NFL Theore. We have ientifie the properties of eterinistic an probabilistic algoriths. We also provie an enueration proof of the theore. In aition we show that the NFL Theore is still vali for ore general perforance easures. This work serves as an application of the nature of search algoriths. Kewors No Free Lunch Nature of Search Algoriths Optiization. I. INTRODUCTION Search techniques have been wiel eploe to solve ifferent tpes of probles ranging fro sorting to optiization. The coon objective of such search algoriths is to fin an appropriate solution with esirable properties escribe b the proble. The general practice in solving search probles is: we have a proble an then tr to propose an algorith which can fin the esirable solution of the proble aong an other solutions. Most of the tie we keep on eveloping algoriths accoring to our experiences intuition an b trial-an-error. However an probles in science an engineering can be reucible to the stanar NPhar or NP-coplete probles []. Accoring to the general belief in the research counit P NP. In other wors attepting to fin an algorith which guarantees the esirable solution in polnoial tie for these probles is futile. Until the evelopent of stochastic search algoriths a few ecaes ago there were no eas an effective was to hanle NP-har an NP-coplete probles of large size. Stochastic search algoriths o not guarantee the best solutions in polnoial tie but the can norall generate goo solutions for a wier range of probles in a reasonable perio of tie when copare with eterinistic algoriths. Suppose we copare the perforance of a eterinistic algorith to that of a probabilistic algorith. Assuing the have the sae input an running tie the set of possible outputs generate b the latter ust be larger. Each output a correspon to goo perforance for a particular proble. Thus we conclue that the probabilit of a probabilistic algorith generating outputs with goo perforance for a larger range of probles is higher. A goo solution here eans that it is within certain tolerance of the best solution. In science an engineering goo solutions are generall sufficient to fulfill the requireent of various objectives. Most of the stochastic search algoriths are nature-inspire. Exaples inclue Genetic Algorith (GA) [ 3] Siulate Annealing [4] Ant Colon Optiization (ACO) [5 6] an Cheical Reaction Optiization [7]. There are also algoriths which are not aapte fro natural processes e.g. Tabu Search [8]. We generall classif the algoriths into heuristics an etaheuristics. The forer refers to those which are specialize to aress certain classes of probles but norall give unfavorable solutions to other probles. The reason is that proble-specific inforation has been ebee in the algorith evelopent process an thus the are tailore to the specific probles ver well. However when the are applie to other probles the ebee proble-specific inforation will not be useful anore an the result in ba perforance. On the other han the latter is not tailor-ae for an particular probles an oes not contain an problespecific inforation. When copare with heuristics etaheuristics can be applie to a wier range of probles with goo perforance. Thus there is an accurac-flexibilit traeoff between heuristics an etaheuristics. Most of the stochastic search algoriths are etaheuristics. Whenever a etaheuristic appears to work well on a particular proble gree approaches or heuristic coponents a be ae. This is tantaount to incluing ore proble-specific inforation to the etaheuristic an aking it ore heuristiclike. Accoring to the No-Free-Lunch Theore [9 ] the resulting etaheuristic is no longer able to solve other probles as well as before. In other wors we sacrifice flexibilit for accurac. Different etaheuristics are evelope base on istinct unerling echaniss or phenoena. For exaple GA is base on the iea of natural selection of living organiss while ACO akes use of the ecological behavior of ants in fining foo. Although etaheuristics can be applie to a wie range of probles the o have ifferent perforance when applie to ifferent classes of probles. Then it is natural to ask Is it possible to have a etaheuristic which is universall better than the others? Universall better can be interprete in the sense that the etaheuristic can solve ore probles with better solutions. Soe research is eicate to eveloping universall better etaheuristics an it is claie that soe search algoriths can beat others on average []. Most research focuses on the construction of search algoriths. There was harl an work on the theoretical /9/$5. 9 IEEE /9/$5. 9 IEEE 443

2 founation until Wolpert an Macrea propose the No-Free- Lunch (NFL) Theore [9 ]. It states that all search algoriths perfor statisticall ienticall on solving coputation probles. In other wors it is theoreticall ipossible to have a best general-purpose universal search strateg []. The NFL Theore is controversial an raises an iscussions (e.g. []) on its ipact an correctness. The search for a best general-purpose etaheuristic will be futile if the NFL Theore hols. We believe that the theore is correct an the conservation of perforance for search exists. As the NFL results are iportant we exaine [9 ] carefull again. We enhance an eonstrate the theore with the nature of search algoriths [3]. The contributions of this work inclue clarifing the properties of NFL-governe algoriths proviing a verification etho of the theore an generalizing the perforance easures. The rest of this paper is organize as follows. Section II escribes the terinolog use in search an optiization an the NFL Theore an its extensions. In Section III we introuce the nature of search algoriths. We eonstrate soe enhanceents an an enueration proof of the theore in Section IV an conclue this paper in Section V. II. RELATED WORK A. Terinolog We escribe a search proble as a function f F with an arguent x X an a functional value Y i.e. f ( x). X an Y are iscrete an finite. We assue that their carinalities are equal to X an Y respectivel an thus F Y X. Let a be a eterinistic non-potentiall retracing search algorith [9 ]. At iteration {... X } a takes a histor [( x )( x )...( x )] as input an outputs x i.e. a ( ) x. (We also use to refer to a histor in general.) Let x an enote the x- an -coponents of. Deterinistic eans that a prouces the sae x with probabilit one whenever given the sae while nonpotentiall retracing inicates x. x B. An Overview of the NFL Theore The NFL Theore is firstl propose in [9 ] an consists of several results. The ost representable one which establishes the core iea is Theore in []. Matheaticall it states that for an pair of eterinistic algoriths a an a ( ) ( ) P f a P f a where P ( f a ) represents the probabilit of having given f an a. Note that each f is taken fro F with the sae probabilit. Equation () eans that for an possible the perforance of an algorith (which can be obtaine The iscreteness an finiteness are trivial if we eplo a igital coputer to solve the probles. X an Y represente in a coputer ust be iscrete an finite. fro P ( ) ) is inepenent of the algorith itself when ever f F is evaluate once. In other wors all algoriths (heuristics or etaheuristics) have equal perforance when average over all possible functions. However the theore oes not hol when we focus on a certain class of probles. Thus it is still possible for an algorith to outperfor another one in this situation. C. Extensions The original NFL Theore requires all possible functions to be evaluate. Soe researchers think that this requireent is far fro realit as soe functions are ore practical (i.e. have higher probabilit of occurrence) than the others. In [4] the authors consier soe special subsets of F an propose the sharpene NFL Theore. It states that the original NFL Theore stills hol in a subset of F provie that the subset is close uner perutation (c.u.p.). Igel an Toussaint stu the necessar an sufficient conitions such that the NFL result hols in non-unifor istributions of functions in a c.u.p. subset [5]. Steeter investigates classes of functions where the NFL Theore oes not hol [6] while an Alost No Free Lunch Theore is propose to eonstrate how the result can hol approxiatel [7]. More people have realize the iportance an ipact of the NFL Theore. The research counit has been getting ore intereste in it an relate papers are publishe ever ear. III. NATURE OF SEARCH ALGORITHMS Previousl we worke out the nature of search algoriths which is focuse on the algorithic perspective instea of the functional viewpoint [8]. We will highlight the ajor results below. For ore etails an proofs intereste reaers can refer to [3]. We aopt the sae working principle of search algoriths escribe in Subsection II-A. With the sets X an Y efine we can eterine the whole set of functions F. Algoriths work on functions an generate histories. The analsis starts b enuerating all possible histories which inclue all the results i.e. (x ) pairs generate b an possible algoriths evaluating ever f F (the wa to enuerate histories will be explaine soon). We group the histories in a table an nae it an enueration table of histories. Table I(a) shows the enueration table for the exaple with X = {3} an Y = {3} (ou can ignore the shaings boxes an the last colun about counting the nuber of shae entries in boxes at this oent). The construction of an enueration table is eas. Each row an colun correspon to a function an a perutation of X respectivel. For exaple there are 7 (= 3 3 ) rows an 6 (= 3!) coluns in Table I(a). A perutation of X is Ever algorith shoul be given an input which is equal to the initial point where the search shoul start. All algoriths shoul not be restricte to fixe starting points. Otherwise the are just pieces of coes to illustrate the pre-efine search paths instea of tools which we can utilize to solve ifferent probles. 4433

3 (a) (b) Table Entries are - coponents of the Histories Functions TABLE I. f f f 3 f 4 f 5 f 6 f 7 f 8 f 9 f f f f 3 f 4 f 5 f 6 f 7 f 8 f 9 f f f f 3 f 4 f 5 f 6 f 7 Table Entries are - coponents of the Histories Functions f f f 3 f 4 f 5 f 6 f 7 f 8 f 9 f f f f 3 f 4 f 5 f 6 f 7 f 8 f 9 f f f f 3 f 4 f 5 f 6 f 7 ENUMERATION TABLES OF HISTORIES FOR X={3} AND Y={3} x-coponents of the Histories x-coponents of the Histories Nuber of Histories both in Shaing an Box Nuber of Histories both in Shaing an Box 4434

4 x in fact one possible X. An entr gives the X of the x corresponing X an f. Note that an enueration table is a coplete escription of search probles. Although its size grows exponentiall with X an Y the entries can be easil generate b inputting all perutations of X into the functions. Iportant properties of search algoriths can be eterine fro the enueration table. We consier eterinistic algoriths first an obtain the following results: Lea. Consier a eterinistic algorith a which is a apping fro the set containing all possible to the set containing all possible x i.e. a() = x. If there are an n possibilities for an x respectivel there will be n possible ifferent a. Theore. Given a sste with the sets X an Y with X X i X Y X 3 an Y there are i possible ifferent eterinistic algoriths. Corollar. Given a sste with the sets X an Y with X 3 an Y the set of all eterinistic algoriths is finite. We can list all of the b inicating the choices of x x 3... an x X one-b-one for all the partial histories... an respectivel. X i TABLE II. LOGIC MATRICES OF TWO DETERMINISTIC ALGORITHMS Algorith Algorith Theore. For i X let X () i be the value of i specifie in X.Given a sste with sets X an Y with X 3an Y an specific [ X () X ()... X ( i)] can be eterine the sae nuber of ties in the enueration table b each possible eterinistic algorith. We fin that ever algorith can be represente b a logic atrix [3]. Table II gives two exaples of such atrices euce fro the enueration table shown in Table I(a). A logic atrix can be interprete like this: the st colun stans for x the n for the 3 r for x an so on. A row represents a histor generate b that algorith. We also call a row a priitive logic because it gives an if-then relationship between the past histor an the next point x for = X -. For exaple the first priitive logic of Algorith can be interprete as: if [( x )] [()] then x. The whole atrix in fact characterizes all possible histories which can be generate b that algorith. The analsis can be extene to probabilistic search algoriths [3]. A probabilistic algorith is efine siilarl as a eterinistic algorith but instea of apping to a single x it aps to ultiple x with ifferent probabilities fro. B consiering the logic atrices an their priitive logics we obtain the following results: Theore 3. Given a sste with the sets X an Y with X 3an Y the corresponing eterinistic algoriths for the basis of its algorithic space which consists of all eterinistic an probabilistic algoriths. All algoriths are fore b probabilisticall cobining soe of the eterinist- Figure. An illustration of a probabilistic algorith with a set of eterinistic algoriths. ic algoriths. Corollar. Given a sste with the sets X an Y with X 3 an Y an algorith both eterinistic an probabilistic can be represente b a probabilistic istribution on the set of the eterinistic algoriths. We can eonstrate the above results with the exaple shown in Fig. which epicts a scenario of solving a iniization proble 3. In the figure the rectangle represents the solution space which is copose of all feasible solutions x of the proble. Each thin line gives a eterinistic algorith 4 in which the orer of picking x has been eterinisticall efine when the algorith is built. The thick line escribes the resulting search path of a probabilistic algorith. Along the path fro the starting point to the global iniu there are intersection points where the algorith has ore than one alternative path to choose fro. This exactl fulfills the efinition of probabilistic algoriths. In fact Theore 3 an Corollar tell us that a probabilistic algorith is characterize b a cobination of eterinistic algoriths 3 The scenario shown in Fig. is not tpical. The function is ignore. The actual cases shoul be uch ore coplicate. For siplicit an without loss of generalit we use this siplifie scenario to illustrate the results. 4 Here we characterize a eterinistic algorith with a partial x- coponent of one of its possible coputable histories. In realit it shoul be represente b a set of histories which traverse all solution points an each histor has a ifferent starting point. 4435

5 i.e. the thin lines. The behavior of the probabilistic algorith is intrinsicall efine b the cobination of the unerling eterinistic algoriths. If we know which an how the unerling eterinistic algoriths are cobine we can infer the perforance of the probabilistic algorith. We will ake use of the above results to re-investigate several issues relate to the NFL Theore. IV. A RE-VISIT OF THE NFL THEOREM We stu the etails of the NFL Theore again ainl fro []. There are several possible enhanceents of the theore. We iscuss the aspects of optiization algoriths verification of the theore an perforance easures accoringl in the following subsections. A. Optiization Algoriths In [] a eterinistic optiization algorith is efine as a apping fro previousl visite sets of points to a single previousl unvisite point in X i.e. a: D { x x x }. Then the NFL result (e.g. ()) is evelope base on a a which are ifferent representations of the general ter a. This iplies all a a for the set of eterinistic algorith A i.e. a a A 5. But what oes A inee look like? Is the set finite? Fro Theore an Corollar in Section III we have alrea given the answers. A is finite an all the eleents can be liste in the for of logic atrices. Then the authors of [] efines a probabilistic (i.e. stochastic) optiization algorith as a apping fro D to a -epenent istribution over X with zero x probabilit for all x. Let A p be the set of all possible probabilistic algoriths. The NFL result for eterinistic algoriths is also vali for probabilistic algoriths b replacing a with throughout the proof as explaine in []. Matheaticall () becoes P( f ) P( f ) for an pair of algoriths an in result is legitiate for an algoriths in A p. In this wa the NFL A an A p respectivel. The ieiate follow-up question is whether the NFL result is still true when we consier an algoriths in both A an A p at the sae tie i.e. for an A Ap P ( f ) P ( f ) We will prove (3) in Subsection C. B. Verification of the NFL Theore As we can eterine the iportant properties of search fro the enueration table an the NFL Theore is one of the funaental results of search it is logical to euce the NFL Theore fro the enueration table. In the following we tr to look at the NFL result i.e. () in the ipleentation perspective instea of the original approach base on probabilit theor []. For an sste with X an Y specifie we can prouce the corresponing enueration table (as explaine in Section III). We now consier eterinistic algoriths first. B Theore an Corollar in Section III we can list all a A in the for of logic atrices. We can check the NFL result with the following proceures:. Select a specific for X ;. For each entr in the enueration table shae it if it atches ; 3. For each a A i. Put all possible -coponents of the histories which can be generate b a in boxes; ii. Count how an entries are both in shaings an in boxes for each function an calculate the total for all functions; iii. Delete all the boxes; 4. Theore in Section III guarantees all the totals (of all a A ) are the sae. The shae entries an those in boxes represent those - coponents of histories which atch an those which can be generate b a respectivel. The shae ones in boxes enote coputable histories with goo perforance b a. The total nuber of shae entries of a in boxes reflects its abilit to generate goo results. In Step 3(ii) the irect suation to get the total iplies that we give equal weight to ever function. After fining the total we have finishe the exaination of a particular a. Step 3(iii) restores the setting for onl an akes it rea for another a. The positive answer at Step 4 tells us that the NFL result i.e. all eterinistic search algoriths a A perfor statisticall ienticall on solving coputation probles f F. Note that the perforance of an algorith is base on the histories obtaine uring execution an the histories are generate b the algorith itself. Thus the NFL results shoul be unerstoo fro the algorithic perspective. On the other han the above etho originates fro the enueration table whose generation is inepenent of the execution of the algoriths. Therefore we approach the NFL Theore fro a ifferent angle. In fact the above etho provies an enueration proof (also calle exhaustive proof) for the NFL Theore. Enueration proof 6 [] is vali when the nuber of test cases is finite. Fro Theore in Section III the set of eterinistic algoriths is finite an thus enueration proof is vali. 5 Although A is not explicitl inicate in [] it is trivial to see that all eterinistic algoriths will for the set A. 6 An exaple of using enueration proof to valiate atheatical stateents can be foun in [9]. 4436

6 To eonstrate the above etho we consier the sste with X = {3} an Y = {3} again. Let. We efine equal to [ ]. Table I shows the results of copleting up to Step 3(ii) for the two eterinistic algoriths shown in Table II (Table I(a) an I(b) correspon to Algoriths an respectivel). It is eas to check both the totals of Algorith an are equal to 9 b suing up the last coluns of Table I(a) an I(b). C. Perforance Measures In [] perforance easures are inicate b ( ) which can be interprete as an function with the -coponent of the histor as the input. The perforance is base on onl. For exaple ( ) in i{ ( i): i... } for iniizing f 7. For optiization we oubt the perforance easure shoul be base solel on. When we are optiizing f with an algorith a we want to evaluate the perforance of a with respect to the ost esirable function values of f. Without consiering f the actual values of copute b a are eaningless. We can illustrate the above iea with the following exaple: Suppose we tr to iniize two ifferent functions f an f (see Fig. ) with the sae optiization algorith a. We are onl intereste in evaluating the perforance of a after choosing the first three x in X i.e. = 3. If a generates the sae 3 [43] for both f an f can we sa that a has better perforance on either f or f b solel looking at 3? If we have soe ieas about all the -values of the functions (e.g. we have the curves of the functions as in Fig. ) we can efinitel conclue that a has better perforance on f than on f because the iniu of f has been obtaine in 3 but not for f. B onl looking at 3 however a has the sae perforance on both functions. Thus the perforance easure shoul be function-epenent an it shoul reflect the relative function values in to the ost esirable function values in question (e.g. for iniizing f with iniu * the perforance easure can check the ratio of to *). More general perforance easures can then be inicate b f ( ). Let D { : f( ) } where can be an reasonable conitions for perforance evaluation. For exaple can be specifie to require in{ Y} when = 3. Equation () i.e. the ke forula which constitutes the NFL Theore also inherits the above entione proble. The core of () is P ( f a ). In [] it is interprete as the conitional probabilit of obtaining a particular saple uner the conition that an algorith a iterates ties on a cost function f. Then the perforance of a is sai to be easure with P ( f a ) b stating that P( ( ) f a) can be easil erive fro P ( f a ). 7 This is the original exaple explaining perforance easures in []. Figure. Exaples to illustrate the effect of the perforance easure. If we aopt a ore general f ( ) as the perforance easure the NFL Theore shoul be re-state as: the average over all f of P( f( ) f a) is inepenent of a with ( ) being replace b f ( ). This result can in turn be erive b showing that for an pair of eterinistic algoriths a an a PD ( f a ) PD ( f a ) We are not tring to sa that () fails to coe up with the ore reasonable interpretation of perforance easures but we can show that () can be use to erive (4). We can obtain the connection b observing the enueration table of an sste with X an Y specifie. We tr to eonstrate the connection with the siple exaple shown in Table I(a). We first iscuss in (). The sste has X an Y with X = Y = 3. Thus there are 6 (= X! = 3!) coluns of 3 an each entr in a colun is the 3 of the corresponing f. As Y = 3 the axiu length of 3 is three. For an particular there are X exactl Y Y corresponing entries in each colun. Their locations a be ifferent in ifferent coluns i.e. the sae appears at rows corresponing to ifferent functions in ifferent coluns. For exaple [] [ ] an X X 3 [ 3] has exactl 9 ( = Y Y ) 3 (= Y Y ) an X 3 (= Y Y ) entries in each colun respectivel. We now coe to D ( ) in (4). Recall that D is a set of with the conition satisfie. When checking D fro colun to colun in an enueration table we fin that D appears exactl once in ever colun but D a correspon to ifferent f. In other wors we can consier each in D ( ) one-b-one an appl () to each of the. We have 4437

7 P ( f a ) P ( f a ) D ff D ff which can further iel (4). Fro this we are confient that the NFL Theore hols for an reasonable perforance easure. Up to now we have verifie (4) (an () which is a special case of (4)). We are going to valiate (3). Consier probabilistic algoriths Ap. B Theore 3 in Section III all probabilistic algoriths can be expresse as a probabilit istribution over the set of efine eterinistic algoriths. Let the saple space equal A. We can oel each probabilistic algorith b a iscrete rano variable H with probabilit ass function ph ( ) where h is an possible outcoe in i.e. hp( h) Ap. Thus for an a A an Ap h P ( f ) P ( f hph ) ( ) ff h ff P ( f h ) ph ( ) ff h P ( f ). (5) ff This eans that the perforance of an eterinistic algorith an that of an probabilistic algorith are the sae when average over all f. B cobining () () an (5) we get (3). Siilar to the wa of getting (4) fro () we have an ieiate corollar that for an A Ap P( D f ) P( D f ) We know that eterinistic an probabilistic algoriths constitute all optiization algoriths. Therefore an reasonable perforance easure of an algoriths (eterinistic an/or probabilistic) is statisticall ientical when average over all f. V. CONCLUSION Before the NFL Theore was publishe ost research on optiization focuse on solving specific probles with propose algoriths. The theoretical founation was largel ignore. The NFL Theore raws our attention to the theoretical founation an eonstrates a funaental liit of all search algoriths. However we fin liitations of NFL stateents in the original NFL papers. B using results fro the nature of search algoriths we enhance several aspects of the original NFL Theore. We have ientifie the properties of eterinistic an probabilistic algoriths. We provie an enueration proof. In aition we generalize the NFL results with ore general perforance easures an reove the liitations. REFERENCES [] M.R. Gare an D.S. Johnson Coputers an Intractabilit: A Guie to the Theor of NP-Copleteness. New York NY: W. H. Freean & Co Lt 979. [] D.E. Golberg Genetic Algoriths in Search Optiization an Machine Learning. Reaing MA: Aison-Wesle 989. [3] J.H. Hollan Aaptation in Natural an Artificial Sstes. Cabrige MA: MIT Press 99. [4] S. Kirkpatrick C.D. Gelatt Jr. an M.P. Vecchi Optiization b Siulate Annealing Science vol. no pp Ma 983. [5] E. Bonabeau M. Dorigo an G. Theraulaz Inspiration for Optiization fro Social Insect Behaviour Nature vol. 46 no. 679 pp Jul. [6] M. Dorigo an T. Stützle Ant Colon Optiization. Cabrige MA: MIT Press 4. [7] A.Y.S. La an V.O.K. Li Cheical-Reaction-Inspire Metaheuristic for Optiization subitte for publication. [8] F. Glover an F. Laguna Tabu Search. Norwell MA: Kluwer Acaeic Publishers 997. [9] D.H. Wolpert an W.G. Macrea No Free Lunch Theores for Search Santa Fe Institute Santa Fe NM Tech. Rep [] D.H. Wolpert an W.G. Macrea No Free Lunch Theores for Optiization IEEE Transactions on Evolutionar Coputation vol. no. pp April 997. [] Y.C. Ho an D.L. Pepne Siple Explanation of the No-Free-Lunch Theore an Its Iplications Journal of Optiization Theor an Applications vol. 5 no. 3 pp Deceber. [] J.C. Culberson On the futilit of blin search: An algorithic view of "No Free Lunch Evolutionar Coputation vol. 6 no. pp [3] A.Y.S. La an V.O.K. Li Nature of Search Algoriths Departent of Electrical an Electronic Engineering The Universit of Hong Kong Hong Kong Tech. Rep. TR-9- Januar 9. [4] C. Schuacher M.D. Vose an L.D. Whitle The No Free Lunch an Proble Description Length In Proceeings of the Genetic an Evolutionar Coputation Conference. San Francisco CA Morgan Kaufann pp [5] C. Igel an M. Toussaint No-Free-Lunch theore for non-unifor istributions of target functions Journal of Matheatical Moelling an Algoriths vol. 3 no. 4 pp [6] M.J. Streeter Two broa classes of functions for which a no free lunch result oes not hol Lecture Notes in Coputer Science (incluing subseries Lecture Notes in Artificial Intelligence an Lecture Notes in Bioinforatics) pp [7] S. Droste T. Jansen an I. Wegener Optiization with ranoize search heuristics - The (A)NFL theore realistic scenarios an ifficult functions Theoretical Coputer Science vol. 87 no. pp Septeber. [8] T. English No ore lunch: Analsis of sequential search in Proceeings of the 4 Congress on Evolutionar Coputation Portlan OR pp [9] J. Sloan Two Rectangles are Constructible with Tangras: An Enueartion Proof using Matheatica Matheatica in Eucation vol. no. 4 pp [] J. Sloan Discrete Matheatics. Upper Sale River NJ: Prentice Hall

Multivariate Methods. Matlab Example. Principal Components Analysis -- PCA

Multivariate Methods. Matlab Example. Principal Components Analysis -- PCA Multivariate Methos Xiaoun Qi Principal Coponents Analysis -- PCA he PCA etho generates a new set of variables, calle principal coponents Each principal coponent is a linear cobination of the original

More information

Probabilistic micro-earthquake location for reservoir monitoring Ran Xuan and Paul Sava, Center for Wave Phenomena, Colorado School of Mines

Probabilistic micro-earthquake location for reservoir monitoring Ran Xuan and Paul Sava, Center for Wave Phenomena, Colorado School of Mines Probabilistic icro-earthquake location for reservoir onitoring Ran Xuan an Paul Sava, Center for Wave Phenoena, Colorao School of Mines SUMMARY Micro-earthquake sources an onset ties are ientifie within

More information

Distributed Lossy Averaging

Distributed Lossy Averaging Distribute Lossy Averaging Han-I Su Departent of Electrical Engineering Stanfor University Stanfor, CA 94305, USA Eail: hanisu@stanforeu Abbas El Gaal Departent of Electrical Engineering Stanfor University

More information

Maximum a Posteriori Decoding of Turbo Codes

Maximum a Posteriori Decoding of Turbo Codes Maxiu a Posteriori Decoing of Turbo Coes by Bernar Slar Introuction The process of turbo-coe ecoing starts with the foration of a posteriori probabilities (APPs) for each ata bit, which is followe by choosing

More information

Excited against the tide: A random walk with competing drifts

Excited against the tide: A random walk with competing drifts Excite against the tie: A rano walk with copeting rifts arxiv:0901.4393v1 [ath.pr] 28 Jan 2009 Mark Holes January 28, 2009 Abstract We stuy a rano walk that has a rift β to the right when locate at a previously

More information

Ising Model on an Infinite Ladder Lattice

Ising Model on an Infinite Ladder Lattice Coun. Theor. Phys. (Beijing, China 48 (2007 pp. 553 562 c International Acaeic Publishers Vol. 48, No. 3, Septeber 15, 2007 Ising Moel on an Infinite Laer Lattice GAO Xing-Ru 2,3, an YANG Zhan-Ru 1,2 1

More information

On the Complexity of Learning with Kernels

On the Complexity of Learning with Kernels JMLR: Workshop an Conference Proceeings vol 40: 9, 05 On the Coplexity of Learning with Kernels Nicolò Cesa-Bianchi Università egli Stui i Milano, Italy Yishay Mansour Microsoft Research an Tel-Aviv University,

More information

Geometry. figure (e.g. multilateral ABCDEF) into the figure A B C D E F is called homothety, or similarity transformation.

Geometry. figure (e.g. multilateral ABCDEF) into the figure A B C D E F is called homothety, or similarity transformation. ctober 15, 2017 Geoetry. Siilarity an hoothety. Theores an probles. efinition. Two figures are hoothetic with respect to a point, if for each point of one figure there is a corresponing point belonging

More information

Geometry. Selected problems on similar triangles (from last homework).

Geometry. Selected problems on similar triangles (from last homework). October 30, 2016 Geoetry. Selecte probles on siilar triangles (fro last hoework). Proble 1(5). Prove that altitues of any triangle are the bisectors in another triangle, whose vertices are the feet of

More information

Shahlar Gachay Askerov. Baku State University, Baku, Azerbaijan

Shahlar Gachay Askerov. Baku State University, Baku, Azerbaijan Econoics Worl, Nov.-Dec. 2018, Vol. 6, No. 6, 450-456 oi: 10.17265/2328-7144/2018.06.004 D DAVID PUBLISHING Econophysical Applications for Econoic Progress: Monopoly an Copetition Cases Shahlar Gachay

More information

WAVELET-BASED ESTIMATORS OF THE INTEGRATED SQUARED DENSITY DERIVATIVES FOR MIXING SEQUENCES

WAVELET-BASED ESTIMATORS OF THE INTEGRATED SQUARED DENSITY DERIVATIVES FOR MIXING SEQUENCES Pa. J. Statist. 009 Vol. 5(3), 3-350 WAVELET-BASED ESTIMATORS OF THE INTEGRATED SQUARED DENSITY DERIVATIVES FOR MIXING SEQUENCES N. Hosseinioun, H. Doosti an H.A. Nirouan 3 Departent of Statistics, School

More information

Geometry. Selected problems on similar triangles (from last homework).

Geometry. Selected problems on similar triangles (from last homework). October 25, 2015 Geoetry. Selecte probles on siilar triangles (fro last hoework). Proble 1(5). Prove that altitues of any triangle are the bisectors in another triangle, whose vertices are the feet of

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Global safety formats in fib Model Code 2010 for design of concrete structures

Global safety formats in fib Model Code 2010 for design of concrete structures Cervenka, V: Proceeings of the 11 th International Probabilistic Workshop, Brno 2013 Global safety forats in fib Moel Coe 2010 for esign of concrete structures Vlaiir Cervenka Cervenka Consulting, Prague,

More information

Adaptive Congestion Control in ATM Networks

Adaptive Congestion Control in ATM Networks Aaptive Congestion Control in ATM Networks Farza Habibipour, Mehi Galily, Masou Faris, Ali Yazian Iran Telecounication Research Center, Ministry of ICT, Tehran, IRAN habibipor@itrc.ac.ir Abstract. In this

More information

DESIGN OF FIR FILTERS WITH ARBITRARY RESPONSES

DESIGN OF FIR FILTERS WITH ARBITRARY RESPONSES M.Tech. creit seinar report, Electronic Systes Group, EE Dept, IIT Bobay, subitte Noveber 004 DESIGN OF FIR FILTERS WITH ARBITRARY RESPONSES N. V. Murali (Roll No. 0430704) Supervisor: Prof. P. C. Paney

More information

YALE TECHNICAL REPORT

YALE TECHNICAL REPORT YALE TECHNICAL REPORT Technical Report TR509 9 May 05 On the Discrepancy of Jittere Sapling Florian Pausinger an Stefan Steinerberger ON THE DISCREPANCY OF JITTERED SAMPLING FLORIAN PAUSINGER AND STEFAN

More information

Equations of lines in

Equations of lines in Roberto s Notes on Linear Algebra Chapter 6: Lines, planes an other straight objects Section 1 Equations of lines in What ou nee to know alrea: The ot prouct. The corresponence between equations an graphs.

More information

X-Ray Notes, Part II

X-Ray Notes, Part II Noll X-ra Notes : Page X-Ra Notes Part Source ssues The Parallel X-ra aging Sste Earlier we consiere a parallel ra sste with an incient intensit that passes through a 3D object having a istribution of

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

On the Difficulty of Selecting Ising Models with Approximate Recovery

On the Difficulty of Selecting Ising Models with Approximate Recovery On the Difficulty of Selecting Ising Moels with Approxiate Recovery Jonathan Scarlett an Volkan Cevher Abstract In this paper, we consier the proble of estiating the unerlying graphical oel of an Ising

More information

SOLUTIONS for Homework #3

SOLUTIONS for Homework #3 SOLUTIONS for Hoework #3 1. In the potential of given for there is no unboun states. Boun states have positive energies E n labele by an integer n. For each energy level E, two syetrically locate classical

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Estimating Strategic Complementarities in Credit Unions Outsourcing Decisions. Ron Borzekowski and Andrew Cohen. Federal Reserve Board of Governors

Estimating Strategic Complementarities in Credit Unions Outsourcing Decisions. Ron Borzekowski and Andrew Cohen. Federal Reserve Board of Governors Estiating Strategic Copleentarities in Creit Unions Outsourcing Decisions Ron Borzekowski an Anrew Cohen Feeral Reserve Boar of Governors March 2005 (Preliinary Version) Abstract: We exaine the choice

More information

EFFECTS OF FIBER ORIENTATION FOR THE BUCKLING OF LAMINATED FIBER REINFORCED POLYMER CYLINDRICAL SHELLS

EFFECTS OF FIBER ORIENTATION FOR THE BUCKLING OF LAMINATED FIBER REINFORCED POLYMER CYLINDRICAL SHELLS EFFECTS OF FIBER ORIETATIO FOR THE BCKIG OF AMIATED FIBER REIFORCED POYMER CYIDRICA SHES M. Yanagia 1, Seishi Yaaa an K.K. Bhetwal 1 1 Grauate Stuent, Dept of Architecture an Civil Engrg, Toohashi niversit

More information

IMAGE INTERPRETATION USING APPRAISAL ANALYSIS. Abstract. Introduction

IMAGE INTERPRETATION USING APPRAISAL ANALYSIS. Abstract. Introduction IMAGE INERPREAION USING APPRAISAL ANALYSIS Partha S. Routh, Boise State University, Boise, ID Carlyle R. Miller, Boise State University, Boise, ID Abstract In geophysical inversion, a significant effort

More information

Lecture 36: Polarization Physical Optics II (Optical Sciences 330) (Updated: Friday, April 29, 2005, 8:27 PM) W.J. Dallas

Lecture 36: Polarization Physical Optics II (Optical Sciences 330) (Updated: Friday, April 29, 2005, 8:27 PM) W.J. Dallas C:\Dallas\_Courses\_OpSci_33\ Lecture Notes\36 Polariation.oc: Page of 6 Lecture 36: Polariation Phsical Optics II (Optical Sciences 33 (Upate: Fria, April 29, 25, 8:27 PM W.J. Dallas Introuction Up to

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

BINARY extension fields GF (2 m ) are heavily used

BINARY extension fields GF (2 m ) are heavily used This article has been accepte for publication in a future issue of this journal, but has not been fully eite. Content ay change prior to final publication. Citation inforation: DOI 0.09/TC.205.248408,

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Precedence Effect. Beamforming

Precedence Effect. Beamforming Preceence Effect Beaforing Deo of the ranssen effect Deonstrates preceence Introuction to 3D Auio capture Directivity of icrophone. Oni-irectional Avantages are that icrophones capture all soun incluing

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Wavelet decompositions of non-refinable shift invariant spaces

Wavelet decompositions of non-refinable shift invariant spaces Wavelet ecopositions of non-refinable shift invariant spaces S. Deel an D. Leviatan Abstract: The otivation for this wor is a recently constructe faily of generators of shift-invariant spaces with certain

More information

Note that an that the liit li! k+? k li P!;! h (k)? ((k? )) li! i i+? i + U( i ) is just a Rieann su representation of the continuous integral h h j +

Note that an that the liit li! k+? k li P!;! h (k)? ((k? )) li! i i+? i + U( i ) is just a Rieann su representation of the continuous integral h h j + G5.65: Statistical Mechanics Notes for Lecture 5 I. THE FUNCTIONAL INTEGRAL REPRESENTATION OF THE PATH INTEGRAL A. The continuous liit In taking the liit P!, it will prove useful to ene a paraeter h P

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

We develop a numerically exact method for evaluating the time-dependent mean, variance, and higherorder

We develop a numerically exact method for evaluating the time-dependent mean, variance, and higherorder INFORMS Journal on Coputing Vol. 16, No. 3, Suer 004, pp. 66 74 issn 0899-1499 eissn 156-558 04 1603 066 infors oi 10.187/ijoc.1040.0070 004 INFORMS The Ph t /Ph t / Queueing Syste: Part I The Single Noe

More information

Sample Mean Deviation (d) Chart Under the Assumption of Moderateness and its Performance Analysis Under Normality Against Moderateness

Sample Mean Deviation (d) Chart Under the Assumption of Moderateness and its Performance Analysis Under Normality Against Moderateness Volue-7, Issue-4, July-August 217 International Journal of Engineering a Manageent Research Page Nuber: 292-296 Saple Mean Deviation () Chart Uer the Assuption of Moerateness a its Perforance Analysis

More information

PHYSICS ADVANCED LABORATORY I UNIVERSAL GRAVITATIONAL CONSTANT Spring 2001

PHYSICS ADVANCED LABORATORY I UNIVERSAL GRAVITATIONAL CONSTANT Spring 2001 PHYSICS 334 - ADVANCED LABOATOY I UNIVESAL GAVITATIONAL CONSTANT Spring 001 Purposes: Deterine the value of the universal gravitation constant G. Backgroun: Classical echanics topics-oents of inertia,

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

1 Identical Parallel Machines

1 Identical Parallel Machines FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

Physics 215 Winter The Density Matrix

Physics 215 Winter The Density Matrix Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it

More information

INCLUDING MODEL UNCERTAINTY IN THE MODEL PREDICTIVE CONTROL WITH OUTPUT FEEDBACK

INCLUDING MODEL UNCERTAINTY IN THE MODEL PREDICTIVE CONTROL WITH OUTPUT FEEDBACK Brazilian Journal of Cheical Engineering ISSN 004-6632 Printe in Brazil Vol. 9, No. 04, pp. 475-482, October - Deceber 2002 INCLUDING MODEL UNCERAINY IN HE MODEL PREDICIVE CONROL WIH OUPU FEEDBACK M.A.Rorigues

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Figure 1: Equivalent electric (RC) circuit of a neurons membrane

Figure 1: Equivalent electric (RC) circuit of a neurons membrane Exercise: Leaky integrate and fire odel of neural spike generation This exercise investigates a siplified odel of how neurons spike in response to current inputs, one of the ost fundaental properties of

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Simulated Annealing. Simulated Annealing

Simulated Annealing. Simulated Annealing Nonlinear Inverse Probles Siulate Annealing θ µ Siulate Annealing What is siulate annealing? Siulate annealing an probabilistic inversion Exaples he proble: we nee to efficiently search a possibly ulti-oal

More information

Influence of Surface Roughness on Sliding Characteristics of Rubber Seals

Influence of Surface Roughness on Sliding Characteristics of Rubber Seals TECHNICAL REPORT Influence of Surface Roughness on Sliing Characteristics of Seals K. YAMAMOTO D. OZAKI T. NAKAGAWA The influence of surface roughness on frictional vibration of a bearing seal has been

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Adapting the Pheromone Evaporation Rate in Dynamic Routing Problems

Adapting the Pheromone Evaporation Rate in Dynamic Routing Problems Adapting the Pheroone Evaporation Rate in Dynaic Routing Probles Michalis Mavrovouniotis and Shengxiang Yang School of Coputer Science and Inforatics, De Montfort University The Gateway, Leicester LE1

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

Benchmarking Power System Stabilizer Controller Performance Using Conventional Lead/Lag, Fuzzy, and Matlab PID

Benchmarking Power System Stabilizer Controller Performance Using Conventional Lead/Lag, Fuzzy, and Matlab PID Bencharking Power Syste Stabilizer Controller Perforance Using Conventional Lea/Lag an Matlab PI MOHAMA HALI BILAL HANI BABA lectrical ngineering epartent University of Balaan P. O. Box ripoli LBANON ohaa.khali@balaan.eu.lb

More information

(Received 2006 May 29; revised 2007 September 26; accepted 2007 September 26)

(Received 2006 May 29; revised 2007 September 26; accepted 2007 September 26) Estiation of the iniu integration tie for eterining the equialent continuous soun leel with a gien leel of uncertainty consiering soe statistical hypotheses for roa traffic S. R. e Donato a) (Receie 006

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Computability and Complexity Random Sources. Computability and Complexity Andrei Bulatov

Computability and Complexity Random Sources. Computability and Complexity Andrei Bulatov Coputabilit and Copleit 29- Rando Sources Coputabilit and Copleit Andrei Bulatov Coputabilit and Copleit 29-2 Rando Choices We have seen several probabilistic algoriths, that is algoriths that ake soe

More information

1 Proof of learning bounds

1 Proof of learning bounds COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a

More information

A CHARACTRIZATION OF GRAPHS WITH 3-PATH COVERINGS AND THE EVALUATION OF THE MINIMUM 3-COVERING ENERGY OF A STAR GRAPH WITH M RAYS OF LENGTH 2

A CHARACTRIZATION OF GRAPHS WITH 3-PATH COVERINGS AND THE EVALUATION OF THE MINIMUM 3-COVERING ENERGY OF A STAR GRAPH WITH M RAYS OF LENGTH 2 A CHARACTRIZATION OF GRAPHS WITH -PATH COVERINGS AND THE EVALUATION OF THE MINIMUM -COVERING ENERGY OF A STAR GRAPH WITH M RAYS OF LENGTH PAUL AUGUST WINTER DEPARTMENT OF MATHEMATICS, UNIVERSITY OF KWAZULU

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

Introduction to Information Security

Introduction to Information Security Introuction to Inforation Security Lecture : Classical Ciphers 007. 6. Prof. Byoungcheon Lee sultan (at) joongbu. ac. kr Inforation an Counications University Contents 1. History of cryptographic research.

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

A Markov Framework for the Simple Genetic Algorithm

A Markov Framework for the Simple Genetic Algorithm A arkov Fraework for the Siple Genetic Algorith Thoas E. Davis*, Jose C. Principe Electrical Engineering Departent University of Florida, Gainesville, FL 326 *WL/NGS Eglin AFB, FL32542 Abstract This paper

More information

Midterm 1 Sample Solution

Midterm 1 Sample Solution Midter 1 Saple Solution NOTE: Throughout the exa a siple graph is an undirected, unweighted graph with no ultiple edges (i.e., no exact repeats of the sae edge) and no self-loops (i.e., no edges fro a

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

When Short Runs Beat Long Runs

When Short Runs Beat Long Runs When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long

More information

16 Independence Definitions Potential Pitfall Alternative Formulation. mcs-ftl 2010/9/8 0:40 page 431 #437

16 Independence Definitions Potential Pitfall Alternative Formulation. mcs-ftl 2010/9/8 0:40 page 431 #437 cs-ftl 010/9/8 0:40 page 431 #437 16 Independence 16.1 efinitions Suppose that we flip two fair coins siultaneously on opposite sides of a roo. Intuitively, the way one coin lands does not affect the way

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

c h L 75 10

c h L 75 10 hapter 31 1. (a) All the energy in the circuit resies in the capacitor when it has its axiu charge. The current is then zero. f Q is the axiu charge on the capacitor, then the total energy is c c h h U

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual 6 IEEE Congress on Evolutionary Coputation Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-1, 6 On the Analysis of the Quantu-inspired Evolutionary Algorith with a Single Individual

More information

Qualitative Modelling of Time Series Using Self-Organizing Maps: Application to Animal Science

Qualitative Modelling of Time Series Using Self-Organizing Maps: Application to Animal Science Proceedings of the 6th WSEAS International Conference on Applied Coputer Science, Tenerife, Canary Islands, Spain, Deceber 16-18, 2006 183 Qualitative Modelling of Tie Series Using Self-Organizing Maps:

More information

Use of PSO in Parameter Estimation of Robot Dynamics; Part One: No Need for Parameterization

Use of PSO in Parameter Estimation of Robot Dynamics; Part One: No Need for Parameterization Use of PSO in Paraeter Estiation of Robot Dynaics; Part One: No Need for Paraeterization Hossein Jahandideh, Mehrzad Navar Abstract Offline procedures for estiating paraeters of robot dynaics are practically

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

MULTIPLAYER ROCK-PAPER-SCISSORS

MULTIPLAYER ROCK-PAPER-SCISSORS MULTIPLAYER ROCK-PAPER-SCISSORS CHARLOTTE ATEN Contents 1. Introduction 1 2. RPS Magas 3 3. Ites as a Function of Players and Vice Versa 5 4. Algebraic Properties of RPS Magas 6 References 6 1. Introduction

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial

More information