Approximating discrete probability distributions with Bayesian networks

Size: px
Start display at page:

Download "Approximating discrete probability distributions with Bayesian networks"

Transcription

1 Approximating dicrete probability ditribution with Bayeian network Jon Williamon Department of Philoophy King College, Str and, London, WC2R 2LS, UK Abtract I generalie the argument of [Chow & Liu 1968] to how that a Bayeian network atifying ome arbitrary contraint that bet approximate a probability ditribution i one for which mutual information weight i maximied. I give a practical procedure for finding an approximation network. The plan i firt to dicu the approximation problem and it link with Bayeian network theory. After identifying the optimal approximation, the bulk of the paper will be devoted to a propoed approximation algorithm which acrafice optimality in favour of practicality. We hall invetigate the theoretical bai and performance of thi approximation trategy. 1 THE APPROIMATION PROBLEM It can be quite unfeaible to determine, tore and manipulate a dicrete probability ditribution. Working with a ditribution over N binary variable, for intance, one mut find and tore at leat 2 N 1 probability value and it may till take too long to calculate the probability of a tatement (or event) of interet. Conequently the quetion of whether one can approximate a ditribution ufficiently accurately uing a reaonable number of pecifying value i of key importance. [Chow & Liu 1968] partially anwered thi quetion uing an innovative and highly practical method. I hall briefly outline their anwer in the language of Bayeian network theory. A Bayeian network i a directed acyclic graph (dag) over node C 1 ;:::;C N, together with a et of probability value p(c i jd i ) for each node literal c i (of the form C i v i where v i 2 fvi 1 ;:::;vki i g, the value that node C i can take) and each tate d i (a conjunction of literal c j1 ^ ::: ^ c jn ) of the direct predeceor or parent D i fc j1 ;:::;C jn g of C i. 1 Under an independence a- 1 Note that for each node the probability of one literal c can be umption, namely that any node i independent of it nondecendant conditional on it parent, a Bayeian network uffice to determine a probability ditribution, ince for each atomic Q tate of the form c 1 ^ :::^ c N we have that i p(c ijd i ) where c i i the literal and d i i the parent tate of node C i conitent with (the factor i taken to be the unconditional probability p(c i ) if C i ha no parent). Thu, depending on the connectivity in the graph, the Bayeian network repreentation of a probability function can dramatically reduce the number of probability value required to pecify the function. I hall call the number of pecifying probabilitie the complexity of a Bayeian network. While a complete dag on binary-valued node require maximum complexity 2 N 1 in a Bayeian network, a tree-haped dag only require 2N 1 pecifier, a ignificant aving. Chow and Liu howed that a tree-baed Bayeian network (with induced probability ditribution q) that bet approximate a target ditribution p (according to the cro-entropy P meaure of ditance between ditribution d(p; q) log where the are the atomic q() tate) i a maximum weight panning tree where arc between two node P are weighted by their mutual information I(C i ;C j ) c i;c j p(c i ^ c j )log p(ci^cj ) p(c i)p(c j. Chow and Liu ) alo gave an algorithm for obtaining the maximum weight panning tree: at each tage chooe the heaviet arc whoe addition enure the graph remain a foret, until one i left with a tree which we can orient a a dag. Thi propoal ha proved valuable becaue it allow the efficient approximation of a probability function. However it only partially anwer our key quetion, which aked whether one can have a ufficiently accurate approximation. The problem i that a tree-baed network may not give an approximation that i cloe enough for our purpoe, whatever they are. I hall look here at how one might bet approximate a probability ditribution by an arbitrary Bayeian network ubject to ome contraint C. Conider by way of example the determined by that of the other due to additivity I hall aume thee redundant probabilitie are left out of a pecification.

2 following contraint. ffl C 1 : no node ha more than K parent, for ome contant K. Thi bound on the number of parent erve to retrict the complexity of a Bayeian network. For intance if K 0 then the dicrete network (no arrow) i the bet approximation, if K 1then we require the bet tree approximation, and if K N 1 any complete network will determine the target ditribution exactly. It i eay to ee that if all variable are binary, the complexity of the network i le than or equal to (N K +1)2 K 1. ffl C 2 : the Bayeian network i of complexity at mot». Now if» N the only approximation i the dicrete network and if» 2 N 1 any complete network will give the target ditribution itelf. Depending on the problem in hand and available reource we will want to chooe an appropriate value for» or K which balance degree of approximation and complexity. ffl C 3 : the graph i ingly-connected. Having a ingly connected graph enure that the Bayeian network can be ued to calculate required probabilitie efficiently (in time polynomial in the number of node N). Note however that a ingly-connected network can have complexity up to 2 N 1 + N 1 on binaryvalued node, o in practice thi contraint may bet be ued with another which limit complexity. 2 THE BEST APPROIMATION One can traightforwardly generalie Chow and Liu proof that the bet tree-baed approximation i the maximum weight panning tree. The ditance between the probability function q determined by our Bayeian network and the target function p i d(p; q) log log q() log where the c i and d i are conitent with, log log N i1 N i1 N i1 log p(c i ) NY i1 p(c i jd i ) log p(c i jd i ) log p(c i ^ d i ) p(c i )p(d i ) H(p) N i1 I(C i ;D i )+ N i1 H(pj Ci ) where H(p) i the entropy of function p, I(C i ;D i ) i the mutual information between C i and it parent and H(pj Ci ) i the entropy of p retricted to node C i. The entropie are independent of the choice of Bayeian network o the ditance between the network and target ditribution i minimied jut when the total mutual information i maximied. 3 FINDING A GOOD APPROIMATION 3.1 THE IDEAL NETWORK Our contraint C come into play now, for we want to determine the maximum weight Bayeian network that atifie C: for example the maximum weight Bayeian network with node having at mot K parent. Unfortunately, it i doubtful a to whether one can efficiently find the maximum weight network which atifie arbitrary C. Clearly the brute-force way, which involve weighing all network that atify the contraint and chooing the heaviet, will be unfeaible ince the earch pace i o vat. In the abence of a practical exact method we have a choice: we can either fix C and purue pecial-cae algorithm, or we can look for general algorithm which yield network with approximately maximum weight. [Rebane & Pearl 1989] take the former approach for contraint C 3 : they give a procedure whereby if a ditribution can be repreented exactly by a ingly-connected Bayeian network then, ubject to certain aumption, that repreentation can be found. I will follow the latter coure here. 3.2 THE ADDING-ARROWS ALGORITHM Firt notice that while Chow and Liu weight were attached to arc, our mutual information weight I(C i ;D i ) (where a uual D i i the et of parent of C i ) are rather more general I hall call thee weight detached. I will however attach weight to arrow a follow: weigh arrow C j! C i in graph G by p(c i ^ c j jd i ) I(C i ;C j jd i ) p(c i ^ c j ^ d i )log p(c i jd i )p(c j jd i ) c i;c j;d i where D i i the et of C i other parent in G and the c i, c j are literal involving C i, C j and the d i are tate involving the D i. My propoed adding-arrow algorithm goe roughly a follow. At each tage chooe the heaviet arrow whoe incluion enure that C till hold and that the graph remain a dag. Stop when no more arrow can be added.

3 My uggetion i baed on the following obervation: I(A; fb; Cg) I(A; B) +I(A; CjB). PROOF: I(A; B) +I(A; CjB) 2 a;b;c a;b;c a;b;c p(a ^ b ^ c)» log p(a ^ b) p(a)p(b) + log p(a ^ cjb) p(ajb)p(cjb) p(a ^ b)p(a ^ b ^ c)p(b)p(b) p(a ^ b ^ c) log p(a)p(b)p(b)p(a ^ b)p(c ^ b) p(a ^ b ^ c) p(a ^ b ^ c) log I(A; fb; Cg) p(a)p(c ^ b) If the parent of node C are D fd 1 ;:::;D n g we can iterate the above relation to get I(C; D) I(C; D 1 )+I(C; D 2 jd 1 )+I(C; D 3 jfd 1 ;D 2 g)+::: + I(C; D n jfd 1 ;:::;D n 1 g). Thu the total detached weight of the reulting graph i jut the um of the arrow weight. The cro-entropy ditance between the network ditribution and the target ditribution i therefore minimied jut when the um of the arrow weight i maximied. The adding-arrow algorithm provide a greedy earch for the maximum total weight by maximiing each individual arrow weight. Note that the weight change at each tage o the greedy earch will not necearily find the maximum total weight: if one added a le than maximum weight arrow at ome tage, ubequent arrow may in theory have greater weight leading to a larger total. Neverthele the greedy earch i a good heuritic trategy, a we hall ee after making the algorithm more precie and after an example of the algorithm in action. In order to complete the definition of the algorithm jut note that at each tage there may be more than one maximum weight arrow conitent with C and the dag tructure. In uch a cae the previou graph will pawn everal new graph a each of thee arrow i added. Thi doe not give rie to an exploion in the number of graph under invetigation ince at each tage one can eliminate any graph that i no longer of maximum weight, and ince a the graph become more dene there are likely to be fewer optimal arrow to add. 3.3 AN EAMPLE Conider the example given by Chow and Liu (in my notation) under the contraint that the complexity of the network mut be no more than 8. Here we have four binary variable C 1 ;C 2 ;C 3 ;C 4 whoe probability ditribution can be pecified by Table 1. We tart off with a dicrete graph G 0, which induce a Bayeian network of complexity 4. Then we work out the unconditional mutual information, a Chow and Liu did, to give Table 2. Table 1: Probabilitie of atomic tate C 1 C 2 C 3 C 4 probability Table 2: Value for G 0 C 1 C 2 ; C 2 C 3 ; C 3 C 4 ;

4 Table 3: Value for G 1a C 1 C 2 ; C 1 C 3 C C 3 C 4 ; C 3 C 4 C Table 4: Value for G 1b C 1 C 2 ; C 1 C 2 C C 2 C 4 C C 3 C 4 ; Now I(C 2 ;C 3 ) i highet o we pawn two graph, G 1a with the arrow C 2! C 3 and G 1b with the arrow C 3! C 2. Each of thee graph give rie to network of complexity 5. At the next tage for G 1a we mut recalculate mutual information value involving C 3, but conditional on C 2 : I(C 1 ;C 3 jc 2 ) and I(C 3 ;C 4 jc 2 ). Note that the computation can be decompoed a follow: p(c 1 ^ c 3 jc 2 ) I(C 1 ;C 3 jc 2 ) p(c 1^c 2^c 3 )log p(c c 1 jc 2 )p(c 3 jc 2 ) 1;c 2;c 3 p(c 1 ^ c 2 ^ c 3 )p(c 2 ) p(c 1 ^ c 2 ^ c 3 )log p(c c 1 ^ c 2 )p(c 3 ^ c 2 ) 1;c 2;c 3 c 1;c 2;c 3 p(c 1 ^ c 2 ^ c 3 ) log p(c 1 ^ c 2 ^ c 3 )p(c 2 )p(c 1 )p(c 2 )p(c 3 ) p(c 1 )p(c 2 )p(c 3 )p(c 1 ^ c 2 )p(c 3 ^ c 2 ) I(C 1 ;C 2 ;C 3 ) I(C 1 ;C 2 ) I(C 2 ;C 3 ) Alternatively one might ue the identity I(C 1 ;C 3 jc 2 ) Pc 1;c 2;c 3 p(c 1 ^ c 2 ^ c 3 ) log p(c3jc1^c2) p(c 3jc 2) to calculate thee value. In Table 3 we have the value for G 1a, and the value for G 1b are in Table 4. Thu I(C 1 ;C 2 jc 3 ) ha the greatet value at thi tage. We can eliminate G 1a and add C 1! C 2 to G 1b to obtain G 2 a in Figure 1. Thi graph give rie to a network of complexity 7. We cannot next have another arrow into C 2 ince that would increae the complexity to 11. Therefore we have Table 5 for G 2 : C1 - C2 Φ* C3 ΦΦ C4 Figure 1: G 2 Table 5: Value for G 2 C 3 C 4 ; There are three contender for maximum weight and each bring the graph up to maximum complexity 8. Thu we can pawn five final graph by adding one of C 1! C 4 ;C 4! C 1 ;C 2! C 4 ;C 3! C 4 and C 4! C 3 to G 2. Each of thee graph G 3a ;:::;G 3e give rie to a cloet approximation to the target ditribution, ubject to our choen contraint. 3.4 PERFORMANCE OF THE ALGORITHM Conider the following direct generaliation of Chow and Liu original algorithm in the context of contraint C 1 :a node in the network can have at mot K parent. ffl For each node C and et D of up to K other node calculate I(C; D). Pick the C, D which maximie thi information and add an arrow from each node in D to C. Iterate thi procedure, enuring that the graph adhere to the dag tructure. Thi give another greedy earch for the optimal network and work by uing the detached weight and allowing the addition of multiple arrow at a time conequently I will call it the multiple-arrow algorithm to ditinguih it from the adding-arrow algorithm that we have been examining. Clearly thi algorithm efficiency i highly dependent on information value K, ince at the firt tage N P K i1 mut be found. If K 0we have the dicrete dag a expected. K 1 give u Chow and Liu algorithm but any larger value of K will render the method impracticable for large N. While the algorithm may not be of much ue in practice, the fact that one can add multiple arrow at once a oppoed to one arrow at a time ugget that we are weakening a contraint on our adding-arrow algorithm and therefore opening up the earch pace. Indeed, if it weren t for the added requirement of dag tructure, the multiple-arrow procedure would be guaranteed to reach the bet approximation it i only becaue adding arrow retrict the addition of further arrow that the algorithm become greedy. We hall ee now that urpriingly the N i

5 Comparion of multiple-arrow and adding- Figure 2: arrow. Figure 3: Succe under variou contraint. adding-arrow algorithm perform lightly better than the apparently more general method. In thi experiment I compared the two algorithm only for K 2 and mall value of N, due to the computational intractability of the multiple-arrow algorithm. I elected a random target ditribution by generating a Bayeian network at random and uing it to determine a ditribution. The network wa elected a follow. Firt a dag i choen at random: an ancetral order i u-randomly picked; 2 then for each node a u-random number of ucceor in the order are choen to be it children, and then thoe children are picked from the ucceor at u-random. Thu the weight i on mediumly complex graph, with very highly connected or diconnected graph le likely. 3 The pecifying probabilitie were generated uniformly at random from machine real. Having generated the network G Λ I ran the multiple-arrow algorithm (uing detached weight) to produce maximum weight graph relative to the ditribution p determined by G Λ, and then found maximum weight graph according to the adding-arrow algorithm (uing arrow weight). I then turned thee graph into Bayeian network by adding probability pecification obtained from the target network. I meaured how much further (in term of cro-entropy) the adding-arrow network wa from the target network than the multiple-arrow network. I then repeated the experiment until I could etimate the average difference in ditance for a range of value of N, the total number of (binary-valued) node. The reult are to be een in Figure 2. The reult how that the adding-arrow network are on average marginally cloer to the target ditribution than the multiple-arrow network and that the margin increae 2 I ue the expreion u-randomne to denote uniform randomne: that i, each choice in a finite partition ha the ame probability of being choen. 3 Alternatively one can generate graph a follow. For each pair of node decide whether they hould be joined by an arrow at random an arrow being a likely a none and then if there i to be an arrow decide the direction at random one direction wa a likely a the other. Reject graph that turn out not to be dag. Thu mediumly dene graph are again mot likely. It turn out that thi procedure give very imilar reulting trend. with N. Although thi i not a deciive tet becaue the multiple-arrow trategy i a much of an unknown quantity a the adding-arrow method, thi i at leat an encouraging tart. Comparing trategie for deriving Bayeian network give one teting procedure, but we can alo devie a imple tand-alone tet of the ucce of the adding-arrow approach. One can meaure the ucce of a derived network H a a percentage, 100[1 d(g Λ ;H)d(G Λ ;D)], where d meaure the cro-entropy ditance between ditribution determined by two network, G Λ i the target network and D i the dicrete network. By adding arrow one move from the dicrete network to the target network and the ucce of the derived network i the percentage of the total ditance that ha been covered. Figure 3 how the ucce of the adding-arrow algorithm for a range of node under variou contraint. A target network G Λ wa generated uing the ame random procedure a above, and derived network were generated by the greedy adding-arrow method. The experiment wa repeated o that the average ucce could be etimated. The front row how the percentage ditance gained under the contraint that the reulting graph mut be a tree or foret thi i the contraint that Chow and Liu conidered. For the econd row the contraint wa that the graph hould be ingly-connected and have no more than two parent. We can ee that the approximation are on average ignificantly cloer to the target ditribution than the foretbaed approximation. Further improvement i to be noted in the third row, where the ingle-connectedne contraint i dropped. Likewie for the fourth and the back row, where complexity i limited to 10N and 2N 2 repectively. Thank to the Machine Learning Repoitory 4 it i poible to tet the adding-arrow approach on a range of meaningful databae. However many of thee databae have miing value. While the adding-arrow approach work a normal on thee databae, the ucce meaure can be rather mileading here. The problem i that calculating cro-entropy require finding atomic tate probabilitie and that cae with miing value are ignored becaue they 4 [Blake & Merz 1998].

6 Figure 4: Databae under tructural contraint. Figure 5: Databae under complexity contraint. provide no information about thee probabilitie. However cae with miing value do provide ueful information about other probabilitie and hould not be ignored when calculating mutual information value. Conequently we are not aiming at the ditribution pecified by the databae cae with no miing value, but ome other le tangible ditribution. Furthermore, data may be miing due to ytematic bia, the knowledge of which will further alter the target ditribution. It i thi difference between the databae ditribution and the true target ditribution which make the ucce meaure (which tell u how much cloer we get to the databae ditribution) inappropriate. There i an alternative ucce meaure which i not uceptible to thi retriction, 5 but thi involve coniderably more computational time and i conidered elewhere. Conequently I focu here on databae with no miing value. Thu the adding-arrow algorithm wa run on a range of databae target ditribution and the final percentage ucce wa meaured. Figure 4 how the improvement that the relaxation of tructural contraint make on the approximation. In Figure 5 we can ee that relaxing complexity bound alo improve the approximation. 4 CONCLUSION We have een that the bet approximation to a dicrete probability ditribution by a Bayeian network ubject to an arbitrary contraint C i that which maximie detached 5 [Williamon 2000]. mutual information weight, or equivalently, conditional mutual information weight attached to arrow. While we can in theory find the bet approximation itelf, there are practical reaon for preferring a greedy adding-arrow trategy, which appear to give u cloe to the bet approximation. A to which contraint i mot appropriate will depend on the application. One may want to top adding arrow when within a certain ditance of the ditribution determined by ome databae, 6 or when a certain level of practical reliability of the approximation network i achieved: for example if the network i to be ued to olve a diagnotic problem one may want it to give the ame diagnoi a a databae ditribution in perhap 95 percent of cae, and o one may be prepared to top adding arrow when thi reliability i achieved. The fact that the adding-arrow approach doe not hinge on any particular contraint can only tand in it favour. Often in practice an expert will be able to provide qualitative caual knowledge of the domain under invetigation. While a caual dag need not atify the independence aumption itelf, it can provide ueful information about dependencie, and one can apply the method outlined here to add further arrow to the caual graph in order that the independence aumption may be more cloely atified. Thi yield a two-tage methodology for Bayeian network whereby firt one elicit a caual graph and then econdly one tranform that graph into a Bayeian network. More on two-tage Bayeian network can be found in [Williamon 2000b]. Acknowledgement Thank to the Art and Humanitie Reearch Board for funding thi reearch. Reference [Blake & Merz 1998] C.L. Blake & C.J. Merz: UCI Repoitory of machine learning databae, mlearn/mlrepoitory.html, Irvine, CA: Univerity of California, Department of Information and Computer Science. [Chow & Liu 1968] C.K. Chow & C.N. Liu: Approximating dicrete probability ditribution with dependence tree, IEEE Tranaction on Information Theory IT-14, page [Rebane & Pearl 1989] George Rebane & Judea Pearl: The recovery of caual poly-tree from tatitical 6 On the one hand one would like to cloely approximate the target ditribution, but on the other one would not want to overfit the ditribution, and one may want to acrifice ome fit in order to lower the complexity of the approximation network.

7 data, Uncertainty in Artificial Intelligence 3, page [Williamon 2000] Jon Williamon: Adding arrow to caual network, philoophy.ai report pai jw 00 b, [Williamon 2000b] Jon Williamon: Two-tage Bayeian network, philoophy.ai report pai jw 00 c,

Social Studies 201 Notes for November 14, 2003

Social Studies 201 Notes for November 14, 2003 1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Social Studies 201 Notes for March 18, 2005

Social Studies 201 Notes for March 18, 2005 1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall Beyond Significance Teting ( nd Edition), Rex B. Kline Suggeted Anwer To Exercie Chapter. The tatitic meaure variability among core at the cae level. In a normal ditribution, about 68% of the core fall

More information

Lecture 7: Testing Distributions

Lecture 7: Testing Distributions CSE 5: Sublinear (and Streaming) Algorithm Spring 014 Lecture 7: Teting Ditribution April 1, 014 Lecturer: Paul Beame Scribe: Paul Beame 1 Teting Uniformity of Ditribution We return today to property teting

More information

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang

More information

Singular perturbation theory

Singular perturbation theory Singular perturbation theory Marc R. Rouel June 21, 2004 1 Introduction When we apply the teady-tate approximation (SSA) in chemical kinetic, we typically argue that ome of the intermediate are highly

More information

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004 18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem

More information

μ + = σ = D 4 σ = D 3 σ = σ = All units in parts (a) and (b) are in V. (1) x chart: Center = μ = 0.75 UCL =

μ + = σ = D 4 σ = D 3 σ = σ = All units in parts (a) and (b) are in V. (1) x chart: Center = μ = 0.75 UCL = Our online Tutor are available 4*7 to provide Help with Proce control ytem Homework/Aignment or a long term Graduate/Undergraduate Proce control ytem Project. Our Tutor being experienced and proficient

More information

Clustering Methods without Given Number of Clusters

Clustering Methods without Given Number of Clusters Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,

More information

NCAAPMT Calculus Challenge Challenge #3 Due: October 26, 2011

NCAAPMT Calculus Challenge Challenge #3 Due: October 26, 2011 NCAAPMT Calculu Challenge 011 01 Challenge #3 Due: October 6, 011 A Model of Traffic Flow Everyone ha at ome time been on a multi-lane highway and encountered road contruction that required the traffic

More information

Physics 741 Graduate Quantum Mechanics 1 Solutions to Final Exam, Fall 2014

Physics 741 Graduate Quantum Mechanics 1 Solutions to Final Exam, Fall 2014 Phyic 7 Graduate Quantum Mechanic Solution to inal Eam all 0 Each quetion i worth 5 point with point for each part marked eparately Some poibly ueful formula appear at the end of the tet In four dimenion

More information

Codes Correcting Two Deletions

Codes Correcting Two Deletions 1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of

More information

Comparing Means: t-tests for Two Independent Samples

Comparing Means: t-tests for Two Independent Samples Comparing ean: t-tet for Two Independent Sample Independent-eaure Deign t-tet for Two Independent Sample Allow reearcher to evaluate the mean difference between two population uing data from two eparate

More information

CHAPTER 6. Estimation

CHAPTER 6. Estimation CHAPTER 6 Etimation Definition. Statitical inference i the procedure by which we reach a concluion about a population on the bai of information contained in a ample drawn from that population. Definition.

More information

Preemptive scheduling on a small number of hierarchical machines

Preemptive scheduling on a small number of hierarchical machines Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,

More information

EC381/MN308 Probability and Some Statistics. Lecture 7 - Outline. Chapter Cumulative Distribution Function (CDF) Continuous Random Variables

EC381/MN308 Probability and Some Statistics. Lecture 7 - Outline. Chapter Cumulative Distribution Function (CDF) Continuous Random Variables EC38/MN38 Probability and Some Statitic Yanni Pachalidi yannip@bu.edu, http://ionia.bu.edu/ Lecture 7 - Outline. Continuou Random Variable Dept. of Manufacturing Engineering Dept. of Electrical and Computer

More information

Avoiding Forbidden Submatrices by Row Deletions

Avoiding Forbidden Submatrices by Row Deletions Avoiding Forbidden Submatrice by Row Deletion Sebatian Wernicke, Jochen Alber, Jen Gramm, Jiong Guo, and Rolf Niedermeier Wilhelm-Schickard-Intitut für Informatik, niverität Tübingen, Sand 13, D-72076

More information

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281 72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition

More information

Lecture 9: Shor s Algorithm

Lecture 9: Shor s Algorithm Quantum Computation (CMU 8-859BB, Fall 05) Lecture 9: Shor Algorithm October 7, 05 Lecturer: Ryan O Donnell Scribe: Sidhanth Mohanty Overview Let u recall the period finding problem that wa et up a a function

More information

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation IEOR 316: Fall 213, Profeor Whitt Topic for Dicuion: Tueday, November 19 Alternating Renewal Procee and The Renewal Equation 1 Alternating Renewal Procee An alternating renewal proce alternate between

More information

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover Coping With NP-Hardne Chapter 12 Local Search Q Suppoe I need to olve an NP-hard problem What hould I do? A Theory ay you're unlikely to find poly-time algorithm Mut acrifice one of three deired feature

More information

MATEMATIK Datum: Tid: eftermiddag. A.Heintz Telefonvakt: Anders Martinsson Tel.:

MATEMATIK Datum: Tid: eftermiddag. A.Heintz Telefonvakt: Anders Martinsson Tel.: MATEMATIK Datum: 20-08-25 Tid: eftermiddag GU, Chalmer Hjälpmedel: inga A.Heintz Telefonvakt: Ander Martinon Tel.: 073-07926. Löningar till tenta i ODE och matematik modellering, MMG5, MVE6. Define what

More information

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog Chapter Sampling and Quantization.1 Analog and Digital Signal In order to invetigate ampling and quantization, the difference between analog and digital ignal mut be undertood. Analog ignal conit of continuou

More information

A FUNCTIONAL BAYESIAN METHOD FOR THE SOLUTION OF INVERSE PROBLEMS WITH SPATIO-TEMPORAL PARAMETERS AUTHORS: CORRESPONDENCE: ABSTRACT

A FUNCTIONAL BAYESIAN METHOD FOR THE SOLUTION OF INVERSE PROBLEMS WITH SPATIO-TEMPORAL PARAMETERS AUTHORS: CORRESPONDENCE: ABSTRACT A FUNCTIONAL BAYESIAN METHOD FOR THE SOLUTION OF INVERSE PROBLEMS WITH SPATIO-TEMPORAL PARAMETERS AUTHORS: Zenon Medina-Cetina International Centre for Geohazard / Norwegian Geotechnical Intitute Roger

More information

Evolutionary Algorithms Based Fixed Order Robust Controller Design and Robustness Performance Analysis

Evolutionary Algorithms Based Fixed Order Robust Controller Design and Robustness Performance Analysis Proceeding of 01 4th International Conference on Machine Learning and Computing IPCSIT vol. 5 (01) (01) IACSIT Pre, Singapore Evolutionary Algorithm Baed Fixed Order Robut Controller Deign and Robutne

More information

Nonlinear Single-Particle Dynamics in High Energy Accelerators

Nonlinear Single-Particle Dynamics in High Energy Accelerators Nonlinear Single-Particle Dynamic in High Energy Accelerator Part 6: Canonical Perturbation Theory Nonlinear Single-Particle Dynamic in High Energy Accelerator Thi coure conit of eight lecture: 1. Introduction

More information

1. The F-test for Equality of Two Variances

1. The F-test for Equality of Two Variances . The F-tet for Equality of Two Variance Previouly we've learned how to tet whether two population mean are equal, uing data from two independent ample. We can alo tet whether two population variance are

More information

Multicolor Sunflowers

Multicolor Sunflowers Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of

More information

GNSS Solutions: What is the carrier phase measurement? How is it generated in GNSS receivers? Simply put, the carrier phase

GNSS Solutions: What is the carrier phase measurement? How is it generated in GNSS receivers? Simply put, the carrier phase GNSS Solution: Carrier phae and it meaurement for GNSS GNSS Solution i a regular column featuring quetion and anwer about technical apect of GNSS. Reader are invited to end their quetion to the columnit,

More information

Problem Set 8 Solutions

Problem Set 8 Solutions Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem

More information

Bogoliubov Transformation in Classical Mechanics

Bogoliubov Transformation in Classical Mechanics Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How

More information

Source slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis

Source slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis Source lideplayer.com/fundamental of Analytical Chemitry, F.J. Holler, S.R.Crouch Chapter 6: Random Error in Chemical Analyi Random error are preent in every meaurement no matter how careful the experimenter.

More information

Asymptotics of ABC. Paul Fearnhead 1, Correspondence: Abstract

Asymptotics of ABC. Paul Fearnhead 1, Correspondence: Abstract Aymptotic of ABC Paul Fearnhead 1, 1 Department of Mathematic and Statitic, Lancater Univerity Correpondence: p.fearnhead@lancater.ac.uk arxiv:1706.07712v1 [tat.me] 23 Jun 2017 Abtract Thi document i due

More information

Lecture 8: Period Finding: Simon s Problem over Z N

Lecture 8: Period Finding: Simon s Problem over Z N Quantum Computation (CMU 8-859BB, Fall 205) Lecture 8: Period Finding: Simon Problem over Z October 5, 205 Lecturer: John Wright Scribe: icola Rech Problem A mentioned previouly, period finding i a rephraing

More information

Design spacecraft external surfaces to ensure 95 percent probability of no mission-critical failures from particle impact.

Design spacecraft external surfaces to ensure 95 percent probability of no mission-critical failures from particle impact. PREFERRED RELIABILITY PAGE 1 OF 6 PRACTICES METEOROIDS & SPACE DEBRIS Practice: Deign pacecraft external urface to enure 95 percent probability of no miion-critical failure from particle impact. Benefit:

More information

Alternate Dispersion Measures in Replicated Factorial Experiments

Alternate Dispersion Measures in Replicated Factorial Experiments Alternate Diperion Meaure in Replicated Factorial Experiment Neal A. Mackertich The Raytheon Company, Sudbury MA 02421 Jame C. Benneyan Northeatern Univerity, Boton MA 02115 Peter D. Krau The Raytheon

More information

Optimal Coordination of Samples in Business Surveys

Optimal Coordination of Samples in Business Surveys Paper preented at the ICES-III, June 8-, 007, Montreal, Quebec, Canada Optimal Coordination of Sample in Buine Survey enka Mach, Ioana Şchiopu-Kratina, Philip T Rei, Jean-Marc Fillion Statitic Canada New

More information

Design By Emulation (Indirect Method)

Design By Emulation (Indirect Method) Deign By Emulation (Indirect Method he baic trategy here i, that Given a continuou tranfer function, it i required to find the bet dicrete equivalent uch that the ignal produced by paing an input ignal

More information

In presenting the dissertation as a partial fulfillment of the requirements for an advanced degree from the Georgia Institute of Technology, I agree

In presenting the dissertation as a partial fulfillment of the requirements for an advanced degree from the Georgia Institute of Technology, I agree In preenting the diertation a a partial fulfillment of the requirement for an advanced degree from the Georgia Intitute of Technology, I agree that the Library of the Intitute hall make it available for

More information

Lecture 10 Filtering: Applied Concepts

Lecture 10 Filtering: Applied Concepts Lecture Filtering: Applied Concept In the previou two lecture, you have learned about finite-impule-repone (FIR) and infinite-impule-repone (IIR) filter. In thee lecture, we introduced the concept of filtering

More information

A Bluffer s Guide to... Sphericity

A Bluffer s Guide to... Sphericity A Bluffer Guide to Sphericity Andy Field Univerity of Suex The ue of repeated meaure, where the ame ubject are teted under a number of condition, ha numerou practical and tatitical benefit. For one thing

More information

Confusion matrices. True / False positives / negatives. INF 4300 Classification III Anne Solberg The agenda today: E.g., testing for cancer

Confusion matrices. True / False positives / negatives. INF 4300 Classification III Anne Solberg The agenda today: E.g., testing for cancer INF 4300 Claification III Anne Solberg 29.10.14 The agenda today: More on etimating claifier accuracy Cure of dimenionality knn-claification K-mean clutering x i feature vector for pixel i i- The cla label

More information

Lecture 17: Analytic Functions and Integrals (See Chapter 14 in Boas)

Lecture 17: Analytic Functions and Integrals (See Chapter 14 in Boas) Lecture 7: Analytic Function and Integral (See Chapter 4 in Boa) Thi i a good point to take a brief detour and expand on our previou dicuion of complex variable and complex function of complex variable.

More information

Lecture 4 Topic 3: General linear models (GLMs), the fundamentals of the analysis of variance (ANOVA), and completely randomized designs (CRDs)

Lecture 4 Topic 3: General linear models (GLMs), the fundamentals of the analysis of variance (ANOVA), and completely randomized designs (CRDs) Lecture 4 Topic 3: General linear model (GLM), the fundamental of the analyi of variance (ANOVA), and completely randomized deign (CRD) The general linear model One population: An obervation i explained

More information

PhysicsAndMathsTutor.com

PhysicsAndMathsTutor.com 1. A teacher wihe to tet whether playing background muic enable tudent to complete a tak more quickly. The ame tak wa completed by 15 tudent, divided at random into two group. The firt group had background

More information

Department of Mechanical Engineering Massachusetts Institute of Technology Modeling, Dynamics and Control III Spring 2002

Department of Mechanical Engineering Massachusetts Institute of Technology Modeling, Dynamics and Control III Spring 2002 Department of Mechanical Engineering Maachuett Intitute of Technology 2.010 Modeling, Dynamic and Control III Spring 2002 SOLUTIONS: Problem Set # 10 Problem 1 Etimating tranfer function from Bode Plot.

More information

DIFFERENTIAL EQUATIONS

DIFFERENTIAL EQUATIONS DIFFERENTIAL EQUATIONS Laplace Tranform Paul Dawkin Table of Content Preface... Laplace Tranform... Introduction... The Definition... 5 Laplace Tranform... 9 Invere Laplace Tranform... Step Function...4

More information

White Rose Research Online URL for this paper: Version: Accepted Version

White Rose Research Online URL for this paper:   Version: Accepted Version Thi i a repoitory copy of Identification of nonlinear ytem with non-peritent excitation uing an iterative forward orthogonal leat quare regreion algorithm. White Roe Reearch Online URL for thi paper: http://eprint.whiteroe.ac.uk/107314/

More information

The Use of MDL to Select among Computational Models of Cognition

The Use of MDL to Select among Computational Models of Cognition The Ue of DL to Select among Computational odel of Cognition In J. yung, ark A. Pitt & Shaobo Zhang Vijay Balaubramanian Department of Pychology David Rittenhoue Laboratorie Ohio State Univerity Univerity

More information

Given the following circuit with unknown initial capacitor voltage v(0): X(s) Immediately, we know that the transfer function H(s) is

Given the following circuit with unknown initial capacitor voltage v(0): X(s) Immediately, we know that the transfer function H(s) is EE 4G Note: Chapter 6 Intructor: Cheung More about ZSR and ZIR. Finding unknown initial condition: Given the following circuit with unknown initial capacitor voltage v0: F v0/ / Input xt 0Ω Output yt -

More information

Optimizing Cost-sensitive Trust-negotiation Protocols

Optimizing Cost-sensitive Trust-negotiation Protocols Optimizing Cot-enitive Trut-negotiation Protocol Weifeng Chen, Lori Clarke, Jim Kuroe, Don Towley Department of Computer Science Univerity of Maachuett, Amhert {chenwf, clarke, kuroe, towley}@c.uma.edu

More information

Annex-A: RTTOV9 Cloud validation

Annex-A: RTTOV9 Cloud validation RTTOV-91 Science and Validation Plan Annex-A: RTTOV9 Cloud validation Author O Embury C J Merchant The Univerity of Edinburgh Intitute for Atmo. & Environ. Science Crew Building King Building Edinburgh

More information

Beta Burr XII OR Five Parameter Beta Lomax Distribution: Remarks and Characterizations

Beta Burr XII OR Five Parameter Beta Lomax Distribution: Remarks and Characterizations Marquette Univerity e-publication@marquette Mathematic, Statitic and Computer Science Faculty Reearch and Publication Mathematic, Statitic and Computer Science, Department of 6-1-2014 Beta Burr XII OR

More information

List coloring hypergraphs

List coloring hypergraphs Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity

More information

Assignment for Mathematics for Economists Fall 2016

Assignment for Mathematics for Economists Fall 2016 Due date: Mon. Nov. 1. Reading: CSZ, Ch. 5, Ch. 8.1 Aignment for Mathematic for Economit Fall 016 We now turn to finihing our coverage of concavity/convexity. There are two part: Jenen inequality for concave/convex

More information

Aggregating value ranges: preference elicitation and truthfulness

Aggregating value ranges: preference elicitation and truthfulness DOI 10.1007/10458-009-9118-5 Aggregating value range: preference elicitation and truthfulne Joeph Farfel Vincent Conitzer The Author() 009 Abtract We tudy the cae where agent have preference over range

More information

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems A Contraint Propagation Algorithm for Determining the Stability Margin of Linear Parameter Circuit and Sytem Lubomir Kolev and Simona Filipova-Petrakieva Abtract The paper addree the tability margin aement

More information

4.6 Principal trajectories in terms of amplitude and phase function

4.6 Principal trajectories in terms of amplitude and phase function 4.6 Principal trajectorie in term of amplitude and phae function We denote with C() and S() the coinelike and inelike trajectorie relative to the tart point = : C( ) = S( ) = C( ) = S( ) = Both can be

More information

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin

More information

March 18, 2014 Academic Year 2013/14

March 18, 2014 Academic Year 2013/14 POLITONG - SHANGHAI BASIC AUTOMATIC CONTROL Exam grade March 8, 4 Academic Year 3/4 NAME (Pinyin/Italian)... STUDENT ID Ue only thee page (including the back) for anwer. Do not ue additional heet. Ue of

More information

(b) Is the game below solvable by iterated strict dominance? Does it have a unique Nash equilibrium?

(b) Is the game below solvable by iterated strict dominance? Does it have a unique Nash equilibrium? 14.1 Final Exam Anwer all quetion. You have 3 hour in which to complete the exam. 1. (60 Minute 40 Point) Anwer each of the following ubquetion briefly. Pleae how your calculation and provide rough explanation

More information

Convex Hulls of Curves Sam Burton

Convex Hulls of Curves Sam Burton Convex Hull of Curve Sam Burton 1 Introduction Thi paper will primarily be concerned with determining the face of convex hull of curve of the form C = {(t, t a, t b ) t [ 1, 1]}, a < b N in R 3. We hall

More information

arxiv: v1 [math.mg] 25 Aug 2011

arxiv: v1 [math.mg] 25 Aug 2011 ABSORBING ANGLES, STEINER MINIMAL TREES, AND ANTIPODALITY HORST MARTINI, KONRAD J. SWANEPOEL, AND P. OLOFF DE WET arxiv:08.5046v [math.mg] 25 Aug 20 Abtract. We give a new proof that a tar {op i : i =,...,

More information

If Y is normally Distributed, then and 2 Y Y 10. σ σ

If Y is normally Distributed, then and 2 Y Y 10. σ σ ull Hypothei Significance Teting V. APS 50 Lecture ote. B. Dudek. ot for General Ditribution. Cla Member Uage Only. Chi-Square and F-Ditribution, and Diperion Tet Recall from Chapter 4 material on: ( )

More information

Efficient Heuristic Approach to Dominance Testing in CP-nets

Efficient Heuristic Approach to Dominance Testing in CP-nets Efficient Heuritic Approach to Dominance Teting in CP-net Minyi Li Swinburne Univerity of Technology myli@win.edu.au Quoc Bao Vo Swinburne Univerity of Technology BVO@win.edu.au Ryzard Kowalczyk Swinburne

More information

SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD

SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD S.P. Teeuwen, I. Erlich U. Bachmann Univerity of Duiburg, Germany Department of Electrical Power Sytem

More information

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays Gain and Phae Margin Baed Delay Dependent Stability Analyi of Two- Area LFC Sytem with Communication Delay Şahin Sönmez and Saffet Ayaun Department of Electrical Engineering, Niğde Ömer Halidemir Univerity,

More information

Random vs. Deterministic Deployment of Sensors in the Presence of Failures and Placement Errors

Random vs. Deterministic Deployment of Sensors in the Presence of Failures and Placement Errors Random v. Determinitic Deployment of Senor in the Preence of Failure and Placement Error Paul Baliter Univerity of Memphi pbalitr@memphi.edu Santoh Kumar Univerity of Memphi antoh.kumar@memphi.edu Abtract

More information

Week 3 Statistics for bioinformatics and escience

Week 3 Statistics for bioinformatics and escience Week 3 Statitic for bioinformatic and escience Line Skotte 28. november 2008 2.9.3-4) In thi eercie we conider microrna data from Human and Moue. The data et repreent 685 independent realiation of the

More information

Technical Appendix: Auxiliary Results and Proofs

Technical Appendix: Auxiliary Results and Proofs A Technical Appendix: Auxiliary Reult and Proof Lemma A. The following propertie hold for q (j) = F r [c + ( ( )) ] de- ned in Lemma. (i) q (j) >, 8 (; ]; (ii) R q (j)d = ( ) q (j) + R q (j)d ; (iii) R

More information

Control Systems Analysis and Design by the Root-Locus Method

Control Systems Analysis and Design by the Root-Locus Method 6 Control Sytem Analyi and Deign by the Root-Locu Method 6 1 INTRODUCTION The baic characteritic of the tranient repone of a cloed-loop ytem i cloely related to the location of the cloed-loop pole. If

More information

arxiv: v2 [nucl-th] 3 May 2018

arxiv: v2 [nucl-th] 3 May 2018 DAMTP-207-44 An Alpha Particle Model for Carbon-2 J. I. Rawlinon arxiv:72.05658v2 [nucl-th] 3 May 208 Department of Applied Mathematic and Theoretical Phyic, Univerity of Cambridge, Wilberforce Road, Cambridge

More information

STRAIN LIMITS FOR PLASTIC HINGE REGIONS OF CONCRETE REINFORCED COLUMNS

STRAIN LIMITS FOR PLASTIC HINGE REGIONS OF CONCRETE REINFORCED COLUMNS 13 th World Conerence on Earthquake Engineering Vancouver, B.C., Canada Augut 1-6, 004 Paper No. 589 STRAIN LIMITS FOR PLASTIC HINGE REGIONS OF CONCRETE REINFORCED COLUMNS Rebeccah RUSSELL 1, Adolo MATAMOROS,

More information

Chapter 4. The Laplace Transform Method

Chapter 4. The Laplace Transform Method Chapter 4. The Laplace Tranform Method The Laplace Tranform i a tranformation, meaning that it change a function into a new function. Actually, it i a linear tranformation, becaue it convert a linear combination

More information

Estimation of Current Population Variance in Two Successive Occasions

Estimation of Current Population Variance in Two Successive Occasions ISSN 684-8403 Journal of Statitic Volume 7, 00, pp. 54-65 Etimation of Current Population Variance in Two Succeive Occaion Abtract Muhammad Azam, Qamruz Zaman, Salahuddin 3 and Javed Shabbir 4 The problem

More information

An Inequality for Nonnegative Matrices and the Inverse Eigenvalue Problem

An Inequality for Nonnegative Matrices and the Inverse Eigenvalue Problem An Inequality for Nonnegative Matrice and the Invere Eigenvalue Problem Robert Ream Program in Mathematical Science The Univerity of Texa at Dalla Box 83688, Richardon, Texa 7583-688 Abtract We preent

More information

Electronic Theses and Dissertations

Electronic Theses and Dissertations Eat Tenneee State Univerity Digital Common @ Eat Tenneee State Univerity Electronic Thee and Diertation Student Work 5-208 Vector Partition Jennifer French Eat Tenneee State Univerity Follow thi and additional

More information

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs Chip-firing game and a partial Tutte polynomial for Eulerian digraph Kévin Perrot Aix Mareille Univerité, CNRS, LIF UMR 7279 3288 Mareille cedex 9, France. kevin.perrot@lif.univ-mr.fr Trung Van Pham Intitut

More information

Estimation of Peaked Densities Over the Interval [0,1] Using Two-Sided Power Distribution: Application to Lottery Experiments

Estimation of Peaked Densities Over the Interval [0,1] Using Two-Sided Power Distribution: Application to Lottery Experiments MPRA Munich Peronal RePEc Archive Etimation of Peaed Denitie Over the Interval [0] Uing Two-Sided Power Ditribution: Application to Lottery Experiment Krzyztof Konte Artal Invetment 8. April 00 Online

More information

UNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS

UNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS UNIT 1 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS Structure 1.1 Introduction Objective 1.2 Redundancy 1.3 Reliability of k-out-of-n Sytem 1.4 Reliability of Standby Sytem 1. Summary 1.6 Solution/Anwer

More information

Recent progress in fire-structure analysis

Recent progress in fire-structure analysis EJSE Special Iue: Selected Key Note paper from MDCMS 1 1t International Conference on Modern Deign, Contruction and Maintenance of Structure - Hanoi, Vietnam, December 2007 Recent progre in fire-tructure

More information

Notes on Phase Space Fall 2007, Physics 233B, Hitoshi Murayama

Notes on Phase Space Fall 2007, Physics 233B, Hitoshi Murayama Note on Phae Space Fall 007, Phyic 33B, Hitohi Murayama Two-Body Phae Space The two-body phae i the bai of computing higher body phae pace. We compute it in the ret frame of the two-body ytem, P p + p

More information

Standard Guide for Conducting Ruggedness Tests 1

Standard Guide for Conducting Ruggedness Tests 1 Deignation: E 69 89 (Reapproved 996) Standard Guide for Conducting Ruggedne Tet AMERICA SOCIETY FOR TESTIG AD MATERIALS 00 Barr Harbor Dr., Wet Conhohocken, PA 948 Reprinted from the Annual Book of ASTM

More information

Predicting the Performance of Teams of Bounded Rational Decision-makers Using a Markov Chain Model

Predicting the Performance of Teams of Bounded Rational Decision-makers Using a Markov Chain Model The InTITuTe for ytem reearch Ir TechnIcal report 2013-14 Predicting the Performance of Team of Bounded Rational Deciion-maer Uing a Marov Chain Model Jeffrey Herrmann Ir develop, applie and teache advanced

More information

Stratified Analysis of Probabilities of Causation

Stratified Analysis of Probabilities of Causation Stratified Analyi of Probabilitie of Cauation Manabu Kuroki Sytem Innovation Dept. Oaka Univerity Toyonaka, Oaka, Japan mkuroki@igmath.e.oaka-u.ac.jp Zhihong Cai Biotatitic Dept. Kyoto Univerity Sakyo-ku,

More information

New bounds for Morse clusters

New bounds for Morse clusters New bound for More cluter Tamá Vinkó Advanced Concept Team, European Space Agency, ESTEC Keplerlaan 1, 2201 AZ Noordwijk, The Netherland Tama.Vinko@ea.int and Arnold Neumaier Fakultät für Mathematik, Univerität

More information

STOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND

STOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND OPERATIONS RESEARCH AND DECISIONS No. 4 203 DOI: 0.5277/ord30402 Marcin ANHOLCER STOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND The generalized tranportation problem

More information

Bayesian-Based Decision Making for Object Search and Characterization

Bayesian-Based Decision Making for Object Search and Characterization 9 American Control Conference Hyatt Regency Riverfront, St. Loui, MO, USA June -, 9 WeC9. Bayeian-Baed Deciion Making for Object Search and Characterization Y. Wang and I. I. Huein Abtract Thi paper focue

More information

SOME RESULTS ON INFINITE POWER TOWERS

SOME RESULTS ON INFINITE POWER TOWERS NNTDM 16 2010) 3, 18-24 SOME RESULTS ON INFINITE POWER TOWERS Mladen Vailev - Miana 5, V. Hugo Str., Sofia 1124, Bulgaria E-mail:miana@abv.bg Abtract To my friend Kratyu Gumnerov In the paper the infinite

More information

Reliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay

Reliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay International Journal of Applied Science and Engineering 3., 4: 449-47 Reliability Analyi of Embedded Sytem with Different Mode of Failure Emphaizing Reboot Delay Deepak Kumar* and S. B. Singh Department

More information

Computers and Mathematics with Applications. Sharp algebraic periodicity conditions for linear higher order

Computers and Mathematics with Applications. Sharp algebraic periodicity conditions for linear higher order Computer and Mathematic with Application 64 (2012) 2262 2274 Content lit available at SciVere ScienceDirect Computer and Mathematic with Application journal homepage: wwweleviercom/locate/camwa Sharp algebraic

More information

An estimation approach for autotuning of event-based PI control systems

An estimation approach for autotuning of event-based PI control systems Acta de la XXXIX Jornada de Automática, Badajoz, 5-7 de Septiembre de 08 An etimation approach for autotuning of event-baed PI control ytem Joé Sánchez Moreno, María Guinaldo Loada, Sebatián Dormido Departamento

More information

( ) ( Statistical Equivalence Testing

( ) ( Statistical Equivalence Testing ( Downloaded via 148.51.3.83 on November 1, 018 at 13:8: (UTC). See http://pub.ac.org/haringguideline for option on how to legitimately hare publihed article. 0 BEYOND Gielle B. Limentani Moira C. Ringo

More information

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end Theoretical Computer Science 4 (0) 669 678 Content lit available at SciVere ScienceDirect Theoretical Computer Science journal homepage: www.elevier.com/locate/tc Optimal algorithm for online cheduling

More information

Stochastic Neoclassical Growth Model

Stochastic Neoclassical Growth Model Stochatic Neoclaical Growth Model Michael Bar May 22, 28 Content Introduction 2 2 Stochatic NGM 2 3 Productivity Proce 4 3. Mean........................................ 5 3.2 Variance......................................

More information

At the end of this lesson, the students should be able to understand:

At the end of this lesson, the students should be able to understand: Intructional Objective: At the end of thi leon, the tudent hould be able to undertand: Baic failure mechanim of riveted joint. Concept of deign of a riveted joint. 1. Strength of riveted joint: Strength

More information

A tutorial on conformal prediction

A tutorial on conformal prediction A tutorial on conformal prediction Glenn Shafer and Vladimir Vovk praktiqekie vyvody teorii vero tnote mogut bytь obonovany v kaqetve ledtvi gipotez o predelьno pri dannyh ograniqeni h loжnoti izuqaemyh

More information

DIFFERENTIAL EQUATIONS Laplace Transforms. Paul Dawkins

DIFFERENTIAL EQUATIONS Laplace Transforms. Paul Dawkins DIFFERENTIAL EQUATIONS Laplace Tranform Paul Dawkin Table of Content Preface... Laplace Tranform... Introduction... The Definition... 5 Laplace Tranform... 9 Invere Laplace Tranform... Step Function...

More information

p. (The electron is a point particle with radius r = 0.)

p. (The electron is a point particle with radius r = 0.) - pin ½ Recall that in the H-atom olution, we howed that the fact that the wavefunction Ψ(r) i ingle-valued require that the angular momentum quantum nbr be integer: l = 0,,.. However, operator algebra

More information

4. Connectivity Connectivity Connectivity. Whitney's s connectivity theorem: (G) (G) (G) for special

4. Connectivity Connectivity Connectivity. Whitney's s connectivity theorem: (G) (G) (G) for special 4. Connectivity 4.. Connectivity Vertex-cut and vertex-connectivity Edge-cut and edge-connectivty Whitney' connectivity theorem: Further theorem for the relation of and graph 4.. The Menger Theorem and

More information