Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition

Size: px
Start display at page:

Download "Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition"

Transcription

1 Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and Coputer Engineering George Mason University Fairfax, VA 22030, U.S.A. ABSTRACT Recently, there has been considerable interest in the developent of robust, cost-effective and high perforance non-etallic landine detection systes using ground penetrating radar (GPR). Many of the available solutions try to discriinate landines fro clutter by extracting soe for of statistical or geoetrical inforation fro the raw GPR data, and oftenties, it is difficult to assess the perforance of such systes without perforing extensive field experients. In our approach, a landine is characterized by a binary-valued string corresponding to its ipedance discontinuity profile in the depth direction. This profile can be detected very quickly utilizing syntactic pattern recognition. Such an approach is expected to be very robust in ters of probability of detection (P d ) and low false alar rates (FAR), since it exploits the inner structure of a landine. In this paper, we develop a ethod to calculate an upper bound on the FAR, which is the probability of false alar per unit area. First, we paraeterize the nuber of possible ine patterns in ters of the nuber of ipedance discontinuities, dither and noise. Then, a cobinatorial enueration technique is used to quantify the nuber of adissible strings. The upper bound on FAR is given as the ratio of an upper bound on the nuber of possible ine pattern strings to the nuber of adissible strings per unit area. The nuerical results show that the upper bound is saller than the FAR reported in the literature for a wide range of paraeter choices. Keywords: Landine detection, Ground penetrating radar, False alar rate 1. INTRODUCTION There is a continued interest in the developent of a robust, cost-effective and high perforance landine detection and classification syste. A variety of approaches have been discussed in the research literature. 1, 2 Most approaches ake a distinction between two ajor classes of landines based on their etal content. There are those which contain a sufficient aount of etal to be detected by electroagnetic induction (EMI) detectors and those which are essentially non-etallic. For non-etallic landines, the ost coon sensor used for detection is ground penetrating radar (GPR) 3, 4 and the ost coon detection ethodology is anoaly detection, soeties colloquially called blob detection. This ethodology is typically ipleented utilizing a pre-screener followed by a ore detailed analysis of the GPR data for detection leading to a two-pass operational approach. Iproveents to the anoaly detector have recently been ade which fuse EMI and GPR data as well as take into account contextual inforation by alternative ethods of analyzing the GPR data before selecting the algorith appropriate to the soil type and environent. Anoaly detection typically depends on coputing running statistics which characterize the clutter background and select for further analysis those regions whose statistics differ fro the background statistics by soe threshold value. An alternative approach to anoaly detection and its variants is the application of syntactic pattern recognition (SPR) 5. In SPR, single coluns of range data fro the GPR (A-Scan) are processed so as to convert the signal into a binary-valued string of the sae length as the original data. This binary-valued string is coprised of zeros except for where there are changes in ipedance. The binary-valued string is then presented to a finite state achine (FSM) language recognizer for detection. This is a single-pass operation which does not require a pre-screener. It is also extreely fast in execution since the FSM operates

2 at one clock cycle per state transition, naely one clock cycle per range bin, independent of the nuber of states in the FSM. The binarization of the A-scan approach was chosen because it is well known that the radar cross section (RCS) easured by a radar looking at a coplex target is highly variable with aspect angle. We have the distinct advantage of being able to assue that ost landines are oriented approxiately parallel to the earth yielding a repeatable and recognizable pattern. While this slight variation in either the orientation of the landine or the relative geoetry between the GPR and the landine contributes to aplitude variations in the easured RCS with range, it has been deonstrated that the locations of ipedance discontinuities can be reliably detected through preprocessing followed by a binarization procedure. That is, the binary-valued string representing the location of ipedance discontinuities of a prototypical buried landine vary only a slight aount which is well within the capabilities of being recognized as a language by an appropriately designed FSM. The key etrics of interest for a landine detection syste are: (1) probability of detection (P d ), and (2) false alar rate (FAR). The FAR is defined as the probability of false alar per unit area, which for landine detection, is a ore eaningful perforance easure than siply the probability of false alar. Given that we have a suitable ethod for the preprocessing and production of the binary-valued A-scan, it reains to recognize the string associated with a landine and discriinate it fro other strings produced by clutter and noise. We call the process of producing the binary-valued A-scans a binarization schee. It is a fundaental requireent of language recognizers that they not only recognize all the words in the language but no others. In the coputation of the false alar rate (FAR) of an SPR language recognizer, one needs to know two nubers. The first is the nuber of strings that represent the language of the landine. While it ay see that one can have a language consisting of a single string, operationally this is not possible since the statistical variations in the A-scan of a landine present theselves as sall oveents of ipedance discontinuities about their noinal locations. These variations are sall and enuerable and it is not difficult to copute the nuber of strings representing variations on a landine s characteristic string and this coputation is discussed in Section 3. The second nuber required for FAR estiation is the total nuber of all adissible strings. Adissible strings are those which can be produced by the binarization process. It ay first appear that for a landine string of length n, that there would be 2 n possible strings produced by the binarization process, soe of which would be as a result of the landine and soe as a result of clutter. A siple exaple shows that this is not true. If we assue that the binarization process cannot produce adjacent ipedance discontinuities, then strings of the for 0110 are not possible. This liitation, aong others, eans that the nuber of adissible strings is less than the 2 n possible strings in a string of length n. It is for this reason that a ethodology based on cobinatorial enueration has been developed in this paper, naely to be able to copute the nuber of adissible strings as a first attept to put a bound on the FAR of SPR as well as provide guidance in the developent of the binarization process. We note that in the SPR approach, such a bound can serve as a rough estiate of the expected perforance in ters of FAR, whereas in ost traditional approaches one needs to perfor detailed field tests to evaluate the syste s FAR. The reainder of the paper is organized as follows. In Section 2, we characterize the binary sequence space due to an arbitrary binarization schee using a cobinatorial enueration technique. In particular, we copute the total nuber of adissible strings for a fixed string length. In Section 3, we copute an upper bound on the FAR. Section 4 presents soe nuerical results showing the expected FAR perforance of the SPR approach. We then use the results fro Section 2 and contrast the, in Section 5, against statistics of binary strings obtained fro real landine data. In Section 6 we discuss the significance of the experiental and theoretical results to our future work in detecting landines with the syntactic pattern recognition ethod. 2. CHARACTERIZATION OF THE BINARY SEQUENCE SPACE Suppose we are given a rando sequence, {X i R:1 i n}, wheren denotes the length of the sequence. The sequence {X i } could represent, for exaple, a sequence of easureents coprising an A-scan obtained

3 using GPR to detect the presence of landines. It could also represent a sequence which is generated as a result of perforing soe processing on the raw data of a GPR A-scan. To perfor further processing of the easureents using the SPR approach, the rando sequence {X i } is converted into a binary sequence {B i {0, 1}}. There are various ways to convert a given sequence {x i } to {b i }. As entioned before, we refer to such a conversion process as binarization. For exaple, we can have the following siple binarization rule: b 0 0, (1) { 1, if xi >x b i = i 1 and x i >x i+1, (2) 0, otherwise, for i 1. In words, b i is set to one if x i is a local axiu with respect to x i 1 and x i+1.otherwise,b i is set to 0. Another schee ay be to consider all local extrea of {x i }. Obviously, we can have ore sophisticated binarization schees. In this section, we study the characteristics of the deterinistic properties of the binary sequence space that results fro application of an arbitrary binarization rule, subject to the constraint that no consecutive 1 s are allowed. The sequence {b i } ay be viewed as a binary string with certain properties. Let B denote the set of binary strings that could possibly correspond to a sequence {b i } obtained by applying a binarization rule to a finite or infinite sequence of values {x i }.Inotherwords, {b i } B, for all binary sequences {b i } generated by the binarization ethod. Furtherore, any sequence b B corresponds to a valid binary sequence {b i } obtained fro the binarization process. A given sequence v Bay be characterized as a binary string that begins and ends with 0 and does not contain the string 11. We refer to such a sequence as an adissible string. We can copactly represent the set B by the regular expression (see Appendix A) B =(00 1) 00. (3) Let Φ(x) denote the generating function of the set B with respect to sequence length (see Appendix B). In particular, define the weight function w(σ) length of σ, σ B. Then Φ(x) = σ B x w(σ). Fro (3), we can obtain the following expression for Φ(x): Φ(x) = Let B n denote the set of strings of length n that belong to B: [ 1 x ] 1 1 x x x 1 x = x 1 x x 2. (4) B n {b B: b = n}. (5) The following proposition gives a closed-for expression for the nuber of adissible strings of length n in B. A proof is given in Appendix C. We will follow the convention that lowercase letters represent deterinistic variables, whereas uppercase letters represent rando variables.

4 Proposition 2.1 (Adissible strings). The nuber of adissible strings of length n in B is given by B n = n 1 j= n 2 ( ) j. (6) n j 1 Hence, the fraction of binary strings of length n that belong to the set B is given by f n = B n 2 n =2 n n 1 j= n 2 ( ) j. (7) n j 1 Fig.1showsaplotoff n vs. n for n = 1 to 20. One sees that f n decreases rapidly as a function of n. In particular, f , which eans that out of the 2 20 binary strings of length 20, less than 0.65% of the are in the space B. Notethatf 2 = 1 2 and f 2 3 = It ay also be of interest to consider the nuber of 1 s that occur in a string belonging to the set B. Let w 1 (σ) denote the nuber of 1 s in string σ B. To address this issue, we consider a bivariate generating function Φ(x, y), where the coefficient of ter x n y represents the nuber of strings of length n, containing 1 s. In particular, define the weight function w 1 (σ) nuber of 1 s in σ, σ B. and Φ(x, y) σ B x w(σ) y w1(σ). (8) Fro (3), we can then obtain the following expression for Φ(x, y): Φ(x, y) = [ 1 xy ] 1 1 x x x 1 x = x 1 x(1 + xy). (9) Let B n, denote the set of strings in B of length n and containing 1 s. The nuber of strings in the set B n, is given by following proposition. A proof is given in Appendix D. Proposition 2.2 (Adissible strings with 1 s). The nuber of adissible strings of length n containing 1 s in B is given by ( n 1 B n, = ), 0 n 2 1. (10) Let f n, denote the fraction of strings of length n in the set B, containing 1 s. Fro (10) and (6), we obtain f n, = B ( n 1 ) n, n = ), 0 1. (11) B n 2 n 1 j= n 2 ( j n j 1 Fig. 2 shows a bar graph of f n, vs. when n = 20. Note that the distribution has a ode at =5and has a relatively syetric shape about this ode.

5 3. UPPER BOUND ON FALSE ALARM RATE As entioned in Section 1, due to statistical variations it ay not be possible to have an unique binary string corresponding to a particular landine. However, we can introduce soe paraeters that capture statistical uncertainties. We assue that all valid ine patterns have a known prefix 100. We denote the locations of the 1 s in a valid ine pattern of length n by a vector q. For exaple, if q =(q(1), q(2),, q(k),, q(k)) = (1, 10,, 79,, L), where K < L n, iteansthat the location of the k th 1 of the ine pattern is 79. In the SPR approach, it is possible to represent a particular landine by q and its variation according to soe paraeterization. We propose to characterize the binary-valued string corresponding to a landine pattern (of length n) using the following three paraeters: (i) the total nuber of 1 s in the binary string sequence (K, the length of q), (ii) dither or by how uch the eleents of q ay get shifted (d), and (iii) the nuber of noise pulses (J), that are not contained in q but ay appear erroneously. A ine pattern with dither value d is characterized by a set Q d = {q ± 1, q ± 2,, q ± d}. By a noise pulse we ean the erroneous change of a 0 bit to 1. We assue that a noise pulse does not occur in any of the positions contained in q, Q d,the top of the ine, and at ine prefix ( 100 ) locations. The nuber of valid ine patterns of length n using the paraeters (K, d, J) is upper bounded by N (u) ine =(2d +1)K J ( ) n (2d +1)K 3. (12) j j=0 Note that the (2d + 1) refers to the nuber of variations in the string pattern caused by each 1 present in the ine string, and the 3 present in the top arguent of the choose function denotes the length of the ine prefix. Clearly, it is possible to have soe other criteria or paraeters to select the valid ine patterns. But as long as we can evaluate, either analytically or epirically, an upper bound on the nuber of such valid ine patterns, N (u) ine, our approach of coputing an upper bound on FAR would be valid. Assuing that each string is equally likely to occur, an upper bound on the probability of false alar is given by the ratio of the nuber of valid ine pattern strings to the nuber of adissible strings, P (u) FA = N (u) ine B n. Suppose the footprint area of the GPR corresponding to each A-scan is denoted by D in units of 2. Since the FAR is defined as the probability of false alar per unit area we have the following upper bound on FAR: FAR = P (u) FA D = N (u) ine B n D. (13) This upper bound on FAR can serve as a theoretical perforance easure of the SPR approach for landine detection. It can also guide us towards an appropriate binarization schee such that acceptable FAR values can be achieved. 4. NUMERICAL EXAMPLES In this section, we provide two nuerical exaples to illustrate the dependence of the ine pattern paraeters on the FAR upper bound. We consider the footprint of a typical GPR, which has area D = and a ine prefix of length 3. In Fig. 3, we plot the upper bound on FAR as a function of string length (n), and the nuber of 1 s in the ine pattern (), for different values of noise (J =0, 1, 2) and a dither value of d = 2. The surface plot shows that for a fixed string length n, as the nuber of 1 s in the ine pattern increases, the FAR also increases. This is because the nuerator of the bound (N (u) ine )increaseswith increasing, while the denoinator ( B n ) reains unchanged (cf. (6),(12), and (13)). On the other hand, for fixed values of, the FAR decreases as the string length n increases. This is because B n increases faster than N (u) ine as a function of n, causing the bound to decrease. As expected, the bound uniforly increases with increasing noise. In Fig. 4, the bound is plotted as a function of for fixed values dither and noise, (d, J) =(2, 2), with various values of n. We observe that there is roughly a two orders of agnitude decrease in the bound with every increase in the string length of 10 bits.

6 5. COMPARISON OF EXPERIMENTAL AND THEORETICAL STRING DISTRIBUTIONS Once the theoretical approach has been established and argued for, one interesting question reains: to what extent do the experiental results atch the nuerical data? The iplications of such a question for the SPR ethod, or for any ethod applied to the identification of a pattern, are crucial: atching distributions ay guarantee low false alar rate, and that guarantee is one ain goal of binarization algoriths. We have used ultiple ethods for binarization of raw and processed data. As representative saples, here we inspect results obtained with two independent binarization schees, labeled schees b1 and b2. Every dataset is exained for strings of length n [20, 140], and for strings containing 1 s, with [2, 13]. For each cobination of (n, ), entire sets of data were surveyed, containing approxiately 133 illion datapoints (i.e., pixels). For b1, over 2 illion strings are found to coply with the (n, ) ranges. For b2, over 20 illion strings are retrieved, indicating a first difference between the two schees. When graphing these results, the dichotoy is ore obvious: the peaks in b2 (see Fig. 6) are absent in b1 (see Fig. 5). Furtherore, in b1 the position of the single peak on the length of the string (n), as if reiniscent of a Rayleigh distribution, is directly proportional to the nuber of 1 s in the string (). While this is intuitively acceptable, the spiky distributions of b2 are not. As stated above, the task of coparing theoretical to experiental results would not be coplete without a side-by-side plot. Aong the any possibilities of realizing such exercise, we have chosen to fix n =80 (strings of length 80 pixels) and vary (nuber of 1 s), siilarly to the histogra presented in Fig. 2. Figs. 7 and 8 show the resulting distributions of the experiental (blue) datasets for binarization schees b1 and b2, respectively. Both are copared with the theoretical counterpart (green) (cf. (11)). The experiental data clearly has a different ean copared to the theoretical one, and this is not surprising since the theoretical distribution assues a unifor distribution of all adissible strings. Such plots can be extreely useful in extracting the ine pattern strings and also assessing the perforance of different binarization schees. 6. CONCLUSION In this paper, we have studied the perforance of the SPR approach to landine detection and classification in ters of the FAR. In particular, an upper bound on the FAR is proposed, where the bound is given as a fraction of the possible ine pattern strings with respect to the total nuber of adissible strings that can result fro an arbitrary binarization schee. It is deonstrated that the tool of cobinatorial enueration is very useful in studying the string statistics for syntactic landine detection. In this initial study we have ade the siplifying assuption that all strings are equally likely, which ay not be the case in real landine data. Therefore, it would be of great interest to relax this assuption in the adissible set, and derive a new upper bound on the FAR. It is also of interest to incorporate the ine pattern paraeters in our string enueration technique. These developents can potentially guide us to a ethod of extracting landine string patterns that have very attractive detection and false alar perforances. ACKNOWLEDGMENTS The authors would like to thank the Office of Naval Research for supporting this work under Grant No. N The authors would also like to express their gratitude to the Night Vision and Electronic Sensors Directorate (NVESD), Ft. Belvoir, VA, for providing sensor data.

7 APPENDIX A. NOTATION FOR REGULAR EXPRESSIONS If a = 0101 and b = 1110 are binary strings, then ab is the string fored by concatenating a and b: If A and B are sets of binary strings ab = AB {ab : a A, b B}, is the set of strings fored by concatenating any string in A with any string in B. We also define A 2 AA, and in general, A n AA }{{ A }. n ties Let ɛ denote the epty string. By convention, we define A 0 {ɛ} as the set consisting of just the epty string. Next we define A ɛ A A 2 A 3 = i 0 A i. For brevity of notation, we define 0 {0} and 1 {1}. It is iportant to note that AB is not, in general, equivalent to the Cartesian product A B. However, if each of the eleents of AB is uniquely generated, i.e., if we can deterine uniquely which part of the eleent cae fro A and which part fro B, thenab is in fact equivalent to A B. In this case, the Product Lea applies to generating functions defined on the set AB (see Appendix B). APPENDIX B. GENERATING FUNCTIONS A generating function of a real-valued sequence {a i } is a foral power series 6 Φ(x) = n 0 a i x i. (14) We will use [x i ]Φ(x) to denote the coefficient of x i in Φ(x). Hence, if Φ(x) is given by (14), a i =[x i ]Φ(x). Given a set S, we associated with each eleent a nonnegative integer w(σ) called the weight of σ. Let us define the generating function on S with respect to the weight function w( ) as follows: Φ S (x) = σ S x w(σ). (15) If we write Φ S (x) in the for (14), i.e., Φ S (x) = i 0 a i x i, we see that a i = nuber of eleents of S of weight i. Two useful rules for anipulating generating functions defined on sets according to (15) are the so-called Su and Product Leas, which are straightforward to prove. Lea B.1 (Su Lea). Suppose S = A B and A B =. Then Φ S (x) =Φ A (x)+φ B (x).

8 Lea B.2 (Product Lea). Suppose S = A B and for each σ =(a, b) S, w(σ) =w(a)+w(b). Then Φ S (x) =Φ A (x)φ B (x). As an exaple, let us represent the set of all binary strings using the following regular expression (see Appendix A): S = A, where A = {0, 1}. Letw(σ) denote the length of a binary string σ A. The generating function of the set {0} with respect to w( ) is siply x. Likewise, the generating function of {1} is x. Therefore, the generating function of A with respect to w( ) is given by 2x, i.e., Φ A (x) =2x. BytheProduct Lea, the generating function of A i,fori 0, is given by Φ A i(x) =(2x) i.bythesu Lea, Φ S (x) = i 0 Φ A i(x) = i 0 Therefore, the nuber of binary strings of length n is given by [x n ]Φ S (x) =2 n, (2x) i = 1 1 2x. as we would expect. Though this exaple is rather trivial, it illustrates how the su and product leas can be used to derive an expression for the generating function, and finally, how the coefficient [x n ]Φ S (x) can be obtained. The results (4) and (6) are obtained using this approach. APPENDIX C. PROOF OF PROPOSITION ON ADMISSIBLE STRINGS The nuber of adissible strings of length n in B is given by B n =[x n ]Φ(x) =[x n x ] 1 x(1 + x) =[xn ] x[x(1 + x)] j (16) j 0 = [x n j 1 ](1 + x) j = ( ) n 1 j ( ) j =. (17) n j 1 n j 1 j 0 j 0 j= n 2 APPENDIX D. PROOF OF PROPOSITION ON ADMISSIBLE STRINGS CONTAINING M 1 S The nuber of adissible strings of length n containing 1 s in B is given by B n, =[x n y ]Φ(x, y) =[x n y x ] (18) 1 xy(1 + x) =[y ] [x n ]x[x(1 + xy)] j =[y ] j 0 j 0[x n j 1 ](1 + xy) j (19) =[y ] ( ) ( ) j n 1 n y n j 1 =, 0 1. (20) n j 1 2 j 0 This result can also be derived using a ore direct arguent.

9 REFERENCES [1] D. J. Daniels, A review of landine detection using GPR, Proc. European Radar Conf. (EuRAD 08), pp , Oct [2] J. N. Wilson, P. Gader, L. Wen-Hsiung, H. Frigui, and K. C. Ho, A Large-Scale Systeatic Evaluation of Algoriths Using Ground-Penetrating Radar for Landine Detection and Discriination, IEEE Trans. Geosci. Reote Sens. 45, pp , Aug [3] H.M.Jol,Ground Penetrating Radar Theory and Applications, Elsevier, [4] D. J. Daniels, Ground Penetrating Radar, MPG Books Ltd., reprint of 2004 edition, UK, [5] K. J. Hintz, N. Peixoto, and D. Hwang, Syntactic landine detection and classification, in Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XIV, R. S. Haron, J. T. Broach, J. H. Holloway, Jr., ed., Proc. SPIE 7303, May [6] I. P. Goulden and D. M. Jackson, Cobinatorial Enueration, Dover Publications, reprint of 1983 edition, 2004.

10 Figure 1: Fraction of strings, f n, in the binary sequence space B, as a function of string length n. Figure 2: Fraction, f n, of strings of length n = 20 containing ones in the binary sequence space B, asa function of. dither=2, ine prefix length= noise=0 noise=1 noise=2 FAR upper bound (per 2 ) string length, n Figure 3: FAR upper bound as a function of string length and the nuber of 1 s in the ine pattern, (n, )

11 10 2 dither=2, noise=2, ine prefix length= FAR upper bound (per 2 ) n= n=80 n=90 n= Figure 4: FAR upper bound as a function of the nuber of 1 s in the ine pattern,, for different string lengths. 2 x 10 5 nuber of strings Figure 5: String distribution due to binarization schee b1. n 4 x 10 5 Nuber of strings Figure 6: String distribution due to binarization schee b2. n

12 theoretical binarization schee b1 Fraction of strings of lenght Figure 7: Fraction of strings of length 80 using binarization schee b theoretical binarization schee b2 0.2 Fraction of strings of lenght Figure 8: Fraction of strings of length 80 using binarization schee b2.

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

OBJECTIVES INTRODUCTION

OBJECTIVES INTRODUCTION M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

A method to determine relative stroke detection efficiencies from multiplicity distributions

A method to determine relative stroke detection efficiencies from multiplicity distributions A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,

More information

Statistical Logic Cell Delay Analysis Using a Current-based Model

Statistical Logic Cell Delay Analysis Using a Current-based Model Statistical Logic Cell Delay Analysis Using a Current-based Model Hanif Fatei Shahin Nazarian Massoud Pedra Dept. of EE-Systes, University of Southern California, Los Angeles, CA 90089 {fatei, shahin,

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

General Properties of Radiation Detectors Supplements

General Properties of Radiation Detectors Supplements Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area Proceedings of the 006 WSEAS/IASME International Conference on Heat and Mass Transfer, Miai, Florida, USA, January 18-0, 006 (pp13-18) Spine Fin Efficiency A Three Sided Pyraidal Fin of Equilateral Triangular

More information

Testing Properties of Collections of Distributions

Testing Properties of Collections of Distributions Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Using a De-Convolution Window for Operating Modal Analysis

Using a De-Convolution Window for Operating Modal Analysis Using a De-Convolution Window for Operating Modal Analysis Brian Schwarz Vibrant Technology, Inc. Scotts Valley, CA Mark Richardson Vibrant Technology, Inc. Scotts Valley, CA Abstract Operating Modal Analysis

More information

Figure 1: Equivalent electric (RC) circuit of a neurons membrane

Figure 1: Equivalent electric (RC) circuit of a neurons membrane Exercise: Leaky integrate and fire odel of neural spike generation This exercise investigates a siplified odel of how neurons spike in response to current inputs, one of the ost fundaental properties of

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers Ocean 40 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers 1. Hydrostatic Balance a) Set all of the levels on one of the coluns to the lowest possible density.

More information

LogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting

LogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting LogLog-Beta and More: A New Algorith for Cardinality Estiation Based on LogLog Counting Jason Qin, Denys Ki, Yuei Tung The AOLP Core Data Service, AOL, 22000 AOL Way Dulles, VA 20163 E-ail: jasonqin@teaaolco

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

N-Point. DFTs of Two Length-N Real Sequences

N-Point. DFTs of Two Length-N Real Sequences Coputation of the DFT of In ost practical applications, sequences of interest are real In such cases, the syetry properties of the DFT given in Table 5. can be exploited to ake the DFT coputations ore

More information

1 Proof of learning bounds

1 Proof of learning bounds COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a

More information

1 Generalization bounds based on Rademacher complexity

1 Generalization bounds based on Rademacher complexity COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #0 Scribe: Suqi Liu March 07, 08 Last tie we started proving this very general result about how quickly the epirical average converges

More information

Data-Driven Imaging in Anisotropic Media

Data-Driven Imaging in Anisotropic Media 18 th World Conference on Non destructive Testing, 16- April 1, Durban, South Africa Data-Driven Iaging in Anisotropic Media Arno VOLKER 1 and Alan HUNTER 1 TNO Stieltjesweg 1, 6 AD, Delft, The Netherlands

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

arxiv: v3 [cs.ds] 22 Mar 2016

arxiv: v3 [cs.ds] 22 Mar 2016 A Shifting Bloo Filter Fraewor for Set Queries arxiv:1510.03019v3 [cs.ds] Mar 01 ABSTRACT Tong Yang Peing University, China yangtongeail@gail.co Yuanun Zhong Nanjing University, China un@sail.nju.edu.cn

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals Estiation of ADC Nonlinearities fro the Measureent in Input Voltage Intervals M. Godla, L. Michaeli, 3 J. Šaliga, 4 R. Palenčár,,3 Deptartent of Electronics and Multiedia Counications, FEI TU of Košice,

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN

INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN V.A. Koarov 1, S.A. Piyavskiy 2 1 Saara National Research University, Saara, Russia 2 Saara State Architectural University, Saara, Russia Abstract. This article

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

The Frequent Paucity of Trivial Strings

The Frequent Paucity of Trivial Strings The Frequent Paucity of Trivial Strings Jack H. Lutz Departent of Coputer Science Iowa State University Aes, IA 50011, USA lutz@cs.iastate.edu Abstract A 1976 theore of Chaitin can be used to show that

More information

Optimal nonlinear Bayesian experimental design: an application to amplitude versus offset experiments

Optimal nonlinear Bayesian experimental design: an application to amplitude versus offset experiments Geophys. J. Int. (23) 155, 411 421 Optial nonlinear Bayesian experiental design: an application to aplitude versus offset experients Jojanneke van den Berg, 1, Andrew Curtis 2,3 and Jeannot Trapert 1 1

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

Reduced Length Checking Sequences

Reduced Length Checking Sequences Reduced Length Checing Sequences Robert M. Hierons 1 and Hasan Ural 2 1 Departent of Inforation Systes and Coputing, Brunel University, Middlesex, UB8 3PH, United Kingdo 2 School of Inforation echnology

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

Analyzing Simulation Results

Analyzing Simulation Results Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient

More information

RAFIA(MBA) TUTOR S UPLOADED FILE Course STA301: Statistics and Probability Lecture No 1 to 5

RAFIA(MBA) TUTOR S UPLOADED FILE Course STA301: Statistics and Probability Lecture No 1 to 5 Course STA0: Statistics and Probability Lecture No to 5 Multiple Choice Questions:. Statistics deals with: a) Observations b) Aggregates of facts*** c) Individuals d) Isolated ites. A nuber of students

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE 1 Nicola Neretti, 1 Nathan Intrator and 1,2 Leon N Cooper 1 Institute for Brain and Neural Systes, Brown University, Providence RI 02912.

More information

A Smoothed Boosting Algorithm Using Probabilistic Output Codes

A Smoothed Boosting Algorithm Using Probabilistic Output Codes A Soothed Boosting Algorith Using Probabilistic Output Codes Rong Jin rongjin@cse.su.edu Dept. of Coputer Science and Engineering, Michigan State University, MI 48824, USA Jian Zhang jian.zhang@cs.cu.edu

More information

Compressive Distilled Sensing: Sparse Recovery Using Adaptivity in Compressive Measurements

Compressive Distilled Sensing: Sparse Recovery Using Adaptivity in Compressive Measurements 1 Copressive Distilled Sensing: Sparse Recovery Using Adaptivity in Copressive Measureents Jarvis D. Haupt 1 Richard G. Baraniuk 1 Rui M. Castro 2 and Robert D. Nowak 3 1 Dept. of Electrical and Coputer

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket.

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket. Generalized eigenfunctions and a Borel Theore on the Sierpinski Gasket. Kasso A. Okoudjou, Luke G. Rogers, and Robert S. Strichartz May 26, 2006 1 Introduction There is a well developed theory (see [5,

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Optical Properties of Plasmas of High-Z Elements

Optical Properties of Plasmas of High-Z Elements Forschungszentru Karlsruhe Techni und Uwelt Wissenschaftlishe Berichte FZK Optical Properties of Plasas of High-Z Eleents V.Tolach 1, G.Miloshevsy 1, H.Würz Project Kernfusion 1 Heat and Mass Transfer

More information

On the Use of A Priori Information for Sparse Signal Approximations

On the Use of A Priori Information for Sparse Signal Approximations ITS TECHNICAL REPORT NO. 3/4 On the Use of A Priori Inforation for Sparse Signal Approxiations Oscar Divorra Escoda, Lorenzo Granai and Pierre Vandergheynst Signal Processing Institute ITS) Ecole Polytechnique

More information

Accuracy of the Scaling Law for Experimental Natural Frequencies of Rectangular Thin Plates

Accuracy of the Scaling Law for Experimental Natural Frequencies of Rectangular Thin Plates The 9th Conference of Mechanical Engineering Network of Thailand 9- October 005, Phuket, Thailand Accuracy of the caling Law for Experiental Natural Frequencies of Rectangular Thin Plates Anawat Na songkhla

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns

Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns Fast Structural Siilarity Search of Noncoding RNs Based on Matched Filtering of Ste Patterns Byung-Jun Yoon Dept. of Electrical Engineering alifornia Institute of Technology Pasadena, 91125, S Eail: bjyoon@caltech.edu

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

Bayesian Approach for Fatigue Life Prediction from Field Inspection

Bayesian Approach for Fatigue Life Prediction from Field Inspection Bayesian Approach for Fatigue Life Prediction fro Field Inspection Dawn An and Jooho Choi School of Aerospace & Mechanical Engineering, Korea Aerospace University, Goyang, Seoul, Korea Srira Pattabhiraan

More information

Grafting: Fast, Incremental Feature Selection by Gradient Descent in Function Space

Grafting: Fast, Incremental Feature Selection by Gradient Descent in Function Space Journal of Machine Learning Research 3 (2003) 1333-1356 Subitted 5/02; Published 3/03 Grafting: Fast, Increental Feature Selection by Gradient Descent in Function Space Sion Perkins Space and Reote Sensing

More information

An Algorithm for Quantization of Discrete Probability Distributions

An Algorithm for Quantization of Discrete Probability Distributions An Algorith for Quantization of Discrete Probability Distributions Yuriy A. Reznik Qualco Inc., San Diego, CA Eail: yreznik@ieee.org Abstract We study the proble of quantization of discrete probability

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Journal of Machine Learning Research 5 (2004) 529-547 Subitted 1/03; Revised 8/03; Published 5/04 Coputable Shell Decoposition Bounds John Langford David McAllester Toyota Technology Institute at Chicago

More information

Example A1: Preparation of a Calibration Standard

Example A1: Preparation of a Calibration Standard Suary Goal A calibration standard is prepared fro a high purity etal (cadiu) with a concentration of ca.1000 g l -1. Measureent procedure The surface of the high purity etal is cleaned to reove any etal-oxide

More information

arxiv: v3 [quant-ph] 18 Oct 2017

arxiv: v3 [quant-ph] 18 Oct 2017 Self-guaranteed easureent-based quantu coputation Masahito Hayashi 1,, and Michal Hajdušek, 1 Graduate School of Matheatics, Nagoya University, Furocho, Chikusa-ku, Nagoya 464-860, Japan Centre for Quantu

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Bounds on the Minimax Rate for Estimating a Prior over a VC Class from Independent Learning Tasks

Bounds on the Minimax Rate for Estimating a Prior over a VC Class from Independent Learning Tasks Bounds on the Miniax Rate for Estiating a Prior over a VC Class fro Independent Learning Tasks Liu Yang Steve Hanneke Jaie Carbonell Deceber 01 CMU-ML-1-11 School of Coputer Science Carnegie Mellon University

More information

On Process Complexity

On Process Complexity On Process Coplexity Ada R. Day School of Matheatics, Statistics and Coputer Science, Victoria University of Wellington, PO Box 600, Wellington 6140, New Zealand, Eail: ada.day@cs.vuw.ac.nz Abstract Process

More information

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral International Scholarly Research Network ISRN Counications and Networking Volue 11, Article ID 5465, 6 pages doi:1.54/11/5465 Research Article Rapidly-Converging Series Representations of a Mutual-Inforation

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

Hermite s Rule Surpasses Simpson s: in Mathematics Curricula Simpson s Rule. Should be Replaced by Hermite s

Hermite s Rule Surpasses Simpson s: in Mathematics Curricula Simpson s Rule. Should be Replaced by Hermite s International Matheatical Foru, 4, 9, no. 34, 663-686 Herite s Rule Surpasses Sipson s: in Matheatics Curricula Sipson s Rule Should be Replaced by Herite s Vito Lapret University of Lublana Faculty of

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial

More information

The accelerated expansion of the universe is explained by quantum field theory.

The accelerated expansion of the universe is explained by quantum field theory. The accelerated expansion of the universe is explained by quantu field theory. Abstract. Forulas describing interactions, in fact, use the liiting speed of inforation transfer, and not the speed of light.

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA,

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA, Descent polynoials arxiv:1710.11033v2 [ath.co] 13 Nov 2017 Alexander Diaz-Lopez Departent of Matheatics and Statistics, Villanova University, 800 Lancaster Avenue, Villanova, PA 19085, USA, alexander.diaz-lopez@villanova.edu

More information

Physics 2107 Oscillations using Springs Experiment 2

Physics 2107 Oscillations using Springs Experiment 2 PY07 Oscillations using Springs Experient Physics 07 Oscillations using Springs Experient Prelab Read the following bacground/setup and ensure you are failiar with the concepts and theory required for

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Kernel-Based Nonparametric Anomaly Detection

Kernel-Based Nonparametric Anomaly Detection Kernel-Based Nonparaetric Anoaly Detection Shaofeng Zou Dept of EECS Syracuse University Eail: szou@syr.edu Yingbin Liang Dept of EECS Syracuse University Eail: yliang6@syr.edu H. Vincent Poor Dept of

More information

(t, m, s)-nets and Maximized Minimum Distance, Part II

(t, m, s)-nets and Maximized Minimum Distance, Part II (t,, s)-nets and Maxiized Miniu Distance, Part II Leonhard Grünschloß and Alexander Keller Abstract The quality paraeter t of (t,, s)-nets controls extensive stratification properties of the generated

More information

Learnability and Stability in the General Learning Setting

Learnability and Stability in the General Learning Setting Learnability and Stability in the General Learning Setting Shai Shalev-Shwartz TTI-Chicago shai@tti-c.org Ohad Shair The Hebrew University ohadsh@cs.huji.ac.il Nathan Srebro TTI-Chicago nati@uchicago.edu

More information