Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns

Size: px
Start display at page:

Download "Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns"

Transcription

1 Fast Structural Siilarity Search of Noncoding RNs Based on Matched Filtering of Ste Patterns Byung-Jun Yoon Dept. of Electrical Engineering alifornia Institute of Technology Pasadena, 91125, S Eail: bjyoon@caltech.edu P. P. Vaidyanathan Dept. of Electrical Engineering alifornia Institute of Technology Pasadena, 91125, S Eail: ppvnath@systes.caltech.edu bstract Many noncoding RNs (ncrns) have characteristic secondary structures that give rise to coplicated base correlations in their priary sequences. Therefore, when perforing an RN siilarity search to find new ebers of a ncrn faily, we need a statistical odel such as the profilecshmm or the covariance odel (M) that can effectively describe the correlations between distant bases. However, these odels are coputationally expensive, aking the resulting RN search very slow. To overcoe this proble, various prescreening ethods have been proposed that first use a sipler odel to scan the database and filter out the dissiilar regions. Only the reaining regions that bear soe siilarity are passed to a ore coplex odel for closer inspection. It has been shown that the prescreening approach can ake the search speed significantly faster at no (or a slight) loss of prediction accuracy. In this paper, we propose a novel prescreening ethod based on atched filtering of ste patterns. nlike any existing ethods, the proposed ethod can prescreen the database solely based on structural siilarity. The proposed ethod can handle RNs with arbitrary secondary structures, and it can be easily incorporated into various search ethods that use different statistical odels. Furtherore, the proposed approach has a low coputational cost, yet very effective for prescreening, as will be deonstrated in the paper. I. INTRODTION Recent studies on various genoes have revealed that there exist a large nuber of noncoding RNs (ncrns), which are RN olecules that function without being translated into proteins [6]. nlike RNs (essenger RNs) that passively carry protein-coding inforation, the ncrns actively participate in diverse biological processes. lthough exaples such as the trns (transfer RNs) and rrns (ribosoal RNs) have been known for a long tie, systeatic research on ncrns shows that the nuber of RNs and the variety and extent of their roles are uch larger than it was previously thought [6]. s the annotation of ncrns is still at an early stage, it is of great iportance to develop coputational tools that can be used for screening the genoe to identify new RNs. n effective way for finding new ncrns is to search for RNs that look siilar to already known RNs. iven a set of related RNs that belong to the sae faily, we ay construct a statistical odel that represents the RN faily, and use this odel to find siilar regions in a genoe database. This is usually called a siilarity search or a hoology search. For a successful RN siilarity search, we need a suitable statistical odel that can effectively describe the ain characteristics of ncrns. One distinguishing feature of any ncrns is the conservation of their secondary structures. s the secondary structure of a ncrn plays a crucial role in carrying out its biological function, any RN failies have characteristic secondary structures that are coonly shared by their ebers [1]. For this reason, it is iportant to consider both sequence siilarity as well as structural siilarity when perforing an RN siilarity search. In fact, using a scoring schee that can reasonably cobine sequence and structural siilarities can considerably increase the discriinative power of the search [1], [9]. The secondary structure of an RN can be described in ters of correlations between distant bases in its priary sequence [9]. Therefore, in order to represent ncrn failies and develop a scoring schee that can cobine contributions fro sequence siilarity and structural siilarity, we need a statistical odel that can describe these base correlations. Exaples of such odels are the M 1 (covariance odel) [1] and the profile-cshmm (profile context-sensitive HMM) [8], [11]. nfortunately, the coputational cost for using these odels is often too high for scanning a large genoe database. In order to solve this proble, a nuber of ethods have been proposed to expedite the RN siilarity search [3], [4], [7], [10]. The ain idea underlying these ethods is to prescreen the database using a sipler odel (e.g., a profile-hmm) to filter out the dissiilar regions as uch as possible. Only the reaining regions that bear soe siilarity are passed to a ore coplex (hence, ore discriinative) odel, such as the profile-cshmm or the M, for further inspection. It has been shown that this prescreening approach can ake the search speed significantly faster, either without any loss of accuracy [3], [4], [10] or at a slight loss of accuracy [7]. In this paper, we propose a novel prescreening ethod based on atched filtering of ste patterns. nlike the previous ethods, the proposed ethod can scan the database solely based on structural siilarity, which can be especially useful for RN failies with low sequence siilarity. s the 1 M can be viewed as a SF (stochastic context-free graar) with a special structure.

2 atched filter is constructed fro the secondary structure of the reference RN instead of a specific statistical odel, the proposed ethod can be used in cobination with any kind of odel, including profile-cshmms and Ms. Furtherore, as the atched filter can be constructed for any kind of RN secondary structure, the proposed ethod can be used for searching any RN faily, including those with pseudoknots 2 Finally, the proposed ethod has a low coputational cost, yet very effective in detecting the structural siilarity, as will be deonstrated in our experients. This paper is organized as follows. In Sec. II, we present a brief review of the existing prescreening ethods. The proposed prescreening ethod based on structural siilarity is elaborated in Sec. III. We present experiental results in Sec. IV that deonstrate the effectiveness of the proposed ethod, and the paper is concluded in Sec. V. II. FST RN SERH SIN PRESREENIN FILTERS typical RN siilarity search is carried out as follows. iven a set of related RNs that belong to the sae faily, we first find their ultiple sequence alignent based on their sequence and/or structural siilarity. There exist any heuristic ethods that can be used to find a reasonably good alignent of the given sequences [2]. Based on this ultiple sequence alignent, we predict the coon secondary structure of the RNs and construct a statistical odel such as a profilecshmm [8], [11] or a M (covariance odel) [1] that can closely represent the alignent. 3 Once the odel is constructed, it can be used for searching a genoe database to find siilar sequences which ight be new ebers of the sae RN faily. iven a target RN, we copute a siilarity score based on the constructed odel, to find out how uch it resebles the reference RN faily. The observation probability of the target RN is a coon choice for the siilarity score, although it is typical to use either the log-probability or a log-likelihood ratio after noralizing the log-probability with respect to a rando sequence odel. nfortunately, coputing the observation probability of a target RN based on profile-cshmms or Ms is coputationally expensive. This is due to the coplexity of these odels that is necessary for describing the coplicated base correlations in RN sequences. For exaple, the coputational coplexity of the optial alignent algorith 4 for Ms called the YK (ocke-younger Kasai) algorith is O(L 3 M), where L is the length of the target RN and M is the nuber of states in the odel. The nuber of states 2 RN secondary structures that have crossing base-pairs are called pseudoknots. 3 lthough we have described the procedure in three separate steps (i.e., finding the alignent, predicting the coon secondary structure, and constructing the odel) for siplicity, these steps are closely interrelated and it is typical to repeat these steps until the odel converges to the optial one. 4 In general, there can be any different state sequences (or paths ) that give rise to the sae sybol sequence. n optial alignent algorith tries to find the optial path aong all feasible paths that axiizes the observation probability of the sequence based on the given odel. s this is conceptually identical to finding the best alignent between the sybol sequence and the statistical odel, it is typically called an optial alignent algorith. Fig. 1. Target RN Prescreening Filter Is it siilar? yes Full Model (profile-cshmm,m) Is it siilar? yes Report as a Match (New Meber) no no Reject (False andidate) Prescreening Stage Main Stage sing a prescreening ethod can ake the search significantly faster. M is proportional to the length of the reference RN. Siilarly, the S (sequential coponent adjoining) algorith for profile-cshmms has a high coputational coplexity. The coplexity of the S algorith is variable, typically between O(L 2 M) and O(L 4 M), depending on the structure of the reference RN. opared to O(LM) of the Viterbi algorith 5 for profile-hmms, the coputational coplexity of the YK and S algoriths is relatively high. Because of the high coputational cost of these algoriths, RN search based on profile-cshmms and Ms are usually too slow for scanning a large database, especially if the size of the RN is large. In order to overcoe this proble, a general prescreening ethod has been proposed in [3] to ake M-based searches faster. The basic idea of the prescreening ethod is as follows. Instead of using a M to scan the entire database, the ethod first uses a siple prescreening filter to scan the database. 6 The prescreening filter quickly filters out regions that are dissiilar, and passes only the regions that are siilar enough to the reference RN faily to the second stage. In the second stage, a full M is used to investigate these regions ore closely. The basic idea of the prescreening approach is illustrated in Fig. 1. If the prescreening filter runs fast enough copared to the ore coplex odel (a M, in this case) yet effective enough to filter out ost of the dissiilar regions, the overall speed of the search can be iproved significantly. In [3], profile-hmms were used as prescreening filters, whose paraeters were chosen based on the M paraeters such that it guarantees that there is no loss in the prediction accuracy. It was shown that the search speed could be iproved by 25 ties on average, and by ore than The coplexity of the Viterbi algorith for general HMMs is O(LM 2 ). 6 This should not be confused with the filters in signal processing. The prescreening filters are in fact siple statistical odels that are used to filter out the dissiilar regions, hence called filters.

3 Fig. 2. RN 1: < < < > > > - RN 2: < < < > > > RN 3: < < < - - > > > RN 4: < < < - - > > > - Exaples of RNs with siilar secondary structures. ties for any ncrn failes [4]. Siilarly, a prescreening ethod for profile-cshmms was proposed in [10], which also used profile-hmms for prescreening. nlike Ms that cannot be used for finding RNs with pseudoknots, profilecshmms have the advantage that they can represent any kind of RNs, including pseudoknots. The original prescreening ethod proposed in [3] was iproved further. For exaple, in [4], the profile-hmm based filters were augented with soe secondary structure inforation (though liited), and in [7], profile-hmm based heuristic filters were proposed that allow us to trade prediction accuracy for speed. One disadvantage of the previous ethods is that they ainly rely on sequence siilarity. lthough the ethod proposed in [4] augents the profile-hmm with sub-ms (parts of the full M) to detect siple ste-loops (hairpins), this hybrid prescreening filter can represent the structure of the reference RN only partially. Furtherore, although the hybrid filter will still be faster than the full M, it is considerably slower than the one solely based on the profile- HMM. In the following section, we propose a novel prescreening ethod that effectively overcoes the shortcoings of the previous ethods. The proposed ethod is based on atched filtering of ste patterns, which can scan the database to find regions that are structurally siilar to the reference RN. The structural atched filter can be constructed for any kind of RN secondary structure, aking the proposed approach generally applicable. Furtherore, it has a very low coputational cost, hence suitable for scanning large databases. III. MTHED FILTERIN FOR STRTRL SIMILRITY ssue that we have a reference RN with a known secondary structure. iven a target RN sequence with no structural annotation, how can we quickly find out if a siilar structure can be also found in the target RN? For exaple, let us consider the RNs shown in Fig. 2. s we can see in Fig. 2, all four RNs have siilar secondary structures, where every RN has a single ste-loop at a different location and/or a different loop size. Their structural siilarity can be easily recognized if we draw the dot-plots for their structures. iven an RN sequence x = x 1 x 2... x L with a structural annotation, we define the corresponding L L dot-plot atrix P as follows. The (, n)-th eleent p n of the dot-plot Fig. 4. RN 1 3 RN 3 RN RN Fig. 3. The dot-plots corresponding to the RNs in Fig. 2. (a) Reference RN 3 (c) Base-pairing atrix 5 3 (b) Ste pattern 5 3 (d) Maxiu overlap 5 3 Detecting structural siilarity by coparing the dot-plot patterns. atrix (base-pairing atrix) is defined as { 1, if xi and x p n = j for a base-pair 0, otherwise. The dot-plot atrix P is always syetric by definition. Fig. 3 shows the dot-plots that correspond to the structure of the RNs in Fig. 2. Fro Fig. 3, we can readily recognize the structural siilarity aong the four RNs. This shows that using dot-plots can be very useful in detecting the structural siilarity between RNs. To deonstrate this idea, let us consider the following exaple. ssue that RN-1 in Fig. 2 is used as the reference, and we assue that we know its structure. Based on its secondary structure, let us construct the base-pairing atrix P r as shown in Fig. 4(a). s the atrix P r is syetric, we keep only the uppertriangular portion of P r to obtain P r. This (strictly) uppertriangular atrix P r is shown in Fig. 4(b), where the reoved (1) Reference Target

4 portion is shown in gray. Note that this atrix contains the structural pattern (or the ste pattern) of the reference RN. Now assue that RN-4 is the target RN whose structure we do not know. In order to find out whether the target (RN-4) has a siilar structure as the reference (RN-1), we copute the base-pairing atrix P t of RN-4. Since we do not know its structure, we cannot construct P t = {p n } based on the actual base-pairing inforation. Instead, we set p n = 1 for all (, n) where x can for a base-pair with x n. For exaple, if x =, then we let p n = 1 for every n that satisfies x n =. s P t is also syetric, we keep only the upper-triangular portion of P t, and denote it as P t. The atrix P t is shown in Fig. 4(c). Now that we have P r and P t, we can copare these atrices to find out whether the target RN has a siilar structure as the reference RN. One way to do this is to find the axiu overlap between the atrices as illustrated in Fig. 4(d). s expected, the ste pattern in P r copletely overlaps with the base-pairing region in P t, showing that the target (RN-4) has a (nearly) identical structure as the reference (RN-1). Based on this idea, we propose an efficient ethod for coparing the structural siilarity between a structured reference RN and an unstructured target RN. The proposed ethod is as follows. Firstly, we construct a L r L r base-pairing atrix P r = {p n } based on the secondary structure of the reference RN, where L r is the length of the RN. We keep the uppertriangular portion of P r to construct an upper-triangular atrix P r = { p n } as follows { pn, if < n p n = (2) 0, otherwise. Fro P r, we construct the atched filter atrix S = {s n } such that s n = p (Lr )(L r n). This is identical to keeping the lower-tringular portion of P r to obtain S. Secondly, for a target RN of length L t, we construct a L t L t basepairing atrix P t for all possible base-pairs. s before, we take the upper-triangular portion of P t to get Pt. Thirdly, in order to copare the structures of the RNs, we find the axiu overlap between the atrix P r, which contains the ste pattern of the reference RN, and the atrix P t, which shows the base-pairing region of the target RN. The axiu overlap can be easily found by coputing Y = P t S, (3) and finding the largest eleent of Y, where B denotes the two-diensional convolution of and B. For Y = {y n }, we define λ to be the value of the largest eleent λ = ax,n (y n ). (4) This λ gives us the axiu nuber of base-pairs that the two RNs have in coon. The larger the value of λ, the closer will be the structure of the reference RN and that of the target RN. The process described so far can be viewed as atched filtering of a noisy signal (structural pattern of the target RN) based on the shape of the original signal (a) Base-pairing atrix P r of the reference RN (d) Matched filtering P t Fig. 5. * (b) Matched filter S S = (c) Base-pairing atrix P t of the target RN Matched filtering based on ste patterns. (structural pattern of the reference RN). The entire atched filtering process is illustrated in Fig. 5. t first sight, the coputational coplexity of the proposed ethod sees to be O(L 2 rl 2 t ) as it involves the convolution of an L r L r atrix and an L t L t atrix. However, the actual coplexity is uch saller, because the atrix S is very sparse. In fact, the nuber of non-zero eleents in S is identical to the nuber of base-pairs in the reference RN. The actual coputational coplexity will be O(NL 2 t ), where N ( 1 2 L r) is the nuber of base-pairs. lthough the coplexity is still quadratic in L t (length of the target RN), this is not a serious proble in practice, as it siply corresponds to the addition of N atrices of size L t L t. IV. EXPERIMENTL RESLTS To deonstrate the effectiveness of the proposed ethod, we perfored nuerical experients using the RNs in the ORON PK3 and FLVI PK3 failies in the Rfa database [5]. Note that both RN failies contain pseudoknots, which cannot be represented by Ms though they can be represented by profile-cshmms. The coputational coplexity of the S algorith would be O(L 4 M) for these RN failies [11]. Due to the high coputational cost, an RN search based on profile-cshmm alone would be too slow for scanning a large database, and it necessitates the incorporation of an efficient search strategy such as the prescreening approach. In our experients, we used the RNs in the seed alignents [5] of the RN failies. For each faily, we carried out the following cross-validation experient. We first chose one of the ebers as the reference RN, and constructed the atched filter atrix S based on its secondary structure. sing this atrix S, we carried out the atched filtering process elaborated in Sec. III for the reaining ebers and coputed λ as in (4). This value has been noralized to obtain the noralized structural siilarity score σ = λ/n, (5) Y

5 uulative Probability uulative Probability oronapk3 0.2 oronapk3 0.1 Rando Noralized Score Flavipk3 0.2 Flavipk3 0.1 Rando Noralized Score Fig. 6. uulative distribution of the structural siilarity score. (Top) Score distribution of the ORON PK3 RN faily. (Botto) Score distribution of the FLVI PK3 RN faily. where N is the nuber of base-pairs in the reference RN. Note that we always have 0 λ N, hence the noralized score σ is in the region 0 σ 1. This experient has been repeated by using every eber in the given faily as the reference RN, so that we can obtain a better estiate of σ. For coparison, we also coputed the average structural siilarity score for randoly generated RN sequences. If the score distribution of real RNs (with siilar secondary structures) is well-separated fro that of rando RNs, we can use this score σ for filtering out the sequences that are structurally dissiilar fro the reference RN. In order to ake this ore reliable, we considered only stes with ore than three base-pairs. Furtherore, we liited the region for finding the largest eleent of Y as follows λ = ax e D, n n e D (y n ). (6) In (6), ( e, n e ) is the expected location of the largest eleent for the case when the target RN has an identical structure as the reference RN. The paraeter D restricts the region for finding the largest eleent around ( e, n e ). The experiental results are shown in Fig. 6, which shows the cuulative distribution function (DF) F σ (s) = P (σ s) (7) of the structural siilarity score σ. Fig. 6 (Top) shows the score distribution of real RNs and that of rando RNs, where the reference RN faily was the ORON PK3. s we can see in Fig. 6 (Top), the score distributions of real and rando RNs are well-separated. 7 For exaple, if we 7 We used D = 3 in our experients. choose a threshold value of σ = 0.45, prescreening based on the proposed ethod can filter out 97% of the unrelated RNs at a false negative prediction rate of 3% (i.e., 97% sensitivity). onsidering that the proposed ethod perfors uch faster than the S algorith for finding the optial alignent, a rejection rate of 97% leads to a 33 (= 1/0.03) ties increase in the average search speed. For FLVI PK3 faily, the proposed ethod perfored even better. Fro Fig. 6 (Botto) we can see that if we choose the threshold as σ = 0.33, ore than 98% of the unrelated RNs can be rejected at no loss of sensitivity. In this case, the search speed can be ade around 50 ties faster without any loss in the prediction perforance. V. ONLDIN REMRKS In this paper, we proposed an efficient ethod for coparing the structural siilarity of RNs, based on atched filtering of ste patterns. The proposed ethod has a very low coputational cost, yet it is applicable to RNs with arbitrary secondary structures. s deonstrated in this paper, the proposed ethod can ake RN searches faster by prescreening the database based on structural siilarity. Experiental results show that the search speed can be iproved up to 50 ties by the proposed ethod alone. We expect that the search speed can be iproved even further when cobined with other sequence-based prescreening ethods. KNOWLEDMENT This work was supported in part by the NSF grant F REFERENES [1] R. Durbin, S. Eddy,. Krogh, and. Mitchison, Biological sequence analysis, abridge niv. Press, abridge, K, [2] R.. Edgar and S. Batzoglou, Multiple sequence alignent, urrent Opinion in Structural Biology, vol. 16, pp , [3] Z. Weinberg and W. L. Ruzzo, Faster genoe annotation of non-coding RN failies without loss of accuracy, Proc. 8th nn. Int. onf. on oputational Molecular Biology (REOMB), pp , [4] Z. Weinberg and W. L. Ruzzo, Exploiting conserved structure for faster annotation of non-coding RNs without loss of accuracy, Bioinforatics, vol. 20, pp. i334-i340, [5] S. riffiths-jones, S. Moxon, M. Marshall,. Khanna, S. R. Eddy and. Batean, Rfa: annotating non-coding RNs in coplete genoes, Nucleic cids Research, vol. 33, pp. D121-D124, [6]. Storz, n expanding universe of noncoding RNs, Science, vol. 296, pp , [7] Z. Weinberg and W. L. Ruzzo, Sequence-based heuristics for faster annotation of noncodingrn failies, Bioinforatics, vol. 22, pp , [8] B.-J. Yoon and P. P. Vaidyanathan, Profile context-sensitive HMMs for probabilistic odeling of sequences with coplex correlations, Proc. 31st ISSP, Toulouse, May [9] B.-J. Yoon and P. P. Vaidyanathan, oputational identification and analysis of noncoding RNs - nearthing the buried treasures in the genoe, IEEE Signal Processing Magazine, vol. 24, no. 1, pp , Jan [10] B.-J. Yoon and P. P. Vaidyanathan, Fast search of sequences with coplex sybol correlations using profile context-sensitive HMMs and pre-screening filters, Proc. 32nd ISSP, Honolulu, Hawaii, pr [11] B.-J. Yoon and P. P. Vaidyanathan, Structural alignent of RNs using profile-cshmms and its application to RN hoology Search: Overview and new results, IEEE Trans. utoatic ontrol & IEEE Trans. ircuits and Systes: Part-I (Joint Special Issue on Systes Biology), to appear in Jan

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

Data-Driven Imaging in Anisotropic Media

Data-Driven Imaging in Anisotropic Media 18 th World Conference on Non destructive Testing, 16- April 1, Durban, South Africa Data-Driven Iaging in Anisotropic Media Arno VOLKER 1 and Alan HUNTER 1 TNO Stieltjesweg 1, 6 AD, Delft, The Netherlands

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Statistical Logic Cell Delay Analysis Using a Current-based Model

Statistical Logic Cell Delay Analysis Using a Current-based Model Statistical Logic Cell Delay Analysis Using a Current-based Model Hanif Fatei Shahin Nazarian Massoud Pedra Dept. of EE-Systes, University of Southern California, Los Angeles, CA 90089 {fatei, shahin,

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

An improved self-adaptive harmony search algorithm for joint replenishment problems

An improved self-adaptive harmony search algorithm for joint replenishment problems An iproved self-adaptive harony search algorith for joint replenishent probles Lin Wang School of Manageent, Huazhong University of Science & Technology zhoulearner@gail.co Xiaojian Zhou School of Manageent,

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

are equal to zero, where, q = p 1. For each gene j, the pairwise null and alternative hypotheses are,

are equal to zero, where, q = p 1. For each gene j, the pairwise null and alternative hypotheses are, Page of 8 Suppleentary Materials: A ultiple testing procedure for ulti-diensional pairwise coparisons with application to gene expression studies Anjana Grandhi, Wenge Guo, Shyaal D. Peddada S Notations

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Using a De-Convolution Window for Operating Modal Analysis

Using a De-Convolution Window for Operating Modal Analysis Using a De-Convolution Window for Operating Modal Analysis Brian Schwarz Vibrant Technology, Inc. Scotts Valley, CA Mark Richardson Vibrant Technology, Inc. Scotts Valley, CA Abstract Operating Modal Analysis

More information

Generalized Queries on Probabilistic Context-Free Grammars

Generalized Queries on Probabilistic Context-Free Grammars IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 20, NO. 1, JANUARY 1998 1 Generalized Queries on Probabilistic Context-Free Graars David V. Pynadath and Michael P. Wellan Abstract

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry About the definition of paraeters and regies of active two-port networks with variable loads on the basis of projective geoetry PENN ALEXANDR nstitute of Electronic Engineering and Nanotechnologies "D

More information

When Short Runs Beat Long Runs

When Short Runs Beat Long Runs When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long

More information

Handwriting Detection Model Based on Four-Dimensional Vector Space Model

Handwriting Detection Model Based on Four-Dimensional Vector Space Model Journal of Matheatics Research; Vol. 10, No. 4; August 2018 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Handwriting Detection Model Based on Four-Diensional Vector

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Ensemble Based on Data Envelopment Analysis

Ensemble Based on Data Envelopment Analysis Enseble Based on Data Envelopent Analysis So Young Sohn & Hong Choi Departent of Coputer Science & Industrial Systes Engineering, Yonsei University, Seoul, Korea Tel) 82-2-223-404, Fax) 82-2- 364-7807

More information

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and

More information

The proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013).

The proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013). A Appendix: Proofs The proofs of Theore 1-3 are along the lines of Wied and Galeano (2013) Proof of Theore 1 Let D[d 1, d 2 ] be the space of càdlàg functions on the interval [d 1, d 2 ] equipped with

More information

Grafting: Fast, Incremental Feature Selection by Gradient Descent in Function Space

Grafting: Fast, Incremental Feature Selection by Gradient Descent in Function Space Journal of Machine Learning Research 3 (2003) 1333-1356 Subitted 5/02; Published 3/03 Grafting: Fast, Increental Feature Selection by Gradient Descent in Function Space Sion Perkins Space and Reote Sensing

More information

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5,

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, 2015 31 11 Motif Finding Sources for this section: Rouchka, 1997, A Brief Overview of Gibbs Sapling. J. Buhler, M. Topa:

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Boosting with log-loss

Boosting with log-loss Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the

More information

Recursive Algebraic Frisch Scheme: a Particle-Based Approach

Recursive Algebraic Frisch Scheme: a Particle-Based Approach Recursive Algebraic Frisch Schee: a Particle-Based Approach Stefano Massaroli Renato Myagusuku Federico Califano Claudio Melchiorri Atsushi Yaashita Hajie Asaa Departent of Precision Engineering, The University

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109

More information

Use of PSO in Parameter Estimation of Robot Dynamics; Part One: No Need for Parameterization

Use of PSO in Parameter Estimation of Robot Dynamics; Part One: No Need for Parameterization Use of PSO in Paraeter Estiation of Robot Dynaics; Part One: No Need for Paraeterization Hossein Jahandideh, Mehrzad Navar Abstract Offline procedures for estiating paraeters of robot dynaics are practically

More information

arxiv: v1 [math.na] 10 Oct 2016

arxiv: v1 [math.na] 10 Oct 2016 GREEDY GAUSS-NEWTON ALGORITHM FOR FINDING SPARSE SOLUTIONS TO NONLINEAR UNDERDETERMINED SYSTEMS OF EQUATIONS MÅRTEN GULLIKSSON AND ANNA OLEYNIK arxiv:6.395v [ath.na] Oct 26 Abstract. We consider the proble

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

On the Maximum Number of Codewords of X-Codes of Constant Weight Three

On the Maximum Number of Codewords of X-Codes of Constant Weight Three On the Maxiu Nuber of Codewords of X-Codes of Constant Weight Three arxiv:190.097v1 [cs.it] 2 Mar 2019 Yu Tsunoda Graduate School of Science and Engineering Chiba University 1- Yayoi-Cho Inage-Ku, Chiba

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

A method to determine relative stroke detection efficiencies from multiplicity distributions

A method to determine relative stroke detection efficiencies from multiplicity distributions A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,

More information

Effective joint probabilistic data association using maximum a posteriori estimates of target states

Effective joint probabilistic data association using maximum a posteriori estimates of target states Effective joint probabilistic data association using axiu a posteriori estiates of target states 1 Viji Paul Panakkal, 2 Rajbabu Velurugan 1 Central Research Laboratory, Bharat Electronics Ltd., Bangalore,

More information

Support Vector Machines. Goals for the lecture

Support Vector Machines. Goals for the lecture Support Vector Machines Mark Craven and David Page Coputer Sciences 760 Spring 2018 www.biostat.wisc.edu/~craven/cs760/ Soe of the slides in these lectures have been adapted/borrowed fro aterials developed

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

A general forulation of the cross-nested logit odel Michel Bierlaire, Dpt of Matheatics, EPFL, Lausanne Phone: Fax:

A general forulation of the cross-nested logit odel Michel Bierlaire, Dpt of Matheatics, EPFL, Lausanne Phone: Fax: A general forulation of the cross-nested logit odel Michel Bierlaire, EPFL Conference paper STRC 2001 Session: Choices A general forulation of the cross-nested logit odel Michel Bierlaire, Dpt of Matheatics,

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

N-Point. DFTs of Two Length-N Real Sequences

N-Point. DFTs of Two Length-N Real Sequences Coputation of the DFT of In ost practical applications, sequences of interest are real In such cases, the syetry properties of the DFT given in Table 5. can be exploited to ake the DFT coputations ore

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem Genetic Quantu Algorith and its Application to Cobinatorial Optiization Proble Kuk-Hyun Han Dept. of Electrical Engineering, KAIST, 373-, Kusong-dong Yusong-gu Taejon, 305-70, Republic of Korea khhan@vivaldi.kaist.ac.kr

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Multi-view Discriminative Manifold Embedding for Pattern Classification

Multi-view Discriminative Manifold Embedding for Pattern Classification Multi-view Discriinative Manifold Ebedding for Pattern Classification X. Wang Departen of Inforation Zhenghzou 450053, China Y. Guo Departent of Digestive Zhengzhou 450053, China Z. Wang Henan University

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

Order Recursion Introduction Order versus Time Updates Matrix Inversion by Partitioning Lemma Levinson Algorithm Interpretations Examples

Order Recursion Introduction Order versus Time Updates Matrix Inversion by Partitioning Lemma Levinson Algorithm Interpretations Examples Order Recursion Introduction Order versus Tie Updates Matrix Inversion by Partitioning Lea Levinson Algorith Interpretations Exaples Introduction Rc d There are any ways to solve the noral equations Solutions

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number Research Journal of Applied Sciences, Engineering and Technology 4(23): 5206-52, 202 ISSN: 2040-7467 Maxwell Scientific Organization, 202 Subitted: April 25, 202 Accepted: May 3, 202 Published: Deceber

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se

More information

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators Suppleentary Inforation for Design of Bending Multi-Layer Electroactive Polyer Actuators Bavani Balakrisnan, Alek Nacev, and Elisabeth Sela University of Maryland, College Park, Maryland 074 1 Analytical

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

An Improved Particle Filter with Applications in Ballistic Target Tracking

An Improved Particle Filter with Applications in Ballistic Target Tracking Sensors & ransducers Vol. 72 Issue 6 June 204 pp. 96-20 Sensors & ransducers 204 by IFSA Publishing S. L. http://www.sensorsportal.co An Iproved Particle Filter with Applications in Ballistic arget racing

More information

W-BASED VS LATENT VARIABLES SPATIAL AUTOREGRESSIVE MODELS: EVIDENCE FROM MONTE CARLO SIMULATIONS

W-BASED VS LATENT VARIABLES SPATIAL AUTOREGRESSIVE MODELS: EVIDENCE FROM MONTE CARLO SIMULATIONS W-BASED VS LATENT VARIABLES SPATIAL AUTOREGRESSIVE MODELS: EVIDENCE FROM MONTE CARLO SIMULATIONS. Introduction When it coes to applying econoetric odels to analyze georeferenced data, researchers are well

More information

arxiv: v2 [cs.lg] 30 Mar 2017

arxiv: v2 [cs.lg] 30 Mar 2017 Batch Renoralization: Towards Reducing Minibatch Dependence in Batch-Noralized Models Sergey Ioffe Google Inc., sioffe@google.co arxiv:1702.03275v2 [cs.lg] 30 Mar 2017 Abstract Batch Noralization is quite

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Fundamental Limits of Database Alignment

Fundamental Limits of Database Alignment Fundaental Liits of Database Alignent Daniel Cullina Dept of Electrical Engineering Princeton University dcullina@princetonedu Prateek Mittal Dept of Electrical Engineering Princeton University pittal@princetonedu

More information

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering

More information

Optical Properties of Plasmas of High-Z Elements

Optical Properties of Plasmas of High-Z Elements Forschungszentru Karlsruhe Techni und Uwelt Wissenschaftlishe Berichte FZK Optical Properties of Plasas of High-Z Eleents V.Tolach 1, G.Miloshevsy 1, H.Würz Project Kernfusion 1 Heat and Mass Transfer

More information

A Note on the Applied Use of MDL Approximations

A Note on the Applied Use of MDL Approximations A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup)

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup) Recovering Data fro Underdeterined Quadratic Measureents (CS 229a Project: Final Writeup) Mahdi Soltanolkotabi Deceber 16, 2011 1 Introduction Data that arises fro engineering applications often contains

More information

General Properties of Radiation Detectors Supplements

General Properties of Radiation Detectors Supplements Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent

More information

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network 565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association

More information