Approximated MLC shape matrix decomposition with interleaf collision constraint

Size: px
Start display at page:

Download "Approximated MLC shape matrix decomposition with interleaf collision constraint"

Transcription

1 Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence matrix A has to be decomposed into a sum of shape matrices corresponding to homogeneous fieds that can be shaped by a mutieaf coimator (MLC). We sove the probem of minimizing the deivery time for an approximation of A satisfying certain prescribed bounds, under the additiona condition that the used MLC requires the intereaf coision constraint. Key words: Intensity moduated radiation therapy (IMRT); mutieaf coimator; combinatoria optimization; programming invoving graphs 21 MSC: 9C35, 92C5, 9C9 1 Introduction In modern cancer therapy radiation is used to destroy the tumor tissue. At the same time one has to minimize the damage to the heathy tissue, and in particuar to sensibe structures or organs at risk. Intensity moduated radiation therapy was introduced in order to improve the quaity of radiation treatment. In cinica practice it is common to use a inear acceerator which can reease radiation from different directions (Figure 1). In addition, a mutieaf coimator (MLC) (Figure 2) can be used to protect certain parts of the irradiated area. Figure 1: A inear acceerator. Figure 2: Leaf pairs of a mutieaf coimator. For the treatment panning, the first step is to determine a set of directions (typicay 3 9), from which radiation is reeased, given by positions of the isocenter, tabe anges and gantry anges [5, Agorithmic Operations Research 4(1):49 57, 29 1

2 12]. In a second step, for each direction the fuence distribution is optimized, subject to required dose distribution in the target. The fina step is to determine, for each fuence distribution, a corresponding sequence of MLC eaf positions. Recenty, there have been attempts to formuate the optimization probem more gobay [5, 13], but most of the widey used treatment panning systems mode the three steps independenty. In this paper we consider the ast step for the MLC in the so caed step-and-shoot mode. This means the radiation is switched off whie the eaves are moving, and so the generated intensity moduated fied is just a superposition of finitey many homogeneous fieds which are shaped by the MLC. The two most important objectives in the optimization probem are the tota irradiation time, or deivery time (DT), and the number of used fieds, or decomposition cardinaity (DC). Starting with [2] and [6] there have been proposed severa agorithms for this probem [3, 1, 14, 15], taking into account additiona machine dependent constraints as the intereaf coision constraint [1, 7] or the tongue-and-groove constraint [11] (see [9] or [8] for a survey). A of these agorithms start with the given fuence matrix A and construct a sequence of eaf positions reaizing this matrix. But from a practica point of view there seem to be some doubts if it is reasonabe to consider every entry a ij as fixed once and for a. First, the matrix A is a resut of numerica computations which are based on simpified physica modes of how the radiation passes through the patients body, and second, the representation of A as a superposition of homogeneous fieds is aso based on mode assumptions which are not stricty correct, for instance the dose deivered to an exposed bixe depends on the shape of the fied. So it might be sufficient, to reaize (in our mode) a matrix that is cose to A. It is a natura question, how much the deivery time can be reduced by giving ony an approximate representation of A satisfying certain minimum and maximum dose constraints. As an immediate consequence, the next probem arises: find an approximation with this optima DT which is as cose as possibe to A. These questions have been answered for unconstrained MLCs in [4], and in the present paper we generaize the ideas from this reference to MLCs with intereaf coision constraint. In Section 2 we give an precise statement of the probem, Section 3 reviews an exact agorithm for shape matrix decomposition with intereaf coision constraint, in Section 4 we present our graphtheoretica characterization of the minima DT of an approximation with a constructive proof, in Section 5 we show how the tota change can be reduced heuristicay, and the fina Section 6 contains some test resuts. 2 Notation and probem formuation Throughout the rest of the paper, for a natura number n, [n] denotes the set {1, 2,..., n} and for integers m < n, [m, n] denotes the set {m, m + 1,..., n}. For integers a, we aso use the notation a + for the nonnegative part, defined by { a if a, a + = otherwise. Our starting point is an m n matrix A with nonnegative integer entries. The entry a ij represents the desired fuence at bixe (i, j). In addition, for each entry (i, j) we have ower and upper bounds a ij and a ij, such that a ij a ij a ij. Definition 1 (Feasibe Approximation). Any integer matrix B with a ij b ij a ij 2

3 is caed feasibe approximation of A. The tota change T C(B) of a feasibe approximation B is defined by m n T C(B) = b ij a ij. i=1 j=1 The homogeneous fieds that can be shaped by the MLC are described by binary matrices of size m n which we ca shape matrices. Definition 2 (Shape matrix). An m n matrix S is a shape matrix if there are pairs of integers ( i, r i ) (i = 1,..., m), such that the foowing conditions are satisfied: { 1 if i < j < r i, 1. s ij = otherwise. 2. i < r i+1 and r i > i+1 for a i [m 1]. The second condition in Definition 2 is caed intereaf coision constraint (ICC). It ensures the eft eaf of row i and the right eaf of row i±1 do not overap, which is required by some widey used MLCs, for instance the Eekta MLC. An MLC eaf sequence for A corresponds to a representation of A as a weighted sum of shape matrices. Definition 3 (Shape matrix decomposition). A shape matrix decomposition of A is a representation of A as a positive integer combination of shape matrices k A = u t S (t). The deivery time (DT) of this decomposition is just the sum of the coefficients, k DT = u t. Exampe 1. For the shape matrix decomposition = we have DT = 4. t=1 Now we formuate three optimization probems. MinDT. Find a shape matrix decomposition A = k t=1 u ts (t) such that DT = k t=1 u t is minima. Approx-MinDT. Find a feasibe approximation B and a shape matrix decomposition B = k t=1 u ts (t) such that DT = k t=1 u t is minima. Approx-MinDT-TC. Find a feasibe approximation B and a shape matrix decomposition B = k t=1 u ts (t) such that DT = k t=1 u t is minima, and under this condition T C(B) is minima. The first probem MinDT is the exact decomposition probem which can be soved by severa efficient agorithms [1, 7, 1]. The idea underying one of these agorithms is reviewed in the next section because it is the basis for our approach to the second probem Approx-MinDT. Finay, we observe that the second part of each of the probems Approx-MinDt and Approx-MinDT-TC, the search for the shape matrix decomposition, can be ignored safey, because, once the matrix B is fixed, we can appy any exact decomposition agorithm to compete the task. 3 t=1

4 3 Review of the exact decomposition The basis of our approach is a characterization of the minima DT of a decomposition with ICC as the maxima weight of a q s path in the foowing digraph G = (V, E) [7, 8]. V = {q, s} [m] [, n + 1], E = {(q, (i, )) : i [m]} {((i, n + 1), s) : i [m]} {((i, j), (i, j + 1)) : i [m], j [, n]} {((i, j), (i + 1, j)) : i [m 1], j [n]} {((i, j), (i 1, j)) : i [2, m], j [n]}. In order to avoid case distinctions, we add two coumns to our matrix and put Now we can define arc weights by a i = a i,n+1 = w(q, (i, )) = w((i, n + 1), s) = (i [m]). (i [m]) w((i, j 1), (i, j)) = max{, a i,j a i,j 1 } (i [m], j [n + 1]) w((i, j), (i + 1, j)) = a ij w((i, j), (i 1, j)) = a ij (i [m 1], j [n]) (i [2, m], j [n]). We ca this graph the DT-ICC-graph for A. Figure 3 shows the DT-ICC-graph for the matrix A = q s Figure 3: The DT-ICC-Graph for matrix A. Definition 4. Let A be an intensity matrix, and et G be the DT-ICC-graph for A. The maxima weight of a q s path in G is caed ICC-compexity of A and denoted by c(a). More formay, c(a) = max{w(p ) : P is a q s path in G.}. Using this definition the main resut of [7] can be formuated as foows. Theorem 1. The minima DT of a decomposition of A with ICC equas c(a). 4

5 4 Approximation To simpify our notation, for each (i, j) [m] [n] we introduce the interva of acceptabe fuence vaues ] I ij = [a ij, a ij, a ij a ij a ij. We want to find a matrix B such that b ij I ij for (i, j) [m] [n] and c(b) min. We foow an approach from [4] and repace every vertex (i, j) [m] [n] by I ij copies, i.e. by the set V ij = {(i, j)} I ij. In order to avoid case distinctions in the discussion beow we aso repace the vertices in coumns and n + 1 by V i = {(i,, )} and V i,n+1 = {(i, n + 1, )}. An arc ((i, j), (i, j + 1)) in the DT-ICC-graph G is repaced by the compete bipartite graph V ij V i,j+1, and simiary for the arcs ((i, j), (i ± 1, j)). The weights of the arcs ((i, j, k), (i, j + 1, )) shoud mode the approximation matrix B if we choose b ij = k and b i,j+1 =, and simiary for the other arc types. Hence we define the arc weights by w(q, (i,, )) = w((i, n + 1, ), s) = (i [m]), (i [m]), w((i,, ), (i, 1, k)) = k (i [m], k I i1 ), w((i, n, k), (i, n + 1, )) = (i [m], k I in ), w((i, j 1, k), (i, j, )) = ( k) + (i [m], j [n], k I i,j 1, I ij ), w((i, j, k), (i + 1, j, )) = k (i [m 1], j [n], k I ij, I i+1,j ), w((i, j, k), (i 1, j, )) = k (i [2, m], j [n], k I ij, I i 1,j ). In order to determine the minima compexity of an approximation matrix we compute numbers W (i, j, k) such that W (i, j, k) = max { min W (i, j 1, ) + (k ) +, min W (i 1, j, ), min W (i + 1, j, ) }. The intuitive idea is that for every feasibe approximation B with b ij = k, the maxima weight of a q (i, j) path in the DT-ICC-graph for B is at east W (i, j, k). The numbers W (i, j, k) can be computed efficienty (compexity O(m 2 n 2 ), where denotes any upper bound for I ij ) as described in Agorithm 1. Again, in order to avoid case distinctions at the boundaries, we add the vaues W (, j, ) = W (m + 1, j, ) = a j = a m+1,j = (j [n]). Definition 5. The ICC-approximation compexity of A (with respect to the given intervas I ij ) is defined by c(a) = max min W (i, n, k). i k 5

6 Ceary, c(a) is a ower bound for the ICC-compexity of a feasibe approximation of A. We wi show that this bound is sharp by an expicit construction of an approximation matrix B. For the ast coumn we put { a in if W (i, n, a in ) c(a), b in = max{k : W (i, n, k) c(a)} otherwise. For j < n, we assume that the entries b i,j+1 are aready determined, and put b ij = max { k : W (i, j, k) + (b i,j+1 k) + W (i, j + 1, b i,j+1 ) }. Exampe 2. We consider the foowing fuence matrix A with c(a) = 8. ( ) 4 A = 4 We choose the upper and ower bound such that b ij a ij 1 for every (i, j). The intervas and an optima approximation are ( ) ( ) [3, 5] [, 1] [, 1] 3 1, B = [, 1] [, 1] [3, 5] with c(b) = 4. Our agorithm obtains matrix B as foows. First we compute the numbers W (i, j, k), and obtain, for each (i, j), a vector (W i,j,aij, W i,j,aij +1,..., W i,j,aij ). These vectors are coected in the foowing array. Thus the optima DT is (3, 4, 5) (3, 3) (3, 3) (, 1) (2, 2) (4, 5, 6). max{min{3, 3}, min{4, 5, 6}} = 4. For the third coumn we choose b 13 = and b 23 = 3. For the entry (1, 2) we have W (1, 2, ) + w((1, 2, ), (1, 3, )) = W (1, 2, 1) + w((1, 2, 1), (1, 3, )) = W (1, 3, ). We choose the maxima possibe vaue b 12 = 1. Observe that b 12 = is indeed not possibe, since it eads to an increased DT. For entry (2, 2) we have W (2, 2, ) + w((2, 2, ), (2, 3, 3)) = > W (2, 3, 3), so here b 22 = 1 is the ony possibe choice. Simiary, we get b 11 = 3 and b 21 = 1. Ceary, the atter one can be repaced by. In order to prove that our method is correct, we need some simpe properties of the numbers W (i, j, k). 6

7 Lemma 1. For every (i, j) [m] [n] and every k such that (i, j, k), (i, j, k + 1) V ij we have Furthermore, W (i, j, k + 1) = W (i, j, k) + 1 iff for some I i,j 1 with k. Proof. Since W (i, j, k) W (i, j, k + 1) W (i, j, k) + 1. (1) W (i, j, k) = W (i, j 1, ) + (k ) + W (i, j 1, ) + (k ) + W (i, j 1, ) (k + 1 ) + and using the definition of the W (i, j, k), we concude W (i, j, k) W (i, j, k + 1). On the other hand, we have W (i, j, k) = max { min W (i, j 1, ) + (k ) +, min W (i 1, j, ), min W (i + 1, j, ) } max { min W (i, j 1, ) + (k + 1 ) +, min W (i 1, j, ), min W (i + 1, j, ) } 1 = W (i, j, k + 1) 1, where equaity occurs iff W (i, j, k) = W (i, j 1, ) + (k ) + and k. The next emma is the key step of our argument. It asserts that the chosen b ij do not ead to conficts inside the coumns. Lemma 2. For a j and a i [m 1], we have and for a j and a i [2, m], we have W (i, j, b ij ) b ij W (i + 1, j, b i+1,j ), W (i, j, b ij ) b ij W (i 1, j, b i 1,j ). Proof. We ony show the first statement, since the second one can be proved simiary. Suppose the statement is fase, i.e. W (i, j, b ij ) b ij > W (i + 1, j, b i+1,j ). By construction, there is some k I ij such that W (i, j, k) k W (i + 1, j, b i+1,j ). Case 1. k < b ij. Let δ = b ij k >. By Lemma 1 we have But now we obtain W (i, j, k) W (i, j, b ij ) δ. W (i, j, k) k (W (i, j, b ij ) δ) (b ij δ) > W (i + 1, j, b i+1,j ), and this is the required contradiction. 7

8 Case 2. k > b ij. Let δ = k b ij >. By construction of the numbers b ij, W (i, j, b ij ) + (b i,j+1 b ij ) + W (i, j + 1, b i,j+1 ), W (i, j, b ij + 1) + (b i,j+1 (b ij + 1)) + > W (i, j + 1, b i,j+1 ). Using Lemma 1, this is possibe ony if Using Lemma 1 repeatedy, we obtain W (i, j, b ij + 1) = W (i, j, b ij ) + 1. W (i, j, k) = W (i, j, b ij ) + δ. But together this impies W (i, j, k) k = W (i, j, b ij ) b ij, which is a contradiction. Now et G be the DT-ICC-graph for B. Denote by α 1 (i, j) the maxima weight of a q (i, j) path in G. Note that the numbers α 1 (i, j) can be computed simiary to the numbers W (i, j, k). Ceary, α 1 (i, 1) = b i1, and the procedure for coumn j > 1 is described in Agorithm 2. Lemma 3. For a (i, j) we have α 1 (i, j) W (i, j, b ij ). Proof. We use induction on j. For j = 1 the caim is obvious: α 1 (i, 1) = W (i, 1, b i1 ) = b i1. Now et j > 1. After the initiaization of the numbers α 1 (i, j) in the first oop of Agorithm 2 we obtain for every i, α 1 (i, j) = α 1 (i, j 1) + (b ij b i,j 1 ) + W (i, j 1, b i,j 1) + (b ij b i,j 1) + W (i, j, b ij). We just have to check that this inequaities remain vaid in every updating step. Suppose the first vioation occurs when we repace α 1 (i, j) by α 1 (i ± 1, j) b i±1,j. In this case, α 1 (i, j) = α 1 (i ± 1, j) b i±1,j W (i ± 1, j, b i±1,j ) b i±1,j W (i, j, b ij ), where the ast inequaity is Lemma 2. So the statement of the emma remains vaid. By Lemma 3 (and Theorem 1), matrix B aows a decomposition with DT c(a) and this impies the foowing theorem. Theorem 2. The minima DT of a decomposition of a feasibe approximation of A equas c(a) and an approximation matrix B reaizing this DT can be constructed as described above in time O(m 2 n 2 ). Proof. The ony thing that is eft to prove is the compexity statement. For this it is sufficient to note that the computation of the numbers W (i, j, k) dominates the computation time, since this has compexity O(m 2 n 2 ) as can be seen immediatey from Agorithm 1. But after the numbers W (i, j, k) have been computed we ook at every entry (i, j) ony once and in order to fix b ij we have to do at most I ij comparisons. So the matrix B is determined in time O(mn ) and this concudes the proof. 8

9 Agorithm 1 Computation of the numbers W (i, j, k) for i [m] do W (i,, ) = for j = 1 to n do for i [m] do for a k do W (i, j, k) = min W (i, j 1, ) + (k ) + for i = 2 to m do for a k do W (i, j, k) = max { W (i, j, k), min W (i 1, j, ) } for i = i 1 downto 1 do for a k do W (i, j, k) = max { W (i, j, k), min W (i + 1, j, ) } Agorithm 2 Computation of the numbers α 1 (i, j) for fixed j for i [m] do α 1 (i, j) = α 1 (i, j 1) + (b ij b i,j 1 ) + for i = 2 to m do α 1 (i, j) = max {α 1 (i, j), α 1 (i 1, j) b i 1,j } for i = i 1 downto 1 do α 1 (i, j) = max { α 1 (i, j), α 1 (i } + 1, j) b i +1,j 9

10 5 Reducing the tota change The construction described in Section 4 eads to an approximation B with minima deivery time, but a arge tota change T C(B). The reason is, that we put b ij = max {k : W (i, j, k) + (b i,j+1 k) W (i, j + 1, b i,j+1 )}, even if none of the vertices (i, j, k) is critica, i.e. part of a q-s-path of maxima weight in the DT-ICC-graph of a feasibe approximation of A. Thus, the aim is to find an approximation with the same deivery time, but smaer tota change. Ceary, we can repace b ij by a vaue b ij with b ij < b ij a ij in the case b ij < a ij, respectivey with a ij b ij > b ij in the case a ij > b ij, if this decision does not increase the maxima weight of a q-s-path in the DT-ICC-graph. Let therefore G be the DT-ICC-graph of B and et α 1 (i, j) denote the maxima weight of a q-(i, j)-path in G. Simiary, et α 2 (i, j) denote the maxima weight of an (i, j)-s-path in G. The vaues α 2 (i, j) can be computed simiary as the numbers α 1 (i, j). Definition 6. Let B be a feasibe approximation of A. For (i, j) [m] [n], an integer b is caed (i, j) feasibe (with respect to B) if the foowing conditions are satisfied. 1. b I ij. 2. α 1 (i, j 1) + (b b i,j 1 ) + + (b i,j+1 b) + + α 2 (i, j + 1) c(a). 3. i = 1 or α 1 (i, j 1) + (b b i,j 1 ) + b + α 2 (i 1, j) c(a). 4. i = m or α 1 (i, j 1) + (b b i,j 1 ) + b + α 2 (i + 1, j) c(a). 5. i = 1 or α 1 (i 1, j) b i 1,j + (b i,j+1 b) + + α 2 (i, j + 1) c(a). 6. i = m or α 1 (i + 1, j) b i+1,j + (b i,j+1 b) + + α 2 (i, j + 1) c(a). 7. i {1, m} or α 1 (i 1, j) b i 1,j b + α 2 (i + 1, j) c(a). 8. i {1, m} or α 1 (i + 1, j) b i+1,j b + α 2 (i 1, j) c(a). In other words, b is (i, j) feasibe iff we can repace b ij by b without destroying the DT optimaity of B. Fig 4 iustrates the different possibiities for a path to pass through vertex (i, j). Each of these possibiities corresponds to one of the conditions 2 through 8 in Definition 6. We propose a heuristic, formay described in Agorithm 3, to reduce the tota change. Ceary, the appication of this agorithm can be iterated unti no more changes occur. Agorithm 3 Heuristic for tota change minimization for j = 1 to n do for i = 1 to m do if b ij < a ij and b ij + 1 is (i, j) feasibe then b ij + + if b ij > a ij and b ij 1 is (i, j) feasibe then b ij Update the numbers α 1 (k, ) and α 2 (k, ) 1

11 (i 1, j) (i, j 1) (i, j) (i, j 1) (i, j) (i, j + 1) (i, j 1) (i, j) (i + 1, j) (i 1, j) (i, j) (i, j + 1) (i 1, j) (i 1, j) (i, j) (i, j) (i, j) (i, j + 1) (i + 1, j) (i + 1, j) (i + 1, j) Figure 4: The seven different types of paths that are affected by the choice of b ij. 6 Test Resuts In this section we demonstrate the DT-reduction obtained by the methods from Section 4 and the tota change reduction using the heuristic approach from Section 5. We use matrices of size and 3 3 with random entries a ij {, 1,..., L} for L {8, 12, 16}. In our tests we choose the upper and ower bounds for the entries such that each entry is changed by at most 2, i.e. we put a ij = (a ij 2) +, a ij = a ij + 2. For each L, we construct decompositions of 1 matrices, and compute the average minima deivery time c(a) and the tota change according to our agorithm from Section 4. Finay, we anayse the tota change reduction, that can be achieved using Agorithm 3. The resuts are shown in Tabe 1 and 2. For comparison we incude the minima DT for exact decomposition with ICC [7]. Coumns DT 1 and DT 2 contain the average deivery times for the exact and for the approximated decomposition, respectivey. Coumns T C 1 and T C 2 contain the tota change vaues before and after the appication of Agorithm 3. Our agorithms are competey practicabe. On a 3GHz L DT 1 DT 2 T C 1 T C Tabe 1: Test resuts for m = n = 15. L DT 1 DT 2 T C 1 T C Tabe 2: Test resuts for m = n = 3. workstation, the computations for the ast row, i.e. for the decomposition of 1 matrices of size with entries from {, 1,..., 16} took ony 5 seconds for m = n = 15 and ess than a minute for m = n = 3. Basicay, we can draw two concusions from our resuts. 1. The approximation approach eads to an significant DT-reduction: for L = 16, aowing a change of at most 2 for each entry reduces the DT by more than 3%. 2. Our heuristic eads to a arge tota change reduction: for L = 16 the tota change can be reduced by amost 6%. 11

12 7 Summary and discussion We presented an efficient method to minimize exacty the decomposition time in approximated MLC shape matrix decomposition with intereaf coision constraint. We aso described a heuristic for reducing the tota approximation error, and demonstrated the proposed agorithms on randomy generated matrices. The obvious next probem, which is the subject of ongoing research, is to find an exact agorithm for the minimization of the tota change. References [1] D. Baatar, H.W. Hamacher, M. Ehrgott and G.J. Woeginger. Decomposition of integer matrices and mutieaf coimator sequencing. In: Discr. App. Math (25), pp doi: 1.116/j.dam [2] T.R. Bortfed, D.L. Kaher, T.J. Wadron and A.L. Boyer. X ray fied compensation with mutieaf coimators. In: Int. J. Radiat. Onco. Bio. Phys. 28 (1994), pp doi: 1.116/36-316(94)92-3. [3] K. Enge. A new agorithm for optima mutieaf coimator fied segmentation. In: Discr. App. Math (25), pp doi: 1.116/j.dam [4] K. Enge and A. Kiese. Approximated matrix decomposition for IMRT panning with mutieaf coimators. In: OR Spectrum 33.1 (211), pp doi: 1.17/s [5] K. Enge and E. Tabbert. Fast Simutaneous Ange, Wedge, and Beam Intensity Optimization in Inverse Radiotherapy Panning. In: Optimization and Engineering 6.4 (25), pp doi: 1.17/s [6] J.M. Gavin, X.G. Chen and R.M. Smith. Combining mutieaf fieds to moduate fuence distributions. In: Int. J. Radiat. Onco. Bio. Phys. 27 (1993), pp doi: 1.116/ (93)9399-G. [7] T. Kainowski. A duaity based agorithm for mutieaf coimator fied segmentation with intereaf coision constraint. In: Discr. App. Math (25), pp doi: /j.dam [8] T. Kainowski. Mutieaf coimator shape matrix decomposition. In: Optimization in Medicine and Bioogy. Ed. by G.J. Lim and E.K. Lee. Auerbach Pubishers Inc., 28, pp [9] T. Kainowski. Reaization of intensity moduated radiation fieds using mutieaf coimators. In: Information Transfer and Combinatorics. Ed. by R. Ahswede et a. Vo LNCS. Springer-Verag, 26, pp doi: 1.17/ _65. [1] S. Kamath, S. Sahni, J. Li, J. Pata and S. Ranka. Leaf sequencing agorithms for segmented mutieaf coimation. In: Phys. Med. Bio (23), pp doi: 1.188/ /48/3/33. [11] S. Kamath, S. Sartaj, J. Pata, S. Ranka and J. Li. Optima eaf sequencing with eimination of tongue and groove underdosage. In: Phys. Med. Bio. 49 (24), N7 N19. doi: / /49/3/N1. [12] G.J. Lim, M.C. Ferris, S.J. Wright, D.M. Shepard and M.A. Ear. An optimization framework for conforma radiation treatment panning. In: INFORMS Journa on Computing 19.3 (27), pp doi: /ijoc

13 [13] H.E. Romeijn, R.K. Ahuja, J.F. Dempsey and A. Kumar. A Coumn Generation Approach to Radiation Therapy Treatment Panning Using Aperture Moduation. In: SIAM J. on Optimization 15.3 (25), pp issn: doi: / [14] R.A.C. Siochi. Minimizing static intensity moduation deivery time using an intensity soid paradigm. In: Int. J. Radiat. Onco. Bio. Phys. 43 (1999), pp doi: 1.116/S (98)43-1. [15] P. Xia and L. Verhey. Mutieaf coimator eaf sequencing agorithm for intensity moduated beams with mutipe static segments. In: Med. Phys. 25 (1998), pp doi: /

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

Multileaf collimator shape matrix decomposition

Multileaf collimator shape matrix decomposition Multileaf collimator shape matrix decomposition Thomas Kalinowski March 7, 2007 1 Introduction An important method in cancer treatment is the use of high energetic radiation. In order to kill tumor cells

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Integrating Factor Methods as Exponential Integrators

Integrating Factor Methods as Exponential Integrators Integrating Factor Methods as Exponentia Integrators Borisav V. Minchev Department of Mathematica Science, NTNU, 7491 Trondheim, Norway Borko.Minchev@ii.uib.no Abstract. Recenty a ot of effort has been

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Stat 155 Game theory, Yuval Peres Fall Lectures 4,5,6

Stat 155 Game theory, Yuval Peres Fall Lectures 4,5,6 Stat 155 Game theory, Yuva Peres Fa 2004 Lectures 4,5,6 In the ast ecture, we defined N and P positions for a combinatoria game. We wi now show more formay that each starting position in a combinatoria

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

Robust Sensitivity Analysis for Linear Programming with Ellipsoidal Perturbation

Robust Sensitivity Analysis for Linear Programming with Ellipsoidal Perturbation Robust Sensitivity Anaysis for Linear Programming with Eipsoida Perturbation Ruotian Gao and Wenxun Xing Department of Mathematica Sciences Tsinghua University, Beijing, China, 100084 September 27, 2017

More information

K a,k minors in graphs of bounded tree-width *

K a,k minors in graphs of bounded tree-width * K a,k minors in graphs of bounded tree-width * Thomas Böhme Institut für Mathematik Technische Universität Imenau Imenau, Germany E-mai: tboehme@theoinf.tu-imenau.de and John Maharry Department of Mathematics

More information

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,

More information

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Pattern Frequency Sequences and Internal Zeros

Pattern Frequency Sequences and Internal Zeros Advances in Appied Mathematics 28, 395 420 (2002 doi:10.1006/aama.2001.0789, avaiabe onine at http://www.ideaibrary.com on Pattern Frequency Sequences and Interna Zeros Mikós Bóna Department of Mathematics,

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on

More information

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0 Bocconi University PhD in Economics - Microeconomics I Prof M Messner Probem Set 4 - Soution Probem : If an individua has an endowment instead of a monetary income his weath depends on price eves In particuar,

More information

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch The Eighth Internationa Symposium on Operations Research and Its Appications (ISORA 09) Zhangiaie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 402 408 Minimizing Tota Weighted Competion

More information

Investigation on spectrum of the adjacency matrix and Laplacian matrix of graph G l

Investigation on spectrum of the adjacency matrix and Laplacian matrix of graph G l Investigation on spectrum of the adjacency matrix and Lapacian matrix of graph G SHUHUA YIN Computer Science and Information Technoogy Coege Zhejiang Wani University Ningbo 3500 PEOPLE S REPUBLIC OF CHINA

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

CS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time

CS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time CS 33 Artificia Inteigence Propositiona Logic 2 Review of Last Time = means ogicay foows - i means can be derived from If your inference agorithm derives ony things that foow ogicay from the KB, the inference

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

New Efficiency Results for Makespan Cost Sharing

New Efficiency Results for Makespan Cost Sharing New Efficiency Resuts for Makespan Cost Sharing Yvonne Beischwitz a, Forian Schoppmann a, a University of Paderborn, Department of Computer Science Fürstenaee, 3302 Paderborn, Germany Abstract In the context

More information

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5].

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5]. PRODUCTS OF NEARLY HOLOMORPHIC EIGENFORMS JEFFREY BEYERL, KEVIN JAMES, CATHERINE TRENTACOSTE, AND HUI XUE Abstract. We prove that the product of two neary hoomorphic Hece eigenforms is again a Hece eigenform

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION J. Korean Math. Soc. 46 2009, No. 2, pp. 281 294 ORHOGONAL MLI-WAVELES FROM MARIX FACORIZAION Hongying Xiao Abstract. Accuracy of the scaing function is very crucia in waveet theory, or correspondingy,

More information

Primal and dual active-set methods for convex quadratic programming

Primal and dual active-set methods for convex quadratic programming Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018 On coorings of the Booean attice avoiding a rainbow copy of a poset arxiv:1812.09058v1 [math.co] 21 Dec 2018 Baázs Patkós Afréd Rényi Institute of Mathematics, Hungarian Academy of Scinces H-1053, Budapest,

More information

Generalized Bell polynomials and the combinatorics of Poisson central moments

Generalized Bell polynomials and the combinatorics of Poisson central moments Generaized Be poynomias and the combinatorics of Poisson centra moments Nicoas Privaut Division of Mathematica Sciences Schoo of Physica and Mathematica Sciences Nanyang Technoogica University SPMS-MAS-05-43,

More information

Semidefinite relaxation and Branch-and-Bound Algorithm for LPECs

Semidefinite relaxation and Branch-and-Bound Algorithm for LPECs Semidefinite reaxation and Branch-and-Bound Agorithm for LPECs Marcia H. C. Fampa Universidade Federa do Rio de Janeiro Instituto de Matemática e COPPE. Caixa Posta 68530 Rio de Janeiro RJ 21941-590 Brasi

More information

Minimum Enclosing Circle of a Set of Fixed Points and a Mobile Point

Minimum Enclosing Circle of a Set of Fixed Points and a Mobile Point Minimum Encosing Circe of a Set of Fixed Points and a Mobie Point Aritra Banik 1, Bhaswar B. Bhattacharya 2, and Sandip Das 1 1 Advanced Computing and Microeectronics Unit, Indian Statistica Institute,

More information

4 Separation of Variables

4 Separation of Variables 4 Separation of Variabes In this chapter we describe a cassica technique for constructing forma soutions to inear boundary vaue probems. The soution of three cassica (paraboic, hyperboic and eiptic) PDE

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

Combining reaction kinetics to the multi-phase Gibbs energy calculation

Combining reaction kinetics to the multi-phase Gibbs energy calculation 7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation

More information

CONSISTENT LABELING OF ROTATING MAPS

CONSISTENT LABELING OF ROTATING MAPS CONSISTENT LABELING OF ROTATING MAPS Andreas Gemsa, Martin Nöenburg, Ignaz Rutter Abstract. Dynamic maps that aow continuous map rotations, for exampe, on mobie devices, encounter new geometric abeing

More information

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by

More information

How many random edges make a dense hypergraph non-2-colorable?

How many random edges make a dense hypergraph non-2-colorable? How many random edges make a dense hypergraph non--coorabe? Benny Sudakov Jan Vondrák Abstract We study a mode of random uniform hypergraphs, where a random instance is obtained by adding random edges

More information

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes Maima and Minima 1. Introduction In this Section we anayse curves in the oca neighbourhood of a stationary point and, from this anaysis, deduce necessary conditions satisfied by oca maima and oca minima.

More information

An explicit Jordan Decomposition of Companion matrices

An explicit Jordan Decomposition of Companion matrices An expicit Jordan Decomposition of Companion matrices Fermín S V Bazán Departamento de Matemática CFM UFSC 88040-900 Forianópois SC E-mai: fermin@mtmufscbr S Gratton CERFACS 42 Av Gaspard Coriois 31057

More information

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG #A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG Guixin Deng Schoo of Mathematica Sciences, Guangxi Teachers Education University, Nanning, P.R.China dengguixin@ive.com Pingzhi Yuan

More information

Throughput Rate Optimization in High Multiplicity Sequencing Problems

Throughput Rate Optimization in High Multiplicity Sequencing Problems Throughput Rate Optimization in High Mutipicity Sequencing Probems Aexander Grigoriev A.Grigoriev@KE.unimaas.n Maastricht University, 6200 MD, Maastricht, The Netherands Joris van de Kundert J.vandeKundert@MATH.unimaas.n

More information

4 1-D Boundary Value Problems Heat Equation

4 1-D Boundary Value Problems Heat Equation 4 -D Boundary Vaue Probems Heat Equation The main purpose of this chapter is to study boundary vaue probems for the heat equation on a finite rod a x b. u t (x, t = ku xx (x, t, a < x < b, t > u(x, = ϕ(x

More information

Pairwise RNA Edit Distance

Pairwise RNA Edit Distance Pairwise RNA Edit Distance In the foowing: Sequences S 1 and S 2 associated structures P 1 and P 2 scoring of aignment: different edit operations arc atering arc removing 1) ACGUUGACUGACAACAC..(((...)))...

More information

Utilizing IMRT Intensity Map Complexity Measures in Segmentation Algorithms. Multileaf Collimator (MLC) IMRT: Beamlet Intensity Matrices

Utilizing IMRT Intensity Map Complexity Measures in Segmentation Algorithms. Multileaf Collimator (MLC) IMRT: Beamlet Intensity Matrices Radiation Teletherapy Goals Utilizing IMRT Intensity Map Complexity Measures in Segmentation Algorithms Kelly Sorensen August 20, 2005 Supported with NSF Grant DMI-0400294 High Level Goals: Achieve prescribed

More information

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees This paper appeared in: Networks 47:2 (2006), -5 Lower Bounds for the Reative Greed Agorithm for Approimating Steiner Trees Stefan Hougard Stefan Kirchner Humbodt-Universität zu Berin Institut für Informatik

More information

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix VOL. NO. DO SCHOOLS MATTER FOR HIGH MATH ACHIEVEMENT? 43 Do Schoos Matter for High Math Achievement? Evidence from the American Mathematics Competitions Genn Eison and Ashey Swanson Onine Appendix Appendix

More information

Two-sample inference for normal mean vectors based on monotone missing data

Two-sample inference for normal mean vectors based on monotone missing data Journa of Mutivariate Anaysis 97 (006 6 76 wwweseviercom/ocate/jmva Two-sampe inference for norma mean vectors based on monotone missing data Jianqi Yu a, K Krishnamoorthy a,, Maruthy K Pannaa b a Department

More information

Coupling of LWR and phase transition models at boundary

Coupling of LWR and phase transition models at boundary Couping of LW and phase transition modes at boundary Mauro Garaveo Dipartimento di Matematica e Appicazioni, Università di Miano Bicocca, via. Cozzi 53, 20125 Miano Itay. Benedetto Piccoi Department of

More information

Mat 1501 lecture notes, penultimate installment

Mat 1501 lecture notes, penultimate installment Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the

More information

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Absolute Value Preconditioning for Symmetric Indefinite Linear Systems

Absolute Value Preconditioning for Symmetric Indefinite Linear Systems MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Absoute Vaue Preconditioning for Symmetric Indefinite Linear Systems Vecharynski, E.; Knyazev, A.V. TR2013-016 March 2013 Abstract We introduce

More information

On the evaluation of saving-consumption plans

On the evaluation of saving-consumption plans On the evauation of saving-consumption pans Steven Vanduffe Jan Dhaene Marc Goovaerts Juy 13, 2004 Abstract Knowedge of the distribution function of the stochasticay compounded vaue of a series of future

More information

Tight Approximation Algorithms for Maximum Separable Assignment Problems

Tight Approximation Algorithms for Maximum Separable Assignment Problems MATHEMATICS OF OPERATIONS RESEARCH Vo. 36, No. 3, August 011, pp. 416 431 issn 0364-765X eissn 156-5471 11 3603 0416 10.187/moor.1110.0499 011 INFORMS Tight Approximation Agorithms for Maximum Separabe

More information

A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES

A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES 6 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES Sakae NAGAOKA* *Eectronic

More information

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC (January 8, 2003) A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC DAMIAN CLANCY, University of Liverpoo PHILIP K. POLLETT, University of Queensand Abstract

More information

VI.G Exact free energy of the Square Lattice Ising model

VI.G Exact free energy of the Square Lattice Ising model VI.G Exact free energy of the Square Lattice Ising mode As indicated in eq.(vi.35), the Ising partition function is reated to a sum S, over coections of paths on the attice. The aowed graphs for a square

More information

Secure Information Flow Based on Data Flow Analysis

Secure Information Flow Based on Data Flow Analysis SSN 746-7659, Engand, UK Journa of nformation and Computing Science Vo., No. 4, 007, pp. 5-60 Secure nformation Fow Based on Data Fow Anaysis Jianbo Yao Center of nformation and computer, Zunyi Norma Coege,

More information

THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES

THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES by Michae Neumann Department of Mathematics, University of Connecticut, Storrs, CT 06269 3009 and Ronad J. Stern Department of Mathematics, Concordia

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

BDD-Based Analysis of Gapped q-gram Filters

BDD-Based Analysis of Gapped q-gram Filters BDD-Based Anaysis of Gapped q-gram Fiters Marc Fontaine, Stefan Burkhardt 2 and Juha Kärkkäinen 2 Max-Panck-Institut für Informatik Stuhsatzenhausweg 85, 6623 Saarbrücken, Germany e-mai: stburk@mpi-sb.mpg.de

More information

14 Separation of Variables Method

14 Separation of Variables Method 14 Separation of Variabes Method Consider, for exampe, the Dirichet probem u t = Du xx < x u(x, ) = f(x) < x < u(, t) = = u(, t) t > Let u(x, t) = T (t)φ(x); now substitute into the equation: dt

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION

CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION SAHAR KARIMI AND STEPHEN VAVASIS Abstract. In this paper we present a variant of the conjugate gradient (CG) agorithm in which we invoke a subspace minimization

More information

Higher dimensional PDEs and multidimensional eigenvalue problems

Higher dimensional PDEs and multidimensional eigenvalue problems Higher dimensiona PEs and mutidimensiona eigenvaue probems 1 Probems with three independent variabes Consider the prototypica equations u t = u (iffusion) u tt = u (W ave) u zz = u (Lapace) where u = u

More information

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version)

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version) Approximate Bandwidth Aocation for Fixed-Priority-Schedued Periodic Resources WSU-CS Technica Report Version) Farhana Dewan Nathan Fisher Abstract Recent research in compositiona rea-time systems has focused

More information

1 Equivalent SDOF Approach. Sri Tudjono 1,*, and Patria Kusumaningrum 2

1 Equivalent SDOF Approach. Sri Tudjono 1,*, and Patria Kusumaningrum 2 MATEC Web of Conferences 159, 01005 (018) IJCAET & ISAMPE 017 https://doi.org/10.1051/matecconf/01815901005 Dynamic Response of RC Cantiever Beam by Equivaent Singe Degree of Freedom Method on Eastic Anaysis

More information

Available online at ScienceDirect. IFAC PapersOnLine 50-1 (2017)

Available online at   ScienceDirect. IFAC PapersOnLine 50-1 (2017) Avaiabe onine at www.sciencedirect.com ScienceDirect IFAC PapersOnLine 50-1 (2017 3412 3417 Stabiization of discrete-time switched inear systems: Lyapunov-Metzer inequaities versus S-procedure characterizations

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

Stochastic Variational Inference with Gradient Linearization

Stochastic Variational Inference with Gradient Linearization Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,

More information

Pricing Multiple Products with the Multinomial Logit and Nested Logit Models: Concavity and Implications

Pricing Multiple Products with the Multinomial Logit and Nested Logit Models: Concavity and Implications Pricing Mutipe Products with the Mutinomia Logit and Nested Logit Modes: Concavity and Impications Hongmin Li Woonghee Tim Huh WP Carey Schoo of Business Arizona State University Tempe Arizona 85287 USA

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

BALANCING REGULAR MATRIX PENCILS

BALANCING REGULAR MATRIX PENCILS BALANCING REGULAR MATRIX PENCILS DAMIEN LEMONNIER AND PAUL VAN DOOREN Abstract. In this paper we present a new diagona baancing technique for reguar matrix pencis λb A, which aims at reducing the sensitivity

More information

Online Load Balancing on Related Machines

Online Load Balancing on Related Machines Onine Load Baancing on Reated Machines ABSTRACT Sungjin Im University of Caifornia at Merced Merced, CA, USA sim3@ucmerced.edu Debmaya Panigrahi Duke University Durham, NC, USA debmaya@cs.duke.edu We give

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

arxiv:math/ v2 [math.pr] 6 Mar 2005

arxiv:math/ v2 [math.pr] 6 Mar 2005 ASYMPTOTIC BEHAVIOR OF RANDOM HEAPS arxiv:math/0407286v2 [math.pr] 6 Mar 2005 J. BEN HOUGH Abstract. We consider a random wa W n on the ocay free group or equivaenty a signed random heap) with m generators

More information

The EM Algorithm applied to determining new limit points of Mahler measures

The EM Algorithm applied to determining new limit points of Mahler measures Contro and Cybernetics vo. 39 (2010) No. 4 The EM Agorithm appied to determining new imit points of Maher measures by Souad E Otmani, Georges Rhin and Jean-Marc Sac-Épée Université Pau Veraine-Metz, LMAM,

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

Math 124B January 31, 2012

Math 124B January 31, 2012 Math 124B January 31, 212 Viktor Grigoryan 7 Inhomogeneous boundary vaue probems Having studied the theory of Fourier series, with which we successfuy soved boundary vaue probems for the homogeneous heat

More information

Wavelet shrinkage estimators of Hilbert transform

Wavelet shrinkage estimators of Hilbert transform Journa of Approximation Theory 163 (2011) 652 662 www.esevier.com/ocate/jat Fu ength artice Waveet shrinkage estimators of Hibert transform Di-Rong Chen, Yao Zhao Department of Mathematics, LMIB, Beijing

More information

Discrete Techniques. Chapter Introduction

Discrete Techniques. Chapter Introduction Chapter 3 Discrete Techniques 3. Introduction In the previous two chapters we introduced Fourier transforms of continuous functions of the periodic and non-periodic (finite energy) type, we as various

More information

Theory of Generalized k-difference Operator and Its Application in Number Theory

Theory of Generalized k-difference Operator and Its Application in Number Theory Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

THINKING IN PYRAMIDS

THINKING IN PYRAMIDS ECS 178 Course Notes THINKING IN PYRAMIDS Kenneth I. Joy Institute for Data Anaysis and Visuaization Department of Computer Science University of Caifornia, Davis Overview It is frequenty usefu to think

More information

c 2007 Society for Industrial and Applied Mathematics

c 2007 Society for Industrial and Applied Mathematics SIAM REVIEW Vo. 49,No. 1,pp. 111 1 c 7 Society for Industria and Appied Mathematics Domino Waves C. J. Efthimiou M. D. Johnson Abstract. Motivated by a proposa of Daykin [Probem 71-19*, SIAM Rev., 13 (1971),

More information

Smoothness equivalence properties of univariate subdivision schemes and their projection analogues

Smoothness equivalence properties of univariate subdivision schemes and their projection analogues Numerische Mathematik manuscript No. (wi be inserted by the editor) Smoothness equivaence properties of univariate subdivision schemes and their projection anaogues Phiipp Grohs TU Graz Institute of Geometry

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information