Decompositions of Matrices with Relational Data: Foundations and Algorithms
|
|
- Augustus Dixon
- 6 years ago
- Views:
Transcription
1 Decompositions of Matrices with Relational Data: Foundations and Algorithms Martin Trnečka DEPARTMENT OF COMPUTER SCIENCE PALACKÝ UNIVERSITY OLOMOUC PhD dissertation defense Feb 7, 2017
2 Outline My research Boolean matrix factorization (BMF) Geometry of BMF Basic viewpoints Formal concept analysis and BMF Role of entries containing 1 Essential elements GreEss algorithm Experimental results
3 My research Boolean matrix factorization (BMF) Algorithms (19 previous, 6 new) Experimental evaluation Applications Basic level of concepts Identify important knowledge in data Citations (since 2013): Web of science: 4 (h-index: 2) Scopus: 24 (h-index: 3) Google scholar: 66 (h-index: 5)
4 Boolean matrix factorization (BMF) Method for analysis of Boolean data A general aim: for a given matrix I {0, 1} n m find matrices A {0, 1} n k and B {0, 1} k m for which I (approximately) equals A B is the Boolean matrix product (A B) ij = k max l=1 min(a il, B lj ) = Discovery of k factors that exactly or approximately explain the data Factors = interesting patterns (rectangles) in data
5 Geometry of BMF Geometry of factorization coverage of the entries containing 1s by rectangles = = Belohlavek, R., Vychodil, V., Discovery of optimal factors in binary data via a novel method of matrix decomposition, J. of Comp. and Sys. Science 76(1)(2010), Belohlavek, R., Trnecka, M.: From-Below Approximations in Boolean Matrix Factorization: Geometry and New Algorithm, J. of Comp and Sys. Sciences 81(8)(2015),
6 Explanation of data by factors How large portion of data is explain by factors? Distance (error function) Two components of E E u and E o non-symmetric E(C, D) = C D = m,n i,j=1 C ij D ij. E(I, A B) = E u (I, A B) + E o (I, A B), where Addings factors: E u decrease, E o increase Zero E o from-bellow factorization E u (I, A B) = { i, j ; I ij = 1, (A B) ij = 0}, E o (I, A B) = { i, j ; I ij = 0, (A B) ij = 1}
7 Two basic viewpoints to BMF Discrete Basis Problem Given I {0, 1} n m and a positive integer k, find A {0, 1} n k and B {0, 1} k m that minimize I A B Emphasizes the importance of the first few (presumably most important) factors Miettinen, P., Mielikainen, T., Gionis, A., Das, G., Mannila, H., The discrete basis problem, IEEE Transactional Knowledge and Data Engineering 20(10)(2008), Approximate Factorization Problem Given I and prescribed error ε 0, find A {0, 1} n k and B {0, 1} k m with k as small as possible such that I A B ε Emphasizes the need to account for (and thus to explain) a prescribed (presumably reasonably large) portion of data Belohlavek, R., Trnecka, M.: From-Below Approximations in Boolean Matrix Factorization: Geometry and New Algorithm, J. of Comp and Sys. Sciences 81(8)(2015),
8 Optimal decomposition via formal concepts Formal context X, Y, I representation of I Formal concept A, B, A X, B Y, A = B and B = A A = {y Y x A x, y I}, B = {x X y B x, y I} Set of all formal concepts B(I) form a concept lattice (complete lattice) Formal concepts of I optimal factors of I Belohlavek, R., Vychodil, V., Discovery of optimal factors in binary data via a novel method of matrix decomposition, J. of Comp. and Sys. Science 76(1)(2010), Decomposition via formal concepts: For given a set F = { C 1, D 1, C 2, D 2,..., C k, D k } B(I)} of formal concepts, define n k and k m matrices A F and B F : (A F ) il = (C l )(i) and (B F ) lj = (D l )(j)
9 Role of entries containing 1 Reformulation in terms of labeled diagram of B(I): Some 1s are more important than others Find smallest subset F of nodes in the diagram such that whenever there exists a path from a node γ(i) up to µ(j), then some such path goes through some c F γ(i) = i, i and µ(j) = j, j According to the Basic Theorem of FCA γ(i) µ(j) iff I ij = 1 Concepts C, D that cover i, j are just those in the interval I ij = [γ(i), µ(j)]
10 Example 1,2,3,4,5, a b c d e a d b 1,2,5,6 1,2,4,5 1,3,5,6 a,e a,d b,c 1,2,5 a,b 2,6 1,5,6 3,5 a,d,e a,b,e a,b,d 2 6 1,5 a,b,c,d 5 a,b,c,d,e
11 Role of entries containing 1 For C X and D Y I C,D = [γ(c), µ(d)] = { E, F B(I) γ(c) µ(d)} where γ(c) = C, C and µ(d) = D, D Lemma (a) I C,D is non-empty iff C D I, i.e. if I ij = 1 for every i C and j D. In particular, I ij is non-empty iff I ij = 1. (b) I C,D ={ E, F B(I) C E, D F }={ E, F B(I) C E, D F }. In particular, I ij is the set of all concepts that cover i, j. (c) If (A F B F ) ij = 1 then F contains at least one concept in I ij.
12 Essential elements For I {0, 1} n m denote by E(I) the n m Boolean matrix given by where denotes set inclusion (E(I)) ij = 1 iff I ij is non-empty and minimal w.r.t., I ij I i j iff γ(i ) γ(i) and µ(j) µ(j ) iff {i} {i } and {j} {j } E is easy to compute
13 GreEss algorithm: theory Factorizations of I may be obtained from factorizations of E(I) Theorem Let G B(E(I)) be a set of factor concepts of E(I), i.e. E(I) = A G B G. Then every set F B(I) containing for each C, D G at least one concept from I C,D is a set of factor concepts of I, i.e. I = A F B F. May be generalized to arbitrary factorizations of E(I) The estimation is not tight Theorem For every Boolean matrix I we have rank B (I) rank B (E(I)).
14 GreEss algorithm: basic idea GreEss algorithm 1 Compute intervals in B(I) 2 Search these intervals in a greedy manner for factor concepts of I More precisely: Compute E(I) Start computing set G of factors of E(I) (via GreConD algorithm) Stop (computing G) when the conservative estimations of the counterparts C, D G cover I, i.e. stop when I = C I I D I I C,D G Select one concept per interval I C,D for C, D G in B(I) in a greedy manner
15 GreEss vs. previous algorithms Previous (selected) algorithms: 8M Tiling Asso GreConD PaNDa Hyper Experimental evaluation: Quality of decomposition on synthetic data (12) Quality of decomposition on real data (16) Capability to find the original factors Interpretation of obtained factors Coverage quality for A {0, 1} n l and B {0, 1} l m c(l) = 1 E(I, A B)/ I
16 Synthetic data coverage M 0.3 Tiling Asso 0.2 GreConD PaNDa 0.1 Hyper GreEss k (number of factors) coverage M 0.3 Tiling Asso 0.2 GreConD PaNDa 0.1 Hyper GreEss k (number of factors) (a) Set C3 Figure: Coverage quality of the first k factors (b) Set C4
17 Real data (Mushroom) dataset coverage number of factors needed (100c%) for the prescribed coverage 8M Tiling Asso GreConD PaNDa Hyper GreEss Mushroom 25% % NA % NA % NA 46 NA % NA 62 NA 62 NA % NA 120 NA 120 NA Table: Quality of decompositions (Mushroom)
18 Other experiments Ground truth 8M Tiling Asso GreConD PaNDa Hyper GreEss dataset C C C C Table: Similarity of original and computed factorization Interptertation poor results 8M, Asso, PaNDa
19 Conclusion Geometry of factorization coverage New theoretical results essential elements New algorithm GreEss Experimental evaluation GreEss outperform selected algorithms
20 Decompositions of Matrices with Relational Data: Foundations and Algorithms Martin Trnečka DEPARTMENT OF COMPUTER SCIENCE PALACKÝ UNIVERSITY OLOMOUC PhD dissertation defense Feb 7, 2017
21 H. Řezanková Example, Lemma, Observation, Remark, Theorem jedinečné číslování Značení matic chápeme je jako relace Jednoznačné značení vs. původní značení každý algoritmus má jinou logiku a terminologii Tiling algoritmus 2004 Tabulka 6.1 dataset k dens A dens B dens I avg E(I) / I Set A ± Set A ± Set A ± Set A ± Za symbolem ± výběrová směrodatná odchylka (strana 68) Cíl práce
22 J. Rauch Outrata, J., Trnecka, M.: Evaluating Association Rules in Boolean Matrix Factorization, Workshop on Computational Intelligence and Data Mining, WCIDM 2016, In Proc. of the 16th ITAT conference, CEUR Workshop Proceedings Vol. 1649, pp Asso algoritmus confidence (parametr τ) Inspirace metodou GUHA Asociační pravidlo (na množině atributů matice I) i j Čtyřpolní tabulka I j j i a = fr(i j) b = fr(i j) i c = fr( i j) d = fr( i j). Zobecněné kvantifikátory (fundovaná implikace, dvojitá fundovaná implikace a další) Algoritmus GreConD atributové implikace
23 coverage founded implication 0.2 double founded implication founded equivalence 0.1 negative Jaccard distance E equivalence number of factors overcoverage founded implication 0.4 double founded implication founded equivalence 0.2 negative Jaccard distance E equivalence number of factors Figure: Chyba pokrytí pro C 1 Figure: Chyba překrytí pro C 1
24 Decompositions of Matrices with Relational Data: Foundations and Algorithms Martin Trnečka DEPARTMENT OF COMPUTER SCIENCE PALACKÝ UNIVERSITY OLOMOUC PhD dissertation defense Feb 7, 2017
Handling Noise in Boolean Matrix Factorization
Handling Noise in Boolean Matrix Factorization Radim Belohlavek, Martin Trnecka DEPARTMENT OF COMPUTER SCIENCE PALACKÝ UNIVERSITY OLOMOUC 26th International Joint Conference on Artificial Intelligence
More informationBeyond Boolean Matrix Decompositions: Toward Factor Analysis and Dimensionality Reduction of Ordinal Data
Beyond Boolean Matrix Decompositions: Toward Factor Analysis and Dimensionality Reduction of Ordinal Data Radim Belohlavek Palacky University, Olomouc, Czech Republic Email: radim.belohlavek@acm.org Marketa
More informationData Mining and Matrices
Data Mining and Matrices 08 Boolean Matrix Factorization Rainer Gemulla, Pauli Miettinen June 13, 2013 Outline 1 Warm-Up 2 What is BMF 3 BMF vs. other three-letter abbreviations 4 Binary matrices, tiles,
More informationMatrix Factorizations over Non-Conventional Algebras for Data Mining. Pauli Miettinen 28 April 2015
Matrix Factorizations over Non-Conventional Algebras for Data Mining Pauli Miettinen 28 April 2015 Chapter 1. A Bit of Background Data long-haired well-known male Data long-haired well-known male ( ) 1
More informationOptimal factorization of three-way binary data using triadic concepts
Noname manuscript No. (will be inserted by the editor) Optimal factorization of three-way binary data using triadic concepts Radim Belohlavek Cynthia Glodeanu Vilem Vychodil Received: date / Accepted:
More informationJournal of Computer and System Sciences
Journal of Computer and System Sciences 76 (2010) 3 20 Contents lists available at ScienceDirect Journal of Computer and System Sciences www.elsevier.com/locate/jcss Discovery of optimal factors in binary
More informationImplications from data with fuzzy attributes vs. scaled binary attributes
Implications from data with fuzzy attributes vs. scaled binary attributes Radim Bělohlávek, Vilém Vychodil Dept. Computer Science, Palacký University, Tomkova 40, CZ-779 00, Olomouc, Czech Republic Email:
More informationGeorge J. Klir Radim Belohlavek, Martin Trnecka. State University of New York (SUNY) Binghamton, New York 13902, USA
POSSIBILISTIC INFORMATION: A Tutorial Basic Level in Formal Concept Analysis: Interesting Concepts and Psychological Ramifications George J. Klir Radim Belohlavek, Martin Trnecka State University of New
More informationGeorge J. Klir Radim Belohlavek, Martin Trnecka. State University of New York (SUNY) Binghamton, New York 13902, USA
POSSIBILISTIC INFORMATION: A Tutorial Basic Level in Formal Concept Analysis: Interesting Concepts and Psychological Ramifications George J. Klir Radim Belohlavek, Martin Trnecka State University of New
More informationOn Boolean factor analysis with formal concepts as factors
FR-C3-1 SCIS&ISIS2006 @ Tokyo, Japan (September 20-24, 2006 On Boolean factor analysis with formal concepts as factors Radim Bělohlávek and Vilém Vychodil Dept Computer Science, Palacký University, Tomkova
More informationA Post-Nonlinear Mixture Model Approach to Binary Matrix Factorization
A Post-Nonlinear Mixture Model Approach to Binary Matrix Factorization Mamadou Diop CEA Tech Grand-Est Metz Technopole and Université de Lorraine, CRAN, UMR 739 Email: mamadou.diopuniv-lorraine.fr mamadou.diopcea.fr
More informationBOOLEAN TENSOR FACTORIZATIONS. Pauli Miettinen 14 December 2011
BOOLEAN TENSOR FACTORIZATIONS Pauli Miettinen 14 December 2011 BACKGROUND: TENSORS AND TENSOR FACTORIZATIONS X BACKGROUND: TENSORS AND TENSOR FACTORIZATIONS C X A B BACKGROUND: BOOLEAN MATRIX FACTORIZATIONS
More informationThe matrix approach for abstract argumentation frameworks
The matrix approach for abstract argumentation frameworks Claudette CAYROL, Yuming XU IRIT Report RR- -2015-01- -FR February 2015 Abstract The matrices and the operation of dual interchange are introduced
More informationLecture 6: Manipulation of Algebraic Functions, Boolean Algebra, Karnaugh Maps
EE210: Switching Systems Lecture 6: Manipulation of Algebraic Functions, Boolean Algebra, Karnaugh Maps Prof. YingLi Tian Feb. 21/26, 2019 Department of Electrical Engineering The City College of New York
More informationFuzzy attribute logic over complete residuated lattices
Journal of Experimental & Theoretical Artificial Intelligence Vol. 00, No. 00, Month-Month 200x, 1 8 Fuzzy attribute logic over complete residuated lattices RADIM BĚLOHLÁVEK, VILÉM VYCHODIL Department
More informationBOOLEAN MATRIX AND TENSOR DECOMPOSITIONS. Pauli Miettinen TML September 2013
BOOLEAN MATRIX AND TENSOR DECOMPOSITIONS Pauli Miettinen TML 2013 27 September 2013 BOOLEAN MATRIX AND TENSOR DECOMPOSITIONS Boolean decompositions are like normal decompositions, except that Input is
More informationInteresting Patterns. Jilles Vreeken. 15 May 2015
Interesting Patterns Jilles Vreeken 15 May 2015 Questions of the Day What is interestingness? what is a pattern? and how can we mine interesting patterns? What is a pattern? Data Pattern y = x - 1 What
More informationImplications from data with fuzzy attributes
Implications from data with fuzzy attributes Radim Bělohlávek, Martina Chlupová, and Vilém Vychodil Dept. Computer Science, Palacký University, Tomkova 40, CZ-779 00, Olomouc, Czech Republic Email: {radim.belohlavek,
More informationOn Proofs and Rule of Multiplication in Fuzzy Attribute Logic
On Proofs and Rule of Multiplication in Fuzzy Attribute Logic Radim Belohlavek 1,2 and Vilem Vychodil 2 1 Dept. Systems Science and Industrial Engineering, Binghamton University SUNY Binghamton, NY 13902,
More informationOn factorization by similarity of fuzzy concept lattices with hedges
On factorization by similarity of fuzzy concept lattices with hedges Radim Bělohlávek, Jan Outrata and Vilém Vychodil Department of Computer Science, Palacky University, Olomouc Tomkova 40, CZ-779 00 Olomouc,
More informationLecture 4: Four Input K-Maps
Lecture 4: Four Input K-Maps CSE 4: Components and Design Techniques for Digital Systems Fall 24 CK Cheng Dept. of Computer Science and Engineering University of California, San Diego Outlines Boolean
More informationIntroduction to Kleene Algebras
Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)
More informationTriadic Factor Analysis
Triadic Factor Analysis Cynthia Vera Glodeanu Technische Universität Dresden, 01062 Dresden, Germany Cynthia_Vera.Glodeanu@mailbox.tu-dresden.de Abstract. This article is an extension of work which suggests
More informationFactor Analysis of Incidence Data via Novel Decomposition of Matrices
Factor Analysis of Incidence Data via Novel Decomposition of Matrices Radim Belohlavek 1,2 and Vilem Vychodil 1,2 1 State University of New York at Binghamton PO Box 6000, Binghamton, NY 13902 6000, USA
More informationSup-t-norm and inf-residuum are a single type of relational equations
International Journal of General Systems Vol. 00, No. 00, February 2011, 1 12 Sup-t-norm and inf-residuum are a single type of relational equations Eduard Bartl a, Radim Belohlavek b Department of Computer
More informationMTH 309 Supplemental Lecture Notes Based on Robert Messer, Linear Algebra Gateway to Mathematics
MTH 309 Supplemental Lecture Notes Based on Robert Messer, Linear Algebra Gateway to Mathematics Ulrich Meierfrankenfeld Department of Mathematics Michigan State University East Lansing MI 48824 meier@math.msu.edu
More informationEfficient Approximation for Restricted Biclique Cover Problems
algorithms Article Efficient Approximation for Restricted Biclique Cover Problems Alessandro Epasto 1, *, and Eli Upfal 2 ID 1 Google Research, New York, NY 10011, USA 2 Department of Computer Science,
More informationA Weak Bisimulation for Weighted Automata
Weak Bisimulation for Weighted utomata Peter Kemper College of William and Mary Weighted utomata and Semirings here focus on commutative & idempotent semirings Weak Bisimulation Composition operators Congruence
More informationCS 484 Data Mining. Association Rule Mining 2
CS 484 Data Mining Association Rule Mining 2 Review: Reducing Number of Candidates Apriori principle: If an itemset is frequent, then all of its subsets must also be frequent Apriori principle holds due
More informationEncyclopedia of Machine Learning Chapter Number Book CopyRight - Year 2010 Frequent Pattern. Given Name Hannu Family Name Toivonen
Book Title Encyclopedia of Machine Learning Chapter Number 00403 Book CopyRight - Year 2010 Title Frequent Pattern Author Particle Given Name Hannu Family Name Toivonen Suffix Email hannu.toivonen@cs.helsinki.fi
More informationHome Page. Title Page. Page 1 of 35. Go Back. Full Screen. Close. Quit
JJ II J I Page 1 of 35 General Attribute Reduction of Formal Contexts Tong-Jun Li Zhejiang Ocean University, China litj@zjou.edu.cn September, 2011,University of Milano-Bicocca Page 2 of 35 Objective of
More informationOn the Mining of Numerical Data with Formal Concept Analysis
On the Mining of Numerical Data with Formal Concept Analysis Thèse de doctorat en informatique Mehdi Kaytoue 22 April 2011 Amedeo Napoli Sébastien Duplessis Somewhere... in a temperate forest... N 2 /
More informationOn the Exponent of the All Pairs Shortest Path Problem
On the Exponent of the All Pairs Shortest Path Problem Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Zvi Galil Department of Computer Science Sackler Faculty
More informationCHAPTER 1. Relations. 1. Relations and Their Properties. Discussion
CHAPTER 1 Relations 1. Relations and Their Properties 1.1. Definition of a Relation. Definition 1.1.1. A binary relation from a set A to a set B is a subset R A B. If (a, b) R we say a is Related to b
More informationarxiv: v1 [cs.ir] 16 Oct 2013
An FCA-based Boolean Matrix Factorisation for Collaborative Filtering Elena Nenova 2,1, Dmitry I. Ignatov 1, and Andrey V. Konstantinov 1 1 National Research University Higher School of Economics, Moscow
More informationHegselmann-Krause Dynamics: An Upper Bound on Termination Time
Hegselmann-Krause Dynamics: An Upper Bound on Termination Time B. Touri Coordinated Science Laboratory University of Illinois Urbana, IL 680 touri@illinois.edu A. Nedić Industrial and Enterprise Systems
More informationFormal Concept Analysis as a Framework for Business Intelligence Technologies II
Formal Concept Analysis as a Framework for Business Intelligence Technologies II Juraj Macko Division of Applied computer science Dept. Computer Science Palacky University, Olomouc 17. listopadu 12, CZ-77146
More informationExpressiveness, decidability, and undecidability of Interval Temporal Logic
University of Udine Department of Mathematics and Computer Science Expressiveness, decidability, and undecidability of Interval Temporal Logic ITL - Beyond the end of the light Ph.D. Defence Dario Della
More informationCS 584 Data Mining. Association Rule Mining 2
CS 584 Data Mining Association Rule Mining 2 Recall from last time: Frequent Itemset Generation Strategies Reduce the number of candidates (M) Complete search: M=2 d Use pruning techniques to reduce M
More informationCSE 140: Components and Design Techniques for Digital Systems
Lecture 4: Four Input K-Maps CSE 4: Components and Design Techniques for Digital Systems CK Cheng Dept. of Computer Science and Engineering University of California, San Diego Outlines Boolean Algebra
More informationComp487/587 - Boolean Formulas
Comp487/587 - Boolean Formulas 1 Logic and SAT 1.1 What is a Boolean Formula Logic is a way through which we can analyze and reason about simple or complicated events. In particular, we are interested
More informationCHAPTER 10. Gentzen Style Proof Systems for Classical Logic
CHAPTER 10 Gentzen Style Proof Systems for Classical Logic Hilbert style systems are easy to define and admit a simple proof of the Completeness Theorem but they are difficult to use. By humans, not mentioning
More informationModified Group Generalized Binary Search with Near-Optimal Performance Guarantees
Modified Group Generalized Binary Search with Near-Optimal Performance Guarantees Gowtham Bellala, Clayton Scott Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor,
More informationCOMP 5331: Knowledge Discovery and Data Mining
COMP 5331: Knowledge Discovery and Data Mining Acknowledgement: Slides modified by Dr. Lei Chen based on the slides provided by Jiawei Han, Micheline Kamber, and Jian Pei And slides provide by Raymond
More informationBivalent and other solutions of fuzzy relational equations via linguistic hedges
Fuzzy Sets and Systems 187 (2012) 103 112 wwwelseviercom/locate/fss Bivalent and other solutions of fuzzy relational equations via linguistic hedges Eduard Bartl, Radim Belohlavek, Vilem Vychodil Department
More informationLooking for analogical proportions in a formal concept analysis setting
Looking for analogical proportions in a formal concept analysis setting Laurent Miclet 1, Henri Prade 2, and David Guennec 1 1 IRISA-ENSSAT, Lannion, France, miclet@enssat.fr, david.guennec@gmail.com,
More informationUnsupervised Image Segmentation Using Comparative Reasoning and Random Walks
Unsupervised Image Segmentation Using Comparative Reasoning and Random Walks Anuva Kulkarni Carnegie Mellon University Filipe Condessa Carnegie Mellon, IST-University of Lisbon Jelena Kovacevic Carnegie
More informationA Note on Tiling under Tomographic Constraints
A Note on Tiling under Tomographic Constraints arxiv:cs/8v3 [cs.cc] 9 Apr Marek Chrobak Peter Couperus Christoph Dürr Gerhard Woeginger February, 8 Abstract Given a tiling of a D grid with several types
More information1182 L. B. Beasley, S. Z. Song, ands. G. Lee matrix all of whose entries are 1 and =fe ij j1 i m 1 j ng denote the set of cells. The zero-term rank [5
J. Korean Math. Soc. 36 (1999), No. 6, pp. 1181{1190 LINEAR OPERATORS THAT PRESERVE ZERO-TERM RANK OF BOOLEAN MATRICES LeRoy. B. Beasley, Seok-Zun Song, and Sang-Gu Lee Abstract. Zero-term rank of a matrix
More informationBL-Functions and Free BL-Algebra
BL-Functions and Free BL-Algebra Simone Bova bova@unisi.it www.mat.unisi.it/ bova Department of Mathematics and Computer Science University of Siena (Italy) December 9, 008 Ph.D. Thesis Defense Outline
More informationOn Regularity of Incline Matrices
International Journal of Algebra, Vol. 5, 2011, no. 19, 909-924 On Regularity of Incline Matrices A. R. Meenakshi and P. Shakila Banu Department of Mathematics Karpagam University Coimbatore-641 021, India
More informationEstimates for probabilities of independent events and infinite series
Estimates for probabilities of independent events and infinite series Jürgen Grahl and Shahar evo September 9, 06 arxiv:609.0894v [math.pr] 8 Sep 06 Abstract This paper deals with finite or infinite sequences
More informationData Mining Concepts & Techniques
Data Mining Concepts & Techniques Lecture No. 04 Association Analysis Naeem Ahmed Email: naeemmahoto@gmail.com Department of Software Engineering Mehran Univeristy of Engineering and Technology Jamshoro
More information3 Propositional Logic
3 Propositional Logic 3.1 Syntax 3.2 Semantics 3.3 Equivalence and Normal Forms 3.4 Proof Procedures 3.5 Properties Propositional Logic (25th October 2007) 1 3.1 Syntax Definition 3.0 An alphabet Σ consists
More informationChapter 9: Relations Relations
Chapter 9: Relations 9.1 - Relations Definition 1 (Relation). Let A and B be sets. A binary relation from A to B is a subset R A B, i.e., R is a set of ordered pairs where the first element from each pair
More informationWith Question/Answer Animations. Chapter 2
With Question/Answer Animations Chapter 2 Chapter Summary Sets The Language of Sets Set Operations Set Identities Functions Types of Functions Operations on Functions Sequences and Summations Types of
More informationUpper Bounds on the Time and Space Complexity of Optimizing Additively Separable Functions
Upper Bounds on the Time and Space Complexity of Optimizing Additively Separable Functions Matthew J. Streeter Computer Science Department and Center for the Neural Basis of Cognition Carnegie Mellon University
More informationDATA MINING - 1DL360
DATA MINING - 1DL36 Fall 212" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht12 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology, Uppsala
More informationAppendix B for The Evolution of Strategic Sophistication (Intended for Online Publication)
Appendix B for The Evolution of Strategic Sophistication (Intended for Online Publication) Nikolaus Robalino and Arthur Robson Appendix B: Proof of Theorem 2 This appendix contains the proof of Theorem
More informationPositive Borders or Negative Borders: How to Make Lossless Generator Based Representations Concise
Positive Borders or Negative Borders: How to Make Lossless Generator Based Representations Concise Guimei Liu 1,2 Jinyan Li 1 Limsoon Wong 2 Wynne Hsu 2 1 Institute for Infocomm Research, Singapore 2 School
More informationPropositional Logic: Models and Proofs
Propositional Logic: Models and Proofs C. R. Ramakrishnan CSE 505 1 Syntax 2 Model Theory 3 Proof Theory and Resolution Compiled at 11:51 on 2016/11/02 Computing with Logic Propositional Logic CSE 505
More informationBasic Data Structures and Algorithms for Data Profiling Felix Naumann
Basic Data Structures and Algorithms for 8.5.2017 Overview 1. The lattice 2. Apriori lattice traversal 3. Position List Indices 4. Bloom filters Slides with Thorsten Papenbrock 2 Definitions Lattice Partially
More informationData Mining and Analysis: Fundamental Concepts and Algorithms
Data Mining and Analysis: Fundamental Concepts and Algorithms dataminingbook.info Mohammed J. Zaki 1 Wagner Meira Jr. 2 1 Department of Computer Science Rensselaer Polytechnic Institute, Troy, NY, USA
More informationDefinition: A binary relation R from a set A to a set B is a subset R A B. Example:
Chapter 9 1 Binary Relations Definition: A binary relation R from a set A to a set B is a subset R A B. Example: Let A = {0,1,2} and B = {a,b} {(0, a), (0, b), (1,a), (2, b)} is a relation from A to B.
More informationHow to Distinguish True Dependence from Varying Independence?
University of Texas at El Paso DigitalCommons@UTEP Departmental Technical Reports (CS) Department of Computer Science 8-1-2013 How to Distinguish True Dependence from Varying Independence? Marketa Krmelova
More information7 The structure of graphs excluding a topological minor
7 The structure of graphs excluding a topological minor Grohe and Marx [39] proved the following structure theorem for graphs excluding a topological minor: Theorem 7.1 ([39]). For every positive integer
More informationGirth Analysis of Polynomial-Based Time-Invariant LDPC Convolutional Codes
IWSSIP 212, 11-13 April 212, Vienna, Austria ISBN 978-3-2-2328-4 Girth Analysis of Polynomial-Based Time-Invariant LDPC Convolutional Codes Hua Zhou and Norbert Goertz Institute of Telecommunications Vienna
More informationDepartment of Computer Science University at Albany, State University of New York Solutions to Sample Discrete Mathematics Examination II (Fall 2007)
Department of Computer Science University at Albany, State University of New York Solutions to Sample Discrete Mathematics Examination II (Fall 2007) Problem 1: Specify two different predicates P (x) and
More informationSection Summary. Relations and Functions Properties of Relations. Combining Relations
Chapter 9 Chapter Summary Relations and Their Properties n-ary Relations and Their Applications (not currently included in overheads) Representing Relations Closures of Relations (not currently included
More informationConcept Lattices in Rough Set Theory
Concept Lattices in Rough Set Theory Y.Y. Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca URL: http://www.cs.uregina/ yyao Abstract
More informationMultilevel Logic Synthesis Algebraic Methods
Multilevel Logic Synthesis Algebraic Methods Logic Circuits Design Seminars WS2010/2011, Lecture 6 Ing. Petr Fišer, Ph.D. Department of Digital Design Faculty of Information Technology Czech Technical
More informationWhat You Will Gain By Rounding: Theory and Algorithms for Rounding Rank
What You Will Gain By Rounding: Theory and Algorithms for Rounding Rank Stefan Neumann University of Vienna Vienna, Austria stefan.neumann@univie.ac.at Rainer Gemulla Data and Web Science Group University
More informationMath.3336: Discrete Mathematics. Chapter 9 Relations
Math.3336: Discrete Mathematics Chapter 9 Relations Instructor: Dr. Blerina Xhabli Department of Mathematics, University of Houston https://www.math.uh.edu/ blerina Email: blerina@math.uh.edu Fall 2018
More informationLecture 7. Econ August 18
Lecture 7 Econ 2001 2015 August 18 Lecture 7 Outline First, the theorem of the maximum, an amazing result about continuity in optimization problems. Then, we start linear algebra, mostly looking at familiar
More informationLinear Algebra March 16, 2019
Linear Algebra March 16, 2019 2 Contents 0.1 Notation................................ 4 1 Systems of linear equations, and matrices 5 1.1 Systems of linear equations..................... 5 1.2 Augmented
More informationInvestigating Measures of Association by Graphs and Tables of Critical Frequencies
Investigating Measures of Association by Graphs Investigating and Tables Measures of Critical of Association Frequencies by Graphs and Tables of Critical Frequencies Martin Ralbovský, Jan Rauch University
More informationLecture 12: Feb 16, 2017
CS 6170 Computational Topology: Topological Data Analysis Spring 2017 Lecture 12: Feb 16, 2017 Lecturer: Prof Bei Wang University of Utah School of Computing Scribe: Waiming Tai This
More informationMODEL ANSWERS TO HWK #7. 1. Suppose that F is a field and that a and b are in F. Suppose that. Thus a = 0. It follows that F is an integral domain.
MODEL ANSWERS TO HWK #7 1. Suppose that F is a field and that a and b are in F. Suppose that a b = 0, and that b 0. Let c be the inverse of b. Multiplying the equation above by c on the left, we get 0
More informationFuzzy Closure Operators with Truth Stressers
Fuzzy Closure Operators with Truth Stressers RADIM BĚLOHLÁVEK, Dept. Computer Science, Palacký University, Tomkova 40, CZ-779 00, Olomouc, Czech Republic. Email: radim.belohlavek@upol.cz TAŤÁNA FUNIOKOVÁ,
More informationRegular Sparse Crossbar Concentrators
Regular Sparse Crossbar Concentrators Weiming Guo and A. Yavuz Oruç Electrical Engineering Department College Park, MD 20742 ABSTRACT A bipartite concentrator is a single stage sparse crossbar switching
More informationAn Optimization-based Approach to Decentralized Assignability
2016 American Control Conference (ACC) Boston Marriott Copley Place July 6-8, 2016 Boston, MA, USA An Optimization-based Approach to Decentralized Assignability Alborz Alavian and Michael Rotkowitz Abstract
More informationThe Novel Attempt for Finding Minimum Solution in Fuzzy Neutrosophic Relational Geometric Programming (FNRGP) with (max,min) Composition
Neutrosophic Sets and Systems, Vol11, 2016 107 University of New Mexico The Novel Attempt for Finding Minimum Solution in Fuzzy Neutrosophic Relational Geometric Programming (FNRGP) with (max,min) Composition
More informationOn Minimal Infrequent Itemset Mining
On Minimal Infrequent Itemset Mining David J. Haglin and Anna M. Manning Abstract A new algorithm for minimal infrequent itemset mining is presented. Potential applications of finding infrequent itemsets
More informationFuzzy filters and fuzzy prime filters of bounded Rl-monoids and pseudo BL-algebras
Fuzzy filters and fuzzy prime filters of bounded Rl-monoids and pseudo BL-algebras Jiří Rachůnek 1 Dana Šalounová2 1 Department of Algebra and Geometry, Faculty of Sciences, Palacký University, Tomkova
More informationAn Introduction of Tutte Polynomial
An Introduction of Tutte Polynomial Bo Lin December 12, 2013 Abstract Tutte polynomial, defined for matroids and graphs, has the important property that any multiplicative graph invariant with a deletion
More informationDATA MINING - 1DL360
DATA MINING - DL360 Fall 200 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht0 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology, Uppsala
More informationDecidability of Description Logics with Transitive Closure of Roles in Concept and Role Inclusion Axioms
Proc. 23rd Int. Workshop on Description Logics (DL2010), CEUR-WS 573, Waterloo, Canada, 2010. Decidability of Description Logics with Transitive Closure of Roles in Concept and Role Inclusion Axioms Chan
More informationDefinition 2.3. We define addition and multiplication of matrices as follows.
14 Chapter 2 Matrices In this chapter, we review matrix algebra from Linear Algebra I, consider row and column operations on matrices, and define the rank of a matrix. Along the way prove that the row
More informationFeature Selection with Fuzzy Decision Reducts
Feature Selection with Fuzzy Decision Reducts Chris Cornelis 1, Germán Hurtado Martín 1,2, Richard Jensen 3, and Dominik Ślȩzak4 1 Dept. of Mathematics and Computer Science, Ghent University, Gent, Belgium
More informationConstructing c-ary Perfect Factors
Constructing c-ary Perfect Factors Chris J. Mitchell Computer Science Department Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX England. Tel.: +44 784 443423 Fax: +44 784 443420 Email:
More informationBias Correction in Classification Tree Construction ICML 2001
Bias Correction in Classification Tree Construction ICML 21 Alin Dobra Johannes Gehrke Department of Computer Science Cornell University December 15, 21 Classification Tree Construction Outlook Temp. Humidity
More informationLecture Notes for Chapter 6. Introduction to Data Mining
Data Mining Association Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 6 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004
More informationInterpreting Low and High Order Rules: A Granular Computing Approach
Interpreting Low and High Order Rules: A Granular Computing Approach Yiyu Yao, Bing Zhou and Yaohua Chen Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail:
More informationAn Introduction to Modal Logic III
An Introduction to Modal Logic III Soundness of Normal Modal Logics Marco Cerami Palacký University in Olomouc Department of Computer Science Olomouc, Czech Republic Olomouc, October 24 th 2013 Marco Cerami
More informationBinary Decision Diagrams. Graphs. Boolean Functions
Binary Decision Diagrams Graphs Binary Decision Diagrams (BDDs) are a class of graphs that can be used as data structure for compactly representing boolean functions. BDDs were introduced by R. Bryant
More informationMining Approximative Descriptions of Sets Using Rough Sets
Mining Approximative Descriptions of Sets Using Rough Sets Dan A. Simovici University of Massachusetts Boston, Dept. of Computer Science, 100 Morrissey Blvd. Boston, Massachusetts, 02125 USA dsim@cs.umb.edu
More informationGroups Subgroups Normal subgroups Quotient groups Homomorphisms Cyclic groups Permutation groups Cayley s theorem Class equations Sylow theorems
Group Theory Groups Subgroups Normal subgroups Quotient groups Homomorphisms Cyclic groups Permutation groups Cayley s theorem Class equations Sylow theorems Groups Definition : A non-empty set ( G,*)
More informationarxiv: v2 [math.fa] 27 Sep 2016
Decomposition of Integral Self-Affine Multi-Tiles Xiaoye Fu and Jean-Pierre Gabardo arxiv:43.335v2 [math.fa] 27 Sep 26 Abstract. In this paper we propose a method to decompose an integral self-affine Z
More informationCOMP538: Introduction to Bayesian Networks
COMP538: Introduction to Bayesian Networks Lecture 9: Optimal Structure Learning Nevin L. Zhang lzhang@cse.ust.hk Department of Computer Science and Engineering Hong Kong University of Science and Technology
More informationActive Measurement for Multiple Link Failures Diagnosis in IP Networks
Active Measurement for Multiple Link Failures Diagnosis in IP Networks Hung X. Nguyen and Patrick Thiran EPFL CH-1015 Lausanne, Switzerland Abstract. Simultaneous link failures are common in IP networks
More information