Pairwise RNA Edit Distance
|
|
- Brett Armstrong
- 5 years ago
- Views:
Transcription
1 Pairwise RNA Edit Distance In the foowing: Sequences S 1 and S 2 associated structures P 1 and P 2 scoring of aignment: different edit operations arc atering arc removing 1) ACGUUGACUGACAACAC..(((...)))... 2) ACGAUCACGUACUAGCCUGAC...(((.((...)).)))...(((...)))..... A CGUUGACUGACAAC AC ACGAUCACGU ACUAGC CUGAC...(((.((...)).))). base deetion base match arc mismatch arc match Notation: S k [i]: position i in sequence k (for k = 1, 2). S k [i] is free if there is no arc incident in P k to i Jiang et a., 2002: above scoring scheme compexity of different probem casses agorithms
2 Edit Distance Scores base scoring: base mismatch w m, base inde w d. case 1: arc match and arc mismatch i 1 i 2 j 1 j 2 arc match (cost 0): S 1 [i 1 ] = S 2 [j 1 ] and S 1 [i 2 ] = S 2 [j 2 ] arc mismatch: S 1 [i 1 ] S 2 [j 1 ] or S 1 [i 2 ] S 2 [j 2 ] cost for mismatch: if both ends differ: w am if ony one differs: w am 2 in the foowing: different ways of deeting arcs cost: cost for deeting arc + cost for base operations case 2: arc breaking i 1 i 2 j 1 j 2 (i 1, i 2 ) in P 1, but (j 1, j 2 ) is not in P 2 cost: w b + possiby 2 w m.
3 Edit Distance Scores (Cont.) case 3: arc atering case 4: arc removing i 1 i 2 i 1 i 2 j 1 j 2 cost: w a + possiby w m. cost: w r remark: arc breaking/atering/remova can overap A U G G G A A G G G U U
4 Edit Distance Scores Summary operations on singe bases: base insertion/deetion (w d ) base mismatch (w m ) operations that act on both ends of an arc: 1. arc mismatch (w am ) 2. arc breaking (w b ) 3. arc atering (w a ) 4. arc removing (w r ) Exampe: (..)((.(.)))(..) CCGGAGGCCGCUCCCG CCG-ACCC-CGU-CC- (.).((...))...
5 Pan 1. Jiang agorithm soves the edit probem given the foowing restrictions: non-crossing (aka nested aka pseudoknot-free) input structures 1 pairwise aignment ony scoring restricted by w a = wr +w b show MAX-SNP-hardness without the restriction w a = wr +w b 2. 1 actuay, we wi see that crossing in at most one structure is OK
6 Restriction w a = w r +w b 2 Arc atering is at one end ike arc removing and at the other end arc breaking Restriction w a = wr +w b 2 captures that eft and right ends of arcs can be scored independenty if they are broken, deeted or atered. cost for arc end deetion wd end of w r,w b, and w a : w b = 2 w end b w r = 2 w end d w a = w r + w b 2 and breaking w end b = w end b + w end d instead i j end w b A k wd end j i end w d
7 cost for arc end deetion w end d Independent Arc Scoring and breaking w end b Hence: Cost arc breaking: w b = 2 w end b i 1 i 2 j 1 j 2 arc removing: w r = 2 w end d i 1 i 2 arc atering: w a = w end b + w end d i 1 i 2 j 1 j 2 of breaking or removing one end of the arc is independent of whether the other end is broken/removed or not. Ony the cost of matching one end of an arc is dependent on whether the other end is matched, too.
8 Exampe cost for arc end deetion wd end and breaking wb end arc breaking: w b = 2 wb end arc removing: w r = 2 wd end arc atering: w a = wb end + wd end (..)((.(.)))(..) CCGGAGGCCGCUCCCG CCG-ACCC-CGU-CC- (.).((...))...
9 How to make a DP agorithm for aignment? dynamic programming compute optima aignment recursivey from optima aignments of fragments questions to answer: what kind of fragments do we consider? ( semantics of a matrix entry) how to compute the soutions for a these fragments? ( recursion equation) compexity detais (evauation order, impementation detais,...)
10 Semantics of DP entry D(i, i, j, j ) D(i, i, j, j ) is the minimum cost of aigning the fragment [i, i ] of the first sequence to the fragment [j, j ] of the second sequence given that no arcs are matched that have one end inside these fragments and one end outside. Remarks The additiona restriction makes the aignment of the fragments independent of the aignment of the remaining parts. We wi see ater, why it is not sufficient to ook at (aignments of) prefixes, as done for pain sequence aignment.
11 Recursion for D(i, i, j, j ) D(i, i, j, j ) = D(i, i 1, j, j ) + w d + ψ 1 (i )(wd end w d ) D(i, i, j, j 1) + w d + ψ 2 (j )(wd end w d ) D(i, i 1, j, j 1) + χ(i, j )w m + (ψ 1 (i ) + ψ 2 (j ))wb end min if (, ) = ((i 1, i ), (j 1, j )) P 1 P 2 for some i 1, j 1 D(i, i 1 1, j, j 1 1) + D(i 1 + 1, i 1, j 1 + 1, j 1) +(χ(i 1, j 1 ) + χ(i, j )) wam 2 Notation ψ 1 (i) = 1 if i is paired in structure 1, 0 otherwise. (ψ 2 (i) anaogous) χ(i, j) = 1 if S 1 [i] S 2 [j], 0 otherwise.
12 An optimized version: Jiang Agorithm D(i, i, j, j ) aignment of subsequences in principe: a regions [i..i ] and [j..j ]. O(n 2 m 2 ) space But: not a entries are considered a j i Hence: O(nm)-matrices M for each pair of arcs,. Each matrix: O(nm) entries M (i, j)
13 Jiang Recursion reformuated recursion: M (i 1, j) + w d +ψ 1 (i)(w end d w d ) a 2 broken bond i i 1 j aigned to gap M (i, j) = min M (i, j 1) + w d +ψ 2 (j)(w end d w d ) M (i 1, j 1) + χ(i, j)w m +(ψ 1 (i) + ψ 2 (j))wb end a 1 a 2 i broken bond j 1 i 1 broken bond j 1 j i j aigned to gap M (i 1, j 1) +M a 1 (i 1, j 1) +(χ(i, j ) + χ(i, j)) wam 2 i j a 1 j a 2 i
14 Compexity time compexity: O(nm) arc pairs O(nm) aignment beow arcs = O(n 2 m 2 ) time remaining question: space compexity: each entry of some M ony depends on other entries of the same matrix Ma a1 2 and fina entries of arc pairs of smaer arcs: r 1 r 1 r r store fina vaues in separate O(nm) matrix F (in recursion, repace ookup M a 1(i 1, j 1) by F (a 1, a 2 )) it suffices to keep ony F and one M in memory simutaneousy. compute a M ordered (increasing) according to size of and
15 Compexity Matrix F : O(nm) space ony one Matrix M at a time: O(nm) space argument: for computing one entry M (i, j), recurse ony to F (, a 2 ) for smaer a 1, a 2 or entries of the same matrix M consequence: reuse space for M TOTAL: O(nm + nm) = O(nm) space drawback: traceback requires recomputation but ony O(min(n, m)) many matrices M need to be recomputed.
16 What about Pseudoknots? Why doesn t the agorithm work for pseudoknots? ast recursion case does not cover cases where matched arcs cross (compare Nussinov) ony matching of crossing arcs is a probem pseudoknots in ony one of the structures are OK.
17 The aignment hierarchy Aignment approaches have different imitations concerning the two input structures the common superstructure (e.g. for tree aignment nested) the set of edit operations aignment hierarchy cassifies aignment probems as input1 input2 superstructure with input1,input2,superstructure being one of pain: ony pain sequence (no basepairs at a) nest: ony nested structures (no pseudoknots) cross: crossing structures (pseudoknots) unim: unimited, aso severa base pairs per base possibe. Exampes: cross nest unim: Jiang agorithm nest nest nest: tree aignment
18 The aignment hierarchy besides the imitations of input and superstructure, the scoring scheme (set of edit operations) is an important difference between the various aignment probems / agorithms. Overview: aignment hierarchy (Bin&Touzet, SPIRE 2006) structures scoring schemes no atering+removing no arc atering a operations nest nest nest O(n 4 ) O(n 4 ) O(n 4 ) nest nest cross O(n 3 og(n)) NP-compete nest nest unim O(n 3 og(n)) NP-compete NP-compete cross nest cross O(n 3 og(n)) NP-compete cross nest unim O(n 3 og(n)) NP-compete Max SNP-hard cross cross cross NP-compete NP-compete cross cross unim NP-compete NP-compete Max SNP-hard unim nest unim O(n 3 og(n)) NP-compete Max SNP-hard unim cross unim NP-compete NP-compete Max SNP-hard unim unim unim NP-compete NP-compete Max SNP-hard O(n 3 og(n)): P.Kein, ESA 1998 O(n 3 ): E.Demaine et a., ICALP 2007
MONTE CARLO SIMULATIONS
MONTE CARLO SIMULATIONS Current physics research 1) Theoretica 2) Experimenta 3) Computationa Monte Caro (MC) Method (1953) used to study 1) Discrete spin systems 2) Fuids 3) Poymers, membranes, soft matter
More informationCS229 Lecture notes. Andrew Ng
CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view
More informationTHINKING IN PYRAMIDS
ECS 178 Course Notes THINKING IN PYRAMIDS Kenneth I. Joy Institute for Data Anaysis and Visuaization Department of Computer Science University of Caifornia, Davis Overview It is frequenty usefu to think
More informationApproximated MLC shape matrix decomposition with interleaf collision constraint
Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence
More informationThe Sorting Problem. Inf 2B: Sorting, MergeSort and Divide-and-Conquer. What is important? Insertion Sort
The Sorting Probem Inf 2B: Sorting, MergeSort and Divide-and-Conquer Lecture 7 of DS thread Kyriaos Kaoroti Input: Tas: rray of items with comparabe eys. Sort the items in by increasing eys. Schoo of Informatics
More informationProblem set 6 The Perron Frobenius theorem.
Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator
More information221B Lecture Notes Notes on Spherical Bessel Functions
Definitions B Lecture Notes Notes on Spherica Besse Functions We woud ike to sove the free Schrödinger equation [ h d r R(r) = h k R(r). () m r dr r m R(r) is the radia wave function ψ( x) = R(r)Y m (θ,
More informationMinimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch
The Eighth Internationa Symposium on Operations Research and Its Appications (ISORA 09) Zhangiaie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 402 408 Minimizing Tota Weighted Competion
More informationSeparation of Variables and a Spherical Shell with Surface Charge
Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation
More informationLecture 6 Povh Krane Enge Williams Properties of 2-nucleon potential
Lecture 6 Povh Krane Enge Wiiams Properties of -nuceon potentia 16.1 4.4 3.6 9.9 Meson Theory of Nucear potentia 4.5 3.11 9.10 I recommend Eisberg and Resnik notes as distributed Probems, Lecture 6 1 Consider
More informationDavid Eigen. MA112 Final Paper. May 10, 2002
David Eigen MA112 Fina Paper May 1, 22 The Schrodinger equation describes the position of an eectron as a wave. The wave function Ψ(t, x is interpreted as a probabiity density for the position of the eectron.
More informationA Brief Introduction to Markov Chains and Hidden Markov Models
A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,
More informationApproximated MLC shape matrix decomposition with interleaf collision constraint
Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,
More informationMARKOV CHAINS AND MARKOV DECISION THEORY. Contents
MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After
More informationCS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time
CS 33 Artificia Inteigence Propositiona Logic 2 Review of Last Time = means ogicay foows - i means can be derived from If your inference agorithm derives ony things that foow ogicay from the KB, the inference
More informationLecture Note 3: Stationary Iterative Methods
MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or
More informationFirst-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries
c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische
More informationSVM: Terminology 1(6) SVM: Terminology 2(6)
Andrew Kusiak Inteigent Systems Laboratory 39 Seamans Center he University of Iowa Iowa City, IA 54-57 SVM he maxima margin cassifier is simiar to the perceptron: It aso assumes that the data points are
More informationAsymptotic Properties of a Generalized Cross Entropy Optimization Algorithm
1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete
More informationFRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA)
1 FRST 531 -- Mutivariate Statistics Mutivariate Discriminant Anaysis (MDA) Purpose: 1. To predict which group (Y) an observation beongs to based on the characteristics of p predictor (X) variabes, using
More informationComponentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems
Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,
More informationMATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES
MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is
More informationBDD-Based Analysis of Gapped q-gram Filters
BDD-Based Anaysis of Gapped q-gram Fiters Marc Fontaine, Stefan Burkhardt 2 and Juha Kärkkäinen 2 Max-Panck-Institut für Informatik Stuhsatzenhausweg 85, 6623 Saarbrücken, Germany e-mai: stburk@mpi-sb.mpg.de
More informationEfficiently Generating Random Bits from Finite State Markov Chains
1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More informationTwo Birds With One Stone: An Efficient Hierarchical Framework for Top-k and Threshold-based String Similarity Search
Two Birds With One Stone: An Efficient Hierarchica Framework for Top-k and Threshod-based String Simiarity Search Jin Wang Guoiang Li Dong Deng Yong Zhang Jianhua Feng Department of Computer Science and
More informationTwo view learning: SVM-2K, Theory and Practice
Two view earning: SVM-2K, Theory and Practice Jason D.R. Farquhar jdrf99r@ecs.soton.ac.uk Hongying Meng hongying@cs.york.ac.uk David R. Hardoon drh@ecs.soton.ac.uk John Shawe-Tayor jst@ecs.soton.ac.uk
More informationWidth of Percolation Transition in Complex Networks
APS/23-QED Width of Percoation Transition in Compex Networs Tomer Kaisy, and Reuven Cohen 2 Minerva Center and Department of Physics, Bar-Ian University, 52900 Ramat-Gan, Israe 2 Department of Computer
More informationCONSISTENT LABELING OF ROTATING MAPS
CONSISTENT LABELING OF ROTATING MAPS Andreas Gemsa, Martin Nöenburg, Ignaz Rutter Abstract. Dynamic maps that aow continuous map rotations, for exampe, on mobie devices, encounter new geometric abeing
More informationXSAT of linear CNF formulas
XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open
More informationLearning Fully Observed Undirected Graphical Models
Learning Fuy Observed Undirected Graphica Modes Sides Credit: Matt Gormey (2016) Kayhan Batmangheich 1 Machine Learning The data inspires the structures we want to predict Inference finds {best structure,
More informationCryptanalysis of PKP: A New Approach
Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in
More information14 Separation of Variables Method
14 Separation of Variabes Method Consider, for exampe, the Dirichet probem u t = Du xx < x u(x, ) = f(x) < x < u(, t) = = u(, t) t > Let u(x, t) = T (t)φ(x); now substitute into the equation: dt
More informationUniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete
Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity
More informationVI.G Exact free energy of the Square Lattice Ising model
VI.G Exact free energy of the Square Lattice Ising mode As indicated in eq.(vi.35), the Ising partition function is reated to a sum S, over coections of paths on the attice. The aowed graphs for a square
More informationHomework #04 Answers and Hints (MATH4052 Partial Differential Equations)
Homework #4 Answers and Hints (MATH452 Partia Differentia Equations) Probem 1 (Page 89, Q2) Consider a meta rod ( < x < ), insuated aong its sides but not at its ends, which is initiay at temperature =
More informationStochastic Variational Inference with Gradient Linearization
Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,
More informationAn Algorithm for Pruning Redundant Modules in Min-Max Modular Network
An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai
More informationAn approximate method for solving the inverse scattering problem with fixed-energy data
J. Inv. I-Posed Probems, Vo. 7, No. 6, pp. 561 571 (1999) c VSP 1999 An approximate method for soving the inverse scattering probem with fixed-energy data A. G. Ramm and W. Scheid Received May 12, 1999
More informationMat 1501 lecture notes, penultimate installment
Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the
More informationFrom Margins to Probabilities in Multiclass Learning Problems
From Margins to Probabiities in Muticass Learning Probems Andrea Passerini and Massimiiano Ponti 2 and Paoo Frasconi 3 Abstract. We study the probem of muticass cassification within the framework of error
More informationMath 124B January 31, 2012
Math 124B January 31, 212 Viktor Grigoryan 7 Inhomogeneous boundary vaue probems Having studied the theory of Fourier series, with which we successfuy soved boundary vaue probems for the homogeneous heat
More informationV.B The Cluster Expansion
V.B The Custer Expansion For short range interactions, speciay with a hard core, it is much better to repace the expansion parameter V( q ) by f( q ) = exp ( βv( q )), which is obtained by summing over
More informationStatistical Learning Theory: A Primer
Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO
More informationHonors Thesis Bounded Query Functions With Limited Output Bits II
Honors Thesis Bounded Query Functions With Limited Output Bits II Daibor Zeený University of Maryand, Batimore County May 29, 2007 Abstract We sove some open questions in the area of bounded query function
More informationDIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM
DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM MIKAEL NILSSON, MATTIAS DAHL AND INGVAR CLAESSON Bekinge Institute of Technoogy Department of Teecommunications and Signa Processing
More informationLower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees
This paper appeared in: Networks 47:2 (2006), -5 Lower Bounds for the Reative Greed Agorithm for Approimating Steiner Trees Stefan Hougard Stefan Kirchner Humbodt-Universität zu Berin Institut für Informatik
More informationBayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?
Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine
More informationTurbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University
Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver
More information4 Separation of Variables
4 Separation of Variabes In this chapter we describe a cassica technique for constructing forma soutions to inear boundary vaue probems. The soution of three cassica (paraboic, hyperboic and eiptic) PDE
More informationExplicit overall risk minimization transductive bound
1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,
More informationSequential Decoding of Polar Codes with Arbitrary Binary Kernel
Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient
More informationSupplement of Limited-memory Common-directions Method for Distributed Optimization and its Application on Empirical Risk Minimization
Suppement of Limited-memory Common-directions Method for Distributed Optimization and its Appication on Empirica Risk Minimization Ching-pei Lee Po-Wei Wang Weizhu Chen Chih-Jen Lin I Introduction In this
More informationLECTURE NOTES 9 TRACELESS SYMMETRIC TENSOR APPROACH TO LEGENDRE POLYNOMIALS AND SPHERICAL HARMONICS
MASSACHUSETTS INSTITUTE OF TECHNOLOGY Physics Department Physics 8.07: Eectromagnetism II October 7, 202 Prof. Aan Guth LECTURE NOTES 9 TRACELESS SYMMETRIC TENSOR APPROACH TO LEGENDRE POLYNOMIALS AND SPHERICAL
More informationStochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract
Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer
More informationAdvanced Hierarchical Event-Stream Model
Advanced Hierarchica Event-Stream Mode Karsten Abers, Frank Bodmann and Frank Somka Embedded Systems / Rea-ime Systems, Um University name.surname}@uni-um.de Abstract Anayzing future distributed rea-time
More informationRNA secondary structure prediction. Farhat Habib
RNA secondary structure prediction Farhat Habib RNA RNA is similar to DNA chemically. It is usually only a single strand. T(hyamine) is replaced by U(racil) Some forms of RNA can form secondary structures
More informationBALANCING REGULAR MATRIX PENCILS
BALANCING REGULAR MATRIX PENCILS DAMIEN LEMONNIER AND PAUL VAN DOOREN Abstract. In this paper we present a new diagona baancing technique for reguar matrix pencis λb A, which aims at reducing the sensitivity
More informationCombining reaction kinetics to the multi-phase Gibbs energy calculation
7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation
More informationTHE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE
THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on
More informationV.B The Cluster Expansion
V.B The Custer Expansion For short range interactions, speciay with a hard core, it is much better to repace the expansion parameter V( q ) by f(q ) = exp ( βv( q )) 1, which is obtained by summing over
More informationAsynchronous Control for Coupled Markov Decision Systems
INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of
More informationA Solution to the 4-bit Parity Problem with a Single Quaternary Neuron
Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria
More informationOn colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018
On coorings of the Booean attice avoiding a rainbow copy of a poset arxiv:1812.09058v1 [math.co] 21 Dec 2018 Baázs Patkós Afréd Rényi Institute of Mathematics, Hungarian Academy of Scinces H-1053, Budapest,
More informationThe EM Algorithm applied to determining new limit points of Mahler measures
Contro and Cybernetics vo. 39 (2010) No. 4 The EM Agorithm appied to determining new imit points of Maher measures by Souad E Otmani, Georges Rhin and Jean-Marc Sac-Épée Université Pau Veraine-Metz, LMAM,
More informationMassJoin: A MapReduce-based Method for Scalable String Similarity Joins
MassJoin: A MapReduce-based Method for Scaabe String Simiarity Joins Dong Deng, Guoiang Li, Shuang Hao, Jiannan Wang, Jianhua Feng Department of Computer Science, Tsinghua University, Beijing, China {dd11,
More informationC. Fourier Sine Series Overview
12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a
More informationNotes on Backpropagation with Cross Entropy
Notes on Backpropagation with Cross Entropy I-Ta ee, Dan Gowasser, Bruno Ribeiro Purue University October 3, 07. Overview This note introuces backpropagation for a common neura network muti-cass cassifier.
More informationSchool of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY
The ogic of Booean matrices C. R. Edwards Schoo of Eectrica Engineering, Universit of Bath, Caverton Down, Bath BA2 7AY A Booean matrix agebra is described which enabes man ogica functions to be manipuated
More informationMath-Net.Ru All Russian mathematical portal
Math-Net.Ru A Russian mathematica porta G. P. Agibaov, Substitution bock ciphers with functiona keys, Prik. Diskr. Mat., 2017, Number 38, 57 65 DOI: https://doi.org/10.17223/20710410/38/4 Use of the a-russian
More informationSchool of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY
The ogic of Booean matrices C. R. Edwards Schoo of Eectrica Engineering, Universit of Bath, Caverton Down, Bath BA2 7AY A Booean matrix agebra is described which enabes man ogica functions to be manipuated
More informationLecture Notes for Math 251: ODE and PDE. Lecture 32: 10.2 Fourier Series
Lecture Notes for Math 251: ODE and PDE. Lecture 32: 1.2 Fourier Series Shawn D. Ryan Spring 212 Last Time: We studied the heat equation and the method of Separation of Variabes. We then used Separation
More informationChapter 4. Moving Observer Method. 4.1 Overview. 4.2 Theory
Chapter 4 Moving Observer Method 4.1 Overview For a compete description of traffic stream modeing, one woud reuire fow, speed, and density. Obtaining these parameters simutaneousy is a difficut task if
More informationInductive Bias: How to generalize on novel data. CS Inductive Bias 1
Inductive Bias: How to generaize on nove data CS 478 - Inductive Bias 1 Overfitting Noise vs. Exceptions CS 478 - Inductive Bias 2 Non-Linear Tasks Linear Regression wi not generaize we to the task beow
More information8 Digifl'.11 Cth:uits and devices
8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,
More informationJackson 4.10 Homework Problem Solution Dr. Christopher S. Baird University of Massachusetts Lowell
Jackson 4.10 Homework Probem Soution Dr. Christopher S. Baird University of Massachusetts Lowe PROBLEM: Two concentric conducting spheres of inner and outer radii a and b, respectivey, carry charges ±.
More informationAlgorithms to solve massively under-defined systems of multivariate quadratic equations
Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations
More informationSafety Control of Discrete Event Systems Using Finite State Machines with Parameters
ACC01-IEEE1665 Safety Contro of Discrete Event Systems Using Finite State Machines with Parameters Yi-Liang Chen Rockwe Science Center 1049 Camino Dos Rios Thousand Oaks, CA 91360 ychen@rsc.rockwe.com
More informationEfficient Generation of Random Bits from Finite State Markov Chains
Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More informationStochastic Automata Networks (SAN) - Modelling. and Evaluation. Paulo Fernandes 1. Brigitte Plateau 2. May 29, 1997
Stochastic utomata etworks (S) - Modeing and Evauation Pauo Fernandes rigitte Pateau 2 May 29, 997 Institut ationa Poytechnique de Grenobe { IPG Ecoe ationae Superieure d'informatique et de Mathematiques
More informationOn the Goal Value of a Boolean Function
On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor
More informationData Search Algorithms based on Quantum Walk
Data Search Agorithms based on Quantum Wak Masataka Fujisaki, Hiromi Miyajima, oritaka Shigei Abstract For searching any item in an unsorted database with items, a cassica computer takes O() steps but
More informationIndirect Optimal Control of Dynamical Systems
Computationa Mathematics and Mathematica Physics, Vo. 44, No. 3, 24, pp. 48 439. Transated from Zhurna Vychisite noi Matematiki i Matematicheskoi Fiziki, Vo. 44, No. 3, 24, pp. 444 466. Origina Russian
More informationRewriting Systems and Geometric 3-Manifolds *
Rewriting Systems and Geometric 3-Manifods * Susan Hermier New Mexico State University Las Cruces, NM 88003, USA Michae Shapiro University of Mebourne Parkvie, Vic 3052, Austraia Abstract: The fundamenta
More informationHigher dimensional PDEs and multidimensional eigenvalue problems
Higher dimensiona PEs and mutidimensiona eigenvaue probems 1 Probems with three independent variabes Consider the prototypica equations u t = u (iffusion) u tt = u (W ave) u zz = u (Lapace) where u = u
More information12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes
Maima and Minima 1. Introduction In this Section we anayse curves in the oca neighbourhood of a stationary point and, from this anaysis, deduce necessary conditions satisfied by oca maima and oca minima.
More informationarxiv: v2 [cond-mat.stat-mech] 14 Nov 2008
Random Booean Networks Barbara Drosse Institute of Condensed Matter Physics, Darmstadt University of Technoogy, Hochschustraße 6, 64289 Darmstadt, Germany (Dated: June 27) arxiv:76.335v2 [cond-mat.stat-mech]
More informationAge of Information: The Gamma Awakening
Age of Information: The Gamma Awakening Eie Najm and Rajai Nasser LTHI, EPFL, Lausanne, Switzerand Emai: {eie.najm, rajai.nasser}@epf.ch arxiv:604.086v [cs.it] 5 Apr 06 Abstract Status update systems is
More informationMONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES
MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by
More informationTHE DIRECT KINEMATICS OF REDUNDANT PARALLEL ROBOT FOR PREDICTIVE CONTROL
HE DIREC KINEMAICS OF REDUNDAN PARALLEL ROBO FOR PREDICIVE CONROL BELDA KVĚOSLAV, BÖHM JOSEF, VALÁŠEK MICHAEL Department of Adaptive Systems, Institute of Information heory and Automation, Academy of Sciences
More informationMassJoin: A MapReduce-based Method for Scalable String Similarity Joins
MassJoin: A MapReduce-based Method for Scaabe String Simiarity Joins Dong Deng, Guoiang Li, Shuang Hao, Jiannan Wang, Jianhua Feng, Wen-Syan Li Department of Computer Science, Tsinghua University, Beijing,
More informationWork and energy method. Exercise 1 : Beam with a couple. Exercise 1 : Non-linear loaddisplacement. Exercise 2 : Horizontally loaded frame
Work and energy method EI EI T x-axis Exercise 1 : Beam with a coupe Determine the rotation at the right support of the construction dispayed on the right, caused by the coupe T using Castigiano s nd theorem.
More informationIntegrating Factor Methods as Exponential Integrators
Integrating Factor Methods as Exponentia Integrators Borisav V. Minchev Department of Mathematica Science, NTNU, 7491 Trondheim, Norway Borko.Minchev@ii.uib.no Abstract. Recenty a ot of effort has been
More information<C 2 2. λ 2 l. λ 1 l 1 < C 1
Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima
More informationThreshold Circuits for Multiplication and Related Problems
Optima-Depth Threshod Circuits for Mutipication and Reated Probems Chi-Hsiang Yeh Dept. of Eectrica & Computer Engineering Queen s University Kingston, Ontario, Canada, K7K 3N6 E.A. Varvarigos, B. Parhami,
More informationProblem Set 6: Solutions
University of Aabama Department of Physics and Astronomy PH 102 / LeCair Summer II 2010 Probem Set 6: Soutions 1. A conducting rectanguar oop of mass M, resistance R, and dimensions w by fas from rest
More informationDISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE
DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE Yury Iyushin and Anton Mokeev Saint-Petersburg Mining University, Vasiievsky Isand, 1 st ine, Saint-Petersburg,
More informationEmmanuel Abbe Colin Sandon
Detection in the stochastic bock mode with mutipe custers: proof of the achievabiity conjectures, acycic BP, and the information-computation gap Emmanue Abbe Coin Sandon Abstract In a paper that initiated
More informationRate-Distortion Theory of Finite Point Processes
Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information
More informationu(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0
Bocconi University PhD in Economics - Microeconomics I Prof M Messner Probem Set 4 - Soution Probem : If an individua has an endowment instead of a monetary income his weath depends on price eves In particuar,
More informationCE601-Structura Anaysis I UNIT-IV SOPE-DEFECTION METHOD 1. What are the assumptions made in sope-defection method? (i) Between each pair of the supports the beam section is constant. (ii) The joint in
More information