TUFTS UNIVERSITY DEPARTMENT OF CIVIL AND ENVIRONMENTAL ENGINEERING ES 152 ENGINEERING SYSTEMS Spring Lesson 4 Reliability Networks
|
|
- Claire Beasley
- 5 years ago
- Views:
Transcription
1 TUFTS UNIVERSITY DEPARTMENT OF CIVIL AND ENVIRONMENTAL ENGINEERING ES ENGINEERING SYSTEMS Spring 0 Lesson 4 Reliability Networks Some Background Information: The reliability Rj of subtem j is the probability that it will continue to work over a given period of time. The failure rate of subtem j is therefore Fj Rj, and it is of course a probability as well. The failure of each subtem is considered to be independent of all the other subtems. A tem has a reliability structure which is related to but not identical to its physical structure.. If two or more subtems must all work in order for the tem to work then in the tem s reliability structure the subtems are in series. (The wireless mouse for the Mac has two AA batteries that are physically in parallel to provide adequate current. Since both must work for the mouse to work they are in series in the mouse s reliability structure.) If a tem s reliability structure consists of two subtems in series, with reliabilities R and R respectively, the tem s reliability is RR.. If two or more subtems must all fail in order for the tem to fail then in the tem s reliability structure the subtems are in parallel. If a tem s reliability structure consists of two subtems in parallel, with failure rates F and F respectively, the tem s failure rate is FF.. Note that in general F R (and R F). Let us consider the following problem Desirable Reliable Engineering Corporation (DREC) has produced and installed a control tem with the following reliability structure of subtems. A control signal input at A must be successfully processed by three () subtems before being output at B. In order to achieve a higher tem reliability a redundant design was used. s,, and are in series, in terms of the reliability structure, as are subtems 4,, and. In terms of reliability structure, subtems,, and are in parallel with subtems 4,, and. It is this parallel structure that produces the redundancy, since the overall tem works if either subtems,, and all work or if subtems 4,, and all work (or, of course, if all subtems work). The reliability structure is shown in Figure 4-. es Lesson 04
2 A B 4 Block Diagram Representation Of System Reliability Structure Figure 4- We will use block diagrams with the reliabilities shown explicitly, as in Figure 4-, and calculate the tem reliability. R 0.9 R 0.94 R 0.98 A B R 0.98 R 0.9 Reliability Block Diagram Figure 4- es Lesson 04
3 The path AB has a reliability of R RRR while the path A4B as a reliability R4 R4RR. Since the two paths are in parallel F FF4 ( R)( R4) Therefore R F FF4 ( R) ( R4) ( RRR)( R4RR) Recall that reliability is a measure of probability of failure within a given interval of time. That suggests the possibility of determining the initial mean time until failure of a tem. If R remains constant for each interval (i.e., the tem does not age, break in, m etc.) then the probability of the tem is still operating after m intervals is R. The a priori probability it fails in interval m is therefore F (m) R m ( R This is an example of a geometric distribution. Like its continuous cousin, the exponential distribution (to be seen later in this course) it has no memory. The failure rate in an interval is independent of the age of the tem. Therefore, the tem s mean time before failure is ). μ m F F F m F ( R F mf mr (+ R (+ R (m) ) m + R + R +...) +...) Of course a block diagram is just a digraph in disguise. We could represent the reliability structure of the tem as shown in Figure 4-, and note that if a subtem failure is es Lesson 04
4 represented by removal of the corresponding branch then the tem is working as long as B is reachable from A. R R R A R4 4 R R B Weighted Digraph (Network) Representation of Reliability Structure Figure 4- We can use this reachability concept as the basis of a simulation of tem reliability. The underlying digraph can be represented by the adjacency matrix A The reachability matrix for an n x n adjacency matrix is R B[(I + A + A A n )] where B is the boolean function. (B[x] if x 0, B[x] 0 if x 0.) This can be more efficiently calculated as n R B[( I + A) ]. Failure of a specific subtem corresponds to converting the corresponding to a 0 in es Lesson 04 4
5 the A matrix. Therefore if we determine if each subtem is working based on its reliability, set the A matrix accordingly, and compute the R matrix we have an appropriate basis for a simulation. In each case we will want to know if node is reachable from node. This corresponds to the r. Let us look at a problem that can not be decomposed into series and parallel subtems. This is shown in Figure 4-4 R R 0.9 R 0.9 R 0.94 Reliability structure not decomposable into series and parallel subtems Figure 4-4 One approach is to solve this problem twice, once with working and once with failed. This is shown in Figure 4-. es Lesson 04
6 Working R R 0.9 R 0.94 R 0.90 Failed 0.9 R 0.9 R 0.94 Figure 4- Case - working (probability 0.9): R, [-(-R)(-R)][-(-R4)(-R)] Case failed (probability 0.07): Therefore, R, -(-RR4)(-RR) 0.98 R 0.9*R, *R, An alternative approach is through simulation. To do this we will first represent the structure of Figure 4-4 as a digraph. Figure 4- shows the how to identify the appropriate nodes locations. es Lesson 04
7 R R R R 0.94 Identifying the Node Locations Figure 4- The resulting weighted digraph is shown in Figure Weighted Digraph Representation of System in Figure 4-4 Figure 4-7 This weighted digraph can be represented by the reliability matrix. The underlying digraph of course gives rise to the adjacency matrix A. Here is a run of the simulation. es Lesson 04 7
8 The VBA program is: Sub reliability() Dim rel(0, 0) As Single, a(0, 0) As Integer, c(0, 0) As Integer Dim reach(0, 0) As Integer, ccc(0, 0) As Integer, ppower As Integer Dim i As Integer, j As Integer, k As Integer, n As Integer, rrun As Long Dim maxrun As Long, work As Integer, totalwork As Integer Dim temrel As Single 'Read in number of runs and number of nodes in network Range("d").Select maxrun ActiveCell.Value Range("d4").Select n ActiveCell.Value Range("c").Select 'Read in reliability matrix R For i To n For j To n rel(i, j) ActiveCell.Value ActiveCell.Offset(0, ).Select ActiveCell.Offset(, -n).select For rrun To maxrun 'create A matrix for this run For i To n For j To n If Rnd() > rel(i, j) Then 'branch ij failed a(i, j) 0 Else 'branch ij is working a(i, j) End If 'create C (I + A) For i To n For j To n es Lesson 04 8
9 c(i, j) a(i, j) If i j Then c(i, j) c(i, j) + reach(i, j) c(i, j) ' create Reachability matrix R B[C^n-] For i To n For j To n reach(i, j) c(i, j) For ppower To n - 'create reach C^n- For i To n 'Note that we will not actually need to take boolean. For j To n 'We can use reach matrix rather than R matrix. For k To n 'ccc is temporary storage matrix ccc(i, j) ccc(i, j) + c(i, k) * reach(k, j) Next k For i To n For j To n reach(i, j) ccc(i, j) ccc(i, j) 0 Next ppower If reach(, n) > 0. Then 'element,n is not zero and node n reachable from node work Else 'node n not reachable from node work 0 End If totalwork totalwork + work Next rrun Range("d0").Select temrel totalwork / maxrun ActiveCell.Value temrel Range("a").Select End Sub Let s consider an even more complex reliability structure, shown in Figure 4-8. Reducing this structure to series and parallel blocks looks to be pretty difficult. Instead, let us determine the tem reliability by simulation. The node locations are already shown. es Lesson 04 9
10 R 0.70 R 0. R R 0. R 0.9 R 7 0. R 8 0. R Figure 4-8 The resulting network model is shown in Figure Weighted Digraph Representation of System in Figure 4-8 The input for the simulation is: Figure 4-9 es Lesson 04 0
11 . The resulting tem reliability is R es Lesson 04
CSC 1700 Analysis of Algorithms: Warshall s and Floyd s algorithms
CSC 1700 Analysis of Algorithms: Warshall s and Floyd s algorithms Professor Henry Carter Fall 2016 Recap Space-time tradeoffs allow for faster algorithms at the cost of space complexity overhead Dynamic
More informationEnumerate all possible assignments and take the An algorithm is a well-defined computational
EMIS 8374 [Algorithm Design and Analysis] 1 EMIS 8374 [Algorithm Design and Analysis] 2 Designing and Evaluating Algorithms A (Bad) Algorithm for the Assignment Problem Enumerate all possible assignments
More informationTheorem 1.7 [Bayes' Law]: Assume that,,, are mutually disjoint events in the sample space s.t.. Then Pr( )
Theorem 1.7 [Bayes' Law]: Assume that,,, are mutually disjoint events in the sample space s.t.. Then Pr Pr = Pr Pr Pr() Pr Pr. We are given three coins and are told that two of the coins are fair and the
More informationTUFTS UNIVERSITY DEPARTMENT OF CIVIL AND ENVIRONMENTAL ENGINEERING ES 152 ENGINEERING SYSTEMS Spring Lesson 14. Queue System Theory
TUFTS UNIVERSITY DEARTMENT OF CIVI AND ENVIRONMENTA ENGINEERING ES 52 ENGINEERING SYSTEMS Sprig 2 esso 4 Queue System Theory There exists a cosiderable body of theoretical aalysis of ueues. (Chapter 7
More informationIE Advanced Simulation Experiment Design and Analysis. Hong Wan Purdue University
IE Advanced Simulation Experiment Design and Analysis Hong Wan Purdue University Spring, 2007, based on Prof. Barry L. Nelson s notes for IEMS465, Northwestern University 1 SIMULATION OVERVIEW One view
More informationSECTION 2.5: FINDING ZEROS OF POLYNOMIAL FUNCTIONS
SECTION 2.5: FINDING ZEROS OF POLYNOMIAL FUNCTIONS Assume f ( x) is a nonconstant polynomial with real coefficients written in standard form. PART A: TECHNIQUES WE HAVE ALREADY SEEN Refer to: Notes 1.31
More informationAunu Integer Sequence as Non-Associative Structure and Their Graph Theoretic Properties
Advances in Pure Mathematics, 2016, 6, 409-419 Published Online May 2016 in SciRes. http://www.scirp.org/journal/apm http://dx.doi.org/10.4236/apm.2016.66028 Aunu Integer Sequence as Non-Associative Structure
More informationConfidence Intervals. Confidence interval for sample mean. Confidence interval for sample mean. Confidence interval for sample mean
Confidence Intervals Confidence interval for sample mean The CLT tells us: as the sample size n increases, the sample mean is approximately Normal with mean and standard deviation Thus, we have a standard
More information3.7 Cutting plane methods
3.7 Cutting plane methods Generic ILP problem min{ c t x : x X = {x Z n + : Ax b} } with m n matrix A and n 1 vector b of rationals. According to Meyer s theorem: There exists an ideal formulation: conv(x
More informationAutomata Theory CS Complexity Theory I: Polynomial Time
Automata Theory CS411-2015-17 Complexity Theory I: Polynomial Time David Galles Department of Computer Science University of San Francisco 17-0: Tractable vs. Intractable If a problem is recursive, then
More informationCHAPTER 10 RELIABILITY
CHAPTER 10 RELIABILITY Failure rates Reliability Constant failure rate and exponential distribution System Reliability Components in series Components in parallel Combination system 1 Failure Rate Curve
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More informationNotes. Relations. Introduction. Notes. Relations. Notes. Definition. Example. Slides by Christopher M. Bourke Instructor: Berthe Y.
Relations Slides by Christopher M. Bourke Instructor: Berthe Y. Choueiry Spring 2006 Computer Science & Engineering 235 Introduction to Discrete Mathematics Sections 7.1, 7.3 7.5 of Rosen cse235@cse.unl.edu
More informationCSCE 551 Final Exam, April 28, 2016 Answer Key
CSCE 551 Final Exam, April 28, 2016 Answer Key 1. (15 points) Fix any alphabet Σ containing the symbol a. For any language L Σ, define the language a\l := {w Σ wa L}. Show that if L is regular, then a\l
More informationBBM402-Lecture 11: The Class NP
BBM402-Lecture 11: The Class NP Lecturer: Lale Özkahya Resources for the presentation: http://ocw.mit.edu/courses/electrical-engineering-andcomputer-science/6-045j-automata-computability-andcomplexity-spring-2011/syllabus/
More informationAdvanced topic: Space complexity
Advanced topic: Space complexity CSCI 3130 Formal Languages and Automata Theory Siu On CHAN Chinese University of Hong Kong Fall 2016 1/28 Review: time complexity We have looked at how long it takes to
More informationBDD Based Upon Shannon Expansion
Boolean Function Manipulation OBDD and more BDD Based Upon Shannon Expansion Notations f(x, x 2,, x n ) - n-input function, x i = or f xi=b (x,, x n ) = f(x,,x i-,b,x i+,,x n ), b= or Shannon Expansion
More informationMarkov Models for Reliability Modeling
Markov Models for Reliability Modeling Prof. Naga Kandasamy ECE Department, Drexel University, Philadelphia, PA 904 Many complex systems cannot be easily modeled in a combinatorial fashion. The corresponding
More informationDesigning Survivable Networks: A Flow Based Approach
Designing Survivable Networks: A Flow Based Approach Prakash Mirchandani 1 University of Pittsburgh This is joint work with Anant Balakrishnan 2 of the University of Texas at Austin and Hari Natarajan
More informationCHAPTER 3 ANALYSIS OF RELIABILITY AND PROBABILITY MEASURES
27 CHAPTER 3 ANALYSIS OF RELIABILITY AND PROBABILITY MEASURES 3.1 INTRODUCTION The express purpose of this research is to assimilate reliability and its associated probabilistic variables into the Unit
More information2 (x 2 + a 2 ) x 2. is easy. Do this first.
MAC 3 INTEGRATION BY PARTS General Remark: Unless specified otherwise, you will solve the following problems using integration by parts, combined, if necessary with simple substitutions We will not explicitly
More informationTRANSPORTATION PROBLEMS
Chapter 6 TRANSPORTATION PROBLEMS 61 Transportation Model Transportation models deal with the determination of a minimum-cost plan for transporting a commodity from a number of sources to a number of destinations
More informationLecture 8: Column Generation
Lecture 8: Column Generation (3 units) Outline Cutting stock problem Classical IP formulation Set covering formulation Column generation A dual perspective Vehicle routing problem 1 / 33 Cutting stock
More informationA~(A'~) = i,(t) (1.34)
GENERAL RESISTIVE CIRCUITS 225 Nonlinear branch equation In vector notation, Eq. (1.31) becomes simply Since the independent current sources do not form cut sets (by assumption), Eq. (1.14) remains valid.
More informationLecture 8: Column Generation
Lecture 8: Column Generation (3 units) Outline Cutting stock problem Classical IP formulation Set covering formulation Column generation A dual perspective 1 / 24 Cutting stock problem 2 / 24 Problem description
More information1 Recursive Algorithms
400 lecture note #8 [ 5.6-5.8] Recurrence Relations 1 Recursive Algorithms A recursive algorithm is an algorithm which invokes itself. A recursive algorithm looks at a problem backward -- the solution
More information8.3 Numerical Quadrature, Continued
8.3 Numerical Quadrature, Continued Ulrich Hoensch Friday, October 31, 008 Newton-Cotes Quadrature General Idea: to approximate the integral I (f ) of a function f : [a, b] R, use equally spaced nodes
More informationCSE 431/531: Analysis of Algorithms. Dynamic Programming. Lecturer: Shi Li. Department of Computer Science and Engineering University at Buffalo
CSE 431/531: Analysis of Algorithms Dynamic Programming Lecturer: Shi Li Department of Computer Science and Engineering University at Buffalo Paradigms for Designing Algorithms Greedy algorithm Make a
More informationCommon Core Algebra 2 Review Session 1
Common Core Algebra 2 Review Session 1 NAME Date 1. Which of the following is algebraically equivalent to the sum of 4x 2 8x + 7 and 3x 2 2x 5? (1) 7x 2 10x + 2 (2) 7x 2 6x 12 (3) 7x 4 10x 2 + 2 (4) 12x
More informationLeast Squares. Tom Lyche. October 26, Centre of Mathematics for Applications, Department of Informatics, University of Oslo
Least Squares Tom Lyche Centre of Mathematics for Applications, Department of Informatics, University of Oslo October 26, 2010 Linear system Linear system Ax = b, A C m,n, b C m, x C n. under-determined
More informationRelations Graphical View
Introduction Relations Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Recall that a relation between elements of two sets is a subset of their Cartesian
More informationSIMPLE AND POSITIVE ROOTS
SIMPLE AND POSITIVE ROOTS JUHA VALKAMA MASSACHUSETTS INSTITUTE OF TECHNOLOGY Let V be a Euclidean space, i.e. a real finite dimensional linear space with a symmetric positive definite inner product,. We
More informationIntroduction to Decision Sciences Lecture 6
Introduction to Decision Sciences Lecture 6 Andrew Nobel September 21, 2017 Functions Functions Given: Sets A and B, possibly different Definition: A function f : A B is a rule that assigns every element
More informationNorthwestern University Department of Electrical Engineering and Computer Science
Northwestern University Department of Electrical Engineering and Computer Science EECS 454: Modeling and Analysis of Communication Networks Spring 2008 Probability Review As discussed in Lecture 1, probability
More informationIntroduction to Data Mining
Introduction to Data Mining Lecture #21: Dimensionality Reduction Seoul National University 1 In This Lecture Understand the motivation and applications of dimensionality reduction Learn the definition
More informationPhylogenetic Networks, Trees, and Clusters
Phylogenetic Networks, Trees, and Clusters Luay Nakhleh 1 and Li-San Wang 2 1 Department of Computer Science Rice University Houston, TX 77005, USA nakhleh@cs.rice.edu 2 Department of Biology University
More informationData Structures and Algorithms
Data Structures and Algorithms CS245-2015S-23 NP-Completeness and Undecidablity David Galles Department of Computer Science University of San Francisco 23-0: Hard Problems Some algorithms take exponential
More information16.1 Min-Cut as an LP
600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: LPs as Metrics: Min Cut and Multiway Cut Date: 4//5 Scribe: Gabriel Kaptchuk 6. Min-Cut as an LP We recall the basic definition
More informationIntroduction to Integer Programming
Lecture 3/3/2006 p. /27 Introduction to Integer Programming Leo Liberti LIX, École Polytechnique liberti@lix.polytechnique.fr Lecture 3/3/2006 p. 2/27 Contents IP formulations and examples Total unimodularity
More informationEXERCISE SET 5.1. = (kx + kx + k, ky + ky + k ) = (kx + kx + 1, ky + ky + 1) = ((k + )x + 1, (k + )y + 1)
EXERCISE SET 5. 6. The pair (, 2) is in the set but the pair ( )(, 2) = (, 2) is not because the first component is negative; hence Axiom 6 fails. Axiom 5 also fails. 8. Axioms, 2, 3, 6, 9, and are easily
More informationConcept of Reliability
Concept of Reliability Prepared By Dr. M. S. Memon Department of Industrial Engineering and Management Mehran University of Engineering and Technology Jamshoro, Sindh, Pakistan RELIABILITY Reliability
More informationCircuits. Lecture 11 Uniform Circuit Complexity
Circuits Lecture 11 Uniform Circuit Complexity 1 Recall 2 Recall Non-uniform complexity 2 Recall Non-uniform complexity P/1 Decidable 2 Recall Non-uniform complexity P/1 Decidable NP P/log NP = P 2 Recall
More information1. Write a program to calculate distance traveled by light
G. H. R a i s o n i C o l l e g e O f E n g i n e e r i n g D i g d o h H i l l s, H i n g n a R o a d, N a g p u r D e p a r t m e n t O f C o m p u t e r S c i e n c e & E n g g P r a c t i c a l M a
More informationP P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions
Summary of the previous lecture Recall that we mentioned the following topics: P: is the set of decision problems (or languages) that are solvable in polynomial time. NP: is the set of decision problems
More informationMath Homework 5 Solutions
Math 45 - Homework 5 Solutions. Exercise.3., textbook. The stochastic matrix for the gambler problem has the following form, where the states are ordered as (,, 4, 6, 8, ): P = The corresponding diagram
More informationSignal Handling & Processing
Signal Handling & Processing The output signal of the primary transducer may be too small to drive indicating, recording or control elements directly. Or it may be in a form which is not convenient for
More informationTheory of Computation Chapter 1: Introduction
Theory of Computation Chapter 1: Introduction Guan-Shieng Huang Sep. 20, 2006 Feb. 9, 2009 0-0 Text Book Computational Complexity, by C. H. Papadimitriou, Addison-Wesley, 1994. 1 References Garey, M.R.
More informationCONCATENATION AND KLEENE STAR ON DETERMINISTIC FINITE AUTOMATA
1 CONCATENATION AND KLEENE STAR ON DETERMINISTIC FINITE AUTOMATA GUO-QIANG ZHANG, XIANGNAN ZHOU, ROBERT FRASER, LICONG CUI Department of Electrical Engineering and Computer Science, Case Western Reserve
More informationIntroduction to Kleene Algebras
Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)
More informationExtreme Point Solutions for Infinite Network Flow Problems
Extreme Point Solutions for Infinite Network Flow Problems H. Edwin Romeijn Dushyant Sharma Robert L. Smith January 3, 004 Abstract We study capacitated network flow problems with supplies and demands
More informationPreliminaries. Introduction to EF-games. Inexpressivity results for first-order logic. Normal forms for first-order logic
Introduction to EF-games Inexpressivity results for first-order logic Normal forms for first-order logic Algorithms and complexity for specific classes of structures General complexity bounds Preliminaries
More informationMatrices. Chapter What is a Matrix? We review the basic matrix operations. An array of numbers a a 1n A = a m1...
Chapter Matrices We review the basic matrix operations What is a Matrix? An array of numbers a a n A = a m a mn with m rows and n columns is a m n matrix Element a ij in located in position (i, j The elements
More informationType II hidden symmetries of the Laplace equation
Type II hidden symmetries of the Laplace equation Andronikos Paliathanasis Larnaka, 2014 A. Paliathanasis (Univ. of Naples) Type II symmetries Larnaka, 2014 1 / 25 Plan of the Talk 1 The generic symmetry
More informationNP-Hardness reductions
NP-Hardness reductions Definition: P is the class of problems that can be solved in polynomial time, that is n c for a constant c Roughly, if a problem is in P then it's easy, and if it's not in P then
More informationTime Complexity (1) CSCI Spring Original Slides were written by Dr. Frederick W Maier. CSCI 2670 Time Complexity (1)
Time Complexity (1) CSCI 2670 Original Slides were written by Dr. Frederick W Maier Spring 2014 Time Complexity So far we ve dealt with determining whether or not a problem is decidable. But even if it
More informationIEOR 4106: Introduction to Operations Research: Stochastic Models Spring 2011, Professor Whitt Class Lecture Notes: Tuesday, March 1.
IEOR 46: Introduction to Operations Research: Stochastic Models Spring, Professor Whitt Class Lecture Notes: Tuesday, March. Continuous-Time Markov Chains, Ross Chapter 6 Problems for Discussion and Solutions.
More informationSafety and Reliability of Embedded Systems
(Sicherheit und Zuverlässigkeit eingebetteter Systeme) Fault Tree Analysis Mathematical Background and Algorithms Prof. Dr. Liggesmeyer, 0 Content Definitions of Terms Introduction to Combinatorics General
More informationBounded Model Checking with SAT/SMT. Edmund M. Clarke School of Computer Science Carnegie Mellon University 1/39
Bounded Model Checking with SAT/SMT Edmund M. Clarke School of Computer Science Carnegie Mellon University 1/39 Recap: Symbolic Model Checking with BDDs Method used by most industrial strength model checkers:
More informationReview of modal testing
Review of modal testing A. Sestieri Dipartimento di Meccanica e Aeronautica University La Sapienza, Rome Presentation layout - Modelling vibration problems - Aim of modal testing - Types of modal testing:
More informationOrbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin
Orbitopes Marc Pfetsch joint work with Volker Kaibel Zuse Institute Berlin What this talk is about We introduce orbitopes. A polyhedral way to break symmetries in integer programs. Introduction 2 Orbitopes
More informationDiscrete Mathematics, Spring 2004 Homework 4 Sample Solutions
Discrete Mathematics, Spring 2004 Homework 4 Sample Solutions 4.2 #77. Let s n,k denote the number of ways to seat n persons at k round tables, with at least one person at each table. (The numbers s n,k
More informationDynamic Programming. p. 1/43
Dynamic Programming Formalized by Richard Bellman Programming relates to planning/use of tables, rather than computer programming. Solve smaller problems first, record solutions in a table; use solutions
More informationHomework 11/Solutions. (Section 6.8 Exercise 3). Which pairs of the following vector spaces are isomorphic?
MTH 9-4 Linear Algebra I F Section Exercises 6.8,4,5 7.,b 7.,, Homework /Solutions (Section 6.8 Exercise ). Which pairs of the following vector spaces are isomorphic? R 7, R, M(, ), M(, 4), M(4, ), P 6,
More informationSection 9.2: Matrices. Definition: A matrix A consists of a rectangular array of numbers, or elements, arranged in m rows and n columns.
Section 9.2: Matrices Definition: A matrix A consists of a rectangular array of numbers, or elements, arranged in m rows and n columns. That is, a 11 a 12 a 1n a 21 a 22 a 2n A =...... a m1 a m2 a mn A
More informationResilient Asymptotic Consensus in Robust Networks
Resilient Asymptotic Consensus in Robust Networks Heath J. LeBlanc, Member, IEEE, Haotian Zhang, Student Member, IEEE, Xenofon Koutsoukos, Senior Member, IEEE, Shreyas Sundaram, Member, IEEE Abstract This
More informationCyber Physical Power Systems Power in Communications
1 Cyber Physical Power Systems Power in Communications Information and Communications Tech. Power Supply 2 ICT systems represent a noticeable (about 5 % of total t demand d in U.S.) fast increasing load.
More informationSpace Complexity. The space complexity of a program is how much memory it uses.
Space Complexity The space complexity of a program is how much memory it uses. Measuring Space When we compute the space used by a TM, we do not count the input (think of input as readonly). We say that
More informationContinuous Probability Distributions. Uniform Distribution
Continuous Probability Distributions Uniform Distribution Important Terms & Concepts Learned Probability Mass Function (PMF) Cumulative Distribution Function (CDF) Complementary Cumulative Distribution
More informationHierarchical Codes: How to Make Erasure Codes Attractive for Peer to Peer Storage Systems
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer to Peer Storage Systems Alessandro Duminuco and Ernst Biersack EURECOM Sophia Antipolis, France (Best paper award in P2P'08) Presented
More informationSubcubic Equivalence of Triangle Detection and Matrix Multiplication
Subcubic Equivalence of Triangle Detection and Matrix Multiplication Bahar Qarabaqi and Maziar Gomrokchi April 29, 2011 1 Introduction An algorithm on n n matrix with the entries in [ M, M] has a truly
More informationMath.3336: Discrete Mathematics. Chapter 9 Relations
Math.3336: Discrete Mathematics Chapter 9 Relations Instructor: Dr. Blerina Xhabli Department of Mathematics, University of Houston https://www.math.uh.edu/ blerina Email: blerina@math.uh.edu Fall 2018
More informationA Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo 3rd Biennial Canadian Discrete
More informationLesson 12.7: Sequences and Series
Lesson 12.7: Sequences and Series May 30 7:11 AM Sequences Definition: A sequence is a set of numbers in a specific order. 2, 5, 8,. is an example of a sequence. Note: A sequence may have either a finite
More information57:022 Principles of Design II Final Exam Solutions - Spring 1997
57:022 Principles of Design II Final Exam Solutions - Spring 1997 Part: I II III IV V VI Total Possible Pts: 52 10 12 16 13 12 115 PART ONE Indicate "+" if True and "o" if False: + a. If a component's
More informationLecture 7: Dynamic Programming I: Optimal BSTs
5-750: Graduate Algorithms February, 06 Lecture 7: Dynamic Programming I: Optimal BSTs Lecturer: David Witmer Scribes: Ellango Jothimurugesan, Ziqiang Feng Overview The basic idea of dynamic programming
More informationRela%ons and Their Proper%es. Slides by A. Bloomfield
Rela%ons and Their Proper%es Slides by A. Bloomfield What is a rela%on Let A and B be sets. A binary rela%on R is a subset of A B Example Let A be the students in a the CS major A = {Alice, Bob, Claire,
More informationChapter 7 Propositional Satisfiability Techniques
Lecture slides for Automated Planning: Theory and Practice Chapter 7 Propositional Satisfiability Techniques Dana S. Nau CMSC 722, AI Planning University of Maryland, Spring 2008 1 Motivation Propositional
More informationLinear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space
Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) Contents 1 Vector Spaces 1 1.1 The Formal Denition of a Vector Space.................................. 1 1.2 Subspaces...................................................
More informationR ij = 2. Using all of these facts together, you can solve problem number 9.
Help for Homework Problem #9 Let G(V,E) be any undirected graph We want to calculate the travel time across the graph. Think of each edge as one resistor of 1 Ohm. Say we have two nodes: i and j Let the
More informationGIS-BASED EARTHQUAKE DISASTER PREDICTION AND OPTIMUM PATH ANALYSIS FOR THE URBAN ROAD TRANSIT SYSTEM
GIS-BASED EARTHQUAKE DISASTER PREDICTION AND OPTIMUM PATH ANALYSIS FOR THE URBAN ROAD TRANSIT SYSTEM ABSTRACT: NI Yongjun 1, WANG Wanhong 1, HUANG Shimin 2, FU Shengcong 2 and OU Xianren 3 1. Ph.D, Associate
More informationRecurrence Relations
Recurrence Relations Recurrence Relations Reading (Epp s textbook) 5.6 5.8 1 Recurrence Relations A recurrence relation for a sequence aa 0, aa 1, aa 2, ({a n }) is a formula that relates each term a k
More informationBeyond the Point Cloud: From Transductive to Semi-Supervised Learning
Beyond the Point Cloud: From Transductive to Semi-Supervised Learning Vikas Sindhwani, Partha Niyogi, Mikhail Belkin Andrew B. Goldberg goldberg@cs.wisc.edu Department of Computer Sciences University of
More informationMTH 306 Spring Term 2007
MTH 306 Spring Term 2007 Lesson 5 John Lee Oregon State University (Oregon State University) 1 / 12 Lesson 5 Goals: Be able to de ne linear independence and linear dependence of a set of vectors (Oregon
More informationMIT Manufacturing Systems Analysis Lectures 18 19
MIT 2.852 Manufacturing Systems Analysis Lectures 18 19 Loops Stanley B. Gershwin Spring, 2007 Copyright c 2007 Stanley B. Gershwin. Problem Statement B 1 M 2 B 2 M 3 B 3 M 1 M 4 B 6 M 6 B 5 M 5 B 4 Finite
More informationOn Detecting Multiple Faults in Baseline Interconnection Networks
On Detecting Multiple Faults in Baseline Interconnection Networks SHUN-SHII LIN 1 AND SHAN-TAI CHEN 2 1 National Taiwan Normal University, Taipei, Taiwan, ROC 2 Chung Cheng Institute of Technology, Tao-Yuan,
More informationLocal Search & Optimization
Local Search & Optimization CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2017 Soleymani Artificial Intelligence: A Modern Approach, 3 rd Edition, Chapter 4 Outline
More informationChapter 8 Dynamic Programming
Chapter 8 Dynamic Programming Copyright 007 Pearson Addison-Wesley. All rights reserved. Dynamic Programming Dynamic Programming is a general algorithm design technique for solving problems defined by
More informationReview : Powers of a matrix
Review : Powers of a matrix Given a square matrix A and a positive integer k, we define A k = AA A } {{ } k times Note that the multiplications AA, AAA,... make sense. Example. Suppose A=. Then A 0 2 =
More informationPart 1. The Review of Linear Programming
In the name of God Part 1. The Review of Linear Programming 1.2. Spring 2010 Instructor: Dr. Masoud Yaghini Outline Introduction Basic Feasible Solutions Key to the Algebra of the The Simplex Algorithm
More informationBinary Decision Diagrams. Graphs. Boolean Functions
Binary Decision Diagrams Graphs Binary Decision Diagrams (BDDs) are a class of graphs that can be used as data structure for compactly representing boolean functions. BDDs were introduced by R. Bryant
More informationThe Complexity of a Reliable Distributed System
The Complexity of a Reliable Distributed System Rachid Guerraoui EPFL Alexandre Maurer EPFL Abstract Studying the complexity of distributed algorithms typically boils down to evaluating how the number
More informationBasic Algorithms for Permutation Groups
Basic Algorithms for Permutation Groups Alexander Hulpke Department of Mathematics Colorado State University Fort Collins, CO, 80523-1874 Arizona Summer Program 2008 JAH, Arizona Summer Program 2008 Basic
More informationComputer Science & Engineering 423/823 Design and Analysis of Algorithms
Computer Science & Engineering 423/823 Design and Analysis of s Lecture 09 Dynamic Programming (Chapter 15) Stephen Scott (Adapted from Vinodchandran N. Variyam) 1 / 41 Spring 2010 Dynamic programming
More informationBranch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems
Branch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems Yongjia Song James R. Luedtke August 9, 2012 Abstract We study solution approaches for the design of reliably
More informationWatershed Modeling With DEMs
Watershed Modeling With DEMs Lesson 6 6-1 Objectives Use DEMs for watershed delineation. Explain the relationship between DEMs and feature objects. Use WMS to compute geometric basin data from a delineated
More information4 Newton Method. Unconstrained Convex Optimization 21. H(x)p = f(x). Newton direction. Why? Recall second-order staylor series expansion:
Unconstrained Convex Optimization 21 4 Newton Method H(x)p = f(x). Newton direction. Why? Recall second-order staylor series expansion: f(x + p) f(x)+p T f(x)+ 1 2 pt H(x)p ˆf(p) In general, ˆf(p) won
More informationDynamic Programming: Shortest Paths and DFA to Reg Exps
CS 374: Algorithms & Models of Computation, Spring 207 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 8 March 28, 207 Chandra Chekuri (UIUC) CS374 Spring 207 / 56 Part I Shortest Paths
More informationand the compositional inverse when it exists is A.
Lecture B jacques@ucsd.edu Notation: R denotes a ring, N denotes the set of sequences of natural numbers with finite support, is a generic element of N, is the infinite zero sequence, n 0 R[[ X]] denotes
More information5 Quiver Representations
5 Quiver Representations 5. Problems Problem 5.. Field embeddings. Recall that k(y,..., y m ) denotes the field of rational functions of y,..., y m over a field k. Let f : k[x,..., x n ] k(y,..., y m )
More informationA Short Introduction to Hoare Logic
A Short Introduction to Hoare Logic Supratik Chakraborty I.I.T. Bombay June 23, 2008 Supratik Chakraborty (I.I.T. Bombay) A Short Introduction to Hoare Logic June 23, 2008 1 / 34 Motivation Assertion checking
More information