AN EXACT ARBORESCENT METHOD FOR SOLVING 0-1 KNAPSACK PROBLEM

Size: px
Start display at page:

Download "AN EXACT ARBORESCENT METHOD FOR SOLVING 0-1 KNAPSACK PROBLEM"

Transcription

1 AN EXACT ARBORESCENT METHOD FOR SOLVING 0-1 KNAPSACK PROBLEM 1. Introduction Our work focuses on the knapsack problem in which we have a set of objects and each one with a weight and a utility. We want to choose a subset of objects which does not exceed the capacity of the bag while ensuring a maximum benefit. This problem takes its name from the situation that confronted a hiker while preparing his trek. It was identified in 1972 as an NP-complete problem among the hardest in combinatorial optimization. From that date until now, many approaches have been proposed. We distinguish: (i) the exact methods that achieve an optimal solution at the expense of long processing time if the problem is of considerable size. (ii) The approximate methods which allow to obtain an approximate solution quickly and not necessarily an optimal one. (iii) The hybrid methods that combine the two types of methods described above to benefit from the advantages they bring. Our work is to propose a new algorithm that is a part of exact methods. This algorithm is BOUAKKAZ FERIEL Badji Mokhtar university,annaba, Algeria BABES MALIKA Badji Mokhtar university,annaba, Algeria ABSTRACT In this paper, we consider the resolution of knapsack problem whose importance is due to the fact that it appears as subproblem in various complex problems. And mainly because it can represent a large number of practical situations as it is found in different sectors such as finance (in portfolio management), industry and telecommunications (in the allocation of frequencies), as well as in computer science (in cryptography, in management process etc.). Our work consists in presenting a new method of resolution based on existing methods. Our exact method is an arborescent one and it has proved its efficiency, especially in terms of saving memory space compared to conventional arborescent methods. Our results will be discussed and analyzed in order to trace properly the contributions of our approach, and also its disadvantage. This will certainly help us in defining the prospects of our work. Keywords: Knapsack problem, Arborescent method, Branch and Bound method, Cryptography, Management process. inspired by the Branch and Bound method and of genetic algorithms. The first one directed us to the representation of the solution space as a tree, while the second one made us realize the advantage of representation in binary solutions. With our method and specifically with the new rules of separation that we set, we were able to reduce significantly the size of the solution s tree. This induced a decrease in time required to achieve the best results. However our method has disadvantages that we suggest to be adjusted in the near future. 2. State of the Art For this problem we have a knapsack with a maximum capacity of W and a set of n objects each one characterized by a weight w i and a utility p i. The goal is to choose among these objects those that maximize the profit while respecting the capacity of the knapsack. The mathematical formulation is as follows [7]: Data of the problem: 167

2 Objective: maximize Under constraints: x i takes the value 1 if the object is added to the bag, and 0 otherwise. The knapsack problem is used to model the following situations: In cryptography: NP-hard version of this problem has been used in primitive and cryptographic protocols, such as the Merkle-Hellman cryptosystem invented in 1978 [9] or the Chor-Rivest cryptosystem invented in 1988 [2]. The asymmetric encryption algorithms based on the knapsack problem were all broken to date, the latest being that of Chor-Rivest that was broken by Schnorr and Horner in 1995, by the technique of network reduction. In support systems for portfolio management: to balance selectivity and diversification in order to find the best balance between risk and return for capital invested in several financial assets. In the loading plane or ferry: all luggage must be brought to destination, without being overloaded; In the materials cutting: to minimize falls at the cutting sections of various lengths in iron bars. The problem defined above is the problem in binary variables (01KP). This is actually a variant among others. The specifications of these variants are done on the field of variables, the number of values of objects, the number of dimensions of the bag, etc. These features can also be combined. These include the problems with continuous variables (LKP) obtained by removing the integrity constraint on the variables. The problem with integer variables in which we consider that we have several copies of each object, we want to find the number of copies to be taken for each object. There are also multidimensional knapsack (d-kp), multiobjective knapsack, quadratic knapsack (QKP) etc. Our work deal with the first variant (the 0-1 knapsack problem). Many studies have aimed to solve this variant since the fifties. The first algorithms were produced by the theory of dynamic programming of Bellman [1]. Danzig has proposed a formula for calculating the upper bound [3]. The year 1967 marked the birth of the first branch-and-bound algorithm [6]. We can also cite the reduction procedure of Ingargiola Korsh [4], the upper bound of Martello and Toth and their branch and bound procedure [8]. Genetic algorithms in 1994 [10] and more recently quantum genetic algorithms [5]. To summarize we can say that in addition to these methods there are many others. However we can enumerate their faults as follow: (i) the exact methods such as dynamic programming and branch-and-bound method are known to be slow in addition of taking a lot of memory space for problems of considerable size (they exploit the solution space in its entirety). (ii) The approximate methods suffer from the problem of solution s quality, but also the difficulty of the parameter s choice we meet in using genetic algorithms, quantum genetic algorithms etc. This brings us to always think about new approaches to solve this difficult problem. This is the purpose of our work. 3. Our method We propose a method of resolution which is an exact arborescent method. A classical arborescent method will list all possible solutions using a binary tree, in which each level represents an object. And the first branch represents the addition of the object in the bag, while for the other branch the object is being removed. The tree is as follow: 168

3 Figure 3. Search tree with half number of nodes. Figure 1. Representation of classic arborescent method. The observation we made on this tree is that if we cut it horizontally at the root, we get at each level two distinct and complementary sets. That is to say that if we have a solution in the first set which contains the subject 1, in the second set there is necessarily a solution with the rest of the objects. On our tree each level corresponds to the object number (level+1): the root (level 0) corresponds to the first object, the second level corresponds to the second object etc. As mentioned above, each node has a solution (black) and its complement (in red). This gives new meaning to the branches: one branch corresponds to the addition (respectively removal) of the object at the next level in the solution (respectively the complement) of the current node. The second branch means that the object has not been added (respectively removed) to the solution (respectively the complement) of the current node. The second object was added to the solution {1}, and removed from the complement {2,3,4}. Figure 2. Sets of representation of classic arborescent method. Following this observation and in order to address one of the disadvantages of arborescent method (the tree can become very large if the number of objects increases), we thought about considering in each node of the tree two solutions instead of one. Each node will then have a solution and its complement which allows us to divide the size of the tree in a half. Figure 4. Meaning of the branches of the tree. In addition to save memory space (the size of the tree is divided into two), this representation also allows us to save time during the evaluation phase of the nodes. We will proceed as follows: evaluate a node of our tree is based on the weight of the solution and the weight of 169

4 the complement, which confronts us on the following four cases: The solution and its complement have a weight less than the capacity of the bag: it is no longer necessary to consider complements (in red) in the coming nodes, as to the complement each branch corresponds to the removal of an object which we can t logically lead to a better solution (in terms of utility) of the current node. The solution and its complement have a weight greater than the capacity of the bag: it is no longer necessary to consider the solutions (in black) in the coming nodes, as the solution for each branch corresponds to adding an object and as the solution has a weight greater than the capacity of the bag, there is no chance to change that. The solution has a weight less than the capacity of the bag but the complement has a weight greater than the bag: we must consider all possibilities, because we have to add objects to the solution as it is possible (we have not exceeded the capacity of the bag), and we must remove the additional objects as they can t all fit in the bag. The solution has a weight greater than the capacity of the bag, unlike its complement: it is no longer necessary to consider the child of this node (stop), because the addition of the object can t be done (the weight of the solution exceeds the capacity of the bag), and the withdrawal of the object will not provide a better solution in terms of utility. To improve more our method, we thought about alternating phases of separation and evaluation, so that each time we create a node it is evaluated and his child are generated according to the four previous cases: we will ultimately have nodes with the solution and its complement, with only solution or with only the complement. There will be also nodes without child. This method will allow us to gain more in memory space and also in execution time, because we no longer have to generate the components that we are sure that we don t need. We have tested our method on the following example. The tree obtained by our method of evaluation is presented below: The capacity of the bag is 14kg. Object Weight Utility Tent Food 3 50 Gourd 7 10 Mosquito 2 12 Table 1. Object s weights and object s values of the example. Figure 5. The tree obtained with our method. 4. Experimentation To implement our resolution method we have used the Java language which is an objectoriented language, and we have used the environment Borland JBuilder 9. The material environment is a laptop equipped with an Intel Pentium processor Dual CPU 1.73GHz and a 1.99 GB of RAM. The experiments are performed on instances generated as follows: The objects weights w i are randomly generated in [1, 10]. The values p i are given as: p i =w i + 5. The capacity of the bag was determined using the average weight of objects. 170

5 Dimension of the instance Capacity of bag (kg) execution (seconds) time distribution reasoning of our method on multiple machines and compare results Table 2. Run Times associated to the tested instances. According to various tests, we found that if the capacity of the bag is close to the average weight of objects, our method is more efficient (the size of the tree is minimal) because we can reach quickly the criteria of judgment of the separation phase. To summarize, our method is an exact method, it is very simple to implement. Its main advantage is that it manipulates a tree that is much smaller than the classic arborescent method (half size of the tree), because of the fact of removing solutions that are considered less effective than the ones already developed. This leads to another advantage of great importance which is the gain in execution time. By observing the behavior of our method, we could also identify the following property: the optimal solution is usually found in the early levels of the tree, this encourages us to think on a heuristic for arresting the development of unnecessary branches after a certain level. After highlighting the qualities and defects of our method, we proposed to implement it on several machines to benefit of resources located on other computers, in order to have better results in terms of execution time and memory space. Currently we use two machines organized in a client/server architecture and share the tasks so that each machine is responsible for evaluating and separating a part of the tree. The results obtained by distributing our method on two computers show improvement in execution time and memory space (the tree is distributed on two machines), which encourages us to generalize the 5. Conclusion The method we proposed has proven itself in terms of saving execution time, and also in terms of reduced memory space. Indeed, it is unusual to dismiss the solutions of a lower efficiency than those already visited. Nevertheless, by testing on instances of considerable size, we faced a problem of memory space. This does not undermine our approach, but rather the ability of the machine that we tested. Indeed, our tree method would need to be tested on machines whose memory is not limited. The work done so far gave birth to the following perspectives: Find solutions to the limitations we have identified in our method. Implement our method on several machines and compare results with those of one machine. Hybridize our method with others, in order to benefit from work already done. Adapt the algorithm realized in real cases (portfolio management, cryptography, frequency allocation etc.). Références [1] Bellman R. Dynamic Programming, Princeton Univercity Press, Princeton, [2] Chor Benny, Rivest Ronald L, A knapsack-type public key cryptosystem based on arithmetic in finite fields, IEEE Transactions on Information Theory 34(5), pp , [3] Dantzig G, Discrete variable extremum problems, Operations Research 5, pp , [4] Ingargiola G.P, Korsh J.F, Reduction algorithm for zero-one single knapsack prpblems, Management Sci. 20, pp ,

6 [5] Kim Y, Kim J, Han K, Quantum-inspired multiobjective evolutionary algorithme for multiobjective 0/1 knapsack problems, In Proceedings of the IEEE Congress on Evolutionary Compution, Vancouver, Canada, pp , [6] Kolesar Peter, A branch and bound algorithm for the knapsack problem, Management Science, Vol. 13 Issue 9, pp. 723, [7] Martello S, Toth P, Knapsack Problems: algorithms and computer implementations, John Wiley & Sons, Chichester, West Sussex, England, [8] Martello S, Toth P, An upper bound for the zero-one knapsack problem and a Branchand-Bound algorithm, European Journal of Operational Research, vol. 1, pp , [9] Merkle Ralph, Hellman Martin, Hiding Information and Signatures in Trapdoor Knapsacks, IEEE Trans. Information Theory 24(5), pp , [10] Zbigniew Michalewicz, Jaroslaw Arabas, Genetic Algorithms for the 0/1 Knapsack Problem, ISMIS '94 Proceedings of the 8th International Symposium on Methodologies for Intelligent Systems, pp ,

Radius STEM Readiness TM

Radius STEM Readiness TM Curriculum Guide Radius STEM Readiness TM While today s teens are surrounded by technology, we face a stark and imminent shortage of graduates pursuing careers in Science, Technology, Engineering, and

More information

Multimedia Application Effective Support of Education

Multimedia Application Effective Support of Education Multimedia Application Effective Support of Education Eva Milková Faculty of Science, University od Hradec Králové, Hradec Králové, Czech Republic eva.mikova@uhk.cz Abstract Multimedia applications have

More information

THE UNIVERSITY OF SYDNEY Semester 2, Information Sheet for MATH2068/2988 Number Theory and Cryptography

THE UNIVERSITY OF SYDNEY Semester 2, Information Sheet for MATH2068/2988 Number Theory and Cryptography THE UNIVERSITY OF SYDNEY Semester 2, 2017 Information Sheet for MATH2068/2988 Number Theory and Cryptography Websites: It is important that you check the following webpages regularly. Intermediate Mathematics

More information

Reinforcement Learning by Comparing Immediate Reward

Reinforcement Learning by Comparing Immediate Reward Reinforcement Learning by Comparing Immediate Reward Punit Pandey DeepshikhaPandey Dr. Shishir Kumar Abstract This paper introduces an approach to Reinforcement Learning Algorithm by comparing their immediate

More information

Learning Methods for Fuzzy Systems

Learning Methods for Fuzzy Systems Learning Methods for Fuzzy Systems Rudolf Kruse and Andreas Nürnberger Department of Computer Science, University of Magdeburg Universitätsplatz, D-396 Magdeburg, Germany Phone : +49.39.67.876, Fax : +49.39.67.8

More information

(Sub)Gradient Descent

(Sub)Gradient Descent (Sub)Gradient Descent CMSC 422 MARINE CARPUAT marine@cs.umd.edu Figures credit: Piyush Rai Logistics Midterm is on Thursday 3/24 during class time closed book/internet/etc, one page of notes. will include

More information

GACE Computer Science Assessment Test at a Glance

GACE Computer Science Assessment Test at a Glance GACE Computer Science Assessment Test at a Glance Updated May 2017 See the GACE Computer Science Assessment Study Companion for practice questions and preparation resources. Assessment Name Computer Science

More information

Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses

Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses Thomas F.C. Woodhall Masters Candidate in Civil Engineering Queen s University at Kingston,

More information

A Reinforcement Learning Variant for Control Scheduling

A Reinforcement Learning Variant for Control Scheduling A Reinforcement Learning Variant for Control Scheduling Aloke Guha Honeywell Sensor and System Development Center 3660 Technology Drive Minneapolis MN 55417 Abstract We present an algorithm based on reinforcement

More information

Proof Theory for Syntacticians

Proof Theory for Syntacticians Department of Linguistics Ohio State University Syntax 2 (Linguistics 602.02) January 5, 2012 Logics for Linguistics Many different kinds of logic are directly applicable to formalizing theories in syntax

More information

Evolutive Neural Net Fuzzy Filtering: Basic Description

Evolutive Neural Net Fuzzy Filtering: Basic Description Journal of Intelligent Learning Systems and Applications, 2010, 2: 12-18 doi:10.4236/jilsa.2010.21002 Published Online February 2010 (http://www.scirp.org/journal/jilsa) Evolutive Neural Net Fuzzy Filtering:

More information

University of Groningen. Systemen, planning, netwerken Bosman, Aart

University of Groningen. Systemen, planning, netwerken Bosman, Aart University of Groningen Systemen, planning, netwerken Bosman, Aart IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document

More information

Beveridge Primary School. One to one laptop computer program for 2018

Beveridge Primary School. One to one laptop computer program for 2018 Beveridge Primary School One to one laptop computer program for 2018 At Beveridge Primary we believe that giving students access to technology will help them engage with learning in new and creative ways.

More information

Delaware Performance Appraisal System Building greater skills and knowledge for educators

Delaware Performance Appraisal System Building greater skills and knowledge for educators Delaware Performance Appraisal System Building greater skills and knowledge for educators DPAS-II Guide for Administrators (Assistant Principals) Guide for Evaluating Assistant Principals Revised August

More information

OCR for Arabic using SIFT Descriptors With Online Failure Prediction

OCR for Arabic using SIFT Descriptors With Online Failure Prediction OCR for Arabic using SIFT Descriptors With Online Failure Prediction Andrey Stolyarenko, Nachum Dershowitz The Blavatnik School of Computer Science Tel Aviv University Tel Aviv, Israel Email: stloyare@tau.ac.il,

More information

Research Article Hybrid Multistarting GA-Tabu Search Method for the Placement of BtB Converters for Korean Metropolitan Ring Grid

Research Article Hybrid Multistarting GA-Tabu Search Method for the Placement of BtB Converters for Korean Metropolitan Ring Grid Mathematical Problems in Engineering Volume 2016, Article ID 1546753, 9 pages http://dx.doi.org/10.1155/2016/1546753 Research Article Hybrid Multistarting GA-Tabu Search Method for the Placement of BtB

More information

AGENDA LEARNING THEORIES LEARNING THEORIES. Advanced Learning Theories 2/22/2016

AGENDA LEARNING THEORIES LEARNING THEORIES. Advanced Learning Theories 2/22/2016 AGENDA Advanced Learning Theories Alejandra J. Magana, Ph.D. admagana@purdue.edu Introduction to Learning Theories Role of Learning Theories and Frameworks Learning Design Research Design Dual Coding Theory

More information

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur Module 12 Machine Learning 12.1 Instructional Objective The students should understand the concept of learning systems Students should learn about different aspects of a learning system Students should

More information

Australian Journal of Basic and Applied Sciences

Australian Journal of Basic and Applied Sciences AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean

More information

Artificial Neural Networks written examination

Artificial Neural Networks written examination 1 (8) Institutionen för informationsteknologi Olle Gällmo Universitetsadjunkt Adress: Lägerhyddsvägen 2 Box 337 751 05 Uppsala Artificial Neural Networks written examination Monday, May 15, 2006 9 00-14

More information

Knowledge-Based - Systems

Knowledge-Based - Systems Knowledge-Based - Systems ; Rajendra Arvind Akerkar Chairman, Technomathematics Research Foundation and Senior Researcher, Western Norway Research institute Priti Srinivas Sajja Sardar Patel University

More information

Given a directed graph G =(N A), where N is a set of m nodes and A. destination node, implying a direction for ow to follow. Arcs have limitations

Given a directed graph G =(N A), where N is a set of m nodes and A. destination node, implying a direction for ow to follow. Arcs have limitations 4 Interior point algorithms for network ow problems Mauricio G.C. Resende AT&T Bell Laboratories, Murray Hill, NJ 07974-2070 USA Panos M. Pardalos The University of Florida, Gainesville, FL 32611-6595

More information

Chinese Language Parsing with Maximum-Entropy-Inspired Parser

Chinese Language Parsing with Maximum-Entropy-Inspired Parser Chinese Language Parsing with Maximum-Entropy-Inspired Parser Heng Lian Brown University Abstract The Chinese language has many special characteristics that make parsing difficult. The performance of state-of-the-art

More information

CS Machine Learning

CS Machine Learning CS 478 - Machine Learning Projects Data Representation Basic testing and evaluation schemes CS 478 Data and Testing 1 Programming Issues l Program in any platform you want l Realize that you will be doing

More information

A cognitive perspective on pair programming

A cognitive perspective on pair programming Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) December 2006 A cognitive perspective on pair programming Radhika

More information

Reducing Features to Improve Bug Prediction

Reducing Features to Improve Bug Prediction Reducing Features to Improve Bug Prediction Shivkumar Shivaji, E. James Whitehead, Jr., Ram Akella University of California Santa Cruz {shiv,ejw,ram}@soe.ucsc.edu Sunghun Kim Hong Kong University of Science

More information

AQUA: An Ontology-Driven Question Answering System

AQUA: An Ontology-Driven Question Answering System AQUA: An Ontology-Driven Question Answering System Maria Vargas-Vera, Enrico Motta and John Domingue Knowledge Media Institute (KMI) The Open University, Walton Hall, Milton Keynes, MK7 6AA, United Kingdom.

More information

Bluetooth mlearning Applications for the Classroom of the Future

Bluetooth mlearning Applications for the Classroom of the Future Bluetooth mlearning Applications for the Classroom of the Future Tracey J. Mehigan, Daniel C. Doolan, Sabin Tabirca Department of Computer Science, University College Cork, College Road, Cork, Ireland

More information

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ;

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ; EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10 Instructor: Kang G. Shin, 4605 CSE, 763-0391; kgshin@umich.edu Number of credit hours: 4 Class meeting time and room: Regular classes: MW 10:30am noon

More information

FUZZY EXPERT. Dr. Kasim M. Al-Aubidy. Philadelphia University. Computer Eng. Dept February 2002 University of Damascus-Syria

FUZZY EXPERT. Dr. Kasim M. Al-Aubidy. Philadelphia University. Computer Eng. Dept February 2002 University of Damascus-Syria FUZZY EXPERT SYSTEMS 16-18 18 February 2002 University of Damascus-Syria Dr. Kasim M. Al-Aubidy Computer Eng. Dept. Philadelphia University What is Expert Systems? ES are computer programs that emulate

More information

Carter M. Mast. Participants: Peter Mackenzie-Helnwein, Pedro Arduino, and Greg Miller. 6 th MPM Workshop Albuquerque, New Mexico August 9-10, 2010

Carter M. Mast. Participants: Peter Mackenzie-Helnwein, Pedro Arduino, and Greg Miller. 6 th MPM Workshop Albuquerque, New Mexico August 9-10, 2010 Representing Arbitrary Bounding Surfaces in the Material Point Method Carter M. Mast 6 th MPM Workshop Albuquerque, New Mexico August 9-10, 2010 Participants: Peter Mackenzie-Helnwein, Pedro Arduino, and

More information

Probabilistic Latent Semantic Analysis

Probabilistic Latent Semantic Analysis Probabilistic Latent Semantic Analysis Thomas Hofmann Presentation by Ioannis Pavlopoulos & Andreas Damianou for the course of Data Mining & Exploration 1 Outline Latent Semantic Analysis o Need o Overview

More information

Seminar - Organic Computing

Seminar - Organic Computing Seminar - Organic Computing Self-Organisation of OC-Systems Markus Franke 25.01.2006 Typeset by FoilTEX Timetable 1. Overview 2. Characteristics of SO-Systems 3. Concern with Nature 4. Design-Concepts

More information

Workload Policy Department of Art and Art History Revised 5/2/2007

Workload Policy Department of Art and Art History Revised 5/2/2007 Workload Policy Department of Art and Art History Revised 5/2/2007 Workload expectations for faculty in the Department of Art and Art History, in the areas of teaching, research, and service, must be consistent

More information

Test Effort Estimation Using Neural Network

Test Effort Estimation Using Neural Network J. Software Engineering & Applications, 2010, 3: 331-340 doi:10.4236/jsea.2010.34038 Published Online April 2010 (http://www.scirp.org/journal/jsea) 331 Chintala Abhishek*, Veginati Pavan Kumar, Harish

More information

Objectives. Chapter 2: The Representation of Knowledge. Expert Systems: Principles and Programming, Fourth Edition

Objectives. Chapter 2: The Representation of Knowledge. Expert Systems: Principles and Programming, Fourth Edition Chapter 2: The Representation of Knowledge Expert Systems: Principles and Programming, Fourth Edition Objectives Introduce the study of logic Learn the difference between formal logic and informal logic

More information

Automating the E-learning Personalization

Automating the E-learning Personalization Automating the E-learning Personalization Fathi Essalmi 1, Leila Jemni Ben Ayed 1, Mohamed Jemni 1, Kinshuk 2, and Sabine Graf 2 1 The Research Laboratory of Technologies of Information and Communication

More information

Self Study Report Computer Science

Self Study Report Computer Science Computer Science undergraduate students have access to undergraduate teaching, and general computing facilities in three buildings. Two large classrooms are housed in the Davis Centre, which hold about

More information

Rule-based Expert Systems

Rule-based Expert Systems Rule-based Expert Systems What is knowledge? is a theoretical or practical understanding of a subject or a domain. is also the sim of what is currently known, and apparently knowledge is power. Those who

More information

Rule Learning With Negation: Issues Regarding Effectiveness

Rule Learning With Negation: Issues Regarding Effectiveness Rule Learning With Negation: Issues Regarding Effectiveness S. Chua, F. Coenen, G. Malcolm University of Liverpool Department of Computer Science, Ashton Building, Ashton Street, L69 3BX Liverpool, United

More information

Software Maintenance

Software Maintenance 1 What is Software Maintenance? Software Maintenance is a very broad activity that includes error corrections, enhancements of capabilities, deletion of obsolete capabilities, and optimization. 2 Categories

More information

MGT/MGP/MGB 261: Investment Analysis

MGT/MGP/MGB 261: Investment Analysis UNIVERSITY OF CALIFORNIA, DAVIS GRADUATE SCHOOL OF MANAGEMENT SYLLABUS for Fall 2014 MGT/MGP/MGB 261: Investment Analysis Daytime MBA: Tu 12:00p.m. - 3:00 p.m. Location: 1302 Gallagher (CRN: 51489) Sacramento

More information

Regret-based Reward Elicitation for Markov Decision Processes

Regret-based Reward Elicitation for Markov Decision Processes 444 REGAN & BOUTILIER UAI 2009 Regret-based Reward Elicitation for Markov Decision Processes Kevin Regan Department of Computer Science University of Toronto Toronto, ON, CANADA kmregan@cs.toronto.edu

More information

Grade 6: Correlated to AGS Basic Math Skills

Grade 6: Correlated to AGS Basic Math Skills Grade 6: Correlated to AGS Basic Math Skills Grade 6: Standard 1 Number Sense Students compare and order positive and negative integers, decimals, fractions, and mixed numbers. They find multiples and

More information

Developing a concrete-pictorial-abstract model for negative number arithmetic

Developing a concrete-pictorial-abstract model for negative number arithmetic Developing a concrete-pictorial-abstract model for negative number arithmetic Jai Sharma and Doreen Connor Nottingham Trent University Research findings and assessment results persistently identify negative

More information

Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for

Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for Email Marilyn A. Walker Jeanne C. Fromer Shrikanth Narayanan walker@research.att.com jeannie@ai.mit.edu shri@research.att.com

More information

Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum

Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum Stephen S. Yau, Fellow, IEEE, and Zhaoji Chen Arizona State University, Tempe, AZ 85287-8809 {yau, zhaoji.chen@asu.edu}

More information

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS Václav Kocian, Eva Volná, Michal Janošek, Martin Kotyrba University of Ostrava Department of Informatics and Computers Dvořákova 7,

More information

Major Milestones, Team Activities, and Individual Deliverables

Major Milestones, Team Activities, and Individual Deliverables Major Milestones, Team Activities, and Individual Deliverables Milestone #1: Team Semester Proposal Your team should write a proposal that describes project objectives, existing relevant technology, engineering

More information

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, 2013 10.12753/2066-026X-13-154 DATA MINING SOLUTIONS FOR DETERMINING STUDENT'S PROFILE Adela BÂRA,

More information

BADM 641 (sec. 7D1) (on-line) Decision Analysis August 16 October 6, 2017 CRN: 83777

BADM 641 (sec. 7D1) (on-line) Decision Analysis August 16 October 6, 2017 CRN: 83777 BADM 641 (sec. 7D1) (on-line) Decision Analysis August 16 October 6, 2017 CRN: 83777 SEMESTER: Fall 2017 INSTRUCTOR: Jack Fuller, Ph.D. OFFICE: 108 Business and Economics Building, West Virginia University,

More information

Firms and Markets Saturdays Summer I 2014

Firms and Markets Saturdays Summer I 2014 PRELIMINARY DRAFT VERSION. SUBJECT TO CHANGE. Firms and Markets Saturdays Summer I 2014 Professor Thomas Pugel Office: Room 11-53 KMC E-mail: tpugel@stern.nyu.edu Tel: 212-998-0918 Fax: 212-995-4212 This

More information

SARDNET: A Self-Organizing Feature Map for Sequences

SARDNET: A Self-Organizing Feature Map for Sequences SARDNET: A Self-Organizing Feature Map for Sequences Daniel L. James and Risto Miikkulainen Department of Computer Sciences The University of Texas at Austin Austin, TX 78712 dljames,risto~cs.utexas.edu

More information

CS 1103 Computer Science I Honors. Fall Instructor Muller. Syllabus

CS 1103 Computer Science I Honors. Fall Instructor Muller. Syllabus CS 1103 Computer Science I Honors Fall 2016 Instructor Muller Syllabus Welcome to CS1103. This course is an introduction to the art and science of computer programming and to some of the fundamental concepts

More information

PH.D. IN COMPUTER SCIENCE PROGRAM (POST M.S.)

PH.D. IN COMPUTER SCIENCE PROGRAM (POST M.S.) PH.D. IN COMPUTER SCIENCE PROGRAM (POST M.S.) OVERVIEW ADMISSION REQUIREMENTS PROGRAM REQUIREMENTS OVERVIEW FOR THE PH.D. IN COMPUTER SCIENCE Overview The doctoral program is designed for those students

More information

Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming

Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming Data Mining VI 205 Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming C. Romero, S. Ventura, C. Hervás & P. González Universidad de Córdoba, Campus Universitario de

More information

Word Segmentation of Off-line Handwritten Documents

Word Segmentation of Off-line Handwritten Documents Word Segmentation of Off-line Handwritten Documents Chen Huang and Sargur N. Srihari {chuang5, srihari}@cedar.buffalo.edu Center of Excellence for Document Analysis and Recognition (CEDAR), Department

More information

AGS THE GREAT REVIEW GAME FOR PRE-ALGEBRA (CD) CORRELATED TO CALIFORNIA CONTENT STANDARDS

AGS THE GREAT REVIEW GAME FOR PRE-ALGEBRA (CD) CORRELATED TO CALIFORNIA CONTENT STANDARDS AGS THE GREAT REVIEW GAME FOR PRE-ALGEBRA (CD) CORRELATED TO CALIFORNIA CONTENT STANDARDS 1 CALIFORNIA CONTENT STANDARDS: Chapter 1 ALGEBRA AND WHOLE NUMBERS Algebra and Functions 1.4 Students use algebraic

More information

An Introduction to Simio for Beginners

An Introduction to Simio for Beginners An Introduction to Simio for Beginners C. Dennis Pegden, Ph.D. This white paper is intended to introduce Simio to a user new to simulation. It is intended for the manufacturing engineer, hospital quality

More information

Laboratorio di Intelligenza Artificiale e Robotica

Laboratorio di Intelligenza Artificiale e Robotica Laboratorio di Intelligenza Artificiale e Robotica A.A. 2008-2009 Outline 2 Machine Learning Unsupervised Learning Supervised Learning Reinforcement Learning Genetic Algorithms Genetics-Based Machine Learning

More information

What is beautiful is useful visual appeal and expected information quality

What is beautiful is useful visual appeal and expected information quality What is beautiful is useful visual appeal and expected information quality Thea van der Geest University of Twente T.m.vandergeest@utwente.nl Raymond van Dongelen Noordelijke Hogeschool Leeuwarden Dongelen@nhl.nl

More information

An Introduction to the Minimalist Program

An Introduction to the Minimalist Program An Introduction to the Minimalist Program Luke Smith University of Arizona Summer 2016 Some findings of traditional syntax Human languages vary greatly, but digging deeper, they all have distinct commonalities:

More information

Machine Learning from Garden Path Sentences: The Application of Computational Linguistics

Machine Learning from Garden Path Sentences: The Application of Computational Linguistics Machine Learning from Garden Path Sentences: The Application of Computational Linguistics http://dx.doi.org/10.3991/ijet.v9i6.4109 J.L. Du 1, P.F. Yu 1 and M.L. Li 2 1 Guangdong University of Foreign Studies,

More information

A Case Study: News Classification Based on Term Frequency

A Case Study: News Classification Based on Term Frequency A Case Study: News Classification Based on Term Frequency Petr Kroha Faculty of Computer Science University of Technology 09107 Chemnitz Germany kroha@informatik.tu-chemnitz.de Ricardo Baeza-Yates Center

More information

Cooperative evolutive concept learning: an empirical study

Cooperative evolutive concept learning: an empirical study Cooperative evolutive concept learning: an empirical study Filippo Neri University of Piemonte Orientale Dipartimento di Scienze e Tecnologie Avanzate Piazza Ambrosoli 5, 15100 Alessandria AL, Italy Abstract

More information

ACTL5103 Stochastic Modelling For Actuaries. Course Outline Semester 2, 2014

ACTL5103 Stochastic Modelling For Actuaries. Course Outline Semester 2, 2014 UNSW Australia Business School School of Risk and Actuarial Studies ACTL5103 Stochastic Modelling For Actuaries Course Outline Semester 2, 2014 Part A: Course-Specific Information Please consult Part B

More information

The open source development model has unique characteristics that make it in some

The open source development model has unique characteristics that make it in some Is the Development Model Right for Your Organization? A roadmap to open source adoption by Ibrahim Haddad The open source development model has unique characteristics that make it in some instances a superior

More information

Trends in College Pricing

Trends in College Pricing Trends in College Pricing 2009 T R E N D S I N H I G H E R E D U C A T I O N S E R I E S T R E N D S I N H I G H E R E D U C A T I O N S E R I E S Highlights Published Tuition and Fee and Room and Board

More information

Data Integration through Clustering and Finding Statistical Relations - Validation of Approach

Data Integration through Clustering and Finding Statistical Relations - Validation of Approach Data Integration through Clustering and Finding Statistical Relations - Validation of Approach Marek Jaszuk, Teresa Mroczek, and Barbara Fryc University of Information Technology and Management, ul. Sucharskiego

More information

The Good Judgment Project: A large scale test of different methods of combining expert predictions

The Good Judgment Project: A large scale test of different methods of combining expert predictions The Good Judgment Project: A large scale test of different methods of combining expert predictions Lyle Ungar, Barb Mellors, Jon Baron, Phil Tetlock, Jaime Ramos, Sam Swift The University of Pennsylvania

More information

Improving software testing course experience with pair testing pattern. Iyad Alazzam* and Mohammed Akour

Improving software testing course experience with pair testing pattern. Iyad Alazzam* and Mohammed Akour 244 Int. J. Teaching and Case Studies, Vol. 6, No. 3, 2015 Improving software testing course experience with pair testing pattern Iyad lazzam* and Mohammed kour Department of Computer Information Systems,

More information

Visit us at:

Visit us at: White Paper Integrating Six Sigma and Software Testing Process for Removal of Wastage & Optimizing Resource Utilization 24 October 2013 With resources working for extended hours and in a pressurized environment,

More information

Learning From the Past with Experiment Databases

Learning From the Past with Experiment Databases Learning From the Past with Experiment Databases Joaquin Vanschoren 1, Bernhard Pfahringer 2, and Geoff Holmes 2 1 Computer Science Dept., K.U.Leuven, Leuven, Belgium 2 Computer Science Dept., University

More information

Prof. Dr. Hussein I. Anis

Prof. Dr. Hussein I. Anis Curriculum Vitae Prof. Dr. Hussein I. Anis 1 Personal Data Full Name : Hussein Ibrahim Anis Date of Birth : November 20, 1945 Nationality : Egyptian Present Occupation : Professor, Electrical Power & Machines

More information

NCEO Technical Report 27

NCEO Technical Report 27 Home About Publications Special Topics Presentations State Policies Accommodations Bibliography Teleconferences Tools Related Sites Interpreting Trends in the Performance of Special Education Students

More information

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING Yong Sun, a * Colin Fidge b and Lin Ma a a CRC for Integrated Engineering Asset Management, School of Engineering Systems, Queensland

More information

PROCESS USE CASES: USE CASES IDENTIFICATION

PROCESS USE CASES: USE CASES IDENTIFICATION International Conference on Enterprise Information Systems, ICEIS 2007, Volume EIS June 12-16, 2007, Funchal, Portugal. PROCESS USE CASES: USE CASES IDENTIFICATION Pedro Valente, Paulo N. M. Sampaio Distributed

More information

Designing a Computer to Play Nim: A Mini-Capstone Project in Digital Design I

Designing a Computer to Play Nim: A Mini-Capstone Project in Digital Design I Session 1793 Designing a Computer to Play Nim: A Mini-Capstone Project in Digital Design I John Greco, Ph.D. Department of Electrical and Computer Engineering Lafayette College Easton, PA 18042 Abstract

More information

Laboratorio di Intelligenza Artificiale e Robotica

Laboratorio di Intelligenza Artificiale e Robotica Laboratorio di Intelligenza Artificiale e Robotica A.A. 2008-2009 Outline 2 Machine Learning Unsupervised Learning Supervised Learning Reinforcement Learning Genetic Algorithms Genetics-Based Machine Learning

More information

Agent-Based Software Engineering

Agent-Based Software Engineering Agent-Based Software Engineering Learning Guide Information for Students 1. Description Grade Module Máster Universitario en Ingeniería de Software - European Master on Software Engineering Advanced Software

More information

Designing e-learning materials with learning objects

Designing e-learning materials with learning objects Maja Stracenski, M.S. (e-mail: maja.stracenski@zg.htnet.hr) Goran Hudec, Ph. D. (e-mail: ghudec@ttf.hr) Ivana Salopek, B.S. (e-mail: ivana.salopek@ttf.hr) Tekstilno tehnološki fakultet Prilaz baruna Filipovica

More information

Diagnostic Test. Middle School Mathematics

Diagnostic Test. Middle School Mathematics Diagnostic Test Middle School Mathematics Copyright 2010 XAMonline, Inc. All rights reserved. No part of the material protected by this copyright notice may be reproduced or utilized in any form or by

More information

Deploying Agile Practices in Organizations: A Case Study

Deploying Agile Practices in Organizations: A Case Study Copyright: EuroSPI 2005, Will be presented at 9-11 November, Budapest, Hungary Deploying Agile Practices in Organizations: A Case Study Minna Pikkarainen 1, Outi Salo 1, and Jari Still 2 1 VTT Technical

More information

Number of students enrolled in the program in Fall, 2011: 20. Faculty member completing template: Molly Dugan (Date: 1/26/2012)

Number of students enrolled in the program in Fall, 2011: 20. Faculty member completing template: Molly Dugan (Date: 1/26/2012) Program: Journalism Minor Department: Communication Studies Number of students enrolled in the program in Fall, 2011: 20 Faculty member completing template: Molly Dugan (Date: 1/26/2012) Period of reference

More information

A simulated annealing and hill-climbing algorithm for the traveling tournament problem

A simulated annealing and hill-climbing algorithm for the traveling tournament problem European Journal of Operational Research xxx (2005) xxx xxx Discrete Optimization A simulated annealing and hill-climbing algorithm for the traveling tournament problem A. Lim a, B. Rodrigues b, *, X.

More information

New Venture Financing

New Venture Financing New Venture Financing General Course Information: FINC-GB.3373.01-F2017 NEW VENTURE FINANCING Tuesdays/Thursday 1.30-2.50pm Room: TBC Course Overview and Objectives This is a capstone course focusing on

More information

AN EXAMPLE OF THE GOMORY CUTTING PLANE ALGORITHM. max z = 3x 1 + 4x 2. 3x 1 x x x x N 2

AN EXAMPLE OF THE GOMORY CUTTING PLANE ALGORITHM. max z = 3x 1 + 4x 2. 3x 1 x x x x N 2 AN EXAMPLE OF THE GOMORY CUTTING PLANE ALGORITHM Consider the integer programme subject to max z = 3x 1 + 4x 2 3x 1 x 2 12 3x 1 + 11x 2 66 The first linear programming relaxation is subject to x N 2 max

More information

Student Handbook. This handbook was written for the students and participants of the MPI Training Site.

Student Handbook. This handbook was written for the students and participants of the MPI Training Site. Student Handbook This handbook was written for the students and participants of the MPI Training Site. Purpose To enable the active participants of this website easier operation and a thorough understanding

More information

How to Judge the Quality of an Objective Classroom Test

How to Judge the Quality of an Objective Classroom Test How to Judge the Quality of an Objective Classroom Test Technical Bulletin #6 Evaluation and Examination Service The University of Iowa (319) 335-0356 HOW TO JUDGE THE QUALITY OF AN OBJECTIVE CLASSROOM

More information

Computer Science 141: Computing Hardware Course Information Fall 2012

Computer Science 141: Computing Hardware Course Information Fall 2012 Computer Science 141: Computing Hardware Course Information Fall 2012 September 4, 2012 1 Outline The main emphasis of this course is on the basic concepts of digital computing hardware and fundamental

More information

Software Development: Programming Paradigms (SCQF level 8)

Software Development: Programming Paradigms (SCQF level 8) Higher National Unit Specification General information Unit code: HL9V 35 Superclass: CB Publication date: May 2017 Source: Scottish Qualifications Authority Version: 01 Unit purpose This unit is intended

More information

Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition

Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition Todd Holloway Two Lecture Series for B551 November 20 & 27, 2007 Indiana University Outline Introduction Bias and

More information

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC On Human Computer Interaction, HCI Dr. Saif al Zahir Electrical and Computer Engineering Department UBC Human Computer Interaction HCI HCI is the study of people, computer technology, and the ways these

More information

Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant Sudheer Takekar 1 Dr. D.N. Raut 2

Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant Sudheer Takekar 1 Dr. D.N. Raut 2 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 04, 2014 ISSN (online): 2321-0613 Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant

More information

COMPUTER-ASSISTED INDEPENDENT STUDY IN MULTIVARIATE CALCULUS

COMPUTER-ASSISTED INDEPENDENT STUDY IN MULTIVARIATE CALCULUS COMPUTER-ASSISTED INDEPENDENT STUDY IN MULTIVARIATE CALCULUS L. Descalço 1, Paula Carvalho 1, J.P. Cruz 1, Paula Oliveira 1, Dina Seabra 2 1 Departamento de Matemática, Universidade de Aveiro (PORTUGAL)

More information

Lecture 10: Reinforcement Learning

Lecture 10: Reinforcement Learning Lecture 1: Reinforcement Learning Cognitive Systems II - Machine Learning SS 25 Part III: Learning Programs and Strategies Q Learning, Dynamic Programming Lecture 1: Reinforcement Learning p. Motivation

More information

A SURVEY OF FUZZY COGNITIVE MAP LEARNING METHODS

A SURVEY OF FUZZY COGNITIVE MAP LEARNING METHODS A SURVEY OF FUZZY COGNITIVE MAP LEARNING METHODS Wociech Stach, Lukasz Kurgan, and Witold Pedrycz Department of Electrical and Computer Engineering University of Alberta Edmonton, Alberta T6G 2V4, Canada

More information

Reduce the Failure Rate of the Screwing Process with Six Sigma Approach

Reduce the Failure Rate of the Screwing Process with Six Sigma Approach Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Reduce the Failure Rate of the Screwing Process with Six Sigma Approach

More information

MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE

MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE Master of Science (M.S.) Major in Computer Science 1 MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE Major Program The programs in computer science are designed to prepare students for doctoral research,

More information

Program Assessment and Alignment

Program Assessment and Alignment Program Assessment and Alignment Lieutenant Colonel Daniel J. McCarthy, Assistant Professor Lieutenant Colonel Michael J. Kwinn, Jr., PhD, Associate Professor Department of Systems Engineering United States

More information