AN EXACT ARBORESCENT METHOD FOR SOLVING 0-1 KNAPSACK PROBLEM
|
|
- Morgan Webb
- 6 years ago
- Views:
Transcription
1 AN EXACT ARBORESCENT METHOD FOR SOLVING 0-1 KNAPSACK PROBLEM 1. Introduction Our work focuses on the knapsack problem in which we have a set of objects and each one with a weight and a utility. We want to choose a subset of objects which does not exceed the capacity of the bag while ensuring a maximum benefit. This problem takes its name from the situation that confronted a hiker while preparing his trek. It was identified in 1972 as an NP-complete problem among the hardest in combinatorial optimization. From that date until now, many approaches have been proposed. We distinguish: (i) the exact methods that achieve an optimal solution at the expense of long processing time if the problem is of considerable size. (ii) The approximate methods which allow to obtain an approximate solution quickly and not necessarily an optimal one. (iii) The hybrid methods that combine the two types of methods described above to benefit from the advantages they bring. Our work is to propose a new algorithm that is a part of exact methods. This algorithm is BOUAKKAZ FERIEL Badji Mokhtar university,annaba, Algeria BABES MALIKA Badji Mokhtar university,annaba, Algeria ABSTRACT In this paper, we consider the resolution of knapsack problem whose importance is due to the fact that it appears as subproblem in various complex problems. And mainly because it can represent a large number of practical situations as it is found in different sectors such as finance (in portfolio management), industry and telecommunications (in the allocation of frequencies), as well as in computer science (in cryptography, in management process etc.). Our work consists in presenting a new method of resolution based on existing methods. Our exact method is an arborescent one and it has proved its efficiency, especially in terms of saving memory space compared to conventional arborescent methods. Our results will be discussed and analyzed in order to trace properly the contributions of our approach, and also its disadvantage. This will certainly help us in defining the prospects of our work. Keywords: Knapsack problem, Arborescent method, Branch and Bound method, Cryptography, Management process. inspired by the Branch and Bound method and of genetic algorithms. The first one directed us to the representation of the solution space as a tree, while the second one made us realize the advantage of representation in binary solutions. With our method and specifically with the new rules of separation that we set, we were able to reduce significantly the size of the solution s tree. This induced a decrease in time required to achieve the best results. However our method has disadvantages that we suggest to be adjusted in the near future. 2. State of the Art For this problem we have a knapsack with a maximum capacity of W and a set of n objects each one characterized by a weight w i and a utility p i. The goal is to choose among these objects those that maximize the profit while respecting the capacity of the knapsack. The mathematical formulation is as follows [7]: Data of the problem: 167
2 Objective: maximize Under constraints: x i takes the value 1 if the object is added to the bag, and 0 otherwise. The knapsack problem is used to model the following situations: In cryptography: NP-hard version of this problem has been used in primitive and cryptographic protocols, such as the Merkle-Hellman cryptosystem invented in 1978 [9] or the Chor-Rivest cryptosystem invented in 1988 [2]. The asymmetric encryption algorithms based on the knapsack problem were all broken to date, the latest being that of Chor-Rivest that was broken by Schnorr and Horner in 1995, by the technique of network reduction. In support systems for portfolio management: to balance selectivity and diversification in order to find the best balance between risk and return for capital invested in several financial assets. In the loading plane or ferry: all luggage must be brought to destination, without being overloaded; In the materials cutting: to minimize falls at the cutting sections of various lengths in iron bars. The problem defined above is the problem in binary variables (01KP). This is actually a variant among others. The specifications of these variants are done on the field of variables, the number of values of objects, the number of dimensions of the bag, etc. These features can also be combined. These include the problems with continuous variables (LKP) obtained by removing the integrity constraint on the variables. The problem with integer variables in which we consider that we have several copies of each object, we want to find the number of copies to be taken for each object. There are also multidimensional knapsack (d-kp), multiobjective knapsack, quadratic knapsack (QKP) etc. Our work deal with the first variant (the 0-1 knapsack problem). Many studies have aimed to solve this variant since the fifties. The first algorithms were produced by the theory of dynamic programming of Bellman [1]. Danzig has proposed a formula for calculating the upper bound [3]. The year 1967 marked the birth of the first branch-and-bound algorithm [6]. We can also cite the reduction procedure of Ingargiola Korsh [4], the upper bound of Martello and Toth and their branch and bound procedure [8]. Genetic algorithms in 1994 [10] and more recently quantum genetic algorithms [5]. To summarize we can say that in addition to these methods there are many others. However we can enumerate their faults as follow: (i) the exact methods such as dynamic programming and branch-and-bound method are known to be slow in addition of taking a lot of memory space for problems of considerable size (they exploit the solution space in its entirety). (ii) The approximate methods suffer from the problem of solution s quality, but also the difficulty of the parameter s choice we meet in using genetic algorithms, quantum genetic algorithms etc. This brings us to always think about new approaches to solve this difficult problem. This is the purpose of our work. 3. Our method We propose a method of resolution which is an exact arborescent method. A classical arborescent method will list all possible solutions using a binary tree, in which each level represents an object. And the first branch represents the addition of the object in the bag, while for the other branch the object is being removed. The tree is as follow: 168
3 Figure 3. Search tree with half number of nodes. Figure 1. Representation of classic arborescent method. The observation we made on this tree is that if we cut it horizontally at the root, we get at each level two distinct and complementary sets. That is to say that if we have a solution in the first set which contains the subject 1, in the second set there is necessarily a solution with the rest of the objects. On our tree each level corresponds to the object number (level+1): the root (level 0) corresponds to the first object, the second level corresponds to the second object etc. As mentioned above, each node has a solution (black) and its complement (in red). This gives new meaning to the branches: one branch corresponds to the addition (respectively removal) of the object at the next level in the solution (respectively the complement) of the current node. The second branch means that the object has not been added (respectively removed) to the solution (respectively the complement) of the current node. The second object was added to the solution {1}, and removed from the complement {2,3,4}. Figure 2. Sets of representation of classic arborescent method. Following this observation and in order to address one of the disadvantages of arborescent method (the tree can become very large if the number of objects increases), we thought about considering in each node of the tree two solutions instead of one. Each node will then have a solution and its complement which allows us to divide the size of the tree in a half. Figure 4. Meaning of the branches of the tree. In addition to save memory space (the size of the tree is divided into two), this representation also allows us to save time during the evaluation phase of the nodes. We will proceed as follows: evaluate a node of our tree is based on the weight of the solution and the weight of 169
4 the complement, which confronts us on the following four cases: The solution and its complement have a weight less than the capacity of the bag: it is no longer necessary to consider complements (in red) in the coming nodes, as to the complement each branch corresponds to the removal of an object which we can t logically lead to a better solution (in terms of utility) of the current node. The solution and its complement have a weight greater than the capacity of the bag: it is no longer necessary to consider the solutions (in black) in the coming nodes, as the solution for each branch corresponds to adding an object and as the solution has a weight greater than the capacity of the bag, there is no chance to change that. The solution has a weight less than the capacity of the bag but the complement has a weight greater than the bag: we must consider all possibilities, because we have to add objects to the solution as it is possible (we have not exceeded the capacity of the bag), and we must remove the additional objects as they can t all fit in the bag. The solution has a weight greater than the capacity of the bag, unlike its complement: it is no longer necessary to consider the child of this node (stop), because the addition of the object can t be done (the weight of the solution exceeds the capacity of the bag), and the withdrawal of the object will not provide a better solution in terms of utility. To improve more our method, we thought about alternating phases of separation and evaluation, so that each time we create a node it is evaluated and his child are generated according to the four previous cases: we will ultimately have nodes with the solution and its complement, with only solution or with only the complement. There will be also nodes without child. This method will allow us to gain more in memory space and also in execution time, because we no longer have to generate the components that we are sure that we don t need. We have tested our method on the following example. The tree obtained by our method of evaluation is presented below: The capacity of the bag is 14kg. Object Weight Utility Tent Food 3 50 Gourd 7 10 Mosquito 2 12 Table 1. Object s weights and object s values of the example. Figure 5. The tree obtained with our method. 4. Experimentation To implement our resolution method we have used the Java language which is an objectoriented language, and we have used the environment Borland JBuilder 9. The material environment is a laptop equipped with an Intel Pentium processor Dual CPU 1.73GHz and a 1.99 GB of RAM. The experiments are performed on instances generated as follows: The objects weights w i are randomly generated in [1, 10]. The values p i are given as: p i =w i + 5. The capacity of the bag was determined using the average weight of objects. 170
5 Dimension of the instance Capacity of bag (kg) execution (seconds) time distribution reasoning of our method on multiple machines and compare results Table 2. Run Times associated to the tested instances. According to various tests, we found that if the capacity of the bag is close to the average weight of objects, our method is more efficient (the size of the tree is minimal) because we can reach quickly the criteria of judgment of the separation phase. To summarize, our method is an exact method, it is very simple to implement. Its main advantage is that it manipulates a tree that is much smaller than the classic arborescent method (half size of the tree), because of the fact of removing solutions that are considered less effective than the ones already developed. This leads to another advantage of great importance which is the gain in execution time. By observing the behavior of our method, we could also identify the following property: the optimal solution is usually found in the early levels of the tree, this encourages us to think on a heuristic for arresting the development of unnecessary branches after a certain level. After highlighting the qualities and defects of our method, we proposed to implement it on several machines to benefit of resources located on other computers, in order to have better results in terms of execution time and memory space. Currently we use two machines organized in a client/server architecture and share the tasks so that each machine is responsible for evaluating and separating a part of the tree. The results obtained by distributing our method on two computers show improvement in execution time and memory space (the tree is distributed on two machines), which encourages us to generalize the 5. Conclusion The method we proposed has proven itself in terms of saving execution time, and also in terms of reduced memory space. Indeed, it is unusual to dismiss the solutions of a lower efficiency than those already visited. Nevertheless, by testing on instances of considerable size, we faced a problem of memory space. This does not undermine our approach, but rather the ability of the machine that we tested. Indeed, our tree method would need to be tested on machines whose memory is not limited. The work done so far gave birth to the following perspectives: Find solutions to the limitations we have identified in our method. Implement our method on several machines and compare results with those of one machine. Hybridize our method with others, in order to benefit from work already done. Adapt the algorithm realized in real cases (portfolio management, cryptography, frequency allocation etc.). Références [1] Bellman R. Dynamic Programming, Princeton Univercity Press, Princeton, [2] Chor Benny, Rivest Ronald L, A knapsack-type public key cryptosystem based on arithmetic in finite fields, IEEE Transactions on Information Theory 34(5), pp , [3] Dantzig G, Discrete variable extremum problems, Operations Research 5, pp , [4] Ingargiola G.P, Korsh J.F, Reduction algorithm for zero-one single knapsack prpblems, Management Sci. 20, pp ,
6 [5] Kim Y, Kim J, Han K, Quantum-inspired multiobjective evolutionary algorithme for multiobjective 0/1 knapsack problems, In Proceedings of the IEEE Congress on Evolutionary Compution, Vancouver, Canada, pp , [6] Kolesar Peter, A branch and bound algorithm for the knapsack problem, Management Science, Vol. 13 Issue 9, pp. 723, [7] Martello S, Toth P, Knapsack Problems: algorithms and computer implementations, John Wiley & Sons, Chichester, West Sussex, England, [8] Martello S, Toth P, An upper bound for the zero-one knapsack problem and a Branchand-Bound algorithm, European Journal of Operational Research, vol. 1, pp , [9] Merkle Ralph, Hellman Martin, Hiding Information and Signatures in Trapdoor Knapsacks, IEEE Trans. Information Theory 24(5), pp , [10] Zbigniew Michalewicz, Jaroslaw Arabas, Genetic Algorithms for the 0/1 Knapsack Problem, ISMIS '94 Proceedings of the 8th International Symposium on Methodologies for Intelligent Systems, pp ,
Radius STEM Readiness TM
Curriculum Guide Radius STEM Readiness TM While today s teens are surrounded by technology, we face a stark and imminent shortage of graduates pursuing careers in Science, Technology, Engineering, and
More informationMultimedia Application Effective Support of Education
Multimedia Application Effective Support of Education Eva Milková Faculty of Science, University od Hradec Králové, Hradec Králové, Czech Republic eva.mikova@uhk.cz Abstract Multimedia applications have
More informationTHE UNIVERSITY OF SYDNEY Semester 2, Information Sheet for MATH2068/2988 Number Theory and Cryptography
THE UNIVERSITY OF SYDNEY Semester 2, 2017 Information Sheet for MATH2068/2988 Number Theory and Cryptography Websites: It is important that you check the following webpages regularly. Intermediate Mathematics
More informationReinforcement Learning by Comparing Immediate Reward
Reinforcement Learning by Comparing Immediate Reward Punit Pandey DeepshikhaPandey Dr. Shishir Kumar Abstract This paper introduces an approach to Reinforcement Learning Algorithm by comparing their immediate
More informationLearning Methods for Fuzzy Systems
Learning Methods for Fuzzy Systems Rudolf Kruse and Andreas Nürnberger Department of Computer Science, University of Magdeburg Universitätsplatz, D-396 Magdeburg, Germany Phone : +49.39.67.876, Fax : +49.39.67.8
More information(Sub)Gradient Descent
(Sub)Gradient Descent CMSC 422 MARINE CARPUAT marine@cs.umd.edu Figures credit: Piyush Rai Logistics Midterm is on Thursday 3/24 during class time closed book/internet/etc, one page of notes. will include
More informationGACE Computer Science Assessment Test at a Glance
GACE Computer Science Assessment Test at a Glance Updated May 2017 See the GACE Computer Science Assessment Study Companion for practice questions and preparation resources. Assessment Name Computer Science
More informationDesigning a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses
Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses Thomas F.C. Woodhall Masters Candidate in Civil Engineering Queen s University at Kingston,
More informationA Reinforcement Learning Variant for Control Scheduling
A Reinforcement Learning Variant for Control Scheduling Aloke Guha Honeywell Sensor and System Development Center 3660 Technology Drive Minneapolis MN 55417 Abstract We present an algorithm based on reinforcement
More informationProof Theory for Syntacticians
Department of Linguistics Ohio State University Syntax 2 (Linguistics 602.02) January 5, 2012 Logics for Linguistics Many different kinds of logic are directly applicable to formalizing theories in syntax
More informationEvolutive Neural Net Fuzzy Filtering: Basic Description
Journal of Intelligent Learning Systems and Applications, 2010, 2: 12-18 doi:10.4236/jilsa.2010.21002 Published Online February 2010 (http://www.scirp.org/journal/jilsa) Evolutive Neural Net Fuzzy Filtering:
More informationUniversity of Groningen. Systemen, planning, netwerken Bosman, Aart
University of Groningen Systemen, planning, netwerken Bosman, Aart IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document
More informationBeveridge Primary School. One to one laptop computer program for 2018
Beveridge Primary School One to one laptop computer program for 2018 At Beveridge Primary we believe that giving students access to technology will help them engage with learning in new and creative ways.
More informationDelaware Performance Appraisal System Building greater skills and knowledge for educators
Delaware Performance Appraisal System Building greater skills and knowledge for educators DPAS-II Guide for Administrators (Assistant Principals) Guide for Evaluating Assistant Principals Revised August
More informationOCR for Arabic using SIFT Descriptors With Online Failure Prediction
OCR for Arabic using SIFT Descriptors With Online Failure Prediction Andrey Stolyarenko, Nachum Dershowitz The Blavatnik School of Computer Science Tel Aviv University Tel Aviv, Israel Email: stloyare@tau.ac.il,
More informationResearch Article Hybrid Multistarting GA-Tabu Search Method for the Placement of BtB Converters for Korean Metropolitan Ring Grid
Mathematical Problems in Engineering Volume 2016, Article ID 1546753, 9 pages http://dx.doi.org/10.1155/2016/1546753 Research Article Hybrid Multistarting GA-Tabu Search Method for the Placement of BtB
More informationAGENDA LEARNING THEORIES LEARNING THEORIES. Advanced Learning Theories 2/22/2016
AGENDA Advanced Learning Theories Alejandra J. Magana, Ph.D. admagana@purdue.edu Introduction to Learning Theories Role of Learning Theories and Frameworks Learning Design Research Design Dual Coding Theory
More informationModule 12. Machine Learning. Version 2 CSE IIT, Kharagpur
Module 12 Machine Learning 12.1 Instructional Objective The students should understand the concept of learning systems Students should learn about different aspects of a learning system Students should
More informationAustralian Journal of Basic and Applied Sciences
AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean
More informationArtificial Neural Networks written examination
1 (8) Institutionen för informationsteknologi Olle Gällmo Universitetsadjunkt Adress: Lägerhyddsvägen 2 Box 337 751 05 Uppsala Artificial Neural Networks written examination Monday, May 15, 2006 9 00-14
More informationKnowledge-Based - Systems
Knowledge-Based - Systems ; Rajendra Arvind Akerkar Chairman, Technomathematics Research Foundation and Senior Researcher, Western Norway Research institute Priti Srinivas Sajja Sardar Patel University
More informationGiven a directed graph G =(N A), where N is a set of m nodes and A. destination node, implying a direction for ow to follow. Arcs have limitations
4 Interior point algorithms for network ow problems Mauricio G.C. Resende AT&T Bell Laboratories, Murray Hill, NJ 07974-2070 USA Panos M. Pardalos The University of Florida, Gainesville, FL 32611-6595
More informationChinese Language Parsing with Maximum-Entropy-Inspired Parser
Chinese Language Parsing with Maximum-Entropy-Inspired Parser Heng Lian Brown University Abstract The Chinese language has many special characteristics that make parsing difficult. The performance of state-of-the-art
More informationCS Machine Learning
CS 478 - Machine Learning Projects Data Representation Basic testing and evaluation schemes CS 478 Data and Testing 1 Programming Issues l Program in any platform you want l Realize that you will be doing
More informationA cognitive perspective on pair programming
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) December 2006 A cognitive perspective on pair programming Radhika
More informationReducing Features to Improve Bug Prediction
Reducing Features to Improve Bug Prediction Shivkumar Shivaji, E. James Whitehead, Jr., Ram Akella University of California Santa Cruz {shiv,ejw,ram}@soe.ucsc.edu Sunghun Kim Hong Kong University of Science
More informationAQUA: An Ontology-Driven Question Answering System
AQUA: An Ontology-Driven Question Answering System Maria Vargas-Vera, Enrico Motta and John Domingue Knowledge Media Institute (KMI) The Open University, Walton Hall, Milton Keynes, MK7 6AA, United Kingdom.
More informationBluetooth mlearning Applications for the Classroom of the Future
Bluetooth mlearning Applications for the Classroom of the Future Tracey J. Mehigan, Daniel C. Doolan, Sabin Tabirca Department of Computer Science, University College Cork, College Road, Cork, Ireland
More informationEECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ;
EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10 Instructor: Kang G. Shin, 4605 CSE, 763-0391; kgshin@umich.edu Number of credit hours: 4 Class meeting time and room: Regular classes: MW 10:30am noon
More informationFUZZY EXPERT. Dr. Kasim M. Al-Aubidy. Philadelphia University. Computer Eng. Dept February 2002 University of Damascus-Syria
FUZZY EXPERT SYSTEMS 16-18 18 February 2002 University of Damascus-Syria Dr. Kasim M. Al-Aubidy Computer Eng. Dept. Philadelphia University What is Expert Systems? ES are computer programs that emulate
More informationCarter M. Mast. Participants: Peter Mackenzie-Helnwein, Pedro Arduino, and Greg Miller. 6 th MPM Workshop Albuquerque, New Mexico August 9-10, 2010
Representing Arbitrary Bounding Surfaces in the Material Point Method Carter M. Mast 6 th MPM Workshop Albuquerque, New Mexico August 9-10, 2010 Participants: Peter Mackenzie-Helnwein, Pedro Arduino, and
More informationProbabilistic Latent Semantic Analysis
Probabilistic Latent Semantic Analysis Thomas Hofmann Presentation by Ioannis Pavlopoulos & Andreas Damianou for the course of Data Mining & Exploration 1 Outline Latent Semantic Analysis o Need o Overview
More informationSeminar - Organic Computing
Seminar - Organic Computing Self-Organisation of OC-Systems Markus Franke 25.01.2006 Typeset by FoilTEX Timetable 1. Overview 2. Characteristics of SO-Systems 3. Concern with Nature 4. Design-Concepts
More informationWorkload Policy Department of Art and Art History Revised 5/2/2007
Workload Policy Department of Art and Art History Revised 5/2/2007 Workload expectations for faculty in the Department of Art and Art History, in the areas of teaching, research, and service, must be consistent
More informationTest Effort Estimation Using Neural Network
J. Software Engineering & Applications, 2010, 3: 331-340 doi:10.4236/jsea.2010.34038 Published Online April 2010 (http://www.scirp.org/journal/jsea) 331 Chintala Abhishek*, Veginati Pavan Kumar, Harish
More informationObjectives. Chapter 2: The Representation of Knowledge. Expert Systems: Principles and Programming, Fourth Edition
Chapter 2: The Representation of Knowledge Expert Systems: Principles and Programming, Fourth Edition Objectives Introduce the study of logic Learn the difference between formal logic and informal logic
More informationAutomating the E-learning Personalization
Automating the E-learning Personalization Fathi Essalmi 1, Leila Jemni Ben Ayed 1, Mohamed Jemni 1, Kinshuk 2, and Sabine Graf 2 1 The Research Laboratory of Technologies of Information and Communication
More informationSelf Study Report Computer Science
Computer Science undergraduate students have access to undergraduate teaching, and general computing facilities in three buildings. Two large classrooms are housed in the Davis Centre, which hold about
More informationRule-based Expert Systems
Rule-based Expert Systems What is knowledge? is a theoretical or practical understanding of a subject or a domain. is also the sim of what is currently known, and apparently knowledge is power. Those who
More informationRule Learning With Negation: Issues Regarding Effectiveness
Rule Learning With Negation: Issues Regarding Effectiveness S. Chua, F. Coenen, G. Malcolm University of Liverpool Department of Computer Science, Ashton Building, Ashton Street, L69 3BX Liverpool, United
More informationSoftware Maintenance
1 What is Software Maintenance? Software Maintenance is a very broad activity that includes error corrections, enhancements of capabilities, deletion of obsolete capabilities, and optimization. 2 Categories
More informationMGT/MGP/MGB 261: Investment Analysis
UNIVERSITY OF CALIFORNIA, DAVIS GRADUATE SCHOOL OF MANAGEMENT SYLLABUS for Fall 2014 MGT/MGP/MGB 261: Investment Analysis Daytime MBA: Tu 12:00p.m. - 3:00 p.m. Location: 1302 Gallagher (CRN: 51489) Sacramento
More informationRegret-based Reward Elicitation for Markov Decision Processes
444 REGAN & BOUTILIER UAI 2009 Regret-based Reward Elicitation for Markov Decision Processes Kevin Regan Department of Computer Science University of Toronto Toronto, ON, CANADA kmregan@cs.toronto.edu
More informationGrade 6: Correlated to AGS Basic Math Skills
Grade 6: Correlated to AGS Basic Math Skills Grade 6: Standard 1 Number Sense Students compare and order positive and negative integers, decimals, fractions, and mixed numbers. They find multiples and
More informationDeveloping a concrete-pictorial-abstract model for negative number arithmetic
Developing a concrete-pictorial-abstract model for negative number arithmetic Jai Sharma and Doreen Connor Nottingham Trent University Research findings and assessment results persistently identify negative
More informationLearning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for
Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for Email Marilyn A. Walker Jeanne C. Fromer Shrikanth Narayanan walker@research.att.com jeannie@ai.mit.edu shri@research.att.com
More informationSoftware Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum
Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum Stephen S. Yau, Fellow, IEEE, and Zhaoji Chen Arizona State University, Tempe, AZ 85287-8809 {yau, zhaoji.chen@asu.edu}
More informationOPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS
OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS Václav Kocian, Eva Volná, Michal Janošek, Martin Kotyrba University of Ostrava Department of Informatics and Computers Dvořákova 7,
More informationMajor Milestones, Team Activities, and Individual Deliverables
Major Milestones, Team Activities, and Individual Deliverables Milestone #1: Team Semester Proposal Your team should write a proposal that describes project objectives, existing relevant technology, engineering
More informationThe 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X
The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, 2013 10.12753/2066-026X-13-154 DATA MINING SOLUTIONS FOR DETERMINING STUDENT'S PROFILE Adela BÂRA,
More informationBADM 641 (sec. 7D1) (on-line) Decision Analysis August 16 October 6, 2017 CRN: 83777
BADM 641 (sec. 7D1) (on-line) Decision Analysis August 16 October 6, 2017 CRN: 83777 SEMESTER: Fall 2017 INSTRUCTOR: Jack Fuller, Ph.D. OFFICE: 108 Business and Economics Building, West Virginia University,
More informationFirms and Markets Saturdays Summer I 2014
PRELIMINARY DRAFT VERSION. SUBJECT TO CHANGE. Firms and Markets Saturdays Summer I 2014 Professor Thomas Pugel Office: Room 11-53 KMC E-mail: tpugel@stern.nyu.edu Tel: 212-998-0918 Fax: 212-995-4212 This
More informationSARDNET: A Self-Organizing Feature Map for Sequences
SARDNET: A Self-Organizing Feature Map for Sequences Daniel L. James and Risto Miikkulainen Department of Computer Sciences The University of Texas at Austin Austin, TX 78712 dljames,risto~cs.utexas.edu
More informationCS 1103 Computer Science I Honors. Fall Instructor Muller. Syllabus
CS 1103 Computer Science I Honors Fall 2016 Instructor Muller Syllabus Welcome to CS1103. This course is an introduction to the art and science of computer programming and to some of the fundamental concepts
More informationPH.D. IN COMPUTER SCIENCE PROGRAM (POST M.S.)
PH.D. IN COMPUTER SCIENCE PROGRAM (POST M.S.) OVERVIEW ADMISSION REQUIREMENTS PROGRAM REQUIREMENTS OVERVIEW FOR THE PH.D. IN COMPUTER SCIENCE Overview The doctoral program is designed for those students
More informationRule discovery in Web-based educational systems using Grammar-Based Genetic Programming
Data Mining VI 205 Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming C. Romero, S. Ventura, C. Hervás & P. González Universidad de Córdoba, Campus Universitario de
More informationWord Segmentation of Off-line Handwritten Documents
Word Segmentation of Off-line Handwritten Documents Chen Huang and Sargur N. Srihari {chuang5, srihari}@cedar.buffalo.edu Center of Excellence for Document Analysis and Recognition (CEDAR), Department
More informationAGS THE GREAT REVIEW GAME FOR PRE-ALGEBRA (CD) CORRELATED TO CALIFORNIA CONTENT STANDARDS
AGS THE GREAT REVIEW GAME FOR PRE-ALGEBRA (CD) CORRELATED TO CALIFORNIA CONTENT STANDARDS 1 CALIFORNIA CONTENT STANDARDS: Chapter 1 ALGEBRA AND WHOLE NUMBERS Algebra and Functions 1.4 Students use algebraic
More informationAn Introduction to Simio for Beginners
An Introduction to Simio for Beginners C. Dennis Pegden, Ph.D. This white paper is intended to introduce Simio to a user new to simulation. It is intended for the manufacturing engineer, hospital quality
More informationLaboratorio di Intelligenza Artificiale e Robotica
Laboratorio di Intelligenza Artificiale e Robotica A.A. 2008-2009 Outline 2 Machine Learning Unsupervised Learning Supervised Learning Reinforcement Learning Genetic Algorithms Genetics-Based Machine Learning
More informationWhat is beautiful is useful visual appeal and expected information quality
What is beautiful is useful visual appeal and expected information quality Thea van der Geest University of Twente T.m.vandergeest@utwente.nl Raymond van Dongelen Noordelijke Hogeschool Leeuwarden Dongelen@nhl.nl
More informationAn Introduction to the Minimalist Program
An Introduction to the Minimalist Program Luke Smith University of Arizona Summer 2016 Some findings of traditional syntax Human languages vary greatly, but digging deeper, they all have distinct commonalities:
More informationMachine Learning from Garden Path Sentences: The Application of Computational Linguistics
Machine Learning from Garden Path Sentences: The Application of Computational Linguistics http://dx.doi.org/10.3991/ijet.v9i6.4109 J.L. Du 1, P.F. Yu 1 and M.L. Li 2 1 Guangdong University of Foreign Studies,
More informationA Case Study: News Classification Based on Term Frequency
A Case Study: News Classification Based on Term Frequency Petr Kroha Faculty of Computer Science University of Technology 09107 Chemnitz Germany kroha@informatik.tu-chemnitz.de Ricardo Baeza-Yates Center
More informationCooperative evolutive concept learning: an empirical study
Cooperative evolutive concept learning: an empirical study Filippo Neri University of Piemonte Orientale Dipartimento di Scienze e Tecnologie Avanzate Piazza Ambrosoli 5, 15100 Alessandria AL, Italy Abstract
More informationACTL5103 Stochastic Modelling For Actuaries. Course Outline Semester 2, 2014
UNSW Australia Business School School of Risk and Actuarial Studies ACTL5103 Stochastic Modelling For Actuaries Course Outline Semester 2, 2014 Part A: Course-Specific Information Please consult Part B
More informationThe open source development model has unique characteristics that make it in some
Is the Development Model Right for Your Organization? A roadmap to open source adoption by Ibrahim Haddad The open source development model has unique characteristics that make it in some instances a superior
More informationTrends in College Pricing
Trends in College Pricing 2009 T R E N D S I N H I G H E R E D U C A T I O N S E R I E S T R E N D S I N H I G H E R E D U C A T I O N S E R I E S Highlights Published Tuition and Fee and Room and Board
More informationData Integration through Clustering and Finding Statistical Relations - Validation of Approach
Data Integration through Clustering and Finding Statistical Relations - Validation of Approach Marek Jaszuk, Teresa Mroczek, and Barbara Fryc University of Information Technology and Management, ul. Sucharskiego
More informationThe Good Judgment Project: A large scale test of different methods of combining expert predictions
The Good Judgment Project: A large scale test of different methods of combining expert predictions Lyle Ungar, Barb Mellors, Jon Baron, Phil Tetlock, Jaime Ramos, Sam Swift The University of Pennsylvania
More informationImproving software testing course experience with pair testing pattern. Iyad Alazzam* and Mohammed Akour
244 Int. J. Teaching and Case Studies, Vol. 6, No. 3, 2015 Improving software testing course experience with pair testing pattern Iyad lazzam* and Mohammed kour Department of Computer Information Systems,
More informationVisit us at:
White Paper Integrating Six Sigma and Software Testing Process for Removal of Wastage & Optimizing Resource Utilization 24 October 2013 With resources working for extended hours and in a pressurized environment,
More informationLearning From the Past with Experiment Databases
Learning From the Past with Experiment Databases Joaquin Vanschoren 1, Bernhard Pfahringer 2, and Geoff Holmes 2 1 Computer Science Dept., K.U.Leuven, Leuven, Belgium 2 Computer Science Dept., University
More informationProf. Dr. Hussein I. Anis
Curriculum Vitae Prof. Dr. Hussein I. Anis 1 Personal Data Full Name : Hussein Ibrahim Anis Date of Birth : November 20, 1945 Nationality : Egyptian Present Occupation : Professor, Electrical Power & Machines
More informationNCEO Technical Report 27
Home About Publications Special Topics Presentations State Policies Accommodations Bibliography Teleconferences Tools Related Sites Interpreting Trends in the Performance of Special Education Students
More informationA GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING
A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING Yong Sun, a * Colin Fidge b and Lin Ma a a CRC for Integrated Engineering Asset Management, School of Engineering Systems, Queensland
More informationPROCESS USE CASES: USE CASES IDENTIFICATION
International Conference on Enterprise Information Systems, ICEIS 2007, Volume EIS June 12-16, 2007, Funchal, Portugal. PROCESS USE CASES: USE CASES IDENTIFICATION Pedro Valente, Paulo N. M. Sampaio Distributed
More informationDesigning a Computer to Play Nim: A Mini-Capstone Project in Digital Design I
Session 1793 Designing a Computer to Play Nim: A Mini-Capstone Project in Digital Design I John Greco, Ph.D. Department of Electrical and Computer Engineering Lafayette College Easton, PA 18042 Abstract
More informationLaboratorio di Intelligenza Artificiale e Robotica
Laboratorio di Intelligenza Artificiale e Robotica A.A. 2008-2009 Outline 2 Machine Learning Unsupervised Learning Supervised Learning Reinforcement Learning Genetic Algorithms Genetics-Based Machine Learning
More informationAgent-Based Software Engineering
Agent-Based Software Engineering Learning Guide Information for Students 1. Description Grade Module Máster Universitario en Ingeniería de Software - European Master on Software Engineering Advanced Software
More informationDesigning e-learning materials with learning objects
Maja Stracenski, M.S. (e-mail: maja.stracenski@zg.htnet.hr) Goran Hudec, Ph. D. (e-mail: ghudec@ttf.hr) Ivana Salopek, B.S. (e-mail: ivana.salopek@ttf.hr) Tekstilno tehnološki fakultet Prilaz baruna Filipovica
More informationDiagnostic Test. Middle School Mathematics
Diagnostic Test Middle School Mathematics Copyright 2010 XAMonline, Inc. All rights reserved. No part of the material protected by this copyright notice may be reproduced or utilized in any form or by
More informationDeploying Agile Practices in Organizations: A Case Study
Copyright: EuroSPI 2005, Will be presented at 9-11 November, Budapest, Hungary Deploying Agile Practices in Organizations: A Case Study Minna Pikkarainen 1, Outi Salo 1, and Jari Still 2 1 VTT Technical
More informationNumber of students enrolled in the program in Fall, 2011: 20. Faculty member completing template: Molly Dugan (Date: 1/26/2012)
Program: Journalism Minor Department: Communication Studies Number of students enrolled in the program in Fall, 2011: 20 Faculty member completing template: Molly Dugan (Date: 1/26/2012) Period of reference
More informationA simulated annealing and hill-climbing algorithm for the traveling tournament problem
European Journal of Operational Research xxx (2005) xxx xxx Discrete Optimization A simulated annealing and hill-climbing algorithm for the traveling tournament problem A. Lim a, B. Rodrigues b, *, X.
More informationNew Venture Financing
New Venture Financing General Course Information: FINC-GB.3373.01-F2017 NEW VENTURE FINANCING Tuesdays/Thursday 1.30-2.50pm Room: TBC Course Overview and Objectives This is a capstone course focusing on
More informationAN EXAMPLE OF THE GOMORY CUTTING PLANE ALGORITHM. max z = 3x 1 + 4x 2. 3x 1 x x x x N 2
AN EXAMPLE OF THE GOMORY CUTTING PLANE ALGORITHM Consider the integer programme subject to max z = 3x 1 + 4x 2 3x 1 x 2 12 3x 1 + 11x 2 66 The first linear programming relaxation is subject to x N 2 max
More informationStudent Handbook. This handbook was written for the students and participants of the MPI Training Site.
Student Handbook This handbook was written for the students and participants of the MPI Training Site. Purpose To enable the active participants of this website easier operation and a thorough understanding
More informationHow to Judge the Quality of an Objective Classroom Test
How to Judge the Quality of an Objective Classroom Test Technical Bulletin #6 Evaluation and Examination Service The University of Iowa (319) 335-0356 HOW TO JUDGE THE QUALITY OF AN OBJECTIVE CLASSROOM
More informationComputer Science 141: Computing Hardware Course Information Fall 2012
Computer Science 141: Computing Hardware Course Information Fall 2012 September 4, 2012 1 Outline The main emphasis of this course is on the basic concepts of digital computing hardware and fundamental
More informationSoftware Development: Programming Paradigms (SCQF level 8)
Higher National Unit Specification General information Unit code: HL9V 35 Superclass: CB Publication date: May 2017 Source: Scottish Qualifications Authority Version: 01 Unit purpose This unit is intended
More informationIntroduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition
Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition Todd Holloway Two Lecture Series for B551 November 20 & 27, 2007 Indiana University Outline Introduction Bias and
More informationOn Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC
On Human Computer Interaction, HCI Dr. Saif al Zahir Electrical and Computer Engineering Department UBC Human Computer Interaction HCI HCI is the study of people, computer technology, and the ways these
More informationUtilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant Sudheer Takekar 1 Dr. D.N. Raut 2
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 04, 2014 ISSN (online): 2321-0613 Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant
More informationCOMPUTER-ASSISTED INDEPENDENT STUDY IN MULTIVARIATE CALCULUS
COMPUTER-ASSISTED INDEPENDENT STUDY IN MULTIVARIATE CALCULUS L. Descalço 1, Paula Carvalho 1, J.P. Cruz 1, Paula Oliveira 1, Dina Seabra 2 1 Departamento de Matemática, Universidade de Aveiro (PORTUGAL)
More informationLecture 10: Reinforcement Learning
Lecture 1: Reinforcement Learning Cognitive Systems II - Machine Learning SS 25 Part III: Learning Programs and Strategies Q Learning, Dynamic Programming Lecture 1: Reinforcement Learning p. Motivation
More informationA SURVEY OF FUZZY COGNITIVE MAP LEARNING METHODS
A SURVEY OF FUZZY COGNITIVE MAP LEARNING METHODS Wociech Stach, Lukasz Kurgan, and Witold Pedrycz Department of Electrical and Computer Engineering University of Alberta Edmonton, Alberta T6G 2V4, Canada
More informationReduce the Failure Rate of the Screwing Process with Six Sigma Approach
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Reduce the Failure Rate of the Screwing Process with Six Sigma Approach
More informationMASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE
Master of Science (M.S.) Major in Computer Science 1 MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE Major Program The programs in computer science are designed to prepare students for doctoral research,
More informationProgram Assessment and Alignment
Program Assessment and Alignment Lieutenant Colonel Daniel J. McCarthy, Assistant Professor Lieutenant Colonel Michael J. Kwinn, Jr., PhD, Associate Professor Department of Systems Engineering United States
More information