CS 6604: Data Mining Large Networks and Time-Series
|
|
- Bruno Barrett
- 5 years ago
- Views:
Transcription
1 CS 6604: Data Mining Large Networks and Time-Series Pratik Anand Lecture 10/18: Community Detection Prof. B Aditya Prakash
2 Agenda Background Strong and weak ties, EB and G-N, cut and conductance Spectral clustering Laplacian matrix and properties Normalized graph laplacian and unnormalized spectral clustering algorithm Higher order organization of complex networks Motifs Conductance of motifs Spectral clustering of motifs Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 2
3 Background Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 3
4 Community Behavior Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 4
5 Need for community detection Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 5
6 Need for community detection Provides a bigger picture of a large complex network Different communities act similarly Facebook, Twitter communities can help spot the origin of fake news Targeted advertisement to communities NSA!!! Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 6
7 Strong and Weak ties Strong ties - ties between friends and family members Weak ties - ties between colleagues, acquaintances Strong Triadic closure Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 7
8 Defining ties Different view of the same set of points by different criteria of putting edge between two nodes This results in different kind of strong ties Overlapping sections Removal of bridges results in clusters Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 8
9 Betweenness of an edge (EB) Total unit flow flowing through an edge 7,7 Used by Girvan - Newman method to partition a graph Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 9
10 Girvan - Newman method Remove edges with highest EBs Recalculate per node EB and repeat above Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 10
11 Cuts and Conductance Goal : Split a graph into different clusters with different weights Min cut : Minimizing the weight between two subgraphs Balanced cuts Ratio cut for k partitions N-cut for k partitions NP - hard Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 11
12 SPECTRAL CLUSTERING Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 12
13 Spectral Clustering More efficient than traditional algorithms like k-means Provides better results, easier to implement Works on Laplacian matrix of similarity graph Similarity graphs usually created by different methods like k- means, ε-neighborhood graph Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 13
14 Laplacian matrix L = D - W Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 14
15 Properties of Unnormalized Graph Laplacian Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 15
16 Normalized Graph Laplacian Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 16
17 The algorithm v1 Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 17
18 The algorithm v2 Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 18
19 Visual representation Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 19
20 Combining it all : Higher-Order Organization of Complex Networks Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 20
21 Finding Higher-order structures Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 21
22 Motifs Small subgraphs which are building blocks of all networks Earlier works based on frequency count of subgraphs Identifying results in understanding of overall structure which leads to accurate clustering Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 22
23 Identifying motifs in networks Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 23
24 Applying Conductance to Motifs Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 24
25 Clustering Find a set of node which minimizes motif conductance Such nodes become a cluster Problem? : It is computationally NP-hard Solution? Applying spectral clustering to motifs Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 25
26 Motif Spectral Clustering Input : Graph G and motif M Weighted graph G using the motif M to create motif adjacency matrix Spectral clustering on G Output : Clusters of original graph G with lowest motif conductance Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 26
27 Different phases of motif clustering Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 27
28 Problem Higher-order spectral analysis of a network of airports in Canada and the United States Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 28
29 Part A Motifs, anchored at blue nodes Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 29
30 Part B Top 50 most populous cities in the US Thicker lines represent weight in motif adjacency matrix Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 30
31 Part C Green - hubs Red - West coast nonhubs Purple - East coast nonhubs Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 31
32 Part D : Comparision Higher-order Laplacian Non -Higher-order Laplacian Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 32
33 Conclusion Spectral clustering is an effective technique Motifs are enablers to apply spectral clustering to unweighted graphs Clusters provide a macroscopic behavior of nodes in a network Motifs can be applied to large variety of networks like social network, transportation network Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 33
34 THANK YOU Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 34
Social Network Analysis in HCI
Social Network Analysis in HCI Derek L. Hansen and Marc A. Smith Marigold Bays-Muchmore (baysmuc2) Hang Cui (hangcui2) Contents Introduction ---------------- What is Social Network Analysis? How does it
More informationCommunity Detection and Labeling Nodes
and Labeling Nodes Hao Chen Department of Statistics, Stanford Jan. 25, 2011 (Department of Statistics, Stanford) Community Detection and Labeling Nodes Jan. 25, 2011 1 / 9 Community Detection - Network:
More informationProblem Set 4 Due: Wednesday, November 12th, 2014
6.890: Algorithmic Lower Bounds Prof. Erik Demaine Fall 2014 Problem Set 4 Due: Wednesday, November 12th, 2014 Problem 1. Given a graph G = (V, E), a connected dominating set D V is a set of vertices such
More informationAlexandre Fréchette, Neil Newman, Kevin Leyton-Brown
Solving the Station Repacking Problem Alexandre Fréchette, Neil Newman, Kevin Leyton-Brown Agenda Background Problem Novel Approach Experimental Results Background A Brief History Spectrum rights have
More informationVesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham
Towards the Automatic Design of More Efficient Digital Circuits Vesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham
More informationAdvanced Data Visualization
Advanced Data Visualization CS 6965 Spring 2018 Prof. Bei Wang Phillips University of Utah Lecture 22 Foundations for Network Visualization NV MOTIVATION Foundations for Network Visualization & Analysis
More informationSocial Network Analysis and Its Developments
2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Social Network Analysis and Its Developments DENG Xiaoxiao 1 MAO Guojun 2 1 Macau University of Science
More informationModeling, Analysis and Optimization of Networks. Alberto Ceselli
Modeling, Analysis and Optimization of Networks Alberto Ceselli alberto.ceselli@unimi.it Università degli Studi di Milano Dipartimento di Informatica Doctoral School in Computer Science A.A. 2015/2016
More informationLecture 22 [the second ½]: Standards, protocols and regulations in Architecting Engineering Systems
Lecture 22 [the second ½]: Standards, protocols and regulations in Architecting Engineering Systems ESD 342 May 2, 2006 Page 1 Learning Objectives Appreciate the critical role of standards in architecting
More informationSocial Network Theory and Applications
Social Network Theory and Applications Leonid E. Zhukov School of Applied Mathematics and Information Science National Research University Higher School of Economics 13.01.2014 Leonid E. Zhukov (HSE) Lecture
More informationTransportation and The Small World
Aaron Valente Transportation and The Small World Networks are the fabric that holds the very system of our lives together. From the bus we took to school as a child to the subway system we take to the
More informationVisualizations of personal social networks on Facebook and community structure: an exploratory study
European Journal of Social Behaviour 2 (1): 21-30, 2015 ISSN 2408-0292 Visualizations of personal social networks on Facebook and community structure: an exploratory study Published online: 30 June 2015
More informationLecture 13 Register Allocation: Coalescing
Lecture 13 Register llocation: Coalescing I. Motivation II. Coalescing Overview III. lgorithms: Simple & Safe lgorithm riggs lgorithm George s lgorithm Phillip. Gibbons 15-745: Register Coalescing 1 Review:
More informationGateways Placement in Backbone Wireless Mesh Networks
I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract
More informationNetwork Layer (Routing)
Network Layer (Routing) Where we are in the ourse Moving on up to the Network Layer! Application Transport Network Link Physical SE 61 University of Washington Topics Network service models Datagrams (packets),
More informationCSC 396 : Introduction to Artificial Intelligence
CSC 396 : Introduction to Artificial Intelligence Exam 1 March 11th - 13th, 2008 Name Signature - Honor Code This is a take-home exam. You may use your book and lecture notes from class. You many not use
More informationPrivacy at the communication layer
Privacy at the communication layer The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability David Chaum 1988 CS-721 Carmela Troncoso http://carmelatroncoso.com/ (borrowed slides
More informationMeme Tracking. Abhilash Chowdhary CS-6604 Dec. 1, 2015
Meme Tracking Abhilash Chowdhary CS-6604 Dec. 1, 2015 Overview Introduction Information Spread Meme Tracking Part 1 : Rise and Fall Patterns of Information Diffusion: Model and Implications Part 2 : NIFTY:
More informationCheckpoint Questions Due Monday, October 7 at 2:15 PM Remaining Questions Due Friday, October 11 at 2:15 PM
CS13 Handout 8 Fall 13 October 4, 13 Problem Set This second problem set is all about induction and the sheer breadth of applications it entails. By the time you're done with this problem set, you will
More informationMITOCW R13. Breadth-First Search (BFS)
MITOCW R13. Breadth-First Search (BFS) The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources
More informationSocial network Analysis: small world phenomenon and decentralized search
Social network Analysis: small world phenomenon and decentralized search Donglei Du Faculty of Business Administration, University of New Brunswick, NB Canada Fredericton E3B 9Y2 (ddu@unb.ca) Du (UNB)
More informationAIMA 3.5. Smarter Search. David Cline
AIMA 3.5 Smarter Search David Cline Uninformed search Depth-first Depth-limited Iterative deepening Breadth-first Bidirectional search None of these searches take into account how close you are to the
More informationData Visualisation. Jingpeng Li. Data Visualisation
Data Visualisation Jingpeng Li 1 of 28 Data Visualisation Our eyes are very good at data mining We can spot patterns, trends and clusters instantly in plotted data Problems begin when data covers more
More informationCentaur: Locating Devices in an Office Environment
Centaur: Locating Devices in an Office Environment MobiCom 12 August 2012 IN4316 Seminar Wireless Sensor Networks Javier Hernando Bravo September 29 th, 2012 1 2 LOCALIZATION TECHNIQUES Based on Models
More informationParallel Dynamic and Selective Community Detection in Massive Streaming Graphs
Parallel Dynamic and Selective Community Detection in Massive Streaming Graphs European Conference on Data Analysis 2013, Luxembourg July 11, 2013 Christian L. Staudt, Yassine Marrakchi, Aleksejs Sazonovs
More informationMRN -4 Frequency Reuse
Politecnico di Milano Facoltà di Ingegneria dell Informazione MRN -4 Frequency Reuse Mobile Radio Networks Prof. Antonio Capone Assignment of channels to cells o The multiple access technique in cellular
More informationA Little Graph Theory for the Busy Developer. Dr. Jim Webber Chief Scientist, Neo
A Little Graph Theory for the Busy Developer Dr. Jim Webber Chief Scientist, Neo Technology @jimwebber Roadmap Imprisoned data Labeled Property Graph Model And some cultural similarities Graph theory South
More informationSection Marks Agents / 8. Search / 10. Games / 13. Logic / 15. Total / 46
Name: CS 331 Midterm Spring 2017 You have 50 minutes to complete this midterm. You are only allowed to use your textbook, your notes, your assignments and solutions to those assignments during this midterm.
More informationA SIGNAL DRIVEN LARGE MOS-CAPACITOR CIRCUIT SIMULATOR
A SIGNAL DRIVEN LARGE MOS-CAPACITOR CIRCUIT SIMULATOR Janusz A. Starzyk and Ying-Wei Jan Electrical Engineering and Computer Science, Ohio University, Athens Ohio, 45701 A designated contact person Prof.
More information0:00:00.919,0:00: this is. 0:00:05.630,0:00: common core state standards support video for mathematics
0:00:00.919,0:00:05.630 this is 0:00:05.630,0:00:09.259 common core state standards support video for mathematics 0:00:09.259,0:00:11.019 standard five n f 0:00:11.019,0:00:13.349 four a this standard
More informationAnalysis of Data Mining Methods for Social Media
65 Analysis of Data Mining Methods for Social Media Keshav S Rawat Department of Computer Science & Informatics, Central university of Himachal Pradesh Dharamshala (Himachal Pradesh) Email:Keshav79699@gmail.com
More informationLower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings
ÂÓÙÖÒÐ Ó ÖÔ ÐÓÖØÑ Ò ÔÔÐØÓÒ ØØÔ»»ÛÛÛº ºÖÓÛÒºÙ»ÔÙÐØÓÒ»» vol.?, no.?, pp. 1 44 (????) Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings David R. Wood School of Computer Science
More informationConstructing K-Connected M-Dominating Sets
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona State University University of Florida Outline Introduction
More informationLecture 20 November 13, 2014
6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 2014 Prof. Erik Demaine Lecture 20 November 13, 2014 Scribes: Chennah Heroor 1 Overview This lecture completes our lectures on game characterization.
More informationCOMPONENTS: No token counts are meant to be limited. If you run out, find more.
Founders of Gloomhaven In the age after the Demon War, the continent enjoys a period of prosperity. Humans have made peace with the Valrath and Inox, and Quatryls and Orchids arrive from across the Misty
More informationCOS 402 Machine Learning and Artificial Intelligence Fall Lecture 1: Intro
COS 402 Machine Learning and Artificial Intelligence Fall 2016 Lecture 1: Intro Sanjeev Arora Elad Hazan Today s Agenda Defining intelligence and AI state-of-the-art, goals Course outline AI by introspection
More informationSOFT 437. Software Performance Analysis. Software Execution Model. Chapter 4: Software Execution Model
SOFT 437 Software Performance Analysis Chapter 4: Software Execution Model Software Execution Model Constructed early in the development process to ensure that the software architecture chosen can make
More informationTopology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1
Topology Control Chapter 3 Ad Hoc and Sensor Networks Roger Wattenhofer 3/1 Inventory Tracking (Cargo Tracking) Current tracking systems require lineof-sight to satellite. Count and locate containers Search
More informationLink State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01
Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic
More informationConstraint Satisfaction Problems: Formulation
Constraint Satisfaction Problems: Formulation Slides adapted from: 6.0 Tomas Lozano Perez and AIMA Stuart Russell & Peter Norvig Brian C. Williams 6.0- September 9 th, 00 Reading Assignments: Much of the
More informationMining Heterogeneous Network
Mining Heterogeneous Network Clustering and Ranking Jiatu Shi Data Mining Lab@UESTC April 13, 2015 Jiatu Shi (Data Mining Lab@UESTC) Mining Heterogeneous Network April 13, 2015 1 / 23 Outline 1 Introduction
More informationAchieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters
Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Scott Watson, Andrew Vardy, Wolfgang Banzhaf Department of Computer Science Memorial University of Newfoundland St John s.
More informationDiscrete Fourier Transform (DFT)
Amplitude Amplitude Discrete Fourier Transform (DFT) DFT transforms the time domain signal samples to the frequency domain components. DFT Signal Spectrum Time Frequency DFT is often used to do frequency
More informationFrom Shared Memory to Message Passing
From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich
More informationCS 4700: Artificial Intelligence
CS 4700: Foundations of Artificial Intelligence Fall 2017 Instructor: Prof. Haym Hirsh Lecture 10 Today Adversarial search (R&N Ch 5) Tuesday, March 7 Knowledge Representation and Reasoning (R&N Ch 7)
More informationComment: Social Network Theory (book published last year, Alan Dali, editor/sna in educational change) / Filipa has it
SNA Workshop, Kassel, 25-29 June, 2012 DAY 1 15 th June, 2012 LITERATURE: SNA, Wasserman and Faust (1999) Bible of SNA, the math and formulas behind it - Duality of Groups (important paper, briger, 70s)
More informationEM-Simulation based Design of Coupled Resonator Bandpass Filters in MWO
EM-Simulation based Design of Coupled Resonator Bandpass Filters in MWO 7. AWR User Workshop Prof. Dr. Sören Peik 14.10.2010 S. Peik () MWO Filter Design 14.10.2010 1 / 50 Outline Motivation Coupled Resonator
More informationBasic electronics Prof. T.S. Natarajan Department of Physics Indian Institute of Technology, Madras Lecture- 17. Frequency Analysis
Basic electronics Prof. T.S. Natarajan Department of Physics Indian Institute of Technology, Madras Lecture- 17 Frequency Analysis Hello everybody! In our series of lectures on basic electronics learning
More informationOrthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich *
Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich * Dept. of Computer Science, University of Buenos Aires, Argentina ABSTRACT Conventional techniques for signal
More informationGeometry-Based Populated Chessboard Recognition
Geometry-Based Populated Chessboard Recognition whoff@mines.edu Colorado School of Mines Golden, Colorado, USA William Hoff bill.hoff@daqri.com DAQRI Vienna, Austria My co-authors: Youye Xie, Gongguo Tang
More informationDetection of Compound Structures in Very High Spatial Resolution Images
Detection of Compound Structures in Very High Spatial Resolution Images Selim Aksoy Department of Computer Engineering Bilkent University Bilkent, 06800, Ankara, Turkey saksoy@cs.bilkent.edu.tr Joint work
More informationStanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011
Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow
More informationVehicle routing problems with road-network information
50 Dominique Feillet Mines Saint-Etienne and LIMOS, CMP Georges Charpak, F-13541 Gardanne, France Vehicle routing problems with road-network information ORBEL - Liège, February 1, 2018 Vehicle Routing
More informationPrivacy preserving data mining multiplicative perturbation techniques
Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity Outline Review and critique of randomization approaches (additive noise) Multiplicative data
More informationOn uniquely k-determined permutations
On uniquely k-determined permutations Sergey Avgustinovich and Sergey Kitaev 16th March 2007 Abstract Motivated by a new point of view to study occurrences of consecutive patterns in permutations, we introduce
More informationLocalization in Wireless Sensor Networks
Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem
More informationCS256 Applied Theory of Computation
CS256 Applied Theory of Computation Parallel Computation III John E Savage Overview Mapping normal algorithms to meshes Shuffle operations on linear arrays Shuffle operations on two-dimensional arrays
More informationLecture 3 Digital image processing.
Lecture 3 Digital image processing. MI_L3 1 Analog image digital image 2D image matrix of pixels scanner reflection mode analog-to-digital converter (ADC) digital image MI_L3 2 The process of converting
More informationDocumentation and Discussion
1 of 9 11/7/2007 1:21 AM ASSIGNMENT 2 SUBJECT CODE: CS 6300 SUBJECT: ARTIFICIAL INTELLIGENCE LEENA KORA EMAIL:leenak@cs.utah.edu Unid: u0527667 TEEKO GAME IMPLEMENTATION Documentation and Discussion 1.
More informationRomantic Partnerships and the Dispersion of Social Ties
Introduction Embeddedness and Evaluation Combining Features Romantic Partnerships and the of Social Ties Lars Backstrom Jon Kleinberg presented by Yehonatan Cohen 2014-11-12 Introduction Embeddedness and
More informationModern Control System Theory and Design. Dr. Huang, Min Chemical Engineering Program Tongji University
Modern Control System Theory and Design Dr. Huang, Min Chemical Engineering Program Tongji University Syllabus Instructor: Dr. Huang, Min Time and Place to meet Office Hours: Text Book and References Modern
More informationFast pseudo-semantic segmentation for joint region-based hierarchical and multiresolution representation
Author manuscript, published in "SPIE Electronic Imaging - Visual Communications and Image Processing, San Francisco : United States (2012)" Fast pseudo-semantic segmentation for joint region-based hierarchical
More informationTransportation Timetabling
Outline DM87 SCHEDULING, TIMETABLING AND ROUTING 1. Sports Timetabling Lecture 16 Transportation Timetabling Marco Chiarandini 2. Transportation Timetabling Tanker Scheduling Air Transport Train Timetabling
More informationAd Hoc and Neighborhood Search Methods for Placement of Mesh Routers in Wireless Mesh Networks
29 29th IEEE International Conference on Distributed Computing Systems Workshops Ad Hoc and Neighborhood Search Methods for Placement of Mesh Routers in Wireless Mesh Networks Fatos Xhafa Department of
More information< AIIDE 2011, Oct. 14th, 2011 > Detecting Real Money Traders in MMORPG by Using Trading Network
< AIIDE 2011, Oct. 14th, 2011 > Detecting Real Money Traders in MMORPG by Using Trading Network Atsushi FUJITA Hiroshi ITSUKI Hitoshi MATSUBARA Future University Hakodate, JAPAN fujita@fun.ac.jp Focusing
More informationUltra Wide Band Communications
Lecture #3 Title - October 2, 2018 Ultra Wide Band Communications Dr. Giuseppe Caso Prof. Maria-Gabriella Di Benedetto Lecture 3 Spectral characteristics of UWB radio signals Outline The Power Spectral
More informationComparing the Quality of 2010 Census Proxy Responses with Administrative Records
Comparing the Quality of 2010 Census Proxy Responses with Administrative Records Mary H. Mulry & Andrew Keller U.S. Census Bureau 2015 International Total Survey Error Conference September 22, 2015 Any
More informationConnect The Closest Dot Puzzles
Connect The Closest Dot Puzzles Tim van Kapel June 23, 2014 Master s Thesis Utrecht University Marc van Kreveld Maarten Löffler Abstract In this thesis we present a new variation of the existing connect
More informationBAM (Bi-directional Associative Memory) Neural Network Simulator
BAM (Bi-directional Associative Memory) Neural Network Simulator J. Zlateva, G. Todorov Abstract: On Windows platform implemented BAM (Bi-directional Associative Memory) neural network simulator is presented.
More informationUse of Network Patent Analysis (NPA) for advanced analysis of patent data
Use of Network Patent Analysis (NPA) for advanced analysis of patent data Creating business advantage from patent insight Mike Lloyd, Doris Spielthenner, and George Mokdsi 5 th June 2012 1. Introduction
More informationChannel Allocation in based Mesh Networks
Channel Allocation in 802.11-based Mesh Networks Bhaskaran Raman Department of CSE, IIT Kanpur India 208016 http://www.cse.iitk.ac.in/users/braman/ Presentation at Infocom 2006 Barcelona, Spain Presentation
More informationChained Permutations. Dylan Heuer. North Dakota State University. July 26, 2018
Chained Permutations Dylan Heuer North Dakota State University July 26, 2018 Three person chessboard Three person chessboard Three person chessboard Three person chessboard - Rearranged Two new families
More informationVariables. Lecture 13 Sections Wed, Sep 16, Hampden-Sydney College. Displaying Distributions - Quantitative.
- - Lecture 13 Sections 4.4.1-4.4.3 Hampden-Sydney College Wed, Sep 16, 2009 Outline - 1 2 3 4 5 6 7 Even-numbered - Exercise 4.7, p. 226. According to the National Center for Health Statistics, in the
More informationGraph Application in The Strategy of Solving 2048 Tile Game
Graph Application in The Strategy of Solving 2048 Tile Game Harry Setiawan Hamjaya and 13516079 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung, Jl. Ganesha
More informationCS188 Spring 2010 Section 3: Game Trees
CS188 Spring 2010 Section 3: Game Trees 1 Warm-Up: Column-Row You have a 3x3 matrix of values like the one below. In a somewhat boring game, player A first selects a row, and then player B selects a column.
More informationECC419 IMAGE PROCESSING
ECC419 IMAGE PROCESSING INTRODUCTION Image Processing Image processing is a subclass of signal processing concerned specifically with pictures. Digital Image Processing, process digital images by means
More informationRouse Matrix Systems Honeycomb Clip Art
Rouse Matrix Systems Honeycomb Clip Art bflg.fh.uk.4bnr - 0000706 - G. Rouse 2000 Get additional clip art, design ideas, project instructions, graph paper, and more from our web site http://rouseinternational.com/rms
More informationCS510 \ Lecture Ariel Stolerman
CS510 \ Lecture04 2012-10-15 1 Ariel Stolerman Administration Assignment 2: just a programming assignment. Midterm: posted by next week (5), will cover: o Lectures o Readings A midterm review sheet will
More informationRouting Messages in a Network
Routing Messages in a Network Reference : J. Leung, T. Tam and G. Young, 'On-Line Routing of Real-Time Messages,' Journal of Parallel and Distributed Computing, 34, pp. 211-217, 1996. J. Leung, T. Tam,
More informationHow good is simple reversal sort? Cycle decompositions. Cycle decompositions. Estimating reversal distance by cycle decomposition
How good is simple reversal sort? p Not so good actually p It has to do at most n-1 reversals with permutation of length n p The algorithm can return a distance that is as large as (n 1)/2 times the correct
More informationSimple Search Algorithms
Lecture 3 of Artificial Intelligence Simple Search Algorithms AI Lec03/1 Topics of this lecture Random search Search with closed list Search with open list Depth-first and breadth-first search again Uniform-cost
More informationDistance-Vector Routing
Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation
More informationProblem 1 (15 points: Graded by Shahin) Recall the network structure of our in-class trading experiment shown in Figure 1
Solutions for Homework 2 Networked Life, Fall 204 Prof Michael Kearns Due as hardcopy at the start of class, Tuesday December 9 Problem (5 points: Graded by Shahin) Recall the network structure of our
More informationUnit 12: Artificial Intelligence CS 101, Fall 2018
Unit 12: Artificial Intelligence CS 101, Fall 2018 Learning Objectives After completing this unit, you should be able to: Explain the difference between procedural and declarative knowledge. Describe the
More informationLast Lecture. photomatix.com
Last Lecture photomatix.com Today Image Processing: from basic concepts to latest techniques Filtering Edge detection Re-sampling and aliasing Image Pyramids (Gaussian and Laplacian) Removing handshake
More informationWorkshop Matlab/Simulink in Drives and Power electronics Lecture 4
Workshop Matlab/Simulink in Drives and Power electronics Lecture 4 : DC-Motor Chopper design SimPowerSystems Ghislain REMY Jean DEPREZ 1 / 20 Workshop Program 8 lectures will be presented based on Matlab/Simulink
More informationTrip Assignment. Lecture Notes in Transportation Systems Engineering. Prof. Tom V. Mathew. 1 Overview 1. 2 Link cost function 2
Trip Assignment Lecture Notes in Transportation Systems Engineering Prof. Tom V. Mathew Contents 1 Overview 1 2 Link cost function 2 3 All-or-nothing assignment 3 4 User equilibrium assignment (UE) 3 5
More informationMidterm Examination CS 534: Computational Photography
Midterm Examination CS 534: Computational Photography November 3, 2015 NAME: SOLUTIONS Problem Score Max Score 1 8 2 8 3 9 4 4 5 3 6 4 7 6 8 13 9 7 10 4 11 7 12 10 13 9 14 8 Total 100 1 1. [8] What are
More informationDesigning Information Devices and Systems I Spring 2019 Lecture Notes Note Introduction to Electrical Circuit Analysis
EECS 16A Designing Information Devices and Systems I Spring 2019 Lecture Notes Note 11 11.1 Introduction to Electrical Circuit Analysis Our ultimate goal is to design systems that solve people s problems.
More informationInteractive Design/Decision Making in a Virtual Urban World: Visual Simulation and GIS
Robin Liggett, Scott Friedman, and William Jepson Interactive Design/Decision Making in a Virtual Urban World: Visual Simulation and GIS Researchers at UCLA have developed an Urban Simulator which links
More informationAlgorithms for Bioinformatics
Adapted from slides by Alexandru Tomescu, Leena Salmela, Veli Mäkinen, Esa Pitkänen 582670 Algorithms for Bioinformatics Lecture 3: Greedy Algorithms and Genomic Rearrangements 11.9.2014 Background We
More informationUnit 5: Graphs. Input. Output. Cartesian Coordinate System. Ordered Pair
Section 5.1: The Cartesian plane Section 5.2: Working with Scale in the Cartesian Plane Section 5.3: Characteristics of Graphs Section 5.4: Interpreting Graphs Section 5.5: Constructing good graphs from
More informationOn uniquely k-determined permutations
Discrete Mathematics 308 (2008) 1500 1507 www.elsevier.com/locate/disc On uniquely k-determined permutations Sergey Avgustinovich a, Sergey Kitaev b a Sobolev Institute of Mathematics, Acad. Koptyug prospect
More informationCS224W: Social and Information Network Analysis Jure Leskovec, Stanford University
CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/22/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu
More informationChapter 3 Chip Planning
Chapter 3 Chip Planning 3.1 Introduction to Floorplanning 3. Optimization Goals in Floorplanning 3.3 Terminology 3.4 Floorplan Representations 3.4.1 Floorplan to a Constraint-Graph Pair 3.4. Floorplan
More informationLocal Image Segmentation Process for Salt-and- Pepper Noise Reduction by using Median Filters
Local Image Segmentation Process for Salt-and- Pepper Noise Reduction by using Median Filters 1 Ankit Kandpal, 2 Vishal Ramola, 1 M.Tech. Student (final year), 2 Assist. Prof. 1-2 VLSI Design Department
More informationParallel De-Noising of Biological Signals Emily Sosin. May 19, 2008
Parallel De-Noising of Biological Signals Emily Sosin Final Paper for ENEE499 May 19, 2008 Introduction Currently, Dr. Jonathan Simon is involved in research on how the human auditory cortex processes
More informationSpeech Coding in the Frequency Domain
Speech Coding in the Frequency Domain Speech Processing Advanced Topics Tom Bäckström Aalto University October 215 Introduction The speech production model can be used to efficiently encode speech signals.
More informationCS188 Spring 2014 Section 3: Games
CS188 Spring 2014 Section 3: Games 1 Nearly Zero Sum Games The standard Minimax algorithm calculates worst-case values in a zero-sum two player game, i.e. a game in which for all terminal states s, the
More informationOSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP
OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area
More information