Case-Studies in Association Rule Mining for Recommender Systems

Size: px
Start display at page:

Download "Case-Studies in Association Rule Mining for Recommender Systems"

Transcription

1 Case-Studies in Association Rule Mining for Recommender Systems Barry Smyth, Kevin McCarthy, James Reilly, Derry O Sullivan and Lorraine McGinty Smart Media Institute, Department of Computer Science, University College Dublin (UCD), Dublin, Ireland barry.smyth@ucd.ie David C. Wilson Department of Software and Information Systems University Of North Carolina at Charlotte, USA davils@uncc.edu Abstract Recommender systems combine ideas from information retrieval, machine learning and user profiling research in order to provide end-users with more proactive and personalized information retrieval applications. Two popular approaches have come to dominate. Content-based techniques leverage the availability of rich item descriptions to identify new items that are similar to those that a user has liked in the past. In contrast, collaborative filtering techniques rely on the availability of user profiles in which sets of items have been rated. They recommend new items to a target user on the basis that similar users have preferred these items in the past. In this paper we will present two casestudies of how association rule mining techniques have been used to significantly enhance the power of content-based and collaborative filtering recommender systems. I. INTRODUCTION We live in an age of information that provides for an unprecedented level of access to all forms of electronic data, products and services. However, users are finding it increasingly difficult to locate the right information at the right time and while Web search engines serve as our primary information access tool we are frequently frustrated by their inability to accurately capture our information retrieval needs [?], [?]. Over the past number of years the field of recommender systems has emerged with the stated goal of providing more proactive, intelligent and personalized information retrieval systems that are better able to cater for the needs of users in a variety of circumstances [?], [?]. Recommender systems combine ideas from artificial intelligence, machine learning, information retrieval and user profiling and have been applied successfully in a variety of domains including e-commerce and online shopping; see for e.g. [?], [?]. Over time two particular approaches to recommendation have emerged to dominate research and development. Content-based and casebased recommenders adopt a traditional information retrieval stance, relying on feature-based descriptions of information items as the basis for recommendation [?], [?], [?]. A typical content-based recommender selects items for recommendation on the grounds that they are similar to items that the user has liked in the past. In contrast, collaborative filtering approaches to recommendation adopt a very different standpoint, under the assumption that content-based descriptions may not be available. Instead they rely on ratings-based user profiles profiles containing items that the user has previously rated according to their appeal or relevance. Recommendations are produced by locating users with similar ratings histories and by selecting items from these profiles that have been highly rated but that are absent from the target user s profile [?], [?], [?]. In our research we have developed a wide range of recommender systems that include content-based and collaborative filtering aspects (e.g. [?], [?], [?], [?]). On their own the content-based and collaborative approaches suffer from a number of drawbacks, but taken together they can form the basis of a powerful hybrid recommendation strategy [?]. In recent years we have investigated how data-mining techniques may be able to improve the performance of content-based, collaborative and hybrid recommender systems [?], [?], [?]. In this paper we describe two case-studies from this work, where we have used association rule mining techniques to improve the performance of collaborative filtering and content-based recommenders. In Section II we describe how the well-

2 known sparsity problem in collaborative filtering can be addressed by mining similarity knowledge from ratingsbased profiles. In Section III we describe how similar techniques can be used in a content-based recommender in order to discover feature patterns that may help the user to refine his/her recommendations. II. CASE-STUDY 1: MINING SIMILARITY KNOWLEDGE In this case-study we are interested in ways of improving collaborative filtering recommendation techniques by enhancing their rudimentary notions of similarity. Collaborative filtering algorithms make use of simple ratings-based profiles and generate recommendations on the basis of similarity between the target user and neighbouring profiles. However, the standard approach to similarity used in collaborative filtering systems relies heavily on direct overlap between ratings, which is problematic due to the so-called sparsity problem. The sparsity problem tells us that, on average, two users are unlikely to have rated many of the same items and so there will be little direct overlap between their profiles. This is problematic when it comes to identifying similar profiles because it means that there is no direct way to measure the similarity between two profile cases unless we have access to similarity knowledge that allows us to compare non-identical profile items. Unfortunately this similarity knowledge is usually hard to come-by and in this case-study we report on the results of an investigation into the use of association rule mining techniques in order to discover this type of knowledge. A. Learning Item-Item Similarity Knowledge There are many automated techniques that could be used to derive various sorts of similarity knowledge. The approach we have chosen is to apply data mining techniques, in particular the Apriori algorithm [?], to extract association rules between items in user-profile cases. To illustrate this we will use examples from the PTV system. PTV is a recommender system designed to make TV program suggestions to users based on their learned viewing preferences; PTV profiles contain lists of positively and negatively rated TV programs [?]. By discovering relationships between programs beyond simple direct overlap, we may be able to cover more potential profile matches and so make more informed recommendations. For example, a person that likes X-Files and Frasier would not normally be comparable to a person that likes Friends and ER, but Rule Support Confidence Friends Frasier 12% 25% Friends ER 14% 37% Frasier ER 10% 22% TABLE I EXAMPLE RULES Friends Frasier ER Friends Frasier ER TABLE II EXAMPLE RULE SIMILARITY MATRIX discovering a relationship between Frasier and Friends would provide a basis for profile matching. Treating user profiles as transactions and the program ratings therein as itemsets, the Apriori algorithm can be used to derive a set of rules and associated confidence levels between programs. Table I shows some example rules that were generated by running Apriori on our PTV data set. The confidence values are taken as similarity scores and used to fill in a program similarity matrix, as shown in Table II. While the Apriori approach is capable of generating rules with multiple antecedents and consequents, we have limited the initial phase of the work to rules with single-program antecedents and consequents. The derivation of direct program similarity information naturally suggests two extensions to further elaborate the similarity matrix. First, the generated rules can be chained together to provide indirect relationships between programs. In doing so, a choice has to be made as to how to calculate the indirect rule confidence; for example we could compute the minimum or maximum of a sequence of similarities and in the evaluation section below we consider a range of alternative combination methods. Second, it seems intuitive to think that a rule of the form likes Friends likes Frasier could imply the reverse. If it were possible to establish this symmetry the additional coverage could be doubled. B. Enhanced Profile Similarity The availability of item similarity knowledge facilitates a new type of similarity-based recommendation strategy that combines elements from case-based (or content-based) and collaborative recommendation techniques. It facilitates the use of more sophisticated similarity metrics on ratings-based profile data, which in turn makes it possible to leverage indirect similarities between profile cases, and so generate improved recommendation lists.

3 This new recommendation strategy consists of two basic steps: 1) The target profile, t is compared to each profile case, s, to select the k most similar cases. 2) The items contained within these selected cases (but absent in the target profile) are ranked according to the relevance to the target, and the r most similar items are returned as recommendations 1) Profile Matching: The profile similarity metric is presented in Equation 1 as the weighted-sum of the similarities between the items in the target and source profile cases (see also Equation 2). In the situation where there is a direct correspondence between an item in the source, s i, and the target, t j, then maximal similarity is assumed. However, the nature of ratings-based profile cases is such that these direct correspondences are rare and in such situations the similarity value of the source profile item is computed as the mean similarity between this item and the k most similar items in the target profile case (t 1...t k ). P Sim(t, s, k) = s iɛs w i ISim(t, s i, k) (1) ISim(t, s i, k) = 1 if t j = s i (2) j=1..k = sim(t j, s i) (3) k Notice, that if k = 1 and there is a perfect one-toone correspondence between the target and source profile cases, then this profile similarity metric is equivalent to the traditional weighted-sum similarity metric used in many case-based and content-based recommenders. However, when there is no such correspondence, or when certain pairs of target-source items have no similarity value, then this metric is still capable of calculating an overall similarity score. 2) Recommendation Ranking: Once the most similar profile cases (S) to the target have been identified a set of ranked item recommendations can be produced. There are three factors to consider when ranking these recommendations. First, we want to give priority to those items that have a high similarity to the target profile case. Second, items that occur in many of the retrieved profile cases should be preferred to those that occur in few profile cases. Finally, items that are recommended by profiles that are similar to the target should be preferred to items that are recommended by less similar profiles. Accordingly we compute the relevance of an item, s i from a retrieved profile case, s, with respect to the target profile, t, as shown in Equation 4; where S S is the set of retrieved profile cases that contain s i. Rel(s i, t, S) = ISim(s i, t, k) S S C. Evaluation sɛs P Sim(s, t) (4) In order to evaluate our approach to mining and applying similarity knowledge, we conducted a series of experiments using real user-data from 622 PTV customer profiles. We were particularly interested in the increased similarity coverage offered by our data mining technique and the contribution that this new similarity knowledge had when it came to making high quality recommendations. For reasons of space we can only briefly report on our evaluation and the results below represent just a fraction of the evaluation work that has been carried out. For more information the interested reader is referred to [?], [?] 1) Recommendation Quality: In this experiment we test how this new similarity knowledge impacts on recommendation quality. After generating direct and indirect similarity rules, a profile case is selected from the case-base. A parameterized percentage of the items in the selected case are removed from consideration. The remainder of the profile case is then used as the basis for retrieval, using our similarity metric and recommendation ranking. Accuracy was calculated using three metrics: M 1: M 2: M 3: Percentage of removed items that were recommended in each case. Percentage of profiles in which at least one removed item was recommended. A combination of the above: percentage of removed items that were recommended, given a recommendation could be made. Metrics 1 and 2 give us an overall sense of recommendation performance whereas metric 3 provides a more localised account of performance. Hence we were more concerned about the performance of the first 2 metrics in these experiments as they give us a better sense of model accuracy. We were most interested in looking for uplift in recommendation quality when comparing our new recommendation technique (using direct and indirect similarity rules) to a pure collaborative filtering technique. We compared a number of different variations of our new technique against standard collaborative filtering benchmarks. Our variations included a version that makes use

4 Fig PTV recommendation accuracy. user to provide information on a specific product feature. On common form of feedback is called critiquing: the user indicates a preference over a particular feature of a recommended item. For example, when shopping for a PC a user might indicate that they like the current suggestion but they are looking for something cheaper ; cheaper is a critique over the price feature of the PC case. Critiques were originally proposed by the wellknown FindMe recommender systems [?] and we will focus on the use of critiquing in this case-study. Sometimes it is useful to critique multiple features (compound critiques). For example, a PC shopper may ask for a more powerful PC, meaning that they are looking for a faster processor, more memory and a larger hard-disk; that is, 3 individual (unit) critiques are encoded in parallel. In this case-study we describe of direct similarity rules only (Direct), plus a number of versions that made use of indirect rules whose similarities.3 scores Similarity werecoverage combined using a variety of combination Increasing recent work investigating how a recommender can au- n the next set methods of experiments, (Max, Min, we Average, were interested Mult). inthe evaluating two standard the degreetomatically which discover useful compound critiques during imilarity coverage benchmark couldcollaborative be improved byfiltering the generated techniques rule sets. (denoted For the first theexperi- recommendation session and how these critiques ent, the density CF and of the CFRR) generated encoded item-item a standard similarity collaborative matrix wasfiltering taken our can measure be used to improve recommendation efficiency. We f similarityapproach; coverage. CF We produces varied Apriori an unranked confidence setlevels of recommenda- each whereas run we generated CFRR ranks the Apriori recommendation direct rule set, according as well as a maximal from 40% to 5% willatassume 5% a conversational recommender system in ntervals. Ontions, the image of the FindMe recommender systems [?]. ndirect ruletoset the bydegree chaining ofdirect similarity rules of andtheir filledsource in the profiles item similarity to the matrix, takng the matrix density relative to the items that participated in the rule set. Results for Each recommendation session is initiated by an initial target [?], [?]. TV showed direct item similarities provide an average of 10% coverage, but user there query is a and this results in the retrieval of the most On the PTV dataset, results of the first metric showed arked increase for the indirect similarity rules (65% coverage in the best case). similar product case (the recommended case) and a Of course, that the using Apriori direct method rules does (20%) notoutperformed generate association indirect rules rules for every set ofpro- le programme, (18%), andwhich in factin Apriori turn ignores outperformed a great many pure programmes CF (8%). Abecause compound their critiques. The user will have the opportunity critiques, both fixed unit critiques and dynamic requency fails similar the Apriori patternthreshold was seen tests. in Nevertheless metric 2, although when wemetric add these 3 newly to accept genrated this case, thereby ending the recommendation rules showed to the full pure item-item CF tomatrix, have awehigher found accuracy an increase(30%) density thanfromsession, 0.6% toor to critique it. If they critique the case, the.6%. Again, either a similar the pattern direct or wasthe found indirect themethods Físchlár (.17% (Direct: to.65%) 24%, dataset critique [11] acts as a filter over the remaining cases, such s well as Combined Indirect: (.04% 22%) to (Figure.26%), 1). Browse On the (.044% faceto of.29%), it these Record results (.05% that to.14%) the case chosen for the next cycle is the one that nd Play (.06% suggest to.17%). that the learned similarity knowledge is proving is compatible with the critique and maximally similar to to be useful from a recommendation standpoint, at least the previously recommended case. In this section we will.4 Recommendation in relation Quality to the critical : Accuracy performance metrics, metric describe how dynamic critiques can be discovered and ith encouraging 1 and results 2. These for increasing results also the similarity suggest that coverage, the indirect we designed selected experi-foents to test similarity the effect of knowledge this new similarity is, as expected, knowledgepoorer on recommendation quality cycle. quality. presentation as part of each recommendation ased on our than earlier the direct experiments, similarity we chose knowledge. representative These performance confidence levels of 10% or the PTV, benefits Físchlár, have Playalso and been Record found datasets in aand variety 30% of onother Browse datasets and Combined A. Critique Patterns these [?]. specified levels, we have shown an item-item matrix coverage In order to discover a useful set of compound critiques atasets. Using ncrease when moving from CF to both direct and indirect rule approaches. from a set of product cases we need to first understand The finaliii. experiment CASE-STUDY tested the2: accuracy MINING ofcompound recommendation CRITIQUES on both datasets. howafter these cases relate to the current recommendation enerating direct In and our indirect second similarity case-study rules, we a profile will case look is at selected a form from we the need caseto understand their basic feature differences of content-based recommendation called conversational so that we may then look for frequently occurring recommendation. Conversational recommenders guide a sets of differences to act as our compound critiques. user through a sequence of iterations, suggesting specific The first step is to generate a set of so-called critique items, and using feedback from users to refine their patterns from the remaining cases. Each remaining case suggestions in subsequent iterations [?], [?], [?], [?]. is compared to the current recommended case and the Different recommender systems look for different types relative feature differences make up the critique pattern. of feedback from users; for example, they might ask the Figure 2 illustrates what we mean with the aid of an user to rate a set of suggestions or they might ask the example. It shows the current case that has been selected

5 Fig. 2. Critique patterns capture the basic feature differences that exist between a current case and a recommendation candidate. for recommendation to the user as part of the current cycle and also a case, c, from the case-base. The current case describes a 1.4GHz, desktop PC with 512Mb of RAM, a 14 monitor and a 40Gb hard-drive, all for 1500 euro. Case c describes a 900MHz, desktop with 512MB or RAM, a 12 monitor and a 30Gb hard-drive for 3000 euro. The resulting critique pattern reflects how case c differs from current case in terms of individual feature critiques. For example, the critique pattern shown includes a < critique for processor speed we will refer to this as [Speed <] because the comparison case has a slower processor than the current recommended case. Similarly, the pattern includes the critique [P rice >] because the comparison case is more expensive than the current case. B. Learning Compound Critiques To identify compound critiques we must look for recurring patterns within a set of critique patterns. This bears a strong resemblance to so-called market-basket analysis problem, where the task is to find regularities in the shopping behaviour of customers [?] by identifying sets of products that tend to be purchased together: each critique pattern is equivalent to the shopping basket for a single customer, and the individual critiques correspond to the items in this basket. The combinatorics of a typical task domain thousands of products and customers make this a challenging problem, leading to an explosion in the number of possible groups of recurring items. However, it is not so acute in our critiquing scenario because there are only a limited number of possible critiques. For instance, each numeric feature can have a < or a > critique and each nominal feature can have a = or a! = critique, so there are only 2n possible critiques in a case-base where the cases are made up of n individual features. The Apriori algorithm [?] can be used to efficiently locate compound critiques. It characterises recurring item subsets as association rules of the form A B: from the presence of a certain set of critiques (A) one can infer the presence of certain other critiques (B). For example, one might learn that from the presence of the critique, [P rice <], we can infer the presence of [Memory <] with a high degree of probability; in other words the pattern {[P rice <],[M emory <]} is commonplace. Our proposal is to use Apriori, during each recommendation cycle, to generate a collection of compound critiques (frequent itemsets over the pattern-base), and to then select a small subset of the best of these compound critiques for presentation to the user to complement the standard unit critiques. C. Rating Compound Critiques From a user interface and availability viewpoint it is obviously not practical to present large numbers of different compound critiques, as feedback options, to the user during each cycle. And yet large numbers of compound critiques are likely to be discovered. A filtering strategy is needed so that we can select the most useful critiques, say the top 5, for presentation purposes. One option is to use the support value of the critique as the basis for filtering. For example, by selecting critiques with low support values we will be selecting critiques that are capable of eliminating many cases, but in doing so these critiques are less likely to be chosen by the user because they are less likely to lead to their desired target case. Conversely we could select critiques with high support values, on the grounds that they are likely to lead to the target case; however they are unlikely to eliminate many cases because high support critiques are, by definition, compatible with many remaining cases. In the next section we will evaluate these two strategies with respect to their ability to improve recommendation performance. D. Evaluation In this experiment we will investigate how our approach to compound critiquing impacts on recommendation performance compared to a standard critique-based recommender that uses fixed unit critiques. We will use the well-known standard PC dataset [?] as the basis for this evaluation. It consists of 120 PC product cases, each described in terms of 8 features including type, manufacturer, processor, memory, etc; this dataset is available for download at Once again we are limited by the level of detail that we can provide and the interested reader is referred to [?] for further information.

6 1) Methodology: We examine three compound critiquing variations, each distinguished according to how the set of top 5 critiques is chosen for presentation to the user during the current cycle: (1) LS - the top 5 critiques with the lowest support are chosen; (2) HS - the top 5 critiques with the highest support are chosen; (3) RAND - A random set of 5 critiques are chosen. So the above provide three system variations based on compound critiquing and in addition we also include a standard, unit critiquing approach (STD) as a benchmark. Ideally we would like to have carried out an online evaluation with live-users, but unfortunately this was not possible. In the alternative we chose to opt for an offline evaluation and used the approach described by [?], [?], [?]. Accordingly, each case (base) in the casebase is temporarily removed and used in two ways. First, it serves as the basis for a set of queries by taking random subsets of its features. We focus on subsets of 1, 3 and 5 features to allow us to distinguish between hard, moderate and easy queries, respectively. Second, we select the case that is most similar to each original base. These cases are the recommendation targets for the experiments. Thus, the base represents the ideal query for a user, the generated query is the initial query that the user provides to the recommender, and the target is the best available case for the user. Each generated query is a test problem for the recommender, and in each recommendation cycle the user picks a critique that is compatible with the known target case; that is, a critique that, when applied to the remaining cases, results in the target case being left in the filtered set of cases. In a typical cycle there may be a number of critiques (unit and compound) that satisfy this condition and the actual one chosen by the user depends on the system being used: LS picks the compound critique with the lowest support, HS picks the one with the highest support, and RAND picks a random critique. Each leave-one-out pass through the case-base is repeated (30 times for the PC dataset) and recommendation sessions terminate when the target case is returned. 2) Results: Ultimately we are interested in how the use of compound critiques affects recommendation efficiency; that is, the number of cycles before the target case is returned to the user. We are looking for an efficiency improvement over the standard critiquing approach (STD). If this is to be achieved then the user will have to select compound critiques frequently, during the course of a recommendation session, and when selected these critiques must be able to filter out more cases than the alternative unit critique. To test this we run our leave- Fig. 3. Average session length by query size for the PC domain. one-out test for each dataset and algorithm combination, noting the length of each recommendation session for each query. Figure 3 presents average session lengths for each algorithm, separating out queries of different lengths (difficulty levels). The idea here is to understand the performance implications as initial user queries become more complete; queries that contain only a single feature are likely to be vague and difficult to satisfy compared to more complete queries that contain up to 5 features. The results are very clear, pointing to a significant advantage for LS, but little or no advantage for HS. As expected the average session length falls with increasing initial query length but it is interesting to note that the scale of any advantage due to dynamic critiquing appears to be greater for the more difficult (smaller) initial queries. For example, for difficult queries (with a single specified feature), we find that LS enjoys a session length reduction of just over 40%, relative to STD. This falls to almost 32% for the moderate queries (containing 3 specified features) and falls again to just under 26% for the relatively easy queries with 5 fully specified features. This is to be expected perhaps since the easier queries naturally result in shorter sessions and thus there are fewer opportunities for compound critiques to be chosen, and hence fewer opportunities for their benefit to be felt. It is worth noting that similar results have been reproduced in other product domains. IV. CONCLUSIONS Recommender systems are an important tool in the quest to provide users with improved information access facilities. And while recommender systems have enjoyed some considerable success in a range of domains, technological shortcomings still exist in relation to their core content-based and collaborative recommendation

7 approaches. In our research we have looked at how data mining techniques can be used to solve some of these shortcomings. In this paper we have brought elements of this research together. We have presented two detailed case-studies that explains how association rule mining techniques can be used to improve content-based and collaborative filtering recommender systems by offering meaningful performance benefits. ACKNOWLEDGMENT This material is based on works supported by Science Foundation Ireland (SFI) under Grant No. 03/IN.3/I361.

An Analysis of Critique Diversity in Case-Based Recommendation

An Analysis of Critique Diversity in Case-Based Recommendation An Analysis of Critique Diversity in Case-Based Recommendation Kevin McCarthy and James Reilly and Lorraine McGinty and Barry Smyth Adaptive Information Cluster Department of Computer Science University

More information

On the Evaluation of Dynamic Critiquing: A Large-Scale User Study

On the Evaluation of Dynamic Critiquing: A Large-Scale User Study On the Evaluation of Dynamic Critiquing: A Large-Scale User Study Kevin McCarthy, Lorraine McGinty, Barry Smyth and James Reilly Adaptive Information Cluster, School of Computer Science and Informatics,

More information

Preference-based Organization Interfaces: Aiding User Critiques in Recommender Systems

Preference-based Organization Interfaces: Aiding User Critiques in Recommender Systems Preference-based Organization Interfaces: Aiding User Critiques in Recommender Systems Li Chen and Pearl Pu Human Computer Interaction Group, School of Computer and Communication Sciences Swiss Federal

More information

Experiments in Dynamic Critiquing

Experiments in Dynamic Critiquing Experiments in Dynamic Critiquing Kevin McCarthy, James Reilly, Lorraine McGinty & Barry Smyth Adaptive Information Cluster Department of Computer Science University College Dublin Belfield, Dublin 4 Ireland

More information

Experiments on the Preference-Based Organization Interface in Recommender Systems

Experiments on the Preference-Based Organization Interface in Recommender Systems Experiments on the Preference-Based Organization Interface in Recommender Systems LI CHEN Hong Kong Baptist University (HKBU) and PEARL PU Swiss Federal Institute of Technology in Lausanne (EPFL) As e-commerce

More information

Game Mechanics Minesweeper is a game in which the player must correctly deduce the positions of

Game Mechanics Minesweeper is a game in which the player must correctly deduce the positions of Table of Contents Game Mechanics...2 Game Play...3 Game Strategy...4 Truth...4 Contrapositive... 5 Exhaustion...6 Burnout...8 Game Difficulty... 10 Experiment One... 12 Experiment Two...14 Experiment Three...16

More information

I. INTRODUCTION II. LITERATURE SURVEY. International Journal of Advanced Networking & Applications (IJANA) ISSN:

I. INTRODUCTION II. LITERATURE SURVEY. International Journal of Advanced Networking & Applications (IJANA) ISSN: A Friend Recommendation System based on Similarity Metric and Social Graphs Rashmi. J, Dr. Asha. T Department of Computer Science Bangalore Institute of Technology, Bangalore, Karnataka, India rash003.j@gmail.com,

More information

Critiquing-based recommenders: survey and emerging trends

Critiquing-based recommenders: survey and emerging trends User Model User-Adap Inter (2012) 22:125 150 DOI 10.1007/s11257-011-9108-6 ORIGINAL PAPER Critiquing-based recommenders: survey and emerging trends Li Chen Pearl Pu Received: 8 September 2010 / Accepted

More information

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Scott Watson, Andrew Vardy, Wolfgang Banzhaf Department of Computer Science Memorial University of Newfoundland St John s.

More information

Recommender Systems TIETS43 Collaborative Filtering

Recommender Systems TIETS43 Collaborative Filtering + Recommender Systems TIETS43 Collaborative Filtering Fall 2017 Kostas Stefanidis kostas.stefanidis@uta.fi https://coursepages.uta.fi/tiets43/ selection Amazon generates 35% of their sales through recommendations

More information

Reinforcement Learning in Games Autonomous Learning Systems Seminar

Reinforcement Learning in Games Autonomous Learning Systems Seminar Reinforcement Learning in Games Autonomous Learning Systems Seminar Matthias Zöllner Intelligent Autonomous Systems TU-Darmstadt zoellner@rbg.informatik.tu-darmstadt.de Betreuer: Gerhard Neumann Abstract

More information

The real impact of using artificial intelligence in legal research. A study conducted by the attorneys of the National Legal Research Group, Inc.

The real impact of using artificial intelligence in legal research. A study conducted by the attorneys of the National Legal Research Group, Inc. The real impact of using artificial intelligence in legal research A study conducted by the attorneys of the National Legal Research Group, Inc. Executive Summary This study explores the effect that using

More information

Chapter 4 SPEECH ENHANCEMENT

Chapter 4 SPEECH ENHANCEMENT 44 Chapter 4 SPEECH ENHANCEMENT 4.1 INTRODUCTION: Enhancement is defined as improvement in the value or Quality of something. Speech enhancement is defined as the improvement in intelligibility and/or

More information

Chapter 7 Information Redux

Chapter 7 Information Redux Chapter 7 Information Redux Information exists at the core of human activities such as observing, reasoning, and communicating. Information serves a foundational role in these areas, similar to the role

More information

How to Make the Perfect Fireworks Display: Two Strategies for Hanabi

How to Make the Perfect Fireworks Display: Two Strategies for Hanabi Mathematical Assoc. of America Mathematics Magazine 88:1 May 16, 2015 2:24 p.m. Hanabi.tex page 1 VOL. 88, O. 1, FEBRUARY 2015 1 How to Make the erfect Fireworks Display: Two Strategies for Hanabi Author

More information

Fast Detour Computation for Ride Sharing

Fast Detour Computation for Ride Sharing Fast Detour Computation for Ride Sharing Robert Geisberger, Dennis Luxen, Sabine Neubauer, Peter Sanders, Lars Volker Universität Karlsruhe (TH), 76128 Karlsruhe, Germany {geisberger,luxen,sanders}@ira.uka.de;

More information

Technical Notes LAND MAPPING APPLICATIONS. Leading the way with increased reliability.

Technical Notes LAND MAPPING APPLICATIONS. Leading the way with increased reliability. LAND MAPPING APPLICATIONS Technical Notes Leading the way with increased reliability. Industry-leading post-processing software designed to maximize the accuracy potential of your POS LV (Position and

More information

Organisation: Microsoft Corporation. Summary

Organisation: Microsoft Corporation. Summary Organisation: Microsoft Corporation Summary Microsoft welcomes Ofcom s leadership in the discussion of how best to manage licence-exempt use of spectrum in the future. We believe that licenceexemption

More information

The secret behind mechatronics

The secret behind mechatronics The secret behind mechatronics Why companies will want to be part of the revolution In the 18th century, steam and mechanization powered the first Industrial Revolution. At the turn of the 20th century,

More information

Laboratory 1: Uncertainty Analysis

Laboratory 1: Uncertainty Analysis University of Alabama Department of Physics and Astronomy PH101 / LeClair May 26, 2014 Laboratory 1: Uncertainty Analysis Hypothesis: A statistical analysis including both mean and standard deviation can

More information

C. PCT 1486 November 30, 2016

C. PCT 1486 November 30, 2016 November 30, 2016 Madam, Sir, Number of Words in Abstracts and Front Page Drawings 1. This Circular is addressed to your Office in its capacity as a receiving Office, International Searching Authority

More information

AI Plays Yun Nie (yunn), Wenqi Hou (wenqihou), Yicheng An (yicheng)

AI Plays Yun Nie (yunn), Wenqi Hou (wenqihou), Yicheng An (yicheng) AI Plays 2048 Yun Nie (yunn), Wenqi Hou (wenqihou), Yicheng An (yicheng) Abstract The strategy game 2048 gained great popularity quickly. Although it is easy to play, people cannot win the game easily,

More information

37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game

37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game 37 Game Theory Game theory is one of the most interesting topics of discrete mathematics. The principal theorem of game theory is sublime and wonderful. We will merely assume this theorem and use it to

More information

A Comparison Between Camera Calibration Software Toolboxes

A Comparison Between Camera Calibration Software Toolboxes 2016 International Conference on Computational Science and Computational Intelligence A Comparison Between Camera Calibration Software Toolboxes James Rothenflue, Nancy Gordillo-Herrejon, Ramazan S. Aygün

More information

Association Rule Mining. Entscheidungsunterstützungssysteme SS 18

Association Rule Mining. Entscheidungsunterstützungssysteme SS 18 Association Rule Mining Entscheidungsunterstützungssysteme SS 18 Frequent Pattern Analysis Frequent pattern: a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

APPROXIMATE KNOWLEDGE OF MANY AGENTS AND DISCOVERY SYSTEMS

APPROXIMATE KNOWLEDGE OF MANY AGENTS AND DISCOVERY SYSTEMS Jan M. Żytkow APPROXIMATE KNOWLEDGE OF MANY AGENTS AND DISCOVERY SYSTEMS 1. Introduction Automated discovery systems have been growing rapidly throughout 1980s as a joint venture of researchers in artificial

More information

in the New Zealand Curriculum

in the New Zealand Curriculum Technology in the New Zealand Curriculum We ve revised the Technology learning area to strengthen the positioning of digital technologies in the New Zealand Curriculum. The goal of this change is to ensure

More information

Learning to Play like an Othello Master CS 229 Project Report. Shir Aharon, Amanda Chang, Kent Koyanagi

Learning to Play like an Othello Master CS 229 Project Report. Shir Aharon, Amanda Chang, Kent Koyanagi Learning to Play like an Othello Master CS 229 Project Report December 13, 213 1 Abstract This project aims to train a machine to strategically play the game of Othello using machine learning. Prior to

More information

CEPT WGSE PT SE21. SEAMCAT Technical Group

CEPT WGSE PT SE21. SEAMCAT Technical Group Lucent Technologies Bell Labs Innovations ECC Electronic Communications Committee CEPT CEPT WGSE PT SE21 SEAMCAT Technical Group STG(03)12 29/10/2003 Subject: CDMA Downlink Power Control Methodology for

More information

Convention Paper 7057

Convention Paper 7057 Audio Engineering Society Convention Paper 7057 Presented at the 122nd Convention 2007 May 5 8 Vienna, Austria The papers at this Convention have been selected on the basis of a submitted abstract and

More information

RISE OF THE HUDDLE SPACE

RISE OF THE HUDDLE SPACE RISE OF THE HUDDLE SPACE November 2018 Sponsored by Introduction A total of 1,005 international participants from medium-sized businesses and enterprises completed the survey on the use of smaller meeting

More information

2. REVIEW OF LITERATURE

2. REVIEW OF LITERATURE 2. REVIEW OF LITERATURE Digital image processing is the use of the algorithms and procedures for operations such as image enhancement, image compression, image analysis, mapping. Transmission of information

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes 7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis

More information

CHAPTER 4 FIELD PROGRAMMABLE GATE ARRAY IMPLEMENTATION OF FIVE LEVEL CASCADED MULTILEVEL INVERTER

CHAPTER 4 FIELD PROGRAMMABLE GATE ARRAY IMPLEMENTATION OF FIVE LEVEL CASCADED MULTILEVEL INVERTER 87 CHAPTER 4 FIELD PROGRAMMABLE GATE ARRAY IMPLEMENTATION OF FIVE LEVEL CASCADED MULTILEVEL INVERTER 4.1 INTRODUCTION The Field Programmable Gate Array (FPGA) is a high performance data processing general

More information

Patent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis

Patent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis Patent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis by Chih-Ping Wei ( 魏志平 ), PhD Institute of Service Science and Institute of Technology Management National Tsing Hua

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

An improved strategy for solving Sudoku by sparse optimization methods

An improved strategy for solving Sudoku by sparse optimization methods An improved strategy for solving Sudoku by sparse optimization methods Yuchao Tang, Zhenggang Wu 2, Chuanxi Zhu. Department of Mathematics, Nanchang University, Nanchang 33003, P.R. China 2. School of

More information

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES FLORIAN BREUER and JOHN MICHAEL ROBSON Abstract We introduce a game called Squares where the single player is presented with a pattern of black and white

More information

MATRIX SAMPLING DESIGNS FOR THE YEAR2000 CENSUS. Alfredo Navarro and Richard A. Griffin l Alfredo Navarro, Bureau of the Census, Washington DC 20233

MATRIX SAMPLING DESIGNS FOR THE YEAR2000 CENSUS. Alfredo Navarro and Richard A. Griffin l Alfredo Navarro, Bureau of the Census, Washington DC 20233 MATRIX SAMPLING DESIGNS FOR THE YEAR2000 CENSUS Alfredo Navarro and Richard A. Griffin l Alfredo Navarro, Bureau of the Census, Washington DC 20233 I. Introduction and Background Over the past fifty years,

More information

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Justin Zhan I-Cheng Wang Abstract In the e-commerce era, recommendation systems were introduced to share customer experience

More information

The Problem. Tom Davis December 19, 2016

The Problem. Tom Davis  December 19, 2016 The 1 2 3 4 Problem Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles December 19, 2016 Abstract The first paragraph in the main part of this article poses a problem that can be approached

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

1. Executive Summary. 2. Introduction. Selection of a DC Solar PV Arc Fault Detector

1. Executive Summary. 2. Introduction. Selection of a DC Solar PV Arc Fault Detector Selection of a DC Solar PV Arc Fault Detector John Kluza Solar Market Strategic Manager, Sensata Technologies jkluza@sensata.com; +1-508-236-1947 1. Executive Summary Arc fault current interruption (AFCI)

More information

The Citizen View of Government Digital Transformation 2017 Findings

The Citizen View of Government Digital Transformation 2017 Findings WHITE PAPER The Citizen View of Government Digital Transformation 2017 Findings Delivering Transformation. Together. Shining a light on digital public services Digital technologies are fundamentally changing

More information

CONCURRENT ENGINEERING

CONCURRENT ENGINEERING CONCURRENT ENGINEERING S.P.Tayal Professor, M.M.University,Mullana- 133203, Distt.Ambala (Haryana) M: 08059930976, E-Mail: sptayal@gmail.com Abstract It is a work methodology based on the parallelization

More information

Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT)

Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT) WHITE PAPER Linking Liens and Civil Judgments Data Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT) Table of Contents Executive Summary... 3 Collecting

More information

Lecture 18 - Counting

Lecture 18 - Counting Lecture 18 - Counting 6.0 - April, 003 One of the most common mathematical problems in computer science is counting the number of elements in a set. This is often the core difficulty in determining a program

More information

Qualcomm Research DC-HSUPA

Qualcomm Research DC-HSUPA Qualcomm, Technologies, Inc. Qualcomm Research DC-HSUPA February 2015 Qualcomm Research is a division of Qualcomm Technologies, Inc. 1 Qualcomm Technologies, Inc. Qualcomm Technologies, Inc. 5775 Morehouse

More information

Instantaneous Loop. Ideal Phase Locked Loop. Gain ICs

Instantaneous Loop. Ideal Phase Locked Loop. Gain ICs Instantaneous Loop Ideal Phase Locked Loop Gain ICs PHASE COORDINATING An exciting breakthrough in phase tracking, phase coordinating, has been developed by Instantaneous Technologies. Instantaneous Technologies

More information

Leading with Technology! How digital technology is undermining our traditional notions of leadership and what organisations need to do about it.

Leading with Technology! How digital technology is undermining our traditional notions of leadership and what organisations need to do about it. Leading with Technology! How digital technology is undermining our traditional notions of leadership and what organisations need to do about it. by Simon Waller Over the last few years, Digital technology

More information

Vocal Command Recognition Using Parallel Processing of Multiple Confidence-Weighted Algorithms in an FPGA

Vocal Command Recognition Using Parallel Processing of Multiple Confidence-Weighted Algorithms in an FPGA Vocal Command Recognition Using Parallel Processing of Multiple Confidence-Weighted Algorithms in an FPGA ECE-492/3 Senior Design Project Spring 2015 Electrical and Computer Engineering Department Volgenau

More information

EE368 Digital Image Processing Project - Automatic Face Detection Using Color Based Segmentation and Template/Energy Thresholding

EE368 Digital Image Processing Project - Automatic Face Detection Using Color Based Segmentation and Template/Energy Thresholding 1 EE368 Digital Image Processing Project - Automatic Face Detection Using Color Based Segmentation and Template/Energy Thresholding Michael Padilla and Zihong Fan Group 16 Department of Electrical Engineering

More information

Propagation Modelling White Paper

Propagation Modelling White Paper Propagation Modelling White Paper Propagation Modelling White Paper Abstract: One of the key determinants of a radio link s received signal strength, whether wanted or interfering, is how the radio waves

More information

Computer Log Anomaly Detection Using Frequent Episodes

Computer Log Anomaly Detection Using Frequent Episodes Computer Log Anomaly Detection Using Frequent Episodes Perttu Halonen, Markus Miettinen, and Kimmo Hätönen Abstract In this paper, we propose a set of algorithms to automate the detection of anomalous

More information

Comparison of Monte Carlo Tree Search Methods in the Imperfect Information Card Game Cribbage

Comparison of Monte Carlo Tree Search Methods in the Imperfect Information Card Game Cribbage Comparison of Monte Carlo Tree Search Methods in the Imperfect Information Card Game Cribbage Richard Kelly and David Churchill Computer Science Faculty of Science Memorial University {richard.kelly, dchurchill}@mun.ca

More information

Methodology for Agent-Oriented Software

Methodology for Agent-Oriented Software ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this

More information

STEFAN RISTHAUS. A game by. for 2 4 players. 12 years and up

STEFAN RISTHAUS. A game by. for 2 4 players. 12 years and up A game by STEFAN RISTHAUS for 2 4 players 12 years and up Contents 1.0 Introduction 2.0 Game components 3.0 Winning the game 4.0 Setting up the game 5.0 Sequence of Play 6.0 End of Turn Phase 7.0 Emergency

More information

Balancing Bandwidth and Bytes: Managing storage and transmission across a datacast network

Balancing Bandwidth and Bytes: Managing storage and transmission across a datacast network Balancing Bandwidth and Bytes: Managing storage and transmission across a datacast network Pete Ludé iblast, Inc. Dan Radke HD+ Associates 1. Introduction The conversion of the nation s broadcast television

More information

IJITKMI Volume 7 Number 2 Jan June 2014 pp (ISSN ) Impact of attribute selection on the accuracy of Multilayer Perceptron

IJITKMI Volume 7 Number 2 Jan June 2014 pp (ISSN ) Impact of attribute selection on the accuracy of Multilayer Perceptron Impact of attribute selection on the accuracy of Multilayer Perceptron Niket Kumar Choudhary 1, Yogita Shinde 2, Rajeswari Kannan 3, Vaithiyanathan Venkatraman 4 1,2 Dept. of Computer Engineering, Pimpri-Chinchwad

More information

Monte Carlo based battleship agent

Monte Carlo based battleship agent Monte Carlo based battleship agent Written by: Omer Haber, 313302010; Dror Sharf, 315357319 Introduction The game of battleship is a guessing game for two players which has been around for almost a century.

More information

Algorithmique appliquée Projet UNO

Algorithmique appliquée Projet UNO Algorithmique appliquée Projet UNO Paul Dorbec, Cyril Gavoille The aim of this project is to encode a program as efficient as possible to find the best sequence of cards that can be played by a single

More information

User-friendly Matlab tool for easy ADC testing

User-friendly Matlab tool for easy ADC testing User-friendly Matlab tool for easy ADC testing Tamás Virosztek, István Kollár Budapest University of Technology and Economics, Department of Measurement and Information Systems Budapest, Hungary, H-1521,

More information

Drum Transcription Based on Independent Subspace Analysis

Drum Transcription Based on Independent Subspace Analysis Report for EE 391 Special Studies and Reports for Electrical Engineering Drum Transcription Based on Independent Subspace Analysis Yinyi Guo Center for Computer Research in Music and Acoustics, Stanford,

More information

Techniques for Generating Sudoku Instances

Techniques for Generating Sudoku Instances Chapter Techniques for Generating Sudoku Instances Overview Sudoku puzzles become worldwide popular among many players in different intellectual levels. In this chapter, we are going to discuss different

More information

STUDY OF THE PERFORMANCE OF THE LINEAR AND NON-LINEAR NARROW BAND RECEIVERS FOR 2X2 MIMO SYSTEMS WITH STBC MULTIPLEXING AND ALAMOTI CODING

STUDY OF THE PERFORMANCE OF THE LINEAR AND NON-LINEAR NARROW BAND RECEIVERS FOR 2X2 MIMO SYSTEMS WITH STBC MULTIPLEXING AND ALAMOTI CODING International Journal of Electrical and Electronics Engineering Research Vol.1, Issue 1 (2011) 68-83 TJPRC Pvt. Ltd., STUDY OF THE PERFORMANCE OF THE LINEAR AND NON-LINEAR NARROW BAND RECEIVERS FOR 2X2

More information

THE problem of automating the solving of

THE problem of automating the solving of CS231A FINAL PROJECT, JUNE 2016 1 Solving Large Jigsaw Puzzles L. Dery and C. Fufa Abstract This project attempts to reproduce the genetic algorithm in a paper entitled A Genetic Algorithm-Based Solver

More information

IMPLEMENTATION OF NEURAL NETWORK IN ENERGY SAVING OF INDUCTION MOTOR DRIVES WITH INDIRECT VECTOR CONTROL

IMPLEMENTATION OF NEURAL NETWORK IN ENERGY SAVING OF INDUCTION MOTOR DRIVES WITH INDIRECT VECTOR CONTROL IMPLEMENTATION OF NEURAL NETWORK IN ENERGY SAVING OF INDUCTION MOTOR DRIVES WITH INDIRECT VECTOR CONTROL * A. K. Sharma, ** R. A. Gupta, and *** Laxmi Srivastava * Department of Electrical Engineering,

More information

PAPR Reduction in SLM Scheme using Exhaustive Search Method

PAPR Reduction in SLM Scheme using Exhaustive Search Method Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2017, 4(10): 739-743 Research Article ISSN: 2394-658X PAPR Reduction in SLM Scheme using Exhaustive Search Method

More information

Image analysis. CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror

Image analysis. CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror Image analysis CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror 1 Outline Images in molecular and cellular biology Reducing image noise Mean and Gaussian filters Frequency domain interpretation

More information

TEMPORAL DIFFERENCE LEARNING IN CHINESE CHESS

TEMPORAL DIFFERENCE LEARNING IN CHINESE CHESS TEMPORAL DIFFERENCE LEARNING IN CHINESE CHESS Thong B. Trinh, Anwer S. Bashi, Nikhil Deshpande Department of Electrical Engineering University of New Orleans New Orleans, LA 70148 Tel: (504) 280-7383 Fax:

More information

INTERACTIVE DYNAMIC PRODUCTION BY GENETIC ALGORITHMS

INTERACTIVE DYNAMIC PRODUCTION BY GENETIC ALGORITHMS INTERACTIVE DYNAMIC PRODUCTION BY GENETIC ALGORITHMS M.Baioletti, A.Milani, V.Poggioni and S.Suriani Mathematics and Computer Science Department University of Perugia Via Vanvitelli 1, 06123 Perugia, Italy

More information

Sokoban: Reversed Solving

Sokoban: Reversed Solving Sokoban: Reversed Solving Frank Takes (ftakes@liacs.nl) Leiden Institute of Advanced Computer Science (LIACS), Leiden University June 20, 2008 Abstract This article describes a new method for attempting

More information

IMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE

IMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE Second Asian Conference on Computer Vision (ACCV9), Singapore, -8 December, Vol. III, pp. 6-1 (invited) IMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE Jia Hong Yin, Sergio

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks 2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering

More information

Wi-Fi Fingerprinting through Active Learning using Smartphones

Wi-Fi Fingerprinting through Active Learning using Smartphones Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,

More information

Key factors in the development of digital libraries

Key factors in the development of digital libraries Key factors in the development of digital libraries PROF. JOHN MACKENZIE OWEN 1 Abstract The library traditionally has performed a role within the information chain, where publishers and libraries act

More information

Project 2: Research Resolving Task Ordering using CILP

Project 2: Research Resolving Task Ordering using CILP 433-482 Project 2: Research Resolving Task Ordering using CILP Wern Li Wong May 2008 Abstract In the cooking domain, multiple robotic cook agents act under the direction of a human chef to prepare dinner

More information

CS221 Project Final Report Gomoku Game Agent

CS221 Project Final Report Gomoku Game Agent CS221 Project Final Report Gomoku Game Agent Qiao Tan qtan@stanford.edu Xiaoti Hu xiaotihu@stanford.edu 1 Introduction Gomoku, also know as five-in-a-row, is a strategy board game which is traditionally

More information

How to divide things fairly

How to divide things fairly MPRA Munich Personal RePEc Archive How to divide things fairly Steven Brams and D. Marc Kilgour and Christian Klamler New York University, Wilfrid Laurier University, University of Graz 6. September 2014

More information

Senion IPS 101. An introduction to Indoor Positioning Systems

Senion IPS 101. An introduction to Indoor Positioning Systems Senion IPS 101 An introduction to Indoor Positioning Systems INTRODUCTION Indoor Positioning 101 What is Indoor Positioning Systems? 3 Where IPS is used 4 How does it work? 6 Diverse Radio Environments

More information

Communications Overhead as the Cost of Constraints

Communications Overhead as the Cost of Constraints Communications Overhead as the Cost of Constraints J. Nicholas Laneman and Brian. Dunn Department of Electrical Engineering University of Notre Dame Email: {jnl,bdunn}@nd.edu Abstract This paper speculates

More information

Games. Episode 6 Part III: Dynamics. Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto

Games. Episode 6 Part III: Dynamics. Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto Games Episode 6 Part III: Dynamics Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto Dynamics Motivation for a new chapter 2 Dynamics Motivation for a new chapter

More information

CHAPTER 8: EXTENDED TETRACHORD CLASSIFICATION

CHAPTER 8: EXTENDED TETRACHORD CLASSIFICATION CHAPTER 8: EXTENDED TETRACHORD CLASSIFICATION Chapter 7 introduced the notion of strange circles: using various circles of musical intervals as equivalence classes to which input pitch-classes are assigned.

More information

2. Overall Use of Technology Survey Data Report

2. Overall Use of Technology Survey Data Report Thematic Report 2. Overall Use of Technology Survey Data Report February 2017 Prepared by Nordicity Prepared for Canada Council for the Arts Submitted to Gabriel Zamfir Director, Research, Evaluation and

More information

Global Journal of Engineering Science and Research Management

Global Journal of Engineering Science and Research Management A KERNEL BASED APPROACH: USING MOVIE SCRIPT FOR ASSESSING BOX OFFICE PERFORMANCE Mr.K.R. Dabhade *1 Ms. S.S. Ponde 2 *1 Computer Science Department. D.I.E.M.S. 2 Asst. Prof. Computer Science Department,

More information

Million Song Dataset Challenge!

Million Song Dataset Challenge! 1 Introduction Million Song Dataset Challenge Fengxuan Niu, Ming Yin, Cathy Tianjiao Zhang Million Song Dataset (MSD) is a freely available collection of data for one million of contemporary songs (http://labrosa.ee.columbia.edu/millionsong/).

More information

Consultation on assessment of future mobile competition and proposals for the award of 800 MHz and 2.6 GHz spectrum and related issues.

Consultation on assessment of future mobile competition and proposals for the award of 800 MHz and 2.6 GHz spectrum and related issues. Consultation on assessment of future mobile competition and proposals for the award of 800 MHz and 2.6 GHz spectrum and related issues Annexes 7-13 Consultation Publication date: 22 March 2011 Closing

More information

Combinatorics and Intuitive Probability

Combinatorics and Intuitive Probability Chapter Combinatorics and Intuitive Probability The simplest probabilistic scenario is perhaps one where the set of possible outcomes is finite and these outcomes are all equally likely. A subset of the

More information

Component Based Mechatronics Modelling Methodology

Component Based Mechatronics Modelling Methodology Component Based Mechatronics Modelling Methodology R.Sell, M.Tamre Department of Mechatronics, Tallinn Technical University, Tallinn, Estonia ABSTRACT There is long history of developing modelling systems

More information

Playing With Mazes. 3. Solving Mazes. David B. Suits Department of Philosophy Rochester Institute of Technology Rochester NY 14623

Playing With Mazes. 3. Solving Mazes. David B. Suits Department of Philosophy Rochester Institute of Technology Rochester NY 14623 Playing With Mazes David B. uits Department of Philosophy ochester Institute of Technology ochester NY 14623 Copyright 1994 David B. uits 3. olving Mazes Once a maze is known to be connected, there are

More information

Link Models for Circuit Switching

Link Models for Circuit Switching Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can

More information

Essay No. 1 ~ WHAT CAN YOU DO WITH A NEW IDEA? Discovery, invention, creation: what do these terms mean, and what does it mean to invent something?

Essay No. 1 ~ WHAT CAN YOU DO WITH A NEW IDEA? Discovery, invention, creation: what do these terms mean, and what does it mean to invent something? Essay No. 1 ~ WHAT CAN YOU DO WITH A NEW IDEA? Discovery, invention, creation: what do these terms mean, and what does it mean to invent something? Introduction This article 1 explores the nature of ideas

More information

The A.I. Revolution Begins With Augmented Intelligence. White Paper January 2018

The A.I. Revolution Begins With Augmented Intelligence. White Paper January 2018 White Paper January 2018 The A.I. Revolution Begins With Augmented Intelligence Steve Davis, Chief Technology Officer Aimee Lessard, Chief Analytics Officer 53% of companies believe that augmented intelligence

More information

Machine Learning in Iterated Prisoner s Dilemma using Evolutionary Algorithms

Machine Learning in Iterated Prisoner s Dilemma using Evolutionary Algorithms ITERATED PRISONER S DILEMMA 1 Machine Learning in Iterated Prisoner s Dilemma using Evolutionary Algorithms Department of Computer Science and Engineering. ITERATED PRISONER S DILEMMA 2 OUTLINE: 1. Description

More information

Mehrdad Amirghasemi a* Reza Zamani a

Mehrdad Amirghasemi a* Reza Zamani a The roles of evolutionary computation, fitness landscape, constructive methods and local searches in the development of adaptive systems for infrastructure planning Mehrdad Amirghasemi a* Reza Zamani a

More information

LOW-POWER SOFTWARE-DEFINED RADIO DESIGN USING FPGAS

LOW-POWER SOFTWARE-DEFINED RADIO DESIGN USING FPGAS LOW-POWER SOFTWARE-DEFINED RADIO DESIGN USING FPGAS Charlie Jenkins, (Altera Corporation San Jose, California, USA; chjenkin@altera.com) Paul Ekas, (Altera Corporation San Jose, California, USA; pekas@altera.com)

More information

Automatic feature-queried bird identification system based on entropy and fuzzy similarity

Automatic feature-queried bird identification system based on entropy and fuzzy similarity Available online at www.sciencedirect.com Expert Systems with Applications Expert Systems with Applications 34 (2008) 2879 2884 www.elsevier.com/locate/eswa Automatic feature-queried bird identification

More information

Aesthetically Pleasing Azulejo Patterns

Aesthetically Pleasing Azulejo Patterns Bridges 2009: Mathematics, Music, Art, Architecture, Culture Aesthetically Pleasing Azulejo Patterns Russell Jay Hendel Mathematics Department, Room 312 Towson University 7800 York Road Towson, MD, 21252,

More information