Survey of Kolmogorov Complexity and its Applications

Size: px
Start display at page:

Download "Survey of Kolmogorov Complexity and its Applications"

Transcription

1 Survey of Kolmogorov Complexity and its Applications Andrew Berni University of Illinois at Chicago 1 Abstract In this paper, a survey of Kolmogorov complexity is reported. The basics are briefly covered to give the reader an introductory understanding of the topic. This includes necessary definitions followed by some interesting properties and theorems. Following the brief introduction to the topic is some current research in the area, mainly focusing on the application of Kolmogorov complexity to quantum states and quantum computers. We finish with a discussion of current applications of Kolmogorov complexity to highlight how it can be used to solve practical problems. I. INTRODUCTION Kolmogorov complexity is a branch of information theory that deals with the complexity contained in a single object or string. It is another measure of randomness, as opposed to entropy, and it is not based on probability, but instead considers the method or algorithm used to compute the string. Not being tied to a probability distribution allows the measurement of randomness in a single object. The notion was developed independently by Andrey Kolmogorov in 1965 [3], Gregory Chaitin in 1965, and Ray Solomonoff [9]. In this paper, the definition of Kolmogorov complexity and many of its important properties will be examined. This will shed some light on some interesting features, as well as show some analogs to other areas of information theory. Keep in mind that only a small subset of the theory is presented. Just enough to show the reader some interesting properties and to give a short introduction. Newer developments in the field will be discussed, mainly in the area of quantum Kolmogorov complexity. This has become a topic of interest due to the rising popularity of the quantum computer. Finally, we will look at several applications of Kolmogorov complexity to get an idea of its practicality. We will see how Kolmogorov complexity can be used to solve a wide variety of problems. Its unique properties can be exploited to use it as a tool in problem solving. II. DEFINITION AND EXAMPLES Kolmogorov complexity came about as a way to describe the randomness in an object based on the length of the computer program used to describe the object [1]. This object could be a string, which is generated by a computer program. In general, that is what will usually be considered in definitions and proofs. It is different from Shannon s way of measuring randomness (entropy) since it does not rely on probability at all [1]. The mathematical definition of Kolmogorov complexity is as follow: K U (x) = min p:u(p)=x l(p)

2 where we find the minimum the length of computer program p over all programs p, such that computer U with input p produces the output string x. It is shown in [1] that we cannot find the exact value of K(x) in practice, but we can upper bound it. We can find these upper bounds by giving examples of programs that will produce the string x. The shorter the program that is found, the closer the length of that program is to the actual Kolmogorov complexity. A few examples to get the idea of the bounding are as follows: 1.The sequence 12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a 12a12a12a12a12a12a12a12a12a12a has fairly low Kolmogorov complexity. It can be described as print out the 3 character string 12a 30 times. Although the string is 90 characters long, its Kolmogorov complexity is 45 characters. We could conceivably make a string thousands or millions of characters long, which we can describe with a relatively short program. As we can see in the string, its redundant structure allows this compression. Looking at this from an entropy point of view, we would see this string as not very random as well. 2.The sequence 3vo1i3z9qm09ij3j4j6ncb1mfjh3890vg56n5md9s19va3 has a higher Kolmogorov complexity. It probably cannot be described as simply as the previous example. The shortest computer program to print this string would most likely look like print out the 46 character string 3vo1i3z9qm09ij3j4j6ncb1mfjh3890vg56n5md9s19va3. We need to know how many characters to print so that we do not extend beyond the end of the program when executing it. The program to print the string is just slightly longer than the string itself! Again, if we were to look at this in a probabilistic perspective, we would say that this string is pretty random. We could probably find shorter programs for to generate the examples above. The example programs given just represent upper bounds. If we found a shorter program to produce the output, then that would tighten the upper bound. 2 III. INTERESTING THEOREMS AND PROPERTIES A. Upper Bound on Kolmogorov Complexity One interesting theorem that is that the conditional Kolmogorov complexity (given the length of the string) is less than the length of the string plus an additive constant. We can almost deduce this by looking at how the string was described in the second example above. Since we are given the length of the string from the conditioning, we do not have to consider this in the Kolmogorov complexity. We only need to consider the string given, plus the length of the rest of the program, which is constant. If we want the unconditional Kolmogorov complexity, then a term is added to account for the length of the integer needed to describe how long the sequence is supposed to be. This term can be represented in 2*log(l(x)) bits if we are describing a binary string using a binary program [1]. This term which represents the length of the string can be more tightly bounded, but that will not be discussed here. B. Lower Bound on Kolmogorov Complexity It is also interesting to look at the lower bound of Kolmogorov complexity. This lower bound is stated as follows: The number of strings x with complexity K(x) < k satisfies

3 3 {x {0, 1} : K(x) < k} < 2 k This is proven by listing all binary programs with length less than k. This results in 1 null program, 2 1-bit programs, 4 2-bit programs, 8 16-bit programs, 2 k 1 (k-1)-bit programs. Counting these programs results in 2 k 1 possible programs, which is less than 2 k. In other words, there are not many sequences with low Kolmogorov complexity. Most sequences are not simple [1]. C. Computer Independence of Kolmogorov Complexity It can also be shown that the Kolmogorov complexity is computer independent except for an additive constant, which becomes negligible for high complexity sequences [1]. The notion of a universal computer is used here. Before diving too much into this explanation, we first need to consider how a machine can compute algorithms. A useful tool for analyzing computability is the Turing machine. A Turing machine is a theoretical device that operates on an infinite length tape that is fed into the machine. The machine has a tape head which can read an instruction from the tape, change states, and possibly write something to a work tape [12]. Further work has shown that a Turing machine can simulate any other computer, and a Turing machine could be simulated by any other computer [1]. This idea is used to prove the following theorem. Suppose we have a universal computer U that can simulate another computer. The idea is that the universal computer can mimic the behavior of another computer by running a fixed length program instructing the universal computer how to translate instructions for the other computer. Now, given K(x) for an arbitrary computer A, K U (x), the complexity of x for the universal computer U, is equal to K A (x), plus the length of the translation program. This shows that the Kolmogorov complexity is computer independent. As K A (x) rises, this constant becomes negligible, and the Kolmogorov complexity is the same no matter which computer outputs string x. D. Relationship Between K(x) and H(x) Another interesting property is the relationship between Kolmogorov complexity and entropy H(x) [1]. Which leads to: H(X) 1 f(x n )K(x n n) H(X) + n x n E 1 n K(Xn n) H(X) ( X 1) log n n This relationship shows that Kolmogorov complexity is closely related to Entropy, even though they are formed from very different foundations. E. Kolmogorov Complexity and Occam s Razor Next, we look at how we can apply Kolmogorov complexity as a formalization of Occam s razor [1]. Occam s razor states that The simplest explanation is best [11]. Kolmogorov complexity aims to find the minimum length program that produces the string x. This minimum length program is essentially the simplest program. Using Occam s razor as a guideline, we can conclude that this program is the best explanation. It seems to be a logical and natural result. + c n

4 4 A. Algorithmic Test for Randomness IV. FURTHER DEVELOPMENTS Martin Lof extended the theory of Kolmogorov complexity by defining algorithmically random sequences [7]. Before his work, there were only vague definitions of algorithmically randomness sequences. Lof introduced specific tests to find if a sequence is truly algorithmically random. B. Recent Developments In more recent developments in the field, Quantum Kolmogorov complexity is explored. Vitanyi explores this idea in [13]. The theory of Quantum Kolmogorov complexity describes the amount of information contained in a pure quantum state. Vitanyi shows that Quantum Kolmogorov complexity has analogs to classical Kolmogorov complexity. One of these analogs is that quantum Kolmogorov complexity is upper bounded and can be approximated from above. Vitanyi further develops the theory of Quantum Kolmogorov complexity in [14]. He explains that there is increasing interest in the subject due to the rising interest in the quantum computer. Vitayni also explains the idea of quantum Turing machines in this paper. He explains how it is based on probabilistic computation. The quantum Turing machine is useful when considering how a machine would operate on quantum states. He then goes on to explain quantum algorithms and how they apply to this theory. In 2008, this idea of quantum Turing machines is explored further by Muller. Muller shows in [8] the existence of a universal quantum Turing machine, which can simulate every other quantum Turing machine. Using this result, he shows that quantum Kolmogorov complexity is independent of the machine considered when computing quantum Kolmogorov complexity, up to an additive constant. This is analogous to the same property of classical Kolmogorov complexity. A. Information Assurance V. APPLICATIONS Kolmogorov complexity has some interesting applications. One such application is using Kolmogorov complexity to detect abnormal behavior in an information system. The paper [2] introduces this idea. The author describes how information security issues are usually dealt with after the fact that security has been breached. They propose instead to deal with a security breach as it happens. Other systems are presented as examples where abnormalities are detected and corrected before any damage can be caused. One example is a thermodynamic system monitoring and correcting pressure. A breach in pressure can be detected and isolated to a small portion of the entire system. In order to deal with a breach as it is happening, the information in the system needs to be somehow verified. One suggestion of how to monitor an information system is shown in the figure below. The author explains that a lower complexity of K(X,Y) will make it easier for an attacker to understand what the system is doing (since its inputs and outputs are not very complex). The other metric to monitor is K(Y X). If the system adds complexity to X to produce Y, then the system will be less vulnerable. If the system subtracts complexity to X to produce Y, then the

5 5 Fig. 1. system will be more vulnerable. Monitoring these two metrics, and classifying vulnerability based on the regions shown is a proposed method of using Kolmogorov complexity to monitor information in a system. This is just one example of several indicators presented in this paper. The paper concludes that that Kolmogorov complexity is a good candidate for further research in this area. B. Spam Filtering Another interesting application of Kolmogorov Complexity is using it to filter spam. [10] gives details of how this can be done. Using an adaptive filter and Kolmogorov complexity estimates, is checked to be spam or normal . They use estimates because, as explained earlier, the exact Kolmogorov complexity is impossible to compute. It can be bounded from above, so they use a compression algorithm to find out how much the string can be compressed, and use this as an upper bound on the Kolmogorov complexity [5]. A low Kolmogorov complexity indicates a higher probability of the message being spam. Statistical data is gathered showing the relation between Kolmogorov complexity and spam. An example is presented below in tabular form. In order to generate this estimate of the Kolmogorov complexity, a run-length compression algorithm is performed on the message. We can see that, for this particular database of example s, that most of the spam has very low Kolmogorov complexity. They show that this method can filter spam about twice as fast as normal methods based on Bayesian filters, which is a common implementation of a spam filter, while achieving an accuracy rate of 80% to 96%. They also find that their method is less likely to be fooled by a statistical attack, which is performed by adding words to the spam to make it look like normal . They project that in future work, better accuracy could be obtained by using different compression methods. This could possibly provide a better estimate of the actual Kolmogorov complexity

6 6 Fig. 2. of the message, which may lead to better performance. They also speculate on other possible applications of their method, including plaigairism detection by matching texts with their respective authors. C. Mental Fatigue The applications of Kolmogorov complexity seem to be limitless. Since Kolmogorov complexity operates on strings, it can really be applied to anything that can be described as a string. The next application introduced is using Kolmogorov complexity to assess mental fatigue. In [6], the author applies Kolmogorov complexity to EEG signals obtained from patients in order to measure the level of fatigue in that patient. In this case, electrical brain signals are measured and transformed into discrete sequences. The discrete sequence can then be analyzed using any choice of Kolmogorov complexity estimation methods. In this paper the method used is very different from the one used in the spam filtering application paper. The method used for the EEG signals was based on a method described in [4] in which the complexity of the object is estimated by the number of steps in the generating process. The goal of their work was solely to see if there was any connection between Kolmogorov complexity of the EEG, and mental fatigue. According to the conclusion of the paper, they achieved this goal, and found that there was a strong correlation. The value of Kolmogorov complexity on the EEG signal was found to decrease as mental fatigue increases. VI. CONCLUSION Kolmogorov complexity and a handful of its applications were surveyed in this paper. Kolmogorov complexity presents a different view of information and randomness than entropy methods of information theory. The properties of Kolmogorov complexity are interesting and at times unexpected. It is apparent that Kolmogorov complexity is an elegant and useful branch of information theory. New research is continuing, especially in the area of Quantum Kolmogorov complexity. The applications presented all took pieces of classical Kolmogorov complexity and put them to practical use. It will be interesting to see how quantum Kolmogorov complexity will be put to practical use in future works, as well as new applications of the classical Kolmogorov complexity. REFERENCES [1] T. A. Cover and J. A. Thomas. Elements of information theory. John Wiley and Sons, Inc, 2006.

7 [2] S. Evans, S.F. Bush, and J. Hershey. Information assurance through kolmogorov complexity. DISCEX 01. Proceedings, 2: , [3] A. N. Kolmogorov. Three approaches to the quantitative definition of information. Probl. Inf. Transm. (USSR), 1:4 7, [4] A. Lempel and J. Ziv. On the complexity of finite sequences. IEEE Trans. Inf. Theory, 22(1):75 81, [5] M. Li and P. Vitanyi. An introduction to kolmogorov complexity and its applications. 2nd ed. Springer-Verlag, New York, [6] Zhang Lian-yi and Zheng Chong-xun. Analysis of kolmogorov complexity in spontaneous eeg signal and it s application to assessment of mental fatigue. Bioinformatics and Biomedical Engineering, pages , [7] P. Martin-Lof. The definition of random sequences. Inf. Control, 9: , [8] M. Muller. Strongly universal quantum turing machines and invariance of kolmogorov complexity. Information Theory, IEEE Transactions on, 54(2): , [9] R. J. Solomonoff. A formal theory of inductive inference. Inf. Control, 7: , [10] L.M. Spracklin and L.V. Saxton. Filtering spam using kolmogorov complexity estimates. Advanced Information Networking and Applications Workshops, 1: , [11] S. C. Tornay. Ockham: Studies and selections (chapter commentarium in sententias, i, 27). Proceedings of the London Mathematical Society, [12] A. M. Turing. On computable numbers, with an application to the entscheidungsproblem. Proceedings of the London Mathematical Society, 2 42:230 65, [13] P. Vitanyi. Three approaches to the quantitative definition of information in an individual pure quantum state. 15th Annual IEEE Conference on Computational Complexity, pages , [14] Paul M. B. Vitanyi. Quantum kolmogorov complexity based on classical descriptions. IEEE Transactions on Information Theory, 47(6),

Kolmogorov Complexity

Kolmogorov Complexity Kolmogorov Complexity Computational Complexity Course Report By Henry Xiao Queen s University School of Computing Kingston, Ontario, Canada March 2004 Introduction In computer science, the concepts of

More information

arxiv: v1 [q-fin.st] 7 Nov 2014

arxiv: v1 [q-fin.st] 7 Nov 2014 On the Complexity and Behaviour of Cryptocurrencies Compared to Other Markets Daniel Wilson-Nunn 1 and Hector Zenil 2,3, 1 Department of Statistics, University of Warwick, United Kingdom 2 Department of

More information

VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY. A seminar report on GENETIC ALGORITHMS.

VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY. A seminar report on GENETIC ALGORITHMS. VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY A seminar report on GENETIC ALGORITHMS Submitted by Pranesh S S 2SD06CS061 8 th semester DEPARTMENT OF COMPUTER SCIENCE

More information

Genome Reassembly From Fragments. 28 March 2013 OSU CSE 1

Genome Reassembly From Fragments. 28 March 2013 OSU CSE 1 Genome Reassembly From Fragments 28 March 2013 OSU CSE 1 Genome A genome is the encoding of hereditary information for an organism in its DNA The mathematical model of a genome is a string of character,

More information

9. Verification, Validation, Testing

9. Verification, Validation, Testing 9. Verification, Validation, Testing (a) Basic Notions (b) Dynamic testing. (c) Static analysis. (d) Modelling. (e) Environmental Simulation. (f) Test Strategies. (g) Tool support. (h) Independent Verification

More information

Deterministic Crowding, Recombination And Self-Similarity

Deterministic Crowding, Recombination And Self-Similarity Deterministic Crowding, Recombination And Self-Similarity Bo Yuan School of Information Technology and Electrical Engineering The University of Queensland Brisbane, Queensland 4072 Australia E-mail: s4002283@student.uq.edu.au

More information

Attribution in online marketing

Attribution in online marketing Online Intelligence Solutions Attribution in online marketing By Jacques Warren WHITE PAPER WHITE PAPER About Jacques Warren Jacques Warren has been working in the online marketing field since 1996, focusing

More information

Applying RFID Hand-Held Device for Factory Equipment Diagnosis

Applying RFID Hand-Held Device for Factory Equipment Diagnosis Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Applying RFID Hand-Held Device for Factory Equipment Diagnosis Kai-Ying Chen,

More information

I OPT (Input Output Processing Template)

I OPT (Input Output Processing Template) I OPT (Input Output Processing Template) INDIVIDUAL LEADERSHIP REPORT This report has been prepared for: Sample Leadership Report 1999, Professional Communications Inc. All rights reserved. Trademarks:

More information

Audit evidence. chapter. Chapter learning objectives. When you have completed this chapter you will be able to:

Audit evidence. chapter. Chapter learning objectives. When you have completed this chapter you will be able to: chapter 9 Audit evidence Chapter learning objectives When you have completed this chapter you will be able to: explain the assertions contained in the financial statements explain the use of assertions

More information

TIMETABLING EXPERIMENTS USING GENETIC ALGORITHMS. Liviu Lalescu, Costin Badica

TIMETABLING EXPERIMENTS USING GENETIC ALGORITHMS. Liviu Lalescu, Costin Badica TIMETABLING EXPERIMENTS USING GENETIC ALGORITHMS Liviu Lalescu, Costin Badica University of Craiova, Faculty of Control, Computers and Electronics Software Engineering Department, str.tehnicii, 5, Craiova,

More information

MINIMIZE THE MAKESPAN FOR JOB SHOP SCHEDULING PROBLEM USING ARTIFICIAL IMMUNE SYSTEM APPROACH

MINIMIZE THE MAKESPAN FOR JOB SHOP SCHEDULING PROBLEM USING ARTIFICIAL IMMUNE SYSTEM APPROACH MINIMIZE THE MAKESPAN FOR JOB SHOP SCHEDULING PROBLEM USING ARTIFICIAL IMMUNE SYSTEM APPROACH AHMAD SHAHRIZAL MUHAMAD, 1 SAFAAI DERIS, 2 ZALMIYAH ZAKARIA 1 Professor, Faculty of Computing, Universiti Teknologi

More information

A Viral Systems Algorithm for the Traveling Salesman Problem

A Viral Systems Algorithm for the Traveling Salesman Problem Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 6, 2012 A Viral Systems Algorithm for the Traveling Salesman Problem Dedy Suryadi,

More information

Decision Tree Learning. Richard McAllister. Outline. Overview. Tree Construction. Case Study: Determinants of House Price. February 4, / 31

Decision Tree Learning. Richard McAllister. Outline. Overview. Tree Construction. Case Study: Determinants of House Price. February 4, / 31 1 / 31 Decision Decision February 4, 2008 2 / 31 Decision 1 2 3 3 / 31 Decision Decision Widely Used Used for approximating discrete-valued functions Robust to noisy data Capable of learning disjunctive

More information

Characteristics of a Robust Process

Characteristics of a Robust Process Characteristics of a Robust Process By Rich Schiesser: In Conjunction with Harris Kern s Enterprise Computing Institute One of the distinctions that separate world-class infrastructures from those that

More information

STATISTICAL TECHNIQUES. Data Analysis and Modelling

STATISTICAL TECHNIQUES. Data Analysis and Modelling STATISTICAL TECHNIQUES Data Analysis and Modelling DATA ANALYSIS & MODELLING Data collection and presentation Many of us probably some of the methods involved in collecting raw data. Once the data has

More information

WE consider the general ranking problem, where a computer

WE consider the general ranking problem, where a computer 5140 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 Statistical Analysis of Bayes Optimal Subset Ranking David Cossock and Tong Zhang Abstract The ranking problem has become increasingly

More information

Game Theory Approach to Solve Economic Dispatch Problem

Game Theory Approach to Solve Economic Dispatch Problem Game Theory Approach to Solve Economic Dispatch Problem Nezihe Yildiran and Emin Tacer Abstract This paper presents a game theory application for economic dispatch problem. In this application, economic

More information

OPENEDGE BPM OVERVIEW

OPENEDGE BPM OVERVIEW OPENEDGE BPM OVERVIEW Fellow and OpenEdge Evangelist Document Version 1.0 July 2011 July, 2011 Page 1 of 11 DISCLAIMER Certain portions of this document contain information about Progress Software Corporation

More information

Job Board - A Web Based Scheduler

Job Board - A Web Based Scheduler Job Board - A Web Based Scheduler Cameron Ario and Kasi Periyasamy Department of Computer Science University of Wisconsin-La Crosse La Crosse, WI 54601 {ario.came, kperiyasamy}@uwlax.edu Abstract Contractual

More information

EST Accuracy of FEL 2 Estimates in Process Plants

EST Accuracy of FEL 2 Estimates in Process Plants EST.2215 Accuracy of FEL 2 Estimates in Process Plants Melissa C. Matthews Abstract Estimators use a variety of practices to determine the cost of capital projects at the end of the select stage when only

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council Distr.: General 19 March 2014 ECE/CES/2014/32 English only Economic Commission for Europe Conference of European Statisticians Sixty-second plenary session Paris,

More information

Bio-inspired Models of Computation. An Introduction

Bio-inspired Models of Computation. An Introduction Bio-inspired Models of Computation An Introduction Introduction (1) Natural Computing is the study of models of computation inspired by the functioning of biological systems Natural Computing is not Bioinformatics

More information

"I OPT" INDIVIDUAL LEADERSHIP REPORT. This report has been prepared for: Frank 10/16/2007. (Input Output Processing Template)

I OPT INDIVIDUAL LEADERSHIP REPORT. This report has been prepared for: Frank 10/16/2007. (Input Output Processing Template) "I OPT" (Input Output Processing Template) INDIVIDUAL LEADERSHIP REPORT This report has been prepared for: Frank 10/16/2007 2003, Professional Communications Inc. All rights reserved. Trademarks: Professional

More information

Package DNABarcodes. March 1, 2018

Package DNABarcodes. March 1, 2018 Type Package Package DNABarcodes March 1, 2018 Title A tool for creating and analysing DNA barcodes used in Next Generation Sequencing multiplexing experiments Version 1.9.0 Date 2014-07-23 Author Tilo

More information

Intelligently Choosing Testing Techniques

Intelligently Choosing Testing Techniques Intelligently Choosing Testing Techniques CS 390: Software Engineering Dr. Hwang By: Jonathan Bach October 28, 2008 1 The ability for a company to produce a complicated, high quality, problem free product

More information

Predictability, Constancy and Contingency in Electric Load Profiles

Predictability, Constancy and Contingency in Electric Load Profiles 26 IEEE International Conference on Smart Grid Communications (SmartGridComm): Data Management and Grid Analytics and Predictability, Constancy and Contingency in Electric Load Profiles Chenye Wu Wenyuan

More information

Bandwagon and Underdog Effects and the Possibility of Election Predictions

Bandwagon and Underdog Effects and the Possibility of Election Predictions Reprinted from Public Opinion Quarterly, Vol. 18, No. 3 Bandwagon and Underdog Effects and the Possibility of Election Predictions By HERBERT A. SIMON Social research has often been attacked on the grounds

More information

Introduction to Information Systems Fifth Edition

Introduction to Information Systems Fifth Edition Introduction to Information Systems Fifth Edition R. Kelly Rainer Brad Prince Casey Cegielski Appendix D Intelligent Systems Copyright 2014 John Wiley & Sons, Inc. All rights reserved. 1. Explain the potential

More information

The following is a sample lab report. It is in an acceptable format and can be used as a guide for what I am looking for in your lab report.

The following is a sample lab report. It is in an acceptable format and can be used as a guide for what I am looking for in your lab report. In the Lab Syllabus, I gave you a lot of details regarding the writing of your lab reports. I know you have probably been overwhelmed with information the first week or so of this course. I will refer

More information

A Personalized Company Recommender System for Job Seekers Yixin Cai, Ruixi Lin, Yue Kang

A Personalized Company Recommender System for Job Seekers Yixin Cai, Ruixi Lin, Yue Kang A Personalized Company Recommender System for Job Seekers Yixin Cai, Ruixi Lin, Yue Kang Abstract Our team intends to develop a recommendation system for job seekers based on the information of current

More information

Intro. ANN & Fuzzy Systems. Lecture 36 GENETIC ALGORITHM (1)

Intro. ANN & Fuzzy Systems. Lecture 36 GENETIC ALGORITHM (1) Lecture 36 GENETIC ALGORITHM (1) Outline What is a Genetic Algorithm? An Example Components of a Genetic Algorithm Representation of gene Selection Criteria Reproduction Rules Cross-over Mutation Potential

More information

Machine learning applications in genomics: practical issues & challenges. Yuzhen Ye School of Informatics and Computing, Indiana University

Machine learning applications in genomics: practical issues & challenges. Yuzhen Ye School of Informatics and Computing, Indiana University Machine learning applications in genomics: practical issues & challenges Yuzhen Ye School of Informatics and Computing, Indiana University Reference Machine learning applications in genetics and genomics

More information

Data Collection and Statistical Data Analysis in Preparation for Simulation of a Furniture Manufacturing Company

Data Collection and Statistical Data Analysis in Preparation for Simulation of a Furniture Manufacturing Company , June 29 - July 1, 2016, London, U.K. Data Collection and Statistical Data Analysis in Preparation for Simulation of a Furniture Manufacturing Company Wilson R. Nyemba, and Charles Mbohwa Abstract Systems

More information

What is Important When Selecting an MBT Tool?

What is Important When Selecting an MBT Tool? What is Important When Selecting an MBT Tool? Interest towards model-based testing has increased quite significantly over the years as people have started to reach limits of traditional approaches and

More information

GENETIC ALGORITHMS. Narra Priyanka. K.Naga Sowjanya. Vasavi College of Engineering. Ibrahimbahg,Hyderabad.

GENETIC ALGORITHMS. Narra Priyanka. K.Naga Sowjanya. Vasavi College of Engineering. Ibrahimbahg,Hyderabad. GENETIC ALGORITHMS Narra Priyanka K.Naga Sowjanya Vasavi College of Engineering. Ibrahimbahg,Hyderabad mynameissowji@yahoo.com priyankanarra@yahoo.com Abstract Genetic algorithms are a part of evolutionary

More information

Numerical investigation of tradeoffs in production-inventory control policies with advance demand information

Numerical investigation of tradeoffs in production-inventory control policies with advance demand information Numerical investigation of tradeoffs in production-inventory control policies with advance demand information George Liberopoulos and telios oukoumialos University of Thessaly, Department of Mechanical

More information

An Approach to Predicting Passenger Operation Performance from Commuter System Performance

An Approach to Predicting Passenger Operation Performance from Commuter System Performance An Approach to Predicting Passenger Operation Performance from Commuter System Performance Bo Chang, Ph. D SYSTRA New York, NY ABSTRACT In passenger operation, one often is concerned with on-time performance.

More information

Critical Systems Specification. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 9 Slide 1

Critical Systems Specification. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 9 Slide 1 Critical Systems Specification Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 9 Slide 1 Objectives To explain how dependability requirements may be identified by analysing the risks faced

More information

TIMEBOXING PLANNING: BUFFERED MOSCOW RULES

TIMEBOXING PLANNING: BUFFERED MOSCOW RULES TIMEBOXING PLANNING: BUFFERED MOSCOW RULES EDUARDO MIRANDA, INSTITUTE FOR SOFTWARE RESEARCH, CARNEGIE MELLON UNIVERSITY, SEPTEMBER 2011 ABSTRACT Time boxing is a management technique which prioritizes

More information

Genetic Algorithm with Upgrading Operator

Genetic Algorithm with Upgrading Operator Genetic Algorithm with Upgrading Operator NIDAPAN SUREERATTANAN Computer Science and Information Management, School of Advanced Technologies, Asian Institute of Technology, P.O. Box 4, Klong Luang, Pathumthani

More information

Intelligent Techniques Lesson 4 (Examples about Genetic Algorithm)

Intelligent Techniques Lesson 4 (Examples about Genetic Algorithm) Intelligent Techniques Lesson 4 (Examples about Genetic Algorithm) Numerical Example A simple example will help us to understand how a GA works. Let us find the maximum value of the function (15x - x 2

More information

Time Series Motif Discovery

Time Series Motif Discovery Time Series Motif Discovery Bachelor s Thesis Exposé eingereicht von: Jonas Spenger Gutachter: Dr. rer. nat. Patrick Schäfer Gutachter: Prof. Dr. Ulf Leser eingereicht am: 10.09.2017 Contents 1 Introduction

More information

Random Forests. Parametrization and Dynamic Induction

Random Forests. Parametrization and Dynamic Induction Random Forests Parametrization and Dynamic Induction Simon Bernard Document and Learning research team LITIS laboratory University of Rouen, France décembre 2014 Random Forest Classifiers Random Forests

More information

VCG in Theory and Practice

VCG in Theory and Practice 1 2 3 4 VCG in Theory and Practice Hal R. Varian Christopher Harris Google, Inc. May 2013 Revised: December 26, 2013 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 It is now common to sell online ads using

More information

VALUE OF SHARING DATA

VALUE OF SHARING DATA VALUE OF SHARING DATA PATRICK HUMMEL* FEBRUARY 12, 2018 Abstract. This paper analyzes whether advertisers would be better off using data that would enable them to target users more accurately if the only

More information

Dependability requirements. Risk-driven specification. Objectives. Stages of risk-based analysis. Topics covered. Critical Systems Specification

Dependability requirements. Risk-driven specification. Objectives. Stages of risk-based analysis. Topics covered. Critical Systems Specification Dependability requirements Critical Systems Specification Functional requirements to define error checking and recovery facilities and protection against system failures. Non-functional requirements defining

More information

More-Advanced Statistical Sampling Concepts for Tests of Controls and Tests of Balances

More-Advanced Statistical Sampling Concepts for Tests of Controls and Tests of Balances APPENDIX 10B More-Advanced Statistical Sampling Concepts for Tests of Controls and Tests of Balances Appendix 10B contains more mathematical and statistical details related to the test of controls sampling

More information

A Greedy Algorithm for Minimizing the Number of Primers in Multiple PCR Experiments

A Greedy Algorithm for Minimizing the Number of Primers in Multiple PCR Experiments A Greedy Algorithm for Minimizing the Number of Primers in Multiple PCR Experiments Koichiro Doi Hiroshi Imai doi@is.s.u-tokyo.ac.jp imai@is.s.u-tokyo.ac.jp Department of Information Science, Faculty of

More information

A logistic regression model for Semantic Web service matchmaking

A logistic regression model for Semantic Web service matchmaking . BRIEF REPORT. SCIENCE CHINA Information Sciences July 2012 Vol. 55 No. 7: 1715 1720 doi: 10.1007/s11432-012-4591-x A logistic regression model for Semantic Web service matchmaking WEI DengPing 1*, WANG

More information

Big Data. Methodological issues in using Big Data for Official Statistics

Big Data. Methodological issues in using Big Data for Official Statistics Giulio Barcaroli Istat (barcarol@istat.it) Big Data Effective Processing and Analysis of Very Large and Unstructured data for Official Statistics. Methodological issues in using Big Data for Official Statistics

More information

A CUSTOMER-PREFERENCE UNCERTAINTY MODEL FOR DECISION-ANALYTIC CONCEPT SELECTION

A CUSTOMER-PREFERENCE UNCERTAINTY MODEL FOR DECISION-ANALYTIC CONCEPT SELECTION Proceedings of the 4th Annual ISC Research Symposium ISCRS 2 April 2, 2, Rolla, Missouri A CUSTOMER-PREFERENCE UNCERTAINTY MODEL FOR DECISION-ANALYTIC CONCEPT SELECTION ABSTRACT Analysis of customer preferences

More information

The Job Assignment Problem: A Study in Parallel and Distributed Machine Learning

The Job Assignment Problem: A Study in Parallel and Distributed Machine Learning The Job Assignment Problem: A Study in Parallel and Distributed Machine Learning Gerhard Weiß Institut für Informatik, Technische Universität München D-80290 München, Germany weissg@informatik.tu-muenchen.de

More information

Principles of Inventory Management

Principles of Inventory Management John A. Muckstadt Amar Sapra Principles of Inventory Management When You Are Down to Four, Order More fya Springer Inventories Are Everywhere 1 1.1 The Roles of Inventory 2 1.2 Fundamental Questions 5

More information

Multi-Layer Data Encryption using Residue Number System in DNA Sequence

Multi-Layer Data Encryption using Residue Number System in DNA Sequence International Journal of Computer Applications (975 8887) Multi-Layer Data Encryption using Residue Number System in DNA Sequence M. I. Youssef Faculty Of Engineering, Department Of Electrical Engineering

More information

Using Architectural Models to Predict the Maintainability of Enterprise Systems

Using Architectural Models to Predict the Maintainability of Enterprise Systems Using Architectural Models to Predict the Maintainability of Enterprise Systems Robert Lagerström*, Pontus Johnson Department of Industrial Information and Control Systems Royal Institute of Technology

More information

Multiple Regression. Dr. Tom Pierce Department of Psychology Radford University

Multiple Regression. Dr. Tom Pierce Department of Psychology Radford University Multiple Regression Dr. Tom Pierce Department of Psychology Radford University In the previous chapter we talked about regression as a technique for using a person s score on one variable to make a best

More information

Automated Energy Distribution In Smart Grids

Automated Energy Distribution In Smart Grids Automated Energy Distribution In Smart Grids John Yu Stanford University Michael Chun Stanford University Abstract We design and implement a software controller that can distribute energy in a power grid.

More information

Batch Schedule Optimization

Batch Schedule Optimization Batch Schedule Optimization Steve Morrison, Ph.D. Chem. Eng. Info@MethodicalMiracles.com. 214-769-9081 Abstract: Batch schedule optimization is complex, but decomposing it to a simulation plus optimization

More information

e-trans Association Rules for e-banking Transactions

e-trans Association Rules for e-banking Transactions In IV International Conference on Decision Support for Telecommunications and Information Society, 2004 e-trans Association Rules for e-banking Transactions Vasilis Aggelis University of Patras Department

More information

Modeling of competition in revenue management Petr Fiala 1

Modeling of competition in revenue management Petr Fiala 1 Modeling of competition in revenue management Petr Fiala 1 Abstract. Revenue management (RM) is the art and science of predicting consumer behavior and optimizing price and product availability to maximize

More information

Group Incentive Compatibility for Matching with Contracts

Group Incentive Compatibility for Matching with Contracts Group Incentive Compatibility for Matching with Contracts John William Hatfield and Fuhito Kojima July 20, 2007 Abstract Hatfield and Milgrom (2005) present a unified model of matching with contracts,

More information

American Association for Public Opinion Research

American Association for Public Opinion Research American Association for Public Opinion Research Bandwagon and Underdog Effects and the Possibility of Election Predictions Author(s): Herbert A. Simon Source: The Public Opinion Quarterly, Vol. 18, No.

More information

Examination of Cross Validation techniques and the biases they reduce.

Examination of Cross Validation techniques and the biases they reduce. Examination of Cross Validation techniques and the biases they reduce. Dr. Jon Starkweather, Research and Statistical Support consultant. The current article continues from last month s brief examples

More information

Variable Selection Methods for Multivariate Process Monitoring

Variable Selection Methods for Multivariate Process Monitoring Proceedings of the World Congress on Engineering 04 Vol II, WCE 04, July - 4, 04, London, U.K. Variable Selection Methods for Multivariate Process Monitoring Luan Jaupi Abstract In the first stage of a

More information

California Subject Examinations for Teachers

California Subject Examinations for Teachers California Subject Examinations for Teachers TEST GUIDE MATHEMATICS General Examination Information Copyright 2015 Pearson Education, Inc. or its affiliate(s). All rights reserved. Evaluation Systems,

More information

Practical Regression: Fixed Effects Models

Practical Regression: Fixed Effects Models DAVID DRANOVE 7-112-005 Practical Regression: Fixed Effects Models This is one in a series of notes entitled Practical Regression. These notes supplement the theoretical content of most statistics texts

More information

Machine learning in neuroscience

Machine learning in neuroscience Machine learning in neuroscience Bojan Mihaljevic, Luis Rodriguez-Lujan Computational Intelligence Group School of Computer Science, Technical University of Madrid 2015 IEEE Iberian Student Branch Congress

More information

Lecture 45. Waiting Lines. Learning Objectives

Lecture 45. Waiting Lines. Learning Objectives Lecture 45 Waiting Lines Learning Objectives After completing the lecture, we should be able to explain the formation of waiting lines in unloaded systems, identify the goal of queuing ( waiting line)

More information

Keywords Genetic, pseudorandom numbers, cryptosystems, optimal solution.

Keywords Genetic, pseudorandom numbers, cryptosystems, optimal solution. Volume 6, Issue 8, August 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Apply Genetic

More information

Software redundancy design for a Human-Machine Interface in railway vehicles

Software redundancy design for a Human-Machine Interface in railway vehicles Computers in Railways XII 221 Software redundancy design for a Human-Machine Interface in railway vehicles G. Zheng 1 & J. Chen 1,2 1 Institute of Software, Chinese Academy of Sciences, China 2 Graduate

More information

Discrete Mathematics An Introduction to Proofs Proof Techniques. Math 245 January 17, 2013

Discrete Mathematics An Introduction to Proofs Proof Techniques. Math 245 January 17, 2013 Discrete Mathematics An Introduction to Proofs Proof Techniques Math 245 January 17, 2013 Proof Techniques Proof Techniques Direct Proof Proof Techniques Direct Proof Indirect Proof Proof Techniques Direct

More information

A Comparison between Genetic Algorithms and Evolutionary Programming based on Cutting Stock Problem

A Comparison between Genetic Algorithms and Evolutionary Programming based on Cutting Stock Problem Engineering Letters, 14:1, EL_14_1_14 (Advance online publication: 12 February 2007) A Comparison between Genetic Algorithms and Evolutionary Programming based on Cutting Stock Problem Raymond Chiong,

More information

Novel Tag Anti-collision Algorithm with Adaptive Grouping

Novel Tag Anti-collision Algorithm with Adaptive Grouping Wireless Sensor Network, 2009, 1, 475-481 doi:10.4236/wsn.2009.15057 Published Online December 2009 (http://www.scirp.org/journal/wsn). Novel Tag Anti-Collision Algorithm with Adaptive Grouping Abstract

More information

Ricardo Model. Sino-American Trade and Economic Conflict

Ricardo Model. Sino-American Trade and Economic Conflict 1 of 18 6/10/2011 4:35 PM Sino-American Trade and Economic Conflict By Ralph E. Gomory and William J. Baumol March 22, 2011 In this note we look carefully at the impact on a developed nation of the economic

More information

WHITE PAPER. Getting to Why in Omnichannel Title Marketing Attribution

WHITE PAPER. Getting to Why in Omnichannel Title Marketing Attribution WHITE PAPER Getting to Why in Omnichannel Title Marketing Attribution ii Contents The state of affairs... 1 The limitations of summarized, siloed channel data...2 Key takeaways... 3 Learn more... 3 1 The

More information

Control Charts for Customer Satisfaction Surveys

Control Charts for Customer Satisfaction Surveys Control Charts for Customer Satisfaction Surveys Robert Kushler Department of Mathematics and Statistics, Oakland University Gary Radka RDA Group ABSTRACT Periodic customer satisfaction surveys are used

More information

On-Line Restricted Assignment of Temporary Tasks with Unknown Durations

On-Line Restricted Assignment of Temporary Tasks with Unknown Durations On-Line Restricted Assignment of Temporary Tasks with Unknown Durations Amitai Armon Yossi Azar Leah Epstein Oded Regev Keywords: on-line algorithms, competitiveness, temporary tasks Abstract We consider

More information

Agile TesTing MeTrics Quality Before Velocity

Agile TesTing MeTrics Quality Before Velocity Agile TesTing MeTrics Quality Before Velocity Some people never weigh themselves. They may say, i just look at my clothes. if they don t fit, then i know i should lose weight. On the other hand, some people

More information

Genetic Algorithms in Matrix Representation and Its Application in Synthetic Data

Genetic Algorithms in Matrix Representation and Its Application in Synthetic Data Genetic Algorithms in Matrix Representation and Its Application in Synthetic Data Yingrui Chen *, Mark Elliot ** and Joe Sakshaug *** * ** University of Manchester, yingrui.chen@manchester.ac.uk University

More information

Association rules model of e-banking services

Association rules model of e-banking services Association rules model of e-banking services V. Aggelis Department of Computer Engineering and Informatics, University of Patras, Greece Abstract The introduction of data mining methods in the banking

More information

A Fuzzy Optimization Model for Single-Period Inventory Problem

A Fuzzy Optimization Model for Single-Period Inventory Problem , July 6-8, 2011, London, U.K. A Fuzzy Optimization Model for Single-Period Inventory Problem H. Behret and C. Kahraman Abstract In this paper, the optimization of single-period inventory problem under

More information

Protecting Doctors Identity in Drug Prescription Analysis (Draft Version)

Protecting Doctors Identity in Drug Prescription Analysis (Draft Version) Protecting Doctors Identity in Drug Prescription Analysis (Draft Version) Václav Matyáš Jr. University of Cambridge Computer Laboratory Vaclav.Matyas@cl.cam.ac.uk Abstract: This paper describes work undertaken

More information

Group Technology (GT) Applied to Biotechnology Automation

Group Technology (GT) Applied to Biotechnology Automation Group Technology (GT) Applied to Biotechnology Automation Aura-Maria Cardona Dept. of Computer & Electrical Eng. & Computer Sci. +1 561-922-8886 acardon5@fau.edu Zvi S. Roth Dept. of Computer and Electrical

More information

10. Lecture Stochastic Optimization

10. Lecture Stochastic Optimization Soft Control (AT 3, RMA) 10. Lecture Stochastic Optimization Genetic Algorithms 10. Structure of the lecture 1. Soft control: the definition and limitations, basics of epert" systems 2. Knowledge representation

More information

Journal of Global Research in Computer Science

Journal of Global Research in Computer Science Volume 2, No. 5, May 211 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info Weighted Mean Priority Based Scheduling for Interactive Systems H.S.Behera *1,

More information

Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution

Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution 1290 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution Christina Aperjis, Ramesh Johari, Member, IEEE, and Michael

More information

On-Chip Debug Reducing Overall ASIC Development Schedule Risk by Eric Rentschler, Chief Validation Scientist, Mentor Graphics

On-Chip Debug Reducing Overall ASIC Development Schedule Risk by Eric Rentschler, Chief Validation Scientist, Mentor Graphics On-Chip Debug Reducing Overall ASIC Development Schedule Risk by Eric Rentschler, Chief Validation Scientist, Mentor Graphics 12 INTRODUCTION With ASIC complexity on the increase and unrelenting time-to-market

More information

Concepts for Using TC2000/TCnet PCFs

Concepts for Using TC2000/TCnet PCFs 2004 Jim Cooper by Concepts for Using TC2000/TCnet PCFs Concepts for Using TC2000/TCnet PCFs 1 What is a PCF? 1 Why would I want to use a PCF? 1 What if I m no good at programming or math? 2 How do I make

More information

Sponsored Search Auction Design via Machine Learning

Sponsored Search Auction Design via Machine Learning Sponsored Search Auction Design via Machine Learning Maria-Florina Balcan Avrim Blum Jason D. Hartline Yishay Mansour ABSTRACT In this work we use techniques from the study of samplecomplexity in machine

More information

Method of DNA Analysis Using the Estimation of the Algorithmic Complexity

Method of DNA Analysis Using the Estimation of the Algorithmic Complexity Leonardo Electronic Journal of Practices and Technologies ISSN 1583-178 Issue 5, July-December 24 p. 53-66 Method of DNA Analysis Using the Estimation of the Algorithmic Complexity Ioan OPREA 1,2, Sergiu

More information

Thermodynamic Modeling of Binary Cycles Looking for Best Case Scenarios

Thermodynamic Modeling of Binary Cycles Looking for Best Case Scenarios Thermodynamic Modeling of Binary Cycles Looking for Best Case Scenarios Silke Köhler and Ali Saadat GFZ-Potsdam, Section Geothermics, Telegrafenberg, D-14473 Potsdam, Germany Email: skoe@gfz-potsdam.de,

More information

National Unit Specification: general information. UNIT Creative Project (SCQF level 6) CODE F58F 12 SUMMARY OUTCOMES RECOMMENDED ENTRY

National Unit Specification: general information. UNIT Creative Project (SCQF level 6) CODE F58F 12 SUMMARY OUTCOMES RECOMMENDED ENTRY National Unit Specification: general information CODE F58F 12 SUMMARY The purpose of this Unit is to allow candidates to plan, implement and evaluate a creative project. Candidates will be required to

More information

LCA in decision making

LCA in decision making LCA in decision making 1 (13) LCA in decision making An idea document CHAINET LCA in decision making 2 (13) Content 1 INTRODUCTION 2 EXAMPLE OF AN INDUSTRIAL DEVELOPMENT PROCESS 2.1 General about the industrial

More information

INVENTORY MANAGEMENT IN HIGH UNCERTAINTY ENVIRONMENT WITH MODEL REFERENCE CONTROL

INVENTORY MANAGEMENT IN HIGH UNCERTAINTY ENVIRONMENT WITH MODEL REFERENCE CONTROL INVENTORY MANAGEMENT IN HIGH UNCERTAINTY ENVIRONMENT WITH MODEL REFERENCE CONTROL Heikki Rasku Hannu Koivisto Institute of Automation and Control, Tampere University of Technology, P.O.Box 692, Tampere,

More information

Measure Performance of VRS Model using Simulation Approach by Comparing COCOMO Intermediate Model in Software Engineering

Measure Performance of VRS Model using Simulation Approach by Comparing COCOMO Intermediate Model in Software Engineering Measure Performance of VRS Model using Simulation Approach by Comparing COCOMO Intermediate Model in Software Engineering Dr. Devesh Kumar Srivastava Jaipur India E-mail: devesh98@gmail.com Abstract Estimation

More information

A Risk Management Process for Information Security and Business Continuity

A Risk Management Process for Information Security and Business Continuity A Risk Management Process for Information Security and Business Continuity João Carlos Gonçalves Fialho Instituto Superior Técnico - Taguspark joaogfialho@gmail.com ABSTRACT It was from the DNS.PT internship

More information

Testing of Web Services A Systematic Mapping

Testing of Web Services A Systematic Mapping Testing of Web Services A Systematic Mapping Abhishek Sharma, Theodore D. Hellmann, Frank Maurer Department of Computer Science University of Calgary Calgary, Canada {absharma, tdhellma, frank.maurer}@ucalgary.ca

More information

Designing an Effective Scheduling Scheme Considering Multi-level BOM in Hybrid Job Shop

Designing an Effective Scheduling Scheme Considering Multi-level BOM in Hybrid Job Shop Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 6, 2012 Designing an Effective Scheduling Scheme Considering Multi-level BOM

More information

Examiner s report F5 Performance Management December 2017

Examiner s report F5 Performance Management December 2017 Examiner s report F5 Performance Management December 2017 General comments The F5 Performance Management exam is offered in both computer-based (CBE) and paper formats. The structure is the same in both

More information