Survey of Kolmogorov Complexity and its Applications
|
|
- Jeremy Watkins
- 6 years ago
- Views:
Transcription
1 Survey of Kolmogorov Complexity and its Applications Andrew Berni University of Illinois at Chicago 1 Abstract In this paper, a survey of Kolmogorov complexity is reported. The basics are briefly covered to give the reader an introductory understanding of the topic. This includes necessary definitions followed by some interesting properties and theorems. Following the brief introduction to the topic is some current research in the area, mainly focusing on the application of Kolmogorov complexity to quantum states and quantum computers. We finish with a discussion of current applications of Kolmogorov complexity to highlight how it can be used to solve practical problems. I. INTRODUCTION Kolmogorov complexity is a branch of information theory that deals with the complexity contained in a single object or string. It is another measure of randomness, as opposed to entropy, and it is not based on probability, but instead considers the method or algorithm used to compute the string. Not being tied to a probability distribution allows the measurement of randomness in a single object. The notion was developed independently by Andrey Kolmogorov in 1965 [3], Gregory Chaitin in 1965, and Ray Solomonoff [9]. In this paper, the definition of Kolmogorov complexity and many of its important properties will be examined. This will shed some light on some interesting features, as well as show some analogs to other areas of information theory. Keep in mind that only a small subset of the theory is presented. Just enough to show the reader some interesting properties and to give a short introduction. Newer developments in the field will be discussed, mainly in the area of quantum Kolmogorov complexity. This has become a topic of interest due to the rising popularity of the quantum computer. Finally, we will look at several applications of Kolmogorov complexity to get an idea of its practicality. We will see how Kolmogorov complexity can be used to solve a wide variety of problems. Its unique properties can be exploited to use it as a tool in problem solving. II. DEFINITION AND EXAMPLES Kolmogorov complexity came about as a way to describe the randomness in an object based on the length of the computer program used to describe the object [1]. This object could be a string, which is generated by a computer program. In general, that is what will usually be considered in definitions and proofs. It is different from Shannon s way of measuring randomness (entropy) since it does not rely on probability at all [1]. The mathematical definition of Kolmogorov complexity is as follow: K U (x) = min p:u(p)=x l(p)
2 where we find the minimum the length of computer program p over all programs p, such that computer U with input p produces the output string x. It is shown in [1] that we cannot find the exact value of K(x) in practice, but we can upper bound it. We can find these upper bounds by giving examples of programs that will produce the string x. The shorter the program that is found, the closer the length of that program is to the actual Kolmogorov complexity. A few examples to get the idea of the bounding are as follows: 1.The sequence 12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a12a 12a12a12a12a12a12a12a12a12a12a has fairly low Kolmogorov complexity. It can be described as print out the 3 character string 12a 30 times. Although the string is 90 characters long, its Kolmogorov complexity is 45 characters. We could conceivably make a string thousands or millions of characters long, which we can describe with a relatively short program. As we can see in the string, its redundant structure allows this compression. Looking at this from an entropy point of view, we would see this string as not very random as well. 2.The sequence 3vo1i3z9qm09ij3j4j6ncb1mfjh3890vg56n5md9s19va3 has a higher Kolmogorov complexity. It probably cannot be described as simply as the previous example. The shortest computer program to print this string would most likely look like print out the 46 character string 3vo1i3z9qm09ij3j4j6ncb1mfjh3890vg56n5md9s19va3. We need to know how many characters to print so that we do not extend beyond the end of the program when executing it. The program to print the string is just slightly longer than the string itself! Again, if we were to look at this in a probabilistic perspective, we would say that this string is pretty random. We could probably find shorter programs for to generate the examples above. The example programs given just represent upper bounds. If we found a shorter program to produce the output, then that would tighten the upper bound. 2 III. INTERESTING THEOREMS AND PROPERTIES A. Upper Bound on Kolmogorov Complexity One interesting theorem that is that the conditional Kolmogorov complexity (given the length of the string) is less than the length of the string plus an additive constant. We can almost deduce this by looking at how the string was described in the second example above. Since we are given the length of the string from the conditioning, we do not have to consider this in the Kolmogorov complexity. We only need to consider the string given, plus the length of the rest of the program, which is constant. If we want the unconditional Kolmogorov complexity, then a term is added to account for the length of the integer needed to describe how long the sequence is supposed to be. This term can be represented in 2*log(l(x)) bits if we are describing a binary string using a binary program [1]. This term which represents the length of the string can be more tightly bounded, but that will not be discussed here. B. Lower Bound on Kolmogorov Complexity It is also interesting to look at the lower bound of Kolmogorov complexity. This lower bound is stated as follows: The number of strings x with complexity K(x) < k satisfies
3 3 {x {0, 1} : K(x) < k} < 2 k This is proven by listing all binary programs with length less than k. This results in 1 null program, 2 1-bit programs, 4 2-bit programs, 8 16-bit programs, 2 k 1 (k-1)-bit programs. Counting these programs results in 2 k 1 possible programs, which is less than 2 k. In other words, there are not many sequences with low Kolmogorov complexity. Most sequences are not simple [1]. C. Computer Independence of Kolmogorov Complexity It can also be shown that the Kolmogorov complexity is computer independent except for an additive constant, which becomes negligible for high complexity sequences [1]. The notion of a universal computer is used here. Before diving too much into this explanation, we first need to consider how a machine can compute algorithms. A useful tool for analyzing computability is the Turing machine. A Turing machine is a theoretical device that operates on an infinite length tape that is fed into the machine. The machine has a tape head which can read an instruction from the tape, change states, and possibly write something to a work tape [12]. Further work has shown that a Turing machine can simulate any other computer, and a Turing machine could be simulated by any other computer [1]. This idea is used to prove the following theorem. Suppose we have a universal computer U that can simulate another computer. The idea is that the universal computer can mimic the behavior of another computer by running a fixed length program instructing the universal computer how to translate instructions for the other computer. Now, given K(x) for an arbitrary computer A, K U (x), the complexity of x for the universal computer U, is equal to K A (x), plus the length of the translation program. This shows that the Kolmogorov complexity is computer independent. As K A (x) rises, this constant becomes negligible, and the Kolmogorov complexity is the same no matter which computer outputs string x. D. Relationship Between K(x) and H(x) Another interesting property is the relationship between Kolmogorov complexity and entropy H(x) [1]. Which leads to: H(X) 1 f(x n )K(x n n) H(X) + n x n E 1 n K(Xn n) H(X) ( X 1) log n n This relationship shows that Kolmogorov complexity is closely related to Entropy, even though they are formed from very different foundations. E. Kolmogorov Complexity and Occam s Razor Next, we look at how we can apply Kolmogorov complexity as a formalization of Occam s razor [1]. Occam s razor states that The simplest explanation is best [11]. Kolmogorov complexity aims to find the minimum length program that produces the string x. This minimum length program is essentially the simplest program. Using Occam s razor as a guideline, we can conclude that this program is the best explanation. It seems to be a logical and natural result. + c n
4 4 A. Algorithmic Test for Randomness IV. FURTHER DEVELOPMENTS Martin Lof extended the theory of Kolmogorov complexity by defining algorithmically random sequences [7]. Before his work, there were only vague definitions of algorithmically randomness sequences. Lof introduced specific tests to find if a sequence is truly algorithmically random. B. Recent Developments In more recent developments in the field, Quantum Kolmogorov complexity is explored. Vitanyi explores this idea in [13]. The theory of Quantum Kolmogorov complexity describes the amount of information contained in a pure quantum state. Vitanyi shows that Quantum Kolmogorov complexity has analogs to classical Kolmogorov complexity. One of these analogs is that quantum Kolmogorov complexity is upper bounded and can be approximated from above. Vitanyi further develops the theory of Quantum Kolmogorov complexity in [14]. He explains that there is increasing interest in the subject due to the rising interest in the quantum computer. Vitayni also explains the idea of quantum Turing machines in this paper. He explains how it is based on probabilistic computation. The quantum Turing machine is useful when considering how a machine would operate on quantum states. He then goes on to explain quantum algorithms and how they apply to this theory. In 2008, this idea of quantum Turing machines is explored further by Muller. Muller shows in [8] the existence of a universal quantum Turing machine, which can simulate every other quantum Turing machine. Using this result, he shows that quantum Kolmogorov complexity is independent of the machine considered when computing quantum Kolmogorov complexity, up to an additive constant. This is analogous to the same property of classical Kolmogorov complexity. A. Information Assurance V. APPLICATIONS Kolmogorov complexity has some interesting applications. One such application is using Kolmogorov complexity to detect abnormal behavior in an information system. The paper [2] introduces this idea. The author describes how information security issues are usually dealt with after the fact that security has been breached. They propose instead to deal with a security breach as it happens. Other systems are presented as examples where abnormalities are detected and corrected before any damage can be caused. One example is a thermodynamic system monitoring and correcting pressure. A breach in pressure can be detected and isolated to a small portion of the entire system. In order to deal with a breach as it is happening, the information in the system needs to be somehow verified. One suggestion of how to monitor an information system is shown in the figure below. The author explains that a lower complexity of K(X,Y) will make it easier for an attacker to understand what the system is doing (since its inputs and outputs are not very complex). The other metric to monitor is K(Y X). If the system adds complexity to X to produce Y, then the system will be less vulnerable. If the system subtracts complexity to X to produce Y, then the
5 5 Fig. 1. system will be more vulnerable. Monitoring these two metrics, and classifying vulnerability based on the regions shown is a proposed method of using Kolmogorov complexity to monitor information in a system. This is just one example of several indicators presented in this paper. The paper concludes that that Kolmogorov complexity is a good candidate for further research in this area. B. Spam Filtering Another interesting application of Kolmogorov Complexity is using it to filter spam. [10] gives details of how this can be done. Using an adaptive filter and Kolmogorov complexity estimates, is checked to be spam or normal . They use estimates because, as explained earlier, the exact Kolmogorov complexity is impossible to compute. It can be bounded from above, so they use a compression algorithm to find out how much the string can be compressed, and use this as an upper bound on the Kolmogorov complexity [5]. A low Kolmogorov complexity indicates a higher probability of the message being spam. Statistical data is gathered showing the relation between Kolmogorov complexity and spam. An example is presented below in tabular form. In order to generate this estimate of the Kolmogorov complexity, a run-length compression algorithm is performed on the message. We can see that, for this particular database of example s, that most of the spam has very low Kolmogorov complexity. They show that this method can filter spam about twice as fast as normal methods based on Bayesian filters, which is a common implementation of a spam filter, while achieving an accuracy rate of 80% to 96%. They also find that their method is less likely to be fooled by a statistical attack, which is performed by adding words to the spam to make it look like normal . They project that in future work, better accuracy could be obtained by using different compression methods. This could possibly provide a better estimate of the actual Kolmogorov complexity
6 6 Fig. 2. of the message, which may lead to better performance. They also speculate on other possible applications of their method, including plaigairism detection by matching texts with their respective authors. C. Mental Fatigue The applications of Kolmogorov complexity seem to be limitless. Since Kolmogorov complexity operates on strings, it can really be applied to anything that can be described as a string. The next application introduced is using Kolmogorov complexity to assess mental fatigue. In [6], the author applies Kolmogorov complexity to EEG signals obtained from patients in order to measure the level of fatigue in that patient. In this case, electrical brain signals are measured and transformed into discrete sequences. The discrete sequence can then be analyzed using any choice of Kolmogorov complexity estimation methods. In this paper the method used is very different from the one used in the spam filtering application paper. The method used for the EEG signals was based on a method described in [4] in which the complexity of the object is estimated by the number of steps in the generating process. The goal of their work was solely to see if there was any connection between Kolmogorov complexity of the EEG, and mental fatigue. According to the conclusion of the paper, they achieved this goal, and found that there was a strong correlation. The value of Kolmogorov complexity on the EEG signal was found to decrease as mental fatigue increases. VI. CONCLUSION Kolmogorov complexity and a handful of its applications were surveyed in this paper. Kolmogorov complexity presents a different view of information and randomness than entropy methods of information theory. The properties of Kolmogorov complexity are interesting and at times unexpected. It is apparent that Kolmogorov complexity is an elegant and useful branch of information theory. New research is continuing, especially in the area of Quantum Kolmogorov complexity. The applications presented all took pieces of classical Kolmogorov complexity and put them to practical use. It will be interesting to see how quantum Kolmogorov complexity will be put to practical use in future works, as well as new applications of the classical Kolmogorov complexity. REFERENCES [1] T. A. Cover and J. A. Thomas. Elements of information theory. John Wiley and Sons, Inc, 2006.
7 [2] S. Evans, S.F. Bush, and J. Hershey. Information assurance through kolmogorov complexity. DISCEX 01. Proceedings, 2: , [3] A. N. Kolmogorov. Three approaches to the quantitative definition of information. Probl. Inf. Transm. (USSR), 1:4 7, [4] A. Lempel and J. Ziv. On the complexity of finite sequences. IEEE Trans. Inf. Theory, 22(1):75 81, [5] M. Li and P. Vitanyi. An introduction to kolmogorov complexity and its applications. 2nd ed. Springer-Verlag, New York, [6] Zhang Lian-yi and Zheng Chong-xun. Analysis of kolmogorov complexity in spontaneous eeg signal and it s application to assessment of mental fatigue. Bioinformatics and Biomedical Engineering, pages , [7] P. Martin-Lof. The definition of random sequences. Inf. Control, 9: , [8] M. Muller. Strongly universal quantum turing machines and invariance of kolmogorov complexity. Information Theory, IEEE Transactions on, 54(2): , [9] R. J. Solomonoff. A formal theory of inductive inference. Inf. Control, 7: , [10] L.M. Spracklin and L.V. Saxton. Filtering spam using kolmogorov complexity estimates. Advanced Information Networking and Applications Workshops, 1: , [11] S. C. Tornay. Ockham: Studies and selections (chapter commentarium in sententias, i, 27). Proceedings of the London Mathematical Society, [12] A. M. Turing. On computable numbers, with an application to the entscheidungsproblem. Proceedings of the London Mathematical Society, 2 42:230 65, [13] P. Vitanyi. Three approaches to the quantitative definition of information in an individual pure quantum state. 15th Annual IEEE Conference on Computational Complexity, pages , [14] Paul M. B. Vitanyi. Quantum kolmogorov complexity based on classical descriptions. IEEE Transactions on Information Theory, 47(6),
Kolmogorov Complexity
Kolmogorov Complexity Computational Complexity Course Report By Henry Xiao Queen s University School of Computing Kingston, Ontario, Canada March 2004 Introduction In computer science, the concepts of
More informationarxiv: v1 [q-fin.st] 7 Nov 2014
On the Complexity and Behaviour of Cryptocurrencies Compared to Other Markets Daniel Wilson-Nunn 1 and Hector Zenil 2,3, 1 Department of Statistics, University of Warwick, United Kingdom 2 Department of
More informationVISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY. A seminar report on GENETIC ALGORITHMS.
VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY A seminar report on GENETIC ALGORITHMS Submitted by Pranesh S S 2SD06CS061 8 th semester DEPARTMENT OF COMPUTER SCIENCE
More informationGenome Reassembly From Fragments. 28 March 2013 OSU CSE 1
Genome Reassembly From Fragments 28 March 2013 OSU CSE 1 Genome A genome is the encoding of hereditary information for an organism in its DNA The mathematical model of a genome is a string of character,
More information9. Verification, Validation, Testing
9. Verification, Validation, Testing (a) Basic Notions (b) Dynamic testing. (c) Static analysis. (d) Modelling. (e) Environmental Simulation. (f) Test Strategies. (g) Tool support. (h) Independent Verification
More informationDeterministic Crowding, Recombination And Self-Similarity
Deterministic Crowding, Recombination And Self-Similarity Bo Yuan School of Information Technology and Electrical Engineering The University of Queensland Brisbane, Queensland 4072 Australia E-mail: s4002283@student.uq.edu.au
More informationAttribution in online marketing
Online Intelligence Solutions Attribution in online marketing By Jacques Warren WHITE PAPER WHITE PAPER About Jacques Warren Jacques Warren has been working in the online marketing field since 1996, focusing
More informationApplying RFID Hand-Held Device for Factory Equipment Diagnosis
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Applying RFID Hand-Held Device for Factory Equipment Diagnosis Kai-Ying Chen,
More informationI OPT (Input Output Processing Template)
I OPT (Input Output Processing Template) INDIVIDUAL LEADERSHIP REPORT This report has been prepared for: Sample Leadership Report 1999, Professional Communications Inc. All rights reserved. Trademarks:
More informationAudit evidence. chapter. Chapter learning objectives. When you have completed this chapter you will be able to:
chapter 9 Audit evidence Chapter learning objectives When you have completed this chapter you will be able to: explain the assertions contained in the financial statements explain the use of assertions
More informationTIMETABLING EXPERIMENTS USING GENETIC ALGORITHMS. Liviu Lalescu, Costin Badica
TIMETABLING EXPERIMENTS USING GENETIC ALGORITHMS Liviu Lalescu, Costin Badica University of Craiova, Faculty of Control, Computers and Electronics Software Engineering Department, str.tehnicii, 5, Craiova,
More informationMINIMIZE THE MAKESPAN FOR JOB SHOP SCHEDULING PROBLEM USING ARTIFICIAL IMMUNE SYSTEM APPROACH
MINIMIZE THE MAKESPAN FOR JOB SHOP SCHEDULING PROBLEM USING ARTIFICIAL IMMUNE SYSTEM APPROACH AHMAD SHAHRIZAL MUHAMAD, 1 SAFAAI DERIS, 2 ZALMIYAH ZAKARIA 1 Professor, Faculty of Computing, Universiti Teknologi
More informationA Viral Systems Algorithm for the Traveling Salesman Problem
Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 6, 2012 A Viral Systems Algorithm for the Traveling Salesman Problem Dedy Suryadi,
More informationDecision Tree Learning. Richard McAllister. Outline. Overview. Tree Construction. Case Study: Determinants of House Price. February 4, / 31
1 / 31 Decision Decision February 4, 2008 2 / 31 Decision 1 2 3 3 / 31 Decision Decision Widely Used Used for approximating discrete-valued functions Robust to noisy data Capable of learning disjunctive
More informationCharacteristics of a Robust Process
Characteristics of a Robust Process By Rich Schiesser: In Conjunction with Harris Kern s Enterprise Computing Institute One of the distinctions that separate world-class infrastructures from those that
More informationSTATISTICAL TECHNIQUES. Data Analysis and Modelling
STATISTICAL TECHNIQUES Data Analysis and Modelling DATA ANALYSIS & MODELLING Data collection and presentation Many of us probably some of the methods involved in collecting raw data. Once the data has
More informationWE consider the general ranking problem, where a computer
5140 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 Statistical Analysis of Bayes Optimal Subset Ranking David Cossock and Tong Zhang Abstract The ranking problem has become increasingly
More informationGame Theory Approach to Solve Economic Dispatch Problem
Game Theory Approach to Solve Economic Dispatch Problem Nezihe Yildiran and Emin Tacer Abstract This paper presents a game theory application for economic dispatch problem. In this application, economic
More informationOPENEDGE BPM OVERVIEW
OPENEDGE BPM OVERVIEW Fellow and OpenEdge Evangelist Document Version 1.0 July 2011 July, 2011 Page 1 of 11 DISCLAIMER Certain portions of this document contain information about Progress Software Corporation
More informationJob Board - A Web Based Scheduler
Job Board - A Web Based Scheduler Cameron Ario and Kasi Periyasamy Department of Computer Science University of Wisconsin-La Crosse La Crosse, WI 54601 {ario.came, kperiyasamy}@uwlax.edu Abstract Contractual
More informationEST Accuracy of FEL 2 Estimates in Process Plants
EST.2215 Accuracy of FEL 2 Estimates in Process Plants Melissa C. Matthews Abstract Estimators use a variety of practices to determine the cost of capital projects at the end of the select stage when only
More informationEconomic and Social Council
United Nations Economic and Social Council Distr.: General 19 March 2014 ECE/CES/2014/32 English only Economic Commission for Europe Conference of European Statisticians Sixty-second plenary session Paris,
More informationBio-inspired Models of Computation. An Introduction
Bio-inspired Models of Computation An Introduction Introduction (1) Natural Computing is the study of models of computation inspired by the functioning of biological systems Natural Computing is not Bioinformatics
More information"I OPT" INDIVIDUAL LEADERSHIP REPORT. This report has been prepared for: Frank 10/16/2007. (Input Output Processing Template)
"I OPT" (Input Output Processing Template) INDIVIDUAL LEADERSHIP REPORT This report has been prepared for: Frank 10/16/2007 2003, Professional Communications Inc. All rights reserved. Trademarks: Professional
More informationPackage DNABarcodes. March 1, 2018
Type Package Package DNABarcodes March 1, 2018 Title A tool for creating and analysing DNA barcodes used in Next Generation Sequencing multiplexing experiments Version 1.9.0 Date 2014-07-23 Author Tilo
More informationIntelligently Choosing Testing Techniques
Intelligently Choosing Testing Techniques CS 390: Software Engineering Dr. Hwang By: Jonathan Bach October 28, 2008 1 The ability for a company to produce a complicated, high quality, problem free product
More informationPredictability, Constancy and Contingency in Electric Load Profiles
26 IEEE International Conference on Smart Grid Communications (SmartGridComm): Data Management and Grid Analytics and Predictability, Constancy and Contingency in Electric Load Profiles Chenye Wu Wenyuan
More informationBandwagon and Underdog Effects and the Possibility of Election Predictions
Reprinted from Public Opinion Quarterly, Vol. 18, No. 3 Bandwagon and Underdog Effects and the Possibility of Election Predictions By HERBERT A. SIMON Social research has often been attacked on the grounds
More informationIntroduction to Information Systems Fifth Edition
Introduction to Information Systems Fifth Edition R. Kelly Rainer Brad Prince Casey Cegielski Appendix D Intelligent Systems Copyright 2014 John Wiley & Sons, Inc. All rights reserved. 1. Explain the potential
More informationThe following is a sample lab report. It is in an acceptable format and can be used as a guide for what I am looking for in your lab report.
In the Lab Syllabus, I gave you a lot of details regarding the writing of your lab reports. I know you have probably been overwhelmed with information the first week or so of this course. I will refer
More informationA Personalized Company Recommender System for Job Seekers Yixin Cai, Ruixi Lin, Yue Kang
A Personalized Company Recommender System for Job Seekers Yixin Cai, Ruixi Lin, Yue Kang Abstract Our team intends to develop a recommendation system for job seekers based on the information of current
More informationIntro. ANN & Fuzzy Systems. Lecture 36 GENETIC ALGORITHM (1)
Lecture 36 GENETIC ALGORITHM (1) Outline What is a Genetic Algorithm? An Example Components of a Genetic Algorithm Representation of gene Selection Criteria Reproduction Rules Cross-over Mutation Potential
More informationMachine learning applications in genomics: practical issues & challenges. Yuzhen Ye School of Informatics and Computing, Indiana University
Machine learning applications in genomics: practical issues & challenges Yuzhen Ye School of Informatics and Computing, Indiana University Reference Machine learning applications in genetics and genomics
More informationData Collection and Statistical Data Analysis in Preparation for Simulation of a Furniture Manufacturing Company
, June 29 - July 1, 2016, London, U.K. Data Collection and Statistical Data Analysis in Preparation for Simulation of a Furniture Manufacturing Company Wilson R. Nyemba, and Charles Mbohwa Abstract Systems
More informationWhat is Important When Selecting an MBT Tool?
What is Important When Selecting an MBT Tool? Interest towards model-based testing has increased quite significantly over the years as people have started to reach limits of traditional approaches and
More informationGENETIC ALGORITHMS. Narra Priyanka. K.Naga Sowjanya. Vasavi College of Engineering. Ibrahimbahg,Hyderabad.
GENETIC ALGORITHMS Narra Priyanka K.Naga Sowjanya Vasavi College of Engineering. Ibrahimbahg,Hyderabad mynameissowji@yahoo.com priyankanarra@yahoo.com Abstract Genetic algorithms are a part of evolutionary
More informationNumerical investigation of tradeoffs in production-inventory control policies with advance demand information
Numerical investigation of tradeoffs in production-inventory control policies with advance demand information George Liberopoulos and telios oukoumialos University of Thessaly, Department of Mechanical
More informationAn Approach to Predicting Passenger Operation Performance from Commuter System Performance
An Approach to Predicting Passenger Operation Performance from Commuter System Performance Bo Chang, Ph. D SYSTRA New York, NY ABSTRACT In passenger operation, one often is concerned with on-time performance.
More informationCritical Systems Specification. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 9 Slide 1
Critical Systems Specification Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 9 Slide 1 Objectives To explain how dependability requirements may be identified by analysing the risks faced
More informationTIMEBOXING PLANNING: BUFFERED MOSCOW RULES
TIMEBOXING PLANNING: BUFFERED MOSCOW RULES EDUARDO MIRANDA, INSTITUTE FOR SOFTWARE RESEARCH, CARNEGIE MELLON UNIVERSITY, SEPTEMBER 2011 ABSTRACT Time boxing is a management technique which prioritizes
More informationGenetic Algorithm with Upgrading Operator
Genetic Algorithm with Upgrading Operator NIDAPAN SUREERATTANAN Computer Science and Information Management, School of Advanced Technologies, Asian Institute of Technology, P.O. Box 4, Klong Luang, Pathumthani
More informationIntelligent Techniques Lesson 4 (Examples about Genetic Algorithm)
Intelligent Techniques Lesson 4 (Examples about Genetic Algorithm) Numerical Example A simple example will help us to understand how a GA works. Let us find the maximum value of the function (15x - x 2
More informationTime Series Motif Discovery
Time Series Motif Discovery Bachelor s Thesis Exposé eingereicht von: Jonas Spenger Gutachter: Dr. rer. nat. Patrick Schäfer Gutachter: Prof. Dr. Ulf Leser eingereicht am: 10.09.2017 Contents 1 Introduction
More informationRandom Forests. Parametrization and Dynamic Induction
Random Forests Parametrization and Dynamic Induction Simon Bernard Document and Learning research team LITIS laboratory University of Rouen, France décembre 2014 Random Forest Classifiers Random Forests
More informationVCG in Theory and Practice
1 2 3 4 VCG in Theory and Practice Hal R. Varian Christopher Harris Google, Inc. May 2013 Revised: December 26, 2013 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 It is now common to sell online ads using
More informationVALUE OF SHARING DATA
VALUE OF SHARING DATA PATRICK HUMMEL* FEBRUARY 12, 2018 Abstract. This paper analyzes whether advertisers would be better off using data that would enable them to target users more accurately if the only
More informationDependability requirements. Risk-driven specification. Objectives. Stages of risk-based analysis. Topics covered. Critical Systems Specification
Dependability requirements Critical Systems Specification Functional requirements to define error checking and recovery facilities and protection against system failures. Non-functional requirements defining
More informationMore-Advanced Statistical Sampling Concepts for Tests of Controls and Tests of Balances
APPENDIX 10B More-Advanced Statistical Sampling Concepts for Tests of Controls and Tests of Balances Appendix 10B contains more mathematical and statistical details related to the test of controls sampling
More informationA Greedy Algorithm for Minimizing the Number of Primers in Multiple PCR Experiments
A Greedy Algorithm for Minimizing the Number of Primers in Multiple PCR Experiments Koichiro Doi Hiroshi Imai doi@is.s.u-tokyo.ac.jp imai@is.s.u-tokyo.ac.jp Department of Information Science, Faculty of
More informationA logistic regression model for Semantic Web service matchmaking
. BRIEF REPORT. SCIENCE CHINA Information Sciences July 2012 Vol. 55 No. 7: 1715 1720 doi: 10.1007/s11432-012-4591-x A logistic regression model for Semantic Web service matchmaking WEI DengPing 1*, WANG
More informationBig Data. Methodological issues in using Big Data for Official Statistics
Giulio Barcaroli Istat (barcarol@istat.it) Big Data Effective Processing and Analysis of Very Large and Unstructured data for Official Statistics. Methodological issues in using Big Data for Official Statistics
More informationA CUSTOMER-PREFERENCE UNCERTAINTY MODEL FOR DECISION-ANALYTIC CONCEPT SELECTION
Proceedings of the 4th Annual ISC Research Symposium ISCRS 2 April 2, 2, Rolla, Missouri A CUSTOMER-PREFERENCE UNCERTAINTY MODEL FOR DECISION-ANALYTIC CONCEPT SELECTION ABSTRACT Analysis of customer preferences
More informationThe Job Assignment Problem: A Study in Parallel and Distributed Machine Learning
The Job Assignment Problem: A Study in Parallel and Distributed Machine Learning Gerhard Weiß Institut für Informatik, Technische Universität München D-80290 München, Germany weissg@informatik.tu-muenchen.de
More informationPrinciples of Inventory Management
John A. Muckstadt Amar Sapra Principles of Inventory Management When You Are Down to Four, Order More fya Springer Inventories Are Everywhere 1 1.1 The Roles of Inventory 2 1.2 Fundamental Questions 5
More informationMulti-Layer Data Encryption using Residue Number System in DNA Sequence
International Journal of Computer Applications (975 8887) Multi-Layer Data Encryption using Residue Number System in DNA Sequence M. I. Youssef Faculty Of Engineering, Department Of Electrical Engineering
More informationUsing Architectural Models to Predict the Maintainability of Enterprise Systems
Using Architectural Models to Predict the Maintainability of Enterprise Systems Robert Lagerström*, Pontus Johnson Department of Industrial Information and Control Systems Royal Institute of Technology
More informationMultiple Regression. Dr. Tom Pierce Department of Psychology Radford University
Multiple Regression Dr. Tom Pierce Department of Psychology Radford University In the previous chapter we talked about regression as a technique for using a person s score on one variable to make a best
More informationAutomated Energy Distribution In Smart Grids
Automated Energy Distribution In Smart Grids John Yu Stanford University Michael Chun Stanford University Abstract We design and implement a software controller that can distribute energy in a power grid.
More informationBatch Schedule Optimization
Batch Schedule Optimization Steve Morrison, Ph.D. Chem. Eng. Info@MethodicalMiracles.com. 214-769-9081 Abstract: Batch schedule optimization is complex, but decomposing it to a simulation plus optimization
More informatione-trans Association Rules for e-banking Transactions
In IV International Conference on Decision Support for Telecommunications and Information Society, 2004 e-trans Association Rules for e-banking Transactions Vasilis Aggelis University of Patras Department
More informationModeling of competition in revenue management Petr Fiala 1
Modeling of competition in revenue management Petr Fiala 1 Abstract. Revenue management (RM) is the art and science of predicting consumer behavior and optimizing price and product availability to maximize
More informationGroup Incentive Compatibility for Matching with Contracts
Group Incentive Compatibility for Matching with Contracts John William Hatfield and Fuhito Kojima July 20, 2007 Abstract Hatfield and Milgrom (2005) present a unified model of matching with contracts,
More informationAmerican Association for Public Opinion Research
American Association for Public Opinion Research Bandwagon and Underdog Effects and the Possibility of Election Predictions Author(s): Herbert A. Simon Source: The Public Opinion Quarterly, Vol. 18, No.
More informationExamination of Cross Validation techniques and the biases they reduce.
Examination of Cross Validation techniques and the biases they reduce. Dr. Jon Starkweather, Research and Statistical Support consultant. The current article continues from last month s brief examples
More informationVariable Selection Methods for Multivariate Process Monitoring
Proceedings of the World Congress on Engineering 04 Vol II, WCE 04, July - 4, 04, London, U.K. Variable Selection Methods for Multivariate Process Monitoring Luan Jaupi Abstract In the first stage of a
More informationCalifornia Subject Examinations for Teachers
California Subject Examinations for Teachers TEST GUIDE MATHEMATICS General Examination Information Copyright 2015 Pearson Education, Inc. or its affiliate(s). All rights reserved. Evaluation Systems,
More informationPractical Regression: Fixed Effects Models
DAVID DRANOVE 7-112-005 Practical Regression: Fixed Effects Models This is one in a series of notes entitled Practical Regression. These notes supplement the theoretical content of most statistics texts
More informationMachine learning in neuroscience
Machine learning in neuroscience Bojan Mihaljevic, Luis Rodriguez-Lujan Computational Intelligence Group School of Computer Science, Technical University of Madrid 2015 IEEE Iberian Student Branch Congress
More informationLecture 45. Waiting Lines. Learning Objectives
Lecture 45 Waiting Lines Learning Objectives After completing the lecture, we should be able to explain the formation of waiting lines in unloaded systems, identify the goal of queuing ( waiting line)
More informationKeywords Genetic, pseudorandom numbers, cryptosystems, optimal solution.
Volume 6, Issue 8, August 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Apply Genetic
More informationSoftware redundancy design for a Human-Machine Interface in railway vehicles
Computers in Railways XII 221 Software redundancy design for a Human-Machine Interface in railway vehicles G. Zheng 1 & J. Chen 1,2 1 Institute of Software, Chinese Academy of Sciences, China 2 Graduate
More informationDiscrete Mathematics An Introduction to Proofs Proof Techniques. Math 245 January 17, 2013
Discrete Mathematics An Introduction to Proofs Proof Techniques Math 245 January 17, 2013 Proof Techniques Proof Techniques Direct Proof Proof Techniques Direct Proof Indirect Proof Proof Techniques Direct
More informationA Comparison between Genetic Algorithms and Evolutionary Programming based on Cutting Stock Problem
Engineering Letters, 14:1, EL_14_1_14 (Advance online publication: 12 February 2007) A Comparison between Genetic Algorithms and Evolutionary Programming based on Cutting Stock Problem Raymond Chiong,
More informationNovel Tag Anti-collision Algorithm with Adaptive Grouping
Wireless Sensor Network, 2009, 1, 475-481 doi:10.4236/wsn.2009.15057 Published Online December 2009 (http://www.scirp.org/journal/wsn). Novel Tag Anti-Collision Algorithm with Adaptive Grouping Abstract
More informationRicardo Model. Sino-American Trade and Economic Conflict
1 of 18 6/10/2011 4:35 PM Sino-American Trade and Economic Conflict By Ralph E. Gomory and William J. Baumol March 22, 2011 In this note we look carefully at the impact on a developed nation of the economic
More informationWHITE PAPER. Getting to Why in Omnichannel Title Marketing Attribution
WHITE PAPER Getting to Why in Omnichannel Title Marketing Attribution ii Contents The state of affairs... 1 The limitations of summarized, siloed channel data...2 Key takeaways... 3 Learn more... 3 1 The
More informationControl Charts for Customer Satisfaction Surveys
Control Charts for Customer Satisfaction Surveys Robert Kushler Department of Mathematics and Statistics, Oakland University Gary Radka RDA Group ABSTRACT Periodic customer satisfaction surveys are used
More informationOn-Line Restricted Assignment of Temporary Tasks with Unknown Durations
On-Line Restricted Assignment of Temporary Tasks with Unknown Durations Amitai Armon Yossi Azar Leah Epstein Oded Regev Keywords: on-line algorithms, competitiveness, temporary tasks Abstract We consider
More informationAgile TesTing MeTrics Quality Before Velocity
Agile TesTing MeTrics Quality Before Velocity Some people never weigh themselves. They may say, i just look at my clothes. if they don t fit, then i know i should lose weight. On the other hand, some people
More informationGenetic Algorithms in Matrix Representation and Its Application in Synthetic Data
Genetic Algorithms in Matrix Representation and Its Application in Synthetic Data Yingrui Chen *, Mark Elliot ** and Joe Sakshaug *** * ** University of Manchester, yingrui.chen@manchester.ac.uk University
More informationAssociation rules model of e-banking services
Association rules model of e-banking services V. Aggelis Department of Computer Engineering and Informatics, University of Patras, Greece Abstract The introduction of data mining methods in the banking
More informationA Fuzzy Optimization Model for Single-Period Inventory Problem
, July 6-8, 2011, London, U.K. A Fuzzy Optimization Model for Single-Period Inventory Problem H. Behret and C. Kahraman Abstract In this paper, the optimization of single-period inventory problem under
More informationProtecting Doctors Identity in Drug Prescription Analysis (Draft Version)
Protecting Doctors Identity in Drug Prescription Analysis (Draft Version) Václav Matyáš Jr. University of Cambridge Computer Laboratory Vaclav.Matyas@cl.cam.ac.uk Abstract: This paper describes work undertaken
More informationGroup Technology (GT) Applied to Biotechnology Automation
Group Technology (GT) Applied to Biotechnology Automation Aura-Maria Cardona Dept. of Computer & Electrical Eng. & Computer Sci. +1 561-922-8886 acardon5@fau.edu Zvi S. Roth Dept. of Computer and Electrical
More information10. Lecture Stochastic Optimization
Soft Control (AT 3, RMA) 10. Lecture Stochastic Optimization Genetic Algorithms 10. Structure of the lecture 1. Soft control: the definition and limitations, basics of epert" systems 2. Knowledge representation
More informationJournal of Global Research in Computer Science
Volume 2, No. 5, May 211 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info Weighted Mean Priority Based Scheduling for Interactive Systems H.S.Behera *1,
More informationBilateral and Multilateral Exchanges for Peer-Assisted Content Distribution
1290 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution Christina Aperjis, Ramesh Johari, Member, IEEE, and Michael
More informationOn-Chip Debug Reducing Overall ASIC Development Schedule Risk by Eric Rentschler, Chief Validation Scientist, Mentor Graphics
On-Chip Debug Reducing Overall ASIC Development Schedule Risk by Eric Rentschler, Chief Validation Scientist, Mentor Graphics 12 INTRODUCTION With ASIC complexity on the increase and unrelenting time-to-market
More informationConcepts for Using TC2000/TCnet PCFs
2004 Jim Cooper by Concepts for Using TC2000/TCnet PCFs Concepts for Using TC2000/TCnet PCFs 1 What is a PCF? 1 Why would I want to use a PCF? 1 What if I m no good at programming or math? 2 How do I make
More informationSponsored Search Auction Design via Machine Learning
Sponsored Search Auction Design via Machine Learning Maria-Florina Balcan Avrim Blum Jason D. Hartline Yishay Mansour ABSTRACT In this work we use techniques from the study of samplecomplexity in machine
More informationMethod of DNA Analysis Using the Estimation of the Algorithmic Complexity
Leonardo Electronic Journal of Practices and Technologies ISSN 1583-178 Issue 5, July-December 24 p. 53-66 Method of DNA Analysis Using the Estimation of the Algorithmic Complexity Ioan OPREA 1,2, Sergiu
More informationThermodynamic Modeling of Binary Cycles Looking for Best Case Scenarios
Thermodynamic Modeling of Binary Cycles Looking for Best Case Scenarios Silke Köhler and Ali Saadat GFZ-Potsdam, Section Geothermics, Telegrafenberg, D-14473 Potsdam, Germany Email: skoe@gfz-potsdam.de,
More informationNational Unit Specification: general information. UNIT Creative Project (SCQF level 6) CODE F58F 12 SUMMARY OUTCOMES RECOMMENDED ENTRY
National Unit Specification: general information CODE F58F 12 SUMMARY The purpose of this Unit is to allow candidates to plan, implement and evaluate a creative project. Candidates will be required to
More informationLCA in decision making
LCA in decision making 1 (13) LCA in decision making An idea document CHAINET LCA in decision making 2 (13) Content 1 INTRODUCTION 2 EXAMPLE OF AN INDUSTRIAL DEVELOPMENT PROCESS 2.1 General about the industrial
More informationINVENTORY MANAGEMENT IN HIGH UNCERTAINTY ENVIRONMENT WITH MODEL REFERENCE CONTROL
INVENTORY MANAGEMENT IN HIGH UNCERTAINTY ENVIRONMENT WITH MODEL REFERENCE CONTROL Heikki Rasku Hannu Koivisto Institute of Automation and Control, Tampere University of Technology, P.O.Box 692, Tampere,
More informationMeasure Performance of VRS Model using Simulation Approach by Comparing COCOMO Intermediate Model in Software Engineering
Measure Performance of VRS Model using Simulation Approach by Comparing COCOMO Intermediate Model in Software Engineering Dr. Devesh Kumar Srivastava Jaipur India E-mail: devesh98@gmail.com Abstract Estimation
More informationA Risk Management Process for Information Security and Business Continuity
A Risk Management Process for Information Security and Business Continuity João Carlos Gonçalves Fialho Instituto Superior Técnico - Taguspark joaogfialho@gmail.com ABSTRACT It was from the DNS.PT internship
More informationTesting of Web Services A Systematic Mapping
Testing of Web Services A Systematic Mapping Abhishek Sharma, Theodore D. Hellmann, Frank Maurer Department of Computer Science University of Calgary Calgary, Canada {absharma, tdhellma, frank.maurer}@ucalgary.ca
More informationDesigning an Effective Scheduling Scheme Considering Multi-level BOM in Hybrid Job Shop
Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 6, 2012 Designing an Effective Scheduling Scheme Considering Multi-level BOM
More informationExaminer s report F5 Performance Management December 2017
Examiner s report F5 Performance Management December 2017 General comments The F5 Performance Management exam is offered in both computer-based (CBE) and paper formats. The structure is the same in both
More information