PLWAP Sequential Mining: Open Source Code

Size: px
Start display at page:

Download "PLWAP Sequential Mining: Open Source Code"

Transcription

1 PL Sequentil Mining: Open Soure Code C.I. Ezeife Shool of Computer Siene University of Windsor Windsor, Ontrio N9B 3P4 Yi Lu Deprtment of Computer Siene Wyne Stte University Detroit, Mihign Yi Liu Shool of Computer Siene University of Windsor Windsor, Ontrio N9B 3P4 ABSTRACT PL lgorithm uses preorder linked, position oded version of tree nd elimintes the need to reursively re-onstrut intermedite trees during sequentil mining s done y tree tehnique. PL produes signifint redution in response time hieved y the lgorithm nd provides position ode mehnism for rememering the stored dtse, thus, eliminting the need to re-sn the originl dtse s would e neessry for pplitions like those inrementlly mintining mined frequent ptterns, performing strem or dynmi mining. This pper presents open soure ode for oth the PL nd lgorithms desriing our implementtions nd experimentl performne nlysis of these two lgorithms on syntheti dt generted with IBM quest dt genertor. An implementtion of the Apriori-like GSP sequentil mining lgorithm is lso disussed nd sumitted. Keywords sequentil ptterns, we usge mining, tree, pre-order linkge. INTRODUCTION Bsi ssoition rule mining with the Apriori lgorithm [] finds dtse items (ttriutes) tht our most often together in dtse trnstions. Thus, given set of trnstions (similr to dtse reords), where eh trnstion is set of items (ttriutes), n ssoition rule is of the form X Y, where X nd Y re sets of items nd X Y =. Assoition rule mining lgorithms generlly first find ll frequent ptterns (itemsets) s ll omintions of items or ttriutes with support (perentge ourrene in the entire dtse), greter or equl to predefined minimum support. Then, in the seond stge of min- (A full version of this pper is ville in the Journl of Dt Mining nd Knowledge Disovery, 5-38, 25.) Permission to mke digitl or hrd opies of ll or prt of this work for personl or lssroom use is grnted without fee provided tht opies re not mde or distriuted for profit or ommeril dvntge nd tht opies er this notie nd the full ittion on the first pge. To opy otherwise, to repulish, to post on servers or to redistriute to lists, requires prior speifi permission nd/or fee. WOODSTOCK 97 El Pso, Texs USA Copyright 2X ACM X-XXXXX-XX-X/XX/XX...$5.. Tle : Smple We Aess Sequene Dtse TID We ess Sequenes d 2 ee 3 fe 4 fe ing, ssoition rules re generted from eh frequent pttern y defining ll possile omintions of rule nteedent (hed) nd onsequent (til) from items omposing the frequent ptterns suh tht nteedent onsequent = nd nteedent onsequent = frequentpttern. Then, only rules with onfidene (numer of trnstions tht ontin the rule divided y the numer of trnstions ontining the nteedent) greter thn or equl to pre-defined minimum onfidene re retined s vlule, while the rest re pruned. Sequentil mining is n extension of si ssoition rule mining tht ommodtes ordered set of items or ttriutes, where the sme item my e repeted in sequene. While si frequent pttern hs set of non-ordered items tht hve ourred together up to minimum support threshold, frequent sequentil pttern hs sequene of ordered items tht hve ourred frequently in dtse trnstions t lest s often s the minimum support threshold. Thus, the mesures of support nd onfidene used in ssoition rule mining for deiding frequent itemsets re used in sequentil mining for deiding frequent sequenes. Just s n i-itemset ontins i items, n n-sequene ontins n ordered items (events). One pplition of sequentil mining is we usge mining for finding the reltionship mong different we users esses from we ess logs [5], [], [4] nd [9]. Anlysis of these ess dt n help for server performne enhnement nd diret mrketing in e-ommere s well s we personliztion. Before pplying sequentil mining tehniques to we log dt, the we log trnstions re pre-proessed to group them into set of ess sequenes for eh user identifier nd to rete we ess sequenes in the form of trnstion dtse. An exmple sequene dtse to e mined for frequent sequenes used in [7], is given s Tle. Aess sequene S = e e 2... e l is lled susequene of n ess sequene, S = e e 2...e n, nd S is super-sequene of S, denoted s S S, if nd only if for every event e j in S, there is n equl event e k in S, while the order tht

2 events ourred in S is the sme s the order of events in S. For exmple, with S =, S = d, we n sy tht S is susequene of S. We n lso sy tht is susequene of S, lthough there is ourring etween nd in S. In the sequene d, while d is suffix susequene of, is prefix susequene of d. Tehniques for mining sequentil ptterns from we logs fll into Apriori or non- Apriori. The Apriori-like lgorithms generte sustntilly huge sets of ndidte ptterns, espeilly for long sequentil ptterns [2], [3], [3], [4], [5]. -tree mining [7] is non-apriori method whih stores the we ess ptterns in ompt prefix tree, lled -tree, nd voids generting long lists of ndidte sets to sn support for. However, -tree lgorithm hs the drwk of reursively re-onstruting numerous intermedite -trees during mining in order to ompute the frequent prefix susequenes of every suffix susequene in frequent sequene. This proess is very time-onsuming. The PL lgorithm [7] ssigns unique position ode to eh node of the -tree, uilds the -tree hed links in pre-order fshion rther thn in the order the nodes rrive s done y the -tree lgorithm. With the pre-order linked, position oded -tree, the PL lgorithm is le to mine frequent sequenes, strting with the prefix sequene without the need to reursively re-onstrut ny intermedite -trees. This pproh results in tngile performne gin. This pper presents disussions of the implementtions of three key sequentil mining lgorithms used in experimentl nd performne justifition of the PL lgorithm in [7]. The C++ implementtions of three sequentil mining lgorithms, PL [7], [7], nd GSP [3] re disussed.. Relted Work Work on mining sequentil ptterns in we log inlude the GSP [3], the PSP [3], the G sequene [8] nd the grph trversl [5] lgorithms. Agrwl nd Sriknt proposed three lgorithms (Apriori, AprioriAll, AprioriSome) for sequentil mining in [2]. The GSP (Generlized Sequentil Ptterns) [3] lgorithm, whih is 2 times fster thn the Apriori lgorithm ws proposed. The GSP Algorithm mkes multiple psses over dt. The first pss determines the frequent -item ptterns (L ). Eh susequent pss strts with seed set: the frequent sequenes found in the previous pss (L k ). The seed set is used to generte new ndidte sequenes (C k ) y performing n Apriori gen join of L k with (L k ). This join requires tht every sequene s in the first L k joins with other sequenes s in the seond L k if the lst k-2 elements of s re the sme s the first k-2 elements of s. For exmple, if frequent 3-sequene set L 3 hs the following 6 sequenes: {((,2)(3)), ((,2)(4)), (()(3, 4)), ((,3)(5)), ((2)(3,4)), ((2)(3)(5))}, to otin frequent 4- sequenes, every frequent 3-sequene should join with the other 3-sequenes tht hve the sme first two elements s its lst two elements. Sequene s=((,2)(3)) joins with s =((2)(3,4)) to generte ndidte 4-sequene ((,2)(3,4)) sine the lst 2 elements of s, (2)(3), mth with the first 2 elements of s. Similrly, ((,2) (3)) joins with ((2)(3)(5)) to form ((,2)(3)(5)). There re no more mthing sequenes to join in L 3. The join phse is followed with the pruning phse, when the ndidte sequenes with ny of their ontiguous (k-)-susequenes hving support ount less thn the minimum support, re dropped. The dtse is snned for supports of the remining ndidte k-sequenes to find frequent k-sequenes(l k ), whih eome the seed for the next pss, ndidte (k+)-sequenes. The lgorithm termintes when there re no frequent sequenes t the end of pss, or when there re no ndidte sequenes generted. The GSP lgorithm uses hsh tree to redue the numer of ndidtes tht re heked for support in the dtse. The PSP (Prefix Tree For Sequentil Ptterns) [3] pproh is muh similr to the GSP lgorithm [3], ut stores the dtse on more onise prefix tree with the lef nodes rrying the supports of the sequenes. At eh step k, the dtse is rowsed for ounting the support of urrent ndidtes. Then, the frequent sequene set, L k is uilt. The Grph Trversl mining [4], [5], uses simple unweighted grph to store we sequenes nd grph trversl lgorithm similr to Apriori lgorithm to trverse the grph in order to ompute the k-ndidte set from the (k- )-ndidte sequenes without performing the Apriori-gen join. From the grph, if ndidte node is lrge, the djeny list of the node is retrieved. The dtse still hs to e snned severl times to ompute the support of eh ndidte sequene lthough the numer of omputed ndidte sequenes is drstilly redued from tht of the GSP lgorithm. Other tree sed pprohes inlude [8] lled G sequene mining. This lgorithm uses wildrds, templtes nd onstrution of Aggregte tree for mining. The FP-tree struture [9] first reorders nd stores the frequent non-sequentil dtse trnstion items on prefix tree, in desending order of their supports suh tht dtse trnstions shre ommon frequent prefix pths on the tree. Then, mining the tree is omplished y reursive onstrution of onditionl pttern ses for eh frequent -item (in ordered list lled f-list), strting with the lowest in the tree. Conditionl FP-tree is onstruted for eh frequent onditionl pttern hving more thn one pth, while mximl mined frequent ptterns onsist of ontention of items on eh single pth with their suffix f-list item. FreeSpn [8] like the FP-tree method, lists the f- list in desending order of support, ut it is developed for sequentil pttern mining. PrefixSpn [6] is pttern-growth method like FreeSpn, whih redues the serh spe for extending lredy disovered prefix pttern p y projeting portion of the originl dtse tht ontins ll neessry dt for mining sequentil ptterns grown from p. We ess pttern tree (), is non-apriori lgorithm, proposed y Pei et l. [7]. The -tree stores the we log dt in prefix tree formt similr to the frequent pttern tree [9] (FP-tree). lgorithm first sns the we log to ompute ll frequent individul events, then it onstruts -tree over the set of frequent individul events of eh trnstion efore it reursively mines the onstruted tree y uilding onditionl tree for eh onditionl suffix frequent pttern found. The proess of reursive mining of onditionl suffix tree ends when it hs only one rnh or is empty. An exmple pplition of the -tree lgorithm for finding ll frequent events in the we log (onstruting the -tree nd mining the ess ptterns from the tree) is shown with the dtse in Tle 2. Suppose the minimum support threshold is set t 75%, whih mens n ess sequene, s should hve ount of 3 out of 4 reords in

3 Tle 2: Smple We Aess Sequene Dtse for -tree H e d e r T l e R o t TID We ess sequene Frequent susequene d 2 ee 3 fe 4 ff : 3 : 3 : 3 : : : H e d e r T l e R o t : 4 : C o n d t i o n l W A P - t r e ( ) C o n d t i o n l W A P - t r e ( ) H e d e r T l e R o t : 3 : : 3 : H e d e r T l e R o t : : 4 R o t C o n d t i o n l W A P - t r e ( ) C o n d t i o n l W A P - t r e ( d ) C o n d t i o n l W A P - t r e ( e ) Figure : Constrution of the Originl Tree our exmple, to e onsidered frequent. Construting tree, entils first snning dtse one, to otin events tht re frequent,,,. When onstruting the -tree, the non-frequent (like d, e, f) prt of every sequene is disrded. Only the frequent su-sequenes shown in olumn three of Tle 2 re used s input. With the frequent sequene in eh trnstion, the -tree lgorithm first stores the frequent items s heder nodes for linking ll nodes of their type in the -tree in the order the nodes re inserted. When onstruting the -tree, virtul root (Root) is first inserted. Then, eh frequent sequene in the trnstion is used to onstrut rnh from the Root to lef node of the tree. Eh event in sequene is inserted s node with ount from Root if tht node type does not yet exist, ut the ount of the node is inresed y if the node type lredy exists. Also, the hed link for the inserted event is onneted (in roken lines) to the newly inserted node from the lst node of its type tht ws inserted or from the heder node of its type if it is the very first node of tht event type inserted. One the frequent sequentil dt re stored on the omplete -tree (Figures ), the tree is mined for frequent ptterns strting with the lowest frequent event in the heder list, in our exmple, strting from frequent event s the following disussion shows. From the -tree of Figure, it first omputes prefix sequene of the se or the onditionl sequene se of s: : 2; : ; : ; : -; : ; : ; : - The onditionl sequene list of suffix event is otined y following the heder link of the event nd reding the pth from the root to eh node (exluding the node). After disrding the non-frequent prt in the ove sequenes, the onditionl sequenes sed on re listed elow: Figure 2: Reonstrution of Trees for Mining Conditionl Pttern Bse : 2; : ; : ; : -; : ; : ; : - Using these onditionl sequenes, onditionl tree, -tree, is uilt using the sme method s shown in Figure. The re-onstrution of trees tht progressed s suffix sequenes, disovered frequent ptterns found long this line, nd. The reursion ontinues with the suffix pth,. The lgorithm keeps running, finding the onditionl sequene ses of,,. Figure 2 shows the trees for mining onditionl pttern se. After mining the whole tree, disovered frequent pttern set is: {,,,,,,,,,,,, }. Although -tree lgorithm sns the originl dtse only twie nd voids the prolem of generting explosive ndidte sets s in Apriori-like lgorithm, its min drwk is reursively re-onstruting lrge numers of intermedite -trees nd ptterns during mining tking up omputing resoures. Pre-Order linked tree lgorithm (PL) [7], [], is version of the tree lgorithm tht ssigns unique inry position ode to eh tree node nd performs the heder node linkges pre-order fshion (root, left, right). Both the pre-order linkge nd inry position odes enle the PL to diretly mine the sequentil ptterns from the one initil tree strting with prefix sequene, without re-onstruting the intermedite trees. To ssign position odes to PL node, the root hs null ode, nd the leftmost hild of ny prent node hs ode tht ppends to the position ode of its prent, while the position ode of ny other node hs ppended to the position ode of its nerest left siling. The PL tehnique presents muh etter performne thn tht hieved y the -tree tehnique s shown in extensive performne

4 nlysis..2 Motivtions nd Contriutions PL lgorithm [7], reently proposed sequentil mining tool in the Journl of Dt Mining nd Knowledge Disovery hs mny ttrtive fetures tht mkes it suitle s uilding lok for mny other sophistited sequentil dt mining pprohes like inrementl mining [6], we lssifition nd personliztion. Fetures of the PL lgorithm n lso e pplied to non-sequentil mining strutures like the FP-tree. PL nd two other key sequentil mining lgorithms ( nd GSP), hve een implemented nd tested thoroughly on pulily ville dt sets ( index.shtml) nd with rel dt. Meningful use nd pplition of these effiient tools will gretly inrese if their implementtions re mde pulily ville. This pper ontriutes y disussing our C++ implementtions of three key sequentil mining lgorithms PL, nd the GSP used in performne studies of work in [7]..3 Outline of the Pper Setion 2 disusses exmple mining with the Pre-Order Linked -Tree (PL) lgorithm. Setion 3 disusses the C++ implementtions of the PL, nd the GSP lgorithms for sequentil mining. Setion 4 disusses experimentl performne nlysis, while setion 5 presents onlusions nd future work. 2. AN EXAMPLE SEQUENTIAL MINING WITH PL ALGORITHM Unlike the onditionl serh in -tree mining, whih is sed on finding ommon suffix sequene first, the PL tehnique finds the ommon prefix sequenes first. The min ide is to find frequent pttern y progressively finding its ommon frequent susequenes strting with the first frequent event in frequent pttern. For exmple, if d is frequent pttern to e disovered, the lgorithm progressively finds suffix sequenes d, d, d nd d. The PL tree, on the other hnd, would find the prefix event first, then, using the suffix trees of node, it will find the next prefix susequene nd ontinuing with the suffix tree of, it will find the next prefix susequene nd finlly, d. Thus, the ide of PL is to use the suffix trees of the lst frequent event in n m-prefix sequene to reursively extend the susequene to m+ sequene y dding frequent event tht ourred in the suffix trees. Using the position odes of the nodes, the PL is le to know the desendnt nd siling nodes of oldest prent nodes on the suffix root set of frequent heder element eing heked for ppending to prefix susequene if it is frequent in the suffix root set under onsidertion. An element is frequent if the sum of the supports of the oldest prent nodes on ll its suffix root sets is greter thn or equl to the minimum support. Assume we wnt to mine the we ess dtse (wsd) of Tle 2 For frequent sequenes given minimum support of 75% or 3 trnstions. Construting nd mining the PL tree goes through the following steps. () Sn WASD (olumn 2 of Tle 2 one to find ll frequent individul events, L s {:4, :4, :4}. The events d:, e:2, f:2 Figure 3: Constrution of PL-Tree Using Pre- Order Trversl hve supports less thn the minimum support of 3 nd (2) Sn WASD gin, onstrut PL-tree over the set of individul frequent events (olumn 3 of Tle 2, y inserting eh sequene from root to lef, leling eh node s (node event: ount: position ode). Then, fter ll events re inserted, trverse the tree pre-order wy to onnet the heder link nodes. Figure 3 shows the ompletely onstruted PL tree with the pre-order linkges. (3) Reursively mine the PL-tree using ommon prefix pttern serh: The lgorithm strts to find the frequent sequene with the frequent -sequene in the set of frequent events(fe) {,, }. For every frequent event in FE nd the suffix trees of urrent onditionl PL-tree eing mined, it follows the linkge of this event to find the first ourrene of this frequent event in every urrent suffix tree eing mined, nd dds the support ount of ll first ourrenes of this frequent event in ll its urrent suffix trees. If the ount is greter thn the minimum support threshold, then this event is ppended (ontented) to the lst susequene in the list of frequent sequenes, F. The suffix trees of these first ourrene events in the previously mined onditionl suffix PL-trees re now in turn, used for mining the next event. To otin this onditionl PL-tree, we only need to rememer the roots of the urrent suffix trees, whih re stored for next round mining. For exmple, the lgorithm strts y mining the tree in Figure 4() for the first element in the heder linkge list, following the link to find the first ourrenies of nodes in :3: nd :: of the suffix trees of the Root sine this is the first time the whole tree is pssed for mining frequent -sequene. Now, the list of mined frequent ptterns F is {} sine the ount of event in this urrent suffix trees is 4 (sum of :3: nd :: ounts), nd more thn the minimum support of 3. The mining of frequent 2-sequenes tht strt with event would ontinue with the next suffix trees of rooted t {:3:, ::} shown in Figure 4() s unshdowed nodes. The ojetive here is to find if 2-sequenes, nd re frequent using these suffix trees. In order to onfirm frequent, we need to onfirm event frequent in the urrent suffix tree set, nd similrly, to onfirm frequent, we should gin follow the link to onfirm event frequent using this suffix tree set, sme for. The proess ontinues to otin sme frequent sequene set {,,,,,,,,,,,, } s the -tree lgorithm.

5 2 : 2 : : { :,,,, } { :, } { :,,,, } 2 : 2 : : 3 : 3 : ( ) 3 : 3 : : : : Ro t : : : Ro t : : : : : : : : : : 2 : 2 : : 3 : s u x r f t i e { :, } Ro t s u x i r f t e { : :, :, } s u r x f i t e { : } ( ) ( d ) 2 : 2 : : 3 : : : : ( ) 3 : 3 : : : : : : : : : Ro t : : : : : Figure 4: Mining PL-Tree to Find Frequent Sequene Strting with 3. C++ IMPLEMENTATIONS OF THE THREE SEQUENTIAL MINING ALGORITHMS Although, we ly more emphsis on the PL lgorithm developed in our l, we lso provide the soure odes of the nd GSP lgorithms used for performne nlysis. The soure odes re disussed under seven hedings of () development nd running environment, (2) input dt formt nd files, (3) minimum support formt, (4) output dt formt nd files, (5) funtions used in the progrm, (6) dt strutures used in the progrm nd (7) dditionl informtion. All of the odes re doumented with informtion on this setion nd more for ode redility, mintinility nd extendility. Eh progrm is stored in.pp file nd ompiled with g++ filenme.pp. 3. C++ Implementtion of the PL Sequentil Mining Algorithm This is the progrm of PL lgorithm whih is sed on the desription in [7], C.I. Ezeife nd Y. Lu. Mining We Log sequentil Ptterns with Position Coded Pre- Order Linked -tree in DMKD 25..DEVELOP- MENT ENVIRONMENT: Although initil version is developed under the hrdwre/softwre environment speified elow, the progrm runs on more powerful nd fster multiproessor UNIX environments s well. Initil environment is: (i)hrdwre: Intel Celeron 4 PC, 64M Memory; (ii)operting system: Windows 98; (iii)development tool: Inprise(Borlnd) C++ Builder 6.. The lgorithm is developed under C++ Builder 6., ut ompiles nd runs under ny stndrd C++ development tool. 2. INPUT FILES AND FORMAT: Input file is test.dt: For simplifying input proess of the progrm, we ssume tht ll input dt hve een preproessed suh tht ll events elonging to the sme user id hve een gthered together, nd formed s sequene nd sved in text file, lled, test.dt. The test.dt file my e omposed of hundreds of thousnds of lines of sequenes where eh line represents we ess sequene for eh user. Every line of the input dt file ( test.dt ) inludes UserID, length of sequene nd the sequene whih re seprted y t spes. An exmple input line is: Here, represents UserID, the length of sequene is 5, the sequene is,2,4,,3. 3. MINIMUM SUPPORT FORMAT: The progrm lso needs to ept vlue etween nd s minimum support. The minimum support input is entered intertively y the user during the exeution of the progrm when prompted. For minimum support of 5%, user should type.5, nd for minsupport of 5%, user should type.5, nd so on. 4. OUTPUT FILES AND FORMAT: result PL.dt: One the progrm termintes, we n find the result frequent ptterns in file nmed result PL.dt. It my ontin lines of ptterns, eh representing frequent pttern. 5. FUNCTIONS USED IN THE CODE: (i)buildtree: uilds the PL tree, (ii)uildlinkge: Builds the pre-order linkge for PL tree, (iii)mkecode: mkes the position ode for node, (v)hekposition: heks the position etween ny two nodes in the PL tree, (v)miningproess: mines sequentil frequent ptterns from the PL tree using position odes. 6. DATA STRUCTURE: Three strut re used in this progrm: (i) the node strut indites PL node whih ontins the following informtion:.the event nme,.the numer of ourrene of the event,. link to the position ode, d. length of position ode, e. the linkge to next node with sme event nme in PL tree, f. pointer to its left son, g. pointer to its right siling, h. pointer to its prent, i. the numer of its sons. (ii) position ode strut implemented s linked list of unsigned integer to mke it possile to hndle dt of ny size without exeeding the mximum integer size. (iii) linkge strut. 7. ADDITIONAL INFORMATION: The run time is displyed on the sreen with strt time, end time nd totl seonds for running the progrm. 3.2 C++ Implementtion of the Sequentil Mining Algorithm This is the lgorithm progrm sed on the desription in [7]: Jin Pei, Jiwei Hn, Behzd Mortzvisl, nd Hu Zhu, Mining Aess Ptterns Effiiently from We Logs, PAKDD 2..DEVELOPMENT ENVIRONMENT: The sme s desried for PL nd n run in ny UNIX system s well. (i)hrdwre: Intel Celeron 4 PC, 64M Memory; (ii)operting system: Windows 98; (iii)development tool: Inprise(Borlnd) C++ Builder 6.. The lgorithm is developed under C++ Builder 6., nd lso ompiles nd runs under ny stndrd C++ development tools. 2. INPUT FILES AND FORMAT: i) Input file test.dt: Pre-proessed sequentil input reords

6 re red from the file test.dt. The test.dt file is omposed of hundreds of thousnds of lines of sequenes where eh line represents we ess sequene for eh user. Every line inludes UserID, length of sequene nd the sequene whih re seperted y t spes. For exmple, given line: represents UserID, 5 is the length of sequene, the sequene is,2,4,,3. ii) Input file middle.dt: used to sve the onditionl middle ptterns. During the tree mining proess, following the linkges, one the sum of support for n event is found greter thn minimum support, ll its prefix onditionl ptterns re sved in the middle.dt file for next round mining. The formt of middle.dt is s follows: Eh line inludes the length of the sequene, the ourrene of the sequene, nd the events in the sequene. For exmple, given line in middle.dt: , the length of sequene is 5, 4 indites the sequene ourred 4 times in the previous onditionl tree nd the sequene is,2,4,,3. 3. MINIMUM SUPPORT: The progrm lso needs to ept vlue etween nd for minimum support or frequeny. The user is prompted for minimum support when the progrm strts. 4. OUTPUT FILES AND FORMAT: result.dt One the progrm termintes, the result ptterns re in file nmed result.dt, whih my ontin lines of ptterns. 5. FUNCTIONS USED IN THE CODE: (i)buildtree: Builds the tree/onditionl tree (ii)miningproess: produes sequentil pttern/onditionl prefix su-pttern from tree/onditionl tree. 6. DATA STRUCTURE: three strut re used in this progrm: (i) the node strut indites node whih ontins the following informtion:.the event nme,.the numer of ourrene of the event,. the linkge to next node sme event nme in tree, d. pointer to it s left son, e. pointer to it s rights siling, f. pointer to it s prent. (ii) linkge strut desried in the progrm. 7. ADDITIONAL INFORMATION: The run time is displyed on the sreen with strt time, end time nd totl seonds for running the progrm. 3.3 C++ Implementtion of the GSP Sequentil Mining Algorithm This is GSP lgorithm implementtion, whih demostrtes the result desried in [3]: R. Sriknt nd R. Agrwl. Mining sequentil ptterns: Generliztions nd performne improvements, 996..DEVELOPMENT ENVIRONMENT: The sme s desried for PL nd runs in ny UNIX system s well. (i)hrdwre: Intel Celeron 4 PC, 64M Memory; (ii)operting system: Windows 98; (iii)development tool: Inprise(Borlnd) C++ Builder 6.. The lgorithm is developed under C++ Builder 6. ut lso ompiles nd runs under ny stndrd C++ development tools. 2. INPUT FILES AND FORMAT: Input file test.dt: For simplifying input proess of the progrm, we ssume tht ll input dt hve een preproessed suh tht ll events elonging to the sme user id hve een gthered together, nd formed s sequene nd sved in test.dt. The test.dt file is omposed of hundreds of thousnds of lines of sequenes, where eh line represents we ess sequene for eh user. Every line inludes UserID, length of sequene nd the sequene whih re seperted y t spes. For exmple, given line: represents UserID, the length of the sequene is 5, the sequene is,2,4,,3. 3. MINIMUM SUPPORT: The progrm lso needs to ept vlue etween nd s minimum support. The user is prompted for minimum support when the progrm strts. 4. OUTPUT FILES AND FORMAT: result GSP.dt At the termintion of the progrm, the result ptterns re in file nmed result GSP.dt, whih my ontin lines of frequent ptterns. 5. FUNCTIONS USED IN THE CODE: (i)gsp: reds the file nd mines levelwise ording to the lgorithm. 6. DATA STRUCTURES: There re strut for i) ndidte sequene list nd its ount nd ii) sequene. 7. ADDITIONAL INFORMATION: The run time is displyed on the sreen with strt time, end time nd totl seonds for running the progrm. 4. PERFORMANCE AND EXPERIMENTAL ANALYSIS OF THREE ALGORITHMS The PL lgorithm elimintes the need to store numerous intermedite trees during mining, thus, drstilly utting off huge memory ess osts. The PL nnottes eh tree node with inry position ode for quiker mining of the tree. This setion ompres the experimentl performne nlysis of PL with the tree mining nd the Apriori-like GSP lgorithms. The three lgorithms were initilly implemented with C++ lnguge running under Inprise C++ Builder environment. All initil experiments were performed on 4MHz Celeron PC mhine with 64 megytes memory running Windows 98 (for work in [7]). Current experiments re onduted with the sme implementtions of the progrms nd still on syntheti dtsets generted using the resoure dt genertor ode from Resoures/index.shtml. This syntheti dtset hs een used y most pttern mining studies [3, 2, 7]. Experiments were lso run on rel dtsets generted from we log dt of University of Windsor Computer Siene server nd preprossed with our we log lener ode. The orretness of the implementtions were onfirmed y heking tht the frequent ptterns generted for the sme dtset y ll lgorithms re the sme. A high speed UNIX SUN mirosystem with totl of 6384 M memory nd 8 x 2 MHz proessor speed is used for these experiments. The syntheti dtsets onsist of sequenes of events, where eh event represents n essed we pge. The prmeters shown elow re used to generte the dt sets. D Numer of sequenes in the dtse C : Averge length of the sequenes S : Averge length of mximl potentilly frequent sequene N : numer of events For exmple, C.S5.N2.D6K mens tht C =, S = 5, N = 2, nd D = 6K. It represents group of dt with verge length of the sequenes s, the verge length of mximl potentilly frequent sequene is 5, the numer of individul events in the dtse is 2,

7 nd the totl numer of sequenes in dtse is 6 thousnd. The dtsets with different prmeters test different spets of the lgorithms. Generlly, if the numer of these four prmeters eomes lrger, the exeution time eomes longer. Experiments re onduted to test the ehvior of the lgorithms with respet to the four prmeters, minimum support threshold, dtse sizes, numer of dtse tle ttriutes nd the verge length of sequenes. For eh experiment, while one of the prmeters hnges, others re pegged t some onstnt vlues. Oservtions re mde t three levels of smll, medium nd lrge (e.g., smll dtse size my onsist of tle with reords less thn 4 thousnds, medium size tle hs etween 5 nd 2 thousnds reords, while lrge hs over 3 thousnd). Experiment : Exeution time trend with different minimum supports (smll size dtse, 4K reords): This experiment uses fixed size dtse nd different minimum support to ompre the performne of PL, nd GSP lgorithms. The dtsets re desried s C2.5.S5.N5.D4K, nd lgorithms re tested with minimum supports etween.5% nd 2% ginst the 4 thousnd (4K) dtse with 5 ttriutes nd verge sequene length of 2.5. The results of this experiment re shown in Tle 3 nd Figure 5 with the numer of frequent ptterns found reported s Fp. From this result, it n e seen tht t minimum support of.5%, the numer of frequent ptterns found is highest nd is 2729, the PL lgorithm rn lmost 3 times fster thn the lgorithm. As the minimum support inreses, the numer of frequent ptterns found dereses nd the gin in performne y the PL lgorithm over the lgorithm dereses. It n e seen tht the more the numer of frequent ptterns found in dtset, the higher the performne gin hieved y the PL lgorithm over the lgorithm. This is euse the two lgorithms spend out the sme mount of time snning the dtse nd onstruting the tree, ut the PL lgorithm sves on storing nd reding intermedite re-onstruted tree, whih re s mny s the numer of frequent ptterns found. The exeution times of the two lgorithms re the sme when there re nerly no frequent ptterns Minimum Support (in %) PL Figure 5: Exeution Times Trend with Different Minimum Supports (smll dtse) Tle 3: Exeution Times for Dtset t Different Minimum Supports (smll dtse) Alg Runtime (in ses) t Different Supports(%) Fp= Fp= Fp = Fp= Fp= Fp= Fp GSP PL Experiment 2: Exeution times trend with different minimum supports (Medium size dtse, 2K reords): This experiment uses fixed size dtse nd different minimum support to ompre the performne of PL, nd GSP lgorithms. The lgorithms re tested with minimum supports etween.5% nd 5% ginst the 2 thousnd (2K) dtse, 5 ttriutes nd verge sequene length of 2.5. The results of this experiment re shown in Tle 4 nd Figure 6 with the numer of frequent ptterns found reported s Fp. It n e seen tht the trend in performne is the sme s with smll dtse. When the minimum support rehes 5%, there re no frequent ptterns found nd the running times of the two lgorithms eome the sme Minimum Support (in %) PL Figure 6: Exeution Times Trend with Different Minimum Supports (medium dtse) Experiment 3: Exeution Times for Dtset t Different Minimum Supports (lrge dtse): This experiment uses fixed size dtse nd different minimum support to ompre the performne of PL, nd GSP lgorithms. The lgorithms re tested with minimum supports etween.5% nd 5% ginst one million (M) reord dtse. The results of this experiment re shown in Tle 5 nd Figure 7. Experiment 3: Exeution Times for Dtset t Different Minimum Supports (lrge dtse ut very low minimum supports): This experiment uses fixed size dtse nd different mini-

8 Tle 4: Exeution Times for Dtset t Different Minimum Supports (medium dtse) Alg Runtime (in ses) t Different Supports(%) Fp= Fp= Fp = Fp= Fp= Fp= Fp GSP PL , 2,, 8, 6, 4, 2, PL Minimum Support (in %) PL Figure 7: Exeution Times for Dtset t Different Minimum Supports (lrge dtse) Minimum Support (in %) Figure 8: Exeution Times for Dtset t Different Minimum Supports (lrge dt se nd low minsupports) Tle 6: Exeution Times for Dtset t Different Minimum Supports (lrge dtse nd low minsupports) Alg Runtime (in ses) t Different Supports(%) Fp= Fp= Fp = Fp= Fp= Fp= Fp 222K 6K PL mum support to ompre the performne of PL, nd GSP lgorithms. The lgorithms re tested with minimum supports etween.% nd.2% ginst one million (M) reord dtse. The results of this experiment re shown in Tle 6 nd Figure 8. Experiment 4: Exeution times trend with different dtse sizes (smll size dtse, 2K to 4K): This experiment uses fixed size dtse nd different minimum supports to ompre the performne of PL, nd GSP lgorithms. The lgorithms re tested on dtses of sizes 2K to 4K t minimum support of %. The gin in performne y the PL lgorithm is onstnt ross different sizes euse the numer of frequent ptterns in dif- Tle 5: Exeution Times for Dtset t Different Minimum Supports (lrge dtse) Alg Runtime (in ses) t Different Supports(%) Fp= Fp= Fp = Fp= Fp= Fp= Fp GSP PL ferent sized dtsets generted y the dt genertor seem to e out the sme t prtiulr minimum support. The results of this experiment re shown in Tle 7 nd Figure 9. Experiment 5: Exeution times trend with different dtse sizes (medium size dtse, 2K to 2K): This experiment uses fixed size dtse nd different minimum support to ompre the performne of PL, nd GSP lgorithms. The lgorithms re tested with dtse sizes etween 2 nd 2 thousnds t minimum support of M. The results of this experiment re shown in Tle 8 nd Figure. Experiment 6: Exeution times trend with different dtse sizes (lrge size dtse, 3K to Tle 7: Exeution Times for Different Dtse Sizes t Minsupport (smll dtse) Alg Runtime (in ses) t Different Supports(%) 2K 4K 6K 8K K 2K 4K GSP PL

9 K 4K 6K 8K K 2K 4K Dtse Sizes PL Figure 9: Exeution Times Trend with Different Minimum Supports (lrge dtse) K 4K 6K 8K K 2K Dtse Sizes PL Figure : Exeution Times Trend with Different Dtse sizes (medium dtse) 9K): This experiment uses fixed size dtse nd different minimum support to ompre the performne of PL, nd GSP lgorithms. The lgorithms re tested with dtse sizes etween 3K nd 9K reords t minimum support of %. The results of this experiment re shown in Tle 9 nd Figure. Experiments were lso run to hek the ehvior of the lgorithms with vrying sequene lengths nd numer of dtse ttriutes, nd the PL lwys runs fster thn the lgorithm when the verge sequene length is less thn 2 nd there re some found frequent ptterns. However, the PL performne strts to degrde wehn the verge sequene length of the dtse is more thn 2 euse with extremely long sequenes, there re nodes with position odes tht re more thn mxint, in our urrent implementtion, we use numer of vriles to store node s position ode tht re linked together. Thus, mnging nd retrieving the position ode for exessively long Tle 8: Exeution Times for Different Dtse Sizes t Minsupport (medium dtse) Alg Runtime (in ses) t Different Dtse sizes(%) 2K 4K 6K 8K K 2K GSP PL K 4K 5K 6K 7K 8K 9K Dtse Sizes PL Figure : Exeution Times Trend with Different Dtse sizes (lrge dtse) sequenes ould turn out to e time onsuming. 5. CONCLUSIONS This pper disusses the soure ode implementtion of the PL lgorithm presented in [7] s well s the our implementtions of two other sequentil mining lgorithms [7] nd GSP [3] tht PL ws ompred with. Extensive experimentl studies were onduted on the three implemented lgorithms using IBM quest syntheti dtsets. From the experiments, it ws disovered tht the PL lgorithm, whih mines pre-order linked, position oded version of the tree, lwys outperforms the other two lgorithms. PL improves on the performne of the effiient tree-sed tree lgorithm y mining with position odes nd their suffix tree root sets, rther thn storing intermedite trees reursively. Thus, it sves on Tle 9: Exeution Times for Different Dtse Sizes t Minsupport (lrge dtse) Alg Runtime (in ses) t Different DB sizes(%) 3K 4K 5K 6K 7K 8K 9K GSP PL

10 proessing time nd more so when the numer of frequent ptterns inreses nd the minimum support threshold is low. The PL lgorithm runs fster thn the lgorithm even with very lrge dtses. PL s performne seems to degrde some with very long sequenes hving sequene lenght more thn 2 nd this is euse of the inrese in the size of position ode tht it needs to uild nd proess for suh long sequenes leding to very deep PL tree. The experiments show tht mining we log using PL lgorithm is muh more effiient thn with -tree nd GSP lgorithms. For mining sequentil ptterns from we logs, the following spets my e onsidered for future work. The PL lgorithm ould e extended to hndle sequentil pttern mining in lrge trditionl dtses to hndle onurreny of events. Also, effiient we usge mining, ould enefit from relting usge to the ontent of we pges. Other res of interest for future work inlude distriuted mining with PL trees nd pplying these tehniques to inrementl mining of we logs nd sequentil ptterns. 6. ACKNOWLEDGMENTS This reserh ws supported y the Nturl Siene nd Engineering Reserh Counil (NSERC) of Cnd under n operting grnt (OGP-9434) nd University of Windsor grnt. 7. REFERENCES [] R. Agrwl nd R. Sriknt. Fst lgorithms for mining ssoition rules in lrge dtses. In Proeedings of the 2th Interntionl Conferene on very Lrge Dtses Sntigo, Chile, pges , 994. [2] R. Agrwl nd R. Sriknt. Mining sequentil ptterns. In Proeedings of the th Interntionl Conferene on Dt Engineering (ICDE 95) Tipei Tiwn, pges 3 4, 995. [3] R. S. R. Agrwl. Mining sequentil ptterns: Generliztions nd performne improvements. In Proeedings of the Fifth Interntionl Conferene On Extending Dtse Tehnology (EDBT 96) Avignon Frne, pges 3 7, 996. [4] J. Borges nd M. Levene. Dt mining of user nvigtion ptterns. In Proeedings of the KDD Workshop on We Mining Sn Diego Cliforni, pges 3 36, 999. [5] O. Etzioni. The world wide we: Qugmire or gold mine. Communitions of the ACM, 39():65 68, 996. [6] C. Ezeife nd M. Chen. Mining we sequentil ptterns inrementlly with revised plwp tree. In Proeedings of the fifth Interntionl Conferene on We-Age Informtion Mngement (WAIM 24), pges Springer Verlg, July 23. [7] C. Ezeife nd Y. Lu. Mining we log sequentil ptterns with position oded pre-order linked wp-tree. Interntionl Journl of Dt Mining nd Knowledge Disovery (DMKD) Kluwer Pulishers, ():5 38, 25. [8] J. Hn, J. Pei, B. Mortzvi-Asl, Q. Chen, U. Dyl, nd M. Hsu. Freespn: Frequent pttern-projeted sequentil pttern mining. In Proeedings of the 2 Int. Conferene on Knowledge Disovery nd Dt Mining (KDD ), pges , 2. [9] J. Hn, J. Pei, Y. Yin, nd R. Mo. Mining frequent ptterns without ndidte genertion: A frequent-pttern tree pproh. Interntionl Journl of Dt Mining nd Knowledge Disovery, 8():53 87, Jn 24. [] Y. Lu nd C. Ezeife. Position oded pre-order linked wp-tree for we log sequentil pttern mining. In Proeedings of the 7th Pifi-Asi Conferene on Knowledge Disovery nd Dt Mining (PAKDD 23), pges Springer, My 23. [] S. Mdri, S. Bhowmik, W. Ng, nd E. Lim. Smpling lrge dtses for finding ssoition rules. In Proeedings of the first Interntionl Dt Wrehousing nd Knowledge Disovery DWk99, 999. [2] F. Mssegli, F. Cthl, nd P. Ponelet. Psp : Prefix tree for sequentil ptterns. In Proeedings of the 2nd Europen Symposium on Priniples of Dt Mining nd Knowledge Disovery (PKDD 98) Nntes Frne LNAI, pges 76 84, 998. [3] F. Mssegli, P. Ponelet, nd R. Cihetti. An effiient lgorithm for we usge mining. Networking nd Informtion Systems Journl (NIS), 2(5-6):57 63, 999. [4] A. Nnopoulos nd Y. Mnolopoulos. Finding generlized pth ptterns for we log dt mining. Dt nd Knowledge Engineering, 37(3): , 2. [5] A. Nnopoulos nd Y. Mnolopoulos. Mining ptterns from grph trversls. Dt nd Knowledge Engineering, 37(3): , 2. [6] J. Pei, J. Hn, B. Mortzvi-Asl, nd H. Pinto. Prefixspn: Mining sequentil ptterns effiiently y prefix-projeted pttern growth. In Proeedings of the Interntionl Conferene on Dt Engineering (ICDE ), pges , 2. [7] J. Pei, J. Hn, B. Mortzvi-Asl, nd H. Zhu. Mining ess ptterns effiiently from we logs. In Proeedings of the Pifi-Asi Conferene on Knowledge Disovery nd Dt Mining (PAKDD ) Kyoto Jpn, 2. [8] M. Spiliopoulou. The lorious wy from dt mining to we mining. Journl of Computer Systems Siene nd Engineering Speil Issue on Semntis of the We, 4:3 26, 999. [9] J. Srivstv, R. Cooley, M. Deshpnde, nd P. Tn. We usge mining: Disovery nd pplitions of usge ptterns from we dt. SIGKDD Explortions,, 2.

OUTLINE SYSTEM-ON-CHIP DESIGN. GETTING STARTED WITH VHDL August 31, 2015 GAJSKI S Y-CHART (1983) TOP-DOWN DESIGN (1)

OUTLINE SYSTEM-ON-CHIP DESIGN. GETTING STARTED WITH VHDL August 31, 2015 GAJSKI S Y-CHART (1983) TOP-DOWN DESIGN (1) August 31, 2015 GETTING STARTED WITH VHDL 2 Top-down design VHDL history Min elements of VHDL Entities nd rhitetures Signls nd proesses Dt types Configurtions Simultor sis The testenh onept OUTLINE 3 GAJSKI

More information

Chapter. Contents: A Constructing decimal numbers

Chapter. Contents: A Constructing decimal numbers Chpter 9 Deimls Contents: A Construting deiml numers B Representing deiml numers C Deiml urreny D Using numer line E Ordering deimls F Rounding deiml numers G Converting deimls to frtions H Converting

More information

Active Directory Service

Active Directory Service In order to lern whih questions hve een nswered orretly: 1. Print these pges. 2. Answer the questions. 3. Send this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following

More information

Arc-Consistency for Non-Binary Dynamic CSPs

Arc-Consistency for Non-Binary Dynamic CSPs Ar-Consisteny for Non-Binry Dynmi CSPs Christin Bessière LIRMM (UMR C 9928 CNRS / Université Montpellier II) 860, rue de Sint Priest 34090 Montpellier, Frne Emil: essiere@rim.fr Astrt. Constrint stisftion

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE Tble of Contents 1 Home Pge 1 2 Pge 2 3 Your Control Pnel 3 4 Add New Job (Three-Step Form) 4-6 5 Mnging Job Postings (Mnge Job Pge) 7-8 6 Additionl

More information

Student Access to Virtual Desktops from personally owned Windows computers

Student Access to Virtual Desktops from personally owned Windows computers Student Aess to Virtul Desktops from personlly owned Windows omputers Mdison College is plesed to nnoune the ility for students to ess nd use virtul desktops, vi Mdison College wireless, from personlly

More information

Equivalence Checking. Sean Weaver

Equivalence Checking. Sean Weaver Equivlene Cheking Sen Wever Equivlene Cheking Given two Boolen funtions, prove whether or not two they re funtionlly equivlent This tlk fouses speifilly on the mehnis of heking the equivlene of pirs of

More information

KEY SKILLS INFORMATION TECHNOLOGY Level 3. Question Paper. 29 January 9 February 2001

KEY SKILLS INFORMATION TECHNOLOGY Level 3. Question Paper. 29 January 9 February 2001 KEY SKILLS INFORMATION TECHNOLOGY Level 3 Question Pper 29 Jnury 9 Ferury 2001 WHAT YOU NEED This Question Pper An Answer Booklet Aess to omputer, softwre nd printer You my use ilingul ditionry Do NOT

More information

1. Definition, Basic concepts, Types 2. Addition and Subtraction of Matrices 3. Scalar Multiplication 4. Assignment and answer key 5.

1. Definition, Basic concepts, Types 2. Addition and Subtraction of Matrices 3. Scalar Multiplication 4. Assignment and answer key 5. . Definition, Bsi onepts, Types. Addition nd Sutrtion of Mtries. Slr Multiplition. Assignment nd nswer key. Mtrix Multiplition. Assignment nd nswer key. Determinnt x x (digonl, minors, properties) summry

More information

Enterprise Digital Signage Create a New Sign

Enterprise Digital Signage Create a New Sign Enterprise Digitl Signge Crete New Sign Intended Audiene: Content dministrtors of Enterprise Digitl Signge inluding stff with remote ess to sign.pitt.edu nd the Content Mnger softwre pplition for their

More information

Quick Guide to Lisp Implementation

Quick Guide to Lisp Implementation isp Implementtion Hndout Pge 1 o 10 Quik Guide to isp Implementtion Representtion o si dt strutures isp dt strutures re lled S-epressions. The representtion o n S-epression n e roken into two piees, the

More information

Words Symbols Diagram. abcde. a + b + c + d + e

Words Symbols Diagram. abcde. a + b + c + d + e Logi Gtes nd Properties We will e using logil opertions to uild mhines tht n do rithmeti lultions. It s useful to think of these opertions s si omponents tht n e hooked together into omplex networks. To

More information

How To Organize A Meeting On Gotomeeting

How To Organize A Meeting On Gotomeeting NOTES ON ORGANIZING AND SCHEDULING MEETINGS Individul GoToMeeting orgnizers my hold meetings for up to 15 ttendees. GoToMeeting Corporte orgnizers my hold meetings for up to 25 ttendees. GoToMeeting orgnizers

More information

Clause Trees: a Tool for Understanding and Implementing Resolution in Automated Reasoning

Clause Trees: a Tool for Understanding and Implementing Resolution in Automated Reasoning Cluse Trees: Tool for Understnding nd Implementing Resolution in Automted Resoning J. D. Horton nd Brue Spener University of New Brunswik, Frederiton, New Brunswik, Cnd E3B 5A3 emil : jdh@un. nd spener@un.

More information

- DAY 1 - Website Design and Project Planning

- DAY 1 - Website Design and Project Planning Wesite Design nd Projet Plnning Ojetive This module provides n overview of the onepts of wesite design nd liner workflow for produing wesite. Prtiipnts will outline the sope of wesite projet, inluding

More information

Module 5. Three-phase AC Circuits. Version 2 EE IIT, Kharagpur

Module 5. Three-phase AC Circuits. Version 2 EE IIT, Kharagpur Module 5 Three-hse A iruits Version EE IIT, Khrgur esson 8 Three-hse Blned Suly Version EE IIT, Khrgur In the module, ontining six lessons (-7), the study of iruits, onsisting of the liner elements resistne,

More information

REMO: Resource-Aware Application State Monitoring for Large-Scale Distributed Systems

REMO: Resource-Aware Application State Monitoring for Large-Scale Distributed Systems : Resoure-Awre Applition Stte Monitoring for Lrge-Sle Distriuted Systems Shiong Meng Srinivs R. Kshyp Chitr Venktrmni Ling Liu College of Computing, Georgi Institute of Tehnology, Atlnt, GA 332, USA {smeng,

More information

Data Security 1. 1 What is the function of the Jump instruction? 2 What are the main parts of the virus code? 3 What is the last act of the virus?

Data Security 1. 1 What is the function of the Jump instruction? 2 What are the main parts of the virus code? 3 What is the last act of the virus? UNIT 18 Dt Seurity 1 STARTER Wht stories do you think followed these hedlines? Compre nswers within your group. 1 Love ug retes worldwide hos. 2 Hkers rk Mirosoft softwre odes. 3 We phone sm. Wht other

More information

McAfee Network Security Platform

McAfee Network Security Platform XC-240 Lod Blner Appline Quik Strt Guide Revision D MAfee Network Seurity Pltform This quik strt guide explins how to quikly set up nd tivte your MAfee Network Seurity Pltform XC-240 Lod Blner. The SFP+

More information

ORGANIZER QUICK REFERENCE GUIDE

ORGANIZER QUICK REFERENCE GUIDE NOTES ON ORGANIZING AND SCHEDULING MEETINGS Individul GoToMeeting orgnizers my hold meetings for up to 15 ttendees. GoToMeeting Corporte orgnizers my hold meetings for up to 25 ttendees. GoToMeeting orgnizers

More information

Towards Zero-Overhead Static and Adaptive Indexing in Hadoop

Towards Zero-Overhead Static and Adaptive Indexing in Hadoop Nonme mnusript No. (will e inserted y the editor) Towrds Zero-Overhed Stti nd Adptive Indexing in Hdoop Stefn Rihter Jorge-Arnulfo Quiné-Ruiz Stefn Shuh Jens Dittrih the dte of reeipt nd eptne should e

More information

1 GSW IPv4 Addressing

1 GSW IPv4 Addressing 1 For s long s I ve een working with the Internet protools, people hve een sying tht IPv6 will e repling IPv4 in ouple of yers time. While this remins true, it s worth knowing out IPv4 ddresses. Even when

More information

Innovation in Software Development Process by Introducing Toyota Production System

Innovation in Software Development Process by Introducing Toyota Production System Innovtion in Softwre Development Proess y Introduing Toyot Prodution System V Koihi Furugki V Tooru Tkgi V Akinori Skt V Disuke Okym (Mnusript reeived June 1, 2006) Fujitsu Softwre Tehnologies (formerly

More information

Inter-domain Routing

Inter-domain Routing COMP 631: COMPUTER NETWORKS Inter-domin Routing Jsleen Kur Fll 2014 1 Internet-sle Routing: Approhes DV nd link-stte protools do not sle to glol Internet How to mke routing slle? Exploit the notion of

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1 SE3BB4: Softwre Design III Conurrent System Design Winter 2011 Smple Solutions to Assignment 1 Eh question is worth 10pts. Totl of this ssignment is 70pts. Eh ssignment is worth 9%. If you think your solution

More information

European Convention on Products Liability in regard to Personal Injury and Death

European Convention on Products Liability in regard to Personal Injury and Death Europen Trety Series - No. 91 Europen Convention on Produts Liility in regrd to Personl Injury nd Deth Strsourg, 27.I.1977 The memer Sttes of the Counil of Europe, signtory hereto, Considering tht the

More information

The remaining two sides of the right triangle are called the legs of the right triangle.

The remaining two sides of the right triangle are called the legs of the right triangle. 10 MODULE 6. RADICAL EXPRESSIONS 6 Pythgoren Theorem The Pythgoren Theorem An ngle tht mesures 90 degrees is lled right ngle. If one of the ngles of tringle is right ngle, then the tringle is lled right

More information

Review. Scan Conversion. Rasterizing Polygons. Rasterizing Polygons. Triangularization. Convex Shapes. Utah School of Computing Spring 2013

Review. Scan Conversion. Rasterizing Polygons. Rasterizing Polygons. Triangularization. Convex Shapes. Utah School of Computing Spring 2013 Uth Shool of Computing Spring 2013 Review Leture Set 4 Sn Conversion CS5600 Computer Grphis Spring 2013 Line rsteriztion Bsi Inrementl Algorithm Digitl Differentil Anlzer Rther thn solve line eqution t

More information

Multi-level Visualization of Concurrent and Distributed Computation in Erlang

Multi-level Visualization of Concurrent and Distributed Computation in Erlang Multi-level Visuliztion of Conurrent nd Distriuted Computtion in Erlng Roert Bker r440@kent..uk Peter Rodgers P.J.Rodgers@kent..uk Simon Thompson S.J.Thompson@kent..uk Huiqing Li H.Li@kent..uk Astrt This

More information

European Convention on Social and Medical Assistance

European Convention on Social and Medical Assistance Europen Convention on Soil nd Medil Assistne Pris, 11.XII.1953 Europen Trety Series - No. 14 The governments signtory hereto, eing memers of the Counil of Europe, Considering tht the im of the Counil of

More information

control policies to be declared over by associating security

control policies to be declared over by associating security Seure XML Querying with Seurity Views Wenfei Fn University of Edinurgh & Bell Lortories wenfei@infeduk Chee-Yong Chn Ntionl University of Singpore hny@ompnusedusg Minos Groflkis Bell Lortories minos@reserhell-lsom

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Analysis of Algorithms and Data Structures for Text Indexing Moritz G. Maaß

Analysis of Algorithms and Data Structures for Text Indexing Moritz G. Maaß FAKULTÄT FÜR INFORMATIK TECHNISCHE UNIVERSITÄT MÜNCHEN Lehrstuhl für Effiziente Algorithmen Anlysis of Algorithms nd Dt Strutures for Text Indexing Moritz G. Mß FAKULTÄT FÜR INFORMATIK TECHNISCHE UNIVERSITÄT

More information

THE LONGITUDINAL FIELD IN THE GTEM 1750 AND THE NATURE OF THE TERMINATION.

THE LONGITUDINAL FIELD IN THE GTEM 1750 AND THE NATURE OF THE TERMINATION. THE LONGITUDINAL FIELD IN THE GTEM 175 AND THE NATURE OF THE TERMINATION. Benjmin Guy Loder Ntionl Physil Lbortory, Queens Rod, Teddington, Middlesex, Englnd. TW11 LW Mrtin Alexnder Ntionl Physil Lbortory,

More information

Maximum area of polygon

Maximum area of polygon Mimum re of polygon Suppose I give you n stiks. They might e of ifferent lengths, or the sme length, or some the sme s others, et. Now there re lots of polygons you n form with those stiks. Your jo is

More information

VMware Horizon FLEX Administration Guide

VMware Horizon FLEX Administration Guide VMwre Horizon FLEX Administrtion Guide Horizon FLEX 1.1 This doument supports the version of eh produt listed nd supports ll susequent versions until the doument is repled y new edition. To hek for more

More information

Morgan Stanley Ad Hoc Reporting Guide

Morgan Stanley Ad Hoc Reporting Guide spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd

More information

Practice Test 2. a. 12 kn b. 17 kn c. 13 kn d. 5.0 kn e. 49 kn

Practice Test 2. a. 12 kn b. 17 kn c. 13 kn d. 5.0 kn e. 49 kn Prtie Test 2 1. A highwy urve hs rdius of 0.14 km nd is unnked. A r weighing 12 kn goes round the urve t speed of 24 m/s without slipping. Wht is the mgnitude of the horizontl fore of the rod on the r?

More information

BUSINESS PROCESS MODEL TRANSFORMATION ISSUES The top 7 adversaries encountered at defining model transformations

BUSINESS PROCESS MODEL TRANSFORMATION ISSUES The top 7 adversaries encountered at defining model transformations USINESS PROCESS MODEL TRANSFORMATION ISSUES The top 7 dversries enountered t defining model trnsformtions Mrion Murzek Women s Postgrdute College for Internet Tehnologies (WIT), Institute of Softwre Tehnology

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

VMware Horizon FLEX Administration Guide

VMware Horizon FLEX Administration Guide VMwre Horizon FLEX Administrtion Guide Horizon FLEX 1.0 This doument supports the version of eh produt listed nd supports ll susequent versions until the doument is repled y new edition. To hek for more

More information

PUBLIC-TRANSIT VEHICLE SCHEDULES USING A MINIMUM CREW-COST APPROACH

PUBLIC-TRANSIT VEHICLE SCHEDULES USING A MINIMUM CREW-COST APPROACH TOTAL LOGISTIC MANAGEMENT No. PP. Avishi CEDER PUBLIC-TRANSIT VEHICLE SCHEDULES USING A MINIMUM CREW-COST APPROACH Astrt: Commonly, puli trnsit genies, with view towrd effiieny, im t minimizing the numer

More information

p-q Theory Power Components Calculations

p-q Theory Power Components Calculations ISIE 23 - IEEE Interntionl Symposium on Industril Eletronis Rio de Jneiro, Brsil, 9-11 Junho de 23, ISBN: -783-7912-8 p-q Theory Power Components Clultions João L. Afonso, Memer, IEEE, M. J. Sepúlved Freits,

More information

Calculating Principal Strains using a Rectangular Strain Gage Rosette

Calculating Principal Strains using a Rectangular Strain Gage Rosette Clulting Prinipl Strins using Retngulr Strin Gge Rosette Strin gge rosettes re used often in engineering prtie to determine strin sttes t speifi points on struture. Figure illustrtes three ommonly used

More information

Angles 2.1. Exercise 2.1... Find the size of the lettered angles. Give reasons for your answers. a) b) c) Example

Angles 2.1. Exercise 2.1... Find the size of the lettered angles. Give reasons for your answers. a) b) c) Example 2.1 Angles Reognise lternte n orresponing ngles Key wors prllel lternte orresponing vertilly opposite Rememer, prllel lines re stright lines whih never meet or ross. The rrows show tht the lines re prllel

More information

c b 5.00 10 5 N/m 2 (0.120 m 3 0.200 m 3 ), = 4.00 10 4 J. W total = W a b + W b c 2.00

c b 5.00 10 5 N/m 2 (0.120 m 3 0.200 m 3 ), = 4.00 10 4 J. W total = W a b + W b c 2.00 Chter 19, exmle rolems: (19.06) A gs undergoes two roesses. First: onstnt volume @ 0.200 m 3, isohori. Pressure inreses from 2.00 10 5 P to 5.00 10 5 P. Seond: Constnt ressure @ 5.00 10 5 P, isori. olume

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

SOLVING EQUATIONS BY FACTORING

SOLVING EQUATIONS BY FACTORING 316 (5-60) Chpter 5 Exponents nd Polynomils 5.9 SOLVING EQUATIONS BY FACTORING In this setion The Zero Ftor Property Applitions helpful hint Note tht the zero ftor property is our seond exmple of getting

More information

GENERAL OPERATING PRINCIPLES

GENERAL OPERATING PRINCIPLES KEYSECUREPC USER MANUAL N.B.: PRIOR TO READING THIS MANUAL, YOU ARE ADVISED TO READ THE FOLLOWING MANUAL: GENERAL OPERATING PRINCIPLES Der Customer, KeySeurePC is n innovtive prout tht uses ptente tehnology:

More information

Using CrowdSourcing for Data Analytics

Using CrowdSourcing for Data Analytics Using CrowdSouring for Dt Anlytis Hetor Gri-Molin (work with Steven Whng, Peter Lofgren, Adity Prmeswrn nd others) Stnford University 1 Big Dt Anlytis CrowdSouring 1 CrowdSouring 3 Rel World Exmples Ctegorizing

More information

Scalable Mining of Large Disk-based Graph Databases

Scalable Mining of Large Disk-based Graph Databases Sclle Mining of Lrge Disk-sed Grph Dtses Chen Wng Wei Wng Jin Pei Yongti Zhu Bile Shi Fudn University, Chin, {chenwng, weiwng1, 2465, shi}@fudn.edu.cn Stte University of New York t Bufflo, USA & Simon

More information

A System Context-Aware Approach for Battery Lifetime Prediction in Smart Phones

A System Context-Aware Approach for Battery Lifetime Prediction in Smart Phones A System Context-Awre Approh for Bttery Lifetime Predition in Smrt Phones Xi Zho, Yo Guo, Qing Feng, nd Xingqun Chen Key Lbortory of High Confidene Softwre Tehnologies (Ministry of Edution) Shool of Eletronis

More information

The Cat in the Hat. by Dr. Seuss. A a. B b. A a. Rich Vocabulary. Learning Ab Rhyming

The Cat in the Hat. by Dr. Seuss. A a. B b. A a. Rich Vocabulary. Learning Ab Rhyming MINI-LESSON IN TION The t in the Ht y Dr. Seuss Rih Voulry tme dj. esy to hndle (not wild) LERNING Lerning Rhyming OUT Words I know it is wet nd the sun is not sunny. ut we n hve Lots of good fun tht is

More information

1 Fractions from an advanced point of view

1 Fractions from an advanced point of view 1 Frtions from n vne point of view We re going to stuy frtions from the viewpoint of moern lger, or strt lger. Our gol is to evelop eeper unerstning of wht n men. One onsequene of our eeper unerstning

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

SOLVING QUADRATIC EQUATIONS BY FACTORING

SOLVING QUADRATIC EQUATIONS BY FACTORING 6.6 Solving Qudrti Equtions y Ftoring (6 31) 307 In this setion The Zero Ftor Property Applitions 6.6 SOLVING QUADRATIC EQUATIONS BY FACTORING The tehniques of ftoring n e used to solve equtions involving

More information

How To Balance Power In A Distribution System

How To Balance Power In A Distribution System NTERNATONA JOURNA OF ENERG, ssue 3, ol., 7 A dynmilly S bsed ompt ontrol lgorithm for lod blning in distribution systems A. Kzemi, A. Mordi Koohi nd R. Rezeipour Abstrt An lgorithm for pplying fixed pitor-thyristorontrolled

More information

Architecture and Data Flows Reference Guide

Architecture and Data Flows Reference Guide Arhiteture nd Dt Flows Referene Guide BES12 Version 12.3 Pulished: 2015-10-14 SWD-20151014125318579 Contents Aout this guide... 5 Arhiteture: BES12 EMM solution... 6 Components used to mnge BlkBerry 10,

More information

Simulation of a large electric distribution system having intensive harmonics in the industrial zone of Konya

Simulation of a large electric distribution system having intensive harmonics in the industrial zone of Konya Turkish Journl of Eletril Engineering & omputer Sienes http:// journls. tuitk. gov. tr/ elektrik/ Reserh rtile Turk J Ele Eng & omp Si (2013) 21: 934 944 TÜİTK doi:10.3906/elk-1201-55 Simultion of lrge

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

SECTION 7-2 Law of Cosines

SECTION 7-2 Law of Cosines 516 7 Additionl Topis in Trigonometry h d sin s () tn h h d 50. Surveying. The lyout in the figure t right is used to determine n inessile height h when seline d in plne perpendiulr to h n e estlished

More information

Orthodontic marketing through social media networks: The patient and practitioner s perspective

Orthodontic marketing through social media networks: The patient and practitioner s perspective Originl rtile Orthodonti mrketing through soil medi networks: The ptient nd prtitioner s perspetive Kristin L. Nelson ; Bhvn Shroff ; l M. Best ; Steven J. Linduer d BSTRCT Ojetive: To (1) ssess orthodonti

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

the machine and check the components Black Yellow Cyan Magenta Starter Ink Cartridges Product Registration Sheet (USA only)

the machine and check the components Black Yellow Cyan Magenta Starter Ink Cartridges Product Registration Sheet (USA only) Quik Setup Guide Strt Here DCP-J140W Thnk you for hoosing Brother, your support is importnt to us nd we vlue your usiness. Your Brother produt is engineered nd mnuftured to the highest stndrds to deliver

More information

Lesson 2.1 Inductive Reasoning

Lesson 2.1 Inductive Reasoning Lesson.1 Inutive Resoning Nme Perio Dte For Eerises 1 7, use inutive resoning to fin the net two terms in eh sequene. 1. 4, 8, 1, 16,,. 400, 00, 100, 0,,,. 1 8, 7, 1, 4,, 4.,,, 1, 1, 0,,. 60, 180, 10,

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

The art of Paperarchitecture (PA). MANUAL

The art of Paperarchitecture (PA). MANUAL The rt of Pperrhiteture (PA). MANUAL Introution Pperrhiteture (PA) is the rt of reting three-imensionl (3D) ojets out of plin piee of pper or ror. At first, esign is rwn (mnully or printe (using grphil

More information

ORGANIZER QUICK START GUIDE

ORGANIZER QUICK START GUIDE NOTES ON USING GOTOWEBINAR GoToWeinr orgnizers my hol Weinrs for up to 1,000 ttenees. The Weinr proess n e roken into three stges: Weinr Plnning, Weinr Presenttion n Weinr Follow-up. Orgnizers nee to first

More information

Basic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n)

Basic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n) BRICS Bsic Reserch in Computer Science BRICS RS-02-13 Brodl et l.: Solving the String Sttistics Prolem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl Rune

More information

A Language-Neutral Representation of Temporal Information

A Language-Neutral Representation of Temporal Information A Lnguge-Neutrl Representtion of Temporl Informtion Rihrd Cmpell*, Tkko Aikw, Zixin Jing, Crmen Lozno, Mite Melero nd Andi Wu Mirosoft Reserh One Mirosoft Wy, Redmond, WA 98052 USA {rihmp, tkko, jingz,

More information

End of term: TEST A. Year 4. Name Class Date. Complete the missing numbers in the sequences below.

End of term: TEST A. Year 4. Name Class Date. Complete the missing numbers in the sequences below. End of term: TEST A You will need penil nd ruler. Yer Nme Clss Dte Complete the missing numers in the sequenes elow. 8 30 3 28 2 9 25 00 75 25 2 Put irle round ll of the following shpes whih hve 3 shded.

More information

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn 33337_0P03.qp 2/27/06 24 9:3 AM Chpter P Pge 24 Prerequisites P.3 Polynomils nd Fctoring Wht you should lern Polynomils An lgeric epression is collection of vriles nd rel numers. The most common type of

More information

LISTENING COMPREHENSION

LISTENING COMPREHENSION PORG, přijímí zkoušky 2015 Angličtin B Reg. číslo: Inluded prts: Points (per prt) Points (totl) 1) Listening omprehension 2) Reding 3) Use of English 4) Writing 1 5) Writing 2 There re no extr nswersheets

More information

Cell Breathing Techniques for Load Balancing in Wireless LANs

Cell Breathing Techniques for Load Balancing in Wireless LANs 1 Cell rething Tehniques for Lod lning in Wireless LANs Yigl ejerno nd Seung-Je Hn ell Lortories, Luent Tehnologies Astrt: Mximizing the network throughput while providing firness is one of the key hllenges

More information

MATH PLACEMENT REVIEW GUIDE

MATH PLACEMENT REVIEW GUIDE MATH PLACEMENT REVIEW GUIDE This guie is intene s fous for your review efore tking the plement test. The questions presente here my not e on the plement test. Although si skills lultor is provie for your

More information

RTL Power Optimization with Gate-level Accuracy

RTL Power Optimization with Gate-level Accuracy RTL Power Optimiztion with Gte-level Accurcy Qi Wng Cdence Design Systems, Inc Sumit Roy Clypto Design Systems, Inc 555 River Oks Prkwy, Sn Jose 95125 2903 Bunker Hill Lne, Suite 208, SntClr 95054 qwng@cdence.com

More information

DiaGen: A Generator for Diagram Editors Based on a Hypergraph Model

DiaGen: A Generator for Diagram Editors Based on a Hypergraph Model DiGen: A Genertor for Digrm Eitors Bse on Hypergrph Moel G. Viehstet M. Mins Lehrstuhl für Progrmmiersprhen Universität Erlngen-Nürnerg Mrtensstr. 3, 91058 Erlngen, Germny Emil: fviehste,minsg@informtik.uni-erlngen.e

More information

Ratio and Proportion

Ratio and Proportion Rtio nd Proportion Rtio: The onept of rtio ours frequently nd in wide vriety of wys For exmple: A newspper reports tht the rtio of Repulins to Demorts on ertin Congressionl ommittee is 3 to The student/fulty

More information

TOA RANGATIRA TRUST. Deed of Trust 3714386.2

TOA RANGATIRA TRUST. Deed of Trust 3714386.2 TOA RANGATIRA TRUST Deed of Trust 1 Deed dted 2011 Prties 1 Te Runng o To Rngtir Inorported n inorported soiety hving its registered offie t Poriru (the Runng ) Bkground A B C D The Runng is n inorported

More information

Forensic Engineering Techniques for VLSI CAD Tools

Forensic Engineering Techniques for VLSI CAD Tools Forensi Engineering Tehniques for VLSI CAD Tools Jennifer L. Wong, Drko Kirovski, Dvi Liu, Miorg Potkonjk UCLA Computer Siene Deprtment University of Cliforni, Los Angeles June 8, 2000 Computtionl Forensi

More information

Unit 6: Exponents and Radicals

Unit 6: Exponents and Radicals Eponents nd Rdicls -: The Rel Numer Sstem Unit : Eponents nd Rdicls Pure Mth 0 Notes Nturl Numers (N): - counting numers. {,,,,, } Whole Numers (W): - counting numers with 0. {0,,,,,, } Integers (I): -

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

Learning Subregular Classes of Languages with Factored Deterministic Automata

Learning Subregular Classes of Languages with Factored Deterministic Automata Lerning Suregulr Clsses of Lnguges with Ftored Deterministi Automt Jeffrey Heinz Dept. of Linguistis nd Cognitive Siene University of Delwre heinz@udel.edu Jmes Rogers Dept. of Computer Siene Erlhm College

More information

Data Quality Certification Program Administrator In-Person Session Homework Workbook 2015-2016

Data Quality Certification Program Administrator In-Person Session Homework Workbook 2015-2016 Dt Qulity Certifition Progrm Aministrtor In-Person Session Homework Workook 2015-2016 Plese Note: Version 1.00: Pulishe 9-1-2015 Any exerises tht my e upte fter this printing n e foun online in the DQC

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

Concept Formation Using Graph Grammars

Concept Formation Using Graph Grammars Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

JCM TRAINING OVERVIEW Multi-Download Module 2

JCM TRAINING OVERVIEW Multi-Download Module 2 Multi-Downlo Moule 2 JCM Trining Overview Mrh, 2012 Mrh, 2012 CLOSING THE MDM2 APPLICATION To lose the MDM2 Applition proee s follows: 1. Mouse-lik on the 'File' pullown Menu (See Figure 35 ) on the MDM2

More information

Seeking Equilibrium: Demand and Supply

Seeking Equilibrium: Demand and Supply SECTION 1 Seeking Equilirium: Demnd nd Supply OBJECTIVES KEY TERMS TAKING NOTES In Setion 1, you will explore mrket equilirium nd see how it is rehed explin how demnd nd supply intert to determine equilirium

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Fundamentals of Cellular Networks

Fundamentals of Cellular Networks Fundmentls of ellulr Networks Dvid Tipper Assoite Professor Grdute Progrm in Teleommunitions nd Networking University of Pittsburgh Slides 4 Telom 2720 ellulr onept Proposed by ell Lbs 97 Geogrphi Servie

More information

New Internet Radio Feature

New Internet Radio Feature XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry

More information

Solving the String Statistics Problem in Time O(n log n)

Solving the String Statistics Problem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl 1,,, Rune B. Lyngsø 3, Ann Östlin1,, nd Christin N. S. Pedersen 1,2, 1 BRICS, Deprtment of Computer Science, University of Arhus,

More information

Before you can use the machine, please read this Quick Setup Guide for the correct setup and installation.

Before you can use the machine, please read this Quick Setup Guide for the correct setup and installation. Quik Setup Guide Strt Here DCP-365CN DCP-373CW DCP-375CW DCP-377CW Before you n use the mhine, plese red this Quik Setup Guide for the orret setup nd instlltion. WARNING CAUTION Wrnings tell you wht to

More information

Start Here. Quick Setup Guide. the machine and check the components DCP-9020CDW

Start Here. Quick Setup Guide. the machine and check the components DCP-9020CDW Quik Setup Guide Strt Here DCP-9020CDW Plese red the Produt Sfety Guide first, then red this Quik Setup Guide for the orret setup nd instlltion proedure. To view the Quik Setup Guide in other lnguges,

More information

IaaS Configuration for Virtual Platforms

IaaS Configuration for Virtual Platforms IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To

More information