Constraint-satisfaction search
|
|
- Brent Evans
- 7 years ago
- Views:
Transcription
1 Lecture 6 onstraint-satisfaction search Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square Search problem search problem: Search space (or state space): a set of objects among which we conduct the search; Initial state: an object we start to search from; Operators (actions): transform one state in the search space to the other; Goal condition: describes the object we search for Possible metric on a search space: measures the quality of the object with regard to the goal Search problems occur in planning optimizations learning
2 onstraint satisfaction problem (SP) onstraint satisfaction problem (SP) is a configuration search problem where: state is defined by a set of variables Goal condition is represented by a set constraints on possible variable values Special properties of the SP allow more specific procedures to be designed and applied for solving them ample of a SP: N-queens Goal: n queens placed in non-attacking positions on the board Variables: Represent queens one for each column: Q1 Q Q3 Q Values: Row placement of each queen on the board {1 3 } Q1 = Q = onstraints: Qi Q j Q Q i j i j Two queens not in the same row Two queens not on the same diagonal
3 Satisfiability (ST) problem etermine whether a sentence in the conjunctive normal form (N) is satisfiable (can evaluate to true) Used in the propositional logic (covered later) ( P Q R) ( P R S ) ( P Q T )K Variables: Propositional symbols (P R T S) Values: True alse onstraints: very conjunct must evaluate to true at least one of the literals must evaluate to true ( P Q R) True ( P R S ) True K Other real world SP problems Scheduling problems:.g. telescope scheduling High-school class schedule esign problems: Hardware configurations VLSI design More comple problems may involve: real-valued variables additional preferences on variable assignments the optimal configuration is sought
4 Map coloring olor a map using k different colors such that no adjacent countries have the same color Variables:? Variable values:? onstraints:? Map coloring olor a map using k different colors such that no adjacent countries have the same color Variables: Represent countries Values: K -different colors {Red lue Green..} onstraints:?
5 Map coloring olor a map using k different colors such that no adjacent countries have the same color Variables: Represent countries Values: K -different colors {Red lue Green..} onstraints: etc n eample of a problem with binary constraints onstraint satisfaction as a search problem ormulation of a SP as a search problem: States. ssignments(partial complete) of values to variables. Initial state. No variable is assigned a value. Operators. ssign a value to one of the unassigned variables. Goal condition. ll variables are assigned no constraints are violated. onstraints can be represented: plicitly by a set of allowable values Implicitly by a function that tests for the satisfaction of constraints
6 Solving SP as a standard search Unassigned: Q Q Q Q ssigned: 1 3 Unassigned: Q Q Q3 ssigned: Q 1 = 1 Unassigned: Q Q Q3 ssigned: Q 1 = Unassigned: ssigned: Q Q Q 3 = Q 1 = Solving a SP through standard search Maimum depth of the tree (m):? epth of the solution (d) :? ranching factor (b) :? Unassigned: Q Q Q Q ssigned: 1 3 Unassigned: Q Q3 Q ssigned: Q = 1 1 Unassigned: Q Q Q3 ssigned: Q = 1 Unassigned: Q 3 Q ssigned: Q = Q 1 =
7 Solving a SP through standard search Maimum depth of the tree: Number of variables of the SP epth of the solution: Number of variables of the SP ranching factor: if we fi the order of variable assignments the branch factor depends on the number of their values Unassigned: Q Q Q Q ssigned: 1 3 Unassigned: Q Q3 Q ssigned: Q = 1 1 Unassigned: Q Q Q3 ssigned: Q = 1 Unassigned: ssigned: Q Q Q 3 = Q 1 = Solving a SP through standard search What search algorithm to use:? epth of the tree = epth of the solution=number of vars Unassigned: Q Q Q Q ssigned: 1 3 Unassigned: Q Q3 Q ssigned: Q = 1 1 Unassigned: Q Q Q3 ssigned: Q = 1 Unassigned: Q 3 Q ssigned: Q = Q 1 =
8 Solving a SP through standard search What search algorithm to use: epth first search Since we know the depth of the solution S in contet of SP is also referred to as backtracking Unassigned: Q Q Q Q ssigned: 1 3 Unassigned: Q Q3 Q ssigned: Q = 1 1 Unassigned: Q Q Q3 ssigned: Q = 1 Unassigned: ssigned: Q Q Q 3 = Q 1 = hecking constraint consistency The violation of constraints needs to be checked for each node either during its generation or before its epansion onsistency of constraints: urrent variable assignments together with constraints restrict remaining legal values of unassigned variables; The remaining legal and illegal values of variables may be inferred (effect of constraints propagates) To prevent blind search space eploration it is necessary to keep track of the remaining legal values so we know when the constraints are violated and when to terminate the search
9 onstraint propagation state (more broadly) is defined by a set of variables and their legal and illegal assignments Legal and illegal assignments can be represented through variable equations and variable disequations ample: map coloring quation = Red isequation Red onstraints + assignments can entail new equations and disequations = Red Red onstraint propagation: the process of inferring of new equations and disequations from eisting equations and disequations onstraint propagation ssign - equations - disequations
10 onstraint propagation ssign = - equations - disequations onstraint propagation ssign =lue =lue
11 onstraint propagation ssign =lue =? =lue onstraint propagation ssign =Green =Green =lue
12 onstraint propagation ssign =Green =Green =? =lue onstraint propagation ssign =Green =Green =? =lue onflict!!! No legal assignments available for and
13 onstraint propagation We can derive remaining legal values through propagation =Green =Green =? =? =lue onstraint propagation We can derive remaining legal values through propagation =? =? =lue =? =Green =Green =Red
14 onstraint propagation We can derive remaining legal values through propagation =lue =Green =Green =Red =Green =Green =Red onstraint propagation Three known techniques for propagating the effects of past assignments and constraints: Value propagation rc consistency orward checking ifference: ompleteness of inferences Time compleity of inferences.
15 onstraint propagation 1. Value propagation. Infers: equations from the set of equations defining the partial assignment and a constraint. rc consistency. Infers: disequations from the set of equations and disequations defining the partial assignment and a constraint equations through the ehaustion of alternatives 3. orward checking. Infers: disequations from a set of equations defining the partial assignment and a constraint quations through the ehaustion of alternatives Restricted forward checking: uses only active constraints (active constraint only one variable unassigned in the constraint) Value propagation: analysis Value propagation. Infers: equations from the set of equations defining the partial assignment and a constraint Procedure: t every step after a new variable gets assigned a value we check if a constrain does not imply a new equation on yet to be assigned variable. set of equations may be inferred
16 orward checking: analysis orward checking. Infers: disequations from a set of equations defining the partial assignment and a constraint quations through the ehaustion of alternatives Procedure: t every step after a new variable gets assigned a value (a new equation is created) we check a constraint if it does not imply a new disequation on yet to be assigned variable. fter all possible disequations are derived we check if a new equation is not implied by a set of disequations nd repeat till no new derivations can be made set of disequations and equations may be inferred rc consistency: analysis rc consistency. Infers: disequations from the set of equations and disequations defining the partial assignment and a constraint equations through the ehaustion of alternatives Procedure: t every step after a new equation or a disequation is generated we need to check constraints if a new disequation is not implied on yet to be assigned variable. fter all possible disequations are derived we check if a new equation is not implied by a set of disequations. nd repeat till no new derivations are possible set of disequations and equations may be inferred
17 Heuristics for SPs acktracking searches the space in the depth-first manner. ut we still can choose: Which variable to assign net? Which value to choose first? Heuristics Most constrained variable Which variable is likely to become a bottleneck? Least constraining value Which value gives us more fleibility later? amples: map coloring Heuristics for SP Heuristics Most constrained variable ountry is the most constrained one (cannot use Red Green) Least constraining value ssume we have chosen variable Red is the least constraining valid color for the future
Smart Graphics: Methoden 3 Suche, Constraints
Smart Graphics: Methoden 3 Suche, Constraints Vorlesung Smart Graphics LMU München Medieninformatik Butz/Boring Smart Graphics SS2007 Methoden: Suche 2 Folie 1 Themen heute Suchverfahren Hillclimbing Simulated
More informationSatisfiability Checking
Satisfiability Checking SAT-Solving Prof. Dr. Erika Ábrahám Theory of Hybrid Systems Informatik 2 WS 10/11 Prof. Dr. Erika Ábrahám - Satisfiability Checking 1 / 40 A basic SAT algorithm Assume the CNF
More informationToday s topic: So far, we have talked about. Question. Task models
Overall Stucture of Real Time Systems So far, we have talked about Task...... Task n Programming Languages to implement the Tasks Run-TIme/Operating Systems to run the Tasks RTOS/Run-Time System Hardware
More informationY. Xiang, Constraint Satisfaction Problems
Constraint Satisfaction Problems Objectives Constraint satisfaction problems Backtracking Iterative improvement Constraint propagation Reference Russell & Norvig: Chapter 5. 1 Constraints Constraints are
More informationo Graph an expression as a function of the chosen independent variable to determine the existence of a minimum or maximum
Two Parabolas Time required 90 minutes Teaching Goals:. Students interpret the given word problem and complete geometric constructions according to the condition of the problem.. Students choose an independent
More informationResources, process calculi and Godel-Dummett logics
Resources, process calculi and Godel-Dummett logics Dominique Larchey LORIA { CNRS Nancy, France 1 Gödel-Dummett logics LC Most studied intermediate logic IL LC CL Proof theory, proof-search IL (Dyckho
More informationOptimizing Description Logic Subsumption
Topics in Knowledge Representation and Reasoning Optimizing Description Logic Subsumption Maryam Fazel-Zarandi Company Department of Computer Science University of Toronto Outline Introduction Optimization
More informationDistributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks
Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed shf_ibrahim@yahoo.com Khaled M. F. Elsayed, senior member IEEE khaled@ieee.org Department
More informationTraditional Conjoint Analysis with Excel
hapter 8 Traditional onjoint nalysis with Excel traditional conjoint analysis may be thought of as a multiple regression problem. The respondent s ratings for the product concepts are observations on the
More informationCS510 Software Engineering
CS510 Software Engineering Propositional Logic Asst. Prof. Mathias Payer Department of Computer Science Purdue University TA: Scott A. Carr Slides inspired by Xiangyu Zhang http://nebelwelt.net/teaching/15-cs510-se
More informationSudoku puzzles and how to solve them
Sudoku puzzles and how to solve them Andries E. Brouwer 2006-05-31 1 Sudoku Figure 1: Two puzzles the second one is difficult A Sudoku puzzle (of classical type ) consists of a 9-by-9 matrix partitioned
More informationRoots of equation fx are the values of x which satisfy the above expression. Also referred to as the zeros of an equation
LECTURE 20 SOLVING FOR ROOTS OF NONLINEAR EQUATIONS Consider the equation f = 0 Roots of equation f are the values of which satisfy the above epression. Also referred to as the zeros of an equation f()
More informationUniversity of Potsdam Faculty of Computer Science. Clause Learning in SAT Seminar Automatic Problem Solving WS 2005/06
University of Potsdam Faculty of Computer Science Clause Learning in SAT Seminar Automatic Problem Solving WS 2005/06 Authors: Richard Tichy, Thomas Glase Date: 25th April 2006 Contents 1 Introduction
More informationZachary Monaco Georgia College Olympic Coloring: Go For The Gold
Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Coloring the vertices or edges of a graph leads to a variety of interesting applications in graph theory These applications include various
More informationChecking for Dimensional Correctness in Physics Equations
Checking for Dimensional Correctness in Physics Equations C.W. Liew Department of Computer Science Lafayette College liew@cs.lafayette.edu D.E. Smith Department of Computer Science Rutgers University dsmith@cs.rutgers.edu
More informationDecision making in the presence of uncertainty II
CS 274 Knowledge representation Lecture 23 Decision making in the presence of uncertainty II Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Information-gathering actions Many actions and their
More informationResources Management
Resources Management. Introduction s we have seen in network scheduling, the basic inputs to criticalpath analysis are the individual project activities, their durations, and their dependency relationships.
More informationA Tool for Generating Partition Schedules of Multiprocessor Systems
A Tool for Generating Partition Schedules of Multiprocessor Systems Hans-Joachim Goltz and Norbert Pieth Fraunhofer FIRST, Berlin, Germany {hans-joachim.goltz,nobert.pieth}@first.fraunhofer.de Abstract.
More informationD1.1 Service Discovery system: Load balancing mechanisms
D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction
More informationMathematics More Visual Using Algebra Tiles
www.cpm.org Chris Mikles CPM Educational Program A California Non-profit Corporation 33 Noonan Drive Sacramento, CA 958 (888) 808-76 fa: (08) 777-8605 email: mikles@cpm.org An Eemplary Mathematics Program
More informationScheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
More informationUPnP Logo Usage Guidelines 2016 Open Interconnect Consortium, Inc. All rights reserved. UPnP Logo Usage Guidelines
UPnP Logo Usage Guidelines Prepared by Updated January 2016 1 Legal Disclaimer LEGAL DISCLAIMER: NOTHING CONTAINED IN THIS DOCUMENT SHALL BE DEEMED AS GRANTING YOU ANY KIND OF LICENSE IN ITS CONTENT, EITHER
More informationA search based Sudoku solver
A search based Sudoku solver Tristan Cazenave Labo IA Dept. Informatique Université Paris 8, 93526, Saint-Denis, France, cazenave@ai.univ-paris8.fr Abstract. Sudoku is a popular puzzle. In this paper we
More informationSudoku as a SAT Problem
Sudoku as a SAT Problem Inês Lynce IST/INESC-ID, Technical University of Lisbon, Portugal ines@sat.inesc-id.pt Joël Ouaknine Oxford University Computing Laboratory, UK joel@comlab.ox.ac.uk Abstract Sudoku
More informationIntroduction Solvability Rules Computer Solution Implementation. Connect Four. March 9, 2010. Connect Four
March 9, 2010 is a tic-tac-toe like game in which two players drop discs into a 7x6 board. The first player to get four in a row (either vertically, horizontally, or diagonally) wins. The game was first
More informationSingle machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q...
Lecture 4 Scheduling 1 Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max structure of a schedule 0 Q 1100 11 00 11 000 111 0 0 1 1 00 11 00 11 00
More informationUSING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE
USING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE Keith Brandt, Kevin R. Burger, Jason Downing, Stuart Kilzer Mathematics, Computer Science, and Physics Rockhurst University, 1100 Rockhurst Road,
More informationLab 4: 26 th March 2012. Exercise 1: Evolutionary algorithms
Lab 4: 26 th March 2012 Exercise 1: Evolutionary algorithms 1. Found a problem where EAs would certainly perform very poorly compared to alternative approaches. Explain why. Suppose that we want to find
More informationCourse Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015
Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students
More informationIntegrating Benders decomposition within Constraint Programming
Integrating Benders decomposition within Constraint Programming Hadrien Cambazard, Narendra Jussien email: {hcambaza,jussien}@emn.fr École des Mines de Nantes, LINA CNRS FRE 2729 4 rue Alfred Kastler BP
More informationOutline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
More informationIntegration of ACO in a Constraint Programming Language
Integration of ACO in a Constraint Programming Language Madjid Khichane 12, Patrick Albert 1, and Christine Solnon 2 1 ILOG 2 LIRIS, UMR 5205 CNRS / University of Lyon ANTS 08 Motivations Ant Colony Optimization
More information6. Cholesky factorization
6. Cholesky factorization EE103 (Fall 2011-12) triangular matrices forward and backward substitution the Cholesky factorization solving Ax = b with A positive definite inverse of a positive definite matrix
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationEXAM. Exam #3. Math 1430, Spring 2002. April 21, 2001 ANSWERS
EXAM Exam #3 Math 1430, Spring 2002 April 21, 2001 ANSWERS i 60 pts. Problem 1. A city has two newspapers, the Gazette and the Journal. In a survey of 1, 200 residents, 500 read the Journal, 700 read the
More informationSPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING
AAS 07-228 SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING INTRODUCTION James G. Miller * Two historical uncorrelated track (UCT) processing approaches have been employed using general perturbations
More informationEnumerating possible Sudoku grids
Enumerating possible Sudoku grids Bertram Felgenhauer Department of Computer Science TU Dresden 00 Dresden Germany bf@mail.inf.tu-dresden.de Frazer Jarvis Department of Pure Mathematics University of Sheffield,
More informationBOOLEAN ALGEBRA & LOGIC GATES
BOOLEAN ALGEBRA & LOGIC GATES Logic gates are electronic circuits that can be used to implement the most elementary logic expressions, also known as Boolean expressions. The logic gate is the most basic
More informationConstrained Clustering of Territories in the Context of Car Insurance
Constrained Clustering of Territories in the Context of Car Insurance Samuel Perreault Jean-Philippe Le Cavalier Laval University July 2014 Perreault & Le Cavalier (ULaval) Constrained Clustering July
More informationProject Scheduling. Introduction
Project Scheduling Introduction In chapter, the O and ON networks were presented, also the time and cost of individual activities based were calculated. Yet, however, we do not know how long is the total
More informationBM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
More informationMinerva Access is the Institutional Repository of The University of Melbourne
Minerva Access is the Institutional Repository of The University of Melbourne Author/s: Chu, Geoffrey G. Title: Improving combinatorial optimization Date: 2011 Citation: Chu, G. G. (2011). Improving combinatorial
More informationThe Operational Value of Social Media Information. Social Media and Customer Interaction
The Operational Value of Social Media Information Dennis J. Zhang (Kellogg School of Management) Ruomeng Cui (Kelley School of Business) Santiago Gallino (Tuck School of Business) Antonio Moreno-Garcia
More informationSafer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,
More informationMinimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring
Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Qiang Zheng, Student Member, IEEE, and Guohong Cao, Fellow, IEEE Department of Computer Science and Engineering
More informationIncremental Reduction of Binary Decision Diagrams
Abstract Incremental Reduction of Binar Decision Diagrams R. Jacobi, N. Calazans, C. Trullemans. Université de Louvain Laboratoire de Microélectronique - Place du Levant, 3 B1348 Louvain-la-Neuve Belgium
More information10/13/11 Solution: Minimax with Alpha-Beta Pruning and Progressive Deepening
10/1/11 Solution: Minimax with Alpha-Beta Pruning and Progressive Deepening When answering the question in Parts C.1 and C. below, assume you have already applied minimax with alpha-beta pruning and progressive
More informationImplementing Graph Pattern Queries on a Relational Database
LLNL-TR-400310 Implementing Graph Pattern Queries on a Relational Database Ian L. Kaplan, Ghaleb M. Abdulla, S Terry Brugger, Scott R. Kohn January 8, 2008 Disclaimer This document was prepared as an account
More informationEFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP
EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP Hong Jiang Mathematics & Computer Science Department, Benedict College, USA jiangh@benedict.edu ABSTRACT DCSP (Distributed Constraint Satisfaction Problem) has
More informationeach college c i C has a capacity q i - the maximum number of students it will admit
n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i
More informationLogic Cuts Generation in a Branch and Cut Framework for Location Problems Mara A. Osorio Lama School of Computer Science Autonomous University of Puebla, Puebla 72560 Mexico Rosalba Mujica Garca Abstract
More informationMasters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
More informationMasters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
More informationOperational Indicators for public transport companies
Operational Indicators for public transport companies João Mendes Moreira, Jorge Freire de Sousa INEGI, Rua dos Bragas, 4099 Porto Code, Portugal Tel: +351-2-2073650 Fa: +351-2-2073659 Email: joao@gist.fe.up.pt
More informationMasters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
More informationComputer Network Design - 6
opyright Review of fundamentals working concepts ndrea ianco Paolo Giaccone Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ Quest opera è protetta dalla licenza
More informationMasters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
More informationAccess control for data integration in presence of data dependencies. Mehdi Haddad, Mohand-Saïd Hacid
Access control for data integration in presence of data dependencies Mehdi Haddad, Mohand-Saïd Hacid 1 Outline Introduction Motivating example Related work Approach Detection phase (Re)configuration phase
More informationMasters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
More information5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition
More informationConstraints Propagation Techniques in Batch Plants Planning and Scheduling
European Symposium on Computer Arded Aided Process Engineering 15 L. Puigjaner and A. Espuña (Editors) 2005 Elsevier Science B.V. All rights reserved. Constraints Propagation Techniques in Batch Plants
More informationPolynomial Degree and Finite Differences
CONDENSED LESSON 7.1 Polynomial Degree and Finite Differences In this lesson you will learn the terminology associated with polynomials use the finite differences method to determine the degree of a polynomial
More informationTechnology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless
More informationIEOR 4404 Homework #2 Intro OR: Deterministic Models February 14, 2011 Prof. Jay Sethuraman Page 1 of 5. Homework #2
IEOR 4404 Homework # Intro OR: Deterministic Models February 14, 011 Prof. Jay Sethuraman Page 1 of 5 Homework #.1 (a) What is the optimal solution of this problem? Let us consider that x 1, x and x 3
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
More information(b) (b) f 1 = x 1 x 2 ( x 3 v x 4 )
On Bi-Decompositions of Logic Functions Tsutomu Sasao Department of Computer Science and Electronics Kyushu Institute of Technology Iizuka 820, Japan Jon T. Butler Department of Electrical and Computer
More informationSTATISTICS AND DATA ANALYSIS IN GEOLOGY, 3rd ed. Clarificationof zonationprocedure described onpp. 238-239
STATISTICS AND DATA ANALYSIS IN GEOLOGY, 3rd ed. by John C. Davis Clarificationof zonationprocedure described onpp. 38-39 Because the notation used in this section (Eqs. 4.8 through 4.84) is inconsistent
More informationCourse Syllabus For Operations Management. Management Information Systems
For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third
More informationImportant Notice RAID System Monitoring on VMware vsphere 5 vsphere Client
Important Notice RAID System Monitoring on VMware vsphere 5 vsphere Client This document includes important notice for using vsphere Client of VMware vsphere 5 for monitoring the statuses of RAID Controller.
More informationOracle Primavera. P6 Resource Leveling Demo Script
Oracle Primavera P6 Resource Leveling Demo Script Script Team Information Role Name Email Primary Author L. Camille Frost Camille.Frost@oracle.com Contributor Reviewer Geoff Roberts Geoff.Roberts@oracle.com
More information9.3 OPERATIONS WITH RADICALS
9. Operations with Radicals (9 1) 87 9. OPERATIONS WITH RADICALS In this section Adding and Subtracting Radicals Multiplying Radicals Conjugates In this section we will use the ideas of Section 9.1 in
More informationSouth East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected
At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At
More information= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
More informationHeuristics for Dynamically Adapting Constraint Propagation in Constraint Programming
Heuristics for Dynamically Adapting Constraint Propagation in Constraint Programming Kostas Stergiou AI Lab University of the Aegean Greece CPAIOR 09 Workshop on Bound reduction techniques for CP and MINLP
More informationquery Form and Comprehension in Expressible Lisp
A New Advanced Query Web Page and its query language To replace the advanced query web form on www.biocyc.org Mario Latendresse Bioinformatics Research Group SRI International Mario@ai.sri.com 1 The Actual
More informationOnline Store order process within SAP 2 nd December 2013
Information Systems Services Online Store order process within SAP 2 nd December 2013 Contents Overview of functionality within SAP... 2 Store transaction / order reporting... 2 Printing invoices... 3
More informationX_TRADER Spread Matrix
X_TRADER Spread Matrix Version 7.x Setup Guide 03 Introduction 04 Launching the Spread Matrix 05 Navigating the Spread Matrix 08 Configuring the Spread Matrix 11 Trading from the Spread Matrix Displaying
More informationCGN 3421 - Computer Methods
CGN 3421 - Computer Methods Class web site: www.ce.ufl.edu/~kgurl Class text books: Recommended as a reference Numerical Methods for Engineers, Chapra and Canale Fourth Edition, McGraw-Hill Class software:
More informationClustering and scheduling maintenance tasks over time
Clustering and scheduling maintenance tasks over time Per Kreuger 2008-04-29 SICS Technical Report T2008:09 Abstract We report results on a maintenance scheduling problem. The problem consists of allocating
More informationAny two nodes which are connected by an edge in a graph are called adjacent node.
. iscuss following. Graph graph G consist of a non empty set V called the set of nodes (points, vertices) of the graph, a set which is the set of edges and a mapping from the set of edges to a set of pairs
More informationSurvey and remarks on Viro s definition of Khovanov homology
RIMS Kôkyûroku Bessatsu B39 (203), 009 09 Survey and remarks on Viro s definition of Khovanov homology By Noboru Ito Abstract This paper reviews and offers remarks upon Viro s definition of the Khovanov
More informationLecture 10: TEM, TE, and TM Modes for Waveguides. Rectangular Waveguide.
Whites, EE 481/581 Lecture 10 Page 1 of 10 Lecture 10: TEM, TE, and TM Modes for Waveguides. Rectangular Waveguide. We will now generalie our discussion of transmission lines by considering EM waveguides.
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More informationFor each Circle C, find the value of x. Assume that segments that appear to be tangent are tangent. 1. x = 2. x =
Name: ate: Period: Homework - Tangents For each ircle, find the value of. ssume that segments that appear to be tangent are tangent. 1. =. = ( 5) 1 30 0 0 3. =. = (Leave as simplified radical!) 3 8 In
More informationTest Problem Construction for Single-Objective Bilevel Optimization
Test Problem Construction for Single-Objective Bilevel Optimization Ankur Sinha, Pekka Malo Department of Information and Service Economy Aalto University School of Business, Finland {Firstname.Lastname}@aalto.fi
More informationLecture 7: NP-Complete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
More informationMetaGame: An Animation Tool for Model-Checking Games
MetaGame: An Animation Tool for Model-Checking Games Markus Müller-Olm 1 and Haiseung Yoo 2 1 FernUniversität in Hagen, Fachbereich Informatik, LG PI 5 Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de
More informationA Direct Numerical Method for Observability Analysis
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method
More informationCryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
More informationSudoku Madness. Team 3: Matt Crain, John Cheng, and Rabih Sallman
Sudoku Madness Team 3: Matt Crain, John Cheng, and Rabih Sallman I. Problem Description Standard Sudoku is a logic-based puzzle in which the user must fill a 9 x 9 board with the appropriate digits so
More informationDifferential privacy in health care analytics and medical research An interactive tutorial
Differential privacy in health care analytics and medical research An interactive tutorial Speaker: Moritz Hardt Theory Group, IBM Almaden February 21, 2012 Overview 1. Releasing medical data: What could
More informationCircuit Analysis using the Node and Mesh Methods
Circuit Analysis using the Node and Mesh Methods We have seen that using Kirchhoff s laws and Ohm s law we can analyze any circuit to determine the operating conditions (the currents and voltages). The
More informationA puzzle. Suppose that you want to run some JavaScript programs---all the cool kids are doing it.
A puzzle Suppose that you want to run some JavaScript programs---all the cool kids are doing it. However, you are deathly afraid that your mom/ significant other/boss will see the curse word b00 appear
More informationLikewise, we have contradictions: formulas that can only be false, e.g. (p p).
CHAPTER 4. STATEMENT LOGIC 59 The rightmost column of this truth table contains instances of T and instances of F. Notice that there are no degrees of contingency. If both values are possible, the formula
More informationBinary Adders: Half Adders and Full Adders
Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order
More informationCS311 Lecture: Sequential Circuits
CS311 Lecture: Sequential Circuits Last revised 8/15/2007 Objectives: 1. To introduce asynchronous and synchronous flip-flops (latches and pulsetriggered, plus asynchronous preset/clear) 2. To introduce
More informationSchool of Computer Science
School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
More informationUtility Maximization
Utility Maimization Given the consumer's income, M, and prices, p and p y, the consumer's problem is to choose the a ordable bundle that maimizes her utility. The feasible set (budget set): total ependiture
More informationMathematics Test Book 1
Mathematics Test ook 1 Grade 7 March 9 13, 2009 21317 eveloped and published under contract with the New York State Education epartment by T/McGraw-Hill LL, a subsidiary of The McGraw-Hill ompanies, Inc.,
More informationEducator s Guide to Excel Graphing
Educator s Guide to Excel Graphing Overview: Students will use Excel to enter data into a spreadsheet and make a graph. Grades and Subject Areas: Grade 3-6 Subject Math Objectives: Students will: make
More information