1 Variable Elimination in Bayesian Networks
|
|
- Martha Caldwell
- 7 years ago
- Views:
Transcription
1 CS 440: Introduction to Artificial Inttelligence Lecture date: 12 Feruary 2008 Instructor: Eyal Amir Guest Lecturer: Mark Richards 1 Variale Elimination in Bayesian Networks Review: Inference Given a joint proaility distriution over variales a set of variales X X 1, X 2,..., X n, we can make inferences of the form (Y Z), where Y X is the set of query variales, Z X are the evidence variales. The other variales H (those not mentioned in the query) are called hidden variales. To e clear, X Y Z H. The most naive and expensive way to do inference is to use the full joint proaility distriution and sum out the hidden variales. By the product rule, P (Y Z)P (Z) P (Y, Z). (Note that this is true for any distriution. This does not have anything to do with independence.) So to answer the query P (Y Z), we can compute P (Y,Z) P (Z). Note that P (Y, Z) H P (Y, Z, H). From the view of the full joint proaility tale, we are summing the proailities for all of the entries in the tale that match the values of the query variales and evidence variales (this includes entries for all of the cominations of values for the hidden variales) and dividing y the sum of all the entries that match the values of the evidence variales. (Note that the values in the first sum are a suset of the values in the latter sum.) This method is straightforward conceptually ut has many prolems. First, you have to compute and store the values in the full joint distriution. The numer of entries is i Options(X i), where Options(X i ) is the numer of different values that variale X i may have. So for n Boolean variales, the full joint has 2 n entries. For large networks, it is unreasonale to store/compute this many values. Furthermore, if a query requires summing out most of the variales, the time complexity is O(2 n ) as well. Normalizing Suppose we have variales A and B. We want to compute P (A ). We use to denote B true. The result of our query P (A, ) is a two-element tale that specifies P (a, ) and P ( a, ).Since P (A )P () P (A, ), we can compute P (A ) P (A,) P (). But we also know that P () P (a, ) + P ( a, ). Since we need oth P (a, ) and P (, ) to answer the query, this may actually e the est way to compute P (). The way this is expressed in the ook is that P (A ) αp (A, ), where α is a normalizing constant that makes the values in the tale P (A ) sum to 1. (In this case, α is P (), ut the idea is that it doesn t matter what it is; we just know that we need to normalize to make sure that the values in P (A ) sum to 1. Enumeration Using the urglar alarm network, suppose we wish to compute the proaility that there is an earthquake, given that oth John and Mary call: P (E j, m) αp (E, j, m)
2 We need to sum over all the values of the hidden vars: αp (E, j, m) a P (E, j, m,, a) This may e a slight ause of notation. The lower case j, m mean that JohnCalls true and MaryCalls true. The lowercase, a mean that we are summing over all values of the variales B, A. So now we have a sum over entries from the full joint. We can retrieve these using our Bayesian network structure: P (E, j, m,, a) a P ()P (E)P (a, E)P (j a)p (m a) a In general, sums of this form could take O(n2 n ) time to compute. There may e n values to multiply together to compute each product term, and up to O(2 n ) total terms to sum up. We can save some computations y pushing the s inward as much as possile: P ()P (E)P (a, E)P (j a)p (m a) P (E) a P () a P (a, E)P (j a)p (m a) We need to do this sum oth for E true and E false. For the first case: ( ) P () (P (a, e)p (j a)p (m a) + P ( a, e)p (j a)p (m a)) + P (e) P ( ) (P (a, e)p (j a)p (m a) + P ( a, e)p (j a)p (m a)) Even here, we can see some wasted computations: the product P (j a)p (m a) is computed twice, and so is P (j a)p (m a). In this example, we do two extra multiplications, which is no ig deal. But in a large network, this kind of waste can e deilitating. Variale Elimination (We follow Section 14.4 in Russell-Norvig with some additional details.) Here we introduce a variale elimination algorithm that will help us avoid the duplicate computations; it is a form of dynamic programming. We introduce tales called factors to help us do the ookkeeping. Initially, we will have one factor for each CPT term in our expression: E f E (E) T.002 F.998 α P (E) }{{} E T.001 F.999 P () P (a, E) P (j a) P (m a) }{{}}{{}}{{}}{{} a B A J M A B E f A (A, B, E) T T T.95 T T F.94 T F T.29 T F F.001 F T T.05 F T F.06 F F T.71 F F F.999 A f J (A) T.9 F.05 A f M (A) T.7 F.01
3 The initial tales store the values from the CPTs that we will need over the course of the query evaluation. The factor for E, denoted f E (E), is a two-element vector ecause we will e computing oth P (e, j, m) and P ( e, j, m) (we will normalize at the end to compute P (e j, m) and P ( e j, m)). The suscript E names the factor, and the (E) means that the value of E varies in the factor. The factor for B is also a two-element vector f B (B), ecause we will need to sum out the variale B. The factor f A (A, B, E) requires elements ecause we will need all cominations of values for A, B, and E in the expression. And even though J and M oth have parents in the network, the factors f J (A) and f M (A) have only two elements ecause throughout the expression, we are only interested in cases where JohnCalls true and MaryCalls true. There are two operations that we need to e ale to perform on factors: multiplication and summing out. The multiplication operation is similar to a natural join on dataase tales, as opposed to a matrix multiplication or an element-y-element multiplication. The set of variales in the product of two factors is the union of the sets of variales in the operands. In the product factor, there will e one entry for every comination of values for variales in the resulting set. The value of each entry is the product of the entries in the original tales that match the values for all relevant variales. For example, consider the product f JM (A) f J (A)f M (A): A f JM (A) T.9 *.7 F.05 *.01 A f J (A) T.9 F.05 A f M (A) T.7 F.01 The union of variales in the operands is A. The entry for T in the resulting tale is the product of the entries where A T rue in the operands. Now consider f AJM (A, B, E) f A (A, B, E)f JM (A). A B E f AJM (A, B, E) T T T.95 *.63 T T F.94 *.63 T F T.29 *.63 T F F.001 *.63 F T T.05 *.0005 F T F.06 *.0005 F F T.71 *.0005 F F F.999 *.0005 A B E f AJM (A, B, E) T T T.95 T T F.94 T F T.29 T F F.001 F T T.05 F T F.06 F F T.71 F F F.999 A f JM (A) T.63 F.0005 The entry for A T, B T, E T in f AJM (A, B, E) is the product of corresponding entries from f A (A, B, E) where A T, B T, E T and from f J M(A) where A T (since B, E do not appear in f J M(A). In general, we have f(x 1,..., X j, Y 1,..., Y k, Z 1..., Z l ) f 1 (X 1,..., X j, Y 1,..., Y k )f 2 (Y 1,..., Y k, Z 1,..., Z l ) The factors f 1 and f 2 share common variales Y. If f 1 has a total of j + k variales and f 2 has k + l variales, then the product will have j + k + l variales. Each entry in the result will have all the variales X Y Z and the entry for a particular valuation of X, Y, Z will e the product of the entry in f 1 that has the same values for X, Y and the entry in f 2 that has the same values for Y, Z.
4 The other operation we need for factors is summing out. If, for example, we sum out A from f AJM (A, B, E), the resulting factor will e named f ĀJM (B, E) (with the ar on the A in the suscript denoting that A was summed out). There is one entry in f ĀJM (B, E) for each comination of values of B, E in f AJM (B, E). The value of the entry is the sum of all entries in f AJM (B, E) that have the same values of B, E (ut differing values of A): B E f ĀJM (B, E) T T.95 * * T F.94 * * F T.29 * * F F.001 * * We are now ready to compute the answer to our query: αp (E) P () a P (a, e)p (j a)p (m a) αf E (E) B f B(B) a f A(A, B, E)f J (A)f m (A) αf E (E) B f B(B) a f A(A, B, E)f JM (A) αf E (E) B f B(B) a f AJM(A, B, E) αf E (E) B f B(B)f ĀJM (B, E) αf E (E) B fbājm(b, E) αf E (E)f BĀJM (E) αf E BĀJM (E) We have already computed f ĀJM, so we can proceed from step 5, where we compute fbājm(b, E): B E f B ĀJM (B, E) T T.5985 *.001 T F.5922 *.001 F T.1830 *.999 F F *.999 T.001 F.999 B E f ĀJM (B, E) T T.5985 T F.5922 F T.1830 F F Next, we sum out B to produce f BĀJM (E). E f BĀJM (E) T F * Now we compute f E BĀJM (E): E f BĀJM (E) T.1834 * F * E f E (E) T.002 F.998 E f BĀJM (E) T.1834 F
5 So we have αf E BĀJM (E) α , ,.8228, or in other words, P (e j, m) Another Example Using the Bayesian Network from Homework 2 Prolem 3, we will compute P (E d): P (E d) αp (E, d) α a,,c P (a,, c, E, d) α a P (a) c P (c a) P ()P (d )P (E, c) α a f A(A) c f C(A, C) f B(B)f D (B)f E (B, C, E) α a f A(A) c f C(A, C) f BDE(B, C, E) α a f A(A) c f C(A, C)f BDE (C, E) α a f A(A) c f C BDE (A, C, E) α a f A(A)f C BDE (A, E) α a f A C BDE (A, E) αf Ā C BDE (E) The only variale in the expression that is fixed is D. So the initial factors are: A f A (A) T.3 F.7 A C f C (A, C) T T.2 T F.8 F T.4 F F.6 T.8 F.2 B f D (B) T.1 F.6 B C E f E (B, C, E) T T T.5 T T F.5 T F T.9 T F F.1 F T T.4 F T F.6 F F T.7 F F F.3 We can compute f BDE (B, C, E) from the rightmost three factors in one step: B C E f BDE (B, C, E) T T T.8 *.1 *.5.04 T T F.8 *.1 *.5.04 T F T.8 *.1 * T F F.8 *.1 * F T T.2 *.6 * F T F.2 *.6 * F F T.2 *.6 * F F F.2 *.6 * T.8 F.2 B f D (B) T.1 F.6 B C E f E (B, C, E) T T T.5 T T F.5 T F T.9 T F F.1 F T T.4 F T F.6 F F T.7 F F F.3 Now we sum out B:
6 C E f BDE (C, E) T T T F F T F F Next, we compute f C BDE (A, C, E): A C E f C BDE (A, C, E) T T T.2 * T T F.2 * T F T.8 * T F F.8 * F T T.4 * F T F.4 * F F T.6 * F F F.6 * A C f C (A, C) T T.2 T F.8 F T.4 F F.6 C E f BDE (C, E) T T.088 T F.112 F T.156 F F.044 Now we sum out C: A E f C BDE (A, E) T T T F F T F F Next, we compute f A C BDE (A, E): A E f A C BDE (A, E) T T.3 * T F.3 * F T.7 * F F.7 * A f A (A) T.3 F.7 A E f C BDE (A, E) T T.1424 T F.0576 F T.1288 F F.0712 Then we sum out A E f Ā C BDE (A, E) T F Finally, αf Ā C BDE (E) α.13288, , So P ( e d) In these small-network examples, it may seem like the variale elimination algorithm actually requires more work than enumeration. But in some large networks, the computational savings can e large. The complexity of variale elimination depends on the size of the largest factor that must
7 e created during the computation. This in turn depends on the order in which the variales are eliminated. In polytree networks with a consistent ordering of the variales (i.e., a parent comes efore any of its children), the time and space complexity is linear in the size of the network.
Bayesian Networks. Mausam (Slides by UW-AI faculty)
Bayesian Networks Mausam (Slides by UW-AI faculty) Bayes Nets In general, joint distribution P over set of variables (X 1 x... x X n ) requires exponential space for representation & inference BNs provide
More informationCHAPTER 13 SIMPLE LINEAR REGRESSION. Opening Example. Simple Regression. Linear Regression
Opening Example CHAPTER 13 SIMPLE LINEAR REGREION SIMPLE LINEAR REGREION! Simple Regression! Linear Regression Simple Regression Definition A regression model is a mathematical equation that descries the
More information1 Symmetries of regular polyhedra
1230, notes 5 1 Symmetries of regular polyhedra Symmetry groups Recall: Group axioms: Suppose that (G, ) is a group and a, b, c are elements of G. Then (i) a b G (ii) (a b) c = a (b c) (iii) There is an
More informationOnline appendix for Innovation, Firm Dynamics, and International Trade
Online appendi for Innovation, Firm Dynamics, and International Trade Andrew Atkeson UCLA and Ariel Burstein UCLA, Feruary 2010 1 This appendi is composed of two parts. In the first part, we provide details
More informationBasics of Statistical Machine Learning
CS761 Spring 2013 Advanced Machine Learning Basics of Statistical Machine Learning Lecturer: Xiaojin Zhu jerryzhu@cs.wisc.edu Modern machine learning is rooted in statistics. You will find many familiar
More information10.1 Systems of Linear Equations: Substitution and Elimination
726 CHAPTER 10 Systems of Equations and Inequalities 10.1 Systems of Linear Equations: Sustitution and Elimination PREPARING FOR THIS SECTION Before getting started, review the following: Linear Equations
More information2) Write in detail the issues in the design of code generator.
COMPUTER SCIENCE AND ENGINEERING VI SEM CSE Principles of Compiler Design Unit-IV Question and answers UNIT IV CODE GENERATION 9 Issues in the design of code generator The target machine Runtime Storage
More informationQUADRATIC EQUATIONS EXPECTED BACKGROUND KNOWLEDGE
MODULE - 1 Quadratic Equations 6 QUADRATIC EQUATIONS In this lesson, you will study aout quadratic equations. You will learn to identify quadratic equations from a collection of given equations and write
More informationReal-time Targeted Influence Maximization for Online Advertisements
Real-time Targeted Influence Maximization for Online Advertisements Yuchen Li Dongxiang Zhang ian-lee Tan Department of Computer Science School of Computing, National University of Singapore {liyuchen,zhangdo,tankl}@comp.nus.edu.sg
More informationMath 312 Homework 1 Solutions
Math 31 Homework 1 Solutions Last modified: July 15, 01 This homework is due on Thursday, July 1th, 01 at 1:10pm Please turn it in during class, or in my mailbox in the main math office (next to 4W1) Please
More informationProbability, Mean and Median
Proaility, Mean and Median In the last section, we considered (proaility) density functions. We went on to discuss their relationship with cumulative distriution functions. The goal of this section is
More informationEnergy Analysis of Hadoop Cluster Failure Recovery
University of Nerasa - Lincoln DigitalCommons@University of Nerasa - Lincoln CSE Conference and Worshop Papers Computer Science and Engineering, Department of 2013 Energy Analysis of Hadoop Cluster Failure
More informationCOMBINATION REVERSE ANNUITY CONTRACT AND CRITICAL ILLNESS INSURANCE
COMBINATION REVERSE ANNUITY CONTRACT AND CRITICAL ILLNESS INSURANCE JOANNA DĘBICKA, AGNIESZKA MARCINIUK, BEATA ZMYŚLONA Wroclaw University of Economics, Faculty of Management, Information Systems Finance,
More informationSection 1.4. Lines, Planes, and Hyperplanes. The Calculus of Functions of Several Variables
The Calculus of Functions of Several Variables Section 1.4 Lines, Planes, Hyperplanes In this section we will add to our basic geometric understing of R n by studying lines planes. If we do this carefully,
More informationCourse 4 Examination Questions And Illustrative Solutions. November 2000
Course 4 Examination Questions And Illustrative Solutions Novemer 000 1. You fit an invertile first-order moving average model to a time series. The lag-one sample autocorrelation coefficient is 0.35.
More informationPolynomials - Exponent Properties
5.1 Polynomials - Exponent Properties Ojective: Simplify expressions using the properties of exponents. Prolems with expoenents can often e simplified using a few asic exponent properties. Exponents represent
More informationMinimizing Probing Cost and Achieving Identifiability in Network Link Monitoring
Minimizing Proing Cost and Achieving Identifiaility in Network Link Monitoring Qiang Zheng and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University E-mail: {quz3,
More informationSubstitute 4 for x in the function, Simplify.
Page 1 of 19 Review of Eponential and Logarithmic Functions An eponential function is a function in the form of f ( ) = for a fied ase, where > 0 and 1. is called the ase of the eponential function. The
More informationCompression algorithm for Bayesian network modeling of binary systems
Compression algorithm for Bayesian network modeling of binary systems I. Tien & A. Der Kiureghian University of California, Berkeley ABSTRACT: A Bayesian network (BN) is a useful tool for analyzing the
More informationWhen Information Improves Information Security
When Information Improves Information Security Jens Grossklags a, Benjamin Johnson, and Nicolas Christin a School of Information, UC Berkeley, Cya, Carnegie Mellon University jensg@ischool.erkeley.edu
More informationDomain Adaptation meets Active Learning
Domain Adaptation meets Active Learning Piyush Rai, Avishek Saha, Hal Daumé III, and Suresh Venkatasuramanian School of Computing, University of Utah Salt Lake City, UT 84112 {piyush,avishek,hal,suresh}@cs.utah.edu
More informationMagnetometer Realignment: Theory and Implementation
Magnetometer Realignment: heory and Implementation William Premerlani, Octoer 16, 011 Prolem A magnetometer that is separately mounted from its IMU partner needs to e carefully aligned with the IMU in
More informationData exchange. L. Libkin 1 Data Integration and Exchange
Data exchange Source schema, target schema; need to transfer data between them. A typical scenario: Two organizations have their legacy databases, schemas cannot be changed. Data from one organization
More informationCOMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012
Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about
More informationOrthogonal Projections
Orthogonal Projections and Reflections (with exercises) by D. Klain Version.. Corrections and comments are welcome! Orthogonal Projections Let X,..., X k be a family of linearly independent (column) vectors
More information1 Review of Least Squares Solutions to Overdetermined Systems
cs4: introduction to numerical analysis /9/0 Lecture 7: Rectangular Systems and Numerical Integration Instructor: Professor Amos Ron Scribes: Mark Cowlishaw, Nathanael Fillmore Review of Least Squares
More informationNon-Linear Regression 2006-2008 Samuel L. Baker
NON-LINEAR REGRESSION 1 Non-Linear Regression 2006-2008 Samuel L. Baker The linear least squares method that you have een using fits a straight line or a flat plane to a unch of data points. Sometimes
More informationNumber Who Chose This Maximum Amount
1 TASK 3.3.1: MAXIMIZING REVENUE AND PROFIT Solutions Your school is trying to oost interest in its athletic program. It has decided to sell a pass that will allow the holder to attend all athletic events
More informationLearning Outcomes. Computer Systems - Architecture Lecture 4 - Boolean Logic. What is Logic? Boolean Logic 10/28/2010
/28/2 Lerning Outcomes At the end of this lecture you should: Computer Systems - Architecture Lecture 4 - Boolen Logic Eddie Edwrds eedwrds@doc.ic.c.uk http://www.doc.ic.c.uk/~eedwrds/compsys (Hevily sed
More information3. The Junction Tree Algorithms
A Short Course on Graphical Models 3. The Junction Tree Algorithms Mark Paskin mark@paskin.org 1 Review: conditional independence Two random variables X and Y are independent (written X Y ) iff p X ( )
More informationOnline Appendix: Bank Competition, Risk Taking and Their Consequences
Online Appendix: Bank Competition, Risk Taking and Their Consequences Xiaochen (Alan) Feng Princeton University - Not for Pulication- This version: Novemer 2014 (Link to the most updated version) OA1.
More information5 Double Integrals over Rectangular Regions
Chapter 7 Section 5 Doule Integrals over Rectangular Regions 569 5 Doule Integrals over Rectangular Regions In Prolems 5 through 53, use the method of Lagrange multipliers to find the indicated maximum
More informationLecture 2 Matrix Operations
Lecture 2 Matrix Operations transpose, sum & difference, scalar multiplication matrix multiplication, matrix-vector product matrix inverse 2 1 Matrix transpose transpose of m n matrix A, denoted A T or
More informationMATH10040 Chapter 2: Prime and relatively prime numbers
MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive
More informationMATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
More informationCS 3719 (Theory of Computation and Algorithms) Lecture 4
CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a
More informationRow Echelon Form and Reduced Row Echelon Form
These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation
More information*corresponding author
Key Engineering Materials Vol. 588 (2014) pp 249-256 Online availale since 2013/Oct/11 at www.scientific.net (2014) Trans Tech Pulications, Switzerland doi:10.4028/www.scientific.net/kem.588.249 Remote
More informationBetting on Permutations
Betting on Permutations Yiling Chen Yahoo! Research 45 W. 18th St. 6th Floor New York, NY 10011 Evdokia Nikolova CS & AI Laoratory Massachusetts Institute of Technology Camridge, MA 02139 Lance Fortnow
More informationDERIVATIVES AS MATRICES; CHAIN RULE
DERIVATIVES AS MATRICES; CHAIN RULE 1. Derivatives of Real-valued Functions Let s first consider functions f : R 2 R. Recall that if the partial derivatives of f exist at the point (x 0, y 0 ), then we
More informationAP Calculus AB 2003 Scoring Guidelines
AP Calculus AB Scoring Guidelines The materials included in these files are intended for use y AP teachers for course and exam preparation; permission for any other use must e sought from the Advanced
More informationSolution to Homework 2
Solution to Homework 2 Olena Bormashenko September 23, 2011 Section 1.4: 1(a)(b)(i)(k), 4, 5, 14; Section 1.5: 1(a)(b)(c)(d)(e)(n), 2(a)(c), 13, 16, 17, 18, 27 Section 1.4 1. Compute the following, if
More informationTheory behind Normalization & DB Design. Satisfiability: Does an FD hold? Lecture 12
Theory behind Normalization & DB Design Lecture 12 Satisfiability: Does an FD hold? Satisfiability of FDs Given: FD X Y and relation R Output: Does R satisfy X Y? Algorithm: a.sort R on X b.do all the
More informationSchema Design and Normal Forms Sid Name Level Rating Wage Hours
Entity-Relationship Diagram Schema Design and Sid Name Level Rating Wage Hours Database Management Systems, 2 nd Edition. R. Ramakrishnan and J. Gehrke 1 Database Management Systems, 2 nd Edition. R. Ramakrishnan
More informationDecember 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B KITCHENS The equation 1 Lines in two-dimensional space (1) 2x y = 3 describes a line in two-dimensional space The coefficients of x and y in the equation
More informationLecture 10: Distinct Degree Factoring
CS681 Computational Number Theory Lecture 10: Distinct Degree Factoring Instructor: Piyush P Kurur Scribe: Ramprasad Saptharishi Overview Last class we left of with a glimpse into distant degree factorization.
More informationNotes on Factoring. MA 206 Kurt Bryan
The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor
More informationTraditional Inventory Models in an E-Retailing Setting: A Two-Stage Serial System with Space Constraints
Traditional Inventory Models in an E-Retailing Setting: A Two-Stage Serial System with Space Constraints Russell Allgor, Stephen Graves, and Ping Josephine Xu Amazon.com MIT Astract In an e-retailing setting,
More informationDiscrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2
CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 Proofs Intuitively, the concept of proof should already be familiar We all like to assert things, and few of us
More informationMath 202-0 Quizzes Winter 2009
Quiz : Basic Probability Ten Scrabble tiles are placed in a bag Four of the tiles have the letter printed on them, and there are two tiles each with the letters B, C and D on them (a) Suppose one tile
More informationAn Enquire guide for children and young people. What happens when you can t go to school?
An Enquire guide for children and young people What happens when you can t go to school? Contents Introduction 3 Your right to education 4 Why you may not e at school 5 Getting support when you are not
More informationT ( a i x i ) = a i T (x i ).
Chapter 2 Defn 1. (p. 65) Let V and W be vector spaces (over F ). We call a function T : V W a linear transformation form V to W if, for all x, y V and c F, we have (a) T (x + y) = T (x) + T (y) and (b)
More informationFACTORING ax 2 bx c. Factoring Trinomials with Leading Coefficient 1
5.7 Factoring ax 2 bx c (5-49) 305 5.7 FACTORING ax 2 bx c In this section In Section 5.5 you learned to factor certain special polynomials. In this section you will learn to factor general quadratic polynomials.
More informationKey Words: Liquidity, Sequential Trade, Equity premium puzzle, participation puzzle
LIQUIDITY, EQUITY PREMIUM AND PARTICIPATION Benjamin Eden * Vanderilt University and the University of Haifa Septemer 2007 I use price dispersion to model liquidity. Buyers may e rationed at the low price.
More informationSoftware Reliability Measuring using Modified Maximum Likelihood Estimation and SPC
Software Reliaility Measuring using Modified Maximum Likelihood Estimation and SPC Dr. R Satya Prasad Associate Prof, Dept. of CSE Acharya Nagarjuna University Guntur, INDIA K Ramchand H Rao Dept. of CSE
More informationA Simple Cost-sensitive Multiclass Classification Algorithm Using One-versus-one Comparisons
Data Mining and Knowledge Discovery manuscript No. (will e inserted y the editor) A Simple Cost-sensitive Multiclass Classification Algorithm Using One-versus-one Comparisons Hsuan-Tien Lin Astract Many
More informationComputer Science 281 Binary and Hexadecimal Review
Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two
More information6. LECTURE 6. Objectives
6. LECTURE 6 Objectives I understand how to use vectors to understand displacement. I can find the magnitude of a vector. I can sketch a vector. I can add and subtract vector. I can multiply a vector by
More informationNotes on Determinant
ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without
More information18.06 Problem Set 4 Solution Due Wednesday, 11 March 2009 at 4 pm in 2-106. Total: 175 points.
806 Problem Set 4 Solution Due Wednesday, March 2009 at 4 pm in 2-06 Total: 75 points Problem : A is an m n matrix of rank r Suppose there are right-hand-sides b for which A x = b has no solution (a) What
More informationAN AMBIENT AIR QUALITY MONITORING NETWORK FOR BUENOS AIRES CITY
AN AMBIENT AIR QUALITY MONITORING NETWORK FOR BUENOS AIRES CITY Laura Venegas and Nicolás Mazzeo National Scientific and Technological Research Council (CONICET) Department of Atmospheric and Oceanic Sciences.
More informationLecture Note 1 Set and Probability Theory. MIT 14.30 Spring 2006 Herman Bennett
Lecture Note 1 Set and Probability Theory MIT 14.30 Spring 2006 Herman Bennett 1 Set Theory 1.1 Definitions and Theorems 1. Experiment: any action or process whose outcome is subject to uncertainty. 2.
More informationAdditional MBA Information. Business School Faculty of Management Sciences
Additional MBA Information Business School Faculty of Management Sciences MBA Programme Welcome We would like to thank you for your enquiry aout our MBA Program. After sumission of your application, you
More informationThe PageRank Citation Ranking: Bring Order to the Web
The PageRank Citation Ranking: Bring Order to the Web presented by: Xiaoxi Pang 25.Nov 2010 1 / 20 Outline Introduction A ranking for every page on the Web Implementation Convergence Properties Personalized
More information2x + y = 3. Since the second equation is precisely the same as the first equation, it is enough to find x and y satisfying the system
1. Systems of linear equations We are interested in the solutions to systems of linear equations. A linear equation is of the form 3x 5y + 2z + w = 3. The key thing is that we don t multiply the variables
More informationVisa Smart Debit/Credit Certificate Authority Public Keys
CHIP AND NEW TECHNOLOGIES Visa Smart Debit/Credit Certificate Authority Public Keys Overview The EMV standard calls for the use of Public Key technology for offline authentication, for aspects of online
More informationFuld Skolerapport for Søhusskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 9. med reference Tilsvarende klassetrin i kommunen
Side 1 af 41 Side 2 af 41 Side 3 af 41 Side 4 af 41 Side 5 af 41 Side 6 af 41 Side 7 af 41 Side 8 af 41 Side 9 af 41 Side 10 af 41 Side 11 af 41 Side 12 af 41 Side 13 af 41 Side 14 af 41 Side 15 af 41
More informationFuld Skolerapport for Hunderupskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 7. med reference Tilsvarende klassetrin i kommunen
Side 1 af 43 Side 2 af 43 Side 3 af 43 Side 4 af 43 Side 5 af 43 Side 6 af 43 Side 7 af 43 Side 8 af 43 Side 9 af 43 Side 10 af 43 Side 11 af 43 Side 12 af 43 Side 13 af 43 Side 14 af 43 Side 15 af 43
More informationWe shall turn our attention to solving linear systems of equations. Ax = b
59 Linear Algebra We shall turn our attention to solving linear systems of equations Ax = b where A R m n, x R n, and b R m. We already saw examples of methods that required the solution of a linear system
More informationAutomata and Computability. Solutions to Exercises
Automata and Computability Solutions to Exercises Fall 25 Alexis Maciel Department of Computer Science Clarkson University Copyright c 25 Alexis Maciel ii Contents Preface vii Introduction 2 Finite Automata
More informationMATRIX ALGEBRA AND SYSTEMS OF EQUATIONS
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a
More information14:440:127 Introduction to Computers for Engineers. Notes for Lecture 06
14:440:127 Introduction to Computers for Engineers Notes for Lecture 06 Rutgers University, Spring 2010 Instructor- Blase E. Ur 1 Loop Examples 1.1 Example- Sum Primes Let s say we wanted to sum all 1,
More informationHarmonic Associations in Kurtág s Chorale from Játékok, V
Pesca on Kurtág // Page! of 9! Harmonic Associations in Kurtág s Chorale from Játékok, V Daniel Pesca. ntroduction, form, and summary of linear structures György Kurtág s Játékok (Games) is an ongoing
More informationStock Options and Capital Structure
y Richard D. MacMinn* and Frank H. Page** Revised March 996 *Department of Finance University of Texas Austin, Texas 52-47-4368 macminn@mail.utexas.edu **Department of Finance University of Alaama Tuscaloosa,
More informationLINEAR ALGEBRA W W L CHEN
LINEAR ALGEBRA W W L CHEN c W W L Chen, 1997, 2008 This chapter is available free to all individuals, on understanding that it is not to be used for financial gain, and may be downloaded and/or photocopied,
More informationProblem Set II: budget set, convexity
Problem Set II: budget set, convexity Paolo Crosetto paolo.crosetto@unimi.it Exercises will be solved in class on January 25th, 2010 Recap: Walrasian Budget set, definition Definition (Walrasian budget
More informationBoolean Algebra Part 1
Boolean Algebra Part 1 Page 1 Boolean Algebra Objectives Understand Basic Boolean Algebra Relate Boolean Algebra to Logic Networks Prove Laws using Truth Tables Understand and Use First Basic Theorems
More informationExponents. Learning Objectives 4-1
Eponents -1 to - Learning Objectives -1 The product rule for eponents The quotient rule for eponents The power rule for eponents Power rules for products and quotient We can simplify by combining the like
More informationLecture Notes on Pitch-Class Set Theory. Topic 4: Inversion. John Paul Ito
Lecture Notes on Pitch-Class Set Theory Topic 4: Inversion John Paul Ito Inversion We have already seen in the notes on set classes that while in tonal theory, to invert a chord is to take the lowest note
More information1 Review of Newton Polynomials
cs: introduction to numerical analysis 0/0/0 Lecture 8: Polynomial Interpolation: Using Newton Polynomials and Error Analysis Instructor: Professor Amos Ron Scribes: Giordano Fusco, Mark Cowlishaw, Nathanael
More information3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
More informationLinear Algebra I. Ronald van Luijk, 2012
Linear Algebra I Ronald van Luijk, 2012 With many parts from Linear Algebra I by Michael Stoll, 2007 Contents 1. Vector spaces 3 1.1. Examples 3 1.2. Fields 4 1.3. The field of complex numbers. 6 1.4.
More informationDatabase Design and Normalization
Database Design and Normalization Chapter 10 (Week 11) EE562 Slides and Modified Slides from Database Management Systems, R. Ramakrishnan 1 Computing Closure F + Example: List all FDs with: - a single
More informationSchema Refinement and Normalization
Schema Refinement and Normalization Module 5, Lectures 3 and 4 Database Management Systems, R. Ramakrishnan 1 The Evils of Redundancy Redundancy is at the root of several problems associated with relational
More informationCS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team
CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team Lecture Summary In this lecture, we learned about the ADT Priority Queue. A
More informationImplementation of First-Best Allocations in Insurance Economies with Asymmetric information
Implementation of First-Best Allocations in Insurance Economies with Asymmetric information Aristotelis Boukouras Kostas Koufopoulos This Version: 07 Octoer 2009 First Version: 24 July 2007 Astract In
More informationBayesian Networks. Read R&N Ch. 14.1-14.2. Next lecture: Read R&N 18.1-18.4
Bayesian Networks Read R&N Ch. 14.1-14.2 Next lecture: Read R&N 18.1-18.4 You will be expected to know Basic concepts and vocabulary of Bayesian networks. Nodes represent random variables. Directed arcs
More information15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
More informationCooperation Strategies for Two Co-located receivers, with no CSI at the transmitter
Cooperation Strategies for Two Co-located receivers, with no CSI at the transmitter Amichai Sanderovich, Avi Steiner and Shlomo Shamai (Shitz) Technion, Haifa, Israel Email: {amichi@tx,savi@tx,sshlomo@ee}.technion.ac.il
More informationCustomer Relationship Management by Semi-Supervised Learning
Middle-East Journal of Scientific Research 16 (5): 614-620, 2013 ISSN 1990-9233 IDOSI Pulications, 2013 DOI: 10.5829/idosi.mejsr.2013.16.05.930 Customer Relationship Management y Semi-Supervised Learning
More information1 Introduction to Matrices
1 Introduction to Matrices In this section, important definitions and results from matrix algebra that are useful in regression analysis are introduced. While all statements below regarding the columns
More informationNonlinear Programming Methods.S2 Quadratic Programming
Nonlinear Programming Methods.S2 Quadratic Programming Operations Research Models and Methods Paul A. Jensen and Jonathan F. Bard A linearly constrained optimization problem with a quadratic objective
More informationThe Set Data Model CHAPTER 7. 7.1 What This Chapter Is About
CHAPTER 7 The Set Data Model The set is the most fundamental data model of mathematics. Every concept in mathematics, from trees to real numbers, is expressible as a special kind of set. In this book,
More informationHandout for three day Learning Curve Workshop
Handout for three day Learning Curve Workshop Unit and Cumulative Average Formulations DAUMW (Credits to Professors Steve Malashevitz, Bo Williams, and prior faculty. Blame to Dr. Roland Kankey, roland.kankey@dau.mil)
More informationOn the generation of elliptic curves with 16 rational torsion points by Pythagorean triples
On the generation of elliptic curves with 16 rational torsion points by Pythagorean triples Brian Hilley Boston College MT695 Honors Seminar March 3, 2006 1 Introduction 1.1 Mazur s Theorem Let C be a
More informationSequential Data Structures
Sequential Data Structures In this lecture we introduce the basic data structures for storing sequences of objects. These data structures are based on arrays and linked lists, which you met in first year
More informationHedging Illiquid FX Options: An Empirical Analysis of Alternative Hedging Strategies
Hedging Illiquid FX Options: An Empirical Analysis of Alternative Hedging Strategies Drazen Pesjak Supervised by A.A. Tsvetkov 1, D. Posthuma 2 and S.A. Borovkova 3 MSc. Thesis Finance HONOURS TRACK Quantitative
More informationUsing a table of derivatives
Using a table of derivatives In this unit we construct a Table of Derivatives of commonly occurring functions. This is done using the knowledge gained in previous units on differentiation from first principles.
More informationUniversity of Lille I PC first year list of exercises n 7. Review
University of Lille I PC first year list of exercises n 7 Review Exercise Solve the following systems in 4 different ways (by substitution, by the Gauss method, by inverting the matrix of coefficients
More informationIn This Lecture. Security and Integrity. Database Security. DBMS Security Support. Privileges in SQL. Permissions and Privilege.
In This Lecture Database Systems Lecture 14 Natasha Alechina Database Security Aspects of security Access to databases Privileges and views Database Integrity View updating, Integrity constraints For more
More information