1 Variable Elimination in Bayesian Networks

Size: px
Start display at page:

Download "1 Variable Elimination in Bayesian Networks"

Transcription

1 CS 440: Introduction to Artificial Inttelligence Lecture date: 12 Feruary 2008 Instructor: Eyal Amir Guest Lecturer: Mark Richards 1 Variale Elimination in Bayesian Networks Review: Inference Given a joint proaility distriution over variales a set of variales X X 1, X 2,..., X n, we can make inferences of the form (Y Z), where Y X is the set of query variales, Z X are the evidence variales. The other variales H (those not mentioned in the query) are called hidden variales. To e clear, X Y Z H. The most naive and expensive way to do inference is to use the full joint proaility distriution and sum out the hidden variales. By the product rule, P (Y Z)P (Z) P (Y, Z). (Note that this is true for any distriution. This does not have anything to do with independence.) So to answer the query P (Y Z), we can compute P (Y,Z) P (Z). Note that P (Y, Z) H P (Y, Z, H). From the view of the full joint proaility tale, we are summing the proailities for all of the entries in the tale that match the values of the query variales and evidence variales (this includes entries for all of the cominations of values for the hidden variales) and dividing y the sum of all the entries that match the values of the evidence variales. (Note that the values in the first sum are a suset of the values in the latter sum.) This method is straightforward conceptually ut has many prolems. First, you have to compute and store the values in the full joint distriution. The numer of entries is i Options(X i), where Options(X i ) is the numer of different values that variale X i may have. So for n Boolean variales, the full joint has 2 n entries. For large networks, it is unreasonale to store/compute this many values. Furthermore, if a query requires summing out most of the variales, the time complexity is O(2 n ) as well. Normalizing Suppose we have variales A and B. We want to compute P (A ). We use to denote B true. The result of our query P (A, ) is a two-element tale that specifies P (a, ) and P ( a, ).Since P (A )P () P (A, ), we can compute P (A ) P (A,) P (). But we also know that P () P (a, ) + P ( a, ). Since we need oth P (a, ) and P (, ) to answer the query, this may actually e the est way to compute P (). The way this is expressed in the ook is that P (A ) αp (A, ), where α is a normalizing constant that makes the values in the tale P (A ) sum to 1. (In this case, α is P (), ut the idea is that it doesn t matter what it is; we just know that we need to normalize to make sure that the values in P (A ) sum to 1. Enumeration Using the urglar alarm network, suppose we wish to compute the proaility that there is an earthquake, given that oth John and Mary call: P (E j, m) αp (E, j, m)

2 We need to sum over all the values of the hidden vars: αp (E, j, m) a P (E, j, m,, a) This may e a slight ause of notation. The lower case j, m mean that JohnCalls true and MaryCalls true. The lowercase, a mean that we are summing over all values of the variales B, A. So now we have a sum over entries from the full joint. We can retrieve these using our Bayesian network structure: P (E, j, m,, a) a P ()P (E)P (a, E)P (j a)p (m a) a In general, sums of this form could take O(n2 n ) time to compute. There may e n values to multiply together to compute each product term, and up to O(2 n ) total terms to sum up. We can save some computations y pushing the s inward as much as possile: P ()P (E)P (a, E)P (j a)p (m a) P (E) a P () a P (a, E)P (j a)p (m a) We need to do this sum oth for E true and E false. For the first case: ( ) P () (P (a, e)p (j a)p (m a) + P ( a, e)p (j a)p (m a)) + P (e) P ( ) (P (a, e)p (j a)p (m a) + P ( a, e)p (j a)p (m a)) Even here, we can see some wasted computations: the product P (j a)p (m a) is computed twice, and so is P (j a)p (m a). In this example, we do two extra multiplications, which is no ig deal. But in a large network, this kind of waste can e deilitating. Variale Elimination (We follow Section 14.4 in Russell-Norvig with some additional details.) Here we introduce a variale elimination algorithm that will help us avoid the duplicate computations; it is a form of dynamic programming. We introduce tales called factors to help us do the ookkeeping. Initially, we will have one factor for each CPT term in our expression: E f E (E) T.002 F.998 α P (E) }{{} E T.001 F.999 P () P (a, E) P (j a) P (m a) }{{}}{{}}{{}}{{} a B A J M A B E f A (A, B, E) T T T.95 T T F.94 T F T.29 T F F.001 F T T.05 F T F.06 F F T.71 F F F.999 A f J (A) T.9 F.05 A f M (A) T.7 F.01

3 The initial tales store the values from the CPTs that we will need over the course of the query evaluation. The factor for E, denoted f E (E), is a two-element vector ecause we will e computing oth P (e, j, m) and P ( e, j, m) (we will normalize at the end to compute P (e j, m) and P ( e j, m)). The suscript E names the factor, and the (E) means that the value of E varies in the factor. The factor for B is also a two-element vector f B (B), ecause we will need to sum out the variale B. The factor f A (A, B, E) requires elements ecause we will need all cominations of values for A, B, and E in the expression. And even though J and M oth have parents in the network, the factors f J (A) and f M (A) have only two elements ecause throughout the expression, we are only interested in cases where JohnCalls true and MaryCalls true. There are two operations that we need to e ale to perform on factors: multiplication and summing out. The multiplication operation is similar to a natural join on dataase tales, as opposed to a matrix multiplication or an element-y-element multiplication. The set of variales in the product of two factors is the union of the sets of variales in the operands. In the product factor, there will e one entry for every comination of values for variales in the resulting set. The value of each entry is the product of the entries in the original tales that match the values for all relevant variales. For example, consider the product f JM (A) f J (A)f M (A): A f JM (A) T.9 *.7 F.05 *.01 A f J (A) T.9 F.05 A f M (A) T.7 F.01 The union of variales in the operands is A. The entry for T in the resulting tale is the product of the entries where A T rue in the operands. Now consider f AJM (A, B, E) f A (A, B, E)f JM (A). A B E f AJM (A, B, E) T T T.95 *.63 T T F.94 *.63 T F T.29 *.63 T F F.001 *.63 F T T.05 *.0005 F T F.06 *.0005 F F T.71 *.0005 F F F.999 *.0005 A B E f AJM (A, B, E) T T T.95 T T F.94 T F T.29 T F F.001 F T T.05 F T F.06 F F T.71 F F F.999 A f JM (A) T.63 F.0005 The entry for A T, B T, E T in f AJM (A, B, E) is the product of corresponding entries from f A (A, B, E) where A T, B T, E T and from f J M(A) where A T (since B, E do not appear in f J M(A). In general, we have f(x 1,..., X j, Y 1,..., Y k, Z 1..., Z l ) f 1 (X 1,..., X j, Y 1,..., Y k )f 2 (Y 1,..., Y k, Z 1,..., Z l ) The factors f 1 and f 2 share common variales Y. If f 1 has a total of j + k variales and f 2 has k + l variales, then the product will have j + k + l variales. Each entry in the result will have all the variales X Y Z and the entry for a particular valuation of X, Y, Z will e the product of the entry in f 1 that has the same values for X, Y and the entry in f 2 that has the same values for Y, Z.

4 The other operation we need for factors is summing out. If, for example, we sum out A from f AJM (A, B, E), the resulting factor will e named f ĀJM (B, E) (with the ar on the A in the suscript denoting that A was summed out). There is one entry in f ĀJM (B, E) for each comination of values of B, E in f AJM (B, E). The value of the entry is the sum of all entries in f AJM (B, E) that have the same values of B, E (ut differing values of A): B E f ĀJM (B, E) T T.95 * * T F.94 * * F T.29 * * F F.001 * * We are now ready to compute the answer to our query: αp (E) P () a P (a, e)p (j a)p (m a) αf E (E) B f B(B) a f A(A, B, E)f J (A)f m (A) αf E (E) B f B(B) a f A(A, B, E)f JM (A) αf E (E) B f B(B) a f AJM(A, B, E) αf E (E) B f B(B)f ĀJM (B, E) αf E (E) B fbājm(b, E) αf E (E)f BĀJM (E) αf E BĀJM (E) We have already computed f ĀJM, so we can proceed from step 5, where we compute fbājm(b, E): B E f B ĀJM (B, E) T T.5985 *.001 T F.5922 *.001 F T.1830 *.999 F F *.999 T.001 F.999 B E f ĀJM (B, E) T T.5985 T F.5922 F T.1830 F F Next, we sum out B to produce f BĀJM (E). E f BĀJM (E) T F * Now we compute f E BĀJM (E): E f BĀJM (E) T.1834 * F * E f E (E) T.002 F.998 E f BĀJM (E) T.1834 F

5 So we have αf E BĀJM (E) α , ,.8228, or in other words, P (e j, m) Another Example Using the Bayesian Network from Homework 2 Prolem 3, we will compute P (E d): P (E d) αp (E, d) α a,,c P (a,, c, E, d) α a P (a) c P (c a) P ()P (d )P (E, c) α a f A(A) c f C(A, C) f B(B)f D (B)f E (B, C, E) α a f A(A) c f C(A, C) f BDE(B, C, E) α a f A(A) c f C(A, C)f BDE (C, E) α a f A(A) c f C BDE (A, C, E) α a f A(A)f C BDE (A, E) α a f A C BDE (A, E) αf Ā C BDE (E) The only variale in the expression that is fixed is D. So the initial factors are: A f A (A) T.3 F.7 A C f C (A, C) T T.2 T F.8 F T.4 F F.6 T.8 F.2 B f D (B) T.1 F.6 B C E f E (B, C, E) T T T.5 T T F.5 T F T.9 T F F.1 F T T.4 F T F.6 F F T.7 F F F.3 We can compute f BDE (B, C, E) from the rightmost three factors in one step: B C E f BDE (B, C, E) T T T.8 *.1 *.5.04 T T F.8 *.1 *.5.04 T F T.8 *.1 * T F F.8 *.1 * F T T.2 *.6 * F T F.2 *.6 * F F T.2 *.6 * F F F.2 *.6 * T.8 F.2 B f D (B) T.1 F.6 B C E f E (B, C, E) T T T.5 T T F.5 T F T.9 T F F.1 F T T.4 F T F.6 F F T.7 F F F.3 Now we sum out B:

6 C E f BDE (C, E) T T T F F T F F Next, we compute f C BDE (A, C, E): A C E f C BDE (A, C, E) T T T.2 * T T F.2 * T F T.8 * T F F.8 * F T T.4 * F T F.4 * F F T.6 * F F F.6 * A C f C (A, C) T T.2 T F.8 F T.4 F F.6 C E f BDE (C, E) T T.088 T F.112 F T.156 F F.044 Now we sum out C: A E f C BDE (A, E) T T T F F T F F Next, we compute f A C BDE (A, E): A E f A C BDE (A, E) T T.3 * T F.3 * F T.7 * F F.7 * A f A (A) T.3 F.7 A E f C BDE (A, E) T T.1424 T F.0576 F T.1288 F F.0712 Then we sum out A E f Ā C BDE (A, E) T F Finally, αf Ā C BDE (E) α.13288, , So P ( e d) In these small-network examples, it may seem like the variale elimination algorithm actually requires more work than enumeration. But in some large networks, the computational savings can e large. The complexity of variale elimination depends on the size of the largest factor that must

7 e created during the computation. This in turn depends on the order in which the variales are eliminated. In polytree networks with a consistent ordering of the variales (i.e., a parent comes efore any of its children), the time and space complexity is linear in the size of the network.

Bayesian Networks. Mausam (Slides by UW-AI faculty)

Bayesian Networks. Mausam (Slides by UW-AI faculty) Bayesian Networks Mausam (Slides by UW-AI faculty) Bayes Nets In general, joint distribution P over set of variables (X 1 x... x X n ) requires exponential space for representation & inference BNs provide

More information

CHAPTER 13 SIMPLE LINEAR REGRESSION. Opening Example. Simple Regression. Linear Regression

CHAPTER 13 SIMPLE LINEAR REGRESSION. Opening Example. Simple Regression. Linear Regression Opening Example CHAPTER 13 SIMPLE LINEAR REGREION SIMPLE LINEAR REGREION! Simple Regression! Linear Regression Simple Regression Definition A regression model is a mathematical equation that descries the

More information

1 Symmetries of regular polyhedra

1 Symmetries of regular polyhedra 1230, notes 5 1 Symmetries of regular polyhedra Symmetry groups Recall: Group axioms: Suppose that (G, ) is a group and a, b, c are elements of G. Then (i) a b G (ii) (a b) c = a (b c) (iii) There is an

More information

Online appendix for Innovation, Firm Dynamics, and International Trade

Online appendix for Innovation, Firm Dynamics, and International Trade Online appendi for Innovation, Firm Dynamics, and International Trade Andrew Atkeson UCLA and Ariel Burstein UCLA, Feruary 2010 1 This appendi is composed of two parts. In the first part, we provide details

More information

Basics of Statistical Machine Learning

Basics of Statistical Machine Learning CS761 Spring 2013 Advanced Machine Learning Basics of Statistical Machine Learning Lecturer: Xiaojin Zhu jerryzhu@cs.wisc.edu Modern machine learning is rooted in statistics. You will find many familiar

More information

10.1 Systems of Linear Equations: Substitution and Elimination

10.1 Systems of Linear Equations: Substitution and Elimination 726 CHAPTER 10 Systems of Equations and Inequalities 10.1 Systems of Linear Equations: Sustitution and Elimination PREPARING FOR THIS SECTION Before getting started, review the following: Linear Equations

More information

2) Write in detail the issues in the design of code generator.

2) Write in detail the issues in the design of code generator. COMPUTER SCIENCE AND ENGINEERING VI SEM CSE Principles of Compiler Design Unit-IV Question and answers UNIT IV CODE GENERATION 9 Issues in the design of code generator The target machine Runtime Storage

More information

QUADRATIC EQUATIONS EXPECTED BACKGROUND KNOWLEDGE

QUADRATIC EQUATIONS EXPECTED BACKGROUND KNOWLEDGE MODULE - 1 Quadratic Equations 6 QUADRATIC EQUATIONS In this lesson, you will study aout quadratic equations. You will learn to identify quadratic equations from a collection of given equations and write

More information

Real-time Targeted Influence Maximization for Online Advertisements

Real-time Targeted Influence Maximization for Online Advertisements Real-time Targeted Influence Maximization for Online Advertisements Yuchen Li Dongxiang Zhang ian-lee Tan Department of Computer Science School of Computing, National University of Singapore {liyuchen,zhangdo,tankl}@comp.nus.edu.sg

More information

Math 312 Homework 1 Solutions

Math 312 Homework 1 Solutions Math 31 Homework 1 Solutions Last modified: July 15, 01 This homework is due on Thursday, July 1th, 01 at 1:10pm Please turn it in during class, or in my mailbox in the main math office (next to 4W1) Please

More information

Probability, Mean and Median

Probability, Mean and Median Proaility, Mean and Median In the last section, we considered (proaility) density functions. We went on to discuss their relationship with cumulative distriution functions. The goal of this section is

More information

Energy Analysis of Hadoop Cluster Failure Recovery

Energy Analysis of Hadoop Cluster Failure Recovery University of Nerasa - Lincoln DigitalCommons@University of Nerasa - Lincoln CSE Conference and Worshop Papers Computer Science and Engineering, Department of 2013 Energy Analysis of Hadoop Cluster Failure

More information

COMBINATION REVERSE ANNUITY CONTRACT AND CRITICAL ILLNESS INSURANCE

COMBINATION REVERSE ANNUITY CONTRACT AND CRITICAL ILLNESS INSURANCE COMBINATION REVERSE ANNUITY CONTRACT AND CRITICAL ILLNESS INSURANCE JOANNA DĘBICKA, AGNIESZKA MARCINIUK, BEATA ZMYŚLONA Wroclaw University of Economics, Faculty of Management, Information Systems Finance,

More information

Section 1.4. Lines, Planes, and Hyperplanes. The Calculus of Functions of Several Variables

Section 1.4. Lines, Planes, and Hyperplanes. The Calculus of Functions of Several Variables The Calculus of Functions of Several Variables Section 1.4 Lines, Planes, Hyperplanes In this section we will add to our basic geometric understing of R n by studying lines planes. If we do this carefully,

More information

Course 4 Examination Questions And Illustrative Solutions. November 2000

Course 4 Examination Questions And Illustrative Solutions. November 2000 Course 4 Examination Questions And Illustrative Solutions Novemer 000 1. You fit an invertile first-order moving average model to a time series. The lag-one sample autocorrelation coefficient is 0.35.

More information

Polynomials - Exponent Properties

Polynomials - Exponent Properties 5.1 Polynomials - Exponent Properties Ojective: Simplify expressions using the properties of exponents. Prolems with expoenents can often e simplified using a few asic exponent properties. Exponents represent

More information

Minimizing Probing Cost and Achieving Identifiability in Network Link Monitoring

Minimizing Probing Cost and Achieving Identifiability in Network Link Monitoring Minimizing Proing Cost and Achieving Identifiaility in Network Link Monitoring Qiang Zheng and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University E-mail: {quz3,

More information

Substitute 4 for x in the function, Simplify.

Substitute 4 for x in the function, Simplify. Page 1 of 19 Review of Eponential and Logarithmic Functions An eponential function is a function in the form of f ( ) = for a fied ase, where > 0 and 1. is called the ase of the eponential function. The

More information

Compression algorithm for Bayesian network modeling of binary systems

Compression algorithm for Bayesian network modeling of binary systems Compression algorithm for Bayesian network modeling of binary systems I. Tien & A. Der Kiureghian University of California, Berkeley ABSTRACT: A Bayesian network (BN) is a useful tool for analyzing the

More information

When Information Improves Information Security

When Information Improves Information Security When Information Improves Information Security Jens Grossklags a, Benjamin Johnson, and Nicolas Christin a School of Information, UC Berkeley, Cya, Carnegie Mellon University jensg@ischool.erkeley.edu

More information

Domain Adaptation meets Active Learning

Domain Adaptation meets Active Learning Domain Adaptation meets Active Learning Piyush Rai, Avishek Saha, Hal Daumé III, and Suresh Venkatasuramanian School of Computing, University of Utah Salt Lake City, UT 84112 {piyush,avishek,hal,suresh}@cs.utah.edu

More information

Magnetometer Realignment: Theory and Implementation

Magnetometer Realignment: Theory and Implementation Magnetometer Realignment: heory and Implementation William Premerlani, Octoer 16, 011 Prolem A magnetometer that is separately mounted from its IMU partner needs to e carefully aligned with the IMU in

More information

Data exchange. L. Libkin 1 Data Integration and Exchange

Data exchange. L. Libkin 1 Data Integration and Exchange Data exchange Source schema, target schema; need to transfer data between them. A typical scenario: Two organizations have their legacy databases, schemas cannot be changed. Data from one organization

More information

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012 Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about

More information

Orthogonal Projections

Orthogonal Projections Orthogonal Projections and Reflections (with exercises) by D. Klain Version.. Corrections and comments are welcome! Orthogonal Projections Let X,..., X k be a family of linearly independent (column) vectors

More information

1 Review of Least Squares Solutions to Overdetermined Systems

1 Review of Least Squares Solutions to Overdetermined Systems cs4: introduction to numerical analysis /9/0 Lecture 7: Rectangular Systems and Numerical Integration Instructor: Professor Amos Ron Scribes: Mark Cowlishaw, Nathanael Fillmore Review of Least Squares

More information

Non-Linear Regression 2006-2008 Samuel L. Baker

Non-Linear Regression 2006-2008 Samuel L. Baker NON-LINEAR REGRESSION 1 Non-Linear Regression 2006-2008 Samuel L. Baker The linear least squares method that you have een using fits a straight line or a flat plane to a unch of data points. Sometimes

More information

Number Who Chose This Maximum Amount

Number Who Chose This Maximum Amount 1 TASK 3.3.1: MAXIMIZING REVENUE AND PROFIT Solutions Your school is trying to oost interest in its athletic program. It has decided to sell a pass that will allow the holder to attend all athletic events

More information

Learning Outcomes. Computer Systems - Architecture Lecture 4 - Boolean Logic. What is Logic? Boolean Logic 10/28/2010

Learning Outcomes. Computer Systems - Architecture Lecture 4 - Boolean Logic. What is Logic? Boolean Logic 10/28/2010 /28/2 Lerning Outcomes At the end of this lecture you should: Computer Systems - Architecture Lecture 4 - Boolen Logic Eddie Edwrds eedwrds@doc.ic.c.uk http://www.doc.ic.c.uk/~eedwrds/compsys (Hevily sed

More information

3. The Junction Tree Algorithms

3. The Junction Tree Algorithms A Short Course on Graphical Models 3. The Junction Tree Algorithms Mark Paskin mark@paskin.org 1 Review: conditional independence Two random variables X and Y are independent (written X Y ) iff p X ( )

More information

Online Appendix: Bank Competition, Risk Taking and Their Consequences

Online Appendix: Bank Competition, Risk Taking and Their Consequences Online Appendix: Bank Competition, Risk Taking and Their Consequences Xiaochen (Alan) Feng Princeton University - Not for Pulication- This version: Novemer 2014 (Link to the most updated version) OA1.

More information

5 Double Integrals over Rectangular Regions

5 Double Integrals over Rectangular Regions Chapter 7 Section 5 Doule Integrals over Rectangular Regions 569 5 Doule Integrals over Rectangular Regions In Prolems 5 through 53, use the method of Lagrange multipliers to find the indicated maximum

More information

Lecture 2 Matrix Operations

Lecture 2 Matrix Operations Lecture 2 Matrix Operations transpose, sum & difference, scalar multiplication matrix multiplication, matrix-vector product matrix inverse 2 1 Matrix transpose transpose of m n matrix A, denoted A T or

More information

MATH10040 Chapter 2: Prime and relatively prime numbers

MATH10040 Chapter 2: Prime and relatively prime numbers MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

CS 3719 (Theory of Computation and Algorithms) Lecture 4

CS 3719 (Theory of Computation and Algorithms) Lecture 4 CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a

More information

Row Echelon Form and Reduced Row Echelon Form

Row Echelon Form and Reduced Row Echelon Form These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation

More information

*corresponding author

*corresponding author Key Engineering Materials Vol. 588 (2014) pp 249-256 Online availale since 2013/Oct/11 at www.scientific.net (2014) Trans Tech Pulications, Switzerland doi:10.4028/www.scientific.net/kem.588.249 Remote

More information

Betting on Permutations

Betting on Permutations Betting on Permutations Yiling Chen Yahoo! Research 45 W. 18th St. 6th Floor New York, NY 10011 Evdokia Nikolova CS & AI Laoratory Massachusetts Institute of Technology Camridge, MA 02139 Lance Fortnow

More information

DERIVATIVES AS MATRICES; CHAIN RULE

DERIVATIVES AS MATRICES; CHAIN RULE DERIVATIVES AS MATRICES; CHAIN RULE 1. Derivatives of Real-valued Functions Let s first consider functions f : R 2 R. Recall that if the partial derivatives of f exist at the point (x 0, y 0 ), then we

More information

AP Calculus AB 2003 Scoring Guidelines

AP Calculus AB 2003 Scoring Guidelines AP Calculus AB Scoring Guidelines The materials included in these files are intended for use y AP teachers for course and exam preparation; permission for any other use must e sought from the Advanced

More information

Solution to Homework 2

Solution to Homework 2 Solution to Homework 2 Olena Bormashenko September 23, 2011 Section 1.4: 1(a)(b)(i)(k), 4, 5, 14; Section 1.5: 1(a)(b)(c)(d)(e)(n), 2(a)(c), 13, 16, 17, 18, 27 Section 1.4 1. Compute the following, if

More information

Theory behind Normalization & DB Design. Satisfiability: Does an FD hold? Lecture 12

Theory behind Normalization & DB Design. Satisfiability: Does an FD hold? Lecture 12 Theory behind Normalization & DB Design Lecture 12 Satisfiability: Does an FD hold? Satisfiability of FDs Given: FD X Y and relation R Output: Does R satisfy X Y? Algorithm: a.sort R on X b.do all the

More information

Schema Design and Normal Forms Sid Name Level Rating Wage Hours

Schema Design and Normal Forms Sid Name Level Rating Wage Hours Entity-Relationship Diagram Schema Design and Sid Name Level Rating Wage Hours Database Management Systems, 2 nd Edition. R. Ramakrishnan and J. Gehrke 1 Database Management Systems, 2 nd Edition. R. Ramakrishnan

More information

December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS

December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B KITCHENS The equation 1 Lines in two-dimensional space (1) 2x y = 3 describes a line in two-dimensional space The coefficients of x and y in the equation

More information

Lecture 10: Distinct Degree Factoring

Lecture 10: Distinct Degree Factoring CS681 Computational Number Theory Lecture 10: Distinct Degree Factoring Instructor: Piyush P Kurur Scribe: Ramprasad Saptharishi Overview Last class we left of with a glimpse into distant degree factorization.

More information

Notes on Factoring. MA 206 Kurt Bryan

Notes on Factoring. MA 206 Kurt Bryan The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor

More information

Traditional Inventory Models in an E-Retailing Setting: A Two-Stage Serial System with Space Constraints

Traditional Inventory Models in an E-Retailing Setting: A Two-Stage Serial System with Space Constraints Traditional Inventory Models in an E-Retailing Setting: A Two-Stage Serial System with Space Constraints Russell Allgor, Stephen Graves, and Ping Josephine Xu Amazon.com MIT Astract In an e-retailing setting,

More information

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 Proofs Intuitively, the concept of proof should already be familiar We all like to assert things, and few of us

More information

Math 202-0 Quizzes Winter 2009

Math 202-0 Quizzes Winter 2009 Quiz : Basic Probability Ten Scrabble tiles are placed in a bag Four of the tiles have the letter printed on them, and there are two tiles each with the letters B, C and D on them (a) Suppose one tile

More information

An Enquire guide for children and young people. What happens when you can t go to school?

An Enquire guide for children and young people. What happens when you can t go to school? An Enquire guide for children and young people What happens when you can t go to school? Contents Introduction 3 Your right to education 4 Why you may not e at school 5 Getting support when you are not

More information

T ( a i x i ) = a i T (x i ).

T ( a i x i ) = a i T (x i ). Chapter 2 Defn 1. (p. 65) Let V and W be vector spaces (over F ). We call a function T : V W a linear transformation form V to W if, for all x, y V and c F, we have (a) T (x + y) = T (x) + T (y) and (b)

More information

FACTORING ax 2 bx c. Factoring Trinomials with Leading Coefficient 1

FACTORING ax 2 bx c. Factoring Trinomials with Leading Coefficient 1 5.7 Factoring ax 2 bx c (5-49) 305 5.7 FACTORING ax 2 bx c In this section In Section 5.5 you learned to factor certain special polynomials. In this section you will learn to factor general quadratic polynomials.

More information

Key Words: Liquidity, Sequential Trade, Equity premium puzzle, participation puzzle

Key Words: Liquidity, Sequential Trade, Equity premium puzzle, participation puzzle LIQUIDITY, EQUITY PREMIUM AND PARTICIPATION Benjamin Eden * Vanderilt University and the University of Haifa Septemer 2007 I use price dispersion to model liquidity. Buyers may e rationed at the low price.

More information

Software Reliability Measuring using Modified Maximum Likelihood Estimation and SPC

Software Reliability Measuring using Modified Maximum Likelihood Estimation and SPC Software Reliaility Measuring using Modified Maximum Likelihood Estimation and SPC Dr. R Satya Prasad Associate Prof, Dept. of CSE Acharya Nagarjuna University Guntur, INDIA K Ramchand H Rao Dept. of CSE

More information

A Simple Cost-sensitive Multiclass Classification Algorithm Using One-versus-one Comparisons

A Simple Cost-sensitive Multiclass Classification Algorithm Using One-versus-one Comparisons Data Mining and Knowledge Discovery manuscript No. (will e inserted y the editor) A Simple Cost-sensitive Multiclass Classification Algorithm Using One-versus-one Comparisons Hsuan-Tien Lin Astract Many

More information

Computer Science 281 Binary and Hexadecimal Review

Computer Science 281 Binary and Hexadecimal Review Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two

More information

6. LECTURE 6. Objectives

6. LECTURE 6. Objectives 6. LECTURE 6 Objectives I understand how to use vectors to understand displacement. I can find the magnitude of a vector. I can sketch a vector. I can add and subtract vector. I can multiply a vector by

More information

Notes on Determinant

Notes on Determinant ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without

More information

18.06 Problem Set 4 Solution Due Wednesday, 11 March 2009 at 4 pm in 2-106. Total: 175 points.

18.06 Problem Set 4 Solution Due Wednesday, 11 March 2009 at 4 pm in 2-106. Total: 175 points. 806 Problem Set 4 Solution Due Wednesday, March 2009 at 4 pm in 2-06 Total: 75 points Problem : A is an m n matrix of rank r Suppose there are right-hand-sides b for which A x = b has no solution (a) What

More information

AN AMBIENT AIR QUALITY MONITORING NETWORK FOR BUENOS AIRES CITY

AN AMBIENT AIR QUALITY MONITORING NETWORK FOR BUENOS AIRES CITY AN AMBIENT AIR QUALITY MONITORING NETWORK FOR BUENOS AIRES CITY Laura Venegas and Nicolás Mazzeo National Scientific and Technological Research Council (CONICET) Department of Atmospheric and Oceanic Sciences.

More information

Lecture Note 1 Set and Probability Theory. MIT 14.30 Spring 2006 Herman Bennett

Lecture Note 1 Set and Probability Theory. MIT 14.30 Spring 2006 Herman Bennett Lecture Note 1 Set and Probability Theory MIT 14.30 Spring 2006 Herman Bennett 1 Set Theory 1.1 Definitions and Theorems 1. Experiment: any action or process whose outcome is subject to uncertainty. 2.

More information

Additional MBA Information. Business School Faculty of Management Sciences

Additional MBA Information. Business School Faculty of Management Sciences Additional MBA Information Business School Faculty of Management Sciences MBA Programme Welcome We would like to thank you for your enquiry aout our MBA Program. After sumission of your application, you

More information

The PageRank Citation Ranking: Bring Order to the Web

The PageRank Citation Ranking: Bring Order to the Web The PageRank Citation Ranking: Bring Order to the Web presented by: Xiaoxi Pang 25.Nov 2010 1 / 20 Outline Introduction A ranking for every page on the Web Implementation Convergence Properties Personalized

More information

2x + y = 3. Since the second equation is precisely the same as the first equation, it is enough to find x and y satisfying the system

2x + y = 3. Since the second equation is precisely the same as the first equation, it is enough to find x and y satisfying the system 1. Systems of linear equations We are interested in the solutions to systems of linear equations. A linear equation is of the form 3x 5y + 2z + w = 3. The key thing is that we don t multiply the variables

More information

Visa Smart Debit/Credit Certificate Authority Public Keys

Visa Smart Debit/Credit Certificate Authority Public Keys CHIP AND NEW TECHNOLOGIES Visa Smart Debit/Credit Certificate Authority Public Keys Overview The EMV standard calls for the use of Public Key technology for offline authentication, for aspects of online

More information

Fuld Skolerapport for Søhusskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 9. med reference Tilsvarende klassetrin i kommunen

Fuld Skolerapport for Søhusskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 9. med reference Tilsvarende klassetrin i kommunen Side 1 af 41 Side 2 af 41 Side 3 af 41 Side 4 af 41 Side 5 af 41 Side 6 af 41 Side 7 af 41 Side 8 af 41 Side 9 af 41 Side 10 af 41 Side 11 af 41 Side 12 af 41 Side 13 af 41 Side 14 af 41 Side 15 af 41

More information

Fuld Skolerapport for Hunderupskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 7. med reference Tilsvarende klassetrin i kommunen

Fuld Skolerapport for Hunderupskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 7. med reference Tilsvarende klassetrin i kommunen Side 1 af 43 Side 2 af 43 Side 3 af 43 Side 4 af 43 Side 5 af 43 Side 6 af 43 Side 7 af 43 Side 8 af 43 Side 9 af 43 Side 10 af 43 Side 11 af 43 Side 12 af 43 Side 13 af 43 Side 14 af 43 Side 15 af 43

More information

We shall turn our attention to solving linear systems of equations. Ax = b

We shall turn our attention to solving linear systems of equations. Ax = b 59 Linear Algebra We shall turn our attention to solving linear systems of equations Ax = b where A R m n, x R n, and b R m. We already saw examples of methods that required the solution of a linear system

More information

Automata and Computability. Solutions to Exercises

Automata and Computability. Solutions to Exercises Automata and Computability Solutions to Exercises Fall 25 Alexis Maciel Department of Computer Science Clarkson University Copyright c 25 Alexis Maciel ii Contents Preface vii Introduction 2 Finite Automata

More information

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a

More information

14:440:127 Introduction to Computers for Engineers. Notes for Lecture 06

14:440:127 Introduction to Computers for Engineers. Notes for Lecture 06 14:440:127 Introduction to Computers for Engineers Notes for Lecture 06 Rutgers University, Spring 2010 Instructor- Blase E. Ur 1 Loop Examples 1.1 Example- Sum Primes Let s say we wanted to sum all 1,

More information

Harmonic Associations in Kurtág s Chorale from Játékok, V

Harmonic Associations in Kurtág s Chorale from Játékok, V Pesca on Kurtág // Page! of 9! Harmonic Associations in Kurtág s Chorale from Játékok, V Daniel Pesca. ntroduction, form, and summary of linear structures György Kurtág s Játékok (Games) is an ongoing

More information

Stock Options and Capital Structure

Stock Options and Capital Structure y Richard D. MacMinn* and Frank H. Page** Revised March 996 *Department of Finance University of Texas Austin, Texas 52-47-4368 macminn@mail.utexas.edu **Department of Finance University of Alaama Tuscaloosa,

More information

LINEAR ALGEBRA W W L CHEN

LINEAR ALGEBRA W W L CHEN LINEAR ALGEBRA W W L CHEN c W W L Chen, 1997, 2008 This chapter is available free to all individuals, on understanding that it is not to be used for financial gain, and may be downloaded and/or photocopied,

More information

Problem Set II: budget set, convexity

Problem Set II: budget set, convexity Problem Set II: budget set, convexity Paolo Crosetto paolo.crosetto@unimi.it Exercises will be solved in class on January 25th, 2010 Recap: Walrasian Budget set, definition Definition (Walrasian budget

More information

Boolean Algebra Part 1

Boolean Algebra Part 1 Boolean Algebra Part 1 Page 1 Boolean Algebra Objectives Understand Basic Boolean Algebra Relate Boolean Algebra to Logic Networks Prove Laws using Truth Tables Understand and Use First Basic Theorems

More information

Exponents. Learning Objectives 4-1

Exponents. Learning Objectives 4-1 Eponents -1 to - Learning Objectives -1 The product rule for eponents The quotient rule for eponents The power rule for eponents Power rules for products and quotient We can simplify by combining the like

More information

Lecture Notes on Pitch-Class Set Theory. Topic 4: Inversion. John Paul Ito

Lecture Notes on Pitch-Class Set Theory. Topic 4: Inversion. John Paul Ito Lecture Notes on Pitch-Class Set Theory Topic 4: Inversion John Paul Ito Inversion We have already seen in the notes on set classes that while in tonal theory, to invert a chord is to take the lowest note

More information

1 Review of Newton Polynomials

1 Review of Newton Polynomials cs: introduction to numerical analysis 0/0/0 Lecture 8: Polynomial Interpolation: Using Newton Polynomials and Error Analysis Instructor: Professor Amos Ron Scribes: Giordano Fusco, Mark Cowlishaw, Nathanael

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

Linear Algebra I. Ronald van Luijk, 2012

Linear Algebra I. Ronald van Luijk, 2012 Linear Algebra I Ronald van Luijk, 2012 With many parts from Linear Algebra I by Michael Stoll, 2007 Contents 1. Vector spaces 3 1.1. Examples 3 1.2. Fields 4 1.3. The field of complex numbers. 6 1.4.

More information

Database Design and Normalization

Database Design and Normalization Database Design and Normalization Chapter 10 (Week 11) EE562 Slides and Modified Slides from Database Management Systems, R. Ramakrishnan 1 Computing Closure F + Example: List all FDs with: - a single

More information

Schema Refinement and Normalization

Schema Refinement and Normalization Schema Refinement and Normalization Module 5, Lectures 3 and 4 Database Management Systems, R. Ramakrishnan 1 The Evils of Redundancy Redundancy is at the root of several problems associated with relational

More information

CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team

CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team Lecture Summary In this lecture, we learned about the ADT Priority Queue. A

More information

Implementation of First-Best Allocations in Insurance Economies with Asymmetric information

Implementation of First-Best Allocations in Insurance Economies with Asymmetric information Implementation of First-Best Allocations in Insurance Economies with Asymmetric information Aristotelis Boukouras Kostas Koufopoulos This Version: 07 Octoer 2009 First Version: 24 July 2007 Astract In

More information

Bayesian Networks. Read R&N Ch. 14.1-14.2. Next lecture: Read R&N 18.1-18.4

Bayesian Networks. Read R&N Ch. 14.1-14.2. Next lecture: Read R&N 18.1-18.4 Bayesian Networks Read R&N Ch. 14.1-14.2 Next lecture: Read R&N 18.1-18.4 You will be expected to know Basic concepts and vocabulary of Bayesian networks. Nodes represent random variables. Directed arcs

More information

15.062 Data Mining: Algorithms and Applications Matrix Math Review

15.062 Data Mining: Algorithms and Applications Matrix Math Review .6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop

More information

Cooperation Strategies for Two Co-located receivers, with no CSI at the transmitter

Cooperation Strategies for Two Co-located receivers, with no CSI at the transmitter Cooperation Strategies for Two Co-located receivers, with no CSI at the transmitter Amichai Sanderovich, Avi Steiner and Shlomo Shamai (Shitz) Technion, Haifa, Israel Email: {amichi@tx,savi@tx,sshlomo@ee}.technion.ac.il

More information

Customer Relationship Management by Semi-Supervised Learning

Customer Relationship Management by Semi-Supervised Learning Middle-East Journal of Scientific Research 16 (5): 614-620, 2013 ISSN 1990-9233 IDOSI Pulications, 2013 DOI: 10.5829/idosi.mejsr.2013.16.05.930 Customer Relationship Management y Semi-Supervised Learning

More information

1 Introduction to Matrices

1 Introduction to Matrices 1 Introduction to Matrices In this section, important definitions and results from matrix algebra that are useful in regression analysis are introduced. While all statements below regarding the columns

More information

Nonlinear Programming Methods.S2 Quadratic Programming

Nonlinear Programming Methods.S2 Quadratic Programming Nonlinear Programming Methods.S2 Quadratic Programming Operations Research Models and Methods Paul A. Jensen and Jonathan F. Bard A linearly constrained optimization problem with a quadratic objective

More information

The Set Data Model CHAPTER 7. 7.1 What This Chapter Is About

The Set Data Model CHAPTER 7. 7.1 What This Chapter Is About CHAPTER 7 The Set Data Model The set is the most fundamental data model of mathematics. Every concept in mathematics, from trees to real numbers, is expressible as a special kind of set. In this book,

More information

Handout for three day Learning Curve Workshop

Handout for three day Learning Curve Workshop Handout for three day Learning Curve Workshop Unit and Cumulative Average Formulations DAUMW (Credits to Professors Steve Malashevitz, Bo Williams, and prior faculty. Blame to Dr. Roland Kankey, roland.kankey@dau.mil)

More information

On the generation of elliptic curves with 16 rational torsion points by Pythagorean triples

On the generation of elliptic curves with 16 rational torsion points by Pythagorean triples On the generation of elliptic curves with 16 rational torsion points by Pythagorean triples Brian Hilley Boston College MT695 Honors Seminar March 3, 2006 1 Introduction 1.1 Mazur s Theorem Let C be a

More information

Sequential Data Structures

Sequential Data Structures Sequential Data Structures In this lecture we introduce the basic data structures for storing sequences of objects. These data structures are based on arrays and linked lists, which you met in first year

More information

Hedging Illiquid FX Options: An Empirical Analysis of Alternative Hedging Strategies

Hedging Illiquid FX Options: An Empirical Analysis of Alternative Hedging Strategies Hedging Illiquid FX Options: An Empirical Analysis of Alternative Hedging Strategies Drazen Pesjak Supervised by A.A. Tsvetkov 1, D. Posthuma 2 and S.A. Borovkova 3 MSc. Thesis Finance HONOURS TRACK Quantitative

More information

Using a table of derivatives

Using a table of derivatives Using a table of derivatives In this unit we construct a Table of Derivatives of commonly occurring functions. This is done using the knowledge gained in previous units on differentiation from first principles.

More information

University of Lille I PC first year list of exercises n 7. Review

University of Lille I PC first year list of exercises n 7. Review University of Lille I PC first year list of exercises n 7 Review Exercise Solve the following systems in 4 different ways (by substitution, by the Gauss method, by inverting the matrix of coefficients

More information

In This Lecture. Security and Integrity. Database Security. DBMS Security Support. Privileges in SQL. Permissions and Privilege.

In This Lecture. Security and Integrity. Database Security. DBMS Security Support. Privileges in SQL. Permissions and Privilege. In This Lecture Database Systems Lecture 14 Natasha Alechina Database Security Aspects of security Access to databases Privileges and views Database Integrity View updating, Integrity constraints For more

More information