Measuring Similarity between Graphs Based on the Levenshtein Distance

Size: px
Start display at page:

Download "Measuring Similarity between Graphs Based on the Levenshtein Distance"

Transcription

1 Appl. Mth. Inf. Sci. 7, No. 1L, (01) 169 Applied Mthemtics & Informtion Sciences An Interntionl Journl Mesuring Similrity etween Grphs Bsed on the Levenshtein Distnce Bin Co, ing Li nd Jinwei in College of Computer Science nd Technology, hejing University, Hngzhou, Chin 1007 Received: 0 Oct. 01, Revised: 9 Nov. 01, Accepted: 11 Dec. 01 Pulished online: 1 Fe. 01 Astrct: Grph dt hs een commonly used nd widely reserched oth in cdemi nd industry for mny pplictions. And mesuring similrity etween grphs (i.e., grph mtching) is the essentil step for grph serching, pttern recognition nd mchine vision. At present, the most widely used pproch to ddress the grph mtching prolem is grph edit distnce (GED). However, the computtion complexity of GED is expensive nd it tkes uncceptle time when the grph ecomes lrger. Generlly, grph could e cnonicl leled y some sort of strings nd we use the depth-first serch (DFS) code s our cnonicl leling system. Bsed on DFS codes, comining the Levenshtein distnce (i.e., string edit distnce, SED), we proposed novel method for similrity mesurement of grphs. Processing nd clculting the distnce etween two DFS codes, we turned the grph mtching prolem into string mtching, which gins gret improvement on the mtching performnce. The experimentl results prove its usefulness. Keywords: Grph mtching, similrity, depth-first serch (DFS), Levenshtein distnce 1. Introduction As one of the most powerful structures, grphs cn contin richer informtion thn other dt structures nd they hve een widely investigted nd pplied in rod rnge of res. Especilly, grphs which re leled nd/or ttriuted cn e used to strct nd model mny complicted reltions mong dt. When using grphs for representtion, vertices usully represent regions (or fetures) of the ojects nd edges etween them represent the reltions etween region. For exmple, World Wide We (WWW) cn e viewed s grph in which vertices correspond to sttic pges nd edges correspond to links etween pges [1]. In usiness process, the leled grphs re commonly used to model the rel usiness opertions nd the usiness ctivities re represented y the vertices of the grphs. Since mny prolems could e solved more esily sed on grphs, people hve collected vst mounts of grph dt nd estlished grph dtse for different purposes. Menwhile, the cdemic communities hve pid lot of ttentions on grph relted reserches. Among which, mesuring the similrity etween grphs is one of the hottest topics nd it is the foundtion for mny other reserches or pplictions. For exmple, to support sclle grph serch over lrge grph dtses in ioinformtics [], chemicl informtics [], nd even in usiness process mngement [], it is essentil to mtch the grphs y mesuring their similrities. Up to now, the most widely ccepted method for grph similrity mesurement is grph edit distnce (GED) [5]. The sic ide of GED is to sum the cost of elementry error-correcting opertions: node sustitution, node insertion/deletion, edge insertion/deletion. And the miniml cost tken over ll opertions is the edit distnce etween two grphs. Bsed on GED, numer of pproches hve een proposed [6 9]. Unfortuntely, the prolem of GED is NP-hrd in generl nd its min drwck is the exponentil computtionl complexity in terms of the numer of grph edit vertices [8]. Thus,.eng et l.[8] introduce notion of so clled str representtion for grph structures nd propose three novel methods to otin lower nd upper ounds of GED in polynomil time. However, their lower ound of computtionl complexity is in O(n ) which is still kind of expensive for computtion involving lrge mount of grphs.. n et l. [9] propose feture-sed method for similrity serch in grph structures. They use indexed fetures in grph dtse to filter grphs without performing pirwise similrity Corresponding uthor e-mil: [email protected]

2 170 B. Co,. Li, J. in: Mesuring similrity etween grphs... computtion. But they still turn to GED for mesuring similrity when grph mtching is needed. In order to improve the efficiency of grph mtching prolem, in this pper we propose novel method for mesuring the similrity etween two grphs. The strt point of our method is the depth-first serch code (DFS code)[10] nd insted of GED mesurements, we use Levenshtein [11] distnce (i.e., string edit distnce, SED) to mesure the similrity etween two grphs. The computtion for SED is in O(n ) time which mkes our method pplicle in prctice. The rest of this pper is orgnized s follows. Section will formlly present some sic definitions for ccurte description of grphs, DFS code, SED, nd etc. Then the implementtion detils will e presented in Section. The experimentl evlutions re studied in Section. Section 5 concludes the pper nd presents some future work.. Bsic Definitions In our pper, we consider grphs with leled nodes nd edges. And we present some sic definitions s follows. Definition 1(Leled Grph). A leled grph is tuple G=(V,E,L V,L E,l), where V is set of finite vertices nd E V V is set of edges.l V nd L E denote the finite sets of vertex nd edge lels. l is the mpping function for lels. From Definition 1, since the edge is denoted y two nodes, if there is n order etween these two nodes then this is directed grph, otherwise, n undirected grph. Besides, if V(G 1 ) = V(G ) nd E(G 1 ) = E(G ), we consider grph G 1 nd G re the sme. And G 1 is isomorphic to G (i.e., G 1 = G ) if they shre the sme structure. Definition (Grph Isomorphism). Let G nd G e two grphs. A grph isomorphism etween G nd G is ijective mpping f : V(G) V(G ) such tht: u V,(l(u)=l ( f(u))) u,v V,((u,v) E ( f(u), f(v)) E ) nd (u,v) E,(l(u,v)=l ( f(u), f(v))) As shown in Figure 1, G 1, G nd G hve the sme numer of nodes nd edges. Besides, ech edge in G 1, G nd G is sme since their corresponding strt nd end nodes re sme. Through replcing the nodes in G 1, G 1 could e redrwn to G. Clerly, the difference mong G 1, G nd G is the wy of leling nd drwing the grphs. Tht is to sy, they hve the sme structure nd they re merely different forms of certin grph which is just -circles grph. From Figure 1, we cn see tht: (1) x in G corresponds to y 1 in G, () y 1 in G corresponds to x in G. Apprently, since the mpping etween nodes in G nd G is not unique, there re other mppings existed. And other drwings for G could e found. x 1 x x 1 x 1 G 1 y y G G 1 y 1 y x y Figure 1 Three isomorphic grphs In other words, if the topology of two grphs is sme, then these two grphs re isomorphic. The isomorphism is very common in grph dt. Under some circumstnces, such s frequent sugrph mining, the isomorphic grphs should e pruned for the reson of efficiency. As for our work, since isomorphic grphs could e viewed s the sme grphs, we needn t mtch ll the grphs one y one. Insted, choosing one of the sme grphs to mesure is resonle. Thus, efore mesuring the similrity, we hve to exmine the grph isomorphism. In order to solve the isomorphism prolem, we need to clculte the cnonicl lels of two grphs. The cnonicl lel for grph (denoted s cl(g)) is unique code which is sequence of ytes, chrcters or numers. It is irreltive with the order of vertices nd edges of the grph G nd totlly depends on the topology of G. If the cnonicl lels of two grphs re the sme, then these grphs re isomorphic to ech other. There re few cnonicl leling methods tht hve een pplied, for exmple, conctenting rows or columns of the djcency mtrix of grph. In our work, we introduce the depth-first serch code (DFS code), which first mentioned in gspn [10] lgorithm, s the foundtion of our cnonicl leling system. Next, we present the necessry informtion of DFS code nd more detils refer to gspn [10]. Depth-first serch is well-known nd populrly pplied in grph lgorithms nd it consumes less memory thn redth-first serch (BFS). When performing depth-first serch in grph, DFS tree would e constructed. The DFS trees of one grph mye vrious, which is determined y the visiting order of the vertices in the grph. Thus, we cn t exmine the isomorphism of two grphs y DFS sequences. Adopting the DFS lexicogrphic order nd the minimum DFS code s the cnonicl leling cn solve this prolem. First of ll, we present the definition of DFS suscripting s follows. Definition (DFS Suscripting). When uilding DFS tree T, the depth-first discovery of the vertices forms liner order. The suscripts re used to record this order, where i< j mens v i is visited efore v j when the DFS is performed. G T represents grph G suscripted with T. T is clled DFS suscripting of G. We cll v 0, the strting vertex in T, the root. The vertex v n which visited lst is clled the rightmost vertex. The stright pth from v 0 to v n is clled the rightmost pth. As shown in Figure, the vertex lels re, nd while the edges lels re nd. The drkened edges in x y 1

3 Appl. Mth. Inf. Sci. 7, No. 1L, (01) / v 0 v 1 v v v 0 v 1 v v v 0 v 1 v v () () (c) (d) Figure The smple of DFS suscripting Figure () to Figure (d) represent three different DFS trees for the grph of Figure () nd they generte three different suscriptings. The rightmost pth for Figure () is (v 0,v 1,v ) nd (v 0,v 1,v,v ) is for Figure (c) nd Figure (d). Definition (Rightmost Extension). Given grph G nd its DFS tree T, we hve: Bckwrd extension: new edge cn e dded etween the rightmost vertex nd nother vertex on the rightmost pth. Forwrd extension: new vertex cn e introduced nd connected to vertex on the rightmost pth. Since oth kinds of ove extensions tke plce on the rightmost pth, we cll them rightmost extension. Tking Figure (c) s n exmple, since the edges lredy exist etween v 1, v nd v, the ckwrd extension cndidtes cn e (v,v 0 ) nd the forwrd extension cndidtes cn e edges extending from v 0, v 1, v or v, with new vertex introduced. The ll potentil rightmost extensions of Figure (c) re shown in Figure. The dshed lines represent the extensions. Among which, Figure () nd () oth extend from the rightmost vertex (i.e., v ) while Figure (c) to (d) re extend from other vertices on the rightmost pth. Anywy, ckwrd extension cn only occur on the rightmost vertex nd forwrd extension tkes plce on the vertex which elongs to the rightmost pth. void the extension of the sme grphs (i.e., isomorphic grphs), we hve to choose one se suscripting nd conduct rightmost extension on it. Definition 5(DFS Code). Given DFS tree T for grph G, sed on rightmost extension, the suscripted grph G T could e trnsformed to n edge sequence e i (i = 0,..., E 1). e i is clled DFS code, denoted s DFSCode(G,T). Bsed on Definition 5, there is ijective mpping etween suscripted grph nd DFS code. Besides, since there re vrious edge sequences for given grph G, we cn uild n order etween these sequences nd select the suscripting which genertes the minimum sequence s the suscripting of G. This order could lso e pplied to DFS codes nd we present it s follows. Definition 6(DFS Lexicogrphic Order). Let n edge e 5-tuple:(i, j,l i,l (i, j),l j ), where li nd l j re the lels of v i nd v j, respectively, nd l (i, j) is the lel of the edge connecting them. Given vertex v, the edge order is tht: All of its ckwrd edges should pper just efore its forwrd edges. If v does not hve ny forwrd edge, we put its ckwrd edges fter the forwrd edge, where v is the second vertex. Let the edge order tke the first priority, the vertex lel l i tke the second priority, the edge lel l ( i, j) tke the third nd the vertex lel l j tke the fourth to determine the order of two edges. The ordering sed on ove rules is clled DFS lexicogrphic order. From Definition 6 it follows tht, the complete sequence for Figure (c) is (0,1),(1,),(,),(,1). The DFS codes for Figure () to (d) re shown in Tle 1. We cn see from Tle 1 tht the first edges of the DFS codes re (0,1,,,),(0,1,,,) nd (0,1,,,). Since they hve the sme suscript (0,1) nd no edge order exists etween them, we cn t use it to tell the difference mong them. However, using the rest priorities of lel informtion we hve (0,1,,,) < (0,1,,,) < (0,1,,,). Therefore, c < c c < c d is the order for the DFS codes listed in Tle 1. () () (c) (d) (e) Figure The rightmost extension for Figure (c) As mentioned efore, it is likely tht one grph my hve more thn one DFS trees/suscriptings. In order to Tle 1 DFS codes for Figure () to (d) edge c c c c d e 0 (0,1,,,) (0,1,,,) (0,1,,,) e 1 (1,,,,) (1,,,,) (1,,,,) e (1,,,,) (,,,,) (,0,,,) e (,0,,,) (,1,,,) (,,,,)

4 17 B. Co,. Li, J. in: Mesuring similrity etween grphs... Definition 7(Minimum DFS Code). Given grph G, C(G) = {(DFSCode(G, T)) T, T is DFS tree for G}, sed on DFS lexicogrphic order, the minimum element of C(G) is clled minimum DFS code, denoted s mindfscode(g). According to Definition 7, the minimum DFS code of Figure () is c shown in Tle 1. Wht is more, we cn infer the following importnt reltionship etween the minimum DFS codes nd isomorphic grphs. Property 1.Given two grphs G nd G, we hve: G 1 = G mindfscode(g)=mindfscode(g ) Proof: : Since G is isomorphic to G, ccording to Definition 1, G nd G is one-to-one mpped under some certin function: f : V(G) V(G ). Thus, sed on the mpping etween E(G) nd E(G ) nd Definition 5, we cn infer the mpping of DFSCode(G,T) DFSCode(G,T). Nturlly, we hve mindfscode(g) mindfscode(g ). The proof is similr to. On the sis of ove discussions, we cn use the minimum DFS code s the cnonicl lel of one grph. At the end of this section, we present the definition of the Levenshtein distnce (i.e., string edit distnce, SED). Definition 8(String Edit Distnce, SED). Given two strings x nd y. The string edit distnce of x nd y, denoted s SED(x, y), is the minimum numer of insertions, deletions nd sustitutions to trnsform x into y. Since the cnonicl lel of grph is the minimum DFS code which could e viewed s string, we cn mesure the similrity etween two grphs y conducting string edit distnce (SED) clcultion on their minimum DFS codes. Thus, we turn the grph mtching prolem into string mtching prolem which is much esier to solve. Wht is more, the string edit distnce gurntees the efficiency of our work. Bsed on the definitions introduced in this section, we present the implementtion detils in the following section.. Implementtion In this section, we discuss the implementtion detils of mesuring similrity etween grphs sed on the DFS code mentioned in Section. Note tht, we view the grph which is used to mtch ginst the grph dtse s the source grph. According to the rel requirements of different ppliction scenrios, we cn divide our implementtion into two min phses which re preprocessing nd mtching. Preprocessing phse is performed offline while mtching is online. Usully, people py much ttention to mtching phse since it hs direct influences on user experiences driven y efficient performnce. Firstly, we present the pseudo code of preprocessing phse in Algorithm 1. Algorithm 1 The lgorithm for preprocessing phse Input: Grph dtse (GD) Output: The minimum DFS codes for GD: M 1 ; the orders of node lels nd edge lels: N,E 1: Initilize two mp structures: M 1 nd M : N get order of node lels in GD : E get order of edge lels in GD : for ech grph G in GD do 5: ID get the ID of G 6: code get mindfscode(g) y N nd E 7: M 1.put(ID,code) 8: end for 9: for ech record r in M 1 do 10: dd ID of r to the grph ID set: ID Set 11: for ech record r in M 1 {(ID,code)} do 1: if the code in r is sme with tht in r then 1: dd ID of r to the ID Set 1: M.put(code,ID Set) 15: end if 16: end for 17: end for 18: for ech record r=(code,id Set) in M do 19: code extrct two node lels of one edge in their ppering order from the code 0: end for As shown in Algorithm 1, the input for this phse is the grph dtse which my contin lrge numer of grphs. And this phse genertes three outputs: the minimum DFS codes for ll the grphs in the grph dtse; the orders of node lels nd edge lels. At first, we prse ech grph in the grph dtse nd produce two orders of ll the node lels nd edge lels existing in the grph dtse (line nd ). These orders re used for constructing the DFS code of the grphs in the following steps. By iterting the grphs in grph dtse (line -8), we get the ID nd the minimum DFS code of ech grph nd put them in mp. Then, we merge the sme codes in the grph dtse nd using n inverted key-vlue pir (i.e., the minimum DFS code is the key nd the vlue is grph IDs) to represent the DFS codes of the grph dtse (line 9-17). Thus, we put the sme or isomorphic grphs together nd we only select one of them for similrity mesurement, which is efficient for mtching. In fct, efore clculting the SED, we firstly preprocess the minimum DFS code for simplicity y extrcting the lels of two vertices of n edge in their ppering order (line 18-0). For exmple, the minimum DFS code of Figure () is (0,1,,,)(1,,,,)(1,,,,)(,0,,,) which would e extrcted to the string.

5 Appl. Mth. Inf. Sci. 7, No. 1L, (01) / 17 Besides, in order to correctly extrct the DFS code of the source grph nd conduct similrity mesurement etween grphs in online mtching, we must gurntee the consistency of the orders of node lels nd edge lels in the whole mtching procedure. Therefore, we record these orders nd output them for mtching phse. Then, we present the online mtching phse in Algorithm. Besides the results of the offline preprocessing phse, we dd the source grph s nother input. In this phse, we output the grph, of the grph dtse, which is most similr to the source grph. Algorithm The lgorithm for mtching phse Input: The minimum DFS codes for GD: M 1 ; the orders of node lels nd edge lels: N,E; source grph (G) Output: Grph G (G GD) which is most similr to G 1: Initilize one mp structure: M : code get mindfscode(g) y N nd E : for ech record(code,id Set) in M 1 do : filter the minimum DFS codes of code nd code 5: distnce clculte the SED(code,code ) 6: M.put(ID Set,distnce) 7: end for 8: Sort M y distnce vlues nd return the grph IDs of the smllest record of M From Algorithm we cn see tht, there re three steps in the mtching phse. The first step is to get the minimum DFS code for the source grph with the help of the orders of node lels nd edge lels generted in lst phse. Since this step is focus on only one grph, its computtion time is very short (line ). Secondly, we not only conduct the SED clcultion of DFS codes etween the source grph nd the grphs of the grph dtse ut lso put the set of grph IDs nd the clculted distnce into mp (line -7). This step costs most time of the mtching phse since we hve to mtch ech grph in the grph dtse. The time complexity of this step is O(m n ) where m represents the numer of the grphs in the grph dtse nd n is the numer of nodes the lrgest grph hs. Generlly, since m is much lrger thn n, the computtion time of this step is durle nd ccepted. At lst, we sort the mp y the vlue of distnce nd return the grph IDs of the smllest distnce (line 8). Notice tht, the SED of the minimum DFS codes etween two grphs cn t directly determine their similrity or distnce. Suppose tht the usiness process shown in Figure () is the source grph, Figure () nd (c) show two grphs in grph dtse. Compring with the source grph in (), the grphs in () nd (c) lck only one edge respectively, i.e., 1 nd 1, nd the rest nodes nd edges re sme. Thus, from the viewpoint of structure, they should hve the sme similrity to (). But, ccording to the minimum DFS codes shown in the figure, we hve SED(, )! = SED(, c). Grphs The Minimum DFS Codes: 1 11 () 1 1 () 1 1 (c) Figure The illustrtion for filtering the minimum DFS codes To solve this prolem, we filter the minimum DFS codes (line ) simplified in preprocessing phse. Since ech edge, in grph, represented y the DFS code hs een simplified to -tuple: (l i,l j ), the length of simplified minimum DFS code is the multiple of. Bsed on these tuples, we compre the codes of the source grph nd the grph in dtse. Then, remove the sme edges (DFS codes) in oth of them nd the rest codes re conducted SED clcultion. Note tht, fter exchnging two nodes of n edge, if this edge is sme with nother edge in other grphs, these two -tuples could e viewed sme too. Then, they would e removed from the code. As shown in Figure, to determine the similrity etween () nd (c), we could merely clculte the SED of two strings: 1 nd. Becuse, the edge could e turned to. nd 1 correspond to nd 1 for the sme rule. Bsed on the ove discussion, from Figure, we cn get: SED(, ) == SED(, c). To conclude this section, we preprocess the grph dtse y extrcting their minimum DFS codes. Then, we mesure the similrity etween grphs sed on these DFS codes with through string edit distnce technique. Furthermore, we implement prototype sed on the ove detils nd evlute its performnce. The experimentl results re present in the following section.. Evlution As mentioned efore, since the online mtching is much more concerned y the end users nd the offline preprocessing hs little contriution to the efficiency of mtching, we only study the performnce of the mtching phse implementtion in this section. In the following experiments, we compre our method (i.e., SED sed) with trditionl GED-sed nd oth of them re developed in Jv (Jdk1.6). GED-sed method is implemented in fst greedy wy nd its time complexity is O(n ). The sorting lgorithm for returning the smllest distnce is ule sort. And ll the tests re done on.6ghz Intel(R) Core(TM) Duo P800 PC with GB min memory, running Windows 7. The grph dtset we used here re generted syntheticlly. There re totlly different 6 vertex lels nd ech grph hs vertex size of 5 to 10. The model grph is rndomly selected from this dtset. Then, we mtch the model grph ginst ll dt grphs in the dtset. First of ll, we study the efficiency which is mesured y the time for mtching. We fix the numer of vertex in

6 17 B. Co,. Li, J. in: Mesuring similrity etween grphs... Mtching time (s) GED sed SED sed C1 C C Test cses (ID) () Size of 000 Mtching time (s) Figure 5 Tests on sizes of 000 nd GED sed SED sed C1 C C Test cses (ID) () Size of Mtching time (s) GED sed SED sed Vertex numer in model grph Figure 7 Mtching time under different model grph sizes the model grph to 5 nd oserve the mtching time for oth methods under different size, rnging from 000 to 10000, of grph dtse. For ech grph dtse, we use different model grphs (with sme vertex numer 5) s different test cses. As shown in Figure 5, under different size of grph dtse (i.e., Figure 5() nd Figure 5()), GED-sed method costs much more time for mtching thn tht of SED-sed method in ll test cses. This is ecuse tht the computtion time for GED-sed method is O(n ) while it is O(n ) for SED-sed. Apprently, GED-sed method would ecome less pplicle once the size of the grph dtse grows lrge. Tle shows verge mtching time for different grph dtse sizes. Clerly, s the dtse size increses, oth methods need more time for mtching. In ddition, we cn see from Figure 6 tht the mtching time of GED-sed method to tht of SED-sed rtio Tle Mtching time for different grph dtse sizes Dtse Size GED-sed (s) SED-sed (s) Mtching time rtio Grph dtse size Figure 6 Mtching time rtio for the model grph with 5 vertices Mtching time rtio Grph dtse size Figure 8 Mtching time rtio for different model grph sizes decreses with incresing size of grph dtse. Filtering the minimum DFS codes efore mtching is the cuse for this trend. In tests of Figure nd Figure 8, we fix the size of grph dtse to 6 nd study the efficiency under different model grphs with different vertex numer rnged from to 10. As shown in Figure, using our SED-sed method, the mtching time is lmost unchnged with very smll vlues of 0.1 seconds round. However, there is n pprent growth trend in the GED-sed method nd the mtching time grows fst s the vertex numer incresed. Tht is to sy, GED-sed method is more sensitive to the size of the model grph thn ours. The reson is tht GED-sed implementtion hs to serch the est result in ech step nd grow sed on the current est result. There re mny recursive serches nd judges in this procedure which costs more thn computing two strings. Different from the mtching rtio trend tht showed in Figure 6, Figure 8 presents n opposite trend: the mtching time of GED-sed method to tht of SED-sed rtio increses with the incresing numer of vertex. This is ecuse in our SED-sed method, the numer of grphs which need to e mtched cn mke more contriutions to the mtching time thn the numer of vertex of model grph.

7 Appl. Mth. Inf. Sci. 7, No. 1L, (01) / As for effectiveness study, sed on oservtions on mtching results of two methods, first severl results for oth methods re lmost sme. However, since our method nd GED-sed method dopt different principles (e.g. the costs for node/edge deletion, insertion nd other opertions) for similrity mesurements, there exist greter differences etween mtching results in lrger size for oth methods. Generlly, the difference rtio could e 0% round. Nevertheless, since first severl results re more concerned y users, our method cn stisfy their ccurcy demnds in generl. 5. Conclusion In this pper, we propose novel pproch for mesuring similrity etween grphs. Using depth-first serch (DFS) strtegy, we trverse the grphs nd lel them cnoniclly with the minimum DFS code. Then, fter extrcting these codes nd filtering them, we conduct the clcultion of string edit distnce (SED) etween the source grph nd grphs in dtse. Compring with trditionl GED sed method, our pproch is more efficient nd the experimentl evlution proves its utility in rel pplictions. There is still some work needs e done in the future. For exmple, the ccurcy of mesuring similrity etween grphs through clculting the SED of DFS codes should e studied oth theoreticlly nd experimentlly. Besides, the reltion etween our proposed method nd GED needs to e determined. At lst, we re going to exploit our method in rel grph dtsets nd to improve its performnce mking it more pplicle nd prcticle. Acknowledgement This reserch ws prtilly supported y following foundtions: Ntionl Science nd Technology Supporting Progrm of Chin(No.01BAH06F0, No. 011BAD1B0), Ntionl Nturl Science Foundtion of Chin under Grnt (No.61719), Reserch Fund for the Doctorl Progrm y Ministry of Eduction of Chin(No ) References [1] A.. Broder, R. Kumr, F. Mghoul, P. Rghvn, S. Rjgopln, R. Stt, A. Tomkins, nd J.L. Wiener, Grph structure in the We. In Proceedings of Computer Networks. 09-0, (000). []. Tin, R. C. McEchin, C. Sntos, D. J. Sttes, nd J. M. Ptel. Sg: sugrph mtching tool for iologicl grphs. Bioinformtics, (): -9, (007). [] P. Willett, J. Brnrd, nd G. Downs. Chemicl similrity serching. J. Chem. Inf. Comput. Sci, 8(6): , (1998). [] R. Dijkmn, M. Dums, nd L. Grci-Bnuelos. Grph mtching lgorithms for usiness process model similrity serch. In BPM, (009). [5] H. Bunke. On reltion etween grph edit distnce nd mximum common sugrph. Pttern Recognition Letters, 18(8): , (1997). [6] H. Bunke nd K. Sherer. A grph distnce metric sed on the mximl common sugrph. Pttern Recognition Letters, 19(-): 55-59, (1998). [7] J. Rymond, E. Grdiner, nd P. Willett. RASCAL: Clcultion of Grph Similrity using Mximum Common Edge Sugrphs. The Computer Journl, 5(6): 61-6, (00). [8]. eng, A.K.H. Tung, J. Wng, J. Feng, nd L. hou, Compring Strs: On Approximting Grph Edit Distnce. In Proceedings of PVLDB, 5-6, (009). [9]. n, F. hu, P.S. u, nd J. Hn, Feture-sed similrity serch in grph structures. In Proceedings of ACM Trns. Dtse Syst, , (006). [10]. n nd J. Hn, gspn: Grph-Bsed Sustructure Pttern Mining. In Proceedings of ICDM (00). [11] I. Levenshtein, Binry code cple of correcting deletions, insertions nd reversls. Cyernetics nd Control Theory, 10(8), , (1966). Bin Co is currently Ph.D. cndidte in the College of Computer Science, hejing University (Chin). He received his B.S. from hejing University of Technology, Chin in 008 nd he took successive postgrdute nd doctorl progrm in hejing University since 009. His reserch interests include workflow mngement, event processing nd sptil dtse. ing Li is currently n ssocite professor in the College of Computer Science, hejing University (Chin). He received his M.S. from hejing University in 1997 nd his Ph.D. in Computer Science from hejing University in 000. His reserch interests include softwre rchitecture, softwre utomtion, compiling technology nd middlewre technology. Jinwei in is currently professor in the College of Computer Science, hejing University (Chin). He received his Ph.D. in Computer Science from hejing University in 001. He is the visiting scholr of Georgi Institute of Technology, Americ in 008. His reserch interests include distriuted network middlewre, softwre rchitecture nd informtion integrtion.

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

Or more simply put, when adding or subtracting quantities, their uncertainties add.

Or more simply put, when adding or subtracting quantities, their uncertainties add. Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

Section 5-4 Trigonometric Functions

Section 5-4 Trigonometric Functions 5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324

A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324 A P P E N D I X A Vectors CONTENTS A.1 Scling vector................................................ 321 A.2 Unit or Direction vectors...................................... 321 A.3 Vector ddition.................................................

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Scalable Mining of Large Disk-based Graph Databases

Scalable Mining of Large Disk-based Graph Databases Sclle Mining of Lrge Disk-sed Grph Dtses Chen Wng Wei Wng Jin Pei Yongti Zhu Bile Shi Fudn University, Chin, {chenwng, weiwng1, 2465, shi}@fudn.edu.cn Stte University of New York t Bufflo, USA & Simon

More information

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001 CS99S Lortory 2 Preprtion Copyright W. J. Dlly 2 Octoer, 2 Ojectives:. Understnd the principle of sttic CMOS gte circuits 2. Build simple logic gtes from MOS trnsistors 3. Evlute these gtes to oserve logic

More information

Concept Formation Using Graph Grammars

Concept Formation Using Graph Grammars Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

One Minute To Learn Programming: Finite Automata

One Minute To Learn Programming: Finite Automata Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

1. Find the zeros Find roots. Set function = 0, factor or use quadratic equation if quadratic, graph to find zeros on calculator

1. Find the zeros Find roots. Set function = 0, factor or use quadratic equation if quadratic, graph to find zeros on calculator AP Clculus Finl Review Sheet When you see the words. This is wht you think of doing. Find the zeros Find roots. Set function =, fctor or use qudrtic eqution if qudrtic, grph to find zeros on clcultor.

More information

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

Simulation of operation modes of isochronous cyclotron by a new interative method

Simulation of operation modes of isochronous cyclotron by a new interative method NUKLEONIKA 27;52(1):29 34 ORIGINAL PAPER Simultion of opertion modes of isochronous cyclotron y new intertive method Ryszrd Trszkiewicz, Mrek Tlch, Jcek Sulikowski, Henryk Doruch, Tdeusz Norys, Artur Srok,

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

Unit 6: Exponents and Radicals

Unit 6: Exponents and Radicals Eponents nd Rdicls -: The Rel Numer Sstem Unit : Eponents nd Rdicls Pure Mth 0 Notes Nturl Numers (N): - counting numers. {,,,,, } Whole Numers (W): - counting numers with 0. {0,,,,,, } Integers (I): -

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

Basic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n)

Basic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n) BRICS Bsic Reserch in Computer Science BRICS RS-02-13 Brodl et l.: Solving the String Sttistics Prolem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl Rune

More information

Solving the String Statistics Problem in Time O(n log n)

Solving the String Statistics Problem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl 1,,, Rune B. Lyngsø 3, Ann Östlin1,, nd Christin N. S. Pedersen 1,2, 1 BRICS, Deprtment of Computer Science, University of Arhus,

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2 Interntionl Journl of Engineering Reserch & Science (IJOER) ISSN [2395-6992] [Vol-2, Issue-1, Jnury- 2016] Qulity Evlution of Entrepreneur Eduction on Grdute Students Bsed on AHP-fuzzy Comprehensive Evlution

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

** Dpt. Chemical Engineering, Kasetsart University, Bangkok 10900, Thailand

** Dpt. Chemical Engineering, Kasetsart University, Bangkok 10900, Thailand Modelling nd Simultion of hemicl Processes in Multi Pulse TP Experiment P. Phnwdee* S.O. Shekhtmn +. Jrungmnorom** J.T. Gleves ++ * Dpt. hemicl Engineering, Ksetsrt University, Bngkok 10900, Thilnd + Dpt.hemicl

More information

How To Make A Network More Efficient

How To Make A Network More Efficient Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

and thus, they are similar. If k = 3 then the Jordan form of both matrices is

and thus, they are similar. If k = 3 then the Jordan form of both matrices is Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If

More information

CHAPTER 11 Numerical Differentiation and Integration

CHAPTER 11 Numerical Differentiation and Integration CHAPTER 11 Numericl Differentition nd Integrtion Differentition nd integrtion re bsic mthemticl opertions with wide rnge of pplictions in mny res of science. It is therefore importnt to hve good methods

More information

SPECIAL PRODUCTS AND FACTORIZATION

SPECIAL PRODUCTS AND FACTORIZATION MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come

More information

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful Pentominoes Bruce Bguley Cscde Mth Systems, LLC Astrct. Pentominoes nd their reltives the polyominoes, polycues, nd polyhypercues will e used to explore nd pply vrious importnt mthemticl concepts. In this

More information

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn 33337_0P03.qp 2/27/06 24 9:3 AM Chpter P Pge 24 Prerequisites P.3 Polynomils nd Fctoring Wht you should lern Polynomils An lgeric epression is collection of vriles nd rel numers. The most common type of

More information

0.1 Basic Set Theory and Interval Notation

0.1 Basic Set Theory and Interval Notation 0.1 Bsic Set Theory nd Intervl Nottion 3 0.1 Bsic Set Theory nd Intervl Nottion 0.1.1 Some Bsic Set Theory Notions Like ll good Mth ooks, we egin with definition. Definition 0.1. A set is well-defined

More information

Performance analysis model for big data applications in cloud computing

Performance analysis model for big data applications in cloud computing Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

Exponential and Logarithmic Functions

Exponential and Logarithmic Functions Nme Chpter Eponentil nd Logrithmic Functions Section. Eponentil Functions nd Their Grphs Objective: In this lesson ou lerned how to recognize, evlute, nd grph eponentil functions. Importnt Vocbulr Define

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009 CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison

More information

Decision Rule Extraction from Trained Neural Networks Using Rough Sets

Decision Rule Extraction from Trained Neural Networks Using Rough Sets Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

Algebra Review. How well do you remember your algebra?

Algebra Review. How well do you remember your algebra? Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then

More information

Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm

Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm Bibhudendr chry, Girij Snkr Rth, Srt Kumr Ptr, nd Sroj Kumr Pnigrhy Novel Methods of Generting Self-Invertible Mtrix for Hill Cipher lgorithm Bibhudendr chry Deprtment of Electronics & Communiction Engineering

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

Multiplication and Division - Left to Right. Addition and Subtraction - Left to Right.

Multiplication and Division - Left to Right. Addition and Subtraction - Left to Right. Order of Opertions r of Opertions Alger P lese Prenthesis - Do ll grouped opertions first. E cuse Eponents - Second M D er Multipliction nd Division - Left to Right. A unt S hniqu Addition nd Sutrction

More information

www.mathsbox.org.uk e.g. f(x) = x domain x 0 (cannot find the square root of negative values)

www.mathsbox.org.uk e.g. f(x) = x domain x 0 (cannot find the square root of negative values) www.mthsbo.org.uk CORE SUMMARY NOTES Functions A function is rule which genertes ectl ONE OUTPUT for EVERY INPUT. To be defined full the function hs RULE tells ou how to clculte the output from the input

More information

Vector differentiation. Chapters 6, 7

Vector differentiation. Chapters 6, 7 Chpter 2 Vectors Courtesy NASA/JPL-Cltech Summry (see exmples in Hw 1, 2, 3) Circ 1900 A.D., J. Willird Gis invented useful comintion of mgnitude nd direction clled vectors nd their higher-dimensionl counterprts

More information

RTL Power Optimization with Gate-level Accuracy

RTL Power Optimization with Gate-level Accuracy RTL Power Optimiztion with Gte-level Accurcy Qi Wng Cdence Design Systems, Inc Sumit Roy Clypto Design Systems, Inc 555 River Oks Prkwy, Sn Jose 95125 2903 Bunker Hill Lne, Suite 208, SntClr 95054 [email protected]

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Numeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team

Numeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team Numercy cross the Curriculum in Key Stges 3 nd 4 Helpful dvice nd suggested resources from the Leicestershire Secondry Mthemtics Tem 1 Contents pge The development of whole school policy 3 A definition

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology

More information

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory Implementtion Evlution Modeling of Selecting ERP Softwre Bsed on Fuzzy Theory Xukn Xu 1, Ydong Jing 1 nd Zheng Shi 2 1 Informtion Mngement Deprtment, Chngzhou Cmpus, Hohi University, Chngzhou 213022, Jingsu,

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

Roudmup for Los Angeles Pierce College ADIV Program ancl csu Dominguez Hilk Rlt-B^sr/ progrum

Roudmup for Los Angeles Pierce College ADIV Program ancl csu Dominguez Hilk Rlt-B^sr/ progrum Roudmup for Los Angeles Pierce College ADIV Progrm ncl csu Dominguez Hilk Rlt-B^sr/ progrum Admission Requirements for Los Angeles pierce (LApC) LAPC hs four-semester Associte Degree in Nursing (ADN) Progrm.

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

Unit 29: Inference for Two-Way Tables

Unit 29: Inference for Two-Way Tables Unit 29: Inference for Two-Wy Tbles Prerequisites Unit 13, Two-Wy Tbles is prerequisite for this unit. In ddition, students need some bckground in significnce tests, which ws introduced in Unit 25. Additionl

More information

In addition, the following elements form an integral part of the Agency strike prevention plan:

In addition, the following elements form an integral part of the Agency strike prevention plan: UNITED STTES DEPRTMENT OF GRICULTURE Wshington, DC 20250 Federl Grin Inspection Service FGIS Directive 4711.2 6/16/80 STRIKE PREVENTION ND STRIKE CONTINGENCY PLNS I PURPOSE This Instruction: Estlishes

More information