My talk about computational geometry in NTU's APEX Club in NTU, Singapore in 2007. The club is for people who are keen on participating in ACM International Collegiate Programming Contests organized by IBM annually.
Spline interpolation is a problem of "Numerical Methods".
This slide covers the basics of spline interpolation mostly the linear spline and cubic spline interpolation.
This is concerned with designing an exact exponential time algorithm that is better than the well-known 2^n algorithm for the problem Path Contraction. This answers an open question of van't Hof et. al [TCS 2009]. This is based on the article that appeared in ICALP 2019.
My talk about computational geometry in NTU's APEX Club in NTU, Singapore in 2007. The club is for people who are keen on participating in ACM International Collegiate Programming Contests organized by IBM annually.
Spline interpolation is a problem of "Numerical Methods".
This slide covers the basics of spline interpolation mostly the linear spline and cubic spline interpolation.
This is concerned with designing an exact exponential time algorithm that is better than the well-known 2^n algorithm for the problem Path Contraction. This answers an open question of van't Hof et. al [TCS 2009]. This is based on the article that appeared in ICALP 2019.
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
This is a Question Papers of Mumbai University for B.Sc.IT Student of Semester - II [Computer Graphics] (Old Course). [Year - September / 2013] . . .Solution Set of this Paper is Coming soon..
Digital Signals and Systems (April – 2015) [Question Paper | IDOL: Revised Co...Mumbai B.Sc.IT Study
Data Warehousing (April – 2016) [Question Paper | CBSGS: 75:25 Pattern]
april - 2017, april - 2016, april - 2015, april - 2014, april - 2013, october - 2017, october - 2016, october - 2015, october - 2014, may - 2016, may - 2017, december - 2017, 75:25 pattern, 60:40 pattern, revised course, old course, mumbai bscit study, mumbai university, bscit semester vi, bscit question paper, old question paper, previous year question paper, semester vi question paper, question paper, CBSGS, IDOL, kamal t, internet technology, digital signals and systems, data warehousing, ipr and cyber laws, project management, geographic information system
Abstract : Motivated by the recovery and prediction of electricity consumption time series, we extend Nonnegative Matrix Factorization to take into account external features as side information. We consider general linear measurement settings, and propose a framework which models non-linear relationships between external features and the response variable. We extend previous theoretical results to obtain a sufficient condition on the identifiability of NMF with side information. Based on the classical Hierarchical Alternating Least Squares (HALS) algorithm, we propose a new algorithm (HALSX, or Hierarchical Alternating Least Squares with eXogeneous variables) which estimates NMF in this setting. The algorithm is validated on both simulated and real electricity consumption datasets as well as a recommendation system dataset, to show its performance in matrix recovery and prediction for new rows and columns.
[Question Paper] Microprocessor and Microcontrollers (Revised Course) [Octobe...Mumbai B.Sc.IT Study
This is a Question Papers of Mumbai University for B.Sc.IT Student of Semester - II [Microprocessor and Microcontrollers] (Revised Course). [Year - October / 2016] . . .Solution Set of this Paper is Coming soon..
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...Mumbai B.Sc.IT Study
This is a Question Papers of Mumbai University for B.Sc.IT Student of Semester - I [Fundamentals of Digital Computing] (Revised Course). [Year - April / 2014] . . .Solution Set of this Paper is Coming soon..
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
This is a Question Papers of Mumbai University for B.Sc.IT Student of Semester - II [Computer Graphics] (Old Course). [Year - September / 2013] . . .Solution Set of this Paper is Coming soon..
Digital Signals and Systems (April – 2015) [Question Paper | IDOL: Revised Co...Mumbai B.Sc.IT Study
Data Warehousing (April – 2016) [Question Paper | CBSGS: 75:25 Pattern]
april - 2017, april - 2016, april - 2015, april - 2014, april - 2013, october - 2017, october - 2016, october - 2015, october - 2014, may - 2016, may - 2017, december - 2017, 75:25 pattern, 60:40 pattern, revised course, old course, mumbai bscit study, mumbai university, bscit semester vi, bscit question paper, old question paper, previous year question paper, semester vi question paper, question paper, CBSGS, IDOL, kamal t, internet technology, digital signals and systems, data warehousing, ipr and cyber laws, project management, geographic information system
Abstract : Motivated by the recovery and prediction of electricity consumption time series, we extend Nonnegative Matrix Factorization to take into account external features as side information. We consider general linear measurement settings, and propose a framework which models non-linear relationships between external features and the response variable. We extend previous theoretical results to obtain a sufficient condition on the identifiability of NMF with side information. Based on the classical Hierarchical Alternating Least Squares (HALS) algorithm, we propose a new algorithm (HALSX, or Hierarchical Alternating Least Squares with eXogeneous variables) which estimates NMF in this setting. The algorithm is validated on both simulated and real electricity consumption datasets as well as a recommendation system dataset, to show its performance in matrix recovery and prediction for new rows and columns.
[Question Paper] Microprocessor and Microcontrollers (Revised Course) [Octobe...Mumbai B.Sc.IT Study
This is a Question Papers of Mumbai University for B.Sc.IT Student of Semester - II [Microprocessor and Microcontrollers] (Revised Course). [Year - October / 2016] . . .Solution Set of this Paper is Coming soon..
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...Mumbai B.Sc.IT Study
This is a Question Papers of Mumbai University for B.Sc.IT Student of Semester - I [Fundamentals of Digital Computing] (Revised Course). [Year - April / 2014] . . .Solution Set of this Paper is Coming soon..
京都大学大学院情報学研究科 数理工学専攻
離散数理分野(研究室)の案内
離散数学や組合せ最適化の理論と応用を研究している研究室です.
キーワード:離散数学,組合せ最適化,グラフ理論,オペレーションズリサーチ
http://www-or.amp.i.kyoto-u.ac.jp
Department of Applied Mathematics and Physics,
Graduate School of Informatics, Kyoto University,
Japan
Three Dimensional Scaffold Direct Writer for Fabricating Fiber-Reinforced Mat...Rohan Rath
Senior/capstone design project. First place regional and second place global winner at the IIE Annual Conference & Exposition, John Deere sponsored technical paper competition. This paper was presented at the IIE Northeastern university regional conference in Boston, MA (March 2015) and at the IIE annual global conference & exposition in Nashville, TN (May 2015).
In our previous work an efficient one-pass online algorithm for triclustering of binary data (triadic formal contexts) was proposed. This algorithm is a modified version of the basic algorithm for OAC- triclustering approach; it has linear time and memory complexities. In this paper we parallelise it via map-reduce framework in order to make it suitable for big datasets. The results of computer experiments show the efficiency of the proposed algorithm; for example, it outperforms the online counterpart on Bibsonomy dataset with ≈ 800, 000 triples.
International Journal of Managing Information Technology (IJMIT)IJMIT JOURNAL
We present an improved SPFA algorithm for the single source shortest path problem. For a random graph, the empirical average time complexity is O(|E|), where |E| is the number of edges of the input network. SPFA maintains a queue of candidate vertices and add a vertex to the queue only if that vertex is relaxed. In the improved SPFA, MinPoP principle is employed to improve the quality of the queue. We theoretically analyse the advantage of this new algorithm and experimentally demonstrate that the algorithm is efficient
An improved spfa algorithm for single source shortest path problem using forw...IJMIT JOURNAL
We present an improved SPFA algorithm for the single source shortest path problem. For a random graph,
the empirical average time complexity is O(|E|), where |E| is the number of edges of the input network.
SPFA maintains a queue of candidate vertices and add a vertex to the queue only if that vertex is relaxed.
In the improved SPFA, MinPoP principle is employed to improve the quality of the queue. We theoretically
analyse the advantage of this new algorithm and experimentally demonstrate that the algorithm is efficient.
An improved spfa algorithm for single source shortest path problem using forw...IJMIT JOURNAL
We present an improved SPFA algorithm for the single source shortest path problem. For a random graph,
the empirical average time complexity is O(|E|), where |E| is the number of edges of the input network.
SPFA maintains a queue of candidate vertices and add a vertex to the queue only if that vertex is relaxed.
In the improved SPFA, MinPoP principle is employed to improve the quality of the queue. We theoretically
analyse the advantage of this new algorithm and experimentally demonstrate that the algorithm is efficient.
It is well known that the tenacity is a proper measure for studying vulnerability and reliability in graphs.
Here, a modified edge-tenacity of a graph is introduced based on the classical definition of tenacity.
Properties and bounds for this measure are introduced; meanwhile edge-tenacity is calculated for cycle
graphs and also for complete graphs.
Accelerating Pseudo-Marginal MCMC using Gaussian ProcessesMatt Moores
The grouped independence Metropolis-Hastings (GIMH) and Markov chain within Metropolis (MCWM) algorithms are pseudo-marginal methods used to perform Bayesian inference in latent variable models. These methods replace intractable likelihood calculations with unbiased estimates within Markov chain Monte Carlo algorithms. The GIMH method has the posterior of interest as its limiting distribution, but suffers from poor mixing if it is too computationally intensive to obtain high-precision likelihood estimates. The MCWM algorithm has better mixing properties, but less theoretical support. In this paper we accelerate the GIMH method by using a Gaussian process (GP) approximation to the log-likelihood and train this GP using a short pilot run of the MCWM algorithm. Our new method, GP-GIMH, is illustrated on simulated data from a stochastic volatility and a gene network model. Our approach produces reasonable estimates of the univariate and bivariate posterior distributions, and the posterior correlation matrix in these examples with at least an order of magnitude improvement in computing time.
Similar to A Polynomial-Space Exact Algorithm for TSP in Degree-5 Graphs (20)
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
A Polynomial-Space Exact Algorithm for TSP in Degree-5 Graphs
1. A Polynomial-Space Exact Algorithm
for TSP in Degree-5 Graphs
Norhazwani Md Yunos, Aleksandar Shurbevski, Hiroshi Nagamochi
Graduate School of Informatics
Kyoto University, Japan
The 12th
International Symposium on Operations Research and Its Applications
in engineering, technology and management (ISORA 2015)
Luoyang, China
21-24 August 2015
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 1 / 17
3. Traveling Salesman Problem
One of the most widely studied problems in combinatorial optimization.
A famous and important NP-hard optimization problem.
Input:
An undirected edge-weighted graph
G = (V, E).
Output:
The minimum cost/length of a tour in
G that passes all vertices of V exactly
once; or
A message for the infeasibility of G.
5 2
3
6
2
1
4 3
2 2
G
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 2 / 17
4. Traveling Salesman Problem
One of the most widely studied problems in combinatorial optimization.
A famous and important NP-hard optimization problem.
Input:
An undirected edge-weighted graph
G = (V, E).
Output:
The minimum cost/length of a tour in
G that passes all vertices of V exactly
once; or
A message for the infeasibility of G.
5 2
3
6
2
1
4 3
2 2
G
11
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 2 / 17
5. Traveling Salesman Problem
One of the most widely studied problems in combinatorial optimization.
A famous and important NP-hard optimization problem.
Input:
An undirected edge-weighted graph
G = (V, E).
Output:
The minimum cost/length of a tour in
G that passes all vertices of V exactly
once; or
A message for the infeasibility of G.
5 2
3
6
2
1
4 3
2 2
G
2
1
21
1
infeasible
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 2 / 17
6. TSP in Degree-k Graphs
Input:
An undirected edge-weighted degree-k graph G = (V, E).
Degree-k graphs = graphs in which vertices have maximum degree at most k.
Output:
The minimum cost of a tour in G that passes all vertices of V exactly
once; or
A message for the infeasibility of G.
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 3 / 17
7. Previous Result
Graphs Time Space Method Authors (Year)
General 2n 2n Dynamic
Programming
Bellman (1960)
General 4nnlog n Poly.
Divide and
Conquer
Gurevich & Shelah
(1987)
Degree-3 1.2312n Poly.
Branching
Algorithm
Xiao & Nagamochi
(2013)
Degree-4 1.692n Poly.
Branching
Algorithm
Xiao & Nagamochi
(2015)
Degree-5 2.4531n Poly.
Branching
Algorithm
This presentation
(2015)
Degree-k,
k ≥ 6
open Poly.
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 4 / 17
8. Forced TSP
Input:
An undirected edge-weighted graph G = (V, E),
Set of forced edges F ⊆ E.
Output:
The minimum cost of a tour in (G, F) that passes all vertices of V exactly
once, and all forced edges of F; or
A message for the infeasibility of (G, F).
Design a polynomial-space branching algorithm
Reduction procedure.
Branching operations.
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 5 / 17
9. A Variety Type of Vertices
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 6 / 17
10. Type of Vertices and their Weight, w
Forced
vertices:
f3-vertex f4-vertex f5-vertex
w3’ = 0.1567 ≤ w4’ = 0.3134 ≤ w5’ = 0.4701
Unforced
vertices:
u3-vertex u4-vertex u5-vertex
w3 = 0.2769 ≤ w4 = 0.6075 ≤ w5 = 1
: unforced edges : forced edges
w(v) = 0
otherwise
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 7 / 17
11. Measure-and-Conquer
Measure µ for a given instance I = (G, F) of forced TSP:
µ(I) =
v∈V(G)
(w(v))
u3=0.2769
0
f3=0.1567 u4=0.6075
u3=0.2769 u4=0.6075
f5=0.4701
µ(I) = w3 + w3 + w3 + w5 + w4 + w4 + 0
= 2.3956
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 8 / 17
13. Branching Operation
G
e
force(e) delete(e)
Instance I with size µ
G
Instance I’
with size µ-a
G
Instance I’’
with size µ-b
e
G
µ(I) = 2.3956
Choose edge e
and branch on
force(e) delete(e)
e
G
µ(I’’) = 1.9620
e
G
µ(I’) = 1.8053
: unforced edges : forced edges : deleted edges
(a, b) is a branching vector of the branching rules.
This implies the linear recurrence: T(µ) ≤ T(µ − a) + T(µ − b)
T(µ) = O(cµ)
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 10 / 17
14. Branching Operation
G
e
force(e) delete(e)
Instance I with size µ
G
Instance I’
with size µ-a
G
Instance I’’
with size µ-b
e
G
µ(I) = 2.3956
Choose edge e
and branch on
force(e) delete(e)
e
G
µ(I’’) = 0.6268
e
G
µ(I’) = 0
: unforced edges : forced edges : deleted edges
(a, b) is a branching vector of the branching rules.
This implies the linear recurrence: T(µ) ≤ T(µ − a) + T(µ − b)
T(µ) = O(cµ)
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 10 / 17
15. How to Choose an Edge to Branch On
Branching rules applied to an edge e = vt:
v
t
e
While there is a vertex of degree 5,
For the choice of a vertex v of degree-5:
High Priority Less Priority
f5-vertex u5-vertex
v v
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 11 / 17
16. How to Choose an Edge to Branch On
For the choice of a vertex t:
High Priority Less Priority
v
t1
t2 t3
t4
e
t5
v
t1
t2 t3
t4
e
f3-vertex
v
t
u3-vertex
v
t
f4-vertex
v
t
u4-vertex
v
t
f5-vertex
v
t
u5-vertex
v
t
There are 14 cases which make our branching rules.
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 12 / 17
17. Switching to TSP in Degree-4 Graphs
When the graph has no degree-5 vertices, switch and use the
O∗(1.69193n)-time algorithm for TSP in degree-4 graphs
by Xiao & Nagamochi (2015).
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 13 / 17
18. Analysis (Example for c-3)
force(vt1) delete(vt1)
: unforced edges
: forced edges
: newly deleted edges : newly forced edges
v
t1
t2 t3
t4
e
t5 t6
v
t1
t2 t3
t4
e
t5 t6
v
t1
t2 t3
t4
e
t5 t6
Branching vector:
(w5 + w3 − w3 + 3m2, w5 − w4 + w3 + 2m3)
where
m2 = min{w3, (w4 − w3 ), (w4 − w3), (w5 − w4 ), (w5 − w4)}.
m3 = min{w3 , (w3 − w3 ), w4 , (w4 − w4 ), w5 , (w5 − w5 )}.
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 14 / 17
19. Analysis
When there exist degree-5 vertices:
Each of the 14 branching vectors has a branching factor ≤ 2.453051.
For switching to TSP in degree-4 graphs:
Measure µ is calculated based on the maximum ratio of vertex weights for
TSP in degree-4 graphs and TSP in degree-5 graphs.
The running bound for TSP in degree-4 graphs is:
T(µ) ≤ O(1.69193z
)
where z = max{0.21968
w3
, 0.45540
w3
, 0.59804
w4
, 1
w4
}
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 15 / 17
20. Conclusion and Future Works
Result:
The TSP in an n-vertex graph G with maximum degree 5 can be solved
in O∗(2.4531n)-time and polynomial-space.
Future Work:
It is interesting to obtain a polynomial-space algorithm with a running
time of O∗(2n) or less.
Modified analysis technique.
Re-examination of the branching rules.
Work on TSP in higher degree graphs.
Norhazwani et al. A Polynomial-Space Algorithm for TSP5 ISORA 2015 16 / 17