SlideShare a Scribd company logo
1 of 14
‫ارائه‬ ‫عنوان‬
‫راهنما‬ ‫اساتید‬
:
‫اول‬ ‫استاد‬ ‫نام‬
‫دوم‬ ‫استاد‬ ‫نام‬
‫دهنده‬ ‫ارائه‬
:
‫باقی‬ ‫وحید‬
‫بهمن‬
۱۳۹۹
‫تهران‬ ‫دانشگاه‬
‫فنی‬ ‫های‬ ‫دانشکده‬ ‫پردیس‬
‫مهندسی‬ ‫علوم‬ ‫دانشکده‬
‫کامپیوتر‬ ‫مهندسی‬
–
‫محاسبات‬ ‫و‬ ‫ها‬ ‫الگوریتم‬
Department of Algorithms and Computation
School of Engineering Science
College of Engineering
University of Tehran
Winter 2019
Test Subject
Presentation by : Vahid Baghi
mode of computation
deterministic mode
Parameters for a Complexity Class
nondeterministic mode
Time is Tape Dependent
Theorem : Let 𝑡 𝑛 be a function , where 𝑡 𝑛 > 𝑛 .Then every 𝑡 𝑛 time multitape Turing
machine has an equivalent 𝑂(𝑡2
(𝑛)) time single-tape Turing machine.
Transition
Logic
⊔
1
0 ∞
⊔
#
0
0
1
#
0
1
1
#
1
0
∞
⊔
0
1
1 ∞
⊔
0
0
1
Transition
Logic
110
Proper Complexity Functions
Definition
There exists a TM M that outputs
exactly 𝑓 𝑛 symbols on input 1𝑛
and runs in time O(𝑓 𝑛 + 𝑛) and
space O(𝑓 𝑛 )
f is a proper complexity function if :
∀𝑛 ∶ 𝑓 𝑛 ≥ 𝑓(𝑛 − 1)
For Example : log 𝑛
, 𝑛 , 𝑛2 , …
A complexity class is a set of classes of decision problems (or languages) with the same
worst-case complexity
Complexity Classes
DTIME or TIME is the computational resource of
computation time for a deterministic Turing
machine
DTIME
DSPACE
DSPACE or SPACE is the computational
resource describing the resource of memory
space for a deterministic Turing machine
Time Complexity Hierarchy
Theorem : for any 𝑡 𝑛 > 0 , there exists a decidable language
L ∉ 𝐷𝑇𝐼𝑀𝐸(𝑡 𝑛 )
Define 𝐿 = 𝑖 𝑀𝑖 does not accept i within 𝑡 𝑖 time }
Question : is L ∈ 𝐷𝑇𝐼𝑀𝐸 𝑡 𝑛 ?
Proof :
Assume (towards contradiction) L ∈ 𝐷𝑇𝐼𝑀𝐸 𝑡 𝑛
∃ a fixed K ∈ 𝑁 such that Turing machine 𝑀𝐾 decides L within time bound 𝑡 𝑛
‫تصادفی‬ ‫شبه‬ ‫و‬ ‫تصادفی‬ ‫اعداد‬ ‫مولد‬
‫تصادفی‬ ‫اعداد‬ ‫مولد‬
(
Random Number Generator
)
‫ای‬‫وسیله‬
‫تولید‬ ‫برای‬ ‫که‬ ‫است‬ ‫فیزیکی‬
‫ای‬‫دنباله‬
‫کار‬ ‫به‬ ‫ندارند‬ ‫خاصی‬ ‫الگوی‬ ‫که‬ ‫اعداد‬ ‫از‬
‫رو‬‫می‬
‫د‬
.
‫مثال‬ ‫برای‬
•
‫پرتاب‬
‫تاس‬
•
‫سکه‬ ‫پرتاب‬
•
‫شانس‬ ‫گردونه‬
‫تصادفی‬ ‫شبه‬ ‫اعداد‬ ‫مولد‬
(
Pseudo Random Number Generator
: )
‫که‬ ‫است‬ ‫الگوریتمی‬
‫ای‬‫دنباله‬
‫تول‬ ، ‫هستند‬ ‫تصادفی‬ ‫مناسبی‬ ‫تقریب‬ ‫با‬ ‫که‬ ‫را‬ ‫اعداد‬ ‫از‬
‫ید‬
‫کند‬‫می‬
.
‫تصادفی‬ ‫اعداد‬ ‫های‬ ‫مولد‬ ‫تست‬
‫روش‬
‫مونت‬
‫کارلو‬
‫عدد‬ ‫تخمین‬ ‫برای‬
𝜋
𝐴𝑐𝑖𝑟𝑐𝑙𝑒
𝐴𝑠𝑞𝑢𝑎𝑟𝑒
=
𝜋𝑟2
(2𝑟)2 =
𝜋
4
𝜋 = 4 ∗
𝐴𝑐𝑖𝑟𝑐𝑙𝑒
𝐴𝑠𝑞𝑢𝑎𝑟𝑒
X
Y
‫مقدمه‬
‫تحق‬ ‫پیشینه‬
‫یق‬
‫پیشنهادی‬ ‫روش‬
‫نتایج‬ ‫ارزیابی‬
‫گیری‬ ‫نتیجه‬
‫پیشنهادات‬
‫نمونه‬ ‫عنوان‬
1/n
‫مقدمه‬
‫تحق‬ ‫پیشینه‬
‫یق‬
‫پیشنهادی‬ ‫روش‬
‫نتایج‬ ‫ارزیابی‬
‫گیری‬ ‫نتیجه‬
‫پیشنهادات‬
‫نمونه‬ ‫عنوان‬
‫عنوان‬ ‫زیر‬
۱
‫عنوان‬ ‫زیر‬
۲
‫نمونه‬ ‫فرمول‬
1/n
𝑠𝑡+1 = {𝑒𝑖, 𝑒𝑖 ∈ 𝑠𝑡, 𝑟 + 1 ≤ 𝑖 ≤ 𝑛} ∪ {𝑝i|𝑝i ∈ 𝑝, 1 ≤ 𝑖 ≤ 𝑟}
Big Picture
User ID Movie ID Rating Timestamp
1 40 3 881250929
2 32 4 886176814
1 10 3.5 881250939
3 20 5 874833878
1 20 2 881250949
2 50 3 886176824
4 11 4.5 879196566
User ID Movie ID Rating Timestamp
1 40 3 881250929
1 10 3.5 881250939
1 20 2 881250949
2 32 4 886176814
2 50 3 886176824
3 20 5 874833878
4 11 4.5 879196566
MovieLens Dataset

More Related Content

What's hot

Algorithm Analyzing
Algorithm AnalyzingAlgorithm Analyzing
Algorithm AnalyzingHaluan Irsad
 
Asymptotic Notations
Asymptotic NotationsAsymptotic Notations
Asymptotic NotationsNagendraK18
 
multi threaded and distributed algorithms
multi threaded and distributed algorithms multi threaded and distributed algorithms
multi threaded and distributed algorithms Dr Shashikant Athawale
 
Theory of Automata and formal languages Unit 5
Theory of Automata and formal languages Unit 5Theory of Automata and formal languages Unit 5
Theory of Automata and formal languages Unit 5Abhimanyu Mishra
 
Introduction to Algorithms and Asymptotic Notation
Introduction to Algorithms and Asymptotic NotationIntroduction to Algorithms and Asymptotic Notation
Introduction to Algorithms and Asymptotic NotationAmrinder Arora
 
Introduction to Algorithms Complexity Analysis
Introduction to Algorithms Complexity Analysis Introduction to Algorithms Complexity Analysis
Introduction to Algorithms Complexity Analysis Dr. Pankaj Agarwal
 
A Numerical Analytic Continuation and Its Application to Fourier Transform
A Numerical Analytic Continuation and Its Application to Fourier TransformA Numerical Analytic Continuation and Its Application to Fourier Transform
A Numerical Analytic Continuation and Its Application to Fourier TransformHidenoriOgata
 
asymptotic analysis and insertion sort analysis
asymptotic analysis and insertion sort analysisasymptotic analysis and insertion sort analysis
asymptotic analysis and insertion sort analysisAnindita Kundu
 
P, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardP, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardAnimesh Chaturvedi
 
Data Structure: Algorithm and analysis
Data Structure: Algorithm and analysisData Structure: Algorithm and analysis
Data Structure: Algorithm and analysisDr. Rajdeep Chatterjee
 
Basic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV SyllabusBasic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV SyllabusNANDINI SHARMA
 

What's hot (20)

Time andspacecomplexity
Time andspacecomplexityTime andspacecomplexity
Time andspacecomplexity
 
Algorithm Analyzing
Algorithm AnalyzingAlgorithm Analyzing
Algorithm Analyzing
 
asymptotic notation
asymptotic notationasymptotic notation
asymptotic notation
 
Algorithmic Notations
Algorithmic NotationsAlgorithmic Notations
Algorithmic Notations
 
Asymptotic Notations
Asymptotic NotationsAsymptotic Notations
Asymptotic Notations
 
multi threaded and distributed algorithms
multi threaded and distributed algorithms multi threaded and distributed algorithms
multi threaded and distributed algorithms
 
Parallel algorithms
Parallel algorithms Parallel algorithms
Parallel algorithms
 
Theory of Automata and formal languages Unit 5
Theory of Automata and formal languages Unit 5Theory of Automata and formal languages Unit 5
Theory of Automata and formal languages Unit 5
 
Introduction to Algorithms and Asymptotic Notation
Introduction to Algorithms and Asymptotic NotationIntroduction to Algorithms and Asymptotic Notation
Introduction to Algorithms and Asymptotic Notation
 
Introduction to Algorithms Complexity Analysis
Introduction to Algorithms Complexity Analysis Introduction to Algorithms Complexity Analysis
Introduction to Algorithms Complexity Analysis
 
Unit 1
Unit 1Unit 1
Unit 1
 
A Numerical Analytic Continuation and Its Application to Fourier Transform
A Numerical Analytic Continuation and Its Application to Fourier TransformA Numerical Analytic Continuation and Its Application to Fourier Transform
A Numerical Analytic Continuation and Its Application to Fourier Transform
 
asymptotic analysis and insertion sort analysis
asymptotic analysis and insertion sort analysisasymptotic analysis and insertion sort analysis
asymptotic analysis and insertion sort analysis
 
P, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardP, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-Hard
 
Daa notes 3
Daa notes 3Daa notes 3
Daa notes 3
 
Introducction to Algorithm
Introducction to AlgorithmIntroducction to Algorithm
Introducction to Algorithm
 
Data Structure: Algorithm and analysis
Data Structure: Algorithm and analysisData Structure: Algorithm and analysis
Data Structure: Algorithm and analysis
 
NP-Completeness - II
NP-Completeness - IINP-Completeness - II
NP-Completeness - II
 
Turing machine
Turing machineTuring machine
Turing machine
 
Basic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV SyllabusBasic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV Syllabus
 

Similar to Sample presentation slides

analysis of algorithms
analysis of algorithmsanalysis of algorithms
analysis of algorithmsMyMovies15
 
Computational Complexity: Introduction-Turing Machines-Undecidability
Computational Complexity: Introduction-Turing Machines-UndecidabilityComputational Complexity: Introduction-Turing Machines-Undecidability
Computational Complexity: Introduction-Turing Machines-UndecidabilityAntonis Antonopoulos
 
2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練Abner Huang
 
01 - DAA - PPT.pptx
01 - DAA - PPT.pptx01 - DAA - PPT.pptx
01 - DAA - PPT.pptxKokilaK25
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiouvafopoulos
 
CS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsCS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsKrishnan MuthuManickam
 
Randomized Algorithm- Advanced Algorithm
Randomized Algorithm- Advanced AlgorithmRandomized Algorithm- Advanced Algorithm
Randomized Algorithm- Advanced AlgorithmMahbubur Rahman
 
DAA-Unit1.pptx
DAA-Unit1.pptxDAA-Unit1.pptx
DAA-Unit1.pptxNishaS88
 
Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1Deepak John
 
Class 16: Making Loops
Class 16: Making LoopsClass 16: Making Loops
Class 16: Making LoopsDavid Evans
 
19 algorithms-and-complexity-110627100203-phpapp02
19 algorithms-and-complexity-110627100203-phpapp0219 algorithms-and-complexity-110627100203-phpapp02
19 algorithms-and-complexity-110627100203-phpapp02Muhammad Aslam
 

Similar to Sample presentation slides (20)

Lec7
Lec7Lec7
Lec7
 
Lec7.ppt
Lec7.pptLec7.ppt
Lec7.ppt
 
Lec7.ppt
Lec7.pptLec7.ppt
Lec7.ppt
 
analysis of algorithms
analysis of algorithmsanalysis of algorithms
analysis of algorithms
 
Computational Complexity: Introduction-Turing Machines-Undecidability
Computational Complexity: Introduction-Turing Machines-UndecidabilityComputational Complexity: Introduction-Turing Machines-Undecidability
Computational Complexity: Introduction-Turing Machines-Undecidability
 
Analysis of Algorithum
Analysis of AlgorithumAnalysis of Algorithum
Analysis of Algorithum
 
Randomization
RandomizationRandomization
Randomization
 
2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練
 
01 - DAA - PPT.pptx
01 - DAA - PPT.pptx01 - DAA - PPT.pptx
01 - DAA - PPT.pptx
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou
 
CS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsCS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of Algorithms
 
Randomized Algorithm- Advanced Algorithm
Randomized Algorithm- Advanced AlgorithmRandomized Algorithm- Advanced Algorithm
Randomized Algorithm- Advanced Algorithm
 
Slide2
Slide2Slide2
Slide2
 
Big Oh.ppt
Big Oh.pptBig Oh.ppt
Big Oh.ppt
 
DAA-Unit1.pptx
DAA-Unit1.pptxDAA-Unit1.pptx
DAA-Unit1.pptx
 
01-algo.ppt
01-algo.ppt01-algo.ppt
01-algo.ppt
 
Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1
 
Lec1
Lec1Lec1
Lec1
 
Class 16: Making Loops
Class 16: Making LoopsClass 16: Making Loops
Class 16: Making Loops
 
19 algorithms-and-complexity-110627100203-phpapp02
19 algorithms-and-complexity-110627100203-phpapp0219 algorithms-and-complexity-110627100203-phpapp02
19 algorithms-and-complexity-110627100203-phpapp02
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Sample presentation slides

  • 1. ‫ارائه‬ ‫عنوان‬ ‫راهنما‬ ‫اساتید‬ : ‫اول‬ ‫استاد‬ ‫نام‬ ‫دوم‬ ‫استاد‬ ‫نام‬ ‫دهنده‬ ‫ارائه‬ : ‫باقی‬ ‫وحید‬ ‫بهمن‬ ۱۳۹۹ ‫تهران‬ ‫دانشگاه‬ ‫فنی‬ ‫های‬ ‫دانشکده‬ ‫پردیس‬ ‫مهندسی‬ ‫علوم‬ ‫دانشکده‬ ‫کامپیوتر‬ ‫مهندسی‬ – ‫محاسبات‬ ‫و‬ ‫ها‬ ‫الگوریتم‬
  • 2. Department of Algorithms and Computation School of Engineering Science College of Engineering University of Tehran Winter 2019 Test Subject Presentation by : Vahid Baghi
  • 3. mode of computation deterministic mode Parameters for a Complexity Class nondeterministic mode
  • 4. Time is Tape Dependent Theorem : Let 𝑡 𝑛 be a function , where 𝑡 𝑛 > 𝑛 .Then every 𝑡 𝑛 time multitape Turing machine has an equivalent 𝑂(𝑡2 (𝑛)) time single-tape Turing machine. Transition Logic ⊔ 1 0 ∞ ⊔ # 0 0 1 # 0 1 1 # 1 0 ∞ ⊔ 0 1 1 ∞ ⊔ 0 0 1 Transition Logic 110
  • 5. Proper Complexity Functions Definition There exists a TM M that outputs exactly 𝑓 𝑛 symbols on input 1𝑛 and runs in time O(𝑓 𝑛 + 𝑛) and space O(𝑓 𝑛 ) f is a proper complexity function if : ∀𝑛 ∶ 𝑓 𝑛 ≥ 𝑓(𝑛 − 1) For Example : log 𝑛 , 𝑛 , 𝑛2 , …
  • 6. A complexity class is a set of classes of decision problems (or languages) with the same worst-case complexity Complexity Classes DTIME or TIME is the computational resource of computation time for a deterministic Turing machine DTIME DSPACE DSPACE or SPACE is the computational resource describing the resource of memory space for a deterministic Turing machine
  • 7. Time Complexity Hierarchy Theorem : for any 𝑡 𝑛 > 0 , there exists a decidable language L ∉ 𝐷𝑇𝐼𝑀𝐸(𝑡 𝑛 ) Define 𝐿 = 𝑖 𝑀𝑖 does not accept i within 𝑡 𝑖 time } Question : is L ∈ 𝐷𝑇𝐼𝑀𝐸 𝑡 𝑛 ? Proof : Assume (towards contradiction) L ∈ 𝐷𝑇𝐼𝑀𝐸 𝑡 𝑛 ∃ a fixed K ∈ 𝑁 such that Turing machine 𝑀𝐾 decides L within time bound 𝑡 𝑛
  • 8. ‫تصادفی‬ ‫شبه‬ ‫و‬ ‫تصادفی‬ ‫اعداد‬ ‫مولد‬ ‫تصادفی‬ ‫اعداد‬ ‫مولد‬ ( Random Number Generator ) ‫ای‬‫وسیله‬ ‫تولید‬ ‫برای‬ ‫که‬ ‫است‬ ‫فیزیکی‬ ‫ای‬‫دنباله‬ ‫کار‬ ‫به‬ ‫ندارند‬ ‫خاصی‬ ‫الگوی‬ ‫که‬ ‫اعداد‬ ‫از‬ ‫رو‬‫می‬ ‫د‬ . ‫مثال‬ ‫برای‬ • ‫پرتاب‬ ‫تاس‬ • ‫سکه‬ ‫پرتاب‬ • ‫شانس‬ ‫گردونه‬ ‫تصادفی‬ ‫شبه‬ ‫اعداد‬ ‫مولد‬ ( Pseudo Random Number Generator : ) ‫که‬ ‫است‬ ‫الگوریتمی‬ ‫ای‬‫دنباله‬ ‫تول‬ ، ‫هستند‬ ‫تصادفی‬ ‫مناسبی‬ ‫تقریب‬ ‫با‬ ‫که‬ ‫را‬ ‫اعداد‬ ‫از‬ ‫ید‬ ‫کند‬‫می‬ .
  • 9. ‫تصادفی‬ ‫اعداد‬ ‫های‬ ‫مولد‬ ‫تست‬ ‫روش‬ ‫مونت‬ ‫کارلو‬ ‫عدد‬ ‫تخمین‬ ‫برای‬ 𝜋 𝐴𝑐𝑖𝑟𝑐𝑙𝑒 𝐴𝑠𝑞𝑢𝑎𝑟𝑒 = 𝜋𝑟2 (2𝑟)2 = 𝜋 4 𝜋 = 4 ∗ 𝐴𝑐𝑖𝑟𝑐𝑙𝑒 𝐴𝑠𝑞𝑢𝑎𝑟𝑒 X Y
  • 10. ‫مقدمه‬ ‫تحق‬ ‫پیشینه‬ ‫یق‬ ‫پیشنهادی‬ ‫روش‬ ‫نتایج‬ ‫ارزیابی‬ ‫گیری‬ ‫نتیجه‬ ‫پیشنهادات‬ ‫نمونه‬ ‫عنوان‬ 1/n
  • 11. ‫مقدمه‬ ‫تحق‬ ‫پیشینه‬ ‫یق‬ ‫پیشنهادی‬ ‫روش‬ ‫نتایج‬ ‫ارزیابی‬ ‫گیری‬ ‫نتیجه‬ ‫پیشنهادات‬ ‫نمونه‬ ‫عنوان‬ ‫عنوان‬ ‫زیر‬ ۱ ‫عنوان‬ ‫زیر‬ ۲ ‫نمونه‬ ‫فرمول‬ 1/n 𝑠𝑡+1 = {𝑒𝑖, 𝑒𝑖 ∈ 𝑠𝑡, 𝑟 + 1 ≤ 𝑖 ≤ 𝑛} ∪ {𝑝i|𝑝i ∈ 𝑝, 1 ≤ 𝑖 ≤ 𝑟}
  • 12.
  • 14. User ID Movie ID Rating Timestamp 1 40 3 881250929 2 32 4 886176814 1 10 3.5 881250939 3 20 5 874833878 1 20 2 881250949 2 50 3 886176824 4 11 4.5 879196566 User ID Movie ID Rating Timestamp 1 40 3 881250929 1 10 3.5 881250939 1 20 2 881250949 2 32 4 886176814 2 50 3 886176824 3 20 5 874833878 4 11 4.5 879196566 MovieLens Dataset