Search results for "Algorithm"

showing 10 items of 4887 documents

More Power through Symbolic Computation: Extending Stata by using the Maxima Computer algebra system

2015

Maxima is a free and open-source computer algebra system that can perform symbolic computations such as solving equations, determining derivatives of functions, obtaining Taylor series, and manipulating algebraic expressions. In this article, I present the Maxima Bridge System, which is a collection of software programs that allows Stata to interface with Maxima so that Maxima can be used for symbolic computation to transfer data from Stata to Maxima and to retrieve results from Maxima. The cooperation between Stata and Maxima provides an environment for statistical analysis in which symbolic computation can be easily used together with all the facilities supplied by Stata. In this environ…

Theoretical computer sciencebusiness.industryComputationInterface (computing)Symbolic computationsymbols.namesakeMathematics (miscellaneous)SoftwareComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONTaylor seriessymbolsAlgebraic expressionbusinessMaximaAlgorithmMathematicsEquation solvingThe Stata Journal: Promoting communications on statistics and Stata
researchProduct

Design of Representations and Search Operators

2015

Successful and efficient use of evolutionary algorithms depends on the choice of genotypes and the representation – that is, the mapping from genotype to phenotype – and on the choice of search operators that are applied to the genotypes. These choices cannot be made independently of each other. This chapter gives recommendations on the design of representations and corresponding search operators and discusses how to consider problem-specific knowledge. For most problems in the real world, similar solutions have similar fitness values. This fact can be exploited by evolutionary algorithms if they ensure that the representations and search operators used are defined in such a way that simila…

Theoretical computer sciencebusiness.industryComputer scienceEvolutionary algorithmLocal search (optimization)Genotype to phenotypebusinessRepresentation (mathematics)Travelling salesman problem
researchProduct

Representations for evolutionary algorithms

2015

Successful and efficient use of evolutionary algorithms (EA) depends on the choice of the genotype, the problem representation (mapping from genotype to phenotype) and on the choice of search operators that are applied to the genotypes. These choices cannot be made independently of each other. The question whether a certain representation leads to better performing EAs than an alternative representation can only be answered when the operators applied are taken into consideration. The reverse is also true: deciding between alternative operators is only meaningful for a given representation. In EA practice one can distinguish two complementary approaches. The first approach uses indirect repr…

Theoretical computer sciencebusiness.industryComputer scienceEvolutionary algorithmRepresentation (systemics)Genetic programming0102 computer and information sciences02 engineering and technologyComputingMethodologies_ARTIFICIALINTELLIGENCEPhenotype01 natural sciencesOperator (computer programming)Grammatical evolution010201 computation theory & mathematicsGenetic algorithmGenotype0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingGenetic representationArtificial intelligencebusinessProceedings of the Genetic and Evolutionary Computation Conference Companion
researchProduct

Optimal Resource Discovery Paths of Gnutella2

2008

This paper shows that the performance of peer-to-peer resource discovery algorithms is upper bounded by a k-Steiner minimum tree and proposes an algorithm locating near-optimal query paths for the peer-to-peer resource discovery problem. Global knowledge of the topology and the resources from the peer-to-peer network are required as an input to the algorithm. The algorithm provides an objective measure for defining how good local search algorithms are. The performance is evaluated in simulated peer-to-peer scenarios and in the measured Gnutella2 P2P network topology with four local search algorithms: breadth-first search, self-avoiding random walker, highest degree search and Dynamic Query …

Theoretical computer sciencebusiness.industryComputer scienceNetwork topologyComputer Science::Digital LibrariesSteiner tree problemTree (graph theory)symbols.namesakeRandom walker algorithmSearch algorithmBounded functionsymbolsResource allocationLocal search (optimization)Gnutella2business22nd International Conference on Advanced Information Networking and Applications (aina 2008)
researchProduct

E-learning approach of the graph coloring problem applied to register allocation in embedded systems

2016

The main aim of this paper consists in developing an effective e-learning tool, focused on evolutionary algorithms, in order to solve the graph coloring problem. Subsidiary, we apply graph coloring for register allocation in embedded systems. From didactic viewpoint, our tool has benefits in the learning process because it helps students to observe the relationship between the graph coloring problem and CPU registers allocation with the help of four developed modules: the genetic algorithm, the graphical viewer, the interference graph for a C program and a web application which collects the simulation results. All these applications are combined by a graphical interface which allows the use…

Theoretical computer sciencebusiness.industryComputer scienceProcessor registerEvolutionary algorithm02 engineering and technology021001 nanoscience & nanotechnologyEmbedded systemGenetic algorithm0202 electrical engineering electronic engineering information engineeringWeb applicationGraph (abstract data type)020201 artificial intelligence & image processingGraph coloring0210 nano-technologybusinessGraphical user interfaceRegister allocation2016 Sixth International Conference on Innovative Computing Technology (INTECH)
researchProduct

A basic analysis toolkit for biological sequences

2007

This paper presents a software library, nicknamed BATS, for some basic sequence analysis tasks. Namely, local alignments, via approximate string matching, and global alignments, via longest common subsequence and alignments with affine and concave gap cost functions. Moreover, it also supports filtering operations to select strings from a set and establish their statistical significance, via z-score computation. None of the algorithms is new, but although they are generally regarded as fundamental for sequence analysis, they have not been implemented in a single and consistent software package, as we do here. Therefore, our main contribution is to fill this gap between algorithmic theory an…

Theoretical computer sciencelcsh:QH426-470Computer sciencebusiness.industrysoftwareComputationApplied MathematicsString searching algorithmApproximate string matchingSoftware ArticleSet (abstract data type)Longest common subsequence problemlcsh:GeneticsSoftwareComputational Theory and Mathematicslcsh:Biology (General)Structural BiologyAffine transformationPerlbusinesscomputerMolecular Biologylcsh:QH301-705.5computer.programming_language
researchProduct

Why a Quantum Tool in Classical Contexts?

2012

Theoretical physicsQuantum discordQuantum probabilityQuantum dynamicsQuantum mechanicsQuantum processQuantum operationMethod of quantum characteristicsQuantum algorithmQuantum channelMathematicsQuantum Dynamics for Classical Systems
researchProduct

Oxygen isotope composition of North American bobcat (Lynx rufus) and puma (Puma concolor) bone phosphate: implications for provenance and climate rec…

2015

Feline carnivores are threatened by illegal wildlife trade. Tracing the provenance of unknown felid tissues via stable isotope analysis could provide important information in wildlife crime investigations. The oxygen isotope composition of mammalian skeletal phosphate (δ18Op) is widely applied to trace the origin of animal remains and to reconstruct migratory patterns in palaeontological, archaeological, ecological and wildlife forensic applications. Teeth and bones of terrestrial mammals form at constant body temperature in isotope equilibrium with body water, which is predominantly controlled by ingested meteoric water (δ18Ow) that varies systematically with latitude, altitude and climate…

TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY
researchProduct

Descriptional and Computational Complexity of the Circuit Representation of Finite Automata

2018

In this paper we continue to investigate the complexity of the circuit representation of DFA—BC-complexity. We compare it with nondeterministic state complexity, obtain upper and lower bounds which differ only by a factor of 4 for a Binary input alphabet. Also we prove that many simple operations (determining if a state is reachable or if an automaton is minimal) are PSPACE-complete for DFA given in circuit representation.

TheoryofComputation_COMPUTATIONBYABSTRACTDEVICESFinite-state machineTheoretical computer scienceComputational complexity theoryComputer science020208 electrical & electronic engineering020206 networking & telecommunications02 engineering and technologyUpper and lower boundsAutomatonNondeterministic algorithmTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESSimple (abstract algebra)0202 electrical engineering electronic engineering information engineeringState (computer science)Representation (mathematics)Computer Science::Formal Languages and Automata Theory
researchProduct

An Approximate Determinization Algorithm for Weighted Finite-State Automata

2001

Nondeterministic weighted finite-state automata are a key abstraction in automatic speech recognition systems. The efficiency of automatic speech recognition depends directly on the sizes of these automata and the degree of nondeterminism present, so recent research has studied ways to determinize and minimize them, using analogues of classical automata determinization and minimization. Although, as we describe here, determinization can in the worst case cause poly-exponential blowup in the number of states of a weighted finite-state automaton, in practice it is remarkably successful. In extensive experiments in automatic speech recognition systems, deterministic weighted finite-state autom…

TheoryofComputation_COMPUTATIONBYABSTRACTDEVICESFinite-state machineTheoretical computer scienceGeneral Computer ScienceComputer scienceApplied MathematicsComputer Science ApplicationsAutomatonNondeterministic algorithmNondeterministic finite automaton with ε-movesComputer Science::SoundDeterministic automatonTheory of computationStandard testMinificationAlgorithmComputer Science::Formal Languages and Automata TheoryAlgorithmica
researchProduct