Introduction to Algorithms

Size: px
Start display at page:

Download "Introduction to Algorithms"

Transcription

1 Introduction to Algorithms 6.46J/.4J LECTURE 7 Shortest Paths I Properties o shortest paths Dijkstra s Correctness Analysis Breadth-irst Paths in graphs Consider a digraph G = (V, E) with edge-weight unction w : EoR. The weight o path p = v o v o ov k is deined to be k w( v i, v i i w ( p) ). Pro. Erik Demaine November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. Paths in graphs Consider a digraph G = (V, E) with edge-weight unction w : EoR. The weight o path p = v o v o ov k is deined to be Example: k w( v i, v i i w ( p) ). Shortest paths A shortest path rom u to v is a path o minimum weight rom u to v. The shortestpath weight rom u to v is deined as G(u, v) = min{w(p) : p is a path rom u to v}. Note:G(u, v) = i no path rom u to v exists. v 4 v 5 v v 4 v 5 v 4 v 5 w(p) = November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.4

2 Optimal substructure Theorem. A subpath o a shortest path is a shortest path. Optimal substructure Theorem. A subpath o a shortest path is a shortest path. Proo. Cut and paste: November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.5 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.6 Optimal substructure Theorem. A subpath o a shortest path is a shortest path. Proo. Cut and paste: Triangle inequality Theorem. For all u, v, x V, we have G(u, v) dg(u, x) + G(x, v). November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.7 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.

3 Triangle inequality Theorem. For all u, v, x V, we have G(u, v) dg(u, x) + G(x, v). Well-deinedness o shortest paths I a graph G contains a negative-weight cycle, then some shortest paths may not exist. Proo. uu G(u, v) G(u, x) G(x, v) xx vv November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.9 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. Well-deinedness o shortest paths I a graph G contains a negative-weight cycle, then some shortest paths may not exist. Example: uu < November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. vv Single-source shortest paths Problem. From a given source vertex s V, ind the shortest-path weights G(s, v) or all v V. I all edge weights w(u, v) are nonnegative, all shortest-path weights must exist. IDEA: Grdy.. Maintain a set S o vertices whose shortestpath distances rom s are known.. At each step a to S the vertex v V S whose distance estimate rom s is minimal.. Update the distance estimates o vertices adjacent to v. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.

4 Dijkstra s d[s] m or each v V {s} do d[v] m Sm QmV Q is a priority queue maintaining V S Dijkstra s d[s] m or each v V {s} do d[v] m Sm QmV Q is a priority queue maintaining V S do u m EXTRACT-MIN(Q) SmS {u} or each v Adj[u] [MXLZJVSQ5 do i d[v] > d[u] + w(u, v) then d[v] m d[u] + w(u, v) MJH?YA!MRJMRMX]FVIEO )EPPVIQEMRMRK ZIVXMGIWEVIRSX EGGIWWMFPIJVSQ WSYVGI November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.4 Dijkstra s d[s] m or each v V {s} do d[v] m Sm QmV Q is a priority queue maintaining V S do u m EXTRACT-MIN(Q) SmS {u} or each v Adj[u] [MXLZJVSQ5 do i d[v] > d[u] + w(u, v) then d[v] m d[u] + w(u, v) TVIZ?ZA!Y Implicit DECREASE-KEY MJH?YA!MRJMRMX]FVIEO )EPPVIQEMRMRK ZIVXMGIWEVIRSX EGGIWWMFPIJVSQ WSYVGI relaxation step November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.5 Example o Dijkstra s Graph with nonnegative edge weights: November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.6 BB D EE

5 Initialize: Example o Dijkstra s BB D Q: A B C D E EE S: {} Example o Dijkstra s A mextract-min(q): BB D Q: A B C D E EE S: { A } November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.7 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. Example o Dijkstra s Relax all edges leaving A: Q: A B C D E S: { A } EE Example o Dijkstra s C mextract-min(q): Q: A B C D E S: { A, C } EE November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.9 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.

6 Q: Example o Dijkstra s Relax all edges leaving C: A B C D E S: { A, C } EE 5 Q: Example o Dijkstra s E mextract-min(q): A B C D E EE 5 S: { A, C, E } November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. Q: Example o Dijkstra s Relax all edges leaving E: A B C D E EE 5 S: { A, C, E } Example o Dijkstra s B mextract-min(q): Q: A B C D E EE 5 S: { A, C, E, B } November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.4

7 Q: Example o Dijkstra s Relax all edges leaving B: A B C D E November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L EE 5 S: { A, C, E, B } Q: Example o Dijkstra s D mextract-min(q): A B C D E November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L EE 5 S: { A, C, E, B, D } Correctness Part I Lemma. Initializing d[s] m and d[v] m or all v V {s} establishes d[v] tg(s, v) or all v V, and this invariant is maintained over any sequence o relaxation steps. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.7 Correctness Part I Lemma. Initializing d[s] m and d[v] m or all v V {s} establishes d[v] tg(s, v) or all v V, and this invariant is maintained over any sequence o relaxation steps. Proo. Suppose not. Let v be the irst vertex or which d[v] < G(s, v), and let u be the vertex that caused d[v] to change: d[v] = d[u] + w(u, v). Then, d[v] < G(s, v) supposition dg(s, u) + G(u, v) triangle inequality dg(s,u) + w(u, v) sh. path d specc path d d[u] + w(u, v) v is irst violation Contradiction. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.

8 Correctness Part II Lemma. Let u be v s predecessor on a shortest path rom s to v. Then, i d[u] = G(s, u) and edge (u, v) is relaxed, we have d[v] G(s, v) ater the relaxation. Correctness Part II Lemma. Let u be v s predecessor on a shortest path rom s to v. Then, i d[u] = G(s, u) and edge (u, v) is relaxed, we have d[v] G(s, v) ater the relaxation. Proo. Observe that G(s, v) = G(s, u)+ w(u, v). Suppose that d[v] > G(s, v) beore the relaxation. (Otherwise, we re done.) Then, the test d[v] > d[u] + w(u, v) suds, because d[v] > G(s, v) = G(s, u)+ w(u, v) = d[u] + w(u, v), and the sets d[v] = d[u] + w(u, v) = G(s, v). November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.9 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. Correctness Part III Theorem. Dijkstra s terminates with d[v] = G(s, v) or all v V. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. Correctness Part III Theorem. Dijkstra s terminates with d[v] = G(s, v) or all v V. Proo. It suices to show that d[v] = G(s, v) or every v V when v is aed to S. Suppose u is the irst vertex aed to S or which d[u]!g(s, u). Let y be the irst vertex in V S along a shortest path rom s to u, and let x be its predecessor: S, just beore aing u. ss November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. xx yy uu

9 Correctness Part III (continued) ss S Since u is the irst vertex violating the claimed invariant, we have d[x] = G(s, x). When x was aed to S, the edge (x, y) was relaxed, which implies that d[y] =G(s, y) dg(s, u) d[u]. But, d[u] d d[y] by our choice o u. Contradiction. xx yy uu Analysis o Dijkstra do u m EXTRACT-MIN(Q) SmS {u} or each v Adj[u] do i d[v] > d[u] + w(u, v) then d[v] m d[u] + w(u, v) November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.4 Analysis o Dijkstra Analysis o Dijkstra V times do u m EXTRACT-MIN(Q) SmS {u} or each v Adj[u] do i d[v] > d[u] + w(u, v) then d[v] m d[u] + w(u, v) V times degr(u) times do u m EXTRACT-MIN(Q) SmS {u} or each v Adj[u] do i d[v] > d[u] + w(u, v) then d[v] m d[u] + w(u, v) November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.5 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.6

10 Analysis o Dijkstra Analysis o Dijkstra V times degr(u) times do u m EXTRACT-MIN(Q) SmS {u} or each v Adj[u] do i d[v] > d[u] + w(u, v) then d[v] m d[u] + w(u, v) V times degr(u) times do u m EXTRACT-MIN(Q) SmS {u} or each v Adj[u] do i d[v] > d[u] + w(u, v) then d[v] m d[u] + w(u, v) Handshaking Lemma Ÿ4(E) implicit DECREASE-KEY s. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.7 Handshaking Lemma Ÿ4(E) implicit DECREASE-KEY s. Time = 4(V T EXTRACT-MIN + E T DECREASE-KEY ) Note: Same ormula as in the analysis o Prim s minimum spanning tr. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7. Analysis o Dijkstra (continued) Time = 4(V) T EXTRACT-MIN + 4(E) T DECREASE-KEY Q T EXTRACT-MIN T DECREASE-KEY Total Analysis o Dijkstra (continued) Time = 4(V) T EXTRACT-MIN + 4(E) T DECREASE-KEY Q T EXTRACT-MIN T DECREASE-KEY Total array O(V) O() O(V ) November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.9 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.4

11 Analysis o Dijkstra (continued) Time = 4(V) T EXTRACT-MIN + 4(E) T DECREASE-KEY Q T EXTRACT-MIN T DECREASE-KEY Total array O(V) O() O(V ) binary heap O(lg V) O(lg V) O(E lg V) Analysis o Dijkstra (continued) Time = 4(V) T EXTRACT-MIN + 4(E) T DECREASE-KEY Q T EXTRACT-MIN T DECREASE-KEY Total array O(V) O() O(V ) binary heap Fibonai heap O(lg V) O(lg V) O(E lg V) O(lg V) amortized O() amortized O(E + V lg V) worst case November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.4 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.4 Unweighted graphs Suppose that w(u, v) = or all (u, v) E. Can Dijkstra s be improved? Unweighted graphs Suppose that w(u, v) = or all (u, v) E. Can Dijkstra s be improved? Use a simple FIFO queue instead o a priority queue. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.4 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.44

12 Unweighted graphs Suppose that w(u, v) = or all (u, v) E. Can Dijkstra s be improved? Use a simple FIFO queue instead o a priority queue. Breadth-irst do umdequeue(q) or each v Adj[u] do i d[v] = then d[v] m d[u] + ENQUEUE(Q, v) November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.45 Unweighted graphs Suppose that w(u, v) = or all (u, v) E. Can Dijkstra s be improved? Use a simple FIFO queue instead o a priority queue. Breadth-irst do umdequeue(q) or each v Adj[u] do i d[v] = then d[v] m d[u] + ENQUEUE(Q, v) Analysis: Time = O(V + E). November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.46 Example o breadth-irst Example o breadth-irst aa aa Q: Q: a November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.47 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.4

13 Example o breadth-irst Example o breadth-irst aa Q: a b d aa Q: a b d c e November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.49 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.5 Example o breadth-irst Example o breadth-irst aa Q: a bdc e aa Q: a bdce November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.5 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.5

14 Example o breadth-irst aa Q: a b d c e g i Example o breadth-irst aa 4 4 Q: a b d c e g i November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.5 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.54 Example o breadth-irst aa Q: a b d c e g i h Example o breadth-irst aa Q: a b d c e g i h November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.55 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.56

15 Example o breadth-irst aa 4 4 Q: a b d c e g i h Example o breadth-irst aa 4 4 Q: a b d c e g i h November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.57 November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.5 Correctness o BFS do umdequeue(q) or each v Adj[u] do i d[v] = then d[v] m d[u] + ENQUEUE(Q, v) Key idea: The FIFO Q in breadth-irst mimics the priority queue Q in Dijkstra. Invariant: v comes ater u in Q implies that d[v] = d[u] or d[v] = d[u] +. November 4, 5 Copyright -5 by Erik D. Demaine and Charles E. Leiserson L7.59

SIDDHARTH INSTITUTE OF ENGINEERING & TECHNOLOGY :: PUTTUR (AUTONOMOUS) Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)

SIDDHARTH INSTITUTE OF ENGINEERING & TECHNOLOGY :: PUTTUR (AUTONOMOUS) Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE) Subject with Code : Data Structures(16MC806) Course & Specialization: MCA UNIT I Sorting, Searching and Directories 1. Explain how to sort the elements by using insertion sort and derive time complexity

More information

Uninformed search methods II.

Uninformed search methods II. CS 1571 Introduction to AI Lecture 5 Uninformed search methods II. Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Uninformed methods Uninformed search methods use only information available in

More information

Uninformed search methods II.

Uninformed search methods II. CS 2710 Foundations of AI Lecture 4 Uninformed search methods II. Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Announcements Homework assignment 1 is out Due on Tuesday, September 12, 2017 before

More information

EE582 Physical Design Automation of VLSI Circuits and Systems

EE582 Physical Design Automation of VLSI Circuits and Systems EE Prof. Dae Hyun Kim School of Electrical Engineering and Computer Science Washington State University Routing Grid Routing Grid Routing Grid Routing Grid Routing Grid Routing Lee s algorithm (Maze routing)

More information

Topics Ch 3 Test A. A) 14 minutes B) 15 minutes C) 16 minutes minutes

Topics Ch 3 Test A. A) 14 minutes B) 15 minutes C) 16 minutes minutes Topics Ch 3 Test A Name: Period:. Given the order-requirement digraph below (with time given in minutes) and the priority list TI, T2, T 3, T4, Ts, T6, apply the list-processing algorithm to construct

More information

CSE 3401: Intro to AI & LP Uninformed Search II

CSE 3401: Intro to AI & LP Uninformed Search II CSE 3401: Intro to AI & LP Uninformed Search II Required Readings: R & N Chapter 3, Sec. 1-4. 1 {Arad}, {Zerind, Timisoara, Sibiu}, {Zerind, Timisoara, Arad, Oradea, Fagaras, RimnicuVilcea }, {Zerind,

More information

Uninformed search methods

Uninformed search methods Lecture 3 Uninformed search methods Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Announcements Homework assignment 1 is out Due on Tuesday, September 12, 2017 before the lecture Report and programming

More information

Uninformed Search (Ch )

Uninformed Search (Ch ) 1 Uninformed Search (Ch. 3-3.4) 7 Small examples 8-Queens: how to fit 8 queens on a 8x8 board so no 2 queens can capture each other Two ways to model this: Incremental = each action is to add a queen to

More information

Uninformed Search (Ch )

Uninformed Search (Ch ) 1 Uninformed Search (Ch. 3-3.4) 3 Terminology review State: a representation of a possible configuration of our problem Action: -how our agent interacts with the problem -can be different depending on

More information

Algorithms and Data Structures

Algorithms and Data Structures Algorithms and Data Structures CMPSC 465 LECTURES 22-23 Binary Search Trees Adam Smith S. Raskhodnikova and A. Smith. Based on slides by C. Leiserson and E. Demaine. 1 Heaps: Review Heap-leap-jeep-creep(A):

More information

Area, Volume, and Center of Mass

Area, Volume, and Center of Mass Area, Volume, and Center of Mass MATH 311, Calculus III J. obert Buchanan Department of Mathematics Fall 211 Introduction Today we will apply the double integral to the problems of finding the area of

More information

Uninformed search methods

Uninformed search methods Lecture 3 Uninformed search methods Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Announcements Homework 1 Access through the course web page http://www.cs.pitt.edu/~milos/courses/cs2710/ Two

More information

Real World Search Problems. CS 331: Artificial Intelligence Uninformed Search. Simpler Search Problems. Example: Oregon. Search Problem Formulation

Real World Search Problems. CS 331: Artificial Intelligence Uninformed Search. Simpler Search Problems. Example: Oregon. Search Problem Formulation Real World Search Problems S 331: rtificial Intelligence Uninformed Search 1 2 Simpler Search Problems ssumptions bout Our Environment Fully Observable Deterministic Sequential Static Discrete Single-agent

More information

Pre-Kindergarten 2017 Summer Packet. Robert F Woodall Elementary

Pre-Kindergarten 2017 Summer Packet. Robert F Woodall Elementary Pre-Kindergarten 2017 Summer Packet Robert F Woodall Elementary In the fall, on your child s testing day, please bring this packet back for a special reward that will be awarded to your child for completion

More information

Maximum CPU utilization is obtained by multiprogramming. CPU I/O Burst Cycle Process execution consists of a cycle of CPU execution and I/O wait

Maximum CPU utilization is obtained by multiprogramming. CPU I/O Burst Cycle Process execution consists of a cycle of CPU execution and I/O wait Chapter 5: CPU Scheduling Basic Concepts Maximum CPU utilization is obtained by multiprogramming CPU I/O Burst Cycle Process execution consists of a cycle of CPU execution and I/O wait Burst access CPU

More information

DESIGN AND ANALYSIS OF ALGORITHMS (DAA 2017)

DESIGN AND ANALYSIS OF ALGORITHMS (DAA 2017) DESIGN AND ANALYSIS OF ALGORITHMS (DAA 2017) Veli Mäkinen 12/05/2017 1 COURSE STRUCTURE 7 weeks: video lecture -> demo lecture -> study group -> exercise Video lecture: Overview, main concepts, algorithm

More information

Imperfectly Shared Randomness in Communication

Imperfectly Shared Randomness in Communication Imperfectly Shared Randomness in Communication Madhu Sudan Harvard Joint work with Clément Canonne (Columbia), Venkatesan Guruswami (CMU) and Raghu Meka (UCLA). 11/16/2016 UofT: ISR in Communication 1

More information

Princess Nora University Faculty of Computer & Information Systems ARTIFICIAL INTELLIGENCE (CS 370D) Computer Science Department

Princess Nora University Faculty of Computer & Information Systems ARTIFICIAL INTELLIGENCE (CS 370D) Computer Science Department Princess Nora University Faculty of Computer & Information Systems 1 ARTIFICIAL INTELLIGENCE (CS 370D) Computer Science Department (CHAPTER-3-PART2) PROBLEM SOLVING AND SEARCH (Course coordinator) Searching

More information

Better Search Improved Uninformed Search CIS 32

Better Search Improved Uninformed Search CIS 32 Better Search Improved Uninformed Search CIS 32 Functionally PROJECT 1: Lunar Lander Game - Demo + Concept - Open-Ended: No One Solution - Menu of Point Options - Get Started NOW!!! - Demo After Spring

More information

Lecture 10. Support Vector Machines (cont.)

Lecture 10. Support Vector Machines (cont.) Lecture 10. Support Vector Machines (cont.) COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne This lecture Soft margin SVM Intuition and problem

More information

Uninformed Search Strategies

Uninformed Search Strategies Uninformed Search Strategies Instructor: Dr. Wei Ding Fall 2010 1 Uninformed Search Strategies Also called blind search. Have no additional information about states beyond that provided in the problem

More information

Representation. Representation. Representation. Representation. 8 puzzle.

Representation. Representation. Representation. Representation. 8 puzzle. You have a 3-liter jug and a 4-liter jug, and need to measure out exactly two liters of water. the jugs do not have any measurement lines you don't have any additional containers 8 puzzle. Measuring water.

More information

Solving Problems by Searching chap3 1. Problem-Solving Agents

Solving Problems by Searching chap3 1. Problem-Solving Agents Chapter3 Solving Problems by Searching 20070315 chap3 1 Problem-Solving Agents Reflex agents cannot work well in those environments - state/action mapping too large - take too long to learn Problem-solving

More information

Abstract In this paper, the author deals with the properties of circumscribed ellipses of convex quadrilaterals, using tools of parallel projective tr

Abstract In this paper, the author deals with the properties of circumscribed ellipses of convex quadrilaterals, using tools of parallel projective tr Study on the Properties of Circumscribed Ellipses of Convex Quadrilaterals Author: Yixi Shen Mentors: Zhongyuan Dai; Yijun Yao No. High School of East China Normal University Shanghai, China December,

More information

NATIONAL FEDERATION RULES B. National Federation Rules Apply with the following TOP GUN EXCEPTIONS

NATIONAL FEDERATION RULES B. National Federation Rules Apply with the following TOP GUN EXCEPTIONS TOP GUN COACH PITCH RULES 8 & Girls Division Revised January 11, 2018 AGE CUT OFF A. Age 8 & under. Cut off date is January 1st. Player may not turn 9 before January 1 st. Please have Birth Certificates

More information

Algebra I: Strand 3. Quadratic and Nonlinear Functions; Topic 1. Pythagorean Theorem; Task 3.1.2

Algebra I: Strand 3. Quadratic and Nonlinear Functions; Topic 1. Pythagorean Theorem; Task 3.1.2 Algebra I: Strand 3. Quadratic and Nonlinear Functions; Topic. Pythagorean Theorem; Task 3.. TASK 3..: 30-60 RIGHT TRIANGLES Solutions. Shown here is a 30-60 right triangle that has one leg of length and

More information

CS 4649/7649 Robot Intelligence: Planning

CS 4649/7649 Robot Intelligence: Planning CS 4649/7649 Robot Intelligence: Planning Roadmap Approaches Sungmoon Joo School of Interactive Computing College of Computing Georgia Institute of Technology S. Joo (sungmoon.joo@cc.gatech.edu) 1 *Slides

More information

Midterm Exam 1, section 2. Thursday, September hour, 15 minutes

Midterm Exam 1, section 2. Thursday, September hour, 15 minutes San Francisco State University Michael Bar ECON 312 Fall 2018 Midterm Exam 1, section 2 Thursday, September 27 1 hour, 15 minutes Name: Instructions 1. This is closed book, closed notes exam. 2. You can

More information

Unit 4. Triangle Relationships. Oct 3 8:20 AM. Oct 3 8:21 AM. Oct 3 8:26 AM. Oct 3 8:28 AM. Oct 3 8:27 AM. Oct 3 8:27 AM

Unit 4. Triangle Relationships. Oct 3 8:20 AM. Oct 3 8:21 AM. Oct 3 8:26 AM. Oct 3 8:28 AM. Oct 3 8:27 AM. Oct 3 8:27 AM Unit 4 Triangle Relationships 4.1 -- Classifying Triangles triangle -a figure formed by three segments joining three noncollinear points Classification of triangles: by sides by angles Oct 3 8:20 AM Oct

More information

Problem Solving Agents

Problem Solving Agents Problem Solving Agents A problem solving agent is one which decides what actions and states to consider in completing a goal Examples: Finding the shortest path from one city to another 8-puzzle Problem

More information

Chapter. Similar Triangles. Copyright Cengage Learning. All rights reserved.

Chapter. Similar Triangles. Copyright Cengage Learning. All rights reserved. Chapter 5 Similar Triangles Copyright Cengage Learning. All rights reserved. 5.4 The Pythagorean Theorem Copyright Cengage Learning. All rights reserved. The Pythagorean Theorem The following theorem will

More information

CS 4649/7649 Robot Intelligence: Planning

CS 4649/7649 Robot Intelligence: Planning CS 4649/7649 Robot Intelligence: Planning Heuristics & Search Sungmoon Joo School of Interactive Computing College of Computing Georgia Institute of Technology S. Joo (sungmoon.joo@cc.gatech.edu) 1 *Slides

More information

Addition and Subtraction of Rational Expressions

Addition and Subtraction of Rational Expressions RT.3 Addition and Subtraction of Rational Expressions Many real-world applications involve adding or subtracting algebraic fractions. Similarly as in the case of common fractions, to add or subtract algebraic

More information

CENG 466 Artificial Intelligence. Lecture 4 Solving Problems by Searching (II)

CENG 466 Artificial Intelligence. Lecture 4 Solving Problems by Searching (II) CENG 466 Artificial Intelligence Lecture 4 Solving Problems by Searching (II) Topics Search Categories Breadth First Search Uniform Cost Search Depth First Search Depth Limited Search Iterative Deepening

More information

Conservation of Energy. Chapter 7 of Essential University Physics, Richard Wolfson, 3 rd Edition

Conservation of Energy. Chapter 7 of Essential University Physics, Richard Wolfson, 3 rd Edition Conservation of Energy Chapter 7 of Essential University Physics, Richard Wolfson, 3 rd Edition 1 Different Types of Force, regarding the Work they do. gravity friction 2 Conservative Forces BB WW cccccccc

More information

CK-12 Geometry: Special Right Triangles

CK-12 Geometry: Special Right Triangles CK-12 Geometry: Special Right Triangles Learning Objectives Identify and use the ratios involved with isosceles right triangles. Identify and use the ratios involved with 30-60-90 triangles. Review Queue

More information

Minimum Mean-Square Error (MMSE) and Linear MMSE (LMMSE) Estimation

Minimum Mean-Square Error (MMSE) and Linear MMSE (LMMSE) Estimation Minimum Mean-Square Error (MMSE) and Linear MMSE (LMMSE) Estimation Outline: MMSE estimation, Linear MMSE (LMMSE) estimation, Geometric formulation of LMMSE estimation and orthogonality principle. Reading:

More information

Problem Solving as Search - I

Problem Solving as Search - I Problem Solving as Search - I Shobhanjana Kalita Dept. of Computer Science & Engineering Tezpur University Slides prepared from Artificial Intelligence A Modern approach by Russell & Norvig Problem-Solving

More information

Functions of Random Variables & Expectation, Mean and Variance

Functions of Random Variables & Expectation, Mean and Variance Functions of Random Variables & Expectation, Mean and Variance Kuan-Yu Chen ( 陳冠宇 ) @ TR-409, NTUST Functions of Random Variables 1 Given a random variables XX, one may generate other random variables

More information

Name: Grade: LESSON ONE: Home Row

Name: Grade: LESSON ONE: Home Row LESSON ONE: Home Row asdfjkl; asdfjkl; asdfjkl; aa ss dd ff jj kk ll ;; aa ss dd ff jj kk ll ;; aa ss dd ff jj kk ll ;; aa ss dd ff jj kk ll ;; aa ss dd ff jj kk ll ;; aa ss dd ff jj kk ll ;; aa ss dd

More information

Write these equations in your notes if they re not already there. You will want them for Exam 1 & the Final.

Write these equations in your notes if they re not already there. You will want them for Exam 1 & the Final. Tuesday January 30 Assignment 3: Due Friday, 11:59pm.like every Friday Pre-Class Assignment: 15min before class like every class Office Hours: Wed. 10-11am, 204 EAL Help Room: Wed. & Thurs. 6-9pm, here

More information

Operational Risk Management: Preventive vs. Corrective Control

Operational Risk Management: Preventive vs. Corrective Control Operational Risk Management: Preventive vs. Corrective Control Yuqian Xu (UIUC) July 2018 Joint Work with Lingjiong Zhu and Michael Pinedo 1 Research Questions How to manage operational risk? How does

More information

ANNEX 18. RESOLUTION MSC.362(92) (Adopted on 14 June 2013) REVISED RECOMMENDATION ON A STANDARD METHOD FOR EVALUATING CROSS-FLOODING ARRANGEMENTS

ANNEX 18. RESOLUTION MSC.362(92) (Adopted on 14 June 2013) REVISED RECOMMENDATION ON A STANDARD METHOD FOR EVALUATING CROSS-FLOODING ARRANGEMENTS MSC 92/26/Add. Annex 8, page ANNEX 8 RESOLUTION MSC.362(92) (Adopted on 4 June 203) REVISED RECOMMENDATION ON A STANDARD METHOD FOR EVALUATING CROSS-FLOODING ARRANGEMENTS THE MARITIME SAFETY COMMITTEE,

More information

Uninformed search strategies

Uninformed search strategies AIMA sections 3.4,3.5 search use only the information available in the problem denition Breadth-rst search Uniform-cost search Depth-rst search Depth-limited search Iterative deepening search Breadth-rst

More information

Inverting a Batting Average - an Application of Continued Fractions (Preliminary Version)

Inverting a Batting Average - an Application of Continued Fractions (Preliminary Version) Inverting a Batting Average - an Application of Continued Fractions (Preliminary Version) Allen Back August 30, 2000 Contents Introduction and Motivation 2 Continued Fractions 2 2. Comparison of Two Numbers

More information

Mapping Diving Locations on Bali Island Based Mobile

Mapping Diving Locations on Bali Island Based Mobile International Journal of Computer Engineering and Information Technology VOL. 9, NO. 9, September 2017, 211 215 Available online at: www.ijceit.org E-ISSN 2412-8856 (Online) Mapping Diving Locations on

More information

First-Server Advantage in Tennis Matches

First-Server Advantage in Tennis Matches First-Server Advantage in Tennis Matches Iain MacPhee and Jonathan Rougier Department of Mathematical Sciences University of Durham, U.K. Abstract We show that the advantage that can accrue to the server

More information

Coaches, Parents, Players and Fans

Coaches, Parents, Players and Fans P.O. Box 865 * Lancaster, OH 43130 * 740-808-0380 * www.ohioyouthbasketball.com Coaches, Parents, Players and Fans Sunday s Championship Tournament in Boys Grades 5th thru 10/11th will be conducted in

More information

Paul Burkhardt. May 19, 2016

Paul Burkhardt. May 19, 2016 GraphEx Symposium 2016 U.S. National Security Agency Research Directorate May 19, 2016 Graphs are everywhere! Why graph? Graph-theoretic approaches are appealing to many fields simple data abstraction

More information

OPTIMAL FLOWSHOP SCHEDULING WITH DUE DATES AND PENALTY COSTS

OPTIMAL FLOWSHOP SCHEDULING WITH DUE DATES AND PENALTY COSTS J. Operation Research Soc. of Japan VoJ. 1, No., June 1971. 1971 The Operations Research Society of Japan OPTMAL FLOWSHOP SCHEDULNG WTH DUE DATES AND PENALTY COSTS JATNDER N.D. GUPTA Assistant Professor,

More information

INTRODUCTION Microfilm copy of the Draper Collection of manuscripts. Originals located at the State Historical Society of Wisconsin.

INTRODUCTION Microfilm copy of the Draper Collection of manuscripts. Originals located at the State Historical Society of Wisconsin. C Draper, Lyman Copeland, Collection, 1735-1815 2964 136 rolls of microfilm RESTRICTED MICROFILM This collection is available at The State Historical Society of Missouri. If you would like more information,

More information

Knots and their projections I

Knots and their projections I Knots and their projections I Uwe Kaiser Boise State University REU Lecture series on Topological Quantum Computing, Talk 1 June 7, 2011 A knot is formed by glueing the two ends of a tangled rope in 3-space.

More information

8-1. The Pythagorean Theorem and Its Converse. Vocabulary. Review. Vocabulary Builder. Use Your Vocabulary

8-1. The Pythagorean Theorem and Its Converse. Vocabulary. Review. Vocabulary Builder. Use Your Vocabulary 8-1 he Pythagorean heorem and Its Converse Vocabulary Review 1. Write the square and the positive square root of each number. Number Square Positive Square Root 9 81 3 1 4 1 16 1 2 Vocabulary Builder leg

More information

CSE 3402: Intro to Artificial Intelligence Uninformed Search II

CSE 3402: Intro to Artificial Intelligence Uninformed Search II CSE 3402: Intro to Artificial Intelligence Uninformed Search II Required Readings: Chapter 3, Sec. 1-4. 1 {Arad}, {Zerind, Timisoara, Sibiu}, {Zerind, Timisoara, Arad, Oradea, Fagaras, RimnicuVilcea },

More information

SEARCH SEARCH TREE. Node: State in state tree. Root node: Top of state tree

SEARCH SEARCH TREE. Node: State in state tree. Root node: Top of state tree Page 1 Page 1 Page 2 SEARCH TREE SEARCH Node: State in state tree Root node: Top of state tree Children: Nodes that can be reached from a given node in 1 step (1 operator) Expanding: Generating the children

More information

Polynomial DC decompositions

Polynomial DC decompositions Polynomial DC decompositions Georgina Hall Princeton, ORFE Joint work with Amir Ali Ahmadi Princeton, ORFE 7/31/16 DIMACS Distance geometry workshop 1 Difference of convex (dc) programming Problems of

More information

5.5 Use Inequalities in a Triangle

5.5 Use Inequalities in a Triangle 5.5 Use Inequalities in a Triangle Goal p Find possible side lengths of a triangle. Your Notes Example 1 Relate side length and angle measure Mark the largest angle, longest side, smallest angle, and shortest

More information

CS Lecture 5. Vidroha debroy. Material adapted courtesy of Prof. Xiangnan Kong and Prof. Carolina Ruiz at Worcester Polytechnic Institute

CS Lecture 5. Vidroha debroy. Material adapted courtesy of Prof. Xiangnan Kong and Prof. Carolina Ruiz at Worcester Polytechnic Institute CS 3353 Lecture 5 Vidroha debroy Material adapted courtesy of Prof. Xiangnan Kong and Prof. Carolina Ruiz at Worcester Polytechnic Institute Searching for a number Find a specific number 91-3 26 54 73

More information

Simplifying Radical Expressions and the Distance Formula

Simplifying Radical Expressions and the Distance Formula 1 RD. Simplifying Radical Expressions and the Distance Formula In the previous section, we simplified some radical expressions by replacing radical signs with rational exponents, applying the rules of

More information

2.6 Related Rates Worksheet Calculus AB. dy /dt!when!x=8

2.6 Related Rates Worksheet Calculus AB. dy /dt!when!x=8 Two Rates That Are Related(1-7) In exercises 1-2, assume that x and y are both differentiable functions of t and find the required dy /dt and dx /dt. Equation Find Given 1. dx /dt = 10 y = x (a) dy /dt

More information

SEARCH TREE. Generating the children of a node

SEARCH TREE. Generating the children of a node SEARCH TREE Node: State in state tree Root node: Top of state tree Children: Nodes that can be reached from a given node in 1 step (1 operator) Expanding: Generating the children of a node Open: Closed:

More information

11.4 Apply the Pythagorean

11.4 Apply the Pythagorean 11.4 Apply the Pythagorean Theorem and its Converse Goal p and its converse. Your Notes VOCABULARY Hypotenuse Legs of a right triangle Pythagorean theorem THE PYTHAGOREAN THEOREM Words If a triangle is

More information

Urban OR: Quiz 2 Solutions (2003) ( 1 ρ 1 )( 1 ρ 1 ρ 2 ) ( 1 12 )( ) σ S ] 24 [ 2 = 60, 2 2 ] ( 2 ) 3

Urban OR: Quiz 2 Solutions (2003) ( 1 ρ 1 )( 1 ρ 1 ρ 2 ) ( 1 12 )( ) σ S ] 24 [ 2 = 60, 2 2 ] ( 2 ) 3 Problem 1: (a) Wo = ƒ λ Urban OR: Quiz 2 Solutions (2003) 2 2 E [ S i ] 12 1 12 9 i = + = 1 min i = 1 2 60 2 60 2 W W = o 1 q1 = = 1. 25 min ( 1 ρ 1 ) ( 1 12 ) 60 W W = o 1 q2 = = 6. 25 min ( 1 ρ 1 )(

More information

CT PET-2018 Part - B Phd COMPUTER APPLICATION Sample Question Paper

CT PET-2018 Part - B Phd COMPUTER APPLICATION Sample Question Paper CT PET-2018 Part - B Phd COMPUTER APPLICATION Sample Question Paper Note: All Questions are compulsory. Each question carry one mark. 1. Error detection at the data link layer is achieved by? [A] Bit stuffing

More information

Growth alternative for Hecke-Kiselman monoids

Growth alternative for Hecke-Kiselman monoids Growth alternative for Hecke-Kiselman monoids Arkadiusz Męcel (joint work with J. Okniński) University of Warsaw a.mecel@mimuw.edu.pl Groups, Rings and the Yang-Baxter equation, Spa, June 18-24, 2017 Hecke-Kiselman

More information

arxiv: v1 [math.co] 16 Sep 2016

arxiv: v1 [math.co] 16 Sep 2016 arxiv:1609.05137v1 [math.co] 16 Sep 2016 Curveball: a new generation of sampling algorithms for graphs with fixed degree sequence C. J. Carstens, A. Berger, G. Strona January 23, 2019 Abstract The switching

More information

9.3 Altitude-on-Hypotenuse Theorems

9.3 Altitude-on-Hypotenuse Theorems 9.3 Altitude-on-Hypotenuse Theorems Objectives: 1. To find the geometric mean of two numbers. 2. To find missing lengths of similar right triangles that result when an altitude is drawn to the hypotenuse

More information

Nationaal Lucht- en Ruimtevaartlaboratorium National Aerospace Laboratory NLR

Nationaal Lucht- en Ruimtevaartlaboratorium National Aerospace Laboratory NLR Nationaal Lucht- en Ruimtevaartlaboratorium National Aerospace Laboratory NLR NLR- Algorithms or CDM on slot allocation: slot swapping and slot shiting By Menkes van den Briel Distribution: IW LL J.M.

More information

Tie Breaking Procedure

Tie Breaking Procedure Ohio Youth Basketball Tie Breaking Procedure The higher seeded team when two teams have the same record after completion of pool play will be determined by the winner of their head to head competition.

More information

Geometry Chapter 5 Review

Geometry Chapter 5 Review Geometry Chapter 5 Review Name Multiple Choice Identify the choice that best completes the statement or answers the question. 5. Point A is the incenter of. Find AS. 1. The segment connecting the midpoints

More information

Decision Trees. Nicholas Ruozzi University of Texas at Dallas. Based on the slides of Vibhav Gogate and David Sontag

Decision Trees. Nicholas Ruozzi University of Texas at Dallas. Based on the slides of Vibhav Gogate and David Sontag Decision Trees Nicholas Ruozzi University of Texas at Dallas Based on the slides of Vibhav Gogate and David Sontag Announcements Course TA: Hao Xiong Office hours: Friday 2pm-4pm in ECSS2.104A1 First homework

More information

(a) (First lets try to design the set of toy s the easy way.) The easiest thing to do would be to pick integer lengths for the lengths of the sticks.

(a) (First lets try to design the set of toy s the easy way.) The easiest thing to do would be to pick integer lengths for the lengths of the sticks. Name: Elementary Functions K nex AAP (Pythagorean theorem, function composition) My son has a set of construction toys called K nex. In this problem you will think like the designers of these toys. The

More information

Name: Period: Unit 5 Test Review. Multiple Choice Identify the choice that best completes the statement or answers the question.

Name: Period: Unit 5 Test Review. Multiple Choice Identify the choice that best completes the statement or answers the question. Name: Period: Unit 5 Test Review Multiple hoice Identify the choice that best completes the statement or answers the question. 1. Find the measures and. 6.4 2.3 2. Given that bisects and, find. Y Z W 3.

More information

TSP at isolated intersections: Some advances under simulation environment

TSP at isolated intersections: Some advances under simulation environment TSP at isolated intersections: Some advances under simulation environment Zhengyao Yu Vikash V. Gayah Eleni Christofa TESC 2018 December 5, 2018 Overview Motivation Problem introduction Assumptions Formation

More information

My ABC Insect Discovery Book

My ABC Insect Discovery Book Act i vi t ypack I ns ectabcs I nt hi spac k: ABCASLSi gnfl as hcar ds I ns ec tabcac t i v i t y SongL y r i c s AndMor e! Ac i t i v i ess uppor ts i gnsandc onc ept st aughti n Rac hel&t het r eesc

More information

Vectors in the City Learning Task

Vectors in the City Learning Task Vectors in the City Learning Task Amy is spending some time in a city that is laid out in square blocks. The blocks make it very easy to get around so most directions are given in terms of the number of

More information

8-1. The Pythagorean Theorem and Its Converse. Vocabulary. Review. Vocabulary Builder. Use Your Vocabulary

8-1. The Pythagorean Theorem and Its Converse. Vocabulary. Review. Vocabulary Builder. Use Your Vocabulary 8-1 The Pythagorean Theorem and Its Converse Vocabulary Review 1. Write the square and the positive square root of each number. Number 9 Square Positive Square Root 1 4 1 16 Vocabulary Builder leg (noun)

More information

Course 495: Advanced Statistical Machine Learning/Pattern Recognition

Course 495: Advanced Statistical Machine Learning/Pattern Recognition Course 495: Advanced Statistical Machine Learning/Pattern Recognition Lectures: Stefanos Zafeiriou Goal (Lectures): To present modern statistical machine learning/pattern recognition algorithms. The course

More information

Artificial Intelligence. Uninformed Search Strategies

Artificial Intelligence. Uninformed Search Strategies Artificial Intelligence Uninformed search strategies Uninformed Search Strategies Uninformed strategies use only the information available in the problem definition Also called Blind Search No info on

More information

Section 8: Right Triangles

Section 8: Right Triangles The following Mathematics Florida Standards will be covered in this section: MAFS.912.G-CO.2.8 Explain how the criteria for triangle congruence (ASA, SAS, SSS, and Hypotenuse-Leg) follow from the definition

More information

GaitAnalysisofEightLegedRobot

GaitAnalysisofEightLegedRobot GaitAnalysisofEightLegedRobot Mohammad Imtiyaz Ahmad 1, Dilip Kumar Biswas 2 & S. S ROY 3 1&2 Department of Mechanical Engineering, National Institute of Technology, Durgapur 2 Technology Innovation Centre,

More information

arxiv: v1 [math.co] 11 Apr 2018

arxiv: v1 [math.co] 11 Apr 2018 arxiv:1804.04504v1 [math.co] 11 Apr 2018 Scheduling Asynchronous Round-Robin Tournaments Warut Suksompong Abstract. We study the problem of scheduling asynchronous round-robin tournaments. We consider

More information

Intro to Graph Theory

Intro to Graph Theory Intro to Grph Thory 04 IOI Cmp Rort Spnr Dmr, 0 Rort Spnr Intro to Grph Thory /0 Introution This is grph: 4 Rort Spnr Intro to Grph Thory /0 Introution This is not grph: x(x + )(x ) 4 0 - -4 - - -. - -0.

More information

The purpose of this experiment is to find this acceleration for a puck moving on an inclined air table.

The purpose of this experiment is to find this acceleration for a puck moving on an inclined air table. Experiment : Motion in an Inclined Plane PURPOSE The purpose of this experiment is to find this acceleration for a puck moving on an inclined air table. GENERAL In Experiment-1 you were concerned with

More information

Full Name: Period: Heredity EOC Review

Full Name: Period: Heredity EOC Review Full Name: Period: 1 4 5 6 7 Heredity EOC Review Directions: For each genotype below, indicate whether it is a heterozygous (write: He) OR homozygous (write: Ho). 1. Tt BB DD ff tt dd dd Ff TT Bb bb FF

More information

Lecture 5. Optimisation. Regularisation

Lecture 5. Optimisation. Regularisation Lecture 5. Optimisation. Regularisation COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne Iterative optimisation Loss functions Coordinate

More information

COMP Intro to Logic for Computer Scientists. Lecture 13

COMP Intro to Logic for Computer Scientists. Lecture 13 COMP 1002 Intro to Logic for Computer Scientists Lecture 13 B 5 2 J Admin stuff Assignments schedule? Split a2 and a3 in two (A2,3,4,5), 5% each. A2 due Feb 17 th. Midterm date? March 2 nd. No office hour

More information

1ACE Exercise 4. Name Date Class

1ACE Exercise 4. Name Date Class 1ACE Exercise 4 Investigation 1 4. A farm wants to add a small rectangular petting zoo for the public. They have a fixed amount of fencing to use for the zoo. This graph shows the lengths and areas of

More information

Internet Algorithms. Lecture 10 06/24/11

Internet Algorithms. Lecture 10 06/24/11 Internet Algorithms Lecture 10 06/24/11 (Oblivious) Routing Given a network, withedgelengthsl and demands(requirements), forall vertex pairs,, afeasibleroutingisa multicommodityflow, satisfying the requirements,

More information

Edexcel GCSE. Mathematics A 1387 Paper 5523/03. November Mark Scheme. Mathematics A 1387

Edexcel GCSE. Mathematics A 1387 Paper 5523/03. November Mark Scheme. Mathematics A 1387 Edexcel GCSE Mathematics A 187 Paper 552/0 November 2007 Mark Scheme Edexcel GCSE Mathematics A 187 NOTES ON MARKING PRINCIPLES 1 Types of mark M marks: method marks A marks: accuracy marks B marks: unconditional

More information

Lesson 3: Using the Pythagorean Theorem. The Pythagorean Theorem only applies to triangles. The Pythagorean Theorem + = Example 1

Lesson 3: Using the Pythagorean Theorem. The Pythagorean Theorem only applies to triangles. The Pythagorean Theorem + = Example 1 Lesson 3: Using the Pythagorean Theorem The Pythagorean Theorem only applies to triangles. The Pythagorean Theorem + = Example 1 A sailboat leaves dock and travels 6 mi due east. Then it turns 90 degrees

More information

x 2 = (60 m) 2 + (60 m) 2 x 2 = 3600 m m 2 x = m

x 2 = (60 m) 2 + (60 m) 2 x 2 = 3600 m m 2 x = m 3.1 Track Question a) Distance Traveled is 1600 m. This is length of the path that the person took. The displacement is 0 m. The person begins and ends their journey at the same position. They did not

More information

UAB MATH-BY-MAIL CONTEST, 2004

UAB MATH-BY-MAIL CONTEST, 2004 UAB MATH-BY-MAIL CONTEST, 2004 ELIGIBILITY. Math-by-Mail competition is an individual contest run by the UAB Department of Mathematics and designed to test logical thinking and depth of understanding of

More information

ISyE 3103 Introduction to Supply Chain Modeling: Logistics Summer 2012 Homework 8 Issued: July 11, 2012 Due: July 18, 2012

ISyE 3103 Introduction to Supply Chain Modeling: Logistics Summer 2012 Homework 8 Issued: July 11, 2012 Due: July 18, 2012 ISyE 3103 Introduction to Supply Chain Modeling: Logistics Summer 2012 Homework 8 Issued: July 11, 2012 Due: July 18, 2012 Single-Vehicle, Multiple-Destination Transportation Routing (Traveling Salesman

More information

Grade K-1 WRITING Traffic Safety Cross-Curriculum Activity Workbook

Grade K-1 WRITING Traffic Safety Cross-Curriculum Activity Workbook Grade K-1 WRITING Tra fic Safety Cross-Curriculum Activity Workbook Note to Teachers The AAA Traffic Safety Education Materials present essential safety concepts to students in Kindergarten through fifth

More information

Holly Burns. Publisher Mary D. Smith, M.S. Ed. Author

Holly Burns. Publisher Mary D. Smith, M.S. Ed. Author Editor Jenni Corcoran, M.Ed. Illustrator Renée Christine Yates Editorial Project Manager Mara Ellen Guckian Cover rtist Denise auer Managing Editor Ina Massler Levin, M.. Creative Director Karen J. Goldfluss,

More information

Combining Experimental and Non-Experimental Design in Causal Inference

Combining Experimental and Non-Experimental Design in Causal Inference Combining Experimental and Non-Experimental Design in Causal Inference Kari Lock Morgan Department of Statistics Penn State University Rao Prize Conference May 12 th, 2017 A Tribute to Don Design trumps

More information

World Eight Ball Pool Federation Rules Unabridged Version Issued January 2009 An abridged version of the latest rules may be downloaded here (pdf)

World Eight Ball Pool Federation Rules Unabridged Version Issued January 2009 An abridged version of the latest rules may be downloaded here (pdf) World Eight Ball Pool Federation Rules Unabridged Version Issued January 2009 An abridged version of the latest rules may be downloaded here (pdf) THE RACK The Playing Rules are the copyright of the World

More information

Physical Design of CMOS Integrated Circuits

Physical Design of CMOS Integrated Circuits Physical Design of CMOS Integrated Circuits Dae Hyun Kim EECS Washington State University References John P. Uyemura, Introduction to VLSI Circuits and Systems, 2002. Chapter 5 Goal Understand how to physically

More information

SQUARE ROOTS. Pythagoras theorem has been a perennially interesting. Drawing A SPIRAL OF. ClassRoom

SQUARE ROOTS. Pythagoras theorem has been a perennially interesting. Drawing A SPIRAL OF. ClassRoom Drawing A SPIRAL OF SQUARE ROOTS ClassRoom KHUSHBOO AWASTHI "Mathematics possesses a beauty cold and austere, yet sublimely pure, and capable of a stern perfection such as only the greatest art can show."

More information