Phylogenetic Reconstruction: Parsimony
|
|
- Olivia Stevens
- 6 years ago
- Views:
Transcription
1 Phylogenetic Reconstruction: Parsimony nders Gorm Pedersen
2 Trees: terminology
3 Trees: terminology
4 Trees: terminology Reptiles is a non-monophyletic group (unless you include birds)
5 Trees: representations Three different representations of the same tree-topology
6 Trees: representations Two different representations of the same tree-topology (from T. Ryan Gregory, Understanding Evolutionary Trees, Evo Edu Outreach (2008) 1: )
7 Trees: rooted vs. unrooted Early Late rooted tree has a single node (the root) that represents a point in time that is earlier than any other node in the tree. rooted tree has directionality (nodes can be ordered in terms of earlier or later ). In the rooted tree, distance (i.e., number of mutations) between two nodes is represented along the time-axis only (the second axis just helps spread out the leafs)
8 Trees: rooted vs. unrooted Early Late rooted tree has a single node (the root) that represents a point in time that is earlier than any other node in the tree. rooted tree has directionality (nodes can be ordered in terms of earlier or later ). In the rooted tree, distance (i.e., number of mutations) between two nodes is represented along the time-axis only (the second axis just helps spread out the leafs)
9 Trees: rooted vs. unrooted Early Late rooted tree has a single node (the root) that represents a point in time that is earlier than any other node in the tree. rooted tree has directionality (nodes can be ordered in terms of earlier or later ). In the rooted tree, distance (i.e., number of mutations) between two nodes is represented along the time-axis only (the second axis just helps spread out the leafs)
10 Trees: rooted vs. unrooted In unrooted trees there is no directionality: we do not know if a node is earlier or later than another node Distance along branches directly represents node distance
11 Trees: rooted vs. unrooted In unrooted trees there is no directionality: we do not know if a node is earlier or later than another node Distance along branches directly represents node distance
12 Reconstructing a tree using noncontemporaneous data
13 ladistics: group organisms based on shared, derived characters ( synapomorphies )
14 Homology: limb structure Homology: any similarity between characters that is due to their shared ancestry
15 Homology vs. Homoplasy X X X X Homology: similar traits inherited from a common ancestor Homoplasy: similar traits are not directly caused by common ancestry (convergent evolution).
16 Homoplasy: wings
17 Molecular phylogeny B D G G T T G G G G G T T T G G G T T T G T G G T T T T T G DN and protein sequences Homologous characters inferred from alignment. Other molecular data: absence/ presence of restriction sites, DN hybridization data, antibody crossreactivity, etc. (but losing importance due to cheap, efficient sequencing).
18 Morphology vs. molecular data frican white-backed vulture (old world vulture) ndean condor (new world vulture) New and old world vultures seem to be closely related based on morphology. Molecular data indicates that old world vultures are related to birds of prey (falcons, hawks, etc.) while new world vultures are more closely related to storks Similar features presumably the result of convergent evolution
19 Phylogenetic reconstruction Nucleotide position Taxon G G G B G T G T G T D T T T
20 Phylogenetic reconstruction Nucleotide position Taxon G G G B G T G T G T D T T T
21 Parsimony criterion: choose simplest hypothesis Nucleotide position Taxon G G G B G T G T G T D T T T
22 Parsimonious reconstruction G.. B G.. T.. D T.. Nucleotide position Taxon G G G B G T G T G T D T T T
23 Parsimonious reconstruction G.. G.. T.. B G.. T.. T.. D T.. Nucleotide position Taxon G G G B G T G T G T D T T T
24 Parsimonious reconstruction G.. G.. T.. B G.. T.. T.. D T.. Nucleotide position Taxon G G G B G T G T G T D T T T
25 lternative tree: homoplasy G.. G.. G.. T.. B G.. T.. T.. T.. B G.. D T.. D T.. Nucleotide position Taxon G G G B G T G T G T D T T T
26 lternative tree: homoplasy G.. G.. G.. T.. B G.. T.. T.. T.. B G.. D T.. D T.. Nucleotide position Taxon G G G B G T G T G T D T T T T.. T.. T..
27 lternative tree: homoplasy G.. G.. G.. T.. B G.. D T.. T.. T.. B G.. D T.. T.. Nucleotide position Taxon G G G B G T G T G T D T T T T.. T.. T..
28 One character: ssumption of no homoplasy is equivalent to finding shortest tree G... G.. G.. B G... T.. T.. T.. T... B G.. D T... D T.. Nucleotide position Taxon G G G B G T G T G T D T T T T.. T.. T..
29 Phylogenetic reconstruction..g..g..t B..G..T..T D..T Nucleotide position Taxon G G G B G T G T G T D T T T
30 Phylogenetic reconstruction G.G G.G T.T B G.G T.T T.T D T.T Nucleotide position Taxon G G G B G T G T G T D T T T
31 Phylogenetic reconstruction: conflicts B D.G..G. B.T. D.T. Nucleotide position Taxon G G G B G T G T G T D T T T.G..T..T.
32 Phylogenetic reconstruction: conflicts.g..t. B.T..T..T..G. D.T. B D Nucleotide position Taxon G G G B G T G T G T D T T T
33 Phylogenetic reconstruction: conflicts B D G.G T.T B G.G D T.T Nucleotide position Taxon G G G B G T G T G T D T T T T.T T.T T.T
34 Several characters: choose shortest tree (equivalent to fewer assumptions of homoplasy) GGG GTG GGG TGT TTT B GTG TGT TTT TGT B GTG D TTT D TTT Total length of tree: 4 Total length of tree: 5 TTT TTT
35 Maximum Parsimony Maximum parsimony: the best tree is the shortest tree (the tree requiring the smallest number of mutational events) This corresponds to the tree that implies the least amount of homoplasy (convergent evolution, reversals) How do we find the best tree for a given data set?
36 Maximum Parsimony: first approach 1. onstruct list of all possible trees for data set 2. For each tree: determine length, add to list of lengths 3. When finished: select shortest tree from list 4. If several trees have the same length, then they are equally good (equally parsimonious)
37 Maximum Parsimony: problems We need algorithm for constructing list of all possible trees We need algorithm for determining length of given tree Should all mutational events have same cost?
38 onstructing list of all possible unrooted trees 1. onstruct unrooted tree from first three taxa. There is only one way of doing this 2. Starting from (1), construct the three possible derived trees by adding taxon 4 to each internal branch 3. From each of the trees constructed in step (2), construct the five possible derived trees by adding taxon 5 to each internal branch. 4. ontinue until all taxa have been added in all possible locations
39 Maximum Parsimony: problems We need algorithm for constructing list of all possible trees We need algorithm for determining length of given tree Should all mutational events have same cost?
40 lgorithm for determining length of given tree: Fitch G What is the length of this tree? (How many mutational steps are required?)
41 lgorithm for determining length of given tree: Fitch Root the tree at an arbitrary internal node (or internal branch) Visit an internal node x for which no state set has been defined, but where the state sets of x s immediate descendants (y,z) have been defined. If the state sets of y,z have common states, then assign these to x.! If there are no common states, then assign the union of y,z to x, and increase tree length by one. Repeat until all internal nodes have been visited. Note length of current tree.
42 lgorithm for determining length of given tree: Fitch G
43 lgorithm for determining length of given tree: Fitch G
44 lgorithm for determining length of given tree: Fitch G
45 lgorithm for determining length of given tree: Fitch G
46 lgorithm for determining length of given tree: Fitch G Length so far = 0
47 lgorithm for determining length of given tree: Fitch G {, } Length so far = 1
48 lgorithm for determining length of given tree: Fitch G {, } {, G} Length so far = 2
49 lgorithm for determining length of given tree: Fitch G {, G} {, } {,, G} Length so far = 3
50 lgorithm for determining length of given tree: Fitch G {, G} {, } {,, G} {, } Length so far = 3
51 lgorithm for determining length of given tree: Fitch G {, G} {, } {,, G} {, } Length of tree = 3
52 lgorithm for determining length of given tree: Fitch G Length of tree = 3 One possible reconstruction (several others exist)
53 Maximum Parsimony: problems We need algorithm for constructing list of all possible trees We need algorithm for determining length of given tree Should all mutational events have same cost?
54 Mutational events need not have the same cost G G T G T Sankoff algorithm
55 Maximum Parsimony: problems We need algorithm for constructing list of all possible trees We need algorithm for determining length of given tree Should all mutational events have same cost?
56 How many branches are there on an unrooted tree with N tips? B B D There is only one way of constructing the first tree. This tree has 3 tips and 3 branches Each time an extra taxon is added, two branches are created. tree with N tips will therefore have the following number of branches:! n branches! = 3+(N-3)*2!!! = 3+2N-6!!! = 2N-3
57 How many unrooted trees are there? tree with N tips has 2N-3 branches For each tree with N tips, we can therefore construct 2N-3 derived trees (which each have N+1 tips).
58 How many unrooted trees are there? Ntips Ntrees Nbranches = Nderived trees x 3-3 = x 3 2 x 4-3 = x 3 x 5 2 x 5-3 = x 3 x 5 x 7 2 x 6-3 = x 3 x 5 x 7 x 9 2 x 7-3 = x 3 x 5 x 7 x 9 x 11 2 x 8-3 = x 3 x 5 x 7 x 9 x 11 x N trees with n tips = n 1 i=2 (2i 3)
59 Exhaustive search impossible for large data sets No. taxa No. trees , , ,027, ,459, ,729, ,749,310, ,234,143, ,905,853,580,625
60 Branch and bound: shortcut to perfection
61 Heuristic search 1. onstruct initial tree (e.g., sequential addition); determine length 2. onstruct set of neighboring trees by making small rearrangements of initial tree; determine lengths 3. If any of the neighboring trees are better than the initial tree, then select it/them and use as starting point for new round of rearrangements. (Possibly several neighbors are equally good) 4. Repeat steps 2+3 until you have found a tree that is better than all of its neighbors. 5. This tree is a local optimum (not necessarily a global optimum!)
62 Heuristic search: hill-climbing
63 Heuristic search: local vs. global optimum
64 Types of rearrangement I: nearest neighbor interchange (NNI) Original tree Two neighbors per internal branch: tree with n tips has 2(n-3) neighbors (For example, a tree with 20 tips has 34 neighbbors)
65 Types of rearrangement II: subtree pruning and regrafting (SPR)
66 Types of rearrangement III: tree bisection and reconnection (TBR)
67 lgorithm for determining length of given tree: Sankoff G G T
68 Sankoff: length of subtrees starting at terminal node G 0 G T
69 Sankoff: length of subtrees starting at terminal node G 0
70 Sankoff: length of subtrees starting at terminal node 0 G 0
71 Sankoff: length of subtrees starting at terminal node G 0 0 0
72 Sankoff: length of subtrees starting at terminal node G
73 Sankoff: length of subtrees starting at terminal node G
74 Sankoff: minimal length of possible subtrees starting at internal node? G 0 0???? 0 0 0
75 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 S 0 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] cost = 0, cost = cost G = cost T = 1
76 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 0? Nt on left branch ost 0 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T
77 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 0? Nt on left branch S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T ost 0 +
78 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 0? Nt on left branch S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T ost 0 + =
79 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 1? Nt on left branch ost 0 + = = 1 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T
80 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 1? Nt on left branch ost 0 + = = 1 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T 1 + =
81 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 1? Nt on left branch ost 0 + = = 1 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T 1 + = 1 + =
82 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 1? Nt on left branch ost 0 + = = 1 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T 1 + = 1 + =
83 Sankoff: minimal length of possible subtrees having nucleotide at internal node S 0 0 Nt on left branch ost = 0 G T S = 1 + min j [cost j + S right, j ]
84 Sankoff: minimal length of possible subtrees having nucleotide at internal node S 0 1 Nt on left branch ost = = G T S = 1 + min j [cost j + S right, j ]
85 Sankoff: minimal length of possible subtrees having nucleotide at internal node S 0 1 Nt on left branch ost = = G 1 + = T S = 1 + min j [cost j + S right, j ]
86 Sankoff: minimal length of possible subtrees having nucleotide at internal node S 0 1 Nt on left branch ost = = G 1 + = T 1 + = S = 1 + min j [cost j + S right, j ]
87 Sankoff: minimal length of possible subtrees having nucleotide at internal node S 0 0 Nt on left branch ost = = G 1 + = T 1 + = S = 1 + min j [cost j + S right, j ]
88 Sankoff: minimal length of possible subtrees having nucleotide at internal node S = min i [cost i + S left, i ] + min j [cost j + S right, j ] S = = 1
89 Sankoff: minimal length of possible subtrees having nucleotide at internal node G
90 Sankoff: minimal length of possible subtrees having nucleotide at internal node S = = 1
91 Sankoff: minimal length of possible subtrees having nucleotide G at internal node S G = = 2
92 Sankoff: minimal length of possible subtrees having nucleotide T at internal node S T = = 2
93 Sankoff: minimal length of all possible subtrees starting at internal node G
94 Sankoff: minimal length of possible subtrees starting at all internal nodes G
95 Sankoff: smallest possible length of tree = 3 G
CISC 889 Bioinformatics (Spring 2004) Phylogenetic Trees (II)
CISC 889 ioinformatics (Spring 004) Phylogenetic Trees (II) Character-based methods CISC889, S04, Lec13, Liao 1 Parsimony ased on sequence alignment. ssign a cost to a given tree Search through the topological
More informationMolecular Phylogenetics
Mole_Oce Lecture # 16: Molecular Phylogenetics Maximum Likelihood & Bahesian Statistics Optimality criterion: a rule used to decide which of two trees is best. Four optimality criteria are currently widely
More informationPhylogenetic reconstruction 2
Phylogenetic reconstruction The neighbor-joining algorithm Please sit in row K or forward RF: what s the worst epidemic of the last 100 years? amp Funston, Kansas Left: US rmy photographer/public domain
More informationChapter 8: Fitting models of discrete character evolution
Chapter 8: Fitting models of discrete character evolution Section 8.1: The evolution of limbs and limblessness In the introduction to Chapter 7, I mentioned that squamates had lost their limbs repeatedly
More informationMathematical Flaws in Suzuki and Gojobori s test for selection. Rick Durrett, Cornell University
Mathematical Flaws in Suzuki and Gojobori s test for selection Rick Durrett, Cornell University Abstract. Suzuki and Gojobori introduced a method for detecting positive selection at single amino acid sites.
More informationPhylogenetic comparative biology
Phylogenetic comparative biology In phylogenetic comparative biology we use the comparative data of species & a phylogeny to make inferences about evolutionary process and history. Reconstructing the ancestral
More informationDiscrete & continuous characters: The threshold model. Liam J. Revell Anthrotree, 2014
Discrete & continuous characters: The threshold model Liam J. Revell Anthrotree, 2014 Discrete & continuous characters: the threshold model So far we have discussed continuous & discrete character models
More informationBioinformatics - Lecture 7
Bioinformatics - Lecture 7 Louis Wehenkel Department of Electrical Engineering and Computer Science University of Liège Montefiore - Liège - November 20, 2007 Find slides: http://montefiore.ulg.ac.be/
More informationOptimal Satisficing Tree Searches
Optimal Satisficing Tree Searches Dan Geiger and Jeffrey A. Barnett Northrop Research and Technology Center One Research Park Palos Verdes, CA 90274 Abstract We provide an algorithm that finds optimal
More informationDecision Trees An Early Classifier
An Early Classifier Jason Corso SUNY at Buffalo January 19, 2012 J. Corso (SUNY at Buffalo) Trees January 19, 2012 1 / 33 Introduction to Non-Metric Methods Introduction to Non-Metric Methods We cover
More informationAlgorithms and Networking for Computer Games
Algorithms and Networking for Computer Games Chapter 4: Game Trees http://www.wiley.com/go/smed Game types perfect information games no hidden information two-player, perfect information games Noughts
More informationCh 10 Trees. Introduction to Trees. Tree Representations. Binary Tree Nodes. Tree Traversals. Binary Search Trees
Ch 10 Trees Introduction to Trees Tree Representations Binary Tree Nodes Tree Traversals Binary Search Trees 1 Binary Trees A binary tree is a finite set of elements called nodes. The set is either empty
More informationOn the Optimality of a Family of Binary Trees Techical Report TR
On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this
More informationLesson 9: Heuristic Search and A* Search
CAP 5602 Summer, 2011 Lesson 9: Heuristic Search and A* Search The topics 1. Heuristic Search 2. The A* Search 3. An example of the use of A* search. 1. Heuristic Search The idea of heuristics is to attach
More informationAnnouncements. Today s Menu
Announcements Reading Assignment: > Nilsson chapters 13-14 Announcements: > LISP and Extra Credit Project Assigned Today s Handouts in WWW: > Homework 9-13 > Outline for Class 25 > www.mil.ufl.edu/eel5840
More informationChapter ML:III. III. Decision Trees. Decision Trees Basics Impurity Functions Decision Tree Algorithms Decision Tree Pruning
Chapter ML:III III. Decision Trees Decision Trees Basics Impurity Functions Decision Tree Algorithms Decision Tree Pruning ML:III-93 Decision Trees STEIN/LETTMANN 2005-2017 Overfitting Definition 10 (Overfitting)
More informationCEC login. Student Details Name SOLUTIONS
Student Details Name SOLUTIONS CEC login Instructions You have roughly 1 minute per point, so schedule your time accordingly. There is only one correct answer per question. Good luck! Question 1. Searching
More informationPriority Queues 9/10. Binary heaps Leftist heaps Binomial heaps Fibonacci heaps
Priority Queues 9/10 Binary heaps Leftist heaps Binomial heaps Fibonacci heaps Priority queues are important in, among other things, operating systems (process control in multitasking systems), search
More informationChapter 10: Introduction to birth-death models Section 10.1: Plant diversity imbalance
Chapter 10: Introduction to birth-death models Section 10.1: Plant diversity imbalance The diversity of flowering plants (the angiosperms) dwarfs the number of species of their closest evolutionary relatives
More informationAVL Trees. The height of the left subtree can differ from the height of the right subtree by at most 1.
AVL Trees In order to have a worst case running time for insert and delete operations to be O(log n), we must make it impossible for there to be a very long path in the binary search tree. The first balanced
More informationAlgorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information
Algorithmic Game Theory and Applications Lecture 11: Games of Perfect Information Kousha Etessami finite games of perfect information Recall, a perfect information (PI) game has only 1 node per information
More informationCS221 / Spring 2018 / Sadigh. Lecture 9: Games I
CS221 / Spring 2018 / Sadigh Lecture 9: Games I Course plan Search problems Markov decision processes Adversarial games Constraint satisfaction problems Bayesian networks Reflex States Variables Logic
More information1 Solutions to Tute09
s to Tute0 Questions 4. - 4. are straight forward. Q. 4.4 Show that in a binary tree of N nodes, there are N + NULL pointers. Every node has outgoing pointers. Therefore there are N pointers. Each node,
More informationHomework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class
Homework #4 CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class o Grades depend on neatness and clarity. o Write your answers with enough detail about your approach and concepts
More informationCSE 417 Algorithms. Huffman Codes: An Optimal Data Compression Method
CSE 417 Algorithms Huffman Codes: An Optimal Data Compression Method 1 Compression Example 100k file, 6 letter alphabet: a 45% b 13% c 12% d 16% e 9% f 5% File Size: ASCII, 8 bits/char: 800kbits 2 3 >
More informationTree Models. Coalescent Trees, Birth Death Processes, and Beyond... Will Freyman
Tree Models Coalescent Trees, Birth Death Processes, and Beyond... Will Freyman Department of Integrative Biology University of California, Berkeley freyman@berkeley.edu http://willfreyman.org IB290 Grad
More informationLecture 9: Games I. Course plan. A simple game. Roadmap. Machine learning. Example: game 1
Lecture 9: Games I Course plan Search problems Markov decision processes Adversarial games Constraint satisfaction problems Bayesian networks Reflex States Variables Logic Low-level intelligence Machine
More informationCS360 Homework 14 Solution
CS360 Homework 14 Solution Markov Decision Processes 1) Invent a simple Markov decision process (MDP) with the following properties: a) it has a goal state, b) its immediate action costs are all positive,
More informationof Complex Systems to ERM and Actuarial Work
Developments in the Application of Complex Systems to ERM and Actuarial Work Joshua Corrigan, Milliman Milliman Agenda Overview of Complex Systems Sciences Strategic Risk Application and Example Operational
More informationSET 1C Binary Trees. 2. (i) Define the height of a binary tree or subtree and also define a height balanced (AVL) tree. (2)
SET 1C Binary Trees 1. Construct a binary tree whose preorder traversal is K L N M P R Q S T and inorder traversal is N L K P R M S Q T 2. (i) Define the height of a binary tree or subtree and also define
More informationLab 10: Diversification Analysis
Integrative Biology 200B University of California, Berkeley Spring 2009 "Ecology and Evolution" NM Hallinan Lab 10: Diversification Analysis Today we are going to use both R and Mesquite to simulate random
More informationSum-Product: Message Passing Belief Propagation
Sum-Product: Message Passing Belief Propagation 40-956 Advanced Topics in AI: Probabilistic Graphical Models Sharif University of Technology Soleymani Spring 2015 All single-node marginals If we need the
More informationBITTIGER #11. Oct
BITTIGER #11 Oct 22 2016 PROBLEM LIST A. Five in a Row brute force, implementation B. Building Heap data structures, divide and conquer C. Guess Number with Lower or Higher Hints dynamic programming, mathematics
More informationSum-Product: Message Passing Belief Propagation
Sum-Product: Message Passing Belief Propagation Probabilistic Graphical Models Sharif University of Technology Spring 2017 Soleymani All single-node marginals If we need the full set of marginals, repeating
More informationThe exam is closed book, closed calculator, and closed notes except your one-page crib sheet.
CS 188 Spring 2016 Introduction to Artificial Intelligence Midterm V2 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib
More information6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY. Hamilton Emmons \,«* Technical Memorandum No. 2.
li. 1. 6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY f \,«* Hamilton Emmons Technical Memorandum No. 2 May, 1973 1 il 1 Abstract The problem of sequencing n jobs on
More informationCMPSCI 311: Introduction to Algorithms Second Midterm Practice Exam SOLUTIONS
CMPSCI 311: Introduction to Algorithms Second Midterm Practice Exam SOLUTIONS November 17, 2016. Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question.
More informationCS188 Spring 2012 Section 4: Games
CS188 Spring 2012 Section 4: Games 1 Minimax Search In this problem, we will explore adversarial search. Consider the zero-sum game tree shown below. Trapezoids that point up, such as at the root, represent
More informationQ1. [?? pts] Search Traces
CS 188 Spring 2010 Introduction to Artificial Intelligence Midterm Exam Solutions Q1. [?? pts] Search Traces Each of the trees (G1 through G5) was generated by searching the graph (below, left) with a
More informationTaming the Beast Workshop. Priors and starting values
Workshop Veronika Bošková & Chi Zhang June 28, 2016 1 / 21 What is a prior? Distribution of a parameter before the data is collected and analysed as opposed to POSTERIOR distribution which combines the
More informationGotoh Scan Algorithm for matching RNA sequences. By Hila Abukasis & Shai Kerer
otoh Scan lgorithm for matching RN sequences By Hila bukasis & Shai Kerer ontents What is RN? Matching RN Needleman-Wunsch lgorithm lobal lignment VS Local lignment Smith-Waterman lgorithm otoh Scan lgorithm
More informationCSE 100: TREAPS AND RANDOMIZED SEARCH TREES
CSE 100: TREAPS AND RANDOMIZED SEARCH TREES Midterm Review Practice Midterm covered during Sunday discussion Today Run time analysis of building the Huffman tree AVL rotations and treaps Huffman s algorithm
More informationIt is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission
It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission -The code can be described in terms of a binary tree -0 corresponds to
More informationLikelihood Outline for today
Likelihood Outline for today What is probability What is likelihood Maximum likelihood estimation Example: estimate a proportion Likelihood- based confidence intervals Example: estimating speciation and
More informationSupporting Information
Supporting Information Novikoff et al. 0.073/pnas.0986309 SI Text The Recap Method. In The Recap Method in the paper, we described a schedule in terms of a depth-first traversal of a full binary tree,
More informationAdvanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras
Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture 21 Successive Shortest Path Problem In this lecture, we continue our discussion
More informationOil prices and depletion path
Pierre-Noël GIRAUD (CERNA, Paris) Aline SUTTER Timothée DENIS (EDF R&D) timothee.denis@edf.fr Oil prices and depletion path Hubbert oil peak and Hotelling rent through a combined Simulation and Optimisation
More informationThe exam is closed book, closed calculator, and closed notes except your three crib sheets.
CS 188 Spring 2016 Introduction to Artificial Intelligence Final V2 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your three crib sheets.
More informationHomework solutions, Chapter 8
Homework solutions, Chapter 8 NOTE: We might think of 8.1 as being a section devoted to setting up the networks and 8.2 as solving them, but only 8.2 has a homework section. Section 8.2 2. Use Dijkstra
More informationInitializing A Max Heap. Initializing A Max Heap
Initializing A Max Heap 3 4 5 6 7 8 70 8 input array = [-,,, 3, 4, 5, 6, 7, 8,, 0, ] Initializing A Max Heap 3 4 5 6 7 8 70 8 Start at rightmost array position that has a child. Index is n/. Initializing
More informationAIRCURRENTS: PORTFOLIO OPTIMIZATION FOR REINSURERS
MARCH 12 AIRCURRENTS: PORTFOLIO OPTIMIZATION FOR REINSURERS EDITOR S NOTE: A previous AIRCurrent explored portfolio optimization techniques for primary insurance companies. In this article, Dr. SiewMun
More informationA Branch-and-Bound Algorithm for Hard Multiple Knapsack Problems
To appear in Annals of Operations Research (Draft, October 2009) A Branch-and-Bound Algorithm for Hard Multiple Knapsack Problems Alex S. Fukunaga the date of receipt and acceptance should be inserted
More informationGolden-Section Search for Optimization in One Dimension
Golden-Section Search for Optimization in One Dimension Golden-section search for maximization (or minimization) is similar to the bisection method for root finding. That is, it does not use the derivatives
More informationCSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions
CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the
More informationAgenda. Lecture 2. Decision Analysis. Key Characteristics. Terminology. Structuring Decision Problems
Agenda Lecture 2 Theory >Introduction to Making > Making Without Probabilities > Making With Probabilities >Expected Value of Perfect Information >Next Class 1 2 Analysis >Techniques used to make decisions
More informationDemo AS Discrete Questions
emo S iscrete Questions Please answer on file paper. www.mathsprint.co.uk : ind the Minimum Spanning Tree using Prim's lgorithm starting from vertex : J rcs/length: rcs/length: : ind the Minimum Spanning
More informationDecision Trees Decision Tree
Decision Trees The Payoff Table and the Opportunity Loss Table are two very similar ways of looking at a Decision Analysis problem. Another way of seeing the structure of the problem is the Decision Tree.
More informationThe exam is closed book, closed calculator, and closed notes except your one-page crib sheet.
CS 188 Spring 2015 Introduction to Artificial Intelligence Midterm 1 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib
More informationSearch Space and Average Proof Length of Resolution. H. Kleine Buning T. Lettmann. Universitat { GH { Paderborn. Postfach 16 21
Search Space and Average roof Length of Resolution H. Kleine Buning T. Lettmann FB 7 { Mathematik/Informatik Universitat { GH { aderborn ostfach 6 2 D{4790 aderborn (Germany) E{mail: kbcsl@uni-paderborn.de
More informationLecture 9: Classification and Regression Trees
Lecture 9: Classification and Regression Trees Advanced Applied Multivariate Analysis STAT 2221, Spring 2015 Sungkyu Jung Department of Statistics, University of Pittsburgh Xingye Qiao Department of Mathematical
More informationRecall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again
Data Flow Analysis 15-745 3/24/09 Recall: Data Flow Analysis A framework for proving facts about program Reasons about lots of little facts Little or no interaction between facts Works best on properties
More informationHeaps. Heap/Priority queue. Binomial heaps: Advanced Algorithmics (4AP) Heaps Binary heap. Binomial heap. Jaak Vilo 2009 Spring
.0.00 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Advanced Algorithmics (4AP) Heaps Jaak Vilo 00 Spring Binary heap http://en.wikipedia.org/wiki/binary_heap Binomial heap http://en.wikipedia.org/wiki/binomial_heap
More informationAdvanced Sequence Alignment. Problem Set #4 is posted.
Advanced Sequence Alignment Problem Set #4 is posted. 1 Recall Local Alignment The zero is our free ride that allows the node to restart with a score of 0 at any point What does this imply? After solving
More informationUNIT 5 DECISION MAKING
UNIT 5 DECISION MAKING This unit: UNDER UNCERTAINTY Discusses the techniques to deal with uncertainties 1 INTRODUCTION Few decisions in construction industry are made with certainty. Need to look at: The
More informationDM559/DM545 Linear and integer programming
Department of Mathematics and Computer Science University of Southern Denmark, Odense May 22, 2018 Marco Chiarandini DM559/DM55 Linear and integer programming Sheet, Spring 2018 [pdf format] Contains Solutions!
More informationTo earn the extra credit, one of the following has to hold true. Please circle and sign.
CS 188 Fall 2018 Introduction to Artificial Intelligence Practice Midterm 1 To earn the extra credit, one of the following has to hold true. Please circle and sign. A I spent 2 or more hours on the practice
More informationDemo AS Discrete Questions
emo S iscrete Questions Please answer on file paper. www.mathsprint.co.uk : ind the Minimum Spanning Tree using Prim's lgorithm starting from vertex : rcs/length: rcs/length: : ind the Minimum Spanning
More informationNotes for the Course Autonomous Agents and Multiagent Systems 2017/2018. Francesco Amigoni
Notes for the Course Autonomous Agents and Multiagent Systems 2017/2018 Francesco Amigoni Current address: Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Piazza Leonardo
More informationObjec&ves. Review: Graphs. Finding Connected Components. Implemen&ng the algorithms
Objec&ves Finding Connected Components Ø Breadth-first Ø Depth-first Implemen&ng the algorithms Jan 31, 2018 CSCI211 - Sprenkle 1 Review: Graphs What are the two ways to represent graphs? What is the space
More informationDivergence time estimation using BEAST v1.7.2
2012 Workshop on Molecular Evolution, Woods Hole, MA Divergence time estimation using BEAST v1.7.2 Central among the questions explored in biology are those that seek to understand the timing and rates
More informationHeaps
AdvancedAlgorithmics (4AP) Heaps Jaak Vilo 2009 Spring Jaak Vilo MTAT.03.190 Text Algorithms 1 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Binary heap http://en.wikipedia.org/wiki/binary_heap
More information2 all subsequent nodes. 252 all subsequent nodes. 401 all subsequent nodes. 398 all subsequent nodes. 330 all subsequent nodes
¼ À ÈÌ Ê ½¾ ÈÊÇ Ä ÅË ½µ ½¾º¾¹½ ¾µ ½¾º¾¹ µ ½¾º¾¹ µ ½¾º¾¹ µ ½¾º ¹ µ ½¾º ¹ µ ½¾º ¹¾ µ ½¾º ¹ µ ½¾¹¾ ½¼µ ½¾¹ ½ (1) CLR 12.2-1 Based on the structure of the binary tree, and the procedure of Tree-Search, any
More informationBasic Data Structures. Figure 8.1 Lists, stacks, and queues. Terminology for Stacks. Terminology for Lists. Chapter 8: Data Abstractions
Chapter 8: Data Abstractions Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Chapter 8: Data Abstractions 8.1 Data Structure Fundamentals 8.2 Implementing Data Structures 8.3 A Short
More informationOutline. Objective. Previous Results Our Results Discussion Current Research. 1 Motivation. 2 Model. 3 Results
On Threshold Esteban 1 Adam 2 Ravi 3 David 4 Sergei 1 1 Stanford University 2 Harvard University 3 Yahoo! Research 4 Carleton College The 8th ACM Conference on Electronic Commerce EC 07 Outline 1 2 3 Some
More informationOn Bidding Algorithms for a Distributed Combinatorial Auction
On Bidding Algorithms for a Distributed Combinatorial Auction Benito Mendoza and José M. Vidal Computer Science and Engineering University of South Carolina Columbia, SC 29208 mendoza.usc@gmail.com, vidal@sc.edu
More informationExtending MCTS
Extending MCTS 2-17-16 Reading Quiz (from Monday) What is the relationship between Monte Carlo tree search and upper confidence bound applied to trees? a) MCTS is a type of UCT b) UCT is a type of MCTS
More informationWhat is Greedy Approach? Control abstraction for Greedy Method. Three important activities
0-0-07 What is Greedy Approach? Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each decision is locally optimal. These locally optimal solutions will finally
More informationDecision making in the presence of uncertainty
CS 2750 Foundations of AI Lecture 20 Decision making in the presence of uncertainty Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Decision-making in the presence of uncertainty Computing the probability
More informationChapter 13 Decision Analysis
Problem Formulation Chapter 13 Decision Analysis Decision Making without Probabilities Decision Making with Probabilities Risk Analysis and Sensitivity Analysis Decision Analysis with Sample Information
More informationuseful than solving these yourself, writing up your solution and then either comparing your
CSE 441T/541T: Advanced Algorithms Fall Semester, 2003 September 9, 2004 Practice Problems Solutions Here are the solutions for the practice problems. However, reading these is far less useful than solving
More informationFebruary 2 Math 2335 sec 51 Spring 2016
February 2 Math 2335 sec 51 Spring 2016 Section 3.1: Root Finding, Bisection Method Many problems in the sciences, business, manufacturing, etc. can be framed in the form: Given a function f (x), find
More informationDynamic Programming cont. We repeat: The Dynamic Programming Template has three parts.
Page 1 Dynamic Programming cont. We repeat: The Dynamic Programming Template has three parts. Subproblems Sometimes this is enough if the algorithm and its complexity is obvious. Recursion Algorithm Must
More informationDynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming
Dynamic Programming: An overview These notes summarize some key properties of the Dynamic Programming principle to optimize a function or cost that depends on an interval or stages. This plays a key role
More informationCauses of Poor Decisions
Lecture 7: Decision Analysis Decision process Decision tree analysis The Decision Process Specify objectives and the criteria for making a choice Develop alternatives Analyze and compare alternatives Select
More informationAdvanced Algorithmics (4AP) Heaps
Advanced Algorithmics (4AP) Heaps Jaak Vilo 2009 Spring Jaak Vilo MTAT.03.190 Text Algorithms 1 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Binary heap http://en.wikipedia.org/wiki/binary
More informationBinary Tree Applications
Binary Tree Applications Lecture 32 Section 19.2 Robb T. Koether Hampden-Sydney College Wed, Apr 17, 2013 Robb T. Koether (Hampden-Sydney College) Binary Tree Applications Wed, Apr 17, 2013 1 / 46 1 Expression
More informationExact Inference (9/30/13) 2 A brief review of Forward-Backward and EM for HMMs
STA561: Probabilistic machine learning Exact Inference (9/30/13) Lecturer: Barbara Engelhardt Scribes: Jiawei Liang, He Jiang, Brittany Cohen 1 Validation for Clustering If we have two centroids, η 1 and
More informationMATH 425: BINOMIAL TREES
MATH 425: BINOMIAL TREES G. BERKOLAIKO Summary. These notes will discuss: 1-level binomial tree for a call, fair price and the hedging procedure 1-level binomial tree for a general derivative, fair price
More informationDesign and Analysis of Algorithms. Lecture 9 November 20, 2013 洪國寶
Design and Analysis of Algorithms 演算法設計與分析 Lecture 9 November 20, 2013 洪國寶 1 Outline Advanced data structures Binary heaps (review) Binomial heaps Fibonacci heaps Dt Data structures t for disjoint dijitsets
More informationSuccessor. CS 361, Lecture 19. Tree-Successor. Outline
Successor CS 361, Lecture 19 Jared Saia University of New Mexico The successor of a node x is the node that comes after x in the sorted order determined by an in-order tree walk. If all keys are distinct,
More informationCSCE 750, Fall 2009 Quizzes with Answers
CSCE 750, Fall 009 Quizzes with Answers Stephen A. Fenner September 4, 011 1. Give an exact closed form for Simplify your answer as much as possible. k 3 k+1. We reduce the expression to a form we ve already
More informationCopyright 1973, by the author(s). All rights reserved.
Copyright 1973, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are
More informationThe suffix binary search tree and suffix AVL tree
Journal of Discrete Algorithms 1 (2003) 387 408 www.elsevier.com/locate/jda The suffix binary search tree and suffix AVL tree Robert W. Irving, Lorna Love Department of Computing Science, University of
More informationIEOR E4004: Introduction to OR: Deterministic Models
IEOR E4004: Introduction to OR: Deterministic Models 1 Dynamic Programming Following is a summary of the problems we discussed in class. (We do not include the discussion on the container problem or the
More informationThe Tree Data Model. Laura Kovács
The Tree Data Model Laura Kovács Trees (Baumstrukturen) Definition Trees are sets of points, called nodes (Knoten) and lines, called edges (Kanten), connecting two distinct nodes, such that: n 2 n 3 n
More informationCSCI 104 B-Trees (2-3, 2-3-4) and Red/Black Trees. Mark Redekopp David Kempe
1 CSCI 104 B-Trees (2-3, 2-3-4) and Red/Black Trees Mark Redekopp David Kempe 2 An example of B-Trees 2-3 TREES 3 Definition 2-3 Tree is a tree where Non-leaf nodes have 1 value & 2 children or 2 values
More informationCredit Card Default Predictive Modeling
Credit Card Default Predictive Modeling Background: Predicting credit card payment default is critical for the successful business model of a credit card company. An accurate predictive model can help
More informationTop-down particle filtering for Bayesian decision trees
Top-down particle filtering for Bayesian decision trees Balaji Lakshminarayanan 1, Daniel M. Roy 2 and Yee Whye Teh 3 1. Gatsby Unit, UCL, 2. University of Cambridge and 3. University of Oxford Outline
More informationOn the Optimality of a Family of Binary Trees
On the Optimality of a Family of Binary Trees Dana Vrajitoru Computer and Information Sciences Department Indiana University South Bend South Bend, IN 46645 Email: danav@cs.iusb.edu William Knight Computer
More informationDesign and Analysis of Algorithms 演算法設計與分析. Lecture 8 November 16, 2016 洪國寶
Design and Analysis of Algorithms 演算法設計與分析 Lecture 8 November 6, 206 洪國寶 Outline Review Amortized analysis Advanced data structures Binary heaps Binomial heaps Fibonacci heaps Data structures for disjoint
More information