Phylogenetic Reconstruction: Parsimony

Size: px
Start display at page:

Download "Phylogenetic Reconstruction: Parsimony"

Transcription

1 Phylogenetic Reconstruction: Parsimony nders Gorm Pedersen

2 Trees: terminology

3 Trees: terminology

4 Trees: terminology Reptiles is a non-monophyletic group (unless you include birds)

5 Trees: representations Three different representations of the same tree-topology

6 Trees: representations Two different representations of the same tree-topology (from T. Ryan Gregory, Understanding Evolutionary Trees, Evo Edu Outreach (2008) 1: )

7 Trees: rooted vs. unrooted Early Late rooted tree has a single node (the root) that represents a point in time that is earlier than any other node in the tree. rooted tree has directionality (nodes can be ordered in terms of earlier or later ). In the rooted tree, distance (i.e., number of mutations) between two nodes is represented along the time-axis only (the second axis just helps spread out the leafs)

8 Trees: rooted vs. unrooted Early Late rooted tree has a single node (the root) that represents a point in time that is earlier than any other node in the tree. rooted tree has directionality (nodes can be ordered in terms of earlier or later ). In the rooted tree, distance (i.e., number of mutations) between two nodes is represented along the time-axis only (the second axis just helps spread out the leafs)

9 Trees: rooted vs. unrooted Early Late rooted tree has a single node (the root) that represents a point in time that is earlier than any other node in the tree. rooted tree has directionality (nodes can be ordered in terms of earlier or later ). In the rooted tree, distance (i.e., number of mutations) between two nodes is represented along the time-axis only (the second axis just helps spread out the leafs)

10 Trees: rooted vs. unrooted In unrooted trees there is no directionality: we do not know if a node is earlier or later than another node Distance along branches directly represents node distance

11 Trees: rooted vs. unrooted In unrooted trees there is no directionality: we do not know if a node is earlier or later than another node Distance along branches directly represents node distance

12 Reconstructing a tree using noncontemporaneous data

13 ladistics: group organisms based on shared, derived characters ( synapomorphies )

14 Homology: limb structure Homology: any similarity between characters that is due to their shared ancestry

15 Homology vs. Homoplasy X X X X Homology: similar traits inherited from a common ancestor Homoplasy: similar traits are not directly caused by common ancestry (convergent evolution).

16 Homoplasy: wings

17 Molecular phylogeny B D G G T T G G G G G T T T G G G T T T G T G G T T T T T G DN and protein sequences Homologous characters inferred from alignment. Other molecular data: absence/ presence of restriction sites, DN hybridization data, antibody crossreactivity, etc. (but losing importance due to cheap, efficient sequencing).

18 Morphology vs. molecular data frican white-backed vulture (old world vulture) ndean condor (new world vulture) New and old world vultures seem to be closely related based on morphology. Molecular data indicates that old world vultures are related to birds of prey (falcons, hawks, etc.) while new world vultures are more closely related to storks Similar features presumably the result of convergent evolution

19 Phylogenetic reconstruction Nucleotide position Taxon G G G B G T G T G T D T T T

20 Phylogenetic reconstruction Nucleotide position Taxon G G G B G T G T G T D T T T

21 Parsimony criterion: choose simplest hypothesis Nucleotide position Taxon G G G B G T G T G T D T T T

22 Parsimonious reconstruction G.. B G.. T.. D T.. Nucleotide position Taxon G G G B G T G T G T D T T T

23 Parsimonious reconstruction G.. G.. T.. B G.. T.. T.. D T.. Nucleotide position Taxon G G G B G T G T G T D T T T

24 Parsimonious reconstruction G.. G.. T.. B G.. T.. T.. D T.. Nucleotide position Taxon G G G B G T G T G T D T T T

25 lternative tree: homoplasy G.. G.. G.. T.. B G.. T.. T.. T.. B G.. D T.. D T.. Nucleotide position Taxon G G G B G T G T G T D T T T

26 lternative tree: homoplasy G.. G.. G.. T.. B G.. T.. T.. T.. B G.. D T.. D T.. Nucleotide position Taxon G G G B G T G T G T D T T T T.. T.. T..

27 lternative tree: homoplasy G.. G.. G.. T.. B G.. D T.. T.. T.. B G.. D T.. T.. Nucleotide position Taxon G G G B G T G T G T D T T T T.. T.. T..

28 One character: ssumption of no homoplasy is equivalent to finding shortest tree G... G.. G.. B G... T.. T.. T.. T... B G.. D T... D T.. Nucleotide position Taxon G G G B G T G T G T D T T T T.. T.. T..

29 Phylogenetic reconstruction..g..g..t B..G..T..T D..T Nucleotide position Taxon G G G B G T G T G T D T T T

30 Phylogenetic reconstruction G.G G.G T.T B G.G T.T T.T D T.T Nucleotide position Taxon G G G B G T G T G T D T T T

31 Phylogenetic reconstruction: conflicts B D.G..G. B.T. D.T. Nucleotide position Taxon G G G B G T G T G T D T T T.G..T..T.

32 Phylogenetic reconstruction: conflicts.g..t. B.T..T..T..G. D.T. B D Nucleotide position Taxon G G G B G T G T G T D T T T

33 Phylogenetic reconstruction: conflicts B D G.G T.T B G.G D T.T Nucleotide position Taxon G G G B G T G T G T D T T T T.T T.T T.T

34 Several characters: choose shortest tree (equivalent to fewer assumptions of homoplasy) GGG GTG GGG TGT TTT B GTG TGT TTT TGT B GTG D TTT D TTT Total length of tree: 4 Total length of tree: 5 TTT TTT

35 Maximum Parsimony Maximum parsimony: the best tree is the shortest tree (the tree requiring the smallest number of mutational events) This corresponds to the tree that implies the least amount of homoplasy (convergent evolution, reversals) How do we find the best tree for a given data set?

36 Maximum Parsimony: first approach 1. onstruct list of all possible trees for data set 2. For each tree: determine length, add to list of lengths 3. When finished: select shortest tree from list 4. If several trees have the same length, then they are equally good (equally parsimonious)

37 Maximum Parsimony: problems We need algorithm for constructing list of all possible trees We need algorithm for determining length of given tree Should all mutational events have same cost?

38 onstructing list of all possible unrooted trees 1. onstruct unrooted tree from first three taxa. There is only one way of doing this 2. Starting from (1), construct the three possible derived trees by adding taxon 4 to each internal branch 3. From each of the trees constructed in step (2), construct the five possible derived trees by adding taxon 5 to each internal branch. 4. ontinue until all taxa have been added in all possible locations

39 Maximum Parsimony: problems We need algorithm for constructing list of all possible trees We need algorithm for determining length of given tree Should all mutational events have same cost?

40 lgorithm for determining length of given tree: Fitch G What is the length of this tree? (How many mutational steps are required?)

41 lgorithm for determining length of given tree: Fitch Root the tree at an arbitrary internal node (or internal branch) Visit an internal node x for which no state set has been defined, but where the state sets of x s immediate descendants (y,z) have been defined. If the state sets of y,z have common states, then assign these to x.! If there are no common states, then assign the union of y,z to x, and increase tree length by one. Repeat until all internal nodes have been visited. Note length of current tree.

42 lgorithm for determining length of given tree: Fitch G

43 lgorithm for determining length of given tree: Fitch G

44 lgorithm for determining length of given tree: Fitch G

45 lgorithm for determining length of given tree: Fitch G

46 lgorithm for determining length of given tree: Fitch G Length so far = 0

47 lgorithm for determining length of given tree: Fitch G {, } Length so far = 1

48 lgorithm for determining length of given tree: Fitch G {, } {, G} Length so far = 2

49 lgorithm for determining length of given tree: Fitch G {, G} {, } {,, G} Length so far = 3

50 lgorithm for determining length of given tree: Fitch G {, G} {, } {,, G} {, } Length so far = 3

51 lgorithm for determining length of given tree: Fitch G {, G} {, } {,, G} {, } Length of tree = 3

52 lgorithm for determining length of given tree: Fitch G Length of tree = 3 One possible reconstruction (several others exist)

53 Maximum Parsimony: problems We need algorithm for constructing list of all possible trees We need algorithm for determining length of given tree Should all mutational events have same cost?

54 Mutational events need not have the same cost G G T G T Sankoff algorithm

55 Maximum Parsimony: problems We need algorithm for constructing list of all possible trees We need algorithm for determining length of given tree Should all mutational events have same cost?

56 How many branches are there on an unrooted tree with N tips? B B D There is only one way of constructing the first tree. This tree has 3 tips and 3 branches Each time an extra taxon is added, two branches are created. tree with N tips will therefore have the following number of branches:! n branches! = 3+(N-3)*2!!! = 3+2N-6!!! = 2N-3

57 How many unrooted trees are there? tree with N tips has 2N-3 branches For each tree with N tips, we can therefore construct 2N-3 derived trees (which each have N+1 tips).

58 How many unrooted trees are there? Ntips Ntrees Nbranches = Nderived trees x 3-3 = x 3 2 x 4-3 = x 3 x 5 2 x 5-3 = x 3 x 5 x 7 2 x 6-3 = x 3 x 5 x 7 x 9 2 x 7-3 = x 3 x 5 x 7 x 9 x 11 2 x 8-3 = x 3 x 5 x 7 x 9 x 11 x N trees with n tips = n 1 i=2 (2i 3)

59 Exhaustive search impossible for large data sets No. taxa No. trees , , ,027, ,459, ,729, ,749,310, ,234,143, ,905,853,580,625

60 Branch and bound: shortcut to perfection

61 Heuristic search 1. onstruct initial tree (e.g., sequential addition); determine length 2. onstruct set of neighboring trees by making small rearrangements of initial tree; determine lengths 3. If any of the neighboring trees are better than the initial tree, then select it/them and use as starting point for new round of rearrangements. (Possibly several neighbors are equally good) 4. Repeat steps 2+3 until you have found a tree that is better than all of its neighbors. 5. This tree is a local optimum (not necessarily a global optimum!)

62 Heuristic search: hill-climbing

63 Heuristic search: local vs. global optimum

64 Types of rearrangement I: nearest neighbor interchange (NNI) Original tree Two neighbors per internal branch: tree with n tips has 2(n-3) neighbors (For example, a tree with 20 tips has 34 neighbbors)

65 Types of rearrangement II: subtree pruning and regrafting (SPR)

66 Types of rearrangement III: tree bisection and reconnection (TBR)

67 lgorithm for determining length of given tree: Sankoff G G T

68 Sankoff: length of subtrees starting at terminal node G 0 G T

69 Sankoff: length of subtrees starting at terminal node G 0

70 Sankoff: length of subtrees starting at terminal node 0 G 0

71 Sankoff: length of subtrees starting at terminal node G 0 0 0

72 Sankoff: length of subtrees starting at terminal node G

73 Sankoff: length of subtrees starting at terminal node G

74 Sankoff: minimal length of possible subtrees starting at internal node? G 0 0???? 0 0 0

75 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 S 0 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] cost = 0, cost = cost G = cost T = 1

76 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 0? Nt on left branch ost 0 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T

77 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 0? Nt on left branch S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T ost 0 +

78 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 0? Nt on left branch S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T ost 0 + =

79 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 1? Nt on left branch ost 0 + = = 1 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T

80 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 1? Nt on left branch ost 0 + = = 1 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T 1 + =

81 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 1? Nt on left branch ost 0 + = = 1 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T 1 + = 1 + =

82 Sankoff: minimal length of possible subtrees having nucleotide at internal node 0 1? Nt on left branch ost 0 + = = 1 S = min i [cost i + S left, i ] + min j [cost j + S right, j ] G T 1 + = 1 + =

83 Sankoff: minimal length of possible subtrees having nucleotide at internal node S 0 0 Nt on left branch ost = 0 G T S = 1 + min j [cost j + S right, j ]

84 Sankoff: minimal length of possible subtrees having nucleotide at internal node S 0 1 Nt on left branch ost = = G T S = 1 + min j [cost j + S right, j ]

85 Sankoff: minimal length of possible subtrees having nucleotide at internal node S 0 1 Nt on left branch ost = = G 1 + = T S = 1 + min j [cost j + S right, j ]

86 Sankoff: minimal length of possible subtrees having nucleotide at internal node S 0 1 Nt on left branch ost = = G 1 + = T 1 + = S = 1 + min j [cost j + S right, j ]

87 Sankoff: minimal length of possible subtrees having nucleotide at internal node S 0 0 Nt on left branch ost = = G 1 + = T 1 + = S = 1 + min j [cost j + S right, j ]

88 Sankoff: minimal length of possible subtrees having nucleotide at internal node S = min i [cost i + S left, i ] + min j [cost j + S right, j ] S = = 1

89 Sankoff: minimal length of possible subtrees having nucleotide at internal node G

90 Sankoff: minimal length of possible subtrees having nucleotide at internal node S = = 1

91 Sankoff: minimal length of possible subtrees having nucleotide G at internal node S G = = 2

92 Sankoff: minimal length of possible subtrees having nucleotide T at internal node S T = = 2

93 Sankoff: minimal length of all possible subtrees starting at internal node G

94 Sankoff: minimal length of possible subtrees starting at all internal nodes G

95 Sankoff: smallest possible length of tree = 3 G

CISC 889 Bioinformatics (Spring 2004) Phylogenetic Trees (II)

CISC 889 Bioinformatics (Spring 2004) Phylogenetic Trees (II) CISC 889 ioinformatics (Spring 004) Phylogenetic Trees (II) Character-based methods CISC889, S04, Lec13, Liao 1 Parsimony ased on sequence alignment. ssign a cost to a given tree Search through the topological

More information

Molecular Phylogenetics

Molecular Phylogenetics Mole_Oce Lecture # 16: Molecular Phylogenetics Maximum Likelihood & Bahesian Statistics Optimality criterion: a rule used to decide which of two trees is best. Four optimality criteria are currently widely

More information

Phylogenetic reconstruction 2

Phylogenetic reconstruction 2 Phylogenetic reconstruction The neighbor-joining algorithm Please sit in row K or forward RF: what s the worst epidemic of the last 100 years? amp Funston, Kansas Left: US rmy photographer/public domain

More information

Chapter 8: Fitting models of discrete character evolution

Chapter 8: Fitting models of discrete character evolution Chapter 8: Fitting models of discrete character evolution Section 8.1: The evolution of limbs and limblessness In the introduction to Chapter 7, I mentioned that squamates had lost their limbs repeatedly

More information

Mathematical Flaws in Suzuki and Gojobori s test for selection. Rick Durrett, Cornell University

Mathematical Flaws in Suzuki and Gojobori s test for selection. Rick Durrett, Cornell University Mathematical Flaws in Suzuki and Gojobori s test for selection Rick Durrett, Cornell University Abstract. Suzuki and Gojobori introduced a method for detecting positive selection at single amino acid sites.

More information

Phylogenetic comparative biology

Phylogenetic comparative biology Phylogenetic comparative biology In phylogenetic comparative biology we use the comparative data of species & a phylogeny to make inferences about evolutionary process and history. Reconstructing the ancestral

More information

Discrete & continuous characters: The threshold model. Liam J. Revell Anthrotree, 2014

Discrete & continuous characters: The threshold model. Liam J. Revell Anthrotree, 2014 Discrete & continuous characters: The threshold model Liam J. Revell Anthrotree, 2014 Discrete & continuous characters: the threshold model So far we have discussed continuous & discrete character models

More information

Bioinformatics - Lecture 7

Bioinformatics - Lecture 7 Bioinformatics - Lecture 7 Louis Wehenkel Department of Electrical Engineering and Computer Science University of Liège Montefiore - Liège - November 20, 2007 Find slides: http://montefiore.ulg.ac.be/

More information

Optimal Satisficing Tree Searches

Optimal Satisficing Tree Searches Optimal Satisficing Tree Searches Dan Geiger and Jeffrey A. Barnett Northrop Research and Technology Center One Research Park Palos Verdes, CA 90274 Abstract We provide an algorithm that finds optimal

More information

Decision Trees An Early Classifier

Decision Trees An Early Classifier An Early Classifier Jason Corso SUNY at Buffalo January 19, 2012 J. Corso (SUNY at Buffalo) Trees January 19, 2012 1 / 33 Introduction to Non-Metric Methods Introduction to Non-Metric Methods We cover

More information

Algorithms and Networking for Computer Games

Algorithms and Networking for Computer Games Algorithms and Networking for Computer Games Chapter 4: Game Trees http://www.wiley.com/go/smed Game types perfect information games no hidden information two-player, perfect information games Noughts

More information

Ch 10 Trees. Introduction to Trees. Tree Representations. Binary Tree Nodes. Tree Traversals. Binary Search Trees

Ch 10 Trees. Introduction to Trees. Tree Representations. Binary Tree Nodes. Tree Traversals. Binary Search Trees Ch 10 Trees Introduction to Trees Tree Representations Binary Tree Nodes Tree Traversals Binary Search Trees 1 Binary Trees A binary tree is a finite set of elements called nodes. The set is either empty

More information

On the Optimality of a Family of Binary Trees Techical Report TR

On the Optimality of a Family of Binary Trees Techical Report TR On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this

More information

Lesson 9: Heuristic Search and A* Search

Lesson 9: Heuristic Search and A* Search CAP 5602 Summer, 2011 Lesson 9: Heuristic Search and A* Search The topics 1. Heuristic Search 2. The A* Search 3. An example of the use of A* search. 1. Heuristic Search The idea of heuristics is to attach

More information

Announcements. Today s Menu

Announcements. Today s Menu Announcements Reading Assignment: > Nilsson chapters 13-14 Announcements: > LISP and Extra Credit Project Assigned Today s Handouts in WWW: > Homework 9-13 > Outline for Class 25 > www.mil.ufl.edu/eel5840

More information

Chapter ML:III. III. Decision Trees. Decision Trees Basics Impurity Functions Decision Tree Algorithms Decision Tree Pruning

Chapter ML:III. III. Decision Trees. Decision Trees Basics Impurity Functions Decision Tree Algorithms Decision Tree Pruning Chapter ML:III III. Decision Trees Decision Trees Basics Impurity Functions Decision Tree Algorithms Decision Tree Pruning ML:III-93 Decision Trees STEIN/LETTMANN 2005-2017 Overfitting Definition 10 (Overfitting)

More information

CEC login. Student Details Name SOLUTIONS

CEC login. Student Details Name SOLUTIONS Student Details Name SOLUTIONS CEC login Instructions You have roughly 1 minute per point, so schedule your time accordingly. There is only one correct answer per question. Good luck! Question 1. Searching

More information

Priority Queues 9/10. Binary heaps Leftist heaps Binomial heaps Fibonacci heaps

Priority Queues 9/10. Binary heaps Leftist heaps Binomial heaps Fibonacci heaps Priority Queues 9/10 Binary heaps Leftist heaps Binomial heaps Fibonacci heaps Priority queues are important in, among other things, operating systems (process control in multitasking systems), search

More information

Chapter 10: Introduction to birth-death models Section 10.1: Plant diversity imbalance

Chapter 10: Introduction to birth-death models Section 10.1: Plant diversity imbalance Chapter 10: Introduction to birth-death models Section 10.1: Plant diversity imbalance The diversity of flowering plants (the angiosperms) dwarfs the number of species of their closest evolutionary relatives

More information

AVL Trees. The height of the left subtree can differ from the height of the right subtree by at most 1.

AVL Trees. The height of the left subtree can differ from the height of the right subtree by at most 1. AVL Trees In order to have a worst case running time for insert and delete operations to be O(log n), we must make it impossible for there to be a very long path in the binary search tree. The first balanced

More information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information Algorithmic Game Theory and Applications Lecture 11: Games of Perfect Information Kousha Etessami finite games of perfect information Recall, a perfect information (PI) game has only 1 node per information

More information

CS221 / Spring 2018 / Sadigh. Lecture 9: Games I

CS221 / Spring 2018 / Sadigh. Lecture 9: Games I CS221 / Spring 2018 / Sadigh Lecture 9: Games I Course plan Search problems Markov decision processes Adversarial games Constraint satisfaction problems Bayesian networks Reflex States Variables Logic

More information

1 Solutions to Tute09

1 Solutions to Tute09 s to Tute0 Questions 4. - 4. are straight forward. Q. 4.4 Show that in a binary tree of N nodes, there are N + NULL pointers. Every node has outgoing pointers. Therefore there are N pointers. Each node,

More information

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class Homework #4 CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class o Grades depend on neatness and clarity. o Write your answers with enough detail about your approach and concepts

More information

CSE 417 Algorithms. Huffman Codes: An Optimal Data Compression Method

CSE 417 Algorithms. Huffman Codes: An Optimal Data Compression Method CSE 417 Algorithms Huffman Codes: An Optimal Data Compression Method 1 Compression Example 100k file, 6 letter alphabet: a 45% b 13% c 12% d 16% e 9% f 5% File Size: ASCII, 8 bits/char: 800kbits 2 3 >

More information

Tree Models. Coalescent Trees, Birth Death Processes, and Beyond... Will Freyman

Tree Models. Coalescent Trees, Birth Death Processes, and Beyond... Will Freyman Tree Models Coalescent Trees, Birth Death Processes, and Beyond... Will Freyman Department of Integrative Biology University of California, Berkeley freyman@berkeley.edu http://willfreyman.org IB290 Grad

More information

Lecture 9: Games I. Course plan. A simple game. Roadmap. Machine learning. Example: game 1

Lecture 9: Games I. Course plan. A simple game. Roadmap. Machine learning. Example: game 1 Lecture 9: Games I Course plan Search problems Markov decision processes Adversarial games Constraint satisfaction problems Bayesian networks Reflex States Variables Logic Low-level intelligence Machine

More information

CS360 Homework 14 Solution

CS360 Homework 14 Solution CS360 Homework 14 Solution Markov Decision Processes 1) Invent a simple Markov decision process (MDP) with the following properties: a) it has a goal state, b) its immediate action costs are all positive,

More information

of Complex Systems to ERM and Actuarial Work

of Complex Systems to ERM and Actuarial Work Developments in the Application of Complex Systems to ERM and Actuarial Work Joshua Corrigan, Milliman Milliman Agenda Overview of Complex Systems Sciences Strategic Risk Application and Example Operational

More information

SET 1C Binary Trees. 2. (i) Define the height of a binary tree or subtree and also define a height balanced (AVL) tree. (2)

SET 1C Binary Trees. 2. (i) Define the height of a binary tree or subtree and also define a height balanced (AVL) tree. (2) SET 1C Binary Trees 1. Construct a binary tree whose preorder traversal is K L N M P R Q S T and inorder traversal is N L K P R M S Q T 2. (i) Define the height of a binary tree or subtree and also define

More information

Lab 10: Diversification Analysis

Lab 10: Diversification Analysis Integrative Biology 200B University of California, Berkeley Spring 2009 "Ecology and Evolution" NM Hallinan Lab 10: Diversification Analysis Today we are going to use both R and Mesquite to simulate random

More information

Sum-Product: Message Passing Belief Propagation

Sum-Product: Message Passing Belief Propagation Sum-Product: Message Passing Belief Propagation 40-956 Advanced Topics in AI: Probabilistic Graphical Models Sharif University of Technology Soleymani Spring 2015 All single-node marginals If we need the

More information

BITTIGER #11. Oct

BITTIGER #11. Oct BITTIGER #11 Oct 22 2016 PROBLEM LIST A. Five in a Row brute force, implementation B. Building Heap data structures, divide and conquer C. Guess Number with Lower or Higher Hints dynamic programming, mathematics

More information

Sum-Product: Message Passing Belief Propagation

Sum-Product: Message Passing Belief Propagation Sum-Product: Message Passing Belief Propagation Probabilistic Graphical Models Sharif University of Technology Spring 2017 Soleymani All single-node marginals If we need the full set of marginals, repeating

More information

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet. CS 188 Spring 2016 Introduction to Artificial Intelligence Midterm V2 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib

More information

6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY. Hamilton Emmons \,«* Technical Memorandum No. 2.

6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY. Hamilton Emmons \,«* Technical Memorandum No. 2. li. 1. 6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY f \,«* Hamilton Emmons Technical Memorandum No. 2 May, 1973 1 il 1 Abstract The problem of sequencing n jobs on

More information

CMPSCI 311: Introduction to Algorithms Second Midterm Practice Exam SOLUTIONS

CMPSCI 311: Introduction to Algorithms Second Midterm Practice Exam SOLUTIONS CMPSCI 311: Introduction to Algorithms Second Midterm Practice Exam SOLUTIONS November 17, 2016. Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question.

More information

CS188 Spring 2012 Section 4: Games

CS188 Spring 2012 Section 4: Games CS188 Spring 2012 Section 4: Games 1 Minimax Search In this problem, we will explore adversarial search. Consider the zero-sum game tree shown below. Trapezoids that point up, such as at the root, represent

More information

Q1. [?? pts] Search Traces

Q1. [?? pts] Search Traces CS 188 Spring 2010 Introduction to Artificial Intelligence Midterm Exam Solutions Q1. [?? pts] Search Traces Each of the trees (G1 through G5) was generated by searching the graph (below, left) with a

More information

Taming the Beast Workshop. Priors and starting values

Taming the Beast Workshop. Priors and starting values Workshop Veronika Bošková & Chi Zhang June 28, 2016 1 / 21 What is a prior? Distribution of a parameter before the data is collected and analysed as opposed to POSTERIOR distribution which combines the

More information

Gotoh Scan Algorithm for matching RNA sequences. By Hila Abukasis & Shai Kerer

Gotoh Scan Algorithm for matching RNA sequences. By Hila Abukasis & Shai Kerer otoh Scan lgorithm for matching RN sequences By Hila bukasis & Shai Kerer ontents What is RN? Matching RN Needleman-Wunsch lgorithm lobal lignment VS Local lignment Smith-Waterman lgorithm otoh Scan lgorithm

More information

CSE 100: TREAPS AND RANDOMIZED SEARCH TREES

CSE 100: TREAPS AND RANDOMIZED SEARCH TREES CSE 100: TREAPS AND RANDOMIZED SEARCH TREES Midterm Review Practice Midterm covered during Sunday discussion Today Run time analysis of building the Huffman tree AVL rotations and treaps Huffman s algorithm

More information

It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission

It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission -The code can be described in terms of a binary tree -0 corresponds to

More information

Likelihood Outline for today

Likelihood Outline for today Likelihood Outline for today What is probability What is likelihood Maximum likelihood estimation Example: estimate a proportion Likelihood- based confidence intervals Example: estimating speciation and

More information

Supporting Information

Supporting Information Supporting Information Novikoff et al. 0.073/pnas.0986309 SI Text The Recap Method. In The Recap Method in the paper, we described a schedule in terms of a depth-first traversal of a full binary tree,

More information

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture 21 Successive Shortest Path Problem In this lecture, we continue our discussion

More information

Oil prices and depletion path

Oil prices and depletion path Pierre-Noël GIRAUD (CERNA, Paris) Aline SUTTER Timothée DENIS (EDF R&D) timothee.denis@edf.fr Oil prices and depletion path Hubbert oil peak and Hotelling rent through a combined Simulation and Optimisation

More information

The exam is closed book, closed calculator, and closed notes except your three crib sheets.

The exam is closed book, closed calculator, and closed notes except your three crib sheets. CS 188 Spring 2016 Introduction to Artificial Intelligence Final V2 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your three crib sheets.

More information

Homework solutions, Chapter 8

Homework solutions, Chapter 8 Homework solutions, Chapter 8 NOTE: We might think of 8.1 as being a section devoted to setting up the networks and 8.2 as solving them, but only 8.2 has a homework section. Section 8.2 2. Use Dijkstra

More information

Initializing A Max Heap. Initializing A Max Heap

Initializing A Max Heap. Initializing A Max Heap Initializing A Max Heap 3 4 5 6 7 8 70 8 input array = [-,,, 3, 4, 5, 6, 7, 8,, 0, ] Initializing A Max Heap 3 4 5 6 7 8 70 8 Start at rightmost array position that has a child. Index is n/. Initializing

More information

AIRCURRENTS: PORTFOLIO OPTIMIZATION FOR REINSURERS

AIRCURRENTS: PORTFOLIO OPTIMIZATION FOR REINSURERS MARCH 12 AIRCURRENTS: PORTFOLIO OPTIMIZATION FOR REINSURERS EDITOR S NOTE: A previous AIRCurrent explored portfolio optimization techniques for primary insurance companies. In this article, Dr. SiewMun

More information

A Branch-and-Bound Algorithm for Hard Multiple Knapsack Problems

A Branch-and-Bound Algorithm for Hard Multiple Knapsack Problems To appear in Annals of Operations Research (Draft, October 2009) A Branch-and-Bound Algorithm for Hard Multiple Knapsack Problems Alex S. Fukunaga the date of receipt and acceptance should be inserted

More information

Golden-Section Search for Optimization in One Dimension

Golden-Section Search for Optimization in One Dimension Golden-Section Search for Optimization in One Dimension Golden-section search for maximization (or minimization) is similar to the bisection method for root finding. That is, it does not use the derivatives

More information

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the

More information

Agenda. Lecture 2. Decision Analysis. Key Characteristics. Terminology. Structuring Decision Problems

Agenda. Lecture 2. Decision Analysis. Key Characteristics. Terminology. Structuring Decision Problems Agenda Lecture 2 Theory >Introduction to Making > Making Without Probabilities > Making With Probabilities >Expected Value of Perfect Information >Next Class 1 2 Analysis >Techniques used to make decisions

More information

Demo AS Discrete Questions

Demo AS Discrete Questions emo S iscrete Questions Please answer on file paper. www.mathsprint.co.uk : ind the Minimum Spanning Tree using Prim's lgorithm starting from vertex : J rcs/length: rcs/length: : ind the Minimum Spanning

More information

Decision Trees Decision Tree

Decision Trees Decision Tree Decision Trees The Payoff Table and the Opportunity Loss Table are two very similar ways of looking at a Decision Analysis problem. Another way of seeing the structure of the problem is the Decision Tree.

More information

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet. CS 188 Spring 2015 Introduction to Artificial Intelligence Midterm 1 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib

More information

Search Space and Average Proof Length of Resolution. H. Kleine Buning T. Lettmann. Universitat { GH { Paderborn. Postfach 16 21

Search Space and Average Proof Length of Resolution. H. Kleine Buning T. Lettmann. Universitat { GH { Paderborn. Postfach 16 21 Search Space and Average roof Length of Resolution H. Kleine Buning T. Lettmann FB 7 { Mathematik/Informatik Universitat { GH { aderborn ostfach 6 2 D{4790 aderborn (Germany) E{mail: kbcsl@uni-paderborn.de

More information

Lecture 9: Classification and Regression Trees

Lecture 9: Classification and Regression Trees Lecture 9: Classification and Regression Trees Advanced Applied Multivariate Analysis STAT 2221, Spring 2015 Sungkyu Jung Department of Statistics, University of Pittsburgh Xingye Qiao Department of Mathematical

More information

Recall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again

Recall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again Data Flow Analysis 15-745 3/24/09 Recall: Data Flow Analysis A framework for proving facts about program Reasons about lots of little facts Little or no interaction between facts Works best on properties

More information

Heaps. Heap/Priority queue. Binomial heaps: Advanced Algorithmics (4AP) Heaps Binary heap. Binomial heap. Jaak Vilo 2009 Spring

Heaps. Heap/Priority queue. Binomial heaps: Advanced Algorithmics (4AP) Heaps Binary heap. Binomial heap. Jaak Vilo 2009 Spring .0.00 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Advanced Algorithmics (4AP) Heaps Jaak Vilo 00 Spring Binary heap http://en.wikipedia.org/wiki/binary_heap Binomial heap http://en.wikipedia.org/wiki/binomial_heap

More information

Advanced Sequence Alignment. Problem Set #4 is posted.

Advanced Sequence Alignment. Problem Set #4 is posted. Advanced Sequence Alignment Problem Set #4 is posted. 1 Recall Local Alignment The zero is our free ride that allows the node to restart with a score of 0 at any point What does this imply? After solving

More information

UNIT 5 DECISION MAKING

UNIT 5 DECISION MAKING UNIT 5 DECISION MAKING This unit: UNDER UNCERTAINTY Discusses the techniques to deal with uncertainties 1 INTRODUCTION Few decisions in construction industry are made with certainty. Need to look at: The

More information

DM559/DM545 Linear and integer programming

DM559/DM545 Linear and integer programming Department of Mathematics and Computer Science University of Southern Denmark, Odense May 22, 2018 Marco Chiarandini DM559/DM55 Linear and integer programming Sheet, Spring 2018 [pdf format] Contains Solutions!

More information

To earn the extra credit, one of the following has to hold true. Please circle and sign.

To earn the extra credit, one of the following has to hold true. Please circle and sign. CS 188 Fall 2018 Introduction to Artificial Intelligence Practice Midterm 1 To earn the extra credit, one of the following has to hold true. Please circle and sign. A I spent 2 or more hours on the practice

More information

Demo AS Discrete Questions

Demo AS Discrete Questions emo S iscrete Questions Please answer on file paper. www.mathsprint.co.uk : ind the Minimum Spanning Tree using Prim's lgorithm starting from vertex : rcs/length: rcs/length: : ind the Minimum Spanning

More information

Notes for the Course Autonomous Agents and Multiagent Systems 2017/2018. Francesco Amigoni

Notes for the Course Autonomous Agents and Multiagent Systems 2017/2018. Francesco Amigoni Notes for the Course Autonomous Agents and Multiagent Systems 2017/2018 Francesco Amigoni Current address: Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Piazza Leonardo

More information

Objec&ves. Review: Graphs. Finding Connected Components. Implemen&ng the algorithms

Objec&ves. Review: Graphs. Finding Connected Components. Implemen&ng the algorithms Objec&ves Finding Connected Components Ø Breadth-first Ø Depth-first Implemen&ng the algorithms Jan 31, 2018 CSCI211 - Sprenkle 1 Review: Graphs What are the two ways to represent graphs? What is the space

More information

Divergence time estimation using BEAST v1.7.2

Divergence time estimation using BEAST v1.7.2 2012 Workshop on Molecular Evolution, Woods Hole, MA Divergence time estimation using BEAST v1.7.2 Central among the questions explored in biology are those that seek to understand the timing and rates

More information

Heaps

Heaps AdvancedAlgorithmics (4AP) Heaps Jaak Vilo 2009 Spring Jaak Vilo MTAT.03.190 Text Algorithms 1 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Binary heap http://en.wikipedia.org/wiki/binary_heap

More information

2 all subsequent nodes. 252 all subsequent nodes. 401 all subsequent nodes. 398 all subsequent nodes. 330 all subsequent nodes

2 all subsequent nodes. 252 all subsequent nodes. 401 all subsequent nodes. 398 all subsequent nodes. 330 all subsequent nodes ¼ À ÈÌ Ê ½¾ ÈÊÇ Ä ÅË ½µ ½¾º¾¹½ ¾µ ½¾º¾¹ µ ½¾º¾¹ µ ½¾º¾¹ µ ½¾º ¹ µ ½¾º ¹ µ ½¾º ¹¾ µ ½¾º ¹ µ ½¾¹¾ ½¼µ ½¾¹ ½ (1) CLR 12.2-1 Based on the structure of the binary tree, and the procedure of Tree-Search, any

More information

Basic Data Structures. Figure 8.1 Lists, stacks, and queues. Terminology for Stacks. Terminology for Lists. Chapter 8: Data Abstractions

Basic Data Structures. Figure 8.1 Lists, stacks, and queues. Terminology for Stacks. Terminology for Lists. Chapter 8: Data Abstractions Chapter 8: Data Abstractions Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Chapter 8: Data Abstractions 8.1 Data Structure Fundamentals 8.2 Implementing Data Structures 8.3 A Short

More information

Outline. Objective. Previous Results Our Results Discussion Current Research. 1 Motivation. 2 Model. 3 Results

Outline. Objective. Previous Results Our Results Discussion Current Research. 1 Motivation. 2 Model. 3 Results On Threshold Esteban 1 Adam 2 Ravi 3 David 4 Sergei 1 1 Stanford University 2 Harvard University 3 Yahoo! Research 4 Carleton College The 8th ACM Conference on Electronic Commerce EC 07 Outline 1 2 3 Some

More information

On Bidding Algorithms for a Distributed Combinatorial Auction

On Bidding Algorithms for a Distributed Combinatorial Auction On Bidding Algorithms for a Distributed Combinatorial Auction Benito Mendoza and José M. Vidal Computer Science and Engineering University of South Carolina Columbia, SC 29208 mendoza.usc@gmail.com, vidal@sc.edu

More information

Extending MCTS

Extending MCTS Extending MCTS 2-17-16 Reading Quiz (from Monday) What is the relationship between Monte Carlo tree search and upper confidence bound applied to trees? a) MCTS is a type of UCT b) UCT is a type of MCTS

More information

What is Greedy Approach? Control abstraction for Greedy Method. Three important activities

What is Greedy Approach? Control abstraction for Greedy Method. Three important activities 0-0-07 What is Greedy Approach? Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each decision is locally optimal. These locally optimal solutions will finally

More information

Decision making in the presence of uncertainty

Decision making in the presence of uncertainty CS 2750 Foundations of AI Lecture 20 Decision making in the presence of uncertainty Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Decision-making in the presence of uncertainty Computing the probability

More information

Chapter 13 Decision Analysis

Chapter 13 Decision Analysis Problem Formulation Chapter 13 Decision Analysis Decision Making without Probabilities Decision Making with Probabilities Risk Analysis and Sensitivity Analysis Decision Analysis with Sample Information

More information

useful than solving these yourself, writing up your solution and then either comparing your

useful than solving these yourself, writing up your solution and then either comparing your CSE 441T/541T: Advanced Algorithms Fall Semester, 2003 September 9, 2004 Practice Problems Solutions Here are the solutions for the practice problems. However, reading these is far less useful than solving

More information

February 2 Math 2335 sec 51 Spring 2016

February 2 Math 2335 sec 51 Spring 2016 February 2 Math 2335 sec 51 Spring 2016 Section 3.1: Root Finding, Bisection Method Many problems in the sciences, business, manufacturing, etc. can be framed in the form: Given a function f (x), find

More information

Dynamic Programming cont. We repeat: The Dynamic Programming Template has three parts.

Dynamic Programming cont. We repeat: The Dynamic Programming Template has three parts. Page 1 Dynamic Programming cont. We repeat: The Dynamic Programming Template has three parts. Subproblems Sometimes this is enough if the algorithm and its complexity is obvious. Recursion Algorithm Must

More information

Dynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming

Dynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming Dynamic Programming: An overview These notes summarize some key properties of the Dynamic Programming principle to optimize a function or cost that depends on an interval or stages. This plays a key role

More information

Causes of Poor Decisions

Causes of Poor Decisions Lecture 7: Decision Analysis Decision process Decision tree analysis The Decision Process Specify objectives and the criteria for making a choice Develop alternatives Analyze and compare alternatives Select

More information

Advanced Algorithmics (4AP) Heaps

Advanced Algorithmics (4AP) Heaps Advanced Algorithmics (4AP) Heaps Jaak Vilo 2009 Spring Jaak Vilo MTAT.03.190 Text Algorithms 1 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Binary heap http://en.wikipedia.org/wiki/binary

More information

Binary Tree Applications

Binary Tree Applications Binary Tree Applications Lecture 32 Section 19.2 Robb T. Koether Hampden-Sydney College Wed, Apr 17, 2013 Robb T. Koether (Hampden-Sydney College) Binary Tree Applications Wed, Apr 17, 2013 1 / 46 1 Expression

More information

Exact Inference (9/30/13) 2 A brief review of Forward-Backward and EM for HMMs

Exact Inference (9/30/13) 2 A brief review of Forward-Backward and EM for HMMs STA561: Probabilistic machine learning Exact Inference (9/30/13) Lecturer: Barbara Engelhardt Scribes: Jiawei Liang, He Jiang, Brittany Cohen 1 Validation for Clustering If we have two centroids, η 1 and

More information

MATH 425: BINOMIAL TREES

MATH 425: BINOMIAL TREES MATH 425: BINOMIAL TREES G. BERKOLAIKO Summary. These notes will discuss: 1-level binomial tree for a call, fair price and the hedging procedure 1-level binomial tree for a general derivative, fair price

More information

Design and Analysis of Algorithms. Lecture 9 November 20, 2013 洪國寶

Design and Analysis of Algorithms. Lecture 9 November 20, 2013 洪國寶 Design and Analysis of Algorithms 演算法設計與分析 Lecture 9 November 20, 2013 洪國寶 1 Outline Advanced data structures Binary heaps (review) Binomial heaps Fibonacci heaps Dt Data structures t for disjoint dijitsets

More information

Successor. CS 361, Lecture 19. Tree-Successor. Outline

Successor. CS 361, Lecture 19. Tree-Successor. Outline Successor CS 361, Lecture 19 Jared Saia University of New Mexico The successor of a node x is the node that comes after x in the sorted order determined by an in-order tree walk. If all keys are distinct,

More information

CSCE 750, Fall 2009 Quizzes with Answers

CSCE 750, Fall 2009 Quizzes with Answers CSCE 750, Fall 009 Quizzes with Answers Stephen A. Fenner September 4, 011 1. Give an exact closed form for Simplify your answer as much as possible. k 3 k+1. We reduce the expression to a form we ve already

More information

Copyright 1973, by the author(s). All rights reserved.

Copyright 1973, by the author(s). All rights reserved. Copyright 1973, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are

More information

The suffix binary search tree and suffix AVL tree

The suffix binary search tree and suffix AVL tree Journal of Discrete Algorithms 1 (2003) 387 408 www.elsevier.com/locate/jda The suffix binary search tree and suffix AVL tree Robert W. Irving, Lorna Love Department of Computing Science, University of

More information

IEOR E4004: Introduction to OR: Deterministic Models

IEOR E4004: Introduction to OR: Deterministic Models IEOR E4004: Introduction to OR: Deterministic Models 1 Dynamic Programming Following is a summary of the problems we discussed in class. (We do not include the discussion on the container problem or the

More information

The Tree Data Model. Laura Kovács

The Tree Data Model. Laura Kovács The Tree Data Model Laura Kovács Trees (Baumstrukturen) Definition Trees are sets of points, called nodes (Knoten) and lines, called edges (Kanten), connecting two distinct nodes, such that: n 2 n 3 n

More information

CSCI 104 B-Trees (2-3, 2-3-4) and Red/Black Trees. Mark Redekopp David Kempe

CSCI 104 B-Trees (2-3, 2-3-4) and Red/Black Trees. Mark Redekopp David Kempe 1 CSCI 104 B-Trees (2-3, 2-3-4) and Red/Black Trees Mark Redekopp David Kempe 2 An example of B-Trees 2-3 TREES 3 Definition 2-3 Tree is a tree where Non-leaf nodes have 1 value & 2 children or 2 values

More information

Credit Card Default Predictive Modeling

Credit Card Default Predictive Modeling Credit Card Default Predictive Modeling Background: Predicting credit card payment default is critical for the successful business model of a credit card company. An accurate predictive model can help

More information

Top-down particle filtering for Bayesian decision trees

Top-down particle filtering for Bayesian decision trees Top-down particle filtering for Bayesian decision trees Balaji Lakshminarayanan 1, Daniel M. Roy 2 and Yee Whye Teh 3 1. Gatsby Unit, UCL, 2. University of Cambridge and 3. University of Oxford Outline

More information

On the Optimality of a Family of Binary Trees

On the Optimality of a Family of Binary Trees On the Optimality of a Family of Binary Trees Dana Vrajitoru Computer and Information Sciences Department Indiana University South Bend South Bend, IN 46645 Email: danav@cs.iusb.edu William Knight Computer

More information

Design and Analysis of Algorithms 演算法設計與分析. Lecture 8 November 16, 2016 洪國寶

Design and Analysis of Algorithms 演算法設計與分析. Lecture 8 November 16, 2016 洪國寶 Design and Analysis of Algorithms 演算法設計與分析 Lecture 8 November 6, 206 洪國寶 Outline Review Amortized analysis Advanced data structures Binary heaps Binomial heaps Fibonacci heaps Data structures for disjoint

More information