Learning Sensor Data Characteristics in Unknown Environments.

Size: px
Start display at page:

Download "Learning Sensor Data Characteristics in Unknown Environments."

Transcription

1 Learig Sesor Data Characteristics i Ukow Eviromets. Tatiaa Bokareva tbokareva@cse.usw.edu.au The Uiversity of NSW Nirupama Bulusu bulusu@cs.pdx.edu Portlad State Uiversity Sajay Jha sjha@cse.usw.edu.au The Uiversity of NSW Abstract Ad hoc Wireless Sesor Networks derive much of their promise from their potetial for autoomously moitorig remote or physically iaccessible locatios [3]. As we begi to deploy sesor etworks i real world applicatios [8], cocers are beig raised about the fidelity ad itegrity of the sesor data. I this paper, we motivate ad propose a olie algorithm that leverages a Competitive Learig Neural Network (CLNN) for characterizatio of a dyamic, ukow eviromet. Based o the proposed characterizatio sesor etworks ca autoomously costruct multimodal views of their eviromets ad derive the coditios for verifyig data itegrity over time. I. INTRODUCTION For widespread adoptio of sesor techology, robust ad high-itegrity operatio of the sesor etwork is of paramout importace. This is challegig because sesor etworks are ofte Ad-Hoc, deployed i ukow eviromets with limited kowledge of the pheomea beig observed. I previous work, we have made the case for a self-healig sesor etwork architecture called SASHA[2], that is ispired by the Natural Immue System (NIS). The success of the NIS largely lies i its ability to lear to distiguish betwee hosts ad foreig cell i our bodies, kow as self ad o-self sets respectively. I [2] we outlied that sesor data costitutes a major part of the self-set i a sesor etwork. I this paper, we propose a techique for the costructio of such a self-set that leverages the Competitive Learig Neural Network (CLNN). CLNN uses a clusterig procedure for detectig atural groupigs i data, which we call the multimodal view of data. The ability of detectig such groupigs is a importat fuctioality of Wireless Sesor Networks (WSN). First of all, i ukow eviromets, distiguishig ormal ad aomalous behavior of sesor readigs is a difficult task, maily because of the lack of kowledge of ormal data behavior. Secod, idividual sesor devices have very limited computatioal capacity which bouds the amout of computatio that ca be performed o these devices. The approach for checkig sesor data itegrity must scale to large etworks, miimize the eergy overhead required to commuicate sesor data, ad adapt to system ad evirometal dyamics, such as ode failures ad the atural chagig eviromet. To address the first problem, we propose to leverage CLNN for the costructio of a probabilisitic ad multimodal view of the sesor eviromet. To address the secod problem, we exploit i-etwork processig i a hierarchical sesor etwork, where the classificatio of sesor readigs is performed at cluster-heads or also kow as moitorig odes i SASHA rather tha o a cetralized base statio. Figure 1 shows the geeric architecture of a hierarchical sesor etwork where each ode is commuicatig its sesor data to a closest cluster head. The cluster head classifies the iput data ad performs most of the sigal processig before forwardig the data to a base statio. The stregth of usig CLNN is that it does ot require us to collect a priori data for iferece of ormal data behaviors, makig it suitable for large scale, remotely deployed sesor etworks. Furthermore, i the past similar procedures were successfully used for digital image aalysis as a classifier of multimodal data[9][1]. Their ability of deducig uderlyig patters i sesor data is a very importat aspect for the classificatio of sesor readigs as the umber of such patters is geerally ot kow i advace. Aother advatage is that clusterig techiques ca reduce the amout of iformatio to be trasmitted over the radio which has bee idetified as a major source of eergy cosumptio. Further, leveragig the hierarchical structure of a sesor etwork ca reduce the umber of hops that this iformatio eeds to travel through, which ca potetially lead to further eergy savigs. However, the reductio i the iformatio space requires higher preprocessig of data. Aother drawback is that CLNN suffers from the usual problems associated with equivalet learig procedures. It relies o parametric assumptios about uderlyig structure of data classes ad it require a large amout of traiig time depedig o the characteristics of the pheomea beig observed. It also lacks sigificat theoretical properties ad is very heuristic i ature. Nevertheless, we believe that CLNN is well suited for the classificatio of sesor readigs especially if the udelyig physical process is ot kow. Paper Cotributios This paper motivates ad proposes a usupervised learig procedure for modelig iheret classes of sesor data based o which we ca defie a framework for data itegrity verificatio. We motivate the use of data clusterig as a buildig block for modelig of sesor data. This approach distiguishes high cofidece from low-cofidece clusters by assigig a additioal probability to each cluster, while preservig the fie-graied features withi the data. We have evaluated our approach usig physical sesor read-

2 Mica Stargate Fig. 1. Base Statio Data Stargate Stargate A example of a hybrid sesor etwork igs ad empirically assessed its accuracy ad performace o a cotiuous samplig applicatio. Our evaluatio demostrates that CLNN is a promisig approach for idetifyig the correct classes i sesor readigs eve i the presece of evirometal ad system dyamics. II. APPROACH As metioed earlier, sesor etworks ca be deployed to study a ukow physical pheomeo, sometimes i remote or hostile eviromets, where the iheret patters of uderlyig data are simply ukow ad hece it is difficult to decide what kid of probabilistic models to use for the represetatio of such data. Moreover, the eviromet may be dyamic ad vary with time. Therefore, our primary desig goal was to come up with a solutio, that did ot require a priori kowledge of the uderlyig physical process. I the rest of this sectio, we provide a very brief overview of CLNN. Refereces [4] ad [5] provides a more i depth itroductio to the theory of competitive learig. A. Competitive Learig Neural Network (CLNN) CLNN tries to fid the relevat iformatio withi a set of iput vectors by dividig its elemets ito clusters, where similar elemets are grouped ito oe cluster. If the pheomeo ca be categorized by several distict features the separate clusters will lear these features ad each of them ca have a separate represetatio. CLNN used i this study was iitialized with 8 output uits which were coected to all 8 iput uits by meas of the weight matrix. Each row of represets a coectio betwee a output uit ad!. Whe a iput vector "$#! is preseted to CLNN at some time# oly oe output uit will be selected as the wier by meas of calculatig the smallest Euclidea distace betwee a row vector of weights ad a iput vector "$#! &%(' )*$#!,+-.#! '/' #!,+-.$#! ' 12 (1) where ) $#! is a vector of weights that is attached to the wiig euro,.$#! is a iput vector of sesors readigs at a time # ad $#! is a weighted vector attached to losig euros. Oce a wier is selected, the correspodig vector of weights )*#! is shifted toward the iput vector.#!. ) $# ) $#!43;:<$"$#!9+= ) #!! (2) where >@?A:<?B5 is a costat learig rate ad C)*#D3657 is a updated weight vector of a wiig euro. As a result, vector E)*$#*3F57 will be located closer to the iput vector "$#! i the Euclidea space ad hece, whe a similar iput vector is preseted to CLNN, the same wiig euro will have a greater chace to wi the competitio. To avoid the problem of a sigle euro wiig the competitio all the time, we apply a simple rule kow as leaky learig. Here the weights of losig euros are updated i a similar maer to the wiig oe. $#43G5H98A $#!.3I:KJ$"$#!,+- $#! L1M2ON 8P (3) where : J?Q?R:. I this maer, eve losig clusters have a chace to lear ad capture more fie graied variatios i a pheomeo. We cotiue weight update util either the umber of iteratios (epochs) reaches a certai threshold or the distace betwee a S) ad "$#! becomes egligible. The represetatio of a wiig uit * is set to a vector TU VW, where T ad V are the lowest ad highest value of sesor readigs see by durig the traiig period. We also calculate its probability of wiig the competitio i future as follows: Y8[Z\ (4) where Z is the \ umber of times cluster wis the competitio out of times. Hece, at the ed of a traiig period, each cluster will lear some aspects of a measured pheomea which are defied by the itervals of sesor readigs ad the probability of their future occurreces. For example, lets assume that every euro wo a competitio at least oce, the the output of the CLNN at the ed of the traiig period is a collectio of leared itervals ad the probabilities of sesor readig to fall withi these itervals: 8` T av *bo8` TbH avba ]C^ \_\ cs8` Tdc avkce *b ch 8 fs8` Tdf avkfe HgE8` T(g* avwg fh Hg hs8` Tdh avkhe hh is8` Tdi avkie S8` Td avke ih H III. ANALYSIS I this sectio, we preset aalysis of the learig part used i CLNN. The actual process of learig i eural etworks is usually associated with a search i a multidimesioal errorsurface for a optimal state that miimizes the error fuctio. It was show that miimizig the error i learig for the Kohoe learig rule, quatio (2), correspods to miimizig the error fuctio jk ) $#! by followig its egative gradiet [7]: jko)*$#!y8 l5 _m po o $ ) $#!,+- #!! o oc (5) 2

3 { ƒ z z where $#! is a iput vector at a particular istace of time #, ) #! is a weight vector of equal dimesios associated with a wiig euro ad Z is a umber of traiig examples for which was a wier. The aalysis of this learig rule ca be divided ito two parts. Firstly it ca be show that the jk$ ) $#!! ideed seeks to fid a miimum for equatio (2), i.e., it tries to fid a optimal way of groupig sesor readigs ito clusters. Secodly it ca be demostrated that uder certai assumptios jk$ ) $#!! coverges to the equilibrium state which is proportioal to the coditioal probability of a cluster wiig whe the iput vector $#! is preset. From [4], [5], [1] ad [7] we ca see that miimizig the error fuctio: jk$ ) $#!!98 5 l _mqoo $ ) #!,+ $#!ooc (6) is equivalet to miimizig the equatio of a learig rule ) $# GO) $#!.3I:$ $#!&+= ) $#!! (7) where )*$#! is the weight vector at the time #, E) $#,3r57 is a updated weight vector, #! is the curret iput vector of sesor readigs ad: is a learig rate. I order to achieve the equilibrium state we eed to move weighted vector s)*#! from its curret positio toward the gradiet descet directio of jk )*#!!, such that: t G8`+S:Au jk$ ) $#!! u ) $#! ad by substitutig it ito equatio (7) we get ) $# A ) $#!43 t where u jk ) u ) #! 8v$ ) #!,+- #!! u O) $#!&+= $#! u ) $#! u $ ) #!,+= $#! u )*#! 8 u $ )b*$#!&+=db #!! u )ab #! u $ ) #!,+- $#! u ) $#! M8 w5 5 which meas that, u jko) u O)*$#! 8A ) $#!,+- #! ad t P8x+S:_- )*#!,+= $#!Y8P:_- #!,+-O)*$#! ad therefore ) $# ) $#!43 t 68G ) #!43y:$ $#!,+- ) #!! which is equivalet to equatio (7). The learig rule i equatio (7) brigs the wiig euro s weight vector closer to the traiig example.#!. Now lets cosider the ormalized learig rule. Accordig to [5] ad [1] we ca do this by settig t 68P:<7z #!!{ { +- )*#!! Let be the wiig euro whe vector "$#! is preset ad 8[ 5 if the is the wier for >.#! otherwise Let $#! be the probability that " #! is preseted ad } be the probability of wiig the competitio for this iput vector. The the equilibrium state ~ for the cluster ca be expressed as: ~<8rm t $ $#! (8) hece ~_8 z :.* w $ ƒ +- ) $#! #!! }Y8 : z w $ $ $#!! "+ : z ) $#! $ $#!! (9) where.$#! { 8 z $#!{ { (1) At the equilibrium state ~8r> ad if all clusters cotai the same umber of vectors the ) #!Y8 z { (11) z $ Graphically, S)*#! at the equilibrium state correspods to the ceter poit of the cluster. Fially, we preset the complexity aalysis of the learig phase. Note that the computatioal complexity is very much implemetatio depedet ad i this sectio we preset the aalysis of the simplest implemetatio. Algorithm 1 shows the implemetatio of simple competitive learig. If we assume that we trai the ]s \ CLNN o umber of iput vectors, the the complexity of CLNN is defied as followig: ]s ˆ 8 \ 4 s ˆ Z c.3 ˆ Z.3IŠS Œ ŽV Y ˆ Z "3 ˆ ˆ Z!Y8 \ 4 s ˆ Z c.36 l 3IŠ Œ Ž V H4 ˆ Z IV. EPERIMENTAL RESULTS (12) I this sectio, we describe the evaluatio of the proposed algorithm o physical sesor readigs ad the experimetal results obtaied. We also explai some of the choices made for the implemetatio of CLNN. The objectives of our evaluatio were three-fold: Is the proposed algorithm effective? Ca it lear the data characteristics i the presece of oise ad atural chages i the pheomea? If it ca lear, the how much oise i sesor readigs ca be preset or how frequetly the pheomeo ca vary before the algorithm loses its ability to deduce the correct classes of sesor readigs? 3

4 Algorithm 1 The simple implemetatio of the CLNN 1: set 8P>, Sb 8R5 l* OcE8 l >,..., 8x57>*>*>. 2: while the traiig time is ot over do 3: accept a iput vector.#! 4: for all the weights vector do 5: calculate the Euclidea distace betwee "$#! ad O ˆ : Z c 6: ed for 7: pick a wier based o the equatio (1) 8: update T, V ad of the :ˆ Z 9: while (umber of epochs y> ) or (the distace betwee "$#! ad )*$#! tha the miimum error tolerace) do 1: update ˆ weights (S) ) of based o the equatio (2): Z 11: update the weights ˆ of losig clusters by applyig equatio (3): Z 12: calculate ˆ the ew distace betwee ) ad.#! : Z 13: ed while 14: update the fial 15: ed while } : ˆ Z Is the algorithm efficiet? How log should we trai CLNN i order for it to correctly ifer the data classes? A. Implemetatio For the evaluatio of the proposed algorithm we set up a sesor etwork of 3 micaz[6] motes i a grid topology. Each mote collects eight samples of light sesor readigs per miute ad seds these samples to a clusterig ode. We choose light as the sesig modality for our experimets because it is easy to itroduce temporal ad permaet oise ito sesor readigs by castig a shadow over a sesor or by coverig its light sesor with a paper cup. Moreover, it is relatively straightforward to cotrol the light itesity, i a idoor settig, allowig for repeatable experimets. We limit the umber of data samples to 8 because TiyOS packet size does ot support more tha 29 bytes of payload ad we reserved 4 bytes for a ode s Cartesia coordiates. This is also why the umber of iput ad output uits of CLNN was set to 8. CLNN was traied o every received packet. There are several importat parameters that affect CLNN performace. First of all, the mai problem of slow covergece associated with eural etworks is related to iitializatio of its weight values. I this study we divided the etire spectrum of possible sesor readigs ito 8 zoes ad each vector of weights was iitialized to values from a particular zoe. As was metioed earlier, we do ot kow the exact distributio of sesor readigs i our lab, hece, we would possibly eed to lear the etire spectrum of sesor readigs. For example, the correctly operatig light sesor ca ot retur a egative value or a value of above 5 l >*> uits. Therefore, weights of the euro were iitialized to., weights for the output euro b were iitialized to 125, weights of c were iitialized to 25 uits, etc. This permits our CLNN to lear a etire spectrum of possible sesor readigs. Secod, there are two related parameters that affect the rate of CLNN learig. Namely, umber of epochs that we iterate over each iput vector.#! ad the amout of time we are allocated for the traiig period. With a loger traiig period, more iput vectors i CLNN will be leared, ad larger umber of clusters will lear these iput vectors. With a larger umber of iteratios over the same iput sample ad smaller traiig period, clusters will lear more about each iput vector but CLNN will lear over a lower umber of samples. The trade off betwee these choices is largely depedet o the measured characteristics of the pheomeo. If we expect our eviromet to have a lot of oisy data the the traiig period should be loger. This will allow CLNN to capture more of the o-oisy data ad therefore it would predict the correct patters i sesor readigs with a higher level of cofidece. Subsectio IV-B cotais the empirical evaluatio of the umber of traiig epochs that we would eed for the stable eviromet. We test our algorithm o three differet types of geeric pheomea. First, we kept the light level i our office o durig the traiig period ad itroduced faulty odes by coverig them with a white paper cup (Subsectio IV-C). Secod, we itroduced dyamics ito pheomeos behavior by castig a time varyig shadow over sesors ad by switchig the light off for approximately half of the traiig period (Subsectios IV-D ad IV-E). B. Varyig the Traiig Period ad Epoch Frequecy This subsectio presets the results for evaluatio of the trade-off betwee the umber of epochs ad the duratio of the traiig period. Figure 2 shows the covergece of weight vectors with 1 epochs ad the traiig period of 2 hours. As ca be see from this figure eve the furthest weight vector leared the pheomeo i over a hour, the ormal light readigs i our lab should lie betwee approximately 85 ad 95 uits ad the top most cluster 7 should cotai the represetatio of these readigs. Remarkably, at approximately 15:2, for o apparet reaso we received a oisy data. As ca be see from Figure 2, CLNN immediately lears these oisy values. The level of light i a computer lab is a reasoably stable eviromet therefore, we do ot eed all the output uits to lear the iput vectors ad hece, we do ot eed such a log traiig period. To study the impact of umber of epochs o the learig rate of CLNN, we kept the traiig period costat at 5 miutes ad vary the umber of iteractios for each iput vector. Figure 3 show the learig rates of weights for 1, 15, 5 ad 1 epochs respectively. As expected the fastest learig rate occurred at the 1 epochs. However, the rate of learig did ot icrease proportioally to the umber of epochs. We ca see that the weights coverge twice as fast if the umber of epochs is icreased from 1 to 15. But whe the umber 4

5 1 Data distributio for 2 hours Light : 14: 15: 16: time Fig. 2. The covergece of weights ad received sesor readigs for the 2 hour traiig period, with 1 epochs. Nearly all the weights coverge withi a 2 hour period. The o-covergig weight at the right corer idicates a radom source of oise. (a) 1 epochs (b) 15 epochs (c) 5 epochs (d) 1 epochs Fig. 3. Covergece of weights with 1, 15, 5 ad 1 epochs, after a 5 miute of the traiig period. Oly the closest wiig weight coverges to the correct sesor readigs after 1 epochs. However, two closest wiig weights, coverged after 15 epochs. No sigificat differece is oticed i the covergece of the weights to the correct sesor readigs betwee 15, 5 ad 1 epochs. This idicates that 15 epochs may be more tha sufficiet for the algorithm. 5

6 Fig. 4. The trajectory of weights for the scearios with the e ad e of faulty odes. 1.8 Probability of leared itervas to cotai correct sesor values cluster cluster 1 cluster 2 cluster 3 cluster 4 cluster 5 cluster 6 cluster Data distributio with the 5% of faulty odes Probability to wi.6.4 Light Number of faulty odes 6 45: 46: 47: 48: 49: 5: time Fig. 5. Cofidece levels of clusters to cotai the correct readigs as a fuctio of the umber of faulty odes after the traiig period. Fig. 6. Received sesor readigs for the sceario with e of faulty odes. of epochs is icreased from 15 to 1 we did ot observe such sigificat icrease i the learig rate. This suggests that o the least capable hardware, settig the umber of epochs to 15 is sufficiet. C. Varyig the Number of Faulty Nodes This subsectio studies the umber of faulty odes that ca be preset durig the traiig period before the algorithm loses its ability to distiguish betwee the correct ad aomalous patters i sesor data. For this experimet we keep the light level costat i the room ad vary the umber of odes covered by the white paper cup, which we assume to be the permaet oise. Figure 6 shows the distributio of data durig the evaluatio of our algorithm with > š of the odes beig faulty ad as ca be see, the biggest divisio i space betwee sesor readigs ca be made at the value of 85. As was stated i the previous subsectio, the top most cluster 7 should cotai the correct readigs which represets the costat level of light i the lab ad these readigs should lie betwee 85 ad 95 uits. Rest of the clusters are cotaiig oisy readigs which lies below 8 uits, clusters 6, 5, 4, 3 ad 2, or they ever wo a competitio, clusters 1 ad i this case. Figure 5 shows the cofidece level for the data cotaied i each cluster. As ca be see the correct cluster 7 has the highest cofidece level for the most cases. The rest of the clusters either ever wo a competitio or have captured the oise i the eviromet. As expected, the cofidece level of the correct cluster decreases as the umber of faulty odes icreases ad i order to deduce the correct readigs, a cofidece level should be œr>w. As ca be see from Figure 6 the algorithm correctly leared ad predicted sesor readigs whe up to *> š of odes were faulty. However, the cofidece level for the correct data i this case, was lower tha >K. Hece, i the presece of the costat oise the algorithm ca deduce the correct readigs whe up to >š of odes are workig correctly. As it was metioed earlier the learig i CLNN is achieved by meas of movig the weight vectors. Hece aother importat aspect i uderstadig the behavior of CLNN is to trace the trajectory of the weights for each cluster durig the traiig period. By lookig at their trajectory we ca see how CLNN deduces the correct patters i a data set ad why the cofidece level of the correct cluster is higher. Figure 4 shows the trajectory of average weight values for 6

7 1 Data distributio of the Experimet Light : 52:2 52:4 53: 53:2 53:4 54: 54:2 54:4 55: time Fig. 7. Trajectory of weights ad the sesor readigs for the secod experimet. each cluster for the scearios with the percetage of the odes varyig form>š to >š 1. The crosses i the graphs represet the average value of sesor readigs cotaied i received packets ad the small dots represet the average of weight vectors. As ca be see from Figure 4 whe there is o faulty ode preset i the eviromet the data falls withi a sigle cluster ad all the weights of losig clusters are slowly movig toward this data. The top two clusters 6 ad 7 are followig the o-oisy data. But cluster 6 begis to trace the pheomeo much later tha the cluster 7 ad this is why its cofidece level is lower. As more faulty odes are itroduced ito the etwork we ca see that more ad more of the data values are fallig ito separate clusters that are lyig below 8 uits. Hece ew clusters of data begi to emerge. As more of the data is gettig shifted away from the top clusters, the cofidece level i the correct data reduces. Nevertheless, as there are multiple clusters that lear the oisy readigs, their probability of wiig is small. Eve whe all the odes are faulty, the probability of wiig for cluster 5 which leared most of the oisy readigs is below >K ž. D. Dyamics: Time Varyig Shadows This experimet studies whether the proposed algorithm is robust ad ca adapt to dyamics of the eviromet ad i the presece of a temporal oise i the sesor readigs. We study the performace of the algorithm usig the sceario of a movig shadow. Here we cosider the correct sesor readigs to be the costat level of light i the office ad the oise to be the temporal shadow readigs. I this experimet the temporal oise is itroduced by a perso slowly movig i the strait lie carryig a large box for the duratio of the traiig period. We repeated this experimet 4 times. Figure 7 shows the distributio of the received readigs (the right figure) ad the trajectory of weights for the secod experimet 1 Due to the space restrictio the results for the experimets with Ÿ7 Ÿ e ŸŸ7 Ÿ S e, e ad! e of faulty odes are omitted. Probability Probability of a iterval to cotai correct sesor readigs cluster_ cluster_1 cluster_2 cluster_3 cluster_4 cluster_5 cluster_6 cluster_ evet simulatio umber Fig. 8. Cofidece levels associated with each cluster after the traiig period for all four experimets with a movig shadow. (the left figure). 2 The vertical lie i the left figure represets the cut off low boudary for the cluster 7. Figure 8 shows the cofidece levels i the leared values for all four experimets. It shows that the algorithm idetifies the correct sesors readigs (cluster 7), with a high level of cofidece (œp>w ). Rest of the clusters either ever wo the competitio or leared the temporal shadow readigs ad oise. The readigs located below 1 uits are the radom oise. As we will see i the ext experimet the dark office correspods to the readigs of 4 uits. E. Dyamics: Light ad Dark This experimet studies whether the algorithm ca adapt to dyamics of the pheomeo where we have multiple distict, ad time-varyig features of a pheomeo. We kept the lights o i our lab for the approximately half of the traiig period. We the tured the light off for the remaiig time of the traiig period. I this experimet we cosider two clusters to cotai the correct readigs, cluster 7 (85 to 95 uits) 2 Due to the space limitatio the results for the other 3 experimets are omitted. 7

8 1 Data distributio of the Light ad Dark 9 8 Light : 43: 44: 45: 46: 47: time Fig. 9. Figure o the left cotais the distributio of the received data. Figure o the right represets the trajectory of the weights ad the distributio of sesor readigs for the Light ad Dark experimet. ad (4 uits). Figure 9 shows the correspodig levels of cofidece i the leared data. It shows that the algorithm idetifies the correct bright light sesors readigs (cluster 7), with a level of cofidece of approximately >W. Cluster, cotaied dark light readigs ad it has a cofidece levels of approximately >K ž. Clusters 1, 2, 3, 4, 5 ad 6 capture the trasitioal characteristics of the pheomeo. We iteded for our pheomeo to have two equally distict characteristics. However, it is ot possible to switch light at precisely half way through the simulatio, as there are always few millisecods of a huma error. Also odes do ot take their readigs at exactly the same time, hece some odes i oe samplig period recorded both the light ad dark readigs. Therefore, the duratio of the dark traiig period was slightly shorter tha that of the light period. Figure 9 shows that there was a trasitioal period of approximately 3 secods. This is why the cofidece level of the dark feature is slightly lower tha oe for the bright oe. V. CONCLUSION I this paper, we motivated ad demostrated the use of CLNN for classificatio of data retured by sesor odes. We empirically demostrated that CLNN is capable of successfully learig the evirometal data patters eve i the presece of faulty odes. Based o classificatio of such patters, we ca filter aomalous data i a sesor etwork, without requirig a priori kowledge of the eviromet. We evaluated the proposed algorithm o three geeric light data collectio sesor etwork applicatios, where each applicatio has differet characteristics of a physical pheomeo. We empirically demostrated that the proposed algorithm is robust uder sesor oise ad it idetifies the correct patters is sesor data, eve with > š faulty sesor odes. As the umber of faulty odes icreases, the level of cofidece i data gradually decreases. Fially, the algorithm works correctly eve i the presece of evet dyamics. For example, whe a movig shadow is itroduced, the algorithm still ifers the bright light sesor Probability Probaility of a iterval to cotai correct sesor readigs cluster_ cluster_1 cluster_2 cluster_3 cluster_4 cluster_5 cluster_6 cluster_7 1 2 Iterval Labels Fig. 1. Cofidece levels i the leared data values that where recorded i each cluster. readigs with a high degree of cofidece, while preservig the fier-graied data correspodig to the presece of a shadow. REFERENCES [1] Yuichiro Azai. Patter Recoqitio ad Machie Learig. Academic Press Ic, Iwaami Shote Publishers, [2] Tatiaa Bokareva, Nirupama Bulusu, ad Sajay Jha. Sasha: Towards a self-healig hybrid sesor etwork architecture. I Proceedigs of the 2d IEEE Workshop o Embedded Networked Sesors (EmNetS-II), Sydey, Australia, May 25. [3] Edited by D. Estri ad W. Micheerad G. Boito. Evirometal cyberifrastructure eeds for distributed sesor etwork. Scripps Istitute of Oceaography, Agust [4] Rumelhart D. E ad Zipser D. Feature discovery by competitive learig. I Cogetive Sciece., volume 9, pages , [5] Mohamad H. Hassou. Fudametals of Artificial Neural Networks. MIT Press, [6] Crossbow Techologies Icorporated. Crossbow techologies. [7] Be Krose ad Patrick va der Smagt. A itroductio to eural etworks, November [8] Uiversity of Califoria at Berkeley. Habitat moitorig o great duck islad. [9] Joh A. Richards. Remote Sesig Digital Image Aalysis. A Itroductio. Spriger-Verlag, [1] Philip H. Swai ad Shirley M. Davis. Remote Sesig: The Quatitative Approach. McGraw-Hill, Ic,

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION 397 AN OPTIMIZATION NETWORK FOR MATRIX INVERSION Ju-Seog Jag, S~ Youg Lee, ad Sag-Yug Shi Korea Advaced Istitute of Sciece ad Techology, P.O. Box 150, Cheogryag, Seoul, Korea ABSTRACT Iverse matrix calculatio

More information

Force Network Analysis using Complementary Energy

Force Network Analysis using Complementary Energy orce Network Aalysis usig Complemetary Eergy Adrew BORGART Assistat Professor Delft Uiversity of Techology Delft, The Netherlads A.Borgart@tudelft.l Yaick LIEM Studet Delft Uiversity of Techology Delft,

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Neural Networks A Model of Boolean Functions

Neural Networks A Model of Boolean Functions Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Designing a learning system

Designing a learning system CS 75 Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@cs.pitt.edu 539 Seott Square, x-5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please try

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

Designing a learning system

Designing a learning system CS 75 Itro to Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@pitt.edu 539 Seott Square, -5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Analysis of Documents Clustering Using Sampled Agglomerative Technique

Analysis of Documents Clustering Using Sampled Agglomerative Technique Aalysis of Documets Clusterig Usig Sampled Agglomerative Techique Omar H. Karam, Ahmed M. Hamad, ad Sheri M. Moussa Abstract I this paper a clusterig algorithm for documets is proposed that adapts a samplig-based

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University CSCI 5090/7090- Machie Learig Sprig 018 Mehdi Allahyari Georgia Souther Uiversity Clusterig (slides borrowed from Tom Mitchell, Maria Floria Balca, Ali Borji, Ke Che) 1 Clusterig, Iformal Goals Goal: Automatically

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Fire Recognition in Video. Walter Phillips III Mubarak Shah Niels da Vitoria Lobo.

Fire Recognition in Video. Walter Phillips III Mubarak Shah Niels da Vitoria Lobo. Fire Recogitio i Video Walter Phillips III Mubarak Shah Niels da Vitoria Lobo {wrp65547,shah,iels}@cs.ucf.edu Computer Visio Laboratory Departmet of Computer Sciece Uiversity of Cetral Florida Orlado,

More information

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters. SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that

More information

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory Cluster Aalysis Adrew Kusiak Itelliget Systems Laboratory 2139 Seamas Ceter The Uiversity of Iowa Iowa City, Iowa 52242-1527 adrew-kusiak@uiowa.edu http://www.icae.uiowa.edu/~akusiak Two geeric modes of

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network Itrusio Detectio usig Fuzzy Clusterig ad Artificial Neural Network Shraddha Suraa Research Scholar, Departmet of Computer Egieerig, Vishwakarma Istitute of Techology, Pue Idia shraddha.suraa@gmail.com

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Learning to Shoot a Goal Lecture 8: Learning Models and Skills

Learning to Shoot a Goal Lecture 8: Learning Models and Skills Learig to Shoot a Goal Lecture 8: Learig Models ad Skills How do we acquire skill at shootig goals? CS 344R/393R: Robotics Bejami Kuipers Learig to Shoot a Goal The robot eeds to shoot the ball i the goal.

More information

Dimensionality Reduction PCA

Dimensionality Reduction PCA Dimesioality Reductio PCA Machie Learig CSE446 David Wadde (slides provided by Carlos Guestri) Uiversity of Washigto Feb 22, 2017 Carlos Guestri 2005-2017 1 Dimesioality reductio Iput data may have thousads

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

1. Introduction o Microscopic property responsible for MRI Show and discuss graphics that go from macro to H nucleus with N-S pole

1. Introduction o Microscopic property responsible for MRI Show and discuss graphics that go from macro to H nucleus with N-S pole Page 1 Very Quick Itroductio to MRI The poit of this itroductio is to give the studet a sufficietly accurate metal picture of MRI to help uderstad its impact o image registratio. The two major aspects

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 2012, Volume 5, No. 2, pp. 371-375 EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Investigating methods for improving Bagged k-nn classifiers

Investigating methods for improving Bagged k-nn classifiers Ivestigatig methods for improvig Bagged k-nn classifiers Fuad M. Alkoot Telecommuicatio & Navigatio Istitute, P.A.A.E.T. P.O.Box 4575, Alsalmia, 22046 Kuwait Abstract- We experimet with baggig knn classifiers

More information

Our Learning Problem, Again

Our Learning Problem, Again Noparametric Desity Estimatio Matthew Stoe CS 520, Sprig 2000 Lecture 6 Our Learig Problem, Agai Use traiig data to estimate ukow probabilities ad probability desity fuctios So far, we have depeded o describig

More information

Normal Distributions

Normal Distributions Normal Distributios Stacey Hacock Look at these three differet data sets Each histogram is overlaid with a curve : A B C A) Weights (g) of ewly bor lab rat pups B) Mea aual temperatures ( F ) i A Arbor,

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Chapter 3 MATHEMATICAL MODELING OF TOLERANCE ALLOCATION AND OVERVIEW OF EVOLUTIONARY ALGORITHMS

Chapter 3 MATHEMATICAL MODELING OF TOLERANCE ALLOCATION AND OVERVIEW OF EVOLUTIONARY ALGORITHMS 28 Chapter 3 MATHEMATICAL MODELING OF TOLERANCE ALLOCATION AND OVERVIEW OF EVOLUTIONARY ALGORITHMS Tolerace sythesis deals with the allocatio of tolerace values to various dimesios of idividual compoets

More information

Research on Identification Model of Financial Fraud of Listed Company Based on Data Mining Technology

Research on Identification Model of Financial Fraud of Listed Company Based on Data Mining Technology 208 2d Iteratioal Coferece o Systems, Computig, ad Applicatios (SYSTCA 208) Research o Idetificatio Model of Fiacial Fraud of Listed Compay Based o Data Miig Techology Jiaqi Hu, Xiao Che School of Busiess,

More information

Image based Cats and Possums Identification for Intelligent Trapping Systems

Image based Cats and Possums Identification for Intelligent Trapping Systems Volume 159 No, February 017 Image based Cats ad Possums Idetificatio for Itelliget Trappig Systems T. A. S. Achala Perera School of Egieerig Aucklad Uiversity of Techology New Zealad Joh Collis School

More information

Fuzzy Membership Function Optimization for System Identification Using an Extended Kalman Filter

Fuzzy Membership Function Optimization for System Identification Using an Extended Kalman Filter Fuzzy Membership Fuctio Optimizatio for System Idetificatio Usig a Eteded Kalma Filter Srikira Kosaam ad Da Simo Clevelad State Uiversity NAFIPS Coferece Jue 4, 2006 Embedded Cotrol Systems Research Lab

More information

Range Free Localization Schemes For Wireless Sensor Networks

Range Free Localization Schemes For Wireless Sensor Networks Rage Free Localizatio Schemes For Wireless Sesor Networks ASHOK KUMAR, VINAY KUMAR AND VINOD KAPOOR Departmet of Electroics ad Commuicatio Egieerig Natioal Istitute of Techology Hamirpur (HP) 177 005 INDIA

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Lecture 18. Optimization in n dimensions

Lecture 18. Optimization in n dimensions Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of

More information

A Parallel DFA Minimization Algorithm

A Parallel DFA Minimization Algorithm A Parallel DFA Miimizatio Algorithm Ambuj Tewari, Utkarsh Srivastava, ad P. Gupta Departmet of Computer Sciece & Egieerig Idia Istitute of Techology Kapur Kapur 208 016,INDIA pg@iitk.ac.i Abstract. I this

More information

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting)

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting) MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fittig) I this chapter, we will eamie some methods of aalysis ad data processig; data obtaied as a result of a give

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Alpha Individual Solutions MAΘ National Convention 2013

Alpha Individual Solutions MAΘ National Convention 2013 Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5

More information

Intermediate Statistics

Intermediate Statistics Gait Learig Guides Itermediate Statistics Data processig & display, Cetral tedecy Author: Raghu M.D. STATISTICS DATA PROCESSING AND DISPLAY Statistics is the study of data or umerical facts of differet

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

x x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the

x x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the COMPARATIVE RESEARCHES ON PROBABILISTIC NEURAL NETWORKS AND MULTI-LAYER PERCEPTRON NETWORKS FOR REMOTE SENSING IMAGE SEGMENTATION Liu Gag a, b, * a School of Electroic Iformatio, Wuha Uiversity, 430079,

More information

Arithmetic Sequences

Arithmetic Sequences . Arithmetic Sequeces COMMON CORE Learig Stadards HSF-IF.A. HSF-BF.A.1a HSF-BF.A. HSF-LE.A. Essetial Questio How ca you use a arithmetic sequece to describe a patter? A arithmetic sequece is a ordered

More information

COMP 558 lecture 6 Sept. 27, 2010

COMP 558 lecture 6 Sept. 27, 2010 Radiometry We have discussed how light travels i straight lies through space. We would like to be able to talk about how bright differet light rays are. Imagie a thi cylidrical tube ad cosider the amout

More information

DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION

DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION Proceedigs, 11 th FIG Symposium o Deformatio Measuremets, Satorii, Greece, 2003. DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION Michaela Haberler, Heribert Kahme

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals UNIT 4 Sectio 8 Estimatig Populatio Parameters usig Cofidece Itervals To make ifereces about a populatio that caot be surveyed etirely, sample statistics ca be take from a SRS of the populatio ad used

More information

A New Network-based Algorithm for Human Activity Recognition in Videos

A New Network-based Algorithm for Human Activity Recognition in Videos IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, A New Network-based Algorithm for Huma Activity Recogitio i Videos Weiyao Li, Yuazhe Che, Jiaxi Wu, Hali Wag, Bi Sheg, ad Hogxiag Li Abstract

More information

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality

More information

Parabolic Path to a Best Best-Fit Line:

Parabolic Path to a Best Best-Fit Line: Studet Activity : Fidig the Least Squares Regressio Lie By Explorig the Relatioship betwee Slope ad Residuals Objective: How does oe determie a best best-fit lie for a set of data? Eyeballig it may be

More information

LU Decomposition Method

LU Decomposition Method SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information