Dynamic Pattern Detection with Temporal Consistency and Connectivity Constraints

Size: px
Start display at page:

Download "Dynamic Pattern Detection with Temporal Consistency and Connectivity Constraints"

Transcription

1 Dynamc Pattern Detecton wth Temporal Consstency and Connectvty Constrants Skyler Speakman School of Computer Scence, Carnege Mellon Unversty Abstract Ths work explores scalable and accurate dynamc pattern detecton methods n graph-based data sets. The proposed Dynamc Subset Scan method s appled to the task of detectng, trackng, and source-tracng contamnant plumes spreadng through a water dstrbuton system equpped wth nosy, bnary sensors. Whle statc patterns affect the same subset of data over a perod of tme, dynamc patterns may affect dfferent subsets of the data at each tme step. These dynamc patterns requre a new approach to defne and optmze penalzed lkelhood rato statstcs n the subset scan framework, as well as new computatonal technques that scale to large, real-world networks. To address the frst concern, ths work develops a new subset scan methods that allows the detected subset of nodes to change over tme, whle ncorporatng temporal consstency constrants to reward patterns that do not dramatcally change between adacent tme steps. Second, the Addtve GraphScan algorthm allows ths novel scan statstc to process small graphs 500 nodes n 4.1 seconds on average whle mantanng an approxmaton rato over 98% compared to an exact optmzaton method, and to scale to large graphs wth over 12,000 nodes n 30 mnutes on average. Evaluaton results across multple detecton, trackng, and source-tracng tasks demonstrate substantal performance gans acheved by the Dynamc Subset Scan approach. 1 Introducton Detectng patterns n massve data sets has multple real-world applcatons n felds such as publc health, law enforcement, and securty. The subset scan approach to pattern detecton treats the problem as a search over subsets of data, wth the goal of fndng anomalous subsets. Ths approach poses two man challenges: approprately evaluatng the anomalousness of a gven subset, and the computatonal ssue of searchng through the exponentally many subsets of the data. Prevous approaches [8, 12, 10, 11] have addressed the frst concern by scorng each subset usng lkelhood rato statstcs such as the expectaton-based Posson EBP [12, 10] or expectaton-based bnomal EBB [8] scan statstcs. Ths current work allows for a more sophstcated scorng functon by penalzng the lkelhood rato statstc, consderng addtonal pror nformaton from each data element. The penalzed lkelhood rato typcally does not satsfy useful propertes such as lnear-tme subset scannng [11], makng effcent optmzaton over subsets a challengng task. However, the EBB lkelhood rato statstc can be wrtten as an addtve functon, enablng effcent optmzaton of a penalzed verson of that statstc over subgraphs. The frst maor contrbuton of ths work s the development of temporal consstency constrants whch allow for addtonal penaltes or rewards to act on the scorng functon, rewardng spatal subsets that are temporally consstent wth each other, and effcent optmzaton of the resultng, penalzed scan statstc to detect dynamc clusters subect to these constrants. The 1

2 second maor contrbuton s the Addtve GraphScan algorthm, whch effcently dentfes anomalous hgh scorng, connected subgraphs, thus ncorporatng both hard connectvty constrants and soft temporal consstency constrants. Each of these contrbutons wll be dscussed n detal below. Many complex data sets contanng emergng events or patterns are commonly represented n a known and fxed graph structure. Examples of ths nclude water ppelnes, transportaton routes, power grds, and supply chans n general. Whle other recent work [9, 5] has focused on learnng graph structure, here we assume a gven graph structure and wsh to detect whch nodes are currently affected, by observng data produced at the nodes of the graph on each tme step. The motvatng example comes from the feld of publc health: wth focus on detectng, trackng, and source-tracng contamnant plumes n a water dstrbuton system. Creatng sensor networks for detectng delberate or accdental contamnaton of these systems has been a popular research doman followng the terror attacks of September 11, The Battle of the Water Sensor Networks" BWSN [1] provded real-world data to teams tasked wth placng perfect sensors to quckly detect contamnants and lmt the amount of contamnated water consumed by the populaton. The placement problem s an nterestng one explored further n [3, 7]. Ths current work focuses on the complementary problem of fusng data collected from nosy sensors assumng a gven placement. Sensor fuson attempts to combne data from multple dstrbuted sensors n order to ncrease the detecton power of the entre network [14]. The smulaton proceeds by modelng smple, bnary sensors at each ppe uncton graph node n the system wth a fxed false postve rate e.g., FPR = 0.1 and true postve rate e.g., TPR = 0.9. An addtonal assumpton s that each sensor operates ndependently of the others n the network. The smulatons use the network structure and plumes provded n the BWSN data to generate sensor readngs over the course of 12 one-hour ntervals. The task s then: Gven 1 the graph structure ppe network, 2 false postve and true postve rates of the sensors, and 3 ndependent observatons from the sensors over tme, the methods must provde: A whether or not a contamnant s present n the system for each onehour tme step, B hour-to-hour trackng of whch ppe nodes have been affected by the plume on the current and recent past tme steps, and C source-tracng to determne whch nodes n the system spawned the contamnant. Correspondng evaluaton metrcs nclude: A average tme n hours to plume detecton as a functon of false postve rate number of false alarms per month, B spatal-temporal overlap coeffcent between the true and detected subsets of nodes over tme, and C spatal overlap coeffcent between the true and dentfed subsets of source nodes. Ths s not the frst work to apply spatal or subset scan statstcs to contamnaton early warnng systems. Koch and McKenna [6] used Kulldorff s spatal scan [8] to detect statstcally sgnfcant crcular clusters of anomalous actvty. They used propertes of the ppe network to create a dstance metrc based on travel tme between sensng nodes n order to defne ther crcles. However, they were not able to enforce connectvty constrants and take advantage of the topology of the network. Through our Addtve GraphScan algorthm, we are able to search over connected subsets of the ppe network to fnd anomalous connected subgraphs. Berry et al. [2] have also consdered the detecton power of a network of mperfect sensors, showng that t s worth deployng a sensor network even when ndvdual sensors have low detecton probablty. However, ther experments dd not allow for sensors wth false postves, makng the detecton and source tracng problems much easer to solve as compared to the more dffcult scenaro consdered here. Spatal scan statstcs attempt to dentfy regons of nterest or hot spots. Ths s acheved by 2

3 maxmzng a scorng functon FS, typcally defned as the lkelhood rato FS = PrData H 1S, PrData H 0 over spatal regons S. In ths expresson H 1 S assumes ncreased actvty n regon S, and H 0 assumes regular behavor. Ths work montors bnary sensors s each producng c Bernoull FPR trggers under H 0 or c Bernoull TPR trggers for H 1 S contanng node s. Ths makes the expectaton-based bnomal scan statstc [8] a logcal choce. Spatal-temporal scan statstcs ncorporate the tme dmenson. It s standard to aggregate ths temporal nformaton over a tme wndow w so that c = t=1...w c t. Once the temporal nformaton has been aggregated for each wndow w = 1... W, maxmzng the spatal-temporal scan statstc for that wndow proceeds dentcally to the regular spatal scan statstc; t then maxmzes over all wndow szes from 1 to W. However, an nherent assumpton n ths aggregaton of temporal nformaton s that the affected spatal-temporal subset does not change over tme. Therefore, ths approach wll be referred to as the Statc scan method throughout ths text. The fundamental goal of ths work s to relax ths strong assumpton on the spatal-temporal structure n order to ncrease the power to detect dynamc patterns that change the affected regon over tme. One smple approach s to optmze each of the w tme steps ndependently. Ths allows for each tme step t to dentfy an entrely dfferent spatal regon, but does not allow the sharng of nformaton between tme steps, possbly reducng detecton power. Ths approach s referred to as the Independent scan method throughout ths text. As a compromse between Statc and Independent methods, the Dynamc Subset Scan s proposed whch enforces temporal consstency constrants to allow temporally adacent tme steps to share nformaton forward and backward n tme. As demonstrated below, ths flexblty ncreases power to detect and track dynamc patterns whle scalng to the sze of real-world networks. The rest of the paper s lad out as follows. Secton II ntroduces temporal consstency constrants, appled to the expectaton-based bnomal scorng functon, and demonstrates how the penalzed scan statstc can be effcently optmzed over not necessarly connected dynamc subsets. Secton III explans the Addtve GraphScan algorthm, whch effcently dentfes hghscorng, connected subsets of data wth an underlyng graph structure. Secton IV provdes emprcal results of the smulatons of the water dstrbuton network from the BWSN, comparng the Dynamc Subset Scan approach to several other approaches, and demonstratng mprovements n detecton, trackng, and source-tracng performance. Fnally, Secton V concludes the paper. 2 Temporal Consstency Constrants Ths secton has four sequental obectves. The frst s to demonstrate how the expectatonbased bnomal EBB scorng functon may ncorporate addtonal constrants whle remanng straghtforward to optmze over all possble subsets S.e., show that EBB can be wrtten as an addtve functon over the data elements s S. Second, s to show that these constrants may be nterpreted as the pror log-odds for a gven node s to be n the detected subset. The secton contnues by provdng the formal defnton of temporal consstency constrants based on a probablstc generatve model that ncorporates both forward and backward temporal consstency. The secton concludes wth a descrpton of the teratve optmzaton process that lnes up the spatal-temporal regon accordng to the provded temporal consstency constrants. 3

4 2.1 Addtve Scorng Functon and Addtonal Terms Condtoned on the false and true postve rates FPR, TPR of the sensors, the EBB statstc can be wrtten as an addtve set functon over the data elements s S. Ths s an mportant feature for two reasons. Frst, addtve functons are easy to optmze over all possble subsets. Wthout connectvty constrants, the optmzaton process s smply ncludng all records makng a postve contrbuton and excludng the rest. Determnng the most postve connected subset s more complcated, and s covered n the Addtve GraphScan secton below. Second, addtve functons allow for addtonal penalty terms to be ncluded at the element level whle the total penalzed scorng functon remans addtve and thus amenable to effcent optmzaton. Theorem 1. The expectaton-based bnomal statstc may be wrtten as FS = s S λ, where λ depends only on the bnary sensor response c for sensor s.e., whether that sensor trggers or not as well as the false and true postve rates of the sensors n general. Proof. The log-lkelhood rato form of the EBB scan statstc can be wrtten as follows: Then λ = c log TPR FPR FS = log PrData H 1S PrData H 0 = log s S Prc BernoullTPR s S Prc BernoullFPR TPR = log c 1 TPR 1 c s S FPR c 1 FPR 1 c [ ] TPR 1 TPR = c log + 1 c FPR log 1 FPR s S + 1 c log 1 TPR. 1 FPR Next, assume a bonus or penalty for each s S. These can easly be ncorporated nto the score functon. Defne: F pen S = FS + = λ +. s S s S F pen S s a penalzed form of the EBB scan statstc that s stll addtve over the data elements s. Note that the terms are assumed to be a functon of only the gven data element s ; they cannot depend on the entre subset S. Ths as a lmtaton of the current work and wll be nvestgated n extensons to more sophstcated penaltes n future work. 2.2 Pror Log-odds Interpretaton These soft constrants,, have a convenent nterpretaton as the pror log-odds that each data element s wll be ncluded n the detected subset. Let p be the pror probablty that data element s wll be contaned n the detected subset. Then can be defned as log p 1 p. The pror log probablty of selectng a subset S s then: 4

5 log PrS = log s S = s S = s S p 1 p s / S log p log1 p + N =1 N =1 log1 + exp. log1 p However, note that the term N =1 log1 + exp s constant and does not affect the probablty of selectng any partcular subset. Thus, ths term can be gnored when optmzng over all subsets of the data, and be subtracted once the hghest-scorng subset of the data has been dentfed. When > 0, record s s more lkely to be ncluded n the detected subset, and the opposte s true when < 0. When = 0 for all, whch s the default settng for spatal-temporal scan statstcs, then every subset S s consdered equally lkely a pror. 2.3 Dervaton of t Ths secton derves the formulas for t that correspond to the followng generatve model for temporal consstency. Let p t be the pror probablty that data element s wll be contaned n the detected subset S t on tme step t. Let x t be 1 f data element s s ncluded n S t, and 0 otherwse. Let n t be the number of neghbors of s that are ncluded n S t, and let k be the degree of node s. Then the generatve model of event propagaton, whch ncorporates temporal consstency constrants, s defned as: log p t 1 p t = β 0 + β 1 x t 1 + β 2 n t 1 k. 1 As a concrete example of the nterpretaton of ths model, assume β 0 = 1.5, β 1 = 5, and β 2 = 0. Then, f a node s ncluded n the prevous detected subset, S t 1, t has a 97% pror probablty of beng ncluded n the current detected subset, S t. If t was not ncluded n the prevous subset, then t only has an 18% probablty of beng ncluded n the current subset. When β 2 > 0, the proporton of neghbors ncluded n S t 1 wll further nfluence the pror probablty of s beng ncluded n the current subset. Consder t as the total mpact of ncludng x t on the overall penalzed log-lkelhood rato score FS, as compared to the score FS \ x t when xt s excluded. The log-lnear model of p t above provdes: t = logp t log1 pt + S t+1 + S t+1 logp t+1 x t logpt+1 x t log1 p t+1 x t log1 pt+1 x t. 2 x t 1 In equaton 2, the ntal dfference results from the pror probablty of x t, condtoned on and ts number of ncluded neghbors n t 1 from the prevous tme step. Ths dfference can 5

6 be calculated drectly from the model: logp t log1 pt = β 0 + β 1 x t 1 + β 2 n t 1 k. 3 The two sums n 2 account for the fact that ncludng x t changes the pror probabltes of x t+1 and ts neghbors n t+1 for the next tme step. These sums can be rewrtten as: logp t+1 x t logpt+1 x t + log1 p t+1 x t log1 pt+1 x t S t+1 S t+1 = β 0 + β 1 x t + β 2 S t+1 n t k x t f β 0 + β 1 x t + β n t 2 x t k 4 β 0 + β 1 x t + β 2 S t+1 n t k x t + f β 0 + β 1 x t + β n t 2 x k t, where the functon f x = log1 + expx. Next, note that the contrbutons to equaton 4 are equal to 0 for all nodes except for node and ts neghbors. For =, the correspondng terms n 4 smplfy to: β 1 x t+1 + f β 0 + β 2 n t k f β 0 + β 1 + β 2 n t k For each neghbor of, the correspondng terms n 4 smplfy to: x t+1 β 2 + f β 0 + β k 1 x t + β 2 n t k. 5 f β 0 + β 1 x t + β n t k Addng the contrbutons of equatons 3, 5, and 6 provdes: t = β 0 + β 1 x t 1 + x t+1 + f + f β 0 + β 2 n t k f β 0 + β 1 x t + β 2 + β 2 nt 1 + k β 0 + β 1 + β 2 n t n t k k 1 k S t+1 f β 0 + β 1 x t + β n t + 1 2, k 7 where the sums are taken over all neghbors of. In the specal case of β 2 = 0, equaton 7 smplfes to: t = β 0 + β 1 x t 1 + x t+1 + f β 0 f β 0 + β 1. 8 Note that, when β 2 = 0, t can be computed exactly. When β 2 = 0, t can must be approxmated assumng that β 0 + β 2 0 and β 0 + β 1 0. Notng that f x 0 when x 0, and 6

7 f x x when x 0, provdes: t β 0 + β 1 x t 1 + x t+1 n t β 0 + β 1 + β 2 k S t =β 1 x t 1 + x t β 2 + β 2 S t nt 1 k + 1 k S t+1 β 0 + β 1 + β 2 n t + 1 k nt k k S t+1 S t β 0 + β 1 + β 2 n t k k k + 9 However, equaton 9 assumes knowledge of whch other elements are contaned n S t, and ths nformaton would not be known n advance. Thus the fnal sum over S t s approxmated wth half the correspondng sum over all neghbors of : t β 1 x t 1 + x t β 2 nt k 1 k S t k k The ntutve role of t s that t must smultaneously make S t appear lkely to have been generated from S t 1 and able to generate S t+1, thus conveyng temporal consstency nformaton both forwards and backwards n tme. 2.4 Iteratve Convergence The prevous secton provded defntons and nterpretatons for F pen S = s t S λt + t for the EBB scan statstc wth temporal consstency constrants. However, recall that the values of t for a gven tme step t depend on the detected subsets at t 1 and t + 1, whch creates a computatonal paradox. To solve ths, the Dynamc Subset Scan uses an teratve method that converges to a local optmum. To better approach the global optmum, multple restarts and smulated annealng whch gradually ncreases the strength of the t from 0 to ther full values are wrapped around steps 3-13 n the algorthm below. 3 Addtve GraphScan The prevous secton outlned how the expectaton-based bnomal EBB scorng functon may be penalzed wth temporal consstency constrants F pen S = s Sλ + whle remanng an addtve set functon over the data elements s S. Optmzng addtve functons wthout connectvty constrants s very straghtforward and conssts of ncludng all records wth postve contrbutons λ + > 0 and excludng the rest. Enforcng hard connectvty constrants on addtve functons.e. determnng the most postve connected subset s an nterestng and dffcult problem. For example, not all nodes makng postve contrbutons wll be ncluded n a hgh-scorng connected subset because they are lkely dsconnected n the underlyng graph structure. Also, a hgh-scorng connected subset may nclude a node wth a negatve contrbuton n order to connect two postve nodes. The GraphScan algorthm [13] exactly dentfes the hghest scorng connected subset for any scorng functon that satsfes the Lnear-Tme Subset Scannng LTSS property [11]. It s trvally 7

8 Algorthm 1 Iteratve convergence to local optmum for Dynamc Subset Scan wthout multple restarts or smulated annealng 1: for wndow duraton w from 1 to max wndow W do 2: Intalze each of the w spatal subsets ndependently.e., separately compute the hghest scorng subsets S t for each tme step t, assumng t = 0 for all s. 3: repeat 4: Randomly select a tme step t that s not flagged as Checked. Copy current spatal subset S t. 5: Compute t for each node s gven subsets S t 1 and S t+1, usng equaton 8 or 10. 6: Compute new optmal subset S t for tme step t usng t. Wthout connectvty constrants, smply nclude all postve contrbutons λ t + t ; wth connectvty constrants, call Addtve GraphScan. 7: f new subset S t does not mprove penalzed log-lkelhood rato of spatal-temporal subset S then 8: Revert to S t and mark tme step t as Checked. 9: end f 10: f new subset S t does mprove penalzed log-lkelhood rato of spatal-temporal subset S then 11: Replace S t wth S t and remove Checked flags from tme steps t 1, t + 1, and t. 12: end f 13: untl no further changes mprove penalzed log-lkelhood rato of spatal-temporal subset S,.e., all tme steps have been flagged as Checked. 14: end for 15: Return the hghest scorng spatal-temporal subset Sw. shown that addtve functons satsfy LTSS, and therefore GraphScan could be used to determne the hghest scorng most postve, n the case of an addtve scorng functon connected subset. However, GraphScan s desgned to optmze over more complex scorng functons; most mportantly, ts computaton tme s exponental n the graph sze and therefore t does not scale well n ths settng. Therefore, Addtve GraphScan s proposed as an effcent heurstc alternatve to GraphScan whch can be used to dentfy hgh-scorng most postve connected subsets n a gven graph structure wth real-valued weghts at each node. 3.1 Addtve GraphScan Algorthm Addtve GraphScan makes use of the followng notaton. wn s the real-valued weght of node n. A path p s any connected subgraph of nodes. wp s the sum of weghts for every node n the path. gp s the gan that would result from mergng path p nto a sngle node. It s the dfference between the weght of the resultng merged node and the hghest weghted node n the path. Identfyng and mergng paths wth postve gans s an ntegral part of Addtve GraphScan. gn, p s the gan that would result from mergng two paths together. The frst path, p, s a prevously dentfed path of nterest wth postve gan. The second path s the shortest path between node n and any pont along path p. gn, p s the dfference between the weght of the resultng merged paths and maxwn, wp. pwn s the pathweght of a node used when calculatng sngle source, shortest paths traversng through the node. Note the dfference between the weght of a node wn whch may be postve or negatve and s used n the gan calculatons above and the pathweght of a node pwn whch s non-negatve and used n shortest path calculatons. Pathweghts of postve 8

9 nodes are set to 0, reflectng no penalty or reward for traversng postve nodes whle dentfyng shortest paths. Pathweghts for negatve nodes wth no postve neghbors are wn. Pathweghts for negatve nodes wth postve neghbors have wn pwn = mn 0, wn +. degreen pos neghbors,n These postve weghts may be thought as unformly dffusng over ther negatve neghbors and then usng ths altered weght as the pathweght for negatve nodes wth postve neghbors. In the case where a large postve node overwhelms ts negatve neghbor, the negatve neghbor s pathweght s set to 0. Fnally, sn a, n b, n c determnes a fourth node, n s n the graph as a Stener pont for n a, n b, and n c. A Stener pont n ths settng s a node that forms the shortest nterconnect between the three provded nodes usng the pathweghts of the graph. sn a, n b, n c returns the shortest nterconnectng path formed between the three nodes gong through n s. Some basc pre-processng may be appled to the graph before runnng Addtve GraphScan. For example, any postve node wth a postve neghbor may be merged together nto a larger, sngle postve node addng ther weghts and repeated untl no further merges exst. Also, any negatve nodes wth degree of 1 or less may be recursvely removed because these are guaranteed to not be ncluded n a hgh scorng connected subset. Lastly, any negatve node wth at least two postve neghbors may be merged nto a sngle node f the resultng merged node has a hgher weght than any ndvdual postve neghbor. Addtve GraphScan can then be appled to the pre-processed graph. The Addtve GraphScan algorthm scales as OkN 2 = ON 2.5, domnated by steps 3 and 5. Algorthm 2 Addtve GraphScan 1: whle postve gan path merges exst do 2: Identfy top-k postve nodes where k = N. 3: Compute path weghts pwn for all nodes and create sngle-source shortest paths from each top-k node. 4: Compute gp for each shortest path p between top-k pars. Determne hghest gan path p and record endponts as n a and n b. 5: Compute gn, p for each remanng top-k node, n. Determne hghest gan node for p and record as n c. If no postve gan exsts between p and any n, then merge p and restart. 6: Form new path p as the unon of p and the path connectng p to n c. 7: Compute sn a, n b, n c. Compare wsn a, n b, n c and wp. Merge the one wth hgher weght. 8: end whle 9: The hghest weght merged node s returned as the most postve connected subset found by Addtve GraphScan. Note that ths node may need to be unpacked to determne the contents n the orgnal graph form. 9

10 Fgure 1: An example graph to demonstrate the Addtve GraphScan algorthm. The large bolded numbers are node dentfers and the small numbers wthn each node are the nodes correspondng weghts. The most postve subgraph conssts of nodes {0, 1, 6, 3, 4, 8, 9} and s correctly dentfed by Addtve GraphScan. 3.2 Addtve GraphScan Example Ths secton concludes by applyng Addtve GraphScan to a sample pre-processed graph found n Fgure 1. The most postve connected subgraph conssts of nodes {0, 1, 6, 3, 4, 8, 9} where node 6 s the Stener pont used to connect nodes 0, 4, and 9. Addtve GraphScan correctly dentfes ths subgraph even though node 6 s not on the shortest paths connectng nodes 0 and 4 or nodes 4 and 9. A key nsght nto the strong performance of Addtve GraphScan s delayng path merges whle searchng for a potental Stener pont. Begn at step 2: Nodes 0, 4, and 9 are dentfed as the top-k nodes. 3: Dkstra s algorthm s called on nodes 0, 4, and 9 provdng sngle-source shortest path nformaton from each of them. 4: The shortest path from node 0 to node 4, p = {0, 1, 2, 3, 4}, has hghest gan of gp = = +1. Because a postve gan path was found between nodes n a = 0 and n b = 4, Addtve GraphScan contnues searchng for a thrd node, n c. 5,6: Node n c = 9 s found wth p = {0, 1, 2, 3, 4, 7, 8, 9} and wp = 8. 7: Calculate a Stener pont for nodes 0, 4, and 9 and note that node 6 forms the shortest nterconnect between these three ponts. Ths nterconnect s formed by the nodes {0, 1, 6, 3, 4, 8, 9} and ws0, 4, 9 = = 9. Because ws0, 4, 9 > wp the Stener nterconnect s0, 4, 9 s condensed nto a sngle node wth weght 9. After ths merge, no more postve gan path merges exst and the loop exts. 9: The hghest scorng connected subset s then {0, 1, 6, 3, 4, 8, 9}. Notce that greedly mergng ether p or p would have resulted n a sub-optmal merge. 4 Results 4.1 Comparson of Addtve GraphScan vs. GraphScan Ths secton compares the fast heurstc, Addtve GraphScan, to the slower, but exact, GraphScan algorthm. Frst, a runtme analyss s presented comparng the two optmzaton algorthms. The much larger network 2 provded n the Battle of the Water Sensor Networks [1] s used to create connected subgraphs of varous szes from 50 to 500 nodes from the network. The graphs are processed wth three dfferent scans: Dynamc Subset Scan wth GraphScan, Dynamc Subset 10

11 Fgure 2: Runtme comparsons for the Dynamc Subset Scan wth GraphScan and Addtve GraphScan as the optmzaton algorthm. Independent Scan wth Addtve GraphScan s also shown. Scan wth Addtve GraphScan, and Independent wth Addtve GraphScan. The average runtme for each method s reported and are shown n Fgure 2. GraphScan begns to struggle wth graph szes of 250 nodes whle Addtve GraphScan quckly scans graphs of 500 nodes n approxmately 4.1 seconds. Independent wth Addtve GraphScan processed the entre 12,000+ node Network 2 n 221 seconds whle Dynamc wth Addtve GraphScan requred 1830 seconds approxmately a half hour. Ths dfference represents the addtonal calls to Addtve GraphScan requred by Dynamc Subset Scan to algn the ndvdual spatal subsets accordng to the temporal consstency constrants. The comparson of Addtve GraphScan and GraphScan s concluded by analyzng the scores of the spatal-temporal subsets dentfed by the scannng methods usng both Addtve Graph- Scan and GraphScan. The approxmaton rato results compare the hghest-scorng subsets found by Addtve GraphScan and GraphScan as a percentage averaged over 2000 smulatons. Table 1 provdes detaled nformaton for the approxmaton ratos. The ratos over 100% n the Dynamc cases reflect the nose n the teratve convergence process outlned above n Secton 2.4. To be clear, Addtve GraphScan s not dentfyng a hgher scorng subgraph than GraphScan for an ndvdual tme slce. However, the local optmum after the teratve convergence of Addtve GraphScan-based optmzatons at each step may have a hgher score than the local optmum reached wth GraphScan-based optmzatons at each tme step. The Statc and Independent methods do not use ths teratve convergence process to dentfy the hghest scorng spataltemporal regon and may reflect a more drect comparson between the performance of Addtve GraphScan and GraphScan. The rato does not fall below 98.4% ndcatng that Addtve Graphscan s provdng a huge speed ncrease wth mnmal loss of accuracy compared to scan statstcs usng GraphScan. 4.2 Detectng, Trackng, and Source-Tracng Plumes Ths secton evaluates the detecton, trackng, and source-tracng abltes of the Dynamc Subset Scan. The 129-node Network 1 from the Battle of the Water Sensor Networks [1] served as the test bed for these evaluatons. Two smulatons were performed. One wth sensors at FPR = 0.1 and TPR = 0.9 and a second wth weaker sensors at FPR = 0.2 and TPR = 0.8. All results below 11

12 Table 1: Approxmaton ratos comparng scores for Addtve GraphScan and GraphScan for multple methods and FPR and TPR. method Background0.1 Inects0.9 Background0.2 Inects0.8 Statc % % 99.15% 99.83% Independent % 99.99% 98.48% 99.65% Dynamc % % 99.70% % Table 2: Summary of learned parameter values method FPR TPR β 0 β 1 β 2 Dynamc Dynamc Dynamc Alt Dynamc Alt are averaged over 200 contamnant plumes smulated for 12 hours each. A separate 100-plume tranng set was used for cross-valdaton for the scan statstcs that requred learnng parameters. Comparsons are made for 4 dfferent spatal-temporal scan statstcs: Statc scan does not allow the detected spatal regon to change over tme. Independent scan allows the detected spatal regon to change over tme but does not share temporal nformaton between tme steps. Dynamc scan allows the detected spatal regon to change over tme and uses temporal consstency constrants to algn the ndvdual tme steps. Dynamc Alt. scan s smlar to Dynamc scan but does not use any nformaton from neghbors when enforcng temporal consstency constrants,.e., forces β 2 = 0 when learnng the model parameters. For the temporal component of the scans, max wndow sze W = 12 s used. Ths allows Statc, Dynamc, and Dynamc Alt. to detect a spatal-temporal subset between 1 and 12 hours n duraton. However, for the Independent scan, the hghest scorng spatal-temporal regon wll always be maxmum duraton. Ths consequence of the Independent scan s dscussed further below. The β 0... β 2 parameters for the Dynamc scan, and the β 0 and β 1 parameters for Dynamc Alt. were set usng a grd search on the separate 100-plume tranng set. The parameter values that maxmzed spatal-temporal overlap n the tranng data are shown n Table 2. Note the large changes n β 1 when movng from the easer to harder scenaros, whle β 0 and β 2 reman relatvely constant. Fgure 3 reports the average tme requred by each method to detect a contamnant plume for varous false postve rates. These results were calculated by processng 2160 background hours approxmately 3 months of data wth no contamnants. These were compared wth scores produced by the scan statstcs durng the 200 smulated plumes. The 0 false postve alarms 12

13 Fgure 3: Detecton results for FPR = 0.1 and TPR = 0.9 sensors on the left and FPR = 0.2 and TPR = 0.8 sensors on the rght. The detecton results are reported through Actvty Montorng Operatng Characterstc AMOC curves. These show the average tme requred for each method to detect a contamnant n the system, assumng a fxed number of allowable false postves per month. nterpretaton s that t took 4.3 hours on average for the scores produced by Dynamc Scan to exceed the largest score found by Dynamc Scan n the 2160 background hours. As the threshold for detecton s lowered, the number of false postve alarms ncreases but the tme to detect decreases, as shown by the Actvty Montorng Operatng Characterstc AMOC curves [4] n Fgure 3. The Statc, Dynamc, and Dynamc Alt. methods acheve smlar power for event detecton n the easer scenaro FPR = 0.1, TPR = 0.9. However, Dynamc acheves the overall best performance 6.62 hours to detect at 0 false postves when detectng a weaker sgnal FPR = 0.2, TPR = 0.8. Note the nfluence that a node s neghbors have on dstngushng performance between Dynamc and Dynamc Alt. n the 0.2/0.8 scenaro. The easer scenaro dd not requre addtonal nformaton from neghbors n order to obtan smlar performance, but ths nformaton s mportant when workng wth weaker sensors. The Independent method s poor performance s due to the relatvely hgh subset scores found by Independent when no contamnant s present. Its unconstraned flexblty allows t to overft to nose n the background, makng detecton of a true contamnaton event more dffcult. Fgure 5 reports the methods trackng ablty over the duraton of a spreadng contamnant plume 12 hours. A scan statstc s trackng ablty s measured through spatal-temporal overlap. Spatal-temporal overlap s a combnaton of precson and recall appled to spatal-temporal subsets. A measure of 1.0 corresponds to perfect agreement between the affected and detected spatal-temporal regons, whle 0.0 means the affected and detected regons are dsont. For two spatal-temporal subsets, Affected and Detected, the overlap s defned as: Affected Detected Affected Detected. See Fgure 4 for detals. The relatve performance of the Statc and Dynamc methods n the easer scenaro demonstrates Statc s lack of trackng ablty as the plume grows over tme. Statc s trackng performance quckly levels off whle Dynamc contnues to acheve hgher spatal-temporal overlap over the course of the contamnaton event. Ths ncrease n performance s due to the constraned flexblty allowed to the Dynamc Subset Scan. The dfference n trackng performance between Statc and Dynamc methods s not as large n the harder scenaro, but note the mportance of ncorporatng nformaton from a node s neghbors. The poor performance of the Independent 13

14 Fgure 4: Ths fgure demonstrates the calculaton of spatal-temporal overlap for plume trackng. A plume spreads through a smple 5-node lne graph over the course of four tme steps. Affected nodes turn from whte to red as the contamnant spreads. The Statc scan method s constraned to keep the exact same detected spatal regon throughout the event duraton. Hence, t may fal to capture the plume at later tme steps. Dynamc Scan allows the detected spatal regon to change at each tme step, trackng the plume as t spreads. Due to connectvty constrants, both methods must return a connected subgraph as the detected spatal regon at each tme step. Spatal-temporal overlap s penalzed for both false postves and false negatves. A measure of 1.0 corresponds to perfect agreement between the affected and detected spatal-temporal regons, whle 0.0 means that the affected and detected regons are dsont. Fgure 5: Trackng results for FPR = 0.1 and TPR = 0.9 sensors on the left and FPR = 0.2 and TPR = 0.8 sensors on the rght. Trackng ablty s measured by reportng the spatal-temporal overlap of the detected and affected subsets over the course of 12 hours. 14

15 Fgure 6: Source-tracng results for FPR = 0.1 and TPR = 0.9 sensors on the left and FPR = 0.2 and TPR = 0.8 sensors on the rght. Source-tracng ablty s measured by reportng the spatal overlap between the earlest detected spatal regon and the orgnal affected nodes. scan, partcularly n the early stages of the contamnaton event, s due to ts tendency to report spatal-temporal regons of maxmum duraton whch are not a good match to the true affected regon. Fgure 6 reports the methods ablty to dentfy where the contamnant orgnated over the duraton of the plume 12 hours. Ths s measured through purely spatal overlap between the earlest tme step n the detected regon and the source nodes of the plume. Note that t s possble for a quckly spreadng plume to affect multple nodes wthn the frst hour. In such cases, all of these nodes are treated as source nodes. The source-tracng results clearly demonstrate the advantage of sharng nformaton between tme steps durng the optmzaton process. Statc s ablty to dentfy the source nodes actually decreases over the course of the contamnaton event as more nformaton s gathered. Explorng ths result further, note that Statc has very hgh spatal recall but very low precson for dentfyng the source nodes on hour 12. Ths suggests that Statc tends to return very large subsets at the later stages of the plume. The large regons returned by the Statc method harm ts ablty to accurately dentfy the source of the contamnant. The key to the Dynamc Subset Scan s success for source-tracng s the backwards flow of temporal consstency nformaton allowed n our model. Dynamc s able to change the detected subset for prevous tme steps based on new, more current data. Ths gves t superor sourcetracng abltes n both the easer 0.1/0.9 and harder 0.2/0.8 scenaros. The mportance of ncludng neghbor nformaton s evdent n the harder scenaro: whle the Dynamc method acheves smlar performance to Statc durng the early stages of the contamnaton event and much better performance n the later stages, the performance of Dynamc Alt. whch does not use neghbor nformaton does not surpass Statc untl the nnth hour. Fnally, note the substantal ncrease n performance of the Independent method at hour 12, though ts overall performance s stll low. Ths s an artfact of Independent preferrng to return 12-hour regons. 5 Conclusons Ths work ntroduced the Dynamc Subset Scan for detectng, trackng, and source-tracng dynamc patterns that change the affected subset over tme. Ths novel extenson of the well-known 15

16 spatal and subset scan statstcs s composed of two man contrbutons. Frst s the ncorporaton of temporal consstency constrants that may be enforced on temporally adacent, spatal subsets. These constrants are a frutful compromse between tradtonal spatal-temporal scan statstcs that do not allow the detected regon to change over tme Statc and the other extreme where temporal nformaton s gnored Independent. The key nsght to enforcng temporal consstency constrants s recognzng that the expectaton-based bnomal scorng functon may be wrtten as an addtve functon over the data records. Ths allows for addtonal terms constrants to be ncluded n the penalzed log lkelhood rato whle remanng effcent to optmze. Crtcally, these temporal consstency constrants were derved to allow temporal nformaton to be shared both forward and backward n tme. The second novel contrbuton s the Addtve GraphScan algorthm, whch allows the Dynamc Subset Scan to enforce both soft temporal consstency constrants and hard connectvty constrants whle scalng to large, real world networks. Addtve GraphScan s a fast, heurstc alternatve to GraphScan. However, the results demonstrate an approxmaton rato of over 99%, suggestng a very small sacrfce for dramatc gans n speed and scalablty. The Dynamc Subset Scan was evaluated on data provded through the Battle of the Water Sensor Networks [1]. Dynamc scan succeeded n detectng contamnaton events sooner and trackng these events more accurately compared to other competng methods. The gans were due to Dynamc Scan s constraned flexblty: competng methods ether faled to capture the dynamcs of the spreadng plume Statc or were susceptble to over-fttng from lack of constrants Independent. In scenaros wth a weaker sgnal to be detected, ncorporatng nformaton from a node s neghbors n the Dynamc Scan proved worthwhle, leadng to substantal gans n performance on the detecton, trackng, and source-tracng tasks. In summary, relaxng constrants on spatal-temporal regon shape must be done carefully. Strct temporal constrants work well when the affected subset of the data does not change over tme. However, removng them completely n order to track dynamc patterns performs poorly as shown by the Independent method results. Dynamc Subset Scan wth temporal consstency and connectvty constrants provdes a scalable soluton for future work n dynamc pattern detecton n graph-based or sensor network data. Acknowledgment A specal thanks to Professor Danel Nell and the Event and Pattern Detecton Laboratory for ther too many? deas and multple edts of ths work. Also, thanks to Yatng Zhang who helped me thnk through Addtve GraphScan at the mplementaton level. Thanks to R. Rav for provdng nsghts on the use of Stener ponts. Ths work was partally supported by NSF grants IIS , IIS , and IIS References [1] Av Ostfeld et al. The battle of water sensor networks: A desgn challenge for engneers and algorthms. Journal of Water Resources Plannng and Management, 1346: , [2] J. Berry, R. D. Carr, W. Hart, V. J. Leung, C. A. Phllps, and J. P. Watson. Desgnng contamnaton warnng systems for muncpal water networks usng mperfect sensors. Journal of Water Resources Plannng and Management, 1354: ,

17 [3] J. Berry, L. Flescher, W. Hart, and C. Phllps. Sensor placement n muncpal water networks. J. Water, 131: , [4] T. Fawcett and F. Provost. Actvty montorng: notcng nterestng changes n behavor. In Proc. 5th Intl. Conf. on Knowledge Dscovery and Data Mnng, pages 53 62, [5] M. Gomez-Rodrguez, J. Leskovec, and A. Krause. Inferrng networks of dffuson and nfluence. In Proc. 16th ACM SIGKDD Conf. on Knowledge Dscovery and Data Mnng, pages , [6] M. W. Koch and S. A. Mckenna. Dstrbuted sensor fuson n water qualty event detecton. Journal of Water Resources Plannng and Management, 137:10 19, [7] A. Krause, J. Leskovec, C. Guestrn, J. VanBresen, and C. Faloutsos. Effcent sensor placement optmzaton for securng large water dstrbuton networks. Journal of Water Resources Plannng and Management, 1346: , November [8] M. Kulldorff. A spatal scan statstc. Communcatons n Statstcs: Theory and Methods, 266: , [9] S. Myers and J. Leskovec. On the convexty of latent socal network nference. In Advances n Neural Informaton Processng Systems 23, pages [10] D. B. Nell. Expectaton-based scan statstcs for montorng spatal tme seres data. Internatonal Journal of Forecastng, 25: , [11] D. B. Nell. Fast subset scan for spatal pattern detecton. Journal of the Royal Statstcal Socety Seres B: Statstcal Methodology, 742: , [12] D. B. Nell, A. W. Moore, M. R. Sabhnan, and K. Danel. Detecton of emergng space-tme clusters. In Proc. 11th ACM SIGKDD Conf. on Knowledge Dscovery and Data Mnng, [13] S. Speakman and D. B. Nell. Fast graph scan for scalable detecton of arbtrary connected clusters. In Proc. Internatonal Socety for Dsease Survellance Annual Conference, [14] R. Vswanathan and P. K. Varshney. Dstrbuted detecton wth multple sensors: Part I Fundamentals. Proceedngs of the IEEE, pages 54 63,

Dynamic Pattern Detection with Temporal Consistency and Connectivity Constraints

Dynamic Pattern Detection with Temporal Consistency and Connectivity Constraints 2013 IEEE 13th Internatonal Conference on Data Mnng Dynamc Pattern Detecton wth Temporal Consstency and Connectvty Constrants Skyler Speakman, Yatng Zhang, Danel B. Nell Event and Pattern Detecton Laboratory

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Biostatistics 615/815

Biostatistics 615/815 The E-M Algorthm Bostatstcs 615/815 Lecture 17 Last Lecture: The Smplex Method General method for optmzaton Makes few assumptons about functon Crawls towards mnmum Some recommendatons Multple startng ponts

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Active Contours/Snakes

Active Contours/Snakes Actve Contours/Snakes Erkut Erdem Acknowledgement: The sldes are adapted from the sldes prepared by K. Grauman of Unversty of Texas at Austn Fttng: Edges vs. boundares Edges useful sgnal to ndcate occludng

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Fitting: Deformable contours April 26 th, 2018

Fitting: Deformable contours April 26 th, 2018 4/6/08 Fttng: Deformable contours Aprl 6 th, 08 Yong Jae Lee UC Davs Recap so far: Groupng and Fttng Goal: move from array of pxel values (or flter outputs) to a collecton of regons, objects, and shapes.

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

Exercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005

Exercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005 Exercses (Part 4) Introducton to R UCLA/CCPR John Fox, February 2005 1. A challengng problem: Iterated weghted least squares (IWLS) s a standard method of fttng generalzed lnear models to data. As descrbed

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Improving Classifier Fusion Using Particle Swarm Optimization

Improving Classifier Fusion Using Particle Swarm Optimization Proceedngs of the 7 IEEE Symposum on Computatonal Intellgence n Multcrtera Decson Makng (MCDM 7) Improvng Classfer Fuson Usng Partcle Swarm Optmzaton Kalyan Veeramachanen Dept. of EECS Syracuse Unversty

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS46: Mnng Massve Datasets Jure Leskovec, Stanford Unversty http://cs46.stanford.edu /19/013 Jure Leskovec, Stanford CS46: Mnng Massve Datasets, http://cs46.stanford.edu Perceptron: y = sgn( x Ho to fnd

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Optimal Scheduling of Capture Times in a Multiple Capture Imaging System

Optimal Scheduling of Capture Times in a Multiple Capture Imaging System Optmal Schedulng of Capture Tmes n a Multple Capture Imagng System Tng Chen and Abbas El Gamal Informaton Systems Laboratory Department of Electrcal Engneerng Stanford Unversty Stanford, Calforna 9435,

More information

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 48 CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 3.1 INTRODUCTION The raw mcroarray data s bascally an mage wth dfferent colors ndcatng hybrdzaton (Xue

More information

Lecture 4: Principal components

Lecture 4: Principal components /3/6 Lecture 4: Prncpal components 3..6 Multvarate lnear regresson MLR s optmal for the estmaton data...but poor for handlng collnear data Covarance matrx s not nvertble (large condton number) Robustness

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

Three supervised learning methods on pen digits character recognition dataset

Three supervised learning methods on pen digits character recognition dataset Three supervsed learnng methods on pen dgts character recognton dataset Chrs Flezach Department of Computer Scence and Engneerng Unversty of Calforna, San Dego San Dego, CA 92093 cflezac@cs.ucsd.edu Satoru

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

A fault tree analysis strategy using binary decision diagrams

A fault tree analysis strategy using binary decision diagrams Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

Effectiveness of Information Retraction

Effectiveness of Information Retraction Effectveness of Informaton on Cndy Hu, Malk Magdon-Ismal, Mark Goldberg and Wllam A. Wallace Department of Industral and Systems Engneerng Rensselaer Polytechnc Insttute Troy, New York Emal: huc@rp.edu,

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Fusion Performance Model for Distributed Tracking and Classification

Fusion Performance Model for Distributed Tracking and Classification Fuson Performance Model for Dstrbuted rackng and Classfcaton K.C. Chang and Yng Song Dept. of SEOR, School of I&E George Mason Unversty FAIRFAX, VA kchang@gmu.edu Martn Lggns Verdan Systems Dvson, Inc.

More information

LOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit

LOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit LOOP ANALYSS The second systematic technique to determine all currents and voltages in a circuit T S DUAL TO NODE ANALYSS - T FRST DETERMNES ALL CURRENTS N A CRCUT AND THEN T USES OHM S LAW TO COMPUTE

More information