Kernels and Support Vector Machines

Size: px
Start display at page:

Download "Kernels and Support Vector Machines"

Transcription

1 Kernels and Support Vector Machines Machine Learning CSE446 Sham Kakade University of Washington November 1, Sham Kakade 1 Announcements: Project Milestones coming up HW2 You ve implemented GD, SGD, etc HW3 posted this week. Let s get state of the art on MNIST! It ll be collaborative Today: Review: the perceptron, margins, and separability Kernels & SVMs 2016 Sham Kakade 2 1

2 Support Vector Machines (Two Ideas Mixed up) 1) An attempt to better optimize the classification loss? Questionable? Latent SVMs are interesting. 2) Kernels Warp the feature space This idea is actually more general The success of SVMS? 2016 Sham Kakade 3 Linear Separability: More formally, Using Margin Data linearly separable, if there exists a vector a margin Such that 2016 Sham Kakade 4 2

3 Perceptron Analysis: Linearly Separable Case Theorem [Block, Novikoff]: Given a sequence of labeled examples: Each feature vector has bounded norm: If dataset is linearly separable: Then the number of mistakes made by the online perceptron on any such sequence is bounded by 2016 Sham Kakade 5 Beyond Linearly Separable Case Perceptron algorithm is super cool! No assumption about data distribution! Could be generated by an oblivious adversary, no need to be iid Makes a fixed number of mistakes, and it s done for ever! Even if you see infinite data However, real world not linearly separable Can t expect never to make mistakes again 2016 Sham Kakade 6 3

4 Kernels Machine Learning CSE446 Sham Kakade University of Washington November 1, Sham Kakade 7 What if the data is not linearly separable? Use features of features of features of features. Feature space can get really large really quickly! 2016 Sham Kakade 8 4

5 Higher order polynomials number of monomial terms number of input dimensions d=4 d=3 d=2 m input features d degree of polynomial grows fast! d = 6, m = 100 about 1.6 billion terms 2016 Sham Kakade 9 Perceptron Revisited Given weight vector w (t), predict point x by: Mistake at time t: w (t+1) ç w (t) + y (t) x (t) Thus, write weight vector in terms of mistaken data points only: Let M (t) be time steps up to t when mistakes were made: Prediction rule now: When using high dimensional features: 2016 Sham Kakade 10 5

6 Dot-product of polynomials exactly d 2016 Sham Kakade 11 Finally the Kernel Trick!!! (Kernelized Perceptron Every time you make a mistake, remember (x (t),y (t) ) Kernelized Perceptron prediction for x: y (j) j2m (t) sign(w (t) (x)) = X (x (j) ) (x) = X y (j) k(x (j), x) j2m (t) 2016 Sham Kakade 12 6

7 Polynomial kernels All monomials of degree d in O(d) operations: How about all monomials of degree up to d? Solution 0: exactly d Better solution: 2016 Sham Kakade 13 Common kernels Polynomials of degree exactly d Polynomials of degree up to d Gaussian (squared exponential) kernel 2 Sigmoid 2016 Sham Kakade 14 7

8 Support Vector Machines Machine Learning CSE446 Sham Kakade University of Washington November 1, Sham Kakade 15 Linear classifiers Which line is better? 2016 Sham Kakade 16 8

9 Pick the one with the largest margin! confidence = y j (w x j + w 0 ) 2016 Sham Kakade 17 Maximize the margin max,w,w 0 y j (w x j + w 0 ), 8j 2 {1,...,N} 2016 Sham Kakade 18 9

10 But there are many planes 2016 Sham Kakade 19 Review: Normal to a plane x j = x j + w w 2016 Sham Kakade 20 10

11 A Convention: Normalized margin Canonical hyperplanes x j = x j + w w x + x Sham Kakade 21 Margin maximization using canonical hyperplanes Unnormalized problem: max,w,w 0 y j (w x j + w 0 ), 8j 2 {1,...,N} Normalized Problem: min w,w 0 w 2 2 y j (w x j + w 0 ) 1, 8j 2 {1,...,N} 2016 Sham Kakade 22 11

12 Support vector machines (SVMs) min w,w 0 w 2 2 y j (w x j + w 0 ) 1, 8j 2 {1,...,N} Solve efficiently by many methods, e.g., quadratic programming (QP) Well-studied solution algorithms Stochastic gradient descent Hyperplane defined by support vectors 2016 Sham Kakade 23 What if the data is not linearly separable? Use features of features of features of features Sham Kakade 24 12

13 What if the data is still not linearly separable? min w,w 0 w 2 2 y j (w x j + w 0 ) 1, 8j If data is not linearly separable, some points don t satisfy margin constraint: How bad is the violation? Tradeoff margin violation with w : 2016 Sham Kakade 25 SVMs for Non-Linearly Separable meet my friend the Perceptron Perceptron was minimizing the hinge loss: NX j=1 y j (w x j + w 0 ) + SVMs minimizes the regularized hinge loss!! w C NX j=1 1 y j (w x j + w 0 ) Sham Kakade 26 13

14 Stochastic Gradient Descent for SVMs Perceptron minimization: NX y j (w x j + w 0 ) + j=1 SGD for Perceptron: SVMs minimization: NX w C 1 y j (w x j + w 0 ) + j=1 SGD for SVMs: w (t+1) w (t) + h i y (t) (w (t) x (t) ) apple 0 y (t) x (t) 2016 Sham Kakade 27 SVMs vs logistic regression We often want probabilities/confidences (logistic wins here) For classification loss, they are comparable Multiclass setting: Softmax naturally generalizes logistic regression SVMs have What about good old least squares? 2016 Sham Kakade 28 14

15 Multiple Classes One can generalize the hinge loss If no error (by some margin) -> no loss If error, penalize what you said against the best SVMs vs logistic regression We often want probabilities/confidences (logistic wins here) For classification loss, they are Latent SVMs When you have many classes it s difficult to do logistic regression 2) Kernels Warp the feature space 2016 Sham Kakade Sham Kakade 30 15

16 Slack variables Hinge loss If margin 1, don t care If margin < 1, pay linear penalty 2016 Sham Kakade 31 Side note: What s the difference between SVMs and logistic regression? SVM: Logistic regression: Log loss: 2016 Sham Kakade 32 16

17 What about multiple classes? 2016 Sham Kakade 33 One against All Learn 3 classifiers: 2016 Sham Kakade 34 17

18 Learn 1 classifier: Multiclass SVM Simultaneously learn 3 sets of weights 2016 Sham Kakade 35 Learn 1 classifier: Multiclass SVM 2016 Sham Kakade 36 18

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Parallel to AIMA 8., 8., 8.6.3, 8.9 The Automatic Classification Problem Assign object/event or sequence of objects/events

More information

Lecture 3 - Regression

Lecture 3 - Regression Lecture 3 - Regression Instructor: Prof Ganesh Ramakrishnan July 25, 2016 1 / 30 The Simplest ML Problem: Least Square Regression Curve Fitting: Motivation Error measurement Minimizing Error Method of

More information

Log-linear models (part 1I)

Log-linear models (part 1I) Log-linear models (part 1I) Lecture, Feb 2 CS 690N, Spring 2017 Advanced Natural Language Processing http://people.cs.umass.edu/~brenocon/anlp2017/ Brendan O Connor College of Information and Computer

More information

Machine Learning for Language Technology

Machine Learning for Language Technology Machine Learning for Language Technology Generative and Discriminative Models Joakim Nivre Uppsala University Department of Linguistics and Philology joakim.nivre@lingfil.uu.se Machine Learning for Language

More information

Predicting the outcome of NFL games using machine learning Babak Hamadani bhamadan-at-stanford.edu cs229 - Stanford University

Predicting the outcome of NFL games using machine learning Babak Hamadani bhamadan-at-stanford.edu cs229 - Stanford University Predicting the outcome of NFL games using machine learning Babak Hamadani bhamadan-at-stanford.edu cs229 - Stanford University 1. Introduction: Professional football is a multi-billion industry. NFL is

More information

Lesson 08. Convolutional Neural Network. Ing. Marek Hrúz, Ph.D. Katedra Kybernetiky Fakulta aplikovaných věd Západočeská univerzita v Plzni.

Lesson 08. Convolutional Neural Network. Ing. Marek Hrúz, Ph.D. Katedra Kybernetiky Fakulta aplikovaných věd Západočeská univerzita v Plzni. Lesson 08 Convolutional Neural Network Ing. Marek Hrúz, Ph.D. Katedra Kybernetiky Fakulta aplikovaných věd Západočeská univerzita v Plzni Lesson 08 Convolution we will consider 2D convolution the result

More information

The Game-Theoretic Approach to Machine Learning and Adaptation

The Game-Theoretic Approach to Machine Learning and Adaptation The Game-Theoretic Approach to Machine Learning and Adaptation Nicolò Cesa-Bianchi Università degli Studi di Milano Nicolò Cesa-Bianchi (Univ. di Milano) Game-Theoretic Approach 1 / 25 Machine Learning

More information

Machine Learning. Classification, Discriminative learning. Marc Toussaint University of Stuttgart Summer 2014

Machine Learning. Classification, Discriminative learning. Marc Toussaint University of Stuttgart Summer 2014 Machine Learning Classification, Discriminative learning Structured output, structured input, discriminative function, joint input-output features, Likelihood Maximization, Logistic regression, binary

More information

Learning Deep Networks from Noisy Labels with Dropout Regularization

Learning Deep Networks from Noisy Labels with Dropout Regularization Learning Deep Networks from Noisy Labels with Dropout Regularization Ishan Jindal*, Matthew Nokleby*, Xuewen Chen** *Department of Electrical and Computer Engineering **Department of Computer Science Wayne

More information

SSB Debate: Model-based Inference vs. Machine Learning

SSB Debate: Model-based Inference vs. Machine Learning SSB Debate: Model-based nference vs. Machine Learning June 3, 2018 SSB 2018 June 3, 2018 1 / 20 Machine learning in the biological sciences SSB 2018 June 3, 2018 2 / 20 Machine learning in the biological

More information

Lecture 15. Global extrema and Lagrange multipliers. Dan Nichols MATH 233, Spring 2018 University of Massachusetts

Lecture 15. Global extrema and Lagrange multipliers. Dan Nichols MATH 233, Spring 2018 University of Massachusetts Lecture 15 Global extrema and Lagrange multipliers Dan Nichols nichols@math.umass.edu MATH 233, Spring 2018 University of Massachusetts March 22, 2018 (2) Global extrema of a multivariable function Definition

More information

Adversarial Examples and Adversarial Training. Ian Goodfellow, OpenAI Research Scientist Presentation at Quora,

Adversarial Examples and Adversarial Training. Ian Goodfellow, OpenAI Research Scientist Presentation at Quora, Adversarial Examples and Adversarial Training Ian Goodfellow, OpenAI Research Scientist Presentation at Quora, 2016-08-04 In this presentation Intriguing Properties of Neural Networks Szegedy et al, 2013

More information

An Hybrid MLP-SVM Handwritten Digit Recognizer

An Hybrid MLP-SVM Handwritten Digit Recognizer An Hybrid MLP-SVM Handwritten Digit Recognizer A. Bellili ½ ¾ M. Gilloux ¾ P. Gallinari ½ ½ LIP6, Université Pierre et Marie Curie ¾ La Poste 4, Place Jussieu 10, rue de l Ile Mabon, BP 86334 75252 Paris

More information

EXPLOTING THE IMPULSE RESPONSE OF GROUNDING SYSTEMS FOR AUTOMATIC CLASSIFICATION OF GROUNDING TOPOLOGIES

EXPLOTING THE IMPULSE RESPONSE OF GROUNDING SYSTEMS FOR AUTOMATIC CLASSIFICATION OF GROUNDING TOPOLOGIES GROUND 2014 & 6th LPE International Conference on Grounding and Earthing & 6th International Conference on Lightning Physics and Effects Manaus Brazil May 2014 EXPLOTING THE IMPULSE RESPONSE OF GROUNDING

More information

Identification of Fault Type and Location in Distribution Feeder Using Support Vector Machines

Identification of Fault Type and Location in Distribution Feeder Using Support Vector Machines Identification of Type and in Distribution Feeder Using Support Vector Machines D Thukaram, and Rimjhim Agrawal Department of Electrical Engineering Indian Institute of Science Bangalore-560012 INDIA e-mail:

More information

Log-linear models (part III)

Log-linear models (part III) Log-linear models (part III) Lecture, Feb 7 CS 690N, Spring 2017 Advanced Natural Language Processing http://people.cs.umass.edu/~brenocon/anlp2017/ Brendan O Connor College of Information and Computer

More information

Computer Vision, Lecture 3

Computer Vision, Lecture 3 Computer Vision, Lecture 3 Professor Hager http://www.cs.jhu.edu/~hager /4/200 CS 46, Copyright G.D. Hager Outline for Today Image noise Filtering by Convolution Properties of Convolution /4/200 CS 46,

More information

Signal Recovery from Random Measurements

Signal Recovery from Random Measurements Signal Recovery from Random Measurements Joel A. Tropp Anna C. Gilbert {jtropp annacg}@umich.edu Department of Mathematics The University of Michigan 1 The Signal Recovery Problem Let s be an m-sparse

More information

CRF and Structured Perceptron

CRF and Structured Perceptron CRF and Structured Perceptron CS 585, Fall 2015 -- Oct. 6 Introduction to Natural Language Processing http://people.cs.umass.edu/~brenocon/inlp2015/ Brendan O Connor Viterbi exercise solution CRF & Structured

More information

LECTURE 19 - LAGRANGE MULTIPLIERS

LECTURE 19 - LAGRANGE MULTIPLIERS LECTURE 9 - LAGRANGE MULTIPLIERS CHRIS JOHNSON Abstract. In this lecture we ll describe a way of solving certain optimization problems subject to constraints. This method, known as Lagrange multipliers,

More information

신경망기반자동번역기술. Konkuk University Computational Intelligence Lab. 김강일

신경망기반자동번역기술. Konkuk University Computational Intelligence Lab.  김강일 신경망기반자동번역기술 Konkuk University Computational Intelligence Lab. http://ci.konkuk.ac.kr kikim01@kunkuk.ac.kr 김강일 Index Issues in AI and Deep Learning Overview of Machine Translation Advanced Techniques in

More information

Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON)

Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON) Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON) Parveen Kumar Department of E.C.E Lecturer, NCCE Israna Nitin Sharma Department of E.C.E

More information

SELECTING RELEVANT DATA

SELECTING RELEVANT DATA EXPLORATORY ANALYSIS The data that will be used comes from the reviews_beauty.json.gz file which contains information about beauty products that were bought and reviewed on Amazon.com. Each data point

More information

Time-average constraints in stochastic Model Predictive Control

Time-average constraints in stochastic Model Predictive Control Time-average constraints in stochastic Model Predictive Control James Fleming Mark Cannon ACC, May 2017 James Fleming, Mark Cannon Time-average constraints in stochastic MPC ACC, May 2017 1 / 24 Outline

More information

ARTIFICIAL INTELLIGENCE (CS 370D)

ARTIFICIAL INTELLIGENCE (CS 370D) Princess Nora University Faculty of Computer & Information Systems ARTIFICIAL INTELLIGENCE (CS 370D) (CHAPTER-5) ADVERSARIAL SEARCH ADVERSARIAL SEARCH Optimal decisions Min algorithm α-β pruning Imperfect,

More information

arxiv: v1 [cs.ni] 23 Jan 2019

arxiv: v1 [cs.ni] 23 Jan 2019 Machine Learning for Wireless Communications in the Internet of Things: A Comprehensive Survey Jithin Jagannath, Nicholas Polosky, Anu Jagannath, Francesco Restuccia, and Tommaso Melodia ANDRO Advanced

More information

CSC321 Lecture 23: Go

CSC321 Lecture 23: Go CSC321 Lecture 23: Go Roger Grosse Roger Grosse CSC321 Lecture 23: Go 1 / 21 Final Exam Friday, April 20, 9am-noon Last names A Y: Clara Benson Building (BN) 2N Last names Z: Clara Benson Building (BN)

More information

Privacy preserving data mining multiplicative perturbation techniques

Privacy preserving data mining multiplicative perturbation techniques Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity Outline Review and critique of randomization approaches (additive noise) Multiplicative data

More information

An Introduction to Machine Learning for Social Scientists

An Introduction to Machine Learning for Social Scientists An Introduction to Machine Learning for Social Scientists Tyler Ransom University of Oklahoma, Dept. of Economics November 10, 2017 Outline 1. Intro 2. Examples 3. Conclusion Tyler Ransom (OU Econ) An

More information

Dota2 is a very popular video game currently.

Dota2 is a very popular video game currently. Dota2 Outcome Prediction Zhengyao Li 1, Dingyue Cui 2 and Chen Li 3 1 ID: A53210709, Email: zhl380@eng.ucsd.edu 2 ID: A53211051, Email: dicui@eng.ucsd.edu 3 ID: A53218665, Email: lic055@eng.ucsd.edu March

More information

Introduction to Machine Learning

Introduction to Machine Learning Introduction to Machine Learning Deep Learning Barnabás Póczos Credits Many of the pictures, results, and other materials are taken from: Ruslan Salakhutdinov Joshua Bengio Geoffrey Hinton Yann LeCun 2

More information

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function John MacLaren Walsh & Steven Weber Department of Electrical and Computer Engineering

More information

Generalized Game Trees

Generalized Game Trees Generalized Game Trees Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, Ca. 90024 Abstract We consider two generalizations of the standard two-player game

More information

CS510 \ Lecture Ariel Stolerman

CS510 \ Lecture Ariel Stolerman CS510 \ Lecture04 2012-10-15 1 Ariel Stolerman Administration Assignment 2: just a programming assignment. Midterm: posted by next week (5), will cover: o Lectures o Readings A midterm review sheet will

More information

Classification of Road Images for Lane Detection

Classification of Road Images for Lane Detection Classification of Road Images for Lane Detection Mingyu Kim minkyu89@stanford.edu Insun Jang insunj@stanford.edu Eunmo Yang eyang89@stanford.edu 1. Introduction In the research on autonomous car, it is

More information

Stacking Ensemble for auto ml

Stacking Ensemble for auto ml Stacking Ensemble for auto ml Khai T. Ngo Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements for the degree of Master

More information

Coursework 2. MLP Lecture 7 Convolutional Networks 1

Coursework 2. MLP Lecture 7 Convolutional Networks 1 Coursework 2 MLP Lecture 7 Convolutional Networks 1 Coursework 2 - Overview and Objectives Overview: Use a selection of the techniques covered in the course so far to train accurate multi-layer networks

More information

Improving the Generalized Likelihood Ratio Test for Unknown Linear Gaussian Channels

Improving the Generalized Likelihood Ratio Test for Unknown Linear Gaussian Channels IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 4, APRIL 2003 919 Improving the Generalized Likelihood Ratio Test for Unknown Linear Gaussian Channels Elona Erez, Student Member, IEEE, and Meir Feder,

More information

Log-linear models (part 1I)

Log-linear models (part 1I) Log-linear models (part 1I) CS 690N, Spring 2018 Advanced Natural Language Processing http://people.cs.umass.edu/~brenocon/anlp2018/ Brendan O Connor College of Information and Computer Sciences University

More information

Cómo estructurar un buen proyecto de Machine Learning? Anna Bosch Rue VP Data Launchmetrics

Cómo estructurar un buen proyecto de Machine Learning? Anna Bosch Rue VP Data Launchmetrics Cómo estructurar un buen proyecto de Machine Learning? Anna Bosch Rue VP Data Intelligence @ Launchmetrics annaboschrue@gmail.com Motivating example 90% Accuracy and you want to do better IDEAS: - Collect

More information

IBM SPSS Neural Networks

IBM SPSS Neural Networks IBM Software IBM SPSS Neural Networks 20 IBM SPSS Neural Networks New tools for building predictive models Highlights Explore subtle or hidden patterns in your data. Build better-performing models No programming

More information

Lane Detection in Automotive

Lane Detection in Automotive Lane Detection in Automotive Contents Introduction... 2 Image Processing... 2 Reading an image... 3 RGB to Gray... 3 Mean and Gaussian filtering... 5 Defining our Region of Interest... 6 BirdsEyeView Transformation...

More information

Compound Object Detection Using Region Co-occurrence Statistics

Compound Object Detection Using Region Co-occurrence Statistics Compound Object Detection Using Region Co-occurrence Statistics Selim Aksoy 1 Krzysztof Koperski 2 Carsten Tusk 2 Giovanni Marchisio 2 1 Department of Computer Engineering, Bilkent University, Ankara,

More information

SMILe: Shuffled Multiple-Instance Learning

SMILe: Shuffled Multiple-Instance Learning SMILe: Shuffled Multiple-Instance Learning Gary Doran and Soumya Ray Department of Electrical Engineering and Computer Science Case Western Reserve University Cleveland, OH 44106, USA {gary.doran,sray}@case.edu

More information

CS 771 Artificial Intelligence. Adversarial Search

CS 771 Artificial Intelligence. Adversarial Search CS 771 Artificial Intelligence Adversarial Search Typical assumptions Two agents whose actions alternate Utility values for each agent are the opposite of the other This creates the adversarial situation

More information

Generating Groove: Predicting Jazz Harmonization

Generating Groove: Predicting Jazz Harmonization Generating Groove: Predicting Jazz Harmonization Nicholas Bien (nbien@stanford.edu) Lincoln Valdez (lincolnv@stanford.edu) December 15, 2017 1 Background We aim to generate an appropriate jazz chord progression

More information

A robust method for deblurring and decoding a barcode image

A robust method for deblurring and decoding a barcode image A robust method for deblurring and a barcode image In collaboration with Mohammed El Rhabi and Gilles Rochefort RealEyes3D, Saint Cloud 1 Description of the problem 2 a barcode image 1 Description of the

More information

Constructing local discriminative features for signal classification

Constructing local discriminative features for signal classification Constructing local discriminative features for signal classification Local features for signal classification Outline Motivations Problem formulation Lifting scheme Local features Conclusions Toy example

More information

Recent Advances in Image Deblurring. Seungyong Lee (Collaboration w/ Sunghyun Cho)

Recent Advances in Image Deblurring. Seungyong Lee (Collaboration w/ Sunghyun Cho) Recent Advances in Image Deblurring Seungyong Lee (Collaboration w/ Sunghyun Cho) Disclaimer Many images and figures in this course note have been copied from the papers and presentation materials of previous

More information

4 to find the dimensions of the rectangle that have the maximum area. 2y A =?? f(x, y) = (2x)(2y) = 4xy

4 to find the dimensions of the rectangle that have the maximum area. 2y A =?? f(x, y) = (2x)(2y) = 4xy Optimization Constrained optimization and Lagrange multipliers Constrained optimization is what it sounds like - the problem of finding a maximum or minimum value (optimization), subject to some other

More information

Building a Computer Mahjong Player Based on Monte Carlo Simulation and Opponent Models

Building a Computer Mahjong Player Based on Monte Carlo Simulation and Opponent Models Building a Computer Mahjong Player Based on Monte Carlo Simulation and Opponent Models Naoki Mizukami 1 and Yoshimasa Tsuruoka 1 1 The University of Tokyo 1 Introduction Imperfect information games are

More information

Fast, Handset-Based GSM Fingerprints for Indoor Localization

Fast, Handset-Based GSM Fingerprints for Indoor Localization Fast, Handset-Based GSM Fingerprints for Indoor Localization Ye Tian, Bruce Denby SIGMA Laboratory and UniversitéPierre et Marie Curie ye.tian@etu.upmc.fr, denby@ieee.org Iness Ahriz LAETITIA/CEDRIC Laboratory

More information

Predicting outcomes of professional DotA 2 matches

Predicting outcomes of professional DotA 2 matches Predicting outcomes of professional DotA 2 matches Petra Grutzik Joe Higgins Long Tran December 16, 2017 Abstract We create a model to predict the outcomes of professional DotA 2 (Defense of the Ancients

More information

Classification of Hand Gestures using Surface Electromyography Signals For Upper-Limb Amputees

Classification of Hand Gestures using Surface Electromyography Signals For Upper-Limb Amputees Classification of Hand Gestures using Surface Electromyography Signals For Upper-Limb Amputees Gregory Luppescu Stanford University Michael Lowney Stanford Univeristy Raj Shah Stanford University I. ITRODUCTIO

More information

Tiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane

Tiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane Tiling Problems This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane The undecidable problems we saw at the start of our unit

More information

THE EXO-200 experiment searches for double beta decay

THE EXO-200 experiment searches for double beta decay CS 229 FINAL PROJECT, AUTUMN 2012 1 Classification of Induction Signals for the EXO-200 Double Beta Decay Experiment Jason Chaves, Physics, Stanford University Kevin Shin, Computer Science, Stanford University

More information

DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition. ECE 289G: Paper Presentation #3 Philipp Gysel

DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition. ECE 289G: Paper Presentation #3 Philipp Gysel DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition ECE 289G: Paper Presentation #3 Philipp Gysel Autonomous Car ECE 289G Paper Presentation, Philipp Gysel Slide 2 Source: maps.google.com

More information

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION Scott Deeann Chen and Pierre Moulin University of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering 5 North Mathews

More information

Dynamic Programming. Objective

Dynamic Programming. Objective Dynamic Programming Richard de Neufville Professor of Engineering Systems and of Civil and Environmental Engineering MIT Massachusetts Institute of Technology Dynamic Programming Slide 1 of 35 Objective

More information

Diversity Gain Region for MIMO Fading Multiple Access Channels

Diversity Gain Region for MIMO Fading Multiple Access Channels Diversity Gain Region for MIMO Fading Multiple Access Channels Lihua Weng, Sandeep Pradhan and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor,

More information

Empirical Assessment of Classification Accuracy of Local SVM

Empirical Assessment of Classification Accuracy of Local SVM Empirical Assessment of Classification Accuracy of Local SVM Nicola Segata Enrico Blanzieri Department of Engineering and Computer Science (DISI) University of Trento, Italy. segata@disi.unitn.it 18th

More information

Notes for Recitation 3

Notes for Recitation 3 6.042/18.062J Mathematics for Computer Science September 17, 2010 Tom Leighton, Marten van Dijk Notes for Recitation 3 1 State Machines Recall from Lecture 3 (9/16) that an invariant is a property of a

More information

Automatic Speech Recognition (CS753)

Automatic Speech Recognition (CS753) Automatic Speech Recognition (CS753) Lecture 9: Brief Introduction to Neural Networks Instructor: Preethi Jyothi Feb 2, 2017 Final Project Landscape Tabla bol transcription Music Genre Classification Audio

More information

CSE 258 Winter 2017 Assigment 2 Skill Rating Prediction on Online Video Game

CSE 258 Winter 2017 Assigment 2 Skill Rating Prediction on Online Video Game ABSTRACT CSE 258 Winter 2017 Assigment 2 Skill Rating Prediction on Online Video Game In competitive online video game communities, it s common to find players complaining about getting skill rating lower

More information

Deep Learning for Autonomous Driving

Deep Learning for Autonomous Driving Deep Learning for Autonomous Driving Shai Shalev-Shwartz Mobileye IMVC dimension, March, 2016 S. Shalev-Shwartz is also affiliated with The Hebrew University Shai Shalev-Shwartz (MobilEye) DL for Autonomous

More information

Wheel Defect Detection With Machine Learning

Wheel Defect Detection With Machine Learning 1 Wheel Defect Detection With Machine Learning Gabriel Krummenacher, Cheng Soon Ong, Stefan Koller, Seijin Kobayashi Joachim M. Buhmann, Senior Member, IEEE Abstract Wheel defects on railway wagons have

More information

Adversarial Search and Game- Playing C H A P T E R 6 C M P T : S P R I N G H A S S A N K H O S R A V I

Adversarial Search and Game- Playing C H A P T E R 6 C M P T : S P R I N G H A S S A N K H O S R A V I Adversarial Search and Game- Playing C H A P T E R 6 C M P T 3 1 0 : S P R I N G 2 0 1 1 H A S S A N K H O S R A V I Adversarial Search Examine the problems that arise when we try to plan ahead in a world

More information

Training a Minesweeper Solver

Training a Minesweeper Solver Training a Minesweeper Solver Luis Gardea, Griffin Koontz, Ryan Silva CS 229, Autumn 25 Abstract Minesweeper, a puzzle game introduced in the 96 s, requires spatial awareness and an ability to work with

More information

Graph-of-word and TW-IDF: New Approach to Ad Hoc IR (CIKM 2013) Learning to Rank: From Pairwise Approach to Listwise Approach (ICML 2007)

Graph-of-word and TW-IDF: New Approach to Ad Hoc IR (CIKM 2013) Learning to Rank: From Pairwise Approach to Listwise Approach (ICML 2007) Graph-of-word and TW-IDF: New Approach to Ad Hoc IR (CIKM 2013) Learning to Rank: From Pairwise Approach to Listwise Approach (ICML 2007) Qin Huazheng 2014/10/15 Graph-of-word and TW-IDF: New Approach

More information

On-site Traffic Accident Detection with Both Social Media and Traffic Data

On-site Traffic Accident Detection with Both Social Media and Traffic Data On-site Traffic Accident Detection with Both Social Media and Traffic Data Zhenhua Zhang Civil, Structural and Environmental Engineering University at Buffalo, The State University of New York, Buffalo,

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Modulation Classification of Satellite Communication Signals Using Cumulants and Neural Networks

Modulation Classification of Satellite Communication Signals Using Cumulants and Neural Networks Modulation Classification of Satellite Communication Signals Using Cumulants and Neural Networks Presented By: Aaron Smith Authors: Aaron Smith, Mike Evans, and Joseph Downey 1 Automatic Modulation Classification

More information

CandyCrush.ai: An AI Agent for Candy Crush

CandyCrush.ai: An AI Agent for Candy Crush CandyCrush.ai: An AI Agent for Candy Crush Jiwoo Lee, Niranjan Balachandar, Karan Singhal December 16, 2016 1 Introduction Candy Crush, a mobile puzzle game, has become very popular in the past few years.

More information

AVA: A Large-Scale Database for Aesthetic Visual Analysis

AVA: A Large-Scale Database for Aesthetic Visual Analysis 1 AVA: A Large-Scale Database for Aesthetic Visual Analysis Wei-Ta Chu National Chung Cheng University N. Murray, L. Marchesotti, and F. Perronnin, AVA: A Large-Scale Database for Aesthetic Visual Analysis,

More information

Here function f can be a linear or complex nonlinear. Filter. Noise Signal. Windowing IDFT. bank

Here function f can be a linear or complex nonlinear. Filter. Noise Signal. Windowing IDFT. bank Low Power DSP with wireless monitoring for civil constructions V. Kumar *1, J. Yan 1, X. Xu 1, Y. Qian 1 and K. Soga 1 1 University of Cambridge, Cambridge, UK * vk318@cam.ac.uk ABSTRACT Noise arising

More information

CS229: Machine Learning

CS229: Machine Learning CS229: Machine Learning Event Identification in Continues Seismic Data Please print out, fill in and include this cover sheet as the first page of your submission. We strongly recommend that you use this

More information

Study Impact of Architectural Style and Partial View on Landmark Recognition

Study Impact of Architectural Style and Partial View on Landmark Recognition Study Impact of Architectural Style and Partial View on Landmark Recognition Ying Chen smileyc@stanford.edu 1. Introduction Landmark recognition in image processing is one of the important object recognition

More information

Association Rule Mining. Entscheidungsunterstützungssysteme SS 18

Association Rule Mining. Entscheidungsunterstützungssysteme SS 18 Association Rule Mining Entscheidungsunterstützungssysteme SS 18 Frequent Pattern Analysis Frequent pattern: a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data

More information

Application of Multi Layer Perceptron (MLP) for Shower Size Prediction

Application of Multi Layer Perceptron (MLP) for Shower Size Prediction Chapter 3 Application of Multi Layer Perceptron (MLP) for Shower Size Prediction 3.1 Basic considerations of the ANN Artificial Neural Network (ANN)s are non- parametric prediction tools that can be used

More information

Multivariate Regression Algorithm for ID Pit Sizing

Multivariate Regression Algorithm for ID Pit Sizing IV Conferencia Panamericana de END Buenos Aires Octubre 2007 Abstract Multivariate Regression Algorithm for ID Pit Sizing Kenji Krzywosz EPRI NDE Center 1300 West WT Harris Blvd. Charlotte, NC 28262 USA

More information

SORTING BY REVERSALS. based on chapter 7 of Setubal, Meidanis: Introduction to Computational molecular biology

SORTING BY REVERSALS. based on chapter 7 of Setubal, Meidanis: Introduction to Computational molecular biology SORTING BY REVERSALS based on chapter 7 of Setubal, Meidanis: Introduction to Computational molecular biology Motivation When comparing genomes across species insertions, deletions and substitutions of

More information

RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES

RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES ABSTRACT S. A. A. H. Samaraweera 1 and B. Mayurathan 2 1 Department of Computer Science, University of Jaffna, Sri Lanka anuash119@gmail.com

More information

An Improved Voice Activity Detection Based on Deep Belief Networks

An Improved Voice Activity Detection Based on Deep Belief Networks e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 676-683 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com An Improved Voice Activity Detection Based on Deep Belief Networks Shabeeba T. K.

More information

RF channel characterization for cognitive radio using support vector machines

RF channel characterization for cognitive radio using support vector machines University of New Mexico UNM Digital Repository Electrical and Computer Engineering ETDs Engineering ETDs 2-9-2010 RF channel characterization for cognitive radio using support vector machines Thomas Atwood

More information

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1. EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due on Tuesday, October 6, 2009, in class. You may turn the project report in early. Late projects are accepted

More information

Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels

Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Lizhong Zheng and David Tse Department of EECS, U.C. Berkeley Feb 26, 2002 MSRI Information Theory Workshop Wireless Fading Channels

More information

Radio Deep Learning Efforts Showcase Presentation

Radio Deep Learning Efforts Showcase Presentation Radio Deep Learning Efforts Showcase Presentation November 2016 hume@vt.edu www.hume.vt.edu Tim O Shea Senior Research Associate Program Overview Program Objective: Rethink fundamental approaches to how

More information

Dynamic Programming. Objective

Dynamic Programming. Objective Dynamic Programming Richard de Neufville Professor of Engineering Systems and of Civil and Environmental Engineering MIT Massachusetts Institute of Technology Dynamic Programming Slide 1 of 43 Objective

More information

Biologically Inspired Computation

Biologically Inspired Computation Biologically Inspired Computation Deep Learning & Convolutional Neural Networks Joe Marino biologically inspired computation biological intelligence flexible capable of detecting/ executing/reasoning about

More information

Domination Rationalizability Correlated Equilibrium Computing CE Computational problems in domination. Game Theory Week 3. Kevin Leyton-Brown

Domination Rationalizability Correlated Equilibrium Computing CE Computational problems in domination. Game Theory Week 3. Kevin Leyton-Brown Game Theory Week 3 Kevin Leyton-Brown Game Theory Week 3 Kevin Leyton-Brown, Slide 1 Lecture Overview 1 Domination 2 Rationalizability 3 Correlated Equilibrium 4 Computing CE 5 Computational problems in

More information

Easy to Win, Hard to Master:

Easy to Win, Hard to Master: Easy to Win, Hard to Master: Optimal Strategies in Parity Games with Costs Joint work with Martin Zimmermann Alexander Weinert Saarland University December 13th, 216 MFV Seminar, ULB, Brussels, Belgium

More information

Bandwidth Scaling in Ultra Wideband Communication 1

Bandwidth Scaling in Ultra Wideband Communication 1 Bandwidth Scaling in Ultra Wideband Communication 1 Dana Porrat dporrat@wireless.stanford.edu David Tse dtse@eecs.berkeley.edu Department of Electrical Engineering and Computer Sciences University of California,

More information

Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine

Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Journal of Clean Energy Technologies, Vol. 4, No. 3, May 2016 Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Hanim Ismail, Zuhaina Zakaria, and Noraliza Hamzah

More information

Recommender systems and the Netflix prize. Charles Elkan. January 14, 2011

Recommender systems and the Netflix prize. Charles Elkan. January 14, 2011 Recommender systems and the Netflix prize Charles Elkan January 14, 2011 Solving the World's Problems Creatively Recommender systems We Know What You Ought To Be Watching This Summer We re quite curious,

More information

Embeddings Learned by Gradient Descent

Embeddings Learned by Gradient Descent Embeddings Learned by Gradient Descent Hinrich Schütze Center for Information and Language Processing, LMU Munich 2017-07-20 Schütze (LMU Munich): Embeddings via gradient descent 1 / 46 Overview 1 word2vec

More information

Game-Playing & Adversarial Search

Game-Playing & Adversarial Search Game-Playing & Adversarial Search This lecture topic: Game-Playing & Adversarial Search (two lectures) Chapter 5.1-5.5 Next lecture topic: Constraint Satisfaction Problems (two lectures) Chapter 6.1-6.4,

More information

Exam 2 Review Sheet. r(t) = x(t), y(t), z(t)

Exam 2 Review Sheet. r(t) = x(t), y(t), z(t) Exam 2 Review Sheet Joseph Breen Particle Motion Recall that a parametric curve given by: r(t) = x(t), y(t), z(t) can be interpreted as the position of a particle. Then the derivative represents the particle

More information

Generating an appropriate sound for a video using WaveNet.

Generating an appropriate sound for a video using WaveNet. Australian National University College of Engineering and Computer Science Master of Computing Generating an appropriate sound for a video using WaveNet. COMP 8715 Individual Computing Project Taku Ueki

More information

Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness

Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness March 1, 2011 Summary: We introduce the notion of a (weakly) dominant strategy: one which is always a best response, no matter what

More information