SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
“To Explain or To Predict”
“To Know or To Act”
(Pure Science vs. Engineering, 2004)

            Using Target-Based Bayesian Nets for Suspects
           Monitoring (joint work with A. Gruber and S. Yanovski)



                        Irad Ben-Gal
                     Tel Aviv University
DOE: Vs-optimal designs Ginsburg & Ben-Gal (2004)
       x (control)                     f(x)    Y (output)

          f(x) known: f(x)/x=0  x*
          f(x) unknown:
          Estimate g(x) (Meta Model: DOE, RSM,…)
                g(x)/x=0  x* (R.V.)
          ‘Scientists’ (to Know): Best estimation of f(x)
              min V() (e.g., D-optimal exp.)
          ‘Practitioner’ (to act) : Best estimation of x*
             min V(x*) (new DOE optimality criterion)
Tel Aviv University
Department of Industrial Engineering
The Bias-Variance Tradeoff




Tel Aviv University
Department of Industrial Engineering
Presentation Layout
       Bayesian networks and classifiers

       Targeted Bayesian Network Learning (TBNL) (with Gruber)

       TBNL application on suspects monitoring

       Summary




Tel Aviv University
Department of Industrial Engineering
                                       4/35
Bayesian Networks (Pearl, 85)




Tel Aviv University
Department of Industrial Engineering
What is a Bayesian Network?
                                                                                          Joint Probability
  B ( G , Θ ) encodes the domain’s JPD                                                      Distribution
                                                                                    X1      X2   X3   X4   Prob.
                                                                                    1        1   1    2    0.083
  G  V , E  = Directed Acyclic Graph                                              1        1   2    2    0.167
                                                                                    1        2   2    3    0.25
                                                                                    2        2   1    1    0.25
                                                                                    2        2   2    1    0.25

                                                                                                                   Θ(X 3)
                                                                                                              X2   1      2

                                                                                                              1    0.33   0.33

                                                                                                              2    0.67   0.67



                                                                    A Complete
          Factorization                                           Bayesian Network

      P (X )  P ( X 2 )P ( X 3 | X 2 )P ( X   4
                                                   | X 3, X 2 )P( X 1 | X 4, X 3, X 2 )




Tel Aviv University
Department of Industrial Engineering
                                                          6/35
Explain or Predict (classify)

                                         Chow & Liu (1968)                                     TBNL
      Tree / GBN
                                         Williamson (2000)                        Gruber & Ben-Gal (2010)
                                                  p(X )                                            p(X )
      True distribution
                                                  q(X )                                           q(X )
      Modeled distribution
                                                  p(X )                           pX                  p  X i | x ' p x '
      Objective                                                                         i
                                                                                             x ' X  X   i




      Principle                        Minimize   D KL  p  X  || q  X     Minimize        D KL  p  X            i
                                                                                                                             || q  X i  

                                                                                Maximize            I X i; Z i 
                                       Maximize  I  X      i
                                                                 ;Zi   
      Consequence                                                               Maximize  I  X                                   
                                                    i
                                                                                                                    j
                                                                                                                        ;Z     j
                                                                                                  X jZ i




Tel Aviv University
Department of Industrial Engineering
                                                    11/35
Unconstrained Learning
                                       Assume X is the target variable
                                                   3




                     GBN (adding-arrows)                           Target-Oriented (TBNL)




                           i=1          i=4                              i=3    i=4    i=1




                                              Equivalent Encoding!!!


Tel Aviv University
Department of Industrial Engineering
                                                       13/35
Constrained Learning
                                       Assume X is the target variable
                                                3




                     GBN (adding-arrows)                          Target-Oriented (TBNL)




                           i=1    i=4                                    i=3   i=4   i=1




Tel Aviv University
Department of Industrial Engineering
                                                    14/35
Differential Complexity

                                               Explain




                                                                     Predict (Classify)


                                       
                                           r
                                                         
                                                             t




 𝜂 𝑡 = maximum percentage relative information exploitation about the target

 𝜂 𝑟 = maximum percentage relative information exploitation about the rest attributes



Tel Aviv University
Department of Industrial Engineering
Results (1/2)
                           Data Sets Properties and Testing Methods

            Dataset       # Attributes # Classes # Instances   Test      Instances/Attributes Ratio
             australian         14        2          690        CV5                 ~49

              breast             9        2          683        CV5                 ~76

              chess             36        2         3196       holdout              ~89

               cleve            11        2          196        CV5                 ~18

               corral            6        2          128        CV5                 ~21

                crx             15        2          653        CV5                 ~44

              german            20        2         1000        CV5                 ~50

               glass             9        7          214        CV5                 ~24

                Iris             5        3          150        CV5                 ~30

           lymphography         18        4          148        CV5                  ~8

            mofn-3-7-10         10        2         1324       holdout              ~132

               vote             16        3          435        CV5                 ~27




Tel Aviv University
Department of Industrial Engineering
                                                 16/35
Naïve Bayes: Predict
                                             Corral Dataset



                                                   Class




                            A0
                                            B0                             Correlated
                                                              Irrelevant
                                       A1                B1




Tel Aviv University
Department of Industrial Engineering
                                                 17/35
Tree Augmented Network (TAN)
                                                                                                                        Class
                               Class                                 Class



                                                                                               Correlated

                                                                           Irrelevant
                                       B0

                                                                                                            Irrelevant

                                                                A0                Correlated
                          A1                 A0
                                                                                                                         A0


                                                      B0


                  B1                    Irrelevant                                                                       B0


                                                      A1

                                                                                                                                           A1
               Correlated

                                                                                   B1

                                                                                                                                                B1
                     Class                                Class


                                                                                                           Class

                                                     B1


                               A0
                                                                                                      A1

                                                     A1



                                                                                                 B0                B1
                  Irrelevant            B0
                                                           B0



                                                                                                 A0
                                                           A0
             Correlated                 A1

                                                                                                                        Irrelevant
                                                                     Irrelevant



                B1
                                                                                                                              Correlated
                                                                          Correlated




Tel Aviv University
Department of Industrial Engineering
                                                           18/35
Managing the Trade-off
                                       CV5



                                                 CV5




                                                       Holdout
                                                       2/3:1/3




Tel Aviv University
Department of Industrial Engineering
                                         20/35
Results (2/2)
                                                  Accuracy

              Dataset           TBNL     BNC-2P     NB           TAN        C4.5         HGC
              australian         83.3     87.0      85.1         82.5       84.9         85.6

               breast            95.9     95.8      97.6         96.5       93.9         97.6
                chess            96.9     95.8      87.3         92.4       99.5         95.3
                cleve            81.4     80.0      82.1         78.4       79.4         78.7
                corral           100.0    98.8      87.2         98.6       98.5         100.0
                 crx             86.4     84.2      85.0         83.7       86.1         86.9
               german            69.7     73.6      75.4         73.9       72.9         72.5
                glass            60.0     58.3      55.9         54.2       59.3         31.2
                 Iris            97.0     95.8      93.0         92.4       96.0         95.7
            lymphography         81.8     83.7      83.4         82.2       78.4         63.8
             mofn-3-7-10         100.0    91.4      86.7         91.5       84.0         86.7
                vote             96.0     95.8      90.1         94.9       94.7         95.4
               Average           87.4     86.7      84.1         85.1       85.6         82.4
                StdE              4%       3%        3%           4%        3%            6%


  Best & worst methods (incl. 5% runner up) in Bold & Italic respectively    Paired t-tests show significance

Tel Aviv University
Department of Industrial Engineering
                                                   21/35
Presentation Layout

       Bayesian networks and classifiers

       Targeted Bayesian Network Learning (TBNL)

       TBNL application on suspects monitoring (w. Gruber & Yanovski)

       Summary




Tel Aviv University
Department of Industrial Engineering
                                       22/35
Domain Description
      Motivation
          Simplicity: complexity-error tradeoff
          Information extraction: utilization of meta-data
          Support: help the expert understand

      Available Data
          CDR
          Privatized
          Laundered


      Requirements
          50% Recall with 1% False Alarm at most


Tel Aviv University
Department of Industrial Engineering
                                        23/35
Data Description of the Domain
                                        Call Detail Record (CDR)
              Field                                             Description

      Main party              Monitored Object unique IDENTIFIER
      Other party             Other Party unique IDENTIFIER
      year                    Year of call start
      month                   Month of call start
      day                     Day of call start
      hour                    Hour of call start
      minute                  Minute of call start
      second                  Second of call start
      duration                Call duration in Seconds
      caller                  Indication of call initiator : {1/0}
                              1 – main party initiated the call
                              0 – other party initiated the call
      type_id                 Type of interaction initiator : {1/0}
                              1 - phone call
                              0 - sms (text message)
      tag                     Type (group) of monitored Object : {1/0}
                              0 – main party is a non-target
                              1 – main party is a target

Tel Aviv University
Department of Industrial Engineering
                                                      24/35
ROC curve


                                           40 suspects to no avail
                                          1900
                                          missed
                                          targets




Tel Aviv University
Department of Industrial Engineering
                                       27/35
Feature Extraction
                            Activity of calls during the day of two distinct groups




       Inter_prc_q1, Inter_prc_q2, Inter_prc_q3, Inter_prc_q4 – percentage of
       activities in 1st, 2nd, 3rd and 4th quarter of the day




Tel Aviv University
Department of Industrial Engineering
                                                    28/35
Learning & Mining Mobility Patterns
(PI’s: Ben-Gal, Toch and Lerner, 2012)
Conclusions
       “To Explain or to Predict” –
        “To know or to Act” (constraint modeling)

       Managing the error-complexity tradeoff!
       An “engineering approach” to modeling
            Target-based BN Learning (2006), Gruber and Ben-Gal (2010)…

            Vs-optimality criterion  min V(x*), Ginsburg and Ben-Gal (2006)

            VOBN Ben-Gal et at (2005) – scenario dependent

            More….


Tel Aviv University
Department of Industrial Engineering    32/35
Prediction can help…




Tel Aviv University
Department of Industrial Engineering

Mais conteúdo relacionado

Mais procurados

RSS discussion of Girolami and Calderhead, October 13, 2010
RSS discussion of Girolami and Calderhead, October 13, 2010RSS discussion of Girolami and Calderhead, October 13, 2010
RSS discussion of Girolami and Calderhead, October 13, 2010Christian Robert
 
Adaptive Signal and Image Processing
Adaptive Signal and Image ProcessingAdaptive Signal and Image Processing
Adaptive Signal and Image ProcessingGabriel Peyré
 
Mark Girolami's Read Paper 2010
Mark Girolami's Read Paper 2010Mark Girolami's Read Paper 2010
Mark Girolami's Read Paper 2010Christian Robert
 
Masters Thesis Defense
Masters Thesis DefenseMasters Thesis Defense
Masters Thesis Defensessj4mathgenius
 
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slides
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slidesCVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slides
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slideszukun
 
Hamilton-Jacobi approach for second order traffic flow models
Hamilton-Jacobi approach for second order traffic flow modelsHamilton-Jacobi approach for second order traffic flow models
Hamilton-Jacobi approach for second order traffic flow modelsGuillaume Costeseque
 
ABC: How Bayesian can it be?
ABC: How Bayesian can it be?ABC: How Bayesian can it be?
ABC: How Bayesian can it be?Christian Robert
 
ABC-Xian
ABC-XianABC-Xian
ABC-XianDeb Roy
 
MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...Dagmar Monett
 
Spacetime Meshing for Discontinuous Galerkin Methods
Spacetime Meshing for Discontinuous Galerkin MethodsSpacetime Meshing for Discontinuous Galerkin Methods
Spacetime Meshing for Discontinuous Galerkin Methodsshripadthite
 
CVPR2010: Advanced ITinCVPR in a Nutshell: part 5: Shape, Matching and Diverg...
CVPR2010: Advanced ITinCVPR in a Nutshell: part 5: Shape, Matching and Diverg...CVPR2010: Advanced ITinCVPR in a Nutshell: part 5: Shape, Matching and Diverg...
CVPR2010: Advanced ITinCVPR in a Nutshell: part 5: Shape, Matching and Diverg...zukun
 
A study of the worst case ratio of a simple algorithm for simple assembly lin...
A study of the worst case ratio of a simple algorithm for simple assembly lin...A study of the worst case ratio of a simple algorithm for simple assembly lin...
A study of the worst case ratio of a simple algorithm for simple assembly lin...narmo
 
Lecture1
Lecture1Lecture1
Lecture1rjaeh
 
Discussion of Faming Liang's talk
Discussion of Faming Liang's talkDiscussion of Faming Liang's talk
Discussion of Faming Liang's talkChristian Robert
 
2008 : A Case Study: How to Speed Up the Simplex Algorithms on Problems Minim...
2008 : A Case Study: How to Speed Up the Simplex Algorithms on Problems Minim...2008 : A Case Study: How to Speed Up the Simplex Algorithms on Problems Minim...
2008 : A Case Study: How to Speed Up the Simplex Algorithms on Problems Minim...jensenbo
 
Exact Computation of the Expectation Curves of the Bit-Flip Mutation using La...
Exact Computation of the Expectation Curves of the Bit-Flip Mutation using La...Exact Computation of the Expectation Curves of the Bit-Flip Mutation using La...
Exact Computation of the Expectation Curves of the Bit-Flip Mutation using La...jfrchicanog
 
Bayesian inversion of deterministic dynamic causal models
Bayesian inversion of deterministic dynamic causal modelsBayesian inversion of deterministic dynamic causal models
Bayesian inversion of deterministic dynamic causal modelskhbrodersen
 

Mais procurados (20)

RSS discussion of Girolami and Calderhead, October 13, 2010
RSS discussion of Girolami and Calderhead, October 13, 2010RSS discussion of Girolami and Calderhead, October 13, 2010
RSS discussion of Girolami and Calderhead, October 13, 2010
 
Adaptive Signal and Image Processing
Adaptive Signal and Image ProcessingAdaptive Signal and Image Processing
Adaptive Signal and Image Processing
 
Mark Girolami's Read Paper 2010
Mark Girolami's Read Paper 2010Mark Girolami's Read Paper 2010
Mark Girolami's Read Paper 2010
 
Em
EmEm
Em
 
Masters Thesis Defense
Masters Thesis DefenseMasters Thesis Defense
Masters Thesis Defense
 
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slides
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slidesCVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slides
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slides
 
Hamilton-Jacobi approach for second order traffic flow models
Hamilton-Jacobi approach for second order traffic flow modelsHamilton-Jacobi approach for second order traffic flow models
Hamilton-Jacobi approach for second order traffic flow models
 
ABC: How Bayesian can it be?
ABC: How Bayesian can it be?ABC: How Bayesian can it be?
ABC: How Bayesian can it be?
 
[Download] rev chapter-5-june26th
[Download] rev chapter-5-june26th[Download] rev chapter-5-june26th
[Download] rev chapter-5-june26th
 
ABC-Xian
ABC-XianABC-Xian
ABC-Xian
 
MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...MATHEON Center Days: Index determination and structural analysis using Algori...
MATHEON Center Days: Index determination and structural analysis using Algori...
 
Spacetime Meshing for Discontinuous Galerkin Methods
Spacetime Meshing for Discontinuous Galerkin MethodsSpacetime Meshing for Discontinuous Galerkin Methods
Spacetime Meshing for Discontinuous Galerkin Methods
 
Beck Workshop on Modelling and Simulation of Coal-fired Power Generation and ...
Beck Workshop on Modelling and Simulation of Coal-fired Power Generation and ...Beck Workshop on Modelling and Simulation of Coal-fired Power Generation and ...
Beck Workshop on Modelling and Simulation of Coal-fired Power Generation and ...
 
CVPR2010: Advanced ITinCVPR in a Nutshell: part 5: Shape, Matching and Diverg...
CVPR2010: Advanced ITinCVPR in a Nutshell: part 5: Shape, Matching and Diverg...CVPR2010: Advanced ITinCVPR in a Nutshell: part 5: Shape, Matching and Diverg...
CVPR2010: Advanced ITinCVPR in a Nutshell: part 5: Shape, Matching and Diverg...
 
A study of the worst case ratio of a simple algorithm for simple assembly lin...
A study of the worst case ratio of a simple algorithm for simple assembly lin...A study of the worst case ratio of a simple algorithm for simple assembly lin...
A study of the worst case ratio of a simple algorithm for simple assembly lin...
 
Lecture1
Lecture1Lecture1
Lecture1
 
Discussion of Faming Liang's talk
Discussion of Faming Liang's talkDiscussion of Faming Liang's talk
Discussion of Faming Liang's talk
 
2008 : A Case Study: How to Speed Up the Simplex Algorithms on Problems Minim...
2008 : A Case Study: How to Speed Up the Simplex Algorithms on Problems Minim...2008 : A Case Study: How to Speed Up the Simplex Algorithms on Problems Minim...
2008 : A Case Study: How to Speed Up the Simplex Algorithms on Problems Minim...
 
Exact Computation of the Expectation Curves of the Bit-Flip Mutation using La...
Exact Computation of the Expectation Curves of the Bit-Flip Mutation using La...Exact Computation of the Expectation Curves of the Bit-Flip Mutation using La...
Exact Computation of the Expectation Curves of the Bit-Flip Mutation using La...
 
Bayesian inversion of deterministic dynamic causal models
Bayesian inversion of deterministic dynamic causal modelsBayesian inversion of deterministic dynamic causal models
Bayesian inversion of deterministic dynamic causal models
 

Semelhante a Explaining the Bias-Variance Tradeoff in Target-Based Bayesian Network Learning

Robust Shape and Topology Optimization - Northwestern
Robust Shape and Topology Optimization - Northwestern Robust Shape and Topology Optimization - Northwestern
Robust Shape and Topology Optimization - Northwestern Altair
 
Engr 371 final exam april 2006
Engr 371 final exam april 2006Engr 371 final exam april 2006
Engr 371 final exam april 2006amnesiann
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Randomness conductors
Randomness conductorsRandomness conductors
Randomness conductorswtyru1989
 
TR tabling presentation_2010_09
TR tabling presentation_2010_09TR tabling presentation_2010_09
TR tabling presentation_2010_09Paul Fodor
 
Dsp U Lec07 Realization Of Discrete Time Systems
Dsp U   Lec07 Realization Of Discrete Time SystemsDsp U   Lec07 Realization Of Discrete Time Systems
Dsp U Lec07 Realization Of Discrete Time Systemstaha25
 
Prévision de consommation électrique avec adaptive GAM
Prévision de consommation électrique avec adaptive GAMPrévision de consommation électrique avec adaptive GAM
Prévision de consommation électrique avec adaptive GAMCdiscount
 
Johan Suykens: "Models from Data: a Unifying Picture"
Johan Suykens: "Models from Data: a Unifying Picture" Johan Suykens: "Models from Data: a Unifying Picture"
Johan Suykens: "Models from Data: a Unifying Picture" ieee_cis_cyprus
 
101 Tips for a Successful Automation Career Appendix F
101 Tips for a Successful Automation Career Appendix F101 Tips for a Successful Automation Career Appendix F
101 Tips for a Successful Automation Career Appendix FISA Interchange
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysisrik0
 
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...Beniamino Murgante
 
New Mathematical Tools for the Financial Sector
New Mathematical Tools for the Financial SectorNew Mathematical Tools for the Financial Sector
New Mathematical Tools for the Financial SectorSSA KPI
 
05 history of cv a machine learning (theory) perspective on computer vision
05  history of cv a machine learning (theory) perspective on computer vision05  history of cv a machine learning (theory) perspective on computer vision
05 history of cv a machine learning (theory) perspective on computer visionzukun
 
Lesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite IntegralsLesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite IntegralsMatthew Leingang
 
Lesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite IntegralsLesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite IntegralsMatthew Leingang
 
從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論岳華 杜
 
NIPS2010: optimization algorithms in machine learning
NIPS2010: optimization algorithms in machine learningNIPS2010: optimization algorithms in machine learning
NIPS2010: optimization algorithms in machine learningzukun
 
Scientific Computing with Python Webinar 9/18/2009:Curve Fitting
Scientific Computing with Python Webinar 9/18/2009:Curve FittingScientific Computing with Python Webinar 9/18/2009:Curve Fitting
Scientific Computing with Python Webinar 9/18/2009:Curve FittingEnthought, Inc.
 

Semelhante a Explaining the Bias-Variance Tradeoff in Target-Based Bayesian Network Learning (20)

Robust Shape and Topology Optimization - Northwestern
Robust Shape and Topology Optimization - Northwestern Robust Shape and Topology Optimization - Northwestern
Robust Shape and Topology Optimization - Northwestern
 
Engr 371 final exam april 2006
Engr 371 final exam april 2006Engr 371 final exam april 2006
Engr 371 final exam april 2006
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Randomness conductors
Randomness conductorsRandomness conductors
Randomness conductors
 
TR tabling presentation_2010_09
TR tabling presentation_2010_09TR tabling presentation_2010_09
TR tabling presentation_2010_09
 
Dsp U Lec07 Realization Of Discrete Time Systems
Dsp U   Lec07 Realization Of Discrete Time SystemsDsp U   Lec07 Realization Of Discrete Time Systems
Dsp U Lec07 Realization Of Discrete Time Systems
 
Prévision de consommation électrique avec adaptive GAM
Prévision de consommation électrique avec adaptive GAMPrévision de consommation électrique avec adaptive GAM
Prévision de consommation électrique avec adaptive GAM
 
Johan Suykens: "Models from Data: a Unifying Picture"
Johan Suykens: "Models from Data: a Unifying Picture" Johan Suykens: "Models from Data: a Unifying Picture"
Johan Suykens: "Models from Data: a Unifying Picture"
 
101 Tips for a Successful Automation Career Appendix F
101 Tips for a Successful Automation Career Appendix F101 Tips for a Successful Automation Career Appendix F
101 Tips for a Successful Automation Career Appendix F
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Lagrange
LagrangeLagrange
Lagrange
 
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...
 
New Mathematical Tools for the Financial Sector
New Mathematical Tools for the Financial SectorNew Mathematical Tools for the Financial Sector
New Mathematical Tools for the Financial Sector
 
05 history of cv a machine learning (theory) perspective on computer vision
05  history of cv a machine learning (theory) perspective on computer vision05  history of cv a machine learning (theory) perspective on computer vision
05 history of cv a machine learning (theory) perspective on computer vision
 
Lesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite IntegralsLesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite Integrals
 
Lesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite IntegralsLesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite Integrals
 
從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論
 
NIPS2010: optimization algorithms in machine learning
NIPS2010: optimization algorithms in machine learningNIPS2010: optimization algorithms in machine learning
NIPS2010: optimization algorithms in machine learning
 
Session 6
Session 6Session 6
Session 6
 
Scientific Computing with Python Webinar 9/18/2009:Curve Fitting
Scientific Computing with Python Webinar 9/18/2009:Curve FittingScientific Computing with Python Webinar 9/18/2009:Curve Fitting
Scientific Computing with Python Webinar 9/18/2009:Curve Fitting
 

Último

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Explaining the Bias-Variance Tradeoff in Target-Based Bayesian Network Learning

  • 1. “To Explain or To Predict” “To Know or To Act” (Pure Science vs. Engineering, 2004) Using Target-Based Bayesian Nets for Suspects Monitoring (joint work with A. Gruber and S. Yanovski) Irad Ben-Gal Tel Aviv University
  • 2. DOE: Vs-optimal designs Ginsburg & Ben-Gal (2004) x (control) f(x) Y (output)  f(x) known: f(x)/x=0  x*  f(x) unknown:  Estimate g(x) (Meta Model: DOE, RSM,…)   g(x)/x=0  x* (R.V.)  ‘Scientists’ (to Know): Best estimation of f(x)  min V() (e.g., D-optimal exp.)  ‘Practitioner’ (to act) : Best estimation of x*  min V(x*) (new DOE optimality criterion) Tel Aviv University Department of Industrial Engineering
  • 3. The Bias-Variance Tradeoff Tel Aviv University Department of Industrial Engineering
  • 4. Presentation Layout  Bayesian networks and classifiers  Targeted Bayesian Network Learning (TBNL) (with Gruber)  TBNL application on suspects monitoring  Summary Tel Aviv University Department of Industrial Engineering 4/35
  • 5. Bayesian Networks (Pearl, 85) Tel Aviv University Department of Industrial Engineering
  • 6. What is a Bayesian Network? Joint Probability B ( G , Θ ) encodes the domain’s JPD Distribution X1 X2 X3 X4 Prob. 1 1 1 2 0.083 G  V , E  = Directed Acyclic Graph 1 1 2 2 0.167 1 2 2 3 0.25 2 2 1 1 0.25 2 2 2 1 0.25 Θ(X 3) X2 1 2 1 0.33 0.33 2 0.67 0.67 A Complete Factorization Bayesian Network P (X )  P ( X 2 )P ( X 3 | X 2 )P ( X 4 | X 3, X 2 )P( X 1 | X 4, X 3, X 2 ) Tel Aviv University Department of Industrial Engineering 6/35
  • 7. Explain or Predict (classify) Chow & Liu (1968) TBNL Tree / GBN Williamson (2000) Gruber & Ben-Gal (2010) p(X ) p(X ) True distribution q(X ) q(X ) Modeled distribution p(X ) pX   p  X i | x ' p x ' Objective i x ' X X i Principle Minimize D KL  p  X  || q  X   Minimize D KL  p  X i  || q  X i   Maximize I X i; Z i  Maximize  I  X i ;Zi  Consequence Maximize  I  X  i j ;Z j X jZ i Tel Aviv University Department of Industrial Engineering 11/35
  • 8. Unconstrained Learning Assume X is the target variable 3 GBN (adding-arrows) Target-Oriented (TBNL) i=1 i=4 i=3 i=4 i=1 Equivalent Encoding!!! Tel Aviv University Department of Industrial Engineering 13/35
  • 9. Constrained Learning Assume X is the target variable 3 GBN (adding-arrows) Target-Oriented (TBNL) i=1 i=4 i=3 i=4 i=1 Tel Aviv University Department of Industrial Engineering 14/35
  • 10. Differential Complexity Explain Predict (Classify)  r  t 𝜂 𝑡 = maximum percentage relative information exploitation about the target 𝜂 𝑟 = maximum percentage relative information exploitation about the rest attributes Tel Aviv University Department of Industrial Engineering
  • 11. Results (1/2) Data Sets Properties and Testing Methods Dataset # Attributes # Classes # Instances Test Instances/Attributes Ratio australian 14 2 690 CV5 ~49 breast 9 2 683 CV5 ~76 chess 36 2 3196 holdout ~89 cleve 11 2 196 CV5 ~18 corral 6 2 128 CV5 ~21 crx 15 2 653 CV5 ~44 german 20 2 1000 CV5 ~50 glass 9 7 214 CV5 ~24 Iris 5 3 150 CV5 ~30 lymphography 18 4 148 CV5 ~8 mofn-3-7-10 10 2 1324 holdout ~132 vote 16 3 435 CV5 ~27 Tel Aviv University Department of Industrial Engineering 16/35
  • 12. Naïve Bayes: Predict Corral Dataset Class A0 B0 Correlated Irrelevant A1 B1 Tel Aviv University Department of Industrial Engineering 17/35
  • 13. Tree Augmented Network (TAN) Class Class Class Correlated Irrelevant B0 Irrelevant A0 Correlated A1 A0 A0 B0 B1 Irrelevant B0 A1 A1 Correlated B1 B1 Class Class Class B1 A0 A1 A1 B0 B1 Irrelevant B0 B0 A0 A0 Correlated A1 Irrelevant Irrelevant B1 Correlated Correlated Tel Aviv University Department of Industrial Engineering 18/35
  • 14. Managing the Trade-off CV5 CV5 Holdout 2/3:1/3 Tel Aviv University Department of Industrial Engineering 20/35
  • 15. Results (2/2) Accuracy Dataset TBNL BNC-2P NB TAN C4.5 HGC australian 83.3 87.0 85.1 82.5 84.9 85.6 breast 95.9 95.8 97.6 96.5 93.9 97.6 chess 96.9 95.8 87.3 92.4 99.5 95.3 cleve 81.4 80.0 82.1 78.4 79.4 78.7 corral 100.0 98.8 87.2 98.6 98.5 100.0 crx 86.4 84.2 85.0 83.7 86.1 86.9 german 69.7 73.6 75.4 73.9 72.9 72.5 glass 60.0 58.3 55.9 54.2 59.3 31.2 Iris 97.0 95.8 93.0 92.4 96.0 95.7 lymphography 81.8 83.7 83.4 82.2 78.4 63.8 mofn-3-7-10 100.0 91.4 86.7 91.5 84.0 86.7 vote 96.0 95.8 90.1 94.9 94.7 95.4 Average 87.4 86.7 84.1 85.1 85.6 82.4 StdE 4% 3% 3% 4% 3% 6% Best & worst methods (incl. 5% runner up) in Bold & Italic respectively Paired t-tests show significance Tel Aviv University Department of Industrial Engineering 21/35
  • 16. Presentation Layout  Bayesian networks and classifiers  Targeted Bayesian Network Learning (TBNL)  TBNL application on suspects monitoring (w. Gruber & Yanovski)  Summary Tel Aviv University Department of Industrial Engineering 22/35
  • 17. Domain Description  Motivation  Simplicity: complexity-error tradeoff  Information extraction: utilization of meta-data  Support: help the expert understand  Available Data  CDR  Privatized  Laundered  Requirements  50% Recall with 1% False Alarm at most Tel Aviv University Department of Industrial Engineering 23/35
  • 18. Data Description of the Domain Call Detail Record (CDR) Field Description Main party Monitored Object unique IDENTIFIER Other party Other Party unique IDENTIFIER year Year of call start month Month of call start day Day of call start hour Hour of call start minute Minute of call start second Second of call start duration Call duration in Seconds caller Indication of call initiator : {1/0} 1 – main party initiated the call 0 – other party initiated the call type_id Type of interaction initiator : {1/0} 1 - phone call 0 - sms (text message) tag Type (group) of monitored Object : {1/0} 0 – main party is a non-target 1 – main party is a target Tel Aviv University Department of Industrial Engineering 24/35
  • 19. ROC curve 40 suspects to no avail 1900 missed targets Tel Aviv University Department of Industrial Engineering 27/35
  • 20. Feature Extraction Activity of calls during the day of two distinct groups Inter_prc_q1, Inter_prc_q2, Inter_prc_q3, Inter_prc_q4 – percentage of activities in 1st, 2nd, 3rd and 4th quarter of the day Tel Aviv University Department of Industrial Engineering 28/35
  • 21. Learning & Mining Mobility Patterns (PI’s: Ben-Gal, Toch and Lerner, 2012)
  • 22. Conclusions  “To Explain or to Predict” – “To know or to Act” (constraint modeling)  Managing the error-complexity tradeoff!  An “engineering approach” to modeling  Target-based BN Learning (2006), Gruber and Ben-Gal (2010)…  Vs-optimality criterion  min V(x*), Ginsburg and Ben-Gal (2006)  VOBN Ben-Gal et at (2005) – scenario dependent  More…. Tel Aviv University Department of Industrial Engineering 32/35
  • 23. Prediction can help… Tel Aviv University Department of Industrial Engineering