153,992 research outputs found

    A study on model selection of binary and non-Gaussian factor analysis.

    Get PDF
    An, Yujia.Thesis (M.Phil.)--Chinese University of Hong Kong, 2005.Includes bibliographical references (leaves 71-76).Abstracts in English and Chinese.Abstract --- p.iiAcknowledgement --- p.ivChapter 1 --- Introduction --- p.1Chapter 1.1 --- Background --- p.1Chapter 1.1.1 --- Review on BFA --- p.2Chapter 1.1.2 --- Review on NFA --- p.3Chapter 1.1.3 --- Typical model selection criteria --- p.5Chapter 1.1.4 --- New model selection criterion and automatic model selection --- p.6Chapter 1.2 --- Our contributions --- p.7Chapter 1.3 --- Thesis outline --- p.8Chapter 2 --- Combination of B and BI architectures for BFA with automatic model selection --- p.10Chapter 2.1 --- Implementation of BFA using BYY harmony learning with au- tomatic model selection --- p.11Chapter 2.1.1 --- Basic issues of BFA --- p.11Chapter 2.1.2 --- B-architecture for BFA with automatic model selection . --- p.12Chapter 2.1.3 --- BI-architecture for BFA with automatic model selection . --- p.14Chapter 2.2 --- Local minima in B-architecture and BI-architecture --- p.16Chapter 2.2.1 --- Local minima in B-architecture --- p.16Chapter 2.2.2 --- One unstable result in BI-architecture --- p.21Chapter 2.3 --- Combination of B- and BI-architecture for BFA with automatic model selection --- p.23Chapter 2.3.1 --- Combine B-architecture and BI-architecture --- p.23Chapter 2.3.2 --- Limitations of BI-architecture --- p.24Chapter 2.4 --- Experiments --- p.25Chapter 2.4.1 --- Frequency of local minima occurring in B-architecture --- p.25Chapter 2.4.2 --- Performance comparison for several methods in B-architecture --- p.26Chapter 2.4.3 --- Comparison of local minima in B-architecture and BI- architecture --- p.26Chapter 2.4.4 --- Frequency of unstable cases occurring in BI-architecture --- p.27Chapter 2.4.5 --- Comparison of performance of three strategies --- p.27Chapter 2.4.6 --- Limitations of BI-architecture --- p.28Chapter 2.5 --- Summary --- p.29Chapter 3 --- A Comparative Investigation on Model Selection in Binary Factor Analysis --- p.31Chapter 3.1 --- Binary Factor Analysis and ML Learning --- p.32Chapter 3.2 --- Hidden Factors Number Determination --- p.33Chapter 3.2.1 --- Using Typical Model Selection Criteria --- p.33Chapter 3.2.2 --- Using BYY harmony Learning --- p.34Chapter 3.3 --- Empirical Comparative Studies --- p.36Chapter 3.3.1 --- Effects of Sample Size --- p.37Chapter 3.3.2 --- Effects of Data Dimension --- p.37Chapter 3.3.3 --- Effects of Noise Variance --- p.39Chapter 3.3.4 --- Effects of hidden factor number --- p.43Chapter 3.3.5 --- Computing Costs --- p.43Chapter 3.4 --- Summary --- p.46Chapter 4 --- A Comparative Investigation on Model Selection in Non-gaussian Factor Analysis --- p.47Chapter 4.1 --- Non-Gaussian Factor Analysis and ML Learning --- p.48Chapter 4.2 --- Hidden Factor Determination --- p.51Chapter 4.2.1 --- Using typical model selection criteria --- p.51Chapter 4.2.2 --- BYY harmony Learning --- p.52Chapter 4.3 --- Empirical Comparative Studies --- p.55Chapter 4.3.1 --- Effects of Sample Size on Model Selection Criteria --- p.56Chapter 4.3.2 --- Effects of Data Dimension on Model Selection Criteria --- p.60Chapter 4.3.3 --- Effects of Noise Variance on Model Selection Criteria --- p.64Chapter 4.3.4 --- Discussion on Computational Cost --- p.64Chapter 4.4 --- Summary --- p.68Chapter 5 --- Conclusions --- p.69Bibliography --- p.7

    Structure Selection of Polynomial NARX Models using Two Dimensional (2D) Particle Swarms

    Full text link
    The present study applies a novel two-dimensional learning framework (2D-UPSO) based on particle swarms for structure selection of polynomial nonlinear auto-regressive with exogenous inputs (NARX) models. This learning approach explicitly incorporates the information about the cardinality (i.e., the number of terms) into the structure selection process. Initially, the effectiveness of the proposed approach was compared against the classical genetic algorithm (GA) based approach and it was demonstrated that the 2D-UPSO is superior. Further, since the performance of any meta-heuristic search algorithm is critically dependent on the choice of the fitness function, the efficacy of the proposed approach was investigated using two distinct information theoretic criteria such as Akaike and Bayesian information criterion. The robustness of this approach against various levels of measurement noise is also studied. Simulation results on various nonlinear systems demonstrate that the proposed algorithm could accurately determine the structure of the polynomial NARX model even under the influence of measurement noise

    Intelligent Financial Fraud Detection Practices: An Investigation

    Full text link
    Financial fraud is an issue with far reaching consequences in the finance industry, government, corporate sectors, and for ordinary consumers. Increasing dependence on new technologies such as cloud and mobile computing in recent years has compounded the problem. Traditional methods of detection involve extensive use of auditing, where a trained individual manually observes reports or transactions in an attempt to discover fraudulent behaviour. This method is not only time consuming, expensive and inaccurate, but in the age of big data it is also impractical. Not surprisingly, financial institutions have turned to automated processes using statistical and computational methods. This paper presents a comprehensive investigation on financial fraud detection practices using such data mining methods, with a particular focus on computational intelligence-based techniques. Classification of the practices based on key aspects such as detection algorithm used, fraud type investigated, and success rate have been covered. Issues and challenges associated with the current practices and potential future direction of research have also been identified.Comment: Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014

    Optimizing feature extraction in image analysis using experimented designs, a case study evaluating texture algorithms for describing appearance retention in carpets

    Get PDF
    When performing image analysis, one of the most critical steps is the selection of appropriate techniques. A huge amount of features can be extracted from several techniques and the selection is commonly performed based on expert knowledge. In this paper we present the theory of experimental designs as a tool for an objective selection of techniques in image analysis domain. We present a study case for evaluating appearance retention in textile floor coverings using texture features. The use of experimental design theory permitted to select an optimal set of techniques for describing the texture changes due to degradation

    A comparative study of the function of heterospecific vocal mimicry in European passerines

    Get PDF
    Although heterospecific vocal imitation is well documented in passerines, the evolutionary correlates of this phenomenon are poorly known. Here, we studied interspecific variation in vocal mimicry in a comparative study of 241 European songbirds. We tested whether vocal mimicry is a mode of repertoire acquisition or whether it resulted from imperfect song learning. We also investigated the effect of the degree of contact with the vocal environment (with species having larger ranges, abundance, or being long lived having a higher degree of mimicry) and a possible link with cognitive capacity (an overall larger brain in species with mimicry). Finally, we determined the potential evolutionary role of vocal mimicry in different interspecific contexts, predicting that mimicry may affect the intensity of brood parasitism, predation, or degree of hybridization. While controlling for research effort and phylogenetic relationships among taxa, we found that effect sizes for intersong interval, brain size, breeding dispersal, abundance, age-dependent expression of repertoires, and predation risk reached a level that may indicate evolutionary importance. Vocal mimicry seems to be a consequence of song continuity rather than song complexity, may partially have some cognitive component but may also be dependent on the vocal environment, and may attract the attention of predators. However, estimates of sexual selection and interspecific contacts due to brood parasitism and hybridization varied independently of vocal mimicry. Therefore, mimicry may have no function in female choice for complex songs and may be weakly selected via interspecific associations. These findings provide little evidence for vocal mimicry having evolved to serve important functions in most birds

    Selection bias in dynamically-measured super-massive black hole samples: consequences for pulsar timing arrays

    Full text link
    Supermassive black hole -- host galaxy relations are key to the computation of the expected gravitational wave background (GWB) in the pulsar timing array (PTA) frequency band. It has been recently pointed out that standard relations adopted in GWB computations are in fact biased-high. We show that when this selection bias is taken into account, the expected GWB in the PTA band is a factor of about three smaller than previously estimated. Compared to other scaling relations recently published in the literature, the median amplitude of the signal at f=1f=1yr1^{-1} drops from 1.3×10151.3\times10^{-15} to 4×10164\times10^{-16}. Although this solves any potential tension between theoretical predictions and recent PTA limits without invoking other dynamical effects (such as stalling, eccentricity or strong coupling with the galactic environment), it also makes the GWB detection more challenging.Comment: 6 pages 4 figures, submitted to MNRAS letter

    The Determinants of Intrafirm Trade: Evidence from French Firms

    Get PDF
    How well does the theory of the firm explain the choice between intrafirm and arms' length trade? This paper uses firm-level import data from France to look into this question. We find support for three key predictions of property-rights theories of the multinational firm. Intrafirm imports are more likely: (i) in capital- and skill-intensive firms; (ii) in highly productive firms; (iii) from countries with well-functioning judicial institutions. We further bridge previous aggregate findings with our investigation by decomposing intrafirm imports into an extensive and intensive margin. Doing so we uncover interesting patterns in the data that require further theoretical investigation.intrafirm trade, outsourcing, firm heterogeneity, incomplete contracts, internationalization strategies, quality of institutions, extensive margin, intensive margin

    Neural Network and Bioinformatic Methods for Predicting HIV-1 Protease Inhibitor Resistance

    Full text link
    This article presents a new method for predicting viral resistance to seven protease inhibitors from the HIV-1 genotype, and for identifying the positions in the protease gene at which the specific nature of the mutation affects resistance. The neural network Analog ARTMAP predicts protease inhibitor resistance from viral genotypes. A feature selection method detects genetic positions that contribute to resistance both alone and through interactions with other positions. This method has identified positions 35, 37, 62, and 77, where traditional feature selection methods have not detected a contribution to resistance. At several positions in the protease gene, mutations confer differing degress of resistance, depending on the specific amino acid to which the sequence has mutated. To find these positions, an Amino Acid Space is introduced to represent genes in a vector space that captures the functional similarity between amino acid pairs. Feature selection identifies several new positions, including 36, 37, and 43, with amino acid-specific contributions to resistance. Analog ARTMAP networks applied to inputs that represent specific amino acids at these positions perform better than networks that use only mutation locations.Air Force Office of Scientific Research (F49620-01-1-0423); National Geospatial-Intelligence Agency (NMA 201-01-1-2016); National Science Foundation (SBE-0354378); Office of Naval Research (N00014-01-1-0624
    corecore