Detection and Estimation Final Project Report: Modeling and the K-Sigma Algorithm for Radiation Detection

Size: px
Start display at page:

Download "Detection and Estimation Final Project Report: Modeling and the K-Sigma Algorithm for Radiation Detection"

Transcription

1 Detection and Estimation Final Project Report: Modeling and the K-Sigma Algorithm for Radiation Detection Sijie Xiong, Department of Electrical and Computer Engineering Rutgers, the State University of New Jersey Abstract In this paper, we examine simple yet insightful models and the K-Sigma algorithm which characterize the problem of radiation detection in sensor networks. Our goal is to detect dangerous radiation sources as soon as possible with a relatively low probability of false alarm and miss. Simulation results presented the tradeoff relationship between discrimination threshold, time to detect, probability of false alarm and sensor deployment strategies. I. INTRODUCTION Detecting dangerous radiation sources as well as many other chemical and biological threats is of primary concern to fight against terrorism and violence around the world. We aim to minimize the potential cost by detecting, localizing and neutralizing threats correctly and rapidly enough. A large body of detection algorithms and sensor deployment strategies has been developed to accomplish the goal in many detection scenarios. For example, at the entries and exits of train stations and airports, large portal styled sensors are placed to detect whether people are carrying dangerous materials. However, they are not practical to utilize in more general urban settings such as an open park, a trash can, a river and so on. In these cases, distributed sensor network (DSN) is preferred because of its flexibility in deployment. In this paper, we only consider a point radiation threat. In Section II, we examine the radiation detection problem in two simple models and analyze the tradeoff relationship between detectors performance and detection time. The K-Sigma algorithm will be presented in Section III. Finally, we make a brief summary and some prospective ideas. II. MODELS The detecting sensors record the number of photons striking the sensors. The source

2 radiating and the sensor recording process can both be modeled under poisson distribution. Poisson Distribution Let poisson(r,t,n) be the probability of n occurances in time interval t when the events are generated under a Poisson distribution with parameter r: A. A Single Sensor poisson(r, t, n) = (rt)n e rt n! We first analyze the case when there is only a point radiation source present and a sensor r meters away from the source. The radiation source generates photons at a rate of µ photons per unit time. The sensor detects photons at a rate decreasing as 1/ r 2 if there is no absorption in the air, and a multiplicative term e αr (α is the absorption rate per unit distance) should be added if absorption is present. Then the expected rate of photons detected at the sensor denoted by Λ is: Λ = Aµe αr r 2 where A is a constant depending exclusively on the type of detector. Given a time period T, the sensor records the number of photons striking the sensor as n. If n exceeds a predefined threshold B, then the system issues an alarm that a threat is detected, which is called a true positive. However, the background noises also produce photons at the sensor, let the rate be denoted as Γ, then if the number of photons detected from the background is no less than B, the system will also issue an alert, which is called a false positive. From the poisson distribution, we can compare two estimates of probabilities in the above scenario. Let pfp be the probability of a false positive when there is actually no source present, and ptp be the probability of a true positive when the source is present. We can write the following equations, pfp = ptp = n B n B poisson(γ, T,n) poisson(γ + Λ, T,n) If we fix Γ, Λ and T, then by varying the threshold B, we can plot ptp as a function of pfp, which is called the ROC (Receiver Operating Characteristic) curve. Figure 1 shows different ROC curves under different time intervals with two pair of Γ and Λ settings. Γ =8, Λ =2 for the left figure and Γ =8, Λ =32 for the right figure. It is easy to conclude that with increasing observing time T, the ROC curves converge to the left-top corner (lower probability of false alarm and higher probability of detection)

3 Fig. 1. ROC curves of the probability of detection versus false alarm. Fig. 2. ROC curves when background intensity is increased. the Area under ROC Curves (AUC) is increasing which indicates that the overall performance of the detection system is improved. In Figure 2, we set Γ =8, Λ =4 and Γ =16, Λ =4 for the two figures respectively. The result shows that increasing the background intensity Γ reduces the overall performance of the detection system since the ROC curves move toward the right-bottom corner. Tradeoff Relationship between Threshold B, True Positives, False Positives, Time and Distance Firstly, along a ROC curve, as B varies, the probabilities of false alarm and detection also change. We can examine the relationship between them by looking at the probability distributions of detection and false alarm. If the two distributions don t overlap, the presence of radiation source can be easily inferred without error. However, if they overlap, intuitively, the probabilities of detection and false alarm will both be 1 when B = 0 and both be 0 when B =. And if B falls in between, then ptp and pfp are the areas (Cumulative Distribution Function) under the detection and false alarm probability distribution exceeding B, respectively. Therefore, increasing B will result in

4 lower probability of false alarm as well as lower probability of detection. Secondly, we know that a Poisson distribution can be approximated with small probability of error by a normal distribution when the expected occurrences of events is 10 or more. Let σ source and σ null denote the standard deviations of the detected number of photons at a sensor when the radiation source is present and not present respectively. Then, σ source = (Γ + Λ)T σ null = ΓT Let bfp and bfn be the upper bounds on the probabilities of false positives and false negatives (no alarm when source is present), z FP and - z FN be the corresponding value in a standard normal distribution resulting in bfp and bfn. For instance, when bfp = bfn = 0.01, then z FP = 2.33 and - z FN = We can get, B ΓT z FP σ null (Γ + Λ)T B z FN σ source Our goal is to get lower probability of false alarm and miss. Let z = z FP = z FN, then, B ΓT = z σ null (Γ + Λ)T B = z σ source (Γ + Λ)T ΓT = z (σ null +σ source ) z = = ΛT σ null +σ source Λ T Γ + (Γ + Λ) Therefore, the higher z is the better the quality of ROC curves and overall performance of detection system. Now we ignore the absorption of photons in the air and substitute the equation Λ = Aµ / r 2 in the above result to get, when Λ Γ : z Λ T / 2 Γ when Aµ / Γ r 2 : z Aµ T / 2r 2 Γ when Λ Γ : z ΛT when Aµ / Γ r 2 : z AµT / r Consider the first case, if we fix the bounds on the probabilities of detection and false alarm, which is often determined by design requirements, then the value of z and the ROC curves are fixed. Then, A 2 µ 2 T = 4 z 2 r 4 Γ is the key tradeoff relationship between different design parameters. We can see that if the distance between source and sensor doubles, the time to detect increases by a factor of

5 Fig. 3. Tradeoff relationship between detection time (T) and distance (r). 16 or A must increase by a factor of 4 with other parameters unchanged. Figure 3 shows the tradeoff relationship between distance and detection time under different settings of probabilities of false positives. B. Multiple Sensors Now consider a simple case of 4 distributed sensors located at [0, 0], [0, 30], [30, 0], [30, 30]. The detecting processes at each sensor are independent Poisson process, thus the aggregate count of photons by 4 sensors also form a Poisson process, the system issue an alarm when the total count exceeds B. Figure 4 shows the time T to detect as a function of radiation source location [x, y]. We can see that when source is further away from sensors, the time to detect increases. And when the source is at the center [15, 15], the elapsed time for a true positive is the longest (i.e., the worst performance). So we can actually utilize mobile sensors and dynamic redeployment strategy to improve the performance. Fig. 4. Contour plot of detection time T on the 2-D plane.

6 III. THE K-SIGMA ALGORITHM The K-Sigma algorithm is quite similar to the previous method, with an extension into a more general distributed sensor network and another form of the threshold. We first group the distributed sensor network in detector groups, and each consists of 1 (singleton), 2 (edge), 3 (triangle), or 4 (quad) sensors. The aggregate radiation count rate in each group is N, the expected aggregate count rate from only the background is Γ. Then, ksigma = N at Γ a T Γ a T denotes the number of standard deviations the aggregate group count has from the total expected count only from the background in time T. Detection alert is issued if ksigma exceeds a specific threshold K. By varying K, with µ and Γ a fixed, we can also get ROC curves at different values of detection time T. Figure 5 shows a simple example of the ROC curves applying the K-Sigma algorithm. Here, we use the same sensor deployment as in the multiple sensors case. The detection group consists all 4 sensors. The radiation source is randomly located in the field. Γ a = 4 8 counts per second. The ROC curves are averaged over 1,000 random initializations. From Figure 5, we can also see that with increasing time T to detect, the overall performance of the detection system, also the quality of ROC cures improves. Note that the quality of the ROC curve when the source is located at the center is relatively lower, compared to the curve under the same elapsed time (10s), which is also stated at the end of Section II B. IV. CONCLUSION We have described the models and the K-Sigma algorithm to detect and localize dangerous radiation sources in the presence of background noises. The ROC curves showed that given sufficient time, we can detect the targets with infinite accuracy. In practice, however, it is very important to protect the public from being hurt in a very short time, which requires us to find a balance among different settings so that the detection system can be better designed. In this paper, we only considered the case that one single point stationary radiation threat is present, and the sensor network consists of only four static detectors located at the vertices of a square plane. We also assumed no absorption of photons in the background. In fact, the radiation source may be moving or shielded and there may be

7 Fig. 5. ROC curves for the K-Sigma algorithm, at different elapsed times. multiple sources. The background may be heterogeneous and absorb photons. These can result in more complicated modeling strategies. Also, we can use more sensors or sensors with limited or free mobility cooperatively to detect the radiation threats. What s more, we can combine the K-Sigma algorithm with other probabilistic detection algorithms such as Bayesian algorithm [2] to get a much better performance. REFERENCES [1] Chandy, K. Mani, Julian Bunn, and A. Liu. "Models and algorithms for radiation detection." Modeling and Simulation Workshop for Homeland Security [2] Liu, Annie H., Julian J. Bunn, and K. Mani Chandy. "Sensor networks for the detection and tracking of radiation and other threats in cities." IPSN [3] Srinath, Mandyam Dhati, P. K. Rajasekaran, and Ramanarayanan Viswanathan. Introduction to statistical signal processing with applications. Prentice-Hall, Inc., [4] Brennan, Sean M., et al. "Radiation detection with distributed sensor networks." Computer 37.8 (2004):

Data Mining: Concepts and Techniques. (3 rd ed.) Chapter 8. Chapter 8. Classification: Basic Concepts

Data Mining: Concepts and Techniques. (3 rd ed.) Chapter 8. Chapter 8. Classification: Basic Concepts Data Mining: Concepts and Techniques (3 rd ed.) Chapter 8 1 Chapter 8. Classification: Basic Concepts Classification: Basic Concepts Decision Tree Induction Bayes Classification Methods Rule-Based Classification

More information

Detection theory 101 ELEC-E5410 Signal Processing for Communications

Detection theory 101 ELEC-E5410 Signal Processing for Communications Detection theory 101 ELEC-E5410 Signal Processing for Communications Binary hypothesis testing Null hypothesis H 0 : e.g. noise only Alternative hypothesis H 1 : signal + noise p(x;h 0 ) γ p(x;h 1 ) Trade-off

More information

Bayesian Decision Theory

Bayesian Decision Theory Introduction to Pattern Recognition [ Part 4 ] Mahdi Vasighi Remarks It is quite common to assume that the data in each class are adequately described by a Gaussian distribution. Bayesian classifier is

More information

Optimizing Sensor Arrays for Detecting Dirty Bombs

Optimizing Sensor Arrays for Detecting Dirty Bombs Optimizing Sensor Arrays for Detecting Dirty Bombs Daniel Obenshain September 26, 2008 1 Abstract Professor Ryan McLean and others at Caltech have developed a new, cheaper radiation sensor using CdZnTe

More information

Performance Evaluation and Comparison

Performance Evaluation and Comparison Outline Hong Chang Institute of Computing Technology, Chinese Academy of Sciences Machine Learning Methods (Fall 2012) Outline Outline I 1 Introduction 2 Cross Validation and Resampling 3 Interval Estimation

More information

Utilization of advanced clutter suppression algorithms for improved spectroscopic portal capability against radionuclide threats

Utilization of advanced clutter suppression algorithms for improved spectroscopic portal capability against radionuclide threats Physical Sciences Inc. VG13-158 Utilization of advanced clutter suppression algorithms for improved spectroscopic portal capability against radionuclide threats Bogdan R. Cosofret, Kirill Shokhirev and

More information

Least Squares Classification

Least Squares Classification Least Squares Classification Stephen Boyd EE103 Stanford University November 4, 2017 Outline Classification Least squares classification Multi-class classifiers Classification 2 Classification data fitting

More information

Performance Evaluation

Performance Evaluation Performance Evaluation Confusion Matrix: Detected Positive Negative Actual Positive A: True Positive B: False Negative Negative C: False Positive D: True Negative Recall or Sensitivity or True Positive

More information

Class 4: Classification. Quaid Morris February 11 th, 2011 ML4Bio

Class 4: Classification. Quaid Morris February 11 th, 2011 ML4Bio Class 4: Classification Quaid Morris February 11 th, 211 ML4Bio Overview Basic concepts in classification: overfitting, cross-validation, evaluation. Linear Discriminant Analysis and Quadratic Discriminant

More information

Lecture 3. STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher

Lecture 3. STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher Lecture 3 STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher Previous lectures What is machine learning? Objectives of machine learning Supervised and

More information

Introduction to Statistical Inference

Introduction to Statistical Inference Structural Health Monitoring Using Statistical Pattern Recognition Introduction to Statistical Inference Presented by Charles R. Farrar, Ph.D., P.E. Outline Introduce statistical decision making for Structural

More information

Performance Evaluation

Performance Evaluation Performance Evaluation David S. Rosenberg Bloomberg ML EDU October 26, 2017 David S. Rosenberg (Bloomberg ML EDU) October 26, 2017 1 / 36 Baseline Models David S. Rosenberg (Bloomberg ML EDU) October 26,

More information

Complete Weather Intelligence for Public Safety from DTN

Complete Weather Intelligence for Public Safety from DTN Complete Weather Intelligence for Public Safety from DTN September 2017 White Paper www.dtn.com / 1.800.610.0777 From flooding to tornados to severe winter storms, the threats to public safety from weather-related

More information

Image quality assessment. Question: which is a better image? Answer: what are you trying to do?

Image quality assessment. Question: which is a better image? Answer: what are you trying to do? Image Quality Image quality assessment Question: which is a better image? Answer: what are you trying to do? Image Quality Image quality, for the purposes of medical imaging, can be defined as the ability

More information

Performance evaluation of binary classifiers

Performance evaluation of binary classifiers Performance evaluation of binary classifiers Kevin P. Murphy Last updated October 10, 2007 1 ROC curves We frequently design systems to detect events of interest, such as diseases in patients, faces in

More information

A.I. in health informatics lecture 2 clinical reasoning & probabilistic inference, I. kevin small & byron wallace

A.I. in health informatics lecture 2 clinical reasoning & probabilistic inference, I. kevin small & byron wallace A.I. in health informatics lecture 2 clinical reasoning & probabilistic inference, I kevin small & byron wallace today a review of probability random variables, maximum likelihood, etc. crucial for clinical

More information

Source Term Estimation for Hazardous Releases

Source Term Estimation for Hazardous Releases Source Term Estimation for Hazardous Releases Fukushima Workshop NCAR, 22 nd 23 rd February 2012 Dstl/DOC61790 Dr. Gareth Brown Presentation Outline Dstl s approach to Source Term Estimation Recent developments

More information

Linear Classifiers as Pattern Detectors

Linear Classifiers as Pattern Detectors Intelligent Systems: Reasoning and Recognition James L. Crowley ENSIMAG 2 / MoSIG M1 Second Semester 2014/2015 Lesson 16 8 April 2015 Contents Linear Classifiers as Pattern Detectors Notation...2 Linear

More information

Ensemble Methods. NLP ML Web! Fall 2013! Andrew Rosenberg! TA/Grader: David Guy Brizan

Ensemble Methods. NLP ML Web! Fall 2013! Andrew Rosenberg! TA/Grader: David Guy Brizan Ensemble Methods NLP ML Web! Fall 2013! Andrew Rosenberg! TA/Grader: David Guy Brizan How do you make a decision? What do you want for lunch today?! What did you have last night?! What are your favorite

More information

Probabilistic model for Intrusion Detection in Wireless Sensor Network

Probabilistic model for Intrusion Detection in Wireless Sensor Network Probabilistic model for Intrusion Detection in Wireless Sensor Network Maduri Chopde, Kimi Ramteke and Satish Kamble Department of Computer Science PICT, Pune Pune University, India madhurichopde@gmail.com,

More information

Detection theory. H 0 : x[n] = w[n]

Detection theory. H 0 : x[n] = w[n] Detection Theory Detection theory A the last topic of the course, we will briefly consider detection theory. The methods are based on estimation theory and attempt to answer questions such as Is a signal

More information

Classifier performance evaluation

Classifier performance evaluation Classifier performance evaluation Václav Hlaváč Czech Technical University in Prague Czech Institute of Informatics, Robotics and Cybernetics 166 36 Prague 6, Jugoslávských partyzánu 1580/3, Czech Republic

More information

A dirty-bomb is going to explode sometime tomorrow and destroy your company 4ever. You have been warned. 9/24/ :41 pm

A dirty-bomb is going to explode sometime tomorrow and destroy your company 4ever. You have been warned. 9/24/ :41 pm BOMB THREATS RESPONSE 1 Preparedness 2 3 Hey @yourbusiness. A dirty-bomb is going to explode sometime tomorrow and destroy your company 4ever. You have been warned 9/24/2017 11:41 pm What we envision 4

More information

Biological Source Term Estimation Using Particle Counters and Immunoassay Sensors

Biological Source Term Estimation Using Particle Counters and Immunoassay Sensors Biological Source Term Estimation Using Particle Counters and Immunoassay Sensors P. Robins Hazard Assessment, Simulation and Prediction Dstl Porton Down, UK probins@dstl.gov.uk V. E. Rapley Hazard Assessment,

More information

Advanced Technique for Dielectric Analyses

Advanced Technique for Dielectric Analyses Chroma Systems Solutions, Inc. Advanced Technique for Dielectric Analyses 190xx Series Hipot Testers Keywords: Dielectric Analyses, Destructive testing, Threshold Detection, Breakdown, Test Damage. Title:

More information

Stephen Scott.

Stephen Scott. 1 / 35 (Adapted from Ethem Alpaydin and Tom Mitchell) sscott@cse.unl.edu In Homework 1, you are (supposedly) 1 Choosing a data set 2 Extracting a test set of size > 30 3 Building a tree on the training

More information

Evaluating Electricity Theft Detectors in Smart Grid Networks. Group 5:

Evaluating Electricity Theft Detectors in Smart Grid Networks. Group 5: Evaluating Electricity Theft Detectors in Smart Grid Networks Group 5: Ji, Xinyu Rivera, Asier Agenda Introduction Background Electricity Theft Detectors and Attacks Results Discussion Conclusion 2 Introduction

More information

Introduction to Signal Detection and Classification. Phani Chavali

Introduction to Signal Detection and Classification. Phani Chavali Introduction to Signal Detection and Classification Phani Chavali Outline Detection Problem Performance Measures Receiver Operating Characteristics (ROC) F-Test - Test Linear Discriminant Analysis (LDA)

More information

Traction Diesel Engine Anomaly Detection Using Vibration Analysis in Octave Bands

Traction Diesel Engine Anomaly Detection Using Vibration Analysis in Octave Bands PAPER Traction Diesel Engine Anomaly Detection Using Vibration Analysis in Octave Bands Minoru KONDO Drive Systems Laboratory, Vehicle Control Technology Division Shinichi MANABE Drive Systems Laboratory,

More information

Forecasting Conflict Lecture 4 Models and Metrics

Forecasting Conflict Lecture 4 Models and Metrics Forecasting Conflict Lecture 4 Models and Metrics Philip A. Schrodt Parus Analytical Systems schrodt735@gmail.com Graduate School of Decision Sciences University of Konstanz 14-17 October 2013 Overview

More information

Detectors in Nuclear Physics: Monte Carlo Methods. Dr. Andrea Mairani. Lectures I-II

Detectors in Nuclear Physics: Monte Carlo Methods. Dr. Andrea Mairani. Lectures I-II Detectors in Nuclear Physics: Monte Carlo Methods Dr. Andrea Mairani Lectures I-II INTRODUCTION Sampling from a probability distribution Sampling from a probability distribution X λ Sampling from a probability

More information

Real time detection through Generalized Likelihood Ratio Test of position and speed readings inconsistencies in automated moving objects

Real time detection through Generalized Likelihood Ratio Test of position and speed readings inconsistencies in automated moving objects Real time detection through Generalized Likelihood Ratio Test of position and speed readings inconsistencies in automated moving objects Sternheim Misuraca, M. R. Degree in Electronics Engineering, University

More information

Applied Nuclear Science Educational, Training & Simulation Systems

Applied Nuclear Science Educational, Training & Simulation Systems WWW.NATS-USA.COM Applied Nuclear Science Educational, Training & Simulation Systems North American Technical Services Bridging Technology with the Latest in Radiation Detection Systems The Center For Innovative

More information

10. Composite Hypothesis Testing. ECE 830, Spring 2014

10. Composite Hypothesis Testing. ECE 830, Spring 2014 10. Composite Hypothesis Testing ECE 830, Spring 2014 1 / 25 In many real world problems, it is difficult to precisely specify probability distributions. Our models for data may involve unknown parameters

More information

434 CHAP. 8 NUMERICAL OPTIMIZATION. Powell's Method. Powell s Method

434 CHAP. 8 NUMERICAL OPTIMIZATION. Powell's Method. Powell s Method 434 CHAP. 8 NUMERICAL OPTIMIZATION Powell's Method Powell s Method Let X be an initial guess at the location of the minimum of the function z = f (x, x 2,...,x N ). Assume that the partial derivatives

More information

A Spatial and Temporal Characterization of the Background Neutron Environment at the Navy and Marine Corps Memorial Stadium

A Spatial and Temporal Characterization of the Background Neutron Environment at the Navy and Marine Corps Memorial Stadium Vol. 35, No. 1 April 2017 A Spatial and Temporal Characterization of the Background Neutron Environment at the Navy and Marine Corps Memorial Stadium S.M. Walsh, M.G. Millett, and M.E. Nelson This paper

More information

Early Detection of a Change in Poisson Rate After Accounting For Population Size Effects

Early Detection of a Change in Poisson Rate After Accounting For Population Size Effects Early Detection of a Change in Poisson Rate After Accounting For Population Size Effects School of Industrial and Systems Engineering, Georgia Institute of Technology, 765 Ferst Drive NW, Atlanta, GA 30332-0205,

More information

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Mohammed Karmoose Electrical Engineering Department Alexandria University Alexandria 1544, Egypt Email: mhkarmoose@ieeeorg Karim

More information

Novel spectrum sensing schemes for Cognitive Radio Networks

Novel spectrum sensing schemes for Cognitive Radio Networks Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced

More information

Physics 1000 Half Life Lab

Physics 1000 Half Life Lab Physics 1000 Half Life Lab Determination of Half-Life with a Geiger-Müller Counter Object: Apparatus: To understand the concept of half-life; to become familiar with the use of a Geiger-Müller counter;

More information

Localization of Radioactive Sources Zhifei Zhang

Localization of Radioactive Sources Zhifei Zhang Localization of Radioactive Sources Zhifei Zhang 4/13/2016 1 Outline Background and motivation Our goal and scenario Preliminary knowledge Related work Our approach and results 4/13/2016 2 Background and

More information

Machine Learning Linear Classification. Prof. Matteo Matteucci

Machine Learning Linear Classification. Prof. Matteo Matteucci Machine Learning Linear Classification Prof. Matteo Matteucci Recall from the first lecture 2 X R p Regression Y R Continuous Output X R p Y {Ω 0, Ω 1,, Ω K } Classification Discrete Output X R p Y (X)

More information

UNIFORMLY MOST POWERFUL CYCLIC PERMUTATION INVARIANT DETECTION FOR DISCRETE-TIME SIGNALS

UNIFORMLY MOST POWERFUL CYCLIC PERMUTATION INVARIANT DETECTION FOR DISCRETE-TIME SIGNALS UNIFORMLY MOST POWERFUL CYCLIC PERMUTATION INVARIANT DETECTION FOR DISCRETE-TIME SIGNALS F. C. Nicolls and G. de Jager Department of Electrical Engineering, University of Cape Town Rondebosch 77, South

More information

Lecture 4 Discriminant Analysis, k-nearest Neighbors

Lecture 4 Discriminant Analysis, k-nearest Neighbors Lecture 4 Discriminant Analysis, k-nearest Neighbors Fredrik Lindsten Division of Systems and Control Department of Information Technology Uppsala University. Email: fredrik.lindsten@it.uu.se fredrik.lindsten@it.uu.se

More information

ShakeAlert Phase 1: West Coast Earthquake Early Warning. Doug Given, USGS EEW Coordinator Education Symposium, Dec. 4, 2018

ShakeAlert Phase 1: West Coast Earthquake Early Warning. Doug Given, USGS EEW Coordinator Education Symposium, Dec. 4, 2018 ShakeAlert Phase 1: West Coast Earthquake Early Warning Doug Given, USGS EEW Coordinator Education Symposium, Dec. 4, 2018 Population WA 7M OR 4M Annualized Earthquake Losses, $6.1B 61% in California,

More information

Course content (will be adapted to the background knowledge of the class):

Course content (will be adapted to the background knowledge of the class): Biomedical Signal Processing and Signal Modeling Lucas C Parra, parra@ccny.cuny.edu Departamento the Fisica, UBA Synopsis This course introduces two fundamental concepts of signal processing: linear systems

More information

M1. (a) (i) cannot penetrate aluminium allow can only pass through air / paper too weak is neutral 1

M1. (a) (i) cannot penetrate aluminium allow can only pass through air / paper too weak is neutral 1 M. (a) (i) cannot penetrate aluminium allow can only pass through air / paper too weak is neutral gamma rays not affected (by aluminium) allow all / most (gamma rays) to pass through too strong is neutral

More information

Regularization. CSCE 970 Lecture 3: Regularization. Stephen Scott and Vinod Variyam. Introduction. Outline

Regularization. CSCE 970 Lecture 3: Regularization. Stephen Scott and Vinod Variyam. Introduction. Outline Other Measures 1 / 52 sscott@cse.unl.edu learning can generally be distilled to an optimization problem Choose a classifier (function, hypothesis) from a set of functions that minimizes an objective function

More information

Automated Sequential Search for Weak Radiation Sources

Automated Sequential Search for Weak Radiation Sources Automated Sequential Search for Weak Radiation Sources A. Kumar, H.G. Tanner, A.V. Klimenko, K. Borozdin, and W.C. Priedhorsky Abstract We demonstrate the principle of a bidirectional interaction between

More information

A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description

A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description Min Yang, HuanGuo Zhang, JianMing Fu, and Fei Yan School of Computer, State Key Laboratory of Software Engineering, Wuhan

More information

Supplementary Figure 1. Characterization of the single-photon quantum light source based on spontaneous parametric down-conversion (SPDC).

Supplementary Figure 1. Characterization of the single-photon quantum light source based on spontaneous parametric down-conversion (SPDC). .2 Classical light source.8 g (2) ().6.4.2 EMCCD SPAD 2 3.2.4.6.8..2.4.6.8.2 Mean number of photon pairs per pump pulse 4 5 6 7 8 9 2 3 4 Supplementary Figure. Characterization of the single-photon quantum

More information

Given a feature in I 1, how to find the best match in I 2?

Given a feature in I 1, how to find the best match in I 2? Feature Matching 1 Feature matching Given a feature in I 1, how to find the best match in I 2? 1. Define distance function that compares two descriptors 2. Test all the features in I 2, find the one with

More information

Introduction to Supervised Learning. Performance Evaluation

Introduction to Supervised Learning. Performance Evaluation Introduction to Supervised Learning Performance Evaluation Marcelo S. Lauretto Escola de Artes, Ciências e Humanidades, Universidade de São Paulo marcelolauretto@usp.br Lima - Peru Performance Evaluation

More information

Triangle-mapping Analysis on Spatial Competition and Cooperation of Chinese Cities

Triangle-mapping Analysis on Spatial Competition and Cooperation of Chinese Cities Triangle-mapping Analysis on Spatial Competition and Cooperation of Chinese Cities arxiv:1801.00641v1 [physics.soc-ph] 2 Jan 2018 Pan Liu, Xiao-Pu Han, and Linyuan Lü, Alibaba Research Center for Complexity

More information

FIRST LINE INSPECTION: RADIATION DETECTION

FIRST LINE INSPECTION: RADIATION DETECTION WP 2 FIRST LINE INSPECTION: G Dermody Symetrica Security Ltd. RADIATION DETECTION Contributors CEA Symetrica Security Ltd 09/10/2018 Final Public Workshop 1 CONTENT MOBILE AND RELOCATABLE RADIATION DETECTION

More information

Practicable Robust Markov Decision Processes

Practicable Robust Markov Decision Processes Practicable Robust Markov Decision Processes Huan Xu Department of Mechanical Engineering National University of Singapore Joint work with Shiau-Hong Lim (IBM), Shie Mannor (Techion), Ofir Mebel (Apple)

More information

Applied Nuclear Science Educational, Training & Simulation Systems

Applied Nuclear Science Educational, Training & Simulation Systems WWW.NATS-USA.COM Applied Nuclear Science Educational, Training & Simulation Systems North American Technical Services Bridging Technology With The Latest in Radiation Detection Systems & Training Solutions

More information

Diagnostics. Gad Kimmel

Diagnostics. Gad Kimmel Diagnostics Gad Kimmel Outline Introduction. Bootstrap method. Cross validation. ROC plot. Introduction Motivation Estimating properties of an estimator. Given data samples say the average. x 1, x 2,...,

More information

Nuclear Physics Lab I: Geiger-Müller Counter and Nuclear Counting Statistics

Nuclear Physics Lab I: Geiger-Müller Counter and Nuclear Counting Statistics Nuclear Physics Lab I: Geiger-Müller Counter and Nuclear Counting Statistics PART I Geiger Tube: Optimal Operating Voltage and Resolving Time Objective: To become acquainted with the operation and characteristics

More information

Neutron Detector Gamma Insensitivity Criteria

Neutron Detector Gamma Insensitivity Criteria PNNL-18903 Neutron Detector Gamma Insensitivity Criteria RT Kouzes JR Ely AT Lintereur DL Stephens October 28, 2009 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the

More information

Detector. Matthew Strugari, Dr. Garth Huber 1, Wenliang Li. University of Regina, Regina, SK, S4S 0A2, Canada. August 15, 2016.

Detector. Matthew Strugari, Dr. Garth Huber 1, Wenliang Li. University of Regina, Regina, SK, S4S 0A2, Canada. August 15, 2016. 1 Simulations for e/π Separation for the SHMS Heavy Gas Cherenkov Detector Matthew Strugari, Dr. Garth Huber 1, Wenliang Li University of Regina, Regina, SK, S4S 0A2, Canada August 15, 2016 Abstract The

More information

15-388/688 - Practical Data Science: Nonlinear modeling, cross-validation, regularization, and evaluation

15-388/688 - Practical Data Science: Nonlinear modeling, cross-validation, regularization, and evaluation 15-388/688 - Practical Data Science: Nonlinear modeling, cross-validation, regularization, and evaluation J. Zico Kolter Carnegie Mellon University Fall 2016 1 Outline Example: return to peak demand prediction

More information

Robotics 2 Data Association. Giorgio Grisetti, Cyrill Stachniss, Kai Arras, Wolfram Burgard

Robotics 2 Data Association. Giorgio Grisetti, Cyrill Stachniss, Kai Arras, Wolfram Burgard Robotics 2 Data Association Giorgio Grisetti, Cyrill Stachniss, Kai Arras, Wolfram Burgard Data Association Data association is the process of associating uncertain measurements to known tracks. Problem

More information

A Modular NMF Matching Algorithm for Radiation Spectra

A Modular NMF Matching Algorithm for Radiation Spectra A Modular NMF Matching Algorithm for Radiation Spectra Melissa L. Koudelka Sensor Exploitation Applications Sandia National Laboratories mlkoude@sandia.gov Daniel J. Dorsey Systems Technologies Sandia

More information

Estimating the Shape of Covert Networks

Estimating the Shape of Covert Networks Estimating the Shape of Covert Networks -Matthew Dombroski -Paul Fischbeck -Kathleen Carley Center for Computational Analysis of Social and Organizational Systems Matthew J. Dombroski Porter Hall Pittsburgh,

More information

Section 7.5: Nonstationary Poisson Processes

Section 7.5: Nonstationary Poisson Processes Section 7.5: Nonstationary Poisson Processes Discrete-Event Simulation: A First Course c 2006 Pearson Ed., Inc. 0-13-142917-5 Discrete-Event Simulation: A First Course Section 7.5: Nonstationary Poisson

More information

Tracking Human Heads Based on Interaction between Hypotheses with Certainty

Tracking Human Heads Based on Interaction between Hypotheses with Certainty Proc. of The 13th Scandinavian Conference on Image Analysis (SCIA2003), (J. Bigun and T. Gustavsson eds.: Image Analysis, LNCS Vol. 2749, Springer), pp. 617 624, 2003. Tracking Human Heads Based on Interaction

More information

Supplementary Information

Supplementary Information Supplementary Information Performance measures A binary classifier, such as SVM, assigns to predicted binding sequences the positive class label (+1) and to sequences predicted as non-binding the negative

More information

2. What are the tradeoffs among different measures of error (e.g. probability of false alarm, probability of miss, etc.)?

2. What are the tradeoffs among different measures of error (e.g. probability of false alarm, probability of miss, etc.)? ECE 830 / CS 76 Spring 06 Instructors: R. Willett & R. Nowak Lecture 3: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics Executive summary In the last lecture we

More information

Exploiting Geographic Dependencies for Real Estate Appraisal

Exploiting Geographic Dependencies for Real Estate Appraisal Exploiting Geographic Dependencies for Real Estate Appraisal Yanjie Fu Joint work with Hui Xiong, Yu Zheng, Yong Ge, Zhihua Zhou, Zijun Yao Rutgers, the State University of New Jersey Microsoft Research

More information

Bayesian Logic Thomas Bayes:

Bayesian Logic Thomas Bayes: Bayesian Logic Thomas Bayes: 1702-1761 Based on probability, P(X) NOT frequency distributions, BUT all common distributions can be incorporated into a Bayesian analysis : Poisson, Normal (Gaussian) etc.

More information

CS 237: Probability in Computing

CS 237: Probability in Computing CS 237: Probability in Computing Wayne Snyder Computer Science Department Boston University Lecture 13: Normal Distribution Exponential Distribution Recall that the Normal Distribution is given by an explicit

More information

GIS and Remote Sensing Support for Evacuation Analysis

GIS and Remote Sensing Support for Evacuation Analysis GIS and Remote Sensing Support for Evacuation Analysis Presented to GIS for Transportation Symposium Rapid City, South Dakota March 28-31, 2004 Demin Xiong Oak Ridge National Laboratory 2360 Cherahala

More information

Decision-making, inference, and learning theory. ECE 830 & CS 761, Spring 2016

Decision-making, inference, and learning theory. ECE 830 & CS 761, Spring 2016 Decision-making, inference, and learning theory ECE 830 & CS 761, Spring 2016 1 / 22 What do we have here? Given measurements or observations of some physical process, we ask the simple question what do

More information

PARAFOG: a new decision support system for the airports to monitor and to predict radiation fog based on automatic LIDARceilometer

PARAFOG: a new decision support system for the airports to monitor and to predict radiation fog based on automatic LIDARceilometer PARAFOG: a new decision support system for the airports to monitor and to predict radiation fog based on automatic LIDARceilometer measurements Quentin Laffineur Royal Meteorological Institute of Belgium

More information

Data Mining and Analysis: Fundamental Concepts and Algorithms

Data Mining and Analysis: Fundamental Concepts and Algorithms Data Mining and Analysis: Fundamental Concepts and Algorithms dataminingbook.info Mohammed J. Zaki 1 Wagner Meira Jr. 2 1 Department of Computer Science Rensselaer Polytechnic Institute, Troy, NY, USA

More information

errors every 1 hour unless he falls asleep, in which case he just reports the total errors

errors every 1 hour unless he falls asleep, in which case he just reports the total errors I. First Definition of a Poisson Process A. Definition: Poisson process A Poisson Process {X(t), t 0} with intensity λ > 0 is a counting process with the following properties. INDEPENDENT INCREMENTS. For

More information

Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics. 1 Executive summary

Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics. 1 Executive summary ECE 830 Spring 207 Instructor: R. Willett Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics Executive summary In the last lecture we saw that the likelihood

More information

A Logistic Regression Method for Urban growth modeling Case Study: Sanandaj City in IRAN

A Logistic Regression Method for Urban growth modeling Case Study: Sanandaj City in IRAN A Logistic Regression Method for Urban growth modeling Case Study: Sanandaj City in IRAN Sassan Mohammady GIS MSc student, Dept. of Surveying and Geomatics Eng., College of Eng. University of Tehran, Tehran,

More information

hsnim: Hyper Scalable Network Inference Machine for Scale-Free Protein-Protein Interaction Networks Inference

hsnim: Hyper Scalable Network Inference Machine for Scale-Free Protein-Protein Interaction Networks Inference CS 229 Project Report (TR# MSB2010) Submitted 12/10/2010 hsnim: Hyper Scalable Network Inference Machine for Scale-Free Protein-Protein Interaction Networks Inference Muhammad Shoaib Sehgal Computer Science

More information

NAS Report MTI FROM SAR. Prof. Chris Oliver, CBE NASoftware Ltd. 19th January 2007

NAS Report MTI FROM SAR. Prof. Chris Oliver, CBE NASoftware Ltd. 19th January 2007 NAS Report MTI FROM SAR Prof. Chris Oliver, CBE NASoftware Ltd. 19th January 27 1. Introduction NASoftware have devised and implemented a series of algorithms for deriving moving target information from

More information

REX Evaluation Guide. American Micro Detection Systems Inc March Lane, Suite 200 Stockton, CA 95219

REX Evaluation Guide. American Micro Detection Systems Inc March Lane, Suite 200 Stockton, CA 95219 REX Evaluation Guide American Micro Detection Systems Inc. 2800 March Lane, Suite 200 Stockton, CA 95219 I. INTRODUCTION REX (Real-time Elemental X-ray Fluorescence System) is the only instrument capable

More information

Evaluation & Credibility Issues

Evaluation & Credibility Issues Evaluation & Credibility Issues What measure should we use? accuracy might not be enough. How reliable are the predicted results? How much should we believe in what was learned? Error on the training data

More information

Improved Spectrum Utilization in Cognitive Radio Systems

Improved Spectrum Utilization in Cognitive Radio Systems Improved Spectrum Utilization in Cognitive Radio Systems Lei Cao and Ramanarayanan Viswanathan Department of Electrical Engineering The University of Mississippi Jan. 15, 2014 Lei Cao and Ramanarayanan

More information

Assessing Risks. Tom Carter. tom/sfi-csss. Complex Systems

Assessing Risks. Tom Carter.   tom/sfi-csss. Complex Systems Assessing Risks Tom Carter http://cogs.csustan.edu/ tom/sfi-csss Complex Systems July, 2002 Our general topics: Assessing risks Using Bayes Theorem The doomsday argument References 2 The quotes Science

More information

Evaluation Metrics for Intrusion Detection Systems - A Study

Evaluation Metrics for Intrusion Detection Systems - A Study Evaluation Metrics for Intrusion Detection Systems - A Study Gulshan Kumar Assistant Professor, Shaheed Bhagat Singh State Technical Campus, Ferozepur (Punjab)-India 152004 Email: gulshanahuja@gmail.com

More information

Multiple regression: Categorical dependent variables

Multiple regression: Categorical dependent variables Multiple : Categorical Johan A. Elkink School of Politics & International Relations University College Dublin 28 November 2016 1 2 3 4 Outline 1 2 3 4 models models have a variable consisting of two categories.

More information

Part III Measures of Classification Accuracy for the Prediction of Survival Times

Part III Measures of Classification Accuracy for the Prediction of Survival Times Part III Measures of Classification Accuracy for the Prediction of Survival Times Patrick J Heagerty PhD Department of Biostatistics University of Washington 102 ISCB 2010 Session Three Outline Examples

More information

PATTERN RECOGNITION AND MACHINE LEARNING

PATTERN RECOGNITION AND MACHINE LEARNING PATTERN RECOGNITION AND MACHINE LEARNING Slide Set 3: Detection Theory January 2018 Heikki Huttunen heikki.huttunen@tut.fi Department of Signal Processing Tampere University of Technology Detection theory

More information

Model Accuracy Measures

Model Accuracy Measures Model Accuracy Measures Master in Bioinformatics UPF 2017-2018 Eduardo Eyras Computational Genomics Pompeu Fabra University - ICREA Barcelona, Spain Variables What we can measure (attributes) Hypotheses

More information

Data Analyzing and Daily Activity Learning with Hidden Markov Model

Data Analyzing and Daily Activity Learning with Hidden Markov Model Data Analyzing and Daily Activity Learning with Hidden Markov Model GuoQing Yin and Dietmar Bruckner Institute of Computer Technology Vienna University of Technology, Austria, Europe {yin, bruckner}@ict.tuwien.ac.at

More information

Threshold Considerations in Distributed Detection in a Network of Sensors.

Threshold Considerations in Distributed Detection in a Network of Sensors. Threshold Considerations in Distributed Detection in a Network of Sensors. Gene T. Whipps 1,2, Emre Ertin 2, and Randolph L. Moses 2 1 US Army Research Laboratory, Adelphi, MD 20783 2 Department of Electrical

More information

Aquadopp HR Profiler: Extended Velocity Range Mode

Aquadopp HR Profiler: Extended Velocity Range Mode Nortek Technical Note No.: TN-028 Title: On the Use of Extended Velocity Range Mode (HR Profiler) Last Edited: January 21, 2010 Authors: Peter J Rusello - NortekUSA, Number of Pages: Aquadopp HR Profiler:

More information

Nonparametric predictive inference with parametric copulas for combining bivariate diagnostic tests

Nonparametric predictive inference with parametric copulas for combining bivariate diagnostic tests Nonparametric predictive inference with parametric copulas for combining bivariate diagnostic tests Noryanti Muhammad, Universiti Malaysia Pahang, Malaysia, noryanti@ump.edu.my Tahani Coolen-Maturi, Durham

More information

Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility

Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility 1 / 24 Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility Rui Tan 1 Guoliang Xing 1 Jianping Wang 1 Hing Cheung So 2 1 Department of Computer Science City University of Hong

More information

WE consider the problem of detecting and localizing a material

WE consider the problem of detecting and localizing a material 1886 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 5, MAY 2007 Detection and Localization of Material Releases With Sparse Sensor Configurations Emily B. Fox, Student Member, IEEE, John W. Fisher,

More information

Statistical Tools and Techniques for Solar Astronomers

Statistical Tools and Techniques for Solar Astronomers Statistical Tools and Techniques for Solar Astronomers Alexander W Blocker Nathan Stein SolarStat 2012 Outline Outline 1 Introduction & Objectives 2 Statistical issues with astronomical data 3 Example:

More information

P5.3 EVALUATION OF WIND ALGORITHMS FOR REPORTING WIND SPEED AND GUST FOR USE IN AIR TRAFFIC CONTROL TOWERS. Thomas A. Seliga 1 and David A.

P5.3 EVALUATION OF WIND ALGORITHMS FOR REPORTING WIND SPEED AND GUST FOR USE IN AIR TRAFFIC CONTROL TOWERS. Thomas A. Seliga 1 and David A. P5.3 EVALUATION OF WIND ALGORITHMS FOR REPORTING WIND SPEED AND GUST FOR USE IN AIR TRAFFIC CONTROL TOWERS Thomas A. Seliga 1 and David A. Hazen 2 1. Volpe National Transportation Systems Center, Cambridge,

More information

Lab NUC. Determination of Half-Life with a Geiger-Müller Counter

Lab NUC. Determination of Half-Life with a Geiger-Müller Counter Lab NUC Determination of Half-Life with a Geiger-Müller Counter Object: Apparatus: To understand the concept of half-life; to become familiar with the use of a Geiger-Müller counter; to determine the half-lives

More information

6 Introduction to Population Genetics

6 Introduction to Population Genetics 70 Grundlagen der Bioinformatik, SoSe 11, D. Huson, May 19, 2011 6 Introduction to Population Genetics This chapter is based on: J. Hein, M.H. Schierup and C. Wuif, Gene genealogies, variation and evolution,

More information