Detection and Estimation Final Project Report: Modeling and the K-Sigma Algorithm for Radiation Detection
|
|
- Noah Merritt
- 5 years ago
- Views:
Transcription
1 Detection and Estimation Final Project Report: Modeling and the K-Sigma Algorithm for Radiation Detection Sijie Xiong, Department of Electrical and Computer Engineering Rutgers, the State University of New Jersey Abstract In this paper, we examine simple yet insightful models and the K-Sigma algorithm which characterize the problem of radiation detection in sensor networks. Our goal is to detect dangerous radiation sources as soon as possible with a relatively low probability of false alarm and miss. Simulation results presented the tradeoff relationship between discrimination threshold, time to detect, probability of false alarm and sensor deployment strategies. I. INTRODUCTION Detecting dangerous radiation sources as well as many other chemical and biological threats is of primary concern to fight against terrorism and violence around the world. We aim to minimize the potential cost by detecting, localizing and neutralizing threats correctly and rapidly enough. A large body of detection algorithms and sensor deployment strategies has been developed to accomplish the goal in many detection scenarios. For example, at the entries and exits of train stations and airports, large portal styled sensors are placed to detect whether people are carrying dangerous materials. However, they are not practical to utilize in more general urban settings such as an open park, a trash can, a river and so on. In these cases, distributed sensor network (DSN) is preferred because of its flexibility in deployment. In this paper, we only consider a point radiation threat. In Section II, we examine the radiation detection problem in two simple models and analyze the tradeoff relationship between detectors performance and detection time. The K-Sigma algorithm will be presented in Section III. Finally, we make a brief summary and some prospective ideas. II. MODELS The detecting sensors record the number of photons striking the sensors. The source
2 radiating and the sensor recording process can both be modeled under poisson distribution. Poisson Distribution Let poisson(r,t,n) be the probability of n occurances in time interval t when the events are generated under a Poisson distribution with parameter r: A. A Single Sensor poisson(r, t, n) = (rt)n e rt n! We first analyze the case when there is only a point radiation source present and a sensor r meters away from the source. The radiation source generates photons at a rate of µ photons per unit time. The sensor detects photons at a rate decreasing as 1/ r 2 if there is no absorption in the air, and a multiplicative term e αr (α is the absorption rate per unit distance) should be added if absorption is present. Then the expected rate of photons detected at the sensor denoted by Λ is: Λ = Aµe αr r 2 where A is a constant depending exclusively on the type of detector. Given a time period T, the sensor records the number of photons striking the sensor as n. If n exceeds a predefined threshold B, then the system issues an alarm that a threat is detected, which is called a true positive. However, the background noises also produce photons at the sensor, let the rate be denoted as Γ, then if the number of photons detected from the background is no less than B, the system will also issue an alert, which is called a false positive. From the poisson distribution, we can compare two estimates of probabilities in the above scenario. Let pfp be the probability of a false positive when there is actually no source present, and ptp be the probability of a true positive when the source is present. We can write the following equations, pfp = ptp = n B n B poisson(γ, T,n) poisson(γ + Λ, T,n) If we fix Γ, Λ and T, then by varying the threshold B, we can plot ptp as a function of pfp, which is called the ROC (Receiver Operating Characteristic) curve. Figure 1 shows different ROC curves under different time intervals with two pair of Γ and Λ settings. Γ =8, Λ =2 for the left figure and Γ =8, Λ =32 for the right figure. It is easy to conclude that with increasing observing time T, the ROC curves converge to the left-top corner (lower probability of false alarm and higher probability of detection)
3 Fig. 1. ROC curves of the probability of detection versus false alarm. Fig. 2. ROC curves when background intensity is increased. the Area under ROC Curves (AUC) is increasing which indicates that the overall performance of the detection system is improved. In Figure 2, we set Γ =8, Λ =4 and Γ =16, Λ =4 for the two figures respectively. The result shows that increasing the background intensity Γ reduces the overall performance of the detection system since the ROC curves move toward the right-bottom corner. Tradeoff Relationship between Threshold B, True Positives, False Positives, Time and Distance Firstly, along a ROC curve, as B varies, the probabilities of false alarm and detection also change. We can examine the relationship between them by looking at the probability distributions of detection and false alarm. If the two distributions don t overlap, the presence of radiation source can be easily inferred without error. However, if they overlap, intuitively, the probabilities of detection and false alarm will both be 1 when B = 0 and both be 0 when B =. And if B falls in between, then ptp and pfp are the areas (Cumulative Distribution Function) under the detection and false alarm probability distribution exceeding B, respectively. Therefore, increasing B will result in
4 lower probability of false alarm as well as lower probability of detection. Secondly, we know that a Poisson distribution can be approximated with small probability of error by a normal distribution when the expected occurrences of events is 10 or more. Let σ source and σ null denote the standard deviations of the detected number of photons at a sensor when the radiation source is present and not present respectively. Then, σ source = (Γ + Λ)T σ null = ΓT Let bfp and bfn be the upper bounds on the probabilities of false positives and false negatives (no alarm when source is present), z FP and - z FN be the corresponding value in a standard normal distribution resulting in bfp and bfn. For instance, when bfp = bfn = 0.01, then z FP = 2.33 and - z FN = We can get, B ΓT z FP σ null (Γ + Λ)T B z FN σ source Our goal is to get lower probability of false alarm and miss. Let z = z FP = z FN, then, B ΓT = z σ null (Γ + Λ)T B = z σ source (Γ + Λ)T ΓT = z (σ null +σ source ) z = = ΛT σ null +σ source Λ T Γ + (Γ + Λ) Therefore, the higher z is the better the quality of ROC curves and overall performance of detection system. Now we ignore the absorption of photons in the air and substitute the equation Λ = Aµ / r 2 in the above result to get, when Λ Γ : z Λ T / 2 Γ when Aµ / Γ r 2 : z Aµ T / 2r 2 Γ when Λ Γ : z ΛT when Aµ / Γ r 2 : z AµT / r Consider the first case, if we fix the bounds on the probabilities of detection and false alarm, which is often determined by design requirements, then the value of z and the ROC curves are fixed. Then, A 2 µ 2 T = 4 z 2 r 4 Γ is the key tradeoff relationship between different design parameters. We can see that if the distance between source and sensor doubles, the time to detect increases by a factor of
5 Fig. 3. Tradeoff relationship between detection time (T) and distance (r). 16 or A must increase by a factor of 4 with other parameters unchanged. Figure 3 shows the tradeoff relationship between distance and detection time under different settings of probabilities of false positives. B. Multiple Sensors Now consider a simple case of 4 distributed sensors located at [0, 0], [0, 30], [30, 0], [30, 30]. The detecting processes at each sensor are independent Poisson process, thus the aggregate count of photons by 4 sensors also form a Poisson process, the system issue an alarm when the total count exceeds B. Figure 4 shows the time T to detect as a function of radiation source location [x, y]. We can see that when source is further away from sensors, the time to detect increases. And when the source is at the center [15, 15], the elapsed time for a true positive is the longest (i.e., the worst performance). So we can actually utilize mobile sensors and dynamic redeployment strategy to improve the performance. Fig. 4. Contour plot of detection time T on the 2-D plane.
6 III. THE K-SIGMA ALGORITHM The K-Sigma algorithm is quite similar to the previous method, with an extension into a more general distributed sensor network and another form of the threshold. We first group the distributed sensor network in detector groups, and each consists of 1 (singleton), 2 (edge), 3 (triangle), or 4 (quad) sensors. The aggregate radiation count rate in each group is N, the expected aggregate count rate from only the background is Γ. Then, ksigma = N at Γ a T Γ a T denotes the number of standard deviations the aggregate group count has from the total expected count only from the background in time T. Detection alert is issued if ksigma exceeds a specific threshold K. By varying K, with µ and Γ a fixed, we can also get ROC curves at different values of detection time T. Figure 5 shows a simple example of the ROC curves applying the K-Sigma algorithm. Here, we use the same sensor deployment as in the multiple sensors case. The detection group consists all 4 sensors. The radiation source is randomly located in the field. Γ a = 4 8 counts per second. The ROC curves are averaged over 1,000 random initializations. From Figure 5, we can also see that with increasing time T to detect, the overall performance of the detection system, also the quality of ROC cures improves. Note that the quality of the ROC curve when the source is located at the center is relatively lower, compared to the curve under the same elapsed time (10s), which is also stated at the end of Section II B. IV. CONCLUSION We have described the models and the K-Sigma algorithm to detect and localize dangerous radiation sources in the presence of background noises. The ROC curves showed that given sufficient time, we can detect the targets with infinite accuracy. In practice, however, it is very important to protect the public from being hurt in a very short time, which requires us to find a balance among different settings so that the detection system can be better designed. In this paper, we only considered the case that one single point stationary radiation threat is present, and the sensor network consists of only four static detectors located at the vertices of a square plane. We also assumed no absorption of photons in the background. In fact, the radiation source may be moving or shielded and there may be
7 Fig. 5. ROC curves for the K-Sigma algorithm, at different elapsed times. multiple sources. The background may be heterogeneous and absorb photons. These can result in more complicated modeling strategies. Also, we can use more sensors or sensors with limited or free mobility cooperatively to detect the radiation threats. What s more, we can combine the K-Sigma algorithm with other probabilistic detection algorithms such as Bayesian algorithm [2] to get a much better performance. REFERENCES [1] Chandy, K. Mani, Julian Bunn, and A. Liu. "Models and algorithms for radiation detection." Modeling and Simulation Workshop for Homeland Security [2] Liu, Annie H., Julian J. Bunn, and K. Mani Chandy. "Sensor networks for the detection and tracking of radiation and other threats in cities." IPSN [3] Srinath, Mandyam Dhati, P. K. Rajasekaran, and Ramanarayanan Viswanathan. Introduction to statistical signal processing with applications. Prentice-Hall, Inc., [4] Brennan, Sean M., et al. "Radiation detection with distributed sensor networks." Computer 37.8 (2004):
Data Mining: Concepts and Techniques. (3 rd ed.) Chapter 8. Chapter 8. Classification: Basic Concepts
Data Mining: Concepts and Techniques (3 rd ed.) Chapter 8 1 Chapter 8. Classification: Basic Concepts Classification: Basic Concepts Decision Tree Induction Bayes Classification Methods Rule-Based Classification
More informationDetection theory 101 ELEC-E5410 Signal Processing for Communications
Detection theory 101 ELEC-E5410 Signal Processing for Communications Binary hypothesis testing Null hypothesis H 0 : e.g. noise only Alternative hypothesis H 1 : signal + noise p(x;h 0 ) γ p(x;h 1 ) Trade-off
More informationBayesian Decision Theory
Introduction to Pattern Recognition [ Part 4 ] Mahdi Vasighi Remarks It is quite common to assume that the data in each class are adequately described by a Gaussian distribution. Bayesian classifier is
More informationOptimizing Sensor Arrays for Detecting Dirty Bombs
Optimizing Sensor Arrays for Detecting Dirty Bombs Daniel Obenshain September 26, 2008 1 Abstract Professor Ryan McLean and others at Caltech have developed a new, cheaper radiation sensor using CdZnTe
More informationPerformance Evaluation and Comparison
Outline Hong Chang Institute of Computing Technology, Chinese Academy of Sciences Machine Learning Methods (Fall 2012) Outline Outline I 1 Introduction 2 Cross Validation and Resampling 3 Interval Estimation
More informationUtilization of advanced clutter suppression algorithms for improved spectroscopic portal capability against radionuclide threats
Physical Sciences Inc. VG13-158 Utilization of advanced clutter suppression algorithms for improved spectroscopic portal capability against radionuclide threats Bogdan R. Cosofret, Kirill Shokhirev and
More informationLeast Squares Classification
Least Squares Classification Stephen Boyd EE103 Stanford University November 4, 2017 Outline Classification Least squares classification Multi-class classifiers Classification 2 Classification data fitting
More informationPerformance Evaluation
Performance Evaluation Confusion Matrix: Detected Positive Negative Actual Positive A: True Positive B: False Negative Negative C: False Positive D: True Negative Recall or Sensitivity or True Positive
More informationClass 4: Classification. Quaid Morris February 11 th, 2011 ML4Bio
Class 4: Classification Quaid Morris February 11 th, 211 ML4Bio Overview Basic concepts in classification: overfitting, cross-validation, evaluation. Linear Discriminant Analysis and Quadratic Discriminant
More informationLecture 3. STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher
Lecture 3 STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher Previous lectures What is machine learning? Objectives of machine learning Supervised and
More informationIntroduction to Statistical Inference
Structural Health Monitoring Using Statistical Pattern Recognition Introduction to Statistical Inference Presented by Charles R. Farrar, Ph.D., P.E. Outline Introduce statistical decision making for Structural
More informationPerformance Evaluation
Performance Evaluation David S. Rosenberg Bloomberg ML EDU October 26, 2017 David S. Rosenberg (Bloomberg ML EDU) October 26, 2017 1 / 36 Baseline Models David S. Rosenberg (Bloomberg ML EDU) October 26,
More informationComplete Weather Intelligence for Public Safety from DTN
Complete Weather Intelligence for Public Safety from DTN September 2017 White Paper www.dtn.com / 1.800.610.0777 From flooding to tornados to severe winter storms, the threats to public safety from weather-related
More informationImage quality assessment. Question: which is a better image? Answer: what are you trying to do?
Image Quality Image quality assessment Question: which is a better image? Answer: what are you trying to do? Image Quality Image quality, for the purposes of medical imaging, can be defined as the ability
More informationPerformance evaluation of binary classifiers
Performance evaluation of binary classifiers Kevin P. Murphy Last updated October 10, 2007 1 ROC curves We frequently design systems to detect events of interest, such as diseases in patients, faces in
More informationA.I. in health informatics lecture 2 clinical reasoning & probabilistic inference, I. kevin small & byron wallace
A.I. in health informatics lecture 2 clinical reasoning & probabilistic inference, I kevin small & byron wallace today a review of probability random variables, maximum likelihood, etc. crucial for clinical
More informationSource Term Estimation for Hazardous Releases
Source Term Estimation for Hazardous Releases Fukushima Workshop NCAR, 22 nd 23 rd February 2012 Dstl/DOC61790 Dr. Gareth Brown Presentation Outline Dstl s approach to Source Term Estimation Recent developments
More informationLinear Classifiers as Pattern Detectors
Intelligent Systems: Reasoning and Recognition James L. Crowley ENSIMAG 2 / MoSIG M1 Second Semester 2014/2015 Lesson 16 8 April 2015 Contents Linear Classifiers as Pattern Detectors Notation...2 Linear
More informationEnsemble Methods. NLP ML Web! Fall 2013! Andrew Rosenberg! TA/Grader: David Guy Brizan
Ensemble Methods NLP ML Web! Fall 2013! Andrew Rosenberg! TA/Grader: David Guy Brizan How do you make a decision? What do you want for lunch today?! What did you have last night?! What are your favorite
More informationProbabilistic model for Intrusion Detection in Wireless Sensor Network
Probabilistic model for Intrusion Detection in Wireless Sensor Network Maduri Chopde, Kimi Ramteke and Satish Kamble Department of Computer Science PICT, Pune Pune University, India madhurichopde@gmail.com,
More informationDetection theory. H 0 : x[n] = w[n]
Detection Theory Detection theory A the last topic of the course, we will briefly consider detection theory. The methods are based on estimation theory and attempt to answer questions such as Is a signal
More informationClassifier performance evaluation
Classifier performance evaluation Václav Hlaváč Czech Technical University in Prague Czech Institute of Informatics, Robotics and Cybernetics 166 36 Prague 6, Jugoslávských partyzánu 1580/3, Czech Republic
More informationA dirty-bomb is going to explode sometime tomorrow and destroy your company 4ever. You have been warned. 9/24/ :41 pm
BOMB THREATS RESPONSE 1 Preparedness 2 3 Hey @yourbusiness. A dirty-bomb is going to explode sometime tomorrow and destroy your company 4ever. You have been warned 9/24/2017 11:41 pm What we envision 4
More informationBiological Source Term Estimation Using Particle Counters and Immunoassay Sensors
Biological Source Term Estimation Using Particle Counters and Immunoassay Sensors P. Robins Hazard Assessment, Simulation and Prediction Dstl Porton Down, UK probins@dstl.gov.uk V. E. Rapley Hazard Assessment,
More informationAdvanced Technique for Dielectric Analyses
Chroma Systems Solutions, Inc. Advanced Technique for Dielectric Analyses 190xx Series Hipot Testers Keywords: Dielectric Analyses, Destructive testing, Threshold Detection, Breakdown, Test Damage. Title:
More informationStephen Scott.
1 / 35 (Adapted from Ethem Alpaydin and Tom Mitchell) sscott@cse.unl.edu In Homework 1, you are (supposedly) 1 Choosing a data set 2 Extracting a test set of size > 30 3 Building a tree on the training
More informationEvaluating Electricity Theft Detectors in Smart Grid Networks. Group 5:
Evaluating Electricity Theft Detectors in Smart Grid Networks Group 5: Ji, Xinyu Rivera, Asier Agenda Introduction Background Electricity Theft Detectors and Attacks Results Discussion Conclusion 2 Introduction
More informationIntroduction to Signal Detection and Classification. Phani Chavali
Introduction to Signal Detection and Classification Phani Chavali Outline Detection Problem Performance Measures Receiver Operating Characteristics (ROC) F-Test - Test Linear Discriminant Analysis (LDA)
More informationTraction Diesel Engine Anomaly Detection Using Vibration Analysis in Octave Bands
PAPER Traction Diesel Engine Anomaly Detection Using Vibration Analysis in Octave Bands Minoru KONDO Drive Systems Laboratory, Vehicle Control Technology Division Shinichi MANABE Drive Systems Laboratory,
More informationForecasting Conflict Lecture 4 Models and Metrics
Forecasting Conflict Lecture 4 Models and Metrics Philip A. Schrodt Parus Analytical Systems schrodt735@gmail.com Graduate School of Decision Sciences University of Konstanz 14-17 October 2013 Overview
More informationDetectors in Nuclear Physics: Monte Carlo Methods. Dr. Andrea Mairani. Lectures I-II
Detectors in Nuclear Physics: Monte Carlo Methods Dr. Andrea Mairani Lectures I-II INTRODUCTION Sampling from a probability distribution Sampling from a probability distribution X λ Sampling from a probability
More informationReal time detection through Generalized Likelihood Ratio Test of position and speed readings inconsistencies in automated moving objects
Real time detection through Generalized Likelihood Ratio Test of position and speed readings inconsistencies in automated moving objects Sternheim Misuraca, M. R. Degree in Electronics Engineering, University
More informationApplied Nuclear Science Educational, Training & Simulation Systems
WWW.NATS-USA.COM Applied Nuclear Science Educational, Training & Simulation Systems North American Technical Services Bridging Technology with the Latest in Radiation Detection Systems The Center For Innovative
More information10. Composite Hypothesis Testing. ECE 830, Spring 2014
10. Composite Hypothesis Testing ECE 830, Spring 2014 1 / 25 In many real world problems, it is difficult to precisely specify probability distributions. Our models for data may involve unknown parameters
More information434 CHAP. 8 NUMERICAL OPTIMIZATION. Powell's Method. Powell s Method
434 CHAP. 8 NUMERICAL OPTIMIZATION Powell's Method Powell s Method Let X be an initial guess at the location of the minimum of the function z = f (x, x 2,...,x N ). Assume that the partial derivatives
More informationA Spatial and Temporal Characterization of the Background Neutron Environment at the Navy and Marine Corps Memorial Stadium
Vol. 35, No. 1 April 2017 A Spatial and Temporal Characterization of the Background Neutron Environment at the Navy and Marine Corps Memorial Stadium S.M. Walsh, M.G. Millett, and M.E. Nelson This paper
More informationEarly Detection of a Change in Poisson Rate After Accounting For Population Size Effects
Early Detection of a Change in Poisson Rate After Accounting For Population Size Effects School of Industrial and Systems Engineering, Georgia Institute of Technology, 765 Ferst Drive NW, Atlanta, GA 30332-0205,
More informationCensoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks
Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Mohammed Karmoose Electrical Engineering Department Alexandria University Alexandria 1544, Egypt Email: mhkarmoose@ieeeorg Karim
More informationNovel spectrum sensing schemes for Cognitive Radio Networks
Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced
More informationPhysics 1000 Half Life Lab
Physics 1000 Half Life Lab Determination of Half-Life with a Geiger-Müller Counter Object: Apparatus: To understand the concept of half-life; to become familiar with the use of a Geiger-Müller counter;
More informationLocalization of Radioactive Sources Zhifei Zhang
Localization of Radioactive Sources Zhifei Zhang 4/13/2016 1 Outline Background and motivation Our goal and scenario Preliminary knowledge Related work Our approach and results 4/13/2016 2 Background and
More informationMachine Learning Linear Classification. Prof. Matteo Matteucci
Machine Learning Linear Classification Prof. Matteo Matteucci Recall from the first lecture 2 X R p Regression Y R Continuous Output X R p Y {Ω 0, Ω 1,, Ω K } Classification Discrete Output X R p Y (X)
More informationUNIFORMLY MOST POWERFUL CYCLIC PERMUTATION INVARIANT DETECTION FOR DISCRETE-TIME SIGNALS
UNIFORMLY MOST POWERFUL CYCLIC PERMUTATION INVARIANT DETECTION FOR DISCRETE-TIME SIGNALS F. C. Nicolls and G. de Jager Department of Electrical Engineering, University of Cape Town Rondebosch 77, South
More informationLecture 4 Discriminant Analysis, k-nearest Neighbors
Lecture 4 Discriminant Analysis, k-nearest Neighbors Fredrik Lindsten Division of Systems and Control Department of Information Technology Uppsala University. Email: fredrik.lindsten@it.uu.se fredrik.lindsten@it.uu.se
More informationShakeAlert Phase 1: West Coast Earthquake Early Warning. Doug Given, USGS EEW Coordinator Education Symposium, Dec. 4, 2018
ShakeAlert Phase 1: West Coast Earthquake Early Warning Doug Given, USGS EEW Coordinator Education Symposium, Dec. 4, 2018 Population WA 7M OR 4M Annualized Earthquake Losses, $6.1B 61% in California,
More informationCourse content (will be adapted to the background knowledge of the class):
Biomedical Signal Processing and Signal Modeling Lucas C Parra, parra@ccny.cuny.edu Departamento the Fisica, UBA Synopsis This course introduces two fundamental concepts of signal processing: linear systems
More informationM1. (a) (i) cannot penetrate aluminium allow can only pass through air / paper too weak is neutral 1
M. (a) (i) cannot penetrate aluminium allow can only pass through air / paper too weak is neutral gamma rays not affected (by aluminium) allow all / most (gamma rays) to pass through too strong is neutral
More informationRegularization. CSCE 970 Lecture 3: Regularization. Stephen Scott and Vinod Variyam. Introduction. Outline
Other Measures 1 / 52 sscott@cse.unl.edu learning can generally be distilled to an optimization problem Choose a classifier (function, hypothesis) from a set of functions that minimizes an objective function
More informationAutomated Sequential Search for Weak Radiation Sources
Automated Sequential Search for Weak Radiation Sources A. Kumar, H.G. Tanner, A.V. Klimenko, K. Borozdin, and W.C. Priedhorsky Abstract We demonstrate the principle of a bidirectional interaction between
More informationA Framework for Adaptive Anomaly Detection Based on Support Vector Data Description
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description Min Yang, HuanGuo Zhang, JianMing Fu, and Fei Yan School of Computer, State Key Laboratory of Software Engineering, Wuhan
More informationSupplementary Figure 1. Characterization of the single-photon quantum light source based on spontaneous parametric down-conversion (SPDC).
.2 Classical light source.8 g (2) ().6.4.2 EMCCD SPAD 2 3.2.4.6.8..2.4.6.8.2 Mean number of photon pairs per pump pulse 4 5 6 7 8 9 2 3 4 Supplementary Figure. Characterization of the single-photon quantum
More informationGiven a feature in I 1, how to find the best match in I 2?
Feature Matching 1 Feature matching Given a feature in I 1, how to find the best match in I 2? 1. Define distance function that compares two descriptors 2. Test all the features in I 2, find the one with
More informationIntroduction to Supervised Learning. Performance Evaluation
Introduction to Supervised Learning Performance Evaluation Marcelo S. Lauretto Escola de Artes, Ciências e Humanidades, Universidade de São Paulo marcelolauretto@usp.br Lima - Peru Performance Evaluation
More informationTriangle-mapping Analysis on Spatial Competition and Cooperation of Chinese Cities
Triangle-mapping Analysis on Spatial Competition and Cooperation of Chinese Cities arxiv:1801.00641v1 [physics.soc-ph] 2 Jan 2018 Pan Liu, Xiao-Pu Han, and Linyuan Lü, Alibaba Research Center for Complexity
More informationFIRST LINE INSPECTION: RADIATION DETECTION
WP 2 FIRST LINE INSPECTION: G Dermody Symetrica Security Ltd. RADIATION DETECTION Contributors CEA Symetrica Security Ltd 09/10/2018 Final Public Workshop 1 CONTENT MOBILE AND RELOCATABLE RADIATION DETECTION
More informationPracticable Robust Markov Decision Processes
Practicable Robust Markov Decision Processes Huan Xu Department of Mechanical Engineering National University of Singapore Joint work with Shiau-Hong Lim (IBM), Shie Mannor (Techion), Ofir Mebel (Apple)
More informationApplied Nuclear Science Educational, Training & Simulation Systems
WWW.NATS-USA.COM Applied Nuclear Science Educational, Training & Simulation Systems North American Technical Services Bridging Technology With The Latest in Radiation Detection Systems & Training Solutions
More informationDiagnostics. Gad Kimmel
Diagnostics Gad Kimmel Outline Introduction. Bootstrap method. Cross validation. ROC plot. Introduction Motivation Estimating properties of an estimator. Given data samples say the average. x 1, x 2,...,
More informationNuclear Physics Lab I: Geiger-Müller Counter and Nuclear Counting Statistics
Nuclear Physics Lab I: Geiger-Müller Counter and Nuclear Counting Statistics PART I Geiger Tube: Optimal Operating Voltage and Resolving Time Objective: To become acquainted with the operation and characteristics
More informationNeutron Detector Gamma Insensitivity Criteria
PNNL-18903 Neutron Detector Gamma Insensitivity Criteria RT Kouzes JR Ely AT Lintereur DL Stephens October 28, 2009 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the
More informationDetector. Matthew Strugari, Dr. Garth Huber 1, Wenliang Li. University of Regina, Regina, SK, S4S 0A2, Canada. August 15, 2016.
1 Simulations for e/π Separation for the SHMS Heavy Gas Cherenkov Detector Matthew Strugari, Dr. Garth Huber 1, Wenliang Li University of Regina, Regina, SK, S4S 0A2, Canada August 15, 2016 Abstract The
More information15-388/688 - Practical Data Science: Nonlinear modeling, cross-validation, regularization, and evaluation
15-388/688 - Practical Data Science: Nonlinear modeling, cross-validation, regularization, and evaluation J. Zico Kolter Carnegie Mellon University Fall 2016 1 Outline Example: return to peak demand prediction
More informationRobotics 2 Data Association. Giorgio Grisetti, Cyrill Stachniss, Kai Arras, Wolfram Burgard
Robotics 2 Data Association Giorgio Grisetti, Cyrill Stachniss, Kai Arras, Wolfram Burgard Data Association Data association is the process of associating uncertain measurements to known tracks. Problem
More informationA Modular NMF Matching Algorithm for Radiation Spectra
A Modular NMF Matching Algorithm for Radiation Spectra Melissa L. Koudelka Sensor Exploitation Applications Sandia National Laboratories mlkoude@sandia.gov Daniel J. Dorsey Systems Technologies Sandia
More informationEstimating the Shape of Covert Networks
Estimating the Shape of Covert Networks -Matthew Dombroski -Paul Fischbeck -Kathleen Carley Center for Computational Analysis of Social and Organizational Systems Matthew J. Dombroski Porter Hall Pittsburgh,
More informationSection 7.5: Nonstationary Poisson Processes
Section 7.5: Nonstationary Poisson Processes Discrete-Event Simulation: A First Course c 2006 Pearson Ed., Inc. 0-13-142917-5 Discrete-Event Simulation: A First Course Section 7.5: Nonstationary Poisson
More informationTracking Human Heads Based on Interaction between Hypotheses with Certainty
Proc. of The 13th Scandinavian Conference on Image Analysis (SCIA2003), (J. Bigun and T. Gustavsson eds.: Image Analysis, LNCS Vol. 2749, Springer), pp. 617 624, 2003. Tracking Human Heads Based on Interaction
More informationSupplementary Information
Supplementary Information Performance measures A binary classifier, such as SVM, assigns to predicted binding sequences the positive class label (+1) and to sequences predicted as non-binding the negative
More information2. What are the tradeoffs among different measures of error (e.g. probability of false alarm, probability of miss, etc.)?
ECE 830 / CS 76 Spring 06 Instructors: R. Willett & R. Nowak Lecture 3: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics Executive summary In the last lecture we
More informationExploiting Geographic Dependencies for Real Estate Appraisal
Exploiting Geographic Dependencies for Real Estate Appraisal Yanjie Fu Joint work with Hui Xiong, Yu Zheng, Yong Ge, Zhihua Zhou, Zijun Yao Rutgers, the State University of New Jersey Microsoft Research
More informationBayesian Logic Thomas Bayes:
Bayesian Logic Thomas Bayes: 1702-1761 Based on probability, P(X) NOT frequency distributions, BUT all common distributions can be incorporated into a Bayesian analysis : Poisson, Normal (Gaussian) etc.
More informationCS 237: Probability in Computing
CS 237: Probability in Computing Wayne Snyder Computer Science Department Boston University Lecture 13: Normal Distribution Exponential Distribution Recall that the Normal Distribution is given by an explicit
More informationGIS and Remote Sensing Support for Evacuation Analysis
GIS and Remote Sensing Support for Evacuation Analysis Presented to GIS for Transportation Symposium Rapid City, South Dakota March 28-31, 2004 Demin Xiong Oak Ridge National Laboratory 2360 Cherahala
More informationDecision-making, inference, and learning theory. ECE 830 & CS 761, Spring 2016
Decision-making, inference, and learning theory ECE 830 & CS 761, Spring 2016 1 / 22 What do we have here? Given measurements or observations of some physical process, we ask the simple question what do
More informationPARAFOG: a new decision support system for the airports to monitor and to predict radiation fog based on automatic LIDARceilometer
PARAFOG: a new decision support system for the airports to monitor and to predict radiation fog based on automatic LIDARceilometer measurements Quentin Laffineur Royal Meteorological Institute of Belgium
More informationData Mining and Analysis: Fundamental Concepts and Algorithms
Data Mining and Analysis: Fundamental Concepts and Algorithms dataminingbook.info Mohammed J. Zaki 1 Wagner Meira Jr. 2 1 Department of Computer Science Rensselaer Polytechnic Institute, Troy, NY, USA
More informationerrors every 1 hour unless he falls asleep, in which case he just reports the total errors
I. First Definition of a Poisson Process A. Definition: Poisson process A Poisson Process {X(t), t 0} with intensity λ > 0 is a counting process with the following properties. INDEPENDENT INCREMENTS. For
More informationLecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics. 1 Executive summary
ECE 830 Spring 207 Instructor: R. Willett Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics Executive summary In the last lecture we saw that the likelihood
More informationA Logistic Regression Method for Urban growth modeling Case Study: Sanandaj City in IRAN
A Logistic Regression Method for Urban growth modeling Case Study: Sanandaj City in IRAN Sassan Mohammady GIS MSc student, Dept. of Surveying and Geomatics Eng., College of Eng. University of Tehran, Tehran,
More informationhsnim: Hyper Scalable Network Inference Machine for Scale-Free Protein-Protein Interaction Networks Inference
CS 229 Project Report (TR# MSB2010) Submitted 12/10/2010 hsnim: Hyper Scalable Network Inference Machine for Scale-Free Protein-Protein Interaction Networks Inference Muhammad Shoaib Sehgal Computer Science
More informationNAS Report MTI FROM SAR. Prof. Chris Oliver, CBE NASoftware Ltd. 19th January 2007
NAS Report MTI FROM SAR Prof. Chris Oliver, CBE NASoftware Ltd. 19th January 27 1. Introduction NASoftware have devised and implemented a series of algorithms for deriving moving target information from
More informationREX Evaluation Guide. American Micro Detection Systems Inc March Lane, Suite 200 Stockton, CA 95219
REX Evaluation Guide American Micro Detection Systems Inc. 2800 March Lane, Suite 200 Stockton, CA 95219 I. INTRODUCTION REX (Real-time Elemental X-ray Fluorescence System) is the only instrument capable
More informationEvaluation & Credibility Issues
Evaluation & Credibility Issues What measure should we use? accuracy might not be enough. How reliable are the predicted results? How much should we believe in what was learned? Error on the training data
More informationImproved Spectrum Utilization in Cognitive Radio Systems
Improved Spectrum Utilization in Cognitive Radio Systems Lei Cao and Ramanarayanan Viswanathan Department of Electrical Engineering The University of Mississippi Jan. 15, 2014 Lei Cao and Ramanarayanan
More informationAssessing Risks. Tom Carter. tom/sfi-csss. Complex Systems
Assessing Risks Tom Carter http://cogs.csustan.edu/ tom/sfi-csss Complex Systems July, 2002 Our general topics: Assessing risks Using Bayes Theorem The doomsday argument References 2 The quotes Science
More informationEvaluation Metrics for Intrusion Detection Systems - A Study
Evaluation Metrics for Intrusion Detection Systems - A Study Gulshan Kumar Assistant Professor, Shaheed Bhagat Singh State Technical Campus, Ferozepur (Punjab)-India 152004 Email: gulshanahuja@gmail.com
More informationMultiple regression: Categorical dependent variables
Multiple : Categorical Johan A. Elkink School of Politics & International Relations University College Dublin 28 November 2016 1 2 3 4 Outline 1 2 3 4 models models have a variable consisting of two categories.
More informationPart III Measures of Classification Accuracy for the Prediction of Survival Times
Part III Measures of Classification Accuracy for the Prediction of Survival Times Patrick J Heagerty PhD Department of Biostatistics University of Washington 102 ISCB 2010 Session Three Outline Examples
More informationPATTERN RECOGNITION AND MACHINE LEARNING
PATTERN RECOGNITION AND MACHINE LEARNING Slide Set 3: Detection Theory January 2018 Heikki Huttunen heikki.huttunen@tut.fi Department of Signal Processing Tampere University of Technology Detection theory
More informationModel Accuracy Measures
Model Accuracy Measures Master in Bioinformatics UPF 2017-2018 Eduardo Eyras Computational Genomics Pompeu Fabra University - ICREA Barcelona, Spain Variables What we can measure (attributes) Hypotheses
More informationData Analyzing and Daily Activity Learning with Hidden Markov Model
Data Analyzing and Daily Activity Learning with Hidden Markov Model GuoQing Yin and Dietmar Bruckner Institute of Computer Technology Vienna University of Technology, Austria, Europe {yin, bruckner}@ict.tuwien.ac.at
More informationThreshold Considerations in Distributed Detection in a Network of Sensors.
Threshold Considerations in Distributed Detection in a Network of Sensors. Gene T. Whipps 1,2, Emre Ertin 2, and Randolph L. Moses 2 1 US Army Research Laboratory, Adelphi, MD 20783 2 Department of Electrical
More informationAquadopp HR Profiler: Extended Velocity Range Mode
Nortek Technical Note No.: TN-028 Title: On the Use of Extended Velocity Range Mode (HR Profiler) Last Edited: January 21, 2010 Authors: Peter J Rusello - NortekUSA, Number of Pages: Aquadopp HR Profiler:
More informationNonparametric predictive inference with parametric copulas for combining bivariate diagnostic tests
Nonparametric predictive inference with parametric copulas for combining bivariate diagnostic tests Noryanti Muhammad, Universiti Malaysia Pahang, Malaysia, noryanti@ump.edu.my Tahani Coolen-Maturi, Durham
More informationCollaborative Target Detection in Wireless Sensor Networks with Reactive Mobility
1 / 24 Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility Rui Tan 1 Guoliang Xing 1 Jianping Wang 1 Hing Cheung So 2 1 Department of Computer Science City University of Hong
More informationWE consider the problem of detecting and localizing a material
1886 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 5, MAY 2007 Detection and Localization of Material Releases With Sparse Sensor Configurations Emily B. Fox, Student Member, IEEE, John W. Fisher,
More informationStatistical Tools and Techniques for Solar Astronomers
Statistical Tools and Techniques for Solar Astronomers Alexander W Blocker Nathan Stein SolarStat 2012 Outline Outline 1 Introduction & Objectives 2 Statistical issues with astronomical data 3 Example:
More informationP5.3 EVALUATION OF WIND ALGORITHMS FOR REPORTING WIND SPEED AND GUST FOR USE IN AIR TRAFFIC CONTROL TOWERS. Thomas A. Seliga 1 and David A.
P5.3 EVALUATION OF WIND ALGORITHMS FOR REPORTING WIND SPEED AND GUST FOR USE IN AIR TRAFFIC CONTROL TOWERS Thomas A. Seliga 1 and David A. Hazen 2 1. Volpe National Transportation Systems Center, Cambridge,
More informationLab NUC. Determination of Half-Life with a Geiger-Müller Counter
Lab NUC Determination of Half-Life with a Geiger-Müller Counter Object: Apparatus: To understand the concept of half-life; to become familiar with the use of a Geiger-Müller counter; to determine the half-lives
More information6 Introduction to Population Genetics
70 Grundlagen der Bioinformatik, SoSe 11, D. Huson, May 19, 2011 6 Introduction to Population Genetics This chapter is based on: J. Hein, M.H. Schierup and C. Wuif, Gene genealogies, variation and evolution,
More information